Fusion Centers Notes There are two different versions of the affirmative. The first version of the affirmative says that fusion centers are targeting the #BlackLivesMatter movement; we think that’s bad. The second version of the affirmative says that fusion centers over-saturate law enforcement with information – that trades off with counter-terrorism efforts and stops cloud computing. If you are reading the terrorism advantage, a lot of the terrorism mechanics are in the Terror DA toolbox. Fusion Center FYI Here is what Fusion Centers Do Justin Lewis Abold, Ray Guidetti, and Douglas Keyer June 2012 Strengthening the Value of the National Network of Fusion Centers by Leveraging Specialization: Defining “Centers of Analytical Excellence” The Journal of the NPS Center for Homeland Defense and Security Fusion centers are multiagency task forces designed for receiving, gathering, analyzing, and disseminating information and intelligence among constituencies that have a law enforcement, counter terrorism, public safety, or homeland security mission or focus.3 The purpose of a fusion center is to aid law enforcement, homeland security, public safety, and private sector entities in better understanding their environments as they relate to the risk and threat of crime, terrorism, and other crises. Additionally, fusion centers are intended to serve as the primary focal point for information sharing among broad jurisdictions where multiple entities reside, such as a state or Urban Area Security Initiative (UASI) region.¶ The catalyst behind the concept of fusion centers stemmed from the general admission, following the tragic events of September 11, 2001, that the nation’s law enforcement community’s information sharing and intelligence capability necessary to inform decision-makers about the threat of terrorism was both ineffective and inefficient.4 The fusion center concept started as grassroots efforts in jurisdictions like Arizona, Georgia, New York, and the Los Angeles region to fill the void of combining information and intelligence sources at the local level to ferret out terrorist activity, thereby underpinning a national effort to share information that could be used in overall preparedness efforts. Today, there are seventyseven fusion centers designated by governors across the nation that integrate all aspects of public safety information.5 While their origin may have been rooted in counter terrorism, state and local officials have come to find fusion centers to be of equal importance for assessing crime and other homeland security trends or issues.¶ The federal government quickly realized the significance of the fusion center as a keystone in its national effort to share information needed to guard against terrorism and respond to national crises. The National Network of Fusion Centers was erected to bolster this much-needed capability.6 While the identification of the network itself may have stemmed from an informal designation given to the collaboration among federal interagency partners with state, local, tribal, and territorial partners, today it is used to formally recognize this national partnership. Moreover, it is this formal recognition that underpins a programmatic effort by the Department of Homeland Security Office of Intelligence and Analysis (DHS I&A) to follow guidance derived from the Information Sharing Environment (ISE) established by the United States Intelligence Reform and Terrorism Prevention Act of 2004. Under that authority, DHS I&A in cooperation with the Department of Justice’s (DOJ) Federal Bureau of Investigation (FBI) provides coordinated support to recognized fusion centers in a given area across the nation. DOJ has recognized the usefulness of fusion centers for identifying terrorist and criminal trends and processing suspicious activity reports in state and local jurisdictions. It is the recognition of these two federal departments that has fueled the growth of fusion centers since the concept first came to the fore early in the millennium.¶ The “National Network of Fusion Centers” has been embraced by the Departments of Homeland Security and Justice as a focal point of collaboration in support of federal counterterrorism efforts and other homeland security priorities. In fact, the 2010 National Security Strategy of the United States specifically cites fusion centers as a central element in preventing future acts of terrorism. Simply put, this decentralized and organically developed network is a national asset, and sustainment of that asset is a shared responsibility across all levels of government. In the absence of fusion centers, there is no other nationwide mechanism for leveraging the breadth and depth of more than two million public safety practitioners in every corner of the country for homeland security purposes. Notably, as seasoned intelligence experts and information analysts from all levels of government will concede, some of the most important information and actionable intelligence that we depend on to protect the country flows up, not down – the knowledge is collected at a granular State or local level and then fused to permit all levels of government to act decisively in the protection of Americans. That is a central purpose for the fusion centers, and one that has been well-served by their existence. 7¶ Despite the fact that state and local law enforcement and homeland security professionals mainly staff fusion centers, these centers are also comprised of personnel and systems from the federal government. The DHS and FBI footprints within fusion centers serve as gateways to the intelligence community for state, local, and private sector entities. State and local fusion center analysts conduct assessments and produce intelligence products related to state and local level threats and risks that otherwise would not be addressed by federal authorities. This information is shared nationally, and provided to the federal government and the intelligence community to answer standing information needs related to homeland security.¶ While each fusion center enterprise may differ on how they refer to their respective intelligence product frameworks , the key assumption is that finished intelligence informs state and local decision-makers about the threat environment in a manner that supports planning, operations, resource allocation, and training. Achieving this dynamic requires fusion centers to answer four very important questions for their consumers:¶ What has happened?¶ What is happening?¶ What is about to happen?¶ What could happen?8¶ In answering the above four questions, fusion centers across the network likely arrange their intelligence products in four distinct categories: investigative support/research products, situational awareness reports, analyses, and forecasts.9 Investigative support/research products focus on past and current events and issues that require additional information for decision makers and investigators to better understand or to assist with the describing evidence of a crime. Situational awareness reports aim specifically at answering the question of what is happening in a particular environment or what is about to happen. Analytical products go a step further and determine the impact of an event, threat, or issue on a particular environment or constituency. Finally, forecasting products seek to answer the question of what may happen in the future that will require a policy decision, operations response, or resource allocation.¶ Each fusion center is responsible for determining who within their area of responsibility (AOR) requires information and intelligence products that address threat and risk related to crime, counter terrorism, and homeland security. These constituencies include law enforcement, public safety, emergency management, government, and private sector personnel and organizations. While the intelligence and information products created are based on the needs of the requestor, the decision maker individual fusion centers aim to inform runs the gamut from line level police, investigators, fire, and EMS personnel to mayors and governor; from attorney generals and homeland security advisors to state police superintendents to municipal police chief; from private sector security managers to emergency management and risk mitigation planners.10 Each of these decision makers requires a different type of product or service from the fusion center to inform them about threat, risk, and problems within the environment. PLAN TEXT Plan: The United States Federal Government should substantially curtail its fusion center domestic surveillance. Solvency 1AC Contention ___ : Solvency Fusion Center’s Oversaturate Organizations with too much information – this makes the effective utilization of that information impossible Jesse Walke, Author Extraordinaire, 10/3/2012, "Fusion Centers: Expensive, Practically Useless, and Bad for Your Liberty," Reason, http://reason.com/blog/2012/10/03/fusion-centersexpensive-practically-use fusion centers pepper the law-enforcement landscape shadowy intelligence-sharing shops heavily funded by the federal Department of Homeland Security. When a report's recommendations include a plea for the DHS to "track how much money it gives to each fusion center," you know you're dealing with a system that has some very basic problems After reviewing 13 months' worth of output the centers' reports were "oftentimes shoddy, rarely timely, sometimes endangering citizens' civil liberties and Privacy Act protections, occasionally taken from already-published public sources, and more often than not unrelated to terrorism." One report offered the vital intelligence that "a certain model of automobile had folding rear seats that provided access to the trunk without leaving the car," Others highlighted illegal activities by people in the Terrorist Identities Datamart Environment (TIDE) database, which sounds useful until you hear just what those people did that attracted the centers' attention. One man was caught speeding. Another shoplifted some shoes. TIDE itself, according to the Senate report, is filled not just with suspected terrorists but with [and] their "associates," a term broad enough to rope in a two-year-old boy. Nearly a third of the reports contained no useful information "overstepped legal boundaries" in disturbing ways: "Reporting on First Amendment-protected activities lacking a nexus to violence or criminality; reporting on or improperly characterizing political, religious or ideological speech that is not explicitly violent or criminal; and attributing to an entire group the violent or criminal acts of one or a limited number of the group's members." The Senate Committee on Homeland Security and Governmental Affairs has just released a report [pdf] on the " -- " that run on the state and local level but It is a devastating document. . the fusion centers' , Senate investigators concluded that a feature deemed notable because it "could be useful to human traffickers." were not even circulated after they were written, sometimes because they , sometimes because they (One analyst, for example, felt the need to note that a Muslim community group's list of recommended readings included four items whose authors were in the TIDE database.) Interestingly, while the DHS usually refused to publish these problematic reports, the department also retained them for an "apparantly indefinite" period. Why did the centers churn out so much useless and illegal material? A former employee says officers were judged "by the number [of reports] they produced, not by quality or evaluations they received." Senate investigators were "able to identify only one case in which an official with a history of . Other issues identified in the Senate report: • Some of the fusion centers touted by the Department of Homeland Security do not, in fact, exist. • Centers have reported threats that do not exist either. An alleged Russian "cyberattack" turned out to be an American network technician accessing a work computer remotely while on vacation. • DHS "was unable to provide an accurate tally of how much it had granted to states and cities to support fusion centers efforts." Instead it offered "broad estimates of the total amount of federal dollars spent on fusion center activities from 2003 to 2011, estimates which ranged from $289 million to $1.4 billion." A center in San Diego "spent nearly $75,000 on 55 flat-screen televisions," according to the Senate report officials said they displayed calendars, and were used for 'watching the news. 2010 assessment of state and local fusion centers conducted at the request of DHS found widespread deficiencies in the centers' basic counterterrorism information-sharing capabilities," DHS did not share that report with Congress or discuss its findings publicly. When the Subcommittee requested the assessment as part of its investigation, DHS at first denied it existed, then disputed whether it could be shared with Congress, before ultimately providing a copy. serious reporting issues faced any consequences for his mistakes." Specifically, he had to attend an extra week of training When you aren't keeping track of how much you're spending, it becomes hard to keep track of what that money is being spent on. All sorts of dubious expenses slipped by. . "When asked what the televisions were being used for, 'open-source monitoring.' Asked to define 'open-source monitoring,' SD-LECC officials said they meant '" The report is also filled with signs of stonewalling. A " for example. " " And then there's the matter of mission creep. Many centers have adopted an "all-crime, all-hazards" approach that shifts their focus from stopping terrorism and onto a broader spectrum of threats. You could make a reasonable case that this is a wiser use of public resources -- terrorism is rare, after all, and the DHS-driven movement away At any rate, the DHS should stop citing the centers as a key part of America's counterterrorism efforts if those centers have found better (or easier) things to do than trying to fight terror. from the all-hazards approach in the early post-9/11 years had disastrous results. Unfortunately, the leading "hazards" on the fusion centers' agenda appear to be drugs and illegal aliens. Defunding fusion centers is key to end unnecessary tracking of social movements Suraj Sazawal is the Communications/Research Coordinator for the Charity and Security Network May 27, 2014, Time To Close Fusion Centers http://www.defendingdissent.org/now/news/time-to-close-fusion-centers/ Adding to the long list of troubling intelligence-collecting activities carried out by fusion centers, a new report from the how the Department of Homeland Security coordinated with local law enforcement across the country to monitor the Occupy movement in 2011 and 2012.¶ Based on thousands of government emails and documents the PCJF obtained through freedom of information requests, the report describes a nationwide, coordinated effort by federal and local officials along with military agencies and private security contractors to monitor “all manner of peaceful and lawful political activity that took place during the Occupy movement, from protests and rallies to meetings and educational lectures.”¶ Numbering almost 80 across the country, fusion centers were created in the wake of the September 11, 2001 attacks to address concerns that local, state and federal authorities were not effectively sharing information about potential terrorist threats. Over a decade later, they have become bloated centers, lacking a clear mandate and sufficient oversight. Despite receiving upwards of $1.4 billion in state and federal Homeland Security funds, a bipartisan Senate investigation found that the intelligence they produce is “of uneven quality – oftentimes shoddy, rarely timely, sometimes endangering citizens’ civil liberties.” And now there’s more evidence of them collecting intelligence on peaceful protesters. [find links to additional reports below]¶ ¶ Take Action ButtonWe’re partnering with Partnership for Civil Justice Fund (PCJF) reveals RootsAction to petition Congress to take action to close Fusion Centers. Please add your voice, and share!¶ The documents, many of which are partially redacted, reveal a surprising degree of coordination between local authorities and fusion centers. For example, the Southern Nevada Counter Terrorism Center, acting on a request from police chiefs to “identify, research and document trends or activities that may threaten public safety,” produced a bulletin detailing the “tactics and strategies” employed by Occupy activists nationwide. Included in this bulletin were reports about Las Vegas “activists staging sit-ins” and free speech protesters in Long Beach, California being arrested for staying in a park past its 10pm closing time. The report also notes that Occupy activists had momentarily interrupted a speech by President Obama in November of 2011.¶ According to the New York Times, among the most active centers tracking Occupy activities was a Boston-area fusion center which “issued scores of bulletins listing hundreds of events including a protest of ‘irresponsible lending practices,’ a food drive and multiple ‘yoga, faith & spirituality’ classes.”¶ Law enforcement in Atlanta, Dallas, Denver, Detroit, El Paso, Houston, Los Angeles, New York, Oakland, Portland, San Diego, Seattle, and Washington, D.C., participated in similar monitoring activities.¶ “The U.S. Fusion Centers are using their vast counter-terrorism resources to target the domestic social justice movement as a criminal or terrorist enterprise,” PCJF Executive Director Mara Verheyden-Hilliard said in a press release. “This is an abuse of power and corruption of democracy.”¶ In one of the more bizarre examples of mission creep revealed by these documents, the Defense Threat Reduction Agency (DTRA), whose official mission is to “address the entire spectrum of chemical, biological, radiological, nuclear and high yield explosive threats,” was tracking and sharing intelligence on Occupy activities. According to PCJF:¶ “This Pentagon agency that exists to counter threats from weapons of mass destruction circulated material on Occupy including, for example, one document with the subject line: “FW: Alert Update! Chicago … What Police Should Be Learning From The Occupy Protests.” This document shows in an email chain that this article was initially circulated through the subscription website activistmap.com, which is billed as the “Domestic Terrorism Tracking System.” The keywords associated with this Domestic Terrorism Tracking System include: anarchist(s), animal rights, environmentalist, protesters, socialist(s), communist(s), civil disobedience, social justice and global justice, among others.” (emphasis added)¶ “[T]he Fusion Centers are a threat to civil liberties, democratic dissent and the social and political fabric of this country,” said Carl Messineo, PCJF Legal Director. “The long passed for the centers to be defunded.” time has Extensions Defund Fusion Centers Solves Fusion centers must be defunded and ended Hilliard, Messineo ’14 [May 23, 2014, GlobalResearch, Mara Verheyden-Hillard cofounder of the Partnership for Civil Justice Legal Defense & Education Fund, Attorney for the International Action Center, Anti-war activist, Carl Messineo cofounder of the Partnership for Civil Justice Legal Defense and Education Fund; “The Hidden Role of the Fusion Centers in the Nationwide Spying Operation against the Occupy Movement and Peaceful Protest in America”, http://www.globalresearch.ca/the-hidden-role-of-the-fusion-centers-in-the-nationwide-spyingoperation-against-the-occupy-movement-and-peaceful-protest-in-america/5383571] Until now the role of the Fusion Centers in their application of anti-terrorism authority and resources has been shrouded in secrecy. In 2012, the Senate issued an investigative report on the Fusion Centers that The Washington Post described as revealing “pools of ineptitude, waste and civil liberties intrusions.” The Department of Homeland Security immediately dismissed and “condemned the report and defended the fusion centers, saying the Senate investigators relied on out-of-date data,” from 2009 and 2010, and prior years of materials. The public was not privy to the records underlying that investigation, however, the documents that the Senate reviewed predated the documents that the Partnership for Civil Justice Fund has obtained and made public. The newly released documents show that the Department of Homeland Security’s representations were far from true, that the conduct of the Fusion Centers continued unabated. The American people can now see for themselves how the U.S. government and the Department of Homeland Security are spending hundreds of millions of dollars of their money in Fusion Center operations. These documents, along with materials previously released by the PCJF that exposed the FBI and other domestic intelligence and law enforcement agencies’ targeting of Occupy, reveal a U.S. surveillance-industrial apparatus charging forward in willful disregard for the fundamental civil liberties and political freedoms of the people. Targeting a peaceful social justice movement as a criminal or terrorist enterprise is incompatible with a constitutional democracy. These documents show that the Fusion Centers constitute a menace to democracy. This gross misuse of U.S. taxpayers’ money also demonstrates that the Fusion Centers are a colossal rat hole of waste. The Fusion Centers should be defunded and ended immediately. Coinciding with the publication of these new documents and this report, the Partnership for Civil Justice Fund has initiated a nationwide campaign to End the Fusion Centers! The campaign includes a mass email and letter-writing effort to President Obama and all members of Congress calling on them to defund and end the Fusion Centers. As part of the End the Fusion Centers campaign and to broaden awareness of the dangers posed by the Fusion Centers, the PCJF has also made the new documents fully available to the public and to the media in searchable format at BigBrotherAmerica.org. Although the Fusion Centers’ existence is justified by the DHS as a necessary component in stopping terrorism and violent crime, the documents show that the Fusion Centers in the Fall of 2011 and Winter of 2012 were devoted to unconstrained targeting of a grassroots movement for social change that was acknowledged to be peaceful in character. Getting Rid of Fusion Centers Key Getting Rid of “Fusion Centers” solves, government would eliminate a waste of time, money, and resources Walker ’12 "Fusion Centers: Expensive, Practically Useless, and Bad for Your Liberty." Reason.com. N.p., 03 Oct. 2012. Web. 22 June 2015. The Senate Committee on Homeland Security and Governmental Affairs has just released a report [pdf] on the "fusion centers" that pepper the law-enforcement landscape -- shadowy intelligence-sharing shops run on the state and local level but heavily funded by the federal Department of Homeland Security. It is a devastating document. When a report's recommendations include a plea for the DHS to "track how much money it gives to each fusion center," you know you're dealing with a system that has some very basic problems.¶ After reviewing 13 months' worth of the fusion centers' output, Senate investigators concluded that the centers' reports were "oftentimes shoddy, rarely timely, sometimes endangering citizens' civil liberties and Privacy Act protections, occasionally taken from already-published public sources, and more often than not unrelated to terrorism." One report offered the vital intelligence that "a certain model of automobile had folding rear seats that provided access to the trunk without leaving the car," a feature deemed notable because it "could be useful to human traffickers." Others highlighted illegal activities by people in the Terrorist Identities Datamart Environment (TIDE) database, which sounds useful until you hear just what those people did that attracted the centers' attention. One man was caught speeding. Another shoplifted some shoes. TIDE itself, according to the Senate report, is filled not just with suspected terrorists but with their "associates," a term broad enough to rope in a two-year-old boy.¶ Nearly a third of the reports were not even circulated after they were written, sometimes because they contained no useful information, sometimes because they "overstepped legal boundaries" in disturbing ways: "Reporting on First Amendment-protected activities lacking a nexus to violence or criminality; reporting on or improperly characterizing political, religious or ideological speech that is not explicitly violent or criminal; and attributing to an entire group the violent or criminal acts of one or a limited number of the group's members." (One analyst, for example, felt the need to note that a Muslim community group's list of recommended readings included four items whose authors were in the TIDE database.) Interestingly, while the DHS usually refused to publish these problematic reports, the department also retained them for an "apparantly indefinite" period.¶ Why did the centers churn out so much useless and illegal material? A former employee says officers were judged "by the number [of reports] they produced, not by quality or evaluations they received." Senate investigators were "able to identify only one case in which an official with a history of serious reporting issues faced any consequences for his mistakes." Specifically, he had to attend an extra week of training.¶ Other issues identified in the Senate report:¶ • Some of the fusion centers touted by the Department of Homeland Security do not, in fact, exist.¶ • Centers have reported threats that do not exist either. An alleged Russian "cyberattack" turned out to be an American network technician accessing a work computer remotely while on vacation.¶ • DHS "was unable to provide an accurate tally of how much it had granted to states and cities to support fusion centers efforts." Instead it offered "broad estimates of the total amount of federal dollars spent on fusion center activities from 2003 to 2011, estimates which ranged from $289 million to $1.4 billion."¶ When you aren't keeping track of how much you're spending, it becomes hard to keep track of what that money is being spent on. All sorts of dubious expenses slipped by. A center in San Diego "spent nearly $75,000 on 55 flat-screen televisions," according to the Senate report. "When asked what the televisions were being used for, officials said they displayed calendars, and were used for 'open-source monitoring.' Asked to define 'open-source monitoring,' SD-LECC officials said they meant 'watching the news.'"¶ The report is also filled with signs of A "2010 assessment of state and local fusion centers conducted at the request of DHS found widespread deficiencies in the centers' basic counterterrorism information-sharing capabilities," for example. "DHS did not share that report with Congress or discuss its findings publicly. When the stonewalling. Subcommittee requested the assessment as part of its investigation, DHS at first denied it existed, then disputed whether it could be shared with Congress, before ultimately providing a copy."¶ And then there's the matter of mission creep. Many centers have adopted an "all-crime, all-hazards" approach that shifts their focus from stopping terrorism and onto a broader spectrum of threats. You could make a reasonable case that this is a wiser use of public resources -- terrorism is rare, after all, and the DHS-driven movement away from the all-hazards approach in the early post-9/11 years had disastrous results. Unfortunately, the leading "hazards" on the fusion centers' agenda appear to be drugs At any rate, the DHS should stop citing the centers as a key part of America's counterterrorism efforts if those centers have found better (or easier) things to do than trying to fight terror. and illegal aliens. 2AC AT: Cant Stop Collection Even if the affirmative cant stop data collection, the plan is key to prevent federal agencies from passing on intel to local law enforcement Kayyali ’14 [April 7, 2014, Nadia Kayyali former 2012 Bill of Rights Defense Committee Legal Fellow, board member of the National Lawyers Guild S.F. Bay Area chapter, member of Electronic Frontier Foundation activism team, “Why Fusion Centers Matter: FAQ”, Electronic Frontier Foundation, https://www.eff.org/deeplinks/2014/04/why-fusion-centers-matter-faq] While NSA surveillance has been front and center in the news recently, fusion centers are a part of the surveillance state that deserve close scrutiny. Fusion centers are a local arm of the socalled "intelligence community," the 17 intelligence agencies coordinated by the National Counterterrorism Center (NCTC). The government documentation around fusion centers is entirely focused on breaking down barriers between the various government agencies that collect and maintain criminal intelligence information. Barriers between local law enforcement and the NSA are already weak. We know that the Drug Enforcement Agency gets intelligence tips from the NSA which are used in criminal investigations and prosecutions. To make matters worse, the source of these tips is camouflaged using “parallel construction,” meaning that a different source for the intelligence is created to mask its classified source. This story demonstrates what we called “one of the biggest dangers of the surveillance state: the unquenchable thirst for access to the NSA's trove of information by other law enforcement agencies.” This is particularly concerning when NSA information is used domestically. Fusion centers are no different. In fact, in early 2012, the Foreign Intelligence Surveillance Court approved the sharing of raw NSA data with the NCTC. The intelligence community overseen by the NCTC includes the Department of Homeland Security and FBI, the main federal fusion center partners. Thus, fusion centers—and even local law enforcement—could potentially be receiving unminimized NSA data. This runs counter to the distant image many people have of the NSA, and it's why focusing on fusion centers as part of the recently invigorated conversation around surveillance is important. Fusion Centers Key to Data Collection Fusion centers key to data collection O’Hara 12 [O’Hara, Michael. “DHS ‘fusion centers’ portrayed as pools of ineptitude and civil liberties intrusions.” October 2, 2012. http://www.washingtonpost.com/investigations/dhsfusion-centers-portrayed-as-pools-of-ineptitude-and-civil-libertiesintrusions/2012/10/02/10014440-0cb1-11e2-bd1a-b868e65d57eb_story.html] Following the terrorist attacks of September 11, 2001, a nationwide "homeland security"/"counter terrorism" apparatus emerged. Components of this apparatus include the U.S. Department of Homeland Security, the Office of the Director of National Intelligence, the National Counterterrorism Center, and state/regional "fusion centers." Fusion centers, by and large, are staffed with personnel working in "counter terrorism"/ "homeland security" units of municipal, county, state, tribal and federal law enforcement/public safety/"counter terrorism" agencies. To a large degree, the "counter terrorism" operations of municipal, county, state and tribal agencies engaged in fusion centers are financed through a number of U.S. Department of Homeland Security grant programs. Initially, fusion centers were intended to be intelligence sharing partnerships between municipal, county, state, tribal and federal law enforcement/"counter terrorism" agencies, dedicated solely to the dissemination/sharing of "terrorism"-related intelligence. However, shortly following the creation of fusion centers, their focus shifted from this exclusive interest in "terrorism," to one of "all hazards"-- an umbrella term used to describe virtually anything (including "terrorism") that may be deemed a "hazard" to the public, or to certain private sector interests. And, as has been mandated through a series of federal legislative actions and presidential executive orders, fusion centers (and the "counter terrorism" entities that they are comprised of) work-- in ever closer proximity. Fusion centers collect massive amounts of data Electronic Privacy Information Center 7 [ “National Network” of Fusion Centers Raises Specter of COINTELPRO.” June 2007. https://epic.org/privacy/surveillance/spotlight/0607/#_ftn3] A “fusion center,” according to the Department of Justice, is a “mechanism to exchange information and intelligence, maximize resources, streamline operations, and improve the ability to fight crime and terrorism by analyzing data from a variety of sources,” which includes private sector firms and anonymous tipsters.[3] When local and state fusion centers were first created, they were purely oriented toward counterterrorism, but, over time and with the escalating involvement of federal officials, fusion centers “have increasingly gravitated toward an all-crimes and even broader all-hazards approach.”[4] The expansion of fusion center goals and increasing interaction with federal and private sector entities leads to a massive accumulation of data, raising questions of possible misuse or abuse. The Department of Homeland Security (DHS) seeks to create a “national network” of local and state fusion centers, tied into DHS’s “day-to-day activities.” This national network combined with the Department of Homeland Security’s plan to condition grant funding based on fusion center “compliance” with the federal agency’s priorities inculcates DHS with enormous domestic surveillance powers and evokes comparisons the publicly condemned domestic surveillance program COINTELPRO. “Fusion centers” collect an enormous amount of data from law enforcement agencies, “public safety components, including fire, health, transportation, agriculture, and environmental protection,” and private sector organizations.[5] A few state fusion centers had begun operations before September 11, 2001, but afterward, the number of centers grew rapidly. Fusion Centers Are Key Data Collection Centers Stone 15 Stone, Adam, January 23, 2015 National Fusion Center Model Is Emerging, Fusion centers are evolving into horizontal communication hubs between states, http://www.emergencymgmt.com/safety/National-Fusion-Center-Model-Is-Emerging.html Denial-of-service telephone attacks on 911 centers in Louisiana aren’t typically the sort of thing to make alarm bells ring in Kentucky. Yet that’s exactly what happened in one recent episode, when bad actors started blocking emergency calls and analysts in Louisiana’s fusion center quickly passed the word to their counterparts in Kentucky. “We got that out to our 911 centers in the next hour, and almost right away we started hearing that our 911 centers were experiencing the same thing,” said Mary Cope Halmhuber, director of the Kentucky Intelligence Fusion CenterThat swift heads-up from a neighboring state helped the Kentucky fusion center contain what might have been a big problem. This kind of interstate cooperation typifies today’s emerging fusion center. Initially formed after 9/11 as a means to coordinate local, state and federal intelligence, fusion centers have increasingly become hubs for cooperative information-sharing, not just vertically — from states up to federal authorities — but also horizontally, with data moving between states. While some interstate efforts have existed from the start, lately there has been a push to formalize these ties. This is most visible in the 20142017 National Strategy for the National Network of Fusion Centers, published recently by a collaborative of interested groups. Fusion centers came into being as a way to ensure that security information could percolate up from the local level to federal authorities. At the same time, these centers have broken ground in their ability to share information from state to state — a trend that has become increasingly visible. Consider a few recent accomplishments, as reported in the Department of Homeland Security 2013 Fusion Center Success Stories: The Immigration and Customs Enforcement office in Fort Lauderdale, Fla., brought in the Central Florida Intelligence Exchange on a case involving an individual wanted for production of child pornography. The exchange notified the Tennessee Fusion Center and Georgia Information Sharing and Analysis Center, and the suspect was arrested by the Georgia State Patrol. 2AC AT: Fusion Centers Good / Effective DHS response to Senate attacks is a lie Smith ’12 [Oct 3, 2012, Network World, Ms. Smith Senior Director of Circulation citing Senate report on fusion centers, “Fusion centers don't find terrorists, filled with 'crap' that violates privacy”, http://www.networkworld.com/article/2223243/microsoft-subnet/fusion-centersdon-t-find-terrorists--filled-with--crap--that-violates-privacy.html] The Senate report continually blasted DHS fusion centers. A spokesman for Napolitano immediately blasted back, calling the report "out of date, inaccurate and misleading." Oh really? Let's follow the money—not that it's easy to do since no one seems to know exactly how much has been dumped into fusion centers. The Senate investigation revealed that in the Homeland Security's counterterrorism mission, it spent between $289 million and $1.4 billion in state and local fusion centers. They are primarily operated through grants provided by DHS' Federal Emergency Management Agency. However, FEMA officials say they have no mechanism in place to accurately account for the total amount of grant funding spent toward fusion center support. That's not the only confusion since one chapter is devoted to how some DHS-recognized fusion centers don't even exist! A case study was conducted on some fusion centers that used DHS grant funds for what DHS called "must-have" basics for intelligence. Without constantly throwing dollar amounts at you, here's a tiny portion of what the federal money (your tax dollars at work) purchased. According to the Senate investigative report, fusion center funds were spent: In Arizona: Chevrolet Tahoes which were later given away to other agencies in Arizona; a surveillance monitoring wiretap room; 42" flat-screen TVs In Cleveland, Ohio, the fusion center spent $15,848 to buy the medical examiner "ruggedized Toughbook laptop computers." When asked why, the fusion center "responded that the laptops were for processing human remains in the aftermath of a mass casualty event in the Cleveland area." In San Diego, fusion center funds bought: a covert, wireless audio/video recorder with a "shirtbutton camera"; an ultra-low-light "pinhole" VGA camera; an ultra-low-light shirt-button camera "with interchangeable tops." But because that surveillance equipment was "simply too complicated for our customers to use," the San Diego "fusion center received other undercover surveillance devices," including: "A camera hidden in a hat and one disguised as a water bottle." Software, LCD monitors and computers would seem perhaps a reasonable intelligence sharing expense, but the San Diego fusion center purchased: 116 computers, monitors and related equipment, even though there are only 80 full-time employees. That was topped by buying 55 flat-screen TVs supposedly justified because they "displayed calendars" and were used for "open-source monitoring" which they later admitted was also called "watching the news." The D.C. fusion center ripped through $2.7 million in Homeland Security grants to upgrade: an electronic records management system; data mining software; and an Automated License Plate Recognition system (LPR system). But wait, it was not for the fusion center; it was purchased for the local cops. The LPR system was later dropped, in favor of buying: more "analytic software;" "sophisticated cell phone tracking devices;" and "handheld citation issuance units and accessories" all to enhance the capabilities of the D.C. police department. That doesn't count the money spent on computers, laptops, LCD Status Boards, CCTVs or paying cellular provider fees. Regarding "troubling" reports that some fusion centers may have violated the privacy and civil liberties of U.S. citizens: DHS personnel "are prohibited from collecting or maintaining information on U.S. persons solely for the purpose of monitoring activities protected by the U.S. Constitution, such as the First Amendment protected freedoms of religion, speech, press, and peaceful assembly and protest. The Privacy Act prohibits agencies from storing information on U.S. persons' First Amendment-protected activities if they have no valid reason to do so. Yet of all those SARs because you might be a domestic terroist if, the Senate panel wrote, "The apparent indefinite retention of cancelled intelligence reports that were determined to have raised privacy or civil liberties concerns appears contrary to DHS's own policies and the Privacy Act." After promising the condition of anonymity, NBC News spoke with a Homeland Security official who said "the department has made improvements to the fusion centers and that the skills of officials working in them are 'evolving and maturing'." Not matured, after nine years and hundreds of millions, if not billions of dollars later? This was only a fraction of the 141-page Senate investigation report which basically concluded that fusion centers are filled with 'crap' suspicious activity reports that are not helping the counterterrorism mission one little bit, but that are violating Americans' civil liberties and privacy. *** Fusion Centers – Version #1 Black Lives Matter Advantage 1AC Advantage ____ : Black Lives Matter The Black Lives matter movement, centered around raising visibility around the issues of racialized violence, is gaining momentum against anti-blackness Paschel 14 (Tianna, Assistant Professor of African American Studies, “The Making of a Grassroots Movement against Anti-black Racism” in Insurgency: The Black Matter(s) Issue Dept. of African American Studies | University of California, Berkeley http://www.thediasporablackmattersissue.com/ December 23, 2014 the recent waves of protest from Ferguson to Oakland to New York represent the emergence of a grassroots movement against anti-black racism, unprecedented in recent decades. Beyond the sheer size and number of protests, their locus has also been somewhat surprising given what we First, know about social movements. Rather than emerging from established civil rights organizations or black political elites that have long considered themselves the spokespersons of the black this movement has radiated out from the outraged and grieving families and communities of the black men killed by the police. In taking their struggle to the streets, these communities have targeted state institutions as well as ordinary Americans who have passively watched as black people experience racialized violence. What is most remarkable about the protests in Ferguson, in particular, is how collective pain and indignation itself has called so many people to the street, night after night, in the face of an increasingly militarized police force and largely outside of “respectable” black middle class institutions. Indeed, while in some cases, traditional civil rights institutions have helped to shine a spotlight on these community, injustices, their involvement has largely happened after mobilization was well underway. Moreover, amidst debates on the right as to whether these deaths were racially motivated at all, some traditional black leaders have tried to discipline protesters and emphasize personal responsibility as a potential remedy to the ills facing black communities. This was best captured in Al Sharpton’s eulogy at Mike Brown’s funeral, which spoke not only about racialized state violence, but the need for blacks to “clean up” their communities and embrace being successful. The family of Akai Gurley, another unarmed black man gunned down by the NYPD in a dark stairwell, refused to let Sharpton speak at his memorial service. In this sense, recent mobilization must The second root of such organizing both on the streets and on the internet is black youth-led social movement organizations and networks such as Black Lives Matter, We Charge Genocide and Black Youth Project 100 (BYP100), to name a few. All of them have emerged in recent years around the question of racialized police violence as well as other issues facing black people . In so doing, they have not only mobilized and raised visibility around these issues, but have also produced important written analyses of the situation. They have insisted that we understand these murders as systemic rather than episodic, as endemic rather than aberrations to an otherwise post-racial society and state apparatus. These organizations have also been emphatic about contextualizing these horrific events along a spectrum of state violence that black people, and particularly poor black people experience every day in the form of surveillance, hyper criminalization and mass incarceration.We Charge Genocide – a grassroots Chicago-based organization that emerged in the wake of the be understood as having its roots in spontaneous, grassroots action that has become increasingly coordinated. killing of Dominique “Damo” Franklin and that works to equip individuals and communities to “police” the police– took its name from a 1951 Petition with the same name. Originally submitted to the UN General Assembly submitted by the Civil Rights Congress, the petition documented 153 racial killings and was signed by W.E.B. Dubois and Paul Robeson, among many others. Its authors held that “the oppressed Negro citizens of the United States, segregated, discriminated against and long the target of violence, suffer from genocide as the result of the consistent, conscious, unified policies of every branch of government.” In a similar vein, the youth organizing with We Charge Genocide, along with the parents of Mike Brown made similar statements on state violence against black communities in front of the UN Committee on Torture in Geneva in November of this year. The parallels between these two moments of black resistance in both domestic and international space are many. These similarities caution us to resist the temptation to demarcate the current moment as constituting a new kind of racial violence.The third aspect of this movement that is important to underscore is that it is not a white movement. If you have participated in recent protests, or even seen footage of them, you have likely noticed that many of those organizing for racial justice and against anti-black racism are not black. In fact, a great deal of the images circulating in the newspapers in cities like New York and in the Bay Area show a great deal of white, likely middle class liberal whites marching and “dying in”. On the one hand, it is significant moment when whites chant “black lives matter”. This is especially the case when we consider that much of the racialized violence perpetuated against black people (though not all) has happened at the hands of white police officers who refuse to see black people as fully human. Having participated in some of the protests myself, I have to admit that watching black people being joined by other people of color and white people yell “black lives matter” gave me a little bit of renewed hope about the possibilities of breaking through the ideological force of “post-racial” America. On the other hand, the participation and visibility of white protestors has been highly problematic. Social Justice Blogger Tam highlighted this best in a recent post entitled “Dear White Protesters”: “As a Black person in this country, I am well aware that the streets belong to white people. I am not empowered or made more safe by hundreds of white people chanting that the streets belong to them. The street in Ferguson where Mike Brown was murdered and lay dead for 4.5 hours should have belonged to him, but it didn’t. He’s dead. He’s not coming back. That’s because the streets belong to white people.” Indeed, the impulse of many white protestors throughout the United States has not been to simply stand in solidarity with black communities and others affected directly by racialized state violence, but to appropriate that suffering, to “give voice” to black people, to be at the center of the movement.These tensions were accentuated in a recent protest organized by black students at the University of Chicago where students called on everyone to march, but only allowed black students to “die in”. This was a strategic decision that was an important one because it reaffirmed the fact that it is blackness itself that made Eric Garner and Mike Brown susceptible to what Achille Mbembe calls “necropolitics” or the “contemporary forms of Yet while it is important that black bodies remain at the center of this movement, it makes sense that we would not necessarily be there. Indeed, the same de-facto mandate of the subjugation of life to the power of death” that “profoundly reconfigure the relations among resistance, sacrifice, and terror”. police to serve and protect white people (and perhaps more importantly, white property) that led to the deaths of these black men is what makes whites so comfortable showing their outrage in public spaces, that affords them the privilege of feeling relatively safe while protesting, that prompts them to taunt police. As such, while broad-based cross-racial solidarity can certainly shape the sustainability and outcomes of this movement, there must also be a critical reflection among white protestors, as well as the movement more generally, about the ways in which whiteness is being articulated in it.Finally, it is important to note that while many protestors have made it clear that this is about black lives mattering, in much of the actual discourse and political practices, a concern for black men’s lives have eclipsed that of black people on the whole. This has led to a de-emphasis of the ways that racialized state violence affect black women. More importantly, the effective erasure of black girls and women from the popularized slogan “black lives matter” has also rendered invisible the stories of black women such as Tarika Wilson, Miriam Carey and Yvette Smith, all of whom were also brutally killed by the police. As a result, we have to ask ourselves why the stories of black men are the only ones Ultimately, we are experiencing a special moment in black resistance. While the dynamics of mobilization that have coalesced under #blacklivesmatter are still somewhat nascent, they arguably started with mobilization around the deaths of Oscar Grant and Trayvon Martin years before. Of course, the racial violence to which they speak has an even longer and deeper history. What one senses as people have taken to the streets is a cumulative and collective sense of pain and outrage over the continual disrespect of black life and suffering. The haunting expression “I can’t breathe” that Eric Garner whispered while being choked to death by the NYPD has had deep resonance with black people as a metaphor to our suffering. It expresses a collective awareness that behind the brutal killing of Mike Brown are hundreds of other black women and men that black people have yet to be guaranteed the basic rights to life and dignity. The media has disparagingly called some of the mobilization around Ferguson as riots. While I do not share this analysis entirely, it makes that compel people to march, why their names are the only ones that are remembered. sense that a people who feel like they can’t breathe might turn to riots, a strategy some scholars have aptly argued is the last weapon of the truly dispossessed. The Department of Homeland Security, is using ‘Fusion Centers’ in order to constantly monitor the BLM protesters. Daniel Rivero, Journalist Extraordinaire, 4/16/2015, "Counter-terrorism police might be tracking your #BlackLivesMatter tweets," Fusion, http://fusion.net/story/121695/counterterrorism-police-might-be-tracking-your-blacklivesmatter-tweets/ counter-terrorism officials have been called on to monitor Black Lives Matter The emails and other documents illustrate specific internal communications Reminder for Tonight and this week: Do Not Advise Protesters That We Are Following Them on Social Media,” We want to continue tracking the protesters as much as possible. If they believe we are tracking them, they will go silent,” Oakland police flagged a local church “situational awareness” tag for state authorities to potentially monitor Newly released emails show that protests in California. , released by the Bay Area’s East Bay Express, between the California Highway Patrol and its “Terrorism Liaison Officers.” “ read the subject line of an internal email obtained by the publication. “ the note read in part. Other emails show that counter-terrorism officials were at times embedded with protesters in Oakland. Another shows visit by Michael Brown Sr., father of the late Ferguson, Mo. teenager, with a . The obvious should be stated. If you publish something on social media that is publicly viewable, then people will view it and take it into account, including officers of the law. The assassination of two police officers in Brooklyn last December was announced over social media before it occurred, and authorities took notice. “If you see something on social media that is a threat against a police officer, call 911 immediately,” New York Mayor Bill de Blasio said after the incident. “We cannot take this lightly,” he said. Oakland protest in December, after a grand jury did not indict police for the death of Eric Garner in NYC. Photo: Getty Images Oakland protest in December, after a grand jury did not indict police for the death of Eric Garner in NYC. Photo: Getty Images But many things remain unclear about social media monitoring programs like the one in California. “We don’t know as much about the [California] program as we should,” Nadia Kayyali, an activist with the Electronic Frontier Foundation, told the East Bay Express. “We did not have any policies regarding its monitoring of social media they search for any and all ‘open source,’ or publicly available, information related our public safety assessments It’s the coordination [of the tracking] that’s disturbing,” Everything’s totally fusion center-oriented and the information is going very high up Fusion centers are real time “receipt, analysis, gathering, and sharing of threat-related information” hubs, whose stated purpose is to facilitate communication between local, state, and federal law don’t know what their standards are, their policies with respect to limits and privacy.” A California Highway Patrol official told the Express that it , but that “” .” The paper also with some of the activists it found counter-terrorism officials were tracking, like Twitter user @DomainAwareness, a digital privacy activist who asked not to be identified. “ the Twitter user said. “ .” enforcement agencies in the event of a major terrorist attack or catastrophic natural disaster, according to the Department of Homeland Security (DHS) . DHS grants fund the centers’ equipment and facilities, though operations are often left in control of local officials. Several of the emails released from East Bay Express originated inside of the Northern California Regional Intelligence Center, a fusion center which the paper says “connects police agencies from Monterey County to the Oregon border.” They’ve built this big network and they have tremendous resources, fusion centers to monitor Black Lives Matter protests “ ” commented @DomainAwareness about the use of the . Unfortunately, at least one alleged terrorist plot has been planned in the midst of the Black Lives Matter protests. In November, two members of the St. Louis chapter of the New Black Panthers were busted by the FBI when they allegedly bought pipe bombs from undercover agents, which they planned to use against “people, buildings, vehicles and property” during the unrest that was sweeping the region at the time. The duo was formally indicted for the alleged plot in early April. They have both pleaded not guilty. Three days after they were arrested, a grand jury made its announcement not to press charges against former Ferguson police officer Darren Wilson for the shooting death of Michael Brown. Riots and violence spread through St. Louis and the city of Ferguson after the announcement. Richard Callahan, the U.S. Attorney for the Eastern District of Missouri, said that the disruption of the plot “saved some lives” of both protesters and law enforcement. This unique form of surveillance against the BLM protesters, as well as similar political and social protests, creates a “chilling effect” that ceases all forms of resistance activism Bondgraha ’15 "Counter-Terrorism Officials Helped Track Black Lives Matter Protesters." East Bay Express. N.p., 15 Apr. 2015. Web. 22 June 2015. On December 9, 2014, at 4:48 p.m., an internal email with the subject line, "Reminder for Tonight and this week: Do Not Advise Protesters That We Are Following Them on Social Media," circulated among dozens of California Highway Patrol commanders. The message read: "A quick reminder ... as you know, our TLO [Terrorism Liaison Officers] officers are actively following multiple leads over social media." The note continued, "this morning, we found posts detailing protesters' interaction with individual officers last night. In the posts, protesters are stating that we (CHP) were claiming to follow them on social media. Please have your personnel refrain from such comments; we want to continue tracking the protesters as much as possible. If they In recent years, police agencies throughout the United States have scoured social media as part of criminal investigations. But the police are also watching social media to spy on political protesters, especially those they suspect will engage in acts of civil disobedience. During the recent Black Lives Matter protests, local and state police agents monitored protesters on social media and activist websites. Several hundred CHP emails obtained by the Express show that social media is now a key source of intel for the police when monitoring political protests.¶ But the emails raise serious questions, say civil libertarians and some of the activists whose posts were harvested as intel. How do police monitor social media? Do they store data or track particular people? Are agencies believe we are tracking them, they will go silent."¶ over-reacting and wasting resources? And why are counter-terrorism police involved?¶ The TLOs tasked by the CHP with monitoring Black Lives Matter protesters on social media are employed by different local agencies and serve as points of contact for matters regarding terrorism. The role was created after 9/11, and the officers communicate through networks coordinated by fusion centers, such as the Northern California Regional Intelligence Center, or NCRIC, which connects police agencies from Monterey County to the Oregon border. ¶ "We don't know as much about the TLO program as we should," said Nadia Kayyali, an activist with the Electronic Frontier Foundation. "We don't know what their standards are, their policies with respect to limits and privacy."¶ The Twitter user @domainawareness, whose tweets were collected by the police and used as intel, reviewed some of the CHP emails that we obtained. "It's the coordination that's disturbing," said @domainawareness, whom the Express has agreed to not identify. "Everything's totally fusion center-oriented and the information is going very high up."¶ An email sent on December 12 illustrates how counter-terrorism officials working out of fusion centers helped CHP monitor protesters. At 12:12 p.m. that day, Elijah Owen, a senior intelligence advisor with the California State Threat Assessment Center (Cal STAC) sent CHP officer Michael Berndl a copy of a protest flier calling for a speak-out and march against the CHP the next day. "Just so it's on your folks' radar," wrote Owen. Cal STAC officers appear in other CHP emails as sources of information, or recipients of intel gathered by the Oakland Police There are CHP officers in the center, but it's a task force environment. We assess threats. Transnational crime. Terrorism." Hopkins said Cal STAC is a fusion center like NCRIC, except that its main focus is assessing strategic threats to the state of California. Hopkins said he could not comment on any emails sent by his subordinate because he hasn't seen them.¶ "They've built this big network and they have tremendous resources," said @domainawareness about the involvement of fusion centers in monitoring the Black Lives Matter protests. "But they don't have enough to do, so they're using this to watch political protesters. It's mission creep."¶ Kayyali added: Department, Alameda County Sheriff's Office, and other agencies. ¶ "We are not the CHP," Matthew Hopkins the deputy commander of Cal STAC told me. " "There's this mystique around doing surveillance and intel-gathering, and they're not really thinking about the usefulness of what they're doing, and why they're doing it."¶ Another email circulated among CHP commanders on December 11 included a two-page brief on the department's undercover operations in Oakland and Berkeley in which at least four CHP officers were "[e]mbedded with protesters." According to "Up to this point, ISU TLO officers obtained intelligence on protesters through social media regarding dates, times, and locations of planned protests and of intentions to disrupt Bay Area freeways," explained the CHP brief.¶ The document includes screenshots of tweets, including three the brief, these were Terrorism Liaison Officers from CHP's Investigative Services Unit (ISU). ¶ from East Bay resident Noura Khouri who took part in the protests. Khouri had tweeted two days before, "Since were dreaming @thehoopoe how about the bay bridge shut down + port shut down + general strike #shutitdown <3." On December 9 Gareth Lacy, a press officer with Caltrans forwarded to CHP commanders a similar tweet composed by @reclaimuc which stated: "may 2, 1992: UC berkeley and berkeley high students occupy bay bridge after acquittal of cops who beat Rodney king." Records show that CHP interpreted social media postings like these as evidence that the Bay Bridge was going to be shut down by protesters.¶ Acting on this fear, on December 12, CHP Assistant Chief Paul Fontana wrote his commanders requesting special response teams from other divisions. "I would also like to request SWAT," wrote Fontana, referring to the heavily armed special weapons and tactics team.¶ In an interview, Khouri characterized the reaction of CHP to the protests as extreme and ironic. "These protests initially formed as a direct result of police abuses," said Khouri. "I personally have stopped using Facebook for my political expression because of my deep concern for privacy, and law enforcement using it as a tool of political ."¶ The CHP emails show that police were monitoring almost anything related to the Black Lives Matter movement. For example, Maria Dominguez helped organize a "Human Rights Day Vigil" with the nonprofit Ella Baker Center of Oakland on December 10 at the Alameda repression We're always cautious of not putting anything online that would raise interest of law enforcement." Dominguez was surprised when she got a phone call from the Alameda County Sheriff's Office.¶ "When organizers get a call, it is chilling," said County Administration Building. "I posted our event on Indybay," said Dominguez in an interview. " Dominguez. "The unsaid thing was, 'warning there's going to be a lot of police there, so if you're planning anything out of line, watch out.'" ¶ Other police agencies flagged Dominguez's event as a threat. In an email with the subject line "RE: Social Media Update," CHP Investigator Timothy Randall emailed half a dozen other officers on December 10, including CHP Chief Avery Browne, and included a screenshot of it's a virtual version of stop and frisk," said Dominguez. "My name is Maria Dominguez. I'm a Latina, and the Ella Baker Center, it's racialized — it's named after a Black woman."¶ Dominguez's event posting from Indybay. "Supposed to be just a 'vigil' but it is occurring in Oakland," wrote Randall. ¶ I asked Dominguez why law enforcement might single out her event. "Maybe The Oakland Police Department also monitored the Twitter accounts and Facebook postings of Black Lives Matter protesters in December. One "situational awareness" update that OPD sent to the CHP listed a candlelight vigil by Lake Merritt, a Berkeley City Council meeting, and a visit by Mike Brown, Sr. to a San Francisco church as events to monitor. ¶ I called Sergeant Randal Bandino, one of the OPD officers sharing these emails, to ask about how OPD monitors social media. Bandino said he personally isn't involved and can't speak to OPD's practices and policies. But he added, "It's nothing special. What we're looking at is what's open to the public."¶ Deputy Alameda County Sheriff David Darrin also said he couldn't speak about how his agency monitors social media, referring me instead to the sheriff's official spokesperson. Darrin is also an intelligence officer with the NCRIC fusion center. On December 7, Darrin shared Facebook events advertising upcoming marches "to protest the police riot in Berkeley" with his NCRIC colleague Nicholas Silva. Silva, a CHP officer, forwarded the information on to CHP investigators. ¶ CHP spokesperson Brandie Dressel wrote in an email to me that the CHP has no policies governing the monitoring of social media, but that officers "search for any and all 'open source,' or publicly available, information related our public safety assessments." According to Dressel, the CHP doesn't keep any of this data. As to why Terrorism Liaison Officers were leading the CHP's effort to monitor Black Lives Matter protesters, Dressel wrote, "CHP TLOs can at times be assigned to gather intelligence and provide logistical support for a reasonable and clearly articulated law enforcement purpose."¶ The emails obtained by the Express from CHP were originally part of a Public Records Act request made by San Francisco resident Michael Petrelis. Petrelis said he asked for the records because he was concerned about CHP's use of less-than-lethal weapons and armed undercover agents. Petrelis also said he is not surprised to see the extensive monitoring of social media by the police. "I come out of Act Up in NYC," said Petrelis. "The cops came to our meetings and they picked up all the lit. ¶ "My experience in organizing is that cops are watching you," he continued. " In the Tech Age, you have to always think the cops are reading this." Independently, the surveillance of this movement reinforces the social hierarchies present in the United States, and perpetuates gratuitous violence. Malkia Amala, Activist Extraordinaire, 3/30/2015, "Black America's State of Surveillance," No Publication, http://www.progressive.org/news/2015/03/188074/black-americas-statesurveillance Ten years ago my mother, a former Black Panther, died from complications of sickle cell anemia Weeks before she died, the FBI came knocking at our door, demanding that my mother testify in a secret trial proceeding against other former Panthers or face arrest. My mother, unable to walk, refused. The detectives told my mother as they left that they would be watching her My mother died just two weeks later Files obtained during a break-in at an FBI office in 1971 revealed that African Americans didn’t have to be perceived as dissident to warrant surveillance just had to be black the same philosophy use of surveillance technologies across the United States. black people and other people of color have lived for centuries with surveillance practices aimed at maintaining a racial hierarchy We need to understand that data has historically been overused to repress dissidence, monitor perceived criminality, and perpetually maintain an impoverished underclass , on Martin Luther King Jr.’s birthday, . . They didn’t get to do that. . My mother was not the only black person to come under the watchful eye of American law enforcement for perceived and actual dissidence. Nor is dissidence always a requirement for being subject to spying. , J. Edger Hoover’s largest target group, . They . As I write this, by local law enforcement agencies is driving the increasing adoption and Today, media reporting on government surveillance is laser-focused on the revelations by Edward Snowden that millions of Americans were being spied on by the NSA. Yet my mother’s visit from the FBI reminds me that, from the slave pass system to laws that deputized white civilians as enforcers of Jim Crow, . It’s time for journalists to tell a new story that does not start the clock when privileged classes learn they are targets of surveillance. . In an era of big data, the Internet has increased the speed and secrecy of data collection. Thanks to new surveillance technologies, law enforcement agencies are now able to collect massive amounts of indiscriminate data. Yet legal protections and policies have not caught up to this technological advance. Concerned advocates see mass Targeted surveillance is an obvious answer—it may be discriminatory, but it helps protect the privacy perceived as an earned privilege of the inherently innocent. The trouble is, targeted surveillance frequently includes the indiscriminate collection of the private data of people targeted by race but not involved in any crime we are watched, either as criminals or as consumers surveillance as the problem and protecting privacy as the goal. . For targeted communities, there is little to no expectation of privacy from government or corporate surveillance. Instead, . We do not expect policies to protect us. Instead, we’ve birthed a complex and coded culture—from jazz to spoken dialects—in order to navigate a world in which spying, from AT&T and Walmart to public benefits programs and beat cops on the block, is as much a part of our built environment as the streets covered in our blood. In a recent address, New York City Police Commissioner Bill Bratton made it clear: “2015 will be one of the most significant years in the history of this organization. It will be the year of technology, in which we literally will give to every member of this department technology that would’ve been unheard of even a few years ago.” Predictive policing, also known as “Total Information Awareness,” is described as using advanced technological to ols and data analysis to “preempt” crime. It utilizes trends, patterns, sequences, and affinities found in In a racially discriminatory criminal justice system, surveillance technologies reproduce injustice. data to make determinations about when and where crimes will occur. This model is deceptive, however, because it presumes data inputs to be neutral. They aren’t. Instead of reducing discrimination, predictive policing is a face of what author Michelle Alexander calls the “New Jim Crow”—a de facto system of separate and unequal application of laws, police practices, conviction rates, sentencing terms, and conditions of confinement that operate more as a system of social control by racial hierarchy than as crime prevention This approach to policing places an undue focus on quality of life crimes—like selling loose cigarettes, the kind of offense for which Eric Garner was choked to death predictive policing is just high-tech racial profiling—indiscriminate data collection that drives discriminatory policing practices or punishment. In New York City, the predictive policing approach in use is “Broken Windows.” . Without oversight, accountability, transparency, or rights, . As local law enforcement agencies increasingly adopt surveillance technologies, they use them in three primary ways: to listen in on specific conversations on and offline; to observe daily movements of individuals and groups; and to observe data trends. Police departments like Bratton’s aim to use sophisticated technologies to do all three. They will use technologies like license plate readers, which the Electronic Frontier Foundation found to be disproportionately used i n communities of color and communities in the process of being gentrified. They will use facial recognition, biometric scanning software, which the FBI has now rolled out as a national system, to be adopted by local police departments for any criminal justice purpose. They intend to use body and dashboard cameras, which have been touted as an effective step toward accountability based on the results of one study, yet storage and archiving procedures, among many other issues, remain unclear. They will use Stingray cellphone interceptors. According to the ACLU, Stingray technology is an invasive cellphone surveillance device that mimics cellphone towers and sends out signals to trick cellphones in the area into transmitting their locations and identifying information. When used to track a suspect’s cellphone, they also gather information about the phones of countless bystanders who happen to be nearby. The same is true of domestic drones, which are in increasing use by U.S. law enforcement to conduct routine aerial surveillance. While drones are currently unarmed, drone manufacturers are considering arming these remote-controlled aircraft with weapons like rubber bullets, tasers, and tear They will use fusion centers arm of the intelligence community gas. . Originally designed to increase interagency collaboration for the purposes of counterterrorism, these have instead become the local . According to Electronic Frontier Foundation, there are currently seventy-eight on record. They are the clearinghouse for increasingly used “suspicious activity reports”— These reports and other collected data are often stored in massive databases like e-Verify and Prism Just as stop and frisk legitimized an initial, unwarranted contact between police and people of color, almost 90 percent of whom turn out to be innocent of any crime fusion centers target communities of color This is the future of policing in America, and it should terrify you as much as it terrifies me the most terrifying aspects of high-tech surveillance is the invisibility of those it disproportionately impacts described as “official documentation of observed behavior reasonably indicative of pre-operational planning related to terrorism or other criminal activity.” . As anybody who’s ever dealt with gang databases knows, it’s almost impossible to get off a federal or state database, even when the data collected is incorrect or no longer true. Predictive policing doesn’t just lead to racial and religious profiling—it relies on it. , suspicious activities reporting and the dragnet approach of . One review of such reports collected in Los Angeles shows approximately 75 percent were of people of color. . Unfortunately, it probably doesn’t, because my life is at far greater risk than the lives of white Americans, especially those reporting on the issue in the media or advocating in the halls of power. One of . The NSA and FBI have engaged local law enforcement agencies and electronic surveillance technologies to spy on Muslims living in the United States. According to FBI training materials uncovered by Wired in 2011, the bureau taught agents to treat “mainstream” Muslims as supporters of terrorism, to view charitable donations by Muslims as “a funding mechanism for combat,” and to view Islam itself as a “Death Star” that must be destroyed if terrorism is to be contained. From New York City to Chicago and beyond, local law enforcement agencies have expanded unlawful and covert racial and religious profiling against Muslims not suspected of any crime. There is no national security reason to profile all Muslims. At the same time, almost 450,000 migrants are in detention facilities throughout the United States, including survivors of torture, asylum seekers, families with small children, and the elderly. Undocumented migrant communities enjoy few legal protections, and are therefore subject to brutal policing practices, including illegal surveillance practices. According to the Sentencing Project, of the more than 2 million people incarcerated in the United States, more than 60 percent are racial and ethnic minorities. But by far, the widest net is cast over black communities. Black people alone represent 40 percent of those incarcerated. More black men are incarcerated than were held in slavery in 1850, on the eve of the Civil War. Lest some misinterpret that statistic as evidence of greater criminality, a 2012 study confirms that black defendants are at least 30 percent more likely to be imprisoned than whites for the same crime. This is not a broken system, it is a system working perfectly as intended, to the detriment of all. The NSA could not have spied on millions of cellphones if it were not already spying on black people, Muslims, and migrants. As surveillance technologies are increasingly adopted and integrated by law enforcement agencies today, racial disparities are being made invisible by a media environment that has failed to tell the story of surveillance in the context of structural racism. Reporters love to tell the technology story. For some, it’s a sexier read. To me, freedom from repression and racism is far sexier than the newest gadget used to reinforce racial hierarchy. As civil rights protections catch up with the technological terrain, reporting needs to catch up, too. Many journalists still focus their reporting on the technological trends and not the racial hierarchies that these trends are enforcing. Martin Luther King Jr. once said, “Everything we see is a shadow cast by that which we do not see.” Journalists have an obligation to tell the stories that are hidden from view. We are living in an incredible time, when migrant activists have blocked deportation buses, and a movement for black lives has emerged, and when women, queer, and trans experiences have been placed right at the center. The decentralized power of the Internet makes that possible. But the Internet also makes possible the high-tech We can help black lives matter by ensuring that technology is not used to cement a racial hierarchy that leaves too many people like me dead or in jail Our communities need partners, not gatekeepers. Together, we can change the cultural terrain that makes killing black people routine We can change the story on surveillance to raise the voices of those who have been left out surveillance that threatens to drive structural racism in the twenty-first century. . . We can counter inequality by ensuring that both the technology and the police departments that use it are democratized. . There are no voiceless people, only those that ain’t been heard yet. Let’s birth a new norm in which the technological tools of the twenty-first century create equity and justice for all—so all bodies enjoy full and equal protection, and the Jim Crow surveillance state exists no more. The status quo movement is shifting towards #AllLivesMatter and away from #BlackLivesMatter – This is an imposition of post-racial politics that acts as an erasure of racial violence and hollows out the movement – only a recentering #BlackLivesMatter in the campaign is key to prevent this shift Arielle Newton, Editor-in-Chief December 1, 2014 WHAT YOU MEAN BY #ALLLIVESMATTER http://blackmillennials.com/2014/12/01/what-you-mean-by-alllivesmatter/ the most infuriating adaptation is #AllLivesMatter, a whitewashed faux sentiment that coopts the crux of this growing racial justice movement. I’d imagine that when people tweet and post using #AllLivesMatter, they’re trying to project an understanding that everyone should be treated with decency and respect.¶ #AllLivesMatter is a capture of colorblindness that goes against the purpose of #BlackLivesMatter. As Black Americans in the racial justice struggle and promoters of the roots embedded in #BlackLivesMatter, we already know and agree that all lives matter. But we also know that injustices stemming from police brutality and the conglomerate criminal justice system, does not marginalize against all lives … but Black lives, almost exclusively.¶ Every 28 hours, a Black person is killed by police or vigilantes. Black people are trapped in prisons at Perhaps alarming rates. Black people are less likely to graduate from college, but are more likely to graduate with over $25,000 in student loan debt. Black people are more likely to suffer from HIV, diabetes, and other serious health issues. The socioeconomic ills are widespread and numerous in the Black community.¶ And despite the hardships that we face, we recognize that our ills are not happenstance or coincidence. They’re the product of elaborate designs instituted by white supremacy and patriarchy. Our hardships stem When we say #BlackLivesMatter, we are speaking about the unique hardships that the Black community faces. We are speaking directly about a heritage that remains intact despite racist violence directed at us. To say #AllLivesMatter is an affront to Black heritage, people, and culture and does nothing but take away from the potent truth that the Black existence deserves ample recognition.¶ Arthur ChuYes, all lives matter in ideology. But all lives don’t matter in practice. Should society and history tell us, Black from institutional racism—the policies and practices that purposely disadvantage Black communities.¶ lives don’t matter. When the murder of an unarmed teenager goes unpunished, and is further justified, all lives don’t matter. When a white man shoots up a movie theater, kills #AllLivesMatter is a cheap attempt to neutralize the fact that certain injustices and brutality are experienced by those with darkened skin. Please do not reshape the 12 people, terrorizes a nation, and is still alive … all lives don’t matter.¶ narrative in attempt to remain colorblind. Now is the Key time – mobilization of the movement is key to counter media reframing of the #BlackLivesMatter Movement William Lynch Vice President, New Business Initiatives LLC : 01/08/2015 Stop Slandering 'Black Lives Matter' http://www.huffingtonpost.com/-william-lynch-iii/stop-slandering-black-livesmatter_b_6437730.html On December 20, New York City suffered an incredible tragedy: Depraved, cowardly madman Ismaaiyl Brinsley murdered NYPD officers Rafael Ramos and Wenjian Liu. There is not a scintilla of justification for Brinsley's actions, and it shall always be a sad chapter of our city's history. ¶ However, what has concerned me and many others is that some folks are attempting to coopt this tragedy to slander the Black Lives Matter movement and quash any attempt at reforms or accountability. Patrolmen's Benevolent Association president Patrick Lynch (no relation to me) was quick to blame seemingly all critics of law enforcement when he declared, "There's blood on many hands tonight." He then called for an end to the Black Lives Matter movement when he said, "It must not go on, it cannot be tolerated." Fraternal Order of Police national president Chuck Canterbury gave a similar response, imploring us to end criticism of law enforcement officers and regard their work as performed perfectly: "Enough is enough. There's nothing wrong with the ¶ way cops do their jobs that won't be fixed when politicians suck it up and attack the problems that breed poverty and crime." (Granted, I give him props for that last part.)¶ The editorial board at the New York Post also came down hard on demonstrators and critics of law enforcement in reaction to the two murdered officers:¶ Clearly, the protesters -- egged on by politicians and professional activists -- have engaged in a warped campaign to fuel anger at cops. Even before Saturday's slaying of these officers, some protesters had become violent and attacked cops. ¶ "What do we want? Dead cops! When do we want it? For weeks, our elites have validated the "anger" of the protesters who have been taking over streets, bridges and tunnels. However, the Black Lives Matter movement has always been overwhelmingly committed to nonviolence. This started back in August at Now!" some chanted last week.¶ Now they've got their wish.¶ Less than two days later the editorial board was at it again: ¶ ¶ the time of the "We Will Not Go Back" march, which I helped organize with my friend Al Sharpton, along with several labor unions. In the days leading to the march, Sharpton penned a blog post on The Huffington Post expressing his support for police and for nonviolence: ¶ The moment we lose our pledge to a non-violent movement, we become part of what we claim to be fighting. Do not allow this to happen; we must remain dedicated to a higher moral commitment. ... As I have often stated, not all police officers are bad. In fact, I believe most of them truly are doing their best to protect people and reduce crime. ¶ The reverend reiterated this at the August rally:¶ We are not here to cause violence. ... We are not against police. Most police do their job. But those that break the law must be held accountable. ... We are for police.¶ This was not simply empty rhetoric: There was not a single arrest at the August march. ¶ Nor were there any incidents at last month's Harlem vigil, whose scope was expanded to also be a vigil for the murdered cops. At the event, participants politely obliged with the requests of NYPD officers, who reciprocated with thank-yous. During the vigil event, one speaker proclaimed, "We're not anti-police; we're anti-police-brutality. Every cop isn't bad." And, for those of you who gripe that black folks ignore the issue of crime among ourselves, during the service following the vigil, Eric Garner's nephew gave a speech declaring, "I truly believe that when anybody gets murdered, by a police officer or by one of our kind, we should take the the news media has been hard at work tracking down the handful of protesters and others who did or even wrote something violent in order to stereotype the entire Black Lives Matter movement as violent. And when there isn't something, the news media has resorted to doctoring footage to make it look like a protester is calling for killing police when she was actually protesting peacefully. The Post has been at the forefront of same stance."¶ Nevertheless, ¶ this tactic. For example, a columnist wrote an op-ed entitled, "Thought those anti-cop [sic] protesters were peaceful? Think again." He goes on to cite a single violent incident in which Eric Linsker attempted to throw a garbage can and then attacked two cops trying to arrest him, while a few other protesters intervened physically.¶ I do not condone this action, but nevertheless this columnist apparently could only find one incident involving violence. And the Post's own video of the incident shows, by my count, seven or eight people being physical, where the physicality is mostly tugging at the officers trying to detain one person. Moreover, Linsker's attorney later described the attempted throwing of this single incident was enough for the Post to typify the entire demonstration as violent by using the headline "Poet accused of assaulting cops during 'peaceful' protest," as opposed to something more accurate like "Poet accused of assaulting cops during otherwise the garbage can as being that he picked up a garbage can, then put it down at the behest of police. ¶ However, peaceful protest."¶ The same columnist also pointed to video of a few dozen protesters calling for dead cops, albeit while engaging in a nonviolent march. A quick glance of the video shows a few dozen people, maybe 40 tops, which he somehow estimates it to be "hundreds if not thousands." ¶ Based on this evidence, the columnist declares, "Let's make believe that only an itsy-bitsy handful of those anti-police protesters disrupting the city are hell-bent on mayhem." That statement is quite ironic because, although I was never that good at math, by my calculations about 50 people out of thousands actually is an itsy-bitsy handful.¶ And when editorial boards and Patrick Lynch are lambasting critics of law enforcement, they may want to take note of the number of conservative commentators who denounced the grand jury decision in the Eric Garner case. This includes FOX News commentators Charles Krauthammer and Andrew Napolitano, who respectively called the decision not to indict as "totally incomprehensible" and "a grievous wrong." That might have made for some awkward moments at the holiday party of the News Corporation, which owns the Post and FOX News, if anyone at the paper's editorial board bumped into Krauthammer or Napolitano, considering that the board implied their co-workers are among the "elites" who "validated the 'anger' of the protesters" and But you know what? Let's do an intellectual exercise and take as fact that the Black Lives Matter movement is violent based on the Post's standards. Now, let's apply that logic consistently. How about sports fans who loot and riot after games, whether their team wins or loses? Last year, fans at helped incite Ramos' and Liu's murders.¶ the University of Arizona rioted and attacked police after their basketball team lost in the March Madness tournament. This past October, fans at West Virginia University "celebrated" their football team's upset victory over Baylor by setting fires and damaging property. Even worse, one person was actually killed in a soccer riot in Spain last November, as reported by the Post.¶ But did the paper accompany the article with an op-ed entitled, "Thought sports fans were peaceful? Think again"? Have there been calls for all sporting events to be held in empty arenas? Or that no one should ever again peacefully celebrate or lament the outcome of a sporting event? The next time a New York Let's also apply this logic to typify law enforcement officers based on the actions of a few. New York Magazine compiled a list of comments in response to sports franchise wins a championship (God willing), will the Post publish an editorial saying we not have a victory parade? ¶ Garner's murder. These comments were posted on the police message boards Thee RANT and PoliceOne. Both message boards require users to provide documentation in order to be verified as police officers before they can post.¶ Here are some of the lowlights of message board postings by verified law enforcement officers in response to Garner's homicide. All spelling and grammatical mistakes in the original:¶ Tough shit and too damn bad.¶ I guess it's the best thing for his tribe. He probably never worked a legit job. They city will pay off the family and they will be in Nigggaaa heaven for the rest of their lives!!¶ If the fat fuk just put his hands behind his back none of this would have escalated into what it did.¶ The cities of America are held hostage by the strong-arm tactics of the savages¶ After the grand jury decided not to indict Officer Pantaleo, forum users expressed similar sentiments:¶ I WILL DO EVERYTHING IN MY POWER TO KEEP MY 2 SONS FROM EVER, EVER BEING LEOS [law enforcement officers]...I will not let my sons be sacraficed for ungrateful, spoiled, hateful animals.¶ Thank the good Lord it happened in the Isle of Staten where there are still some working class white folks. ¶ F u c k Black America, their equal or worse than whites, when speaking of Racism... ¶ F u c k Diversity, it's not working and never will work...Diversity only accomplishes one thing, Lazy, Dumb idiots who don't care about any Position they attain, You Listening Mr. President ?¶ And this, ahem, insensitivity is not limited to message boards. There was also this police charity event in California last month, hosted by retired LAPD officer Joe Myers, with an estimated 25 to 30 LAPD officers in attendance. The event included a performance by former federal investigator Gary Fishell, who mocked Michael Brown's death with a song parody of "Bad, Bad Leroy Brown" where "Michael" replaced "Leroy." Reportedly no one at the event voiced any objection to the song, whose lyrics included the following:¶ And Michael looked like some old Swiss cheese¶ His brain was splattered on the floor¶ And he's dead, dead Michael Brown¶ Deadest man in the whole damn town¶ So is all of this conclusive evidence that all law enforcement officers are racist? Of course not. Because this all adds up to a handful of disparate anecdotes from a minute fraction of police. And that's exactly my point: Do not characterize any broad cross-section of people -- be it cops, protesters, or anyone else -- based on cherry picking what a few of them do or say.¶ You know what? I'll hold my nose and empathize with the Post a little bit. I hope their editors and columnists are slandering the Black Lives Matter movement because somewhere deep, deep down inside they think it's for a good end, misguided though it may be. But we cannot and will not allow any smears to quash the movement to end excessive force by a small percentage of law enforcement officers. This is a critical juncture, one where folks are more vocal than ever before about criminal justice reform, and the horrific murders of two NYPD officers must not be a strawman for ending any type of reform. We've gained too much momentum to let that happen. Heck, I'll even concede that Patrick Lynch's job is to advocate for his membership, not to be polite or strive for accuracy. ¶ Without the success of the BLM movement, the anti-black violence prevalent in society makes reconciliation impossible – we must act as soon as possible. Brady 12 [Nicholas Brady, activist scholar, executive board member of Leaders of a Beautiful Struggle, BA in philosophy from Johns Hopkins, PhD student at the University of California-Irvine Culture and Theory program, 10-26-12, “The Flesh Grinder: Prosecutorial Discretion and the Terror of Mass Incarceration,” http://academia.edu/2776507/The_Flesh_Grinder_Prosecutorial_Discretion_and_the_Quotidia n_Terror_of_Mass_Incarceration] The recent murder of Trayvon Martin brought the national conversation back to a topic that had been repressed for the myth of a post-racial America propagated since the election of Barack Obama to the presidency: the fundamental openness of the black body to wanton and excessive abuse and “premature death” (Gilmore, 28). That the national narrative around Martin’s death, even the narratives built by black political and civil leaders, only had Emit Till to compare his death to is example par excellance of the complete lack of any language we have to discuss the machinations that make a phrase such as “black death” into a redundancy. Trayvon Martin was not a singular case but was one of 120 black people killed extra-judicially (by police officers, security officials, and vigilante justice-seekers) in 2012 between January and July . That every 36 hours on average a black life is taken extra-judicially means that Trayvon Martin is not exceptional, but we do not have a language to deal with either the exceptional or the quotidian. Into the abyss, though the demand for justice, something productive happened: the rallying cry for justice made an invisible and ethereal part of the justice system into something a little more material. The call to arrest and charge George Zimmerman brought our attention to the role of the Prosecutor in the criminal punishment system. After the protests, statement from the President, and daily media blitzes, a special prosecutor was assigned to the case to meet the calls for justice. Angela Corey would become the face for an area of the law that is both ubiquitous and unthought. It seems she understood this for her statement, before officially giving the charge, set up a context for evaluating prosecutors, ¶ The Supreme Court has defined our role as Proscutors [as] not only “ministers of justice” but “seekers of the truth.”… Every single day our prosecutors across this great country handle difficult cases and they adhere to that same standard: a never ending search for the truth and a quest to always do the right thing for the right reason. There is a reason cases are tried in a court of law and not in the court of public opinion or the media. Because details have to come out in excruciating and minute fashion. Detail by detail, bit of evidence by bit of evidence. And it is only then, when the Trier of fact whether judge or jury, gets all the details that then a decision can be rendered. ¶ Corey is laboring to legitimize a system that took weeks to actually arrest George Zimmerman, yet this labor represses Marissa Alexander. Alexander is a mother who was convicted of attempted murder because she shot a warning shot at the father of her children who has admitted to beating her on several occasions before. Alexander was arrested on spot and charged within days in a case where the “stand your ground” defense was also being called upon. This supposed her own case history, for example the case of contradiction of methods that meet different bodies is the norm of the criminal punishment system, and this paper will attempt to string out some parts of the structure that make it so. ¶ In many disciplines there has been renewed attention given to mass incarceration. Yet, in spite of the growing level of multidisciplinary scrutiny on police surveillance and violent gulags, a major actor has slipped through virtually untouched in the humanities' attention to prisons. This major actor, regularly described in criminology and legal scholarship as the most powerful agent in the criminal punishment system, is the Prosecutor. The office of the prosecutor exists in a place where matter doesn't the prosecutor’s agency is assembled where black matter no longer matters and where what matters, the happenings of the human and the quest for civil justice, can only be produced through the quotidian grinding and destruction of black flesh.¶ This paper will seek to shine a light, or matter. Or put differently, better yet a shadow, on the white knights of the justice system. While one would think they know the job of a Prosecutor given its ubiquity on television crime dramas and movies, the mundaneness of their actual day-to-day activities are mystified by television's fascination with the drama of the trial, whether fictional or "real." In fact, it is rare that you will find a prosecutor who takes even 10 percent of their cases to trial. Over 90 percent of cases are settled through a plea bargain where the defendant will agree to plead guilty usually for the guarantee of less time, parole, or a lighter charge. As one law professor put it, the plea bargain is not an addendum to the criminal justice system, it is the criminal justice system (Scott and Stuntz, 1912). In spite of its centrality, there is little literature on the inner-workings of the plea bargain outside of schematic analysis in criminology. Instead of focusing on the theatrics of the trial, this paper will analyze the day-to-day grind of the plea bargain in order to explicate the quotidian terror that lies at the heart of prosecutorial discretion. ¶ From day-to-day a Prosecutor can be working on anywhere between 20 to 100 cases at a time (Heumann, 98). While a Prosecutor is given wide discretion to charge a case the way they want, there are hierarchies that determine the norms and procedures of each office. There are the district attorneys that the general population votes into office and the deputy attorneys that answer directly to him or her. Underneath them are the line prosecutors who work on the majority of the cases but whose decisions generally follow the established protocols of the veteran prosecutors and deputies. New prosecutors often come straight from law school with lofty dreams of becoming courtroom heroes only to learn that their job is much more akin to assembly-line justice. Legal scholar Abraham Blumberg describes this as the, “emergence of ‘bureaucratic due process,’… consist[ing] of secret bargaining sessions [and] employing subtle, bureaucratically ordained modes of coercion and influence to dispose of large case loads” (Blumberg, 69). ¶ While each office is different from the next, there is a stunning amount of unity at the procedural level. Deputy district attorneys will reject thirty to forty percent of cases the police send to them on face. The remaining 60 percent are considered suspects that are, according to the evidence provided, conclusively guilty. For the Prosecutor, these cases would be slam-dunk wins in front of a jury (Lewis, 51). This begs the question: What is the dividing line between cases that are charged and cases In terms of drug crimes, according to a comprehensive report by Human Rights Watch, blacks are 14 percent of drug users, but are 37 percent of people arrested for drug possession, and are anywhere between 45 to 60 percent of those charged . These strings of numbers reveal an anti-black trajectory: the cases that the Prosecutor overwhelmingly pursues are black cases, the ones he drops are overwhelmingly non-black. A defense attorney called these for-sure-guilty cases “born dead.” This is a curious phrase, but when considering the historic connection between blackness and crime dating back to the inception of the national polity through slavery, the defense attorney’s phrasing gets us to a much more paradigmatic argument. Walt Lewis, a Los Angeles prosecutor, describes a “criminal justice” continuum where bodies are transformed from being “free” to being “incarcerated” (Lewis, 20). One is first arrested by the police and becomes a “suspect.” If the prosecutor decides to charge, then you go from being a “suspect” to a “defendant.” Finally if you are found guilty, you go from being a “defendant” to a “convict.” This process describes a temporality that transforms the “human” into the incarcerated “inhuman.” As violent as this process can be, the black’s fate is fundamentally different and more terrifying. The black is arrested, charged, and convicted at disproportionate rates because we were never actually “suspects” or “defendants.” Instead, we were always criminals, always already slaves-in-waiting. Instead of a continuum, the black body floats in a “zone of non-being” where time and transformation lose all meaning. Cases involving black bodies do not need to be rock-solid in that get dropped by Prosecutors? ¶ Some statistics on the racial component of sentencing might lead us to an answer. terms of facts for their bodies have already been marked by the law as criminal (Fanon, 2). Thus cases involving black bodies are always for-sure victories, are always already “born dead.” ¶ In an interesting case that made it all the way to the Supreme Court titled United States versus Armstrong, a group of black defendants levied a critique similar to this paper’s argument . A group of black men were brought on charges of possessing 50 grams of crack cocaine. Unlike a normal defense where the details of the state’s accusation would be called into question, the defense instead argued that the prosecution selectively charges black people in cases involving crack cocaine. The first argument of the defense was that the majority of crack cocaine users in California are actually whites, not black people. The second argument of the defense used testimonies from government lawyers to prove that of all 841 cases the state brought against people possessing crack cocaine, all of them were black. Using these two claims, the defense said there was adequate proof to show that prosecutors were using unconstitutional means, racial markers, to select who would be charged and who wouldn’t be charged. According to past rulings by the Supreme Court, if selective prosecution can be proven then that is adequate grounds to vacate the sentence, even if the defendants were caught “red-handed.” Against this defense, the prosecution counter-argued that it does not selectively prosecute based on race, but instead on fact and circumstance. The district court that initially heard the appeal ruled that the state should turn over records of the 841 cases in question to prove who was right in the dispute. The state refused to reveal its documents and instead appealed the the Supreme Court ruled in favor of the prosecution for a few reasons. The first reason Rehnquist gave was that it is not in the best interest of the government’s war on crime to monitor prosecutors. Rehnquist argued that the prosecutor must have the freedom to operate in the way she sees fit. The second and most important reason Rehnquist gave was by far the most explicitly racist and I will quote it in full: quote “a published 1989 Drug Enforcement Administration report concluded that "[l]arge scale, interstate trafficking networks controlled by Jamaicans, Haitians and Black street gangs dominate the manufacture and distribution of crack.… [and] the most recent statistics of the United States Sentencing Commission… show that: More than 90% of the persons sentenced in 1994 for crack cocaine trafficking were black.” . The Supreme Court answered the defendant’s accusation of selective prosecution by arguing that such a prosecution strategy is legitimate because it can be verified through statistics that black people are the major users and distributors of crack cocaine. To word it differently, the Supreme Court ruled that it was in the state’s interest to terrorize black communities because we are the most heinous drug users in the country. To be black is to be marked as a danger that must be controlled, seized, and incarcerated. Prosecutors act within and perpetuate this matrix of violence that precedes discourse. When a Prosecutor sees a case with a black body, he knows the same statistic the Supreme Court quoted and he knows, if not consciously then unconsciously, that this case is already done, already guilty, already “born dead.” decision all the way up to the Supreme Court. Overturning the district and federal circuit court, The Success of the Movement is key because it represents an opportunity to reshape the way individuals understand racial dynamics in the status quo – instead of viewing violence against minority populations as isolated moments, the plans empathetic politics would help create an understanding of how these moments are part of a larger narrative of prejudice in the United States Strabuk 14 (Alexa, Media analyst from The Student Life Pomona Opinions Editorial Board and Opinions Editor, 12-5-14, “Responding to Misleading Media Narratives in the Wake of Ferguson, Staten Island”, http://tsl.pomona.edu/articles/2014/12/5/opinions/5845-responding-tomisleading-media-narratives-in-the-wake-of-ferguson-staten-island) Last week, a Missouri grand jury voted not to indict police officer Darren Wilson for the killing of Michael Brown. This week, a grand jury in New York voted not to indict police officer Daniel Pantaleo for the killing of Eric Garner. None of these incidents was an isolated event. The deaths of these men and the decisions not to indict their killers are a manifestation of systemic social problems in the United States. In Claremont, students organized a march as a sign of solidarity with the Ferguson community and as a call to action against the broader problem of institutionalized racism in the United States, as Jazmin Ocampo reports (See News, page 1). We applaud those students for acting on their beliefs: for not remaining in silence, or limiting dissent to Tweets and Facebook posts. While social media does provide a venue for raising awareness, we believe that change will require much more effort. As part of that effort, we should all do what we can to keep educating ourselves about what happened and is happening in Ferguson and in New York and the reality of institutionalized racism in the United States. Self-education has not been made easier by unprofessional media coverage of Ferguson. One of the most common trends in major news organizations' coverage of this issue has been the overemphasis on incidents of violence and theft and the downplaying of peaceful protests. At best, we consider this coverage to be underinformed; at worst, it is irresponsible and dangerously misleading. As student journalists, we believe in the value of thorough and objective reporting. But navigating the modern deluge of hastily written and re-reported news can be daunting. For those seeking quality reporting on the events in Ferguson, or on national issues like structural racism and police militarization, we encourage you to look beyond the dominant headlines and seek out diligent, on-the-ground reporting. We also recommend turning to organizations that emphasize the perspectives and experiences of people of color because too many news organizations are overwhelmingly white. As the attention span of the national media wanes—and it is already waning—find the authors, the publications and the websites that give context to these momentary events. Whatever articles you read, question them. Attune yourself to sensational buzzwords, hasty generalizations and simple narratives. These are complex issues that deserve complex treatment, and we must use our capacity for understanding to its fullest, especially when the narratives involved have too often been silenced or ignored. Beyond education, we hope that students continue to take action within this community, and we challenge others to aid in tackling the problems that pervade our nation. And we hope that those who have been moved by these events will not allow time or diminishing media focus to obscure the ways that national problems become individual tragedies. There are many lessons to be learned from the deaths of Michael Brown and Eric Garner. Only through perseverance—in observation, in education and in action—will we truly learn. That’s necessary to create a paradigmatic shift in the ways that the education system approaches understandings of race relations in the United States Chandler and McKnight 9 (Prentice Chandler – Ph.D from the University of Alabama, Assistant Professor of Social Studies Education and Critical Race Theory, and Douglas McKnight - Ph.D. Louisiana State University, professor of Educational Leadership, Policy and Technology Studies and Social and Cultural Studies, “The Failure of Social Education in the United States: A Critique of Teaching the National Story from "White" Colourblind Eyes,” Journal for Critical Education Policy Studies, v7 n2 p217248 Nov 2009) studies, given its disciplinary inclusive nature, has from its inception as an academic field in the late 1800s, the potential to become a critical tool to explain how attitudes and beliefs about race have often led to anti-democratic exercises, such as the marginalization and oppression of non-whites within the US (Bell, 2004; Ladson-Billings, 2003; Nelson & Pang, 2001; Parker, 2001; Santora, 2001). To view the field in such a way precludes teachers, especially white teachers, from hiding behind the belief that they are but telling a neutral, factual story of historical events. This ―neutral‖ narrative actually privileges a The social monocultural perspective (Geher, 1993) that makes itself visible (i.e. Anglo-European culture) and all other perspectives invisible or visible only on the periphery as a warning to These peripheral forms of existence that counter the dominant white culture are considered a threat against true ―Americans‖ (white, conservative, patriarchal, heterosexual, etc) and are to be ―warred against, as evident in US cable television shows such as O’Reilly Factor and Hannity (both on Fox News Channel) and both of which have large audiences.¶ Within the institution of schooling and in the academic research, social studies has historically tended to ignore the theme of race in relation to the national narrative, specifically glossing over how some members of society not part of the Anglo-European, middle class, protestant temperament (Greven, 1977) have been silenced or relegated to victim status in the telling of the story. An effect is that races other than white (i.e. African-Americans, Native Americans) are depicted as groups acted upon by the forces and personalities of history rather than as actors within history. Simply, the ―white male‖ character is preserved as the main protagonist of the national story, which is presented within the curriculum and in textbooks as a chronological, linear story of great moral, political, technological, economic and even spiritual progress.¶ However, an analysis of the social studies field has exhibited a dearth of research into how race the dominant culture. permeates how the national story is told in the curriculum and classroom (Chandler, 2007). In effect, mainstream social studies research perceives race in terms of a series of cause and effect events rather than as a persistent subtext of the whole narrative that has to a large degree defined US society and perpetuated a condition of being white as a Social studies as a discipline tends to approach race in US history as a problem dealt with and solved during the past, such as the Civil War (white man as the ―great liberator‖) and again in the Civil Rights era (with the curriculum privileging the peaceful, or sanitized, version of the African-American voice, such as civil rights leader Martin Luther King, instead of the more threatening voice of Malcolm X). After each event, race disappears within the textual landscape of the ―American‖ story and so from the minds of students, making social studies a ―poor resource for enabling students to develop a discourse of contemporary race and form of property that provides special privileges (Harris, 1993; McIntosh, 1990; Solomon, Portelli, Daniel, & Campbell, 2005). ethnic relations that addresses institutional racism, structural inequality, and power‖ (Wills, 2001, p. 43). In constructing the social studies and the story of the US in this way, the interactions between groups of people are hidden in plain sight, removed from the narrative and from analysis (Wills, 2001).¶ In an effort to address these issues, this article will explore the lack of research on the issue of race in social important studies research and textbooks in relation to the US. We do not attempt to draw conclusions beyond the US because of our focus on national narratives and how those narratives play out in a racialized context, hence, precluding any claims beyond that particular context. We will interrogate the possible reasons why race, which should be an emphasized area of US social studies research and curriculum in both schools and in teacher preparation, is subsumed within a colour-blind framework rather than from a critical race theory (Harris, 1993) or critical multiculturalism (McCarthy, 1994) perspective that interrogates the racial component in ¶ Since its inception as a formal field of Social studies, in the broadest sense, is the preparation of young people so that they posses the knowledge, skills, and values necessary for active participation in society‖ (Ross, 2001, p. 21).¶ This preparation involves the creation of narratives within social studies that carry certain moral goals of directing students to a model of what their relationship to the greater society should look like (Morrissett, 1981). As Geher identifies: ―The success of the monocultural ideal was closely tied to the emerging role of the United States as a hegemonic power. This is expressed ideologically in the common pronouncement that the United States unified the West, completed the course of Western study, the expressed goal of the social studies has been that of citizenship education (Shaver, 1981). ― development, and set global standards of civilization in fierce rivalry with the Soviet Union‖ (1993, p. 509). In essence, the national narrative has always embodied some form of progress toward some great end or perfection. The archetype of US exceptionality brings forth the following ideas social studies teachers‘ pedagogy: (1) God is on our side, (2) civilization has been created from the wilderness, (3) Europeans have created order where disorder existed before, and (4) hard work, merit, and virtuous character pay off (Loewen, 1995). ―For these unexcelled blessings, the pupil is urged to follow in the footsteps of his forbears, to offer unquestioning Hence, the history written has been a form of mytho-history constructed for individuals to embody (Geher, 1993; McNeill, 1986). For the colonial Puritans, it was the ―errand into obedience to the law of the land, and to carry on the work begun‖ (Pierce, 1926, p. 113).¶ the wilderness‖ and a ―city upon the hill‖ (Bercovitch, 1975); for the next era it was Enlightenment Progress; then Manifest Destiny; to the more recent belief in the US as the The theme of US exceptionalism, and its subsequent protection of all the material rewards that its people feel they deserve, undergirds all of the mainstream stories as told through the social studies. However, conflict arises over the responsibility of social studies educators beyond that point: whether such narratives moral arbiter and protector of the world. need to be merely recited, as in a history teacher‘s lecture pulled directly from a textbook or from pre-packaged curricula resources; or to tell the story, analyze it historically and interpret to what degree it has and continues to match concrete reality. Shaver (1981) defines the basic dilemma in this way: ―How can the school contribute to the continuity of the society by preserving and passing on its traditions and values the telling of the national narrative. while also contributing to appropriate social change by helping youth to question current social forms and solutions‖ (p. 125)? Given Shaver‘s (1981) acknowledgement of such foundational concerns, it is difficult to explain why social studies research has largely ignored race as a major persistent theme within the national story (Marri, 2001; Marshall, 2001; Pang, Rivera, & Gillette, 1998; Tyson, 2001). In fact an excellent recent work that appears to be an exception to the problem of race in relation to education in general in the US, Ross & Pang‘s (2006) edition of Race, Ethnicity and Education, actually confirms the problem. Those involved in the social studies scholarship in these important volumes have removed themselves from the mainstream of NCSS -- given its complete resistance to any such discussion of race -- and are now situated on the periphery so as to find any space to inquire into such controversial issues. Mainstream social studies research has failed to confront directly the issue of race in any meaningful way.¶ Telling is a review of the social studies literature from 1973 to the present in the premier US social studies research journal, Theory and Research in Social Education (TRSE), subsidized by NCSS, reveals a lack of scholarly inquiry into the different issues of race. Noticeably absent are the issues of race as a subject matter in the social studies curriculum, as well as how race shapes the classroom as a cultural space in which ―whiteness‖ is privileged. In Ehman‘s (1998) extensive review of TRSE from 1973-1997, only 6% dealt with ―social problems and controversial issues,‖ of which race would be a part. An analysis of the years after 1997 to the present found the same persistent lack of research in general confronting ―controversial issues‖ in TRSE, and in specific lack of racial analysis (Chandler, 2007). Nelson & Fernekes (1996) found that NCSS has a long history of not taking stands on significant social conflicts between those privileged within the dominant culture and those oppressed by it:¶ The National Council for the Social Studies‘ record on civil rights can only be characterized as negligent at best and indifferent at worst. NCSS largely ignored the civil rights movement and in the process demonstrated indifference toward a social crisis of immense significance, one that challenged the very basis of democratic institutions and posed difficult questions for educators who daily had to confront the gap between the stated ideals and social experience. (p. 98)¶ Two recent volumes of social education research are instructive in how race is either situated on the margins or is sanitized and hidden within the large framework of colour-blind multiculturalism and diversity (further examined below). Critical Issues in Social Studies Teacher Education (Adler, 2004) and Critical Issues in Social Studies Research for the 21st Century (Stanley, 2001) present race as a topic on the periphery of social studies thought and research. Of the 33 chapters that constitute these two volumes, written by the foremost scholars in the field of social studies research, five address the issue of race mostly as a subset of either urban and/or global education or as just one piece of multicultural education. The one chapter that examines race as an unavoidable thematic within the national narrative is Santora‘s (2001) work on cross-cultural dialogue. From socially constructed notions of race and whiteness define what the dominant culture believes is ―normality,‖ which in turn perpetuates the privileging of ―whiteness‖ within education. Santora‘s analysis complements Nelson and Pang‘s (2001) findings of how within the social studies curriculum the this perspective, she addresses how national narrative fails to match the material reality of social studies classrooms. They identified that while the ―root ideas of liberty, justice, and equality‖ (Nelson & Pang, 2001, p. 144) were spoken the actions of teacher and student betrayed the sentiment by failing to interrogate the contradictions that existed between words and deeds. ―This that justice and equality are not the standards of US society, no matter the credo‖ (Nelson & Pang, 2001, p. 144).¶ While the mainstream social studies is quick to transmit the story of colonial resistance, the virtues of is a sobering and disquieting scenario, one that illustrates republicanism, superiority of ―American‖ culture and Manifest Destiny, race and its central role in the creation of the US is disregarded (Ladson-Billings & Tate, 1995; Lybarger, The danger of this is that a failure to confront the legacy of race in the US will preclude students from understanding how racial injustice continues even as legislative attempts at redress, such as affirmative action, are struck down as unnecessary in the present age. This leads to an absence of examining race within the social studies as an important determinant of US past, present and future. In fact, Nelson & Pang (2001) found in examination of the social studies curriculum and practice a field characterized by ―dullness, vapidity, absolutism, censorship, and inaccuracy in the promotion of patriotic nationalism and conservative social values‖ (p. 152) that fails to interrogate claims of US moral certitude and self-righteousness.¶ This is even more problematic given the broad and powerful critique by Critical Race Theory (CRT), revealing how US history is a story of racialization in which the freedom of some was preserved through the enslavement and oppression of others through legal means (Dixon & Rousseau, 2005; Harris, 1993; Roithmayer, 1999). Domestic and foreign policy of the US have been predicated on racial notions; from Native genocide, to African enslavement, to Jim Crow legislation, to Manifest Destiny (i.e. empire building), the history of the US is tied to the manifestation of racism and racist regimes (Howard, 2001). Also missing is any analysis on the interaction between the 1991). races. The social studies is the one discipline that could provide students with a language to ―develop a discourse of contemporary race and ethnic relations that addresses institutional racism, structural inequality, and power‖ (Wills, 2001, p. 43). Instead, the social studies mentions certain groups of people (i.e. women, Native Americans, African This gives the impression that either oppression does not exist or that nothing can be done about it because history is perceived as pre-determined and progressive. In fact, case studies with white high school social studies teachers found that these teachers Americans) without any reference to the superstructure of oppression that causes their situation and/or respective actions. tended to mention certain facts involving those of non-Anglo European backgrounds (e.g. Civil Rights, Slavery, battles with Native American tribes). However, no context was ever provided concerning the tension of how race and racial attitudes generated a condition in which those groups claiming to celebrate and represent the best of US identity (e.g. equality, individual freedom, liberty, democracy) could in the same moment engage in acts of oppressing others who, while non- Anglo, wanted to embody the same national identity (Chandler, 2007). Racism is an A Priori Impact Memmi 2000, Professor Emeritus of Sociology @ Unv. Of Paris 2000, Albert-; RACISM, translated by Steve Martinot, pp.163-165 The struggle against racism will be long, difficult, without intermission, without remission, probably never achieved, yet for this very reason, it is a struggle to be undertaken without surcease and without concessions. One cannot be indulgent toward racism. One cannot even let the monster in the house, especially not in a mask. To give it merely a foothold means to augment the bestial part in us and in other people which is to diminish what is human. To accept the racist universe to the slightest degree is to endorse fear, injustice, and violence. It is to accept the persistence of the dark history in which we still largely live. It is to agree that the outsider will always be a possible victim (and which [person] man is not [themself] himself an outsider relative to someone else?). Racism illustrates in sum, the inevitable negativity of the condition of the dominated; that is it illuminates in a certain sense the entire human condition. The anti-racist struggle, difficult though it is, and always in question, is nevertheless one of the prologues to the ultimate passage from animality to humanity. In that sense, we cannot fail to rise to the racist challenge. However, it remains true that one’s moral conduct only emerges from a choice: one has to want it. It is a choice among other choices, and always debatable in its foundations and its consequences. Let us say, broadly speaking, that the choice to conduct oneself morally is the condition for the establishment of a human order for which racism is the very negation. This is almost a redundancy. One cannot found a moral order, let alone a legislative order, on racism because racism signifies the exclusion of the other and his or her subjection to violence and domination. From an ethical point of view, if one can deploy a little religious language, racism is “the truly capital sin.”fn22 It is not an accident that almost all of humanity’s spiritual traditions counsel respect for the weak, for orphans, widows, or strangers. It is not just a question of theoretical counsel respect for the weak, for orphans, widows or strangers. It is not just a question of theoretical morality and disinterested commandments. Such unanimity in the safeguarding of the other suggests the real utility of such sentiments. All things considered, we have an interest in banishing injustice, because injustice engenders violence and death. Of course, this is debatable. There are those who think that if one is strong enough, the assault on and oppression of others is permissible. But no one is ever sure of remaining the strongest. One day, perhaps, the roles will be reversed. All unjust society contains within itself the seeds of its own death. It is probably smarter to treat others with respect so that they treat you with respect. “Recall,” says the bible, “that you were once a stranger in Egypt,” which means both that you ought to respect the stranger because you were a stranger yourself and that you risk becoming once again someday. It is an ethical and a practical appeal – indeed, it is a contract, however implicit it might be. In short, the refusal of racism is the condition for all theoretical and practical morality. Because, in the end, the ethical choice commands the political choice. A just society must be a society accepted by all. If this contractual principle is not accepted, then only conflict, violence, and destruction will be our lot. If it is accepted, we can hope someday to live in peace. True, it is a wager, but the stakes are irresistible. Fusion Centers Target Social Movements Fusion Centers Target The Black Lives Matter Movement Activist Groups, and African Americans in particular, are considered ‘domestic terrorist’ activities, and are heavily monitored. Lee Fang, Journalist Extraordinaire, 3/12/2015, "Why Was an FBI Joint Terrorism Task Force Tracking a Black Lives Matter Protest?," Intercept, https://firstlook.org/theintercept/2015/03/12/fbi-appeared-use-informant-track-black-livesmatter-protest/ Members of an FBI Joint Terrorism Task Force tracked The email from Minnesota, email obtained by The Intercept shows. the time and location of a Black Lives Matter protest last December at the Mall of America in Bloomington, David S. Langfellow, a St. Paul police officer and member of an FBI Joint Terrorism Task Force, informs a fellow task force member from the Bloomington police that “CHS an FBI special agent and Joint Terrorism Task Force supervisor was CC’d on the email. The FBI characterizes them as “our nation’s front line on terrorism.” “Our system disproportionately targets, profiles and kills black men and women, that’s what we are here talking about,” We wanted to show people who have the everyday luxury of just living their lives that they need to be aware of this, too.” According to an FBI spokesman, Langfellow’s Confidential Human Source was “a tipster with whom Mr. Langfellow is familiar,” who contacted him “after the tipster had discovered some information while on Facebook” that “some individuals may engage in vandalism” There is no mention of potential vandalism anywhere in the email chain, and no vandalism occurred just confirmed the MOA protest I was taking to you about today, for the 20th of DEC @ 1400 hours.” CHS is a law enforcement acronym for “confidential human source.” Jeffrey VanNest, at the FBI’s Minneapolis office, The FBI’s Joint Terrorism Task Forces are based in 104 U.S. cities and are made up of approximately 4,000 federal, state and local law enforcement officials. Activists had planned the protest at the mall to call attention to police brutality against African Americans. organizer Michael McDowell told a reporter at the time. “ at the Mall of America protest. Upon receiving the email, Bloomington police officer and task-force member Benjamin Mansur forwarded it to Bloomington’s then-Deputy Police Chief Rick Hart, adding “Looks like it’s going to be the 20th…” It was then forwarded to all Bloomington police command staff. at the Mall of America protest. The FBI spokesman emphasized that “As for any ‘FBI interest’ in the Black Lives Matter campaign, the FBI had (has) none,” and “makes certain its operational mandates do not interfere with activities protected by the First Amendment to the U.S. Constitution.” The spokesman acknowledged that vandalism does not fall under the Memorandum of Understanding establishing the parameters under Asked why , the Joint Terrorism Task Force supervisor, was CC’d on Langfellow’s email, the spokesman responded “I don’t know” The fact that they’re spending resources in this manner reflects poor leadership and is something that they should really take a hard look at.” FBI connected organizations such as Greenpeace and the Catholic Worker movement as domestic terrorism cases Joint Terrorism Task Force, was in charge of a 2008 raid on the home of St. Paul activists ahead of that year’s Republican Party Convention that led to a lawsuit that the city settled for $50,000. FBI engaged in well-known, ugly mistreatment of African American activists in particular FBI and law enforcement generally of law enforcement agents seeing challenges to the status quo as threats to security FBI field office in 1971 showed the Bureau was keeping literally every black student at Swarthmore College in Pennsylvania under surveillance. which local police officers are detailed to Joint Terrorism Task Forces and the task force mission of “prevention, preemption, deference and investigation of terrorist acts.” VanNest but speculated it was “as a matter of courtesy.” “Clearly it’s inappropriate to be using the Joint Terrorist Task Force to monitor activists [and] the use of a CHS seems extremely inappropriate,” said Michael German, a fellow at New York University’s Brennan Center for Justice and former special agent with the FBI. “ The FBI has been criticized in the recent past for its actions regarding domestic advocacy groups. A 2010 report by the Department of Justice Inspector General found the opened investigations to that classified possible “trespassing or vandalism” . The report also found the FBI’s National Press Office “made false and misleading statements” when questioned by the media about documents obtained by public records requests. Langfellow himself, while working as a member of a Further in the past, the . “There’s a long history in the ,” said German. Documents stolen from an After the December 20 Mall of America protest, the city of Bloomington charged 11 protestors with six separate criminal misdemeanors, including unlawful assembly, and is seeking thousands of dollars in restitution. Jordan Kushner, one of the activist’s defense attorneys, says the city has alleged $25,000 in police costs and that he also received a letter from the Mall of America seeking $40,000 for mall security costs, raising overall restitution to $65,000. As reported by the Star Tribune, emails released earlier this week reveal apparent coordination between Sandra Johnson, the Bloomington city attorney, and Kathleen Allen, the Mall of America’s corporate counsel. “It’s the prosecution’s job to be the enforcer and MOA needs to continue to put on a positive, safe face,” Johnson wrote to Allen two days after the protest, encouraging the mall company to wait for a criminal charge from the city before pursuing its own lawsuit. “Agree — we would defer any civil action depending on how the criminal charges play out,” Allen wrote back. “That’s pretty unprecedented to use a criminal proceeding for a corporation to collect their costs, costs for policing and protest,” said Kushner. “It’s not like people stole from them or damaged belongings.” Nekima Levy-Pounds, a professor of law at the University of St. Thomas in St. Paul and one of the Black Lives Matter defendants, said she found parallels between the conduct of law enforcement in Minnesota and the tactics used against civil rights protesters a generation ago. “I think it’s relevant,” she said, adding that in both instances, officers attempted to “curb nonviolent peaceful protests and to violate people’s rights to free speech.” Fusion Centers Target Minorities (General) The nature of our surveillance system targets minorities on social media Fuchs 15 [Fuchs, Christian. “Towards a theoretical model of social media surveillance in contemporary society.” http://fuchs.uti.at/wp-content/surv.pdf 6/23/15 IH] The focus on fighting and preventing terrorism and the creation of a culture of categorical suspicion is one of the societal contexts of social media surveillance. Social media contain a lot of data about personal interests and social relations. The police and secret services have therefore developed a special interest in being able to monitor social media usage, as evidenced by the existence of the global PRISM internet surveillance program. Police surveillance of social media in the situation of post-9/11 categorical suspicion can easily result in the constant monitoring of social media activities of citizens and the police assumption that all users are actual or potential criminals and terrorists until proven innocent. There is also the danger that social media surveillance conducted by the police is especially directed towards groups that already face discrimination in Western societies, like immigrants, people of color, people of Arabic or African background, the poor, the unemployed, or political activists, and that thereby stereotypes and discrimination are deepened and reified. A second societal implication of surveillance is the actual or potential fostering of social sorting as a specific form of discrimination. Oscar H. Gandy (1993) has in this context coined the notion of the panoptic sort. It is a system of power and disciplinary surveillance that identifies, classifies, and assesses (Gandy, 1993, p. 15). David Lyon (2003b) considers Gandy’s notion of the panoptic sort in relation to computers and the internet as social sorting. In newer works, Gandy (2009) has pointed out the connection of social sorting and cumulative disadvantages: “Cumulative disadvantage refers to the ways in which historical disadvantages cumulate over time, and across categories of experience” (Gandy, 2009, p. 12). Thus, membership in a targeted group as well as other kinds of disadvantage become a dominant factor in determining future negative social outcomes: “People who have bad luck in one area, are likely to suffer from bad luck in other areas as well” (Gandy, 2009, p. 116). 128 This means that if you have dark skin, are poor, live in a deprived neighborhood, have become unemployed or ill, etc., you are more likely to be discriminated against and flagged as a risk group by data mining and other social sorting technologies. The arbitrary disadvantages an individual has suffered then cumulate and result in further disadvantages that are enforced by predictive algorithms which calculate based on certain previous behavior that an individual is part of a risk group and should therefore be discriminated against (by not being offered a service, being offered a lower quality service at a higher price – e.g., in the case of a loan or mortgage –, by being considered as a criminal or terrorist, etc.). “Once they have been identified as criminals, or even as potential criminals, poor people, and black people in particular, are systematically barred from the opportunities they might otherwise use to improve their status in life” (Gandy, 2009, p. 141). Social media profiles are a historical accumulation and storage of online behavior and interests. Social media tend to never forget what users are doing online, but tend to keep profiles of personal data and thereby provide a foundation for the algorithmic or human analysis of who belongs to a so-called risk group and should be treated in a special way. Commercial social media surveillance uses specific data from social media profiles for targeting advertising and providing special offers. As a result, privileged groups tend to be treated differently than the poor and outcast. Another effect of commercial social media surveillance is that consumer culture and the fostering of a world that is based on the logic of commodities has become almost ubiquitous on the internet. If state intelligence agencies obtain access to social media profile data and combine such data with state-administered records (such as databases covering crime, welfare and unemployment benefits, health records, etc.), then discrimination based on cumulative disadvantages can be advanced. The quality of social media to cover and store data about various social roles and social activities that converge in social media profiles allows commercial and state surveillance to use social media data for advancing discrimination that is based on algorithmic profiling and predictions as well as the networking of data from various sources. Data collection on commercial social media is permanent, constant, totalizing, and works in real time and covers a lot of activities in various everyday social roles of billions of humans worldwide. The potential for unfair treatment and racist, classist, sexist, or other forms of discrimination are thereby greatly enhanced. Fusion Centers Focus on Movements Fusion centers anti-terrorism efforts directed at peaceful social movements Hilliard, Messineo ’14 [May 23, 2014, GlobalResearch, Mara Verheyden-Hillard cofounder of the Partnership for Civil Justice Legal Defense & Education Fund, Attorney for the International Action Center, Anti-war activist, Carl Messineo cofounder of the Partnership for Civil Justice Legal Defense and Education Fund; “The Hidden Role of the Fusion Centers in the Nationwide Spying Operation against the Occupy Movement and Peaceful Protest in America”, http://www.globalresearch.ca/the-hidden-role-of-the-fusion-centers-in-the-nationwide-spyingoperation-against-the-occupy-movement-and-peaceful-protest-in-america/5383571] This report, based on documents obtained by the Partnership for Civil Justice Fund, provides highlights and analysis of how the Department of Homeland Security (DHS)-funded Fusion Centers used their vast anti-terrorism and anti-crime authority and funds to conduct a sprawling, nationwide and hour-by-hour surveillance effort that targeted even the smallest activity of peaceful protestors in the Occupy Movement in the Fall and Winter of 2011. It is being released in conjunction with a major story in the New York Times that is based on the 4,000 pages of government documents uncovered by the Partnership for Civil Justice Fund (PCJF) during a two-year long investigation. The newly published documents reveal the actual workings of the Fusion Centers – created ostensibly to coordinate anti-terrorism efforts following the September 11, 2001, attacks – in collecting and providing surveillance information on peaceful protestors. The new documents roll back the curtain on the Fusion Centers and show the communications, interactions and emails of a massive national web of federal agents, officials, police, and private “security” contractors to accumulate and share information, reporting on all manner of peaceful and lawful political activity that took place during the Occupy Movement from protests and rallies to meetings and educational lectures. This enormous spying and monitoring apparatus included the Pentagon, FBI, DHS, police departments and chiefs, private contractors and commercial business interests. There is now, with the release of these documents, incontrovertible evidence of systematic and not incidental conduct and practices of the Fusion Centers and their personnel to direct their sights against a peaceful movement that advocated social and economic justice in the United States. It bears noting also that while these 4,000 pages offer the most significant and largest window into the U.S. intelligence and law enforcements’ coordinated targeting of Occupy, they can only be a portion of what is likely many more tens of thousands of pages of materials generated by the nationwide operation. Fusion Centers are targeting social movements Lazare 2014, Sarah Lazare (Writer for Common Dreams), Revealed: Gov't Used Fusion Centers to Spy on Occupy, 23 May 2014, http://www.commondreams.org/news/2014/05/23/revealed-govt-used-fusion-centers-spy-occupy. PE "The U.S. Fusion Centers are using their vast counter-terrorism resources to target the domestic social justice movement as a criminal or terrorist enterprise," PCJF Executive Director Mara Verheyden-Hilliard stated. "This is an abuse of power and corruption of democracy."¶ "Although the Fusion Centers’ existence is justified by the DHS as a necessary component in stopping terrorism and violent crime, the documents show that the Fusion Centers in the Fall of 2011 and Winter of 2012 were devoted to unconstrained targeting of a grassroots movement for social change that was acknowledged to be peaceful in character," the report states.¶ Police chiefs of major metropolitan areas used the Southern Nevada Counter Terrorism Center to produce regular reports on the occupy movement.¶ Furthermore, "The Boston regional intelligence center monitored and cataloged Occupy-associated activities from student organizing to political lectures," according to the report. That center also produced twice-daily updates on Occupy activities.¶ The New York Times notes:¶ The Boston Regional Intelligence Center, one of the most active centers, issued scores of bulletins listing hundreds of events including a protest of “irresponsible lending practices,” a food drive and multiple “yoga, faith & spirituality” classes.¶ Nationwide surveillance has included extensive monitoring of social media, in addition to a variety of spying methods used across Fusion Centers.¶ "[T]he Fusion Centers are a threat to civil liberties, democratic dissent and the social and political fabric of this country," said Carl Messineo, PCJF Legal Director. "The time has long passed for the centers to be defunded." Surveillance to seek out terrorism actually seeks normal citizens Hussain & Greenwald 2014, Murtaza Hussain (journalist and political commentator. His work focuses on human rights, foreign policy, and cultural affairs), Glenn Greenwald (journalist, constitutional lawyer, and author of four New York Times best-selling books on politics and law), MEET THE MUSLIM-AMERICAN LEADERS THE FBI AND NSA HAVE BEEN SPYING ON, 8 July 2014, https://firstlook.org/theintercept/2014/07/09/under-surveillance/. PE But a three-month investigation by The Intercept—including interviews with more than a dozen current and former federal law enforcement officials involved in the FISA process—reveals that in practice, the system for authorizing NSA surveillance affords the government wide latitude in spying on U.S. citizens.¶ The five Americans whose email accounts were monitored by the NSA and FBI have all led highly public, outwardly exemplary lives. All five vehemently deny any involvement in terrorism or espionage, and none advocates violent jihad or is known to have been implicated in any crime, despite years of intense scrutiny by the government and the press. Some have even climbed the ranks of the U.S. national security and foreign policy establishments.¶ “I just don’t know why,” says Gill, whose AOL and Yahoo! email accounts were monitored while he was a Republican candidate for the Virginia House of Delegates. “I’ve done everything in my life to be patriotic. I served in the Navy, served in the government, was active in my community—I’ve done everything that a good citizen, in my opinion, should do.” Fusion Centers Violate Liberty Fusion Centers target mischaracterize innocent activities as a way to unjustly track individuals Thomas S. Neuberger, is a Wilmington attorney and a long-term board member of the Rutherford Institute, a nonprofit organization dedicated to the defense of civil liberties and human rights April 16, 2015 Special to The News Journal 2:10 a.m. EDT Delaware's Fusion Center poses threat to liberty http://www.delawareonline.com/story/opinion/contributors/2015/04/15/local-fusion-centerposes-threat-liberty/25838549/ It is bad news for freedom here in Delaware now that the New Castle County police have their own Fusion Center. Virtually every state now has one in operation or formation after more than $1.4 billion dollars of Homeland Security money was spent to create 77 of them nationwide to assist in the overstated war on terror.¶ Their purpose is to enlist local police and first responders (known as Terrorism Liaison Officers or TLOs) to spy on fellow citizens and report back to interconnected government agencies such as the FBI, CIA, NSA and multi-state police forces on "suspicious activity" or movements, which we old timers used to consider normal everyday activity.¶ The local spies then report back to the "fusion centers" where the information goes out to all the government computers now active nationwide in tracking our movements, emails, phone calls, letters, Facebook posts, etc. to see if any person is worth tracking down.¶ Robert O'Harrow, an investigative journalist for The Washington Post, concluded they are little more than "pools of ineptitude, waste and civil liberties intrusions." In 2012 the Senate Permanent Subcommittee on Investigations in a bipartisan report concluded that these Homeland Security Department fusion centers achieve very little to fight terrorism and suffer from a lack of oversight and wasteful spending of "hundreds of millions of dollars," such as flat-screen TVs, $6,000 laptops and even SUVs used for commuting.¶ DELAWAREONLINE¶ NCCo unveils high-tech incident response center¶ Many innocent constitutionally protected activities are flagged by fusion centers for follow up by our new Big Brothers in the federal intelligence community.¶ David Rittgers of the Cato Institute reported in 2011 that among the many innocent people and groups labeled suspicious and targeted for surveillance are pro-choice advocates, pro-lifers, environmental activists, Tea Party members, Second Amendment rally attendees, third-party voters, Ron Paul supporters, anti-death penalty advocates, and antiwar protesters. Historically black or Christian evangelical colleges, universities and religious institutions also have been considered by fusion centers to be potential hubs of extremism and terrorist activity. One report warned of a "Russian cyberattack" which turned out to be nothing more than someone accessing his work computer remotely.¶ Commentator John W. Whitehead has observed that "you're bound to end up with a few legitimate leads on 'terrorist' activity if you classify unemployment as a cause for suspicion, which is actually one of the criteria used by" fusion centers. "The problem with tracking innocent behavior is that more often than not innocent people will be investigated for heinous crimes."¶ He gives the example of a police officer reporting a man seen purchasing liquid chlorine bleach and ammonia on consecutive days. Up the fusion center chain of command this suspicious activity went, but the subsequent investigation revealed that the man only was trying to kill gophers on a gold course with chlorine gas.¶ The ACLU also has warned that the partnership between local police and fusion centers skates alarmingly close to illegal unreasonable searches, lacks transparency, and often just flouts the Bill of Rights altogether.¶ Last, it has been reported that officials at fusion centers lack basic training in intelligence gathering, let alone protecting citizen civil rights and liberties. Fusion centers violate personal civil liberties Patin 2012, Gregory Patin (B.A. in political science from U.W. - Madison and a M.S. in management from Colorado Technical University), Fusion centers: Invading your privacy at your expense, 14 Oct 2012, Examiner, http://www.examiner.com/article/fusioncenters-invading-your-privacy-at-your-expense. PE Like so many post-9/11 surveillance laws passed under the vague guise of “national security,” these fusion centers violate the civil liberties of ordinary Americans that should be guaranteed by the Bill of Rights and other laws. An entire section of the Senate report is dedicated to Privacy Act violations and the collection of information completely unrelated to any criminal or terrorist activity in the HIRs.¶ The Senate report and the activity of fusion centers makes it clear that these facilities are designed to spy on American citizens, invading their privacy while doing nothing to stop terrorism. With all the talk in the Presidential campaigns about frivolous spending, perhaps these worthless facilities should be addressed, instead of Medicare or Social Security Surveillance Stops Movements Surveillance Stops Movements Unwarranted surveillance leads to fear and failure within organizations Starr et. Al 8 [Starr, A. "The Impacts of State Surveillance on Political Assembly and Association: A Socio-Legal Analysis." The Impacts of State Surveillance on Political Assembly and Association: A Socio-Legal Analysis. Springer Science, 10 July 2008. Web. 22 June 2015.] A number of legal cases have connected the right of association with the right to be free from unwarranted government surveillance. In NAACP v. Alabama, 357 US 449, 462 (1958), the Supreme Court held that compelled disclosure of an advocacy group’s membership list would be an impermissible restraint on freedom of association, observing that the “inviolability of privacy in group association may in many circumstances be indispensable to preservation of freedom of association, particularly where a group espouses dissident beliefs.” The Court recognized that the chilling effect of surveillance on associational freedom “may induce members to withdraw from the Association and dissuade others from joining it because of fear of exposure of their beliefs,” (357 US at 463; also see Zweibon v. Mitchell, 516 F.2d 594 [D.C. Cir. 1975]), a point echoed by the courts in subsequent decisions: Bates v. City of Little Rock, 361 US 516 (1960) asserted that tapping a political organization’s phone would provide its membership list to authorities, which is forbidden. Dombrowski v. Pfister, 380 US 479 (1965) asserted that organizations had been harmed irreparably when subjected to repeated announcements of their 254 Qual Sociol (2008) 31:251–270 subversiveness, which scared off potential members and contributors. Judge Warren wrote in USA v. Robel, 389 US 258, 264 (1967): “It would indeed be ironic if, in the name of national defense, we would sanction the subversion of…those liberties…which makes the defense of the Nation worthwhile” (Also see Christie 1972). The difficulty with much of the litigation to date is problematized in Laird v. Tatum 408 US 1 (1972). In that case, the plaintiff objected to the chilling effect on First Amendment rights by the mere existence of a government surveillance program, but did not allege any specific harm to himself as a result of the program except that he “could conceivably” become subject to surveillance and therefore have his rights potentially chilled. In the recent case of ACLU v. NSA, F. Supp. 2d 754 (E.D. Mich. 2006) (since vacated by the Sixth Circuit Court of Appeals), District Judge Anna Diggs Taylor rejected the government’s invocation of Laird in defense of its warrantless domestic eavesdropping programs, noting that the plaintiffs in that case (journalists, scholars, and political organizations) had demonstrated actual and not merely hypothetical harm as the result of unwarranted surveillance. We now know more about surveillance than how victims feel about it; we also know a good deal about its intents. Cunningham explains that intelligence operations can serve two goals, investigation of federal crimes and (the more controversial) precautionary monitoring through information gathering about organizations. Counterintelligence operations may take a preventative goal, to “actively restrict a target’s ability to carry out planned actions” or may take the form of provocation for the purpose of entrapment of targets in criminal acts. (2004, p. 6) Some of the “normal intelligence” activities undertaken by the FBI outside of official COINTELPRO which nevertheless have a preventative counterintelligence function are: harassment by surveillance and/or purportedly criminal investigations, pressured recruitment of informants, infiltration, break-ins, and labeling or databasing which harms the group’s reputation impacting its ability to communicate with the media, draw new members, and raise funds, “exacerbat[ing] a climate in which seemingly all mainstream institutions opposed the New Left in some way.” In addition, infiltrators acting as agent provocateurs is, inexplicably, a part of normal intelligence operations (pp. 180– 214). Can these kinds of operations be understood as violations, not only of individuals’ political rights, but against associations themselves? Since associations and social movements work for decades, they have interests separate from their participants. Previous literature shows that knowledge (or fear) of surveillance and infiltration forces organizations to direct their energies toward defensive maintenance and away from the pursuit of broader goals. (Boykoff 2006; Cunningham 2004; Davenport 2005; Flam 1998; Goldstein 1978; Marx 1970, 1974, 1979, 1988) Alternately, activists may respond by turning from overt collective forms of resistance toward more covert, individualistic forms of resistance (Davenport 2006, Johnston 2005, Zwerman et al. 2000) or to the emergence of more militant, even violent, factions (della Porta 1995). Organizations’ funding, relationships with other groups, the press, and the public may be affected as well (Marx 1970, 1974, 1979, 1988; US Congress 1976; Theoharis 1978; Churchill and Vander Wall 1988; Davenport 2006; Klatch 2002; Schultz and Schultz 2001). Surveillance hurts the effectiveness of advocacy organizations Starr et. Al 8 [Starr, A. "The Impacts of State Surveillance on Political Assembly and Association: A Socio-Legal Analysis." The Impacts of State Surveillance on Political Assembly and Association: A Socio-Legal Analysis. Springer Science, 10 July 2008. Web. 22 June 2015.] Surveillance impacts the culture of protest by reducing the quality and quantity of political discourse: “We’re scared to be able to openly and honestly talk about issues in our community, state using that info to crush legitimate movements.” A middle-aged man in a peace group told us “my mom is scared to talk to me on the phone...What is she allowed to say and not any more.” Another peace group reported that before they found out about the extent of surveillance we sometimes talk in code, more cryptic, share less information. We're all a bit more reserved in terms of our speech.” An activist explains “I don't like even talking about politics with them because I don't want to get either of us confused in each others business. If someone is being watched for something i'm not being watched for, I don't want to talk about politics with those people.” Another activist the impact of surveillance on the exercise of assembly rights. 9.17.07 . 17 says “People are scared of the implications of just being radical. There’s almost no space that we consider safe…People just stopped expressing those views entirely.” We found three distinct impacts of reduced discourse. The first is elimination of what is called “cross-pollination”: “It was nice to be able to tell stories of like I worked with this organization and can I help you build... Here’s what we did that you all might be able to do... Now ...you can’t help them out, you can’t tell them stories of things you’ve done before. Because if they were a snitch you’d be in a really bad situation.” A second aspect of reduced discourse is secretive planning. As mentioned above, organizations are communicating much less and across fewer media. “There isn’t that constant discussion, which can be really beneficial. Then you get everybody’s opinion if you can talk to everyone.” This interviewee went on to explain how discourse is intentionally reduced as a protective measure: “Here, we they were under “we used to be a lot closer. Now can only talk about what’s going on here. Next week we can’t talk about this any more. And we can’t talk about something else until it’s sure who’s going to be part of it....” Another interviewee summed it up: secretive planning is a disaster in community building, “we couldn’t think creatively.” If actions cannot be discussed later on, then the strategy of the movement no longer moves forward. The third aspect of reduced discourse is the lack of debriefing. Secretive planning is just one has in fact caused security culture to replace organizing culture, with devastating impacts. The hallmarks of organizing culture are inclusivity and solidarity. The hallmarks of security culture are exclusion, wariness, withholding of many dimensions of what activists call “security culture”. Surveillance information, and avoiding diversity. “It’s hard to build when you’re suspicious.” Another activist jokingly described security culture as the “icemaker”, which has replaced the “icebreaker”. S/he went on: “Like handing out a signup sheet. If people feel like that’s going to get in the hands of the government that means that people are not only afraid to sign up, but afraid of asking for it.” A new activist described the experience this way: “What’s the opposite of unites? When I’m suspicious or they are, it creates a tension, conscious or not, about who people are and what their intentions are.” Our interviewees were very conscious of the effects of the cultural shift. “People perceived us as not inclusive because we were so scared.” An activist described their group as showing “paranoia, freakiness, and unwelcomingness that results from the fear...” Another admitted “There’s not as many people involved, there’s not as many voices in the decision making, there’s not as many people from different walks of life.” An activist explained, with alarm, that security “was the first thing we talked about, even before our name or what we're going to do.” Another interviewee pointed out that security culture has become so common that people are using it for actions that don’t need to be protected. “There’s confusion over what actions need to be clandestine and what doesn't.” We noticed in implementing security in this project that it took a lot of energy simply to distinguish when we needed to be secure and when we didn’t. Security culture also involves speaking in code, which, interviewees joked, made communication nearly impossible in some circumstances, particularly when organizers try to communicate with more peripheral people. Interviewees also described the effect it has on themselves as organizers: “I had to learn not to welcome people and not give out information... I’m interested in community building, and then you’re taught to be suspicious and not welcome people it’s antithetical to your theory of change. Another explains when I see people I don’t know I get excited. when I saw the undercovers I was amazed that we had attracted folks that don’t fit in, and I was sad when I found out they were the impact of surveillance on the exercise of assembly rights. 9.17.07 . 18 undercovers.” Another interviewee described how people who fit too well are suspicious as well as people who don’t fit in. S/he described someone who has been softly excluded from the group: ”It makes me suspicious of people who are potential friends and allies, in ways that don't make me comfortable.” Prior research has documented that inducing paranoia is in fact one of the goals of surveillance [Churchill and Vander Wall 2002; Marx 197]. “It’s just constant…When someone new shows up, the whole meeting changes .” This is a limitation on association rights. Surveillance scares away activists Starr et al. ’06 Amory Starr, Luis Fernandez, Randall Amster, Lesley Wood. “The impact of surveillance on the exercise of political rights: an interdisciplinary analysis 1998-2006” http://www.trabal.org/texts/assembly091707.pdf. Amory Starr is a Ph.D. in Sociology (Political Economy) from the University of California, Santa Barbara (advisors Richard Flacks, Mark Juergensmeyer) and a Masters in City Planning from Massachusetts Institute of Technology. She has written 4 books and directed a documentary on the NAFTA. We have seen that current surveillance is an alarming threat to mobilizations, and thus to the exercise of constitutionally protected rights to assembly and association. Our findings about the post-Seattle era are consistent with studies of previous activist eras. Current surveillance is both qualitatively and quantitatively comparable, with the enhancements of technology and Congressional leniency apparent. In only one qualitative dimension does our data diverge from previous findings, which is that we did not find the customary dualism in which hardcore activists become more militant while others become more moderate. [Lichbach 1987, White 1989, Tarrow 1998, Zwerman & Steinhoff 2005]. Instead we found signs of pervasive pacification. In lieu of going “underground” to continue their actions [Davenport 2006; Johnston 2005], activists are evading the surveillance net by dropping out of social connections entirely while organizations are abandoning “grey area” activities like civil disobedience and moving toward doing educational and permitted activities. Nevertheless, many activists have in fact redoubled their efforts to promote social change through nonviolent “grey area” methods, a sentiment reflected by Father Roy Bourgeois of the School of the Americas Watch: “The spying is an abuse of power and a clear attempt to stifle political opposition, to instill fear. But we aren’t going away” (Cooper & Hodge). In Arizona, a group of nonviolent activists who had been under surveillance by terrorism agencies went to the FBI headquarters and “turned themselves in” as a symbolic act of defiance and as a demonstration of their unwillingness to abandon their efforts (World Prout Assembly). Thus, while there may be a sense of fear among many activists, there is also is a demonstrable spirit of rededication to the myriad causes that social movements undertake. We are interested in the persistent attempt to rationalize surveillance and repression. Scholars of social movements should take note of the implications for consciousness of the state and forms of repression. We observed age and class distinctions here. While some organizations edit and re-edit their press releases, younger activists know you don’t have to do anything at all to be targeted. The lack of understanding from the elder progressive community has led to a rationalization of repression, taking the form of blaming young people for their own repression (particularly for “provoking” police actions at protests); limiting support for “Green Scare” defendants; and providing little collective concern for defending people from illegal investigations, and absurd indictments, bonds, and sentences. Rationalization collaborates in the creeping criminalization of dissent and political activity. However, conservative decisions on the part of activists and organizations are highly understandable in light of the costs of surveillance to membership, fundraising, family life, and organizational resources. An organization which was illegally searched spent more than 1500 hours of volunteer time dealing with the fallout for their membership and relations with other organizations. They finally filled a lawsuit for damages, which took 5 years to resolve. Databasing increases information collected, with no opportunity to purge, correct errors, or challenge interpretations. An interviewee notes that even requesting to see your government file is treated as an admission of guilt. It will be the “first entry in new files… i’ve been doing something that makes me believe that you may have reason to monitor me.” Activists who viewed a lot of released files noted that “the redaction was deliberately inept”, which has a further counterinsurgent function. There is no mechanism of accountability for false accusations, improper or unwarranted investigations, or erroneous surveillance. Entry of a presumed relationship between two organizations proliferates to everyone with even remote links. Rapid information sharing between jurisdictions, (including internationally) exponentially increases the impact of tags. Cultural changes resulting in the loss of history and process have major implications for social movements and the study of their processes and outcomes. Driven culture, organizations by creeping criminalization (we do not know what will be illegal next year), as part of security do not create archives and do not take meeting notes, and activists often do not keep diaries. Moreover, our interviewees explained that strategic and ideological dialogue is greatly reduced. Not wanting to be implicated or to implicate others, political actions are now planned and undertaken in a bubble of time never to be referred to again, with colleagues who will scatter immediately, never referring to one another or what they learned from the action. In addition, people are reluctant to discuss their political ideas, reducing the quantity and quality of political discourse and ideological development. Surveillance of educational events also makes it more difficult to spread analysis and theory. Protests Good #BlackLivesMatter Key #Blacklivesmatter is essential to humanize black people, expose the nascent anti-black violence of the U.S., and create the political possibilities of justice and solidarity Craven 2015 (Julia, Staff Reporter at Huffington Post on race relations Please Stop Telling Me That All Lives Matter in the Huffington Post online January 25, 2015 http://www.huffingtonpost.com/julia-craven/please-stop-telling-me-th_b_6223072.html When I say "Black lives matter," it is because this nation has a tendency to say otherwise. Racial discrimination does affect all minorities but police brutality, at such excessive rates, does not. A black person is killed extrajudicially every 28 hrs, and Black men between ages 19 and 25 are the group most at risk to be gunned down by police. Based on data from the Center on Juvenile and Criminal Justice, young Blacks are 4.5 times more likely to be killed by police than any other age or racial group.African-Americans have comprised 26 percent of police shootings though we only makeup 13 percent of the U.S. population, based on data spanning from 1999 to 2011.In the 108 days since Mike Brown was killed by Darren Wilson and left on display in the middle of the street for four and a half hours, at least seven Black males have been shot and killed by law enforcement officers .Officers are provided the unrestricted right to use force at their discretion -- and will not hesitate to do so -- and Black bodies are more susceptible to greeting the business end of those state-issued firearms. Multiple factors such as clothing, location and individual behavior determine who gets stopped by the police and when, according to Jack Glaser, an associate professor at University of California-Berkeley's Goldman School of Public Policy."The way the process works ... is if you take two equivalent people -- a young white man and a young black man -- who are dressed identically, the black man would still have a greater chance of being stopped," Glaser said. "And it's because his race is a basis of suspicion and it interacts with those other qualities in a way that makes them all seem more suspicious because it biases the judgment of everything."Granted, extrajudicial killings have dropped 70 percent in the last 40 to 50 years. Nearly 100 young black men were killed annually by police in the late 1960s, and these young men also comprised 25 percent of police killings between 1968 and 1974.Shootings fell to 35 per year in the 2000s though the risk is still higher for Black Americans than it is for whites, Latinos and Asians. My people are killed at 2.8 times the rate of white non-Latinos and 4.3 times the rate of Asians.I say all of this to say, though it has become less prevalent, police brutality has never affected another racial group like it affects us.Race brings on individual issues for each minority group. Saying "all lives matter" causes erasure of the differing disparities each group faces. Saying "all lives matter" is nothing more than you centering and inserting yourself within a very emotional and personal situation without any empathy or respect. Saying "all lives matter" is unnecessary. Non-black kids aren't being killed like black kids are. Of course I'd be just as pissed if cops were gunning down white kids. Duh, but they aren't. White assailants can litter movie theaters and bodies with bullets from automatic weapons and be apprehended alive but black kids can't jaywalk or have toy There is seemingly no justice for Black life in America. An unarmed Black body can be gunned down without sufficient reasoning and left in the middle of the street on display for hours -- just like victims of lynching. Strange fruit still hangs from our nations poplar trees. Lynching underwent a technological revolution. It evolved from nooses to guns and broken necks to bullet wounds. Police brutality is a BLACK issue. This is not an ill afflicting all Americans, but that does not mean you cannot stand in solidarity with us. But standing with us does not mean telling us how we should feel about our community's marginalization. Standing with us means being with us in solidarity without being upset that this is for OUR PEOPLE -- and wanting recognition for yours in this very specific context.Telling us that all lives matter is redundant. We know that already. But, just know, police violence and brutality disproportionately affects my people. Justice is not applied equally, laws are not applied equally and neither is our outrage. guns in open carry states? The Black Lives Matter Movement is key to countering racialized violence Nasir14 (Na’ilah Suad, Associate Professor of African American Studies, “Killing Us Slowly: Slow Death by Educational Neglect” in Insurgency: The Black Matter(s) Issue Dept. of African American Studies | University of California, Berkeley http://www.thediasporablackmattersissue.com/ December 23, 2014 This is an unprecedented moment in our nation’s history. 2014 marks an apex of unpunished, state- sanctioned violence against Black people, and an historical moment where Black communities all over the country, in the face of the murders of Michael Brown, Eric Garner, Tamir Rice, and countless others, have stood up together in protests and die-in’s and boycotts to express our collective anguish. These deaths at the hands of police violence have touched a nerve, in part because every Black person I know, rich or poor, young or old, men and women, in all parts of the country have a personal story of police abuse and violence (whether it be symbolic violence or physical violence). Being harassed and unfairly treated by police is an experience that unites Black people domestically and globally, and the heart-breaking deaths we have seen recently make dramatically salient the way that Black lives are undervalued. The hashtag, #BlackLivesMatter, is a rallying call to notice and resist the multiple ways our society has undervalued Black lives.While the recent deaths certainly underscore the unacceptable levels of implicit and explicit racism against Black people globally, they are but one aspect of how our society communicates and reinforces the message that Black lives do not matter. As a scholar of education, I find also appalling the way our educational system dampens the spirits and potential of Black kids in daily mundane interactions in far too many schools and classrooms.I was talking recently about this with a teacher at one of my children’s schools. My children attend Berkeley Public Schools, which have a long history of being progressive with respect to school desegregation, and which are quite (purposefully) racially and socio-economically diverse. However, like school districts across the country, opportunities to learn are not evenly distributed across racial groups in the schools. At the school one of my children attends, the achievement levels (as measured by standardized test scores) of Black and Latino students are lower than that of white and Asian students, as is the case in every school in Berkeley and most in the Bay Area and the nation. This teacher made the point that if the achievement patterns were reversed, with white students “underachieving” the school and the district would not stand for it. We reflected together on how schools have a collective level of acceptance for the “underachievement” of Black students, but if white students were to “underachieve” at the same levels, the system itself would certainly be declared broken. In other words, not doing well in school is only normalized for students of color—when it happens to white students the very system itself is viewed as not doing what it is designed to do. This is a form of acceptable death, the death of intellectual potential, which our society does not question and continues to perpetuate. It is active educational neglect.One of the key processes that support systems of schooling that do not allow Black students to reach their full potential are the overtly racist systems of discipline and punishment in schools. This is where the core concerns of the BlackLivesMatter movement and my focus on schools align. Many have written about the multiple ways that Black students, boys and girls, are more harshly disciplined, and are more likely to be kicked out of class, suspended, and expelled, most often for infractions like “disrespect” or other ambiguous offenses. The propensity to discipline Black children and adolescents in schools is deeply tied to the anti-black racism prevalent in our society, and the ways that such racism spawns explicit and implicit bias. The ease with which teachers and administrators punish Black children, and the ease with which we accept that some children (Black ones) are more likely to “underachieve” in school reflect a set of assumptions and implicit biases that tend to go unnoticed and invisible. It is the same implicit and explicit bias that causes police officers to be comfortable attributing criminality to Black bodies, and for our criminal just system to fail to punish the police officers that kill Black men and women. At the root of both is a form of dehumanization that argues there is no value to be found in Black life, or in Black minds.Thus, the BlackLivesMatter movement is a call to rehumanization. It is a grassroots movement led by a generation that understands that the call for acknowledging the humanity of Black people is far too important to rest with one charismatic leader. And it is a movement that rests on more than a set of action items. It is a massive effort to stir the consciousness of our nation, to wake up to the brutality that continues in mundane and dramatic ways every single day. #AllLivesMatter is Bad Utterances of “All Lives Matter” are the wrong starting point and never account for black lives. This obscures the critical conversations needed to speak back against anti-black forces and dangerous forms of whiteness. Yancy & Butler 2015 ( George professor of philosophy at Duquesne University; Judith Maxine Elliot Professor in the department of comparative literature and the program of critical theory at the University of California, Berkeley) What’s Wrong With ‘All Lives Matter’? in New York Times January 12, 2015 http://opinionator.blogs.nytimes.com/2015/01/12/whats-wrongwith-all-lives-matter/?_r=1 J.B.: Racism has complex origins, and it is important that we learn the history of racism to know what has led us to this terrible place. But racism is also reproduced in the present, in the prison system, new forms of population control, increasing economic inequality that affects people of color disproportionately. These forms of institutionalized destitution and inequality are reproduced through these daily encounters — the disproportionate numbers of minorities stopped and detained by the police, and the rising number of those who fall victim to police violence. The figure of the black person as threat, as criminal, as someone who is, no matter where he is going, already-on-theway-to-prison, conditions these pre-emptive strikes, attributing lethal aggression to the very figure who suffers it most. The lives taken in this way are not lives worth grieving; they belong to the increasing number of those who are understood as ungrievable, whose lives are thought not to be worth preserving.But, of course, what we are also seeing in the recent and continuing assemblies, rallies and vigils is an open mourning for those whose lives were cut short and without cause, brutally extinguished. The practices of public mourning and political demonstration converge: when lives are considered ungrievable, to grieve them openly is protest. So when people assemble in the street, arrive at rallies or vigils, demonstrate with the aim of opposing this form of racist violence, they are “speaking back” to this mode of address, insisting on what should be obvious but is not, namely, that these lost lives are unacceptable losses.On the one hand, there is a message, “Black Lives Matter,” which always risks being misheard (“What? Only black lives matter?”) or not heard at all (“these are just people who will protest anything”). On the other hand, the assembly, even without words, enacts the message in its own way. For it is often in public spaces where such violence takes place, so reclaiming public space to oppose both racism and violence is an act that reverberates throughout the public sphere through various media. G.Y.: I’ve heard that some white people have held signs that read “All Lives Matter.”J.B.: When some people rejoin with “All Lives Matter” they misunderstand the problem, but not because their message is untrue. It is true that all lives matter, but it is equally true that not all lives are understood to matter which is precisely why it is most important to name the lives that have not mattered, and are struggling to matter in the way they deserve. Whiteness is less a property of skin than a social power reproducing its dominance in both explicit and implicit ways. Claiming that “all lives matter” does not immediately mark or enable black lives only because they have not been fully recognized as having lives that matter. I do not mean this as an obscure riddle. I mean only to say that we cannot have a raceblind approach to the questions: which lives matter? Or, which lives are worth valuing? If we jump too quickly to the universal formulation, “all lives matter,” then we miss the fact that black people have not yet been included in the idea of “all lives.” That said, it is true that all lives matter (we can then debate about when life begins or ends). But to make that universal formulation concrete, to make that into a living formulation, one that truly extends to all people, we have to foreground those lives that are not mattering now, to mark that exclusion, and militate against it. Achieving that universal, “all lives matter,” is a struggle, and that is part of what we are seeing on the streets. For on the streets we see a complex set of solidarities across color lines that seek to show what a concrete and living sense of bodies that matter can be. #AllLivesMatter is an erasure of racial justice from the movement Julia Craven Staff Reporter, The Huffington Post, Updated: 01/25/2015 Please Stop Telling Me That All Lives Matter 11/25/2014 11:43 pm EST http://www.huffingtonpost.com/juliacraven/please-stop-telling-me-th_b_6223072.html When I say "Black lives matter," it is because this nation has a tendency to say otherwise. Racial discrimination does affect all minorities but police brutality, at such excessive rates, does not.¶ A black person is killed extrajudicially every 28 hrs, and Black men between ages 19 and 25 are the group most at risk to be gunned down by police. Based on data from the Center on Juvenile and Criminal Justice, young Blacks are 4.5 times more likely to be killed by police than any other age or racial group.¶ African-Americans have comprised 26 percent of police shootings though we only makeup 13 percent of the U.S. population, based on data spanning from 1999 to 2011.¶ In the 108 days since Mike Brown was killed by Darren Wilson and left on display in the middle of the street for four and a half hours, at least seven Black males have been shot and killed by law enforcement officers.¶ Officers are provided the unrestricted right to use force at their discretion -- and will not hesitate to do so -- and Black bodies are more susceptible to greeting the business end of those state-issued firearms.¶ Multiple factors such as clothing, location and individual behavior determine who gets stopped by the police and when, according to Jack Glaser, an associate professor at University of California-Berkeley's Goldman School of Public Policy.¶ "The way the process works ... is if you take two equivalent people -- a young white man and a young black man -- who are dressed identically, the black man would still have a greater chance of being stopped," Glaser said. "And it's because his race is a basis of suspicion and it interacts with those other qualities in a way that makes them all seem more suspicious because it biases the judgment of everything."¶ Granted, extrajudicial killings have dropped 70 percent in the last 40 to 50 years. Nearly 100 young black men were killed annually by police in the late 1960s, and these young men also comprised 25 percent of police killings between 1968 and 1974.¶ Shootings fell to 35 per year in the 2000s though the risk is still higher for Black Americans than it is for whites, Latinos and Asians. My people are killed at 2.8 times the rate of white non-Latinos and 4.3 times the rate of Asians.¶ I say all of this to say, though it has become less prevalent, police brutality has never affected another racial group like it affects us.¶ Race brings on individual issues for each minority group. Saying "all lives matter" causes erasure of the differing disparities each group faces. Saying "all lives matter" is nothing more than you centering and inserting yourself within a very emotional and personal situation without any empathy or respect. Saying "all lives matter" is unnecessary:¶ "#AllLivesMatter because I don't see race ����❤️" Erasure is not progressive. This isn't something to be proud of.¶ — rosemary l'étrangère (@whoisroseama) November 25, 2014¶ Non-black kids aren't being killed like black kids are. Of course I'd be just as pissed if cops were gunning down white kids. Duh, but they aren't. White assailants can litter movie theaters and bodies with bullets from automatic weapons and be apprehended alive but black kids can't jaywalk or have toy guns in open carry states?¶ There is seemingly no justice for Black life in America. An unarmed Black body can be gunned down without sufficient reasoning and left in the middle of the street on display for hours -- just like victims of lynching.¶ Strange fruit still hangs from our nations poplar trees. Lynching underwent a technological revolution. It evolved from nooses to guns and broken necks to bullet wounds.¶ Police brutality is a BLACK issue. This is not an ill afflicting all Americans, but that does not mean you cannot stand in solidarity with us. But standing with us does not mean telling us how we should feel about our community's marginalization. Standing with us means being with us in solidarity without being upset that this is for OUR PEOPLE -- and wanting recognition for yours in this very specific context. #AllLivesMatter prioritizes white lives over black lives – this is an erasure of difference that hollows out the movement Nazar Aljassar | Mar 24 2015 Stop saying “All Lives Matter” http://www.cavalierdaily.com/article/2015/03/aljassar-stop-saying-all-lives-matter When I march in protest with my peers and say “black lives matter,” I do so because there is no shortage of Americans who believe that black lives are disposable. The wanton use of excessive force by police officers against young black males is well-documented: despite comprising 13 percent of the national population, black Americans are victims of roughly one in four police shootings. In our own community, we have seen one of our black students, Martese Johnson, bloodied by Virginia Alcoholic Beverage Control agents whose racial biases, implicit or explicit, likely affected their ill disposition towards him — and even if they didn’t in this instance, the possibility of prejudice alone illustrates just how heavily race hangs over the heads of those who regularly run into racism. I say “black lives matter” because America has declared open season against young black males, and I am embittered by disrespectful University students who insist on replacing “black lives matter” with “all lives matter.”¶ “All lives matter” masquerades as a good-natured mantra that unites different communities against injustice and all of its manifestations; beneath a superficial level, it is an insensitive appropriation of a phrase created by black Americans in search of solidarity following the tragedies that have befallen young black males. A friend explained it to me as analogous to an individual approaching a charity bake sale for cancer and imploring the organizers to consider the struggles that other patients face. Those who say “all lives matter” hijack an expression that affirms black lives in a world where cultural and institutional practices disadvantage them. These individuals subsume struggles specific to black Americans under a broader, whitewashed vision for equality and racial colorblindness that is more palatable to non-black Americans.¶ I don’t mean to accuse all who have said “all lives matter” of co-opting a phrase that does not belong to them. Those who say “all lives matter” may not be aware of the implications of those words and may have just picked up the phrase from social media, unlike those who pretend racism in law enforcement does not exist. The latter are the kind of people who say that they “don’t see race,” the kind of people who rear their ugly heads each time a black body bears the brunt of violence. These are the people who drown out black voices through whitewashing; by saying “all lives matter,” they create a more sanitized view of social inequalities.¶ Expressing the slogan that emerged from the shooting of Michael Brown in Ferguson as “all lives matter” places non-black Americans at the center of a tragedy that does not bear any consequences for them. “All lives matter” diminishes the racial element of the issues that permeate the American criminal justice system. The application of justice in our nation is unequal, so it only makes sense that we direct our concern towards affirming the value of black lives. “Since this country's founding the law has been used to protect the life, liberty, and property of white men, yet that same law has been warped and manipulated to disenfranchise black people from those basic rights,” University NAACP Chapter President Vj Jenkins said. “While [some white men and women] see the police and see safety, a person to call to for aid, so many of my people see the lessons history has taught them. They see Brown v. Mississippi where police officers hung a man by a tree and beat him until he confessed to a crime he did not commit.”¶ Injustices associated with law enforcement affect all, but black Americans are by far the greatest victims. It would be dishonest to neglect differences in the way black and non-black bodies are treated by American institutions. The very fact that certain people are able to ignore racial disparities and declare that all lives matter demonstrates that not all lives matter the same. According to Jenkins, “[Black Americans] have been brutalized in a manner not befitting of wild animals. History has told us that our lives mean nothing.”¶ I would love to live in a racially colorblind world where all lives matter. But this world does not exist. Race matters, and so for as long as injustice threatens justice, I will choose the side of the oppressed. For as long as strange fruit continues to hang from America’s poplar trees, I will assert that black lives matter. AT: But You Are White / Kick White People Out White allies can be invested in demonstrations against anti-black racism that can recede whiteness in order to engage in a cross racial struggle of solidarity. Yancy & Butler 2015 ( George professor of philosophy at Duquesne University; Judith Maxine Elliot Professor in the department of comparative literature and the program of critical theory at the University of California, Berkeley) What’s Wrong With ‘All Lives Matter’? in New York Times January 12, 2015 http://opinionator.blogs.nytimes.com/2015/01/12/whats-wrongwith-all-lives-matter/?_r=1 Whiteness is not an abstraction; its claim to dominance is fortified through daily acts which may not seem racist at all precisely because they are considered “normal.” But just as certain kinds of violence and inequality get established as “normal” through the proceedings that exonerate police of the lethal use of force against unarmed black people, so whiteness, or rather its claim to privilege, can be disestablished over time. This is why there must be a collective reflection on, and opposition to, the way whiteness takes hold of our ideas about whose lives matter. The norm of whiteness that supports both violence and inequality insinuates itself into the normal and the obvious. Understood as the sometimes tacit and sometimes explicit power to define the boundaries of kinship, community and nation, whiteness inflects all those frameworks within which certain lives are made to matter less than others.It is always possible to do whiteness otherwise, to engage in a sustained and collective practice to question how racial differentiation enters into our daily evaluations of which lives deserve to be supported, to flourish, and which do not. But it is probably an error, in my view, for white people to become paralyzed with guilt and self-scrutiny. The point is rather to consider those ways of valuing and devaluing life that govern our own thinking and acting, understanding the social and historical reach of those ways of valuing. It is probably important and satisfying as well to let one’s whiteness recede by joining in acts of solidarity with all those who oppose racism. There are ways of fading out whiteness, withdrawing its implicit and explicit claim to racial privilege.Demonstrations have the potential to embody forms of equality that we want to see realized in the world more broadly. Working against those practices and institutions that refuse to recognize and mark the powers of state racism in particular, assemblies gather to mourn and resist the deadly consequences of such powers. When people engage in concerted actions across racial lines to build communities based on equality, to defend the rights of those who are disproportionately imperiled to have a chance to live without the fear of dying quite suddenly at the hands of the police. There are many ways to do this, in the street, the office, the home, and in the media. Only through such an ever-growing cross-racial struggle against racism can we begin to achieve a sense of all the lives that really do matter. That’s Irrelevant – It is not a question of whether or not white individuals can ally with social movements – its only a question of whether they re-center the discussion around themselves like the #AllLivesMatter movement Christian Piatt 02/15/2015 The Death of Jordan Baker and Why "All Lives Matter" Isn't Enough Rather than "Black lives matter," they argue, we should say "All lives matter." So why is this inappropriate? There are a number of reasons, actually.¶ First, these cries are direct responses to the loss of black lives. It's a nonviolent corporate response to power that was wielded violently. It's a response to a judicial system that historically incarcerates black men at a rate staggeringly higher than their white counterparts, for the same crimes. It's a response of a community conditioned to fear the very ones sworn to protect them. Such grief, despair and helplessness demands a response from within us. WE MATTER is a call to be recognized, valued and cared for. ¶ Second, there is no implication in the phrase "Black lives matter" that they matter any more than any other lives. Rather, it's a response to a societal phenomenon that seems, if without words, to say those black lives matter less. It's a call to nonviolent resistance, in the spirit of King, Gandhi, and even Jesus.¶ Third, the co-opting of "Black lives matter" into "All lives matter" touches a deep historical nerve, of which those with racial privilege may not be aware. But as the old saying goes, ignorance is no excuse. Granted, the practice of slavery by means of force is no longer legal in our culture, but it has not stopped the dominant culture from taking valuable contributions to American society and co-opting it, adapting it and quite often profiting greatly from it. From science and literature to the arts and entertainment, the pattern is well established.¶ So it's understandable if African-Americans bristle at the perhaps well-intended desire of others to change their call for equality and justice into something broader, and therefore, absent of it's particular potency for the situation at hand.¶ Rather than resisting or trying to change such cries, there is an opportunity for those of us in historically privileged and powerful positions in the culture to listen, learn and better understand the longing behind the words. The responsibility is on us to help make room for such voices, to help amplify them and to use what power and privilege we have to exact the kind of change that, ultimately would lead to a society in which chants as "Black lives matter" would no longer be necessary. White allies are good as long as they aren’t central features of the movement Julie Walker is a New York-based freelance journalist March 17 2015 #BlackLivesMatter Founders: Please Stop Co-opting Our Hashtag http://www.theroot.com/articles/culture/2015/03/_blacklivesmatter_founders_please_stop_co _opting_our_hashtag.html Meanwhile, Garza said she is looking for more “white co-conspirators” to help with unification efforts. “I think we spend a lot of time figuring out how to move white people, and just because of the social power dynamics, I don’t think that we’re best positioned to do that,” Garza said. “I think other white folks who are invested in dismantling systems of oppression are best positioned to engage with other white people.” AT: It Will Be Coopted Cooptation is Irrelevant – Adding more voices is key to raising awareness, even if some of them are initially disingenuous Theodore R. Johnson is a writer, doctoral candidate, and former White House Fellow. December 12 2014 Don't Let "Black Lives Matter" Become Another Ice Bucket Challenge http://www.newrepublic.com/article/120575/black-lives-matter-i-cant-breathe-are-not-nextice-bucket-challenge Lives Matter" is not a motto. "Hands Up, Don’t Shoot" is not an advertising catchphrase. These declaratives are pleas for justice. And die-ins and traffic-defying protests are serious political actions, not merely photo ops. The movement is not for sale or to win popularity contests. ¶ ¶ It was inevitable that Black Lives Matter, once it became widespread, would attract people who simply want to be a part of a social movement, whatever it may be. But even these bandwagon activists can be leveraged. The ice bucket challenge, after all, brought in $115 million for the ALS Association.¶ ¶ Black Lives Matter is less about raising money than raising awareness, continuing the debate, and demanding action. Even if the movement's less committed participants are effectively free advertising, their presence can widen support. It's a truism of civil disobedience that sometimes quantity is a more persuasive argument than reason. But the ¶ ¶ "I Can’t Breathe" is not a promotional tool. "Black most important characteristic is always purity of conviction. Now is the Key Time Revolutionary Politics are key to changing institutions of power The Amendment Gazette January 1, 2015 Standing on the Edge of Next American Revolution http://www.amendmentgazette.com/2015/01/01/sparking-third-americanrevolution/ This revolution has already begun for many, not most, people. The Next American Revolution will not be a solitary journey; far from it. Demonstrations, protests, marches and disruption of business as usual have already shaken the nation, but the movement for racial justice has not yet reached the momentum and visibility of either Occupy Wall Street or the tea party in their heydays. The list of critical issues above strongly suggests that the United States is sliding toward fascism. Genuine democrats and republicans who believe in self-government in a democratic republic must support a revolutionary movement and come to distrust the elites in both major parties who back the corporate interests (profit and survival) over the public interests (peace, democratic policy making, keeping the Earth habitable, etc). What, then, will spark a revolutionary movement to outlaw plutocracy, abolish the corporate-state, establish political equality and save the world from the ravages of war and predatory, transnational corporate capitalism, i.e., the neo-liberal world order we call corporate feudalism? That question is impossible to answer. It could come from an article on a blog; but were it that simple, the Next American Revolution would have been sparked by Chris Hedges’ essays on Truthdig by now. Perhaps it will be triggered by another Wall St.-induced financial crash. Perhaps a flood of independent politicians will somehow manage to win office, including the White House, a pipe dream in this era of legalized corruption and multimillion dollar campaigns. Perhaps a public space will be occupied again (Occupy Congress?), or enough people will come to realize that the Framers’ republic has been transformed into an oligarchic, corporate-empire and rise up in rebellion in time. Perhaps the left will learn to work with the right on the issues of mutual agreement. (See first video in the “Further viewing” section below for elaboration on that version of the Next American Revolution.)¶ How this revolution will be waged is open to tactics employed by the dispossessed, the oppressed, the disgruntled and the rest of those involved. The revolutionaries must be nonviolent, or else they risk pushing the U.S. government into full-blown, fascist police state in reaction to them. In all likelihood, any violence will be initiated by the police. Revolutionary activists can use the freedoms we still have left: assembly, petition, speech, theater, the ballot box and civil disobedience — all employing a variety of tactics. “What Makes Nonviolent Movements Explode?” reviews the tactics of disrupting business as usual and need for “personal sacrifice.” Will enough folks sacrifice some time they normally spend watching television, exercising, reading, etc? It’s worth taking the time to read as a companion piece to this call for civil participation. Revolution must become part of many more people’s lives until the American corporate-state is returned to We the People. Hashtag Activism is Effective “Hashtag Activism” proves to be valuable and influential Olin 14 [Olin, Laura. “#BringBackOurGirls: Hashtag Activism Is Cheap–And That’s a Good Thing.” May 9 2014. http://time.com/94059/bringbackourgirls-hashtag-activism-is-cheap-andthats-a-good-thing/. 6/23/15 IH] “Where are the stolen girls of Nigeria? And why don’t we care more?” BoingBoing.net asked on April 30th, two weeks after more than 300 girls were kidnapped from their school dormitory in Nigeria. The next day, a group of African American women on Twitter wondered what the coverage would look like if hundreds of white girls had gone missing: “There’d already be a Lifetime movie in the works.” Seven days later, virtually no news-consuming person in the West could be ignorant of the story, Nigerian President Goodluck Jonathan had been forced to commit more resources toward the search, and the U.S., France, and the U.K. had all promised aid as well. What changed in those seven days? The unserious-sounding but ultimately serious answer seems to be: a hashtag campaign. #BringBackOurGirls started in Nigeria on April 23rd by desperate parents and activists who didn’t believe their president when he said he was taking action to recover the kidnapped girls. They wanted to put pressure on the government to do more. They tried everything they could think of to raise awareness of the kidnappings within and beyond Nigeria. One of those things was #BringBackOurGirls. It worked, likely beyond anything they’d imagined or hoped for. Encapsulating both a story and a cause in just four words, the hashtag at first began to take hold on Twitter only within Nigeria. Activists wrote it on signs to bring to street protests. Then it began to spread within Africa. April 30th, two weeks after the kidnapping, was a turning point. News broke that the terrorist group that took the girls, Boko Haram, planned to sell them into forced marriages for $12 apiece. Over the next few days, #BringBackOurGirls went from 10,000 mentions a day to 100,000 or 200,000. It jumped oceans, and thousands of non-Africans began using it. As often happens, celebrities got involved, to dubious effect: Kim Kardashian, Christiane Amanpour, Chris Brown–with no apparent recognition of hypocrisy–and, mostly recently, Anne Hathaway. Two weeks after its first use, #BringBackOurGirls had gathered 2 million mentions. In recent days, #BringBackOurGirls has verged into feeling like Twitter’s cause célèbre, something people participate in regardless of whether they know the larger context or the campaign’s aims. Critics have begun dismissing it as empty online activism that won’t, in the end, bring back #BringBackOurGirls has felt like one of the first Twitter causes that has a chance of actually changing outcomes, the girls. We can’t know if the hashtag will ultimately help deliver the girls back their parents. But especially since former and current Secretaries of State Hillary Clinton and John Kerry got involved and Michelle Obama tweeted a photo of herself holding a sign with #BringBackOurGirls written on it in big block letters. Secretary Kerry followed up his tweet with an announcement that the State Department would send military and law enforcement personnel to help advise Nigerian officials in the search for the girls. The First Lady’s photo led to another, even more widespread round of media coverage: the New York Post, for example, ran the tweet as the full cover of their front page with the headline, “YES, MICHELLE!” But beyond that, the First Lady’s participation felt like a public rebuke of President Jonathan and his wife Patience, who has faced criticism for reportedly ordering the arrest of activists protesting the government’s response to the kidnappings and even accusing protesters of making up the abductions. Ignore millions of regular people participating in a hashtag campaign? Sure. Ignore Michelle Obama? Two Secretaries of State? However trivial hashtags can feel, their most basic function is as a tool for focusing attention. Crucially, they’re also free and open to anyone to use. So desperate Nigerian parents, without extraordinary power or resources can draw the kind of attention that leads to real pressure and real power. That feels a little bit world-changing. And activists who started the hashtag have gotten out of it exactly what they’d hoped for. In the space of a week, they made it impossible for President Jonathan to continue chalking up their daughters’ abduction as the latest Boko Haram atrocity to be grimly accepted and eventually forgotten. It’s not everything, but it’s before it wasn’t talking about them at all. a start. And the world is now talking about 276 stolen girls in Nigeria when Impacts Sexton Social death is gratuitous violence; this is violence that is unwarranted, created through ontological destruction. There is a qualitative ontological distinction between CONTINGENT violence and GRATUITIOUS violence. We are controlling the uniqueness of the impacts and control the FRAMING of all other impacts Jared Sexton 2010 (“‘The Curtain of the Sky’: An Introduction” in Critical Sociology 36; 11. Jared Sexton, Associate Professor of African-American studied and Critical Theory at the UCIrvine) To suffer the loss of political sovereignty, the exploitation of labor, the dispossession of land and resources is deplorable; yet, we might say in this light that to suffer colonization is unenviable unless one is enslaved. One may not be free, but one is at least not enslaved. More simply, we might say of the colonized: you may lose your motherland, but you will not ‘lose your mother’ (Hartman 2007). The latter condition, the ‘social death’ under which kinship is denied entirely by the force of law, is reserved for the ‘natal alienation’ and ‘genealogical isolation’ characterizing slavery. Here is Orlando Patterson, from his encyclopedic 1982 Slavery and Social Death:nI prefer the term ‘natal alienation’ because it goes directly to the heart of what is critical in the slave’s forced alienation, the loss of ties of birth in both ascending and descending generations. It also has the important nuance of a loss of native status, of deracination. It was this alienation of the slave from all formal, legally enforceable ties of ‘blood,’ and from any attachment to groups or localities other than those chosen for him [sic] by the master, that gave the relation of slavery its peculiar value to the master. The slave was the ultimate human tool, as imprintable and as disposable as the master wished. And this was true, at least in theory, of all slaves, no matter how elevated. (Patterson 1982: 7–8) True even if elevated by the income and formal education of the mythic American middle class, the celebrity of a Hollywood icon, or the political position of the so-called Leader of the Free World.4 The alienation and isolation of the slave is not only vertical, canceling ties to past and future generations and rendering thereby the notion of ‘descendants of slaves’ as a strict oxymoron. It is also a horizontal prohibition, canceling ties to the slave’s contemporaries as well. Reduced to a tool, the deracination of the slave, as Mannoni and Fanon each note in their turn, is total, more fundamental even than the displacement of the colonized, whose status obtains in a network of persecuted human relations rather than in a collection or dispersal of a class of things. Crucially, this total deracination is strictly correlative to the ‘absolute submission mandated by [slave] law’ discussed rigorously in Saidiya Hartman’s 1997 Scenes of Subjection: the slave estate is the most perfect example of the space of purely formal obedience defining the jurisdictional field of sovereignty (Agamben 2000). Because the forced submission of the slave is absolute, any signs whatsoever of ‘reasoning … intent and rationality’ are [is] recognized‘solely in the context of criminal liability’. That is, ‘the slave’s will [is] acknowledged only as it [is] prohibited or punished’ (Hartman 1997: 82, emphasis added). A criminal will, a criminal reasoning, a criminal intent, a criminal rationality: with these erstwhile human capacities construed as indices of culpability before the law, even the potentiality of slave resistance is rendered illegitimate and illegible a priori. The disqualification of black resistance by the logic of racial slavery is not unrelated to the longstanding cross-racial phenomenon in which the white bourgeois and proletarian revolutions on both sides of the Atlantic can allegorize themselves as revolts against slavery, while the hemispheric black struggle against actually existing slavery cannot authorize itself literally in those same terms. The latter must code itself as the apotheosis of the French and American revolutions (with their themes of JudeoChristian deliverance) or, later, the Russian and Chinese revolutions (with their themes of secular messianic transformation)or, later still, the broad anticolonial movements in Africa, Asia, and Latin America of the mid-20th century (with their themes of indigenous reclamation and renaissance).5 One of the defining features of contemporary political and intellectual culture remains this metaphoric transfer that appropriates black suffering as the template for non-black grievances, while it misrecognizes the singularity of black struggles against racial slavery and what Loïc Wacquant calls its ‘functional surrogates’ or what Hartman terms its ‘afterlife’. Put differently, ‘the occult presence of racial slavery’ continues to haunt our political imagination: ‘nowhere, but nevertheless everywhere, a dead time which never arrives and does not stop arriving’ (Marriott 2007: xxi). Hartman’s notion of slavery’s afterlife and Wacquant’s theorization of slavery’s functional surrogates are two productive recent attempts to name the interminable terror of slavery, but we are still very much within the crisis of language – of thinking and feeling, seeing and hearing – that slavery provokes. Both scholars challenge the optimistic idea of a residual ‘legacy’ of slavery, precisely because it requires the untenable demarcation of an historic end in Emancipation. The relations of slavery live on, Hartman might say, after the death knell of formal abolition, mutating into ‘the burdened individuality of freedom’. The functions of the chattel system are largely maintained, Wacquant might say, despite the efforts of Reconstruction, preserved in surrogate institutional form under Jim Crow, the ghetto, and the prison. Slavery lives on, it survives, despite the grand attempts on its institutional life forged by the international movements against slavery, segregation and mass imprisonment (Davis 2003).But what if slavery does not die, as it were, because it is immortal, but rather because it is non-mortal, because it has never lived, at least not in the psychic life of power? What if the source of slavery’s longevity is not its resilience in the face of opposition, but the obscurity of its existence? Not the accumulation of its political capital, but the illegibility of its grammar? On this account, for those that bear the mark of slavery – the trace of blackness – to speak is to sound off without foundation, to appear as a ghost on the threshold of the visible world, a spook retaining (only) the negative capacity to absent thepresence, or negate the will to presence, of every claimto human being, even perhaps the fugitive movement of stolen life explored masterfully by Fred Moten (2008). We might rethink as well the very fruitful notion of ‘fugitive justice’ that shapes the prize-winning 2005 special issue of Representations on ‘Redress’. Co-editors Saidiya Hartman and Stephen Best are posing the right question: ‘How does one compensate for centuries of violence that have as their consequence the impossibility of restoring a prior existence, of giving back what was taken, of repairing what was broken?’ (Hartman and Best 2005: 2)That is to say, they are thinking about ‘the question of slavery in terms of the incomplete nature of abolition’, ‘the contemporary predicament of freedom’ (2005: 5, emphasis added). Yet, the notion subsequently developed of a fugitive life ‘lived in loss’ – spanning the split difference between grievance and grief, remedy and redress, law and justice, hope and resignation – relies nonetheless on an outside, however improbable or impossible, as the space of possibility, of movement, of life. Returning to our schematization of Fanon, we can say that the outside is a concept embedded in the problématique of colonization and its imaginary topography, indeed, the fact that it can imagine topographically at all.But, even if the freedom dreams of the black radical imagination do conjure images of place (and to do here does not imply that one can in either sense of the latter word: able or permitted); what both the fact of blackness and the lived experience of the black name for us, in their discrepant registers, is an anti-black world for which there is no outside. ‘The language of race developed in the modern period and in the context of the slave trade’ (Hartman 2007: 5). And if that context is our context and that context is the world, then this is the principal insight revealed by the contemporary predicament of freedom: there is no such thing as a fugitive slave.To be sure, Humans do not live under conditions of equality in the modern world. In fact, modernity is, to a large degree, marked by societies structured in dominance: [hetero]patriarchy and white supremacy, settler colonialism and extra-territorial conquest, imperialist warfare and genocide, class struggle and the international division of labor. Yet, for Wilderson, there is a qualitative difference, an ontological one, between the inferiorization or dehumanization of the masses of people ‘in Asia…in America and the islands of the sea’, including the colonization of their land and resources, the exploitation of their labor and even their extermination in whole or in part, and the singular commodification of human being pursued under racial slavery, that structure of gratuitous violence in which bodies are rendered as flesh to be accumulated and exchanged. Social Death Anti-Blackness is the Controlling Impact for how we should interpret all forms of violence Crockett 14 ( J’Nasah , writer, performer, and cultural worker who focuses on Black cultural production and Black radical traditions. “Raving Amazons”: Anti-blackness and Misogynoir in Social Media June 30,2014https://modelviewculture.com/pieces/ravingamazons-antiblackness-and-misogynoir-in-social-media. Anti-blackness, in a rough-hewn nutshell, is the structuring logic of the modernity and the foundation of the contemporary world we live in. It is the glue and the string running through our conceptions of what it means to be free, what it means to be a citizen, what it means to be a legitimate and productive member of society, what it means to be Human, and what it means to be the anti-Human. Anti-blackness is the structural positioning of the Black (“the Black” here being a marker for a certain type of subjectivity comparable to Marx’s “the worker” – shoutout Frank Wilderson) as an object that is fungible and able to be accumulated like any other wicket churned out by the process of capitalism; it is the fact of Black folks being open to perpetual and gratuitous violence that needs no definitive prior provocation or “reason;” the “reason” is the fact of Blackness (see:getting shot for walking home with some Skittles, getting shot while being handcuffed in the backseat of a car, getting shot for calling 911, being beaten for staring at someone in a “dehumanizing” way, and on and on).It is, to echo Hartman, the afterlife of slavery: a logic that collapses the past and the present and places violence towards the Black within a range of acceptable daily practices. Certainly anti-blackness is attitudinal – see the libidinal economy, i.e. the systems of desire and instincts and fantasies and repulsion around skin tone, hair types, bodies that makes itself apparent in Eurocentric beauty standards or the fact that lighter-skinned African American women receive shorter prison sentences than their darker-skinned counterparts. But that’s how logic and structures operate, they imbue everything that springs forth from them. Our lives and societies (because when we speak of the afterlife of race-based chattel slavery, Arab and transAtlantic, we are speaking of the entire world) are fundamentally shaped by it, not only institutionally, but also at the level of the everyday, including crossing the street. So of course it makes itself apparent in the supposedly brave new world (so different from any world that came before!) of social media.I myself joined both Twitter and Tumblr back in 2009, after experiences stretching back to high school with BlackPlanet.com, Myspace, Livejournal, and of course Facebook. With Twitter and Tumblr, however, I joined after spending a year or two lurking on the edges of a particular group of (mostly) women of color, and moving onto social media around the same time they did allowed me to connect with them in ways I wasn’t able to when the main platform was, say, WordPress. For us, and for the many Black women I have since connected and built with since 2009, social media offers us yet another way to build our “beloved communities,” to extend the networks of love, camaraderie, and joyous support that have long existed in our meatspace communities – hair salons, churches, Black student unions, kitchen tables, etc. Social media also becomes a central site for much of our activism, from the multinational #BringBackOurGirls hashtag to holding media outlets accountable for publishing blatant racism. We are also theory houses, circulating and challenging discourses and practices that negatively impact our lives as Black women, and making critical connections that are often missing from the media that surrounds us. I can’t help but see historical parallels to, say, early 20th century Pullman Porters secretly distributing copies of The Chicago Defender to the Black folks they came across. What we’re doing is nothing new, but being on social media means that this networking is happening in the public eye. I also can’t help but see historical parallels in the multiple forms of anti-black The topic of surveillance in social media has been a hot one lately, but many discussions on it stop and end at the Edward Snowden/NSA type revelations over post-9/11, post-War on Terror invasions of privacy at the hands of an overzealous government. However, if we were to extend the idea of policing and surveillance further back in time, and expand it beyond the trope of it being primarily carried out by government employees, it becomes apparent that surveillance has already been a central part of the experience of Black women on Twitter. Recall that in the U.S., the police have their roots in slave patrols; policing and management of the potentially unruly Black bodies underlies the call for law and order and the backlash Black women have received on social media over the past few years. constituent need for police. To quote Wilderson again, in society there is a “fundamental anxiety over where is the Black and what is he or she doing,” and in an anti-black world, every non-Black is deputized to patrol and manage the Blacks. Blackness is social death and unimaginable exclusion Vargas and James ‘13 [João Costa and Joy, University of Texas and Williams University, Refusing Blackness-as-Victimization: Trayvon Martin and the Black Cyborgs, Chapter 14 in Pursuing Trayvon Martin: Historical Contexts and Contemporary Manifestations ed. George Yancy and Janine Jones] What happens when, instead of becoming enraged and shocked every time a black person is killed in the United States, we recognize black death as a predictable and constitutive aspect of this democracy? What will happen then if instead of demanding justice we recognize (or at least consider) that the very notion of justice-indeed the gamut of political and cognitive elements that constitute formal, multiracial democratic practices and institutions-produces or requires black exclusion and death as normative? To think about Trayvon Martin's death not merely as a tragedy or media controversy but as a political marker of possibilities permits one to come to terms with several foundational and foretold stories, particularly if we understand that death or killing to be prefigured by mass or collec- tive loss of social standing and life. One story is of impossible redemption in the impossible polis. It departs from, and depends on, the position of the hegemonic, anti-black-which is not exclusively white but is exclusively non-black-subject and the political and cognitive schemes that guarantee her ontology and genealogy. Depending on the theology, redemption requires deliverance from sin, and/or deliverance from slavery. 1 Redemption is a precondition of integration into the white-dominated social universe2 Integration thus requires that the black become a non-slave, and that the black become a nonsinner. The paradox or impossibility is that if blackness is both sin and sign of enslavement, the mark of "Ham,'; then despite the legal abolition of juridical enslavement or chattel slavery or the end of the formal colony, the sinner and enslaved endure; and virtue requires the eradication of both. If we theorize from the standpoint say of Frantz Fanon, through the lens of the fiftieth anniversary of the English publication, The Wretched of the Earth (or Ida B. Wells's Southern Horrors, Toni Morrison's Playing in the Dark, Frank Wilderson's Jncognegro, etc.), we can follow a clear heuristic formulation: from the perspective of the dominant, white-inflected gaze and predisposition, blacks can be redeemed neither from sin nor from slavery. 3 For a black person to be integrated, s/he must either become non-black, or display superhuman and/or infrahuman qualities. (In Fanonian terms she would become an aggrandized slave or enfranchised slave-that is, one who owns property still nonetheless remains in servitude or colonized.) The imagination, mechanics, and reproduction of the ordinary polis rely on the exclusion of ordinary blacks and their availability for violent aggression and/ or premature death or disappearance (historically through lynching and the convict prison lease system, today through "benign neglect" and mass incarceration). The ordinary black person can therefore never be integrated. The "ordinary negro" is never without sin. Thus, to be sinless or angelic in order to be recognized as citizenry has been the charge for postbellum blackness. Throughout the twentieth century, movements to free blacks from what followed in the wake of the abolition of chattel slavery ushered in the postbellum black cyborg: the call for a "Talented Tenth" issued by white missionaries and echoed by a young W. E. B. Du Bois, Bayard Rustin's imploring a young Martin Luther King Jr. to become "angelic" in his advocacy of civil rights and to remove the men with shotguns from his front porch despite the bombings and death threats against King, his wife Corella, and their young children. The angelic negro/negress is not representative and his or her status as an acceptable marker for U.S. democracy is predicated upon their usefulness for the transformation of whiteness into a loftier, more ennobled formation. This performance or service of the angelic black would be resurrected in the reconstruction of Trayvon Martin as a youth worthy of the right to life, the right of refusal to wear blackness as victimization; the right to fight back. That is, the right to the life of the polis; so much of black life, particularly for the average fellah, is mired in close proximity to the graveyard, hemmed in by the materiality of social margins and decay, exclusion and violence. Allowing Institutional racism allows for the dehumanization of blacks Blow 9(CHARLES M. BLOW , Times’s visual Op-Ed columnist, conducts a discussion about all things statistical — from the environment to entertainment — and their visual expressions., Cites studies written by Phillip Atiba Goff¶ The Pennsylvania State University¶ Jennifer L. Eberhardt¶ Stanford University¶ Melissa J. Williams¶ University of California, Berkeley¶ Matthew Christian Jackson¶ The Pennsylvania State University ‘Not Yet Human’¶ February 25, 2009 http://blow.blogs.nytimes.com/2009/02/25/not-yet-human/, //AR) Those following the New York Post cartoon flap might find this interesting.¶ Six studies under the title “Not Yet Human: Implicit Knowledge, Historical Dehumanization, and Contemporary Consequences” were published in last February’s Journal of Personality and Social Psychology.¶ Among the relevant findings:¶ Historical representations explicitly depicting Blacks as apelike have largely disappeared in the United States, yet a mental association between Blacks and apes remains. Here, the authors demonstrate that U.S. citizens implicitly associate Blacks and apes.¶ And …¶ After having established that individuals mentally associate Blacks and apes, Study 4 demonstrated that this implicit association is not due to personalized, implicit attitudes and can operate beneath conscious awareness. In Study 5, we demonstrated that, even controlling for implicit anti-Black prejudice, the implicit association between Blacks and apes can lead to greater endorsement of violence against a Black suspect than against a White suspect. Finally, in Study 6, we demonstrated that subtle media representations of Blacks as apelike are associated with jury decisions to execute Black defendants.This may provide some context for considering the motives of the cartoonist and his editors, and for understanding the strong public reaction. Institutional Racism Bad Racism has allowed blacks to be categorized into negative stereotypes making it impossible for prosperity Kaplan 9(Karen Kaplan | Kaplan is a Times staff writer, Racial stereotypes and social status, December 9 2008 http://articles.latimes.com/2008/dec/09/science/sci-race9, //AR Barack Obama's election as president may be seen as a harbinger of a colorblind society, but a new study suggests that derogatory racial stereotypes are so powerful that merely being unemployed makes people more likely to be viewed by others -- and even themselves -- as black.¶ In a long-term survey of 12,686 people, changes in social circumstances such as falling below the poverty line or being sent to jail made people more likely to be perceived by interviewers as black and less likely to be seen as white. Altogether, the perceived race of 20% of the people in the study changed at least once over a 19-year period, according to the study published today in the Proceedings of the National Academy of Sciences.¶ "After [junk bond financier] Michael Milken goes to prison, he'll be no more likely to say he's a black person or any less likely to say he's a white person," said Amon Emeka, a social demographer at USC who was not involved in the study. "[U.S. Supreme Court Justice] Clarence Thomas might say he's transcended race, but he wouldn't say that he's a white person, and certainly no one on the planet would say he's a white person."¶ Researchers have long recognized that a person's race affects his or her social status, but the study is the first to show that social status also affects the perception of race.¶ "Race isn't a characteristic that's fixed at birth," said UC Irvine sociologist Andrew Penner, one of the study's authors. "We're perceived a certain way and identify a certain way depending on widely held stereotypes about how people believe we should behave."¶ Penner and Aliya Saperstein, a sociologist at the University of Oregon, examined data from the federal Bureau of Labor Statistics' National Longitudinal Survey of Youth. Though the ongoing survey is primarily focused on the work history of Americans born in the 1950s and 1960s, participants have also provided interviewers with information on a variety of topics, including health, marital status, insurance coverage and race.¶ On 18 occasions between 1979 and 1998, interviewers wrote down whether the people they spoke with were "white," "black" or "other."¶ The researchers found that people whom the interviewers initially perceived as white were roughly twice as likely to be seen as nonwhite in their next interview if they had fallen into poverty, lost their job or been sent to prison. People previously perceived as black were twice as likely to continue being seen as black if any of those things had happened to them.¶ For example, 10% of people previously described as white were reclassified as belonging to another race if they became incarcerated. But if they stayed out of jail, 4% were reclassified as something other than white.¶ The effect has staying power. People who were perceived as white and then became incarcerated were more likely to be perceived as black even after they were released from prison, Penner said.¶ The racial assumptions affected self-identity as well. Survey participants were asked to state their own race when the study began in 1979 and again in 2002, when the government streamlined its categories for race and ethnicity.¶ Of the people who said they were white in 1979 and stayed out of jail, 95% said they were white in 2002. Among those who were incarcerated at some point, however, only 81% still said they were white in 2002.¶ The results underscore "the pervasiveness of racial stratification in society," said Emeka. "The fact that both beholders and the observers of blackness attach negative associations to blackness speaks volumes to the continuing impact of racial stratification in U.S. society."¶ But Robert T. Carter, a professor of psychology and education at Columbia Teachers College in New York who studies race, culture and racial identity, said he wasn't convinced that stereotypes had the power to change the perception of race.¶ "It's not social status that shapes race, it's race that shapes social status," he said. "Stratification on the basis of racial group membership has been an integral part of our society since prior to the inception of the United States. It's been true for hundreds of years."¶ To see if the changes were the result of simple recording errors made when interviewers filled out their surveys, the researchers checked how often a participant's gender changed from one year to the next. They found changes in 0.27% of cases, suggesting that interviewers weren't being sloppy.¶ They also looked for subjects who were interviewed by the same person two years in a row. Even in those cases, the results were the same.¶ The researchers are examining whether other social stereotypes have a similar effect on perceived race. People who have less education, live in the inner city instead of the suburbs and are on welfare are more likely to be seen as black, Saperstein said.¶ "The data is really interesting, but it doesn't allow us to say what was going on in these people's heads," she said. "Our story is consistent with the story that there's implicit prejudice." Racism must be rejected in every instance Barndt 91 (Joseph R. Barndt co-director of Ministry Working to Dismantle Racism "Dismantling Racism" p. 155 To study racism is to study walls. We have looked at barriers and fences, restraints and limitations, ghettos and prisons. The prison of racism confines us all, people of color and white people alike. It shackles the victimizer as well as the victim. The walls forcibly keep people of color and white people separate from each other; in our separate prisons we are all prevented from achieving the human potential God intends for us. The limitations imposed on people of color by poverty, subservience, and powerlessness are cruel, inhuman, and unjust; the effects of uncontrolled power, privilage, and greed, whicha are the marks of our white prison, will inevitably destroy us as well. But we have also seen that the walls of racism can be dismantled. We are not condemned to an inexorable fate, but are offered the vision and the possibility of freedom. Brick by brick, stone by stone, the prison of individual, institutional, and cultural racism can be destroyed. You and I are urgently called to joing the efforst of those who know it is time to tear down, once and for all, the walls of racism. The danger point of self-destruction seems to be drawing even more near. The results of centuries of national and worldwide conquest and colonialism, of military buildups and violent aggression, of overconsumption and environmental destruction may be reaching a point of no return. A small and predominantly white minority of the global population derives its power and privelage from the sufferings of vast majority of peoples of all color. For the sake of the world and ourselves, we dare not allow it to continue. Racism Bad Racism is the lynchpin of the modern biopolitical state, spawning the worst excesses of biopower. The aff is the path to eugenic control and genocide to legitimate state action Mendieta 02 [Eduardo Mendieta, SUNY at Stony Brook, ‘To make live and to let die’ –Foucault on Racism; Meeting of the Foucault Circle APA Central Division Meeting, Chicago, April 25, 2002] I have thus far discussed Foucault’s triangulation between the discourses of the production of truth, the power that these discourse enact and make available to social agents, and the constitution of a political rationality that is linked to the invention and creation of its horizon of activity and surveillance. I want now to focus on the main theme of this courses’ last lecture. This theme discloses in a unique way the power and perspicacity of Foucault’s method. The theme concerns the kind of power that biopower renders available, or rather, how biopolitics produces certain power effects by thinking of the living in a novel way. We will approach whereas the power of the sovereign under Medieval and early Modern times was the power to make die and to let live, the power of the total state, which is the biopower state, is the power to make live and to let die. Foucault discerned here a telling asymmetry. If the sovereign exercised his power the theme by way of a contrast: with the executioner’s axe, with the perpetual threat of death, then life was abandoned to its devices. Power was exhibited only on the scaffold, or the guillotine – its terror was the shimmer of the unsheathed sword. Power was ritualistic, ceremonial, theatrical, and to that extent partial, molecular, and calendrical. It was also a power that by its own juridical logic had to submit to the jostling of rights and claims. In the very performance of its might, the power of the sovereign revealed its limitation. It is a power that is localized and circumscribed to the theater of its cruelty, and the staging of its pomp. In contrast, however, the power of the biopower state is over life [expand]. And here Foucault asks “how can biopolitics then reclaim the power over death?” or rather, how can it make die in light of the fact that its claim to legitimacy is that it is guarding, nurturing, tending to life? In so far as biopolitics is the management of life, how does it make die, how does it kill? This is a similar question to the one that theologians asked about the Christian God. If God is a god of life, the giver of life, how can he put to death, how can he allow death to descend upon his gift of life – in order to re-claim death, to be able to inflict death on its subjects, its living beings, biopower must make use of racism; more precisely, racism intervenes here to grant access to death to the biopower state. We must recall that the political rationality of biopower is deployed over a population, which is understood as a continuum of life. It is this continuum of life that eugenics, social hygiene, civil engineering, civil medicine, military engineers, doctors and nurses, policeman, and so on, tended to by a careful management of roads, why is death a possibility if god is the giver of life? Foucault’s answer is that factories, living quarters, brothels, red-districts, planning and planting of gardens and recreation centers, and the gerrymandering of populations by means of Biopolitics is the result of the development and maintenance of the hothouse of the political body, of the body-politic. Society has become the vivarium of the political rationality, and biopolitics acts on the teeming biomass contained within the parameters of that structure built up by the institutions of health, education, and production. This is where racism intervenes, not from without, exogenously, but from within, constitutively. For the emergence of biopower as the form of a new form of political rationality, entails the inscription within the very logic of the modern state the logic of racism. For racism grants, and here I am quoting: “the conditions for the acceptability of putting to death in a society of normalization. Where there is a society of normalization, where there is a power that is, in all of its surface and in first instance, and first line, a bio-power, racism is indispensable as a condition to be able to put to death someone, in order to be able to put to death others. The homicidal [meurtrière] function of the state, to the degree that the state functions on the modality of bio-power, can only be assured by racism “(Foucault 1997, 227) To use the formulations from his 1982 lecture “The Political Technology of Individuals” –which incidentally, roads, access to public transformations, placement of schools, and so on. echo his 1979 Tanner Lectures –the power of the state after the 18th century, a power which is enacted through the police, and is enacted over the population, is a “since the population is nothing more than what the state takes care of for its own sake, of course, the state is entitled to slaughter it, if necessary. So the reverse of biopolitics is thanatopolitics.” (Foucault 2000, 416). Racism, is the thanatopolitics of the biopolitics of the total state. They are two sides of one same political technology, one same political rationality: the management of life, the life of a population, the power over living beings, and as such it is a biopolitics. And, to quote more directly, tending to the continuum of life of a people. And with the inscription of racism within the state of biopower, the long history of war that Foucault has been telling in these dazzling lectures has made a new turn: the war of peoples, a war against invaders, imperials colonizers, which turned into a war of races, to then turn into a war of classes, has now turned into the war of a race, a biological unit, against its polluters and threats. Racism is the means by which bourgeois political power, biopower, re-kindles the fires of war within civil society. Racism normalizes and medicalizes war. Racism makes war the permanent condition of society, while at the same time masking its weapons of death and torture. As I wrote somewhere else, racism banalizes genocide by making quotidian the lynching of suspect threats to the health of the social body. Racism makes the killing of the other, of others, an everyday occurrence by internalizing and normalizing the war of society against its enemies. To protect society entails we be ready to kill its threats, its foes, and if we understand society as a unity of life, as a continuum of the living, then these threat and foes are biological in nature. Racism Outweighs Nuclear War Racism outweighs nuclear war Mohan 93 (Brij, Professor at LSU, Eclipse of Freedom p. 3-4) Metaphors of existence symbolize variegated aspects of the human reality. However, words can be apocalyptic. "There are words," de Beauvoir writes, "as murderous as gas chambers" (1968: 30). Expressions can be unifying and explosive; they portray explicit messages and implicit agendas in human affairs and social configurations. Manifestly the Cold War is over. But the world is not without nuclear terror. Ethnic strife and political instabilities in the New World Order -- following the dissolution of the Soviet Union -- have generated fears of nuclear terrorism and blackmail in view of the widening circle of nuclear powers. Despite encouraging trends in nuclear disarmament, unsettling questions, power, and fear of terrorism continue to characterize the crisis of the new age which is stumbling at the threshold of the twenty-first century.The ordeal of existence transcends the thermonuclear fever because the latter does not directly impact the day-to-day operations if the common people. The fear of crime, accidents, loss of job, and health care on one hand; and the sources of racism, sexism, and ageism on the other hand have created a counterculture of denial and disbelief that has shattered the façade of civility. Civilization loses its significance when its social institutions become counterproductive. It is this aspect of the mega-crisis that we are concerned about. Framing Contention 1AC Contention ___: Framing Education in academic settings is necessary – you should prioritize our discussions Giroux 12 [Henry, Global TV Network Chair Professorship at McMaster University in the English and Cultural Studies Department, “Beyond the Politics of the Big Lie: The Education Deficit and the New Authoritarianism” June 6, 2012 http://truthout.org/opinion/item/9865-beyond-the-politics-of-the-big-lie-the-education-deficit-and-the-new-authoritarianism] one of the paradoxes of education [is] that precisely at the point when you begin to develop a conscience, you must find yourself at war with your society. It is your responsibility to change society if you think of yourself as an educated person. "(43) What Baldwin recognizes is that learning has the possibility to trigger a critical engagement with oneself, others and the larger society - education becomes in this instance more than a method or tool for domination but a politics, a fulcrum for democratic social change. Tragically, in our current climate He goes on to argue "that "learning" merely contributes to a vast reserve of manipulation and self-inflicted ignorance. Our education deficit is neither reducible to the failure of particular types of teaching nor the decent into madness by the spokespersons for the new authoritarianism. Rather, it is about how matters of knowledge, values and ideology can be struggled over as Surviving the current education deficit will depend on progressives using history, memory and knowledge not only to reconnect intellectuals to the everyday needs of ordinary people, but also to jumpstart social movements by making education central to organized politics and the quest for a radical democracy. issues of power and politics. Structural violence outweighs – it creates the necessary conditions for all “large scale” impacts to occur Scheper-Hughes and Burgois, Professors of Anthropology at UC Berkeley and UPenn write in 2004 [Prof of Anthropology @ Cal-Berkely, and Bourgois Professors of Anthropology @ UPenn, Nancy and Philippe, Introduction: Making Sense of Violence, in Violence in War and Peace, pg. 19-22] This large and at first sight “messy” Part VII is central to this anthology’s thesis. It encompasses everything from the routinized, bureaucratized, and utterly banal violence of children dying of hunger and maternal despair in Northeast Brazil (Scheper-Hughes, Chapter 33) to elderly African Americans dying of heat stroke in Mayor Daly’s version of US apartheid in Chicago’s South Side (Klinenberg, Chapter 38) to the racialized class hatred expressed by British Victorians in their olfactory disgust of the “smelly” working classes (Orwell, Chapter 36). In these readings violence is located in the symbolic and social structures that overdetermine and allow the criminalized drug addictions, interpersonal bloodshed, and racially patterned incarcerations that characterize the US “inner city” to be normalized (Bourgois, Chapter 37 and Wacquant, Chapter 39). Violence also takes the form of class, racial, political self-hatred and adolescent self-destruction (Quesada, Chapter 35), as well as of useless (i.e. preventable), rawly embodied physical Close attention to the “little” violences produced in the structures, habituses, and mentalites of everyday life shifts our attention to pathologies of class, race, and gender inequalities. More important, it interrupts the voyeuristic tendencies of “violence studies” that risk publicly humiliating the powerless who are suffering, and death (Farmer, Chapter 34). Absolutely central to our approach is a blurring of categories and distinctions between wartime and peacetime violence. often forced into complicity with social and individual pathologies of power because suffering is often a solvent of human integrity and dignity. Thus, in this anthology we are positing a violence continuum comprised of a multitude of “small wars and invisible genocides” (see also Scheper- Hughes 1996; 1997; 2000b) conducted in the normative social spaces of public schools, clinics, emergency rooms, hospital wards, nursing homes, courtrooms, public registry offices, prisons, detention centers, and public morgues. The violence continuum also refers to the ease with which humans are capable of reducing the socially vulnerable into expendable nonpersons and assuming the license - even the duty - to kill, maim, or soul-murder. We realize that in referring to a violence and a genocide continuum we are flying in the face of a tradition of genocide studies that argues for the absolute uniqueness of the Jewish Holocaust and for vigilance with respect to restricted purist use of the term genocide itself (see Kuper 1985; Chaulk 1999; Fein 1990; Chorbajian 1999). But we hold an opposing and alternative view that, to the contrary, it is absolutely necessary to make just such existential leaps in purposefully linking violent acts in normal times to those of abnormal times. Hence the title of our volume: Violence in War and in Peace. If (as we concede) there is a moral there is), an even greater risk lies in failing to sensitize ourselves, in misrecognizing protogenocidal practices and sentiments daily enacted as normative behavior by “ordinary” good-enough citizens. Peacetime risk in overextending the concept of “genocide” into spaces and corners of everyday life where we might not ordinarily think to find it (and crimes, such as prison construction sold as economic development to impoverished communities in the mountains and deserts of California, or the evolution of the criminal industrial complex into the latest peculiar institution for managing race relations in the United States (Waquant, Chapter 39), constitute the “small wars and invisible genocides” to which we refer. This applies to African American and Latino youth mortality statistics in Oakland, California, Baltimore, Washington DC, and New York City. These are “invisible” genocides not because they are secreted away or hidden from view, but quite the opposite. As Wittgenstein observed, the things that are hardest to perceive are those which are right before our eyes and therefore taken for granted. In this regard, Bourdieu’s partial and unfinished theory of violence (see Chapters 32 and 42) as well as his concept of misrecognition is crucial to our task. By including the normative everyday forms of violence hidden in the minutiae of “normal” social practices in the architecture of homes, in gender relations, in communal work, in the exchange of gifts, and so forth - Bourdieu forces us to reconsider the broader meanings and status of violence, especially the links between the violence of everyday life and explicit political terror and state repression, Similarly, Basaglia’s notion of “peacetime crimes” - crimini di pace - imagines a direct relationship between wartime and war crimes are merely ordinary, everyday crimes of public consent applied systematic- ally and dramatically in the extreme context of war. Consider the parallel uses of rape during peacetime and wartime, or the family peacetime violence. Peacetime crimes suggests the possibility that resemblances between the legalized violence of US immigration and naturalization border raids on “illegal aliens” versus the US government- engineered genocide in 1938, known as the Cherokee “Trail of Tears.” Peacetime crimes suggests that everyday forms of state violence make a certain kind of domestic peace possible. Internal “stability” is purchased with the currency of peacetime crimes, many of which take the form of professionally applied “strangle-holds.” Everyday forms of state violence during peacetime make a certain kind of domestic “peace” possible. It is an easy-to-identify peacetime crime that is usually maintained as a public secret by the government and by a scared or apathetic populace. Most subtly, but no less politically or structurally, the phenomenal growth in the United States of a new military, postindustrial prison industrial complex has taken place in the absence of broad-based opposition, let alone collective acts of civil disobedience. The public consensus is based primarily on a new mobilization of an old fear of the mob, the mugger, the rapist, the Black man, the undeserving poor. How many public executions of mentally deficient prisoners in the United States are needed to make life feel more secure for the affluent? What can it possibly mean when incarceration becomes the “normative” socializing experience for ethnic minority youth in a society, i.e., over 33 percent of young African American men (Prison Watch it is essential that we recognize the existence of a genocidal capacity among otherwise good-enough humans and that we need to exercise a defensive hypervigilance to the less dramatic, permitted, and even rewarded everyday acts of violence that render participation in genocidal acts and policies possible (under adverse political or economic conditions), perhaps more easily than we would like to recognize. Under the 2002). In the end violence continuum we include, therefore, all expressions of radical social exclusion, dehumanization, depersonalization, pseudo-speciation, and reification which normalize atrocious behavior and violence toward others. A constant self-mobilization for alarm, a state of constant hyperarousal is, perhaps, a reasonable response to Benjamin’s view of late modern history as a chronic “state of emergency” (Taussig, Chapter 31). We are trying to recover here the classic anagogic thinking that enabled Erving Goffman, Jules Henry, C. Wright Mills, and Franco Basaglia among other mid-twentieth-century radically critical thinkers, to perceive the symbolic and structural relations, i.e., between inmates and patients, between concentration camps, prisons, mental hospitals, nursing homes, and other “total institutions.” Making that decisive move to recognize the continuum of violence allows us to see the capacity and the willingness - if not enthusiasm - of ordinary people, the practical technicians of the social consensus, to enforce genocidal-like crimes mass violence and genocide are born, it is ingrained in the common sense of everyday social life. The mad, the differently abled, the mentally vulnerable have often fallen into this category of the unworthy living, as have the very old and infirm, against categories of rubbish people. There is no primary impulse out of which the sick-poor, and, of course, the despised racial, religious, sexual, and ethnic groups of the moment. Erik Erikson referred to “pseudo- speciation” as the human tendency to classify some individuals or social groups as less than fully human - a prerequisite to genocide and one that is carefully honed during the unremark- able peacetimes that precede the sudden, “seemingly unintelligible” outbreaks of mass violence. Collective denial and misrecognition are prerequisites for mass violence and genocide. But so are formal bureaucratic structures and professional roles. The practical technicians of everyday violence in the backlands of Northeast Brazil (Scheper-Hughes, Chapter 33), for example, include the clinic doctors who prescribe powerful tranquilizers to fretful and frightfully hungry babies, the Catholic priests who celebrate the death of “angel-babies,” and the municipal bureaucrats who dispense free baby coffins but no food to hungry families. Everyday violence encompasses the implicit, legitimate, and routinized forms of violence inherent in particular social, economic, and political formations. It is close to what Bourdieu (1977, 1996) means by “symbolic violence,” the violence that is often “nus-recognized” for something else, usually something good. Everyday violence is similar to what Taussig (1989) calls “terror as usual.” All these terms are meant to reveal a public secret - the hidden links between violence in war and violence in peace, and between war crimes and “peace-time crimes.” Bourdieu (1977) finds domination and violence in the least likely places in courtship and marriage, in the exchange of gifts, in systems of classification, in style, art, and culinary taste- the various uses of culture. Violence, Bourdieu insists, is everywhere in social practice. It is misrecognized because its very everydayness and its familiarity render it invisible. Lacan identifies “rneconnaissance” as the prerequisite of the social. The exploitation of bachelor sons, robbing them of autonomy, independence, and progeny, within the structures of family farming in the European countryside that Bourdieu escaped is a case in point (Bourdieu, Chapter 42; see also Scheper-Hughes, 2000b; Favret-Saada, 1989). Following Gramsci, Foucault, Sartre, Arendt, and other modern theorists of power-vio- lence, Bourdieu treats direct aggression and physical violence as a crude, uneconomical mode of domination; it is less efficient and, according to Arendt (1969), it is certainly less legitimate. While power and symbolic domination are not to be equated with violence - and Arendt argues persuasively that violence is to be understood as a failure of power - violence, as we are presenting it here, is more than simply the expression of illegitimate physical force against a person or group of persons. Rather, we need to understand violence as encompassing all forms of “controlling processes” (Nader 1997b) that assault basic human freedoms and individual or collective survival. Our task is to recognize these gray zones of violence which are, by definition, not obvious. Once again, the point of bringing into the discourses on genocide everyday, normative experiences of reification, depersonalization, institutional confinement, and acceptable death is to help answer the question: What makes mass violence and genocide possible? In this volume we are suggesting that mass violence is part of a continuum, and that it is socially incremental and often experienced by perpetrators, collaborators, bystanders - and even by victims themselves - as expected, routine, even justified. The preparations for mass killing can be found in social sentiments and institutions from the family, They harbor the early “warning signs” (Charney 1991), the “priming” (as Hinton, ed., 2002 calls it), or the “genocidal continuum” (as we that push social consensus toward devaluing certain forms of human life and lifeways from the refusal of social support and humane care to to schools, churches, hospitals, and the military. call it) vulnerable “social parasites” (the nursing home elderly, “welfare queens,” undocumented immigrants, drug addicts) to the militarization of everyday life (super-maximum-security prisons, capital punishment; the technologies of heightened personal security, including the house gun and gated communities; and reversed feelings of victimization). Low probability should be no probability – don’t fall for cognitive biases that make the neg’s internal link chains appear coherent Sunstein, Distinguished Service Professor at the University of Chicago writes in 2002 [Cass, Karl N. Llewellyn Distinguished Service Professor, University of Chicago, Law School and Department of Political Science, Probability Neglect: Emotions, Worst Cases, and Law, http://www.yalelawjournal.org/pdf/1121/SunsteinFINAL.pdf] If someone is predisposed to be worried, degrees of unlikeliness seem to provide no comfort, unless one can prove that harm is absolutely impossible, which itself is not possible.1 [ A]ffect-rich outcomes yield pronounced overweighting of small probabilities . . . .2 On Sept. 11, Americans entered a new and frightening geography, where the continents of safety and danger seemed forever shifted. Is it safe to fly? Will terrorists wage germ warfare? Where is the line between reasonable precaution and panic? Jittery, uncertain and assuming the worst, many people have answered these questions by forswearing air travel, purchasing gas masks and radiation detectors, placing frantic calls to pediatricians demanding vaccinations against exotic diseases or rushing out to fill prescriptions for Cipro, an antibiotic most experts consider an unnecessary defense against anthrax.3 I. RISKS, NUMBERS, AND REGULATION Consider the following problems: • People live in a community near an abandoned hazardous waste site. The community appears to suffer from an unusually high number of deaths and illnesses. Many members of the community fear that the hazardous waste site is responsible for the problem. Administrative officials attempt to offer reassurance that the likelihood of adverse health effects, as a result of the site, is extremely low.4 The reassurance is met with skepticism and distrust. • An airplane, carrying people from New York to California, has recently crashed. Although the source of the problem is unknown, many people suspect terrorism. In the following weeks, many people who would otherwise fly are taking trains or staying home. Some of those same people acknowledge that the statistical risk is exceedingly small. Nonetheless, they refuse to fly, in part because they do not want to experience the anxiety that would come from flying. • An administrative agency is deciding whether to require labels on genetically modified food. According to experts within the agency, genetically modified food, as such, poses insignificant risks to the environment and to human health. But many consumers disagree. Knowledge of genetic modification triggers strong emotions, and the labeling requirement is thought likely to have large effects on consumer choice, notwithstanding expert claims that people tend to focus on the are not closely attuned to the probability that harm will occur. At the individual level, this phenomenon, which I shall call “probability neglect,” produces serious difficulties of various sorts, including excessive worry and unjustified behavioral changes. When people neglect probability, they may also treat some risks as if they were nonexistent, even the danger is trivial. How should we understand human behavior in cases of this sort? My principal answer, the thesis of this Essay, is that when intense emotions are engaged, adverse outcome, not on its likelihood. That is, they though the likelihood of harm, over a lifetime, is far from trivial. Probability neglect can produce significant problems for law and regulation. As we shall see, regulatory agencies, no less than individuals, may neglect the issue of probability, in a way that can lead to either indifference to real risks or costly expenditures for little or no gain. If agencies are falling victim to probability neglect, they might well be violating relevant law.5 Indeed, we shall see that the idea of probability neglect helps illuminate a number of judicial decisions, which seem implicitly attuned to that idea, and which reveal an implicit behavioral rationality in important pockets of federal administrative law. As we shall also see, an understanding of probability neglect helps show how government can heighten, or dampen, public concern about hazards. Public- spirited political actors, no less than self-interested ones, can exploit probability neglect so as to promote attention to problems that may or may not deserve public concern. It will be helpful to begin, however, with some general background on individual and social judgments about risks. A. Cognition On the conventional view of rationality, probabilities matter a great deal to reactions to risks. But emotions, as such, are not assessed independently; they are not taken to play a distinctive role.6 Of course, people might be risk-averse or risk-inclined. For example, it is possible that people will be willing to pay $100 to eliminate a 1/1000 risk of losing $900. But analysts usually believe that variations in probability should matter, so that there would be a serious problem if people were willing to pay both $100 to eliminate a 1/1000 risk of losing $900 and $100 to eliminate a 1/100,000 risk of losing $900. Analysts do not generally ask, or care, whether risk-related dispositions are a product of emotions or something else. Of course, it is now generally agreed that in thinking about risks, people rely on certain heuristics and show identifiable biases.7 Those who emphasize heuristics and biases are often seen as attacking the conventional view of rationality.8 In a way they are doing just that, but the heuristicsand- biases literature has a highly cognitive focus, designed to establish how people proceed under conditions of uncertainty. The central question is this: When people do not know about the probability associated with some risk, how do they think? It is clear that when people lack statistical information, they rely on certain heuristics, or rules of thumb, which serve to simplify their inquiry.9 Of these rules of thumb, the “availability heuristic” is probably the most important for purposes of understanding risk-related law.10 Thus, for example, “a class whose instances are easily retrieved will appear more numerous than a class of equal frequency whose instances are less retrievable.”11 The point very much bears on private and public responses to risks, suggesting, for example, that people will be especially responsive to the dangers of AIDS, crime, earthquakes, and nuclear power plant accidents if examples of these risks are easy to recall.12 This is a point about how familiarity can affect the availability of instances. But salience is important as well. “The impact of seeing a house burning on the subjective probability of such accidents is probably greater than the impact of reading about a fire in the local paper.”13 So, too, recent events will have a greater impact than earlier ones. The point helps explain much risk-related behavior. For example, whether people will buy insurance for natural disasters is greatly affected by recent experiences.14 If floods have not occurred in the immediate past, people who live on flood plains are far less likely to purchase insurance.15 In the aftermath of an earthquake, the proportion of people carrying earthquake insurance rises sharply—but it declines steadily from that point, as vivid memories recede.16 For purposes of law and regulation, the problem is that the availability heuristic can lead to serious errors of fact, in terms of both excessive controls on small risks that are cognitively available and insufficient controls on large risks that are not.17 The cognitive emphasis of the heuristics-and-biases literature can be found as well in prospect theory, a departure from expected utility theory that explains decision under risk.18 For present purposes, what is most important is that prospect theory offers an explanation for simultaneous gambling and insurance.19 When given the choice, most people will reject a certain gain of X in favor of a gamble with an expected value below X, if the gamble involves a small probability of riches. At the same time, most people prefer a certain loss of X to a gamble with an expected value less than X, if the gamble involves a small probability of catastrophe.20 If expected utility theory is taken as normative, then people depart from the normative theory of rationality in giving excessive weight to lowprobability outcomes when the stakes are high. Indeed, we might easily see prospect theory as emphasizing a form of probability neglect. But in making these descriptive claims, prospect theory does not specify a special role for emotions. This is not a puzzling oversight, if it counts as an oversight at all. For many purposes, what matters is what people choose, and it is unimportant to know whether their choices depend on cognition or emotion, whatever may be the difference between these two terms. B. Emotion No one doubts, however, that in many domains, people do not think much about variations in probability and that emotions have a large effect on judgment and decisionmaking.21 Would a group of randomly selected people pay more to reduce a 1/100,000 risk of getting a gruesome form of cancer than a similar group would pay to reduce a 1/200,000 risk of getting that form of cancer? Would the former group pay twice as much? With some low-probability events, anticipated and actual emotions, triggered by the best-case or worst-case outcome, help to determine choice. Those who buy lottery tickets, for example, often fantasize about the goods associated with a lucky outcome.22 With respect to risks of harm, many of our ordinary ways of speaking suggest strong emotions: panic, hysteria, terror. People might refuse to fly, for example, not because they are currently frightened, but because they anticipate their own anxiety, and they want to avoid it. It has been suggested that people often decide as they do because they anticipate their own regret.23 The same is true for fear. Knowing that they will be afraid, people may refuse to travel to Israel or South Africa, even if they would much enjoy seeing those nations and even if they believe, on reflection, that their fear is not entirely rational. Recent evidence is quite specific.24 It suggests that people greatly neglect significant differences in probability when the outcome is “affect rich”—when it involves not simply a serious loss, but one that produces strong emotions, including fear.25 To be sure, the distinction between cognition and emotion is complex and contested.26 In the domain of risks, and most other places, emotional reactions are usually based on thinking; they are hardly cognition-free. When a negative emotion is associated with a certain risk—pesticides or nuclear power, for example—cognition plays a central role.27 For purposes of the analysis here, it is not necessary to say anything especially controversial about the nature of the emotion of fear. The only suggestion is that when emotions are intense, calculation is less likely to occur, or at least that form of calculation that involves assessment of risks in terms of not only the magnitude but also the probability of the outcome. Drawing on and expanding the relevant evidence, I will emphasize a general phenomenon here: In political and market domains, people often focus on the desirability of the outcome in question and pay (too) little attention to the probability that a good or bad outcome will, in fact, occur. It is in such cases that people fall prey to probability neglect, which is a form of quasi-rationality.28 Probability neglect is especially large when people focus on the worst possible case or otherwise are subject to strong emotions. When such it is not fully rational to treat a 1% chance of X as equivalent, or nearly equivalent, to a 99% chance of X, or even a 10% chance of X. Because properly treated as emotions are at work, people do not give sufficient consideration to the likelihood that the worst case will actually occur. This is quasi-rational because, from the normative point of view, people suffer from probability neglect, and because neglecting probability is not fully rational, the phenomenon I identify raises new questions about the widespread idea that ordinary people have a kind of rival rationality superior to that of experts.29 Most of the time, experts are concerned principally with the number of lives at stake,30 and for that reason they will be closely attuned, as ordinary people are not, to the issue of probability. By drawing attention to probability neglect, I do not mean to suggest that most people, most of the time, are indifferent to large variations in the probability that a risk will come to fruition. Large variations can, and often do, make a difference—but when emotions are engaged, the difference is far less than the standard theory predicts. Nor do I suggest that probability neglect is impervious to circumstances. If the costs of neglecting probability are placed “on screen,” then people will be more likely to attend to the question of probability.31 In this light it is both mildly counterintuitive and reasonable, for example, to predict that people would be willing to pay less, in terms of dollars and waiting time, to reduce lowprobability risks of an airplane disaster if they are frequent travelers. An intriguing study finds exactly that effect.32 For similar reasons, market pressures are likely to dampen the impact of probability neglect, ensuring that, say, risks of 1/10,000 are treated differently from risks of 1/1,000,000, even if individuals, in surveys, show relative insensitivity to such differences. Acknowledging all this, I emphasize three central points. First, differences in probability will often affect behavior far less than they should or than conventional theory would predict. Second, private behavior, even when real dollars are involved,33 can display insensitivity to the issue of probability, especially when emotions are intensely engaged. Third, and most important, the demand for legal intervention can be greatly affected by probability neglect, so that government may end up engaging in extensive regulation precisely because intense emotional reactions are making people relatively insensitive to the (low) probability that the relevant dangers will ever come to fruition. C. Law It is not at all clear how the law should respond to probability neglect. But at a minimum, the phenomenon raises serious legal issues in administrative law, at least under statutes banning agencies from acting unless they can show a “significant risk”34 or can establish that the benefits of regulation outweigh the costs.35 If agencies are neglecting the issue of probability (perhaps because the public is doing so as well), they may well be acting unlawfully. Indeed, the law of judicial review shows an inchoate understanding of probability neglect, treating it as a problem for which judicial invalidation is a solution.36 The only qualification is that the relevant law remains in an embryonic state. There is much to be done, especially at the agency level, to ensure that government is alert to the probability that harm will actually occur. Outside of the context of administrative law, an understanding of probability neglect will help us to make better predictions about the public “demand” for law. When a bad outcome is highly salient and triggers strong emotions, government will be asked to do something about it, even if the probability that the bad outcome will occur is low. Political participants of various stripes, focusing on the worst case, are entirely willing to exploit probability neglect. Those who encourage people to purchase lottery tickets, focusing on the best case, do the same. An understanding of probability neglect simultaneously helps show why jurors, and ordinary officials, are not likely to be moved much by a showing that before the fact, the harm was not likely to occur. For many people, what matters is that the harm did occur, not that it was unlikely to do so before the fact. For law, many of the most difficult questions are normative in character: Should government take account of variations in the probability that harms will occur? Should government respond to intense fears that involve statistically remote risks? When people suffer from probability neglect, should law and policy do the same thing? At first glance, we might think that even if people are neglecting probability, government and law at least should not—that the tort system and administrators should pay a great deal of attention to probability in designing institutions. If government wants to insulate itself from probability neglect, it will create institutions designed to ensure that genuine risks, rather than tiny ones, receive the most concern. Such institutions will not necessarily require agencies to discuss the worst-case scenario.37 And if government is attempting to increase public concern about a genuine danger, it should not emphasize statistics and probabilities, but should instead draw attention to the worst-case scenario. If government is attempting to decrease public concern with a risk that has a tiny probability of coming to fruition, it may be ineffective if it emphasizes the issue of probability; indeed, it may do better if it changes the subject or stresses instead the affirmative social values associated with running the risk.38 On the other hand, public fear, however unwarranted, may be intractable, in the sense that it may be impervious to efforts at reassurance. And if public fear is intractable, it will cause serious problems, partly because fear is itself extremely unpleasant and partly because fear is likely to influence conduct, possibly producing wasteful and excessive private precautions. If so, a governmental response, via regulatory safeguards, would appear to be justified if the benefits, in terms of fear reduction, justify the costs. II. PROBABILITY NEGLECT: THE BASIC PHENOMENON When it comes to risk, a key question is whether people can imagine or visualize the worst-case outcome.39 When the worst case produces intense fear, surprisingly little role is played by the stated probability that that outcome will occur.40 An important function of strong emotions is thus to drive out quantitative judgments, including judgments about probability, by making the best case or the worst case seem highly salient.41 But it is important to note that probability neglect can occur even when emotions are not involved. A great deal of evidence shows that whether or not emotions are involved, people are relatively insensitive to differences in probabilities, at least when the relevant probabilities are low. A. Insensitivity to Variations Among Low Probabilities Do people care about probability at all? Of course they do; a risk of 1/100,000 is significantly less troublesome than a risk of 1/1000. But many people, much of the time, show a remarkable unwillingness to attend to the question of probability. Several studies show that when people are seeking relevant information, they often do not try to learn about probability at all. One study, for example, finds that in deciding whether to purchase warranties for consumer products, people do not spontaneously point to the probability of needing repair as a reason for the purchase.42 Another study finds that those making hypothetical, risky managerial decisions rarely ask for data on probabilities.43 Or consider a study involving children and adolescents,44 in which the following question was asked: Susan and Jennifer are arguing about whether they should wear seat belts when they ride in a car. Susan says that you should. Jennifer says you shouldn’t . . . . Jennifer says that she heard of an accident where a car fell into a lake and a woman was kept from getting out in time because of wearing her seat belt . . . . What do you think about this?45 In answering that question, many subjects did not think about probability at all.46 One exchange took the following form: A: Well, in that case I don’t think you should wear a seat belt. Q (interviewer): How do you know when that’s gonna happen? A: Like, just hope it doesn’t! Q: So, should you or shouldn’t you wear seat belts? A: Well, tell-you-the-truth we should wear seat belts. Q: How come? A: Just in case of an accident. You won’t get hurt as much as you will if you didn’t wear a seat belt. Q: Ok, well what about these kinds of things, when people get trapped? A: I don’t think you should, in that case.47 These answers might seem odd and idiosyncratic, but we might reasonably suppose that some of the time, both children and adults focus primarily on bad scenarios, without thinking a great deal about the question of probability. Many studies find that significant differences in low probabilities have little impact on decisions. This finding is in sharp conflict with the standard view of rationality, which suggests that people’s willingness to pay for small risk reductions ought to be nearly proportional to the size of the reduction.48 Perhaps these findings reflect people’s implicit understanding that in these settings, the relevant probability is “low, but not zero,” and that finer distinctions are unhelpful. (What does a risk of 1/100,000 really mean? How different is it, for an individual, from a risk of 1/20,000 or 1/600,000?) In an especially striking study, Kunreuther and his coauthors found that mean willingness to pay insurance premiums did not vary among risks of 1/100,000, 1/1,000,000, and 1/10,000,000.49 They also found basically the same willingness to pay for insurance premiums for risks ranging from 1/650, to 1/6300, to 1/68,000.50 The study just described involved a “between subjects” design; subjects considered only one risk, and the same people were not asked to consider the various risks at the same time. Low probabilities are not likely to be terribly meaningful to most people, but most educated people would know that a 1/100,000 risk is worse than 1/1,000,000 risk. When low-probability risks are seen in isolation and are not assessed together, we have an example of the problem of “evaluability.”51 For most people, most of the time, it is very difficult to evaluate a low probability, and hence isolated decisions will pick up small or no variations between people’s assessments of very different risks. But several studies have a “within subjects” design, exposing people simultaneously to risks of different probabilities, and even here, the differences in probabilities have little effect on decisions. An early study examined people’s willingness to pay (WTP) to reduce various fatality risks. The central finding was that the mean WTP to reduce such risks was, for over 40% of the respondents, unaffected by a large variation in the probability of harm, even though expected utility theory would predict significant effects from such variations.52 A later study found that for serious injuries, WTP to reduce the risk by 12/100,000 was only 20% higher than WTP to reduce the same risk by 4/100,000, even though standard theory would predict a WTP three times as high.53 These results are not unusual. Lin and Milon attempted to elicit people’s willingness to pay to reduce the risk of illness from eating oysters.54 There was little sensitivity to variations in probability of illness.55 Another study found little change in WTP across probability variations involving exposure to pesticide residues on fresh produce.56 A similar anomaly was found in a study involving hazardous wastes, where WTP actually decreased as the stated fatality risk reduction increased.57 There is much to say about the general insensitivity to significant variations within the category of low-probability events. It would be difficult to produce a rational explanation for this insensitivity; recall the standard suggestion that WTP for small risk reductions should be roughly proportional to the size of the reduction.58 Why don’t people think in this way? An imaginable explanation is that in the abstract, most people simply do not know how to evaluate low probabilities. A risk of 7/100,000 seems “small”; a risk of 4/100,000 also seems “small.”59 Most people would prefer a risk of 4/100,000 to a risk of 7/100,000, and I have noted that joint evaluation improves evaluability, which would otherwise be extremely difficult.60 But even when the preference is clear, both risks seem “small,” and hence it is not at all clear that a proportional increase in WTP will follow. As suggested by the findings of Kunreuther and his coauthors, it is likely that in a between-subjects design, WTP to eliminate a risk of 4/100,000 would be about the same as WTP to eliminate a risk of 7/100,000, simply because the small difference would not matter when each risk is taken in isolation. no risk of nuclear war — mutually assured destruction and economic interdependence Aziz, 3/14 - the economics and business correspondent at TheWeek.com. He is also an associate editor atPieria.co.uk. Previously his work has appeared on Business Insider, Zero Hedge, and Noahpinion. (John, “Don't worry: World War III will almost certainly never happen”, The Week, http://theweek.com/article/index/257517/dont-worry-world-war-iii-will-almostcertainly-never-happen) Next year will be the seventieth anniversary of the end of the last global conflict. There have been points on that timeline — such as the Cuban missile crisis in 1962, and a Soviet computer malfunction in 1983 that erroneously suggested that the U.S. had attacked, and perhaps even the Kosovo War in 1999 — when a global conflict was a real possibility. Yet today — in the shadow of a flare up which some are calling a new Cold War between Russia and the U.S. — I believe the threat of World War III has almost faded into nothingness. That is, the probability of a world war is the lowest it has been in decades, and perhaps the lowest it has ever been since the dawn of modernity. This is certainly a view that current data supports. Steven Pinker's studies into the decline of violence reveal that deaths from war have fallen and fallen since World War II. But we should not just assume that the past is an accurate guide to the future. Instead, we must look at the factors which have led to the reduction in war and try to conclude whether the decrease in war is sustainable. So what's changed? Well, the first big change after the last world war was the arrival of mutually assured destruction. It's no coincidence that the end of the last global war coincided with the invention of atomic weapons. The possibility of complete annihilation provided a huge disincentive to launching and expanding total wars. Instead, the great powers now fight proxy wars like Vietnam and Afghanistan (the 1980 version, that is), rather than letting their rivalries expand into full-on, globe-spanning struggles against each other. Sure, accidents could happen, but the possibility is incredibly remote. More importantly, nobody in power wants to be the cause of Armageddon. But what about a non-nuclear global war? Other changes — economic and social in nature — have made that highly unlikely too. The world has become much more economically interconnected since the last global war. Economic cooperation treaties and free trade agreements have intertwined the economies of countries around the world. This has meant there has been a huge rise in the volume of global trade since World War II, and especially since the 1980s. Today consumer goods like smartphones, laptops, cars, jewelery, food, cosmetics, and medicine are produced on a global level, with supply-chains criss-crossing the planet. An example: The laptop I am typing this on is the cumulative culmination of thousands of hours of work, as well as resources and manufacturing processes across the globe. It incorporates metals like tellurium, indium, cobalt, gallium, and manganese mined in Africa. Neodymium mined in China. Plastics forged out of oil, perhaps from Saudi Arabia, or Russia, or Venezuela. Aluminum from bauxite, perhaps mined in Brazil. Iron, perhaps mined in Australia. These raw materials are turned into components — memory manufactured in Korea, semiconductors forged in Germany, glass made in the United States. And it takes gallons and gallons of oil to ship all the resources and components back and forth around the world, until they are finally assembled in China, and shipped once again around the world to the consumer. In a global war, global trade becomes a nightmare. Shipping becomes more expensive due to higher insurance costs, and riskier because it's subject to seizures, blockades, ship sinkings. Many goods, intermediate components or resources — including energy supplies like coal and oil, components for military hardware, etc, may become temporarily unavailable in certain areas. Sometimes — such as occurred in the Siege of Leningrad during World War II — the supply of food can be cut off. This is why countries hold strategic reserves of things like helium, pork, rare earth metals and oil, coal, and gas. These kinds of breakdowns were troublesome enough in the economic landscape of the early and mid-20th century, when the last global wars occurred. But in today's ultraglobalized and ultra-specialized economy? The level of economic adaptation — even for large countries like Russia and the United States with lots of land and natural resources — required to adapt to a world war would be crushing, and huge numbers of business and livelihoods would be wiped out. In other words, global trade interdependency has become, to borrow a phrase from finance, too big to fail. nuclear war doesn’t cause extinction Seitz 06 - former associate of the John M. Olin Institute for Strategic Studies at Harvard University’s Center for International Affairs (Russell, “The' Nuclear Winter ' Meltdown Photoshopping the Apocalypse”, http://adamant.typepad.com/seitz/2006/12/preherein_honor.html) history is full of prophets of doom who fail to deliver, not all are without honor in their own land. The 1983 'Nuclear Winter " papers in Science were so politicized that even the eminently liberal President of The Council for a Liveable World called "The worst example ofthe misrepesentation of science to the public in my memory." Among the authors was Stanford President Donald Kennedy. Today he edits Science , the nation's major arbiter of climate science--and policy. Below, a All that remains of Sagan's Big Chill are curves such as this , but case illustrating the mid-range of the ~.7 to ~1.6 degree C maximum cooling the 2006 studies suggest is superimposed in color on the Blackly Apocalyptic predictions published in Science Vol. 222, 1983 . They're worth comparing, because the range of soot concentrations in the new models overlaps with cases assumed to have dire climatic "Apocalyptic predictions require, to be taken seriously,higher standards of evidence than do assertions on other matters where the stakes are not as great." wrote Sagan in Foreign Affairs , Winter 1983 -84. But that "evidence" was never forthcoming. 'Nuclear Winter' never existed outside of a computer except as air-brushed animation commissioned by the a PR firm - Porter Novelli Inc. Yet Sagan predicted "the extinction of the human species " as consequences in the widely publicized 1983 scenarios -- temperatures plummeted 35 degrees C and the world froze in the aftermath of a nuclear holocaust. Last year, Sagan's cohort tried to reanimate the ghost in a machine antinuclear activists invoked in the depths of the Cold War, by re-running equally arbitrary scenarios on a modern interactive Global Circulation Model. But the Cold War is history simulations that they do not reproduce the apocalyptic results of what Sagan oxymoronically termed "a sophisticated one dimensional model." The subzero 'baseline case' has melted down into a tepid 1.3 degrees of average cooling- grey skies do not a Ragnarok make . What remains is just not the stuff that End of the World myths are made of. It is hard to exaggerate how seriously " nuclear winter "was once taken by policy analysts in more ways than one. It is a credit to post-modern computer climate who ought to have known better. Many were taken aback by the sheer force of Sagan's rhetoric Remarkably, Science's news coverage of the new results fails to graphically compare them with the old ones Editor Kennedy and other recent executives of the American Association for the Advancement of Science, once proudly co-authored and You can't say they didn't try to reproduce this Cold War icon. Once again, soot from imaginary software materializes in midair by the megaton , flying higher than Mount Everest . This is not physics, but a crude helped to publicize. exercise in ' garbage in, gospel out' parameter forcing designed to maximize and extend the cooling an aeosol can generate, by sparing it from realistic attrition by rainout in Despite decades of progress in modeling atmospheric chemistry , there is none in this computer simulation, and ignoring photochemistry further extends its impact. Fortunately , the history of science is as hard to erase as it is easy to ignore. Their past mastery of semantic agression cannot spare the authors of "Nuclear Winter Lite " direct comparison of their new results and their old. Dark smoke clouds in the lower atmosphere don't last long enough to spread across the globe. Cloud droplets and rainfall remove them. rapidly washing them out of the sky in a matter of days to weeks- not long enough to sustain a global pall. Real the lower atmosphere. world weather brings down particles much as soot is scrubbed out of power plant smoke by the water sprays in smoke stack scrubbers Robock acknowledges this- not even a single degree of cooling results when soot is released at lower elevations in he models . The workaround is to inject the imaginary aerosol at truly Himalayan elevations pressure altitudes of 300 millibar and higher , where the computer model's vertical transport function modules pass it off to their even higher neighbors in the stratosphere , The new studies like the old suffer from the disconnect between a desire to paint the sky black and the vicissitudes of natural history. As with many exercise in worst case models both at invoke rare phenomena as commonplace, claiming it prudent to assume the worst. But the real world is subject to Murphy's lesser known second law- if everything must go wrong, don't bet on it. In 2006 as in 1983 firestorms and forest fires that send smoke into the stratosphere rise to alien prominence in the modelers re-imagined world , but i the real one remains a very different place, where though every month sees forest fires burning areas the size of cities - 2,500 hectares or larger , stratospheric smoke injections arise but once in a blue moon. So how come these neo-nuclear winter models feature so where it does not rain and particles linger.. much smoke so far aloft for so long? Extensions Structural Violence First You should privilege everyday violence for two reasons- A) social bias underrepresents its effects B) its effects are exponential, not linear which means even if the only causes a small amount of structural violence, its terminal impacts are huge Nixon ‘11 (Rob, Rachel Carson Professor of English, University of Wisconsin-Madison, Slow Violence and the Environmentalism of the Poor, pgs. 2-3) Three primary concerns animate this book, chief among them my conviction that we urgently need to rethink-politically, imaginatively, and theoretically-what I call "slow violence." By slow violence I mean a violence that occurs gradually and out of sight, a violence of delayed destruction that is dispersed across time and space, an attritional violence that is typically not viewed as violence at all. Violence is customarily conceived as an event or action that is immediate in time, explosive and spectacular in space, and as erupting into instant sensational visibility. We need, I believe, to engage a different kind of violence, a violence that is neither spectacular nor instantaneous, but rather incremental and accretive, its calamitous repercussions playing out across a range of temporal scales. In so doing, we also need to engage the representational, narrative, and strategic challenges posed by the relative invisibility of slow violence. Climate change, the thawing cryosphere, toxic drift, biomagnification, deforestation, the radioactive aftermaths of wars, acidifying oceans, and a host of other slowly unfolding environmental catastrophes present formidable representational obstacles that can hinder our efforts to mobilize and act decisively. The long dyings-the staggered and staggeringly discounted casualties, both human and ecological that result from war's toxic aftermaths or climate change-are underrepresented in strategic planning as well as in human memory. Had Summers advocated invading Africa with weapons of mass destruction, his proposal would have fallen under conventional definitions of violence and been perceived as a military or even an imperial invasion. Advocating invading countries with mass forms of slow-motion toxicity, however, requires rethinking our accepted assumptions of violence to include slow violence. Such a rethinking requires that we complicate conventional assumptions about violence as a highly visible act that is newsworthy because it is event focused, time bound, and body bound. We need to account for how the temporal dispersion of slow violence affects the way we perceive and respond to a variety of social afflictions-from domestic abuse to posttraumatic stress and, in particular, environmental calamities. A major challenge is representational: how to devise arresting stories, images, and symbols adequate to the pervasive but elusive violence of delayed effects. Crucially, slow violence is often not just attritional but also exponential, operating as a major threat multiplier; it can fuel long-term, proliferating conflicts in situations where the conditions for sustaining life become increasingly but gradually degraded. Prioritizing everyday violence is key - responding to it later causes error replication and movement burn out, only re-orienting focus away from macrolevel violence produces sustainable political coalitions Cuomo ’96 (Chris, Prof. of Political Science @ U of Cincinnati, “War is not just an event: reflections on the significance of everyday violence”, Hypatia, vol. 11, no. 4 Fall (1994)) Theory that does not investigate or even notice the omnipresence of militarism cannot represent or address the depth and specificity of the everyday effects of militarism on women, on people living in occupied territories, on members of military institutions, and on the environment. These effects are relevant to feminists in a number of ways because military practices and institutions help construct gendered and national identity, and because they justify the destruction of natural nonhuman entities and communities during peacetime. Lack of attention to these aspects of the business of making or preventing military violence in an extremely technologized world results in theory that cannot accommodate the connections among the constant presence of militarism, declared wars, and other closely related social phenomena, such as nationalistic glorifications of motherhood, media violence, and current ideological gravitations to military solutions for social problems. Ethical approaches that do not attend to the ways in which warfare and military practices are woven into the very fabric of life in twenty-first century technological states lead to crisis-based politics and analyses. For any feminism that aims to resist oppression and create alternative social and political options, crisis-based ethics and politics are problematic because they distract attention from the need for sustained resistance to the enmeshed, omnipresent systems of domination and oppression that so often function as givens in most people's lives. Neglecting the omnipresence of militarism allows the false belief that the absence of declared armed conflicts is peace, the polar opposite of war. It is particularly easy for those whose lives are shaped by the safety of privilege, and who do not regularly encounter the realities of militarism, to maintain this false belief. The belief that militarism is an ethical, political concern only regarding armed conflict, creates forms of resistance to militarism that are merely exercises in crisis control. Antiwar resistance is then mobilized when the "real" violence finally occurs, or when the stability of privilege is directly threatened, and at that point it is difficult not to respond in ways that make resisters drop all other political priorities. Crisis-driven attention to declarations of war might actually keep resisters complacent about and complicitous in the general presence of global militarism. Seeing war as necessarily embedded in constant military presence draws attention to the fact that horrific, state-sponsored violence is happening nearly all over, all of the time, and that it is perpetrated by military institutions and other militaristic agents of the state. systemic impacts outweigh their extinction impacts Martin, 84 - physicist whose research interests include stratospheric modelling. He is a research associate in the Dept. of Mathematics, Faculty of Science, Australian National University, and a member of SANA. (Brian, “Extinction politics”, SANA Update, May, http://www.bmartin.cc/pubs/84sana1.html) There are quite a number of reasons why people may find a belief in extinction from nuclear war to be attractive implicit Western chauvinism The effects of global nuclear war would mainly hit the population of the United States, Europe and the Soviet Union. This is quite unlike the pattern of other major ongoing human disasters of starvation, disease, poverty and political repression which mainly affect the poor, nonwhite populations of the Third World. The gospel of nuclear extinction can be seen as a way by which a problem for the rich white Western societies is claimed to be a problem for all the world. Symptomatic of this orientation is the belief that, without Western aid and trade, the economies and populations of the Third World would face disaster this is only Western self-centredness. Third World populations would in many ways be better off without the West A related factor linked with nuclear extinctionism is a belief that nuclear war is the most pressing issue facing humans. I disagree, both morally and politically, with the stance that preventing nuclear war has become the most important social issue for all humans concern over the actuality of massive suffering and millions of deaths resulting from poverty and exploitation can justifiably take precedence over nuclear war. Nuclear war may be the greatest threat to the collective lives of those in the rich, white Western societies but, for the poor, nonwhite Third World peoples, other issues are more pressing. to give precedence to nuclear war as an issue is to assume that nuclear war can be overcome in isolation from changes in major social institutions, including the state, capitalism, state socialism and patriarchy. If war is deeply embedded in such structures - as I would argue then to try to prevent war without making common cause with other social movements will not be successful politically .[8] Here I will only briefly comment on a few factors. The first is an . But Actually, : the pressure to grow cash crops of sugar, tobacco and so on would be reduced, and we would no longer witness fresh fish being airfreighted from Bangladesh to Europe. . Surely, in the Third World, the possibility of a similar death toll from In political terms, [9] - . This means that the antiwar movement needs to link its strategy and practice with other movements such as the feminist movement, the workers' control movement and the environmental movement. A focus on nuclear extinction also encourages a focus on appealing to elites as the means to stop nuclear war, since there seems no other means for quickly overcoming the danger. For example, Carl Sagan, at the end of an article about nuclear winter in a popular magazine, advocates writing letters to the presidents of the United States and of the Soviet Union.[10] But then appealing to elites has no chance of success decades. if war has deep institutional roots, . This has been amply illustrated by the continual failure of disarmament negotiations and appeals to elites over the past several Utilitarianism is Bad Utilitarianism is a flawed system. It is impossible to measure and to predict the benefits and/or harms resulting from a course of action or a moral rule. McCarthy and Lysaught 7 What’s wrong with utilitarianism?, “The Moral Course of Thinking” in Gathered for the Journey: Moral Theology in Catholic Perspective, Rapids: Michigan: Eerdmans Publishing Company, 2007. http://theophilogue.com/2009/11/19/utilitarianism-what-is-it-why-does-it-not-work/ McCarthy and Lysaught rehearse some of the standard criticisms of utilitarianism, for which I have given my own articulation and creative names. They run as follows: The Inevitability of Arbitrariness—It has no way to objectively determine the nature, importance, and value of consequences. To put it another way: How do we know what are “good” and “bad” consequences? What consequences count most? Whose opinion of what are “good” consequences and what are “bad” consequences counts most? Failure to give coherent and rational criterion for answering such questions spells decisive defeat for the whole theory of exclusive utilitarianism. It seems to need something else to help it out. That is why I personally think that the utilitarian factor is legitimate when considered as part of the Contrary Intuition—It often undermines our common sense and moral intuitions, often demanding certain actions that rub our conscience the wrong way. For example, what if I knew I could cheat on my wife with my picture, but exclusive utilitarianism always leads to arbitrary judgment of consequences, and therefore arbitrary ethics. The female boss without her ever finding out in order to get a raise, which would have “good” consequences for my family (less financial stress, my wife could cut back to part time to spend more time with the kids, the kids could benefit from more parental care, I could save more money for the kids for utilitarianism tells me it’s [works] like a math problem (good consequences = good action). The Omniscience Requirement— sometimes it is impossible to know the totality of the potential (much less the actual) consequences of one’s actions. Sometimes what looks to us to be a disaster turns out to be a blessing in disguise? We get fired only to later realize that the new job we attain as a consequence pays better and is more enjoyable. On the flip side, sometimes we think something is going to turn out great, but in the end is a big letdown. If these small scale experiences in the college, etc.)? My gut tells me: Don’t do this, it is wrong, wrong, wrong. But lives of ordinary people demonstrate how difficult it is to know the consequences of certain actions—how much more difficult must it be for people whose decisions effect an entire nation (e.g. the President) to judge the full weight of the consequences of their decisions? Utilitarianism can justify any barbarity Anderson, National Director of Probe Ministries International 2004 “Utilitarianism: The Greatest Good for the Greatest Number” http://www.probe.org/theology-andphilosophy/worldview--philosophy/utilitarianism-the-greatest-good-for-thegreatestnumber.html One problem with utilitarianism is that it leads to an "end justifies the means" mentality. If any worthwhile end can justify the means to attain it, a true ethical foundation is lost. But we all know that the end does not justify the means. If that were so, then Hitler could justify the Holocaust because the end was to purify the human race. Stalin could justify his slaughter of millions because he was trying to achieve a communist utopia. The end never justifies the means. The means must justify themselves. A particular act cannot be judged as good simply because it may lead to a good consequence. The means must be judged by some objective and consistent standard of morality. Second, utilitarianism cannot protect the rights of minorities if the goal is the greatest good for the greatest number. Americans in the eighteenth century could justify slavery on the basis that it provided a good consequence for a majority of Americans. Certainly the majority benefited from cheap slave labor even though the lives of black slaves were much worse. A third problem with utilitarianism is predicting the consequences. If morality is based on results, then we would have to have omniscience in order to accurately predict the consequence of any action. But at best we can only guess at the future, and often these educated guesses are wrong. A fourth problem with utilitarianism is that consequences themselves must be judged. When results occur, we must still ask whether they are good or bad results. Utilitarianism provides no objective and consistent foundation to judge results because results are the mechanism used to judge the action itself.inviolability is intrinsically valuable. Their framework condones mass slaughter – Util normalizes atrocities Jim Holt, New York Times, August 5, 1995 “Morality, Reduced To Arithmetic” http://www.nytimes.com/1995/08/05/opinion/morality-reduced-to-arithmetic.html Can the deliberate massacre of innocent people ever be condoned? The atomic bombs dropped on Hiroshima and Nagasaki on Aug. 6 and 9, 1945, resulted in the deaths of 120,000 to 250,000 Japanese by incineration and radiation poisoning. Although a small fraction of the victims were soldiers, the great majority were noncombatants -- women, children, the aged. Among the justifications that have been put forward for President Harry Truman’s decision to use the bomb, only one is worth taking seriously -- that it saved lives. The alternative, the reasoning goes, was to launch an invasion. Truman claimed in his memoirs that this would have cost another half a million American lives. Winston Churchill put the figure at a million. Revisionist historians have cast doubt on such numbers. Wartime documents suggest that military planners expected around 50,000 American combat deaths in an invasion. Still, when Japanese casualties, military and civilian, are taken into account, the overall invasion death toll on both sides would surely have ended up surpassing that from Hiroshima and Nagasaki. Scholars will continue to argue over whether there were other, less catastrophic ways to force Tokyo to surrender. But given the fierce obstinacy of the Japanese militarists, Truman and his advisers had some grounds for believing that nothing short of a full-scale invasion or the annihilation of a big city with an apocalyptic new weapon would have succeeded. Suppose they were right. Would this prospect have justified the intentional mass killing of the people of Hiroshima and Nagasaki? In the debate over the question, participants on both sides have been playing the numbers game. Estimate the hypothetical number of lives saved by the bombings, then add up the actual lives lost. If the first number exceeds the second, then Truman did the right thing; if the reverse, it was wrong to have dropped the bombs. That is one approach to the matter -- the utilitarian approach. According to utilitarianism, a form of moral reasoning that arose in the 19th century, the goodness or evil of an action is determined solely by its consequences. If somehow you can save 10 lives by boiling a baby, go ahead and boil that baby. There is, however, an older ethical tradition, one rooted in Judeo-Christian theology, that takes a quite different view. The gist of it is expressed by St. Paul’s condemnation of those who say, “Let us do evil, that good may come.” Some actions, this tradition holds, can never be justified by their consequences; they are absolutely forbidden. It is always wrong to boil a baby even if lives are saved thereby. Applying this absolutist morality to war can be tricky. When enemy soldiers are trying to enslave or kill us, the principle of self-defense permits us to kill them (though not to slaughter them once they are taken prisoner). But what of those who back them? During World War II, propagandists made much of the “indivisibility” of modern warfare: the idea was that since the enemy nation’s entire economic and social strength was deployed behind its military forces, the whole population was a legitimate target for obliteration. “There are no civilians in Japan,” declared an intelligence officer of the Fifth Air Force shortly before the Hiroshima bombing, a time when the Japanese were popularly depicted as vermin worthy of extermination. The boundary between combatant and noncombatant can be fuzzy, but the distinction is not meaningless, as the case of small children makes clear. Yet is wartime killing of those who are not trying to harm us always tantamount to murder? When naval dockyards, munitions factories and supply lines are bombed, civilian carnage is inevitable. The absolutist moral tradition acknowledges this by a principle known as double effect: although it is always wrong to kill innocents deliberately, it is sometimes permissible to attack a military target knowing some noncombatants will die as a side effect. The doctrine of double effect might even justify bombing a hospital where Hitler is lying ill. It does not, however, apply to Hiroshima and Nagasaki. Transformed into hostages by the technology of aerial bombardment, the people of those cities were intentionally executed en masse to send a message of terror to the rulers of Japan. The practice of ordering the massacre of civilians to bring the enemy to heel scarcely began with Truman. Nor did the bomb result in casualties of a new order of magnitude. The earlier bombing of Tokyo by incendiary weapons killed some 100,000 people. What Hiroshima and Nagasaki did mark, by the unprecedented need for rationalization they presented, was the triumph of utilitarian thinking in the conduct of war. The conventional code of noncombatant immunity -- a product of several centuries of ethical progress among nations, which had been formalized by an international commission in the 1920’s in the Hague -- was swept away. A simpler axiom took its place: since war is hell, any means necessary may be used to end, in Churchill’s words, “the vast indefinite butchery.” It is a moral calculus that, for all its logical consistency, offends our deep-seated intuitions about the sanctity of life -- our conviction that a person is always to be treated as an end, never as a means. Left up to the warmakers, moreover, utilitarian calculations are susceptible to bad-faith reasoning: tinker with the numbers enough and virtually any atrocity can be excused in the national interest. In January, the world commemorated the 50th anniversary of the liberation of Auschwitz, where mass slaughter was committed as an end in itself -the ultimate evil. The moral nature of Hiroshima is ambiguous by contrast. Yet in the postwar era, when governments do not hesitate to treat the massacre of civilians as just another strategic option, the bomb’s sinister legacy is plain: it has inured us to the idea of reducing innocents to instruments and morality to arithmetic. No Risk of Wars No Risk of Great Power Wars Goldstein, 9/10- ‘11 (Joshua- professor emeritus of international relations at American University and author of the forthcoming book “winning the war on war”, “Think Again: War”, Foreign Affairs) So far they haven't even been close. In fact, the last decade has seen fewer war deaths than any decade in the past 100 years, based on data compiled by researchers Bethany Lacina and Nils Petter Gleditsch of the Peace Research Institute Oslo. Worldwide, deaths caused directly by war-related violence in the new century have averaged about 55,000 per year, just over half of what they were in the 1990s (100,000 a year), a third of what they were during the Cold War (180,000 a year from 1950 to 1989), and a hundredth of what they were in World War II. If you factor in the growing global population, which has nearly quadrupled in the last century, the decrease is even sharper. Far from being an age of killer anarchy, the 20 years since the Cold War ended have been an era of rapid progress toward peace.Armed conflict has declined in large part because armed conflict has fundamentally changed. Wars between big national armies all but disappeared along with the Cold War, taking with them the most horrific kinds of mass destruction. Today's asymmetrical guerrilla wars may be intractable and nasty, but they will never produce anything like the siege of Leningrad. The last conflict between two great powers, the Korean War, effectively ended nearly 60 years ago. The last sustained territorial war between two regular armies, Ethiopia and Eritrea, ended a decade ago. Even civil wars, though a persistent evil, are less common than in the past; there were about a quarter fewer in 2007 than in 1990. If the world feels like a more violent place than it actually is, that's because there's more information about wars -- not more wars themselves. Once-remote battles and war crimes now regularly make it onto our TV and computer screens, and in more or less real time. Cell-phone cameras have turned citizens into reporters in many war zones. Societal norms about what to make of this information have also changed. As Harvard University psychologist Steven Pinker has noted, "The decline of violent behavior has been paralleled by a decline in attitudes that tolerate or glorify violence," so that we see today's atrocities -- though mild by historical standards -- as "signs of how low our behavior can sink, not of how high our standards have risen." There is an almost zero probability for great power shoot out- our evidence indicts all of the negatives impact scenarios Fettweis, ‘8 (Christopher J.- PoliSci Proff @ Tulan University and Former Proff of U.S. foreign policy and Grand strategy @ naval war college, “Losing Hurts Twice as Bad”, W.W. Norton & Company, p.190-94) One can be fairly confident in making such an assertion in part because of what might be the single most significant yet underreported trend in world politics: The world is significantly more peaceful at the beginning of the twenty-first century than at any time in recorded history. Although conflict and chaos may dominate the headlines, the incidence of warfare has dropped to remarkably low levels. A far greater percentage of the worlds people live in societies at peace than at any other time in history. Not only is the current era markedly better in most measurable categories of international security than ever before, but it is growing more stable as time goes by. At the very least, to a growing number of experts, a major clash of arms does not seem plausible. Major war may well have become obsolete. Rather than a “clash of civilizations” a “coming anarchy,” or a step “back to the future” toward multipolarity and instability, the new century may well prove to be far more peaceful than any previous one. The number and intensity of all kinds of conflict, including interstate wars, civil wars, and ethnic conflicts, declined steadily throughout the 1990s and into the new decade. This period of peace may be due to some combination of nuclear weapons, complex economic interdependence, the spread of democracy, or , as many scholars believe, a simple change in ideas about what is worth fighting for. These days, not much may be left. This rather bold and perhaps counterintuitive claim may seem a bit utopian to those familiar with the long, dismal history of warfare. Is not war an innate part of human nature, an outgrowth of our passions and imperfections, like murder? Not necessarily, say many of the scholars. After all, murder is an act of the individual, often of passion rather than reason: war is a rational act of state, a symptom of the broader practices of the international system of states. War is an institution, a tradition of dispute resolution, a method countries have chosen to employ when their interests diverge. Granted, it has been with us since the beginning of time, but as political scientists John Mueller has noted, “unlike breathing, eating or sex, war is not something that is somehow required by the human psyche, by the human condition , or by the forces of history.” The eminent military historian John Keegan reports being “impressed by the evidence that mankind, wherever it has the option, is distancing itself from the institution of warfare.” If keegan is impressed, then maybe we should be, too. Overall, as the table below shows, international and internal conflicts has steadily declined since the end of the cold war. Despite perceptions that the current wars “on terror” and in Iraq may have created, the world is a much safer place that it was in prior generations. There remains a human (and perhaps particularly American) tendency to replace one threat with another, to see international politics as an arena of dangerous competition, but this perception simply no longer matches the facts. The evidence is apparent on every continent. At the beginning of 2008, the only conflict raging in the entire western hemisphere was the ongoing civil war in Colombia, but even that was far less sever than it was a decade ago. Europe, which of course has been the most war-prone continent for most of human history, was entirely calm, without even the threat of interstate conflict. The situations in Bosnia and Kosovo were not settled, but they were at least stable for the moment. And in contrast to 1914, the great powers have shown no eagerness to fill Balkan power vacuums- to the contrary, throughout the 1990’s they had to be shamed into intervention, and were on the same side when they did. The entire Pacific Rim was currently experiencing no armed conflict. Even in the Middle East, where Iraq continued to burn, a tenuous peace was holding between Arabs and Israelis, terrorism not withstanding, and no other wars seemed imminent. This trend was even visible in Africa where , despite a variety of ongoing serious challenges, levels of conflict were the lowest they have ever been in the centuries of written history we have about the continent. Darfur and the Congo were the only real extended tragedies still underway; the intensity of the internal conflicts simmering in Algeria, Somalia, Senegal, and a couple of other places is in all cases lower than a decade ago. This can all change quite rapidly – Ethiopia and Eritrea might soon decide to renew their pointless fighting over uninhabitable land, for instance, or Kenya could melt down into chaos – but right now, the continent seems more stable than it has ever been. West Africa is quiet, at least for the moment, as is all of Southern Africa, despite the criminally negligent governance of Robert Mugabe in Zimbabwe. None of this is to suggest that these places are without problems, of course. But given the rapid increase in the world population and number of countries (the League of Nations had 63 members at its peak between the wars, while the United Nations currently has 192), one might expect a great deal more warfare than there currently is. We also are witnessing record low levels of the secondary symptoms of insecurity, such as arms races, military rivalry, and “cold” wars. Either we are merely experiencing another of the worlds occasional peaceful periods (and it would be by far the most remarkable such period ever), or something about the nature of international politics has changed, and for the better. The twentieth century witnessed an unprecedented pace of evolution in all areas of human endeavor, in science and medicine, transportation and communication, and even in religion. In such an atmosphere, perhaps it is not difficult to imagine that attitudes toward the venerable institution of warfare may also have experiences similarly rapid evolution, to the point where its obsolescence could become plausible, even probable, in spite of thousands of years of violent precedent. Perhaps the burden of proof should be on those who say that our rules of governing war cannot change, and that it will someday return with a vengeance. Overall, although the idea that war is becoming obsolete is gaining ground in academic circles, it has yet to make much headway in those of policymaking. One need not be convinced of its wisdom, however, to believe that the United States is an extremely safe country, or at the very least that its basic existence does not depend on an active presence abroad. No matter what happens in the far corners of the globe, it would seem, America is going to survive the coming century quite well. Even those who actively support internationalism have a hard time demonstrating that there foreign adventures are truly necessary to assume the basic security of the United States. The benefits of activist strategies must therefore manifestly outweigh the costs, since the United States could easily survive inaction, no matter how dire any future situation appears. War Focus Bad The exclusive definition of war as something that occurs between lily white sovereign states rejects the hundreds of colored wars that happen against the state because they are seen as “Hiccups” in the system Krishna 01 [Sankaran Krishna dept of political science @ university of hawii @ manoa, “Race, Amnesia, and the Education of International Relations”, October-December 2001, http://findarticles.com/p/articles/mi_hb3225/is_4_26/ai_n28886581/] The list does not include the periods 1815-1839 or 1882-1914, nor any of similar activities engaged in by European powers other than the British, such as France, Germany, Spain, Portugal, Italy, and Belgium. In thinking of what it is that allows these numerous and violent encounters between different peoples to fall out of the history of international relations, it becomes obvious that a certain principle of abstraction is at work here, centering on the concept of "sovereignty." Wars are defined exclusively as the acts of sovereign powers on each other in a tradition that goes back a long way in IR discourse, whereas the impressive list above constitutes merely encounters between various forms of quasi states, native principalities, warlords, tribes, territories, and puppet regimes, on the one hand, and a sovereign state, on the other. Such encounters can hence be excised from the genealogy of international relations. Thus, the Revolt of 1857 that swept across northern India, resulted in tens of thousands of deaths, and at one point looked likely to bring a forcible end to the British Raj there, does not count: it is not between two settled sovereign bounded entities that mutually recognize each other as authentic states. Rather, it is seen as a hiccup in the pacification of empire, a mere "Mutiny" as it came to be called, a "domestic" issue that is by its very definition incapable of altering the Hundred Years' Peace. The operation of this abstraction of sovereignty to deny the bloody history of the nineteenth century is no aberration. The same sovereign definition of "war" informs J. David Singer's voluminous data-gathering enterprise on conflict; it underlies the effort by Bueno de Mesquita to assess the rational utility calculations of war initiators; it allowed Rudy Rummell to claim that "democracies" rarely, if ever, initiate wars with each other or produce genocides; and for still others to claim (against all the evidence of the incredibly sanguinary twentieth century) that the Cold War brought stability and peace to the world order. (7) By deftly defining international as the encounter between sovereign states, much of a violent world history is instantly sanitized. A recent study by Bernard Nietschmann finds that of the 120 wars that were ongoing in 1987, only 4 were between sovereign states, and the vast majority of insurgencies and civil wars were unnoticed because "the media and academia are anchored in the stat e. Their tendency is to consider struggles against the state to be illegitimate or invisible. . . . They are hidden from view because the fighting is against peoples and countries that are often not even on the map." (8) Among other things, what this sovereigntist abstraction accomplishes is simple: the loss of lives during encounters between states and nonsovereign entities is of no consequence. It needs to be mentioned that the overwhelming number of these casualties were either brown or black, while sovereignty remained lily-white. The overwhelming discursive logic of the discipline is oriented toward securing the state against any other forms of belonging. (9) This actively sanctions and justifies global violence and genocide Krishna 01 [Sankaran Krishna dept of political science @ university of hawii @ manoa, “Race, Amnesia, and the Education of International Relations”, October-December 2001, http://findarticles.com/p/articles/mi_hb3225/is_4_26/ai_n28886581/] This article argues that the discipline of international relations was and is predicated on a systematic politics of forgetting, a willful amnesia, on the question of race. Historically, the emergence of a modern, territorially sovereign state system in Europe was coterminous with, and indissociable from, the genocide of the indigenous peoples of the "new" world, the enslavement of the natives of the African continent, and the colonization of the societies of Asia. Specifically, I will argue that the discipline of international relations maintains its ideological coherence via two crucial strategies of containment that normalize the coeval emergence of modern sovereignty and dispossession on a global scale: these strategies are "abstraction" and "redemption." In this article, I flesh out the argument vis-a-vis "abstraction"; for, reasons of space, however, I can have no more than an adumbrated discussion of "redemption." First, IR discourse's valorization, indeed fetishization, of abstraction is premised on a desire to escape history, to efface the violence, genocide, and theft that marked the encounter between the rest and the West in the post-Columbian era. Abstraction, usually presented as the desire of the discipline to engage in theory-building rather than in descriptive or historical analysis, is a screen that simultaneously rationalizes and elides the details of these encounters. By encouraging students to display their virtuosity in abstraction, the discipline brackets questions of theft of land, violence, and slavery--the three processes that have historically underlain the unequal global order we now find ourselves in. Over attention to these details is disciplined by professional practices that work as taboo: such-and-such an approach is deemed too historical or descriptive; that student is not adequately theoretical and consequently is lacking in intellectual rigor; so-and-so might be better off specializing in comparative politics or history or anthropology; such-and-such a question does not have any direct policy relevance; and so on. A second strategy of containment in IR discourse is the idea of deferred redemption. This operates by an eternal deferment of the possibility of overcoming the alienation of international society that commenced in 1492. While "realistically" such overcoming is regarded as well-nigh impossible, its promise serves as the principle by which contemporary and historical violence and inequality can be justified and lived with. Redemptive strategies of containment are reflected in a wide variety of IR discourses: Kant's idea of perpetual peace as consequent upon international war and dispersion; the possibility of an international community epitomized in organizations such as the United Nations; the promise of international socialism; the discourse of capitalist modernization on the Rostowian model; and more recently, the "end of history" under the regime of globalization. All these strategies hinge on the prospect of deferred redemption: the present is inscribed as a transitional phase whose violent and unequal character is expiated on the altar of that which is to come. *** Fusion Centers – Version #2 Counter Terrorism Advantage 1AC Advantage ___: Terrorism Nuclear Terror in a Year – They Have the Means and Motivation PressTV 25 2015 Foreign Policy Mon May 25, 2015 ISIL planning ‘nuclear attack inside US next year’: Report http://www.presstv.ir/Detail/2015/05/25/412751/ISIL-nuclear-attack-US-nextyear-report The ISIL terrorist group claims that it has enough money to buy a nuclear weapon from Pakistan and carry out an attack inside the United States next year.¶ The group said in an article in its English-language online magazine Dabiq that the weapon could be smuggled into the United States via its southern border with Mexico.¶ British journalist John Cantlie wrote in the article ISIL “has billions of dollars in the bank, so they call on their wilayah (Province) in Pakistan to purchase a nuclear device through weapons dealers with links to corrupt officials in the region.”¶ “The weapon is then transported overland until it makes it to Libya, where the mujahidin move it south to Nigeria,” the journalist said.¶ He added that “drug shipments from Columbia bound for Europe pass through West Africa, so moving other types of contraband from East to West is just as possible.”¶ Cantlie continued the weapon and accompanying radicals would then move up through Central America and Mexico before entering the US.¶ "From there it's a quick hop through a smuggling tunnel and hey presto, they're mingling with another 12 million 'illegal' aliens in America with a nuclear bomb in the trunk," he wrote.¶ "Perhaps such a scenario is far-fetched but it's the sum of all fears for Western intelligence agencies and it's infinitely more possible today than it was just one year ago,” Cantlie said. They Will Use WMDs By Theodore Schleifer, CNN May 12, 2015 Former CIA official: ISIS terrorist attack in U.S. is possible http://www.cnn.com/2015/05/12/politics/michael-morell-isis-attack-osama-bin-laden/ Islamic militants have the ability to direct individuals to conduct small-scale attacks in the United States and could pose an even greater threat in the future, according to the former deputy director of the Central Intelligence Agency. Michael Morell, a longtime intelligence analyst who served as acting director of the agency after the resignation of David Petraeus in 2012, warned that if ISIS was allowed to take refuge in Iraq and Syria, they could orchestrate an attack in the United States. The group has claimed responsibility for a recent attack in Garland, Texas, where police killed two gunmen. RELATED: Former CIA official takes aim at politicians Morell told CNN's Jake Tapper on "The Lead" that it is "not far-fetched" that ISIS or other terrorist groups could gain access to weapons of mass destruction. "That would be the nightmare scenario: a terrorist attack, here in the United States, here in New York, another major city, that involved either chemical, biological or other nuclear weapons," he said. Morell also disputed a report this week by Pulitzer Prize-winning journalist Seymour Hersh that a walk-in informant tipped the United States off to the location of Osama bin Laden before the American military killed him. "I can't tell you that somebody didn't walk into a station somewhere and say 'I know where Osama bin Laden is.'" Morell said. "But I can guarantee you that no one walk in ever provided information that actually led us to Osama bin Laden." Oversaturation of information makes tracking these threats impossible Thomas ’15 [Kansas City Star, Judy L. Thomas writer for Kansas City Star, http://projects.kansascity.com/2015/domestic-terrorism/#/story/18859890] But as Islamic extremists continue to wage attacks, the focus and some funding for preventing terrorism at home have dissolved: ▪ The 78 “fusion centers” promoted by the Department of Homeland Security to be the centerpiece of terror intelligence in the wake of 9/11 has disrupted a system of police work that previously had been effective. ▪ Despite hundreds of millions of taxpayer dollars pumped into them, the centers are largely autonomous and operated by disparate agencies that sometimes don’t even cooperate with one another. ▪ The fusion center victories the DHS touts often have little to do with domestic terrorism. In fact, many of them involve drug busts, fugitive apprehension or natural disaster responses. ▪ The FBI, which operates more than 100 terrorism task forces, also has struggled to track domestic terrorism for a variety of reasons, including clashes with fusion centers, critics say. ▪ Congress has eliminated funding for a Justice Department program that provides anti-terrorism training and resources to thousands of law enforcement officers. The FBI acknowledges the agency turned its attention to foreign terrorists after 9/11. “Our efforts today remain very heavily focused in the area of the international terrorism threat, but we have an active domestic terrorism program as well,” said spokesman Paul Bresson. “Over the course of time, it has been critical for the FBI to be agile to respond to all emerging threats, regardless of where they originate. And that is what we have done extremely well over our 107-year history.” A DHS spokesman said his agency, too, was continuing to give domestic terrorism the attention it needs. Homeland Security “protects our nation from all threats, whether foreign or homegrown, and regardless of the ideology that motivates its violence,” S.Y. Lee said in an email last month. The agency “does not concentrate on any particular group or ideology,” Lee said. Yet all the while, those who monitor domestic terrorism say the threat continues to mount. “We are five years into the largest resurgence of right-wing extremism that we’ve had since the 1990s,” said Mark Pitcavage, director of investigative research for the Anti-Defamation League, which trains more than 10,000 law enforcement officers a year about domestic terrorism, extremism and hate crimes. From 2009 through July 2014, Pitcavage said, authorities were involved in 46 shootouts with domestic extremists. “When it comes to domestic extremism, what tends to happen is that a lot of it goes under the radar, and a lot — including murders and what you would think would be major incidents — only gets reported locally and regionally,” Pitcavage said. “So unless it happens in your backyard, the average American doesn’t quite realize how much of this is happening.” Dirty bombs go nuclear---high risk of theft and attacks escalate Dvorkin 12 (Vladimir Z., Major General (retired), doctor of technical sciences, professor, and senior fellow at the Center for International Security of the Institute of World Economy and International Relations of the Russian Academy of Sciences. The Center participates in the working group of the U.S.-Russia Initiative to Prevent Nuclear Terrorism, 9/21/12, "What Can Destroy Strategic Stability: Nuclear Terrorism is a Real Threat," belfercenter.ksg.harvard.edu/publication/22333/what_can_destroy_strategic_stability.html) Hundreds of scientific papers and reports have been published on nuclear terrorism. International conferences have been held on this threat with participation of Russian organizations, including IMEMO and the Institute of U.S. and Canadian Studies. Recommendations on how to combat the threat have been issued by the International Luxembourg Forum on Preventing Nuclear Catastrophe, Pugwash Conferences on Science and World Affairs, Russian-American Elbe Group, and other organizations. The UN General Assembly adopted the International Convention for the Suppression of Acts of Nuclear Terrorism in 2005 and cooperation among intelligence services of leading states in this sphere is developing.¶ At the same time, these efforts fall short for a number of reasons, partly because various acts of nuclear terrorism are possible. Dispersal of radioactive material by detonation of conventional explosives (“dirty bombs”) is a method that is most accessible for terrorists. With the wide spread of radioactive sources, raw materials for such attacks have become much more accessible than weapons-useable nuclear material or nuclear weapons. The use of “ dirty bombs ” will not cause many immediate casualties, but it will result into long-term radioactive contamination, contributing to the spread of panic and socio-economic destabilization .¶ Severe consequences can be caused by sabotaging nuclear power plants, research reactors, and radioactive materials storage facilities. Large cities are especially vulnerable to such attacks. A large city may host dozens of research reactors with a nuclear power plant or a couple of spent nuclear fuel storage facilities and dozens of large radioactive materials storage facilities located nearby. The past few years have seen significant efforts made to enhance organizational and physical aspects of security at facilities, especially at nuclear power plants. Efforts have also been made to improve security culture. But these efforts do not preclude the possibility that well-trained terrorists may be able to penetrate nuclear facilities .¶ Some estimates show that sabotage of a research reactor in a metropolis may expose hundreds of thousands to high doses of radiation. A formidable part of the city would become uninhabitable for a long time.¶ Of all the scenarios, it is building an improvised nuclear device by terrorists that poses the maximum risk. There are no engineering problems that cannot be solved if terrorists decide to build a simple “gun-type” nuclear device. Information on the design of such devices, as well as implosion-type devices, is available in the public domain. It is the acquisition of weapons-grade uranium that presents the sole serious obstacle. Despite numerous preventive measures taken, we cannot rule out the possibility that such materials can be bought on the black market. Theft of weapons-grade uranium is also possible . Research reactor fuel is considered to be particularly vulnerable to theft, as it is scattered at sites in dozens of countries. There are about 100 research reactors in the world that run on weapons-grade uranium fuel, according to the International Atomic Energy Agency (IAEA).¶ A terrorist “gun-type” uranium bomb can have a yield of least 10-15 kt, which is comparable to the yield of the bomb dropped on Hiroshima . The explosion of such a bomb in a modern metropolis can kill and wound hundreds of thousands and cause serious economic damage. There will also be long-term sociopsychological and political consequences.¶ The vast majority of states have introduced unprecedented security and surveillance measures at transportation and other large-scale public facilities after the terrorist attacks in the United States, Great Britain, Italy, and other countries. These measures have proved burdensome for the countries’ populations, but the public has accepted them as necessary. A nuclear terrorist attack will make the public accept further measures meant to enhance control even if these measures significantly restrict the democratic liberties they are accustomed to. Authoritarian states could be expected to adopt even more restrictive measures.¶ If a nuclear terrorist act occurs, nations will delegate tens of thousands of their secret services’ best personnel to investigate and attribute the attack. Radical Islamist groups are among those capable of such an act. We can imagine what would happen if they do so, given the antiMuslim sentiments and resentment that conventional terrorist attacks by Islamists have generated in developed democratic countries. Mass deportation of the non-indigenous population and severe sanctions would follow such an attack in what will cause violent protests in the Muslim world. Series of armed clashing terrorist attacks may follow. The prediction that Samuel Huntington has made in his book “The Clash of Civilizations and the Remaking of World Order” may come true. Huntington’s book clearly demonstrates that it is not Islamic extremists that are the cause of the Western world’s problems. Rather there is a deep, intractable conflict that is rooted in the fault lines that run between Islam and Christianity. This is especially dangerous for Russia because these fault lines run across its territory. To sum it up, the political leadership of Russia has every reason to revise its list of factors that could undermine strategic stability. BMD does not deserve to be even last on that list because its effectiveness in repelling massive missile strikes will be extremely low. BMD systems can prove useful only if deployed to defend against launches of individual ballistic missiles or groups of such missiles. Prioritization of other destabilizing factors—that could affect global and regional stability—merits a separate study or studies. But even without them I can conclude that nuclear terrorism should be placed on top of the list. The threat of nuclear terrorism is real, and a successful nuclear terrorist attack would lead to a radical transformation of the global order . All of the threats on the revised list must become a subject of thorough studies by experts. States need to work hard to forge a common understanding of these threats and develop a strategy to combat them. Independently causes extinction via retaliation Ayson 10 - Professor of Strategic Studies and Director of the Centre for Strategic Studies: New Zealand at the Victoria University of Wellington (Robert, July. “After a Terrorist Nuclear Attack: Envisaging Catalytic Effects.” Studies in Conflict & Terrorism, Vol. 33, Issue 7. InformaWorld.) But these two nuclear worlds—a non-state actor nuclear attack and a catastrophic interstate nuclear exchange—are not necessarily separable. It is just some sort of terrorist attack , and especially an act of nuclear terrorism, could precipitate a chain of events leading to a massive exchange of nuclear weapons between two or more of the states that possible that possess them. In this context, today’s and tomorrow’s terrorist groups might assume the place allotted during the early Cold War years to new state possessors of small nuclear arsenals who were seen as raising the risks of a catalytic nuclear war between the superpowers started by third parties. These risks were considered in the late 1950s and early 1960s as concerns grew about nuclear proliferation, the so-called n+1 problem. It may require a considerable amount of imagination to depict an especially plausible situation where an act of nuclear terrorism could lead to such a massive inter-state nuclear war. For example, in the event of a terrorist nuclear attack on the United States, it might well be wondered just how Russia and/or China could plausibly be brought into the picture, not least because they seem unlikely to be fingered as the most obvious state sponsors or encouragers of terrorist groups. They would seem far too responsible to be involved in supporting that sort of terrorist behavior that could just as easily threaten them as well. Some possibilities, however remote, do suggest themselves. For example, how might the United States react if it was thought or discovered that the fissile material used in the act of nuclear terrorism had come from Russian stocks,40 and if for some reason Moscow denied any responsibility for nuclear laxity? The correct attribution of that nuclear material to a particular country might not be a case of science fiction given the observation by Michael May et al. that while the debris resulting from a nuclear explosion would be “spread over a wide area in tiny fragments, its radioactivity makes it detectable, identifiable and collectable, and a wealth of information can be obtained from its analysis: the efficiency of the explosion, the materials used and, most important … some indication of where the nuclear material came from.”41 Alternatively, if the act of nuclear terrorism came as a complete surprise, and American officials refused to believe that a terrorist group was fully responsible (or responsible at all) suspicion would shift immediately to state possessors. Ruling out Western ally countries like the United Kingdom and France, and probably Israel and India as well, authorities in Washington would be left with a very short list consisting of North Korea, perhaps Iran if its program continues, and possibly Pakistan. But at what stage would Russia and China be definitely ruled out in this high stakes game of nuclear Cluedo? In particular, if the act of nuclear terrorism occurred against a backdrop of existing tension in Washington’s relations with Russia and/or China, and at a time when threats had already been traded between these major powers, would officials and political leaders not be tempted to assume the worst? Of course, the chances of this occurring would only seem to increase if the United States was already involved in some sort of limited armed conflict with Russia and/or China, or if they were confronting each other from a distance in a proxy war, as unlikely as these developments may seem at the present time. The reverse might well apply too: should a nuclear terrorist attack occur in Russia or China during a period of heightened tension or even limited conflict with the United States, could Moscow and Beijing resist the pressures that might rise domestically to consider the United States as a possible perpetrator or encourager of the attack? Washington’s early response to a terrorist nuclear attack on its own soil might also raise the possibility of an unwanted (and nuclear aided) confrontation with Russia and/or China. For example, in the noise and confusion during the immediate aftermath of the terrorist nuclear attack, the U.S. president might be expected to place the country’s armed forces, including its nuclear arsenal, on a higher stage of alert. In such a tense environment, when careful planning runs up against the friction of reality, it is just possible that Moscow and/or China might mistakenly read this as a sign of U.S. intentions to use force (and possibly nuclear force) against them. In that situation, the temptations to preempt such actions might grow, although it must be admitted that any preemption would probably still meet with a devastating response. As part of its initial response to the act of nuclear terrorism (as discussed earlier) Washington might decide to order a significant conventional (or nuclear) retaliatory or disarming attack against the leadership of the terrorist group and/or states seen to support that group. Depending on the identity and especially the location of these targets, Russia and/or China might interpret such action as being far too close for their comfort, and potentially as an infringement on their spheres of influence and even on their sovereignty. One far-fetched but perhaps not impossible scenario might stem from a judgment in Washington that some of the main aiders and abetters of the terrorist action resided somewhere such as Chechnya, perhaps in connection with what Allison claims is the “Chechen insurgents’ … long-standing interest in all things nuclear.”42 American pressure on that part of the world would almost certainly raise alarms in Moscow that might require a degree of advanced consultation from Washington that the latter found itself unable or unwilling to provide. There is also the question of how other nuclear-armed states respond to the act of nuclear terrorism on another member of that special club. It could reasonably be expected that following a nuclear terrorist attack on the United States, bothRussia and China would extend immediate sympathy and support to Washington and would work alongside the United States in the Security Council. But there is just a chance, albeit a slim one, where the support of Russia and/or China is less automatic in some cases than in others. For example, what would happen if the United States wished to discuss its right to retaliate against groups based in their territory? If, for some reason, Washington found the responses of Russia and China deeply underwhelming, (neither “for us or against us”) might it also suspect that they secretly were in cahoots with the group, increasing (again perhaps ever so slightly) the chances of a major exchange. If the terrorist group had some connections to groups in Russia and China, or existed in areas of the world over which Russia and China held sway, and if Washington felt that Moscow or Beijing were placing a curiously modest level of pressure on them, what conclusions might it then draw about their culpability. Even Limited Casualties Are Sufficient to Trigger the Impact NTI ’11 Citing Vahid Majidi. Feb. 17 “FBI Official Sees 100% Likelihood of WMD Strike on U.S.” The Nuclear Threat Initiative works to strengthen global security by reducing global threats, Vahid Majidi is an FBI senior official. http://www.nti.org/gsn/article/fbi-official-sees-100-likelihood-of-wmdstrike-on-us/ Newsmax cited the case of Roger Bergendorff, who in 2008 was sentenced to 42 months in prison for possession of the lethal toxin ricin (see GSN, Nov. 18, 2008). A WMD event with limited casualties could still produce terrible psychological effects, Majidi singular lone wolf individual can do things in the dark of the night with access to a laboratory with low quantities of material and could hurt a few people but create a devastating effect on the American psyche," he said. A would-be attacker working alone remains a major concern, while intelligence agencies in the United States and abroad have established strategies for identifying schemes developed by terrorist organizations such as al-Qaeda, according to Majidi. Majidi said his office is pursuing strategies for identifying preparation of novel bioterrorism materials. " We are not sitting on our hands waiting to predict what will happen based on what happened yesterday,” Majidi said. "You can design an organism de novo said. "A that never existed before. While there is no known articulated threat, this is something that we feel is a technology or science that potentially can be misused, either accidentally or on purpose." The Plan is Necessary to Shift From Mass Surveillance to Targeted Surveillance Omtzigt and Schirmer 15 (Pieter and GÜNTER, “Mass surveillance: wrong in practice as well as principle,” Open Democracy, Feb 23, 2015, Accessed May 20, 2015, https://www.opendemo...-principle)// two solid empirical studies have shown that mass surveillance has not proved effective in the prevention of terrorist attacks, whereas targeted surveillance has. These studies have shown that those, who insist on collecting “the whole haystack” are not really helping the fight against terrorism if you target everything, there’s no target”. . In short, mass surveillance may actually help terrorists because it diverts limited resources away from traditional law enforcement, which gathers more intelligence on a smaller set of targets . By flooding the system with false positives, big-data approaches to counter-terrorism actually make it harder to identify and stop the real terrorists before they strike. In fact, on either side of the Atlantic, cited in the report of the Legal Affairs and Human Rights Committee, like the former NSA director, General Keith Alexander, . Jim Sensenbrenner, a veteran Republican member of Congress, pointed out that “the bigger haystack makes it harder to find the needle”. And Thomas Drake, a former NSA executive turned critic, said that “ An analysis of the Boston marathon bombing in April 2013 showed that alarm signals pointing to the future perpetrator were lost in a mass of alerts generated by tactics that threw the net too widely . In both the Boston and Paris cases, the perpetrators had been on the radar of the authorities for some time, but the relevant intelligence was not followed up properly because it was drowned in a mass of data That Makes FBI Surveillance Efficient and Effective – Only Way to Stop Terrorist Plots Schmidt ’15 "Report Credits F.B.I. With Progress Since 9/11, but Says More Is Needed." The New York Times. The New York Times, 25 Mar. 2015. Web. 24 June 2015. The F.B.I. has made great strides since the Sept. 11 attacks but urgently needs to improve its intelligence capabilities, hire more linguists and elevate the stature of its analysts to counter the rapidly evolving threats to the United States, according to a report released on Wednesday. The report by the F.B.I. 9/11 Review Commission said the bureau had prevented catastrophic terrorist attacks but needed to improve its ability to collect information from people and to efficiently analyze it, contending that the bureau lags “behind marked advances in law enforcement capabilities.” “This imbalance needs urgently to be addressed to meet growing and increasingly complex national security threats, from adaptive and increasingly tech-savvy terrorists, more brazen computer hackers and more technically capable, global cyber syndicates,” the report said. The 2004 report of the national Sept. 11 Commission and subsequent the report released Wednesday was far less critical. Rather than a rebuke, it amounts to a status-check on the F.B.I. transformation that began in 2001. Today’s bureau bears little resemblance to that organization, and some of the areas cited for reviews called for major changes to the F.B.I., but improvement are markedly better than they were years ago. For instance, the 2004 report said that two-thirds of the bureau’s analysts were qualified to perform their jobs. The latest report, by contrast, said, “The training and professional status of analysts has improved in recent years.” And while the report said the F.B.I. needed more translators, it was much less critical of the bureau’s foreign language ability than previous reports were. Many of the report’s recommendations related to issues that the F.B.I.’s director, James B. Comey, has the F.B.I.’s transformation from a law enforcement agency to an created a high-level executive position to oversee a branch division meant to expand the use of intelligence across all investigations. He has also said that raising the profile of analysts, and strengthening their relationships with agents, are among his chief priorities. “I think this is a moment of pride for the F.B.I.,” Mr. Comey said Wednesday at a news conference in Washington. “An outside group of some of our nation’s most important leaders and thinkers has stared hard at us and said, ‘You have done a great job at transforming yourself.’ They’ve also said what I’ve said around the country: ‘It’s not good enough.’” He raised since he took over the bureau in September 2013. For instance, Mr. Comey has said that one of his biggest priorities is continuing intelligence operation. Last year, he added, “There are a lot of ways you can be even better.” The review commission was created by Congress in 2014 to assess the bureau’s progress since the attacks. In particular, the panel examined the extent to “Many of the findings and recommendations in this report will not be new to the F.B.I.,” the latest report said. “The bureau is already taking steps to address them. In 2015, however, the F.B.I. faces an increasingly complicated and dangerous global threat environment that will demand an accelerated commitment to reform. Everything is moving faster.” The principal authors of the report were Bruce Hoffman, a professor of security studies at Georgetown University; Edwin Meese III, the former attorney general; and Timothy J. which the F.B.I. had put into effect the recommendations of the Sept. 11 Commission. Roemer, a former House member from Indiana and former ambassador to India. The panel was particularly critical of how the F.B.I. treats its analysts. It said that “despite its stated intentions to address concerns from its analysts,” the bureau did not regard them as a “professional work force” that needed to be continually trained and educated. It said analysts needed to “be empowered to question special agent’s The F.B.I. is far better at sharing information with other government agencies than it was before the Sept. 11 attacks, the report said. But it needs to improve how it communicates with local law enforcement operational assumptions.” authorities and the private sector. “Looking ahead, the F.B.I. will be increasingly dependent upon all domestic and foreign partnerships to succeed in its critical and growing national security missions — including against the rapidly evolving cyber and terrorist threats,” the report said. Cutting Fusion Centers Solves AT: Fusion Centers Key to Stop Terrorism FBI Programs Will Fill in and they are more efficient David Inserra, 4-15-2015, "Time to Reform the U.S. Counterterrorism Enterprise—Now," Heritage Foundation, http://www.heritage.org/research/reports/2015/04/time-to-reform-theus-counterterrorism-enterprisenow In the aftermath of 9/11, DHS was created to ensure that silos of information are broken down, and that counterterrorism agents are able to use the best intelligence proactively. While great strides have been made in this direction, DHS’s role in the intelligence and fusion centers “often produced irrelevant, useless or inappropriate intelligence reporting to DHS and many produced no intelligence reporting whatsoever fusion centers were not meaningfpully contributing to counterterrorism measures and may have even been harming efforts the fusion centers serve cities or regions already covered by 104 FBI Joint Terrorism Task Forces (JTTFs) and 56 Field Intelligence Groups (FIGs), which play a similar role to that of fusion centers. This broad duplication of efforts results in an inefficient and counterproductive use of counterterrorism funds. information-sharing arenas remain limited. In 2012, the Senate Homeland Security and Government Affairs Committee found that .” It also provided multiple assessments and examples that show .[1] More recent reports also show fusion centers to have mixed results.[2] Meant to serve as hubs of sharing between federal, state, and local officials, 78 often [3] In 2013, the DHS Inspector General (IG) reported that DHS’s Homeland Security Information Network (HSIN)—designed to share sensitive but not classified information with federal, state, local government, and private-sector partners—was only being used by a small percentage of all potential partners. State and local officials stated that one reason for not using HSIN was that “the system content was not useful.”[4] Since the IG report came out, however, HSIN has successfully migrated to an updated system and is seeking to add desired content from DHS components.[5] At around 40,000 active users at the end of 2013, HSIN is far short of its 2015 objective of 130,000.[6] Furthermore, a RAND report sponsored by DHS found that HSIN was only a somewhat useful source of information.[7] Fusion Centers Don’t Solve Counter Terror Fusion Centers are inefficient mechanisms for data collection – This circumvents their ability in counter terror operations Michael German, Policy Counsel for National Security, ACLU Washington Legislative Office, and Jay Stanley, Public Education Director, ACLU Technology and Liberty Program, 2007 December “What’s Wrong With Fusion Centers?” https://www.aclu.org/files/pdfs/privacy/fusioncenter_20071212.pdf New institutions like fusion centers must be planned in a public, open manner, and their¶ implications for privacy and other key values carefully thought out and debated. And like¶ any powerful institution in a democracy, they must be constructed in a carefully bounded¶ and limited manner with sufficient checks and balances to prevent abuse.¶ Unfortunately, the new fusion centers have not conformed to these vital requirements.¶ Since no two fusion centers are alike, it is difficult to make generalized statements about¶ them. Clearly not all fusion centers are engaging in improper intelligence activities and¶ not all fusion center operations raise civil liberties or privacy concerns. But some do,¶ and the lack of a proper legal framework to regulate their activities is troublesome. This¶ report is intended to serve as a primer that explains what fusion centers are, and how¶ and why they were created. It details potential problems fusion centers present to the¶ privacy and civil liberties of ordinary Americans, including:¶ • Ambiguous Lines of Authority. The participation of agencies from multiple¶ jurisdictions in fusion centers allows the authorities to manipulate differences in¶ federal, state and local laws to maximize information collection while evading¶ accountability and oversight through the practice of “policy shopping.”¶ r¶ i¶ v¶ a¶ t¶ e¶ S¶ e¶ c¶ t¶ o¶ r¶ P¶ a¶ r¶ t¶ i¶ c¶ i¶ p¶ a¶ t¶ i¶ o¶ n¶ . Fusion centers are incorporating private-sector¶ corporations into the intelligence process, breaking down the arm’s length¶ relationship that protects the privacy of innocent Americans who are employees¶ or customers of these companies, and increasing the risk of a data breach.¶ •¶ M¶ i¶ l¶ i¶ t¶ a¶ r¶ y¶ P¶ a¶ r¶ t¶ i¶ c¶ i¶ p¶ a¶ t¶ i¶ o¶ n¶ . Fusion centers are involving military personnel in law¶ enforcement activities in troubling ways.¶ •¶ D¶ a¶ t¶ a¶ F¶ u¶ s¶ i¶ o¶ n¶ =¶ D¶ a¶ t¶ a¶ M¶ i¶ n¶ i¶ n¶ g¶ . Federal fusion center guidelines encourage whole¶ sale data collection and manipulation processes that threaten privacy.¶ •¶ E¶ x¶ c¶ e¶ s¶ s¶ i¶ v¶ e¶ S¶ e¶ c¶ r¶ e¶ c¶ y¶ . Fusion centers are hobbled by excessive secrecy, which¶ limits public oversight, impairs their ability to acquire essential information and¶ impedes their ability to fulfill their stated mission, bringing their ultimate value¶ into doubt.¶ The lack of proper legal limits on the new fusion centers not only threatens to undermine¶ fundamental American values, but also threatens to turn them into wasteful and misdirected¶ bureaucracies that, like our federal security agencies before 9/11, won’t succeed¶ in their ultimate mission of stopping terrorism and other crime. Fusion centers hinder war on terror Smith ’12 [Oct 3, 2012, Network World, Ms. Smith Senior Director of Circulation citing Senate report on fusion centers, “Fusion centers don't find terrorists, filled with 'crap' that violates privacy”, http://www.networkworld.com/article/2223243/microsoft-subnet/fusion-centersdon-t-find-terrorists--filled-with--crap--that-violates-privacy.html] Another chapter on how-it-hindered counterterrorism cited an example of the "Russian 'cyberattack' in Illinois" where the hacker allegedly cracked into the utility control system. According to the red-alert fusion center report, the hacker "sent commands which caused a water pump to burn out." The Department of Defense said such cyberattacks would be treated as "acts of war" and the FBI launched an investigation. However, according to the report: "In truth, there was no intrusion, and DHS investigators eventually concluded as much. The so- called "intrusion" from Russia was actually an incident of legitimate remote computer access by a U.S. network technician who was working while on a family vacation. Almost no part of the initial reports of the incident had been accurate - not the fusion center report, or DHS's own intelligence report, or its intelligence briefing. The only fact they got right was that a water pump in a small Illinois water district had burned out. That is just one of several examples. The Senate investigation found that: claims made by DHS did not always fit the facts, and in no case did a fusion center make a clear and unique intelligence contribution that helped apprehend a terrorist or disrupt a plot. Worse, three other incidents examined by the Subcommittee investigation raised significant concerns about the utility of the fusion centers, and raised the possibility that some centers have actually hindered or sidetracked federal counterterrorism efforts. Data Collection Through Fusion Centers Cant Solve Counter Terrorism Walker ’12 "Fusion Centers: Expensive, Practically Useless, and Bad for Your Liberty." Reason.com. N.p., 03 Oct. 2012. Web. 22 June 2015. The Senate Committee on Homeland Security and Governmental Affairs has just released a report [pdf] on the "fusion centers" that pepper the law-enforcement landscape -- shadowy intelligence-sharing shops run on the state and local level but heavily funded by the federal Department of Homeland Security. It is a devastating document. When a report's recommendations include a plea for the DHS to "track how much money it gives to each fusion center," you know you're dealing with a system that has some very basic problems.¶ After reviewing 13 months' worth of the fusion centers' output, Senate investigators concluded that the centers' reports were "oftentimes shoddy, rarely timely, sometimes endangering citizens' civil liberties and Privacy Act protections, occasionally taken from already-published public sources, and more often than not unrelated to terrorism." One report offered the vital intelligence that "a certain model of automobile had folding rear seats that provided access to the trunk without leaving the car," a feature deemed notable because it "could be useful to human traffickers." Others highlighted illegal activities by people in the Terrorist Identities Datamart Environment (TIDE) database, which sounds useful until you hear just what those people did that attracted the centers' attention. One man was caught speeding. Another shoplifted some shoes. TIDE itself, according to the Senate report, is filled not just with suspected terrorists but with their "associates," a term broad enough to rope in a two-year-old boy.¶ Nearly a third of the reports were not even circulated after they were written, sometimes because they contained no useful information, sometimes because they "overstepped legal boundaries" in disturbing ways: "Reporting on First Amendment-protected activities lacking a nexus to violence or criminality; reporting on or improperly characterizing political, religious or ideological speech that is not explicitly violent or criminal; and attributing to an entire group the violent or criminal acts of one or a limited number of the group's members." (One analyst, for example, felt the need to note that a Muslim community group's list of recommended readings included four items whose authors were in the TIDE database.) Interestingly, while the DHS usually refused to publish these problematic reports, the department also retained them for an "apparantly indefinite" period.¶ Why did the centers churn out so much useless and illegal material? A former employee says officers were judged "by the number [of reports] they produced, not by quality or evaluations they received." Senate investigators were "able to identify only one case in which an official with a history of serious reporting issues faced any consequences for his mistakes." Specifically, he had to attend an extra week of training.¶ Other issues identified in the Senate report:¶ • Some of the fusion centers touted by the Department of Homeland Security do not, in fact, exist.¶ • Centers have reported threats that do not exist either. An alleged Russian "cyberattack" turned out to be an American network technician accessing a work computer remotely while on vacation.¶ • DHS "was unable to provide an accurate tally of how much it had granted to states and cities to support fusion centers efforts." Instead it offered "broad estimates of the total amount of federal dollars spent on fusion center activities from 2003 to 2011, estimates which ranged from $289 million to $1.4 billion."¶ When you aren't keeping track of how much you're spending, it becomes hard to keep track of what that money is being spent on. All sorts of dubious expenses slipped by. A center in San Diego "spent nearly $75,000 on 55 flat-screen televisions," according to the Senate report. "When asked what the televisions were being used for, officials said they displayed calendars, and were used for 'open-source monitoring.' Asked to define 'open-source monitoring,' SD-LECC officials said they meant 'watching the news.'"¶ The report is also filled with signs of A "2010 assessment of state and local fusion centers conducted at the request of DHS found widespread deficiencies in the centers' basic counterterrorism information-sharing capabilities," for example. "DHS did not share that report with Congress or discuss its findings publicly. When the stonewalling. Subcommittee requested the assessment as part of its investigation, DHS at first denied it existed, then disputed whether it could be shared with Congress, before ultimately providing a copy."¶ And then there's the matter of mission creep. Many centers have adopted an "all-crime, all-hazards" approach that shifts their focus from stopping terrorism and onto a broader spectrum of threats. You could make a reasonable case that this is a wiser use of public resources -- terrorism is rare, after all, and the DHS-driven movement away from the all-hazards approach in the early post-9/11 years had disastrous results. Unfortunately, the leading "hazards" on the fusion centers' agenda appear to be drugs At any rate, the DHS should stop citing the centers as a key part of America's counterterrorism efforts if those centers have found better (or easier) things to do than trying to fight terror. and illegal aliens. Fusion Centers Wont Stop the Next Attack Fusion Centers Are Not Equipped To Stop the Next Major Terrorist Attack Sosadmin ‘15 "So-called 'counterterror' Fusion Center in Massachusetts Monitored Black Lives Matter Protesters." So-called 'counterterror' Fusion Center in Massachusetts Monitored Black Lives Matter Protesters. N.p., 28 Nov. 2014. Web. 24 June 2015. Law enforcement officials at the Department of Homeland Security-funded “Commonwealth Fusion Center” spied on the Twitter and Facebook accounts of Black Lives Matter protesters in Boston earlier this week, the Boston Herald reports.¶ The reference to the so-called ‘fusion’ spy center comes at the very end of a news story quoting Boston protesters injured by police in Tuesday night’s demonstrations, which was possibly the largest Ferguson related protest in the country the day after the non-indictment of Darren Wilson was announced.¶ The state police Commonwealth Fusion Center monitored social media, which . There are nearly 100 fusion centers nationwide, and two in Massachusetts. The Commonwealth Fusion Center in Maynard is run by the Massachusetts State Police. The Boston Regional Intelligence Center, also known as the ‘BRIC’, is located at Boston Police Department headquarters in Roxbury and run by the BPD. Both fusion centers were established with funds from the Department of Homeland Security, and rely heavily on federal ‘counterterrorism’ grants.¶ Fusion centers have long come under fire from congressional leaders and democracy advocates as being largely wasteful, duplicative of other local/federal counterterrorism efforts, and violative of civil rights and civil liberties. In Boston, the ACLU disclosed internal ‘intelligence files’ showing that BRIC officials used their provided “critical intelligence about protesters’ plans to try to disrupt traffic on state highways,” state police said federally-funded ‘counterterrorism’ infrastructure to monitor peaceful protesters including Veterans for Peace and CODEPINK, labeling them as domestic extremists and Fusion center officials in Pennsylvania got caught spying on anti-fracking activists, apparently in league with natural gas companies. An Arkansas fusion center director told the press his spy office doesn’t monitor US citizens, just anti-government groups—however that’s defined. Washington state fusion centers have insinuated that activism is terrorism.¶ There are many, many other examples nationwide of these so-called fusion centers getting caught red handed monitoring protest movements and dissidents, conflating First Amendment protected speech with crime or terrorism. The fusion centers, meanwhile, have never once stopped a terrorist attack. It’s not clear what beyond monitoring dissidents and black people—through so-called ‘gang’ databases—these fusion centers actually do. We here in Boston know one thing for sure: they don’t stop terrorism.¶ Some homeland security threats. The Boston fusion center even kept track of the political activities of Marty Walsh, currently the city’s mayor. people might say that ‘counterterrorism’ analysts at the Commonwealth Fusion Center should be monitoring the tweets and Facebook posts of Black Lives Matter activists, if those activists intend to shut down highways.¶ We can agree to disagree about that, but please don’t say these fusion centers are primarily dedicated to stopping terrorism when they are doing things like this. Stopping traffic for a few hours is civil disobedience, not terrorism. A supposed anti-terrorism center has no business monitoring public social media accounts looking for ‘intelligence’ about civic protest movements. Info Gathering Intel Gap Fusion centers create information redundancies that offset the programs effectiveness Inserra 2015, David Inserra Research Associate, Homeland Security and Cybersecurity, 15 April 2015, http://www.heritage.org/research/reports/2015/04/time-to-reform-the-us-counterterrorism-enterprisenow. PE In 2012, the Senate Homeland Security and Government Affairs Committee found that fusion centers “often produced irrelevant, useless or inappropriate intelligence reporting to DHS and many produced no intelligence reporting whatsoever.” It also provided multiple assessments and examples that show fusion centers were not meaningfully contributing to counterterrorism measures and may have even been harming efforts.[1] More recent reports also show fusion centers to have mixed results.[2] Meant to serve as hubs of sharing between federal, state, and local officials, the 78 fusion centers often serve cities or regions already covered by 104 FBI Joint Terrorism Task Forces (JTTFs) and 56 Field Intelligence Groups (FIGs), which play a similar role to that of fusion centers.[3] This broad duplication of efforts results in an inefficient and counterproductive use of counterterrorism funds. Accurate Intel Key Fusion Centers’ emphasis on data collection creates a need in the haystack scenario that makes the identification and prevention of terror threats impossible – reverting to old anti-terror methods is key WashingtonsBlog May 7, 2015 by NSA Admits It Collects Too MUCH Info to Stop Terror Attacks http://www.washingtonsblog.com/2015/05/nsa-admits-it-collects-too-much-info-to-stopterror-attacks.html Top security experts agree that mass surveillance is ineffective … and actually makes us MORE vulnerable to terrorism.¶ For example, the former head of the NSA’s global intelligence gathering operations – Bill Binney – says that the mass surveillance INTERFERES with the government’s ability to catch bad guys, and that the government failed to stop 9/11, the Boston Bombing, the Texas shootings and other terror attacks is because it was overwhelmed with data from mass surveillance on Americans.¶ Binney told Washington’s Blog:¶ A good deal of the failure is, in my opinion, due to bulk data. So, I am calling all these attacks a result of “Data bulk failure.” Too much data and too many people for the 10-20 thousand analysts to follow. Simple as that. Especially when they make word match pulls (like Google) and get dumps of data selected from close to 4 billion people.¶ This is the same problem NSA had before 9/11. They had data that could have prevented 9/11 but did not know they had it in their data bases. This back then when the bulk collection was not going on. Now the problem is orders of magnitude greater. Result, it’s harder to succeed.¶ Expect more of the same from our deluded government that thinks more data improves possibilities of success. All this bulk data collection and storage does give law enforcement a great capability to retroactively analyze anyone they want. But, of course,that data cannot be used in court since it was not acquired with a warrant. ¶ Binney and other high-level NSA whistleblowers noted last year:¶ On December 26, for example, The Wall Street Journal published a lengthy front-page article, quoting NSA’s former Senior Technical Director William Binney (undersigned) and former chief of NSA’s SIGINT Automation Research Center Edward Loomis (undersigned) warning that NSA is drowning in useless data lacking adequate privacy provisions, to the point where it cannot conduct effective terrorist-related surveillance and analysis.¶ A recently disclosed internal NSA briefing document corroborates the drowning, with the embarrassing admission, in bureaucratize, that NSA collection has been “outpacing” NSA’s ability to ingest, process, and store data – let alone analyze the take.¶ Indeed, the pro-spying NSA chief and NSA technicians admitted that the NSA was drowning in too much data 3 months before 9/11:¶ In an interview, Air Force Lt. Gen. Michael Hayden, the NSA’s director … suggested that access isn’t the problem. Rather, he said, the sheer volume and variety of today’s communications means “there’s simply too much out there, and it’s too hard to understand.”¶ ***¶ “What we got was a blast of digital bits, like a fire hydrant spraying you in the face,” says one former NSA technician with knowledge of the project. “It was the classic needle-in-the-haystack pursuit, except here the haystack starts out huge and grows by the second,” the former technician says. NSA’s computers simply weren’t equipped to sort through so much data flying at them so fast.¶ And see this.¶ If more traditional anti-terror efforts had been used, these terror plots would have been stopped. AT: The Plan Causes “Turf Wars” The Argument that the plan results in “turf wars” between intelligence agencies is a non-starter - there are procedures in place for intel sharing on legitimate threats – its only a question of whether or not we can process that information by WashingtonsBlog in an interview with Thomas Drake, former senior NSA executive, June 13, 2014 Senior NSA Executive DEMOLISHES Intelligence Agencies’ Excuse for 9/11 http://www.washingtonsblog.com/2014/06/senior-nsa-manager-demolishes-intelligenceagencies-excuse-911.html The U.S. government pretended that 9/11 was unforeseeable.¶ But overwhelming evidence shows that 9/11 was foreseeable. Indeed, Al Qaeda crashing planes into the World Trade Center and the Pentagon was itself foreseeable.¶ The fallback government position is that the problem was that intelligence agencies were prohibited by law from sharing intelligence, because there was a “Chinese Wall” put up between agencies focusing on foreign and domestic threats.¶ Washington’s Blog spoke with senior NSA executive Thomas Drake about this claim. ¶ 9/11 was Drake’s first day on the job at the NSA. Drake was tasked with investigating what intelligence NSA had on the 9/11 plot, in order to document that 9/11 wasn’t NSA’s fault. However, Drake discovered that NSA had a lot of information on the hijackers, and could have stopped 9/11 had it shared its data with other intelligence agencies.¶ Drake’s NSA bosses didn’t like that answer, so they removed Drake from his A lot of people blame a “Chinese Wall” between foreign intelligence activities and domestic intelligence activities for not sharing the pre-9/11 data.¶ THOMAS DRAKE: That is a completely false “wall.” It was essentially to protect the status quo, or what they call “equities.”¶ It’s not true at all.¶ WASHINGTON’S BLOG: Was it a turf war?¶ THOMAS DRAKE: Yes, it’s partly that. People have this idea that the government is all powerful, all-knowing, and everybody is in league with each other.¶ That’s not true. In fact – in this space – you more often than not find task of being the NSA’s investigator and spokesman regarding 9/11. ¶ Here’s what Drake told us.¶ WASHINGTON’S BLOG: agencies at war with each other, effectively. Such that NSA is at war with Congress to keep them in the dark about what they’re really doing. ¶ “I have knowledge, you don’t.” Information is power. “If I give it to you, then I’m giving away my power, and I’m not going to do it!” ¶ Information is a currency. “Why would I give you my money. And I don’t know what you’re going to do with it. I don’t know how you’re going to spend it. I don’t know how you’re going to invest it. You may convert it, because money is fungible.” ¶ Information is far more fungible even than traditional definitions of money.¶ I’ve never accepted the premise or the arguments. I’m aware that [9/11 Commissioner] Jamie Gorelick [who has potential conflicts of interest in the subject matter], for example, is a well-known defender who kept saying that the “wall” was It is true that in terms of separation between [domestic] law enforcement and normal causal chain of evidence, and information that was collected for intelligence purposes. But that’s not a wall as much as it’s due process.¶ Remember, what’s now used is parallel construction. [Background.] So, what was the wall again?¶ Intelligence is always carefully vetted for that reason. But if you’re talking U.S. domestic law, U.S. judicial process, due process, you couldn’t just take [raw] intelligence. ¶ But here’s the kicker … If you believed that the intelligence rose to the level someone who has a U.S. person was involved in acts or planning to harm the United States, then the wall disappears, and there are actual procedures for that.¶ When you’re dealing with U.S. persons, then you had these procedures in which you could actually present [evidence for the need to target terrorists or other actual bad guys.] That was the whole thing with the Foreign Intelligence Surveillance Act.¶ WASHINGTON’S BLOG: If they’re actual bad guys, then you can go after them.¶ THOMAS DRAKE: Yes! And you had mechanisms where you actually end up putting them on trial. You have mechanisms where you can introduce that as evidence.¶ It there when, in fact, there wasn’t a wall.¶ And we had special procedures where you had known ways to go through the wall when it was necessary. ¶ Here’s the hypocrisy … wasn’t like, “Oh, we can’t tell anybody.” That’s the reason they didn’t want to tell anybody … because they’re actually abusing the system.¶ There isn’t a “wall” … it’s because there’s due process. With foreign intelligence, we had standing procedures.¶ We’ve tried bad people … in Article III courts. You didn’t have to do the rendition stuff. And you don’t have to be a U.S. citizen to be put on trial. AT: Intel From Fusion Centers Key to Stop Terrorism Oversaturation of information makes predicting terrorism linkages impossible Chad Foster, chief policy analyst,The Council of State Governments and Gary Cordner, professor, College of Justice & Safety, Eastern Kentucky University 2005 “The Impact of Terrorism on State Law Enforcement” The Council of State Governments and Eastern Kentucky University Joint Report State police have many competing public safety and law enforcement priorities¶ today. As is often the case when new crimes surface, these agencies are struggling¶ with incorporating new terrorism-related demands into the existing crime-fighting¶ framework. To this end, two views or approaches are embraced—dedicating personnel¶ for terrorism-related duties, or fully integrating terrorism into other crime¶ prevention duties, the “all crimes” approach.¶ The dedicated-personnel model is partly predicated on the assumption that terrorists¶ and terrorist-related activities are not closely linked to other more traditional¶ criminal activity such as financial crimes and drug smuggling. The requirements¶ for fighting terrorism are unlike those for dealing with these other crimes.¶ Advocates of this model also argue for a separate, specialized approach because¶ the risks and stakes associated with terrorism are extremely high, and this approach¶ prevents “mission creep” into other law enforcement priorities. This is a valid concern,¶ especially given how agencies today measure performance through quantitative¶ factors such as number of arrests and prosecutions. Unlike other crimes, three¶ years could pass before one state-level arrest is made related to terrorism.¶ A preponderance of states and experts believe that a nexus does exist among¶ types of criminal activity, including illegal drug operations, money laundering,¶ fraud, identity theft and terrorism. It is well known that some of the Sept. 11 terrorists were cited for traffic violations prior to the attacks while others obtained¶ and used fraudulent driver’s licenses.8 Many experts believe there to be a high¶ probability to identify terrorists through their involvement in precursor or lower level¶ criminal activity, as was possible with the Sept. 11 terrorists. Proponents of¶ this model argue that an “all crimes” approach to terrorism prevention should be¶ embraced by the states.¶ This strategy ensures that possible precursor crimes are screened and analyzed¶ for linkages to larger-scale terrorist activities. Furthermore, experts believe that¶ terrorists will behave like fugitives if pressured by law enforcement from many¶ different levels and angles. Thus, terrorists will become vulnerable by resorting to¶ criminal activity to support terrorist-related operations. Emergency management¶ professionals use a similar approach, known as “all hazards,” for emergency¶ response and preparedness.¶ Although possible, making these linkages appears to be extremely difficult.¶ First, there is a shortage of research about the precursor crimes-terrorism nexus.¶ Evidence is needed suggesting how certain types of crimes are more or less prone¶ to supporting terrorism-related activities. Otherwise, law enforcement analysts and¶ investigators are likely scanning very broadly for linkages, wasting precious time¶ and resources. More concrete evidence would help law enforcement home in on¶ those crimes that have the greatest chance for supporting terrorist-related activities. Terror Threat High Nuke Terror by September ISIS nuclear attack in September – smuggling nukes is extremely easy Austin 6-11-15 (Jon, “Is Chuck Norris right about 'ISIS 'smuggling nuke into US for 9/11 anniversary strike?'” http://www.express.co.uk/news/world/583537/Chuck-Norris-Islamic-State-ISISnuclear-weapons-US-attack-9-11-September-11anniversary?_ga=1.138454139.910419963.1435348842) But, a conspiracy theory put forward by Hollywood action movie legend that Islamic State (ISIS) wants to smuggle a nuclear weapon into America for a world-changing attack on the anniversary of 9/11, could have some legs. It comes after the Australian foreign minister, Julie Bishop made similar claims AFTER Norris revealed his thoughts in a blog. Norris said he believes the reason the US army is mysteriously amassing in seven southern states is to prevent ISIS smuggling a dirty bomb into the country and destroying cities. He pointed to how ISIS sources have already claimed the group has obtained the 40kg of uranium compounds seized from Mosul University last July. Norris said will $2billion in seized assets they had the buying power to bribe corrupt officials in Pakistan for the remaining equipment and know how to build a bomb, which could then be exported to Libya, onto Nigera, South American and into the US. Last night, after www.expresss.co.uk exclusively revealed the martial arts experts' theory, it emerged Ms Bishop was saying Nato members are growing increasingly worried about radioactive material seized by the terror group, with fears that it could be turned into a nuclear weapon. She fears ISIS fighters have stolen or captured the toxic loot from government-controlled research centres and hospitals across the region. The radioactive matter is thought to have been destined for use by authorities for health and science research - but it has now fallen into the hands of ISIS radicals. The most likely place to get it from is Pakistan, she said. Ms Bishop claimed the jihadi organisation had recruited "highly technically trained professionals" and was already using chlorine as a weapon. She added that ISIS was "prepared to use any and all means, any and all forms of violence they can think of, to advance their demented cause. "That includes use of chemical weapon." A former commander of the British army's chemical weapons unit has also spoken out in support of the Australian foreign minister and Chuck Norris' comments, calling the development of a dirty bomb by ISIS a "very real threat". Hamish de Bretton-Gordon also described as "worrying" reports that ISIS fighters had got hold of chemical weapons previously controlled by Syrian president Bashar al-Assad's troops. Middle East expert Afzal Ashraf told Express.co.uk that the group's long-term plan hinged on obtaining the deadly weapon. He said: "The most likely place to get it from is Pakistan." There are fears the group's campaign of terror could escalate in the coming month to mark the start of Ramadan on June 18. ISIS has in the past carried out major operations to coincide with the Islamic holy month. Express.co.uk last night revealed Norris wanted more action from US President Obama and joked the solution to defeating ISIS is to "send 'em all to Mars". The US Air-force vet-turned martial arts expert went public with his theory following questions about the mysterious Jade Helm15 US military operation in seven southern US states which begins next month and lasts until the end of September. The 75-year-old, now a Christian evangelist, believes it is a show of strength and a bid to stop the world's deadliest Jihadist movement smuggling nuclear arms into the states to set it off around the anniversary of 9/11. We reported this week how conspiracist website Whistleblower800 believed to have cracked what Jade Helm was all about suggesting it was to get troops ready to deal with predicted anarchy in the days before an asteroid that would wipe out the world was about to hit from September 22 to 28. Other conspiracists have said Jade Helm is about bringing martial law in or seizing guns from the public. Norris agrees the world is at risk in September, but does not agree with the asteroid theory, or any of the other Jade Helm predictions. He instead fears it could be the onset of a global nuclear war. After serving in the air force, Norris became a martial arts expert, before starring in a slew of kung fu and action movies from 1968 onwards. He starred alongside Bruce Lee in Way of the Dragon and the Missing in Action trilogy. More recently, the actor who holds "conservative political views", had a starring role in the TV series Walker, Texas Ranger from 1993 until 2001. Writing on the WND Commentary website, he said: "I believe Jade Helm 15 is more than 'just a training exercise,' and I think ISIS just gave us the clue. "I do believe, in addition to the largest domestic military training, it is also a display of power intended for deterrence of enemies like ISIS, whom the FBI has already said have tentacles in all 50 states. "And guess who just released its intent to smuggle nuclear weapons across the U.S.-Mexico border? You guessed it. ISIS. "ISIS even has a nuclear plan." Norris went onto describe a theory, based on international news and website reports and ISIS' own propaganda, which claims how the terrorist could smuggle a warhead into America. He explained how Nigerian newspaper Premium Times reported that Nigerian Jihadists Boko Haram, which has pledged allegiance to ISIS, could carry out the nuclear bomb import into the US as easy as smugglers use drug routes from east to west. He added the extremists and "the nuke" could move through south America's porous borders to Mexico - just a short hop into the states with a "nuclear bomb in the trunk of their car." He added: "This isn’t fiction, fairytale or conspiracy. I’m talking about the US government not sticking its heads in the sand or at least asking us to stick ours in it. Washington needs to quit downplaying or minimising the nuclear risk, lest we find ourselves right back in the unprepared era of pre-9/11. "I don’t think that Jade Helm 15 is a risk to Texas or any other state. I think ISIS is, as the FBI admitted in February. The sooner we send every last one of its members to Mars, the better off America and this world will be. Now, there’s a covert action the military should implement. "Now look at the official military map for Jade Helm 15 and how those military exercises’ locations in five of the seven states are a buttress against the entire length of the southern border. "Whether or not you believe the intelligence sources of Judicial Watch and WND about ISIS collaborating with Mexican drug cartels and the existence of ISIS terror camps just eight miles from the Texas border town of El Paso, is it a coincidence that Jade Helm 15 exercises are just a stone’s throw away from that border crossing?" He asked if it was also a coincidence that Jade Helm 15 incorporated the largest scale “unconventional warfare” exercises from all military branches. He added: "Is it also a coincidence that Jade Helm 15 runs from July 15 through Sept 15, just a few days past the key terrorist date of 9/11? "I’m back to the words of Franklin Roosevelt, who said, “In politics, nothing happens by accident. If it happens, you can bet it was planned that way.” High Probability High probability of nuclear attack within a year First Post 6-11-15 (“ISIS may have collected radioactive materials for nuclear 'dirty' bomb, says Australian Foreign Minister,” http://www.firstpost.com/world/isis-may-have-collected-radioactive-materialsfor-nuclear-dirty-bomb-says-australian-foreign-minister-2291388.html, ME) The Islamic State is believed to have collected radioactive material from hospitals and research establishments in cities it has captured in Iraq and Syria which it could use to build a large "dirty" bomb, Australian Foreign Minister Julie Bishop has warned. ISIS had declared its ambition to develop weapons of mass destruction in the most recent edition of its propaganda magazine Dabiq, stating that there is an "infinitely" greater chance of the cash-rich group smuggling its first nuclear weapon from Pakistan to attack the US within a year. Bishop told The Australian that NATO was deeply concerned about the theft of radioactive material. "The insurgents did not just clear out the cash from local banks," she was quoted as saying. In a speech in Perth last week, Bishop warned that the Islamic State may be developing poison-gas weapons. Julie later told the daily that her speech was based on reports from the Defence Department and the Department of Foreign Affairs and Trade. By capturing territory, Islamic State, which is also known as Da'ish, had gained access to materials normally held by governments. "That's why stopping Da'ish gaining territory is so important," she said. The Islamic State terror group is believed to have collected radioactive material from hospitals and research establishments in cities it has captured in Iraq and Syria, raising fears it could build a large "dirty" bomb, Bishop said. Bishop's comments came as terrorism specialists warned that Islamic State could carry out major attacks in Iraq and Syria during Ramadan, which begins on June 17, and that competition among terror groups could see al-Qaeda carry out a massive attack to restore its standing. Possible targets of Islamic State attacks might include Baghdad International Airport or the Taji air base where Australian Army instructors train Iraqi forces, they said. Bishop said the so-called Australia Group -- a bloc of about 40 nations, plus the European Community, established 30 years ago to stop the spread and development of chemical, biological and radiological weapons -- was concerned enough about the threat to dedicate a session to it at a forum in Perth last week. "This is really worrying them," Bishop said. Terrorists Can Get in From Mexico Terrorists groups from around the globe pushing past the southern borders Wilson 15’, Read Wilson (Writer for Washington Post), Washington Post, Texas officials warn of immigrants with terrorist ties crossing southern border, 26 Feb 2015, http://www.washingtonpost.com/blogs/govbeat/wp/2015/02/26/texas-officials-warn-ofimmigrants-with-terrorist-ties-crossing-southern-border/. PE A top Texas law enforcement agency says border security organizations have apprehended several members of known Islamist terrorist organizations crossing the southern border in recent years, and while a surge of officers to the border has slowed the flow of drugs and undocumented immigrants, it’s costing the state tens of millions of dollars.¶ In a report to Texas elected officials, the state Department of Public Safety says border security agencies have arrested several Somali immigrants crossing the southern border who are known members of al-Shabab, the terrorist group that launched a deadly attack on the Westgate shopping mall in Nairobi, Kenya, and Al-Itihaad al-Islamiya, another Somalia-based group once funded by Osama bin Laden. Another undocumented immigrant arrested crossing the border was on multiple U.S. terrorism watch lists, the report says.¶ According to the report, one member of al-Shabab, apprehended in June 2014, told authorities he had been trained for an April 2014 suicide attack in Mogadishu. He said he escaped and reported the planned attack to African Union troops, who were able to stop the attack. The FBI believed another undocumented immigrant was an al-Shabab member who helped smuggle several potentially dangerous terrorists into the U.S. ¶ [Drone strike kills senior al-Shabab official in Somalia]¶ Authorities also apprehended immigrants who said they were members of terrorist organizations in Sri Lanka and Bangladesh.¶ The Department of Public Safety said the report, first published by the Houston Chronicle, was not meant for public distribution. ¶ “[T]hat report was inappropriately obtained and [the Chronicle was] not authorized to possess or post the law enforcement sensitive document,” department press secretary Tom Vinger said in an e-mail.¶ U.S. Customs and Border Protection did not respond to requests for comment. ¶ The department said it had come into contact in recent years with “special interest aliens,” who come from countries with known ties to terrorists or where terrorist groups thrive. Those arrested include Afghans, Iranians, Iraqis, Syrians, Libyans and Pakistanis. In all, immigrants from 35 countries in Asia and the Middle East have been arrested over the past few years in the Rio Grande Valley.¶ The department says there is no known intelligence that specifically links undocumented immigrants to terrorism plots, but the authors warn it’s almost certain that foreign terrorist organizations know of the porous border between the U.S. and Mexico.¶ “It is important to note that an unsecure border is a vulnerability that can be exploited by criminals of all kinds,” Vinger said. “And it would be naive to rule out the possibility that any criminal organizations around the world, including terrorists, would not look for opportunities to take advantage of security gaps along our country’s international border.”¶ Even without the threat of foreign terrorists making their way across the border, Texas law enforcement officials say seven of the eight major Mexican drug cartels operate throughout Texas.¶ Those cartels have sent assassins as far north as the Dallas-Fort Worth area to commit murders, and the drug trade is thriving. The cartels are also branching into sex trafficking, which can present a lower risk and yield a higher profit than the drug trade, the report says. Law enforcement officials have uncovered major trafficking rings operating in Texas, Georgia, Mississippi, Alabama, Louisiana, Tennessee and several east coast cities.¶ Almost all human smuggling rings have ties to the Mexican drug cartels, the report found, and in many cases undocumented immigrants are kept locked in small, confined spaces where they go days without food or water. Law enforcement officials found one “stash house” in the Houston area crammed with 115 illegal immigrants.¶ The report says the Gulf, Zeta, Juarez and Sinaloa cartels have the most prominent footprints in Texas. Officials are also worried about the growing influence of MS-13, the Salvadoran gang that originated in Los Angeles.¶ The cartels have been “effective in corrupting U.S. law enforcement officials at all levels,” the DPS report says.¶ But the surge of Texas DPS officers, National Guard troops and other law enforcement officials, ordered by then-Gov. Rick Perry (R) last June, has worked to stem last year’s flood of undocumented immigrants crossing into the Rio Grande Valley.¶ [Gov. Perry to send National Guard troops to Mexican border amid migrant crisis ]¶ Border officials apprehended 313,000 immigrants in FY 2014, nearly three times the number caught in FY 2011. In recent months, that number has diminished significantly. The report said the number of arrests per week had fallen from a high of about 6,000 to around 2,000.¶ The surge has also led to the seizure of more than $1.8 billion worth of cartel drugs, or about 150 tons of marijuana, 588 pounds of cocaine and 320 pounds of methamphetamines. Cartels have shifted marijuana trafficking west, from McAllen to the small towns of Escobares and Roma.¶ The cartels are sending scouts to watch U.S. border patrol officers, and they believe the Texas border surge will end soon, once the money runs out, according to intelligence collected by the Department of Public Safety. ¶ It is not without costs. DPS said the state and National Guard have spent more than $102 million deploying troops and officers and bolstering surveillance capabilities. The state has already installed 1,224 surveillance cameras along the border, and another 4,000 cameras will be installed in the coming months. ¶ Fully securing the border would require the constant presence of an incredible number of troops — as many as 76,000, the report found. This summer, the surge sent about 1,000 National Guard soldiers to the border. ISIS Can Get WMD Through Mexico ISIS claims ability to smuggle nukes over the southern border Blake 2015, Eben Blake (intern covering general affairs at IBTimes in New York City. He is currently pursuing a degree in English and History at Brown University and previously worked at The Brown Daily Herald as the Arts and Culture Editor), Islamic State Nuclear Weapons: ISIS Claims It Can Smuggle Devices Through Nigeria, Mexico To The United States, 3 June 2015, International Business Times, http://www.ibtimes.com/islamic-state-nuclear-weapons-isis-claims-it-can-smuggle-devices-through-nigeria1950280. PE The Islamic State group claims it could purchase a nuclear device from Pakistan and transport it to the United States through drug-smuggling channels. The group, also known as ISIS and ISIL, would transfer the nuclear weapon from Pakistan to Nigeria or Mexico, where it could be brought to South America and then up to the U.S., according to an op-ed allegedly written by kidnapped British photojournalist John Cantlie and published in Dabiq, the group's propaganda magazine.¶ The op-ed said that Boko Haram, the Nigerian jihadist group that announced its formal allegiance to ISIS in March, would make their efforts to transport a weapon to the U.S. much easier, reported Nigerian newspaper Premium Times. ISIS claims the Nigerian army is in a "virtual state of collapse" because of its war against Boko Haram. ¶ While U.S. officials have dismissed the ability of the group to acquire or transport a nuclear weapon, Indian Minister of State Defense Rao Inderjit Singh said at the Shangri-La regional security conference in Singapore last weekend that "[w]ith the rise of ISIL in West Asia, one is afraid to an extent that perhaps they might get access to a nuclear arsenal from states like Pakistan," Bloomberg reported. ¶ Cantlie describes how ISIL would hypothetically call on supporters in Pakistan to "purchase a nuclear device through weapons dealers with links to corrupt officials in the region," after which it would be "transported overland until it makes it to Libya" when "the mujahedeen move it south to Nigeria." It would then be moved to South America in the same method that "drug shipments bound for Europe pass through West Africa," according to Premium Times. After transporting the device through the "porous borders of South America" to Mexico, it would be "just a quick hop through a smuggling tunnel" to bring the nuclear bomb into America. ¶ Since his abduction in 2012, Cantlie has appeared in multiple ISIS propaganda videos, including the series "Lend Me Your Ears." Terrorists Can Get in from Shipping Containers Cargo ships go virtually unchecked – easy for terroristic exploitation Schoen 2004, John W. Schoen (reported and written about economics, business and financial news for more than 30 years), NBC News, Ships and ports are terrorism’s new frontier, 21 June 2004, http://www.nbcnews.com/id/5069435/ns/businessworld_business/t/ships-ports-are-terrorisms-new-frontier/#.VYyogHmd5g1. PE One of the thorniest security problems involves determining just what’s inside each of the 40foot steel containers that arrive every day on cargo ships carrying as many as 4,000 containers each.¶ Air travelers at security checkpoints have become accustomed to delays as passengers spend a few moments unpacking laptops, removing shoes and retying them. But a comparable physical inspection of the millions of tons of cargo that enter U.S. ports every day is simply not practical: security experts say it takes five agents roughly three hours to fully inspect the contents of just one of those containers.¶ Can you spot the threats? The result is that only 2 percent of containerized cargo entering the country are physically inspected. And while advanced technology scanners have helped speed those inspections, just tracking the 200 million containers that move among the world’s top seaports each year is a major undertaking. Flynn cited one major shipper with over 300,000 containers in its inventory.¶ “It doesn’t know where 40 percent of them are at any given time,” he said. “It takes one of their customers saying, ‘Hey I’ve got one of your boxes if you want it back.'”¶ Those boxes are a potentially potent weapon for terrorists – whether for use smuggling weapons, explosive materials or terrorists themselves, or as a huge chemical, biological or "dirty" bomb spreading radioactive waste. At present, though, many ports are illprepared to deal with that threat.¶ The accidental explosion of a container on the dock of the Port of Los Angeles on April 28 underscored the problem. Gasoline fumes from a pickup truck inside the container were apparently ignited by a spark from a battery, blowing the locked steel doors open and spilling the contents, which included 900 bottles of LPG butane gas, according to Michael Mitre, Coast Port Security director at the International Longshore and Warehouse Union.¶ “There was virtually no response,” Mitre told a House panel on maritime security last week. “There was no evacuation. There was no shutdown of work … It could have been something that was a biological or chemical release; it could be a radioactive release. No one knew. But at the time, the terminal was absolutely not prepared.”¶ Mitre said the explosion also highlights a major deficiency in container inspection. “Export cargo is not treated the same way as import cargo,” he said. “We have cargo coming in through the gates that is not having to show what the contents are." As a result, terrorists inside the U.S. would have a much easier time loading a container on an outbound shipment, he said.¶ Al Qaeda operatives have used commercial sea containers to illegally penetrate the U.S. DEBKA ’02 [DEBKAfile is an Israeli military intelligence website based in Jerusalem, providing commentary and analyses on terrorism, intelligence, national security, military and international relations, with a particular focus on the Middle East., “Stowaway Terrorists Sneak Into America By Sea Container”, June 19, 2002] Between 75 and 125 operatives of the fundamentalist terror network, al Qaeda, are known to have illegally penetrated the United States in the last two months, mostly through American ports as stowaways in commercial sea containers. Many more are estimated to have slipped through unbeknownst to US authorities. This clandestine traffic was first exposed in DEBKA-Net-Weekly Issue No. 39, November 30, 2001. In its latest issue, DEBKA-Net-Weekly, June 14, 2002, tracks this burgeoning menace, which is making the United States and the world,s shipping industry increasingly susceptible to the threat of terror attack by invaders from the sea. US port authority sources believe penetrations occurred at New York, New Jersey, Long Beach, Miami and Savannah, Georgia, as well as Port Everglades, Florida. Container, oil and bulk ports are especially vulnerable. Some of the stowaways arrive complete with arms or explosives, the nature of which - conventional, radioactive, chemical or biological the US authorities are at great pains to keep dark. However, shipping sources told us witnesses had seen suspect containers appearing to be quarantined after their al Qaeda infiltrators were killed, suggesting the suspected presence of toxic substances. The threat applies equally to the international container traffic that carries much of the world,s lifeblood. Experts have opined that a "dirty bomb exploding in a container at sea would stop the world,s container traffic cold until a credible security system for sea-going containers was in place. On May 22, 2002, Fairplay International Shipping Weekly reported: "More details have emerged about an apparent infiltration of Islamic extremists through US ports during the past two months." Some of the men slipped through security disguised as stevedores, according to Bob Graham, chair of the Senate select committee on intelligence. He said he had seen reports indicating that some extremists might have been wearing safety jackets and protective helmets to give the appearance of dockworkers. US Coast Guard officials have refused to divulge any information about the reports, but Graham stressed: "The American people have a right to know." He said 25 extremists "entered in a foreign country, hid out in a container and then entered the United States." In some of the stowaway containers, US counter-terror authorities were dismayed to find uniforms of American dockworkers and even US Coast Guards, along with the appropriate tags and ID for free access to port facilities, including off-limits sections. Groups of 5 to 7 of these men dressed as port workers have been sighted hurrying over to waiting vans and driving off at speed. AT: Foreign Operations Solve Terrorism Foreign counter-terror strategies are actually propelling violent terrorist attacks on a global scale Englund ’15 "The Security Paradox in Counter-terror Strategy | TRENDS." TRENDS. N.p., 12 Apr. 2015. Web. 26 June 2015 Over the past six months, terrorist violence has occurred almost simultaneously in many regions of the world. The casual observer may be overwhelmed by these threats and demand that “something be done” to punish those responsible and stop future acts of violence. A counterterror doctrine must simultaneously make people feel more secure and take effective actions to ensure the physical security of potential targets of terrorist violence. Sometimes things done to achieve the former can make the latter more difficult. While “doing something” in response to violence is required, success depends on a nuanced, focused strategy that both punishes perpetrators of violence and addresses political and economic stability in regions affected with terrorist violence. This article will explore this paradox by first examining the nature of the “just do something” response. It will then consider stability as an element ¶ The use of force to punish the perpetrators of violence is necessary, but will always result in some collateral damage. The coalition of Arab states confronting violent groups across the region will need to be ready to counter the inevitable propaganda used against them by terror groups to try to discredit coalition governments. Secondly, while difficult and requiring patience of counter-terror policy. and a long-term commitment, a comprehensive counter-terror strategy must also address potential economic and political “root causes” of terrorist violence.¶ “Do something to stop this now”¶ A short recital of recent events is shocking: Somalia-based al-Shabab kills 148 students at Garrissa University in Kenya. Boko Haram gunmen, dressed as preachers, kill two dozen in Nigeria. In Yemen, Houthi rebels storm the presidential palace, and terrorists belonging to al Qa’ida in the Arabian Peninsula free hundreds of their former colleagues from prisons there. The so-called “Islamic State” fights for control of Anbar and Salladin provinces in Iraq. Armed groups attack resorts and military checkpoints on the Sinai Peninsula. The Taliban in Pakistan killed over 240 children in December. This surge of terror becomes even more sinister when violence spreads to Europe and North America, as was recently realized in Paris, London, Ottawa, and as far away as Sydney, Australia. Such a litany of violence against innocents demands justice, most often called for in its retributive form; the perpetrators of violence, their enablers and those who inspire violence need to be punished. However, a hasty, kinetic response can be counter-productive for two reasons: quick reactions risk misperceiving the origins of the violence and result in inappropriate target selections; second, since collateral damage is almost always associated with the application of force, even the most .¶ Democratic societies are especially susceptible to this rational reaction to terrorist violence. Governments of these societies, under pressure from their people, do highly visible, literally explosive things in response. Witness the recent violence in Kenya and the response to that violence. In the early morning hours of April 2, at least four armed men entered the campus of Garissa University College, initially took hostages, then began to murder students—reportedly focusing their violence against professed Christians—ultimately killing 148. In response Kenyan President Uhuru Kenyatta vowed that his country would respond to the violence “in the severest way possible.” On April 6th, Kenyan Air Force planes bombed sites in Somalia described as al-Shabab training camps. A Kenyan military spokesman reported that, “the bombings are part of the continued process and engagement against al-Shabab, which will go on. This is part of continuing operations, not just in response to Garissa.” Eyewitnesses told BBC reporters that the attacks killed at least three civilians and destroyed livestock and wells in an area without al-Shabab presence.[1]¶ Unfortunately, this is not Kenya’s first experience with mass-casualty terrorist violence. On September 21, 2013, al-Shabab gunmen attacked a shopping mall in the Kenyan capital, Nairobi, killing sixty-seven and wounding scores more. This attack by al-Shabab was immediately linked to Kenya’s participation in the African Union Mission in Somalia (AMISOM) and by extension AMISOM’s close relationship with the Untied States. Ben Rhodes, the Deputy National Security Adviser for Strategic Communications, admitted, “the fact of the matter is, carefully planned attack can provide terror groups with ammunition for their own propaganda efforts we’ve actually had a very aggressive effort to go after al-Shabab in Somalia, and, frankly, I think it was that pressure on al-Shabab that, in terms of their own professed motivation, led them to pursue an attack against Kenya.”[2] Translating as “the youth,” al-Shabab was born as a youth arm of the Union of Islamic Courts that once dominated in the political vacuum of Somalia. The AMISOM mission itself was a response to al-Shabab successes in its insurgency against Ethiopian forces that invaded Somalia in 2006 and then withdrew in 2007. By 2011, African Union forces swept al-Shabab from the Somali capital, Mogadishu.[3]¶ “an operation that was intended to crush Islamic extremists, stabilize Somalia, and install more tractable leadership—but accomplished the exact opposite.”[4] The implication is that the heavy-handed intervention in Somalia, in which thousands of civilians were killed or displaced, encouraged The rise of al-Shabab in Somalia has been directly linked to the United States- backed 2006 invasion by Ethiopia, described as a radical response. The intervention and subsequent withdrawal created the vacuum which al-Shabab filled. Since the Ethiopians unilaterally declared victory over the Islamic Courts and began to withdraw from The conclusion of this line of analysis is that as states like Ethopia, Uganda, and Kenya join the United States in its war on terrorism, more lives are disrupted by enforcement actions and the greater the opportunity for radical groups like al-Shabab to gain traction. In other words, the way in which terrorism is fought can itself give rise to terrorism.¶ We know that the way in which we fight is connected to people’s perception of the fight. There have been several recent studies that demonstrate statistically that, for example, the United States’ use of remotely piloted aircraft (RPAs, or “drones”) has both increased negative perceptions of the United States in the areas most affected by drone activity and changed the way terror groups advertise their positions and try to gather support.[6] The utility of negative perceptions to propaganda efforts can be considered separately from the actual effectiveness of attacks by countries fighting a war on terrorism. In terms of effectiveness, the evidence is mixed: senior terror group leaders who are killed are quickly replaced, but those who replace them may be Somalia in 2007, “intense fighting, piracy, and war-enabled famines grind on, meanwhile, in a more radicalized Somalia.”[5] less capable and experienced. Also, people who are continually in fear of being killed are less effective because they are then more cautious in how and how often they move.¶ This is the crux of the paradox. Actions that address security threats, and strategies that can make people feel more secure, can also encourage new, different threats. The same paradox occurs in urban But, I also know that the men who set up those crude rockets that just sailed my direction are long gone and the only casualties of my return fire will be innocent bystanders near the improvised launch rails that now sit empty. The only sensible thing to do is to not return fire—the tragedy of killing innocent civilians will be joined by damaged credibility, will invite retaliation, and may feed enemy propaganda. Similarly, in counter-insurgency operations, actions that reduce your security in the short-term can gain trust and cooperation in the long-term. Dismounted patrols combat. I receive rocket fire from a densely populated neighborhood. I can pinpoint the origin of the fire and I can automatically return fire on that point of origin. (out of armored vehicles, interacting with locals) have been proven to be important in counter-insurgency operations. These options—not returning fire if fired upon, lowering your guard, reducing security in the short term—seem counter-intuitive and are frustrating positions to be in, but these can be effective security strategies in the long-term. Clearly the application of force is necessary to remove some threats, but force cannot be the dominant strategy.¶ As more Arab states take action against targets on the Arabian Peninsula, in Libya, and in Iraq and Syria, these Arab coalition allies will be increasingly described as dupes and lackeys of the West or worse, as “apostate” regimes, lacking all legitimacy. The core function of military force is to kill and destroy; collateral damage is inevitable. Arab states taking action against terror groups must steel themselves against the inevitable use of this collateral damage against them, engaging strategic communication to present effective, convincing counter-messages. Current US counter-terror strategies are filled with a plethora of mistakes and paradoxes Englund ’15 "The Security Paradox in Counter-terror Strategy | TRENDS." TRENDS. N.p., 12 Apr. 2015. Web. 26 June 2015. U.S. State Department spokesperson Marie Harf was pilloried in U.S. media outlets for her comment during an interview that the threat posed by Daesh (ISIS, ISIL, the “Islamic State”) cannot be undone by killing fighters alone, that “we need to go after the root causes that leads people to join these groups.” During the interview with MSNBC host Chris Matthews in which Harf was interrupted multiple times, she essentially suggested that a more effective counter-terror strategy would include addressing the “governance” of regions most affected by terrorist violence. Her comments were met with derision and, taken out of context, they might seem naïve. Clearly a “jobs program” in Iraq and Syria is not going to draw Daesh militants away from their jihad to lead peaceful and productive lives. However, the essence of her message (even if delivered in a less-than-elegant way)[7] is on point and deserves more careful consideration. The economic and political realities of the greater Middle-East and South Asia must be accounted for in any effective counterterror strategy.¶ How practical is Harf’s “root causes” suggestion? Can such “root causes” be discovered and addressed? The decision to support or join extremely violent groups to express your political will is a highly complex one. If experts agree on one thing, it is that the factors contributing to this decision or “radicalization” are varied. Studying the decision is fraught with problems. However, a consensus has developed around a cluster of “root causes” that can either create permissive environments for terrorist violence, or directly contribute to the radicalization of a segment of a population. These are, generally: high unemployment, economic inequality and social exclusion among heterogeneous groups; rapid population growth (with a “bulge” of young people) accompanied by rapid urbanization; and a clash of values.[8] No single factor can be identified as “causing” terrorism and the mix of contributing factors can vary in different contexts. However, sufficient evidence exists to recommend studying “root causes” in conjunction with other contributing factors such as political stability. Political stability and the ability of a government to actually govern and resolve political crises are cited as belonging to its own category of attending causes.[9]¶ Thinking about “root causes” is therefore helpful in considering long-term counter-terror strategies. As is often said: “easier said than done.” Even if Harf’s “jobs” comment was in fact sensible in the long-term, effecting such a strategy is highly complicated, involving the difficult task of identifying specific contributing or “permissive” factors, and then actually doing something to address those factors. Struggling economies with governments whose legitimacy is sometimes challenged present a combination of factors that require attention when creating a comprehensive, coherent, and effective counter-terror strategy.¶ Conclusion¶ Effective counter-terrorism requires making people more secure from terrorist violence while also making them feel more secure. These two distinct, but clearly related, goals can sometimes put a launching a convincing counter-attack to punish the perpetrators and their sponsors—can lead to the rise of other threats. Equally frustrating, sometimes reducing security in the short-term can contribute to greater security in the longterm. Finally, long-range strategies that try to sort out “root causes” of terrorism are complex and don’t contribute to immediate security advantages, but are necessarily part of a comprehensive strategy.¶ Clearly a civilized society cannot countenance violent barbarism, genocide and the destruction of whole cultures, ancient or modern. The perpetrators of violence must be punished. But states that apply force must be ready to attend to the inevitable effects of collateral damage through effective strategic communication. They must be willing to win the political loyalty of their people. At the same time, a comprehensive counter-terror strategy must also include addressing the “root-causes” of terrorist violence—a difficult task requiring patience and a long-term commitment. government in a bind. Sometimes the things that make people feel more secure— Terrorists can get WMDs Nuke Threat High Available nuclear material and terrorist motivation make nuclear terror attack inevitable Jaspal– Associate Professor at the School of Politics and International Relations, Quaid-i-Azam University, Islamabad, Pakistan 12 (Zafar Nawaz, “Nuclear/Radiological Terrorism: Myth or Reality?”, Journal of Political Studies, Vol. 19, Issue - 1, 2012, 91:111) The misperception, miscalculation and above all ignorance of the ruling elite about security puzzles are perilous for the national security of a state. Indeed, in an age of transnational terrorism and unprecedented dissemination of dualuse nuclear technology, ignoring nuclear terrorism threat is an imprudent policy choice. The incapability of terrorist organizations to engineer fissile material does not eliminate completely the possibility of nuclear terrorism. At the same time, the absence of an example or precedent of a nuclear/ radiological terrorism does not qualify the assertion that the nuclear/radiological terrorism ought to be remained a myth. Farsighted rationality obligates that one should not miscalculate transnational terrorist groups — whose behavior suggests that they have a death wish — of acquiring nuclear, radiological, chemical and biological material producing capabilities. In addition, one could be sensible about the published information that huge amount of nuclear material is spread around the globe. According to estimate it is enough to build more than 120,000 Hiroshima-sized nuclear bombs (Fissile Material Working Group, 2010, April 1). The alarming fact is that a few storage sites of nuclear/radiological materials are inadequately secured and continue to be accumulated in unstable regions (Sambaiew, 2010, February). Attempts at stealing fissile material had already been discovered (Din & Zhiwei, 2003: 18). Numerous evidences confirm that terrorist groups had aspired to acquire fissile material for their terrorist acts. Late Osama bin Laden, the founder of al Qaeda stated that acquiring nuclear weapons was a“religious duty” (Yusufzai, 1999, January 11). The IAEA also reported that “al-Qaeda was actively seeking an atomic bomb.” Jamal Ahmad al-Fadl, a dissenter of Al Qaeda, in his trial testimony had “revealed his extensive but unsuccessful efforts to acquire enriched uranium for al-Qaeda” (Allison, 2010, January: 11). On November 9, 2001, Osama bin Laden claimed that “we have chemical and nuclear weapons as a deterrent and if America used them against us we reserve the right to use them (Mir, 2001, November 10).” On May 28, 2010, Sultan Bashiruddin Mahmood, a Pakistani nuclear scientist confessed that he met Osama bin Laden. He claimed that “I met Osama bin Laden before 9/11 not to give him nuclear know-how, but to seek funds for establishing a technical college in Kabul (Syed, 2010, May 29).” He was arrested in 2003 and after extensive interrogation by American and Pakistani intelligence agencies he was released (Syed, 2010, May 29). Agreed, Mr. Mahmood did not share nuclear know-how with Al Qaeda, but his meeting with Osama establishes the fact that the terrorist organization was in contact with nuclear scientists. Second, the terrorist group has sympathizers in the nuclear scientific bureaucracies. It also authenticates bin Laden’s Deputy Ayman Zawahiri’s claim which he made in December 2001: “If you have $30 million, go to the black market in the central Asia, contact any disgruntled Soviet scientist and a lot of dozens of smart briefcase bombs are available (Allison, 2010, January: 2).” The covert meetings between nuclear scientists and al Qaeda members could not be interpreted as idle threats and thereby the threat of nuclear/radiological terrorism is real. The 33Defense Secretary Robert Gates admitted in 2008 that “what keeps every senior government leader awake at night is the thought of a terrorist ending up with a weapon of mass destruction, especially nuclear (Mueller, 2011, August 2).” Indeed, the nuclear deterrence strategy cannot deter the transnational terrorist syndicate from nuclear/radiological terrorist attacks. Daniel Whiteneck pointed out: “Evidence suggests, for example, that al Qaeda might not only use WMD simply to demonstrate the magnitude of its capability but that it might actually welcome the escalation of a strong U.S. response, especially if it included catalytic effects on governments and societies in the Muslim world. An adversary that prefers escalation regardless of the consequences cannot be deterred” (Whiteneck, 2005, Summer: 187) Since taking office, President Obama has been reiterating that “nuclear weapons represent the ‘gravest threat’ to United States and international security.” While realizing that the US could not prevent nuclear/radiological terrorist attacks singlehandedly, he launched 47an international campaign to convince the international community about the increasing threat of nuclear/ radiological terrorism. He stated on April 5, 2009: “Black market trade in nuclear secrets and nuclear materials abound. are determined to buy, build or steal one. Our efforts to contain these dangers are centered on a global non-proliferation regime, but as more people and nations break the rules, we could reach the point where the center cannot hold (Remarks by President Barack Obama, 2009, April 5).” He added: “One terrorist with one nuclear weapon could unleash massive destruction. Al Qaeda has said it seeks a bomb and that it would have no problem with using it. And we know that The technology to build a bomb has spread. Terrorists there is unsecured nuclear material across the globe” (Remarks by President Barack Obama, 2009, April 5). In July 2009, at the G-8 Summit, President Obama announced the convening of a Nuclear Security Summit in 2010 to deliberate on the mechanism to “secure nuclear materials, combat nuclear smuggling, and prevent nuclear terrorism” (Luongo, 2009, November 10). President Obama’s nuclear/radiological threat perceptions were also accentuated by the United Nations Security Council (UNSC) Resolution 1887 (2009). The UNSC expressed its grave concern regarding ‘the threat of nuclear terrorism.” It also recognized the need for all States “to take effective measures to prevent nuclear material or technical assistance becoming available to terrorists.” The UNSC Resolution called “for universal adherence to the Convention on Physical Protection of Nuclear Materials and its 2005 Amendment, and the Convention for the Suppression of Acts of Nuclear Terrorism.” (UNSC Resolution, 2009) The United States Nuclear Posture Review (NPR) document revealed on April 6, 2010 declared that “terrorism and proliferation are far greater threats to the United States and international stability.” (Security of Defence, 2010, April 6: i). The United States declared that it reserved the right to“hold fully accountable” any state or group “that supports or enables terrorist efforts to obtain or use weapons of mass destruction, whether by facilitating, financing, or providing expertise or safe haven for such efforts (Nuclear Posture Review Report, 2010, April: 12)”. This declaration underscores the possibility that terrorist states groups could acquire fissile material from the rogue Yes Nukes – Pakistan Will Sell Pakistani military infiltrated by Al-Qaeda Panda ’14 [Sept 18, 2014, Ankit Panda foreign affairs analyst, writer, and editor with expertise in international relations, political economy, international security, and crisis diplomacy, editor at The Diplomat, previously Research Specialist at Princeton University on international crisis diplomacy, international security, technology policy, and geopolitics, “Al Qaeda's Worrying Ability to Infiltrate the Pakistani Military”, The Diplomat, http://thediplomat.com/2014/09/alqaedas-worrying-ability-to-infiltrate-the-pakistani-military/] On Saturday night, this past weekend, Al Qaeda in the Indian Subcontinent (AQIS) staged its first major attack within siege to a Pakistani naval dockyard in a brazen attempt to seize the frigate, PNS Zulfiqar. While the details of the attack have been widely reported, what is most concerning is the manner in which the attack was carried out. AQIS managed to recruit Pakistani naval officers, allowing its agents to infiltrate the dockyard. The group boasted about its ability to recruit inside the Pakistani military in a statement released on September 11, three days ahead of the attack. Usama Mahmood, AQIS’s spokesperson, issued the region, laying a separate statement in Urdu following the attack in which he declares: “The Naval officers who were martyred on Saturday in the attack in Karachi were al-Qaeda members. They were trying to attack American marines and their cronies.” The statement confirms that AQIS has not abandoned Al Qaeda’s core strategy of attacking the Western governments that the group perceives as supporting unjust and corrupt regimes in the Middle East (contrast this with ISIS,which concentrates its fight on the “close” enemy instead of the “far” enemy). The statement after the attack detailed the attack (at least from AQIS’s perspective): “[The attackers] had taken over control of the ship and were proceeding to attack the American carrier when they were intercepted by the Pakistan military … These men thus became martyrs. The Pakistani military men who died defending enemies of the Muslim nation, on the other hand, are cursed with hell.” The Pakistan Navy noted that four attackers were arrested, and Pakistani news outlets reported that among the arrested were two naval officers. In what is very likely a first for Pakistan’s defense ministry, the defense minister acknowledged that insiders were culpable in enabling this attack: ”Without assistance from inside, these people could not have breached security,” Defense Minister Khawaja Asif noted in parliament. This attack is concerning for several reasons. First, and most obviously, it is further evidence of a long-time concern shared by U.S. and Indian officials alike that Pakistan’s military apparatus is not immune to infiltration by Al Qaeda and related groups. The attack will shake the United States’ (admittedly already shaky) faith in Rawalpindi’s ability to keep its house in order. According to an anonymous Western counterterrorism official cited by the Wall Street Journal, ”If we are to work with the Pakistan Navy, we have to be able to trust them. This attack raises a lot of questions.” This helps explain why Al Qaeda hasn’t shied away from taking responsibility for and publicizing such a profound failure of an attack. Even if the attack failed, it puts the Pakistan military in a difficult place (admittedly, the Pakistani military does a good job of doing this on its own most of the time). Interestingly, the attack took place on the same day that PNS Zulfiqar was slated to set sail for the Indian Ocean to join an international flotilla. This suggests that Al Qaeda’s infiltration went beyond having a naval officer unlock the gate for its operatives ahead of an attack — the group was clearly being fed information about Pakistani military operations. ”It appears the officers on board were to be joined by other militants who were to arrive by boat from the sea and then stow away on board,” noted one Pakistani security official, adding that “the plan was to get close to the U.S. ships on the high seas, and then turn the shipboard weapon systems on the Americans.” Had the attack succeeded, U.S. navy ships in the Arabian Sea faced the prospect of a serious naval engagement — the Zulfiqar is equipped with antiship missiles with a 300 kilometer range. Pakistan seems to have no clear plan for combing its military — particularly its navy — for Al Qaeda sympathizers and operatives. Back in 2011, we saw that the navy was already infiltrated by officers sympathizing with Al Qaeda and the Taliban. The attack on the PNS Mehran naval air base took place after failed talks between the Pakistan navy and Al Qaeda over officers who had been arrested over suspected links to the group. As one report back then noted, the “deeper underlying motive” for that attack was a “massive internal crackdowns on al-Qaeda affiliates within the navy.” In the aftermath of the PNS Mehran attack, it became clear that Pakistani naval intelligence had some competence in tracing Al Qaeda sympathizers within its own ranks. While its methods may not have been fool-proof, it was apparently successful to the degree that it arrested Al Qaeda operatives within the navy, prompting the sequence of events that led to the 15-hour siege on the PNS Mehran base. As the Asia Times Online notes, citing one senior navy official, Pakistan’s naval intelligence was spurred into action by the potential negative impact that this infiltration could have on the Pakistani military’s important relationship with the United States. Back then, when Pakistani naval intelligence detained officers suspected of having links to Al Qaeda, it noted that it immediately received threats from Al Qaeda cells. When it moved the detainees to a different site, it continued receiving threats that indicated Al Qaeda knew almost instantly where its infiltrators were being kept. “It was clear the militants were receiving good inside information as they always knew where the suspects were being detained, indicating sizeable al-Qaeda infiltration within the navy’s ranks,” the Asia Times Online noted. In the three years since the PNS Mehran incident and the Pakistan navy’s failed attempts to mediate with Al Qaeda, it seems little has changed. Finally, this weekend’s attack helps to shed some light on the role of Al Qaeda’s new wing in the Indian subcontinent. While Ayman al-Zawahiri may have declared India, Bangladesh, and Myanmar its battlefield, logistical factors make it highly likely that Pakistan will continue to be Al Qaeda’s primary area of focus in South Asia. While Al Qaeda’s continued operation in Pakistan was all but a certainty before this attack, what remains uncertain is the degree to which the group has successfully infiltrated the Pakistani military. ISIS will either build or buy nuclear weapons Friedman and Edelman 6-11-15 (Dan and Adam, “ISIS has enough radioactive material to make dirty bomb: report,” Daily News, http://www.nydailynews.com/news/politics/isis-nuclear-material-dirty-bombreport-article-1.2253492) The montrous fiends with the Islamic State hope to add another horrific weapon to their arsenal of terror — a “dirty” bomb. The bloodthirsty jihadist group looted radioactive chemicals from government labs as they rampaged across Iraq and Syria and hope to assemble explosive devices with them, a British newspaper reported, citing Australian intelligence officials and ISIS propaganda. The militants bragged in Dabiq, their perverted publicity magazine, that they could soon have the capability to build or purchase nuclear weapons. A more immediate threat could be “dirty” bombs — devices that use conventional explosives to spread radioactive or other hazardous materials. According to The Independent, Australian intelligence officials were so concerned about the group’s intentions, they called for a meeting of the “Australia Group,” an international forum for stopping the proliferation of chemical weapons. ISIS “is likely to have amongst its tens of thousands of recruits the technical expertise necessary to further refine precursor materials and build chemical weapons,” Julie Bishop, Australia’s minister of foreign affairs, said at the meeting, the newspaper reported, citing intelligence reports. The renewed concerns over a potential radioactive weapon in the hands of ISIS come a year after Iraqi officials warned the UN the group had obtained materials that could “be used in manufacturing weapons of mass destruction." High ranking officials agree – ISIS has the materials and motive Batchelor 6-11-15 (Tom, “ISIS fighters plot nuclear war after they obtain radioactive material to build dirty bomb,” Express, http://www.express.co.uk/news/world/583563/Islamic-State-radioactivematerial-nuclear-weapon) FANATICAL jihadi group Islamic State (ISIS) has obtained enough nuclear material to make a DIRTY BOMB, a to the Australian foreign minister, Julie Bishop, Nato members are growing increasingly worried about radioactive material seized by the terror group, with fears that it could be turned into a nuclear weapon. It is thought that ISIS fighters have stolen or captured the toxic loot from government-controlled research centres and hospitals across the region. The radioactive matter is thought to have been destined for use by authorities for health and science research - but it has high ranking official has said. According now fallen into the hands of ISIS radicals. Ms Bishop claimed the jihadi organisation had recruited "highly technically trained professionals" and was already using chlorine as a weapon. She added that ISIS was "prepared to use any and all means, any and all forms of violence they can think of, to advance their demented cause. "That includes use of chemical weapon." A former commander of the British army's chemical weapons unit has spoken out in support of the Australian foreign minister's comments, calling the development of a dirty bomb by ISIS a "very real threat". Hamish de Bretton-Gordon also described as "worrying" reports that ISIS fighters had got hold of chemical weapons previously controlled by Syrian president Bashar al-Assad's troops. Middle East expert Afzal Ashraf told Express.co.uk that the group's long-term plan hinged on obtaining the deadly weapon. He said: "The most likely place to get it from is Pakistan." There are fears the group's campaign of terror could escalate in the coming month to mark the start of Ramadan on June 18. ISIS has in the past carried out major operations to coincide with the Islamic holy month. Yes Nukes – Pakistan Will Sell Al-Quaeda as well as the Taliban and other terrorist groups in Pakistan have the capability to possess nuclear weapons Mulvey ’10 [Stephen, Assistant Editor of BBC News, “Could Terrorists Get a Hold of a Nuclear Bomb”, April 12, 2010] In Rolf Mowatt-Larssen's view, there is "a greater possibility of a nuclear meltdown in Pakistan than anywhere else in the world". The region has more violent extremists than any other, the country is unstable, and its arsenal of nuclear weapons is expanding. Once a new plutonium reactor comes on line in the near future "smaller, more lethal plutonium bombs will be produced in greater numbers", he says. The possibility of a Taliban takeover is, he admits, a "worst-case scenario". But the Taliban and al-Qaeda are not the only shadows on the Pakistani landscape. There is also the Lashkar-e-Taiba militant group, which is accused of carrying out the Mumbai attack in November 2008, and like the Pakistani officer corps, recruits mostly in the Punjab. "As one senior Pakistani general once told me," wrote Bruce Riedel of the Brookings Institution last week, "the relationship between the army and the Lashkar-e-Taiba is a family affair". He went on: "Pakistan has taken serious measures to protect the crown jewels of its national security, but it lives in a perilous time. If there is a nightmare nuclear security scenario in Pakistan today it is probably an inside-the-family-job that ends up in a nuclear armageddon in India." The point is echoed by Ian Kearns of the British American Security Information Council (Basic), who writes of the danger that states could use terrorist groups to attack adversaries "by proxy", engineering nuclear security breakdowns to facilitate terrorist access to weapons or materials. BBC correspondents say there is every indication that the Pakistani military is in total control of the country's nuclear facilities. Though henow works in academia, Rolf Mowatt-Larssen led US efforts to determine whether alQaeda possessed a nuclear bomb, in the wake of 9/11. He doesn't believe it does. But "the group's long-held intent and persistent efforts to acquire nuclear and biological weapons represent a unique means of potentially fulfilling their wildest hopes and aspirations," he writes. Al-Qaeda's experience on the nuclear black market has taught its planners that its best chance lies in constructing an "improvised nuclear device (IND)," he says. For this they would need either a quantity of plutonium or 25kg-50kg of highly enriched uranium (HEU), the size of one or two grapefruits. HEU is held in hundreds of buildings in dozens of countries. "Security measures for many of these stocks are excellent, but security for The IAEA registered 15 confirmed cases of unauthorised possession of plutonium or HEU between 1993 and 2008, a few of which involved kilogram-sized quantities. In most cases the quantity was far lower but in some cases the sellers indicated there was more. (If there was, it hasn't been traced.) There is no global inventory of either material, so no-one can be sure how much has gone missing over the years. Neither are there agreed international standards for security and accounting of these materials. UN Security Council others is appalling," according to a report published in 2008 by the Nuclear Threat Initiative. Resolution 1540 merely calls for "appropriate and effective" measures, without defining this in detail. "It is a stark and worrying fact, therefore, that nuclear materials and weapons around the world are not as secure as they should be," writes Ian Kearns, in his Basic report. AT: Terrorists Don’t Want WMDs Terrorists have expressed their intent to obtain WMDs and there is a high likelihood of WMD terrorist attack Vahid Majidi, Assistant Director, Weapons of Mass Destruction Directorate, Federal Bureau of Investigation October 18, 2011 Statement Before the Senate Committee on Homeland Security and Governmental Affairs, Washington, D.C. https://www.fbi.gov/news/testimony/ten-yearsafter-9-11-and-the-anthrax-attacks-protecting-against-biological-threats WMD terrorism and proliferation are evolving threats to U.S. national security. In his 2010 testimony before the Senate and the House of Representatives, the director of national intelligence stated that dozens of identified domestic and international terrorists and terrorist groups have expressed their intent to obtain and use WMD in future acts of terrorism. The frequency of high-profile acts of terrorism has increased over the past decade. Indicators of this increasing threat include the 9/11 attacks, the 2001 Amerithrax letters, the possession of WMD-related materials by Aafia Siddiqui when she was captured in 2008, and multiple attempts by terrorists at home and abroad to use explosives improvised from basic chemical precursors. The challenge presented by these threats is compounded by the large volume of hoax threats that distract and divert law enforcement agencies from addressing real threats. In its 2008 report World at Risk, the Commission on the Prevention of WMD Proliferation and Terrorism stated there is a high likelihood of some type of WMD terrorist attack by the year 2013. The U.S. Intelligence Community determined that the most probable WMD scenarios involve the use of toxic industrial chemicals, biological toxins/poisons, or radioisotopes fabricated into an improvised dispersal device. The use of chemical warfare agents, biological warfare agents, and improvised nuclear devices are other possible—though less likely—scenarios due to the difficulties in obtaining the necessary materials, technologies, and expertise. In addition to efforts by terrorists to use WMD, multiple countries seek to expand their WMD capabilities. For some of these countries, U.S. technologies represent the key to moving their WMD programs forward. The U.S. faces constant attempts by foreign nations to obtain technology, knowledge, and materials for the development and production of chemical, biological, and nuclear weapons. As new technologies emerge and mature and as scientific expertise and technological equipment become more readily available, the challenge of safeguarding these from those that would use them for nefarious purposes is increasing exponentially. Accordingly, the U.S. government must regularly reassess its counterproliferation methods to meet the ever-changing challenge. AT: Terrorists Don’t Want the WMDs Terrorists have expressed interest and have to ability to possess nuclear weapons Brill and Luongo ’12 [Kenneth C. and Kenneth N. respectively, Ambassador Kenneth C. Brill was president of The Fund for Peace from 2010 to 2011. Prior to that, he had a 35-year career in the U.S. Foreign Service. In his final Foreign Service assignment, he was the founding director of the National Counterproliferation Center (NCPC), part of the Office of the Director of National Intelligence. Mr. Kenneth N. Luongo is the President and founder of the Partnership for Global Security (PGS) and the Center for a Secure Nuclear Future (CSNF). He currently co-chairs the Fissile Materials Working Group (FMWG) and is a member of the Nuclear Security Governance Experts Group (NSGEG). He has authored nearly 100 articles and briefed audiences around the world on global security challenges., “Nuclear Terrorism: A Clear Danger” NY Times, March 15, 2012] Terrorists exploit gaps in security. The current global regime for protecting the nuclear materials that terrorists desire for their ultimate weapon is far from seamless. It is based largely on unaccountable, voluntary arrangements that are inconsistent across borders. Its weak links make it dangerous and inadequate to prevent nuclear terrorism. Later this month in Seoul, the more than 50 world leaders who will gather for the second Nuclear Security Summit need to seize the opportunity to start developing an accountable regime to prevent nuclear terrorism. There is a consensus among international leaders that the threat of nuclear terrorism is real, not a Hollywood confection. President Obama, the leaders of 46 other nations, the heads of the International Atomic Energy Agency and the United Nations, and numerous experts have called nuclear terrorism one of the most serious threats to global security and stability. It is also preventable with more aggressive action. At least four terrorist groups, including Al Qaeda, have demonstrated interest in using a nuclear device. These groups operate in or near states with histories of questionable nuclear security practices. Terrorists do not need to steal a nuclear weapon. It is quite possible to make an improvised nuclear device from highly enriched uranium or plutonium being used for civilian purposes. And there is a black market in such material. There have been 18 confirmed thefts or loss of weapons-usable nuclear material. In 2011, the Moldovan police broke up part of a smuggling ring attempting to sell highly enriched uranium; one member is thought to remain at large with a kilogram of this material. Yes WMD Attack – Experts WMD terror attack is inevitable – experts NTI ’11 Citing Vahid Majidi. Feb. 17 “FBI Official Sees 100% Likelihood of WMD Strike on U.S.” The Nuclear Threat Initiative works to strengthen global security by reducing global threats, Vahid Majidi is an FBI senior official. http://www.nti.org/gsn/article/fbi-official-sees-100likelihood-of-wmd-strike-on-us/ A senior FBI official said there is a 100 percent chance that the United States at some time will be attacked with a weapon of mass destruction, Newsmax reported on Monday (see GSN, Feb. 14). "The notion of probability of a WMD attack being low or high is a moot point because we know the probability is 100 percent," FBI Assistant Director for the WMD Directorate Vahid Majidi said. "We’ve seen this in the past, and we will see it in the future. There is going to be an attack using chemical, biological or radiological material." Majidi said the expected WMD attack could be carried out by an international terrorist group, a lone actor or a criminal operation. An incident would be expected to feature a weapon less devastating than a nuclear bomb due to the difficulty in preparing and transferring such as device. “While the net probability [of a terrorist nuclear strike] is incredibly low, a 10 kiloton device would be of enormous consequence,” Majidi said. “So even with those enormously low probabilities, we still have to have a very effective and integrated approach trying to fight the possibility.” When the U.S. military entered Afghanistan in 2001, personnel discovered al-Qaeda had established a "nascent" project to produce biological and chemical warfare agents, Majidi said. The U.S. intelligence community receives hundreds of reports annually of international extremists acquiring weapons of mass destruction, Majidi said. While such reports are consistently found not to be credible, Majidi's office yearly probes more than 12 cases in which there was a goal of launching an unconventional weapons strike. ISIS wants WMD ISIS is able to get nuclear and chemical weapons, and will use them to kill large numbers of innocents Cirincione ’14 [Joseph Cirincione is the President of the Ploughshares Fund, a public grantmaking foundation focused on nuclear weapons policy and conflict resolution. He was appointed to the presidency by the Ploughshares board of directors on March 5, 2008., “ISIS will be in position to get nuclear weapons if allowed to consolidate power, resources, says expert” September 30, 2014] The risk of a terrorist attack using nuclear or chemical weapons has just gone up. ISIS is willing to kill large numbers of innocents, and it has added three capabilities that catapult the threat beyond anything seen before: control of large, urban territories, huge amounts of cash, and a global network of recruits. British Home Secretary Theresa May warned that if ISIS consolidates its control over the land it occupies, “We will see the world’s first truly terrorist state” with “the space to plot attacks against us.” Its seizure of banks and oil fields gave it more than $2 billion in assets. If ISIS could make the right connection to corrupt officials in Russia or Pakistan, the group might be able to buy enough highly enriched uranium (about 50 pounds) and the technical help to build a crude nuclear device. Militants recruited from Europe or America could help smuggle it into their home nations. Or ISIS could try to build a “dirty bomb,” conventional explosives like dynamite laced with highly radioactive materials. The blast would not kill many directly, but it would force the evacuation of tens of square blocks contaminated with radioactive particles. The terror and economic consequences of a bomb detonated in the financial districts of London or New York would be enormous. ISIS could also try to get chemical weapons, such as deadly nerve gases or mustard gas. Fortunately, the most likely source of these terror weapons was just eliminated. The Obama administration struck a deal with Syrian President Bashar Assad that has now destroyed the 1,300 tons of chemical bombs Assad built. Without this deal, ISIS would likely already have these weapons. ISIS will become the first true terrorist state and will use chemical, biological, and nuclear weapons to kill indiscriminately Morris ’14 [Nigel, Deputy political director at The Independent, “Isis could become 'world’s first truly terrorist state' and bomb UK with nuclear and chemical weapons, Theresa May warns”, September 30, 2014] Isis could acquire nuclear and biological weapons to launch attacks on Britain, the Home Secretary warned today as she set out new measures to clamp down on extremist groups. In a speech to the Tory party conference that concentrated almost entirely on the threat from terrorism at home and abroad, Theresa May warned that the jihadist group could become the “world's first truly terrorist state“ in Iraq and Syria. “If [Isis] succeed in firmly consolidating their grip on the land they occupy in Syria and Iraq, we will see the world’s first truly terrorist state established within a few hours flying time of our country,” she said. “We will see terrorists given the space to plot attacks against us, train their men and women, and devise new methods to kill indiscriminately.” “We will see the risk, often prophesied but thank God not yet fulfilled, that with the capability of a state behind them, the terrorists will acquire chemical, biological or even nuclear weapons to attack us. “We must not flinch. We must not shy away from our responsibility. We must not drift towards danger and insecurity. While we still have the chance, we must act to destroy them. 2AC Bioterror Add On The risk of bioterrorism is real and high now Saunders-Hastings 14 (Patrick, “Securitization Theory and Biological Weapons,” E-IR, Jan 8, 2014, Accessed May 20, 2015, http://www.e-ir.info...lweapons/)//AD , a changing global and scientific landscape has led to a greater potential for the acquisition of biological weapons capacity by terrorist groups However . For instance, during the Cold War, the Soviets reportedly employed approximately 55, 000 scientists and technicians at 6 biological weapons research labs and 5 production facilities37. Among other things, smallpox was weaponized into bal listic missiles and bombs38. In 1997, the United States conducted a visit to one of was half empty, poorly guarded methods of biological weapons production are now freely accessible via the Internet recent scientific advances may support biological weapons production by enabling the production of a higher yield of high-quality product these research labs to find that the facility , and that most of the scientists had left39. It is, therefore, possible that the biological agents, the equipment, and the human knowledge and expertise have since fallen into the hands of rogue states or terrorist organizations. Additionally, , and the technological requirements are not beyond the means of a determined, well-funded terrorist organization2. Moreover, 36. They may also support more effective weaponization, by making agents more resistant to environmental hazards or by making agents targetable against specific biochemical pathways36. As these capabilities spread across the globe, there will be a greater potential for terrorists to harness and use these techniques. While the capabilities of terrorists to engineer biological weapons may have been overstated in the past, this can no longer be said to be the case. It has been argued that two of the preconditions for assessing the threat of bioterrorism, vulnerability to an attack and terrorist capability, are in place; the only remaining consideration is intent40. It is important to determine whether the intent to acquire and use such weapons is present among terrorist groups. While terrorist groups have not often used biological weapons, it is unclear whether this is due to insufficient capabilities or lack of intent1. There are a variety of reasons why they may not be interested in the use of biological weapons, including viewing such weapons as illegitimate in military combat, risks of tactical failure, perceptions of various terrorist groups have a documented interest in the acquisition of biological weapons, and with advances in biotechnology and weaponization, their use may become more attractive 2, 41. Experts also point to a shift in terrorist intent: “post-modern” terrorism aims to inflict the highest mortality rather than make political statements This makes biological weapons an attractive option for such group biological weapons are particularly well-suited to this form of smaller, more informed terrorist groups present circumstances may make the acquisition and use of biological weapons more attractive. high technical difficulty, and concerns about the indiscriminate nature of a biological weapons attack3. That said, , including Aum Shinrikyo and al Qaeda, through violence 33. s; one estimate suggests that the cost to cause civilian casualties is only one dollar per square kilometer for biological weapons, compared to 800 and 2000 dollars per square kilometer for nuclear and conventional weapons, respectively42. In a similar vein, the recent “war on terror” has created an increasingly decentralized terrorist threat; 28. In short, while the intent to use biological weapons has been documented in terrorist groups in the past, Extinction—bioweapon causes global pandemic Mhyrvold 13-postdoctoral fellow from the Department of Applied Mathematics and Theoretical Physics at Cambridge, doctorate in theoretical and mathematical physics and a master's degree in mathematical economics from Princeton, master's degree in geophysics and space physics and a bachelor's degree in mathematics (Nathan, “Strategic Terrorism A Call to Action,” The Lawfare Research Paper Series Research paper, July 3, 2013, http://www.lawfarebl...3-2013.pdf)//AD many biological agents are communicable and so can spread beyond the people initially infected to affect the entire population. Infectious pathogens are inherently hard to control because there is usually no reliable way to stop an epidemic once it starts Unfortunately, . This property makes such biological agents difficult to use as conventional weapons. A nation that starts an epidemic may see it spread to the wrong country—or even to its own people. Indeed, one cannot target a small, well-defined population with a contagious pathogen; by its nature, such a pathogen may infect the entire human race. Despite this rather severe drawback, both the Soviet Union and the United States, as well as Imperial Japan, investigated and produced contagious bioweapons. The logic was that their use in a military conflict would be limited to last-ditch, “scorched earth” campaigns, perhaps with a vaccine available only to one side. Smallpox is the most famous example. It is highly contagious and spreads through casual contact. Smallpox was eradicated in the wild in 1977, but it still exists in both U.S. and Russian laboratories, according to official statements.7 Unofficial holdings are harder to track, but a number of countries, including North Korea, are believed to possess covert smallpox cultures. Biological weapons were strictly regulated by international treaty in 1972. The United States and the Soviet Union agreed not to develop such weapons and to destroy existing stocks. The United States stopped its bioweapons work, but the Russians cheated and kept a huge program going into the 1990s, thereby producing thousands of tons of weaponized anthrax, smallpox, and far more exotic biological weapons based on genetically engineered viruses. No one can be certain how far either the germs or the knowledge has spread since the collapse of the Soviet Union. Experts estimate that a large-scale, coordinated smallpox attack on the United States might kill 55,000 to 110,000 people, assuming that sufficient vaccine is available to contain the epidemic and that the vaccine attack on the United States could easily broaden into a global pandemic, All it would take is for one infected person to leave the country and travel elsewhere infections would most likely appear on every continent, within two weeks. Once these beachheads were established, the epidemic would spread almost without check because the vaccine in world stockpiles and the infrastructure to distribute it would be insufficient. That is particularly true in the developing world works.8, 9 The death toll may be far higher if the smallpox strain has been engineered to be vaccine-resistant or to have enhanced virulence. Moreover, a smallpox despite the U.S. stockpile of at least 300 million doses of vaccine. . If New York City were attacked with smallpox, except perhaps Antarctica, , which is ill equipped to handle their current disease burden to say nothing of a return of smallpox. Even if “only” 50,000 people were killed in the United States, a million or more would probably die worldwide before the disease could be contained, and containment would probably require many years of effort. As horrible as this would be, such a pandemic is by no means the worst attack one can imagine , for several reasons. First, most of the classic bioweapons are based on 1960s and 1970s technology because the 1972 treaty halted bioweapons development efforts in the United States and most other Western countries. Second, the Russians, although solidly committed to biological weapons long after the treaty deadline, the science and technology of molecular biology have made enormous advances, utterly transforming the field in the last few decades. High school biology students routinely perform molecular-biology manipulations that would have been impossible even for the best superpower-funded program back in the heyday of biological-weapons research terrorists have vastly more deadly bugs to choose from were never on the cutting edge of biological research. Third and most important, . The biowarfare methods of the 1960s and 1970s are now as antiquated as the lumbering mainframe computers of that era. Tomorrow’s will . Consider this sobering development: in 2001, Australian researchers working on mousepox, a nonlethal virus that infects mice (as chickenpox does in humans), accidentally discovered that a simple genetic modification transformed the virus.10, 11 Instead of producing mild symptoms, the new virus killed 60% of even those mice already immune to the naturally occurring strains of mousepox. The new virus, moreover, was unaffected by any existing vaccine or antiviral drug. A team of researchers at Saint Louis University led by Mark Buller picked up on that work and, by late 2003, found a way to improve on it: Buller’s variation on mousepox was 100% lethal, although his team of investigators also devised combination vaccine and antiviral therapies that were partially effective in protecting animals from the engineered strain.12, 13 Another saving grace is that the genetically altered virus is no longer contagious. Of course, it is quite possible that future tinkering with the virus will change that property, too. Strong reasons exist to believe that the genetic modifications Buller made to mousepox would work for other poxviruses and possibly for other classes of viruses as well. Might the same techniques allow chickenpox or another poxvirus that infects humans to be turned into a 100% lethal bioweapon, perhaps one that is resistant to any known antiviral therapy? I’ve asked this question of experts many times, and no one has yet replied that such a manipulation couldn’t be done. This case is just one example. Many more are pouring out of scientific journals and conferences every year. Just last year, the journal Nature published a controversial study Biotechnology is advancing so rapidly that it is hard to keep track of all the new potential threats. Nor is it clear that anyone is even trying. In addition to lethality and drug resistance, many other parameters can be played with, given that the infectious power of an epidemic depends on many properties, including the length of the latency period during which a person is contagious but asymptomatic. done at the University of Wisconsin–Madison in which virologists enumerated the changes one would need to make to a highly lethal strain of bird flu to make it easily transmitted from one mammal to another.14 Delaying the onset of serious symptoms allows each new case to spread to more people and thus makes the virus harder to stop. This dynamic is perhaps best illustrated by HIV , which is very difficult to transmit compared with smallpox and many other viruses. Intimate contact is needed, and even then, the infection rate is low. The balancing factor is that HIV can take years to progress to AIDS , which can then take many more years to kill the victim. What makes HIV so dangerous is that infected people have lots of opportunities to infect others. This property has allowed HIV to claim more than 30 million lives so far, and approximately 34 million people are now living with this virus and facing a infect its host quickly, to generate symptoms slowly could silently penetrate the population to unleash its deadly effects suddenly. This type of epidemic would be almost impossible to combat because most of the infections would occur before the epidemic became obvious. A terrorist group could develop and kill a large part of humanity with it terrorists may not have to develop it themselves: some scientist may do so first and highly uncertain future.15 A virus genetically engineered to —say, only after weeks or months— and to spread easily through the air or by casual contact would be vastly more devastating than HIV . It technologically sophisticated Indeed, such a virus . publish the details pathogens could drive the human race to extinction a detailed species-elimination plan of this nature was openly proposed in a scientific journal . Given the rate at which biologists are making discoveries about viruses and the immune system, at some point in the near future, someone may create artificial that . Indeed, . The ostensible purpose of that particular research was to suggest a way to extirpate the malaria mosquito, but similar techniques could be directed toward humans.16 When I’ve talked to molecular biologists about this method, they are quick to point out that it is slow and easily detectable and could be fought with biotech remedies. If you Modern biotechnology will soon be capable, if it is not already, of bringing about the demise of the human race— or at least of killing a sufficient number of people to end high-tech civilization and set humanity back 1,000 years or more. but keep in mind that it takes only a handful of individuals to accomplish these tasks. Never has lethal power of this potency been accessible to so few, so easily modern biological science has frighteningly undermined the correlation between the lethality of a weapon and its cost Access to extremely lethal agents—lethal enough to exterminate Homo sapiens—will be available to anybody with a solid background in biology, terrorists included. A future set of terrorists could just as easily be students of molecular biology who enter their studies innocently enough but later put their skills to homicidal use. Hundreds of universities have curricula sufficient to train people in the skills necessary to make a sophisticated biological weapon, it seems likely in the near future terrorists will fashion a bioweapon that could kill billions of people challenge them to come up with improvements to the suggested attack plan, however, they have plenty of ideas. That terrorist groups could achieve this level of technological sophistication may seem far-fetched, . Even more dramatically than nuclear proliferation, ,a fundamentally stabilizing mechanism throughout history. The 9/11 attacks involved at least four pilots, each of whom had sufficient education to enroll in flight schools and complete several years of training. Bin Laden had a degree in civil engineering. Mohammed Atta attended a German university, where he earned a master’s degree in urban planning—not a field he likely chose for its relevance to terrorism. in Europe and Asia and hundreds more in the United States accept students from all over the world. Thus of or even , or even a single misanthropic individual, overcome our best defenses and do something truly terrible, such as that sometime a small band millions . Indeed, the creation of such weapons within the next 20 years seems to be a virtual certainty. The repercussions of their use are hard to estimate. One approach is to look at how the scale of destruction they may cause compares with that of other calamities that the human race has faced. Yes Bioterror Risk of Bioterror is High Saunders-Hastings 14 (Patrick, “Securitization Theory and Biological Weapons,” E-IR, Jan 8, 2014, Accessed May 20, 2015, http://www.e-ir.info...lweapons/)//AD the threat of biological weapons has been framed as a security issue 4. This examines whether the threat of a biological weapons attack has been overstated by drawing on securitization theory Therefore, essay , and to what degree, with respect to the government’s response , which critically evaluates the process through which an issue comes to be viewed through a security framework. In addition, the essay will also use the precautionary principle, described by the 1998 Wingspread Statement as the notion that “when an activity raises threats of harm to human health or the environment, precautionary measures should be taken even if some cause and effect relationships are not fully established scientifically”5. Though more often applied to considerations of environmental risk, in the case of biological weapons, the principle could be used justify caution even in the absence of consensus due to the severity of the consequences the biological weapons threat has not been overestimated the biodefense measures expressed in current policy and funding decisions are warranted Despite measures which may suggest the government response is an overreaction, other characteristics of the bioweapons threat justify its securitization and resulting prioritization in the government agenda. the consequences pose an existential threat there is an inadequate degree of preparedness the mere possibility of an attack is enough to warrant high spending on preventive programs the response has been appropriately measured given the threat. exaggerations in the media is a separate issue from government policy decisions in response to the security threat to surrounding the probability of an attack, simply if an attack was to occur. It will be argued that and that . such as likelihood-adjusted mortality, U.S. To do this, the essay provides a discussion of how potential of an attack to the United States, how for such an event, how and preparative , and how The focus will be on the United States government because it has taken such a prominent role in bioweapon securitization and biodefense funding. A single country, the US, was chosen as a point of focus to avoid confusion due to differing levels of threat and response across countries. Additionally, any that may exist the public portray and view the biological weapons threat will be ignored; though this could be related to the government’s decision to securitize bioweapons, this and is outside the scope of this paper. how or Cloud Computing Advantage 1AC Advantage ___: Cloud Computing Bulk data collection kills U.S trust Eoyang and Horwitz ’13 (12-20 Mieke,- the Director of the National Security Program and Gabriel,- is the Director of the Economic Program at Third Way “NSA Snooping's Negative Impact On Business Would Have The Founding Fathers 'Aghast'”) The revelations about the scope and scale of NSA’s surveillance both at home and abroad have made many uneasy about the security of their data. This loss of trust could have ongoing consequences for the U.S. economy and for the future development of the Internet. Policymakers must understand these implications as they make decisions on how to reform our surveillance efforts. First, what will this mean for American competitiveness? For years, the Internet has been largely “Made in America”, but the technical One major competitive global advantage for U.S. companies is that America’s openness and freedoms have brought an implied level of trust in the security and privacy architecture and data transcend national borders. European, Chinese, Russian, and other global competitors are vying for the billions of consumers who currently use U.S. Internet services every day—from Google to Facebook to Ebay. of the data flowing through their servers. But when the U.S. government asserts that it can exploit electronic data abroad for intelligence purposes, it creates an international reaction with profound economic consequences. For example, Europe’s Commissioner for digital affairs, Neelie Kroes, predicts the fallout from Snowden’s leaks will have “multi-billion Euro consequences” for US businesses. The EU Commission’s Vice President, Viviane Reding, is pushing for Europe to adopt more expa nsive privacy laws that will help build market share for regional companies—thereby shutting American companies out. economic consequences could be staggering The . Studies by leading Internet researchers at ITIF, Gartner, and Forrester examining the NSA surveillance revelations’ impact project potential lost revenue for U.S. cloud computing companies ranging from $35 billion to $180 billion over the next three years. More than half of the overseas members of a cloud industry group, the Cloud Security Alliance, said they were less likely to use U.S. cloud providers in the future. Ten percent of such members said they had cancelled a U.S. cloud services project as a result of the “Snowden Incident”. While the true costs of the loss of trust are hard to quantify, and will be reported in future quarters, the potential losses are enormous. Second, what will this mean for the future of Internet governance? Since its earliest days, the U.S.-based Internet Corporation for Assigned Names and Numbers (ICANN) has governed the web. As the Internet has expanded, several nations, especially China, have been pressing to end American dominance and transfer control of Internet governance to the International Telecommunication Union (ITU), a specialized agency within the United Nations. Worse still for prospects of continued American dominance, the NSA revelations have prompted calls for extensive regional control of the Internet. For example, Brazil, which has long called for such regional control, will host an important Internet governance conference in April that could challenge America’s role. Unless the U.S. government takes steps to restore some degree of trust a new approach could end U.S. Internet leadership. This could leave management of the Internet to nations like China or Russia that do not share America’s commitment to safety, openness, competition, and growth. , the groundswell of international interest in to Internet governance undermine or Recommendations for change are coming from many corners. President Obama’s advisory group on NSA reform is calling for an end to bulk collection of Americans’ metadata and other steps to restore protections abroad. Major Internet companies have called for greater restrictions on surveillance activities, saying the balance has tipped too far from the individual. The government should heed these calls for reflection and Without understanding the economic implications Internet dominance and our economy could pay the price. reform. of our security policies and taking reasonable steps to restore trust in America’s surveillance efforts, our Fusion Centers steal vast amounts of data from private corporations. American Civil Liberties Union, 2/25/2009, "What's Wrong With Fusion Centers," https://www.aclu.org/report/whats-wrong-fusion-centers-executive-summary : Fusion Centers were originally created to improve the sharing of anti-terrorism intelligence among different law enforcement agencies the scope of their mission has quickly expanded The types of information they seek for analysis has broadened to include but public and private sector data These fusion centers raise very serious privacy issues threaten Americans' privacy at an unprecedented level A new institution is emerging in American life . These state, local and regional institutions state, local and federal . Though they developed independently and remain quite different from one another, for many - with the support and encouragement of the federal government - to cover "all crimes and all hazards." also intelligence, private sector. over time not just criminal , and participation in these centers has grown to include not just law enforcement, but other government entities, the military and even select members of the new government powers and zeal in the "war on terrorism" are combining to , over 40 of which have been established around the country, at a time when new technology, . This surveillance done by the Fusion Centers undermine cloud computing Lomas 13 (Natasha, “NSA Spying Risks Undermining Trust In U.S. Cloud Computing Businesses, Warns Kroes,” Tech Crunch, July 4, 2013, Accessed April 8, 2015, http://techcrunch.com/2013/07/04/spying-bad-for-business/)//AD undermining trust in U.S. cloud computing businesses, the European Commission’s vice-president, Neelie Kroes, has calls for “clarity and transparency” from the U.S. regarding the scope and nature of its surveillance and access to data on individuals and businesses living and conducting business in Europe in order to avoid a knock-on effect on cloud The NSA spying scandal risks warned in a speech today. Kroes also reiterated businesses. Loss of Europeans’ trust could result in “multi-billion euro consequences” for U.S. cloud providers, she added. Kroes was speaking during a press conference held in Estonia, following a meeting of the EC’s European Cloud Partnership Steering Board, which was held to agree on EU-wide specifications for cloud procurement. In her speech, cloud computing businesses are at particular risk of fallout from a widereaching U.S. government surveillance program because they rely on their customers’ trust to function — trust that the data entrusted to them is stored securely. Kroes said: If businesses or part of which follows below, she argued that governments think they might be spied on, they will have less reason to trust the cloud, and it will be cloud providers who ultimately miss out. Why would you pay someone else to hold your commercial or other secrets, if you suspect or know they are being shared against your wishes? Front or back door – it doesn’t matter – any smart person doesn’t want the information shared at all. Customers will act rationally, and providers will miss out on a great opportunity. Scenario one is warming: Cloud computing key to climate modeling Boyce 10 [Eric, technical writer and user advocate for The Rackspace Cloud, September 14, 2010 http://www.rackspacecloud.com/blog/2010/09/14/the-future-of-cloud-computing-the-big-25in-the-next-25/] The promise of the cloud isn’t just about gaming and the ability to safely store all those photos that you wish you hadn’t ever taken. Many of the most promising cloud-based applications also require massive computational power. Searching a database of global DNA samples requires abundant, scalable processing power. Modeling protein folding is another example of how compute resources will be used. Protein folding is linked to many diseases including Alzheimer’s and cancer, and analyzing the folding process can lead to new treatments and cures, but it requires enormous compute power. Projects like Folding@home are using distributed computing to tackle these modeling tasks. The cloud will offer a larger, faster, more scalable way to process data and thus benefit any heavy data manipulation task. 6. Is it going to be hot tomorrow? Like protein folding modeling, climate simulation and forecasting requires a large amount of data storage and processing. Recently the German Climate Computing Center (DKRZ) installed a climate calculating supercomputer that is capable of analyzing 60 petabytes of data ( roughly 13 million DVD’s) at over 158 teraflops (trillion calculations per second). In the next couple of decades, this level of computing power will be widely available and will exist on remote hardware. Sophisticated climate models combined with never before seen compute power will provide better predictions of climate change and more rapid early warning systems Key to warming adaptation Pope 10 [ Vicky Pope is the head of climate science advice at the Met Office Hadley Centre, “ How science will shape climate adaptation plans,” 16 September 2010, http://www.guardian.co.uk/environment/cif-green/2010/sep/16/science-climate-changeadaptation] the demand for information on how climate change will affect our future outstrips the current capability of the science and climate models. My view is that as scientists, we can provide useful information, but we need to be clear about its limitations and strive to improve information for the future. We need to be clear about the uncertainties in our Some would argue that projections while still extracting useful information for practical decision-making. I have been involved in developing climate models for the last 15 years and despite their we can quantify the risk of these outcomes happening. These projections – the UK climate projections published in 2009 - are already forming the backbone of adaptation decisions being made in the UK for 50 to limitations we are now able to assess the probability of different outcomes for the first time. That means 100 years ahead. A project commissioned by the Environment Agency to investigate the impact of climate change on the Thames estuary over the next 100 years concluded that current government predictions for sea level rise are realistic. A major outcome from the scientific analysis was that the worst-case scenarios for high water levels can be significantly reduced - from 4.2m to 2.7m – because we are able to rule out the more extreme sea level rise. As a result, massive investment in a tide-excluding estuary barrage is unlikely to be needed this century. This will be reviewed as more information becomes available, taking a flexible approach to adaptation. The energy industry, working with the Met Office, looked at the likely impact of climate change on its infrastructure. The project found that very few changes in design standards are required, although it did highlight a number of issues. For instance, transformers could suffer higher failure rates and efficiency of some types of thermal power station could be markedly reduced because of increasing temperatures. A particular concern highlighted by this report and reiterated in today's report from the Climate Change Committee - the independent body that advises government on its climate targets - is that little is known about how winds will change in the future - important because of the increasing role of wind power in the UK energy mix. Fortunately many people, from private industry to government, recognise the value of even incomplete information to help make decisions about the future. Demand for climate information is increasing, particularly relating to changes in the short to medium term. More still needs to be done to refine the climate projections and make them more usable and accessible. This is especially true if we are to provide reliable projections for the next 10 to 30 years. The necessary science and modelling tools are being developed, and the first tentative results are being produced. We need particularly to look at how we communicate complex and often conflicting results. In order to explain complex science to a lay audience, scientists and journalists are prone to progressively downplay the complexity. Conversely, in striving to adopt a more scientific approach and include the full range of uncertainty, we often give sceptics an easy route to undermine the science. All too often uncertainty in science offers a convenient excuse for delaying important decisions. However, in the case of climate change there is overwhelming evidence that the climate is changing — in part due to human activities — and that changes will accelerate if emissions continue unabated. In examining the Scientists now need to press on in developing the emerging tools that will be used to underpin sensible adaptation decisions which will determine our future. uncertainty in the science we must take care to not throw away what we do know. Science has established that climate is changing. Warming is inevitable–only adaptation can prevent extinction Romero 8 [Purple, reporter for ABS-CBN news, 05/17/2008, Climate change and human extinction--are you ready to be fossilized? http://www.abs-cbnnews.com/nation/05/16/08/climate-change-andhuman-extinction-are-you-ready-be-fossilized Climate change killed the dinosaurs. Will it kill us as well? Will we let it destroy the human race? This was the grim, depressing message that hung in the background of the Climate Change Forum hosted on Friday by the Philippine National Red Cross at the Manila Hotel. "Not one dinosaur is alive today. Maybe someday it will be our fossils that another race will dig up in the future , " said Roger Bracke of the International Federation of Red Cross and Red Crescent Societies, underscoring his point that no less than extinction is faced by the human race , unless we are able to address global warming and climate change in this generation. Bracke, however, countered the pessimistic mood of the day by saying that the human race still has an opportunity to save itself. This more hopeful view was also presented by the four other speakers in the forum. Bracke pointed out that all peoples of the world must be involved in two types of response to the threat of climate change: mitigation and adaptation. "Prevention" is no longer possible, according to Bracke and the other experts at the forum, since climate change is already happening. Last chance The forum's speakers all noted the increasing number and intensity of devastating typhoons--most recently cyclone Nargis in Myanmar, which killed more than 100,000 people--as evidence that the world's climatic and weather conditions are turning deadly because of climate change. They also reminded the audience that deadly typhoons have also hit the Philippines recently, particularly Milenyo and Reming, which left hundreds of thousands of Filipino families homeless. World Wildlife Fund Climate and Energy Program head this generation the last chance for the human race" to do something and ensure that humanity stays alive in this planet. According to Saño, while most members of our generation will be dead by the time the worst effects of climate Naderev Saño said that " change are felt, our children will be the ones to suffer. How will Filipinos survive climate change? Well, first of all, they have to be made aware that climate change is a problem that threatens their lives. The easiest way to do this – as former Consultant for the Secretariats of the UN Convention on Climate Change Dr. Pak Sum Low told abscbnews.com/Newsbreak – is to particularize the disasters that it could cause. Talking in the language of destruction, Pak and other experts paint this portrait of a Philippines hit by climate change: increased typhoons in Visayas, drought in Mindanao, destroyed agricultural areas in Pampanga, and higher incidence rates of dengue and malaria. Sañom said that as polar ice caps melt due to global warming, sea levels will rise, endangering coastal and low-lying areas like Manila. He said Manila Bay would experience a sea level increase of 72 meters over 20 years. This means that from Pampanga to Nueva Ecija, farms and fishponds would be in danger of being would be inundated in saltwater. Sañom added that Albay, which has been marked as a vulnerable area to typhoons, would be the top province at risk. Sañom also pointed out that extreme weather conditions arising from climate change, including typhoons and severe droughts, would have social, economic and political consequences: Ruined farmlands and fishponds would hamper crop growth and reduce food sources, typhoons would displace people, cause diseases, and limit actions in education and employment. Thus, Saño said, while environmental protection should remain at the top of the agenda in fighting climate change, solutions to the phenomenon "must also be economic, social, moral and political." Mitigation Joyceline Goco, Climate Change Coordinator of the Environment Management Bureau of the Department of Environment and Natural Resources, focused her lecture on the programs Philippine government is implementing in order to mitigate the effects of climate change. Goco said that the Philippines is already a signatory to global agreements calling for a reduction in the "greenhouse gasses"--mostly carbon dioxide, chloroflourocarbons and methane--that are responsible for trapping heat inside the planet and raising global temperatures. Goco said the DENR, which is tasked to oversee and activate the Clean Development Mechanism, has registered projects which would reduce methane and carbon dioxide. These projects include landfill and electricity generation initiatives. She also said that the government is also looking at alternative fuel sources in order do reduce the country's dependence on the burning of fossil fuels--oil--which are known culprits behind global warming. Bracke however said that mitigation is not enough. "The ongoing debate about mitigation of climate change effects is highly technical. It involves making fundamental changes in the policies of governments, making costly changes in how industry operates. All of this takes time and, frankly, we're not even sure if such mitigation efforts will be successful. In the meantime, while the debate goes on, the effects A few nations and communities have already begun adapting their lifestyles to cope with the effects of climate change. In Bangladesh, farmers have switched to raising ducks instead of chickens because the latter easily succumb to weather disturbances and immediate effects, such as floods. In Norway, houses with elevated foundations have been constructed to decrease displacement due to typhoons. In the Philippines main body for fighting climate change, of climate change are already happening to us." Adaptation the Presidential Task Force on Climate Change, (PTFCC) headed by Department on Energy Sec. Angelo Reyes, has identified emission reduction measures and has looked into what fuel mix could be both environment and economic friendly. The Department of Health has started work with the World Health Organization in strengthening its , bringing information hatched from PTFCC’s studies down to and crafting an action plan for adaptation with the communities in the barangay level remains a challenge. Bracke said that the Red Cross is already at the forefront of efforts to surveillance mechanisms for health services. However prepare for disasters related to climate change. He pointed out that since the Red Cross was founded in 1919, it has already been helping people beset by natural disasters. "The problems resulting from climate change are not new to the Red Cross. The Red Cross has been facing those challenges for a long time. However, the frequency and magnitude of those problems are unprecedented. This is why the Red Cross can no longer face these problems alone," he said. Using a medieval analogy, Bracke said that the Red Cross can no longer be a "knight in shining armor rescuing a damsel in distress" whenever disaster strikes. He said that disaster preparedness in the face of climate change has to involve people at the grassroots level. "The role of the Red Cross in the era of climate change will be less as a direct actor and increase as a trainor and guide to other partners who will help us adapt to climate change and respond to disasters," said Bracke. PNRC chairman and Senator Richard Gordon gave a picture of how the PNRC plans to take climate change response to the grassroots level, through its project, dubbed "Red Cross 143". Gordon explained how Red Cross 143 will train forty-four volunteers from each community at a barangay level. These volunteers will have training in leading communities in disaster response. Red Cross 143 volunteers will rely on information technology like cellular phones to alert the PNRC about disasters in their localities, mobilize people for evacuation, and lead efforts to get health care, emergency supplies, rescue efforts, etc. Adaptation solves global wars Werz and Conley 12 - Senior Fellow @American Progress where his work as member of the National Security Team focuses on the nexus of climate change, migration, and security and emerging democracies & Research Associate for National Security and International Policy @ the Center for American Progress [Michael Werz & Laura Conley, “Climate Change, Migration, and Conflict: Addressing complex crisis scenarios in the 21st Century,” Center for American Progress, January 2012] The costs and consequences of climate change on our world will define the 21st century. Even if nations across our planet were to take immediate steps to rein in carbon emissions—an unlikely prospect—a warmer climate is inevitable. As the U.N. Intergovernmental Panel on Climate Change, or IPCC, noted in 2007, human-created “warming of the climate system is unequivocal, as is now evident from observations of increases in global average air and ocean temperatures, widespread melting of snow and ice and rising global average sea level.”1 As these ill effects progress they will have serious implications for U.S. national security interests as well as global stability—extending from the sustainability of coastal military installations to the stability of nations that lack the as these effects accelerate, the stress will impact human migration and conflict around the world. It is difficult to fully understand the detailed causes of migration and economic and political instability, but the growing evidence of links between climate change, migration, and conflict raise plenty of reasons for concern. This is why it’s time to start thinking about new and comprehensive resources, good governance, and resiliency needed to respond to the many adverse consequences of climate change. And answers to multifaceted crisis scenarios brought on or worsened by global climate change. As Achim Steiner, executive director of the U.N. Environment Program, argues, “The question we must continuously ask ourselves in the face of scientific complexity and uncertainty, but also growing evidence of climate change, is at what point precaution, In the coming decades climate change will increasingly threaten humanity’s shared interests and collective security in many parts of the world, disproportionately affecting the globe’s least developed countries. common sense or prudent risk management demands action.”2 Climate change will pose challenging social, political, and strategic questions for the many different multinational, regional, national, and nonprofit organizations dedicated to improving the human condition worldwide. Organizations as different as Amnesty International, the U.S. Agency for International Development, the World Bank, the International Rescue Committee, and the World Health Organization will all have to tackle directly the myriad effects of climate change. Climate change also poses distinct Recent intelligence reports and war games, including some conducted by the U.S. Department of Defense, conclude that over the next two or three decades, vulnerable regions (particularly sub-Saharan Africa, the Middle East, South and Southeast Asia) will face the prospect of food shortages, water crises, and catastrophic flooding driven by climate change. These developments could demand U.S., European, and international humanitarian relief or military responses, often the delivery vehicle for aid in crisis situations. This report provides the foundation and challenges to U.S. national security. overview for a series of papers focusing on the particular challenges posed by the cumulative effects of climate change, migration, and conflict in some of our world’s most complex environments. In the papers following this report, we plan to outline the effects of this nexus in northwest Africa, in India and Bangladesh, in the Andean region of South America, and in China. In this paper we detail that nexus across our planet and offer wide ranging recommendations about how the United States, its allies in the global community, and the community at large can deal with the coming climate-driven crises with comprehensive sustainable security solutions encompassing national security, diplomacy, and economic, social, and environmental development. Here, we briefly summarize our arguments and our conclusions. The nexus The Arab Spring can be at least partly credited to climate change. Rising food prices and efforts by authoritarian regimes to crush political protests were linked first to food and then to political repression—two important motivators in the Arab makeover this past year. To be sure, longstanding economic and social distress and lack of opportunity for so many Arab youth in the Middle East and across North Africa only needed a spark to ignite revolutions across the region. But environmental degradation and the movement of people from rural areas to already overcrowded cities alongside rising food prices enabled the cumulative effects of long-term economic and political failures to sweep across borders with remarkable agility. It does not require much foresight to acknowledge that other effects of climate change will add to the pressure in the decades to come. In particular the cumulative overlays of climate change with human migration driven by environmental crises, political conflict caused by this migration, and competition for more scarce resources will add new dimensions of complexity to existing and future crisis scenarios. It is thus critical to understand how governments plan to answer and prioritize these new threats from climate No matter what steps the global community takes to mitigate carbon emissions, a warmer climate is inevitable. The effects are already being felt change, migration, and conflict. Climate change Climate change alone poses a daunting challenge. today and will intensify as climate change worsens. All of the world’s regions and nations will experience some of the effects of this transformational challenge. Here’s just one case in point: African states are likely to be the most vulnerable to multiple stresses, with up to 250 million people projected to suffer from water and food insecurity and, in low-lying areas, a rising sea level.3 As little as 1 percent of Africa’s land is located in low-lying coastal zones but this land supports 12 percent of its urban population.4 Furthermore, a majority of people in Africa live in lower altitudes—including the Sahel, the area just south of the Sahara—where the worst effects of water scarcity, hotter temperatures, and longer dry seasons are expected to occur.5 These developments may well be exacerbated by the lack of state and regional capacity to manage the effects of climate change. These same dynamics haunt many nations in Asia and the Americas, too, and the implications for developed countries such as the United States and much of Europe will be profound. Migration Migration adds another layer of complexity to the scenario. In the 21st century the world could see substantial numbers of climate migrants—people displaced by either the slow or sudden onset of the effects of climate change. The United Nations’ recent Human Development Report stated that, worldwide, there are already an estimated 700 million internal migrants—those leaving their homes within their own countries—a number that includes people whose migration isrelated to climate change and environmental factors. Overall migration across national borders is already at approximately 214 million people worldwide,6 with estimates of up to 20 million displaced in 2008 alone because of a rising sea level, desertification, and flooding.7 One expert, Oli Brown of the International Institute for Sustainable Development, predicts a tenfold increase in the current number of internally displaced persons and international refugees by 2050.8 It is important to acknowledge that there is no consensus on this estimate. In fact there is major disagreement among experts about how to identify climate as a causal factor in internal and international migration. But even though the root causes of human mobility are not always easy to decipher, the policy challenges posed by that the International Organization for Migration produced in cooperation with the United Nations University and the Climate Change, Environment and Migration Alliance cites numbers that range from “200 million to 1 billion migrants from climate change alone, by 2050,”9 arguing that “environmental drivers of migration are often coupled with economic, social and developmental factors that can movement are real. A 2009 report by accelerate and to a certain extent mask the impact of climate change.” The report also notes that “migration can result from different environmental factors, among them gradual environmental degradation (including desertification, soil and coastal erosion) and natural disasters (such as earthquakes, floods or tropical storms).”10 (See box on climate change is expected to aggravate many existing migratory pressures around the world. Indeed associated extreme weather events resulting in drought, floods, and disease are projected to increase the number of sudden humanitarian crises and disasters in areas least able to cope, such as those already mired in poverty or prone to conflict.11 Conflict This final layer is the most unpredictable, both within nations page 15 for a more detailed definition of climate migrants.) Clearly, then, and transnationally, and will force the United States and the international community to confront climate and migration challenges within an increasingly unstructured local or regional security environment. In contrast to the great power conflicts and the associated proxy wars that marked most of the 20th century, the immediate post- Cold War decades witnessed a diffusion of national security interests and threats. U.S. national security policy is increasingly integrating thinking about nonstate actors and nontraditional sources of conflict and instability, for example in the fight against Al Qaeda and its affiliated groups. Climate change is among these newly visible issues sparking conflict. But because the direct link between conflict and climate change is unclear, awareness of the indirect links has yet to lead to substantial and sustained action to address its security the potential for the changing climate to induce conflict or exacerbate existing instability in some of the world’s most vulnerable regions is now recognized in national security circles in the United States, although research gaps still exists in many implications. Still places. The climate-conflict nexus was highlighted with particular effect by the current U.S. administration’s security-planning reviews over the past two years, as well as the Center for Naval Analysis, which termed climate change a “threat multiplier,” indicating that it can exacerbate existing stresses and insecurity.12 The Pentagon’s latest Quadrennial Defense Review also recognized climate change as an “accelerant of instability or conflict,” highlighting the operational challenges that will confront U.S. and partner militaries amid a rising sea level, growing extreme weather events, and other anticipated effects of climate change.13 The U.S. Department of Defense has even voiced concern for American military installations that may be threatened by a rising sea level.14 There is also well-developed international analysis on these points. The United Kingdom’s 2010 Defense Review, for example, referenced the security aspects of climate change as an evolving challenge for militaries and policymakers. Additionally, in 2010, the Nigerian government referred to climate change as the “greatest environmental and humanitarian challenge facing the country this century,” demonstrating that climate change is no longer seen as solely scientific or environmental, but increasingly as a social and political issue cutting across all aspects of human development.15 As these three threads—climate change, migration, and conflict—interact more intensely, the consequences will be far-reaching and occasionally counterintuitive. It is impossible to predict the outcome of the Arab Spring movement, for example, but the blossoming of democracy in some countries and the demand for it in others is partly an unexpected result of the consequences of climate change on global food prices. On the other hand, the interplay of these factors will drive complex crisis situations in which domestic policy, international policy, humanitarian assistance, and security converge in new ways. Areas of Several regional hotspots frequently come up in the international debate on climate change, migration, and conflict. Climate migrants in northwest Africa, for example, are causing communities across the region to respond in different ways, often to the detriment of regional and international security concerns. Political and social instability in the region plays into the hands of organizations such as Al Qaeda in the Islamic Maghreb. And recent developments in Libya, especially the large number of weapons looted from concern depots after strongman Moammar Qaddafi’s regime fell— which still remain unaccounted for—are a threat to stability across North Africa. Effective solutions need not address all of these issues simultaneously but must recognize the layers of relationships among them. And these solutions must also recognize that these variables will not always intersect in predictable ways. While some migrants may flee floodplains, for example, others may migrate to them in search of greater opportunities in coastal urban areas.16 Bangladesh, already well known for its disastrous floods, faces rising waters in the future due to climate-driven glacial meltdowns in neighboring India. The effects can hardly be over. In December 2008 the National Defense University in Washington, D.C., ran an exercise that explored the impact of a flood that sent hundreds of thousands of refugees into neighboring India. The result: the exercise predicted a new wave of migration would touch off religious conflicts, encourage the spread of contagious diseases, and cause vast damage to infrastructure. India itself is not in a position to absorb climate-induced pressures—never mind foreign climate migrants. The country will contribute 22 percent of global population growth and have close to 1.6 billion inhabitants by 2050, causing demographic developments that are sure to spark waves of internal migration across the country. Then there’s the Andean region of South America, where melting glaciers and snowcaps will drive climate, migration, and security concerns. The average rate of glacial melting has doubled over the past few years, according to the World Glacier Monitoring Service.17 Besides Peru, which faces the gravest consequences in Latin America, a number of other Andean countries will be will put water security, agricultural production, and power generation at risk—all factors that could prompt people to leave their homes and migrate. The IPCC report argues that the region is especially vulnerable because of its fragile ecosystem.18 Finally, China is now in its fourth decade of ever-growing internal migration, some of it driven in recent years by environmental change. Today, across its vast territory, China continues to experience the full spectrum of massively affected, including Bolivia, Ecuador, and Colombia. This development climate change related consequences that have the potential to continue to encourage such migration. The Center for a New American Security recently found that the consequences of climate change and continued internal migration in China include “water stress; increased droughts, flooding, or other severe events; increased coastal erosion and saltwater inundation; glacial melt in the Himala as that could affect hundreds of millions; and shifting agricultural zones”—all of which will affect food supplies. 19 Pg. 1-7 Scenario two is disease: Cloud computing key to genome sequencing and disease spread Chansanchai 15 (Athima, “Cloud computing contributes to individually tailored medical treatments of the future,” Microsoft News, Feb 2, 2015, Accessed April 8, 2015, http://news.microsoft.com/features/cloud-computing-contributes-to-individually-tailored-medicaltreatments-of-the-future/)//AD in a decade – or less – it could be real science. To get to the point where technology can give people access to their genetic profiles, cloud computing plays a pivotal role. By putting resources to analyze genomes in the cloud, researchers can do their work from a variety of devices, collaborate with each other more easily and save time and money. Just a few years ago, sequencing a human genome, for example, used to cost $95 million. Now, it’s $1,000. And by 2020, it may be a matter of pennies. Computing makes it possible to run simulations faster, which leads to more efficient lab work that could produce scientific breakthroughs. Feng and his team at Virginia Tech have developed tools to help other researchers and clinicians in their quests to find cures for cancer, lupus and other diseases. For now, this level of personalized medicine is science fiction. But Feng thinks that Genome sequencing is key to solve ABR disease Koser et al 14 *ABR is anti-biotic resistant *WGS is whole genome sequencing 1 Department of Medicine, University of Cambridge, Cambridge, UK 2Clinical Microbiology and Public Health Laboratory, Public Health England, Cambridge, UK 3Cambridge University Hospitals National Health Service Foundation Trust, Cambridge, UK 4Wellcome Trust Sanger Institute, Wellcome Trust Genome Campus, Hinxton, UK (Claudio, “Whole-genome sequencing to control antimicrobial resistance,” Cell Press, 2014, Elsevier, Accessed April 8, 2015, http://ac.els-cdn.com/S0168952514001140/1-s2.0S0168952514001140-main.pdf?_tid=b6aec3dc-def8-11e4-9b5b00000aab0f6c&acdnat=1428612232_7e13b78f2121498282f37bd79b933b98)//AD WGS has become an essential tool for drug development by enabling the rapid identification of resistance mechanisms, particularly in the context of tuberculosis (TB), which remains a global public health emergency [15,16]. In 2005 the first published use of 454 pyrosequencing (the first second-generation WGS technology) was to identify the F0 subunit ofthe ATP synthase as the target of bedaquiline, which subsequently became the first representative of a novel class of anti-TB agents to be approved in 40 years [16,17]. This has enabled researchers to sequence this gene in phylogenetically diverse reference collections to ensure thatitis conserved across Mycobacterium canettii as well as the various lineages and species that comprise the Mycobacterium tuberculosis complex This represents an important step because drug candidates are usually only tested against a small number of isolates during the early phases of drug development. Similarly, only a limited number of MTBC genotypes are sampled in clinical trials, depending on where these are conducted [19]. As a result, intrinsically resistant strains might be missed, ashas been the case forPA-824, ananti-TB agent in Phase III trials [19–21]. The early elucidation of resistance mechanisms using WGS also has implications for the design of clinical trials. If resistance mechanisms are discovered that only result in marginally increased minimal inhibitory concentrations (MICs) compared with the wild type MIC distributions, more frequent (MTBC), the causative agents ofTB[18]. dosing or higher doses could be employed in clinical trials to overcome this level of resistance. Moreover, the discovery of cross-resistance between agents using WGS can influence the choice of antibiotics that are included in novel regimens. TB is always treated with multiple antibiotics to minimise the chance of treatment failure as a result of the emergence of resistance during treatment [22]. Regimens that contain agents to which a single mutation confers cross-resistance should be avoided if these mutations arise frequently in vivo. WGS has recently highlighted that this may be the case with three Phase II trial regimens that contain bedaquiline and clofazimine because the mutational upregulation of an efflux pump confers cross-resistance to both drugs [23]. In addition to being a tool to design clinical trials, WGS has become an increasingly important tool it is increasingly being used to distinguish exogenous reinfection from relapse of the primary infection, which is crucial in assessing the efficacy of the drug or regimens under investigation [24,25]. Traditional epidemiological tools do not always during clinical trials. Specifically, provide the necessary resolution for this purpose. This is due to the fact that they only interrogate minute parts of the genome {e.g., multilocus sequence typing (MLST) of WGS interrogates the complete (or near-complete) genetic repertoire of an organism. Therefore, the resolution of WGS is only limited by the rate of evolution of the pathogen and will become the gold standard for clinical trials of new antiTB agents and other infectious diseases associated with recurrent disease [27,28]. Pseudomonas aeruginosa analyses only 0.18% of the genome [26]}. By contrast, Drug-resistant diseases cause extinction. Davies 8—Department of Microbiology and Immunology at the University of British Columbia (Julian, “Resistance redux: Infectious diseases, antibiotic resistance and the future of mankind”, EMBO Rep. Jul 2008; 9(Suppl 1): S18–S21, dml) For many years, antibiotic-resistant pathogens have been recognized as one of the main threats to human survival, as some experts predict a return to the pre-antibiotic era. So far, national efforts to exert strict control over the use of antibiotics have had limited success and it is not yet possible to achieve worldwide concerted action to reduce the growing threat of multi-resistant pathogens: there are too many parties involved. Furthermore, the problem has not yet really arrived on the radar screen of many physicians and clinicians, as antimicrobials still work most of the time—apart from the occasional news headline that yet another nasty superbug has emerged in the local hospital. Legislating the use of antibiotics for non-therapeutic applications and curtailing general public access to them is conceivable, but legislating the medical profession is an entirely different matter. In order to meet the growing problem of antibiotic resistance among pathogens, the discovery and development of new antibiotics and alternative treatments for infectious diseases, together with tools for rapid diagnosis that will ensure effective and appropriate use of existing antibiotics, are imperative. How the health services, pharmaceutical industry and academia respond in the coming years will determine the future of treating infectious diseases. This challenge is not to be underestimated: microbes are formidable adversaries and, despite our best efforts, continue to exact a toll on the human race. CASE Extensions Cloud Computing Growing Cloud Computing is on the rise, and is used in close to all companies. Adam Gifford, 6-13-2015, "Rise of cloud computing liberates companies," New Zealand Herald, http://m.nzherald.co.nz/technology/news/article.cfm?c_id=5&objectid=11464358 Chief information officers who have spent years filling up their data centres are now clearing out space so they can do new things. That's the picture Jim Thompson, chief . Data centres, which are like fridges full of computers, have been changing physically anyway under the effect of Moore's Law, which describes the steady rate at which silicon chips become smaller, more powerful and cheaper. That sets up the conversation for cloud computing, how to move some application and tasks off site . IT in the cloud is computing becoming a utility model, something you can get in different ways Banks want to be banks, airlines want to be airlines. They don't want to be in the IT business, and they see the cloud as the answer to all their problems. "You put it in the cloud and you only pay for what you want to use, you get the elasticity you want. engineer and vice-president for engineering and supply chain at technology vendor Unisys, brought to last week's ninth annual CIO Summit. He talked on the rise of the digital business and how that is transforming the data centre "The fridges are getting smaller. They're more like wine cellars now," he says from his home base in Philadelphia. But while servers have got smaller, the average enterprise has added more of them to host applications that talk to the web and mobile technology. . The analogy Thompson uses is the early part of the industrial revolution, when factories would have their own power plants. "As the infrastructure matured, big factories got out of the power generation business . "Business and IT have wrestled with how to deliver technology to the enterprise. " Thompson says it's putting even more pressure on IT departments to reduce costs. "Our friends at [analysis firm] Gartner say something like 25 per cent of IT costs have to come out by 2017, so a CIO looks at how to deliver value to the enterprise, but also help innovate and grow and differentiate while taking costs out. "Most of these guys are also saying they are overwhelmed in one way or another, they have way more work than they can deal with." Budgets are fixed or declining, expectations are rising, and new consumer technologies like phones and watches are demanding more of their time. "My car just told my phone I need an iWatch," jokes Thompson, but the new technology will be no joke for IT departments. Thompson says as a rule of thumb two-thirds of spending on the data centre goes to run the operation at a steady state, 20 per cent goes towards growth and what's left must pay for any innovation in the business. The bulk of costs are in labour and software licensing. Jim Thompson. Jim Thompson. "CIOs should look to minimise the number of vendors, maximise the licence coverage, optimise cost and as much as possible optimise staff, and use co-lo services or any kind of cloud you can. "They need to recognise where the business differentials are, what exactly is the secret sauce for business? Everything can go in the cloud It's not just applications but storage and computing power that can be bought the else ." It's a bit like payroll, which most organisations outsourced decades ago. when needed from disruptors like Amazon or Rackspace. It can be a solution or just raw assets to do testing and development. "You can't push everything into the cloud so you have to be disciplined about what you do and where," Thompson says. "You need to recognise your differentiators, the places you want to innovate and grow. "How does IT shift its position in the enterprise from a passive supplier to a business enabler? I think there is a mindset shift that CIOs have to take in the way they operate their IT component. It shouldn't be viewed as just a boiler in the basement that keeps the lights on. It should be used as it can be used to create differentiated business value. It's about recognising the rise of digitalisation in business." Every bit of new consumer technology influences the way businesses have to respond. "Every business has an app now, things you never expected to produce an application for a phone now do and some are pretty worthwhile. That's what the customer expects whenever they make a transaction. "That is a stress on IT and they need to shift the pedestrian stuff that is now consuming two-thirds of their assets. They need to take that the way of payroll. Get rid of that stuff and focus on what differentiates me and my business in the marketplace. How do I get in front of what customers want and need?" Thompson, who has almost three decades with Unisys and holds technology patents in operating systems, storage and banking, looks back to the days when IBM and Unisys mainframes got eaten from the bottom because Intel produced an inexpensive chip that ended up on the desktop. The days of needing big expensive computers on site doing a lot of processing are never coming back. As one of the longest surviving mainframe providers, Unisys stopped producing its own chips and now uses Intel's X86 chip architecture. Thompson says having an enterprise standardise on an architecture like X86 makes sense. "You get agility by standardisation because as things ebb and flow, you have interchangeable parts. IT and that is what enables use of the cloud. That is the new " " Provisioning with cloud resource means it can be throttled down when needed. Unisys' main hunting ground in New Zealand i s banks, the health sector and government agencies. Cloud Computing is currently experiencing rapid growth, and is forecasted to continue this growth. Roger Strukhoff, 2-4-2015, "The Global Rise of Cloud Computing »," Cloud Tweaks, http://cloudtweaks.com/2015/02/global-rise-cloud-computing/ rapid growth of cloud computing, Estimates more than $2 trillion spent worldwide in 2014 on enterprise IT growth projections for cloud remain healthy optimism in the air it’s a good time to be optimistic not just in North America, but throughout the world as a whole. The Global Rise of Cloud Computing Despite the the cloud still commands a small portion of overall enterprise IT spending. percentage between 5% and 10% of the slightly (not including telco) , and there is I’ve seen put the . Yet . A recent roundup of projections in Forbes paints the picture. Cloud-IT The Global Picture From our studies at the Tau Institute for Global ICT studies, we believe There are bright spots in every region, with countries such as Jordan, Latvia, Morocco, and the Philippines joining better-known places where IT is playing an increasing role in economic development. Research we’ve been conducting for the past several years has produced a picture of how more than 100 nations throughout the world are progressing with their overall IT infrastructure, on a relative basis. We seek to find the nations that are doing the most with the economic resources they have, and we issue several specific groups of rankings. Given robust underlying infrastructure, and reasonable socio-economic conditions, a nation should be set to benefit from the continuing growth of cloud computing cloud computing benefit entire nations as well as single organizations . Training & Education Are Key education-cloud An emphasis on operating expenses instead of capital expenditure, the ability to scale (and de-scale) quickly, and provisioning in almost real-time are aspects of that can . There are significant issues of data sovereignty and security entangled in distributed cloud infrastructures that cross international borders, to be sure. But inter-governmental organizations from the European Union (EU) to the Association of Southeast Asian Nations (ASEAN) to the East African Community (EAC) and many more are stocked with serious-minded people working to address and solve the political issues so that the technology may flow and improve the lives of their people. There will be no flow without proper, specific education and training. Although SaaS and PaaS can insulate end-users as well as developers from the tricky particulars of dealing with the underlying infrastructure, there is tremendous complexity—and opportunity—involved in designing, deploying, and provisioning that infrastructure. The opportunity lies in training the people of the world in the languages, frameworks, platforms, and architectures that form cloud computing in the whole. Link Large scale surveillance activities by the United States harms the trust in cloud computing industries Nerijus Adomaitis, 11-7-2013, "U.S. spying harms cloud computing, Internet freedom: Wikipedia founder," Reuters, http://www.reuters.com/article/2013/11/07/net-us-wikipedia-spyingidUSBRE9A613A20131107 The United States' large-scale surveillance harm the U.S. cloud computing industry U.S. eavesdropping poses a threat to Internet freedoms have a big impact on the cloud computing industry as people are afraid to put data in the U.S. alleged of global communications networks will badly , the founder of Wikipedia said on Thursday. Jimmy Wales, who launched the online encyclopaedia service 12 year ago, said the Edward Snowden, also , revealed by leaks from former U.S. intelligence contractor by giving an excuse to oppressive regimes to introduce more censorship. "It's going to , but it's also devastating for the kind of work I do," Wales told reporters after speaking at an IT event in Norway. "If you are BMW, a car maker in Germany,... you probably are not that comfortable putting your data into the U.S. any more," said the former futures trader who is still a key player at Wikipedia, one of the most Cloud computing adopted by big companies popular websites in the world. is being to cut costs and give flexibility to their IT departments is an umbrella term for activities ranging from web-based email to business software that is run remotely via the Internet instead of on-site. It and governments globally . Snowden's leaks revealing the reach and methods of U.S. surveillance have prompted angry calls for explanations from France to Brazil. Germany has been particularly annoyed by revelations that the U.S. National Security Agency (NSA) monitored Chancellor Angela Merkel. "EMBARRASSING" Wales said the revelations made it more difficult to convince oppressive regimes to respect basic freedoms and privacy as Wikipedia seeks to limit censorship of its content. "They (spying revelations) give the Chinese every excuse to be as bad as they have been... It's really embarrassing," he said. "It's an enormous problem, an enormous danger." China and countries in the Middle Eas t have been most active in filtering Wikipedia content to restrict access to certain information, Wales said. He said Wikipedia had no plan to introduce advertising. "If we need to do that to survive, we will do what's needed to survive, but we are not discussing that," he said. "Some places have to remain free of commerce... Wikipedia is a temple for the mind," Wales said. Wikip edia has been financed through a non-profit foundation Wikimedia, which reported revenues of $38.4 million for the fiscal year 2011-2012, including $35.1 million in donations and contributions. Reputation of Tech Companies, including cloud computing, are taking massive hits to their customer relations & trust. Edward Wyatt & Claire Cain Miller, 12-9-2013, "Tech Giants Issue Call for Limits on Government Surveillance of Users," New York Times, http://www.nytimes.com/2013/12/09/technology/tech-giants-issue-call-for-limits-ongovernment-surveillance-of-users.html?pagewanted=all prominent technology companies, bruised by revelations of government spying on their customers’ data and scrambling to repair the damage to their reputations, are mounting a public campaign to urge President Obama and Congress to set new limits on government surveillance. Executive Appeal Executives from prominent technology companies called for greater limits on government surveillance of their users. Reports about government surveillance have shown there is a real need for greater disclosure and new limits on how governments collect information. The U.S. government should take this opportunity to lead this reform effort and make things right. —Mark Zuckerberg, Facebook Source: Eight Reformgovernmentsurveillance.com Bits More Tech Coverage News from the technology industry, including start-ups, the Internet, enterprise and gadgets. On Twitter: @nytimesbits. Enlarge This Image Justin Google, called for reform of security laws worldwide, saying, “We urge the U.S. government to lead the way.” On Monday the companies, led by Google and Microsoft, presented a plan to regulate online spying and urged the United States to lead a worldwide effort to restrict it. They Sullivan/Getty Images Larry Page, chief of accompanied it with an open letter, in the form of full-page ads in national newspapers, including The New York Times, and a website detailing their concerns. It is the broadest and strongest effort by the companies, often archrivals, to speak with one voice to pressure the government. The tech industry, whose billionaire founders and executives are highly sought as political donors, forms a powerful interest group that is increasingly flexing its muscle in Washington. “It’s now in their business and economic interest to protect their users’ privacy and to aggressively push for changes,” said Trevor Timm, an activist at the Electronic Frontier Foundation. “The N.S.A. mass-surveillance programs exist for a simple reason: cooperation with the tech and telecom companies. If the tech companies no longer want to cooperate, they have a lot of leverage to force significant reform.” The political push by the technology companies opens a third front in their battle against government surveillance, which has escalated with recent revelations about government spying without the companies’ knowledge. The companies have also been making technical changes to try to thwart spying and have been waging a public-relations campaign to convince users that they are protecting their privacy. “People won’t use technology they don’t trust,” Brad Smith, Microsoft’s general counsel, said in a statement. “Governments have put this trust at risk, and governments need to help restore it.” Apple, Yahoo, Facebook, Twitter, AOL and LinkedIn joined Google and Microsoft in saying that they believed in governments’ right to protect their citizens. But, they said, the spying revelations that began last summer with leaks of National Security Agency materials by Edward J. Snowden showed that “the balance in many countries has tipped too far in favor of the state and away from the rights of the individual.” The Obama administration has already begun a review of N.S.A. procedures in reaction to public outrage. The results of that review could be presented to the White House as soon as this week. “Having done an independent review and brought in a whole bunch of folks — civil libertarians and lawyers and others — to examine what’s being done, I’ll be proposing some self-restraint on the N.S.A., and you know, to initiate some reforms that can give people more confidence,” Mr. Obama said Thursday on the MSNBC program “Hardball.” While the Internet companies fight to maintain authority over their customers’ data, their business models depend on collecting the same information that the spy agencies want, and they have long cooperated with the government to some extent by handing over data in response to legal requests. The new principles outlined by the companies contain little information and few promises about their own practices, which privacy advocates say contribute to the government’s desire to tap into the companies’ data systems. “The companies are placing their users at risk by collecting and retaining so much information,” said Marc Rotenberg, president and executive director of the Electronic Privacy Information Center, a nonprofit research and advocacy organization. “As long as this much personal data is collected and kept by these companies, they are always going to be the target of government collection efforts.” For instance, Internet companies store email messages, search queries, payment details and other personal Each disclosure risks alienating users, and foreign governments are considering laws that would discourage their citizens from using services from American Internet companies. The cloud computing industry could lose $180 billion, or a quarter of its revenue, by 2016, according to Forrester Research. Telecom companies, which were not included in the proposal to Congress, have had a closer working relationship with information to provide online services and show personalized ads. They are trying to blunt the spying revelations’ effects on their businesses. the government than the Internet companies, such as longstanding partnerships to hand over customer information. While the Internet companies have published so-called transparency reports about government requests, for example, the telecoms have not. “For the phone companies,” said Tim Wu, a professor at Columbia studying the Internet and the law, “help with federal spying is a longstanding tradition with roots in the Cold War. It’s another area where there’s a split between old tech and new tech — the latter taking a much more libertarian position.” The new surveillance principles, the Internet companies said, should include limiting governments’ authority to collect users’ information, setting up a legal system of oversight and accountability for that authority, allowing the companies to publish the number and nature of the demands for data, ensuring that users’ online data can be stored in different countries and establishing a framework to govern data requests between countries. In a statement, Larry Page, Google’s co-founder and chief executive, criticized governments for the “apparent wholesale collection of data, in secret and without independent oversight.” He added, “It’s time for reform and we urge the U.S. government to lead the way.” In their open letter, the companies maintain they are fighting for their customers’ privacy. “We are focused on keeping users’ data secure,” the letter said, “deploying the latest encryption technology to prevent unauthorized surveillance on our networks, and by pushing back on government requests to ensure that they are legal and reasonable in scope.” The global principles outlined by the companies make no specific mention of any country and call on “the world’s governments to address the practices and laws regulating government surveillance of individuals and access to their information.” But the open letter to American officials specifically cites the United States Constitution as the guidepost for new restrictions on government surveillance. Chief among the companies’ proposals is a demand to write “sensible limitations” on the ability of government agencies to compel Internet companies to disclose user data, forbidding the wholesale vacuuming of user information. “Governments should limit surveillance to specific known users for lawful purposes, and should not undertake bulk data collection of Internet communications,” the companies said. Digital surveillance hurts the cloud computing industry Kuehner-Hebert ’15 [Katie, is a freelance writer based in California. She has more than two decades of journalism experience and expertise in financial writing, “U.S. Digital Surveillance Hurting Tech Sector”, June 10, 2015] The economic impact of digital surveillance practices on the U.S. technology sector will likely far exceed $35 billion as the government continues to fail to strengthen information security, a coalition of tech companies warn in a new report. The Information Technology and Innovation Foundation, funded by Intel, Microsoft, and others, estimated in 2013 that even a modest drop in the expected foreign market share caused by concerns about U.S. surveillance could cost domestic cloud computing companies between $21.5 billion and $35 billion by 2016. “Since then, it has become clear that the U.S. tech industry as a whole, not just the cloud computing sector, has underperformed as a result” of the revelations of National Security Agency whistleblower Edward Snowden, ITIF said in a report released Tuesday. “Therefore, the economic impact of U.S. surveillance practices will likely far exceed ITIF’s initial $35 billion estimate,” it concluded. The report faults U.S. lawmakers for fanning “the flames of discontent by championing weak information security practices.” Other countries are now implementing protectionist policies specifically targeting information technology, using anger over U.S. government surveillance as a cover, ITIF contends. “The combined result is a set of policies both at home and abroad that sacrifices robust competitiveness of the U.S. tech sector for vague and unconvincing promises of improved national security,” the group wrote. Fusion Centers, using a technology known as SAS Memex, collects and manages data taken from private businesses. Beau Hodai, 6-26-2015, "The Homeland Security Apparatus: Fusion Centers, Data Mining and Private Sector Partners," PR Watch, http://www.prwatch.org/news/2013/05/12122/homelandsecurity-apparatus-fusion-centers-data-mining-and-private-sector-partner None of this activity-- let alone the bulk of Dowhan's use of social media and other means in the tracking of activists-- falls under Harrison's definition of appropriate, public safety-related, activist social media monitoring. Nevertheless, records obtained by DBA/CMD show that Dowhan's, and ACTIC's, ability to troll Internet social media for "open source intelligence" took a massive leap forward in mid 2012. According to records obtained from AZDOHS, PPD expended $606,890.35 out of the $1,016,897 "ACTIC Intelligence Analyst Project" SHGP funding in the purchase and installation of intelligence/investigation management software. According to AZDOHS Assistant Director of Planning and Preparedness Lisa Hansen, this funding was used to purchase a SAS Memex Intelligence Center module. Records obtained by DBA/CMD reference this system as being an "SAS Fusion Center Solution" (which is described as including an "SAS Confidential Informant Management Module"). According to these records, PPDHDB likely commenced installation of this analytical software provide intelligence management and acquisition services to fusion centers Memex products are described as being software and hardware products utilized in the collection and management of intelligence data private businesses system provides automated intelligence collection and system in ACTIC in July of 2012. The SAS Memex Intelligence Center is produced by the North Carolina-based firm SAS Institute, Inc., which purchased United Kingdom-based "intelligence management solutions" software developer Memex in June of 2010. SAS/Memex purports to more than one dozen . According to U.S. Patent and Trademark Office records associated with SAS/Memex technologies, by military, law enforcement and SAS Memex Intelligence Center (or "SAS Fusion Center Solution") is vague at best, it is clear that the . Map of fusion centersWhile available information relating to the specific functions of the collation services to intelligence analysts by combining (or "fusing") data gleaned from both "open source" intelligence streams and traditional intelligence sources (such as confidential informants), along with information contained in state databases (such as criminal and motor vehicle licensing/registration records), into "actionable intelligence." Through so called “public-private” partnerships, forced through legislative actions and executive orders, Fusion Centers ‘partner’ with private corporations to constantly monitor their information. Beau Hodai, 6-26-2015, "The Homeland Security Apparatus: Fusion Centers, Data Mining and Private Sector Partners," PR Watch, http://www.prwatch.org/news/2013/05/12122/homelandsecurity-apparatus-fusion-centers-data-mining-and-private-sector-partner mandated through a series of federal legislative actions and presidential executive orders, fusion centers work with private corporations with the stated aim of protecting items deemed to be "critical infrastructure/key resources" from "all hazards/all crimes." Homeland Security Presidential Directive 7 calling for "critical infrastructure identification, prioritization and protection." protection of "critical infrastructure" through public-private partnerships Furthermore, as has been (and the "counter terrorism" entities that they are comprised of) -- in ever closer proximity-- , Public-Private Intelligence Sharing Partnerships On December 17, 2003, then-President W. Bush issued (HSPD-7), HSPD-7 reinforced two previously introduced directives: the (as called for through a section of the "U.S.A. Patriot Act of 2001" entitled "Critical Infrastructure Act of 2001"), and the assessment and protection of "key resources" by U.S. DHS (as called for through the "Homeland Security Act of 2002"). As defined by the "U.S.A. Patriot Act of 2001," items of "critical infrastructure" are defined as: "systems and assets, whether physical or virtual, so vital to the United States that the incapacity or destruction of such systems and assets would have a debilitating impact on security, national economic security, national public health or safety, or any combination of those matters." As defined by the "Homeland Security Act of 2002," "key resources" are defined as: "publicly or privately controlled resources essential to the minimal operations of the economy and government." As stated in HSPD-7, it is a matter of national policy to protect the nation's critical infrastructure and key resources from "terrorist acts" that could-- in addition to causing general disruption of services, national governmental/economic collapse and loss of life-- "undermine the public's morale and confidence in our national economic and political institutions." As such, Bush mandated that U.S. DHS, and other federal agencies, would work closely with members of the private sector, along with state and local governments, in an array of initiatives intended to identify and prioritize the protection of "critical infrastructure and key resources." An example of such prioritization resultant from HSPD-7 is the National Infrastructure Protection Plan (NIPP), a plan issued by U.S. DHS that relies heavily on public-private intelligence sharing partnerships. NIPP is also used as a metric in determining amounts of U.S. DHS funding to certain public-private intelligence sharing partnerships active in fusion centers nationwide. The Economic Impact to the Tech Sector, and specifically Cloud Computing companies, expects to greatly exceed $35 billion by 2016, due to bulk surveillance. Katie Kuehner-Hebert, 6-10-2015, "U.S. Digital Surveillance Hurts Tech Sector," CFO, http://ww2.cfo.com/information-security-risk-management/2015/06/u-s-digital-surveillancehurting-tech-sector/ he economic impact of digital surveillance practices on the U.S. technology sector far exceed $35 billion coalition of tech companies estimated in 2013 cost domestic cloud computing companies between $21.5 billion and $35 billion by 2016. “Since then, it has become clear that the U.S. tech industry as a whole, not just the cloud computing sector, has underperformed as a result” the economic impact of U.S. surveillance practices will likely far exceed ITIF’s initial $35 billion estimate, T will likely as the government continues to fail to strengthen information security, a by Intel, Microsoft, and others, warn in a new report. The Information Technology and Innovation Foundation, funded that even a modest drop in the expected foreign market share caused by concerns about U.S. surveillance could of the revelations of National Security Agency whistleblower Edward Snowden, ITIF said in a report released Tuesday. “Therefore, ” it concluded. The report faults U.S. lawmakers for fanning “the flames of discontent by championing weak information security practices.” Other countries are now implementing protectionist policies specifically targeting information technology, using anger over U.S. government surveillance as a cover, ITIF contends. “The combined result is a set of policies both at home and abroad that sacrifices robust competitiveness of the U.S. tech sector for vague and unconvincing promises of improved national security,” the group wrote. According to The Wall Street Journal, Snowden’s revelations have led to “a marketing bonanza for European software and service providers looking to compete with hard-charging U.S. rivals” such as Amazon and Microsoft. “We’ve opened floodgates to huge loss because we haven’t changed anything about U.S. surveillance policy,” Daniel Castro, vice president of ITIF, told the WSJ. ITIF recommends, among other things, that U.S. policymakers increase transparency about U.S. surveillance activities both at home and abroad, strengthen information security by opposing any government efforts to weaken encryption, and work to establish international legal standards for government access to data. “When historians write about this period in U.S. history it could very well be that one of the themes will be how the United States lost its global technology leadership to other nations,” the report warns. Warming Ext. Impacts Even 1% risk of our impact means you vote affirmative – the impacts are already accelerating Strom 7, Prof. Emeritus Planetary Sciences @ U. Arizona and Former Dir. Space Imagery Center of NASA (Robert, , “Hot House: Global Climate Change and the Human Condition”, Online: SpringerLink, p. 246) Keep in mind that the current consequences of global warming discussed in previous chapters are the result of a global average temperature increase of only 0.5 'C above the 1951-1980 average, and these consequences are beginning to accelerate. Think about what is in store for us when the average global temperature is 1 °C higher than today. That is already in the pipeline, and there is nothing we can do to prevent it. We can only plan strategies for dealing with the expected consequences, and reduce our greenhouse gas emissions by about 60% as soon as possible to ensure that we don't experience even higher temperatures. There is also the danger of eventually triggering an abrupt climate change that would accelerate global warming to a catastrophic level in a short period of time. If that were to happen we would not stand a chance. Even if that possibility had only a 1% chance of occurring, the consequences are so dire that it would be insane not to act. Clearly we cannot afford to delay taking action by waiting for additional research to more clearly define what awaits us. The time for action is now. Solvency Growth will radically increase adaptive capacity - their studies discount it produces huge over-estimates of warming impacts Goklany 11 [Indur M. , science and technology policy analyst and Assistant Director of PROGRAMS , Science and Technology Policy for the United States Department of the Interior; was associated with the Intergovernmental Panel on Climate Change off and on for 20 years as an author, expert reviewer and U.S. delegate, December 2011, "Misled on Climate Change: How the UN IPCC (and others) Exaggerate the Impacts of Global Warming," online:http://goklany.org/library/Reason20CC20and20Development202011.pdf] In other words, the countries that are today poorer will be extremely wealthy (by today’s standards) and their adaptive capacity should be correspondingly higher. Indeed, their adaptive capacity should on average far exceed the U.S.’s today. So, although claims that poorer countries will be unable to cope with future climate change may have been true for the world of 1990 (the base year), they are simply inconsistent with the assumptions built into the IPCC scenarios and the Stern Review’s own (exaggerated) analysis.¶ If the world of 2100 is as rich—and warm—as the more extreme scenarios suppose, the problems of poverty that warming would exacerbate (i.e. low agricultural productivity, hunger, malnutrition, malaria and other vector-borne diseases) ought to be reduced, if not eliminated, by 2100. Research shows that deaths from malaria and other vector-borne diseases is “cut down to insignificant numbers” when a society’s annual per capita income reaches about $3,100. 23 Therefore, even under the poorest scenario (A2), developing countries should be free of malaria well before 2100, even assuming no technological change in the interim. ¶ Similarly, if the average net GDP per capita in 2100 for developing countries is between $10,000 and $62,000, and technologies become more cost-effective as they have been doing over the past several centuries, then their farmers would be able to afford technologies that are unaffordable today (e.g., precision agriculture) as well as new technologies that should come on line by then (e.g., droughtresistant seeds). 24 But, since impact assessments generally fail to fully account for increases in economic development and technological change, they substantially overestimate future net damages from global warming. Their studies don’t assume accelerating technological change as a result of growth—-that artificially inflates their impact Goklany 11 [Indur M. , science and technology policy analyst and Assistant Director of PROGRAMS , Science and Technology Policy for the United States Department of the Interior; was associated with the Intergovernmental Panel on Climate Change off and on for 20 years as an author, expert reviewer and U.S. delegate, December 2011, "Misled on Climate Change: How the UN IPCC (and others) Exaggerate the Impacts of Global Warming," online:http://goklany.org/library/Reason20CC20and20Development202011.pdf] The second major reason why future adaptive capacity has been underestimated (and the impacts of global warming systematically overestimated) is that few impact studies consider secular technological change. 25 Most assume that no new technologies will come on line, although some do assume greater adoption of existing technologies with higher GDP per capita and, much less frequently, a modest generic improvement in productivity. 26 Such an assumption may have been appropriate during the Medieval Warm Period, when the pace of technological change was slow, but nowadays technological change is fast (as indicated in Figures 1 through 5) and, arguably, accelerating. 27 It is unlikely that we will see a halt to technological change unless so-called precautionary policies are instituted that count the costs of technology but ignore its benefits, as some governments have already done for genetically modified crops and various pesticides.28 This means their evidence vastly overestimate the impacts of warming Goklany 11 [Indur M. , science and technology policy analyst and Assistant Director of PROGRAMS, Science and Technology Policy for the United States Department of the Interior; was associated with the Intergovernmental Panel on Climate Change off and on for 20 years as an author, expert reviewer and U.S. delegate, December 2011, "Misled on Climate Change: How the UN IPCC (and others) Exaggerate the Impacts of Global Warming," online:http://goklany.org/library/Reason20CC20and20Development202011.pdf] **We disagree with the author’s use of gendered language So how much of a difference in impact would consideration of both economic development and technological change have made? If impacts were to be estimated for five or so years into the future, ignoring changes in adaptive capacity between now and then probably would not be fatal because neither economic development nor technological change would likely advance substantially during that period. However, the time horizon of climate change impact assessments is often on the order of 35–100 years or more. The Fast Track Assessments use a base year of 1990 to estimate impacts for 2025, 2055 and 2085. 39 The Stern Review’s time horizon extends to 2100– 2200 and beyond. 40 Over such periods one ought to expect substantial advances in adaptive capacity due to increases in economic development, technological change and human capital. As already noted, retrospective assessments indicate that over the span of a few decades, changes in economic development and technologies can substantially reduce, if not eliminate, adverse environmental impacts and improve human well-being, as measured by a variety of objective indicators. 41 Thus, not fully accounting for changes in the level of economic development and secular technological change would understate future adaptive capacity, which then could overstate impacts by one or more orders of magnitude if the time horizon is several decades into the future. Growth means even the poorest countries can successfully adapt to the IPCC’s warmest scenario Goklany 11 [Indur M. , science and technology policy analyst and Assistant Director of PROGRAMS , Science and Technology Policy for the United States Department of the Interior; was associated with the Intergovernmental Panel on Climate Change off and on for 20 years as an author, expert reviewer and U.S. delegate, December 2011, "Misled on Climate Change: How the UN IPCC (and others) Exaggerate the Impacts of Global Warming," online:http://goklany.org/library/Reason20CC20and20Development202011.pdf] **We disagree with the author’s use of gendered language It is often argued that unless greenhouse gases are reduced forthwith, the resulting GW could have severe, if not catastrophic, consequences for people in poor countries because they lack the economic and human resources to cope with GW’s consequences. But there are two major problems with this argument. First, although poor countries’ adaptive capacity is low today, it does not follow that their ability to cope will be low forever. In fact, under the IPCC’s warmest scenario, which would increase globally averaged temperature by 4°C relative to 1990, net GDP per capita in poor countries (that is, after accounting for losses due to climate change per the Stern Review’s exaggerated estimates) will be double the U.S.’s 2006 level in 2100, and triple that in 2200. Thus developing countries should in the future be able to cope with climate change substantially better than the U.S. does today. But these advances in adaptive capacity, which are virtually ignored by most assessments of the impacts and damages from global warming, are the inevitable consequence of the assumptions built into the IPCC’s emissions scenarios.¶ Hence the notion that countries that are currently poor will be unable to cope with GW does not square with the basic assumptions that underpin the magnitude of emissions, global warming and its projected impacts under the IPCC scenarios. Disease Ext. Impacts We are entering an era of global diseases that will kill humans and destroy biodiversity Kock 13 – R. A. Kock of the Department of Pathology and Pathobiology, Royal Veterinary College, Hawkshead Lane Hatfield, UK (23 October 2013, "Will the damage be done before we feel the heat? Infectious disease emergence,” Cambridge University Press 2013 Animal Health Research Reviews 14(2); 127–132, ISSN 1466-2523, doi:10.1017/S1466252313000108, ADL) This initial progress in resolving age-old infectious disease problems might well turn out to be a false dawn. If we take a broader view on disease at the ecosystem level, rather than human infection alone, the There are a growing number of diseases at the interface between humans, animals and the environment (including plants), which are having a significant impact on human wellbeing, mostly through food systems. For example, the USA has suffered a series of highly significant and costly disease epidemics in the last decade West Nile Virus (WNV) in New York situation is not looking so promising. City, which subsequently spread to all 48 States of the continental USA, caused mortalities and sickness in a wide range of domestic animals, wild birds and people (Kilpatrick, 2011). Although the costs are still showed how rapidly such disease events can occur and there was nothing that could be done to stop the epidemic. This was followed shortly after by another epidemic disease coined ‘white nose syndrome’ affecting bats (Blehert et al., 2009). This is caused by a being calculated, WNV fungus Geomyces destructans, most probably introduced by travelers and cavers (Warnecke et al., 2012), which, to date, has killed an estimated 6.5 million bats. The consequences are a conservation crisis and a a global insidious spread of a fungal disease of amphibians is resulting in an unexpected and ‘premature’ extinction crisis, long before multi-billion dollar cost to the agricultural industry from lost predation on agricultural pests, a significant ecosystem service provided by bats (Boyles et al., 2011). Similarly, the planet heats up (Berger et al., 1998; Rosenblum et al., 2010). Over a third of amphibian species are expected to disappear in the coming years but these extinctions are not only a result of this disease (Heard et These taxa have provided significant unappreciated benefits to humanity through the control of mosquitos and other vectors of serious infectious diseases. Moreover, if this is not enough, there are numerous tree al., 2011). diseases that are spreading globally, some fungal and others insect-based, which are devastating woodlands and individual tree species populations in North America and Europe with wide spread economic the rapid increase in transportation networks and frequency of human and animal movements by air and sea, a consequence of free market capitalism and globalization, has created a ‘perfect storm’ for infectious disease emergence across ecosystems (Brown, 2004). It is rather like humans picking up Pandora’s box, giving it a thorough shake, and then sending its contents to every corner of the earth. A massive experiment in human-assisted pathogen evolution and spread, gives every advantage to the microorganisms to gain access to immunologically naive hosts and for them to gain dominance over larger organisms, the latter too sluggish in their ability to respond immunologically and adapt. This physical reassortment and distribution of current pathogens alone could drive an era of plague and pestilence affecting most biological taxa. Unfortunately the story does not stop here, human engineering of landscapes and biological systems are associated with pathogen evolution and disease emergence at the interface, but almost without exception the drivers are poorly researched (Jones et al., 2013). These events are not all new but we are only just beginning to appreciate the extent of our influence on their occurrence. Wolfe et al., 2007 elegantly described how several consequences. It seems major human diseases, including smallpox, malaria, campylobacteriosis, rotavirus, measles, diphtheria, mumps, HIV-AIDS and influenza virus, are derived from our domestication of animals and/or harvesting of wild animals over the millennia. These diseases became firmly established in humans, no longer driven or dependent on zoonotic cycles. This is on top of approximately 900 zoonotic infections recorded; of which about 292 are significant pathogens, most associated with domestic animals but many originating from wildlife, sometimes directly (e.g. Ebola virus) (Cleaveland et al., 2001). It seems that this process is The trend in zoonotic disease emergence correlates with the expansion of domestic animal populations in parallel to that of human growth. This has fundamentally altered the epidemiological environment. Paradoxically, increasing animal production for human use, through industrialization of crop and animal agriculture, has resulted in an increasing opportunity for pathogen evolution (Arzt et al., 2010; Jones et al., 2013). These larger epidemiological units of plants and animals, with considerable homogeneity, when densely packed (ironically for reasons of biosecurity and production efficiency) are perfect pathogen factories. The recent ‘bird flu’ panzootic is an example of this. The emergence of the atypical, highly accelerating, with the majority (75%) of emerging human pathogens being zoonotic (Taylor et al., 2001). pathogenic influenza virus H5N1 was coincident with a massive expansion of the duck and poultry industry in South East Asia. Water birds are natural hosts of avian influenza viruses and are highly tolerant of infection (Alexander, 2007). However, the growth in domestic duck farms including exploitation of semidomestic ducks in close proximity to both wild bird populations and densely packed chicken farms, created an opportunity for the rapid evolution of this highly virulent strain of avian influenza, its amplification and spread. H5N1 was first isolated in 1997 (Xu et al., 1999) with epidemics recorded in Hong Kong in 1998 and with a significant wild bird epidemic between 2005 and 2007 (Chen et al., 2006). The infection spread rapidly across Eurasia between poultry systems and as far as Egypt (Abdelwhab and Hafez, 2011) and Nigeria (Newman et al., 2008). Wild bird cases reported appear to be mostly during epidemics or spillover cases from poultry epidemics (Feare and Yasue´, 2006; Lebarbenchon et al., 2010; Soliman et al., 2012), and wild bird epidemics appear to have been largely independent of domestic bird disease. The infections burned out in wildlife with no evidence of a long-term reservoir and only rare cases based on circumstantial evidence of spillover from wild birds to poultry (Hars et al., 2008), predators (Desvaux et al., 2009; Globig et al., 2009) and humans (bird hunters) (Newman et al., 2008). fear has been that should this virus, which rarely infects humans, evolve into a form that is highly The great transmissible among humans, it will then cause a severe pandemic. Whilst the immediate threat has subsided, with apparent resilience in the wild bird populations to H5N1 increasing (Siembieda et al., 2010) and with mass vaccination and slaughter of poultry providing temporary relief, endemic foci in domestic birds still persist. This strain of virus has been recently joined by a new, more sinister low pathogenic strain (in poultry) of H7N9, which is lethal in humans and can be transmitted more readily between humans than was the case with H5N1. The main reason for failure to stop the emergence of these diseases is the continued expansion of agroecological systems and industry, which cause the problem in the first place. It is not always necessary to have a farm for these spillover events, other concentrations of mixed animal species in e.g. food markets has led to emergence, exemplified by the SARS epidemic. Here a bat virus was involved, most probably spilling into a market and replicating in (probably) a number of species, adapting and amplifying until it was established in humans and an epidemic ensued. Globally, the virus infected approximately 8000 people and caused several hundred deaths. The remarkable fact is that this pathogen jump probably only took a period of 2–3 years (Wang et al., 2005; Zhao, 2007; Tang et al., 2009). Another important driver of disease at the interface has been changing landscapes, with increasing incursion into and modification of diverse habitats for settlement and exploitation of resources. An example is the creation of new vector niche habitats, mostly through urban development (Globig et al., 2009) enabling persistence and emergence of significant problems e.g. dengue fever virus; once only found in primates (Mackenzie et al., 2004). HIV is the most famous example, where frequent spillover of SIV to humans through their exploitation of chimpanzee and gorilla for food, resulted in the establishment of human infection and adaptation of the virus (Gao et al., 1999). However, it was not until road networks were put into the Congo basin that the epidemic really took hold. There were probably a series of stuttering epidemics until the virus entered the urban environment and then the world. It is sobering to note that the African mortality statistics (WHO, 2012) indicate that, far from following the pattern in the Western world, the life expectancy from birth in two of the richest nations, South Africa and Botswana, has significantly decreased between 1990 and 2010; and this was from the impact of only one emerging disease, HIV–AIDS. What if we have ten novel diseases occurring simultaneously? Disease has played a role in every state collapse in history – pandemics go nuclear Morris, professor of history at Stanford University, 3/22/2013 (Ian, “The Measure of Civilization: How Social Development Decides the Fate of Nations,” Carnegie Council, Lexis) When we look back at history This is always in the mix previously separate disease pools merge Epidemic diseases lead to state failure Governments cannot cope with catastrophe on this scale The collapse of the governments tends to breakdown in trade There are several periods when we get discontinuities, when we get collapses in social development scores. You can see several very clear examples on this graph. the when we get these great collapses in social development, every time we see the same five forces involved: Mass migrations that the societies of the day cannot cope with. lead to huge epidemic diseases, as get of what happens . The mass migrations often d. regularly killing half the population, it would seem, tend to . . lead to long-distance . Famines ensue, many, many more people die. And then, always there in the mix in some way, although it varies in every case, is climate change. It always plays into this. Now, I'm sure you don't need me to tell you these are forces that plenty of people are talking about as threats we are facing in the early 21st century. It seems to me perfectly possible that the 21st century is the 21st century might be a rerun of what has happened many times before but with one big difference We now have nuclear weapons if we stumble into a collapse we should expect these being used It's quite possible the 21st century will see a disaster that dwarfs anything we have seen going to see another collapse of the kind we have seen so many times in the past. So in some ways it's possible — : people didn't have. The Romans would have loved nuclear weapons. Luckily, they didn't have them. I think seriously there is a possibility of , which ancient do on the scale that I'm talking about here, . that earlier. Pandemics cause global civil wars – regression analysis proves Letendre, Fincher, Department of Biology at the University of New Mexico, and Thornhill, Department of Computer Science at the University of New Mexico, 2010 (Kenneth, Corey, and Randy, “Does infectious disease cause global variation in the frequency of intrastate armed conflict and civil war?,” Biological Reviews, p. 669) armed conflict and civil war is of great interest We present the parasite-stress model of intrastate conflict by linking frequency of civil war to the intensity of infectious disease across countries High intensity of infectious disease leads to the emergence of xenophobic and ethnocentric cultural norms These cultures suffer greater poverty and deprivation Resource competition among xenophobic and ethnocentric groups within a nation leads to increased frequency of civil war with regression analyses We find a direct effect of infectious disease on intrastate armed conflict and the incidence of civil war Geographic and cross-national variation in the frequency of intrastate a subject . Previous theory on this variation has focused on the influence on human behaviour of climate, resource competition, national wealth, and cultural characteristics. , which unites previous work on the correlates of intrastate conflict the outbreak of such conflict, including , of the world. . due to the morbidity and mortality caused by disease, and as a result of decreased investment in public health and welfare. . We present support for the parasite-stress model . , support for support for an indirect effect of infectious disease on the entanglements of feedback of conflict into further reduced wealth and increased incidence of disease, and discuss implications for international warfare and global patterns of wealth and imperialism. via its negative effect on national wealth. We consider Those go nuclear Shehadi, Research Associate at the International Institute for Strategic Studies, 1993 (Kamal, Ethnic Self Determination And the Break Up of States, Dec 1993, p. 81) self-determination conflicts have direct adverse consequences on international security As they tear nuclear states apart the likelihood of nuclear weapons falling into hands willing to use them or trade them to others will reach frightening levels This likelihood increases if a conflict over self-determination escalates into a war between two nuclear states Ethnic conflicts spread within a state and from one state to the next The conflict may also spread by contagion from one country to another This paper has argued that . begin to of individuals or groups , , to the , . The Russian Federation and Ukraine may fight over the Crimea and the Donbass area; and India and Pakistan may fight over Kashmir. . may also both . This can happen in countries where more than one ethnic self-determination conflict is brewing: Russia, India and Ethiopia, for example. if the state is weak politically and militarily and cannot contain the conflict on its doorstep. Lastly, there is a real danger that regional conflicts will erupt over national minorities and borders. Disease Sub Scenario – Economic Decline Drug Resistance costs the world 100 trillion USD and causes extreme suffering The Review on Antimicrobial Resistance, Chaired by Jim O’Neill, Economist, December 2014 The findings in this paper are based on two of the scenarios modeled by RAND¶ Europe and KPMG. Further details of the two studies are set out in the box on the following page and the full papers are available on our website. ¶ The two teams modeled an increase in AMR rates from where they are today, each using their own methodology, to understand the impact this would have on the world population and its economic output. Both studies were hampered by a lack of reliable data, in particular regarding bacterial infections, and as a consequence they most likely underestimate the true cost of AMR.¶ The studies estimate that, under the scenarios described below, 300 million people are expected to die prematurely because of drug resistance over the next 35 years and the world’s GDP will be 2 to 3.5% lower than it otherwise would be in 2050.¶ This means that between now and 2050 the world can expect to lose between¶ 60 and 100 trillion USD worth of economic output if antimicrobial drug resistance is not tackled. This is equivalent to the loss of around one year’s total global output over the period, and will create significant and widespread human suffering.¶ Furthermore, in the nearer term we expect the world’s GDP to be 0.5% smaller by 2020 and 1.4% smaller by 2030 with more than 100 million people having died prematurely.¶ The two studies also show a different economic impact for each of the drug resistant infections they considered. E. coli, malaria and TB are the biggest drivers of the studies’ results. Malaria resistance leads to the greatest numbers of fatalities, while E. coli is the largest detractor from GDP accounting for almost half the total economic impact in RAND’s results. Because malaria and TB vary far more by region than E. coli in the studies, they are the largest drivers of differences between countries and regions. Poverty is the deadliest form of structural violence – it is equivalent to an ongoing nuclear war. Gilligan, ‘96 [James, Former Director of Mental Health for the Massachusetts Prison System, Violence, p.] every fifteen years, on the average, as many people die because of relative poverty as would be killed in a nuclear that caused 232 million deaths; and every single year, two to three times as many people die from poverty throughout the world as were killed by the Nazi genocide of the Jews over a six-year period. This is, in effect, the equivalent of an ongoing, unenending, in fact accelerating, thermonuclear war, or genocide, perpetuated on the weak and poor ever year of every decade, throughout the world. In other words, Disease Sub Scenario – CRE It’s everywhere Reuters 2013 Reuters is a news organization that focuses on international news, “Doctors warned to be vigilant for warn new deadly virus sweeping the globe from Middle East”, 3/8/13, http://www.dailymail.co.uk/news/article-2290033/Doctors-warned-vigilant-warn-new-deadlyvirus-sweeping-globe-Middle-East.html//OF Warnings of the deadly virus come as the CDC announced concerns over an increasing number of infections from a 'nightmare bacteria' found in U.S. hospitals. Public health officials have warned that in a growing number of cases existing antibiotics do not work against the superbug, Carbapenem-Resistant Enterobacteriaceae (CRE). Patients became infected with the bacteria in nearly four per cent of US hospitals and in almost 18 per cent of specialist medical facilities in the first half of 2012, according to the Centers for Disease Control and Prevention (CDC). Dr Tom Frieden, director of the CDC, said in a statement that the strongest antibiotics 'don't work and patients are left with potentially untreatable infections.' He said scientists were 'raising the alarm' over the problem following increasing concern. Increasing numbers of patients in US hospitals have become infected with CRE, which kills up to half of patients who get bloodstream infections from them, according to a new CDC report. Some of the more than 70 types of Enterobacteriaceae bacteria - including E-coli have become gradually resistant over a long period of time, even to so-called, 'last resort drugs' called carbapenem. During the last 10 years, the percentage of Enterobacteriaceae that are resistant to these last-ditch antibiotics rose by 400 percent. One type of CRE has increased by a factor of seven over the last decade, Fox News reports. CRE infections usually affect patients being treated for serious conditions in hospitals, long-term acute-care facilities and nursing homes. Many of these people will use catheters or ventilators as part of their treatment - which are thought to be used by bacteria to enter deep into the patient's body. And it decimates the global population Adams 7/17 Mark Adams (Citing Doctors and the CDC) is a reporter for Naturalnews.com, an online news source specializing in medicine and natural sciences, “Drug-resistant superbug infections explode across U.S. hospitals: 500% increase foreshadows 'new plague' caused by modern medicine”, 7/17/14, Natural News, http://www.naturalnews.com/046041_CRE_superbugs_drugresistant_infections_modern_plague.html#//OF (NaturalNews) Drug-resistant superbug infections have reached near-epidemic levels across U.S. hospitals, with an alarming 500% increase now documented in a study just published in the August issue of Infection Control and Hospital Epidemiology (the journal of the Society for Healthcare Epidemiology of America). (1) Lead author of the study, Dr. Joshua Thaden, warned "This dangerous bacteria is finding its way into healthcare facilities nationwide... A CRE epidemic is fast approaching... Even this marked increase likely underestimates the true scope of the problem given variations in hospital surveillance practices." The study also found that an astonishing 94 percent of CRE infections were caused by healthcare activities or hospital procedures. CRE superbugs explained CRE (carbapenem-resistant Enterobacteriaceae) is an incredibly dangerous superbug causing nearly a fifty percent fatality rate once a patient is infected. The World Health Organization calls it "one of the three greatest threats to human health," and all known antibiotics are useless in treating it. CRE arose out of the systematic abuse of antibiotics by doctors, who inadvertently created the perfect breeding ground for deadly bacteria by using narrowly-targeted chemical medications that lack the kind of full-spectrum action found in nature (in herbs like garlic, for example). Because of their highly-targeted chemical approach, antibiotics encouraged bacteria to develop molecular defenses that resulted in widespread resistance to Big Pharma's drugs. The situation is so bad today that the entire pharmaceutical industry has no drug, no chemicals and no experimental medicines which can kill CRE superbugs. Even worse, there are virtually no new antibiotics drugs in the research pipelines, either. Drug companies have discovered that it's far more profitable to sell "lifestyle management" drugs like statin drugs and blood pressure drugs than to sell antibiotics which treat acute infections. Antibiotics simply aren't very profitable because relatively few people acquire such infections. Meanwhile, everyone can be convinced they might have high cholesterol and therefore need to take a statin drug for life. Drug companies, in other words, have all but abandoned the industry of treating infections. Instead, they now primarily engage in the promotion of disease symptoms while selling drugs that attempt to alter measurable markers of those symptoms such as cholesterol numbers. Even though drug companies caused the superbug pandemic that's now upon us, in other words, they have deliberately abandoned humanity in defending against those superbugs because it's simply not profitable to do so. The end of antibiotics has arrived: Humanity faces a new plague caused by modern medicine The CDC has admitted that we are now living in a "post-antibiotics era." As Infection Control Today states, "Antibiotic resistance is no longer a prediction for the future. It is happening right now in every region of the world and has the potential to affect anyone." (2) Dr. Arjun Srinivasan, associate director at the Centers for Disease Control and Prevention, went even further in a PBS interview, stating: (3) We've reached the end of antibiotics, period... We're here. We're in the post-antibiotic era. There are patients for whom we have no therapy, and we are literally in a position of having a patient in a bed who has an infection, something that five years ago even we could have treated, but now we can't. Keep in mind that doctors refuse to use natural substances to treat infections, which is why they believe no defenses against superbugs exist. Their indoctrination into the world of pharmaceuticals is so deeply embedded in their minds, in other words, that they cannot even conceive of the idea that an herb, a food or something from Mother Nature might provide the answer to superbugs. See this Natural News article on natural antibiotics that kill superbugs. The list includes honey. Hospitals are the perfect breeding grounds for superbugs By their very design, hospitals are prefect breeding grounds for superbugs for six very important reasons: 1) They put all the infected people under one roof, creating a high density infectious environment. 2) They allow doctors and medical staff to quickly and easily carry and transmit infectious diseases to new patients. Previous studies have documented how superbugs easily ride on doctors' ties, for example, or their mobile phones. 3) Medical staff still don't wash their hands as frequently as they should. The intense time demands placed on them discourage careful hand washing, causing many to skip this crucial step between patient visits. 4) Hospitals almost universally refuse to use broad-spectrum antibacterial remedies which are not drugs. Natural substances like honey and garlic show extraordinary multi-faceted antibacterial properties, as do certain metals such as silver and copper. Yet because these substances are not developed by pharmaceutical companies which dominate the field of medical practice, they are simply ignored even though they could save many lives. (And a doctor who prescribes "honey" doesn't sound as amazing and all-knowing as a doctor who prescribes "the latest, greatest laboratory breakthrough patented chemical medication.") 5) Hospital practices suppress human immune function to the point of systemic failure. Rather than boosting immune function, conventional medical treatments such as antibiotics and chemotherapy cause immune system failure. Hospitals lack sunlight and hospital food lacks key immune-boosting minerals such as zinc and selenium. On top of that, most of the drugs prescribed to patients by hospitals deplete key nutrients required for healthy immune function, leaving patients even more susceptible to superbug infections. 6) Hospital staff spread infectious diseases to their private homes. After acquiring an infection at work (at the hospital), staffers easily spread those infections to their own family members at home. The antibiotics plague is upon us We are right now living through the early stages of a global plague caused by modern medicine. The industry that created this plague is utterly defenseless against it, leaving humanity to fight for survival in a world that's now far more dangerous than the one that existed before the invention of antibiotics. Antibiotics have indeed saved millions of lives, and they forever have an important place in any medical practice. Yet their careless use -- combined with medicine's willful and foolish abandonment of natural antibiotics that work far better -- has led humanity down the path of its own destruction. Today, a simple scrape of your arm or leg might now be fatal. Infections that occur during routine medical procedures which would have once been considered minor issues are now deadly. And the worst part is that the bacteria continue to evolve more elaborate defenses against drugs while increasing their transmissibility. Human hospitals (and entire cities) are, by design, ideal pandemic hubs that rapidly spread disease. Like it or not, humanity has created the perfect storm for a pandemic decimation of the global population. AT: Off-Case AT: Politics 2AC – Fusion Centers Unpopular Congressional leaders are strongly opposed to fusion centers and acknowledge their misuse of funds and violation of civil liberties PrivacySOS ’14 [November 18, 2014, “So-called 'counterterror' fusion center in Massachusetts monitored Black Lives Matter protesters”, https://www.privacysos.org/node/1603] There are nearly 100 fusion centers nationwide, and two in Massachusetts. The Commonwealth Fusion Center in Maynard is run by the Massachusetts State Police. The Boston Regional Intelligence Center, also known as the ‘BRIC’, is located at Boston Police Department headquarters in Roxbury and run by the BPD. Both fusion centers were established with funds from the heavily on federal ‘counterterrorism’ grants. Fusion centers have long come under fire from congressional leaders and democracy advocates as being largely wasteful, duplicative of other local/federal counterterrorism efforts, and violative of civil rights and civil liberties. In Boston, the ACLU disclosed internal ‘intelligence files’ showing that BRIC officials used their federally-funded ‘counterterrorism’ infrastructure to monitor peaceful protesters including Veterans for Peace and CODEPINK, labeling them as domestic extremists and homeland security threats. The Boston fusion center even kept track of the political activities of Marty Walsh, currently the city’s mayor. Fusion Department of Homeland Security, and rely center officials in Pennsylvania got caught spying on anti-fracking activists, apparently in league with natural gas companies. An Arkansas fusion center director told the press his spy office doesn’t monitor US citizens, just anti-government groups—however that’s defined. Washington state fusion centers have insinuated that activism is terrorism. There are many, many other examples nationwide of these so-called fusion centers getting caught red handed monitoring protest movements and dissidents, conflating First Amendment protected speech with crime or terrorism. The fusion centers, meanwhile, have never once stopped a terrorist attack. It’s not clear what beyond monitoring dissidents and black people— through so-called ‘gang’ databases—these fusion centers actually do. We here in Boston know one thing for sure: they don’t stop terrorism. Cutting Fusion Centers Has Bipartisan Support Permanent Subcommittee on Investigations ’12 [Investigative Report Criticizes Counterterrorism Reporting, Waste at State & Local Intelligence Fusion Centers US SENATE, October 3, 2012 http://www.hsgac.senate.gov/subcommittees/investigations/media/investigative-report-criticizescounterterrorism-reporting-waste-at-state-and-local-intelligence-fusion-centers] (WASHINGTON, D.C.) – A two-year bipartisan investigation by the U. S. Senate Permanent Subcommittee on Investigations has found that Department of Homeland Security efforts to engage state and local intelligence “fusion centers” has not yielded significant useful information to support federal counterterrorism intelligence efforts. “It’s troubling that the very ‘fusion’ centers that were designed to share information in a post-9/11 world have become part of the problem. Instead of strengthening our counterterrorism efforts, they have too often wasted money and stepped on Americans’ civil liberties,” said Senator Tom Coburn (R), the Subcommittee’s ranking member who initiated the investigation. The investigation determined that senior DHS officials were aware of the problems hampering effective counterterrorism work with the fusion centers, but did not always inform Congress of the issues, nor ensure the problems were fixed in a timely manner. “Unfortunately, DHS has resisted oversight of these centers. The Department opted not to inform Congress or the public of serious problems plaguing its fusion center and broader intelligence efforts. When this Subcommittee requested documents that would help it identify these issues, the Department initially resisted turning them over, arguing that they were protected by privilege, too sensitive to share, were protected by confidentiality agreements, or did not exist at all. The American people deserve better. I hope this report will help generate the reforms that will help keep our country safe,” Dr. Coburn said. ”Fusion centers may provide valuable services in fields other than terrorism, such as contributions to traditional criminal investigations, public safety, or disaster response and recovery efforts,” said Senator Carl Levin (D), Subcommittee chairman. “This investigation focused on the federal return from investing in state and local fusion centers, using the counterterrorism objectives established by law and DHS. The report recommends that Congress clarify the purpose of fusion centers and link their funding to their performance.” The Department of Homeland Security estimates that it has spent somewhere between $289 million and $1.4 billion in public funds to support state and local fusion centers since 2003, broad estimates that differ by over $1 billion. The investigation raises questions about the value this amount of funding and the nation’s more than 70 fusion centers are providing to federal counterterrorism efforts. AT: Terror DA 2AC Fusion Centers Don’t Stop Terrorism Fusion Centers Are Not Equipped To Stop the Next Major Terrorist Attack Sosadmin ‘15 "So-called 'counterterror' Fusion Center in Massachusetts Monitored Black Lives Matter Protesters." So-called 'counterterror' Fusion Center in Massachusetts Monitored Black Lives Matter Protesters. N.p., 28 Nov. 2014. Web. 24 June 2015. Law enforcement officials at the Department of Homeland Security-funded “Commonwealth Fusion Center” spied on the Twitter and Facebook accounts of Black Lives Matter protesters in Boston earlier this week, the Boston Herald reports.¶ The reference to the so-called ‘fusion’ spy center comes at the very end of a news story quoting Boston protesters injured by police in Tuesday night’s demonstrations, which was possibly the largest Ferguson related protest in the country the day after the non-indictment of Darren Wilson was announced.¶ The state police Commonwealth Fusion Center monitored social media, which provided “critical intelligence about protesters’ plans to try to disrupt traffic on state highways,” state police said . There are nearly 100 fusion centers nationwide, and two in Massachusetts. The Commonwealth Fusion Center in Maynard is run by the Massachusetts State Police. The Boston Regional Intelligence Center, also known as the ‘BRIC’, is located at Boston Police Department headquarters in Roxbury and run by the BPD. Both fusion centers were established with funds from the Department of Homeland Security, and rely heavily on federal ‘counterterrorism’ grants.¶ Fusion centers have long come under fire from congressional leaders and democracy advocates as being largely wasteful, duplicative of other local/federal counterterrorism efforts, and violative of civil rights and civil liberties. In Boston, the ACLU disclosed internal ‘intelligence files’ showing that BRIC officials used their federally-funded ‘counterterrorism’ infrastructure to monitor peaceful protesters including Veterans for Peace and CODEPINK, labeling them as domestic extremists and Fusion center officials in Pennsylvania got caught spying on anti-fracking activists, apparently in league with natural gas companies. An Arkansas fusion center director told the press his spy office doesn’t monitor US citizens, just anti-government groups—however that’s defined. Washington state fusion centers have insinuated that activism is terrorism.¶ There are many, many other examples nationwide of these so-called fusion centers getting caught red handed monitoring protest movements and dissidents, conflating First Amendment protected speech with crime or terrorism . The fusion centers, meanwhile, have never once stopped a terrorist attack. It’s not clear what beyond monitoring dissidents and black people—through so-called ‘gang’ databases—these fusion centers actually do. We here in Boston know one thing for sure: they don’t stop terrorism.¶ Some homeland security threats. The Boston fusion center even kept track of the political activities of Marty Walsh, currently the city’s mayor. people might say that ‘counterterrorism’ analysts at the Commonwealth Fusion Center should be monitoring the tweets and Facebook posts of Black Lives Matter activists, if those activists intend to shut down highways.¶ We can agree to disagree about that, but please don’t say these fusion centers are primarily dedicated to stopping terrorism when they are doing things like this. Stopping traffic for a few hours is civil disobedience, not terrorism. A supposed anti-terrorism center has no business monitoring public social media accounts looking for ‘intelligence’ about civic protest movements. AT: Neoliberalism Plan Solves It The Data collection of fusion centers is used to prop up the private sector – means we solve the link Torin Monahan, Associate Professor of Human and Organizational Development and Medicine at Vanderbilt University and member of the International Surveillance Studies Network, 2011 “The Future of Security? Surveillance Operations at Homeland Security Fusion Centers” Social Justice Vol. 37, Nos. 2–3 (2010–2011) Thus, there is also a neoliberal dimension to fusion centers, in that they purchase¶ data from the private sector, sometimes hire private data analysts, and share information¶ with industry partners (Monahan, 2009). By forming information-sharing¶ partnerships, analysts at fusion centers seek to “connect the dots” to prevent future¶ terrorist attacks. Meanwhile, government officials are very interested in figuring¶ out ways in which DHS in general and fusion centers in particular can assist the¶ private sector, presumably by enabling and protecting the ability of companies to¶ profit financially (Monahan, 2010). As DHS Under Secretary Caryn Wagner stated¶ in her 2010 testimony before the House Subcommittee on Homeland Security:¶ I&A [DHS’s Office of Intelligence and Analysis] will continue to advocate¶ for sustained funding for the fusion centers as the linchpin of the evolving¶ homeland security enterprise. While I&A’s support to state, local and tribal¶ partners is steadily improving, there is still work to be done in how best¶ to support the private sector. We intend to explore ways to extend our¶ efforts in this area beyond the established relationships with the critical¶ infrastructure sectors (Wagner, 2010; emphasis added). Fusion centers embrace neoliberal rational Monahan & Palmer 09’, Torin Monahan (Associate Professor of Human & Organizational Development and an Associate Professor of Medicine at Vanderbilt University. His main theoreti- cal interests are in social control and institutional transformations with new technolo- gies), Neal A. Palmer (doctoral student in the Department of Human & Organizational Development at Vanderbilt University), Security Dialoguevol.40 ,no.6, December 2009, The Emerging Politics of DHS Fusion Centers, http://publicsurveillance.com/papers/FC-SD.pdf. PE Fusion centers provide a window into dominant forms and logics of contemporary securitization. They clearly embody an all-hazards orientation that pervades emergencypreparedness discourses and operations today (Lakoff,¶ TorinMonahan&NealA.PalmerThe Emerging Politics of DHS Fusion Centers633¶ 2006) and they develop within – and contribute to – a risk-management approach to policing and governance that seeks to control rather than elimi- nate threats and social problems (Simon, 2006; Wacquant, 2009). Moreover, even as highly secretive organizations, fusion centers embrace neoliberal rationalities of privatization and responsibilization. Public–private partner- ships are key to fusion-center operations, as is the use of private security analysts. Whereas responsibilization is typically theorized in terms of individuals who must consume security products and services not provided by the state (Rose, 1999; Katz, 2006; Monahan, 2009a), in this case it is state and local governments that are burdened with unfunded mandates and concomitant pressures to staff fusion centers even while cutting other social services. One could proffer a generous reading of mission creep by fusion centers and say that these are laudable efforts by state agents and others to make their work relevant to the perceived needs of their communities. Be that as it may, this article suggests that such efforts lend themselves to the violation of civil liberties and privacy, while rendering ambiguous laws and policies governing intelligence operations. Fusion centers are key to a neoliberal agenda Monahan 11’, Torin Monahan (Associate Professor of Human & Organizational Development and an Associate Professor of Medicine at Vanderbilt University. His main theoretical interests are in social control and institutional transformations with new technologies), The Future of Security? Surveillance Operations at Homeland Security Fusion Centers, Social Justice Vol. 37, Nos. 2–3 (2010–2011), http://www.socialjusticejournal.org/archive/120_37_2-3/120_07Monahan.pdf. PE Thus, there is also a neoliberal dimension to fusion centers, in that they purchase data from the private sector, sometimes hire private data analysts, and share information with industry partners (Monahan, 2009). By forming information-sharing partnerships, analysts at fusion centers seek to “connect the dots” to prevent future terrorist attacks. Meanwhile, government officials are very interested in figuring out ways in which DHS in general and fusion centers in particular can assist the private sector, presumably by enabling and protecting the ability of companies to profit financially (Monahan, 2010). As DHS Under Secretary Caryn Wagner stated in her 2010 testimony before the House Subcommittee on Homeland Security: ¶ I&A [DHS’s Office of Intelligence and Analysis] will continue to advocate for sustained funding for the fusion centers as the linchpin of the evolving homeland security enterprise. While I&A’s support to state, local and tribal partners is steadily improving, there is still work to be done in how best to support the private sector. We intend to explore ways to extend our efforts in this area beyond the established relationships with the critical infrastructure sectors (Wagner, 2010; emphasis added).