Aff Workplace Raids 1AC 1AC – Labor Rights Worker exploitation is rampant in the status quo and existing agencies are insufficient Chen 12--Associate Professor, University of Colorado Law School [Ming Hsu, Where You Stand Depends on Where You Sit: Bureaucratic Incorporation of Immigrants in Federal Workplace Agencies (March 9, 2012). Berkeley Journal of Employment and Labor Law, 2012; U of Colorado Law Legal Studies Research Paper No. 12-03. http://ssrn.com/abstract=2019181 or http://dx.doi.org/10.2139/ssrn.2019181] Few would dispute that the legal and political climate for immigrant workers, especially undocumented workers, has been forbidding over the last decade. Immigrant workers have always been vulnerable to workplace abuse, but ever since the passage of the Immigration Reform and Control Act of 1986 (IRCA) the workplace has become a site of contention and fear. The Supreme Court’s landmark Hoffman Plastic v. NLRB decision in 2002 interpreted the employer sanctions provision of IRCA to limit remedies for undocumented workers subjected to unlawful discharge for reporting workplace abuses. The combined effect of Hoffman and IRCA was to create perverse economic incentives for employers to exploit immigrant workers suspected of lacking status and to dim the prospects for immigrant workers to challenge those abuses. The Department of Homeland Security’s (DHS) aggressive use of workplace raids as a strategy for immigration control—first under President Bush and continuing under President Obama, albeit to a lesser extent—has exacerbated the situation, making credible employer threats to expose the status of their immigrant workers lacking documentation in retaliation for those workers’ complaints.14 Tasked with enforcing employment laws in a climate entangling immigration control with employment, workplace agencies have been caught in the crossfire: their statutory mandate to protect workers remains intact, while the political and legal context blunts their tools to implement that mandate. Each of the federal agencies discussed in this Article has struggled to reconcile the competing demands of their professional ethos with aggressive immigration enforcement and with contracting immigrants’ rights. Abhorrent labor rights for unauthorized workers hurt global and national wage and work standards. Braker 12—Columbia Law School [‘Julie. "Navigating the Relationship between the DHS and the DOL: The Need for Federal Legislation to Protect Immigration Workers' Rights." Colum. JL & Soc. Probs. 46 (2012): 329]RMT Labor rights are critically important to the advancement of international human rights, as well as to the development of workplace standards for all workers. The Universal Declaration of Human Rights, adopted by the United Nations General Assembly in 1948, enumerates the following as fundamental human rights: (1) [T]he right to work, to free choice of employment, to just and favourable conditions of work and . . . [T]he right to equal pay for equal work. (3) . . . [T]he right to just and favourable remuneration ensuring for himself and his family an existence worthy of human dignity. (4) . . . [T]he right to form and to join trade unions for the protection of his interests. 28 to protection against unemployment. ( 2) The International Covenant on Economic, Social and Cultural Rights, to which 160 countries are parties,29 also enumerates labor rights.30 Labor rights for all workers, authorized or unauthorized, are also important because the wages and conditions of all workers are interconnected . As Professor Lori Nessel explains, “Excluding the undocumented from labor and employment protection statutes allows employers to exploit undocumented workers with impunity and has a chilling effect upon the rights of all workers.” 31 Further, the Supreme Court has acknowledged that “ acceptance by illegal aliens of jobs on substandard terms as to wages and working conditions can seriously depress wage scales and working conditions of citizens and legally admitted aliens ; and employment of illegal aliens under such conditions can diminish the effectiveness of labor unions .”32 Thus, labor rights are important both as a source of individual rights and of workplace standards. Before discussing how immigration enforcement can interfere with employment rights, specifically those of unauthorized workers, it is important to identify what employment rights these workers have. To fully address this complex, contested issue would require an analysis beyond the scope of this Note.33 However, some employment rights have been unequivocally held to apply to all workers. Generally, immigration status will not affect an employee’s rights to the wage and hour protections of the Fair Labor Standards Act (FLSA),34 and the right to organize and participate in a union, as provided by the National Labor Relations Act (NLRA).35 Thus, this Note proceeds by acknowledging that it cannot fully address the exact rights of unauthorized workers, but that all workers are entitled to certain labor and employment rights under the FLSA and NLRA. Labor rights for immigrants are intertwined with labor rights for domestic workers Read 6—General Counsel of Friends of Farmworkers, Inc. in Pennsylvania since 1982. He has a J.D. from New York University School of Law in 1976.[Arthur, “PROTECTING WORKER RIGHTS IN THE CONTEXT OF IMMIGRATION REFORM” Journal of Law and Social Change, Volume 9,https://www.law.upenn.edu/journals/jlasc/articles/volume9/issue1/Read9U.Pa.J.L.%26Soc. Change65(2006).pdf]RMT When the rights of undocumented and migrant2 workers are not protected, the rights of all workers are diminished . Unscrupulous employers seek out undocumented immigrants or temporary workers because they believe that there are no consequences for violating their rights. These employers gain a competitive advantage over employers who abide by the law. This creates a perverse incentive for employers to hire undocumented workers over citizens or authorized workers. The position of citizen and authorized workers is weakened when they confront abuse or discrimination because their undocumented coworkers have fewer legal avenues for redress of labor violations, including unlawful retaliation, and therefore they have far less incentive to participate in efforts to improve conditions. My views on this issue are guided by historical, economic, and sociological reading on the impact of new immigrant, migrant, and other foreign-born workers on the terms and conditions of employment for more established immigrant communities. However, most importantly, my perspective is shaped by the practical experience of over 30 years of legal advocacy for worker rights and, in particular, for immigrant worker rights.3 This experience includes legal work relating to two principal temporary worker Frograms: the H-2A program for temporary agricultural workers and the H-2B program for temporary non-agricultural workers. 5 Higher wages lead to increased remittances - several statistical models prove. Thomas Joseph, Yaw Nyarko, and Shing-Yi Wang 2015, Thomas Joseph is a professor of Business Policy and Strategy at IIM Udaipur, (Ph.D) in Corporate Strategy and Policy (2008) - Indian Institute of Management,Bangalore, Yaw Nyarko is a Professor of Economics, CoDirector of the Development Research Institute, received his Ph.D. from Cornell University, Shing-Yi Wang is an Assistant Professor of Business Economics and Public Policy at Wharton. She is also an affiliate of the Bureau for Research and Economic Analysis of Development (BREAD) and a research fellow at the National Bureau of Economic Research (NBER). She received her Ph.D. in economics from Yale University, Wharton, “Information and Remittances: Evidence from Matched Administrative Data,” http://assets.wharton.upenn.edu/~was/wage_remitV6.pdf We begin by examining whether remittances vary with fluctuations in earnings. More specifically, we estimate the relationship between the logarithm of individuals’ earnings and the logarithm of the amount that they sent in remittances. The relationship presented here is not necessarily the causal impact of fluctuations in earnings on remittance patterns. For example, individuals may choose to exert more effort, work more hours and receive higher earnings in months where they want to remit more to their families.21 The results in this section provide the statistical relationship between earnings and remittances whereas the subsequent analyses provide better identified estimates of the causal relationship between earnings and remittances. The results are presented in Table 2. All the regressions include individual fixed effects, and year fixed effects. The standard errors are clustered at the individual level.22 For each estimate, we present a parsimonious specification as well as one that allows the effects of individual characteristics (age, Indian nationality, male and an indicator for high education) to vary by year. Panel A includes only those person-month observations where there is both a remittance transaction and a salary disbursal. Panel B assumes that the migrant did not earn anything in months without a salary disbursal. Panel C shows the results with the sample where the migrant does not remit anything in months where no remittance is observed in our data. Column 1 of Table 2 (Panel A) presents the fixed effects estimates of the relationship between salary and remittances in the sample in months where either remittances or salary are not observed are dropped. The results indicate that higher salaries of 10% correspond with 3.3% more remittances. All of the estimates in the table are significant at the 1% level. There are almost no differences in the estimates with and without time-varying effects of worker characteristics. Thus, in the results in the remainder of the paper, we focus on the parsimonious specification with individual fixed effects. Despite the fact that workers are on fixed contracts, there is substantial variation in their earnings month-to-month that reflects variation in the hours that they have worked. The average absolute value of the change in earnings from the previous month for the same individual is 20%. If we assume that the variation in a worker’s earnings is driven primarily by circumstances that are outside of the control of the individual worker, then the fixed effects estimate of the relationship between log earnings and log remittances provides the income elasticity of demand for remittances. Panel B displays the fixed effects estimates that correspond with the sample in which the months where salary disbursal is not observed are treated as months in which earnings equal zero.23 The coefficients drop substantially. Withinperson changes in earnings of 10% map into 0.5% higher remittances. However, the results still suggest that fluctuations in earnings month-to-month correspond positively to changes in the remittance behavior of migrant workers. Panel C shows the estimates in which unobserved remittance are treated as if there were no remittances. Here the coefficient estimates increase substantially and suggest an earnings-remittance elasticity that is close to one; each additional percent change in earnings maps into the same percent change in remittances . While the results indicate the magnitude of the relationship between remittances and earnings depends on the assumptions made about the months in which transactions are not observed, the sign of the relationship remains the same and significant at the 1% level. The results suggest that month-to-month fluctuations in earnings correspond with fairly large changes on the amounts that migrant workers remit each period. These results are consistent with a number of models of remittances. We present a new estimate of the income elasticity of remittances based on high frequency, administrative data. These estimates may be of interest to policy-makers who are interested in leveraging remittances as a mechanism of improving the well-being of households in developing countries. It provides an estimate of how remittances would respond to policies in more developed countries that affect the earnings of migrants. Remittances are critical for economic development of underdeveloped nations Peria and Mascaro 8--María Soledad Martínez Pería is a Senior Economist in the Development Research Group, World Bank, Washington, DC. Yira Mascaró is a Senior Financial Economist in the Finance and Private Sector Development Department of the Latin America and the Caribbean Region, World Bank, Washington, DC.[María Soledad Martínez Pería, Yira Mascaró, and Florencia Moizeszowicz “Do Remittances Affect Recipient Countries’ Financial Development?” *REMITTANCES AND FINANCIAL DEVELOPMENT 173]RMT Similarly, because remittances are typically lumpy, recipients might have a need for financial products that allow for the safe storage of these funds. In the case of households that receive their remittances through banks, the potential to learn about and to demand other financial products is even larger. On the other hand, because remittances can also help relax individuals’ financing constraints, they might lead to a lower demand for credit and have a dampening effect on credit market development. Also, a rise in remittances might not translate into an increase in credit to the private sector if these flows are instead channeled to finance the government. Finally, remittances might not increase bank deposits if they are immediately consumed or if remittances recipients distrust financial institutions and prefer other ways of saving these flows. Recent accounts of financial institutions’ attempts to “bank” remittances recipients—by lowering remittances fees and offering specially designed products—suggest that financial institutions perceive the likely impact of remittances on financial development to be positive.1 However, empirical research on the impact of remittances on financial development is largely lacking. One exception is a recently completed study by Aggarwal, Demirgüç-Kunt, and Martínez Pería (2006). Using balance of payments (BOP) statistics for over 90 countries during the period 1975–2003, the study uncovers a positive relationship between remittances and financial development. However, this study looks at all developing countries combined and does not test whether this relationship holds across regions and, in particular, for Latin America and the Caribbean (LAC). This chapter investigates the association between remittances and financial development for Latin American countries both at the macro and micro levels. At the macro level, using the data and empirical approach pursued by Aggarwal, Demirgüç-Kunt, and Martínez Pería (2005), we compare the impact of remittances on financial development for countries in Latin America and outside the region. We try to correct for the potential endogeneity of remittances by using economic conditions in migrant-receiving (or remittances-source) countries as instruments. At the micro level, the chapter presents research on the association between remittances and the use of banking services in Latin America. With data from 19 household surveys for 11 Latin American countries, we test whether the proportion of households that use financial services is different between remittances recipients and nonrecipients in Latin America. Furthermore, we present results from detailed case studies on El Salvador (see Demirgüç-Kunt and Martínez Pería 2006) and Mexico (see Demirgüç- Kunt et al. 2007), two of the largest remittances recipients in the region. These case studies investigate the association between remittances and financial development more rigorously, attempting to correct for potential endogeneity biases. Finally, we complement the micro-level results with findings from interviews with officials of selected banks in the Latin American region (primarily from Colombia and Guatemala). These less rigorous case studies help to illustrate the increasing interest of banks in the remittances business, report on key contributing or limiting factors for the “bancarization” of recipients and senders, and showcase incipient efforts to develop specialized products for cross-selling of services to remittances recipients (see annexes A and B). The The macro-level analysis suggests that remittances have a positive impact on the financial development of developing countries overall, but this effect is smaller for Latin American countries. The micro-level analysis reveals that while there findings from this chapter can be summarized as follows. is evidence that the likelihood of using deposit accounts is higher among remittances recipients, and deposit markets are more developed in areas where a larger percentage of the population receives remittances, no such effects are present thus far when it comes to bank loan use and credit market development Low growth in developing economies increases the risk of and creates a cycle of war in post conflict countries Kim and Conceicao 10 - United Nations - Department of Economic and Social Affairs (DESA),United Nations Development Programme (UNDP) [Namsuk Kim and Pedro Conceição. “THE ECONOMIC CRISIS, VIOLENT CONFLICT, AND HUMAN DEVELOPMENT” International Journal of Peace Studies, Volume 15, Number 1, Spring/Summer 2010]RMT The unfolding global economic crisis is expected to bring the world economy into recession in 2009. Figure 1 shows the population weighted real GDP growth from 1991 to 2009 (estimates for 2008 and projection for 2009) for the world economy and for different groups of countries. The annual real GDP growth rate of the global economy was 5.1% in 2007, but the world economy is projected to shrink by -1.3% in 2009 (IMF, 2009). Emerging and developing economies are also projected to suffer a sharp slowdown as a result of the crisis, with a projected growth rate of 1.6% in 2009 compared to 8.3% in 2007. For many developing countries, the sharp economic slowdowns will translate into deep recessions . The United Nations (UN) projects that 15 developing countries will have negative per capita growth in 2009 (UN, 2009, p. 131), while projections from the World Bank adjusting for terms-of-trade changes increase this to 50 (World Bank, 2009a, p. 2). Given that the probability of conflict recurrence is high, as elaborated upon below, post-conflict countries – those that have experienced armed conflicts until recent years – may be particularly vulnerable . A post-conflict country in this paper refers to a country with armed intra-state conflicts that ended, or significantly diminished, after the end of the Cold war (UNDP, 2008a, p. 7). As Figure 1 shows, post-conflict countries are projected to have a substantial decrease in the economic growth, from 7.4% in 2007 to 3.1% in 2009. Advanced economies may have a sharper slowdown (2.7% in 2007 and - 3.8% in 2009), but they have well-developed social protection, and stable political systems that may facilitate the recovery and absorb the pressures for social instability and conflict. In contrast, post-conflict countries, may be more vulnerable to a more protracted and slower recovery from the slowdown, given the higher risks of conflict recurrence. A recent strand of literature, reviewed in some detail in this paper, suggests that economic conditions are important determinants of the outbreak and recurrence of conflict. In particular, wars often start following growth collapses (Collier et al., 2009, p. 15). Sharp economic slowdowns and low levels of income per capita appear to increase the likelihood of conflicts . In this context, it is opportune to explore insights from this literature, linking it also with the human development implications of both growth slowdowns and conflict. In particular, the paper highlights the risks of the emergence of low human development/conflict traps. When it comes to the consequences of conflict, there is no doubt that violent conflict is one of the most extreme forms of suppressing choices and advancing rights, and therefore a major threat to human development (UNDP, 2005, p. 151). Since 1990, more than 3 million people have died in armed conflicts in developing countries (Marshall, 2005). The total war deaths are far more than the battle deaths. For example, the total war deaths are estimated as 1.2 million in Ethiopia during 1976-1991, but only 2% of them were directly engaged in the battles. (Lacina and Gleditsch, 2004). Conflict has also non-lethal consequences that may last across generations (UNDP, 2008a). The conflict becomes even more hazardous if conflict results in a persistent conflict trap. A typical country reaching the end of a civil war faces a 44 percent risk of returning to conflict within five years (Collier et al., 2003, p. 83). Whether or not a country will experience a new civil war can be best predicted by whether the country experienced wars in the past (Collier et al., 2004). As far as drivers of conflict are concerned, one of the most robust findings in the literature is that many economic conditions (low income, slow growth, and especially severe economic downturns) are correlated with the outbreak of conflict, with some evidence strongly suggesting that the causal direction runs from economic conditions to conflict (Collier and Hoeffler, 2004). There is also a rich literature on the impact of horizontal inequality and dependence on natural resources as drivers of increases in the risk of conflict. A simple and narrow approach to the conflict related to economic growth might overlook other dimensions of human nature. It is true that the high rates of recurrence of conflict, along with the economic determinants of conflict, suggest the possibility of the existence of poverty-conflict traps (Collier et al., 2003; Bloomberg et al., 2000). However, poverty and low per capita income are also correlated with worse health and education outcomes, and also these outcomes suffer as a result of conflict, (Collier and Hoeffler, 2004; Justino and Verwimp, 2006; Alderman, Hoddinott and Kinsey, 2004). Therefore, the relationship between conflict and human development can be conceptualized in the framework of a low human development – conflict trap. A self-reinforcing circle from conflict to low human development, and vice versa, is suggestively illustrated below (Chart 1). Conflict destroys accumulated physical and human capital, forces replacement of labor, and deteriorates institutional capacity. A country experiencing conflict cannot secure long term returns for investments in both physical and human capital, resulting in low investment in health and education. All of these factors lead to low levels of human development. A country with low levels of human development has more difficulty in improving institutions, and in increasing productivity and potential growth. In turn, lower growth rates heighten the risk of conflict, potentially trapping a country in the loop . The remainder of the paper discusses the empirical findings and theoretical background for linkage between the low human development and conflict. Section 2 considers how low levels of human development can affect the risk of violent conflict. Section 3 shows how the conflict can result in low human development, completing the vicious circle. Section 4 concludes the paper with a brief discussion on the policy responses. Best Data proves a causal relation between economic performance and incidence of conflict—every small increase in growth reduces the chance of armed conflict Kim and Conceicao 10 - United Nations - Department of Economic and Social Affairs (DESA),United Nations Development Programme (UNDP) [Namsuk Kim and Pedro Conceição. “THE ECONOMIC CRISIS, VIOLENT CONFLICT, AND HUMAN DEVELOPMENT” International Journal of Peace Studies, Volume 15, Number 1, Spring/Summer 2010]RMT empirical studies find that poor economic performance is associated with higher incidence of conflict . Being a poor country is correlated with most forms of violence (UNDP, 2008a). Growth rates are also strongly associated with risks of conflict in developing countries. If the growth rate in developing countries is increased by 1 percentage point from the mean, the risk of conflict decreases by 0.6 percentage points to 4.0 percent (Collier et al., 2009). Kang and Meernik (2005) show that the growth rate in conflict countries in the five years prior to conflict , including cases of conflict recurrence, was on average 0.5 percent compared to 2 percent in the countries that remained peaceful . Figure 2 shows that economic development and conflicts are observed to be clearly related. The level of GDP is negatively correlated with observing a new conflict. Collier et al. (2009) finds that the predicted risk for a hypothetical country with characteristics set at the study‟s sample mean was 4.6 percent. If the level of per capita income were to be halved from this level, the risk would be increased to 5.3 percent. Empirical analysis of growth and conflict has inherent data limitations, but some recent studies using more careful methodology shows a strong causal link running from poor economic performance to conflict. While there are a number of factors that could cause conflict, Independently human development drastically reduces the risk war— even rational actors have an incentive to go to war Kim and Conceicao 10 - United Nations - Department of Economic and Social Affairs (DESA),United Nations Development Programme (UNDP) [Namsuk Kim and Pedro Conceição. “THE ECONOMIC CRISIS, VIOLENT CONFLICT, AND HUMAN DEVELOPMENT” International Journal of Peace Studies, Volume 15, Number 1, Spring/Summer 2010]RMT Not only the economic performance variables (level of income or growth rate), but other components of human development, such as education attainment, may also affect the risk of conflict. Stylzed facts suggest that education outcomes are closely linked with the outbreak of conflict. Collier and Hoeffler (2004) find strong evidence that higher levels of secondary school attainment are associated with a lower risk of civil war. If the enrollment rate is 10 percentage points higher than the average in their sample, the risk of war is reduced by about three percentage points (a decline in the risk from 11.5 percent to 8.6 percent). This draws on date that refers to the period between 1960 and 1999 for developing countries. Very few countries with low human development could achieve high levels of political stability. We use the Human Development Index (HDI) to measure the human development (UNDP, 2008b), and the Political Stability and Absence of Violence reported in Kaufmann et al. (2009, p.6) to capture perceptions of the likelihood that the government will be destabilized or overthrown by unconstitutional or violent means, including politically-motivated violence and terrorism. Figure 3 plots the political stability indicator and HDI for 178 countries. High values of the political stability indicator imply that the country suffers less violence, and the high HDI represents high levels of human development. The figure suggests that high HDI (say, above 0.5) does not guarantee high political stability. However, low HDI (below 0.5) is clearly associated with political instability (below zero). Going now to the theory behind the outbreak of conflict, a great number of potential channels and mechanisms have been studied through which social, political and economic factors can cause conflict. Following Blattman and Miguel (2009), four distinctive models are briefly reviewed in this section: 1) Contest model; 2) Rational behavior with asymmetric information or imperfect bargaining; 3) Collective action and selective incentives; 4) Feasibility hypothesis. The most well-known framework is the contest model where two competing parties allocate resources to production and appropriation (Garfinkel, 1990; Skaperdas, 1992). The chance of winning the contest depends on the relative efficiency of the technology to allocate resources, and the model has been supported by some empirical findings. Garfinkel and Skaperdas (2007) employ conventional optimization techniques and game-theoretic tools to study the allocation of resources among competing activities - productive and otherwise appropriative, such as grabbing the product and wealth of others as well as defending one's own product and wealth. The prediction of the contest model is consistent with the human development and conflict nexus. If the human development is low, then resources might not be allocated efficiently by the government because of weak institutions and low human capital. The ineffective resource mobilization by the government can be exploited by skillful revolutionary leaders, and the odds of overtaking the political power increases. Therefore, the low human development can increase the incentive to organize the rebel, and in turn, increase the risk of political instability. When the conflict is regarded as a deviation from equilibrium between players, it could occur when the players either act irrationally, or act rationally with asymmetric information or incomplete bargaining (Fearon, 1995). Especially, rational wars can occur if: (i) there is private and exclusive information about military strength, or there is an incentive to misrepresent the information; (ii) two parties cannot commit a cease-fire in the absence of a third-party enforcer (Blattman and Miguel, 2009, p.11). Acemoglu and Robinson (2006) demonstrate the existence of an equilibrium in a bargaining process between the rich and the poor . A number of studies, including Powell (2007), Esteban and Ray (2008), Chassang and Pedro-i-Miquel (2008), and Dal Bó and Powell (2007), show how conflict is sometimes unavoidable with asymmetric information or in multi player settings. Conflict can also occur when the bargaining process is incomplete, that is, credible commitment to maintain peace cannot be made (Powell, 2006; Walter, 2006; Garfinkel and Skaperdas, 2000). The relationship between low human development and conflict might support various theoretical works on conflicts between rational players with incomplete information or bargaining. Regional wars escalate—risks US and Chinese confrontation over nation building efforts Tierney 12 - Senior Fellow at the Foreign Policy Research Institute, an associate professor of political science at Swarthmore College, official correspondent at The Atlantic. [Dominic, “Gulliver’s Troubles: Great Powers and Failed States”, Foreign Policy Research Institute, June 2012]RMT During the Cold War, for example, the developing world became the frontline of the global struggle, as both the United States and the Soviet Union aided proxy forces. Washington poured blood and treasure into South Vietnam in a bid to prop up this failed state. Meanwhile, the United States actively destabilized Afghanistan by aiding the Mujahadeen rebels fighting the Soviet Union, and deepened the Nicaraguan Civil War by supporting the Contra rebels battling the leftist government. What will happen next? The pendulum is about to swing again. With the rise of China, the United States will move from the current Lilliputian era toward a Brobdingnagian era—with a shift in focus away from failed states toward great power diplomacy. The Secretary of Defense recently declared that: “We will of necessity rebalance towards the Asia-Pacific region.” Obama announced that 2,500 American Marines would be deployed to Australia as a sign of the new East Asian strategy. The emerging Brobdingnagian phase reflects the fact that China is viewed as the major long-term threat to U.S. security. And this transition is reinforced by public and elite frustration with the costs of stabilizing Afghanistan and Iraq. Americans would rather engage in great power diplomacy than repeat the nationbuilding Labors of Sisyphus. The pendulum is unlikely to swing back entirely to the Brobdingnagian extreme. After all, a second Cold War is hardly imminent. Unlike the Soviet Union, China has not built an empire at the point of a bayonet or proclaimed an aggressive ideology inimical to American democracy and capitalism. Furthermore, given the continuing concerns over terrorism, nuclear proliferation, and human rights , the dangers emanating from failed and failing states will continue to hold attention in Washington. Instead, the pendulum may move toward a middle position, with the United States keeping one eye on the inherent challenges of weak states, and one eye on the consequences for great power diplomacy. What will be the effects? First, the United States will view failed states less as an inherent problem, and more as an arena for great power rivalry over strategic bases and energy resources . Washington may show increasing sensitivity to the issue of “relative gains,” or whether the United States or China benefits more from continuing instability in Afghanistan, Haiti, or Sudan. If a failed state is a U.S. ally, concerns over China could redouble Washington's efforts to restore order in the troubled land. But if a failed state is hostile or pro-Chinese, the United States may cast a blind eye to the country's travails, or even deliberately pull the thread that leads to its unraveling. China, after all, has recently expanded its diplomatic and economic activities in failed or failing states. Since 2004, China has sent over 1,000 police to help stabilize Haiti, in part because Haiti is one of 23 countries that still recognize Taiwan. The long-term goal may be to draw Haiti into China's diplomatic orbit. In 2007, China contributed engineering troops to a joint African Union-United Nations operation in the Darfur region of Sudan. China has also made significant investments in oil, natural gas, and copper production in Afghanistan. After 9/11, Washington welcomed Brobdingnagian help in dealing with the Lilliputian threat, by encouraging Chinese investment in Afghanistan. But if we move into a new era of enhanced great power rivalry, Americans may look at Afghanistan in a different light, favoring the country's stability only if it aids U.S. interests, and competing with China over the control of Afghan resources. Fortunately, we live in a time of great power peace, and war with China is unlikely. But competition over failed states is one of the more plausible scenarios for military conflict . Jakub Grygiel described the potential for “vacuum wars” where the absence of effective government in failed states lures in great powers. If Indonesia were to collapse, for instance, China might intervene to protect the Chinese minority, provoking military action by other regional powers. If the rise of China occupies U.S. attention, there may be less bandwidth available for purely humanitarian operations like in Somalia. These types of missions tend to occur only in Lilliputian eras. At times of great power competition, Washington lacks the will for a purely idealistic venture. And a rival great power may also resist Washington's capacity to intervene. Interestingly, Americans dramatically altered their view of failed states over the last century even when the countries themselves did not change. Haiti has been beset by problems since it gained independence in 1804. An ordinary Haitian might not understand why, during the twentieth century, the United States became suddenly concerned about the stability of Haiti, then lost interest, and then became worried again. Similarly, an ordinary Afghan might not comprehend why Washington, in turn, destabilized Afghanistan in the 1980s, ignored the country, began a major nation-building mission costing billions of dollars--and may soon rethink the value of Afghan stability based on whether the United States or China benefits more. The waxing and waning of great power rivals has always shaped the American view of failed states. As China rises, Gulliver will view the Lilliputian threat through the Brobdingnagian lens. 1AC - Cooperation Status quo ICE operations erode community trust – only a curtailment of the agency’s power can solve Kati L. Griffith 12, Proskauer Assistant Professor of Employment and Labor Law, Industrial and Labor Relations School at Cornell University, 2012, UNDOCUMENTED WORKERS: CROSSING THE BORDERS OF IMMIGRATION AND WORKPLACE LAW, CORNELL JOURNAL OF LAW AND PUBLIC POLICY, http://poseidon01.ssrn.com/delivery.php?ID=785068073073027082119015102075110007098 03206806003306507810309101409912003110508703105712103812604704503209711210201 609409101003103300708003201200400102911510500409900000602012406911409510708 2106113098108006097088086123117070089089125064103105072112&EXT=pdf&TYPE=2 ||RS Scholars and commentators have also identified ways that the agency in charge of workplace-based immigration enforcement, the U.S. Immigration and Customs Enforcement agency (ICE), has impeded workplace law enforcement and employee organizing in some circumstances. ICE agents, for instance, have misrepresented themselves to workers as employee health and safety agents in order to capture undocumented workers.86 On other occasions, ICE has reportedly initiated workplace immigration raids in response to “tips” from employers who contact immigration authorities as a way of deterring employee organizing and workplace law claims.87 Moreover, the National Employment Law Project recently reported on three cases that involved “ICE surveillance of picket lines or other labor activities” and four cases that involved immigration enforcement activities at workplaces despite “ICE knowledge of an ongoing organizing campaign or labor dispute.”88 Therefore, despite the DOL-ICE Memorandum of Understanding described in Part III, ICE’s interventions have sometimes sent the message to employees that labor disputes bring about immigration enforcement and that undocumented employees are not safe to organize or to come forward with complaints related to their workplace rights.89 That erosion of community trust spills over – it effects every law enforcement official Abby Sullivan 8, J.D. Candidate at University of California, Hastings College of the Law, On Thin ICE: Cracking Down on the Racial Profiling of Immigrants and Implementing a Compassionate Enforcement Policy, Hastings Race and Poverty, 2008, http://heinonline.org/HOL/Page?handle=hein.journals/hasrapo6&div=6&g_sent=1&collection=journals ||RS Furthermore, racial profiling will instill in the immigrant community distrust of all law enforcement officials , be they immigration or general law enforcement officers. Such fear and distrust will make immigrants reluctant to report crime, destabilizing immigrant communities and rendering them less safe. This result is contrary to the Immigration and Nationality Act, which exempts certain undocumented individuals from removability if they are "helpful to a Federal, State, or local law enforcement official... investigating or prosecuting criminal activity." 21 2 The statute provides relief as a reward for cooperation with law enforcement in the investigation of a broad category of crimes, including rape, torture, trafficking, domestic violence, sexual assault, kidnapping, blackmail, extortion, homicide, assault, obstruction of justice, and 213 perjury. Although the Department of Homeland Security has attempted to restrict the categories of crimes for which such relief would be available in exchange for cooperation with law enforcement, 2 14 the language of the Act makes clear Congress' desire that immigration status not be a basis to dissuade such cooperation. Selective immigration law enforcement based on race, resulting in mounting distrust and tension between immigrants and officers, is in direct conflict with this congressional objective. Police-immigrant relations are critical to deter domestic terrorism International Association of Chiefs of Police, IACP, 14, a dynamic organization that serves as the professional voice of law enforcement, 2014, Using Community Policing to Counter Violent Extremism, http://www.theiacp.org/Portals/0/documents/pdfs/Final%20Key%20Principles%20Guide.pdf ||RS Engaging Immigrant Communities through Community Policing Law enforcement agencies nationwide have used community policing principles to build bridges with immigrant communities that may be wary of law enforcement because of past experiences in their home country .13 Law enforcement agencies have also used these principles, and continue to use them today, to demonstrate their commitment to balancing the needs of protecting their communities while also protecting individuals from hate crimes and civil rights and liberties violations . However, groups that share, or have been perceived to share, the national background or religions of the perpetrators of the 9/11 attacks may still be hesitant to share tips and may be cautious about partnering with law enforcement .This hesitancy can only be overcome by building trusting relationships, being transparent, and communicating with community members , regardless of their citizenship or immigration status . The principles of community policing extend beyond the residents of a specific community and encompass working in partnership with other government agencies, public and private stakeholders, and faith- and community-based organizations . For example, enhanced information exchange between local, state, tribal, and federal law enforcement and homeland security partners; improved partnerships between federal, state, and local officials; information sharing between law enforcement and private entities; and, advances in communications technology and interoperable all be used to address terrorism and violent extremism .14 Using interoperable databases and sharing information with nonprofits and the private sector provides law enforcement with additional opportunities to prevent violent attacks by extremist individuals and groups . databases, can The internal link is unique – declining police budgets means that community cooperation is uniquely key International Association of Chiefs of Police, IACP, 14, a dynamic organization that serves as the professional voice of law enforcement, 2014, Using Community Policing to Counter Violent Extremism, http://www.theiacp.org/Portals/0/documents/pdfs/Final%20Key%20Principles%20Guide.pdf ||RS Applying Community Policing to Homeland Security Issues Community policing approaches have been adapted to address a broad range of concerns . Besides traditional crime issues, community policing has been used to address diverse issues such as gangs and gang violence, civic engagement, and community awareness. Community policing’s broad approach encompasses greater emphasis on proactive and preventive policing . Applying the same community policing principles that have helped reduce general crime, violence, and social disorder to terrorism and violent extremism can also aid in preventing future attacks . Building partnerships with public and private community stakeholders, interacting with residents and community leaders, sharing information, and investigating reports of suspicious or unusual behavior are all components of community policing that are easily transferable to terrorism prevention and countering violent extremism .10 Interacting with residents and other community stakeholders can help law enforcement identify and engage citizen groups as partners to address community grievances that may lead to violent extremism . Building trusting relationships based on interaction and collaboration may also lead to increased reporting of suspicious activity as well as sharing of information, target hardening, and improved coordination .11 Especially in a time of shrinking budgets and increasing expectations for law enforcement agencies, one of the most beneficial aspects of community policing is the principle of leveraging the strength of communities and their members . Community members are an important force multiplier .They can help identify, prevent, and eliminate terrorist ideologies and behaviors before violence occurs .The importance of individual community members is embodied in the Nationwide Suspicious Activity Reporting (SAR) Initiative (NSI), which encourages individuals to take an active role in reporting any type of suspicious or criminal activity to authorities . During his 2011 State of the Union address, President Barack Obama called on American law enforcement and their communities to continue to work together to stop homegrown violent extremists before their plans become operational: “Thanks to our intelligence and law enforcement professionals, we’re disrupting plots and securing our cities and skies.And as extremists try to inspire acts of violence within our borders, we are responding with the strength of our communities…” 12 Introduction 3 By empowering communities to take an active role in ensuring their safety, law enforcement is well positioned to take a central role in preventing terrorism and countering violent extremism . Domestic bioterror is coming now – wide range of new technical capabilities ensure use Sharon Cheatham 12, B.S. from Georgetown University, Bioterrorism In The Homeland: The Impact Of Acts Of Bioterrorism On American Culture, 11/19/12, http://hdl.handle.net/10822/558323 ||RS The threat of domestic cases of bioterrorism is a major concern; a concern that is comprehensive when considered in its entirety. Ideally, perfect biological weaponry choices would be those needed in small quantities, those which are easily manufactured or acquired, and most importantly, those which are somewhat obscure and perhaps even microscopic. World at Risk, a report by the Commission on the Prevention of Weapons of Mass Destruction, Proliferation and Terrorism, reveals that most biological pathogens are “poorly secured and widely available for sinister purposes.”32 Myriad resources are available to extremists and terrorist organizations desirous of launching attacks of bioterrorism on American soil . “It is unknown exactly how much and which types of biological weapons may be on the black market or in unauthorized hands, since the dissolution of the Soviet Union, the Warsaw Pact, and subsequent logistical chaos in the former Red Army.”33And even still, closer to home , specifically here on American soil , fields of study which include biomedical engineering, pharmaceuticals, and agriculture require specific biotechnological proficiencies which can easily be incorporated into biological weaponry, making it more difficult to detect and identify the existence of harmful agents, and subsequently, protect against the harm they may cause.34 The defense community at large realizes that biological agents and toxins are available to individuals whom may not seek to act in the best interest of others. Moreover, the defense community also recognizes that while countermeasures may exist to limit the proliferation of harmful biological and chemical agents, timely identification of bioterrorist activity, as well as distribution of medicines to combat the affects of these harmful agents may be difficult. Subsequently, the following piece of legislation was introduced to lessen, and hopefully prevent, acts of biological warfare. Synthetic biology makes the impact unique- creates means and motive Rose, 14 -- PhD, recognized international biodefense expert [Patrick, Center for Health & Homeland Security senior policy analyst & biosecurity expert, National Defense University lecturer, and Adam Bernier, expert in counter-terrorism, "DIY Bioterrorism Part II: The proliferation of bioterrorism through synthetic biology," CBRNePortal, 2-24-14, www.cbrneportal.com/diy-bioterrorism-part-ii-the-proliferation-of-bioterrorismthrough-synthetic-biology/, accessed 8-16-14] In Part I of this series, we examined how the advancement of synthetic biology has made bio-engineering accessible to the mainstream biological community. Non-state actors who wish to employ biological agents for ill intent are sure to be aware of how tangible bio-weapons are becoming as applications of synthetic biology become more affordable and the probability of success increases with each scientific breakthrough. The willingness of non-state actors to engage in biological attacks is not a new concept; however, the past biological threat environment has been subdued compared to that of conventional or even chemical terrorism. The frequency and deadliness of biological attacks has, thankfully, been limited; much of which can be attributed to the technical complexity or apparent ineptitude of the perpetrators developing biological weapons. Despite the infrequency and ineffectiveness of biological attacks in the last four decades, the threat may be changing with the continued advancement of synthetic biology applications. Coupled with the ease of info rmation sharing and a rapidly growing do-it-yourself-biology (DIYbio) movement (discussed in Part I), the chances of not only , more attacks , but potentially more deadly ones will inevitably increase .¶ During the last half century terrorist organizations have consistently had an interest in using biological weapons as a means of attacking their targets, but only few have actually made a weapon and used it. The attraction is that terrorist activities with biological weapons are difficult to detect and even more difficult to attribute without a specific perpetrator claiming responsibility. Since 1971 there have been more than 113,113 terrorist attacks globally and 33 of them have been biological. The majority of bio-terrorism incidents recorded occurred during the year 2001 (17 of the 33); before 2001 there were 10 incidents and since 2001 there were 6 (not counting the most recent Ricin attacks). The lack of a discernable trend in use of bio-terrorism does not negate the clear intent of extremist organizations to use biological weapons. In fact, the capacity to harness biological weapons more effectively today only increases the risk that they will successfully be employed.¶ The landscape is changing : previously the instances where biological attacks had the potential to do the most harm (e.g., Rajneeshees cult’s Salmonella attacks in 1984, Aum Shinri Kyo’s Botulinum toxin, and Anthrax attacks in the early 90’s) included non-state actors with access to large amounts of funding and scientists. Funding and a cadre of willing scientists does not guarantee success though. The assertion was thus made that biological weapons are not only expensive, they require advanced technical training to make and are even more difficult to effectively perpetrate acts of terrorism with. While it is difficult to determine with certainty whether the expense and expertise needed to create biological weapons has acted as a major deterrent for groups thinking of obtaining them, many experts would argue that the cost/expertise barrier makes the threat from biological attacks extremely small. This assertion is supported by the evidence that the vast majority of attacks have taken place in Western countries and was performed by Western citizens with advanced training in scientific research.¶ In the past decade the cost/expertise assertion has become less accurate. Despite the lack of biological attacks, there are a number of very dangerous and motivated organizations that have or are actively pursuing biological weapons. The largest and most outspoken organization has been the global Al Qaeda network, whose leaders have frequently and passionately called for the development (or purchase) of Weapons of Mass Destruction (WMD). The principal message from Al Qaeda Central and Al Qaeda in the Arabian Peninsula (AQAP) has included the call to use biological WMDs to terrorize Western nations. Al Qaeda has had a particular focus on biological and nuclear weapons because of their potential for greatest harm. Osama Bin Laden, Ayman al-Zawahiri and Anwar al-Awlaki have all called for attacks using biological weapons, going so far as to say that Muslims everywhere should seek to kill Westerners wherever possible and that obtaining WMDs is the responsibility of all Muslims. Before the US-led invasion of Afghanistan, Al Qaeda had spent significant funds on building a bio-laboratory and had begun collecting scientists from around the world; however, the Afghanistan invasion and subsequent global War on Terrorism is thought to have disrupted their capabilities and killed or captured many of their assets. Despite the physical setbacks, this disruption does not appear to have changed the aggressive attitude towards obtaining WMDs (e.g., more recently U.S. Intelligence has been concerned about AQAP attempting to make Ricin).¶ The emergence of synthetic biology and DIYbio has increased the likelihood that Al Qaeda will succeed in developing biological WMDs. The low cost and significantly reduced level of necessary expertise may change how many non-state actors view bio logical weapons as a worthwhile investment. This is not to say that suddenly anyone can make a weapon or that it is easy. To the contrary making an effective biological weapon will still be difficult, only much easier and cheaper than it has been in the past.¶ The rapid advancements of synthetic bio logy could be a game changer , giving organizations currently pursuing biological weapons more options, and encouraging other organizations to reconsider their worth. Because the bar for attaining bio logical weapons has been lowered and is likely to continue to be lowered as more advances in biological technology are made, it is important that the international community begin to formulate policy that protects advances in science that acts to prevent the intentional misuse of synthetic biology. Disregard for this consideration will be costly. A successful attack with a potent biological weapon, where no pharmaceutical interventions might exist, will be deadly and the impact of such an attack will reverberate around the globe because biological weapons are not bound by international borders. Bioterror causes extinction Mhyrvold ‘13 Nathan, Began college at age 14, BS and Masters from UCLA, Masters and PhD, Princeton “Strategic Terrorism: A Call to Action,” Working Draft, The Lawfare Research Paper Series Research paper NO . 2 – 2013 As horrible as this would be, such a pandemic is by no means the worst attack one can imagine, for several reasons. First, most of the classic bioweapons are based on 1960s and 1970s technology because the 1972 treaty halted bioweapons development efforts in the United States and most other Western countries. Second, the Russians, although solidly committed to biological weapons long after the treaty deadline, were never on the cutting edge of biological research. Third and most important, the science and technology of molecular biology have made enormous advances, utterly transforming the field in the last few decades . High school biology students routinely perform molecular-biology manipulations that would have been impossible even for the best superpower-funded program back in the heyday of biological-weapons research. The biowarfare methods of the 1960s and 1970s are now as antiquated as the lumbering mainframe computers of that era. Tomorrow’s terrorists will have vastly more deadly bugs to choose from. Consider this sobering development: in 2001, Australian researchers working on mousepox, a nonlethal virus that infects mice (as chickenpox does in humans), accidentally discovered that a simple genetic modification transformed the virus.10, 11 Instead of producing mild symptoms, the new virus killed 60% of even those mice already immune to the naturally occurring strains of mousepox. The new virus, moreover, was unaffected by any existing vaccine or antiviral drug. A team of researchers at Saint Louis University led by Mark Buller picked up on that work and, by late 2003, found a way to improve on it: Buller’s variation on mousepox was 100% lethal, although his team of investigators also devised combination vaccine and antiviral therapies that were partially effective in protecting animals from the engineered strain.12, 13 Another saving grace is that the genetically altered virus is no longer contagious. Of course, it is quite possible that future tinkering with the virus will change that property, too. Strong reasons exist to believe that the genetic modifications Buller made to mousepox would work for other poxviruses and possibly for other classes of viruses as well. Might the same techniques allow chickenpox or another poxvirus that infects humans to be turned into a 100% lethal bioweapon, perhaps one that is resistant to any known antiviral therapy? I’ve asked this question of experts many times, and no one has yet replied that such a manipulation couldn’t be done. This case is just one example. Many more are pouring out of scientific journals and conferences every year. Just last year, the journal Nature published a controversial study done at the University of Wisconsin–Madison in which virologists enumerated the changes one would need to make to a highly lethal strain of bird flu to make it easily transmitted from one mammal to another.14 Biotechnology is advancing so rapidly that it is hard to keep track of all the new potential threats. Nor is it clear that anyone is even trying. In addition to lethality and drug resistance, many other parameters can be played with, given that the infectious power of an epidemic depends on many properties, including the length of the latency period during which a person is contagious but asymptomatic. Delaying the onset of serious symptoms allows each new case to spread to more people and thus makes the virus harder to stop. This dynamic is perhaps best illustrated by HIV , which is very difficult to transmit compared with smallpox and many other viruses. Intimate contact is needed, and even then, the infection rate is low. The balancing factor is that HIV can take years to progress to AIDS , which can then take many more years to kill the victim. What makes HIV so dangerous is that infected people have lots of opportunities to infect others. This property has allowed HIV to claim more than 30 million lives so far, and approximately 34 million people are now living with this virus and facing a highly uncertain future.15 A virus genetically engineered to infect its host quickly, to generate symptoms slowly—say, only after weeks or months—and to spread easily through the air or by casual contact would be vastly more devastating than HIV . It could silently penetrate the population to unleash its deadly effects suddenly . This type of epidemic would be almost impossible to combat because most of the infections would occur before the epidemic became obvious. A technologically sophisticated terrorist group could develop such a virus and kill a large part of humanity with it. Indeed, terrorists may not have to develop it themselves: some scientist may do so first and publish the details. Given the rate at which biologists are making discoveries about viruses and the immune system, at some point in the near future, someone may create artificial pathogens that could drive the human race to extinction . Indeed, a detailed species-elimination plan of this nature was openly proposed in a scientific journal. The ostensible purpose of that particular research was to suggest a way to extirpate the malaria mosquito, but similar techniques could be directed toward humans.16 When I’ve talked to molecular biologists about this method, they are quick to point out that it is slow and easily detectable and could be fought with biotech remedies. If you challenge them to come up with improvements to the suggested attack plan, however, they have plenty of ideas. Modern biotechnology will soon be capable, if it is not already, of bringing about the demise of the human race — or at least of killing a sufficient number of people to end high-tech civilization and set humanity back 1,000 years or more. That terrorist groups could achieve this level of technological sophistication may seem far-fetched, but keep in mind that it takes only a handful of individuals to accomplish these tasks. Never has lethal power of this potency been accessible to so few, so easily. Even more dramatically than nuclear proliferation, modern biological science has frighteningly undermined the correlation between the lethality of a weapon and its cost, a fundamentally stabilizing mechanism throughout history. Access to extremely lethal agents—lethal enough to exterminate Homo sapiens—will be available to anybody with a solid background in biology, terrorists included. 1AC - Plan The United States Immigrations and Customs Enforcement Agency, the Department of Labor and/or other relevant agencies should revise the existing Memorandum of Understanding such that the United States Immigrations and Customs Enforcement Agency should be required to obtain permission from the United States Department of Labor and/or other relevant labor agencies before conducting investigations and raids of a home and/or workplace. 1AC – Solvency The existing Memorandum of Understanding is limited and impermanent—it has insufficient interagency coordination, occurs during litigation, and still authorizes state searches. It causes a dangerous chilling effect that precludes seeking of legal recourse. Braker 12—Columbia Law School [‘Julie. "Navigating the Relationship between the DHS and the DOL: The Need for Federal Legislation to Protect Immigration Workers' Rights." Colum. JL & Soc. Probs. 46 (2012): 329]RMT The main strength of the MOU is the firewall that it establishes between DOL and ICE, limiting the risk that employers who are being investigated will use the threat of immigration enforcement to silence immigrant workers who assert their workplace rights. The MOU helps to prevent “abusive employers from manipulating DHS to rid themselves of workers who assert their rights”88 by ensuring that immigration enforcement cannot occur while a labor investigation is taking place. However, with respect to the broader goal of balancing immigration enforcement and labor enforcement, the MOU is weak because it is of an impermanent and limited nature and because it does not cover other forums in which workers bring employment law claims. 1. The MOU is an Impermanent and Limited Measure The inherent limitations of an MOU make it a weak tool for protecting unauthorized workers when they bring labor claims and for ensuring that immigration enforcement does not interfere with labor enforcement. As explained above, interagency MOUs are tentative and limited: they can be changed when agencies see fit and, although they are subject to review by the OLC,89 they are generally unreviewable and unenforceable by courts .90 Also, the DOL DHS MOU specifically states that it does not create a private right of action.91 Further, MOUs, like other contracts, are limited to the parties that sign it. Given that labor enforcement occurs in other forums besides the DOL, a balance of labor and immigration enforcement can only be achieved by coordinating with other agencies, such as the U.S. Equal Employment Opportunity Commission (EEOC), and the courts. Thus, the MOU’s tentative and limited nature inhibit its ability to achieve coordination in immigration and labor enforcement because it is not a long-term, stable legal mechanism. Because of a greater need for stability and multi-forum change, federal legislative reform may be the best option for securing labor protections for immigrants , an idea that will be discussed in Part IV.C the MOU is that it is only between DHS and DOL, and does not limit DHS’s ability to conduct immigration enforcement when other agencies, such as EEOC, investigate workplace complaints. The MOU also does not preclude ICE involvement when federal litigation, a crucial means of obtaining redress for wronged workers, is ongoing. Given that the DOL’s Wage and Hour Division cannot handle the volume of wage and hour complaints that are filed nationwide,92 many individuals choose to file lawsuits in federal court instead.93 Just as immigration enforcement can interfere with DOL investigations, it can also impede federal litigation. Another major limitation of The 2008 Pilgrim’s Pride lawsuit is a prime example of the need for federal employment-rights lawsuits to be protected against DHS involvement.94 United Steelworkers District 9, which represented poultry workers in Pilgrim’s Pride poultry plant in Chattanooga, Tennessee, was recruiting Latino workers, who had low levels of union participation, to join the union.95 At the same time, a wage-and-hour class action lawsuit against Pilgrim’s Pride was pending.96 When ICE raided the Chattanooga plant in April 2008, the raid had a chilling effect on the workers, even those who were working legally, as they became more hesitant to unionize due to the fear of possible immigration consequences, both to themselves and to family members.97 The union representative stated, “These workers are in no shape to engage in a contract fight with Pilgrim’s Pride. They’re terrified.”98 the ICE raid inhibited the ability of lawyers to contact those who were part of the classaction lawsuit, but were detained in the raid, as ICE refused to ensure that notice of the lawsuit reached detained workers who had a right to join the lawsuit.99 As an attorney who worked on the wage-and-hour litigation explained, “The raid definitely had a chilling effect. Immigrant workers, even those legally authorized to work in the United States, were afraid of opting in to the class because they were afraid that somehow it would jeopardize a family member.”10 Further, This chilling effect can be even more drastic for workers who do not have legal status. In a report on immigrant workers in the meat and poultry industry, many of whom were unauthorized, Human Rights Watch found:The possibility of an inquiry into workers’ documentation during a proceeding adjudicating their claims creates a dilemma for them. The questions are intimidating — and designed to be so. They force workers to choose between seeking legal recourse for wage and hour violations, health and safety violations, job discrimination, workplace injuries and illnesses, reprisals for union activity and other violations, on one hand, or exposing themselves , on the other hand, to dismissal and deportation by responding to such inquiries when they seek such recourse. Not surprisingly, they have a chilling effect on workers’ willingness to file claims.101 the threat of immigrant enforcement stifling reporting of workplace violations exists in other sectors, including agriculture, the restaurant and hotel industry, and textile manufacturing.102 The problem of Thus, the documented chilling effect of threats of immigration enforcement on workers reporting workplace violations demonstrate the need to prevent immigration the Fair Labor Standards Act, which enumerates basic employment rights such as the minimum wage and overtime pay103 and contains an anti-retaliation provision,104 the fact that federal lawsuits and other forms of legal complaint are still stifled demonstrates that the MOU does not sufficiently address fears of immigration consequences. Thus, enforcement from thwarting labor enforcement. Although more steps need to be taken to balance immigration- and laborenforcement priorities in the context of federal litigation 3. Protections Are Needed for State Litigation and Investigations by State Agencies State court cases and state labor-enforcement activities should also be protected from interference by immigration enforcement. States play a role in enforcing labor rights that the DOL-DHS MOU does not address. Much labor, employment, and employment-discrimination law enforcement takes place at the state level; for example, in New York, the state Department of Labor investigates state labor law violations105 and the Division of Human Rights investigates discriminatory employment practices that violate the state’s Human Rights Law.106 Professor Jayesh Rathod also points out that “all U.S. states, with some states have minimum wage rates above the federal level.108 Some states “establish independent, more stringent standards and are enforced by state entities that are largely independent of the DOL.”109 Thus, many workers rationally pursue labor enforcement in state courts or with state agencies, as their rights come from state law and thus their complaint must be resolved by a state agency investigation or in state court. However, workers can experience the same chilling problems that occur in federal litigation, making it appropriate to balance immigration and laborenforcement priorities in the state context as well. the exception of Alabama, Louisiana, Mississippi, South Carolina, and Tennessee, have some form of minimum wage law.”107 Further, 4. Protections Are Needed for State and Local Law Enforcement Interference The DOL-DHS MOU also does not address the issue of state and local law enforcement agencies’ participation in immigration law enforcement. It is crucial to look at the role that state and local law enforcement may play in the interplay of workers’ rights and immigration as, increasingly, local law enforcement is becoming enmeshed in immigration enforcement.110 For example, in the case of Durrett Cheese Sales, a cheese- and dairy-products wholesale company, a number of workers organized, after having not been paid for several weeks.111 Realizing that the workers were organizing, their supervisor fired them and contacted the local sheriff’s department, who reported them to ICE.112 Although no charges were filed against the workers, this action surely stifled any subsequent attempt by workers to organize to pursue their right to be paid. Notably, local law enforcement officials are essentially exempt from the parallel duties that ICE has towards the DOL. As Professor Stephen Lee points out, “had the Durrett supervisor reported the workers to ICE — and had the receiving officer suspected that Durrett was in the midst of a labor dispute — in theory, ICE would have had to withhold or delay action under existing operating instructions.”113 However, local law enforcement agencies do not have such a duty to balance laborenforcement and immigration -enforcement goals. This is especially concerning due to the increasing participation of nonfederal actors in the enforcement of federal immigration laws.114 The Secure Communities program, which directs state and local law-enforcement agencies to send fingerprints of arrestees to ICE to check their immigration statuses, is one example.115 Thus, because of their potential involvement in immigration investigations, state law-enforcement agencies should also be included in efforts to ensure that threats or fears of immigration consequences do not prevent workers from bringing valid workplace claims. It is possible that the provision of the MOU according to which ICE has agreed to “be alert to and thwart attempts by other parties to manipulate its worksite enforcement activities for illicit or improper purposes”116 actually prevents local law enforcement from using immigration enforcement to interfere with labor enforcement to some extent. The National Employment Law Project (NELP) has suggested that “[t]his language may mean that retaliation carried out by an employer’s surrogate (such as local police or insurers) could trigger the MOU.”117 Thus, according to NELP’s interpretation, local law enforcement could be considered a “surrogate” where, as in the Durrett Cheese case, the police officer reported unauthorized workers to ICE at the employer’s behest. If NELP’s interpretation is adopted, ICE would have to be alert to local law enforcement’s efforts to thwart labor enforcement when they report suspected immigration violations. However, this would still not include situations where local law enforcement is interfering with a labor investigation on its own accord, without acting on behalf of an employer. Thus, although the MOU is a valuable tool for enforcing labor rights, it fails to encompass the diverse forums in which labor enforcement occurs, and does not protect against local lawenforcement activity. Despite conflicting mandates government entities can cooperate and best support the interests of immigrants Chen 12--Associate Professor, University of Colorado Law School [Ming Hsu, Where You Stand Depends on Where You Sit: Bureaucratic Incorporation of Immigrants in Federal Workplace Agencies (March 9, 2012). Berkeley Journal of Employment and Labor Law, 2012; U of Colorado Law Legal Studies Research Paper No. 12-03. http://ssrn.com/abstract=2019181 or http://dx.doi.org/10.2139/ssrn.2019181]RMT How do bureaucrats exercise their discretion when confronted with competing mandates? There are two dominant answers in the relevant literatures: political control and professionalism . The political control perspective suggests that political controversies about immigration in the post-Hoffman era, for example, will lead toward punitive enforcement practices and a lack of support in service delivery from governmental agencies.86 There are several reasons for these outcomes: undocumented immigrants’ powerlessness in electoral politics; the power of interest groups such as employers within corporations and trade associations prone to capturing agencies; and the tendency for principals to bring bureaucrats in line.87 Political control thereby defrays a mission-focused professional ethos that includes fidelity to substantive laws, such as labor standards or antidiscrimination or inclusiveness.88 Underlying this perspective is an implicit belief that policy is rational and therefore strategically directed at accomplishing instrumental ends.89 In Graham Alison’s typology, this model of government behavior infers that if a government official performed a particular action, that official must have felt the action represented the best way of accomplish a desired end.90 Revealing the strategic thinking that leads linearly from means to ends, then, is the key to understanding why a policy is enacted.91 In the context of understanding the federal government’s policies toward undocumented workers, one must seek to understand: (1) the values and objectives of the federal government (i.e., deterring unauthorized migration by staunching employment of undocumented immigrant workers); (2) the perceived policy alternatives (i.e., punishing employers for hiring undocumented workers, rather than the immigrants themselves); (3) the range of intentional and unintentional consequences that can flow from each policy alternative (i.e., not punishing employers to keep the onus of responsibility on workers and to prevent unjust enrichment of workers); and (4) the net value of each set of policy consequences.92 A corollary interpretation of federal workplace agencies protecting undocumented workers would follow the same line of analysis with the starting assumption that the workplace agencies’ objective is to maintain labor compliance for all workers and that ensuring compliance for U.S. citizen workers requires simultaneously ensuring compliance for noncitizen workers In contrast, social scientists who focus on the influence of professionalism over political control emphasize the “cultural” attributes of the organizations in which the professionals reside.93 Those theorists of professionalism who focus on professionals within government bureaucracies begin by recognizing that the government consists of a confederation of “semi-feudal, loosely allied organizations, each with a life of its own.” 94 Those organizations follow set “repertoires” when taking action; these repertoires are often fueled by their organizational imperatives and manifested in a “fixed set of standard operating procedures.”95 Policies and practices are analyzed as organizational outputs.96 Bureaucratic incorporation theorists allege that government actors sit on top of the conglomerate of organizations, and they perceive problems through “organizational sensors.”97 Thus, partisan politics are constrained, countered and sometimes overcome by the “norms and ethos of civil servants” within the agencies.98 In the instance of bureaucrats serving immigrants from within workplace agencies, an organizational theorist would say that the motivating ethos is one of professionalism.99 Most civil servants trained as attorneys and employed by federal workplace agencies are “socialized into understanding their role as unelected officials in a democratic political system where Congress dictates their agency mission.”100 Their legal training makes them particularly cognizant of legal constraints related to the professional norm of procedural justice.101 While mindful of their political leadership, they strive to maintain their agency mandate across changing presidential priorities.102 Change happens, but it occurs gradually and infrequently: organizations tend toward “parochial priorities” such as organizational health, expressed in dollars appropriated and bodies assigned; attempting higher functions through banal tasks like preparing budgets and reports; evaluating options in terms of administrative feasibility; and updating their practices based on past practices, such as using last year’s budget as a template for this year’s expenditures. 103 Organizational parameters mostly persist through recruitment of loyal personnel, tenure of longstanding employees, and rewards for following existing procedures.104 More dramatic change occurs in periods of budgetary feast or fast.105 Problems often occur at the juncture of jurisdictional overlap of multiple organizations and require coordination for solution.106 Several recent empirical studies of immigrant-serving law enforcement agencies demonstrate the professional motivation to serve immigrants within hostile political climates . Building on foundational work studying social service delivery to immigrants despite restrictive government policies,107 scholars find that moments when restrictive government policies collide with bureaucrats’ beliefs about fairness and appropriate action toward their clients most vividly reveal bureaucrats’ professional norms.108 Political scientists Paul Lewis and Karthick Ramakrishnan study inclusive policing practices in cities with many immigrants.109 They contend that local law enforcement departments increasingly are professional agencies that use discretion to engage in a search for practices that will help them to serve the local community in defending itself, rather than mechanically taking political cues from elected leadership who may view immigration control as an electoral prerogative in the down economy.110 Law enforcement officials view themselves as public servants and professionals who follow an ideal of service , and they recognize the importance of the public they serve in order to do their job well.111 Insofar as immigrants are part of that constituency, local law enforcement relies on them to accomplish core tasks of keeping the peace, gaining trust in the community, and maintaining quality of life for all concerned. Sociologist Shannon Gleeson extends the professionalism emphasis in bureaucratic incorporation theory to state law enforcement and regulation, where partisan politics are potentially more salient and immigration policies more fractured than at the local level, in two empirical studies of state-level workplace agencies.113 In one study, she shows that political ideology remains an insignificant part of bureaucrats’ motivation to serve immigrants.114 When asked to reflect on the moral worthiness of immigrants who receive their services, statelevel officials in the EEOC and DOL responded that the moral worthiness of their immigrant clients is irrelevant to their rendering of services, regardless of the immigrants’ official eligibility for those services.115 “Doing the right thing,” Gleeson argues, “can sometimes have little to do with a bureaucrat’s personal sense of conviction towards a client.”116 Instead, Gleeson offers an institutionalized account for why bureaucrats promote immigrants’ rights: “in addition to exercising discretion and pursuing creative solutions,” bureaucratic actions are contingent on ‘predictable and institutionalized practices. ’ ”117 Although agency staff was sometimes sympathetic to immigrants, overwhelmingly they articulated their commitment to immigrants as a means to achieve organizational goals such as resource allocation and labor compliance.118 Gleeson’s research design, which compares regulation of the workplace in liberal California with conservative Texas, shows that political pressure is constrained by professionalism : service to immigrants was available in both jurisdictions and did not depend on heroic actions or proimmigrant advocacy on the part of individual bureaucrats. 119 Interagency tension is inevitable – only the counterplan can productively harness it – Lee 11 --Acting Professor of Law University of California, Irvine School of La [Stephen, “Monitoring Immigration Enforcement”, (December 19, 2011). Arizona Law Review, Vol. 53, 2011; UC Irvine School of Law Research Paper No. 2012-01. Available at SSRN: http://ssrn.com/abstract=1974624 or http://dx.doi.org/10.2139/ssrn.1974624] RS While such a solution is workable, such relief rests largely within the scope of the enforcement discretion of immigration officials— which is precisely what the interagency monitoring framework attempts to constrain.147 Therefore, unless and until Congress amends the scope of the statutory language, the ability of unauthorized workers to obtain U visa relief will continue to be circumscribed by the generosity of executive discretion.148 In this sense, monitoring and temporary visas apply pressure on enforcement decisions from either side in the hopes of deterring overreaching. But in another sense, ex ante monitoring can cure one set of pathologies that ex post visas cannot: It can help minimize the externalities that ICE actions can impose on other agencies downstream.149 A part of the problem with the current arrangement is that the DOL exerts little influence over ICE enforcement decisions and—as was evident from the Goldsboro worksite raid—it is forced to internalize the costs of overzealous worksite raid decisions. So long as ICE remains the lead agency in the context of workplace enforcement and operates free from constraint, it will almost certainly continue to exercise its enforcement discretion in a manner that best serves its interests at the expense of those of the DOL.150 Because the immigration bureaucracy is comprised of multiple agencies, tension and disharmony will persist as constitutive features of the administration of U.S. immigration laws. Framed this way, interagency monitoring offers one way to harness the tension and diversity of viewpoints into something productive. 151 Therefore, my argument is that interagency tension can be productive provided that we can find an arrangement where labor agencies can exert greater influence over ICE’s workplace enforcement decisions. Put differently, monitoring requires embracing interagency tension while simultaneously reallocating power. Absent Ex ante monitoring requirements ICE will continue workplace raids and labor exploitation will be rampant Lee 11 --Acting Professor of Law University of California, Irvine School of La[Stephen, “Monitoring Immigration Enforcement”, (December 19, 2011). Arizona Law Review, Vol. 53, 2011; UC Irvine School of Law Research Paper No. 2012-01. Available at SSRN: http://ssrn.com/abstract=1974624 or http://dx.doi.org/10.2139/ssrn.1974624] RMT How should this relationship be structured? Historicall y, interagency arrangements have been either easily circumvented by bad-actor employers (e.g., interactions between agencies can productively inform the formation of strategy and policy as these agencies discuss enforcement goals and compliance definitions. Several years after IRCA was passed, different agencies began assessing whether and to what extent employers were complying with the prohibition against hiring unauthorized workers. The INS and the DOL each conducted their own studies, with the INS finding a 70–80% compliance rate and the DOL determining a 40% compliance rate.141 The DOL deemed an employer to be noncompliant if, after a workplace investigation, it sent a notice to the INS of the possible presence of an immigration-related violation. Although these two agencies could not agree on the meaning of employer compliance, this disagreement created the opportunity for what has been referred to in another context as a reason-producing conversation;142 it forced each agency to reconsider and refine its approach to a common goal. Although the precise contours of worksite reformation are beyond the scope of this Article, it is worth elaborating on how monitoring adjustments could place greater pressure on ICE officials to take the labor consequences of their decisions seriously. One robust form of monitoring would require ICE to obtain permission from the DOL before investigating a particular workplace . If, for example, ICE received a tip that a particular employer had hired unauthorized workers, before proceeding to investigate the workplace, ICE officials would have to confer with the DOL and other labor agencies to determine whether a laborrelated complaint had been filed against the employer.138 In other words, the DOL would have to affirmatively consent to the investigation before ICE could proceed. Such an arrangement would also serve to constrain the overzealous decisions of officials blinded by their mission orientation. Drawing inspiration from the Fourth Amendment example, this type of ex ante check would act as a constraint on the exercise of executive power.139 In a twist on the rationale that police officers are likely to see probable cause where none exists, history has shown that ICE officials are likely to ignore signs of labor exploitation where plenty exist. Against this backdrop, two questions concerning agency coordination emerge as central to solving the puzzle of workplace enforcement. First, why has the Department of Labor, our nation’s top labor enforcement agency, struggled to protect unauthorized workers against exploitative practices despite the scope and seriousness of the problem? And second, why has ICE, our nation’s top immigration enforcement agency, resisted taking into account the labor consequences of its actions?14 The answers to these questions can be traced to a peculiar dynamic: ICE, whose primary mission is to target noncitizens for detention and deportation, has relatively little interest in regulating the employer– unauthorized worker relationship, while the DOL has a relatively high interest but lacks the autonomy to effectively do so. Although ICE and the DOL are both charged with the duty of regulating employers for hiring unauthorized workers, their relationship has largely been an asymmetric one. ICE has been able to effectively dictate the terms of our nation’s workplace enforcement strategy and has largely been resistant or indifferent to the labor consequences of its decisions. Taken together, these dynamics, especially when combined with other exacerbating factors,15 tend to disrupt agency coordination and enable labor exploitation to persist. Moreover, traditional administrative law fixes do not offer easy or obvious solutions to the problem of asymmetric enforcement authority in the workplace. For example, as administrative law scholars well know, the President is free to use his oversight and monitoring powers to coordinate the enforcement priorities of the various agencies within the executive branch of the federal government. And President Obama has, more than his predecessors, demonstrated a willingness to use this power to bring immigration enforcement goals in line with labor enforcement goals. This oversight power, combined with the election of a President sympathetic to the interests of unauthorized workers and the appointment of a Secretary of Labor who shares those sympathies, should spell the end of the Department of Homeland Security’s (“DHS”) triumph over the DOL and the displacement of labor interests in the workplace. Yet, there are plenty of signs that DHS officials, who are steeped in a work culture geared toward law-and-order methods of regulation, have resisted the President’s entreaty to consider the labor consequences of their enforcement decisions. Change at the top offers no guarantee that change will easily follow at the bottom, at least in the divided world of workplace regulation. Another administrative law fix with intuitive appeal is agency splitting— the breaking apart of an agency and reallocation of authority. If the problem is that DHS tends to target unauthorized workers to the exclusion of the employers who hire and exploit these workers, then agency-splitting advocates would suggest transferring the latter power to labor agencies like the DOL, an agency with a mission orientation that might better accommodate an enforcement mandate involving employers. But past administrative experiments that even suggested that the DOL was empowered to directly regulate employers for immigration violations proved costly; often, labor officials ended up alienating unauthorized workers, the very cross-section of workers interagency collaboration should protect.16 Monitoring ICE decisions is possible and will be sucessful Braker 12—Columbia Law School [‘Julie. "Navigating the Relationship between the DHS and the DOL: The Need for Federal Legislation to Protect Immigration Workers' Rights." Colum. JL & Soc. Probs. 46 (2012): 329]RMT interagency monitoring,” which would provide an ex ante constraint on ICE to ensure that their immigration-enforcement actions do not interfere with labor enforcement.118 Labor agencies such as DOL could be empowered “to monitor DHS to ensure that immigration officials account for the labor consequences of their enforcement decisions.”119 Such an approach would enhance accountability between the DHS and DOL. This proposed system would specifically force ICE to take into consideration the effect of its actions on labor violations: For much of its history, ICE has been largely insulated against meaningful oversight as to its workplace enforcement decisions, enabling its officers to rely on tips, leads, and other information without considering whether an investigation enables a bad-actor employer to escape liability for labor violations or chills the reporting of labor violations by unauthorized workers.120 Since ICE does not internally monitor the impact of its actions on worksite enforcement, “only by moving in the direction of an ex ante constraint . . . that can be enforced by an external source . . . can any interagency arrangement hope to influence ICE.”121 Professor Lee’s proposal would require ICE to obtain permission from DOL before investigating a workplace, and perform a pre-investigation check prior to embarking on a civil in-vestigation .122 Such solutions could help balance the two agencies’ enforcement goals by giving DOL more One innovative solution, proposed by Professor Stephen Lee, would create a system of “ power than it currently has to voice concerns when ICE conducts immigration enforcement at given workplaces. The Stage is set—Obama’s executive order created a framework for interagency cooperation Gene T. Schaeffer, Jr. 14, a member of the Labor & Employment Practice Group, President Obama’s Executive Orders on Immigration – Interagency Cooperation and DOL Initiatives, The National Law Review, November 24, 2014, http://www.natlawreview.com/article/president-obama-s-executive-orders-immigration-interagency-cooperation-and-dol-initi ||RS On November 20, 2014, President Obama announced a series of executive actions designed to reduce the strain on the country’s immigration system. Many of these policies will have a direct effect on employers and the business community and demonstrate that the increased interagency cooperation and enforcement we have seen in recent years will continue. The President has ordered the creation of an interagency working group consisting of U.S. Department of Labor ( DOL), U.S. Department of Homeland Security ( DHS ), U.S. Department of Justice (DOJ), U.S. Equal Employment Opportunity Commission (EEOC) and the National Labor Relations Board (NLRB) to identify policies and procedures to promote the consistent enforcement of labor, employment and immigration laws. Two of the topics the working group will review include 1) promoting worker cooperation with enforcement authorities without fear of retaliation based on immigration status, and 2) ensuring that employers do not use federal agencies to undermine worker protection laws by introducing immigration authorities into labor disputes. DOL’s interagency working group fact sheet is available here. This interagency group appears to be ready to continue the DOL-DHS discussions that began with the signing in March 2011 of a Memorandum of Understanding (which has since been revised) between those two agencies governing their coordination with respect to their various civil enforcement activities and avoidance of conflicts. 2AC Labor Rights Backlines 2AC – Extension: Poverty Conflict Trap Poverty – Conflict correlation is true and foreign stimulus is best for stability Patrick 7 - senior fellow and director of the Program on International Institutions and Global Governance at the Council on Foreign Relations (CFR). Prior to joining CFR, he directed the Center for Global Development’s project on Weak States and U.S. National Security. [Stewart, “‘Too Poor for Peace?’ Global Poverty, Conflict, and Security in the 21st Century”, Washington, DC: Brookings Institution, 2007. http://www.wilsoncenter.org/sites/default/files/ECSPReport13_Patrick.pdf]RMT According to Berkeley economist Edward Miguel, “the poverty-violence link is arguably the most robust finding in the growing research literature investigating the causes of civil wars” (p. 51). But is poverty breeding violence, or vice versa? To answer this question, Miguel and two colleagues employ an intriguing natural experiment: They analyze the impact of drought—a purely exogenous economic shock that increases poverty—on state propensity for conflict in Africa. Their findings are startling: “The size of the estimated impact of lagged economic growth on conflict is huge,” Miguel writes, with a one percent decline in GDP “increasing the likelihood of civil conflict by more than two percentage points” (pp. 54-56). In contrast, they find little correlation between violent conflict and variables like political repression, democratic freedom, ethnic fragmentation, colonial history, or population density. In sum, “economic factors trump all others in causing African civil conflicts” (p. 55). Miguel suggests that this robust finding has clear policy implications: Very little foreign aid, he observes, addresses the immediate triggers of civil conflict. Donors could change this by directing a significant proportion of external assistance toward helping countries cope with the sharp income fluctuations created by exogenous shocks, such as poor weather or collapsing commodity prices. By extending such insurance, the international community could help remove support for rebel movements. 2AC – AT: Dutch Disease Turn Dutch disease false and good—Canada proves job losses are replaced by better jobs Payton 13—CBC News (cites Stephen Gordon, Professor of Public Policy at Calgary) [Laura, “'Dutch disease' builds healthier economy, economist says”, Sep 05, 2013, http://www.cbc.ca/news/politics/dutch-disease-builds-healthier-economy-economist-says1.1339490]RMT The concept behind "Dutch disease" — the idea that a resource boom is bad for the manufacturing sector — is entirely wrong , economist Stephen Gordon argues in a new report. Federal politicians have argued over Dutch disease as part of the debate surrounding Canada's oilsands and whether development should be slowed. The argument says that a resource boom — like the one seen in the oilsands — drives up the value of the currency, making exports more expensive for customers outside of Canada and costing manufacturers some of their business. That can in turn cause layoffs in the manufacturing sector, the theory holds.But Gordon argues in a report released today by the University of Calgary's School of Public Policy that job and wage numbers from 2002 to 2008 tell a different story. Job losses in the manufacturing sector were mainly due to attrition, he says. Workers quit and weren't replaced, but the jobs that were lost — mainly through attrition — were lower-paying jobs. And layoffs were in fact down compared to the 1990s, he writes. The companies were able to invest in more equipment and research and development, because most of the equipment comes from outside of Canada and cost less with the higher exchange rate. "The question becomes why are we calling it a disease," Gordon said in an interview with CBC News. "Losing employment isn't a bad thing if the jobs that were lost were lowpaying and the jobs that replaced them elsewhere were higher-paying and more of them." In his report, Gordon writes the number of jobs paying $35 per hour or more was largely unchanged between 2002 and 2008. More than 60 per cent of the manufacturing jobs lost paid less than $19.05/hour — the median wage in 2002, the report said. " The shift out of manufacturing was also accompanied by an increase in real wages, both in the economy as a whole and in the manufacturing sector.... The term 'Dutch disease' is a misnomer; the Canadian manufacturing sector was arguably healthier in 2008 than it was in 2002," Gordon wrote in the report. Best data proves no Dutch disease—two sector economies and Norway prove Thorsud and Bjornland 13--†BI Norwegian Business School and Norges Bank.[Hilde C. Bjørnland† Leif Anders Thorsrud‡“Boom or gloom? Examining the Dutch disease in a twospeed economy” August 13, 2013, This paper is part of the research activities at the Centre for Applied Macro and Petroleum economics (CAMP) at the BI Norwegian Business School. http://www.bi.edu/InstitutterFiles/Samfunns%C2%B0konomi/CAMP/Working_CAMP_62013.pdf ]RMT Traditional studies of the Dutch disease do not typically account for productivity spillovers between the booming energy sector and non-oil sectors . This study identifies and quantifies these spillovers using a Bayesian Dynamic Factor Model (BDFM). The model allows for resource movements and spending effects through a large panel of variables at the sectoral level, while also identifying disturbances to the real oil price, global demand and non-oil activity. Using Norway as a representative case study, we find that a booming energy sector has substantial spillover effects on the non-oil sectors. Furthermore, windfall gains due to changes in the real oil price also stimulates the economy, but primarily if the oil price increase is caused by global demand. Oil price increases due to, say, supply disruptions, while stimulating activity in the technologically intense service sectors and boosting government spending, have small spillover effects on the rest of the economy, primarily because of reduced cost competitiveness. Yet, there is no evidence of Dutch disease . Instead, we find evidence of a two-speed economy, with non-tradables growing at a much faster pace than tradables. Our results suggest that traditional Dutch disease models with a fixed capital stock and exogenous labor supply do not provide a convincing explanation for how petroleum wealth affects a resource rich economy when there are productivity spillovers between sectors. Dutch disease doesn’t hurt growth—meta studies and their evidence is flawed Magud and Sosa 11--Senior Economist at the International Monetary Fund, Senior Economist in the European Department, IMF [Nicolas Magud, Sebastián Sosa “When and why worry about real exchange-rate appreciation? The missing link between Dutch disease and growth”, 15 March 2011, http://www.voxeu.org/article/why-worry-about-real-exchange-ratesmissing-link-between-dutch-disease-and-growth]RMT In recent research (Magud and Sosa 2010), we examine whether the literature provides strong support for concerns about the potential adverse effects of the Dutch disease on long-term growth. To this end, we review over 60 papers on Dutch disease and on the relationship between the real exchange-rate and growth . To make systematic comparisons of the papers’ results, we construct simple indices to evaluate their partial and overall implications. In turn, the latter evidence is used to analyse the policy implications of Dutch-disease shocks. We document that Dutch disease does exist. Shocks that trigger foreign exchange inflows (such as natural resource booms, surges in capital inflows, foreign aid, remittances, etc.) lead to an appreciation of the real exchange rate, generate we do not find evidence that Dutch disease reduces economic growth . We also find that real exchange-rate misalignment – in particular when due to overvaluation – and higher volatility of the real exchange rate lower growth. Regarding the effect of undervaluation of the exchange rate on economic growth, the evidence is mixed and inconclusive. The figures below summarise the results. Most of the Dutch disease empirical literature focuses on the impact of foreign exchange inflows (natural resource booms, remittances, aid, etc.) on the real exchange rate and the reallocation of resources between the tradable and non-tradable sectors but does not examine the effects on long-term growth and does not analyse whether the adverse effects associated to Dutch disease offset the beneficial effects of inflows. Research in this area has typically not attempted to directly demonstrate the presence of spillovers or other growth-enhancing qualities in the tradable sector. Hence, the evidence on the negative impact of Dutch disease on growth is still partial, and generally inconclusive. factor reallocation, and reduce manufacturing output and net exports. However, crucially, 2AC – AT: Corruption Turn Best studies conclude remittances reduce corruption in context of the migrant workers in the states Tybruski 14 - Tulane University, Political Science Department, Department Member. [Michael D., "Curse or Cure? Remittances and Corruption in the Developing World" (2014). Theses and Dissertations. Paper]RMT In contrast, I argue that the relationship between remittances and corruption varies by regime type. Remittances will likely aggravate corruption in authoritarian regimes where governments require smaller supporting coalitions and may be more likely to view remittances as an opportunity to increase political patronage. Moreover, the costs of political activity are higher for remittance recipients in authoritarian regimes, and their probability of influencing corruption is lower. Remittances may help mitigate corruption, especially in democratic regimes . Democratic institutions require larger coalitions while lowering the costs of participation. I test the plausibility of my theory using cross-province level studies of Mexico and India-- two of the largest remittance-receiving states . Results from these cases do suggest that remittances associate with reductions in corruption while controlling for other socioeconomic and political causes. A third, cross-national study tests the theory’s generality. Empirical analyses of panel data from 127 developing states between 2000 and 2010 generally support my expectations . This research advances social science by refining theoretical implications of migrant remittances while providing an empirical account of their political importance. Moreover, it guides future projects to focus on the factors that make remittances a curse in some states and a cure in others. 2AC Cooperation Backlines 2AC – AT: ICE Raids Good/Alt Causes Curtailing ICE enforcement is key – they perpetuate the institutional racism present in civil society Bill Ong Hing 9, Professor of Law at University of California, Institutional Racism, ICE Raids, and Immigration Reform, University of San Francisco Law Review, Fall 2009, http://lawblog.usfca.edu/lawreview/wp-content/uploads/2014/09/5-SAN-44-2-Hing.pdf ||RS The United Food and Commercial Workers (“UFCW”) Commission heard repeated testimony about racial profiling. Witnesses testified that workers who appeared to be of Latino national origin or minorities were singled out by ICE and subjected to the greatest scrutiny . John Bowen, General Counsel for UFCW Local 7, said “race was, almost without question, the sole criteria for harsher interrogations” to which the workers were subjected at the Greeley, Colorado plant.45 Fidencio Sandoval, a U.S. citizen and Swift worker at the Grand Island, Nebraska, plant, recounted how he was treated differently by ICE agents because he appeared to be Latino: When they said all the U.S. citizens come over to this place, I went up there and I stood right by my boss. My boss showed his driver’s license and then he was free to go. I showed my driver’s license and my voting registration card and that was not enough. [The ICE agent] said, no, you need either your passport or citizenship certificate.46 Eventually, he was able to produce his documents, after his sister was able to go to his home, “break the window from my kitchen and go straight to my closet and get my citizen certificate.”47 Other U.S. citizen coworkers were not as fortunate. Those who did not have a way to prove their citizenship were arrested and taken to Camp Dodge, located nearly 300 miles from Grand Island. Manuel Verdinez was one of those U.S. citizen workers from the Marshalltown plant who was detained, arrested, handcuffed, and taken into custody. “I said I was a U.S. citizen, and then the [ICE] agent started scratching my ID. The agent . . . said they could not find my status. They put plastic cuffs around my wrists and put all of my belongings into a plastic bag.”48 After twelve hours in detention, “they found my record . . . and said they had made a mistake. Then [the ICE agent] finally took off my handcuffs . . . [t]hey called a cab for me and I had to pay $90 for the cab ride back.”49 ICE raids and increased enforcement are poisoning communities, spawning scores of state and local anti-immigrant laws and ordinances that target Latinos. All of this increases discrimination. According to Sam Zamarripa, president of the Board of Directors of the Georgia Association of Latino Elected Officials and a former State Senator in Georgia, these policies are led and advanced by white supremacist organizations.50 ICE raids represent the worst form of psychological trauma for children – only the plan curtails ICE power Bill Ong Hing 9, Professor of Law at University of California, Institutional Racism, ICE Raids, and Immigration Reform, University of San Francisco Law Review, Fall 2009, http://lawblog.usfca.edu/lawreview/wp-content/uploads/2014/09/5-SAN-44-2-Hing.pdf ||RS Family separation and the special damage to children have been particularly tragic consequences of the ICE raids.57 Most of the children impacted by raids were U.S. citizens and most were very young— about two-thirds were under ten and about one-third were under age five.58 In three sites studied by the National Council of La Raza, researchers found that “families and relatives scramble[d] to rearrange care, children spent at least one night without a parent, often in the care of a relative or nonrelative babysitter, in some cases neighbors and in some cases even landlords; some children were cared for by extended families for weeks and months.”59 Families directly affected by the raid also suffered economic hardship and financial instability that “creates conditions that are detrimental to children’s development.”60 The National Council of La Raza study also analyzed the emotional and mental side effects upon children. While the long-term effects of the raids are still unraveling, psychologists have already observed and are concerned about longterm depression and other mental illness in family members. The report found that younger children translated the temporary parental absence as abandonment. One parent reported that her child feared that her father “love[s] money more than he loves me.”61 According to Dr. Amaro Laria, Director of the Lucero Latino Mental Health Training Program at the Massachusetts School of Professional Psychology and faculty of the psychiatry department at Harvard Medical School, “[o]ne of the most well established facts in mental health is that abrupt separation of children from their parents, particularly their mothers, are among the most severely traumatic experiences that a child can undergo.”62 He testified that in the case of the raid, the “traumatic separations [were] perpetrated and sanctioned by our nation’s law enforcement agencies, ironically in the name of protecting citizens.”63 In his opinion, ICE had engaged in terrorism against these families and children . Dr. Laria told the Commission about a young girl, Deanna, who said, “she wanted to kill herself because her mother had abandoned her.”64 Dr. Laria also testified about a girl who called 911 looking for her mother and a young “desperate father, who, after his wife was imprisoned, had to rush their infant daughter to the emergency room with severe dehydration because she hadn’t been breastfed for days.”65 ICE raids foist severe damage on communities – the plan is key Bill Ong Hing 9, Professor of Law at University of California, Institutional Racism, ICE Raids, and Immigration Reform, University of San Francisco Law Review, Fall 2009, http://lawblog.usfca.edu/lawreview/wp-content/uploads/2014/09/5-SAN-44-2-Hing.pdf ||RS ICE raids and increased enforcement have caused severe social and civic damage and major setbacks for many communities . In Iowa, communities had developed several successful initiatives designed to stimulate the assimilation of immigrants into the fabric of the communities where they resided. Great progress toward integration and understanding had taken place in Marshalltown.66 But the ICE raid undid much of that progress . The raid had given some members of the community “a justification for discriminating against all immigrants, E. Damage to Communities documented or not.”67 Raids also hurt local economies. Jorge Avellanada, city council member and a business leader in Chelsea, Massachusetts, told the Commission that the raids resulted in a thirty percent decline in sales due in part to the fear that workers had about going to work, shopping, or going about their normal business.68 The negative ramifications of the raids on communities manifest themselves in other ways. Increased enforcement and high profile military-style raids have resulted in the immigrant community being afraid to report abuse or crime for fear of being turned over to ICE.69 2AC – AT: Police Community Relations High Latino – Police relations are very low - surveys Brenda Gazzar 14, reporter, 12-28-2014, "Latino distrust of law enforcement runs high in national survey," Los Angeles Daily News, http://www.dailynews.com/governmentand-politics/20141228/latino-distrust-of-law-enforcement-runs-high-in-national-survey ||RS Miguel Hernandez can’t think of any friends or family offhand who have suffered from police brutality. But he does worry about excessive force by police against Latinos in general. “You see it a lot, unfortunately, on Facebook,” the 42-year-old Highland Park resident, who works as a taking things too far, where officers are crossing the line .” While a vast majority (84 percent) of Latino adults nationwide believe local police are there to protect them and their families, 18 percent said they have friends or family who were victims of police brutality and more than two-thirds worry that law enforcement will use excess force against Latinos, according to the W.K. Kellogg Foundation’s “State of the Latino Family” survey of about 1,000 Latino adults. The survey’s results were released last month. “It reminds us that we’ve still got a long way to go in terms of the relationship between communities and law enforcement, and we need to be very loan officer in the San Fernando Valley, said. “ Cops intentional about improving skills and capacities for better relationships at the community level,” said Gail Christopher, vice president for policy and senior adviser at the W.K. Kellogg Foundation. “We saw that in Ferguson, and I think it’s true with Latino young people in general.” There were other signs of distrust. Thirty-seven percent of survey respondents, which also included some undocumented and legal permanent residents, said that local police, border patrol and other law enforcement authorities “usually treated Latinos unfairly,” while 28 percent said they “were sometimes treated fairly.” Thomas A. Saenz, president and general counsel of the Mexican American Legal Defense and Educational Fund and a San Gabriel Valley resident, believes that a worrisome national context is contributing to this distrust, including the prominence of figures like Arizona’s Maricopa County Sheriff Joe Arpaio. A federal district court ruled last year that Arpaio violated the U.S. Constitution by using racial profiling as well as illegal detentions that targeted Latinos. Latinos’ views of law enforcement are also likely colored by Arizona’s Senate Bill 1070, which was signed into law in 2010 and requires police to determine the immigration status of someone arrested or detained when there’s “reasonable suspicion” that he or she is undocumented, Saenz said. Similar laws that “invite racial profiling” have been passed in five other states and have all been challenged, he said. More recently, the Obama administration reissued guidelines about racial profiling that retain an exception in areas within 100 miles of an international border or ocean, where there are large numbers of Latinos, he said. “These are national issues, not California-specific, that get a lot of media attention,” Saenz said. “I think that even for a state that is more progressive like California, it can contribute to distrust of law enforcement.” Among the survey’s respondents who would change something about their police department, 16 percent said they wanted better community policing, 12 percent said they wanted it to treat people with respect, and 12 percent said they wanted it to stop discrimination and racism. Six percent said they wanted their department to stop abuse/violence against the public. In Los Angeles, Latino-police relations reached a low point in 2007 after officers used batons and rubber bullets to disperse a mostly peaceful gathering at a May Day immigrant rights rally at MacArthur Park. The incident, which resulted in more than 250 reported injuries, was prompted by a small group of protesters throwing bottles and other objects, according to authorities. An LAPD Police Commission report faulted inadequate planning and tactical failures for the melee. Activists say that LAPD has made significant headway in improving relations with Latinos in recent years. They cite a series of community-outreach efforts and the July announcement that LAPD will no longer honor most federal requests to detain undocumented immigrants arrested for minor offenses so that they can be deported. But Xiomara Corpeno, director of community education for the Coalition for Humane Immigrant Rights of Los Angeles, said there are still some officers who abuse their badge by using intimidation tactics, such as making comments about someone’s race or immigration status, with street vendors or young men of color in their neighborhoods. ”The main thing is how do we get rank-and-file police officers to act according to their own internal regulations?” she said. “LAPD regulations say they’re not supposed to be harassing people based on immigration status.” LAPD Lt. Alfred Labrada, the Latino outreach liaison for Police Chief Charlie Beck, said any inappropriate actions or comments about immigration status that are reported are thoroughly investigated. “If there is an allegation of misconduct, we will act accordingly and take action especially if we Sometimes the immigrant community will confuse their police agency with Immigration and Customs Enforcement or another law enforcement find it to be true,” he said. entity, which can distort one’s view , Labrada said. In addition, many Latino immigrants came from authoritarian regimes where they cannot report inappropriate incidents, which can lead to a similar but misplaced distrust of police here, he said. 2AC Topicality 2AC – T Surveillance We Meet – the plan restricts information collecting on immigrants– that’s surveillance Ellen Nakashima 14, a national security reporter for the Washington Post, 2-18-2014, "Homeland Security is seeking a national license plate tracking system," Washington Post, http://www.washingtonpost.com/world/national-security/homeland-security-is-seeking-anational-license-plate-tracking-system/2014/02/18/56474ae8-9816-11e3-9616d367fa6ea99b_story.html |RS The national license-plate recognition database, which would draw data from readers that scan the tags of every vehicle crossing their paths, would help catch fugitive illegal immigrants , according to a DHS solicitation. But the database could easily contain more than 1 billion records and could be shared with other law enforcement agencies, raising concerns that the movements of ordinary citizens who are under no criminal suspicion could be scrutinized. A spokeswoman for DHS’s Immigration and Customs Enforcement agency ( ICE ) stressed that the database “could only be accessed in conjunction with ongoing criminal investigations or to locate wanted individuals.” The database would enhance agents’ and officers’ ability to locate suspects who could pose a threat to public safety and would reduce the time required to conduct surveillance , ICE spokeswoman Gillian Christensen said. We meet - ICE conducts raids include 24 hour surveillance Brianna Lee 15, IBT writer who covers U.S. immigration and Latin America, 6-19-2015, "The Expensive Business Of Immigration Detention In The U.S.," International Business Times, http://www.ibtimes.com/expensive-business-immigration-detention-us-1685018 ||RS Family detention, and immigrant detention in general, have long been targets of criticism from human rights advocates who say the U.S. government detention beds are reserved for unauthorized immigrants who pose the greatest risks to public security. But ICE has often detained lower-risk immigrants: a 2009 ICE report stated that the majority of immigrant detainees were considered to have has defaulted to a prison model for unauthorized immigrants, including those without criminal convictions. In theory, a “low propensity for violence.” In the case of family detentions, the rationale is less rooted in public security concerns and more on the government’s desire to ensure that immigrants appear at their court hearings. The family detention center in Artesia, New Mexico, has been a particular sticking point for immigrants’ rights advocates; a coalition of civil rights groups filed a lawsuit against the federal government last month over what they said were abhorrent conditions and lack of due process for immigrants there. But detention is also expensive, costing an estimated $164 a day per detainee. A large chunk of that money goes to the private prison companies that operate more than half of the immigrant detention beds around the country. With at least 34,000 immigrants in detention every day, this cost amounts to more than $2 billion in taxpayer funds every year. Meanwhile, the U.S. has another cheaper option that is readily available, at a maximum cost of just $17 a day per person. Alternative-to-detention (ATD) programs have been a part of ICE’s operations for several years. These programs generally require no full-time facility or 24-hour surveillance; immigrants are supervised by case managers through period check-ins and, at times, unannounced home visits. One ATD program involves the use of electronic ankle monitors to track immigrants’ whereabouts, a method that has faced some backlash from advocacy groups. Several non-profits around the country run ATD programs of their own, providing supervision and care for immigrants awaiting deportation hearings. These programs are estimated to cost anywhere between 17 cents to $17 a day per person. Counter interpretation – surveillance is data collection Verri 14 – Gabriela Jahn Verri, Federal University of Rio Grande do Sul, “GOVERNMENT AND CORPORATIVE INTERNET SURVEILLANCE”, World Summit on the Information Society Forum, http://www.ufrgs.br/ufrgsmun/2014/files/WSI1.pdf David Lyon describes governmental and corporative surveillance as the “focused, systematic, and routine attention to personal details for purposes of influence, management, protection, or direction” (Lyon 2007, 14). The most common form this practice takes in the context of information and communication technologies (hereinafter ICT) is still so-called data surveillance, which implies the collection and retention of information about an “identifiable individual”, often from multiple sources3, which help recognize multiple activities and establish a pattern of behavior in both the virtual and material realms (Stanley & Steinhardt 2003, 3). Although less common and fairly recent, institutional Internet surveillance may also acquire the shape of media surveillance, done by means of – recognized or ignored – image (still or video) and sound hoarding through a subject’s personal apparatus such as private webcams and microphones, as well as screen-recording (RWB 2013, 9-33; Stanley & Steinhardt 2003, 2-4)4. Prefer – No bright line – no evidentiary distinction between routine and repetitive raids – contrived interps are bad since they skew debate to the neg since they can always construct a violation to bracket out the aff Overlimits – excludes drug testing, aeriel surveillance, and stop and frisk – they force us to only debate the snowden revelations. No ground loss and limits explosion– core generics, substantial, federal, and domestic check. Reasonability – competing interpretations creates a race to the bottom which crowds out substance 2AC - T Domestic We meet- Domestic” surveillance is defined by the target---the subject of surveillance must be U.S. persons Donohue 6 – Laura K. Donohue, Fellow, Center for International Security and Cooperation, Stanford University, “ANGLO-AMERICAN PRIVACY AND SURVEILLANCE”, Journal of Criminal Law & Criminology, Spring, 96 J. Crim. L. & Criminology 1059, Lexis 5. The Foreign Intelligence Surveillance Act As the extent of the domestic surveillance operations emerged, Congress attempted to scale back the Executive's power while leaving some flexibility to address national security threats. n183 The legislature focused on the targets of surveillance, limiting a new law to foreign powers, and agents of foreign powers - which included groups "engaged in international terrorism or activities in preparation therefor." n184 Congress distinguished between U.S. and nonU.S. persons , creating tougher standards for the former. n185 [FOOTNOTE] n185. The former included citizens and resident aliens, as well incorporated entities and unincorporated associations with a substantial number of U.S. persons. Non-U.S. persons qualified as an "agent of a foreign power" by virtue of membership - e.g., if they were an officer or employee of a foreign power, or if they participated in an international terrorist organization. Id. 1801(i). U.S. persons had to engage knowingly in the collection of intelligence contrary to U.S. interests, the assumption of false identity for the benefit of a foreign power, and aiding or abetting others to the same. Id. 1801(b). [END FOOTNOTE] Counter interpretation - “Domestic surveillance” refers to targets that are within the U.S.---this is the most accurate and historically grounded interpretation and vital to precise topic education Wainstein 7 – Kenneth L. Wainstein, Assistant Attorney General for National Security on FISA Modernization at the Georgetown University Law Center’s National Security Center, Prepared Remarks at the Department of Justice, 9-10, http://www.justice.gov/archive/opa/pr/2007/September/07_nsd_699.html This conference is a great idea. It gives us an opportunity to share thoughts about where our surveillance authorities should be -- how the powers should be defined and where the lines should be drawn. And the line I’d like to talk about today is the line between domestic surveillance and overseas surveillance – how the law should distinguish between those two areas of surveillance and how much each area should be subject to judicial review. There is no question that we should have to get court orders when we want to collect domestic communications or target individuals within the U.S. The question for today is whether we should have to do so when we are targeting surveillance against a person who is outside the United States, where constitutional and privacy protections do not apply. And, this is not a discussion with only legal or theoretical implications. There are very practical, operational implications here -- implications that will dictate whether we have sufficient coverage overseas or only narrow coverage of our foreign adversaries; whether we can move nimbly and quickly among overseas coverages, or whether we have to go through a resource-consuming court approval process before we go up on one of our adversaries. In considering this issue, it’s useful to look back at the history and the evolution of our surveillance laws. And, when you do that you see that this is a recurring theme . There have been a number of major turning points in the law along the way, and at each of these turning points, we’ve seen the repetition and reinforcement of this fundamental distinction between foreign and domestic surveillance -- a distinction that finds its origins in the Constitutional balancing between executive authority to take efforts to protect the nation against external threats and the judiciary’s authority to protect privacy interests. You can see this consistent theme as you go back through the evolution of the law. The first turning point in the development of our surveillance law came in the 1960s. In 1967, the Supreme Court held that telephone conversations were protected by the Fourth Amendment. The next year, Congress responded to the Court’s decision by passing the wiretap statute that established a procedure by which the government had to secure a court-issued warrant before wiretapping the subject of a criminal investigation. While both the Supreme Court decision and the ensuing legislation were clear on the need for a warrant requirement when the government was wiretapping a person in the United States for purposes of a criminal investigation, both the Court and Congress were very careful to carve out surveillances for national security purposes. They made it clear that domestic surveillance for evidence in a criminal case was covered by the warrant requirement, but that national security surveillance involving foreign threats was not. The next turning point came a decade later, when Congress passed the Foreign Intelligence Surveillance Act, which imposed a court review mechanism for electronic surveillance designed to collect foreign intelligence information. We came to this juncture after it was disclosed in the Church and Pike Hearings that the government had abused its flexibility in the area of national security investigations to investigate domestic persons who had no connection to a foreign power. After those disclosures, Congress and the country were understandably looking for a way to ensure that the executive branch could no longer invade their privacy under the guise of protecting against foreign threats. The result was legislation that subjected our foreign intelligence surveillances to court review. The Foreign Intelligence Surveillance Act (FISA) was passed in 1978, and it created a regime of court approval for national security surveillances. However, once again, Congress reinforced the distinction between domestic and foreign surveillance. Congress designed a judicial review process that would apply primarily to surveillance activities within the United States where privacy interests are the most pronounced and not to overseas surveillance where privacy interests are minimal or non-existent. Congress gave effect to this careful balancing through its definition of the statutory term “electronic surveillance,” the term that identifies those government activities that fall within the scope of the statute and, by implication, those that fall outside it. Congress established this dichotomy by defining “electronic surveillance” by reference to the manner of the communication under surveillance -- by distinguishing between “wire” communications -- which included most of the local and domestic traffic in 1978 -- and “radio” communications -- which included most of the transoceanic traffic in that era. Based on the communications reality of that time, that dichotomy more or less accomplished the Congressional purpose, as it distinguished between domestic communications that generally fell within FISA and foreign international communications that generally did not. But, that finely-balanced distinction has eroded with the dramatic changes in communications technology in the 29 years since FISA was enacted. In that time, we’ve seen the migration of the majority of international communications from satellite transmission (which qualified as “radio” communications under the statute) over to fiber-optic cable (which is “wire” under the statute); and, as a result, we’ve seen the tipping of that careful balance in the FISA statute. As the technology evolved further and further away from the paradigm established in the statute, we had to subject more and more of our overseas collections to review by the FISA Court. So we had a situation where, on one hand, we have this technological change making it more difficult for us to surveil overseas threats. And on the other, we have the backdrop of an increasing national security threat from international terrorism -- from terrorists who had hit us hard on 9/11; who were bent on inflicting catastrophic damage to us and our allies; who were taking full advantage of modern modes of communication to organize and command their international network of terrorist operatives; and who have continued to show resiliency and a determination about their work -- as reflected quite clearly in the disruption last week of a largescale terrorist plot in Germany, and also as reflected in the recently-issued National Intelligence Estimate. And it is the combination of these two historical trends -- the changing technology that handicapped our efforts to surveil our adversaries and the increasing threat posed by those adversaries -- that produced the turning point we came to this year. And, this is the turning point that Congress addressed last month when they passed the Protect America Act. The legislation was very straight-forward but very effective. In short, it returned FISA to its original focus on domestic surveillance. And it did that by making it clear that -- regardless of the type of communication being surveilled or the location where the surveillance takes place -- FISA does not apply when the surveillance is targeting persons outside the United States . It does apply – and we have to get a court order – when the communications are domestic or when we target someone in the U.S. But, when the target is truly foreign , when we’re targeting someone in another country , we don’t need to go through the FISA Court. Prefer our interpretation: Education about immigration is important The Leadership Conference no date –The Leadership Conference on Civil and Human Rights (The Leadership Conference), formerly called the Leadership Conference on Civil Rights, is an umbrella group of American civil rights interest groups.[1][2] Beginning in 1950 with 30 organizations, mostly civil rights and labor groups, now more than 200 national organizations that comprise The Leadership Conference.[The Leadership Conference “Why You Should Care About Immigration” http://www.civilrights.org/immigration/care.html?referrer=https://www.google.com/]RMT Immigration policy affects all aspects of society. Regardless of status, immigrants have always played a central role in the life and growth of our nation. Immigrants contribute $10 billion a year to this country's economic growth. Unfortunately, in the wake of September 11 terrorist attacks, immigrants in the United States have increasingly been targets of discrimination and suspicion. Our country must be defended, but one must not forget this nation's commitment to the ideals of equality and freedom for all peoples. The Palmer Raids, the McCarran-Walter Act, the Chinese Exclusion Act, and Japanese internment all serve as painful reminders of how our overreactions can have drastic implications for the civil rights of those who are not perceived as being fully "American." Predictability – they justify restricting surveillance on citizens abroad or traitors seeking asylum Overlimiting – all immigration, incoming foreigners, and espionage affs are excluded. Precision - “Domestic surveillance” refers to targets that are within the U.S.---this is the most accurate and historically grounded interpretation and vital to precise topic education Wainstein 7 – Kenneth L. Wainstein, Assistant Attorney General for National Security on FISA Modernization at the Georgetown University Law Center’s National Security Center, Prepared Remarks at the Department of Justice, 9-10, http://www.justice.gov/archive/opa/pr/2007/September/07_nsd_699.html This conference is a great idea. It gives us an opportunity to share thoughts about where our surveillance authorities should be -how the powers should be defined and where the lines should be drawn. And the line I’d like to talk about today is the line between domestic surveillance and overseas surveillance – how the law should distinguish between those two areas of surveillance and how much each area should be subject to judicial review. There is no question that we should have to get court orders when we want to collect domestic communications or target individuals within the U.S. The question for today is whether we should have to do so when we are targeting surveillance against a person who is outside the United States , where constitutional and privacy protections do not apply. And, this is not a discussion with only legal or theoretical implications. There are very practical, operational implications here -- implications that will dictate whether we have sufficient coverage overseas or only narrow coverage of our foreign adversaries; whether we can move nimbly and quickly among overseas coverages, or whether we have to go through a resource-consuming court approval process before we go up on one of our adversaries. In considering this issue, it’s useful to look back at the history and the evolution of our surveillance laws. And, when you do that you see that this is a recurring theme . There have been a number of major turning points in the law along the way, and at each of these turning points, we’ve seen the repetition and reinforcement of this fundamental distinction between foreign and domestic surveillance -- a distinction that finds its origins in the Constitutional balancing between executive authority to take efforts to protect the nation against external threats and the judiciary’s authority to protect privacy interests. You can see this consistent theme as you go back through the evolution of the law. The first turning point in the development of our surveillance law came in the 1960s. In 1967, the Supreme Court held that telephone conversations were protected by the Fourth Amendment. The next year, Congress responded to the Court’s decision by passing the wiretap statute that established a procedure by which the government had to secure a court-issued warrant before wiretapping the subject of a criminal investigation. While both the Supreme Court decision and the ensuing legislation were clear on the need for a warrant requirement when the government was wiretapping a person in the United States for purposes of a criminal investigation, both the Court and Congress were very careful to carve out surveillances for national security purposes. They made it clear that domestic surveillance for evidence in a criminal case was covered by the warrant requirement, but that national security surveillance involving foreign threats was not. The next turning point came a decade later, when Congress passed the Foreign Intelligence Surveillance Act, which imposed a court review mechanism for electronic surveillance designed to collect foreign intelligence information. We came to this juncture after it was disclosed in the Church and Pike Hearings that the government had abused its flexibility in the area of national security investigations to investigate domestic persons who had no connection to a foreign power. After those disclosures, Congress and the country were understandably looking for a way to ensure that the executive branch could no longer invade their privacy under the guise of protecting against foreign threats. The result was legislation that subjected our foreign intelligence surveillances to court review. The Foreign Intelligence Surveillance Act (FISA) was passed in 1978, and it created a regime of court approval for national security surveillances. However, once again, Congress reinforced the distinction between domestic and foreign surveillance. Congress designed a judicial review process that would apply primarily to surveillance activities within the United States where privacy interests are the most pronounced and not to overseas surveillance where privacy interests are minimal or non-existent. Congress gave effect to this careful balancing through its definition of the statutory term “electronic surveillance,” the term that identifies those government activities that fall within the scope of the statute and, by implication, those that fall outside it. Congress established this dichotomy by defining “electronic surveillance” by reference to the manner of the communication under surveillance -- by distinguishing between “wire” communications -- which included most of the local and domestic traffic in 1978 -- and “radio” communications -- which included most of the transoceanic traffic in that era. Based on the communications reality of that time, that dichotomy more or less accomplished the Congressional purpose, as it distinguished between domestic communications that generally fell within FISA and foreign international communications that generally did not. But, that finely-balanced distinction has eroded with the dramatic changes in communications technology in the 29 years since FISA was enacted. In that time, we’ve seen the migration of the majority of international communications from satellite transmission (which qualified as “radio” communications under the statute) over to fiber-optic cable (which is “wire” under the statute); and, as a result, we’ve seen the tipping of that careful balance in the FISA statute. As the technology evolved further and further away from the paradigm established in the statute, we had to subject more and more of our overseas collections to review by the FISA Court. So we had a situation where, on one hand, we have this technological change making it more difficult for us to surveil overseas threats. And on the other, we have the backdrop of an increasing national security threat from international terrorism -- from terrorists who had hit us hard on 9/11; who were bent on inflicting catastrophic damage to us and our allies; who were taking full advantage of modern modes of communication to organize and command their international network of terrorist operatives; and who have continued to show resiliency and a determination about their work -- as reflected quite clearly in the disruption last week of a large-scale terrorist plot in Germany, and also as reflected in the recently-issued National Intelligence Estimate. And it is the combination of these two historical trends -- the changing technology that handicapped our efforts to surveil our adversaries and the increasing threat posed by those adversaries -- that produced the turning point we came to this year. And, this is the turning point that Congress addressed last month when they passed the Protect America Act. The legislation was very straight-forward but very effective. In short, it returned FISA to its original focus on domestic surveillance. And it did that by making it clear that -- regardless of the type of communication being surveilled or the location where the surveillance takes place -- FISA does not apply when the surveillance is targeting persons outside the United States . It does apply – and we have to get a court order – when the communications are domestic or when we target someone in the U.S. But, when the target is truly foreign , when we’re targeting someone in another country , we don’t need to go through the FISA Court. No limits explosion – substantial, circumvention, and solvency advocates check Reasonability is best – competing interps creates a race to the bottom that crowds out substance 2AC Counterplans 2AC - Courts CP Permutation do both – courts shield the link Restricting legal authority doesn’t stop the DHS Kalhan 13--Associate Professor of Law, Drexel University. A.B., Brown University; M.P.P.M., Yale School of Management; J.D., Yale Law School.[Anil, “Immigration Policing and Federalism Through the Lens of Technology, Surveillance, and Privacy”, (August 6, 2013). Ohio State Law Journal, Vol. 74, 2013; Drexel University School of Law Research Paper No. 2013-A-05. Available at SSRN: http://ssrn.com/abstract=2316327]RMT In the wake of these controversies, the legal authority for Secure Communities has remained unclear . No statute unquestionably authorizes the program or mandates state and local participation, and no regulations specifically govern its operations.107 In addition to appropriations legislation, DHS has cited the general provision authorizing the Attorney General to maintain and disseminate crime-related records—the same general provision under which the FBI has issued regulations governing the NCIC and IAFIS— and a provision in the Visa Reform Act of 2002 directing the federal government to make its database systems interoperable and “readily and easily accessible” to federal immigration officials “responsible for determining an alien’s admissibility . . . or deportability.”108 However, the authority cited by DHS is not unambiguous. The Attorney General’s general criminal recordkeeping authority—whose “very general nature” long had prompted the FBI to act “cautiously” in how it maintained and disseminated state and local records in its possession—limits sharing of those records to “authorized” federal officials, leaving unanswered the extent of any authority to disseminate FBI-maintained fingerprint records to DHS.109 Moreover, while the Visa Reform Act seems to clearly authorize access to FBI records when immigration or consular officials need to make particular decisions about visa issuance, admissibility, or deportability, it is less clear that the provision authorizes the routine bulk transmission to DHS of all state and local identification records in its possession—on an ongoing basis as it receives them—of both U.S. citizens and noncitizens in the absence of specific, pending immigration-related decisions for which DHS needs that information. Other provisions in the same statute direct the President to place limits on the use and dissemination of the information shared by federal law enforcement agencies with immigration officials, including mechanisms “to ensure that such information is used solely to determine whether to issue a visa to an alien or to determine the admissibility or deportability of an alien to the United States” and “to protect any privacy rights of individuals who are subjects of such information.”110 While these provisions specify no programmatic details, they do indicate that Congress appropriately intended for information sharing to be carefully limited—quite possibly only for purposes of discrete, pending, immigration-related decisions involving particular individuals. Courts fail – Regulatory Agencies key Chen 12--Associate Professor, University of Colorado Law School [Ming Hsu, Where You Stand Depends on Where You Sit: Bureaucratic Incorporation of Immigrants in Federal Workplace Agencies (March 9, 2012). Berkeley Journal of Employment and Labor Law, 2012; U of Colorado Law Legal Studies Research Paper No. 12-03. http://ssrn.com/abstract=2019181 or http://dx.doi.org/10.2139/ssrn.2019181] “Immigrant incorporation” refers to the inclusion of noncitizens into society and can occur along economic, social, political, and cultural dimensions.67 It speaks to the mechanisms that bring someone into full membership in a community, a topic of growing interest among immigration scholars across academic disciplines.68 The social science literature on immigrant incorporation focuses on institutions as a key component of the immigrant-receiving society, namely the United States, and attempts to unpack the processes by which immigrants are absorbed into that society.69 While scholars studying immigrant incorporation traditionally focused on non-state institutions such as civic organizations,70 unions and worker groups,71 interest groups,72 and social movement organizations,73 increasing interdisciplinary attention is being paid to government institutions as sites of immigrant incorporation.74 An emerging body of scholarship turns to bureaucracies as sites of immigrant incorporation and to the important role that they play in policy implementation.75 The attention to bureaucracies partly reflects scholarly recognition that formal legal status is disaggregated into a bundle of rights.76 The rights within that bundle can also be reordered; that is, the grant of formal legal status that accompanies political incorporation of immigrants need not precede social or economic rights for immigrants. In some circumstances, economic rights or social rights provide the foundation for subsequent belonging, and so the rights of membership for noncitizens can follow the extension of social and economic rights. For example, rights in the workplace have proved to be an important precursor for immigrants’ full membership in the broader community.77 At least on the books, workplace protections protect all workers from unsafe conditions, unfair wages, and discrimination on the basis of statutorily enumerated classe s.78 Theorists of bureaucratic incorporation suggest that one alternative to relying on Congress or courts to protect immigrant workers is looking to regulatory agencies charged with enforcing labor and employment laws. More specifically, bureaucracy scholars seek to explain the behaviors of civil servants and street-level bureaucrats working to enforce statutes and case law and to implement administrative policies in their daily work.79 Many everyday law enforcement tasks occur in agencies vested with responsibility to implement statutes that call on exercises of bureaucratic discretion and expertise. In the open spaces and ambiguities within these laws, agencies must set their own priorities. Scholars in political science and administrative law have long written about the central place of discretion in policy implementation80 although only recently in the immigrant context.81 Bureaucratic discretion results from a confluence of factors, including public-spiritedness, an ethic of professionalism, rational self-interest, and political control exerted by elected leadership.82 In the context of regulatory agencies with mandates to enforce specific statutes, the tension between politics and legal professionalism provides a focal point for understanding the motivations of career civil servants. These conflicts frequently arise when agencies share “regulatory space.”83 Shared regulatory space can take the form of overlapping agency functions; related jurisdictional assignments; interacting jurisdictional assignments; and delegations requiring concurrence. Similar conflicts can also exist within agencies that must advance multiple goals or that are tasked with enforcing multiple statutes in tension with one another.84 In each scenario, how to do “the right thing” is not clear: bureaucrats must engage in statutory interpretation when exercising discretion and implementing their competing mandates. Court rulings irrelevant – they defer to agency interpretation Cox 8 - Assistant Professor of Law, The University of Chicago Law School. [Adam B, “DEFERENCE, DELEGATION AND IMMIGRATION LAW” THE LAW SCHOOL THE UNIVERSITY OF CHICAGO, February 2008, http://chicagounbound.uchicago.edu/cgi/viewcontent.cgi?article=1085&context=public_law_a nd_legal_theory]RMT The history of immigration jurisprudence is a history of obsession with judicial deference. The foundational doctrine of constitutional immigration law—the “plenary power” doctrine—is centrally concerned with such deference.1 Under the doctrine’s earliest incarnation, the Supreme Court treated a challenge to a federal immigration policy excluding Chinese immigrants as nearly nonjusticiable, writing that the federal government’s decisions about how to regulate immigration were “conclusive upon the judiciary.”2 Even in the modern constitutional era, the Supreme Court has invoked the plenary power to justify watered-down review of gender classifications in the immigration code.3 And some lower courts have suggested that the plenary power precludes any judicial scrutiny of immigration decisions affecting arriving immigrants. 4 This century-old doctrine has been augmented by developments in administrative law that often obligate judges to defer to agencies’ factual and legal judgments. The Chevron doctrine is perhaps the bestknown strand of these developments. Under Chevron, courts must defer to reasonable agency interpretations of ambiguous statutory provisions, even if the court disagrees with those interpretations.5 Sister doctrines in administrative law counsel courts to defer to factual determinations by agencies as well. Taken together, these constitutional traditions and administrative law trends would appear to make it inevitable that federal courts will passively accept administrative judgments on immigration matters. Warranted ICE raids are bad – the counterplan still allows for data collection which can authorize warranted invasions – those chill community participation and undermine labor rights Doesn’t solve workplace raids – 4th amendment precedent is based on rights of citizens in the home, not at work 2AC – Bioterror CP Permutation do both CP doesn’t solve Eric Merriam 14, Lieutenant Colonel at the United States Air Force, June 2014, The International Legal Regime Affecting Bioterrorism Prevention, National Security Law Journal, http://papers.ssrn.com/sol3/papers.cfm?abstract_id=2478444 ||RS there exists no independent verification mechanism in the biological weapons arena. Without a verification mechanism, states and non-state actors alike can act with relative impunity, so long as their activities remain relatively hidden from international scrutiny. The political and practical difficulties of verification in the bioweapons arena make it unlikely a comprehensive verification scheme will be implemented in the foreseeable future. Unfortunately, there is little political will among some of the major players -- importantly, the United States -- for creating a verification mechanism. The United States' stated basis for opposing a As discussed above, unlike the nuclear and chemical weapons arenas, verification mechanism is that it is unlikely to expose illicit activities, a claim with substantial merit given dual use problems and difficulty in locating biological activity without a state's assistance. However, the likely real primary basis for the United States' position is the objection of the United States pharmaceutical industry, based on concerns over trade 34 secrets, industrial espionage, and commercial restrictions. Whether these fears are justified, especially in light of the chemical industry's ability to create a workable verification mechanism under the CWC under which companies protect trade secrets, is in large part immaterial, so long as the United States continues to oppose a verification mechanism. Practical verification difficulties inherent in the area of biological agents also exist. As alluded to elsewhere in this article, it is difficult to create a verification regime when any nation with a developed pharmaceutical industry has the potential to make biological weapons.94 Further, because biological agents can be readily multiplied, it is unnecessary to produce or store agents in large quantities.95 As a result, a biological warfare program does not require large production sites or storage sites.96 Threats are unpredictable – preparedness assumes we know what threats exist to be prepared for – only community cooperation provides the vital information Commitment is a major solvency deficit Chatam House 14, King’s College London, 11/5/14, UNSCR 1540 Ten Years On: Challenges and Opportunities, International Security Department Meeting Summary, http://www.chathamhouse.org/sites/files/chathamhouse/field/field_document/UNSCR%2015 40-summary.pdf ||RS Adopting appropriate national laws is a vital aspect of adherence to the requirements of UNSCR 1540, though this can be challenging for states . The consensus at the conference was that while there is no ‘onesize-fits-all’ approach, legislative guides such as that prepared by VERTIC can provide a useful baseline for states needing to build legislation regarding non-proliferation controls.4 Questions remain regarding to the scope and nature of the legislation needed to meet the requirements of the resolution. Should states adopt a comprehensive law covering all aspects of UNSCR 1540? If so, should the law also cover the requirements of other Security Council non-proliferation measures, such as sanctions resolutions on Iran and North Korea, which are also binding on all states? Should laws place equal emphasis on facility protection and transhipment if the country does not manufacture or possess WMD-usable materials? Some debate exists over the merits of legislation versus regulations . In the United States, for example, the Export Control Act was succeeded by an executive order after its expiration. Pakistan, by contrast opted to institute an export control act when it adopted its own laws in the early 2000s. There appear to be advantages and disadvantages to both approaches. It could be that executive-issued regulations provide a quicker route through which to implement non-proliferation controls, and that they are more easily modified as technology and conditions change. At the same time, national legislation can The arduous process of drafting and adopting legislation requires sustained political commitment. To help sustain this political commitment, drawing upon lessons carry greater legitimacy and support. from the Nuclear Security Summit process it was suggested that consideration should be given to how heads of state could best engage with the 1540 process. It was also suggested that further outreach activity should be conducted with parliamentarians. Politics—leaders won’t comply Igor Khripunov 14, distinguished fellow and adjunct professor at the Center for International Trade and Security at the University of Georgia, 2014, A Work in Progress: UN Security Resolution 1540 After 10 Years, Arms Control Association, https://www.armscontrol.org/act/2014_05/A-Work-in-Progress-UN-Security-Resolution1540-After-10-Years ||RS Like any innovation, however, Resolution 1540 elicited a mixed reaction. One main reason for skepticism was that not all UN member states considered the threat of WMD terrorism and illicit trafficking in related materials to be their top priority. Some countries initially questioned the UN Security Council’s role in addressing this threat, particularly the council’s decision to impose binding nonproliferation obligations outside the traditional process of negotiations. UN member states cannot openly disregard their obligations under Chapter VII. In the absence of clearly defined compliance criteria, however, they could lower the bar for implementation by addressing some of the resolution’s provisions, especially those requiring changes to domestic law, at their own discretion. Some governments did just that shortly after the resolution’s adoption. Resolution 1540 demanded the following actions from UN member states: Refraining from providing any form of support to nonstate actors that attempt to develop, acquire, manufacture, possess, transport, transfer, or use nonconventional weapons and their means of delivery. Adopting and enforcing laws prohibiting any nonstate actor from undertaking, assisting, or financing such activities. Establishing domestic controls to prevent the proliferation of unconventional weapons and related materials, including measures pertaining to accounting, security, physical protection, border and law enforcement, and export- and trade-related controls. In other words, Resolution 1540 instructed states on what to do but not how to do it. It left methods to the discretion of individual countries. Despite this latitude for national discretion, many political and resource challenges have impeded compliance . For instance, rank-and-file citizens often doubt the scale of domestic and global terrorist threats. Such doubts are compounded when little concrete evidence exists showing that such groups operate in some regions. Another obstacle is competing national priorities, which often limit governments’ ability to channel sufficient resources into compliance with Resolution 1540 . Inadequate expertise and numbers of personnel keep some governments from producing the comprehensive reports required by the resolution to document steps taken to meet their obligations. Some member states are more vulnerable to proliferation than others, particularly those with nuclear power, chemical, and biological infrastructure susceptible to malicious acts. Others are only minor participants in world trade, either as producers or transshippers, and have limited ability to control their borders. Lastly, civil society and the business community may not be aware of Resolution 1540 and thus may not be doing their part to manage the WMD problem. ( ) Most countries with nuclear materials already comply – we would like to insert this chart into the round NTI 14, the second edition of a unique public assessment of nuclear materials security conditions around the world.," NTI Nuclear Materials Security Index, 2014, http://ntiindex.org/indicators/domestic-commitments-and-capacity/unscr-1540implementation/ ||RS International fiat is a voting issue – a. Illogical – no rational actor can choose between the counterplan and the plan – hurts decision making skills b. Justifies object fiat – hurts aff ground and moots topic education c. Request counterplans solve 2AC Disads 2AC – Politics DA Plan is popular - ICE raids are massively unpopular and spark backlash Benjamin Crouse 9, Marquette University Law School, J.D., WORKSITE RAIDS AND IMMIGRATION NORMS: A “STICKY” PROBLEM, Marquette Law Review, 2009, http://scholarship.law.marquette.edu/cgi/viewcontent.cgi?article=1524&context=mulr ||RS According to studies conducted in 2007 and 2008, a substantial portion of the population disapproves of worksite raids.186 Seventy-five percent of Hispanics and forty-two percent of nonHispanics disapprove of worksite raids.187 Seventy percent of Hispanics oppose criminal sanctions for employers.188 Although opposition to such enforcement tactics is higher among younger, less-educated Hispanics, disapproval is hardly limited to that group.189 Recently, there have been small signs of a political backlash against worksite raids. In the summer of 2008, the mayors of Los Angeles, Oakland, and Seattle requested that the United States Conference of Mayors approve a resolution condemning the immigration raids.190 The conference passed a resolution that called on ICE to focus entirely upon criminal and national security matters until Congress passed a comprehensive immigration reform act. 191 At the very least, the mayors requested that ICE focus its worksite This backlash may even be visible in Washington, particularly in the two 2008 bills described in Part III.D. Both the Senate bill expanding immigrant rights and the House DHS appropriations bill limit worksite enforcement measures to some degree.193 These proposals may be the product of an antienforcement backlash. On the other hand, the Senate counterpart to the DHS appropriations bill did not limit the enforcement efforts on companies with a ―history or reasonable suspicion of engaging in exploitative practices.‖192 agency’s worksite enforcement efforts.194 To the contrary, the Senate Appropriations Committee stated that it was ―pleased‖ with ICE’s recent worksite enforcement efforts and recommended that an additional 108 full-time employees be dedicated to such efforts.195 Furthermore, both of the immigration reform bills of 2007 contained increased worksite enforcement tools.196 Plan popular Immigration Impact 4/15 --Immigration Impact is a project of the American Immigration Council (The American Immigration Council exists to promote the prosperity and cultural richness of our diverse nation by: Educating citizens about the enduring contributions of America’s immigrants; Standing up for sensible and humane immigration policies that reflect American values; Insisting that our immigration laws be enacted and implemented in a way that honors fundamental constitutional and human rights; Working tirelessly to achieve justice and fairness for immigrants under the law.) [“ICE Director Saldaña Faces Critics in Congress”, 4/15/2015, http://immigrationimpact.com/2015/04/15/ice-director-saldana-faces-critics-incongress/]RMT Third, Saldaña received pointed criticism on ICE’s family detention policies from nearly every Committee minority Member . Rep. Lofgren pointed out that although President Obama’s policy was to prioritize “felons, not families,” ICE is detaining increasing numbers of “families, not felons.” Rep. Judy Chu (D-CA) and others asked how family detention was consistent with ICE’s policy to avoid expending detention resources on ill and vulnerable populations. Several members noted the recent hunger strikes at the Karnes facility in Texas, and reports of punitive segregation of the leaders. Rep. Hank Johnson (D-GA) asked for detailed reports on ICE’s segregation policies in family detention. Others pointed out medical and psychological evidence of the harms of family detention. Chu summed it up by saying, “There is no way to detain families humanely.” Its bipartisan Chen 12--Associate Professor, University of Colorado Law School [Ming Hsu, Where You Stand Depends on Where You Sit: Bureaucratic Incorporation of Immigrants in Federal Workplace Agencies (March 9, 2012). Berkeley Journal of Employment and Labor Law, 2012; U of Colorado Law Legal Studies Research Paper No. 12-03. http://ssrn.com/abstract=2019181 or http://dx.doi.org/10.2139/ssrn.2019181]RMT Notwithstanding President Obama’s re-election in 2012, immigration scholars in the legal academy have been exceedingly pessimistic about the federal government’s commitment to undocumented1 workers’ rights over the last decade. A majority of the criticisms focus on the need for comprehensive immigration reform in Congress .2 A considerable number of these critiques focus on Hoffman as case law limiting the protective remedies of undocumented workers against employers who exploit the most vulnerable among their labor force.3 The minority of legal scholars who seriously consider agency actions contend that such actions are insufficient and inadequate, even if wellintended.4 Immigration scholars have especially expressed dismay about the deleterious effects of White House policies relying on the Department of Homeland Security (DHS) worksite enforcement actions as a strategy for immigration control and the inability of workplace agencies to counter these actions.5 The criticisms extend across Republican and Democratic administrations . More evidence Ludden 8--Correspondent, National Desk [Jennifer, “Immigration Experts Predict Fewer Workplace Raids” 12/2/08, National Public Radio, http://www.npr.org/templates/story/story.php?storyId=97700373]RMT Since the election, immigrant advocacy groups and Democratic members of Congress have intensified their calls for a moratorium on immigration raids, and House Speaker Nancy Pelosi has talked of finding a way to end them. Luis Gutierrez (D-IL) says the undocumented workers being arrested and deported have millions of family members who are legal residents or U.S. citizens, and he says the effect has been devastating. 2AC – Semi Conductors DA ( ) New international meeting solves counterfeiting Dan Rosso 15, Semiconductor Industry Association, May 27, 2015, Semiconductor Leaders Convene to Strengthen Industry through Int'l Collaboration, http://www.reuters.com/article/2015/05/27/sia-wsc-intl-co-opidUSnPn862sHl+82+PRN20150527 ||RS The Semiconductor Industry Association (SIA) today commented on an agreement reached among global semiconductor industry leaders at the 19th annual meeting of the World Semiconductor Council (WSC) in Hangzhou, China last week on a series of policy proposals to strengthen the industry through greater international cooperation. The WSC is a worldwide body of semiconductor industry executives from China, Chinese Taipei, Europe, Japan, Korea, and the United States that meets annually to address issues of global concern to the semiconductor industry. Recommendations from this year's meeting are included in the 2015 WSC Joint Statement. " The World Semiconductor Council is a unique and effective forum for international collaboration, and its accomplishments on behalf of the global semiconductor industry are unrivaled by groups in other industries," said Ajit Manocha, 2015 WSC chairman of the U.S. delegation and former CEO of GLOBALFOUNDRIES. "The initiatives outlined in the 2015 Joint Statement will help enable more effective communication, cooperation, and competition in the global semiconductor industry. I'm especially encouraged the WSC has remained steadfast in its commitment to achieve duty-free treatment for next-generation semiconductors through expansion of the Information Technology Agreement, which would be the most commercially meaningful trade agreement for the global technology industry in nearly two decades." The WSC seeks expanded coverage in the Information Technology Agreement (ITA) for new and innovative semiconductor products, including multi-component semiconductors (MCOs). An expanded ITA – estimated to cover $1 trillion in global sales of tech products – would provide the first opportunity to include in the existing agreement newly developed products resulting from the dynamic technological developments in the information technology sector since 1996, when the ITA was originally concluded. MCOs are an important new growth market for the semiconductor industry. Even now, the inclusion of MCOs in an expanded ITA would save the industry $150 to $300 million in global annual tariffs. The WSC meeting also featured dialogue with China's Ministry of Industry and Information Technology on China's semiconductor industry support policies and investment funds. The WSC reaffirmed its view that government action related to such policies should be guided by market-based principles, and committed to continuing dialogue with relevant governments to promote fair, transparent, market-based, and non-discriminatory practices with regard to government support programs. Industry leaders also made significant progress on the following initiatives: Encryption – Deepened industry-government dialogue to work toward an improved global regulatory environment for products with encryption based on principles of market access, transparency, adoption of international standards, and non-discriminatory and open procedures and rules. Protection of Intellectual Property – Adoption of a joint set of "core" elements intended to serve as an international norm for national trade secret protection legislation. Continued progress on the WSC initiative to improve patent quality, and support for changes to domestic laws to simplify inventor remuneration practices. Customs and Trade Facilitation – Support for expeditious ratification and implementation of the WTO Trade Facilitation Agreement to facilitate free and open markets, reduce barriers to trade, and improve business conditions that will benefit governments, industry and consumers. Anti- counterfeiting – Strengthened cooperation with global customs and law enforcement agencies to combat semiconductor counterfeiting. Environment, Safety and Health (ESH) – Continued success in reducing the industry's PFC (perfluorocompound) emissions and calling on Governments/Authorities to take into account the industry's use and management practices when regulating essential chemicals. Conflict Minerals – Utilization of common, industry-developed tools to achieve a conflict-free supply chain. Growth Initiative – Promotion of semiconductor-enabled energy efficiency through the inclusion of semiconductor products in the Environmental Goods Agreement (EGA). Tax – Reduction of the potentially harmful impact of the OECD Base Erosion and Profit Shifting (BEPs) Action Plan by adopting measures to strengthen dispute settlement procedures and protect corporate information provided to governments in the master file and country-by-country reports. Industry representatives from the six regions will deliver these recommendations to an annual meeting of their governments, called the Governments and Authorities Meeting on Semiconductors (GAMS), which will take place in San Francisco in October. The GAMS meeting represents an opportunity for industry to convey the importance of implementing the recommendations and explore areas of mutual interest with governments and authorities worldwide. "The semiconductor industry fuels innovation, job creation, and economic growth in the United States and around the world," said Greg Lang, president and CEO of PMC. "Ours is a global industry with global challenges, and we must work collaboratively with our international counterparts to solve problems and ensure fair and open competition. The agreement reached by the World Semiconductor Council is a clear step forward that will help open markets, boost innovation, and increase consumers' access to cutting edge semiconductor technologies." ( ) No link – other agencies will fill in DHS 14, Department of Homeland Security, 7-16-2014, "Written testimony of ICE for a Senate Committee on Appropriations, Subcommittee on Homeland Security hearing titled “Strengthening Trade Enforcement to Protect American Enterprise and Grow American Jobs”," DHS, http://www.dhs.gov/news/2014/07/16/written-testimony-ice-senate-committeeappropriations-subcommittee-homeland-security ||RS Operation Chain Reaction (OCR) is an IPR Center initiative that combines the effort of 16 federal law enforcement agencies to target counterfeit items entering the supply chains of the Department of Defense and other U.S. Government agencies. By partnering together, the participants in OCR are coordinating their efforts to more productively protect the U.S. Government supply chain. In a case investigated by ICE, DCIS, and NCIS, a Massachusetts man pleaded guilty in June 2014 to importing thousands of counterfeit integrated circuits (ICs) from China and Hong Kong and then reselling them to U.S. customers, including contractors supplying them to the U.S. Navy for use in nuclear submarines. The subject told his customers, many of whom specified in their orders that they would not accept anything but new ICs which were not from China, that the ICs were brand new and manufactured in Europe. Testing by the Navy and one of their contractors revealed the ICs had been resurfaced to change the date code and to affix counterfeit marks, all in order to hide their true pedigree. In order to purchase these ICs, the subject wired nearly $2 million to his suppliers' bank accounts in China and Hong Kong, in violation of federal money laundering laws. This was the second conviction ever under trafficking in counterfeit military goods, a provision in the U.S. criminal code which was enacted as part of the National Defense Authorization Act of 2011. In another case, the former Chief Executive Officer (CEO) of Powerline, Inc., a battery distributor, was found guilty of five counts of wire fraud and one count of conspiracy to defraud the United States by selling more than $2.6 million in cheap, counterfeit batteries to the U.S. Department of Defense. In joint case by ICE and DCIS, with assistance from DLA and the Defense Contract Audit Agency, investigators discovered that Powerline sold more than 80,000 batteries and battery assemblies that the U.S. Navy used for emergency back-up power on aircraft carriers, minesweepers and ballistic submarines. The company would affix counterfeit labels falsely identifying the batteries as originating from approved manufacturers and used chemicals to remove “Made in China” markings from the batteries. The CEO fled the United States, but was apprehended when undercover HSI special agents hired him to sail his yacht to the U.S. Virgin Islands after spending more than two years on the yacht near St. Martin. Once the CEO entered U.S. Territory, he was arrested and his yacht was seized. OCR has resulted in 40 criminal arrests, 70 indictments, 42 convictions, and 1,078 seizures worth $21.2 million (MSRP) in counterfeit parts, currency, and vehicles. Counterfeit items seized through OCR include commercial-grade devices re-marked as military-grade and counterfeit semiconductors intended for use on nuclear submarines. ( ) No Link – The plan restricts ICE raids on immigrants – not all ICE raids ( ) No Link – ICE raids are not key SIA 13, Semiconductor Industry Association, August 2013, WINNING THE BATTLE AGAINST COUNTERFEIT SEMICONDUCTOR PRODUCTS, SIA, http://www.semiconductors.org/clientuploads/Anti-Counterfeiting/SIA%20AntiCounterfeiting%20Whitepaper.pdf ||RS 3. The ACTF also partners with law enforcement to help prosecute those involved in the manufacturing and/or trafficking of counterfeit semiconductor components. SIA companies conduct in-depth laboratory analyses on suspect components from undercover buys made by government agencies. Using CBP seizure data as well as OCM laboratory reports on confirmed Copyright © 2013 by the Semiconductor Industry Association 23 counterfeit components, law enforcement agencies obtain search warrants and conduct enforcement actions (raids) resulting in the arrest of suspects dealing in counterfeit components . SIA companies provide on-site support to law enforcement immediately after enforcement actions occur. This support includes identifying the manufacturing processes used by counterfeiters and determining which seized components are counterfeit. Subsequent support includes testifying in court cases and providing Victims Statements to sentencing judges. Recent cases that the ACTF assisted government agencies in investigating and prosecuting, including MVP Micro in Irvine, California, and VisionTech Components in Clearwater, Florida, have resulted in defendants being ordered to pay restitution and being sentenced to several years of incarceration. [References 16- 17.] The Epic International Electronics case is in the prosecution phase, but the defendant is facing up to 20 years in prison if convicted. [Reference 18.] These and other high-visibility cases, which have received significant media coverage, serve as a major deterrent to those manufacturing and/or selling counterfeits or those contemplating doing so. ( ) Status quo solves – awareness programs SIA 13, Semiconductor Industry Association, August 2013, WINNING THE BATTLE AGAINST COUNTERFEIT SEMICONDUCTOR PRODUCTS, SIA, http://www.semiconductors.org/clientuploads/Anti-Counterfeiting/SIA%20AntiCounterfeiting%20Whitepaper.pdf ||RS The ACTF has driven counterfeit component awareness and actions. SIA members provide leadership and give presentations at conferences, technical symposia, and webinars, including Counterfeit Electronic Parts and Electronic Supply Chain Symposia, and Diminishing Manufacturing Sources and Material Shortages (DMSMS) Conferences. [References 22-23.] These presentations focus on the quality and reliability risks posed by counterfeit semiconductors, along with the critical importance of always buying components directly from OCMs or their Authorized Distributors and Authorized Resellers to avoid problems with counterfeit components. SIA President Brian Toohey has testified before both the Senate Armed Services Committee and the House Homeland Security Committee on how counterfeit semiconductors jeopardize the safety and effectiveness of US military personnel and operations. [Reference 8.] SIA members also regularly meet with House, Senate, Department of Commerce, Department of Defense, Administration, and other government officials to brief them on how counterfeit semiconductors are a danger to the health and safety of the public, and to work with them on solutions to this insidious problem. Through written responses to Requests for Information and to Notices of Proposed Rulemaking, the ACTF provides government agencies with specific recommendations on how to avoid counterfeit semiconductor products. The ACTF has also been instrumental in driving anti-counterfeiting legislation, regulations, and policies, including legislation that increases government-industry sharing on suspected counterfeit semiconductors, and that increases penalties for selling counterfeit components to the military. ( ) Status quo solves – new international standards SIA 13, Semiconductor Industry Association, August 2013, WINNING THE BATTLE AGAINST COUNTERFEIT SEMICONDUCTOR PRODUCTS, SIA, http://www.semiconductors.org/clientuploads/Anti-Counterfeiting/SIA%20AntiCounterfeiting%20Whitepaper.pdf ||RS 4. The ACTF is active in evaluating component security features and in developing international standards relating to supply chain assurance and anti-counterfeiting. SIA member companies use a wide range of security features, both overt and covert, and they work both independently and with thirdparties to continue to advance these features to stay ahead of counterfeiters. Semiconductor companies do not plan to adopt a single, industry-wide security feature since counterfeiters would then only need to figure out this one feature, and if they did so, they could readily counterfeit components from any semiconductor company. Rather, OCMs use security features that change over time and are tailored to the specific components being manufactured. This approach has proven to be the most effective at deterring counterfeiters. These security features only have value when they are dynamic and are kept secret. Therefore, semiconductor companies do not disclose security features to customers, governments, or any other entities. ( )Status quo solves – international framework SIA 13, Semiconductor Industry Association, August 2013, WINNING THE BATTLE AGAINST COUNTERFEIT SEMICONDUCTOR PRODUCTS, SIA, http://www.semiconductors.org/clientuploads/Anti-Counterfeiting/SIA%20AntiCounterfeiting%20Whitepaper.pdf ||RS 6. In addition to industry-government initiatives, the SIA ACTF has joined forces with other associations to advance the battle against counterfeit semiconductor components. The United States SIA is a leading member of the World Semiconductor Council (WSC) Anti-Counterfeiting Task Force (ACTF) that has been active since 2012. The WSC unites the six SIAs from the six major semiconductor-producing countries/regions of the world, i.e., China, Chinese Taipei, Europe, Japan, Copyright © 2013 by the Semiconductor Industry Association 24 Korea, and the United States. [Reference 25.] The WSC ACTF recognizes that the counterfeit semiconductor problem cannot be solved by any one country, but rather requires worldwide strategies and initiatives focused on both the supply and demand for counterfeits. The WSC ACTF is reviewing best practices identified by individual SIAs and is working to deploy them more broadly. This requires extensive interaction with governments worldwide, and a key forum for formalizing these interactions is the Government and Authorities Meeting on Semiconductors (GAMS), which is held annually. [Reference 27.] In addition to working with the WSC ACTF and GAMS, the SIA ACTF interfaces with other associations involved in anti-counterfeiting initiatives, including the Electronic Components Industry Association (ECIA), the Aerospace Industries Association (AIA), and the US Chamber of Commerce. [References 28-30.] ( )Alt cause – lack of CBP authority makes it impossible to track counterfeits. Brian Toohey 7-7-2011, President & CEO of the Semiconductor Industry Association (SIA) (he has since vacated that position), GPO, Mr. Brian Toohey, President, Semiconductor Industry Association: Oral Statement “HOMELAND SECURITY INVESTIGATIONS: EXAMINING DHS’S EFFORTS TO PROTECT AMERICAN JOBS AND SECURE THE HOMELAND,” http://www.gpo.gov/fdsys/pkg/CHRG-112hhrg72254/pdf/CHRG-112hhrg72254.pdf Historically, Customs and Border Protection also facilitated anticounterfeiting efforts. Prior to 2000, when port officers suspected a shipment contained counterfeit chips, they would contact the manufacturer and share one of the products. After 2000, but before 2008, port officers photographed the outside of suspected chips and sent the publicly viewable information to the chip manufacturer whose trademark appeared on the surface to determine whether the chip was counterfeit. Using highly confidential databases, manufacturers then determined very quickly, in about 85 percent of the cases, whether or not the chips were counterfeit by analyzing the codes on the surface of the chip. It was a system that worked very well and prevented enormous quantities of counterfeit chips from entering the United States. In mid-2008, however, CBP officers were instructed to redact or cross out the identifying marks in the photographs except the trademarks before sending them to manufacturers, thereby scuttling the cooperative system that worked so well for so many years. The current redaction practice makes it virtually impossible for the industry, much less the importer or CBP, to authenticate suspected counterfeit semiconductors. U.S. Treasury officials argue that this policy shift is intended to shield port officers from criminal liability for disclosure of confidential information; however, to the extent the codes on the surface of semiconductors which are publicly viewable to anyone who picks up the chip or looks at the label are confidential, they belong to the manufacturers to whom the photographs would be sent. ( ) Authorized supply chain ensures no counterfeits enter the market. SIAACTF 2013, Semiconductors Industry Association Anti-Counterfeiting Task Force, a trade association and lobbying group at represents the United States semiconductor industry, SIA, “WINNING THE BATTLE AGAINST COUNTERFEIT SEMICONDUCTOR PRODUCTS,” August 2013, http://www.semiconductors.org/clientuploads/Anti-Counterfeiting/SIA%20AntiCounterfeiting%20Whitepaper.pdf The authorized supply chain for semiconductor components is very clear and ensures that this supply chain is not contaminated by counterfeits. Original Component Manufacturers (OCMs) sell their products in two ways: 1. Directly through their sales force and through their Internet sites; 2. Directly through Authorized Distributors, and, in some cases, Authorized Resellers. Each OCM identifies and qualifies their Authorized Distributors using a broad set of criteria including longterm business viability, quality systems, order placement and fulfillment processes, customer support, and customer returns policies. While the details of the processes for selecting Authorized Distributors vary somewhat between semiconductor companies, the contracts between OCMs and their Authorized Distributors always require them to obtain components solely from OCMs. Contracts specify that Authorized Distributor relationships can be terminated if distributors ever allow product not sold by them to be “returned.” OCMs periodically audit their Authorized Distributors to ensure products are always handled and stored properly to prevent ESD and other damage. These audits also include validating that the distributors’ policies and procedures cannot allow counterfeit or otherwise questionable components into the supply chain. The net result is that, just as with component purchases directly from OCMs, customers buying from Authorized Distributors are assured of receiving legitimate products with high quality and reliability levels. Components bought from Authorized Distributors carry the same factory warranties as those bought directly from OCMs. ( ) Most countries with nuclear materials already comply – we would like to insert this chart into the round NTI 14, the second edition of a unique public assessment of nuclear materials security conditions around the world.," NTI Nuclear Materials Security Index, 2014, http://ntiindex.org/indicators/domestic-commitments-and-capacity/unscr-1540implementation/ ||RS ( ) Multitude of things halt Chinese Mil-Mod—Mainly Soft Recruits Perlez 15 [Jane Perlez, New York Times, Febuary 17, 2015, “Soft Recruits Hinder China’s Military Modernization”, http://sinosphere.blogs.nytimes.com/2015/02/17/softrecruits-hinder-chinas-military-modernization/] JMOV Many armies have trouble molding capable soldiers from fresh-out-of-school 18-yearolds. China is no exception and, it turns out, has a particular problem with soft recruits.¶ Senior officers in the People’s Liberation Army recognize that many of their volunteers and conscripts have been raised as spoiled children and that as products of the one-child policy, many of them need toughening up, says a lengthy report by the RAND Corporation on the modernization of the army.¶ “After 30 years of the one-child policy, kids come into the army who are used to being coddled and the apple of their parents’ eyes,” said Scott W. Harold, the deputy director of the Center for Asia-Pacific at RAND, and one of the seven authors of the report released last week.¶ Newspapers published by the People’s Liberation Army have carried reports about half the young men in a unit crying, and many wanting to wash out, he said. Some were reported to have violated discipline by sending texts to their girlfriends. “While this is a weakness, it is not clear how much of a weakness,” he added.¶ About 70 percent of People’s Liberation Army soldiers come from one-child families, and among combat troops, about 80 percent have been raised as only children, Maj. Gen. Liu Mingfu, a professor at the National Defense University in Beijing, said in a telephone interview.¶ Even President Xi Jinping, who as chairman of the Central Military Commission is the head of the People’s Liberation Army, has alluded to the problem of insufficiently hardened soldiers. “We must not make our soldiers soft during the peace era, the mighty troops have to be mighty, soldiers must have guts and courage,” he said last month, according to a report in PLA Daily.¶ The RAND report, titled “China’s Incomplete Military Transformation,” is unusual because rather than stressing the rapid gains by the People’s Liberation Army, the authors focus on the weaknesses.¶ The idea for the study came from the U.S.-China Economic and Security Review Commission, a body created by Congress in 2000 to study the strategic relationship between the United States and China. The task for RAND: to look at the shortcomings of the People’s Liberation Army as a way of better understanding what Chinese commanders would be attempting to improve.¶ Top commanders in the People’s Liberation Army were aware of an array of problems and were aggressively trying to fix them, the report says.¶ The People’s Liberation Army has not fought a war since 1979, when it performed miserably against its neighbor Vietnam in a short, extremely bloody battle. Combat weaknesses persist, the report says, including insufficient strategic airlift capabilities, a limited number of special mission aircraft and deficiencies in antisubmarine warfare.¶ “Knowing the weaknesses — and particularly what P.L.A. officers themselves see as the most important shortcomings — is critical to understanding what areas the P.L.A. will emphasize as it continues to modernize,” said Michael S. Chase, a senior political scientist at RAND, and one of the authors. “We are not trying to say the P.L.A. is unprofessional, nor are we trying to say there is nothing for people in the U.S. and other countries to worry about.”¶ On the contrary, the People’s Liberation Army has made impressive progress over the last few decades and is capable of causing serious problems for the United States and its allies, he said. Still, along with shortfalls in certain combat capabilities, the People’s Liberation Army suffered from corruption and had yet to transform its antiquated organizational structure into the joint command and control systems of well-run armies.¶ The catalog of weaknesses that revolve around personnel and training make fascinating reading because they are not often talked about in public. Buried in the newspapers published by the commands of China’s seven military regions, the authors found quite a bit of candor.¶ The authors quote one article that says, “The overall level of talented personnel in our army does not meet the requirement for fulfilling its historic mission in the new century.”¶ And some of the assessments by the Chinese commanders of the People’s Liberation Army’s capabilities, garnered from more than 300 Chinese-language articles, books and studies, are scathing. “According to the CMC (Central Military Commission) Vice Chairman Xu Qiliang, although the PLA seeks to become an informatized force, it is not (even) fully mechanized,” the report says.¶ Training often emphasizes form and process rather than the pursuit of better performance, the study says. Exercises were often overly scripted, and in many cases, completely unrealistic.¶ The People’s Liberation Army lacked enough technical expertise within its own ranks to properly maintain advanced equipment, Mr. Harold said. Often, experts from technology companies or from firms that supplied weapons were brought in for maintenance and repairs, he said.¶ The report makes clear that the People’s Liberation Army has difficulty attracting first-rate recruits because of higher salaries and easier lifestyles in the civilian economy. It was possible that starting pay for a recruit was well below 1,000 renminbi a month, about $160, even as low perhaps as 600 renminbi, said Dennis J. Blasko, a former military attaché at the United States Embassy in Beijing and the author of the “The Chinese Army Today.”¶ Last month, PLA Daily reported that an officer who had served for 30 years received a monthly salary of 8,000 to 9,000 renminbi, about $1,280 to $1,440. Officer salaries were often topped up with allowances and subsidies from a unit’s business dealings, for example from rents on buildings owned by a unit.¶ But in December, as part of his anticorruption drive, Mr. Xi announced an end to such allowances and said soldiers would have to learn to live on their salaries, a painful requirement if military salaries are not raised.¶ ( )Chinese Mil Mod impossible—even if they did they would be no where close to the US Chan 15 [Minnie Chan, February 12, 2015, “China ‘not ready to win wars’ despite PLA modernisation, says US report”, http://www.scmp.com/news/china/article/1710717/china-notready-win-wars-says-us-report?page=all]JMOV The People's Liberation Army is incapable of winning wars even though it has spent heavily on modernisation over the past two decades, according to a report commissioned by a US congressional committee.¶ Chinese military experts said the shortcomings identified were valid, and the report could be a "good reference" to the PLA leadership as it showed a thorough understanding of the army's latest developments.¶ The report by Santa Monica-based research group Rand Corporation, which was released yesterday, said the PLA faced continuing vulnerability because of widespread corruption, lack of qualified personnel and insufficient training.¶ "Although the PLA's capabilities have improved dramatically [amid its military modernisation], its remaining weaknesses increase the risk of failure to successfully perform some of the missions Chinese Communist Party leaders may task it to execute," said the report, sponsored by the US-China Economic and Security Review Commission.¶ Beijingbased retired Major General Xu Guangyu said that as a veteran, he would like to thank the Rand Corporation for its efforts to help the Chinese military to understand its shortcomings.¶ "I agree that corruption is one of the key problems that should be tackled. That's why President Xi Jinping has urged the anti-graft watchdog to weed out corruption in the army by all means," he said.¶ The report points to critical weaknesses in the PLA in two categories: organisational and combat capabilities. It said a party-ruled army could be contributing to potential risk, citing the rift between then premier Wen Jiabao and Guo Boxiong, who was vice-chairman of the PLA's supreme Central Military Commission (CMC) during the 2008's earthquake in Sichuan province.¶ Wen, who had no military rank, made a tearful call for the air force to send helicopters to aid the rescue, but there was no response from the military because the army takes its orders only from the CMC.¶ The report said the PLA enjoyed an almost absolute immunity from external oversight, budgetary transparency, and accountability to the legislature for how it spent its funds and operates. It cited the recent arrests of two prominent military figures, Gu Junshan , former deputy head of the army's logistic department, and former CMC vice-chairman Xu Caihou , on suspicion of graft.¶ Li Jie, a retired senior colonel with the navy, said it was a fact that "there is a certain gap" between the US and Chinese militaries even though the PLA had been trying to narrow the distance.¶ ( ) No impact to Chinese modernization – it’s all just defensive Rongfei Gou 14, contributing writer, 10-7-2014, "Are Offensive Realists Overreacting about China’s Military Modernization?," International Affairs Review, http://www.iargwu.org/content/are-offensive-realists-overreacting-about-china%E2%80%99s-militarymodernization ||RS Offensive realism, a major school of international relations theories pioneered by John Mearsheimer, consistently argues that states must always assume the worst because they can never have perfect information about the intentions of other states. Offensive realists thus argue that while China may not have the military capability to challenge the status of the United States yet, China will adopt a more offensive grand strategy in the future. The argument continues that, given China’s economic growth and shift in strategy, the United States needs to prepare itself for such a change, which will eventually lead to an inevitable confrontation between the U.S. and China. Such an offensive realist concern is overblown . China has been contained by its unfriendly neighbor states and Chinese military modernization only focuses on defensive capability to deter its neighbors and internal opponents . Thus, the United States does not need to increase its military presence in East Asia, as China has already been “contained” by neighboring states. First, China’s geopolitical condition serves as a crucial constraint preventing China from becoming a regional hegemon. Second, the defensive military doctrines of the People’s Liberation Army (PLA) focus on defending China’s sovereign territory and maintaining internal stability. Unlike the United States, which has relatively unthreatening neighbors and two oceans as natural defense lines, China is surrounded by powerful countries. Although the end of the Cold War eliminated the largest land-based threat to China since 1949, Russia retains powerful military capabilities. To its southwest, China still has major territorial disputes on its land border with India. Japan, a strong economic power that invaded China in World War II, is a permanent concern for the Chinese government. China also remains engaged in maritime sovereignty disputes with many of its neighbors in the South China Sea. Internally, the longtime ethnic uprisings in Tibet and Xinjiang continue to smolder. Given these threats, it is reasonable for China to maintain a modernized military force to meet its defensive purposes. Even if China tries to become the regional hegemon in the future, the surrounding countries, such as Japan and India, are likely to work together to stop Beijing’s expansionary tendencies. The rise of China is a more direct threat to neighboring states than it is to the United States. Furthermore, surrounding countries can muster the geopolitical strength to create sufficient deterrent effects on China. For instance, India has enjoyed rapid economic growth since its economic reforms in 1991. Both Russia and India maintain nuclear arsenals. Scholars like Charles Glaser argue that “a major U.S. withdrawal, moreover, would not automatically yield Chinese regional hegemony, because Japan and South Korea might then acquire stronger conventional military capabilities and nuclear capability of their own.”1 One cannot ignore the possibility that China may use “salami-slicing” tactics, or microaggression, to divide and conquer its regional adversaries. However, China’s recent overt activities to highlight issues with many of its neighbors do not support this concern. For example, China’s adoption of an “Air Defense Identification Zone” was immediately protested by all surrounding states in the East China Sea. The maritime sovereignty disputes in the South China Sea only increased the collective fear toward China among the Southeast Asian countries. If China truly wishes to use “salami-slicing” tactics, it would be much wiser to deal with each neighbor individually, rather than provoking them altogether as it has done recently. Writing on Chinese strategy, MIT associate professor Fravel Taylor notes, “China is not pursuing broadly expansionist goals, nor is it investing heavily in forces that are inconsistent with its strategic goals [namely regime security, territorial integrity, national unification, maritime security, and regional stability].”2 Chinese military forces focus on three capabilities: internal control, periphery area denial, and limited regional force projection. The latest research from the U.S. Army War College suggests that the PLA’s “New Historical Mission—a military doctrine created by former president Hu Jintao—emphasizes defending China’s sovereign territory, again demonstrating China’s concern over the possible conflicts with surrounding states.”3 Additionally, the ruling Chinese Communist Party (CCP) fears any political force that could challenge its rule. Since the Party is unelected, it requires a strong military force to keep it in power. Such fears also manifest in People’s Liberation Army doctrine. In official PLA doctrine, the first principle above all else is that the army must “provide an important guarantee for the Party to consolidate its ruling position.”4 The 1989 Tiananmen Square incident was an obvious demonstration by the CCP to show how it can use the PLA to maintain a ruling position. Such an important mission of the PLA has nothing to do with challenging the United States’ position in the world. Similarly, the ethnic uprisings and riots in Tibet and Xinjiang require a large military presence. As stated by CCP leaders, “the March 2008 demonstrations and riots [in Tibet] only reinforce the view…that ethnic unrest is a ‘strategic issue.’”5 Therefore, 660,000 troops make up an internal control force to deal with political enemies and uprisings.6 As Xinjiang has experienced an uptick in violence this year, more military personnel and resources have been assigned to bring stability back to the province. Such operations provide evidence that the premier responsibility of the PLA remains to focus on internal stability, rather than on territorial expansion or overseas operations. Thus, while China is in the midst of modernizing its military, there is no clear evidence from PLA doctrine supporting the claim that China will try to challenge the status of the United States in East Asia. Given the above evidence, offensive realists are probably wrong to posit unavoidable confrontation between the United States and China. Unlike the United States, China is surrounded by powerful neighbors who have direct conflicts or territorial disputes with the country. Furthermore, the People’s Liberation Army’s military doctrine was designed to maintain regional deterrence and internal stability.7 Neither of these two missions aims to challenge the broad U.S. military position.