Court Drones Aff - CFFP - University of Michigan Debate Camp Wiki

advertisement
Court Drones Aff - CFFP
Notes
More advantages will be coming out in Wave 2. Add in your own WOT impacts.
1AC
Plan
The United States federal government should curtail its aerial surveillance by ruling
that such searches constitute a search within the Fourth Amendment and is
unreasonable without a warrant, barring exigent circumstances.
Surveillance State
Domestic drones are rapidly ushering in a total surveillance state
Ghoshray 13 (Dr. Saby [PhD]; “Domestic Surveillance Via Drones: Looking through the Lens of the
Fourth Amendment,” Spring 2013; Lexis )//AJ
This Orwellian dystopia is no imagination. Rather, it may be coming sooner than any of us can imagine.
Welcome to the post-modern America--where society may be heading to a fast track dissent into the
abyss of limitless government surveillance. The domestic drones have arrived, and they are almost ready
to intrude upon our sacrosanct zone of private seclusion. n2 The above scenarios are certainly not this
author's imagination. They are not bad dreams or morbid fantasies either. Instead, they are based on the
recorded incidences of killer drones wreaking havoc in the civilian communities in the rugged mountains of Pakistan, Afghanistan, and
Yemen. n3 The [*581] very same drones are now waiting for either a legislative nod or the regulatory
approval to begin hovering over the byways and alleys of America. Yet, it seems the national discourse
has not awakened to this new reality.
These drones
are relatively cheap to build, remotely controlled, and devoid of emotions and physiological
limitations. Today's drones can both strike with deadly finality n4 and peer deep into individual homes
with see-through imaging capability, n5 high-powered zoom lenses, n6 and night-vision capability.
Drones are enabling the militarized industrial complex to swiftly expand through
discriminatory surveillance and paramilitarized violence
Talai 14 (Andrew, “The Fourth Amendment and Police Discretion in the Digital Age,” 102
Cal. L. Rev. 729, Lexis/SEP)
Law enforcement agencies have begun deploying drones for routine domestic surveillance operations,
unrestrained by constitutional scrutiny. Indeed, Congress has mandated a comprehensive integration of
unmanned aerial systems into the national airspace no later than September 30, 2015. But does the Fourth
Amendment to the United States Constitution proscribe such drone surveillance as an unreasonable search? While this question cannot be easily answered under
conventional precedents, doctrinal inconsistency raises this Comment’s central question: What role will the Fourth Amendment play in an age of pervasive digital
surveillance and limited privacy rights? In the last few decades, the Supreme Court has narrowed its vision of Fourth Amendment rights to an opaque privacy
rationale. The Court has muddled doctrine and strained to avoid difficult issues involving technological progress. A recent example of this phenomenon came in the
2012 decision, United States v. Jones, where the Court paradoxically revived the common law trespass test for Fourth Amendment searches, as a proxy for the
“degree of privacy that existed” at the founding. This Comment argues, instead, for a “pluralist” approach to understanding Fourth Amendment searches that
would—in addition to securing privacy and property—proscribe any search that Copyright © 2014 California Law Review, Inc. California Law Review, Inc. (CLR) is a
California nonprofit corporation. CLR and the authors are solely responsible for the content of publications. * J.D., University of California, Berkeley, School of Law,
2014; B.A.,
As such, this Comment’s major concern with domestic drone surveillance is not “privacy.” In the vast majority of cases, police will not use
drones to observe “at what hour each night the lady of the house takes her daily sauna and bath.”60 Although this Comment does not focus on
“voyeuristic” or Peeping Tom drones,61 intimate privacy concerns are relevant Fourth Amendment values that deserve protection. To be sure,
one can imagine such distasteful surveillance being used for blackmail and persuasion (among other things), even from public vantage points.
However, those
privacy concerns are being trumpeted so loudly that they have obscured another relevant
problem with drone surveillance—discriminatory sorting through discretionary law enforcement. More
precisely, the fear is “provid[ing] law enforcement with a swift, efficient, invisible, and cheap way of
tracking the movements of virtually anyone and everyone they choose.”62 Police, through legislative
encouragement and judicial acquiescence, now have power—unmatched in history—on the streets of
this country: “a form of paramilitarized violence found in a rapidly expanding criminal justice-industrial
complex, with both ideological and material connections to the military industrial complex.”63 Drone
surveillance is yet another tool in the arsenal of police discretion, including “surveillance,
Drones remove any public anonymity and create an omnipresent Panopticon
Burow 2013 (Matthew L [Candidate for JD @ New England School of Law]; The Sentinel Clouds above
the Nameless Crowd: Prosecuting Anonymity from Domestic Drones; 39 New Eng. J. on Crim. & Civ.
Confinement 443; kdf)
Walking down the street. Driving a car. Sitting on a park bench. By themselves, these actions do not exhibit an iota of privacy. The individual has
no intention to conceal their movements; no confidentiality in their purpose. The individual is in the open, enjoying a quiet day or a peaceful
Sunday drive. Yet as Chief Justice Rehnquist commented,
there is uneasiness if an individual suspected that these
innocuous and benign movements were being recorded and scrutinized for future reference. 119 If the
"uneasy" reaction to which the Chief Justice referred is not based on a sense of privacy invasion, it stems
from something very close to it-a sense that one has a right to public anonymity. 120 Anonymity is the
state of being unnamed. 121 The right to public anonymity is the assurance that, when in public, one is
unremarked and part of the undifferentiated crowd as far as the government is concerned. 122 That right is
usually surrendered only when one does or says something that merits government attention, which most often includes criminal activity. 123
But when that attention is gained by surreptitiously operated UASs that are becoming more affordable
for local law enforcement agencies, 124 "it evades the ordinary checks that constrain abusive law
enforcement practices ... : 'limited police resources and community hostility."' 12 5 This association of public anonymity and privacy is
not new. 126 Privacy expert and Columbia University Law professor Alan F. Westin points out that "anonymity [] occurs when the individual is
in public places or performing public acts but still seeks, and finds, freedom from identification and surveillance." 127 Westin continued by
stating that: [A person] may be riding a subway, attending a ball game, or walking the streets; he is among people and knows that he is being
observed; but unless he is a well-known celebrity, he does not expect to be personally identified and held to the full rules of behavior and role
that would operate if he were known to those observing him. In this state the individual is able to merge into the "situational landscape." 128
While most people would share the intuition of Chief Justice Rehnquist and professor Westin that we expect some degree of anonymity in
public, there is no such right to be found in the Constitution. Therefore,
with a potentially handcuffed judiciary, the
protection of anonymity falls to the legislature. Based on current trends in technology and a keen
interest taken by law enforcement in the advancement of UAS integration into national airspace, it is
clear that drones pose a looming threat to Americans' anonymity. 129 Even when UASs are authorized for noble uses
such as search and rescue missions, fighting wildfires, and assisting in dangerous tactical police operations, UASs are likely to be
quickly embraced by law enforcement for more controversial purposes. 130 What follows are compelling
interdisciplinary reasons why the legislature should take up the call to protect the subspecies of privacy that is anonymity. A. Philosophic: The
Panopticon Harm Between 1789 and 1812, the Panopticon prison was the central obsession of the renowned English philosopher Jeremy
Bentham's life. 131 The Panopticon is a circular building with cells occupying the circumference and the guard tower standing in the center. 132
By using blinds to obscure the guards located in the tower, "the keeper [is] concealed from the observation of the prisoners ... the sentiment of
an invisible omnipresence."'133 The effect of such architectural brilliance is simple: the lone fact that there might be a guard watching is
enough to keep the prisoners on their best behavior. 134 As the twentieth-century French philosopher Michel Foucault observed, the major
effect of the Panopticon is "to induce in the inmate a state of conscious and permanent visibility that assures the automatic functioning of
power."'135 In Bentham's vision,
there is no need for prison bars, chains or heavy locks; the person who is
subjected to the field of visibility of the omnipresent guard plays both roles and he becomes the subject
of his own subjection. 136 For Foucault, this "panopticism" was not necessarily bad when compared to other methods of exercising
control as this sort of "subtle coercion" could lead people to be more productive and efficient members of society. 137 Following Foucault's
reasoning, an
omnipresent UAS circling above a city may be similar to a Panopticon guard tower and an
effective way of keeping the peace. The mere thought of detection may keep streets safer and potential
criminals at bay. However, the impact on cherished democratic ideals may be too severe. For example, in a case
regarding the constitutionally vague city ordinance that prohibited "nightwalking," Justice Douglas commented on the importance of public
vitality and locomotion in America: The difficulty is that [walking and strolling] are historically part of the amenities of life as we have known
them. They are not mentioned in the Constitution or in the Bill of Rights. These unwritten amenities have been in part responsible for giving our
people the feeling of independence and self-confidence, the feeling of creativity. These amenities have dignified the right of dissent and have
honored the right to be nonconformists and the right to defy submissiveness. They have encouraged lives of high spirits rather than hushed,
suffocating silence. 138 As Justice Douglas understood, government
surveillance stifles the cherished ideal of an
American society that thrives on free-spiritedness in public. 39 Without the right to walk the streets in
public, free from the fear of high surveillance, our American values would dissipate into that
resembling a totalitarian state that attacks the idea of privacy as immoral, antisocial and part of the
dissident cult of individualism. 140
Dehumanization effect of drones is the same type that empirically leads to genocidal
warfare
Burow 2013 (Matthew L [Candidate for JD @ New England School of Law]; The Sentinel Clouds above
the Nameless Crowd: Prosecuting Anonymity from Domestic Drones; 39 New Eng. J. on Crim. & Civ.
Confinement 443; kdf)
This Note has explored the philosophical and psychological effects of panoptic surveillance and the need for protection.2 29
A mere suspicion of a
UAS flying high in sky can have a chilling effect on democracy that most Americans would consider
intolerable. 230 But what about the psychological changes UASs will bring about in law enforcement? The following is an excerpt from a news report on the
mindset of UAS pilots who operate military drones in overseas combat missions: Bugsplat is the official term used by US authorities
when humans are killed by drone missiles .... [I]t is deliberately employed as a psychological tactic to
dehumanise targets so operatives overcome their inhibition to kill .... It was Hitler who coined this
phraseology in Nazi Germany during the Holocaust. In Mein Kampf, Hitler refers to Jews as vermin (volksungeziefer) or parasites
(volksschtidling). In the infamous Nazi film, Der ewige Jude, Jews were portrayed as harmful pests that deserve to die. Similarly, in the Rwandan
genocide, the Tutsis were described as "cockroaches." This is not to infer genocidal intent in US drone
warfare, but rather to emphasise the dehumanising effect of this terminology in Nazi Germany and that
the very same terms are used by the US in respect of their Pakistani targets. 231 Will John and Jane Doe-the casual
saunterer-become part of the next group of bugs that must be swatted in the name of effective law
enforcement? In answering that question, we should look to the skies once again and pray to the better angels of
our nature for a worthy answer.
Executive’s unfettered discretion with drones leads to non-stop fear and oppressive
psychological effects
Holmes 09 – Professor of Law, NYU Law School (Stephen, “In Case of Emergency:
Misunderstanding Tradeoffs in the War on Terror,” 97 Calif. L. Rev 301, SEP)
Indeed,
it is “important to remember that governments and law enforcement agencies often abuse their
power.”74 As President Obama acknowledged in his State of the Union address, “[I]n our democracy, no one should just take my word for
it that we’re doing things the right way.”75 To be sure, the Supreme Court has long recognized that the Fourth Amendment “does not
contemplate the executive officers of Government as neutral and disinterested magistrates.”76 Having neutral actors necessarily limits
discretion in order to safeguard the relationship between citizen and government in a democratic society.77
Giving executive officers
discretion over powerful technology can shift this balance. For example, drones have blanketed the skies
in Pakistan since at least 2009—the first strike is widely believed to have occurred in 2004.78 Pakistani
victims of U.S. extraterritorial drone strikes live in constant fear of their power. One such victim
recounts living under drones twenty-four hours per day: “I have been seeing drones since the first one
appeared about four to five years ago.”79 He went on to explain: “People are afraid . . . , they are all
psychologically affected. They look at the sky to see if there are drones.”80 These extraterritorial
accounts are illustrative: the drone’s capabilities alone inspire fear and induce an oppressive
psychological effect without actually or continuously being present. As Justice Sotomayor has recognized:
Government’s unrestrained power to assemble data . . . is susceptible to abuse. The net result is that . . . monitoring—by making available at a
relatively low cost such a substantial quantum of . . . information about any person whom the Government, in its unfettered discretion, chooses
to track—may “alter the relationship between citizen and government in a way that is inimical to democratic society.”
War on Terror
An emboldened and unchecked executive is leading the massive expansion of drones
in domestic law enforcement
Ghoshray 13 (Dr. Saby [PhD]; “Domestic Surveillance Via Drones: Looking through the Lens of the
Fourth Amendment,” Spring 2013; Lexis )//AJ
n7 This
emerging new reality will soon be at the horizon of American social landscape for various
reasons. First, the public proclamation of success in containing al-Qaeda n8 has emboldened the current
administration. This has created a fertile ground for law enforcement agencies in various states to
deploy drones for domestic surveillance. n9 Second, previously limited as an aid in border protection,
n10 drones have now become a desirable necessity for law enforcement across the nation. n11 Third,
despite the federal [*582] government's reluctance in allowing pervasive use for fear of aviation safety,
n12 recent presidential declarations n13 and congressional authorization n14 has brought this droneinduced Orwellian dystopia into palpable reality. Domestic drones have the potential to obliterate
individual privacy and transmogrify the traditional way of life. Yet, the public hue and cry is well muted. Why? This
Article examines the issue in two threads. In the first, it dissects the factors that brought us face-to-face with this impending reality. In the
second, it analyzes a set of constitutional, ethical, and philosophical reasons for the illegitimacy of future deployment of domestic drones. Thus,
this Article proceeds as follows:
Courts are highly deferential on executive counterterrorism and surveillance policies
Deeks 13 – Associate Professor of Law, University of Virginia Law School (Ashley S., The
Observer Effect: National Security Litigation, Executive Policy Changes, and Judicial Deference, 82
Fordham L. Review, 827, 2013,
http://ir.lawnet.fordham.edu/cgi/viewcontent.cgi?article=4941&context=flr)
One of the core tenets of national security doctrine is that courts play a deeply modest role in shaping
and adjudicating the executive’s national security decisions. In most cases, courts use abstention
doctrines and other tools to decline to hear such cases on the merits. When courts do hear these cases,
they often issue decisions that are highly deferential to executive choices.1 The courts’ behavior in the
wake of the September 11, 2001 attacks largely bears this out: courts have declined to reach the merits
of almost all of the cases challenging executive policies on renditions, detainee treatment and transfers,
lethal targeting, and warrantless wiretapping.2 And even where the courts have stepped in, they have
focused on the decisional processes that surround executive decisionmaking, rather than on the
substance of those decisions themselves.3 Some national security scholars celebrate this state of
affairs.4 In their view, courts are structurally ill equipped to assess the executive’s intelligence and
security calculations, which often must be made rapidly and which carry important foreign policy
implications. These scholars also believe that the executive is far more accountable to the public than
courts, such that its decisions will be guided and tempered by the public will. Other scholars, in contrast,
bemoan the absence of courts from the playing field.5 To them, the executive has undue incentives to
emphasize security values over liberty values, and only a vigorous judicial role can counter that. More
broadly, these scholars view robust judicial deference to the executive as weakening a critical tool by
which to inhibit a single branch of government from accruing undue power. Both camps tend to assume,
however, that the courts do play only a limited role in executive calculations about appropriate national
security policies.
Multiple reasons deference undermines executive decision-making in
counterterrorism
First is groupthink – the lack of a need to justify decisions to an external actor creates
insular decisions driven by confirmation bias
Holmes 09 - Walter E. Meyer Professor of Law, New York University School of Law (Stephen, 97
Calif. L. Rev. 301, “In Case of Emergency: Misunderstanding Tradeoffs in the War on Terror”, Lexis)
The most disastrous result of the Bush administration's hostility to adversarial decision making
was the choice to invade Iraq. None of the many books and articles published about the run-up to
the war has managed to discover any trace of a serious debate or discussion, even inside the
executive branch, of the pros and cons of the war. Such a serious and informed debate did [*329] not occur in Congress
either. Members of Congress were presumably reluctant to assume serious responsibility for such a momentous choice, and the voting public,
having been led to believe that Saddam Hussein was somehow responsible for 9/11, would very likely have punished any elected representative
who did not favor retaliation against the alleged perpetrators of the attacks. On the other hand, Congress may not have passed the AUMF of
2002 if certain of its key members had not been deliberately deceived by executive-branch prevarication. n61
Eric Posner
and Adrian Vermeule argue, first, that Congress and especially the courts are less well-informed
about terrorism than experts in the executive branch and, second, that representatives and judges
are subject to the same cognitive biases that plague the president and his agents. Because judges,
in particular, lack national-security expertise, they assert, non-deferential review cannot, on
balance, increase executive effectiveness in the area of counterterrorism. n62 This argument is a
non sequitur. That the executive branch acting alone is more effective than the judicial or
legislative branches acting alone does not imply that the executive branch acting alone is more
effective than the executive branch acting in coordination with the other branches. Indeed, the claim that an
To refute the Founders' claim that the executive branch will, on balance, perform better if compelled to give plausible reasons for its actions,
executive agency will, on balance, perform best when it is never observed or criticized would not be worth discussing were it not so vehemently advanced in defense
of the executive-discretion agenda. The liberty which one-sided advocates of extralegal executive discretion find most odious is the right of citizens and their elected
representatives to demand that the executive branch provide plausible reasons for its actions. If a government no longer has to provide plausible reasons for its actions,
however, it is very likely, in the relative short term, to stop having plausible reasons for its actions. n63
Its capacity for secrecy and dispatch, as mentioned, qualifies the executive branch for acting effectively in a crisis. But such institutional
It
is not at all obvious that its hierarchical structure makes the executive capable, in bunkered
isolation from the other branches, to analyze intelligently a changing and complex national[*330] security environment, to rank various difficult-to-compare threats according to their
gravity and urgency, and to make delicate security-security tradeoffs in a responsible fashion. It has
advantages do not necessarily make the executive the most qualified branch for understanding the shape and scope of an unprecedented threat.
often been insinuated - but never proved - that compelling national-security officials to testify before congressional committees and to explain
their interpretation of the country's national-security environment will have a detrimental chilling effect on zealous counterterrorism efforts.
Reporting requirements can admittedly be onerous. But the assumption that legislative oversight will, on balance,reduce the thoughtfulness
with which the executive branch approaches security-security tradeoffs is questionable.
It should also be said that the executive branch cannot hide from Congress, the courts, the public,
and the press, without hiding from itself as well. Indeed, one of the main reasons why the Bush administration was
reluctant to explain itself to the public was apparently that a small group of fallible individuals inside the Defense Department and the Office of
the Vice President wanted to make sure that their bureaucratic rivals in other executive agencies, such as the State Department, did not learn of
game-changing decisions until it was too late to reverse them. Secrecy was invoked not only to protect national security but, less justifiably, "to
avoid dissent" from other executive-branch officials. n64 The
personal hostility, turf warfare, and information
hoarding that afflicts America's national security bureaucracies is probably more paralyzing than
the government's general commitment to due process or checks and balances. Judge Richard
Posner himself contends that intra-executive pathologies such as bureaucratic fragmentation and
duplication, unclear chains of command, failure to standardize security clearances, and
investment in the wrong set of employee skills pose greater obstacles to effective
counterterrorism than congressional or judicial micromanagement. n65 The extent to which Bush's
counterterrorism policy led executive agencies to withhold important secrets from each other is startling, among other reasons, because the
Bush administration originally singled out the wall between national-security agencies as an important source of governmental dysfunction in
the run-up to 9/11.
Second is resource misdeployment - Executive deference in counterterrorism leads to
systemic analytical failures and misuse of resources and information
Huq 12- Assistant Professor of Law, University of Chicago Law School (Aziz H., “Structural
Constitutionalism as Counterterrorism,” August, 2012, Lexis)
Executive primacy has surprising costs. Evidence suggests that analytic failures are common in federal
counterterrorism policy. n157 Much effort is currently wasted or misdirected, while resources and
information are poorly deployed. Consider as illustration the Christmas 2009 attempt by Nigerian
national Umar Farouk Abdulmutallab to explode a bomb aboard Northwest Airlines Flight 253 from
Amsterdam to Detroit. Two months earlier, Saudi officials had warned U.S. authorities that an attack of
the type Abdulmutallab tried was being planned in Yemen. n158 Weeks before the attempt,
Abdulmutallab's father approached the CIA in Lagos to warn them of his son's links to Yemeni terrorist
groups. n159 Nothing was done. Subsequent presidential and congressional inquiries found an "overall
systemic failure": intelligence agencies had "dots [that] were never connected." n160 Far from an
isolated incident, this failure appears symptomatic. Five years beforehand, the National Commission on
the Terrorist Attacks upon the United States reached a similar diagnosis respecting 9/11. It found that "no
one was firmly in charge of managing [threat information] ... and able to draw relevant intelligence from
anywhere in the government" about the 9/11 attacks. n161 A similar failure of analysis preceded the deadly
November 5, 2009, shootings at Fort Hood, Texas, n162 where the military intelligence unit tasked with
tracking internal threats focused instead on student associations n163 that were more readily analyzed but
ultimately harmless. It is clear, therefore, that the executive branch has not wholly heeded the 9/11
Commission's warnings. To summarize, the internal architecture of national security institutions within
the executive branch can hinder just as much as it can foster rapid, informed responses to terrorism.
Presidential control through Article II's assumed unitary hierarchy provides no panacea. There is hence
no reason to believe that executive responses to terrorism will either be optimal or even as accurate,
timely, and efficient as is generally believed. The institutional competence logic of pro-executive
structural constitutional presumptions thus rests on shaky ground.
All the deference rationales for counterterrorism policy are wrong and uniquely
unwarranted in the domestic sphere
Cover 14 - Assistant Professor of Law, Case Western Reserve University School of Law;
Director, Institute for Global Security Law and Policy
(Avidan, Cardozo Law Review, “Presumed Imminence: Judicial Risk Assessment in the post9/11 World,” 5 Cardozo L. Rev. 1415, Lexis/SEP)
Arguments favoring judicial abdication because of temporary and possibly exigent circumstances are
less persuasive in light of the seeming permanence of the terrorism threat. n274 It is hardly clear when
the threat [*1454] of terrorism will abate. While the government may no doubt be viewed as a
provider of security, it is also a protector of civil liberty. n275 Where the nation is now so fully consumed
by prevention of catastrophic terror attacks and susceptible to cognitive errors, it is incumbent on
judges in a perpetual crisis not to presume imminence but to test the government's risk assessments.
Second, proponents argue that deference is justified in the national security arena because of foreign
and international relations, which are highly sensitive and demand discretion from the
executive branch. Roberts invoked this rationale in Humanitarian Law Project, deferring to
the government's contention that teaching peaceful advocacy to the PKK could upset
relations with Turkey.n276
If Humanitarian Law Project has a limiting principle, it would appear to be its national security and
foreign affairs context. Critical to the decision was that it concerned material support of a
foreign terrorist organization. n277 Although not situated in the "wartime" context of several
of the Court's post-9/11 decisions, n278 the rationale for deference hinges on similar
reasoning. Thus, one might expect that decisions addressing similar communication or teaching of
human rights law to a domestic terrorist organization would come out differently. n279
But there is good reason to question the extent of this limitation. The increasingly globalized
and interconnected world raises questions about the elasticity and malleability of this theory
ofdeference in the terrorism context. The most domestic of threats may well have
an [*1455] international dimension or a foreign connection. n280 Thus, the logical stopping
place of this rationale is unclear.
Third, deference advocates argue that national security issues are of a highly complex and classified
nature, which courts are not competent to handle or assess. Without full information about
potential harms and the expertise to make risk assessments, courts are not equipped to
determine whether the government's infringement of a particular liberty is appropriate. n281
Kennedy articulated the expertise rationale in Boumediene: in contrast to members of the
other branches, most judges do not "begin the day with briefings that may describe new
and serious threats to our Nation and its people." n282 Though the dissenters in Boumediene
criticized its employment as a rhetorical pose, n283 Roberts reified the rationale in
Humanitarian Law Project at the heart of his opinion. n284
Relatedly, deference may be rationalized because the objective in the terrorism context is
prevention, not prosecution. n285 As a result, the government may rely on intelligence
standards as opposed to those utilized in the criminal context. n286 Courts are not familiar
with the intelligence area and are therefore not qualified to evaluate the evidence that the
government may rely on.n287 Finally, deference may be urged due to the lack of precision or
quantification of likelihood of an attack. n288
[*1456] The expertise rationale ignores the fact that courts review the decisions of experts in a
myriad of highly complex subjects. n289 Judges also may be at a greater advantage in terms of
determining the accuracy of information because of the adversarial process, which allows them to weigh
contrary information that executive officials might not have incentive to consider. n290Article III courts
have, of course, overseen scores of terrorism cases, both of domestic and international
dimensions. n291 As for the secretive nature of certain subjects, there are procedures in place that have
permitted courts to have access to classified information. n292 Finally, specialized courts have also
been created that allow for judicial review of information with standards distinct from those
in traditional Article III courts. n293
[*1457] Concerning the lack of quantification, some scholars argue that terrorism risk
analysis can be undertaken as it is in other areas, where threats are analyzed "as a matter
of course," such as nuclear power plant accidents and environmental
protection. n294 Moreover, private entities, such as insurance companies, and various private
and governmental risk analysts commonly engage in the admittedly difficult enterprise of
predicting terrorist attacks. n295
[*1458] Deference can finally be rejected because experts are not always right. n296 Indeed, experts
are often political actors whose predictions and assessments may be both a product of fear of blame
and accountability and objective analysis. n297 Moreover, judicial review that entails an honest
discussion of risk assessments can play an important role in a democratic society; how we deal with the
risks we face should not be left only to the experts. n298
Solvency
Only court action on aerial surveillance solves privacy backsliding, keeps up with
technology, and provides law enforcement with legal bright lines
Celso 2014 (Joel [JD Candidate U of Baltimore Law]; DRONING ON ABOUT THE FOURTH AMENDMENT:
ADOPTING A REASONABLE FOURTH AMENDMENT JURISPRUDENCE TO PREVENT UNREASONABLE
SEARCHES BY UNMANNED AIRCRAFT SYSTEMS; 43 U. Balt. L. Rev. 461; kdf)
IV. ENSURING A REASONABLE FUTURE BY PREVENTING UNREASONABLE UAS SURVEILLANCE Speaking for the Supreme Court in Kyllo, Justice
Scalia acknowledged that technological advances have reduced the privacy [*489] protections granted by the Fourth Amendment. n252 In
Justice Scalia's mind, the primary issue facing the Court was "what limits there are upon this power of technology to shrink the realm of
guaranteed privacy." n253 Attempting to determine how courts might decide the constitutionality of warrantless UAS surveillance of the home
and its curtilage is context-dependent, and ultimately speculative. n254 As one author has noted, if
UAS surveillance is not a Fourth
Amendment search, then the "realm of guaranteed privacy" referred to by Justice Scalia would not just
be shrunk, but eliminated. n255 Even if UAS surveillance is currently a search subject to the Fourth Amendment that status may be
lost as UAS flights become routine. n256 Furthermore, the Fourth Amendment does not currently protect anyone's
privacy from UAS surveillance, even for extended periods, when they are in public or other open areas.
n257 To ensure that privacy will be protected from the threat posed by UAS surveillance, a new rule
should be added to current Fourth Amendment jurisprudence. Courts should hold that all UAS
surveillance by law enforcement constitutes a search within the meaning of the Fourth Amendment,
and is presumptively unreasonable without a warrant. n258 Under this rule, all warrantless UAS surveillance
used for law enforcement purposes such as criminal investigation, targeted surveillance, and monitoring
property or zones, would violate the Fourth Amendment regardless of where the surveillance took
place. n259 [*490] The justification for this rule should be grounded in the unprecedented technological
capabilities of UAS and the unique threat they represent to privacy. n260 Although the Supreme Court has heard
challenges to law enforcement's use of aerial surveillance, sense enhancing devices, and electronic tracking, it has never considered anything
like UAS, which combine all three capabilities. n261 Historically, the cost of using personnel for traditional surveillance placed a practical
limitation on police surveillance which acted to protect privacy. n262 The affordability of UAS could eliminate this constraint on excessive police
presence and dramatically increase the potential for abuses. n263 In addition,
UAS' small size and silent operation allow them
to operate in relative stealth. n264 Citizens could be observed by law enforcement without ever knowing
they were under surveillance. n265 Although UAS are not invasive by causing "undue noise ... wind, dust, or threat of injury," they
may actually be more intrusive than conventional aircraft. n266 Because people will not have notice of UAS' approach or presence, they will be
unable to keep private those activities which they do not wish to expose to public view. n267 UAS
technology has been described
as providing law enforcement with "permanent, multi-dimensional, multi-sensory surveillance of citizens
twenty-four hours per day." n268 Some have gone as far as claiming that UAS give law enforcement capabilities reserved for deities.
n269 As such, UAS present the potential for unprecedented law enforcement abuses which would be
prevented by the warrant requirement proposed here. [*491] Not only will this proposed rule ensure
that the Fourth Amendment remains the guarantor of privacy, but it provides other advantages as well. n270 First, it
draws a bright-line rule for police who will not have to determine in advance whether or not their
actions are constitutional each time they want to use a UAS in a new context, or when they are armed with a new
technology. n271 Similarly, the courts will not lag behind each new technological advance in UAS technology
because a warrant will always be required. n272 Finally, and most importantly, the rule will accomplish what
current jurisprudence cannot: it will prevent Fourth Amendment protections from being left "at the
mercy of advancing technology." n273 The Supreme Court has established precedent for adopting the
rule proposed here. n274 In Katz, the Court shifted the basis of finding that a Fourth Amendment search had occurred from a physical
trespass to an intrusion on a reasonable expectation of privacy. n275 In doing so, the Court demonstrated its willingness to adopt new rules to
ensure that privacy is protected from threats posed by new technologies. By adopting the rule proposed here, the
courts would be
acting in accordance with the precedent from Katz and would guarantee that UAS technology remains
within the scope of Fourth Amendment protections.
A Supreme Court ruling on aerial surveillance is uniquely key to revitalizing 4th
Amendment’s ability to protect privacy and to stop the onslaught of advancing
technologies
Celso 2014 (Joel [JD Candidate U of Baltimore Law]; DRONING ON ABOUT THE FOURTH AMENDMENT:
ADOPTING A REASONABLE FOURTH AMENDMENT JURISPRUDENCE TO PREVENT UNREASONABLE
SEARCHES BY UNMANNED AIRCRAFT SYSTEMS; 43 U. Balt. L. Rev. 461; kdf)
[*493] The Katz reasonable expectation of privacy test has been criticized for its circular nature. n284 As long as UAS surveillance remains sufficiently rare, an
individual's expectation of privacy is considered reasonable and it is protected from government intrusion by the Fourth Amendment. n285 Once
UAS
flights become routine, the expectation of privacy is no longer reasonable and its protection is removed.
n286 The result becomes a "paradoxical situation in which law enforcement overreach is legitimized once
it becomes routinized." n287 This could happen as early as 2015 when UAS can be fully integrated into U.S. airspace. n288 Equally
disconcerting is the fact that the Supreme Court's estimation of what society considers reasonable is not necessarily accurate. n289 Justice Scalia facetiously
observed that "unsurprisingly, those "actual (subjective) expectations of privacy' "that society is prepared to recognize as reasonable' bear an uncanny resemblance
to those expectations of privacy that this Court considers reasonable." n290 For example, poll
results indicate that the American public
opposes the use of UAS for routine police work. n291 According to the Court however, if the police used UAS to track
people in public, they would lack constitutional protection because those people have no reasonable
expectation of privacy. n292 Considering these problems with the Katz formulation, some have argued that the protection of
privacy, especially pertaining to sophisticated technologies such as UAS, should be removed from the
courts and given to the legislature. n293 The problem with this solution is that it essentially concedes that,
in the absence of legislation, the [*494] Fourth Amendment cannot protect privacy rights against the government's
use of sophisticated technologies. n294 Instead, the courts need to adopt a novel jurisprudence to protect
actual privacy expectations, rather than defer to Congress. V. CONCLUSION Under the Supreme Court's
current jurisprudence, it is only a matter of time before the Fourth Amendment will no longer be able to
provide protection from warrantless UAS surveillance, even in the home. n295 The answer to the question
posed by Justice Scalia in Kyllo should not be that technology has the power to "shrink the realm of
guaranteed privacy" to the point of elimination. n296 This is especially true given the Court's articulated
concern that it "assures preservation of that degree of privacy against government that existed when
the Fourth Amendment was adopted." n297 Although the original degree of privacy is difficult to ascertain, allowing the
government to use a UAS outfitted with facial recognition software or high-powered cameras to silently
track individuals for extended periods of time without a warrant hardly seems to qualify. n298 Equally unlikely is
the idea that Congress, rather than the Constitution, was expected to be the guarantor of privacy protections at the time the Fourth Amendment was adopted.
n299 It
is clear that the courts need a new approach to their Fourth Amendment jurisprudence to protect
privacy from a technological onslaught. Requiring a warrant for all UAS surveillance will ensure that even
the widespread use of UAS will not erode society's legitimate privacy expectations.
Prescribed evidentiary standards reverse misplaced judicial deference and foster
better executive probability analysis of terrorism
Cover 14 - Assistant Professor of Law, Case Western Reserve University School of Law;
Director, Institute for Global Security Law and Policy
(Avidan, “Presumed Imminence: Judicial Risk Assessment in the post-9/11 World,” 5
Cardozo L. Rev. 1415, Lexis/SEP)
Researchers found, in a series of studies, that judgments of blameworthiness for failing to prevent an
attack are far more likely to affect anti-terror budget priorities than probability judgments. n311The
authors of these studies concluded that because people blame policy makers more for high
consequence events than for more probable ones, n312 policy makers will be tempted to "prevent
attacks that are more [*1461] severe and more upsetting without sufficiently balancing the attack's
likelihood against its outcome." n313 To counteract this emotional tendency, these authors
suggested that policy makers explicitly consider likelihood data in formulating
counterterrorism policy. n314
Similarly, without prescribed evidentiary standards, courts are likely to craft opinions that defer to the
government's interpretation of evidence and ignore probability and imminence, often by diluting the
evidentiary requirements to the point where they favor the government. Indeed, Roberts decried
the dissent's call in Humanitarian Law Project "demanding hard proof - with "detail,'
"specific facts,' and "specific evidence,' - that [the] proposed activities will support terrorist
attacks." n315 Rather, it was sufficient to rely on the Blood and Belief-sourced notion that "[a]
foreign terrorist organization introduced to the structures of the international legal system
might use the information to threaten, manipulate, and disrupt." n316 And Roberts was
content to rely simply on the idea that "this possibility is real, not remote." n317 But failing to
require any demonstrable risk when the First Amendment and national security conflict, invites
imaginings of the possible and plausible, without sufficient regard for the probable. Applying such a rule,
Breyer argued, will grant the government a victory in every instance. n318
Breyer's and Roberts's dispute over the quantum of evidence required to establish a
connection between the human rights advocates' speech and terrorist attacks reverberates
in the lower courts. This has played out most fully in the post-Boumediene litigation in the
D.C. Circuit and district courts. In most instances, the D.C. Circuit has crafted evidentiary
standards that benefit the government. n319
For example, the D.C. Circuit has held that the government need only show by a
preponderance of the evidence that a detainee is a member of Al Qaeda or an associated
force. n320 Yet, many of the judges have chafed at the higher preponderance standard,
advocating a lesser burden of proof. n321 Furthermore, at least one D.C. Circuit member
has [*1462] contended that the courts' opinions merely invoke the "preponderance of the
evidence standard while in fact requiring nothing more than substantial evidence to deny
habeas petitions." n322 Not content with the reduced burden of proof, the D.C. Circuit has
also held that government intelligence reports enjoy a presumption of regularity. n323 The
D.C. Circuit has also insisted that courts undertake "conditional probability analysis," or a
"mosaic approach," which entails reviewing evidence collectively, as opposed to in
isolation. n324
The practical effect of these decisions has been to, in the words of D.C. Circuit Judge David
Tatel, "move the goal posts" and "call[] the game in the government's
favor." n325 Humanitarian Law Project and the [*1463] post-Boumediene litigation
demonstrate that in the absence of clearly prescribed evidentiary standards, courts will craft
a set of standards that support the government's contentions, fearful of both the potential
for harm and the public's ire. n326
Thus, my proposal requires that burdens of proof be placed squarely on the government and that
presumptions about evidence should not tilt against the person or group whose liberty interest has been
implicated. This proposal does not ignore valid security interests or call the game in favor of civil
liberties. What it does recognize, however, is that the government - and judges - often overstate the
harm, the probability, and the imminence of terrorist threats.
In order to justify a limitation on a liberty interest, the government must provide specific evidence
supporting its assessments of the danger, probability, and imminence of a terrorist attack. Evidence
must rise above generality and speculation. n327 Courts should also adopt Cristina Wells's proposed
refined balancing, which entails clarifying the interests implicated and examining the government's
evidence supporting curtailment of the protected activity. n328 A prescribed set of questions or
checklist might have the salutary effect of moving judges from an intuitive process to a
more deliberative one. n329
The judicial observer effect provides a counterweight that shifts executive decisionmaking towards more careful procedures as well as rights-sensitive policies
Deeks 13 – Assistant Professor of Law, University of Virginia Law School, Attorney-Adviser in the Office
of the Legal Adviser at the U.S. Department of State (Ashley S., “The Observer Effect: National Security
Litigation, Executive Policy Changes, and Judicial Deference,” 82 Fordham Law Review 2, SEP)
The observer effect provides an important counterweight to the executive’s instinct to prioritize
national security equities at the expense of individual rights because the executive knows that the
courts may be a future audience for its policies. A primary reason to be concerned about allowing the
executive to completely dominate national security decisionmaking is the fear that the executive will
conduct skewed risk assessments, overstate the threat that the country faces, and establish excessively
draconian policies as a result.151 As Cass Sunstein suggests, “[T]he President has a strong incentive to take precautions even if they
are excessive and even unconstitutional.”152 Ensuring some level of ambiguity about whether a court will step in to review a particular policy
helps counteract that bias. Christina Wells notes that the “lack of predictability regarding a court’s approach . . . should force the executive to
consider that the possibility of rigorous judicial review is very real.”153 In her view, advance
knowledge of the existence of
judicial review can force the executive to assume some “pre-decisional awareness of accountability.”154
That is, when the executive understands that it likely will be forced to explain its reasoning after the fact
for particular security policies it adopts, it will think more carefully ex ante about what those policies
should be and weigh a greater number of alternatives.155 While this element has procedural aspects to
it—forcing a more careful and considered process of adopting policy—it also has important substantive
effects. Assuming that courts as a rule will favor policies that are more rights protective than those favored by the executive, this
perception of future judicial oversight will shift the substantive policy in a more rightssensitive
direction.156
Observer effect spills over to other executive policies, particularly when the triggering
case directly implicates individual rights
Deeks ’13 (Ashley S., attorney-adviser in the Office of the Legal Adviser at the U.S. Department of
State, advised on the law of armed conflict, including detention, the U.S. relationship with the
International Committee of the Red Cross, intelligence issues, conventional weapons, and the legal
framework for the conflict with al-Qaeda, “The Observer Effect: National Security Litigation, Executive
Policy Changes, and Judicial Deference”, Fordham Law Review, Vol. 82, No. 2, cl)
More systemically, the observer effect reminds the executive of the courts’ presence, and so has a
subtle rights-protective influence on a number of executive policies in the wake of a triggering event.
The observer effect tends to work without regard to the subject matter of the specific case or cases on
which a court is focused. But that fact might leave categories of individual plaintiffs out in the cold in
case after case. Assume the courts are aware of and seek to foster the observer effect in the executive.
If the courts decide not to defer only in cases that do not implicate individual rights, and decide to defer
in national security cases that do implicate individual rights, the courts might preserve the observer
effect while failing to serve their function as individual rights protectors. We might conclude that the
observer effect will have some influence in shifting national security policies that do implicate individual
rights, but those changes might be more modest and less satisfying from a rightsprotective approach
than they would be if the cases on which the courts did not defer were individual rights cases. In short,
the observer effect produces a better “second-best” world when the cases in which the courts show less
deference are those that implicate individual rights.
Potential 1AC Advantages
Economy
1AC Module
A recession is imminent, only growth now can keep it from spiraling out of control
The Economist 2015 (Watch out: It is only a matter of time before the next recession strikes. The
rich world is not ready; Jun 13; www.economist.com/news/leaders/21654053-it-only-matter-time-nextrecession-strikes-rich-world-not-ready-watch?fsrc=scn/tw_ec/watch_out; kdf)
THE struggle has been long and arduous. But gazing across the battered economies of the rich world it is time
to declare that the fight against financial chaos and deflation is won. In 2015, the IMF says, for the first time
since 2007 every advanced economy will expand. Rich-world growth should exceed 2% for the first time since 2010 and
America’s central bank is likely to raise its rock-bottom interest rates. However, the global economy still faces all manner of
hazards, from the Greek debt saga to China’s shaky markets. Few economies have ever gone as long as a decade without
tipping into recession—America’s started growing in 2009. Sod’s law decrees that, sooner or later, policymakers will face another
downturn. The danger is that, having used up their arsenal, governments and central banks will not have the
ammunition to fight the next recession. Paradoxically, reducing that risk requires a willingness to keep policy looser for longer
today. The smoke is clearing The good news comes mainly from America, which leads the rich-world pack. Its unexpected contraction in the
first quarter looks like a blip, owing a lot to factors like the weather (see article). The most recent data, including surging vehicle sales and
another round of robust employment figures, show that the pace of growth is rebounding. American firms took on 280,000 new workers last
month. Bosses are at last having to pay more to find the workers they need. In other parts of the rich world things are also looking up. In the
euro zone unemployment is falling and prices are rising again. Britain’s recovery has lost a bit of puff, but strong employment growth suggests
that expansion will continue. Japan roared ahead in the first quarter, growing by 3.9% at an annualised rate. A recovery so broad-based and
persistent is no fluke. Inevitably
fragilities remain. Europe is deep in debt and dependent on exports. Japan
cannot get inflation to take hold. Wage growth could quickly dent corporate earnings and valuations in
America. Emerging economies, which accounted for the bulk of growth in the post-crisis years, have seen better days. The
economies of both Brazil and Russia are expected to shrink this year. Poor trade data suggest that Chinese growth may be slowing faster than
the government wishes. If any of these worries causes a downturn the world will be in a rotten position to do much about it. Rarely
have
so many large economies been so ill-equipped to manage a recession, whatever its provenance, as our
“wriggle-room” ranking makes clear (see article). Rich countries’ average debt-to-GDP ratio has risen by about 50% since 2007. In
Britain and Spain debt has more than doubled. Nobody knows where the ceiling is, but governments that want to
splurge will have to win over jumpy electorates as well as nervous creditors. Countries with only tenuous
access to bond markets, as in the euro zone’s periphery, may be unable to launch a big fiscal stimulus. Monetary
policy is yet more cramped. The last time the Federal Reserve raised interest rates was in 2006. The Bank of
England’s base rate sits at 0.5%. Records dating back to the 17th century show that, before 2009, it had never fallen below 2%; and futures
prices suggest that in early 2018 it will still be only around 1.5%.
That is healthy compared with the euro area and Japan,
where rates in 2018 are expected to remain stuck near zero. When central banks face their next
recession, in other words, they risk having almost no room to boost their economies by cutting interest rates. That
would make the next downturn even harder to escape.
State regs are grounding all drones now because of public outrage—federal action
that mandates warrants reverses the trend
Sorcher 2013 (Sara [Deputy editor of CSMPasscode, covering security & privacy in the digital age]; The
backlash against drones; Feb 21; www.nationaljournal.com/magazine/the-backlash-against-drones20130221; kdf)
The Seattle Police Department’s planned demonstration of its small surveillance drones quickly devolved into a noisy protest. Angry residents attending the
community meeting in October chanted
“No drones!” drowning out officers’ attempts to explain how the unmanned
aerial vehicles would support certain criminal investigations, help out during natural disasters, and assist in
search-and-rescue operations. Now it’s clear that Seattle’s drones, purchased with federal grants, won’t be flying over the metro area anytime
soon. Amid backlash from civil-liberties advocates and citizens worried about government invasion of their privacy, the mayor earlier this month tabled any drone
ambitions—for now. Public concerns are not limited to Seattle. Lawmakers
in at least 11 states want to restrict the use of
drones because of fears they will spy on Americans, and some are pushing to require warrants before
the robots collect evidence in investigations. Just this month, the Virginia General Assembly passed a two-year moratorium on drones. The
outcry comes after the Electronic Frontier Foundation sued last year for a list of drone applicants within the U.S. When that information went public, staff attorney
Jennifer Lynch says, “it really got people up in arms about how drones are being used, and got people to question their city councils and local law-enforcement
agencies to ask for appropriate policies to be put in place to regulate drone usage.” Drones
change the game: Nearly continuous
surveillance could be possible without a physical intrusion such as a property search or an implanted
listening device. The flying robots can carry high-powered cameras, even facial-recognition software or
thermal imaging to “see” through walls. They can hover, potentially undetected, for hours or days at a time. As of yet, however, there
are no laws governing the use of domestic drones when it comes to privacy. Unless Congress or the
executive branch moves to regulate the robots’ use before they take to the skies en masse, states will
likely continue to try to limit or ban drone use altogether, which could stymie their potential for other,
beneficial uses. And failing to enact privacy limits only increases the likelihood of an incident in which
the public perceives that the technology is being misused. The Federal Aviation Administration, which is charged with overseeing
drone implementation in the U.S., says its focus is “totally on safety,” not privacy worries. “We are concerned about how it’s being used only to the extent it would
affect the safety of the operation,” says FAA spokesman Les Dorr. As it happens, domestic drone operations are relatively limited because of safety concerns. The
FAA has issued nearly 1,500 permits since 2007 for the use of drones by public entities, such as law enforcement or fire departments, or by universities conducting
research. Of those, 327 are active. For example, Customs and Border Protection uses drones to keep tabs on the border with Mexico, and NASA deploys them to
monitor hurricanes. But
the sky will open to drones in 2015. A federal law signed last year directs the FAA to safely integrate the unmanned
vehicles into the U.S. airspace by then, paving the way for businesses and other private entities to fly their own drones. With the agency estimating that some
10,000 commercial drones could be flying by 2017, picture this: news outlets surveying damage from natural disasters, or paparazzi snooping on celebrities. And all
18,000 state and local law-enforcement agencies could be potential customers. The FAA last week began searching for six locations to test drones and is asking for
input on privacy protections for these sites. While the agency acknowledges that privacy is an issue that must be addressed, it does not claim overall rule-making
authority. “It’s unclear who’s responsible for privacy issues at this point and time,” says Gerald Dillingham, director of civil-aviation issues at the Government
Accountability Office. “No one has stepped up to the plate.” GAO recommends that the FAA, along with the Justice and Homeland Security departments, discuss
privacy parameters. “If we wait until there’s a crisis, oftentimes the rules and regulations that are made in crisis aren’t our best showing,” Dillingham says. Congress
can also act; Reps. Ted Poe, R-Texas, and Zoe Lofgren, D-Calif., introduced a bill last week requiring warrants for the use of drones in criminal investigations. The
American Civil Liberties Union sees momentum building to put privacy protections in place before the drones become commonplace. It insists that law-enforcement
agencies should not use them for investigations unless authorities have reasonable suspicion they will turn up a specific criminal act. This is a lower threshold than a
warrant, staff attorney Catherine Crump says, because it does not require officers to go to a judge. “We think that standard is what is necessary to prevent lawenforcement agents to engage in purely suspicionless use of drones, flying them around to see what’s going on.” As it stands, “ there’s
really not a lot
in American privacy law that’s going to be much of a barrier to using drones,” University of Washington law professor
Ryan Calo says. Court cases invoking the Fourth Amendment, which guards against unreasonable searches,
largely hold that a person has no reasonable expectation of privacy in public, or from a public vantage point, such as
from an aircraft overhead, Calo says. There are signs, however, that the Supreme Court is reexamining this doctrine. In a case decided last term, five of the justices
objected to police affixing a GPS device to a car without a warrant, and four more objected to the continuous surveillance of a suspect. Drones can achieve the same
goals without touching a vehicle. Calo thus believes that
drones could be the catalyst for much-needed changes to privacy
laws in a nation in which targeted, unchecked surveillance is becoming increasingly possible. The
danger lies in it becoming the norm.
States bans on drones crush the economy
Wolfgang 2013 (Ben; Drone industry predicts explosive economic boost; Mar 12;
www.washingtontimes.com/news/2013/mar/12/drone-industry-predicts-explosive-economicboost/?page=all; kdf)
Drones as weapons and drones
as spies remain matters of intense debate across the country, but the controversial
aircraft are poised to make an impact as something else: economic engines. Private-sector drones — also called unmanned aerial
systems or UAVs — will create more than 70,000 jobs within three years and will pump more than $82
billion into the U.S. economy by 2025, according to a major new study commissioned by the industry’s leading trade group.
But the report, authored by aerospace specialist and former George Washington University professor Darryl Jenkins, assumes that the White House and Congress
stick to the current schedule and have in place the necessary legal and regulatory frameworks. Current law calls for full drone integration into U.S. airspace by
September 2015, but many key privacy questions surrounding UAVs have yet to be answered. There’s also growing doubt that the Federal Aviation Administration
can meet the congressionally mandated timetable. If deadlines are met and drones become commonplace in American skies, some states will be especially big
winners. Virginia, for example, stands to
gain nearly 2,500 jobs by 2017. It also could take in $4.4 million in tax
revenue and see more than $460 million in overall economic activity by 2017, the report says. Virginia would gain the
eighth-most jobs of any state as a result of drone integration. Maryland isn’t far behind, with projections of more than 1,700 new jobs by 2017. California
would be by far the biggest winner in terms of jobs, with more than 12,000 expected. Florida, Texas, New York,
Washington, Connecticut, Kansas, Arizona and Pennsylvania are also expected to be benefit greatly from the coming drone economy. “This is an
incredibly exciting time for an industry developing technology that will benefit society, as well as the
economy,” said Michael Toscano, president and CEO of the Association for Unmanned Vehicle Systems International, a trade group that has existed for more
than 40 years but has come into the public eye only recently. Drone expansion “means the creation of quality, high-paying
American jobs,” Mr. Toscano continued. But the motivation behind Tuesday’s report — arguably the most sweeping look ever at the economic potential of
drones — runs deeper than just dollars and cents. The industry faces an uncertain future in light of growing public paranoia surrounding the craft — paranoia that
has only been heightened by the debate over whether the Obama administration would ever consider using a drone to kill an American on U.S. soil. While the
drones that will be employed by U.S. companies or law enforcement agencies are far different than the military-style UAVs equipped with Hellfire missiles, those
distinctions aren’t always clear. Tuesday’s report not only offered the industry a chance to shine the spotlight on drones’ positive uses and economic potential, but
also served as an opportunity — or, perhaps a warning — to lawmakers seeking to limit UAVs. More than 20 states are considering bills to establish strict guidelines
for what drones can do. Virginia is mulling a measure that would put a two-year moratorium on all government use of drones. Such a measure would be especially
harsh because first-responders such as police and fire departments are expected to be one of the largest markets for UAVs. Like
other growing and
thriving sectors of the economy, the drone business likely will set up shop in friendly environments. “While
we project more than 100,000 new jobs by 2025, states that create favorable regulatory and business environments for the industry and the technology will likely
siphon jobs away from states that do not,” said Mr. Jenkins, the report’s lead author who used to head George Washington University’s Aviation Institute and also is
a former professor at Embry-Riddle University. On another front, the FAA appears to be in danger of missing the congressionally mandated 2015 deadline for drone
integration. The agency just recently began taking applications for its test-site program, where drones will be studied to see how they respond in different climate
conditions and at different altitudes. More than 30 states have expressed interest in the program, but it’s unclear when it will be fully established; further delays put
the 2015 date in even greater jeopardy. “Every
year that we delay integration, the U.S. will lose more than $10 billion
in total economic impact,” Mr. Jenkins said.
Aviation industry key to U.S. econ
Bristol 14 (Teri L. [Chief Operating Officer Air Traffic Organization Federal Aviation Administration];
The Economic Impact of Civil Aviation on the U.S. Economy; June 2014;
https://www.faa.gov/air_traffic/publications/media/2014-economic-impact-report.pdf; jw)
Flying is an inspiring part of American life. It’s a symbol of our freedom, pioneering spirit, and economic success. As
the nation
continues to revitalize itself following the most recent recession, civil aviation has outpaced the national
economy. In 2012, aviation accounted for 5.4% of our gross domestic product (GDP), contributed $1.5
trillion in total economic activity, and supported 11.8 million jobs. Aviation manufacturing also continues
to be the nation’s top net export. The nation’s economic success depends on having a vibrant civil
aviation industry. To support this effort, the FAA remains committed to ensuring the safest, most efficient aerospace system in the world.
We’re focused on the following four strategic priorities: making aviation safer and smarter, delivering benefits through technology and
infrastructure, enhancing global leadership, and empowering the FAA’s workforce so we can innovate. We’re in the process of transforming the
airspace system by deploying the Next Generation Air Transportation System (NextGen). NextGen will make aviation more fuel and cost
efficient, and more environmentally friendly. This
concise report, ideal for policymakers and industry officials, offers
the latest data on the economic impact of civil aviation. It discusses the economic benefits of passenger and cargo
transportation, from activities by commercial airlines, air couriers, airports, tourism, and manufacturing. This version also estimates the
economic impact of general aviation, a uniquely American achievement. In addition to 2012, this report also includes revised economic impact
estimates for the years 2000 to 2009 and newly estimated economic impacts for 2010 and 2011. Flying remains an economic frontier for
America. We see unmanned aircraft and commercial space launches on the horizon. Through these innovations, civil
continue to inspire the next generation, and bring economic prosperity to our lives.
aviation will
Economic decline causes extinction
Richard N. Haass 13, President of the Council on Foreign Relations, 4/30/13, “The World Without
America,” http://www.project-syndicate.org/commentary/repairing-the-roots-of-american-power-byrichard-n--haass
The most critical threat facing the United States now and for the foreseeable future is not a rising
China, a reckless North Korea, a nuclear Iran, modern terrorism, or climate change. Although all of these constitute potential or actual threats, the
biggest challenges facing the US are its burgeoning debt, crumbling infrastructure, second-rate primary and secondary schools, outdated immigration
system, and slow economic growth – in short, the domestic foundations of American power. Readers in other countries may be
Let me posit a radical idea:
tempted to react to this judgment with a dose of schadenfreude, finding more than a little satisfaction in America’s difficulties. Such a response should not be surprising. The US and those
representing it have been guilty of hubris (the US may often be the indispensable nation, but it would be better if others pointed this out), and examples of inconsistency between America’s
practices and its principles understandably provoke charges of hypocrisy. When America does not adhere to the principles that it preaches to others, it breeds resentment. But, like most
temptations, the urge to gloat at America’s imperfections and struggles ought to be resisted. People around the globe should be careful what they wish for.
America’s failure to
deal with its internal challenges would come at a steep price. Indeed, the rest of the world’s stake in American success is nearly as large as
that of the US itself. Part of the reason is economic. The US economy still accounts for about one-quarter of global output. If US growth accelerates, America’s
capacity to consume other countries’ goods and services will increase, thereby boosting growth around the
world. At a time when Europe is drifting and Asia is slowing, only the US (or, more broadly, North America) has the potential
to drive global economic recovery . The US remains a unique source of innovation. Most of the world’s citizens communicate with mobile devices based on
technology developed in Silicon Valley; likewise, the Internet was made in America. More recently, new technologies developed in the US greatly increase the ability to extract oil and natural
gas from underground formations. This technology is now making its way around the globe, allowing other societies to increase their energy production and decrease both their reliance on
costly imports and their carbon emissions. The US is also an invaluable source of ideas. Its world-class universities educate a significant percentage of future world leaders. More
the US has long been a leading example of what market economies and democratic politics can
accomplish. People and governments around the world are far more likely to become more open if the
American model is perceived to be succeeding. Finally, the world faces many serious challenges, ranging from the need
to halt the spread of weapons of mass destruction, fight climate change, and maintain a functioning world
economic order that promotes trade and investment to regulating practices in cyberspace, improving global
fundamentally,
health, and preventing armed conflicts. These problems will not simply go away or sort themselves
out . While Adam Smith’s “invisible hand” may ensure the success of free markets, it is powerless in the world of geopolitics . Order
requires the visible hand of leadership to formulate and realize global responses to global challenges. Don’t
get me wrong: None of this is meant to suggest that the US can deal effectively with the world’s problems on its own. Unilateralism rarely works. It is not just that the US lacks the means; the
multilateralism is much easier to
advocate than to design and implement. Right now there is only one candidate for this role: the US. No other
country has the necessary combination of capability and outlook. This brings me back to the argument that the US must put
its house in order – economically , physically, socially, and politically – if it is to have the resources needed to promote
order in the world . Everyone should hope that it does: The alternative to a world led by the US is not a world led by China, Europe,
Russia, Japan, India, or any other country, but rather a world that is not led at all . Such a world would almost certainly be
characterized by chronic crisis and conflict. That would be bad not just for Americans, but for the vast majority of the planet’s inhabitants.
very nature of contemporary global problems suggests that only collective responses stand a good chance of succeeding. But
Racial Profiling
1AC Module
Domestic drones will have a hugely disproportionate impact on communities of color
Bernd 2015 (Candice; Proposed Rules Regulating Domestic Drone Use Lack Police Warrant
Requirement; Feb 24; www.truth-out.org/news/item/29250-proposed-rules-regulating-domestic-droneuse-lack-police-warrant-requirement; kdf)
"You're not just
talking about the physical border, you're talking about an area that encompasses many
major cities that have large minority populations, and the idea that these drones can be flown with little or no privacy
protections really mean that, people, just by virtue of living in that region are somehow accepting that they have a right to less privacy," she
said. African-American communities could well
feel the disproportionate impacts of the integrated use of
domestic drones and other surveillance in the coming years, as technologies such as StingRay are
already being used mostly in the ongoing war on drugs to track those suspected of selling and buying
drugs. The drug war has long negatively impacted communities of color, based on racialized drug policies
and racial discrimination by law enforcement; two-thirds of all those convicted of drug crimes are people
of color, despite similar rates of drug use among whites and people of color. These already-existing racial
disparities in intrusive policing tactics and deployment of surveillance technologies are one of the
primary reasons civil liberties experts are saying the government often gets it backward when thinking
about privacy issues: deploying intrusive technologies first, and coming up with privacy policies governing their use afterward (when
they may already be violating many people's civil rights). "What we see with StingRays is the same phenomenon that we're seeing with [UAS],
where federal agencies are using them," Guliani said. "State and local agencies are using them. There's federal dollars that are going to buy
them, and we're kind of having the privacy debate after the fact with very little information."
Drones are uniquely enabling the militarized industrial complex to swiftly expand
through discriminatory surveillance and paramilitarized violence
Talai 14 (Andrew, “The Fourth Amendment and Police Discretion in the Digital Age,” 102
Cal. L. Rev. 729, Lexis/SEP)
Law enforcement agencies have begun deploying drones for routine domestic surveillance operations,
unrestrained by constitutional scrutiny. Indeed, Congress has mandated a comprehensive integration of
unmanned aerial systems into the national airspace no later than September 30, 2015. But does the Fourth
Amendment to the United States Constitution proscribe such drone surveillance as an unreasonable search? While this question cannot be easily answered under
conventional precedents, doctrinal inconsistency raises this Comment’s central question: What role will the Fourth Amendment play in an age of pervasive digital
surveillance and limited privacy rights? In the last few decades, the Supreme Court has narrowed its vision of Fourth Amendment rights to an opaque privacy
rationale. The Court has muddled doctrine and strained to avoid difficult issues involving technological progress. A recent example of this phenomenon came in the
2012 decision, United States v. Jones, where the Court paradoxically revived the common law trespass test for Fourth Amendment searches, as a proxy for the
“degree of privacy that existed” at the founding. This Comment argues, instead, for a “pluralist” approach to understanding Fourth Amendment searches that
would—in addition to securing privacy and property—proscribe any search that Copyright © 2014 California Law Review, Inc. California Law Review, Inc. (CLR) is a
California nonprofit corporation. CLR and the authors are solely responsible for the content of publications. * J.D., University of California, Berkeley, School of Law,
2014; B.A.,
As such, this Comment’s major concern with domestic drone surveillance is not “privacy.” In the vast majority of cases, police will not use
drones to observe “at what hour each night the lady of the house takes her daily sauna and bath.”60 Although this Comment does not focus on
“voyeuristic” or Peeping Tom drones,61 intimate privacy concerns are relevant Fourth Amendment values that deserve protection. To be sure,
one can imagine such distasteful surveillance being used for blackmail and persuasion (among other things), even from public vantage points.
However, those
privacy concerns are being trumpeted so loudly that they have obscured another relevant
problem with drone surveillance—discriminatory sorting through discretionary law enforcement. More
precisely, the fear is “provid[ing] law enforcement with a swift, efficient, invisible, and cheap way of
tracking the movements of virtually anyone and everyone they choose.”62 Police, through legislative
encouragement and judicial acquiescence, now have power—unmatched in history—on the streets of
this country: “a form of paramilitarized violence found in a rapidly expanding criminal justice-industrial
complex, with both ideological and material connections to the military industrial complex.”63 Drone
surveillance is yet another tool in the arsenal of police discretion, including “surveillance,
Racism must be rejected in every instance - independent reason to vote affirmative
Barndt 91 (Joseph R. Barndt co-director of Ministry Working to Dismantle Racism "Dismantling
Racism" p. 155)
To study racism is to study walls. We have looked at barriers and fences, restraints and limitations, ghettos and prisons. The prison of racism confines
us all, people of color and white people alike. It shackles the victimizer as well as the victim. The walls forcibly keep people of color
and white people separate from each other; in our separate prisons we are all prevented from achieving the human potential God intends for us. The limitations imposed on
people of color by poverty, subservience, and powerlessness are cruel, inhuman, and unjust; the effects of uncontrolled power,
privilege, and greed, which are the marks of our white prison, will inevitably destroy us as well. But we have also
seen that the walls of racism can be dismantled. We are not condemned to an inexorable fate, but are offered the
vision and the possibility of freedom. Brick by brick, stone by stone, the prison of individual, institutional, and
cultural racism can be destroyed. You and I are urgently called to join the efforts of those who know it is time to teardown, once and for all, the walls of racism. The
danger point of self-destruction seems to be drawing even more near. The results of centuries of national and
worldwide conquest and colonialism, of military buildups and violent aggression, of overconsumption and
environmental destruction may be reaching a point of no return. A small and predominantly white minority of the global population derives its
power and privilege from the sufferings of vast majority of peoples of all color. For the sake of the world and ourselves, we dare not allow it to
continue.
Drones=Racist
Drones will be used to perpetuate racism
Cyril 2015 (Malkia Amala [under and executive director of the Center for Media Justice (CMJ) and cofounder of the Media Action Grassroots Network]; Black America's State of Surveillance; Mar 30;
www.progressive.org/news/2015/03/188074/black-americas-state-surveillance; kdf)
Today, media reporting on government surveillance is laser-focused on the revelations by Edward Snowden
that millions of Americans were being spied on by the NSA. Yet my mother’s visit from the FBI reminds me that, from the slave pass system to
laws that deputized white civilians as enforcers of Jim Crow, black
people and other people of color have lived for
centuries with surveillance practices aimed at maintaining a racial hierarchy. It’s time for journalists to tell a new
story that does not start the clock when privileged classes learn they are targets of surveillance. We need to understand that data has
historically been overused to repress dissidence, monitor perceived criminality, and perpetually maintain an impoverished underclass. In an era
of big data, the Internet has increased the speed and secrecy of data collection. Thanks to new surveillance technologies, law enforcement
agencies are now able to collect massive amounts of indiscriminate data. Yet legal protections and policies have not caught up to this
technological advance. Concerned advocates see mass surveillance as the problem and protecting privacy as the goal. Targeted surveillance is
an obvious answer—it may be discriminatory, but it helps protect the privacy perceived as an earned privilege of the inherently innocent. The
trouble is,
targeted surveillance frequently includes the indiscriminate collection of the private data of
people targeted by race but not involved in any crime. For targeted communities, there is little to no
expectation of privacy from government or corporate surveillance. Instead, we are watched, either as
criminals or as consumers. We do not expect policies to protect us. Instead, we’ve birthed a complex and coded culture—from jazz to
spoken dialects—in order to navigate a world in which spying, from AT&T and Walmart to public benefits programs and beat cops on the block,
is as much a part of our built environment as the streets covered in our blood. In a recent address, New York City Police Commissioner Bill
Bratton made it clear: “2015 will be one of the most significant years in the history of this organization. It will be the year of technology, in
which we literally will give to every member of this department technology that would’ve been unheard of even a few years ago.” Predictive
policing, also known as “Total Information Awareness,” is described as using advanced technological tools and data analysis to “preempt”
crime. It utilizes trends, patterns, sequences, and affinities found in data to make determinations about when and where crimes will occur. This
model is deceptive, however, because it presumes data inputs to be neutral. They aren’t. In a racially discriminatory criminal justice system,
surveillance technologies reproduce injustice. Instead of reducing discrimination, predictive policing is a face of what author Michelle Alexander
calls the “New Jim Crow”—a de facto system of separate and unequal application of laws, police practices, conviction rates, sentencing terms,
and conditions of confinement that operate more as a system of social control by racial hierarchy than as crime prevention or punishment. In
New York City, the predictive policing approach in use is “Broken Windows.” This approach to policing places an undue focus on quality of life
crimes—like selling loose cigarettes, the kind of offense for which Eric Garner was choked to death. Without oversight, accountability,
transparency, or rights, predictive policing is just high-tech racial profiling—indiscriminate data collection that drives discriminatory policing
practices. As local law enforcement agencies increasingly adopt surveillance technologies, they use them in three primary ways: to listen in on
specific conversations on and offline; to observe daily movements of individuals and groups; and to observe data trends. Police departments
like Bratton’s aim to use sophisticated technologies to do all three. They will use technologies like license plate readers, which the Electronic
Frontier Foundation found to be disproportionately used in communities of color and communities in the process of being gentrified. They will
use facial recognition, biometric scanning software, which the FBI has now rolled out as a national system, to be adopted by local police
departments for any criminal justice purpose. They intend to use body and dashboard cameras, which have been touted as an effective step
toward accountability based on the results of one study, yet storage and archiving procedures, among many other issues, remain unclear. They
will use Stingray cellphone interceptors. According to the ACLU, Stingray technology is an invasive cellphone surveillance device that mimics
cellphone towers and sends out signals to trick cellphones in the area into transmitting their locations and identifying information. When used
to track a suspect’s cellphone, they also gather information about the phones of countless bystanders who happen to be nearby. The same is
true of domestic
drones, which are in increasing use by U.S. law enforcement to conduct routine aerial
surveillance. While drones are currently unarmed, drone manufacturers are considering arming these
remote-controlled aircraft with weapons like rubber bullets, tasers, and tear gas. They will use fusion centers.
Originally designed to increase interagency collaboration for the purposes of counterterrorism, these have instead become the local arm of the
intelligence community. According to Electronic Frontier Foundation, there are currently seventy-eight on record. They are the clearinghouse
for increasingly used “suspicious activity reports”—described as “official documentation of observed behavior reasonably indicative of preoperational planning related to terrorism or other criminal activity.” These reports and other collected data are often stored in massive
databases like e-Verify and Prism. As anybody who’s ever dealt with gang databases knows, it’s almost impossible to get off a federal or state
database, even when the data collected is incorrect or no longer true. Predictive policing
doesn’t just lead to racial and
religious profiling—it relies on it. Just as stop and frisk legitimized an initial, unwarranted contact between police and people of
color, almost 90 percent of whom turn out to be innocent of any crime, suspicious
activities reporting and the dragnet
approach of fusion centers target communities of color. One review of such reports collected in Los Angeles shows
approximately 75 percent were of people of color. This is the future of policing in America, and it should terrify you as much as it terrifies me.
Unfortunately, it probably doesn’t, because my life is at far greater risk than the lives of white Americans, especially
those reporting on the issue in the media or advocating in the halls of power. One of the most terrifying aspects of high-tech surveillance is the
invisibility of those it disproportionately impacts. The
NSA and FBI have engaged local law enforcement agencies and
electronic surveillance technologies to spy on Muslims living in the United States. According to FBI training
materials uncovered by Wired in 2011, the bureau taught agents to treat “mainstream” Muslims as supporters of terrorism, to view charitable
donations by Muslims as “a funding mechanism for combat,” and to view Islam itself as a “Death Star” that must be destroyed if terrorism is to
be contained. From New York City to Chicago and beyond, local law enforcement agencies have expanded unlawful and covert racial and
religious profiling against Muslims not suspected of any crime. There is no national security reason to profile all Muslims. At the same time,
almost 450,000 migrants are in detention facilities throughout the United States, including survivors of torture, asylum seekers, families with
small children, and the elderly. Undocumented migrant communities enjoy few legal protections, and are therefore subject to brutal policing
practices, including illegal surveillance practices. According to the Sentencing Project, of the more than 2 million people incarcerated in the
United States, more than 60 percent are racial and ethnic minorities. But by far, the widest net is cast over black communities. Black people
alone represent 40 percent of those incarcerated. More black men are incarcerated than were held in slavery in 1850, on the eve of the Civil
War. Lest some misinterpret that statistic as evidence of greater criminality, a 2012 study confirms that black defendants are at least 30 percent
more likely to be imprisoned than whites for the same crime. This is not a broken system, it
is a system working perfectly as
intended, to the detriment of all. The NSA could not have spied on millions of cellphones if it were not already spying on black people,
Muslims, and migrants. As surveillance technologies are increasingly adopted and integrated by law enforcement agencies today, racial
disparities are being made invisible by a media environment that has failed to tell the story of
surveillance in the context of structural racism.
Add-Ons
LAPD
Imposing regulations on drone use can effectively balance privacy concerns and help
combat terrorism/crime
Newton 2014 Editor and Writer at the Los Angeles Times (Jim, “Drones and the LAPD”,
http://www.latimes.com/opinion/op-ed/la-oe-newton-column-lapd-drones-20141117-column.html)//
The LAPD acquired a pair of small drones a few months ago from the Seattle Police Department, which dropped its plans to use them after public objections. Los Angeles has not yet deployed
drones
could be deployed in situations where suspects are barricaded or holding hostages and where an aerial
view might be helpful. It's hard to argue with that — who wouldn't want police to have better information before trying to subdue a hostage taker? But the drones are just
one aspect of a profound reconsideration of the relationship between policing and privacy. Especially in the area of fighting terrorism, police are
moving from solving crimes to anticipating them, aided by data mining and other technologies. The new techniques carry with
them the possibility of enhancing public safety, but they give some people the creeps. Jamie Garcia and Hamid Kahn are two of those people. They and
the drones — they remain, as Chief Charlie Beck told me last week, “in the box.” Beck says he's waiting for direction from the Police Commission on what will be allowed, but the
their organization Stop LAPD Spying are leading an effort to stop the department from using drones. At their offices near skid row last week, they warned of what they see as police
militarization. Other communities are wrestling with similar issues, but Garcia and Kahn note that the LAPD's history of police spying makes the debate especially important here. In one sense,
drones are not that big a deal. Unlike unmanned aircraft operated by the military and CIA, these don't carry missiles, and because they hover above ground, they can't see much that isn't
already visible to a police helicopter or even a satellite. A drone, however, is smaller and more readily deployed, and for many people it changes the notion of what's private. Most of us regard
our backyards, for example, as private space, but is that a reasonable expectation now that a helicopter, a satellite or a drone can peer into it without entering the property? Only the LA times
would give these two radical clowns space. They say Drones invade privacy issues yet the group of 20 for this group go to meetings, yell, scream, verbally assault, threaten anyone who doesn't
agree with them. They attend police commission meetings all the time cause... Similarly, a national effort to collect data on “suspicious activity” can feel awfully invasive. Activity as innocent as
taking a photograph of a government building or engaging in lawful, peaceful protest can trigger alarm in post-9/11 America. “We're all concerned about safety,” Kahn told me last week, “but
at what price?” The policing paradigm, he and Garcia argued, has shifted from solving crimes to gathering, storing and sharing information. The result is an overbearing, wasteful attempt to
head off future crimes. Significant numbers of people agree, and 2,000 have so far signed a petition circulated by Stop LAPD Spying urging the department not to use its new drones. Clear,
thoughtful rules are needed for recordings by LAPD Clear, thoughtful rules are needed for recordings by LAPD Beck is well aware of the uneasiness that technology creates — and not just in a
law enforcement context. As he pointed out in our conversation, the
erosion of privacy is playing out in every sector of modern life.
Cameras are ubiquitous, online activity creates information that is useful for commercial purposes and stores collect data to target advertising. “Nobody knows more about me than the Vons
where I shop,” Beck said. “We are very rapidly entering a time when everyone will know everything about everybody.”
There is, however, a special burden on law
enforcement to gather and use information with care. The local Vons may know a lot about its customers, but it can't arrest them. Recognizing that
— and aware that the LAPD in the 1980s was roundly criticized for spying on its critics — Beck said he's approaching the use of drones with
unusual caution. His staff is working with the ACLU to develop a draft policy on the use of the small aircraft, and they hope to
present a recommendation to the Police Commission in a few weeks. The commission will then hold public hearings before finalizing a
policy. Kahn and Garcia want the department to forswear the drones altogether. That seems unlikely. Rather than leave his drones in the box, Beck proposes to
operate them with clear rules and sound, civilian oversight — ideas that have been fundamental in addressing other
LAPD issues such as racial bias and use of excessive force. Having rules in place may not be much comfort to the person who looks up from his backyard and sees
an LAPD drone overhead. But it could, at least, ensure that the devices are used to fight crime, not to spy or harass.
Terrorist attack on Los Angeles destroys the economy and escalates
Lawrence 2012 won the David Gemmell Legend Awards (Mark, “Could You Fight a Terrorist? How to
Survive a Terrorist Attack on Downtown Los Angeles”,
http://www.secretsofsurvival.com/survival/downtown-los-angeles-brutal-terrorist-attack.html)//AN
It's no secret that terrorists have been crossing both the Mexican and Canadian borders into the US. Several terrori
sts have reportedly been sent here from places like Pakistan and we can
assume Iran and Syria to train U.S. Muslims (aligned with the cause of Radical Islam) for a probable attack. This is what an attack might look like and how to survive. Warning: Graphic violence.
Extreme survival tactics. If you want to live through this kind of attack, you may have to do the unthinkable. With police departments in major cities now on active watch for terrorist plots by
what would happen if a an attack actually took place on a city
street downtown, like Los Angeles, the center of the CBS report? You're caught in the middle of a "hot zone" -- people
are being killed, terrorists with AK-47s are executing men, women, and children. Shots fly over head and glass shatters in
nearby windows. LAPD: Be On the Look Out for Hezbollah, Iranian Special Forces CBS affiliate in Los Angeles reported August 29, 2012 that LAPD is actively on the look
out for Hezbollah linked terror groups believed to be plotting attacks on Southern California. See (CBS affiliate):
agents from Iran and Hezbollah as indicated by CBS news earlier this year,
LAPD: 'Active' Terror Plots Linked To Iran, Hezbollah, 'Sovereign Citizens' The LAPD has it's own counter-terrorism unit, in fact. CBS reports at the first link above: "'In this region we have active
terrorist plots, in this region, right now,' said Deputy Chief Michael Downing, commanding officer of the LAPD's counter-terrorism unit. The Department is currently tracking 'government of
Iran operatives, Hezbollah, sovereign citizen, homegrown violent extremists, animal rights groups' and others, Downing said. He added that Iranian or Hezbollah agents may initiate attacks
terrorist attack probably won't look
like an Al-Qaeda suicide bomber with limited training and no lengthy military experience. It may look a lot more like an attack by
Navy Seals -- but instead of Navy Seals, the attack will come from highly trained soldiers of Iranian and Hezbollah
special forces -- going for "maximum impact". Maximum Impact Terrorist Attacks For those of you familiar with special forces training, it would be like
the local police (perhaps 30 - 40 cops in the vicinity of a terrorist attack) going up against 75 or more Spetznaz (Russian trained special forces). "Special forces" means
they're trained for the most dangerous assignments -- they are swift, strong, excel in hand to hand combat, automatic weapons, fearless fighting,
and sheer brutality. Local police would be no match -- not unless they could round up 300 heavily armed cops to take on 75 Spetznaz (within minutes of an attack)
locally if war erupts between the U.S. and Iran." What would an attack by Iranian / Hezbollah agents look like? This kind of
who are armed with fully automatic weapons and possibly shoulder fired missiles and grenades -- and still that might not be enough. The fact is this -- a small group of highly trained fighters
(foreign special forces) can take down larger groups of fighters (local police) not prepared for this kind of fight. Los Angeles Terrorist Attacks First, let's consider how local police might react
once the initial calls come in.
Major police departments in Los Angeles and New York City nowadays have counter-terrorism squads,
but they also have Swat Teams, as do most other U.S. cities with a population of 50,000 or more. U.S. Swat Teams are armed to the teeth with men highly trained for arrests and take downs of
Jihadist terror cells from Iran and Hezbollah have highly trained men also -- men trained to kill for Islamic
ideals, men trained with weapons and explosives. Some of these men may be Iranian special forces -- special forces a lot like our own Navy Seals and Airborne
dangerous criminals.
Rangers here at home. Many are highly trained, deadly accurate with weapons, dangerous in hand to hand combat. How these two groups (Swat Teams and Jihadist terror cells) aren't running
terror groups (we know they're here, there's no doubt about that) are
communicating with one another at a level that is beating America's surveillance here at home. Jihad: Superior
into one another right now when the terror threat level is so high in America reveals one thing --
Communications No fly-lists, email and phone surveillance, U.S. mosques infiltrated by government informants -- stakeouts by the FBI and other undercover government teams are not getting
anywhere, it seems. Not to say that the FBI isn't good at what they do -- they have done a great job with tracking down and breaking up large scale organized crime rings in the past; they've
arrested the leaders of street gangs and motorcycle clubs, as well as a number of large drug rings that can trace their origins all the way to South American drug lords. In any of these groups,
dozens and sometimes hundreds of arrests can take place at one time in a large FBI sting -- But it's not happening with Jihadist terror cells. Risk of Terrorist Attack Remains High With or
risk remains high for a series of simultaneous terrorist attacks timed to create
"maximum terror" in America; terrorists most likely want to disrupt our already shaky economy and are likely
without arrests of terrorist cells, the
to do that by plotting attacks that cause mass-fear across the United States population. Swat Team Up in Flames What about the local Swat Team? Foreign special forces may already have a
plan for taking on the local Swat Team -- they might blow up their armored vehicle as it leaves base -- the entire Swat Team murdered before they can pose any threat. Or they might have
snipers waiting near the scene, ready to pick off Swat Team members and any others that pose a threat to an active terror attack. Learning From a Real Terrorist Attack with AK-47s In 2008,
Mumbai, India was attacked by trained militants from Pakistan, where multiple locations where attacked at around the same time, or shortly after one another. One group of militants (ten)
that attacked that evening landed on a beach in inflatable speedboats, simply telling local fishermen to "mind their own business" as they set off into the city (a report to police by the
fishermen received little response). One of the first attacks began when two men with AK-47s walked into a train station and began killing people. In all, just in that train station, they killed 58
people and injured 104. Then they left the train station, shooting at pedestrians and police, killing eight police officers. They passed a police station but the police inside were smart -- out
Two
terrorists armed with AK-47s storm a cafe, killing at least 10 people, injuring several more. Multiple other
terrorists seize two hotels, The Taj Mahal and the Oberoi Trident; several people are killed, many more are injured. Hostages are taken at both hotels; many flee from
gunned, they had secured the gates and shut off all the lights and hid. The attackers ignored the police station and continued their attack in the city. Elsewhere in Mumbai...
windows as fire fighters with ladders outside the hotels help several people escape. A Jewish outreach center (the Nariman house) is seized by terrorists, hostages are taken; a few people end
up killed by the time the attack is broken up by counter terrorism teams who are dropped on to the roof by helicopter and covered by nearby snipers. India's counter terrorism forces
eventually are able to infiltrate each location terrorists had seized and had taken hostages; during rescues a few people are killed, including counter terrorism forces; all but one terrorist
it's possible that there had been a
bigger attack planned, thus the reason for the excess weapons stored at the docks.
(arrested and taken into custody) die. Down in the Mumbai harbor police seized a boat carrying guns and explosives --
Cyberwar
2AC – Cyber War turn
Federal regulation of drones is necessary to build safeguards against cyber war
Bernd 2013 (Candice [assistant editor/reporter with Truthout]; The Coming Domestic Drone Wars; Sep
19; www.truth-out.org/news/item/18951-the-coming-domestic-drone-wars#; kdf)
Domestic Drone Weaknesses Cyber
warfare may prove to be the most enduring challenge for the FAA when it
comes to ensuring guidelines that will protect Americans adequately as drone technology makes its
transition into civilian life. Peter Singer is the director of the Center for 21st Century Security and Intelligence and a senior fellow in
the Foreign Policy program at Brookings Institute. He is the author of Wired for War: The Robotics Revolution and Conflict in the 21st Century.
According to him, the
primary weakness of drone technology is many systems' dependence on GPS signals
and remote operation. Even military-grade drone technology can be co-opted, he said. In December 2011, the
Iranian Army's electronic warfare unit brought down an American drone, the RQ-170 Sentinel, after it crossed into Iranian airspace. In Iraq in
2009, Iraqi insurgents were able to use $26 software to intercept the video feeds of US Predator drones in a manner "akin to a criminal listening
in on the police radio scanner," Singer told Truthout. Most recently,
a research team at the University of Texas was able to
demonstrate successfully the spoofing of a UAV by creating false civil GPS signals that trick the drone's
GPS receiver. "There aren't easy answers to these other than good encryption requirements," Singer told Truthout in an email. The Texas
research team hoped to demonstrate the dangers of spoofing early on in the FAA's task to write the mandated rules for UAS integration in the
national airspace, and the Department of Homeland Security invited the team to demonstrate the spoofing in New Mexico. "Vulnerability
to jamming and spoofing depends highly on the design of the aircraft and control systems and vary
across differing architectures. Minimum system performance and design standards developed for civil
UAS designs will address these vulnerabilities," an FAA spokesman told Truthout. Whether minimum standards for
system performance will be enough to address the changing dynamic of cyber warfare, and for that matter,
technology, remains a question, but it's something the FAA and Homeland Security are examining as drone
technology becomes more widespread in the US.
It’s the most probable existential threat
Paikowsky and Baram 2015 (Deganit [post-doctoral fellow at the Davis Institute for International Relations at
Hebrew University in Jerusalem and a senior researcher at the Yuval Nee’man Workshop for Science, Technology, and Security
at Tel-Aviv University, also a research associate at the Space Policy Institute at George Washington University and a consultant
to the space committee of Israel’s National Council for Research and Development] and Gil [Ph.D. candidate in the department
of political science at Tel-Aviv University, and a researcher at the Yuval Nee’man workshop for Science, Technology, and
Security at Tel-Aviv University]; Space Wars; Jan 7; www.foreignaffairs.com/articles/142690/deganit-paikowsky-and-gilbaram/space-wars?cid=rss-rss_xml-space_wars-000000; kdf)
In September 2014, hackers from China broke into the U.S. National Oceanic and Atmospheric Administration (NOAA) network in an attempt to
disrupt data related to disaster planning, aviation, and much more coming from U.S. satellites. This breach was the
latest in a series of cyberattacks on space systems, exposing the Achilles’ heel of such technology: the vulnerability of its computers and
the information it creates and transmits. Cyberattacks, which are on the rise in every industry, pose particularly significant threats to
space systems as they are used so ubiquitously in corporate and military operations, making them increasingly attractive targets for hackers. Although only
about a dozen countries have the capability to launch a satellite into space , billions of people around the world rely on space
systems for nearly every aspect of modern life. Satellites are used to support phones, the Internet, and banking
systems. They are also used to monitor land, air, and maritime traffic; facilitate global communications; transmit mass media in real time;
monitor the earth for climate change or severe weather threats and natural disasters; gather intelligence; and send early
warnings of incoming ballistic missiles. It is no wonder, then, that the global economy depends on communication
satellites, navigation systems, and earth-observation satellites. The backbone of all these services consists of 1,200 operational satellites currently orbiting the
earth, which have the potential to cause significant tangible damage by attacking national or global space systems across countries and continents. Even a small
glitch can wreak havoc. For example, in April 2014, the Glonass System, the Russian equivalent of the American-designed GPS, malfunctioned due to two small
mathematical mistakes in the software. Significantly, fixing the system took more than 13 hours, and the half-day breakdown led to severe disruption of Glonass
receivers, which affected iPhone5 users. While the disruption was not caused by ambitious hackers, it is easy to see why space
systems are the brass
ring of cybercrimes: They are low effort and high return. Therefore, a relatively simple hack can inflict
considerable damage. It is easy to see why space systems are the brass ring of cybercrimes: They are low effort and high return. Therefore, a relatively
simple hack can inflict considerable damage. EASY PREY Although a space system is composed of three connected segments—satellites and spacecraft that orbit the
earth, ground stations, and the communication systems that link the two—cybercriminals only need to find the vulnerabilities in one of these segments. For
example, for a few hundred dollars, a hacker can buy a small jamming device on the Internet to interfere with satellite signals. “We have to make it (satellite
navigation systems) more robust,” warned Colonel Bradford Parkinson, who led the creation of the GPS. “Our cellphone towers are timed with GPS. If they lose that
time, they lose sync and pretty soon they don’t operate. Our power grid is synchronized with GPS [and] so is our banking system.” Space
systems have
become the target of hacking. In July of last year, the United States identified a 28-year-old British citizen who hacked a number of government
networks, including NASA. He attempted to grab highly sensitive data and claimed he would “do some hilarious stuff with it.” Four months later, in November 2013,
viruses infected the computers used by the International Space Station. Japan’s space agency also discovered a computer virus inside a few of its computers in
January 2012 and Germany’s space center recently suffered an espionage attack, with several of its computers getting hit with spyware. Since 2009, the BBC has
complained of disruptions to its Persian-language radio and television programs and has accused Tehran of interfering with international satellite broadcasts
beamed into Iran. Only after the EU made a diplomatic complaint to pressure Iran to cease and desist did the attacks stop. When North Korea jammed South
Korea’s GPS signals in May 2012, it affected the navigation of over 250 flights. The list goes on. One of the reasons space systems, especially commercial ones, are
such easy prey is that they often operate with outdated software. Developing a space system is generally a long process that, depending on the complexity of the
system, takes several years to complete. And once the system is operational, it is expected to last for at least several years—sometimes even more than a decade.
This process makes it difficult to update the system’s security software. Moreover, in many cases, the information systems that are being used to manage space
systems are mostly based on commercial “off-the-shelf” products, with known vulnerabilities and low levels of protection, especially compared to supposedly
better-protected military systems. In 2014, a number of think-tanks, from the Council on Foreign Relations to London-based Chatham House, as well as the
information-security firm IOActive, sounded the alarm on how vulnerable space systems are to cyberattacks. These reports warned of the ease with which
backdoors in software—an undetected remote access to a computer—can be exploited, and of the prevalence of unsecured software, non-protected protocols, and
unencrypted channels. One of the studies’ recommendations was to immediately remove software updates from the public websites of various companies that
provide satellite services and equipment, in order to prevent hackers from reverse-engineering the source code. However, despite these warnings, the
space
industry is barely aware of these risks and its responses are slow. Herein lies a challenge: to produce and put into practice
standards and regulations regarding multinational and commercial activities in space technology and exploration. MOVING FORWARD In the past year, several
space-faring nations have begun to tackle the issue. Three months ago, the U.S. Air Force announced that it hopes to develop technologies that would prevent
hackers from jamming its satellites. Russia intends to significantly update the robustness and security of its military and government satellite communication system
by 2025. Despite these positive steps, national governments and international bodies have more ground to cover. First, governments need to increase their efforts
to raise awareness regarding the growing threat of cyberattacks against both government and commercial space systems. Second, in order to provide better
protection, governments and corporations should take a holistic rather than piecemeal approach regarding the protection of all segments of their systems, and
work toward solutions that will ensure the performance of the systems and their services, rather than protecting a specific asset. For example, satellites are and will
continue to be damaged by cyberattacks; but the ability of an entire system to operate smoothly and recover rapidly is more crucial than the security and safety of a
single satellite. Third, military, civil, and commercial actors should engage in more dialogue in order to strengthen overall protection. They can do so by sharing
information and working jointly toward better standards and regulations. Fourth, governments and international bodies should try to standardize protocols for
protecting space systems. For example, when NOAA was breached in September, the Inspector General for the Commerce Department, which oversees the
network, had just criticized it for an array of “high-risk vulnerabilities” in the security of its satellite information and weather service systems. It took nearly a month
for NOAA to admit it had been hacked. Hiding such information hampers meaningful and timely discussion about the issue and delays the development of
preventive measures. Enforcing a standard protocol could help alleviate this problem. And finally, protecting space systems must be an international effort. Spacefaring nations should work together to achieve international cooperation on all of the areas mentioned above: raising awareness, sharing information, and
developing much-needed standards. The
potential for colossal damage and the relative ease of launching a
cyberattack on space systems make them tantalizing targets for cybercriminals. The threat is already at
our doorstep, and it will only get bigger. It is time for the international space community to muster the political will to rise to this growing
challenge.
SOP
Warrants revitalizes the separation of powers
Reynolds 2014 (Glenn Harlan [prof of law @ U of Tennessee]; NSA spying undermines separation of
powers: Column; www.usatoday.com/story/opinion/2014/02/10/nsa-spying-surveillance-congresscolumn/5340281/; kdf)
Most of the worry about the National Security Agency's bulk interception of telephone calls, e-mail and the
like has centered around threats to privacy. And, in fact, the evidence suggests that if you've got a particularly steamy phoneor Skype-sex session going on, it just might wind up being shared by voyeuristic NSA analysts. But most Americans figure, probably rightly, that
the NSA isn't likely to be interested in their stuff. (Anyone who hacks my e-mail is automatically punished, by having to read it.) There is,
however, a class of people who can't take that disinterest for granted:
members of Congress and the judiciary. What they
have to say is likely to be pretty interesting to anyone with a political ax to grind. And the ability of the
executive branch to snoop on the phone calls of people in the other branches isn't just a threat to privacy,
but a threat to the separation of powers and the Constitution. As the Framers conceived it, our system of government is
divided into three branches -- the executive, legislative and judicial -- each of which is designed to serve as a check on the others. If the
president gets out of control, Congress can defund his efforts, or impeach him, and the judiciary can declare his acts unconstitutional. If
Congress passes unconstitutional laws, the president can veto them, or refuse to enforce them, and the judiciary, again, can declare them
invalid. If the judiciary gets carried away, the president can appoint new judges, and Congress can change the laws, or even impeach. But if
the federal government has broad domestic-spying powers, and if those are controlled by the executive
branch without significant oversight, then the president has the power to snoop on political enemies,
getting an advantage in countering their plans, and gathering material that can be used to blackmail or
destroy them. With such power in the executive, the traditional role of the other branches as checks would be seriously undermined, and
our system of government would veer toward what James Madison in The Federalist No. 47 called "the very definition of tyranny," that is, "the
accumulation of all powers, legislative, executive, and judiciary, in the same hands." That such widespread spying power exists, of course,
doesn't prove that it has actually been abused. But the temptation to make use of such a power for self-serving political ends is likely to be very
great. And, given the secrecy surrounding such programs, outsiders might never know. In fact, given the compartmentalization that goes on in
the intelligence world, almost everyone at the NSA might be acting properly, completely unaware that one small section is devoted to gather
political intelligence. We can hope, of course, that such abuses would leak out, but they might not. Rather
than counting on leakers
to protect us, we need strong structural controls that don't depend on people being heroically honest or
unusually immune to political temptation, two characteristics not in oversupply among our political class. That means that
the government shouldn't be able to spy on Americans without a warrant — a warrant that comes from a
different branch of government, and requires probable cause. The government should also have to keep a clear record
of who was spied on, and why, and of exactly who had access to the information once it was gathered. We need the kind of extensive audit
trails for access to information that, as the Edward Snowden experience clearly illustrates, don't currently exist. In addition, we need civil
damages — with, perhaps, a waiver of governmental immunities — for abuse of power here. Perhaps we should have bounties for
whistleblowers, too, to help encourage wrongdoing to be aired. Is this strong medicine? Yes. But widespread spying on Americans is a threat to
constitutional government. That is a serious disease, one that demands the strongest of medicines.
Strong separation of powers are essential for US global leadership
Ikenberry 2001- Professor at Georgetown University (G. John, National Interest, Spring 2001, Lexis)
America's mature political institutions organized around the rule of law have made it a relatively
predictable and cooperative hegemon. The pluralistic and regularized way in which U.S. foreign and security policy is made
reduces surprises and allows other states to build long-term, mutually beneficial relations. The governmental separation of
powers creates a shared decision-making system that opens up the process and reduces the ability of
any one leader to make abrupt or aggressive moves toward other states. An active press and competitive party
First,
system also provide a service to outside states by generating information about U.S. policy and determining its seriousness of purpose. The
messiness of a democracy can, indeed, frustrate American diplomats and confuse foreign observers. But over the long term, democratic
institutions produce more consistent and credible policies--policies that do not reflect the capricious and
idiosyncratic whims of an autocrat. Think of the United States as a giant corporation that seeks foreign investors. It is more likely to
attract investors if it can demonstrate that it operates according to accepted accounting and fiduciary principles. The rule of law and
the institutions of policymaking in a democracy are the political equivalent of corporate transparency
and accountability. Sharp shifts in policy must ultimately be vetted within the policy process and pass muster by an array of investigatory
and decision-making bodies. Because it is a constitutional, rule-based democracy, outside states are more
willing to work with the United States-or, to return to the corporate metaphor, to invest in ongoing
partnerships.
Restoring legitimacy is vital to continued hegemony
Suzanne Nossel 7, Senior Fellow at the Center for American Progress and the Century Foundation and
previously served as deputy to the Ambassador for UN Management and Reform at the U.S. Mission to
the United Nations, "Going Legit", Winter, www.democracyjournal.org/3/6507.php?page=all
It’s a truism today that America’s position as the world’s superpower is shakier than it used to be. The
nation’s military is overstretched and unable to take on new commitments. Interest payments on the national debt topped
$400 billion in the 2006 fiscal year, threatening to crowd out needed expenditures to sustain economic
competitiveness. And Washington has made little progress on urgent foreign policy objectives, including
stabilizing Iraq, curbing Iran’s and North Korea’s nuclear programs, expanding global trade, and ending antiAmerican extremism in the Arab and Muslim worlds.¶ The Iraq war has directly caused much of this damage. Financially, it has been a huge drain: The
Congressional Budget Office reported in mid-2006 that costs topped $432 billion. Militarily, it has been punishing: The Pentagon admits that the conflict has badly stretched the Armed Forces,
with 70 percent of troops scheduled to return to Iraq next year set to serve their third tours. In human terms, the price has been high: nearly 3,000 American troops have died to date.¶ The
The Iraq intervention has eroded the
esteem, respect, and trust that the United States once commanded on every continent, hampering a host of
current policy objectives and putting ambitious and important new goals out of reach. Rehabilitating America’s legitimacy,
therefore, will be essential to ensuring that the Iraq war does not exact a permanent toll on American global influence.¶
International legitimacy is a measure of the acceptability and justifiability of a state’s actions in the eyes of other
states and their citizens. Legitimacy, a kind of moral capital, reflects a collective judgment that the assertion of power, through a policy or an action, is valid even if it is unpopular. After
war’s dearest casualty, however, has been to America’s international standing, specifically its legitimacy abroad.
all, leadership requires taking the occasional unpopular stand; but whereas popularity is inherently ephemeral, contingent on personalities and temporary alignments of interest,
legitimacy is more enduring. It provides a foundation for respect and understanding that can transcend shortterm, conflicting goals. Practically, when America’s purposes are well-founded, openly articulated, and
broadly consistent with its professed values, the use of power toward those ends is generally judged
legitimate. But when the United States misleads others about its motives, acts on inadequate or selective evidence,
flouts its own principles, or unilaterally exempts itself from broadly agreed standards of conduct, its
legitimacy suffers.¶ The current administration has put little weight on legitimacy as a criteria for policy-making. The Iraq war, for instance, wasn’t waged without regard for
international legitimacy; on the contrary, eschewing legitimacy was part of the plan. From the start, Bush Administration officials derided the idea that American power should answer to
international norms. Vice President Dick Cheney resisted calls by Secretary of State Colin Powell to bring Washington’s case against Iraq to the UN, judging such diplomatic machinations a
waste of time. The Administration even sometimes seemed to suggest, perversely, that if leading European nations or the UN were involved, results would be slower and less effective.¶
Undoing this damage is a precondition for setting U.S. foreign policy back on course. International legitimacy,
viewed by the Bush Administration as constraining American power, must now be recognized as an indispensable
tool for fortifying and extending it. As we look to a post-Bush foreign policy, progressives need to recognize that
a concerted effort to reconstitute America’s legitimacy is the best way to safeguard American
superpowerdom in the long term.¶ The History of Legitimacy¶ The increasing importance of international legitimacy
and the rise of the United States as a global power go hand-in-hand. During the colonial era of great power politics, military prowess
and territorial control ruled the day; countries with resources and armies did not worry much about the court of international opinion. But after World War II, as leading nations grappled with
how to administer war-ravaged Europe and Japan and how to prevent future world wars, legitima0cy moved to the forefront. International law was expounded through treaty-based
organizations like the UN, NATO, and the Bretton Woods institutions. The dismantling of far-flung colonial empires and the emergence of the principle of self-determination helped fulfill the
The United States enjoyed a great deal of legitimacy in
the postwar period. The conservative scholar Robert Kagan argued in Foreign Affairs that U.S. legitimacy derived mainly from the Cold War itself: Among Western European
widening belief that power needed to be made accountable to peoples affected by it.¶
governments and publics American actions were seen as justified to face down a totalitarian menace. While violent proxy wars in Latin America and Asia had some corrupting effects on
political scientists Robert Tucker
and David Hendrickson contend that America’s legitimacy derived not from its struggle against communism per se, but rather from the
respect President Harry Truman and his successors showed for international law and norms.¶ The end of the Cold War scrambled
America’s image, they did not outweigh the perception of credibility in the Cold War’s primary battleground of Europe. In contrast,
the situation. On the one hand, it left the United States as the world’s sole remaining superpower. With liberal democracy ascendant, American values–including the market capitalism that
much of the world once saw as synonymous with imperialist exploitation–now enjoyed wide acceptance in Eastern Europe, Asia, and elsewhere. With the Soviet Union gone, what Kagan
identified as the “legitimizing effect” of the Cold War struggle evaporated. At the same time, America’s legitimacy also came under closer scrutiny. This imbalance led to concern over the
unparalleled degree of U.S. influence over the world economy, decision-making at the UN, and oil supplies in the Middle East. Skeptics impugned American motives and methods by pointing to
examples of Washington’s hypocritical support for oil-rich oligarchies in the Middle East, uneven commitment to global free trade, and insufficiently aggressive efforts to halt greenhouse gas
emissions.¶ The Clinton Administration handled these concerns through balanced policies and a degree of self-regulation. It showed enough respect for the views of allies and for the UN to get
away with circumventing international rules from time to time–as when it failed for many years (due to congressional resistance) to pay its dues to the UN or failed to ratify the International
Criminal Court (ICC) . During the Clinton era, conservatives sharpened their longstanding critique of the idea that American foreign policy needed to enjoy international legitimacy. Many of
these thinkers and politicians had, during the Cold War, seen international institutions like the UN as Soviet-influenced impediments to American interests. Now they argued that America must
not be constricted by external norms of legitimacy, particularly if legitimacy might be arbitrated by international institutions like the UN that, despite the Soviet Union’s collapse, still counted
dictatorships and tyrannies among their ranks.¶ Such an argument was implicit in Kagan and William Kristol’s 1996 call for a foreign policy based on “benevolent hegemony”–a concept that
continued to animate neoconservatives through the 2003 Iraq invasion. Rooted in the Cold War experience in which Eastern European peoples drew inspiration from Western liberal ideals,
benevolent hegemony held that if the United States acted from passionate conviction, its moral rectitude would be recognized and followed, if not immediately then in the long run. The
concept of benevolent hegemony guided the Bush Administration’s foreign policy even before September 11–evident, for example, in its decision in late 2001 to withdraw from the AntiBallistic Missile Treaty. The Administration knew the action would initially be derided, but it believed that the world would come to recognize that the creation of a North American missile
After September 11, Bush’s decision to
frame the battle against terrorism as one of good versus evil also drew on assumptions of benevolent
hegemony. Bush expected that the self-evidently moral basis of the fight against al Qaeda would insulate the United States from any potential questions about the legitimacy of its
shield would ultimately enhance not just American security, but also “the interests for peace in the world.”¶
actions, much as the battle against Soviet totalitarianism had once done in many quarters. For a short time after September 11, that logic seemed to prevail broadly, uniting the world in swift
while the 2001 terrorist attacks
temporarily legitimized an aggressive American foreign policy, they also emboldened the conservative
critique of legitimacy itself. Conservatives–such as Attorney General John Ashcroft and his Deputy John Yoo–crafted arguments on the premise that to be constrained by
approval for the U.S.-led invasion of Afghanistan and other aggressive steps to clamp down on global terrorism. But
internationally accepted legal constructs after the attacks would be to short-change U.S. security and abdicate America’s natural right to defend itself as it saw fit. Bush and his
supporters summoned the visceral patriotism of a wounded nation to argue that the United States must
unshackle itself from the constraints of international rules that could tie its hands. The embrace of the doctrine of
preemptive war in the 2002 National Security Strategy was a deliberate signal to the world that the United States no longer saw itself constrained by norms of legitimacy, arrogating for itself a
unilateral right with no articulated justification as to why it alone was authorized to preempt threats with force.¶ Thus the Administration approached the Iraq conflict with broad confidence
in the world’s belief in America’s benevolent hegemony and a dismissive attitude toward the constraints of legitimacy. Although Powell managed to convince the Administration to make a
pitstop at the UN Security Council to seek approval for its planned invasion, the UN membership (and much of the American public) correctly suspected the decision had already been made.
And indeed, when the Security Council balked at Bush’s case, the Administration moved forward anyway, constrained by neither the holes in its case for intervention nor by the world’s
resistance. Washington was convinced that its rightness, even if not ratified in advance, would be revealed after the fact.¶ But instead the opposite happened. As Francis Fukuyama describes
, it became apparent soon after the invasion that benevolence would not come to
America’s rescue. Instead of welcoming American soldiers with sweets and flowers, Iraqi society exploded into a complex civil war. U.S. forces failed to find weapons of mass
in America at the Crossroads
destruction, debasing the war’s central aim in both domestic and foreign eyes. And high-profile cases of prisoner abuse and war crimes against civilians made a mockery of Bush’s lofty vision of
bringing liberty and democracy to the Middle East. Both at home and abroad, even those who initially believed the invasion was well-intended–not just conservatives, but also many
While the United States remains preeminent in its military and
economic strength, the most potent global challenges it faces–nuclear proliferation, terrorism, failed states,
and the scramble for energy–are not amenable to resolution through money or firepower. They depend
on America’s ability to forge agreements, build consensus, and persuade others, all of which in turn
are contingent on whether Washington enjoys international legitimacy.¶ A drive to restore America’s
legitimacy, then, must rest on a clear understanding of what legitimacy is, how it is attained, and why it is
useful. Bush has caricatured legitimacy as a straitjacket, a “permission slip” from the world. But legitimacy has two rather more respectable
sources: rules and rectitude. The first involves authorization by a formal body or written set of laws, such as an international agreement or treaty. Acts that meet the
Democrats in Congress–came to feel duped.¶ The Case for Legitimacy¶
criterion include measures taken in self-defense against an imminent threat under the UN Charter, policies on detention that match the Geneva Conventions, and extradition agreements
rectitude, cannot be granted or taken away through any
formal process; it must be earned. It revolves around the perception that a policy or action is justified
and is not as easy to come by as following a set of prescribed rules. Indeed, codified international law is too ill-defined, incomplete, and
consistent with the Rome Statute of the ICC.¶ The second source of international legitimacy,
unevenly applied to be the only test of international legitimacy. For example, when the United States has employed the technique of targeted assassinations against al Qaeda leaders,
international outcry has been muted despite the fact that such extralegal killings violate international law. Judgments of the rectitude of particular actions take account of individual
circumstances: whether an action is provoked, what alternatives were available, and whether appropriate methods were used. In the case of targeted terrorist assassinations–where the
provocation is clear, the prospects for capturing an elusive and well-protected terrorist alive are low, and the harm to innocents is nil–the weight of legitimacy may be on the side of the
International legitimacy–whether derived from rules, rectitude, or both–can be affirmed and judged in three different
forums. First, standing multilateral institutions–principally the UN Security Council, but also international courts or regional entities like NATO and the
African Union–can formally ratify actions such as military interventions. Second, states can individually express their support or
assassin.¶
acquiescence with the actions of other states. For example, when the United States, Europe, and others indicated in the spring of 2006 that they would
reduce funding to the elected Hamas-led government in the Palestinian territories because Hamas was a terrorist organization, they helped legitimize Israel’s decision not to turn over
Third, legitimacy gets arbitrated by the public at large in newspapers, cafés, web sites, and street
the concept’s elusiveness does not diminish its
importance. Liberal advocates of legitimacy need to embrace alternative sources of legitimacy when, for example, the UN Security Council is paralyzed in the face of a threat. The
United States can–and should–act alone if it must. While the withholding of international support will suggest that others doubt the legitimacy of an action,
collected tax monies to Hamas.¶
protests. Particularly in this last form, legitimacy can sound slippery and hard to define. But
such misgivings do not–in themselves–render the act illegitimate. While not prohibiting action, broad international reservations should occasion a hard look at why support is not forthcoming
and whether reasonable measures–for example, further attempts at resolution short of the use of force–are warranted. A certain measure of legitimacy will derive from the very willingness to
engage and debate where the boundaries of legitimacy lie, rather than standing aloof and claiming that such questions don’t matter to Washington.¶ The lampooning of legitimacy by the Bush
Administration, of course, has made the concept taboo in some circles. After the first presidential debate in 2004, John Kerry was drubbed by critics for suggesting that acts of preemption
should have some widely recognizable justification (in his ill-chosen words, passing a “global test”). Afraid of being portrayed as weak on defense, many progressives now hedge their
arguments, calling for building support for U.S. policies and rebuilding America’s popular image, but not speaking of restoring international legitimacy.¶ Though a worthy goal in its own right,
renewing America’s popularity is not the same as restoring its legitimacy. A charismatic new president who
traveled the world could help rebuild America’s image and favorability ratings. A generous new foreign aid program might do
the same. But, unless accompanied by visibly increased attention to international norms, these
changes will not allay concerns over America’s motives.¶ The crumbling of American legitimacy has had wide
ripple effects, from the spread of jihadism to the rise of anti-American governments in Latin America to
the inability of the United States to muster UN support for an intervention in Darfur. According to the UN’s special envoy for Sudan, that
country’s beleaguered population is wary that international intervention is a first step to recolonization and has a “genuine fear of the Iraq scenario being repeated.” As human rights advocate
David Rieff has pointed out, even liberal interventionists clamoring to stop the Darfur genocide must confront the fact that, after Iraq, a U.S. invasion may well be more inflammatory than
pacific.¶ Taking Legitimacy Seriously¶ Legitimacy is not a sweeping foreign policy vision, but rather a principle that functions like a set of guardrails to keep the country on course toward the
overriding goal of sustaining American superpowerdom.
Mouthing the rhetoric of legitimacy will not help. The Bush Administration’s Orwellian
invocation of the language of liberal internationalism–active promotion of freedom, human rights, and the rule of law–amid policies marked by unilateralism, preemptive force, and human
In projecting the embrace of legitimacy as a centerpiece of its
foreign policy, the United States will be judged not by its words but by its actions.
and civil rights abuses has all but drained the meaning from those terms.
1AR Impacts
Heg prevents great power wars
Thayer 13 - PhD U Chicago, former research fellow at Harvard Kennedy School’s Belfer Center, Political
Science Professor at Baylor (“Humans, Not Angels: Reasons to Doubt the Decline of War Thesis”,
September, International Studies Review Volume 15, Issue 3, pp. 396–419)
Pinker is sensitive to the importance of power in a domestic context—the Leviathan is good for safety and the decline of violence—he neglects the role
of power in the international context, specifically he neglects US power as a force for stability. So, if a liberal
Accordingly, while
Leviathan is good for domestic politics, a liberal Leviathan should be as well for international politics. The primacy of the United States provides the world with that liberal Leviathan and has
American primacy within
the international system causes many positive outcomes for the world. The first has been a more peaceful
world. During the Cold War, US leadership reduced friction among many states that were historical antagonists,
most notably France and West Germany. Today, American primacy and the security blanket it provides
reduce nuclear proliferation incentives and help keep a number of complicated relationships stable such
as between Greece and Turkey, Israel and Egypt, South Korea and Japan, India and Pakistan, Indonesia and
Australia. Wars still occur where Washington's interests are not seriously threatened, such as in Darfur, but a Pax Americana does reduce war's
likelihood—particularly the worst form—great power wars. Second, American power gives the United States
the ability to spread democracy and many of the other positive forces Pinker identifies. Doing so is a source of much
four major positive consequences for international politics (Thayer 2006). In addition to ensuring the security of the United States and its allies,
good for the countries concerned as well as the United States because liberal democracies are more likely to align with the United States and be sympathetic to the American worldview. In
once states are governed democratically, the likelihood of any type of conflict is significantly
reduced. This is not because democracies do not have clashing interests. Rather, it is because they are
more transparent, more likely to want to resolve things amicably in concurrence with US leadership. Third, along with the growth of the number of
democratic states around the world has been the growth of the global economy. With its allies, the United States has
labored to create an economically liberal worldwide network characterized by free trade and commerce,
respect for international property rights, mobility of capital, and labor markets. The economic stability
and prosperity that stems from this economic order is a global public good. Fourth, and finally, the United States has been willing
to use its power not only to advance its interests but to also promote the welfare of people all over the globe. The United States is the earth's leading
source of positive externalities for the world. The US military has participated in over 50 operations since the end of the Cold War—and most of those
addition,
missions have been humanitarian in nature. Indeed, the US military is the earth's “911 force”—it serves, de facto, as the world's police, the global paramedic, and the planet's fire department.
There is no other state, group of states, or international organizations that can provide these global
benefits. Without US power, the liberal order created by the United States will end just as assuredly. But, the
waning of US power, at least in relative terms, introduces additional problems for Pinker concerning the decline of violence in the international realm. Given the importance
of the distribution of power in international politics, and specifically US power for stability, there is reason to be concerned about the
future as the distribution of relative power changes and not to the benefit of the United States.
Hegemony solves extinction
Barnett 11 - Former Senior Strategic Researcher and Professor in the Warfare Analysis & Research
Department, Center for Naval Warfare Studies, U.S. Naval War College American military geostrategist
and Chief Analyst at Wikistrat (Thomas, “The New Rules: Leadership Fatigue Puts U.S., and Globalization,
at Crossroads,” March 7 http://www.worldpoliticsreview.com/articles/8099/the-new-rules-leadershipfatigue-puts-u-s-and-globalization-at-crossroads)
We live in a time of arguably the greatest structural change in the global order
yet endured, with this historical moment's most amazing feature being its relative and absolute lack of mass
violence . That is something to consider when Americans contemplate military intervention in Libya, because if we do take the step to prevent larger-scale
killing by engaging in some killing of our own, we will not be adding to some fantastically imagined
It is worth first examining the larger picture:
global death count stemming from the ongoing "megalomania" and "evil" of American "empire." We'll
be engaging in the same sort of system-administering activity that has marked our stunningly successful
stewardship of global order since World War II. Let me be more blunt: As the guardian of globalization, the U.S. military
has been the greatest force for peace the world has ever known. Had America been removed from
the global dynamics that governed the 20th century, the mass murder never would have ended.
Indeed, it's entirely conceivable there would now be no identifiable human civilization left, once
nuclear weapons entered the killing equation. But the world did not keep sliding down that path of
perpetual war. Instead, America stepped up and changed everything by ushering in our nowperpetual great-power peace . We introduced the international liberal trade order known as
globalization and played loyal Leviathan over its spread. What resulted was the collapse of empires, an explosion of
democracy , the persistent spread of human rights , the liberation of women, the doubling of life
expectancy , a roughly 10-fold increase in adjusted global GDP and a profound and persistent reduction in
battle deaths from state-based conflicts. That is what American "hubris" actually delivered. Please remember that the next time some TV pundit sells you the image of
"unbridled" American military power as the cause of global disorder instead of its cure. With self-deprecation bordering on self-loathing, we now imagine a post-American world that is anything but. Just watch who scatters
As for the
sheer "evil" that is our military-industrial complex, again, let's examine what the world looked like
before that establishment reared its ugly head. The last great period of global structural change was
the first half of the 20th century, a period that saw a death toll of about 100 million across two
world wars. That comes to an average of 2 million deaths a year in a world of approximately 2 billion souls. Today, with far more comprehensive worldwide reporting, researchers report an average of less than
100,000 battle deaths annually in a world fast approaching 7 billion people. Though admittedly crude , these calculations suggest a 90 percent absolute drop
and a 99 percent relative drop in deaths due to war . We are clearly headed for a world order
characterized by multipolarity, something the American-birthed system was designed to both encourage and accommodate. But given how things
turned out the last time we collectively faced such a fluid structure, we would do well to keep U.S.
power , in all of its forms, deeply embedded in the geometry to come.¶ To continue the historical survey, after salvaging Western Europe from its
half-century of civil war, the U.S. emerged as the progenitor of a new, far more just form of globalization -- one
based on actual free trade rather than colonialism . America then successfully replicated
globalization further in East Asia over the second half of the 20th century, setting the stage for the
Pacific Century now unfolding.
and who steps up as the Facebook revolutions erupt across the Arab world. While we might imagine ourselves the status quo power, we remain the world's most vigorously revisionist force. ¶
AT Hard Power Key
Material power is irrelevant---lack of legitimacy makes heg ineffective
Mendelsohn 10 - Assistant Professor of Political Science at Haverford College and a Senior Fellow of
FPRI (Barak, “The Question of International Cooperation in the War on Terrorism”,
http://www.fpri.org/enotes/201006.mendelsohn.cooperationwarterror.html)
the United States sought to advance more than what it viewed as simply its own interest. The United States stands behind multiple
has overreached, sought to gain special rights other states do not have, or presented
strategies that were not compatible with the general design of the war on terrorism, to which most states subscribed. When it went too far, the
United States found that, while secondary powers could not stop it from taking action, they could deny it legitimacy and make the
achievement of its objectives unattainable. Thus, despite the common narrative, U.S. power was successfully checked, and the United
States found the limitations of its power, even under the Bush administration. Defining Hegemony Let me begin with my conception of hegemony.
While the definition of hegemony is based on its material aspects—the preponderance of power—hegemony should be understood as a part of a
social web comprised of states. A hegemon relates to the other states in the system not merely
through the prism of power balances, but through shared norms and a system of rules providing an umbrella for interstate
Going against common conceptions, I argue that
collaborative enterprises and should be credited for that. Nevertheless, sometimes it
relations. Although interstate conflict is ubiquitous in international society and the pursuit of particularistic interests is common, the international society provides a normative
framework that restricts and moderates the hegemon's actions. This normative framework accounts for the hegemon's inclination toward orderly and peaceful interstate relations and
minimizes its reliance on power
. A hegemon’s role in the international community relies on legitimacy. Legitimacy is
associated with external recognition of the hegemon’s right of primacy, not just the fact of this primacy. States recognize the hegemon’s power, but they develop expectations that go
beyond the idea that the hegemon will act as it wishes because it has the capabilities to do so. Instead, the primacy of the hegemon is manifested in the belief that, while it has special
rights that other members of the international society lack, it also has a set of duties to the members of the international society. As long as the hegemon realizes its commitment to the
collective, its position will be deemed legitimate. International cooperation is hard to achieve. And, in general, international relations is not a story of harmony. A state’s first inclination is
to think about its own interests, and states always prefer doing less over doing more. The inclination to pass the buck or to free ride on the efforts of others is always in the background.
If a hegemon is willing to lead in pursuit of collective interests and to shoulder most of the burden, it
can improve the prospects of international cooperation. However, even when there is a hegemon willing to lead a collective action and
when states accept that action is needed, obstacles may still arise. These difficulties can be attributed to various factors, but especially prominent is the disagreement over the particular
strategy that the hegemon promotes in pursuing the general interest. When states think that the strategy and policies offered by the hegemon are not compatible with the accepted
rules of “rightful conduct” and break established norms, many will disapprove and resist. Indeed, while acceptance of a hegemon’s leadership in international society may result in broad
willingness to cooperate with the hegemon in pursuit of shared interests it does not guarantee immediate and unconditional compliance with all the policies the hegemon articulates.
While its legitimacy does transfer to its actions and grants some leeway, that legitimacy does not justify every policy the hegemon pursues—particularly those policies that are not seen
as naturally deriving from the existing order. As a result, specific policies must be legitimated before cooperation takes place. This process constrains the hegemon’s actions and prevents
the uninhibited exercise of power.
Legitimacy’s the fundamental internal link to effective hegemony---power
distributions perceived as illegitimate are the most likely causes of great power war
Finnemore 9, Professor of Political Science and International Affairs at George Washington
University, (Martha, “Legitimacy, Hypocrisy, and the Social Structure of Unipolarity: Why Being a Unipole
Isn’t All It’s Cracked Up to Be,” January, World Politics, Volume 61, Number 1)
Legitimacy is, by its nature, a social and relational phenomenon. One’s position or power cannot be legitimate
in a vacuum. The concept only has meaning in a particular social context. Actors, even unipoles, cannot create legitimacy
unilaterally. Legitimacy can only be given by others. It is conferred either by peers, as when great powers accept or reject the actions of
another power, or by those upon whom power is exercised. Reasons to confer legitimacy have varied throughout history. Tradition, blood,
and claims of divine right have all provided reasons to confer legitimacy, although in contemporary politics conformity with [End Page 61]
international norms and law is more influential in determining which actors and actions will be accepted as legitimate. 9¶ Recognizing the
legitimacy of power does not mean these others necessarily like the powerful or their policies, but it implies at least tacit acceptance of the
social structure in which power is exercised. One may not like the inequalities of global capitalism but still believe that markets are the only
realistic or likely way to organize successful economic growth. One may not like the P5 vetoes of the Security Council but still understand
that the United Nations cannot exist without this concession to power asymmetries. We
can see the importance of
legitimacy by thinking about its absence. Active rejection of social structures and the withdrawal of
recognition of their legitimacy create a crisis. In domestic politics, regimes suffering legitimacy crises face resistance,
whether passive or active and armed. Internationally, systems suffering legitimacy crises tend to be violent
and noncooperative. Post-Reformation Europe might be an example of such a system. Without at least tacit
acceptance of power’s legitimacy, the wheels of international social life get derailed. Material force
alone remains to impose order, and order creation or maintenance by that means is difficult, even
under unipolarity. Successful and stable orders require the grease of some legitimation structure to persist and prosper.10¶ The
social and relational character of legitimacy thus strongly colors the nature of any unipolar order and
the kinds of orders a unipole can construct. Yes, unipoles can impose their will, but only to an
extent. The willingness of others to recognize the legitimacy of a unipole’s actions and defer to its
wishes or judgment shapes the character of the order that will emerge. Unipolar power without any
underlying legitimacy will have a very particular character. The unipole’s policies will meet with resistance, either
active or passive, at every turn . Cooperation will be induced only through material quid pro quo payoffs. Trust will be thin to
nonexistent. This is obviously an expensive system to run and few unipoles have tried to do so.
Inherency
AT Current Regs
Current regs have loopholes that allow for warrantless invasions of privacy
New York Times 2015 (Editorial Board; Regulating the Drone Economy; Feb 19;
www.nytimes.com/2015/02/19/opinion/regulating-the-drone-economy.html; kdf)
Mr. Obama’s
action on drone use by government agencies is much more problematic. For example, the
president’s memorandum says the government should not retain personally identifiable information
collected by drones for more than 180 days. But agencies can keep the data for longer if it is
“determined to be necessary to an authorized mission of the retaining agency” — a standard that grants
officials far too much latitude. Moreover, the administration says agencies have to provide only a “general summary” of how they
use drones, and only once a year. Law enforcement agencies like the F.B.I. and local police departments are
already using drones and manned aircraft for surveillance, often without obtaining warrants, but they have
said little publicly about what they are doing with the information collected. The use of drones is likely to grow, and the devices
could become as common as utility and delivery trucks. At the dawn of this technology, it’s appropriate to set sound safety and
privacy rules.
AT FAA Solves
Those regs expand the power of the state
Fulton 2015 (Deirdre; Surveillance, Privacy Concerns Raised as FAA Gives Domestic Drones a Nod; Feb
15; www.commondreams.org/news/2015/02/15/surveillance-privacy-concerns-raised-faa-givesdomestic-drones-nod; kdf)
Domestic non-military drone use took one step closer to widespread implementation on Sunday, as the
Federal Aviation Administration issued proposed regulations for small unmanned aircraft systems in the U.S.
According to an FAA press release, the rule would limit flights to daylight and visual-line-of-sight operations. It also addresses height
restrictions, operator certification, aircraft registration and marking, and operational limits. In a blow to Google and Amazon, it does not permit
drone delivery. Also on Sunday, the White House issued an Executive Order requiring every federal agency to develop "a framework regarding
privacy, accountability, and transparency for commercial and private [Unmanned Aircraft Systems] use" within 90 days and with an eye toward
protecting personal privacy, civil rights, and civil liberties. "Together, the
FAA regulations and the White House order
provide some basic rules of the sky that will govern who can fly drones in the United States and under
what conditions, while attempting to prevent aviation disasters and unrestrained government
surveillance," the Washington Post declared. But civil liberties experts warned that the FAA rules and presidential
memo leave the door open for invasions of privacy by the government and corporations. "The proposed
rules do absolutely nothing to address privacy, except perhaps require some identifying markings displayed in the 'largest
practicable manner' such that you may be able to identify who owns the drone that is spying on you," Ryan Calo wrote at Forbes. "I was on the
conference call announcing the new rules and the Secretary of Transportation mentioned the importance of privacy and civil liberties, but this
commitment is not reflected in the proposed rules." The Center for Democracy and Technology called on Congress to raise the bar on domestic
drone standards. "Drones have the potential for significant societal, scientific, and economic benefits, but also pose new and intrusive privacy
problems," CDT senior counsel Harley Geiger said in a press statement. "The White House’s memo requires government agencies to enhance
transparency and develop clear rules to protect the privacy of Americans. This is an important and welcome step in advancing drone
technology, while protecting civil liberties." Still, he added, "the
White House memo itself does not establish strong
privacy and transparency drone standards for agencies, leaving it up to the agencies to develop these
standards. Because the memo’s requirements are not specific, the drone policies the agencies set for themselves will be key to how
individuals’ privacy is actually protected. Congress still has a role to play in setting strong privacy and transparency standards for drone use."
One of the most promising applications for domestic drone use is also one of the most troubling: as an internet service platform, giving
operators access to vast quantities of data and threatening net neutrality, Drew Mitnick and Jack Bussell note at the blog for Access, a global
human rights organization focused on digital freedom. "Drones
also increase the opportunities for governments to
conduct first-hand surveillance of users’ electronic communications by intercepting signals and
information," they write. "Official documents demonstrate that government agencies are already exploring aerial platforms for
surveillance technologies, like Stingray technology, which conducts bulk surveillance of user location information... The potential for drones to
violate individual rights supports the need for legislation and regulations for government uses of drones as well as commercial vehicles."
2AC Surveillance State
New Tech=Surveillance State
Surveillance tech facilitates a surveillance state
Citron and Gray 13 (Danielle Keats [Professor of Law, University of Maryland] and David [Professor of
Law, University of Maryland]; Addressing the Harm of Total Surveillance: A Reply to Professor Neil
Richards; June 21; http://harvardlawreview.org/2013/06/addressing-the-harm-of-total-surveillance-areply-to-professor-neil-richards/)//AJ
The threat posed by contemporary surveillance technologies lies in how much and how often people are
watched. Modern technologies allow observers to detect, gather, and aggregate mass quantities of data
about mundane daily acts and habits as well as “intellectual” ones.66 The continuous and indiscriminate
surveillance they accomplish is damaging because it violates reasonable expectations of quantitative
privacy, by which we mean privacy interests in large aggregations of information that are independent
from particular interests in constituent parts of that whole.68 To be sure, the harms that Richards links
to intellectual privacy are very much at stake in recognizing a right to quantitative privacy. But rather
than being a function of the kind of information gathered, we think that the true threats to projects of
self-development and democratic culture lie in the capacity of new and developing technologies to
facilitate a surveillance state.
In adopting this view, we ally ourselves in part with commitments to a quantitative account of Fourth
Amendment privacy promoted by at least five Justices of the Supreme Court last Term in United States
v. Jones.69 In Jones, police officers investigating drug trafficking in and around the District of Columbia
attached a GPS-enabled tracking device on defendant Jones’s car. By monitoring his movements over
the course of a month, investigators were able to document both the patterns and the particulars of his
travel, which played a critical role in his ultimate conviction. Although the Court resolved Jones on the
narrow grounds of physical trespass, five justices wrote or joined concurring opinions showing sympathy
for the proposition that citizens hold reasonable expectations of privacy in large quantities of data, even
if they lack reasonable expectations of privacy in the constitutive parts of that whole.70 Thus, they
would have held that Jones had a reasonable expectation in the aggregate of data documenting his
public movements over the course of four weeks, even though he did not have any expectation of
privacy in his public movements on any particular afternoon.71
The account of quantitative privacy advanced by the Jones concurrences has much in common with the
views promoted by Warren and Brandeis. Specifically, the concurring Justices in Jones expressed worry
that by “making available at a relatively low cost such a substantial quantum of intimate information
about any person whom the Government, in its unfettered discretion, chooses to track,” programs of
broad and indiscriminate surveillance will “chill[] associational and expressive freedoms,” and “alter the
relationship between citizen and government in a way that is inimical to a democratic society.”72 Their
concerns are well-grounded in original understandings of the Fourth Amendment.73 As Professor
William Stuntz has shown, the Fourth Amendment was drafted partly in reaction to eighteenth-century
cases involving the British government’s use of general warrants to seize personal diaries and letters in
support of seditious-libel prosecutions that were designed to suppress political thought.74 Despite
these roots, quantitative privacy is just beginning to receive recognition because it is only now under
threat of extinction by technologies like Virtual Alabama and fusion centers.
Drones are an unprecedented threat to privacy – capable of monitoring entire cities
Rothfuss 2014 (Ian F [George Mason School of Law]; Student Comment: An Economic Perspective on
the Privacy Implications of Domestic Drone Surveillance; 10 J.L. Econ. & Pol'y 441; kdf)
Introduction A sixteen-hour standoff with police began after a suspect took control of six cows that wandered on to his farm and "chased police
off his land with high powered rifles." n1 Without the suspect's knowledge, police used a Predator drone to locate and apprehend him on his
3,000-acre farm. n2 In addition to law enforcement, anyone may buy a handheld drone. The Parrot AR.Drone 2.0, for example, costs less than
three hundred dollars and can fly up to 165 feet from its controller while recording and transmitting live high-definition video from the sky. n3
Unmanned aerial vehicles (drones) have become essential to government surveillance overseas and are now being deployed
domestically for law enforcement and other purposes. The ability of drones to conduct widespread
domestic surveillance has raised serious privacy concerns. Both government and private actors may use drones. Given the
proliferation of this new technology, Congress has recently directed the Federal Aviation Administration (FAA) to expedite the licensing process
and open the domestic airspace to drones. n4 Situations like the one described above will likely become more common in the near future. n5
Domestic drones [*442] have the potential to allow the government to effectively and efficiently monitor the activities of people across the
nation. Part I of this Comment examines the capabilities of drones, discusses currently planned drone deployments, and examines recent
developments that have brought the topic of domestic drone surveillance to the forefront of national security law discussions. This comment
concludes that current
law does not adequately protect privacy interests from the widespread surveillance
that could result from the unrestricted domestic use of drones. Part II discusses the sources of the right to privacy and
examines the current state of the law. Part III applies an economic perspective to determine the optimal level of domestic drone surveillance
that the law should allow. This analysis is based upon a general economic model of surveillance developed by Andrew Song following the
September 11, 2001 terrorist attacks. n6 Economic analysis shows that the uncontrolled domestic deployment of drones would lead to an
inefficient and unproductive loss of social utility. Prompt legislative action is therefore necessary to address the fundamental privacy challenges
presented by the use of drones. Part IV concludes by proposing a legal framework to balance security and other interests while safeguarding
the privacy rights of U.S. citizens. As discussed in this comment, such legislation should allow constructive use of the technology within a
framework that protects individual privacy rights. I. Background: Domestic Deployment of Drones Recent congressional legislation has directed
the FAA to expedite its current licensing process and allow the private and commercial use of drones in U.S. airspace by October 2015. n7 The
FAA has streamlined the authorization process to "less than 60 days" for nonemergency drone operations. n8 Among other requirements, the
recent legislation directs the FAA to allow government agencies to operate small drones weighing less than 4.4 pounds. n9 The use of drones
can be expected to increase dramatically in the coming years. [*443] The FAA has already authorized many police departments and other
agencies to use drones. n10 As of November 2012, the FAA oversaw 345 active Certificates of Waiver or Authorization that allow public entities
to operate drones in civil airspace. n11 Customs and Border Protection uses Predator drones along the nation's borders "to search for illegal
immigrants and smugglers" n12 and "the FBI and Drug Enforcement Administration have used Predators for other domestic investigations." n13
Predators owned by Customs and Border Protection and based at U.S. Air Force bases have been deployed on numerous occasions to assist
local law enforcement. n14 One law enforcement agency has even deployed a drone capable of being armed with lethal and non-lethal
weapons. n15 Drones also have applications beyond government law enforcement. Drones may be used to provide live video coverage of
events without the need to use piloted helicopters and by paparazzi chasing after pictures of celebrities and other public figures. n16
Individuals may use drones to spy on their neighbors, to keep an eye on their children, or to keep tabs on a potentially unfaithful spouse. n17
The possibilities for corporate espionage and the theft of trade secrets are also endless. Drones range in size from handheld units to units the
size of large aircraft and have a wide variety of capabilities. n18 Nearly fifty companies are reported to be developing an estimated 150 varieties
of drone systems. n19 Users of drones may include the military, federal and local law enforcement agencies, business entities, and private
individuals. Drones have many diverse domestic uses including surveillance of dangerous disaster sites, patrolling borders, helping law
enforcement locate suspects, monitoring traffic, crop dusting, aerial mapping, media coverage, and many others. n20 [*444] Drones
represent an unprecedented convergence of surveillance technologies that could lead to increased
security but could also jeopardize the privacy of U.S. citizens. Drones may be equipped with a variety of technologies
including high-resolution cameras, n21 face-recognition technology, n22 video-recording capability, n23 heat sensors, n24 radar systems, n25
night vision, n26 infrared sensors, n27 thermal-imaging cameras, n28 Wi-Fi and communications interception devices, n29 GPS, n30 licenseplate scanners, n31 and other systems designed to aid in surveillance. Drones
will soon be able to recognize faces and track
the movement of subjects with only minimal visual-image data [*445] obtained from aerial surveillance. n32 Drones
have the ability to break into wireless networks, monitor cell-phone calls, and monitor entire towns
while flying at high altitude. n33 These rapid technological advancements present privacy challenges that
were not contemplated when our existing laws were developed.
Drones will create a surveillance state where Americans never know whether they are
being watched
Gilens 2013 (Naomi [ACLU Speech, Privacy and Technology Project]; New Documents Reveal U.S.
Marshals’ Drones Experiment, Underscoring Need for Government Transparency;
https://www.aclu.org/blog/new-documents-reveal-us-marshals-drones-experiment-underscoring-needgovernment-transparency; kdf)
The use of surveillance drones is growing rapidly in the United States, but we know little about how the
federal government employs this new technology. Now, new information obtained by the ACLU shows for the first time that
the U.S. Marshals Service has experimented with using drones for domestic surveillance. We learned this
through documents we released today, received in response to a Freedom of Information Act request. The documents are available here. (We
also released a short log of drone accidents from the Federal Aviation Administration as well as accident reports and other documents from the
U.S. Air Force.) This revelation comes a week after a bipartisan bill to protect Americans’ privacy from domestic drones was introduced in the
House. Although the Marshals Service told us it found 30 pages about its drones program in response to our FOIA request, it turned over only
two of those pages—and even they were heavily redacted. Here’s what we know from the two short paragraphs of text we were able to see.
Under a header entitled “Unmanned Aerial Vehicle, Man-Portable (UAV) Program,” an agency document overview begins: USMS Technical
Operations Group's UAV Program provides a highly portable, rapidly deployable overhead collection device that will provide a multi-role
surveillance platform to assist in [redacted] detection of targets. Another document reads: This developmental program is designed to provide
[redacted] in support of TOG [presumably the agency’s Technical Operations Group] investigations and operations. This surveillance solution
can be deployed during [multiple redactions] to support ongoing tactical operations. These heavily redacted documents reveal almost no
information about the nature of the Marshals’ drone program. However, the Marshals Service explained to the Los Angeles Times that they
tested two small drones in 2004 and 2005. The experimental program ended after both drones crashed. It is surprising that what seems like a
small-scale experiment remained hidden from the public until our FOIA unearthed it. Even more surprising is that seven years after the program
was discontinued, the Marshals still refuse to disclose almost any records about it. As
drone use becomes more and more
common, it is crucial that the government’s use of these spying machines be transparent and
accountable to the American people. All too often, though, it is unclear which law enforcement agencies are
using these tools, and how they are doing so. We should not have to guess whether our government is using
these eyes in the sky to spy on us. As my colleague ACLU staff attorney Catherine Crump told me, Americans have the
right to know if and how the government is using drones to spy on them. Drones are too invasive a tool
for it to be unclear when the public will be subjected to them. The government needs to respect
Americans’ privacy while using this invasive technology, and the laws on the books need to be brought
up to date to ensure that America does not turn into a drone surveillance state. All over the U.S., states and
localities are trying to figure out through the democratic political process exactly what kind of protections we should put in place in light of the
growing use of what Time Magazine called “the most powerful surveillance tool ever devised, on- or offline.” These debates are essential to a
healthy democracy, and are heartening to see. However, this
production from the Marshals Service underscores the
need for a federal law to ensure that the government’s use of drones remains open and transparent. A
number of federal lawmakers are already pushing to bring the law up to date. Representatives Ted Poe (RTexas) and Zoe Lofgren (D-Calif.) recently introduced the first bipartisan legislation to regulate the government’s
use of drones. The proposed legislation, which is supported by the ACLU, would enact judicial and Congressional
oversight mechanisms, require government agencies to register all drones and get a warrant when using
them for surveillance (except in emergency situations), and prohibit the domestic use of armed drones. We believe
this bill—and hopefully a future companion bill in the Senate—will provide a strong foundation for future legislation protecting our privacy
rights in the face of proliferating drone surveillance and government secrecy.
Unregulated drones threaten to perfect the art of surveillance
Ahsanuddin et al 2014 (Sadia - principal investigator for the report and MPAC research fellow;
Domestic Drones: Implications for Privacy and Due Process in the United States; Sep 8;
www.mpac.org/publications/policy-papers/domestic-drones.php; kdf)
Simultaneously, the IHSS survey respondents indicated apprehensiveness over any domestic drone operations: two-thirds expressed concern
over potential surveillance in homes or public areas; 65 percent were concerned about safety; and 75 percent were concerned about the
government’s ability to regulate use.82 The
rapid pace at which drone technology is developing, the lack of clear
guidelines protecting privacy and civil liberties, and public concern over these issues indicate an urgent
need for action in Congress and state legislatures. Privacy experts agree. In an article in the Stanford Law Review Online,
Professor Ryan Calo of the University of Washington School of Law states that drones “may be just the visceral jolt society
needs to drag privacy law into the twenty-first century.” American privacy law has developed at a
“slow and uneven” pace, whereas technology has developed at a rapid speed. In spite of the development of
computers, the Internet, Global-Positioning Systems (GPS), biometrics, gigapixel cameras, face recognition technology, and the widespread use
of e-mail and other forms of electronic communication, there has been no attendant development in privacy law. Because
drones
“threaten to perfect the art of surveillance,” they make for a good catalyst to update privacy law. The
need for legislation is clear. With recent revelations that the federal government has been conducting
surveillance of the American public on an unprecedented level, the threat that unregulated and
immensely capable technologies pose to civil liberties is profound. The law must catch up with
technology.
Surveillance=Extinction
Mass surveillance causes mass genocide and extinction
Saul 15 (Quincy Saul is the Co-Founder of Ecosocialist Horizons and the senior editor and columnist for
Capitalism Nature Socialism, “The Four Horsemen of the Apocalypse,” 3/25/15, Date Accessed: 6/27/15,
http://www.truth-out.org/opinion/item/29664-the-four-horsemen-of-the-apocalypse)
Surveillance States: 1984 has arrived, only 30 years after Orwell predicted. The revelations brought to us
by Chelsea Manning, Julian Assange and Edward Snowden show us a world in which everything is under
surveillance. Julian Assange has written with great eloquence about the death of civil society overseen
by the surveillance state. (1) Today in the United States alone there are more than 5 million people
working under security clearances - more than the population of Norway. The mirror image of this army
of spies is the enormous number of people in prison, including more African Americans under state
control than there were slaves prior to the Civil War. This is the last stage of the state, the
totalitarianism that is the last gasp of every totality. The surveillance state has the capacity for not only
genocide, but also extinction: It is capable of repressing and destroying the revolutionary movements
that still have hope to fight for life. The surveillance state rides the pale horse of the apocalypse,
representing death.
AT Drones Not Key 4th Amendment
Warrantless drones uniquely trigger 4th amendment backsliding
Celso 2014 (Joel [JD Candidate U of Baltimore Law]; DRONING ON ABOUT THE FOURTH AMENDMENT:
ADOPTING A REASONABLE FOURTH AMENDMENT JURISPRUDENCE TO PREVENT UNREASONABLE
SEARCHES BY UNMANNED AIRCRAFT SYSTEMS; 43 U. Balt. L. Rev. 461; kdf)
Despite a strong argument that UAS surveillance should not constitute a search as long as it shows
nothing more or different than what is revealed by naked-eye observation, n240 it is not clear that
courts would accept technological surveillance as an equivalent substitute for manned surveillance. n241
In fact, in holding that the use of a camera to photograph an open industrial area is not a search, the Supreme Court emphasized that
commercial property does not have the same heightened expectation of privacy as the home and stated that "the photographs here are not so
revealing of intimate details as to raise constitutional concerns." n242 However,
given the expectation of privacy in the home
and the Supreme Court's assertion that "in the home ... all details are intimate details," n243 it could be
that any [*488] UAS surveillance taken through skylights, windows, or open doors constitutes a search.
n244 Finally, and most importantly, in Kyllo, the Supreme Court may have opened the door to warrantless UAS
surveillance of the home at some point in the not-too-distant future. n245 In holding that the use of
thermal imaging constitutes a search, the Court provided an important caveat by stating that when the
technology used is available to the general public, it does not constitute a search. n246 Therefore, it appears
that the Court's bright-line rule drawn at the entrance to the home may have been written in
"disappearing ink." n247 To date, UAS are not in general public use. n248 That is about to change since certain government agencies are
allowed to operate them, the FAA is required to fully integrate them into U.S. airspace by 2015, and their decreasing cost makes them more
widely accessible. n249 Once the use of UAS becomes commonplace, the government may be able to use them to photograph or scan the
interior of a home without a warrant, regardless of whether the information revealed could not have otherwise been obtained without a
physical intrusion. n250 Therefore,
under the Supreme Court's current jurisprudence, an expectation of privacy
from unmanned aerial surveillance of the home could become unreasonable, removing Fourth
Amendment protections from the place that has historically enjoyed the greatest protection. n251
AT Other Surveillance
Visible surveillance is a unique invasion of privacy
Friedland ’14 (Steven [Elon University School of Law], “The Difference Between Invisible
and Visible Surveillance in a Mass Surveillance World,” February,Elon University Law
Legal Studies Research Paper No. 2014-02 )//MA
With visible surveillance, on the other hand, there is observable nonconsensual government conduct in
the private sphere, often a physical intrusion that violates traditional notions of trespass and private
property rights. When a police officer enters a private home without permission, opens another
person’s laptop and scrolls through it without approval, or follows a driver in a marked police car, the
intrusiveness is palpable. At a minimum, visible surveillance is a display of power that can lead to
embarrassment, psychological harm or anger. 59 In effect, visible surveillance creates a visceral feeling
of ‘un-privacy.’ As one commentator has noted, “Unlike, say, NSA network surveillance or commercial
data brokerage, government or industry surveillance of the populace with drones would be visible and
highly salient. People would feel observed, regardless of how or whether the information was actually
used.”60 Sustained visible surveillance can create great discomfort in the surveilled. When private
individuals engage in such nonconsensual surveillance, for example, it could even become criminal, in
the form of stalking.61
AT Drones Not Weaponized
Law enforcement uses predator drones
Bryan 2014 (Thomas A [J.D. and Master's Degree in International Politics, May 2014, The Catholic
University of America, Columbus School of Law]; STATE V. BROSSART: ADAPTING THE FOURTH
AMENDMENT FOR A FUTURE WITH DRONES; 63 Cath. U.L. Rev. 465; kdf)
C. State v. Brossart: Unmanned Aerial Vehicles Become Part of American Life Against the background of an expected expansion of domestic
UAV use State v. Brossart has attracted widespread media attention because it is among the earliest and most dramatic cases involving UAV use
by law enforcement [*485] officials in United States. n129 The conflict arose in
June 2011 when three cow-calf pairs
belonging to Chris Anderson entered an abandoned missile site rented by Rodney Brossart. n130 After locating
the cattle on Brossart's rented property, Anderson approached Brossart and offered to remove the cattle from
Brossart's land. n131 However, Brossart told Anderson that he could not remove the cattle until he paid for the damages they had done
to his property. n132 Anderson then contacted the Nelson County, North Dakota Sheriff's Office for assistance in recovering the cattle. n133
Upon learning of the disagreement between Anderson and Brossart, the sheriff's office dispatched officers to speak with Brossart regarding the
disputed cattle. n134 During that conversation, the officers advised Brossart that they had proof of Anderson's ownership of the cattle and
offered to confirm ownership by looking at the cattle. n135 In response, Brossart warned the officers that they would not return if they
attempted to enter his property. n136 Taking this warning [*486] as a threat, the officers asked Brossart to cooperate or face arrest. n137
Brossart ignored their request and returned to his tractor, prompting the officers to detain him. n138 The officers then approached Thomas
Brossart, Brossart's adult son who had arrived on the scene, and requested to enter the Brossart property to "check on the cattle." n139
Thomas advised the officers that they would not be allowed on the property to see the cattle until they had a valid search warrant. n140 The
officers then left the scene to obtain a warrant. n141 The officers
obtained a search warrant permitting them to enter
the rented land that afternoon and served the warrant at the Brossart home, which was located a half-mile from
the rented land. n142 However, as they entered onto Brossart's property to serve the search warrant, the three
Brossart sons, Alex, Thomas and Jacob, rushed at the officers with guns drawn. n143 This action resulted in a
standoff between the officers and the three sons. n144 During the standoff, the police deployed an MQ-9 Predator B
Drone obtained through an agreement with [*487] the United States Department of Homeland Security. n145
The UAV was deployed without obtaining an additional warrant, purportedly "to help assure that there weren't any
weapons [on the Brossart property] and to make the arrest safer for both the Brossarts and law enforcement." n146 The next morning, officers
entered the Brossart property to recover the cattle and arrested three of the Brossart children after they again confronted officers. n147 The
Brossarts did not learn that a UAV had been deployed during the standoff until after their arrest. n148
AT FAA Solves
FAA is not instituting privacy safeguards
Oyegunle 13 (Ajoke [J.D. candidate, Columbus School of Law]; Comment: Drones in the Homeland: A
Potential Privacy Obsruction Under the Fourth Amendment and the Common Law Trespass Doctrine;
2013;
http://www.lexisnexis.com.proxy.lib.umich.edu/lnacui2api/auth/checkbrowser.do?ipcounter=1&cookie
State=0&rand=0.194887649987070 98&bhjs=1&bhqs=1)//AJ
In the wake of September 11, 2001, n1 the nation changed in a particularly defining way: it has become
more protective. From the rubble emerged a nation transformed--one guarded and hyper-vigilant,
accepting of less privacy in the name of national security. n2 The PATRIOT Act, a promise for a stronger,
safer America, was one such concession. n3 A broad-ranging law, the PATRIOT Act allows the federal
government greater access to collect private information from individuals and organizations. n4 Years
after the PATRIOT Act was enacted, support for the law n5 illustrated the Zeitgeist of a terror-strewn
nation. n6 Legislation [*366] in the aftermath of September 11th has posed some barriers to Fourth
Amendment protection. n7 Although the intent of the FAA Modernization and Reform Act of 2012 ("FAA
Act") was to respond to terrorism, it has been viewed as a seamless expansion of the policies set forth in
the Patriot Act that ultimately weakened privacy. n8 The impending deployment of drones into the
national airspace is a linear progression of the tradeoff between privacy and national security that the
nation made eleven years ago. n9
As advances in technology have made it easier for the government and private entities to access, collect,
and share the private information of individuals, privacy concerns have become increasingly relevant.
n10 The Fourth Amendment guarantees protection against unreasonable searches and seizures by the
government. This concept is central to cases concerning the collection of private information through
the use of unmanned aerial vehicles (UAVs), which are more commonly referred to as drones. n11 The
FAA Act directs the FAA to license drones and allows for the routine use of unmanned aircraft in
domestic skies. n12 The FAA Act does not, however, institute privacy safeguards. n13 Because drones
have the unique capability of collecting massive amounts of highly sensitive, private information that
could ordinarily be shielded by some form of technology (e.g., computer firewall) or physical structure,
n14 their proliferation [*367] may raise legitimate and urgent privacy concerns. n15 This article is not
intended to impugn domestic drone expansion, but rather, issues a caveat to premature action before
thorough privacy and safety assessments have been conducted.
2AC WOT
Deference High Now
Unchecked executive is leading to ineffective surveillance and drone policies that are
devoid of standards
Brand and Guiora 15 (Jeffrey S., J.D., Dean Emeritus and Professor of Law, Director Center for Law
and Global Justice, University of San Francisco School of Law, and Amos N., Ph.D, Professor of Law, S.J.
Quinney College of Law, University of Utah, Co-Director, Center for Global Justice, The Steep Price of
Executive Power Post 9/11: Reclaiming Our Past to Insure Our Future, Jan. 27, 2015,
http://www.law.utah.edu/the-steep-price-of-executive-power-post-911-reclaiming-our-past-to-insureour-future/)
Each of these accounts is connected by a common thread – the exercise of unrestrained Executive
Branch power that ignores the fundamental principle that the President and his subordinates do not
have unilateral authority to surveil any call, to engage in illegal torture, or to launch attacks almost
certain to kill. Each reflects policies that pursue national security while ignoring a fundamental truth
about our democracy: Absent appropriate checks and balances, the rule of law is undermined and
individual liberty is likely to be sacrificed. Of course, this observation is hardly novel and has been
reiterated constantly throughout the 240 year history of the Republic. James Madison articulated it in
the Federalist Papers: “The accumulation of all powers, legislative, executive, and judiciary, in the same
hands…may justly be pronounced the very definition of tyranny.” Justice Kennedy wrote about it in
2004, upholding the right of habeas corpus for Guantanamo detainees: “The Framers’ inherent distrust
of governmental power was the driving force behind the constitutional plan that allocated powers
among three independent branches. This design serves not only to make Government accountable but
also to secure individual liberty.” America’s post-9/11 response abandons this foundational principle,
ceding unitary authority to the Executive Branch, despite strong evidence that its surveillance,
interrogation and drone policies have been ineffective, counter-productive, lack transparency, and are
devoid of specific standards or oversight for their implementation.
Executive is now an imperial power without restraints from the other branches
Huq ’10 (Aziz Z., assistant professor of law, senior consultant analyst for the International Crisis Group,
researcher of constitutional design, law, criminal procedure, and federal courts, “Binding the Executive
(by Law or by Politics)”, University of Chicago Law School, cl)
It is close to a tenet of faith among constitutional scholars of diverse persuasions that ours is a republic
dominated by the executive branch.5 Economies of bureaucratic scale, coupled with the executive’s
primacy in responding to new security, economic, and environmental crises, are said to have frayed the
Constitution’s delicate interbranch balance of powers. As a consequence, it is conventional wisdom that
our President is now “imperial,” and Congress “broken.”7 Eric Posner and Adrian Vermeule—
hereinafter collectively “PV”—are among the most sophisticated advocates of this dictum. But with a
twist. Drawing on political science, game theory models, and the economics of agency relationships,
their book The Executive Unbound: After the Madisonian Republic proposes that neither law nor legally
constituted institutions (that is, Congress and courts) in practice impose meaningful constraints on the
federal executive. This is so, PV say, not only in the heat of emergency but also in the ordinary run of
administration (pp 4–5).8 Succinctly put, their thesis is that “major constraints on the executive . . . do
not arise from law or from the separation-of-powers framework” (
Deference Hurts WOT
Goal Displacement
Deference leads to goal displacement – planning is key to preventing subordinates
from undermining effectiveness by acting contrary to executive goals
Pearlstein, 9 - Visiting Scholar and Lecturer in Public and International Affairs, Woodrow Wilson
School of Public & International Affairs, Princeton University (Deborah, “Form and Function in the
National Security Constitution,” 41 Conn. L. Rev. 1549, Lexis)
The new functionalists' instinctive attraction to flexibility in decision-making rules or structures-and
its corresponding possibilities of secrecy [*1602] and dispatch-is not without foundation in
organization theory. n183 Flexibility ideally can make it possible for organizations to adapt and
respond quickly in circumstances of substantial strain or uncertainty, as conditions change or
knowledge improves, and to respond to events that cannot be predicted in advance. n184 In a crisis
or emergency setting in particular, one can of course imagine circumstances in which taking the
time to follow a series of structurally required decision-making steps would vitiate the need for
action altogether. n185
What the new functionalists fail to engage, however, are flexibility's substantial costs, especially
in grappling with an emergency. For example,organizations that depend on decentralized
decision-making but leave subordinates too much flexibility can face substantial principal-agent
problems, resulting in effectively arbitrary decisions. The problem of differences in motivation or
understanding between organizational leaders and frontline agents is a familiar one, a disjunction
that can leave agents poorly equipped to translate organizational priorities into priority-consistent
operational goals. As Sagan found in the context of U.S. nuclear weapons safety, whatever level of
importance organizational leadership placed on safety, leaders and operatives would invariably
have conflicting priorities, making it likely that leaders would pay "only arbitrary attention to the
critical details of deciding among trade-offs" faced by operatives in real time. n186 One way of
describing this phenomenon is as "goal displacement"-a narrow interpretation of operational
goals by agents that obscures focus on overarching priorities. n187 In the military context, units in
the field may have different interests than commanders in secure headquarters; n188 prison guards
have different [*1603] interests from prison administrators. n189 Emergencies exacerbate the
risk of such effectively arbitrary decisions. Critical information may be unavailable or inaccessible.
n190 Short-term interests may seek to exploit opportunities that run counter to desired long-term
(or even near-term) outcomes. n191 The distance between what a leader wants and what an agent
knows and does is thus likely even greater.
The Cuban Missile Crisis affords striking examples of such a problem. When informed by the
Joint Chiefs of Staff of the growing tensions with the Soviet Union in late October 1962, NATO's
Supreme Allied Commander in Europe, American General Lauris Norstad, ordered subordinate
commanders in Europe not to take any actions that the Soviets might consider provocative. n192
Putting forces on heightened alert status was just the kind of potentially provocative move Norstad
sought to forestall. Indeed, when the Joint Chiefs of Staff ordered U.S. forces globally to increase
alert status in a directive leaving room for Norstad to exercise his discretion in complying with the
order, Norstad initially decided not to put European-stationed forces on alert. n193 Yet despite
Norstad's no- provocation instruction, his subordinate General Truman Landon, then Commander of
U.S. Air Forces in Europe, increased the alert level of nuclear-armed NATO aircraft in the region.
n194 In Sagan's account, General Landon's first organizational priority-to maximize combat
potential-led him to undermine higher priority political interests in avoiding potential provocations
of the Soviets. n195
It is in part for such reasons that studies of organizational performance in crisis management have
regularly found that "planning and effective [*1604] response are causally connected."
n196 Clear, well-understood rules, formalized training and planning can function to match cultural
and individual instincts that emerge in a crisis with commitments that flow from standard operating
procedures and professional norms. n197 Indeed, "the less an organization has to change its predisaster functions and roles to perform in a disaster, the more effective is its disastetr
[sic] response." n198 In this sense, a decisionmaker with absolute flexibility in an emergencyunconstrained by protocols or plans-may be systematically more prone to error than a decisionmaker who is in some way compelled to follow procedures and guidelines, which have
incorporated professional expertise, and which are set as effective constraints in advance.
Examples of excessive flexibility producing adverse consequences are ample. Following Hurricane
Katrina, one of the most important lessons independent analysis drew from the government
response was the extent to which the disaster was made worse as a result of the lack of experience
and knowledge of crisis procedures among key officials, the absence of expert advisors available to
key officials (including the President), and the failure to follow existing response plans or to draw
from lessons learned from simulations conducted before the fact. n199 Among the many
consequences, [*1605] basic items like food, water, and medicines were in such short supply that
local law enforcement (instead of focusing on security issues) were occupied, in part, with breaking
into businesses and taking what residents needed. n200
Or consider the widespread abuse of prisoners at U.S. detention facilities such as Abu Ghraib.
Whatever the theoretical merits of applying coercive interrogation in a carefully selected way
against key intelligence targets, n201 the systemic torture and abuse of scores of detainees was
an outcome no one purported to seek. There is substantial agreement among security analysts of
both parties that the prisoner abuse scandals have produced predominantly negative
consequences for U.S. national security. n202 While there remain important questions about the
extent to which some of the abuses at Abu Ghraib were the result of civilian or senior military
command actions or omissions, one of the too often overlooked findings of the government
investigations of the incidents is the unanimous agreement that the abuse was (at least in part) the
result of structural organization failuresn203 -failures that one might expect to [*1606] produce
errors either to the benefit or detriment of security.
In particular, military investigators looking at the causes of Abu Ghraib cited vague guidance, as well
as inadequate training and planning for detention and interrogation operations, as key factors
leading to the abuse. Remarkably, "pre-war planning [did] not include[] planning for detainee
operations" in Iraq. n204 Moreover, investigators cited failures at the policy level- decisions to lift
existing detention and interrogation strictures without replacing those rules with more than the
most general guidance about custodial intelligence collection. n205 As one Army General later
investigating the abuses noted: "By October 2003, interrogation policy in Iraq had changed three
times in less than thirty days and it became very confusing as to what techniques could be
employed and at what level non-doctrinal approaches had to be approved." n206 It was thus
unsurprising that detention and interrogation operations were assigned to troops with grossly
inadequate training in any rules that were still recognized. n207 The uncertain effect of broad,
general guidance, coupled [*1607] with the competing imperatives of guidelines that differed
among theaters of operation, agencies, and military units, caused serious confusion among troops
and led to decisionmaking that it is overly kind to call arbitrary. n208
Would the new functionalists disagree with the importance of government planning for detention
operations in an emergency surrounding a terrorist nuclear attack? Not necessarily. Can an
organization anticipate and plan for everything? Certainly not. But such findings should at least call
into question the inclination to simply maximize flexibility and discretion in an emergency, without,
for example, structural incentives that might ensure the engagement of professional expertise.
n209 Particularly if one embraces the view that the most potentially damaging terrorist threats are
nuclear and biological terrorism, involving highly technical information about weapons acquisition
and deployment, a security policy structure based on nothing more than general popular mandate
and political instincts is unlikely to suffice; a structure that systematically excludes knowledge of
and training in emergency response will almost certainly result in mismanagement. n210 In this
light, a general take on role effectiveness might suggest favoring a structure in which the
engagement of relevant expertise in crisis management is required, leaders have incentives to
anticipate and plan in advance for trade-offs, and [*1608] organizations are able to train
subordinates to ensure that plans are adhered to in emergencies. Such structural constraints could
help increase the likelihood that something more than arbitrary attention has been paid before
transcendent priorities are overridden.
Secrecy
Deference leads to secrecy - prevents organizational learning in a crisis that is essential
to effective decision-making
Pearlstein, 9 - Visiting Scholar and Lecturer in Public and International Affairs, Woodrow Wilson
School of Public & International Affairs, Princeton University (Deborah, “Form and Function in the
National Security Constitution,” 41 Conn. L. Rev. 1549, Lexis)
2. Unity and Insularity
As the new functionalists correctly anticipate, organization theorists have also recognized that strict
bureaucratic control, intense socialization, and a highly developed sense of organizational culture
can not only make rapid action possible, but also ensure adherence to an identified, overarching
priority. n211 Indeed, it follows from the prior section that if formal rules and training are
important, some significant level of control is absolutely necessary lest one risk effective top-down
compliance.
At the same time, however, institutions such as the military (and arguably aspects of the
intelligence community) that are defined by such insular organizational cultures have some
important disadvantages. n212 The exceptional degree of control such organizations exercise
over their members has been used both to advance an organization's official goals, and to pursue
the more self- serving or alternative goals of its leaders. Members' intense organizational loyalty
can foster excessive secrecy and disdain for outside expertise, inhibiting the flow of information
both within and from outside the institution, and skewing attention to organizational priorities.
n213 Especially when coupled with political incentives that impact governmental
organizations, such features can limit the institution's ability to take corrective action or learn
from past organizational mistakes. n214
The post-9/11 context is rife with examples of such pathologies in organizations responsible for
counterterrorism operations. Consider the U.S. response to the anthrax mailings of late 2001,
which came at a time of already heightened vigilance against terrorist attack. After
federal [*1609] investigators concluded that the anthrax attacks were most likely launched by
"U.S. nationals, almost certainly ones with experience in and access to the U.S. biodefense
program and its facilities," and after they discovered that major U.S. biodefense facilities had
been working with anthrax (including weapons-grade powder) for decades, military and
intelligence agencies continued to withhold critical information from other federal agencies
about the facilities and employees involved in such programs. This hamstrung post-attack efforts
to identify the likely source of the attack, and therefore the likelihood of subsequent additional
attacks from the same source. n215
Such behavior echoes that described by the 9/11 Commission investigators studying the
September 11th attacks themselves. n216 Among other things, investigators concluded that one of
the key problems leading to the failure to avert the attacks (despite increasingly alarming
warnings) was the dearth of information sharing inside the intelligence and security communities.
n217 Information was overly compartmentalized, "stove-piped" to too few decisionmakers,
hidden by one executive agency from another and by one branch of government from another,
and limited in its relevance and accuracy from an absence of oversight and competing analysis.
n218 Such findings also emerge from studies of the generally effective Japanese response to the
sarin gas attacks on the Tokyo subway system. Essential to the Japanese government's response
was "a willingness to prioritize cooperation over interagency or intergovernment competition."
n219 In all of these cases, it may well be that such behavior could be addressed by different
incentive structures. But in the absence of such guidance, it was the organizations instinctive (and
structural) insularity that prevailed.
The counterproductive effect of such pathologies can infect more than just real- time
responsiveness; it inhibits error correction over time-a [*1610] feature that theorists identify as
central in explaining the success of those organizations that have operated effectively in chronically
unpredictable environments. n220 In the nuclear safety context, for example, Scott Sagan showed
that Americans had been at greater risk than once thought from accidents involving the U.S. nuclear
weapons arsenal-threats ranging from pilot error, malfunctioning computer warnings, the
miscalculation of an individual officer, and a host of other seemingly inconceivable mistakes n221 in part because actors at every organizational level had incentives to cover up safety problems, "in
order to protect the reputation of the institution." n222 While it was perhaps "not surprising that
the military commands that are responsible for controlling nuclear forces would create a veil of
safety to manage their image in front of the [P]resident, the Congress, and the public," Sagan found
that concern for the effect of revealing mistakes skewed assessments at all levels, "influenc[ing] the
reporting of near-accidents by operators, the beliefs of organizational historians about what is
acceptable to record, and the public interpretation of events by senior authorities." n223
Particularly in operations where failure, when it does occur, can come at an extraordinarily high
price, there is a premium on gaining (and implementing) as much insight as possible from those
failures that do occur. n224
Exaggerates Threats
Deference is flawed- officials will overstate the likelihood of a threat to national
security and put it before liberty
Wells 04- Crowder Professor of Law and Associate Dean for Academic Affairs at the University of
Missouri School of Law
(Christina, Questioning Deference,
http://scholarship.law.missouri.edu/cgi/viewcontent.cgi?article=3594&context=mlr) JB
The psychological
findings above suggest that substantial errors occur in risk assessment during times of
intense emotions, such as fear. Individuals are generally likely to overestimate the probability of an
event's occurrence if that event is especially familiar or salient. The presence of an intense emotion can further
exacerbate the tendency to overestimate the likelihood of an event, either because it makes an event especially available
or because people begin to focus on the potentially catastrophic nature of a particularly fearful event, essentially dropping probability out of
the equation altogether. Social
influences can reinforce this skewed risk assessment through the phenomenon of
information and reputational cascades, which can cause a widespread, though erroneous, belief regarding the likelihood of an event. These
findings have substantial implications for law and policy during times of crisis. First, since "[p]ublic officials, no
less than ordinary people, are prone to use of the availability heuristic," they may themselves fall prey to skewed risk assessment.
148 To the extent that government officials often reach such assessments after group deliberation, there is the possibility that such
decisions will be skewed even further by polarization or groupthink. Second, the public may fall prey to skewed risk assessment as a
result of private availability entrepreneurs' attempts to fan fear regarding particular threats. As the public becomes excessively "fearful of
statistically small risks," it may demand that government act to prevent that risk regardless of the costs of regulation or the potential harm
caused by regulating the risk.1 49 To the extent that reputational pressures operate on officials, especially elected ones, they will tend to
respond positively to public demands by enacting legislative and regulatory measures regarding small-probability risks.150 Finally, the
government may itself act as an availability entrepreneur, causing the public to call for government action. Once the public's calls are of
sufficient strength, those officials can then pressure others to enact legislation or take action to further their private agendas.
Public Hysteria/Reputation
Deference fails- the executive branch is driven by reputational concerns and public
hysteria
Wells 04- Crowder Professor of Law and Associate Dean for Academic Affairs at the University of
Missouri School of Law
(Christina, Questioning Deference,
http://scholarship.law.missouri.edu/cgi/viewcontent.cgi?article=3594&context=mlr) JB
This discussion has substantial implications for the judicial deference debate. Both sides of the debate argue from fundamental assumptions about various decision
makers' capabilities, and the historical pattern above sheds light on some of those assumptions. First, that pattern
casts doubt on judicial
deference proponents' claim that executive officials are particularly adept at making decisions
involving threats to national security. People generally are not adept at assessing risk in times of great
fear, and history shows executive officials are no different, at least when national security decisions
affect civil liberties at home. Moreover, reputational concerns may pressure officials into catering to
public hysteria. Worse, executive officials are sometimes willing to act as availability entrepreneurs, instigating public hysteria for political ends.
2AC Solvency
Courts Balance Security/Rights
Courts shouldn’t defer to the executive branch- the courts are necessary to achieve
balance between security an liberty
Cole 08- B.A. from Yale and teaches constitutional law, national security, and criminal justice at
Georgetown University Law Center
(David, No Reason To Believe: Radical Skepticism, Emergency Power, and Constitutional Constraint, 75
U. CHI. L. REV. 1335) JB
Third, the authors' argument
that the executive is best situated to balance liberty and security in emergencies
fails to consider the full range of qualities that one might want in an agency tasked to strike such a
balance. The authors correctly note that the executive has advantages in terms of speed, experience, flexibility, and access to
secret information. But while these attributes are certainly important from a security standpoint, they are not
necessarily sufficient to balance liberty against security. Precisely because we rely so heavily on the
executive to maintain our security, we should be skeptical of its ability to give sufficient weight to the
liberty side of the balance. Just as Fourth Amendment doctrine insists on warrants issued by magistrates because we do not trust the
police, whose primary responsibility is law enforcement, to balance privacy interests fairly, so we cannot trust the executive to balance liberty
and security fairly on its own. This
is especially true in an emergency when the executive is under intense
pressure to deliver security. As in the Fourth Amendment setting, judicial review plays an essential role
in achieving an appropriate balance; deference to the executive undermines that role.
Courts Best Check Executive
Courts are the best mechanism to check the courts
Wells 04- Crowder Professor of Law and Associate Dean for Academic Affairs at the University of
Missouri School of Law
(Christina, Questioning Deference,
http://scholarship.law.missouri.edu/cgi/viewcontent.cgi?article=3594&context=mlr) JB
One can make a strong
argument that judicial review is generally a viable mechanism for executive branch
accountability during national security crises.197 The judicial forum, with its fact-finding capabilities,
requirements of proof, and requirement that the government justify incursions on civil liberties, fits well
within the general definition of accountability as requiring a specific, public accounting of one's
decisions. Consistent with the psychological definition, positive or negative consequences attach to
executive officials' accounting of their behavior in the form of a judicial ruling for or against the
government.
Growing public opposition to drones has primed the Supreme Court to constructively
use the Constitution to limit executive abuse
Michaels 13 – Staff writer specializing in immigration, international affairs and social
justice issues
("Secret Court To Review American Drone Deaths, Ignoring Civilian Casualties Overseas," 2-18-13,
www.mintpressnews.com/legalizing-drone-strikes-courts-give-facade-of-humane-policy/50345/ DOA: 720-13, y2k)
Legal experts remain hopeful that an emboldened Congress and U.S. Supreme Court
could challenge the illegal use of drones. “It looks like the Obama administration does not want judicial review, but if
Congress puts on enough pressure I think probably there will be such a court established. My position is that the checks and balances in the Constitution, if they
mean anything, mean that the judicial and the legislative branches should be checking and balancing the executive. That means revealing these policies that have
thus far been secret,” Cohn said. President Obama agreed to hand over the White Paper, a secretive document upon which the drone policies are based, to the
Senate Intelligence Committee last week, a positive step forward clarifying the methods of illegal surveillance and assassinations. However, it will take much more
The White Paper “poo-poos judicial review and
says judicial enforcement of such orders would require the court to supervise
inherently predictive judgements by the president and his national security
advisers as to when and how to use force against a member of an enemy force
against which Congress has authorized the use of force,” Cohn said. In other words, Congress does have the
to apply sufficient pressure to actually end the use of drone warfare.
power to order President Obama to hand over documents relating to the drone program. Additionally, it also has the power to establish a viable, transparent court
Eleven states including Virginia, Montana,
Maine, Oklahoma, Missouri, North Dakota, Nebraska, Florida, Oregon and
California have already legislated against drone use in their airspace, a sign that
capable of actually challenging the use of drones in the U.S. and abroad.
even among more conservative constituencies, public opposition to drone use is
growing. This could bolster the U.S. Supreme Court, already capable of ruling on
the constitutionality of unmanned drone surveillance. Previously, the U.S. Supreme
Court used its power in a constructive way by declaring wiretaps during the Bush
administration to be illegal. “They really put the breaks on the worst abuses of the Bush administration. The Supreme
Court slapped down Bush administration policies four times, saying you are not
allowed to strip people of habeas corpus, you are not allowed to set up kangaroo
courts and try people for war crimes and execute them,” Cohn said. Although
Guantanamo Bay prison is still open, the Supreme Court also ruled that the prison
located in Cuba, 90 miles off the coast of the United States, is illegal if U.S. laws do
not apply.
Observer Effect Solves
Transparency
Observer effect empirically leads to greater executive transparency and accountability
Deeks ’13 (Ashley S., attorney-adviser in the Office of the Legal Adviser at the U.S. Department of
State, advised on the law of armed conflict, including detention, the U.S. relationship with the
International Committee of the Red Cross, intelligence issues, conventional weapons, and the legal
framework for the conflict with al-Qaeda, “The Observer Effect: National Security Litigation, Executive
Policy Changes, and Judicial Deference”, Fordham Law Review, Vol. 82, No. 2, cl)
A third type of pressure imposed by the observer effect prompts the executive to reveal nonpublic
executive policies and, in doing so, try to attest to its own responsible behavior. Once the policies are
widely available, foreign governments, NGOs, and legal scholars can assess and debate them.112 The
disclosure provides a baseline against which courts and the public may evaluate future executive
behavior and challenge that behavior when it appears to countermand the stated policy.113 Of course,
these disclosures are self-serving; they reflect an executive calculation that these policy revelations are
likely to benefit the executive’s case at a manageable cost. And not all litigation leads to disclosure: in
some cases, being sued causes government officials to be more cautious than usual about making public
statements on issues implicated by the litigation. Nevertheless, the executive has revealed a number of
policies under the influence of the observer effect. The government’s decision to reveal publicly the
process by which it determines when and how to transfer military detainees to other countries serves as
an example.114 Initially, the government transferred people from Guantánamo to other countries
without publicly explaining the standards and process by which it conducted those transfers. The
government had not revealed when it sought diplomatic assurances that receiving countries would not
mistreat the detainees; when it sought security assurances (by which a receiving country agreed to take
measures to ensure that a transferred detainee would not undertake dangerous activities); and which
government officials were involved in the process.115In addition, several cases have prompted the
government to identify which set of individuals it deems detainable in particular armed conflicts, even
though no court specifically ordered the government to do so.
Empirics
Judicial constraints on executive counterterrorism empirically lead to more rightscentered policies
Prakash et. al ’10 (Saikrishna B. & Michael D. Ramsey, professors of law and J.D. from Yale and B.A.
from Stanford, “The Goldilocks Executive”, Texas Law Review, cl)
But in any event, we think Posner and Vermeule’s examples actually prove the opposite, illustrating
constraints upon the Executive. Posner and Vermeule argue, for example, that the Supreme Court’s waron-terror cases have not meaningfully checked the Executive because the courts have never finally
ordered anyone to be released.100 Yet that hardly makes their case, for the question is what the
Executive would have done in a world with no judicial review of the claims of alleged enemy
combatants. The Executive’s goal has been to thwart attacks in the United States and to blunt attacks on
U.S. forces overseas. Given this goal, the Executive’s incentive is to detain anyone (especially foreigners)
who might plausibly appear to be involved in terrorism against the United States. Members of al Qaeda
and the Taliban generally cannot vote in the United States, and the costs visited upon them will not
enter the Executive’s calculus. Despite this incentive to detain the enemy indefinitely, the Executive
released many suspected enemy combatants once held in Guantanamo, some of whom have taken up
arms against the United States.101 Why did the Bush Administration release detainees knowing that it
was likely that some would take up arms against the United States? We surmise it was done to stave off
judicial release orders. There is little doubt that the prospect of judicial review and release had an in
terrorem effect on the Executive Branch.
Balances Security/Rights
Observer effect provides a balanced approach that promotes both security and rights
Deeks ’13 (Ashley S., attorney-adviser in the Office of the Legal Adviser at the U.S. Department of
State, advised on the law of armed conflict, including detention, the U.S. relationship with the
International Committee of the Red Cross, intelligence issues, conventional weapons, and the legal
framework for the conflict with al-Qaeda, “The Observer Effect: National Security Litigation, Executive
Policy Changes, and Judicial Deference”, Fordham Law Review, Vol. 82, No. 2, cl)
Both of these debates—about how extensively courts do defer to the executive on national security
issues and about how much they should defer—fail to take into account an important dynamic that
should inform our views about national security deference: the observer effect. Understanding the way
the observer effect operates should lower the temperature of the debate. The observer effect ultimately
advances all three core separation-of-powers values just discussed: protecting individual liberty (and
sustaining a more systemic balance of power), preserving democratic accountability, and promoting
efficiency and effectiveness. This is not to argue that the observer effect allows accountability and
effectiveness goals to manifest themselves as vigorously as complete judicial deference would. Nor is it
to argue that reliance on the observer effect advances the protection of individual rights as robustly as a
total absence of judicial deference would. It is to suggest, however, that the observer effect potentially
promotes all three values at once in a way that the alternatives do not. As a result, the current
normative deference debate—which either favors the executive’s functional advantages by allowing the
executive broad discretion to navigate national security issues, or urges judicial involvement to protect
individual rights and preserve structural balance—needlessly frames the discussion as an either/or
proposition. Instead, ample judicial deference to executive security policies—interspersed with
occasional nondeferential decisions—can promote both sets of values simultaneously.
Spillover
Court decision on national security have a wide ripple effect that can have a powerful
effect on executive policies
Deeks ’13 (Ashley S., attorney-adviser in the Office of the Legal Adviser at the U.S. Department of
State, advised on the law of armed conflict, including detention, the U.S. relationship with the
International Committee of the Red Cross, intelligence issues, conventional weapons, and the legal
framework for the conflict with al-Qaeda, “The Observer Effect: National Security Litigation, Executive
Policy Changes, and Judicial Deference”, Fordham Law Review, Vol. 82, No. 2, cl)
In another sense, though, much of substance has been decided since 2002—by the executive branch
rather than the courts. This Article illustrated an important reason why the executive’s national security
policies have changed significantly since 2001. Many of these changes are due not to the direct sunlight
of court orders, but to the shadow cast by the threat or reality of court decisions on executive
policymaking in related areas of activity. Court decisions, particularly in the national security realm, have
a wider ripple effect than many recognize because the executive has robust incentives to try to preserve
security issues as its sole domain. In areas where the observer effect shifts executive policies closer to
where courts likely would uphold them, demands for deference by the executive turn out to be more
modest than they might seem if considered from the isolated vantage of a single case at a fixed point in
time. It remains critical for courts to police the outer bounds of executive national security policies, but
they need not engage systematically to have a powerful effect on the shape of those policies and,
consequently, the constitutional national security order.
Public Criticism Strengthens
Public criticism makes the executive uniquely prone to the observer effect
Deeks ’13 (Ashley S., attorney-adviser in the Office of the Legal Adviser at the U.S. Department of
State, advised on the law of armed conflict, including detention, the U.S. relationship with the
International Committee of the Red Cross, intelligence issues, conventional weapons, and the legal
framework for the conflict with al-Qaeda, “The Observer Effect: National Security Litigation, Executive
Policy Changes, and Judicial Deference”, Fordham Law Review, Vol. 82, No. 2, cl)
Public Attention It is a truism that issues attracting public attention and debate draw the attention of
executive policymakers as well, especially where the executive’s current approach to those issues has
produced negative congressional and media reactions. The observer effect amplifies the reasons that
the executive will be inclined to alter its policies. The premise of the observer effect is that the executive
responds to certain or probable judicial attention to its national security policies by attempting to
ensure that those policies will survive (or deter) judicial scrutiny. As the executive knows, courts are
attuned to popular discourse.157 Thus, when entities such as Congress, nongovernmental organizations
(NGOs), journalists, human rights groups, or national security “hawks” already have begun to scrutinize
and criticize those policies, the executive reasonably surmises that the courts are aware of this public
criticism. As a result, the executive is more likely to perceive that a court may intervene, especially when
the courts sense a shift in the public’s (and, importantly, the elite’s) views on an issue.158 Because the
executive is aware that courts can mandate specific policy changes in a way that the public cannot, the
executive may be just as conscious of the elite’s influence on court preferences as it is of the direct
influence of the elite on its own decisionmaking. Where public criticism appears pervasive enough to
alter judicial preferences, the executive is prone to feel the observer effect more keenly.
1.
AT CPs
McNeal CP
Time limits get circumvented
Celso 2014 (Joel [JD Candidate U of Baltimore Law]; DRONING ON ABOUT THE FOURTH AMENDMENT:
ADOPTING A REASONABLE FOURTH AMENDMENT JURISPRUDENCE TO PREVENT UNREASONABLE
SEARCHES BY UNMANNED AIRCRAFT SYSTEMS; 43 U. Balt. L. Rev. 461; kdf)
A. The Inability of the Katz Test to Address UAS Surveillance While the Supreme Court's decision in Jones could be interpreted as an effort to
bolster privacy protections in public places, it will not affect UAS surveillance which involves no trespass. n276 If a challenge [*492] to
prolonged UAS surveillance were to occur, the Court would have to either provide an arbitrarily determined length of time during which UAS
surveillance could pass constitutional muster, n277 or hold that the Fourth Amendment is not implicated. n278 Any
time limit on
warrantless UAS surveillance established by the Court would be based on an analysis of a reasonable
expectation of privacy. n279 Some members of the Court, including Justice Sotomayor n280 and Justice Alito, n281 may
support time limit rules as evidenced by their concerns that long-term tracking may interfere with
privacy expectations. Even if the Court were to establish such a time limit, it would not be difficult for
law enforcement to circumvent it. n282 However, there are more fundamental problems with the Katz test than practical
concerns with its implementation. n283 [*493] The Katz reasonable expectation of privacy test has been criticized for its circular nature. n284
As long as UAS surveillance remains sufficiently rare, an individual's expectation of privacy is considered reasonable and it is protected from
government intrusion by the Fourth Amendment. n285 Once
UAS flights become routine, the expectation of privacy is
no longer reasonable and its protection is removed. n286 The result becomes a "paradoxical situation in
which law enforcement overreach is legitimized once it becomes routinized." n287 This could happen as
early as 2015 when UAS can be fully integrated into U.S. airspace. n288
Curtilage limits fail too – court action on warrants key
Celso 2014 (Joel [JD Candidate U of Baltimore Law]; DRONING ON ABOUT THE FOURTH AMENDMENT:
ADOPTING A REASONABLE FOURTH AMENDMENT JURISPRUDENCE TO PREVENT UNREASONABLE
SEARCHES BY UNMANNED AIRCRAFT SYSTEMS; 43 U. Balt. L. Rev. 461; kdf)
Critical to a court's analysis would be how it evaluates UAS surveillance in light of the emphasis on aerial
surveillance taking place in navigable airspace and the routine nature of private and commercial flights.
n218 Because the FAA is currently establishing navigable airspace for UAS, private and commercial usage of UAS is [*485] restricted and flights
are rare. n219 In the absence of routine flights, it is reasonable to conclude that UAS surveillance of the curtilage of a home is currently a search
within the meaning of the Fourth Amendment. n220 That analysis is likely to change in 2015 and beyond, when UAS are expected to become
commonplace in U.S. airspace. n221 Under Supreme Court jurisprudence, it
is likely a search if the government uses UAS
surveillance to expose areas within the curtilage which an individual has concealed from aerial
observation. n222 Because the area is not exposed, and curtilage enjoys similar protection as the interior of the home, an expectation of
privacy should be recognized as reasonable. n223 For example, if an individual planted trees in his backyard to conceal his actions from aerial
observation, it would likely be a search if police used laser radar affixed to a UAS frame to see through the foliage. Ultimately, any
Fourth
Amendment protection of the curtilage from warrantless UAS surveillance is likely expiring. n224 Once
UAS are generally available to the public and their flights become routine in public airspace, an
expectation of privacy from UAS surveillance will no longer be reasonable. n225 At that point the litigated issue will
likely become whether the technology employed by a particular UAS is in general public use or not. n226 Many of the technologies, such as
digital cameras, are already in general public use, and it may not be long before others join them. n227 The curtilage
then be vulnerable to UAS surveillance without any Fourth Amendment protections.
of the home may
Congress CP
Congressional oversight empirically fails at creating an observer effect
Deeks ’13 (Ashley S., attorney-adviser in the Office of the Legal Adviser at the U.S. Department of
State, advised on the law of armed conflict, including detention, the U.S. relationship with the
International Committee of the Red Cross, intelligence issues, conventional weapons, and the legal
framework for the conflict with al-Qaeda, “The Observer Effect: National Security Litigation, Executive
Policy Changes, and Judicial Deference”, Fordham Law Review, Vol. 82, No. 2, cl)
Second, although in theory Congress may insert itself into the policymaking process—including by
legislating directly or by conducting oversight hearings—it faces a number of hurdles to doing so. As Aziz
Huq notes, “Terrorism is a subject matter that is especially prone to legislative delegation because it
often entails hard trade-offs. Post-9/11 legislation generally leaves large discretion in executive hands.
For example, when fashioning substitutes for habeas corpus, Congress left open both substantive and
procedural rules.”138 In addition to this delegation, congressional oversight mechanisms have not
proven particularly robust.139 The president may limit executive reporting to Congress by interpreting
particular statutory terms narrowly, as he seems to have done with the term “hostilities” in the War
Powers Resolution.140 Congressional reports on national security issues tend to emerge years after the
fact and thus have limited impact on policy setting that must take place quickly.
Congress does not have an observer effect – it is even more aggressive on security
than the executive
Deeks ’13 (Ashley S., attorney-adviser in the Office of the Legal Adviser at the U.S. Department of
State, advised on the law of armed conflict, including detention, the U.S. relationship with the
International Committee of the Red Cross, intelligence issues, conventional weapons, and the legal
framework for the conflict with al-Qaeda, “The Observer Effect: National Security Litigation, Executive
Policy Changes, and Judicial Deference”, Fordham Law Review, Vol. 82, No. 2, cl)
Second, although in theory Congress may insert itself into the policymaking process—including by
legislating directly or by conducting oversight hearings—it faces a number of hurdles to doing so. As Aziz
Huq notes, “Terrorism is a subject matter that is especially prone to legislative delegation because it
often entails hard trade-offs. Post-9/11 legislation generally leaves large discretion in executive hands.
For example, when fashioning substitutes for habeas corpus, Congress left open both substantive and
procedural rules.”138 In addition to this delegation, congressional oversight mechanisms have not
proven particularly robust.139 The president may limit executive reporting to Congress by interpreting
particular statutory terms narrowly, as he seems to have done with the term “hostilities” in the War
Powers Resolution.140 Congressional reports on national security issues tend to emerge years after the
fact and thus have limited impact on policy setting that must take place quickly.Congressional Pressure
As political scientists have demonstrated, a strategic executive will be attuned not just to the judiciary as
a potential audience for its policymaking, but also to Congress. The executive accordingly will take into
account potential congressional reactions to its policy decisions when finalizing those policies. Perhaps,
then, Congress is a key source of pressure on executive policymaking, leading the executive to alter or
reveal various national security policies and procedures. Two facts indicate that Congress has played a
modest role in shaping the national security policies discussed here. First, the timing of the policy
changes seems closely aligned with activity in courts, and seems unrelated to salient activity in Congress.
In many cases, Congress only became involved in cementing policy changes well after the executive
already had made them on its own. For instance, the 2005 Detainee Treatment Act effectively codified
(with modest amendments) the Bush Administration’s 2004 Combatant Status Review Tribunals.196
Congress has not legislated (or even threatened to legislate) to mandate particular review procedures
for detainees in Afghanistan, the use of secret evidence in immigration proceedings, or the use of lethal
force overseas against American citizens. In most of the examples considered in Part I, Congress has
come late to the game, if it shows up on the field at all. Second, where Congress has chosen to legislate
in the post–September 11 era, it frequently has been more aggressively security focused and less rights
focused than the executive.197 For instance, in 2007, the Senate passed a “Sense of the Senate,” by a
94-3 vote, opposing efforts to bring Guantánamo detainees to the United States, notwithstanding
President George W. Bush’s interest in doing so.198 In the National Defense Authorization Act for Fiscal
Year 2012, Congress sought to require the executive to detain members of al Qaeda within a military
detention paradigm rather than an Article III criminal paradigm.199 President Obama’s signing
statement opposed that policy and triggered relevant 196. Detainee Treatment Act of 2005, Pub. L. No.
109-148, div. A, tit. X, 119 Stat. 2739 (codified in part at 42 U.S.C. §§ 2000dd to 2000dd-1 (2006)). 197.
There are exceptions to this. For example, certain members of Congress hoped to cabin the executive’s
use of the state secrets doctrine. See infra note 308. 198. 153 CONG. REC. 19,719 (2007). 199. National
Defense Authorization Act for the Fiscal Year 2012, Pub. L. No. 112-81, §§ 1021–22, 125 Stat. 1298
(2011). 2013] THE OBSERVER EFFECT 871 waivers built into the legislation.200 It is hard to reconcile
Congress’s security-driven preferences with policy shifts by the executive in more rights-protective
directions. It is possible that private consultations between some members of Congress and the
executive have affected executive decisions to alter executive policy, but records of those discussions
are not publicly available. There even is evidence of situations in which members of Congress objected
to rights-protective shifts in executive security policies shortly after the executive issued those
policies.201 In short, it is hard to see, based on available direct and circumstantial evidence, that
Congress has exercised a potent “observer effect” of its own over the executive in the national security
arena.
Courts are key to establishing a legal precedent – legislative oversight is playing
technological whack-a-mole
Vacek 09 (Joseph [Assistant Professor, University of North Dakota]; Big Brother Will Soon Be Watching
- Or Will He? Constitutional, Regulatory, and Operational Issues Surrounding the Use of Unmanned
Aerial Vehicles In Law Enforcement; 2009;
http://www.lexisnexis.com.proxy.lib.umich.edu/lnacui2api/results/docview/mltHandler.do?bct=A)//AJ
Every technological step forward in remote sensing raises potential Fourth Amendment issues, and the
implications of law enforcement and executive use of ever cheaper and more numerous surveillance
tools are not fleshed out until the highest courts profess their opinions, sometimes years later. And in
the interim, even newer technologies have rendered the original technologies and questions obsolete.
Even legislative oversight is ineffective - a deliberative organ's skills at playing technological "whack-amole" are futile when compared to the rate of industry advancement.
[*675] The societal questions raised by today's law enforcement use of cutting-edge surveillance
technology in day-to-day operations will need to be answered at the same level they are raised - on the
ground. There is no precedent that squarely addresses privacy implications of governmental use of a
technology that allows essentially permanent, multi-dimensional, multi-sensory surveillance of citizens
twenty-four hours per day. A hypothetical example approaching that kind of surveillance ability would
be a police officer's access to a Google Earth n1 like displway, with a point of view that could be moved
or zoomed anywhere in three dimensions, coupled with real-time visual, audio, thermal, or other
sensing. God-like sensory omniscience, in other words. Individual law enforcement officers' abilities
could be multiplied with a flock of small UAVs, exponentially increasing the state's power to continually
monitor its citizenry.
Our Constitutional jurisprudence, demographics, and technological ability to remotely sense almost
anyone, anywhere, at anytime, seem to be the ingredients necessary for a police state. But interestingly,
law enforcement has not taken full advantage of the potential tools available to them - perhaps for
regulatory impediments, for budgetary constraints, or to avoid running afoul of the Constitution. At any
rate, permanent, ubiquitous surveillance is not the stuff of fiction anymore. So what could usher us into
the brave new world of a big brother-like security state? Off-the-shelf technology, an updated
regulatory scheme, and outdated Fourth Amendment cases could.
Only a ruling about the 4th amendment can solve – CP gets circumvented
Celso 2014 (Joel [JD Candidate U of Baltimore Law]; DRONING ON ABOUT THE FOURTH AMENDMENT:
ADOPTING A REASONABLE FOURTH AMENDMENT JURISPRUDENCE TO PREVENT UNREASONABLE
SEARCHES BY UNMANNED AIRCRAFT SYSTEMS; 43 U. Balt. L. Rev. 461; kdf)
C. Privacy Concerns The
advent of the widespread government use of UAS has raised concerns about the
potential threat to Americans' privacy. n64 Critics warn of a surveillance society in which the government monitors, tracks,
records, and scrutinizes individuals' every move. n65 Individuals have expressed sentiments such as, "I do not want flying spy robots looking
into my private property with infrared cameras ... It's an invasion of my privacy." n66 Survey results indicate that the American public is
opposed to using UAS in routine police matters. n67 Public opposition to drone use has had some effect. In response to
public backlash, the Seattle Police Department recently returned its two UAS to the manufacturer after the mayor banned their use. n68
Virginia's legislature has imposed a two-year moratorium on using UAS for criminal investigations. n69 Similarly,
Congress has
introduced legislation that would establish limitations on law enforcement's use of UAS platforms. n70
Although privacy concerns can be addressed by Congress n71 or state legislatures, the constitutionality of law
enforcement's use of UAS for aerial surveillance will ultimately be determined by the courts. n72 The issue
to be resolved is whether domestic UAS use is lawful under the Fourth Amendment. n73 The remainder of this
comment will analyze the government's use of UAS for aerial surveillance under [*470] the Fourth Amendment and argue for a
jurisprudence that will maximize protections for individual privacy rights.
Courts are key to creating an effective precedent – legislative action will fall behind
technology
Koerner 15 (Matthew [J.D. Duke University School of Law]; Drones and the Fourth Amendment:
Redefining Expectations of Privacy; March, 2015; http://www.lexisnexis.com.p
roxy.lib.umich.edu/lnacui2api/results/docview/docview.do?docLinkInd=true&risb=21_T222512
84585&format=GNBFI&sort=RELEVANCE&startDocNo=1&resultsUrlKey=29_T2225
1284591&cisb=22_T22251284590&treeMax=true&treeWidth=0&csi=7336&docNo=5)//AJ
[*1133] Drones, with their current and projected capabilities, present a perfect storm of issues that fall
outside of current Fourth Amendment jurisprudence but still appear to implicate the Fourth
Amendment. n20 Drones can maneuver through each and every loophole of the jurisprudence for
warrantless searches. n21 They travel on public airways at low or high altitudes, undetected and with
little or no undue noise, nuisance, or threat to persons or property. n22 They can utilize senseenhancing technologies that are, or will soon be, in general public use. n23 And drones can use these
technologies to gather an abundance of intimate details and information, previously impossible or
impracticable to acquire. n24 Law enforcement is likely to increasingly use drones for domestic
surveillance, n25 and this will likely propel drones to the forefront of courts' dockets. n26
Scholars have written exhaustively on many aspects of the Fourth Amendment, and its intersection with
drones has recently [*1134] received significant attention. n27 Much of the literature on drones and
the Fourth Amendment recognizes that it is unclear where - and whether - drones fall within current
jurisprudence, and recommends a variety of legislative solutions. n28 But although scholars identify the
legal uncertainties with drones, those recommending legislative action endorse a partial solution that
only perpetuates the problem that the courts have maintained with respect to technology and the
Fourth Amendment. Specifically, just as current Fourth Amendment jurisprudence has failed to keep
pace with advancing technology, a legislative approach will also trail behind. n29 This Note addresses
these [*1135] issues and recommends an adaptive approach to Fourth Amendment jurisprudence in
the age of the drone.
For these reasons, it is highly probable that courts will soon confront issues regarding the use of drones
for domestic surveillance. n30 This Note argues that when these issues arise, courts should apply the
reasonable-expectation-of-privacy test expounded in Katz v. United States, n31 and, in doing so, expand
on the subjective-expectation-of-privacy requirement. This oft-neglected element of the two-pronged
test provides critical analysis that is especially relevant to cases involving drones. In further analyzing
and clarifying the subjective-expectation requirement, courts should proceed in three steps. First, they
should determine whether the surveilled person "exhibited an actual (subjective) expectation of
privacy" - the [*1136] threshold issue in order for the Fourth Amendment to apply. n32 Second, if the
person held a subjective expectation of privacy, courts should evaluate the scope of that privacy
expectation. And third, they should determine whether the person "exposed [information] to the "plain
view' of outsiders" and whether the evidence at issue fell within the scope of that exposure. n33
1AR States Solvency Deficit
More than half the states use drones for law enforcement
O’Connor, December 04, 2014
(William, experience includes aviation, product liability, insurance/reinsurance, toxic tort, and commercial litigation matters. He has tried jury
cases to verdict in federal and state court. His practice involves complex and multidistrict litigation, with a special emphasis on the
representation of aerospace companies in high-stakes litigation. Mr. O’Connor’s areas of focus include litigation arising from significant aviation
accidents and product liability matters. Mr. O’Connor has represented airlines, aerospace manufacturers, and airports in high-profile cases
involving major commercial airline disasters, military and civilian helicopter accidents, and business jet crashes., recommended by Legal 500 US
in the area of aviation litigation and by Best Lawyers in America for product liability litigation. In 2014, Chambers USA ranked him among the
leading lawyers in aviation litigation. In 2015, the Daily Journal named him to their “Top 20 Under 40” list. He was also recognized by his peers
as a finalist for The San Diego Daily Transcript’s “2008 Young Attorneys.” Mr. O’Connor is on the Board of Governors for the San Diego chapter
of the Association of Business Trial Lawyers and is a barrister in the Honorable J. Clifford Wallace Chapter of the American Inns of Court, “May
State And Local Gov't Control Low-Flying Drones?,” Portfolio Media, Inc.,
http://www.mofo.com/~/media/Files/Articles/2014/12/141204MayStateLocalGovControlDrones.pdf, Accesed: June 29, 2015, YDEL)
State and Local Regulation of Drones¶ More than
half of the state governments in the United States have formally
considered legislative¶ actions to address drone operations. At least 10 states have gone further and
enacted such legislation.¶ Alaska, for example, passed a bill creating procedures and policies for the use
of drones by law¶ enforcement, including regulations governing information collected by drones.
Illinois, Indiana, and Iowa¶ have also passed legislation that similarly regulates the use of drones in law
enforcement. Louisiana’s legislation extends to the civil sector, prohibiting the unlawful use of an
unmanned aircraft system,¶ defined as the “intentional use of a UAS to conduct surveillance of a targeted facility without the¶
owner’s prior written consent.”¶ At least two states have passed laws that directly address drone flight as
opposed to privacy. Oregon¶ allows property owners to sue a drone operator if (1) a drone has flown less than
400 feet above the¶ owner’s property at least once, (2) the property owner has told the drone operator that he/she does not ¶ consent to the
drone flying over his/her property, and (3) the operator then flies the drone less than 400¶ feet above the property again. Tennessee
has
gone even further, criminalizing the operation of lowflying¶ drones over private property.¶ Nonfederal efforts
to regulate drones are not limited to the state level; municipalities are also stepping¶ in to regulate drones. St. Bonifacius, Minnesota, for
example, passed a resolution banning anyone from¶ operating a drone “within the airspace of the city,”
making a first offense a misdemeanor and a repeat¶ offense a felony. Northampton, Massachusetts, passed
a resolution affirming that — within the city¶ limits — “the navigable airspace for drone aircraft shall
not be expanded below the long-established¶ airspace for manned aircraft,” and that “landowners subject to state
laws and local ordinances have¶ exclusive control of the immediate reaches of the airspace and that no drone aircraft shall have the¶ ‘public
right of transit’ through this private property.” Some towns have considered legalizing self-help¶ remedies like “drone hunting,” while others
have simply passed resolutions calling for federal action.¶ It
seems plain that laws regulating drones are becoming a
standard part of the regulatory landscape in¶ most states. What is the legal status of such regulations today, and what
will become of these local¶ regulations when the FAA issues drone-specific regulations? Can and should the FAA curtail local¶ authority to
regulate drones? If so, how will the FAA be able to effectively regulate the many¶ inexpensive drones available for myriad uses, benign and
malign, that operate below what traditionally¶ has been considered “navigable airspace.”
Lower Courts CP
Supreme Court precedent is key to promoting international rule of law regarding terrorism
Scharf et al. 09 – (Michael, Counsel of Record, Brief of the Public International Law & Policy Group as
Amicus Curiae in Support of the Petitioners, Jamal Kiyemba, et. Al., v. Barack H. Obama, et al., SCOTUS,
No. 08-1234, 12—09, p. 8-20)
II. PILPG’S EXPERIENCE ADVISING FOREIGN GOVERNMENTS AND JUDICIARIES ILLUSTRATES THE
IMPORTANCE OF SUPREME COURT PRECEDENT IN PROMOTING RULE OF LAW IN FOREIGN STATES
DURING TIMES OF CONFLICT. During PILPG’s work providing pro bono legal assistance to foreign
governments and judiciaries on the rule of law in conflict and post-conflict settings, clients frequently
request guidance on U.S. laws and the role of the judiciary in the U.S. system of governance. In recent
years, as states have watched the U.S. tackle the legal issues surrounding the war on terror, foreign
governments and judiciaries have expressed keen interest in, and have demonstrated reliance on, the
legal mechanisms the U.S. has adopted to address the challenges presented in this new form of
conflict. The U.S. Government, under the guidance of this Court, has set a strong example for
upholding the rule of law during times of conflict, and foreign governments have followed this lead .
When states follow the example set by the U.S. Government, the U.S. can benefit greatly . The U.S.
Government recognizes that foreign states with strong and i ndependent judicial systems and a
commitment to the rule of law make the most stable allies and partners. Stable allies and partners in
turn create the best environment for U.S. business investments and commerce and provide the most
safety for Americans traveling abroad. Through PILPG’s work with foreign governments, PILPG has
observed that U.S. rule of law interests are best represented abroad when foreign governments view
the U.S. as committed to the primacy of law. See Michael P. Scharf, International Law in Crisis: A
Qualitative Empirical Contribution to the Compliance Debate, 31 Cardozo L. Rev. 45, 64-65 (2009). A.
Foreign Governments Rely on U.S. Precedent to Promote Rule of Law in Times of Conflict. As noted
above, PILPG has advised over two dozen states and governments on the negotiation and
implementation of peace agreements and the drafting of post-conflict constitutions. PILPG has also
advised all the international war crimes tribunals. PILPG frequently serves as pro bono counsel to foreign
governments and judiciaries, advising those governments and judiciaries on important legal issues
during times of transition. PILPG’s unique relationship with its clients provides the organization’s
members with rare insight into the decision-making process of foreign governments and judiciaries
and the i nfluence that the U.S. and this Court have on promoting rule of law during times of conflict.
The following examples, from Uganda, Nepal, Somaliland, and South Sudan, illustrate some of the ways
in which foreign governments and judiciaries rely on the leadership of the U.S. and this Court to
promote rule of law in their home states. i. Uganda In Uganda, the precedent established by this Court
in Hamdan v. Rumsfeld, 548 U.S. 557 (2006), and Boumediene v. Bush, 128 S.Ct. 2229 (2008), influenced
judges and legislators to incorporate the principles of judicial review and enforceability in their domestic
war crimes bill. In 2008 members of PILPG began working with the Government of Uganda to establish a
War Crimes Chamber within the Ugandan High Court to prosecute members of the Lord’s Resistance
Army (LRA). The LRA is an insurgent group operating in Northern Uganda, which, over the past twentyfive years, has kidnapped over sixty thousand young Ugandan girls and boys, and forced them to be sex
slaves and child soldiers. PILPG worked closely with the Ugandan government to establish a judicial
mechanism to address this violence in accordance with international legal standards. After discussing
with PILPG this Court’s holdings in Hamdan and Boumediene, the Ugandan government decided to
include a provision in their bill establishing the War Crimes Chamber that provides for appeal to
Uganda’s highest court. Following the example of the U.S., the Ugandans felt that it was important that
such high profile and controversial cases involving war crimes and terrorism should be subject to the
highest level of judicial review in order to promote independence, fairness, and legitimacy. Provided
that this Court issues a robust interpretation of Boumediene, the Ugandan precedent is likely to be
repeated by other countries, such as Liberia, which are also contemplating the establishment of judicial
bodies to prosecute war crimes and terrorism. ii. Nepal This Court has also served as a model for the
nascent Nepal judiciary. Nepal’s 2006 Comprehensive Peace Agreement ended a decade-long civil
conflict between Maoist insurgents and government forces. The Agreement provided for the election of
a Constituent Assembly to serve as an interim government and to draft a new constitution for Nepal.
Elected in May 2008, the Constituent Assembly is currently in the midst of the constitution drafting
process. PILPG is advising the Assembly’s drafting committees on a number of issues, among them the
structure, composition, and role of the judiciary. Members of the Assembly have repeatedly expressed
the view that the judiciary is a crucial component to fully and effectively implementing the constitution
and ensuring the balance of power in the new government. In technical discussions with members of
the Committee on the Judicial System, PILPG discussed several aspects of the U.S. judicial model,
including: the U.S. federal and state judicial structures; the types of cases the Supreme Court can
adjudicate; the powers and functions of the U.S. judicial branch; the devolution of judicial power in the
U.S.; the role of the Supreme Court in establishing precedent for all U.S. courts; and the mechanisms
used by the Supreme Court to ensure enforcement of its decisions in the lower courts. Members of the
Committee on the Judicial System were particularly interested in how the U.S. federal court system
operates at the national level, and how the U.S. model could be applied in Nepal as Nepal moves
towards decentralizing its court system. As the Constituent Assembly moves forward with developing
constitutional and judicial structures for Nepal, members will continue to look to the functioning of this
Court for guidance on the role of a high court in a federal system, particularly how this Court enforces
key decisions in the lower courts. iii. Somaliland In Somaliland, the government relied heavily on U.S.
terrorism legislation when drafting terrorism legislation for the region. In October 2008, Somaliland, an
autonomous region inside the international borders of Somalia, experienced its first large-scale attack
by terrorist-linked suicide bombers. The Somaliland government sought PILPG’s assistance to develop a
legal framework to combat terrorism based on U.S. terrorism legislation. The government believed that
rule of law was the best means to combat terrorism and build international support for Somaliland’s
efforts towards that end. The Somaliland government sought to address gaps in its legal regime that
prevented law enforcement from accessing information necessary to properly combat future terrorist
attacks, such as telecommunications records, financial transfer records, property rental records, and
vehicle records. The government requested PILPG’s assistance in balancing new government authority
with vital due process safeguards that the U.S. and other states use to protect the rights of citizens. iv.
South Sudan In the South Sudan peace process, the Sudan People’s Liberation Movement/Army
(SPLM/A), the leading political party in the Government of Southern Sudan, relied on U.S. precedent to
argue for the primacy of law and the importance of the enforceability of adjudicative decisions in
deciding one of the most important and contentious issues in the ongoing peace process. In May 2008,
large-scale violence in Abyei, South Sudan, resulted in the destruction of Abyei Town and the
displacement of its residents. The violence further threatened to unravel the 2005 Comprehensive
Peace Agreement between the Government of Sudan and the SPLM/A. The violence was a result of
tension between the parties regarding the long-overdue establishment of boundaries of the Abyei Area,
which straddles the North and South of Sudan and was the location of widespread violence during
decades of civil war. The parties had agreed in the Comprehensive Peace Agreement to a specific
process to determine the boundaries of the Abyei Area. When the Abyei Boundaries Commission issued
its binding decision, however, the Government of Sudan refused to implement the ruling. Given the long
and violent history between the parties, the unresolved status of Abyei threatened to re-ignite
widespread conflict. Rather than returning to hostilities, however, the parties elected to refer the Abyei
question to an adjudicative body. On July 7, 2008, the parties signed the Abyei Arbitration Agreement.
Under the terms of the Arbitration Agreement, the parties agreed to submit questions regarding the
boundaries of the Abyei Area to an arbitration tribunal seated at the Permanent Court of Arbitration in
The Hague. The leaders of the SPLM/A told PILPG that they sought recourse to an adjudicative body
because they believed that the ruling would be enforceable and would be supported by the
international community. Based on the belief that the U.S. legal system promotes the primacy of law
and affirms the critical role of adjudicative bodies in a system dedicated to the rule of law, the SPLM/A
cited U.S. court decisions in its submissions to the Abyei Arbitration tribunal. The SPLM/A memorials
specifically cited this Court, as well as U.S. district and circuit court decisions, to bolster the SPLM/A’s
position that the tribunal should respect the finality of the award of an adjudicative body, such as the
Abyei Boundaries Commission.2 When the Abyei Arbitration tribunal issued its binding decision in July
2009, the arbitration decision also cited this Court’s precedent.3 This Court thus played an important
role in the peaceful resolution of one of the most contentious issues in the South Sudan peace process.
As the foregoing examples illustrate, foreign governments rely on the precedent set by the U.S. and this
Court when addressing new and complex issues in times of conflict. Finding for the Petitioners in the
present case will reaffirm this Court’s leadership in promoting respect for rule of law in foreign states
during times of conflict. B. Foreign Judges Follow U.S. and Supreme Court Leadership in Times of
Conflict. In addition to its work advising foreign governments, PILPG has been and continues to be
involved in a number of judicial training initiatives in foreign states. These initiatives aim to foster
independent and fair judicial systems in transitional and post-conflict states throughout Central and
Eastern Europe, Africa, and the Middle East. In these trainings, PILPG frequently relies on the work of
this Court to illustrate and promote adherence to the rule of law. In 2004, for example, PILPG led a
week-long training session for Iraqi judges in Dubai on due process and civil liberties protections to
institute in the new post-Saddam legal system. The training was seen as an important step toward the
democratization of Iraq, and something that would hasten the ability of the U.S. to withdraw its troops
from Iraq. On the second day of the training program, local and international media published the
leaked photos of the abuses at Abu Ghraib. The Iraqi judges would not allow the training sessions to
continue until PILPG answered to their satisfaction questions about whether the U.S. judicial system
could ensure that the perpetrators would be brought to justice, that the victims would be able to bring
suit for their injuries, and that the abuses would be halted. When PILPG returned for another training
session several months later, the Iraqi judges had mixed reactions to the prosecutions of the Abu Ghraib
perpetrators. Some judges perceived the U.S. prosecutions of the perpetrators as not aggressive
enough, which left the Iraqi judges with the impression that the U.S. was not leading by example.
Although other Iraqi judges appreciated and sought to follow the U.S. example to try those responsible
for abuses before an independent tribunal, it was clear that Abu Ghraib temporarily set back U.S. efforts
to establish rule of law in Iraq. A year later, in 2005, PILPG conducted training sessions for the Iraqi High
Tribunal judges who would be presiding over the trial of Saddam Hussein and other former leaders of
the Ba’athist regime. Even more than the human rights training of ordinary Iraqi judges discussed above,
the successful operation of the Iraqi High Tribunal was seen as critical to suppressing the spread of
sectarian violence and heading off a full-scale civil war in Iraq. The objectives of the tribunal were
twofold. First, the tribunal sought to bring those most responsible for the atrocities committed under
the Ba’athist regime before an independent panel of judges to be tried under international standards of
justice. Second, the tribunal sought to establish a model for upholding and implementing rule of law in
Iraq and to demonstrate that the need for rule of law is greatest in response to the gravest atrocities.
During the training sessions, the Iraqi judges requested guidance on controlling disruptive defendants in
the courtroom. Specifically, the judges asked whether they could bind and gag the defendants in the
courtroom as they understood had been done to the defendants in the 1969 “Chicago Seven” trial in the
U.S. PILPG explained that the U.S. Court of Appeals had ultimately overturned the convictions in that
case, in part because of the mistreatment of the defendants in the courtroom. United States v.
Dellinger, 472 F.2d 340 (7th Cir. 1972). This information persuaded the Iraqi judges to seek less
draconian means of control in the trial of Saddam Hussein, which was televised gavel to gavel in Iraq.
See generally Michael Newton and Michael Scharf, Enemy of the State: The Trial and Execution of
Saddam Hussein (2008). Foreign judicial interest in U.S. respect for rule of law during the war on terror is
not limited to Iraqi judges. In 2006, PILPG conducted sessions in a weeklong rule of law training program
in Prague for fifty judges from former Soviet Bloc countries in Eastern Europe. At the start of the first
session, one of the judges asked “Sobriaetes’ li vi goverit’ o slone v komnate?,” which translates to “Are
you going to be addressing the elephant in the room?” Michael P. Scharf, The Elephant in the Room:
Torture and the War on Terror, 37 Case W. Res. J. Int’l L. 145, 145 (2006). The question referred to the
so-called “White House Torture Memos,” released just before the training session began, which
asserted that Common Article 3 of the 1949 Geneva Conventions was not applicable to detainees held at
Guantanamo Bay and which provided justification for Military Commissions whose procedures would
not meet the Geneva standards. Id. at 145-46. The group of judges asked PILPG to explain “how
representatives of the United States could expect to be taken seriously in speaking about the
importance of human rights law when the United States itself has recently done so much that is contrary
to that body of law in the context of the so-called ‘Global War on Terror.’” Id. at 145. PILPG addressed
judges’ concerns by explaining that the President’s decision to establish Military Commissions via
Executive Order, and whether those Commissions had to comport with the Geneva Conventions, was
currently being reviewed by this Court in Hamdan v. Rumsfeld, 548 U.S. 557 (2006), and that the
Executive Branch would be bound to follow the holding of this Court. Scharf, supra, at 148. Foreign
judges closely follow the work of this Court and the example set by the U.S. Government in upholding
the rule of law during the war on terror. As these examples illustrate, when the U.S. upholds the rule
of law, foreign judges are more likely to follow.
Foreign governments model the Supreme Court’s rulings regarding judicial checks on other
branches
Scharf et al. 09 – (Michael, Counsel of Record, Brief of the Public International Law & Policy Group as
Amicus Curiae in Support of the Petitioners, Jamal Kiyemba, et. Al., v. Barack H. Obama, et al., SCOTUS,
No. 08-1234, 12—09, p. 8-20)
III. TRANSNATIONAL JUDICIAL DIALOGUE CONFIRMS THIS COURT’S LEADERSHIP IN PROMOTING
ADHERENCE TO RULE OF LAW IN TIMES OF CONFLICT.
PILPG’s on-the-ground experience demonstrating the leadership of this Court is confirmed by a study of
transnational judicial dialogue. Over the past halfcentury, the world’s constitutional courts have been
engaged in a rich and growing transnational judicial dialogue on a wide range of constitutional law
issues. See, e.g., Melissa A. Waters, Mediating Norms and Identity: The Role of Transnational Judicial
Dialogue in Creating and Enforcing International Law, 93 Geo. L.J. 487 (2005); Anne-Marie Slaughter,
Judicial Globalization, 40 Va. J. Int’l L. 1103 (2000). Courts around the world consider , discuss , and cite
foreign judicial decisions not out of a sense of legal obligation, but out of a developing sense that
foreign decisions are valuable resources in elucidating complex legal issues and suggesting new
approaches to common problems. See Waters, supra, at 493-94.
In this transnational judicial dialogue, the decisions of this Court have exercised a profound — and
profoundly positive — influence on the work of foreign and international courts. See generally
Constitutionalism and Rights: The Influence of the United States Constitution Abroad (Louis Henkin &
Albert J. Rosenthal eds., 1990); Anthony Lester, The Overseas Trade in the American Bill of Rights, 88
Colum. L. Rev. 537 (1988). As Anthony Lester of the British House of Lords has noted, “there is a
vigorous overseas trade in the Bill of Rights, in international and constitutional litigation involving
norms derived from American constitutional law. When life or liberty is at stake, the landmark
judgments of the Supreme Court of the United States, giving fresh meaning to the principles of the Bill
of Rights, are studied with as much attention in New Delhi or Strasbourg as they are in Washington,
D.C.” Id. at 541.
This Court’s overseas influence is not limited to the Bill of Rights. From Australia to India to Israel to
the United Kingdom, foreign courts have looked to the seminal decisions of this Court as support for
their own rulings upholding judicial review , enforcing separation of powers, and providing a judicial check
on the political branches.
Indeed, for foreign courts, this Court’s rulings in seminal cases such as Marbury v. Madison, 5 U.S. (1
Cranch) 137 (1803),4 Brown v. Board of Education, 347 U.S. 436 (1954),5 United States v. Nixon, 418
U.S. 683 (1974),6 and Roper v. Simmons, 543 U.S. 551 take on a special significance . Reliance on the
moral authority of this Court can provide invaluable support for those foreign courts struggling to
establish their own legitimacy, to shore up judicial authority against overreaching by powerful
executives, and to develop a strong rule of law within their own national legal systems.
This Court’s potential to positively influence the international rule of law is particularly important in the
nascent transnational judicial dialogue surrounding the war on terrorism and the primacy of rule of
law in times of conflict. As the world’s courts begin to grapple with the novel, complex, and delicate
legal issues surrounding the modern-day war on terrorism, and as states seek to develop judicial
mechanisms to address domestic conflicts, foreign governments and judiciaries are confronting similar
challenges. In particular, foreign governments and judiciaries must consider how to accommodate the
legitimate needs of the executive branch in times of war within the framework of the law. Although
foreign courts are just beginning to address these issues, it is already clear that they are looking to the
experience of the U.S., and to the precedent of this Court, for guidance on upholding the rule of law in
times of conflict. In recent years, courts in Israel, the United Kingdom, Canada, and Australia have relied
on the precedent of this Court in decisions addressing the rights of detainees.8 In short, as a result of
this Court’s robust influence on transnational judicial dialogue, its decisions have proved extraordinarily
important to the development of the rule of law around the world.
International courts have similarly relied on the precedent of this Court in influential decisions. For
example, in the important and developing area of international criminal law, the international war
crimes tribunals for Yugoslavia and Rwanda both relied heavily on the precedent of this Court in their
early opinions. In the first five years of the Yugoslav Tribunal, the first in the modern iteration of the war
crimes tribunals, the justices cited this Court at least seventeen times in decisions establishing the
fundamental legal principles under which the Tribunal would function.9 The International Criminal
Tribunal for Rwanda similarly relied on this Court’s precedent, citing this Court at least twelve times in
its first five years.10 The precedent of this Court has provided a crucial foundation for international
criminal law. The reliance on the precedent of this Court speaks to the Court’s international leadership
on the promotion of respect for the rule of law in times of conflict.
By ruling in favor of the Petitioners, this Court will reaffirm the precedent established in its prior
decisions granting habeas rights to Guantanamo detainees and, in doing so, demonstrate to these
foreign courts, and to other courts who will be addressing these issues in the future, that all branches of
government must be bound by the rule of law, even in the most challenging of times.
States CP
Setting a Constitutional precedent is key to avoiding technological whack-a-mole
Vacek 09 (Joseph [Assistant Professor, University of North Dakota]; Big Brother Will Soon Be Watching
- Or Will He? Constitutional, Regulatory, and Operational Issues Surrounding the Use of Unmanned
Aerial Vehicles In Law Enforcement; 2009; Lexis)//AJ
Every technological step forward in remote sensing raises potential Fourth Amendment issues, and the
implications of law enforcement and executive use of ever cheaper and more numerous surveillance
tools are not fleshed out until the highest courts profess their opinions, sometimes years later. And in
the interim, even newer technologies have rendered the original technologies and questions obsolete.
Even legislative oversight is ineffective - a deliberative organ's skills at playing technological "whack-amole" are futile when compared to the rate of industry advancement.
[*675] The societal questions raised by today's law enforcement use of cutting-edge surveillance
technology in day-to-day operations will need to be answered at the same level they are raised - on the
ground. There is no precedent that squarely addresses privacy implications of governmental use of a
technology that allows essentially permanent, multi-dimensional, multi-sensory surveillance of citizens
twenty-four hours per day. A hypothetical example approaching that kind of surveillance ability would
be a police officer's access to a Google Earth n1 like displway, with a point of view that could be moved
or zoomed anywhere in three dimensions, coupled with real-time visual, audio, thermal, or other
sensing. God-like sensory omniscience, in other words. Individual law enforcement officers' abilities
could be multiplied with a flock of small UAVs, exponentially increasing the state's power to continually
monitor its citizenry.
Our Constitutional jurisprudence, demographics, and technological ability to remotely sense almost
anyone, anywhere, at anytime, seem to be the ingredients necessary for a police state. But interestingly,
law enforcement has not taken full advantage of the potential tools available to them - perhaps for
regulatory impediments, for budgetary constraints, or to avoid running afoul of the Constitution. At any
rate, permanent, ubiquitous surveillance is not the stuff of fiction anymore. So what could usher us into
the brave new world of a big brother-like security state? Off-the-shelf technology, an updated
regulatory scheme, and outdated Fourth Amendment cases could.
Precedent of the plan only sets a constitutional floor for states and municipalities
Rushin 2011 (Stephen [PhD student at the University of California, Berkeley, Jurisprudence and Social
Policy Program; J.D., University of California, Berkeley]; THE JUDICIAL RESPONSE TO MASS POLICE
SURVEILLANCE; 2011 U. Ill. J.L. Tech. & Pol'y 281; kdf)
To begin with, skeptics allege that legislations can more carefully analyze a problem, investigate potential solutions, impanel experts, and make
far-reaching, nuanced policies. n362 Unlike the legislature, which may "command the resources of an extensive bureaucracy ... a judge is
generally limited to a secretary and one or two recent law school ... [graduate clerks]." n363 Kerr has thus argued that the courts simply do not
have the resources to engage in this kind of careful analysis necessary to develop a comprehensive and responsive policy on Fourth
Amendment technologies. n364 On its face, this type of analysis is persuasive, especially considering the fact that the courts lack the funding to
do sweeping investigations into the efficacy of an emerging technology. Nonetheless, this logic ignores a pivotal tactic used by courts in
previous iterations of successful policymaking - the adoption of standards already implemented by other institutions. n365 Malcolm Feeley and
Edward Rubin explained that when the courts attempted to create extensive judicial policy [*325] regulating American prisons, judges turned to
the American Correctional Association and the Federal Bureau of Prisons. n366 Indeed, "Federal judges turned to these standards because they
wanted to impose detailed, administrative-style rules of any sort but lacked the resources to design the rules themselves." n367 Unlike the
prison reform context described by Feeley and Rubin, where the courts created extensive and detailed policy,
the judicial response I
argue for in this Article does not require extensive investigation or uniform implementation. I merely
argue for a judicially mandated floor, which establishes the minimum amount of regulation required for
surveillance technologies. Additionally, there is domestic and international precedent, most notably in Maine, New
Hampshire, Virginia, and Germany, that the courts could use as a model to craft a broad solution. n368 Once the
courts lay out a broad policy objective, police departments and local legislatures would be incentivized
to develop their own, individual policies to implement this judicially mandated, regulatory floor. States
would be free to develop more complex, detailed, and even more stringent protections against data
collection. Some states have already done just that. n369 This pattern can be seen in other areas of criminal judicial policymaking, such as
Miranda requirements. The Court handed down broad general requirements - departments, in implementing the Miranda decision, often went
above and beyond the Court's minimal requirements. Next, critics of judicial regulation of emerging technologies have argued that judges are
not as technically sophisticated as the legislature. Judges often "rely on the crutch of questionable metaphors to aid their comprehension" of
complex technology cases, meaning that "it is easy for judges to misunderstand the context of their decisions and their likely effect when
technology is in flux." n370 But in the unique situation outlined in this Article, judges do not need to be experts in these technological fields to
understand the capabilities of technologies like ALPR and facial recognition software. The danger I discuss in this article is that police will keep a
digital dossier of every single person's movements. This type of monitoring would facilitate fishing expeditions, increase the likelihood of
corrupt behavior by law enforcement, and facilitate some types of racial profiling.
There is little reason to believe that, with
the assistance of knowledgeable advocates, judges could not sufficiently understand the potential
harms posted by digitally efficient investigative technologies to develop a coherent constitutional floor
of protection. And even though the legislature has a broader array of resources at its disposal, the
legislature is an unsatisfactory avenue to protect the unique counter-majoritarian issues at stake. Finally,
some scholars have contended that judicial regulations of [*326] emerging technologies rarely hold up in different factual scenarios. Under this
rationale, critics of this judicial response may contend that while this protection could work when applied to ALPR or facial recognition
software, it would not necessarily be a workable standard for future technological developments. This view certainly has merit. "By the time the
courts decide how a technology should be regulated ... the factual record of the case may be outdated, reflecting older technology rather than
more recent developments." n371 Stuart Benjamin has argued that "rapidly changing facts weaken the force of stare decisis by undermining
the stability of precedents." n372 This provides a forceful case against judicial micromanagement of emerging technologies. But the judicial
response argued for in this Article is sufficiently broad to avoid the predictable antiquation of other, narrower judicial solutions - it merely
distinguishes between observational comparison and indiscriminate data collection, while broadly regulating the identification of data and
interactions with private data aggregators. The collection of extensive, indiscriminate surveillance data is a widespread, pervasive occurrence
common amongst countless investigative technologies. The development of digital dossiers is not a trending fad that will simply disappear in
the near future. We should not expect the legislature to step in and address a problem that may disproportionately affect unpopular minorities.
The Court has long recognized that when making policy in the field of emerging technologies, "the rule
we adopt must take account of more sophisticated systems that are already in use or in development."
n373 The judicial response presented does not prevent the use of surveillance technologies for
observational comparison, but merely offers a sufficiently broad and generalized constitutional limit on
indiscriminate data collection, which can be reasonably exported and applied to future, more
sophisticated technologies. Once more, critics of judicial policymaking seem tacitly concerned that the limited applicability of judicial
rules in the future will weaken the force of stare decisis, thereby undermining the judiciary's legitimacy. But nothing could further de-legitimize
the judiciary more than a failure to serve its fundamental role as a protector against the tyranny of majoritarian preferences. The courts are
therefore the best-positioned actor within our decentralized federal system to protect against the threat of extensive, indiscriminate data
collection. Concerns about the judiciary's institutional competence seem misplaced. And though the courts have limited resources, there is not
enough convincing evidence of a "judicial information deficit" n374 so as to overcome the judiciary's important role as protectors of discrete
and insular minorities.C. Re-conceptualizing the Current Privacy Doctrine in Light of the Digitally Efficient Investigative State A
judicial
response is a step in the right direction in addressing the [*327] growing threat posed by mass police
surveillance. But the proposed judicial response should only be the beginning in a broader shift in our
privacy dialogue. The digitally efficient investigative state has wide-ranging social implications for the entire study of privacy law. I argue
that, given the mounting evidence of efficient retention of public surveillance data and data centralization, it is finally time to re-conceptualize
outdated privacy law assumptions - principal among them the antediluvian notion that an individual has no reasonable expectation to privacy in
public movements. To be clear, I am not arguing that, descriptively, people currently have an honest expectation to privacy in public in today's
world. In the age of GPS, smart phones, Facebook, and Twitter, our socially reasonable expectation to privacy is weaker than ever. Instead, it is
time for a normative reassessment of our entire privacy doctrine. Of course, I am not the first to propose such an argument. Professor Solove
has already observed: Privacy is not simply an empirical and historical question that measures the collective sense in any given society of what
is and has long been considered private. Without a normative component, a conception of privacy can only provide a status report on existing
privacy norms rather than guide us toward shaping privacy law and policy in the future. If we focus simply on people's current expectation of
privacy, our conception of privacy would continually shrink given the increasing surveillance in the modern world. n375 The
judiciary can
and should play a fundamental role in protecting a normatively forceful conception of privacy in all
regards. Do we reasonably expect a person to assume the risk that, every time they enter a public space, the state can monitor their every
movement with ALPR? Do we reasonably expect a person to assume the risk that the state will keep extensive, centralized data on their
movements indefinitely? Or perhaps the more important question is should we expect individuals to completely abandon all anonymity in
public? I believe the clear, normative answer to these questions is a resounding no, and the implications of the digitally efficient investigative
state only add weight to the claims previously made by Professor Solove and others. Ultimately, this Article only scratches the surface of the
broader social implications of the digitally efficient investigative state. Questions remain about the relative criminological benefits of
observational comparison as compared to wholesale data retention. There is an increasing need for empirical research on the effects these
emerging technologies have on individual behavior. And there is a dearth of concrete data on the extent to which law enforcement use these
technologies. I offer only a brief glimpse into this new technological order, the relevant case law, and some general normative
recommendations. This
should only be the beginning of the conversation about the sociological,
psychological, criminological, and legal impacts of the increasingly efficient police surveillance. [*328] VI.
Conclusion Neither judicial responses nor "legislative rulemaking is ...a panacea." n376 Even if the judiciary
successfully recognizes a remedy similar to that discussed in this Article, the legislatures must play a
critical role in developing more nuanced and specific enactments to implement this constitutional floor.
The potential harms of the digitally efficient investigative state are real. There is legitimate concern that the broad
and integrated use of these technologies can create a mass surveillance state. Central to this debate is the proper role of the
judiciary in regulating policy activity. Courts have previously relied upon an often fragile dichotomy between technologies that
merely improve police efficiency and those that offer officers a new, extrasensory ability. For the first time, the judiciary may be
forced to limit the efficiency of law enforcement technologies. Implicit in this action will be the recognition that
sometimes improvements in efficiency can be, quite simply, so efficient as to be unconstitutionally harmful. Unregulated efficiency
can facilitate police wrongdoing, discrimination, and calumniate political dissenters. Unregulated
efficiency in policing technology undermines central protections and tenants of a democratic state. The
relationship between efficiency of criminal investigations and privacy rights will be a new frontier for the courts in the coming decades. The
courts should forcefully, but prudently, protect against the unregulated efficiency of emerging
investigative and surveillance technologies. The judicial response offered in this Article would be but one more example of the
courts exercising their proper role as a limited but effective policymakers.
The perm solves
Kaminski 2013 (Margot E [Executive Director of the Information Society Project, Research Scholar,
and Lecturer in Law at Yale Law School]; Drone Federalism: Civilian Drones and the Things They Carry; 4
Calif. L. Rev. Circuit 57; kdf)
DRONE PRIVACY REGULATIONS There are, broadly speaking, two subjects of drone privacy regulation: law enforcement drone use and civilian
drone use. n8 Most advocates and academics have focused on establishing privacy regulations to govern law enforcement drone use. n9 This
task is worthy of immediate attention. The FAA already permits law enforcement drone use, where it does not yet permit commercial private
drone use. n10 A number of state and federal bills thus propose warrant requirements for drone surveillance by law enforcement. n11 The
federal government could regulate law enforcement drone use as it has historically regulated other law
enforcement behavior, by providing a floor for state laws. n12 Federal legislation already governs law
enforcement use of wiretaps and pen registers. n13 Drone surveillance is likely to additionally involve
video surveillance, location tracking, and/or facial recognition, among other possible technologies. Thus
federal legislation governing law enforcement surveillance could be expanded to govern location tracking, video
surveillance, and the use of facial recognition software by law enforcement. n14 [*60] Regulating law enforcement drone use poses few
countervailing dangers from legislating thoughtlessly or in haste; such legislation would implicate Fourth Amendment rights rather than First
Amendment rights, so the worst case scenario is that such legislation might eventually be found by courts not to protect enough privacy. n15
Specialized Courts
Specialized courts undermine the observer effect
Deeks ’13 (Ashley S., attorney-adviser in the Office of the Legal Adviser at the U.S. Department of
State, advised on the law of armed conflict, including detention, the U.S. relationship with the
International Committee of the Red Cross, intelligence issues, conventional weapons, and the legal
framework for the conflict with al-Qaeda, “The Observer Effect: National Security Litigation, Executive
Policy Changes, and Judicial Deference”, Fordham Law Review, Vol. 82, No. 2, cl)
Congress can affect how the observer effect operates between the executive and the courts.298
Specifically, a congressional requirement that certain types of cases be filed in a particular circuit affects
how the observer effect functions. The direction in which the requirement pushes the observer effect is
unpredictable, though, and depends on the substantive inclinations of the designated circuit.299 On one
hand, designating a circuit to handle a particular type of national security case eventually may diminish
the observer effect. The observer effect operates most effectively when courts generally uphold
executive policies but occasionally decline to defer. When a circuit hears a large volume of comparable
cases, the rough edges of the case law become smoothed out as those courts resolve ambiguities. In
these circumstances, the executive is better able to anticipate outcomes. In the short term, as the courts
are moving toward an equilibrium, the executive has incentives to (or is forced by courts to) change its
policies. In the longer term, however, the settled nature of the case law creates few incentives for the
executive to
Specialized courts reduce the executive’s incentives to make policy changes
Deeks ’13 (Ashley S., attorney-adviser in the Office of the Legal Adviser at the U.S. Department of
State, advised on the law of armed conflict, including detention, the U.S. relationship with the
International Committee of the Red Cross, intelligence issues, conventional weapons, and the legal
framework for the conflict with al-Qaeda, “The Observer Effect: National Security Litigation, Executive
Policy Changes, and Judicial Deference”, Fordham Law Review, Vol. 82, No. 2, cl)
As courts gain confidence and experience in adjudicating these cases, these courts become more willing
to second-guess executive claims that courts lack the institutional capacity and expertise to handle
national security issues.302 If the designated circuit consistently takes a strongly nondeferential
approach to executive policies, the executive has reduced incentives to make modest policy changes to
fend off court involvement. In such cases, the observer effect will wither away. This suggests that
assigning cases by statute to a particular circuit or set of courts has significant disadvantages. Congress
should be attuned to the impact this has on the separation of powers in national security cases and,
where it chooses to designate a circuit, should consider additional ways to ensure a suitable balance
between court oversight and executive flexibility in policymaking.
FBI Planes PIC
CP can’t solve the aff - gets circumvented and more invasive of privacy
Stanley 2015 (Jay [Senior policy analyst, ACLU speech, privacy & tech project]; What's spooky about
the FBI's fleey of spy planes?; https://www.aclu.org/blog/free-future/whats-spooky-about-fbis-fleetspy-planes; kdf)
Following up on a May story by the Washington Post about mysterious aircraft spotted circling over Baltimore, the Associated Press reported
today that the FBI maintains a secret air force with scores of small aircraft registered with 13 front companies under apparently false names,
and that these planes fly over American cities frequently. Obviously law
enforcement has been using aircraft for many
decades. So what’s spooky about this story? Several things: These are not your grandparents’ surveillance
aircraft. As I discussed when the Baltimore story broke, there are several very powerful mass-surveillance
technologies that utilize low-circling manned aircraft, including “Dirtboxes” and persistent wide-area
surveillance in which an entire 25-square mile area can be monitored, and vehicles tracked, for
extended periods of time by a single camera. We need more information about the scope of surveillance these planes are
being used for. The FBI told the AP that its fleet was “not equipped, designed or used for bulk collection
activities or mass surveillance.” We are glad to hear that—but that statement bears more interrogation. For example the AP reports
that the FBI “occasionally” uses Dirtboxes (aka “IMSI catchers” or “cell-site simulators”) on the aircraft. Those certainly
qualify as mass surveillance devices. If the FBI is only using the aircraft when it has a specific target
rather than for broad fishing expeditions, that would be a good thing—but that is not the same thing as saying
that data on masses of people is not being swept up. The FBI told the AP that “under a new policy it has
recently begun obtaining court orders to use cell-site simulators.” But we don’t know what kind of “court orders”
they’re getting to use the devices. Rather than warrants, they may just be obtaining “pen register” orders, as we
have seen done by local police in Baltimore and elsewhere. The sheer scope of the program. A 2010 federal budget document found by the AP
mentions at least 115 planes in the FBI’s fleet, and the FBI has flown over 100 flights over more than 30 American cities in recent weeks, the AP
found. Surveillance
turning inward. One trend we’ve seen in the last 15 years or so is a great “Turning
Inward,” as US surveillance capabilities originally built to spy on the Soviet Union and other overseas
targets have swung inward on the American people. The FBI has a spy plane fleet, hidden behind shell companies with
three-letter names and headed by ghost CEOS with signatures that don’t match over time— it’s all very CIA. Yet these are American cities that
they’re flying over. Cessnas
today, drones tomorrow. Another thing that makes these flights spooky is the
prospect that manned aircraft may soon be replaced with drones. And that will make it all the cheaper and easier to
deploy these flights all the more frequently over even more American cities and towns. And unlike manned aircraft, drones may not be
easy to track through web sites like flightradar24.com, which shows the manned aircraft currently in the air around the world and played a
key role in uncovering the FBI’s air force. It is true that under orders from President Obama the DOJ recently promulgated a privacy policy for its
use of drones, but that policy is not very airtight—for example, it says DOJ
agencies can’t use the planes “solely for the
purpose of monitoring activities protected by the First Amendment.” That is good, but when agencies want
to do surveillance they always claim to have other reasons so the monitoring is not “solely” for such
monitoring. In the end, it doesn’t make sense for drones to be subject to privacy regulations, but not
manned aircraft. Manned aircraft can and do raise very real privacy concerns; for example their use in persistent
wide-area surveillance, and in voyeurism incidents. But manned aircraft are not regulated today, because historically
they have been expensive and their use therefore relatively rare, and their surveillance abilities wellunderstood and relatively limited. What this story tells us is that their use is now more widespread than we thought—and we
know their surveillance capabilities are growing by leaps and bounds. Drones, by raising the prospect of endless
free and easy aerial surveillance, have brought to the fore issues that already existed with manned aircraft, and
new regulations designed to protect against aerial surveillance should not distinguish between manned
and unmanned aircraft. Law enforcement has been using aircraft for many decades. So what’s spooky about reports of FBI fleet of
low-circling planes?
FBI spy planes violate privacy because of unique tech
Storm 15 (Darlene, “Surveillance by FBI's fleet of spy planes raises privacy questions,” Computer
World, 6-3-15, http://www.computerworld.com/article/2930731/security0/surveillance-by-fbis-fleet-ofspy-planes-raises-privacy-questions.html)//BPS
That plane circling overhead might be one of the
FBI’s surveillance aircraft [are] fitted with tech equipment capable
of tricking the cellphones below it into connecting to it – and not a legitimate cellphone tower – and
then indiscriminately sucking up info of subscribers not suspected of any crime. Then again it might not.
In a 30-day period, The
Associated Press “traced at least 50 aircraft back to the FBI, and identified more than
100 flights in 11 states” plus the District of Columbia. Those planes have been flying over “parts of Boston, Chicago, Dallas,
Houston, Minneapolis, Phoenix, Seattle and Southern California” as well rural areas. While you would expect the FBI to use aircraft in
investigations, you might not expect those planes to be registered to shell companies. The AP traced FBI planes “to at least 13 fake companies,
such as FVX Research, KQM Aviation, NBR Aviation and PXW Services.”
Although the FBI said its “aviation program is not a secret,” the agency tried the tactic of asking the AP not to mention the fake companies tied
to the planes as it “would saddle taxpayers with the expense of creating new cover companies to shield the government's involvement, and
could endanger the planes and integrity of the surveillance missions.” The AP must have thought that request was funny and chose to ignore it
because the information about the shell companies and their links to the Justice Department are listed “on public documents and in
government databases.”
115 planes belonging to the FBI, including 90 Cessna aircraft, were mentioned in a 2009 budget document, but while investigating the
Associated Press also discovered:
The planes are equipped with technology that can capture video of unrelated criminal activity on the
ground that could be handed over to prosecutions. One of the planes, photographed in flight last week by the AP in northern
Virginia, bristled with unusual antennas under its fuselage and a camera on its left side.
Some of the aircraft can also be equipped with technology that can identify thousands of people below
through the cellphones they carry, even if they're not making a call or in public. Officials said that practice, which mimics cell
towers and gets phones to reveal basic subscriber information, is used in only limited situations.
“These are not your grandparents' surveillance aircraft,” said ACLU senior policy analyst Jay Stanley. He also explained that “surveillance turning
inward” is just one spooky element about the FBI’s spy planes.
One trend we’ve seen in the last 15 years or so is a great “Turning Inward,” as US surveillance capabilities originally built to spy on the Soviet
Union and other overseas targets have swung inward on the American people. The FBI has a spy plane fleet, hidden behind shell companies
with three-letter names and headed by ghost CEOS with signatures that don’t match over time— it’s all very CIA. Yet these are American cities
that they’re flying over.
After The Washington Post reported that surveillance
planes fitted with infrared cameras to track people’s
movements were flying over Baltimore, the AP discovered that some of those “FBI missions circled above at least 40,000
residents during a single flight over Anaheim, California.” The flight patterns were counter-clockwise and about
one mile above the ground at slow speeds, which suggested to the AP that FLIR cameras were being used.
Earlier this month, the ACLU hit the FAA as well as the DOJ, FBI, DEA, U.S. Marshals Service with Freedom of Information Act requests about the
surveillance planes and flights over Baltimore. The DEA has “at least 92 planes registered to shell companies” and the U.S. Marshals Service use
planes with tech capable of capturing data from thousands of other phones, too.
The Wall Street Journal previously reported the Marshals have been flying Cessna aircraft outfitted with dirtbox devices for seven years,
“snagging a large number of innocent Americans” every time the feds hunt for criminals.
Dirtboxes work like Stingrays, which are in use by “over 46 agencies including law enforcement, the military, and intelligence agencies across 18
states and Washington D.C. for more than a decade.” A
Stingray surveillance device lets law enforcement mimic a cell phone
tower, track
the position of users “who connect to it, and sometimes even intercept calls and Internet traffic, send
fake texts, install spyware on a phone, and determine precise locations.” Dirtboxes can “sweep up identifying
information about tens of thousands of cell phones in a single flight.”
The ACLU’s Stanley said:
Another mass surveillance technique that uses fixed-wing aircraft is known as “Wide-Area Surveillance.” This involves the
installation of super-high, gigapixel resolution cameras on planes, which are then used to monitor entire
cities. Every moving pedestrian and vehicle can be tracked: the beginning and end everyone’s journeys, and the route
taken in between. This gives the authorities the power to press "rewind" on anybody's movements, and learn a lot of
intrusive things about how they live their life.
The investigation by the Associated Press into the FBI’s use of surveillance aircraft does indeed raise questions “about how these surveillance
flights affect Americans' privacy” even if the FBI has started obtaining court orders to use the tech. The agency’s use of cell-site simulators, aka
dirtboxes or IMSI catchers, attached to aircraft is the creepiest part; the technology can track thousands of innocent Americans who did nothing
to deserve having their privacy and civil liberty rights poked with a surveillance stick.
If the FBI is running targeted surveillance in legitimate investigations, then why collect the whole haystack when the agency is investigating one
bad needle inside it?
AT DAs
Util
Privacy first comes before util
Salem 2014 (Jonathan [president of Arcadia Communications Lab]; The eternal value of privacy; Sep
16; endofanonymity.com/2014/09/16/the-eternal-value-of-privacy/; kdf)
The eternal value of privacy seems somewhat quaint or detached from our normal conversations about
privacy, which usually conflate two other topics, namely commerce and security. The former point casts things
in the light of some imagined quid pro quo commercial transactions between monitor and individuals
being watched (I get to use a “free” social platform because I’m actually “paying” for it by giving up facts about myself), and the
latter in terms of the necessity of that oversight to precluding acts of terror (if you have nothing to hide, why are
you worried that your government is watching you?). Both topics confound any true understanding of privacy, and it’s
fascinating how our public dialogue has come to all but rely on one (or both) angles in which to cast engagement on it. It wasn’t always like this,
however. Even Wired magazine ran a commentary back in 2006 by security expert Bruce Schneier, in which he described
the frightening future in which we’ve now come to live: “A future in which privacy would face constant assault was so alien to the framers of
the Constitution that it never occurred to them to call out privacy as an explicit right. Privacy was inherent to the nobility of their being and
their cause. Of course being watched in your own home was unreasonable. Watching at all was an act so unseemly as to be inconceivable
among gentlemen in their day. You
watched convicted criminals, not free citizens. You ruled your own home. It’s
intrinsic to the concept of liberty. For if we are observed in all matters, we are constantly under threat of
correction, judgment, criticism, even plagiarism of our own uniqueness. We become children, fettered
under watchful eyes, constantly fearful that — either now or in the uncertain future — patterns we leave behind
will be brought back to implicate us, by whatever authority has now become focused upon our onceprivate and innocent acts. We lose our individuality, because everything we do is observable and recordable.” While he was
talking about governmental intrusion into our lives, he could have just as easily been describing the apolitical actions of today’s leading brands
(and the online services providers on which they rely). His point is that privacy
is a subject that we much respect and
understand not only before but during any discussion of how it is affected by governance or business. It’s
also a little perspective on how those opt-in mouseprint agreements that many of us sign when we agree to be watched in order to share cat
videos with one another aren’t just somewhat quaint, but downright scary.
Util makes all impacts inevitable
Albright ’14 – Research Analyst at Freedom Works (Logan, "The NSA's Collateral Spying,"
Freedom Works, 7-8-15, http://www.freedomworks.org/content/nsas-collateral-spying)
In short, the report, based on information obtained by Edward Snowden, reveals that during
the course of its ordinary, otherwise
legal surveillance operations, the NSA also collected data on large numbers of people who were not specifically targeted.
The agency calls this practice “incidental surveillance.” I call it “collateral spying.” The report found that, on average, 9 out of every 10
people spied on were not the intended target. The NSA has the legal authority to obtain a warrant based on probable cause
in order to surveil an individual. No one is disputing that. But when this targeting results in collateral spying on vast numbers of innocents, in
the absence of probable cause and the corresponding warrants, that is a major problem. The NSA has asserted that such incidental data
collection is inevitable, and to a certain extent that’s likely true. It is understandable that in some situations the NSA may learn information
about people other than the direct target, but this should obviously be minimized as far as possible, and at the very least the information
should be immediately purged from government databases, not stored for years on end. In any case, the
whole situation is
indicative of the agency’s cavalier attitude towards individual rights. While national security is a concern we all share,
the ends do not justify the means when those means involve violate the constitutional protections
afforded to citizens by our nation’s founders. It is not okay to violate the rights of an innocent in the
process of achieving a broader goal, even if that goal is noble. The way the NSA has been behaving is
Machiavellian in the most literal sense. In his 16th century political treatise, The Prince, Niccolo Machiavelli recognized a harsh reality of
politics that still plagues us half a millennium later, writing, “A prince wishing to keep his state is very often forced to do
evil.” Taking Machiavelli’s advice as a green light for immoral behavior has been the problem with governments throughout history, a
problem the founding fathers sought to avoid by setting down precise guidelines for what the government
could and could not do in the form of a Constitution. The disregard of these rules, and the argument that there
should be a national security exception to the Fourth Amendment, undermines the entire purpose of
the American experiment, and restores the European-style tyrannies the revolutionaries fought against.
Politics
Link Turns
Regulating UAVs is strongly bipartisan
Hurst 13 (Dustin, “The Bipartisan Opposition to Domestic Drones,” January 29,
http://reason.com/archives/2013/01/29/the-bipartisan-opposition-domestic-droneSEP)
Both the progressive American Civil Liberties Union and the libertarian Rutherford Institute
cheer legislative efforts to place strict limits on unmanned aerial vehicles, or UAVs. And, prodded by
privacy groups, state lawmakers nationwide—Republicans and Democrats alike—have launched
an all-out offensive against the unmanned aerial vehicles. And to think, only the prospect of complete
upheaval of America’s strong tradition of privacy rights spurs bipartisanship. In at least 13 states,
lawmakers this year will examine bills to place strict limits on how government entities can deploy drones. No state has embedded
such regulations into law. Drones are already everywhere—executing search-and-rescue missions, tracking cattle rustlers, or
monitoring wildfires with minimal cost and little risk of loss of life. The Federal Aviation Administration listed 345 active drone
licenses as of November 2012. Congress has directed the federal department to streamline the approval process. Starting in 2015,
commercial entities—think entertainment news outlet TMZ—will have easy access to drone permits. Analysts believe as many as
30,000 drones will populate American skies by 2020. Canyon County, Idaho, already has one, a camera-equipped Draganflyer X-6 it
bought for $33.400 with federal grant money. About a year ago, Mesa County, Colorado, used $14,000 to purchase its drone, a 4foot-long, 9-pound plane that can maintain flight for about an hour. The Seattle Police Department spent $41,000 in August for its
Draganflyer X-6. With the booming interest in the myriad uses of UAVs comes nervous anxiety about the creep of the surveillance
state.
Bipartisan Congressional support exists for curtailing drones
Fox News 13
(Fox News, Lawmakers eye regulating domestic surveillance drones,
http://www.foxnews.com/politics/2013/05/19/congress-eyes-regulating-drones/) JB
Amid growing concern over the use of drones by police and government officials for surveillance, a
bipartisan group of lawmakers is pushing to limit the use of unmanned surveillance "eyes in the sky"
aircraft. Rep. James Sensenbrenner, R-Wis., along with Rep. Zoe Lofgren, D-Calif., and Rep. Ted Poe, R-Texas, is sponsoring legislation that
would codify due process protections for Americans in cases involving drones and make flying armed drones in the U.S.
sky illegal. Sensenbrenner believes it is necessary to develop new standards to address the privacy issues associated
with use of drones — which can be as small as a bird and as large as a plane.
Bipartisan Congressional support for curtailing drones through a warrant requirement
Montopoli 13- senior political reporter
(Brian, Lawmakers move to limit domestic drones, http://www.cbsnews.com/news/lawmakers-moveto-limit-domestic-drones/) JB
Drones are coming to a police station near you, prompting lawmakers to craft legislation designed to
limit what they see as the potential for a previously unthinkable level of Big Brother-style surveillance by
the government. Four states - Florida, Idaho, Montana and Virginia - have already passed laws to control the use of drones by law
enforcement. The first three have barred police from using drones without a warrant in most cases; Virginia has barred their use by law
enforcement (with exceptions) for two years. According to a tally by the American Civil Liberties Union, legislation to limit drone use has been
proposed in 41 states and remains active in 32 states. There is also a push to limit domestic drone use on a federal level.
On Friday, the House Judiciary Committee subcommittee on Crime, Terrorism, Homeland Security and Investigations is holding a hearing called,
"Eyes in the Sky: The Domestic Use of Unmanned Aerial Systems." It is the second congressional
hearing on domestic drones
this year; at the first, Judiciary Committee chairman Sen. Patrick Leahy, D-VT, warned that "the domestic
use of drones to conduct
surveillance and collect other information will have a broad and significant impact on the everyday lives
of millions of Americans." Three bills from the current Congress have been referred to the subcommittee for consideration. The first,
called the Preserving American Privacy Act, would require a governmental entity operating a drone to minimize the collection or disclosure of
identifying information. Another bill, the Preserving Freedom from Unwarranted Surveillance Act, would prevent government officials from
using a drone to gather evidence or other information pertaining to criminal conduct without a warrant. A third would prohibit the use of
drones to kill citizens of the United States within the United States. On the Senate side, both Sen. Mark Udall, D-Colo., and Sen. Rand Paul, RKy., are preparing
to introduce legislation. Paul's bill, which his office says will be released in the coming weeks, is a reintroduction
of his "Preserving Freedom from Unwarranted Surveillance Act" from last year, which bars the use of drones by law
enforcement without a warrant in most cases. The freshman senator gave the issue of domestic drone use national
prominence when he filibustered over what he considered a lack of clarity from the White House over whether it had the authority to use
drones to kill U.S. citizens on American soil with drones. (Attorney General Eric Holder eventually said the answer, when it came to Americans
not engaged in combat, is no.)
Courts Shield
Courts shield – avoid political fallout
Whittington 5- Professor of Politics, Princeton University (Keith, "Interpose Your
Friendly Hand: Political Supports for the Exercise of Judicial Review by the United States
Supreme Court”, The American Political Science Review, Nov., (99)4, p. 583)
There are some issues that politicians cannot easily handle. For individual
legislators, their constituents may be sharply divided on a given issue or
overwhelmingly hostile to a policy that the legislator would nonetheless like to see
adopted. Party leaders, including presidents and legislative leaders, must
similarly sometimes manage deeply divided or cross-pressured coalitions. When faced
with such issues, elected officials may actively seek to turn over controversial
political questions to the courts so as to circumvent a paralyzed
legislature and avoid the political fallout that would come with taking
direct action themselves. As Mark Graber (1993) has detailed in cases such as
slavery and abortion, elected officials may prefer judicial resolution of
disruptive political issues to direct legislative action, especially when the courts
are believed to be sympathetic to the politician's own substantive preferences but
even when the attitude of the courts is uncertain or unfavorable (see also,
Lovell 2003). Even when politicians do not invite judicial intervention, strategically
minded courts will take into account not only the policy preferences of well-positioned
policymakers but also the willingness of those potential policymakers to act if doing so
means that they must assume responsibility for policy outcomes. For cross-pressured
politicians and coalition leaders, shifting blame for controversial decisions
to the Court and obscuring their own relationship to those decisions may preserve
electoral support and coalition unity without threatening active judicial review
(Arnold 1990; Fiorina 1986; Weaver 1986). The conditions for the exercise of judicial
review may be relatively favorable when judicial invalidations of legislative policy can be
managed to the electoral benefit of most legislators. In the cases considered previously,
fractious coalitions produced legislation that presidents and party leaders deplored but
were unwilling to block. Divisions within the governing coalition can also prevent
legislative action that political leaders want taken, as illustrated in the following case.
Judicial review allows political leaders to evade responsibilities
Stoutenborough et al. 6 - (James W., Donald P Haider-Markel, Mahalley D Allen. Political Science Dept - University of Utah,
“Reassessing the Impact of Supreme Court Decisions on Public Opinion: Gay Civil Rights Cases”, Political Research Quarterly, Sep., (59)3; p. 419)
In many cases, courts have been empowered by and served the interests of
other political actors. While this undermines the countermajoritarian difficulty as
an empirical hypothesis, it is not at all reassuring from a democratic perspective.
Judicial review can provide an opportunity for elected political actors to
evade responsibilities or to pursue policies while evading electoral
consequences. Such actions may enhance or enable domination by letting those
actors pursue policies that might lead to domination without suffering electoral
consequences. The possibility that judicial review can provide another
outlet that permits legislators to "run from daylight"85 and effect
important policy changes with a minimum of public scrutiny is a serious
concern, and may especially contribute to domination by powerful economic elites. An
additional concern is that judicial review can have the perverse effect of
making legislators less attentive to their constitutional responsibilities,
as they may vote for legislation they believe to be unconstitutional under the
assumption that the courts will correct their mistake.86
Courts shield – insulate from political pressure
Whittington 5- Professor of Politics, Princeton University (Keith, "Interpose Your
Friendly Hand: Political Supports for the Exercise of Judicial Review by the United States
Supreme Court”, The American Political Science Review, Nov., (99)4, p. 583)
The establishment and maintenance of judicial review is a
way of delegating some kinds of political decisions to a relatively politically
insulated institution. This delegation aspect of judicial review drives the
entrenchment thesis, as current political majorities attempt to insulate their policy
preferences from future political majorities by empowering sympathetic judges who will
endure through the electoral transition. This is only one of the potential uses to which
such an institution may be put, however. Political majorities may effectively
delegate a range of tasks to a judicial agent that the courts may be able to
perform more effectively or reliably than the elected officials can acting
directly. It is well recognized that explicit or implicit "delegation" of political tasks
to differently situated institutions and actors can be valuable in a range of political
contexts (see generally, Voigt and Salzberger 2002). Legislative party leaders can solve
collective action problems and protect the value of party labels (Cox and McCubbins
1993; Kiewiet and McCubbins 1991). Legislative committees can develop expertise and
provide the information needed to make good policy (Krehbiel 1991). Central banks and
independent judiciaries can allow legislators to credibly commit to
policies valued by key constituencies (Landes and Posner 1975; Maxfield 1997).
Interest groups can develop cheap information on the performance of bureaucracies or
the preferences of the electorate (Hansen 1991; McCubbins and Schwartz 1984). At the
same time, it should be recognized that apparent legislative delegations may be
better understood as the exploitation of available political resources and
legislative weaknesses by other actors, such as executive branch officials,
to enhance their own institutional position (Whittington and Carpenter 2003).
Thus, we should be sensitive to the interaction between courts exploiting political
opportunities and legislative leaders managing political risk. The courts exercising a
power of judicial review may be a vehicle for overcoming political
barriers that hamper a governing coalition. There are two preconditions for this
possibility to be reasonable. The first is that courts often be ideologically friendly to the
governing coalition. Political majorities are unlikely to benefit from supporting courts
that are ideologically divergent from them and are unlikely often to be able to work in
tandem with them to achieve common political goals. There are reasons to believe that
this precondition is often met in the American context, with the selection of individual
judges (Dahl 1957), the departure of current judges (Spriggs and Wahlbeck 1995), the
expansion of the judiciary as a whole (Barrow, Zuk, and Gryski 1996; De Figueiredo and
Tiller 1996), and the structure of court jurisdiction (Gillman 2002) all facilitating the
creation of a sympathetic judiciary. This is not to say that presidents and parties are
never surprised by their judicial appointments or by judicial decisions, but merely that
the Court often shares the constitutional and ideological sensibilities of political leaders.
The second precondition is that judicial review is actually useful to current
political majorities. The usefulness to legislators of other judicial powers, such as
the power to interpret statutes and enforce the law, is fairly evident. The utility of the
power of judicial review to current legislators is less immediately evident, but it is easy
to see once we note that judicial review may be used to void statutes passed by
previous governing coalitions, thus displacing the current legislative baseline. When
governing coalitions are unable or unwilling to displace the legislative
baseline themselves, then the courts may usefully do this work for them.
Those invested in the status quo have less to gain from judicial review (Graber 2000),
and so judicial review is likely to be more useful to some political coalitions than others,
depending in part on their substantive agenda and in part on the extent to which they
have been able to define the status quo. Nonetheless, as is illustrated in the following, it
is unrealistic to assume that only political actors currently out of power stand to benefit
from an active judiciary.
WOT
Drones are ineffective at surveillance – US borders prove
Bennett, January 7, 2015
(Brian, writes about national security and intelligence in Washington, D.C. He has documented a pattern of excessive force by U.S. Border Patrol
agents and revealed the first arrest on U.S. soil using a Predator drone. He started as a reporter for Time magazine in Hong Kong in 2000,
reported from Pakistan and Afghanistan after the Sept. 11, 2001, attacks and was Time’s Baghdad bureau chief in 2003 and 2004, “Border
drones are ineffective, badly managed, too expensive, official says,” LA Times,
http://www.latimes.com/nation/immigration/la-na-border-drones-20150107-story.html, Accessed June 24,
2015, YDEL)
Drones patrolling the U.S. border are poorly managed and ineffective at stopping illegal immigration,
and the government should abandon a $400-million plan to expand their use, according to an internal watchdog
report released Tuesday.¶ The 8-year-old drone program has cost more than expected, according to a report by the Department of Homeland
Security's inspector general, John Roth.¶ Rather
than spend more on drones, the department should "put those
funds to better use," Roth recommended. He described the Predator B drones flown along the border by U.S. Customs and Border
Protection as "dubious achievers."¶ It's time for Congress to agree on a humane immigration solution¶ It's time for Congress to agree on a
humane immigration solution¶ "Notwithstanding the significant investment, we
see no evidence that the drones contribute
to a more secure border, and there is no reason to invest additional taxpayer funds at this time," Roth
said in a statement.¶ The audit concluded that Customs and Border Protection could better use the funds on manned aircraft and
ground surveillance technology.¶ The drones were designed to fly over the border to spot smugglers and illegal
border crossers. But auditors found that 78% of the time that agents had planned to use the craft, they
were grounded because of bad weather, budget constraints or maintenance problems.¶ lRelated Proposed U.S.
regulations for drones expected soon amid soaring sales¶ BUSINESS¶ Proposed U.S. regulations for drones expected soon amid soaring sales¶
SEE ALL RELATED ¶ 8¶ Even when aloft, auditors found, the drones contributed little. Three
drones flying around the Tucson
area helped apprehend about 2,200 people illegally crossing the border in 2013, fewer than 2% of the
120,939 apprehended that year in the area.¶ Border Patrol supervisors had planned on using drones to
inspect ground-sensor alerts. But a drone was used in that scenario only six times in 2013.¶ Auditors found
that officials underestimated the cost of the drones by leaving out operating costs such as pilot salaries, equipment and overhead. Adding such
items increased the flying cost nearly fivefold, to $12,255 per hour.¶ People think these kinds of surveillance technologies
will be a silver bullet. Time after time, we see the practical realities of these systems don't live up to the hype.¶ - Jay Stanley, ACLU privacy
expert¶ "It really doesn't feel like [Customs and Border Protection] has a good handle on how it is using its drones, how much it costs to operate
the drones, where that money is coming from or whether it is meeting any of its performance metrics," said Jennifer Lynch, a lawyer for the
Electronic Frontier Foundation, a San Francisco-based privacy and digital rights group.¶ The report's conclusions will make it harder for officials
to justify further investment in the border surveillance drones, especially at a time when Homeland Security's budget is at the center of the
battle over President Obama's program to give work permits to millions of immigrants in the country illegally¶ 18, 2015¶ ADD A COMMENTSEE
ALL COMMENTS ¶ 21¶ "People think these kinds of surveillance technologies will be a silver bullet," said Jay Stanley, a privacy expert at the
American Civil Liberties Union. "Time
after time, we see the practical realities of these systems don't live up to
the hype."¶ Customs and Border Protection, which is part of Homeland Security, operates the fleet of nine long-range Predator B drones
from bases in Arizona, Texas and North Dakota.¶ The agency purchased 11 drones, but one crashed in Arizona in 2006 and another fell into the
Pacific Ocean off San Diego after a mechanical failure last year.¶ Agency officials said in response to the audit that they
had no plans to
expand the fleet aside from replacing the Predator that crashed last year. The agency is authorized to
spend an additional $433 million to buy up to 14 more drones.
Drones are statistically useless in apprehensions – border patrol proves
Lee, 2015
(Brianna, joined IBT in July 2014 and covers U.S. immigration and Latin America. Previously she worked
as a writer and editor at the Council on Foreign Relations and as a staff writer for the PBS news program
"Need to Know,” “Immigration Reform: Drones At The U.S. Border Are Expensive, Not Proven Effective,
Report Says,” International Business Times, http://www.ibtimes.com/immigration-reform-drones-usborder-are-expensive-not-proven-effective-report-says-1775076, Accessed: June 26, 2015, YDEL)
About half of the 1,954-mile border between the U.S. and Mexico is patrolled by drones thanks to a federal program launched nearly 10 years ago. But a new
watchdog report
says there’s no evidence that the drones are effectively policing the border, and that taxpayers
footing the bill to the tune of more than $12,000 per hour of flight aren't getting their money's worth. ¶ The Department of Homeland Security’s Office of the
Inspector General issued a biting review of the border drone program, operated by the
Customs and Border Protection agency (CBP). After
eight years, the report states, “CBP has invested significant funds in a program that has not achieved the
expected results, and it cannot demonstrate how much the program has improved border security.Ӧ The
use of military-grade Predator B drones for border surveillance has ballooned since CBP’s program launched in 2005, with proponents saying they had more
endurance and better capacity than other manned flying vehicles like helicopters. There are nine drones currently in operation (CBP has purchased 11 in total, but
one crashed in 2006 and another crashed in January 2014) and they primarily patrol two areas of the border: the Arizona-Tucson sector and the Rio Grande Valley
sector.¶ The
audit, which surveyed border drone operations through fiscal year 2013, found that “relatively
few” apprehensions of border crossers were attributed to drone operations. Drones led to about 1.8
percent of apprehensions in the Tucson sector and a mere 0.7 percent in the Rio Grande Valley,
according to CBP’s data. The agency had aimed to fly the drones for 16 hours a day to patrol, but the report found they were
airborne only for 22 percent of that time.¶ Moreover, the report said, the program is far more expensive than CBP’s cost estimates suggest.
CBP estimates that each flight hour costs around $2,468, but the inspector general’s office said that figure was closer to $12,255, factoring in additional operating
costs of pilots, equipment, support staff and other overhead. (By comparison, the similar MQ-9 Reaper drone used by the Air Force costs an estimated $3,624 per
flight hour, while the manned F-16C fighter-bomber costs more than $20,000 per flight hour, according to Time magazine's calculations.) “The
$443 million
CBP plans to spend on program expansion could be put to better use by investing in alternatives,” the
report said, referring to the agency’s 2012 proposal to buy an additional 14 aircraft to survey the border.
¶ The inspector general’s office noted that CBP agreed with one of its recommendations to work with another Homeland Security office to evaluate the necessity
and cost-effectiveness of purchasing any additional drones. But CBP said it wouldn’t revise its cost calculation methodology to more accurately reflect the total cost
of operating drones on the border, saying its current methods met all federal requirements. ¶ This isn’t the first internal report to challenge the cost-effectiveness of
the border drone program. The
inspector general’s office issued another review in 2012 that pointed out
inadequacies in the agency’s resource planning for the unmanned aircraft mission. The Government
Accountability Office (GAO) also noted in a report last year that around 20 percent of drone flights from
2011 to April 2014 were conducted in the interior of the U.S., away from the border and coastal areas.
However, the GAO’s findings countered criticisms that the border drone program would raise privacy issues, saying that the Department of Homeland Security was
complying with privacy and civil liberty laws in its use of unmanned vehicles. ¶
Drones are inefficient mechanism to solve terrorism
Rothfuss 2014 (Ian F [George Mason School of Law]; Student Comment: An Economic Perspective on
the Privacy Implications of Domestic Drone Surveillance; 10 J.L. Econ. & Pol'y 441; kdf)
Conclusion
U.S. citizens want to be safe from terrorist attacks and other threats, but not at the expense of their
privacy rights. Therefore, a delicate balance must be achieved between privacy and security interests.
Drones represent a surveillance technology advancement that threatens to dramatically alter the
balance between these interests. As discussed in this comment, the current legal framework does not
adequately protect privacy from the widespread surveillance that will likely result from the unrestricted
domestic use of drones. Therefore, prompt legislative action is necessary to address the fundamental
privacy challenges presented by the use of drones. Such legislation should allow for constructive use of
drones within a framework that contains restrictions to protect individual privacy rights. While
widespread general surveillance could make the nation safer from crime and terrorism, such extensive
surveillance will ultimately be inefficient. The surveillance that could result from the domestic use of
drones would detract from individual privacy and cause individuals to reduce productive activities and
invest in countermeasures. Such "privacy disutility" will outweigh the societal benefits unless domestic
drone surveillance is restricted. Therefore, [*462] without legislative action we may soon live in a world
where "every time we walk out of our front door we have to look up and wonder whether some invisible
eye in the sky is monitoring us." n175
Circumvention
The judicial observer effect provides a counterweight that shifts executive decisionmaking towards more careful procedures as well as rights-sensitive policies
Deeks 13 – Assistant Professor of Law, University of Virginia Law School, Attorney-Adviser in the Office
of the Legal Adviser at the U.S. Department of State (Ashley S., “The Observer Effect: National Security
Litigation, Executive Policy Changes, and Judicial Deference,” 82 Fordham Law Review 2, SEP)
The observer effect provides an important counterweight to the executive’s instinct to prioritize
national security equities at the expense of individual rights because the executive knows that the
courts may be a future audience for its policies. A primary reason to be concerned about allowing the
executive to completely dominate national security decisionmaking is the fear that the executive will
conduct skewed risk assessments, overstate the threat that the country faces, and establish excessively
draconian policies as a result.151 As Cass Sunstein suggests, “[T]he President has a strong incentive to take precautions even if they
are excessive and even unconstitutional.”152 Ensuring some level of ambiguity about whether a court will step in to review a particular policy
helps counteract that bias. Christina Wells notes that the “lack of predictability regarding a court’s approach . . . should force the executive to
consider that the possibility of rigorous judicial review is very real.”153 In her view, advance
knowledge of the existence of
judicial review can force the executive to assume some “pre-decisional awareness of accountability.”154
That is, when the executive understands that it likely will be forced to explain its reasoning after the fact
for particular security policies it adopts, it will think more carefully ex ante about what those policies
should be and weigh a greater number of alternatives.155 While this element has procedural aspects to
it—forcing a more careful and considered process of adopting policy—it also has important substantive
effects. Assuming that courts as a rule will favor policies that are more rights protective than those favored by the executive, this
perception of future judicial oversight will shift the substantive policy in a more rightssensitive
direction.156
Observer effect spills over to other executive policies, particularly when the triggering
case directly implicates individual rights
Deeks ’13 (Ashley S., attorney-adviser in the Office of the Legal Adviser at the U.S. Department of
State, advised on the law of armed conflict, including detention, the U.S. relationship with the
International Committee of the Red Cross, intelligence issues, conventional weapons, and the legal
framework for the conflict with al-Qaeda, “The Observer Effect: National Security Litigation, Executive
Policy Changes, and Judicial Deference”, Fordham Law Review, Vol. 82, No. 2, cl)
More systemically, the observer effect reminds the executive of the courts’ presence, and so has a
subtle rights-protective influence on a number of executive policies in the wake of a triggering event.
The observer effect tends to work without regard to the subject matter of the specific case or cases on
which a court is focused. But that fact might leave categories of individual plaintiffs out in the cold in
case after case. Assume the courts are aware of and seek to foster the observer effect in the executive.
If the courts decide not to defer only in cases that do not implicate individual rights, and decide to defer
in national security cases that do implicate individual rights, the courts might preserve the observer
effect while failing to serve their function as individual rights protectors. We might conclude that the
observer effect will have some influence in shifting national security policies that do implicate individual
rights, but those changes might be more modest and less satisfying from a rightsprotective approach
than they would be if the cases on which the courts did not defer were individual rights cases. In short,
the observer effect produces a better “second-best” world when the cases in which the courts show less
deference are those that implicate individual rights.
Executives empirically follow court decisions on counterrorism policy
Bradley and Morrison 13 (Curtis, Professor of Law, Duke Law School, and Trevor, Professor of Law,
Columbia Law School , “Presidential Power, Historical Practice, and Legal Constraint” Duke Law
Scholarship Repository,
http://scholarship.law.duke.edu/cgi/viewcontent.cgi?article=5451&context=faculty_scholarship)
Insisting on a sharp distinction between the law governing presidential authority that is subject to
judicial review and the law that is not also takes for granted a phenomenon that merits attention—that
Presidents follow judicial decisions.118 That assumption is generally accurate in the United States
today. To take one relatively recent example, despite disagreeing with the Supreme Court’s
determination in Hamdan v. Rumsfeld that Common Article 3 of the Geneva Conventions applies to the
war on terror, the Bush Administration quickly accepted it.119 But the reason why Presidents abide by
court decisions has a connection to the broader issue of the constraining effect of law. An executive
obligation to comply with judicial decisions is itself part of the practice-based constitutional law of the
United States, so presidential compliance with this obligation may demonstrate that such law can in
fact constrain the President. This is true, as we explain further in Part III, even if the effect on
presidential behavior is motivated by concerns about external political Executive is particularly
responsive to the observer effect in national security because of limited court involvement
Deeks ’13 (Ashley S., attorney-adviser in the Office of the Legal Adviser at the U.S. Department of
State, advised on the law of armed conflict, including detention, the U.S. relationship with the
International Committee of the Red Cross, intelligence issues, conventional weapons, and the legal
framework for the conflict with al-Qaeda, “The Observer Effect: National Security Litigation, Executive
Policy Changes, and Judicial Deference”, Fordham Law Review, Vol. 82, No. 2, cl)
Where the executive is used to receiving deference from the courts in a particular area of law, the
executive grows accustomed to its freedom of operation. The executive perceives judicial “intrusions”
into this area as particularly unwelcome, and has strong incentives to preserve the status quo. Ironically,
this may cause the executive to act with particular flexibility in setting and amending policy, in response
to perceived looming court participation in this area of decisionmaking. If the executive alters its policy
in a manner that persuades courts to continue to defer to it (jurisdictionally or on the merits), the
executive is able to preserve that area of operations as relatively untouched by courts. Although
intuition might suggest that the executive would be disinclined to amend its policies in an area in which
courts traditionally have limited their involvement, the opposite is true: the executive is particularly
prone to the observer effect in this area. National security and wartime activities are areas in which
courts’ involvement historically has been limited.128 In earlier wars, the President determined when,
how, and where to surveil, target, detain, transfer, and interrogate enemy soldiers, often without public
knowledge, and almost entirely without unwanted legal interference from within the executive branch
itself or from the other branches of government. . . . [N]ever before has the Commander in Chief been
so influenced, and constrained, by law.129 Others concur that the courts’ approach to national security
cases after September 11 differed dramatically from their pre–September 11 approach.130 This history
of deference to the executive in national security cases means that there are more likely to be triggering
events that shock the system. It also means that the executive is particularly sensitive—because it is not
acclimated—to judicial review in this area.
The unbound executive theory is empirically false and doesn’t dispute the
documented observer effect
Deeks ’13 (Ashley S., attorney-adviser in the Office of the Legal Adviser at the U.S. Department of
State, advised on the law of armed conflict, including detention, the U.S. relationship with the
International Committee of the Red Cross, intelligence issues, conventional weapons, and the legal
framework for the conflict with al-Qaeda, “The Observer Effect: National Security Litigation, Executive
Policy Changes, and Judicial Deference”, Fordham Law Review, Vol. 82, No. 2, cl)
The theory that the executive responds to an observer effect contains a critical assumption worth
stating plainly: the executive views law— including case law—as binding and tends to comply with it. In
The Executive Unbound, Eric Posner and Adrian Vermeule express doubt about this proposition, arguing
that the executive is unfettered by legal constraints.21 Their critics highlight various ways in which that
statement is false as a descriptive matter, including by offering examples of situations in which the
executive has declined to pursue its preferred course of actionbecause it viewed that course as legally
unavailable.22 The observer effect offers additional support for the conclusion that the executive
branch is attuned to the power of law by showing how the executive internalizes anticipated judicial
responses to its policies when drawing policy lines.23
perceptions rather than an internal sense of fidelity to law (or judicial review).120
A norm need not be perfectly enforced to constrain the executive and may be bolstered by
informal enforcement
Bradley and Morrison 13 (Curtis, Professor of Law, Duke Law School, and Trevor, Professor of Law,
Columbia Law School , “Presidential Power, Historical Practice, and Legal Constraint” Duke Law
Scholarship Repository,
http://scholarship.law.duke.edu/cgi/viewcontent.cgi?article=5451&context=faculty_scholarship)
One of the grounds of skepticism about whether the presidency is constrained by law concerns the
frequent lack of formal enforcement mechanisms. There is an extensive jurisprudential literature on
whether and to what extent enforcement is necessary in order for norms to qualify as law.105 Modern
perspectives on law, in the tradition of H.L.A. Hart, tend to de-emphasize the importance of external
enforcement and focus instead on internal perceptions, a point we return to in Part III. For present
purposes, we simply note two things. First, a norm need not be perfectly enforced in order to
constrain. Of course, as the legal realists emphasized, one cannot get an accurate picture of the law by
looking only at the law on the books rather than the law in action.106 Our point here, however, is simply
that the lack of perfect enforcement of a legal rule does not mean the rule does not exist, or that it does
not constrain. The fact that homicides continue to be committed in the United States—and that not
everyone who commits such a crime is apprehended and prosecuted—does not remove or render
meaningless the legal prohibition against homicide. Second, enforcement need not be formal.
Domestic criminal laws, of course, are typically implemented through a range of formal enforcement
mechanisms, such as state-sanctioned incarceration. Even such formal modes of enforcement,
however, are probably enhanced by informal mechanisms such as public shaming and exclusion. For
example, the formal punishment-based deterrence against committing an offense like embezzlement is
likely enhanced by a desire to avoid public embarrassment and a worry about the difficulty of obtaining
future employment.107 Even when the likely enforcement mechanisms are entirely informal, we think
they should count for purposes of evaluating whether law operates as a constraint. For some issues of
presidential power, there are very few potential modes of formal enforcement (impeachment may be
the only formal mode), and the likelihood that they would be employed to sanction any particular
presidential act is generally very low. But there may still be enforcement through informal mechanisms
such as congressional backlash and public disapproval. If those enforcement measures are triggered or
intensified at least in part by the legal status of a norm, then we believe one can meaningfully
describe them as a type of legal enforcement. On this point it is worth noting that, outside of the area
of constitutional law, it is generally accepted that law can act as a constraint even when it takes the
form of customary norms, and even when it is subject primarily to informal enforcement. There is a
rich literature, for example, on the customary “law merchant” in medieval Europe, the enforcement of
which was based heavily on reputation.108 Gillian Hadfield and Barry Weingast have recently
supplemented that literature with modeling that shows how legal norms in general can be effective
even in the absence of centralized enforcement.109 As applied to presidential power, this analysis
suggests, once again, that the interrelationship of law and politics does not by itself negate the
importance of law.
Executive internalizes legal norms—branch is filled with lawyers
Bradley and Morrison 13 (Curtis, Professor of Law, Duke Law School, and Trevor, Professor of Law,
Columbia Law School , “Presidential Power, Historical Practice, And
Legal Constraint” Duke Law Scholarship Repository)
http://scholarship.law.duke.edu/cgi/viewcontent.cgi?article=5451&context=faculty_scholarship
Perhaps the most obvious way that law can have a constraining effect is if the relevant actors have
internalized the legal norms, whether those norms are embodied in authoritative text, judicial
decisions, or institutional practice. As a general matter, the internalization of legal norms is a
phenomenon that can potentially take place wherever the law is thought to operate, in both the private
and public sectors. But precisely how that internalization operates, including how it affects actual
conduct, depends heavily on institutional context. When speaking of legal norm internalization as it
relates to the presidency, it is important first to note that Presidents act through a wide array of
agencies and departments, and that presidential decisions are informed—and often made, for all
practical purposes—by officials other than the President. In most instances involving presidential
power, therefore, the relevant question is whether there has been an internalization of legal norms by
the executive branch. The executive branch contains thousands of lawyers.124 The President and
other executive officials are regularly advised by these lawyers, and sometimes they themselves are
lawyers. Although lawyers serve in a wide variety of roles throughout the executive branch, their
experience of attending law school means that they have all had a common socialization—a
socialization that typically entails taking law seriously on its own terms.125 Moreover, the law schools
attended by virtually all U.S. government lawyers are American law schools, which means that the
lawyers are socialized in an ethos associated with the American polity and the American style of law
and government.126 These lawyers are also part of a professional community (including the state bars
to which they are admitted) with at least a loosely shared set of norms of argumentative plausibility.
Deference Good
Observer effect allows the executive to retain control over national security
judgments while making policy corrections
Deeks ’13 (Ashley S., attorney-adviser in the Office of the Legal Adviser at the U.S. Department of
State, advised on the law of armed conflict, including detention, the U.S. relationship with the
International Committee of the Red Cross, intelligence issues, conventional weapons, and the legal
framework for the conflict with al-Qaeda, “The Observer Effect: National Security Litigation, Executive
Policy Changes, and Judicial Deference”, Fordham Law Review, Vol. 82, No. 2, cl)
Hamilton famously remarked that housing powers in a unitary executive provides the advantages of
“[d]ecision, activity, secrecy, and dispatch.”275 Executive unilateralists have pointed to the particular
salience of these characteristics when the United States is faced with an imminent or actual threat to its
own national security.276 Assuming that the executive (by virtue of its expertise, access to classified
information, and ability to act expeditiously in response to real-world events) tends to be better suited
than courts to make difficult legal policy judgments, the observer effect allows the executive to retain
control over the bulk of those judgments. It often results in executive control over policy corrections as
well, even as the possibility of court review prompts the executive to make those corrections. The
effect, when functioning well, helps the executive avoid most direct court intercessions by focusing the
executive’s attention more keenly on those equities the courts would evaluate if forced to review those
policies. If one believes, as many do, that the executive branch holds particular advantages in
responding to questions that implicate national security and the conduct of military or intelligence
operations, this is a positive result. Those who adopt strong executive unilateralist positions will not be
fully satisfied by the observer effect phenomenon because, in order for the effect to operate, the
judiciary must retain some role in evaluating the legality of the executive’s national security policies.
Courts may do so on the merits, or they may choose to do so more indirectly, through dialogue and
signaling. Either way, courts retain a hand in developing national security policies by serving as a specter
in the executive conference rooms in which policies are made. At the same time, the fact that the
observer effect moderates executive policies means that the courts often are able to avoid wading into
areas that fall outside their core spheres of competence. The executive branch continues to shape the
details—the procedures, scope, and substance—of national security policy, but the observer effect
ensures that the executive does not govern “nearly alone.”2
Observer effect provides a balanced approach that promotes both security and rights
Deeks ’13 (Ashley S., attorney-adviser in the Office of the Legal Adviser at the U.S. Department of
State, advised on the law of armed conflict, including detention, the U.S. relationship with the
International Committee of the Red Cross, intelligence issues, conventional weapons, and the legal
framework for the conflict with al-Qaeda, “The Observer Effect: National Security Litigation, Executive
Policy Changes, and Judicial Deference”, Fordham Law Review, Vol. 82, No. 2, cl)
Both of these debates—about how extensively courts do defer to the executive on national security
issues and about how much they should defer—fail to take into account an important dynamic that
should inform our views about national security deference: the observer effect. Understanding the way
the observer effect operates should lower the temperature of the debate. The observer effect ultimately
advances all three core separation-of-powers values just discussed: protecting individual liberty (and
sustaining a more systemic balance of power), preserving democratic accountability, and promoting
efficiency and effectiveness. This is not to argue that the observer effect allows accountability and
effectiveness goals to manifest themselves as vigorously as complete judicial deference would. Nor is it
to argue that reliance on the observer effect advances the protection of individual rights as robustly as a
total absence of judicial deference would. It is to suggest, however, that the observer effect potentially
promotes all three values at once in a way that the alternatives do not. As a result, the current
normative deference debate—which either favors the executive’s functional advantages by allowing the
executive broad discretion to navigate national security issues, or urges judicial involvement to protect
individual rights and preserve structural balance—needlessly frames the discussion as an either/or
proposition. Instead, ample judicial deference to executive security policies—interspersed with
occasional nondeferential decisions—can promote both sets of values simultaneously.
Deference theory is wrong - relies on outdated Cold War thinking
Knowles 09 – Assistant Professor, NYU School of Law (Robert, "American Hegemony and the
Foreign Affairs Constitution," Arizona State Law Journal, Lexis)
American courts treat foreign affairs issues as unique and requiring very strong, sometimes absolute,
deference to the Executive. n1 These "special deference" doctrines are a swamp of under-justification
and inconsistent application. n2 But when courts and scholars do seek to justify special deference in foreign
affairs, they usually resort to received wisdom about superior executive branch competence - attributes such as
speed, flexibility, secrecy, and uniformity - contrasted with judicial incompetence. n3 In the [*90] years since
9/11, in particular, these pragmatic arguments have been the weapon of choice for defenders of special
deference. n4 The courts are, apparently, bringing a knife to a gunfight. n5 Why do foreign affairs demand
that the executive branch enjoy vast discretion? The courts' view of their own competence has been shaped
by America's role in the world. There is a deep, if usually unarticulated, connection between the assumed
need for special deference and a popular theory of international relations known as realism. Realism depicts
an anarchic international realm, populated only by nation-states, and dominated by roughly co-equal great
powers carefully balancing one another. n6 Executive competences are required to handle this dangerous
and unstable external environment. n7 This classic realist model of comparative institutional competence
seemed appropriate when America was one of several, or even two, great powers. But even then, importing
international relations ("IR") realism into constitutional foreign affairs doctrine was a recipe for chaos.
Realpolitik teaches that the state must do whatever is necessary to protect itself. n8 But how can courts
successfully balance this overriding principle against other constitutional values such as the protection of
liberty? Moreover, the post-Cold War world has provoked a crisis in realism. n9 The U nited S tates is a
global hegemon. It is unrivaled in its ability to deploy force throughout the globe, and it provides "public
goods" for the world - such as the protection of sea lanes - in exchange for broad acceptance of [*91]
U.S. leadership. n10 Although realism predicts counter-balancing, no great power or coalition has yet
emerged to challenge America's predominance. And despite a new round of predictions about American
decline, the U.S. is still projected to have by far the largest economy and the largest military for decades. n11
Political scientists have struggled to define this American-led system, but courts and scholars of
constitutional law have largely ignored it. n12 Instead, most debates about special deference have simply
accepted outmoded classic realist assumptions that became conventional wisdom in the 1930s and 40s.
This Article offers a new model for assessing appropriate judicial deference in foreign affairs that takes
account of American-led order. By maintaining consistent interpretation of U.S. and international law over
time and providing virtual representation for other nations and non-citizens, U.S. courts bestow legitimacy
on the acts of the political branches, provide public goods for the world, and increase America's soft power - all
of which assist in maintaining the stability and legitimacy of the American-led hegemonic order.
Courts DAs Generic
Observer effect allows the courts to take more modest approaches towards national
security policies – because the executive has voluntarily reduced its powers
Deeks ’13 (Ashley S., attorney-adviser in the Office of the Legal Adviser at the U.S. Department of
State, advised on the law of armed conflict, including detention, the U.S. relationship with the
International Committee of the Red Cross, intelligence issues, conventional weapons, and the legal
framework for the conflict with al-Qaeda, “The Observer Effect: National Security Litigation, Executive
Policy Changes, and Judicial Deference”, Fordham Law Review, Vol. 82, No. 2, cl)
Yet the implications of deferential and nondeferential judicial decisions in the national security context
are not completely intuitive. A nondeferential court decision achieves more separation of powers
“balance” than may be apparent at first glance. That is because, as Part I showed, the court’s
involvement casts a shadow longer than the individual court decision that struck down or modified an
executive policy. Conversely, the observer effect allows courts in many cases to take more modest
approaches to executive national security policies because the executive has reduced— under its own
steam—its claims of authority. The executive has, in other words, voluntarily surrendered some of its
accreted power, a fact that contributes to the structural balance among branches.
Observer effect enables courts to preserve SOP and avoid making controversial
decisions that might reduce legitimacy
Deeks ’13 (Ashley S., attorney-adviser in the Office of the Legal Adviser at the U.S. Department of
State, advised on the law of armed conflict, including detention, the U.S. relationship with the
International Committee of the Red Cross, intelligence issues, conventional weapons, and the legal
framework for the conflict with al-Qaeda, “The Observer Effect: National Security Litigation, Executive
Policy Changes, and Judicial Deference”, Fordham Law Review, Vol. 82, No. 2, cl)
Courts are sensitive to the reputational costs of deciding controversial cases—and cases involving
wartime or emergency policies are particularly likely to be controversial. Many scholars have highlighted
the institutional costs of deciding such cases.284 Judicial decisions on the merits force courts to bear
certain reputational costs. The operation of the observer effect means that courts need to decide fewer
such cases (or decide them in a more modest manner) than they may think in order to preserve
separationof-powers values. This approach allows courts largely (though not entirely) to avoid making
politically controversial decisions that might cast questions on their institutional competence, while
allowing the courts on limited occasions to stake out their more popular role as defender of rights.285
At the same time, there are ways in which courts can distance themselves from the policies in question,
thus ensuring that political accountability for the policy falls squarely on the executive.
1.
Legitimacy
Expanding 4th Amendment rights in the face of a major technological advance like
drones is well within Court precedent
Black 13- J.D. Candidate Washington and Lee Law School
(Tyler, Over Your Head, Under the Radar: An Examination of Changing Legislation, Aging Case Law, and
Possible Solutions to the Domestic Police Drone Puzzle, 2013, 19 Washington and Lee Law Review, Lexis
Nexis) JB
The Court acknowledged that
"[i]t would be foolish to contend that the degree of privacy secured to
citizens by the Fourth Amendment has been entirely unaffected by the advance of technology." n147 As an
example, the majority pointed to aerial observation cases. n148 The Court wondered openly "what limits there are upon this
power of technology to shrink the realm of guaranteed privacy." n149 This statement acknowledges two important concepts-
technological advances will continue to stress constitutional protections from undue searches, and the
Court has a role in defining appropriate boundaries for those advances. n150 As drones represent a
major advance in technology, [*1861] the Court would therefore be well within precedent to adjust the
rules accordingly.
Observer effect enables courts to preserve SOP and avoid making controversial
decisions that might reduce legitimacy
Deeks ’13 (Ashley S., attorney-adviser in the Office of the Legal Adviser at the U.S. Department of
State, advised on the law of armed conflict, including detention, the U.S. relationship with the
International Committee of the Red Cross, intelligence issues, conventional weapons, and the legal
framework for the conflict with al-Qaeda, “The Observer Effect: National Security Litigation, Executive
Policy Changes, and Judicial Deference”, Fordham Law Review, Vol. 82, No. 2, cl)
Courts are sensitive to the reputational costs of deciding controversial cases—and cases involving
wartime or emergency policies are particularly likely to be controversial. Many scholars have highlighted
the institutional costs of deciding such cases.284 Judicial decisions on the merits force courts to bear
certain reputational costs. The operation of the observer effect means that courts need to decide fewer
such cases (or decide them in a more modest manner) than they may think in order to preserve
separationof-powers values. This approach allows courts largely (though not entirely) to avoid making
politically controversial decisions that might cast questions on their institutional competence, while
allowing the courts on limited occasions to stake out their more popular role as defender of rights.285
At the same time, there are ways in which courts can distance themselves from the policies in question,
thus ensuring that political accountability for the policy falls squarely on the executive.
Economy
Their link is just industry hype – plan wont hurt the economy
Bernd 2013 (Candice [assistant editor/reporter with Truthout]; The Coming Domestic Drone Wars; Sep
19; www.truth-out.org/news/item/18951-the-coming-domestic-drone-wars#; kdf)
States Push to Regulate Domestic Drones as Industry Pushes Back The Texas law is just one of many pieces of legislation placing restrictions on
the use of domestic drones to be introduced in 43 states this year, passing in eight. Many
of these state-level bills seek to
require search warrants for surveillance drones used by local police departments, and at least six states have
required warrants. In 2013, Virginia put in place a two-year moratorium on the use of drones by law enforcement to develop more stringent
guidelines. Legislation restricting civilian drone use has passed in states such as Florida, Tennessee, Idaho, Montana and Oregon, but other
states such as North Dakota have tried to pass laws that would ban weapons from domestic drones and have failed. But the
industry is
pushing back against privacy restrictions and regulations on civilian drones, saying the restrictions will
hinder job creation. In Maine, Gov. Paul LePage backed up the claim by vetoing a bill that would have required police to obtain a
warrant before deploying a drone, citing concerns it would kill new aerospace jobs. "We don't support rewriting existing search
warrant requirements under the guise of privacy," Mario Mairena told the AP. Mairena is a government relations manager
for the Virginia-based Association for Unmanned Vehicle Systems International (AUVSI), an industry group. The group's website boasts
hundreds of corporate members, many of which are defense contractors. The group also has ties to the Unmanned Systems Caucus in
Congress. Whether or
not requiring a warrant in law enforcement drone operations would kill jobs remains
to be seen, but the integration of civilian drones into the NAS would create a considerable economic
impact, to be sure. An AUVSI report estimates that that the integration of unmanned systems in the U.S. will
generate more than $13.6 billion and create 74,000 jobs within the first three years. But strong
regulations of domestic drones in the states may prove especially important depending on what
guidelines the FAA puts in place to integrate the technology into the national airspace by 2015, as some
experts fear the susceptibility to co-option of unmanned systems by third-party operators could pose serious risks to domestic security.
Surveillance guts competitiveness
Stiennon 2013 (Richard; NSA Surveillance Threatens US Competitiveness; Jun 7;
www.forbes.com/sites/richardstiennon/2013/06/07/nsa-surveillance-threatens-us-competitiveness/;
kdf)
The vast foreign and domestic spying by the NSA revealed this week threatens the
global competitiveness of US tech
companies. We are told we live in a digital world and the future is bright for tech startups as costs of launching new products and services
plummet and global markets open up to the smallest vendor. Yet, there is a world wide perception that any data that is
stored or even routed through the United States is sucked into cavernous NSA data centers for analysis
and cataloging. That perception was solidified in 2006 when former AT&T technician Mark Klein blew the whistle on the fiber tap that ATT
had provided to the NSA in some of its data centers. Those perceptions have had real consequences for US tech firms seeking to offer global
services. Email
archiving services such as ProofPoint could not sell to even Canadian customers without
building local infrastructure. Even establishing separate data centers in Canada and Europe is not enough to assure customers that
their data would forever stay out of the grasp of US intelligence services. One of the fastest growing segments of the tech
industry is cloud services, with Salesforce.com one of the leading examples. Box.net, and other cloud storage solutions, are
burgeoning. Cloud infrastructure providers like Amazon, Microsoft, and Rackspace are investing billions to serve markets that should be global
but will be barred from most countries thanks to the complete abandonment of trust caused by NSA/FBI spying. Since 2006, every time I
present outside the US the same question has been asked: “Is the US reading our email?” Answers that allude to ‘protections from abuse’ and
‘oversight’ now seem specious. From this week forward a universal suspicion has transformed into acknowledged fact. Yes, US government
agencies are reading email, tracking phone calls, and monitoring all communications. Brian Honan Board Member of the UK & Ireland Chapter
of the Cloud Security Alliance provided this opinion: The
revelations about the PRISM program could have major
implications for US companies doing business within the European Union. Under the EU Data Protection directive it
is illegal for European companies to export the personal data of EU citizens to countries outside of the EU and the European Economic Area.
Exceptions to this are for certain countries that have similar privacy legislation in place to that of the EU or where the strong contracts
protecting the privacy of that data are in place. The US in not one of the approved countries but has put in place the EU Safe Harbor program
which US companies can sign up to and agree to apply EU privacy protections to private data. Many of the companies allegedly involved in
PRISM are part of the Safe Harbor program. The fact the US government is potentially accessing that data could place the European
organisations in breach of EU Data Protection regulations. The news will also heighten concerns many European organisations, especially EU
government ones, will have in selecting a US Cloud Provider for their services. Gabriel Yoran, Managing Director and Founder of German
security company Steganos added: “The European Union traditionally favors strong privacy regulations. However, this policy has been under
attack recently, being seen as a competitive disadvantage in the cloud services space. This could dramatically change now in the light of the
recent Verizon findings. Privacy software maker Steganos traditionally stresses it being headquartered in Berlin and therefore subject to the
even stricter German data protection law (one of the strictest in the world). According to a February survey, 64% of Steganos customers said it
was important or very important to them that Steganos is a Germany-based company.” Trust
is the very foundation of all
commerce. Once lost it is almost impossible to regain. This week’s revelations that the NSA has blanket data harvesting
arrangements with Verizon, ATT, Sprint-Nextel, Google, Microsoft, Apple, Skype, Yahoo, FaceBook and even credit card processors, will have
immediate repercussions. Non-US customers of any US business will immediately evaluate their exposure to these new risks and look for
alternatives. European, Canadian, and Australian tech companies will profit from this. Competitors in those regions will offer alternatives that
will also draw US customers away from the compromised US services. While
the FBI and NSA leverage the dramatic
intelligence opportunities of a digital world, their Orwellian actions are crushing opportunity for tech
giants and startups in the United States.
US risks stalling now, especially in high tech services—prevents sustainable growth
Muro, et al, February 15 [Mark Muro, a senior fellow and director of policy for the Metropolitan
Policy Program, manages the program's economic work and key policy projects. Jonathan Rothwell,
February 2015, “Advanced Industries Drive Broad-Based Growth and Prosperity New Brookings report
analyzes U.S. advanced industries sector”, http://www.brookings.edu/research/reports2/2015/02/03advanced-industries#/M10420]
The need for economic renewal in the U S remains urgent
new technologies ranging from
robotics and “3-D printing” to digitization
provoking genuine excitement
nited
frustrated. At the same time, astonishing
—
tates
. Years of disappointing job growth and stagnant incomes for the majority of workers have left the nation shaken and
advanced
the “
of everything”—
are
even as they make it hard to see where things are going. Hence this paper: At a critical moment, this report asserts the special importance to America’s future of what the paper calls America’s “advanced
industries” sector. Characterized by its deep involvement with technology research and development (R&D) and STEM (science, technology, engineering, and math) workers, the sector encompasses 50 industries ranging from manufacturing industries such as automaking and aerospace
high-tech services
Their dynamism is going to be a central component of any future revitalized U.S. economy.
these industries encompass the country’s best shot at supporting innovative
and sustainable
growth.
Advanced industries represent a sizable economic anchor for the U.S. economy and have
led the post-recession employment recovery.
the sector packs a massive economic punch.
to energy industries such as oil and gas extraction to
such as computer software and computer system design, including for health applications. These industries encompass the nation’s “tech” sector at its broadest and most
consequential.
As such,
, inclusive,
For that reason, this report provides a wide-angle overview of the advanced industry sector that reviews its role in American prosperity, assesses key trends, and maps its metropolitan and global competitive standing before outlining high-level strategies to
enhance that.The overview finds that: 1.
Modest in size,
As an employer and
source of economic activity the advanced industry sector plays a major role in the U.S. economy. As of 2013, the nation’s 50 a dvanced industries (see nearby box for selection criteria) employed 12.3 million U.S. workers. That amounts to about 9 percent of total U.S. employment. And yet,
U.S. advanced industries produce $2.7 trillion in value added annually 17 percent of all
GDP That is more than any other sector
the sector employs 80 percent
of the nation’s engineers; performs 90 percent of private-sector R&D; generates approximately 85
percent of all U.S. patents; and accounts for 60 percent of U.S. exports. Advanced industries also
support unusually extensive supply chains and other forms of ancillary economic activity.
even with this modest employment base,
gross domestic product (
).
—
U.S.
, including healthcare, finance, or real estate. At the same time,
On a per worker basis, advanced
industries purchase $236,000 in goods and services from other businesses annually, compared with $67,000 in purchasing by other industries. This spending sustains and creates more jobs. In fact, 2.2 jobs are created domestically for every new advanced industry job—0.8 locally and 1.4
outside of the region. This means that in addition to the 12.3 million workers employed by advanced industries, another 27.1 million U.S. workers owe their jobs to economic activity supported by advanced industries. Direc tly and indirectly, then, the sector supports almost 39 million
jobs—nearly one-fourth of all U.S. employment. In terms of the sector’s growth and change, the total number of jobs in the sector has remained mostly flat since 1980 but its output has soared. From 1980 to 2013 advanced industries expanded at a rate of 5.4 percent annually—30
percent faster than the economy as a whole. Since the Great Recession, moreover, both employment and output have risen dramatically. The sector has added nearly one million jobs since 2010, with employment and output growth rates 1.9 and 2.3 times higher, respectively, than in the
rest of the economy. Advanced services led this post-recession surge, and created 65 percent of the new jobs. Computer systems design alone generated 250,000 new jobs. Certain advanced manufacturing industries—especially those involved in transportation equipment—have also
added thousands of jobs after decades of losses. Advanced industries also provide extremely high-quality economic opportunities for workers. Workers in advanced industries are extraordinarily productive and generate some $210,000 in annual value added per worker compared with
$101,000, on average, outside advanced industries. Because of this, advanced industries compensate their workers handsomely a nd, in contrast to the rest of the economy, wages are rising sharply. In 2013, the average advanced industries w orker earned $90,000 in total compensation,
nearly twice as much as the average worker outside of the sector. Over time, absolute earnings in advanced industries grew by 63 percent from 1975 to 2013, after adjusting for inflation. This compares with 17 percent gains outside the sector. Even workers with lower levels of education
can earn salaries in advanced industries that far exceed their peers in other industries. In this regard, the sector is in fact accessible: More than half of the sector’s workers possess less than a bachelor’s degree. 2. The advanced industries sector is highly metropolitan and varies
considerably in its composition and depth across regions. Advanced industries are present in nearly every U.S. region, but the sector’s geography is uneven. Advanced industries tend to cluster in large metropolitan areas. Looking across the country, the 100 largest metro areas contain 70
percent of all U.S. advanced industries jobs. In terms of the sector’s local clustering, San Jose is the nation’s leading advanced industry hub with 30.0 percent of its workforce employed in the sector. Seattle follows with 16.0 percent of its local jobs in advanced industries. Wichita (15.5
percent); Detroit (14.8 percent), and San Francisco (14.0 percent) follow. Overall, advanced industries account for more than one in 10 jobs in nearly one-quarter of the country’s major metro areas. This clustering occurs in a variety of configurations. Some metropolitan areas—such as
Grand Rapids, MI; Portland, OR; and Wichita—focus heavily on advanced manufacturing pursuits such as automotive, semiconductor, or aerospace manufacturing, respectively, while metros like Bakersfield and Oklahoma City exhibit strong energy specializations. By contrast, services
such as computer systems design, software, and research and development predominate in metropolitan areas like Boston, San Francisco, and Washington. For their part, San Jose, Detroit, and Seattle exhibit depth and balance across multiple advanced industry categories. Overall, the
number of extremely dense concentrations of advanced industry actually has declined. In 1980, 59 of the country’s 100 largest metropolitan areas had at least 10 percent of their workforce in advanced industries. By 2013, only 23 major metro areas contained such sizable concentrations.
3.
The U S is losing ground to other countries on advanced industry competitiveness
nited
tates
advanced industries in the world, behind only energy-intensive Norway. However, this
declining concentration
. The United States has the most productive
competitiveness appears to be eroding. The nation’s
in advanced industries and its negative trade balance in the sector
employment and output as a share of the
measures now lags world leaders.
do not bode well Since 2000, the sector’s
total U.S.
.
economy has shrunk The nation’s standing on these
.
Equally worrisome is the balance of trade in the sector. Although advanced industries export $1.1 trillion worth of goods and services each year and account for roughly 60 percent of total U.S.
exports, the United States ran a $632 billion trade deficit in the sector in 2012, in line with similar yearly balances since 1999. To be sure, a handful of individual advanced industries such as royalties and other intellectual property and aerospace manufacturing enjoy trade surpluses that
exceeded $60 billion and $80 billion in 2012. However, numerous areas of historical strength such as communications equipment , computer equipment, motor vehicles, and pharmaceuticals now run sizeable deficits, as do high-value R&D services and computer and information services.
Notwithstanding the nation’s strong innovation enterprise the U S advantage on this front is slipping
For certain the advanced industry sector remains the key site of U.S. technology gains.
For example, the U.S. share of global R&D and patenting is falling
America’s research dominance looks less
impressive after adjusting for the size of its working age population
nited
tates’
.
However, the United States is losing ground
relative to other countries on measures of innovation performance and capacity.
much faster than its
share of global GDP and population, meaning that U.S. slippage cannot simply be attributed to demography or macroeconomic convergence. Likewise,
. Turning to the nation’s critical regional innovation ecosystems, surprisingly few U.S. metropolitan
areas rank among the world’s most innovative—as measured by patent cooperation treaty applications per capita. Among the nation’s most patent-intensive regions, just two—San Diego and the San Jose-San Francisco combined area—rank in the global top 20 and just two more (Boston
and Rochester) score in the top 50.
The US isn’t key to the global economy
Kenny 2015 (Charles; Why the Developing World Won't Catch the U.S. Economy's Cold; May 4;
www.bloomberg.com/news/articles/2015-05-04/why-the-developing-world-won-t-catch-the-u-seconomy-s-cold; kdf)
Last week the U.S. Commerce Department announced that first-quarter
GDP growth for 2015 was an anemic 0.2 percent. This
immediately sparked fears that a U.S. slowdown could lead to a global recession. But the cliché about
America sneezing and the rest of the world catching the cold doesn’t hold like it used to . The U.S. isn’t as
contagious as it was, and developing countries in particular are far more robust to economic shocks. That’s good
news for everyone. It means less volatility in Asia, Africa, and Latin America, which contributes to happier people, greater political
stability, and stronger long-term growth—all of which should help lift the U.S. out of its own doldrums. A team of IMF researchers
has looked at the long-term record of the world’s economies when it comes to growth and recession.
They measured how long economies expanded without interruption, as well as the depth and length of downturns. Over the past two decades,
low and middle-income economies have spent more time in expansions, while downturns and recoveries have become shallower and shorter.
This suggests countries have become more resilient to shocks. In the 1970s and '80s, the median developing economy took more than 10 years
after a downturn to recover to the GDP per capita it had prior to that slump. By the early 2000s, that recovery time had dropped to two years.
In the 1970s and '80s, countries of the developing world spent more than a third of their time in downturns, but by the 2000s they spent 80
percent of their time in expansions. The first decade of the 21st century was the first time that developing economies saw more expansion and
shorter downturns than did advanced economies: Median growth in the developing world was at its highest since 1950 and volatility at its
lowest. Developing countries still face a larger risk of deeper recession when terms of trade turn against them, capital flows dry up, or advanced
economies enter recessions themselves. But the scale of that risk has diminished. That’s because low and middle-income economies have
introduced policy reforms that increase resilience: flexible exchange rates, inflation targeting, and lower debt. Economies with inflationtargeting regimes see recovery periods less than a third as long as economies without targeting, for example. Larger reserves are associated
with longer expansions. And median reserves in developing countries more than doubled as a percentage of GDP between the 1990s and 2010.
Median external debt has dropped from 60 percent to 35 percent of GDP over that same period. Such policy changes account for two-thirds of
the increased recession-resilience of developing countries since the turn of the century, suggest the IMF researchers—leaving external factors,
such as positive terms of trade, accounting for just one-third. That’s good news for the developing world—not least because volatile growth is
particularly bad for poorer people, who are most at risk of falling into malnutrition or being forced to take children out of school, which has
long-term consequences for future earnings. That might help explain the relationship between growth volatility, slower reductions in poverty,
and rising inequality. Sudden negative income shocks can also be a factor in sparking violence: When rains fail, the risk of civil war in Africa
spikes, and when coffee prices in Colombia fall, municipalities cultivating more coffee see increased drug-related conflict. The African analysis
suggests that a five percentage-point drop in income growth is associated with a 10 percent increase in the risk of civil conflict in the following
year. Finally,
because volatility increases the uncertainty attached to investments, it can also be a drag on
overall long-term economic performance. Viktoria Hnatkovska and Norman Loayza of the World Bank estimated that moving
from a comparatively stable to a relatively volatile growth trajectory is associated with a drop in average annual growth of as much as 2 percent
of GDP. Lower volatility
in the developing world and its associated long-term growth performance is also
good news for the U.S. A strong global economy is still a positive force for growth in every country, including developed nations. And
with the developing world accounting for about one-third of trade and GDP at market rates, as well as three-fifths of U.S. exports, its role in
supporting American economic performance has never been greater. Those
hoping for a recovery in U.S. output should be
grateful for stronger economic immune systems in the rest of the world.
1AR – Link Turn Extension
Domestic surveillance causes massive offshoring—undermines the economy
Miller 2014 (Hugo; NSA Spying Sends Data Clients North of the Border; Jan 9;
www.bloomberg.com/news/articles/2014-01-09/nsa-spying-sends-data-clients-north-of-the-border;
kdf)
In the British Columbia town of Kamloops, arid as a desert with cool summer nights, Telus Corp. only has to turn on the air conditioning about
40 hours a year to keep its computer servers from overheating. The chilly
temperatures are part of Canadian companies’
sales pitch to businesses looking for places to store their growing troves of digital information as cheaply as
possible. They also boast of inexpensive hydroelectric power and low seismic activity. And now they’re touting what they say is
a new advantage: less snooping. Revelations that the U.S. National Security Agency has spied on data
networks run by American companies have given Canadian data-center operators an opportunity.
They’re telling customers from Europe and Asia that laws north of the border are more protective of privacy.
Sales of storage services in Canada are growing 20 percent a year at Telus and Rogers Communications Inc. U.S.-based technology
companies, meanwhile, complain that the NSA scandal has hurt their business. “There is a structural advantage in
Canada in that the data is here and the privacy protection is more stringent,” said Lloyd Switzer, who runs Telus’s network of data centers. The
company has 10 data centers in Quebec, Ontario, Alberta and British Columbia, where it opened a C$75 million, 215,000-square-foot (20,000square-meter) facility in Kamloops last year. That site has room for six more modules of expansion, which would increase the investment into
the hundreds of millions of dollars.
Federalism
Precedent of the plan only sets a constitutional floor for states and municipalities
Rushin 2011 (Stephen [PhD student at the University of California, Berkeley, Jurisprudence and Social
Policy Program; J.D., University of California, Berkeley]; THE JUDICIAL RESPONSE TO MASS POLICE
SURVEILLANCE; 2011 U. Ill. J.L. Tech. & Pol'y 281; kdf)
To begin with, skeptics allege that legislations can more carefully analyze a problem, investigate potential solutions, impanel experts, and make
far-reaching, nuanced policies. n362 Unlike the legislature, which may "command the resources of an extensive bureaucracy ... a judge is
generally limited to a secretary and one or two recent law school ... [graduate clerks]." n363 Kerr has thus argued that the courts simply do not
have the resources to engage in this kind of careful analysis necessary to develop a comprehensive and responsive policy on Fourth
Amendment technologies. n364 On its face, this type of analysis is persuasive, especially considering the fact that the courts lack the funding to
do sweeping investigations into the efficacy of an emerging technology. Nonetheless, this logic ignores a pivotal tactic used by courts in
previous iterations of successful policymaking - the adoption of standards already implemented by other institutions. n365 Malcolm Feeley and
Edward Rubin explained that when the courts attempted to create extensive judicial policy [*325] regulating American prisons, judges turned to
the American Correctional Association and the Federal Bureau of Prisons. n366 Indeed, "Federal judges turned to these standards because they
wanted to impose detailed, administrative-style rules of any sort but lacked the resources to design the rules themselves." n367 Unlike the
prison reform context described by Feeley and Rubin, where the courts created extensive and detailed policy,
the judicial response I
argue for in this Article does not require extensive investigation or uniform implementation. I merely
argue for a judicially mandated floor, which establishes the minimum amount of regulation required for
surveillance technologies. Additionally, there is domestic and international precedent, most notably in Maine, New
Hampshire, Virginia, and Germany, that the courts could use as a model to craft a broad solution. n368 Once the
courts lay out a broad policy objective, police departments and local legislatures would be incentivized
to develop their own, individual policies to implement this judicially mandated, regulatory floor. States
would be free to develop more complex, detailed, and even more stringent protections against data
collection. Some states have already done just that. n369 This pattern can be seen in other areas of criminal judicial policymaking, such as
Miranda requirements. The Court handed down broad general requirements - departments, in implementing the Miranda decision, often went
above and beyond the Court's minimal requirements. Next, critics of judicial regulation of emerging technologies have argued that judges are
not as technically sophisticated as the legislature. Judges often "rely on the crutch of questionable metaphors to aid their comprehension" of
complex technology cases, meaning that "it is easy for judges to misunderstand the context of their decisions and their likely effect when
technology is in flux." n370 But in the unique situation outlined in this Article, judges do not need to be experts in these technological fields to
understand the capabilities of technologies like ALPR and facial recognition software. The danger I discuss in this article is that police will keep a
digital dossier of every single person's movements. This type of monitoring would facilitate fishing expeditions, increase the likelihood of
corrupt behavior by law enforcement, and facilitate some types of racial profiling.
There is little reason to believe that, with
the assistance of knowledgeable advocates, judges could not sufficiently understand the potential
harms posted by digitally efficient investigative technologies to develop a coherent constitutional floor
of protection. And even though the legislature has a broader array of resources at its disposal, the
legislature is an unsatisfactory avenue to protect the unique counter-majoritarian issues at stake. Finally,
some scholars have contended that judicial regulations of [*326] emerging technologies rarely hold up in different factual scenarios. Under this
rationale, critics of this judicial response may contend that while this protection could work when applied to ALPR or facial recognition
software, it would not necessarily be a workable standard for future technological developments. This view certainly has merit. "By the time the
courts decide how a technology should be regulated ... the factual record of the case may be outdated, reflecting older technology rather than
more recent developments." n371 Stuart Benjamin has argued that "rapidly changing facts weaken the force of stare decisis by undermining
the stability of precedents." n372 This provides a forceful case against judicial micromanagement of emerging technologies. But the judicial
response argued for in this Article is sufficiently broad to avoid the predictable antiquation of other, narrower judicial solutions - it merely
distinguishes between observational comparison and indiscriminate data collection, while broadly regulating the identification of data and
interactions with private data aggregators. The collection of extensive, indiscriminate surveillance data is a widespread, pervasive occurrence
common amongst countless investigative technologies. The development of digital dossiers is not a trending fad that will simply disappear in
the near future. We should not expect the legislature to step in and address a problem that may disproportionately affect unpopular minorities.
The Court has long recognized that when making policy in the field of emerging technologies, "the rule
we adopt must take account of more sophisticated systems that are already in use or in development."
n373 The judicial response presented does not prevent the use of surveillance technologies for
observational comparison, but merely offers a sufficiently broad and generalized constitutional limit on
indiscriminate data collection, which can be reasonably exported and applied to future, more
sophisticated technologies. Once more, critics of judicial policymaking seem tacitly concerned that the limited applicability of judicial
rules in the future will weaken the force of stare decisis, thereby undermining the judiciary's legitimacy. But nothing could further de-legitimize
the judiciary more than a failure to serve its fundamental role as a protector against the tyranny of majoritarian preferences. The courts are
therefore the best-positioned actor within our decentralized federal system to protect against the threat of extensive, indiscriminate data
collection. Concerns about the judiciary's institutional competence seem misplaced. And though the courts have limited resources, there is not
enough convincing evidence of a "judicial information deficit" n374 so as to overcome the judiciary's important role as protectors of discrete
and insular minorities.C. Re-conceptualizing the Current Privacy Doctrine in Light of the Digitally Efficient Investigative State A
judicial
response is a step in the right direction in addressing the [*327] growing threat posed by mass police
surveillance. But the proposed judicial response should only be the beginning in a broader shift in our
privacy dialogue. The digitally efficient investigative state has wide-ranging social implications for the entire study of privacy law. I argue
that, given the mounting evidence of efficient retention of public surveillance data and data centralization, it is finally time to re-conceptualize
outdated privacy law assumptions - principal among them the antediluvian notion that an individual has no reasonable expectation to privacy in
public movements. To be clear, I am not arguing that, descriptively, people currently have an honest expectation to privacy in public in today's
world. In the age of GPS, smart phones, Facebook, and Twitter, our socially reasonable expectation to privacy is weaker than ever. Instead, it is
time for a normative reassessment of our entire privacy doctrine. Of course, I am not the first to propose such an argument. Professor Solove
has already observed: Privacy is not simply an empirical and historical question that measures the collective sense in any given society of what
is and has long been considered private. Without a normative component, a conception of privacy can only provide a status report on existing
privacy norms rather than guide us toward shaping privacy law and policy in the future. If we focus simply on people's current expectation of
privacy, our conception of privacy would continually shrink given the increasing surveillance in the modern world. n375 The
judiciary can
and should play a fundamental role in protecting a normatively forceful conception of privacy in all
regards. Do we reasonably expect a person to assume the risk that, every time they enter a public space, the state can monitor their every
movement with ALPR? Do we reasonably expect a person to assume the risk that the state will keep extensive, centralized data on their
movements indefinitely? Or perhaps the more important question is should we expect individuals to completely abandon all anonymity in
public? I believe the clear, normative answer to these questions is a resounding no, and the implications of the digitally efficient investigative
state only add weight to the claims previously made by Professor Solove and others. Ultimately, this Article only scratches the surface of the
broader social implications of the digitally efficient investigative state. Questions remain about the relative criminological benefits of
observational comparison as compared to wholesale data retention. There is an increasing need for empirical research on the effects these
emerging technologies have on individual behavior. And there is a dearth of concrete data on the extent to which law enforcement use these
technologies. I offer only a brief glimpse into this new technological order, the relevant case law, and some general normative
recommendations. This
should only be the beginning of the conversation about the sociological,
psychological, criminological, and legal impacts of the increasingly efficient police surveillance. [*328] VI.
Conclusion Neither judicial responses nor "legislative rulemaking is ...a panacea." n376 Even if the judiciary
successfully recognizes a remedy similar to that discussed in this Article, the legislatures must play a
critical role in developing more nuanced and specific enactments to implement this constitutional floor.
The potential harms of the digitally efficient investigative state are real. There is legitimate concern that the broad
and integrated use of these technologies can create a mass surveillance state. Central to this debate is the proper role of the
judiciary in regulating policy activity. Courts have previously relied upon an often fragile dichotomy between technologies that
merely improve police efficiency and those that offer officers a new, extrasensory ability. For the first time, the judiciary may be
forced to limit the efficiency of law enforcement technologies. Implicit in this action will be the recognition that
sometimes improvements in efficiency can be, quite simply, so efficient as to be unconstitutionally harmful. Unregulated efficiency
can facilitate police wrongdoing, discrimination, and calumniate political dissenters. Unregulated
efficiency in policing technology undermines central protections and tenants of a democratic state. The
relationship between efficiency of criminal investigations and privacy rights will be a new frontier for the courts in the coming decades. The
courts should forcefully, but prudently, protect against the unregulated efficiency of emerging
investigative and surveillance technologies. The judicial response offered in this Article would be but one more example of the
courts exercising their proper role as a limited but effective policymakers.
The plan sets a floor – states can go beyond it
Kaminski 2013 (Margot E [Executive Director of the Information Society Project, Research Scholar,
and Lecturer in Law at Yale Law School]; Drone Federalism: Civilian Drones and the Things They Carry; 4
Calif. L. Rev. Circuit 57; kdf)
DRONE PRIVACY REGULATIONS There are, broadly speaking, two subjects of drone privacy regulation: law enforcement drone use and civilian
drone use. n8 Most advocates and academics have focused on establishing privacy regulations to govern law enforcement drone use. n9 This
task is worthy of immediate attention. The FAA already permits law enforcement drone use, where it does not yet permit commercial private
drone use. n10 A number of state and federal bills thus propose warrant requirements for drone surveillance by law enforcement. n11 The
federal government could regulate law enforcement drone use as it has historically regulated other law
enforcement behavior, by providing a floor for state laws. n12 Federal legislation already governs law
enforcement use of wiretaps and pen registers. n13 Drone surveillance is likely to additionally involve
video surveillance, location tracking, and/or facial recognition, among other possible technologies. Thus
federal legislation governing law enforcement surveillance could be expanded to govern location tracking, video
surveillance, and the use of facial recognition software by law enforcement. n14 [*60] Regulating law enforcement drone use poses few
countervailing dangers from legislating thoughtlessly or in haste; such legislation would implicate Fourth Amendment rights rather than First
Amendment rights, so the worst case scenario is that such legislation might eventually be found by courts not to protect enough privacy. n15
Potential Privacy Grounds
Informational Privacy
Drones are a violation of informational privacy
Olivito 13— attorney practicing commercial litigation and employment law. He previously worked at
The Ohio State University Office of Legal Affairs
(Jonathan, “Beyond the Fourth Amendment: Limiting Drone Surveillance Through the Constitutional
Right to Informational Privacy” December 8,
http://moritzlaw.osu.edu/students/groups/oslj/files/2013/12/8-Olivito.pdf) JB
To remedy these privacy concerns, courts should adjudicate cases involving drone surveillance under the
constitutional right to informational privacy. As already recognized by most courts applying the right, the constitutional right to
privacy creates a right of action against the government.177 This right of action stands independent of the Fourth
Amendment, augmenting the Fourth Amendment’s protections rather than replacing them.178 When
courts confront the claim that drone surveillance has invaded an individual’s constitutional right to
privacy, courts should apply the following test. First, courts should require a claimant to establish a threshold requirement:
that a government action has implicated a privacy interest. Once this threshold criterion is met, the court should engage
in a balancing test that weighs the individual’s privacy interests against the government’s interests in
conducting the challenged drone surveillance. Courts should consider five factors when applying the
balancing test: (a) the duration of the surveillance; (b) the invasiveness of the technologies used; (c) the
thoroughness of the surveillance; (d) the individualized nature of the surveillance; (e) and the presence
of a warrant or probable cause. If the individual’s privacy interests outweigh the government’s interests, then the court would, as a
remedy, prohibit the government from storing, aggregating, transferring, or distributing any information gathered in the challenged
surveillance. The
court’s remedy would apply both to any information that the government had already
gathered and to information that the government might observe through the challenged drone
surveillance in the future.179 The subsequent discussion elucidates the elements of this balancing test.
Aggregate Theory
Supreme Court precedent supports an aggregate theory of privacy
Citron and Gray 13 (Danielle Keats [Professor of Law, University of Maryland] and David [Professor of
Law, University of Maryland]; Addressing the Harm of Total Surveillance: A Reply to Professor Neil
Richards; June 21; http://harvardlawreview.org/2013/06/addressing-the-harm-of-total-surveillance-areply-to-professor-neil-richards/)//AJ
The threat posed by contemporary surveillance technologies lies in how much and how often people are
watched. Modern technologies allow observers to detect, gather, and aggregate mass quantities of data
about mundane daily acts and habits as well as “intellectual” ones.66 The continuous and indiscriminate
surveillance they accomplish is damaging because it violates reasonable expectations of quantitative
privacy, by which we mean privacy interests in large aggregations of information that are independent
from particular interests in constituent parts of that whole.68 To be sure, the harms that Richards links
to intellectual privacy are very much at stake in recognizing a right to quantitative privacy. But rather
than being a function of the kind of information gathered, we think that the true threats to projects of
self-development and democratic culture lie in the capacity of new and developing technologies to
facilitate a surveillance state.
In adopting this view, we ally ourselves in part with commitments to a quantitative account of Fourth
Amendment privacy promoted by at least five Justices of the Supreme Court last Term in United States
v. Jones.69 In Jones, police officers investigating drug trafficking in and around the District of Columbia
attached a GPS-enabled tracking device on defendant Jones’s car. By monitoring his movements over
the course of a month, investigators were able to document both the patterns and the particulars of his
travel, which played a critical role in his ultimate conviction. Although the Court resolved Jones on the
narrow grounds of physical trespass, five justices wrote or joined concurring opinions showing sympathy
for the proposition that citizens hold reasonable expectations of privacy in large quantities of data, even
if they lack reasonable expectations of privacy in the constitutive parts of that whole.70 Thus, they
would have held that Jones had a reasonable expectation in the aggregate of data documenting his
public movements over the course of four weeks, even though he did not have any expectation of
privacy in his public movements on any particular afternoon.71
The account of quantitative privacy advanced by the Jones concurrences has much in common with the
views promoted by Warren and Brandeis. Specifically, the concurring Justices in Jones expressed worry
that by “making available at a relatively low cost such a substantial quantum of intimate information
about any person whom the Government, in its unfettered discretion, chooses to track,” programs of
broad and indiscriminate surveillance will “chill[] associational and expressive freedoms,” and “alter the
relationship between citizen and government in a way that is inimical to a democratic society.”72 Their
concerns are well-grounded in original understandings of the Fourth Amendment.73 As Professor
William Stuntz has shown, the Fourth Amendment was drafted partly in reaction to eighteenth-century
cases involving the British government’s use of general warrants to seize personal diaries and letters in
support of seditious-libel prosecutions that were designed to suppress political thought.74 Despite
these roots, quantitative privacy is just beginning to receive recognition because it is only now under
threat of extinction by technologies like Virtual Alabama and fusion centers.
Katz/Subjective Expectation of Privacy
Courts should rule drones violate a person’s subjective expectation of privacy
Koerner 15 (Matthew [J.D. Duke University School of Law]; Drones and the Fourth Amendment:
Redefining Expectations of Privacy; March, 2015; http://www.lexisnexis.com.p
roxy.lib.umich.edu/lnacui2api/results/docview/docview.do?docLinkInd=true&risb=21_T222512
84585&format=GNBFI&sort=RELEVANCE&startDocNo=1&resultsUrlKey=29_T2225
1284591&cisb=22_T22251284590&treeMax=true&treeWidth=0&csi=7336&docNo=5)//AJ
[*1133] Drones, with their current and projected capabilities, present a perfect storm of issues that fall
outside of current Fourth Amendment jurisprudence but still appear to implicate the Fourth
Amendment. n20 Drones can maneuver through each and every loophole of the jurisprudence for
warrantless searches. n21 They travel on public airways at low or high altitudes, undetected and with
little or no undue noise, nuisance, or threat to persons or property. n22 They can utilize senseenhancing technologies that are, or will soon be, in general public use. n23 And drones can use these
technologies to gather an abundance of intimate details and information, previously impossible or
impracticable to acquire. n24 Law enforcement is likely to increasingly use drones for domestic
surveillance, n25 and this will likely propel drones to the forefront of courts' dockets. n26
Scholars have written exhaustively on many aspects of the Fourth Amendment, and its intersection with
drones has recently [*1134] received significant attention. n27 Much of the literature on drones and
the Fourth Amendment recognizes that it is unclear where - and whether - drones fall within current
jurisprudence, and recommends a variety of legislative solutions. n28 But although scholars identify the
legal uncertainties with drones, those recommending legislative action endorse a partial solution that
only perpetuates the problem that the courts have maintained with respect to technology and the
Fourth Amendment. Specifically, just as current Fourth Amendment jurisprudence has failed to keep
pace with advancing technology, a legislative approach will also trail behind. n29 This Note addresses
these [*1135] issues and recommends an adaptive approach to Fourth Amendment jurisprudence in
the age of the drone.
For these reasons, it is highly probable that courts will soon confront issues regarding the use of drones
for domestic surveillance. n30 This Note argues that when these issues arise, courts should apply the
reasonable-expectation-of-privacy test expounded in Katz v. United States, n31 and, in doing so, expand
on the subjective-expectation-of-privacy requirement. This oft-neglected element of the two-pronged
test provides critical analysis that is especially relevant to cases involving drones. In further analyzing
and clarifying the subjective-expectation requirement, courts should proceed in three steps. First, they
should determine whether the surveilled person "exhibited an actual (subjective) expectation of
privacy" - the [*1136] threshold issue in order for the Fourth Amendment to apply. n32 Second, if the
person held a subjective expectation of privacy, courts should evaluate the scope of that privacy
expectation. And third, they should determine whether the person "exposed [information] to the "plain
view' of outsiders" and whether the evidence at issue fell within the scope of that exposure. n33
Download