1ac Plan Plan: The United States federal government should curtail domestic surveillance of electronic information stored by American citizens and service providers extraterritorially by requiring search warrants under the Electronic Communications Privacy Act that comply with the laws of foreign countries. Solvency—1AC CONTENTION 1: ALL YOUR DATA ARE BELONG TO US Existing warrant process governing info stored abroad is ill-equipped for the digital age – allows for expansive application of the ECPA and forces U.S. companies to violate foreign law Solove 15 (Daniel J, John Marshall Harlan Research Professor of Law at the George Washington University Law School, “Surveillance Law in Dire Need of Reform: The Promise of the LEADS Act,” March 24, https://www.teachprivacy.com/surveillance-law-in-dire-need-of-reform-the-promise-of-the-leadsact/, CMR) Microsoft v. United States Microsoft v. United States exemplifies some of the shortcomings of existing law to fit modern technology. Officially named (in clunky fashion) In the Matter of a Warrant to Search a Certain E-Mail Account Controlled and Maintained by Microsoft Corporation, the case shows how ECPA has fallen out of date and wasn’t really created with contemporary cloud computing in mind. A New York magistrate judge issued a warrant requested by the Department of Justice (DOJ) on Microsoft to turn over data stored in Ireland. The warrant was issued under ECPA’s Stored Communications Act (SCA). Microsoft sought to quash the warrant. Microsoft argued that the government should not be able to demand from Microsoft data stored in a foreign country without going through the Mutual Legal Assistance Treaty (MLAT) between that country and the United States. The government cannot use a warrant under the Fourth Amendment to gather data oversees. The warrant would be meaningless in other countries because each country has its own laws for when government officials can obtain data and engage in surveillance. In order to do so, U.S. government officials would need to follow the MLAT process. This process involves U.S. officials going through a judge in the foreign country to obtain the information. But the MLAT process is also in need of reform, and so the government has found an end-run around it by serving Microsoft with the warrant under ECPA to fetch the information in Ireland and bring it to the government officials in the U.S. ECPA isn’t clear about how to address the issue of data stored beyond U.S. borders. Were ECPA being written today, it would surely cover this issue, as cloud computing often involves data stored in foreign countries. But ECPA was created in 1986, nearly 30 years ago. The result is that cloud service providers are put in a very difficult position, as they are in the middle, forced to violate foreign law in order to comply with U.S. law. Being put in this position puts U.S. companies at a competitive disadvantage over other companies. Imagine that John Doe is a citizen of Utopia, a country that has strong civil liberty and privacy protections, that actually keeps its laws up to date, that doesn’t let its spy agencies run amok, and that doesn’t interpret its Constitutional protections into near oblivion. John Doe is deciding between whether to use YSoft cloud service or the cloud service of Zsoft, a company in Utopia. Doe could store his data with YSoft in Utopia, but now the U.S. government could use the weaker U.S. laws to gather Doe’s data from YSoft in the U.S. Doe doesn’t want to be subject to the U.S. law – he wants the protections his own country provides to him. So he chooses ZSoft instead. YSoft is thus put at a competitive disadvantage. That’s why so many U.S. technology companies are supporting Microsoft in this case. If the U.S. government ignores foreign law when obtaining data abroad, then other countries might reciprocate by ignoring U.S. law. What if countries with weaker laws than the United States demanded information on U.S. citizens stored abroad? These countries might start ignoring U.S. protections and grab the data according to their own permissive rules. The plan strengthens warrant requirements and prevents further breaches in foreign law – protects MLATs Solove 15 (Daniel J, John Marshall Harlan Research Professor of Law at the George Washington University Law School, “Surveillance Law in Dire Need of Reform: The Promise of the LEADS Act,” March 24, https://www.teachprivacy.com/surveillance-law-in-dire-need-of-reform-the-promise-of-the-leadsact/, CMR) The LEADS Act A key proposed reform of ECPA is the Law Enforcement Access to Data Stored Abroad (LEADS) Act of 2015, a bipartisan bill sponsored by Senators Hatch, Coons and Heller. The bill was introduced last term and died, but it has been reintroduced again this year. The LEADS Act would require the government to obtain a warrant under ECPA to obtain electronic information stored by a “U.S. person.” The LEADS Act attempts to clarify at least two deficiencies in ECPA: 1. The LEADS Act’s warrant requirement for all communications overrides a provision in ECPA’s Stored Communications Act that allows the government to obtain a stored email more than 180 days old with a court order less protective than a warrant, a provision that has been found to be unconstitutional under the Fourth Amendment (see United States v. Warshak, 631 F.3d 266 (6th Cir. 2010)). The LEADS Act’s warrant requirement would get rid of the 180-day distinction. 2. The LEADS Act also directly addresses the problems raised in Microsoft v. United States. Under the LEADS Act, warrants would be required whether the information is held in the U.S. or overseas, but they would not be allowed to override conflicting foreign law. The LEADS Act also attempts to improve upon the MLAT process to ease its burden. For U.S. persons, if the information is maintained in a foreign country, the service provider could request that the court modify the warrant if compliance would make the provider violate the law in the country where the data is stored. For non-U.S. persons, warrants would not apply. The MLAT process would need to be followed. So if the government wanted to obtain information stored in Ireland by Microsoft by Jane America, a U.S. citizen, it could obtain the information through a warrant issued to Microsoft, but only if compliance didn’t force Microsoft to violate the laws of Ireland. But if it wanted to obtain information stored oversees by Microsoft by Jane Ire, an Irish citizen, it would need to follow the MLAT process. The LEADS Act is a great step towards reforming ECPA. The U.S. government should not put itself above the laws of other countries. Nor should the U.S. government force cloud service providers and other companies to violate those laws so that government officials can take a shortcut around the MLAT process. There are issues in reforming ECPA that are quite controversial, but the LEADS Act has bipartisan support and the support of industry and a wide array of diverse special interest groups. The LEADS Act is a strong step in the right direction. Competitiveness—1AC CONTENTION TWO: COMPETITIVENESS Current risk of arbitrary government seizure of U.S. companies electronic communications will destroy confidence in the tech industry – safeguards from the plan are key to restore trust McKenna 15 (Rob, Former Washington State Attorney General, to Serve as NAJI President, “NAJI supports bipartisan, bicameral LEADS Act and digital privacy,” Feb 27, http://naji.org/naji-supportsbipartisan-bicameral-leads-act-and-digital-privacy/, CMR) Dear Representatives Marino and DelBene, Thank you for your leadership on the Law Enforcement Access to Data Stored Abroad Act (LEADS Act) and for promoting a thoughtful public dialogue on the complex and important issues surrounding data privacy in the digital age. Legal protections for our electronic communications must be updated to reflect the realities of data storage today and to maintain our global competitive position. The National Alliance for Jobs and Innovation (NAJI) supports this important legislation which will ensure that the privacy of our members’ electronic communications is protected and respected, while also improving our trade position in the world. I am NAJI’s President and also the former Attorney General of Washington State and past President of the National Association of Attorneys General. NAJI represents over 400 small- and medium-size manufacturing enterprises and 35 manufacturer and business associations around the United States. For our members, the confidentiality of business data and electronic communications, and their protection from arbitrary government seizure, are of the utmost importance. Like other businesses, and perhaps even more than most, U.S. manufacturers have benefited tremendously from the strong growth and continuing innovation of the U.S. information technology (IT) industry. But in order for U.S. companies to achieve their full potential and for our nation to maintain its position at the pinnacle of innovation and competitiveness, our data, business records, and other electronic information must be protected from arbitrary government intrusion. The LEADS Act will strengthen privacy in the digital age and promote trust in U.S. IT technologies worldwide, while enabling law enforcement to fulfill its public safety mission. The LEADS Act will not only require law enforcement to obtain search warrants before accessing private data stored by cloud computing services, but will also strengthen international law enforcement cooperation through the Mutual Legal Assistance Treaty (MLAT) process. NAJI believes these provisions are essential and strongly supports their adoption. Again, we appreciate your willingness to address these vital issues and look forward to engaging with you and all Members of Congress in this important dialogue. Sincerely, RobMcKenna The alternative is cascading shocks throughout the tech sector, collapsing US competitiveness Pociask 14 (Steve Pociask, president of the American Consumer Institute Center for Citizen Research, a nonprofit educational and research organization, “Spy in the Clouds: How DOJ Actions Could Harm U.S. Competitiveness Abroad,” 9/8, The American Consumer Institute Center for Citizen Research, September 8, 2014, http://www.theamericanconsumer.org/wp-content/uploads/2014/09/BalkanizedInternet.pdf, CMR) The Cost of Economic Sanction s The U.S. has 10% of the world’s online users, but only 4.5% of the population. 7 Yet, the U.S. has nearly one - third of research and development investment in science and technology. 8 However, its worldwide presence in technology could be threatened by a backlash of anti-American sentiment, now fueled by the Microsoft lawsuit and the resulting concerns of privacy and espionage. While the Information Technology and Innovation Foundation predicted a $35 billion loss in cloud computing from an international backlash from privacy concerns , Forrester Research estimated the larger high - tech sector could suffer financial losses as high as $180 billion or about a quarter of industry revenues. 9 Using the Bureau of Economic Analysis industry multipliers, that loss would be equivalent to losing more than 2 million U.S. jobs. That would increase the unemployment rate by from 6.1% to 7.6%. These losses would be devastating for American high - tech businesses and could spill into non - tech commerce as well. Indeed, losses to U.S. corporations are already starting to surface. Following the NSA spying revelation, there were reports that IBM, Microsoft, Cisco and other American Companies may have lost customers and were not invited to bid on multi - year international contracts. The latest threat by t he DOJ to access records on foreign consumers and businesses , particularly if successful in the courts, will certainly fuel further sanctions. The shunning of U.S. high - tech products and services by consumers, businesses and governments will be a major setback for U.S. companies working abroad. Because the U.S. is a world leader in technological services and products, the effects of complying with the DOJ request would significantly stunt U.S. sales abroad and encourage foreign countries to buy products and services from their domestic sources, including developing a balkanized Internet that keeps its citizens, businesses and government away from buying U.S. products, cloud services, software and applications. This would affect U.S. competitive abroad for decades to come U.S. Government Needs to Fix This Mess The DOJ’s quest for personal information on a n Irish citizen living abroad could open up a cascade of problems overseas -- conflicts with laws in other countries, customer losses, contract sanctions by foreign business and governments, retaliation , and balkanization of the Internet. A balkanized Internet will not support the rapid growth of high-tech trade and free exchange of ideas that we have enjoyed over the past 20 years. I t will lead to a substantial financial impact on U.S. high - tech firms and lost jobs for workers . It would also produce long - term harm to U.S. competitiveness in the high - tech sector. The quick and easy solution is for the full and immediate attention of Congress in its consideration of legislation just introduced by Senators Hatch, Coons and Heller – The Law Enforcement Access to Data Stored Abroad Act . 10 This proposed legislation would address the issue by limiting the reach of warrant s to U.S. citizens and companies, as well as keeping conformity with foreign treaties and laws. Congress needs to act before the negative economic consequences of the DOJ’s actions cause irreparable harm to U.S. interests abroad. The legislative solution makes the U.S. keep its promises and respect its legal treaties with other countries, and that work s to dispel any fears of spying or collection of personal information that our allies might have . We need to take steps now to protect U.S. business interests abroad . To do otherwise could lead to devastating financial consequences on U.S. high-tech firms. Competitiveness key to heg and preventing great power war Colby 14 (Elbridge the Robert M. Gates fellow at the Center for a New American Security; and Paul Lettow, was senior director for strategic planning on the U.S. National Security Council staff from 2007 to 2009, 7/3/14, “Have We Hit Peak America?,” http://www.foreignpolicy.com/articles/2014/07/03/have_we_hit_peak_america) Many foreign-policy experts seem to believe that retaining American primacy is largely a matter of will -- of how America chooses to exert its power abroad. Even President Obama, more often accused of being a prophet of decline than a booster of America's future, recently asserted that the United States "has rarely been stronger relative to the rest of the world." The question, he continued, is "not whether America will lead, but how we will lead." But will is unavailing without strength. If the United States wants the international system to continue to reflect its interests and values -- a system, for example, in which the global commons are protected, trade is broad-based and extensive, and armed conflicts among great nations are curtailed -- it needs to sustain not just resolve, but relative power. That, in turn, will require acknowledging the uncomfortable truth that global power and wealth are shifting at an unprecedented pace, with profound implications. Moreover, many of the challenges America faces are exacerbated by vulnerabilities that are largely self-created, chief among them fiscal policy. Much more quickly and comprehensively than is understood, those vulnerabilities are reducing America's freedom of action and its ability to influence others. Preserving America's international position will require it to restore its economic vitality and make policy choices now that pay dividends for decades to come. America has to prioritize and to act. Fortunately, the United States still enjoys greater freedom to determine its future than any other major power, in part because many of its problems are within its ability to address. But this process of renewal must begin with analyzing America's competitive position and understanding the gravity of the situation Americans face. Declining power-differential ensures U.S. lash-out Goldstein 7 - Professor of Global Politics and International Relations @ University of Pennsylvania, Avery Goldstein, “Power transitions, institutions, and China's rise in East Asia: Theoretical expectations and evidence,” Journal of Strategic Studies, Volume30, Issue 4 & 5 August 2007, pages 639 – 682 Two closely related, though distinct, theoretical arguments focus explicitly on the consequences for international politics of a shift in power between a dominant state and a rising power. In War and Change in World Politics, Robert Gilpin suggested that peace prevails when a dominant state’s capabilities enable it to ‘govern’ an international order that it has shaped. Over time, however, as economic and technological diffusion proceeds during eras of peace and development, other states are empowered. Moreover, the burdens of international governance drain and distract the reigning hegemon, and challengers eventually emerge who seek to rewrite the rules of governance. As the power advantage of the erstwhile hegemon ebbs, it may become desperate enough to resort to theultima ratio of international politics, force, to forestall the increasingly urgent demands of a rising challenger. Or as the power of the challenger rises, it may be tempted to press its case with threats to use force. It is the rise and fall of the great powers that creates the circumstances under which major wars, what Gilpin labels ‘hegemonic wars’, break out.13 Gilpin’s argument logically encourages pessimism about the implications of a rising China. It leads to the expectation that international trade, investment, and technology transfer will result in a steady diffusion of American economic power, benefiting the rapidly developing states of the world, including China. As the US simultaneously scurries to put out the many brushfires that threaten its far-flung global interests (i.e., the classic problem of overextension), it will be unable to devote sufficient resources to maintain or restore its former advantage over emerging competitors like China. While the erosion of the once clear American advantage plays itself out, the US will find it ever more difficult to preserve the order in Asia that it created during its era of preponderance. The expectation is an increase in the likelihood for the use of force – either by a Chinese challenger able to field a stronger military in support of its demands for greater influence over international arrangements in Asia, or by a besieged American hegemon desperate to head off further decline. Among the trends that alarm those who would look at Asia through the lens of Gilpin’s theory are China’s expanding share of world trade and wealth(much of it resulting from the gains made possible by the international economic order a dominant US established); its acquisition of technology in key sectors that have both civilian and military applications (e.g., information, communications, and electronics linked with to forestall, and the challenger becomes increasingly determined to realize the transition to a new international order whose contours it will define. the ‘revolution in military affairs’); and an expanding military burden for the US (as it copes with the challenges of its global war on terrorism and especially its struggle in Iraq) that limits the resources it can devote to preserving its interests in East Asia.14 Although similar to Gilpin’s work insofar as it emphasizes the importance of shifts in the capabilities of a dominant state and a rising challenger, the powertransition theory A. F. K. Organski and Jacek Kugler present in The War Ledger focuses more closely on the allegedly dangerous phenomenon of ‘crossover’– the point at which a dissatisfied challenger is about to overtake the established leading state.15 In such cases, when the power gap narrows, the dominant state becomes increasingly desperate. Though suggesting why a rising China may ultimately present grave dangers for international peace when its capabilities make it a peer competitor of America, Organski and Kugler’s power-transition theory is less clear about the dangers while a potential challenger still lags far behind and faces a difficult struggle to catch up. This clarification is important in thinking about the theory’s relevance to interpreting China’s rise because a broad consensus prevails among analysts that Chinese military capabilities are at a minimum two decades from putting it in a league with the US in Asia.16 Their theory, then, points with alarm to trends in China’s growing wealth and power relative to the United States, but especially looks ahead to what it sees as the period of maximum danger – that time when a dissatisfied China could be in a position to overtake the US on dimensions believed crucial for assessing power. Reports beginning in the mid-1990s that offered extrapolations suggesting China’s growth would give it the world’s largest gross domestic product (GDP aggregate, not per capita) sometime in the first few decades of the twentieth century fed these sorts of concerns about a potentially dangerous challenge to American leadership in Asia.17 The huge gap between Chinese and American military capabilities (especially in terms of technological sophistication) has so far discouraged prediction of comparably disquieting trends on this dimension, but inklings of similar concerns may be reflected in occasionally alarmist reports about purchases of advanced Russian air and naval equipment, as well as concern that Chinese espionage may have undermined the American advantage in nuclear and missile technology, and speculation about the potential military purposes of China’s manned space program.18 Moreover, because a dominant state may react to the prospect of a crossover and believe that it is wiser to embrace the logic of preventive war and act early to delay a transition while the task is more manageable, Organski and Kugler’s power-transition theory also provides grounds for concern about the period prior to the possible crossover.19 pg. 647-650 MLATs—1AC CONTENTION THREE: MLATs The current US legal regime for overseas data acquisition compromises Mutual Legal Assistance Treaties or MLATS – the plan is necessary to update and strengthen the process Rogers 15 (Jerry, the president of Capitol Allies and the founder of its Six Degrees Project, an independent, nonpartisan effort that promotes entrepreneurship, economic growth, and free market ideals, “Congress LEADS Privacy Rights into the 21st Century,” May 13, http://townhall.com/columnists/jerryrogers/2015/05/13/congress-leads-privacy-rights-into-the-21stcentury-n1998505/page/full, CMR) Bipartisan legislation, introduced in both Houses of Congress, seeks to modernize the wholly inadequate and outdated rules regulating government surveillance and information gathering are obsolete and in dire need of reform. Americans believe—rightly—their privacy rights are not properly protected from government infringement. Enacted in 1986, the ECPA is the major federal statute that regulates electronic surveillance and data gathering, and it does not sufficiently address the challenges presented by modern day computing. The ECPA was designed to protect the privacy of electronic communications, and in the mid-1980s, many of the issues of today’s interconnected world could not have been anticipated. The Law Enforcement Access to Data Stored Abroad (LEADS) Act amends the ECPA by bringing into the Twenty-first Century the rules determining how U.S. authorities can gain access to electronic data. On the international level, LEADS mandates that U.S. agencies cannot use search-warrants to compel the disclosure of an individual’s content stored outside the United States unless the account holder is an American citizen (or U.S. person). It clarifies how U.S. authorities can access data held overseas by settling questions of jurisdiction and transparency. What’s more, the reform legislation will make stronger the international process of MLATs (Mutual Legal Assistance Treaties) through which governments obtain evidence in criminal investigations. Simply, LEADS will thwart government overreach into personal data stored on U.S.-corporation servers abroad. On the national level, the LEADS Act would make documents and material stored in the cloud subject to the same search-warrant requirements as a user’s personal property. LEADS is a significant step toward protecting due process and privacy rights by extending Fourth Amendment protections to data stored by commercial services (or cloud storage). The need for reform is clearly validated in Microsoft v. United States. The Department of Justice (DOJ) swayed a federal court to issue a warrant forcing Microsoft to turn over data it had stored in Ireland. With cloud computing, data can readily be stored in foreign countries. Microsoft maintains that for the federal government to obtain data in a foreign country, it must go through the MLAT process between that country and the United States. The Microsoft case demonstrates that the current legal regime cannot keep pace with changing technology. Real reform to both the ECPA and the MLAT process is needed now. European governments are threatening to ban Americancloud service providers over alarm that their citizens’ data is not properly safeguarded by companies within reach of U.S. law enforcement. Such a scenario would stifle economic growth and be a devastating blow to the American innovation sector. Twentieth Century law should not be governing Twenty-first Century technology. The two-part aim of LEADS is simple and reasonable: 1) LEADS will make certain that data stored in the cloud must receive the same legal protections as data stored in our homes (Fourth Amendment protection from unreasonable searches and seizures). 2) LEADS will update and strengthen the Mutual Legal Assistance Treaty process. The LEADS Act is good for our allies; good for business; good for security; and good for privacy. Electronic Communications Privacy Act (ECPA). The Continued degradation of MLATs will compromise US and global law enforcement responses to organized crime and terrorism Cunningham 15 (Bryan, information security, privacy, and data protection lawyer, and a senior advisor of The Chertoff Group, a global security advisory firm that advises clients on cyber security and cloud computing, Formerly, he was a U.S. civil servant, working for the CIA and serving as Deputy Legal Adviser to National Security Advisor Condoleezza Rice, “Why State and Local Law Enforcement Should Be Part of the MLAT Reform Process,” March 25, http://www.govexec.com/state-local/2015/03/mlatreform-state-local-law-enforcement/108427/, CMR) MLATs are formal agreements between countries establishing procedures for requesting evidence stored outside the requesting country’s jurisdiction. Historically, in many time-sensitive cases, law enforcement agencies officials exchanged information informally and private companies cooperated without formal legal process. But with increasing overseas attention to privacy rights and concerns about secret, unilateral data collection by national governments against other countries’ citizens, companies increasingly are refusing to cooperate informally and governments are retaliating for unfair “spying” on their citizens. State and local law enforcement agencies (LEAs) should care about this problem not only because of its potential impact on the general ability of the U.S. to take down international terror and other criminal organizations, but because, in our increasingly interconnected world, what once could have been treated largely as “local” cases, such as cyber fraud and child pornography now require retrieval of evidence from overseas, and even basic crimes without any obvious cyber component will require evidence stored overseas. The problem will get worse as cloud storage providers increasingly globalize data storage, in order to: store data close to the account holder for faster service; take advantage of excess capacity; and/or save on infrastructure costs or tax burdens. There is broad agreement that the current MLAT system has not kept pace with technology and must be reformed to support fast and effective global law enforcement and many countries, especially in Europe, are threatening to cut off U.S. LEAs from some data altogether in retaliation for perceived spying abuses. Unchecked, both trends threaten to damage the ability of state and local LEAs to prosecute many types of crimes. But U.S.-led MLAT reform can stem this dangerous tide. What should state and local law enforcement leaders do about it? First, stay informed. The Law Enforcement Data Stored Abroad (LEADS) Act, currently under debate in the United States Senate, and a similar measure in the House, aim to begin the process of MLAT reform. A number of law enforcement and civil liberties advocacy groups are tracking such legislation. Second, be heard. Particular facets of legislation may be more or less acceptable to individual state and local law enforcement agencies but such LEAs shouldn’t let the federal government be the only law enforcement voice in the debate. Finally, think through the issues carefully. The immediate reaction of many LEAs may be to oppose any congressional “meddling” with the current system, particularly if an LEA has not itself experienced problems. But efforts to streamline and improve U.S. MLAT processing, as the LEADS Act, for example, can benefit state and local LEAs both because such agencies must go through the U.S. government to request foreign-stored evidence and because U.S. efforts may prompt improvement abroad. Further, shows of U.S. “good faith” may forestall new foreign restrictions on U.S. LEAs access to data stored in their countries. State and local law enforcement should be part of the MLAT reform process. Transnational organized crime risks global conflict, drug-resistant viruses, and collapse of ecosystems CFR 13 (“The Global Regime for Transnational Crime,” June 25, http://www.cfr.org/transnationalcrime/global-regime-transnational-crime/p28656#p2, CMR) Over the past two decades, as the world economy has globalized, so has its illicit counterpart. The global impact of transnational crime has risen to unprecedented levels. Criminal groups have appropriated new technologies, adapted horizontal network structures that are difficult to trace and stop, and diversified their activities. The result has been an unparalleled scale of international crime. As many as fifty-two activities fall under the umbrella of transnational crime, from arms smuggling to human trafficking to environmental crime. These crimes undermine states' abilities to provide citizens with basic services, fuel violent conflicts, and subject people to intolerable suffering. The cost of transnational organized crime is estimated to be roughly 3.6 percent [PDF] of the global economy. Money laundering alone costs at least 2 percent of global gross domestic product every year according to UN reports. Drug traffickers have destabilized entire areas of the Western Hemisphere, leading to the deaths of at least fifty thousand people in Mexico alone in the past six years. Counterfeit medicines further sicken ill patients and contribute to the emergence of drug-resistant strains of viruses. Environmental crime—including illegal logging, waste dumping, and harvesting of endangered species—both destroy fragile ecosystems and endanger innocent civilians. Between twelve and twenty-seven million people toil in forced labor—more than at the peak of the African slave trade. For many reasons, global transnational crime presents nations with a unique and particularly challenging task. To begin with, by definition, transnational crime crosses borders. But the law enforcement institutions that have developed over centuries were constructed to maintain order primarily within national boundaries. In addition, transnational crime affects nations in diverse ways. In many states, political institutions have strong links to transnational crime, and citizens in numerous communities across the world rely on international criminal groups to provide basic services or livelihoods. Finally, the international community requires solid data to gauge the challenge and effectiveness of responses, but data on transnational organized crime is notoriously difficult to gather and is often politicized. Nuclear war Dobriansky 1 (Paula – Under Secretary for Global Affairs at the State Department , “The Explosive Growth of Globalized Crime,” http://www.iwar.org.uk/ecoespionage/resources/transnationalcrime/gj01.htm) international crime -- terrorism, human trafficking, drug trafficking, and contraband smuggling -- involve serious violence and physical harm. Other forms -- fraud, extortion, money laundering, bribery, Certain types of economic espionage, intellectual property theft, and counterfeiting -- don't require guns to cause major damage. Moreover, the spread of information technology has created new categories of cybercrime. For the United States, international crime poses threats on three broad, interrelated fronts. First, the impact is felt directly on the streets of American communities. Hundreds of thousands of individuals enter the U.S. illegally each year, and smuggling of drugs, firearms, stolen cars, child pornography, and other contraband occurs on a wide scale across our borders. Second, the expansion of American business worldwide has opened new opportunities for foreign-based criminals. When an American enterprise abroad is victimized, the consequences may include the loss of profits, productivity, and jobs for Americans at home. Third, international criminals engage in a variety of activities that pose a grave threat to the national security of the United States and the stability and values of the entire world community. Examples include the acquisition of weapons of mass destruction, trade in banned or dangerous substances, and trafficking in women and children. Corruption and the enormous flow of unregulated, crime-generated profits are serious threats to the stability of democratic institutions and free market economies around the world. Disease causes extinction Keating 9 Foreign Policy web editor, Joshua, “The End of the World”, 11-13-09, http://www.foreignpolicy.com/articles/2009/11/13/the_end_of_the_world?page=full How it could happen: Throughout history, plagues have brought civilizations to their knees. The Black Death killed more off more than half of Europe's population in the Middle Ages. In 1918, a flu pandemic killed an estimated 50 million people, nearly 3 percent of the world's population, a far greater impact than the just-concluded World War I. Because of globalization, diseases today spread even faster - witness the rapid worldwide spread of H1N1 currently unfolding. A global outbreak of a disease such as ebola virus -- which has had a 90 percent fatality rate during its flare-ups in rural Africa -- or a mutated drug-resistant form of the flu virus on a global scale could have a devastating, even civilization-ending impact. How likely is it? Treatment of deadly diseases has improved since 1918, but so have the diseases. Modern industrial farming techniques have been blamed for the outbreak of diseases, such as swine flu, and as the world’s population grows and humans move into previously unoccupied areas, the risk of exposure to previously unknown pathogens increases. More than 40 new viruses have emerged since the 1970s, including ebola and HIV. Biological weapons experimentation has added a new and just as troubling complication Risk of environmental collapse is real and will cascade---we haven’t crossed the tipping point yet but we’re really close---and, anthropogenic destructions destroys resilience and causes extinction Johan Rockström et al 9 is a Environmental Professor in natural resource management at Stockholm University, and the Executive Director of the Stockholm Environment Institute and the Stockholm Resilience Centre, along with 27 other members of the SEI and SRC, A safe operating space for humanity, Nature 461, 472-475 (24 September 2009), www.nature.com/nature/journal/v461/n7263/full/461472a.html Crossing certain biophysical thresholds could have disastrous consequences for humanity Three of nine interlinked planetary boundaries have already been overstepped Although Earth has undergone many periods of significant environmental change, the planet's environment has been unusually stable for the past 10,000 years 1, 2, 3. This period of stability — known to geologists as the Holocene — has seen human civilizations arise, develop and thrive. Such stability may now be under threat. Since the Industrial Revolution, a new era has arisen, the Anthropocene4, in which human actions have become the main driver of global environmental change5. This could see human activities push the Earth system outside the stable environmental state of the Holocene, with consequences that are detrimental or even catastrophic for large parts of the world. During the Holocene, environmental change occurred naturally and Earth's regulatory capacity maintained the conditions that enabled human development. Regular temperatures, freshwater availability and biogeochemical flows all stayed within a relatively narrow range. Now, largely because of a rapidly growing reliance on fossil fuels and industrialized forms of agriculture, human activities have reached a level that could damage the systems that keep Earth in the desirable Holocene state. The result could be irreversible and, in some cases, abrupt environmental change, leading to a state less conducive to human development6. Without pressure from humans, the Holocene is expected to continue for at least several thousands of years7. To meet the challenge of maintaining the Holocene state, we propose a framework based on 'planetary boundaries'. These boundaries define the safe operating space for humanity with respect to the Earth system and are associated with the planet's biophysical subsystems or processes. Although Earth's complex systems sometimes respond smoothly to changing pressures, it seems that this will prove to be the exception rather than the rule. Many subsystems of Earth react in a nonlinear, often abrupt, way, and are particularly sensitive around threshold levels of certain key variables. If these thresholds are crossed, then important subsystems, such as a monsoon system, could shift into a new state, often with deleterious or potentially even disastrous consequences for humans8, 9. Most of these thresholds can be defined by a critical value for one or more control variables, such as carbon dioxide concentration. Not all processes or subsystems on Earth have well-defined thresholds, although human actions that undermine the resilience of such processes or subsystems — for example, land and water degradation — can increase the risk that thresholds will also be crossed in other processes, such as the climate system. We have tried to identify the Earth-system processes and associated thresholds which, if crossed, could generate unacceptable environmental change. We have found nine such processes for which we believe it is necessary to define planetary boundaries: climate change; rate of biodiversity loss (terrestrial and marine); interference with the nitrogen and phosphorus cycles; stratospheric ozone depletion; ocean acidification; global freshwater use; change in land use; chemical pollution; and atmospheric aerosol loading (see Fig. 1 andTable). The inner green shading represents the proposed safe operating space for nine planetary systems. The red wedges represent an estimate of the current position for each variable. The boundaries in three systems (rate of biodiversity loss, climate change and human interference with the nitrogen cycle), have already been exceeded. In general, planetary boundaries are values for control variables that are either at a 'safe' distance from thresholds — for processes with evidence of threshold behaviour — or at dangerous levels — for processes without evidence of thresholds. Determining a safe distance involves normative judgements of how societies choose to deal with risk and uncertainty. We have taken a conservative, risk-averse approach to quantifying our planetary boundaries, taking into account the large uncertainties that surround the true position of many thresholds. (A detailed description of the boundaries — and the analyses behind them — is given in ref. 10.) Humanity may soon be approaching the boundaries for global freshwater use, change in land use, ocean acidification and interference with the global phosphorous cycle (see Fig. 1). Our analysis suggests that three of the Earth-system processes — climate change, rate of biodiversity loss and interference with the nitrogen cycle — have already transgressed their boundaries. For the latter two of these, the control variables are the rate of species loss and the rate at which N2 is removed from the atmosphere and converted to reactive nitrogen for human use, respectively. These are rates of change that cannot continue without significantly eroding the resilience of major components of Earth-system functioning. Here we describe these three processes. AND, existing US policy forces companies to violate foreign privacy laws – creates a dangerous precedent that guarantees retaliation by both allies and potential aggressors Horowitz 6/10 (Daniel, former staff Director of the House Small Business Committee and a veteran of the House Republican Leadership “LEADS Act will Protect Privacy and Innovation,” 2015, http://humanevents.com/2015/06/10/leads-act-will-protect-privacy-and-innovation/, CMR) Congress passed the Electronic Communications Privacy Act (ECPA) in 1986 to protect our right to private telephone calls. To place that in perspective, in 1986 “disruptive technology” was the latest IBM Selectric typewriter. 1986 was the same year Microsoft released Windows 1.0 and Apple celebrated the second anniversary of the original Macintosh. Incredibly, judges in the U.S. Court system have successfully stretched the ECPA to provide limited privacy for everything our mobile devices do now – the selfies on our phone or the future best-selling novel on our laptop. However, the U.S. Department of Justice (DOJ) has successfully pressured a U.S District Court Judge to establish a precedent that threatens to break this fragile protection – both within the U.S. and internationally. It is necessary for Congress to act to protect our increasingly electronic identities and to establish standards of conduct protecting U.S. citizens, our digital identities and innovative products and services we utilize for our convenience. By forcing U.S. law into direct conflict with the privacy protections of the European Union, this action by DOJ does not simply place US companies in an impossible position Catch-22 whereby either the company opposes a just action by the U.S. government or the company violates the laws and regulations in the country where the data is stored. Further, this precedent creates a gaping vacuum of protection for everyone else’s electronic identities in the age of international mobile commerce. By taking this action, DOJ is not helping the American people, but rather they are weakening protections for US citizens – both domestically and around the globe. With this action by the DOJ, other countries – even Russia, North Korea and China – have the reciprocal ability to access our emails or any digitally stored files based in any other country. The challenge of protecting our electronic information while providing security in the mobile economy is complex and difficult to solve. More mobile apps are released everyday, hosted by an increasingly borderless system of cloud based remote storage. The amount of data per person – photos, apps and even personal medical data – is exponentially increasing every day. By the very nature of the distributed network that is the Internet, the data running these apps is stored in multiple countries located in almost any country around the globe. However, the solution at this moment is fairly simple. Senators Hatch, Coons and Heller introduced the bipartisan “Law Enforcement Access to Data Stored Abroad Act” (S. 2871) a few weeks ago. The bill is a simple and prudent update to ECPA. It formally extends ECPA protections to our electronically data. The LEADS Act also assists our law enforcement agencies by providing a clear and unambiguous path to access electronic data with a properly issued warrant. The bill also updates the Mutual Legal Assistance Treaty process by directing DOJ enter into the 21st Century, with the creation of an ordinary online form to allow other nations to submit legal requests to access data systems based in the US. However, hesitating will only empower rogue nations to determine how and when they access our personal data, and our normal trading partners will have yet another excuse to enact protectionist laws that discriminate against our world-leading technology companies. Hopefully, Congress will see fit to consider this legislation in a timely manner before DOJ’s unprecedented action triggers retaliatory actions by our allies and even those less friendly. Conflicts over data acquisition ensure US-China war IBT 6/24 (International Business Times, by Sounak Mukhopadhyay, “War ‘Inevitable’ Between US, China: Russian, Chinese Media,” http://www.ibtimes.com/war-inevitable-between-us-china-russianchinese-media-1982123, CMR) Chinese and Russian media have started suggesting the possibility of a China-U.S. war. While the national news agency in China calls it “inevitable,” a Russian news agency listed a number of indications that it said “proved’ the two nations were heading toward a military conflict. Clearly, there has been growing diplomatic tension between China and the United States. And according to reports, both countries have been spending lots of money on military preparations. China's Xinhua News Agency reported that the present political situation put a question mark on building peaceful coexistence between China and the U.S. “The situation has many people pondering how the two countries can avoid 'Thucydides's trap' -- the notion an established power becomes so anxious about the rise of a new power that a struggle leading to war becomes inevitable,” Xinhua reported. Russia's Pravda reported that China had conducted a number of military exercises simulating an attack against Taiwan. “Since the U.S. is committed to protecting Taiwan, a real conflict of this nature would almost certainly involve the United States” the Russian news agency predicted. The U.S. government blames Beijing for theft of the personal data of some 14 million U.S. government workers. According to U.S. authorities, it was “an act of war.” The U.S. says the breach also has compromised background information about intelligence and military personnel. Escalates to nuclear war Sydney J. Freedberg Jr. 13, deputy editor for defense publication Breaking Defense and 13 year journalist at National Journal and has won awards from the association of Military Reporters & Editors in 2008 and 2009, as well as an honorable mention in 2010, 10/1/13, China’s Fear Of US May Tempt Them To Preempt: Sinologists, http://breakingdefense.com/2013/10/chinas-fear-of-us-may-tempt-them-topreempt-sinologists/ Because China believes it is much weaker than the United States, they are more likely to launch a massive preemptive strike in a crisis. Here’s the other bad news: The current US concept for high-tech warfare, known as Air-Sea Battle, might escalate the conflict even further towards a “limited” nuclear war, says one of the top American experts on the Chinese military. [This is one in an occasional series on the crucial strategic relationship and the military capabilities of the US, its allies and China.] What US analysts call an “anti-access/area denial” strategy is what China calls “counter-intervention” and “active defense,” and the Chinese appraoch is born of a deep sense of vulnerability that dates back 200 years, China analyst Larry Wortzel said at the Institute of World Politics: “The People’s Liberation Army still sees themselves as an inferior force to the American military, and that’s who they think their most likely enemy is.” That’s fine as long as it deters China from attacking its neighbors. But if deterrence fails, the Chinese are likely to go big or go home. Chinese military history from the Korean War in 1950 to the Chinese invasion of Vietnam in 1979 to more recent, albeit vigorous but nonviolent, grabs for the disputed Scarborough Shoal suggests a preference for a sudden use of overwhelming force at a crucial point, what Clausewitz would call the enemy’s “center of gravity.” “What they do is very heavily built on preemption,” Wortzel said. “The problem with the striking the enemy’s center of gravity is, for the United States, they see it as being in Japan, Hawaii, and the West Coast….That’s very escalatory.” (Students of the American military will nod sagely, of course, as we remind everyone that President George Bush made preemption a centerpiece of American strategy after the terror attacks of 2001.) Wortzel argued that the current version of US Air-Sea Battle concept is also likely to lead to escalation. “China’s dependent on these ballistic missiles and anti-ship missiles and satellite links,” he said. Since those are almost all land-based, any attack on them “involves striking the Chinese mainland, which is pretty escalatory.” “You don’t know how they’re going to react,” he said. “They do have nuclear missiles. They actually think we’re more allergic to nuclear missiles landing on our soil than they are on their soil. They think they can withstand a limited nuclear attack, or even a big nuclear attack, and retaliate.” EU Relations—1AC CONTENTION FOUR: US-EU RELATIONS Surveillance scandals have compromised transatlantic relations – the plan sends a key signal for reconciliation – alt causes are irrelevant Gould 15 (Jeff, CEO Peerstone Research, “The LEADS Act: A Transatlantic Olive Branch from the U.S. to Europe Over Government Access to Data,” Feb 20, https://medium.com/@jeffgould/the-leads-act-atransatlantic-olive-branch-over-government-access-to-data-411fab0c8538, CMR) A group of American senators from both parties are offering Europe an olive branch in the transatlantic war of words over Internet surveillance. Concretely, they propose to update the antiquated 1986 Electronic Communications Privacy Act (ECPA) by putting tighter limits on when and how U.S. courts can access electronic data stored abroad. ECPA was a forward looking law when it was passed. Such things as the Internet and email already existed. Personal computers were commonplace. A few people even had (brick-sized) mobile phones. The law was expressly intended to give courts and police agencies conducting criminal investigations a legitimate way to get at data stored on these devices while still protecting the privacy rights of users. But the role and scale of online technology in the world are vastly different today than in 1986. No one could have imagined then that one day hundreds of millions of Europeans would routinely store trillions of personal electronic documents on shared computers located in Europe but owned and remotely operated by American firms. Such a scenario would have been pure science fiction. Nor of course did anyone in 1986 dream that a handful of terrorists could knock down New York’s tallest skyscrapers and kill thousands of innocents. By now most Europeans who follow privacy and surveillance issues know about the specific case that led to the Senators’ proposed ECPA amendment. In a nutshell, a U.S. Federal court in New York issued a warrant demanding that a U.S. Internet firm (Microsoft) turn over emails belonging to a foreign national that were stored on the firm’s servers in Ireland. According to press reports the case concerns drug trafficking, not terrorism. But instead of complying with the demand, Microsoft fought it and took the case to a Federal Appeals court. Observers expect that whatever the Appeals ruling the case will wind up at the Supreme Court. The dispute between the court which issued the warrant and Microsoft turns on the meaning of ECPA as originally written. Both sides agree that American law enforcement officials do not have the right to conduct searches or seize evidence overseas. For example, an FBI agent can’t hop on a plane to France warrant in hand, knock on the door of an American bank in Paris, and demand that the bank turn over the contents of a customer’s safe deposit box. This is especially true if the customer is not a citizen or resident of the United States. But it would even be true if the customer were American. Everyone agrees on this much. But the prosecutors in the case argue that the emails stored on Microsoft’s servers in Dublin are different. They argue that they won’t really be searching or seizing the emails until Microsoft brings them back to the United States. According to this logic the warrant will only actually be executed in New York, not in Ireland. It is easy to mock this reasoning as twisted, perverse or insincere. Some have even speculated that the Department of Justice, recognizing that more and more evidence of interest to prosecutors resides on overseas servers, deliberately picked this fight in the hope that it could establish an advantageous precedent. No one can predict today whether the prosecutors will ultimately prevail. It will be up to the Supreme Court to decide. Here is where the proposed amendment to ECPA comes in. Known as the LEADS Act (Law Enforcement Access to Data Stored Abroad Act), the bill was introduced by two Republicans (Senators Hatch and Heller) and a Democrat (Senator Coons). They recognize that regardless of the outcome of Microsoft’s current legal battle, the fundamental question of how and when U.S. authorities can demand access to data abroad will only grow in importance. They therefore propose two simple but powerful rules governing what U.S. courts can do. A warrant for overseas data will only be valid if: (1) It concerns a U.S. citizen or permanent resident; and (2) It does not violate the laws of the foreign country where it is to be executed. The LEADS Act is broadly supported by U.S. high tech and media companies, as well as by leading privacy advocates. The government of Ireland and one of the leading advocates of data protection reform in the European Parliament, while not specifically endorsing the act, have submitted amicus briefs in support of Microsoft’s appeal. Surprisingly, among the few significant industry players yet to publicly endorse the LEADS Act are Google, Facebook and Yahoo. Perhaps they fear that the bill in its current form might encourage some foreign users in the belief that putting their data on foreign rather than U.S.-based cloud servers will protect them from the long arm of U.S. authorities. But there can be little doubt that these firms share the same concerns about U.S. access to overseas data as Microsoft, and they may yet give it their full support. Early indications are that the LEADS Act has a good chance of passing in the current session of Congress. It has strong support from both political parties and has so far not aroused any open opposition from the U.S. law enforcement community. Europeans should welcome the LEADS Act and acknowledge that, even if it falls short of addressing all their concerns in the wake of the Snowden revelations, it is a powerful and incontestable sign that the U.S. seeks reconciliation and compromise rather than continued conflict with Europe over these vital issues. The plan is a starting point for halting broader conflicts – restores trust and strategic cooperation *also a potential IL for a modeling adv Cunningham 15 (Bryan, information security, privacy, and data protection lawyer as well as senior advisor of The Chertoff Group, a security and risk management advisory firm with clients in the technology sector, “Big Brother is watching EU,” 1/6, http://www.politico.eu/article/eu-privacysurveillance-us-leads-act/, CMR) A strange — and strangely unnoticed — trend is emerging in the evolving global response to massive 2013 leaks about US surveillance activities. While our European cousins talk privacy reform, the United States is actually moving ahead with it, albeit more slowly than many would like. As the American side of the Atlantic inches toward self-restraint, many European governments are seeking sweeping new spying powers. Europe is at risk of falling behind the US in privacy reform. Following two post-Snowden reviews of US surveillance activities, the United States announced new limitations to its electronic surveillance activities, including additional privacy protections for Europeans and other non-US citizens, which few European countries currently afford Americans. Much-criticized US surveillance activities, including the bulk telephone metadata program, are set to expire in days unless Congress intervenes. Meanwhile, the bipartisan Law Enforcement Access to Data Stored Overseas (LEADS) Act and similar draft laws are moving through Congress and garnering broad support from technology companies, business organizations, and privacy and civil liberties advocacy groups. Meanwhile, across the pond, key European Union member states, some harshly critical of US spying, are seeking dramatically enhanced surveillance powers in the wake of the horrific Charlie Hebdo attacks in January. France’s lower house of parliament just passed a sweeping new spying bill that would empower French intelligence to deploy hi-tech tools such as vehicle tracking and mobile phone identification devices against individuals without judicial oversight; allow the government to force communications companies (including US companies) to sift through massive amounts of phone and internet metadata for potential terrorist communications and report results to the government; and give French intelligence services real-time access to “connection” data of possible terrorists. Prior to his reelection, British Prime Minister David Cameron promised to authorize British intelligence agencies to read “all messages sent over the Internet,” in a package of legal provisions called by critics the “snoopers’ charter.” This comes amidst admissions by British intelligence of extensive electronic communications surveillance and sophisticated “Computer Network Exploitation” (CNE) hacking, all without judicial supervision. At the same time, a parliamentary inquiry approved of ongoing British intelligence bulk data collection. And while Ireland recently filed a brief opposing the enforcement of US search warrants for data stored in Ireland, the country recently joined Britain and Germany as “one of Europe’s top three offenders in undermining citizens’ rights,” according to a privacy lobbying group purporting to analyze 11,000 pages of confidential European Council documents concerning EU governments’ “secret” efforts to weaken EU privacy reforms. Reports citing leaked classified files indicate that “Germany’s external spy agency saves tens of millions of phone records every day,” collecting metadata on some 220 million calls daily, and carrying out “surveillance of international communications sent by both satellites and internet cables that pass through one of several key locations.” Such efforts reportedly are targeted, in significant part, at nonGerman citizens. Other European nations also are using or seeking broad surveillance powers in the wake of the Paris massacre and a number of smaller terrorist attacks and near misses. Even before the Paris attacks, then-EU Justice Commissioner Viviane Reding, a harsh critic of reported US surveillance activities, called out her continental colleagues for their hypocrisy: “If the EU wants to be credible in its efforts to rebuild trust…it also has to get its own house in order.” Where you stand depends upon where you sit — it’s not surprising that Europeans critical of US surveillance activities in the wake of the September 11, 2001 attacks are today, after less severe (though no less despicable) attacks on their own soil, seeking powers every bit as sweeping as those enacted in the United States. But it’s nonetheless apparent that, just as privacy reform appears to be trending in the United States, government snooping is ascendant in Europe, the rhetoric of some EU politicians notwithstanding. So, I present a neighborly challenge to American friends and allies in Europe: Will you work to reform the Mutual Legal Assistance Treaty (MLAT) criminal evidence sharing system as the United States has begun to do with the LEADS Act? Will you expand the rights of Americans with regard to your governments’ surveillance as the United States has begun to do for your citizens? No nation will unilaterally disarm and none of us are safer when some are more vulnerable than others. Our nations may be working to reform their own surveillance practices to better protect privacy, but their efforts will only be sustainable if we work together. US and European leaders should accelerate efforts towards true reform, without sacrificing our collective ability to defeat the growing threats to all of us. And perhaps tone down the cross-Atlantic attacks in the bargain. US-EU relations solve nuclear war and multiple transnational threats Stivachtis 10 – Director of International Studies Program @ Virginia Polytechnic Institute & State University [Dr. Yannis. A. Stivachtis (Professor of Poli Sci & Ph.D. in Politics & International Relations from Lancaster University), THE IMPERATIVE FOR TRANSATLANTIC COOPERATION,” The Research Institute for European and American Studies, 2010, pg. http://www.rieas.gr/research-areas/globalissues/transatlantic-studies/78.html There is no doubt that US-European relations are in a period of transition , and that the stresses and strains of globalization are increasing both the number and the seriousness of the challenges that confront transatlantic relations. The events of 9/11 and the Iraq War have added significantly to these stresses and strains. At the same time, international terrorism, the nuclearization of North Korea and especially Iran, the proliferation of weapons of mass destruction (WMD), the transformation of Russia into a stable and cooperative member of the international community, the growing power of China, the political and economic transformation and integration of the Caucasian and Central Asian states, the integration and stabilization of the Balkan countries, the promotion of peace and stability in the Middle East, poverty, climate change, AIDS and other emergent problems and situations require further cooperation among countries at the regional, global and institutional levels. Therefore, cooperation between the U.S. and Europe is more imperative than ever to deal effectively with these problems. It is fair to say that the challenges of crafting a new relationship between the U.S. and the EU as well as between the U.S. and NATO are more regional than global, but the implications of success or failure will be global. The transatlantic relationship is still in crisis, despite efforts to improve it since the Iraq War. This is not to say that differences between the two sides of the Atlantic did not exist before the war. Actually, post-1945 relations between Europe and the U.S. were fraught with disagreements and never free of crisis since the Suez crisis of 1956. Moreover, despite trans-Atlantic proclamations of solidarity in the aftermath of 9/11, the U.S. and Europe parted ways on issues from global warming and biotechnology to peacekeeping and national missile defense. Questions such as, the future role of NATO and its relationship to the common European Security and Defense policy (ESDP), or what constitutes terrorism and what the rights of captured suspected terrorists are, have been added to the list of US-European disagreements. There are two reasons for concern regarding the transatlantic rift. First, if European leaders conclude that Europe must become counterweight to the U.S., rather than a partner, it will be difficult to engage in the kind of open search for a common ground than an elective partnership requires. Second, there is a risk that public opinion in both the U.S. and Europe will make it difficult even for leaders who want to forge a new relationship to make the necessary accommodations. If both sides would actively work to heal the breach, a new opportunity could be created. A vibrant transatlantic partnership remains a real possibility, but only if both sides make the necessary political commitment. There are strong reasons to believe that the security challenges facing the U.S. and Europe are more shared than divergent. The most dramatic case is terrorism. Closely related is the common interest in halting the spread of weapons of mass destruction and the nuclearization of Iran and North Korea. This commonality of threats is clearly perceived by publics on both sides of the Atlantic. Actually, Americans and Europeans see eye to eye on more issues than one would expect from reading newspapers and magazines. But while elites on both sides of the Atlantic bemoan a largely illusory gap over the use of military force, biotechnology, and global warming, surveys of American and European public opinion highlight sharp differences over global leadership, defense spending, and the Middle East that threaten the future of the last century’s most successful alliance. There are other important, shared interests as well. The transformation of Russia into a stable cooperative member of the international community is a priority both for the U.S. and Europe. They also have an interest in promoting a stable regime in Ukraine. It is necessary for the U.S. and EU to form a united front to meet these challenges because first, there is a risk that dangerous materials related to WMD will fall into the wrong hands; and second, the spread of conflict along those countries’ periphery could destabilize neighboring countries and provide safe havens for terrorists and other international criminal organizations. Likewise, in the Caucasus and Central Asia both sides share a stake in promoting political and economic transformation and integrating these states into larger communities such as the OSCE. This would also minimize the risk of instability spreading and prevent those countries of becoming havens for international terrorists and criminals. Similarly, there is a common interest in integrating the Balkans politically and economically. Dealing with Iran, Iraq, Lebanon, and the Israeli-Palestinian conflict as well as other political issues in the Middle East are also of a great concern for both sides although the U.S. plays a dominant role in the region. Finally, US-European cooperation will be more effective in dealing with the rising power of China through engagement but also containment. The post Iraq War realities have shown that it is no longer simply a question of adapting transatlantic institutions to new realities. The changing structure of relations between the U.S. and Europe implies that a new basis for the relationship must be found if transatlantic cooperation and partnership is to continue. The future course of relations will be determined above all by U.S. policy towards Europe and the Atlantic Alliance. Wise policy can help forge a new, more enduring strategic partnership, through which the two sides of the Atlantic cooperate in meeting the many major challenges and opportunities of the evolving world together. But a policy that takes Europe for granted and routinely ignores or even belittles Europe an concerns, may force Europe to conclude that the costs of continued alliance outweigh its benefits. 1NC Terror DA – 1NC surveillance successfully checks terror incidents now. Prefer longitudinal studies. Boot ‘13 Max Boot is a Senior Fellow in National Security Studies at the Council on Foreign Relations. In 2004, he was named by the World Affairs Councils of America as one of "the 500 most influential people in the United States in the field of foreign policy." In 2007, he won the Eric Breindel Award for Excellence in Opinion Journalism. From 1992 to 1994 he was an editor and writer at the Christian Science Monitor. Boot holds a bachelor's degree in history, with high honors, from the University of California, Berkeley and a master's degree in history from Yale University. Boot has served as an adviser to U.S. commanders in Iraq and Afghanistan. He is the published author of Invisible Armies: An Epic History of Guerrilla Warfare from Ancient Times to the Present. From the article: “Stay calm and let the NSA carry on” - LA Times – June 9th http://articles.latimes.com/2013/jun/09/opinion/la-oe-boot-nsa-surveillance-20130609 After 9/11, there was a widespread expectation of many more terrorist attacks on the United States. So far that hasn't happened. We haven't escaped entirely unscathed (see Boston Marathon, bombing of), but on the whole we have been a lot safer than most security experts, including me, expected. In light of the current controversy over the National Security Agency's monitoring of telephone calls and emails, it is worthwhile to ask: Why is that? It is certainly not due to any change of heart among our enemies. Radical Islamists still want to kill American infidels. But the vast majority of the time, they fail. The Heritage Foundation estimated last year that 50 terrorist attacks on the American homeland had been foiled since 2001. Some, admittedly, failed through sheer incompetence on the part of the would-be terrorists. For instance, Faisal Shahzad, a Pakistani American jihadist, planted a car bomb in Times Square in 2010 that started smoking before exploding, thereby alerting two New Yorkers who in turn called police, who were able to defuse it. But it would be naive to adduce all of our security more attacks would have succeeded absent the ramped-up counter-terrorism efforts undertaken by the U.S. intelligence community, the military and law enforcement. And a large element of the intelligence community's success lies in its use of special intelligence — that is, communications intercepts. The CIA is notoriously deficient in human intelligence — infiltrating spies into terrorist organizations is hard to do, especially when we have so few spooks who speak Urdu, Arabic, Persian and other relevant languages. But the NSA is the best in the world at intercepting communications. That is the most important technical advantage we have in the battle against fanatical foes who will not hesitate to sacrifice their lives to take ours. Which brings us to the current kerfuffle over two NSA monitoring programs that have been exposed by the Guardian and the Washington Post. One program apparently collects metadata on all telephone calls made in the United States. Another program provides access to all the emails, videos and other data found on the servers of major Internet firms such as Google, Apple and Microsoft. At first blush these intelligence-gathering activities raise the specter of Big Brother snooping on ordinary American citizens who might be cheating on their spouses or bad-mouthing the president. In fact, there are considerable safeguards built into both programs to ensure that doesn't happen. The phone-monitoring program does not allow the NSA to listen in on conversations without a court order. All that it can do is to collect information on the time, date and destination of phone calls. It should go without saying that it would be pretty useful to know if someone in the U.S. is calling a number in Pakistan or Yemen that is used by a terrorist organizer. As for success to pure serendipity. Surely the Internet-monitoring program, reportedly known as PRISM, it is apparently limited to "non-U.S. persons" who are abroad and thereby enjoy no constitutional protections. These are hardly rogue operations. Both programs were initiated by President George W. Bush and continued by President Obama with the full knowledge and support of Congress and continuing oversight from the federal judiciary. That's why the leaders of both the House and Senate It's possible that, like all government programs, these could be abused — see, for example, the IRS making life tough on tea partiers. But there is no evidence of abuse so far and plenty of evidence — in the lack of successful terrorist attacks — that these programs have been effective in disrupting terrorist plots. Granted there is something inherently intelligence committees, Republicans and Democrats alike, have come to the defense of these activities. creepy about Uncle Sam scooping up so much information about us. But Google, Facebook, Amazon, Twitter, Citibank and other companies know at least as much about us, because they use very similar data-mining programs to track our online movements. They gather that information in order to sell us products, and no one seems to be overly alarmed. The NSA is gathering that information to keep us safe from terrorist attackers. Yet somehow its actions have become a "scandal," to use a term now loosely being tossed around. The real scandal here is that the Guardian and Washington Post are compromising our national security by telling our enemies about our intelligencegathering capabilities. Their news stories reveal, for example, that only nine Internet companies share information with the NSA. This is a virtual invitation to terrorists to use other Internet outlets for searches, email, apps and all to stop or scale back the NSA's special intelligence efforts would amount to unilateral disarmament in a war against terrorism that is far from over. the rest. No intelligence effort can ever keep us 100% safe, but (Note to students: a “longitudinal study” is research carried out over an extended period of time. In this case, several years.) Link – curtailing surveillance boosts terror risks. That risk’s serious and underestimated. Lewis ‘14 James Andrew Lewis is a senior fellow and director of the Strategic Technologies Program at the Center for Strategic and International Studies in Washington, D.C., where he writes on technology, security, and the international economy. Before joining CSIS, he worked at the US Departments of State and Commerce as a Foreign Service officer and as a member of the Senior Executive Service. His diplomatic experience included negotiations on military basing in Asia, the Cambodia peace process, and the five-power talks on arms transfer restraint. Lewis received his Ph.D. from the University of Chicago. “Underestimating Risk in the Surveillance Debate” - CENTER FOR STRATEGIC & INTERNATIONAL STUDIES - STRATEGIC TECHNOLOGIES PROGRAM – December - http://csis.org/publication/underestimating-risk-surveillance-debate Americans are reluctant to accept terrorism is part of their daily lives, but attacks have been planned or attempted against American targets (usually airliners or urban areas) almost every year since 9/11. Europe faces even greater risk, given the thousands of European Union citizens who will return hardened and radicalized from fighting in Syria and Iraq. The threat of attack is easy to exaggerate, but that does not mean it is nonexistent. Australia’s then-attorney general said in August 2013 that communications surveillance had stopped four “mass casualty events” since 2008. The constant planning and preparation for attack by terrorist groups is not apparent to the public. The dilemma in assessing risk is that it is discontinuous. There can be long periods with no noticeable activity, only to have the apparent calm explode. The debate over how to reform communications surveillance has discounted this risk. Communications surveillance is an essential law enforcement and intelligence tool. There is no replacement for it. Some suggestions for alternative approaches to surveillance, such as the idea that the National Security Agency (NSA) only track known or suspected terrorists, reflect wishful thinking, as it is the unknown terrorist who will inflict the greatest harm. Relying on MLATs results in lengthy delays – compromises responses to terrorism and drug trafficking Schultheis 15 (Ned, Summer Associate at Ropes & Gray LLP, “WARRANTS IN THE CLOUDS: HOW EXTRATERRITORIAL APPLICATION OF THE STORED COMMUNICATIONS ACT THREATENS THE UNITED STATES’ CLOUD STORAGE INDUSTRY,” Volume 9 Issue 2, CMR) At the same time, there is merit to the U.S. government’s argument that the current MLAT process is slow and subject to political objectives that may not conform to time sensitive investigations of international matters of concern.233 It is evident Microsoft and Ireland denounce the U.S. government’s alleged bypass of the U.S.-Irish MLAT.234 Although the U.S.- Irish MLAT’s purpose is “to improve the effectiveness of the law enforcement authorities of both countries in the investigation, prosecution, and prevention of crime through cooperation and mutual legal assistance in criminal matters,”235 and, traditionally, is the process by which the U.S. government would obtain evidence located in Ireland through a domestic warrant, the U.S. government’s arguments for efficiency in relation to criminal investigation has legitimate backing in today’s post-9/11 era. Criminal investigations on high security matters, such as drug enforcement or terrorism, need to run smoothly and efficiently because time of the essence. There is no reason to bog down investigations where critical evidence is located abroad and risk losing valuable intelligence due to another nation’s potential political goals that may be in opposition with the ongoing U.S. investigation in sending the evidence in a timely manner. Vigilance link - Strong intel gathering’s key to discourages initiation of BW attacks. Pittenger ‘14 US Rep. Robert Pittenger, chair of Congressional Task Force on Terrorism, “Bipartisan bill on NSA data collection protects both privacy and national security” - Washington Examiner, 6/9/14, http://washingtonexaminer.com/rep.-robert-pittengerbipartisan-bill-on-nsa-data-collection-protects-both-privacy-and-nationalsecurity/article/2549456?custom_click=rss&utm_campaign=Weekly+Standard+Story+Box&utm_source=weeklystandard.com& utm_medium=referral This February, I took that question to a meeting of European Ambassadors at the Organization for Security and Cooperation in Europe. During the conference, I asked three questions: 1. What is the current worldwide terrorist threat? 2. What is America’s role in addressing and mitigating this threat? 3. What role does intelligence data collection play in this process, given the multiple platforms for attack including physical assets, cyber, chemical, biological, nuclear and the electric grid? Each ambassador acknowledged the threat was greater today than before 9/11, with al Qaeda and other extreme Islamist terrorists stronger, more sophisticated, and having a dozen or more training camps throughout the Middle East and Africa. As to the role of the United States, they felt our efforts were primary and essential for peace and security around the world. Regarding the intelligence-gathering, their consensus was, “We want privacy, but we must have your intelligence.” As a European foreign minister stated to me, “Without U.S. intelligence, we are blind.” We cannot yield to those loud but misguided voices who view the world as void of the deadly and destructive intentions of unrelenting terrorists. The number of terrorism-related deaths worldwide doubled between 2012 and 2013, jumping from 10,000 to 20,000 in just one year. Now is not the time to stand down. Those who embrace an altruistic worldview should remember that vigilance and strength have deterred our enemies in the past. That same commitment is required today to defeat those who seek to destroy us and our way of life. We must make careful, prudent use of all available technology to counter their sophisticated operations if we are to maintain our freedom and liberties. Bioterror attacks cause extinction Mhyrvold ‘13 Nathan, Began college at age 14, BS and Masters from UCLA, Masters and PhD, Princeton “Strategic Terrorism: A Call to Action,” Working Draft, The Lawfare Research Paper Series Research paper NO . 2 – 2013 As horrible as this would be, such a pandemic is by no means the worst attack one can imagine, for several reasons. First, most of the classic bioweapons are based on 1960s and 1970s technology because the 1972 treaty halted bioweapons development efforts in the United States and most other Western countries. Second, the Russians, although solidly committed to biological weapons long after the treaty deadline, were never on the cutting edge of biological research. Third and most important, the science and technology of molecular biology have made enormous advances, utterly transforming the field in the last few decades. High school biology students routinely perform molecular-biology manipulations that would have been impossible even for the best superpower-funded program back in the heyday of biologicalweapons research. The biowarfare methods of the 1960s and 1970s are now as antiquated as the lumbering mainframe computers of that era. Tomorrow’s terrorists will have vastly more deadly bugs to choose from. Consider this sobering development: in 2001, Australian researchers working on mousepox, a nonlethal virus that infects mice (as chickenpox does in humans), accidentally discovered that a simple genetic modification transformed the virus.10, 11 Instead of producing mild symptoms, the new virus killed 60% of even those mice already immune to the naturally occurring strains of mousepox. The new virus, moreover, was unaffected by any existing vaccine or antiviral drug. A team of researchers at Saint Louis University led by Mark Buller picked up on that work and, by late 2003, found a way to improve on it: Buller’s variation on mousepox was 100% lethal, although his team of investigators also devised combination vaccine and antiviral therapies that were partially effective in protecting animals from the engineered strain.12, 13 Another saving grace is that the genetically altered virus is no longer contagious. Of course, it is quite possible that future tinkering with the virus will change that property, too. Strong reasons exist to believe that the genetic modifications Buller made to mousepox would work for other poxviruses and possibly for other classes of viruses as well. Might the same techniques allow chickenpox or another poxvirus that infects humans to be turned into a 100% lethal bioweapon, perhaps one that is resistant to any known antiviral therapy? I’ve asked this question of experts many times, and no one has yet replied that such a manipulation couldn’t be done. This case is just one example. Many more are pouring out of scientific journals and conferences every year. Just last year, the journal Nature published a controversial study done at the University of Wisconsin–Madison in which virologists enumerated the changes one would need to make to a highly lethal strain of bird flu to make it easily transmitted from one mammal to another.14 Biotechnology is advancing so rapidly that it is hard to keep track of all the new potential threats . Nor is it clear that anyone is even trying. In addition to lethality and drug resistance, many other parameters can be played with, given that the infectious power of an epidemic depends on many properties, including the length of the latency period during which a person is contagious but asymptomatic. Delaying the onset of serious symptoms allows each new case to spread to more people and thus makes the virus harder to stop. This dynamic is perhaps best illustrated by HIV , which is very difficult to transmit compared with smallpox and many other viruses. Intimate contact is needed, and even then, the infection rate is low. The balancing factor is that HIV can take years to progress to AIDS , which can then take many more years to kill the victim. What makes HIV so dangerous is that infected people have lots of opportunities to infect others. This property has allowed HIV to claim more than 30 million lives so far, and approximately 34 million people are now living with this virus and facing a highly uncertain future.15 A virus genetically engineered to infect its host quickly, to generate symptoms slowly—say, only after weeks or months—and to spread easily through the air or by casual contact would be vastly more devastating than HIV . It could silently penetrate the population to unleash its deadly effects suddenly. This type of epidemic would be almost impossible to combat because most of the infections would occur before the epidemic became obvious. A technologically sophisticated terrorist group could develop such a virus and kill a large part of humanity with it. Indeed, terrorists may not have to develop it themselves: some scientist may do so first and publish the details. Given the rate at which biologists are making discoveries about viruses and the immune system, at some point in the near future, someone may create artificial pathogens that could drive the human race to extinction. Indeed, a detailed species-elimination plan of this nature was openly proposed in a scientific journal. The ostensible purpose of that particular research was to suggest a way to extirpate the malaria mosquito, but similar techniques could be directed toward humans.16 When I’ve talked to molecular biologists about this method, they are quick to point out that it is slow and easily detectable and could be fought with biotech remedies. If you challenge them to come up with improvements to the suggested attack plan, however, they have plenty of ideas. Modern biotechnology will soon be capable, if it is not already, of bringing about the demise of the human race— or at least of killing a sufficient number of people to end high-tech civilization and set humanity back 1,000 years or more. That terrorist groups could achieve this level of technological sophistication may seem far-fetched, but keep in mind that it takes only a handful of individuals to accomplish these tasks. Never has lethal power of this potency been accessible to so few, so easily. Even more dramatically than nuclear proliferation, modern biological science has frighteningly undermined the correlation between the lethality of a weapon and its cost, a fundamentally stabilizing mechanism throughout history. Access to extremely lethal agents—lethal enough to exterminate Homo sapiens—will be available to anybody with a solid background in biology, terrorists included. TPP DA – 1NC Obama’s all in on TPP, but PC key to bring deal itself across congressional finish line – it’s the mother of all trade fights because its perceived as setting the new framework for ALL FUTURE TRADE DEALS Vinik, 15 -- Danny Vinik is a staff writer at The New Republic, New Republic, 4/8/15, http://www.newrepublic.com/article/121476/trans-pacific-partnership-foundation-all-future-tradedeals A theme runs through these four disagreements: They're overrated. The actual effects of the TPP are exaggerated. Labor unions warn about mass job losses and the Obama Administration touts the significant labor provisions in the law, but the academic evidence largely points to small job losses or gains. The left demands a chapter on currency manipulation while knowing that the 11 other TPP countries will never accept one without significant restrictions on the Federal Reserve. Even for Washington, a town where every policy decisions becomes a massive lobbying free-for-all, the TPP seems overblown. Until, that is, you consider what’s really at stake with the TPP. "I think its larger importance is trying to establish a new framework under which global trade deals will be done,” said Hanson. “Now that the [World Trade Organization] seems to be pretty much ineffective as a form for negotiating new trade deals, we need a new rubric." Looked at through that lens, it makes sense why both the unions and the Obama administration have spent so much political capital on the TPP. If the TPP sets the framework for future trade deals, it could be a long time before unions have the leverage again to push for a crackdown on currency manipulation. They understand, as the Obama Administration and many interest groups do, what much of the media doesn't: The TPP isn't just a 12-country trade deal. It's much bigger than that. When I shared this theory with Jared Bernstein, he began to rethink his position. “When you put it that way, I kind of feel myself being pulled back into the initial title of my post,” he said. “In other words, if this is the last big trade deal, then perhaps the absence of a currency chapter is a bigger deal than I thought.” If the TPP could determine the course of global trade for decades to come, then each interest group has a huge incentive to fight for every last policy concession. It explains why labor and business groups are putting huge amounts of money into this fight. That money and the accompanying rhetoric has only made it harder for policy journalists to cut through these complex debates. It may take decades before we really understand the stakes of the TPP. Freedom act passage changed the politics – any additional new surveillance limits uniquely drains PC Gross, 6/5 – Grant, Grant Gross covers technology and telecom policy in the U.S. government for the IDG News Service, and is based in Washington, D.C., IDG News Service, PC World, 6/5/15, http://www.pcworld.com/article/2932337/dont-expect-major-changes-to-nsasurveillance-from-congress.html Don't expect major changes to NSA surveillance from Congress After the U.S. Congress approved what critics have called modest limits on the National Security Agency’s collection of domestic telephone records, many lawmakers may be reluctant to further change the government’s surveillance programs. The Senate this week passed the USA Freedom Act, which aims to end the NSA’s mass collection of domestic phone records, and President Barack Obama signed the bill hours later. After that action, expect Republican leaders in both the Senate and the House of Representatives to resist further calls for surveillance reform. That resistance is at odds with many rank-and-file lawmakers, including many House Republicans, who want to further limit NSA programs brought to light by former agency contractor Edward Snowden. Civil liberties groups and privacy advocates also promise to push for more changes. It may be difficult to get “broad, sweeping reform” through Congress, but many lawmakers seem ready to push for more changes, said Adam Eisgrau, managing director of the office of government relations for the American Library Association. The ALA has charged the NSA surveillance programs violate the Fourth Amendment of the U.S. Constitution, which prohibits unreasonable searches and seizures. “Congress is not allowed to be tired of surveillance reform unless it’s prepared to say it’s tired of the Fourth Amendment,” Eisgrau said. “The American public will not accept that.” Other activists are less optimistic about more congressional action. “It will a long slog getting more restraints,” J. Kirk Wiebe, a former NSA analyst and whistleblower said by email. ”The length of that journey will depend on public outcry— that is the one thing that is hard to gauge.” With the USA Freedom Act, “elected officials have opted to reach for low-hanging fruit,” said Bill Blunden, a cybersecurity researcher and surveillance critic. “The theater we’ve just witnessed allows decision makers to boast to their constituents about reforming mass surveillance while spies understand that what’s actually transpired is hardly major change.” The “actual physical mechanisms” of surveillance programs remain largely intact. Blunden added by email. “Politicians may dither around the periphery but they are unlikely to institute fundamental changes.” Impact is multiple scenarios for conflict throughout asia and east asia – impact D and thumpers don’t apply – TPP is necessary AND sufficient condition, accesses every structural check – 11 reasons - Pivot Institutions and Rules that moderate and constrain Territorial disputes and escalation US regional leadership Perception and credibility of US regional commitment Perception and Regional credibility of US-Japan alliance effectiveness Economy Trade Economic interdependence Peaceful china rise and transition Rule of law Outweighs US military shift Economist 14. [11-15-14 --- http://www.economist.com/news/special-report/21631797-americaneeds-push-free-trade-pact-pacific-more-vigorously-americas-big-bet] Mr Froman, the trade tsar, puts TPP into a dauntingly ambitious context. He calls it central to America’s pivot to Asia, a chance to show the country’s commitment to creating institutions that moderate territorial disputes, and an opportunity to show emerging economies (meaning China) what economic rules the global economy should follow. “At a time when there is uncertainty about the direction of the global trading system, TPP can play a central role in setting rules of the road for a critical region in flux,” he says. The flipside of this is that failure becomes an even bigger risk, which Mr Froman acknowledges. Perhaps in an effort to prod a somnolent, introspective Congress into action, he makes the dramatic claim that failure could mean America “would forfeit its seat at the centre of the global economy”. Many pundits in Washington agree that American leadership in Asia is on the table. Michael Green of the Centre for Strategic and International Studies says TPP failure would “undermine the impression of the United States as a Pacific power and look like an abdication of leadership”. It would also take pressure off Japan and China to reform their economies. Mireya Solís, a Japan expert at the Brookings Institution, says it would be a “devastating blow to the United States’ credibility”. Those views are echoed in East Asia. Mr Tay in Singapore says TPP failure would be a disaster: “If the domestic issues of these two countries cannot be resolved, there is no sense that the US-Japan alliance can provide any kind of steerage for the region.” Deborah Elms, head of the Singapore-based Asian Trade Centre, suggests that so far the American pivot has manifested itself mainly as an extra 1,000 marines stationed in Australia. “Without TPP, all the pivot amounts to is a few extra boots on the ground in Darwin,” she says. Even members of America’s armed forces are worried. As one senior serving officer in the Pacific puts it, “the TPP unites countries that are committed to a trade-based future, transparency and the rule of law. It is the model that the United States and Europe have advanced versus that advanced by China. It is an opportunity to move the arc of Chinese development, or identify it as a non-participant.” Nuclear war Landay 00 (Jonathan S., National Security and Intelligence Correspondent, Knight Ridder/Tribune News Service, 3-10, Lexis) Few if any experts think China and Taiwan, North Korea and South Korea, or India and Pakistan are spoiling to fight. But even a minor miscalculation by any of them could destabilize Asia, jolt the global economy and even start a nuclear war. India, Pakistan and China all have nuclear weapons, and North Korea may have a few, too. Asia lacks the kinds of organizations, negotiations and diplomatic relationships that helped keep an uneasy peace for five decades in Cold War Europe. “Nowhere else on Earth are the stakes as high and relationships so fragile,” said Bates Gill, director of northeast Asian policy studies at the Brookings Institution, a Washington think tank. “We see the convergence of great power interest overlaid with lingering confrontations with no institutionalized security mechanism in place. There are elements for potential disaster.” In an effort to cool the region’s tempers, President Clinton, Defense Secretary William S. Cohen and National Security Adviser Samuel R. Berger all will hopscotch Asia’s capitals this month. For America, the stakes could hardly be higher. There are 100,000 U.S. troops in Asia committed to defending Taiwan, Japan and South Korea, and the United States would instantly become embroiled if Beijing moved against Taiwan or North Korea attacked South Korea. While Washington has no defense commitments to either India or Pakistan, a conflict between the two could end the global taboo against using nuclear weapons and demolish the already shaky international nonproliferation regime. In addition, globalization has made a stable Asia, with its massive markets, cheap labor, exports and resources, indispensable to the U.S. economy. Numerous U.S. firms and millions of American jobs depend on trade with Asia that totaled $600 billion last year, according to the Commerce Department. Advantage CP—MLATs 1NC Text: The United States federal government should pass comprehensive reforms to Mutual Legal Assistance Treaties including a substantial increasing in funding and establishing online request forms. The counterplan institutes key reforms to streamline MLATs – dramatically improves law enforcement cooperation Hill 15 (Jonah Force, writes on Internet policy and cybersecurity issues, and formerly served in the White House Office of the Cybersecurity Coordinator and as a Cybersecurity Teaching Fellow at Harvard, “Problematic Alternatives: MLAT Reform for the Digital Age,” Jan 28, http://harvardnsj.org/2015/01/problematic-alternatives-mlat-reform-for-the-digital-age/, CMR) V. Policy Recommendations These MLAT alternatives are potentially harmful to a robust and free Internet, and could be rendered unnecessary by appropriate MLAT reforms like the following. A. Increase MLAT funding Insufficient resources are a primary cause of MLAT backlogs. The United States must spend more money to make MLATs work for foreign law enforcement. America’s recent $24 million in new funding was necessary but insufficient. More MLAT requests will come in as criminal prosecutions increasingly focus on digital evidence. The United States is also entitled to expect other countries to spend more to expedite responses to American requests. Realistically, other nations must recognize that American prosecutors will turn to warrants like in Microsoft if their MLAT requests gather dust in foreign justice ministries. B. Issue unilateral guidelines for direct data requests Governments should issue unilateral, self-binding guidelines to limit prosecutors’ authority to bypass an applicable MLAT and compel production of electronic records stored outside their own jurisdiction. For instance, when the information sought is particularly sensitive (perhaps political or financial information) governments should unilaterally require that prosecutors use MLAT procedures. Further, once increased resources (recommendation #1) speed up the MLAT process, governments ought to consider instituting a “first use” constraint, requiring that law enforcement agencies try in good faith to use to the MLAT process prior to pursuing direct access. A “first use” constraint, of course, is likely to be politically palatable only among nations that adopt parallel reciprocal procedures. C. Streamline the MLAT process The MLAT review process should be reformed and streamlined. There are no online submission forms for MLAT requests today. MLATs must either be submitted by paper or by email to relevant authorities in a slow and cumbersome process. All nations with MLATs should create an online submission form and guide. As the President’s Review Group has noted, the current MLAT process also contains multiple, often redundant, request reviews. For instance, the U.S. DOJ’s Office of International Affairs and the U.S. Attorney’s Office must conduct separate, independent reviews. Such redundancies should be reevaluated for efficacy and necessity. D. Adopt industry-wide legal interpretations for data requests Major technology and Internet firms should seek industry-wide consensus on how to interpret national and international law on data collection from law enforcement authorities. This industry-wide statement will not necessarily alter the way in which governments seek to access data, but it will give law enforcement a sense of the types of requests that will be challenged versus the types of requests that are broadly seen as appropriate. This could help avoid unnecessary legal and political confrontations.[2] E. Renegotiate existing MLATs Tech sector innovation and data globalization has complicated former notions of jurisdiction. Nevertheless, agreement can be reached on key terms and principles in a sufficiently broad way as to avoid bottlenecks in the MLAT process. These key terms and principles must be incorporated into updated MLAT agreements. To ensure that MLATs keep pace with changing technologies, provisions dealing with data issues should be revisited frequently within multi-national working groups.[3] V. Conclusion Reforming the MLAT system is tremendously important to interstate law enforcement cooperation and the future of the global Internet more generally. If left unreformed, or reformed poorly, law enforcement and jurisdictional battles among and between governments and technology firms could place yet another strain on the already stressed global Internet system. By contrast, developing updated and efficient MLATs could pay enormous dividends, not only for law enforcement as it faces enormous international challenges, but also by serving as confidence-building measures as sovereign nations take on the task of resolution of other, even more difficult, global Internet policy challenges. The question is whether or not governments will take the steps necessary to expedite and modernize the MLAT system before alternatives do irreversible damage to the international system. Solvency 1NC Circumvention Ackerman 15 — Spencer Ackerman, national security editor for Guardian US, former senior writer for Wired, won the 2012 National Magazine Award for Digital Reporting, 2015 (“Fears NSA will seek to undermine surveillance reform,” The Guardian, June 1st, Available Online at http://www.theguardian.com/us-news/2015/jun/01/nsa-surveillance-patriot-act-congress-secret-law, Accessed 06-08-2015) The USA Freedom Act is supposed to prevent what Wyden calls “secret law”. It contains a provision requiring congressional notification in the event of a novel legal interpretation presented to the secret Fisa court overseeing surveillance. Yet in recent memory, the US government permitted the NSA to circumvent the Fisa court entirely. Not a single Fisa court judge was aware of Stellar Wind, the NSA’s post-9/11 constellation of bulk surveillance programs, from 2001 to 2004. Energetic legal tactics followed to fit the programs under existing legal authorities after internal controversy or outright exposure. When the continuation of a bulk domestic internet metadata collection program risked the mass resignation of Justice Department officials in 2004, an internal NSA draft history records that attorneys found a different legal rationale that “essentially gave NSA the same authority to collect bulk internet metadata that it had”. After a New York Times story in 2005 revealed the existence of the bulk domestic phone records program, attorneys for the US Justice Department and NSA argued, with the blessing of the Fisa court, that Section 215 of the Patriot Act authorized it all along – precisely the contention that the second circuit court of appeals rejected in May. Specifically true for LEADS act Rash 15 (Wayne, “U.S. Bill Would Ban DoJ Warrant for Email in Overseas Microsoft Server,” 2-14, http://www.eweek.com/cloud/u.s.-bill-would-ban-doj-warrant-for-email-in-oversears-microsoft-server2.html, CMR) However, if the LEADS Act were to be passed and signed by President Obama, there would be little choice. But of course that's the issue for the current administration, which so far has not hesitated to carry out actions of questionable legality, such as ignoring existing treaties to gain access to foreign emails. Would President Barack Obama sign the LEADS Act? Considering the level of support in both houses of Congress, he might realize that he has no choice, but the president might also dare Congress to override his veto. However, I don't think a veto for this bill is likely. It has strong bipartisan support in both houses. It's also presented as a way to update the Electronic Communications Privacy Act to reflect current technology, which the Obama administration has consistently said it favors. The act is also presented as a way to keep U.S. companies from breaking the law, which is pretty difficult for the president to oppose. "Law enforcement agencies wishing to access Americans' data in the cloud ought to get a warrant," Coons explained when the act was introduced, "and just like warrants for physical evidence, warrants for content under ECPA shouldn't authorize seizure of communications that are located in a foreign country. "The government's position that ECPA warrants do apply abroad puts U.S. cloud providers in the position of having to break the privacy laws of foreign countries in which they do business in order to comply with U.S. law. This not only hurts our businesses' competitiveness and costs American jobs, but it also invites reciprocal treatment by our international trading partners," Coons said. While there's every reason to believe that eventually federal prosecutors' demands that Microsoft disgorge emails stored abroad will be found contrary to existing law, the LEADS Act removes all doubt. Attempting to extend the reach of U.S. domestic laws to apply anywhere in the world is one of the worst types of overreach. This law would rein in the DoJ's excesses. Assuming, of course, the DoJ didn't decide to ignore that law as well. No retaliation or risk to competitiveness or relations – it’s exaggeration that glosses over existing protections Bharara 14 (Preet, United States Attorney Southern District of New York, “GOVERNMENT’S BRIEF IN SUPPORT OF THE MAGISTRATE JUDGE’S DECISION TO UPHOLD A WARRANT ORDERING MICROSOFT TO DISCLOSE RECORDS WITHIN ITS CUSTODY AND CONTROL,” July 9, http://cdn.arstechnica.net/wpcontent/uploads/2014/07/federalbrief-microsoftcase.pdf, CMR) Microsoft asserts that, unless the Government is required to use MLATs to obtain data stored abroad, U.S. foreign relations will be damaged and other countries will retaliate by asserting jurisdiction over electronic data stored here. (Br. 29). Aside from being purely speculative, such concerns are exclusively for the consideration of the political br anches and do not provide a sound basis to graft extra-statutory restrictions on duly enacted legislation. See generally Oetjen v. Cent. Leather Co. , 246 U.S. 297, 302 (1918) (“The conduct of the foreign relations of our Government is committed by the Constitution to the executive and legislative—‘the political’—departments of the government, and the propriety of what may be done in the exercise of this political power is not subject to judicial inquiry or d ecision.”). They do not provide a basis for challenging enforcement of a warrant validly issued under the SCA. Microsoft also argues that, unless its position is adopted, the U.S. technology sector stands to lose overseas customers who fear “the U.S. Government’s extraterritorial access to their user information.” (Br. 30). However, an SCA warrant permits the Government to access user information—wherever it may be stored—only after a neutral magistrate judge has found probable cause to believe that the information contains evidence of criminal activity. This is a time-tested manner by which the Government obtains evidence in criminal prosecutions, and nothing could be farther from an unchecked exercise of power. The form of legal process at issue is specifically designed to protect legitimate privacy interests, by requiring that a ny intrusion on those interests be properly justified by the need to uncover evidence of a crime. Competitiveness 1NC Current Freedom Act restores confidence CEA 15 (June 2, 2015, “Washington: CEA Praises Senate Passage of USA FREEDOM Act” http://www.ce.org/News/News-Releases/Press-Releases/2015-Press-Releases/CEA-Praises-SenatePassage-of-USA-FREEDOM-Act.aspx, ekr) The Consumer Electronics Association has issued the following news release: The following statement is attributed to Michael Petricone, senior vice president of government and regulatory affairs, Consumer Electronics Association (CEA)®, regarding the U.S. Senate’s passage of H.R. 2048, the Uniting and Strengthening America by Fulfilling Rights and Ensuring Effective Discipline Over Monitoring (USA FREEDOM) Act of 2015: “We welcome this important reform to U.S. intelligence gathering which takes critical steps to increase transparency and restore trust in American businesses, all while maintaining our commitment to preserving our national security. The bipartisan USA FREEDOM Act is common-sense reform to our nation’s intelligence gathering programs, which will preserve American businesses’ competitiveness worldwide, while continuing to protect our national security. “Following the Senate passage, the legislation now heads to the White House, where we anticipate swift action by President Obama to sign this legislation into law.” Competitiveness durable and free riding solves Fallows 10 – correspondent for The Atlantic Monthly, studied economics at Oxford University as a Rhodes Scholar. He has been an editor of The Washington Monthly and of Texas Monthly, and from 1977 to 1979 he served as President Jimmy Carter's chief speechwriter. His first book, National Defense, won the American Book Award in 1981; he has written seven others (James. “How America Can Rise Again”, Jan/Feb edition, http://www.theatlantic.com/doc/201001/american-decline) This is new. Only with America’s emergence as a global power after World War II did the idea of American “decline” routinely involve falling behind someone else . Before that, it meant falling short of expectations—God’s, the Founders’, posterity’s—or of the previous virtues of America in its lost, great days. “The new element in the ’50s was the constant comparison with the Soviets,” Michael Kazin told me. Since then, external falling-behind comparisons have become not just a staple of American self-assessment but often a crutch. If we are concerned about our schools, it is because children are learning more in Singapore or India; about the development of clean-tech jobs, because it’s happening faster in China. Having often lived outside the United States since the 1970s, I have offered my share of falling-behind analyses, including a book-length comparison of Japanese and American strengths (More Like Us) 20 years ago. But at this point in America’s national life cycle, I think the exercise is largely a distraction, and that Americans should concentrate on what are, finally, our own internal issues to resolve or ignore. Naturally there are lessons to draw from other countries’ practices and innovations; the more we know about the outside world the better, as long as we’re collecting information calmly rather than glancing nervously at our reflected foreign image. For instance, if you have spent any time in places where tipping is frowned on or rare, like Japan or Australia, you view the American model of day-long small bribes, rather than one built-in full price, as something similar to baksheesh, undignified for all concerned. Naturally, too, it’s easier to draw attention to a domestic problem and build support for a solution if you cast the issue in us-versus-them terms, as a response to an outside threat. In If We Can Put a Man on the Moon …, their new book about making government programs more effective, William Eggers and John O’Leary emphasize the military and Cold War imperatives behind America’s space program. “The race to the moon was a contest between two systems of government,” they wrote, “and the question would be settled not by debate but by who could best execute on this endeavor.” Falling-behind arguments have proved convenient and powerful in other countries, too. But whatever their popularity or utility in other places at other times, falling-behind concerns seem too common in America now. As I have thought about why overreliance on this device increasingly bothers me, I have realized that it’s because my latest stretch out of the country has left me less and less interested in whether China or some other country is “overtaking” America. The question that matters is not whether America is “falling behind” but instead something like John Winthrop’s original question of whether it is falling short—or even falling apart. This is not the mainstream American position now, so let me explain. First is the simple reality that one kind of “decline” is inevitable and therefore not worth worrying about. China has about four times as many people as America does. Someday its economy will be larger than ours. Fine! A generation ago, its people produced, on average, about one-sixteenth as much as Americans did; now they produce about one-sixth. That change is a huge achievement for China—and a plus rather than a minus for everyone else, because a business-minded China is more benign than a miserable or rebellious one. When the Chinese produce one-quarter as much as Americans per capita, as will happen barring catastrophe, their economy will become the world’s largest. This will be good for them but will not mean “falling behind” for us. We know that for more than a century, the consciousness of decline has been a blight on British politics, though it has inspired some memorable, melancholy literature. There is no reason for America to feel depressed about the natural emergence of China, India, and others as world powers. But second, and more important, America may have reasons to feel actively optimistic about its prospects in purely relative terms. The crucial american advantage Let’s start with the more modest claim, that China has ample reason to worry about its own future. Will the long-dreaded day of reckoning for Chinese development finally arrive because of environmental disaster? Or via the demographic legacy of the one-child policy, which will leave so many parents and grandparents dependent on so relatively few young workers? Minxin Pei, who grew up in Shanghai and now works at Claremont McKenna College, in California, has predicted in China’s Trapped Transition that within the next few years, tension between an open economy and a closed political system will become unendurable, and an unreformed Communist bureaucracy will finally drag down economic performance. America will be better off if China does well than if it flounders. A prospering China will mean a bigger world economy with more opportunities and probably less turmoil—and a China likely to be more cooperative on environmental matters. But whatever happens to China, prospects could soon brighten for America. The American culture’s particular strengths could conceivably be about to assume new importance and give our economy new pep. International networks will matter more with each passing year. As the one truly universal nation, the United States continually refreshes its connections with the rest of the world—through languages, family, education, business—in a way no other nation does, or will. The countries that are comparably open—Canada, Australia—aren’t nearly as large; those whose economies are comparably large—Japan, unified Europe, eventually China or India—aren’t nearly as open. The simplest measure of whether a culture is dominant is whether outsiders want to be part of it. At the height of the British Empire, colonial subjects from the Raj to Malaya to the Caribbean modeled themselves in part on Englishmen: Nehru and Lee Kuan Yew went to Cambridge, Gandhi, to University College, London. Ho Chi Minh wrote in French for magazines in Paris. These days the world is full of businesspeople, bureaucrats, and scientists who have trained in the United States. Today’s China attracts outsiders too, but in a particular way. Many go for business opportunities; or because of cultural fascination; or, as my wife and I did, to be on the scene where something truly exciting was under way. The Haidian area of Beijing, seat of its universities, is dotted with the faces of foreigners who have come to master the language and learn the system. But true immigrants? People who want their children and grandchildren to grow up within this system? Although I met many foreigners who hope to stay in China indefinitely, in three years I encountered only two people who aspired to citizenship in the People’s Republic. From the physical rigors of a badly polluted and still-developing country, to the constraints on free expression and dissent, to the likely ongoing mediocrity of a university system that emphasizes volume of output over independence or excellence of research, the realities of China heavily limit the appeal of becoming Chinese. Because of its scale and internal diversity, China (like India) is a more racially open society than, say, Japan or Korea. But China has come nowhere near the feats of absorption and opportunity that make up much of America’s story, and it is very difficult to imagine that it could do so —well, ever. Everything we know Or STEM shortage means US competitiveness is unsustainable Waldron ‘12 [Travis, reporter for ThinkProgress.org at the Center for American Progress Action Fund, “REPORT: How America’s Falling Share Of Global College Graduates Threatens Future Economic Competitiveness,” http://thinkprogress.org/economy/2012/08/21/722571/report-us-share-of-collegegraduates-dropped-over-last-decade-compared-to-china-india/] The United States’ share of global college graduates fell substantially in the first decade of the 21st century and stands to drop even more by 2020 as developing economies in China and India have graduated more college students, presenting challenges for American workers’ ability to remain competitive in a global economy in the future. The U.S. share of college graduates fell from nearly one-in-four to just more than one-in-five from 2000 to 2010, according to “The Competition That Really Matters,” a report from the Center for American Progress and The Center for the Next Generation: From 2000 to 2010, the U.S. share of college graduates fell to 21% of the world’s total from 24%, while China’s share climbed to 11% from 9%. India’s rose more than half a percentage point to 7%. Based on current demographic and college enrollment trends, we can project where each country will be by 2020: the U.S. share of the world’s college graduates will fall below 18% while China’s and India’s will rise to more than 13% and nearly 8% respectively. No impact to US competitiveness- it’s all hype Krugman ’11 [Paul, Nobel Prize-winning economist, professor of Economics and International Affairs at Princeton University, received his B.A. from Yale University in 1974 and his Ph.D. from MIT in 1977. He has taught at Yale, MIT and Stanford. At MIT he became the Ford International Professor of Economics, “The Competition Myth,” 1-24-11, http://www.nytimes.com/2011/01/24/opinion/24krugman.html?_r=0] Meet the new buzzword, same as the old buzzword. In advance of the State of the Union, President Obama has telegraphed his main theme: competitiveness. The President’s Economic Recovery Advisory Board has been renamed the President’s Council on Jobs and Competitiveness. And in his Saturday radio address, the president declared that “We can out-compete any other nation on Earth.” This may be smart politics. Arguably, Mr. Obama has enlisted an old cliché on behalf of a good cause, as a way to sell a much-needed increase in public investment to a public thoroughly indoctrinated in the view that government spending is a bad thing.¶ But let’s not kid ourselves: talking about “competitiveness” as a goal is fundamentally misleading. At best, it’s a misdiagnosis of our problems. At worst, it could lead to policies based on the false idea that what’s good for corporations is good for America.¶ About that misdiagnosis: What sense does it make to view our current woes as stemming from lack of competitiveness?¶ It’s true that we’d have more jobs if we exported more and imported less. But the same is true of Europe and Japan, which also have depressed economies. And we can’t all export more while importing less, unless we can find another planet to sell to. Yes, we could demand that China shrink its trade surplus — but if confronting China is what Mr. Obama is proposing, he should say that plainly.¶ Furthermore, while America is running a trade deficit, this deficit is smaller than it was before the Great Recession began. It would help if we could make it smaller still. But ultimately, we’re in a mess because we had a financial crisis, not because American companies have lost their ability to compete with foreign rivals.¶ But isn’t it at least somewhat useful to think of our nation as if it were America Inc., competing in the global marketplace? No.¶ Consider: A corporate leader who increases profits by slashing his work force is thought to be successful. Well, that’s more or less what has happened in America recently: employment is way down, but profits are hitting new records. Who, exactly, considers this economic success?¶ Still, you might say that talk of competitiveness helps Mr. Obama quiet claims that he’s antibusiness. That’s fine, as long as he realizes that the interests of nominally “American” corporations and the interests of the nation, which were never the same, are now less aligned than ever before.¶ Take the case of General Electric, whose chief executive, Jeffrey Immelt, has just been appointed to head that renamed advisory board. I have nothing against either G.E. or Mr. Immelt. But with fewer than half its workers based in the United States and less than half its revenues coming from U.S. operations, G.E.’s fortunes have very little to do with U.S. prosperity.¶ By the way, some have praised Mr. Immelt’s appointment on the grounds that at least he represents a company that actually makes things, rather than being yet another financial wheeler-dealer. Sorry to burst this bubble, but these days G.E. derives more revenue from its financial operations than it does from manufacturing — indeed, GE Capital, which received a government guarantee for its debt, was a major beneficiary of the Wall Street bailout.¶ So what does the administration’s embrace of the rhetoric of competitiveness mean for economic policy?¶ The favorable interpretation, as I said, is that it’s just packaging for an economic strategy centered on public investment, investment that’s actually about creating jobs now while promoting longerterm growth. The unfavorable interpretation is that Mr. Obama and his advisers really believe that the economy is ailing because they’ve been too tough on business, and that what America needs now is corporate tax cuts and across-the-board deregulation.¶ My guess is that we’re mainly talking about packaging here. And if the president does propose a serious increase in spending on infrastructure and education, I’ll be pleased.¶ But even if he proposes good policies, the fact that Mr. Obama feels the need to wrap these policies in bad metaphors is a sad commentary on the state of our discourse.¶ The financial crisis of 2008 was a teachable moment, an object lesson in what can go wrong if you trust a market economy to regulate itself. Nor should we forget that highly regulated economies, like Germany, did a much better job than we did at sustaining employment after the crisis hit. For whatever reason, however, the teachable moment came and went with nothing learned.¶ Mr. Obama himself may do all right: his approval rating is up, the economy is showing signs of life, and his chances of re-election look pretty good. But the ideology that brought economic disaster in 2008 is back on top — and seems likely to stay there until it brings disaster again. not key to heg Nuno P. Monteiro is an Assistant Professor of Political Science at Yale University, where he teaches International Relations theory and security studies. He earned his Ph.D. in Political Science from the University of Chicago in 2009. “ Theory of Unipolar Politics” (Cambridge University Press) April 2014 p. 14-17 At the same time, the debate on unipolar durability is almost exclusively focused on differential rates of economic growth and their determinants. Will China continue to grow faster than the United States, or will its economic development slow down or even stall? When will China's economy overtake that of the United States? What can the United States do to boost its own pace of economic growth?¶ Although these are important questions in their own right, they are nearly irrelevant for the durability of U.S. military power preponderance. The reason is simple: military power is not a side product of economic development. Rather, military power is the result of purposeful state action. Specifically, it is the product of a decision by a state to invest a fraction of the country's wealth into the production of military capabilities over time. As such, military power does not necessarily follow from economic growth.¶ Put in the context of a unipolar world in the nuclear age, this means that - independently from recurrent arguments about U.S. economic decline - the power preponderance of the United States is not set to end. But, again, nowhere in the literature do we have an argument laying out the conditions under which a unipolar distribution of military power is likely to end - or, on the contrary, to endure for a long time even in the presence of a shifting distribution of economic power. This book sets out to provide one such theory, refocusing the debate on unipolar durability from differential rates of economic growth to political decisions to invest in additional military capabilities. MLATs 1NC Organized crime resilient. Ayling 9 - Australian Research Council Centre of Excellence in Policing and Security, Regulatory Institutions, Julie, “Criminal organizations and resilience”, International Journal of Law, Crime and Justice 37 (2009) 182e196 Criminal organizations inhabit dynamic environments where the pressures of competition and state opposition constantly challenge their very existence. To survive and prosper, they must be sufficiently resilient to adapt to changing conditions arising from new competition, alterations in laws, policies and law enforcement practices, expansion or contraction of illegal markets and the availability of new technologies. Change may also result from internal conflicts: the organization may splinter, merge with other groups or reorganize (Weisel, 2002a). While the study of criminal organizations has not entirely overlooked resilience (see, for example, Williams, 2001; Kenney, 2006, 2007; Jackson, 2006; Bouchard, 2007), little attention has been paid to how resilience in criminal organizations develops. What is it about criminal organizations that have survived and flourished amid constant threat and frequent confrontation that has given them the resilience to do so? Organized crime doesn’t cause violence Igor V. Dubinsky, 2007, B.A.: Integrated Science, Advanced Physics, and Molecular/Genetic Biology, 2004, Northwestern University; J.D. Candidate, May 2007: DePaul University College of Law Winter, 2007, (DePaul Business & Commercial Law Journal, 5 DePaul Bus. & Comm. L.J. 379, COMMENT: How Bad Boys Turn Good: The Role of Law in Transforming Criminal Organizations Into Legitimate Entities by Making Rehabilitation An Economic Necessity, p. Lexis) Yet even an underground business must still operate as close as possible to the guidelines of the law - the further it deviates, the higher its costs. Destruction and gang wars may look like fun in movies, but they are generally unprofitable and cause increased prosecutions. n33 In both legal and illegal markets, "the best of all monopoly profits is a quiet life." n34 Instead of attempting competition in the same area, criminal organizations split up territories establishing cartels and geographic monopolies. n35 For example, it may be easier to kill a rival-drug selling mafia than to engage in product competition (manufacturing higher quality and cheaper drugs), but if this will lead to government prosecutions, rival mafia wars, or increased police enforcement, it may be cheaper to instead cartelize the industry or divide up the territory between the various suppliers. n36 The more murders the mafia commits, the more police and judges it has to bribe, and the more witnesses it has to kill. For example, when a Chicago drug ring leader was asked by one of his subordinates why he could not just shoot and kill competitors, he explained: "you've got to belong to a serious organization - you can't just tear [things] up. It's bad for business." n37 Thus a mafia behaves just like any other profit maximizing organization - seeking to minimize its costs and maximize its profits. However, unlike a legal organization, the mafia will use illegal means if the expected profits from those means are more than the expected profits from their legal counterparts. n38 As one Mafioso eloquently said in [*386] Mario Puzo's Godfather, "I don't like violence ... I'm a businessman; blood is a big expense." n39 No risk of pandemics – new advances Economist, 10 (11 22, http://www.economist.com/node/17493456) Fortunately, globalisation will also speed the flow of health data. In 2011 the growing field of digital epidemiology will attract more students, health officials and resources than ever before. People in viral hotspots around the world will report suspicious human and animal deaths (often a warning sign of a coming plague) by mobile phones. These data will be posted to the web, instantly enriching the data that came from traditional surveillance systems and electronic medical records. Organisations like Google.org will scour search patterns around the world, expanding their search-based predictions of influenza to other infectious diseases. Still more creative early-detection systems will begin to pull together allowing us to see changing disease patterns before they make the morning news. Novel laboratory approaches to the discovery of new viruses will emerge. The longillness information present in social-networking sites like Facebook and Twitter, awaited era of single-molecule DNA sequencing will begin in earnest with new machines from companies like Pacific Biosciences, and with a bit of luck this will improve the speed at which we can recognise unknown bugs. At the cutting edge, new studies of virus evolution and chips housing tiny cell cultures will improve our capacity to sort through the viral chatter and determine if a newly identified outbreak has the potential to spread globally or is likely to fade away. The discovery of new viruses will make the move from universities to laboratories around the world, helping to facilitate international scientific collaboration and decrease fears of biopiracy. Towards a global immune system In 2011 you may be among those who will watch “Contagion”, a forthcoming movie about a frightening fictional pandemic. But whether you are a head of state wary of the political and economic costs of a disease catastrophe, a CEO concerned by supplychain and staff disruption associated with the next pandemic or a citizen worried about your family, in 2011 you will have access to better, more accurate and rapidly available data on actual In the increasingly popular Silicon Valley model, organisations like ours will mash up multiple data sources—combining lab results in far-flung viral listening-posts with international news feeds, text messages, social-networking and search patterns to create a new form of epidemic intelligence. The past ten years have seen noteworthy progress in the development of truly global systems. In the world of outbreaks, 2011 will mark the beginning of the development of a worldwide immune system that will detect and respond to biological threats before they go global. Although this will take years to build fully, if successful it could make pandemic anniversaries a thing of the past. outbreaks. Biodiversity is resilient and inevitable Sagoff 8 Mark, Senior Research Scholar @ Institute for Philosophy and Public Policy @ School of Public Policy @ U. Maryland, Environmental Values, “On the Economic Value of Ecosystem Services”, 17:2, 239-257, EBSCO Biodiversity represents nature's greatest largess or excess since species appear nearly as numerous as the stars the Drifters admired, except that "scientists have a better understanding of how many stars there are in the galaxy than how many species there arc on Earth."70 Worldwide the variety of biodiversity is effectively infinite ; the myriad species of plants and animals, not to mention microbes that arc probably more important, apparently exceed our ability to count or identify them. The "next" or "incremental" thousand species taken at random would not fetch a market price because another thousand are immediately available, and another thousand after that. No one has suggested an economic application, What about the economic value of biodiversity? moreover, for any of the thousand species listed as threatened in the United States.77 To defend these species - or the next thousand or the thousand after that - on economic grounds is to trade convincing spiritual, aesthetic, and ethical arguments for bogus, pretextual, and disingenuous economic ones.78 As David Ehrenfeld has written, We do not know how many [plant] species are needed lo keep the planet green and healthy, but it seems very unlikely to be anywhere near the more than quarter of a million we have now. Even a mighty dominant like the American chestnut, extending over half a continent, all but disappeared without bring¬ing the eastern deciduous forest down with it. And if we turn to what biologist is willing to find a value - conventional or ecological - for all 600,000-plus species of beetles?7* the invertebrates, the source of nearly all biological diversity, The disappearance in the wild even of agriculturally useful species appears to have no effect on production. The last wild aurochs, the progenitor of dairy and beef cattle, went extinct in Poland in 1742, yet no one believes the beef industry is threatened. The genetic material of crop species is contained in tens of thousands of landraces and cultivars in use - rice is an example - and does not depend on the persistence of wild ancestral types. Genetic engineering can introduce DNA from virtually any species into virtually any other - which allows for the unlimited creation of biodiversity. A neighbor of mine has collected about 4,000 different species of insects on his two-acre property in Silver Spring, Maryland. These include 500 kinds of Lepidoptera (mostly moths) - half the number another entomologist found at his residence.80 When you factor in plants and animals, the amount of "backyard biodiversity" in suburbs is astounding and far Biodiversity has no value "at the margin" because nature provides far more of it than anyone could possibly administer. If one kind of moth flies off, you can easily attract hundreds of others. greater than you can imagine.8' US – EU Relations 1NC No impact to US/European relations Haas 11—president of the CFR Lecturer in public policy, Harvard. DPhill, Oxford (17 June 2011, Richard, Why Europe No Longer Matters, http://www.cfr.org/europerussia/why-europe-no-longermatters/p25308) Gates sounded a pessimistic note, warning of "the real possibility for a dim if not dismal future for the transatlantic alliance." Yet, the outgoing Pentagon chief may not have been The U.S.-European partnership that proved so central to managing and winning the Cold War will inevitably play a far diminished role in the years to come. To some extent, we're already there: If NATO didn't exist today, would anyone feel compelled to create it? The honest, if awkward, answer is no. In the coming decades, Europe's influence on affairs beyond its borders will be sharply limited, and it is in other regions, not Europe, that the 21st century will be most clearly forged and defined. Certainly, one reason for NATO's increasing marginalization stems from pessimistic enough. the behavior of its European members. The problem is not the number of European troops (there are 2 million) nor what Europeans collectively spend on defense ($300 billion a year), With NATO, the whole is far less than the sum of its parts. Critical decisions are still made nationally; much of the talk about a common defense policy remains just that -- talk. There is little specialization or coordination. Missing as well are many of the logistical and intelligence assets needed to project military force on distant battlefields. The alliance's effort in Libya -- the poorly conceived intervention, the but rather how those troops are organized and how that money is spent. widespread refusal or inability to participate in actual strike missions, the obvious difficulties in sustaining intense operations -- is a daily reminder of what the world's most powerful With the Cold War and the Soviet threat a distant memory, there is little political willingness, on a country-by-country basis, to provide adequate public funds to the military. (Britain and France, which each spend more military organization cannot accomplish. than 2 percent of their gross domestic products on defense, are two of the exceptions here.) Even where a willingness to intervene with military force exists, such as in Afghanistan, where upward of 35,000 European troops are deployed, there are severe constraints. Some governments, such as Germany, have historically limited their participation in combat operations, while the cultural acceptance of casualties is fading in many European nations. But it would be wrong, not to mention fruitless, to blame the Europeans and their choices alone. There are larger historical forces contributing to the continent's increasing irrelevance to world affairs. Ironically, Europe's own notable successes are an important reason that transatlantic ties will matter less in the future. The current euro zone financial crisis should not obscure the historic accomplishment that was the building of an integrated Europe over the past half-century. The continent is largely whole and free and stable. Europe, the principal arena of much 20th-century geopolitical competition, will be spared such a role in the new century -- and this is a good thing. The contrast with Asia could hardly be more dramatic. Asia is increasingly the center of gravity of the world economy; the historic question is whether this dynamism can be managed peacefully. The major powers of Europe -- Germany, France and Great Britain -- have reconciled, and the regional arrangements there are broad and deep. In Asia, however, China, Japan, India, Vietnam, the two Koreas, Indonesia and others eye one another warily. Regional pacts and arrangements, especially in the political and security realms, are thin. Political and economic competition is unavoidable; military conflict cannot be ruled out. Europeans will play a modest role, at best, in influencing these developments. If Asia, with its dynamism and power struggles, in some ways resembles the Europe of 100 years ago, the Middle East is more reminiscent of the Europe of several centuries before: a patchwork of top-heavy monarchies, internal turbulence, unresolved conflicts, and nationalities that cross and contest Political and demographic changes within Europe, as well as the United States, also ensure that the transatlantic alliance will lose prominence. In Europe, the E.U. project still consumes the attention of many, but for others, especially those in southern Europe facing unsustainable fiscal shortfalls, domestic economic turmoil takes precedence. No doubt, Europe's security challenges are geographically, politically and psychologically less boundaries. Europe's ability to influence the course of this region, too, will be sharply limited. immediate to the population than its economic ones. Mounting financial problems and the imperative to cut deficits are sure to limit what Europeans can do militarily beyond their ties across the Atlantic were forged at a time when American political and economic power was largely in the hands of Northeastern elites, many of whom traced their ancestry to Europe and who were most interested in developments there. Today's United States -- featuring the rise of the South and the West, along with an increasing percentage of Americans who trace their roots to Africa, Latin America or Asia -- could hardly be more different. American and European preferences will increasingly diverge as a result. Finally, the very nature of international relations has continent. Moreover, intimate also undergone a transformation. Alliances, whether NATO during the Cold War or the U.S.-South Korean partnership now, do best in settings that are highly inflexible and predictable, where foes and friends are easily identified, potential battlefields are obvious, and contingencies can be anticipated. Almost none of this is true in our current historical moment. Threats are many and diffuse. Relationships seem situational, increasingly dependent on evolving and unpredictable circumstances. Countries can be friends, foes or both, depending on the day of the week -- just look at the United States and Pakistan. Alliances tend to require shared assessments and explicit obligations; they are much more difficult to operate when worldviews diverge and commitments are discretionary. But as the conflicts in Iraq, Afghanistan and now Libya all demonstrate, this is precisely the world we inhabit. For the United States, the no amount of harping on what European governments are failing to do will push them toward what some in Washington want them to do. They have changed. We have changed. The world has changed. Second, NATO conclusions are simple. First, as a whole will count for much less. Instead, the United States will need to maintain or build bilateral relations with those few countries in Europe willing and able to act in the world, including with military force. Third, other allies are likely to become more relevant partners in the regions that present the greatest potential challenges. In Asia, this might mean Australia, India, South Korea, Japan and Vietnam, especially if U.S.-China relations were to deteriorate; in the greater Middle East, it could again be India in addition to Turkey, Israel, Saudi Arabia and others. EU/US relations resilient Joyner 11—editor of the Atlantic Council. PhD in pol sci (James, Death of Transatlantic Relationship Wildly Exaggerated, 14 June 2011, www.acus.org/new_atlanticist/death-transatlantic-relationshipwildly-exaggerated) The blistering farewell speech to NATO by U.S. defense secretary Robert Gates warning of a "dim, if not dismal" future for the Alliance drew the Western public's attention to a longstanding debate about the state of the transatlantic relationship. With prominent commenters voicing concern about much more than just a two-tiered defensive alliance, questioning whether the U.S.-Europe relationship itself is past its prime, doubts that the fears are overblown, and may be mistaking short-term bumps in the relationship for proof of a long-term decline that isn't there. Gates' frustration with the fact that only five of the 28 Western alliance that has dominated the post-Cold War world are reaching a new high. But those NATO allies are living up to their commitment to devote 2 percent of GDP to defense, which has hindered their ability to take on even the likes of Muammar Qaddafi's puny force without American assistance is certainly the U.S.-Europe partnership may not be living up to its potential, it is not worthless, and that relationship continues to be one of the strongest and most important in the world. Gates is an Atlanticist whose speech was, as he put it, "in the spirit of solidarity and friendship, legitimate and worrying. Though with the understanding that true friends occasionally must speak bluntly with one another for the sake of those greater interests and values that bind us together." He wants the Europeans, Germany in particular, to Europeans don't see their security as being in jeopardy and political leaders are hard pressed to divert scarce resources away from social spending -- especially in the current economic climate -- a dynamic that has weakened NATO but, despite fears to the contrary, not the greater Transatlantic partnership. It would obviously have been a great relief to the understand what a tragedy it would be if NATO were to go away. Most U.S. if European governments had shouldered more of the burden in Afghanistan. This disparity, which has only increased as the war has dragged on and the European economies suffered, is driving both Gates' warning and broader fears about the declining relationship. But it was our fight, not theirs; they were there, in most cases against the strong wishes of the people who elected them to office, because we asked. We'd have fought it exactly the same way in their absence. In that light, every European and Canadian soldier was a bonus. Libya, however, is a different story. The Obama administration clearly had limited interest in entering that fight - Gates himself warned against it -- and our involvement is due in part to coaxing by our French and British allies. The hope was to take the lead in the early days, providing "unique assets" at America's disposal, and then turn the fight over to the Europeans. But, as Gates' predecessor noted not long after the ill-fated 2003 invasion of Iraq, you go to war with the army you have, not the one you wish you had. The diminished capabilities of European militaries, spent by nearly a decade in Afghanistan, should be of no surprise. NATO entered into Libya with no real plan for an end game beyond hoping the rebels would somehow win or that Qaddafi would somehow fall. That failure, to be fair, is a collective responsibility, not the fault of European militaries alone. But the concern goes deeper than different defensive priorities. Many Europeans worry that the United States takes the relationship for granted, and that the Obama administration in particular puts a much higher priority on the Pacific and on the emerging BRICS (Brazil, Russia, India, China, and South Africa) economies. New York Times columist Roger Cohen recently wrote that this is as it should be: "In so far as the United States is interested in Europe it is interested in what can be done together in the rest of the world." In Der Spiegel, Roland Nelles and Gregor Peter Schmitz lamented, "we live in a G-20 world instead of one led by a G-2." It's certainly true that, if it ever existed, the Unipolar Moment that Charles Krauthammer and others saw in the aftermath of the Soviet collapse is over. But that multipolar dynamic actually makes transatlantic cooperation more, not less, important. A hegemon needs much less help than one of many great powers, even if it remains the biggest. Take the G20. Seven of the members are NATO Allies: the US, Canada, France, Germany, Italy, the UK, and Turkey. Toss in the EU, and you have 40 percent of the delegation. If they can form a united front at G-20 summits, they are much more powerful than if each stands alone. Add in four NATO Partner countries (Russia, Japan, Australia, and South Korea) and you're up to 60 percent of the delegation -- a comfortable majority for the U.S.-European partnership and its circle of closest allies. Granted, it's unlikely that we'll achieve consensus among all 12 states on any one issue, let alone most issues. But constantly working together toward shared goals and values expands a sense of commonality. And, like so many things, projects end. Indeed, that's generally the goal. The transatlantic military alliance that formed to defeat fascism remained intact after victory; indeed, it expanded to NATO outlasted the demise of its raison d'être, the Soviet threat, and went on to fight together --along with many of its former adversaries -- in Bosnia, Kosovo, Afghanistan, and Libya. Is there seriously any doubt that other challenges will emerge in the future in which the Americans and its European allies might benefit from working together? include its former German and Italian adversaries. Or alt causes swamp – warming disputes make it inevitable - energy is the litmus test Koryani, 11—Hungarian diplomat, former Undersecretary of State, foreign policy and energy expert. He is also the Deputy Director of the Dinu Patriciu Eurasia Center of the Atlantic Council of the United State (David [Editor], Tranatlantic Energy Futures, 2011, http://transatlantic.saisjhu.edu/publications/books/Transatlantic_Energy_Futures/Transatlantic_Energy_Futures.pdf) Critical factors of divergence cannot be discounted either, as they have an almost equally strong pull. Differing climate change perceptions and the lack of U.S. commitment and action is extremely dangerous, as it alienates Europeans, both policymakers and the wider public alike. These differences, if not solved, could drive a wedge for decades between the partners, undermine trust, create a value gap and hinder cooperation not only in climate change and energy issues but in all other aspects as well. There is in fact a chance that U.S. and European energy markets could largely decouple in coming years, due in part to differences regarding the need to tackle climate change, and in part to diverging geopolitical and domestic trends. The U.S. has edged closer to self sufficiency with respect to fossil fuels, with the extensive development of its vast unconventional gas resources and increasing reliance on Canadian oil sands. This could lead to a more isolationist stance in U.S. policy . Meanwhile unconventional gas faces mixed reactions in Europe; the EU, for example, plans to shun oil shales and tar sands in its impending Fuel Quality Directive. Friction in transatlantic perceptions on energy security and divergences over preferred courses of action are real dangers that must be addressed head on. Towards a Transatlantic Energy Alliance The systemic transformation of the world of energy, triggered by climate change and powered by new technologies, will likely cause the reorganization of our societies. The benefits and pitfalls of transatlantic cooperation are beyond doubt. Renewing the transatlantic community’s leadership is essential to lead the world to a sustainable, low carbon future. Transatlantic cooperation can contribute to provide secure and affordable energy to people in the EU and the U.S., foster economic prosperity and create jobs. Current cooperation on a wide range of subjects is encouraging but inadequate. What we need is a new impetus, genuine political will, adequate resources and enhanced cooperation to advance a transatlantic green economy. Joint efforts in addressing climate change, innovation and investment into clean energy technologies, risk sharing and cost reduction, joint RD&D and harmonized energy diplomacy must be the cornerstones of a Transatlantic Energy Alliance. A Transatlantic Energy Alliance is desirable and feasible, but not self-evident. Climate change and energy cooperation will be the litmus test of converging or diverging European and American norms, values and interests in the 21st century. We have to bridge our differences and we have to do that quickly in order to remain in the driving seat. To amend Robert Kagan’s famous line, Americans may be from Mars and Europeans from Venus, but we shall all soon need to move to some other planet if we do not adjust course. Transatlantic Energy Futures endeavors to give you a taste of the intricate and multifaceted energy challenges facing our communities. It aims to do so with a strong conviction in the enduring prominence and necessity of the transatlantic partnership. Relations and coop high now Mason ‘15 (Jeff Mason covers the White House for Reuters. He was the lead correspondent for President Barack Obama's 2012 campaign and has been posted in Washington since 2008, when he covered the historic race between Obama, Hillary Clinton and John McCain, traveling with all three candidates. Jeff has also been posted in Frankfurt, Germany, where he covered the airline industry and Brussels, Belgium, where he covered climate change and the European Union. He has appeared on MSNBC, CNN, BBC, and NPR. Jeff is a graduate of Northwestern University and a former Fulbright scholar, http://www.reuters.com/article/2015/06/06/us-g7-summit-obama-idUSKBN0OM0OJ20150606 When President Barack Obama attends the Group of Seven summit in Germany on Sunday, he will join fellow leaders who are growing accustomed to a new dynamic in the transatlantic relationship: less direction from Washington, more demands on Europe. In responding to Russia's intervention in Ukraine, the crisis in Libya and efforts to advance Middle East peace, European leaders have stepped up their role after a real or perceived sense that the United States was drawing back. The shift has created both annoyance and satisfaction among European officials. Some privately express frustration at what they view as reluctance by the Obama administration to get involved. They contrast a "leading from behind" strategy in the Middle East and Europe with the more proactive U.S. stance in Asia, where Obama is acting diplomatically and militarily to counter growing Chinese influence. France has publicly berated the U.S. administration for not launching air strikes in 2013 against Syrian President Bashar al-Assad. It said that the decision caused irreparable damage to the Syrian opposition on the ground and emboldened Russian President Vladimir Putin on the international scene. "At the heart of what’s going on is that the Americans themselves don’t want to be on the front line in this region" a senior French official said. The phrase "leading from behind" grew out of the 2011 NATO intervention in Libya when Washington let France and Britain do most of the heavy military lifting. DIVISION OF LABOR Other diplomats and U.S. officials say France and Germany's leading role in talks between Moscow and Kiev, which led to a shaky ceasefire deal in eastern Ukraine, was appropriate for a crisis that hits them closer to home. "It's not a question of ceding responsibility, it's the natural division of labor between us," said David O'Sullivan, the European Union's ambassador to the United States. Other areas, however, have been hurt by a lack of U.S. leadership, foreign policy analysts said. Stephen Hadley, Republican President George W. Bush's national security adviser, said it was very attractive to Russia not to have the United States at the table in the Ukraine ceasefire talks. He noted that Europeans were eyeing a new approach to peace between Israelis and Palestinians by potentially backing a U.N. resolution for a Palestinian state. "Overhanging this, of course, is this perception of American disengagement and stepping back from leadership on a lot of problems in the world, which is a perception that our Arab friends and allies have in the Middle East and, you know, I think is very much prevalent in Europe," he said. "STRONG ALIGNMENT" The White House rejects that charge, which is voiced by many Republican critics. It points to U.S.-European unity on Iran's nuclear program, global climate change negotiations, strikes against Islamic State militants, and sanctions against Russia. "If you look at the president’s key foreign policy priorities, every single one of them, just about, is supported by these key European partners," Obama's deputy national security adviser Ben Rhodes said. "I think this is a moment of very strong alignment with Europe." That alignment has not translated into pro-American sentiment in Germany, which is hosting the G7 summit. Germans remain angry at U.S. spying practices, an issue German Chancellor Angela Merkel has raised repeatedly with Obama. In an effort to set a more positive tone, Obama and Merkel will spend some public time together before the summit on Sunday, walking around a small village and sampling local food. The United States has openly talked about the need for Europe to step up militarily and has recently reiterated a long-standing message that its NATO partners must boost their military spending. 2AC TPP DA No link – no reason obama pushes plan or gets blamed Not intrinsic – logical policy maker could do both Uniqueness overwhelms - TPP Passage Guaranteed – even opponents are conceding Werner, 6/24 – Erica, Reporter @ Associated Press, Boston Herald, 6/24/15, http://www.bostonherald.com/news_opinion/national/2015/06/senate_vote_moves_o bamas_trade_agenda_to_brink_of_enactment Some anti-free-trade groups, however, essentially conceded defeat. "Fast track makes it virtually certain that the Trans-Pacific Partnership (TPP), Trade in Services Agreement (TISA), and other secret trade deals will become law," said the "Internet-freedom" group Fight for the Future. Tuesday's Senate vote was as painful for the AFL-CIO and other unions as it was welcomed by the White House. Many corporate, agricultural and manufacturing groups cheered. No spillover – issues stay compartmentalized – anger at obama over unrelated issue won’t trump trade specific ideological preferences, electoral calculations and lobbying Fiat double bind - A) it’s a magic wand – plan passes immediately without debate – doesn’t require pc, or - B) normal means is bottom of docket and it passes after TPP No Asia War *best data proves *state legitimacy, growth, deterrence check *no major war, even if minor disputes Alagappa 12-19-14 (Muthiah Alagappa, Nonresident Senior Associate, Carnegie Endowment for International Peace, Washington, D.C., “International Peace in Asia: Will it Endure?,” http://www.theasanforum.org/international-peace-in-asia-will-it-endure/, CMR) In contrast to those dire warnings, this article makes two claims. First, Asia has witnessed a substantial reduction in the number of major and minor inter-state wars. After reaching a peak in the 1970s, major inter-state war has declined in number, frequency, and intensity measured in terms of battle deaths. From 1979 to 2014, there were only two major inter-state wars compared to 13 in 1945 to 1979. Connected to earlier wars, the nature, purpose, scope, and outcome of these wars since 1979 reinforce rather than undermine my central claim that Asia has witnessed substantial decline in major wars.6 It has even enjoyed a long period of peace, comparable in duration, nature, and complexity to the “long peace” of the Cold War in Europe.7 Second, the long peace in Asia will continue in the foreseeable future. Entrenched conflicts will likely remain unresolved with a few becoming even more acute. The Asian strategic environment will become more complex with growing economic interdependence, cross-cutting links, and some new security challenges. And, armed clashes cannot be ruled out. Nevertheless, major war in Asia is unlikely in the coming decade or two. I made these claims about a decade ago.8 I am now even more convinced and set them out in this article to balance the growing chorus—now, also in Asia—of conflict and war in Asia. What explains the substantial decline in the frequency of major war in Asia and the claim that the inter-state peace that has endured in Asia since 1979 will continue in the foreseeable future? These are the central questions animating this article, which advances three related arguments: 1. Decline in the number and intensity of inter-state wars in Asia since 1979 is due largely to the growing legitimacy of the Asian political map, rising nationalism, focus on and success in economic growth, and the development of effective deterrence in relevant dyads. Together, these developments reduced the salience as well as altered the role of force, more specifically war, in the international politics of Asia. 2. Factors that underpinned the decreasing frequency of inter-state war will continue to be salient in the foreseeable future and sustain the long peace in Asia. A development that could substantially alter the strategic environment would be a shift in military technology and strategy from deterrence to offense. Such a shift would make war more costly, but also restore it as a rational instrument of policy in pursuit of certain political objectives. 3. The international peace that has prevailed in Asia, as in Europe during the Cold War, is of the minimal type (absence of major war but not devoid of competition, conflict, minor war, and military incidents). That is unlikely to change in the foreseeable future. Stronger peace would require resolution of outstanding disputes, which appears unlikely. Pivot fails---too diluted and doesn’t solve US leadership Rod Lyon 15, fellow at Australian Strategic Policy Institute and executive editor of The Strategist, “The Real Problem With America's Rebalance to Asia: A Crisis of Expectations,” 1/16/15, http://nationalinterest.org/blog/the-buzz/the-real-problem-americas-rebalance-asiacrisis-expectations-12050 rebalance is occurring but its effects are somewhat diluted by an even larger global shift within the US defense force—after Afghanistan and Iraq, a smaller emphasis on forwarddeployed forces and a larger one on reconstitution of US surge-force capabilities.¶ The second source In Work’s view, the is the majority staff report prepared for the US Senate Foreign Relations Committee back in April 2014. That report looked in greater detail at the non-military side of the rebalance—including diplomacy and aid—and in general found a set of policy even less well-resourced than the military effort. The East Asia and Pacific Bureau in the State Department, for example, had 12% less funding in 2014 than it had back in 2011.¶ So yes, the rebalance exists. But it struggles for oxygen, in part because of the broader strategic baggage carried by the president. Moreover, substantial parts of the rebalance will take time to unfold—it’s not designed to address allies’ and partners’ demands for instant gratification and constant assurance. And, even when it’s run its course, the rebalance isn’t going to restore the regional status quo ante China’s rise.¶ ¶ It’s that last point that highlights the extent to which the rebalance faces what we might call a crisis of expectations. Since instruments that were different people believe it was meant to do different things, they judge it by different standards. Some of those metrics strike me as unrealistic. For example, it’s perfectly true that even after the rebalance is completed, the US’ position in the region won’t be restored to what it was in the glory days of the 1990s. But the rebalance was never intended to do that. It wasn’t meant to reverse the rise of the Asian great powers, nor to roll back the tides of history.¶ Similarly, the rebalance was never intended to suggest that the US was happy to ignore what went on in Europe and the Middle East. Washington might have thought it was overweight in those areas, but it certainly didn’t think they were irrelevant. So have events in Ukraine, Syria and Iraq distracted the US from Asia? Of course. But the US is a global player, not just a regional one. ¶ The rebalance, even if merely one variable in a shifting strategic landscape. By itself, it won’t return the US to the position of the ‘indispensable player’ in Asia. Still, its principal value lies in the fact that the policy strengthens successful, is Washington’s ties to Asia. And that’s why Australia should want the rebalance to succeed: because its various components— including a comprehensive TPP agreement, a military reorientation into the region, and US membership of key regional institutions—will mean a US more closely engaged with both our and the region’s strategic future. TPP perceived as containment by China Backer 14 (Larry Cata Backer, Richard and Mary Eshelman Faculty Scholar & Prof essor of Law, Professor of International Affairs, 2012–13 Chair, University Fa culty Senate, The Pennsylvania State University, “The Trans-Pacific Partnership,” http://openscholarship.wustl.edu/cgi/viewcontent.cgi?article=1473&context=law_globalstudies, CMR) Indeed, Wen Jin Yuan notes the sense among Chinese academic and policy circles that “the main reason behind for the TPP agenda is the US’s desire to use the TPP as a tool to economically contain China’s rise.” 128 Wen notes, for example, reports published in the People’s Daily , the official organ of the Chinese Communist Party, that refer to TPP as “superficially an economic agreement but contain[ing] an obvious political purpose to constrain China’s rise.” 129 More importantly, a successfully negotiated TPP would result, according to other Chinese scholars, in trade diversion to the detriment of Chinese economic interests. 130 Yet, according to Wen’s research, United States officials insist that the ultimate goal of the United States was not the Obama Administr ation’s support containment, but incorporation. The “U.S.’s ultimate goal is to integrate China into this regional trade system, rather t han keeping China out, and the TPP initiative is actually similar to the strategy led by several U.S. agencies to incorporate China into the WTO sys tem.” 131 Yet incorporation can be understood from the Chinese side as another form of containment. Rather than have China lead a new effort at refining the rules and culture of trade in the Pacific, it would be forced to part icipate as a junior partner in a regulatory exercise directed by the United St ates and its principal ally, Japan. For the Chinese, the substantial effe ct might well be understood as containment, though that view/perception is lost on the United States. 132 Nuclear war Eland 5—MBA in economics, PhD in Public Policy, Senior Fellow and Director of the Center on Peace & Liberty at The Independent Institute (Ivan, 11 April 2005, Coexisting with a Rising China?, http://www.independent.org/NEWSROOM/ARTICLE.ASP?ID=1494, RBatra) Instead of emulating the policies of pre-World War I Britain toward Germany, the United States should take a page from another chapter in British history. In the late 1800s, although not without tension, the British peacefully allowed the fledging United States to rise as a great power, knowing both countries were protected by the expanse of the Atlantic Ocean that separated them. Taking advantage of that same kind separation by a major ocean, the United States could also safely allow China to obtain respect as a great power, with a sphere of influence to match. If China went beyond obtaining a reasonable sphere of influence into an Imperial Japanese-style expansion, the United States could very well need to mount a challenge. However, at present, little evidence exists of Chinese intent for such expansion, which would run counter to recent Chinese history. Therefore, a U.S. policy of coexistence, rather than neo-containment, might avoid a future catastrophic war or even a nuclear conflagration. TPP CRUSHES the environment and results in overfishing *uniquely worse than previous trade pacts Howard 14 (Brian Clark, “4 Ways Green Groups Say Trans-Pacific Partnership Will Hurt Environment,” Jan 17, http://news.nationalgeographic.com/news/2014/01/140117-trans-pacific-partnership-freetrade-environment-obama/) A leaked draft of a major free trade agreement among the United States, Canada, Mexico, and nations on the Pacific Rim raises alarming questions about environmental protections, several leading green groups say. "If the environment chapter is finalized as written in this leaked document, President Obama's environmental trade record would be worse than George W. Bush's," Michael Brune, executive director of the Sierra Club, said in a statement after a draft of the agreement was published Wednesday on WikiLeaks. "This draft chapter falls flat on every single one of our issues— oceans, fish, wildlife, and forest protections—and in fact, rolls back on the progress made in past free trade pacts," he said. The proposed Trans-Pacific Partnership is a huge pact that would govern about 40 percent of the world's gross domestic product and one-third of world trade, said Jake Schmidt, international climate policy director for the Natural Resources Defense Council (NRDC). The agreement involves a sprawling cast of countries: Australia, Brunei, Chile, Japan, Malaysia, New Zealand, Peru, Singapore, Vietnam, Canada, Mexico, and the U.S. The NRDC joined with the Sierra Club and WWF in criticizing the leaked draft of the environment chapter of the Trans-Pacific Partnership, which WikiLeaks publisher Julian Assange said proved the chapter was "a toothless public relations exercise with no enforcement mechanism." The White House has pushed back against such criticisms. In a blog post responding to the leak this week, the Office of the U.S. Trade Representative (USTR) wrote that "stewardship is a core American value, and we will insist on a robust, fully enforceable environment chapter in the TPP (Trans-Pacific Partnership) or we will not come to agreement." Here are four grievances voiced by environmental groups over the leaked chapter: 1. They say the pact lacks basic environmental provisions. This is all about what's not in the proposed pact. The NRDC's Schmidt says that environmental groups are asking for "some pretty basic environmental provisions. "We're saying don't subsidize unsustainable fisheries and don't do illegal things," he said. Environmentalists say that the Obama White House has hinted that it will not support an agreement without enforceable environmental provisions, in recent remarks by some of the administration's key environmental players. But the "overarching" problem with the leaked draft, Schmidt says, is that "there's no enforcement." The leaked document mentions that trade partners should take steps to protect the environment, but Schmidt says that "there are many caveats that effectively allow countries to not make these enforceable . "References to the word 'shall' are very rarely used," he says, "and are often paired with 'seek to' or 'attempt,' which are not legally enforceable." 2. Green groups say the draft agreement does not discourage overfishing. The nations considering the Trans-Pacific Partnership have a "responsibility" to provide adequate protection against overfishing, but the draft agreement fails to provide that, said Carter Roberts, president and CEO of WWF. The countries negotiating the agreement account for about a third of global fisheries production, Roberts notes, so the stakes are high. Those countries have a range of direct and indirect subsidies for their fishing fleets, including payments, discounted loans, reduced prices on fuel, and so on. "What we have been pushing for is for countries to phase out harmful subsidies ... that lead to greater harvest of fishing stocks than can be sustained," said Schmidt. "We're not saying end all fishing programs and support, but you need to make sure that any support is targeted at programs that don't lead to overconsumption of fish stocks." For its part, the U.S. Trade Representative's office responded that the U.S. is "proposing that the TPP [Trans-Pacific Partnership] include, for the first time in any trade or environment agreement, groundbreaking prohibitions on fish subsidies that set a new and higher baseline for fisheries protections." 3. The pact does not take a strong enough stance against illegal wildlife products, activists say. Green groups would like to see stronger enforcement of international laws on products made from endangered species, such as elephant ivory or tiger pelts, as part of a new trade agreement. "The lack of fully-enforceable environmental safeguards means negotiators are allowing a unique opportunity to protect wildlife and support legal sustainable trade of renewable resources to slip through their fingers," WWF's Roberts said in a statement. Biodiversity solves extinction – food crises and genetic irreplaceability Mittermeier 11 (et al, Dr. Russell Alan Mittermeier is a primatologist, herpetologist and biological anthropologist. He holds Ph.D. from Harvard in Biological Anthropology and serves as an Adjunct Professor at the State University of New York at Stony Brook. He has conducted fieldwork for over 30 years on three continents and in more than 20 countries in mainly tropical locations. He is the President of Conservation International and he is considered an expert on biological diversity. Mittermeier has formally discovered several monkey species. From Chapter One of the book Biodiversity Hotspots – F.E. Zachos and J.C. Habel (eds.), DOI 10.1007/978-3-642-20992-5_1, # Springer-Verlag Berlin Heidelberg 2011. This evidence also internally references Norman Myers, a very famous British environmentalist specialising in biodiversity. available at: http://www.academia.edu/1536096/Global_biodiversity_conservation_the_critical_role_of_hotspots) Extinction is the gravest consequence of the biodiversity crisis, since it is¶ irreversible. Human activities have elevated the rate of species extinctions to a¶ thousand or more times the natural background rate (Pimm et al. 1995). What are the¶ consequences of this loss? Most obvious among them may be the lost opportunity¶ for future resource use. Scientists have discovered a mere fraction of Earth’s As species vanish, so too does the health security of every¶ human. Earth’s species are a vast genetic storehouse that may harbor a cure for¶ cancer, malaria, or the next new pathogen – cures waiting to be discovered.¶ Compounds initially derived from wild species account for more than half of all¶ commercial medicines – even more in developing nations species¶ (perhaps fewer than 10%, or even 1%) and understood the biology of even fewer¶ (Novotny et al. 2002). (Chivian and Bernstein¶ 2008). Natural forms, processes, and ecosystems provide blueprints and inspiration¶ for a growing array of new materials, energy sources, hi-tech devices, and¶ other With loss of species, we lose the ultimate source of our crops¶ and the genes we use to improve agricultural resilience, the inspiration for¶ manufactured products, and the basis of the structure and function of the ecosystems¶ that support humans and all life on Earth (McNeely et al. 2009). Above and beyond¶ material welfare and livelihoods, biodiversity contributes to security, resiliency,¶ and freedom of choices and actions (Millennium innovations (Benyus 2009). The current loss of species has been compared¶ to burning down the world’s libraries without knowing the content of 90% or¶ more of the books. Ecosystem Assessment 2005).¶ Less tangible, but no less important, are the cultural, spiritual, and moral costs¶ inflicted by species extinctions. All societies value species for their own sake,¶ and wild plants and animals are integral to the fabric of all the world’s cultures¶ (Wilson 1984). The road to extinction is made even more perilous to people by the loss of the broader ecosystems that underpin our livelihoods, communities, and economies(McNeely et al.2009). The loss of coastal wetlands and mangrove forests, for example, greatly exacerbates both human mortality and economic damage from tropical cyclones (Costanza et al.2008; Das and Vincent2009), while disease outbreaks such as the 2003 emergence of Severe Acute Respiratory Syndrome in East Asia have been directly connected to trade in wildlife for human consumption(Guan et al.2003). Other consequences of biodiversity loss, more subtle but equally damaging, include the deterioration of Earth’s natural capital. Loss of biodiversity on land in the past decade alone is estimated to be costing the global economy $500 billion annually (TEEB2009). Reduced diversity may also reduce resilience of ecosystems and the human communities that depend on them. For example, more diverse coral reef communities have been found to suffer less from the diseases that plague degraded reefs elsewhere (Raymundo et al.2009). As Earth’s climate changes, the roles of species and ecosystems will only increase in their importance to humanity (Turner et al.2009).¶ In many respects, conservation is local. People generally care more about the biodiversity in the place in which they live. They also depend upon these ecosystems the most – and, broadly speaking, it is these areas over which they have the most control. Furthermore, we believe that all biodiversity is important and that every nation, every region, and every community should do everything possible to conserve their living resources. So, what is the importance of setting global priorities? Extinction is a global phenomenon, with impacts far beyond nearby administrative borders. More practically, biodiversity, the threats to it, and the ability of countries to pay for its conservation vary around the world. The vast majority of the global conservation budget – perhaps 90% – originates in and is spent in economically wealthy countries (James et al.1999). It is thus critical that those globally flexible funds available – in the hundreds of millions annually – be guided by systematic priorities if we are to move deliberately toward a where should action toward reducing the loss of biodiversity be implemented first? The field of conservation planning addresses this question and revolves around a framework of vulnerability and irreplaceability (Margules and Pressey2000). Vulnerability measures the risk to global goal of reducing biodiversity loss.¶ The establishment of priorities for biodiversity conservation is complex, but can be framed as a single question. Given the choice, the species present in a region – if the species and ecosystems that are highly threatened are not protected now, we will not get another chance in the future. Irreplaceability measures the extent to which spatial substitutes exist for securing biodiversity. The number of species alone is an inadequate indication of conserva-tion priority because several areas can share the same species. In contrast, areas with high levels of endemism are irreplaceable. We must conserve these places because the unique species they contain cannot be saved elsewhere. Put another way, biodiversity is not evenly distributed on our planet. It is heavily concentrated in certain areas, these areas have exceptionally high concentrations of endemic species found nowhere else, and many (but not all) of these areas are the areas at greatest risk of disappearing because of heavy human impact.¶ Myers’ seminal paper (Myers1988) was the first application of the Myers described ten tropical forest “hotspots” on the basis of extraordinary plant endemism and high levels of habitat loss, albeit without quantitative criteria for the designation of “hotspot” status. A subsequent principles of irreplaceability and vulnerability to guide conservation planning on a global scale. analysis added eight additional hotspots, including four from Mediterranean-type ecosystems (Myers 1990).After adopting hotspots as an institutional blueprint in 1989, Conservation International worked with Myers in a first systematic update of the hotspots. It introduced two strict quantitative criteria: to qualify as a hotspot, a region had to contain at least 1,500 vascular plants an extensive global review (Mittermeier et al.1999) and scientific publication (Myers et al.2000) that introduced seven new hotspots on the basis of both the better-defined criteria and new data. A second systematic update (Mittermeier et al.2004) did not change the criteria, but revisited the set of hotspots based on as endemics (¶ >¶ 0.5% of the world’s total), and it had to have 30% or less of its original vegetation (extent of historical habitat cover)remaining. These efforts culminated in new data on the distribution of species and threats, as well as genuine changes in the threat status of these regions. That update redefined several hotspots, such as the Eastern Afromontane region, and added several others that were suspected hotspots but for which sufficient data either did not exist or were not accessible to conservation scientists outside of those regions. Sadly, it uncovered another region – the East Melanesian Islands – which rapid habitat destruction had in a short period of time transformed from a biodiverse region that failed to meet the “less than 30% of original vegetation remaining” criterion to a genuine hotspot. TPP devastates growth – ensures rapid offshoring – economic and trade benefits are all hype Hiltzik 2-7-15 (Michael, Pulitzer Prize-winning journalist, author of five books, “'Free trade' isn't what Trans-Pacific Partnership would deliver,” http://www.latimes.com/business/hiltzik/la-fi-hiltzik20150206-column.html#page=1, CMR) In principle, almost everyone's in favor of free trade. It promotes international harmony, raises wages, helps economies grow. It's an article of historical faith that the enactment of harsh protective U.S. tariffs in 1930 contributed to the Great Depression. And who wants that? But "free trade" has little to do with the trade deal that President Obama hopes will be a high-water mark for his administration's foreign policy: the Trans-Pacific Partnership talks, which now involve the U.S. and 11 Pacific Rim countries — Australia, Brunei, Canada, Chile, Japan, Malaysia, Mexico, New Zealand, Peru, Singapore and Vietnam. The pact — which has been under negotiation virtually since the turn of the century — is in trouble on Capitol Hill, where its enemies include conservatives and liberals. The overall problem may be that the TPP, as it's known in shorthand, has become a symbol of everything that's wrong with free trade agreements today. The pact is being negotiated in secret, although U.S. trade negotiators have given big industries nice long looks behind the curtain. The White House is demanding "fast-track" approval from Congress, which limits the say lawmakers will have and requires them to ratify in haste. And public interest advocates say it could undermine rules and regulations governing the environment, health, intellectual property and financial markets (to name only a few topics). " Most of these provisions have nothing to do with trade or jobs," says liberal economist Joseph Stiglitz, a leading critic of the deal and the secrecy of the talks. On the other side of the argument is the trade pact's potential to foster economic growth and job creation — "650,000 jobs in the U.S. alone," as Secretary of State John F. Kerry asserted last month. But that widely challenged figure is extrapolated from a 2012 report by the Peterson Institute of International Economics, which didn't offer a jobs estimate. In fact, the report said the TPP might dislocate workers and drive older people out of the workforce — and that any benefits might be canceled out by the resulting costs to workers and society. Evidence from earlier trade pacts, including the North American Free Trade Agreement, suggests that the benefits for developing countries among the treaty signatories are similarly oversold. "Trade liberalization on average has not brought economic growth for emerging economies," Stiglitz said. "The idea that it's necessarily mutually beneficial is just wrong." Doubts about the TPP fall into three main categories. •Overreach. Domestic policies and regulations shouldn't be treated as trade barriers subject to international negotiation, such as patent and copyright terms, wage and working conditions, even environmental regulations. But provisions in the TPP would protect brand-name pharmaceuticals from competition from generics in developing countries, forcing up the cost of healthcare, and would impose the overly strict copyright terms of the U.S., where copyright lasts 70 years after the death of a copyright holder, on signatory countries. Critics fear that bringing such issues into a trade pact will encourage a race to the bottom, favoring the most business-friendly regulations. "Some of these provisions roll back important public interest policies on issues like food safety, product safety and access to drugs," says Lori Wallach, the global trade watchdog at the public interest organization Public Citizen. "This is diplomatic legislating on things that affect our day-to-day lives that have nothing to do with trade." Especially worrisome is a procedure allowing corporations to file claims in arbitration courts against sovereign countries over changes in their laws and regulations. As is the case in some previous trade agreements, commercial interests will be able to seek compensation for "injuries" from anything from minimum-wage increases to environmental and health regulations. Mexican truckers filed a $30-billion case objecting to safety and environmental rules on U.S. roads; Eli Lilly & Co. is seeking $481 million from Canada for its invalidation of Lilly patents on several drugs; and Philip Morris has sued Australia because its rule requiring plain packaging for cigarettes deprives the company of its property rights in trademarks and logos. Even conservatives who otherwise favor the TPP detest this provision. The Cato Institute has urged that it be "purged" from the pact. By giving special privileges to corporations operating abroad, Cato said, the provision allows them to undermine domestic sovereignty and "effectively encourages outsourcing." •Secrecy. U.S. Trade Representative Michael Froman, who is conducting the talks, has been stingy with the text, critics say, out of fear of public nitpicking. Most of what the public knows of the TPP's drafts and the U.S. negotiating position has come via Wikileaks. Froman told the House Ways and Means Committee last month that he has taken "unprecedented steps to increase transparency" by keeping Congress and the public in the loop, but most observers say disclosure has been nowhere near adequate. In 2012, Sen. Ron Wyden (D-Ore.) was so frustrated at being stonewalled by the USTR that he introduced a bill requiring that all lawmakers with oversight on trade policy be given access to key documents. •"Fast-tracking." Fast-tracking allows the administration to present Congress with a completed trade pact, which lawmakers must vote up or down within 90 days, without amendments and with limited debate and no filibustering in the Senate. The White House argues that fast-tracking allows negotiators to reassure trade partners that "the administration and Congress are on the same page," as Froman told the House Ways and Means Committee. The system "puts Congress in the driver's seat," he said, because the lawmakers can "define U.S. negotiating objectives and priorities." But the opposite is true: The congressional directives aren't binding, and the result can be jammed through the House and Senate. GOP leaders such as Senate Majority Leader Mitch McConnell (R-Ky.) and House Ways and Means Committee Chairman Paul D. Ryan (R-Wis.) favor fast-tracking, but opposition is growing from conservative Republicans and progressive Democrats alike. Combined with secrecy, fast-tracking encourages the overreach that makes the TPP so much more than a trade pact, and so dangerous. If fasttracking is turned down, the TPP will have to be widely published and openly debated, says Public Citizen's Wallach. "That will bring out all the skunks that have been invited to the secret picnic," she says. "Some of these things that should never have been in that agreement in the first place aren't going to fare very well when they're exposed to sunshine. And that's good." key to check all global war --manufacturing capabilities key to technology necessary for U.S. deterrence O’Hanlon 12 (Mackenzie Eaglen, American Enterprise Institute Rebecca Grant, IRIS Research Robert P. Haffa, Haffa Defense Consulting Michael O'Hanlon, The Brookings Institution Peter W. Singer, The Brookings Institution Martin Sullivan, Commonwealth Consulting Barry Watts, Center for Strategic and Budgetary Assessments “The Arsenal of Democracy and How to Preserve It: Key Issues in Defense Industrial Policy January 2012,” pg online @ http://www.brookings.edu/~/media/research/files/papers/2012/1/26%20defense%20industrial%20bas e/0126_defense_industrial_base_ohanlon) the U.S. defense industrial base is in a much different place than it was in the past. Defense industrial issues are too often viewed through the lens of jobs and pet projects to protect in congressional districts. But the overall health of the firms that supply the technologies our armed forces utilize does have national security resonance . Qualitative superiority in weaponry and other key military technology has become an essential element of American military power in the modern era— not only for winning wars but for deterring them . That requires world-class scientific and manufacturing capabilities—which in turn can also generate civilian and military export opportunities for the United States in a globalized marketplace. The current wave of defense cuts is also different than past defense budget reductions in their likely industrial impact, as Terrorism DA Our entire MLats advantage is a turn to this – key to global law enforcement coop – obviously a prerequisite to solving terrorism US-EU law enforcement cooperation key to counter-terrorism Archick 14 (Kristin, Specialist in European Affairs, “U.S.-EU Cooperation Against Terrorism,” Dec 1, https://www.fas.org/sgp/crs/row/RS22030.pdf, CMR) Promoting law enforcement and intelligence cooperation with the United States has been another top EU priority since 2001. Washington has largely welcomed enhanced counterterrorism cooperation with the EU, which has led to a new dynamic in U.S.-EU relations by fostering dialogue on law enforcement and homeland security issues previously reserved for bilateral discussions. Contacts between U.S. and EU officials on police, judicial, and border control policy matters have increased substantially and a number of new U.S.-EU agreements have also been reached; these include information-sharing arrangements between the United States and EU police and judicial bodies, two U.S.-EU treaties on extradition and mutual legal assistance, and accords on container security and airline passenger data. In addition, the United States and the EU have been working together to curb terrorist financing and to strengthen transport security. Strong MLATs is vital to disrupt financing for terrorism and preventing attacks Acharya 9 (Arabinda, Adjunct Faculty, Department of Geo-Politics, Manipal University, India; Deputy Director Centre for Peace and Development Studies; Project Taskforce Lead, Consortium for Countering the Financing of Terrorism (CCFT); and Editor, Counter Terrorist Trends and Analysis (CTTA), “Targeting Terrorist Financing: International Cooperation and New Regimes,” pg 114-116, CMR) The United States is also at the forefront in providing training and technical assistance to help vulnerable countries develop appropriate legal frameworks, financial regulatory oversight systems, law enforcement capabilities, and judicial and prosecutorial processes needed for an effective AML/CFT regime.'““ Washington has entered into numerous mutual legal assistance treaties (MLATs), which provide for the exchange of financial information and evidence in criminal and related matters especially in asset forfeiture proceedings."” According to US officials, Washington remains committed to leverage the comparative advantage of the numerous institutions and organizations, drawing on what each does best, from setting standards to developing regional strategies to providing forums for training and education. Through the provision of training, equipment, and other assistance, the United States, along with a coalition of willing and able states and organizations, will enhance the ability of partners across the globe to attack and defeat terrorists, deny them funding and freedom of movement.'“" In fact, the US efforts to combat terrorist financing may be considered the most successful part of the global war on terror since September 2001.“ The United Kingdom, which has always been sensitive to terrorism, espe- cially because of its experience with the Irish Republican Army (IRA), was one of the first countries that incorporated the 1999 Terrorist Financing Convention in its domestic law. This was done through the Terrorism Act 2000. The United Kingdom has created 21 specialist unit in its police force, the National Terrorist Financial Investigation Unit (NTFIU) that employs individuals well versed in financial investigative techniques, and is one of the first countries to do so.'” The 2000 Terrorism Act provides for extra-territorial jurisdiction with regard to acts of financing that have been criminalized under the act. The US and UK leg- islations have become models for terrorist financing legislation because of the regulatory framework they envisage and their overarching reach across the public and private sector.” The measures developed by the international community against terrorist financing are comprehensive, encompassing all aspects of financial activity and involving participation by a very wide range of actors and agencies both in the public and the private sector at the international. regional and domestic levels. In a broader sense, these initiatives emphasize establishment of a legal framework and efficient and rapid dissemination of information through legal mechanisms and mutual assistance programmes in order to help concerned agencies identify, disrupt and dismantle terrorist financing networks. As the IMF has noted, the collection, analysis, and dissemination of financial information is crucial to “disrupt, delay, interrupt, and defeat. both terrorism and terrorist finance.”'” lmportantly, it has been recognized that different nations adopt different anti-terrorist financing regimes in accordance with their differing legal traditions, constitutional requirements, systems of govemment and technological capabil- ities."5 This ensures that all the nations do not have to employ a unilateral “US- only” model for countering the financing of terrorism.'"’ Thus, various international and regional institutions and agencies engaged in a wide array of multilateral activities now collectively constitute a new international regime for countering the financing of terrorism.'” As Thomas Biersteker er al. put it, In many ways, cooperation against terrorist financing now constitutes a regime where the principles [widely held beliefs about the utility of follow- ing the movement of money]; norms [obligations arising under formal (UN) and informal (FATF) initiatives]; rules [the specific regulatory actions to be taken and best practices to be pursued]; and decision-making procedures [whether they are manifest in global, regional or specialist organizations] are institutionalized in multiple fora. Beneath this web of institutions are wide ranges of bilateral, trans-governmental networks on terrorist financing, which have also reinforced and supplemented the regime."3 This collection of new institutions, new laws, and cooperation among states and between institutions is “an immense undertaking” and “no less than the military campaign”“” against terrorism. Given these characterizations and the sheer breadth and depth of these new initiatives, Steve Kiser argues, depicting the financial strategy, as a central component of the global war on terror is not unreasonable. '3” MLATs key to fight terrorism and transnational crime U.S. Department of State 2/20/15 "Signing of a Mutual Legal Assistance Treaty Between the United States and Kazakhstan," U.S. Department of State, February 20th, 2015, http://www.state.gov/r/pa/prs/ps/2015/02/237732.htm On February 20, 2015, Deputy Assistant Attorney General and Department of Justice Counselor for International Affairs Bruce C. Swartz and Prosecutor General of the Republic of Kazakhstan Askhat Daulbayev signed a Treaty on Mutual Legal Assistance in Criminal Matters. The signing of this Treaty marks an important step forward by the United States and Kazakhstan to enhance law enforcement cooperation and to protect the law-abiding citizens of both countries The Treaty provides a formal intergovernmental mechanism for the provision of evidence and other forms of law enforcement assistance in criminal investigations, prosecutions, and related proceedings. Under the Treaty, assistance can be provided in taking testimony of witnesses, releasing documents and records, locating and identifying persons or evidence, serving documents, executing requests for searches and seizures, transferring persons in custody for testimony or other purposes, tracing and forfeiting the proceeds of crime, and any other form of assistance not prohibited by the laws of the requested State. Mutual legal assistance treaties are an excellent means for the United States to strengthen its ability to fight terrorism and transnational crime. The United States has negotiated such treaties since the late 1970s and currently has over 70 in force. Following signature, this treaty will be transmitted to the U.S. Senate for advice and consent to ratification. No risk of bioterror Keller 13 (Rebecca, 7 March 2013, Analyst at Stratfor, “Bioterrorism and the Pandemic Potential,” Stratfor, http://www.stratfor.com/weekly/bioterrorism-and-pandemic-potential) The risk of an accidental release of H5N1 is similar to that of other infectious pathogens currently being studied. Proper safety standards are key, of course, and experts in the field have had a year to determine the best way to proceed, balancing safety and research benefits. Previous work with the virus was conducted at biosafety level three out of four, which requires researchers wearing respirators and disposable gowns to work in pairs in a negative pressure environment. While many of these labs are part of universities, access is controlled either through keyed entry or even palm scanners. There are roughly 40 labs that submitted to the voluntary ban. Those wishing to resume work after the ban was lifted must comply with guidelines requiring strict national oversight and close communication and collaboration with national authorities. The risk of release either through accident or theft cannot be completely eliminated, but given the established parameters the risk is minimal. The use of the pathogen as a biological weapon requires an assessment of whether a non-state actor would have the capabilities to isolate the virulent strain, then weaponize and distribute it. Stratfor has long held the position that while terrorist organizations may have rudimentary capabilities regarding biological weapons, the likelihood of a successful attack is very low. Given that the laboratory version of H5N1 -- or any influenza virus, for that matter -- is a contagious pathogen, there would be two possible modes that a non-state actor would have to instigate an attack. The virus could be refined and then aerosolized and released into a populated area, or an individual could be infected with the virus and sent to freely circulate within a population. There are severe constraints that make success using either of these methods unlikely. The technology needed to refine and aerosolize a pathogen for a biological attack is beyond the capability of most non-state actors. Even if they were able to develop a weapon, other factors such as wind patterns and humidity can render an attack ineffective. Using a human carrier is a less expensive method, but it requires that the biological agent be a contagion. Additionally, in order to infect the large number of people necessary to start an outbreak, the infected carrier must be mobile while contagious, something that is doubtful with a serious disease like small pox. The carrier also cannot be visibly ill because that would limit the necessary human contact. MLATs CP Conditionality bad - Time skew - Strat skew - Dispo solves their offense - Voter No neg fiat – No negative counter-resolution, fiat power stems from “should”, counterplans are infinite, unpredictable and distract from education on core topic controversies – voter Perm – do both - No solvency – 1ac internal links and solvency ev all proves LEADS act is key – it doesn’t matter how much funding there is, other countries won’t cooperate with US if we are VIOLATING THEIR LAWS and doing surveillance OUTSIDE THE MLAT PROCESS Plan is key to re-assert US leadership on MLATs – otherwise, global law enforcement cooperation is at risk Evans and Anderson 15 (Karen S. Evans is national director of the U.S. Cyber Challenge, a nationwide talent search and skills development program focused specifically on the cyber workforce, Julie M. Anderson is a principal at AG Strategy Group, “Much-needed bipartisan privacy reform: Support LEADS,” March 23, http://www.federaltimes.com/story/government/it/blog/2015/03/23/electroniccommunications-privacy-act-reform/70330234/, CMR) The LEADS Act relies on existing international treaties to regulate the request and access to emails across borders. The procedures employed by these treaties are not perfect, and that is where LEADS is beneficial in setting forth significant process improvements, specifying that U.S. warrants apply to data stored abroad tied to U.S. citizens or residents only when execution of the warrants does not violate foreign laws. Only when the U.S. reasserts its leadership on these issues will it be able to fully benefit from its international relationships. Any U.S. government action absent of overall ECPA reform could hamper future cooperation from law enforcement agencies in foreign countries. Numerous groups – including technology companies, leading media, and privacy organizations – have aligned their efforts to support clarifying legal access to personal communications. Members of both parties have signed on to the bill introduced in both chambers of Congress. The LEADS Act is an important first step in clarifying and strengthening ECPA. It will enhance the mutual trust and reciprocity that U.S. has built over time with our foreign partners. And this, in turn, will help our country continue to benefit from international relationships aimed at improving law enforcement cooperation. In a time of gridlock and increasing partisanship, LEADS is one place where Washington could work to improve security and privacy for its people. Plan is a necessary condition – only LEADS ACT sends clear signal vital to trust and mutual confidence – MLAT coop is doomed without it Evans 15 (Karen S, has spent 28 years in the federal government and most recently was a presidential appointee as the administrator for E-Government and Information Technology at the Office of Management and Budget, national director for the US Cyber Challenge, “LEADS Act is logical path toward much-needed ECPA reform,” March 13, http://thehill.com/blogs/congressblog/technology/235582-leads-act-is-logical-path-toward-much-needed-ecpa-reform, CMR) The necessity of reforming the Electronic Communications Privacy Act (ECPA) has long been talked about in Congress, and it is time to take action. A sensible and bipartisan bill has been introduced that gives us a realistic path to reform. That bill is the Law Enforcement Access to Data Stored Abroad (LEADS) Act – we should examine it seriously. In today’s Digital Age, we store incalculable quantities of personal information on cloud servers which may be located anywhere in the world, something 1980s-era ECPA never anticipated. It’s time to modernize the way we conduct digital trade and the legal framework that controls how law enforcement agencies interact with this data. With little fanfare, this bipartisan bill was recently reintroduced by Sens. Orrin Hatch (R-Utah), Dean Heller (R-Nev.) and Chris Coons (D-Del.) last month (a companion bill was also introduced in the House). The bill will help achieve several important outcomes. LEADS will improve data privacy protections for U.S. citizens and residents while strengthening law enforcement cooperation with other nations. The bill also preserves the essential balance between security and privacy. At the same time, it will signal to our foreign partners that we are serious about improving law enforcement cooperation with them. In these times, such improvements are vital to ensuring effective functioning of our law enforcement agencies while maintaining the privacy rights of our citizens. We have all come to expect a certain level of privacy in our personal communications. Our law enforcement agencies must follow procedures established by Congress and the courts to gain access to personal correspondence and data files. These rules also govern access to information held overseas and controlled by long-standing mutual legal assistance treaties (MLATs). But these clear principles have been partly obscured by the digital nature of today’s communications. Today many data centers operated by American companies are located in foreign countries and their electronic footprints cross numerous jurisdictions. In these changing conditions, U.S. courts are now serving warrants to American technology companies demanding access to customer data stored overseas. We must bring greater clarity to these procedures by updating our laws to reflect today’s circumstances. The LEADS Act is an ideal opportunity to do this. It removes the gaps in ECPA by specifying that U.S. warrants apply to data stored abroad only when the owners are U.S. persons (citizens or residents) and only when execution of the warrants does not violate foreign laws. The bill also requires that the U.S. improve its MLAT procedures, which are the primary alternative mechanism to warrants in these situations. These clarifications to ECPA can only enhance U.S. cooperation with other governments. Strong relationships of mutual confidence with these governments are vital to the ability of our law enforcement agencies and courts to carry out their missions effectively. There are many examples from my service in government that illustrate the importance of U.S. cooperation with other countries as it relates to effective policy implementation, and I’d like to highlight two of them. Established in 2002 by Congress, transportation worker identification cards (TWIC) are intended to minimize the risk of bad actors accessing key aspects of the maritime transportation system. Effective policy implementation meant the U.S., Canada and Mexico had to work together to make technical requirements interoperable. Treaties governed the intergovernmental work. Policy guidelines set the technical implementations in motion in each participating country. In addition, a consortium of countries composed of Australia, New Zealand, Canada, the U.K. and the U.S. met regularly to share best practices for expanding e-government to improve services to the citizen, which included information sharing across law enforcement agencies. Each country used this information and implemented new approaches to bolster law enforcement cooperation without harming constituent services. Without trust, reciprocity and shared information, these efforts will be futile. Only by respecting the Golden Rule when cooperating with other countries can we hope to produce real results. The LEADS Act will strengthen our ability to maintain these productive relationships with international partners to the real benefit of American citizens. It is legislation like LEADS that will help the U.S. achieve broader, muchneeded ECPA reform. The goal is clear – the laws should ensure that data stored in the cloud receives the same legal protections as data stored in our homes and at work. Senators and representatives have the opportunity to act on the legislation to ensure we do unto others as we would have them do unto us. It’s time to provide better data privacy protections for our citizens while preserving U.S. relationships abroad. I encourage Congress to take up The LEADS Act this session and strengthen America’s leadership in preserving the balance between security and privacy. Solvency T.S. Circumvention - LEADS act sufficient – prefer specificity of our 1ac ev – their ev only says IF obama ignored Leads act it wouldn’t solve, not that he would – the other card is generic and doesn’t assume leads - we still solve perception – plans sufficient – 1ac ev - even if US circumvented and leaks occurred – that wouldn’t happen for years or decades – it took over 10 years for bulk meta data program to leak - The NSA and FBI will now have to abide by Congressional mandate — the era of looking the other way on surveillance has ended. Buttar 15 — Shahid Buttar, constitutional lawyer and executive director of the Bill of Rights Defense Committee, 2015 (“Senate Moves to Check Executive Spying Power,” The Progressive, May 27th, Available Online at http://progressive.org/news/2015/05/188151/senate-moves-check-executivespying-power, Accessed 06-07-2015) The political shift indicates a direction for future reform. Who Wins and Who Loses? The most obvious losers are the NSA and FBI. After 15 years of breaking already permissive laws, yet not congressional blank checks, the agencies must finally start complying with constitutional limits. Within the agencies, senior leaders of the intelligence establishment also emerge looking like clowns. Section 215 survived this long only because agency officials—including Director of National Intelligence James Clapper and former NSA Director Michael Hayden—lied under oath to evade oversight. The Senate's decision to end a program that senators learned about from whistleblowers, instead of those officials, further discredits their legacies. Even if they remain above the law by evading the prosecution for perjury sought by multiple members of Congress, their careers will be defined by congressional and judicial rejection of illegal programs they built in secret. To the extent intelligence officials are clowns, the many congressional leaders from both parties who supported them are stooges. Establishment Democrats and Republicans alike uncritically accepted lies, deferred to them and went along with the Beltway consensus - in sharp contrast to their populist colleagues who proved willing to uphold their oath of office to "defend the Constitution against all enemies, foreign and domestic." Several winners also emerged from this drama. Congressional rejection of mass spying vindicates several principles at once, including transparency, oversight, checks and balances, the separation of powers and constitutional rights enshrined in the First and Fourth Amendments. Each of those values is cherished across the political continuum, making them especially powerful during a presidential election year. Senator Paul is another clear winner. He demonstrated leadership, surged among the crowded GOP field of 2016 presidential hopefuls and effectively seized control of the Senate from the majority leader. With its senators leading both the surveillance/secrecy/corruption caucus, as well as the competing constitutional/privacy/accountability caucus, Kentucky could also claim victory. The US Constitution may be the most important winner. By proxy, "We the People of the United States" actually scored two victories at once. Narrowly, the expiration of Patriot Act Section 215 advances Fourth Amendment privacy interests. Even though mass surveillance will continue for now under other legal authorities, one program through which our government monitors phone calls and tracks everyone's behavior, regardless of wrongdoing, will end. More broadly, this vote begins a long-overdue process of limiting executive powers, expanded during a period of seeming emergency, which grew entrenched despite proving ineffective as well as constitutionally offensive. In this sense, congressional assertiveness supports democracy in a longrunning battle to avoid the erosion from within foreseen by both Alexis de Tocqueville and President and Supreme Allied Commander Dwight Eisenhower. What Comes Next? With reformers having triumphed in Congress, the debate over surveillance reform must expand. Further reforms are necessary to enable an adversarial process and greater transparency at the secret Foreign Intelligence Surveillance Court, and also to limit other legal authorities - like Executive Order 12333 and FISA Section 702 - used to justify unconstitutional domestic surveillance. It's a good thing that a bipartisan measure, the Surveillance State Repeal Act (HR 1466), is poised to do exactly that. Rep. Mark Pocan (D-Wisconsin) and Rep. Thomas Massie (R-Kentucky) introduced the SSRA to force the agencies to justify the expansion of any powers from a constitutional baseline, rather than one contrived by a decade of executive lies. Congress has long abandoned its role of checking and balancing runaway executive power, but the Senate's recent vote suggests an overdue awakening. Members should heed the political wind, and embrace bipartisan calls for aggressive limits as the starting point for comprehensive surveillance reform. T.S. SQ solves - US violating foreign laws now, more violations are coming, status quo protections are insufficient, and only plan creates CONFIDENCE and TRUST by resolving FEARS of future violations, which is key – that’s all our 1ac internal links and 2ac ev on the CP Competitiveness TS Freedom act solves - 2ac ev on CP proves only plan solves Freedom act does NOTHING to prevent surveillance search warrants that violates FOREIGN LAWS – that’s our entire arg and the internal link to all our advantages TS Competitiveness resilient - Nope – 1ac Pociask says cascading shocks are coming that will DEVASTATE the tech sector and doom sustainability of US competitive edge TS Stem Alt cause - Their ev is terrible, it just says it presents“challenges”, doesn’t get to collapse - this is super long term anyway, plan gives massive boost to US tech companies in short term TS No impact - Group Extend Colby – its key to heg, econ and relative power differential – which is vital Goldstien says that causes US Lashout – which is an internal link to global great power war they conceded MLATs TS Organized Crime Resilient - This ev is awful, we post date by 6 years, it doesn’t assume our internal link AT ALL, and it just says organized crime NEEDS to be resilient in order to adopt to changing environments, not that they ARE RESILIENT or can’t be weakened TS doesn’t cause violence - This card sucks too – its nearly a decade old, its about the mafia, not TRANSNATIONAL organized crime, and our internal link to conflicts is that it undermines GOOD GOVERNANCE by causing CORRUPTION – doesn’t matter whether the crime itself is non-violent or not TS no disease impact - Doesn’t assume disease mutation, antibiotic resistance and human population expansion into new areas – that’s 1ac Keating TS BioD Resilient Prefer 1ac Rockstrom – most qualified – their ev is from a philosopher, not an environmental expert – even if past environmental damage hasn’t caused it – we’re approaching a unique tipping point that will cause cascading effects, system collapse and extinction US EU Relations T.S. No Impact Prefer stivatchis – key to solve every major global problem – combined influence, power and transnational scope make deep coop key TS resilient - Surveillance in violation of EU laws creates UNIQUE damage – that’s 1ac Gould Not resilient – only sustainable if we work together to rebuild trust – that’s Cunningham TS Alt Causes Energy differences don’t affect security cooperation—empirics, it spurs tech cooperation and economic benefits Berzina 14 (Kristine, transatlantic fellow for energy & society at GMF, where she is responsible for shaping energy programming in Europe and contributing to GMF's work in the United States, “Bridging Energy Gaps for Greater Transatlantic Cooperation”, July 2014, MC) Although gaps between North American and European energy policies remain, they are not a stress test for transatlantic security cooperation. The gaps in approaches provide opportunities for complementarity and a formal cooperation. Acting as a harmonious bloc will be important as both regions address their waning importance over the coming decades. Already, China and India dominate conversations about growing energy demand and non-OECD countries consume the majority of the worlds oil supplies.3 The United States and Europe will need to band together on research and trade to stay at the forefront of energy innovation. Europe and the United States have a common goal of improving the security of their energy supplies! but the two regions have approached this goal differently. The United States has been blessed with geology and technological innovation that has allowed U.S. companies to develop new tight oil and shale gas resources. In Europe, geology* and political priorities have not led to a shale boom. Instead, European energy transformations have focused large!)' on increasing renewable energy* saturation to meet energy self-sufficiency* and climate change goals. The United States and Europe started out as both energy producing and energy importing countries. As recently as ten year: ago, the United States planned to increase natural gas imports, and many companies built liquefied natural gas import terminals along the U.S. eastern seaboard. But the shale gas boom changed this trajectory. Since 2009, the United States has been the world's top natural gas producer, putting more than six times more natural gas on the market than Saudi Arabia. In the European Union, the United Kingdom (UK.) had been the major natural gas producer. But production has steadily decreased over the last decade. In 2013, the U.K. produced just 35 percent of the volume of natural gas that it produced ten years earlier* Households and industry in the United Stales have benefited from the fossil fuel boom and low prices for natural gas. In 2013, the price of natural gas in the United States had fallen to one-third the price of European gas. Not only has this kept household heating bills low, cheap natural gas has rejuvenated energy intensive manufacturing in the United States. Chemicals manufacturers, including Germany's BASF, arc opening new plants in the United States to take advantage of the more competitive environment. Meanwhile in Europe, many countries arc undergoing energy transformations of their own. Germany introduced its Energicwende (energy transition) in 2011. pledging to phase out nuclear power by 2022 and aiming to reach 80 percent renewable energy by 2050. The policy has been so popular that by 2013. Germany was home to over 10 percent of the world's renewable energy capacity (not including hydroclcctricity)." This success has come at a high price to households and to energy-intensive industry. Households finance the energy* transition through surcharges on their electricity bills, and the boom in rcncwablcs has made Germany's average household electricity bills the highest in Europe, industry, which is largely exempt from paying the renewable energy surcharges, argues that their exemptions from surcharges arc not enough to keep German industry competitive. Between low fuel prices in the United States and low labor costs in Asia, Germany has been put at a disadvantage. One option that analysts suggest will reduce Germany's costs — developing shale gas resources of their own* — has encountered strong domestic resistance. In spite of how different the trajectories appear, both the North American shale gas boom and Germany's Energicwende aim to reduce dependence on fossil fuel imports and to improve economic competitiveness in the long run. Both regions wish to share their experiences and technical innovations around the world. The United States is moving quickly to achieve these goals. Not only is the United States meeting its own demand for cheap energy and cushioning itself against disruptions and political conflicts in supplier states, it is preparing to share its reserves with buyers overseas. By the end of 2015. the first shipments of liquefied natural gas from Sabine Pass, Louisiana, will be sent to buyers including Korea's Kogas, the U.K's BG Group, Spain's Gas Natural Pcnosa, France's Total, and India's GAIL. Countries across the world arc looking for a direct line to cheaper U.S. natural gas and arc seeking to replicate the U.S. success story by developing shale gas of their own. Germany is playing a longer-term game. The immediate effects of the energy transformation have been increased costs and higher coal consumption. Yet the strategic goals of the transition could eventually overcome these hurdles. By becoming more energy self-sufficient, phasing out expensive fossil fuel imports, and paying off new rcncwablcs capacity quickly through feed in tariffs, Germany could become an example for how to create a competitive, resilient, low-carbon economy. Much as the United Stales seeks to spread its shale story. Germany is also sharing its experiences with European neighbors and emerging economics alike. A recent study found that whereas European energy specialists focused on ihe Encrgicwcndcs cost challenges, experts in Brazil. China, and South Africa were favorably disposed to ihe luicrgicwcndc and its long-term strategic goals. North American and European energy policies are growing closer in both domestic and foreign policy aspects. The climate change versus fossil fuel argument once represented a gulf between the transatlantic partners, but today the disagreements represent a small fissure between the two sides. European policymakers arc becoming more open to pursuing new fossil fuel exploration. The U.K. is exploring its own shale gas and tight oil reserves, and the European Union has developed recommendations for unconventional oil and gas exploration that simplify the development of new resources. Rather than mandating strict impact assessments, the standards improve transparency and predictability for operators and communities.* Similarly, the EUs decision to case the language of its Fuel Quality Directive appears to be an olive branch to Canada and the United States. The directive, which aimed to label oil sands and other unconventional fuck as "dirty" from an emissions perspective, has been a source of conflict between the transatlantic partners since 2009. Meanwhile, U.S. President Barack Obama is showing leadership on climate change issues by pressing for more serious emissions regulations for coal power plants. Thus far, US. success in lowering emissions has been due to markets not policy. Cheap natural gas pushed out coal in electricity generation, causing a drop in U.S. carbon emissions. But in June, the U.S. Environmental Protection Agency proposed a Clean Power Plan to regulate the emissions of existing power plants.* In their energy* policies, the United States and Europe arc working more closely than they have before. The situation in Ukraine has prompted cooperation not only on economic sanctions, but also on energy policies. In May, the G7 initiated a new subgroup. The Rome G7 Energy- Initiative for Energy- Security, to work toward common energy security objectives, including diversifying supplies. This not only opens the door for more direct energy trade between North America and Europe, but also stimulates greater knowledge sharing across the Atlantic. The United States and Europe can learn from each other's experiences in developing new fossil fuel and renewable energy resources. TS Relations high – - above