SSRA Aff - DEBATE – Kansas City

advertisement
SSRA Affirmative
DKC-ENDI 2015
Explanation .............................................................................................................................................................................................................. 2
Glossary ................................................................................................................................................................................................................... 3
1ac ........................................................................................................................................................................................... 6
1AC – Plan............................................................................................................................................................................................................... 7
1AC - Solvency........................................................................................................................................................................................................ 8
Advantages........................................................................................................................................................................................... 10
1AC – Secrecy Advantage ..................................................................................................................................................................................... 11
1AC – Democracy Advantage ............................................................................................................................................................................... 17
1AC – Rights Advantage ....................................................................................................................................................................................... 22
1AC – Internet Freedom ........................................................................................................................................................................................ 26
Extensions ............................................................................................................................................................................. 31
Inherency ............................................................................................................................................................................................. 32
FYI – FISA Section 702 ........................................................................................................................................................................................ 33
Inherency Module .................................................................................................................................................................................................. 34
Solvency............................................................................................................................................................................................... 36
Solvency – SSRA Requires Warrant ..................................................................................................................................................................... 37
AT: FISA Court Rubberstamps ............................................................................................................................................................................. 38
Secrecy Advantage............................................................................................................................................................................... 39
Secrecy → Chills Leaks (Long) ............................................................................................................................................................................. 40
Secrecy → Bad Decisionmaking (Long) ............................................................................................................................................................... 42
Secrecy → Drones ................................................................................................................................................................................................. 44
Secrecy → Too Much XO Power/SOP .................................................................................................................................................................. 45
AT: Leaks Hurt National Security ......................................................................................................................................................................... 46
Journalists Key ...................................................................................................................................................................................................... 48
Democracy Advantage ......................................................................................................................................................................... 49
Surveillance Chills Activism ................................................................................................................................................................................. 50
Surveillance → Tyranny ........................................................................................................................................................................................ 52
Internet Freedom Key to Spread Democracy ......................................................................................................................................................... 54
Answer to: “the aff doesn’t fix democracy” ........................................................................................................................................................... 56
Democracy Spreads ............................................................................................................................................................................................... 57
Democracy Solves Everything ............................................................................................................................................................................... 58
Democracy Prevents Wars ..................................................................................................................................................................................... 60
Democracy Prevents Terrorism ............................................................................................................................................................................. 62
Rights Advantage ................................................................................................................................................................................. 63
Right To Communication Impact .................................................................................................................................. 64
AT: Doesn't Solve Racism ............................................................................................................................................. 65
Internet Freedom Advantage ................................................................................................................................................................ 66
NSA hurts our credibility ....................................................................................................................................................................................... 67
NSA Link............................................................................................................................................................................................................... 69
Answers to: Internet isn’t free & open ................................................................................................................................................................... 71
Hurts the Internet ................................................................................................................................................................................................... 73
Bad for Economy ................................................................................................................................................................................................... 74
1
SSRA Affirmative
DKC-ENDI 2015
Explanation
I. What does the aff do.
The affirmative argues that the government should NOT have the right to spy on citizens without a warrant. In particular,
the mass data storage sweeps are illegal. Currently the NSA will collect internet and phone data on huge chunks of
citizens – even if there is no belief that a crime has or will be committed.
That should no longer be allowed. If the government is going to look into someone’s electronic lives then the government
should have a warrant. The best explanation is by reading the two solvency cards Buttar & Clabough [on the 1AC –
Solvency] page. Please read through those.
II. How to use the file
The 1ac speech should read the 1AC-plan and the 1AC-Solvency pages. Additionally, the 1ac should read the advantage
or two that the aff team finds the most interesting, strategic, fun. So, a typical 1ac would be the Plan, 2 advantages, and
solvency.
The Extensions section can be used in a couple of ways –
-use it to add evidence/cards to the 1ac advantages. You should be reading the best version of each advantage.
-use it to answer 1nc arguments made against the case. You can read additional cards to answer negative arguments that
aren’t well answered by the 1ac evidence you choose to read.
-use it to answer disads and other arguments that the negative reads.
III. Different Advantages
The four advantage give the aff some flexibility about how they choose to read the 1ac. Each lab will probably discuss
and decide how they read the 1ac. But, this allows the debates to be about the core of the topic, but also flexible enough
to not get stale.
Secrecy Advantage – the government’s mass surveillance chills investigations into what it is doing. Citizens and
journalists and even employees of the government are unwilling to look because they fear they will be caught. That
‘deters’ people from bringing issues up to the public. Leaks are a way to keep the government in check and make sure
that we don’t start wars, conflicts, or just generally make unwise decisions without it being made public. The Drone
program is a specific example of a set of decisions that are being made without public involvement. Removing the fear of
investigations would make the drone program more accountable and save lives.
Democracy Advantage – the internet as a spot of surveillance keeps people from using it to communicate openly and
free. Open communication [first amendment and all] is a bedrock of a functioning democracy. Mass surveillance is what
makes tyranny [rule by one over the many] possible as people can be policed and prevented from acting. Democracy is
really good. The 1ac says that democracies make the world more peaceful and that democracy itself is an inherent human
good.
Rights Advantage – mass surveillance results in self censorship and denies people the right to open communication.
Open communication is a fundamental human right. Rights are good.
Internet Freedom Advantage – There is a global push for governments to control the internet. The US is losing
credibility to convince people to leave the internet open and free. An open and free internet is good because it creates a
social space for humans to come together to solve all the world’s problems. As an example, if the world is going to solve
an issue like global climate change it will require people talking about it, coming together, and figuring out what works
best. The only way that can happen now is the internet.
2
SSRA Affirmative
DKC-ENDI 2015
Glossary
Civil society
The elements such as freedom of speech, an independent judiciary, etc, that make up a democratic society
Drone strike
Unmanned aerial vehicles (UAVS), also known as drones, are aircraft either controlled by ‘pilots’ from the ground or
increasingly, autonomously following a pre-programmed mission. While there are dozens of different types of drones,
they basically fall into two categories: those that are used for reconnaissance and surveillance purposes and those that are
armed with missiles and bombs.
The use of drones has grown quickly in recent years because unlike manned aircraft they can stay aloft for many hours
(Zephyr a British drone under development has just broken the world record by flying for over 82 hours nonstop); they are
much cheaper than military aircraft and they are flown remotely so there is no danger to the flight crew.
Dystopian fantasy
An imaginary place where people lead dehumanized and often fearful lives. The condition of life is extremely bad, as
from deprivation, oppression, or terror.
Foreign Intelligence Surveillance Act
The Foreign Intelligence Surveillance Act of 1978 prescribes procedures for requesting judicial authorization for
electronic surveillance and physical search of persons engaged in espionage or international terrorism against the United
States on behalf of a foreign power.
Requests are adjudicated by a special eleven member court called the Foreign Intelligence Surveillance Court or FISA
Court.
FISA Amendments Act of 2008
The act provides critically important authority for the U.S. Intelligence Community to acquire foreign intelligence
information by targeting foreign persons reasonably believed to be outside the United States. It ensures that the
Intelligence Community has the flexibility and agility it needs to identify and respond to terrorist and other foreign threats
to our security.
Global norms
Global norms are defined as broadly accepted principles and guidelines of appropriate conduct for governments
and all relevant stakeholders
Mass surveillance
Is the intricate surveillance of an entire or a substantial fraction of a population. The surveillance is often carried out by
governments or governmental organizations, but may also be carried out by corporations, either on behalf of governments
or at their own initiative.
Metadata
Surveillance metadata is usually associated with electronic communication channels, such as phone, email and social
media. Data is collected through wiretapping and other electronic surveillance methods, including government Trojans,
wiretap Trojans and keyloggers. Simply put, metadata is the digital information that accompanies electronic
communication. When you make a mobile phone call, your provider records the time, date, location, and duration of this
call, largely for billing purposes.
Militarization
Is the process by which a society organizes itself for military conflict and violence. It is related to militarism, which is an
ideology that reflects the level of militarization of a state.
3
SSRA Affirmative
DKC-ENDI 2015
National Security Agency (NSA)
An intelligence organization of the United States government, responsible for global monitoring, collection, and
processing of information and data for foreign intelligence and counterintelligence purposes – a discipline known as
Signals intelligence (SIGINT). NSA is concurrently charged with protection of U.S. government communications and
information systems against penetration and network warfare.[8][9] Although many of NSA's programs rely on "passive"
electronic collection, the agency is authorized to accomplish its mission through active clandestine means,[10] among
which are physically bugging electronic systems[11] and allegedly engaging in sabotage through subversive
software.[12][13] Moreover, NSA maintains physical presence in a large number of countries across the globe, where its
Special Collection Service (SCS) inserts eavesdropping devices in difficult-to-reach places. SCS collection tactics
allegedly encompass "close surveillance, burglary, wiretapping, breaking and entering".[14][15]
Patriot Act
Law passed shortly after the September 11, 2001, terrorist attacks in the United States giving law enforcement agencies
increased, broad powers to bring terrorists to justice.
Section 215 of the Patriot Act
The NSA used Section 215 of the Patriot Act as the basis for collecting phone records of Americans who were not
necessarily under official investigation. It was also used to track financial data and to obtain companies' internet business
records. The extent of the mass surveillance program was revealed nearly two years ago by NSA whistleblower Edward
Snowden
Section 702 of the FISA Amendments Act
Section 702 permits the Attorney General and the Director of National Intelligence to jointly authorize targeting of
persons reasonably believed to be located outside the United States, but is limited to targeting non-U.S. persons. Once
authorized, such acquisitions may last for periods of up to one year.
Under subsection 702(b) of the FISA Amendments Act, such an acquisition is also subject to several limitations.
Specifically, an acquisition:
May not intentionally target any person known at the time of acquisition to be located in the United States;
May not intentionally target a person reasonably believed to be located outside the United States if the purpose of such
acquisition is to target a particular, known person reasonably believed to be in the United States;
May not intentionally target a U.S. person reasonably believed to be located outside the United States;
May not intentionally acquire any communication as to which the sender and all intended recipients are known at the time
of the acquisition to be located in the United States;
Must be conducted in a manner consistent with the Fourth Amendment to the United States Constitution.[9]
Surveillance State Repeal Act
The bill would completely repeal the PATRIOT Act as well as the 2008 FISA Amendments Act, which permits the NSA
to collect Internet communications — a program exposed by former NSA contractor-turned-whistleblower Edward
Snowden. The bill would reform the court that oversees the nation’s spying powers, enhance protections for
whistleblowers, and stop the government from forcing technology companies to create easy access into their devices.
Targeted surveillance
Targeted surveillance is surveillance directed at particular individuals and can involve the use of specific powers by
authorized public agencies. Targeted surveillance can be carried out overtly or covertly, and can involve human agents.
Under the Regulation of Investigatory Powers Act 2000 (RIPA), targeted covert surveillance is "directed" if it is carried
out for a specific investigation or operation. By comparison, if it is carried out on designated premises or on a vehicle, it is
"intrusive" surveillance. Targeting methods include the interception of communications, the use of communications
"traffic" data, visual surveillance devices, and devices that sense movement, objects or persons.
Totalitarianism
Totalitarianism is a political system in which the state holds total authority over the society and seeks to control all aspects
of public and private life wherever possible.
4
SSRA Affirmative
DKC-ENDI 2015
Tyranny
Cruel and oppressive government or rule.
Utilitarianism
A system of ethics according to which the rightness or wrongness of an action should be judged by its consequences. The
goal of utilitarian ethics is to promote the greatest happiness for the greatest number.
Warrant
Most often, the term warrant refers to a specific type of authorization; a writ issued by a competent officer, usually a judge
or magistrate, which permits an otherwise illegal act that would violate individual rights and affords the person executing
the writ protection from damages if the act is performed.
Whistleblower
A whistleblower (whistle-blower or whistle blower)[1] is a person who exposes any kind of information or activity that is
deemed illegal, dishonest, or not correct within an organization that is either private or public.[2] The information of
alleged wrongdoing can be classified in many ways: violation of company policy/rules, law, regulation, or threat to public
interest/national security, as well as fraud, and corruption.[3] Those who become whistleblowers can choose to bring
information or allegations to surface either internally or externally. Internally, a whistleblower can bring his/her
accusations to attention to other people within the accused organization. Externally, a whistleblower can bring allegations
to light by contacting a third party outside of an accused organization. He/She can reach out to the media, government,
law enforcement, or those who are concerned. whistleblowers also face stiff reprisal/retaliation from those whom are
accused or alleged of wrongdoing. Third party groups like Wikileaks and others offer protection to whistleblowers, but
that protection can only go so far. Whistleblowers face legal action, criminal charges, social stigma, and termination from
any position, office, or job. Two other classifications of whistleblowing are private and public. The classifications relate to
the type of organizations someone chooses to whistle-blow on: private sector, or public sector. Both can have different
results that depend on many factors. However, whistleblowing in the public sector organization is more likely to result in
federal felony charges and jail-time. A whistleblower who chooses to accuse a private sector organization or agency is
more likely to face termination and legal and civil charges.
5
SSRA Affirmative
DKC-ENDI 2015
1ac
6
SSRA Affirmative
DKC-ENDI 2015
1AC – Plan
Plan: The United States federal government should curtail the authority to do non-targeted
domestic mass surveillance by enacting the Surveillance State Repeal Act.
7
SSRA Affirmative
DKC-ENDI 2015
1AC - Solvency
Solvency
The Surveillance State Repeal Act would only allow for targeted surveillance while removing the
legal justifications for mass surveillance.
Buttar, 15
(Shahid, executive director, leads the Bill of Rights Defense Committee in its efforts to restore civil liberties, constitutional rights, and rule of law principles
undermined by law enforcement and intelligence agencies within the United States. 4-18-15. http://www.occupy.com/article/can-surveillance-state-repeal-act-shiftcourse-spying)
Eager to reset the debate and anchor it in long overdue transparency, a bipartisan block of representatives have
introduced a bill to restore civil liberties, privacy, and freedom of thought. The Surveillance State Repeal Act, HR
1466, would do this by repealing the twin pillars of the NSA dragnet: the PATRIOT Act (not only the three expiring
provisions) and the 2008 FISA amendments. On multiple occasions, executive officials have lied under oath to congressional oversight committees
about the scope of domestic surveillance. Yet the very same officials still appear in oversight hearings as if they maintained any credibility. It took whistleblowers
resigning their careers to prove that senior government officials’ blithe assurances to Congress were in fact self-serving lies. Some members of Congress paid attention:
the authors of the PATRIOT Act moved to curtail their own legislative opus, and have encouraged their colleagues not to reauthorize the expiring provisions unless they
are first curtailed.
HR 1466 (the SSRA) represents a profound challenge by members of Congress from across the political spectrum
fed up with the national security establishment and its continuing assault on our Constitution.
By repealing the twin pillars of the surveillance dragnet, the SSRA would essentially shift the burden of proof,
forcing intelligence agencies like the NSA and FBI to justify the expansion of their powers from a constitutional
baseline, rather then the illegitimate status quo.
Most policymakers forget the 9/11 commission’s most crucial finding: the intelligence community's failures that enabled the 9/11 attacks were not failures of limited
data collection, but rather failures of data sharing and analysis.
Over the last 15 years, Congress has allowed the agencies to expand their collection capacities, solving an
imaginary problem while creating a host of real threats to U.S. national security far worse than any act of rogue
violence: the specter of state omniscience, immune from oversight and accountability, and thus vulnerable to politicization. This was among the fears
of which President Eisenhower warned us in his last speech as President.
Meanwhile, the SSRA would preserve what the PATRIOT Act’s authors have said they meant to authorize:
targeted investigations of particular people suspected by authorities to present potential threats.
HR 1466 would also advance transparency, both by protecting conscientious whistleblowers from the corrupt retaliation of agencies and careerists, and by giving judges
on the secret FISA court access to technical expertise they have been denied.
the bill would directly address disturbing government duplicity, prohibiting agencies from hacking
encryption hardware and software, and from using an executive order authorizing foreign surveillance as a basis
to monitor Americans.
Finally,
Only the plan goes far enough
Clabough, 15 (Raven, writer for The New American, M.A. University of Albany. “House Members Target Patriot Act with "Surveillance State Repeal Act,” 331-15. http://www.thenewamerican.com/usnews/constitution/item/20560-house-members-target-patriot-act-with-surveillance-state-repeal-act)
U.S. Representatives Mark Pocan (D-Wis., photo on left) and Thomas Massie (R-Ky.), who are seeking to repeal the PATRIOT Act in its
entirety and combat any legal provisions that amount to American spying, unveiled their Surveillance State Repeal Act on Tuesday.
“This isn’t just tinkering around the edges,” Pocan said during a Capitol Hill briefing on the legislation. “This is a
meaningful overhaul of the system, getting rid of essentially all parameters of the PATRIOT Act.”
“The PATRIOT Act contains many provisions that violate the Fourth Amendment and have led to a dramatic
expansion of our domestic surveillance state,” added Massie (R-Ky.), who co-authored the legislation with Pocan. “Our Founding Fathers fought
and died to stop the kind of warrantless spying and searches that the PATRIOT Act and the FISA Amendments Act authorize. It is long past time to repeal the
PATRIOT Act and reassert the constitutional rights of all Americans.”
The House bill would completely repeal the PATRIOT Act, passed in the days following the 9/11 attacks, as well as the 2008 FISA Amendments Act, which permits
the NSA to collect Internet communications — a program exposed by former NSA contractor-turned-whistleblower Edward Snowden.
Likewise, the bill would reform the court that oversees the nation’s spying powers, enhance protections for
whistleblowers, and stop the government from forcing technology companies to create easy access into their
devices.
8
SSRA Affirmative
DKC-ENDI 2015
“The warrantless collection of millions of personal communications from innocent Americans is a direct violation of our constitutional right to privacy,” declared
Congressman Pocan, adding, “Revelations about the NSA’s programs reveal the extraordinary extent to which the program has invaded Americans’ privacy. I reject the
notion that we must sacrifice liberty for security. We can live in a secure nation which also upholds a strong commitment to civil liberties.”
Massie stated, “Really, what we need are new whistleblower protections so that the next Edward Snowden doesn’t have to go to Russia or Hong Kong or whatever the
case may be just for disclosing this."
According to The Hill, the bill is not likely to gain much traction, as leaders in Congress “have been worried that even much milder reforms to the nation’s spying laws
would tragically handicap the nation’s ability to fight terrorists.”
A 2013 Surveillance State Repeal Act never picked up any momentum, and even bills with smaller ambitions have
failed to gain passage. Senator Patrick Leahy (D-Vt.) introduced the USA Freedom Act in 2014, which sought to
curtail the amount of mass surveillance that could be performed by the NSA and other groups.
As predicted, however, the bill was dramatically watered down during the consensus process. The White House signaled its
“strong support” for the bill only after privacy protections and transparency provisions were substantially weakened.
Privacy advocates who once supported the USA Freedom Act were dismayed by its transformation into a
consensus bill, which no longer prevented the NSA or FBI from warrantlessly sifting through international
communications databases.
Some critics even argued that the USA Freedom Act in its final form would have expanded NSA authorities
because of its vague wording about what constituted a “connection” between call records.
9
SSRA Affirmative
DKC-ENDI 2015
Advantages
10
SSRA Affirmative
DKC-ENDI 2015
1AC – Secrecy Advantage
SECRECY ADVANTAGE
Mass surveillance chills investigative journalism due to fear of NSA retaliation
Human Rights Watch, 14 (“With Liberty to Monitor All: How Large-Scale US Surveillance is Harming Journalism, Law, and American Democracy,”
July. https://www.hrw.org/sites/default/files/reports/usnsa0714_ForUPload_0.pdf)
Every national security reporter I know would say that the atmosphere in which professional reporters seek
insight into policy failures [and] bad military decisions is just much tougher and much chillier. — Steve Coll, staff writer for
The New Yorker and Dean of the Graduate School of Journalism at Columbia University, February 14, 2014
Numerous US-based journalists covering intelligence, national security, and law enforcement describe the current
reporting landscape as, in some respects, the most difficult they have ever faced. “This is the worst I’ve seen in terms of the
government’s efforts to control information,” acknowledged Jonathan Landay, a veteran national security and intelligence correspondent for McClatchy Newspapers.68
“It’s a terrible time to be covering government,” agreed Tom Gjelten, who has worked with National Public Radio for over 30 years.69 According to Kathleen Carroll,
senior vice president and executive editor of The Associated Press, “We say this every time there’s a new occupant in the White House, and it’s true every time: each is
Journalists are struggling harder than ever before to protect their sources, and sources are
more reluctant to speak. This environment makes reporting both slower and less fruitful. Journalists interviewed for this
report described the difficulty of obtaining sources and covering sensitive topics in an atmosphere of uncertainty
about the range and effect of the government’s power over them. Both surveillance and leak investigations loomed
large in this context—especially to the extent that there may be a relationship between the two. More specifically, many journalists see the government’s
more secretive than the last.”70
power as menacing because they know little about when various government agencies share among themselves information collected through surveillance, and when
they deploy that information in leak investigations.71 “[Government officials have been] very squishy about what they have and [what they] will do with it,” observed
James Asher, Washington Bureau Chief for McClatchy Co., the third largest newspaper group in the country.72 One Pulitzer Prize-winning reporter for a newspaper
noted that even a decrease in leak prosecutions is unlikely to help, “unless we [also] get clear lines about what is collectable and usable.”73 Others agreed. “I’m pretty
worried that NSA information will make its way into leak investigations,” said one investigative journalist for a major outlet.74 A reporter who covers national defense
expressed concern about the possibility of a “porous wall” between the NSA and the Department of Justice, the latter of which receives referrals connected to leak
investigations.75 Jonathan
Landay wondered whether the government might analyze metadata records to identify his
contacts. A national security reporter summarized the situation as follows: “Do we trust [the intelligence] portion
of the government’s knowledge to be walled off from leak investigations? That’s not a good place to be.”77 While most
journalists said that their difficulties began a few years ago, particularly with the increase in leak prosecutions, our interviews confirmed that for
many journalists largescale surveillance by the US government contributes substantially to the new challenges they
encounter. The government’s large-scale collection of metadata and communications makes it significantly more
difficult for them to protect themselves and their sources, to confirm details for their stories, and ultimately to
inform the public. In the 1970s, many journalists spoke with sources by phone, and the government already had the technological capacity to tap those
calls if it so chose. But traditional forms of wiretapping or physical surveillance were time consuming and resource
intensive. Today, so many more transactions are handled electronically that there exists a tangible, easy-tostore,
easy-to-access record of a much larger proportion of any given person’s life: banking transactions, internet
browsing, driving habits (though EZ Pass records, license plate cameras, and GPS systems), cell phone location and activity, emailing
patterns, and more. Metadata can reveal intimate details about people, such as religious affiliations, medical diagnoses, and the existence of private
relationships. Meanwhile, as more transactions have become digitalized, the government has acquired a much greater
technical capacity to gather, store, analyze, and sift through electronic data. Even with rapidly evolving techniques for conducting
research and contacting sources, journalists expressed concern that widespread government surveillance constrains their
ability to investigate and report on matters of public concern, and ultimately undermines democratic processes by
hindering open, informed debate.
11
SSRA Affirmative
DKC-ENDI 2015
1AC – Secrecy Advantage
And, mass surveillance deters potential whistleblowers
Human Rights Watch, 14 (“With Liberty to Monitor All: How Large-Scale US Surveillance is Harming Journalism, Law, and American Democracy,”
July. https://www.hrw.org/sites/default/files/reports/usnsa0714_ForUPload_0.pdf)
many journalists said that the government’s increased
capacity to engage in surveillance— and the knowledge that it is doing so on an unprecedented scale—has made
their concerns about how to protect sources much more acute and real. In fact, some believed that surveillance may be a
direct cause of the spike in leak investigations. “It used to be that leak investigations didn’t get far because it was
too hard to uncover the source, but with digital tools it's just much easier, and sources know that.” observed Bart Gellman.98 Peter
Yet, beyond the leak investigations and administrative efforts to prevent leaks,
Maass, a senior writer at The Intercept, concurred: “Leak investigations are a lot easier because you leave a data trail calling, swiping in and out of buildings, [and]
walking down a street with cameras. It’s a lot easier for people to know where you’re going and how long you’re there.”99 Charlie Savage raised a similar point:
“[E]lectronic trails mak[e] it easier to figure out who’s talking to reporters. That has made it realistic [to investigate leaks] in a way that it wasn’t before.”100 Peter
Finn, the National Security Editor at the Washington Post, expressed concern that “the government’s ability to find the source will only get better.”101 A national
the Snowden revelations show that “[w]hat we’re doing is not good enough.
I used to think that the most careful people were not at risk, [that they] could protect sources and keep them from
being known. Now we know that isn’t the case.”102 He added, “That’s what Snowden meant for me. There’s a record of everywhere I’ve walked,
security reporter made the link even clearer, stating that
everywhere I’ve been.”103 Peter Maass voiced a similar concern: “[The landscape] got worse significantly after the Snowden documents came into circulation. If you
Journalists repeatedly told us that
surveillance had made sources much more fearful of talking. The Snowden revelations have “brought home a sense
of the staggering power of the government,” magnifying the fear created by the increasing number of leak investigations.105 Accordingly,
sources are “afraid of the entire weight of the federal government coming down on them.” 106 Jane Mayer, an
award-winning staff writer for The New Yorker, noted, “[t]he added layer of fear makes it so much harder. I can’t
count the number of people afraid of the legal implications [of speaking to me].”107 One journalist in Washington, DC, noted, “I
suspected the government had the capability to do mass surveillance, you found out it was certainly true.”104
think many sources assume I’m spied on. [I’m] not sure they’re right but I can’t do anything about their presumption.”108 As a result, she said, some remaining sources
have started visiting her house to speak with her because they are too fearful to come to her office.109 One national security reporter estimated that intelligence
reporters have the most skittish sources, followed by journalists covering the Department of Justice and terrorism, followed by those on a military and national security
As a result, journalists report struggling to confirm even unclassified details for stories, and have seen
trusted, long-standing sources pulling back. “I had a source whom I’ve known for years whom I wanted to talk to about a particular subject and this
person said, ‘It’s not classified but I can’t talk about it because if they find out they’ll kill me’ [figuratively speaking].”111 Several others have reported
the sudden disappearance of formerly reliable sources, or the reluctance of sources to discuss seemingly innocuous
and unclassified matters.112 One decorated intelligence and national security journalist indicated that even retired sources are increasingly
reluctant to speak.113 Though firing or revocation of security clearances no longer worries them, they fear prosecution, and “now [they] have to worry that
beat.110
their communications can be reached on a basis far short of probable cause.”114 Though losing developed sources has proved frustrating to numerous journalists with
a number suggested that the largest challenge they face is reaching new sources. “Sources don’t just
materialize,” noted Peter Finn. “They often are developed.”115 That requires building trust, which can be a slow
and difficult process. Adding to the challenge of developing sources that are already skittish is the fact that
surveillance makes it very difficult for journalists to communicate with them securely. Calling or emailing can
leave a trail between the journalist and the source; and it can be difficult to get casual contacts to take more
elaborate security measures to communicate. “[H]ow do you even get going?” asked Bart Gellman, referring to the
challenge of making first contact with a new would-be source without leaving a trace. “By the time you're both
ready to talk about more delicate subjects, you’ve left such a trail that even if you start using burner phones or anonymous email
accounts you’re already linked.”
whom we spoke,
12
SSRA Affirmative
DKC-ENDI 2015
1AC – Secrecy Advantage
Whistleblowers check government corruption and abuse – decline in whistleblowers risks
national security mistakes and wars
Benkler, 14 (Yochai, Professor of Entrepreneurial Legal Studies, Harvard Law School, Faculty Co-Director, Berkman Center for Internet and Society, Harvard
University. A Public Accountability Defense for National Security Leakers and Whistleblowers 8(2) Harv. Rev. L. & Policy, July 2014
http://benkler.org/Benkler_Whistleblowerdefense_Prepub.pdf)
Criminal liability for leaking
and publishing classified materials is usually discussed in terms of a conflict between high-level
security and democracy. Here, I propose that the high-level abstraction obscures the fact that “national
security” is, first and foremost, a system of organizations and institutions, subject to all the imperfections and
failures of all other organizations. Considering that the Senate Select Committee on Intelligence (“SSCI”) excoriated
the CIA for groupthink failures in the lead up to the invasion of Iraq, and again for its failures and dissembling in
conducting its torture interrogation program, it would be naïve beyond credulity to believe that the CIA, NSA, FBI, and
Pentagon are immune to the failure dynamics that pervade every other large organization, from state bureaucracies to
telecommunications providers, from automobile manufacturers to universities. When organizations that have such vast powers over life and
death as well as human and civil rights, the risks of error, incompetence, and malfeasance are immeasurably
greater than they are for these other, more workaday organizations. The Maginot Line did not make France more secure from Germany and neither torture nor the
invasion of Iraq, with its enormous human, economic, and strategic costs, made America safer from terrorism, weapons of mass destruction, or rogue regimes. A
mechanism for identifying and disrupting the organizational dynamics that lead to such strategic errors is
necessary for any system of government, and in a democracy that mechanism is the principle of civilian control: fundamental questions of
war and peace require public understanding and public decision.
Secrecy insulates self-reinforcing internal organizational dynamics from external correction. In countering this tendency, not
values:
all leaks are of the same fabric. “War story”-type leaks that make an administration look good or are aimed to shape public opinion in favor of an already-adopted
strategy or to manipulate support for one agency over another, trial balloons, and so forth, are legion.23 While these offer the public color and texture from inside the
leaks, however, provide a
critical mechanism for piercing the national security system’s echo-chamber, countering self-reinforcing
information cascades, groupthink, and cognitive biases that necessarily pervade any closed communications
system. It is this type of leak, which exposes and challenges core systemic behaviors, that has increased in this past
decade, as it did in the early 1970s. These leaks are primarily driven by conscience, and demand accountability for systemic error, incompetence, or malfeasance.
Their critical checking function derives from the fact that conscience is uncorrelated with well-behaved
organizational processes. Like an electric fuse, accountability leaks, as we might call them, blow when the internal
dynamics of the system reach the breaking point of an individual with knowledge, but without authority. They are
therefore hard to predict, and function like surprise inspections that keep a system honest. By doing so, these leaks serve both
democracy and security.
This failsafe view of whistleblowing is hardly unique to national security. American law in general embraces
whistleblowing as a critical mechanism to address the kinds of destructive organizational dynamics that lead to error, incompetence, and abuse. In
healthcare, financial, food and drug, or consumer product industries; in state and federal agencies, throughout the
government and are valuable to the press, they do not offer a productive counterweight to internal systemic failures and errors. Some
organizational ecosystem, whistleblowers are protected from retaliation and often provided with financial incentives to expose wrongs they have seen and subject the
organizations in which they work to public or official scrutiny.25 Whistleblowing
is seen as a central pillar to address government
corruption and failure throughout the world. Unless one believes that the national security establishment has a
magical exemption from the dynamics that lead all other large scale organizations to error, then whistleblowing
must be available as a critical arrow in the quiver of any democracy that seeks to contain the tragic consequences
that follow when national security organizations make significant errors or engage in illegality or systemic abuse.
13
SSRA Affirmative
DKC-ENDI 2015
1AC – Secrecy Advantage
Ending state secrecy is key- The government uses lack of public knowledge on drone strikes to
continue the program. The plan increases public awareness on drones which ultimately ends the
program.
Satia, 15 (Priya, professor of history, Stanford University. “Why We Need Persistent Questioning About Civilian Deaths by Drones” 4-30-15.
http://www.huffingtonpost.com/priya-satia/why-we-need-persistent-questioning-about-civilian-deaths-by-drones_b_7177264.html)
Before Nepal and Baltimore seized headlines, news
that a CIA drone strike mistakenly killed an innocent American hostage in
January momentarily energized our meager debate on drones. Critics pressed drones' dangerous secrecy and
fallibility and the political backlash they produce in the Muslim world. The administration reached for platitudes about the sad
inevitability of mistakes in the "fog of war." Micah Zenko of the Council on Foreign Relations and author of a 2013 study of drones
predicted, "even this episode will have no effect" on public debate -- and our easy distraction since Friday has proven him right.
Critics point to strong bipartisan support for drones as the reason for this inertia. But persistent questioning is all the more urgent because
studies show that this apparent support arises out of a fundamental, deliberately propagated misunderstanding
about how drones are used. According to a 2013 study, while most Americans approve drone strikes targeting high-level
terrorist targets, they disapprove that recourse when there is the possibility of civilian deaths. In short, most
Americans would disapprove the current use of drones if it were ever properly aired.
High-ranking military and diplomatic officials I have spoken to indicate that the problem is not military
commitment to the drone strategy but our civilian leadership's commitment to it. Within the Air Force especially, skepticism
about the tactic arises from the way CIA and the Joint Special Operations Command's independent, secret use of drones fatally compromises Air Force use of them.
I toured Creech Air Force Base in Nevada, where the USAF drones are remotely piloted. I was pressed afterwards
not to disclose the circumstances of the tour. I do not have much faith in the reasoning behind keeping them secret,
but some deluded sense of honor ties my tongue, redoubled by my sensitivity as a South-Asian-American to
suspicions of my patriotism after I was warned that describing the circumstances would somehow endanger the security of our service men and women
(although arguably disclosure in the name of democracy is patriotic duty, too). Such are the liabilities of being a hyphenated American with
ancestral ties to the geography being bombed. My son, whose name happens to have an Arabic root, was put on a Homeland Security no-fly list
despite being self-evidently three years old. These are real-life worries, and so I compromise. More significantly, that I did visit the base but was
censored from writing about it suggests the military is playing a double-game, inviting public oversight on its own terms to
safely air its doubts about the drone strategy while its siege mentality prevents a full and clear airing of them as
part of real public debate. While criticism remains episodic and marginal, the men and women who run operations at Creech are in thrall to Orientalist
notions about the "culture" of people in the AfPak region. Thus, for example, some believe Afghani men are indifferent to the death of women and children without
considering that Americans might appear similarly indifferent to Afghanis given our own evident tolerance of civilian deaths there. Orientalist notions about the
terrain's otherworldliness are also in play, situating it somewhere beyond the pale of civilization where al Qaeda finds sanctuary and thus where drone use can be
countenanced in a way it would not be tolerated elsewhere. Indeed, romantic descriptions of a fantastically remote, thickly-forested valley surrounded by snow-capped
peaks ran through the New York Times coverage of the American hostage's death in the Shawal Valley. I have written extensively about how our military inherited
these views from the British who first attempted to police the region from the air after World War I. They are crucial to drone operators' ability to press the trigger,
keeping the region permanently unreal and alien, an eternal frontier-zone where civilization ends and something else, ungovernable, begins. As much as defenders of
drone strikes tout the hours of close surveillance that give remote pilots a kind of intimacy with their victims, in fact, one-way surveillance of that kind is not aimed at
producing empathy but greater confidence in the target's presumptive otherness. Creech's motto is "Home of the Hunters," and the first hunter-killer drone is called the
"Predator." Every good hunter must know its prey's habits well, but we would never mistake that intimate knowledge for empathy. The
ugly truth is that our
official policy is to count all dead as militants -- that is how we dispensed with the matter of civilian casualties until
last week's inconvenient news of the deaths of an American hostage and Italian aid worker. The cause of this absurd policy is not lack of civilian
oversight of the military but lack of democratic oversight of our civilian leadership. The day after the New York Times remarked
the folly of drone tactics revealed by the death of an innocent American, the paper fawned over the program's decimation of al Qaeda leadership -- feebly in the end, for
the article had to admit that al Qaeda has declined primarily because would-be militants prefer ISIS, hardly a development our drone strategists should be proud of. It
is time for us, as Americans, to exercise our responsibility as citizens and take control of the debate. Our leadership
does not want journalists demanding revelatory tours of Creech. Journalists and citizens, demand a tour. At the very least, demand an account
of and an apology for every civilian death. Drones routinely terrorize and kill civilians. Is this American culture?
Drones strikes kill thousands of people and causes major psychological trauma to survivors
Purkiss, 15 (Jessica, freelance reporter working from the West Bank. “US drone strikes have traumatised a generation of Yemenis and will push them towards
militancy” 4-20-15. https://www.middleeastmonitor.com/articles/americas/18143-us-drone-strikes-have-traumatised-a-generation-of-yemenis-and-will-push-themtowards-militancy)
14
SSRA Affirmative
DKC-ENDI 2015
A year ago today, Hussein Ahmed Saleh Abu Bakr, a labourer, was travelling to work in Al-Bayda, central Yemen, with 11
colleagues including family members when a drone struck the car. When the attack was over, Hussein emerged from where he had taken
cover to look for the other passengers and found his father, 65, slumped in the road with shrapnel injuries to his head and chest. The bodies of the other passengers were
Four of the passengers were killed:
Sanad Nasser Hussein Al-Khushm, Abdullah Nasser Abu Bakr Al-Khushm, Yasser Ali Abed Rabbo Al-Azzani and
Ahmed Saleh Abu Bakr."Why? Why did they kill my son Sanad and my cousin Ahmed Saleh Abu Bakr? My son and my cousin did not belong to any
organisation," said Hussein Nasser Abu Bakr Al-Khushm to researchers of a report released by the Open Society Justice Initiative. The attack was part of
the US's targeted killing programme, a tactic which was employed in combat operations in Afghanistan and Iraq
and is a core part of "counterterrorism" efforts in Pakistan, Yemen and Somalia. US Secretary of State John Kerry said at a BBC
scattered around the area, with some injuries so severe, Hussein was only able to identify them from their clothing.
forum in 2013: "The only people that we fire a drone at [sic] are confirmed terrorist targets at the highest level after a great deal of vetting that takes a long period of
the report entitled "Death by Drone: Civilian harm caused by US targeted
found no evidence that the passengers in the car were linked to any terrorist organisation. It seems
that they were "collateral damage" in a targeted attack on the car driving in front of them. Collateral damage in
US drone attacks have claimed many innocent lives. For example, in Yemen strikes targeting 17 named men killed
273 people, at least seven of them children, according to the Guardian. These attacks have explicit support from the Yemeni government and
time. We don't just fire a drone at somebody and think they're a terrorist." However,
killings in Yemen",
President Abd Rabbuh Mansur Hadi, who took over power following former President Ali Abdullah Saleh's 33-year reign ended amid widespread protests during the
Arab Spring, praised US drone strikes in Yemen and stated that he personally approved every drone strike taking place in the country. These
attacks have
stayed largely out of mainstream news, except in December 2013 when a drone attack hit the wedding procession
of Abdullah Mabkhut Al-Amri and Warda Al-Sorimi killing 12 of the guests. The Yemeni government gave the families $101,000
and 101 rifles in compensation. The US did not publically launch an investigation or provide compensation. Although the wedding attack led to Yemen's Parliament
A lack of justice is however typical in such
cases. Jen Gibson, an attorney at Reprieve who represents drone victims said: "For many innocent people in places like Yemen and
Pakistan, drones are judge, jury and executioner all in one." She added: "The true extent of the US drone programme
is shrouded in secrecy, and when the families of the victims seek redress for the terrible injustice of losing their loved ones – often
women and children – there is zero accountability." According to Reprieve, the US has used drones to execute without trial some
4,700 people in Pakistan, Yemen and Somalia – all countries against whom it has not declared war.
Contrary to the claims by Yemen and the US that the strikes help contain Al-Qaeda in the Arabian Peninsula's (AQAB) activities, clinical and forensic
psychiatrist Peter Schaapveld expressed fear in an interview to Channel 4 that the drones were pushing the youth into the hands of militant organisations.
After conducting research in Yemen, he warned of a "psychological emergency" in towns impacted by drones, with 99
per cent of Yemenis he spoke to suffering from post-traumatic stress disorder (PTSD). He described the children he assessed as
passing an almost unanimous but nonbinding resolution to prohibit the US from continuing drone strikes.
"hollowed-out shells of children" who are being "traumatised and re-traumatised"
American drone usage causes a global arms race – that risks global wars
Xiaolin, 13 (Duan, PhD student in Lee Kuan Yew School of Public Policy, National university of Singapore. Research interests include small wars, foreign and
public policy analysis. “The Rise of the Drones” 11-2-13. http://thediplomat.com/2013/11/the-rise-of-the-drones/?allpages=yes)
In a broader sense, America’s
use of drones may create more strategic dilemmas for regional and global peace and
stability: specifically proliferation and a possible arms race involving drones that could leave the world more prone
to conflict. Drones are usually deployed and sent to turbulent areas for intelligence collection and targeted assassinations. They rely heavily on remote control and
information links. Small technical errors can result in the rapid proliferation of modern weapons and technology. Case in
point: In December 2011, Iran hijacked a U.S. Stealth RQ-170 by spoofing its GPS signal. Iranian Revolutionary
Guards then reversed-engineered it, decoded the data and software, and produced a copy. Now, Iran has around
17 drones, including six armed UAVs in use. Its Shahed-129 is capable of attacking air and land targets, which “marks a significant technological advance.”
America’s use of drones has also prompted many other countries to develop their own or buy drones from the
international market, including Britain, Israel, India, Russia, South African and China. Indeed, China is particularly ambitious,
having sold Wing Loong UAVs to a number of countries. It is now developing its stealth drone “Li Jian” (Sharp Sword), which makes it the third country capable of
producing such weapons, after America’s X-47 and France’s nEUROn.
Countries that don’t have drones may feel threatened and less secure, and seek similar or other asymmetrical means to maintain the
balance of power. This could lead to an arms race. What’s more, as the adage says, to the man with a hammer everything
looks like a nail. Leaders and field commanders may become overconfident in their technology, making them more
assertive than prudence would normally dictate.
Security experts worry that drones, usually fielded in geopolitically dangerous areas of the world, may contribute
to the outbreak of more small wars and conflict escalation. In the Middle East, Iran and Israel are adversaries armed with advanced drones.
15
SSRA Affirmative
DKC-ENDI 2015
Israel is now more likely to use drones in strikes against Iran’s nuclear facilities. If that happens, Iran will
certainly retaliate, probably using drones, too. In East Asia, China has used drones to monitor the disputed
Senkaku/Diaoyu islands in the East China Sea, and Japan has indicated that it plans to do the same. Tokyo has
said it may shoot down Chinese drones, prompting a warning by Beijing that this would mean war with China.
Taiwan, South Korea, India and a number of ASEAN countries are seeking to buy Global Hawk drones from the
U.S., potentially escalating tensions in the South China Sea.
While the U.S. today enjoys the advantages of drones in its fight against terrorism, the White House needs to consider the strategic
implications: proliferation, possible arms races, and the irresponsible use of UAVs in regional disputes and
conflicts. As a global leader, the U.S. should cooperate with the UN and other international organizations to
monitor and regulate the use of drones. Irresponsible use should be taken very seriously, and condemned by the international community.
16
SSRA Affirmative
DKC-ENDI 2015
1AC – Democracy Advantage
The NSA’s militarization of the internet threatens democracy and enables totalitarianism
Valeri, 13 (Andy, M.A. Interdisplinary Studies, adjunct at the School of Advertising Art, founder of UnCommon Sense TVMedia. “Communication, Human
Rights, and The Threat of Weapons of Mass Surveillance: Why Communication Rights Are Essential To the Protection and Advancement of Human Rights in the 21st
Century.” Paper presented at the conference on The Social Practice of Human Rights: Charting the Frontiers of Research and Advocacy University of Dayton, October
3-5, 2013. http://ecommons.udayton.edu/cgi/viewcontent.cgi?article=1043&context=human_rights)
We’re all familiar with Lord Acton’s famous axiom about the corrupting effects of power, particularly that of absolute power. In light of that, what
are the
ramifications for the future of human rights and our right to communicate - to say nothing of the fate of global society on a whole –
due to these increasing levels of access and control over the global information environment that we are witnessing
today, all consolidated among a small cadre of private and state agencies? It is a situation which demands that we redefine power and force relations in society, for if
we do not, “the universality of the internet will merge global humanity into one giant grid of mass surveillance and mass control" (Assange et al., p. 6). This
situation is untenable for any society hoping to assert democratic legitimacy in its governance, for no state can
rightfully claim a monopoly on both violence and information and communication, and still proclaim itself to be
democratically representative. A monopoly on the ability to access and impart information, one imposed by the
coercive force of state power, makes the ability to form actual, legitimately participatory, democratically-based
culture impossible (Goodman, May 29, 2013). And it is this capacity for public participation and accountability in a society, which is essential to the defense
and promotion of human rights (M. Ensalaco, Politics of Human Rights POL 333 lecture, January 15, 2009). Social theorist and technologist Vinay Gupta (2013) has
pointed out how the
Internet, once a promising opportunity for connecting people, creating new businesses, and expanding our capacity
for culture, has today become a surveillance trap. This certainly wasn’t the intention of its inventors, many of whom envisioned it as a way to attain
more “freedom from being snooped on, filtered, censored and disconnected” (Berners-Lee, 2011), not less. In fact, the very architecture of the Internet is predicated
upon such decentralization of power and authority over its operation (Wu, 2010, pp. 197- 202). Yet, in spite of its initial promise in further democratizing the dynamics
of power, we cannot be too overly surprised by some of the recent developments unfolding surrounding its use (or abuse, depending on your perspective). Tools of
liberation also serve as tools for power to push back. We saw this in Egypt, as the social media platforms which were used to organize protests against the Mubarak
regime were the same ones used by the regime to track down and arrest the very same protestors (Gallagher, 2011). As Zeynep Tufekci (Ulrike Reinhard, 2012) has
pointed out, the use of new communication technologies may cause initial disruptions to power, but power always responds. For instance, the advent of the printing
the development of the
Internet has served to open up practically every dimension of society in a way never before experienced – including
to the means for total control… “The dream of being connected is suddenly dystopic. The virtual commons is more closed than the real one ever was.
press gravely wounded the Catholic Church, but the Church adapted and survived (Ulrike Reinhard, 2012). And now today,
And it is becoming clearer and clearer that open source technology will not be enough to us. Our social networks have been infiltrated… Totalitarian states around the
globe are waking up to the fact that if you really want to stay one step ahead, you don’t suppress communication, instead you empower communication with gadgets
we’re all walking around with personal surveillance devices in our pockets,
smartphones which we voluntarily fill with every single detail of our lives” (“A New Generation of Whistleblowers,” 2013). Such
developments pose an existential threat to the future of human communication, and to our declared right to engage
in it “without interference,” to “seek, receive and impart information and ideas through any media and regardless
of frontiers” (Article 19, UDHR). The Corrosive Effects of Surveillance on Society and Its Threat To Human Rights French sociologist Jacques Ellul, in his
and free Wi-Fi and listen in. And now
classic work The Technological Society (1964), illustrated the way in which modern mass society becomes dependent upon the very technological processes which
Today, the shared instruments used by human beings around the world to communicate
with one another - the means by which we create culture, engage and maintain personal relationships, participate in civic affairs, maintain our society, and fulfill
our humanity - is being corrupted in ways which threaten the future of democratic civilization. Just as mass production was the
defining backdrop for the struggle surrounding labor rights, mass surveillance is rapidly becoming the defining framework for those of communication rights. Under
the auspices of fighting a seemingly perpetual war against an ever-present threat of ‘terrorism,’ the Internet has
become the active terrain of war, and is considered a battleground, part of the “operational domain” of the
military (Alexander, 2011). And battlegrounds are the least hospitable of environments for the provision and the
protection of human rights and the rule of law (Human Rights and Conflicts, n.d.). The U.S. National Security Agency (NSA),
with no legal mandate, and beyond the bounds of American constitutional and international human rights law, has
made it its own explicit policy to collect and monitor every single form of electronic communication on the planet
(Nakashima & Warrick, 2013). Or, as in the words of NSA director Gen. Keith Alexander, to “collect it all” (Nakashima & Warrick,
2013), mirroring the official motto of the Stasi, the infamous secret police force of the former East Germany - “To
Know Everything.” William Binney, an NSA whistleblower who was the research head of its Signals Intelligence
Division and one of the principle architects of these surveillance systems, has warned that their existence creates the
capacity for a “turnkey totalitarianism,” the likes of which we have never seen before (Bamford, 2012).
simultaneously work to undermine it.
17
SSRA Affirmative
DKC-ENDI 2015
1AC – Democracy Advantage
Mass surveillance enables tyranny
Lempert, 13 (Richard, Visiting Fellow in Governance Studies at the Brookings Foundation and the University of Michigan’s Eric Stein Distinguished University
Professor of Law and Sociology emeritus. “PRISM and Boundless Informant: Is NSA Surveillance a Threat?” 6-13-13. http://www.brookings.edu/blogs/upfront/posts/2013/06/13-prism-boundless-informant-nsa-surveillance-lempert)
Through its PRISM and Boundless Informant efforts, NSA is working to protect the nation, apparently with some success.
The 99.9% of us who pose no threat of terrorism and do not inadvertently consort with possible terrorists should not worry that the government will track our phone or
internet exchanges or that our privacy will be otherwise infringed. This
does not mean, however, that the NSA programs and the
capacities they reveal are of no concern. They should be regarded as canaries in the coal mine; they provide early warning of dangers we may be
confronting. These capacities, along with increasingly ubiquitous surveillance cameras, photo recognition software, the ongoing development of rapid recognition DNA
analysis, drones that can spy or kill and DNA, fingerprint, photo and other searchable digital databases together create what I have called the infrastructure of tyranny.
These technologies potentially enable small groups of people to control and restrict the freedom of far larger
numbers. We think this could not happen here, and I do not claim it is imminent, but recent trends in politics and
social life suggest that if the fear was ever groundless, it no longer is. Not only are our politics deeply and too often viciously divided, but
divisions seem to be stoked by extremists who personally profit from their ability to arouse emotions and by small
numbers of extremely wealthy individuals who spend freely to advance their views of the good society. Moreover, our
political parties and Congress itself sometimes seem more interested in thwarting the opposition or scoring points with their most committed supporters than with
cooperating and compromising to promote the national interest. Concerns raised by these developments are exacerbated by an increased tendency within Congress to
ignore more or less neutral procedural commitments and understandings that have allowed effective governance despite sometimes deep differences in political goals.
In addition, we live in a time of increasing inequality and decreasing social mobility. The experience of other
countries from the French Revolution on suggests that when inequality becomes too great and a small group of “haves” is seen
as capturing too large a share of the pie, protests begin that even if peaceful at the start are prone to erupt into violence. Even
before violence from below erupts, and almost always afterwards, we have seen those on top muster their resources
to suppress dissent and to preserve their positions of power, using violence of their own if need be.
Historically the masses tend, sooner or later, to prevail, but in PRISM, Boundless Informant and other new technologies
we are developing a set of tools that make it more likely that an elite core will be able to disrupt nascent revolt and
maintain its preferred position by increased surveillance and even selective killing. Although it is not likely, it is not
unimaginable that a future administration could, with substantial popular support, use a genuine crisis as an excuse to
postpone a scheduled election, could put down subsequent protests with violence and could create a situation in
which it maintained itself in power using the infrastructure we are creating to protect us from crime and terrorism.
Even if the possibility is small it cannot be too much diminished. Doing this is likely to involve combating inequality, strengthening democratic institutions and
perhaps abandoning the volunteer army, matters too far afield to be further discussed here.
Even if it seems fanciful to fear that American democracy could one day be imperiled by technologies and activities developed to fight crime and terrorism, it is not
foreign governments can, and to some degree are, using these technologies to enable
powerful elites to control people who desire more freedom or might seek to replace them in power. Moreover the lines
demarcating those in control may relegate people of certain religions, gender, or gender preferences or ethnic
heritage to permanent positions of economic disadvantage and powerlessness.
farfetched to recognize the degree to which
Tyranny is possible – claims to the contrary take a short view of history and ignore that
dissidents are already targeted by the government
Dotcom, 13 (Kim, German-Finnish Internet entrepreneur, founder of Megaupload. “Prism: concerns over government tyranny are legitimate”
http://www.theguardian.com/commentisfree/2013/jun/13/prism-utah-data-center-surveillance)
Snowden’s leak of classified US government information acquired during his work for the National Security Agency (NSA)
confirms that the US government is gathering and archiving online data and metadata on a massive scale. The data is
stored at NSA data centers, where zettabytes of cloud storage are available to authorities. Snowden’s revelations have again framed the debate
over the balance between our privacy rights and our need for security.
Some proponents of Prism assert that it is an essential tool against terrorism. They claim that only data belonging to foreigners (that is, non-US residents) is retained,
and that content is not reviewed as a matter of course, only algorithmically analysed for suspicious patterns. They point out that a search warrant is still required from a
secret court set up under the US. The Foreign Intelligence Surveillance Act (FISA) may be spun up so that content – accumulated over years of daily internet spooling –
may be extracted and analysed, laying bare a suspect’s entire virtual life.
18
SSRA Affirmative
DKC-ENDI 2015
1AC – Democracy Advantage
Those safeguards have limited value. According to congressional reporting, the FISA court received 1,789 applications for authority to conduct electronic
surveillance in 2012, but not one application was denied. We cannot debate whether the FISA court is a rubber stamp, because its proceedings are secret. Further, any
assurance to US citizens that the NSA will not gather and archive their data is suspect. The “Five Eyes” alliance between the intelligence agencies of the US, Australia,
Canada, New Zealand and the UK effectively permits those governments to circumvent the prohibition against gathering data on their own citizens by sharing
information across the Five Eyes intelligence community. The UK for example can spy on Americans and make that information available to the US government on its
massive spy cloud – one that the NSA operates and the Five Eyes share.
Prior to 9/11, the operative presumption in developed nations favoured privacy, but the security narrative has
since reversed the presumption, eroding our privacy rights in favour of government control over our personal
information. However, government is an instrument – sometimes a crude one – susceptible to abuse, as demonstrated by recent
admissions that the US Internal Revenue Service has targeted specific groups based on ideology. When we empower the
state, we empower those that hold sway over the state, and the state is subject to influence from a multitude of quarters.
I have personally been a victim of such abuses. The US government has indicted me, shut down my cloud storage company Megaupload and seized all of my assets
because it claims I was complicit in copyright infringement by some of the people who used the Megaupload service. I have emphasised that I am being prosecuted not
because the charges against me have some sound basis in US copyright law, but because the US justice department has been instrumentalised by certain private interests
that have a financial stake in neutralising my business. That trend represents a danger not just to me, but to all of us.
Recent polls
in the US suggest that the public is not much preoccupied with the fact that our data is being retained, so
long as our own political party is in control of the government. That kind of fickle comfort is small-minded. The
point we should derive from Snowden’s revelations – a point originally expressed in March 2013 by William Binney, a former senior NSA
crypto-mathematician – is that the NSA’s Utah Data Center will amount to a “turnkey” system that, in the wrong hands,
could transform the country into a totalitarian state virtually overnight. Every person who values personal freedom, human rights and
the rule of law must recoil against such a possibility, regardless of their political preference. Others take a more cavalier approach, such as former Google CEO Eric
Schmidt in 2009: “If you have something that you don't want anyone to know, maybe you shouldn't be doing it in the first place.”
We should heed warnings from Snowden because the prospect of an Orwellian society outweighs whatever security benefits we derive from Prism or Five Eyes.
Viewed through the long lens of human history, concerns over government tyranny are always legitimate. It is
those concerns that underpin the constitutions of most developed countries, and inform international principles of
human rights and the rule of law. Prism and its related practices should be discontinued immediately, and the Utah Data Center should be leased to
cloud storage companies with encryption capabilities.
Democracy prevents wars – the less democratic the world is the more global wars will occur
LAPPIN 09 PhD candidate at the Centre for Peace Research and Strategic Studies at the Catholic University of Leuven
in Belgium under the supervision of Prof. Dr. Luc Reychler
Richard Lappin, What Democracy? Exploring the Absent Centre of Post-Conflict Democracy Assistance, Journal of Peace, Conflict and Development, Issue 14, July
2009, http://www.humansecuritygateway.com/documents/JPCD_ExploringAbsentCentrePostConflictDemocracyAssistance.pdf
Security
The relationship between democracy and security has been expounded on both the international and national levels and
the connection has been embraced at the highest strata of peacebuilding. In 2000, for example, UN Secretary General Kofi
Annan declared: ―There are many good reasons for promoting democracy, not least – in the eyes of the United Nations – is that,
when sustained over time, it is a highly effective means of preventing conflict, both within and between states.‖ 6 It is on
the international level that the primacy of democracy to post-conflict peacebuilding has received its strongest support with
reference made typically to the so-called ‗democratic peace theory.‘ This theory derives from one of the most striking results to emerge
from empirical research on war and peace and posits that dyads of democratic states are considerably less likely to fight
one another than dyads made up of non-democracies, or a combination of a democracy and a non-democracy. 7
Although research into this proposition has grown exponentially since the mid 1980s, the basis of the theory can be traced back to Immanuel Kant‘s 1795 essay,
‗Perpetual Peace.‘ Kant contended that in democracies, those who pay for wars – that is, the public – are the ones who make the
decisions, and are therefore understandably more cautious about commencing a war as they are the ones who ultimately have to foot the
costs through both blood (fatalities) and treasure (taxes).8
More recent explanations of the theory include arguments that democratic countries have internalised values of peaceful
bargaining and conflict resolution which are externalised into their international relations, 9 that substantial trade links
between democracies make war an economically crippling proposition, 10 and that democratic leaders avoid fighting wars
because they fear it will damage their chances of staying in power. 11
19
SSRA Affirmative
DKC-ENDI 2015
1AC – Democracy Advantage
Although the democratic peace theory has periodically been contested on the grounds of statistical significance,12 what
qualifies as a democracy, 13 and what qualifies as an international conflict, 14 it has proved remarkably robust over the decades. Several
contemporary scholars, such as Tony Smith, maintain that ―a democratic society operating under a market economy has a
strong predisposition to peace‖ 15 , whilst many internationally peer-reviewed articles declare in their introductions
that the majority of research now accepts the democratic peace theory as an empirical reality. 16 As Jack Levy
writes, ―the absence of war between democracies comes as close as anything to an empirical law in international
relations.‖ 17 Thus, in order to achieve a more peaceful international system, acceptance of the democratic peace theory
suggests that the more democratic states that exist, the lower the chances of international violence. 18 This is a factor that should
not be underestimated in postconflict environments, and one only has to look at the ‗spill-over‘ of internal conflicts in places such as Liberia, Sudan and Rwanda to
understand the necessity of promoting regional peace zones if security is to prove sustainable.
Moreover, the reasoning behind the democratic peace theory has also influenced the assertion that democratic government
is superior to other forms of government in positively managing internal security. Rudolph Rummel has demonstrated that
democracies are significantly less likely to experience domestic disturbances such as revolutions, guerrilla warfare and
civil war. 19
Rummel claims this is because:
Social conflicts that might become violent are resolved through voting, negotiation, compromise, and mediation. The
success of these procedures is enhanced and supported by the restraints on decision makers of competitive elections, the crosspressures resulting from the natural pluralism of democratic… societies, and the development of a domestic culture and norms that emphasise rational debate,
toleration, negotiation of differences, conciliation, and conflict resolution. 20
The notion that democracy can bring domestic peace to a post-conflict state is supported by several other important
writers. Samuel Huntington asserts that democracies ―are not often politically violent‖ due to constitutional commitments
which guarantee at least a minimal protection of civil and political liberties. 21 William Zartman argues that democracy
―transfers conflict from the violent to the political arena‖, by providing mechanisms to channel dissent and opposition
peacefully, thus reducing the incentive to use violence. 22
This is endorsed by Hans Spanger and Jonas Wolff who emphasise that the openness and freedoms in democracies to express
discontent and to protest circumvents the need for widespread violence. Moreover, the very articulation of discontent through
the freedom of speech and freedom of press can act as an early warning system for the state to identify issues that may
become overly divisive and to respond accordingly. 23 Judith Large and Timothy Sisk, amongst many, have emphasised how
democracies extend the protection of rights to minority groups, 24 which, according to Ted Gurr, ―inhibits communal rebellion‖
25 .
Democratic freedom is the ultimate good – insures value to life, and allows people to rule
themselves – insures no famine, or genocide will go unquestioned. It is the ultimate good
RUMMEL 09 Professor Emeritus of Political Science at the University of Hawaii
[Rudy (R.J.) Rummel, Democracy, Democratic peace, freedom, globalization, This entry was posted on Sunday, January 18th, 2009 at 4:02 pm,
http://democraticpeace.wordpress.com/2009/01/18/why-freedom/]
In the world today, billions of human beings are
still subject to impoverishment, exposure, starvation, disease, torture, rape, beatings, forced
violence, and war. These billions live in fear for their lives, and for those of their loved
ones. They have no human rights, no liberties. These people are only pieces on a playing board for the armed thugs and gangs that oppress their nations,
labor, genocide, mass murder, executions, deportations, political
raping them, looting them, exploiting them, and murdering them. We hide the identity of the gangs—we sanctify them—with the benign concept of “government,” as in
the “government” of Khmer Rouge Cambodia, Stalin’s Soviet Union, or Hitler’s Germany.
The gangs that control these so-called governments oppress whole nations under cover of international law. They are like a gang
that captures a group of hikers and then does with them what it wills, robbing all, torturing and murdering some because gang members don’t like them or they are
“disobedient,” and raping others. Nonetheless, the thugs that rule nations “govern” by the right of sovereignty: the community of nations
explicitly grants them the right by international law to govern a nation when they show that they effectively control the national government, and this right carries with
it the promise that other nations will not intervene in their internal affairs.
International law now recognizes that if these gangs go to extremes, such as massive ethnic cleansing or genocide, then
the international community has a countervailing right to stop them. However, this area of international law is still developing, and in the
current examples of Cuba, Burma, Iran, North Korea, Rwanda, Saudi Arabia, Sudan, and Syria, among others, the thugs still largely have their way with
their victims. This is unconscionable. The people of these countries, and all people everywhere have the right to freedom of speech,
20
SSRA Affirmative
DKC-ENDI 2015
religion, organization, and a fair trial, among other rights, and one overarching right to be free subsumes all these civil and
political rights. This right overrules sovereignty, which is granted according to tradition based on a system of international treaties, not natural law.
Freedom, by contrast, is not something others grant. It is a right due every human being.
For too many intellectuals, however, it is not enough to point out that a people have a right to be free. They will counter by
arguing that freedom is desirable, but first people must be made equal, given food to eat, work, and health care. Freedom must
be limited as a means to good ends, such as the public welfare, prosperity, peace, ethnic unity, or national honor. Sometimes the intellectuals who go
about creating such justifications for denying people their freedom are so persuasive that even reasonable people
will accept their convoluted arguments. Need I mention the works of Marx and Lenin, for example, who provided “scientific” excuses
for the tyranny of such thugs as Stalin, Mao, and Pol Pot?
To many compassionate people, such intellectuals, arguing that freedom must be sacrificed for a better life, have had the best of the
argument and the moral high ground. These intellectuals have tried to show that freedom empowers greed, barbaric competition, inefficiency, inequality,
the debasement of morals, the weakening of ethnic or racial identity, and so on.
To be defensive about freedom in the face of such justifications is morally wrong-headed. No moral code or civil law allows that a
gang leader and his followers can murder, torture, and repress some at will as long as the thugs provide others with a good life. But even were it accepted that under the
cover of government authority, a ruler can murder and repress his people so long as it promotes human betterment, the burden of proof is on those who
argue that therefore those people will be better off
There is no such proof. Quite the opposite: in the twentieth century, we have had the most costly and extensive tests of
such arguments, involving billions of people. The Nazis, Italian fascists under Mussolini, Japanese militarists, and Chinese
Nationalists under Chiang Kai-shek have tested fascist promises of a better life. Likewise, Lenin, Stalin, Mao, and Pol Pot have tested the utopian
promises of communism, to mention the most prominent communist experiments; and Burma, Iraq, and Syria, among others, also have tested state socialism. All
these vast social experiments have failed, utterly and miserably, and they have done so at the vast human cost that has included global social upheaval,
the displacement of millions, the impoverishment of billions, and the death of tens of millions from famine, extreme internal violence, and the most destructive wars—
not to mention the many hundreds of millions murdered outright.
These social experiments have involved the mass murder of 262,000,000 Russians, Chinese, Cambodians, Poles, North Koreans, Cubans,
Vietnamese, and others, such that were their souls to comprise a land of the dead it would be among the world’s top three in population
In sharp contrast, there are the arguments for freedom. Not only is a right certified in international law (e.g., the various human rights
multinational conventions), but a supreme moral good in itself. The very fact of a people’s freedom creates a better life for all.
Free people create a wealthy and prosperous society
When people are free to go about their own business, they put their ingenuity and creativity in the service of all. They search for ways to satisfy the needs, desires, and
wants of others. The true utopia lies not in some state-sponsored tyranny, but the free market in goods, ideas, and services, whose operating principle is that success
depends on satisfying others. Moreover, it is not by chance that:
No democratically free people have suffered from mass famine
It is extraordinary, how little known this is. There are plenty of hunger projects and plans to increase food aid for the starving millions, all of which is good enough in
the short run. A starving person will die before the people can kick out their rulers or make them reform their policies. Yet simply feeding the starving today is not
enough. They also have to be fed tomorrow and every day thereafter. However, free these people from their rulers’ commands over their farming,
and soon they will be able to feed themselves and others as well. There is an adage that applies to this: “Give a starving person a fish to eat and
you feed him only for one day; teach him how to fish, and he feeds himself forever.” Yet teaching is no good alone, if people are not free to apply their new
knowledge—yes, teach them how to fish, but also promote the freedom they need to do so
Surprisingly, the incredible economic productivity and wealth produced by a free people and their freedom from famines are not the only moral goods of freedom, nor,
perhaps, even the most important moral goods. When people are free, they comprise a spontaneous society the characteristics of which strongly inhibit society-wide
political violence. Freedom greatly reduces the possibility of revolutions, civil war, rebellions, guerrilla warfare, coups, violent riots, and the like. Most of the violence
within nations occurs where thugs rule with absolute power. There is a continuum here:
The more power the rulers have, and the less free their people, the more internal violence these people will suffer
Surely that which protects people against internal violence, that which so saves human lives, is a moral good. And this is
freedom
Then there is mass democide, the most destructive means of ending human lives of any form of violence. Except in the case of
the Nazi Holocaust of European Jews, few people know how murderous the dictators of this world have been, and could be . Virtually
unknown are the shocking tens of millions murdered by Stalin and Mao, and the other millions wiped out by Pol Pot, Ho Chi Minh, Kim Il-sung, and their kind. Just
omitting foreigners, who are most often murdered during a war, such thugs murdered about 161,000,000 of their own people from 1900 to 1987. Adding foreigners and
including the whole twentieth century raises the toll they have killed to nearly the incredible aforementioned 262,000,000.
Even now, in the twenty-first century, these mass murders still go on in Burma, Sudan, North Korea, and the Congo (DR), just to mention the
most glaring examples.
What is true about freedom and internal violence is also so for this mass democide:
The more freedom a people have, the less likely their rulers will murder them. The more power the thugs have, the more
likely they are to murder their people
Could there be a greater moral good than to end or minimize such mass murder? This is what freedom does and for this it is, emphatically, a moral good .
21
SSRA Affirmative
DKC-ENDI 2015
1AC – Rights Advantage
The Internet Age requires a rethinking of traditional notions of human rights – control over the
internet is now synonymous with the ability to wield power
Valeri, 13 (Andy, M.A. Interdisplinary Studies, adjunct at the School of Advertising Art, founder of UnCommon Sense TVMedia. “Communication, Human
Rights, and The Threat of Weapons of Mass Surveillance: Why Communication Rights Are Essential To the Protection and Advancement of Human Rights in the 21st
Century.” Paper presented at the conference on The Social Practice of Human Rights: Charting the Frontiers of Research and Advocacy University of Dayton, October
3-5, 2013. http://ecommons.udayton.edu/cgi/viewcontent.cgi?article=1043&context=human_rights)
The evolution and progression of human rights
principles and practices throughout history have been defined by - and have very often defined - the conditions and
circumstances of the eras within which they develop. For example, new standards of civil and political rights arose as Enlightenment-inspired
Communication Rights: The Primary Human Rights Struggle of The Information Age
ideals took root in the latter years of the Agrarian Age, finding their globally transformative expression as the animating principles which drove the American and
French Revolutions of the late 18th Century (and nearly triggering a similar such revolution in Britain at the time, as well). It
was the conditions and
effects of the Industrial Revolution which moved labor rights squarely to the center of the ongoing struggle for
human rights. From abolitionism to the rise of unions and beyond, these rights even became the foundational basis for the development of entire ideological
movements (for example, socialism and communism), ones whose political ramifications continue to have global significance to this day. And now in today’s
“Information Age,” one defined by the revolutionary expansion of digital media technologies and networked
communication systems, we find communication rights, and the associated information rights ingrained within
them, thrust into a similar position of preeminent importance. This is because any meaningful protection and
exercise of rights within a society are eventually dependent upon power, and in today’s modern mass mediated
society, communication and information are where the central nexus of power lies. If the work of human rights is to be
fundamentally about empowerment rather than charity (thus underlying the very premise of the concept of rights as opposed to privileges), then it must act in
accordance with this essential truth. For the human rights community to ignore this is to seriously risk marginalizing the value and effectiveness of its work. It should
be made clear, however, that this rising primacy of communication rights does not replace the essential importance of many of the other rights which came to
prominence in earlier times. Rather, they serve to build upon them. Like the composition of a mountain, these new stratum of rights provide further evolutionary
formation of both our understanding and practice of human rights, as they continue to evolve through the ages, and through the world’s histories and cultural notions of
There is no issue that more defines the
ongoing struggle for communication rights and their preeminent importance to the future of human rights, than
that over access and control of the Internet. Its presence has become ubiquitous throughout society, and in many
respects essential, serving as the primary foundation for the digital communication revolution underway today.
Whether this revolution represents the most important shift in the course of human history is a debatable point, and
one best left to academics for another time. What is incontrovertible is that it is the most important shift happening now, with
the Internet serving as the axial point for practically all human knowledge and activity within society today.
Relationships are being shaped and defined through it. Society itself has become embedded into it. Almost nothing
happens outside some form of contact with it. It is the device by which practically all communication transpires,
the matrix upon which we engage in trade, create culture, and participate in civic affairs. Sir Tim Berners-Lee, the man who
the common good (Ishay, 2004/2008). The Internet – Ground Zero In The Battle For Communication Rights
invented the computer protocol that made the Web as we know it possible, envisioned its very structure as one built specifically upon egalitarian ideals, its purpose to
provide “electronic human rights,” its principles founded upon the Magna Carta and U.S. Constitution, and other such rights-expanding documents (Berners-Lee, 2011).
Ambassador Philip L. Verveer, U.S. Coordinator for International Communications and Information Policy, sees the Internet as the vehicle by which we are able to
manifest our “human right to communicate [our] ideas [and] to secure information” (USA and Europe, 2011). According to Berners-Lee (2011), the
Web is now more critical to democracy and free speech than any other medium, providing a communications
channel that makes possible a continuous worldwide conversation. It’s been said that the Internet has led the
greatest period of political education among the greatest number of people ever (Goodman, May 29, 2013). For whenever a new
form of communication is introduced, one that increases people’s ability to share ideas and information about how the world works, and is beyond the reach of
centralized control, the state of humanity notably improves (Goodman, May 29, 2013). According to new media sociologist Zeynep Tufekci (Ulrike Reinhard, 2012), it
power can no longer readily
operate through tactics of divide and conquer simply by preventing people from talking to each other. What we
are witnessing today is an entirely new phenomenon, as the aggregate of all intellectual knowledge from
throughout human history is being placed upon the Internet, resulting in a merging of global civilization with the
Internet itself (Assange, Appelbaum, Müller-Maguhn & Zimmerman, 2012). This is why efforts by states and private corporations to
wield dominate influence and control over the Internet’s infrastructure, and the information that passes over it,
has such profound implications for the future of our society and the protection of our rights within it. Information
after all, is power, and the Internet is the modern conduit both to it and of it. These communication networks are
not only at the center of power structures, they are the tools for actually creating them and controlling them. As
Berners-Lee (2011) warned, control over the Internet “is the sort of power that if you give it to a corrupt
is because of the Internet that we are moving away from a world where rule is based upon gatekeeping and censorship, and
22
SSRA Affirmative
DKC-ENDI 2015
1AC – Rights Advantage
government, you give them the ability to stay in power forever.” This is why the Internet, as the consolidator of
what is often referred to as “big data,” has become the goldmine to be controlled and exploited for political and
economic political advantage. It’s where real power and wealth resides today. It’s why a social networking site like
Facebook becomes valued at over 100 billion dollars (Watson, 2012). It’s why numerous African countries are
being provided whole internet infrastructures from the Chinese, including fiber optic cable and backbone switches,
yet aren’t being asked to pay for them in money, but rather in data (Assange et al., p. 49). It is why the U.S.
government spends tens of billions every year to track, copy, and store every piece of electronic communication
from the hundreds of millions - potentially even billions – of people’s communications that it is increasingly able to
access (Andrews & Lindeman, 2013).
Mass surveillance produces self-censorship and breaks down all social relations of trust. This is
not a dystopian fantasy: East Germany, Uzbekistan, and Soviet Czechoslovakia demonstrate the
threat to human dignity and authenticity
Valeri, 13 (Andy, M.A. Interdisplinary Studies, adjunct at the School of Advertising Art, founder of UnCommon Sense TVMedia. “Communication, Human
Rights, and The Threat of Weapons of Mass Surveillance: Why Communication Rights Are Essential To the Protection and Advancement of Human Rights in the 21st
Century.” Paper presented at the conference on The Social Practice of Human Rights: Charting the Frontiers of Research and Advocacy University of Dayton, October
3-5, 2013. http://ecommons.udayton.edu/cgi/viewcontent.cgi?article=1043&context=human_rights)
The rapidly expanding and indiscriminate use of these weapons of mass surveillance is destroying the intrinsic
capacity for human beings to communicate and to share information in ways commiserate with our fundamental
human rights to privacy, information, and communication. It threatens our ability to maintain our personal
dignity and authenticity as human beings, by degrading our right and ability to define and control the meaning
and purpose of the lives we live, and the relationships we engage with among each other. It turns our humanity
against us, perverting and prostituting our every expressed thought or desire, declared affirmation or repudiation,
into potential grounds for criminal investigation, commercial exploitation, or political intimidation. The NSA is
making every phone conversation, every email, every webpage viewed, every purchase made, into a secret
government document (Nakashima & Warrick, 2013). Facebook is transforming every personal statement into a public proclamation (Kee, 2013). Regardless
of the self-serving announcements made by the creator of Facebook Mark Zuckerberg, that privacy is no longer a “social norm” (Johnson, 2010), “share with friends” is
not taken by the users of social media to mean “share with friends, corporations, and the state.” Facebook is also endeavoring to make people’s ostensibly private wall
posts on it available to media corporations for potential use in their programming, without even the knowledge or permission of the poster (Kee, 2013). Such forms of
“surfacing” (to use the company’s euphemism for this practice) strips people of their inherent right of agency over their own communicative process, agency over who
the recipient of that communication is and its intended meaning. 2 Zuckerberg and his confederates among the information technology field may feel that people are
This calls to
mind the repetitive refrain often heard from defenders of these surveillance practices, that “if you don’t have
anything to hide, you don’t have anything to worry about.” However, one doesn’t leave one’s doors unlocked, or
computer programs without passwords simply because one “doesn’t have anything to hide.” As Vinay Gupta has astutely
much more accepting of “sharing” and exposure in today’s technological environment (Johnson, 2010), but sharing is one thing, taking quite another.
observed, privacy may be dead to the likes of Mark Zuckerberg, but try telling that to lawyers, doctors and accountants… “Our society cannot function without
professional confidentiality, and having foreign powers be presumed to intercept all communications is simply the end of these professions as we have known them.
There’s no trusted advisor to consult with when it’s all ending up in the Utah data center to be consulted in future
decades under administrations with unknown political agendas” (Gupta, 2013). Perhaps even more disconcerting are
the demonstrable effects that persistent surveillance has on the psychological well being of individuals and
societies. Studies have detailed the many distorting impacts that it has on how we think and act (Parramore, 2013). Some have shown that the
electronic monitoring of employees increases the levels of tension, anxiety, anger, depression, even boredom and
fatigue among workers (Smith, Carayon, Sanders, Lim & LeGrande, 1992). East German society has never fully recovered from
the corrupting effects of the voyeuristic interference by the state in the social relationships of its people (Jacob & Tyrell,
2010). Internet research in places like Uzbekistan and Azerbaijan have shown how the presence of surveillance on
the Web corrodes the meaning and relevancy of people’s communication, particularly as it relates to matters of
civic participation (Kendzior, 2012). These studies show that, regardless of the amount of official censorship present, the
shifting of “social norms” in respect to privacy expectations has a marked impact on our willingness “to confide, to
criticize, to make mistakes, to change our minds” (Kendzior, 2012). The detrimental societal effects of this kind selfcensorship were well-documented by Elisabeth Noelle-Neumann (1974) in her groundbreaking research on what she
23
SSRA Affirmative
DKC-ENDI 2015
1AC – Rights Advantage
termed “the spiral of silence.” We see its effects in the “perception falsification” that takes place when people fail
to express their real thoughts or preferences out of fear of failing to conform to social or political norms (Ars
Electronica, 2011). Czech writer, dissident, and later president Václav Havel, argued that the credibility of the entire
structure of society itself is eroded by its reliance upon rituals and norms “untested by public discussion and
controversy” (Keane, 2000). When it comes to the destructive effects wrought by mass surveillance, there is probably no more brutal example than that of
Ceausescu’s Rumania, where truly every action observable would be reported to the secret police (Duque, 2011) . In such a society, deliberate
deception becomes the key to survival, a trait which quickly bleeds into all other human relations; personal, family,
commercial, etc. The true cost of surveillance thus becomes the destruction of society itself (Duque, 2011).
The protection of rights outweighs the small risk of terrorism. The threat of terrorism should be
understood as a built-in cost to living in a free society
Wallace, 07 (David Foster, correspondent w/r/t John McCain's presidential campaign in 2000, mastermind behind the incredibly potent DMZ, commencement
speaker at Kenyon College. “Just Asking,” November 2007. http://www.theatlantic.com/magazine/archive/2007/11/just-asking/306288/)
Are some things still worth dying for? Is the American idea one such thing? Are you up for a thought experiment? What if we
chose to regard the 2,973 innocents killed in the atrocities of 9/11 not as victims but as democratic martyrs,
“sacrifices on the altar of freedom”? In other words, what if we decided that a certain baseline vulnerability to
terrorism is part of the price of the American idea? And, thus, that ours is a generation of Americans called to
make great sacrifices in order to preserve our democratic way of life—sacrifices not just of our soldiers and money but of our personal
safety and comfort? In still other words, what if we chose to accept the fact that every few years, despite all reasonable
precautions, some hundreds or thousands of us may die in the sort of ghastly terrorist attack that a democratic
republic cannot 100-percent protect itself from without subverting the very principles that make it worth
protecting? Is this thought experiment monstrous? Would it be monstrous to refer to the 40,000-plus domestic
highway deaths we accept each year because the mobility and autonomy of the car are evidently worth that high
price? Is monstrousness why no serious public figure now will speak of the delusory trade-off of liberty for safety that Ben Franklin warned about more than 200
years ago? What exactly has changed between Franklin’s time and ours? Why now can we not have a serious national conversation about sacrifice, the inevitability of
sacrifice—either of (a) some portion of safety or (b) some portion of the rights and protections that make the American idea so incalculably precious? In the absence of
such a conversation, can we trust our elected leaders to value and protect the American idea as they act to secure the homeland? What are the effects on the American
idea of Guantánamo, Abu Ghraib, PATRIOT Acts I and II, warrantless surveillance, Executive Order 13233, corporate contractors performing military functions, the
Military Commissions Act, NSPD 51, etc., etc.? Assume for a moment that some of these measures really have helped make our
persons and property safer—are they worth it? Where and when was the public debate on whether they’re worth it? Was there no such debate
because we’re not capable of having or demanding one? Why not? Have we actually become so selfish and scared that we don’t even
want to consider whether some things trump safety? What kind of future does that augur?
Human rights are an Apriori issue. They guarantee the baseline conditions for living a decent
human life. You should be highly skeptical of any attempts to discard them in favor of utilitarian
calculation.
Donnelly, 85 (Jack,
College of the Holy Cross, The Concept of Human Rights, 1985, p. 55-58)
Basic moral and political rights are not just weighting factors in utilitarian calculations that deal with an
undifferentiated 'happiness'. Rather, they are demands and constraints of a different order, grounded in an essentially
substantive judgement of the conditions necessary for human development and flourishing. They also provide
means - rights - for realising human potentials. The neutrality of utilitarianism, its efforts to assure that everyone
counts 'equally,' results in no-one counting as a person; as Robert E. Goodin puts it, people drop out of utilitarian
calculations, which are instead about disembodied preferences (1981:95; compare Dworkin 1977:94-100,232-8, 274 ff.). In Aristotelian
terms, utilitarianism errs in basing its judgements on 'numerical' rather than 'proportional' equality. For our purposes, such differences should be highlighted. Therefore,
let us consider utilitarianism, whether act or rule, as an alternative to rights in general, and thus human rights as well. In particular, we can consider utility and human
24
SSRA Affirmative
DKC-ENDI 2015
1AC – Rights Advantage
rights as competing strategies for limiting the range of legitimate state action. Once again, Bentham provides a useful focus for our discussion. While Bentham insists
on the importance of limiting the range of legitimate state action (1838:11, 495, VIII, .557 ff.), he also insists that (natural) rights do not set those limits. In fact, he
argues that construed as limits on the state, natural rights 'must ever be, - the rights of anarchy', justifying insurrection whenever a single right is violated (1838:11, 522,
For Bentham, natural rights are absolute rights, and thus inappropriate to the real world of political
action. In fact, though, no major human rights theorist argues that they are absolute. For example, Locke holds that the right to
496, 501, 506).
revolution is reserved by society, not the individual (1967: para. 243). Therefore, individual violations of human rights per se do not justify revolution. Furthermore,
Locke supports revolution only in cases of gross, persistent and systematic violations of natural rights (1967:paras 204, 207, 225), as does Paine. The very idea of
absolute rights is absurd from a human rights perspective, since logically there can be at most one absolute right, unless we (unreasonably) assume thatrights never
come into conflict. A more modest claim would be that human rights are 'absolute' in the sense that they override all principles and practices except other human rights.
Even this doctrine, however, is rejected by most if not all major human rights theorists and documents. For example, Article I of the French Declaration of the Rights
of Man, after declaring that 'men are born, and always continue, free and equal in respect of their rights', adds that 'civil distinctions, therefore, can befounded only on
public utility', thus recognising restrictions on thecontinued complete equality of rights. Similarly, the Universal Declaration of Human Rights (Article 29) permits such
limitations as are determined by law solely for the purpose of securing due recognition and respect for the rights and freedoms of others and of meeting the just
requirements of morality,public order and the general welfare in a democratic society. The International Covenant on Civil and Political Rights includes a similar
general limiting proviso (Article 4) as well as particular limitations on most of the enumerated rights. Rights ordinarily 'trump' other
considerations, but the mere presence of a right - even a basic human right - does not absolutely and automatically
determine the proper course of action, all things considered. In certain exceptional circumstances, needs, utility,
interests or righteousness may override rights. The duties correlative to rights, and even the trumping force ofrights, are prima facie only. But
other principles also have prima facie moral force. Sometimes this will be sufficient to overcome even the special entrenched priority of rights. The obligations arising
from such rights therefore ought not to be discharged, all things considered. In such cases, we can speak of the right being 'infringed', since the (prima facie) obligation
But if even basic human
rights can be justifiably infringed, aren't rights ultimately subservient to utility? If recalcitrant political realities sometimes require
correlative to the rightis not discharged, but it would be seriously misleading to say that ithad been 'violated' (Thomson 1976, 1977).
subordinating natural rights, aren't we simply suggesting that human rights are merely utopian aspirations inappropriate to a world in which dirty hands are often a
requirementof political action - and thus where utility is the only reasonableguide? Such a response misconstrues the relationship between rights and utility and the
ways in which rights are overridden. Consider a very simple case, involving minor rights that on their face would seem to be easily overridden. If A promises to drive B
and C to the movies but later changes his mind, in deciding whether to keep his promise and discharge his rights-based obligations). A must consider morethan the
relative utilities of both courses of action for all the partiesaffected; in most cases, he ought to drive them to the movies even ifthat would reduce overall utility. At the
very least he must ask themto excuse him from his obligation, this requirement (as well as thepower to excuse) being a reflection of the right-holder's control overthe
rights relationship. Utility alone usually will not override even minor rights; we require more than a simple calculation of utility to justify infringing rights. The special
priority of rights/titles, as we have seen, implies that the quality, not just the quantity, of the countervailing forces(utilities) must be taken into consideration. For
example, if, whenthe promised time comes, A wants instead to go get drunk with someother friends, simply not showing up to drive B and C to the movieswill not be
justifiable even if that would maximise utility; the desirefor a drunken binge is not a consideration that ordinarily willjustifiably override rights. But if A accompanies
an accident victimto the hospital, even if A is only one of several passers-by whostopped to offer help, and his action proves to be of no real benefitto the victim,
usually this will be a sufficient excuse, even if utilitywould be maximised by A going to the movies. Therefore, evenrecasting rights as weighted interests (which would
seem to be theobvious utilitarian 'fix' to capture the special priority of rights) stillmisses the point, because it remains essentially quantitative. Rights even tend to
override an accumulation of comparable or parallel interests. Suppose that sacrificing a single innocent person with a rare blood factor could completely and
permanently cure ten equally innocent victims of a disease that produces a sure, slow and agonising death. Each of the eleven has the 'same' right to life.Circumstances
require, however, that a decision be made as to whowill live and who will die. The natural rights theorist would almostcertainly choose to protect the rights of the one
individual - andsuch a conclusion, when faced with the scapegoat problem, is one ofthe greatest virtues of a natural rights doctrine to its advocates. Thisconclusion rests
on a qualitative judgement that establishes theright, combined with the further judgement that it is not society'srole to infringe such rights simply to foster utility, a
judgementarising from the special moral priority of rights. Politically, such considerations are clearest in the case of extremely unpopular minorities. For example,
plausible arguments can be made that considerations of utility would justify persecution of selected religious minorities (e.g. Jews for centuries in the West,Mormons in
nineteenth-century America, Jehovah's Witnesses incontemporary Malawi), even giving special weight to the interests ofmembers of these minorities and considering
the precedents set by such persecutions. None the less, human rights demand that anessentially qualitative judgement be made that such persecutions are incompatible
with a truly human life and cannot be allowed - andsuch judgements go a long way to explaining the relative appeal ofhuman rights theories. But suppose that the
sacrifice of one innocent person would savenot ten but a thousand, or a hundred thousand, or a million people.All things considered, trading one innocent life for a
million, even ifthe victim resists most forcefully, would seem to be not merelyjustifiable but demanded. Exactly how do we balance rights (in thesense of 'having a
Ultimately the defender of
human rights is forced back to human nature, the source of natural or human rights. For a natural rights theorist
there are certain attributes, potentialities and holdings that are essential to the maintenance of a life worthy of a
human being.These are given the special protection of natural rights; any 'utility' that might be served by their
infringement or violation would be indefensible, literally inhuman - except in genuinely extraordinary
circumstances, the possibility of which cannot be denied, but the probability of which should not be overestimated.
Extraordinary circumstances do force us to admit that, at somepoint, however rare, the force of utilitarian
considerations builds up until quantity is transformed into quality. The human rights theorist, however, insists on
the extreme rarity of such cases. Furthermore,exotic cases should not be permitted to obscure the fundamental difference in emphasis (and in the
right'), wrongs (in the sense of 'what is right') andinterests? Do the numbers count? If so, why, and in what way? Ifnot, why not?
resulting judgements in virtuallyall cases) between utility and (human) rights. Nor should they be allowed to obscure the fact that on balance the flaws in rights-based
theories and practicesseem less severe, and without a doubt lessnumerous, than those of utility-based political strategies.
25
SSRA Affirmative
DKC-ENDI 2015
1AC – Internet Freedom
U.S. mass surveillance is the root cause of eroding global norms supporting internet freedom.
The plan changes that.
Washington Post, 14 (Citing a Freedom House report. “In the ‘global struggle for Internet freedom,’ the Internet is losing, report finds” 12-4-14.
http://www.washingtonpost.com/blogs/the-switch/wp/2014/12/04/in-the-global-struggle-for-internet-freedom-the-internet-is-losing-report-finds/)
The year 2014 marks the moment that the world turned its attention to writing laws to govern what happens on the
Internet. And that has not been a great thing, according to an annual report from the U.S.-based pro-democracy
think tank Freedom House.
Traditionally, countries eager to crack down on their online critics largely resorted to blocking Web sites and filtering Internet content, with the occasional offline
harassment of dissidents. But that has changed, in part because online activists have gotten better at figuring out ways around those restrictions; Freedom House points
to Greatfire, a service that takes content blocked in mainland China and hosts it on big, global platforms, like Amazon's servers, that the Chinese government finds both
politically and technologically difficult to block.
In the wake of these tactics, repressive regimes have begun opting for a "technically uncensored Internet," Freedom House finds, but one
that is increasingly controlled by national laws about what can and can't be done online. In 36 of the 65 countries
surveyed around the world the state of Internet freedom declined in 2014, according to the report.
Russia, for example, passed a law that allows the country's prosecutor general to block "extremist" Web sites
without any judicial oversight. Kazakstan passed a similar law. Vietnam passed decrees cracking down on any
critiques of the state on social media sites. Nigeria passed a law requiring that Internet cafes keep logs of the
customers who come into their shops and use their computers.
There's a bigger worry at work, too, Freedom House says: the potential for a "snowball effect." More and more
countries, the thinking goes, will adopt these sorts of restrictive laws. And the more that such laws are put in place,
the more they fall within the range of acceptable global norms.
Also shifting those norms? According to Freedom House, "Some states are using the revelations of widespread surveillance by the
U.S. National Security Agency (NSA) as an excuse to augment their own monitoring capabilities, frequently with
little or no oversight, and often aimed at the political opposition and human rights activists."
Mass surveillance undermines U.S. attempts to promote global internet freedom – it discredits
local civil society and justifies restrictive internet policy
Kehl et. al, 14 (Danielle Kehl is a Policy Analyst at New America’s Open Technology Institute (OTI). Kevin Bankston is the Policy Director at OTI, Robyn
Greene is a Policy Counsel at OTI, and Robert Morgus is a Research Associate at OTI.“Surveillance Costs: The NSA’s Impact on the Economy, Internet Freedom &
Cybersecurity” July 2014. https://www.newamerica.org/downloads/Surveilance_Costs_Final.pdf)
The effects of the NSA disclosures on the Internet Freedom agenda go beyond the realm of Internet governance.
The loss of the United States as a model on Internet Freedom issues has made it harder for local civil society
groups around the world—including the groups that the State Department’s Internet Freedom programs typically support203—to advocate for
Internet Freedom within their own governments.204 The Committee to Protect Journalists, for example, reports
that in Pakistan, “where freedom of expression is largely perceived as a Western notion, the Snowden revelations
have had a damaging effect. The deeply polarized narrative has become starker as the corridors of power push
back on attempts to curb government surveillance.”205 For some of these groups, in fact, even the appearance of collaboration
with or support from the U.S. government can diminish credibility, making it harder for them to achieve local
goals that align with U.S. foreign policy interests.206 The gap in trust is particularly significant for individuals and organizations that receive
funding from the U.S. government for free expression activities or circumvention tools. Technology supported by or exported from the United States is, in some cases,
Moreover,
revelations of what the NSA has been doing in the past decade are eroding the moral high ground that the United
States has often relied upon when putting public pressure on authoritarian countries like China, Russia, and Iran
to change their behavior. In 2014, Reporters Without Borders added the United States to its “Enemies of the
Internet” list for the first time, explicitly linking the inclusion to NSA surveillance. “The main player in [the United States’] vast
inherently suspect due to the revelations about the NSA’s surveillance dragnet and the agency’s attempts to covertly influence product development.
surveillance operation is the highly secretive National Security Agency (NSA) which, in the light of Snowden’s revelations, has come to symbolize the abuses by the
The damaged perception of the United States208 as a leader on Internet
Freedom and its diminished ability to legitimately criticize other countries for censorship and surveillance opens
world’s intelligence agencies,” noted the 2014 report.207
26
SSRA Affirmative
DKC-ENDI 2015
1AC – Internet Freedom
the door for foreign leaders to justify—and even expand— their own efforts.209 For example, the Egyptian
government recently announced plans to monitor social media for potential terrorist activity, prompting backlash
from a number of advocates for free expression and privacy.210 When a spokesman for the Egyptian Interior
Ministry, Abdel Fatah Uthman, appeared on television to explain the policy, one justification that he offered in
response to privacy concerns was that “the US listens in to phone calls, and supervises anyone who could threaten
its national security.”211 This type of rhetoric makes it difficult for the U.S. to effectively criticize such a policy.
Similarly, India’s comparatively mild response to allegations of NSA surveillance have been seen by some critics
“as a reflection of India’s own aspirations in the world of surveillance,” a further indication that U.S. spying may
now make it easier for foreign governments to quietly defend their own behavior.212 It is even more difficult for the United States
to credibly indict Chinese hackers for breaking into U.S. government and commercial targets without fear of retribution in light of the NSA revelations.213 These
challenges reflect an overall decline in U.S. soft power on free expression issues.
U.S. leadership shapes global internet norms – pro-freedom rhetoric must be paired with
concrete policy changes
Gross, 13 (David, U.S. Coordinator for International Communications and Information Policy at the State Department from 2001-2009.
“Walking the Talk: The
Role of U.S. Leadership in the Wake of WCIT,” 1-17-13. http://www.bna.com/walking-the-talk-the-role-of-u-s-leadership-in-the-wake-of-wcit-by-david-a-gross/)
During the past month, more has been written about December's World Conference on International Telecommunications (WCIT), hosted by the United Nation's
International Telecommunication Union (ITU) in Dubai, than about any previous international telecoms treaty conference. And for good reason. Despite the fact that
the nominal focus of the conference was to bring up-to-date a 1988 telecommunications treaty regarding traditional international telecoms services, countries such as
Russia, Saudi Arabia, China and others sought to use the gathering to establish new international rules through the ITU governing the internet. Although many believe
that WCIT failed because 55 countries—including the United States, virtually all of Europe, and other internet-leading countries such as Kenya and India—did not sign
the revised treaty, in reality WCIT was an important early chapter in the critical global process of determining the internet's political and policy future—and in turn, its
technical and economic future.
It is important to recognize that the internet's political and policy future will be shaped by American leadership—
not just through traditional U.S. rhetoric about competition, private sector leadership, and “multi-stakeholder” decisionmaking, but by
America's ability to “walk the talk” by showing unequivocally that the ideals we preach internationally are fully
reflected in what we do at home.
American policymakers recognize that what we do domestically is watched and analyzed with great care by much
of the rest of the world. For example, before the WCIT negotiations began in Dubai, Congress unanimously passed
resolutions on internet governance that stated that “the United States should continue to preserve and advance the multi-stakeholder governance model
under which the Internet has thrived as well as resist the imposition of an International Telecommunication Union (ITU) mandated international settlement regime on
the Internet.” Declaring,
among other things, that “it is essential that the Internet remain stable, secure, and free from
government control.”
Congress's Clear Message Was Heard
This action was important not only because of the substance of Congress's statements, but also because the world understood just how extraordinary it is for our
I heard
from many foreign officials that they knew that the United States would not sign the revised treaty with its
Internet-related provisions because Congress had sent a clear and unequivocal message that such an agreement
was unacceptable to the American people.
Looking ahead, we must recognize the obvious—internet policy issues affect virtually everyone in the world, and
U.S. leadership depends on the power of its forward looking arguments, not just the historical fact that the United
States gave the world a transformational technology. Although establishing global internet policy will be long, complex and challenging, we
Congress to act with unanimity, especially in an era when Congress has immense difficulty reaching consensus on almost anything. At the end of WCIT,
are fortunate that we have a well-established road map to follow.
No Room for Hypocrisy
We can continue to lead the world toward greater prosperity and the socially transformational benefits long
associated with the internet. But if we fail to match our words with action; if we insist that others avoid an
approach that imposes regulations and laws that limit the internet's capacity to advance freedom, openness and
creativity, micromanages markets, or limits competition and investment, but do otherwise at home, then the world
will quickly recognize our hypocrisy.
27
SSRA Affirmative
DKC-ENDI 2015
1AC – Internet Freedom
Repressed internet dooms innovation – that is vital to solving the world’s collective problems
Genachowski 13
[Chair-FCC, 4/16, "The Plot to Block Internet Freedom", http://www.foreignpolicy.com/articles/2013/04/16/plot_block_internet_freedom?page=full]
The Internet has created an extraordinary new democratic forum for people around the world to express their opinions. It is revolutionizing global access to information:
Today, more than 1 billion people worldwide have access to the Internet, and at current growth rates, 5 billion people -- about 70 percent of the world's population -will be connected in five years. But this growth trajectory is not inevitable, and threats are mounting to the global spread of an open and truly
"worldwide" web. The expansion of the open Internet must be allowed to continue: The mobile and social media
revolutions are critical not only for democratic institutions' ability to solve the collective problems of a shrinking world,
but also to a dynamic and innovative global economy that depends on financial transparency and the free flow of
information. The threats to the open Internet were on stark display at last December's World Conference on International Telecommunications in Dubai, where the
United States fought attempts by a number of countries -- including Russia, China, and Saudi Arabia -- to give a U.N. organization, the International
Telecommunication Union (ITU), new regulatory authority over the Internet. Ultimately, over the objection of the United States and many others, 89 countries voted to
approve a treaty that could strengthen the power of governments to control online content and deter broadband deployment. In Dubai, two deeply worrisome trends
came to a head. First, we see that the Arab Spring and similar events have awakened nondemocratic governments to the danger that the
Internet poses to their regimes. In Dubai, they pushed for a treaty that would give the ITU's imprimatur to governments'
blocking or favoring of online content under the guise of preventing spam and increasing network security. Authoritarian
countries' real goal is to legitimize content regulation, opening the door for governments to block any content they do not
like, such as political speech. Second, the basic commercial model underlying the open Internet is also under threat . In
particular, some proposals, like the one made last year by major European network operators, would change the ground rules for payments for transferring Internet
content. One species of these proposals is called "sender pays" or "sending party pays." Since the beginning of the Internet, content creators -- individuals, news outlets,
search engines, social media sites -- have been able to make their content available to Internet users without paying a fee to Internet service providers. A sender-pays
rule would change that, empowering governments to require Internet content creators to pay a fee to connect with an end user in that country. Sender pays may look
merely like a commercial issue, a different way to divide the pie. And proponents of sender pays and similar changes claim they would benefit Internet deployment and
Internet users. But the opposite is true: If a country imposed a payment requirement, content creators would be less likely to serve that country. The loss of content
would make the Internet less attractive and would lessen demand for the deployment of Internet infrastructure in that country. Repeat the process in a few more
countries, and the growth of global connectivity -- as well as its attendant benefits for democracy -- would slow dramatically.
So too would the benefits accruing to the global economy. Without continuing improvements in transparency and information sharing, the
innovation that springs from new commercial ideas and creative breakthroughs is sure to be severely inhibited. To their
credit, American Internet service providers have joined with the broader U.S. technology industry, civil society, and
others in opposing these changes. Together, we were able to win the battle in Dubai over sender pays, but we have not yet
won the war. Issues affecting global Internet openness, broadband deployment, and free speech will return in upcoming
international forums, including an important meeting in Geneva in May, the World Telecommunication/ICT Policy Forum. The massive investment in wired
and wireless broadband infrastructure in the United States demonstrates that preserving an open Internet is completely compatible with broadband deployment.
According to a recent UBS report, annual wireless capital investment in the United States increased 40 percent from 2009 to 2012, while investment in the rest of the
world has barely inched upward. And according to the Information Technology and Innovation Foundation, more fiber-optic cable was laid in the United States in 2011
and 2012 than in any year since 2000, and 15 percent more than in Europe. All Internet users lose something when some countries are cut off from the World Wide
Web. Each person who is unable to connect to the Internet diminishes our own access to information. We become less able to understand the world and formulate
policies to respond to our shrinking planet. Conversely, we gain a richer understanding of global events as more people connect around the world, and those societies
nurturing nascent democracy movements become more familiar with America's traditions of free speech and pluralism. That's why we believe that the Internet should
remain free of gatekeepers and that no entity -- public or private -- should be able to pick and choose the information web users can receive. That is a principle the
United States adopted in the Federal Communications Commission's 2010 Open Internet Order. And it's why we are deeply concerned about arguments by some in the
United States that broadband providers should be able to block, edit, or favor Internet traffic that travels over their networks, or adopt economic models similar to
international sender pays. We must preserve the Internet as the most open and robust platform for the free exchange of
information ever devised. Keeping the Internet open is perhaps the most important free speech issue of our time.
28
SSRA Affirmative
DKC-ENDI 2015
1AC – Internet Freedom
We need a free and open internet – it solves all the world’s problems
Eagleman 10 [David Eagleman is a neuroscientist at Baylor College of Medicine, where he directs the Laboratory for
Perception and Action and the Initiative on Neuroscience and Law and author of Sum (Canongate). Nov. 9, 2010, “ Six
ways the internet will save civilization,”
http://www.wired.co.uk/magazine/archive/2010/12/start/apocalypse-no]
Many great civilisations have fallen, leaving nothing but cracked ruins and scattered genetics. Usually this results from:
natural disasters, resource depletion, economic meltdown, disease, poor information flow and corruption . But
we’re luckier than our predecessors because we command a technology that no one else possessed: a rapid
communication network that finds its highest expression in the internet. I propose that there are six ways in which
the net has vastly reduced the threat of societal collapse. Epidemics can be deflected by telepresence One of our
more dire prospects for collapse is an infectious-disease epidemic. Viral and bacterial epidemics precipitated the fall of
the Golden Age of Athens, the Roman Empire and most of the empires of the Native Americans. The internet can be
our key to survival because the ability to work telepresently can inhibit microbial transmission by reducing
human-to-human contact. In the face of an otherwise devastating epidemic, businesses can keep supply chains running
with the maximum number of employees working from home. This can reduce host density below the tipping point
required for an epidemic. If we are well prepared when an epidemic arrives, we can fluidly shift into a selfquarantined society in which microbes fail due to host scarcity. Whatever the social ills of isolation, they are worse for
the microbes than for us. The internet will predict natural disasters We are witnessing the downfall of slow central
control in the media: news stories are increasingly becoming user-generated nets of up-to-the-minute information.
During the recent California wildfires, locals went to the TV stations to learn whether their neighbourhoods were in
danger. But the news stations appeared most concerned with the fate of celebrity mansions, so Californians changed their
tack: they uploaded geotagged mobile-phone pictures, updated Facebook statuses and tweeted. The balance tipped: the
internet carried news about the fire more quickly and accurately than any news station could. In this grass-roots,
decentralised scheme, there were embedded reporters on every block, and the news shockwave kept ahead of the fire. This
head start could provide the extra hours that save us. If the Pompeiians had had the internet in 79AD, they could have
easily marched 10km to safety, well ahead of the pyroclastic flow from Mount Vesuvius. If the Indian Ocean had the
Pacific’s networked tsunami-warning system, South-East Asia would look quite different today. Discoveries are
retained and shared Historically, critical information has required constant rediscovery. Collections of learning -from the library at Alexandria to the entire Minoan civilisation -- have fallen to the bonfires of invaders or the wrecking
ball of natural disaster. Knowledge is hard won but easily lost. And information that survives often does not spread.
Consider smallpox inoculation: this was under way in India, China and Africa centuries before it made its way to
Europe. By the time the idea reached North America, native civilisations who needed it had already collapsed. The
net solved the problem. New discoveries catch on immediately; information spreads widely. In this way, societies can
optimally ratchet up, using the latest bricks of knowledge in their fortification against risk. Tyranny is mitigated
Censorship of ideas was a familiar spectre in the last century, with state-approved news outlets ruling the press, airwaves
and copying machines in the USSR, Romania, Cuba, China, Iraq and elsewhere. In many cases, such as Lysenko’s
agricultural despotism in the USSR, it directly contributed to the collapse of the nation. Historically, a more
successful strategy has been to confront free speech with free speech -- and the internet allows this in a natural
way. It democratises the flow of information by offering access to the newspapers of the world, the photographers of
every nation, the bloggers of every political stripe. Some posts are full of doctoring and dishonesty whereas others strive
for independence and impartiality -- but all are available to us to sift through. Given the attempts by some governments to
build firewalls, it’s clear that this benefit of the net requires constant vigilance. Human capital is vastly increased
Crowdsourcing brings people together to solve problems. Yet far fewer than one per cent of the world’s population is
involved. We need expand human capital. Most of the world not have access to the education afforded a small minority.
For every Albert Einstein, Yo-Yo Ma or Barack Obama who has educational opportunities, uncountable others do not.
This squandering of talent translates into reduced economic output and a smaller pool of problem solvers. The net opens
the gates education to anyone with a computer. A motivated teen anywhere on the planet can walk through the world’s
knowledge -- from the webs of Wikipedia to the curriculum of MIT’s OpenCourseWare. The new human capital will
serve us well when we confront existential threats we’ve never imagined before. Energy expenditure is reduced
29
SSRA Affirmative
DKC-ENDI 2015
Societal collapse can often be understood in terms of an energy budget: when energy spend outweighs energy return,
collapse ensues. This has taken the form of deforestation or soil erosion; currently, the worry involves fossil-fuel
depletion. The internet addresses the energy problem with a natural ease. Consider the massive energy savings
inherent in the shift from paper to electrons -- as seen in the transition from the post to email. Ecommerce reduces the
need to drive long distances to purchase products. Delivery trucks are more eco-friendly than individuals driving
around, not least because of tight packaging and optimisation algorithms for driving routes. Of course, there are energy
costs to the banks of computers that underpin the internet -- but these costs are less than the wood, coal and oil that would
be expended for the same quantity of information flow. The tangle of events that triggers societal collapse can be
complex, and there are several threats the net does not address. But vast, networked communication can be an
antidote to several of the most deadly diseases threatening civilisation. The next time your coworker laments internet
addiction, the banality of tweeting or the decline of face-to-face conversation, you may want to suggest that the net may
just be the technology that saves us.
30
SSRA Affirmative
DKC-ENDI 2015
Extensions
31
SSRA Affirmative
DKC-ENDI 2015
Inherency
32
SSRA Affirmative
DKC-ENDI 2015
FYI – FISA Section 702
The NSA has tapped directly into the backbone of the internet under Section 702 of the FISA
Amendments Act, giving it access to millions of Americans' communications
Toomey, 15 (Patrick, Staff Attorney, ACLU National Security Project. “The NSA Has Taken Over the Internet Backbone. We're Suing to Get it Back,” 3-10-15.
https://www.aclu.org/blog/nsa-has-taken-over-internet-backbone-were-suing-get-it-back)
Every time you email someone overseas, the NSA copies and searches your message. It makes no difference if you
or the person you're communicating with has done anything wrong. If the NSA believes your message could contain information
relating to the foreign affairs of the United States – because of whom you're talking to, or whom you're talking about – it may hold on to it for as long as three years and
sometimes much longer.
A new ACLU lawsuit filed today challenges this dragnet spying, called "upstream" surveillance, on behalf of Wikimedia and a broad coalition of educational, human
rights, legal, and media organizations whose work depends on the privacy of their communications. The plaintiffs include Amnesty International USA, the National
Association of Criminal Defense Lawyers, and The Nation magazine, and many other organizations whose work is critical to the functioning of our democracy.
The surveillance affects virtually every American who
uses the Internet to connect with people overseas – and many who do little more than email their friends or family
or browse the web. And it should be disturbing to all of us, because free expression and intellectual inquiry will
wither away if the NSA is looking over our shoulders while we're online.
But the effect of the surveillance we're challenging goes far beyond these organizations.
The world first learned of the existence of upstream surveillance from whistleblower Edward Snowden's spying revelations in June 2013. Since then, official disclosures
and media reports have shown that the NSA is routinely seizing and copying the communications of millions of ordinary Americans while they are traveling over the
NSA conducts this surveillance by tapping directly into the Internet backbone inside the United States –
the network of high-capacity cables and switches that carry vast numbers of Americans' communications with
each other and with the rest of the world. Once the NSA copies the communications, it searches the contents of almost all international text-based
Internet. The
communications – and many domestic ones as well – for search terms relating to its "targets." In short, the NSA has cast a massive dragnet over Americans'
international communications.
Inside the United States, upstream surveillance is conducted under a controversial spying law called the FISA
Amendments Act, which allows the NSA to target the communications of foreigners abroad and to intercept
Americans' communications with those foreign targets. The main problem with the law is that it doesn't limit
which foreigners can be targeted. The NSA's targets may include journalists, academics, government officials, tech
workers, scientists, and other innocent people who are not connected even remotely with terrorism or suspected of
any wrongdoing. The agency sweeps up Americans' communications with all of those targets.
And, as our lawsuit explains, the NSA is exceeding even the authority granted by the FISA Amendments Act. Rather than limit itself to monitoring Americans'
communications with the foreign targets, the NSA is spying on everyone, trying to find out who might be talking or reading about those targets.
As a result, countless innocent people will be caught up in the NSA's massive net. For instance, a high school student in
the
U.S. working on a term paper might visit a foreign website to read a news story or download research materials. If those
documents happen to contain an email address targeted by the NSA – like this news report does – chances are the
communications will be intercepted and stored for further scrutiny. The same would be true if an overseas friend,
colleague, or contact sent the student a copy of that news story in an email message.
As former NSA Director Michael Hayden recently put it, "[L]et me be really clear. NSA doesn't just listen to bad people. NSA listens to interesting people. People who
are communicating information."
That doesn't sound like much of a limitation on the NSA's spying – and it's not. Like many Americans, the plaintiffs in our lawsuit communicate with scores of people
researchers at Human Rights Watch depend on foreign journalists,
lawyers, political dissidents, and witnesses to human rights abuses for information crucial to their advocacy and
reporting back home. Wikimedia communicates with millions of people abroad, many of whom read or contribute
to Wikipedia, one of the largest repositories of human knowledge on earth. We know, thanks to Edward Snowden, that the NSA is
interested in what some of those users are reading.
The fact that upstream surveillance is supposedly focused on international communications is hardly a saving grace. Americans spend more and more
of their lives communicating over the Internet – and more and more of those communications are global in nature,
whether we realize it or not. An email from a woman in Philadelphia to her mother in Phoenix might be routed through
Canada without either one knowing it. Similarly, companies like Microsoft and Google often store backup copies of
their U.S. customers' emails on servers overseas, again with hardly anyone the wiser. The NSA is peeking inside virtually all of
these.
overseas who the NSA likely finds "interesting." For instance,
33
SSRA Affirmative
DKC-ENDI 2015
Inherency Module
Mass surveillance is justified by multiple laws –
Human Rights Watch, 14
(“With Liberty to Monitor All: How Large-Scale US Surveillance is Harming Journalism, Law, and American Democracy,” July.
https://www.hrw.org/sites/default/files/reports/usnsa0714_ForUPload_0.pdf)
Legal Authorities Governing Surveillance
The US government conducts different types of surveillance in different contexts. For example, federal law enforcement agents
might seek a warrant from a judge to conduct targeted surveillance of a particular person suspected of a crime.21 The surveillance programs at issue in this report are
generally introduced in the name of national security or intelligence rather than criminal law enforcement. Instead of trying to piece together facts about events that
have already occurred, they aim to inform the government broadly and—in theory—help prevent future events like terrorist attacks. The programs disclosed by
Snowden operate on a much larger scale than more traditional surveillance methods used for law enforcement purposes—collecting hundreds, thousands, or millions of
Large-scale
surveillance by the US government proceeds under a variety of legal authorities. The main authorities known to the
public as of July 2014 are Section 215 of the USA PATRIOT Act (PATRIOT Act), Section 702 of the Foreign Intelligence
Surveillance Act (FISA), and Executive Order 12333. In addition to these tools, the FBI also has the power to collect significant amounts of
records at a time. By its nature, large-scale surveillance often implicates the interests of many people who are not suspected of any wrongdoing.
information relevant to national security investigations— without judicial oversight and sometimes in large quantities—using National Security Letters (NSLs).23
Surveillance under Section 215 of the PATRIOT Act
The phone call metadata program revealed by the Guardian in June 2013 operates under Section 215 of the
PATRIOT Act (Section 215), which allows for the collection of “tangible things” or business records that are
“relevant” to an authorized investigation.24 A major point of controversy concerning Section 215 is that the FISA Court has clearly adopted a weak
standard for relevance (and seemingly not in line with Congress’s intent) if it has concluded that Verizon should turn over metadata of all domestic calls on a rolling
basis.
Surveillance under Section 702 of FISA
Section 702 of FISA (Section 702) is a provision of federal law, created by the FISA Amendments Act (FAA), that permits the
Executive Branch to issue year-long warrants for collecting the content of international communications and other data
of persons reasonably believed to be outside the US, specifically to acquire broadly-defined foreign intelligence information. The FISA Court periodically
approves the government’s “minimization procedures,” as well as ”targeting procedures” designed to ensure
surveillance is targeted at non-US persons outside the US, but it does not issue specific warrants nor approve
specific targets of surveillance.25 Subject to minimization, the government can collect and use the international communications or internationally-shared
data of Americans under Section 702. The government relies on Section 702 to collect communications from US service
providers as well as to monitor fiber optic cables as they enter the United States, and both forms of surveillance
involve the collection of US persons’ communications.26 The targeting and minimization procedures that have been made public so far provide
almost no protections for non-US persons under these programs.27
Surveillance under Executive Order 12333
remains the primary
executive order addressing US intelligence activities, especially those undertaken abroad. Like the minimization procedures
Executive Order 12333 took effect when President Reagan signed it in 1981.28 It has been updated from time to time, but it
discussed above, Executive Order 12333 also provides some protections for US persons,29 requiring (when it comes to US persons) that the intelligence community
“use the least intrusive techniques feasible.”30 Yet the US government is reported to be conducting large-scale surveillance under
12333, such as “secretly breaking into the main communications links that connect Yahoo and Google data centers
around the world.”31 It appears, then, that the government has the power to collect large amounts of information
even on US persons through the executive order.
The government uses surveillance to monitor everyone – not just individuals suspected of crimes.
They collect data on everyone.
Assange et. al, 12
(Julian, editor-in-chief of WikiLeaks. Andy Muller-Maguhn, specialist on computers, telecommunications, and surveillance. Jacob Appelbaum, computer security
researcher. Jeremie Zimmerman, co-founder and spokesperson for the citizen advocacy group La Quadrature du Net. Conversation in the book “Cypherpunks: Freedom
and the Future of the Internet,” chapter titled “The Militarization of Cyberspace”)
34
SSRA Affirmative
JULIAN [Assange]: Andy, for years you’ve designed cryptographic telephones. What
DKC-ENDI 2015
sort of mass surveillance is occurring in relation to
telecommunications? Tell me what is the state of the art as far as the government intelligence/ bulk-surveillance industry is concerned? ANDY [MullerMaguhn]: Mass storage— meaning storing all telecommunication, all voice calls, all traffic data, any way groups
consume the Short Message Service (SMS), but also internet connections, in some situations at least limited to email.
If you compare the military budget to the cost of surveillance and the cost of cyber warriors, normal weapon systems cost a lot of money. Cyber warriors or mass
storage
gets cheaper every year. Actually, we made some calculations in the Chaos Computer Club: you get decent voice-quality storage of all
German telephone calls in a year for about 30 million euros including administrative overheads, so the pure storage is about 8 million euros.
surveillance are super-cheap compared to just one aircraft. One military aircraft costs you between… JULIAN: Around a hundred million. ANDY: And
42 JULIAN: And there are even companies like VASTech in South Africa that are selling these systems for $ 10 million per year. 43 “We’ll intercept all your calls,
we’ll store all your intercepted calls en masse.” But there
has been a shift in the last few years from intercepting everything going
across from one country to another and picking out the particular people you want to spy on and assigning them to
human beings, to now intercepting everything and storing everything permanently. ANDY: To explain it roughly
historically, in the old days someone was a target because of his diplomatic position, because of the company he
worked for, because he was suspected of doing something or he was in contact with people who actually did
something, and then you applied surveillance measures on him. These days it’s deemed much more efficient to say,
“We’ll take everything and we can sort it out later.” So they do have long-term storage, and the main way of describing the
industry’s two chapters is the “tactical” approach and the “strategic” approach. Tactical means, “Right now, in
this meeting, we need to bug the place, we need to get someone in with a microphone, an array jacket, or have GSM (Global System for Mobile
communications) surveillance systems, in a car, deployed, able to intercept what people are saying right away without needing to interfere with the network operator,
The strategic approach is to do it by default, just
record everything, and sort it out later using analytic systems. JULIAN: So, strategic interception is take everything
that a telecommunication satellite is relaying, take everything across a fiber optic cable. ANDY: Because you never
know when someone is a suspect. JACOB [Appelbaum]: There’s a thing called the NSA AT& T case in the United States— the second case: Hepting v.
AT& T. In Folsom, California, Mark Klein, a former technician for the giant telecommunications company AT& T, exposed that
the NSA, the US National Security Agency, was capturing all of the data that they could get AT& T to give them.
They just took it all wholesale— data as well as voice calls— so every time I picked up the phone or connected to
the internet in San Francisco during the time period that Mark Klein has exposed, we know that the NSA on US soil against US citizens
was getting it all. 44 I’m pretty sure they have used that intercept data in the investigations that they’ve been doing against people in the United States, which
get a police search warrant or anything like that, no legal procedure required, just do it.”
raises all kinds of interesting constitutional issues because they get to keep it forever. JÉRÉMIE [Zimmerman]: We also have this example of Eagle, the system sold by
the French company Amesys that was sold to Gaddafi’s Libya, and on the commercial document it was written, “Nationwide interception mechanism.” It’s a big box
Ten years ago this was seen to be a fantasy, this
was seen to be something only paranoid people believed in, but the costs of mass interception have now decreased to
that you put somewhere and you just listen to all your people’s communications. 45 JULIAN:
the point where even a country like Libya with relatively few resources was doing it with French technology. In fact most countries are already there in terms of the
actual interception. It’s the efficiency of understanding and responding to what’s being intercepted and stored that’s going to be the next big leap. Now in many
countries we have strategic interception of all traffic in and out of the country, but engaging in subsequent actions, like automatically blocking bank accounts, or
deploying police, or marginalizing particular groups, or emancipating others, is still something we are on the cusp of. Siemens is selling a platform for intelligence
agencies that does actually produce automated actions. So when target A is within a certain number of meters of target B according to their mobile intercept records,
and target A receives an email mentioning something— a keyword— then an action is triggered. It’s on the way. FIGHTING TOTAL SURVEILLANCE WITH THE
So now it’s a fact that technology enables total surveillance of every communication. Then there is
We could admit that for what you call tactical surveillance there are some
legitimate uses— investigators investigating bad guys and networks of bad guys and so on may need, under the
supervision of the judicial authority, to be able to use such tools— but the question is where to draw the line for
this judicial supervision, where to draw the line for the control that the citizens can have over the use of those technologies. This is a policy issue.
LAWS OF MAN JÉRÉMIE:
the other side of that coin, which is what we do with it.
When we get to those policy issues you have politicians that are asked to just sign something and don’t understand the underlying technology, and I think that we as
citizens have a role, not only to explain how the technology functions at large, including to politicians, but also to wade in to the political debates that surround the use
of those technologies. I know that in Germany there was a massive movement against generalized data retention that led to the overturn of the Data Retention law in
front of the constitutional court. 46 There is a debate going on in the EU about revising the Data Retention Directive.
35
SSRA Affirmative
DKC-ENDI 2015
Solvency
36
SSRA Affirmative
DKC-ENDI 2015
Solvency – SSRA Requires Warrant
SSRA still allows for targeted surveillance – it ends mass surveillance by requiring a warrant to
intercept Americans' communications
Kibbe, 15 (Matt, President and CEO of FreedomWorks, previously worked as Chief of Staff to U.S. Representative Dan Miller (R-FL), Senior Economist at the
Republican National Committee, Director of Federal Budget Policy at the U.S. Chamber of Commerce, and Managing Editor of Market Process. 3-24-15. “Letter in
Support of the Surveillance State Repeal Act” http://www.freedomworks.org/content/letter-support-surveillance-state-repeal-act)
The Surveillance State Repeal Act would repeal the misguided USA PATRIOT Act and the FISA Amendments Act of
2008. The PATRIOT Act, passed in the panicked aftermath of the tragic September 11th attacks, gives the federal government an
unprecedented amount of power to monitor the private communications of U.S. citizens without a warrant. The
FISA Amendments Act of 2008 expanded the wiretapping program to grant the government more power. Both laws clearly
violate our 4th Amendment right against unreasonable searches.
The Surveillance State Repeal Act would prohibit the government from collecting information on U.S. citizens
obtained through private communications without a warrant. It would mandate that the Government
Accountability Office (GAO) regularly monitor domestic surveillance programs for compliance with the law and
issue an annual report. A section of the bill explicitly forbids the government from mandating that electronic
manufacturers install “back door” spy software into their products. This is a legitimate concern due to a recently
released security report finding government spying software on hard drives in personal computers in the United
States.
It’s important to note that the Surveillance State Repeal Act saves anti-terrorism tools that are useful to law enforcement. It
retains the ability for government surveillance capabilities against targeted individuals, regardless of the type of
communications methods or devices being used. It would also protect intelligence collection practices involving foreign targets for the purpose of investigating weapons
of mass destruction.
37
SSRA Affirmative
DKC-ENDI 2015
AT: FISA Court Rubberstamps
SSRA strengthens the FISA court's ability to reign in the NSA – it requires a warrant for
surveillance against U.S. persons, strengthens oversight, and provides protections for
whistleblowers
U.S. Congress, 14 (“Summary: H.R.2818 — 113th Congress” https://www.congress.gov/bill/113th-congress/house-bill/2818)
Surveillance State Repeal Act - Repeals the USA PATRIOT Act and the FISA Amendments Act of 2008 (thereby
restoring or reviving provisions amended or repealed by such Acts as if such Acts had not been enacted), except with respect to reports to Congress regarding court
orders under the Foreign Intelligence Surveillance Act of 1978 (FISA) and the acquisition of intelligence information concerning an entity not substantially composed
of U.S. persons that is engaged in the international proliferation of weapons of mass destruction.
Extends from 7 to 10 years the maximum term of FISA judges. Makes such judges eligible for redesignation.
Permits FISA courts to appoint special masters to advise on technical issues raised during proceedings.
Requires orders approving certain electronic surveillance to direct that, upon request of the applicant, any person or entity must furnish all information, facilities, or
technical assistance necessary to accomplish such surveillance in a manner to protect its secrecy and produce a minimum of interference with the services that such
carrier, landlord, custodian, or other person is providing the target of such surveillance (thereby retaining the ability to conduct surveillance on such targets regardless of
the type of communications methods or devices being used by the subject of the surveillance).
Prohibits information relating to a U.S. person from being acquired pursuant to FISA without a valid warrant
based on probable cause.
Prohibits the federal government from requiring manufacturers of electronic devices and related software to build
in mechanisms allowing the federal government to bypass encryption or privacy technology.
Directs the Comptroller General (GAO) to report annually on the federal government's compliance with FISA.
Permits an employee of or contractor to an element of the intelligence community with knowledge of FISAauthorized programs and activities to submit a covered complaint to the Comptroller General, to the House or
Senate intelligence committees, or in accordance with a process under the National Security Act of 1947 with
respect to reports made to the Inspector General of the Intelligence Community. Defines a "covered complaint" as
a complaint or information concerning FISA-authorized programs and activities that an employee or contractor
reasonably believes is evidence of: (1) a violation of any law, rule, or regulation; or (2) gross mismanagement, a
gross waste of funds, an abuse of authority, or a substantial and specific danger to public health or safety. Subjects
an officer or employee of an element of the intelligence community to administrative sanctions, including
termination, for taking retaliatory action against an employee or contractor who seeks to disclose, or who discloses,
such information.
38
SSRA Affirmative
DKC-ENDI 2015
Secrecy Advantage
39
SSRA Affirmative
DKC-ENDI 2015
Secrecy → Chills Leaks (Long)
Government retaliation for leaks is real, scary, and supercharged by mass surveillance
Human Rights Watch, 14 (“With Liberty to Monitor All: How Large-Scale US Surveillance is Harming Journalism, Law, and American Democracy,”
July. https://www.hrw.org/sites/default/files/reports/usnsa0714_ForUPload_0.pdf)
Losing Sources One of the most common concerns journalists expressed to us was that their sources were drying up.78
According to James Asher, “[Before] you’d start pulling the curtain back and more people would come forward. Many fewer people are coming forward now.”79
Journalists expressed diverse views as to when and why reporting conditions began to deteriorate. Some pointed to the attacks of September 11, 2001 and the
subsequent expansion in the amount of information considered sensitive for national security purposes.80 Others emphasized a cluster of stories that appeared in the
The most common
explanation, however, was a combination of increased surveillance and the Obama Administration’s push to
minimize unauthorized leaks to the press (both by limiting government employees’ contact with journalists, such as through the Insider Threat
Program, and by ramping up prosecutions of allegedly unauthorized leaks, as described above).82 That trend generates fear among both sources
and journalists about the consequences of communicating with one another—even about innocuous, unclassified
subjects.83 Even sources who are not sharing classified information risk losing their security clearances and ability to work. Steve Engelberg, the editor-in-chief of
media in 2005, including the first reports of the NSA’s domestic surveillance programs and confirmation of black sites in Poland.81
ProPublica, described the security clearance that a source holds as their “driver’s license in the intelligence community.”84 According to him, “[It’s] easy to lose it, at
which point you can’t work.”85 As a result, loss of a security clearance is a “big sanction.”86 Scott Horton, who writes on national security for Harper’s Magazine, sees
Reveal details about
government activity and you may lose almost everything: your clearance, your position, and your pension. You
may have to hire an attorney, and you may have your reputation destroyed in the press by their own counter-leaks,
making it impossible to get a new job.87 Yet while loss of one’s security clearance, job, or pension can be serious enough, the risk of
prosecution for leaking has never been higher.88 “It is not lost on us, or on our sources, that there have been eight criminal cases
against sources [under the current administration] versus three before [under all previous administrations
combined],” observed Charlie Savage, a Pulitzer Prize-winning reporter for the New York Times.89 That spike sends a message, even when prosecutions do not
the risks to sources as a very real and tangible threat to their willingness to speak to reporters and to ensure effective reporting:
end in convictions. “I understand why they do it,” noted another Pulitzer Prize-winning reporter.90 “Even the cases that blow up in [the government’s] face have the
Stephen Kim, who faced a leak prosecution, described the costs of the process: This
has been a huge blow for me and for my entire family. I had to give up a job that I had liked. It also destroyed my
marriage. My family had to spend all of the money they had saved up and even sell their house to pay my legal fees.
I hardly have any remaining assets.92 Although Kim eventually pleaded guilty to unauthorized disclosure of classified information, his description of
intended effect.”91 In February of 2014,
the harm to himself and his family represents the setbacks anyone prosecuted might face, irrespective of the ultimate disposition of the case. Thomas Drake, who was
also prosecuted by the Obama administration for leaking information to the press, reported similar costs.93 The government dropped all of its major counts against
Drake right before his trial was scheduled to begin, in exchange for a guilty plea to a minor misdemeanor, triggering harsh criticism from the judge for putting Drake
through “four years of hell.”94 While sources’ employers sometimes have legitimate reasons for discouraging conversations about certain matters with the press, the
stakes and the consequences have increased substantially in recent years, making conversations about declassified or innocuous subjects not worth the risk. One
journalist described a source who was eventually fired when his or her employer found signs of the source’s initial contact with journalists a year earlier, even though
the source had not leaked classified information.95 At the same time, the fact that senior government officials themselves routinely appear to authorize “leaks” of
classified information has bred cynicism about the government’s claims that these prosecutions are merely about enforcing the law. “Of course, leaks that help the
government are sanctioned,” observed Brian Ross, chief investigative correspondent for ABC News.96 Bart Gellman, senior fellow at The Century Foundation, and the
winner of multiple Pulitzer Prizes, argued that official, sanctioned leaks reveal much more classified information than unofficial ones.97 Yet, beyond the leak
many journalists said that the government’s increased capacity to engage
in surveillance— and the knowledge that it is doing so on an unprecedented scale—has made their concerns about
how to protect sources much more acute and real. In fact, some believed that surveillance may be a direct cause of
the spike in leak investigations. “It used to be that leak investigations didn’t get far because it was too hard to
uncover the source, but with digital tools it's just much easier, and sources know that.” observed Bart Gellman.98 Peter Maass, a senior
investigations and administrative efforts to prevent leaks,
writer at The Intercept, concurred: “Leak investigations are a lot easier because you leave a data trail calling, swiping in and out of buildings, [and] walking down a
street with cameras. It’s a lot easier for people to know where you’re going and how long you’re there.”99 Charlie Savage raised a similar point: “[E]lectronic trails
mak[e] it easier to figure out who’s talking to reporters. That has made it realistic [to investigate leaks] in a way that it wasn’t before.”100 Peter Finn, the National
Security Editor at the Washington Post, expressed concern that “the government’s ability to find the source will only get better.”101 A national security reporter made
the Snowden revelations show that “[w]hat we’re doing is not good enough. I used to think
that the most careful people were not at risk, [that they] could protect sources and keep them from being known.
Now we know that isn’t the case.”102 He added, “That’s what Snowden meant for me. There’s a record of everywhere I’ve walked, everywhere I’ve
the link even clearer, stating that
been.”103 Peter Maass voiced a similar concern: “[The landscape] got worse significantly after the Snowden documents came into circulation. If you suspected the
Journalists repeatedly told us that surveillance
had made sources much more fearful of talking. The Snowden revelations have “brought home a sense of the
staggering power of the government,” magnifying the fear created by the increasing number of leak investigations.105 Accordingly, sources
are “afraid of the entire weight of the federal government coming down on them.”106 Jane Mayer, an awardwinning staff writer for The New Yorker, noted, “[t]he added layer of fear makes it so much harder. I can’t count
government had the capability to do mass surveillance, you found out it was certainly true.”104
40
SSRA Affirmative
DKC-ENDI 2015
the number of people afraid of the legal implications [of speaking to me].”107 One journalist in Washington, DC, noted, “I think many
sources assume I’m spied on. [I’m] not sure they’re right but I can’t do anything about their presumption.”108 As a result, she said, some remaining sources have
started visiting her house to speak with her because they are too fearful to come to her office.109 One national security reporter estimated that intelligence reporters
have the most skittish sources, followed by journalists covering the Department of Justice and terrorism, followed by those on a military and national security beat.110
As a result, journalists report struggling to confirm even unclassified details for stories, and have seen trusted,
long-standing sources pulling back. “I had a source whom I’ve known for years whom I wanted to talk to about a particular subject and this person said,
‘It’s not classified but I can’t talk about it because if they find out they’ll kill me’ [figuratively speaking].”111 Several others have reported the
sudden disappearance of formerly reliable sources, or the reluctance of sources to discuss seemingly innocuous and
unclassified matters.112 One decorated intelligence and national security journalist indicated that even retired sources are increasingly
reluctant to speak.113 Though firing or revocation of security clearances no longer worries them, they fear prosecution, and “now [they] have to worry that
their communications can be reached on a basis far short of probable cause.”114 Though losing developed sources has proved frustrating to numerous journalists with
a number suggested that the largest challenge they face is reaching new sources. “Sources don’t just
materialize,” noted Peter Finn. “They often are developed.”115 That requires building trust, which can be a slow
and difficult process. Adding to the challenge of developing sources that are already skittish is the fact that
surveillance makes it very difficult for journalists to communicate with them securely. Calling or emailing can
leave a trail between the journalist and the source; and it can be difficult to get casual contacts to take more
elaborate security measures to communicate. “[H]ow do you even get going?” asked Bart Gellman, referring to the
challenge of making first contact with a new would-be source without leaving a trace. “By the time you're both
ready to talk about more delicate subjects, you’ve left such a trail that even if you start using burner phones or anonymous email
accounts you’re already linked.”
whom we spoke,
41
SSRA Affirmative
DKC-ENDI 2015
Secrecy → Bad Decisionmaking (Long)
Secrecy makes all government decision-making worse and risks miscalculated pre-emptive war
Holmes, 07 (Stephen, faculty co-director at the Center on Law and Security and the Walter E. Meyer Professor of Law at the NYU School of Law.“SECRECY
AND GOVERNMENT: America Faces the Future” 4-12-07. http://www.lawandsecurity.org/Portals/0/Documents/SecrecyPrivacy.pdf)
Daniel Patrick Moynihan’s 1998 book, Secrecy: The American Experience, focuses on the pathological effects of secrecy. What I would like to do is discuss Senator
Moynihan’s claims in light of the experience of the past six years. In the book, he says that secrecy has had an observable effect on government decision-making in the
degree of government secrecy is necessary but the “culture of secrecy,” as he calls it,
can do grave damage to national security. He does have plentiful discussions of the comic aspects of over-redacting. He mentions that a passage
20th century. His basic thesis is that some
from Dwight Eisenhower’s published memoirs was redacted out of memoirs written by a former CIA officer. So there is a good deal of silliness. But it is not all silly.
One thing that I am not going to talk about at length, but which would be worth further discussion, is Moynihan’s claim that excessive secrecy has a terribly harmful
effect on democracy. When citizens see the government deceiving them, lying to them, and blacking out what is going on, this foments a kind of irrational culture of
Moynihan’s main claim is cognitive. It has to do with how the danger of
false certainty thrives behind the veil of secrecy, and how highly insulated policy makers, who are not kept alert
and informed by individuals with different points of view, and whose errors are carefully shrouded from criticism
and scrutiny, are extremely unlikely to design intelligent policies. The point here is not about civil liberties but about destroying the forms
of public scrutiny that can force a government to give plausible reasons for its actions. A government that is not
forced to do so regularly is likely soon to have only confused reasons, or perhaps no reasons, for its conduct. It will
rumor and conspiracy-thinking that is very damaging. But
begin to rely unduly on untested hunches. If the factual premises of its decisions to use lethal force are not tested by some kind of adversarial process, it is unlikely that
the consequences for national security will be favorable. Moynihan was not thinking about the current administration of course, but his claim has an eerie relevance.
the U.S. government has frequently failed to assess its enemy accurately and to deal rationally with
the threats facing it, and one of the principal causes of that inaccurate assessment is excessive secrecy. He is not saying
The basic one is this:
that secrecy is unnecessary. Pat Lang’s comments this morning about the necessity of secrecy are very close to Moynihan’s. Vice President Dick Cheney said that he
could not get “unvarnished advice” about American energy policy unless the American energy companies who talk to him are anonymous. That sounds self-serving,
and it obviously is, but there is a core of truth in his comment. Confidentiality does have its functions. There is such a thing as excessive, paralyzing oversight, and total
transparency is not realistic – as Michael Sheehan mentioned, the plans for D-Day had to remain secret. So it is, all told, a matter of balance. Moynihan’s claim is that
denying the public, the Congress, and the press the right to examine and criticize the government has the potential to severely damage national security. Among other
things, it can destroy presidents. The effect of secrecy on a president was one of Moynihan’s interests, including Richard Nixon’s obsession with leaks and paranoia
about breached secrecy, even on unimportant matters. Just a few weeks after the Supreme Court ruled that The New York Times could publish the Pentagon Papers,
secrecy
is the last refuge of incompetence. That is meant to be a nonpartisan concept. The background idea is that people behave differently when
they are observed as opposed to when they are unobserved. Let’s put it this way – we do not invariably behave more honorably or prudently when we are
Nixon formed the “plumbers” in a fit of selfdestruction and obsession with secrecy. Moynihan cites from a congressional committee in the ’60s, saying that
unobserved. This does not mean that transparency is going to solve all problems or make us all honorable. All that I think we need – and this is Moynihan’s premise –
for a nonpartisan discussion of this issue is to admit that in some cases covert actions may be utterly idiotic. All we need for a discussion is to say that the publication by
investigative journalists of information that the current administration desperately wants to keep hidden can sometimes increase national security. As long as you can
say that, then there can be a discussion of where to draw the line, how to do it, and what form it should take. But it takes away the mystique of secrecy and the assertion
that there is never a justification for breaching the current administration’s claim that what it wants to keep secret is being kept secret for purposes of protecting the
I am going to talk about four points that Moynihan makes. I expect that those here who have more government experience, and those
The four points have to do with cognition, psychology,
turf wars, and partisanship. The first point concerns bureaucracy, and what Moynihan calls “organizational aggrandizement.”
Bureaucracies get into ruts which they have trouble getting out of. Secrecy exacerbates their tendency to apply old
and obsolete solutions, even to new problems. Moynihan cites Max Weber, and Weber’s point was that the German Beamtentum was responsible
nation.
who have been observing government, can modify, deny, or confirm these claims.
for Germany’s terrible failure in World War I because it got in the way of pursuing the war. If the political system were more lively, more partisan, if it had an influence
and had been able to jog them out of their rut, Germany would have been in a better position. This is an important way to think about secrecy because it contradicts the
current administration’s claim that executive discretion that is unobserved, unchecked by legislative and judicial authority, is more flexible – the claim that, in order to
obtain the requisite flexibility to deal with a threat, the executive needs to act in secrecy. What we actually see is that the more the administration acts in secrecy, the
more it is stuck in a rut. It has lashed itself to a failed policy and cannot correct itself. That suggests the Bavarian point, which is that openness has something to do with
correcting errors. An adversarial system, in which agencies are forced to admit when they have made mistakes, is more likely to occur where there is a divided
A pampered and unchecked executive can become catastrophically disconnected from
reality because it is not hearing and will refuse to listen to bad news. It is insulated. There is an echo chamber effect. Moynihan
discusses this under the title “A Culture of Secrecy.” Second, bureaucrats treat secrets as if they were private property. Noah Feldman
government, as Mike Sheehan said.
said that this morning. A secret is what you tell one person at a time. Moynihan adds that a secret is what you tell one person at a time for consideration, for an
exchange. Bureaucrats
gather secrets. They say, “The secret is an asset. I need to get something for the secret I have. I
will hold onto it until I can trade it for something I need.” The consequences of that are multiple. The first consequence is that
decision-makers are making decisions in the absence of knowledge they need. That would be the primary cognitive consequence.
Mercenary or lunatic informants can insert fallacious information into a system that does not have any checks or a way of weeding out this disinformation. Deliberate
disinformation is almost invited once you are told that no one is going to double-check it, no one is going to look at it, no one is going to know the source. The source is
not being screened. So those sources who do not want to be screened are going to be coming forward out of the woodwork. Moynihan says that secret information is
about as reliable as corridor gossip. That is not always true, but it has enough truth to be worth thinking about. Schemes hatched in secrecy are frequently addled, he
42
SSRA Affirmative
DKC-ENDI 2015
says. Secrecy permits, for example, the decision to intervene militarily in a country about which we know nothing
without considering the potential downsides of such intervention. Because there are people who, if they were
outside the system, would say, “Look, if you do that ....” Moynihan was thinking of Cuba. There was public knowledge that Castro was very
popular but the secret decision to invade the Bay of Pigs was done without any kind of obligatory consultations or listening to those outside who might have had
something to say about it. By focusing particularly on public liberty (meaning the liberty to examine your government), Moynihan manages to twist and make us
it does not
make sense to say that we are going to be more secure if we can prevent our government’s mistakes from ever
being revealed, that we are more secure if we can prevent the government from being criticized. More psychologically, Moynihan and others
(including Georg Simmel, who wrote wonderful essays on secrecy) have written about the overestimation of the importance of secret
information – the psychology, the spell of secrecy, the allure of secrecy , the ability to say, “I have a secret you do not know about. It makes me feel important.”
Dana Priest mentioned this too. There is an overestimation of the catastrophic consequences of disclosure, the sense that “the
secret makes me feel so important. If everyone had it, I would feel less important. So, therefore, it must be a very vital piece of information.”
rethink the contrast, or polarity, between liberty and security. It might make sense to say we have to reduce private liberty to have more security. But
Moynihan’s claim is that we overestimate the value of secrets and downplay the importance of information that is public. This is the Bay of Pigs example again, where
he says, almost, that if the Princeton study showing how popular Castro was had been kept secret it would have taken it into account. But it was public, so they ignored
95 percent of the information we need is in
the public record. What we need is not disclosure of secrets but analysis. In the national security area, Malcolm Gladwell’s distinction
it, because you overvalue information that is secret. He cites George F. Kennan at length, saying that
between puzzle and mystery is a good one. A puzzle is something where you have all the pieces of information except for one. If you find the one thing, then everything
makes sense. But usually we are in a different situation, more like a mystery, in which you have all the information. You need to interpret it. You need to analyze it.
You need to understand it. Stealing a secret is much less likely to get you where you want to be than understanding the situation, which requires investment – not in
It was announced that India was
going to go for an atomic bomb. That was in the public record but the U.S. administration did not read it. They
only looked at their secret information, so they did not predict it. They also overestimated Soviet strength. That is one of Moynihan’s
main claims. The overestimation was caused, he said, by too much secrecy, by not being open enough to those outside the government. Third, incoherence
within the executive branch is another product of the culture of noncooperation among bureaucrats, of information
stealing secrets, but in analysis. Moynihan talks here about the Bharatiya Janata Party’s election brochures in India.
hoarding and so on. Congress and the press get tips from dissidents within the executive branch. We have heard that and it could be the military or others. So
keeping secrets from Congress and the press requires the executive branch to keep secrets from itself. That can
have terrible consequences if the left hand does not know what the right hand is doing. Moynihan talks about the dispersal of
secrecy centers within the government. There is a very important idea that you have different clumps of secrets. Executive agencies, each with their
own agenda – maybe each competing for a part of the action – are not cooperating. We know a lot about this; they cannot
cooperate in a master plan. This is part of what the fog and the haze of secrecy is about. The most dramatic part of this, which speaks to the question of the unitary
executive, is the number of cases in which the president is not informed by executive agencies of essential information. Moynihan focused on the Venona decryptions –
the fact that in 1946, after the war, the military cracked the Soviet code and decided not to tell Harry Truman. Truman did
not know, and he was listening to criticism by conservatives of the Democrats saying, “You are just sheltering communism.” He thought they were just partisan attacks.
The military and the intelligence agency had the information and didn’t tell him. So what does “executive responsibility” mean in a system where executive agencies do
Finally, I want to say a few words about partisanship.
We have talked a little about selective classification and selective leaking for partisan reasons. I have a good example of how
not tell the president essential information? That is an important factor to think through.
partisanship plays into this from Moynihan’s book. In 1965, a representative from the 13th Congressional District in Illinois “introduced legislation to establish a
presumption that, with only narrow exceptions, executive-branch documents should be available to the public and that judicial review should be available as a check on
agency decisions to withhold information.” You should not invoke executive privilege to deny the release of documents. That was Representative Donald Rumsfeld
who claimed this. So partisanship is important in making determinations about secrecy. I tend to sympathize with what I thought Noah
Feldman was suggesting this morning, that the blurring is almost inevitable. In some way, at certain points, it seems cynical and contemptible. Incumbents
in power will say, “Revealing a secret that would embarrass us is actually damaging to national security, because it would embolden our enemies to know how
incompetent we are.” That sounds fairly absurd but there is something to this. It is a very complicated area and requires a little more thought. I’d like to make one final
point. In a way, it is elaborating on what Mike Sheehan said earlier. The problem is not simply secrecy and the solution is not transparency. The problem is the lack of
any form of adversarial process. The problem is an insulated clique making decisions without having to make a case, without having to expose the factual premises of
their decisionmaking to any kind of test. That test can be relatively sheltered. It could be a select committee on intelligence in Congress. It does not have to be public,
but it cannot be a test before a body of lapdogs who are simply doing what you tell them to do. Those who are judging you, and to whom you are accountable, have to
have some kind of independent source of information. I think that way of casting the issue shows that the solutions for this are finding some place between the secret
In the war on terror, in facing a threat which we have never faced before, it is inevitable that our
government is going to make mistakes. So the idea of handing power to a small group of people who are never
criticized, who never admit their mistakes, seems to be the worst possible arrangement that we could think of.
and the transparent.
43
SSRA Affirmative
DKC-ENDI 2015
Secrecy → Drones
Secrecy allows the government to misrepresent drone strikes and obscure their true costs –
exposing them would roll back the program
Ackerman, 15 (Spencer, national security editor for Guardian US. A former senior writer for Wired, he won the 2012 National Magazine Award for Digital
Reporting. 4-25-15. “Inside Obama's drone panopticon: a secret machine with no accountability” http://www.theguardian.com/us-news/2015/apr/25/us-drone-programsecrecy-scrutiny-signature-strikes)
Of all the reactions to the deaths of two hostages from a missile fired from a US drone, Congressman Adam Schiff
provided the deepest insight into the logic underpinning the endless, secret US campaign of global killing.
“To demand a higher standard of proof than they had here could be the end of these types of counter-terrorism
operations,” said Schiff, a California Democrat and one of the most senior legislators overseeing those operations.
The standard of proof in the January strike in tribal Pakistan was outlined by the White House press secretary in the aftermath of Barack Obama’s admission about the
deaths. An agency that went formally unnamed – likely the CIA, though the military’s Joint Special Operations Command (JSOC) also conducts drone strikes –
identified what Josh Earnest called an “al-Qaida compound” and marked the building, rather than particular terrorists, for destruction.
the realities of what are commonly known as “signature strikes” are belatedly
and partially on display. Signature strikes, a key aspect for years of what the administration likes to call its “targeted killing” program, permit
the CIA and JSOC to kill without requiring them to know who they kill.
Thanks to Obama’s rare admission on Thursday,
The “signatures” at issue are indicators that intelligence analysts associate with terrorist behavior – in practice, a gathering of men, teenaged to middle-aged, traveling in
convoys or carrying weapons. In 2012, an unnamed senior official memorably quipped that the CIA considers “three guys doing jumping jacks” a signature of terrorist
training.
Civilian deaths in signature strikes, accordingly, are not accidental. They are, as Schiff framed it, more like a cost of doing business – only the real cost is shielded from
the public.
An apparatus of official secrecy, built over decades and zealously enforced by Obama, prevents meaningful open
scrutiny of the strikes. No one outside the administration knows how many drone strikes are signature strikes.
There is no requirement that the CIA or JSOC account for their strikes, nor to provide an estimate of how many
people they kill, nor even how they define legally critical terms like “combatant”, terrorist “affiliate” or “leader”.
The American Civil Liberties Union (ACLU) is suing an obstinate administration to compel disclosure of some of
the most basic information there is about a program that has killed thousands of people.
The National Security Agency has a complementary term to describe the effects of its mass surveillance on the world’s emails, texts, phone records, webcams, gaming
and all other forms of communication: “incidental collection”. Incidental collection is all of the untold trillions of communications data NSA and its partners hoover up
that have nothing to do with terrorism or espionage. That collection may not be, strictly speaking, intentional – those communications are not NSA’s “targets” – but it is
neither accidental nor, by the logic of bulk surveillance, avoidable.
Similarly, civilian deaths in signature strikes do not operate quite like the “collateral damage” familiar from earlier wars. It is one thing for US bombs and missiles to
miss their targets or to hit facilities that, at the time of the strike, no longer have their targets in them. It is another for them to hit targets absent prior confirmation that
the target is an enemy as a matter of policy.
“It is a different kind of use of the drone, and it raises issues that are important,” said Glenn Carle, a former CIA interrogator, who added that he is not categorically
opposed to drone strikes.
“I know how the institution [the CIA] functions. For all the errors I’ve spoken about, people are as responsible and serious as humans can be.”
Yet
44
the secrecy around the strikes permits self-interested officials to misrepresent them.
SSRA Affirmative
DKC-ENDI 2015
Secrecy → Too Much XO Power/SOP
Secrecy undermines legislative and judicial power and empowers the executive to commit human
rights abuses
German and Stanley, 11 (Mike, fellow with the Brennan Center for Justice's Liberty and National Security Program; 16-year veteran of the FBI, where
he served as a special agent in domestic terrorism. Jay, Senior Policy Analyst with the ACLU's Speech, Privacy and Technology Project. “Drastic Measures Required:
“CONGRESS NEEDS TO OVERHAUL U.S. SECRECY LAWS AND INCREASE OVERSIGHT OF THE SECRET SECURITY ESTABLISHMENT”
https://www.aclu.org/files/assets/secrecyreport_20110727.pdf)
2. Secrecy
undermines constitutional checks and balances
Our nation’s Founders feared the corrupting influence of power in the hands of an absolute monarch, so they deliberately limited and distributed
governmental authority among the three separate branches of government, giving each the tools to check abuse by
the others. Yet the modern executive’s claimed authority to exclusively and unilaterally decide what information is
classified and what is not is upsetting the Constitution’s delicate balance, depriving Congress and the courts of the
ability to examine executive branch activities and fulfill their constitutional obligations to rein in abuse.96 Congress’s
and the courts’ failure to assert their independence as co-equal branches of government in examining, challenging and, when necessary, overriding the executive’s
This breakdown of checks and balances has been disastrous for our
national security policy and the rule of law. Over the last several years the executive branch secretly and
unilaterally initiated extra-judicial detention programs and cruel, inhuman and degrading interrogation methods
that violated both international treaties and domestic law.97 It engaged in “extraordinary renditions” —international kidnappings—
in violation of international law and the domestic laws of our allied nations.98 It conducted warrantless wiretapping within the United States in violation
national security secrecy claims contribute to the problem.
of the Foreign Intelligence Surveillance Act and the Fourth Amendment of the Constitution.99 Under a shroud of secrecy the executive ignored laws duly passed by
Congress and thwarted congressional oversight through non-disclosure, or by intentionally providing incomplete and misleading testimony to the intelligence
committees.100 The
few members of Congress who were briefed on these controversial programs felt so handcuffed by
restrictions on what they could do with the highly classified information they received, they thought their only
recourse was to file secret letters of concern or protest.101 Representative Jane Harman, who as a former Ranking Member of the House
Intelligence Committee regularly received classified briefings from executive agencies, described the current practice of congressional notification: …as far as notes go,
you - I suppose one could take some notes but they would have to be carried around in a classified bag, which I don’t personally own . You can’t talk to
anybody about what you’ve learned, so there’s no ability to use committee staff, for example, to do research on
some of the issues that are raised in these briefings. And the whole environment is not conducive to the kind of collaborative give and take that
would make for much more successful oversight.102 Notice from the executive branch regarding covert actions and other intelligence activities is of little value if
Meanwhile, the courts
are also being neutralized as a check on illegal executive branch activities. Victims of these secret programs have
been denied the opportunity to challenge the government’s misconduct in U.S. courts through the government’s
over-broad use of state secrets privilege claims, which is clearly designed not to protect sensitive evidence but to avoid judicial rulings that the
congressional leaders cannot share the information they obtain with colleagues and the public as they pursue legislative reforms.103
challenged activities are illegal.104 The Obama administration continues this practice, denying justice and eliminating the courts as an effective check against executive
Our constitutional system is crippled when excessive secrecy deprives Congress and the courts of the
information necessary to fulfill their oversight responsibilities.
lawbreaking.105
45
SSRA Affirmative
DKC-ENDI 2015
AT: Leaks Hurt National Security
Catastrophic leaks are fantasy – real leaks don't seriously hurt security
Benkler, 14 (Yochai, Professor of Entrepreneurial Legal Studies, Harvard Law School, Faculty Co-Director, Berkman Center for Internet and Society, Harvard
University. A Public Accountability Defense for National Security Leakers and Whistleblowers 8(2) Harv. Rev. L. & Policy, July 2014
http://benkler.org/Benkler_Whistleblowerdefense_Prepub.pdf)
Even if we understand that the national security establishment can make mistakes, there
remains the argument that secrecy is vital to
security; that the price of transparency is too high. The argument gains force from the fact that understanding how security is enhanced by secrecy is intuitively
trivial. A military unit is on its way to execute an attack on an enemy, and someone tips off the enemy who escapes or
ambushes the troops. This is classic “transports on the way” secrecy that could be subject to prior restraint under the Pentagon Papers case.62 Only one case of
leaking to the press has ever involved a risk of this type: the case of Morton Seligman, who leaked decoded
Japanese naval dispatches in the midst of World War II, and whose publication after Midway could have disclosed
that the United States had broken Japanese naval codes.63 This is the threat most legitimately interjected against
leaks, but in all but that one World War II case, it has been pat hyperbole in criticisms of press leaks. Private
Manning’s disclosures to Wikileaks, for example, were denounced as likely to cause deaths, a claim that the
Pentagon was not willing to repeat when asked for a formal assessment by the Senate Armed Services
Committee.64 Claims of secrecy of this sort normally assert power in the relationship between the national security
system and the public opinion system.
Openness is on-balance better for national security – it makes bureaucracies more flexible and
accountable
Benkler, 14 (Yochai, Professor of Entrepreneurial Legal Studies, Harvard Law School, Faculty Co-Director, Berkman Center for Internet and Society, Harvard
University. A Public Accountability Defense for National Security Leakers and Whistleblowers 8(2) Harv. Rev. L. & Policy, July 2014
http://benkler.org/Benkler_Whistleblowerdefense_Prepub.pdf)
Understanding how secrecy can undermine security requires more work. A brief diversion into computer security will help. Computer security is among the most
complex systems-security challenges we face today. Yet the standard understanding, popularized through the term “no security through obscurity,”65 is that secrecy is
an imperfect and often self-defeating source of security. One of the most basic “general information security principles” is: “Open Design—System security should not
depend on the secrecy of the implementation or its components,”66 a principle recognized since the early days of computer security.67 This doesn't mean that secrecy
offers no security, but that “the fewer secrets a system has, the more secure it is.”68 Secrecy involves three distinct
weaknesses. First, secrets are hard to keep. The more a system depends on secrecy as opposed to robust design, and
the more its characteristics must be known to more people so they can work with it, the more susceptible it is to
failure because it leans too heavily on that relatively weak link. Second, when secrets cover many facets of what
makes a security system work, they tend to be interdependent and hard to change without changing the whole
system. This makes security systems “brittle.” They break when the secret is disclosed. A system with few secrets and few dependencies can
change the information revealed to negate the revelation . If a password is revealed, it can be changed. If the core design is weak and
its defense depends on secrecy, once the secret is out, the system is vulnerable. Ask Darth Vader. The third problem with
secrecy is its most important for our purposes: secrets undermine error correction. No system is perfect. None is perfectly designed
in the first place, and systems, particularly complex systems that interact with an uncertain and changing environment, become less perfect as time passes: conditions
Error detection, resilience, healing, and experimentation
with alternative solutions are critical to a well-functioning system. Secrecy severely limits the range and diversity
of sources of insight for diagnosis and solution. The point about error detection has broader implications for the relationship between the national
security system and public opinion. Open, democratic societies are not weaker for their openness; they are stronger for it.
There are certainly inconvenient truths; backroom deals that have to be done, diplomatic channels that must be kept open. Public
opinion can be fickle, leaders must sometimes take a longer view than present public sentiment will allow, and perfect transparency can be no
panacea unless one imagines a utopia in which all members of the public are rational, wellinformed, and patient. So yes, there are always troop movements that
must be kept secret and much, much more. But there is also ambition and narrow-mindedness, interest, groupthink, and the yesman mentality of the bureaucratic mindset. What has made open societies successful is their ability to learn,
experiment, and adapt in a persistently uncertain and changing environment. On a much grander scale than computer security,
secrecy undermines the most basic features by which open societies learn, question, and adapt; these are the very
foundations of security in democratic society, and are congruent with, rather than in conflict with, the foundations
change, threats change, and unanticipated interactions among components emerge.
46
SSRA Affirmative
DKC-ENDI 2015
of liberty in these societies. It would be a mistake to imagine that the Counter Intelligence Program (“COINTELPRO”), the
secret domestic spying program that the FBI ran against domestic dissenters (including leaders and activists in the civil rights and antiwar movements 71) made
America stronger and more secure at a cost to freedom and democracy. COINTELPRO made Americans less
secure and less free, and less able to engage in the kind of criticism that helps us learn to distinguish between real,
core threats to the lives and wellbeing of Americans and manufactured threats tailored to fit the views of those who
sought to disrupt dissent.
47
SSRA Affirmative
DKC-ENDI 2015
Journalists Key
Investigative journalism is crucial to hold governments accountable – mass surveillance chills it
Gellman, 07 (Barton,
fellow at the Center on Law and Security and the special projects
reporter on the national staff of The Washington Post. “SECRECY AND GOVERNMENT: America Faces the Future” 4-12-07.
http://www.lawandsecurity.org/Portals/0/Documents/SecrecyPrivacy.pdf)
My personal view is that the press has no formal institutional entitlement. Functionally, public
exposure and discussion are what is important.
In order to hold the government accountable, one has to know, in broad terms, what it is doing. The importance of privacy
is well-understood by the government for its own purposes. In terms of its deliberations, in terms of who is advising the energy task force, and in terms of a long list of
information that Congress would like in exercising oversight responsibilities, the executive branch is prepared to say that it would be difficult to get full, unvarnished
Government officials have
no legitimate right to personal privacy in their public capacities. That is, the privacy interest is not theirs as
individuals. Any valid argument here is about the best way to serve the public interest. I agree that there is a plausible argument, and sometimes rather an
important one, that deliberations require some privacy. On the other hand, choosing their elected officials and holding them to account
clearly require people to understand something about what the government is doing. Since Congress and the
courts, for many complicated reasons, are sometimes disinclined to or ineffective at extracting that information
and making it public, reporters fill that role. We have to have confidential sources because in some cases people
will lose their jobs or face other sorts of retribution for talking to us. Cell phones and e-mail are very convenient, and I do not think any
of us have figured out an effective way to avoid any exposure. Sources of mine have told me they had been interviewed by leak
investigators. Based on the questions they were asked, they were fairly confident that their own phone records had
been obtained. They gave me a heads-up about it because it would mean that my records might have been obtained or that, at least where the records crossed, my
contacts might be known. It is a conundrum. The boundary preventing intrusion into the reportorial process, which has evolved
in the several decades since Watergate, is shifting in a way that is not particularly helpful to public debate.
opinions from anyone who knows that his or her advice will be publicly aired. This is all in the pursuit of the public business.
48
SSRA Affirmative
DKC-ENDI 2015
Democracy Advantage
49
SSRA Affirmative
DKC-ENDI 2015
Surveillance Chills Activism
Mass surveillance deters activism
Lerner, 14 (Mark, spokesperson for Constitutional Alliance, a non-profit alliance of individual citizens, state and national groups, and state lawmakers that
opposes state surveillance. “The Chilling Effect of Domestic Spying” 8-5-14. http://americanpolicy.org/2014/08/05/the-chilling-effect-of-domestic-spying/)
the Snowden revelations have revealed to a large degree the domestic surveillance taking place,
the public knows more about what OUR government is doing. The bad news is the chilling effect creating a surveillance state has on a
representative form of government. The chilling effect can be simply defined as the way in which people alter or
modify their behavior to conform to political and social norms as a result of knowing or believing they are being
observed. The observation can be from physical surveillance, telephone meta data being collected, emails being intercepted and read, search engine requests being
The good news is now that
maintained, text messages being read and stored, financial transactions being monitored and much more. This paper will examine the chilling effect and provide some
empirical data (links within this article) to show the chilling effect is real. Denial is no longer an option. For years, even decades it has been reported by people inside
and outside our government that agencies and departments within our federal government have been spying on citizens and further collecting data (Personal Identifiable
Information) associated with the domestic spying taking place. Many of us who discussed the spying taking place were called conspiracy theorists, tin foil hat wearers,
or black helicopter paranoid people: Today we are called realists. The
Snowden revelations are unique because of the depth and scope
of the revelations and because Snowden had the official documents to back up his assertions. Previously people including
former NSA analysts such as William Binney, Thomas Drake, Russell Tice and Kirk Wiebe had come forward asserting that our government was spying on citizens.
Too many in the government, the media, and the public dismissed the allegations of these men because it was “easy” to do so rather than believe the worst about our
government, or actually having to do something about domestic spying. To be fair the NSA has not been the only ones accused of domestic spying. The FBI, DHS, and
the CIA have also been proven to having done their own domestic spying; in the case of the FBI going back over seventy years. I support the need for our intelligence
community, law enforcement, and our military. Unfortunately in much the same way the “Stockholm Syndrome” results in a person who has been kidnapped falling
victim to the goals and aspirations of the kidnappers, the “rank and file” of those responsible for protecting us and our freedom have fallen victim to corrupt leadership
in our intelligence and law enforcement communities. The culture of corruption is just as infectious as any chemical or biological weapon of mass destruction.
Congress has its share of the blame for the domestic spying that has and even to this day is taking place. After all it is congress that has the responsibility of oversight
over agencies and departments of the federal government. All too often congress has failed to do what it has been tasked with doing; performing oversight. In fact, not
too long ago congress gave retroactive immunity to telecom companies for the roles telecom companies played in illegally collecting information for the NSA at the
request of former President Bush. When it comes down to it, there is plenty of “blame” to go around. Some are guilty: All are responsible including the public for not
demanding better of our elected and appointed officials.
Whether a Democrat or Republican occupied the White House or regardless of which party controlled the Senate and/or the House of Representatives, domestic spying
took place and is still taking place. Domestic spying is not a “Right” or “Left” issue. Domestic spying is an equal opportunity offender.
Typically I would provide dozens of links in an article to substantiate what I am writing. In the case of the chilling effect I am only going to provide three links. The
three links provide undeniable evidence that the chilling effect is real and how the chilling effect is affecting our country http://gigaom.com/2013/08/20/through-aprism-darkly-fear-of-nsa-surveillance-is- having-a-chilling-effect-on-the-open-web/ and https://www.commondreams.org/ headline/2013/11/12-5 and finally http://
papers.ssrn.com/sol3/papers.cfm? abstract_id=2412564
The chilling effect is quantifiable based on empirical data.
People were polled and research has been done. The public including lawmakers, young people, journalists and
other “writers” have all too various degrees become subject to the chilling effect. Political scientists, attorneys, law
professors, psychologists, sociologists have all weighed in on the chilling effect. I have read dozens of papers and
other material accounting for thousands of pages about the “Chilling Effect”.
Depending on who is doing the research and the writing, it is fair and reasonable to assert that as much as 50% of
people or more alter their behavior to conform to political and social norms as a direct result of the surveillance
state that has been created in the United States. Up to 33% of journalists and other writers have admitted to
changing what they write or say, or seriously considered changing what they write or say because they believe they
are being “watched”.
What does all this mean to “activists” who are attempting to get the “general public” engaged in a whole host of
issues from Common Core, Real ID, smart meters, immigration, national debt, healthcare, foreign policy and yes,
even including domestic surveillance among other issues? What it means is the chilling effect will make it much more difficult
to engage the general public much less educate and motivate the general public to “take a stand” and have their
voices heard.
In addition to the surveillance state we must not forget that state and federal government has said domestic terrorism is the
biggest threat to our country. Veterans, anti-abortion advocates, anti-war activists, third party supporters,
environmentalists, 2nd Amendment supporters, states’ rights proponents, and many other groups of people have
all been named as “potential domestic terrorists” by state and federal government agencies and departments. Once
again it is not a “Left/Right” issue. People and groups on both sides of the political spectrum are “suspects.” The
The bottom line is the chilling effect is not some psycho mumble jumble.
presumption of innocence is no longer a consideration. This broad profiling of people and groups only exasperates the “Chilling Effect” domestic spying has.
50
SSRA Affirmative
DKC-ENDI 2015
People are less likely to be involved with the government because of surveillance fears
Electronic Frontier Foundation, 13 (Non-profit advocacy organization defending online civil liberties. “EFF Files 22 Firsthand Accounts of How
NSA Surveillance Chilled the Right to Association” 11-6-13. https://www.eff.org/press/releases/eff-files-22-firsthand-accounts-how-nsa-surveillance-chilled-rightassociation)
The Electronic Frontier Foundation (EFF) has provided a federal judge with testimony from 22 separate advocacy
organizations detailing how the National Security Agency's (NSA) mass telephone records collection program has
impeded the groups' work, discouraged their members and reduced the numbers of people seeking their help via
hotlines. The declarations accompanied a motion for partial summary judgment filed late Wednesday, in which EFF asks the court to declare the surveillance illegal
on two levels—the law does not authorize the program, and the Constitution forbids it.
In First Unitarian Church of Los Angeles v. NSA, EFF represents a diverse array of environmentalists,
gun-rights activists, religious groups,
human-rights workers, drug-policy advocates and others that share one major commonality: they each depend on
the First Amendment's guarantee of free association. EFF argues that if the government vacuums up the records of
every phone call—who made the call, who received the call, when and how long the parties spoke—then people will be afraid to join or
engage with organizations that may have dissenting views on political issues of the day. The US government acknowledged the
existence of the telephone records collection program this summer, after whistleblower Edward Snowden leaked a copy of a Foreign Intelligence Surveillance Court
order authorizing the mass collection of Verizon telephone records.
"The plaintiffs, like countless other associations across the country, have suffered real and concrete harm because
they have lost the ability to assure their constituents that the fact of their telephone communications between them
will be kept confidential from the federal government," EFF Senior Staff Attorney David Greene said. "This has caused
constituents to reduce their calling. This is exactly the type of chilling effect on the freedom of association that the
First Amendment forbids."
Fear of surveillance stops activismPasternack, 14 (Alex, Editor-At-Large of VICE. “In Our Google Searches, Researchers See a
Post-Snowden Chilling Effect,” 5-5-14. http://motherboard.vice.com/read/nsa-chilling-effect)
According to a new study of Google search trends, searches for terms deemed to be sensitive to government or
privacy concerns have dropped "significantly" in the months since Edward Snowden's revelations in July.
"It seemed very possible that we would see no effect," MIT economist Catherine Tucker and digital privacy advocate Alex
Marthews write. "However, we do in fact see an overall roughly 2.2 percentage point fall in search traffic on 'high
government trouble'-rated search terms."
Tucker and Marthews asked nearly 6,000 people to rate the sensitivity of a pile of keywords—including those on the DHS social media watchword list—based on
whether the word would "get them into trouble" or "embarrass" them with their family, their close friends, or with the US government.
Marthews, the head of the the Cambridge-based digital advocacy group Digital Fourth, had predicted an effect on search behavior. Tucker, a professor at MIT's Sloan
School of Management who specializes in data issues, had not expected to see an effect.
But by analyzing Google's publicly-available search data, they noticed a general pattern: even as searches for less sensitive words appeared to rise, searches for the most
suspicious words fell.
"This is the first academic empirical evidence of a chilling effect on users’ willingness to enter search terms that
raters thought would get you into trouble with the US government," Tucker wrote in an email.
Researchers found a rise in search terms with "low" government sensitivity and a decline in terms with "high" sensitivity.
51
SSRA Affirmative
DKC-ENDI 2015
Surveillance → Tyranny
Mass surveillance creates the conditions for future tyranny – the state just has to “turn the key”
on data collected on millions of Americans. Environmental crisis, growing economic inequality,
and mass protest movements render this likely
Paglen, 13 (Trevor,
Ph.D. in Geography from U.C. Berkeley, artist and author. Has written several books on state secrecy, including the CIA's extraordinary
rendition program. “Turnkey Tyranny: Surveillance and the Terror State” 6-23-13. http://creativetimereports.org/2013/06/25/surveillance-and-the-construction-of-aterror-state/?gllry=opn)
By exposing NSA programs like PRISM and Boundless Informant, Edward Snowden has revealed that we are not moving
toward a surveillance state: we live in the heart of one. The 30-year-old whistleblower told The Guardian’s Glenn Greenwald that the
NSA’s data collection created the possibility of a “turnkey tyranny,” whereby a malevolent future government
could create an authoritarian state with the flick of a switch. The truth is actually worse. Within the context of current
economic, political and environmental trends, the existence of a surveillance state doesn’t just create a theoretical
possibility of tyranny with the turn of a key—it virtually guarantees it.
For more than a decade, we’ve seen the rise of what we might call a “Terror State,” of which the NSA’s surveillance capabilities represent just one part. Its rise occurs
at a historical moment when state agencies and programs designed to enable social mobility, provide economic security and enhance civic life have been targeted for
significant cuts. The last three decades, in fact, have seen serious and consistent attacks on social security, food assistance programs, unemployment benefits and
education and health programs. As the social safety net has shrunk, the prison system has grown. The
United States now imprisons its own
citizens at a higher rate than any other country in the world.
While civic parts of the state have been in retreat, institutions of the Terror State have grown dramatically. In the name of an amorphous and never-ending “war on
terror,” the Department of Homeland Security was created, while institutions such as the CIA, FBI and NSA, and darker parts of the military like the Joint Special
Operations Command (JSOC) have expanded considerably in size and political influence. The
world has become a battlefield—a stage for
extralegal renditions, indefinite detentions without trial, drone assassination programs and cyberwarfare. We have
entered an era of secret laws, classified interpretations of laws and the retroactive “legalization” of classified programs that were clearly illegal when they began.
Funding for the secret parts of the state comes from a “black budget” hidden from Congress—not to mention the people—that now tops $100 billion annually. Finally,
to ensure that only government-approved “leaks” appear in the media, the Terror State has waged an unprecedented war on whistleblowers, leakers and journalists. All
Politicians claim that the
Terror State is necessary to defend democratic institutions from the threat of terrorism. But there is a deep irony
to this rhetoric. Terrorism does not pose, has never posed and never will pose an existential threat to the United
States. Terrorists will never have the capacity to “take away our freedom.” Terrorist outfits have no armies with which to invade, and no
means to impose martial law. They do not have their hands on supra-national power levers like the World Bank
and the International Monetary Fund. They cannot force nations into brutal austerity programs and other forms of economic subjugation. But
while terrorism cannot pose an existential threat to the United States, the institutions of a Terror State absolutely
can. Indeed, their continued expansion poses a serious threat to principles of democracy and equality.
At its most spectacular, terrorism works by instilling so much fear in a society that the society begins to collapse on itself.
The effects of persistent mass surveillance provide one example of such disintegration. Most obviously, surveillance
represents a searing breach of personal privacy, as became clear when NSA analysts passed around phone-sex
recordings of overseas troops and their stateside spouses. And while surveillance inhibits the exercise of civil liberties for all, it
inevitably targets racial, religious and political minorities. Witness the Department of Homeland Security’s
surveillance of Occupy activists, the NYPD’s monitoring of Muslim Americans, the FBI’s ruthless entrapment of
young Muslim men and the use of anti-terror statutes against environmental activists. Moreover, mass surveillance
also has a deep effect on culture, encouraging conformity to a narrow range of “acceptable” ideas by frightening people
of these state programs and capacities would have been considered aberrant only a short time ago. Now, they are the norm.
away from non-mainstream thought. If the government keeps a record of every library book you read, you might be disinclined to check out The Anarchist Cookbook
the
next few decades will be decades of crisis. Left unchecked, systemic instability caused by growing economic
inequality and impending environmental disaster will produce widespread insecurity. On the economic side, we are
facing an increasingly acute crisis of capitalism and a growing disparity between the “haves” and “have-nots,” both
nationally and globally. For several decades, the vast majority of economic gains have gone to the wealthiest segments of society, while the middle and working
today; tomorrow you might think twice before borrowing Lenin’s Imperialism. Looking past whatever threats may or may not exist from overseas terrorists,
classes have seen incomes stagnate and decline. Paul Krugman has dubbed this phenomenon the “Great Divergence.” A few statistics are telling: between 1992 and
2007, the income of the 400 wealthiest people in the United States rose by 392 percent. Their tax rate fell by 37 percent. Since 1979, productivity has risen by more than
80 percent, but the median worker’s wage has only gone up by 10 percent. This is not an accident. The evisceration of the American middle and working class has
everything to do with an all-out assault on unions; the rewriting of the laws governing bankruptcy, student loans, credit card debt, predatory lending and financial
trading; and the transfer of public wealth to private hands through deregulation, privatization and reduced taxes on the wealthy. The Great Divergence is, to put it
All the while, we are on a collision
course with nature. Mega-storms, tornadoes, wildfires, floods and erratic weather patterns are gradually becoming
52
bluntly, the effect of a class war waged by the rich against the rest of society, and there are no signs of it letting up.
SSRA Affirmative
DKC-ENDI 2015
the rule rather than the exception. There are no signs of any serious efforts to reduce greenhouse emissions at levels anywhere near those required to
avert the worst climate-change scenarios. According to the most robust climate models, global carbon emissions between now
and mid-century must be kept below 565 gigatons to meet the Copenhagen Accord’s target of limiting global warming to a two-degree Celsius
increase. Meanwhile, as Bill McKibben has noted, the world’s energy companies currently hold in reserve 2,795
gigatons of carbon, which they plan to release in the coming decades. Clearly, they have bet that world
governments will fail to significantly regulate greenhouse emissions. The plan is to keep burning fossil fuels, no matter the environmental
consequences. While right-wing politicians write off climate change as a global conspiracy among scientists, the Pentagon has identified it as a significant threat to
national security. After a decade of studies and war games involving climate-change scenarios, the Department of Defense’s 2010 Quadrennial Review (the main public
document outlining American military doctrine) explains that “climate-related changes are already being observed in every region of the world,” and that they “could
have significant geopolitical impacts around the world, contributing to poverty, environmental degradation, and the further weakening of fragile governments.
Climate change will contribute to food and water scarcity, will increase the spread of disease, and may spur or
exacerbate mass migration.” Nationally and internationally, the effects of climate change will be felt unevenly. Whether it’s rising water levels or
skyrocketing prices for foods due to irregular weather, the effects of a tumultuous climate will disproportionately impact society’s most precarious populations. Thus,
the effects of climate change will exacerbate already existing trends toward greater economic inequality, leading to
widespread humanitarian crises and social unrest. The coming decades will bring Occupy-like protests on everlarger scales as high unemployment and economic strife, particularly among youth, becomes a “new normal.”
Moreover, the effects of climate change will produce new populations of displaced people and refugees. Economic and environmental insecurity represent the future for
vast swaths of the world’s population. One way or another, governments
will be forced to respond. As future governments face these
intensifying crises, the decline of the state’s civic capacities virtually guarantees that they will meet any unrest with
the authoritarian levers of the Terror State. It won’t matter whether a “liberal” or “conservative” government is
in place; faced with an immediate crisis, the state will use whatever means are available to end said crisis. When
the most robust levers available are tools of mass surveillance and coercion, then those tools will be used. What’s more,
laws like the National Defense Authorization Act, which provides for the indefinite detention of American citizens, indicate that military and intelligence programs
originally crafted for combating overseas terrorists will be applied domestically.
The larger, longer-term scandal of Snowden’s revelations is that, together with other political trends, the NSA’s
programs do not merely provide the capacity for “turnkey tyranny”—they render any other future all but
impossible.
53
SSRA Affirmative
DKC-ENDI 2015
Internet Freedom Key to Spread Democracy
Global internet freedom policies will determine whether internet access empowers or undermines
authoritarian states - restrictive internet policy dooms democratic movements
MacKinnon, 12 (Rebecca, Bernard Schwartz Senior Fellow at the New America Foundation. She is the author of Consent of the Networked: The Worldwide
Struggle for Internet Freedom (2012). She is also the co-founder of Global Voices Online, a global citizen media network. “Internet Activism? Let’s Look at the
Specifics” 5-11-12. http://www.cato-unbound.org/2012/05/11/rebecca-mackinnon/internet-activism-lets-look-specifics)
Berin Szoka is right to argue that
while the Internet brings new dimensions and power to activism, we must not be naïve
about the power of networked technologies. It is important to unpack the factors behind successful—and
unsuccessful—online activism. Examples of both abound. Internet connectivity and widespread social media adoption do
not on their own guarantee activism’s success. The Internet is not some sort of automatic “freedom juice.”
Success or failure of digital activism depends on a plethora of variables—economic, cultural, religious, commercial, political, personal, and accidents of history. In his
seminal book The Digital Origins of Dictatorship and Democracy: Information Technology and Political Islam , Philip N. Howard, a professor at the University
concludes that while the Internet and mobile technologies
do not cause change, change is unlikely to happen without sufficient mobile and Internet penetration.[1] Indeed, the
two Arab countries in which dictators were deposed without civil war in 2011 were Tunisia and Egypt—both of
which have relatively high rates of Internet penetration and social media use compared to many other parts of the
Middle East and North Africa. However, as I discuss at some length in my book Consent of the Networked: The Worldwide Struggle for Internet
of Washington and expert on technology and political change in the Islamic world,
Freedom, the revolutions of Tunisia and Egypt did not spring immaculately from Twitter and Facebook. Movements for political change in these countries developed
and matured over the course of a decade; then when the right moment came activists were in a position to take advantage of them. Activists experimented with
networked technologies, honed their messages over time, built support networks, and generally worked to use Internet and mobile platforms to their maximum
advantage. They also spent a decade building offline relationships both nationally and regionally and honing offline protest skills. The revolutions’ successes in Tunisia
and Egypt, as Szoka rightly points out, had much to do with widespread economic grievances and anger over state corruption.
Another factor was the relative lack of sectarian divisions in Egypt and Tunisia as compared to other countries in the region. This contrasts sharply with Bahrain which
also boasts deep Internet penetration and widespread social media usage, but whose society is torn asunder by a deep sectarian divide between majority Shiites and
Sunni political elites. This divide has enabled the ruling Al Khalifa family to suppress dissent violently and with impunity—aided by other geopolitical factors including
support from neighboring Saudi Arabia, which considers Sunni activism on its doorstep to be a dangerous sign of Iranian political meddling. Then there is the presence
in Bahrain of the U.S. Seventh Fleet, a geopolitical rather than a technological reality that makes rapid political change in Bahrain all the less likely. In Syria, Internet
penetration was much more shallow and online communities much weaker to begin with. This combined with a sharp sectarian divide has meant that while activists
have been able to use the Internet to get information out to the world about the Assad regime’s atrocities against its own people, conventional geopolitics—not new
media—will be the decisive factor in deciding when and how Assad will fall from power.
Success or failure of digital activism in authoritarian states also depends on the regime’s technological capacity,
skill, foresight, and planning. As I describe in detail in the third chapter of my book, the Chinese government took the Internet seriously as both a political
threat and economic opportunity from the moment it began to allow commercial Internet services in the mid-1990s. The Chinese government built the world’s most
sophisticated system of filtering and blocking for overseas websites, including most famously most Google-owned services, Facebook, and Twitter. At the same time,
the government encouraged the development of a robust domestic Internet and telecommunications industry so that Chinese technology users can enjoy an abundant
variety of domestically run social media platforms, online information services, Internet and mobile platforms, and devices produced by Chinese companies. By
imposing strong political and legal liability on Internet intermediaries, the government forced companies—many financed by Western capital—not only to foot the bill
for much of the regime’s censorship and surveillance needs, but to do much of the actual work.
Online activism still does occur in China, but due to multiple layers of censorship and surveillance, activism’s
successes have for the most part been local, presenting minimal threat to the power of the central government and
Communist Party. Users of the Chinese Twitter-like social networking platform Weibo have ruined the careers of local and provincial officials by exposing
their corruption. Chinese “netizens,” as they like to call themselves, have also called attention to specific errors or incompetencies of specific parts of the bureaucracy,
which the central government has then moved to fix—which in many ways boosts the central government’s power and credibility as compared to local governments or
To date, activists who have tried to use social media to build national
movements for systemic political change have consistently gone to jail or been placed under house arrest, their
supporters and friends often harassed and threatened with loss of jobs and educational opportunities even if they
have not technically committed any crime by Chinese law. The case of the blind activist Chen Guangcheng may or may not serve as a
specific ministers seeking to develop independent power bases.
watershed moment for Chinese activism—it remains too early to tell. But if it does, the reasons for digital activism’s success in China will have as much to do with
offline domestic and international factors as with anything technological: a leadership crisis at the top of the Communist Party precipitated by the downfall of the
power-hungry Chongqing Party Secretary Bo Xilai; plus specific developments not only in the U.S.–China diplomatic relationship but also U.S. domestic partisan
politics, which Chen’s supporters have taken skillful advantage of, using social media of course.
To complicate matters further, the
Internet itself—its technical architecture as well as the regulatory constraints shaping
what people in different places can and cannot do with it—is a variable. We cannot treat the Internet as constant—
either across geographical space or across time—in our calculations about the success of online activism. In
Thailand, for example, the relative weakness of online activism is the result in no small part of heavy liability
placed by national laws on Internet intermediaries. Thailand’s Computer Crimes Act holds Internet service providers and website operators
legally responsible for the activities of their users. This, combined with an antiquated lèse majesté law banning insulting comments about the king, has resulted in the
arrest of people involved with running activist and opposition websites and made it difficult for online activism to achieve critical mass.[2] In Azerbaijan, a
54
SSRA Affirmative
DKC-ENDI 2015
blanket surveillance system imposed by the government on Internet and mobile network operators is combined in
a politically insidious manner with media manipulation, arrests, and intimidation of online activists. This has, in the
words of Internet scholars Katy Pearce and Sarah Kendzior, who recently concluded a multi-year study of the Azerbaijani Internet, “successfully dissuaded frequent
Internet users from supporting protest and average Internet users from using social media for political purposes.”[3]
Thus while the Internet often empowers activism, it is also used in many parts of the world as an insidious
extension of state power—sometimes with the direct collaboration of companies seeking market access; sometimes much more indirectly due to the fact that
Internet and mobile companies are conduits and repositories of vast amounts of citizens’ personal data, and also make commercial decisions that have a profound
impact on people’s digital lives and identities.
Back home in the United States, this is precisely why recent political movements against legislation like SOPA and CISPA that Szoka describes are so important. SOPA
would not only have built a “great firewall of America” but would have imposed liability on Internet intermediaries in a manner that was ripe for political as well as
commercial abuse. CISPA, in the name of securing America’s networks, will also legalize and institutionalize mechanisms of government access to citizens’ private
communications that lack accountability, inviting abuse against which citizens will have no meaningful recourse as the legislation is currently written.
Whether the Internet remains conducive to political activism, or with liberal democracy for that matter, is by no
means guaranteed. We face a virtuous or vicious cycle depending on whether you are an optimist or a pessimist:
Activism is urgently required—nationally and globally—to ensure that the Internet remains compatible with
activism.
Credible U.S. internet leadership is crucial to promote global democracy
Fontaine, 14 (Richard, President of the Center for a New American Security (CNAS). He served as a Senior Advisor and Senior Fellow at CNAS from 20092012 and previously as foreign policy advisor to Senator John McCain for more than five years. He has also worked at the State Department, the National Security
Council and on the staff of the Senate Foreign Relations Committee. “Reenergizing the Internet Freedom Agenda in a Post-Snowden Era,” September 2014.
http://www.cnas.org/sites/default/files/publications-pdf/CNAS_BringingLibertyOnline_Fontaine.pdf)
The scrambled Internet freedom narrative and its complicated consequences are
discouraging, not least because the need for an active online freedom agenda has never been more pressing. It is
today estimated that roughly half of Internet users worldwide experience online censorship in some form.41 Freedom
A Snapshot of Internet Freedom Today
House observes a deterioration in global Internet freedom over the three consecutive years it has issued reports; its 2013 volume notes that Internet freedom declined in
more than half of the 60 countries it assessed. Broad surveillance, new legislation controlling online content and the arrest of
Internet users are all on the increase; over the course of a single year, some 24 countries passed new laws or
regulations that threaten online freedom of speech.42 A glance at the past 12 months reveals a disturbing trend. In Turkey, for example,
after its high court overturned a ban on Twitter, the government began demanding that the company quickly implement orders to block specific users. Ankara also
blocked YouTube after a surreptitious recording of the country’s foreign minister surfaced, and it has dramatically increased its takedown requests to both
Twitter and Google.43 Russia has begun directly censoring the Internet with a growing blacklist of websites, and under a
new law its government can block websites that encourage people to participate in unauthorized protests.44
Chinese social media censorship has become so pervasive that it constitutes, according to one study, “the largest selective
suppression of human communication in the history of the world.”45 China has also begun assisting foreign countries, including Iran and
Zambia, in their efforts to monitor and censor the Internet.46 Vietnam has enacted a new law making it illegal to distribute digital
content that opposes the government.47 Venezuela has blocked access to certain websites and limited Internet access in parts of the country.48 A
robust, energetic American Internet freedom agenda is most needed at the very moment that that agenda has come
under the greatest attack. Reenergizing the Agenda Precisely because the Internet is today such a contested space, it is
vitally important that the United States be actively involved in promoting online freedom. America’s Internet
freedom efforts accord with the country’s longstanding tradition of promoting human rights, including freedoms
of expression, association and assembly. And it represents a bet: that access to an open Internet can foster elements
of democracy in autocratic states by empowering those who are pressing for liberal change at home. While the
outcome of that bet remains uncertain, there should be no doubt about which side the United States has chosen.
55
SSRA Affirmative
DKC-ENDI 2015
Answer to: “the aff doesn’t fix democracy”
Democracy works even if it isn’t perfect – must keep trying to make it better
HAMBURG 95 DeWitt Wallace Distinguished Scholar at Weill Cornell Medical College. He is President Emeritus at
Carnegie Corporation.
[David A. Hamburg, Foreword to ‘A Report to the Carnegie Commission on Preventing Deadly Conflict,’ December 1995,
http://legacy.wilsoncenter.org/subsites/ccpdc/pubs/di/1.htm]
From an early stage in democracy building, a wide understanding of the possibilities for nonviolent conflict resolution and
the practical value of mutual accommodation among different sectors and peoples within a state is important . At every step,
from articulation of fundamental principles to implementation of operational details, there is a need to educate for democracy. Indeed, modern telecommunications may
make it feasible to have a worldwide democratic network under highly respected auspices--perhaps a mix of governmental and nongovernmental supporters. Through
such a network, in a short time it might be possible to enhance the level of understanding throughout the world of what is involved in democracy and its potential
benefits for all, especially its capacity for nonviolent conflict resolution. People need to see that cooperation can often lead to greater benefits in the long run and to
recognize superordinate goals of compelling value to all concerned that can be achieved only by cooperation.
Regrettably, the high ideals that characterize democracy are not readily translated into practice. Indeed, democracy is an
evolving, changing, adapting, updating process--always less than ideal, yet always shaped by high aspirations, with norms of
decency becoming stronger as the years go by. Nevertheless, new democracies can learn a great deal from the experience of old democracies and need
not require centuries to make a reasonable first approximation of democratic ideals in practice. Even a very crude approximation would be a
considerable improvement over the experience of many countries to date.
The building of democratic institutions would be one of the greatest conflict prevention measures that could be taken,
especially if one thinks in terms of both political and economic democratic structures. The international community of
established democracies must address the translation of this aspiration into the reality of emerging democracies. So
fortunate a community, with so much relevant experience in coping with the problems of modern societies, is morally obligated to smooth the
path to democratization around the world in a systematic, deliberate, long-term, high-priority way.
The Carnegie Commission on Preventing Deadly Conflict is concerned with building preventive capacities, so that people can live together peacefully over the long
term. The building of democratic institutions is certainly one crucial, albeit complicated and frustratingly slow, component of this challenge. Historically, there is little
precedent for well-organized international efforts to help substantially with this process of democratization--yet there is enough experience to know that it is not
impossible.
If democracy is viewed as an optional preoccupation of self-righteous democratizers--or even as an intrusive activity of sugar-coated neo-imperialists--then all this is
much ado about nothing (or worse). But if we view democracy as a powerful and constructive mechanism for resolving the
ubiquitous ongoing conflicts of our highly contentious human species, then the challenge becomes vital, and the
opportunity precious. That is why this essay is so important.
56
SSRA Affirmative
DKC-ENDI 2015
Democracy Spreads
Democracies spread – 4 theories why. The stronger a democracy the more it will spread
LEESON & DEAN 09 1 George Mason University 2 West Virginia University
[Peter T. Leeson, Andrea M. Dean, The Democratic Domino Theory: An Empirical Investigation, American Journal of Political Science, Volume 53, Issue 3, pages
533–551, July 2009]
Potential Mechanisms of Democratic Dominoes
Simmons, Dobbin, and Garrett (2006) identify four potential mechanisms, or channels, through which democracy may
spread between countries. Although these authors are not specifically concerned with a geography-based domino idea as we are, the mechanisms they identify
are all plausible candidates for geographic democratic contagion. The first such channel is simple Tiebout competition. Although the transactions
costs of migration are nontrivial between nations and can be very high in countries that strictly limit mobility, competition between governments can create strong
incentives for geographic neighbors to increase democratic constraints, leading prodemocracy changes to spread throughout geographic regions. If a country
strengthens its democracy, for instance by institutionalizing greater constraints on executive authority, it is likely to attract additional foreign
business and direct investment as agents seek the most secure locations to undertake economic activity.3 The firms and citizens
that find this move the least costly are those in neighboring nations that share a border with the democratizing country. Their movement or potential movement can
pressure neighboring countries to undertake similar democracy-oriented reforms to avoid losing their tax base. If these nations’ neighbors in turn democratize to avoid
losing their tax base to their democratizing neighbors, and so on, the resulting competition can lead to a contagion effect that creates greater democracy throughout a
region of neighboring countries.
A second potential mechanism of democracy's spread between geographic neighbors is through the diffusion of prodemocracy ideas via
a
demonstration effect, or what Simmons, Dobbin, and Garrett call “learning.” Neighboring countries can observe the activities of the countries
around them and import successful ideas at a lower cost than if they had to look further abroad to find them. If one country employs
democracy-enhancing ideas, its geographic neighbors may become more likely to adopt them as well. Once these countries have adopted democracy-enhancing ideas,
their neighbors become more likely to adopt them, and so on. This process may cause a cascade of more democracy whereby increases in democracy in one country
spread to countries around it. This “democracy demonstration effect” could also operate in conjunction with a migration-style mechanism along the lines discussed
above. Democracy advocates in one country, for example, may penetrate the borders of neighboring countries that are less democratic, carrying their ideas with them as
well as providing the impetus for domestic prodemocratic reform.
A third potential channel of democracy's geographic spread is through economic communities or zones. As Pevehouse (2002a, 2002b) points
out, economic communities such as NAFTA and the EU often harmonize not only their members’ economic policies, but also their members’ political arrangements, in
some cases requiring members to satisfy certain institutional requirements as a condition of membership. In many cases admission to these communities confers
benefits on members in the form of cross-country subsidization, protection alliances, and so forth. These benefits raise the value of joining economic zones, creating an
incentive for nonmember nations to increase their level of democracy if, for example, membership requires institutional constraints that directly or indirectly serve to
limit the executive's authority. Since economic communities are often geographically based, their presence may in this way
produce spreading democracy throughout a region of neighboring countries.
The final potential mechanism of democratic contagion that Simmons, Dobbin, and Garrett highlight is what they call “emulation.” According to
this idea, some “big player” countries, such as the United States, lead in terms of political institutions (and policies), which other
countries then follow. If the United States strengthens its democracy in some fashion, other countries may do so as well. Like the other channels considered
above, this channel need not be a geographic mechanism of spreading democracy. If, for instance, Argentina follows prodemocracy reform in the United States,
democracy may spread but not between geographic neighbors. However, within various geographic regions there may be local “big players”—regional leader
countries—that neighboring nations tend to look to in guiding their behavior. In this way emulation may also be a geographic channel for democratic dominoes between
neighboring countries.
These are only a few of the imaginable mechanisms through which democratic dominoes might be set in motion. Surely
others could be proposed. Further, while in principle some of these channels, such as emulation, may be capable of spreading either increases or decreases in democracy
geographically, others, such as Tiebout competition, may only be capable of spreading increases in democracy geographically. Although these channels are
conceptually distinct, separating them empirically is a different matter. Our interest is in identifying if there is in fact any significant
empirical evidence for democratic dominoes regardless of their source and, if there is, establishing how “hard” they fall. It is not our goal, nor does our empirical
strategy allow us, to identify which, if any, of the specific potential channels of democracy's geographic spread have or have not been at work at various points in
history. Although it does not do so in a spatial econometric framework and is not focused only on democracy, some existing research has found evidence for various
kinds of “policy diffusion” via each of the channels pointed to above (see, for instance, Elkins, Guzman, and Simmons 2006; Gleditsch and Ward 2006; Lee and Strang
2006; Swank 2006). Future work should attempt to pinpoint the operation of these and other specific mechanisms explicitly in the context of the spatial framework this
article employs.
57
SSRA Affirmative
DKC-ENDI 2015
Democracy Solves Everything
Democracy solves all the worlds problems – checks back Russia, China, terrorism, regional
conflicts. Spreading it produces immediate benefits
DIAMOND 95 Senior Fellow at the Hoover Institution, Stanford, and founding co-editor of the Journal of Democracy.
Professor of political science and sociology, coordinates the democracy program of the Center on Democracy,
Development, and the Rule of Law (CDDRL)
[Larry Diamond, Promoting Democracy in the 1990s: Actors and Instruments, Issues and Imperatives, A Report to the Carnegie Commission on Preventing Deadly
Conflict Carnegie Corporation of New York, December 1995, http://legacy.wilsoncenter.org/subsites/ccpdc/pubs/di/1.htm]
POTENTIAL THREATS TO GLOBAL ORDER AND NATIONAL SECURITY
On any list of the most important potential threats to world order and national security in the coming decade, these six should
figure prominently: a hostile, expansionist Russia; a hostile, expansionist China; the spread of fundamentalist Islamic, antiWestern regimes; the spread of political terrorism from all sources; sharply increased immigration pressures; and ethnic
conflict that escalates into large-scale violence, civil war, refugee flows, state collapse, and general anarchy. Some of these potential threats interact in
significant ways with one another, but they all share a common underlying connection. In each instance, the development of
democracy is an important prophylactic, and in some cases the only long- term protection, against disaster.
A HOSTILE, EXPANSIONIST RUSSIA
Chief among the threats to the security of Europe, the United States, and Japan would be the reversion of Russia--with its still very
substantial nuclear, scientific, and military prowess--to a hostile posture toward the West. Today, the Russian state (insofar as it continues
to exist) appears perched on the precipice of capture by ultranationalist, anti-Semitic, neo-imperialist forces seeking a new era of pogroms,
conquest, and "greatness." These forces feed on the weakness of democratic institutions, the divisions among democratic forces, and the generally dismal economic and
political state of the country under civilian, constitutional rule. Numerous observers speak of "Weimar Russia." As in Germany in the 1920s, the only alternative
to a triumph of fascism (or some related "ism" deeply hostile to freedom and to the West) is the development of an effective democratic order. Now,
as then, this project must struggle against great historical and political odds, and it seems feasible only with international economic aid and support for democratic
forces and institutions.
A HOSTILE, EXPANSIONIST CHINA
In China, the threat to the West emanates from success rather than failure and is less amenable to explicit international assistance and inducement. Still, a
China
moving toward democracy--gradually constructing a real constitutional order, with established ground rules for political competition and succession and
civilian control over the military--seems a much better prospect to be a responsible player on the regional and international stage .
Unfair trade practices, naval power projection, territorial expansion, subversion of neighboring regimes, and bullying of democratic forces in Hong Kong and Taiwan
are all more likely the more China resists political liberalization. So is a political succession crisis that could disrupt incremental patterns of reform and induce
competing power players to take risks internationally to advance their power positions at home. A China that is building an effective rule of law
seems a much better prospect to respect international trading rules that mandate protection for intellectual property and forbid the use of prison
labor. And on these matters of legal, electoral, and institutional development, international actors can help.
THE SPREAD OF ISLAMIC FUNDAMENTALISM
Increasingly, Europeans and Americans worry about the threat from fundamentalist Islam. But fundamentalist
movements do not mobilize righteous
anger and absolute commitment in a vacuum. They feed on the utter failure of decadent political systems to meet the most
elementary expectations for material progress and social justice. Some say the West must choose between corrupt, repressive regimes that are at least secular and proWestern and Islamic fundamentalist regimes that will be no less repressive, but anti-Western. That is a false choice in Egypt today, as it was in Iran or Algeria-at least until their societies became so polarized as to virtually obliterate the liberal center. It
is precisely the corruption, arrogance, oppression, and gross
ruling regimes like the current one in Egypt that stimulate the Islamic fundamentalist alternative. Though force may
be needed--and legitimate--to meet an armed challenge, history teaches that decadent regimes cannot hang on forever through force alone. In the long run, the
only reliable bulwark against revolution or anarchy is good governance--and that requires far-reaching political reform. In Egypt and some
inefficacy of
other Arab countries, such reform would entail a gradual program of political liberalization that counters corruption, reduces state interference in the economy, responds
to social needs, and gives space for moderate forces in civil society to build public support and understanding for further liberalizing reforms. In Pakistan and Turkey, it
would mean making democracy work: stamping out corruption, reforming the economy, mobilizing state resources efficiently to address social needs,
devolving power, guaranteeing the rights of ethnic and religious minorities, and--not least-- reasserting civilian control over the military. In either case, the
fundamentalist challenge can be met only by moving (at varying speeds) toward, not away from, democracy.
POLITICAL TERRORISM
Terrorism and immigration pressures also commonly have their origins in political exclusion, social injustice, and bad, abusive, or
tyrannical governance. Overwhelmingly, the sponsors of international terrorism are among the world's most authoritarian
regimes: Iran, Iraq, Syria, Libya, Sudan. And locally within countries, the agents of terrorism tend to be either the fanatics of
antidemocratic, ideological movements or aggrieved ethnic and regional minorities who have felt themselves socially marginalized and
politically excluded and insecure: Sri Lanka's Tamils, Turkey's Kurds, India's Sikhs and Kashmiris. To be sure, democracies must vigorously mobilize their legitimate
58
SSRA Affirmative
DKC-ENDI 2015
more fundamental and enduring assault on international
terrorism requires political change to bring down zealous, paranoiac dictatorships and to allow aggrieved groups in all countries
to pursue their interests through open, peaceful, and constitutional means.
As for immigration, it is true that people everywhere are drawn to prosperous, open, dynamic societies like those of the United States,
instruments of law enforcement to counter this growing threat to their security. But a
Canada, and Western Europe. But the sources of large (and rapid) immigration flows to the West increasingly tend to be countries in the grip of civil war, political
turmoil, economic disarray, and poor governance: Vietnam, Cuba, Haiti, Central America, Algeria. And in Mexico, authoritarianism, corruption, and social injustice
have held back human development in ways that have spawned the largest sustained flow of immigrants to any Western country--a flow that threatens to become a
floodtide if the Zedillo government cannot rebuild Mexico's economy and societal consensus around authentic democatic reform. In other cases--Ethiopia, Sudan,
Nigeria, Afghanistan--immigration to the West has been modest only because of the greater logistical and political difficulties. However, in impoverished areas of
Africa and Asia more remote from the West, disarray is felt in the flows of refugees across borders, hardly a benign development for world order. Of course, population
growth also heavily drives these pressures. But a common factor underlying all of these crisis-ridden emigration points is the absence
of democracy. And, strikingly, populations grow faster in authoritarian than democratic regimes.4
ETHNIC CONFLICT
Apologists for authoritarian rule--as in Kenya and Indonesia--are wont to argue that multiparty electoral competition breeds ethnic rivalry and
polarization, while strong central control keeps the lid on conflict. But when multiple ethnic and national identities are forcibly
suppressed, the lid may violently pop when the regime falls apart. The fate of Yugoslavia, or of Rwanda, dramatically refutes the canard that authoritarian
rule is a better means for containing ethnic conflict. Indeed, so does the recent experience of Kenya, where ethnic hatred, land grabs, and violence have been
deliberately fostered by the regime of President Daniel arap Moi in a desperate bid to divide the people and thereby cling to power.
Overwhelmingly, theory and evidence show that the path to peaceful management of ethnic pluralism lies not through
suppressing ethnic identities and superimposing the hegemony of one group over others. Eventually, such a formula is bound to crumble or be
challenged violently. Rather, sustained interethnic moderation and peace follow from the frank recognition of plural identities ,
legal protection for group and individual rights, devolution of power to various localities and regions, and political institutions that encourage bargaining and
accommodation at the center. Such institutional provisions and protections are not only significantly more likely under
democracy, they are only possible with some considerable degree of democracy.5
OTHER THREATS
This hardly exhausts the lists of threats to our security and well-being in the coming years and decades. In the former Yugoslavia nationalist aggression
tears at the stability of Europe and could easily spread. The flow of illegal drugs intensifies through increasingly powerful international crime syndicates that have made
common cause with authoritarian regimes and have utterly corrupted the institutions of tenuous, democratic ones. Nuclear,
chemical, and biological
weapons continue to proliferate. The very source of life on Earth, the global ecosystem, appears increasingly
endangered. Most of these new and unconventional threats to security are associated with or aggravated by the weakness
or absence of democracy, with its provisions for legality, accountability, popular sovereignty, and openness.
59
SSRA Affirmative
DKC-ENDI 2015
Democracy Prevents Wars
Spreading Democracy checks wars & minimizes the impact – 3 reasons [1. democratic people
don’t fight each other, 2. fight shorter wars, 3. Democracies fight less bloody wars]
RUMMEL 09 Professor Emeritus of Political Science at the University of Hawaii
[Rudy (R.J.) Rummel, Democracy, Democratic peace, freedom, globalization, This entry was posted on Sunday, January 18th, 2009 at 4:02 pm,
http://democraticpeace.wordpress.com/2009/01/18/why-freedom/]
There is still more to say about freedom’s value. While we now know that the world’s ruling thugs generally kill several times more of their subjects than do wars, it is
war on which moralists and pacifists generally focus their hatred, and devote their resources to ending or moderating. This singular concentration is understandable,
given the horror and human costs, and the vital political significance of war. Yet, it should be clear by now that war is a symptom of freedom’s
denial, and that freedom is the cure. First:
Democratically free people do not make war on each other
Why? The diverse groups, cross-national bonds, social links, and shared values of democratic peoples sew them together; and
shared liberal values dispose them toward peaceful negotiation and compromise with each other. It is as though the people of
democratic nations were one society
This truth that democracies do not make war on each other provides a solution for eliminating war from the world:
globalize democratic freedom
Second :
The less free the people within any two nations are, the bloodier and more destructive the wars between them; the greater
their freedom, the less likely such wars become
And third :
The more freedom the people of a nation have, the less bloody and destructive their wars.
What this means is that we do not have to wait for all, or almost all nations to become liberal democracies to reduce the
severity of war. As we promote freedom, as the people of more and more nations gain greater human rights and political liberties, as those people without
any freedom become partly free, we will decrease the bloodiness of the world’s wars. In short: Increasing freedom in the world
decreases the death toll of its wars. Surely, whatever reduces and then finally ends the scourge of war in our history, without causing a greater evil, must
be a moral good. And this is freedom
In conclusion, then, we have wondrous human freedom as a moral force for the good, as President Bush well recognizes.
Freedom produces social justice,
creates wealth and prosperity, minimizes violence, saves human lives, and is a solution to war. In two words, it creates human security.
Moreover, and most important:
People should not be free only because it is good for them. They should be free because it is their right as human beings.
Democracy create deterrence – stop conflict by changing calculations of leaders
TERRY 07
Colonel, USMC Retired
[James P. Terry, Foreword, Democracy and Deterrence: foundations for an Enduring World Peace by Dr. Walter Gary Sharp Sr. Air University press, p. ix – x]
The causes of armed conflict have historically been viewed in primarily sociological terms, with political. religious, economic. and military factors sharing primacy.
Few have examined the causes of warfare in the context of a deterrence model or. specically, the deterrence factors inherent
in the checks and balances of a democratic state and the absence of such factors in the nondemocratic state. More significantly.
none before Prof. John Norton Moore has argued the value of democratic principles in deterrence and conflict avoidance.
In this important book. Dr. Gary Sharp analyzes the concepts In Moore's semlnal work The War Puzzle (2005). whIch describes Moore’s incentive theory of war
avoidance. Sharp carefully diss sects Moore’s deterrence model and examines those incentives that discourage
nondemocratic governments from pursuing viol eent conflicts. Arguing that existing democracies must make an active
effort to foster thie political environment in which new democracies can develop. Sharp discusses the elements critical to
promoting democratization and thus strengthening system wide deterrence at the state and international levels.
Sharp also examines the incentives for conflict avoidance (intern aal checks and balances) inherent in the demdocratic state and their relationship to war avoidance. In
examining current demnocracies and comparing them statistically to nondemocratic sates, sharp calculates an aggregated index value of democracy based upon res
ppeceed databases that rank the jurisdictions of the world on pol iiicaal rights. civil liberties, media independence. religious freedom. economic freedom, and human
development. Demonstrating through his analysis that demnocracies are inherently more peaceful because of the internal
checks and balances on the aggressive use of force. Sharp similarly demonstrates how nondemocracies require external
checks and balances to preclude aggression.
60
SSRA Affirmative
DKC-ENDI 2015
United
States and other democratic nations must embrace as they attempt to reverse a course or history in which 38.5 million war
deaths were recorded in the twentieth century alone. By demonstrating how democracy, economic freedom. and the rule of law
provide essential mechanisms to deter leaders from precipitous decisions concerning the use of force. Sharp has provided an
Sharp's analysis and validation of Moore's incentive theory or war avoidance is critical to an understanding of those foreign policy strategies that the
Invaluable service to the statesman and international lawyer alike.
Democracy checks aggression
SHARP 07 senior associate deputy general counselor for intelligence at the US DOD.
Democracy and Deterrence: foundations for an Enduring World Peace by Dr. Walter Gary Sharp Sr. Air University press. P. conclusion
Wars and their attendant human misery begin in the minds of national leaders whose power is unchecked by incentives
and deterrence mechanisms. Because such restraints are inherent in democratic forms of government, war is comparatively
rare where human freedom, economic freedom, and the rule of law thrive. The spread of democracy in the twenty-first century is therefore of
utmost importance in advancing human welfare. Actively encouraging the expansion of freedom is the responsibility or democratic nations.
Democracy is, as Bush stated in his first inaugural address, a seed upon the wind, taking root in many nations. Our democratic faith is more than the creed of our
county, it is the inborn hope or our humanity. an ideal we carry but do not own. a trust we bear and pass along... . If our country does not lead the cause of freedom. It
will not be led.”
Though democracy is indeed taking root in many nations, the free world cannot rest. For all the progress made in the
democratization of the former Soviet bloc and in other parts or the world, a recent Freedom House study reports that
democracy and good governance are threatened or unattainable in many places. Russia can no longer be considered a democracy at all” by
most standards. and democratic development in smaller countries such as Thailand and Bangladesh has been derailed.12 These disturbing developments underscore the
significance of the war avoidance strategies outlined in this study: encourage the spread or democracy and the rule of law while establishing positive and negative
Incentive and deterrence mechanisms to restrain those who govern nondemocratic nations.
61
SSRA Affirmative
DKC-ENDI 2015
Democracy Prevents Terrorism
Overall democracy reduces the risk of terrorism – conclusive despite risks
LI 05 Department of Political Science, The Pennsylvania State University
[Quan Li, Does Democracy Promote or Reduce Transnational Terrorist Incidents?, The Journal of Conflict Resolution49. 2 (Apr 2005): 278-297]
CONCLUSION
Two main arguments in the democracy-terrorism literature expect contradictory effects of democracy on transnational terrorism. Previous empirical work, however, has
relied on using some aggregate indicator of regime type, failing to separate the positive and negative effects of democracy.
In this article, I investigate the various mechanisms by which democracy affects transnational terrorism. New theoretical mechanisms are advanced that either
complement or encompass existing arguments. First, democratic participation reduces transnational terrorism in ways in addition to
those conceived in the literature. It increases satisfaction and political efficacy of citizens, reduces their grievances,
thwarts terrorist recruitment, and raises public tolerance of counterterrorist policies. Second, the institutional constraints
over government play a fundamental role in shaping the positive relationship between democracy and transnational
terrorism. Institutional checks and balances create political deadlock, increase the frustration of marginal groups, impose on the democratic government the tough
task of protecting the general citizenry against terrorist attacks, and weaken the government's ability to fight terrorism. The effect of civil liberties on
terrorism popularized in the literature is more complex than commonly recognized. Finally, heterogeneous democratic systems have
different implications for transnational terrorist activities.
Effects of different aspects of democracy on transnational terrorism are assessed in a multivariate analysis for a sample of about
119 countries from 1975 to 1997. Results show that democratic participation reduces transnational terrorist incidents in a country. Government constraints, subsuming
the effect of press freedom, increase the number of terrorist incidents in a country. The proportional representation system experiences fewer transnational terrorist
incidents than either the majoritarian or the mixed system. Overall, democracy is demonstrated to encourage and reduce transnational
terrorist incidents, albeit via different causal mechanisms.
The findings suggest several important policy implications for the war on terrorism. Democracy does not have a
singularly positive effect on terrorism as is often claimed and found. By improving citizen satisfaction, electoral participation, and
political efficacy, democratic governments can reduce the number of terrorist incidents within their borders.
Limiting civil liberties does not lead to the expected decline in terrorist attacks, as is sometimes argued. Restricting the freedom of press, movement,
and association does not decrease the number of transnational terrorist incidents. Strategic terrorists simply select
alternative modes to engage in violence, as argued by Enders and Sandier (2002).
62
SSRA Affirmative
DKC-ENDI 2015
Rights Advantage
63
SSRA Affirmative
DKC-ENDI 2015
Right To Communication Impact
There can be no compromise on a right to communication – settling for “steps in the right
direction” legitimizes the surveillance state – the only acceptable position is abolitionism
Valeri, 13 (Andy, M.A. Interdisplinary Studies, adjunct at the School of Advertising Art, founder of UnCommon Sense TVMedia. “Communication, Human
Rights, and The Threat of Weapons of Mass Surveillance: Why Communication Rights Are Essential To the Protection and Advancement of Human Rights in the 21st
Century.” Paper presented at the conference on The Social Practice of Human Rights: Charting the Frontiers of Research and Advocacy University of Dayton, October
3-5, 2013. http://ecommons.udayton.edu/cgi/viewcontent.cgi?article=1043&context=human_rights)
By aligning the efforts of those working to provide the means to communicate with those working to establish the right to communicate, a
powerful global
movement can be created. It will be one with the potential to drive forward a vision towards changing society’s
relationship to how information and communication are controlled and distributed, a goal no more ambitious or
impractical than that of the Abolitionist’s in changing the fundamental dynamics of the ownership and control of
labor throughout the world. Today, working to sustain the means for more democratic access to the media and information, without establishing the right
to that access, is akin to working for the regulation of slavery, rather than the banishment of its practice. Like the earlier abolitionist campaigns, an
effective communication rights movement must seek to avoid compromising its strategic purpose in the name of
achieving tactical gain. After all, the Abolitionists understood that any success in regulating the spread of slavery
was actually a setback in their effort to end it, for it provided de facto recognition for its legitimacy to exist in the
first place. In a similar fashion, those participating in the lunch counter sit-ins during the Civil Rights movement
were doing so not because they wanted a sandwich, but rather to assert their very right to be there, and to have
equal access to the same dignity and opportunity as all citizens. By the same token, will those working for a more inclusive,
democraticallyaccountable media system make the same demands upon an AT&T or a Time Warner, or any governing power, in respect to people’s rights to express, to
communicate, to inform and to be informed? Will those working for human rights and a more socially just world, no longer be satisfied with simply having access to the
means for documenting crimes and abuses, but begin to question why it is often so difficult and dangerous to expose this information to the broader public, at least in a
In coming to a deeper understanding of the issue
of communication, the human rights community must begin to face some fundamental questions about how our
information networks are designed, who owns and operates them, what constrictions are placed upon their use,
who can use them and for what, who can secretly surveil that use, etc. Will it accept the current status, attempting
to align its own principles towards working within the current system of ownership and control? Or will it
challenge it, like the Abolitionists did in regards to the ownership of human labor and its fruits? Eventually, the
questions come down to ones of sovereignty. Who controls our ability to participate and interact in our modern,
mass mediated, networked world? Who decides who gets heard, who gets seen, what gets said, who gets to know
what, and when do they get to know it? For whoever or whatever wields ownership and control over information
in an “information society,” controls that society. These questions dovetail straight into an entire ecology of communication and informationway that might actually entail meaningful, effective change towards addressing such injustices?
based issues - net neutrality, press freedom, the nature of copyright and Creative Commons licenses, the use of airwaves spectrum, the funding of community media, the
integrity of online encryption - all of these and more become acts in a much larger play, battles in a much bigger campaign - that of securing the inalienable right of
human beings to communicate. Such an effort necessitates the transcending of any silo mentalities which may be present in respect to each of these worthy issues, and
organizing them within the framework of a single, overarching strategic cause, one whose attainment will profoundly advance the conditions and enablement of all of
We are at a crucial point in the evolution of our communication infrastructure, as the
implementation of the technologies and policies currently taking place are going to shape our public sphere for
decades to come. At the heart of all of this is the struggle over the shaping of that the Internet, a struggle as
important as that over the political systems of nations, because its fate will determine what kinds of avenues of
participation people will have in the future (Ulrike Reinhard, 2012). As Zeynep Tufekci has pointed out, in only a few years time the
state of the Internet will be assumed to be the way it is simply because “that’s just the way it is,” when in fact it will
only take the shape that it does, and serve the interests that it serves, through a process of tremendous struggle
(Ulrike Reinhard, 2012). This struggle is underway right now, as is evidenced by the efforts of private corporations to control and monetize the content on it (Hurley,
them. Concluding Observations
2013), or by the NSA’s sabotaging of it in trying to access literally everything that passes through it (Healey, 2013), or sometimes a combination of both (Stoll, 2013).
Yet, whether it is the Chinese government looking to shape it to monopolize political control, or Verizon attempting to monopolize it for economic exploitation (Gustin,
2013), the central challenges remain. Will the primary infrastructure for human communication and all of our collective knowledge be treated as the domain of private
interests? Or will it be the central locus of our 21st century commons, in recognition of the fundamental need that humans have for its access and use?
64
SSRA Affirmative
DKC-ENDI 2015
AT: Doesn't Solve Racism
Broad legal authority enables the NSA to engage in racist surveillance – the plan reigns that in
Lennard, 14 (Natasha, reporter with Salon and VICE. “The NSA’s Racist Targeting of Individuals Is as Troubling as Indiscriminate Surveillance”
https://news.vice.com/article/the-nsas-racist-targeting-of-individuals-is-as-troubling-as-indiscriminate-surveillance)
Revelations of the National Security Agency’s massive surveillance programs have highlighted how millions of ordinary internet and phone users — that is, noncriminal targets — have had their communications data swept up by a vast, indiscriminate dragnet. This has occasioned justifiable outrage, but the reaction has
overshadowed discussion of how the NSA targets actual individuals — a process that, it turns out, can be quite discriminatory.
As I noted last week, if our national security state’s dangerously loose determination of what constitutes an “imminent threat” is any indication, we should be as
troubled by the NSA’s targeting of particular people as we are by its non-targeted spying. The latest disclosure from The Intercept clearly illustrates why.
the NSA has been spying on five distinguished Muslim-Americans under a
law — the Foreign Intelligence Surveillance Act (FISA) — that is meant to target international terrorists or foreign
agents. The inclusion of the email accounts of these five people in a spreadsheet listing the targeted accounts of more than 7,000 others belies the NSA’s claim that
According to documents leaked by Edward Snowden,
it’s in the business of marking only terrorist suspects.
Here are the agency’s suspected “terrorists”: Faisal Gill, who was appointed to (and thoroughly vetted by) the
Department of Homeland Security under President George W. Bush; Asim Ghafoor, an attorney who has defended
clients suspected of terrorism; Hooshang Amirahmadi, an Iranian-American professor of public policy and
international development at Rutgers University; Agha Saeed, founder and chairman of the American Muslim
Alliance and a former political science professor at California State University; and Nihad Awad, the executive
director of the Council on American-Islamic Relations.
This is anti-Muslim discrimination pure and simple. While the NSA’s broad data collection is disturbingly total and unspecific, its
targeted spying is evidently racist. Another leaked document punctuates this point with a dull, disgusting thud: a 2005 training document explaining how
to “properly format internal memos to justify FISA surveillance” offers a sample memo that uses “Mohammed Raghead” as the name of a fictitious terrorism suspect.
Your NSA at work, ladies and gentlemen!
As the existence of this document makes clear, legality is a tortured issue at the heart national security misdeeds. NSA
agents are trained to ensure that
their surveillance practices fall within the letter of the law — and the law here is at fault, shaped not by a spirit of
justice but by surveillance-state paranoia. The Intercept report does not skirt around this point:
Indeed, the government’s ability to monitor such high-profile Muslim-Americans — with or without warrants —
suggests that the most alarming and invasive aspects of the NSA’s surveillance occur not because the agency
breaks the law, but because it is able to exploit the law’s permissive contours. “The scandal is what Congress has
made legal,” says Jameel Jaffer, an ACLU deputy legal director. “The claim that the intelligence agencies are complying with the
laws is just a distraction from more urgent questions relating to the breadth of the laws themselves.”
This latest Snowden leak adds a new dimension to the troubling stream of NSA revelations, illuminating an even more insidious aspect of the government’s surveillance
practices. We know that through dragnet data hoarding programs like PRISM we are all always-already potential suspects. We are all watched. But who falls under the
NSA microscope? Who gets to be the needles in the haystack, the targeting of which provides the official justification of total surveillance? Who gets to be
“Mohammed Raghead”?
Well, that’s top-secret government business. Don’t worry, though — it’s legal.
65
SSRA Affirmative
DKC-ENDI 2015
Internet Freedom Advantage
66
SSRA Affirmative
DKC-ENDI 2015
NSA hurts our credibility
It’s specifically wrecked our global negotiating position on Internet freedom.
Adam Bender, 7/23/2013. “Has PRISM surveillance undermined Internet freedom advocates?” Computer World,
http://www.computerworld.com.au/article/521619/has_prism_surveillance_undermined_internet_freedom_advocates_/.
The US surveillance program PRISM has severely threatened the continued freedom of Internet advocates, according to
Internet Society (ISOC) regional bureau director for Asia-Pacific, Rajnesh Singh.
Recent reports have revealed the NSA, under a program called PRISM, is collecting metadata about US phone calls, which includes information
about a call—including time, duration and location—but not the content of the call itself. Also, the NSA is collecting data on Internet traffic from
major Internet companies including Google and Microsoft.
“What’s happened with PRISM and the fallout we’ve seen is probably the greatest threat we have seen to the Internet
in recent times,” Singh said at an ISOC-AU event last night in Sydney.
Singh, who said he was speaking for himself and not necessarily ISOC as a whole, claimed that the spying program has undermined
the positions of Internet advocates in the United States, United Kingdom, Canada and Australia, which historically
have been “bastions of Internet freedom”.
“What’s happened with PRISM is these four or five countries are suddenly the enemy within,” he said. “The argument [for
Internet freedom] doesn’t hold water any more and that’s really made work difficult for us.”
At last year’s World Conference on International Telecommunications (WCIT) treaty talks, countries including Russia,
China and Iran made proposals to regulate Internet content that could have had “very bad implications for the Internet going
forward”, Singh said.
Many of the proposals were defeated through talks leading up to the treaty, he said. “But what happened of course was that the
countries at the forefront were Australia, US, UK [and] Canada.”
After news about PRISM broke, a delegate from another country who had supported the four countries in walking out on
the treaty told Singh that they now regretted the decision.
According to Singh, the delegate said, “My government is sorry that we didn’t sign the [WCIT treaty] because now we realise
what the real agenda was for the US and Australia and the UK and Canada. It wasn’t to protect the Internet; it was to
protect their own surveillance interests.”
Undermines our leverage for international negotiations --- countries turning to Russia and
China.
Megan Gates, 7/29/2014. “NSA's Actions Threaten U.S. Economy and Internet Security, New Report Suggests,” Security Management,
http://www.securitymanagement.com/news/nsas-actions-threaten-us-economy-and-internet-security-new-report-suggests-0013601.
The report’s authors also suggested that the NSA disclosures have “undermined American credibility” when it comes to the
Internet Freedom Agenda. In 2010, the United States began promoting a policy of an open and free Internet, but the
recent disclosures about the NSA have “led many to question the legitimacy of these efforts in the past year.”
“Concrete evidence of U.S. surveillance hardened the positions of authoritarian governments pushing for greater
national control over the Internet and revived proposals from both Russia and Brazil for multilateral management of
technical standards and domain names, whether through the International Telecommunications Union (ITU) or other
avenues,” according to the report. Many developing nations are now declining to work with the United States and are
instead embracing assistance from Russia, China, and the ITU when it comes to Internet availability and control for
their citizens.
Seriously harmed our leverage in international debates.
Danielle Kehl et al, July 2014. Policy Analyst at New America’s Open Technology Institute (OTI); Kevin Bankston is the Policy Director at
OTI; Robyn Greene is a Policy Counsel at OTI; and Robert Morgus is a Research Associate at OTI. “Surveillance Costs: The NSA’s Impact on the
Economy, Internet Freedom & Cybersecurity,” http://oti.newamerica.net/sites/newamerica.net/files/policydocs/Surveilance_Costs_Final.pdf.
Mandatory data localization proposals are just one of a number of ways that foreign governments have reacted to NSA surveillance in
manner that threatens U.S. foreign policy interests, particularly with regard to Internet Freedom. There has been a quiet
67
a
SSRA Affirmative
DKC-ENDI 2015
tension between how the U.S. approaches freedom of expression online in its foreign policy and its domestic laws ever
since Secretary of State Hillary Clinton effectively launched the Internet Freedom agenda in January 2010 . 170 But the NSA
disclosures shined a bright spotlight on the contradiction: the U.S. government promotes free expression abroad and aims to prevent repressive
governments from monitoring and censoring their citizens while simultaneously supporting domestic laws that authorize surveillance and bulk data
collection. As cybersecurity expert and Internet governance scholar Ron Deibert wrote a few days after the first revelations:
“There are unintended consequences of the NSA scandal that will undermine U.S. foreign policy interests – in particular,
the ‘Internet Freedom’ agenda espoused by the U.S. State Department and its allies.” 171 Deibert accurately predicted that the news would
trigger reactions from both policymakers and ordinary citizens abroad, who would begin to question their dependence on American technologies and
the hidden motivations behind the United States’ promotion of Internet Freedom. In some countries, the scandal would be used as an
excuse to revive dormant debates about dropping American companies from official contracts, score political points at the
expense of the United States, and even justify local monitoring and surveillance. Deibert’s speculation has so far proven quite prescient.
As we will describe in this section, the ongoing revelations have done significant damage to the credibility of the U.S.
Internet Freedom agenda and further jeopardized the United States’ position in the global Internet governance
debates.
68
SSRA Affirmative
DKC-ENDI 2015
NSA Link
Pressure to nationalize is coming & real – NSA fears are driving it
Goldstein, Writer for the Atlantic, 2014
[Gordon M. Goldstein, The End of the Internet?, http://www.theatlantic.com/magazine/archive/2014/07/the-end-of-theinternet/372301/]
If the long history of international commerce tells us anything, it is this: free trade is neither a natural nor an inevitable
condition. Typically, trade has flourished when a single, dominant country has provided the security and will to sustain it. In
the absence of a strong liberal ethos, promoted and enforced by a global leader, states seem drawn, as if by some spell, toward a
variety of machinations (tariffs, quotas, arcane product requirements) that provide immediate advantages to a few domestic companies or
industries—and that lead to collective immiseration over time.
The U.S. has played a special role in the development of the Internet. The Department of Defense fostered ARPANET, the precursor to the
Internet. As the network evolved, American companies were quick to exploit its growth, gaining a first-mover advantage that has in many cases grown into global
dominance. A vast proportion of the world’s Web traffic passes through American servers.
Laura DeNardis, a scholar of Internet governance at American University, argues that the Internet’s character is inherently commercial and private today. “The Internet
is a collection of independent systems,” she writes, “operated by mostly private companies,” including large telecommunications providers like AT&T and giant content
companies such as Google and Facebook. All of these players make the Internet function through private economic agreements governing the transmission of data
among their respective networks. While the U.S. government plays a role—the world’s central repository for domain names, for instance, is a private
nonprofit organization created at the United States’ urging in 1998, and operating under a contract administered by the Department of Commerce—it has
applied a
light touch. And why wouldn’t it? The Web’s growth has been broadly congenial to American interests, and a large boon
to the American economy.
That brings us to Edward Snowden and the U.S. National Security Agency. Snowden’s disclosures of the NSA’s surveillance of international Web traffic
have provoked worldwide outrage and a growing counterreaction. Brazil and the European Union recently announced plans to lay a $185 million undersea fiber-optic
communications cable between them to thwart U.S. surveillance. In February, German Chancellor Angela Merkel called for the European Union to create its own
regional Internet, walled off from the United States. “We’ll talk to France about how we can maintain a high level of data protection,” Merkel said. “Above all, we’ll
talk about European providers that offer security for our citizens, so that one shouldn’t have to send e-mails and other information across the Atlantic.”
Merkel’s exploration of a closed, pan-European cloud-computing network is simply the latest example of what the analyst Daniel Castro of the Information Technology
and Innovation Foundation calls “data nationalism,” a phenomenon gathering momentum whereby countries require that certain types of information be stored on
servers within a state’s physical borders. The nations that have already implemented a patchwork of data-localization requirements range from Australia, France, South
Korea, and India to Indonesia, Kazakhstan, Malaysia, and Vietnam, according to Anupam Chander and Uyen P. Le, two legal scholars at the University of California at
Davis. “Anxieties over surveillance … are justifying governmental measures that break apart the World Wide Web,” they wrote in a recent white paper. As a result,
“the era of a global Internet may be passing.”
Security concerns have catalyzed data-nationalization efforts , yet Castro, Chander, and Le all question the benefits, arguing that the security
of data depends not on their location but on the sophistication of the defenses built around them. Another motive appears to be in play: the Web’s
fragmentation would enable local Internet businesses in France or Malaysia to carve out roles for themselves, at the expense of
globally dominant companies, based disproportionately in the United States. Castro estimates that the U.S. cloud-computing industry alone could lose $22
billion to $35 billion in revenue by 2016.
The Snowden affair has brought to a boil geopolitical tensions that were already simmering. Autocracies, of course, have
long regulated the flow of Internet data, with China being the most famous example. But today such states are being joined by countries
across Asia, the Middle East, and Europe in calling for dramatic changes in the way the Web operates, even beyond the question of where data are stored.
NSA fears spur internet balkanization efforts – fear the U.S.
Ray, Security Analyst at 21CT, 2014
[Tim ray, The Balkanization of the Internet, http://www.21ct.com/blog/the-revolution-will-not-be-tweeted-thebalkanization-of-the-internet-part-2/]
NSA SURVEILLANCE STIRS THE POT (AND PROVIDES COVER)
While countries are struggling with their own versions of this scenario and with how
to spin this frightening picture of the new Balkanized
Internet, they were handed a great gift: Edward Snowden’s tales of NSA’s global surveillance operations.
Suddenly, there’s a common enemy: America. Globally adventurous, the Americans (it seems) are also watching everyone they can, sometimes
without permission. Snowden’s revelations alone will not be enough to force through the kinds of national controls we’re talking about, but they are a great
start, a unifying force.
69
SSRA Affirmative
DKC-ENDI 2015
is moving forward with nationalizing its email services as well as
plans to store all data within the country’s borders. The idea there is the same as the example above: take essential services in-country in
order to prevent the U.S. from spying on them and (as a side effect) control them too. These proposals seem to be
receiving some popular support; many see it as akin to nationalizing their oil, or another resource. Taking local control of
formerly global services is the beginning of Balkanization for countries that choose that path.
Sound farfetched? Maybe. Are there other answers? Perhaps. Brazil
70
SSRA Affirmative
DKC-ENDI 2015
Answers to: Internet isn’t free & open
Surveillance is the business model of the Internet – the NSA is just jumping on board with the
data Google, Facebook, and phone companies collect independently
Schneier, 13 (Bruce, cryptographer and computer security specialist, fellow at the Berkman Center for Internet &
Society at Harvard Law School. “Stalker Economy Is Here To Stay,” November
2013. http://edition.cnn.com/2013/11/20/opinion/schneier-stalker-economy/index.html)
Google recently announced that it would start including individual users' names and photos in some ads. This means that if you rate
some product positively, your friends may see ads for that product with your name and photo attached -- without your knowledge or consent.
Meanwhile, Facebook is eliminating a feature that allowed people to retain some portions of their anonymity on its website.
These changes come on the heels of Google's move to explore replacing tracking cookies with something that users have even less control
over. Microsoft is doing something similar by developing its own tracking technology.
More generally, lots of companies are evading the "Do Not Track" rules, meant to give users a say in whether companies track them. Turns
out the whole "Do Not Track" legislation has been a sham.
It shouldn't come as a surprise that big technology companies are tracking us on the Internet even more aggressively than before.
If these features don't sound particularly beneficial to you, it's because you're not the customer of any of these companies. You're the
product, and you're being improved for their actual customers: their advertisers.
This is nothing new. For years, these sites and others have systematically improved their "product" by reducing user privacy. This
excellent infographic, for example, illustrates how Facebook has done so over the years.
The "Do Not Track" law serves as a sterling example of how bad things are. When it was proposed, it was supposed to give users the right to
demand that Internet companies not track them. Internet companies fought hard against the law, and when it was passed, they fought to
ensure that it didn't have any benefit to users. Right now, complying is entirely voluntary, meaning that no Internet company has to follow the
law. If a company does, because it wants the PR benefit of seeming to take user privacy seriously, it can still track its users.
Really: if you tell a "Do Not Track"-enabled company that you don't want to be tracked, it will stop showing you personalized ads. But your
activity will be tracked -- and your personal information collected, sold and used -- just like everyone else's. It's best to think of it as a "track
me in secret" law.
Of course, people don't think of it that way. Most people aren't fully aware of how much of their data is collected by these sites. And, as
the "Do Not Track" story illustrates, Internet companies are doing their best to keep it that way.
The result is a world where our most intimate personal details are collected and stored. I used to say that Google has a more intimate
picture of what I'm thinking of than my wife does. But that's not far enough: Google has a more intimate picture than I do. The
company knows exactly what I am thinking about, how much I am thinking about it, and when I stop thinking about it: all from my
Google searches. And it remembers all of that forever.
As the Edward Snowden revelations continue to expose the full extent of the National Security Agency's eavesdropping on the Internet, it
has become increasingly obvious how much of that has been enabled by the corporate world's existing eavesdropping on the Internet.
The public/private surveillance partnership is fraying, but it's largely alive and well. The NSA didn't build its eavesdropping system from
scratch; it got itself a copy of what the corporate world was already collecting.
There are a lot of reasons why Internet surveillance is so prevalent and pervasive.
One, users like free things, and don't realize how much value they're giving away to get it. We know that "free" is a special price that
confuses peoples' thinking.
Google's 2013 third quarter revenue was nearly $15 billion with profit just under $3 billion. That profit is the difference between how much
our privacy is worth and the cost of the services we receive in exchange for it.
Two, Internet companies deliberately make privacy not salient. When you log onto Facebook, you don't think about how much personal
information you're revealing to the company; you're chatting with your friends. When you wake up in the morning, you don't think
about how you're going to allow a bunch of companies to track you throughout the day; you just put your cell phone in your pocket.
And three, the Internet's winner-takes-all market means that privacy-preserving alternatives have trouble getting off the ground. How many of
you know that there is a Google alternative called DuckDuckGo that doesn't track you? Or that you can use cut-out sites to anonymize your
Google queries? I have opted out of Facebook, and I know it affects my social life.
There are two types of changes that need to happen in order to fix this. First, there's the market change. We need to become actual customers
of these sites so we can use purchasing power to force them to take our privacy seriously. But that's not enough. Because of the market
failures surrounding privacy, a second change is needed. We need government regulations that protect our privacy by limiting what these
sites can do with our data.
Surveillance is the business model of the Internet -- Al Gore recently called it a "stalker economy." All major websites run on
advertising, and the more personal and targeted that advertising is, the more revenue the site gets for it. As long as we users remain
the product, there is minimal incentive for these companies to provide any real privacy.
71
SSRA Affirmative
72
DKC-ENDI 2015
SSRA Affirmative
DKC-ENDI 2015
Hurts the Internet
Balkanization would destroy the internet – crushes trade & economic growth
McDowell, Commission of the FCC, 2012
[Robert M. McDowell, The U.N. Threat to Internet Freedom,
http://www.wsj.com/articles/SB10001424052970204792404577229074023195322]
Merely saying "no" to any changes to the current structure of Internet governance is likely to be a losing proposition. A more successful strategy would be for
proponents of Internet freedom and prosperity within every nation to encourage a dialogue among all interested parties, including governments and the ITU, to broaden
the multi-stakeholder umbrella with the goal of reaching consensus to address reasonable concerns. As part of this conversation, we should underscore the tremendous
benefits that the Internet has yielded for the developing world through the multi-stakeholder model.
Upending this model with a new regulatory treaty is likely to partition the Internet as some countries would inevitably choose to opt out.
A balkanized Internet would be devastating to global free trade and national sovereignty. It would impair Internet
growth most severely in the developing world but also globally as technologists are forced to seek bureaucratic permission
to innovate and invest. This would also undermine the proliferation of new cross-border technologies, such as cloud computing.
A top-down, centralized, international regulatory overlay is antithetical to the architecture of the Net, which is a global
network of networks without borders. No government, let alone an intergovernmental body, can make engineering and economic
decisions in lightning-fast Internet time. Productivity, rising living standards and the spread of freedom everywhere, but
especially in the developing world, would grind to a halt as engineering and business decisions become politically paralyzed within a global
regulatory body.
Any attempts to expand intergovernmental powers over the Internet—no matter how incremental or seemingly innocuous—should be
turned back. Modernization and reform can be constructive, but not if the end result is a new global bureaucracy that departs from the multi-stakeholder model.
Enlightened nations should draw a line in the sand against new regulations while welcoming reform that could include a nonregulatory role
for the ITU.
State control destroys the value of the internet
Alford, Senior Program Officer, Internet Freedom, Freedom House, 2014
[Gigi Alford, State Partitioning of the Internet Harms Users Everywhere, http://www.huffingtonpost.com/freedomhouse/state-partitioning-of-the_b_5843162.html]
For as long as the global internet has withstood attempts by states to subjugate its cables, servers, and protocols, the virtual world has been a refuge for users who are
deprived of their fundamental freedoms offline. This boon of technology is what led UN experts to declare the internet “an indispensable tool for realizing a range of
human rights” and to debate whether access to such an engine of human progress constitutes a right in itself.
However, since Edward Snowden disclosed documents on secret U.S. and British data-collection programs, the internet has faced
intensified challenges from all sides—some genuine and others opportunistic—that could lead states to partition the digital commons
into national and regional demesnes.
An internet that is fragmented by political, legal, and technical boundaries would throttle the animating purpose of the
International Bill of Human Rights, while an indivisible and global internet is able to facilitate such goals. As states fully fathom the
internet’s disruptive power and rush to impose choke points in the name of national sovereignty, the digital world
increasingly mirrors the analog world’s human rights deficiencies, which it once transcended. The virtual refuge is being dismantled, and for
individuals on the wrong side of the new borders, it has been replaced with separate and unequal “splinternets.”
Such digital apartheid flies in the face of the universality of human rights, and it contradicts international jurisprudence
that rejects separate-but-equal regimes. As the UN Human Rights Council has affirmed, “the same rights that people have offline must also be protected
online.”
Champions of a unified internet are putting forth strong economic and geopolitical arguments to counter these challenges—including earlier this month at the ninth
annual Internet Governance Forum (IGF) in Istanbul, Turkey, and next month at the International Telecommunications Union (ITU) plenipotentiary meeting in Busan,
South Korea. But stakeholders often miss the bigger picture when they overlook the human rights case against a “Westphalian web” model of internet governance.
73
SSRA Affirmative
DKC-ENDI 2015
Bad for Economy
Nationalized internet would collapse global growth
McDowell, FCC Chair, 2012
[5/31/31, Comm'r. McDowell's Congressional Testimony, http://www.fcc.gov/document/commr-mcdowellscongressional-testimony-5-31-2012]
It is a pleasure and an honor to testify beside my friend, Ambassador Phil Verveer. First, please allow me to dispense quickly and emphatically any doubts about the
bipartisan resolve of the United States’ to resist efforts to expand the International Telecommunication Union’s (“ITU”) authority over Internet matters. Some ITU
officials have dismissed our concern over this issue as mere “election year politics.” Nothing could be further from the truth as evidenced by Ambassador Verveer’s
testimony today as well as recent statements from the White House, Executive Branch agencies, Democratic and Republican Members of Congress and my friend and
colleague, FCC Chairman Julius Genachowski. We are unified on the substantive arguments and have always been so. Second, it is important to define the
challenge before us. The threats are real and not imagined, although they admittedly sound like works of fiction at times.
For many years now, scores of countries led by China, Russia, Iran, Saudi Arabia, and many others, have pushed for, as
then-Russian Prime Minister Vladimir Putin said almost a year ago, “international control of the Internet” through the ITU.1 I have tried to find a
more concise way to express this issue, but I can’t seem to improve upon now-President Putin’s crystallization of the effort that has been afoot for quite some time.
More importantly, I think we should take President Putin very seriously. 1 Vladimir Putin, Prime Minister of the Russian Federation, Working Day, GOV’T OF THE
RUSSIAN FED’N, http://premier.gov.ru/eng/events/news/15601/ (June 15, 2011) (last visited May 14, 2012). Six months separate us from the renegotiation of the 1988
treaty that led to insulating the Internet from economic and technical regulation. What proponents of Internet freedom do or don’t do between
now and then will determine the fate of the Net, affect global economic growth and determine whether political liberty
can proliferate. During the treaty negotiations, the most lethal threat to Internet freedom may not come from a full frontal assault, but
through insidious and seemingly innocuous expansions of intergovernmental powers. This subterranean effort is already under way.
While influential ITU Member States have put forth proposals calling for overt legal expansions of United Nations’ or ITU authority over the Net, ITU officials have
publicly declared that the ITU does not intend to regulate Internet governance while also saying that any regulations should be of the “light-touch” variety.2 But which
is it? It is not possible to insulate the Internet from new rules while also establishing a new “light touch” regulatory regime. Either a new legal paradigm will emerge in
December or it won’t. The choice is binary. Additionally, as a threshold matter, it is curious that ITU officials have been opining on the outcome of the treaty
negotiation. The ITU’s Member States determine the fate of any new rules, not ITU leadership and staff. I remain hopeful that the diplomatic process will not be
subverted in this regard. As a matter of process and substance, patient and persistent incrementalism is the Net’s most dangerous enemy and it is the hallmark of many
countries that are pushing the proregulation agenda. Specifically, some ITU officials and Member States have been discussing an alleged worldwide phone numbering
“crisis.” It seems that the world may be running out of phone numbers, over which the ITU does have some jurisdiction. 2 Speech by ITU Secretary-General Touré, The
Challenges of Extending the Benefits of Mobile (May 1, 2012),http://www.itu.int/net/pressoffice/press_releases/index.aspx?lang=en (last visited May 29, 2012). 2
Today, many phone numbers are used for voice over Internet protocol services such as Skype or Google Voice. To function properly, the software supporting these
services translate traditional phone numbers into IP addresses. The Russian Federation has proposed that the ITU be given jurisdiction over IP addresses to remedy the
phone number shortage.3 What is left unsaid, however, is that potential ITU jurisdiction over IP addresses would enable it to regulate Internet services and devices with
abandon. IP addresses are a fundamental and essential component to the inner workings of the Net. Taking their administration away from the bottomup, nongovernmental, multi-stakeholder model and placing it into the hands of international bureaucrats would be a grave mistake. Other efforts to expand the ITU’s reach into
the Internet are seemingly small but are tectonic in scope. Take for example the Arab States’ submission from February that would change the rules’ definition of
“telecommunications” to include “processing” or computer functions.4 This change would essentially swallow the Internet’s functions with only a tiny edit to existing
rules.5 When ITU leadership claims that no Member States have proposed absorbing Internet governance into the ITU or other intergovernmental entities, the Arab
States’ submission demonstrates that nothing could be further from the truth. An infinite number of avenues exist to 3 Further Directions for Revision of the ITRs,
Russian Federation, CWG-WCIT12 Contribution 40, at 3 (2011), http://www.itu.int/md/T09-CWG.WCIT12-C-0040/en (last visited May 29, 2012) (“To oblige ITU to
allocate/distribute some part of IPv6 addresses (as same way/principle as for telephone numbering, simultaneously existing of many operators/numbers distributors
inside unified numbers space for both fixed and mobile phone services) and determination of necessary requirements.”). 4 Proposed Revisions, Arab States, CWGWCIT12 Contribution 67, at 3 (2012), http://www.itu.int/md/T09CWG.WCIT12-C-0067/en (last visited May 29, 2012). 5 And Iran argues that the current definition
already includes the Internet. Contribution from Iran, The Islamic Republic of Iran, CWG-WCIT12 Contribution 48, Attachment 2 (2011), http://www.itu.int/md/T09CWG.WCIT12C-0048/en (last visited May 29, 2012). 3 accomplish the same goal and it is camouflaged subterfuge that proponents of Internet freedom should watch
for most vigilantly. Other examples come from China. China would like to see the creation of a system whereby Internet users are registered using their IP addresses. In
fact, last year, China teamed up with Russia, Tajikistan and Uzbekistan to propose to the UN General Assembly that it create an “International Code of Conduct for
Information Security” to mandate “international norms and rules standardizing the behavior of countries concerning information and cyberspace.”6 Does anyone here
today believe that these countries’ proposals would encourage the continued proliferation of an open and freedom-enhancing Internet? Or would such constructs make it
easier for authoritarian regimes to identify and silence political dissidents? These proposals may not technically be part of the WCIT negotiations, but they give a sense
of where some of the ITU’s Member States would like to go. Still other proposals that have been made personally to me by foreign government officials include the
creation of an international universal service fund of sorts whereby foreign – usually state-owned – telecom companies would use international mandates to charge
certain Web destinations on a “per-click” basis to fund the build-out of broadband infrastructure across the globe. Google, iTunes, Facebook and Netflix are mentioned
most often as prime sources of funding. In short, the U.S. and like-minded proponents of Internet freedom and prosperity across the
globe should resist efforts to expand the powers of intergovernmental bodies over the Internet 6 Letter dated 12 September 2011
from the Permanent Representatives of China, the Russian Federation, Tajikistan, and Uzbekistan to the United Nations addressed to the Secretary-General, Item 93 of
the provisional agenda - Developments in the field of information and telecommunications in the context of international security, 66th Session of the United Nations
General Assembly, Annex (Sep. 14, 2011), http://www.cs.brown.edu/courses/csci1800/sources/2012_UN_Russia_and_China_Code_o_Conduct.pdf (last visited May
such a scenario would be
devastating to global economic activity, but it would hurt the developing world the most. Thank you for the opportunity to
29, 2012). even in the smallest of ways. As my supplemental statement and analysis explains in more detail below,
appear before you today and I look forward to your questions. Thank you, Chairman Walden and Ranking Member Eshoo, for holding this hearing. Its topic is among
the most important public policy issues affecting global commerce and political freedom: namely, whether the International Telecommunication Union (ITU), or any
other intergovernmental body, should be allowed to expand its jurisdiction into the operational and economic affairs of the Internet. As we head toward the treaty
74
SSRA Affirmative
DKC-ENDI 2015
negotiations at the World Conference on International Telecommunications (WCIT) in Dubai in December, I urge governments around the world to avoid the
temptation to tamper with the Internet. Since its privatization in the early 1990s, the Internet has flourished across the world under the current
deregulatory framework. In fact, the long-standing international consensus has been to keep governments from regulating
core functions of the Internet’s ecosystem. Yet, some nations, such as China, Russia, India, Iran and Saudi Arabia, have been pushing to
reverse this course by giving the ITU or the United Nations itself, regulatory jurisdiction over Internet governance. The ITU is a treatybased organization under the auspices of the United Nations.1 Don’t take my word for it, however. As Russian Prime Minister Vladimir Putin said almost one year ago,
the goal of this well-organized and energetic effort is to establish “international control over the Internet using the monitoring and supervisory capabilities of the
[ITU].”2 Motivations of some ITU Member states vary. Some of the arguments in support of such actions may stem from frustrations with the operations of Internet
Corporation for Assigned Names and Numbers (ICANN). Any concerns regarding ICANN, however, should not be used as a pretext to end the multi-stakeholder model
that has served all nations – especially the developing world – so well. Any reforms to ICANN should take place through the bottom-up multi-stakeholder process and
should not arise through the WCIT’s examination of the International Telecommunication Regulations (ITR)s. Constructive reform of the ITRs may be needed. If so,
the scope of any review should be limited to traditional telecommunications services and not expanded to include information services or any form of Internet services.
Modification of the current multistakeholder Internet governance model may be necessary as well, but we should all work together to ensure no intergovernmental
regulatory overlays are placed into this sphere. Not only would nations surrender some of their national sovereignty in such a pursuit, but they would suffocate their
own economies as well, while politically paralyzing engineering and business decisions within a global regulatory body. 1 History,
IThttp://www.itu.int/en/about/Pages/history.aspx">U, http://www.itu.int/en/about/Pages/history.aspx (last visited May 14, 2012). 2 Vladimir Putin, Prime Minister of
the Russian Federation, Working Day, GOV’T OF THE RUSSIAN FED’N, http://premier.gov.ru/eng/events/news/15601/ (June 15, 2011) (last visited May 14, 2012).
Every day headlines tell us about industrialized and developing nations alike that are awash in debt, facing flat growth curves, or worse, shrinking GDPs. Not only
must governments, including our own, tighten their fiscal belts, but they must also spur economic expansion. An
unfettered Internet offers the brightest ray of hope for growth during this dark time of economic uncertainty, not
more regulation. Indeed, we are at a crossroads for the Internet’s future. One path holds great promise, while the other path
is fraught with peril. The promise, of course, lies with keeping what works, namely maintaining a freedom-enhancing and
open Internet while insulating it from legacy regulations. The peril lies with changes that would ultimately sweep up
Internet services into decades-old ITU paradigms. If successful, these efforts would merely imprison the future in the
regulatory dungeon of the past. The future of global growth and political freedom lies with an unfettered Internet.
Shortly after the Internet was privatized in 1995, a mere 16 million people were online worldwide.3 As of early 2012, approximately 2.3 billion people were using the
Net.4 Internet connectivity quickly evolved from being a novelty in industrialized countries to becoming an essential tool
for commerce – and sometimes even basic survival – in all nations, but especially in the developing world. Such explosive
growth was helped, not hindered, by a deregulatory construct. Developing nations stand to gain the most from the rapid
pace of deployment and adoption of Internet technologies brought forth by an Internet free from intergovernmental
regulation. By way of illustration, a McKinsey report released in January examined the Net’s effect on the developing world, or “aspiring countries.”5 In 30
specific aspiring countries studied, including Malaysia, Mexico, Morocco, Nigeria, Turkey and Vietnam,6 Internet penetration has grown 25 percent per year for the
past five years, compared to only five percent per year in developed nations.7 Obviously, broadband penetration is lower in aspiring countries than in the developed
world, but that is quickly changing thanks to mobile Internet access technologies. Mobile subscriptions in developing countries have risen from 53 percent of the global
market in 2005 to 73 percent in 2010.8 In fact, Cisco estimates that the number of mobile-connected devices will exceed the world’s population sometime this year.9
Increasingly, Internet users in these countries use only mobile devices for their Internet access.10 This trend has resulted in developing countries growing their global
share of Internet users from 33 percent in 2005, to 52 percent in 2010, with a projected 61 percent share by 2015.11 The 30 aspiring countries discussed earlier are
home to one billion Internet users, half of all global Internet users. The effect that rapidly growing Internet connectivity is having on
aspiring countries’ economies is tremendous. The Net is an economic growth accelerator. It contributed an average 1.9
percent of GDP growth in aspiring countries for an estimated total of $366 billion in 2010.13 In some developing economies, Internet
connectivity has contributed up to 13 percent of GDP growth over the past five years.14 In six aspiring countries alone, 1.9 million jobs
were associated with the Internet.15 And in other countries, the Internet creates 2.6 new jobs for each job it disrupts.16 I expect that we would all agree that these
positive trends must continue. The best path forward is the one that has served the global economy so well, that of a multi-
stakeholder governed Internet. One potential outcome that could develop if pro-regulation nations are successful in
granting the ITU authority over Internet governance would be a partitioned Internet. In particular, fault lines could be drawn between
countries that will choose to continue to live under the current successful model and those Member States who decide to opt out to place themselves under an
intergovernmental regulatory regime. A balkanized Internet would not promote global free trade or increase living standards.
At a
minimum, it would create extreme uncertainty and raise costs for all users across the globe by rendering an engineering,
operational and financial morass. For instance, Harvard and the Massachusetts Institute of Technology (MIT) recently announced placing many of their
courses online for free – for anyone to use. The uncertainty and economic and engineering chaos associated with a newly politicized
intergovernmental legal regime would inevitably drive up costs as cross border traffic and cloud computing become
more complicated and vulnerable to regulatory arbitrage. Such costs are always passed on to the end user consumers and may very well
negate the ability of content and application providers such as Harvard and MIT to offer first-rate educational content for free. Nations that value freedom
and prosperity should draw a line in the sand against new regulations while welcoming reform that could include a
non-regulatory role for the ITU. Venturing into the uncertainty of a new regulatory quagmire will only undermine
developing nations the most.
75
Download