MSDI Terror DA 1 About MSDI & Missouri State U.. For twenty years, the Missouri State Debate Institute has offered an excellent educational experience in the middle of the high school topic. MSDI is distinct from other camps in six ways. First, our skills focus assures that a typical 2-week debater gets nearly 80 speeches, including over 20 debates. Second, we emphasize the largest cases on topic, with students getting both aff and neg rounds on each. Third, our senior faculty are comparable with top lab leaders in any camp. Fourth, MSDI students can earn highly transferable college credit in public speaking for a minimal cost. Fifth, we respect variance in home debate circuits – our goal is to improve line by line debating in ways that will help students no matter who judges in their home circuit. Finally, our price is below any comparable camp and far below most camps. Our 2016 information will be available shortly at: http://debate.missouristate.edu/camp.htm. Missouri State University is a large comprehensive university (enrollment over 24k), with nearly any major you might want. The university has excellent academic scholarship support – most debaters combine academic “entitlement” scholarships (guaranteed based on GPA/test scores) with debate scholarships. The Spicer Debate Forum competes in two year-long policy debate formats: NDT and NFALD. We’ve national semis or finals in both in the last decade. Our debaters have an average GPA over 3.5, a 97% graduation rate, and 70% complete law/grad school afterward. Our program is a high-impact academic experience with an exceptional alumni network. Please contact Dr. Eric Morris for more information (EricMorris@MissouriState.edu). http://debate.missouristate.edu/ http://www.missouristate.edu/FinancialAid/scholarships/ Contents Shell ............................................................................................................................................................... 5 1NC ........................................................................................................................................................ 6 Links ............................................................................................................................................................ 11 General Domestic Surveillance ............................................................................................................... 12 Video Surveillance................................................................................................................................... 17 Warrantless Surveillance ........................................................................................................................ 22 Business records ..................................................................................................................................... 24 Signal Intelligence Necessary to Prevent Terrorism ........................................................................... 25 Bulk Data ................................................................................................................................................. 30 PRISM/ Section 702................................................................................................................................. 34 Cyber Provisions...................................................................................................................................... 42 Domestic Anti-Terrorism Key .............................................................................................................. 43 Intelligence Necessary to Prevent Genocide ...................................................................................... 44 A2: Terrorists No Longer Use Email .................................................................................................... 45 MSDI Terror DA 2 Government Transparency ..................................................................................................................... 46 RFID ......................................................................................................................................................... 47 Biometrics ............................................................................................................................................... 50 UQ ............................................................................................................................................................... 52 General.................................................................................................................................................... 53 Surveillance Programs Now ................................................................................................................ 54 Internal Terror Prevention Strong Now .............................................................................................. 58 General Terror Risk ................................................................................................................................. 60 Up now ................................................................................................................................................ 61 Al Qaeda UQ............................................................................................................................................ 62 General................................................................................................................................................ 63 Egypt Warrant ..................................................................................................................................... 64 Arab Spring Warrant ........................................................................................................................... 65 AQAP Warrant..................................................................................................................................... 69 ISIS UQ..................................................................................................................................................... 70 General Strong Now ............................................................................................................................ 71 Attacks Increasing Warrent................................................................................................................. 72 Military Capacity Warrent................................................................................................................... 73 Returning Fighters Warrent ................................................................................................................ 75 Al-Shabaab UQ ........................................................................................................................................ 76 General................................................................................................................................................ 77 I/L ................................................................................................................................................................ 78 Al Qaeda Specific..................................................................................................................................... 79 Surveillance Solves .............................................................................................................................. 80 ISIS Specific.............................................................................................................................................. 82 Surveillance Solves ISIS ....................................................................................................................... 83 ISIS Nuclear Terrorism......................................................................................................................... 84 Impacts........................................................................................................................................................ 88 Nuke Terror ............................................................................................................................................. 89 Dirty Bomb Risk High........................................................................................................................... 90 General High Risk ................................................................................................................................ 92 Al Qaeda Risk High .............................................................................................................................. 94 ISIS Risk High ....................................................................................................................................... 96 MSDI Terror DA 3 Yes Extinction .......................................................................................................................................... 98 Nuke Taboo ......................................................................................................................................... 99 Miscalculation ................................................................................................................................... 100 U.S. Lash out...................................................................................................................................... 102 Econ Collapse .................................................................................................................................... 103 Middle East Escalation ...................................................................................................................... 105 AT: Can’t Get the Bomb Here............................................................................................................ 107 AT: Can’t Build Them......................................................................................................................... 108 AT: Empirically Denied ...................................................................................................................... 109 AT: No Expertise ................................................................................................................................ 110 Bioterror Impacts .................................................................................................................................. 111 General Risk High .............................................................................................................................. 112 Al Qaeda Risk High ............................................................................................................................ 116 ISIS Specific........................................................................................................................................ 118 Yes Extinction ........................................................................................................................................ 121 Lashout .............................................................................................................................................. 122 Pandemic Extinction.......................................................................................................................... 123 AT: Deterrence/Terrorists Won’t use WMD’s................................................................................... 125 AT: No bioweapon access ................................................................................................................. 126 AT: No BW Delivery ........................................................................................................................... 128 AT: Containment Solves BW ............................................................................................................. 129 Other Scenarios......................................................................................................................................... 130 Cyber Scenario ...................................................................................................................................... 131 Core ................................................................................................................................................... 132 Blackouts Module ............................................................................................................................. 135 Oil Shocks Module............................................................................................................................. 140 Nuke Power Scenario ............................................................................................................................ 145 Core ................................................................................................................................................... 146 Fuel Rod Internal ............................................................................................................................... 149 Blackout Scenario.................................................................................................................................. 150 Core ................................................................................................................................................... 151 Other AT / Ext ........................................................................................................................................... 154 A2: Drone Strikes Solve ..................................................................................................................... 155 MSDI Terror DA 4 AT: Domestic Terrorism Decline ....................................................................................................... 158 AT: State Sponsorship of Terrorism Decreasing ............................................................................... 161 A2: Al Qaeda Threat Decreasing ....................................................................................................... 163 A2: Al Qaeda Leaders Killed .............................................................................................................. 166 A2: ISIS Can’t Succeed/No Positive Mission...................................................................................... 168 A2 ISIS No means .............................................................................................................................. 169 MSDI Terror DA 5 Shell MSDI Terror DA 6 1NC The Syrian Civil War has Dramatically Increased The Risk of Terror Attacks Of all kinds in the U.S. David Francis, February 25, 2015, Foreign Policy, Islamic State Threat Comes to American Shores, http://foreignpolicy.com/2015/02/25/islamic-state-threat-comes-to-american-shores/ DOA: 3-1-15 US. law enforcement authorities nabbed three terrorism suspects Wednesday for conspiring to travel to Syria to fight for the Islamic State and conduct attacks here at home, including a potential attempt on President Barack Obama’s life and a hoped-for bomb attack at New York’s Coney Island. The arrests are likely to raise concerns about the Islamic State’s presence on American shores. No one claiming allegiance to the group has yet to strike in the United States but the militants running a self-proclaimed caliphate in parts of Syria and Iraq have inspired attacks in Canada, Denmark, France, and Australia. In the last year, U.S. law enforcement personnel have arrested more than 20 people for trying to travel to the Middle East to fight for the Islamic State or other terrorist groups. One suspect, Akhror Saidakhmetov, was arrested at New York’s Kennedy Airport while trying to board a plane to Istanbul. A second suspect, Abdurasul Hasanovich Juraboev, traveled to Turkey last month and was picked up in Brooklyn. Abror Habibov was arrested up in Florida and stands accused of funding Saidakhmetov’s attempts to travel to the Middle East. Each faces a maximum sentence of 15 years in federal prison. “The flow of foreign fighters to Syria represents an evolving threat to our country and to our allies,” United States Attorney Loretta Lynch, who is also Obama’s nominee as attorney general, said in a statement announcing the arrests. “As alleged in the complaint, two of the defendants in this case sought to travel to Syria to join [the Islamic State] but were also prepared to wage violent jihad here in the United States.” Their arrests serve as a reminder of the international reach of the group. Saidakhmetov lives in Brooklyn but is a citizen of Kazakhstan. Juraboev and Habibov are from Uzbekistan. Intensive Domestic Surveillance is Empirically Key to Prevent Nuclear, Chemical and Bio Terror Attacks Yohn Yoo, Summer 2014, Emanuel S. Heller Professor of Law, University of California, Berkeley Law School; Visiting Scholar, American Enterprise Institute, Harvard Journal of Law & Public Policy, THE LEGALITY OF THE NATIONAL SECURITY AGENCY'S BULK DATA SURVEILLANCE PROGRAMS, http://moritzlaw.osu.edu/students/groups/is/files/2013/11/Yoo1.pdf, DOA: 1-1-15, p. 929-30 The real problem with FISA, and even the Patriot Act, as they existed before the 2008 Amendments, is that they remained rooted in a law enforcement approach to electronic surveillance. They tied the government's counterterrorism efforts to individualized suspicion. Searches and wiretaps had to target a specific individual already believed to be involved in harmful activity. But detecting al Qaeda members who have no previous criminal record in the United States, and who are undeterred by the possibility of criminal sanctions, requires the use of more sweeping methods. To prevent attacks successfully, the government has to devote surveillance resources where there is a reasonable chance that terrorists will appear or communicate, even if their specific identities remain unknown. What if the government knew that there was a fifty percent chance that terrorists would use a certain communications pipeline, such as e-mail provided by a popular Pakistani ISP, but that most of the communications on that channel MSDI Terror DA 7 would not be linked to terrorism? An approach based on individualized suspicion would prevent computers from searching through that channel for the keywords or names that might suggest terrorist communications because there are no specific al Qaeda suspects and thus no probable cause. Searching for terrorists depends on playing the probabilities rather than individualized suspicion, just as roadblocks or airport screenings do. The private owner of any website has detailed access to information about the individuals who visit the site that he can exploit for his own commercial purposes, such as selling lists of names to spammers or gathering market data on individuals or groups. Is the government's effort to find violent terrorists a less legitimate use of such data? Individualized suspicion dictates the focus of law enforcement, but war demands that our armed forces defend the country with a broader perspective. Armies do not meet a "probable cause" requirement when they attack a position, fire on enemy troops, or intercept enemy communications. The purpose of the criminal justice system is to hold a specific person responsible for a discrete crime that has already happened. But focusing on individualized suspicion does not make sense when the purpose of intelligence is to take action, such as killing or capturing members of an enemy group, to prevent future harm to the nation from a foreign threat. FISA should be regarded as a safe harbor that allows the fruits of an authorized search to be used for prosecution. Using FISA sacrifices speed and breadth of information in favor of individualized suspicion, but it provides a path for using evidence in a civilian criminal prosecution. If the President chooses to rely on his constitutional authority alone to conduct warrantless searches, then he should generally use the information only for military purposes. The primary objective of the NSA program is to "detect and prevent" possible al Qaeda attacks on the United States, whether another attack like September 11; a bomb in apartment buildings, bridges, or transportation hubs such as airports; or a nuclear, biological, or chemical attack. These are not hypotheticals; they are all al Qaeda plots, some of which U.S. intelligence and law enforcement agencies have already stopped. A President will want to use information gathered by the NSA to deploy military, intelligence, and law enforcement personnel to stop the next attack. The price to pay for speed, however, is foregoing any future criminal prosecution. If the President wants to use the NSA to engage in warrantless searches, he cannot use its fruits in an ordinary criminal prosecution. Al Qaeda has launched a variety of efforts to attack the United States, and it intends to continue them. The primary way to stop those attacks is to find and stop al Qaeda operatives, and the best way to find them is to intercept their electronic communications. Properly understood, the Constitution does not subject the government to unreasonable burdens in carrying out its highest duty of protecting the nation from attack. The First impact is a global nuclear exchange Robert Ayson 10 Professor of Strategic Studies and Director of the Centre for Strategic Studies: New Zealand @ The Victoria University of Wellington, July 2010, “After a Terrorist Nuclear Attack: Envisaging Catalytic Effects,” Studies in Conflict and Terrorism, Vol. 33 Issue 7) But these two nuclear worlds—a non-state actor nuclear attack and a catastrophic interstate nuclear exchange—are not necessarily separable. It is just possible that some sort of terrorist attack, and especially an act of nuclear terrorism, could precipitate a chain of events leading to a massive exchange of nuclear weapons between two or more of the states that possess them. In this context, today’s and tomorrow’s terrorist groups might assume the place allotted during the early Cold War years to new MSDI Terror DA 8 state possessors of small nuclear arsenals who were seen as raising the risks of a catalytic nuclear war between the superpowers started by third parties. These risks were considered in the late 1950s and early 1960s as concerns grew about nuclear proliferation, the so-called n+1 problem. It may require a considerable amount of imagination to depict an especially plausible situation where an act of nuclear terrorism could lead to such a massive inter-state nuclear war. For example, in the event of a terrorist nuclear attack on the United States, it might well be wondered just how Russia and/or China could plausibly be brought into the picture, not least because they seem unlikely to be fingered as the most obvious state sponsors or encouragers of terrorist groups. They would seem far too responsible to be involved in supporting that sort of terrorist behavior that could just as easily threaten them as well. Some possibilities, however remote, do suggest themselves. For example, how might the United States react if it was thought or discovered that the fissile material used in the act of nuclear terrorism had come from Russian stocks,40 and if for some reason Moscow denied any responsibility for nuclear laxity? The correct attribution of that nuclear material to a particular country might not be a case of science fiction given the observation by Michael May et al. that while the debris resulting from a nuclear explosion would be “spread over a wide area in tiny fragments, its radioactivity makes it detectable, identifiable and collectable, and a wealth of information can be obtained from its analysis: the efficiency of the explosion, the materials used and, most important . . . some indication of where the nuclear material came from.”41 Alternatively, if the act of nuclear terrorism came as a complete surprise, and American officials refused to believe that a terrorist group was fully responsible (or responsible at all) suspicion would shift immediately to state possessors. Ruling out Western ally countries like the United Kingdom and France, and probably Israel and India as well, authorities in Washington would be left with a very short list consisting of North Korea, perhaps Iran if its program continues, and possibly Pakistan. But at what stage would Russia and China be definitely ruled out in this high stakes game of nuclear Cluedo? In particular, if the act of nuclear terrorism occurred against a backdrop of existing tension in Washington’s relations with Russia and/or China, and at a time when threats had already been traded between these major powers, would officials and political leaders not be tempted to assume the worst? Of course, the chances of this occurring would only seem to increase if the United States was already involved in some sort of limited armed conflict with Russia and/or China, or if they were confronting each other from a distance in a proxy war, as unlikely as these developments may seem at the present time. The reverse might well apply too: should a nuclear terrorist attack occur in Russia or China during a period of heightened tension or even limited conflict with the United States, could Moscow and Beijing resist the pressures that might rise domestically to consider the United States as a possible perpetrator or encourager of the attack? Washington’s early response to a terrorist nuclear attack on its own soil might also raise the possibility of an unwanted (and nuclear aided) confrontation with Russia and/or China. For example, in the noise and confusion during the immediate aftermath of the terrorist nuclear attack, the U.S. president might be expected to place the country’s armed forces, including its nuclear arsenal, on a higher stage of alert. In such a tense environment, when careful planning runs up against the friction of reality, it is just possible that Moscow and/or China might mistakenly read this as a sign of U.S. intentions to use force (and possibly nuclear force) against them. In that situation, the temptations to preempt such actions might grow, although it must be admitted that any preemption would probably still meet with a devastating response. As part of its initial response to the act of nuclear terrorism (as discussed earlier) Washington might decide to order a significant conventional (or nuclear) retaliatory or disarming attack against the leadership of the terrorist group and/or states seen to support that group. Depending on the identity and especially the location of these targets, Russia and/or China might MSDI Terror DA 9 interpret such action as being far too close for their comfort, and potentially as an infringement on their spheres of influence and even on their sovereignty. One far-fetched but perhaps not impossible scenario might stem from a judgment in Washington that some of the main aiders and abetters of the terrorist action resided somewhere such as Chechnya, perhaps in connection with what Allison claims is the “Chechen insurgents’ . . . long-standing interest in all things nuclear.”42 American pressure on that part of the world would almost certainly raise alarms in Moscow that might require a degree of advanced consultation from Washington that the latter found itself unable or unwilling to provide. Additionally, Bioterror Leads to Extinction Nathan Mhyrvold 2013 “Strategic Terrorism: A Call to Action” http://papers.ssrn.com/sol3/papers.cfm?abstract_id=2290382 Lawfare Research Paper No. 2-2013 He attended Mirman School and began college at age 14. He studied mathematics, geophysics, and space physics at UCLA. He was awarded a Hertz Foundation Fellowship for graduate study and studied at Princeton University, where he earned a master's degree in mathematical economics and completed a PhD in theoretical and mathematical physics. He also attended Santa Monica College. For one year, he held a postdoctoral fellowship at the University of Cambridge working under Stephen Hawking. As horrible as this would be, such a pandemic is by no means the worst attack one can imagine, for several reasons. First, most of the classic bioweapons are based on 1960s and 1970s technology because the 1972 treaty halted bioweapons development efforts in the United States and most other Western countries. Second, the Russians, although solidly committed to biological weapons long after the treaty deadline, were never on the cutting edge of biological research. Third and most important, the science and technology of molecular biology have made enormous advances, utterly transforming the field in the last few decades. High school biology students routinely perform molecular-biology manipulations that would have been impossible even for the best superpower-funded program back in the heyday of biological-weapons research. The biowarfare methods of the 1960s and 1970s are now as antiquated as the lumbering mainframe computers of that era. Tomorrow’s terrorists will have vastly more deadly bugs to choose from. Consider this sobering development: in 2001, Australian researchers working on mousepox, a nonlethal virus that infects mice (as chickenpox does in humans), accidentally discovered that a simple genetic modification transformed the virus.10, 11 Instead of producing mild symptoms, the new virus killed 60% of even those mice already immune to the naturally occurring strains of mousepox. The new virus, moreover, was unaffected by any existing vaccine or antiviral drug. A team of researchers at Saint Louis University led by Mark Buller picked up on that work and, by late 2003, found a way to improve on it: Buller’s variation on mousepox was 100% lethal, although his team of investigators also devised combination vaccine and antiviral therapies that were partially effective in protecting animals from the engineered strain.12, 13 Another saving grace is that the genetically altered virus is no longer contagious. Of course, it is quite possible that future tinkering with the virus will change that property, too. Strong reasons exist to believe that the genetic modifications Buller made to mousepox would work for other poxviruses and possibly for other classes of viruses as well. Might the same techniques allow chickenpox or another poxvirus that infects humans to be turned into a 100% lethal bioweapon, perhaps one that is resistant to any known antiviral therapy? I’ve asked this question of experts many times, and no one has yet replied that such a manipulation couldn’t be done. This case is just one example. Many more are pouring out of scientific journals and conferences every year. Just last year, the journal Nature published a controversial study done at the University of Wisconsin– MSDI Terror DA 10 Madison in which virologists enumerated the changes one would need to make to a highly lethal strain of bird flu to make it easily transmitted from one mammal to another.14 Biotechnology is advancing so rapidly that it is hard to keep track of all the new potential threats. Nor is it clear that anyone is even trying. In addition to lethality and drug resistance, many other parameters can be played with, given that the infectious power of an epidemic depends on many properties, including the length of the latency period during which a person is contagious but asymptomatic. Delaying the onset of serious symptoms allows each new case to spread to more people and thus makes the virus harder to stop. This dynamic is perhaps best illustrated by HIV , which is very difficult to transmit compared with smallpox and many other viruses. Intimate contact is needed, and even then, the infection rate is low. The balancing factor is that HIV can take years to progress to AIDS , which can then take many more years to kill the victim. What makes HIV so dangerous is that infected people have lots of opportunities to infect others. This property has allowed HIV to claim more than 30 million lives so far, and *approximately 34 million people are now living with this virus and facing a highly uncertain future.15 A virus genetically engineered to infect its host quickly, to generate symptoms slowly—say, only after weeks or months— and to spread easily through the air or by casual contact would be vastly more devastating than HIV . It could silently penetrate the population to unleash its deadly effects suddenly. This type of epidemic would be almost impossible to combat because most of the infections would occur before the epidemic became obvious. A technologically sophisticated terrorist group could develop such a virus and kill a large part of humanity with it. Indeed, terrorists may not have to develop it themselves: some scientist may do so first and publish the details. Given the rate at which biologists are making discoveries about viruses and the immune system, at some point in the near future, someone may create artificial pathogens that could drive the human race to extinction. Indeed, a detailed species-elimination plan of this nature was openly proposed in a scientific journal. The ostensible purpose of that particular research was to suggest a way to extirpate the malaria mosquito, but similar techniques could be directed toward humans.16 When I’ve talked to molecular biologists about this method, they are quick to point out that it is slow and easily detectable and could be fought with biotech remedies. If you challenge them to come up with improvements to the suggested attack plan, however, they have plenty of ideas. Modern biotechnology will soon be capable, if it is not already, of bringing about the demise of the human race— or at least of killing a sufficient number of people to end high-tech civilization and set humanity back 1,000 years or more. That terrorist groups could achieve this level of technological sophistication may seem far-fetched, but keep in mind that it takes only a handful of individuals to accomplish these tasks. Never has lethal power of this potency been accessible to so few, so easily. Even more dramatically than nuclear proliferation, modern biological science has frighteningly undermined the correlation between the lethality of a weapon and its cost, a fundamentally stabilizing mechanism throughout history. Access to extremely lethal agents—lethal enough to exterminate Homo sapiens— will be available to anybody with a solid background in biology, terrorists included. MSDI Terror DA 11 Links MSDI Terror DA 12 General Domestic Surveillance Surveillance is a critical tool needed to defeat terrorism Alan Dershowitz, Harvard Law School, May 5, 2014, The Atlantic, “No one opposes all surveillance:; false equivalence on the NSA, http://www.theatlantic.com/politics/archive/2014/05/false-equivalenceon-surveillance-from-alan-dershowitz/361694/ DOA: 2-22-15 Our enemies, especially those who target civilians, have one major advantage over us. They are not constrained by morality or legality. We have an advantage over them. In addition to operating under the rule of law, we have developed through hard work and extensive research technological tools that allow us to monitor and prevent their unlawful and letha l actions. Such technological tools helped us break the German and the Japanese code during the Second World War. They helped us defeat fascism. They helped us in the Cold War. And they are helping us now in the hot war against terrorists who would bomb this theater if they had the capacity to do so. You're going to hear again that there are only excuses that are being offered, that terrorism is really not a serious problem, or that American policy is as terroristic as the policy of al-Qaeda. I don't think you're going to accept that argument. We must not surrender our technological advantage. Surveillance critical to the war on terror Jessica Zuckerman et al, 2013, 60 Terrorist Plots Since 9-11: Continued Lessons in Domestic Counterterrorism, http://www.heritage.org/research/reports/2013/07/60-terrorist-plots-since-911continued-lessons-in-domestic-counterterrorism DOA: 5-24-15 Zuckerman is a Policy Analyst @ Heritage, Steven Bucci Phd, Drector, Douglas and Sarah Allison Center for Foreign and National Security Policy, James Carafano, Vice President for the Kathryn and Shelby Cullom Davis Institute for National Security and Foreign Policy, and the E. W. Richardson Fellow Three months after the attack at the Boston Marathon, the pendulum of awareness of the terrorist threat has already begun to swing back, just as it did after 9/11. Due to the resilience of the nation and its people, for most, life has returned to business as usual. The threat of terrorism against the United States, however, remains. Expecting to stop each and every threat that reaches a country’s borders is unreasonable, particularly in a free society committed to individual liberty. Nevertheless, there are important steps that America’s leaders can take to strengthen the U.S. domestic counterterrorism enterprise and continue to make the U.S. a harder target. Congress and the Administration should: Ensure a proactive approach to preventing terrorist attacks. Despite the persistent threat of terrorism, the Obama Administration continues to focus on reactive policies and prosecuting terrorists rather than on proactive efforts to enhance intelligence tools and thwart terrorist attempts. This strategy fails to recognize the pervasive nature of the threat posed by terrorist groups such as al-Qaeda and homegrown extremism. The Administration, and the nation as a whole, should continue to keep in place a robust, enduring, and proactive counterterrorism framework in order to identify and thwart terrorist threats long before the public is in danger. Maintain essential counterterrorism tools. Support for important investigative tools such as the PATRIOT Act is essential to maintaining the security of the U.S. and MSDI Terror DA 13 combating terrorist threats. Key provisions within the act, such as the roving surveillance authority and business records provision, have proved essential for thwarting terror plots, yet they require frequent reauthorization. In order to ensure that law enforcement and intelligence authorities have the essential counterterrorism tools they need, Congress should seek permanent authorization of the three sun setting provisions within the PATRIOT Act.[208] Furthermore, legitimate government surveillance programs are also a vital component of U.S. national security, and should be allowed to continue. Indeed, in testimony before the house, General Keith Alexander, the director of the National Security Agency (NSA), revealed that more than 50 incidents of potential terrorism at home and abroad were stopped by the set of NSA surveillance programs that have recently come under scrutiny. That said, the need for effective counterterrorism operations does not relieve the government of its obligation to follow the law and respect individual privacy and liberty. In the American system, the government must do both equally well. Break down the silos of information. Washington should emphasize continued cooperation and information sharing among federal, state, and local law enforcement agencies to prevent terrorists from slipping through the cracks between the various jurisdictions. In particular, the FBI should make a more concerted effort to share information more broadly with state and local law enforcement. State and local law enforcement agencies are the front lines of the U.S. national security strategy. As a result, local authorities are able to recognize potential danger and identify patterns that the federal authorities may miss. They also take the lead in community outreach, which is crucial to identifying and stopping “lone wolf” actors and other homegrown extremists. Federal law enforcement, on the other hand, is not designed to fight against this kind of threat; it is built to battle cells, groups, and organizations, not individuals. Surveillance needed to defeat terrorism Glenn Sulmassy, 2013, CNN, “Feds start building case against NSA leaker,” http://www.cnn.com/2013/06/10/opinion/sulmasy-nsa-snowden/ DOA: 4-1-15 The current threat by al Qaeda and jihadists is one that requires aggressive intelligence collection and efforts. One has to look no further than the disruption of the New York City subway bombers (the one being touted by DNI Clapper) or the Boston Marathon bombers to know that the war on al Qaeda is coming home to us, to our citizens, to our students, to our streets and our subways. This 21st century war is different and requires new ways and methods of gathering information. As technology has increased, so has our ability to gather valuable, often actionable, intelligence. However, the move toward "home-grown" terror will necessarily require, by accident or purposefully, collections of U.S. citizens' conversations with potential overseas persons of interest. An open society, such as the United States, ironically needs to use this technology to protect itself. This truth is naturally uncomfortable for a country with a Constitution that prevents the federal government from conducting "unreasonable searches and seizures." American historical resistance towards such activities is a bedrock of our laws, policies and police procedures. But what might have been reasonable 10 years ago is not the same any longer. The constant armed struggle against the jihadists has adjusted our beliefs on what we think our government can, and must, do in order to protect its citizens. However, when we hear of programs such PRISM, or the Department of Justice getting phone records of scores of citizens without any signs of suspicious activities nor indications of probable cause that they might be involved in terrorist related MSDI Terror DA 14 activities, the American demand for privacy naturally emerges to challenge such "trolling" measures or data-mining. The executive branch, although particularly powerful in this arena, must ensure the Congress is kept abreast of activities such as these surveillance programs. The need for enhanced intelligence activities is a necessary part of the war on al Qaeda, but abuse can occur without ensuring the legislative branch has awareness of aggressive tactics such as these. Our Founding Fathers, aware of the need to have an energetic, vibrant executive branch in foreign affairs, still anticipated checks upon the presidency by the legislature. Working together, the two branches can ensure that both legally, and by policy, this is what the citizens desire of their government -- and that leaks such as Snowden's won't have the impact and damage that his leaks are likely to cause. Surveillance Key Britain Eakin, June 19, 2013, Al Arabia, “NSA: Secret Surveillance Helped Prevent 50-plus terror attacks,” http://english.alarabiya.net/en/News/world/2013/06/19/NSA-Secret-U-S-surveillance-helpedprevent-50-plus-terror-attacks.html DOA: 4-25-15 Secret surveillance programs helped prevent more than 50 potential terror attacks worldwide, including plots to target the New York Stock Exchange and the city’s subway, the director of the National Security Agency testified on Tuesday. Ten of the 50 potential threats were domestic, said Army General Keith B. Alexander. A hearing before the House Intelligence Committee sought to calm fears among the American public that the U.S. government spies on them unconstitutionally, and repeated assurances that none of the NSA surveillance programs can target U.S. citizens at home or abroad without a court order. “These programs are limited, focused and subject to rigorous oversight,” Alexander said. Because of that, the civil liberties and privacy of Americans are not at stake, he added. However, Bruce Fein, a specialist in constitutional law, said the NSA surveillance programs are unconstitutional because there is no demonstration of individualized suspicion, as required by the Fourth Amendment. “The government has a burden to show some reasonable suspicion that someone being spied on is engaged in some wrongdoing before privacy can be invaded,” said Fein. Nonetheless, the witnesses defended the NSA programs as legal and necessary because of the nature of the threat of terrorism. “If you’re looking for a needle in a haystack, you have to get the haystack first,” testified Deputy Attorney General James Cole. Alexander and other senior U.S. intelligence officials testified in response to details leaked by former NSA contractor Edward Snowden about how the agency gathers data. The hearing reviewed NSA surveillance programs 215 and 702. Testimony said program 215 gathers data in bulk from various providers, such as Verizon, but does not look at content or names, while program 702 applies only to foreign citizens. The leak has sparked a debate among the American public over what information the government should be able to collect to safeguard national security, and how it should be allowed to gather it. A recent Pew poll shows that a slight majority of Americans think the NSA surveillance programs are acceptable. Meanwhile, U.S. President Barack Obama’s approval ratings have dropped over the past month. Alexander linked the relative safety Americans have enjoyed since the 9/11 attacks directly to the NSA surveillance programs, but Fein said people’s fears are being exploited. “Most people are risk-averse. They’re easily frightened, and told they need to surrender their liberties in order to be safe, even if it’s not true,” Fein said. The government has not provided any evidence that these programs are effective, he added. “It’s just their say-so.” When questioned about whether the NSA MSDI Terror DA 15 surveillance programs previously collected any other information, Alexander said what they have and have not collected remains classified and cannot be discussed. However, some details about how the programs have stopped potential terror attacks would be presented as early as Wednesday to U.S. lawmakers, he said. The largely docile Congress expressed overall support for the NSA programs, with Rep. Michele Bachmann framing Snowden as a traitor. “It seems to me that the problem here is that of an individual who worked within the system, who broke laws and who chose to declassify highly sensitive classified information,” Bachmann said. Alexander said they are investigating where security broke down, and how to provide better oversight for nearly 1,000 system administrators that can access classified information. The leaks were viewed across the board as a threat to national security. “These are egregious leaks… and now here we are talking about this in front of the world, so I think those leaks affect us,” said Sean Joyce, deputy director of the FBI. Only one member of the House Committee, Rep. Jim Himes, said he was troubled by what he called the historically unprecedented revelations revealed in the leaks. “We know that when a capability exists, there’s a potential for abuse… From time to time, it’ll be abused.” Surveillance has prevented more than 50 terror plots Kimberly Dozier, 6-18-2013, "NSA: 50 Terrorist Plots Were Foiled Thanks To Surveillance Program," Huffington Post, http://www.huffingtonpost.com/2013/06/18/nsa-surveillance_n_3460106.html The director of the National SECURITY Agency insisted on Tuesday that the government's sweeping surveillance programs have foiled some 50 terrorist plots worldwide in a forceful defense echoed by the leaders of the House Intelligence Committee. Army Gen. Keith Alexander said the two recently disclosed PROGRAMS – one that gathers U.S. phone records and another that is designed to track the use of U.S.based Internet servers by foreigners with possible links to terrorism – are critical in the terrorism fight. Intelligence officials have disclosed some details on two thwarted attacks, and Alexander promised additional information to the panel on thwarted attacks that the PROGRAMS helped stop. He provided few additional details. The PROGRAMS "assist the intelligence community to connect the dots," Alexander told the committee in a rare, open Capitol Hill hearing. Alexander got no disagreement from the leaders of the panel, who have been outspoken in backing the PROGRAMS since Edward Snowden, a 29-year-old former contractor with Booz Allen Hamilton, disclosed information to The Washington Post and the Guardian newspapers. Rep. Mike Rogers, R-Mich., chairman of the committee, and Rep. C.A. Dutch Ruppersberger of Maryland, the panel's top Democrat, said the programs were vital to the intelligence community and assailed Snowden's actions as criminal. "It is at times like these where our enemies within become almost as damaging as our enemies on the outside," Rogers said. Ruppersberger said the "brazen disclosures" put the United States and its allies at risk. The general counsel for the intelligence community said the NSA cannot TARGETphone conversations between callers inside the U.S. – even if one of those callers was someone they were targeting for surveillance when outside the country. The director of national intelligence's legal chief, Robert S. Litt, said that if the NSA finds it has accidentally gathered a phone call by a target who had traveled into the U.S. without their knowledge, they have to "purge" that from their system. The same goes for an accidental collection of any conversation because of an ERROR. Litt said those incidents are then reported to the Foreign Intelligence Surveillance Court, which "pushes back" and asks how it happened, and what the NSA is doing to fix the problem so it doesn't happen again. Rogers previewed the latest public airing of the NSA MSDI Terror DA 16 controversy the morning after President Barack Obama, who is attending the G-8 summit in Ireland, vigorously defended the surveillance programs in a lengthy interview Monday, calling them transparent – even though they are authorized in secret. "It is transparent," Obama told PBS' Charlie Rose in an interview. "That's why we set up the FISA court," the president added, referring to the secret court set up by the Foreign Intelligence Surveillance Act that authorizes two recently disclosed programs: one that gathers U.S. phone records and another that is designed to track the use of U.S.-based Internet servers by foreigners with possible links to terrorism. Obama said he has named representatives to a privacy and civil liberties oversight board to help in the debate over just how far government data gathering should be allowed to go – a discussion that is complicated by the secrecy surrounding the FISA court, with hearings held at undisclosed locations and with only government lawyers present. The ORDERS that result are all highly classified. "We're going to have to find ways where the public has an assurance that there are checks and BALANCES in place ... that their phone calls aren't being listened into; their text messages aren't being monitored, their emails are not being read by some big brother somewhere," the president said. A senior administration official said Obama had asked Director of National Intelligence James Clapper to determine what more information about the two PROGRAMS could be made public, to help better explain them. The official spoke on condition of anonymity because the official was not authorized to speak publicly. Snowden accused members of Congress and administration officials Monday of exaggerating their claims about the success of the data gathering PROGRAMS, including pointing to the arrest of the would-be New York subway bomber, Najibullah Zazi, in 2009. In an online interview with The Guardian in which he posted answers to questions Monday, Snowden said that Zazi could have been caught with narrower, targeted surveillance PROGRAMS – a point Obama conceded in his interview without mentioning Snowden. "We might have caught him some other way," Obama said. "We might have disrupted it because a New York cop saw he was suspicious. Maybe he turned out to be incompetent and the bomb didn't go off. But, at the margins, we are increasing our chances of preventing a catastrophe like that through these PROGRAMS," he said. Obama repeated earlier assertions that the NSA programs were a legitimate counterterror tool and that they were completely noninvasive to people with no terror ties – something he hoped to discuss with the privacy and civil liberties board he'd formed. The senior administration official said the president would be meeting with the new privacy board in the coming days. MSDI Terror DA 17 Video Surveillance Video surveillance essential to defeat terrorism St. Louis Dispatch, August 13, 2013, “The Role of Surveillance Cameras in the War on Terror,” http://www.gopusa.com/news/2013/04/22/the-role-of-surveillance-cameras-in-crime-or-terror/ DOA: 5-1-15 Mere hours after the public release of grainy surveillance camera images in the Boston Marathon bombings, law enforcement officials had pinpointed suspects in one of the nation's most horrific terrorist acts. It was a stunning and swift break in the case, one that illustrates the potency surveillance photos have for the public and police in solving crime. For Howard Richards, the images captured in Boston are validation of a three-year project in St. Louis to link 150 surveillance cameras into a single security system throughout the city's central corridor, from the riverfront to Forest Park. "Without those images, they would not have been able to solve this thing as quickly, there are no two ways about it," Richards said of the Boston case. "You can't overestimate the value of this technology." Richards is head of security at Harris-Stowe State University and chairs monthly meetings of the Central Corridor Security Group, formed about three years ago to address security issues. The group eventually brought on United for a Better St. Louis, a nonprofit organization formed in 2011 to enhance public safety efforts, to lead a fundraising campaign. The St. Louis project would form a common network out of cameras owned and operated by a host of entities, such as the city's port authority and street department, the Partnership for Downtown St. Louis, the Locust Business District and the Central West End. The security system, which organizers hope to have in place in about three months, would equip police with tablet computers and software allowing officers to look through any of the cameras on the network. With newer cameras, police would be able to zoom, pan and tilt to get a better view. "It's going to make us cutting-edge and on board with other big cities in the country," said Michael Gerdine, a chiropractor and chairman of United for a Better St. Louis. Cities such as Baltimore, Chicago, Atlanta and Dallas use the technology, and their systems have been reviewed for the St. Louis project. New York operates a "Ring of Steel" that trains an estimated 3,000 cameras in Lower Manhattan. Boston has a network of cameras throughout its city and transit system. London -- known for its ubiquitous security cameras -- has also seen how surveillance images can lead to a swift resolution to terrorism investigations. In 2005, terrorism suspects were quickly identified with such images. Weeks later, a failed group of bombers was also caught, thanks to the cameras. In Baltimore, the cameras have been a valuable tool in prosecuting crimes, and have been successful in reducing crime in trouble spots, said Baltimore police spokesman Anthony Guglielmi. "We love them. It's a really great system," Guglielmi said. Still, he said, "they are in no way designed to replace those on patrol." Research further backs up the value that surveillance cameras have in solving crime. In St. Louis, the project grew out of meetings between members of the Locust Business District and the Downtown Partnership over security concerns. Expanding and linking camera systems was proposed as a way to not only help solve crime, but prevent it. From those early discussions, the Central Corridor Security Group was formed. The group's board includes representatives of the Downtown Partnership, Grand Center Inc., St. Louis University and Barnes-Jewish Hospital. Two St. Louis police captains are on the board. Representatives of Metro, Sigma-Aldrich and Wells Fargo also attend meetings. Maggie Campbell, president of the Partnership for Downtown St. Louis, said live MSDI Terror DA 18 monitoring of cameras has been happening downtown for about five years. "But if we can grow it and leverage it with our neighboring business districts, then we can make it work better for everyone," she said. "It's all about multiplying the eyes that are watching." No public funds are being sought in the startup of the program, and the cameras would be limited to public areas. "We all decided it would be a good idea to basically look out for each other," Richards said. But increasing cameras and the number of people allowed to monitor them concerns privacy advocates. Surveillance cameras critical to defeat terrorism Farhad Manjo, April 18, 2013, Slate, We Need More Cameras and We Need them Now,” http://www.slate.com/articles/technology/technology/2013/04/boston_bomber_photos_the_maratho n_bombing_shows_that_we_need_more_security.html DOA: 4-5-15 Though DesLauriers did not indicate the source of the images, the Boston Globe reported earlier that authorities were focusing on video “from surveillance cameras on the same side of Boylston Street as the explosions.” If it turns out that the people in the FBI’s photos are the guys who did it, they shouldn’t be surprised that surveillance cameras turned out to be their undoing. Neither should you. We should see this potential break in the case as a sign of the virtues of video surveillance. More than that, we should think about how cameras could help prevent crimes, not just solve them once they’ve already happened. Cities under the threat of terrorist attack should install networks of cameras to monitor everything that happens at vulnerable urban installations. Yes, you don’t like to be watched. Neither do I. But of all the measures we might consider to improve security in an age of terrorism, installing surveillance cameras everywhere may be the best choice. They’re cheap, less intrusive than many physical security systems, and—as will hopefully be the case with the Boston bombing—they can be extremely effective at solving crimes. Surveillance cameras aren’t just the bane of hardcore civil libertarians. The idea of submitting to constant monitoring feels wrong, nearly un-American, to most of us. Cameras in the sky are the ultimate manifestation of Big Brother—a way for the government to watch you all the time, everywhere. In addition to normalizing surveillance—turning every public place into a venue for criminal investigation—there’s also the potential for abuse. Once a city is routinely surveilled, the government can turn every indiscretion into a criminal matter. You used to be able to speed down the street when you were in a hurry. Now, in many places around the world, a speed camera will record your behavior and send you a ticket in the mail. Combine cameras with facialrecognition technology and you’ve got a recipe for governmental intrusion. Did you just roll a joint or jaywalk or spray-paint a bus stop? Do you owe taxes or child support? Well, prepare to be investigated—if not hassled, fined, or arrested. These aren’t trivial fears. The costs of ubiquitous surveillance are real. But these are not intractable problems. Such abuses and slippery-slope fears could be contained by regulations that circumscribe how the government can use footage obtained from security cameras. In general, we need to be thinking about ways to make cameras work for us, not reasons to abolish them. When you weigh cameras against other security measures, they emerge as the least costly and most effective choice. In the aftermath of 9/11, we’ve turned most public spaces into fortresses—now, it’s impossible for you to get into tall buildings, airports, many museums, concerts, and even public celebrations without being subjected to pat-downs and metal detectors. When combined with competent law enforcement, surveillance cameras are more effective, less intrusive, less MSDI Terror DA 19 psychologically draining, and much more pleasant than these alternatives. As several studies have found, a network of well-monitored cameras can help investigators solve crimes quickly, and there’s even evidence that cameras can help deter and predict criminal acts, too. Surveillance cameras necessary to counter terrorism Charlie Savage, August 12, 2007, “US doles out millions for street cameras, local efforts raise privacy concerns,” Boston Globe, http://www.boston.com/news/nation/articles/2007/08/12/us_doles_out_millions_for_street_cameras/ ?page=full DOA: 5-1-15 The Department of Homeland Security is funneling millions of dollars to local governments nationwide for purchasing high-tech video camera networks, accelerating the rise of a "surveillance society" in which the sense of freedom that stems from being anonymous in public will be lost, privacy rights advocates warn. Since 2003, the department has handed out some $23 billion in federal grants to local governments for equipment and training to help combat terrorism. Most of the money paid for emergency drills and upgrades to basic items, from radios to fences. But the department also has doled out millions on surveillance cameras, transforming city streets and parks into places under constant observation. The department will not say how much of its taxpayer-funded grants have gone to cameras. But a Globe search of local newspapers and congressional press releases shows that a large number of new surveillance systems, costing at least tens and probably hundreds of millions of dollars, are being simultaneously installed around the country as part of homeland security grants. In the last month, cities that have moved forward on plans for surveillance networks financed by the Homeland Security Department include St. Paul, which got a $1.2 million grant for 60 cameras for downtown; Madison, Wis., which is buying a 32-camera network with a $388,000 grant; and Pittsburgh, which is adding 83 cameras to its downtown with a $2.58 million grant. Small towns are also getting their share of the federal money for surveillance to thwart crime and terrorism. Recent examples include Liberty, Kan. (population 95), which accepted a federal grant to install a $5,000 G2 Sentinel camera in its park, and Scottsbluff, Neb. (population 14,000), where police used a $180,000 Homeland Security Department grant to purchase four closed-circuit digital cameras and two monitors, a system originally designed for Times Square in New York City. "We certainly wouldn't have been able to purchase this system without those funds," police Captain Brian Wasson told the Scottsbluff Star-Herald. Other large cities and small towns have also joined in since 2003. Federal money is helping New York, Baltimore, and Chicago build massive surveillance systems that may also link thousands of privately owned security cameras. Boston has installed about 500 cameras in the MBTA system, funded in part with homeland security funds. Marc Rotenberg, director of the Electronic Privacy Information Center, said Homeland Security Department is the primary driver in spreading surveillance cameras, making their adoption more attractive by offering federal money to city and state leaders. Homeland Security Department spokesman Russ Knocke said that it is difficult to say how much money has been spent on surveillance cameras because many grants awarded to states or cities contained money for cameras and other equipment. Knocke defended the funding of video networks as a valuable tool for protecting the nation. "We will encourage their use in the future," he added. But privacy rights advocates say that the technology is putting at risk something that is hard to define but is core to personal autonomy. The MSDI Terror DA 20 proliferation of cameras could mean that Americans will feel less free because legal public behavior -attending a political rally, entering a doctor's office, or even joking with friends in a park -- will leave a permanent record, retrievable by authorities at any time. Businesses and government buildings have used closed-circuit cameras for decades, so it is nothing new to be videotaped at an ATM machine. But technology specialists say the growing surveillance networks are potentially more powerful than anything the public has experienced. Until recently, most surveillance cameras produced only grainy analog feeds and had to be stored on bulky videotape cassettes. But the new, cutting-edge cameras produce clearer, more detailed images. Moreover, because these videos are digital, they can be easily transmitted, copied, and stored indefinitely on ever-cheaper hard-drive space. In addition, police officers cannot be everywhere at once, and in the past someone had to watch a monitor, limiting how large or powerful a surveillance network could be. But technicians are developing ways to use computers to process real-time and stored digital video, including license-plate readers, face-recognition scanners, and software that detects "anomalous behavior." Although still primitive, these technologies are improving, some with help from research grants by the Homeland Security Department's Science and Technology Directorate. "Being able to collect this much data on people is going to be very powerful, and it opens people up for abuses of power," said Jennifer King, a professor at the University of California at Berkeley who studies privacy and technology. "The problem with explaining this scenario is that today it's a little futuristic. [A major loss of privacy] is a low risk today, but five years from now it will present a higher risk." As this technological capacity evolves, it will be far easier for individuals to attract police suspicion simply for acting differently and far easier for police to track that person's movement closely, including retracing their steps backwards in time. It will also create a greater risk that the officials who control the cameras could use them for personal or political gain, specialists said. The expanded use of surveillance in the name of fighting terrorism has proved controversial in other arenas, as with the recent debate over President Bush's programs for eavesdropping on Americans' international phone calls and e-mails without a warrant. But public support for installing more surveillance cameras in public places, both as a means of fighting terrorism and other crime, appears to be strong. Last month, an ABC News/Washington Post poll foun that 71 percent of Americans favored increased use of surveillance cameras, while 25 percent opposed it. Video surveillance necessary to defeat terrorism Steven Simon, 2015 , adjunct senior fellow in Middle Eastern Studies at the Council on Foreign Relations and the co-author of “The Age of Sacred Terror” and “The Next Attack.”, Times Square, Bombs, and Big Crowds, New York Times, http://roomfordebate.blogs.nytimes.com/2010/05/03/timessquare-bombs-and-big-crowds/?_r=0#steven DOA: 5-5-15 Video surveillance would not have stopped the Times Square attack. Does this mean that it would be useless? Not necessarily. Swift and accurate analysis of video surveillance information might prevent the next attack, even if it is powerless to stop the last one. Imagery can be used to assist in the identification and location of individuals at the scene of the crime. It can also be used to track the progress of the bomb-laden vehicle from the its point of origin, or the point at which the truck was weaponized, to the place the terrorists have targeted. In combination with physical evidence acquired from the vehicle — fingerprints, hair, cloth fibers, soil, trash, forgotten personal items or a host of other bits of evidence — MSDI Terror DA 21 video surveillance can lead to the arrest of the bombers and to the unraveling of cells or networks and, if the attackers are foreign, the ratlines they exploited to enter the country. At this point, the U.S. does not have the kind of pervasive surveillance systems in place that, say, the British have deployed. In the U.K., there is about one surveillance camera for every thousand residents. It took British authorities years to reach this level of intensive surveillance. The U.S., as anyone who follows the debate over privacy loss in this country knows, is studded with cameras, but most of these are in stores to track consumption habits to facilitate marketing or deter shoplifters. They’re not where they’re needed, which is on the street. The two smallest jurisdictions in the U.K., very rural areas indeed, together deploy more surveillance cameras than the San Francisco police department. The U.S., of course, does not have to match Britain camera for camera. Surveillance can be enhanced in areas that are assessed to be likely targets, a category that can be inferred, at least in a general sense, from targeting patterns and what the terrorists actually have said about the desirability of attacking this or that; and they do discuss this in their literature and on their Web sites. More problematic, is the need to organize our law enforcement capabilities in ways that enable this visual information to be exploited effectively, while protecting the rapidly fading privacy available to ordinary citizens. Therein lies the real challenge. MSDI Terror DA 22 Warrantless Surveillance Warrant requirement for national security decisions undermines executive power needed for effective surveillance Yohn Yoo, Summer 2014, Emanuel S. Heller Professor of Law, University of California, Berkeley Law School; Visiting Scholar, American Enterprise Institute, Harvard Journal of Law & Public Policy, THE LEGALITY OF THE NATIONAL SECURITY AGENCY'S BULK DATA SURVEILLANCE PROGRAMS, http://moritzlaw.osu.edu/students/groups/is/files/2013/11/Yoo1.pdf, DOA: 1-1-15, p. 904 This approach applies to national security activity that occurs within the United States as well as outside it. In 1972, the Supreme Court refused to subject surveillance for national security purposes to the Fourth Amendment warrant requirement. But it has extended this protection to purely domestic terrorist groups, out of concern that the government might use its powers to suppress political liberties. Lower courts, however, have found that when the government conducts a search of a foreign power or its agents, it need not meet the requirements that apply to criminal law enforcement. In a leading 1980 case, the Fourth Circuit held that "the needs of the executive are so compelling in the area of foreign intelligence, unlike the area of domestic security, that a uniform warrant requirement would . . . unduly frustrate the President in carrying out his foreign affairs responsibilities." A warrant requirement for national security searches would reduce the flexibility of the executive branch, which possesses "unparalleled expertise to make the decision whether to conduct foreign intelligence surveillance" and is "constitutionally designated as the pre-eminent authority in foreign affairs." A warrant requirement would place national security decisions in the hands of the judiciary, which "is largely inexperienced in making the delicate and complex decisions that lie behind foreign intelligence surveillance." Under this framework, Presidents conducted national security surveillance using their executive authority for decades. President Nixon's abuses, however, led Congress to enact the Foreign Intelligence Surveillance Act (FISA) in 1978. FISA replaced presidentially-ordered monitoring of national security threats with a system similar to that used by law enforcement to conduct electronic surveillance of criminal suspects, but with important differences to protect classified information. FISA requires the government to show "probable cause" that a target is "an agent of a foreign power," which includes terrorist groups. A special court of federal district judges, the Foreign Intelligence Surveillance Court (FISC), examines classified information in a closed, ex parte hearing before issuing the warrant. Warrantless surveillance necessary to combat Al Qaeda Yohn Yoo, Summer 2014, Emanuel S. Heller Professor of Law, University of California, Berkeley Law School; Visiting Scholar, American Enterprise Institute, Harvard Journal of Law & Public Policy, THE LEGALITY OF THE NATIONAL SECURITY AGENCY'S BULK DATA SURVEILLANCE PROGRAMS, http://moritzlaw.osu.edu/students/groups/is/files/2013/11/Yoo1.pdf, DOA: 1-1-15, p. 903-4 It is al Qaeda's nature as a decentralized network that stresses the normal division between military and intelligence surveillance and the warrant-based approach of the criminal justice system. The Constitution vests the President with the executive power and designates him Commander-in-Chief. The MSDI Terror DA 23 Framers understood these powers to invest the executive with the duty to protect the nation from foreign attack and the right to control the conduct of military hostilities. To exercise those powers effectively, the President must have the ability to engage in electronic surveillance that gathers intelligence on the enemy. Regular military intelligence need not follow standards of probable cause for a warrant or reasonableness for a search, just as the use of force against the enemy does not have to comply with the Fourth Amendment. During war, military signals intelligence might throw out a broad net to capture all communications within a certain area or by an enemy nation. Unlike the criminal justice system, which seeks to detain criminals, protection of national security need not rest on particularized suspicion of a specific individual. MSDI Terror DA 24 Business records MSDI Terror DA 25 Signal Intelligence Necessary to Prevent Terrorism Signal intelligence necessary because human intelligence on the decline Stuart Taylor, April 29, 2014, The Big Snoop: Life, Liberty, and the Pursuit of Terrorists, http://www.brookings.edu/research/essays/2014/the-big-snoop-print (is an author, a freelance journalist, and a Brookings nonresident senior fellow. Taylor has covered the Supreme Court for a variety of national publications, including The New York Times, Newsweek, and National Journal, where he is also a contributing editor. His published books include Mismatch: How Affirmative Action Hurts Students It's Intended to Help, and Why Universities Won't Admit It. In addition to his work as a journalist and scholar, he is a graduate of Harvard Law School and practiced law in a D.C. firm.) Over the five years that she has been chairman of the Intelligence Committee, Feinstein has seen more inside information on NSA activities than most of her fellow lawmakers. She is convinced that, since the FISA reforms of the seventies put safeguards and multiple layers of oversight in place, there has been no evidence of the NSA’s seriously violating those strictures. She is also convinced that signals intelligence is, if anything, more indispensable than ever at a time when human intelligence—that is, information from undercover U.S. operatives operating abroad or inside hostile organizations like al Qaeda—is so hard to come by. That leads her to worry that curbs on the phone records program might increase the exposure of Americans to danger from terrorists and other enemies, perhaps including mass-casualty cyber, biological, or even nuclear attacks. Signals intelligence necessary to combat terrorism and weapons proliferation Report and Recommendations of the President’s Review Group on Intelligence, December 2013, Liberty and Security in a Changing World, December 12, http://www.whitehouse.gov/sites/default/files/docs/2013-12-12_rg_final_report.pdf Protecting The Nation Against Threats to Our National Security. The ability of the United States to combat threats from state rivals, terrorists, and weapons proliferators depends on the acquisition of foreign intelligence information from a broad range of sources and through a variety of methods. In an era increasingly dominated by technological advances in communications technologies, the United States must continue to collect signals intelligence globally in order to assure the safety of our citizens at home and abroad and to help protect the safety of our friends, our allies, and the many nations with whom we have cooperative relationships. Section 702 and Section 215 programs have prevented terror attacks Sean M. Joyce, Deputy Director, Federal Bureau of Investigation (FBI), July 31, 2013, Hearing of the Senate Judiciary Committee Subject: "Strengthening Privacy Rights and National Security: Oversight of FISA (Foreign Intelligence Surveillance Act) Surveillance Programs" https://www.hsdl.org/?view&did=741931 (First joined the Department of Justice in 1979. He served for MSDI Terror DA 26 13 years in the Criminal Division, later becoming the deputy chief of the division's public integrity section, went in private practice, sworn in as deputy attorney general on January 3rd, 2011) SEN. FEINSTEIN: Good. Now, the NSA has produced and declassified a chart, which I'd like to make available to all members. It has the 54 total events. It includes a Section 702 authority and Section 215 authority, which essentially work together. And it shows the events disrupted based on a combination of these two programs, 13 in the homeland, 25 in Europe, five in Africa and 11 in Asia. Now, I remember I was on the Intelligence Committee before 9/11, and I remember how little information we have and the great criticism of the government because of those stovepipes, the inability to share intelligence, the inability to collect intelligence. We had no program that could've possibly caught two people in San Diego before the event took place. I support this program. I think, based on what I know, they will come after us. And I think we need to prevent an attack wherever we can from happening. That doesn't mean that we can't make some changes. Signals intelligence from business records needed to stop WMD attacks Stuart Taylor, April 29, 2014, The Big Snoop: Life, Liberty, and the Pursuit of Terrorists, http://www.brookings.edu/research/essays/2014/the-big-snoop-print (is an author, a freelance journalist, and a Brookings nonresident senior fellow. Taylor has covered the Supreme Court for a variety of national publications, including The New York Times, Newsweek, and National Journal, where he is also a contributing editor. His published books include Mismatch: How Affirmative Action Hurts Students It's Intended to Help, and Why Universities Won't Admit It. In addition to his work as a journalist and scholar, he is a graduate of Harvard Law School and practiced law in a D.C. firm.) DOA: 225-15 Over the five years that she has been chairman of the Intelligence Committee, Feinstein has seen more inside information on NSA activities than most of her fellow lawmakers. She is convinced that, since the FISA reforms of the seventies put safeguards and multiple layers of oversight in place, there has been no evidence of the NSA’s seriously violating those strictures. She is also convinced that signals intelligence is, if anything, more indispensable than ever at a time when human intelligence—that is, information from undercover U.S. operatives operating abroad or inside hostile organizations like al Qaeda—is so hard to come by. That leads her to worry that curbs on the phone records program might increase the exposure of Americans to danger from terrorists and other enemies, perhaps including mass-casualty cyber, biological, or even nuclear attacks. Business record 215 program has been used to stop a terror attack Sean M. Joyce, Deputy Director, Federal Bureau of Investigation (FBI), July 31, 2013, Hearing of the Senate Judiciary Committee Subject: "Strengthening Privacy Rights and National Security: Oversight of FISA (Foreign Intelligence Surveillance Act) Surveillance Programs" https://www.hsdl.org/?view&did=741931 (First joined the Department of Justice in 1979. He served for 13 years in the Criminal Division, later becoming the deputy chief of the division's public integrity section, went in private practice, sworn in as deputy attorney general on January 3rd, 2011) MSDI Terror DA 27 As you mentioned another instance when we used the business record 215 program, as Chairman Leahy mentioned, Basaaly Moalin. So initially the FBI opened a case in 2003 based on a tip. We investigated that tip. We found no nexus to terrorism and closed the case. In 2007 the NSA advised us, through the business record 215 program, that a number in San Diego was in contact with an al-Shabab and east -al-Qaida east -- al-Qaida East Africa member in Somalia. We served legal process to identify that unidentified phone number. We identified Basaaly Moalin. Through further investigation, we identified additional co-conspirators, and Moalin and three other individuals have been convicted -- and some pled guilty -- to material support to terrorism. Business records closes holes in intelligence in order to defeat terrorism Sean M. Joyce, Deputy Director, Federal Bureau of Investigation (FBI), July 31, 2013, Hearing of the Senate Judiciary Committee Subject: "Strengthening Privacy Rights and National Security: Oversight of FISA (Foreign Intelligence Surveillance Act) Surveillance Programs" https://www.hsdl.org/?view&did=741931 (First joined the Department of Justice in 1979. He served for 13 years in the Criminal Division, later becoming the deputy chief of the division's public integrity section, went in private practice, sworn in as deputy attorney general on January 3rd, 2011) SEN. GRASSLEY: OK. Mr. Joyce, one part of the balance that we have to strike, protecting privacy of Americans -- the other part, national security. Thankfully, until the Boston bombing, we had prevented large-scale terrorist attacks on American soil. I have a few questions about how valuable the role of Section 215 and 702 programs have played in predicting (sic) our national security. Two questions, and then I'll have to stop and go to our colleagues. Can you describe any specific situations where Section 215 and Section 702 authorities helped disrupt a terrorist attack or identify individuals planning to attack, the number of times? And then secondly, if you didn't have the authority to collect phone records in bulk the way that they are now under Section 215, how would you have affected those investigations? MR. JOYCE: So to your first question, Senator, as far as a specific example of when we have utilized both of these programs is the one I had first mentioned, the first al-Qaida-directed plot since 9/11, in September of 2009, when Najibullah Zazi and others conspired plot to bomb the New York subway system. We initially found out about Zazi through an NSA 702 coverage, and he was actually talking to an al-Qaida courier who was -- he was asking for his help to perfect an explosives recipe. So but for that, we would not have known about the plot. We followed that up with legal process and then had FISA coverage on him and others as we fully investigated the plot. Business records 215 was also involved, as I had previously mentioned, where we also through legal process were submitting legal process for telephone numbers and other email addresses, other selectors. But NSA also provided another number we are unaware of of a co-conspirator, Adis Medunjanin. So that is an instance where a very serious plot to attack America on U.S. soil that we used both these programs. But I say, as Chairman Leahy mentioned, there is a difference in the utility of the programs. But what I say to you is that each and every program and tool is valuable. There were gaps prior to 9/11. And what we have collectively tried to do, the members of the committee, other members of the other oversight committees, the executive branch and the intelligence community, is we have tried to close those gaps and close those seams. And the business record 215 is one of those programs that we have closed those seams. So I MSDI Terror DA 28 respectfully say to the chairman that the utility of that specific program initially is not as valuable. I say you are right. But what I say is it plays a crucial role in closing the gaps and seams that we fought hard to gain after the 9/11 attacks. Section 702 and Section 215 programs have prevented terror attacks Sean M. Joyce, Deputy Director, Federal Bureau of Investigation (FBI), July 31, 2013, Hearing of the Senate Judiciary Committee Subject: "Strengthening Privacy Rights and National Security: Oversight of FISA (Foreign Intelligence Surveillance Act) Surveillance Programs" https://www.hsdl.org/?view&did=741931 (First joined the Department of Justice in 1979. He served for 13 years in the Criminal Division, later becoming the deputy chief of the division's public integrity section, went in private practice, sworn in as deputy attorney general on January 3rd, 2011) SEN. FEINSTEIN: Good. Now, the NSA has produced and declassified a chart, which I'd like to make available to all members. It has the 54 total events. It includes a Section 702 authority and Section 215 authority, which essentially work together. And it shows the events disrupted based on a combination of these two programs, 13 in the homeland, 25 in Europe, five in Africa and 11 in Asia. Now, I remember I was on the Intelligence Committee before 9/11, and I remember how little information we have and the great criticism of the government because of those stovepipes, the inability to share intelligence, the inability to collect intelligence. We had no program that could've possibly caught two people in San Diego before the event took place. I support this program. I think, based on what I know, they will come after us. And I think we need to prevent an attack wherever we can from happening. That doesn't mean that we can't make some changes. Business records program has stopped many attacks Rep. Mike Rogers, Miami Times (Florida), June 18, 2013, (Rep. Mike Rogers, R-Mich., is chairman of the House Permanent Select Committee on Intelligence, http://www.usatoday.com/story/opinion/2013/06/18/nsa-mike-rogers-house-intelligence-committeeeditorials-debates/2436541/ , DOA: 2-24-15 The gross distortion of two vital National Security Agency [NSA] programs is dangerous and unfortunate. Neither program authorizes NSA to read e-mails or listen to phone calls of American citizens. Both are constitutional with numerous checks and balances by all three branches of government. They have been authorized and overseen by Congress and presidents of both parties. And they have produced vital intelligence, preventing dozens of terrorist attacks around the world, including plots against New York City subways and the New York Stock Exchange. The first program allows NSA to preserve a limited category of business records. It preserves only phone numbers and the date, time and duration of calls. It doesn't include any names or the content of calls. These records can only be accessed when NSA is investigating a foreign terrorist. If a foreign terrorist is found linked to an American, the tip is passed to the FBI and requires a court order before additional action can be taken. This is a critical tool for connecting the dots between foreign terrorists plotting attacks in the U.S. The second program allows the NSA to target foreigners overseas to collect certain foreign intelligence with court approval. It MSDI Terror DA 29 doesn't create a "back door" to any company's server, and doesn't authorize monitoring of U.S. citizens. No U.S. person anywhere in the world can be intentionally monitored without a specific order. Any comparison to government abuses in decades past is highly misleading. Today's programs are authorized in law, with a thorough system of oversight and checks and balances in place, and a court review not present in the past. Now each of the agencies has an inspector general and general counsels who ensure that these authorities are exercised in accordance with the law. The House and Senate each have Intelligence Committees charged with overseeing these authorities. Additionally, electronic surveillance for foreign intelligence purposes occurs with approval of the Foreign Intelligence Surveillance Court. None of these structures and protections was in place in the 1950s, '60s or '70s. These narrowly targeted programs are legal, do not invade Americans' privacy, and are essential to detecting and disrupting future terrorist attacks. Section 215 necessary to defeat terrorism James Carafano, May 21, 2015, Section 215 of the PATRIOT Act and Metadata Collection: Responsible Options for the Way Forward, Dr. Carafono is Vice President for the Kathryn and Shelby Cullom Davis Institute for National Security and Foreign Policy, and the E. W. Richardson Fellow, Charles Stimson is Manager, National Security Law Program and Senior Legal Fellow, Dr. Steven Bucci is Director, Douglas and Sarah Allison Center for Foreign and National Security Policy, John Malcolm is Director, Edwin Meese III Center for Legal and Judicial Studies, and the Ed Gilbertson and Sherry Lindberg Gilbertson Senior Legal Fellow, http://www.heritage.org/research/reports/2015/05/section-215-of-the-patriot-act-and-metadatacollection-responsible-options-for-the-way-forward DOA: 5-24-15 The United States is in a state of armed conflict against al-Qaeda, the Afghan Taliban, ISIS, and associated forces. It must therefore rely on all lawful tools of national security, including but not limited to robust signals intelligence. As the 9/11 Commission Report made crystal clear, one of the key failures of the United States before the 9/11 attacks was the government’s inability to “connect the dots” between known or suspected terrorists. The artificial “wall” between domestic law enforcement and U.S. intelligence agencies, enacted during the 1990s, proved to be America’s Achilles’ heel. Some analysts believe that had America had a Section 215–type program in place before 9/11, U.S. intelligence, along with domestic law enforcement, would have been able to connect the dots and prevent at least some of the hijackers from launching their devastating attack. In fact, according to a report by the House Permanent Select Committee on Intelligence, using the authorities under Section 215 and 702 of the PATRIOT Act has contributed to thwarting 54 total international terrorist plots in 20 countries. Thirteen of those plots were directed inside the United States. MSDI Terror DA 30 Bulk Data Mass records collection is needed to catch terrorists because they are not all in one place Joshua Kapstein, May 16, 2014, “The NSA Can ‘Collect it All,’”, but what would it do with the data?, http://www.thedailybeast.com/articles/2014/05/16/the-nsa-can-collect-it-all-but-what-will-it-do-withour-data-next.html DOA: 2-23-15 The NSA and its allies are staunch defenders of these “haystacks,” even though multiple studies concluded the database containing millions of Americans’ phone records played little or no role in preventing terrorist attacks. They’ve countered that it’s foolish to assume all terrorists hang out in one isolated section of the Internet, therefore mass-collection becomes a necessary obsession to find that ever-elusive needle. Database needs to be broad to find terrorist cells Yohn Yoo, Summer 2014, Emanuel S. Heller Professor of Law, University of California, Berkeley Law School; Visiting Scholar, American Enterprise Institute, Harvard Journal of Law & Public Policy, THE LEGALITY OF THE NATIONAL SECURITY AGENCY'S BULK DATA SURVEILLANCE PROGRAMS, http://moritzlaw.osu.edu/students/groups/is/files/2013/11/Yoo1.pdf, DOA: 1-1-15, p. 911-12 A critic, however, might argue that billions of innocent calling records are not "relevant" to a terrorism investigation. Even if terrorist communications take place over the phone, that cannot justify the collection of all phone call records in the United States, the vast majority of which have nothing to do with the grounds for the search. The FISC rejected this argument because, to be useful, a database has to be broad enough to find terrorist calls. "Because known and unknown international terrorist operatives are using telephone communications, and because it is necessary to obtain the bulk collection of a telephone company's metadata to determine those connections between known and unknown international terrorist operatives as part of authorized investigations," the Court observed, "the production of the information sought meets the standard for relevance under Section 215." Aggregating calling records into a database, the court found, was necessary to find the terrorist communications and the links between terrorists. It may not even be possible to detect the links unless such a database is created. If a database is not comprehensive, in other words, then the government will only be able to glimpse incomplete patterns of terrorist activity, if it can glimpse any at all. Broad-based records approaches are often used in national security cases Yohn Yoo, Summer 2014, Emanuel S. Heller Professor of Law, University of California, Berkeley Law School; Visiting Scholar, American Enterprise Institute, Harvard Journal of Law & Public Policy, THE LEGALITY OF THE NATIONAL SECURITY AGENCY'S BULK DATA SURVEILLANCE PROGRAMS, http://moritzlaw.osu.edu/students/groups/is/files/2013/11/Yoo1.pdf, DOA: 1-1-15, P 911-12 Relevance is a slippery concept, but it cannot require that every piece of information obtained by subpoena must contain information related to guilt. Even when grand juries subpoena the business MSDI Terror DA 31 records or communications of a criminal suspect, it is likely that the large majority of the items will not have any relationship to the crime. Nonetheless, a grand jury may subpoena all of a suspect's financial records to find those that pertain to a criminal conspiracy. A different way to view the NSA's telephone calling record program is that the "relevant" tangible "thing" is the database itself, rather than any individual calling record. Of course, the NSA program differs from a subpoena to a financial institution for the records of a known criminal suspect. The amount of data collected by the NSA program is many orders of magnitude greater, and hence the percentage of directly involved communications much smaller. Also, unlike a regular subpoena, it is important to have as large a searchable database as possible because the breadth will bring into the sharpest contrast the possible patterns of terrorist activity. On the other hand, the magnitude of harm that the government seeks to prevent exceeds by several orders that of regular crime. The magnitude of the harm should be taken into account in judging relevance as well as the unprecedented difficulties of locating al Qaeda operatives disguised within the United States. Data mining critical to defeat terrorism Dr. James Carafano, June 6, 2005, The Future of Antiterrorism Technologies, http://www.heritage.org/research/lecture/the-future-of-anti-terrorism-technologies DOA: 5-1-15 Data Mining and Link Analysis Technologies. We live in a world that is becoming increasingly awash in commercial and government information. The trail of the terrorist, however, is often indistinguishable from a mass of bills, license applications, visa forms, census records, and telephone lists. Traditional law enforcement investigation techniques often begin with the identification of a suspected individual, followed by the laborious process of seeking out information related to that individual. As more and more information becomes available, this task becomes more and more problematic. Technology, however, now has the potential to turn this challenge into an advantage. Rather than trying to narrow the scope of information that has to be looked at, data mining and link analysis technologies work best by exploiting larger and larger amounts of information. Data mining is a "technology for analyzing historical and current online data to support informed decision making."[5] It involves identifying patterns and anomalies from the observation of vast datasets. The primary goals of data mining are prediction and description. Prediction involves using some variables or fields in the database to predict unknown or future values of other variables of interest, and description focuses on finding human-interpretable patterns describing the data. Description concerns increasing knowledge about a variable or dataset by finding related information.[ This second characteristic of data mining- description-is often referred to as link analysis. Whereas data mining attempts to identify anomalies in vast amounts of information, link analysis technologies sift through databases to find commonalties. Link analysis is a slightly different twist on data mining. In preventing a terrorist attack, it is critical that one understands the relationships among individuals, organizations, and other entities which could be security threats. Link analysis is the process of analyzing the data surrounding the suspect relationships to determine how they are connected-what links them together. While the technology to conduct data mining is rapidly maturing, it is currently limited by its capacity to handle non-structured formats; i.e., those that are a mix of text, image, video, and sensor information. In addition, future algorithms will also need to incorporate the knowledge of human experts into their derivation of patterns. "Breakthrough" Technologies My final two candidate technologies definitely fit into the last category of an aggressive technology acquisition program. They offer two potential breakthroughs which could significantly reshape the nature of competition between terrorism and counterterrorism. Nanotechnology. As a counterterrorism tool, MSDI Terror DA 32 nanotechnologies are in their infancies. Nanotechnology involves developing or working with materials and complete systems at the atomic, molecular, or macromolecular levels where at least one dimension falls with the range of 1-100 nanometers.[7] Working at such a small scale offers unique capabilities, such as being able to control how nanodevices interact with other systems at the atomic or molecular level. Current research areas include materials, sensors, biomedical nanostructures, electronics, optics, and fabrication. Materials which have been modified at the nanoscale can have specific properties incorporated into them. For instance, materials can have coatings that make them water-repellant or stain-resistant. According to a study by Daniel Ratner and Mark A. Ratner: Nanoscale sensors are generally designed to form a weak chemical bond to the substance of whatever is to be sensed, and then to change their properties in response (that might be a color change or a change in conductivity, fluorescence, or weight).[8] Biomedical nanostructures, by design, interact with people at the molecular level, allowing for targeted drug delivery, adhesive materials for skin grafts or bandages, etc. Nanoscale electronics can help to shrink computer circuits even further and to make them more efficient. Nanoscale optics allow once again for materials that fluoresce to be tuned at the nanoscale to change specific properties under certain conditions. Fabrication at the nanoscale offers the potential of creating devices from the atom up, as opposed to having to shrink materials down to the needed size. According to a RAND report, there are numerous future applications for nanotechnology, though most face at least some technical hurdles. They include nanofabricated computational devices like nanoscale semiconductor chips, biomolecular devices, and molecular electronics. If one includes integrated microsystems and micro-electrical-mechanical systems (MEMS) in the discussion, and one probably should, there are additional uses for nanotechnology, including smart systems-on-a-chip and micro- and nanoscale instrumentation and measurement technologies. While there are counterterrorism applications for all of the research areas, sensors are the most promising. Nanodevices offer the opportunity for fast, cheap, and accurate sensors and detectors, and markers that can be used for a wide range of forensic activities. Metadata collection needed to cast a wide net Yohn Yoo, Summer 2014, Emanuel S. Heller Professor of Law, University of California, Berkeley Law School; Visiting Scholar, American Enterprise Institute, Harvard Journal of Law & Public Policy, THE LEGALITY OF THE NATIONAL SECURITY AGENCY'S BULK DATA SURVEILLANCE PROGRAMS, http://moritzlaw.osu.edu/students/groups/is/files/2013/11/Yoo1.pdf, DOA: 1-1-15, p. 907-8 A. Phone Call Metadata Collection Like business records, phone call metadata falls within Section 215's definition of tangible items. Collection of such metadata relates to an authorized investigation to protect against international terrorism. Several investigations into al Qaeda plots remain open, as shown by the repeated indictments against bomb plotters in the last five years. The examination of records also helps protect the nation against terrorist attacks. According to the NSA, only the information contained in the billing records is collected; the content of calls is not. There can be no First Amendment violation if the content of the calls remains untouched. A critic might argue that the terms of the search are too broad because ninety-nine percent of the calls are unconnected to terrorism. But an intelligence search, as Judge Richard Posner has described it, "is a search for the needle in a haystack." Rather than focus on foreign agents who are already known, counterterrorism agencies must search for clues among millions of potentially innocent connections, communications, and links. "The intelligence services," Posner MSDI Terror DA 33 writes, "must cast a wide net with a fine mesh to catch the clues that may enable the next attack to be prevented." For this reason, the FISC approved the NSA program in 2006 and has continued to renew it since. The wider the surveillance net, the more effective the surveillance Report and Recommendations of the President’s Review Group on Intelligence, December 2013, Liberty and Security in a Changing World, December 12, http://www.whitehouse.gov/sites/default/files/docs/2013-12-12_rg_final_report.pdf DOA: 1-1-14 When public officials acquire information, they seek to reduce risks, above all risks to national security. If the government is able to obtain access to a great deal of information, it should be in a better position to mitigate serious threats of violence. And if the goal is to reduce such threats, a wide net seems far better than a narrow one, even if the government ends up acquiring a great deal of information that it does not need or want. As technologies evolve, it is becoming increasingly feasible to cast that wide net. In the future, the feasibility of pervasive surveillance will increase dramatically. From the standpoint of risk reduction, that prospect has real advantages. MSDI Terror DA 34 PRISM/ Section 702 Authority for PRISM is in section 702 James Carafano, 8-6, 13 Heritage Foundation, The Examiner (Washington, DC)m August 6, 2013, PRISM is essential to U.S. security in war against terrorism (Vice President for Defense and Foreign Policy Studies at The Heritage Foundation, PRISM is Essential to US Security in the War on Terrorism, http://www.heritage.org/research/commentary/2013/8/prism-is-essential-to-us-security-in-waragainst-terrorism DOA: 2-1-13 "Our intelligence professionals must be able to find out who the terrorists are talking to, what they are saying, and what they're planning," said the president. "The lives of countless Americans depend on our ability to monitor these communications." He added that he would cancel his planned trip to Africa unless assured Congress would support the counterterrorism surveillance program. The president was not , Barack Obama. It was George W. Bush, in 2008, pressing Congress to extend and update reforms to the Foreign Intelligence Surveillance Act (FISA). He was speaking directly to the American public, in an address broadcast live from the Oval Office. How times have changed. Back then, the President of the United States willingly led the fight for the programs he thought necessary to keep the nation safe. Now, our president sends underlings to make the case. In distancing himself from the debate over PRISM (the foreign intelligence surveillance program made famous by the world- travelling leaker , Edward Snowden), , President Obama followed the precedent he established in May at the National Defense University. There, he spoke disdainfully of drone strikes, the authorization to use military force against terrorists, and the detention facilities at Guantanamo Bay. All three are essential components of his counterterrorism strategy. In distancing himself from his own strategy, , Obama hoped to leave the impression that he is somehow above it all. He has dealt with the Snowden case the same way. When asked while traveling in Africa if he would take a role in going after the leaker, the president replied "I shouldn't have to." The White House's above-it-all attitude sends seriously mixed messages to the American people, who are trying to figure if the government's surveillance programs are legal and appropriate. Congress has not been much better. The authority for PRISM is in FISA Section 702. Congress debated these authorities in 2007 and again when the program was reauthorized in 2008. Senate Majority Leader Harry Reid, D-Nev., surely remembers the controversy. He wrote President Bush: "There is no crisis that should lead you to cancel your trip to Africa. But whether or not you cancel your trip, Democrats stand ready to negotiate a final bill, and we remain willing to extend existing law for as short a time or as long a time as is needed to complete work on such a bill." Evidently, Reid must have felt the authorities granted under Section 702 received a full and sufficient hearing. Most current members of Congress were seated under the dome during the 2008 debates. They had every opportunity not just to read the law, but to be briefed on the program by intelligence officials before voting on the bill. For them to act shocked at the scope of the program today rings about as hollow as , Obama's expressed disdain for the operations he oversees. The reality is that Congress and the administration share responsibility for these programs. If they want to change or modify them, who's stopping them? If changes are made, however, they should to be made for the right reason. Leaders must never compromise our security for political expediency. At least 60 Islamist-inspired terrorist plots have been aimed at the U.S. since the 9/11 attacks. The overwhelming majority have been thwarted MSDI Terror DA 35 thanks to timely, operational intelligence about the threats. Congress should not go back to a pre-/11 set of rules just to appeal to populist sentiment. Congress and the White House have an obligation to protect our liberties and to safeguard our security -- in equal measure. Meeting that mission is more important than winning popularity polls. PRISM necessary to get to emails to counter threats Michael Hayden, former director of the NSA and the CIA, May 5, 2014, “Michael Hayden’s Unwitting Case Against Secret Surveillance,” ihttp://www.theatlantic.com/politics/archive/2014/05/michaelhaydens-unwitting-case-against-secret-surveillance/361689/ DOA: 2-19-15 Actually, you need to go back and look at the whole movie. You need to see what went on before. Because if you know what went on before you may have a different interpretation of what you think the butler is guilty of. There are three or four things that happen that NSA and all these organizations have tried to solve. Enormous volume. How do you conduct signals intelligence to keep you safe in a tsunami of global communications? Well, the answer to that is bulk collection of metadata. Another issue that's out there prominently is NSA is mucking about in those global telecommunication grids that have your emails. No one complained when NSA was doing Soviet strategic microwave rocket signals. Well, the equivalent of those Soviet microwave signals are proliferator, terrorist, narco-trafficker, moneylaunderer emails, coexisting with yours and mine, out there in Gmail. And if you want NSA to continue to do what it was doing, or CSEC to continue to do what it's doing, what it had been doing to keep you safe, it's got to be in the stream where your data is. There's a couple other things too. After 9/11, the enemy was inside my country. That's the 215 program, metadata. Who might be affiliated with terrorists inside the United States? And finally, when the enemy wasn't in my country his communications were. It's an accident of history, but it's a fact, most emails reside on servers in the United States. They should not deserve constitutional protection if the email's from a bad man in Pakistan communicating to a bad man in Yemen. And the Prism program is what allowed us to get those emails to keep everyone safe. There's a lot more to talk about but you're going to start clapping in about nine seconds. So I'm going to go back to the podium. PRISM has contributed to actionable intelligence in the fight against terrorism Stuart Taylor, April 29, 2014, The Big Snoop: Life, Liberty, and the Pursuit of Terrorists, http://www.brookings.edu/research/essays/2014/the-big-snoop-print (is an author, a freelance journalist, and a Brookings nonresident senior fellow. Taylor has covered the Supreme Court for a variety of national publications, including The New York Times, Newsweek, and National Journal, where he is also a contributing editor. His published books include Mismatch: How Affirmative Action Hurts Students It's Intended to Help, and Why Universities Won't Admit It. In addition to his work as a journalist and scholar, he is a graduate of Harvard Law School and practiced law in a D.C. firm.) The PRISM program poses an even trickier version of the cost/benefit question: it is easier to justify its efficacy, but because it goes after the contents of messages, not just their origin and destination, it is more intrusive on the liberties of the people whose communications it scoops up. Moreover, while PRISM is more restrictive in its formal mandate (i.e., it is targeted only at foreign bad actors), in practice MSDI Terror DA 36 it does pry “incidentally” into the Internet traffic of many law-abiding U.S. citizens. Yet there’s no denying that PRISM’s mining of emails and other Internet messages has produced a mother lode of useful information. An internal NSA document leaked by Snowden described the program as “the most prolific contributor to the President’s Daily Brief” and the NSA’s “leading source of raw material, accounting for nearly one in seven [of all the intelligence community’s secret] reports.” More to the point, PRISM has often contributed to the collection of actionable intelligence used in the fight against terrorism. Even Wyden, the NSA’s strongest congressional critic, acknowledges as much. He and his ally on the surveillance issue, Senator Mark Udall (D-Colo.), said in a joint statement last summer that “multiple terrorist plots have been disrupted at least in part because of information obtained under Section 702.” Section 702 programs necessary to defeat terrorism Sean M. Joyce, Deputy Director, Federal Bureau of Investigation (FBI), July 31, 2013, Hearing of the Senate Judiciary Committee Subject: "Strengthening Privacy Rights and National Security: Oversight of FISA (Foreign Intelligence Surveillance Act) Surveillance Programs" https://www.hsdl.org/?view&did=741931 (First joined the Department of Justice in 1979. He served for 13 years in the Criminal Division, later becoming the deputy chief of the division's public integrity section, went in private practice, sworn in as deputy attorney general on January 3rd, 2011) SEN. GRASSLEY: OK. Mr. Joyce, one part of the balance that we have to strike, protecting privacy of Americans -- the other part, national security. Thankfully, until the Boston bombing, we had prevented large-scale terrorist attacks on American soil. I have a few questions about how valuable the role of Section 215 and 702 programs have played in predicting (sic) our national security. Two questions, and then I'll have to stop and go to our colleagues. Can you describe any specific situations where Section 215 and Section 702 authorities helped disrupt a terrorist attack or identify individuals planning to attack, the number of times? And then secondly, if you didn't have the authority to collect phone records in bulk the way that they are now under Section 215, how would you have affected those investigations? MR. JOYCE: So to your first question, Senator, as far as a specific example of when we have utilized both of these programs is the one I had first mentioned, the first al-Qaida-directed plot since 9/11, in September of 2009, when Najibullah Zazi and others conspired plot to bomb the New York subway system. We initially found out about Zazi through an NSA 702 coverage, and he was actually talking to an al-Qaida courier who was -- he was asking for his help to perfect an explosives recipe. So but for that, we would not have known about the plot. We followed that up with legal process and then had FISA coverage on him and others as we fully investigated the plot. Business records 215 was also involved, as I had previously mentioned, where we also through legal process were submitting legal process for telephone numbers and other email addresses, other selectors. But NSA also provided another number we are unaware of of a co-conspirator, Adis Medunjanin. So that is an instance where a very serious plot to attack America on U.S. soil that we used both these programs. But I say, as Chairman Leahy mentioned, there is a difference in the utility of the programs. But what I say to you is that each and every program and tool is valuable. There were gaps prior to 9/11. And what we have collectively tried to do, the members of the committee, other members of the other oversight committees, the executive branch and the intelligence community, is we have tried to close those gaps and close those MSDI Terror DA 37 seams. And the business record 215 is one of those programs that we have closed those seams. So I respectfully say to the chairman that the utility of that specific program initially is not as valuable. I say you are right. But what I say is it plays a crucial role in closing the gaps and seams that we fought hard to gain after the 9/11 attacks. Section 702 critical to fight terrorism Washington Post, June 20, 2013, Reprinted in South China Morning Post, US Defends Surveillance Tactics in War on Terrorism, http://www.scmp.com/news/world/article/1264602/us-defendssurveillance-tactics-war-terrorism DOA: 4-1-15 In November 2008, Abid Naseer, a Pakistani student living in Manchester, England, began to e-mail a Yahoo account ultimately traced to his home country. The young man's e-mails appeared to be about four women - Nadia, Huma, Gulnaz and Fozia - and which one would make a "faithful and loving wife". British investigators later determined that the four names were code for types of explosives. And they ascertained that a final April 2009 e-mail announcing a "marriage to Nadia" between the 15th and the 20th was a signal that a terrorist attack was imminent, according to British court documents. It is unclear exactly how British intelligence linked the Pakistani e-mail address to a senior al-Qaeda operative who communicated in a kind of code to his distant allies. But the intelligence helped stop the plot in England, and the address made its way to the US National Security Agency (NSA). A few months later, the NSA was monitoring the Yahoo user in Pakistan when a peculiar message arrived from a man named Najibullah Zazi, an Afghan American living in Colorado. He asked about "mixing of [flavour and ghee oil] and I do not know the amount, plz right away." Soon after, on September 9, 2009, a second message arrived that echoed the code used in the British plot: "The marriage is ready," Zazi wrote. The e-mails led the NSA to alert the FBI, which obtained a court order to place Zazi under more extensive surveillance. Officials learned that he had visited Pakistan in 2008, the same time as one of the British plotters. In the end, the e-mails and additional surveillance foiled a plot by Zazi and two others to conduct suicide bombings in the New York subway system just days after he sent the "marriage is ready" e-mail. In recent days, US intelligence and law enforcement officials, as well as congressional officials, have pointed to the authority that allowed them to target the Yahoo account - Section 702 of the Foreign Intelligence Surveillance Act (FISA) - as a critical tool in identifying and disrupting terrorist plots in the US and abroad. But some critics of NSA surveillance suggested that the collection of data under a programme called Prism was not essential to Zazi's capture because the British first obtained the critical e-mail address. Still, the case study provides a rare glimpse of how the broad surveillance practices of the United States, often in concert with allies, are deployed. "The 702 programme has been enormously useful in a large number of terrorist cases," said a US official who has access to classified records on NSA programmes. "It's beyond dispute that it is highly effective. It operates exactly as anyone paying attention would have expected it to operate based on floor debate and plain reading of law." Passage of Section 702 as an amendment to FISA in 2008 gave the government the authority to request information from US telecommunications companies on foreign targets located overseas without a court order for each individual case. The broad authority is reviewed and renewed annually by the FISA court, although the law does not preclude making a specific request for surveillance. "It appears the NSA did not need any of the expanded authorities conferred by Section 702 to monitor the communications MSDI Terror DA 38 at issue," said Elizabeth Goitein, co-director of the Brennan Centre for Justice's Liberty and National Security Programme. "The government easily could have met this standard if it certified that the targets were al-Qaeda terrorists in Pakistan." But US officials argue that, given the flood of leads in today's interconnected world, the system would get bogged down and they could miss plots if they had to go before the court every time they got information about potential foreign suspects. The officials said they used material from multiple sources - allies, agents, informants and other investigations - to provide rolling targeting information for the Prism program. They also said if the Yahoo address had not been included, Zazi might not have been identified just days before the attacks were set to occur. In testimony before Congress on Tuesday, senior intelligence and law enforcement officials said that recently revealed surveillance programmes have disrupted more than 50 "potential terrorist events", including at least 10 plots with a connection in the US. The Zazi case was one of four that officials used in recent days to defend the effectiveness of the surveillance programmes. One of the others was a planned attack on a Danish newspaper that involved a Pakistani American, David Headley. Sean Joyce, the deputy director of the FBI, described the other two potential attacks on Tuesday in testimony before the House Intelligence Committee. In one, Joyce said, the NSA was monitoring "a known extremist in Yemen" when it learned that the individual was in contact with a man in Kansas City, Missouri. Joyce said Khalid Ouazzani and two co-conspirators were plotting to bomb the New York Stock Exchange. Ouazzani pleaded guilty in 2010 to supporting a terrorist organisation, bank fraud and overseas money laundering. His co-conspirators also pleaded guilty to terrorism charges. In the other incident, phone records helped identify a San Diego man who was financing a terrorist group overseas, apparently alShabab in Somalia. "Investigating terrorism is not an exact science. It's like a mosaic," Joyce said. "We try to take these disparate pieces and bring them together to form a picture. There are many different pieces of intelligence. "We have assets. We have physical surveillance. We have electronic surveillance through a legal process, phone records through additional legal process, financial records. "Also, these programmes that we're talking about here today, they're all valuable pieces to bring that mosaic together." General Keith Alexander, head of the National Security Agency, said details of the two programmes disclosed by Snowden were not closely held within the secretive agency. Alexander said after the hearing that most of the documents accessed by Snowden, a former systems analyst on contract to the NSA, were on a web forum available to NSA employees. Others were on a site that required a special credential to access. Alexander said investigators were studying how Snowden did that. He told lawmakers Snowden's leaks had caused "irreversible and significant damage to this nation". He also said the internet programme had helped stop 90 per cent of the 50-plus plots he cited. He said more than 10 of the plots thwarted had a link inside the US. Still, little was offered to substantiate claims that the programmes had been successful in stopping acts of terrorism that would not have been caught with narrower surveillance. In the New York subway bombing case, Barack Obama conceded the would-be bomber might have been caught with less sweeping surveillance. Committee chairman Congressman Mike Rogers said the programmes were vital to the intelligence community and blasted Snowden's actions as criminal. "It is at times like these where our enemies within become almost as damaging as our enemies on the outside," Rogers said. Officials acknowledged that intelligence collected from US phone records under a programme authorised by the USA Patriot Act is less compelling and the case for that extensive surveillance is harder to make. The NSA's ability to intercept "the contents of e-mail communications of bad guys overseas provides a more lucrative set of information" about terrorist activity than its access to phone records of millions of Americans, one US official said. MSDI Terror DA 39 Section 702 critical to defeat terrorism Benjamin Wittes, Brookings, 2014, Senior Fellow in Governance Studies at the Brookings Institution. I co-founded and am Editor in Chief of Lawfare, a website devoted to sober and serious discussion of “Hard National Security Choices.” I am the author or editor of several books on subjects related to law and national security: Detention and Denial: The Case for Candor After Guantánamo (2011), Law and the Long War: The Future of Justice in the Age of Terror (2008), and Legislating the War on Terror: An Agenda for Reform (2009). I have written extensively both on the AUMF and on NSA collection under various provisions of the Foreign Intelligence Surveillance Act (FISA).3 The views I am expressing here are my own, April 8, Prepared Statement, Is Al Qaeda Winning the Administration’s Counterterrorism Policy,” http://docs.house.gov/meetings/FA/FA18/20140408/102109/HHRG-113-FA18-Wstate-WittesB20140408.pdf DOA: 5-1-15 President Obama has announced that he wants to end the AUMF conflict, raising profound questions both about the plausibility and timeframe of that objective and about what legal instrument—if any— will replace the AUMF. Meanwhile, serial leaks have generated enormous political anxiety about NSA programs and persistent calls for reform in the press, in the general public, among allies, and in this body. Section 702 will sunset in 2017 absent action by Congress to renew this important collection authority.4 So major pillars of the legal architecture of America’s conflict with Al Qaeda have been placed—in different ways and for very different reasons—on the table. This body thus cannot avoid the question of how much, if at all, it wants to alter the most fundamental architecture of the conflict. In my view, as I will lay out, the critical task facing the Congress is different with respect to these two laws. With respect to the AUMF, the Congress should legislate to clearly authorize, and establish proper oversight of, the conflict the United States is likely to continue fighting after its withdrawal from Afghanistan. With respect to Section 702, the task is simpler: to maintain the intelligence community’s capacity to support both the broad national security objectives of the United States and the conflict’s prosecution under whatever legal authorities may succeed the AUMF. CONTINUES As I said at the outset of this statement, the question of intelligence collection under Section 702 of the FAA may seem connected to the AUMF’s future in only the most distant fashion. In fact, the connection between intelligence collection authorities and the underlying regime authorizing the conflict itself is a critical one. Good intelligence is key to any armed conflict and good technical intelligence is a huge U.S. strength in the fight against Al Qaeda. Yet ironically, the more one attempts to narrow the conflict, the more important technical intelligence becomes. The fewer boots on the ground we have in Afghanistan, for example, the greater our reliance will become on technical collection. The more we rely on drone strikes, rather than large troop movements, in areas where we lack large human networks, the more we rely on technical intelligence. Particularly if one imagines staying on offense against a metastasizing Al Qaeda in the context of a withdrawal from Afghanistan and a narrowing—or a formal end—of the AUMF conflict, the burden on technical intelligence collection to keep us in the game will be huge even ignoring the many other foreign intelligence and national security interests Section 702 surveillance supports. Section 702 is a complicated statute, and it is only one part of a far more complicated, larger statutory arrangement. But broadly speaking, it permits the NSA to acquire without an individualized warrant the communications of non-US persons reasonably believed to be overseas when those communications are transiting the United States or stored in the United States. Under these circumstances, the NSA can order production of such communications from telecommunications carriers and internet companies under broad programmatic orders issued by the Foreign Intelligence MSDI Terror DA 40 Surveillance Court (FISC), which reviews both targeting and minimization procedures under which the collection then takes place. Oversight is thick, both within the executive branch, and in reporting requirements to the congressional intelligence committees. Make no mistake: Section 702 is a very big deal in America’s counterterrorism arsenal. It is far more important than the much debated bulk metadata program, which involves a few hundred queries a year. Section 702 collection, by contrast, is vast, a hugely significant component not only of contemporary counterterrorism but of foreign intelligence collection more generally. In 2012, the Senate Select Committee on Intelligence wrote that “[T]he authorities provided [under section 702] have greatly increased the government’s ability to collect information and act quickly against important foreign intelligence targets. . . . [The] failure to reauthorize [section 702] would ‘result in a loss of significant intelligence and impede the ability of the Intelligence Community to respond quickly to new threats and intelligence opportunities.’”8 The President’s Review Group on Intelligence and Communications Technologies, after quoting this language, wrote that “Our own review is not inconsistent with this assessment. . . . [W]e are persuaded that section 702 does in fact play an important role in the nation’s effort to prevent terrorist attacks across the globe.”9 The Washington Post has reported that 702 was in 2012 the single most prolific contributor to the President’s Daily Brief.10 Yet we have seen enormous anxiety about Section 702 collection, along with its close cousin, collection overseas against non-US person targets under Executive Order 12333. Sometimes, these anxieties have been rooted in the supposed effects of this collection on U.S. persons.11 Sometimes, however, the complaints have stemmed from broader concerns about infringement of privacy worldwide. Europeans have expressed shock, for example, that a U.S. spy agency would presume to collect against an allied foreign leader like German Chancellor Angela Merkel12—surveillance that now seems forward-thinking and reasonable given later reports that Merkel has been on the phone frequently during the Crimea crisis with Vladimir Putin.13 Major news organizations have considered it front-page news that NSA has pursued intelligence targets on online gaming platforms and smartphone apps,14 that NSA has collected contact lists in large numbers around the world,15 even that foreign countries spy on one another, collect attorney-client communications involving U.S. lawyers along the way, and may share that material with NSA subject to U.S. law and minimization requirements.16 Whether one considers these stories important journalism or reckless blowing of valuable surveillance activities, they both reflect and further stoke a deep concern about the scope of U.S. surveillance practices. And that concern is creating inexorable pressures for reforms we may regret in the counterterrorism space. The legal regime here is one that this body knowingly and deliberatively created in an iterative set of interactions with the intelligence community and the courts. It requires no apology. Rather, it requires an active defense. And while there are certainly areas in which the regime could benefit from reform, the big risk here is that overreaction and panic in the face of exposure will lead to a burdening of the core signals intelligence capacity of the United States with legal processes designed to protect civil liberties domestically. This could happen either because reform efforts go too far or because Congress fails to reauthorize 702 and thus applies the terms of core FISA— which require an individualized warrant based on probable cause— to a wide swath of overseas collection. Broadly then, the legislative task with respect to Section 702 is something of the opposite of the task with respect to the AUMF. To the extent that members of this committee continue to believe, as I do, in the essential integrity and value of the existing legal authorities for intelligence collection and oversight, the task in the current political environment is to defend that architecture—publicly and energetically—rather than to race to correct imagined deficiencies, or even real structural deficiencies that, however real they may be, bear little relation to the outcomes that disquiet us. MSDI Terror DA 41 MSDI Terror DA 42 Cyber Provisions Encryption cracking necessary to prevent terrorism Network World, September 19, 2013, NSA wants even closer partnership with tech industry; NSA's Debora Plunkett says NSA's now is real-time automated information sharing on a large scale, http://www.networkworld.com/news/2013/091913-nsa-tech-industry-274011.html DOA: 2-1-15 The National Security Agency's director of information assurance today said the "way to achieve confidence in cyberspace" is to increase collaboration between the government and the high-tech industry -- remarks that rang ironic given former NSA contractor Edward Snowden's revelations about how NSA works with industry. NSA documents leaked by Snowden showed that the NSA's goal is to build backdoors into commercial products and weaken encryption to make it easier for surveillance, allegations that the U.S. government has not even tried to refute. When asked about that today, NSA director of information assurance Debora Plunkett, who gave the keynote address at the New York Institute of Technology Cyber Security Conference here, flatly refused to discuss the topic. But her keynote address was intended to get hardware and software vendors to work in ever-closer partnership with the NSA. Cyberattacks that could take electricity grids offline and disrupt transportation systems are possible, Plunkett said in her keynote, pointing out the destructive attack that hit Saudi Aramco last year and impacted data systems there. [RELATED: Reported NSA actions raise serious questions about tech industry partnerships MORE: Black Hat: Top 20 hack-attack tools] It's a simple matter to hire hacking services to carry out attacks such as denial-of-service, she said, and the fear now is of "integrity attacks" that would destroy or alter critical data. These are all "cyber security challenges," she noted, and the government today is largely dependent on commercial hardware and software for which the NSA itself cannot "provide indemnification." NSA's needs industry's help, she said. Plunkett said "we have to have a community come together" to collaborate on security in mobility and the cloud especially. The NSA expects that the future of network security lies in "more automated cyber defense" based on "large-scale automation" that would reduce the need for manpower where there would be more real-time sharing of findings. She said there's a need for collaboration with ISPs and hardware companies to achieve all of this. "We have to build a close partnership," she said, adding, there can be "confidence in cyberspace" if "we stay the course." Plunkett is a 29-year veteran of the NSA who worked her way up through the ranks to have a hand in guiding strategic direction for the agency, which carries out surveillance to help defend the country against cyberthreats. But NSA documents recently leaked by Snowden show that the NSA views its partnership with industry in part as a way to subvert security in commercial products and services to make cyber-spying easier. This revelation casts NSA's call for industry partnership and its insistence that there can be "confidence in cyberspace" in a questionable light. MSDI Terror DA 43 Domestic Anti-Terrorism Key Domestic terror solvency spills over to international solvency Michael Massing, Journalist, 2001 [The American Prospect, " Home-Court Advantage: What the War on Drugs Teaches Us about the War on Terrorism, 12/3, 12: 21, http://prospect.org/article/home-courtadvantage] Might not the same be true with terrorism? There is no treatment analogy, of course. But if our main goal is to prevent future terrorist attacks, wouldn't it be more effective to concentrate our enforcement efforts here, in the United States, instead of operating on the hostile terrain of the Middle East? In all the talk about unleashing the CIA, it's often overlooked that the perpetrators of September 11 had been living in this country for years. In detecting and rooting out terrorists, shouldn't we tend primarily to our own backyard? The Home Team Emphasizing prevention at home would offer a number of advantages. First, it's much easier to carry out undercover work here than abroad. Agents face fewer hazards in San Diego, Trenton, and Boca Raton than they do in Beirut, Cairo, or Peshawar. And we have many more resources here. In addition to the FBI and other federal agencies, thousands of local police officers are working on terrorism in cities across the country. In the drug war, the local police have led the way in dismantling drug gangs, and they could make a similar contribution toward uprooting terrorist networks. Furthermore, when it comes to obtaining "HUMINT"--the critical "human intelligence" collected by investigative agencies--the millions of loyal American Muslims living in this country would seem a far more fruitful source than Islamic fundamentalists in the Middle East. Finally, concentrating on domestic law enforcement would avoid the types of covert actions that have proved so costly and embarrassing in the past. MSDI Terror DA 44 Intelligence Necessary to Prevent Genocide Intelligence necessary to prevent human trafficking and mass atrocities Report and Recommendations of the President’s Review Group on Intelligence, December 2013, Liberty and Security in a Changing World, December 12, http://www.whitehouse.gov/sites/default/files/docs/2013-12-12_rg_final_report.pdf Intelligence is designed not only to protect against threats but also to safeguard a wide range of national security and foreign policy interests, including counterintelligence, counteracting the international elements of organized crime, and preventing drug trafficking, human trafficking, and mass atrocities. MSDI Terror DA 45 A2: Terrorists No Longer Use Email Terrorists still communicate via email Alastair Stevenson , Computer Reseller News UK, June 24, 2014, NSA and GCHQ mass surveillance a waste of time, says Edward Snowden "The top spy in the US - the director of National Intelligence James Clapper - stated in a private meeting that was later reported in the press, that regardless of their fears, terrorists and criminals have to communicate. And when they do, they will always make mistakes and give us ways to find them," he said. "For example, we've all known about telephone wire taps for years now, but criminals still use them. We know about internet surveillance, but we still use email because it's critical to our lives. We have ways to monitor them." MSDI Terror DA 46 Government Transparency Increasing transparency increases terrorism risks because terrorists can take advantage of the information SENATOR CHARLES GRASSLEY (R-IA), July 31, 2013, Hearing of the Senate Judiciary Committee Subject: "Strengthening Privacy Rights and National Security: Oversight of FISA (Foreign Intelligence Surveillance Act) Surveillance Programs" https://www.hsdl.org/?view&did=741931 Finally, increased transparency is a worthy goal in general. And as I suggested before, whenever we can talk about these programs, I think there's less questions out there in the minds of people, and we probably created some public relations problems for us and for this program and for our national security community because maybe we haven't made enough information available. I say that understanding that we can't tell our enemies what we -- what tools we use. But if we consider any reform that may bring more transparency to the FISA process, we should keep in mind, then, that every piece of information we make available to the public will be read by a determined adversary, and that adversary has already demonstrated the capacity to kill thousands of Americans, even on our own soil. MSDI Terror DA 47 RFID RFID technology defeats terrorism Gene Kaprowski, August 13, 2014, UPI, “Wireless World: RFID to Thwart Terrorism,” http://www.upi.com/Science_News/2004/08/13/Wireless-World-RFID-to-thwartterrorism/88291092413872/ DOA: 5-1-15 An associate of Osama bin Laden crawls into a container -- along with some new luxury cars -- in a shipyard in Hamburg, Germany. The goal -- shipping himself to the United States and evading the Department of Homeland Security, with its high-tech officers on the ground at major airports, armed with databases of suspects' photos. He is foiled, however, when a silent alarm is triggered, and an alert is sent to security over the airwaves, as he lifts the lid of the container in the warehouse. A wireless radio frequency identification or RFID security tag on the container sent the signal, silently, without alerting the intruder. This scenario is one the government, major shippers and transportation companies are envisioning as possible for the near future. "The security of American ports continues to be a critical issue for homeland security," Robert Jackson, an attorney with Reed Smith LLP, located in the firm's Washington, D.C., office, told United Press International. RFID technology, long touted as in-store antitheft devices for retailers, is evolving and now is "the answer for homeland defense at our ports," Ben Quinones, a partner in the technology law practice of Pillsbury Winthrop in California's Silicon Valley, told UPI. The technology, developed by private sector research and development labs -- at companies like Avery Dennison, among others -- goes by several names, but one well-known product is called the "security strap," a spokesman for the company told UPI. Once goods are sealed inside a box, a longshoreman or another worker affixes the security strap. That enables shippers to track the cargo containers through their entire overseas trip. Tampering with the seal brings a security check. Companies like SAMSys are moving forward with second-generation RFID security technologies that may be even more effective. Sun Microsystems Inc. recently opened a test center in Dallas, giving customers a location to test an array of RFID scenarios, a spokesman told UPI. Even food and drug companies are eyeing the technology, fearful that rogues may tamper with or, worse yet, counterfeit the nation's pharmaceutical supplies. The technology also is garnering funds at government research laboratories, as scientists are anxious to improve the state of the art for RFID. Last month, the U.S. Department of Energy's Oak Ridge National Laboratory reached a development deal with Spectrum Signal Processing Inc. for a RFID platform, endorsed by the Pentagon, for an array of applications, a spokesman told UPI. RFID security technology currently comes in many forms, experts said. "Tags on containers, for rail cars, are fairly large and are active," John Parkinson, chief technologist, North American Region, with the consulting firm Capgemini in suburban Chicago, told UPI. "They contain a power source and can broadcast a signal that can be tracked by a satellite. Load the tag with a manifest of what's in the container, and you can track it as it moves along the global supply chain." Other kinds of tags operate passively but still are good for catching stowaways, Parkinson said. “Pass the tag through a broadcast RF (radio frequency) from a reader and the tag gets enough energy to squawk out a short code so it can be used to look up what's on the pallet or in the carton," he said. "If the passive tag IDs point to data that specifies size and weight, a quick calculation and weighbridge datum tells you if the container is full and over or under weight. Stowaways or added materials would show up." Some technology companies, like RAE Systems Inc. and a wireless semiconductor maker called Ember Corp., don't think RFID tags provide enough information or security. They believe wireless sensor technology will be more effective MSDI Terror DA 48 at monitoring shipping containers. Around Christmas last year, the companies demonstrated a prototype wireless security monitoring system, designed to help carriers of cargo comply with federal regulations seeking to prevent terrorists from smuggling nuclear weapons and other weapons of mass destruction into the United States. The Department of Homeland Security last Nov. 18 declared it wanted cargo companies that ship to American ports to equip their containers to prevent terrorist threats. The prototype technology developed by RAE Systems and Ember uses embedded RF chips and networking software to wrap cargo in a virtual Web network, which can detect weapons grade materials, as well as detail when containers have been opened. "It's easier to detect potential terrorists in American ports when we know what's happening inside the container at all times," RAE Systems Chief Executive Officer Robert Chen said in a statement. More than 7 million shipping containers pass through U.S. ports each year, experts said. "The sheer volume of cargo entering our country every day makes it too easy for terrorists to smuggle dangerous cargo," Ember CEO Jeff Grammer said in a statement. The movement for wireless technology to track potential terrorist threats also is creating some consumer spin-offs, experts said. The Airport IT Trends Survey, sponsored by the airline information technology industry, reported 8 percent of responding airports already offer RFID tracking for passenger baggage. This is expected to increase to 25 percent of airports during the next two years. That could, one day, mean no more irretrievable luggage, lost forever in some cargo bin. Long-term, RFID also could speed up the process for importers to bring legitimate goods into the United States. The Department of Homeland Security has started using RFID tags to identify freight-carrying trucks as they cross the border with Canada and, by the end of the year, the technology is expected to be deployed to other land entry points into the United States. Another use is RFID cards for those people who frequently cross the border into the U.S. Congress is eyeing these technology developments, especially now that the Pentagon and Homeland Security are pushing RFID projects, and views them as replacing less-effective video surveillance methods. "RFID chips are more powerful than today's video surveillance technology," said Sen. Patrick Leahy, D-Vt., during a conference this spring at the Georgetown University Law Center. "RFIDs are more reliable, they are 100 percent automatic, and they are likely to become pervasive, because they are significantly less expensive." RFID technology provides security against terrorism Laura Wiegler, 2014, June 20, RFID Insider, “Securing Entry: RFID is Making us Safer,” DOA: 5-2-15 In 2001, the database the Department of Homeland Security (DHS) uses to check visa and passport applicants held about 7 million visa records and over 2 million passport records, according to the DHS. Further, they said that, “If a visa applicant turned out to be a possible match for a terrorism-related CLASS record, the consular officer requested a Security Advisory Opinion (SAO) from the Visa Office in Washington. Such requests were sent via cables, as were the Department’s responses. This multi-step cable process to communicate with posts and to coordinate with other government agencies resulted in long wait times for both the consular officers and the applicants.” A simpler, more efficient way By 2005, though, those long wait times were going to change – at least in theory – as RFID was introduced to the average American passenger traveling internationally. Today, the State Department issues both passport cards and passport books that are “smart” enough to read our information, the former at a distance and the latter at close range. The U.S. employs biometrics, which can be obtained through facial recognition, fingerprints, or the scanning of irises, but apparently requirements can vary. Michael Holly, Senior Advisor for International Affairs, Passport Services in the U.S. Department of State Bureau of MSDI Terror DA 49 Consular Affairs told RFIDinsider that “We use both fingerprints and facial recognition [for visas]. We’ve also studied the use of iris images.” He did not elaborate further, but it’s widely speculated that scanning iris images is not as reliable, and thus less popular, than scanning fingerprints and recognizing faces. For passports, moreover, a digitized and readable photo is used, forgoing fingerprints on its contactless chip. Insofar as the Government’s rationale behind RFID’s use, Holly claims the history far precedes 9-11, a common barometer for measuring the nation’s security practices. Indeed, according to the U.S. Government, RFID has been used along the nation’s land borders with Canada and Mexico since 1995. While Holly didn’t spell this out, the new passports have been designed to better protect the public from terrorism, even though it’s arguable whether or not they are also easing hassles at airports. Toward that end, there are bells and whistles attached to modern-day passports, and depending on whether one has the “card” or the “book”, the technology differs. “What we provide to a U.S. traveling citizen bearing a passport card is a protective sleeve with that document,” Holly says. “But with a passport we do a number of things – these are two different technologies: proximity and vicinity.” He says with a passport card “vicinity technology” is employed; and a number of things are done to protect it “from the possibility of skimming data from the chip, and eavesdropping. We use antiattenuation tape, a skimming sleeve that blocks the possibility of someone trying to skim data from the chip if the book is closed,” he says. The borders agent can thus obtain information discreetly, and in real time, according to Holly. “They’re [the passport issuers] using PKI (public key infrastructure) and in association with the RFID chip we can …confirm data that appears on the passport’s data page and [which one] can authenticate using the digital signatures,” he says. Obviously, in an era when a plane can go missing for weeks or months, and two passengers can board with stolen passports, security at least worldwide is hardly foolproof. Nevertheless, Holly believes that over about the past decade, the American traveler’s experience is far more secure than it was in the halcyon days of early air travel. “We use a security protocol known as the “basic access control” that requires, in order for the chip to communicate with a reader, that [the passport owner’s] book must be open, that the machine- readable zone be read.” He says this “zone” is two lines of OCR code at bottom of the passport page, and from which “a number of pins are derived, and then once that happens, the chip will communicate with the reader, releasing the data on the chip.” In the case of passport books, the readers are at the customs booths for use upon entry to the foreign country. But in the case of cards, which he explains are commonly used when U.S. citizens travel by car from the northernmost and southernpost parts of the country, the data is read from a greater distance. (See article on toll booth RFID use.) Both [the card type and book type] are passports but the book uses RFID proximity technology, he explains. “The chip in the passport book is a microprocessor. It stores data on it. …The passport card does not store any data. It simply points [via a recognized serial number] to a record stored in a secure database.” The Netherlands-based Gemalto, a global digital security firm, has been working with the U.S. Government for several years on rolling out RFID for use on or with passports. Gemalto says on its website that in August of 2012, the Government Printing Office (GPO) awarded the company with a second consecutive five-year contract. “Gemalto first partnered with [the] GPO in 2006 following stringent evaluations to meet agency requirements,” the company says on its site MSDI Terror DA 50 Biometrics Biometrics essential to counter terrorism Patrick Tucker, February 27, 2015, Defense One, Jihadi John and the Future of the Biometrics Terror Hunt, http://www.defenseone.com/technology/2015/02/jihadi-john-and-future-biometrics-terrorhunt/106263/ DOA: 5-7-15 On Thursday, the Washington Post and BBC publicly identified Mohammed Emwazi, a British-educated, Kuwaiti-born man in his mid 20s, as “Jihadi John,” the Islamic State frontman who executed several hostages on camera, to the world’s horror. “We will not comment on ongoing investigations and therefore are not in a position to confirm or deny the identity of this individual,” the FBI said Thursday. Denials aside, FBI director James Comey said months ago that they knew John’s identity. If the FBI has in fact identified Jihadi John, the victory was, in part, a product of the FBIs growing collaboration with the Department of Defense — a relationship that will grow much more cozy in the coming years, in the black cherry tree dotted hills of Clarksburg, West Virginia. About four hours away from Washington D.C. sits the headquarters of the FBI’s Criminal Justice Information Services Division, or CJIS, which houses the bureau’s Biometric Center of Excellence. The center is not a place so much as a program begun in 2007 that plays a key role in making use of all the biometric data that comes into the FBI’s possession. That’s every fingerprint, every image, and every phone message that anyone sends to the FBI. “Bottom line for us … if any of our divisions, whether it be our counterterrorism division, our criminal division, if at any time during their investigations they develop biometrics … they submit it through our system,” Stephen L. Morris, assistant director of the CJIS, told Defense One at a recent conference in Washington. In terms of identifying John, he said, “I’m not going to tell you how we did it,” but added, “You have to have something to search … you can have images with faces but if you’re not capturing it in the right way, if there’s not data in that image to make a comparison, it’s just not useful.” This, in part, is why the biometric center plays a role in bringing parties, and their biometric databases, together. The FBI’s system is called the Next Generation Identification, or NGI. It includes photos, aliases, physical characteristics and, of course, fingerprints. Today, it’s completely interoperable with the military’s Automated Biometric Identification System, or ABIS, and the Department of Homeland Security’s Automated Biometric Identification System, or IDENT. The center also works with the State Department and allied law enforcement agencies around the world. The FBI and Britain’s MI5 have been working together to identify John. Obtaining a biometric record on a suspect to match against a terrorist video of a masked jihadi is not something done easily or robotically. It requires old school investigation, either sifting through lots of hours of collected video footage and comparing that to crime videos (such as beheadings), or going out into the field to find voice samples on suspects to match against crime videos, or both. This is where the Defense Department’s extensive library of biometric signatures, gathered on the field in places like Iraq and Afghanistan, can play a role in future investigations. The department’s biometrically enabled watch list, or BEWL, houses more than 200,000 records. “I can’t speak enough about our relationship with the Department of Defense. After 9/11, our mission in life changed. It was all about national security, our partnership with DHS and DOD — to say it expanded is an understatement,” Morris said at a recent biometrics conference in Washington, D.C.“Their ABIS system was connected with our system, so they have a small group of folks who are out there [in West Virginia] MSDI Terror DA 51 in charge of their system. Having them co-locate with us has been very important.” That important relationship is about to get a lot more intimate. Later this year, the FBI is going to open a $328 million, 360,000-square foot Biometric Technology Center next to the current CJIS campus. The Defense Department will get about 40,000 square feet in the building, which will also consolidate the FBI’s biometric workers and operations. “Anything and everything we do will be run out of that building,” said Morris. In September of last year, the FBI announced that the $1.2 billion dollar NGI system was fully operational (it was rolled out in increments over a period of years). If it works according to plan, it will provide law enforcement with a very fast and reliable sense of exactly who they are talking to, what threat that individual may pose, and what records they’ve left — fingerprints, voiceprints, etc. — in what places. But fingerprints don’t help you catch everyone. Voice recognition played a key role in the identification of Jihadi John, according to published reports. The FBI’s biometric center site lists voice recognition as one of its key modalities, or areas of study, along with DNA and others, but fingerprints and more traditional biometric signatures make up a bulk of the records it manages. Biometrics needed to prevent terrorism John Woodward, RAND, 2002, Biometrics: Facing Up Terrorism, http://www.rand.org/content/dam/rand/www/external/congress/terrorism/phase1/biometrics.pdf DOA: 5-3-15 As the nation recovers from the attacks of September 11, 2001, we must rededicate our efforts to preventing any such terrorist acts in the future. While there is no easy, foolproof technical fix to counter terrorism, the use of biometric technologies might help make America a safer place. Biometrics refers to the use of a person’s physical characteristics or personal traits to identify, or verify the claimed identity, of that individual. Fingerprints, faces, voices, and handwritten signatures are all examples of characteristics that have been used to identify us in this way. Biometric based systems provide automatic, nearly instantaneous identification of a person by converting the biometric, for example a fingerprint, into digital form and then comparing it against a computerized database. This RAND Issue Paper discusses how biometric technologies could be used to impede terrorism in three critical areas: 1. Controlling access to sensitive facilities at airports, 2. Preventing identity theft and fraud in the use of travel documents, and, 3. Identifying known or suspected terrorists with a proposed counterterrorist application known as FaceCheck. MSDI Terror DA 52 UQ MSDI Terror DA 53 General MSDI Terror DA 54 Surveillance Programs Now Surveillance is first step to prevent terror General Keith Alexander, retired after 8 years as director of the NSA, May 15, 2014, New Yorker, http://www.newyorker.com/online/blogs/newsdesk/2014/05/were-atgreater-risk-q-a-with-general-keith-alexander.html DOA: 2-20-15 In January, President Obama claimed that the N.S.A. bulk-metadata program has disrupted fifty-four terrorist plots. Senator Patrick Leahy said the real number is zero. There’s a big difference between fiftyfour and zero. Those [fifty-four events] were plots, funding, and giving money—like the Basaaly Moalin case, where the guy is giving money to someone to go and do an attack. [Note: Moalin’s case is awaiting appeal.] It’s fifty-four different events like that, where two programs—the metadata program and the 702 program—had some play. I was trying to think of the best way to illustrate what the intelligence people are trying to do. You know “Wheel of Fortune”? Here’s the deal: I’m going to give you a set of big, long words to put on there. Then I’m going to give you some tools to guess the words. You get to pick a vowel or a consonant—one letter. There’s a hundred letters up there. You’ll say, I don’t have a clue. O.K., so you’ve used your first tool in analysis. What the intelligence analysts are doing is using those tools to build the letters, to help understand what the plot is. This is one of those tools. It’s not the only tool. And, at times, it may not be the best tool. It evolved from 9/11, when we didn’t have a tool that helped us connect the dots between foreign and domestic. Around 9/11, we intercepted some of [the hijackers’] calls, but we couldn’t see where they came from. So guys like [Khalid al-]Mihdhar, [one of the 9/11 hijackers who was living] in California—we knew he was calling people connected to Al Qaeda in Yemen. But we thought he was in the Middle East. We had no way to connect the dots. If you rewound 9/11, what you would have done is tipped the F.B.I. that a guy who is planning a terrorist attack is in San Diego. You may have found the other three groups that were with him. We must keep all intelligence tools to fight terror John McLaughlin teaches at the Johns Hopkins School of Advanced International Studies. He was deputy director and acting director of the CIA from 2000 to 2004, January 2, 2014, Washington Post, “NSA Intelligence-Gathering Programs Keep us Safe,” http://www.washingtonpost.com/opinions/nsaintelligence-gathering-programs-keep-us-safe/2014/01/02/0fd51b22-7173-11e3-8b3fb1666705ca3b_story.html As our debate continues, the terrorist threat is not receding but transforming. The core leadership of al-Qaeda has been degraded and remains under pressure, but robust al-Qaeda affiliates have multiplied. With the decline of central government authority in the Middle East and North Africa in the wake of the Arab Spring and the war in Syria, terrorists have the largest havens and areas for operational planning in a decade. If anything, the atomization of the movement has made the job of intelligence more labor-intensive, more detail-oriented and more demanding. Now is not the time to give up any tool in the counterterrorism arsenal. MSDI Terror DA 55 Intelligence gathering critical to defeat terrorism Paul Rosenzweig, Heritage Senior Legal Research Fellow, 2004 ["The Patriot Act Reader," w/ Alane Kochems & James Jay Carafano, 9/20, http://www.heritage.org/Research/HomelandDefense/loader.cfm?url=/commonspot/security/getfile.cf m&PageID=69895] As should be clear from the outline of the scope of the problem, the suppression of terrorism will not be accomplished by military means alone. Rather, effective law enforcement and/or intelligence gathering activity are the key to avoiding new terrorist acts. Recent history supports this conclusion. In fact, police have arrested more terrorists than military operations have captured or killed. Police in more than 100 countries have arrested more than 3,000 al-Qaeda–linked suspects, while the military captured some 650 enemy combatants. Equally important, it is policing of a different form—preventative rather than reactive, since there is less value in punishing terrorists after the fact when, in some instances, they are willing to perish in the attack. The foregoing understanding of the nature of the threat from terrorism helps to explain why the traditional law enforcement paradigm needs to be modified (or, in some instances, discarded) in the context of terrorism investigations. The traditional law enforcement model is highly protective of civil liberty in preference to physical security. All lawyers have heard one or another form of the maxim that “it is better that 10 guilty go free than that one innocent be mistakenly punished.” This embodies a fundamentally moral judgment that when it comes to enforcing criminal law, American society, in effect, prefers to have many more Type II errors (false negatives) than it does Type I errors (false positives). That preference arises from two interrelated grounds. One is the historical distrust of government that, as already noted, animates many critics of the Patriot Act. But the other is, at least implicitly, a comparative valuation of the social costs attending the two types of error. We value liberty sufficiently highly that we see a great cost in any Type I error. And though we realize that Type II errors free the guilty to return to the general population, thereby imposing additional social costs on society, we have a common-sense understanding that those costs, while significant, are not so substantial that they threaten large numbers of citizens or core structural aspects of the American polity. The post–September 11th world changes this calculus in two ways. First, and most obviously, it changes the cost of the Type II errors. Whatever the cost of freeing mob boss John Gotti or sniper John Muhammad might be, they are substantially less than the potentially horrific costs of failing to stop the next al-Qaeda assault. Thus, the theoretical rights-protective construct under which our law enforcement system operates must, of necessity, be modified to meet the new reality. We simply cannot afford a rule that “better 10 terrorists go free than that one innocent be mistakenly punished.” Second, and less obviously, it changes the nature of the Type I errors that must be considered. In the traditional law enforcement paradigm, the liberty interest at stake is personal liberty—that is, freedom from the unjustified application of governmental force. We have as a model the concept of an arrest, the seizure of physical evidence, or the search of a tangible place. As we move into the Information Age, and deploy new technology to assist in tracking terrorists, that model is no longer wholly valid. MSDI Terror DA 56 NSA surveillance has disrupted more than 50 terror plots USA Today, JUN 07, 2013, http://www.usatoday.com/story/news/nation/2013/06/18/nsasurveillance-secret-programs-terror-plots/2434193/ NSA: Surveillance foiled 50 terror plots By: Kevin Johnson, DOA: 1-1-14 Director says NYSE was among targets Section: News, Pg. 05a National Security Agency Director Keith Alexander told a House committee Tuesday that more than 50 terror threats throughout the world have been disrupted with the assistance of two secret surveillance programs that were recently disclosed by former defense contractor Edward Snowden. More than 10 of the plots targeted the U.S. homeland, Alexander told the House Intelligence Committee, including a plan to attack the New York Stock Exchange. "I would much rather be here today debating this," Alexander said, "than explaining why we were unable to prevent another 9/11" attack. At the rare open committee hearing, Alexander and Deputy Attorney General Jim Cole told lawmakers that both surveillance operations -- a domestic telephone tracking system that collects records of millions of Americans and an Internet monitoring program targeting non-citizens outside the U.S. -- have been subject to rigorous oversight to guard against privacy abuses. "This isn't some rogue operation that some guys at the NSA are operating," Alexander said. Deputy FBI Director Sean Joyce told the committee about a threat that was neutralized by the programs: Investigators used the phone-tracking system to identify an operative in San Diego who was providing support to terrorists in Somalia. Joyce also referred to two disrupted plots that were disclosed last week as having been thwarted by the surveillance operations, including a 2009 plan to bomb the New York subway system. In that case, authorities used NSA's Internet monitoring program to identify overseas communications involving Najibullah Zazi in Colorado, who was later convicted in connection with the subway attack plan. "This is not a program that is off the books," Cole said, outlining the executive, legislative and judicial controls. In the plot against the stock exchange, Joyce said investigators identified a former New York accountant working with contacts in Yemen who were in the early stages of planning an assault. Joyce did not name the man. In court documents, however, he is identified as Sabirhan Hasanoff, 37, who pleaded guilty last year to providing support to al-Qaeda. Hasanoff was not charged in a plot against the stock exchange, but prosecutors, while arguing for a harsh prison sentence, alleged in court documents that he "cased the New York Stock Exchange" at the direction of a terror leader in Yemen. Hasanoff's attorney was not immediately available for comment. Lawmakers raised few questions about the intelligence officials' authority to conduct the operations, despite the heated national privacy debate that was prompted by Snowden's disclosures. Rep. Mike Rogers, R-Mich., the panel's chairman, said the programs were "designed" to protect Americans. Maryland Rep. Dutch Ruppersberger, the committee's ranking Democrat, said Snowden's unauthorized disclosures "put our country and allies in danger." Surveillance critical to disrupt clandestine terrorist operations Report and Recommendations of the President’s Review Group on Intelligence, December 2013, Liberty and Security in a Changing World, December 12, http://www.whitehouse.gov/sites/default/files/docs/2013-12-12_rg_final_report.pdf DOA: 1-1-14 In the American tradition, the word “security” has had multiple meanings. In contemporary parlance, it often refers to national security or homeland security. Thus understood, it signals the immense MSDI Terror DA 57 importance of counteracting threats that come from those who seek to do the nation and its citizens harm. One of the government’s most fundamental responsibilities is to protect this form of security, broadly understood. Appropriately conducted and properly disciplined, surveillance can help to eliminate important national security risks. It has helped to save lives in the past. It will help to do so in the future. In the aftermath of the terrorist attacks of September 11, 2001, it should not be necessary to belabor this point. By their very nature, terrorist attacks tend to involve covert, decentralized actors who participate in plots that may not be easy to identify or disrupt. Surveillance can protect, and has protected, against such plots. Any Restrictions on intel gathering increase terror risk Ambassador L. Paul Bremer, National Commission on Terrorism Chair, 2000 ["New Terrorist Threats and How to Counter Them," 7/31, http://www.heritage.org/Research/HomelandDefense/hl678.cfm] It is obvious that there is no substitute for good intelligence if you are going to have an effective counterterrorist policy. I have worked in and around government for 35 years now, and I have never seen a field in which intelligence is more central to good policy and intelligence is more difficult to get than in the field of terrorism. If you don't have good intelligence on terrorists, you simply don't have an effective counterterrorist policy and, most of all, you cannot prevent attacks. After all, the basic objective of counterterrorism is to stop the attacks before they happen. Intel Key to solve terror Fernando Reinares, Department of Politics and Sociology, Universidad Nacional de Education a Distancia, Madrid, War on Terrorism, ed. Alan O’Day, 2004, p. 226-7 Given the clandestine and unpredictable nature of terrorism, however, all these resources may not be effective unless they are accompanied by mechanisms for detecting and preventing future threats. Reliable intelligence is an essential tool. Experience shows that, as long as the other components function as they should, success in the state’s counter-terrorism campaign is directly proportional to the emphasis placed on the gathering and analyzing of reliable information. On the contrary, when intelligence is insufficient or inadequate, the terrorist group may sense the window of opportunity they are being offered and will not hesitate to exploit this advantage by escalating its campaign of insurgent violence. In 1976, for reasons that have never been sufficiently clarified, the Italian Government decided to dismantle the special anti-terrorist units it had created only a few years earlier and ordered farreaching reorganization of its secret services. Terrorist attacks, which until then had been diminishing in frequency, immediately began to pick up and did not ease again until the early 1980s. Not coincidentally, by that time, revamped intelligence services put under greater supervisory control of the legislative and executive branches, had begun to produce results. MSDI Terror DA 58 Internal Terror Prevention Strong Now Intelligence necessary to protect against WMD proliferation and terrorism Report and Recommendations of the President’s Review Group on Intelligence, December 2013, Liberty and Security in a Changing World, December 12, http://www.whitehouse.gov/sites/default/files/docs/2013-12-12_rg_final_report.pdf The national security threats facing the United States and our allies are numerous and significant, and they will remain so well into the future. These threats include international terrorism, the proliferation of weapons of mass destruction, and cyber espionage and warfare. A robust foreign intelligence collection capability is essential if we are to protect ourselves against such threats. Because our adversaries operate through the use of complex communications technologies, the National Security Agency, with its impressive capabilities and talented officers, is indispensable to keeping our country and our allies safe and secure. Efforts to track-down and arrest terrorists are effective Heritage Foundation, August 2011, Homeland Security 2010, http://www.heritage.org/Events/2011/08/TerrorTrends?query=Terrorism+by+the+Numbers:+Understanding+U.S+and+Global+Trends A decade after the 9/11 terrorist attacks and after the demise of Osama bin Laden, looking back is as important as looking forward, in order to learn from the past and to examine the current and future threats facing the United States. Domestically, since the terrorist attacks of September 11, 2001, at least 40 terror plots against the U.S. have been foiled thanks to domestic and international cooperation, as well as efforts to track down terror leads in local communities. Likewise, on a global scale, from 1969 to 2009, there were a staggering 38,345 terrorist incidents around the world, with nearly 3,000 targeted at the United States alone. These numbers serve as a reminder that terrorists have not relented in their desire to harm the United States and its people – America needs to remain vigilant. Join us as our panelists discuss the nature of the terrorist threat to the United States and U.S. counterterrorism policy since 9/11. Existing US counterterrorism efforts effective Bergen, et al, September 2013, Jihadist Terrorism: A Threat Assessment, http://bipartisanpolicy.org/sites/default/files/Jihadist%20Terrorism-A%20Threat%20Assesment_0.pdf Peter Bergen is the author of four books about al-Qaeda, three of which were New York Times best sellers. The books have been translated into 20 languages. He is the director of the National Security Program at the New America Foundation in Washington, D.C.; a fellow at Fordham University’s Center on National Security; and CNN’s national security analyst. As detailed above, al-Qaeda has weakened considerably over the past few years, while U.S. defenses have been strengthened. Just consider the following changes since the 9/11 attacks: On 9/11, there MSDI Terror DA 59 were 16 people on the “no fly” list. Now there are more than 20,000. In 2001, there were 32 Joint Terrorism Task Force “fusion centers” where multiple law enforcement agencies work together to chase down leads to build terrorism cases. Now there are 103. A decade ago, the Department of Homeland Security, National Counterterrorism Center, Transportation Security Administration, U.S. Northern Command, and U.S. Cyber Command didn’t exist. All of these new institutions currently make it much harder for terrorists to operate in the United States. Before 9/11, Special Operations Forces were rarely deployed against al-Qaeda and allied groups. Now they perform nearly a dozen operations every day in Afghanistan, as well as missions in other countries such as Yemen and Somalia. At the beginning of the 21st century, the American public didn’t comprehend the threat posed by jihadist terrorists, but that changed dramatically after 9/11. In December 2001, it was passengers who disabled Richard Reid, “the shoe bomber.” Similarly, it was fellow passengers who tackled Umar Farouk Abdulmutallab, the “underwear bomber,” eight years later. And the following year, it was a street vendor who spotted the bomb-laden SUV Faisal Shahzad had parked in Times Square. Before 9/11, the CIA and the FBI barely communicated about their respective investigations of terrorist groups. Now they work together quite closely. The U.S. intelligence budget grew dramatically after 9/11, giving the government large resources with which to improve its counterterrorism capabilities. In 2010, the United States spent more than $80 billion on intelligence collection and other covert activities, a total more than three times what it spent in 1998. MSDI Terror DA 60 General Terror Risk MSDI Terror DA 61 Up now Number of terror attacks increasing General Clapper, Director of National Intelligence, February 26, 2015, Full Committee Hearing on “Worldwide Threats”, http://www.armed-services.senate.gov/hearings/15-02-26-worldwide-threats Moving onto terrorism, in 2013, just over 11,500 terrorist attacks worldwide killed approximately 22,000 people. Preliminary data for the first nine months of 2014 reflects nearly 13,000 attacks, which killed 31,000 people. When the final counting is done, 2014 will have been the most lethal year for global terrorism in the 45 years such data has been compiled. Terror threat increasing General Clapper, Director of National Intelligence, February 26, 2015, Full Committee Hearing on “Worldwide Threats”, http://www.armed-services.senate.gov/hearings/15-02-26-worldwide-threats I'm drawing this data -- ISIL conducting more attacks than any other terrorist group in the first nine months of 2014. And credit where credit's due, I'm drawing this data from the National Consortium of the Study of Terrorism and Responses to Terrorism, or START, at the University of Maryland. The recent terrorist attacks in Europe emphasized the threat posed by small numbers of extremists radicalized by the conflicts in Syria and Iraq. The global media attention and widespread support in extremist circles for these attacks probably will inspire additional extremists to conduct similar attacks. In ISIL, Al Qaida and Al Qaida in the Arabian Peninsula and most recently, Al Shabaab are calling on their supporters to conduct loan- wolf attacks against the United States and other Western countries. Of the 13 attacks in the West since last May, 12 were conducted by individual extremists. Since the conflict began, more than 20,000 Sunni foreign fighters have travelled to Syria from more than 90 countries to fight the Assad regime. Of that number, at least 13,600 have extremist ties. More than 3,400 Western fighters have go to Syria and Iraq. Hundreds have returned home to Europe. About 180 Americans or so have been involved in various stages of travel to Syria. I should point out, this is those who've attempted to go, didn't get there, those who got there and were killed, those who got there who fought and went to another country and -- and some number have come back. A relatively small number have returned, and we've not identified any of them engaged in attack plotting Nevertheless, the home-grown violent extremists continue to pose the most likely threat to the homeland. Loan actors or (inaudible) groups who act autonomously will -- will likely gravitate to simpler plots that don't require advanced skills, outside training or communication with others. A small but persistent number of Sunni terrorist remain intent on striking the U.S. and the West, some of whom still see commercial aviation as -- as an appealing target. MSDI Terror DA 62 Al Qaeda UQ MSDI Terror DA 63 General Al-Qaeda’s strength and geographic reach increasing Dr. Hegghammer, 7-18, 13, Dr. Thomas Hegghammer is the Zukerman Fellow at Stanford University Center for International Security and Cooperation and a senior research fellow at the Norwegian Defense Research Establishment in Oslo, Hearing of the Terrorism, Nonproliferation and Trade Subcommittee of the House Foreign Affairs Committee Subject: "Global al-Qaida: Affiliates, Objectives and Future Challenges" https://www.hsdl.org/?view&did=740859 I would first point out that I think the growth of al-Qaida's affiliate in Syria and other recent developments make this hearing particularly timely and important. In reviewing al-Qaida's evolution since 1988, I'm going to make three arguments in my opening remarks. First, contrary to some interpretations of the weakness of al- Qaida today, I would respond that it is actually quite resilient. As I look at both al-Qaida as it stood, reflected in part in your map, Mr. Chairman, there has been a net expansion in the number and the geographic scope of al-Qaida affiliates and allies over the past decade, indicating that al-Qaida, at least in my view, is -- and the movement are far from defeated. I'll explain in a moment what I mean by al-Qaida. This growth, in my view, is caused by at least two factors. One is the Arab uprisings, which have weakened regimes across North Africa and the Middle East and created an opportunity for al-Qaida to -- and its allies to establish or attempt to establish a foothold or a safe haven. I would submit that the developments in Egypt are of particular concern. It is where the head of -- current head of al- Qaida is from, and it is another potential avenue for a foothold, depending on how that situation develops over the next several weeks and months. In addition, the growing sectarian struggle across the Middle East between Sunni and Shia, which has been funded by, on the Sunni side, both states and nonstate actors, has increased the resources available to militant groups, including to alQaida and its affiliates. So the first point is that I think there's been a slight net expansion in al-Qaida's geographic scope and its number. Second, however, this expansion has, along with the weakness of central al-Qaida in Pakistan -- recently, anyway -- has created a more diffuse and decentralized movement. And I do think this is important, because I think what we see as we look at Syria, Jabhat alNusra, Iraq, al-Qaida in Iraq, Somalia, Al-Shabaab, Yemen, the al-Qaida in the Arabian Peninsula, and alQaida in the Islamic Maghreb in North Africa, the main affiliates, they largely, as I interpret it, run their operations somewhat autonomously, though they still communicate with the core and still may take some strategic advice. And I would note that, what's interesting in the Syrian front is the attempt from the core in Pakistan to adjudicate a dispute between al-Qaida in Iraq and Jabhat al-Nusra in Syria, and then to have the affiliate in Syria essentially break away from Iraq, the al-Qaida in Iraq segment, and swear allegiance directly to the core element in Pakistan, which to me symbolizes that there is still some importance to that leadership Now, the way I would -- if pressed, would define al-Qaida today, it would include the core in Pakistan, and I would say, even if Zawahiri were killed, there are at least three potential replacements that sit in Iran today, all of whom are quite well-esteemed and are members of what was called the management council, and one that potentially sits in -- or that sits in Yemen. So even with the death of Zawahiri, I still think you would get a movement that would continue. MSDI Terror DA 64 Egypt Warrant Egyptian coup strengthened Al Qaeda Gartenstein-Ross 14 (Daveed, Senior Fellow at the Foundation for Defense of Democracies, adjunct assistant professor in Georgetown University’s security studies program, “The Arab Spring and AlQaeda’s Resurgence,” Congressional Testimony before the House Armed Services Committee, 2/4/14, http://docs.house.gov/meetings/AS/AS00/20140204/101698/HHRG-113-AS00-Wstate-GartensteinRossD-20140204.pdf) But al-Qaeda’s biggest gain last year was perhaps the July military coup that deposed Egyptian president Mohamed Morsi, and the often-brutal crackdown on protesters that followed. After the coup, jihadist groups in the Sinai went on an immediate offensive, with targets including security officers and Christians. That offensive has both extended beyond the Sinai region and continued into this year, with a series of four January 24 bombings in Greater Cairo, including an explosion at the security directorate. Egypt’s coup also bolstered al-Qaeda’s narrative. Many Western observers had hoped the Arab uprisings would weaken al-Qaeda by providing a democratic alternative to the region’s dictators. These hopes rested on an inexorable march toward democracy that would prompt increasing numbers of citizens to participate in the new political systems. But the coup showed that democracy is reversible—perhaps particularly so if political Islamist groups are in power. Al-Qaeda emir Ayman al-Zawahiri had been saying exactly this since the revolutions began—claiming in March 2011 that Egypt’s new regime, even if nominally democratic, would “preserve and maintain the old policies that fight Islam and marginalize the sharia.” Though it’s too early to say whether more people are gravitating toward al-Qaeda’s argument as a result, Zawahiri and other leading jihadist thinkers have already claimed vindication after the coup, and we can expect more full-throated rhetoric on this point in the coming year. Al-Qaeda also continues to be a force in its traditional strongholds. For example, it has spearheaded an assassination campaign in Yemen that has, for more than two years, targeted the country’s military officers. Bearing in mind the manner in which prisoner releases gave new life to jihadism in North Africa, a final concern is a series of jailbreaks in July. The most significant was a July 21 jailbreak at Iraq’s notorious Abu Ghraib prison that freed about 500 prisoners from a facility boasting a high concentration of skilled jihadists. On July 28, prison riots coupled with an external attack freed 1,117 inmates from Benghazi’s Kuafiya prison. And a sophisticated July 30 prison break in Pakistan, where almost 250 prisoners escaped, was claimed by the militant group Tehrik-i-Taliban Pakistan.45 Some of the least surprising news of the year was that U.S. officials came to suspect that these incidents, all occurring around the same time, might “be part of an al Qaeda- coordinated ‘Great Escape’-like plot.”46 MSDI Terror DA 65 Arab Spring Warrant The Arab Spring strengthened Al Qaeda – three reasons Gartenstein-Ross 14 (Daveed, Senior Fellow at the Foundation for Defense of Democracies, adjunct assistant professor in Georgetown University’s security studies program, “The Arab Spring and AlQaeda’s Resurgence,” Congressional Testimony before the House Armed Services Committee, 2/4/14, http://docs.house.gov/meetings/AS/AS00/20140204/101698/HHRG-113-AS00-Wstate-GartensteinRossD-20140204.pdf) Factors Strengthening al-Qaeda and Jihadism Three primary factors have strengthened al-Qaeda and jihadism in the Arab Spring environment, two of which fundamentally relate to the jihadist strategy previously outlined: prisoner releases, dawa opportunities, and the resurgence of jihadist-aligned charity networks. Prisoner releases. The Senate Select Committee on Intelligence report on the notorious September 2012 attack on the U.S. consulate in Benghazi notes that a number of individuals affiliated with terrorist groups were involved, including those affiliated with the Muhammad Jamal Network. Jamal himself is notable as one of many jihadist figures to have been released from Egyptian prison. This makes Jamal part of the aforementioned trend that began with the Arab Spring uprisings, in which prisons in affected countries have been emptied. In many cases, it is a good thing that prisoners have gone free: the Arab dictatorships were notorious for unjustly incarcerating and abusing their political prisoners. But jihadists were part of this wave of releases. Prisoners went free for a variety of reasons. In Libya, Qaddafi’s government initially used releases as an offensive tactic early after the uprisings, setting prisoners free in rebellious areas in order to create strife.28 As the rebellion continued, some prison governors decided to empty prisons they were charged with guarding, including as a means of defection.29 Chaos also allowed prison escapes, and gunmen attacked prisons in order to free inmates. Regimes that experienced less chaotic transitions, including Tunisia and Egypt, were hesitant to continue imprisoning virtually anybody jailed by the old regime, including violent Islamists with blood on their hands. Moving beyond Muhammad Jamal, other prominent figures from Egypt’s jihadist movement were also freed from prison. The most notorious is Muhammad al-Zawahiri, the brother of al-Qaeda’s emir and a former member of Egyptian Islamic Jihad. Zawahiri played a prominent role in encouraging jihadists to join the September 2012 attack on the U.S. embassy in Cairo, and American officials told The Wall Street Journal that he has also helped Muhammad Jamal connect with his brother, the al-Qaeda chief. Other released Egyptian inmates returned to operational and media roles, including Murjan Salim, who has been directing jihadists to training camps in Libya. Figures like Jalal al-Din Abu al-Fatuh and Ahmad ‘Ashush, among others, helped loosely reorganize networks through media outlets al-Bayyan and al-Faruq. Prisoner releases helped regenerate jihadist networks in the Sinai that have been able to cause a great deal of bloodshed since the country’s July coup. Ansar al-Sharia in Tunisia’s striking growth was also attributable to prisoner releases. AST leader Abu Iyadh al-Tunisi had been imprisoned since 2003 for involvement in terrorism abroad, but was released in the general amnesty of March 2011. In fact, prominent AST members have claimed that the organization was born during periods of imprisonment, when “communal prayer time served as a forum for discussion and refining ideas that would be put into practice on release.” In Libya, many former prisoners, including some leaders of the Libyan Islamic Fighting Group, said they would forsake armed struggle and join the political process. But other released prisoners returned to jihadist violence. Mohammed al-Zahawi and Shaykh Nasir alTarshani of Katibat Ansar al-Sharia in Benghazi both spent years in Qaddafi’s notorious Abu Salim MSDI Terror DA 66 prison.31 Abu Sufyan bin Qumu, another Ansar al-Sharia leader based in Derna, was formerly imprisoned in both Guantánamo Bay and Abu Salim. Dawa opportunities. Newfound opportunities to undertake dawa allowed the spread of salafi jihadist ideology in places like Egypt and Tunisia. In Egypt, members of the salafi jihadist current such as Muhammad al-Zawahiri and Ahmad ‘Ashush were able to personally advocate for the movement on television for the first time. In Tunisia, AST developed a sophisticated dawa strategy. It continues to undertake dawa even after the Tunisian government banned it, but AST youth leader Youssef Mazouz said the group now carries out “less than half the work it used to before August when it could plan events openly and post details on Facebook.”32 Some of AST’s dawa efforts have been rather traditional: holding dawa events at markets or universities, holding public protests, and dominating physical spaces, such as cafés, near places of worship. But AST also used innovative approaches to dawa, including provision of social services (something other militant Islamic groups like Hizballah and Hamas have also done) and its use of social media. As noted, AST’s ban now impedes its ability to leverage social media. AST’s social services activity has included distribution of food, clothing, and basic supplies, as well as sponsorship of convoys that provide both medical care and medicine. These efforts concentrated on areas of Tunisia that are typically neglected by the government, such as rural and impoverished areas, and AST also provided emergency humanitarian assistance in the wake of such natural disasters as flooding. AST’s social services are typically accompanied by distribution of literature designed to propagate its ideology. But even at its height, AST’s distribution of social services didn’t reach the same areas consistently: it isn’t clear any communities saw AST as a services provider week after week. This is where AST’s savvy use of social media was particularly relevant. Almost immediately after it undertook humanitarian efforts, AST would post information about its latest venture, including photographs, to its Facebook page and other websites. Social media served as a force multiplier: while AST didn’t provide consistent services to a single area, its social media activity illustrated a rapid pace of humanitarian assistance, and thus helped the group achieve its goal of visibility. The context in which this dawa work was undertaken is important, as the country’s economy suffered and much of its revolutionary hopes had faded. AST positioned itself as a critic of the status quo and a champion of those whom the system neglected. This helped AST develop into a growing movement by the last time I did field research there, in April 2013. Whether the new Tunisian constitution will rekindle revolutionary hopes remains to be seen. Resurgence of jihadistaligned charity networks. Prior to the 9/11 attacks, al- Qaeda received significant funding from a wellfinanced network of Islamist charity organizations. As a monograph produced for the 9/11 Commission noted, prior to those attacks “al-Qaeda was funded, to the tune of approximately $30 million per year, by diversions of money from Islamic charities and the use of well-placed financial facilitators who gathered money from both witting and unwitting donors.”33 Despite the efforts made to shut down such groups, Islamist-leaning international charities and other NGOs have been reemerging as sponsors of jihadist activity. In Tunisia, the pictures, videos, and information that AST posted on its Facebook page suggest that AST received support from jihadist charity networks. In at least one case, it received medical supplies from the Kuwaiti charity RIHS (the Revival of Islamic Heritage Society). The fact that RIHS supported a jihadist-oriented group in Tunisia will come as no surprise to seasoned watchers of terrorist financing. The U.S. Treasury Department designated RIHS in 2008 “for providing financial and material support to al-Qaeda and al-Qaeda affiliates, including Lashkar e-Tayyiba, Jemaah Islamiyah, and Al-Itihaad al-Islamiya.”34 The Treasury designation also charges that RIHS provided financial support specifically for terrorist acts. And that’s not AST’s only connection to sympathetic foreign organizations. The literature it passes out at dawa events can be traced to at least three book publishing houses in MSDI Terror DA 67 Saudi Arabia: Dar al-Qassem, based in Riyadh; Dar al-Tarafen, based in Taif; and the Cooperative Office for the Call and Guidance and Education Communities, based in Dammam. It’s likely that AST, which has distributed a significant amount of these publishers’ literature, either has a direct relationship with the publishers or else a designated intermediary. The most significant theater for jihadist charities’ rebound, though, will likely be Syria. A recent comprehensive report published by the Brookings Institution notes the role of “individual donors in the Gulf,” who “encouraged the founding of armed groups, helped to shape the ideological and at times extremist agendas of rebel brigades, and contributed to the fracturing of the military opposition.”35 The report singles out Kuwaiti donors and charities in particular—including the aforementioned RIHS—in part because Kuwait has had fewer controls than other Gulf countries. Further, the Syrian Islamic Front (SIF)—an umbrella group of six organizations that is considered one of the key jihadist elements within the Syrian opposition—has clearly expressed ties to Turkish and Qatari government-linked NGOs. The video proclaiming the creation of this new group in December 2012 showed SIF members providing aid to Syrian civilians with boxes and flags bearing the logos of the Turkish Humanitarian Relief Foundation (IHH). In January 2013, SIF posted a video to YouTube depicting its members picking up aid from IHH in Yayladagi, Turkey, that was to be distributed in Syria. Other boxes and flags in SIF’s December 2012 video belonged to Qatar Charity, which used to go by the name Qatar Charitable Society. Evidence submitted by the U.S. government in a criminal trial noted that in 1993 Osama bin Laden named the society as one of several charities that were used to fund al-Qaeda’s overseas operations. Other charities that in the past supported al-Qaeda and jihadist causes may also be on the rebound. For example, when the U.S. Treasury Department designated the Al Haramain Islamic Foundation (AHIF), a Saudi charity that provided significant support to al-Qaeda internationally, it noted that AHIF’s leadership “has attempted to reconstitute the operations of the organization, and parts of the organization have continued to operate.”36 Further, the U.N.’s Office of the Ombudsperson overseeing sanctions of al-Qaeda-linked individuals has produced a delisting in 38 different cases as of the time of this testimony.37 The delisting of al-Qaeda supporters at the United Nations could further re-energize al-Qaeda charity networks. Arab Spring led to AQ expansion Gartenstein-Ross 14 (Daveed, Senior Fellow at the Foundation for Defense of Democracies, adjunct assistant professor in Georgetown University’s security studies program, “The Arab Spring and Al-Qaeda’s Resurgence,” Congressional Testimony before the House Armed Services Committee, 2/4/14, http://docs.house.gov/meetings/AS/AS00/20140204/101698/HHRG-113-AS00-Wstate-GartensteinRossD-20140204.pdf) Chairman McKeon, Ranking Member Smith, distinguished members of the committee, it is an honor to appear before you to discuss the state of al-Qaeda, its affiliates, and associated groups. My testimony will focus on how the Arab Spring environment presented new opportunities for al-Qaeda, altered its focus in discernible ways, and allowed it to experience significant geographic expansion. Not only is the expansion of al-Qaeda’s recognized affiliates clear, but also a large number of new organizations have cropped up in the Middle East and North Africa that profess an allegiance to al-Qaeda’s ideology, salafi jihadism, yet claim they are organizationally independent from its network. These claims cannot necessarily be taken at face value. Indeed, two central questions that analysts of jihadist militancy MSDI Terror DA 68 debate today are: 1) to what extent are these new jihadist groups connected to the al- Qaeda network, and 2) to what extent is al-Qaeda’s senior leadership (AQSL) able to set priorities and strategy for its affiliates, and thus either control or influence their activities? Uncertainties surrounding both questions somewhat complicate the U.S.’s policy response. This testimony begins by examining the question of what al-Qaeda is, and what its goals are. Thereafter, it turns to the perceptions that al-Qaeda and other salafi jihadists had of the Arab Spring, and their ideas about how the movement could benefit. The testimony then calls into question the notion that al-Qaeda’s senior leadership has been decimated— which, if true, means that intentions aside, the group would be unable to execute strategy in the new environment. I then turn to factors that did in fact strengthen al-Qaeda and jihadism during the Arab Spring, before giving an overview of al-Qaeda’s current position. I conclude by discussing what kinds of policy responses are appropriate for the United States to adopt to address this challenge. MSDI Terror DA 69 AQAP Warrant AQAP is likely to attempt transnational attacks. Clapper 12 (James, Director of National Intelligence, “Unclassified Statement for the Record on the Worldwide Threat Assessment of the US Intelligence Community for the Senate Select Committee on Intelligence,” http://www.fas.org/irp/congress/2012_hr/013112clapper.pdf) Aulaqi, we judge AQAP remains the node most likely to attempt transnational attacks. His death probably reduces, at least temporarily, AQAP‟s ability to plan transnational attacks, but many of those responsible for implementing plots, including bombmakers, financiers, and facilitators, remain and could -led government in Baghdad in favor of a Sunni-led Islamic caliphate. It probably will attempt attacks primarily on local Iraqi targets, including government institutions, Iraqi Security Forces personnel, Shia civilians, and recalcitrant Sunnis, such as members of the Sons of Iraq, and will seek to re-build support among the Sunni population. In its public statements, the group also supports the goals of the global jihad, and we are watchful for indications that AQI aspires to conduct attacks in the West. MSDI Terror DA 70 ISIS UQ MSDI Terror DA 71 General Strong Now ISIS strength increasing The Malone Telegram, February 28, 2015 Saturday, Obama's reasoned request, P. 4 ISIL is a serious and growing threat, with reports that it is looking to gain footholds in even more nations in its quest to establish a caliphate. If the Middle East seems chaotic now, imagine it with ISIL ruling an oil-rich nation from which to export its violent doctrine. It must be stopped. ISIS a threat to regional and international security Charles Lister, Brookings Doha Center, December 2014, Profiling the Islamic State, http://www.brookings.edu/~/media/Research/Files/Reports/2014/11/profiling-islamic-statelister/en_web_lister.pdf?la=en DOA: 3-1-15 This impressively managed, almost obsessively bureaucratic organization has become a serious threat to regional and international security. In fundamentally challenging al-Qaeda’s place as the recognized leader of transnational jihadism, it continues to attract recruits from across the globe. The scale of this threat has been demonstrated by the initiation of airstrikes by a broad international coalition in Iraq and Syria in recent months. While IS has shifted underground, it continues operations in Syria and Iraq. Moreover, its beheading of foreign hostages has presented a concerning element of leverage over the international community’s ability to counter its influence. MSDI Terror DA 72 Attacks Increasing Warrent ISIS conducts mass casualty urban attacks Charles Lister, Brookings Doha Center, December 2014, Profiling the Islamic State, http://www.brookings.edu/~/media/Research/Files/Reports/2014/11/profiling-islamic-statelister/en_web_lister.pdf?la=en DOA: 3-1-15 IS military operations can generally be divided into two categories. The first is mass casualty urban attacks, normally targeting Shia, Alawi Muslims, and other minority groups, often in civilian areas. These attacks, which have been more common in Iraq, see IS operate as a typical terrorist organization, managing small, covert, largely urban cells linked to a larger militant infrastructure capable of providing funding and equipment. These operations can continue amid favorable or unfavorable operating environments and are the key to sustaining offensive momentum against adversaries. MSDI Terror DA 73 Military Capacity Warrent ISIL’s influence and threat in the Middle East is increasing General Clapper, Director of National Intelligence, February 26, 2015, Full Committee Hearing on “Worldwide Threats”, http://www.armed-services.senate.gov/hearings/15-02-26-worldwide-threats DOA: 3-1-15 Moving into the Mid East, ISIL is increasing its influence outside of Iraq and Syria, seeking to expand its self-declared caliphate into the Arabian Peninsula, North Africa and South Asia and planning terrorist attacks against Western and Shia interests. ISIL's rise represents the greatest shift in the Sunni violent extremist landscape since Al Qaida affiliates first began forming, and it is the first to assume at least some characteristics of a nation state. Spillover from the Syrian conflict is raising the prospect of instability in Lebanon, Jordan and Saudi Arabia. In Iraq, sectarian conflict in mixed Shia-Sunni areas is growing and if not blunted, will undermine progress against ISIL. Although Prime Abadi has begun to alter the etho-sectarian tone in Iraq, resistance from his Shia political allies and persistent distrust among Iraqi leaders will limit progress toward a stable, inclusive political environment. ISIL's ability to conduct large-scale offensive operations in Iraq has been degraded by coalition airstrikes, the provision of weapons and munitions by the U.S. and other allies, and stiffened defenses by the Iraqi security forces, Kurdish Peshmerga, Shia militants and tribal allies, not to mention the Iranians. However, ISIL remains, as we've seen, a formidable and brutal threat. ISIS has a professional military organization Charles Lister, Brookings Doha Center, December 2014, Profiling the Islamic State, http://www.brookings.edu/~/media/Research/Files/Reports/2014/11/profiling-islamic-statelister/en_web_lister.pdf?la=en DOA: 3-1-15 At the top, Baghdadi brings a crucial image of Islamic legitimacy, justified by his apparent Ph.D. in Islamic Studies from the Islamic University of Baghdad and his history as an imam and preacher in Samarra. Though not a graduate of al-Azhar or Dar al-Ifta’ al-Masriyyah, this clerical background puts Baghdadi on a qualitatively higher religious level than Osama bin Laden or Ayman al-Zawahiri. More significant, however, is the military and intelligence experience held by many of Baghdadi’s deputies, which has brought a level of professionalism to IS’s ability to operate as an efficient and capable organization. For example, both of Baghdadi’s deputies were former ranking officers in the Iraqi military. Abu Ali alAnbari, the chief of Syria operations, was a major general in the Iraqi Army and Fadl Ahmad Abdullah alHiyali (Abu Muslim al-Turkmani), the chief of operations in Iraq, was a lieutenant colonel in Iraqi Military Intelligence and a former officer in the Iraqi Special Forces.50 Moreover, according to data seized from the safe-house of former IS General Military Council leader Adnan Ismail Najem Bilawi (Abu Abd alRahman al-Bilawi) in early June 2014, the group maintained roughly 1,000 “medium and top level field commanders, who all have technical, military, and security experience.” ISIS creates power vacuums that it enters and takes over Charles Lister, Brookings Doha Center, December 2014, Profiling the Islamic State, http://www.brookings.edu/~/media/Research/Files/Reports/2014/11/profiling-islamic-statelister/en_web_lister.pdf?la=en DOA: 3-1-15 MSDI Terror DA 74 Independent of specific local dynamics, IS has proven capable of designing and implementing a multistage strategy aimed at engendering a chaotic power vacuum into which it can enter. Combining a typical insurgent strategy of attrition with extreme brutality (such as the execution of approximately 200 men captured at Tabaqa Airbase in late August), IS is able to acquire the leverage necessary to become locally dominant. At that point, IS units assume a central role in all local affairs, as Abu Usama, a British fighter based in Homs explained in May 2014: “Our average day here is now normally much of the same—manning checkpoints, going on patrol in the area, settling disputes between locals and between tribes, and a lot of meetings with village elders and their chiefs, so we can discuss their concerns and complaints.”4 MSDI Terror DA 75 Returning Fighters Warrent ISIS fighters are security threats when they return home Charles Lister, Brookings Doha Center, December 2014, Profiling the Islamic State, http://www.brookings.edu/~/media/Research/Files/Reports/2014/11/profiling-islamic-statelister/en_web_lister.pdf?la=en DOA: 3-1-15 Realistically, however, the chance that a foreign fighter might choose to return home to carry out an attack is quite unpredictable and should be treated as plausible. Judging by data from 1990-2010, approximately 11 percent of foreign fighters have become active security threats after returning home—not a small number.109 For Western Europe, from which there are approximately 3,000 fighters in Syria, that would amount to 330 potential terrorists. Notably, the last three prominent terrorist attacks in the Western world involved individuals with travel experience in foreign conflict zones—Syria, Dagestan, Kenya, and Somalia. Moreover, there is already a precedent for fighters with experience in Syria returning to their home countries or for individuals influenced by IS commanders plotting or successfully carrying out attacks. The cases of Mehdi Nemmouche in Brussels and Ibrahim Boudina in France suggest such fears are already being realized. ISIS is well resourced and plans on attacking the US James Kittfield, 8-20, The National Journal, August 20, 2014 Why Washington Should Declare War on ISIS Most importantly, ISIS today represents a direct and growing threat to the United States. It has attracted an estimated 12,000 foreign fighters to its black banner flying over Syrian and Iraqi territory, including hundreds of Europeans and Americans who can travel freely with Western passports. It has a bigger sanctuary, far more money, and is more indiscriminately murderous than al-Qaida was on Sept. 10, 2001. ISIS leader Abu Bakr al-Baghdadi has assured anyone who will listen that he eventually intends to direct his jihad at the United States, telling the U.S. soldiers who released him from prison in 2009, "I'll see you in New York." MSDI Terror DA 76 Al-Shabaab UQ MSDI Terror DA 77 General Al-Shabaab is also recovering Gartenstein-Ross 14 (Daveed, Senior Fellow at the Foundation for Defense of Democracies, adjunct assistant professor in Georgetown University’s security studies program, “The Arab Spring and Al-Qaeda’s Resurgence,” Congressional Testimony before the House Armed Services Committee, 2/4/14, http://docs.house.gov/meetings/AS/AS00/20140204/101698/HHRG-113-AS00-Wstate-GartensteinRossD-20140204.pdf) Another al-Qaeda franchise that is seemingly recovering its capabilities, based on the attacks it was able to execute, is the Somali militant group al-Shabaab. Shabaab once controlled more territory in southern Somalia than did the country’s U.N.-recognized government, but it lost its last major urban stronghold of Kismayo to advancing African Union forces in October 2012. However, Shabaab’s capabilities have recovered since then. The group captured worldwide attention on September 21, 2013, when terrorists associated with the group launched a spectacular assault on Nairobi’s Westgate Mall. The attack dragged on for four days, killing 67 and injuring at least 175. But even before that, there were signs that a complex operation like Westgate was possible, as Shabaab carried out increasingly sophisticated attacks throughout the year. These included an April 2013 attack on a Mogadishu courthouse that killed 29, and a June 2013 twin suicide bombing at Mogadishu’s U.N. compound that claimed 22 lives. Over the course of 2013, Shabaab was able to kill between 515 and 664 people, according to a database that I maintain. MSDI Terror DA 78 I/L MSDI Terror DA 79 Al Qaeda Specific MSDI Terror DA 80 Surveillance Solves Al Qaeda activity can be detected with email and phone record surveillance Yohn Yoo, Summer 2014, Emanuel S. Heller Professor of Law, University of California, Berkeley Law School; Visiting Scholar, American Enterprise Institute, Harvard Journal of Law & Public Policy, THE LEGALITY OF THE NATIONAL SECURITY AGENCY'S BULK DATA SURVEILLANCE PROGRAMS, http://moritzlaw.osu.edu/students/groups/is/files/2013/11/Yoo1.pdf, DOA: 1-1-15, p. 908-9 Members of the al Qaeda network can be detected, with good intelligence work or luck, by examining phone and e-mail communications, as well as evidence of joint travel, shared assets, common histories or families, meetings, and so on. As the time for an attack nears, "chatter" on this network will increase as operatives communicate to coordinate plans, move and position assets, and conduct reconnaissance of targets. When our intelligence agents successfully locate or capture an al Qaeda member, they must be able to move quickly to follow new information to other operatives before news of the capture causes them to disappear. The NSA database is particularly important because it will point the way to al Qaeda agents within the United States, where they are closest to their targets and able to inflict the most harm on civilians. The September 11 hijackers themselves provide an example of the way that the NSA could use business record information to locate an al Qaeda cell. Links suggested by commercially available data might have turned up ties between every single one of the al Qaeda plotters and Khalid al Mihdhar and Nawar al Hazmi, the two hijackers known to the CIA to have been in the country in the summer of 2001. Mihdhar and Hazmi had rented apartments in their own names and were listed in the San Diego phone book. Both Mohammad Atta, the leader of the September 11 al Qaeda cell, and Marwan al-Shehi, who piloted one of the planes into the World Trade Center, had lived there with them. Hijacker Majed Moqed used the same frequent flier number as Mihdhar; five hijackers used the same phone number as Atta when booking their flights; the remaining hijackers shared addresses or phone numbers with one of those hijackers, Ahmed Alghamdi, who was in the United States in violation of his visa at the time. Our intelligence agents, in fact, had strong leads that could conceivably have led them to all of the hijackers before 9/11. CIA agents had identified Mihdhar as a likely al Qaeda operative because he was spotted at a meeting in Kuala Lumpur and mentioned in Middle East intercepts as part of an al Qaeda "cadre." Hazmi too was known as likely to be al Qaeda. But in neither case was there enough evidence for a criminal arrest because they had not violated any American laws. If our intelligence services had been able to track immediately their cell phone calls and e-mail, it is possible that enough of the hijacking team could have been rounded up to avert 9/11. Our task is much more difficult today, because we might not have even this slender information in hand when the next al Qaeda plot moves toward execution. Intelligence collection key to defeating Al Qaeda Benjamin Wittes, Brookings, 2014, Senior Fellow in Governance Studies at the Brookings Institution. I co-founded and am Editor in Chief of Lawfare, a website devoted to sober and serious discussion of “Hard National Security Choices.” I am the author or editor of several books on subjects related to law and national security: Detention and Denial: The Case for Candor After Guantánamo (2011), Law and the Long War: The Future of Justice in the Age of Terror (2008), and Legislating the War on Terror: An Agenda for Reform (2009). I have written extensively both on the AUMF and on NSA collection under MSDI Terror DA 81 various provisions of the Foreign Intelligence Surveillance Act (FISA).3 The views I am expressing here are my own, April 8, Prepared Statement, Is Al Qaeda Winning the Administration’s Counterterrorism Policy,” http://docs.house.gov/meetings/FA/FA18/20140408/102109/HHRG-113-FA18-Wstate-WittesB20140408.pdf DOA: 5-1-15 Yet in considering the question of the state of the U.S. confrontation with Al Qaeda, there is something to be said for considering these questions in conjunction with one another. These are, after all, two of the most important legal instruments in the struggle this committee is endeavoring to assess. One is the key legal authority for virtually every military action the United States undertakes in its military battle against Al Qaeda, its offshoots, and its affiliates. The other is the single most important legal authority the intelligence community has for collecting intelligence against the Al Qaeda target—not to mention other foreign targets of great national security significance. This intelligence is key to arrests and the thwarting of terrorist plots against the United States and its allies. It is also key to accurate and precise targeting judgments in lethal force operations. MSDI Terror DA 82 ISIS Specific MSDI Terror DA 83 Surveillance Solves ISIS Surveillance necessary to prevent ISIS attacks Guardian, June 22, 2014 , Isis threat justifies greater surveillance powers in UK, says Liam Fox Former defence secretary says first duty of state is to protect citizens and public will accept greater monitoring powers Britain's security services may need to be given greater powers of surveillance to monitor extremists from Isis when they return home to Britain from Iraq and Syria, the former defence secretary Liam Fox has said. A majority of people will accept that an "ideological battle" means that the authorities will need greater powers to intercept the communications of extremists, Fox said. The former defence secretary, who was speaking on the Andrew Marr Show on BBC1, said that Britain should offer to put its airbases at the disposal of the US to avoid "horrendous" situation in Iraq as Isis forces pose a threat to Baghdad. Fox said: "There are those who say if we don't get involved, if we hunker down then we will be fine. There will be no backlash. That is utterly, utterly wrong because the jihadists don't hate us because of what we do. They hate us because of who we are. We can't change that. It is our values and our history that they detest more than anything else." Fox said that the authorities could deprive British citizens returning from Syria and Iraq of their passports. But he said that the greatest effort should go towards increasing the power of the state to monitor the communications of extremists. He said: "We have the security services to ensure that they [extremists] are watched and that they don't pose a greater threat." Asked whether the powers of the security services were insufficient, the former defence secretary said: "That is a real question that we are going to have to ask whether the security services have adequate resources for an increased threat. "That is a question politicians will have to take into account in judgments on spending allocations but also do the powers they have reflect the increasing [threat]? You've got people in the light of Snowden saying that the state has too many powers and we have to restrict the powers of the state." Asked which powers the state should be given, Fox said: "The whole areas of intercept that need to be looked at. We have got a real debate, and it is a genuine debate in a democracy, between the libertarians who say the state must not get too powerful and pretty much the rest of us who say the state must protect itself." Asked whether this meant more surveillance and increasing the manpower of the security services, he said: "If required is the first duty of the state to protect its citizens ... it is a real worry and it is a problem that is going to be with us for a very long time. At heart it is an ideological battle and we have to realise that we have to win the ideological battle as well." The remarks by Fox suggests that some figures, particularly on the right, will use the success of extremists in Iraq to challenge the claim by Edward Snowden that the state has amassed too many powers of surveillance. Snowden leaked a series of NSA files to the former Guardian journalist Glenn Greenwald last year. MSDI Terror DA 84 ISIS Nuclear Terrorism ISIS created the world’s largest terrorist safe haven – it’s the largest risk of nuclear terrorism Bunn, 7/11/14 - Matthew Bunn, a professor of practice at the Harvard Kennedy School’s Belfer Center for Science and International Affairs, is a former adviser on nonproliferation in the White House Office of Science and Technology Policy, where he focused on control of nuclear weapons and materials (Matthew, “ISIS Seizes Nuclear Material—but That’s Not the Reason to Worry” 7/11, http://nationalinterest.org/feature/isis-seizes-nuclear-material%E2%80%94-that%E2%80%99s-not-thereason-worry-10849) But while this particular uranium is not much of a worry, the larger picture is starting to make me bite my nails a bit. The Islamic State now controls a big chunk of territory, hundreds of millions of dollars, and thousands of armed troops – and it has made clear that its ambitions are global. Its statement declaring itself the caliphate promised by Allah was an explicit invitation to violent Islamic extremists from all over the world to join them. Like the Taliban’s Afghanistan before 9/11, the Islamic State may become a safe haven for people from other groups and countries to train and plot complex attacks. Having such a haven where the government is not going to interfere makes a huge difference in terrorists’ ability to put together a really complicated plot – from something like 9/11 to a plot to make a nuclear bomb. Let’s not forget that al Qaeda has repeatedly sought to get the kind of nuclear material that really could be put together into a nuclear bomb, and the expertise to do that job. The Islamic State or others taking advantage of its territory may well renew that effort. That’s all the more reason to accelerate the effort to ensure that all the world’s potential nuclear bomb material is effectively secured – and to be grateful that past efforts eliminated such material from Iraq long before the Islamic State came on the scene. ISIS Is the Biggest Nuclear Threat Brent Budowsky 8/22/14, LL.M. degree in international financial law from the London School of Economics, former aide to former Sen. Lloyd Bentsen and Bill Alexander, then chief deputy majority whip of the House, “ISIS poses nuclear 9/11 threat”, 2014, http://www.opednews.com/articles/ISISposes-nuclear-9-11-th-by-Brent-Budowsky-ISI_Military_Nuclear_insanity_Threat-To-World-Peace140822-911.html After the latest grotesque atrocity by the Islamic State in Iraq and Syria (ISIS), the beheading of an American journalist, American and European policymakers must clearly understand the near certainty that unless it is defeated and destroyed, ISIS will launch a major terror attack on American or European soil. Analysts estimate that ISIS has amassed a cash hoard of between $400 million and $2 billion. It is highly probable that ISIS will attempt to use some of this money to obtain nuclear, chemical, biological or other weapons of mass death on the international black market or from corrupt officials in nations such as Russia, China, Pakistan or North Korea to use in attacks against New York, Washington, London, Paris, Berlin, Rome, Brussels or other nations it considers infidel enemies. This danger is magnified by the fact that ISIS has recruited nationals of the United States and Europe, who possess American and European passports and are physically indistinguishable from local populations in America and Europe. It is extraordinary that the mass murdering butchery of ISIS is so demented than even al Qaeda is MSDI Terror DA 85 offended. It is alarming that the CIA, which launched intelligence operations even against the United States Senate, and the NSA, which launched massive and unprecedented eavesdropping operations, and intelligence services of leading European nations were blind to the magnitude of the ISIS threat until the most barbaric terrorists in modern history had taken over almost a third of Iraq and are on the brink of creating a terrorist super-state that dwarfs al Qaeda's efforts prior to 9/11. I vehemently opposed the misguided Iraq War from the moment it was proposed by former President George W. Bush and have never been a neoconservative, warmonger or super-hawk. But aggressive action against ISIS is urgently needed. ISIS has stated its intention to attack the United States and Europe to advance its evil, messianic and genocidal ideology and ambitions. ISIS has the money to purchase the most deadly weapons in the world, and has recruited American and European traitors with above-average capability to execute an attack. The odds that ISIS can obtain nuclear, chemical, biological or other forms of mass destruction weapons are impossible to ascertain but in a world of vast illegal arms trafficking, with so many corrupt officials in nations possessing arsenals of destruction, the danger is real. The fact that WMD scares prior to the Iraq War ranged from mistaken to deceitful does not mean that the WMD danger does not exist today. It does. I applaud the recent actions taken by President Obama. Obama's airstrikes saved tens of thousands of Yazidis from genocide, took back the Mosul Dam from ISIS and saved countless Iraqis, Kurds and Syrians from slaughter. The airstrikes inflicted material damage to ISIS. The diplomacy of Obama and Secretary of State John Kerry contributed mightily to the replacement of a disastrous Iraqi government by a government can unite Iraqi Sunnis, Shiites and Kurds. The Obama-Kerry initiatives will lead to the creation of a stable Afghan government and avoid the collapse that was possible after the recent controversial Afghan elections. These are real successes. In the current political climate, Obama seems to get credit for nothing, but he deserves great credit for some important successes in recent weeks. And yet the danger of ISIS pulling off a nuclear, chemical, biological or other mass death 9/11style attack in a major American or European city is real. Even with dirty or primitive WMD weapons, the casualty totals could be catastrophic. ISIS must be defeated and destroyed. This will not be achieved with "boots on the ground" proxies from Iraqi or Kurd forces alone, though Kurdish forces should immediately receive strong military assistance. America should not initiate another massive Iraq ground war. What is needed is a multinational special ops strike force made up of 10,000 troops from NATO nations and possibly Arab League nations. ANY WMD attack on U.S. Soil Would Escalate – Miscalculation and Command Confusion Hellman 8 (Martin E. Hellman, emeritus prof of engineering @ Stanford, “Risk Analysis of Nuclear Deterrence” SPRING 2008 THE BENT OF TAU BETA PI, http://www.nuclearrisk.org/paper.pdf) The threat of nuclear terrorism looms much larger in the public’s mind than the threat of a full-scale nuclear war, yet this article focuses primarily on the latter. An explanation is therefore in order before proceeding. A terrorist attack involving a nuclear weapon would be a catastrophe of immense proportions: “A 10-kiloton bomb detonated at Grand Central Station on a typical work day would likely kill some half a million people, and inflict over a trillion dollars in direct economic damage. America and its way of life would be changed forever.” [Bunn 2003, pages viii-ix]. The likelihood of such an attack is also significant. Former Secretary of Defense William Perry has estimated the chance of a nuclear MSDI Terror DA 86 terrorist incident within the next decade to be roughly 50 percent [Bunn 2007, page 15]. David Albright, a former weapons inspector in Iraq, estimates those odds at less than one percent, but notes, “We would never accept a situation where the chance of a major nuclear accident like Chernobyl would be anywhere near 1% .... A nuclear terrorism attack is a low-probability event, but we can’t live in a world where it’s anything but extremely low-probability.” [Hegland 2005]. In a survey of 85 national security experts, Senator Richard Lugar found a median estimate of 20 percent for the “probability of an attack involving a nuclear explosion occurring somewhere in the world in the next 10 years,” with 79 percent of the respondents believing “it more likely to be carried out by terrorists” than by a government [Lugar 2005, pp. 14-15]. I support increased efforts to reduce the threat of nuclear terrorism, but that is not inconsistent with the approach of this article. Because terrorism is one of the potential trigger mechanisms for a full-scale nuclear war, the risk analyses proposed herein will include estimating the risk of nuclear terrorism as one component of the overall risk. If that risk, the overall risk, or both are found to be unacceptable, then the proposed remedies would be directed to reduce which- ever risk(s) warrant attention. Similar remarks apply to a number of other threats (e.g., nuclear war between the U.S. and China over Taiwan). his article would be incomplete if it only dealt with the threat of nuclear terrorism and neglected the threat of full- scale nuclear war. If both risks are unacceptable, an effort to reduce only the terrorist component would leave humanity in great peril. In fact, society’s almost total neglect of the threat of full-scale nuclear war makes studying that risk all the more important. The cosT of World War iii The danger associated with nuclear deterrence depends on both the cost of a failure and the failure rate.3 This section explores the cost of a failure of nuclear deterrence, and the next section is concerned with the failure rate. While other definitions are possible, this article defines a failure of deterrence to mean a full-scale exchange of all nuclear weapons available to the U.S. and Russia, an event that will be termed World War III. Approximately 20 million people died as a result of the first World War. World War II’s fatalities were double or triple that number—chaos prevented a more precise deter- mination. In both cases humanity recovered, and the world today bears few scars that attest to the horror of those two wars. Many people therefore implicitly believe that a third World War would be horrible but survivable, an extrapola- tion of the effects of the first two global wars. In that view, World War III, while horrible, is something that humanity may just have to face and from which it will then have to recover. In contrast, some of those most qualified to assess the situation hold a very different view. In a 1961 speech to a joint session of the Philippine Con- gress, General Douglas MacArthur, stated, “Global war has become a Frankenstein to destroy both sides. … If you lose, you are annihilated. If you win, you stand only to lose. No longer does it possess even the chance of the winner of a duel. It contains now only the germs of double suicide.” Former Secretary of Defense Robert McNamara ex- pressed a similar view: “If deterrence fails and conflict develops, the present U.S. and NATO strategy carries with it a high risk that Western civilization will be destroyed” [McNamara 1986, page 6]. More recently, George Shultz, William Perry, Henry Kissinger, and Sam Nunn4 echoed those concerns when they quoted President Reagan’s belief that nuclear weapons were “totally irrational, totally inhu- mane, good for nothing but killing, possibly destructive of life on earth and civilization.” [Shultz 2007] Official studies, while couched in less emotional terms, still convey the horrendous toll that World War III would exact: “The resulting deaths would be far beyond any precedent. Executive branch calculations show a range of U.S. deaths from 35 to 77 percent (i.e., 79-160 million dead) … a change in targeting could kill somewhere between 20 million and 30 million additional people on each side .... These calculations reflect only deaths during the first 30 days. Additional millions would be injured, and many would eventually die from lack of adequate medical care … millions of people might MSDI Terror DA 87 starve or freeze during the follow- ing winter, but it is not possible to estimate how many. … further millions … might eventually die of latent radiation effects.” [OTA 1979, page 8] This OTA report also noted the possibility of serious ecological damage [OTA 1979, page 9], a concern that as- sumed a new potentiality when the TTAPS report [TTAPS 1983] proposed that the ash and dust from so many nearly simultaneous nuclear explosions and their resultant fire- storms could usher in a nuclear winter that might erase homo sapiens from the face of the earth, much as many scientists now believe the K-T Extinction that wiped out the dinosaurs resulted from an impact winter caused by ash and dust from a large asteroid or comet striking Earth. The TTAPS report produced a heated debate, and there is still no scientific consensus on whether a nuclear winter would follow a full-scale nuclear war. Recent work [Robock 2007, Toon 2007] suggests that even a limited nuclear exchange or one between newer nuclear-weapon states, such as India and Pakistan, could have devastating long-lasting climatic consequences due to the large volumes of smoke that would be generated by fires in modern megacities. While it is uncertain how destructive World War III would be, prudence dictates that we apply the same engi- neering conservatism that saved the Golden Gate Bridge from collapsing on its 50th anniversary and assume that preventing World War III is a necessity—not an option. MSDI Terror DA 88 Impacts MSDI Terror DA 89 Nuke Terror MSDI Terror DA 90 Dirty Bomb Risk High Dirty bomb risks increasing, insecure nuclear material world-wide Bunn & Tobey, 5-20-15, The Hill, “Don’t weaken our defenses against nuclear smuggling,” http://thehill.com/blogs/congress-blog/homeland-security/242566-dont-weaken-our-defenses-againstnuclear-smuggling DOA: 5-25-15 Bunn is a professor at Harvard Kennedy School and co-principal investigator for the Kennedy School’s Project on Managing the Atom. Tobey is a senior fellow at Harvard Kennedy School’s Belfer Center and former deputy administrator for Defense Nuclear Nonproliferation at the National Nuclear Security Administration. Roth is research associate with the Belfer Center’s Project on Managing the Atom. The possibility of a terrorist detonating a “dirty bomb” or even a crude nuclear bomb is one of the gravest threats facing the United States today. Yet the House Armed Services Committee is pushing a bill that would prohibit funding for fixed radiation detectors to catch nuclear smugglers – both for installing new ones and even for maintaining the ones U.S. taxpayers have already paid billions to install. Radiation detection is a highly imperfect line of defense. Once nuclear material has left the facility where it is supposed to be, it could be anywhere, and recovering it poses an enormous challenge. The immense length of national borders, the huge scale of legitimate traffic, the myriad pathways across these borders, and the small size and sometimes weak radiation signal of the nuclear and radiological materials terrorists might be seeking combine to make nuclear smuggling extraordinarily difficult to stop. But that hardly justifies giving up. From airports to bridges across major waterways to the loading stations at container ports, there are many locations where fixed radiation detectors make sense. A balanced program to defeat nuclear smugglers must include strong security to keep material from being stolen in the first place, effective law enforcement and intelligence work, and interdiction efforts and border controls backed by both fixed and mobile radiation detectors. These elements work together, reinforcing each other’s effectiveness. In addition to detecting stolen radioactive and nuclear material, fixed radiation detectors deter smugglers from using official borders, limiting their options and making them easier to catch. As a military leader in Azerbaijian—which shares borders with Russia—recently argued, “to leave an unequipped border crossing is like leaving the window open.” For nearly twenty years, both Republicans and Democrats in Congress and the White House have invested billions in putting in place a network of thousands of fixed radiation detectors in more than fifty countries. Cutting off funding now would mean abandoning partners across the world, after years of painstaking diplomacy – and would undermine the investment already made, reducing the chance that existing detectors would continue to be used effectively. As much of the nuclear and radiological material smuggled to date has come from Russia—a country with hundreds of tons of nuclear weapons material spread across dozens of facilities—detecting smuggling from Russia is vital. It became even more important last year, when Russia halted nearly all work with the United States on improving the security of its nuclear stockpiles, increasing the risk of nuclear theft and smuggling. The good news is that before the recent crisis in U.S.-Russian relations, Russia and the United States worked together to install a ring of detectors at all of Russia’s official border crossings. The bad news is that the conflict in Ukraine has effectively erased some of those borders, and Russia’s customs union with Belarus and Kazakhstan means goods flow across those borders unchecked. Hence, there is a clear need to install more fixed MSDI Terror DA 91 radiation detectors to patch the holes in the system already put in place. Beyond Russia, there is radiological material located at thousands of inadequately protected sites in more than a hundred countries. These vulnerabilities, combined with the rise of groups like the Islamic State who are bent on mass violence and terror, make deliberately weakening defenses against nuclear smugglers recklessly negligent. MSDI Terror DA 92 General High Risk Risk of nuclear terror is high and likely Ogilvie-White 2014 Dr Tanya Ogilvie-White, former senior analyst at the Australian Strategic Policy Institute; Stanton nuclear security fellow at the International Institute for Strategic Studies, senior lecturer in international relations at the University of Canterbury, Preventing Nuclear Terrorism, Australia’s Leadership Role, https://www.aspi.org.au/publications/preventing-nuclear-terrorism-australias-leadershiprole/SR63_prevent_nuclear_terrorism.pdf The main worry about the theft and trafficking of nuclear and radiological materials is that they will end up in the hands of terrorist groups, who will use them in INDs or RDDs. Even in the case of an RDD, which is a more likely scenario but would be much less lethal than an IND, radioactive contamination in a densely populated area could have serious economic and social consequences. Although a successful RDD attack has never been perpetrated, there’s evidence that terrorists have invested in such devices: Chechen separatists were involved in two incidents involving radioactive materials in November 1995 and December 1998, and more recently intelligence agencies in mainland Europe, Thailand, the UK and the US have managed to foil RDD plots before they reached fruition. In 2012, the International Atomic Energy Agency (IAEA) Incident and Trafficking Database reported 160 incidents involving the illegal trade and movement of nuclear or other radioactive material across national borders. Of those, 17 involved possession and related criminal activities, 24 involved theft or loss and 119 involved other unauthorised activities. Two incidents involved highly enriched uranium (HEU) in unauthorised activities. There were also three incidents involving dangerous Category 1–3 radioactive sources, two of which were thefts. Information reported to the database demonstrates that: • the availability of unsecured nuclear and other radioactive material persists • although effective border control measures help to detect illicit trafficking, effective controls aren’t uniformly implemented at all international border points • individuals and groups are prepared to engage in trafficking this material. The possibility of RDD or, worse, IND detonation is real and, while the risks need to be kept in perspective, they need to be taken seriously. One of the most worrying recent cases of illicit trafficking involving HEU occurred in June 2011 in Moldova, where officials arrested six people with a quantity of weapon-grade material. The group claimed to have access to plutonium and up to 9 kilograms of HEU, which they were willing to sell for $31 million. A serious buyer, reportedly of North African origin, appears to have been involved and remains at large. Research reactors are considered vulnerable to thefts of nuclear and radiological materials because they’re often located on university campuses or in larger scientific research centres, which are relatively open to the public or have many users and visitors. Moreover, other than the amended Convention on the Physical Protection of Nuclear Material, which has yet to enter into force, there’s no internationally binding requirement for securing these facilities. Since 2003, however, the US and the IAEA have been working with various countries to reduce the risks associated with research reactors. Many countries with HEU-fuelled research reactors, including some in Australia’s near neighbourhood, have taken part in securing HEU and converting the reactors to use low-enriched uranium (LEU). In particular, HEU has been removed and secured from Indonesia, the Philippines, Thailand and, most recently, Vietnam. Of course, LEU-fuelled research reactors remain a target for terrorists who wish to spread ionising radiation or damage a symbolic facility representing technological MSDI Terror DA 93 progress, and most research reactors have substantial quantities of sealed sources that are potentially vulnerable to theft. MSDI Terror DA 94 Al Qaeda Risk High Al Qaeda likely to use WMDs – extreme ideology, no fear of counterattack, ambitious goals and they are likely to attack the US homeland Nathan Myhrvold, 13, July 2013, Myhrvold is chief executive and founder of Intellectual Ventures and a former chief technology officer at Microsoft. “Strategic Terrorism: A Call to Action,” http://www.lawfareblog.com/wp-content/uploads/2013/07/Strategic-Terrorism-Myhrvold-7-3-2013.pdf The risk that al Qaeda or some future group will use equally terrible weapons seems higher on every level. its geopolitical goals are, if anything, more ambitious than the soviets’ were. al Qaeda’s ideology is more extreme. The group’s vulnerability to counterattack or reprisal is far lower than anything the soviets faced—it has already survived the worst our nation can throw at it. The terrorists have demonstrated a shocking degree of ruthlessness. Under any theory of risk, these foes must be considered more likely to act than the soviets ever were. Another reason terrorists would attack is the oldest jus- tification in the world—because we’re trying to get them. it’s no secret that the United states aims to exterminate al Qaeda and similar terrorist groups—and rightly so. With revenge and selfpreservation on their minds, our primary adversaries are not likely to show us unnecessary mercy. A more mundane reason to worry is that the informa- tion cascade that empowers stateless groups will ultimately demand more numerous and spectacular demonstrations of power to feed popular interest. terrorism survives by making a big impact, and when the world gets desensitized to beheadings, the temptation to one-up the last attack increases. Similarly, the arc of terrorism in iraq—which spiked dramatically from 2004 through 2007 and then leveled off, only to resurge somewhat recently—may foreshadow an increasing risk to the United states. terrorists quite ratio- nally sought to destabilize iraq and afghanistan as a way to humble the United states and influence its policy by forcing a pullout. That strategy focused terrorists’ atten- tion more on these countries and possibly distracted some groups from directly attacking U.s. territory. as U.s. forces withdraw from the region, these targets become less interesting. What next? al Qaeda and other stateless groups will seek to build on their previous successes. They have successfully carved out a safe haven for them- selves in the lawless frontiers of Pakistan. dramatic attacks on the american homeland would be a natural next step. The decentralized nature of stateless organizations raises another set of concerns. once mass death becomes accessible to small groups, it is unclear who would be in control. This lack of direction has already been seen in vari- ous al Qaeda attacks in saudi arabia and europe, some of which clearly hurt the cause of islamic terrorists. They took place because no single chain of command exists in the overall movement—it is, at best, a loose confederacy. an additional issue might be called the “craziness fac- tor.” small groups can have crazy goals. The smaller the group, the crazier they may be. The apocalyptic death cult aum shinrikyo is a case in point. Kaczynski is another example. The belief that terror groups will not use terrible weapons if they get them seems foolish in the extreme. to borrow a phrase from A Streetcar Named Desire, to hold this belief is, in effect, to rely “on the kindness of ” terror- ists. any rational analysis must assign a substantial amount of the terror risk to large-scale, high-magnitude events. yet that is not how our defenses are organized and not how we are spending our resources. instead, we focus most of our MSDI Terror DA 95 counterterrorism efforts on thwarting small-scale attacks— by, for example, confiscating grandma’s four-ounce bottle of hand lotion at the airport. Terrorists attempting to gain access to WMDs Bergen, et al, September 2013, Jihadist Terrorism: A Threat Assessment, http://bipartisanpolicy.org/sites/default/files/Jihadist%20Terrorism-A%20Threat%20Assesment_0.pdf Peter Bergen is the author of four books about al-Qaeda, three of which were New York Times best sellers. The books have been translated into 20 languages. He is the director of the National Security Program at the New America Foundation in Washington, D.C.; a fellow at Fordham University’s Center on National Security; and CNN’s national security analyst. However, the fact that jihadist extremists in the United States have shown no interest in CBRN weapons does not eliminate the need for securing potential sources of chemical, biological, and radiological agents. According to a count by the New America Foundation, since 2001, 13 extremists motivated by right-wing ideologies, one left-wing militant, and two individuals with idiosyncratic motives have deployed, acquired, or tried to acquire chemical, biological, or radiological weapons. For example, William Krar and Judith Bruey, two anti-government extremists, possessed precursor chemicals for hydrogen cyanide gas, which they discussed deploying through a building’s ventilation system.10 They were arrested in 2003. Zawahiri’s new goal is acquisition of a nuclear bomb – risk of al Qaeda nuclear attack is high Kanani, Editor of World Affairs Commentary, 6-29-’11 (Rahim, “New al-Qaeda Chief Zawahiri Has Strong Nuclear Intent” Forbes, http://www.forbes.com/sites/rahimkanani/2011/06/29/new-al-qaeda-chief-zawahiri-has-strongnuclear-intent/) We should be especially worried about the threat of nuclear terrorism under Zawahiri’s leadership. In a recent report titled “Islam and the Bomb: Religious Justification For and Against Nuclear Weapons”, which I researched for and contributed to, lead author Rolf Mowatt-Larssen, former director of intelligence and counterintelligence at the U.S. Department of Energy, argues that al-Qaeda’s WMD ambitions are stronger than ever. And that “this intent no longer feels theoretical, but operational. “I believe al-Qaeda is laying the groundwork for a large scale attack on the United States, possibly in the next year or two,” continues Mowatt-Larssen in the opening of the report issued earlier this year by the Belfer Center for Science and International Affairs at Harvard Kennedy School. “The attack may or may not involve the use of WMD, but there are signs that al-Qaeda is working on an event on a larger scale than the 9/11 attack. Most will readily dismiss such claims as implausible and unlikely, and we hope they are right, but after spending months with Mowatt-Larssen, who also served as the former head of the Central Intelligence Agency’s WMD and terrorism efforts, scrutinizing and cross-referencing Zawahiri’s 268-page treatise published in 2008 titled “Exoneration”, the analytics steered us towards something far more remarkable than expected. MSDI Terror DA 96 ISIS Risk High ISIS Can Buy, Build or Steal Nuclear Weapons – Just a Matter of Time Russ Wellen, 10-21-2014, "Is the Islamic State Capable of Nuclear Terrorism?," Foreign Policy In Focus, http://fpif.org/islamic-state-capable-nuclear-terrorism/ After 9/11, many feared that Al Qaeda would get its hands on nuclear weapons. Such fears were stoked by the far right, especially the books of journalist Paul Williams with their provocative titles: Osama’s Revenge: The Next 9/11 and The Al Qaeda Connection: International Terrorism, Organized Crime, And the Coming Apocalypse. (Yes, I read them at the time; ate them up even.) In fact, Al Qaeda had made attempts to obtain nuclear materials. In 2007 at the New Yorker, Steve Coll asked: Can the United States be made safe from nuclear terrorism? Even the Belfer Center of the Harvard Kennedy School issued a report in 2010. Key excerpt: Al Qaeda’s patient, decade-long effort to steal or construct an improvised nuclear device (IND) flows from their perception of the benefits of producing the image of a mushroom cloud rising over a US city, just as the 9/11 attacks have altered the course of history. This lofty aim helps explains why al Qaeda has consistently sought a bomb capable of producing a nuclear yield, as opposed to settling for the more expedient and realistic course of devising a “dirty bomb,” or a radiological dispersal device. Now such fears are beginning to be transferred to the Islamic State. Ploughshares Fund President Joseph Cirincione: [The Islamic State, or ISIS’s] seizure of banks and oil fields gave it more than $2 billion in assets. If ISIS could make the right connection to corrupt officials in Russia or Pakistan, the group might be able to buy enough highly enriched uranium (about 50 pounds) and the technical help to build a crude nuclear device. Militants recruited from Europe or America could help smuggle it into their home nations. Or ISIS could try to build a “dirty bomb,” conventional explosives like dynamite laced with highly radioactive materials. The blast would not kill many directly, but it would force the evacuation of tens of square blocks contaminated with radioactive particles. The terror and economic consequences of a bomb detonated in the financial districts of London or New York would be enormous. [Also] ISIS could also try to get chemical weapons, such as deadly nerve gases or mustard gas. Fortunately, the most likely source of these terror weapons was just eliminated. How would it pull that off? The Times of India reported on one fanciful idea the Islamic State had, as explained in a “manifesto believed to have been written by Abdullah Ahmed al-Meshedani, a member of the group’s highly secretive six-man war cabinet.” The document, typed on perforated sheets, was seized by Iraqi special forces during a raid in March on the home of one of the commanders of ISIS, The Sunday Times reported today. And from whom does the Islamic State propose to obtain nuclear knowhow, material, or actual weapons? In the document, which has been examined by western security officials — who believe it to be authentic — Meshedani wrote that ISIS aims to get hold of nuclear weapons with the help of Russia, to whom it would offer access to gas fields it controls in Iraq’s Anbar province. And as long as you’re sharing nuclear weapons with us, Russia, one more little thing: Also, the documents said, Kremlin will have to give up “Iran and its nuclear programme and hands over its secrets.” Russia would also have to abandon support for Syrian President Bashar al-Assad and back the Gulf States against Iran. It may not be much of a problem now, but it could be some day. On October 1 the New York Daily News reported on a statement by British Home Secretary Theresa May (emphasis added): “If (ISIS) succeeds in firmly consolidating their grip on the land they occupy in Syria and Iraq, we will see the world’s first truly terrorist state established within a few hours flying time of our country,” … Britain and the West cannot cede ISIS “the space to plot attacks against us, train their men and women, MSDI Terror DA 97 and devise new methods to kill indiscriminately,” she said. “We will see the risk, often prophesied, but thank God not yet fulfilled, that with the capability of a state behind them, the terrorists will acquire chemical, biological or even nuclear weapons to attack us.” ISIS Thumps General Nuke Terror Defense – It has Massive Resources and International Connections Budowsky, Budowsky was an aide to former Sen. Lloyd Bentsen and Bill Alexander, then chief deputy majority whip of the House. He holds an LL.M. degree in international financial law from the London School of Economics., 8-20-2014, "Budowsky: ISIS poses nuclear 9/11 threat," TheHill, http://thehill.com/opinion/brent-budowsky/215603-brent-budowsky-isis-poses-9-11-scope-threat Analysts estimate that ISIS has amassed a cash hoard of between $400 million and $2 billion. It is highly probable that ISIS will attempt to use some of this money to obtain nuclear, chemical, biological or other weapons of mass death on the international black market or from corrupt officials in nations such as Russia, China, Pakistan or North Korea to use in attacks against New York, Washington, London, Paris, Berlin, Rome, Brussels or other nations it considers infidel enemies. This danger is magnified by the fact that ISIS has recruited nationals of the United States and Europe, who possess American and European passports and are physically indistinguishable from local populations in America and Europe. It is extraordinary that the mass murdering butchery of ISIS is so demented than even al Qaeda is offended. It is alarming that the CIA, which launched intelligence operations even against the United States Senate, and the NSA, which launched massive and unprecedented eavesdropping operations, and intelligence services of leading European nations were blind to the magnitude of the ISIS threat until the most barbaric terrorists in modern history had taken over almost a third of Iraq and are on the brink of creating a terrorist super-state that dwarfs al Qaeda’s efforts prior to 9/11. I vehemently opposed the misguided Iraq War from the moment it was proposed by former President George W. Bush and have never been a neoconservative, warmonger or super-hawk. But aggressive action against ISIS is urgently needed. ISIS has stated its intention to attack the United States and Europe to advance its evil, messianic and genocidal ideology and ambitions. ISIS has the money to purchase the most deadly weapons in the world, and has recruited American and European traitors with above-average capability to execute an attack. The odds that ISIS can obtain nuclear, chemical, biological or other forms of mass destruction weapons are impossible to ascertain but in a world of vast illegal arms trafficking, with so many corrupt officials in nations possessing arsenals of destruction, the danger is real. The fact that WMD scares prior to the Iraq War ranged from mistaken to deceitful does not mean that the WMD danger does not exist today. It does. MSDI Terror DA 98 Yes Extinction MSDI Terror DA 99 Nuke Taboo An attack breaks the nuclear taboo – leads to nuclear war. Li Bin 2009 "An Investigation of China – U.S. Strategic Stability" Prof. Li Bin is a leading Chinese expert on arms control and is currently the director of Arms Control Program at the Institute of International Studies, Tsinghua University. He received his Bachelor and Master Degrees in Physics from Peking University before joining China Academy of Engineering Physics (CAEP) to pursue a doctorate in the technical aspects of arms control. He served as a part-time assistant on arms control for the Committee of Science, Technology and Industry for National Defense (COSTIND).Upon graduation Dr. Li entered the Institute of Applied Physics and Computational Mathematics (IAPCM) as a research fellow and joined the COSTIND technical group supporting Chinese negotiation team on Comprehensive Test Ban Treaty (CTBT). He attended the final round of CTBT negotiations as a technical advisor to the Chinese negotiating team. Nie Hongyi is an officer in the People’s Liberation Army with an MA from China’s National Defense University and a Ph.D. in International Studies from Tsinghua University, which he completed in 2009 under Prof. Li Bin. The nuclear taboo is a kind of international norm and this type of norm is supported by the promotion of the norm through international social exchange. But at present the increased threat of nuclear terrorism has lowered people’s confidence that nuclear weapons will not be used. China and the United States have a broad common interest in combating nuclear terrorism. Using technical and institutional measures to break the foundation of nuclear terrorism and lessen the possibility of a nuclear terrorist attack can not only weaken the danger of nuclear terrorism itself but also strengthen people’s confidence in the nuclear taboo, and in this way preserve an international environment beneficial to both China and the United States. In this way even if there is crisis in China-U.S. relations caused by conflict, the nuclear taboo can also help both countries reduce suspicions about the nuclear weapons problem, avoid miscalculation and thereby reduce the danger of a nuclear war. MSDI Terror DA 100 Miscalculation Causes accidental US-Russia nuclear war. Barrett et al. 13 – (6/28, Anthony, PhD, Engineering and Public Policy from Carnegie Mellon University, Director of Research, Global Catastrophic Risk Institute, Fellow in the RAND Stanton Nuclear Security Fellows Program, Seth Baum, PhD, Geography, Pennsylvania State University, Executive Director, GCRI, Research Scientist at the Blue Marble Space Institute of Science, former Visiting Scholar position at the Center for Research on Environmental Decisions at Columbia University, and Kelly Hostetler, Research Assistant, GCRI, “Analyzing and Reducing the Risks of Inadvertent Nuclear War Between the United States and Russia,” Science and Global Security 21(2): 106-133, pre-print, available online) War involving significant fractions of the U.S. and Russian nuclear arsenals, which are by far the largest of any nations, could have globally catastrophic effects such as severely reducing food production for years,1 potentially leading to collapse of modern civilization worldwide and even the extinction of humanity.2 Nuclear war between the United States and Russia could occur by various routes, including accidental or unauthorized launch; deliberate first attack by one nation; and inadvertent attack. In an accidental or unauthorized launch or detonation, system safeguards or procedures to maintain control over nuclear weapons fail in such a way that a nuclear weapon or missile launches or explodes without direction from leaders. In a deliberate first attack, the attacking nation decides to attack based on accurate information about the state of affairs. In an inadvertent attack, the attacking nation mistakenly concludes that it is under attack and launches nuclear weapons in what it believes is a counterattack.3 (Brinkmanship strategies incorporate elements of all of the above, in that they involve intentional manipulation of risks from otherwise accidental or inadvertent launches.4 ) Over the years, nuclear strategy was aimed primarily at minimizing risks of intentional attack through development of deterrence capabilities, though numerous measures were also taken to reduce probabilities of accidents, unauthorized attack, and inadvertent war. For purposes of deterrence, both U.S. and Soviet/Russian forces have maintained significant capabilities to have some forces survive a first attack by the other side and to launch a subsequent counterattack. However, concerns about the extreme disruptions that a first attack would cause in the other side’s forces and command-and-control capabilities led to both sides’ development of capabilities to detect a first attack and launch a counterattack before suffering damage from the first attack.5 Many people believe that with the end of the Cold War and with improved relations between the United States and Russia, the risk of East-West nuclear war was significantly reduced.6 However, it has also been argued that inadvertent nuclear war between the United States and Russia has continued to present a substantial risk.7 While the United States and Russia are not actively threatening each other with war, they have remained ready to launch nuclear missiles in response to indications of attack.8 False indicators of nuclear attack could be caused in several ways. First, a wide range of events have already been mistakenly interpreted as indicators of attack, including weather phenomena, a faulty computer chip, wild animal activity, and control-room training tapes loaded at the wrong time.9 Second, terrorist groups or other actors might cause attacks on either the United States or Russia that resemble some kind of nuclear attack by the other nation by actions such as exploding a stolen or improvised nuclear bomb,10 especially if such an event occurs during a crisis between the United States and Russia.11 A variety of nuclear terrorism scenarios are MSDI Terror DA 101 possible.12 Al Qaeda has sought to obtain or construct nuclear weapons and to use them against the United States.13 Other methods could involve attempts to circumvent nuclear weapon launch control safeguards or exploit holes in their security.14 It has long been argued that the probability of inadvertent nuclear war is significantly higher during U.S.-Russian crisis conditions,15 with the Cuban Missile Crisis being a prime historical example. It is possible that U.S.-Russian relations will significantly deteriorate in the future, increasing nuclear tensions. There are a variety of ways for a third party to raise tensions between the United States and Russia, making one or both nations more likely to misinterpret events as attacks. MSDI Terror DA 102 U.S. Lash out A new WMD terrorist attack will Cause the U.S. to Lash out Greg Easterbrook, senior editor with THE NEW REPUBLIC, November 2001, p. www.cnn.com/TRANSCRIPTS/0111/01/gal.00.html. (UNDRG/C324) Terrorists may not be held by this, especially suicidal terrorists, of the kind that al Qaeda is attempting to cultivate. But I think, if I could leave you with one message, it would be this: that the search for terrorist atomic weapons would be of great benefit to the Muslim peoples of the world in addition to members, to people of the United States and Western Europe, because if an atomic warhead goes off in Washington, say, in the current environment or anything like it, in the 24 hours that followed, a hundred million Muslims would die as U.S. nuclear bombs rained down on every conceivable military target in a dozen Muslim countries. That Domino’s into Global Nuclear War Mohamed Sid-Ahmed, Al-Ahram Weekly political analyst, 2004 [Al-Ahram Weekly, "Extinction!" 8/26, no. 705, http://weekly.ahram.org.eg/2004/705/op5.htm] What would be the consequences of a nuclear attack by terrorists? Even if it fails, it would further exacerbate the negative features of the new and frightening world in which we are now living. Societies would close in on themselves, police measures would be stepped up at the expense of human rights, tensions between civilisations and religions would rise and ethnic conflicts would proliferate. It would also speed up the arms race and develop the awareness that a different type of world order is imperative if humankind is to survive. But the still more critical scenario is if the attack succeeds. This could lead to a third world war, from which no one will emerge victorious. Unlike a conventional war which ends when one side triumphs over another, this war will be without winners and losers. When nuclear pollution infects the whole planet, we will all be losers. MSDI Terror DA 103 Econ Collapse A nuclear terror attack in the U.S. will collapse the global financial markets William J. Perry is the Michael and Barbara Berberian Professor at Stanford University. He is a senior fellow at Freeman Spogli Institute for International Studies and serves as codirector of the Preventive Defense Project, ANNALS OF THE AMERICAN ACADEMY OF POLITICAL AND SOCIAL SCIENCE, September 2006, p. 86 Of course, terrorists setting off a nuclear bomb on U.S. soil would not be equivalent to the nuclear holocaust threatened during the cold war. But it would be the single worst catastrophe this country has ever suffered. Just one bomb could result in more than one hundred thousand deaths, and there could be more than one attack. The direct economic losses from the blast would be hundreds of billions of dollars, but the indirect economic impact would be even greater, as worldwide financial markets would collapse in a way that would make the market setback after 9/11 seem mild. And the social and political effects are incalculable, especially if the weapon were detonated in Washington or Moscow or London, crippling the government of that nation. Global economic crisis causes war---strong statistical support Royal 10 – Jedediah Royal, Director of Cooperative Threat Reduction at the U.S. Department of Defense, 2010, “Economic Integration, Economic Signaling and the Problem of Economic Crises,” in Economics of War and Peace: Economic, Legal and Political Perspectives, ed. Goldsmith and Brauer, p. 213-214 Less intuitive is how periods of economic decline may increase the likelihood of external conflict. Political science literature has contributed a moderate degree of attention to the impact of economic decline and the security and defence behaviour of interdependent states. Research in this vein has been considered at systemic, dyadic and national levels. Several notable contributions follow. First, on the systemic level, Pollins (2008) advances Modelski and Thompson’s (1996) work on leadership cycle theory, finding that rhythms in the global economy are associated with the rise and fall of pre-eminent power and the often bloody transition from one pre-eminent leader to the next. As such, exogenous shocks such as economic crises could usher in a redistribution of relative power (see also Gilpin, 10981) that leads to uncertainty about power balances, increasing the risk of miscalculation (Fearon, 1995). Alternatively, even a relatively certain redistribution of power could lead to a permissive environment for conflict as a rising power may seek to challenge a declining power (Werner, 1999). Seperately, Polllins (1996) also shows that global economic cycles combined with parallel leadership cycles impact the likelihood of conflict among major, medium, and small powers, although he suggests that the causes and connections between global economic conditions and security conditions remain unknown. Second, on a dyadic level, Copeland’s (1996,2000) theory of trade expectations suggests that ‘future expectation of trade’ is a significant variable in understanding economic conditions and security behavior of states. He argues that interdependent states are likely to gain pacific benefits from trade so long as they have an optimistic view of future trade relations. However, if the expectation of future trade decline, particularly for difficult to replace items such as energy resources, the likelihood for conflict increases , as states will be inclined to use force to gain access to those resources. Crises could potentially be the MSDI Terror DA 104 trigger for decreased trade expectations either on its own or because it triggers protectionist moves by interdependent states. Third, others have considered the link between economic decline and external armed conflict at a national level. Blomberg and Hess (2002) find a strong correlation between internal conflict and external conflict, particularly during periods of economic downturn. They write, The linkages between internal and external conflict and prosperity are strong and mutually reinforcing. Economic conflict tends to spawn internal conflict, which in turn returns the favour. Moreover, the presence of a recession tends to amplify the extent to which international and external conflicts self-reinforce each other. (Blomberg & Hess, 2002, p.89). Economic decline has also been linked with an increase in the likelihood of terrorism (Blomberg, Hess, & Weerapana, 2004), which has the capacity to spill across borders and lead to external tensions. Furthermore, crises generally reduce the popularity of a sitting government. ‘Diversionary theory’ suggests that, when facing unpopularity arising from economic decline, sitting governments have increased incentives to create a ‘rally round the flag’ effect. Wang (1996), DeRouen (1995), and Blomberg, Hess and Thacker (2006) find supporting evidence showing that economic decline and use of force are at least indirectly correlated. Gelpi (1997) Miller (1999) and Kisanganie and Pickering (2009) suggest that the tendency towards diversionary tactics are greater for democratic states than autocratic states, due to the fact that democratic leaders are generally more susceptible to being removed from office due to lack of domestic support. DeRouen (2000) has provided evidence showing that periods of weak economic performance in the United States, and thus weak presidential popularity, are statistically linked to an increase in the use of force. MSDI Terror DA 105 Middle East Escalation Instability in The Middle East ensures that Nuclear Terror Would cause a Surge in Extremism against a pre-occupied U.S. and it’s allies – Iran, Pakistan, Israel and Independent Nuclear Terror Attacks are all likely to cause War Freilich 10 – (2010, Chuck, PhD, Senior Fellow at the International Security Program, Harvard Kennedy School, Adjunct Professor at New York University, former Deputy National Security Adviser in Israel, “The Armageddon Scenario: Israel and the Threat of Nuclear Terrorism,” THE BEGIN-SADAT CENTER FOR STRATEGIC STUDIES BAR-ILAN UNIVERSITY, Mideast Security and Policy Studies No. 84, http://www.biu.ac.il/SOC/besa/MSPS84.pdf) The Middle East is a demographic, socio-economic, political, and military time bomb waiting to explode. Even before the recent global economic crisis, unemployment in Arab countries was the highest in the world, including among young people. Economic growth in the Middle East is likely to remain stagnant, with the region falling further behind the rest of the world. When combined with the highly combustible winds of religious fundamentalism, the danger of nuclear terrorism is particularly acute in this region.23 There is little reason to believe that regional governments will permit political reform and greater selfexpression, and political grievances will likely continue to be expressed in extremist and fundamentalist terms which render them inviolate and non-negotiable. For example, there is no assurance that Egyptian President Hosni Mubarak will be succeeded by a moderate and peaceful leader, or that Egypt will not become a radical Islamic state. The long anticipated regime change in Iran may give rise to a more moderate government, but may also result in an even more radical one. Saudi Arabia’s future is also questionable. Even the future of Turkey, heretofore held out as a beacon of democracy and secularism within the Muslim world, is unclear. Hatred of Israel, the US, and the West is likely to continue and possibly intensify. Progress towards peace with Israel and improvements in Arab-Western relations are unlikely to be sufficient to reduce the evolving socio-economic, political, and demographic pressures. The Middle East faces another explosion today – of potential nuclear capabilities. Not only Israel, but also the Sunni Arab regimes, are deeply afraid of Iran's nuclear capabilities. In response, over a dozen Arab countries have announced civil military programs. Arab “civil” nuclear programs, as seen from past experience, have a nasty tendency to morph into military ones. The danger of nuclear terrorism, further abetted by the spread of nuclear technology and materials in the region, will be greatly exacerbated by the rise of a multi-polar nuclear Middle East. Nuclear terrorism could give rise to a broader war in the Middle East and even lead to nuclear war. Nuclear war could give rise to more nuclear terrorism.24 Escalates and Leads to extinctions Russell 09 (James A. Russell, senior lecturer in the Department of National Security Affairs at the Naval Postgraduate School, “Strategic Stability Reconsidered: Prosepects for Nuclear War and Escalation in the Middle East,” in collaboration with the Atomic Energy Commission, http://www.nps.edu/academics/sigs/ccc/people/biolinks/russell/PP26_Russell_2009.pdf) MSDI Terror DA 106 Strategic stability in the region is thus undermined by various factors: (1) asymmetric interests in the bargaining framework that can introduce unpredictable behavior from actors; (2) the presence of nonstate actors that introduce unpredictability into relationships between the antagonists; (3) incompatible assumptions about the structure of the deterrent relationship that makes the bargaining framework strategically unstable; (4) perceptions by Israel and the United States that its window of opportunity for military action is closing, which could prompt a preventive attack; (5) the prospect that Iran’s response to pre-emptive attacks could involve unconventional weapons, which could prompt escalation by Israel and/or the United States; (6) the lack of a communications framework to build trust and cooperation among framework participants. These systemic weaknesses in the coercive bargaining framework all suggest that escalation by any the parties could happen either on purpose or as a result of miscalculation or the pressures of wartime circumstance. Given these factors, it is disturbingly easy to imagine scenarios under which a conflict could quickly escalate in which the regional antagonists would consider the use of chemical, biological, or nuclear weapons. It would be a mistake to believe the nuclear taboo can somehow magically keep nuclear weapons from being used in the context of an unstable strategic framework. Systemic asymmetries between actors in fact suggest a certain increase in the probability of war – a war in which escalation could happen quickly and from a variety of participants. Once such a war starts, events would likely develop a momentum all their own and decision-making would consequently be shaped in unpredictable ways. The international community must take this possibility seriously, and muster every tool at its disposal to prevent such an outcome, which would be an unprecedented disaster for the peoples of the region, with substantial risk for the entire world. MSDI Terror DA 107 AT: Can’t Get the Bomb Here Their Evidence is just complacency – U.S. Security measures are not Resilient Enough Absent Strong Domestic Surveillance Bunn 13 – (2013, Matthew, PhD, Professor of Practice; Co-Principal Investigator, Project on Managing the Atom, Belfer Center for Science and International Affairs, Harvard, “Beyond Crises: The Unending Challenge of Controlling Nuclear Weapons and Materials,” in Nuclear Weapons Security Crises: What Does History Teach? Ed. Henry D. Sokolski. Strategic Studies Institute, U.S. Army War College, 253-278) In short, the threats are out there. In a world that includes terrorists with global reach, effective nuclear security and accounting measures are needed wherever nuclear weapons, plutonium, or HEU exist. All countries with such stockpiles on their soil should ensure that they are at least protected against a modest group of well-armed, well-trained outsiders; a wellplaced insider; and both outsiders and an insider working together, using a broad range of tactics. Countries that face more substantial adversary threats—Pakistan being an obvious example—need to provide even higher levels of protection.9 Unfortunately, in many countries around the world, the security measures in place today are demonstrably not sufficient to protect against the kinds of threats terrorists and thieves have already shown they can pose. For example, a U.S. team visiting a foreign site with a Category I quantity of HEU from 2005 to 2010 found that there were no fences around the perimeter, no sensors to detect intrusions, no video surveillance systems to help guards assess the cause of alarms generated by sensors, and no vehicle barriers.10 (It is a reasonable bet that this facility also did not have an on-site armed response team to protect it from armed attackers.) The U.S. team recommended that all of these basic security measures be put in place, which the country agreed to do. But when a team of congressional auditors visited in 2010-11, some of the improvements were still under way. The fact that such glaring weaknesses still existed at a site with Category I materials years after the September 11, 2001 (9/11), attacks speaks volumes about the urgent work still ahead to plug nuclear security weak points around the world. Indeed, I would argue that every country with nuclear weapons or weaponsusable nuclear materials—including the United States—has more to do to ensure that these items are effectively protected. PUNCTUATING COMPLACENT EQUILIBRIUM: THE U.S. CASE If political turmoil is not the most important driver of nuclear security problems, what is? In a word, complacency—the belief that nuclear terrorism is not a serious threat, and that whatever security measures are in place today are already sufficient. The history of nuclear security is a story of punctuated equilibrium, with long stretches of complacency and little change punctuated by moments when something—typically, a major incident of some kind—made it possible to move the system to a higher-security state, from which it would then begin to drift slowly into complacency again. The results of incidents and other events are mediated by the different political cultures and institutions in different countries, so that one country might react to an incident by establishing substantial new security rules, while another might react by having participants in the system offer explanations why it could never happen again. MSDI Terror DA 108 AT: Can’t Build Them Russian Materials Make Construction Relatively Easy Zimmerman 09 – (2009, Peter, PhD, experimental nuclear and elementary particle physics, Emeritus Professor of Science and Security at King's College London, former Chief Scientist of the Senate Foreign Relations Committee, “Do We Really Need to Worry? Some Reflections on the Threat of Nuclear Terrorism,” Defence Against Terrorism Review Vol. 2, No. 2, Fall 2009, 1-14) Abstract: This paper considers the case for and against there being a substantial risk that a sub-state adversary might be able to carry the construction of a nuclear device to completion and delivery. It discusses works both for and against the proposition that the detonation of an improvised nuclear device (IND) or a stolen nuclear weapon is sufficiently probable that strong measures to prevent the act must be considered. Contrarian articles and books have appeared suggesting that the possibility of nuclear terrorism has been greatly exaggerated. They argue that building an IND is too difficult for even well-financed terrorists, that obtaining sufficient fissile materials is nearly impossible, and that no intact weapons will be stolen. But an examination of these works finds some to be simplistic and ridden with basic mistakes in risk analysis or misconceptions, while others are better informed but still flawed. The principal barrier to entry for either a new nuclear weapons possessor state or a sub-state group, namely acquiring fissile material, plutonium or highly enriched uranium (HEU), became less imposing with the collapse of the Soviet Union. There is a gap in our knowledge of Russian fissile inventories, which have not always been well guarded, and in this circumstance one cannot reassure the world that there has been no theft of fissile material, or that any attempt will be detected quickly enough to prevent its being made into a nuclear device. The probability of a nuclear terrorist attack in any given year remains significant. Significant investment to deter, prevent, detect, and destroy a nuclear terror plot is required. MSDI Terror DA 109 AT: Empirically Denied High risk of nuclear terrorism, empirically denied arguments are bunk, and terrorists can steal materials Simon Sturdee, 7-1, 13, “UN Atomic Energy Agency Sounds Warning on ‘Nuclear Terrorism,’ http://www.foxnews.com/world/2013/07/01/un-atomic-agency-sounds-warning-on-nuclear-terrorism/ The head of the UN atomic agency warned Monday against complacency in preventing "nuclear terrorism", saying progress in recent years should not lull the world into a false sense of security.¶ "Much has been achieved in the past decade," Yukiya Amano of the International Atomic Energy Agency told a gathering in Vienna of some 1,200 delegates from around 110 states including 35 ministers to review progress on the issue.¶ "Many countries have taken effective measures to prevent theft, sabotage, unauthorised access, illegal transfer, or other malicious acts involving nuclear or other radioactive material. Security has been improved at many facilities containing such material."¶ Partly as a result, he said, "there has not been a terrorist attack involving nuclear or other radioactive material."¶ "But this must not lull us into a false sense of security. If a 'dirty bomb' is detonated in a major city, or sabotage occurs at a nuclear facility, the consequences could be devastating.¶ "Nuclear terrorism" comprises three main risks: an atomic bomb, a "dirty bomb" -- conventional explosion spreading radioactive material -- and an attack on a nuclear plant.¶ The first, using weapons-grade uranium or plutonium, is generally seen as "low probability, high consequence" -- very difficult to pull off but for a determined group of extremists, not impossible.¶ There are hundreds of tonnes of weapons-usable plutonium and uranium -- a grapefruit-sized amount is enough for a crude nuclear weapon that would fit in a van -- around the world.¶ A "dirty bomb" -- a "radiological dispersal device" or RDD -- is much easier but would be hugely less lethal. But it might still cause mass panic.¶ "If the Boston marathon bombing (in April this year) had been an RDD, the trauma would be lasting a whole lot longer," Sharon Squassoni from the Center for Strategic and International Studies (CSIS) told AFP.¶ Last year alone, the IAEA recorded 17 cases of illegal possession and attempts to sell nuclear materials and 24 incidents of theft or loss. And it says this is the "tip of the iceberg".¶ Many cases have involved former parts of the Soviet Union, for example Chechnya, Georgia and Moldova -- where in 2011 several people were arrested trying to sell weapons-grade uranium -- but not only.¶ Nuclear materials that could be used in a "dirty bomb" are also used in hospitals, factories and university campuses and are therefore seen as easy to steal.¶ Major international efforts have been made since the end of the Soviet Union in 1991 and the September 11, 2001 attacks in the United States to prevent nuclear material falling into the wrong hands.¶ US President Barack Obama hosted a summit in 2010 on the subject which was followed by another one in Seoul last year. A third is planned in The Hague in March.¶ A report issued in Vienna on Monday to coincide with the start of the meeting by the Arms Control Association and the Partnership for Global Security said decent progress had been made but that "significant" work remained.¶ Ten countries have eliminated their entire stockpiles of weapons-grade uranium, many reactors producing nuclear medicines were using less risky materials and smuggling nuclear materials across borders, for example from Pakistan, is harder, it said.¶ But some countries still do not have armed guards at nuclear power plants, security surrounding nuclear materials in civilian settings is often inadequate and there is a woeful lack of international cooperation and binding global rules.¶ "We are still a long way from having a unified regime, a unified understanding of the threat and a way to address it," Michelle Cann, co-author of the report, told AFP. MSDI Terror DA 110 AT: No Expertise Terrorists Could Build a Dirty bomb without Expertiese Michael Clark, 2013, Michael Clarke (m.clarke@griffith.edu.au) is an Australian Research Council (ARC) Research Fellow at the Griffith Asia Institute, June 2013, Comparative Strategy, “Pakistan and Nuclear Terrorism: How Real is the Threat?,” pp. 98-114 The threat of terrorist use of an RDD or “dirty bomb” has increased since September 11, 2001, and is perceived as the most likely act of nuclear terrorism. An RDD is not a nuclear weapon but a bomb that uses conventional explosives to spread radiological material over a wide area. The damage caused by the detonation of an RDD would not necessarily stem from the effects of the radiological material itself but instead from the amount of conventional explosives used. 35 Nonetheless, the detonation of a dirty bomb would have a major psychological impact due to the widespread fear of radiation in the public imagination. 36 The effectiveness of an RDD would also depend on a number of variables including the radiological material used, the amount of conventional explosive, and the weather conditions. While there are hundreds of radioactive isotopes, only a small number are considered to be effective in an RDD, notably cesium-137 and cobalt-60, both of which are produced in nuclear reactors and are widely used for medical/industrial purposes. As these materials are found in hospitals, universities, and research facilities, they are perceived by some analysts as a “soft target” for potential terrorists seeking materials for an RDD. 37 Spent fuel from nuclear power reactors has also been identified as a potential source of radioactive materials for an RDD. MSDI Terror DA 111 Bioterror Impacts MSDI Terror DA 112 General Risk High Bio and Nuclear Weapon Acquisition Risk is High – Lone Wolves Can Deliver Gary A. Ackerman 14 & Lauren E. Pinson, Gary is Director of the Center for Terrorism and Intelligence Studies, Lauren is Senior Researcher and Project Manager for the National Consortium for the Study of Terrorism and Responses of Terrorism, An Army of One: Assessing CBRN Pursuit and Use by Lone Wolves and Autonomous Cells, Terrorism and Political Violence, Volume 26, Issue 1 The first question to answer is whence the concerns about the nexus between CBRN weapons and isolated actors come and whether these are overblown. The general threat of mass violence posed by lone wolves and small autonomous cells has been detailed in accompanying issue contributions, but the potential use of CBRN weapons by such perpetrators presents some singular features that either amplify or supplement the attributes of the more general case and so are deserving of particular attention. Chief among these is the impact of rapid technological development. Recent and emerging advances in a variety of areas, from synthetic biology 3 to nanoscale engineering, 4 have opened doors not only to new medicines and materials, but also to new possibilities for malefactors to inflict harm on others. What is most relevant in the context of lone actors and small autonomous cells is not so much the pace of new invention, but rather the commercialization and consumerization of CBRN weapons-relevant technologies. This process often entails an increase in the availability and safety of the technology, with a concurrent diminution in the cost, volume, and technical knowledge required to operate it. Thus, for example, whereas fifty years ago producing large quantities of certain chemical weapons might have been a dangerous and inefficient affair requiring a large plant, expensive equipment, and several chemical engineers, with the advent of chemical microreactors, 5 the same processes might be accomplished far more cheaply and safely on a desktop assemblage, purchased commercially and monitored by a single chemistry graduate student.¶ The rapid global spread and increased userfriendliness of many technologies thus represents a potentially radical shift from the relatively small scale of harm a single individual or small autonomous group could historically cause. 6 From the limited reach and killing power of the sword, spear, and bow, to the introduction of dynamite and eventually the use of our own infrastructures against us (as on September 11), the number of people that an individual who was unsupported by a broader political entity could kill with a single action has increased from single digits to thousands. Indeed, it has even been asserted that “over time … as the leverage provided by technology increases, this threshold will finally reach its culmination—with the ability of one man to declare war on the world and win.” 7 Nowhere is this trend more perceptible in the current age than in the area of unconventional weapons.¶ These new technologies do not simply empower users on a purely technical level. Globalization and the expansion of information networks provide new opportunities for disaffected individuals in the farthest corners of the globe to become familiar with core weapon concepts and to purchase equipment—online technical courses and eBay are undoubtedly a boon to would-be purveyors of violence. Furthermore, even the most solipsistic misanthropes, people who would never be able to function socially as part of an operational terrorist group, can find radicalizing influences or legitimation for their beliefs in the maelstrom of virtual identities on the Internet.¶ All of this can spawn, it is feared, a more deleterious breed of lone actors, what have been referred to in some quarters as “super-empowered individuals.” 8 Conceptually, super-empowered individuals are atomistic game-changers, i.e., they constitute a single (and often singular) individual who can shock the entire system (whether national, regional, or global) by relying only on their own MSDI Terror DA 113 resources. Their core characteristics are that they have superior intelligence, the capacity to use complex communications or technology systems, and act as an individual or a “lone-wolf.” 9 The end result, according to the pessimists, is that if one of these individuals chooses to attack the system, “the unprecedented nature of his attack ensures that no counter-measures are in place to prevent it. And when he strikes, his attack will not only kill massive amounts of people, but also profoundly change the financial, political, and social systems that govern modern life.” 10 It almost goes without saying that the same concerns attach to small autonomous cells, whose members' capabilities and resources can be combined without appreciably increasing the operational footprint presented to intelligence and law enforcement agencies seeking to detect such behavior.¶ With the exception of the largest truck or aircraft bombs, the most likely means by which to accomplish this level of system perturbation is through the use of CBRN agents as WMD. On the motivational side, therefore, lone actors and small autonomous cells may ironically be more likely to select CBRN weapons than more established terrorist groups—who are usually more conservative in their tactical orientation—because the extreme asymmetry of these weapons may provide the only subjectively feasible option for such actors to achieve their grandiose aims of deeply affecting the system. The inherent technical challenges presented by CBRN weapons may also make them attractive to self-assured individuals who may have a very different risk tolerance than larger, traditional terrorist organizations that might have to be concerned with a variety of constituencies, from state patrons to prospective recruits. 11 Many other factors beyond a “perceived potential to achieve mass casualties” might play into the decision to pursue CBRN weapons in lieu of conventional explosives, 12 including a fetishistic fascination with these weapons or the perception of direct referents in the would-be perpetrator's belief system.¶ Others are far more sanguine about the capabilities of lone actors (or indeed non-state actors in general) with respect to their potential for using CBRN agents to cause mass fatalities, arguing that the barriers to a successful large-scale CBRN attack remain high, even in today's networked, tech-savvy environment. 13 Dolnik, for example, argues that even though homegrown cells are “less constrained” in motivations, more challenging plots generally have an inverse relationship with capability, 14 while Michael Kenney cautions against making presumptions about the ease with which individuals can learn to produce viable weapons using only the Internet. 15 However, even most of these pundits concede that low-level CBR attacks emanating from this quarter will probably lead to political, social, and economic disruption that extends well beyond the areas immediately affected by the attack. This raises an essential point with respect to CBRN terrorism: irrespective of the harm potential of CBRN weapons or an actor's capability (or lack thereof) to successfully employ them on a catastrophic scale, these weapons invariably exert a stronger psychological impact on audiences—the essence of terrorism—than the traditional gun and bomb. This is surely not lost on those lone actors or autonomous cells who are as interested in getting noticed as in causing casualties.¶ Proven Capability and Intent¶ While legitimate debate can be had as to the level of potential threat posed by lone actors or small autonomous cells wielding CBRN weapons, possibly the best argument for engaging in a substantive examination of the issue is the most concrete one of all—that these actors have already demonstrated the motivation and capability to pursue and use CBRN weapons, in some cases even close to the point of constituting a genuine WMD threat. In the context of bioterrorism, perhaps the most cogent illustration of this is the case of Dr. Bruce Ivins, the perpetrator behind one of the most serious episodes of bioterrorism in living memory, the 2001 “anthrax letters,” which employed a highly virulent and sophisticated form of the agent and not only killed five and seriously sickened 17 people, but led to widespread disruption of the U.S. postal services and key government facilities. 16¶ Other historical cases of CBRN pursuit and use by lone actors and MSDI Terror DA 114 small autonomous cells highlight the need for further exploration. Among the many extant examples: 17¶ Thomas Lavy was caught at the Alaska-Canada border in 1993 with 130 grams of 7% pure ricin. It is unclear how Lavy obtained the ricin, what he planned to do with it, and what motivated him.¶ In 1996, Diane Thompson deliberately infected twelve coworkers with shigella dysenteriae type 2. Her motives were unclear.¶ In 1998, Larry Wayne Harris, a white supremacist, was charged with producing and stockpiling a biological agent—bacillus anthracis, the causative agent of anthrax.¶ In 1999, the Justice Department (an autonomous cell sympathetic to the Animal Liberation Front) mailed over 100 razor blades dipped in rat poison to individuals involved in the fur industry.¶ In 2000, Tsiugio Uchinshi was arrested for mailing samples of the mineral monazite with trace amounts of radioactive thorium to several Japanese government agencies to persuade authorities to look into potential uranium being smuggled to North Korea.¶ In 2002, Chen Zhengping put rat poison in a rival snack shop's products and killed 42 people.¶ In 2005, 10 letters containing a radioactive substance were mailed to major organizations in Belgium including the Royal Palace, NATO headquarters, and the U.S. embassy in Brussels. No injuries were reported.¶ In 2011, federal agents arrested four elderly men in Georgia who were plotting to use ricin and explosives to target federal buildings, Justice Department officials, federal judges, and Internal Revenue Service agents.¶ Two recent events may signal an even greater interest in CBRN by lone malefactors. First, based on one assessment of Norway's Anders Breivik's treatise, his references to CBRN weapons a) suggest that CBRN weapons could be used on a tactical level and b) reveal (to perhaps previously uninformed audiences) that even low-level CBRN weapons could achieve far-reaching impacts driven by fear. 18 Whether or not Breivik would actually have sought or been able to pursue CBRN, he has garnered a following in several (often far-right) extremist circles and his treatise might inspire other lone actors. Second, Al-Qaeda in the Arabian Peninsula (AQAP) released two issues of Inspire magazine in 2012. Articles, on the one hand, call for lone wolf jihad attacks to target noncombatant populations and, on the other, permit the use of chemical and biological weapons. The combination of such directives may very well influence the weapon selection of lone actor jihadists in Western nations. 19 Bioterror is Easier than Most Experts Let on Allison, IR Director @ Harvard, 12 (Graham, Director, Belfer Center for Science and International Affairs; Douglas Dillon Professor of Government, Harvard Kennedy School, "Living in the Era of Megaterror", Sept 7, http://belfercenter.ksg.harvard.edu/publication/22302/living_in_the_era_of_megaterror.html) Forty years ago this week at the Munich Olympics of 1972, Palestinian terrorists conducted one of the most dramatic terrorist attacks of the 20th century. The kidnapping and massacre of 11 Israeli athletes attracted days of around-the-clock global news coverage of Black September’s anti-Israel message. Three decades later, on 9/11, Al Qaeda killed nearly 3,000 individuals at the World Trade Center and the Pentagon, announcing a new era of megaterror. In an act that killed more people than Japan’s attack on Pearl Harbor, a band of terrorists headquartered in ungoverned Afghanistan demonstrated that individuals and small groups can kill on a scale previously the exclusive preserve of states. Today, how many people can a small group of terrorists kill in a single blow? Had Bruce Ivins, the U.S. government microbiologist responsible for the 2001 anthrax attacks, distributed his deadly agent with sprayers he could have purchased off the shelf, tens of thousands of Americans would have died. Had the 2001 “Dragonfire” report that Al Qaeda had a small nuclear weapon (from the former Soviet arsenal) in New MSDI Terror DA 115 York City proved correct, and not a false alarm, detonation of that bomb in Times Square could have incinerated a half million Americans. In this electoral season, President Obama is claiming credit, rightly, for actions he and U.S. Special Forces took in killing Osama bin Laden. Similarly, at last week’s Republican convention in Tampa, Jeb Bush praised his brother for making the United States safer after 9/11. There can be no doubt that the thousands of actions taken at federal, state and local levels have made people safer from terrorist attacks. Many are therefore attracted to the chorus of officials and experts claiming that the “strategic defeat” of Al Qaeda means the end of this chapter of history. But we should remember a deeper and more profound truth. While applauding actions that have made us safer from future terrorist attacks, we must recognize that they have not reversed an inescapable reality: The relentless advance of science and technology is making it possible for smaller and smaller groups to kill larger and larger numbers of people. If a Qaeda affiliate, or some terrorist group in Pakistan whose name readers have never heard, acquires highly enriched uranium or plutonium made by a state, they can construct an elementary nuclear bomb capable of killing hundreds of thousands of people. At biotech labs across the United States and around the world, research scientists making medicines that advance human well-being are also capable of making pathogens, like anthrax, that can produce massive casualties. What to do? Sherlock Holmes examined crime scenes using a method he called M.M.O.: motive, means and opportunity. In a society where citizens gather in unprotected movie theaters, churches, shopping centers and stadiums, opportunities for attack abound. Free societies are inherently “target rich.” Motive to commit such atrocities poses a more difficult challenge. In all societies, a percentage of the population will be homicidal. No one can examine the mounting number of cases of mass murder in schools, movie theaters and elsewhere without worrying about a society’s mental health. Additionally, actions we take abroad unquestionably impact others’ motivation to attack us. As Faisal Shahzad, the 2010 would-be “Times Square bomber,” testified at his trial: “Until the hour the U.S. ... stops the occupation of Muslim lands, and stops killing the Muslims ... we will be attacking U.S., and I plead guilty to that.” Fortunately, it is more difficult for a terrorist to acquire the “means” to cause mass casualties. Producing highly enriched uranium or plutonium requires expensive industrialscale investments that only states will make. If all fissile material can be secured to a gold standard beyond the reach of thieves or terrorists, aspirations to become the world’s first nuclear terrorist can be thwarted. Capabilities for producing bioterrorist agents are not so easily secured or policed. While more has been done, and much more could be done to further raise the technological barrier, as knowledge advances and technological capabilities to make pathogens become more accessible, the means for bioterrorism will come within the reach of terrorists. One of the hardest truths about modern life is that the same advances in science and technology that enrich our lives also empower potential killers to achieve their deadliest ambitions. To imagine that we can escape this reality and return to a world in which we are invulnerable to future 9/11s or worse is an illusion. For as far as the eye can see, we will live in an era of megaterror. MSDI Terror DA 116 Al Qaeda Risk High Best Evidence – Al Qaeda Specifically Wants To Use bio weapons Hellmich and Redig 07 – (2007, Christina, PhD, Reader in International Relations and Middle East Studies, and Amanda, MD, PhD, Clinical Fellow in Medicine, Harvard Catalyst Clinical and Translational Science Center, “The Question is When: The Ideology of Al Qaeda and the Reality of Bioterrorism,” Studies in Conflict & Terrorism Volume 30, Issue 5, 2007) The fictional scenario presented at the beginning of this article is not meant to be a scientifically valid primer in the production or distribution of a biological agent. Rather, it is intended to illustrate the ease with which biological agents can be adapted to more conventional and well-documented historical examples of terrorism. In this setting, the question du jour is not if it can be done, but rather, is there someone willing to do it. It is thus the aim of the remainder of this commentary to provide a missing piece of analysis in what has become a topic of international concern with a budget of billions of dollars. Current evaluations of bioterrorism do not adequately consider either the unique and often unrecognized ideological position of Al Qaeda or the relevance of the organization's historical and contextual setting. Furthermore, in what is a dangerous oversight, the scientific and technical aspects of creating and using biological weapons have only been assessed from a now invalid historical paradigm that does not accurately reflect the decision-making structure and operations of the present-day organization most likely to use such weapons. As counterterrorism measures are only as accurate as the analysis on which they are based, it is a matter of grave importance that the threat of bioterror be philosophically and scientifically reevaluated through the only lens that matters: Al Qaeda's. Loose Soviet Anthrax Presents Biggest Risk Hellmich and Redig 07 – (2007, Christina, PhD, Reader in International Relations and Middle East Studies, and Amanda, MD, PhD, Clinical Fellow in Medicine, Harvard Catalyst Clinical and Translational Science Center, “The Question is When: The Ideology of Al Qaeda and the Reality of Bioterrorism,” Studies in Conflict & Terrorism Volume 30, Issue 5, 2007) Although the ability to effectively weaponize a microbe such as anthrax, smallpox, or Yersinia pestis is admittedly a challenge, it has already been accomplished by at least one state entity, namely the former Soviet Union. 64 This raises concerns at two levels: in the dissolution of an entire society, what happened to the reagent stocks of bioweapons and what happened to the scientists who created them? Ironically, the world was probably more secure from the threat of biowarfare during the years in which some of the world's most talented molecular biologists were actively creating superstrains of bacteria and determining how to effectively deliver them than it is today. For even as research accelerated the development of extremely sophisticated bioweapons, the political checks and constraints of a bipolar world made the likelihood of their eventual use very low. In addition, the not inconsiderable resources of a superpower with an established Gulag and NKVD were fully deployed to prevent the unauthorized use, transport, or discussion of such weapons. However, the politics that prevented a nuclear holocaust triggered by the opposition of two superpowers during the Cold War simply do not apply to the political or strategic decision-making process of an organization like Al Qaeda. And although Al Qaeda itself may not have the resources to create a weapons-grade strain of anthrax or smallpox, Biopreparat did. In the collapse of any social safety net, and in the wake of rampant inflation, unemployment, and poverty following the end of the Soviet Union, it is not hard to imagine that some of the estimated 50,000 MSDI Terror DA 117 scientists employed by Biopreparat may have been tempted to trade what resources were left– information or materials—to stave off starvation, secure medical care for an ill child, or provide the means to relocate to a more stable society. In short, Al Qaeda is poised to benefit from resources it could never hope to match while organizing an operation a state actor could never conceivably order. Bioterror attacks are unlikely as long as the means and the will to orchestrate them remain separated. Quite simply, the Western world can no longer assume that is the case. MSDI Terror DA 118 ISIS Specific ISIS Is Developing Bioweapons – Recovered Raid Data Proves Harald Doornbosjenan Moussa, 8-28-2014, Harald Doornbos is a reporter based in Pakistan covering the greater Middle East. "Found: The Islamic State’s Terror Laptop of Doom," Foreign Policy, http://foreignpolicy.com/2014/08/28/found-the-islamic-states-terror-laptop-of-doom/ AKYA, Turkey — Abu Ali, a commander of a moderate Syrian rebel group in northern Syria, proudly shows a black laptop partly covered in dust. “We took it this year from an ISIS hideout,” he says. Abu Ali says the fighters from the Islamic State of Iraq and al-Sham (ISIS), which have since rebranded themselves as the Islamic State, all fled before he and his men attacked the building. The attack occurred in January in a village in the Syrian province of Idlib, close to the border with Turkey, as part of a larger anti-ISIS offensive occurring at the time. “We found the laptop and the power cord in a room,” he continued, “I took it with me. But I have no clue if it still works or if it contains anything interesting.” The Complex:Is the ISIS laptop of doom an operational threat? Meet Lady al Qaeda: Why does every jihadi group want the U.S. to free Aafia Siddiqui? Inside the Bureaucracy of Evil: From electricity to sewage, U.S. intel warns the Islamic State has gotten pretty good at running a country. As we switched on the Dell laptop, it indeed still worked. Nor was it password-protected. But then came a huge disappointment: After we clicked on “My Computer,” all the drives appeared empty. Appearances, however, can be deceiving. Upon closer inspection, the ISIS laptop wasn’t empty at all: Buried in the “hidden files” section of the computer were 146 gigabytes of material, containing a total of 35,347 files in 2,367 folders. Abu Ali allowed us to copy all these files — which included documents in French, English, and Arabic — onto an external hard drive. A screenshot of material found on the computer. The files appear to be videos of speeches by jihadist clerics. (Click to enlarge.) The laptop’s contents turn out to be a treasure trove of documents that provide ideological justifications for jihadi organizations — and practical training on how to carry out the Islamic State’s deadly campaigns. They include videos of Osama bin Laden, manuals on how to make bombs, instructions for stealing cars, and lessons on how to use disguises in order to avoid getting arrested while traveling from one jihadi hot spot to another. But after hours upon hours of scrolling through the documents, it became clear that the ISIS laptop contains more than the typical propaganda and instruction manuals used by jihadists. The documents also suggest that the laptop’s owner was teaching himself about the use of biological weaponry, in preparation for a potential attack that would have shocked the world. The information on the laptop makes clear that its owner is a Tunisian national named Muhammed S. who joined ISIS in Syria and who studied chemistry and physics at two universities in Tunisia’s northeast. Even more disturbing is how he planned to use that education: The ISIS laptop contains a 19-page document in Arabic on how to develop biological weapons and how to weaponize the bubonic plague from infected animals. The ISIS laptop contains a 19-page document in Arabic on how to develop biological weapons and how to weaponize the bubonic plague from infected animals. “The advantage of biological weapons is that they do not cost a lot of money, while the human casualties can be huge,” the document states. The document includes instructions for how to test the weaponized disease safely, before it is used in a terrorist attack. “When the microbe is injected in small mice, the symptoms of the disease should start to appear within 24 hours,” the document says. The laptop also includes a 26-page fatwa, or Islamic ruling, on the usage of weapons of mass destruction. “If Muslims cannot defeat the kafir [unbelievers] in a different way, it is permissible to use weapons of mass destruction,” states the fatwa by Saudi jihadi MSDI Terror DA 119 cleric Nasir al-Fahd, who is currently imprisoned in Saudi Arabia. “Even if it kills all of them and wipes them and their descendants off the face of the Earth.” When contacted by phone, a staff member at a Tunisian university listed on Muhammed’s exam papers confirmed that he indeed studied chemistry and physics there. She said the university lost track of him after 2011, however. Out of the blue, she asked: “Did you find his papers inside Syria?” Asked why she would think that Muhammed’s belongings would have ended up in Syria, she answered, “For further questions about him, you better ask state security.” An astonishing number of Tunisians have flocked to the Syrian battlefield since the revolt began. In June, Tunisia’s interior minister A photo of Muhammed S. found on his laptop. This image has been digitally altered. Out of the blue, she asked: “Did you find his papers inside Syria?” Asked why she would think that Muhammed’s belongings would have ended up in Syria, she answered, “For further questions about him, you better ask state security.” An astonishing number of Tunisians have flocked to the Syrian battlefield since the revolt began. In June, Tunisia’s interior minister estimated that at least 2,400 Tunisians were fighting in the country, mostly as members of the Islamic State. This isn’t the first time that jihadists have attempted to acquire weapons of mass destruction. Even before the 9/11 attacks, al Qaeda had experimented with a chemical weapons program in Afghanistan. In 2002, CNN obtained a tape showing al Qaeda members testing poison gas on three dogs, all of which died. Nothing on the ISIS laptop, of course, suggests that the jihadists already possess these dangerous weapons. And any jihadi organization contemplating a bioterrorist attack will face many difficulties: Al Qaeda tried unsuccessfully for years to get its hands on such weapons, and the United States has devoted massive resources to preventing terrorists from making just this sort of breakthrough. The material on this laptop, however, is a reminder that jihadists are also hard at work at acquiring the weapons that could allow them to kill thousands of people with one blow. “The real difficulty in all of these weapons … [is] to actually have a workable distribution system that will kill a lot of people,” said Magnus Ranstorp, research director of the Center for Asymmetric Threat Studies at the Swedish National Defence College. “But to produce quite scary weapons is certainly within [the Islamic State’s] capabilities.” The Islamic State’s sweeping gains in recent months may have provided it with the capacity to develop such new and dangerous weapons. Members of the jihadi group are not solely fighting on the front lines these days — they also control substantial parts of Syria and Iraq. The fear now is that men like Muhammed could be quietly working behind the front lines — for instance, in the Islamic State-controlled University of Mosul or in some laboratory in the Syrian city of Raqqa, the group’s de facto capital — to develop chemical or biological weapons. In short, the longer the caliphate exists, the more likely it is that members with a science background will come up with something horrible. The documents found on the laptop of the Tunisian jihadist, meanwhile, leave no room for doubt about the group’s deadly ambitions. “Use small grenades with the virus, and throw them in closed areas like metros, soccer stadiums, or entertainment centers,” the 19-page document on biological weapons advises. “Best to do it next to the airconditioning. It also can be used during suicide operations.” The WHO Concludes that ISIS Has the Capability to Develop a Bio Weapon Ryan Wallace, 6-25-2015, ScienceTimes.com Writer "Biological Warfare on the Horizon? ISIS Soldiers May Be Infected With Ebola," Science Times, http://www.sciencetimes.com/articles/2395/20150105/biological-warfare-on-the-horizon-isis-soldiersmay-be-infected-with-ebola.htm MSDI Terror DA 120 It's what national security organizations have feared since day one-the World Health Organization (WHO) announced last week that they are evaluating jihadist militants associated with ISIS, who may have contracted the virus responsible for Ebola. While the WHO has yet to confirm whether or not the fighters are exhibiting symptoms, the current evaluations of a Mosul hospital 250 miles north of Baghdad are prompting concerns that the fringe extremist group ISIS may in fact be able to obtain a biological weapon unlike anything the world has seen before. Though Mosul has been under ISIS control since late last June, the Iraqi health ministry has issued a press release denying reports from Iraqi news outlets that claim the soldier are definitively infected and seeking treatment in Mosul. "The Ebola virus could be in any area in the world, including Mosul, where they don't have the measures or techniques to diagnose the virus" spokesperson for the health ministry Ahmed Rudaini says. "They are incapable to detect it." Over the past several months, the world has watched as threats from extremist group ISIS have come true, from the beheadings of captured prisoners of war to the mass murder of children's schools. And with the possibility of a global pandemic looming over our heads, many are demanding action be taken to isolate the potential vectors as a worst case scenario. Yet, as conflicting reports abound, international health organizations and the WHO are unable to assess the health concern on site, and treat the patients as their own. WHO director Christy Feig told reporters early this weekend that " We [the WHO] have no official notification from the Iraqi government that it is Ebola." While that may be true, the possibility that the militants may have contracted the virus causes a problematic situation for the WHO, in that ISIS does not believe in modern medicine and an outbreak in an ISIScontrolled area like Mosul could be a breeding ground for the ever-mutating virus. But worst of all, aside from the possibility of possible infection of Iraq, should ISIS isolate the virus for themselves, the entire western world may find soon enough that the Ebola virus could be the worst weapon known to man. "U.N. workers have thus far been prohibited from entering ISIS-controlled territory in both Iraq and Syria," intelligence analyst for Levantine Group, Benjamin T. Decker says. "In this context, the lack of medical infrastructure, supplies and practitioners in the city suggests that the outbreak could quickly lead to further infection of both ISIS fighters and residents of Mosul." MSDI Terror DA 121 Yes Extinction MSDI Terror DA 122 Lashout Lack of security measures ensures US pre-emption and lashout. Koblentz, 4, Gregory Koblentz is a doctoral candidate in Political Science at the Massachusetts Institute of Technology, “Pathogens as Weapons: The International Seucrity Implications of Biological Warfare”, International Security, Vol. 28 No. 3 Winter 2003/04, pp. 84-122, http://belfercenter.ksg.harvard.edu/files/koblentz.pdf prevention and preemption. States may adopt preventive or preemptive strategies to neutralize perceived threats posed by the prospect of anonymous biological attacks or the acquisition of biological weapons by nondeterrable ac- tors.118 After the September 11 terrorist attacks, preventive and preemptive strategies became central to U.S. national security planning.119 These strategies, however, arst emerged during President Bill Clinton’s administration in re- sponse to the threat of mass casualty terrorism. In 1995, the White House is- sued a presidential decision directive stating that the acquisition of nuclear, biological, or chemical weapons by terrorists was “unacceptable.” According to the directive, “There is no higher priority than preventing the acquisition of this capability or removing this capability from terrorist groups potentially op- posed to the U.S.”120 This policy was arst implemented on August 20, 1998, when the United States launched cruise missiles at the al-Shifa pharmaceutical plant in Sudan, which ofacials believed was linked to the development of chemical weapons for al-Qaeda.121 Despite concerns within the administration about the legal and intelligence justiacations for the attack, “the perception of imminent danger was powerful enough to overcome these concerns. At the Principals meeting, [National Security Adviser] Sandy Berger asked, ‘What if we do not hit it [al-Shifa] and then, after an attack, nerve gas is released in the New York City subway? What will we say then?’”122 Although this incident in- volved terrorist acquisition of chemical (not biological) weapons, it indicates how states may respond to the specter of terrorist acquisition of even more le- thal weapons. Preventive and preemptive attacks against suspected biological weapons facilities present signiacant intelligence, military, and diplomatic challenges. The potential consequences of a biological attack and the limita- tions of defensive and deterrent strategies, however, may inouence a decision- maker’s calculation that the risks of inaction outweigh the costs of action. MSDI Terror DA 123 Pandemic Extinction Bioweapons independently cause extinction Richard Ochs: 7-9-02, has published articles in the Baltimore Sun, Baltimore Chronicle, Science magazine, past president of the Aberdeen Proving Ground Superfund Citizens Coalition, member of the Depleted Uranium Task force of the Military Toxics Project and a member of the Chemical Weapons Working Group, “Biological Weapons must be abolished immediately,” http://www.freefromterror.net/other_articles/abolish.html Of all the weapons of mass destruction, the genetically engineered biological weapons, many without a known cure or vaccine, are an extreme danger to the continued survival of life on earth. Any perceived military value or deterrence pales in comparison to the great risk these weapons pose just sitting in vials in laboratories. While a "nuclear winter," resulting from a massive exchange of nuclear weapons, could also kill off most of life on earth and severely compromise the health of future generations, they are easier to control. Biological weapons, on the other hand, can get out of control very easily, as the recent anthrax attacks has demonstrated. There is no way to guarantee the security of these doomsday weapons because very tiny amounts can be stolen or accidentally released and then grow or be grown to horrendous proportions. The Black Death of the Middle Ages would be small in comparison to the potential damage bioweapons could cause. Abolition of chemical weapons is less of a priority because, while they can also kill millions of people outright, their persistence in the environment would be less than nuclear or biological agents or more localized. Hence, chemical weapons would have a lesser effect on future generations of innocent people and the natural environment. Like the Holocaust, once a localized chemical extermination is over, it is over. With nuclear and biological weapons, the killing will probably never end. Radioactive elements last tens of thousands of years and will keep causing cancers virtually forever. Potentially worse than that, bio-engineered agents by the hundreds with no known cure could wreck even greater calamity on the human race than could persistent radiation. AIDS and ebola viruses are just a small example of recently emerging plagues with no known cure or vaccine. Can we imagine hundreds of such plagues? HUMAN EXTINCTION IS NOW POSSIBLE. Engineered diseases cause extinction. Sandberg et al 8, Anders Sandberg is a James Martin Research Fellow at the Future of Humanity Institute at Oxford University. He received a PhD in computational neuroscience from Stockholm University and is a postdoctoral research assistant for the EU Enhance project. Jason G. Matheny is a PhD candidate in Health Policy and Management at Johns Hopkins Bloomberg School of Public Health. He is also a special consultant to the Center for Biosecurity at the University of Pittsburgh Medical Center. Milan M. Ćirkovićis senior research associate at the Astronomical Observatory of Belgrade. He is also an assistant professor of physics at the University of Novi Sad in Serbia and Montenegro. “How Can We Reduce The Risk of Human Extinction?” http://www.thebulletin.org/web-edition/features/how-canwe-reduce-the-risk-of-human-extinction The risks from anthropogenic hazards appear at present larger than those from natural ones. Although great progress has been made in reducing the number of nuclear weapons in the world, humanity is still threatened by the possibility of a global thermonuclear war and a resulting nuclear winter. We may face even greater risks from emerging technologies. Advances in synthetic biology might make it possible to engineer pathogens capable of extinction-level pandemics. The knowledge, equipment, and materials needed to engineer pathogens are more accessible than those needed to build nuclear weapons. And unlike other weapons, pathogens are self-replicating, allowing a small arsenal to become exponentially destructive. Pathogens have been implicated in the extinctions of many wild species. Although most pandemics "fade out" by reducing the density of susceptible populations, MSDI Terror DA 124 pathogens with wide host ranges in multiple species can reach even isolated individuals. The intentional or unintentional release of engineered pathogens with high transmissibility, latency, and lethality might be capable of causing human extinction. While such an event seems unlikely today, the likelihood may increase as biotechnologies continue to improve at a rate rivaling Moore's Law. MSDI Terror DA 125 AT: Deterrence/Terrorists Won’t use WMD’s Terrorists will use WMDs when they get them. Bucci, 8-25, Steve Bucci, previous Deputy Assistant Secretary for Homeland Security at the Department of Defense, “Weapons of Mass Destruction – A Dangerous and Uncertain Future”, http://securitydebrief.com/2011/08/25/weapons-of-mass-destruction-a-dangerous-and-uncertainfuture/ Clearly our enemies, extremists in the main, but also rouge states, continue to seek the full gamut of Chem, Bio, Rad, Nuke, and HYE devices. They have few if any scruples that would deter them from deploying such devices against any vulnerable target – Gov’t, Military, or civilian, including complete innocents. One imagines that using such a terror-producing device against the most innocent of targets would actually be a more desirable outcome for many of these groups. MSDI Terror DA 126 AT: No bioweapon access Bioweapons availability is increasing- cheap option for mass destruction CSIS, 6 (“STRATEGIC STUDY ON BIOTERRORISM, http://csis.org/files/media/csis/pubs/061016_bioterrorism.pdf) Bio-agents are readily available in the modern world and are relatively inexpensive to produce, store and transport from one country to another. At the same time, they can be toxic, transmissible and lethal. Some have a long period of incubation, and many items involved in biotechnology are dual use, thus difficult to ban. The physical security of biological agents is very poor in a number of facilities, with dangerous pathogens stored in unlocked kitchen refrigerators and simple fences without alarm systems surrounding the facilities. Lax border controls make illicit trafficking of drugs, arms and materials of weapons of mass destruction a possibility in regions such as Central Asia and the Caucusus, which is an area also traveled by terrorist groups. This report focuses on bio agents that may be available to terrorists rather than terrorism in general. How can we secure, collect or destroy strains that may pose a serious threat and prevent them from falling into the hands of terrorists? How can we channel the knowledge and experience of unemployed former Soviet bioscientists into benefits for the international community? It is almost impossible to detect and deter the movement and/or transfer of a small quantity of dangerous infectious agents. It is very difficult to forecast consequences of a bioterrorist attack. For example, in the case of a sudden appearance of an epidemic type of avian flu H5N1, the epidemic will travel the globe quickly, while the development, testing and production of the necessary quantities of a vaccine against the avian flu will take at least 4 to 5 months; this will provide protection for 50% of the world population. Therefore, the protection of the population from epidemics and pandemics of dangerous diseases caused by natural outbreaks, man-made accidents or bioterrorist attacks is an issue of national and international concern. Given their proximity, Russia and other European countries are well placed to cooperate on improving communications and surveillance systems to reach hospitals and doctors, including in isolated areas. There is no common definition of bioterrorism. A modified FBI definition refers to it as the “unlawful use of viruses, bacteria, fungi, toxins or other pathogenic material against a government, the civilian population, livestock, crops or any segment thereof, in furtherance of political, social and/or economic objectives.”13 An unofficial Russian definition states, “Bioterrorism is the use of dangerous biological agents for inflicting damage to the life and health of people in order to reach goals of a political and materialistic nature.” The possibilities for bioterrorism exist in water, land, food, air, and the human being itself. Much has been written about possible scenarios of pathogens in the major water reserves, the food supply, animal husbandry, the subway, sport arenas, railway stations, and places where large numbers of people congregate. The sources of water supplies are generally considered protected in the cities, though they are not failsafe. Certain safeguards are in place for food protection, though a number of experts have expressed concern in particular about possible contamination of milk.14 The experts in this Study agreed that the highest risk was that of air contamination, and they recognized that it is close to impossible to protect the population from being contaminated. The method of dissemination of bio agents depends on the kinds of diseases. Non-contagious diseases require complex dissemination equipment such as a spray system or an explosive device to create a large-scale effect. The anthrax letters delivered in the United States Senate Office Building showed that widespread psychological effects could be inflicted via a simple means of delivery and a small number of actual victims. Various organizations have compiled lists of MSDI Terror DA 127 agents that are based on parameters such as lethality, toxicity, morbidity, and mortality. The United States Centers for Disease Control and Prevention has defined three categories of bioterrorism agents/diseases. Category A comprises high priority agents that “include organisms that pose a risk to national security because they can be easily disseminated or transmitted from person to person; result in high mortality rates and have the potential for major public health impact; might cause public panic and social disruption; and require special action for public health preparedness.” The CDC lists the following under Category A: Anthrax (bacillus anthracis), Botulism (Clostridium botulinum toxin), plague (Yersinia pestis), Smallpox (variola major), Tularemia (Francisella tularensis) and Viral hemorrhagic fevers (filoviruses [e.g. Ebola, Marburg] and arenaviruses [e.g. Lassa, Machupo]). Category B diseases/agents are defined as those that “are moderately easy to disseminate; result in moderate morbidity rates and low mortality rates; and require specific enhancements of CDC’s diagnostic capacity and enhanced disease surveillance.” Category B includes: Brucellosis (Brucella species); Epsilon toxin of Clostridium perfringens; Food safety threats (e.g. Salmonella species, Escherichia coli 0157:H7, Shigella); Glanders (Burkholderia mallei); Melioidosis (Burkholderia pseudomallei); Psittacosis (Chlamydia psittaci); Q fever (Coxiella burnetii); Ricin toxin from Ricinus communis (castor beans); Staphylococcal enterotoxin B; Typhus fever (Rickettsia prowazekii); Viral encephalitis (alphaviruses [e.g. Venezuelan equine encephalitis, eastern equine encephalitis, western equine encephalitis]); Water safety threats (e.g. Vibrio cholerae, Cryptosporidium parvum). The third highest priority agents, Category C, are defined as “emerging pathogens that could be engineered for mass dissemination in the future because of availability; ease of production and dissemination; and potential for high morbidity and mortality rates and major health impact.” The CDC list mentions emerging infectious diseases such as Nipah virus and hanta virus.15 Similar lists of pathogens exist for plants and animals. Recent examples of diseases that have caused economic as well as psychological distress include foot and mouth disease in the United Kingdom in 2001, which cost an estimated $12 billion, SARS, which cost Canadian tourism almost $1 billion in lost revenue,16 and avian flu. Even the process of finding a disease capable of causing bioterrorism costs a great deal in research and development, money that could be spent on other activities such as treating tuberculosis, dengue fever or other severe diseases. During the Soviet era the country had very strong scientific and engineering capabilities, with a high level of university training. President Yeltsin acknowledged in 1992 that the Soviet Union had violated the Biological Weapons Convention, which entered into force in 1975. The legacy of suspicion and mistrust between the former Soviet Union and the United States that persisted during the cold war has continued to this day. The economic decline that set in after the Soviet era resulted in poor physical security systems in facilities housing large collections of dangerous pathogens and a drop in salaries for an estimated 10,000 former Soviet biological scientists possessing relevant bioweapons expertise. 17 Many either changed careers or sought work in other countries, causing concern over the possibility of terrorists acquiring knowledge from them. Many Russian officials now talk about the “lost generation” of scientists: at the Russian Academy of Medical Sciences, for example, more than half the researchers are older than 45, and only 15 percent are between the age of 30 and 45. MSDI Terror DA 128 AT: No BW Delivery Delivery is possibly- ingenuity and motivation for use ensures capabilities Carafano 3, Phd, Deputy Director, Institute for International Studies and Director, Center for Foreign Policy Studies, (James, “ Improving Federal Response to Catastrophic Bioterrorist Attacks: The Next Steps,” Heritage Foundation, November 13, http://www.heritage.org/Research/Reports/2003/11/Improving-Federal-Response-to-CatastrophicBioterrorist-Attacks-The-Next-Steps#pgfId-1083840) Equally troubling, the difficulties in effectively delivering biotoxins can be overcome with some forethought and ingenuity. For example, cruise missiles, unmanned aerial vehicles, or aircraft could perform sprayer attacks, but only if specialized spraying equipment was employed that ensured proper dispersal and prevented particle clumping. Clumping of agents can degrade the effectiveness of an attack. Large particles quickly drop to the ground or, if inhaled, do not easily pass into lung tissue, significantly lessening the potential for infection. Mechanical stresses in the spraying system might also kill or inactivate a large percentage of particles--by some estimates up to 99 percent.9 However, if an enemy had a large supply (e.g., 50 kilograms of a virulent bioweapon) or was not terribly concerned about achieving maximum effects, crude dispensers might be adequate. In creating bioweapons, terrorists might be limited only by their imagination. For example, a low-tech version of a bio-cruise missile attack could be attempted with a system like the Autonomous Helicopter, a 14-foot-long, pilotless, remote-controlled helicopter built by Yamaha for crop dusting in Japan. The $100,000 aircraft uses a GPS system and video camera to allow its flight route to be preprogrammed and monitored. Intentional contamination of food and water is another possible form of biological attack. Product tampering or contaminating food supplies is an ever-present danger.10 For instance, in 1984, the Rajneeshee cult contaminated local salad bars in an Oregon town with salmonella, demonstrating the ease of conducting small-scale, indiscriminate terrorist attacks.11 Another means of bioattack is to spread infectious diseases through humans, animals, or insects. Infectious diseases are already the third leading cause of death in the United States, and battling them is an ongoing health issue. Foreign animal diseases also present a serious risk. Many diseases can infect multiple hosts. Three-quarters of emerging human pathogens are zoonotic--in other words, readily transmitted back and forth among humans, domesticated animals, and wildlife. MSDI Terror DA 129 AT: Containment Solves BW Diversity of pathogens means response is key, drugs don’t check. Koblentz, 4, Gregory Koblentz is a doctoral candidate in Political Science at the Massachusetts Institute of Technology, “Pathogens as Weapons: The International Seucrity Implications of Biological Warfare”, International Security, Vol. 28 No. 3 Winter 2003/04, pp. 84-122, http://belfercenter.ksg.harvard.edu/files/koblentz.pdf Biological warfare agents are characterized by a relatively high degree of diversity, which provides terrorists and military planners with significant flexibility. The open literature discusses some thirty pathogens as having the physical and biological characteristics needed for a mass casualty–producing biological weapon. Most national biological warfare programs have focused on ten to fifteen agents.26 Even this short list of biological warfare agents, how- ever, offers a range of possibilities from the lethal B. anthracis to incapacitating agents such as Coxiella burnetii (which causes Q fever) and Venezuelan equine encephalitis. Pathogens that cause contagious diseases that have been devel- oped as biological weapons include variola major (the causative agent of small- pox) and Yersinia pestis (the cause of plague). This list of agents, however, reflects only known threats. Unexpected or novel pathogens may also emerge as threats. U.S. experts were surprised to learn of some of the agents that Iraq and the former Soviet Union had chosen to produce and weaponize.27 Because biological terrorism is generally less sophisticated and less demanding than the military use of biological weapons, the range of possible agents for terrorists is even larger and more varied.28 The application of molecular biology to the development of advanced biological weapons could significantly increase the diversity of biological warfare agents, but efforts along these lines are believed not to have advanced beyond the re- search stage.29 As a result, because of the difficulty in assessing threat agents in a timely manner, defensive programs tend to lag behind offensive programs.30 MSDI Terror DA 130 Other Scenarios MSDI Terror DA 131 Cyber Scenario MSDI Terror DA 132 Core Domestic Cyber Terror Risk is High now General Clapper, Director of National Intelligence, February 26, 2015, Full Committee Hearing on “Worldwide Threats”, http://www.armed-services.senate.gov/hearings/15-02-26-worldwide-threats Again this year, I'll start with some cyber threats. Attacks against us are increasing in frequency, scale, sophistication, and severity of impact. Although we must be prepared for a catastrophic large scale strike, a so called -- cyber Armageddon, the reality is that we've been living with a constant and expanding barrage of cyber attacks for some time. This insidious trends, I believe, will continue. Cyber poses a very complex set of threats, because profit-motivated criminals, ideologically-motivated hackers or extremists, and variously capable nation states like Russia, China, North Korea, and Iran are all potential adversaries who, if they choose, can do great harm.CLAPPER: Additionally, the methods of attacks, the systems targeted and the victims are also expanding in diversity and intensity on a daily basis. 2014 saw, for the first time, destructive cyber attacks carried out on U.S. soil by nation-state entities, marked first by the Iranian attack against the Las Vegas Sands Casino Corporation a year ago this month and the North Korean attack against Sony in November. While both of these nations have lesser technical capabilities in comparison to Russia and China, these destructive attacks demonstrate that Iran and North Korea are motivated and unpredictable cyber actors. Russia and China continue to develop very sophisticated cyber programs. While I can't go into detail, the Russian cyber threat is more severe than we have previously assessed, and Chinese economic espionage against U.S. companies remains a major threat, despite detailed private-sector reports, scathing public indictments and stern U.S. (inaudible). With respect to non-nation-state entities, some ideologically motivated cyber actors expressing support for ISIL have demonstrated their capabilities by hacking several social-media accounts. The so- called cyber caliphate successfully hacked CENTCOM's Twitter account and YouTube page in January and two weeks ago hacked Newsweek Magazine's Twitter handle. The most pervasive cyber threat to the U.S. financial sector is from cyber criminals. Criminals were responsible for cyber intrusions in 2014 in the JPMorgan, Home Depot, Target, Neiman Marcus, Anthem and other U.S. companies. And in the future, we'll probably see cyber operations that change or manipulate electronic information to compromise its integrity instead of simply deleting or disrupting access to it Domestic Surveillance Key to Prevent Cyber Terror Jack Goldsmith, contributing editor, teaches at Harvard Law School and is a member of the Hoover Institution Task Force on National Security and Law., 10-10-2013, "We Need an Invasive NSA," New Republic, http://www.newrepublic.com/article/115002/invasive-nsa-will-protect-us-cyber-attacks Ever since stories about the National Security Agency’s (NSA) electronic intelligence-gathering capabilities began tumbling out last June, The New York Times has published more than a dozen editorials excoriating the “national surveillance state.” It wants the NSA to end the “mass warehousing of everyone’s data” and the use of “back doors” to break encrypted communications. A major element of the Times’ critique is that the NSA’s domestic sweeps are not justified by the terrorist threat they aim to prevent. At the end of August, in the midst of the Times’ assault on the NSA, the newspaper suffered what it described as a “malicious external attack” on its domain name registrar at the hands of the Syrian Electronic Army, a group of hackers who support Syrian President Bashar Al Assad. The paper’s MSDI Terror DA 133 website was down for several hours and, for some people, much longer. “In terms of the sophistication of the attack, this is a big deal,” said Marc Frons, the Times’ chief information officer. Ten months earlier, hackers stole the corporate passwords for every employee at the Times, accessed the computers of 53 employees, and breached the e-mail accounts of two reporters who cover China. “We brought in the FBI, and the FBI said this had all the hallmarks of hacking by the Chinese military,” Frons said at the time. He also acknowledged that the hackers were in the Times system on election night in 2012 and could have “wreaked havoc” on its coverage if they wanted. Illustration by Harry Campbell Such cyberintrusions threaten corporate America and the U.S. government every day. “Relentless assaults on America’s computer networks by China and other foreign governments, hackers and criminals have created an urgent need for safeguards to protect these vital systems,” the Times editorial page noted last year while supporting legislation encouraging the private sector to share cybersecurity information with the government. It cited General Keith Alexander, the director of the NSA, who had noted a 17-fold increase in cyber-intrusions on critical infrastructure from 2009 to 2011 and who described the losses in the United States from cyber-theft as “the greatest transfer of wealth in history.” If a “catastrophic cyber-attack occurs,” the Timesconcluded, “Americans will be justified in asking why their lawmakers ... failed to protect them.” When catastrophe strikes, the public will adjust its tolerance for intrusive government measures. The Times editorial board is quite right about the seriousness of the cyberthreat and the federal government’s responsibility to redress it. What it does not appear to realize is the connection between the domestic NSA surveillance it detests and the governmental assistance with cybersecurity it cherishes. To keep our computer and telecommunication networks secure, the government will eventually need to monitor and collect intelligence on those networks using techniques similar to ones the Timesand many others find reprehensible when done for counterterrorism ends. The fate of domestic surveillance is today being fought around the topic of whether it is needed to stop Al Qaeda from blowing things up. But the fight tomorrow, and the more important fight, will be about whether it is necessary to protect our ways of life embedded in computer networks. Anyone anywhere with a connection to the Internet can engage in cyber-operations within the United States. Most truly harmful cyber-operations, however, require group effort and significant skill. The attacking group or nation must have clever hackers, significant computing power, and the sophisticated software—known as “malware”—that enables the monitoring, exfiltration, or destruction of information inside a computer. The supply of all of these resources has been growing fast for many years—in governmental labs devoted to developing these tools and on sprawling black markets on the Internet. Telecommunication networks are the channels through which malware typically travels, often anonymized or encrypted, and buried in the billions of communications that traverse the globe each day. The targets are the communications networks themselves as well as the computers they connect— things like the Times’ servers, the computer systems that monitor nuclear plants, classified documents on computers in the Pentagon, the nasdaq exchange, your local bank, and your social-network providers. To keep these computers and networks secure, the government needs powerful intelligence capabilities abroad so that it can learn about planned cyber-intrusions. It also needs to raise defenses at home. An important first step is to correct the market failures that plague cybersecurity. Through law or regulation, the government must improve incentives for individuals to use security software, for private firms to harden their defenses and share information with one another, and for Internet service providers to crack down on the botnets—networks of compromised zombie computers—that underlie many cyber-attacks. More, too, must be done to prevent insider threats like Edward Snowden’s, and to MSDI Terror DA 134 control the stealth introduction of vulnerabilities during the manufacture of computer components— vulnerabilities that can later be used as windows for cyber-attacks. MSDI Terror DA 135 Blackouts Module Two Impacts, First is Blackouts Cetron 09, Dr. Marvin J. Cetron, President of Forecasting International, “55 Trends for Cyberwar”, Presented at Future of Information Warfare and Information Operations Sponsored by JIOPO (Joint Information Operations Program Office), CIA, DIA (Defense Intelligence Agency) & NSA (National Security Agency), 3-18-09, http://davidleffler.com/55-Trends-for-Cyberwar.html#_Toc224031549 “Cyber Security is the soft underbelly of this country,” outgoing National Intelligence Director Mike McConnell declared in a valedictory address to reporters in mid-January 2009. He rated this problem equal in significance to the potential development of atomic weapons by Iran. With this concern in mind, Forecasting International (FI) undertook a study of factors likely to influence the future development of information warfare. This work was based on a list of 55 trends FI believes will shape the world in the years ahead. In the first stage of research, FI’s staff analyzed the probable effects of trends in fields such as economics, demographics, and technology on the course of cyberwar. In the second, we presented this work to 31 leading forecasters, intelligence professionals, and military thinkers and requested their views. This report presents the results. Director McConnell does not worry so much that hackers or spies will steal classified information from computers owned by government or the military, or by contractors working for them on secret projects. He is afraid they will erase it and thereby deprive the United States of critical data. “It could have a debilitating effect on the country,” he said. Real-world attacks over the Internet also are possible. In March 2007, the Department of Energy’s Idaho Lab conducted an experiment to determine whether a power plant could be compromised by hacking alone. The result was a diesel generator smoking and on fire as a result of some malicious data that could easily have been sent to it over the Internet from anywhere in the world. In January 2008, a CIA analyst told American utilities that hackers had infiltrated electric companies in several locations outside the U.S. In at least one case, they had managed to shut off power to multiple cities. Information attacks have been used in practical conflicts as well. In April and May 2008, Russian hackers believed not to be directly employed by the Moscow government subjected Estonia to a nationwide denial-of-service (DoS) attack that effectively shut down the country’s access to the Internet, with substantial economic impact. They began the same sort of attack on Georgia in the run-up to the August 2008 clash between Moscow and T’blisi. Similarly, the military dictatorships of Myanmar and Mauritania both reportedly have hired operators of botnets—networks of illegally commandeered PCs—to smother several opposition websites with DoS attacks. We conclude that information warfare will be a significant component in most future conflicts. This position is in line with both U.S. military doctrine and white papers published by the Chinese People’s Army. One study affirms that as many as 120 governments already are pursuing information warfare programs. Repeated reports that Chinese computer specialists have hacked into government networks in Germany, the United States, and other countries show that the threat is not limited to relatively unsophisticated lands. A 2007 estimate suggested that hackers sponsored by the Chinese government had downloaded more than 3.5 terabytes of information from NIPRNet, a U.S. government network that handles mostly unclassified material. More disturbingly, The Joint Operating Environment 2008: Challenges and Implications for the Future Joint Force (“the JOE”) comments that “our adversaries have often taken advantage of computer networks and the power of information technology not only to directly influence the perceptions and will of the United States, its decision-makers, and population, but also to plan and execute savage acts of terrorism.” In a 2008 magazine article, attached as Appendix C, MSDI Terror DA 136 Forecasting International examined possible targets of future terrorist attack. At that time, we were considering vulnerabilities to relatively conventional weapons, such as bombs and toxins. However, many of the targets we identified lend themselves to cyber assaults as well. Consider these examples: Detonate EMP Bombs in the Internet-Critical Region of Northern Virginia Probability: Medium Impact: High EMP means “electromagnetic pulse,” a blast of radio energy so strong it fries electronic equipment. (Set off an atomic bomb at an altitude of 30,000 feet, and there won’t be a computer working for miles around.) The terrorists who strike Northern Virginia on 9/11 in 2010 do not need a nuclear weapon to shut down the region’s computers. Instead, they use homemade EMP generatorbombs that any good engineering student can build with $400 and information found on the Internet. They detonate nine of the bombs within a triangle stretching from McLean west to Dulles International Airport and south to Chantilly. The EMP blasts take down communications and navigation equipment at Dulles, some of the less critical computers at CIA headquarters in Langley, and data centers that carry some 40 percent of the world’s Internet traffic. With police unable to use radios, computers, and cellphones, the terrorists escape. It is eight months before they are identified. Only one of the sixmember team will be captured in the next two years. A similar bomb, detonated near Wall Street, acts as a “weapon of mass disruption,” sowing chaos and fear. Casualties: None directly. In Northern Virginia-area hospitals, 17 patients die in part because their computerized monitors no longer operate properly. Another 14 may have died when their pacemakers delivered massive shocks to the heart and then ceased working. Consequences: Dulles-bound aircraft are diverted for three days until replacement gear can be brought in. Some 40 percent of the world’s Internet traffic flowed through this part of Northern Virginia. Losing that capacity slows the Internet to a crawl, which further complicates emergency response. Most of the 175,000 people employed in this IT-intensive region will be out of work for at least a year. Repairing the electronic infrastructure will cost an estimated $40 billion. Businesses across the United States lose an additional $2 billion per month owing to the loss of efficient Internet service. The Dow plummets 1,000 points and trading is suspended for three days. This attack is, of course, a cyber assault even as originally imagined. The same weapon could be used to destroy computer systems in Manhattan’s financial district, at financial wire-system centers, or in the government offices of Washington, D.C. According to the best estimates we have been able to find, a good engineer could produce an EMP bomb from widely available parts for $5,000. Attack on U.S. Oil Refineries Probability: High Impact: High Four terrorists driving minivans approach the gates of four oil refineries: the Royal Dutch Shell installation at Port Arthur, Texas; the Valero Energy refinery at Corpus Christi, Texas; the Chalmette refinery east of New Orleans; and the Chevron refinery at Pascagoula, Miss. They crash through the gates and aim for the key catalytic units used to refine petroleum. The crashes set off more than 500 pounds of dynamite in the back of each van. Eleven workers die in the initial attacks and six more perish in the infernos that send plumes of dark smoke miles into the sky. Even before the flames can be extinguished, the price of oil skyrockets to more than $200 a barrel. The president declares a state of emergency and dispatches National Guard units to protect key infrastructure. Casualties: Seventeen dead, 34 wounded (several critically burned). Consequences: In a single day, America loses 15 percent of its crude-oil processing capability for more than a year. The Federal Reserve slashes the prime rate by a full point in a desperate attempt to avert a recession, as gas jumps to $4 a gallon. Critics bemoan the fact that, for decades, the United States neglected development of its “dirty” oil-processing infrastructure—and now it’s too late. Total economic cost: $1.2 trillion. Like many other facilities, oil refineries are almost completely automated. Manipulating their computers to push operating temperatures and pressures out of tolerance could disrupt nation’s petroleum supplies as effectively as bombs, with little risk to the attackers. With sufficient preparation, many more than four refineries could be brought down at once. Similar attacks might release toxins from chemical plants or destroy manufacturing facilities. Bring Down Four High- MSDI Terror DA 137 Tension Wires Across the West Probability: High Impact: High The North American power grid has a dark secret: Of the 10,000 power substations, a loss of only 4 percent will disconnect almost two-thirds of the entire grid. But with proper planning and timing, only 2 percent need be disrupted—downing just a few power lines can have widespread consequences. Some attacks are as easy as starting forest or grass fires under transmission lines, to ionize the air and cause the lines to fail. Others require suicide car bombs. In 12 hours, by downing just four lines, more than 60 percent of North America is without power. Power is lost from Knoxville, Tenn., to Nevada, and north to the Canadian border. Casualties: Other than the suicide bombers, there are no direct casualties. But patients in hospitals, nursing homes, and even on respirators and other life-saving devices in private homes begin to expire. The indirect death toll starts to climb rapidly. Based on prior blackouts, 100 to 300 deaths are likely. Stop lights don’t work, gas stations can’t pump fuel, and civil disturbances occur as crowds waiting in lines to receive ice grow restless. The president considers requesting help from the National Guard to maintain order. Consequences: Nearly 200 million people are affected, and infrastructure damage could take several months to repair. Even the most optimistic projections show the economic impact could easily top $100 billion. Again, the power grid is governed by computers that could be manipulated to bring down the system. Oil and gas pipelines, subway systems, and rail lines appear to be equally vulnerable to cyber attack. That Leads to Nuclear Meltdowns. Public Citizen, 3, “The Big Blackout and Amnesia in Congress: Lawmakers Turn a Blind Eye to the Danger of Nuclear Power and the Failure of Electricity Deregulation”, http://www.citizen.org/documents/bigblackout.pdf Unfortunately, many policymakers and politicians have misidentified the cause of the blackout, ignored one of its most serious effects, and offered as a solution massive legislation that would only make the situation worse. Although there are problems with many facets of the nation’s energy system, many of the deficiencies that have been highlighted since the blackout are either non-existent (such as the alleged shortage of electricity capacity) or have been mischaracterized. In this report, Public Citizen analyzes one of the most serious and immediately dangerous effects of the blackout: the unreliability and heightened vulnerability of nuclear power reactors. Furthermore, we trace the cause of the blackout to the chaotic effects of electricity deregulation. Finally, we consider the folly of the pending omnibus energy legislation in Congress, which completely fails to provide the most appropriate legislative prescription for the problem: the strengthening of electricity regulations and consumer protections, coupled with investment in safe, renewable and reliable electricity generation and distribution systems. THE BLACKOUT DEMONSTRATES THE UNRELIABILITY, VULNERABILITY, AND DANGER OF NUCLEAR POWER REACTORS Unfortunately, some nuclear industry cheerleaders are opportunistically exploiting the blackout to promote further reliance on the inherently unsafe, unreliable and polluting technology of nuclear power. As usual, they espouse nuclear “solutions” to nearly every problem, while turning a blind eye to the myriad problems caused by the nuclear industry itself. Sen. Pete Domenici (R-N.M.), chairman of the Energy and Commerce committee, and a staunch supporter of nuclear power, issued a statement after the blackout in which he claimed: This outage clearly demonstrates how close the nation is to its energy production and distribution limit. [...] Ensuring the proper level of power to the country demands that we make trade-offs, including...greater use of such sources as nuclear energy... [Emphasis added] In the aftermath of the recent blackout, it is important to consider the enormous risks and reliability deficiencies of nuclear MSDI Terror DA 138 power. The unique dangers of nuclear power were exacerbated by the huge power outage: 21 nuclear reactors—which are, ironically, dependent upon off-site power—were forced to shut down in the U.S. and Canada. Power loss from the grid forces nuclear power stations to resort to emergency generators for basic safety operations while in shutdown mode—a contingency operation that presents a whole host of new risks for the plant. Power outages, especially on a grand scale, put already-vulnerable nuclear facilities at an even greater risk of serious accident. Extinction Wasserman 2, Harvey Wasserman, Greenpeace USA, Nuclear Information & Resource Service, “America’s Terrorist Nuclear Threat To Itself”, http://www.greens.org/s-r/27/27-13.html A jet crash like the one on 9/11 or other forms of terrorist assault at Indian Point could yield three infernal fireballs of radioactive lava burning through the earth and into the aquifer and the river. Striking water they would blast gigantic billows of radioactive steam into the atmosphere. Prevailing winds from the north and west might initially drive these clouds of mass death downriver into New York City and east into Westchester and Long Island. But at Three Mile Island and Chernobyl, winds ultimately shifted around the compass to irradiate all surrounding areas. At Indian Point, thousands of square miles would have been saturated with the most lethal clouds ever created, depositing genetic poisons that would kill forever. In nearby communities like Buchanan, Nyack, Monsey and scores more, infants and small children would quickly die en masse. Virtually all pregnant women would spontaneously abort, or ultimately give birth to deformed offspring. Sores, rashes, ulcerations and burns would afflict the skin of millions. Emphysema, heart attacks, stroke, multiple organ failure, hair loss, nausea, inability to eat or drink or swallow, diarrhea and incontinence, sterility and impotence, asthma, blindness, and more would kill thousands on the spot, and doom hundreds of thousands if not millions. A metallic taste would afflict virtually everyone downwind in New York, New Jersey and New England, a ghoulish curse similar to that endured by the fliers who dropped the atomic bombs on Hiroshima and Nagasaki, by those living downwind from nuclear bomb tests in the south seas and Nevada, and by victims caught in the downdrafts from Three Mile Island and Chernobyl. Then comes the wave of cancers, leukemias, lymphomas and tumors. Evacuation would be impossible, but thousands would die trying. Bridges and highways would become killing fields for those attempting to escape to destinations that would soon enough become equally deadly as the winds shifted. The assault would not require a large jet. Attempts to quench the fires would be futile. At Chernobyl, pilots flying helicopters that dropped boron on the fiery core died in droves. At Indian Point, such missions would be a sure ticket to death. Their utility would be doubtful as the molten cores rage uncontrolled for days, weeks and years, spewing ever more devastation into the eco-sphere. More than 800,000 Soviet draftees were forced through Chernobyl’s seething remains in a futile attempt to clean it up. They are dying in droves. Who would now volunteer for such an American task force? The radioactive cloud from Chernobyl blanketed the vast Ukraine and Belarus landscape, then carried over Europe and into the jetstream, surging through the west coast of the United States within 10 days, carrying across our northern tier, circling the globe, then coming back again. The radioactive clouds from Indian Point would enshroud New York, New Jersey, New England, and carry deep into the Atlantic and up into Canada and across to Europe and around the globe again and again. The immediate damage would render thousands of the world’s most populous and expensive square miles permanently uninhabitable. All five boroughs of New York City would be an apocalyptic wasteland. The World Trade Center site would be rendered as unusable and even more lethal by a jet crash at Indian Point than it was by the direct hits of 9/11. All real estate and economic value would be poisonously radioactive throughout the entire region. Irreplaceable trillions in human capital would be forever lost. As at Three Mile MSDI Terror DA 139 Island, where thousands of farm and wild animals died in heaps, and as at Chernobyl, where soil, water and plant life have been hopelessly irradiated, natural eco-systems on which human and all other life depends would be permanently and irrevocably destroyed. Spiritually, psychologically, financially, ecologically, our nation would never recover. This is what we missed by a mere 40 miles near New York City on September 11. Now that we are at war, this is what could be happening as you read this. There are 103 of these potential Bombs of the Apocalypse now operating in the United States. They generate just 18% of America’s electricity, just 8% of our total energy. As with reactors elsewhere, the two at Indian Point have both been off-line for long periods of time with no appreciable impact on life in New York. Already an extremely expensive source of electricity, the cost of attempting to defend these reactors will put nuclear energy even further off the competitive scale. Since its deregulation crisis, California—already the nation’s second-most efficient state—cut further into its electric consumption by some 15%. Within a year the US could cheaply replace with increased efficiency all the reactors now so much more expensive to operate and protect. Yet, as the bombs fall and the terror escalates, Congress is fast-tracking a form of legal immunity to protect the operators of reactors like Indian Point from liability in case of a meltdown or terrorist attack. Why is our nation handing its proclaimed enemies the weapons of our own mass destruction, and then shielding from liability the companies that insist on continuing to operate them? Do we take this war seriously? Are we committed to the survival of our nation? If so, the ticking reactor bombs that could obliterate the very core of our life and of all future generations must be shut down. MSDI Terror DA 140 Oil Shocks Module Second is Oil Shocks – Cyber Terror Would Target Commodities Exchanges and Spike Oil Prices Cetron 09, Dr. Marvin J. Cetron, President of Forecasting International, “55 Trends for Cyberwar”, Presented at Future of Information Warfare and Information Operations Sponsored by JIOPO (Joint Information Operations Program Office), CIA, DIA (Defense Intelligence Agency) & NSA (National Security Agency), 3-18-09, http://davidleffler.com/55-Trends-for-Cyberwar.html#_Toc224031549 “Cyber Security is the soft underbelly of this country,” outgoing National Intelligence Director Mike McConnell declared in a valedictory address to reporters in mid-January 2009. He rated this problem equal in significance to the potential development of atomic weapons by Iran. With this concern in mind, Forecasting International (FI) undertook a study of factors likely to influence the future development of information warfare. This work was based on a list of 55 trends FI believes will shape the world in the years ahead. In the first stage of research, FI’s staff analyzed the probable effects of trends in fields such as economics, demographics, and technology on the course of cyberwar. In the second, we presented this work to 31 leading forecasters, intelligence professionals, and military thinkers and requested their views. This report presents the results. Director McConnell does not worry so much that hackers or spies will steal classified information from computers owned by government or the military, or by contractors working for them on secret projects. He is afraid they will erase it and thereby deprive the United States of critical data. “It could have a debilitating effect on the country,” he said. Real-world attacks over the Internet also are possible. In March 2007, the Department of Energy’s Idaho Lab conducted an experiment to determine whether a power plant could be compromised by hacking alone. The result was a diesel generator smoking and on fire as a result of some malicious data that could easily have been sent to it over the Internet from anywhere in the world. In January 2008, a CIA analyst told American utilities that hackers had infiltrated electric companies in several locations outside the U.S. In at least one case, they had managed to shut off power to multiple cities. Information attacks have been used in practical conflicts as well. In April and May 2008, Russian hackers believed not to be directly employed by the Moscow government subjected Estonia to a nationwide denial-of-service (DoS) attack that effectively shut down the country’s access to the Internet, with substantial economic impact. They began the same sort of attack on Georgia in the run-up to the August 2008 clash between Moscow and T’blisi. Similarly, the military dictatorships of Myanmar and Mauritania both reportedly have hired operators of botnets—networks of illegally commandeered PCs—to smother several opposition websites with DoS attacks. We conclude that information warfare will be a significant component in most future conflicts. This position is in line with both U.S. military doctrine and white papers published by the Chinese People’s Army. One study affirms that as many as 120 governments already are pursuing information warfare programs. Repeated reports that Chinese computer specialists have hacked into government networks in Germany, the United States, and other countries show that the threat is not limited to relatively unsophisticated lands. A 2007 estimate suggested that hackers sponsored by the Chinese government had downloaded more than 3.5 terabytes of information from NIPRNet, a U.S. government network that handles mostly unclassified material. More disturbingly, The Joint Operating Environment 2008: Challenges and Implications for the Future Joint Force (“the JOE”) comments that “our adversaries have often taken advantage of computer networks and the power of information technology not only to directly influence the perceptions and will of the United States, its decision-makers, and population, but also to plan and execute savage acts of terrorism.” In a 2008 magazine article, attached as MSDI Terror DA 141 Appendix C, Forecasting International examined possible targets of future terrorist attack. At that time, we were considering vulnerabilities to relatively conventional weapons, such as bombs and toxins. However, many of the targets we identified lend themselves to cyber assaults as well. Consider these examples: Detonate EMP Bombs in the Internet-Critical Region of Northern Virginia Probability: Medium Impact: High EMP means “electromagnetic pulse,” a blast of radio energy so strong it fries electronic equipment. (Set off an atomic bomb at an altitude of 30,000 feet, and there won’t be a computer working for miles around.) The terrorists who strike Northern Virginia on 9/11 in 2010 do not need a nuclear weapon to shut down the region’s computers. Instead, they use homemade EMP generator-bombs that any good engineering student can build with $400 and information found on the Internet. They detonate nine of the bombs within a triangle stretching from McLean west to Dulles International Airport and south to Chantilly. The EMP blasts take down communications and navigation equipment at Dulles, some of the less critical computers at CIA headquarters in Langley, and data centers that carry some 40 percent of the world’s Internet traffic. With police unable to use radios, computers, and cellphones, the terrorists escape. It is eight months before they are identified. Only one of the six-member team will be captured in the next two years. A similar bomb, detonated near Wall Street, acts as a “weapon of mass disruption,” sowing chaos and fear. Casualties: None directly. In Northern Virginia-area hospitals, 17 patients die in part because their computerized monitors no longer operate properly. Another 14 may have died when their pacemakers delivered massive shocks to the heart and then ceased working. Consequences: Dulles-bound aircraft are diverted for three days until replacement gear can be brought in. Some 40 percent of the world’s Internet traffic flowed through this part of Northern Virginia. Losing that capacity slows the Internet to a crawl, which further complicates emergency response. Most of the 175,000 people employed in this IT-intensive region will be out of work for at least a year. Repairing the electronic infrastructure will cost an estimated $40 billion. Businesses across the United States lose an additional $2 billion per month owing to the loss of efficient Internet service. The Dow plummets 1,000 points and trading is suspended for three days. This attack is, of course, a cyber assault even as originally imagined. The same weapon could be used to destroy computer systems in Manhattan’s financial district, at financial wire-system centers, or in the government offices of Washington, D.C. According to the best estimates we have been able to find, a good engineer could produce an EMP bomb from widely available parts for $5,000. Attack on U.S. Oil Refineries Probability: High Impact: High Four terrorists driving minivans approach the gates of four oil refineries: the Royal Dutch Shell installation at Port Arthur, Texas; the Valero Energy refinery at Corpus Christi, Texas; the Chalmette refinery east of New Orleans; and the Chevron refinery at Pascagoula, Miss. They crash through the gates and aim for the key catalytic units used to refine petroleum. The crashes set off more than 500 pounds of dynamite in the back of each van. Eleven workers die in the initial attacks and six more perish in the infernos that send plumes of dark smoke miles into the sky. Even before the flames can be extinguished, the price of oil skyrockets to more than $200 a barrel. The president declares a state of emergency and dispatches National Guard units to protect key infrastructure. Casualties: Seventeen dead, 34 wounded (several critically burned). Consequences: In a single day, America loses 15 percent of its crude-oil processing capability for more than a year. The Federal Reserve slashes the prime rate by a full point in a desperate attempt to avert a recession, as gas jumps to $4 a gallon. Critics bemoan the fact that, for decades, the United States neglected development of its “dirty” oil-processing infrastructure—and now it’s too late. Total economic cost: $1.2 trillion. Like many other facilities, oil refineries are almost completely automated. Manipulating their computers to push operating temperatures and pressures out of tolerance could disrupt nation’s petroleum supplies as effectively as bombs, with little risk to the attackers. With sufficient preparation, many more than four refineries could be brought down at once. Similar attacks might release toxins from chemical plants or destroy manufacturing facilities. MSDI Terror DA 142 Instability in oil prices causes worldwide recession and resource wars. Roberts 2004 (Paul, The end of Oil: on the edge of a perilous new world, p13) The last three times oil production dropped off a cliff- the Arab oil embargo of 1974, the Iranian revolution in 1979, and the 1991 Persian Gulf War- the resulting price spikes pushed the world into recession. And these disruptions were temporary. Presumably, the effects of a long-term permanent disruption would be far more gruesome. As prices rose, consumers would quickly shift to other fuels, such as natural gas or coal, but soon enough, those supplies would also tighten and their prices would rise. An inflationary ripple effect would set in. As energy became more expensive, so would such energy-dependent activities as manufacturing and transportation. Commercial activity would slow, and segments of the global economy especially dependent on rapid growth- which is to say, pretty much everything these days- would tip into recession. The cost of goods and services would rise, ultimately depressing economic demand and throwing the entire economy into an enduring depression that would make 1929 look like a dress rehearsal and could touch of a desperate and probably violent contest for whatever oil supplies remained. Conflicts over natural resources are the most probable scenario for global war – Escalates and Makes all other Impacts More likely Klare 2006 (Michael- professor of peace and world security studies at Hampshire College, March 7, http://www.energybulletin.net/13605. html) It's official: the era of resource wars is upon us. In a major London address, British Defense Secretary John Reid warned that global climate change and dwindling natural resources are combining to increase the likelihood of violent conflict over land, water and energy. Climate change, he indicated, “will make scarce resources, clean water, viable agricultural land even scarcer”—and this will “make the emergence of violent conflict more rather than less likely.” Lthough not unprecedented, Reid’s prediction of an upsurge in resource conflict is significant both because of his senior rank and the vehemence of his remarks. “The blunt truth is that the lack of water and agricultural land is a significant contributory factor to the tragic conflict we see unfolding in Darfur,” he declared. “We should see this as a warning sign.” Resource conflicts of this type are most likely to arise in the developing world, Reid indicated, but the more advanced and affluent countries are not likely to be spared the damaging and destabilizing effects of global climate change. With sea levels rising, water and energy becoming increasingly scarce and prime agricultural lands turning into deserts, internecine warfare over access to vital resources will become a global phenomenon. Reid’s speech, delivered at the prestigious Chatham House in London (Britain’s equivalent of the Council on Foreign Relations), is but the most recent expression of a growing trend in strategic circles to view environmental and resource effects—rather than political orientation and ideology—as the most potent source of armed conflict in the decades to come. With the world population rising, global consumption rates soaring, energy supplies rapidly disappearing and climate change eradicating valuable farmland, the stage is being set for persistent and worldwide struggles over vital resources. Religious and political strife will not disappear in this scenario, but rather will be channeled into contests over valuable sources of MSDI Terror DA 143 water, food and energy. Prior to Reid’s address, the most significant expression of this outlook was a report prepared for the U.S. Department of Defense by a California-based consulting firm in October 2003. Entitled “An Abrupt Climate Change Scenario and Its Implications for United States National Security,” the report warned that global climate change is more likely to result in sudden, cataclysmic environmental events than a gradual (and therefore manageable) rise in average temperatures. Such events could include a substantial increase in global sea levels, intense storms and hurricanes and continent-wide “dust bowl” effects. This would trigger pitched battles between the survivors of these effects for access to food, water, habitable land and energy supplies. “Violence and disruption stemming from the stresses created by abrupt changes in the climate pose a different type of threat to national security than we are accustomed to today,” the 2003 report noted. “Military confrontation may be triggered by a desperate need for natural resources such as energy, food and water rather than by conflicts over ideology, religion or national honor.” Until now, this mode of analysis has failed to command the attention of top American and British policymakers. For the most part, they insist that ideological and religious differences— notably, the clash between values of tolerance and democracy on one hand and extremist forms of Islam on the other—remain the main drivers of international conflict. But Reid’s speech at Chatham House suggests that a major shift in strategic thinking may be under way. Environmental perils may soon dominate the world security agenda. This shift is due in part to the growing weight of evidence pointing to a significant human role in altering the planet’s basic climate systems. Recent studies showing the rapid shrinkage of the polar ice caps, the accelerated melting of North American glaciers, the increased frequency of severe hurricanes and a number of other such effects all suggest that dramatic and potentially harmful changes to the global climate have begun to occur. More importantly, they conclude that human behavior—most importantly, the burning of fossil fuels in factories, power plants, and motor vehicles—is the most likely cause of these changes. This assessment may not have yet penetrated the White House and other bastions of head-in-the-sand thinking, but it is clearly gaining ground among scientists and thoughtful analysts around the world. For the most part, public discussion of global climate change has tended to describe its effects as an environmental problem—as a threat to safe water, arable soil, temperate forests, certain species and so on. And, of course, climate change is a potent threat to the environment; in fact, the greatest threat imaginable. But viewing climate change as an environmental problem fails to do justice to the magnitude of the peril it poses. As Reid’s speech and the 2003 Pentagon study make clear, the greatest danger posed by global climate change is not the degradation of ecosystems per se, but rather the disintegration of entire human societies, producing wholesale starvation, mass migrations and recurring conflict over resources. “As famine, disease, and weatherrelated disasters strike due to abrupt climate change,” the Pentagon report notes, “many countries’ needs will exceed their carrying capacity”—that is, their ability to provide the minimum requirements for human survival. This “will create a sense of desperation, which is likely to lead to offensive aggression” against countries with a greater stock of vital resources. “Imagine eastern European countries, struggling to feed their populations with a falling supply of food, water, and energy, eyeing Russia, whose population is already in decline, for access to its grain, minerals, and energy supply.” Similar scenarios will be replicated all across the planet, as those without the means to survival invade or migrate to those with greater abundance—producing endless struggles between resource “haves” and “have-nots.” It is this prospect, more than anything, that worries John Reid. In particular, he expressed concern over the inadequate capacity of poor and unstable countries to cope with the effects of climate change, and the resulting risk of state collapse, civil war and mass migration. “More than 300 million people in Africa currently lack access to safe water,” he observed, and “climate change will worsen this dire situation”— provoking more wars like Darfur. And even if these social disasters will occur primarily in the developing world, the wealthier countries will also be caught up in them, MSDI Terror DA 144 whether by participating in peacekeeping and humanitarian aid operations, by fending off unwanted migrants or by fighting for access to overseas supplies of food, oil, and minerals. When reading of these nightmarish scenarios, it is easy to conjure up images of desperate, starving people killing one another with knives, staves and clubs—as was certainly often the case in the past, and could easily prove to be so again. But these scenarios also envision the use of more deadly weapons. “In this world of warring states,” the 2003 Pentagon report predicted, “nuclear arms proliferation is inevitable.” As oil and natural gas disappears, more and more countries will rely on nuclear power to meet their energy needs—and this “will accelerate nuclear proliferation as countries develop enrichment and reprocessing capabilities to ensure their national security.” MSDI Terror DA 145 Nuke Power Scenario MSDI Terror DA 146 Core US nuclear power sites not protected, risk of terror attack Laura Muth, 9-2, 13 graduated in 2012 from Johns Hopkins University with a degree in political science, Policy Mic, The Unexpected Threat to America’s Nuclear Power Sites, http://www.policymic.com/articles/61611/the-unexpected-threat-to-america-s-nuclear-sites Decades after the end of the Cold War, the U.S. is dealing with a different nuclear threA2: the security of its own nuclear sites. But the problem is more complicated than you might think.¶ The University of Texas, Austin Nuclear Proliferation Prevention Project (NPPP) recently released a report stating that none of the 104 commercial nuclear reactors or three research reactors in the U.S. is adequately protected against terrorist threats. The report cites two “credible threats: the theft of bomb-grade material to make a nuclear weapon, and sabotage attacks intended to cause a reactor meltdown.”¶ Domestic Intelligence is Key to Check Insiders that could attack plants Laura Kirkman, Allan Kuperman, 8-15, 13, Nonproliferation Prevention Project, “Protecting US Nuclear Facilities from Terrorist Attack: Reassessing the Current ‘Design Basis Threat’ Approach,” http://blogs.utexas.edu/nppp/files/2013/08/NPPP-working-paper-1-2013-Aug-15.pdf Implicit in the four threats described above is the possibility of an active or passive insider using knowledge of facilities to assist terrorists in their actions. Passive insiders could provide information about weaknesses in the plant or operations, allowing terrorists to magnify their impact. 49 An active insider could deactivate alarm and emergency safety systems or deliver explosives to sensitive areas of the nuclear facility.50¶ A recent incident highlights the immediacy of the insider threat problem. An American citizen, suspected of al Qaeda membership, worked for five different US nuclear power plants from 2002 to 2008 after passing federal background checks.51 This incident is particularly disturbing because nuclear power plants depend heavily on their employee screening processes to combat the insider threat.52 Another incident that allegedly involved insider information was the break-in at the Pelindaba nuclear reactor and research center in South Africa. In November 2007, four gunmen spent 45 minutes inside the heavily guarded facility, eventually breaking into the emergency control center at the middle of the facility. They fled when an alarm was triggered. At the same time, another four men tried but failed to break-in from the other side of the facility, suggesting a coordinated attack. The ease with which the attackers disabled multiple layers of security strongly suggests the use of insider information.53 Attack on a reactor means a massive release of radioactivity Michael Clark, 2013, Michael Clarke (m.clarke@griffith.edu.au) is an Australian Research Council (ARC) Research Fellow at the Griffith Asia Institute, June 2013, Comparative Strategy, “Pakistan and Nuclear Terrorism: How Real is the Threat?,” pp. 98-114 Commercial power reactors are arguably more attractive for a terrorist attack aimed at dispersing radioactive material than research reactors due to the fact that they are more numerous (approximately 440 commercial power reactors in 31 countries), are larger, contain more radioactive spent fuel in MSDI Terror DA 147 cooling ponds, and contain much higher levels of radioactivity in their core. 33 Ferguson and Potter conclude that while a terrorist attack targeting a reactor or spent fuel pond “could not ignite an explosive chain reaction—that is a nuclear bomb-type explosion,” the “worst plausible scenario is that terrorists would be able to cause a massive off-site release of radioactivity and substantial damage to the nuclear facility.” Extinction Wasserman 2, Harvey Wasserman, Greenpeace USA, Nuclear Information & Resource Service, “America’s Terrorist Nuclear Threat To Itself”, http://www.greens.org/s-r/27/27-13.html A jet crash like the one on 9/11 or other forms of terrorist assault at Indian Point could yield three infernal fireballs of radioactive lava burning through the earth and into the aquifer and the river. Striking water they would blast gigantic billows of radioactive steam into the atmosphere. Prevailing winds from the north and west might initially drive these clouds of mass death downriver into New York City and east into Westchester and Long Island. But at Three Mile Island and Chernobyl, winds ultimately shifted around the compass to irradiate all surrounding areas. At Indian Point, thousands of square miles would have been saturated with the most lethal clouds ever created, depositing genetic poisons that would kill forever. In nearby communities like Buchanan, Nyack, Monsey and scores more, infants and small children would quickly die en masse. Virtually all pregnant women would spontaneously abort, or ultimately give birth to deformed offspring. Sores, rashes, ulcerations and burns would afflict the skin of millions. Emphysema, heart attacks, stroke, multiple organ failure, hair loss, nausea, inability to eat or drink or swallow, diarrhea and incontinence, sterility and impotence, asthma, blindness, and more would kill thousands on the spot, and doom hundreds of thousands if not millions. A metallic taste would afflict virtually everyone downwind in New York, New Jersey and New England, a ghoulish curse similar to that endured by the fliers who dropped the atomic bombs on Hiroshima and Nagasaki, by those living downwind from nuclear bomb tests in the south seas and Nevada, and by victims caught in the downdrafts from Three Mile Island and Chernobyl. Then comes the wave of cancers, leukemias, lymphomas and tumors. Evacuation would be impossible, but thousands would die trying. Bridges and highways would become killing fields for those attempting to escape to destinations that would soon enough become equally deadly as the winds shifted. The assault would not require a large jet. Attempts to quench the fires would be futile. At Chernobyl, pilots flying helicopters that dropped boron on the fiery core died in droves. At Indian Point, such missions would be a sure ticket to death. Their utility would be doubtful as the molten cores rage uncontrolled for days, weeks and years, spewing ever more devastation into the eco-sphere. More than 800,000 Soviet draftees were forced through Chernobyl’s seething remains in a futile attempt to clean it up. They are dying in droves. Who would now volunteer for such an American task force? The radioactive cloud from Chernobyl blanketed the vast Ukraine and Belarus landscape, then carried over Europe and into the jetstream, surging through the west coast of the United States within 10 days, carrying across our northern tier, circling the globe, then coming back again. The radioactive clouds from Indian Point would enshroud New York, New Jersey, New England, and carry deep into the Atlantic and up into Canada and across to Europe and around the globe again and again. The immediate damage would render thousands of the world’s most populous and expensive square miles permanently uninhabitable. All five boroughs of New York City would be an apocalyptic wasteland. The World Trade Center site would be rendered as unusable and MSDI Terror DA 148 even more lethal by a jet crash at Indian Point than it was by the direct hits of 9/11. All real estate and economic value would be poisonously radioactive throughout the entire region. Irreplaceable trillions in human capital would be forever lost. As at Three Mile Island, where thousands of farm and wild animals died in heaps, and as at Chernobyl, where soil, water and plant life have been hopelessly irradiated, natural eco-systems on which human and all other life depends would be permanently and irrevocably destroyed. Spiritually, psychologically, financially, ecologically, our nation would never recover. This is what we missed by a mere 40 miles near New York City on September 11. Now that we are at war, this is what could be happening as you read this. There are 103 of these potential Bombs of the Apocalypse now operating in the United States. They generate just 18% of America’s electricity, just 8% of our total energy. As with reactors elsewhere, the two at Indian Point have both been off-line for long periods of time with no appreciable impact on life in New York. Already an extremely expensive source of electricity, the cost of attempting to defend these reactors will put nuclear energy even further off the competitive scale. Since its deregulation crisis, California—already the nation’s second-most efficient state—cut further into its electric consumption by some 15%. Within a year the US could cheaply replace with increased efficiency all the reactors now so much more expensive to operate and protect. Yet, as the bombs fall and the terror escalates, Congress is fast-tracking a form of legal immunity to protect the operators of reactors like Indian Point from liability in case of a meltdown or terrorist attack. Why is our nation handing its proclaimed enemies the weapons of our own mass destruction, and then shielding from liability the companies that insist on continuing to operate them? Do we take this war seriously? Are we committed to the survival of our nation? If so, the ticking reactor bombs that could obliterate the very core of our life and of all future generations must be shut down. MSDI Terror DA 149 Fuel Rod Internal Terrorists can attack spent fuel rods Laura Kirkman, Allan Kuperman, 8-15, 13, Nonproliferation Prevention Project, “Protecting US Nuclear Facilities from Terrorist Attack: Reassessing the Current ‘Design Basis Threat’ Approach,” http://blogs.utexas.edu/nppp/files/2013/08/NPPP-working-paper-1-2013-Aug-15.pdf Sabotage of spent fuel pools is related to sabotage of nuclear power plants, which typically store their spent fuel in facilities located on their grounds. Unlike fresh fuel, spent nuclear fuel is highly radioactive but unable to sustain as efficient a nuclear chain reaction. This spent fuel is removed from the reactor and stored in pools of cooling water, and sometimes is subsequently transferred to more permanent dry-cask storage on- site. The pools often lack the shielding and structural protections that the containment provides to the reactor itself, leaving the spent fuel also more vulnerable to sabotage by terrorists.43 A 2006 report by the National Academy of Sciences concluded that a successful terrorist attack on spent fuel pools would be difficult, but possible.44 In the absence of a centralized national storage facility for spent fuel, nuclear power plants often maintain their spent fuel pool inventories at amounts beyond the original design limits of the pool.45 A terrorist with enough technical knowledge and means could drain a spent fuel pool, triggering a cladding fire that could result in the release of large amounts of radioactive material.46 This is similar to what occurred in 2011 in Fukushima, Japan, when an earthquake’s effects drained the spent fuel pools. According to Beyea, Lyman, and von Hippel, a terrorist attack on a spent fuel pool could cause thousands of deaths from cancer, and economic damages in the hundreds of billions of dollars.47 In the wake of the NAS report, U.S. utilities reportedly have taken some measures that may somewhat mitigate this risk, but not eliminate it.48 An attack on dry cask storage would also result in the release of radioactive material, although in smaller amounts due to design differences. MSDI Terror DA 150 Blackout Scenario MSDI Terror DA 151 Core ISIS will shut down the U.S. national grid – it’ll independently kill 9 out of 10 Americans Bedard 9/3/14 – Paul, columnist at the Washington Examiner, “New ISIS threat: America's electric grid; blackout could kill 9 of 10” http://washingtonexaminer.com/new-isis-threat-americas-electric-gridblackout-could-kill-9-of-10/article/2552766 Former top government officials who have been warning Washington about the vulnerability of the nation’s largely unprotected electric grid are raising new fears that troops from the jihadist Islamic State are poised to attack the system, leading to a power crisis that could kill millions. “Inadequate grid security, a porous U.S.-Mexico border, and fragile transmission systems make the electric grid a target for ISIS,” said Peter Pry, one of the nation’s leading experts on the grid. Others joining Pry at a press conference later Wednesday to draw attention to the potential threat said that if just a handful of the nation’s high voltage transformers were knocked out, blackouts would occur across the country. “By one estimate, should the power go out and stay out for over a year, nine out of 10 Americans would likely perish,” said Frank Gaffney, founder and president of the Center for Security Policy in Washington. At the afternoon press conference, Gaffney dubbed the potential crisis the "grid jihad." A lack of electricity would shut off water systems, impact city transportation services and shutdown hospitals and other big facilities. Fresh and frozen foods also would be impacted as would banks, financial institutions and utilities. Pry provided details of recent attacks on electricity systems and said that ISIS could easily team with Mexican drug cartels to ravage America. He told Secrets, for example, that the Knights Templar drug gang blacked out the electric grid of the Mexican state of Michoacan in 2013 to provide cover for killing those fighting the drug trade. “The Knights Templars and other criminal gangs in Mexico will do anything for money, and ISIS, the richest terrorist organization in history, has hundreds of millions of dollars at its disposal,” said Pry. “ISIS could hire one of the Mexican cartels, or one of their criminal gangs already in the U.S., or activate jihadist terror cells already in the U.S., and inflict a multi-state blackout immediately, within days or weeks. Perhaps even a nationwide blackout,” Pry explained to Secrets. “I am not saying it is likely they will do so. But given the capabilities and objectives of ISIS and our obvious vulnerabilities, it would be foolish to ignore the threat to the grid, to regard the threat as unlikely. Our planning should be based on imminent asymmetrical threats, and not assume that another 9/11 large-scale attack is years away,” he added. Surveillance necessary to prevent ISIS attacks Guardian, June 22, 2014 , Isis threat justifies greater surveillance powers in UK, says Liam Fox Former defence secretary says first duty of state is to protect citizens and public will accept greater monitoring powers Britain's security services may need to be given greater powers of surveillance to monitor extremists from Isis when they return home to Britain from Iraq and Syria, the former defence secretary Liam Fox has said. A majority of people will accept that an "ideological battle" means that the authorities will need greater powers to intercept the communications of extremists, Fox said. The former defence secretary, who was speaking on the Andrew Marr Show on BBC1, said that Britain should offer to put its airbases at the disposal of the US to avoid "horrendous" situation in Iraq as Isis MSDI Terror DA 152 forces pose a threat to Baghdad. Fox said: "There are those who say if we don't get involved, if we hunker down then we will be fine. There will be no backlash. That is utterly, utterly wrong because the jihadists don't hate us because of what we do. They hate us because of who we are. We can't change that. It is our values and our history that they detest more than anything else." Fox said that the authorities could deprive British citizens returning from Syria and Iraq of their passports. But he said that the greatest effort should go towards increasing the power of the state to monitor the communications of extremists. He said: "We have the security services to ensure that they [extremists] are watched and that they don't pose a greater threat." Asked whether the powers of the security services were insufficient, the former defence secretary said: "That is a real question that we are going to have to ask whether the security services have adequate resources for an increased threat. "That is a question politicians will have to take into account in judgments on spending allocations but also do the powers they have reflect the increasing [threat]? You've got people in the light of Snowden saying that the state has too many powers and we have to restrict the powers of the state." Asked which powers the state should be given, Fox said: "The whole areas of intercept that need to be looked at. We have got a real debate, and it is a genuine debate in a democracy, between the libertarians who say the state must not get too powerful and pretty much the rest of us who say the state must protect itself." Asked whether this meant more surveillance and increasing the manpower of the security services, he said: "If required is the first duty of the state to protect its citizens ... it is a real worry and it is a problem that is going to be with us for a very long time. At heart it is an ideological battle and we have to realise that we have to win the ideological battle as well." The remarks by Fox suggests that some figures, particularly on the right, will use the success of extremists in Iraq to challenge the claim by Edward Snowden that the state has amassed too many powers of surveillance. Snowden leaked a series of NSA files to the former Guardian journalist Glenn Greenwald last year. Attack on the grid risks nuclear war. Andres and Breetz 11 (Richard Andres, Professor of National Security Strategy at the National War College and a Senior Fellow and Energy and Environmental Security and Policy Chair in the Center for Strategic Research, Institute for National Strategic Studies, at the National Defense University, and Hanna Breetz, doctoral candidate in the Department of Political Science at The Massachusetts Institute of Technology, Small Nuclear Reactorsfor Military Installations:Capabilities, Costs, andTechnological Implications, www.ndu.edu/press/lib/pdf/StrForum/SF-262.pdf) Grid Vulnerability. DOD is unable to provide its bases with electricity when the civilian electrical grid is offline for an extended period of time. Currently, domestic military installations receive 99 percent of their electricity from the civilian power grid. As explained in a recent study from the Defense Science Board: DOD’s key problem with electricity is that critical missions, such as national strategic awareness and national command authorities, are almost entirely dependent on the national transmission grid . . . [which] is fragile, vulnerable, near its capacity limit, and outside of DOD control. In most cases, neither the grid nor on-base backup power provides www.ndu.edu/inss SF No. 262 3 sufficient reliability to ensure continuity of critical national priority functions and oversight of strategic missions in the face of a long term (several months) outage. 7 The grid’s fragility was demonstrated during the 2003 Northeast blackout in which 50 million people in the United States and Canada lost power, some for up to a week, MSDI Terror DA 153 when one Ohio utility failed to properly trim trees. The blackout created cascading disruptions in sewage systems, gas station pumping, cellular communications, border check systems, and so forth, and demonstrated the interdependence of modern infrastructural systems. 8 More recently, awareness has been growing that the grid is also vulnerable to purposive attacks. A report sponsored by the Department of Homeland Security suggests that a coordinated cyberattack on the grid could result in a third of the country losing power for a period of weeks or months. 9 Cyberattacks on critical infrastructure are not well understood. It is not clear, for instance, whether existing terrorist groups might be able to develop the capability to conduct this type of attack. It is likely, however, that some nation-states either have or are working on developing the ability to take down the U.S. grid. In the event of a war with one of these states, it is possible, if not likely, that parts of the civilian grid would cease to function, taking with them military bases located in affected regions. Government and private organizations are currently working to secure the grid against attacks; however, it is not clear that they will be successful. Most military bases currently have backup power that allows them to function for a period of hours or, at most, a few days on their own. If power were not restored after this amount of time, the results could be disastrous. First, military assets taken offline by the crisis would not be available to help with disaster relief. Second, during an extended blackout, global military operations could be seriously compromised; this disruption would be particularly serious if the blackout was induced during major combat operations. During the Cold War, this type of event was far less likely because the making bases more resilient to civilian power outages would reduce the incentive for an opponent to attack the grid United States and Soviet Union shared the common understanding that blinding an opponent with a grid blackout could escalate to nuclear war. America’s current opponents, however, may not share this fear or be deterred by this possibility. MSDI Terror DA 154 Other AT / Ext MSDI Terror DA 155 A2: Drone Strikes Solve Al Qaeda dead in Pakistan but operating elsewhere Bergen, et al, September 2013, Jihadist Terrorism: A Threat Assessment, http://bipartisanpolicy.org/sites/default/files/Jihadist%20Terrorism-A%20Threat%20Assesment_0.pdf Peter Bergen is the author of four books about al-Qaeda, three of which were New York Times best sellers. The books have been translated into 20 languages. He is the director of the National Security Program at the New America Foundation in Washington, D.C.; a fellow at Fordham University’s Center on National Security; and CNN’s national security analyst. He has held teaching positions at the Kennedy School of Government at Harvard University and at the School of Advanced International Studies at Johns Hopkins University.¶ Bruce Hoffman is a professor at Georgetown University’s Edmund A. Walsh School of Foreign Service, where he is also the director of both the Center for Security Studies and the Security Studies Program. He previously held the corporate chair in counterterrorism and counterinsurgency at the RAND Corporation and was the scholar-in-residence for counterterrorism at the CIA between 2004 and 2006.¶ Michael Hurley is the president of Team 3i LLC, an international strategy company, and advises the Bipartisan Policy Center’s Homeland Security Project. He led the 9/11 Commission’s counterterrorism policy investigation, as well as CIA personnel in Afghanistan immediately after the 9/11 attacks. He retired from the CIA following a 25-year career and has served as director on the National Security Council staff.¶ Erroll Southers is the associate director of research transition at the Department of Homeland Security’s National Center for Risk and Economic Analysis of Terrorism Events (CREATE) at the University of Southern California, where he is an adjunct professor in the Sol Price School of Public Policy. He is a former FBI special agent and was President Barack Obama’s nominee for the Transportation Security Administration, as well as Governor Arnold Schwarzenegger’s deputy director for the California Office of Homeland Security and the chief of homeland security and intelligence for the LAX Police Department. He is the author of Homegrown Violent Extremism.) Core alQaeda has been decimated by drone strikes and arrests in Pakistan, but continues to find some sanctuary in the country’s ungoverned tribal regions, and is potentially ready to move back into Afghanistan, should that country experience significant instability after NATO combat troops withdraw at the end of 2014.¶ CIA drone strikes have killed 33 al-Qaeda leaders or senior operatives in Pakistan since 2008.3 As a result, there are only around four al-Qaeda leaders in Pakistan today. The group’s overall leader, Ayman al-Zawahiri, has proved to be more capable than some analysts initially thought, officially bringing Somalia’s al-Shabaab group and Syria’s Jabhat al-Nusra organization into al-Qaeda’s fold. Zawahiri also had no problem transferring already existing al-Qaeda affiliates’ allegiances from Osama bin Laden to himself. In the three months following bin Laden’s death in May 2011, the leaders of al-Qaeda in Iraq (AQI), al-Qaeda in the Arabian Peninsula (AQAP), and al-Qaeda in the Islamic Maghreb (AQIM) all pledged their allegiance to Zawahiri as their new overall commander.4,5, Drone strikes won’t solve US-citizen terrorists Brian Ross, 9-11, 13, ABC News, http://gma.yahoo.com/officials-dozens-u-under-surveillancepotential-terror-threats-234106742--abc-news-topstories.html MSDI Terror DA 156 Twelve years after al Qaeda slaughtered nearly 3,000 Americans on U.S. soil, the FBI has under watch as many as 100 people inside the homeland suspected of being linked to or inspired by the terror group, intelligence and law enforcement officials told ABC News.¶ Additionally, intelligence and law enforcement officials had anticipated -- even before April's Boston Marathon bombings -- that this approximate number of terror cases wouldn't change in the years ahead, even with arrests made, because of new cases expected to surface.¶ Despite years of losses from drone strikes overseas and counter-terrorism operations inside the American homeland, the al Qaeda network still survives thanks in part to its American recruits.¶ "I think that is the most disturbing thing, to see Americans switching sides and going over to the enemy," Rep. Michael McCaul, R-Texas, Chairman of the House Committee on Homeland Security, told ABC News.¶ Some of the Americans that have gone over to al Qaeda have risen far enough in the ranks that in the years after the Twin Towers fell, often the public voice of the perpetrators of that horrible attack speak with an American accent.¶ "America is absolutely awash with easily obtainable firearms," said Adam Yahiye Gadahn, a California Muslim convert, in a 2011 Al Qaeda video urging individual violent jihad. "So what are you waiting for?"¶ Gadahn, who once tore up his U.S. passport on camera, is now in Al Qaeda's leadership in Pakistan, regularly producing videos in English and Arabic. He is the first American since the 1950's to be charged with treason, indicted in 2006.¶ Gadahn is one of five Americans the U.S. has offered a total of $21 million in rewards to help capture because they served under Osama Bin Laden or his henchmen. The five, however, are only a fraction of the number of Americans believed to be fighting for al Qaeda or one of its affiliates.¶ Americans taunting their own countrymen -- or luring them into the fight -- is a new and troubling reality about the resilience of al Qaeda even after the killings of Osama bin Laden and Yemeni-American al Qaeda cleric and leader Anwar al-Awlaki two years ago.¶ The accused American terrorists come from small towns and big cities, law enforcement officials told ABC News. They include a man who grew up on Monte Vista Road in Phoenix, 30-year-old U.S. Army veteran Eric Harroun.¶ This year he became one of about a dozen Americans who authorities say are fighting in Syria with a group that has sworn allegiance to al Qaeda, called Jabhat al-Nusra.¶ Harroun, who was lured out of the region by the FBI and charged with terrorism in a Virginia federal court, allegedly posted videos on Facebook of his adventures in Syria with fellow fighters, including one where he addressed Syria's president Bashar al-Assad, saying, "Where you go we will find out and kill you. Do you understand?"¶ Eric Harroun's father says his son just fell in with the wrong people.¶ "He's not any terrorist, not any more than I am," Darryl Harroun said in an interview today with ABC News from Phoenix.¶ The younger Harroun is expected to go to trial in two months on terror charges.¶ American recruits to al Qaeda are also showing up in other hot spots across the Middle East and Africa, intelligence sources said.¶ "As an American citizen, I'm shocked. I'm amazed that something like that occurs," Shawn Henry, who retired last year as a senior FBI official, told ABC News.¶ Henry, now an executive at the cyber security firm CrowdStrike, said Americans or "U.S. Persons" -- noncitizens who have lived here and have certain legal rights -- radicalized to violent Islamist extremism are "a minority," but the FBI's highest counterterrorism priority.¶ "Once they get that into their blood, it's a threat," Henry said.¶ At least 50 young American men have been tracked to the al Qaeda group fighting in Somalia, al-Shabaab, where a young man from the small town of Daphne, Alabama, Omar Hammami, became a top commander.¶ "Our main objective, one of the things we seek for in this life of ours, is to die as martyrs," Hammami explained in one video, among numerous he made to help al-Shabaab draw Westerners into the fight.¶ More than 15 U.S. citizens have been killed fighting with al-Shabaab, and at least 20 remain unaccounted for in Somalia.¶ A new American voice in the Somali terror organization, the as yet unidentified "Abu Ahmed al-Amriki," appeared in a February video, said his countrymen MSDI Terror DA 157 should fight Western governments in Afghanistan, Somalia and Mali.¶ "America is going down and the Caliphate is rising," he said, brandishing an AK-47.¶ Hammami -- who remains committed to violent jihad despite a falling out with al-Shabaab leaders -- is now one of the five Americans with U.S. rewards ranging from $1 to $5 million on their head because of their alleged Al Qaeda leadership positions. Others are men from Waukesha, Wisconsin, Brooklyn, New York and Buffalo, New York.¶ For security reasons, the details of those 100 or so individuals under surveillance inside the U.S. are closely guarded, and both U.S. and European officials say they're focused on Westerners joining al Qaeda in places such as Syria, which is relatively easy to enter.¶ Asked via Twitter last March about those like him, who turn against America by joining al Qaeda affiliates such as al-Shabaab in Somalia, Hammami did not deny the threat they pose.¶ Somalia has "many muhajirs from U.S. And dangerous. True," tweeted @abumamerican, an account believed by U.S. officials to be Hammami's. MSDI Terror DA 158 AT: Domestic Terrorism Decline Bergen is wrong – domestic terrorism threat is not decreasing Gartenstein-Ross 13 (Daveed, Senior Fellow at the Foundation for Defense of Democracies, adjunct assistant professor in Georgetown University’s security studies program, and the author of Bin Laden’s Legacy, “Is The Terrorist Threat Declining? The Use And Abuse Of Statistics,” 12/16/13, http://warontherocks.com/2013/12/is-the-terrorist-threat-declining-the-use-and-abuse-of-statistics/) Earlier this month, terrorism analyst Peter Bergen wrote at CNN that the declining number of jihadists indicted in the United States demonstrates that the domestic terrorist threat has “markedly declined over the past couple of years.” His view is a counterpoint to the proclamations of Senate and House intelligence committee heads Sen. Dianne Feinstein (D.-Calif.) and Rep. Mike Rogers (R.-Mich.), who have claimed that the U.S. is no safer than it was in 2011. Who is right? Bergen, the head of the National Security Program at the New America Foundation (NAF), contends that though Feinstein and Rogers might be on firm ground in arguing that al-Qaeda is resurgent in the Middle East, a NAF study of jihadist militants shows a substantial decline in the number of indicted extremists since 2010. Bergen contends that this establishes a declining domestic threat: “The total number of such indicted extremists has declined substantially from 33 in 2010 to nine in 2013. And the number of individuals indicted for plotting attacks within the United States, as opposed to being indicted for traveling to join a terrorist group overseas or for sending money to a foreign terrorist group, also declined from 12 in 2011 to only three in 2013. Of course, a declining number of indictments doesn’t mean that the militant threat has disappeared. One of the militants indicted in 2013 was Dzhokhar Tsarnaev, who is one of the brothers alleged to be responsible for the Boston Marathon bombings in April. But a sharply declining number of indictments does suggest that fewer and fewer militants are targeting the United States…. In short, the data on al-Qaeda-linked or -influenced militants indicted in the United States suggests that the threat of terrorism has actually markedly declined over the past couple of years.” Here’s the interesting thing, to me, about Bergen’s analysis: it depends almost entirely on how one reads a sudden spike in homegrown terrorist cases that occurred in 2009-10. Exactly four years ago, in December 2009, Bergen’s view of the homegrown terrorist threat, based on the sudden rise in cases we were then experiencing, was that “there is no denying it is increasing.” He explained that a trend toward more homegrown jihadism “is just a fact,” since the phenomenon had “sort of grown exponentially in the last two years.” In other words, Bergen assessed at the time that the rising cases weren’t aberrant, but rather part of a trend of increased homegrown jihadist violence that would continue. At the time, I disagreed in print with Bergen’s confidence that we were seeing a definite trend toward a persistently higher number of homegrown terrorism cases. Now that the 2009-10 spike in cases has receded, Bergen argues just as confidently that we are safer. I disagree with this conclusion, too. Much of our disagreement boils down to differences between my methodology of interpreting statistics and Bergen’s. In turn, this discussion has implications for broader efforts to assess U.S. counterterrorism policies: are we drawing the right lessons from the statistics and evidence that we gather, or are we being fooled by our own numbers? The 2009-10 Spike in Homegrown Terrorist Cases 2009 saw almost twice as many people in the U.S. indicted for illegally supporting the jihadist cause as any previous year. According to NAF’s database of homegrown terrorism cases, there were 43 such cases in 2009, when the highest number in any other year since the 9/11 attacks had been 23, in 2003. The following year, in 2010, the number of MSDI Terror DA 159 homegrown jihadist terrorism cases declined to 34, but that still represented more such cases than any year but 2009. As previously noted, Bergen viewed this sudden spike in homegrown terrorist cases at the time as an undeniable increase in the threat. I wasn’t so sure. In an article I published in the summer of 2010, I concluded that it wasn’t “clear that homegrown terrorism is increasing,” for two reasons. The first was that the perceived spike could be based on changes in policing strategies and tactics. If authorities started making arrests at a different point relative to a suspect undertaking illegal activities, that could artificially trigger perceptions of a major increase in homegrown terrorists; and so too could an increase in the number of sting operations. Second, I raised the possibility that this could be a statistical aberration: “Another possibility is that the current rash of homegrown terror cases is an aberration. In a statistical sequence measured over the course of years (such as weather patterns or a baseball player’s career), aberrant sequences will frequently arise. A spike or precipitous decline in numbers does not mean the numerical trajectory will extend indefinitely. For example, an unusually cold May does not mean that July will also be unusually cold. While in the middle of an unusual statistical sequence, it can be hard to have perspective; and in five years, 2009-2010 may seem exceptional in terms of the level of homegrown terrorist activity, rather than the beginning of a new trend.” Now that five years have passed since the onset of that spike in cases, it appears to have been just that, an aberrational sequence. And we can pinpoint the precise development that drove the 2009-10 rise in cases: the Somalia war. In December 2008, the U.S. media first reported authorities’ discovery that more than a dozen young Somali men from Minnesota’s Twin Cities area (which has the U.S.’s largest Somali community) had disappeared, going abroad to join jihadist groups in Somalia. They decided to fight there after Ethiopia’s U.S.-backed invasion of Somalia in 2006, which was designed to shore up the country’s U.N.-recognized transitional federal government and push back its main adversary, the Islamic Courts Union. In addition to the young men being driven by nationalist sentiments, jihadist recruiters focused their efforts on the Twin Cities area—a somewhat unique dynamic for domestic terrorist cases, the vast majority of which do not feature recruiters from any established militant organization. Thereafter, domestic law enforcement made apprehension of the young men who went to fight abroad, and the networks encouraging and supporting them, a top priority. Terrorism-related indictments increased as a result: the NAF dataset suggests that 14 indictments in 2009 and 16 in 2010 were related to the Somalia conflict. If you subtract these figures from the number of total indictments for both years, the numerical spike becomes less extreme, with only 29 indictments in 2009 and 18 in 2010 that were unrelated to the Somalia war. Though 2009 still would have a higher number of indictments than any year preceding it even with the adjusted figures, 2010 would be more in line with the numbers from previous years, featuring fewer terrorism indictments than either 2003 or 2006. As recruiting for the Somalia conflict has declined, the number of indictments has also gone down. So the question remains: how do we interpret the lower numbers we are seeing now? Has the threat of homegrown terrorism “markedly declined,” as Bergen insists, or is there a better way to understand the number of homegrown jihadist cases that we have seen in 2012-13? The Longer View Fortunately, there has always been a relatively small number of homegrown jihadist terrorism cases in the United States. The fact that these numbers are small should make us hesitant to infer too much from numerical fluctuations. Take a look at the number of homegrown jihadists who have been indicted or killed by year, per the NAF database: 2002: 16 2003: 23 2004: 8 2005: 12 2006: 19 2007: 16 2008: 6 2009: 43 2010: 34 2011: 22 2012: 7 2013: 10 Bergen asserted that there had been nine indictments this year, but his article came out before Terry Loewen’s arrest, which pushes the number to ten. Looking at the full data by year, it’s not clear that there is a declining threat. Ten indictments in 2013 is three more than there were last MSDI Terror DA 160 year; it’s also a higher number than we saw in either 2004 or 2008. Indeed, there were only six such cases in 2008—the year before we saw the sudden jump to forty-three indictments. In fact, rather than basing our assessment on indictments, there’s an entirely different statistic for measuring whether we face a declining threat: the number of people killed or injured by homegrown terrorists in the U.S. in any given year. That number was zero in 2011, while in 2013 three people were killed and 264 injured (in the Boston bombings). The bottom line is that it’s perilous to infer too much from the data when the numbers in question are rather small, because small numbers makes it extraordinarily difficult to measure trends reliably. All it takes is one unusual development—such as the outbreak of war in Somalia, and its resulting impact on Minneapolis-St. Paul—to make it appear that everything has changed from a numerical perspective. There is thus little proof that “the threat of terrorism has actually markedly declined over the past couple of years.” The core problem with Bergen’s use of statistics is evident when you compare his analysis in 2009 with his assessment today: his methodology is prone to perceiving a significant change in the level of threat based upon the direction that the numerical trend line is pointing at any given time. If the number of indictments doubled to twenty next year, by Bergen’s established methodology the threat would seem to be increasing again—even though the absolute numbers would still be lower than 2003, 2009, 2010, or 2011. In attempting to determine whether we are grappling with an increasing or declining threat, it’s important to view the most recent data in as broad a context as possible. We should be wary of any method of statistical interpretation wherein temporary fluctuations in one direction or another can be mistaken for massive shifts in the threat we confront. MSDI Terror DA 161 AT: State Sponsorship of Terrorism Decreasing Terrorists don’t need state sponsors Stephen D. Collins, 2014 is an associate professor of political science and international affairs at Kennesaw State University. His research focuses on terrorism, economic statecraft, democracy and human rights, conflict resolution, and nuclear proliferation. He is the author of, inter alia, “Dissuading State Support of Terrorism: Strikes or Sanctions? An Analysis of Dissuasion Measures Employed Against Libya,” Studies in Conflict and Terrorism 27 (1): 2014. Stephen D. Politics & Policy. Feb2014, Vol. 42 Issue 1, p131-159 State sponsorship of terrorism is today in an attenuated position—weaker than at any point in modern history. Furthermore, the terrorist organizations that currently represent the greatest threat to civilian populations are far less reliant on state support than terrorist groups in the earlier phases. Indeed, al Qaeda and its affiliated jihadist groups operate essentially independent from any state support. A variety of factors explain why terrorist groups have been able to remain operationally effective without the aid of state patrons. First, the communications revolution of the late twentieth century has permitted terrorist networks to reduce their previous reliance on the geographic proximity of members. Just as the Internet, e-mail, and inexpensive telephony have enabled myriad businesses to situate their employees in globally disparate locations, these technological agents of globalization have also enabled terrorist leaders to operate sophisticated terrorist organizations with agents dispersed across thousands of miles. Thus there is a diminished need today for a physical base of operations for training, planning, and collaboration. Second, terrorists groups such as al Qaeda have developed their own streams of revenue by engaging in smuggling and other forms of illicit commerce—including the trade in drugs and conflict resources—and have also generated large sums through fraudulent charity schemes. Third, the relaxation of border controls has facilitated the flow of terrorist operatives among their home countries, the headquarters of terrorist organizations, and target countries. State sponsorship has played a significant role in supporting terrorism Stephen D. Collins, 2014 is an associate professor of political science and international affairs at Kennesaw State University. His research focuses on terrorism, economic statecraft, democracy and human rights, conflict resolution, and nuclear proliferation. He is the author of, inter alia, “Dissuading State Support of Terrorism: Strikes or Sanctions? An Analysis of Dissuasion Measures Employed Against Libya,” Studies in Conflict and Terrorism 27 (1): 2004. Stephen D. Politics & Policy. Feb2014, Vol. 42 Issue 1, p131-159 While generally not the ultimate cause of terrorism, state sponsorship of terrorist organizations has played a significant role in facilitating the terrorist violence witnessed in the international system over the past half century (Council on Foreign Relations 2013). State sponsorship encompasses a variety of assistance measures including, inter alia, arms, safe haven, financing, training, intelligence, and diplomatic cover. The succor provided by state sponsors facilitates terrorist groups’ planning, training, communications, transit, and logistics in support of specific attacks. These benefits allow for increased MSDI Terror DA 162 sophistication in terror plots, which lead to more lethal attacks. State sponsorship, therefore, can represent a significant facilitating variable with respect to international terrorism, and it can amplify the frequency and lethality of attacks. MSDI Terror DA 163 A2: Al Qaeda Threat Decreasing Affiliates as strong as ever Noah Rotham, Mediaite, May 19, 2014 FBI Director: More, Stronger Al Qaeda Affiliates 'Than I Appreciated' http://rt.com/usa/160004-fbicomey-al-qaeda/ DOA: 3-5-15 Al Qaeda's affiliates are both stronger and more prolific than previously anticipated, FBI director James Comey told the New York Times[1] on Monday. While the Times noted that some expected Comey to be the first post-9/11 FBI director to redirect his focus away from terrorism, he clarified that Islamic radicalism is as potent a force as ever. 'I didn't have anywhere near the appreciation I got after I came into this job just how virulent those affiliates had become,' Comey told the Times when asked if he thought the threat of al Qaeda-related terrorism had diminished. Referring to the terror group's affiliates in Africa and the Middle East, Comey said that the threat of terrorism against American interest sis as present as ever. 'There are both many more than I appreciated, and they are stronger than I appreciated,' he confessed. Al Qaeda has adapted and decentralized MATTHEW OLSEN, Director, National Counterterrorism Center, March 6, 2014, Hearing of the Senate Foreign Relations Committee Subject: "Syria Spillover: The Growing Threat of Terrorism and Sectarianism in the Middle East" Thank you very much, Chairman, and members of the committee. I think it was about a year ago I was here to talk about threats in North Africa. So I appreciate the opportunity to be here again to represent NCTC and to talk a little bit about the threats we face in the Levant. And I'm particularly pleased to be here with two of our key partners, Deputy Secretary of State Burns and Assistant Secretary of Defense Chollet. So as you are aware, we continue to face terrorist threats to the United States and to our interests overseas, particularly in parts of South Asia and the Middle East and Africa. But it's the current conflict in Syria and the regional instability in the Levant that stand out for me as areas of particular concern. I do think it's important to consider Syria in the context of the global terrorist movement. In the face of what's been sustained counterterrorism pressure, core al-Qaida has adapted. They've adapted by becoming more decentralized and shifting away from the large-scale plotting that was exemplified in the attacks of September 11th. al-Qaida has modified its tactics and looked to conduct simpler attacks that don't require the same degree of resources and training and command and control. So today, we're facing a wider -- a wider array of threats in a greater variety of locations across the Middle East and around the world. In comparison to the al-Qaida plots that emanated from the tribal areas of Pakistan a few years ago, these smaller and these less sophisticated plots are often more difficult for us to detect and disrupt and that's put even greater pressure on us to work closely with our partners here at the table, across the federal government and around the world. So turning to Syria, Syria has become the preeminent location for al-Qaida-aligned groups to recruit and to train and to equip what is now a growing number of extremists, some of whom seek to conduct external attacks. In addition, Iran and Hezbollah, as you pointed out, are committed to defending the Assad regime including sending billions of dollars in military and economic aid, training pro-regime and Iraqi Shia militants and deploying their own personnel into the country. Now, from a MSDI Terror DA 164 terrorism perspective, the most concerning development is that al-Qaida has declared Syria its most critical front and has called for extremists to fight against the regime in Syria. So what we've seen is that thousands of fighters from around the world, including hundreds from the West have traveled to Syria and many of them have joined with established terrorist groups in Syria. This raises our concern that radicalized individuals with extremist contacts and battlefield experience could return to their home countries to commit violence at their own initiative or participate in al-Qaida-directed plots aimed at Western targets outside of Syria. What we've seen is a coalescence in Syria of al-Qaida veterans from Afghanistan and Pakistan as well as extremists from other hotspots such as Libya and Iraq. These extremists bring a wide range of contacts and skills as well as battlefield experience and they're able to exploit what has become a permissive environment from which to plot and train. Shifting briefly to Lebanon, one of the continuing effects of the Syrian conflict will be the instability in Lebanon in the upcoming year. I recently traveled to Lebanon and Jordan and the impacts of the continuing conflict in Syria continue to be of great concern to officials in the region. Hezbollah publicly admitted last spring that it is fighting for the Syrian regime and has framed the war as an act of self-defense against Westernbacked Sunni extremists. The group is sending capable fighters for pro-regime operations and support for a pro-regime militia. In addition, Iran and Hezbollah are using allied Iraqi Shia groups to participate in counter-opposition operations. And this active support to the Assad regime is of course driving increased Sunni extremist attacks and sectarian violence. In short, the various factors contributing to instability in Lebanon are only exacerbated by the protracted conflict in Syria. Groups associated with Al Qaeda have increased activity Central Asia General Newswire, April 9, 2014 Radical Islam followers from Europe, Central Asia fight for Syrian militants - Bortnikov Federal Security Service Director Alexander Bortnikov has reaffirmed the global nature of terrorism threats. "The terrorism threat became global a rather long time ago. Although the core of Al Qaeda has reduced its activity, associated militant groups demonstrate the capacity for autonomous and aggressive actions," Bortnikov said on Wednesday in Krasnaya Polyana, Sochi, at the 13th conference of chiefs of foreign security services and law enforcement agencies - partners of the Federal Security Service. The armed conflict in Syria has galvanized into action destructive forces throughout the Middle East, the Russian counterintelligence chief stated. "Local rings are being joined by radical Islam followers from Europe, Central Asia, the South Caucasus and Russia. They are trained in special camps and engage in the hostilities. The return of persons experienced in sabotage and the creation of covert organizations to their countries of origin leads to the spread and actualization of the terrorism threat," Bortnikov said. A complex situation is taking shape in the Afghan-Pakistani zone where terrorist groups, primarily the Taliban, the Turkestan Islamic Party and the Pakistani Taliban, have lately bolstered their combat potential, he noted. The forthcoming partial pullout of coalition forces from Afghanistan builds up the threat of destabilization in neighboring countries, Bortnikov said Al Qaeda spillover from Syria SENATOR ROBERT MENENDEZ (D-NJ), March 6, 2014, Hearing of the Senate Foreign Relations Committee Subject: "Syria Spillover: The Growing Threat of Terrorism and Sectarianism in the Middle East" MSDI Terror DA 165 As we enter the year three of the Syria crisis, headlines coming out of the region are no longer limited to the violence within Syria, but to the increasing spread of violence across Syria's borders, especially into Lebanon and Iraq. Of great concern is the proliferation of al-Qaida affiliates and splinter groups and the increasing sectarian rhetoric fueling the increase of violence that offers new opportunities for al-Qaida to gain footholds in local communities. It opens the door for an Iranian-sponsored terrorist network to justify their presence as the protector of the region's Shias while bolstering the Assad regime and antagonizing Arab states. The spillover from Syria is dangerous and troubling. In Lebanon, there's been an alarming uptick in high-profile bombings, many claimed by the al-Qaida-affiliated Abdullah Azzam Brigades. And at the same time, Hezbollah, purportedly protecting the Lebanese Shia community, has now extended into Syria, protecting the Assad regime. Threat from affiliates still strong China Today, April 15, 2014, Cooperate to counter terrorism challenges The recent terrorist attacks in Afghanistan, Pakistan, China and elsewhere have demonstrated that the global fight against terrorism is far from over, and it still faces many challenges. After the death of Osama bin Laden, the threat posed by al-Qaida as a global terrorist organization has declined. However, the threat posed by its affiliates still persists. The al-Qaida threat continues to diversify, with numerous loosely linked affiliates and associated radical individuals and cells innovating with regard to their targets, tactics and technology. Terrorism is still around. For example, the risk of attacks by al-Qaida affiliates across the Sahel persists. Al-Qaida in the Arabian Peninsula continues to be a strong factor affecting the security situation in Yemen. Al-Shabaab remains a serious threat to the security of the region. In Syria, an affiliate of al-Qaida in Iraq has gained influence and recruits from it are fighting in the civil war. With the deadline for the withdrawal of US troops from Afghanistan in 2014 approaching, it is hard to tell whether the situation in Afghanistan will be better or worse. Al-Qaida and the Taliban, taking refugee in the mountainous areas along the border between Afghanistan and Pakistan, may take advantage of the United States' withdrawal to launch attacks. Afghan troops and law enforcement forces still lack the capability to keep the situation under full control. The shutdown of US embassies last year in many parts of the world is a demonstration of the severe threat of terrorism. The Boston Bombing incident also showed that individuals can pose a serious threat to peace and security. Recent terrorist attacks in China alerted people once again to the threat of terrorism. All these have shown that terrorism is still one of the most serious threats to peace and security. Terrorist attacks are spreading, becoming more isolated and hi-tech. The international community should work together to prevent and combat terrorism in all its forms and manifestations. Any acts of terrorism are criminal acts and unjustifiable regardless of their motivations, whenever and by whomsoever committed. MSDI Terror DA 166 A2: Al Qaeda Leaders Killed Al Qaeda has lots of talent and leaders easily replaceable Thomas Joscelyn, May 20, 2014, Al Qaeda in Afghanistan and Pakistan: An Enduring Threat, Testimony, http://www.longwarjournal.org/archives/2014/05/al_qaeda_in_afghanis.php# (Thomas Joscelyn is the Senior Editor of The Long War Journal. Thomas is a senior fellow at the Foundation for Defense of Democracies (FDD). He is also the executive director of the Center for Law and Counterterrorism at FDD. He is a terrorism analyst, economist, and writer living in New York. Most of Thomas's research and writing has focused on how al Qaeda and its affiliates operate around the world. He is a regular contributor to the Weekly Standard and its online publications, the Daily Standard and Worldwide Standard. His work has also been published by National Review Online, the New York Post, and other media outlets. Thomas is the author of Iran's Proxy War Against America, a short book published by the Claremont Institute that details Iran's decades-long sponsorship of America's terrorist enemies. He makes regular appearances on radio programs around the country and has appeared on MSNBC and FOX News. In 2006 he was named one of the Claremont Institute's Lincoln Fellows. Thomas served as the senior terrorism adviser for Mayor Rudolph Giuliani's 2008 presidential campaign. He holds a Bachelor of Arts degree in Economics from the University of Chicago.) Al Qaeda is, at its heart, a clandestine organization, but careful analysis reveals that it has a deep bench of talent from which it draws. Since its founding in 1988, the organization has attempted to conceal its operations. This has made it difficult to assess some very basic aspects of al Qaeda. The group does not, for instance, publish an organizational chart or make its total roster known. If you watch al Qaeda carefully enough, however, you can see that the group has consistently replaced top leaders lost in the 9/11 wars. In some cases these replacements are not as competent, while in other cases they may even surpass their fallen comrades. Nasir al Wuhayshi, the aforementioned general manager of al Qaeda, is a seasoned veteran who replaced others in that role after they were killed or captured. Wuhayshi is, by all appearances, an all too competent leader. Still, the American-led counterterrorism effort has certainly disrupted al Qaeda's international network, delivering severe setbacks in some areas. Al Qaeda's problems with ISIS stem, to a large degree, from the fact that the U.S. and its allies took out its predecessor organization's top leadership in 2010. The leaders of the Islamic State of Iraq (ISI) were loyal to al Qaeda's "general command" but were replaced with leaders who had not been vetted by al Qaeda's senior leaders. One of the interesting things about the infighting between the ISIS and Al Nusrah is that it has led al Qaeda to identify several leaders who were previously unknown to the public. The leaders were identified because they were called as witnesses against ISIS, relying on their established jihadist pedigrees to give them credibility. Some of these leaders have dossiers that stretch back decades, but no one was talking about them until they appeared on screen. This same phenomenon happens all the time. Al Qaeda leaders who were previously unknown are identified in either the "general command" or the regional branches. This dynamic leads to a significant epistemological problem. U.S. officials, under both the Bush and Obama administrations, have repeatedly claimed to have decimated al Qaeda after a certain number of leaders of the organization were either killed or captured. Part of the reason these assessments have been flawed is that al Qaeda has a "deep bench" to draw from, both from within its own organization and allied groups. Al Qaeda is constantly in the process of recruiting new talent as well. In Pakistan and Afghanistan today, al Qaeda likely has a significant cadre of leaders who have not MSDI Terror DA 167 been publicly identified. The roles played by other, publicly identified operatives are not widely understood either. For instance, a cursory review of Vanguards of Khorasan, an al Qaeda publication, reveals numerous leaders who are not regularly discussed. MSDI Terror DA 168 A2: ISIS Can’t Succeed/No Positive Mission Support for ISIS in Iraq Lee Ferran, February 25, 2015, ABC News, “ISIS Trail of Terror,” http://abcnews.go.com/WN/fullpage/isis-trail-terror-isis-threat-us-25053190 DOA: 3-1-15 ISIS saw a series of successes as it has cut its way from Syria into Iraq and towards Baghdad using a combination of military expertise and unimaginable brutality. Social media accounts associated with ISIS have published disturbing videos purportedly showing ISIS fighters taunting, torturing and executing scores of unarmed prisoners. In addition, former senior U.S. military officials who served in Iraq and helped train the Iraqi security forces said that ISIS has been able to take advantage of government forces who lack the motivation to put up a good fight against ISIS in some areas. The Iraqi government and much of its military officer corps are mostly made up of Shi’a Muslims, whereas much of the areas ISIS has retained in Iraq are predominantly Sunni, like ISIS –- meaning the Iraqi military forces are often operating in areas where the local population may be more willing to tolerate, or even support ISIS. ISIS has also built relations of convenience with disgruntled local Sunni tribes and ex-Baathists who have felt marginalized and disenfranchised by the government in Baghdad, which has been accused of favoring Shi’as. MSDI Terror DA 169 A2 ISIS No means ISIS is worth $2 billion Charles Lister, Brookings Doha Center, December 2014, Profiling the Islamic State, http://www.brookings.edu/~/media/Research/Files/Reports/2014/11/profiling-islamic-statelister/en_web_lister.pdf?la=en DOA: 3-1-15 ISIS likely retained assets of at least $875 million prior to seizing Mosul.2 Judging by the scale of American-made Iraqi military equipment captured in June and that IS was assessed to be earning $2 million per day by smuggling oil from Iraq and Syria by September, IS represents a formidable militant organization likely worth close to $2 billion. ISIS financially self-sufficient Charles Lister, Brookings Doha Center, December 2014, Profiling the Islamic State, http://www.brookings.edu/~/media/Research/Files/Reports/2014/11/profiling-islamic-statelister/en_web_lister.pdf?la=en DOA: 3-1-15 One aspect of IS’s internal structure and policymaking mechanisms that has proven decisive in enabling expansion is its generation of income. IS has been almost entirely self-financed since at least 2005 and according to the U.S. Department of Defense database, external funding to AQI, MSM, and ISI between 2005 and 2010 amounted to no more than five percent of its total “income.”54 After assuming ISI leadership in 2010, Baghdadi established a financial command council and Mosul cemented its role as a principal source of income.55 By 2014, a complex extortion network there was generating $12 million per month. Notwithstanding a potential increase in private financial support following IS’s increased public prominence, the simultaneous expansion in income-earning capacity makes it likely that the group has continued to be financially self-sufficient. ISIS generating millions from oil sales Charles Lister, Brookings Doha Center, December 2014, Profiling the Islamic State, http://www.brookings.edu/~/media/Research/Files/Reports/2014/11/profiling-islamic-statelister/en_web_lister.pdf?la=en DOA: 3-1-15 While more sustainable, income earned through extortion pales in comparison to the underground sale of Syrian and Iraqi oil. Illicit oil sales are not new for IS—by 2010, the group was thought to have been “siphoning off a share of Iraq’s oil wealth, opening gas stations in the north, smuggling oil and extorting money from industry contractors.”56 But by late August 2014, energy analysts estimated that the group was selling as much as 70,000 barrels of oil daily from Syria and Iraq (at $26-$35 per barrel of heavy oil and $60 per barrel of light crude) to internal black market customers and external buyers in Iraq, Lebanon, Turkey, and Kurdistan.57 These calculations result in a daily income of $1-3 million, which over 12 months amounts to $365 million-1.1 billion.58 The targeting of IS-linked oil facilities in Syria since late-September, however, will have significantly eroded this prospect. MSDI Terror DA 170 ISIS raises money through kidnappings Charles Lister, Brookings Doha Center, December 2014, Profiling the Islamic State, http://www.brookings.edu/~/media/Research/Files/Reports/2014/11/profiling-islamic-statelister/en_web_lister.pdf?la=en DOA: 3-1-15 IS’s finances have been heavily reliant on oil and gas, but other resources are also being exploited, including agriculture, cotton, water, and electricity. The group is also known to operate an efficient kidnap-for-ransom operation, with four foreign nationals—two young Italian women, a Dane, and a Japanese national—all confirmed kidnapped by IS in August 2014 alone.59 While such hostage taking has proven a powerful weapon in recent months through the public execution of American and British nationals, it may also be in the hope of securing ransoms for other captives. Despite a French denial, unnamed NATO sources in Brussels, for example, have claimed that IS was paid $18 million in April 2014 in exchange for four French hostages.60 ISIS makes $ selling antiquities Charles Lister, Brookings Doha Center, December 2014, Profiling the Islamic State, http://www.brookings.edu/~/media/Research/Files/Reports/2014/11/profiling-islamic-statelister/en_web_lister.pdf?la=en DOA: 3-1-15 Even in areas not under its complete control, IS still maintains extortion networks and protection rackets. IS units have also allegedly stolen antiques and sold them onto the black market. For example, one Iraqi intelligence official claimed the group had earned $36 million after selling 8,000 year-old items from al-Nabk, north of Damascus, in early 2014. ISIS financial resources enable easy expansion Charles Lister, Brookings Doha Center, December 2014, Profiling the Islamic State, http://www.brookings.edu/~/media/Research/Files/Reports/2014/11/profiling-islamic-statelister/en_web_lister.pdf?la=en DOA: 3-1-15 While IS fighters have long imposed shadow taxation (and extortion) within areas under their control or influence, more official taxation systems have begun to be introduced since the proclamation of the caliphate. For example, IS has introduced a customs tax upon the trucking business on the main highways of western Iraq. This organized taxation system targets trucks transporting food and electronics from Syria and Jordan via Iraq’s al-Waleed and al-Tanif crossings. As of September 2014, rates were placed at $300 per truck of foodstuffs and $400 per load of electronic goods, with an occasional $800 flat rate for trucks in general. The system itself is surprisingly professional, as Mitchell Prothero explained: “Not only does IS offer protection from bandits, but its tax collectors also provide traders with paperwork that shows they’ve paid IS taxes as well as counterfeit government tax receipts that truckers can show to Iraqi Army checkpoints, which allow them to pass without further payments.”62 In addition to shielding IS from traditional financial counterterrorism measures, such independent financial capacities have also provided a source of social leverage, whether through incentives to induce tribal loyalty or by funding food provision and fuel subsidies to encourage popular support. For example, during its offensive in Deir Ezzor in May-June 2014, IS “spread $2 million in the area to entice tribes and MSDI Terror DA 171 leaders to permit their presence,” thereby securing several strategic surrenders and pledges of allegiance.63 IS’s ability to present an image of wealth and success has strengthened its recruitment of new fighters locally as well as from abroad. As one moderate commander based in Aleppo, speaking on condition of anonymity, said in June 2014, “Syrians join ISIS for money, simply because they can afford to pay salaries.”64 An Islamic Front political official, who also requested anonymity, put it similarly bluntly: “ISIS is definitely expanding—it has a lot of money and right now, Syrians are so poor. Money changes everything—people will turn to and support extremism out of desperation.”65