Contents 1AC ................................................................................................................................................................................................... 3 1AC- Inherency: PRISM / Bullrun ...................................................................................................................................................... 4 1AC- Inherency: 702.......................................................................................................................................................................... 5 1AC- Economy: Scenario- Localization A ........................................................................................................................................... 6 1AC- Economy: Scenario- Localization B ........................................................................................................................................... 8 1AC- Economy: Scenario- Encryption.............................................................................................................................................. 10 1AC- Economy: Scenario- HiTech A ................................................................................................................................................. 12 1AC- Economy: Scenario- HiTech B ................................................................................................................................................. 15 1AC- Economy: Scenario- HiTech C ................................................................................................................................................. 16 1AC- Economy: Impact- Asia ........................................................................................................................................................... 17 1AC- Economy: Impact- War ........................................................................................................................................................... 19 1AC- Economy: Impact- Innovation ................................................................................................................................................ 20 1AC- PLAN ....................................................................................................................................................................................... 26 1AC- Solvency: Signal Solves Credibility .......................................................................................................................................... 27 1AC- Solvency: Restrict 702 ............................................................................................................................................................ 28 1AC- Solvency: Credibility Solves Fear ............................................................................................................................................ 30 Add-On Advantages ....................................................................................................................................................................... 32 Protectionism 2AC 1/ ...................................................................................................................................................................... 33 Protectionism 2AC 2/ ...................................................................................................................................................................... 35 Protectionism 2AC 3/ ...................................................................................................................................................................... 36 Protectionism 2AC 4/ ...................................................................................................................................................................... 38 Protectionism- NSA = Pretext ......................................................................................................................................................... 40 Protectionism- Impact: EU .............................................................................................................................................................. 41 Protectionism- Impact: China ......................................................................................................................................................... 42 Protectionism- Impact: War............................................................................................................................................................ 50 Protectionism- Impact: Trade Solves War ...................................................................................................................................... 52 Leadership 2AC 1/ ........................................................................................................................................................................... 53 Leadership 2AC 2/ ........................................................................................................................................................................... 54 Leadership 2AC 3/ ........................................................................................................................................................................... 55 Leadership: Credibility Key ............................................................................................................................................................. 57 Leadership: Innovation Key ............................................................................................................................................................ 58 CASE Extensions ............................................................................................................................................................................. 60 Inherency: Credibility Lost .............................................................................................................................................................. 61 Economy- Localization: SQ = Fragmentation 1/ .............................................................................................................................. 62 Economy- Localization: SQ = Fragmentation 2/ .............................................................................................................................. 63 Economy- Localization: Country List ............................................................................................................................................... 64 Economy- Localization: Credibility Key ........................................................................................................................................... 66 Economy- Localization: Impact- Kills The Internet 1/ ..................................................................................................................... 68 Economy- Localization: Impact- Kills The Internet 2/ ..................................................................................................................... 69 Economy- Localization: Impact- Repression ................................................................................................................................... 70 Economy- Localization: Impact- Spying .......................................................................................................................................... 71 Economy- Localization: Impact- Germany ...................................................................................................................................... 72 Economy- Localization: Impact- Brazil ............................................................................................................................................ 73 Economy- Encryption: NIST Credibility ........................................................................................................................................... 75 Economy- HiTech: Every Company ................................................................................................................................................. 77 Economy- HiTech: Trend Bad .......................................................................................................................................................... 78 Economy- HiTech: Backdoors Kill Credibility ................................................................................................................................... 80 Economy- Impact: Global Service Sector ........................................................................................................................................ 81 Economy- Impact: Developing Economies- Big Data Key................................................................................................................ 86 Economy- Impact: Developing Economies- Leap-Frogging ............................................................................................................. 88 Solvency: Restrictions = Credibility 1/............................................................................................................................................. 89 Solvency: Restrictions = Credibility 2/............................................................................................................................................. 90 1 Solvency: Reframing Solves Opposition .......................................................................................................................................... 91 2AC Frontlines ................................................................................................................................................................................ 92 Cyber-Security Frontline 1/ ............................................................................................................................................................. 93 Cyber-Security Frontline 2/ ............................................................................................................................................................. 95 Cyber-Security Frontline 3/ ............................................................................................................................................................. 97 Cyber-Security EXT .......................................................................................................................................................................... 99 Topicality: Domestic Surveillance 1/ ............................................................................................................................................. 100 Topicality: Domestic Surveillance 2/ ............................................................................................................................................. 101 K Frontline .................................................................................................................................................................................... 102 2 1AC 3 1AC- Inherency: PRISM / Bullrun FISA reform failed: PRISM and Bullrun are still legal- this wrecks the credibility of US data management and encryption. Nicole Arce 6/10/15 (“Effect Of NSA Spying On US Tech Industry: $35 Billion? No. Way More,” Tech Times) American technology companies are losing billions of dollars in business overseas due to Edward Snowden's revelations about the National Security Agency's (NSA) sweeping surveillance programs. Two years ago, the industry-funded think tank Information Technology and Innovation Foundation (ITIF) estimated that the NSA surveillance would cost cloud computing companies such as Microsoft, Amazon and IBM somewhere around $21.5 billion to $35 billion in lost revenue due to the Snowden revelations. However, privacy and security concerns continue to grow well into 2015, and ITIF says the figure could be far more than its early estimate of $35 billion. "Since then, it has become clear that the U.S. tech industry as a whole, not just the cloud computing sector, has under-performed as a result of the Snowden revelations," say [pdf] Daniel Castro and Alan McQuinn, authors of a new ITIF report. "Therefore, the economic impact of U.S. surveillance practices will likely far exceed ITIF's initial $35 billion estimate." ITIF cites a string of financial reports by technology companies and cloud providers showing disappointing earnings and lower-than-expected sales figures, with only Apple making considerable headway overseas with its growing iPhone market in China. The foundation says the dismal figures are partly a result of customers who are increasingly turning to local providers over fears that the NSA will claw its way into their private information via U.S. firms. Foreign governments, which were expending significant amounts of money to invest in IT, are turning away and encouraging their citizens to patronize local providers. Russia, for instance, has passed a new law requiring all tech firms operating within its borders to store information about their customers in servers located within the Russian territory, a requirement that forces companies to spend more as they decentralize operations and build new data centers. France and Germany also have a similar law, forcing Amazon to build new facilities in Frankfurt and Microsoft in Vienna, while China, India and Australia have their own data localization laws. China, in particular, has extreme conditions for U.S. tech companies by requiring them to provide access to valuable intellectual property, such as source code. To make matters worse, U.S. lawmakers are not helping as they fail to create new laws that scale back government surveillance, which "sacrifices robust competitiveness of the U.S. tech sector for vague and unconvincing promises of improved national security," says ITIF. President Barack Obama recently signed into law a bill ending the NSA's bulk collection of telephone metadata, but ITIF says the agency has several other surveillance programs in place that need to be reformed. PRISM, for instance, allows the NSA to obtain private data about a customer in the U.S. or abroad without the need for a warrant, while Bullrun aims to undermine encryption standards. "In the short term, U.S. companies lose out on contracts, and over the long term, other countries create protectionist policies that lock U.S. businesses out of foreign markets," says ITIF. "This not only hurts U.S. technology companies but costs American jobs and weakens the U.S. trade balance." 4 1AC- Inherency: 702 These programs fall under section 702, ignored by recent reforms, which allows NSA surveillance of data on physical servers in the United States and the manipulation of security standards. Danielle Kehl ’14 (with Kevin Bankston, Robyn Greene & Robert Morgus, all are analysts at New America’s Open Technology Institute, “Surveillance Costs: The NSA’s Impact on the Economy, Internet Freedom & Cybersecurity,” July, https://static.newamerica.org/attachments/534-surveillance-costs-thensas-impact-on-the-economy-internet-freedom-cybersecurity/Surveilance_Costs_Final.pdf) As Congress debated the reauthorization of the USA PATRIOT Act’s Section 215 in 2011, Senator Ron Wyden (D-OR) began a slow but steady drumbeat for reform by raising concerns about how the National Security Agency (NSA) was secretly interpreting and using the law. “When the American people find out how their government has secretly interpreted the Patriot Act,” he warned, “they will be stunned and they will be angry.”1 Over two years later, on June 5, 2013, The Guardian published the first leaked document by former NSA contractor Edward Snowden. Readers around the world were shocked to learn about what Senator Wyden had been referring to all along: for years, the NSA has been collecting nearly all of the phone records generated by major telephone companies such as Verizon on an ongoing, daily basis under Section 215’s authority2—and has been using a secret, and now widely discredited, interpretation of the law to do it.3 Over the course of the past year, the world has learned that this bulk collection program was just one small part of the NSA’s massive surveillance apparatus.4 Just a day after the first leak, The Washington Post ran a story about PRISM, the NSA’s “downstream” collection program authorized under Section 702 of the Foreign Intelligence Surveillance Act (FISA). Under the PRISM program, the NSA compels major tech companies like Google, Yahoo, Microsoft, Facebook, and Twitter to turn over the contents of communications stored on company servers that have been sent or received by targets that the NSA reasonably believes are outside of the United States.5 While few details are known about the programs the NSA operates under Section 702, and several of the details regarding the PRISM program are a subject of debate,6 a declassified 2011 Foreign Intelligence Surveillance Court opinion revealed that the NSA collects more than 250,000,000 Internet communications annually using Section 702 and that “the vast majority of these communications are obtained from Internet service providers” through the PRISM program.7 The remainder of those communications comes from Section 702 surveillance that is conducted “upstream”—that is, surveillance conducted not by obtaining stored communications from cloud providers’ servers but by tapping directly into the U.S. Internet backbone network that carries domestic, international, and foreign communications.8 Beyond NSA surveillance inside the United States under Section 215 and Section 702, the NSA engages in massive surveillance of Internet and telephone communications outside of the country as well. Unconstrained by statute and subject only to Executive Branch oversight under the Reagan-era Executive Order 12333,9 this extraterritorial surveillance was revealed in October 2013 to include the monitoring of key private data links that connect Google and Yahoo data centers around the world— monitoring that in just 30 days processed 181,280,466 new records that traversed those links.10 Similarly, the NSA is using Executive Order 12333 to authorize the collection of millions of email address books globally,11 and the recording of vast numbers of international phone calls—sometimes all of the phone traffic in an entire country.12 Executive Order 12333 is also presumably the authority under which the NSA is assisting British intelligence agencies in acquiring millions of webcam photos sent by users of Yahoo,13 and under which the NSA is collecting over five billion cell phone location data points per day, enabling it to track individuals’ movements and relationships with others.14 In addition to the mass surveillance operations that have dominated the past year’s headlines, leaked documents revealed that the NSA employs a unit of elite hackers called the Office of Tailored Access Operations that engages in extensive and highly secretive cyber operations.15 These operations include cracking and undermining encryption standards, inserting vulnerabilities into widelyused software and hardware products, secretly stockpiling information about software vulnerabilities that the NSA discovers so that they can be exploited for intelligence purposes rather than fixed, and developing a global network of malware that has been secretly installed on computers and in networks around the world to better facilitate the NSA’s surveillance.16 5 1AC- Economy: Scenario- Localization A Advantage One: the Economy A. Domestic Data Surveillance Wrecks the Economy Scenario 1: Data Localization: NSA surveillance has triggered data localization: This destroys the international economy in 3 ways: increases costs for every part of the economy, erodes innovation, and reverses the efficiencies of digital commerce. Jonah Force Hill ‘14 (technology and international affairs consultant based in San Francisco and a Fellow of the Global Governance Futures program, “THE GROWTH OF DATA LOCALIZATION POSTSNOWDEN: ANALYSIS AND RECOMMENDATIONS FOR U.S. POLICYMAKERS AND BUSINESS LEADERS”) Over the course of recent decades, and principally since the commercialization of the Internet in the early 1990s, governments around the world have struggled to address the wide range of logistical, privacy, and security challenges presented by the rapid growth and diversification of digital data. The mounting online theft of intellectual property, the growth of sophisticated malware, and the challenges involved in regulating the flow, storage, and analysis of data have all – to varying degrees – increasingly challenged governments’ ability to respond with effective policy. Until recently, these data management issues were left to the men and women of computer science departments, advocates for technology companies, In the wake of former NSA contractor Edward Snowden’s disclosures, however, which revealed to the global public the scale and intensity of intelligence collection online, data security and privacy issues have now become front-page headlines and the topics of dinner-table conversation the world over. As a result, governments are increasingly feeling compelled to do something they see as meaningful – if not outright drastic – to protect their citizens and their businesses from the many challenges they perceive to be threatening their nation’s data and privacy. Of the various responses under consideration, and to the few government attorneys and bureaucrats responsible for overseeing Internet and data regulation. perhaps none has been more controversial – or more deeply troubling to American businesses – than the push to enact laws that force the “localization” of data and the infrastructure that supports it. These are laws that limit the storage, movement, and/or processing of data to specific geographies and jurisdictions, or that limit the companies that can manage data based upon the company’s nation of incorporation or principal situs of operations and management. By keeping data stored within national jurisdictions, or by prohibiting data from traveling through the territory or infrastructure of “untrustworthy” nations or those nations’ technology companies, the argument goes, data will be better protected, and surveillance of the kind orchestrated by the NSA curtailed. Today, more than a dozen countries, 1 both developed and developing, have introduced or are actively contemplating introducing data localization laws. The laws, restrictions, and policies under consideration are diverse in their strategies and effects. Some proposals would enforce limitations for data storage, data transfer, and data processing; others require the local purchasing of ICT equipment for government and private sector procurements. There are proposals for mandatory local ownership of data storage equipment, limitations on foreign online retailers, and forced local hiring. Proposals of this sort are not historically unprecedented. Indeed, forms of data localization policies have been actively in place in many countries for years, including in the United States, where sensitive government data, such as certain classified materials, must be maintained within the servers of domestic companies. Broader localization rules, which apply to all citizen data, have tended to be pursued by authoritarian governments such as Russia, China, and Iran, for which data localization laws have been viewed as an effective means to control information and to monitor the activities of their citizens.2 PostSnowden, however, even democratic countries are now seriously considering these more expansive data localization measures. Most notably, Brazil, Germany, and India– countries that have witnessed some of the most virulent anti-NSA reactions –are now contemplating enacting significant data localization laws. The EU is also contemplating localization within its area of authority.3 This is a deeply troubling development – not just for the technology firms of the United States who stand to lose customers and contracts as a result of these policies,4 but also for all the nations, firms, and individual Internet users who rely on the Web for economic trade and development, communications, and civic organizing. Not only do data localization policies fail to achieve their stated goals, they 6 introduce a host of unintended consequences. By restricting data flows and competition between firms, localization will likely bring up costs for Internet users and businesses, may retard technological innovation and the Internet’s “generativity,” 5 may reduce the ability of firms to aggregate services and data analytics through cloud services, and will surely curb freedom of expression and transparency globally. Ironically, data localization policies will likely degrade – rather than improve – data security for the countries considering them, making surveillance, protection from which is the ostensible reason for localization, easier for domestic governments (and perhaps even for foreign powers) to achieve. Restricted routing, often a core component of data localization rules, may be technically infeasible without initiating a significant overhaul of the Internet’s core architecture and governance systems, which itself would have significant negative effects. And perhaps most worrying, data localization policies – if implemented on a wide international scale – could have the effect of profoundly fragmenting the Internet,6 turning back the clock on the integration of global communication and ecommerce, and putting into jeopardy the myriad of societal benefits that Internet integration has engendered. 7 1AC- Economy: Scenario- Localization B Data services key to poverty reduction, global growth, and trade between the US and Europe. Jonah Force Hill ‘14 (technology and international affairs consultant based in San Francisco and a Fellow of the Global Governance Futures program, “THE GROWTH OF DATA LOCALIZATION POST-SNOWDEN: ANALYSIS AND RECOMMENDATIONS FOR U.S. POLICYMAKERS AND BUSINESS LEADERS”) Economic Growth Objectives Not Well Served Data localization (most especially, as a ban on foreign firms operating local servers) appeals to those political and business leaders who hope to give domestic technology firms a competitive advantage. It also appeals to those leaders who believe that that competitive advantage will, over time, lead to the development of a strong technology sector, following what might be thought of as a “China developmental model,” in which early domestic protectionism is tapered off as local firms find their competitive edge. But again, the benefits of this kind of policy (which generally only advantage certain favored local companies) are outweighed by its drawbacks. By prohibiting foreign firms from operating in country, or by making operations prohibitively expensive for foreign firms, governments are dramatically limiting the options available to local consumers. This includes small businesses that often require the cheaper and more advanced services that only international firms can provide. Indeed, even non tech-related industries that nevertheless rely on IT services, such as advanced manufacturing, are likely to see that their costs rise and their efficiencies deteriorate as a consequence of Internet protectionism in the guise of localization. These costs may not be trivial. The European Centre for International Political Economy has estimated that if and when cross-border data flows between the U.S. and EU are seriously disrupted (assuming existing models for crossborder transfer and processing of data, such as the Safe Harbor and BCRs108 are disrupted ), the negative impact on EU GDP could reach -0.8% to -1.3%, and EU services exports to the United States could drop by as much as -6.7% due to loss of competitiveness.109 Developing countries, too, would likely suffer. There, Internet access and data services are significant drivers of economic growth. According to several important studies on the issue, access to the Internet can dramatically reduce the effect on developing countries of geographical isolation from major exports markets.110And, according to a Deloitte study, expanding access to the 4 billion people who live in developing countries to levels developed economies currently enjoy would increase productivity in those areas by as much as 25 percent, add $2.2 trillion in additional GDP, increase the GDP growth rate by 72 percent, add more than 140 million new jobs, and lift 160 million people out of extreme poverty. 111 Certainly, the cost inherent in localization alone will not forestall all of these positive developments, but it would retard them. To leaders in developing nations such as India and Brazil, where data localization measures are under serious consideration, these potential adverse economic impacts ought to give serious pause. Less directly, but perhaps even more critically as a long-term matter, data localization adversely affects the Internet’s capacity for productivity by reducing the Internet’s “network effect” and “generativity.112” By placing limitations on which firms can participate in the network, data localization reduces the overall size of the network, which, according to network theory as well as Metcalfe’s Law (which states that the value of a communications network is proportional to the number of users of the system), would bring up both costs and the overall innovative potential of the aggregated network. Consider big data analytics, for example, which often involves the transfer of data from numerous sources without regard to geography and can have major benefits for society.113 By severing the ties between nations and the data that can be collected an analyzed, data localization vastly diminishes the capacity for new discoveries and for new solutions to some of the world’s most pressing problems. Certainly, there are good reasons for supporting local Internet infrastructure development. Developing local Internet infrastructure has been shown to help to keep costs down (by avoiding having to send data afar unnecessarily and by providing greater options in pricing negotiations) and to keep service available when connectivity to the outside would is disrupted. 114 Governments can and should invest in building up local capabilities. But restricting data flows and preventing foreign competition are not the ways to facilitate that type of local 8 development. Decisions regarding where to store data and how it should be handled – except in the rare cases of national security or other special privacy cases (for example, there may be good reasons for medical data and the like to be given special treatment) – should be driven by efficiencies, not by political expediency. 9 1AC- Economy: Scenario- Encryption Scenario 2- Encryption: Encryption Credibility is crucial to every sector of the economy: financial services, R&D, health care, etc. The SQ creates security risks, interoperability failures, and a collapse of US competitiveness. Danielle Kehl ’14 (with Kevin Bankston, Robyn Greene & Robert Morgus, analysts at New America’s Open Technology Institute, “Surveillance Costs: The NSA’s Impact on the Economy, Internet Freedom & Cybersecurity,” July, https://static.newamerica.org/attachments/534-surveillance-costs-the-nsasimpact-on-the-economy-internet-freedom-cybersecurity/Surveilance_Costs_Final.pdf) It is wholly inappropriate for the U.S. government to covertly influence security standards-setting processes in a way that may weaken those standards or introduce security flaws. The NSA’s efforts in this area have undermined overall trust in the security of the Internet and diminished confidence in the National Institute of Standards and Technology (NIST). As the President’s Review Group explains, “Encryption is an essential basis for trust on the Internet… The use of reliable encryption software to safeguard data is critical to many sectors and organizations, including financial services, medicine and health care, research and development, and other critical infrastructures in the United States and around the world.”345 Consequently, Recommendation 29 of its report urges the U.S. government to: “(1) fully support and not undermine efforts to create encryption standards; (2) not in any way subvert, undermine, weaken, or make vulnerable generally available commercial software; and (3) increase the use of encryption and urge US companies to do so, in order to better protect data in transit, at rest, in the cloud, and in other storage.”346 Confidence in U.S. encryption standards is critical not only to the security of commercial products, but also to interoperability and the health and competitiveness of the American technology industry.347 Insofar as the NSA continues to provide technical expertise on encryption standards, the Federal Information Security Management Act should be amended so that NIST is no longer required to consult with the NSA when it seeks to issue new or updated encryption standards. Rather, these consultations should happen only on an as-needed basis and should focus entirely on the technical questions at hand. This will help to prevent these consultations from becoming an opportunity for the NSA to exploit or influence the standards setting process. This would also help the United States to send a message that it supports strong, widespread use of encryption instead of seeking to undermine it to increase the monitoring capabilities of the NSA. Representative Alan Grayson’s amendment to the Frontiers in Innovation, Research, Science and Technology Act (H.R. 4186), which was approved by the House Committee on Science, Space, & Technology in May 2014,348 provides a good model for how to enact this reform, and is consistent with recommendations made by the Visiting Committee on Advanced Technology (VCAT) in its July 2014 report.349 A similar measure was approved in June 2014 by a voice vote of the House of Representatives when it was offered by Representative Grayson as an amendment to the National Defense Authorization Act (NDAA) for Fiscal Year 2015 (H.R. 4435),350 though it remains to be seen whether that amendment will make it into the final appropriations bill. Policymakers at NIST can also take proactive steps to rebuild confidence in its standards-setting process. In February 2014, the agency published a draft document that “outlines the principles, processes, and procedures of NIST’s cryptographic standards efforts.”351 The document lays out the factors that drive NIST’s development efforts to ensure that standards are “robust and have the confidence of the cryptographic community in order to be widely adopted and effective at securing information systems worldwide.”352 While this is a positive first step, substantial efforts are still required to reestablish the agency’s credibility and trust in its work, particularly by increasing transparency and openness associated with the standard setting process. The VCAT lays out a series of recommendations in its July 2014 report that are worthy of consideration.353 Specifically, NIST should publish information about whom it consults in the development process, as well as more technical proof establishing the efficacy of the standards that it issues. The failure to publish these technical proofs was a key criticism of the standard setting process associated with the 2006 NSAcompromised encryption standard.354 In order to succeed at its core mission, NIST must take 10 affirmative steps to address concerns about its role in promoting weaker encryption standards and clarify its relationship with other partners and parts of the U.S. government. 11 1AC- Economy: Scenario- HiTech A Scenario 3: HiTech: NSA surveillance destroys productivity and growth by undermining ALL tech related industries by destroying confidence in the integrity of data services. Danielle Kehl ’14 (with Kevin Bankston, Robyn Greene & Robert Morgus, analysts at New America’s Open Technology Institute, “Surveillance Costs: The NSA’s Impact on the Economy, Internet Freedom & Cybersecurity,” New America’s Open Technology Institute July 2014 Policy Paper, July, https://static.newamerica.org/attachments/534-surveillance-costs-the-nsas-impact-on-the-economyinternet-freedom-cybersecurity/Surveilance_Costs_Final.pdf) “It is becoming clear that the post-9/11 surveillance apparatus may be at cross-purposes with our high-tech economic growth,” declared Third Way’s Mieke Eoyang and Gabriel Horowitz in December 2013. “The economic consequences [of the recent revelations] could be staggering.”25 A TIME magazine headline projected that “NSA Spying Could Cost U.S. Tech Giants Billions,” predicting losses based on the increased scrutiny that economic titans like Google, Microsoft, Facebook, and Yahoo have faced both at home and abroad since last June.26 The NSA’s actions pose a serious threat to the current value and future stability of the information technology industry, which has been a key driver of economic growth and productivity in the United States in the past decade.27 In this section, we examine how emerging evidence about the NSA’s extensive surveillance apparatus has already hurt and will likely continue to hurt the American tech sector in a number of ways, from dwindling U.S. market share in industries like cloud computing and webhosting to dropping tech sales overseas. The the major losses will likely result from diminishing confidence in U.S. companies as trustworthy choices for foreign government procurement of products and services and changing behavior in the business-to-business market. Costs to the U.S. Cloud Computing Industry and Related Business Trust in American businesses has taken a significant hit since the initial reports on the PRISM program suggested that the NSA was directly tapping into the servers of impact of individual users turning away from American companies in favor of foreign alternatives is a concern. However, nine U.S. companies to obtain customer data for national security investigations.28 The Washington Post’s original story on the program provoked an uproar in the media and prompted the CEOs of several major companies to deny knowledge of or participation in the program.29 The exact nature of the requests made through the PRISM program was later clarified,30 but the public attention on the relationship between American companies and the NSA still created a significant trust gap, especially in industries where users entrust companies to store sensitive personal and commercial data. “Last year’s national security leaks have also had a commercial and financial impact on American technology companies that have provided these records,” noted Representative Bob Goodlatte, a prominent Republican leader and Chairman of the House Judiciary Committee, in May 2014. Given heightened concerns about the NSA’s ability to access data stored by U.S. companies, it is no surprise that American companies offering cloud computing and webhosting services are among those experiencing the most acute economic fallout from NSA surveillance. Within just a few weeks of the first disclosures, reports began to emerge that American cloud computing companies like Dropbox and Amazon Web Services were starting to lose business to overseas competitors.32 The CEO of Artmotion, one of Switzerland’s largest offshore hosting II. Direct Economic Costs to American Companies “Last year’s national security leaks have also had a commercial and financial impact on American technology companies that have provided these records. They have experienced backlash from both American and foreign consumers and have had their competitive standing in the global marketplace damaged. -Rep. Bob Goodlatte, Chairman of the House Judiciary Committee “ 8 Surveillance Costs: The NSA’s Impact on the Economy, Internet Freedom & Cybersecurity providers, reported in July 2013 that his company had seen a 45 percent jump in revenue since the first leaks,33 an early sign that the country’s perceived neutrality and strong data and privacy protections34 could potentially be turned into a serious competitive advantage.35 Foreign companies are clearly poised to benefit from growing fears about the security ramifications of keeping data in the United States. In a survey of 300 British and Canadian businesses released by PEER 1 in January 2014,36 25 percent of respondents indicated that they were moving data outside of the U.S. as a result of the NSA revelations. An overwhelming number of the companies surveyed indicated that security and data privacy were their top concerns, with 81 percent stating that they “want to know exactly where their data is 12 being hosted.” Seventy percent were even willing to sacrifice performance in order to ensure that their data was protected.37 It appears that little consideration was given over the past decade to the potential economic repercussions if the NSA’s secret programs were revealed.38 This failure was acutely demonstrated by the Obama Administration’s initial focus on reassuring the public that its programs primarily affect non-Americans, even though non-Americans are also heavy users of American companies’ products. Facebook CEO Mark Zuckerberg put a fine point on the issue, saying that the government “blew it” in its response to the scandal. He noted sarcastically: “The government response was, ‘Oh don’t worry, we’re not spying on any Americans.’ Oh, wonderful: that’s really helpful to companies [like Facebook] trying to serve people around the world, and that’s really going to inspire confidence in American internet companies.”39 As Zuckerberg’s comments reflect, certain parts of the American technology industry are particularly vulnerable to international backlash since growth is heavily dependent on foreign markets. For example, the U.S. cloud computing industry has grown from an estimated $46 billion in 2008 to $150 billion in 2014, with nearly 50 percent of worldwide cloud-computing revenues coming from the U.S.40 R Street Institute’s January 2014 policy study concluded that in the next few years, new products and services that rely on cloud computing will become increasingly pervasive. “Cloud computing is also the root of development for the emerging generation of Web-based applications—home security, outpatient care, mobile payment, distance learning, efficient energy use and driverless cars,” writes R Street’s Steven Titch in the study. “And it is a research area where the United States is an undisputed leader.”41 This trajectory may be dramatically altered, however, as a consequence of the NSA’s surveillance programs. Economic forecasts after the Snowden leaks have predicted significant, ongoing losses for the cloud-computing industry in the next few years. An August 2013 study by the Information Technology and Innovation Foundation (ITIF) estimated that revelations about the NSA’s PRISM program could cost the American cloud computing industry $22 to $35 billion over the next three years.42 On the low end, the ITIF projection suggests that U.S. cloud computing providers would lose 10 percent of the foreign market share to European or Asian competitors, totaling in about $21.5 billion in losses; on the high-end, the $35 billion figure represents about 20 percent of the companies’ foreign market share. Because the cloud computing industry is undergoing rapid growth right now—a 2012 Gartner study predicted global spending on cloud computing would increase by 100 percent from 2012 to 2016, compared to a 3 percent overall growth rate in the tech industry as a whole43—vendors in this sector are particularly vulnerable to shifts in the market. Failing to recruit new customers or losing a competitive advantage due to exploitation by rival companies in other countries can quickly lead to a dwindling market share. The ITIF study further notes that “the percentage lost to foreign competitors could go higher if foreign governments enact protectionist trade barriers that effectively cut out U.S. providers,” citing early calls from German data protection authorities to suspend the U.S.-EU Safe Harbor program (which will be discussed at length in the next section).44 As the R Street Policy Study highlights, “Ironically, the NSA turned the competitive edge U.S. companies have in cloud computing into a liability, especially in Europe.”45 In a follow up to the ITIF study, Forrester In a survey of 300 British and Canadian businesses released by PEER 1 in January 2014, 25 percent of respondents indicated that they were moving data outside of the U.S. as a result of the NSA revelations. New America’s Open Technology Institute 9 Research analyst James Staten argued that the think tank’s estimates were low, suggesting that the actual figure could be as high as $180 billion over three years.46 Staten highlighted two additional impacts not considered in the ITIF study. The first is that U.S. customers—not just foreign companies—would also avoid US cloud providers, especially for international and overseas business. The ITIF study predicted that American companies would retain their domestic market share, but Staten argued that the economic blowback from the revelations would be felt at home, too. “You don’t have to be a French company, for example, to be worried about the US government snooping in the data about your French clients,” he wrote.47 Moreover, the analysis highlighted a second and “far more costly” impact: that foreign cloud providers, too, would lose as much as 20 percent of overseas and domestic business because of similar spying programs conducted by other governments. Indeed, the NSA disclosures “have prompted a fundamental re-examination of the role of intelligence services in conducting coordinated cross-border surveillance,” according to a November 2013 report by Privacy International on the “Five Eyes” intelligence partnership between the United States, the United Kingdom, Canada, Australia, and New Zealand.48 Staten predicts that as the surveillance landscape around the world becomes more clear, it could have a serious negative impact on all hosting and outsourcing services, resulting in a 25 percent decline in the overall IT services market, or about $180 billion in losses.49 Recent reports suggest that things are, in fact, moving in the direction that analysts like Castro and Staten suggested.50 A survey of 1,000 “[Information and Communications Technology (ICT)] decision-makers” from France, Germany, Hong Kong, the UK, and the USA in February and March 2014 found that the disclosures “have had a direct impact on how companies around the world think about ICT and cloud computing in particular.”51 According to the data from NTT Communications, 88 percent of decision-makers are changing their purchasing behavior when it comes to the cloud, with the vast majority indicating that the location of the data is very important. The results do not bode well for recruitment of new customers, either—62 percent of those currently not storing data in the cloud indicated that the revelations have since prevented them from moving their ICT systems there. And finally, 82 percent suggested that they agree with proposals made by German Chancellor Angela Merkel in February 2014 to have separate data networks for Europe, which will be discussed in further detail in Part III of this report. Providing direct evidence of this trend, Servint, a Virginia-based webhosting company, reported in June 2014 that international clients have declined by as much as half, dropping from approximately 60 percent of its business to 30 percent since the leaks began.52 With faith in U.S. companies on the decline, foreign companies are stepping in to take advantage of shifting public perceptions. As Georg Mascolo and Ben 13 Scott predicted in a joint paper published by the Wilson Center and the New America Foundation in October 2013, “Major commercial actors on both continents are preparing offensive and defensive strategies to battle in the market for a competitive advantage drawn from Snowden’s revelations.”53 For example, Runbox, a small Norwegian company that offers secure email service, reported a 34 percent jump in customers since June 2013.54 Runbox markets itself as a safer email and webhosting provider for both individual and commercial customers, promising that it “will never disclose any user data unauthorized, track your usage, or display any advertisements.”55 Since the NSA revelations, the company has touted its privacy-centric design and the fact that its servers are located in Norway as a competitive advantage. “Being firmly located in Norway, the Runbox email service is governed by strict privacy regulations and is a safe alternative to American email services as well as cloud-based services that move data across borders and jurisdictions,” company representatives wrote on Frankly I think the government blew it... The government response was, ‘Oh don’t worry, we’re not spying on any Americans.’ Oh, wonderful: that’s really helpful to companies trying to serve people around the world, and that’s really going to inspire confidence in American internet companies.” -Mark Zuckerberg, CEO of Facebook ,, 10 Surveillance Costs: The NSA’s Impact on the Economy, Internet Freedom & Cybersecurity its blog in early 2014.56 F-Secure, a Finnish cloud storage company, similarly emphasizes the fact that “its roots [are] in Finland, where privacy is a fiercely guarded value.”57 Presenting products and services as ‘NSA-proof’ or ‘safer’ alternatives to American-made goods is an increasingly viable strategy for foreign companies hoping to chip away at U.S. tech competiveness.58 14 1AC- Economy: Scenario- HiTech B High tech is key to the US economy- 4 Warrants: Spill-over to all sectors Geographically diverse benefits 4-to-1 multiplier effect Recovery from the recession empirically proves Laura K. Donohue ’15 (Georgetown University Law Center, “High Technology, Consumer Privacy, and U.S. National Security,” http://scholarship.law.georgetown.edu/facpub/1457 ) High technology is central to the U.S. economy. A recent study by the Bay Area Economic Council Institute sought to ascertain how important the high tech industry is just for the U.S. labor market. It found that not only are high-tech jobs critical for generating employment in other sectors, but that growth in the hightech sector has increasingly been happening in areas of great economic and geographic diversity, suggesting that the high-tech industry is not limited to one ethic, social, or economic strata. High-technology has been one of the fastest-growing sectors: between 2004 and 2012, the employment growth in high-tech outpaced private sector growth by a ratio of 3:1. Jobs in Science, Technology, Engineering, and Mathematics (STEM) outpaced job gains across all occupations by a ratio of 27:1. 98 Employment predictions put the demand for high-tech workers to increase 16.2% 2011 to 2020, with STEM employment increasing 13.3% during the same period.99 The study found that the generation of jobs in high-technology had farreaching effects. In addition to the income gains generated by innovation, productivity and a global marketplace, high-technology industrial growth generated other types of jobs. Health care, education, law, restaurants, hotels and personal services, as well as goods-producing construction sectors grew in tandem with high tech, largely because of a local multiplier effect: “For each job created in the local high-tech sector,” the study concluded, “approximately 4.3 jobs are created in the local non-tradable sector in the long run.”100 Even as early as 2002, the National Science Foundation found that the global market for high-technology goods is growing at a swifter rate than for other manufactured goods. More than this, “high-technology industries are driving economic growth around the world.” This study built on one released in 1995 by the National Academies, which had looked carefully at the role and importance of high tech companies in the U.S. economy.102 Indeed, study after study reflects the importance of high-technology in the U.S. economy. In 2015, a Brookings study found that “advanced industries” (which include high-technology, STEM, and industries, like aerospace, which are sizable economic anchor for the U.S. economy.”103 They led the post-recession recovery. Brookings found that with only 9 percent of the total U.S. employment, advanced industries heavily dependent on advanced technologies), “represent a produce some $2.7 trillion per year—around 17% of the country’s GDP. Further, about 60 percent of U.S. exports are tied to this sector, with 2.2 jobs being created domestically for every new advanced industry job. In sum, “Directly and indirectly. . . the sector supports almost 39 million jobs—nearly one-fourth of all U.S. employment.”104 15 1AC- Economy: Scenario- HiTech C Productivity is Independent: Advanced industries are key to continued recovery. Stagnation will destroy US growth. Adams Nager 6/22/15 (economic research analyst at Information Technology Innovation Foundation, “No Growth without Labor Productivity,” http://www.innovationfiles.org/no-growth-without-laborproductivity/ ) Last week the Bureau of Labor Statistics handed down some pretty dismal news for American manufacturing—news that was largely overshadowed by the façade of job growth numbers. Yes, American manufacturing is adding jobs. But our labor productivity numbers have fallen. Labor productivity is simply how many goods can be produced with an hour of work and matters because along with the size of the labor pool, it determines the overall output of an economy. Factors such as technology and capital investment let workers produce more than they could on their own. In the first quarter of 2015, the number of American hours worked (a proxy for the number of workers) grew at a 1.5 percent annual rate. However, the real value of the goods America produced declined at a 1.6 percent annual rate over the same period. And that’s very dangerous, especially because that decline extends to the manufacturing sector. Manufacturing labor productivity is actually down by 1 percent in the first quarter. And, while the first quarter findings may be the result of a measurement issue, multi-year trends show labor productivity growth much slower than our competitors. In the last two years, annual manufacturing labor productivity growth has averaged a mere 1.7 percent annual growth rate, down from 2.5 percent annual growth from 2010 to 2013. That rate fell well behind other nations competing against the United States in high-tech industries. From 2010 to 2013, the European Union averaged 4.1 percent average annual labor productivity growth, Korea averaged over 5 percent annual growth, and China over 8 percent annual average growth in manufacturing labor productivity. Stagnant labor productivity growth implies that the United States is failing to adopt technology fast enough and may be replacing manufacturing technology with cheap labor, reducing the amount of goods being produced per worker. Even more troubling is that this quarter’s labor productivity decline was concentrated in durable manufacturing, which contracted at a 3.3 percent annual rate in the first quarter. Durable manufacturing has been the predominate force behind the steady U.S. recovery (72 percent of jobs gained between 2010 and 2013 were in either automotive manufacturing or in metals). These goods are also more likely to be traded internationally. Slacking productivity in these industries implies that the U.S. manufacturing jobs recovery is largely based on companies substituting cheap labor for investment in automation and other new technologies. Most optimists look at the increasing use of advanced technology and automation in U.S. factories as proof that the United States remains competitive in advanced industries. However, many other nations adopted and implemented these technologies much faster than we did over the last few years. America’s advantage in advanced industries is becoming increasingly fragile, and we stand to lose out in these high-wage and high-growth fields, such as additive manufacturing and advanced semiconductors, and not just in the low value-added industries we mentally associate with offshoring. Without real productivity growth, the United States’ existing $83 billion trade deficit in advanced technology goods could increase. Advocates have warned for years that the United States’ weakening commitment to public R&D spending was eventually going to come home to roost. Economists agree that the only way to achieve real, sustainable growth is through technology. Unfortunately, investment in R&D by the federal government is declining. Decreased technological progress will continue to slow the U.S. economy. Without labor productivity growth, expect to see the United States’ trade deficit get even wider and for our manufacturing job growth numbers to dwindle. How can the United States stave off this scenario and increase its manufacturing labor productivity? We must take real steps to achieve more than superficial, if crowd-pleasing, job growth statistics. We need actual growth in our ability to compete in the most advanced industries. 16 1AC- Economy: Impact- Asia B. Impacts: 1. Asian Instability: Stalled growth will unleash massive global war, failed states, pandemics, and terrorism. Green and Schrage ‘9 (Michael J Green is Senior Advisor and Japan Chair at the Center for Strategic and International Studies (CSIS) and Associate Professor at Georgetown University. Steven P Schrage is the CSIS Scholl Chair in International Business and a former senior official with the US Trade Representative's Office, State Department and Ways & Means Committee, Asia Times, 2009 http://www.atimes.com/atimes/Asian_Economy/KC26Dk01.html) Facing the worst economic crisis since the Great Depression, analysts at the World Bank and the US Central Intelligence Agency are just beginning to contemplate the ramifications for international stability if there is not a recovery in the next year. For the most part, the focus has been on fragile states such as some in Eastern Europe. However, the Great Depression taught us that a downward global economic spiral can even have jarring impacts on great powers. It is no mere coincidence that the last great global economic downturn was followed by the most destructive war in human history. In the 1930s, economic desperation helped fuel autocratic regimes and protectionism in a downward economic-security death spiral that engulfed the world in conflict. This spiral was aided by the preoccupation of the United States and other leading nations with economic troubles at home and insufficient attention to working with other powers to maintain stability abroad. Today's challenges are different, yet 1933's London Economic Conference, which failed to stop the drift toward deeper depression and world war, should be a cautionary tale for leaders heading to next month's London Group of 20 (G-20) meeting. There is no question the US must urgently act to address banking issues and to restart its economy. But the lessons of the past suggest that we will also have to keep an eye on those fragile threads in the international system that could begin to unravel if the financial crisis is not reversed early in the Barack Obama administration and realize that economics and security are intertwined in most of the critical challenges we face. A disillusioned rising power? Four areas in Asia merit particular attention, although so far the current financial crisis has not changed Asia's fundamental strategic picture. China is not replacing the US as regional hegemon, since the leadership in Beijing is too nervous about the political implications of the financial crisis at home to actually play a leading role in solving it internationally. Predictions that the US will be brought to its knees because China is the leading holder of US debt often miss key points. China's currency controls and full employment/export-oriented growth strategy give Beijing few choices other than buying US Treasury bills or harming its own economy. Rather than creating new rules or institutions in international finance, or reorienting the Chinese economy to generate greater long-term consumer demand at home, Chinese leaders are desperately clinging to the status quo (though Beijing deserves credit for short-term efforts to stimulate economic growth). The greater danger with China is not an eclipsing of US leadership, but instead the kind of shift in strategic orientation that happened to Japan after the Great Depression. Japan was arguably not a revisionist power before 1932 and sought instead to converge with the global economy through open trade and adoption of the gold standard. The worldwide depression and protectionism of the 1930s devastated the newly exposed Japanese economy and contributed directly to militaristic and autarkic policies in Asia as the Japanese people reacted against what counted for globalization at the time. China today is similarly converging with the global economy, and many experts believe China needs at least 8% annual growth to sustain social stability. Realistic growth predictions for 2009 are closer to 5%. Veteran China hands were watching closely when millions of migrant workers returned to work after the Lunar New Year holiday last month to find factories closed and jobs gone. There were pockets of protests, but nationwide unrest seems unlikely this year, and Chinese leaders are working around the clock to ensure that it does not happen next year either. However, the economic slowdown has only just begun and nobody is certain how it will impact the social contract in China between the ruling communist party and the 1.3 billion Chinese who have come to see President Hu Jintao's call for "harmonious society" as inextricably linked to his promise of "peaceful development". If the Japanese example is any precedent, a sustained economic slowdown has the potential to open a dangerous path from economic nationalism to strategic revisionism in China too. Dangerous states It is noteworthy that North Korea, Myanmar and Iran have all intensified their defiance in the wake of the financial crisis, which has distracted the 17 world's leading nations, limited their moral authority and sown potential discord. With Beijing worried about the potential impact of North Korean belligerence or instability on Chinese internal stability, and leaders in Japan and South Korea under siege in parliament because of the collapse of their stock markets, leaders in the North Korean capital of Pyongyang have grown increasingly boisterous about their country's claims to great power status as a nuclear weapons state. The junta in Myanmar has chosen this moment to arrest hundreds of political dissidents and thumb its nose at fellow members of the 10-country Association of Southeast Asian Nations. Iran continues its nuclear program while exploiting differences between the US, UK and France (or the P-3 group) and China and Russia - differences that could become more pronounced if economic friction with Beijing or Russia crowds out cooperation or if Western European governments grow nervous about sanctions as a tool of policy. It is possible that the economic downturn will make these dangerous states more pliable because of falling fuel prices (Iran) and greater need for foreign aid (North Korea and Myanmar), but that may depend on the extent that authoritarian leaders care about the well-being of their people or face internal political pressures linked to the economy. So far, there is little evidence to suggest either and much evidence to suggest these dangerous states see an opportunity to advance their asymmetrical advantages against the international system. Challenges to the democratic model The trend in East Asia has been for developing economies to steadily embrace democracy and the rule of law in order to sustain their national success. But to thrive, new democracies also have to deliver basic economic growth. The economic crisis has hit democracies hard, with Japanese Prime Minister Aso Taro's approval collapsing to single digits in the polls and South Korea's Lee Myung-bak and Taiwan's Ma Ying Jeou doing only a little better (and the collapse in Taiwan's exports - particularly to China - is sure to undermine Ma's argument that a more accommodating stance toward Beijing will bring economic benefits to Taiwan). Thailand's new coalition government has an uncertain future after two years of post-coup drift and now economic crisis. The string of old and new democracies in East Asia has helped to anchor US relations with China and to maintain what former secretary of state Condoleezza Rice once called a "balance of power that favors freedom". A reversal of the democratic expansion of the past two decades would not only impact the global balance of power but also increase the potential number of failed states, with all the attendant risk they bring from harboring terrorists to incubating pandemic diseases and trafficking in persons. It would also undermine the demonstration effect of liberal norms we are urging China to embrace at home. Protectionism The collapse of financial markets in 1929 was compounded by protectionist measures such as the Smoot-Hawley tariff act in 1932. Suddenly, the economic collapse became a zero-sum race for autarkic trading blocs that became a key cause of war. Today, the globalization of finance, services and manufacturing networks and the World Trade Organization (WTO) make such a rapid move to trading blocs unlikely. However, protectionism could still unravel the international system through other guises. Already, new spending packages around the world are providing support for certain industries that might be perceived by foreign competitors as unfair trade measures, potentially creating a "SmootHawley 2.0" stimulus effect as governments race to prop up industries. "Buy American" conditionality in the US economic stimulus package earlier this year was watered down somewhat by the Obama administration, but it set a tempting precedent for other countries to put up barriers to close markets. 18 1AC- Economy: Impact- War 2. Failed Global recovery = War: 5 Warrants: Power transitions, miscalculation, poisoned inter-dependence, civil conflict, and diversionary theory. Royal ‘10 (Director of CTR Jedediah, Director of Cooperative Threat Reduction – U.S. Department of Defense, “Economic Integration, Economic Signaling and the Problem of Economic Crises”, Economics of War and Peace: Economic, Legal and Political Perspectives, Ed. Goldsmith and Brauer, p. 213-215) Less intuitive is how periods of economic decline may increase the likelihood of external conflict. Political science literature has contributed a moderate degree of attention to the impact of economic decline and the security and defence behaviour of interdependent states. Research in this vein has been considered at systemic, dyadic and national levels. Several notable contributions follow. First, on the systemic level, Pollins (2008) advances Modelski and Thompson's (1996) work on leadership cycle theory, finding that rhythms in the global economy are associated with the rise and fall of a pre-eminent power and the often bloody transition from one pre-eminent leader to the next. As such, exogenous shocks such as economic crises could usher in a redistribution of relative power (see also Gilpin. 1981) that leads to uncertainty about power balances, increasing the risk of miscalculation (Feaver, 1995). Alternatively, even a relatively certain redistribution of power could lead to a permissive environment for conflict as a rising power may seek to challenge a declining power (Werner. 1999). Separately, Pollins (1996) also shows that global economic cycles combined with parallel leadership cycles impact the likelihood of conflict among major, medium and small powers, although he suggests that the causes and connections between global economic conditions and security conditions remain unknown. Second, on a dyadic level, Copeland's (1996, 2000) theory of trade expectations suggests that 'future expectation of trade' is a significant variable in understanding economic conditions and security behaviour of states. He argues that interdependent states are likely to gain pacific benefits from trade so long as they have an optimistic view of future trade relations. However, if the expectations of future trade decline, particularly for difficult to replace items such as energy resources, the likelihood for conflict increases, as states will be inclined to use force to gain access to those resources. Crises could potentially be the trigger for decreased trade expectations either on its own or because it triggers protectionist moves by interdependent states.4 Third, others have considered the link between economic decline and external armed conflict at a national level. Blomberg and Hess (2002) find a strong correlation between internal conflict and external conflict, particularly during periods of economic downturn. They write: The linkages between internal and external conflict and prosperity are strong and mutually reinforcing. Economic conflict tends to spawn internal conflict, which in turn returns the favour. Moreover, the presence of a recession tends to amplify the extent to which international and external conflicts self-reinforce each other. (Blomberg & Hess, 2002. p. 89) Economic decline has also been linked with an increase in the likelihood of terrorism (Blomberg, Hess, & Weerapana, 2004), which has the capacity to spill across borders and lead to external tensions. Furthermore, crises generally reduce the popularity of a sitting government. "Diversionary theory" suggests that, when facing unpopularity arising from economic decline, sitting governments have increased incentives to fabricate external military conflicts to create a 'rally around the flag' effect. Wang (1996), DeRouen (1995). and Blomberg, Hess, and Thacker (2006) find supporting evidence showing that economic decline and use of force are at least indirectly correlated. Gelpi (1997), Miller (1999), and Kisangani and Pickering (2009) suggest that the tendency towards diversionary tactics are greater for democratic states than autocratic states, due to the fact that democratic leaders are generally more susceptible to being removed from office due to lack of domestic support. DeRouen (2000) has provided evidence showing that periods of weak economic performance in the United States, and thus weak Presidential popularity, are statistically linked to an increase in the use of force. In summary, recent economic scholarship positively correlates economic integration with an increase in the frequency of economic crises, whereas political science scholarship links economic decline with external conflict at systemic, dyadic and national levels.5 This implied connection between integration, crises and armed conflict has not featured prominently in the economic-security debate and deserves more attention. 19 1AC- Economy: Impact- Innovation 3. Innovation is vital to global survival. Baker 2k –Brent Barker, electrical engineer, and manager of corporate communications for the Electric Power Research Institute and former industrial economist and staff author at SRI International and as a commercial research analyst at USX Corporation, “Technology and the Quest for Sustainability.” EPRI Journal, Summer, INFOTRAC Sustainability has been the subject of much discussion and a steady stream of policy forums since the World Commission on Environment and Development, headed by Dr. Gro Brundtland, put it on the world stage in 1987. The Brundtland Commission defined sustainable development as growth that meets the needs of the present generation without compromising the ability of future generations to meet their needs. Assuch, sustainability carries with it the distinct feeling of a modern problem. But it is not. We have been on a seemingly unsustainable course for hundreds of years, but the rules, stakes, and speed of the game keep changing, in large part because of our ability to use technology to extend limits and to magnify human capabilities. As long as the population continues to consume a finite store of resources, we must continue to change our course or fail. If, with the global population approaching 9-10 billion people by midcentury, we were to lock in current technologies and development patterns, we would likely find ourselves heading toward environmental disaster or worse. Our best hope--perhaps our only hope--is to evolve rapidly enough, using our ingenuity, our technology, and our growing ethical framework of inclusiveness and respect for the diversity of life, to stay ahead of the proverbial wolf. Despite the environmental pessimism of the current age, there are a handful of signs that suggest we are struggling in fits and starts in the right direction, possibly even gaining more ground than we are losing. Farm productivity is one of the most significant of the great reversals in human fortune that have occurred in recent times, reversals that offer both hope and strategic guidance. Largely as a result of crop yields growing at 1-2% per year, the millenniaold pattern of clearing forests and grassland for farms and pastures has begun to be reversed in some regions of the world. According to one of the world's leading scholars on technological change, Arnulf Grubler of the International Institute for Applied Systems Analysis, some 18 million hectares (45 million acres) of cropland in Europe and North America have been reconverted to forest and grassland between 1950 and 2000, while agricultural output in those regions has continued to grow. Great reversals are also beginning to occur in areas as diverse as population, resource utilization, energy, and transportation. Fertility rates continue to drop below the replacement level (2.1 children per woman) in affluent nations. First evident in France more than a century ago, the preference for smaller families is spreading throughout the world as economic development expands. As a result, roughly 90% of the population growth in the next 50 years will occur in today'spoorest nations. Overall, we are looking at a new demographic dynamic in which population is exploding in some parts of the world while imploding in others. Nevertheless, it is significant that year after year the United Nations continues to crank down its projection of global population in the twenty-first century, suggesting greater certainty that the population is leveling off. Although the consumption of resources continues to grow with population and economic prosperity in all parts of the world, there are some intriguing counter-trends. Technology continues to expands [sic] the menu of material resources-for example, alloys, composites, and ceramics--as well as to increase the efficiency with which we use them. Both trends help keep resource depletion at bay Moreover, usage patterns are now rapidly shifting, at least in the developed nations, toward lighter materials (aluminum, plastics, paper) and toward the recycling of heavier materials (steel, copper, zinc) and of manufactured components. Perhaps most important for the future, however, is the trend toward the "immaterial." The information age is rapidly knitting together a new economy based on immaterial, knowledge-based assets, electronic commerce, and virtual transportation--an economy that is growing much faster than the old economy. We can barely glimpse the networkedworld of the future, but we can assume it will be much less dependent on natural resources. The reversal in energy use is more clearcut. Energy is in the middle of a 300-year trend away from fossil fuels. After more than 100,000 years of wood use, the global energy system began in the nineteenthcentury to move toward progressively cleaner, less carbon-intensive fuels (shifting from wood to coal to oil to gas). In fact, the decarbonization of the global energy system has been systematically proceeding at an average rate of 0.3% per year for the last 150 years, whilethe economic productivity of energy use has been improving at a rateof about 1% per year. The combined result (1.3% per year) is a healthy rate of reduction in the carbon used (and emitted) in producing a dollar of goods and services around the world. Even though the energyproductivity improvements have thus far been eclipsed by the growth in energy consumption (as more people engage in more economic activity), the trend is telling. The eventual result may be the same as in agriculture, with productivity improvements overtaking aggreg ate demand. In terms of decarbonizing the energy system, the transition is likely to be complete sometime in the next 75-150 years, depending on how fast we push the innovation process toward a clean, electricity- and hydrogen-based system. We would eventually get there even without a rigorous push, but as we will see later, the urgency of the climatechange issue may force us to speed up the historical 20 trend by a factor of 2 or 3. The power of technology These historical trends in agriculture, land use, resource consumption, and energy use point to some profound opportunities for the future. There are at least four major ways in which technology has great potential for helping us achieve a sustainable balance in the twenty-first century The first area of opportunity for technology is in the acceleration of productivity growth. In agriculture, for example, corn yields inthe world today average only about 4 tons per hectare, while the United States averages 7 tons per hectare and the best Iowa farmer can get 17 tons. Simply bringing the world as a whole up to today's best practices in the United States would boost farm productivity to unprecedented heights, even without considering what the biological and genetic revolutions may hold in store for agriculture in the next century As for the overall productivity growth rate in industry and business, we are finally starting to register an increase after nearly 30 years of subpar performance at around 1% growth per year. Computerization appears to be taking hold in the economy in new and fundamental ways, not just in speeding up traditional practices but in altering the economic structure itself. One historical analogy would be the introduction of electric unit drives just after World War I, setting in motion a complete reorganization of the manufacturing Floor and leading to a surge in industrial productivity during the 1920s. In the twenty-first century, industrial processes will be revolutionized by new electrotechnologies, including lasers, plasmas, microwaves, and electron beams for materials processing, as well as electrochemical synthesis and electroseparation for chemical processing. Manufacturing will be revolutionized by a host of emerging technology platforms--for example, nanotechnology, biotechnology, biomimetics, high-temperature superconductivity, and network technology including the combining of advanced sensors with information technology to create adaptive, intelligent systems and processes. Future industrial facilities using advanced network technologies will be operated in new ways to simultaneously optimize productivity energy use, materials consumption, and plant emissions. Optimization will extend beyond the immediate facility to webs of facilities supporting industrial and urban ecology with the waste of one stream becoming the feedstock of the next. In the aggregate, the penetration of all the emerging tech nologiesinto the global economy should make it possible to sustain industrial productivity growth rates above 2% per year for many decades. The same technology platforms will be used to improve the efficiency of land, energy and water use, For example, distributed sensors and controls that enable precision farming can improve crop yields and reduce land and water use. And doubling or even tripling global energy efficiency in the next century is well within our means. Given the inefficiencies that now exist at every stage in the process--from mining and drilling for fuel through the use of energy in automobiles, appliances, and processes--the overall efficiency of the energy chain is only about 5%. From a social standpoint, accelerating productivity is not an option but rather an imperative for the future. It is necessary in order to provide the wealth for environmental sustainability, to support anaging population in the industrialized world, and to provide an economic ladder for developing nations. The second area of opportunity for technology lies in its potential to help stabilize global population at 10-12 billion sometime in the twenty-first century, possibly as early as 2075. The key is economics. Global communications, from television to movies to the Internet,have brought an image of the comfortable life of the developed worldinto the homes of the poorest people, firing their own aspirations for a better quality of life, either through economic development in their own country or through emigration to other countries. If we in the developed world can make the basic tools of prosperity--infrastructure, health care, education, and law-more accessible and affordable, recent history suggests that the cultural drivers for producing large families will be tempered, relatively quickly and without coercion. But the task is enormous. The physical prerequisites for prosperity in the global economy are electricity and communications. Today, there are more than 2 billion people living without electricity, or commercial energy in any form, in the very countries where some 5 billion people will be added in the next 50 years. If for no other reason than our enlightened self-interest, we should strive for universal access to electricity, communications, and educational opportunity. We have little choice, because the fate of the developed world is inextricably bound up in the economic and demographic fate of the developingworld. A third, related opportunity for technology is in decoupling population growth from land use and, more broadly, decoupling economic growth from natural resource consumption through recycling, end-use efficiency, and industrial ecology. Decoupling population from land use is well under way. According to Grubler, from 1700 to 1850 nearly 2 hectares of land (5 acres) were needed to support every child born in North America, while in the more crowded and cultivated regions of Europe and Asia only 0.5 hectare (1.2 acres) and 0.2 hectare (0.5 acre) were needed, respectively. During the past century, the amount of land needed per additional child has been dropping in all areas of the world, with Europe and North America experiencing the fastest decreases. Both crossed the "zero threshold" in the past few decades, meaningthat no additional land is needed to support additional children andthat land requirements will continue to decrease in the future. One can postulate that the pattern of returning land to nature will continue to spread throughout the world, eventually stemming and then reversing the current onslaught on the great rain forests. Time is critical if vast tracts are to be 21 saved from being laid bare, and success will largely depend on how rapidly economic opportunities expand for those now trapped in subsistence and frontier farming. In concept, the potential for returning land to nature is enormous. Futurist and scholar Jesse Ausubel of the Rockefeller University calculates that if farmers could lift average grain yields around the world just to the level of today's average U.S. corn grower, one-half of current global cropland--an area the size of the Amazon basin--could be spared. If agriculture is a leading indicator, then the continuous drive to produce more from less will prevail in other parts of the economy Certainly with shrinking agricultural land requirements, water distribution and use around the world can be greatly altered, since nearly two-thirds of water now goes for irrigation. Overall, the technologies of the future will, in the words of Ausubel, be "cleaner, leaner, lighter, and drier"--that is, more efficient and less wasteful of materials and water. They will be much more tightly integrated through microprocessor-based control and will therefore use human and natural resources much more efficiently and productively. Energy intensity, land intensity, and water intensity (and, to a lesser extent, materials intensity) for both manufacturing and agriculture are already heading downward. Only in agriculture are they falling fast enough to offset the surge in population, but, optimistically, advances in science and technology should accelerate the downward trends in other sectors, helping to decouple economic development fromenvironmental impact in the coming century. One positive sign is thefact that recycling rates in North America are now approaching 65% for steel, lead, and copper and 30% for aluminum and paper. A second sign is that economic output is shifting away from resource-intensive products toward knowledge-based, immaterial goods and services. As a result, although the U.S. gross domestic product (GDP) increased 200-fold (in real dollars) in the twentieth century, the physical weight of our annual output remains the same as it was in 1900. If anything,this trend will be accelerating. As Kevin Kelly, the editor of Wiredmagazine, noted, "The creations most in demand from the United States [as exports] have lost 50% of their physical weight per dollar of value in only six years.... Within a generation, two at most, the number of people working in honest-to-goodness manufacturing jobs will beno more than the number of farmers on the land--less than a few percent. Far more than we realize, the network economy is pulling us all in." Even pollution shows clear signs of being decoupled from population and economic growth. Economist Paul Portney notes that, with the exception of greenhouse gases, "in the OECD [Organization for Economic Cooperation and Development] countries, the favorable experience [with pollution control] has been a triumph of technology That is, the ratio of pollution per unit of GDP has fallen fast enough in the developed world to offset the increase in both GDP per capita and the growing number of 'capitas' themselves." The fourth opportunity for science and technology stems from their enormous potential to unlock resources not now available, to reduce human limitations, to create new options for policymakers and businesspeople alike, and to give us new levels of insight into future challenges. Technically resources have little value if we cannot unlock them for practical use. With technology, we are able to bring dormant resources to life. For example, it was only with the development of anelectrolytic process late in the nineteenth century that aluminum--the most abundant metal on earth--became commercially available and useful. Chemistry unlocked hydrocarbons. And engineering allowed us to extract and put to diverse use untapped petroleum and gas fields. Over the course of history, technology has made the inaccessible accessible, and resource depletion has been more of a catalyst for change than a longstanding problem. Technology provides us with last-ditch methods (what economists would call substitutions) that allow us to circumvent or leapfrog over crises of our own making. Agricultural technology solved the food crisis of the first half of the nineteenth century. The English "steam crisis" of the 1860s, triggered by the rapid rise of coal-burning steam engines and locomotives, was averted by mechanized mining and the discovery and use of petroleum. The U.S. "timber crisis" that Teddy Roosevelt publicly worried about was circumvented by the use of chemicals that enabled a billion or so railroad ties to last for decades instead of years. The great "manure crisis" of the same era was solved by the automobile, which in a few decades replaced some 25 million horses and freed up 40 million hectares (100 million acres) of farmland,not to mention improving the sanitation and smell of inner cities. Oil discoveries in Texas and then in the Middle East pushed the pending oil crisis of the 1920s into the future. And the energy cr isis of the 1970s stimulated the development of new sensing and drilling technology, sparked the advance of non--fossil fuel alternatives, and deepened the penetration of electricity with its fuel flexibility into the global economy Thanks to underground imaging technology, today's known gas resources are an order of magnitude greater than the resources known 20 years ago, and new reserves continue to be discovered. Technology has also greatly extended human limits. It has given each of us a productive capability greater than that of 150 workers in 1800, for example, and has conveniently put the power of hundreds of horses in our garages. In recent decades, it has extended our voice and our reach, allowing us to easily send our words, ideas, images, and money around the world at the speed of light. But global sustainability is not inevitable. In spite of the tremendous promise that technology holds for a sustainable future, there is the potential for all of this to backfire before the job can be done. There are disturbing indications that people sometimes turn in fear and anger on technologies, industries, and institutions that openlyfoster an ever-faster pace of change. The current opposition to nuclear power genetically altered food, the globalization of the economy and the spread of American culture should give us pause. Technology has always presented a two-edged sword, serving as both cause and effect, solving one problem while creating another that was unintended and often unforeseen. We solved the manure crisis, but automotive smog,congestion, and urban sprawl took its place. We cleaned and transformed the cities with all-electric buildings rising thousands of feet into the sky. But while urban pollution was thereby dramatically reduced, a portion of the pollution was shifted to someone else's sky. Breaking limits "Limits to growth" was a popular theme in the 1970s, and a best-selling book of that name predicted dire consequences for the human race by the end of the century. In fact, we have done much better than those predictions, largely 22 because of a factor the book missed--the potential of new technology to break limits. Repeatedly, human societies have approached seemingly insurmountable barriers only to find the means and tools to break through. This ability has now become a source of optimism, an article of faith, in many parts of the world. Today's perceived limits, however, look and feel different. They are global in nature, multicultural, and larger in scale and complexity than ever before. Nearly 2 billion people in the world are without adequate sanitation, and nearly as many are without access to clean drinking water. AIDS is spreading rapidly in the regions of the world least able to fight it. Atmospheric concentrations of greenhouse gases are more than 30% greater than preindustrial levels and are climbing steadily. Petroleum reserves, expected to be tapped by over a billion automobiles worldwide by 2015, may last only another 50-100 years.And without careful preservation efforts, the biodiversity of the planet could become as threatened in this coming century as it was at the end of the last ice age, when more than 70% of the species of large mammals and other vertebrates in North America disappeared (along with 29% in Europe and 86% in Australia). All these perceived limits require innovation of a scope and intensity surpassing human kind's current commitment. The list of real-world problems that could thwart global sustainability is long and sobering. It includes war, disease, famine, political and religious turmoil, despotism, entrenched poverty, illiteracy, resource depletion, and environmental degradation. Technology can help resolve some of these issues--poverty and disease, resource depletion, and environmental impact, for example--but it offers little recourse for the passions and politics that divide the world. The likelihood is that we will not catch up and overtake the moving target of global sustainability in the coming century, but given the prospects fortechnology, which have never been brighter, we may come surprisinglyclose. We should put our technology to work, striving to lift more than 5 billion people out of poverty while preventing irreversible damage to the biosphere and irreversible loss of the earth's natural resources. We cannot see the future of technology any more clearly than our forebears did--and for much the same reason. We are approaching the threshold of profound change, moving at great speed across a wide spectrum of technology, ranging today from the Internet to the Human Genome project. Technology in the twenty-first century will be turning toward biological and ecological analogs, toward microminiature machines, toward the construction of materials atom by atom, and toward the dispersion of microprocessor intelligence into everyday objects subsequently linked into neural networks. Computing power continues to double every 18 months, as postulated in Moore's law, promising to enableus to create much more powerful tools for everyday tasks, optimize business services and processes along new lines, understand complex natural phenomena like the weather and climate, and design technical systems that are self-diagnostic, self-healing, and self-learning. The networked, digital society of the future should be capable o f exponential progress more in tune with biological models of growth than with the incremental progress of industrial societies. If history tells us anything, it is that in the long term we are much more likely to underestimate technology than to overestimate it. We are not unlike the excited crowds that in 1909 tried to imagine the future of flight as they watched Wilbur Wright loop his biplane twice around the Statue of Liberty and head back to Manhattan at the record-breaking speed of 30 miles per hour. As wild as one's imaginationand enthusiasm might have been, it would have been inconceivable that exactly 60 years later humans would fly to the moon and back. Electricity's unique role Electricity lies at the heart of the global quest for sustainability for several reasons. It is the prerequisite for the networked world of the future. It will be the enabling foundation of new digital technology and the vehicle on which most future productivity gains in industry, business, and commerce will depend. And to the surprise of many, it will remain the best pathway to resource efficiency, quality of life, and pollution control. In fact, the National Academy of Engineering just voted the "vast network of electrification" the single greatest engineering achievement of the twentieth century by virtue of its ability to improve people's quality of life. It came out ahead of the automobile, the airplane, the computer, and even health care in its impact on society. The electricity grids of North America, Europe, and Japan are said to be the most complex machines ever built. Although they are not yet full networks--that is, not every node is connected to every other node--these networks have been sufficiently interconnected to become the central enabling technology of the global economy. They will have to be even more interconnected and complex to keep pace with the microprocessors and digital networks they power. In the developed world, electricity has become almost a transparent technology lost in the excitement surrounding its latest progeny--electronics, computers, the Internet, and so forth. Still, its role should be as profound in this century as it was in the last. "How and in what form global electrification goes forward in the next 50 years will determine, as much as anything, how we resolve the global 'trilemma' posed by population, poverty and pollution," says Kurt Yeager, president and CEO of EPRI. "This trilemma is destined to become a defining issue of the twenty-first century" Chauncey Starr, EPRI's founder, has captured the strong historicalcorrelation between access to electricity economic prosperity and social choices. A large majority of the world's population is now trapped at a low economic level, where the focus of everyday life is on survival and on acquiring the basics now taken for granted in developednations. As Starr shows, only after electricity consumption reaches a threshold of approximately 1000 kWh per capita do people turn theirattention from the basics of immediate survival to the level of "amenities," including education, the environment, and intergenerational investment. Given the chicken-and-egg nature of the process of socialadvancement, it is not possible to point to electricity as the initial spark, but it is fair to say that economic development does not happen today without electricity. Electricity has been extended to more than 1.3 billion people overthe past 25 years, with leveraged economic impact. In South Africa, for example, 10 to 20 new businesses are started for every 100 homes that are 23 electrified. Electricity frees up human labor--reducing the time people spend in such marginal daily tasks as carrying water and wood--and provides light in the evening for reading and studying. These simple basics can become the stepping stones to a better life and a doorway to the global economy. Because electricity can be effectively produced from a wide variety of local energy sources and because it is so precise at the point of use, it is the ideal energy carrier for economic and social development. Distributed electricity generation can be used to achieve basic rural electrification goals in the developing world, thereby helping to counteract the trend toward massiveurbanization. People in rural areas and villages need to have accessto the opportunities and jobs that are now attainable only by migrating to large cities. Electrification should also help with efforts to improve deteriorating urban air quality in the growing megacities of the world. Mortality from respiratory infections may be as much as five times higher in developing countries than in developed countries. The health costs can be debilitating; it is estimated, for example, that the total health cost of air emissions in Cairo alone now exceeds $1 billion per year. How global electrification proceeds--on a large or a small scale, with clean or dirty technology--will influence the planet socially economically and environmentally for centuries. Ultimately our success or failure in this endeavor will bear heavily on whether we can effectively handle the issues of the habitability and biodiversity of the planet. Ironically, electricity may also become the focal point for growing animosity in the coming century, for the simple reason that it is taking on more and more responsibility for society's energy-related pollution. Electricity accounted for only about 25% of the world's energy consumption in 1970. Today in the developed countries, its share of energy consumption is nearly 40%, and by 2050 that figure may reach60-70%. If transportation is fully electrified through fuel cells, hybrids, and the like, electricity's energy share could climb even higher. This growth accentuates the need to ensure that future electricity generation and use are as clean and efficient as possible and thatbest practices and technologies are available to developing countries as well as affluent ones. Fortunately for the world, electricity has the greatest potential of all the energy forms to deliver in the area of environmental stewardship. Roadmap's call to action The Electricity Technology Roadmap Initiative, which was launched by EPRI in 1998, began by bringing representatives of more than 150 diverse organizations together in a series of workshops and meetings to explore ways to enhance the future value of electricity to society.They staked out some ambitious destinations through time, leading tothe ultimate destination of "managing global sustainability." They also established some specific goals to ensure that the tools will be in hand by 2025 to reach various sustainability targets, including universal global electrification, by midcentury. Among these goals are the acceleration of electricity-based innovation and R&D and the benchmarking of our progress toward sustainability. Universal global electrification means bringing everyone in the world to at least the "amenities" level defined by Starr. At this level, it becomes more likely that the rich and poor nations will find common ground for pursuing sustainability policies. The roadmap stakeholders are calling for a bare minimum of 1000 kWh per person per year to be available by 2050. This would raise the average in today's developing countries to around 3000 kWh per person per year in 2050, just above the level in the United States a century earlier, around 1950. Moreover, projections suggest that it will be possible to reduce the energy intensity of economic growth by at least 50% over the next 50 years through universal electrification, with about half the reduction resulting from end-use efficiency improvements. Consequently, the 3000 kWh of 2050 will go much further in powering applications--lighting, space conditioning, industrial processes, computing, communications, and the like--than an equivalent amount of electric energy used in the United States in 1950. Already, for example, the manufacturing and widespread application of compact fluorescent lightbulbs has become a priority in China for reasons of both energy efficiency and export potential. Even with the large efficiency improvements that are anticipated in electricity generation and end use, building enough capacity to supply 9-10 billion people with power will be an enormous challenge. Total global generating capacity requirements for 2050 could reach a daunting 10,000 GW--the equivalent of bringing on-line a 1000-MW power plant somewhere in the world every two days for the next 50 years. This is a tall order, and achieving it affordably and with minimal environmental impacts will require an unusual degree of dedicated R&D, supported through public and private collaboration, to accelerate the current pace of technological development. According to the roadmap stakeholders, reaching the destinations that they have defined calls for at least an additional $4 billion peryear in electricity-related R&D by the United States alone. One of the key destinations, resolution of the energy-environment conflict, would in itself require an additional $2 billion per year in U.S. R&D over the next 10 years to speed up the development of clean power generation. This is more than double the nation's current level of funding in this area from both the public and private sectors. The rate of innovation is especially critical to sustainability. The roadmap participants have concluded that a "2% solution" is neededto support a sustainable future. By this, they mean that productivity improvements in a range of areas--including global industrial processes, energy intensity, resource utilization, agricultural yield, emissions reduction, and water consumption--have to occur at a pace of 2% or more per year over the next century. If the advances are distributed on a global basis, this pace should be sufficient to keep the world ahead of growing social and environmental threats. It will also generate the global wealth necessary to progressively eliminate the root cause of these threats and will provide the means to cope with theinevitable surprises that will arise. For example, a 2% annual increase in global electricity supply, if made broadly available in developing countries, would meet the goal of providing 1000 kWh per year toevery person in the world in 2050. This means extending the benefitsof electricity to 100 million new users every year. Maintaining a 2% pace in productivity improvements for a century will be formidable. It is in line with the cumulative advancement in the United States during the twentieth century, but at least twice theworld average over that period. The disparity has been particularly great in the past 25 years, as population growth has outstripped economic development in many parts of the world. The result has been massive borrowing to maintain or enhance short-term standards of living. Staying ahead of population-related challenges is now in the enlightened self-interest of all the world's peoples, and the 2% solution offers a benchmark for success. Sustaining efficiency gains of 2% per 24 year throughout the twenty-first century would allow essential global economic development to continue while sparing the planet. This pace, for example, should help stabilize world population (to the extent that wealth is a primary determinant of population growth), limit atmospheric levels of greenhouse gases to below agreed-upon strat egic limits, provide sufficient food for the bulk of the world's people (as well as the wherewithal to buy it), and return significant amounts of land and water to their natural states. Roadmap participants envision technology and the spread of liberal capitalism as powerful agents for the 2% solution in that they can stimulate global development and foster worldwide participation in market economies. However, the participants have also expressed some concern and caution about unbridled globalization overrunning local cultures and societies and creating instability, unrest, and conflict. Atits worst, globalization could lock weaker nations into commodity-production dependencies, leading to a survival-of-the-fittest global economy in which the rich get richer and most of the poor stay poor. Establishing greater dialogue and cooperation among developed and developing nations is therefore considered critical to ensuring that globalization delivers on its promise to be a vehicle of worldwide progress that honors the diversity of nations and peoples. Targets of sustainability There is no single measure of sustainability; rather, it will require continued progress in a wide variety of areas that reflect the growing efficiency of resource utilization, broad improvements in the quality of life for today's impoverished people, and acceleration of the historical shift away from resource-intensive economic activity. The roadmap's sustainability R&D targets provide a first-order approximation of what will be required. In many cases, the targets representa significant stretch beyond today's levels, but they are all technologically achievable. The roadmap sets an optimistic course, certain that with accelerated R&D and a much stronger technological foundation in hand by 2025, the world could be well on a path to economic and environmental sustainability by midcentury. The goals for sustainability are simply too far-reaching to be achieved solely through governmental directives or policy. Rather, they will be reached most readilyvia a healthy, robust global economy in which accelerated technological innovation in the private sector is strongly encouraged and supported by public policy. The challenges of bringing the world to a state of economic and environmental sustainability in the coming century are immense but not insurmountable. Technology is on the threshold of profound change, quite likely to be broader, faster, and more dramatic in its impact than that which we experienced in the twentieth century. Fortunately, the impact appears to be heading in the right direction. Much of the leading-edge technology is environmentally friendly and, from today's vantage point, is likely to lead to a global economy that is cleaner, leaner, lighter, and drier; many times more efficient, productive, and abundant; and altogether less invasive and less destructive of the natural world. History teaches us that technology can be a liberating force for humanity, allowing us to break through our own self-made limits as well as those posed by the natural world. The next steps will be to extend the benefits of innovation to the billions of people without access and, in the words of Jesse Ausubel, to begin "liberating the environment itself." This entails meeting our needs with far fewer resources by developing a "hydrogen economy, landless agriculture, and industrial ecosystems in which waste virtually disappears....and by broadening our notions of democracy, as well as our view of the ethical standing of trees, owls, and mountains." In many ways, the material abundance and extended human capabilities generated through hundreds of years of technology development have led us to a new understanding and heightened respect for the underlying "technologies of life." Offering four billion years of experience, nature will become one of our best teachers in the new century; we are likely to see new tech nology progressively taking on the character and attributes of living systems. Technology may even begin to disappear into the landscape as microminiaturization and biological design ensue. Still, though technology is heading in the right direction, what remains principally in question is whether the pace of innovation is adequate to stay ahead of the curve of global problems and whether newadvances in technology can be quickly brought down in cost and readily distributed throughout the world. Can we achieve the 2% solution of progressive improvement in economic productivity, land and water use, recycling, emissions reduction, and agricultural yield, year afteryear, decade after decade, in nation after nation? It's a formidable challenge, but with better tools we just might be able to pull it off, If so, the key to success will not be found in one small corner ofthe world. The challenge will be met by making the basic building blocks of innovation-education, R&D, infrastructure, and law--available in full measure to future generations everywhere in the world. Thatfuture begins now. 25 1AC- PLAN The United States Federal Government should restrict domestic surveillance by prohibiting the NSA from gathering data from domestic servers under section 702 of the USA Patriot Act. 26 1AC- Solvency: Signal Solves Credibility Reform of section 702 is the crucial prerequisite for data credibility. The plan sends a signal that domestic surveillance won’t compromise data infrastructure. Jonah Force Hill ‘14 (technology and international affairs consultant based in San Francisco and a Fellow of the Global Governance Futures program, “THE GROWTH OF DATA LOCALIZATION POST-SNOWDEN: ANALYSIS AND RECOMMENDATIONS FOR U.S. POLICYMAKERS AND BUSINESS LEADERS”) Reversing this trend presents a substantial challenge for American companies and the American government. I have offered, below, specific recommendations for both groups to be considered. In addition, however, both technology firms and the U.S. government will need to focus significant energy and resources (diplomatic and financial) to make the case against localization. As a general approach (as distinct from specific recommendations), both should work to correct pervasive misunderstandings about the benefits and drawbacks of data localization among policymakers, industry groups, civil liberty organizations, and other key stakeholders in nations considering such policies. They should forthrightly acknowledge the tremendous harm caused by the conduct of the NSA and by the companies that facilitated that conduct, and seek to rebuild, to the extent possible, global trust in the reliability of U.S. technology firms. In so doing, both are well advised to recognize the ambitions of the many interest groups advocating localization, and without compromising fundamental business or state interests, work to find a means to assist those groups in the realization of those ambitions. Recommendations for the U.S. Government 1. Reform U.S. intelligence collection law and processes in line with the President’s Review Group on Intelligence and Communications Technologies120 The primary justification raised in favor of data localization policies is the need to protect citizens and companies from government surveillance of the like orchestrated by the NSA. While the U.S. government should not compromise what it perceives as essential national security objectives in the face of threats to American businesses (especially in light of the hypocrisy involved in some of those threats), it should nevertheless seriously address the concerns of the international community. Specifically, the U.S. can start by adopting some of the important recommendations of the President Review Group on Communications and Technologies, in particular, “Chapter IV: Reforming Foreign Intelligence Surveillance Directed at Non-United States Person,” recommendations 12-15, focusing on reforming section 702 of the Foreign Intelligence Surveillance Act, such as applying the 1974 Privacy Act to nonU.S. persons. These are serious recommendations, and their implementation ought to go a long way towards reducing (though surely not eliminating) international concerns over the surveillance policies of the United States. Implementation will demonstrate a willingness on the part of the U.S. government to respect global opinion and to impose limits on the reach of its intelligence agencies. 27 1AC- Solvency: Restrict 702 Plan is the MOST EFFECTIVE action possible to restore confidence. Laura K. Donohue ’15 (Georgetown University Law Center, “High Technology, Consumer Privacy, and U.S. National Security,” http://scholarship.law.georgetown.edu/facpub/1457 ) IV. STEPS REQUIRED TO REDRESS THE CURRENT SITUATION Numerous steps could be taken by Congress to address the situation in which U.S. industry currently finds itself. The most effective and influential decision that legislators could take would be to curb the NSA’s authorities under the Foreign Intelligence Surveillance Act. This action has two components: first, ending the telephony metadata collection program and, second, restricting the use of to/from, or about collection under upstream interceptions. Both programs would further benefit from greater transparency, to make it clear that their aim is to prevent foreign aggression and to prevent threats to U.S. national security—not to engage in the interception of trade secrets or to build dossiers on other countries’ populations. The second most effective change that could be undertaken would be to introduce stricter privacy controls on U.S. companies, in the process bringing the United States into closer line with the principles that dominate in the EU. The two entities are not as far apart as the dialogue might have one assume, and so changes required in this sphere would be minimal. Together, these two alterations— curbing the NSA surveillance programs and providing increased consumer protections for privacy—would allow U.S. industry to argue changed circumstances to allow companies to again become competitive for contracts and markets to which they seek access. A third alteration that would make a substantial difference over the longer term relates to the national security infrastructure. The current failure of the United States to integrate economic concerns creates a vulnerability for the country in terms of the breadth and depth of programs subsequently adopted. New thought concomitant of forming a structure of government.129 As members of the polis, U.S. persons, both distributively and collectively, obtain the protections of the Constitution. Viewed in this regard, the Constitution itself embodies the collective organization of “the people” into one entity. “U.S. persons” and “the people” are, therefore, one and the same. The “right of the people” thus refers to a collective group of individuals “who are part of a national community or who have otherwise developed sufficient connection with this country to be considered part of that community.”130 Very few cases address precisely what constitutes sufficient contact with the United States to satisfy the “substantial connections” aspect of the majority’s decision. Those that do point in seemingly different directions.131 At a minimum, however, it would be extraordinary to assume that simply because an individual uses a U.S. company, he or she thereby gains the protections of the Fourth Amendment. This was the basic argument underlying the “modernization” of FISA in the first place, to take account of bad actors, communicating overseas, who would suddenly fall within the more protective FISA regime merely because their communications happened to come within U.S. territory by nature of the carrier in question. Even recognizing, however, that few constitutional barriers may apply to the programmatic use of Section 702 insofar as it is applied to nonU.S. persons (leaving aside the questions that accompany the incidental collection of U.S. persons’ information, as well as entirely domestic conversations), as a matter of policy, certainly both PRISM and the use of to/from or about collection in upstream gathering has dramatically undermined U.S. industry. As a matter of policy, therefore, greater restrictions, more transparency, and more effective oversight of the international collection of content may help to alter the situation with regard to the skepticism expressed towards U.S. companies. The Obama Administration has begun to take steps to acknowledge the importance of data privacy for European citizens, but steps have thus far been limited to law enforcement, excluding surveillance conducted for national security purposes. In June 2014, Attorney General Eric Holder announced that, as part of the EU-U.S. Data Protection and Privacy Agreement, the Administration would work with Congress to provide EU citizens the ability to seek redress in U.S. courts where personal data, shared with the United States by European countries for law enforcement purposes is subsequently intentionally or willfully disclosed.132 The Office of the Director of National Intelligence claims this action as part of the privacy-protective measures implemented in the wake of the Snowden disclosures. 133 The agreement, however, is limited to information provided by European countries, making it somewhat beside the point. More relevantly, the Administration supported the USA FREEDOM Act, which would have prohibited the 28 bulk collection of telephony metadata under Section 215 of the USA PATRIOT Act (as well as the Pen Registers and Trap and Trace provisions of FISA and National Security Letters, which appear in five parts of the U.S. Code). Congress, however, failed to pass the USA FREDOM Act. Actions taken with regard to Section 702 have been minimal and generally focused on U.S. persons. 29 1AC- Solvency: Credibility Solves Fear Plan restores credibility by giving companies distance from the NSA. Laura K. Donohue ’15 (Georgetown University Law Center, “High Technology, Consumer Privacy, and U.S. National Security,” http://scholarship.law.georgetown.edu/facpub/1457 ) Congress has an opportunity to take the lead by recognizing the right to privacy still held by data holders when information is collected by third parties. It can then craft statutes accordingly, ensuring that U.S. companies offer greater protections for consumers, in the process allowing industry to offset the claims of its overseas competitors. 2. Legal Framework Thus far, U.S. high technology companies have been subject to a very different statutory and regulatory structure than that which prevails in the EU. In the United States, privacy rights have largely been protected via a series of vertical statutes dealing with specific areas, such as children using the Internet, driver-related information, and medical data.155 In the EU, in contrast, privacy has been protected by a more omnibus-type approach, which horizontally reaches across a number of areas. This approach is reflected in the 1995 Directive as well as the national legislation implementing the directive on a country-by-country basis.156 The vertical statutory scheme has been successful in addressing particular, discreet areas where privacy interests reside. However, outside of these narrow exceptions, in the interests of encouraging innovation, the high technology sector has been left largely unregulated by federal statute. The assumption has been that market forces would adjust to protect privacy interests. The advantage of this approach has been to give high tech companies a significant amount of flexibility, allowing them to independently gauge the appropriate level of privacy protections to give to consumers. The drawback has been that privacy itself has become commoditized, with companies actually making money off of selling consumers’ privacy interests. Consider Google and its email service, Gmail, for instance. The company reads and analyzes all of its customers’ emails, it watches what people read, it looks at web sites people visit, and it records what people purchase. The company then sells access to customers’ private lives to companies who want to advertise.157 Thus, the mother who sends an email to her son raising concern about depression may receive an ad within hours for psychiatric services, even as a pregnant woman merely looking at cribs, may within days receive mail through the U.S. post, advertising sales at Babies R’Us. In September 2013, Google lost an effort in the 9th Circuit Court of Appeals for judicial review of a lower court’s refusal to dismiss multiple class action lawsuits accusing Google of violating the Wiretap Act.158 United States District Judge Lucy Koh determined that the case was too far along to suffer delays. 159 Koh’s interpretation of the Electronic Communications Privacy Act limits the “ordinary course of business” exception—not least because Google’s practice violates its own policies. 160 The lawsuits, filed in California, Florida, Illinois, Maryland, and Pennsylvania, at great expense, are ongoing. Capitalizing on private data represents a significant breach of the right to privacy. Instead of protecting privacy, the market has exploited it for monetary gain. In the United States and overseas, individuals are concerned about the lack of protections afforded. Congressional legislation could fix this problem by bringing high technology within the broader statutory framework and thus closing a gap in the existing law. 3. Safe Harbor Considerations In the wake of the Snowden revelations, the EU Commission issued a report recommending the retention of Safe Harbor, but recommending significant changes, including required disclosure of cloud computing and other service provider contracts used by Safe Harbor members.161 The Safe Harbor provisions, developed from 1999 to 2000 by the U.S. Commerce Department, the Article 31 Committee on Data Privacy, and the European Union, created a narrow bridge between the United States and EU. At the time, the European Parliament, which did not bind the European Commission, rejected the Safe Harbor provisions by a vote of 279 to 259, with twenty-two abstentions. Chief amongst European concerns was the failure of the agreement to provide adequate protections. In light of the massive data breaches over the past five years in the United States, the practices of a largely unregulated high technology industry, and the ubiquitous nature of NSA surveillance, Europeans are now even less supportive of the Safe Harbor provisions.162 They amount to a self-regulated scheme in which the U.S. Federal Trade Commission looks at whether a company, which has voluntarily opted-in to the program, fails to do what it has stated it will do, within the bounds of its own privacy policy.163 Stronger measures are necessary to restore European confidence in U.S. high technology companies. C. Establishing Economic Security as National Security Economic strength as national security, as was previously discussed, is not a new concept. The Founding itself was premised, in part, on the importance of economic security as being vital to U.S. national interests. In 1787, the Articles of Confederation were written out of existence on economic security grounds, as the country sought to reassure the international community that it was a viable trading partner.164 Since that time, the United States has at times had to remind itself of the importance of the economy to U.S. national interests. We are once again at such a moment. High technology is a vital part of the U.S. economy. It is a symbolic and actual manifestation of the country’s commitment to innovation in every sphere of life. It plays to the United States’ strengths as a nation. It has the potential to change regimes, to alter political relationships, and to shape the daily lives of people around the globe. And it deserves special attention. The danger is that U.S. industry will become less competitive and that the U.S. will lose its dominance in the Internet sphere. To some extent, we do, structurally, pay some attention to the importance of the economy for U.S. national security. But many consequential decisions are not aired in full light of the possible implications for U.S. economic interests. 165 One way Congress could rectify this would be to take a look at 30 how to integrate economic concerns, as an institutional matter, into the national security infrastructure—and not just at the highest levels, but at a programmatic level, where key decisions about programs are being made. V. CONCLUDING REMARKS The Snowden documents revealed not just the extent to which high technology companies had been coopted or compromised, but also that the targets of NSA surveillance include allied and non-allied countries. 166 The impact of this information has meant that U.S. companies have lost revenues and experienced declining market share. Simultaneously, the United States’ position in international trade negotiations has been weakened. The NSA programs also spurred other countries’ efforts to implement data localization. Jurisdictional questions and national borders previously marked the worldwide Internet discussions.167 But countries are using the NSA programs to justify restricting data storage to national borders, making it more difficult for the United States to gain access.168 The backlash has led some commentators to raise concern that “the Internet will never be the same.”169 At risk is the balkanization of the Internet, undermining its traditional culture of open access, and increasing the cost of doing business.170 By undermining high technology companies, U.S. economic security—which is central to U.S. national security—is at risk. Part of the problem appears to be that the national security institutional structure has failed to adequately reflect the importance of economic concerns. Beyond this, there have been a number of unintended consequences even within spheres traditionally understood as within a national security realm. To redress the negative effects that have followed from public awareness of the NSA programs conducted under Section 215 of the USA PATRIOT Act and Section 702 of the FISA Amendments Act, the most important step that Congress could take would be to reign in the surveillance authorities themselves, in the process providing greater transparency and oversight. An alteration in U.S. privacy law would also help to reassure U.S. customers and individuals located outside domestic bounds that consumer privacy is protected, allowing industry accurately to claim that the circumstances have changed. Consideration of how to integrate economic concerns into the national security infrastructure would further help to emphasize the importance of taking account of the impact of new initiatives on the United States. 31 Add-On Advantages 32 Protectionism 2AC 1/ Protectionism: Data surveillance wrecks US competitiveness in cloud services: this weakness triggers a protectionist free-for-all. DANIEL CASTRO ‘13 ( Senior Analyst with the Information Technology and Innovation Foundation and Director of the Center for Data Innovation, August, The recent revelations about the extent to which the National Security Agency (NSA) and other U.S. law enforcement and national security agencies have used provisions in the Foreign Intelligence Surveillance Act (FISA) and USA PATRIOT Act to obtain electronic data from third parties will likely have an immediate and lasting impact on the competitiveness of the U.S. cloud computing industry if foreign customers decide the risks of storing data with a U.S. company outweigh the benefits. The United States has been the leader in providing cloud computing services not just domestically, but also abroad where it dominates every segment of the market. In the 2013 Informa Cloud World Global Insights survey, 71 percent of respondents (of which only 9 percent were from North America) ranked the United States as the leader in cloud computing usage and innovation.1 In this same survey, nine out of ten respondents linked cloud computing to their country’s economic competitiveness. But other countries are trying to play catch-up to the United States’ early success. Of the $13.5 billion in investments that cloud computing service providers made in 2011, $5.6 billion came from companies outside North America. 2 Even national governments are helping to bankroll these efforts to combat U.S. market leadership—France, for example, invested €135 million in a joint venture in cloud computing.3 At stake is a significant amount of revenue. As shown in figure 1, the global enterprise public cloud computing market will be a $207 billion industry by 2016.4 Europeans in particular are trying to edge out their American competitors, and they are enlisting their governments to help. Jean-Francois Audenard, the cloud security advisor to France Telecom, said with no small amount of nationalistic hyperbole, “It’s extremely important to have the governments of Europe take care of this issue because if all the data of enterprises were going to be under the control of the U.S., it’s not really good for the future of the European people.”5 Figure 1: Worldwide spending on cloud computing for U.S. and non-U.S. markets, 2009 – 2016, $ billions. 6 And governments have begun to respond. In a 2012 policy document titled “Unleashing the Potential of Cloud Computing in Europe,” the European Commission (EC) called for a number of steps to promote cloud computing adoption in Europe, including creating panEuropean technical standards, EU-wide certification for cloud computing providers, and model contract language.7 The Europeans are quite frank about their intentions. The EC notes “this strategy is about building a new industry, and better competing against the United States in particular.”8 Gartner estimates that in Western Europe alone the cloud computing market will be $47 billion by 2015, and the EC estimates that European cloud computing providers stand to gain €80 billion in revenue by 2020.9 While much of this projected growth was until recently up for grabs by U.S. companies, the disclosures of the NSA’s electronic surveillance may fundamentally alter the market dynamics. Neelie Kroes, European Commissioner for Digital Affairs, stated the problem quite succinctly, “If European cloud customers cannot trust the United States government, then maybe they won't trust U.S. cloud providers either. If I am right, there are multibillion-euro consequences for American companies. If I were an American cloud provider, I would be quite frustrated with my government right now.”10 The impact of PRISM on U.S companies may be particularly acute because cloud computing is a rapidly growing industry. This means that cloud computing vendors not only have to retain existing customers, they must actively recruit new customers to retain market share. Global spending on cloud computing is expected to grow by as much as 100 percent between 2012 and 2016, whereas the global IT market will only grow by 3 percent.11 If U.S. companies lose market share in the short term, this will have long-term implications on their competitive advantage in this new industry. Rival countries have noted this opportunity and will try to exploit it. One tactic they used before the PRISM disclosures was to stoke fear and uncertainty about the USA PATRIOT Act to argue that European businesses should store data locally to protect domestic 33 data from the U.S. government.12 Reinhard Clemens, CEO of Deutsche Telekom’s T-systems group, argued in 2011 that creating a German or European cloud computing certification could advantage domestic cloud computing providers. He stated, “The Americans say that no matter what happens I’ll release the data to the government if I’m forced to do so, from anywhere in the world. Certain German companies don’t want others to access their systems. That’s why we’re well-positioned if we can say we’re a European provider in a European legal sphere and no American can get to them.”13 And after the recent PRISM leaks, German Interior Minister Hans-Peter Friedrich declared publicly, “whoever fears their communication is being intercepted in any way should use services that don't go through American servers.”14 Similarly, Jörg-Uwe Hahn, a German Justice Minister, called for a boycott of U.S. companies.15 After PRISM, the case for national clouds or other protectionist measures is even easier to make. FINDINGS: THE IMPACT ON U.S. CLOUD SERVICE PROVIDERS Just how much do U.S. cloud computing providers stand to lose from PRISM? At this stage it is unclear how much damage will be done, in part because it is still not certain how the U.S. government will respond. But it is possible to make some reasonable estimates about the potential impact. On the low end, U.S. cloud computing providers might lose $21.5 billion over the next three years. This estimate assumes the U.S. eventually loses about 10 percent of foreign market to European or Asian competitors and retains its currently projected market share for the domestic market. On the high end, U.S. cloud computing providers might lose $35.0 billion by 2016. This assumes the U.S. eventually loses 20 percent of the foreign market to competitors and retains its current domestic market share. (See Appendix A for details.) What is the basis for these assumptions? The data are still thin—clearly this is a developing story and perceptions will likely evolve—but in June and July of 2013, the Cloud Security Alliance surveyed its members, who are industry practitioners, companies, and other cloud computing stakeholders, about their reactions to the NSA leaks.16 For non-U.S. residents, 10 percent of respondents indicated that they had cancelled a project with a U.S.-based cloud computing provider; 56 percent said that they would be less likely to use a U.S.- based cloud computing service. For U.S. residents, slightly more than a third (36 percent) indicated that the NSA leaks made it more difficult for them to do business outside of the United States. Thus we might reasonably conclude that given current conditions U.S. cloud service providers stand to lose somewhere between 10 and 20 percent of the foreign market in the next few years. Indeed, some foreign providers are already reporting their success. Artmotion, Switzerland’s largest hosting company, reported a 45 percent increase in revenue in the month after Edward Snowden revealed details of the NSA’s PRISM program.17 And the percentage lost to foreign competitors could go higher if foreign governments enact protectionist trade barriers that effectively cut out U.S. providers. Already the German data protection authorities have called for suspending all data transfers to U.S. companies under the U.S.-EU Safe Harbor program because of PRISM.18 While the reputations of U.S. cloud computing providers (even those not involved with PRISM) are unfortunately the ones being most tarnished by the NSA leaks, the reality is that most developed countries have mutual legal assistance treaties (MLATs) which allow them to access data from third parties whether or not the data is stored domestically.19 The market research firm IDC noted in 2012, “The PATRIOT Act is nothing special, indeed data stored in the US is generally better protected than in most European countries, in particular the UK.”20 In Germany (yes, the same country that wants to suspend data transfers to the United States) the G10 act gives German intelligence officials the ability to monitor telecommunications without a court order. 21 RECOMMENDATIONS So what should the U.S. government do? First, U.S. government needs to proactively set the record straight about what information it does and does not have access to and how this level of access compares to other countries. To do this effectively, it needs to continue to declassify information about the PRISM program and allow companies to reveal more details about what information has been requested of them by the government. The economic consequences of national security decisions should be part of the debate, and this cannot happen until more details about PRISM have been revealed. Second, the U.S. government should work to establish international transparency requirements so that it is clear what information U.S.-based and nonU.S.-based companies are disclosing to both domestic and foreign governments. For example, U.S. trade negotiators should work to include transparency requirements in trade agreements, including the Transatlantic Trade and Investment Partnership (TTIP) currently being negotiated with the EU. Taking these steps will help ensure that national security interests are balanced against economic interests, and that U.S. cloud service providers are able to effectively compete globally.22 CONCLUSION The United States has both the most to gain and the most to lose. Many of the economic benefits of cloud computing, such as job growth and revenue, are dependent on the United States being able to export cloud computing services. If U.S. firms are to maintain their lead in the market, they must be able to compete in the global market. It is clear that if the U.S. government continues to impede U.S. cloud computing providers, other nations are more than willing to step in to grow their own industries at the expense of U.S. businesses. 34 Protectionism 2AC 2/ Independently, NSA surveillance weakens our negotiating posture on key areas in vital trade negotiations. This crushes the growth and inhibits economic integration. Laura K. Donohue ’15 (Georgetown University Law Center, “High Technology, Consumer Privacy, and U.S. National Security,” http://scholarship.law.georgetown.edu/facpub/1457 ) B. Trade Agreements The NSA programs, and media coverage of them, have further impacted bi and multilateral trade negotiations, undermining U.S. economic security. Consider two of the most important talks currently underway: the Transatlantic Trade and Investment Partnership (TTIP) and the Trans-Pacific Partnership (TPP). TTIP is a trade and investment negotiation that is being conducted between the European Commission and the United States. The purpose of the agreement is to create better trade relations between the two region, enabling companies on both sides of the Atlantic to thrive. The revelations about NSA activities have had a profound impact on the negotiations. In March 2014 the European Parliament passed a resolution noting “the impact of mass surveillance.” It stated, “the revelations based on documents leaked by former NSA contractor Edward Snowden put political leaders under the obligation to address the challenges of overseeing and controlling intelligence agencies in surveillance activities and assessing the impact of their activities on fundamental rights and the rule of law in a democratic society.” 39 It recognized that the programs had undermined “trust between the EU and the US as transatlantic partners.” Not least were concerns that the information could be used for “economic and industrial espionage”—and not merely for the purpose of heading off potentially violent threats. Parliament strongly emphasized, “given the importance of the digital economy in the relationship and in the cause of rebuilding EU-US trust,” that its “consent to the final TTIP agreement could be endangered as long as the blanket mass surveillance activities and the interception of communications in EU institutions and diplomatic representations are not completely abandoned and an adequate solution is found for the data privacy rights of EU citizens.” The resolution underscored that any agreement to TTIP would hinge on the protection of the data privacy rights as reflected in the protection of fundamental rights in the EU Charter.40 Even if the surveillance programs do not entirely derail TTIP, they have the potential to significantly retard negotiations.41 Much is at stake. The Center for Economic Policy Research in London, for instance, estimates that a successful TTIP could improve U.S. workers’ wages, provide new jobs, and increase the country’s GDP by $100 billion per year. 42 Another study, conducted by the Bertelsmann Foundation, suggests that TTIP “could increase GDP per capita in the United States by 13 percent over the long term.”43 To the extent that the programs weaken the U.S. position in the negotiations, the impact could be significant.44 Although the United States Trade Representative is trying to counter the political fallout from the NSA debacle by putting local data protection initiatives on the table in the TTIP negotiations, the EU has steadfastly resisted any expansion into this realm. TPP, in turn, is a trade agreement that the United States is negotiating with 11 countries in the Asia-Pacific region (Australia, Brunei Darussalam, Canada, Chile, Japan, Malaysia, Mexico, New Zealand, Peru, Singapore, and Vietnam). TPP (with participation of Japan), accounts for nearly 40% of global GDP, about 1/3 of world trade. Two of the United States’ objectives in these negotiations are directly implicated by the Snowden releases: e-commerce / telecommunications, and intellectual property rights. The NSA programs relate to a number of categories under e-commerce—such as rules preventing discrimination based on the country of origin, and efforts to construct a single, global Internet. Nevertheless, as discussed below, some of the countries involved in TPP have already adopted data localization laws. The NSA programs have thus weakened the United States’ negotiation position in these discussions, by making it more difficult to reach agreement in key areas. In addition to e-commerce considerations, as part of the TPP negotiations, the United States has prioritized intellectual property rights. Some 40 million American jobs are directly or indirectly tied to “IP-intensive” industries. These jobs tend to be high-paying and stimulate approximately 60% of U.S. merchandise exports, as well as a significant portion of services. Efforts to make progress in TPP by developing stronger protections for patents, trademarks copyrights, and trade secrets—including safeguards against cyber theft of trade secrets—is made more perilous by the existence of the NSA programs. 35 Protectionism 2AC 3/ Best models of alliance networks prove that trade solves war by reducing the instability of loose networks. Trade-driven alliances deter conflict, incentivize cooperation, and reduce escalation. Matthew O. Jackson 15 (William D. Eberle Professor of Economics at Stanford and Stephen M. Nei, PhD Student in Economics at Stanford, June, “Networks of Military Alliances, Wars, and International Trade”, October 2014, http://papers.ssrn.com/sol3/papers.cfm?abstract_id=2389300 It turns out that there are no war-stable networks, even with this definition that imposes minimal requirements. The tension is understood as follows. Requiring that countries not be vulnerable to attack and having every alliance serve some purpose leads networks to be relatively sparse - with each country having a few alliances but a network that is not overly dense. However, this can make a country susceptible to some of its allies joining forces and defeating it. Essentially, the pressure to economize on alliances conflicts with stability against the formation of new alliances, which leads to instability and would suggest chaotic dynamics. This instability provides insights into the constantly shifting structures and recurring wars that occurred throughout the nineteenth and first half of the twentieth centuries.7 Wars, however, have greatly subsided in parallel with the huge increase of trade (which was partly driven by the introduction of containerized shipping in the 1960s, which greatly decreased costs): Between 1820 and 1959 each pair of countries averaged .00056 wars per year, while from 1960 to 2000 the average was .00005 wars per year, less than one tenth as much. We see this pattern quite clearly in Figure 1.8 These changes also follow the advent of nuclear weapons, which impacted the technology of war. However, we show that nuclear weapons cannot lead to stability in the absence of trade, as our model allows for quite arbitrary asymmetries between the military capabilities of countries and offensive or defensive advantages in wars - and instability ensues for any specification of technology and relative military capabilities. Indeed, in order to capture the actual patterns that have emerged one must add other considerations - such as trade considerations - since the base model shows that all networks of alliances are unstable with nuclear weapons but without trade.9 Thus, the second part of our analysis is to enrich the base model to include international trade. Indeed, there has been a rapid increase in global trade since World War II (partly coincident with the growth of container shipping among other stimuli). The empirical relationship between war and trade is an active area of research, with strong suggestions (e.g., Martin, Mayer, and Thoenig (2008)) that network concerns may be important. So, we introduce a concept of a network of alliances being war and trade stable, which allows countries to form alliances for either economic or military considerations. In this richer model, an alliance allows countries to trade with each other existence of networks of alliances that are stable against the addition or deletion of alliances. Trade provides two helpful incentives: first it provides economic motivations to maintain alliances, and the resulting denser network of alliances then has a deterrent effect; and second, it can reduce the incentives of a country to attack another since trade will be disrupted. This reduces the potential set of conflicts and, together with the denser networks, allows for a rich family of stable networks that can exhibit structures similar to networks we see currently. We and to coordinate military activities, and so can be formed for either reason. This restores provide some results on the existence and structure of war and trade stable networks of alliances, showing that structures similar to those observed over the past few decades are economically stable under apparently reasonable parameters. It is important to note that another dramatic change during the post-war period was the introduction of nuclear weapons, which changes the technology of war and is generally thought to have greatly 4 increased the defensive advantage to those with such weapons.10 Our model suggests that although world-wide adoption of nuclear weapons could stabilize things in the absence of trade, it would result in an empty network of alliances as the stable network. To explain the much denser and more stable networks in the modern age along with the paucity of war in a world where nuclear weapons are limited to a small percentage of countries, our model points to the enormous growth in trade as a big part of the answer. We close the paper with some discussion of this role that the growth in trade has played in reducing wars over the past half century, and how this relates to the advent of the nuclear age. The model provides some specific predictions for some of the mechanisms that decrease wars: including trade with 36 allies (making it more likely that allies will aid a country and less likely that they will be part of an attacking coalition against that country), and that increasing trade between any two countries lowers their gains from war with each other making it less likely that they will be at war at any time. We show that both of these effects are observed in the data. Before proceeding, let us say a few words about how this paper contributes to the study of war. The literature on war provides many rationales for why wars occur. Our analysis here fits firmly into what has become a “rationalist” tradition based on cost and benefit analyses by rational actors, with roots seen in writings such as Hobbes (1651) Leviathan, and has become the foundation for much of the recent international relations literature.11 To our knowledge, there are no previous models of conflict that gametheoretically model networks of alliances between multiple agents/countries based on costs and benefits of wars. 12 There are previous models of coalitions in conflict settings (e.g., see Bloch (2012) for a survey). Here, network structures add several things to the picture. Our model is very much in a similar rationalist perspective of the literature that examines group conflict (e.g., Esteban and Ray (1999, 2001); Esteban and Sakovicz (2003)), but enriching it to admit network structures of alliances and of international trade. This allows us to admit patterns that are consistent with the networks of alliances that are actually observed, which are far from being partitions (e.g., the U.S. is currently allied with both Israel and Saudi Arabia, Pakistan and India, just to mention a couple of many prominent examples). More importantly, our Theorem 3 provides a first model in which such non-partitional such structures are stable and provide insight into peace. Moreover, as we already mentioned above, the observed patterns of wars and of alliances are not partitional, and so this provides an important advance in moving the models towards matching observed patterns of wars, trade and alliances. Our model thus serves as a foundation upon which one can eventually build more elaborate analyses of multilateral interstate alliances, trade, and wars. It is also important to emphasize that the network of international trade is complex and can in fact be stable (and prevent conflict) precisely because it cuts across coalitions. This is in contrast to coalitional models that generally predict only the grand coalition can be stable or that very exact balances are possible (e.g., see Bloch, Sanchez-Pages, and Soubeyran (2006)). Again, this is something illustrated in our Theorem 3, and which does not exist in the previous literature. Finally, our model illuminates the relationships between international trade, stable network structures, and peace, something not appearing in the previous literature - as the previous literature that involves international trade and conflict generally revolves around bilateral reasoning or focuses on instability and armament (e.g., Garfinkel, Skaperdas, and Syropoulos (2014)) and does not address the questions that we address here. The complex relationship between trade and conflict is the subject of a growing empirical literature (e.g., Barbieri (1996); Mansfield and Bronson (1997); Martin, Mayer, and Thoenig (2008); Glick and Taylor (2010); Hegre, Oneal, and Russett (2010)). The literature not only has to face challenges of endogeneity and causation, but also of substantial heterogeneity in relationships, as well as geography, and the level of conflict. The various correlations between conflict and trade are complex, and a model such as ours that combines military and economic incentives, and others that may follow, can provide structure with which to interpret some of the empirical observations, which we discuss in the following section. 37 Protectionism 2AC 4/ All global problems require effective trade: terrorism, poverty, health, geo-politics, and all the rest require a consolidation of global trade. A vacuum will create trade blocks- causing war. Panitchpakdi ‘4 (Supachai Panitchpakdi, secretary-general of the UN Conference on Trade and Development, 2/26/2004, American Leadership and the World Trade Organization, p. http://www.wto.org/english/news_e/spsp_e/spsp22_e.html The second point is that strengthening the world trading system is essential to America's wider global objectives. Fighting terrorism, reducing poverty, improving health, integrating China and other countries in the global economy — all of these issues are linked, in one way or another, to world trade. This is not to say that trade is the answer to all America's economic concerns; only that meaningful solutions are inconceivable without it. The world trading system is the linchpin of today's global order — underpinning its security as well as its prosperity. A successful WTO is an example of how multilateralism can work. Conversely, if it weakens or fails, much else could fail with it. This is something which the US — at the epicentre of a more interdependent world — cannot afford to ignore. These priorities must continue to guide US policy — as they have done since the Second World War. America has been the main driving force behind eight rounds of multilateral trade negotiations, including the successful conclusion of the Uruguay Round and the creation of the WTO. The US — together with the EU — was instrumental in launching the latest Doha Round two years ago. Likewise, the recent initiative, spearheaded by Ambassador Zoellick, to re-energize the negotiations and move them towards a successful conclusion is yet another example of how essential the US is to the multilateral process — signalling that the US remains committed to further liberalization, that the Round is moving, and that other countries have a tangible reason to get on board. The reality is this: when the US leads the system can move forward; when it withdraws, the system drifts. The fact that US leadership is essential, does not mean it is easy. As WTO rules have expanded, so too has as the complexity of the issues the WTO deals with — everything from agriculture and accounting, to tariffs and telecommunication. The WTO is also exerting huge gravitational pull on countries to join — and participate actively — in the system. The WTO now has 146 Members — up from just 23 in 1947 — and this could easily rise to 170 or more within a decade. Emerging powers like China, Brazil, and India rightly demand a greater say in an institution in which they have a growing stake. So too do a rising number of voices outside the system as well. More and more people recognize that the WTO matters. More non-state actors — businesses, unions, environmentalists, development NGOs — want the multilateral system to reflect their causes and concerns. A decade ago, few people had even heard of the GATT. Today the WTO is front page news. A more visible WTO has inevitably become a more politicized WTO. The sound and fury surrounding the WTO's recent Ministerial Meeting in Cancun — let alone Seattle — underline how challenging managing the WTO can be. But these challenges can be exaggerated. They exist precisely because so many countries have embraced a common vision. Countries the world over have turned to open trade — and a rules-based system — as the key to their growth and development. They agreed to the Doha Round because they believed their interests lay in freer trade, stronger rules, a more effective WTO. Even in Cancun the great debate was whether the multilateral trading system was moving fast and far enough — not whether it should be rolled back. Indeed, it is critically important that we draw the right conclusions from Cancun — which are only now becoming clearer. The disappointment was that ministers were unable to reach agreement. The achievement was that they exposed the risks of failure, highlighted the need for North-South collaboration, and — after a period of introspection — acknowledged the inescapable logic of negotiation. Cancun showed that, if the challenges have increased, it is because the stakes are higher. The bigger challenge to American leadership comes from inside — not outside — the United States. In America's current debate about trade, jobs and globalization we have heard a lot about the costs of liberalization. We need to hear more about the opportunities. We need to be reminded of the advantages of America's openness and its trade with the world — about the economic growth tied to exports; the inflation-fighting role of imports, the innovative stimulus of global competition. We need to explain that freer trade works precisely because it involves positive change — better products, better job opportunities, better ways of doing things, better standards of living. While it is true that change can be threatening for people and societies, it is equally true that the vulnerable are not helped by resisting change — by putting up barriers and shutting out competition. They are helped by training, education, new and better opportunities that — with the right support policies — can flow from a globalized economy. The fact is that for every job in the US threatened by imports there is a growing number of high-paid, high skill jobs created by exports. Exports supported 7 million workers a decade ago; that number is approaching around 12 million today. And these new jobs — in aerospace, finance, information technology — pay 10 per cent more than the average American wage. We especially need to inject some clarity — and facts — into the current debate over the outsourcing of services jobs. Over the next decade, the US is projected to create an average of more than 2 million new services jobs a year — compared to roughly 200,000 services jobs that will be outsourced. I am well aware 38 that this issue is the source of much anxiety in America today. Many Americans worry about the potential job losses that might arise from foreign competition in services sectors. But it’s worth remembering that concerns about the impact of foreign competition are not new. Many of the reservations people are expressing today are echoes of what we heard in the 1970s and 1980s. But people at that time didn’t fully appreciate the power of American ingenuity. Remarkable advances in technology and productivity laid the foundation for unprecedented job creation in the 1990s and there is no reason to doubt that this country, which has shown time and again such remarkable potential for competing in the global economy, will not soon embark again on such a burst of job-creation. America's openness to servicesector trade — combined with the high skills of its workforce — will lead to more growth, stronger industries, and a shift towards higher value-added, higher-paying employment. Conversely, closing the door to service trade is a strategy for killing jobs, not saving them. Americans have never run from a challenge and have never been defeatist in the face of strong competition. Part of this challenge is to create the conditions for global growth and job creation here and around the world. I believe Americans realize what is at stake. The process of opening to global trade can be disruptive, but they recognize that the US economy cannot grow and prosper any other way. They recognize the importance of finding global solutions to shared global problems. Besides, what is the alternative to the WTO? Some argue that the world's only superpower need not be tied down by the constraints of the multilateral system. They claim that US sovereignty is compromised by international rules, and that multilateral institutions limit rather than expand US influence. Americans should be deeply sceptical about these claims. Almost none of the trade issues facing the US today are any easier to solve unilaterally, bilaterally or regionally. The reality is probably just the opposite. What sense does it make — for example — to negotiate e-commerce rules bilaterally? Who would be interested in disciplining agricultural subsidies in a regional agreement but not globally? How can bilateral deals — even dozens of them — come close to matching the economic impact of agreeing to global free trade among 146 countries? Bilateral and regional deals can sometimes be a complement to the multilateral system, but they can never be a substitute. There is a bigger danger. By treating some countries preferentially, bilateral and regional deals exclude others — fragmenting global trade and distorting the world economy. Instead of liberalizing trade — and widening growth — they carve it up. Worse, they have a domino effect: bilateral deals inevitably beget more bilateral deals, as countries left outside are forced to seek their own preferential arrangements, or risk further marginalization. This is precisely what we see happening today. There are already over two hundred bilateral and regional agreements in existence, and each month we hear of a new or expanded deal. There is a basic contradiction in the assumption that bilateral approaches serve to strengthen the multilateral, rules-based system. Even when intended to spur free trade, they can ultimately risk undermining it. This is in no one's interest, least of all the United States. America led in the creation of the multilateral system after 1945 precisely to avoid a return to hostile blocs — blocs that had done so much to fuel interwar instability and conflict. America's vision, in the words of Cordell Hull, was that “enduring peace and the welfare of nations was indissolubly connected with the friendliness, fairness and freedom of world trade”. Trade would bind nations together, making another war unthinkable. Non-discriminatory rules would prevent a return to preferential deals and closed alliances. A network of multilateral initiatives and organizations — the Marshal Plan, the IMF, the World Bank, and the GATT, now the WTO — would provide the institutional bedrock for the international rule of law, not power. Underpinning all this was the idea that freedom — free trade, free democracies, the free exchange of ideas — was essential to peace and prosperity, a more just world. It is a vision that has emerged pre-eminent a half century later. Trade has expanded twenty-fold since 1950. Millions in Asia, Latin America, and Africa are being lifted out of poverty, and millions more have new hope for the future. All the great powers — the US, Europe, Japan, India, China and soon Russia — are part of a rules-based multilateral trading system, greatly increasing the chances for world prosperity and peace. There is a growing realization that — in our interdependent world — sovereignty is constrained, not by multilateral rules, but by the absence of rules. 39 Protectionism- NSA = Pretext NSA surveillance is an effective pretext for protectionism. Jonah Force Hill ‘14 (technology and international affairs consultant based in San Francisco and a Fellow of the Global Governance Futures program, “THE GROWTH OF DATA LOCALIZATION POST-SNOWDEN: ANALYSIS AND RECOMMENDATIONS FOR U.S. POLICYMAKERS AND BUSINESS LEADERS”) Diverse Motivations Upon first glance, the preceding case studies present a consistent narrative: for the nations now considering localization for data, the Snowden revelations exposed an NSA that had overstepped the boundaries of acceptable surveillance, violated citizen privacy, and catalyzed public and government opinion in favor of forceful action in response. For policymakers, data localization offers a seemingly simple and effective solution. Under closer examination, however, a more complicated picture emerges. The localization movement is in fact a complex and multilayered phenomenon, with the objective not only—or even primarily—of localization also serves to protect domestic businesses from foreign competition, to support domestic intelligence and law enforcement ambitions, to suppress dissent and to stir up populist enthusiasms for narrow political ends. Direct protecting privacy. Depending on the country in which it is being advanced, evidence of these other objectives for which privacy seems to be a pretext is by its nature difficult to uncover: rarely to policy-makers admit to seeking protectionist goals, to spying on their populations, to suppressing dissent or to exploiting populist emotions. Yet, by viewing the localization movement in the context of other state and corporate interests and activities, it is possible to uncover these other, less exalted ends. Protectionism Powerful business interests undoubtedly see data localization as an effective and convenient strategy for gaining a competitive advantage in domestic IT markets long dominated by U.S. tech firms. To localization proponents of this stripe, the NSA programs serve as a powerful and politically expedient excuse to pursue policies protective of domestic businesses. As an illustration, data localization in Germany presents clear economic benefits for a most powerful industry advocate for localization, Deutsche Telekom (DT). Whether by way of its “email made in Germany” system or the Schengen area routing arrangement, DT looks poised to gain from efforts to reduce the prominence of American tech firms in Europe. It is no wonder that the company has been spearheading many of the localization proposals in that country. As telecommunications law expert Susan Crawford has noted, DT has been seeking to expand its cloud computing services for years, but has found its efforts to appeal to German consumers stifled by competition from Google and other American firms. 79 T-Systems International GmbH, DT’s 29,000-employee distribution arm for information-technology solutions, has been steadily losing money as a result.80 Moreover, Crawford suggests that DT would not be content with gaining a greater share of the German market; she points out that through a Schengen routing scheme, “Deutsche Telekom undoubtedly thinks that it will be able to collect fees from network operators in other countries that want their customers’ data to reach Deutsche Telekom’s customers.”81 Similarly, companies and their allies in government in Brazil and India look to profit from data localization proposals. Indeed, the governments of both nations have for years sought to cultivate their own domestic information technology sectors, at times by protecting homegrown industries with import tariffs and preferential taxation. Brazilian President Rousseff has on numerous occasions stated that her government intends to make Brazil a regional technology and innovation leader; in recent years the government has proposed measures to increase domestic Internet bandwidth production, expand international Internet connectivity, encourage domestic content production, and promote the use of domestically produced network equipment.82 India, more controversially, has at times required foreign corporations to enter into joint ventures to sell ecommerce products, and has compelled foreign companies to transfer proprietary technology to domestic firms after a predetermined amount of time.83 Brazil and India are, of course, not alone in this respect. Indonesian firms are constructing domestic cloud service facilities with the help of government grants, 84 while Korea is offering similar support to its own firms. 85 For the governments and corporations of these nations, long frustrated by their inability to develop a domestic IT industry that can compete on an even playing field with the U.S. technology giants, data localization is one means to confront, and perhaps overcome, the American Internet hegemony. 40 Protectionism- Impact: EU NSA backlash wrecks US/EU trade relations. Now is key to reverse course. Danielle Kehl ’14 (with Kevin Bankston, Robyn Greene & Robert Morgus, analysts at New America’s Open Technology Institute, “Surveillance Costs: The NSA’s Impact on the Economy, Internet Freedom & Cybersecurity,” July, https://static.newamerica.org/attachments/534-surveillance-costs-the-nsasimpact-on-the-economy-internet-freedom-cybersecurity/Surveilance_Costs_Final.pdf) In addition to requiring local data storage, a number of countries, particularly in the EU, are proposing stricter domestic privacy regulations to ensure that their citizens are better protected against NSA snooping, which could lead to increased transaction costs for American companies that need to comply with them. “The effect of these proposed EU rules could serious undermine the position of some U.S. firms… Business models aside, the rules if adopted may require U.S. firms to place their servers, and European citizen data they hold, permanently in Europe, potentially a prohibitively expensive—or technically unfeasible—requirement,” writes Jonah Force Hill, a scholar at Harvard University’s Belfer Center for Science and International Affairs.147 In March 2014, members of the European Parliament passed the EU’s much-debated Data Protection Regulation and Directive by an enormous margin.148 The rules impose strict limitations on what can be done with the data of EU citizens. Individuals would have to explicitly consent to having their personal data processed—and would retain the right to withdraw their consent if given. They would also be able to request their personal data from anyone who holds it and have it erased.149 The new rules apply to the processing of EU citizens’ data no matter where that data is located, ensuring that personal information from Europe is still protected by EU laws when it travels elsewhere, especially to the United States.150 And the deterrent fines are significant, with a maximum penalty of up to five percent of revenues for non-compliance. That could translate to billions of dollars for large tech companies. The new rules build upon the principles established in Europe’s 1995 Data Protection Directive with updates that reflect the modern Internet ecosystem. After the regulation passed, the European Commissioner for Justice, Fundamental Rights and Citizenship, Viviane Reding, declared that the rules both preserve fundamental European values and offer a competitive opportunity for Europe to distinguish itself after the NSA revelations. “Data Protection is made in Europe. Strong data protection rules must be Europe’s trade mark,” she said. “Following the U.S. data spying scandals, data protection is more than ever a competitive advantage.”151 The NSA disclosures also threaten to upset existing U.S.-EU trade relationships. On the same day that the Data Protection Regulation and Directive passed, members of the European Parliament voted in favor of a resolution from the Civil Liberties, Justice and Home Affairs Committee on the mass surveillance of EU citizens.152 Among other things, the resolution called for the suspension of the U.S.-EU “Safe Harbor” deal that lets American firms self-certify via the Commerce Department that they are in compliance with EU privacy laws. The actual authority to suspend the Safe Harbor agreement lies in the hands of the European Commission, but the Parliament’s affirmative vote heightens concerns that restrictive proposals could move forward, which would directly threaten U.S. business interests. Over 3,000 American companies, including Facebook and Google, currently rely on the Safe Harbor framework to process data from European citizens without violating the continent’s privacy laws.153 Yet both local and pan-European officials have become increasingly concerned that the Safe Harbor makes it easier for U.S. tech companies to sidestep the EU’s stricter privacy protections, especially in light of revelations about the companies’ compliance with the U.S. government under a number of the NSA programs. In June 2014, for example, the Irish courts referred a case to the European Court of Justice “questioning the adequacy of privacy protections for data transfers” under the Safe Harbor agreement.154 The Parliament’s resolution also calls for the European Parliament to withhold consent for the final Transatlantic Trade and Investment Partnership (TTIP) and suspend the Terrorist Finance Tracking Program (TFTP) until the U.S. makes various related concessions.155 Even though additional steps are still required before implementation, these actions are part of a meaningful shift in EU policy away from the previously favorable digital trade relationship it has enjoyed with the United States. The final agreement on the Data Protection Regulation and Directive is expected in 2015 as the European Parliament enters negotiations with the European Commission and the Council of Ministers (representing the member countries) over the final version of the legislation.156 The demands in the resolution on mass surveillance, which represent the opinion of the members of Parliament, would need to be actively taken up by the European Commission to move forward. Minister Reding has also publicly stated that she wants to see “the development of European clouds” which meet new, stricter European privacy standards, arguing that European governments can promote this “by making sure that data processed by them are only stored in clouds to which E.U. data protection laws and European jurisdiction applies.”157 In June 2014, she further asserted that “EU data protection law will apply to nonEuropean companies if they do business in our territory.”158 The challenge, of course, is that since U.S. law has traditionally given law enforcement and intelligence agencies a legal right to demand data from U.S. companies even if it is stored overseas, it creates a potentially significant contradiction with EU rules as well as with attempts by U.S. tech companies like Microsoft to reassure customers that their data is secure by offering the option to store that data outside the U.S. 41 Protectionism- Impact: China Integrating China into the global order is crucial to avoid great power wars during hegemonic transition. G. John Ikenberry ‘8 (“The Rise of China and the Future of the West Can the Liberal System Survive?,” Jan/feb., Foreign Affairs) The rise of China will undoubtedly be one of the great dramas of the twenty-first century. China's extraordinary economic growth and active diplomacy are already transforming East Asia, and future decades will see even greater increases in Chinese power and influence. But exactly how this drama will play out is an open question. Will China overthrow the existing order or become a part of it? And what, if anything, can the United States do to maintain its position as China rises? Some observers believe that the American era is coming to an end, as the Westernoriented world order is replaced by one increasingly dominated by the East. The historian Niall Ferguson has written that the bloody twentieth century witnessed "the descent of the West" and "a reorientation of the world" toward the East. Realists go on to note that as China gets more powerful and the United States' position erodes, two things are likely to happen: China will try to use its growing influence to reshape the rules and institutions of the international system to better serve its interests, and other states in the system -- especially the declining hegemon -- will start to see China as a growing security threat. The result of these developments, they predict, will be tension, distrust, and conflict, the typical features of a power transition. In this view, the drama of China's rise will feature an increasingly powerful China and a declining United States locked in an epic battle over the rules and leadership of the international system. And as the world's largest country emerges not from within but outside the established post-World War II international order, it is a drama that will end with the grand ascendance of China and the onset of an Asian-centered world order. That course, however, is not inevitable. The rise of China does not have to trigger a wrenching hegemonic transition. The U.S.-Chinese power transition can be very different from those of the past because China faces an international order that is fundamentally different from those that past rising states confronted. China does not just face the United States; it faces a Western-centered system that is open, integrated, and rule-based, with wide and deep political foundations. The nuclear revolution, meanwhile, has made war among great powers unlikely -- eliminating the major tool that rising powers have used to overturn international systems defended by declining hegemonic states. Today's Western order, in short, is hard to overturn and easy to join. This unusually durable and expansive order is itself the product of farsighted U.S. leadership. After World War II, the United States did not simply establish itself as the leading world power. It led in the creation of universal institutions that not only invited global membership but also brought democracies and market societies closer together. It built an order that facilitated the participation and integration of both established great powers and newly independent states. (It is often forgotten that this postwar order was designed in large part to reintegrate the defeated Axis states and the beleaguered Allied states into a unified international system.) Today, China can gain full access to and thrive within this system. And if it does, China will rise, but the Western order -- if managed properly -- will live on. As it faces an ascendant China, the United States should remember that its leadership of the Western order allows it to shape the environment in which China will make critical strategic choices. If it wants to preserve this leadership, Washington must work to strengthen the rules and institutions that underpin that order -- making it even easier to join and harder to overturn. U.S. grand strategy should be built around the motto "The road to the East runs through the West." It must sink the roots of this order as deeply as possible, giving China greater incentives for integration than for opposition and increasing the chances that the system will survive even after U.S. relative power has declined. The United States' "unipolar moment" will inevitably end. If the defining struggle of the twenty-first century is between China and the United States, China will have the advantage. If the defining struggle is between China and a revived Western system, the West will triumph. G. John Ikenberry ‘8 (“The Rise of China and the Future of the West Can the Liberal System Survive?,” Jan/feb., Foreign Affairs) 42 TRANSITIONAL ANXIETIES China is well on its way to becoming a formidable global power. The size of its economy has quadrupled since the launch of market reforms in the late 1970s and, by some estimates, will double again over the next decade. It has become one of the world's major manufacturing centers and consumes roughly a third of the global supply of iron, steel, and coal. It has accumulated massive foreign reserves, worth more than $1 trillion at the end of 2006. China's military spending has increased at an inflation-adjusted rate of over 18 percent a year, and its diplomacy has extended its reach not just in Asia but also in Africa, Latin America, and the Middle East. Indeed, whereas the Soviet Union rivaled the United States as a military competitor only, China is emerging as both a military and an economic rival -- heralding a profound shift in the distribution of global power. Power transitions are a recurring problem in international relations. As scholars such as Paul Kennedy and Robert Gilpin have described it, world politics has been marked by a succession of powerful states rising up to organize the international system. A powerful state can create and enforce the rules and institutions of a stable global order in which to pursue its interests and security. But nothing lasts forever: long-term changes in the distribution of power give rise to new challenger states, who set off a struggle over the terms of that international order. Rising states want to translate their newly acquired power into greater authority in the global system -- to reshape the rules and institutions in accordance with their own interests. Declining states, in turn, fear their loss of control and worry about the security implications of their weakened position. These moments are fraught with danger. When a state occupies a commanding position in the international system, neither it nor weaker states have an incentive to change the existing order. But when the power of a challenger state grows and the power of the leading state weakens, a strategic rivalry ensues, and conflict -- perhaps leading to war -- becomes likely. The danger of power transitions is captured most dramatically in the case of late-nineteenth-century Germany. In 1870, the United Kingdom had a three-to-one advantage in economic power over Germany and a significant military advantage as well; by 1903, Germany had pulled ahead in terms of both economic and military power. As Germany unified and grew, so, too, did its dissatisfactions and demands, and as it grew more powerful, it increasingly appeared as a threat to other great powers in Europe, and security competition began. In the strategic realignments that followed, France, Russia, and the United Kingdom, formerly enemies, banded together to confront an emerging Germany. The result was a European war. Many observers see this dynamic emerging in U.S.-Chinese relations. "If China continues its impressive economic growth over the next few decades," the realist scholar John Mearsheimer has written, "the United States and China are likely to engage in an intense security competition with considerable potential for war." But not all power transitions generate war or overturn the old order. In the early decades of the twentieth century, the United Kingdom ceded authority to the United States without great conflict or even a rupture in relations. From the late 1940s to the early 1990s, Japan's economy grew from the equivalent of five percent of U.S. GDP to the equivalent of over 60 percent of U.S. GDP, and yet Japan never challenged the existing international order. Clearly, there are different types of power transitions. Some states have seen their economic and geopolitical power grow dramatically and have still accommodated themselves to the existing order. Others have risen up and sought to change it. Some power transitions have led to the breakdown of the old order and the establishment of a new international hierarchy. Others have brought about only limited adjustments in the regional and global system. A variety of factors determine the way in which power transitions unfold. The nature of the rising state's regime and the degree of its dissatisfaction with the old order are critical: at the end of the nineteenth century, the United States, a liberal country an ocean away from Europe, was better able to embrace the British-centered international order than Germany was. But even more decisive is the 43 character of the international order itself -- for it is the nature of the international order that shapes a rising state's choice between challenging that order and integrating into it. G. John Ikenberry ‘8 (“The Rise of China and the Future of the West Can the Liberal System Survive?,” Jan/feb., Foreign Affairs) OPEN ORDER The postwar Western order is historically unique. Any international order dominated by a powerful state is based on a mix of coercion and consent, but the U.S.-led order is distinctive in that it has been more liberal than imperial -- and so unusually accessible, legitimate, and durable. Its rules and institutions are rooted in, and thus reinforced by, the evolving global forces of democracy and capitalism. It is expansive, with a wide and widening array of participants and stakeholders. It is capable of generating tremendous economic growth and power while also signaling restraint -- all of which make it hard to overturn and easy to join. It was the explicit intention of the Western order's architects in the 1940s to make that order integrative and expansive. Before the Cold War split the world into competing camps, Franklin Roosevelt sought to create a one-world system managed by cooperative great powers that would rebuild war-ravaged Europe, integrate the defeated states, and establish mechanisms for security cooperation and expansive economic growth. In fact, it was Roosevelt who urged -- over the opposition of Winston Churchill -- that China be included as a permanent member of the UN Security Council. The then Australian ambassador to the United States wrote in his diary after his first meeting with Roosevelt during the war, "He said that he had numerous discussions with Winston about China and that he felt that Winston was 40 years behind the times on China and he continually referred to the Chinese as 'Chinks' and 'Chinamen' and he felt that this was very dangerous. He wanted to keep China as a friend because in 40 or 50 years' time China might easily become a very powerful military nation." Over the next half century, the United States used the system of rules and institutions it had built to good effect. West Germany was bound to its democratic Western European neighbors through the European Coal and Steel Community (and, later, the European Community) and to the United States through the Atlantic security pact; Japan was bound to the United States through an alliance partnership and expanding economic ties. The Bretton Woods meeting in 1944 laid down the monetary and trade rules that facilitated the opening and subsequent flourishing of the world economy -- an astonishing achievement given the ravages of war and the competing interests of the great powers. Additional agreements between the United States, Western Europe, and Japan solidified the open and multilateral character of the postwar world economy. After the onset of the Cold War, the Marshall Plan in Europe and the 1951 security pact between the United States and Japan further integrated the defeated Axis powers into the Western order. In the final days of the Cold War, this system once again proved remarkably successful. As the Soviet Union declined, the Western order offered a set of rules and institutions that provided Soviet leaders with both reassurances and points of access -- effectively encouraging them to become a part of the system. Moreover, the shared leadership of the order ensured accommodation of the Soviet Union. As the Reagan administration pursued a hard-line policy toward Moscow, the Europeans pursued détente and engagement. For every hard-line "push," there was a moderating "pull," allowing Mikhail Gorbachev to pursue high-risk reforms. On the eve of German unification, the fact that a united Germany would be embedded in European and Atlantic institutions -rather than becoming an independent great power -- helped reassure Gorbachev that neither German nor Western intentions were hostile. After the Cold War, the Western order once again managed the 44 integration of a new wave of countries, this time from the formerly communist world. Three particular features of the Western order have been critical to this success and longevity. First, unlike the imperial systems of the past, the Western order is built around rules and norms of nondiscrimination and market openness, creating conditions for rising states to advance their expanding economic and political goals within it. Across history, international orders have varied widely in terms of whether the material benefits that are generated accrue disproportionately to the leading state or are widely shared. In the Western system, the barriers to economic participation are low, and the potential benefits are high. China has already discovered the massive economic returns that are possible by operating within this open-market system. Second is the coalition-based character of its leadership. Past orders have tended to be dominated by one state. The stakeholders of the current Western order include a coalition of powers arrayed around the United States -- an important distinction. These leading states, most of them advanced liberal democracies, do not always agree, but they are engaged in a continuous process of give-and-take over economics, politics, and security. Power transitions are typically seen as being played out between two countries, a rising state and a declining hegemon, and the order falls as soon as the power balance shifts. But in the current order, the larger aggregation of democratic capitalist states -and the resulting accumulation of geopolitical power -- shifts the balance in the order's favor. Third, the postwar Western order has an unusually dense, encompassing, and broadly endorsed system of rules and institutions. Whatever its shortcomings, it is more open and rule-based than any previous order. State sovereignty and the rule of law are not just norms enshrined in the United Nations Charter. They are part of the deep operating logic of the order. To be sure, these norms are evolving, and the United States itself has historically been ambivalent about binding itself to international law and institutions -and at no time more so than today. But the overall system is dense with multilateral rules and institutions -- global and regional, economic, political, and security-related. These represent one of the great breakthroughs of the postwar era. They have laid the basis for unprecedented levels of cooperation and shared authority over the global system. The incentives these features create for China to integrate into the liberal international order are reinforced by the changed nature of the international economic environment -- especially the new interdependence driven by technology. The most farsighted Chinese leaders understand that globalization has changed the game and that China accordingly needs strong, prosperous partners around the world. From the United States' perspective, a healthy Chinese economy is vital to the United States and the rest of the world. Technology and the global economic revolution have created a logic of economic relations that is different from the past -making the political and institutional logic of the current order all the more powerful. G. John Ikenberry ‘8 (“The Rise of China and the Future of the West Can the Liberal System Survive?,” Jan/feb., Foreign Affairs) ACCOMMODATING THE RISE The most important benefit of these features today is that they give the Western order a remarkable capacity to accommodate rising powers. New entrants into the system have ways of gaining status and authority and opportunities to play a role in governing the order. The fact that the United States, China, and other great powers have nuclear weapons also limits the ability of a rising power to overturn the existing order. In the age of nuclear deterrence, great-power war is, thankfully, no longer a mechanism of historical change. War-driven change has been abolished as a historical process. The Western order's strong framework of rules and institutions is already starting to 45 facilitate Chinese integration. At first, China embraced certain rules and institutions for defensive purposes: protecting its sovereignty and economic interests while seeking to reassure other states of its peaceful intentions by getting involved in regional and global groupings. But as the scholar Marc Lanteigne argues, "What separates China from other states, and indeed previous global powers, is that not only is it 'growing up' within a milieu of international institutions far more developed than ever before, but more importantly, it is doing so while making active use of these institutions to promote the country's development of global power status." China, in short, is increasingly working within, rather than outside of, the Western order. China is already a permanent member of the UN Security Council, a legacy of Roosevelt's determination to build the universal body around diverse great-power leadership. This gives China the same authority and advantages of "great-power exceptionalism" as the other permanent members. The existing global trading system is also valuable to China, and increasingly so. Chinese economic interests are quite congruent with the current global economic system -- a system that is open and loosely institutionalized and that China has enthusiastically embraced and thrived in. State power today is ultimately based on sustained economic growth, and China is well aware that no major state can modernize without integrating into the globalized capitalist system; if a country wants to be a world power, it has no choice but to join the World Trade Organization (WTO). The road to global power, in effect, runs through the Western order and its multilateral economic institutions. China not only needs continued access to the global capitalist system; it also wants the protections that the system's rules and institutions provide. The WTO's multilateral trade principles and dispute-settlement mechanisms, for example, offer China tools to defend against the threats of discrimination and protectionism that rising economic powers often confront. The evolution of China's policy suggests that Chinese leaders recognize these advantages: as Beijing's growing commitment to economic liberalization has increased the foreign investment and trade China has enjoyed, so has Beijing increasingly embraced global trade rules. It is possible that as China comes to champion the WTO, the support of the more mature Western economies for the WTO will wane. But it is more likely that both the rising and the declining countries will find value in the quasi-legal mechanisms that allow conflicts to be settled or at least diffused. The existing international economic institutions also offer opportunities for new powers to rise up through their hierarchies. In the International Monetary Fund and the World Bank, governance is based on economic shares, which growing countries can translate into greater institutional voice. To be sure, the process of adjustment has been slow. The United States and Europe still dominate the IMF. Washington has a 17 percent voting share (down from 30 percent) -- a controlling amount, because 85 percent approval is needed for action -- and the European Union has a major say in the appointment of ten of the 24 members of the board. But there are growing pressures, notably the need for resources and the need to maintain relevance, that will likely persuade the Western states to admit China into the inner circle of these economic governance institutions. The IMF's existing shareholders, for example, see a bigger role for rising developing countries as necessary to renew the institution and get it through its current crisis of mission. At the IMF's meeting in Singapore in September 2006, they agreed on reforms that will give China, Mexico, South Korea, and Turkey a greater voice. As China sheds its status as a developing country (and therefore as a client of these institutions), it will increasingly be able to act as a patron and stakeholder instead. Leadership in these organizations is not simply a reflection of economic size (the United States has retained its voting share in the IMF even as its economic weight has declined); nonetheless, incremental advancement within them will create important opportunities for China. 46 G. John Ikenberry ‘8 (“The Rise of China and the Future of the West Can the Liberal System Survive?,” Jan/feb., Foreign Affairs) POWER SHIFT AND PEACEFUL CHANGE Seen in this light, the rise of China need not lead to a volcanic struggle with the United States over global rules and leadership. The Western order has the potential to turn the coming power shift into a peaceful change on terms favorable to the United States. But that will only happen if the United States sets about strengthening the existing order. Today, with Washington preoccupied with terrorism and war in the Middle East, rebuilding Western rules and institutions might to some seem to be of only marginal relevance. Many Bush administration officials have been outright hostile to the multilateral, rule-based system that the United States has shaped and led. Such hostility is foolish and dangerous. China will become powerful: it is already on the rise, and the United States' most powerful strategic weapon is the ability to decide what sort of international order will be in place to receive it. The United States must reinvest in the Western order, reinforcing the features of that order that encourage engagement, integration, and restraint. The more this order binds together capitalist democratic states in deeply rooted institutions; the more open, consensual, and rule-based it is; and the more widely spread its benefits, the more likely it will be that rising powers can and will secure their interests through integration and accommodation rather than through war. And if the Western system offers rules and institutions that benefit the full range of states -- rising and falling, weak and strong, emerging and mature -- its dominance as an international order is all but certain. The first thing the United States must do is reestablish itself as the foremost supporter of the global system of governance that underpins the Western order. Doing so will first of all facilitate the kind of collective problem solving that makes all countries better off. At the same time, when other countries see the United States using its power to strengthen existing rules and institutions, that power is rendered more legitimate -and U.S. authority is strengthened. Countries within the West become more inclined to work with, rather than resist, U.S. power, which reinforces the centrality and dominance of the West itself. Renewing Western rules and institutions will require, among other things, updating the old bargains that underpinned key postwar security pacts. The strategic understanding behind both NATO and Washington's East Asian alliances is that the United States will work with its allies to provide security and bring them in on decisions over the use of force, and U.S. allies, in return, will operate within the U.S.-led Western order. Security cooperation in the West remains extensive today, but with the main security threats less obvious than they were during the Cold War, the purposes and responsibilities of these alliances are under dispute. Accordingly, the United States needs to reaffirm the political value of these alliances -- recognizing that they are part of a wider Western institutional architecture that allows states to do business with one another. The United States should also renew its support for wideranging multilateral institutions. On the economic front, this would include building on the agreements and architecture of the WTO, including pursuing efforts to conclude the current Doha Round of trade talks, which seeks to extend market opportunities and trade liberalization to developing countries. The WTO is at a critical stage. The basic standard of nondiscrimination is at risk thanks to the proliferation of bilateral and regional trade agreements. Meanwhile, there are growing doubts over whether the WTO can in fact carry out trade liberalization, particularly in agriculture, that benefits developing countries. These issues may seem narrow, but the fundamental character of the liberal international order -- its commitment to universal rules of openness that spread gains widely -- is at stake. Similar doubts haunt a host of other multilateral agreements -- on global warming and nuclear nonproliferation, among others 47 - and they thus also demand renewed U.S. leadership. The strategy here is not simply to ensure that the Western order is open and rule-based. It is also to make sure that the order does not fragment into an array of bilateral and "minilateral" arrangements, causing the United States to find itself tied to only a few key states in various regions. Under such a scenario, China would have an opportunity to build its own set of bilateral and "minilateral" pacts. As a result, the world would be broken into competing U.S. and Chinese spheres. The more security and economic relations are multilateral and all-encompassing, the more the global system retains its coherence. In addition to maintaining the openness and durability of the order, the United States must redouble its efforts to integrate rising developing countries into key global institutions. Bringing emerging countries into the governance of the international order will give it new life. The United States and Europe must find room at the table not only for China but also for countries such as Brazil, India, and South Africa. A Goldman Sachs report on the so-called BRICs (Brazil, Russia, India, and China) noted that by 2050 these countries' economies could together be larger than those of the original G-6 countries (Germany, France, Italy, Japan, the United Kingdom, and the United States) combined. Each international institution presents its own challenges. The UN Security Council is perhaps the hardest to deal with, but its reform would also bring the greatest returns. Less formal bodies -- the so-called G-20 and various other intergovernmental networks -- can provide alternative avenues for voice and representation. G. John Ikenberry ‘8 (“The Rise of China and the Future of the West Can the Liberal System Survive?,” Jan/feb., Foreign Affairs) THE TRIUMPH OF THE LIBERAL ORDER The key thing for U.S. leaders to remember is that it may be possible for China to overtake the United States alone, but it is much less likely that China will ever manage to overtake the Western order. In terms of economic weight, for example, China will surpass the United States as the largest state in the global system sometime around 2020. (Because of its population, China needs a level of productivity only one-fifth that of the United States to become the world's biggest economy.) But when the economic capacity of the Western system as a whole is considered, China's economic advances look much less significant; the Chinese economy will be much smaller than the combined economies of the Organization for Economic Cooperation and Development far into the future. This is even truer of military might: China cannot hope to come anywhere close to total OECD military expenditures anytime soon. The capitalist democratic world is a powerful constituency for the preservation -- and, indeed, extension -- of the existing international order. If China intends to rise up and challenge the existing order, it has a much more daunting task than simply confronting the United States. The "unipolar moment" will eventually pass. U.S. dominance will eventually end. U.S. grand strategy, accordingly, should be driven by one key question: What kind of international order would the United States like to see in place when it is less powerful? This might be called the neo-Rawlsian question of the current era. The political philosopher John Rawls argued that political institutions should be conceived behind a "veil of ignorance" -- that is, the architects should design institutions as if they do not know precisely where they will be within a socioeconomic system. The result would be a system that safeguards a person's interests regardless of whether he is rich or poor, weak or strong. The United States needs to take that approach to its leadership of the international order today. It must put in place institutions and fortify rules that will safeguard its 48 interests regardless of where exactly in the hierarchy it is or how exactly power is distributed in 10, 50, or 100 years. Fortunately, such an order is in place already. The task now is to make it so expansive and so institutionalized that China has no choice but to become a full-fledged member of it. The United States cannot thwart China's rise, but it can help ensure that China's power is exercised within the rules and institutions that the United States and its partners have crafted over the last century, rules and institutions that can protect the interests of all states in the more crowded world of the future. The United States' global position may be weakening, but the international system the United States leads can remain the dominant order of the twenty-first century. 49 Protectionism- Impact: War Protectionism causes war. Adorney 13 (Quoting Patrick J. McDonald: Fellow at CHB Center for International Politics at the University of Pennsylvania, Senior researcher in economic causes of war and peace, Professor of international relations, international political economy, and international security at the University of Texas. Julian Adorney, economic historian, “Want Peace? Promote Free Trade,” October 15th, http://www.fee.org/the_freeman/detail/want-peace-promote-free-trade) Frédéric Bastiat famously claimed that “if goods don’t cross borders, soldiers will." Bastiat argued that free trade between countries could reduce international conflict because trade forges connections between nations and gives each country an incentive to avoid war with its trading partners. If every nation were an economic island, the lack of positive interaction created by trade could leave more room for conflict. Two hundred years after Bastiat, libertarians take this idea as gospel. Unfortunately, not everyone does. But as recent research shows, the historical evidence confirms Bastiat’s famous claim. To Trade or to Raid In “Peace through Trade or Free Trade?” professor Patrick J. McDonald, from the University of Texas at Austin, empirically tested whether greater levels of protectionism in a country (tariffs, quotas, etc.) would increase the probability of international conflict in that nation. He used a tool called dyads to analyze every country’s international relations from 1960 until 2000. A dyad is the interaction between one country and another country: German and French relations would be one dyad, German and Russian relations would be a second, French and Australian relations would be a third. He further broke this down into dyad-years; the relations between Germany and France in 1965 would be one dyad-year, the relations between France and Australia in 1973 would be a second, and so on. Using these dyad-years, McDonald analyzed the behavior of every country in the world for the past 40 years. His analysis showed a negative correlation between free trade and conflict: The more freely a country trades, the fewer wars it engages in. Countries that engage in free trade are less likely to invade and less likely to be invaded. The Causal Arrow Of course, this finding might be a matter of confusing correlation for causation. Maybe countries engaging in free trade fight less often for some other reason, like the fact that they tend also to be more democratic. Democratic countries make war less often than empires do. But McDonald controls for these variables. Controlling for a state’s political structure is important, because democracies and republics tend to fight less than authoritarian regimes. McDonald also controlled for a country’s economic growth, because countries in a recession are more likely to go to war than those in a boom, often in order to distract their people from their economic woes. McDonald even controlled for factors like geographic proximity: It’s easier for Germany and France to fight each other than it is for the United States and China, because troops in the former group only have to cross a shared border. The takeaway from McDonald’s analysis is that protectionism can actually lead to conflict. McDonald found that a country in the bottom 10 percent for protectionism (meaning it is less protectionist than 90 percent of other countries) is 70 percent less likely to engage in a new conflict (either as invader or as target) than one in the top 10 percent for protectionism. Protectionism and War Why does protectionism lead to conflict, and why does free trade help to prevent it? The answers, though well-known to classical liberals, are worth mentioning. First, trade creates international goodwill. If Chinese and American businessmen trade of goods also on a regular basis, both sides benefit. And mutual benefit disposes people to look for the good in each other. Exchange promotes an exchange of cultures. For decades, Americans saw China as a mysterious country with strange, even hostile values. But in the 21st century, trade between our nations has increased markedly, and both countries know each other a little better now. iPodwielding Chinese teenagers are like American teenagers, for example. They’re not terribly mysterious. Likewise, the Chinese understand democracy and American consumerism more than they once did. The countries may not find overlap in all of each other’s values, but trade has helped us to at least understand each other. Trade helps to humanize the people that you trade with. And it’s tougher to want to go to war with your human trading partners than with a country you see only as lines on a map. Second, trade gives nations an economic incentive to avoid war. If Nation X sells its best steel to Nation Y, and its businessmen reap plenty of profits in exchange, then businessmen on both sides are going to oppose war. This was actually the case with Germany and France right before World War I. Germany sold steel to France, and German businessmen were firmly opposed to war. They only grudgingly came to support it when German ministers told them that the war would only last a few short months. German steel had a strong incentive to oppose war, and if the situation had progressed a little differently—or if the German government had been a little more realistic about the timeline of the war—that incentive might have kept Germany out of World War I. Third, protectionism promotes hostility. This is why free trade, not just aggregate trade (which could be accompanied by high tariffs and quotas), leads to peace. If the (US) United States imposes a tariff on Japanese automobiles, that tariff hurts Japanese businesses. It creates hostility in Japan toward the (US) United States. Japan might even retaliate with a tariff on U.S. steel, hurting U.S. steel makers and angering our government, which would retaliate with another tariff. Both countries now have an excuse to leverage nationalist feelings to gain support at home; that makes outright war 50 with the other country an easier sell, should it come to that. In socioeconomic academic circles, this is called the Richardson process of reciprocal and increasing hostilities; the United States harms Japan, which retaliates, causing the United States to retaliate again. History shows that the Richardson process can easily be applied to protectionism. For instance, in the 1930s, industrialized nations raised tariffs and trade barriers; countries eschewed multilateralism and turned inward. These decisions led to rising hostilities, which helped set World War II in motion. These factors help explain why free trade leads to peace, and protectionism leads to more conflict. 51 Protectionism- Impact: Trade Solves War Trade empirically solves war and poverty. Daniel Griswold ’10 (director of the Center for Trade Policy Studies at the Cato Institute, “Why Populists Are Wrong About Impact of Free Trade,” Naples Daily News on January 5) Tune in to cable TV, talk radio or the blogosphere in Florida and you will soon be hit over the head with the message that free trade is destroying America. According to the economic populists on the left and right, imports and outsourcing threaten the wages, jobs and futures of Main Street Americans. On trade, as on so much else, the populists have it wrong again. Free trade and globalization are great blessings to families in Naples and across America. Trade is delivering lower prices and more variety to consumers while creating better-paying jobs for the middle class. Beyond our shores, the spread of economic openness is building a more peaceful, democratic and humane world for our children. Now may seem an odd moment to tout the benefits of trade. After all, unemployment is 10 percent and housing and manufacturing remain in a slump. The great recession of 2008-09 was not caused by trade, however, but by misguided monetary and housing policies that were “Made in the USA.” “ On trade, as on so much else, the populists have it wrong again.” During difficult economic times, import competition allows more American families to keep their heads above water by delivering lower prices on staples such as food, clothing and shoes. The prices we pay for goods exposed to global trade tend to rise more slowly than inflation or even fall. The imported fresh fruit and vegetables, T-shirts and discounted sneakers sold at big-box retailers are especially important in the budgets of poor and middle-class families. Trade benefits producers by allowing Americans to sell our goods and services in growing markets abroad. Florida companies have been especially successful exporting to Brazil, Mexico and the rest of Latin America. Florida ranks fifth among states in total value of exports, with small and medium-sized companies accounting for almost two-thirds of state exports. For Americans worried about their jobs, it is a big lie that we have been surrendering middle-class manufacturing jobs for low-paying service jobs. In fact, since 1991, two-thirds of the net new jobs created in the U.S. economy have been in sectors such as health care, education and business and professional services where the average pay is higher than in manufacturing. Knock on doors in a typical middle-class neighborhood in southern Florida and you will meet teachers, managers, engineers, computer specialists, truck drivers, accountants, insurance and real-estate agents, registered nurses and other healthcare professionals and self-employed business owners. These are the occupations that now form the backbone of the American middle class. Beyond American shores, the past three decades of expanding trade and globalization have witnessed dramatic global progress. Between 1981 and 2005, the share of the world’s population living on the equivalent of $1.25 a day dropped by half, from 52 to 25 percent, according to the World Bank. During this same period, real gains have been made in life expectancy, infant survival, nutrition and literacy. The most dramatic gains against poverty have occurred in those countries, such as China and Chile, that have most aggressively opened themselves to the global economy. As a global middle class has emerged, so too have more democratic forms of government. Trade has spread tools of communication and spurred the growth of civil society as an alternative to authoritarian government. As a result, the share of the world’s population living in countries that respect civil liberties and the right to vote has climbed from 35 percent in 1973 to 46 percent today, according to Freedom House. Fewer people are dying in wars today than in past decades, in large part because commerce has replaced military competition. Global commerce has allowed nations to gain access to resources through trade rather than conquest, while deeper economic integration has brought former enemies together and raised the cost of war. Even with the ongoing conflicts in Iraq and Afghanistan, young American adults living today are far less likely to fight and die in wars than their counterparts in the 1940s, ’50s and ’60s. America and the world face daunting tasks today, as in generations past, but expanding trade is part of the solution, not part of the problem. Americans should have the same warm feelings toward free trade and globalization as they do toward iPods, e-mail, online shopping, a well-fed child going off to school and peace on Earth. 52 Leadership 2AC 1/ Advantage- Leadership: A. Data credibility key to US economic security. This allows peaceful resolution of international conflicts. Laura K. Donohue ’15 (Georgetown University Law Center, “High Technology, Consumer Privacy, and U.S. National Security,” http://scholarship.law.georgetown.edu/facpub/1457 ) The United States went on to emphasize its dealings with Asia and to sign an historic trade agreement with Japan.97 Expansionism, and the economic benefits it brought, similarly proved central to U.S. national security. “Should [new possessions] be obtained,” Pierce asserted during his Inaugural Address, “it will be through no grasping spirit, but with a view to obvious national interest and security, and in a manner entirely consistent with the strictest observance of national faith.” From the 1898 Spanish-American War forward, the country promoted its national interests through formative political, military, and economic engagement in the international arena. To the extent that the NSA programs, and public knowledge of them, has harmed the U.S. economy, they have harmed U.S. national security. The country’s economic strength is part of what enables the United States to respond to external and internal threats. The ability to defend the country against would-be aggressors requires resources—e.g., to build and equip a military force, to move troops, to respond to attacks in whatever form they may materialize. Many of the supplies needed to fend off overreaching by either states or non-state actors derive not from government production, but from the private sector. To the extent that a weak private sector emerges, the government’s ability to respond is harmed. Beyond this, economic security allows the country the freedom to determine its international and domestic policies on the merits, not on need. Where the United States is in a strong economic position, it is less vulnerable in international negotiations, such as those related to trade. It is also in a politically superior position, where it can use its wealth to accomplish the desired ends. A strong economy also ensures that citizens have their needs met, with sufficient income levels for housing, food, clothing, and education. This, in turn, generates social and political stability, which allows for the development of communities, which creates greater cohesion among citizens. It also contributes to the evolution of democratic deliberations, reinforcing the rule of law. Economic security allows for growth and innovation, which is fed by education and opportunity. Innovation, in turn, allows the country to continue to adapt to the evolving environment and international context. There are further considerations. But these suffice to illustrate the importance of economic strength to U.S. national security writ large. 53 Leadership 2AC 2/ B. NSA programs spill-over to destroy US influence and support from allies. Danielle Kehl ’14 (with Kevin Bankston, Robyn Greene & Robert Morgus, analysts at New America’s Open Technology Institute, “Surveillance Costs: The NSA’s Impact on the Economy, Internet Freedom & Cybersecurity,” July, https://static.newamerica.org/attachments/534-surveillance-costs-the-nsasimpact-on-the-economy-internet-freedom-cybersecurity/Surveilance_Costs_Final.pdf) Beyond Internet Freedom, the NSA disclosures “have badly undermined U.S. credibility with many of its allies,” Ian Bremmer argued in Foreign Policy in November 2013.214 Similarly, as Georg Mascolo and Ben Scott point out about the post-Snowden world, “the shift from an open secret to a published secret is a game changer… it exposes the gap between what governments will tolerate from one another under cover of darkness and what publics will tolerate from other governments in the light of day.”215 From stifled negotiations with close allies like France and Germany to more tense relations with emerging powers including Brazil and China, the leaks have undoubtedly weakened the American position in international relations, opening up the United States to new criticism and political maneuvering that would have been far less likely a year ago.216 U.S. allies like France, Israel, and Germany are upset by the NSA’s actions, as their reactions to the disclosures make clear.217 Early reports about close allies threatening to walk out of negotiations with the United States—such as calls by the French government to delay EU-U.S. trade talks in July 2013 until the U.S. government answered European questions about the spying allegations218—appear to be exaggerated, but there has certainly been fallout from the disclosures. For months after the first Snowden leaks, German Chancellor Angela Merkel would not visit the United States until the two countries signed a “nospy” agreement—a document essentially requiring the NSA to respect German law and rights of German citizens in its activities. When Merkel finally agreed come to Washington, D.C. in May 2014, tensions rose quickly because the two countries were unable to reach an agreement on intelligence sharing, despite the outrage provoked by news that the NSA had monitored Merkel’s own communications.219 Even as Obama and Merkel attempted to present a unified front while they threatened additional sanctions against Russia over the crisis in the Ukraine, it was evident that relations are still strained between the two countries. While President Obama tried to keep up the appearance of cordial relations at a joint press conference, Merkel suggested that it was too soon to return to “business as usual” when tensions still remain over U.S. spying allegations.220 The Guardian called the visit “frosty” and “awkward.”221 The German Parliament has also begun hearings to investigate the revelations and suggested that it is weighing further action against the United States.222 Moreover, the disclosures have weakened the United States’ relationship with emerging powers like Brazil, where the fallout from NSA surveillance threatens to do more lasting damage. Brazilian President Dilma Rousseff has seized on the NSA disclosures as an opportunity to broaden Brazil’s influence not only in the Internet governance field, but also on a broader range of geopolitical issues. Her decision not to attend an October 2013 meeting with President Barack Obama at the White House was a direct response to NSA spying—and a serious, highprofile snub. In addition to cancelling what would have been the first state visit by a Brazilian president to the White House in nearly 20 years, Rousseff’s decision marked the first time a world leader had turned down a state dinner with the President of the United States.223 In his statement on the postponement, President Obama was forced to address the issue of NSA surveillance directly, acknowledging “that he understands and regrets the concerns disclosures of alleged U.S. intelligence activities have generated in Brazil and made clear that he is committed to working together with President Rousseff and her government in diplomatic channels to move beyond this issue as a source of tension in our bilateral relationship.”224 Many observers have noted that the Internet Freedom agenda could be one of the first casualties of the NSA disclosures. The U.S. government is fighting an uphill battle at the moment to regain credibility in international Internet governance debates and to defend its moral high ground as a critic of authoritarian regimes that limit freedom of expression and violate human rights online. Moreover, the fallout from the NSA’s surveillance activities has spilled over into other areas of U.S. foreign policy and currently threatens bilateral relations with a number of key allies. Going forward, it is critical that decisions about U.S. spying are made in consideration of a broader set of interests so that they do not impede—or, in some cases, completely undermine—U.S. foreign policy goals. 54 Leadership 2AC 3/ C. Robust Leadership is crucial to avoid competitive balancing and escalation. Brooks, Ikenberry, and Wohlforth ’13 (Stephen, Associate Professor of Government at Dartmouth College, John Ikenberry is the Albert G. Milbank Professor of Politics and International Affairs at Princeton University in the Department of Politics and the Woodrow Wilson School of Public and International Affairs, William C. Wohlforth is the Daniel Webster Professor in the Department of Government at Dartmouth College “Don’t Come Home America: The Case Against Retrenchment,” International Security, Vol. 37, No. 3 (Winter 2012/13), pp. 7–51) A core premise of deep engagement is that it prevents the emergence of a far more dangerous global security environment. For one thing, as noted above, the United States’ overseas presence gives it the leverage to restrain partners from taking provocative action. Perhaps more important, its core alliance commitments also deter states with aspirations to regional hegemony from contemplating expansion and make its partners more secure, reducing their incentive to adopt solutions to their security problems that threaten others and thus stoke security dilemmas. The contention that engaged U.S. power dampens the baleful effects of anarchy is consistent with influential variants of realist theory. Indeed, arguably the scariest portrayal of the war-prone world that would emerge absent the “American Pacifier” is provided in the works of John Mearsheimer, who forecasts dangerous multipolar regions replete with security competition, arms races, nuclear proliferation and associated preventive war temptations, regional rivalries, and even runs at regional hegemony and full-scale great power war. 72 How do retrenchment advocates, the bulk of whom are realists, discount this benefit? Their arguments are complicated, but two capture most of the variation: (1) U.S. security guarantees are not necessary to prevent dangerous rivalries and conflict in Eurasia; or (2) prevention of rivalry and conflict in Eurasia is not a U.S. interest. Each response is connected to a different theory or set of theories, which makes sense given that the whole debate hinges on a complex future counterfactual (what would happen to Eurasia’s security setting if the United States truly disengaged?). Although a certain answer is impossible, each of these responses is nonetheless a weaker argument for retrenchment than advocates acknowledge. The first response flows from defensive realism as well as other international relations theories that discount the conflict-generating potential of anarchy under contemporary conditions. 73 Defensive realists maintain that the high expected costs of territorial conquest, defense dominance, and an array of policies and practices that can be used credibly to signal benign intent, mean that Eurasia’s major states could manage regional multipolarity peacefully without the American pacifier. Retrenchment would be a bet on this scholarship, particularly in regions where the kinds of stabilizers that nonrealist theories point to—such as democratic governance or dense institutional linkages—are either absent or weakly present. There are three other major bodies of scholarship, however, that might give decisionmakers pause before making this bet. First is regional expertise. Needless to say, there is no consensus on the net security effects of U.S. withdrawal. Regarding each region, there are optimists and pessimists. Few experts expect a return of intense great power competition in a post-American Europe, but many doubt European governments will pay the political costs of increased EU defense cooperation and the budgetary costs of increasing military outlays. 74 The result might be a Europe that is incapable of securing itself from various threats that could be destabilizing within the region and beyond (e.g., a regional conflict akin to the 1990s Balkan wars), lacks capacity for global security missions in which U.S. leaders might want European participation, and is vulnerable to the influence of outside rising powers. What about the other parts of Eurasia where the United States has a substantial military presence? Regarding the Middle East, the balance begins to swing toward pessimists concerned that states currently backed by Washington— notably Israel, Egypt, and Saudi Arabia—might take actions upon U.S. retrenchment that would intensify security dilemmas. And concerning East Asia, pessimism regarding the region’s prospects without the American pacifier is pronounced. Arguably the principal concern expressed by area experts is that Japan and South Korea are likely to obtain a nuclear capacity and increase their military commitments, which could stoke a destabilizing reaction from China. It is notable that during the Cold War, both South Korea and Taiwan moved to obtain a nuclear weapons capacity and were only constrained from doing so by a stillengaged United States. 75 The second body of scholarship casting doubt on the bet on defensive realism’s sanguine portrayal is all of the research that undermines its conception of state preferences. Defensive realism’s optimism about what would happen if the United States retrenched is very much dependent on its particular—and highly restrictive—assumption about state preferences; once we relax this assumption, then much of its basis for optimism vanishes. Specifically, the prediction of post-American tranquility throughout Eurasia rests on the assumption that security is the only relevant state preference, with security defined narrowly in terms of protection from violent external attacks on the homeland. Under that assumption, the security problem is largely solved as soon as offense and defense are clearly distinguishable, and offense is extremely expensive relative to defense. Burgeoning research across the social and other sciences, however, undermines that core assumption: states have preferences not only for security but also for prestige, status, and other aims, and they engage in trade-offs among the various objectives. 76 In addition, they define security not just in terms of territorial protection but in view of many and varied milieu goals. It follows that even states that are relatively secure may nevertheless engage in highly competitive behavior. Empirical 55 studies show that this is indeed sometimes the case. 77 In sum, a bet on a benign postretrenchment Eurasia is a bet that leaders of major countries will never allow these nonsecurity preferences to influence their strategic choices. To the degree that these bodies of scholarly knowledge have predictive leverage, U.S. retrenchment would result in a significant deterioration in the security environment in at least some of the world’s key regions. We have already mentioned the third, even more alarming body of scholarship. Offensive realism predicts that the withdrawal of the American pacifier will yield either a competitive regional multipolarity complete with associated insecurity, arms racing, crisis instability, nuclear proliferation, and the like, or bids for regional hegemony, which may be beyond the capacity of local great powers to contain (and which in any case would generate intensely competitive behavior, possibly including regional great power war). Hence it is unsurprising that retrenchment advocates are prone to focus on the second argument noted above: that avoiding wars and security dilemmas in the world’s core regions is not a U.S. national interest. Few doubt that the United States could survive the return of insecurity and conflict among Eurasian powers, but at what cost? Much of the work in this area has focused on the economic externalities of a renewed threat of insecurity and war, which we discuss below. Focusing on the pure security ramifications, there are two main reasons why decisionmakers may be rationally reluctant to run the retrenchment experiment. First, overall higher levels of conflict make the world a more dangerous place. Were Eurasia to return to higher levels of interstate military competition, one would see overall higher levels of military spending and innovation and a higher likelihood of competitive regional proxy wars and arming of client states—all of which would be concerning, in part because it would promote a faster diffusion of military power away from the United States. Greater regional insecurity could well feed proliferation cascades, as states such as Egypt, Japan, South Korea, Taiwan, and Saudi Arabia all might choose to create nuclear forces. 78 It is unlikely that proliferation decisions by any of these actors would be the end of the game: they would likely generate pressure locally for more proliferation. Following Kenneth Waltz, many retrenchment advocates are proliferation optimists, assuming that nuclear deterrence solves the security problem. 79 Usually carried out in dyadic terms, the debate over the stability of proliferation changes as the numbers go up. Proliferation optimism rests on assumptions of rationality and narrow security preferences. In social science, however, such assumptions are inevitably probabilistic. Optimists assume that most states are led by rational leaders, most will overcome organizational problems and resist the temptation to preempt before feared neighbors nuclearize, and most pursue only security and are risk averse. Confidence in such probabilistic assumptions declines if the world were to move from nine to twenty, thirty, or forty nuclear states. In addition, many of the other dangers noted by analysts who are concerned about the destabilizing effects of nuclear proliferation—including the risk of accidents and the prospects that some new nuclear powers will not have truly survivable forces—seem prone to go up as the number of nuclear powers grows. 80 Moreover, the risk of “unforeseen crisis dynamics” that could spin out of control is also higher as the number of nuclear powers increases. Finally, add to these concerns the enhanced danger of nuclear leakage, and a world with overall higher levels of security competition becomes yet more worrisome. The argument that maintaining Eurasian peace is not a U.S. interest faces a second problem. On widely accepted realist assumptions, acknowledging that U.S. engagement preserves peace dramatically narrows the difference between retrenchment and deep engagement. For many supporters of retrenchment, the optimal strategy for a power such as the United States, which has attained regional hegemony and is separated from other great powers by oceans, is offshore balancing: stay over the horizon and “pass the buck” to local powers to do the dangerous work of counterbalancing any local rising power. The United States should commit to onshore balancing only when local balancing is likely to fail and a great power appears to be a credible contender for regional hegemony, as in the cases of Germany, Japan, and the Soviet Union in the midtwentieth century. The problem is that China’s rise puts the possibility of its attaining regional hegemony on the table, at least in the medium to long term. As Mearsheimer notes, “The United States will have to play a key role in countering China, because its Asian neighbors are not strong enough to do it by themselves.” 81 Therefore, unless China’s rise stalls, “the United States is likely to act toward China similar to the way it behaved toward the Soviet Union during the Cold War.” 82 It follows that the United States should take no action that would compromise its capacity to move to onshore balancing in the future. It will need to maintain key alliance relationships in Asia as well as the formidably expensive military capacity to intervene there. The implication is to get out of Iraq and Afghanistan, reduce the presence in Europe, and pivot to Asia— just what the United States is doing. 83 In sum, the argument that U.S. security commitments are unnecessary for peace is countered by a lot of scholarship, including highly influential realist scholarship. In addition, the argument that Eurasian peace is unnecessary for U.S. security is weakened by the potential for a large number of nasty security consequences as well as the need to retain a latent onshore balancing capacity that dramatically reduces the savings retrenchment might bring. Moreover, switching between offshore and onshore balancing could well be difªcult. Bringing together the thrust of many of the arguments discussed so far underlines the degree to which the case for retrenchment misses the underlying logic of the deep engagement strategy. By supplying reassurance, deterrence, and active management, the United States lowers security competition in the world’s key regions, thereby preventing the emergence of a hothouse atmosphere for growing new military capabilities. Alliance ties dissuade partners from ramping up and also provide leverage to prevent military transfers to potential rivals. On top of all this, the United States’ formidable military machine may deter entry by potential rivals. Current great power military expenditures as a percentage of GDP are at historical lows, and thus far other major powers have shied away from seeking to match top-end U.S. military capabilities. In addition, they have so far been careful to avoid attracting the “focused enmity” of the United States. 84 All of the world’s most modern militaries are U.S. allies (America’s alliance system of more than sixty countries now accounts for some 80 percent of global military spending), and the gap between the U.S. military capability and that of potential rivals is by many measures growing rather than shrinking. 85 56 Leadership: Credibility Key US credibility is destroyed on all issues because domestic surveillance contradicts our stated values. Danielle Kehl ’14 (with Kevin Bankston, Robyn Greene & Robert Morgus, analysts at New America’s Open Technology Institute, “Surveillance Costs: The NSA’s Impact on the Economy, Internet Freedom & Cybersecurity,” July, https://static.newamerica.org/attachments/534-surveillance-costs-the-nsasimpact-on-the-economy-internet-freedom-cybersecurity/Surveilance_Costs_Final.pdf) Mandatory data localization proposals are just one of a number of ways that foreign governments have reacted to NSA surveillance in a manner that threatens U.S. foreign policy interests, particularly with regard to Internet Freedom. There has been a quiet tension between how the U.S. approaches freedom of expression online in its foreign policy and its domestic laws ever since Secretary of State Hillary Clinton effectively launched the Internet Freedom agenda in January 2010.170 But the NSA disclosures shined a bright spotlight on the contradiction: the U.S. government promotes free expression abroad and aims to prevent repressive governments from monitoring and censoring their citizens while simultaneously supporting domestic laws that authorize surveillance and bulk data collection. As cybersecurity expert and Internet governance scholar Ron Deibert wrote a few days after the first revelations: “There are unintended consequences of the NSA scandal that will undermine U.S. foreign policy interests – in particular, the ‘Internet Freedom’ agenda espoused by the U.S. State Department and its allies.”171 Deibert accurately predicted that the news would trigger reactions from both policymakers and ordinary citizens abroad, who would begin to question their dependence on American technologies and the hidden motivations behind the United States’ promotion of Internet Freedom. In some countries, the scandal would be used as an excuse to revive dormant debates about dropping American companies from official contracts, score political points at the expense of the United States, and even justify local monitoring and surveillance. Deibert’s speculation has so far proven quite prescient. As we will describe in this section, the ongoing revelations have done significant damage to the credibility of the U.S. Internet Freedom agenda and further jeopardized the United States’ position in the global Internet governance debates. Moreover, the repercussions from NSA spying have bled over from the Internet policy realm to impact broader U.S. foreign policy goals and relationships with government officials and a range of other important stakeholders abroad. In an essay entitled, “The End of Hypocrisy: American Foreign Policy in the Age of Leaks,” international relations scholars Henry Farrell and Martha Finnemore argue that a critical, lasting impact of information provided by leakers like Edward Snowden is “the documented confirmation they provide of what the United States is actually doing and why. When these deeds turn out to clash with the government’s public rhetoric, as they so often do, it becomes harder for U.S. allies to overlook Washington’s covert behavior and easier for U.S. adversaries to justify their own.”172 Toward the end of the essay, Farrell and Finnemore suggest, “The U.S. government, its friends, and its foes can no longer plausibly deny the dark side of U.S. foreign policy and will have to address it head-on.” Indeed, the U.S. is currently working to repair damaged bilateral and multilateral relations with countries from Germany and France to Russia and Israel,173 and it is likely that the effects of the NSA disclosures will be felt for years in fields far beyond Internet policy. 57 Leadership: Innovation Key Innovation and startups are key to US global leadership. Robert Litan ‘15 (Senior Fellow at the Brookings Institution, “Start-Up Slowdown How the United States Can Regain Its Entrepreneurial Edge,” Foreign Affairs, Jan/Feb) Americans like to think of their country as a cradle of innovation. After all, the United States has produced many of the world's finest entrepreneurs, from Andrew Carnegie and Henry Ford to Steve Jobs and Mark Zuckerberg. The American obsession with innovation has even invaded popular culture. Shark Tank, a reality television show in which entrepreneurs pitch to potential angel investors, has reached its sixth season and draws more than six million viewers a week. Silicon Valley, a new comedy on HBO, follows the founders of a technology start-up as they attempt to strike it rich. Meanwhile, the nearcelebrity status of prominent tech entrepreneurs, such as Zuckerberg and Elon Musk, has spurred interest in the so-called STEM subjects -science, technology, engineering, and math-and in entrepreneurship more generally. The numbers, however, tell a different story. Over the past 30 years, the rate of start-up formation in the United States has slowed markedly, and the technology industry has come to be dominated by older companies. This presents a risk to innovation, because the most transformative leaps forward tend to come not from established firms but from entrepreneurs with little to lose. Indeed, start-ups commercialized most of the seminal technologies of the past several centuries, including the car, the airplane, the telegraph, the telephone, the computer, and the Internet search engine. If the United States wishes to reclaim its status as an innovation hub, it must reform a wide swath of policies-including those covering immigration, business regulation, health care, and education-to support new businesses. A NATIONAL DECLINE Data on start-ups in the United States were not regularly compiled until 2008, when the U.S. Census Bureau created the Business Dynamics Statistics database, which tracks firm start-ups and shutdowns across the country. Using the data from 1977 to 2012, my colleague Ian Hathaway and I have published a series of reports for the Brookings Institution highlighting a startling observation: the ratio of new firms to all firms, or the "start-up rate," has been steadily decreasing. In 1978, start-ups -defined in the database as companies less than a year old-accounted for nearly 15 percent of all U.S. firms; by 2011, that figure had slipped to just eight percent. For the first time in three decades, business deaths exceeded business births. This national decline mirrored similar shifts in all 50 states and in all but one of the country's 366 largest metropolitan centers. This includes California, with its two wellsprings of innovation, Silicon Valley and the Los Angeles-Orange County region, where entrepreneurship rates once soared above the national average. The downward trend has affected all major industries, even the life-sciences sector, which includes pharmaceutical and medical-device businesses and has traditionally played a major role in new job creation. In 1990, around 2,600 new life-sciences firms started up, a number that grew to roughly 3,000 in 1997; by 2011, that number had fallen to 1,995. Fewer start-ups has meant fewer high-growth firms, defined by the Organization for Economic Cooperation and Development as companies that experience three consecutive years of at least a 20 percent increase in the number of people they employ. According to researchers at the U.S. Bureau of Labor Statistics, the percentage of U.S. firms that met that criterion dropped from roughly three percent in 1994-97 to 1.5 percent in 2008-11. This drop is likely related to the decline in start-ups that took place during the same period. These changes are surprising not only because they run counter to the image of the U.S. economy as highly entrepreneurial but also because they took place during a revolution in information technology that substantially lowered the costs of launching and expanding new businesses, thanks to cheaper software and hardware, a more global Internet, and the savings afforded by data storage in the "cloud." Granted, the Census Bureau's data set excludes firms where the founder is the only employee, which ignores the large and growing number of people who write smartphone applications or sell goods on online platforms such as eBay or Etsy. But there is a good reason for this exclusion: although individual entrepreneurs deserve applause, they do not benefit the economy the way larger firms do. Firms with at least one employee besides the founder have the potential to grow and, since 1980, have accounted for the vast majority of new jobs in the United States. As newer firms have become scarcer, the number of older firms has multiplied. The proportion of U.S. companies considered mature, meaning at least 16 years old, rose from 23 percent of all firms in 1992 to 34 percent in 2011. Over the same period, the percentage of the work force employed at mature firms rose as well, from 60 percent to 72 percent. An optimist might conclude that the U.S. economy has simply rewarded economies of scale. In this view, a greater share of older firms represents a net benefit, since firms with more experience are more likely to succeed and provide stable employment. But aging firms, like aging people, are also more risk averse. When they innovate, they are more likely to aim for incremental improvement rather than creative destruction or disruption. They also tend to be larger, more bureaucratic, and less flexible than start-ups when faced with changing technology and shifting consumer preferences. And older, more entrenched firms are harder to compete with than younger ones, which may explain why a larger share of older firms has coincided with a smaller share of start-ups. Although similar data do not exist for firms in other countries, there is reason to worry that the United States may fall behind. The Organization for Economic Cooperation and Development began publishing 58 global data on start-up rates in 2011, but the data go back only to 2006, two years before the CLOSING THE GAP Even if the United States successfully boosts the formation of new companies, it will have to contend with the dark side of innovation: the wealth inequalities that sometimes accompany technological change. Advances in robotics and information technology, in particular, have increased the demand for employees with strong technical backgrounds and curtailed the need for unskilled labor. Some economists believe that the revolution in information technology may end up benefiting only those workers whose salaries place them in the top ten to 20 percent of the income spectrum, thus widening the already substantial income gap between the wealthy and the poor. It is not yet clear what impact an influx of start-ups would have on this problem-but there is reason to suspect it could make things worse. In recent years, hugely profitable start-ups have created relatively few new jobs and done little to spread the wealth. The popular text-messaging service WhatsApp employed only 55 people when Facebook acquired it for $19 billion last year; Instagram, a photosharing social networking site, had only 13 employees when Facebook bought it for $1 billion in 2012. If the majority of new companies resemble these successful technology firms, then any start-up renaissance will only magnify inequality. In addition, innovations in automation, robotics, and data processing could eliminate millions of jobs in the coming decades, pushing many workers into lowerwage positions or out of the labor force altogether. Closing the wage gap, or at least reversing its growth, will require significantly overhauling public education systems so that they can better teach technological literacy. Being able to write computer code will soon be as important as being able to write in English, and students should begin learning to code as early as elementary school. Better education represents the best chance to level the playing field and expand the number of potential entrepreneurs. An entrepreneurial revolution will require more than just coders, however. As the Nobel Prize-winning economist Edmund Phelps has argued, innovation requires the teaching of not just technical skills but also the humanities and the arts. Had Jobs not taken a calligraphy class at Reed College, for example, he might not have insisted on including a wide array of fonts in Apple computersan innovation that gave his company an early edge over its competitors. Since Washington has little control over education policy at the state level, reform will have to proceed incrementally through experimentation in local school districts. The federal government and nongovernmental organizations should support and publicize these experiments so that states can learn from their successes and failures. Entrepreneurs create the future and boost national economies. For the United States, economic strength is key to maintaining and strengthening its status as a world leader. Rousing the country from its entrepreneurial slumber will require deep structural change, but the stakes are high. In the balance hangs the welfare of future generations and the global leadership of the United States. 59 CASE Extensions 60 Inherency: Credibility Lost US Data credibility is Being destroyed: Nothing has reformed the NSA enough to allow US industry to clear their name. Laura K. Donohue ’15 (Georgetown University Law Center, “High Technology, Consumer Privacy, and U.S. National Security,” http://scholarship.law.georgetown.edu/facpub/1457 ) D. Internet Governance From the inception of the Internet, the U.S.-based Internet Corporation for Assigned Names and Numbers (ICANN) has governed the web. As time has progressed, and the Internet has become part of the global infrastructure, there have been calls from several nations to end U.S. dominance and to have the International Telecommunication Union (ITU), an entity within the UN, become the governing body. 66 The global backlash against the NSA programs raises question about the future of Internet governance. The revelations have not only contributed further to such calls, but they have spurred increased discussion of the need for regional Internet control.67 Over the past decade, three main groups have emerged to vie for control of the Internet. The first is centered on states, who consider the question in light of national sovereignty. It is comprised of developing countries as well as large, emerging economies like China, Russia, Brazil, and South Africa.68 It overlaps significantly with the Group of 77 (consisting of more than 100 countries which emerged from the non-aligned movement in the Cold War). These states are critical of the United States and its dominant role in Internet governance and oppose private sector preeminence, on the grounds that they are pawns of the United States.69 Emphasis instead is placed on the UN and the ITU as potential repositories of Internet authority. The second group is civil society. The third is the private sector. These groups tend to support what is referred to as a “multistakeholder model:” i.e., native Internet governance institutions that are generally nonprofit entities in the private sector. 70 Membership includes both technical experts (e.g., ICANN and Regional Internet Registries), as well as multinational corporations (e.g., Microsoft, Facebook, and AT&T). Prior to the Snowden releases, Japan, the EU, and the United States found themselves in this camp. Civil society organizations emphasize Internet freedom, consumer privacy, and user rights—often bringing them into conflict with the states who comprise the G77-type group.71 As one commentator explains, “This alignment of actors has been in place since the 2003 World Summit on the Information Society (WSIS) meetings. But the Snowden NSA revelations seem to have destabilized this settled political alignment.”72 In the wake of the Snowden documents, ICANN and Brazil have formed an alliance, condemning U.S. actions. Concern about the latest revelations spurred a major conference in April 2014, the Global Multistakeholder Conference on the Future of Internet Governance. The purpose of the meeting, which was held in Sao Paulo, was “to produce universal internet principles and an institutional framework for multi-stakeholder Internet governance.”73 It is not clear how the newest shifts will be resolved—either temporarily or in the future. But significant questions have been raised: How should the Internet governance be structured to ensure legitimacy and compliance? Who gets to make the decision about what such governance looks like? Which bodies have the authority to establish future rules and procedures? How are such bodies constituted and who selects their membership? These questions are fundamentally at odds with the decentralization tendencies in the Internet—tendencies that have been exaggerated postSnowden as a result of regional efforts to expand the local sphere of influence and to protect consumer and state privacy from U.S. surveillance. The U.S. government’s failure to address the situation domestically has undermined the tech industry. Despite calls from the companies for legislative reform to address the breadth of the NSA programs,74 there has been no significant shift that would allow companies to approach their customers to say, with truth, that the situation has changed. Resultantly, American companies are losing not just customers, but also the opportunity to submit proposals for contracts for which they previously would have been allowed to compete.75 The future of Internet governance hangs in the balance. 61 Economy- Localization: SQ = Fragmentation 1/ On-Balance: the forces for localization are playing the strong side of the politics. Jonah Force Hill ‘14 (technology and international affairs consultant based in San Francisco and a Fellow of the Global Governance Futures program, “THE GROWTH OF DATA LOCALIZATION POST-SNOWDEN: ANALYSIS AND RECOMMENDATIONS FOR U.S. POLICYMAKERS AND BUSINESS LEADERS”) Localization Proposals It remains to be seen whether lobbying or litigation will salvage the overseas reputations of the American tech companies, or protect their market shares abroad. Data localization proposals continue to be floated and seriously considered in several major markets crucial to the companies’ bottom lines. The problem for U.S. tech companies is that there are actually a wide variety of forces and interest groups driving the data localization movement, and many of these forces and groups have objectives beyond the professed goals of data protection and counter-NSA surveillance. One can easily discern in foreign governments’ interest in data localization a combination of anti-American populism, a desire for greater ease of foreign (and domestic) surveillance, and a sense among policymakers and business that the Snowden backlash presents an opportunity to cultivate domestic cloud and other tech services industries, industries that have long been outcompeted by American tech companies in their home markets—old-fashioned protectionism tailored for the digital age. A quick look at four select localization studies25 reveals this complex mix of purposes, and helps to explain why U.S. technology firms – as well as those organizations and individuals abroad who also recognize the problems data localization laws would introduce – are having such a difficult time arguing their case, despite the logic working in their favor and against the policies they are contesting. 62 Economy- Localization: SQ = Fragmentation 2/ NSA Leaks derail cooperative global internet regulation. Localization will be the new trend without reform. Danielle Kehl ’14 (with Kevin Bankston, Robyn Greene & Robert Morgus, analysts at New America’s Open Technology Institute, “Surveillance Costs: The NSA’s Impact on the Economy, Internet Freedom & Cybersecurity,” July, https://static.newamerica.org/attachments/534-surveillance-costs-the-nsasimpact-on-the-economy-internet-freedom-cybersecurity/Surveilance_Costs_Final.pdf) Consequently, NSA surveillance has shifted the dynamics of the Internet governance debate in a potentially destabilizing manner. The Snowden revelations “have also been well-received by those who seek to discredit existing approaches to Internet governance,” wrote the Center for Democracy & Technology’s Matthew Shears. “There has been a long-running antipathy among a number of stakeholders to the United States government’s perceived control of the Internet and the dominance of US Internet companies. There has also been a long-running antipathy, particularly among some governments, to the distributed and open management of the Internet.”191 Shears points out that evidence of the NSA’s wide-ranging capabilities has fueled general concerns about the current Internet governance system, bolstering the arguments of those calling for a new government-centric governance order. At the UN Human Rights Council in September 2013, the representative from Pakistan— speaking on behalf of Cuba, Venezuela, Zimbabwe, Uganda, Ecuador, Russia, Indonesia, Bolivia, Iran, and China—explicitly linked the revelations about surveillance programs to the need for reforming Internet governance processes and institutions to give governments a larger role.192 Surveillance issues continued to dominate the conversation at the 2013 Internet Governance Forum in Bali as well, where “debates on child protection, education and infrastructure were overshadowed by widespread concerns from delegates who said the public’s trust in the internet was being undermined by reports of US and British government surveillance.”193 Further complicating these conversations is the fact that several of the institutions that govern the technical functions of the Internet are either tied to the American government or are located in the United States. Internet governance scholar Milton Mueller has described how the reaction to the NSA disclosures has become entangled in an already contentious Internet governance landscape. Mueller argues that, in addition to revealing the scale and scope of state surveillance and the preeminent role of the United States and its partners, the NSA disclosures may push other states toward a more nationally partitioned Internet and “threaten… in a very fundamental way the claim that the US had a special status as neutral steward of Internet governance.”194 These concerns were publicly voiced in October 2013 by the heads of a number of key organizations, including the President of the Internet Corporation for Assigned Names and Numbers (ICANN) and the chair of the Internet Engineering Task Force (IETF), in the Montevideo Statement on the Future of Internet Cooperation. Their statement expressed “strong concern over the undermining of the trust and confidence of Internet users globally due to recent revelations of pervasive monitoring and surveillance” and “called for accelerating the globalization of ICANN and Internet Assigned Numbers Authority (IANA) functions, towards an environment in which all stakeholders, including all governments, participate on an equal footing.”195 In particular, the process of internationalizing ICANN— which has had a contractual relationship with the Commerce Department’s National Telecommunications and Information Association (NTIA) since 1998—has progressed in recent months. 63 Economy- Localization: Country List Massive flood of local data mandates is emerging. Business Roundtable ‘12 (“Promoting Economic Growth through Smart Global Information Technology Policy The Growing Threat of Local Data Server Requirements,” an association of chief executive officers of leading U.S. companies with over $6 trillion in annual revenues and more than 14 million employees) Local data server requirements present current and emerging threats. The following are examples of this emerging threat, in which governments either are proposing or have implemented local data server requirements. This list is not exhaustive, but rather illustrative, and demonstrates the harmful trend that should be recognized and reversed. In some examples (not all), the stated rationale for the law is a broad national security concern, yet there are indications of an industrial policy motivation. The examples are provided from the collective knowledge and experience of BRT member companies. Australia The government presented a bill in November 2011 that would require local data centers for the personally controlled e-health record system. Brunei Brunei has data residency laws, meaning that companies can store the data they collect only on servers in country. China China has local data server requirements due to national security, currency control and industrial policy. China has also put in place an array of laws and regulations that establish a local entity, China UnionPay (CUP), as the monopoly network for processing RMBdenominated transactions in China.2 The United States is currently challenging the CUP monopoly in the World Trade Organization. If the United States prevails, then it must ensure that China does not seek to perpetuate the entrenched position of CUP by imposing a local data server requirement. China has data residency laws that declare companies can store the data they collect only on servers in country. Greece In February 2011, Greece passed a law that states, in part, “Data generated and stored on physical media, which are located within the Greek territory, shall be retained within the Greek territory.” The European Commission has criticized this action by Greece as inconsistent with the E.U. single market, but the rule remains in effect. Business Roundtable: Promoting Economic Growth through Smart Global Information Technology Policy 6 India The government has proposed a measure that would require companies to locate part of their IT infrastructure within the country to provide investigative agencies with ready access to encrypted data on their servers. This measure also will require that data of Indian citizens, government organizations and firms hosted on the servers of these companies not be moved out of the country. Failure to comply with this rule will be a criminal offence and company officials will face prosecution. Indonesia In 2009, the Ministry of Communication and Information Technology of the Republic of Indonesia proposed a draft government regulation to implement law no. 11 (2008) concerning electronic information and transactions. One of the provisions, article 25.3, stipulates that every electronic system’s provider for public services that operates a data center is required to locate its data center and disaster recovery center within the Indonesian territory. This draft regulation will become law if it is “harmonized” with the Ministry of Justice and the Ministry of Economic Affairs. Malaysia Malaysia passed a local data server requirements law but has not yet implemented it . Nigeria Nigeria has adopted Guidelines on Point-of-Sale Card Acceptance Services, which require that all point-of-sale and ATM domestic transactions be processed through a local switch (essentially, a server) and prohibit routing of transactions for processing outside the country. The guidelines also require centralized switching of domestic transactions. Russia Russia has adopted legislation requiring that infrastructure necessary to core payment processing services be located on the territory of the Russian Federation. South The Financial Services Commission is considering regulations that would require insurance companies to maintain servers in country for company financial data and restrict transfers of such data (not pertaining to policy holders or employees) outside of South Korea’s borders. This is despite provisions in the KORUS Free Trade Agreement, scheduled to take effect two years from entry into force. The free trade agreement permits the sending of data across the border intra-company or to third parties. The data transfer provision was intended to establish an innovative precedent in Asia, thereby allowing U.S. financial services companies to integrate regional and global operations by using established data processing hubs. Ukraine Ukraine is considering laws and regulations that would establish a domestic monopoly for processing domestic payment transactions and exclude foreign networks from providing processing services. Venezuela Venezuela has local data server requirements due to currency control for debit transactions. Venezuela has adopted a law that effectively requires in-country processing of domestic payment transactions. Vietnam Vietnam has data residency laws, meaning that companies can store the data they collect only on servers in country. Korea Local data server requirements are misguided, overbroad in impact and often inadvertently harmful policies. Several justifications have been offered for imposing local data server requirements. In some cases, local data server requirements are viewed as necessary to advance national industrial policy and support national service providers. In other cases, the stated justification is to ensure that regulatory, law enforcement or national security personnel can access data residing on the servers. In still other cases, governments assert that they are protecting personal privacy or restricting access to banned or unlawful content. Although some of these various objectives may be legitimate if they are narrowly tailored to address the genuine harm, the blanket imposition of local data server requirements can unnecessarily damage service providers and consumers alike and slow economic 64 growth. To avoid such disruption, governments should seek to narrowly tailor their regulatory requirements to meet essential needs and should avoid ill-advised, blanket local data server requirements. Governments should also ensure that their reviews, if any, of the national security implications of foreign investments focus exclusively on genuine national security risks. 65 Economy- Localization: Credibility Key Only curtailing surveillance can restore credibility and avoids runaway data localization. Laura K. Donohue ’15 (Georgetown University Law Center, “High Technology, Consumer Privacy, and U.S. National Security,” http://scholarship.law.georgetown.edu/facpub/1457 ) C. Data Localization and Data Protection Over the past eighteen months, countries around the world have increasingly adopted data localization laws, restricting the storage, analysis, and transfer of digital information to national borders.45 To some extent, the use of barriers to trade as a means of incubating tech-based industries predated the Snowden releases.46 In the aftermath of the leaks, the dialogue has gained momentum. The asserted purpose is to protect government data and consumer privacy. As of the time of writing, China, Greece, Malaysia, Russia, South Korea, Venezuela, Vietnam, Iran, and others have already implemented local data server requirements. 47 Turkey has introduced new privacy regulations preventing the transfer of personal data (particularly locational data) overseas.48 Others, such as Argentina, India, and Indonesia are actively considering new laws, even as Brazilian president, Dilma Rousseff, has been promoting a law that would require citizens’ personal data to be stored within domestic bounds. 49 Germany and France are considering a Schengen routing system, retaining as much online data in the European Union as possible.50 As a regional matter, the European Union (EU) Commission’s Vice President, Viviane Reding, is pushing for Europe to adopt more expansive privacy laws.51 In March 2014, the European Parliament passed the Data Protection Regulation and Directive, imposing strict limits on the handling of EU citizens’ data.52 Reding announced, “The message the European Parliament is sending is unequivocal: This reform is a necessity, and now it is irreversible. Europe’s directly elected parliamentarians have listened to European citizens and European businesses and, with this vote, have made clear that we need a uniform and strong European data protection law, which will. . . strengthen the protection of our citizens.” 53 Regardless of where the information is based, those handling the data must obtain the consent of the data subjects to having their personal information processed. They also retain the right to later withdraw consent. Those violating the directive face steep fines, including up to five percent of revenues.54 Apart from the new directive, the Civil Liberties, Justice, and Home Affairs Committee of the European Parliament passed a resolution calling for the end of the US/EU Safe Harbor agreement. 55 Some 3000 U.S. companies rely on this framework to conduct business with the EU.56 In May 2014, the EU Court of Justice ruled that users have a “right to be forgotten” in their use of online search engines. 57 The case derived from a complaint lodged against a Spanish newspaper, as well as Google Spain and Google Inc., claiming that notice of the plaintiff’s repossessed home on Google’s search engine infringed his right to privacy because the incident had been fully addressed years before. He requested that the newspaper be required to remove or alter the pages in question to excise data related to him, and that Google Spain or Google Inc. be required to remove the information.58 The EU court found that even where the physical server of a company processing information is not located in Europe, as long as the company has a branch or subsidiary and is doing business in a Member state, the 1995 Data Protection Directive applies.59 Because search engines contain personal data, they are subject to such data protection laws. The court recognized that, under certain conditions, individuals have the “right to be forgotten”—i.e., the right to request that search engines remove links containing personal information. Data that is inaccurate, inadequate, irrelevant, or excessive may be removed. Not absolute, the right to be forgotten must be weighed against competing rights, such as freedom of expression and the media.60 Various country-specific privacy laws are similarly poised to be introduced. Their potential economic impact is substantial. The Information Technology and Innovation Fund estimates that data privacy rules could retard the growth of the technology industry by up to four percent, impacting U.S. companies’ ability to expand and forcing them out of existing markets.61 The current dialogue is merely the latest in a series of growing concerns about the absence of effective privacy protections within the U.S. legal regime. High tech companies appear to see this as a concern. As Representative Justin Amash (MI-R) has explained, “Businesses increasingly recognize that our government’s out-of-control surveillance hurts their bottom line and costs American jobs. It violates the privacy of their customers and it erodes American businesses’ competitive edge.”62 It is with the impact of lack of privacy controls in the surveillance sphere on U.S. competitiveness in mind that, in December 2013, some of the largest U.S. Internet companies launched a campaign to pressure the government to reform the NSA programs. Microsoft General Counsel Brad Smith explained: “People won’t use technology they don’t trust.” He added, “Governments have put this trust at risk, and governments need to help restore it.”63 Numerous high technology CEOs supported the initiative, such Google’s Larry Page, Yahoo’s Marissa Mayer, and Facebook’s Mark Zuckerberg. 64 The aim is to limit government authority to collect user data, to institute better oversight and accountability, to ensure greater transparency about what the government is requesting (and obtaining), to increase respect for 66 the free flow of data across borders, and to avoid political clashes on a global scale. Mayer, explained, “Recent revelations about government surveillance activities have shaken the trust of our users, and it is time for the United States government to act to restore the confidence of citizens around the world.”65 67 Economy- Localization: Impact- Kills The Internet 1/ Data localization is incompatible with modern IP routing. It will literally Break The Internet. [Voter for Education] Jonah Force Hill ‘14 (technology and international affairs consultant based in San Francisco and a Fellow of the Global Governance Futures program, “THE GROWTH OF DATA LOCALIZATION POST-SNOWDEN: ANALYSIS AND RECOMMENDATIONS FOR U.S. POLICYMAKERS AND BUSINESS LEADERS”) Free Expression and Internet Freedoms Are Not Well Served Most troubling of all the potential harms of data localization is its effect on free expression and Internet freedom. This is ironic, in that to many of its advocates, data localization is a remedy to the threat posed by the NSA to free expression and Internet freedom. I suggest that the opposite is actually true, that the “remedy” only serves to make the danger greater. The Internet and other online media have become indispensable tools for individuals to communicate globally, and have furthered individual participation in the political process, increased transparency of governmental activities, and promoted fundamental rights. Data localization, by centralizing control over digital infrastructure, can diminish this capacity in a number of ways. As was discussed above, data localization as a local server or local data storage requirement can limit freedom by permitting countries more easily to collect information on their citizens (through domestic surveillance). It allows a government more quickly and effectively to shut down Internet services (usually via legal threats to local Internet service providers) that the government believes is abetting unwanted political opposition. 115 Data localization mandates also can obstruct Internet freedom in other, indirect ways. Restricted routing, in particular, is problematic, because it is not technically possible as the existing Internet is designed or organized. Unlike the telephone network, the Internet operates under a model known as “best effort delivery,” where data is delivered to its destination in the most efficient manner possible, without predetermined routes. For instance, data sent from the United States to Botswana will attempt to travel along the shortest and most direct route possible. However, if there is a bottleneck along the shortest route, a packet may find a longer but more expeditious route. This is a core feature of the Internet that makes network congestion easy to navigate around. In order to restrict data routing to specific geographies as governments are advocating, all Internet routers that are currently programmed to follow this “best effort” routing model would have to be reconfigured to prohibit data from one country from moving through the territory of “prohibited” countries. Moreover, since Internet addresses are not always assigned according to a specific geography, the Internet’s addressing system currently would have to be dramatically altered as well. Thus, the Border Gateway Protocol (one of the core Internet networking protocols), the Internet’s routing tables (the address books by which routers send data), and the process by which IP addresses are allocated, would all have to be modified. Such an undertaking would require a fundamental overhaul not only of the Internet’s operating structures, but also of the governance structures by which those structures are implemented and standardized. These are not just arcane concerns of those involved in Internet governance, although they surely are matters that greatly trouble those who favor an efficient and interoperable Internet. These alterations in the way the Internet works will, I believe, materially restrict the power of the Internet to support free expression. These modifications to these core characteristic of the current Internet – modifications that localization would require – may result in intelligence agencies acquiring a previously unavailable capacity to assess where data had originated and where it was heading, because the origin and destination information would be included in the data packet.116 A centralized governance process, further, which would be required to change the routing protocols and IP allocation system, would give authoritarian countries significantly more influence over how information on the Internet is regulated. In fact, this is one of the main reasons why China, Russia, many Arab states (among others) have pushed for tracked routing protocols in the past, 117 just as they have lobbied for a handover of the global Internet governance system to the U.N.’s International Telecommunications Union. 118 In short, localization would require dramatic changes to the current structure of the Internet, changes that would have adverse consequences for those who see it as a principal – if not the principal – means of global democratization. For some, those adverse consequences would be unintended; more chillingly, there are those who intend precisely those consequences. This would be an enormous price to pay, particularly since the other objectives that are promoted as justifications for localization – namely, security for communications and economic development – are illusory. 68 Economy- Localization: Impact- Kills The Internet 2/ Data localization disrupts the global function of the internet. Danielle Kehl ’14 (with Kevin Bankston, Robyn Greene & Robert Morgus, analysts at New America’s Open Technology Institute, “Surveillance Costs: The NSA’s Impact on the Economy, Internet Freedom & Cybersecurity,” July, https://static.newamerica.org/attachments/534-surveillance-costs-the-nsasimpact-on-the-economy-internet-freedom-cybersecurity/Surveilance_Costs_Final.pdf) Some analysts have questioned whether data localization and protection proposals are politically motivated and if they would actually enhance privacy and security for ordinary individuals living in foreign countries,160 especially given the existence of similar laws in a number of countries and Mutual Legal Assistance Treaties (MLATs) between nations that provide cross-border access to data stored for lawful investigations.161 Yet there is no doubt that American companies will pay a steep price if these policies move forward. Mandatory data localization laws could lead to soaring costs for major Internet companies such as Google, Facebook, and Twitter, who would be faced with the choice of investing in additional, duplicative infrastructure and data centers in order to comply with new regulations or pulling their business out of the market altogether.162 In testimony before Congress last November, for example, Google’s Director of Law Enforcement and Information Security suggested that requirements being discussed in Brazil could be so onerous that they would effectively bar Google from doing business in the country.163 The penalties that companies face for violating these new rules are also significant. In some cases, unless U.S. policy changes, it may be virtually impossible for American companies to avoid violating either domestic or foreign laws when operating overseas.164 The costs and legal challenges could easily prevent firms from expanding in the first place or cause them to leave existing markets because they are no longer profitable.165 ITIF’s Daniel Castro has suggested that data privacy rules and other restrictions could slow the growth of the U.S. technology-services industry by as much as four percent.Data localization proposals also threaten to undermine the functioning of the Internet, which was built on protocols that send packets over the fastest and most efficient route possible, regardless of physical location. If actually implemented, policies like those suggested by India and Brazil would subvert those protocols by altering the way Internet traffic is routed in order to exert more national control over data.167 The localization of Internet traffic may also have significant ancillary impacts on privacy and human rights by making it easier for countries to engage in national surveillance, censorship, and persecution of online dissidents, particularly where countries have a history of violating human rights and ignoring rule of law.168 “Ironically, data localization policies will likely degrade – rather than improve – data security for the countries considering them, making surveillance, protection from which is the ostensible reason for localization, easier for domestic governments, if not foreign powers, to achieve,” writes Jonah Force Hill.169 The rise in data localization and data protection proposals in response to NSA surveillance threatens not only U.S. economic interests, but also Internet Freedom around the world. 69 Economy- Localization: Impact- Repression Data localization facilitates government repression. Jonah Force Hill ‘14 (technology and international affairs consultant based in San Francisco and a Fellow of the Global Governance Futures program, “THE GROWTH OF DATA LOCALIZATION POST-SNOWDEN: ANALYSIS AND RECOMMENDATIONS FOR U.S. POLICYMAKERS AND BUSINESS LEADERS”) Control of Information and Censorship While intelligence and law enforcement agencies in democratic countries may look to localization as a way to perform their jobs more effectively, there are governments that surely have a more sinister reason to favor localization. Political elites in authoritarian states unquestionably see local control of the flow of data as a way to control the content of information that reaches their populations. As was mentioned above, data localization has been used in China, Iran, Egypt,98 and other authoritarian states to ease the technical burdens required to exert control over Internet platforms, such as Facebook, which those governments find to be hosting unwanted political speech, or facilitating political dissent. Yet even the leaders of democratic countries at times have wanted the ability to “shut down” data flows to quell political unrest or to censor “subversive” speech. At the time of this paper’s writing (April 2014), for instance, the Turkish government appears to have forced local Internet Service Providers (ISPs) to block access to certain servers hosting Twitter’s services, in an attempt to stop the communication channel being used to organize antigovernment protests challenging the government of Prime Minister Recep Tayyip Erdogan.99 This effort seems, for the time being, to have been only partially successful, but had aggressive data localization rules been in place, it is not inconceivable that the protestors’ efforts to circumvent the blockage would have been far more problematic. 70 Economy- Localization: Impact- Spying Data localization increases foreign surveillance. Jonah Force Hill ‘14 (technology and international affairs consultant based in San Francisco and a Fellow of the Global Governance Futures program, “THE GROWTH OF DATA LOCALIZATION POST-SNOWDEN: ANALYSIS AND RECOMMENDATIONS FOR U.S. POLICYMAKERS AND BUSINESS LEADERS”) Domestic Surveillance and Law Enforcement Just as protectionist purposes can be advanced by data localization, so too can the objectives of domestic intelligence and law enforcement agencies. Initially, we know that governments already are engaged in sophisticated surveillance of their own populations. For example, despite the German government’s vitriolic public protestations over NSA spying, Germany itself maintains a fairly robust intelligence collection program, a program that has been growing over the past few years.86 According to the German newsweekly Der Spiegel, the BND, the rough German equivalent of the American NSA, maintains secret arrangements with German telecommunications and Internet firms in order to provide the German spy agency with direct access to data flowing over domestic fiberoptic cables. 87 The agency has also reportedly installed “taps” on Germany’s largest Internet exchange point in Frankfurt, known as the DE-CIX, in a manner consistent with the NSA’s tactics. 88 India, which also maintains its own sizeable intelligence community,89 is likewise in the process of beefing up its signals intelligence capabilities, importantly its Centralized Monitoring System (CMS), a massive nation-wide intelligence collection program which is expected to give the Indian government enormous powers to access phone conversations, video conferences, text messages, and emails, in real time, with minimal court oversight.90 If a government already has a sophisticated communications surveillance capacity, it would not be surprising that that it would want to enhance that capacity – certainly, that is what the United States has done. It would seem naïve to suppose that other governments would act differently. Data localization in both German and India and elsewhere, would offer just such enhancement, through two important intelligence functions. First, it allows domestic intelligence agencies to better monitor domestic data by either forcing data to be stored in local servers (indeed, India has previously required two international firms, Research in Motion and Nokia, to locate servers and data domestically91 for intelligence collection purposes), or by requiring that data to be held by local firms over which domestic intelligence and law enforcement agencies may have greater coercive power. Second, in light of the often-overlooked fact that many intelligence services, such as the BND, cooperate with the NSA in a variety of information sharing programs,92 governments may view localization as a tactic to gain additional bargaining power with the NSA in negotiations over how much information the American spy agency will share.93 Moreover, domestic law enforcement agencies (to the extent that, in most democratic countries, law enforcement is administratively and actually separate from intelligence services) surely have reason to view data localization as a potentially valuable evidence gathering tool, useful in identifying and then prosecuting conventional criminal activities. In connection with investigations and prosecutions, foreign law enforcement often complain that the process by which they request data from U.S. firms (the rules of which are generally negotiated between the United States and foreign governments and then ratified in a Mutual Legal Assistance Treaty) is slow and cumbersome, and that American firms and the U.S. Justice Department are too often uncooperative. The President’s Review Group on Intelligence and Communication Technologies estimated that the average time from request to delivery is 10 months, and sometimes years pass before a response arrives.94 There is uncertainty about when data can be shared, with whom, and on what terms; and it all happens with very little transparency.95 This process presents annoying and seemingly unjustified interference to foreign law enforcement officials who want to apprehend criminals. The Brazilian government, for example, has requested information from Google for several pending cases in the Brazilian Supreme Court, but has yet to receive it.96 Similarly, India has often asked the U.S. to serve summonses upon Google, as well as on Facebook, Twitter, and others, for failing to prevent the dissemination of speech prohibited under Indian Law, but has been rejected due to U.S. civil liberties sensibilities.97 Data localization, for frustrated and impatient law enforcement agencies and their political allies, looks like a straightforward mechanism to free themselves from some of this bothersome dependence on Americans. 71 Economy- Localization: Impact- Germany German outrage at the NSA creates momentum for data localization across Europe Jonah Force Hill ‘14 (technology and international affairs consultant based in San Francisco and a Fellow of the Global Governance Futures program, “THE GROWTH OF DATA LOCALIZATION POST-SNOWDEN: ANALYSIS AND RECOMMENDATIONS FOR U.S. POLICYMAKERS AND BUSINESS LEADERS”) Germany and “Schengen Area” Routing Among the many countries riled by the Snowden revelations, perhaps none has been more vocal in its condemnation, or appeared to have been more profoundly aggrieved by the NSA surveillance programs, than Germany. The reasons for the Germans’ unique outrage over the NSA programs are complex, but much of the explanation is historical. Germany is a society still deeply scared by its national memories of the The NSA surveillance dragnet has triggered painful memories of those eras and ignited a call for swift action in Berlin. surveillance tactics used by both the Nazis during WWII and the East German Stasi during the Cold War. Chancellor Merkel, whose anger overwhelmed her understanding of history, has even gone so far as to make a NSA-Stasi parallel in a In modern Germany, data privacy has become virtually sacrosanct. Even before the Snowden revelations, German data conversation with President Obama following disclosure that the NSA had been tapping her phone conversations.26 protection commissioners had developed a track record of filing suits against U.S. Internet companies such as Facebook, Google, and the Wikimedia Foundation, challenging data collection, transfer, and use practices that, while commonly accepted in other countries, are vigorously protested and questionably legal in Germany.27 Germany’s highest court has gone so far as to establish a constitutional right to “integrity and confidentiality of IT systems.”28 It should have come as no surprise, then, that the Germans have serious misgivings about the probity of American tech companies following the Snowden disclosures, and that the German government would develop and pursue strategies to address the concerns of its citizens. And indeed it is devising such strategies. Among a host of actions, including a request for U.S.-German “no-spy” agreement,29 German authorities are considering data localization in a number of potential forms.30 Most notably, Chancellor Merkel has suggested that Europe should build out its own Internet infrastructure, permitting Germany to keep its data within Europe. In support of this suggestion, Markel declared that, “European providers [could] offer security for our citizens, so that one shouldn't have to send emails and other information across the Atlantic.”31 What such a proposal would mean in practice is unclear; what is clear, however, is that some Germany technology companies are now spearheading the data localization movement. In particular, Deutsche Telekom, the largest provider of high-speed Internet and wireless services in Germany and the largest telecommunications organization in the European Union, has begun to act in advance of any German government legislation. In partnership with GMX, one of Germany’s largest email providers, the company has already implemented its "e-mail made in Germany" service, a program that promises to keep German email communications within German territory.32 Thomas Tschersich, who heads Deutsche Telekom's IT Security, explained that IP addresses will be used to recognize when both the sender and the recipient of the emails are in Germany, and based on that information, arrangements between national email providers will be used to transfer this information.33 Further, consistent with, and supported by, Chancellor Merkel’s declarations of Internet independence, Deutsche Telekom has also raised the idea of creating a “Schengen area routing,” a network for the 26 European countries that have agreed to remove passport controls at their borders. 34 (The Schengen area does not include the U.K., which the Snowden documents have revealed has closely cooperated with the U.S. spying programs through its own signals intelligence agency, the GCHQ). This network would supposedly allow the network nations’ citizens securely to exchange data within the area without having to send that data to the United States. “The idea is that when the sender and recipient of any Internet data are in Germany their data is not sent via another country, as it sometimes is today,” Philipp Blank, a Deutsche Telekom spokesman explained. Blank left no doubt as to which other countries’ practices – and companies – troubled him: "We're simply asking: Why does an e-mail from Bonn to Berlin have to pass through New York or London?" The role of the German government in facilitating data localization proposals is currently being hotly debated within Europe, and between Germans and Americans. The U.S. Trade Representative is advocating strongly that Europe not move forward with the idea of EU network services that bar data from crossing the Atlantic, arguing (as this paper argues) that it would be unwise, uneconomical, and counterproductive.36 But as of the time of this writing, these proposals are still under serious consideration. 72 Economy- Localization: Impact- Brazil Brazilian backlash locks out US companies. Jonah Force Hill ‘14 (technology and international affairs consultant based in San Francisco and a Fellow of the Global Governance Futures program, “THE GROWTH OF DATA LOCALIZATION POST-SNOWDEN: ANALYSIS AND RECOMMENDATIONS FOR U.S. POLICYMAKERS AND BUSINESS LEADERS”) Brazilians, like their German counterparts, took serious umbrage when they learned that the NSA targeted their head of state—in Brazil’s case, In certain interesting ways, the Brazilian response to the Snowden revelations has mirrored that of Germany. President Dilma Rousseff. Perhaps more significantly, if less sensationally, Brazilians were angered to learn that the NSA conducted a program that infiltrated the networks of Brazil’s national oil and gas company, Petrobas.52 The parallels between Brazil and Germany have not been lost on the leaders of either of the two countries. Brazil, like Germany, is deeply scarred by its own history of military dictatorship and the system of state surveillance orchestrated by that regime. When the NSA leaks became public, President Rousseff, who herself fought against Brazil’s dictatorship as an anti-government guerilla fighter, canceled a planned U.S. visit and state dinner with President Obama.53 Later, in November, she launched a long and impassioned diatribe from the podium of the UN General Assembly against the intrusion of U.S. surveillance. 54 Acting upon their shared perceptions of the seriousness of the NSA’s transgressions, Germany and Brazil have jointly proposed a resolution on online privacy to the UN,55 and have put forward proposals to build an undersea fiber-optic cable that is intended to funnel Internet traffic between South America and Europe, without having to pass through the U.S. 56 On the home front, the Brazilian government has announced plans to abandon Microsoft Outlook for its own domestic email system that utilizes only Brazilian data centers.57 The Brazilian parliament has also recently passed its “Marco Civil da Internet,” an Internet “bill of rights”—the first major Internet policy legislation in Brazilian history—that enshrines fundamental rights for Internet users, and establishes legal obligations of Internet companies in furtherance of those rights. The Brazilian Parliament and ministries have, since 2009, been engaged in negotiations over the details of the bill, which the Center for Democracy and Technology, a prominent American technology think tank, has called a “major victory for Brazilian civil society,” in that it provides sweeping new protections for Brazilian Internet users. 58 Following the Snowden firestorm, however, some legislators proposed to expand the Marco Civil beyond its “bill of rights” function, arguing for the inclusion of a provision requiring foreign companies to store copies of all data pertaining to Brazilians in local data servers. That provision, which was initially backed by President Rousseff but has since been removed from the current bill as passed, 59 was aimed at enabling greater access for Brazilian law enforcement to data stored abroad or belonging to foreign companies. 60 While the Marco Civil was signed into law on April 23, 201461 with the most potent localization provision rescinded, one provision remained, Article 11,62 which deeply troubles international business interests, in that it extends the reach of Brazilian law to any Internet service in the world with Brazilian users. A firm based in the United States whose services are used by Brazilians could, for example, be penalized for adhering to its domestic data-disclosure laws if they conflict with Brazil’s. Penalties include fines of up to ten percent of a firm’s Brazilian revenues or even termination of the offending company’s services in Brazil.63 Additionally, immediately following the passage the Marco Civil, Brazil’s largest paper, Folha de Sao Paulo, reported that the Minister of Communications, Paulo Bernardo, stated that the government has not totally abandoned its desire to pursue a local server requirement, despite the deletion of the provision from the Marco Civil, and is considering pursuing the policy as part of a new “Data Protection Law.”64 With more than 94 million Internet users, and Facebook usage second only to the United States, 65 the Brazilian market is enormously important for the major U.S. Internet companies. It will be extremely difficult and expensive for them to remove themselves from the Brazilian market. However, if the Brazilian President elects aggressively to enforce the rules found in the Marco Civil, or if the Brazilian government pursues localization as part of other legislation such as a new data protection law, affected U.S. companies may be left with no choice but to take their business elsewhere. 73 Germany can lock Europe into defacto data localization: crushing US industry and blocking data integration and the businesses built on it. Jonah Force Hill ‘14 (technology and international affairs consultant based in San Francisco and a Fellow of the Global Governance Futures program, “THE GROWTH OF DATA LOCALIZATION POST-SNOWDEN: ANALYSIS AND RECOMMENDATIONS FOR U.S. POLICYMAKERS AND BUSINESS LEADERS”) Germany’s data localization movement is complicated by the fact that German Internet law is deeply integrated within the broader legal framework of the European Union, which itself is in the midst of a lengthy process of debate regarding a new General Data Protection Regulation (“GDPR”), a process that has been underway since 2012. As in Germany, the reaction to the Snowden revelations within other member states of the EU was overwhelmingly critical. “There’s real anxiety among consumers about how their data could be used fraudulently or without their knowledge,” said Vincent Carre, who heads Orange’s data-privacy unit. He then revealed what may be his principal interest in emphasizing this anxiety: “[European companies] are in a great position to reassure customers.”39 Following the first of Snowden’s releases, the European Parliament adopted a non-binding resolution that condemned the U.S. spying and called for Europe to respect “democratic, judicial and parliamentary safeguards and oversight in a digital society.” 40 That resolution was soon followed by another, threatening to suspend law enforcement and intelligence agreements between Europe and the U.S.41 While that threat was never carried out, and may have been largely symbolic and directed principally at the Parliament Members’ electorates, the EU has more significantly been moving forward with a range of Internet and data policy proposals, some of which could lead to data localization, even if they are not explicitly worded to do so. With total U.S. exports of digital services, including cloud-computing services, to Europe estimated at $162 billion per year, 42 these new data rules are being closely monitored by the U.S. tech industry. The EU and the U.S. have long taken different approaches to privacy and data protection governance and enforcement. 43 Under the 1995 EU Privacy Directive, organizations may only transfer personally identifiable information from the EU to countries that the European Commission has deemed to have adequate data protection laws; crucially, the U.S. has not been classified as one of those countries. In the United States, lawmakers have historically relied largely on industry self-regulation rather than law, in line with American laissez-faire principles and the long-argued assertion from industry leaders that onerous regulations constitute a hindrance to technical innovation and free competition. In order to mitigate the effects of these differences on commerce and trade, in 2001 the U.S. and EU agreed to a “Safe Harbor” framework by which companies subject to American law and European companies transferring or processing data in the U.S. were both safe from European litigation as long as they adhered to certain basic privacy principles set forth in the Directive. 44 Under this system, U.S. firms may self-certify that they meet the requirements of the Directive, allowing them to qualify at the corporate level, even though the United States does not qualify at the national level. The continued viability of the safe harbor agreement is uncertain, as many European politicians now seem to have concluded that the current arrangement is no longer adequate. In March 2014, less than a year after Snowden began releasing his stolen NSA documents, the European Parliament took a step towards a new set of data security measures intended to strengthen and expand the protections of the Privacy Directive.46 The new rules, known as the General Data Protection Regulation (which had been under discussion since 2012, but have since Snowden taken on new life and more vigorous requirements) aim to give European Union’s 250 million Internet users more say about who gets access to their personal data, and to replace the hodgepodge of privacy rules across the 28 European Union member states with a single body of law, giving businesses and citizens greater certainty about their rights and responsibilities. The European Parliament's commitment to adding force to the Privacy Directive appears to be earnest and likely, although to become law the measure will also have to be adopted by the Council of Ministers using the famously tricky-tonavigate co-decision procedure. 47 New rules would include much higher fines for firms deemed to be in violation of data protection law in the EU (including those firms located outside of Europe), a limited right of citizens to demand the deletion or limited retention of their personal data, and strict limitations on what can be done with EU citizens’ data outside the Union. Fines for violating certain rules could be as high as €100 million or up to five percent of an enterprise’s annual revenue, whichever is larger48 – an eye-popping sum. Companies such as Google could, under the new EU regulatory regime, face much higher fines for privacy breaches than the relatively trivial sums they pay today for the same violation. Perhaps most importantly, EU privacy rules now apply to the processing of EU citizens’ data, even if that data is processed in another country, a requirement that could force U.S. firms to set up additional servers in Europe. The effect of these proposed EU rules could seriously undermine the position of some U.S. firms. They would bar some firms’ practice, embedded in their business models, of selling data (not necessarily sensitive or private data) to third parties, while others use data analytic tools at odds with the new rules. Furthermore, business models aside, the rules if adopted may require U.S. firms to place their servers, and European citizen data they hold, permanently in Europe, potentially a prohibitively expensive – or even technically unfeasible – requirement. The consequences, in either case, would be de facto, if not de jure, data localization. 74 Economy- Encryption: NIST Credibility NSA surveillance of NIST standards wrecks the credibility of the industry standard security measures. The devastates security and wrecks the industry. Danielle Kehl ’14 (with Kevin Bankston, Robyn Greene & Robert Morgus, analysts at New America’s Open Technology Institute, “Surveillance Costs: The NSA’s Impact on the Economy, Internet Freedom & Cybersecurity,” July, https://static.newamerica.org/attachments/534-surveillance-costs-the-nsasimpact-on-the-economy-internet-freedom-cybersecurity/Surveilance_Costs_Final.pdf) Because of United States’ critical role in the development of the Internet, U.S.-based organizations and government agencies have historically been central to standards setting and oversight of key Internet functions, particularly through the National Institute of Standards and Technology (NIST). NIST is the Commerce Department agency responsible for setting scientific and technical standards that both the government and the private sector rely upon.239 As outlined in the 2002 Federal Information Security Management Act (FISMA), NIST has a statutory obligation to consult with the NSA on certain standards and guidelines “to assure, to the maximum extent feasible, that such standards and guidelines are complementary with standards and guidelines developed for national security systems.”240 The Snowden leaks revealed that the NSA took advantage of that position to influence the standards-setting process to weaken encryption standards to the agency’s benefit. According to documents released by The Guardian, The New York Times, and ProPublica in September 2013, the NSA “worked covertly to get its own version of a draft security standard issued by the US National Institute of Standards and Technology approved for worldwide use in 2006.”241 This standard was later adopted by the International Organization for Standardization, a body with membership from countries all over the world. A number of experts suspected that the NSA had engineered a weakness in the standard that two Microsoft cryptographers discovered in 2007, and the classified memos released last year apparently confirm that this was the case. According to The New York Times, “The N.S.A. wrote the standard and aggressively pushed it on the international group, privately calling the effort ‘a challenge in finesse.’”242 A few days after details about the compromised standard were revealed by the press, RSA Security—an American network security company that publicly fought against the Clipper Chip in the 1990s243—privately alerted its customers that they should stop using an encryption algorithm that had been influenced by the NSA. Officials advised customers that one of the cryptography components in the BSAFE toolkit and Data Protection Manager by default used a specification known as Dual_EC_DRBG when generating keys.244 Although NIST approved Dual_EC_DRBG in 2006, the Snowden documents revealed that the random number generator contained a vulnerability engineered by the NSA. According to the Wall Street Journal, the announcement marked one of the first times that a security company had acknowledged the U.S. government’s involvement in direct tampering with a product in order to facilitate access.245 The BSAFE library has been used in a number of products, including some versions of the McAfee Firewall Enterprise Control Center, and, according to Ars Technica, the backdoor “means that an untold number of third-party products may be bypassed not only by advanced intelligence agencies, but possibly by other adversaries who have the resources to carry out attacks that use specially designed hardware to quickly cycle through possible keys until the correct one is guessed.”246 Documents released a few months later, in December 2013, revealed that RSA had a secret $10 million contract with the NSA wherein the security company agreed to set the compromised standard as the default in a number of its BSAFE products. Many cryptographers and security researchers have been skeptical of the NIST process for years, although they are heavily reliant upon the organization for everything from random number generators to more complex functions.248 While NIST has said it would never “deliberately weaken a cryptographic standard,” it is unclear whether the agency was aware that the NSA was aggressively pushing for it to adopt a compromised standard.249 Both NIST and the NSA issued statements after the stories broke in September 2013 defending the standard, although NIST’s statement indicated that the agency would also evaluate its processes to ensure that they were open, transparent, and held to high professional standards.250 Yet, it is clear that, at least in part as a result of the NSA’s effort to exert its pervasive influence and perceived security expertise, NIST issued a compromised algorithm that was included for almost a decade in the cryptographic libraries of major tech companies, including Microsoft, Cisco, Symantec and RSA, because it was required for eligibility for government contracts.251 “The impact of weakening a standard may be even greater than a weakening a specific product or service because that one standard may be used in so many different products and services,” notes a recent report from the Institute of Electrical and Electronics Engineers in the U.S.252 Although some have argued that the compromised algorithm was not widely-used, its presence in a number of products nonetheless diminishes America’s reputation as a standards-setter, which is viewed as increasingly critical as foreign competition for products and software intensifies. Meddling with standards can undermine American industry, adding economic costs on top of security concerns.253 Weakening cryptographic 75 standards demonstrably harms Internet security. It also hurts the credibility of NIST, which has been directed by President Obama to draft cybersecurity guidelines for critical infrastructure including telephone systems and power plants. “Suspicions of NSA intervention in NIST standards in support of the NSA intelligence mission have a negative effect on NIST’s reputation and the credibility of the standards NIST develops… [T]hey also have a negative effect on the credibility of US industry that implements those standards and thus on international competitiveness,” observed Microsoft’s Steven B. Lipner.254 Put simply, “NIST is operating with a trust deficit right now,” said Chris Soghoian of the American Civil Liberties Union to the National Journal. 255 As part of an effort to begin rebuilding that trust, NIST announced in May 2014 that it would begin a review of its cryptographic standards and guidelines program with the help of a panel of outside experts known as the Visiting Committee on Advanced Technology (VCAT).256 In July 2014, the VCAT issued a report that examined the agency’s processes and relationship with the NSA, outlining a series of recommendations to rebuild its credibility.257 These recommendations included improving transparency and openness around NIST processes, increasing the technical staff at NIST, and clarifying NIST’s relationship with the NSA.258 As Ellen Richey, an Executive Vice President at Visa, Inc. and member of the VCAT, noted in her assessment, “The allegation that NSA has, or had, a program designed to insert weaknesses into global cryptographic standards… calls into question the integrity… of all the cryptographic standards developed by NIST,” adding that, “Participants in the development process should understand that the risk from conflicts of interest arises from the appearance of impropriety, even in the absence of actual misconduct.”259 With regard to redefining or clarifying NIST’s statutory relationship to the NSA, parallel efforts are underway in Congress as well. In May 2014, the House Science and Technology Committee voted to adopt an amendment to the Frontiers in Innovation, Research, Science, and Technology (FIRST) Act offered by Representative Alan Grayson (D-FL) which would remove the requirement that the NSA be consulted on encryption standards, allowing NIST to request NSA assistance on an as-needed basis instead.260 A similar amendment proposed by Representative Grayson that would prohibit the NSA from using appropriations funds to interfere with NIST’s security standards was approved by the House in June 2014 as part of a defense appropriations bill.261 However, it remains to be seen if such a measure will ultimately be passed into law. 76 Economy- HiTech: Every Company NSA surveillance crushes US tech competitiveness generally and drains hundreds of billions from the economy. Laura K. Donohue ’15 (Georgetown University Law Center, “High Technology, Consumer Privacy, and U.S. National Security,” http://scholarship.law.georgetown.edu/facpub/1457 ) The NSA programs, and public awareness of them, have had an immediate and detrimental impact on the U.S. economy. They have cost U.S. companies billions of dollars in lost sales, even as companies have seen their market shares II. ECONOMIC IMPACT OF NSA PROGRAMS decline. American multinational corporations have had to develop new products and programs to offset the revelations and to build consumer confidence. At the same time, foreign entities undermined U.S. trade agreement negotiations. It has spurred data localization efforts around the world, and it has raised the spectre of the future role of the United States in Internet governance. Even if opportunistic, these shifts signal an immediate and long-term impact of the NSA programs, and public knowledge about them, on the U.S. economy. A . Lost Revenues and Declining Market Share Billions of dollars are on the line because of worldwide concern that the services provided by U.S. information technology companies are neither secure nor private.13 Perhaps nowhere is this more apparent than in cloud computing. have seen revenues increase. Beyond the immediate impact, the revelation of the programs, and the extent to which the NSA has penetrated foreign data flows, has Previously, approximately 50% of the worldwide cloud computing revenues derived from the United States.14 The domestic market thrived: between 2008 and 2014, it more than tripled in within weeks of the Snowden leaks, reports had emerged that U.S. companies such as Dropbox, Amazon Web Services, and Microsoft’s Azure were losing business. 16 By December 2013, ten percent of the Cloud Security Alliance had cancelled U.S. cloud services projects as a result of the Snowden value. 15 But information.17 In January 2014 a survey of Canadian and British businesses found that one quarter of the respondents were moving their data outside the United States.18 The Information declining revenues of corporations that focus on cloud computing and data storage alone could reach $35 billion over the next three years.19 Other commentators, such as Forrester Research analyst James Staten, have put actual losses as high as $180 billion by 2016, unless something is done to restore confidence in data held by U.S. companies.20 The monetary impact of the NSA programs extends beyond cloud computing to the high technology industry. Cisco, Qualcomm, IBM, Microsoft, and HewlettPackard have all reported declining sales as a direct result of the Technology and Innovation Foundation estimates that NSA programs.21 Servint, a webhosting company based in Virginia, reported in June 2014 that its international clients had dropped by 50% since the leaks began.22 Also in June, the German government announced that because of Verizon’s complicity in the NSA program, it would end its contract with the company, which had previously provided services to a number of It’s clear to every single tech company that this is affecting their bottom line.”24 The European commissioner for digital affairs, Neelie Kroes, predicts that the fallout for U.S. businesses in the EU alone will amount to billions of Euros.25 Not only are U.S. companies losing customers, but they have been forced to spend billions to add encryption features to their services. IBM has invested more than a billion dollars to build data centers in London, Hong Kong, Sydney, and elsewhere, in an effort to reassure consumers outside the United States that their information is protected from U.S. government surveillance. 26 Salesforce.com made a government departments.23 As a senior analyst at the Information Technology and Innovation Foundation explained, “ similar announcement in March 2014.27 Google moved to encrypt terms entered into its browser. 28 In June 2014 it took the additional step of releasing the source code for End-to-End, its newly-developed browser plugin that allows users to encrypt email prior to it being sent across the Internet.29 The following month Microsoft announced Transport Layer Security for inbound and outbound email, and Perfect Forward Secrecy encryption for access to OneDrive.30 Together with the establishment of a Transparency Center, where foreign governments could review source code to assure themselves of the integrity of Microsoft software, the company sought to put an end to both NSA back door surveillance and doubt about the integrity of Microsoft products. 31 Foreign technology companies, in turn, are seeing revenues increase. Runbox, for instance, an email service based in Norway and a direct competitor to Gmail and Yahoo, almost immediately made it publicly clear that it does not comply with foreign court requests for its customers’ personal information. 32 Its customer base increased 34% in the aftermath of the Snowden leaks. 33 Mateo Meier, CEO of Artmotion, Switzerland’s biggest offshore data hosting company, reported that within the first month of the leaks, the company saw a 45% rise in revenue.34 Because Switzerland is not a member of the EU, the only way to access data in a Swiss data center is through an official court order demonstrating guilt or liability; there are no exceptions for the United States.35 In April 2014, Brazil and the EU, which previously used U.S. firms to supply undersea cables for transoceanic communications, decided to build their own cables between Brazil and Portugal, using Spanish and Brazilian companies in the process. 36 OpenText, Canada’s largest software company, now guarantees customers that their data remains Numerous foreign companies are marketing their products as “NSA proof” or “safer alternatives” to those offered by U.S. firms, gaining market share in the process. outside the United States. Deutsche Telekom, a cloud computing provider, is similarly gaining more customers.37 77 Economy- HiTech: Trend Bad Failure to restrict data surveillance will do permanent damage US economy by locking the US out of crucial markets. . Danielle Kehl ’14 (with Kevin Bankston, Robyn Greene & Robert Morgus, analysts at New America’s Open Technology Institute, “Surveillance Costs: The NSA’s Impact on the Economy, Internet Freedom & Cybersecurity,” July, https://static.newamerica.org/attachments/534-surveillance-costs-the-nsasimpact-on-the-economy-internet-freedom-cybersecurity/Surveilance_Costs_Final.pdf) The pressure is increasing on American companies to respond to the revelations in order to mitigate potential backlash and prevent foreign companies from poaching their business. According to the R Street Institute study, “It appears the NSA’s aggressive surveillance has created an overall fear among U.S. companies that there is ‘guilt by association’ from which they need to proactively distance themselves.”79 Some companies have tried to regain trust by publicly stating that they are not part of PRISM or other NSA programs, issuing disclaimers along the lines of those published by Amazon and Salesforce in June 2013.80 Others that have been directly linked to the NSA programs have publicly criticized the American government and called for greater transparency in order to rebuild user confidence and counteract potential economic harms.81 To that end, nine major American companies— AOL, Apple, Dropbox, Facebook, Google, LinkedIn, Microsoft, Twitter, and Yahoo—joined together in the “Reform Government Surveillance” campaign in January 2014, where they launched a website and wrote an open letter to government leaders laying out principles for surveillance reform, including an end to bulk collection and opposition to data localization requirements.82 Since the launch, the coalition has urged reform on Capitol Hill through outreach and letters to Congress, supported the February 2014 “The Day We Fight Back” activist campaign, and hired a lobbyist to bolster their efforts to curb the NSA’s reach.83 This unlikely, public partnership of some of Internet’s biggest rivals speaks to the seriousness of the threats to their collective business interests.84 Indeed, according to an April 2014 Harris poll commissioned by a data security company, nearly half of the 2,000 respondents (47 percent) have changed their online behavior since the NSA leaks, paying closer attention not only to the sites they visit but also to what they say and do on the Internet.85 In particular, 26 percent indicated that they are now doing less online shopping and banking since learning the extent of government surveillance programs. Clearly, there are significant financial incentives for companies to distance themselves from the programs, and as a result, they are expending capital—actual and political— to do so. Other companies have taken it a step further, developing new products or taking additional precautions to assure customers that their data is safe from the NSA. “Many tech companies feel they have no choice but to try to develop NSA resistant products because customers from China to Germany threaten to boycott American hardware and cloud services they view as compromised,” wrote USA Today in February 2014.86 Companies like Yahoo and Google have devoted increased resources to hardening their systems against NSA surveillance in order to assure users that their data is adequately protected.87 Yahoo implemented automatic encryption on its email service in January 2014, and in March 2014 began encrypting all traffic that moved between its data centers, as well as queries on its homepage and its messaging service.88 Google’s Vice President for Security Engineering, Eric Grosse, referred to efforts to protect users’ data from government surveillance as “an arms race,” when discussing the company’s move last fall to encrypt all information travelling between its data centers.89 In June 2014, Google unveiled a source code extension for the Chrome browser called “End-to-End” which is designed to make email encryption easy, and announced a new section of its transparency report called “Safer Email” which details the percentage of email that is encrypted in transit and identifies the providers who support encryption.90 These changes are part of a new focus on encouraging users and companies to harden their systems against NSA surveillance, and the strategy appears to be working. Almost immediately, Comcast announced its plans to work with Google to encrypt all email traffic exchanged with Gmail after the cable company was described as one of the worst offenders in the new report.91 Meanwhile, Microsoft has been publicizing its policy that allows customers to store their data in Microsoft data centers in specific countries.92 John E. Frank, deputy general counsel at Microsoft, told The New York Times, “We’re hearing from customers, especially global enterprise customers, that they care more than ever about where their content is stored and how it is used and secured.”93 IBM is reportedly spending over a billion dollars to build overseas data centers in an effort to reassure foreign customers that their data is protected from U.S. surveillance.94 In reference to foreign customers asking about whether their data is protected from government snooping, an IBM executive said, “My response is protect your data against any third party — whether it’s the NSA, other governments, hackers, terrorists, whatever,” adding that it is time to “start talking about encryption and VPNs and all the ways you can protect yourself.”95 Finally, faced with an impossible choice between maintaining user trust and complying with government requests, a handful of American companies that provide secure email services have had to shut down their operations altogether. Lavabit, a secure email service provider that experienced a 1,900 percent increase in account registrations after the Snowden revelations, shuttered its business after it became clear that user data could not be protected from government surveillance. When the NSA could not read Lavibit’s communications directly by breaking its encryption, the agency obtained orders compelling the company to hand over information related to its encryption keys, which would have given the NSA the ability to decrypt the communications of all 400,000 of Lavabit’s customers.96 Silent Circle, a secure communications provider that saw a 400 percent revenue increase following the Snowden revelations, followed Lavabit’s lead and shut down its secure mail service, explaining that the decision was 78 made because “we see the writing on the wall.”97 It is abundantly clear that the NSA surveillance programs are currently having a serious, negative impact on the U.S. economy and threatening the future competitiveness of American technology companies. Not only are U.S. companies losing overseas sales and getting dropped from contracts with foreign companies and governments—they are also watching their competitive advantage in fast-growing industries like cloud computing and webhosting disappear, opening the door for foreign companies who claim to offer “more secure” alternative products to poach their business. Industry efforts to increase transparency and accountability as well as concrete steps to promote better security by adopting encryption and other best practices are positive signs, but U.S. companies cannot solve this problem alone. “It’s not blowing over,” said Microsoft General Counsel Brad Smith at a recent conference. “In June of 2014, it is clear it is getting worse, not better.”98 Without meaningful government reform and better oversight, concerns about the breadth of NSA surveillance could lead to permanent shifts in the global technology market and do lasting damage to the U.S. economy. 79 Economy- HiTech: Backdoors Kill Credibility NSA back-dooring eviscerates trust in US tech industries as well as the security and stability of global networks. Danielle Kehl ’14 (with Kevin Bankston, Robyn Greene & Robert Morgus, analysts at New America’s Open Technology Institute, “Surveillance Costs: The NSA’s Impact on the Economy, Internet Freedom & Cybersecurity,” July, https://static.newamerica.org/attachments/534-surveillance-costs-the-nsasimpact-on-the-economy-internet-freedom-cybersecurity/Surveilance_Costs_Final.pdf) The U.S. government should not require or request that new surveillance capabilities or security vulnerabilities be built into communications technologies and services, even if these are intended only to facilitate lawful surveillance. There is a great deal of evidence that backdoors fundamentally weaken the security of hardware and software, regardless of whether only the NSA purportedly knows about said vulnerabilities, as some of the documents suggest. A policy statement from the Internet Engineering Task Force in 2000 emphasized that “adding a requirement for wiretapping will make affected protocol designs considerably more complex. Experience has shown that complexity almost inevitably jeopardizes the security of communications.”355 More recently, a May 2013 paper from the Center for Democracy and Technology on the risks of wiretap modifications to endpoints concludes that “deployment of an intercept capability in… communications services, systems and applications poses serious security risks.”356 The authors add that “on balance mandating that endpoint software vendors build intercept functionality into their products will be much more costly to personal, economic and governmental security overall than the risks associated with not being able to wiretap all communications.”357 While NSA programs such as SIGINT Enabling—much like proposals from domestic law enforcement agencies to update the Communications Assistance for Law Enforcement Act (CALEA) to require digital wiretapping capabilities in modern Internet based communications services358—may aim to promote national security and law enforcement by ensuring that federal agencies have the ability to intercept Internet communications, they do so at a huge cost to online security overall. Because of the associated security risks, the U.S. government should not mandate or request the creation of surveillance backdoors in products, whether through legislation, court order, or the leveraging industry relationships to convince companies to voluntarily insert vulnerabilities. As Bellovin et al. explain, complying with these types of requirements would also hinder innovation and impose a “tax” on software development in addition to creating a whole new class of vulnerabilities in hardware and software that undermines the overall security of the products.359 An amendment offered to the NDAA for Fiscal Year 2015 (H.R. 4435) by Representatives Zoe Lofgren (D-CA) and Rush Holt (DNJ) would have prohibited inserting these kinds of vulnerabilities outright.360 The Lofgren-Holt proposal aimed to prevent “the funding of any intelligence agency, intelligence program, or intelligence related activity that mandates or requests that a device manufacturer, software developer, or standards organization build in a backdoor to circumvent the encryption or privacy protections of its products, unless there is statutory authority to make such a mandate or request.”361 Although that measure was not adopted as part of the NDAA, a similar amendment sponsored by Lofgren along with Representatives Jim Sensenbrenner (D-WI) and Thomas Massie (R-KY), did make it into the House-approved version of the NDAA—with the support of Internet companies and privacy organizations362—passing on an overwhelming vote of 293 to 123.363 Like Representative Grayson’s amendment on NSA’s consultations with NIST around encryption, it remains to be seen whether this amendment will end up in the final appropriations bill that the President signs. Nonetheless, these legislative efforts are a heartening sign and are consistent with recommendations from the President’s Review Group that the U.S. government should not attempt to deliberately weaken the security of commercial encryption products. Such mandated vulnerabilities, whether required under statute or by court order or inserted simply by request, unduly threaten innovation in secure Internet technologies while introducing security flaws that may be exploited by a variety of bad actors. A clear policy against such vulnerability mandates is necessary to restore international trust in U.S. companies and technologies. 80 Economy- Impact: Global Service Sector Global service sector will allow unprecedented growth and stability. Edward Gresser ‘14 (Director, Progressive Economy, January 31, 2014 “21ST-CENTURY TRADE POLICY: The Internet and the Next Generation’s Global Economy”) “… We expect to break new ground, to create a true 21st century trade agreement. The Trans-Pacific Partnership (TPP) I intend to negotiate and conclude will reflect U.S. priorities and values, enhance American competitiveness, and generate job-creating opportunities for American businesses and workers.” – Then-U.S. Trade Representative Ron Kirk, announcing the U.S.’ decision to join the TPP, May 2009. Ambassador Kirk’s vaguely mysterious phrase – “21st -century trade agreement” – implies two things: That there is something different about trade in the 21st century, and that policy needs to evolve in response. The concept’s meaning, however, has never been entirely clear. Trade itself tends to grow over time, agreements become incrementally more complex – but this has been going on for many years. But Kirk was correct to suggest that there has also been a more abrupt change in trade: the sudden emergence of the Internet as a pathway for trade in services, for small-scale business, logistics and supply-chain management, arts and media, and more. This change does require policy to adapt and to take on some new missions. The TPP agreement is moving toward a likely conclusion this spring, and Congress has begun a discussion of Trade Promotion Authority. As both proceed, the question the uniquely ‘21st -century’ aspects of policy can help answer is about the nature of the global economy of 2030: perhaps one in which the Internet helps create a more affluent, more pluralistic, and more humane global economy; or, alternatively, one in which the digital world fragments, thickens, and ultimately comes to mirror the divisions of the physical world. INTRODUCTION Twenty years after the launch of the World Wide Web, nearly three billion individuals and millions of businesses use the Internet daily. As they search, shop, debate, and browse, they are in a practical sense moving data around the world in the form of ordered photons and electrons. The consequences materialize in the complex worlds of global banking, logistics and manufacturing; in daily life, entertainment choices, shopping, and teen texting; and in the nascent worlds of telemedicine, mobile wallets, and tailored cloud services. If the Internet develops in the next two decades as it did in the last, these everyday surprises will simply be the early signs of a more fundamental evolution: the creation of a future global economy with ethical roots in the free flow of ideas, more able than today’s to raise living standards, empower individuals and small businesses, and assist the poor. There is also an alternative future, rooted in nationalistic policy trends and data restrictions, and divergences of policies over privacy, cyber-security and other essential regulatory systems. Should this be the actual future, the Internet will evolve away from today’s still mostly open and egalitarian global space, to emerge instead as something fragmented and diminished, at least in comparison to what might be. And here is the challenge for the agreements the Obama administration has hoped to conclude – the TPP, the Trans-Atlantic Trade and Investment Partnership, and the Trade in Services Agreement, which together cover 80 percent of world Internet traffic1 , and perhaps new options at the World Trade Organization – and for Congress as it debates a Trade Promotion Authority law which can define their content. If the genuinely new feature of 21st -century trade is the digital world, the mission of 21st -century “trade policy” is to preserve the integrity of the Internet as a global space for commerce, and to encourage policies that help it develop as it should: - Free flow of data across borders, without arbitrary blockages or “forced localization”; - Rights to transparent common-good regulation (to ensure privacy, protect national security, defend public morals based on national choices, enforce copyright and libel laws), rather than arbitrary, politicized, or protectionist limits on trade; - Services guaranteed access to world markets; - Trade facilitation encouraging small shipments of goods through de minimis exemptions from tariff schedules to support individuals and small businesses as they take up larger roles in trade. - Privacy measures to ensure that diverging national laws do not rupture Internet links; - Standards-setting procedures which encourage accelerated technological advance in devices and manufacturing; - Intellectual property rules that encourage innovation and deter piracy, through strong copyright protections for innovation and content, and (as introduced by U.S. negotiators in the TPP talks) exceptions and limitations based in U.S. law which encourage cloud computing, user-created content, and new Internet services yet to be invented. It oversimplifies, but doesn’t mislead, to describe 20th-century trade policy as a long restorative effort. Launched with the New Deal Congress’s passage of the Reciprocal Trade Agreements Act in 1934 and pursued ever since, it has been an effort to repair a global economy broken by misguided policy, and to prevent similar future mistakes. Franklin Roosevelt and his allies designed 20th-century trade policy on the basis of an observation from experience, and a belief about the future. Their premise was that by raising tariffs between 1929 and 1931, the U.S. and its partners had harmed the global economy and deepened the Depression; and that this in turn had encouraged political radicalism and helped create the conditions for the Second World War. Their belief (or hope) was that if raising barriers had made the world poorer and more dangerous, reducing barriers might help rebuild prosperity, prevent a repetition of the Depression, and, over time, strengthen peace. Roosevelt’s 1945 message to Congress explains: “If it is clear that barriers to foreign trade are coming down all around the world, businessmen can and will direct production to the things that look most promising under those conditions. In that case a real and large and permanent expansion of international trade becomes possible and likely. … The purpose of the whole effort is to eliminate economic warfare, to make practical international cooperation effective on as many fronts as possible, and so to lay the economic basis for the secure and peaceful world we all desire.”2 Since then, 20th-century policy has continued across 17 more grants of Congressional negotiating authority to 12 presidents. Their negotiators have in turn completed 13 multilateral and “plurilateral” trade agreements, 15 Free Trade Agreements and 137 “accessions” to the GATT and the WTO. It is by no means complete: big economies such as India, Brazil, Egypt, South Africa often remain relatively closed, agriculture and textile trade are sharply limited almost everywhere, American home-goods tariffs remain at 1950s levels, and developing-country automotive trade barriers remain high. And while all major economies but Iran are now WTO members and 20 are FTA partners, formal acceptance of rules is obviously not the same 81 thing as full compliance. This admitted, a lot of the work begun in 1934 is done. The high barriers of the 1920s and 1930s are mostly gone, and where they still exist, WTO rules make them at least transparent and predictable. Trade flows tariff-free (or nearly so) in huge swathes of the goods economy – natural resources like gems, oil, and ore; tropical farm products like coffee, cocoa, and tea; hightech goods like medicine, medical devices, smart phones, airplanes, military gear and satellites; and consumer products from furniture and toys to beer and laptops. WTO agreements and FTAs keep customs rules transparent, make standards-setting and intellectual property rules consistent across countries, and (in a few cases) open services markets. The modern global economy combines these liberalizing policies with logistical innovation – air cargo, container shipping, express delivery – and better communications technology. It has many critics who make many valid points: competitive stress, the need for worker adjustment, challenges for border regulation, and ethical questions of equity, labor standards, and environmental policy arising in areas where rich and poor economies meet. All these require careful thought and good policy response, sometimes through the evolution of agreements and sometimes through aid, capacity-building, domestic policy, and other means. But the same critics often miss important facts. The world is considerably richer. The opening of the global economy has given the broad publics of the United States and wealthy countries an unprecedented degree of ‘mass affluence’ – fresh raspberries in winter, low-cost designer clothing, astonishingly cheap smart-phones and large-screen TVs – while encouraging a steady expansion of the middle classes of lower-income countries and a rapid recession of poverty. The world economy is more stable. No postwar financial or resource crisis has caused anything comparable to the misery of the Depression; to the contrary, in a relatively more open world economy Americans were able to raise exports by 50 percent after the 2008 crisis, helping thousands of factories stay open and keeping millions of American men and women at work. Most of all, we have come a long way toward Roosevelt’s ideal of a ‘secure and peaceful world.’ The more open world has in fact been safer: we are now in the midst of a sixth unbroken decade era of peace among the world’s great powers, a span without precedent in historical records. THE FUTURE ECONOMY: MORE AFFLUENT, MORE PLURALISTIC, MORE HUMANE Looking back, 20th-century trade policy has been a job done, obviously not perfectly but remarkably well. And now we have something new – a technology that very suddenly enables the mass transfer not of goods but of ordered information, worldwide and at very low cost. Since the World Wide Web went live in 1993, the Internet has joined the China boom as the dynamic and disruptive fact of economic life. Limited to technology enthusiasts and lab professionals in the early 1990s, largely the domain of wealthy countries in 2000, it is now a global space in which nearly 3 billion people talk, argue, share entertainment, shop, sell, and learn. By 2017, according to Cisco’s projections, its ‘population’ will be approaching 4 billion; by 2020 it should reach essentially all of the world’s businesses, schools, research labs, banks, retail outlets, artists, scientists, and middle-class shoppers. 3 The Internet’s logical development over the next two decades is toward a world of more users, more capable data centers to store information, more powerful search engines to order it, better satellites and fiber-optics to transmit it around the world, and therefore of new possibilities. Considering these possibilities, Members of Congress debating the TPA bill have the chance – as Roosevelt did in thinking about the first multilateral trade negotiations 70 years ago – to look ahead and envision something better than we now have. Fundamentally, if today’s global economy is more open, stable, and peaceful than that of the 1930s, the right policies can make the global economy of the 2030s radically more affluent, pluralistic, and humane than today’s. 1. More affluent: First, the Internet’s creation of a global services economy can make the world much wealthier. 20th-century trade policy helped bring luxury goods once available to the wealthy (or nobody at all) to a mass public. By analogy, the Internet of 2030 can bring services now reserved for an elite to the global public. What, after all, does the Internet do now? Fundamentally, it offers mass access to a torrent of products, in the form of electrons and photons arrayed as meaningful bits of data. These are Netflix videos for home theaters; CNN, the BBC, and al-Jazeera offering their various global audiences locally tailored news; iTunes and Spotify allow very small music purchases; telemedicine providing 24-hour radiological services to small-town hospitals and clinics; search engines enabling individuals to shop online, make reservations for hotels and air-flights; cloud services that allow individuals to buy sophisticated software for single or tailored use at very low cost; online banking and bill-paying; and so on. Until recently services like these crossed borders only in small volume via telephone, radio, and similar older media. And today’s flows are small and crude in comparison to what might lie ahead. The logical future is one in which more capable fiber-optics, satellites, and routers convey data held in more powerful servers, consumers use more efficient search engines and steadily more powerful software to find the information they need. As this proceeds, all sorts of services - arts and entertainment, financial services, online retailing, news and media, telemedicine, distance education and hundreds of new industries that don’t now exist will become available not just to a relatively limited rich-world public, but to a world population of five billion Internet users. Trade on this scale will support not only consumer opportunity but macroeconomic growth through new investment and employment. To adapt some figures, note that the commercial services best suited to Internet trade – arts and media, financial services, medicine, research, telecommunications, and so on – now account for about 10 percent of trade. (In practical terms this is about $2.3 trillion in exports as of 2012, as against $18.3 trillion in goods exports.) 4 But they make up a much larger 30 percent of American and other developedworld GDP. 5 Even if we ignore the potential of new demand to support new investment and industries, and assume that cross-border trade in services grows to equal its share of the U.S.’ domestic GDP, the figures are startling: Americans would export $400 billion a year more than we now do, the U.S. trade imbalance would close, and world exports would grow by nearly $3 trillion – all through the supply of services that make people’s lives richer, safer, healthier, and more fun. As the Internet allows larger quantities of data to move at lower cost, services will catch up with manufacturing – just as 20th-century policy helped manufacturing overtake agriculture and resource trade in the last century. 2. More Pluralistic: Second, the Internet will make the world economy more ‘democratic,’ by giving small businesses and individuals greater power to shape the global economy. To oversimplify, today’s world of trade in goods – the flows of clothes, tablets, beer, jewelry, and so on – is managed by large organizations. These are retailers, manufacturing complexes, logistics firms, and others using ‘big data’ to predict and satisfy consumer preference, and elaborate global value chains which create and move products efficiently from source to assembler to buyer. Small businesses participate in these value chains, but more often as vendors for distributors and suppliers of specialized parts rather than as initiators. Barriers to their direct participation in international trade are high: small businesses lack dedicated legal staff to manage customs firms, and can rarely afford to send executives abroad to find and court potential new customers. Therefore relatively few small businesses export – in the U.S., the fraction is about 4 percent. The Internet removes many of these barriers, enabling small businesses and individuals to use search engines, online auction sites, and express delivery services to find buyers, ship goods in small quantities to faraway customers, and so to become exporters. A bit of reallife illustration comes from eBay’s 2012 report Commerce 3.0: Enabling Traders to Enter and Grow on the Global Stage, which looks at eBay’s 82 own users as exporters. Again, only 4 percent of American businesses as a whole export; by contrast, 97 percent of eBay’s business users are exporters, and small businesses export nearly as much of their total sales as large businesses: “A remarkably high share of U.S. sellers on eBay engage in cross-border sales: out of those sellers considered as commercial sellers [i.e. among eBay’s business users, as opposed to individual] a staggering 97% export. … [S]mall and large sellers on eBay are almost equally likely to export: even the smallest 10% of commercial eBay sellers overwhelmingly engage in exports (94%). Small sellers on eBay export a share of 14% [of online sales] – not very different from the behavior of the largest 10% that export 18%.” 6 eBay is of course only one auction site, even if it’s quite a big one. But the Commerce Department’s annual systematic count of exporters shows the same thing. Released each April, these reports find small-business participation in trade rising fast. In the three years after the crisis, the U.S. was adding nearly 15,000 new exporting businesses a year, most of them small manufacturers employing fewer than 20 workers. 7 One can assume, though not with certainty, that these are firms using auction sites, search engines, and e-mail services to find buyers abroad. As capacity to do this grows, the future will be one in which smaller entities – businesses, artists, and families, as exporters and as choosers of the world’s goods – are much more powerful shapers of the global economy than they are today; and in which the global economy itself is if not more ‘democratic,’ then at least more pluralistic. AMERICAN SMALL BUSINESSES AS EXPORTERS8 Total exporters Small businesses* Large businesses 2001 242,000 165,000 26,000 2006 245,000 177,000 23,000 2011 302,000 233,000 23,000 * Adapted from Census Bureau “Profiles of U.S. Exporting Companies.” This table defines ‘small business’ as businesses employing 19 or fewer workers and ‘ large business’ as employing 100 or more, and assumes that businesses for which the Department does not have employment totals are overwhelmingly small. If this latter group is excluded, the total of small business exporters rises from 94,000 in 2001 to 107,000 in 2009, and since then to 114,500. 3. More humane: Finally, both trends – a more affluent world public, and a more pluralistic economy – suggest a future significantly friendlier to the poor. To be simplistic but not misleading, poor people usually have two problems to solve – they have little money, and they live far away from the main markets. The lack of money is obvious, the rural question sometimes less so. But to put figures on it, 900 million of the world’s 1.2 billion people in absolute poverty are rural people,9 as are a smaller but still disproportionate share of Americans below the national poverty line. Internet access is no cure for either. But it does help reduce the barriers both pose to efficient use of income and to higher living standards by easing access to suppliers of essential goods and services. Examples appear in many fields – education, purchase of necessities and small amenities, communication with friends and relatives – but two areas may be especially significant. One is access to a suite of basic health services – in particular monitoring of prescription medicines, chronic conditions, maternity, and radiology – in which long-distance monitoring and information flows can compensate for distance from centers of care. Rural people have higher rates of maternal mortality, infant mortality, and deaths to accident or treatable illness than anybody else. This is in part because they have little money to pay for services, but mostly because they usually live far from clinics which offer emergency services and routine care for illness and pregnancy, and very far from specialists needed to address more complex problems. Internet access via mobile phone allows regular, lowcost monitoring of patients and prescriptions at a distance, and easy, emergency consultation for patients far from urban hospitals. One recent real-world case in point comes from the Australian Broadcast Company, noting that “m-Health,” the delivery of medical advice and monitoring via cell-phone, is helping to cut maternal mortality in East Timor.10 Another is the acceleration of ‘financial inclusion’, meaning the ability of low-income people to build savings and credit, and access loans to support small businesses, via ‘mobile wallets’ and virtual accounts. Lowincome regions in poor countries have few bank branches, meaning that most people in very low-income rural areas live by no-profit bartering of goods, and save money by high-risk and interest-free hoarding of cash and jewelry. Internet access is a unique way for these people to enter modern health and financial systems. One example is a hint of what may be possible: Kenya’s online banking service m-Pesa has helped to bring 17 million people from the traditional cash economy to the world of savings, interest, and credit, by enabling them to open very small-value accounts, take out small loans, and carry money through slums without physical risk.11 The service, launched in 2007, now operates in two other African countries. … OR PERHAPS NOT Quite a prospect. But perhaps only some of it – maybe little– will actually materialize. Here we can return to 20th-century trade policy for a lesson – not to recapitulate its achievements or criticize its shortcomings, but to remember why the politicians of the 1930s invented it. Trade was of course not invented in the 1930s. The later 19th-century world economy was not primitive, quaint, closed, or fragmented. From the 1850s to the 1920s, it was open, technologically progressive, and linked more powerfully by information and logistical services than ever before. In this “steampunk” global economy, low trade barriers encouraged by a British-led treaty system joined the replacement of sail by steam. The Suez and Panama Canals cut months off maritime cargo deliveries, and the first wiring of the world through submarine telegraph cables opened instant communication to every continent by the 1870s. Finally, a series of multilateral agreements standardizing weights and measures, defining time zones, promoting international recognition of copyright and patents, and ensuring cable compatibility helped create a single world space for goods flows and information. This global economy declined and then collapsed not because it was inherently unstable or ‘overreaching.’ Rather the causes were political rivalries among great powers, and the failure of 19th-century trade policy to provide legal support to flows of goods like that created by today’s WTO agreements and Free Trade Agreements. The 19th-century treaties were relatively weak, lacking policy “bindings” comparable to those of modern agreements; and no organization like the WTO existed to keep markets open and arbitrate disputes. 12 This was convenient for hightariff politicians in 19th-century America, Germany, and France, when all relied on Britain to keep an open market. In 1884 a ‘liberalizing’ Congress could lower tariffs, and in 1890 a more conservative Congress could raise them back, without much worry in either case about foreign reaction. But in the early 1930s, when all countries raised barriers simultaneously (and then began to compete by devaluing currencies), financial crisis became Depression and collapse. The modern Internet economy has a similar weakness. A dazzling technological and engineering achievement, it has little more underpinning of policy than did the steamship-and-telegraph economy of 1913. No international agreement protects the free flow of data across borders in the way that the GATT system has provided security for flows of goods. Governments feel free to coerce investment and data storage, bias standards-setting toward local champions, and even demand local production of IT software and hardware. And WTO agreements offer few guarantees of ‘market access’ to the service industries now just beginning to send their arrays of photons across the Internet. And beyond this, Internet trade poses questions of privacy, cybersecurity and other challenges which, combining technical complexity with emotion as they do, require careful thought and international cooperation to avert the ruptures they can cause. Thus two challenges to the Internet’s future have emerged and appear likely to worsen rapidly, as governments react to lobbying campaigns by businesses and NGOs, spy scandals, and other inevitabilities of political life: Advanced-economy divergence: The United States and the European Union are not imposing severe new limits on internet use or data flows. But they are diverging rapidly in approaches to the online user privacy guarantees essential to people on the Internet using credit cards to buy and sell things, exchanging health information with hospitals, and validating identification with Social Security numbers. No longer fluid and malleable as they were in the 1990s, these divergences are setting ever more firmly in public opinion and law. They need international agreements to ensure that they do not rupture the Internet, thicken the ‘virtual borders,’ and severely degrade economic ties across the Atlantic in particular but worldwide as different countries adopt diverging models. Middle-income country ‘data nationalism’: Still more ominous, many large and fastgrowing middle- and lower-income countries are experimenting with attempts to bring economic nationalism to cyberspace. These include arbitrary and politicized limits on flows of data across borders, laws requiring local storage of data (and hence expensive multiplication of servers, pressure on world energy supplies, and so on), manufacturing of high-tech IT goods, and politicized standards-setting. Examples come 83 from four of the world’s five largest countries – China, India, Indonesia, and Brazil, together home to 2.8 billion people and nearly half of the 2 billion new Internet users.13 All are conducting ambitious and ill-advised experiments in data limitation, buy-local rules, and forced localization: 14 - Brazil has reacted to the fall’s National Security Agency eavesdropping controversy by proposing to require companies operating in Brazil and using Internet data to store that data within the country. This is justified as a security measure to protect Brazilian personal data from electronic espionage, but is obviously unlikely to deter a modern intelligence service. If the bill in question passes, on the other hand – as of this writing it is under Congressional consideration – it is likely to raise access and data storage costs, slow the growth of Latin America’s Internet use and Internet industry development, frustrate ordinary people hoping to buy and sell things, and create a fracture zone through which information moves only with difficulty and unnecessary expense. - China has created a counter-Internet surrounded by a famous “Great Firewall,” and regularly blocks international data traffic for unexplained reasons or political purposes entirely unrelated to users. - India has, in certain circumstances, required telecommunications operators and service providers to keep certain data in-country and allow access to law enforcement and security agencies. Press reports also indicated that Indian government officials placed significant pressure on certain telecommunications companies to locate servers incountry and hand over data to security services, or risk losing their ability to operate." - And Indonesia has published regulations requiring all businesses providing public services (leaving the definition of this term so far undefined) to keep data centers, and backup data centers, within national borders. All this suggests a different future for the Internet in 2020: no longer today’s single borderless space, it might instead be a virtual world of “walled cities,” “gated communities,” “national clouds” or other unpleasant metaphors depicting suspicion, fragmentation, and lost sense of global common good. Should this be the real future, the losses would be large. Money which might finance new and more efficient servers, lay advanced fiber-optics to homes, launch satellites, and research new services will instead be dissipated in building millions of redundant servers and paying off the high cost they impose on developing-country power grids. (To put this in perspective, the United States today is home to about a third of the world’s servers, and already uses about 2 percent of its power generation to store data.15) As the open protocols, borderlessness, and transnational communities of the contemporary Internet fragment, some of the wealth gained through integration and larger markets will never materialize; hopes for mHealth, financial inclusion, and other opportunities for working-class and poor communities would be reduced in scale and delayed in time. Ultimately, the online world would be permanently diminished – likely not by the kind of crisis and collapse which broke the global economy in the 1920s and the 1930s, but still emerging as something smaller, poorer, and more divided than it might have been. 21st -CENTURY TRADE POLICY: THE AGENDA Here is the challenge for the American negotiators in the TPP, TTIP and TISA; and for Congress as it considers Trade Promotion Authority. If the goal of 20th century policy was to reduce barriers and reopen a closed economy, that of 21st -century policy would be to make such a chore unnecessary. This requires agreements that keep the Internet open while ensuring rights to public-interest regulation; ensure that divergences in national policy do not rupture internet links; encourage the intellectual property and liability policies that support online innovation, artistic creation, and the lively exchange of information; and continue bolstering policies that encourage development of new and better information technology hardware. For the next three years, the goal would be to create a policy consensus through the TPP, the TTIP, and the Trade in Services Agreement. The participants in these agreements – the U.S., Japan, the 28member European Union, Australia, New Zealand, Canada, Mexico, Peru, Chile, Singapore, Malaysia, Vietnam, and others - account for most world services trade and are home to most of the world’s major Internet, software, and IT companies. Their ability to agree on the basis of 21st century trade policy would have a powerful (though of course not an inherently decisive) influence over future Internet policy, and would make it far more likely that online trade will develop as it should. If the agreements are the goal, the Trade Promotion Authority bill is a chance for Congress to set the parameters of these agreements. As it works through the bill, it should keep in mind the following goals: 1. Free Data Flow: All three agreements should ensure that data flows freely across borders, unless there is a clear and published reason based in negotiated marketaccess limits for services or public-interest regulation in areas specified as exceptions (i.e. for national security, crime control, public morals, and so on). The Joint Statement by the U.S. and European Union two years ago is a point of departure: Cross-Border Information Flows: Governments should not prevent service suppliers of other countries, or customers of those suppliers, from electronically transferring information internally or across borders, accessing publicly available information, or accessing their own information stored in other countries. Agreements need also to specify, using standard General Agreement on Trade in Services “exceptions” terminology and ‘least trade-restrictive’ regulatory principles, that governments have rights to limit and sometimes prevent flows of data, so long as they do so in a nondiscriminatory way with a clear public-good purpose, e.g. to fight spam; enforce laws against pornography, hate speech, libel, and other abuses; or endanger the public by (for example) publishing guides to production of sophisticated weapons or names of intelligence agents, and do so in a way that meets the objectives with the least restriction to data. 2. Discourage or Ban Forced Data Localization: Companies using the Internet should be free to store data in the most efficient ways, avoiding the expense and wasteful use of electric power needed to manage redundant data centers spread around dozens of countries. The agreement would create this principle, with specified exceptions for clearly valid public-policy reasons or particularly sensitive data. Again the U.S.-EU statement of 2011 provides a foundation which can be made binding through the T-TIP and TPP: Local Infrastructure: Governments should not require ICT service suppliers to use local infrastructure, or establish a local presence, as a condition of supplying services. 3. Open Markets for Services: Agreements should include a comprehensive set of marketaccess rights for services, based on a “negative-list” approach that requires countries to specify the areas in which rights to sell (either from investment or across borders) will be subject to limits, and what these limits will be. 4. Mechanisms for Privacy-Policy Compatibility: Rather than setting a single global standard – likely impossible given differences of law created since the 1990s, and different privacy priorities in different countries – trade agreements should include “Safe Harbor” clauses which enable businesses to be certified as meeting national standards and therefore enable them to shift data across borders. One model is the Safe Harbor system negotiated between the US and the EU in 1999, in which American companies have been ‘certified’ by the European Commission as compliant with EU law; other options include mutual recognition agreements or alternative legal mechanisms. 5. Trade Facilitation and De Minimis Rules: The TPP and TTIP should encourage development of express delivery services, modern customs systems which use IT (and ideally “Single Windows), and high “de minimis’ waivers for tariffs to encourage trade in very small shipments of goods. This includes rights to make deliveries via plane and ground transport, and zero-tariff policy for shipments of goods valued at less than, say, $2,000, and capacity-building programs for developing-country partners involved in the TPP, notably Vietnam, Peru, and Brunei, to ensure that they can fully participate in small-scale trade. 6. Standards-setting and approvals: Ensure transparent procedures for approving new products, where possible through voluntary multi-stakeholder standards-setting procedures rather than processes entirely led by governments. Where government-based approvals are essential, encourage use of approaches developed by FDA, CPSC, and other regulatory agencies. 7. Online Intellectual Property: The administration in the Trans-Pacific Partnership has proposed a new formula for online copyright, joining traditional advocacy for high standards of copyright protection for authors and software with explicit proposals reflecting U.S. doctrine on limitations and exceptions of rights, and ‘safe harbor’ provisions based on Digital Millennium Copyright Act provisions limiting remedies against intermediaries.16 This is a useful evolution of policy, continuing to support artists, authors and technological innovators, while as the U.S. Trade 84 Representative observes also encouraging the technologies that develop search, data analytics, cloud computing, user-generated content, crowd sourcing and other innovations. CONCLUSION Ultimately, then, “21st -century trade policy” differs from 20th-century trade policy because of its mission: rather than an attempt to repair mistakes made in the past, it is an effort to preserve the possibilities of the future. Roosevelt and the New Deal Congress in the 1930s were able to foresee, not in detail but in general, that a reintegrated world would be wealthier and more peaceful than the one in which they lived. The 20th-century agreements which followed on their work have created a global and sophisticated economy for goods trade, which raises many important questions and causes many stresses, but has made the world fundamentally wealthier and safer. In the 2010s as well, participants in the debate will not be able to see the details of the world economy of the 2030s. But there is good reason to believe that they can imagine one better than ours, and devise a policy to help create it. This is the meaning of Kirk’s elusive phrase, and the hope of the 21st -century agreements policy is genuinely breaking new ground. As Congress argues out the terms of Trade Promotion Authority and debates the TPP, it is not the only important question – but the answers they find may be the ones we remember as the 21st century wears on. 85 Economy- Impact: Developing Economies- Big Data Key Internet services allow leap-frogging by developing economies ONLY IF they avoid hardware infrastructure costs. Sara Agarwal & Parag Khanna ’15 (Director for International Finance Organizations at Hewlett Packard. She has worked for Microsoft in Africa and at the African Development Bank Parag Khanna is Senior Research Fellow at the New America Foundation, “Four Information Communication Technologies (ICTs) for Big Development Breakthroughs,” http://www.progressive-economy.org/wp-content/uploads/2015/05/HP-paper.pdf The future ubiquity of mobile communications and the Internet offers a critical platform for economic growth, social equity, and massive advances in the way education, healthcare, and other public goods are delivered—if developing countries can bridge the “digital divide”. International Data Corporation predicts worldwide ICT spending will grow to more than $3.8 trillion in 2015, with spending in emerging markets growing at a clip of 7.1 percent. The World Bank, other donors, NGOs, companies, and industry coalitions are collaborating through the Information Communication Technologies for Development initiative known as ICT4D, to help countries “leapfrog” to the latest—or next— technology standards. But four key technologies already exist to improve services including healthcare, education and transportation. To really maximize the social benefits of new investments and partnerships in ICT, developing country strategies need to focus on how to make the best use of these existing tools and services and innovate the way those technologies are adopted. Reforming procurement, mainstreaming technologies across programming, building local workforce skills, and deploying innovating financing are all critical ways to make leapfrogging in ICTs a sustainable reality. Four Technologies with Big Development Potential: Cloud, Social, Big Data and 3D Cloud Computing With cloud products, lowincome countries can standardize and digitize basic services such as document and workflow management in a wide variety of settings, while outsourcing more complicated processes. By tapping into shared infrastructure, governments can shift from the sunk costs of capital expenditure to the adaptable costs of operational expenditure, thereby paying for only the services they subscribe to and consume. Spending can focus on leasing or licensing technologies rather than acquiring expensive hardware and backend systems that cost more upfront and require skilled technicians to maintain. Four Information Communication Technologies (ICTs) for Big Development Breakthroughs In the Indian state of Karanataka, Hewlett Packard’s eProcurement System now handles the full contracting process in a single online portal that reduces the potential for corruption and cut the selection period from four months to one and a half months. In Turkey, where each municipality is responsible for its own public transportation, transport software company Kentkart deployed a cloud-based real-time General Transit Feed Specification (GTFS) system that allows all passengers with smartphones to view the live location and arrival times of buses and metros. Social Computing Real-time communications and postings on social media comprise a vast set of data that can be analyzed to provide early warnings on critical public concerns. Twitter feeds have provided indications of impending food shortages. Applications such as Google Flu Trends analyze search terms to estimate and geo-locate flu outbreaks, enabling governments to improve delivery of flu vaccines. Social connections can also enable the crowdsourcing of key data such as volunteer-based mapping to monitor deforestation or assess damage from natural disasters. Big Data Big Data goes beyond social computing to interrelate and find correlations among data. Beyond achieving efficiencies through cloud computing, big data informs decision-making processes to help countries optimize policy and social welfare. In Abijan, Ivory Coast, Orange Telecom launched a program called Data for Development that used 15 million anonymized mobile phone call data-points to correlate commuting patterns to public transportation schedules. The results were used to redraw the city’s major bus routes, reducing congestion and cutting commuting time. GE’s new artificial intelligence software is being deployed in India. The software uses historical geo-location data to predict disease risk, which can help determine where to best locate future hospitals. 3D Printing One of the most exciting new areas of technological innovation with profound implications for developing countries is 3D printing (formally known as additive manufacturing), which allows geometrically complex objects to be fabricated using 3D model data and material printing devices. 3D printed matter can be used to make everything from product prototypes to replacement parts for industrial appliances. Small-scale manufacturers and entrepreneurs can now produce items that would previously have required a much larger upfront investment. TED fellow Marcin Jakubowski recently launched the “Global Village Starter Kit” that collects blueprint and designs for agricultural tools that can be 3D printed and used by farmers wherever the kit is deployed, reducing the cost and time required to replace worn or broken tools. In basic healthcare, 3D printers are being used to make hearing aids, enabling large-scale treatment of hearing loss at more affordable prices. Overcoming Hurdles to Adoption Developing country governments are under pressure to improve 86 public sector service delivery amidst resource and capacity constraints. Breakthroughs in low-cost, high impact technologies can bridge market failures in infrastructure provision, enable more effective and equitable provision of education and healthcare, and create new models for reaching the poorest citizens. These digital breakthroughs hold the potential to deliver important social benefits, but only if we innovate how new technologies are adopted. What then can be done to accelerate the adoption of these technologies across societies in emerging markets? MODERNIZE PROCUREMENT APPROACHES: The World Bank recently tendered a request for 3500 computers for the Ukrainian government. But after consultation with the private sector, the government decided a Virtual Desktop Infrastructure (VDI) offered a better and more costeffective option by substituting for in-house data service centers. The World Bank’s existing procurement rules, however, did not allow for this switch to this system. A two-part procurement process— inviting feedback on the tender to determine the best solution prior to the second phase of actual procurement—would help bring innovation into future procurement processes. CROSS-FERTILIZE ICT SOLUTIONS INTO DEVELOPMENT PROGRAMMING: Donors tend to stovepipe technology programs, missing opportunities to mainstream low-cost ICT across programs, which would spread the benefits of these new breakthroughs. The World Bank has launched an Open Development Technology Alliance to leverage the broad base of ICT knowledge residing in companies, governments, academia and civil society and share insights with their national clients. This is a good first step, but such practices must reside within developing country governments themselves as well. With donor support, governments can set up “innovation officers” whose main duty is to spread innovative solutions across public services areas. ENHANCE WORKER TRAINING IN ICTS: Fully leveraging the benefits of new technologies requires training people in the management of operation of IT systems, analytics, and engineering. Investment in vocational education that links learning institutions to the labor market is especially relevant in developing countries. The private sector can play a critical role in spurring the creation of more market relevant educational modes. ADOPT BLENDED FUNDING MODELS: The challenge of financing the adoption of innovative technologies can be addressed through blended funding models that deliver both economic and social returns. Business sales to governments could incorporate pay-per-use models that require little to no upfront government investment, if backed by development organizations willing to absorb some of the risk. Even the more expensive featured technologies such as cloud computing can incorporate these approaches. Impact bonds are a new model in which private entities (whether companies or foundations) invest in complex technologies aimed at broad social benefit, and collect financial returns from governments and donors when the results are demonstrated. HOW TO GET FROM HERE TO THERE The private sector is deploying a wide variety of approaches to spur economic development through widespread access and adoption of ICTs, from Microsoft’s 4Afrika Initiative to Cisco’s Networking Academies, to HP’s eProcurement Systems that enable e-government offerings at low cost. Hardware and software breakthroughs such as the four discussed here make it possible for developing countries to switch to a more modular and cost-effective strategy for leveraging technology for development. But effective adoption of this spectrum of technologies in developing countries will require an all-of-the-above approach including innovative approaches to procurement, integration of technologies into development programming, education to enhance market-driven ICT skills, and long-term financial models. If the stakeholders collaborating in the ICT4D focus on advancing these approaches, developing countries can indeed catch-up and keep pace with global technology standards. 87 Economy- Impact: Developing Economies- Leap-Frogging Localization wrecks productivity in developing economies. Plan allows leap-frogging to quickly reduce poverty and create economic and political stability. Business Roundtable ‘12 (“Promoting Economic Growth through Smart Global Information Technology Policy The Growing Threat of Local Data Server Requirements,” an association of chief executive officers of leading U.S. companies with over $6 trillion in annual revenues and more than 14 million employees) When governments impose blanket restrictions on trade such as local data server requirements, they fight the battle for economic growth with one hand tied behind their backs. The service economy accounts for nearly 70 percent of both world economic output and world employment, and yet these barriers restrict the potential of businesses to deliver increased productivity and growth at a time of a crucial, fragile economic recovery in much of the developed world. When trade barriers disrupt the free flow of lawful information, they can result in a slowing of technological innovation and prevent companies from offering certain products and services, consequently dampening economic growth. These restrictions on services trade also have a negative impact on growth specifically in developing countries. Services trade is a conduit for leapfrogging the traditional path of economic development (the “agriculture to manufacturing to services” model). In the 21st century, nations have the potential to advance directly into services at an internationally competitive level, due to the scalability and efficiency of IT platforms such as the Internet and other global networks. But barriers such as local data server requirements limit these prospects. We are concerned that the disruptions that local data server requirements and other services trade barriers bring to global economic growth are set to increase. Experts expect a coming boom in services and infrastructure spending as the world moves beyond the financial crisis. However, barriers to services trade will diminish the potential for growth. Additionally, because services trade policies differ across countries, some countries’ potential for growth will be affected more negatively. The United States and the European Union are mostly open, while several of the developing nations are not. Companies from more closed markets will have an unearned advantage in profiting from the coming services and infrastructure boom if the governments of more open markets do not press for standards against barriers such as local server data requirements. 88 Solvency: Restrictions = Credibility 1/ The NSA surveillance programs destroyed US credibility- only substantial curtailment restores industry legitimacy. Laura K. Donohue ’15 (Georgetown University Law Center, “High Technology, Consumer Privacy, and U.S. National Security,” http://scholarship.law.georgetown.edu/facpub/1457 ) Documents released over the past year detailing the National Security Agency’s (“NSA”) telephony metadata collection program and interception of international content under the Foreign Intelligence Surveillance Act (FISA) implicated U.S. high technology companies in government surveillance. 1 The result was an immediate, and detrimental, impact on U.S. corporations, the economy, and U.S. national security. The first Snowden documents, printed on June 5, 2013, revealed that the government had served orders on Verizon, directing the company to turn over telephony metadata under Section 215 of the USA PATRIOT Act.2 The following day, The Guardian published classified slides detailing how the NSA had intercepted international content under Section 702 of the FISA Amendments Act.3 The type of information obtained ranged from E-mail, video and voice chat, videos, photos, and stored data, to Voice over Internet Protocol, file transfers, video conferencing, notifications of target activity, and online social networking. 4 The companies involved read like a who’s who of U.S. Internet giants: Microsoft, Yahoo, Google, Facebook, PalTalk, YouTube, Skype, AOL, and Apple. . More articles highlighting the extent to which the NSA had become embedded in the U.S. high tech industry followed. In September 2013 ProPublica and the New York Times revealed that the NSA had enjoyed considerable success in cracking commonly used cryptography. 6 The following month the Washington Post reported that the NSA, without the consent of the companies involved, had obtained millions of customers’ address book data. In one day alone, some 444,743 email addresses from Yahoo, 105,068 from Hotmail, 82,857 from Facebook, 33,697 from Gmail, and 22,881 from other providers.7 The extent of upstream collection stunned the public, as did slides demonstrating how the NSA had bypassed the companies’ encryption, intercepting data as it transferred between the public Internet and the Google cloud. 8 Documents further suggested that the NSA had helped to promote encryption standards for which it already held the key or whose vulnerabilities the agency understood but had not taken steps to address. 9 Beyond this, press reports indicated that the NSA had at times posed as U.S. companies—without their knowledge—in order to gain access to foreign targets. In November 2013 Der Spiegel reported that the NSA and the United Kingdom’s Government Communications Headquarters (“GCHQ”) had created bogus versions of Slashdot and LinkedIn, so that when employees from the telecommunications firm Belgacom tried to access the sites from corporate computers, their requests were diverted to the replica sites that then injected malware into their machines.10 As a result of the growing public awareness of these programs, U.S. companies have lost revenues, even as nonU.S. firms have benefited. 11 In addition, numerous countries, concerned about consumer privacy as well as the penetration of U.S. surveillance efforts in the economic and political spheres, have accelerated data localization initiatives, begun restricting U.S. companies’ access to local markets, and introduced new privacy protections, with implications for the future of Internet governance and U.S. economic growth. These effects raise attendant concerns about U.S. national security. It could be argued that some of these effects, such as data localization initiatives, are merely opportunistic—i.e., other countries are merely using the NSA revelations to advance national commercial and political interests.12 Even if true, however, the NSA programs provide other countries with an opportunity. They have weakened the U.S. hand in the international arena. Congress has the ability to redress the current situation. First, and most importantly, reform of the Foreign Intelligence Surveillance Act would provide for greater restrictions on NSA surveillance. Second, new domestic legislation could extend better protections to consumer privacy. These shifts would allow U.S. industry legitimately to claim a change in circumstance, which would help them to gain competitive ground. Third, the integration of economic concerns at a programmatic level within the national security infrastructure would help to ensure that economic matters remain central to national security determinations in the future. 89 Solvency: Restrictions = Credibility 2/ Only limiting NSA programs can restore data credibility. Danielle Kehl ’14 (with Kevin Bankston, Robyn Greene & Robert Morgus, analysts at New America’s Open Technology Institute, “Surveillance Costs: The NSA’s Impact on the Economy, Internet Freedom & Cybersecurity,” July, https://static.newamerica.org/attachments/534-surveillance-costs-the-nsasimpact-on-the-economy-internet-freedom-cybersecurity/Surveilance_Costs_Final.pdf) The United States must act immediately to restore the credibility of the Internet Freedom agenda, lest it become another casualty of the NSA’s surveillance programs. As described in Part IV, various agencies within the U.S. government have taken initial steps to demonstrate goodwill in this area, particularly through the NTIA’s announcement that it intends to transition stewardship of the IANA functions to a global multistakeholder organization and the State Department’s speech outlining six principles to guide signals intelligence collection grounded in international human rights norms. However, it will take a broader effort from across the government to demonstrate that the United States is fully committed to Internet Freedom, including firmly establishing the nature of its support for the evolving multistakeholder system of Internet governance and directly engaging with issues raised by the NSA surveillance programs in international conversations. Supporting international norms that increase confidence in the security of online communications and respect for the rights of Internet users all around the world is integral to restoring U.S. credibility in this area. “We have surveillance programmes that abuse human rights and lack in transparency and accountability precisely because we do not have sufficiently robust, open, and inclusive debates around surveillance and national security policy,” writes Matthew Shears of the Center for Democracy & Technology.339 It is time to begin having those conversations on both a national and an international level, particularly at key upcoming Internet governance convenings including the 2014 Internet Governance Forum, the International Telecommunications Union’s plenipotentiary meeting, and the upcoming WSIS+10 review process.340 Certainly, the United States will not be able to continue promoting the Internet Freedom agenda at these meetings without addressing its national security apparatus and the impact of NSA surveillance on individuals around the world. Rather than being a problem, this presents an opportunity for the U.S. to assume a leadership role in the promotion of better international standards around surveillance practices. Moreover, the U.S. should take steps to further internationalize its Internet Freedom efforts writ large and work with foreign governments to broadly promote democracy and human rights online. In 2011, Richard Fontaine and Will Rogers of the Center for a New American Security wrote that “the United States should counter the view that Internet Freedom is merely an American project cooked up in Washington, rather than a notion rooted in universal human rights… The response to [concerns about the Internet Freedom agenda’s ties to U.S. foreign policy should be] to internationalize the effort.”341 Today, more than ever, it is critical that the United States heed this advice and take steps to broaden the base of support for the Internet Freedom agenda. Future meetings and activities of the Freedom Online Coalition, which the State Department played a key role in convening, will serve as one test of these efforts as the group attempts to transition from a discussion forum for like-minded governments into a more action-oriented coalition.342 The United States has the opportunity to urge other member countries to live up to the commitments they made at the 2014 meeting in Tallinn with respect to accountability, transparency, and other policies grounded in human rights. As Toomas Hendrik Ilves, the President of Estonia, articulated in his remarks at the 2014 meeting, “We must be honest with ourselves and admit that recent developments regarding purported surveillance by the NSA and similar organisations in different countries make the defense of an open Internet more difficult. That, too, is a challenge that Freedom Online Coalition must face.”343 Outside of the Freedom Online Coalition, but consistent with its goals, the U.S. can urge both companies and foreign governments to join organizations like the Global Network Initiative or commit to other voluntary processes that promote the centrality of human rights in the policymaking process.3 90 Solvency: Reframing Solves Opposition The plan reframes surveillance as an economic failure: this will leverage support from developing countries. Jonah Force Hill ‘14 (technology and international affairs consultant based in San Francisco and a Fellow of the Global Governance Futures program, “THE GROWTH OF DATA LOCALIZATION POST-SNOWDEN: ANALYSIS AND RECOMMENDATIONS FOR U.S. POLICYMAKERS AND BUSINESS LEADERS”) Work to reframe the privacy and surveillance discussion to one of security and economics Localization has been debated since the beginning of Snowden’s revelations largely as an answer to privacy and surveillance concerns. Certainly, there is another “narrative” worthy of discussion, and to that end industry should work to alter the one-sided nature of the current discussion by including the issues of cybersecurity, cyber crime, economic integration, and Internet freedom. For developed countries, messaging to counter localization should focus on the urgent need to combat cybercrime and improve cyber security,128 the adverse effects on freedom of expression, and interference with the expansion of Internet-borne commerce at just the time that their economies are emerging from the Great Recession. These views might resonate within developing countries as well, as would the additional argument that localization could leave them permanently on the poorer side of the “digital divide.” 91 2AC Frontlines 92 Cyber-Security Frontline 1/ Turn: NSA Over-reach wrecks security- 5 Warrants: Emboldens hostile actors Undermines global norms Distracts from more genuine threats Weakens US leverage on security cooperation Drives traffic underground Laura K. Donohue ’15 (Georgetown University Law Center, “High Technology, Consumer Privacy, and U.S. National Security,” http://scholarship.law.georgetown.edu/facpub/1457 ) C. Unintended Harmful Consequences There are various ways in which the NSA’s apparent failure to take account of the potential impact of public knowledge of the programs on U.S. industry may have acted to undermine U.S. security beyond weakening the economy. The backlash risks shielding foreign government actions from public scrutiny. It potentially undermines the ability of the United States to develop international norms against ubiquitous surveillance, which can be used for political or economic espionage. And it raises the possibility that the country will lose digital sight of active threats against the United States. As was previously noted, the data localization movement, given momentum by the NSA revelations, risks the creation of distinct, parallel Internets, which would stifle the free flow of information that connects not just economies, but cultures and people, with potential rollbacks for an increasingly globalized world. This would affect the country’s interest in democratic engagement and it would harm the United States’ international reach. The creation of national search engines, national email systems, and national social networks, moreover, means that foreign governments will have direct control over electronic communication networks, facilitating censorship and domestic surveillance and limiting outside view of the extent to which such steps are being taken. When Turkish Prime Minister Recep Erdoğan, for instance, tried to shut town Twitter, the international community was immediately put on notice. 111 #TwitterisblockedinTurkey #dictatorerdogan, and #occupytwitter quickly moved to popular trending topics internationally. 112 The United States, EU, and others formally objected to the action through diplomatic channels. Had Turkey been an isolated network, it may have secretly censored the politically damaging information (in this case, leaks revealing corruption in the Erdoğan government), without generating such immediate, international attention. Along the same lines, in July 2014 President Vladimir Putin signed a new law requiring Internet companies to store all Russian users’ data within domestic borders. Russia’s media and parliament members have used Edward Snowden’s leaks about NSA spying to rally support for the new law. 113 The legislation, though, serves to intensify Putin’s control over Internet companies. 114 With internal data centers, it will be easier for the Russian president to enforce censorship policies and to collect information about members of the political opposition. The law could also give Putin an excuse to shut down major social media networks if they fail to comply with the new regulations. The NSA revelations also have undermined U.S. credibility in challenging other countries’ efforts to obtain trade secrets and other information through state surveillance. China provides one of the strongest examples. Because of the NSA programs, U.S. objections to China selling surveillance technology to oppressive regimes look rather weak. Post-Snowden, Chinese efforts have become even more public and devastating to U.S. interests. Since 2005, when President Mahmoud Ahmadinejad first took office, Iran has stated its plan to develop a national Internet network.115 In the intervening decade, the country has been unable to do so. But in January 2014 Iran’s Ministry of Communications and Information Technology announced that China would officially be collaborating with them on the creation of the National Information Network. 116 Part of Iran’s aim has been to develop a system that allows the country to turn off the international components of the Internet, in a way that will enable the government and domestic banking industry to continue to operate. With more than half the population under age 35, Iran has a tech-savvy citizenry, which has, to date, found various ways around government efforts to block social media and other international sources. It is not clear whether Iran will be able to completely divest itself of access to the world wide web. What is clear is that in a post-Snowden era, their efforts to do so are being facilitated by countries with interests diametrically opposed to the United States. Online warfare between China and the United States simmered in the background, until in early 2013 the Obama Administration began to make it center stage. In January 2013, the New York Times reported that Chinese hackers had infiltrated its computers following a threat that if the paper insisted on publishing a story about its prime minister, 93 consequences would follow. 117 The following month, a security firm, Mandiant, revealed that the Chinese military unit 61398 had stolen data from U.S. companies and agencies. 118 In March 2013 President Obama’s national security advisor publicly urged China to reduce its surveillance efforts—after which classified documents leaked to the public demonstrated the extent to which China had infiltrated U.S. government servers. 119 In May 2013, the National Security Advisor flew to China to lay the groundwork for a summit, in which cyber surveillance would prove center stage.120 Two days before the Obama-Xi meeting was scheduled to take place, The Guardian ran the first story on the NSA programs. 121 On June 7, when Obama raised the question of Chinese espionage, Xi responded by quoting the Guardian and suggesting that the U.S. should not be lecturing the Chinese about surveillance.122 Although differences may mark the two countries’ approaches to surveillance (e.g., in one case for economic advantage, in the other for political or security advantage), the broader translation for the global community has been one in which the United States has lost high ground to try to restrict cyber-surveillance. A final point is worth noting in this context: namely, to the extent that nonU.S. companies are picking up customers and business overseas, the United States’ ability to conduct surveillance may be further harmed—thus going directly to the country’s national security interests. In other words, it may be in the country’s best interests to keep traffic routed through U.S. companies, which would allow the national security infrastructure, with appropriate legal process, to access the information in question. The apparent overreach of the NSA, however, may end up driving much of the traffic elsewhere, making it harder for the United States to obtain the information needed to protect the country against foreign threats. 94 Cyber-Security Frontline 2/ 4 More Bonus Warrants for Your Flowing Pleasure: Total Defense: location is irrelevant to data security Weakened Industry destroys security infrastructure- private tech key Plan is a prerequisite: Only international cooperation can solve cyber security On-Balance: Countries that are pushing localization have weaker infrastructure. Jonah Force Hill ‘14 (technology and international affairs consultant based in San Francisco and a Fellow of the Global Governance Futures program, “THE GROWTH OF DATA LOCALIZATION POST-SNOWDEN: ANALYSIS AND RECOMMENDATIONS FOR U.S. POLICYMAKERS AND BUSINESS LEADERS”) Data Localization: An Unsound Policy Whatever mix of purposes constitute the “true” motivations behind the data localization movement, whether domestic industry protectionism, political opportunism, or a genuine – if misplaced – desire for improved data privacy and security, the reality is that data localization, in all of its various forms, creates serious problems without offering many, if any, actual benefits. The problems are manifest not just on a global scale of the efficiency of the Internet, but critically for the specific countries considering the policies. Moreover, some of the localization proposals under consideration – specifically, limitations on data flows to or around specific geographies – would likely require a fundamental restructuring of the Internet’s core technical architecture and governance systems, a restructuring that carries with it its own serious drawbacks. Security and Counter-Surveillance Objectives are Not Well Served Looking first at data security (the enhancement of which is the ostensible reason for most localization proposals), there is little reason to believe that any of the proposals under consideration would do much, if anything, to mitigate the problems as they have been defined. Data security is ultimately not dependent on the physical location of the data or the location of the infrastructure supporting it. Data breaches can and do occur anywhere. Security is instead a function of the quality and effectiveness of the mechanisms and controls maintained to protect the data in question. Has an Internet service organization put in place comprehensive security policies, and has it routinely audited its software and infrastructure to identify and address security vulnerabilities? These are the useful procedures to protect data. Hence, as a purely technical issue (i.e., irrespective of matters of law and politics), there are few reasons to suspect that a server in Germany will be any safer from attack by those seeking to access information than is a server in the United States, or in Costa Rica for that matter, assuming that they use the same technology and follow the same security procedures. Advocates for data localization who understand this fact often point to jurisdictional differences between nations as a reason to keep data local. Data stored in the U.S. is unsafe, they argue, because it can be obtained by the NSA under legal coercion. Data localization (as a restriction on data storage abroad), they insist, would negate this risk. While this may be true in certain respects, the argument omits an important reality, namely that while locating data beyond the borders of the United States might preclude the NSA or FBI from obtaining data via a subpoena or other formal legal mechanism, moving data abroad could actually empower the NSA by lowering the legal threshold required to obtain that same data by way direct intrusion into foreign data servers or data links. As was mentioned briefly above, U.S. domestic law (as it is currently written and interpreted) puts fairly strict limits on the collection of intelligence information on American soil. Data capture outside the U.S., by contrast, even when that data is in the hands of American firms, is in large measure legally permissible when there is a “national security interest,” a fairly broad criterion. Data localization (as a local data requirement) could potentially give the NSA greater freedom to mine data, not less.104 Furthermore, while moving data into the servers outside the U.S. may prevent the U.S. government from obtaining certain types of data via subpoena (ignoring the direct intrusion distinction for a moment), data localization in that form would, at the same time, give domestic intelligence agencies of the home country increased data collection powers over their citizens’ data. Given the fact that it is those domestic agencies and their governments, and not the NSA and the United States, that can more immediately impose and enforce coercive measures upon the citizens, those citizens need to ask themselves, first, which presents the greater threat to their liberty generally, and to the security of their personal information in particular? And, once recognizing that one’s own government may not be trusted to abjure obtaining data of its citizens, is a domestic company possessing the data more or less likely than a giant like Google to knuckle under to the demands of one’s own government? With respect to most of the nations of the world, where there exist scant judicial independence and little governmental transparency, the questions, I would argue, are answered in the asking.105 Ultimately, the only real solution to the kinds of security and surveillance problems brought into the open by 95 the Snowden disclosures lies in international negotiations, agreements, and the development of norms of state behavior. But besides that, what matters is whether or not the organizations hosting the data are protecting that data with the best possible security mechanisms and technology available, and being as transparent as they can be about how they cooperate with intelligence organizations. Accordingly, Internet users should have the freedom to decide which organizations, which companies, are best equipped and able to protect security and offer transparency, whether a Google, an Amazon or a domestic provider. With a number of studies showing that Brazil,106 Indonesia,107 and many of the other countries considering localization are among the least well-equipped nations to protect their data, the argument that limiting competition in the market, limiting the options available to firms, and potentially jettisoning the most security-competent technology companies available would somehow improve security, rather than degrade it, is nonsense. 96 Cyber-Security Frontline 3/ And 1 More independent Mechanism: NSA surveillance destroys trust in Data Integrity- which wrecks data security at the core. Danielle Kehl ’14 (with Kevin Bankston, Robyn Greene & Robert Morgus, analysts at New America’s Open Technology Institute, “Surveillance Costs: The NSA’s Impact on the Economy, Internet Freedom & Cybersecurity,” July, https://static.newamerica.org/attachments/534-surveillance-costs-the-nsasimpact-on-the-economy-internet-freedom-cybersecurity/Surveilance_Costs_Final.pdf) We have previously focused on the economic and political repercussions of the NSA disclosures both in the United States and abroad. In this section, we consider the impact on the Internet itself and the ways in which the NSA has both weakened overall trust in the network and directly harmed the security of the Internet. Certainly, the actions of the NSA have created a serious trust and credibility problem for the United States and its Internet industry. “All of this denying and lying results in us not trusting anything the NSA says, anything the president says about the NSA, or anything companies say about their involvement with the NSA,” wrote security expert Bruce Schneier in September 2013.225 However, beyond undermining faith in American government and business, a variety of the NSA’s efforts have undermined trust in the security of the Internet itself. When Internet users transmit or store their information using the Internet, they believe—at least to a certain degree—that the information will be protected from unwanted third-party access. Indeed, the continued growth of the Internet as both an economic engine and an as avenue for private communication and free expression relies on that trust. Yet, as the scope of the NSA’s surveillance dragnet and its negative impact on cybersecurity comes into greater focus, that trust in the Internet is eroding.226 Trust is essential for a healthy functioning society. As economist Joseph Stiglitz explains, “Trust is what makes contracts, plans and everyday transactions possible; it facilitates the democratic process, from voting to law creation, and is necessary for social stability.” Individuals rely on online systems and services for a growing number of sensitive activities, including online banking and social services, and they must be able to trust that the data they are transmitting is safe. In particular, trust and authentication are essential components of the protocols and standards engineers develop to create a safer and more secure Internet, including encryption.228 The NSA’s work to undermine the tools and standards that help ensure cybersecurity—especially its work to thwart encryption—also undermines trust in the safety of the overall network. Moreover, it reduces trust in the United States itself, which many now perceive as a nation that exploits vulnerabilities in the interest of its own security.220 This loss of trust can have a chilling effect on the behavior of Internet users worldwide.230 Unfortunately, as we detail below, the growing loss of trust in the security of Internet as a result of the latest disclosures is largely warranted. Based on the news stories of the past year, it appears that the Internet is far less secure than people thought—a direct result of the NSA’s actions. These actions can be traced to a core contradiction in NSA’s two key missions: information assurance—protecting America’s and Americans’ sensitive data—and signals intelligence—spying on telephone and electronic communications for foreign intelligence purposes. In the Internet era, these two missions of the NSA are in obvious tension. The widespread adoption of encryption technology to secure Internet communications is considered one of the largest threats to the NSA’s ability to carry out the goals of its signals intelligence mission. As the National Journal explained, “strong Internet security actually makes the NSA’s job harder.”231 In the 1990s, the NSA lost the public policy battle to mandate that U.S. technology companies adopt a technology called the “Clipper Chip” that would give the government the ability to decrypt private communications,232 and since then strong encryption technology has become a bedrock technology when it comes to the security of the Internet. The NSA lost that early battle against encryption, sometimes called the “Crypto War,”233 not only due to vocal opposition from privacy and civil liberties stakeholders, but also because the private sector convinced policymakers that subverting the security of American communications technology products would undermine the U.S. technology industry and the growth of the Internet economy as a whole.234 However, as an explosive New York Times story first revealed in September 2013, the NSA has apparently continued to fight the “Crypto War” in secret, clandestinely inserting backdoors into secure products and working to weaken key encryption standards.235 “For the past decade, N.S.A. has led an aggressive, multipronged effort to break widely used Internet encryption technologies,” said a 2010 memo from the Government Communications Headquarters (GCHQ), the NSA’s British counterpart. “Cryptanalytic capabilities are now coming online. Vast amounts of encrypted Internet data which have up till now been discarded are now exploitable.” Given the amount of information the NSA is collecting, it is not surprising that the agency would also take aggressive steps to improve its ability to read that information. According to the “black budget” released by The Washington Post in August 2013, 21 percent of the intelligence budget (roughly $11 billion) goes toward the Consolidated Cryptologic Program, with a staff 97 of 35,000 in the NSA and the armed forces’ surveillance and code breaking units.237 “The resources devoted to signals intercepts are extraordinary,” wrote Barton Gellman and Greg Miller.238 However, the agency has employed a variety of methods to achieve this goal far beyond simple code-breaking—methods that directly undermine U.S. cybersecurity, not just against the NSA, but also against foreign governments, organized crime, and other malicious actors. In this section, we consider four different ways that the NSA has damaged cybersecurity in pursuit of its signals intelligence goals: (1) by deliberately engineering weaknesses into widely-used encryption standards; (2) by inserting surveillance backdoors in widely-used software and hardware products; (3) by stockpiling information about security vulnerabilities for its own use rather than disclosing those vulnerabilities so that they can be remedied; and (4) by engaging in a wide variety of offensive hacking techniques to compromise the integrity of computer systems and networks around the world, including impersonating the web sites of major American companies like Facebook and LinkedIn. 98 Cyber-Security EXT NSA surveillance is counterproductive after Snowden because it deters storing data in the US or passing data through US servers. Laura K. Donohue ’15 (Georgetown University Law Center, “High Technology, Consumer Privacy, and U.S. National Security,” http://scholarship.law.georgetown.edu/facpub/1457 ) III. ECONOMIC SECURITY AS NATIONAL SECURITY The NSA programs illustrate lawmakers’ failure to recognize the degree to which economic strength is central to national security, as well as the importance of the high technology industry to the U.S. economy. The concept of economic security as national security is not new: the Framers and the generations that followed acknowledged the importance of economic strength as central to national security. Our more recent understandings, however, have gotten away from the concept, in the process cleaving important interests out of the calculations required to accurately understand the implications of government actions. Unintended consequences have resulted. The Snowden leaks, for instance, may have driven bad actors to seek nonU.S. companies for ISP services, creating gaps in insight into their operations. They have also undermined U.S. efforts to call other countries to heel for their exploitation of international communications to gain advantages over U.S. industry. In sum, the expansive nature of the programs may well have acted to undermine U.S. national security in myriad ways linked to the country’s economic interests. 99 Topicality: Domestic Surveillance 1/ PRISM grabs data off SEVERS HELD INSIDE the US. Jonah Force Hill ‘14 (technology and international affairs consultant based in San Francisco and a Fellow of the Global Governance Futures program, “THE GROWTH OF DATA LOCALIZATION POST-SNOWDEN: ANALYSIS AND RECOMMENDATIONS FOR U.S. POLICYMAKERS AND BUSINESS LEADERS”) U.S. Companies Deemed Untrustworthy For a great many around the globe, the Snowden disclosures revealed a disturbing relationship between the major U.S. technology firms and the American national security establishment. Specifically, the disclosures showed that Yahoo, Google, and other large American tech companies had provided the NSA with access to the data of the users of their services. Although there were many programs that tied the major American firms to the NSA, three in particular drew special ire: the much-discussed PRISM program, a collaborative effort between the NSA and the FBI which compelled Internet companies to hand over data held within servers located on U.S. soil in response a subpoena issued by a special intelligence court, and two programs known as MUSCULAR and TEMPORA,89 both of which allowed the NSA (in partnership with Britain’s signals intelligence agency, the GCHQ) to access information transmitted through the data communication links of American-owned firms located outside the U.S., where statutory limitations on data collection are far less stringent. The fact that American companies provided the U.S. government with information and access to data (knowingly in some cases, apparently unwittingly in others) has led many foreign leaders to conclude that only domestic firms – or at least non-American firms – operating exclusively within local jurisdictions, can be trusted to host the data of their citizens. Prominent political voices around the globe have been anything but subtle in their articulation of this assessment. Following the publication of the PRISM program in the Guardian newspaper, German Interior Minister Hans-Peter Friedrich declared that, “whoever fears their communication is being intercepted in any way should use services that don't go through American servers.”11 France’s Minister for the Digital Economy similarly insisted that it was now necessary to “locate datacenters and servers in [French] national territory in order to better ensure data security.”12 Brazilian President Dilma Rousseff agreed, insisting that, "there is a serious problem of storage databases abroad. That certain situation we will no longer accept."13 Unsurprisingly, these declarations from government officials at the ministerial level and higher, and the policy responses those declarations suggest, are profoundly troubling to American technology companies. U.S. firms have issued dire warnings in response,14 predicting that they could lose tens of billions of dollars in revenue abroad as distrustful foreign governments and customers move – either by choice or by legal mandate – to non-U.S. alternatives. Firms fear that the anti-American backlash and potentially resulting data localization laws (depending on the specifics of the rules enacted) will mean that they will be forced out of certain markets, or forced to build expensive – and oftentimes unnecessarily redundant – data centers abroad. Analysts are suggesting the fallout could mirror what happened to Huawei and ZTE, the Chinese technology and telecommunications firms that were forced to abandon some U.S. contracts when American lawmakers accused the companies of planting in their products coding “backdoors” for the Chinese People’s Liberation Army and intelligence services. 15 A much-cited estimate16 by the Information Technology and Innovation Foundation, an independent think-tank, confirmed American tech firms’ worst fears when it opined that the U.S. cloud computing industry alone could lose between $21.5 billion and $35 billion over the next three years as a result of the NSA backlash.17 100 Topicality: Domestic Surveillance 2/ Section 702 allows NSA collection of server data IN THE UNITED STATES. There are also separate programs OUTSIDE of the UNITED STATES. Danielle Kehl ’14 (with Kevin Bankston, Robyn Greene & Robert Morgus, all are analysts at New America’s Open Technology Institute, “Surveillance Costs: The NSA’s Impact on the Economy, Internet Freedom & Cybersecurity,” July, https://static.newamerica.org/attachments/534-surveillance-costs-thensas-impact-on-the-economy-internet-freedom-cybersecurity/Surveilance_Costs_Final.pdf) Over the course of the past year, the world has learned that this bulk collection program was just one small part of the NSA’s massive surveillance apparatus.4 Just a day after the first leak, The Washington Post ran a story about PRISM, the NSA’s “downstream” collection program authorized under Section 702 of the Foreign Intelligence Surveillance Act (FISA). Under the PRISM program, the NSA compels major tech companies like Google, Yahoo, Microsoft, Facebook, and Twitter to turn over the contents of communications stored on company servers that have been sent or received by targets that the NSA reasonably believes are outside of the United States.5 While few details are known about the programs the NSA operates under Section 702, and several of the details regarding the PRISM program are a subject of debate,6 a declassified 2011 Foreign Intelligence Surveillance Court opinion revealed that the NSA collects more than 250,000,000 Internet communications annually using Section 702 and that “the vast majority of these communications are obtained from Internet service providers” through the PRISM program.7 The remainder of those communications comes from Section 702 surveillance that is conducted “upstream”—that is, surveillance conducted not by obtaining stored communications from cloud providers’ servers but by tapping directly into the U.S. Internet backbone network that carries domestic, international, and foreign communications.8 Beyond NSA surveillance inside the United States under Section 215 and Section 702, the NSA engages in massive surveillance of Internet and telephone communications outside of the country as well. 101 K Frontline Turn: Counter-hegemonic discourse feeds data localization. Jonah Force Hill ‘14 (technology and international affairs consultant based in San Francisco and a Fellow of the Global Governance Futures program, “THE GROWTH OF DATA LOCALIZATION POST-SNOWDEN: ANALYSIS AND RECOMMENDATIONS FOR U.S. POLICYMAKERS AND BUSINESS LEADERS”) Populist Politics and Anti-Globalization Finally, data localization makes for good old-fashioned populist politics, useful in democratic and authoritarian governments alike. People around the world have been deeply and genuinely unsettled by the Snowden revelations. They see the NSA and the United States generally as engaged in the flagrant and comprehensive violation of their privacy, foreshadowing perhaps an Orwellian future to come.101 Data localization not only seems to offer a simple response to this American challenge to privacy, simple for politicians to explain and simple for citizens to understand. It also serves as a political repudiation not only of dragnet surveillance generally, but of the American government and the American tech sector that is complicit in that government’s misconduct. AntiAmericanism is nothing new, nor is its sometimes cynical use by politicians. But in the digital age, it has new faces: Google instead of Coca-Cola, and the government employee with a computer rather the soldier with an M-16 rifle. In an environment in which most Germans consider Edward Snowden a hero, 102 not a villain, and more than a million Brazilians signed a petition requesting that President Rousseff grant Mr. Snowden asylum,103 data localization is political gold. The link between data localization programs and populist politics may also be drawing on a climate of anti-globalization and a desire to move away from a globally integrated, and perhaps American-hegemonic, Internet. Of course, globalization is understood by its critics to be broader than the ambitions of the United States. Nevertheless, it is above all the United States and its enormously powerful companies that represent all that the critics find morally suspect in globalization. And no American companies have an international reach comparable to that of the great tech companies. A cab driver in Rio, a fruit vendor in Cairo or an elementary school teacher in Delhi may have never heard of JP Morgan, but they are likely to encounter Google and Facebook daily. These companies have become the face of American power in the early decades of the Twentieth Century, and however useful they may be in the lives of these people, they are intrusive in a way that no bank can ever be. They, together with the NSA with which they now linked, are seen by millions to be exercising subtle and nefarious power that reaches into every neighborhood and home. How can foreign governments rein in that power, and seem to respond to popular demands to be protected from these forces from abroad? Data localization schemes may be one response. As I argue below, localization in fact will not accomplish this or most any other desirable objective, but for now antiglobalization provides a forceful political impetus to plans to restrict the reach of those companies. 102