Social Media Negative File Keryk Kuiper (Iowa City High) – Kerykk@gmail.com – feel free to email me or find me at any point if you are confused or have questions Zahir Shaikh (Blake) Clare McGraw (Juan Diego) Alan Hughes (Harker) Quick notes For every off that is original I have included both the 1nc and the 2nc but for everything that we have a preexisting file for I have only put the 1nc. I think the counterplan is probably the best way to go - that or the narcissism kritik - and T you can maybe win because it's not direct curtailment but it would be hard. Biometrics Frontlines 1nc ( ) If surveillance protects society it is de facto justified. Posner 6 — Richard A. Posner, Senior Lecturer in Law at the University of Chicago, Judge on the United States Court of Appeals for the Seventh Circuit in Chicago, was named the most cited legal scholar of the 20th century by The Journal of Legal Studies, holds an LL.B. from Harvard University, 2006 (“Wire Trap,” New Republic, February 6th, Available Online at http://www.newrepublic.com/article/104859/wire-trap, Accessed 04-16-2015) The revelation by The New York Times that the National Security Agency (NSA) is conducting a secret program of electronic surveillance outside the framework of the Foreign Intelligence Surveillance Act (FISA) has sparked a hot debate in the press and in the blogosphere. But there is something odd about the debate: It is aridly legal. Civil libertarians contend that the program is illegal, even unconstitutional; some want President Bush impeached for breaking the law. The administration and its defenders have responded that the program is perfectly legal; if it does violate FISA (the administration denies that it does), then, to that extent, the law is unconstitutional. This legal debate is complex, even esoteric. But, apart from a handful of not very impressive anecdotes (did the NSA program really prevent the Brooklyn Bridge from being destroyed by blowtorches?), there[s] has been little discussion of the program’s concrete value as a counter-terrorism measure or of the inroads it has or has not made on liberty or privacy. Not only are these questions more important to most people than the legal questions; they are fundamental to those questions. Lawyers who are busily debating legality without first trying to assess the consequences of the program have put the cart before the horse. Law in the United States is not a Platonic abstraction but a flexible tool of social policy. In analyzing all but the simplest legal questions, one is well advised to begin by asking what social policies are at stake. Suppose the NSA program is vital to the nation’s defense, and its impingements on civil liberties are slight. That would not prove the program’s legality, because not every good thing is legal; law and policy are not perfectly aligned. But a conviction that the program had great merit would shape and hone the legal inquiry. We would search harder for grounds to affirm its legality, and, if our search were to fail, at least we would know how to change the law--or how to change the program to make it comply with the law--without destroying its effectiveness. Similarly, if the program’s contribution to national security were negligible--as we learn, also from the Times, that some FBI personnel are indiscreetly whispering--and it is undermining our civil liberties, this would push the legal analysis in the opposite direction. Ronald Dworkin, the distinguished legal philosopher and constitutional theorist, wrote in The New York Review of Books in the aftermath of the September 11 attacks that “we cannot allow our Constitution and our shared sense of decency to become a suicide pact.” He would doubtless have said the same thing about FISA. If you approach legal issues in that spirit rather than in the spirit of ruat caelum fiat iusticia (let the heavens fall so long as justice is done), you will want to know how close to suicide a particular legal interpretation will bring you before you decide whether to embrace it. The legal critics of the surveillance program have not done this, and the defenders have for the most part been content to play on the critics’ turf. ( ) Rights can’t be absolute and even if they were, privacy wouldn’t be one of them. Himma ‘7 Kenneth - Associate Professor of Philosophy, Seattle Pacific University. The author holds JD and PhD and was formerly a Lecturer at the University of Washington in Department of Philosophy, the Information School, and the Law School. “Privacy vs. Security: Why Privacy is Not an Absolute Value or Right”. San Diego Law Review, Vol. 44, p. 859, 2007. Available at SSRN: http://ssrn.com/abstract=994458 It is perhaps worth noting that absolutist conceptions are not limited to privacy rights. Some people take the position that the moral right to life is absolute; on an absolutist conception of the right to life, it is never justified to take the life of a person—and this rules out not only the death penalty, but the use of deadly force in defense of the lives of innocent others from a culpable attack. Many people take an absolutist view with respect to something they call a “right to information,” holding that there should be no restrictions of any kind, including legal protection of intellectual property rights, on the free flow of information. As this view has most famously, and idiosyncratically, been put by John Perry Barlow, “information wants to be free.”5 When it comes to rights, absolutist talk among theorists, lawyers, and ordinary folk is not at all uncommon these days. Indeed, some people seem to think that rights are, by nature, absolute and hence that it is a conceptual truth that all rights are absolute. Consider the following quote from Patrick Murphy, a Democrat who ran for Congress in 2006: I am also very concerned about the erosion of constitutional rights and civil liberties over the past few years. I taught Constitutional Law at West Point, and it makes me so angry to see our elected leaders in Washington—specifically the White House and the Republican leadership in Congress—pushing policies that erode the foundation of this country. The equal protection clause of the constitution is absolute. The right to privacy is absolute. The right to assemble is absolute. Yet time and time again, the administration has supported, and the Congressional leadership has supported nominees and policies that do not follow the constitution. With my background, I can add to this debate. And I’m not afraid to take a stand for what’s right.6 As Murphy explains it, every right in the Constitution is absolute and hence utterly without exception. As there is nothing in the Constitution or any legal instrument or norm that suggests or entails that constitutional rights are absolute, it is reasonable to think that Murphy believes, as many people do, that it is part of the very meaning of having a right that it can never justifiably be infringed. This is why debates about political issues are frequently framed in terms of whether there is some right that protects the relevant interests; rights provide the strongest level of moral or legal protection of the relevant interests. It is certainly true that rights provide a higher level of protection than any other considerations that are morally relevant, but it is not because rights are, by nature, absolute. Rights provide robust protection of the relevant interests because it is a conceptual truth that the infringement of any right cannot be justified by an appeal of the desirable consequences of doing so. No matter how many people it might make happy, it would be wrong to intentionally kill an innocent person because her right to life takes precedence over the interests of other people in their own happiness. As Ronald Dworkin famously puts this conceptual point, rights trump consequences.7 But this conceptual truth about rights does not imply rights are, by nature, absolute. The claim that rights trump consequences implies only that some stronger consideration than the desirable consequences of infringing a right can justify doing so. there is some such consideration that would justify infringing some rights. One such candidate, of course, is the existence of other more important rights. It is commonly thought This latter claim leaves open the possibility that that at least some rights are commensurable and can be ranked in a hierarchy that expresses the relative weight each right in the hierarchy has with respect to other rights. For example, one might think that the right to life is at the top of the hierarchy of would explain[s] the common intuition that one may use deadly force when necessary to defend innocent lives from culpable attack, but not commensurable rights, and that property rights are in this hierarchy also. This when necessary only to defend property rights from violation. If, as seems clear from this example, it is possible for two rights to conflict and for one to outweigh the other, it follows that rights are not, by nature, absolute. What may explain the mistaken view that rights are necessarily absolute is confusion about the relationship of various terms that flesh out the status, origin, and contours of moral rights and obligations. For example, rights are frequently described as “inviolable,” meaning that a right can never be justifiably violated. This, of course, is a conceptual truth; to say that a right is violated is to say that its infringement is without justification. But this does not imply that rights can never be justifiably infringed; a person’s right to life can be justifiably infringed if he (they) culpably shoots at an innocent person and there is no other way to save that person’s life except through use of lethal force in defense of his life. Rights are also thought, by nature, to be supreme, relative to some system of norms—moral, social, or legal—in the sense that they cannot be defeated by other kinds of protections; moral rights are thought to be supreme over all other kinds of considerations, including social and legal rights. But this does not imply that rights are absolute because it says nothing about the relative importance of one right to another; it simply asserts that, by nature, rights outweigh all other relevant considerations. Supremacy and inviolability are part of the very nature of a right, but these properties do not entail that rights are, by nature, absolute. Of course, the negation of the claim that all rights are absolute does not imply that no rights are absolute. The possibility of conflicts between any two rights does not preclude there being one right that wins every conflict because it is absolute, and hence, without exception. A moral pacifist, for example, takes this view of the moral right to life and holds that intentional killing of a human being is always wrong. Moreover, if there are two rights that do not come into conflict with each other and win in conflicts with all other rights, those two rights might be absolute. One might think, for example, that the rights to privacy and life can never conflict and that both are absolute. I am somewhat skeptical that any right is absolute in this strong sense, but if there are any, it will not be privacy. As we will see in more detail, privacy is commensurable with other rights, like the right to life, which figures into the right to security. It seems clear that privacy rights and the example, a psychologist might be justified in protecting a patient’s privacy interests even though doing so includes information that might prevent that person from committing a minor property crime of some kind, but she would not be justified in protecting that information if the psychologist knows its disclosure is necessary to prevent a murder. In any event, I right to life can come into conflict. For will discuss these kinds of examples in more detail below. ( ) No Privacy violation- FISC check abuse Branda ‘14 (et al; JOYCE R. BRANDA, Acting Assistant Attorney General, BRIEF FOR THE APPELLEES - Amicus Brief for Smith v. Obama – before the United States Ninth Circuit Court of Appeals. “Amici” means “friend of the court” and – in this context - is legal reference to the Reporters Committee – October 2nd https://www.eff.org/document/governments-smith-answering-brief) Plaintiff provides no plausible explanation for how the program could cause that distress. She does not contend that there is any reasonable likelihood that government personnel would actually review metadata about her calls that the government may have acquired under the Section 215 program. That likelihood is particularly remote if “[n]one of her communications relate to international terrorism or clandestine intelligence activities.” Pl Br. 4. Again, information in the Section 215 database is subject to substantial protections and limits on access imposed by orders of the Foreign Intelligence Surveillance Court. Those orders do not permit indiscriminate access to or review of the metadata; instead, there must be an advance judicial finding (or, in cases of emergency, an advance finding by government officials and judicial approval after the fact) that a given selector is suspected of association with terrorism, and only the small fraction of metadata responsive to queries using such suspectedterrorist selectors—that is, within two steps of the judicially approved selector—may be reviewed. ( ) Biosurveillance is key to global effectiveness McNickle 12 (Michelle McNickle, Associate Editor of InformationWeek Healthcare, “Feds To Use Social Media For Biosurveillance”, http://www.informationweek.com/regulations/feds-to-use-socialmedia-for-biosurveillance/d/d-id/1107452?, ZS) The U.S. Department of Homeland Security (DHS) recently awarded Accenture Federal Services a two-year contract to help the Office of Health Affairs (OHA) enhance its biosurveillance capabilities. With the help of Accenture, OHA will begin using information gathered from social media sites -- Facebook, Twitter, Tumblr, and Flickr -- to better inform and protect the public against national health emergencies, such as disease outbreaks or biological attacks. Accenture defines biosurveillance as the "monitoring of public health trends and unusual occurrences, relying on pre-existing, real-time health data -- data that s publicly available and easily obtained," according to a statement. "Because of the vast amount of data and information available and readily shared through social media … and the rapid pace information is shared, collecting and understanding information from these channels is critical." The initiative is a pilot program that John Matchette, partner at Accenture and leader of its Public Safety agency work, said the company is hoping to have operational in approximately eight months. In an interview with InformationWeek Healthcare, Matchette described the program as using people as "sensors" to detect health issues such as pathogens or symptoms. "The best way to do this is to treat humans as sensors and let them self-report," Matchette said. Gathering more data points and reacting faster to potential threats are the two main goals for Matchette and his team, he said, and social media will make this possible. Matchette made clear the initiative isn't aimed at mining data that's secret or private. The agency is looking at public data to see where patterns exist in different geographic areas. The program is based on a key-word approach to scanning social media sites. Accenture will begin by developing a lexicon of health conversations that spans these sites to use as a baseline. "Step one is to get that identified, and then we have standard interfaces that go out and look at these websites, like Facebook and Twitter, and they watch for these trends," Matchette said. "There's a lot of health discussion at the same time, so mission one is to understand what normalcy looks like, and once you've done that, you can look for deviations from normal, and that’s how you detect patterns." After developing this baseline, Matchette said the company will be in a position where it can "react and modify…. [A] lot of this is tweaking the underlying analytics to begin to run and get results." The underlying technology the company is using, he said, isn't custom code. Instead, Accenture has a collaboration platform, which integrates data sources and other offthe-shelf products. "So the effort isn't in the coding of the solution because the analytics have been developed," Matchette said. "It's deciding what the lexicon is, and then refining the results." ( ) Biosurveillance is key to solve international disease outbreaks – empirics RTI 13 (Neely Kaydos-Daniels, RTI International, Director, Influenza Programs - Central America Region, Director of Health Security at RTI International, Epidemic Intelligence Service Officer at the Center for Disease Control, “Study: Biosurveillance Provides Early Detection of Disease Outbreaks”, http://www.rti.org/newsroom/news.cfm?obj=18554B0D-5056-B10031F8E9637DB5227A, ZS) RESEARCH TRIANGLE PARK, N.C. – Biosurveillance – the automated monitoring of health trend data – can enhance the detection of naturally occurring or intentional disease outbreaks, according to a study by researchers at RTI International. The study, published in the March issue of Biosecurity and Bioterrorism, conducted three case studies from 2007-2008 whose biosurveillance systems cover more than 10 million people. The in-depth interviews describe how biosurveillance systems have been used by state and local public health practitioners to identify and investigate outbreaks. For example, the researchers found that in North Carolina, several university students got food poisoning at an event just before a semester break. That meant that the students ended up visiting emergency rooms throughout the state with their gastrointestinal symptoms. "Ordinarily these circumstances would have made identifying the source of this outbreak very difficult, if not impossible," said Neely Kaydos-Daniels, Ph.D., senior research epidemiologist at RTI and the paper's lead author. "However, because the data from these events were entered into the biosurveillance system, health officials were able to identify the source of the outbreak." In another case, a rapid increase of rash illness caused by itch mites was first detected by biosurveillance before it was reported by other means. Epidemiologists were able to estimate the increase in number of cases of the rash over time through the biosurveillance system. According to the study, biosurveillance helped state and local health departments track epidemics over time. That information was instrumental in the decision-making process of health departments and hospitals to implement control measure to protect at-risk populations and prevent future cases. However, the study also showed that the systems often identify a large number of false positives and were considered more useful for outbreaks of severe disease than for milder disease, because the systems currently only pull data from emergency departments. "Biosurveillance will be even more effective if we can integrate data from primary care physicians with emergency departments," Kaydos-Daniels said. "The consideration of public health data needs for biosurveillance is critical to our population's health. Federal initiatives to encourage adoption of electronic health records among health care providers are vital to improving the utility of biosurveillance and the capacity of health departments." ( ) Bio surveillance creates info spread and awareness – it’s the vital internal link Fleming and Pamela 14 (Eric Fleming & Pamela Pamelá, Florida International University, Research Assistants to Dr. John Stack, Professor of Politics and International Relations and Law and Director of the School of International and Public Affairs, “Using Social Media as a Method for Early Indications & Warnings of Biological Threats”, http://magg.fiu.edu/program/capstone-project/2014-capstoneworking-papers/southcom-pam_eric_social-media-and-biosurveillance-capstone-april-2014edited-by-dawndavies.pdf, ZS) In a globalized world, biosurveillance needs to match the velocity and intensity of a potential viral outbreak. Therefore, social media is being explored as a non-traditional way to detect a pandemic. Numerous websites act as potential channels for individuals to discuss symptoms and share their geographical location, so governments and private enterprises have explored various models in detecting and tracking potential pandemics. This paper provides an overview of the existing literature on social media’s potential for biological detection and existing viral tracking models. Furthermore, this paper provides examples of social media’s potential for detection, provides a framework from which to analyze social media as a destabilizing power, and offers a new model and policy recommendations. Velocity and intensity are two measures that are vital in detecting and monitoring the onset of pandemics. In an era where time-space compression has manifested across the globe, and greater interconnectivity amongst populations continue to propagate, the need to detect and track microbial outbreaks are paramount. While globalization introduced humanity to an abundance of technology and trade, these advancements present increasingly greater challenges for monitoring viral outbreaks. Therefore, there is not only a desire, but also a need for a revolutionary system in biosurveillance. Currently, millions of humans are crossing borders and integrating with countless populations, making a viral epidemic incredibly difficult to manage. For instance, history witnessed the calamitous effects the Black Plague, Small Pox, and the Spanish Flu had on civilizations. The aftermath of the black plague led to 30-60 percent reduction in European population, with some cities having estimates of 70-80 percent mortality rate (Alchon, 2003, 21). Additionally, considerable societal changes occurred that led to a deterioration of church authority, peasant revolts, and attacks on various populations (Whipps, 2008). The threat of bioterrorism is not without warrant. Most patients with bioterrorism-related diseases experience initial symptoms that could be interpreted as common illness, such as influenza. Other indications may include acute respiratory distress, gastrointestinal symptoms, feverish hemorrhagic conditions, and similar illnesses with either dermatologic or neurologic ailments (Bravata et al. 2004, 911). Identifying these conditions, therefore, is crucial to not only detecting the diseases they are normally linked to, but also to the discovery of bioterrorism attempts. To prevent another pandemic, it is essential to find a new method of detecting the onset of indications and warnings before an outbreak occurs. This new method should have the capability to mirror a pathogen’s velocity and intensity in all areas of society, so government agencies, non-governmental organizations (NGOs), and international organizations could respond accordingly. Hence, there is growing literature about matching infectious diseases with another global phenomenon that is manifesting hastily across all sectors of society, with the potential to revolutionize viral antigen detection: social media. Social media is transforming itself into a powerful and adaptable tool that many public and private organizations increasingly seek to understand. Social media is a global digital community where individuals stay connected with each other by direct and split-second electronic exchange of information constantly throughout the day. While forms of social media have been around for ages, this is revolutionary, since people now communicate instantaneously across national borders and oceans in mere seconds. As a result, many organizations have used this to their advantage in promoting businesses or building awareness for a certain campaign. A website, such as Facebook, boasts having over one billion users worldwide, making it an incredibly large network that functions by linking individuals together and exchanging user generated content. A large global community can be sure to share information about what individuals are discussing and what news they are sharing, but can governments use it to their advantage in detecting potential biological outbreaks? Governments are now joining the social media fury. Presidential campaigns incorporate social media for promoting their message and now various agencies promote their agenda through websites. Conversely, we have also witnessed the awesome chaos and power of social media and its consequential effects on governments’ attempts to control and maintain the community. The Arab Spring, Venezuela, and Ukraine are recent examples of this. However, with the ability of users to discuss their opinions, share videos, news articles, and live events in a public sphere, will it be possible to also detect an upcoming pandemic? In a globalized world where travel and technology is rapidly evolving, social media could conceivably be a crucial tool in locating an infectious disease. The following study will explore the various avenues social media has intersected in the area of biosurveillance. First this research will discuss defining social media and the various significant websites, then go into the successes and limitations of biosurveillance. Finally, this examination will conclude discussing the possible policy recommendations and future that social media has in regard to biosurveillance. Backlines Privacy Bad Privacy is massively overvalued Posner 13 — Richard A. Posner, Senior Lecturer in Law at the University of Chicago, Judge on the United States Court of Appeals for the Seventh Circuit in Chicago, was named the most cited legal scholar of the 20th century by The Journal of Legal Studies, holds an LL.B. from Harvard University, 2013 (“Privacy is overrated,” New York Daily News, April 28th, Available Online at http://www.nydailynews.com/opinion/privacy-overrated-article-1.1328656, Accessed 04-16-2015) There is a tendency to exaggerate the social value of privacy. I value my privacy as much as the next person, but there is a difference between what is valuable to an individual and what is valuable to society. Thirty-five years ago, when I was a law professor rather than a judge, I published an article called “The Right of Privacy,” in which I pointed out that “privacy” is really just a euphemism for concealment, for hiding specific things about ourselves from others. We conceal aspects of our person, our conduct and our history that, if known, would make it more difficult for us to achieve our personal goals. We don’t want our arrest record to be made public; our medical history to be made public; our peccadilloes to be made public; and so on. We want to present sanitized versions of ourselves to the world. We market ourselves the way sellers of consumer products market their wares — highlighting the good, hiding the bad. I do not argue that all concealment is bad. There is nothing wrong with concealing wealth in order to avoid being targeted by thieves or concealing embarrassing personal facts, such as a deformity or being related to a notorious criminal, that would not cause a rational person to shun us but might complicate our social and business relations. There may even be justification for allowing the concealment of facts that might, but should not, cause a person to be shunned. Laws that place a person’s arrest (as distinct from conviction) record behind a veil of secrecy are based on a belief that prospective employers would exaggerate the significance of such a record, not realizing, for example, that arrests are often based on mistakes by witnesses or police officers, or are for trivial infractions. Privacy-protecting laws are paternalistic; they are based on a skepticism regarding whether people can make sensible evaluations of an arrest record or other private facts that enter the public domain. Still, a good deal of privacy just facilitates the personal counterpart of the false advertising of goods and services, and by doing so, reduces the well-being of society as a whole. I am not suggesting that privacy laws be repealed. I don’t think that they do much harm, and they do some good, as just indicated. But I don’t think they serve the public interest as well as civil libertarians contend, and so I don’t think that such laws confer social benefits comparable to those of methods of surveillance that are effective against criminal and especially terrorist assaults. Util v. Absolutism Ethics in a vacuum is morally irresponsible. Issac, ‘2 (Jeffery, Professor of Political Science at Indiana University, Dissent, Vol. 49 No. 2, Spring) Politics, in large part, involves contests over the distribution and use of power. To accomplish anything in the political world one must attend to the means that are necessary to bring it about. And to develop such means is to develop, and to exercise, power. To say this is not to say that power is beyond morality. It is to say that power is not reducible to morality. As writers such as Niccolo Machiavelli, Max Weber, Reinhold Niebuhr, Hannah Arendt have taught, an unyielding concern with moral goodness undercuts political responsibility. The concern may be morally laudable, reflecting a kind of personal integrity, but it suffers from three fatal flaws: (1) It fails to see that the purity of one’s intentions does not ensure the achievement of what one intends. Abjuring violence or refusing to make common cause with morally comprised parties may seem like the right thing, but if such tactics entail impotence, then it is hard to view them as serving any moral good beyond the clean conscience of their supporters; (2) it fails to see that in a world of real violence and injustice, moral purity is not simply a form of powerlessness, it is often a form of complicity in injustice. This is why, from the standpoint of politics-as opposed to religion-pacifism is always a potentially immoral stand. In categorically repudiating violence, it refuses in principle to oppose certain violent injustices with any effect; and (3) it fails to see that politics is as much about unintended consequences as it is about intentions; it is the effects of action, rather than the motives of action, that is most significant. Just as the alignment with “good” may engender impotence, it is often the pursuit of “good” that generates evil. This is the lesson of communism in the twentieth century: it is not enough that one’s goals be sincere or idealistic; it is equally important, always, to ask about the effects of pursuing these goals and to judge these effects in pragmatic and historically contextualized ways. Moral absolutism inhibits this judgment. It alienates those who are not true believers. It promotes arrogance. And it undermines political effectiveness. No Violation of Constituion Surveillance doesn’t violate the 4th amendment – no human review and not invasive. Branda ‘14 (et al; JOYCE R. BRANDA, Acting Assistant Attorney General, BRIEF FOR THE APPELLEES - Amicus Brief for Smith v. Obama – before the United States Ninth Circuit Court of Appeals. “Amici” means “friend of the court” and – in this context - is legal reference to the Reporters Committee – October 2nd https://www.eff.org/document/governments-smith-answering-brief) In district court, plaintiff attempted to fill that gap in her claim to standing, asserting that, if the government had in fact acquired metadata about her calls, she would suffer a cognizable injury each time the government queries the Section 215 database, even if queries of Section 215 metadata are performed electronically; a human analyst reviews only metadata that is responsive to an electronic query, and no one reviews nonresponsive information. It is no more an injury for a computer query to rule out particular telephony metadata as unresponsive to a query than it would be for a canine sniff to rule out a piece of luggage as nonresponsive to a drug investigation, see United States v. Place, 462 U.S. 696, 707 (1983) (canine sniff of luggage does not violate a reasonable expectation of privacy), or for a chemical test to rule out a particular substance being cocaine, see United States v. Jacobsen, 466 U.S. 109, 123 (1984). Where telephony metadata associated with particular calls remains unreviewed and never comes to any human being’s attention, there is no invasion of any constitutionally cognizable privacy interests, and no injury to support standing to sue. At the very least, the absence of any such human review would mean that no infringement of a Fourth Amendment privacy interest demonstrably occurred here. See infra p. 54-55. metadata about her calls were never responsive to a query. But No impact to a 4th Amendment violation – the Special Needs Doctrine justifies minor privacy intrusions Branda ‘14 (et al; JOYCE R. BRANDA, Acting Assistant Attorney General, BRIEF FOR THE APPELLEES - Amicus Brief for Smith v. Obama – before the United States Ninth Circuit Court of Appeals. “Amici” means “friend of the court” and – in this context - is legal reference to the Reporters Committee – October 2nd https://www.eff.org/document/governments-smith-answering-brief) Even if plaintiff had a cognizable privacy interest in Verizon Wireless’s business records—and she does not—the Fourth Amendment would permit the government to acquire those records under the special needs doctrine. The Section 215 telephony-metadata program serves the paramount government interest in preventing and disrupting terrorist attacks on the United States, a compelling special governmental need. And because of the significant safeguards in the program—including a requirement of court authorization based on reasonable suspicion before a human analyst accesses the data—the impact on cognizable privacy interests is at most minimal. Social M. K2 Biosurveil DHS contracts prove social media is necessary to effective biosurveillance – stats McGee 12 (Marianne McGee, Staff Writer for Gov Info Security, “Using Social Media for Biosurveillance”, http://www.govinfosecurity.com/using-social-media-for-biosurveillance-a-5278, ZS) The Department of Homeland Security is testing whether scanning social media sites to collect and analyze health-related data could help identify infectious disease outbreaks, bioterrorism or other public health and national security risks. The department has signed a $3 million, one-year contract with Accenture Federal Services, which is providing software and services for the project. The biosurveillance pilot involves automatically scanning social media sites, such as Facebook and Twitter, to collect and analyze health-related data in real time, says John Matchette, managing director for Accenture's public safety portfolio. The information being collected includes a variety of health-related keywords and other information, including medical symptoms, that show up in social medial postings. The data will be collected and analyzed in aggregate, Matchette says. "The information won't be tracked back to individuals who posted it," he stresses, to help ensure privacy. But one privacy advocate questions whether DHS is taking adequate steps to ensure privacy. "Even when data is in aggregate, we don't have any clear policies around how data will be used and how it can be traced back, including if and when there are signs of an illness outbreak," says Deven McGraw, director of the health privacy project at the Center for Democracy & Technology. "I think it's a legitimate question to ask [DHS] what the guidelines are for using this data. I'd prefer they have a plan in advance for dealing with this, rather than waiting." Representatives of DHS and Accenture did not reply to a request for comment on McGraw's concerns. Watching for Trends The social media data analytics technology will "watch for trends," such as whether new or unusual clusters of symptoms in various geographic regions are being reported on social networking sites, Matchette explains. The analysis of social media data is evolving, he adds, pointing out that both recent presidential campaigns tapped into sites such as Facebook and Twitter to comb through data for trends. While Accenture's work in this pilot focuses on analysis of social media data, the biosurveillance effort has underlying capabilities that could be expanded to integrate data from other sources, such as hospital emergency departments, drug distribution companies and the Centers for Disease Control and Prevention, Matchette says. "This is big data analytics." The project is the latest in a series of DHS data analysis efforts for biosurveillance. For example, DHS already is analyzing data that's collected by the CDC from public health departments nationwide. Also, it's collecting and analyzing air samples in several cities for signs of bio-terrorist chemicals, such as anthrax. The technology infrastructure for the social media project includes Accenture's collaboration platform software and social media analytics software from Accenture's partner in the project, SAS Institute. Cartography Frontlines 1nc ( ) FISA court solves Katyal and Caplan ‘8 [Neal Katyal and Richard Caplan are Law professors at Georgetown University, “The Surprisingly Stronger Case for the Legality of the NSA Surveillance Program: The FDR Precedent” Stanford Law Review, Feb. 2008, http://www.jstor.org/stable/pdf/40040407.pdf // date accessed 6/29/15 K.K] FISA was created in 1978 as part of Congress's overhaul of intelligence activities to govern domestic electronic surveillance of agents of foreign powers.12 The Act mandates that the Chief Justice of the United States designate eleven district judges from seven of the United States judicial circuits to form a Foreign Intelligence Surveillance Court (FISC).13 Of these, at least three judges must reside within twenty miles of Washington, D.C.14 The judges of this court hear the government's applications for foreign intelligence surveillance in secret and determine whether the requested surveillance meets the requirements set forth in FISA. Once a judge of the FISA court has denied an application for surveillance, the government may not petition another judge of the same court for approval of the same application.15 In most cases, FISA requires that the government conduct domestic surveillance for foreign intelligence purposes only pursuant to judicial authorization. The standards for that authorization, however, do not comport with the Fourth Amendment's probable cause requirements for an ordinary warrant. Rather, FISA is more permissive in the type and scope of the searches it allows, requiring far less judicial supervision when the government collects intelligence about foreign powers domestically.16 In most circumstances, a federal agent seeking to use surveillance under FISA must, with the approval of the Attorney General, submit an ex parte application to the Foreign Intelligence Surveillance Court.17 That application must state, among other things, (1) the identity or description of the target of surveillance, (2) the facts relied upon to justify the belief that the target is a foreign power (or agent thereof) and that each of the places to be targeted is used by or about to be used by a foreign power (or agent thereof), (3) detailed description of the type of information sought and the type of communications to be monitored, (4) that obtaining foreign intelligence information is "a significant purpose" of the surveillance, and (5) that such information cannot reasonably be obtained by alternative methods ( ) No NSA overload – Accumulo tech solves. Harris ‘13 (Not Scott Harris, because large data sets do sometimes overwhelm him… But Derrick Harris. Derrick in a senior writer at Gigaom and has been a technology journalist since 2003. He has been covering cloud computing, big data and other emerging IT trends for Gigaom since 2009. Derrick also holds a law degree from the University of Nevada, Las Vegas. This evidence is also internally quoting Adam Fuchs – a former NSA employee that was involved in software design. “Under the covers of the NSA’s big data effort” – Gigaom - Jun. 7, 2013 https://gigaom.com/2013/06/07/under-the-covers-of-the-nsas-big-data-effort/) The NSA’s data collection practices have much of America — and certainly the tech community — on edge, but sources familiar with the agency’s technology are saying the situation isn’t as bad as it seems. Yes, the agency has a lot of data and can do some powerful analysis, but, the argument goes, there are strict limits in place around how the agency can use it and who has access. Whether that’s good enough is still an open debate, but here’s what we know about the technology that’s underpinning all that data. The technological linchpin to everything the NSA is doing from a data-analysis perspective is Accumulo — an open-source database the agency built in order to store and analyze huge amounts of data. Adam Fuchs knows Accumulo well because he helped build it during a nine-year stint with the NSA; he’s now co-founder and CTO of a company called Sqrrl that sells a commercial version of the database system. I spoke with him earlier this week, days before news broke of the NSA collecting data from Verizon and the country’s largest web companies. The NSA began building Accumulo in late 2007, Fuchs said, because they were trying to do automated analysis for tracking and discovering new terrorism suspects. “We had a set of applications that we wanted to develop and we were looking for the right infrastructure to build them on,” he said. The problem was those technologies weren’t available. He liked what projects like HBase were doing by using Hadoop to mimic Google’s famous BigTable data store, but it still wasn’t up to the NSA requirements around scalability, reliability or security. So, they began work on a project called CloudBase, which eventually was renamed Accumulo. Now, Fuchs said, “It’s operating at thousands-of-nodes scale” within the NSA’s data centers. There are multiple instances each storing tens of petabytes (1 petabyte equals 1,000 terabyes or 1 million gigabytes) of data and it’s the backend of the agency’s most widely used analytical capabilities. Accumulo’s ability to handle data in a variety of formats (a characteristic called “schemaless” in database jargon) means the NSA can store data from numerous sources all within the database and add new analytic capabilities in days or even hours. “It’s quite critical,” he added. What the NSA can and can’t do with all this data As I explained on Thursday, Accumulo is especially adept at analyzing trillions of data points in order to build massive graphs that can detect the connections between them and the strength of the connections. Fuchs didn’t talk about the size of the NSA’s graph, but he did say the database is designed to handle months or years worth of information and let analysts move from query to query very fast. When you’re talking about analyzing call records, it’s easy to see where this type of analysis would be valuable in determining how far a suspected terrorist’s network might spread and who might be involved. ( ) Accumulo solves without violating privacy. Henschen ‘13 Doug Henschen is Executive Editor of InformationWeek, where he covers the intersection of enterprise applications with information management, business intelligence, big data and analytics. He previously served as editor in chief of Intelligent Enterprise, editor in chief of Transform Magazine, and Executive Editor at DM News. He has covered IT and data-driven marketing for more than 15 years. “Defending NSA Prism's Big Data Tools”- Information Week Commentary - 6/11/2013 - http://www.informationweek.com/big-data/big-data-analytics/defending-nsa-prisms-bigdata-tools/d/d-id/1110318? The more you know about NSA's Accumulo system and graph analysis, the less likely you are to suspect Prism is a privacy-invading fishing expedition. It's understandable that democracy-loving citizens everywhere are outraged by the idea that the U.S. Government has back-door access to digital details surrounding email messages, phone conversations, video chats, social networks and more on the servers of mainstream service providers including Microsoft, Google, Yahoo, Facebook, YouTube, Skype and Apple. But the more you know about the technologies being used by the National Security Agency (NSA), the agency behind the controversial Prism program revealed last week by whistleblower Edward Snowden, the less likely you are to view the project as a ham-fisted effort that's "trading a cherished American value for an unproven theory," as one opinion piece contrasted personal privacy with big data analysis. The centerpiece of the NSA's data-processing capability is Accumulo, a highly distributed, massively parallel processing key/value store capable of analyzing structured and unstructured data. Accumolo is based on Google's BigTable data model, but NSA came up with a cell-level security feature that makes it possible to set access controls on individual bits of data. Without that capability, valuable information might remain out of reach to intelligence analysts who would otherwise have to wait for sanitized data sets scrubbed of personally identifiable information. Sponsor video, mouseover for sound [ Want more on the Prism controversy? Read NSA Prism: Inside The Modern Surveillance State. ] As InformationWeek reported last September, the NSA has shared Accumulo with the Apache Foundation, and the technology has since been commercialized by Sqrrl, a startup launched by six former NSA employees joined with former White House cybersecurity strategy director (and now Sqrrl CE0) Ely Khan. "The reason NSA built Accumulo and didn't go with another open source project, like HBase or Cassandra, is that they needed a platform where they could tag every single piece of data with a security label that dictates how people can access that data and who can access that data," said Khan in an interview with InformationWeek. Having left government employment in 2010, Accumulo makes it possible to interrogate certain details while blocking access to personally identifiable information. This capability is likely among the things James R. Clapper, the U.S. director of National Intelligence, was referring to in a statement on the Prism disclosure that mentioned "numerous safeguards that protect privacy and civil liberties." Are They Catching Bad Guys? So the NSA can investigate data with limits, but what good is partial information? One of Accumulo's strengths is finding connections among Kahn says he has no knowledge of the Prism program and what information the NSA might be collecting, but he notes that seemingly unrelated information. "By bringing data sets together, [Accumulo] allowed us to see things in the data that we didn't necessarily see from looking at the data from one point or another," Dave Hurry, head of NSA's computer science research section, told InformationWeek last fall. Accumulo gives NSA the ability "to take data and to stretch it in new ways so that you can find out how to associate it with another piece of data and find those threats." ( ) The affirmative exaggerates contact chaining – minimization, numbers collected and lack of content disprove the advantage Mann 14 — Scott Mann is a research associate with the Strategic Technologies Program at the Center for Strategic and International Studies in Washington D.C., 2014 (“Fact Sheet: Metadata”, Center For Strategic & International Studies, 2/27/14 available at http://csis.org/publication/fact-sheet-metadata-0 date accessed 7/6/14 // K.K) Assessment: These criticisms are wildly exaggerated. Press accounts make it sound like NSA has looked at millions of records. In practice, NSA queried only 288 primary “seed” phone numbers in 2012, and its ultimate contact chain analysis only touched 6,000 numbers connected to foreign intelligence activity. To search all records would be time-consuming and hinder analysis of relevant intelligence information. Metadata collected under Section 215 is limited to the call-log records of a particular phone number. The metadata does not include the “content” of a call, nor does it include the names, addresses or any other personally identifying information; it only shows the links between phone numbers. Contrary to the ACLU claims, it cannot be used by the NSA to ascertain intimate personal information. An analyst can look at metadata only after he or she has demonstrates a “reasonable, articulable suspicion” that a phone number is associated with a foreign terrorist organization, and only 22 NSA officials can authorize a query selector. Metadata queries are closely monitored through a series of minimization procedures, which limit the retention of and access to U.S. person data. Other procedural safeguards include limiting data access, creating auditable records of all searches, requiring monthly reports on activities, time limitations on the retention of data, as well as quarterly reviews by the Foreign Intelligence Surveillance Court. Despite the care taken by the NSA to prevent the abuse of data, there is an expectation that a federal agency should not have the authority to approve its own search requests. The legitimacy of metadata program oversight may be improved if the NSA was required to get court approval for database queries. ( ) Contact chaining is key to secure the border Chappell 14 — Bill Chappell holds a bachelor's degrees in English and History from the University of Georgia and is a reporter/producer of National Public Radio, 2014 (“NSA Reportedly Collected Millions of Phone Texts Every Day”, NPR, 1/16/14, available at http://www.npr.org/sections/thetwo-way/2014/01/16/263130142/nsa-reportedly-collectedmillions-of-phone-texts-every-day date accessed 7/6/15 // K.K) As recently as 2011, the National Security Agency was collecting almost 200 million text messages each day, according to a new story by The Guardian that cites documents from former NSA contractor Edward Snowden. The texts were used to develop financial and location data, the newspaper says. An image posted by The Guardian shows a presentation slide titled "Content Extraction Enhancements For Target Analytics: SMS Text Messages: A Goldmine to Exploit." Marked "Top Secret," it resembles the slides that were previously shown as part of the trove of materials Snowden gave to journalists last year. The NSA's collection of text messages in the program, codenamed Dishfire, is arbitrary, The Guardian says, and the information is stored in a database for potential future uses. The newspaper notes that the system works globally – meaning Americans' text messages are included in the collection process. According to the presentation, texts from U.S. phone numbers are removed from the database. After the story was published Thursday afternoon, the spy agency, which has been embarrassed by revelations about its massive data collection programs since last summer, told the BBC, "The implication that NSA's collection is arbitrary and unconstrained is false." From The Guardian come these examples of the data extracted by the NSA on a normal day: • "More than 5 million missed-call alerts, for use in contact-chaining analysis (working out someone's social network from who they contact and when)" • "Details of 1.6 million border crossings a day, from network roaming alerts" • "More than 110,000 names, from electronic business cards, which also included the ability to extract and save images." • "Over 800,000 financial transactions, either through text-to-text payments or linking credit cards to phone users" The NSA's practices and abilities are slated to be the topic of a speech by President Obama Friday (you can follow that event live at NPR.org, starting at 11 a.m. ET). NPR's Scott Neuman has a preview today, listing Five Changes To The NSA You Might Hear In Obama's Speech. ( ) Hezbollah is a unique threat based on the border – sustained intelligence is key to dissuade terrorist attacks on U.S soil Levitt 13 — Matthew Levitt is the director of the Stein Program on Counterterrorism and Intelligence at The Washington Institute for Near East Policy, 2013 (“South of the Border, A Threat From Hezbollah” Washington Institute, Spring 2013, available at http://www.washingtoninstitute.org/uploads/Documents/opeds/Levitt20130515-JISA.pdf date accessed 7/6/15 // K.K) Hezbollah’s expanding criminal networks have led to closer cooperation with organized crime networks, especially Mexican drug cartels. In a March 2012 speech at the Washington Institute for Near East Policy, Michael Braun, former DEA chief of operations, detailed Hezbollah’s skill in identifying and exploiting existing smuggling and organized crime infrastructure in the region. Braun and other officials have noted that the terrain along the southern U.S. border, especially around San Diego, is similar to that on the Lebanese-Israeli border. Intelligence officials believe drug cartels, in an effort to improve their tunnels, have enlisted the help of Hezbollah, which is notorious for its tunnel construction along the Israeli border. In the relationship, both groups benefit, with the drug cartels receiving Hezbollah’s expertise and Hezbollah making money from its efforts.20 In 2008, the Mexican newspaper El Universal published a story detailing how the Sinaloa drug cartel sent its members to Iran for weapons and explosives training. The article reported that the Sinaloa members traveled to Iran via Venezuela, that they used Venezuelan travel documents, and that some members of Arab extremist groups were marrying local Mexican and Venezuelan citizens in order to adopt Latino-sounding surnames and more easily enter the United States.21 Also on the U.S. radar is the relationship between Hezbollah and the Revolutionary Armed Forces of Colombia (FARC). “One thing both Hezbollah and the FARC have in common is a demonstrated willingness to work with outside groups that do not share their same ideology or theology, but who share a common enemy,” notes Latin America expert Douglas Farah.22 A July 2009 indictment exposed Jamal Youssef, a former member of the Syrian military and known international arms dealer, who attempted to make a weapons-forcocaine trade with the FARC. Unbeknownst to him, Youssef negotiated the deal with an undercover DEA agent. The military-grade arms he agreed to provide had been stolen from Iraq and stored in Mexico by Youssef’s cousin, who he claimed was a Hezbollah member.23 Staging ground and safe haven Latin America is significant for Hezbollah and other terrorist organization. The Journal of International Security Affairs 81 South of the Border, A Threat from Hezbollah tions as well: the region provides an ideal point of infiltration into the United States. In at least one instance, a highly trained Hezbollah operative, Mahmaoud Youssef Kourani, succeeded in sneaking across the border into the U.S. through Mexico in the trunk of a car. Kourani paid the owner of a Lebanese café in Tijuana $4,000 to smuggle him across the border in February 2001. The café owner, Salim Boughader Mucharrafille, admitted to assisting more than 300 Lebanese sneak into the U.S. in similar fashion over a three-year period. An attempt to establish a Hezbollah network in Central America, foiled by Mexican authorities in 2010, provides even more insight into Hezbollah’s foothold in Mexico. Hezbollah operatives, led by Jameel Nasr, employed Mexican nationals who had family ties in Lebanon to set up a network targeting Western interests, the media reported. According to these reports, Nasr routinely traveled to Lebanon to receive directions from Hezbollah.24 Over the past several years, U.S. criminal investigations also have revealed links between the group’s illicit activities in the United States and criminal networks in Latin America. Fertile soil For some, Hezbollah’s attacks in Buenos Aires are ancient history. Indeed, the government of Argentine President Cristina Fernández de Kirchner recently announced that her country was partnering with the Islamic Republic of Iran to establish an independent truth commission to resolve the AMIA bombing.25 In fact, Argentina’s own investigation into the matter has already determined beyond a shadow of a doubt that Hezbollah and Iran partnered together to carry out these bombings.26 This disturbing turn of events demonstrates how far some in the region have yet to go to get serious about the threat Hezbollah and Iran pose. The need for attention is perhaps greater today than it has been in years past, since Hezbollah—as a result of both necessity and opportunity— appears to have renewed operational planning focused on South America. Confronting the threat it poses will require close law enforcement, intelligence, and policy coordination throughout the Western Hemisphere. And with Hezbollah actively plotting terrorist attacks around the world, such cooperation should take shape as quickly as possible Backlines Accumulo Data overload wrong – Accumulo tech solves Gallagher ‘13 Sean Gallagher is the IT editor at Ars Technica. Sean is a University of Wisconsin grad, a former systems integrator, a former director of IT strategy at Ziff Davis Enterprise. He wrote his first program in high school – “What the NSA can do with “big data”” - Ars Technica - Jun 11, 2013 - http://arstechnica.com/information-technology/2013/06/what-thensa-can-do-with-big-data/2/ Ironically, about the same time these two programs were being exposed, Internet companies such as Google and Yahoo were solving the big data storage and analysis problem. In November of 2006, Google published a paper on BigTable, a database with petabytes of capacity capable of indexing the Web and supporting Google Earth and other applications. And the work at Yahoo to catch up with Google's GFS file system—the basis for BigTable—resulted in the Hadoop. BigTable and Hadoop-based databases offered a way to handle huge amounts of data being captured by the NSA's operations, but they lacked something critical to intelligence operations: compartmentalized security (or any security at all, for that matter). So in 2008, NSA set out to create a better version of BigTable, called Accumulo—now an Apache Foundation project. Accumulo is a "NoSQL" database, based on key-value pairs. It's a design similar to Google's BigTable or Amazon's DynamoDB, but Accumulo has special security features designed for the NSA, like multiple levels of security access. The program is built on the open-source Hadoop platform and other Apache products. One of those is called Column Visibility—a capability that allows individual items within a row of data to have different classifications. That allows users and applications with different levels of authorization to access data but see more or less information based on what each column's "visibility" is. Users with lower levels of clearance wouldn't be aware that the column of data they're prohibited from viewing existed. Accumulo also can generate near real-time reports from specific patterns in data. So, for instance, the system could look for specific words or addressees in e-mail messages that come from a range of IP addresses; or, it could look for phone numbers that are two degrees of separation from a target's phone number. Then it can spit those chosen e-mails or phone numbers into another database, where NSA workers could peruse it at their leisure. In other words, Accumulo allows the NSA to do what Google does with your e-mails and Web searches—only with everything that flows across the Internet, or with every phone call you make. It works because of a type of server process called "iterators." These pieces of code constantly process the information sent to them and send back reports on emerging patterns in the data. Querying a multi-petabyte database and waiting for a response would be deadly slow, especially because there is always new data being added. The iterators are like NSA's tireless data elves. No NSA data overload - Accumulo checks. Kelly ‘12 Jeff Kelly is a Principal Research Contributor at The Wikibon Project and a Contributing Editor at SiliconANGLE. He focuses on trends in Big Data and business analytics. His research has been quoted and referenced by the Financial Times, Forbes, CIO.com, Network World, GigaOM, TechTarget and more – “Accumulo: Why The World Needs Another NoSQL Database” – Wikibon Blog – August 20th - http://wikibon.org/blog/breaking-analysis-accumulo-whythe-world-needs-another-nosql-database/ If you’ve been unable to keep up with all the competing NoSQL databases that have hit the market over the last several years, you’re not alone. To name just a few, there’s HBase, Cassandra, MongoDB, Riak, CouchDB, Redis, and Neo4J. To that list you can add Accumulo, an open source database originally developed at the National Security Agency. You may be wondering why the world needs yet another database to handle large volumes of multistructured data. The answer is, of course, that no one of these NoSQL databases has yet checked all the feature/functionality boxes that most enterprises require before deploying a new technology. In the Big Data world, that means the ability to handle the three V’s (volume, variety and velocity) of data, the ability to process multiple types of workloads (analytical vs. transactional), and the ability to maintain ACID (atomicity, consistency, isolation and durability) compliance at scale. With each new NoSQL entrant, hope springs eternal that this one will prove the NoSQL messiah. So what makes Accumulo different than all the rest? According to proponents, Accumulo is capable of maintaining consistency even as it scales to thousands of nodes and petabytes of data; it can both read and write data in near real-time; and, most importantly, it was built from the ground up with cell-level security functionality. Accumulo tech solves overload – and does so without mass privacy violations. Jackson ‘13 Joab Jackson covers enterprise software and general technology breaking news for the IDG News Service, and is based in New York. “NSA's Accumulo data store has strict limits on who can see the data” - PC World - Oct 31, 2013 - http://www.pcworld.com/article/2060060/nsas-accumulo-nosql-store-offers-rolebased-data-access.html With its much-discussed enthusiasm for collecting large amounts of data, the NSA naturally found much interest in the idea of highly scalable NoSQL databases. But the U.S. intelligence agency needed some security of its own, so it developed a NoSQL data store called Accumulo, with built-in policy enforcement mechanisms that strictly limit who can see its data. At the O’Reilly Strata-Hadoop World conference this week in New York, one of the former National Security Agency developers behind the software, Adam Fuchs, explained how Accumulo works and how it could be used in fields other than intelligence gathering. The agency contributed the software’s source code to the Apache Software Foundation in 2011. “Every single application that we built at the NSA has some concept of multi-level security,” said Fuchs, who is now the chief technology officer of Sqrrl, which offers a commercial edition of the software. The NSA started building Accumulo in 2008. Much like Facebook did with its Cassandra database around the same time, the NSA used the Google Big Table architecture as a starting point. In the parlance of NoSQL databases, Accumulo is a simple key/value data store, built on a shared-nothing architecture that allows for easy expansion to thousands of nodes able to hold petabytes worth of data. It features a flexible schema that allows new columns to be quickly added, and comes with some advanced data analysis features as well. Accumulo's killer feature Accumulo’s killer feature, however, is its “data-centric security,” Fuchs said. When data is entered into Accumulo, it must be accompanied with tags specifying who is allowed to see that material. Each row of data has a cell specifying the roles within an organization that can access the data, which can map back to specific organizational security policies. It adheres to the RBAC (role-based access control) model. This approach allowed the NSA to categorize data into its multiple levels of classification—confidential, secret, top secret—as well as who in an organization could access the data, based on their official role within the organization. The database is accompanied by a policy engine that decides who can see what data. This model could be used anywhere that security is an issue. For instance, if used in a health care organization, Accumulo can specify that only a patient and the patient’s doctor can see the patient’s data. The patient’s specific doctor may change over time, but the role of the doctor, rather than the NSA found that the data-centric approach “greatly simplifies application development,” Fuchs said. Because data today tends to be transformed and reused for different analysis applications, it individual doctor, is specified in the database. The makes sense for the database itself to keep track of who is allowed to see the data, rather than repeatedly implementing these rules in each application that uses this data. Mosaic Protection Frontlines 1nc ( ) Social media presents the façade of intimacy through self-enhancing depiction of identity Livingstone ‘8 [Sonia Livingstone, Professor of Social Psychology in the Department of Media and Communications at the London School of Economics and Political Science, “Taking risky opportunities in youthful content creation: Teenagers’ use of social networking sites for intimacy, privacy and self-expression”, LSE Research Online, 2008 http://eprints.lse.ac.uk/27072/1/Taking_risky_opportunities_in_youthful_content_creation_(LSE RO).pdf // date accessed 6/28/15 K.K] With this in mind, Ellie, Nina and others seem to suggest that, for younger teenagers, selfattention is enacted through constructing an elaborate, highly stylized statement of identity as display. Thus a visually ambitious, ‘pick and mix’ profile, that frequently remixes borrowed images and other content to express continually shifting tastes offers for some a satisfactorily ‘successful’ self, liked and admired by peers. But this notion of identity as display – which characterizes Daphne and Danielle’s profiles and, to a lesser degree, those of several of the others - is gradually replaced by the mutual construction among peers of a notion of identity through connection. On this alternative approach, elements of display are excised from the profile, replaced by the visual privileging of one’s contacts, primarily through links to others’ profiles and by posting photos of the peer group socializing offline. Equally stylized, albeit employing a different aesthetic, and still focused on the reflexive tasks of self-observation and self-assessment, this later phase brings to mind Giddens’ (1991: 91) argument that the ‘pure relationship’ is replacing the traditional relationship long embedded in structures of family, work or community. As he puts it, ‘the pure relationship is reflexively organized, in an open fashion, and on a continuous basis’, prioritizing the values of authenticity, reciprocity, recognition and intimacy. Reminiscent of the concerns reflected by teenagers when talking about social networking, the continuous revision of the self is hinted at when Leo says, ‘I’ll always be adding new friends’. The implications for judging others are brought out not only by Ellie’s emphasis, above, on people who are ‘actually’ friends and so know you already, but also by Ryan’s observation about others that, ‘you look at their pictures, see if they are authentic or not, so if they ain’t got any comments and they’re just adding people, then I can’t believe them’. Now, too, we may see that Danny’s omission of personal information on his profile is less a curious neglect of self than the prioritization of a self-embedded in social connections - for it is not that Danny cannot be bothered about networking: he sustains links with 299 friends and checks every day to see ‘if I’ve got any, like, messages, new friend requests or anything like that, like, new comments’. In terms of affordances, then, social networking sites frame, but do not determine. It remains open to young people to select a more or less complex representation of themselves linked to a more or less wide network of others. These choices pose advantages and disadvantages. Elaborating the presentation of self at the node supports the biographisation of the self by prioritizing a managed and stylized display of identity as lifestyle. But it risks invasions of privacy, since the backstage self is on view (Goffman, 1959), potentially occasioning critical or abusive responses from others. Something of the associated anxiety is evident in Ryan’s comment about his profile that ‘hopefully people will like it - if they don’t, then screw them’. The interlinking of opportunities and risks is also apparent when Danielle discusses how her friend used Piczo to express her unhappiness when her parents separated, ‘because other people can advise you what to do or say, don’t worry, you can go through it’; yet she is one of the few interviewees who talked about the risk of hostile comments, noting that ‘sometimes the comments are cruel and they’re [her friends] all crying and upset’. ( ) Can’t implement the theory – too slow technology changes. Kerr, 2012 (Orin S., Professor of Law @ George Washington University Law School “THE MOSAIC THEORY OF THE FOURTH AMENDMENT” Michigan Law Review Lexis) The first difficulty with the mosaic theory is the most obvious: Its implementation raises so many difficult questions that it will prove exceedingly hard to administer effectively. Because the mosaic theory departs dramatically from existing doctrine, implementing it would require the creation of a new set of Fourth Amendment rules – a mosaic parallel to the sequential precedents that exist today. The problem is not only the number of questions, but their difficulty. Many of the questions raised in Part III of this article are genuine puzzles that Fourth Amendment text, principles and history cannot readily answer. Judges should be reluctant to open the legal equivalent of Pandora’s Box. It is particularly telling that not even the proponents of the mosaic theory have yet proposed answers for how the theory should be applied. For example, a group of Fellows at Yale’s Information Society Project who endorse the mosaic approach simply dismissed the conceptual difficulties of its implementation on the ground that answering such puzzles is “why we have judges.”198 A pro-mosaic amicus brief in Jones signed by several prominent legal academics was similarly nonresponsive. Although the mosaic approach requires “tough decisions” to be made, the brief noted, courts have encountered difficult questions elsewhere in Fourth Amendment law. 199 While one can admire such confidence in the capabilities of the judiciary, it would provide more comfort if proponents of the mosaic theory would at least be willing to venture guesses as to how it should apply. The challenge of answering the questions raised by the mosaic theory has particular force because the theory attempts to regulate use of changing technologies. Law enforcement implementation of new technologies can occur very quickly, while judicial resolution of difficult constitutional questions occurs at a more glacial pace. As a result, the constantly-evolving nature of surveillance practices could lead new questions to arise faster than courts can settle them. Old practices would likely be obsolete by the time the courts resolved how to address them, and the newest surveillance practices would arrive and their legality would remain unknown. Like Lucy and Ethel trying to package candy on the everfaster conveyor belt, 200 the mosaic theory could place judges in the uncomfortable position of trying to settle a wide range of novel questions for technologies that are changing faster than the courts can resolve how to regulate them. Consider the changes in location-identifying technologies in the last three decades. Thirty years ago, the latest in police technologies to track location was the primitive radio beeper seen in Knotts. But radio beepers have gone the way of the 8track tape. Today the police have new tools at their disposal that were unknown in the Knotts era, ranging from GPS devices to cellsite records to license–plate cameras. This rapid pace of technological change creates major difficulties for courts trying to apply the mosaic theory: If the technological facts of the mosaic change quickly over time, any effort to answer the many difficult questions raised by the mosaic theory will become quickly outdated. Courts may devise answers to the many questions discussed in Part III, but by the time they do the relevant technology is likely to have gone the way of the radio beeper. ( ) There is a sequential approach to the Fourth Amendment now Kerr, 2012 (Orin S., Professor of Law @ George Washington University Law School “THE MOSAIC THEORY OF THE FOURTH AMENDMENT” Michigan Law Review Lexis) The five votes in favor of a mosaic approach in United States v. Jones do not establish the theory as a matter of law. The majority opinion in Jones failed to adopt the mosaic approach, and it only touched on the mosaic method in passing to express skepticism of it.187 Even if five votes of the current court are ready to embrace the theory, lower courts must adhere to Supreme Court holdings even when subsequent developments suggest that the Supreme Court would reject those holdings if it reviewed them.188 For now, then, the sequential approach remains good law. At the same time, the concurring opinions in Jones invite lower courts to consider embracing some form of the mosaic approach. Our attention therefore must turn to the normative question: Should courts embrace the mosaic theory? Is the mosaic approach a promising new method of Fourth Amendment interpretation, or is it a mistake that should be avoided? This section argues that courts should reject the mosaic theory. The better course is to retain the traditional sequential approach to Fourth Amendment analysis. The mosaic theory aims at a reasonable goal. Changing technology can outpace the assumptions of existing precedents, and courts may need to tweak prior doctrine to restore the balance of privacy protection from an earlier age. I have called this process “equilibrium adjustment,”189 and it is a longstanding method of interpreting the Fourth Amendment. But the mosaic theory aims to achieve this goal in a very peculiar way. ( ) Courts are not ruling on the Mosaic theory now Bellovin et al, 2014 (Steven M., Prof of Computer Science @ Columbia, Renee M. Hutchins, Associate Prof. of Law @ Maryland Francis King Carey School of Law, Tony Jebara, Associate Prof. of Computer Science @ Columbia, and Sebastian Zimmeck, Ph D. Candidate in Computer Science @ Columbia, “When Enough is Enough: Location Tracking, Mosaic Theory, and Machine Learning” New York University Journal of Law & Liberty Lexis) In the context of location tracking, the Court has previously suggested that the Fourth Amendment may (at some theoretical threshold) be concerned with the accumulated information revealed by surveillance.3 Similarly, in the Court’s recent decision in United States v. Jones, a majority of concurring justices indicated willingness to explore such an approach.4 However, in general, the Court has rejected any notion that technological enhancement matters to the constitutional treatment of location tracking.5 Rather, it has decided that such surveillance in public spaces, which does not require physical trespass, is equivalent to a human tail and thus not regu-lated by the Fourth Amendment. In this way, the Court has avoided a quantitative analysis of the amendment’s protections. The Court’s reticence is built on the enticingly direct assertion that objectivity under the mosaic theory is impossible. This is true in large part because there has been no rationale yet offered to objectively distinguish relatively short-term monitoring from its counterpart of greater duration.6 This article suggests that by combining the lessons of machine learning with the mosaic theory and apply-ing the pairing to the Fourth Amendment we can see the contours of a response. Machine learning makes clear that mosaics can be created. Moreover, there are important lessons to be learned on when this is the case.c ( ) Reasonable expectation of privacy is based on a probabilistic view of the fourth amendment. That fails because society has no idea what surveillance is common or rare. Kerr, 2012 (Orin S., Professor of Law @ George Washington University Law School “THE MOSAIC THEORY OF THE FOURTH AMENDMENT” Michigan Law Review Lexis) The third problem with the mosaic theory is that most formulations of it are based on a probabilistic approach to the reasonable expectation of privacy test that proves ill-suited to regulate technological surveillance practices. Supreme Court decisions have utilized several different inquiries for what makes an expectation of privacy constitutionally reasonable.201 In some cases the Court has looked to what a reasonable person would perceive as likely;202 in other cases the Court has looked to whether the particular kind information obtained is worthy of protection; 203 in some cases the Court has looked to whether the government violated some legal norm such as property in obtaining the information; 204 and in other cases the Court has simply considered whether the conduct should be regulated by the Fourth Amendment as a matter of policy.205 Use of these multiple inquiries (what I have called “models”) of Fourth Amendment protection allows the Court to adopt different approaches in different contexts, ideally selecting the model that best identifies the need for regulation in that particular setting.206 For the most part, formulations of the mosaic theory rest on the first of these approaches – what a reasonable person would see as likely. I have called this the probabilistic approach to Fourth Amendment protection,207 as it rests on a notion of the probability of privacy protection. The more likely it is that a person’s will maintain their privacy, the more likely it is that government conduct defeating that expectation counts a search. Under this model, the Fourth Amendment guards against surprises. The paradigmatic example is Bond v. United States,208 which involved government agents manipulating the duffel bag of a bus passenger to identify a wrapped brick of drugs inside it. A bus passenger expects other passengers to handle his bag but not “feel the bag in an exploratory manner,”209 the Court held, so the exploratory feel violated a reasonable expectation of privacy. Both Judge Ginsburg and Justice Alito authored mosaic opinions that rely on such probabilistic reasoning. Judge Ginsburg deemed long-term GPS monitoring a search because no stranger could conduct the same level of monitoring as a GPS device. Justice Alito reached the same result on the grounds that a reasonable person would not expect the police to obtain so much information. The probabilistic approach presents a poor choice to regulate technological surveillance because most individuals lack a reliable way to gauge the likelihood of technological surveillance methods. The probabilistic expectation of privacy applied in Bond relied on widespread and repeated personal experience. Bus passengers learn the social practices of bus travel by observing it first-hand. In contrast, estimating the frequency of technological surveillance practices is essentially impossible for most people (and most judges). Surveillance practices tend to be hidden, and few understand the relevant technologies. Some people will guess that privacy invasions are common, and others will guess that they are rare. But none will know the truth, which makes such probabilistic beliefs a poor basis for Fourth Amendment regulation. ( ) Courts can’t administer the mosaic theory Kerr, 2012 (Orin S., Professor of Law @ George Washington University Law School “THE MOSAIC THEORY OF THE FOURTH AMENDMENT” Michigan Law Review Lexis) The concurring opinions in Jones invite lower courts to experiment with a new approach to the Fourth Amendment search doctrine. The approach is well-intentioned, in that it aims to restore the balance of Fourth Amendment protection by disabling the new powers created by computerization of surveillance tools. But despite being well-intentioned, the mosaic theory represents a Pandora’s Box that courts should leave closed. The theory raises so many novel and difficult questions that courts would struggle to provide reasonably coherent answers. By the time courts worked through answers for any one technology, the technology would likely be long obsolete. Mosaic protection also could come at a cost of lost statutory protections, and implementing it would require courts to assess probabilities of surveillance that judges are poorly equipped to evaluate. In this case, the game is not worth the candle. The concurring opinions in Jones represent an invitation that future courts should decline. Instead of adopting a new mosaic theory, courts should consider the need to engage in equilibrium-adjustment within the confines of the traditional sequential approach. Backlines Mosaic That evidence is below Self Enhancement That evidence is below Case Turns Kills V2L 1nc Social media correlates to jealousy, social tension, isolation, and depression – stats Economist 13 (“Facebook is bad for you, Get a life!”, http://www.economist.com/news/science-andtechnology/21583593-using-social-network-seems-make-people-more-miserable-get-life, ZS) THOSE who have resisted the urge to join Facebook will surely feel vindicated when they read the latest research. A study just published by the Public Library of Science, conducted by Ethan Kross of the University of Michigan and Philippe Verduyn of Leuven University in Belgium, has shown that the more someone uses Facebook, the less satisfied he is with life. Past investigations have found that using Facebook is associated with jealousy, social tension, isolation and depression. But these studies have all been “cross-sectional”—in other words, snapshots in time. As such, they risk confusing correlation with causation: perhaps those who spend more time on social media are more prone to negative emotions in the first place. The study conducted by Dr Kross and Dr Verduyn is the first to follow Facebook users for an extended period, to track how their emotions change. The researchers recruited 82 Facebookers for their study. These volunteers, in their late teens or early 20s, agreed to have their Facebook activity observed for two weeks and to report, five times a day, on their state of mind and their direct social contacts (phone calls and meetings in person with other people). These reports were prompted by text messages, sent between 10am and midnight, asking them to complete a short questionnaire. When the researchers analysed the results, they found that the more a volunteer used Facebook in the period between two questionnaires, the worse he reported feeling the next time he filled in a questionnaire. Volunteers were also asked to rate their satisfaction with life at the start and the end of the study. Those who used Facebook a lot were more likely to report a decline in satisfaction than those who visited the site infrequently. In contrast, there was a positive association between the amount of direct social contact a volunteer had and how positive he felt. In other words, the more volunteers socialised in the real world, the more positive they reported feeling the next time they filled in the questionnaire. A volunteer’s sex had no influence on these findings; nor did the size of his (or her) social network, his stated motivation for using Facebook, his level of loneliness or depression or his self-esteem. Dr Kross and Dr Verduyn therefore conclude that, rather than enhancing wellbeing, Facebook undermines it. Off Case Topicality – Curtail 1nc 1. “Curtail” means to restrict Webster’s 15 – Webster's New World College Dictionary, 4th Ed., “curtail”, http://www.yourdictionary.com/curtail verb To curtail is defined as to restrict something, stop something or deprive of something. An example of curtail is when a town wants to stop drunk driving. 2. “Restriction” requires binding enforcement---policies that have discouraging effects on surveillance but don’t legally limit it aren’t topical Barnett 3 (Stephen R., Boalt Professor of Law Emeritus – University of California, Berkeley, “No-Citation Rules Under Siege: A Battlefield Report and Analysis”, The Journal of Appellate Practice and Process, Fall, 5 J. App. Prac. & Process 473, Lexis) C. "Restrictions" on Citation: Introducing Draft B Despite this assurance, under the present drafting it is not clear that the proposed Rule 32.1 does preserve circuit choice on the question of citation weight. When the proposed Rule says, "No prohibition or restriction may be imposed upon the citation of [unpublished] judicial opinions," what does "restriction" [*491] mean? If a circuit's rule provides - as several do 122 - that unpublished opinions may be cited only for their "persuasive" value, is that not a "restriction" on their citation? One might think so. And if so, it would follow that circuit rules limiting citation to persuasive value are forbidden by Rule 32.1, because no such limit is imposed on the citation of published opinions. 123 Two possible remedies come to mind. One is legislative history, or drafter's gloss. The Committee Note might declare the committee's view that the Rule deals only with citability and "says nothing whatsoever about the effect that a court must give" to the cited opinions. 124 If we may assume that the judges and lawyers operating in the federal appellate courts have no aversion to legislative history, 125 this approach might produce the committee's desired interpretation of its Rule. The other approach would proceed on the basis that if you want to permit citation, you might just say that citation is permitted. 126 Draft B thus would simply provide: Any opinion, order, judgment, or other disposition by a federal court may be cited to or by any court. This language would make quite clear the committee's view that the Rule deals only with permitting citation and says nothing about the weight to be given citations. Draft B also would take the lead out of the drafting. You don't have to be Bryan Garner to object to the present draft's double negative ("no prohibition)"; its vast passive ("may be imposed"); its [*492] awkward laundry list of unpublished dispositions; or its backhanded approach of making opinions citable by banning restrictions on citation. Before concluding, however, that the elegant Draft B should replace the committee's cumbersome Draft A, it is necessary to consider how each draft would handle a major problem that will arise. D. Discouraging Words This is the problem of discouraging words. Although nine of the thirteen circuits now allow citation of their unpublished opinions, all nine discourage the practice; they all have language in their rules stating that such citation is "disfavored," that unpublished opinions should not be cited unless no published opinion would serve as well, that the court "sees no precedential value" in unpublished opinions, and so forth. 127 The question is whether such discouraging words are a forbidden "restriction" on citation under proposed Rule 32.1. The Advisory Committee addresses this question with the following Delphic pronouncement: Unlike many of the local rules of the courts of appeals, Rule 32.1(a) does not provide that citing "unpublished" opinions is "disfavored" or limited to particular circumstances (such as when no "published" opinion adequately addresses an issue). Again, it is difficult to understand why "unpublished" opinions should be subject to restrictions that do not apply to other sources. 128 The first sentence of this passage does not say that Rule 32.1 would overrule those local rules - only that it is "unlike" them. The second sentence, however, characterizes the discouraging words as "restrictions," so in the committee's apparent view, Rule 32.1 would overrule them. Four questions follow: (1) Are discouraging words "restrictions" on citation under Rule 32.1? (2) What difference, if any, does it make? (3) What is the risk of judicial resistance to [*493] no-citation rules, through discouraging words or other means? and (4) Should discouraging words be forbidden? 1. Are Discouraging Words "Restrictions" under Rule 32.1? The committee's statement notwithstanding, it is not clear that discouraging words have to be considered "restrictions" on citation under the proposed Rule 32.1. These words may be wholly admonitory - and unenforceable. The Fourth Circuit's rule, for example, states that citing unpublished opinions is "disfavored," but that it may be done "if counsel believes, nevertheless, that [an unpublished opinion] has precedential value in relation to a material issue in a case and that there is no published opinion that would serve as well." 129 On the question of what counsel "believes," surely counsel should be taken at her word; counsel's asserted belief that an unpublished opinion has precedential or persuasive value should not be considered a falsifiable fact. Hence no sanction should be available for violating the Fourth Circuit's rule, and the rule's discouraging language in turn would not be a "prohibition or restriction" that was barred by Rule 32.1 as presently drafted. In the rules of some other circuits, however, the language disfavoring citation of unpublished opinions is unmoored from anyone's "belief" and arguably does impose an objective "prohibition or restriction" determinable by a court. 130 A court might find, for example, that the required "persuasive value with respect to a material issue that has not been addressed in a published opinion" 131 was not present, and hence that the citation was not permitted by the circuit rule. With what result? It would follow, paradoxically, that the opinion could be cited - because the circuit rule would be struck down under Rule 32.1 as a forbidden "restriction" on citation. The committee's double-negative drafting thus creates a Hall of Mirrors in which citation of an unpublished opinion [*494] would be allowed either way. If the local rule's discouraging language is merely hortatory, it is not a "restriction" forbidden by Rule 32.1; but that doesn't matter, because such a rule does not bar the citation in the first place. If, on the other hand, the local rule's language has bite and is a "restriction," then Rule 32.1 strikes it down, and again the citation is permitted. 2. What Difference Does It Make Whether Discouraging Words Are "Restrictions"? There is one live question, however, that would turn on whether a local rule's discouraging language constituted a "restriction" on citation. If the language was a restriction, it would be condemned by Rule 32.1 132 and so presumably would have to be removed from the local circuit rule. Each circuit's rule thus would have to be parsed to determine whether its discouraging words were purely hortatory or legally enforceable; and each circuit thus would have to decide - subject to review by the Judicial Conference? - which of its discouraging words it could keep. 3. Voting issue--4. Limits---allowing effectual reductions explodes the topic. Any action can potentially result in less surveillance. Limits are key to depth of preparation and clash. 5. Ground---our interpretation is key to establish a stable mechanism of legal prohibition that guarantees core ground based on topic direction. They allow the Aff to defend completely different processes like “oversight” that dodge core DAs and rob the best counterplan ground. SOP Counterplan 1nc The United States Supreme Court should rule based on the separation of powers doctrine that the gathering of intelligence data from social networks is unconstitutional. 1st and 4th amendment challenges to surveillance fail – the counterplan is key to legitimately stopping surveillance Slobogin 15 (Christopher -Milton Underwood Professor of Law, Chris Slobogin has authored more than 100 articles, books and chapters on topics relating to criminal procedure, mental health law and evidence. Named director of Vanderbilt Law School’s Criminal Justice Program in 2009, Professor Slobogin is one of the five most cited criminal law and procedure law professors in the country, according to the Leiter Report, Vanderbilt University Law School, Standing and Covert Surveillance, Pepperdine Law Review, February 18, 2015, http://papers.ssrn.com/sol3/papers.cfm?abstract_id=2567070, JZG) IV. A THIRD BASIS FOR CHALLENGING SURVEILLANCE: SEPARATION OF POWERS AND THE NONDELEGATION DOCTRINE One response to standing arguments based on the insights of scholars like Milligan and Richards is that they ignore the close relationship between standing and the scope of the right in question.131 Indeed, when the Fourth Amendment is the basis for the claim, the Supreme Court has explicitly conflated standing with the Amendment’s substance. In Rakas v. Illinois, 132 the Court stated that the decision as to whether a defendant can make a Fourth Amendment claim “forthrightly focuses on the extent of a particular defendant’s rights under the Fourth Amendment, rather than on any theoretically separate, but invariably intertwined concept of standing.”133 If a government action is not a Fourth Amendment “search” vis-à-vis the litigant, Rakas held, then the litigant lacks standing to challenge it. If that reasoning is the correct approach to standing, then in cases challenging covert surveillance on Fourth or First Amendment grounds everything rides on whether the surveillance, as it operates in the way the plaintiff describes it, infringes the plaintiff’s reasonable expectations of privacy or speech and association interests.134 While such a finding would presumably be made in the Clapper case, which involved the alleged interception of the content of overseas phone calls,135 it is less certain in connection with collection and querying of metadata. The Fourth Amendment is only meant to protect reasonable expectations of privacy.136 Supreme Court case law to date strongly suggests that any privacy one might expect in one’s metadata or Internet activity is unreasonable, because we assume the risk that third parties to which we knowingly impart information (here phone companies and Internet service providers) will in turn divulge it to the government.137 The same type of analysis might limit standing in cases brought under the First Amendment. As the Court intimated in Clapper, 138 one could conclude that even if speech and association are inhibited by surveillance, that inhibition proximately results from the individual’s choices, not from anything the government has done to the individual.139 On this view, even if an individual can show that he or she was targeted, standing to contest surveillance does not exist unless and until the government uses the seized information against the individual, because otherwise a colorable claim that a constitutionally cognizable interest was infringed cannot be made. If, despite its impact on political participation, covert surveillance like the metadata program remains immune from Fourth and First Amendment challenges, there remains another avenue of attack, derived directly from separation of powers doctrine. In other work, I have argued that, even if the Fourth (or First) Amendment does not govern a particular type of surveillance, Ely’s political process theory provides a basis for challenging panvasive actions that are the result of a seriously flawed political process.140 More specifically, panvasive surveillance might be challengeable on one of three grounds: (1) the surveillance is not authorized by the appropriate legislative body; (2) the authorizing legislative body does not meaningfully represent the group affected by the surveillance; or (3) the resulting legislation or law enforcement’s implementation of it violates notions underlying the non-delegation doctrine.141 The first and third of these grounds are based explicitly on separation of powers concerns. As I pointed out, some panvasive surveillance has not been legislatively authorized or has been authorized by legislation that does not announce an “intelligible principle” governing the implementing agency.142 Panvasive surveillance is also defective under non-delegation principles if, as I have argued is true of the NSA’s metadata program, it is implemented by rules or practices that are not explained, were produced through flawed or non-transparent procedures, or are applied unevenly.143 Based on several Supreme Court cases, particularly in the administrative law area,144 I concluded that any one of these deficiencies could be the basis for the claim that the legislature, the relevant law enforcement agency, or both are failing to carry out their constitutional obligations as lawmaking and law implementing bodies.145 Although this type of claim, like the Fourth and First Amendment claims, aims at “generalized relief,” the Court itself has often granted standing to individuals making separation of powers claims.146 The rationale of these cases is not difficult to grasp, because it again reflects the political process rationale. Many years ago Justice Brandeis stated, “[T]he doctrine of the separation of powers was adopted by the convention of 1787 not to promote efficiency but to preclude the exercise of arbitrary power.”147 More recently, Chief Justice Burger asserted that “checks and balances were the foundation of a structure of government that would protect liberty.”148 More recently still, in Bond v. United States149 the Court stated “[t]he structural principles secured by the separation of powers protect the individual as well.”150 If one accepts the possibility that a separation of powers argument can be made in covert surveillance cases, then parties who can demonstrate the type of injury described above—that is, a significant stifling of political participation that, to borrow the Second Circuit’s language in its Clapper decision,151 is a reasonable, non-fanciful, and non-paranoid reaction to covert surveillance—should have standing to challenge panvasive surveillance even if it is not a search under the Fourth Amendment or does not abridge First Amendment freedom. The merits claim would not be that the surveillance is an unreasonable search or infringement of speech or association rights, but rather that the legislature has failed in its delegation task or that the relevant law enforcement or intelligence agency has acted in an ultra vires fashion. These are the types of separation of powers claims that courts ought to hear because they assure the proper functioning of the political process that the Court is so eager to protect (with, inter alia, its standing doctrine). To requote Chief Justice Roberts, “[T]he obligation of the Judiciary [is] not only to confine itself to its proper role, but to ensure that the other branches do so as well.”152 Mosaic Disadvantage 1nc Cyber Harassment Cyberharassment is a growing problem - mosaic theory hinders apprehension. Gray, Keats Citron, and Rinehart, 2013 (David, Associate Professor, University of Maryland Francis King Carey School of Law, Danielle, Lois K. Macht Research Professor of Law, University of Maryland Francis King Carey School of Law, and Liz Clark, University of Maryland Francis King Carey School of Law, “SYMPOSIUM ON CYBERCRIME: FIGHTING CYBERCRIME AFTER UNITED STATES V. JONES” Journal of Criminal Law & Criminology Lexis) Cyberharassment is a widespread and growing challenge for law enforcement in the United States. These online attacks feature threats of violence, privacy invasions, reputation-harming falsehoods, impersonation, computer hacking, and extortion. They often appear in e-mails, instant messages, blog entries, message boards, or sites devoted to tormenting individuals. As the executive director of the National Center for Victims of Crime explained in her congressional testimony supporting the 2006 cyberstalking amendment to the Violence Against Women Act: Stalkers are using very sophisticated technology ... - installing spyware on your computer so that they can track all of your interactions on the Internet, your purchases, your e-mails and so forth, and then using that against you, forwarding e-mails to people at your job, broadcasting your whereabouts, your purchases, your reading habits and so on, or installing GPS in your car so that you will show up at the grocery store, at your local church, wherever and there is the stalker and you can't imagine how the stalker knew that you were going to be there... . I am happy that this legislation amends the statute so that prosecutors have more effective tools, I think, to address technology through VAWA 2005. n257 Although some attackers confine their harassment to networked technologies, others use all available tools to harass victims, including real-space contact. Offline harassment or stalking often includes abusive phone calls, vandalism, 850,000 adults experienced stalking with an online component in 2006, including threats in e-mails, text messages, chat rooms, and blogs. n259 Young people are even more likely to experience some form of cyberharassment. The National Center for Education Statistics reports that, during the 20082009 school year, 1.5 million young people in the United States were victims of some form of cyberharassment. n260 Already a significant problem, [*789] cyberharassment is on the rise. College students now report more sexually harassing speech in online interactions than in faceto-face ones. As the National Institute of Justice explains, the "ubiquity of the Internet and the ease with which it allows others unusual access to personal information" make individuals more accessible and vulnerable to online abuse. n261 Harassing someone online is far cheaper and less personally risky than confronting them in space. n262 Cyberharassment and the identity of its victims follow the well-worn pathways of bias crimes. The most recent Bureau of Justice Statistics findings report that 74% of online stalking victims are female. n263 Perpetrators are far more likely to be men. n264 Unsurprisingly, the content of these attacks are often sexually explicit and demeaning, drawing predominantly on gender stereotypes. As one blogger observed, "the fact is, to be a woman online is to eventually be threatened with rape and death. On a long enough timeline, the chances of this not occurring drop to [*790] zero." n265 Cyberharassment also follows racial lines. A study conducted in 2009 asked 992 undergraduate students about their experience with cyberharassment. According to this study, nonwhite females faced cyberharassment more than any other group, with 53% reporting having been harassed online. Next were white females, with 45% reporting having been targeted online, with nonwhite males right behind them at 40%. The group least likely to have been harassed was white males, at 31%. n266 Across race, being lesbian, transgender, or bisexual also raised the risk of being harassed. real n267 Another disturbing feature of cyberharassment is that it tends to be perpetrated by groups rather than individuals. Those who engage in abusive online conduct often move in packs. n268 Cyberharassers frequently engage proxies to help torment their victims. n269 These group threatening mail, and physical assault. n258 According to the Bureau of Justice Statistics, attacks bear all of the hallmarks of violent mob behavior. So much so, in fact, that one of us has dubbed them "cyber mobs." n270 As with sole practitioners, online mob harassment is more likely to be perpetrated by members of dominant demographics, and to draw on popular stigmas for the purpose of shaming and degrading their targets. n271 Of course, cold statistics and general description tell at best part of the story of legitimate government and law enforcement interests in preventing, detecting, and prosecuting cyberharassment. Recent efforts to highlight the privacy interests that compel recognition of the mosaic theory of Fourth Amendment privacy make liberal use of individual stories, in part to pluck [*791] empathetic strings in the audience. n272 In weighing the competing interests at stake in regulating access to and use of digital surveillance technologies, it is therefore fair to consider the impact of crimes like cyberharassment in individual cases. Take the publicly reported case of D.C. v. R.R. n273 D.C. was a high school student who was actively pursuing a career in the entertainment industry as a singer and actor. n274 He used a pseudonym in his professional career, n275 under which he maintained a fan site that, among other features, allowed visitors to post comments to a "guestbook." Several students at D.C.'s school, who were later identified in a civil suit, engaged in a pattern of targeted harassment of D.C. by posting comments to his website. Some were simply offensive - one student told D.C. that he was "the biggest fag in the [high school] class." n276 Others, however, went much further, threatening physical and sexual violence in graphic detail. One person posted on D.C.'s website, "I want to rip out your fucking heart and feed it to you... . If I ever see you I'm ... going to pound your head in with an ice pick. Fuck you, you dick-riding penis lover. I hope you burn in hell." n277 Another post told D.C. that he was "now officially wanted dead or alive," and a third promised to "unleash my manseed in those golden brown eyes." n278 According to a California appellate court, the contents of these posts suggested that "the students ... sought to destroy D.C.'s life, threatened to murder him, and wanted to drive him out of [his high school] and the community in which he lived." n279 In that goal they were successful. On [*792] advice of law enforcement, who consulted the Federal Bureau of Investigation, D.C. withdrew from his school and moved with his family to the other end of the state. n280 Despite these efforts, the student newspaper at his former school reported his new location and the name of his new Cyberharassment has also spawned a new brand of extortion labeled "sextortion." n283 This is a form of blackmail in which the extortionist threatens to publicize images or information that his target might find embarrassing unless the victim provides sexually explicit pictures and videos or agrees to participate in live sex shows via Skype or other direct video communications. n284 One infamous institution. n281 As a consequence of this harassment, D.C. developed a persistent anxiety disorder. n282 perpetrator of sextortion schemes invaded his targets' computers using malicious software that allowed him to mine his victims' hard drives for compromising images or to capture images using their own computer cameras. n285 He then used those images and access to his targets' computers and e-mail accounts to terrorize them until they agreed to produce sexually explicit pictures or videos for him. Young people are particularly vulnerable. n286 Teenagers who are extorted into engaging in explicit sex acts under threat and at such a formative stage of their development are also more likely to suffer scarring emotional and psychological harm. n287 As United States Attorney Joseph Hogsett put the [*793] point when commenting on a successful prosecution, "This defendant may not remember his alleged Cyberharassers engage in telephone harassment as well. For example, in September 2010, Daniel Leonard pleaded guilty to a pattern of harassment that victims, but the true tragedy is that not one of them will ever forget." n288 involved over 4,000 threatening and sexually explicit phone calls made to over 1,200 phone numbers using an Internet "spoofing" service that masked his phone number from the call recipients. n289 Others go further still by using the Internet to incite others to rape and stalk victims. Federal prosecutors recently brought a cyberstalking indictment against a man who impersonated his ex-girlfriend online over a four-year period, inciting others to stalk her in person. The man posted online advertisements with the victim's contact information and her alleged desire for sex with strangers. On porn sites, he uploaded videos of her having sex (which he filmed while they were dating) alongside her contact information. n290 Because strange men began appearing at her home demanding sex, the woman changed her name and moved to another state. Her ex-boyfriend discovered her new personal information and again posted her name, address, and an invitation to have sex on pornography sites next to her picture. The cycle repeated itself, with strange men coming to her house at night demanding sex. Although this victim was never physically assaulted, others are not so lucky. In December 2009, Ty McDowell broke into the home of a woman in Casper, Wyoming, tied her up, and raped her. During the course of the [*794] attack, he told her: "You want an aggressive man, bitch, I'll show you aggressive." n291 Although McDowell did not know his victim, his crime was not random. Rather, he had responded to an online advertisement posted on Craigslist that purported to be from a woman seeking to fulfill her own rape fantasies. After a lengthy correspondence with the ad's poster, McDowell believed that he was fulfilling his victim's desires. n292 He was not. As a subsequent investigation would reveal, McDowell was in communication with Jebediah Stipe, who posted the ad and arranged the attack on his ex-girlfriend. n293 Stipe and McDowell were sentenced to sixty-year prison terms after Cyberharassment can also be more general. Sites that encourage sexualized online abuse are all too common. The website pleading guilty to charges of aggravated kidnapping, rape, and burglary. n294 IsAnyoneUp.com provides a notorious example. For a time, it was one of the most popular forums on the Internet for "revenge porn," which entails spurned former lovers posting sexualized pictures of their ex-wives and ex-girlfriends on a public forum so that others can leer at and demean them. n295 Although IsAnyoneUp.com eventually shut down amidst protests and outcry, its operator, Hunter Moore, started a similar site under a different name, HunterMoore.TV, which may eventually include not only pictures of women, but also an overlaid map to the homes of those featured in the pictures. n296 Consider too "Violentacrez," a notorious Reddit administrator [*795] who oversaw forums like "Jailbait," "Creepshots," "Rapebait," "Incest," "Beatingwomen," and "Picsofdeadjailbait," each of which featured pictures and commentary from his followers that celebrated the interests described by the forums' titles. n297 There is, of course, much more to be written about the incidents and dynamics of cyberharassment crimes. For present purposes, however, the foregoing is sufficient to show that there are significant and legitimate governmental interests at stake in preventing, detecting, and prosecuting various forms of cyberharassment. Although cyberharassment is relatively new, executives and legislatures have manifested these interests by setting up dedicated enforcement units and passing tailored criminal statutes. n298 As we argue in the next section, adopting a mosaic theory of the Fourth Amendment likely will implicate these law enforcement concerns by limiting access to both existing and future digital surveillance techniques and technologies. n299 Online harassment and the lack of response from institutions allows for threats, violence, and discrimination against women to continue unabated Hess 14 – Amanda Hess is a Slate staff writer and popular Gender & Sexuality reporter, 2014 (“Why Women Aren't Welcome on the Internet,” Pacific Standard, 1/6/14, http://www.psmag.com/health-and-behavior/women-arent-welcome-internet-72170, 7/3/15)//CM A woman doesn’t even need to occupy a professional writing perch at a prominent platform to become a target. According to a 2005 women and men have been logging on in equal numbers since 2000, but the vilest communications are still disproportionately lobbed at women. We are more likely to report being stalked and harassed on the Internet—of the 3,787 people who reported harassing incidents from 2000 to 2012 to the volunteer organization Working to Halt Online Abuse, 72.5 percent were female. Sometimes, the abuse can get physical: A Pew survey reported that five percent of women who used the Internet said “something happened online” that led them into “physical danger.” And it starts young: Teenage girls are significantly more likely to be cyberbullied than boys. Just appearing as a woman online, it seems, can be enough to inspire abuse. In 2006, report by the Pew Research Center, which has been tracking the online lives of Americans for more than a decade, researchers from the University of Maryland set up a bunch of fake online accounts and then dispatched them into chat rooms. Accounts with feminine usernames incurred an average of 100 sexually explicit or threatening messages a day. Masculine names received 3.7. There are three federal laws that apply to cyberstalking cases; the first was passed in 1934 to address harassment through the mail, via telegram, and over the telephone, six decades after Alexander Graham Bell’s invention. Since the initial passage of the Violence Against Women Act, in 1994, amendments to the law have gradually updated it to apply to new technologies and to stiffen penalties against those who use them to abuse. Thirty-four states have cyberstalking laws on the books; But making quick and sick threats has become so easy that many say the abuse has proliferated to the point of meaninglessness, and that expressing alarm is foolish. Reporters who take death threats seriously most have expanded long-standing laws against stalking and criminal threats to prosecute crimes carried out online. “often give the impression that this is some kind of shocking event for which we should pity the ‘victims,’” my colleague Jim Pagels wrote in Slate this fall, “but anyone who’s spent 10 minutes online knows that these assertions are entirely toothless.” On Twitter, he added, “When there’s no precedent for physical harm, it’s only baseless fear mongering.” My friend Jen Doll wrote, at The Atlantic Wire, “It seems like that old ‘ignoring’ tactic your mom taught you could work out to everyone’s benefit.... These people are bullying, or hope to bully. Which means we shouldn’t take the bait.” In the epilogue to her book The End of Men, Hanna Rosin—an editor at Slate—argued that harassment of women online could be seen as a cause for celebration. It shows just how far we’ve come. Many women on the Internet “are in positions of influence, widely published and widely read; if they sniff out misogyny, I have no doubt they will gleefully skewer the responsible sexist in one of many available online outlets, and get results.” "Twitter is the place where I laugh, whine, work, schmooze, procrastinate, and flirt. It sits in my back pocket wherever I go and lies next to me when I fall asleep. And since I first started writing in 2007, it's become just one of the many online spaces where men come to tell me to get out." So women who are harassed online are expected to either get over ourselves or feel flattered in response to the threats made against us. We have the choice to keep quiet or respond “gleefully.” But no matter how hard we attempt to ignore it, this type of gendered harassment—and the sheer volume of it—has severe implications for women’s status on the Internet. Threats of rape, death, and stalking can overpower our emotional bandwidth, take up our time, and cost us money through legal fees, online protection services, and missed wages. I’ve spent countless hours over the past four years logging the as the Internet becomes increasingly central to the human experience, the ability of women to live and work freely online will be shaped, and too often limited, by the technology companies that host these threats, the constellation of local and federal law enforcement officers who investigate them, and the popular commentators who dismiss them—all arenas that remain dominated by men, many of whom have little personal understanding of what women face online every day. This Summer, online activity of one particularly committed cyberstalker, just in case. And Caroline Criado-Perez became the English-speaking Internet’s most famous recipient of online threats after she petitioned the British government to put more female faces on its bank notes. (When the Bank of England announced its intentions to replace social reformer Elizabeth Fry with Winston Churchill on the £5 note, Criado-Perez made the modest suggestion that the bank make an effort to feature at least one woman who is not the Queen on any of its currency.) Rape and death threats amassed on her Twitter feed too quickly to count, bearing messages like “I will rape you tomorrow at 9 p.m ... Shall we meet near your house?” Then, something interesting happened. Instead of logging off, Criado-Perez retweeted the threats, blasting them out to her Twitter followers. She called up police and hounded Twitter for a response. Journalists around the world started writing about the threats. As more and more people heard the story, Criado-Perez’s follower count skyrocketed to near 25,000. Her supporters joined in urging British police and Twitter executives to respond. Under the glare of international criticism, the police and the company spent the next few weeks passing the buck back and forth. Andy Trotter, a communications adviser for the British police, announced that it was Twitter’s responsibility to crack down on the messages. Though Britain criminalizes a broader category of offensive speech than the U.S. does, the sheer volume of threats would be too difficult for “a hard-pressed police service” to investigate, Trotter said. Police “don’t want to be in this arena.” It diverts their attention from “dealing with something else.” Feminine usernames incurred an average of 100 sexually explicit or threatening messages a day. Masculine names received 3.7. Meanwhile, Twitter issued a blanket statement saying that victims like Criado-Perez could fill out an online form for each abusive tweet; when Criado-Perez supporters hounded Mark Luckie, the company’s manager of journalism and news, for a response, he briefly shielded his account, saying that the attention had become “abusive.” Twitter’s official recommendation to victims of abuse puts the ball squarely in law enforcement’s court: “If an interaction has gone beyond the point of name calling and you feel as though you may be in danger,” it says, “contact your local authorities so they can accurately assess the validity of the threat and help you resolve the issue offline.” In the weeks after the flare-up, Scotland Yard confirmed the arrest of three men. Twitter—in response to several online petitions calling for action—hastened the rollout of a “report abuse” button that allows users to flag offensive material. And Criado-Perez went on The Internet is a global network, but when you pick up the phone to report an online threat, whether you are in London or Palm Springs, you end up face-to-face with a cop who patrols a comparatively puny jurisdiction. And your cop will probably be a man: According to the U.S. Bureau of Justice Statistics, in 2008, only 6.5 percent of state police officers and 19 percent of FBI agents were women . The numbers get receiving threats. Some real person out there—or rather, hundreds of them—still liked the idea of seeing her raped and killed. smaller in smaller agencies. And in many locales, police work is still a largely analog affair: 911 calls are immediately routed to the local police force; the closest officer is dispatched to respond; he takes notes with pen and paper. After Criado-Perez received her hundreds of threats, she says she got conflicting instructions from police on how to report the crimes, and was forced to repeatedly “trawl” through the vile messages to preserve the evidence. “I can just about cope with threats,” she wrote on Twitter. “What I can’t cope with after that is the victim-blaming, the patronising, and the police record-keeping.” Last year, the American atheist blogger Rebecca Watson wrote about her experience calling a series of local and national law enforcement agencies after a man launched a website threatening to kill her. “Because I knew what town [he] lived in, I called his local police department. They told me there was nothing they could do and that I’d have to make a report with my local police department,” Watson wrote later. “[I] finally got through to someone who told me that there was nothing they could do but take a report in case one day [he] followed through on his threats, at which point they’d have a pretty good lead.” The first time I reported an online rape threat to police, in 2009, the officer dispatched to my home asked, “Why would anyone bother to do something like that?” and declined to file a report. In Palm Springs, the officer who came to my room said, “This guy could be sitting in a basement in Nebraska for all we know.” That my stalker had said that he lived in my state, and had plans to seek me out at home, was dismissed as just another online ruse. Of course, some people are investigated and prosecuted for cyberstalking. In 2009, a Florida college student named Patrick Macchione met a girl at school, then threatened to kill her on Twitter, terrorized her with lewd videos posted to YouTube, and made hundreds of calls to her phone. Though his victim filed a restraining order, cops only sprung into action after a county sheriff stopped him for loitering, then reportedly found a video camera in his backpack containing disturbing recordings about his victim. The sheriff’s department later worked with the state attorney’s office to convict Macchione on 19 counts, one of which was cyberstalking (he successfully appealed that count on grounds that the law hadn’t been enacted when he was arrested); Macchione was sentenced to four years in prison. Consider also a recent high-profile case of cyberstalking investigated by the FBI. In the midst of her affair with General David Petraeus, biographer Paula Broadwell allegedly created an anonymous email account for the purpose of sending harassing notes to Florida socialite Jill Kelley. Kelley reported them to the FBI, which sniffed out Broadwell’s identity via the account’s location-based metadata and obtained a warrant to monitor her email activity. In theory, appealing to a higher jurisdiction can yield better results. “Local law enforcement will often look the other way,” says Dr. Sameer Hinduja, a criminology professor at Florida Atlantic University and co-director of the Cyberbullying Research Center. “They don’t have the resources or the personnel to investigate those crimes.” County, state, or federal agencies at least have the support to be more responsive: “Usually they have a computer crimes unit, savvy personnel who are familiar with these cases, and established relationships with social media companies so they can quickly send a subpoena to help with the investigation,” Hinduja says. But in my experience and those of my colleagues, these larger law enforcement agencies have little capacity or drive to investigate threats as well. Despite his pattern of abusive online behavior, Macchione was ultimately arrested for an unrelated physical crime. When I called the FBI over headlessfemalepig’s threats, a representative told me an agent would get in touch if the bureau was interested in pursuing the case; nobody did. And when Rebecca Watson reported the threats targeted at her to the FBI, she initially connected with a sympathetic agent—but the agent later expressed trouble opening Watson’s file of screenshots of the threats, and soon stopped replying to her emails. The Broadwell investigation was an uncommon, and possibly unprecedented, exercise for the agency. As University of Wisconsin-Eau Claire criminal justice professor Justin Patchin told Wired at the time: “I’m not aware of any case when the FBI has gotten involved in a case of online harassment.” After I received my most recent round of threats, I asked Jessica Valenti, a prominent feminist writer (and the founder of the blog Feministing), who’s been repeatedly targeted with online threats, for her advice, and then I asked her to share her story. “It’s not really one story. This has happened a number of When rape and death threats first started pouring into her inbox, she vacated her apartment for a week, changed her bank accounts, and got a new cell number. When the next wave of threats came, she got in touch with law enforcement officials, who warned her that though the men emailing her were unlikely to follow through on their threats, the level of vitriol indicated that she should be vigilant for a far less identifiable threat: silent “hunters” who lurk behind the tweeting “hollerers.” The FBI advised Valenti to leave her home until the threats blew over, to never walk outside of her apartment alone, and to keep aware of any cars or men who might show up repeatedly outside her door. “It was totally impossible advice,” she says. “You have to be paranoid about everything. You can’t just not be in a public place.” And we can’t simply be offline either. When Time journalist Catherine Mayer reported the bomb threat times over the past seven years,” she told me. lodged against her, the officers she spoke to—who thought usernames were secret codes and didn’t seem to know what an IP address was—advised her to unplug. “Not one of the officers I’ve encountered uses Twitter or understands why anyone would wish to do so,” she later wrote. “The officers were unanimous in advising me to take a break from Twitter, assuming, as many people do, that Twitter is at best a time-wasting narcotic.” All of these online offenses are enough to make a woman want to click away from Twitter, shut her laptop, and power down her phone. Sometimes, we do withdraw: Pew found that from 2000 to 2005, the percentage of Internet users who participate in online chats and discussion groups dropped from 28 percent to 17 percent, “entirely because of women’s fall off in participation.” But for many women, steering clear of the Internet isn’t an option. We use our devices to find supportive communities, make a living, and construct safety nets. For a woman like me, who lives alone, the Internet isn’t a fun diversion—it is a necessary resource for work and interfacing with friends, family, and, sometimes, law enforcement officers in The Internet is a global network, but when you pick up the phone to report an online threat, you end up face-to-face with a cop who patrols a comparatively puny jurisdiction. The Polish sociologist Zygmunt Bauman draws a distinction between “tourists” and “vagabonds” in the modern economy. Privileged tourists move about the world “on purpose,” to seek “new experience” as “the joys of the familiar wear off.” Disempowered vagabonds relocate because they have to, pushed and pulled through mean streets where they could never hope to settle down. On the Internet, men are tourists and women are vagabonds. “Telling a woman to shut her laptop is like saying, ‘Eh! Just stop seeing your family,’” says Nathan an effort to feel safer from both online and offline violence. Jurgenson, a social media sociologist (and a friend) at the University of Maryland. What does a tourist look like? In 2012, Gawker unmasked “Violentacrez,” an anonymous member of the online community Reddit who was infamous for posting creepy photographs of underage women and creating or moderating subcommunities on the site with names like “chokeabitch” and “rapebait.” Violentacrez turned out to be a Texas computer programmer named Michael Brusch, who displayed an exceedingly casual attitude toward his online hobbies. “I do my job, go home, watch TV, and go on the Internet. I just like riling people up in my spare time,” he told Adrian Chen, the Gawker reporter who outed him. “People take things way too seriously around here.” Abusers tend to operate anonymously, or under pseudonyms. But the women they target often write on professional platforms, under their given names, and in the context of their real lives. Victims don’t have the luxury of separating themselves from the crime. When it comes to online threats, “one person is feeling the reality of the Internet very viscerally: the person who is being threatened,” says Jurgenson. “It’s a lot easier for the person who made the threat—and the person who is investigating the threat—to believe that what’s happening on the Internet isn’t real.” When authorities treat the Internet as a fantasyland, it has profound effects on the investigation and prosecution of online threats. Criminal threat laws largely require that victims feel tangible, immediate, and sustained fear. In my home state of California, a threat must be “unequivocal, unconditional, immediate, and If police don’t know whether the harasser lives next door or out in Nebraska, it’s easier for them to categorize the threat as non-immediate. When they treat a threat as a boyish hoax, the specific” and convey a “gravity of purpose and an immediate prospect of execution of the threat” to be considered a crime. implication is that the threat ceases to be a criminal offense. So the victim faces a psychological dilemma: How should she understand her own fear? Should she, as many advise, dismiss an online threat as a silly game, and not bother to inform the cops that someone may want to—ha, ha—rape and kill her? Or should she dutifully report every threat to police, who may well dismiss her concerns? When I received my most recent rape and death threats, one friend told me that I should rest assured that the anonymous tweeter was unlikely to take any physical action against me in real life; another noted that my stalker seemed like the type of person who would fashion a coat from my skin, and urged me to take any action necessary to land the stalker in jail. Danielle Citron, a University of Maryland law professor who focuses on Internet threats, charted the popular response to Internet death and rape threats in a 2009 paper published in the Michigan Law Review. She found that Internet harassment is routinely dismissed as “harmless locker-room talk,” perpetrators as “juvenile pranksters,” and victims as “overly sensitive complainers.” Weighing in on one online harassment case, in an interview on National Public Radio, journalist David Margolick called the threats “juvenile, immature, and obnoxious, but that is all they are ... frivolous frat-boy rants.” When police treat a threat as a boyish hoax, the implication is that the threat ceases to be a criminal offense. Of course, the frat house has never been a particularly safe space for women. I’ve been threatened online, but I have also been harassed on the street, groped on the subway, followed home from the 7-Eleven, pinned down on a bed by a drunk boyfriend, and raped on a date. Even if I sign off Twitter, a Today, a legion of anonymous harassers are free to play their “games” and “pranks” under pseudonymous screen names, but for the women they target, the attacks only compound the real fear, discomfort, and stress we experience in our daily lives. threat could still be waiting on my stoop. 2nc Cyber Harrasment Adopting the mosaic theory limits investigators ability to solve cyber harassment. Gray, Keats Citron, and Rinehart, 2013 (David, Associate Professor, University of Maryland Francis King Carey School of Law, Danielle, Lois K. Macht Research Professor of Law, University of Maryland Francis King Carey School of Law, and Liz Clark, University of Maryland Francis King Carey School of Law, “SYMPOSIUM ON CYBERCRIME: FIGHTING CYBERCRIME AFTER UNITED STATES V. JONES” Journal of Criminal Law & Criminology Lexis) Despite these complications, tracing an IP address is a common and effective way for authorities to identify perpetrators of cyberharassment crimes. At present, the public-observation and third-party doctrines grant law enforcement unfettered discretion to track IP addresses across the Internet. Most cyberharassment is, to one degree or another, public. Furthermore, the third-party doctrine means that law enforcement officers need a subpoena, at most, to secure user information associated with an IP address from ISPs and other third parties, including social-networking sites. n307 A mosaic theory of Fourth Amendment privacy might well change [*798] all of this. Tracking someone's online activities using an IP address over a period of time is akin to tracking a person through physical space using GPS-enabled tracking devices. By aggregating information about a user and his online activities, law enforcement officers using these fairly basic digital surveillance techniques can therefore assemble precisely the sorts of revealing informational mosaics that worried the concurring Justices in Jones. Digital surveillance technology that offends mosaic sensibilities promises even more benefits than IP traces to law enforcement officers interested in detecting cybercrimes. Take, for example, forums such as those organized and moderated by Violentacrez. n308 Although under current law and free speech doctrine it is perfectly legal to view and comment on pictures of young women in public, law enforcement officers might have reason to worry that habitues of forums like "Jailbait" and "Creepshots" are more likely than most to produce or possess actual child pornography. It is, of course, impossible to conduct even cursory investigations of the tens and hundreds of thousands of those who visit these sites, much less to distinguish between casual curiosity seekers and practicing pedophiles. Here, broad-scale aggregation technology, in combination with ever more sophisticated data analytics designed to identify and track those patterns of online conduct that correlate with higher risks of illegal on-and offline activities, would be tremendously valuable to law enforcement. Once officers have identified a smaller universe of potential offenders, they can then further narrow their investigative fields by using passive techniques like online honey traps to more definitively identify those who are trafficking in or actively seeking to possess child pornography. n309 Again, although these digital surveillance techniques and technologies are not presently subject to Fourth Amendment review, either individually or in the aggregate, the situation would likely change under a mosaic theory. In fact, officers might find themselves assembling informational mosaics sufficient to trigger Fourth Amendment concerns quite by accident. n310 Regardless, law enforcement's legitimate interests in using digital surveillance technology would be affected. n311 Fusion centers also hold significant potential for law enforcement's efforts to detect and prosecute cyberharassment. The Department of Justice, in conjunction with the National Center for Missing and Exploited [*799] Children, maintains a substantial database of known images of child pornography, each of which has a unique digital fingerprint called a "hash value." n312 Fusion centers, which have access to most Internet traffic, provide a unique - although as yet unexploited - resource that law enforcement agents can use to screen for the transmission of known images of child exploitation. Outside the relatively narrow field of child pornography cases, those who engage in cyberharassment and cyberstalking still tend to use a fairly predictable pattern of words, phrases, and images. The software used by most malicious stalkers also tends to come from a stable of online resources, which again bear an identifiable digital signature. Although the true technical capacities of fusion centers are largely unknown to the public, they appear to have the ability to monitor Internet and communications traffic for precisely these sorts of markers. That same capacity is, of course, precisely what raises concerns about fusion centers from a the prospect of adopting a mosaic theory of Fourth Amendment privacy raises serious concerns that the legitimate and important law enforcement goals of detecting and prosecuting cybercrimes may be compromised. mosaic theory point of view. Here again, Cyberharrassment leads to violations of privacy and violence in the name of “Free Speech” – this is especially true for oppressed groups Schroder 13 - Jared C. Schroeder, doctoral candidate at the Gaylord College of Journalism & Mass Communication at the University of Oklahoma. His research focuses on free speech and free press issues as they apply to the emerging network society. Before moving to academia, he was a professional journalist for several years, 2013 (“Electronically Transmitted Threats and Higher Education: Oppression, Free Speech, and Jake Baker,” Review of Higher Education 36.3, Spring 2013, Project Muse, 7/3/15)//CM Numerous conflicts arise when the theories of the First Amendment and concepts regarding oppression are placed beside one another. This article does not seek to condemn one area of literature or the other. Instead, this section seeks to illuminate areas of conflict between the two theoretical approaches. The Baker case is particularly relevant because it captures the challenges involved in the network society, the higher education setting, and conflicts between oppression and freedom of speech. It is not the only incident that raises questions regarding the impact of emerging online technology on providing a safe learning atmosphere. Rutgers University student Tyler Clementi committed suicide after his roommate filmed him having sex with another man and posted the video online (Starkman, 2010). The roommate and another student face criminal charges for invasion of privacy. Clearly, Clementi’s privacy was invaded in an insensitive and, likely, ignorant way. In other words, the technological abilities of his tormentors outpaced their ethical understanding of the power of the new media. The scenario, though even more tragic, is similar to the Baker case. New technologies allowed a person to be oppressed and tormented, and the universities were left wondering what they could have done differently. Using Young’s (2010) definition, the young woman who was named and described in Baker’s story, as well as others on campus, can be viewed as oppressed. While oppression does not automatically cross the Supreme Court’s threshold of true threats, it certainly raises questions about the safety and viability of the learning environment. In the Baker case, oppression comes in the form of structural norms and values; his actions can be seen as structurally accepted, to some extent, because he followed the rules created by the dominant culture. This rule-following can be seen in the court’s reasoning for siding with Baker. While his behavior was viewed as deviant (United States v. Alkhabaz, 1997), the structural protections for free speech shielded him, while leaving the young woman vulnerable. This section addresses these ideas by examining the case through the violence and cultural imperialism concepts discussed by Young (2010). No physical violence occurred toward the female classmate Baker described in his story; but Young (2010) noted that oppressive violence includes [End Page 305] harassment, humiliation, and intimidation. Young (2010) explained: “The oppression of violence consists not only in direct victimization, but in the daily knowledge shared by all members of oppressed groups that they are liable to violation, solely on account of their group identitiy” (p. 43). After hearing about the violent, explicit, and deadly story she was cast in by one of her classmates, the young woman felt the effects of violent oppression. In his dissent, Judge Krupansky wrote: “Jane Doe’s reaction to those threats when brought to her attention evinces a contrary conclusion of a shattering traumatic reaction that resulted in recommended psychological counseling” (United States v. Alkhabaz, 1997, p. 1507). Other women students chose not to attend class when they heard about the story. Their fear-based response is also evidence of oppressive violence. Members of the oppressed group were forced to alter the way they live because they felt vulnerable to violence. Finally, the violence was made possible and somewhat acceptable by the decision of the court. Baker did not have to stop writing and communicating his stories about the young woman. He did not have to take down his posts. The court said what he did was legal. The structures in place made the oppression possible. 1nc Police Mosaic theory undermines the ability of undercover agents to work in law enforcement. Bedi, 2014 (Monu, Assistant Professor, DePaul University College of Law, “SOCIAL NETWORKS, GOVERNMENT SURVEILLANCE, AND THE FOURTH AMENDMENT MOSAIC THEORY” Boston University Law Review Lexis) Scholars have questioned the viability of the mosaic theory, particularly as it relates to the status of government investigative practices.11 Accepting this theory puts routine government surveillance in jeopardy of Fourth Amendment restrictions.12 It seems that even the brief surveillance of an individual could reveal private information. For instance, a single trip to a particular religious gathering or political function could reveal compromising or otherwise personal information that an individual would like to keep secret. More generally, people may disagree as to what society thinks is reasonable or unreasonable surveillance.13 Perhaps even short-term monitoring of a person’s public movements in a remote area where police this theory also severely curtails the application of the Third Party Doctrine, the corollary to the Public Disclosure Doctrine (collectively the “Doctrines”).15 The Third Party Doctrine states that any information disclosed to another person or entity—much like the public generally—loses any Fourth Amendment protection.16 This doctrine allows law enforcement to use undercover agents and surreptitiously gather information without a warrant.17 However, under the mosaic approach, one could also argue that these communications, taken in the aggregate, can reveal private information about this person (e.g., disclosures about religious or privately held beliefs) and thus should be protected, particularly if the agent goes to great lengths in gaining the confidence of the suspect.1 are not likely to find themselves would also qualify as an unreasonable intrusion.14 To make matters worse, Police effectiveness and internet surveillance strategies are key to stopping atrocities such as child pornography Wortley and Smallbone 12 – Richard Wortley has a PhD in psychology, and worked as a prison psychologist for ten years, and is a past national Chair of the Australian Psychological Society’s College of Forensic Psychologists; Stephen Smallbone is a psychologist and Professor in the School of Criminology and Criminal Justice and an Australian Research Council ‘Future’ Fellow, 2012 (“Child Pornography on the Internet,” Problem-Oriented Guides for Police Problem-Specific Guides Series No. 41, 5/2012, Avaliable Online at http://www.hawaii.edu/hivandaids/Child_Pornography_on_the_Internet.pdf, accessed on 7/3/15)//CM General Considerations for an Effective Response Strategy As noted, Internet child pornography presents some unique challenges for law enforcement agencies. However, despite the difficulties involved in controlling the problem, local police have an important role to play. To maximize their contribution, local police departments need to: Acquire technical knowledge and expertise in Internet pornography. If your department does not have a specialized Internet crime unit, then find out where you can obtain assistance or training. Appendix B lists online resources that can provide information on national and international initiatives, tips and leads, technical assistance, and staff training. Establish links with other agencies and jurisdictions. It is important that local police departments share information and coordinate their activities with other jurisdictions. Appendix B also lists agencies that have specific programs or sections designed to provide a coordinated response to Internet child pornography. Establish links with ISPs. ISPs can be crucial partners for police. As has been noted, there is often a lack of specific legislation setting out ISPs’ obligations. This makes it especially important for police to establish good working relations with ISPs to elicit their cooperation in the fight against Internet child pornography. Prioritize their efforts. Because of the volume of Internet child pornography crime, police forces need to prioritize their efforts and concentrate on the most serious offenders, particularly those actually involved in abusing children and producing pornographic images.60 For example, one strategy may be to cross reference lists of Internet child pornography users with sex offender registries to increase the chance of targeting hands-on offenders (see Appendix B). It has been noted that success in combating child pornography is too often judged in terms of the number of images recovered, rather than by the more significant criterion of whether the crimes the images portray have been prevented. Specific Responses to Reduce Internet Child Pornography It is generally acknowledged that it is impossible to totally eliminate child pornography from the Internet. However, it is possible to reduce the volume of child pornography on the Internet, to make it more difficult or risky to access, and to identify and arrest the more serious perpetrators. Since 1996, ISPs have removed some 20,000 pornographic images of children from the web.62 Around 1,000 people are arrested annually in the United States for Internet child pornography offenses.63 The following strategies have been used or suggested to reduce the problem of child pornography on the Internet. Computer Industry Self Regulation ISPs have a central role to play in combating Internet child pornography. The more responsibility ISPs take in tackling the availability of child pornography images on the Internet, the more resources police can devote to addressing the production side of the problem. However, there are two competing commercial forces acting on ISPs with respect to self regulation. On the one hand, if an ISP restricts access to child pornography on its server, it may lose out financially to other ISPs who do not. Therefore, it will always be possible for offenders to find ISPs who will store or provide access to child pornography sites. On the other hand, ISPs also have their commercial reputation to protect, and it is often in their best interests to cooperate with law enforcement agencies. Most major ISPs have shown a commitment to tackling the problem of child pornography. By establishing working relationships with ISPs, and publicizing those ISPs who take self regulation seriously, police may be able to encourage greater levels of self regulation. Current self-regulatory strategies include:1. Removing illegal sites. A number of ISP associations have drafted formal codes of practice that explicitly bind members to not knowingly accept illegal content on their sites, and to removing such sites when they become aware of their existence. Service agreement contracts with clients will often set out expected standards that apply to site content. Large ISPs may have active cyber patrols that search for illegal sites.64 2. Establishing complaint sites/hotlines. Some ISP associations have set up Internet sites or hotlines that allow users to report illegal practices.65 These associations either deal directly with the complaint (e.g., by contacting the webmaster, the relevant ISP, or the police) or refer the complainant to the appropriate authorities. 3. Filtering browsers/search engines. ISPs can apply filters to the browsers and search engines their customers use to locate websites. There are numerous filtering methods. For example, filters can effectively treat certain key words as if they do not exist, so that using these words in a search will be fruitless.66 Software that can identify pornographic images is also being developed. Legislative Regulation Not everyone is satisfied with the current reliance on self regulation, and there have been calls for increased legislation to compel the computer industry to play a greater role in controlling Internet child pornography. Police may be an important force in lobbying for tighter restrictions. Among the proposals for tighter regulation are: 4. Making ISPs legally responsible for site content. ISPs’ legal responsibilities to report child pornography vary among jurisdictions. In the United States, ISPs are legally required to report known illegal activity on their sites, but they are not required to actively search for such sites.68 It has been argued that ISPs’ legal responsibilities should be strengthened to require a more proactive role in blocking illegal sites.69 5. Requiring the preservation of ISP records. Police may apply for a court order to seize ISP accounts.70 However, to assist in the prosecution of offenders, ISPs need to maintain good records of IP logging, caller ID, web hostings, and so forth.71 6. Requiring user verification. ISPs often exercise little control over verifying the identities of people who open Internet accounts. Accounts may be opened using false names and addresses, making it difficult to trace individuals who engage in illegal Internet activity. In addition, without verifying users’ ages, there is no way of knowing if children are operating Internet accounts without adult supervision. This problem of Internet anonymity is likely to increase as the potential to access the Internet via mobile phones becomes more common. It has been argued that both ISPs and mobile phone networks need to strengthen procedures for user verification.72 7. Regulating anonymous remailers. Remailers are servers that forward emails after stripping them of sender identification. It has been argued that much tighter regulation of remailers is necessary. Some have advocated making remailer administrators legally responsible for knowingly forwarding illegal material, while others have called for a complete ban on remailers.73 8. Using key escrowed encryption. Encryption of pornographic images is shaping to be the biggest technological problem facing law enforcement agencies. Key escrowed encryption would require anyone selling encryption software to supply a trusted third party with a key to the code.74 This has been strongly resisted by the computer industry. In the meantime, work continues on developing code-breaking software. 2nc Police Mosaic theory kills the third party doctrine and law enforcement Bedi, 2014 (Monu, Assistant Professor, DePaul University College of Law, “SOCIAL NETWORKS, GOVERNMENT SURVEILLANCE, AND THE FOURTH AMENDMENT MOSAIC THEORY” Boston University Law Review Lexis) The Third Party Doctrine would also be on shaky ground. Here, too, the mosaic theory would upset the voluntary disclosure principle that stands at the heart of this doctrine.230 Shifting the focus to what society or an individual deems reasonable (the first model of reasonable expectation of privacy) would surely frustrate the use of undercover informants or other surreptitious data collection techniques that do not require a warrant. Imagine a scenario where an informant is deep undercover for a significant period of time gaining the trust of a Or imagine an informant who dupes a suspect into allowing her into her home and disclosing private and incriminating information. suspect . Or perhaps the government simply acquires a wealth of financial records from a suspect’s bank. Currently, all of these types of law enforcement tools do not trigger Fourth Amendment protection because the individual voluntarily discloses the information to another person or entity.231 However, under the mosaic theory, none of these tactics are secure.232 Societal expectations may find that these methods, too, impinge on Fourth Amendment rights as they involve unreasonable duplicity and reveal private information. Police would thus find themselves in the new position of having to secure a warrant based on probable cause before engaging in these practices. For some, this conclusion may be welcomed, particularly in today’s technological world where disclosures to various entities and individuals have become ubiquitous.233 Justice Sotomayor, in fact, raises this possibility in her concurrence.234 This Article does not take such a drastic Any such rejection would come at the cost of jettisoning or severely curtailing essential law enforcement investigative techniques that have historically not been approach, nor would such a course be desirable. subject to warrant and probable cause requirements.235 Court application of the mosaic theory is impractical and hurts police investigations. Ostrander, 2011 (Benjamin M. Candidate for JD @ Notre Dame Law School, “THE “MOSAIC THEORY” AND FOURTH AMENDMENT LAW” Notre Dame Law Review Lexis) The use of emerging and existing intrusive technologies in criminal investigations certainly has the potential to have a substantial effect on privacy. In an effort to combat the threat of such use, Maynard introduced the “mosaic theory” into Fourth Amendment law. The “mosaic theory” holds that individual law enforcement acts that are not “searches” become a “search” when aggregated, as the whole reveals more than the individual acts it comprises. This Note suggests that despite the intuitive appeal of a “mosaic theory,” the use of the theory in Fourth Amendment law is misguided. The “mosaic theory” is inconsistent with the Supreme Court’s voluntary exposure analysis, which has often classified theoretical or limited disclosures of information as complete exposures warranting no Fourth Amendment protection. 176 It is also inconsistent with the Supreme Court’s implicit rejection of the proposition that the Fourth Amendment analysis is altered when an investigatory technique is prolonged to the point where information may be accumulated.177 Not only is the theory inconsistent with existing Fourth Amendment jurisprudence, it is also impractical in application. A problematic question arises as to what durational threshold must be crossed in order for the use of a pattern-detecting technology to be sufficiently prolonged as to render it a search. Once this illusive threshold is crossed and a mosaic is created, the question that then arises is how to define the scope of the mosaic. If a pattern is created only through the use of multiple investigatory techniques, the entire investigation will be rendered a search. Also left unanswered is the appropriate standard of review for the use of pattern-detecting investigatory techniques in criminal investigations. The most serious implication of the theory, however, is that it calls into question a number of previously accepted investigatory techniques. Law enforcement responses to child pornographers rely on effectiveness and surveillance Wortley and Smallbone 12 – Richard Wortley has a PhD in psychology, and worked as a prison psychologist for ten years, and is a past national Chair of the Australian Psychological Society’s College of Forensic Psychologists; Stephen Smallbone is a psychologist and Professor in the School of Criminology and Criminal Justice and an Australian Research Council ‘Future’ Fellow, 2012 (“Child Pornography on the Internet,” Problem-Oriented Guides for Police Problem-Specific Guides Series No. 41, 5/2012, Avaliable Online at http://www.hawaii.edu/hivandaids/Child_Pornography_on_the_Internet.pdf, accessed on 7/3/15)//CM Law Enforcement Responses In the strategies discussed so far the police role has largely involved working in cooperation with other groups or acting as educators. A number of strategies are the primary responsibility of police. As a rule, local police will not carry out major operations. Most major operations require specialized expertise and inter-agency and interjurisdictional cooperation. (See Appendix C for a summary of major coordinated law enforcement operations in recent years.) However, local police will almost certainly encounter cases of Internet child pornography in the course of their daily policing activities. Law enforcement responses include: 19. Locating child pornography sites. Police agencies may scan the Internet to locate and remove illegal child pornography sites. Many areas of the Internet are not accessible via the usual commercial search engines, and investigators need to be skilled at conducting sophisticated searches of the ‘hidden net.’ Police may issue warnings to ISPs that are carrying illegal content. 20. Conducting undercover sting operations. Law enforcement agents may enter pedophile newsgroups, chat rooms, or P2P networks posing as pedophiles and request emailed child pornography images from others in the group.82 Alternatively, they may enter child or teen groups posing as children and engage predatory pedophiles lurking in the group who may send pornography or suggest a meeting. A variation of the sting operation is to place ads on the Internet offering child pornography for sale and wait for replies.83 Recently, Microsoft announced the development of the Child Exploitation Tracking System to help link information such as credit card purchases, Internet chat room messages, and conviction histories.84 21. Setting up honey trap sites. These sites purport to contain child pornography but in fact are designed to capture the IP or credit card details of visitors trying to download images. These can be considered a type of sting operation and have resulted in numerous arrests. However, their primary purpose is to create uncertainty in the minds of those seeking child pornography on the Internet, and, therefore, reduce the sense of freedom and anonymity they feel (see Operation Pin in Appendix C). 22. Publicizing crackdowns. Many police departments have learned to use the media to good effect to publicize crackdowns on Internet child pornography.85 Coverage of crackdowns in the mass media increases the perception among potential offenders that the Internet is an unsafe environment in which to access child pornography. 23. Conducting traditional criminal investigations. Although most media attention is often given to technological aspects of controlling Internet child pornography, in fact many arrests in this area arise from traditional investigative police work. Investigations may involve information from: The public: The public may contact police directly, or information may be received on one of the various child pornography hotlines. Computer repairers/technicians: Some states mandate computer personnel to report illegal images.86 There are cases where computer repairers have found child pornography images on an offender’s hard drive and notified police.87 Police may establish relationships with local computer repairers/ technicians to encourage reporting. Victims: A point of vulnerability for producers of child pornography is the child who appears in the pornographic image. If the child informs others of his/her victimization, then the offender’s activities may be exposed.88 Known traders: The arrest of one offender can lead to the arrest of other offenders with whom he has had dealings, producing a cascading effect. In some cases the arrested offender’s computer and Internet logs may provide evidence of associates. (See Operation Cathedral in Appendix C.) Unrelated investigations: There is increasing evidence that many sex offenders are criminally versatile and may commit a variety of other offenses.89 Police may find evidence of Internet child pornography while investigating unrelated crimes such as drug offenses. Mosaic theory kills effective law enforcement. Bedi, 2014 (Monu, Assistant Professor, DePaul University College of Law, “SOCIAL NETWORKS, GOVERNMENT SURVEILLANCE, AND THE FOURTH AMENDMENT MOSAIC THEORY” Boston University Law Review Lexis) The most troubling part of adopting the mosaic theory is that it requires the abandonment of , or dramatic alterations to, the Doctrines. The basic problem is the inherent conflict between the first and second models of reasonable expectation. While the Doctrines embrace a per se rule focusing solely on disclosure and why this vitiates privacy, the mosaic theory rests on society’s opinion and what it deems reasonable.223 Consider the Public Disclosure Doctrine. The fact that public movements are not protected under the Fourth Amendment is critical to law enforcement investigations.224 Visual warrantless surveillance remains a central part of police surveillance.225 It is not clear to what extent these practices will remain constitutional with the introduction of the mosaic theory. For instance, it is common for officers to track vehicles and aggregate information from various sources over a period of time.226 As Gray and Citron point out, the “mosaic theory puts these practices and the line of doctrine endorsing them in obvious jeopardy, particularly when officers are too successful and their investigations produce too much information.”227 This danger is compounded by the fact that law enforcement may use a combination of visual and technology-based surveillance (a la Knotts) when investigating a suspect. “How, after all,” ask Gray and Citron, “are we to distinguish ‘between the supposed invasion of aggregation of data between GPS-augmented surveillance and a purely visual surveillance of substantial length’?”228 It won’t do The problem is that the Public Disclosure Doctrine treats all public movements the same, regardless of how much information is disclosed or how long it is observed.229 To carve out exceptions based on what society thinks is unreasonable leaves vulnerable investigative techniques that are essential to effective law enforcement. here to simply say that a specific duration of technology-dependent surveillance violates the expectation of privacy. Expansion of the Mosaic theory kills investigations – there are no limits, retroactivity, and ensures court clog. Ostrander, 2011 (Benjamin M. Candidate for JD @ Notre Dame Law School, “THE “MOSAIC THEORY” AND FOURTH AMENDMENT LAW” Notre Dame Law Review Lexis) Maynard left little guidance as to what durational threshold must to be crossed in order for the use of patterndetecting technology to be sufficiently prolonged as to render it a search.93 Without a clearly demarcated line, law enforcement agents, judges, and individuals cannot know when an aggregate of information will receive Fourth Amendment protection. Law enforcement agents are left to speculate as to how much is too much.94 This lack of clarity will deter law enforcement agents from utilizing the full extent of their investigatory power. This is even more problematic with respect to the “mosaic theory’s” creation of retroactive unconstitutionality.95 As soon as a pattern is created, previously permissible individual law enforcement steps become unconstitutional. Because the “mosaic theory” retroactively renders the entire mosaic unconstitutional and subject to suppression, law enforcement agents will be even more hesitant in exercising the full extent of their investigatory power. Further, if the “mosaic theory” in the Fourth Amendment is premised on the idea that “prolonged GPS monitoring reveals an intimate picture of the subject’s life that he expects no one to have— short perhaps of his spouse,”96 who has the burden of proof with respect to whether the prolonged surveillance has in fact revealed an intimate picture of an individual’s life and thus created a mosaic? Unless the location of a “stash-house” is an intimate detail, Maynard can be read to stand for the proposition that warrantless prolonged GPS surveillance is per se unconstitutional. Such an approach would be over-inclusive in that prolonged location monitoring that does not result in a pattern, or a pattern that does not reveal intimate details, would be rendered a search within the meaning of the Fourth Amendment and therefore subject to suppression. Once the mosaic threshold is crossed and a mosaic is created, the question that arises is to how to define the scope of the mosaic. If law enforcement officials engage in a number of sustained investigatory techniques—as they often do—it is likely that whole investigations will be called into question. That is, if a pattern is detected only through the use of multiple investigatory techniques, and the theory is applied consistently, the investigation in its entirety will be rendered a search.97 In this respect, the retroactive effect of the “mosaic theory” takes on greater significance. Rather than having the entire investigation held inadmissible and subject to suppression, law enforcement agents will be overly cautious as to the amount of surveillance conducted. The lack of clarity as to how prolonged the surveillance must be to render it a search, whether intimate details need in fact emerge, and what the proper scope of the mosaic is will provide defendants with an arsenal to attack every police investigation. Using the mosaic theory hampers numerous investigative techniques. Ostrander, 2011 (Benjamin M. Candidate for JD @ Notre Dame Law School, “THE “MOSAIC THEORY” AND FOURTH AMENDMENT LAW” Notre Dame Law Review Lexis) One of the most serious implications of the “mosaic theory” in Fourth Amendment law is that it calls into question the validity of previously accepted forms of surveillance. GPS surveillance is not the only form of surveillance that provides law enforcement with a comprehensive and detailed record of someone’s movements or affairs when it is sustained on a prolonged basis. Thus, the “mosaic theory,” which focuses on the resulting patterns created by individual law enforcement acts that in and of themselves are not searches, naturally calls into question other accepted investigative techniques that are performed on a sufficiently prolonged basis.98 For instance, the “mosaic theory” calls into question the use of pen registers99 and trap and trace devices,100 which have been held to not implicate the Fourth Amendment.101 The “mosaic theory” would also seemingly implicate the prolonged use of a mail cover 102 as an investigatory technique. 103 Although the Supreme Court has yet to address the issue, courts have held that the warrantless use of a mail cover does not violate the Fourth Amendment.104 Another accepted investigatory technique that can reveal very intimate details of an individual’s life— particularly if sustained for a prolonged basis—is garbage inspections. 105 It could plausibly be argued that the patterns that result from the prolonged use of garbage inspections are much more intrusive than any pattern resulting from the use of a GPS device.106 The same could be said about prolonged video surveillance.107 It is well settled that video surveillance in public areas does not give rise to a Fourth Amendment issue.108 Thus, video cameras may be placed outside of an individual’s residence, and so long as the cameras are incapable of viewing the interior of the residence, no Fourth Amendment right is infringed upon.109 Since Maynard, the “mosaic theory” has in fact been used as the basis for holding a previously accepted investigatory technique a search. In In re Application of the United States of America for an Order Authorizing the Release of Historical Cell-Site Information,110 Magistrate Judge Orenstein denied the government’s application for an order under the Stored Communications Act111 directing a service provider to disclose two months worth of historical cell-site location information. 112 According to Magistrate Judge Orenstein: The Maynard court’s concern with sustained GPS tracking over the course of a month was not its formally continuous nature, but rather the fact that it results in a vast collection of specific data points that, viewed together, convey the “intimate picture” of a subject’s life. It is the ability to amass a collection of such points, and not the ability to trace the route from each one to the next, that carries with it the ability to resolve those points into a comprehensible picture.113 Applying the “mosaic theory” to historical cell-site information, Magistrate Judge Orenstein concluded that the Fourth The most significant implication of the “mosaic theory,” however, is that it calls into question the governmental use of prolonged visual surveillance in criminal investigations.115 In Maynard, the court addressed the issue of the Amendment required the government to obtain a warrant based on a showing of probable cause.114 possible extension of the “mosaic theory” to prolonged visual surveillance.116 Although the court ultimately declined to decide whether such a situation would constitute a search under the new theory, it suggested that visual surveillance would not be implicated.117 The court noted that practically, law enforcement agents do not have the capability to sustain visual monitoring for a duration that exposes information not revealed to the public.118 This argument is unpersuasive to the extent that it suggests that a mosaic is only created if the whole of one’s movements is captured. A pattern can be created, and thus intimate details revealed, by the aggregation of individual law enforcement steps not necessarily constituting the whole of the investigatory techniques employed. The court implicitly recognizes this, as even continuous GPS tracking of a vehicle does not reveal the entirety of one’s movements, but rather only the movements of a particular vehicle. Further, the dismissal of the implication of visual surveillance is problematic to the extent that it relies on the probability of law enforcement success. Such probability, however, must be viewed in relation to the factual context in which the investigation is conducted, and not in the abstract. To be sure, it is not beyond the realm of possibility that a properly equipped and resourced law enforcement unit would be capable of monitoring an unsuspecting individual for a continuous period of time sufficient to create a mosaic. As a theoretical matter, the court reasoned that in contrast to prolonged GPS monitoring, the extension of the “mosaic theory” to visual surveillance would fail as the means used to uncover private information would not defeat one’s expectation of privacy.119 The court’s analogy to the distinction between the placement of undercover agents and wiretapping120 overlooks the fact that here, warrantless GPS tracking and visual surveillance are constitutional in the first instance. In fact, the “mosaic theory” focuses on the nature of the information revealed—a pattern exposing intimate details—and does not focus on the investigatory method used to attain such information. Beyond prolonged visual and video surveillance, Maynard does not express a view as to whether other investigatory techniques would be called into question by the “mosaic theory.” This analysis suggests that the “mosaic theory,” if consistently applied, would implicate the cumulative effect of previously accepted surveillance methods.121 It is in this capacity that the “mosaic theory” has the potential to revolutionize the Fourth Amendment. Big Data Disadvantage 1nc Healthcare Applying the Mosaic Theory hampers government’s use of big data. Gray, Keats Citron, and Rinehart, 2013 (David, Associate Professor, University of Maryland Francis King Carey School of Law, Danielle, Lois K. Macht Research Professor of Law, University of Maryland Francis King Carey School of Law, and Liz Clark, University of Maryland Francis King Carey School of Law, “SYMPOSIUM ON CYBERCRIME: FIGHTING CYBERCRIME AFTER UNITED STATES V. JONES” Journal of Criminal Law & Criminology Lexis) The amount of personal information, including health information, aggregated by government agencies, is referred to as "Big Data," and for good reason. Federal agencies, state authorities, and their private contractors store mind-boggling amounts of information. Given the quantity and scope of this information, there can be no doubt that Big Data implicates privacy interests recognized by the mosaic theory of Fourth Amendment privacy endorsed to varying degrees by the concurring opinions in Jones. n135 As the mosaic theory suggests, aggregations of rather [*768] innocuous information may "reveal more - sometimes a great deal more - than does the sum of its parts." n136 This is a particularly likely prospect given Big Data's use of increasingly sophisticated analytics, which promise to reveal far more about us than is disclosed by the raw bits and bytes, no matter how "big" or small the data. n137 The dangers are yet more pronounced if health-related data is part of the mix because of what this information can reveal about the most intimate of our affairs. n138 Healthcare data, by definition, contains information that the Supreme Court has already ruled fundamentally private, such as reproductive choice, n139 and information that the Court may deem private in the near future, such as genetic data. n140 But not all healthcare data is protected. In Whalen v. Roe, the Court found no threat to privacy in a law that required physicians to report to the Department of Health personal and identifying information of patients who were prescribed certain drugs. n141 Because the required disclosure was similar to existing and essential procedures, like mandatory child abuse reporting or sharing information with insurance companies for reimbursement, n142 and the statute provided adequate security against data breach, the Court held that any risk to patient privacy was [*769] insufficient to violate the Fourteenth Amendment. n143 In so holding, however, the Court hinted that, absent adequate security measures, government acquisition or disclosure of massive amounts of private data would implicate privacy protections. n144 In his concurrence, Justice Brennan did more than hint, suggesting that it may be necessary to restrain technological advancements that make such data accumulations possible. n145 A little over ten years later, the Court again considered privacy issues relating to data aggregation, this time in the form of rap sheets. n146 Although the individual criminal events that compose a rap sheet may be public record, the Court held that the rap sheet, as a summary of the total criminal events in an individual's life, represented a potential and "substantial" n147 threat to privacy, n148 particularly because of advances in technology that allowed for greater storage capacity. n149 Unlike in Whalen, where the Court emphasized the routine disclosure of confidential information under specific but frequent circumstances, the Court in U.S. Department of Justice v. Reporters Committee for Freedom of the Press took pains to illustrate the very limited and considered means by which a third party can access rap sheet data. n150 Additionally, the Court dismissed the argument that the [*770] privacy interest in the sum of public events listed on a rap sheet "approaches zero." n151 The Court concluded that "although there is undoubtedly some public interest in anyone's criminal history," the interest is not central to the government-monitoring purpose of FOIA, which is to allow citizens to monitor the government, not individuals. n152 Although neither of these cases implicated the Fourth Amendment, they involved personal data similar or identical to that which is currently being collected and stored as part of Big Data projects. Accordingly, they incorporate key factors the Court may use to decide whether large quantities of aggregated healthcare data can trigger privacy concerns. Among these seem to be the extent to which disclosure is commonplace, whether the data is aggregated or dispersed, and the intent of the law authorizing collection or release. The last factor is crucial as it relates to Big Data. The stated intent of the ACA is quite broad, ranging from quality control to fraud prevention to cost containment. n153 By giving researchers, law enforcement, and administrators access to large amounts of information, Big Data could conceivably be used for all three purposes and more. Big data is key to healthcare Burg 14 (Natalie, contributor to Forbes who writes about growth and business patterns – cites Dwayne Spradlin, CEO of the nonprofit Health Data Consortium, “How Big Data Will Help Save Healthcare”, http://www.forbes.com/sites/castlight/2014/11/10/how-big-data-will-help-savehealthcare/) More and more companies are talking about big data these days—but it’s more than a buzzword. It might just change the way healthcare works in the U.S. From better patient outcomes to a more transparent healthcare system to more accessible and affordable care, big data could change every inch of the nation’s $3 trillion healthcare industry—all for the better. According to Dwayne Spradlin, CEO of the nonprofit Health Data Consortium, the power to access and analyze enormous data sets can improve our ability to anticipate and treat illnesses. This data can help recognize individuals who are at risk for serious health problems. The ability to use big data to identify waste in the healthcare system can also lower the cost of healthcare across the board. Big data’s key to healthcare and solves disease – saves billions and locks in new methods of treatment and planning models Marr 15 (Bernard, contributor to Forbes, he also basically wrote the book on internet data – called Big Data – and is a keynote speaker and consultant in strategic performance, analytics, KPIs and big data, “How Big Data Is Changing Healthcare”, http://www.forbes.com/sites/bernardmarr/2015/04/21/how-big-data-is-changing-healthcare/) If you want to find out how Big Data is helping to make the world a better place, there’s no better example than the uses being found for it in healthcare. The last decade has seen huge advances in the amount of data we routinely generate and collect in pretty much everything we do, as well as our ability to use technology to analyze and understand it. The intersection of these trends is what we call “Big Data” and it is helping businesses in every industry to become more efficient and productive. Healthcare is no different. Beyond improving profits and cutting down on wasted overhead, Big Data in healthcare is being used to predict epidemics, cure disease, improve quality of life and avoid preventable deaths. With the world’s population increasing and everyone living longer, models of treatment delivery are rapidly changing, and many of the decisions behind those changes are being driven by data. The drive now is to understand as much about a patient as possible, as early in their life as possible – hopefully picking up warning signs of serious illness at an early enough stage that treatment is far more simple (and less expensive) than if it had not been spotted until later. So to take a journey through Big Data in healthcare, let’s start at the beginning – before we even get ill. Wearable blood pressure monitors send data to a smartphone app, then off to the doctor. (Photo by John Tlumacki/The Boston Globe via Getty Images) Prevention is better than cure Smart phones were just the start. With apps enabling them to be used as everything from pedometers to measure how far you walk in a day, to calorie counters to help you plan your diet, millions of us are now using mobile technology to help us try and live healthier lifestyles. More recently, a steady stream of dedicated wearable devices have emerged such as Fitbit, Jawbone and Samsung Gear Fit that allow you to track your progress and upload your data to be compiled alongside everyone else’s. In the very near future, you could also be sharing this data with your Even if there’s nothing wrong with you, access to huge, ever growing databases of information about the state of the health of the general public will allow problems to be spotted before they occur, and remedies – either medicinal or educational – to be prepared in advance This is leading to ground breaking work, often by partnerships between medical and data professionals, with the potential to peer into the future and identify problems before they happen. One recently formed example of such a partnership is the doctor who will use it as part of his or her diagnostic toolbox when you visit them with an ailment. Pittsburgh Health Data Alliance – which aims to take data from various sources (such as medical and insurance records, wearable sensors, genetic data and even social media use) to draw a comprehensive picture of the patient as an individual, in order to offer a tailored healthcare package. That person’s data won’t be treated in isolation. It will be compared and analyzed alongside thousands of others, highlighting specific threats and issues through patterns that emerge during the comparison. This enables sophisticated predictive modelling to take place – a doctor will be able to assess the likely result of whichever treatment he or she is considering prescribing, backed up by the data from other patients with the same condition, genetic factors and lifestyle. Programs such as this are the industry’s attempt to tackle one of the biggest hurdles in the quest for data-driven healthcare: The medical industry collects a huge amount of data but often it is siloed in archives controlled by different doctors’ surgeries, hospitals, clinics and administrative departments. Another partnership that has just been announced is between Apple and IBM. The two companies are collaborating on a big data health platform that will allow iPhone and Apple Watch users to share data to IBM’s Watson Health cloud healthcare analytics service. The aim is to discover new medical insights from crunching real-time activity and biometric data from millions of potential users. Zoonotic diseases coming now – effective healthcare is key to check Naish 12 (Reporter for Daily Mail, “The Armageddon virus: Why experts fear a disease that leaps from animals to humans could devastate mankind in the next five years Warning comes after man died from a Sars-like virus that had previously only been seen in bats Earlier this month a man from Glasgow died from a tick-borne disease that is widespread in domestic and wild animals in Africa and Asia” http://www.dailymail.co.uk/sciencetech/article-2217774/TheArmageddon-virus-Why-experts-fear-disease-leaps-animals-humans-devastate-mankindyears.html#ixzz3E5kqxjQI) The symptoms appear suddenly with a headache, high fever, joint pain, stomach pain and vomiting. As the illness progresses, patients can develop large areas of bruising and uncontrolled bleeding. In at least 30 per cent of cases, Crimean-Congo Viral Hemorrhagic Fever is fatal. And so it proved this month when a 38-year-old garage owner from Glasgow, who had been to his brother’s wedding in Afghanistan, became the UK’s first confirmed victim of the tick-borne viral illness when he died at the high-security infectious disease unit at London’s Royal Free Hospital. It is a disease widespread in domestic and wild animals in Africa and Asia — and one that has jumped the species barrier to infect humans with deadly effect. But the unnamed man’s death was not the only time recently a foreign virus had struck in this country for the first time. Last month, a 49-year-old man entered London’s St Thomas’ hospital with a raging fever, severe cough and desperate difficulty in breathing. He bore all the hallmarks of the deadly Sars virus that . Nor was it any other virus yet known to medical science. Worse still, the gasping, sweating patient was rapidly succumbing to kidney failure, a potentially lethal complication that had never before been seen in such a case. As medical staff killed nearly 1,000 people in 2003 — but blood tests quickly showed that this terrifyingly virulent infection was not Sars quarantined their critically-ill patient, fearful questions began to mount. The stricken man had recently come from Qatar in the Middle East. What on earth had he picked up there? Had he already infected others with it? Using the latest high-tech gene-scanning technique, scientists at the Health Protection Agency started to piece together clues from tissue samples taken from the Qatari patient, who was now hooked up to The results were extraordinary. Yes, the virus is from the same family as Sars. But its make-up is completely new. It has come not from humans, but from animals. Its closest known relatives have been found in Asiatic bats. The investigators also discovered that the virus has already killed someone. Searches of global medical databases revealed the same mysterious virus lurking in samples taken from a 60-year-old man who had died in Saudi Arabia in July. Scroll down for video Potentially deadly: The man suffered from CCHF, a disease transmitted by ticks (pictured) which is especially common in East and West Africa Potentially a life-support machine. deadly: The man suffered from CCHF, a disease transmitted by ticks (pictured) which is especially common in East and West Africa When the Health Protection Agency warned the world of this newly- emerging virus last month, it ignited a stark fear among medical experts. Could this be the next bird flu, or even the next ‘Spanish flu’ — the world’s biggest pandemic, which claimed between 50 million and 100 million lives In all these outbreaks, the virus responsible came from an animal. Analysts now believe that the The terrifying fact is that viruses that manage to jump to us from animals — called zoonoses — can wreak havoc because of their astonishing ability to catch us on the hop and spread rapidly through the population when we least expect it. The virus's power and fatality rates are terrifying One leading British virologist, Professor John Oxford at Queen Mary Hospital, University of London, and a world authority on epidemics, warns that we must expect an animal-originated pandemic to hit the world within the next five years, with potentially cataclysmic effects on the human race. Such a contagion, he believes, will be a new strain of super-flu, a highly infectious virus that may originate in some far-flung backwater of Asia or Africa, and be contracted by one person from a wild animal or domestic beast, such as a chicken or pig. By the time the first victim has succumbed to this unknown, unsuspected new illness, they will have spread it by coughs and sneezes to family, friends, and all those gathered anxiously around them. Thanks to our crowded, hyper-connected world, this doomsday virus will already have begun crossing the globe by air, rail, road and sea before even the best brains in medicine have begun to chisel at its genetic secrets. Before it even has a name, it will have across the globe from 1918 to 1919? Spanish flu pandemic originated from a wild aquatic bird. started to cut its lethal swathe through the world’s population. The high security unit High security: The high security unit where the man was treated for the potentially fatal disease but later died If this new virus They die because of something called a ‘cytokine storm’ — a vast overreaction of their strong and efficient immune systems that is prompted by the virus. This uncontrolled response burns them with a fever and wracks their bodies with nausea and massive fatigue. The hyper-activated immune system actually kills the person, rather than killing the super-virus. Professor Oxford bases his prediction on historical patterns. The past century has certainly provided us with many disturbing precedents. For example, the 2003 global outbreak of Sars, the severe acute respiratory syndrome that killed nearly 1,000 people, was transmitted to humans from Asian civet cats in China. More... Man, 38, dies from deadly tropical disease after returning to the follows the pattern of the pandemic of 1918-1919, it will cruelly reap mass harvests of young and fit people. UK from Afghanistan Nine-year-old who turns YELLOW with anger: Brianna must spend 12 hours a day under UV lights because of rare condition In November 2002, it first spread among people working at a live Nowadays, the threat from such zoonoses is far greater than ever, thanks to modern technology and human population growth. Mass transport such as airliners can quickly fan animal market in the southern Guangdong province, where civets were being sold. outbreaks of newly- emerging zoonoses into deadly global wildfires. The Sars virus was spread when a Chinese professor of respiratory medicine treating people with the syndrome fell ill when he travelled to Hong Kong, carrying the virus with him. By February 2003, it had covered the world by hitching easy lifts with airline passengers. Between March and July 2003, some 8,400 probable cases of Sars had been reported in 32 countries. It is a similar story with H1N1 swine flu, the 2009 influenza pandemic that infected hundreds of millions throughout the world. It is now believed to have originated in herds of pigs in Once these stowaway viruses get off the plane, they don’t have to learn a new language or new local customs. Genetically, we humans are not very Mexico before infecting humans who boarded flights to myriad destinations. diverse; an epidemic that can kill people in one part of the world can kill them in any other just as easily. On top of this, our risk of catching such deadly contagions from wild animals is growing massively, thanks to humankind’s relentless encroachment into the world’s jungles and rainforests, where we increasingly come into contact for the first time with unknown viral killers that have been evolving and incubating in wild creatures for millennia. This month, an international research team announced it had identified an entirely new African virus that killed two teenagers in the Democratic Republic of the Congo in 2009. The virus induced acute hemorrhagic fever, which causes catastrophic widespread bleeding from the eyes, ears, nose and mouth, and can kill in days. A 15-year-old boy and a 13-year-old girl who attended the same school both fell ill suddenly and succumbed rapidly. A week after the girl’s death, a nurse who cared for her developed similar symptoms. He only narrowly survived. The new microbe is named Bas-Congo virus (BASV), after the province where its three victims lived. It belongs to a family of A report in the journal PLoS Pathogens says the virus probably originated in local wildlife and was passed to humans through insect bites or some other as-yet unidentified means. There are plenty of other new viral candidates waiting in the wings, guts, breath and blood of animals around us. You can, for example, catch leprosy from armadillos, which carry the virus in their shells and are responsible for a third of leprosy cases in the U.S. Horses can transmit the Hendra virus, which can cause lethal respiratory and neurological disease in people. In a new book that should give us all pause for thought, awardwinning U.S. natural history writer David Quammen points to a host of animal-derived infections that now claim lives with unprecedented regularity. The trend can only get worse, he warns. Quammen highlights the viruses known as rhabdoviruses, which includes rabies. Ebola fever virus, which first struck in Zaire in 1976. The virus’s power is terrifying, with fatality rates as high as 90 per cent. The latest mass outbreak of the virus, in the Congo last month, is reported to have killed 36 people out of 81 suspected cases. According to Quammen, Ebola probably originated in bats. The bats then infected African apes, quite probably through the apes coming into contact with bat droppings. 'It is inevitable we will have a global outbreak' Studies of the virus’s genes suggest it may have first evolved as early as 1908. It was not until the Sixties that it The virus then infected local hunters who had eaten the apes as bushmeat. Quammen believes a similar pattern occurred with the HIV virus, which probably originated in a single chimpanzee in Cameroon. appeared in humans, in big African cities. By the Eighties, it was spreading by airlines to America. Since then, Aids has killed around 30 million people and infected another 33 million. There is one mercy with Ebola and HIV. They cannot be transmitted by coughs and sneezes. ‘Ebola is transmissible from human to human through direct contact with bodily fluids. It can be stopped by preventing such contact,’ If HIV could be transmitted by air, you and I might already be dead. If the rabies virus — another zoonosis — could be transmitted by air, it would be the most horrific pathogen on the planet.’ Viruses such as Ebola have another limitation, on top of their method of transmission. They kill and incapacitate people too quickly. In order to spread into pandemics, zoonoses need their human hosts to be both infectious and alive for as long as possible, so that the virus can keep casting its deadly tentacles across the world’s population. But there is one zoonosis that can do all the right (or wrong) things. It is our old adversary, flu. It is easily transmitted through the air, via sneezes and coughs. Sars Quammen explains. ‘ can do this, too. But flu has a further advantage. As Quammen points out: ‘With Sars, symptoms tend to appear in a person before, rather than after, that person becomes highly infectious. Unlike Sars the symptoms of this new disease may not be apparent before the spread of infection Isolation: Unlike Sars the symptoms of this new disease may not be apparent before the spread of infection ‘That allowed many Sars cases to be recognised, hospitalised and placed in isolation before they hit their peak of infectivity. But with influenza and many other diseases, the order is reversed.’ Someone who has an infectious case of a new and potentially lethal strain of flu can be walking about innocently spluttering it over everyone around them for days before they become incapacitated. Such reasons lead Professor Oxford, a world authority on epidemics, to warn that a new global pandemic of animal-derived flu is inevitable. And, he says, the clock is ticking fast. Professor Oxford’s warning is as stark as it is certain: ‘I think it is inevitable that we will have another big global outbreak of flu,’ he says. ‘We should plan for one emerging in 2017-2018.’ But are we adequately prepared to cope? Professor Oxford warns that vigilant surveillance is the only real answer that we have. ‘New flu strains are a day-to-day problem and we have to be very careful to keep on top of them,’ he says. ‘We now have scientific processes enabling us to quickly identify the genome of the virus behind a new illness, so that we know what we are dealing with. The best we can do after that is to develop and stockpile vaccines and antiviral drugs that can fight new strains that we see emerging.’ But the Professor is worried our politicians are not taking this certainty of mass death seriously enough. Such laxity could come at a human cost so unprecedentedly high that it would amount to criminal negligence. The race against newly-emerging animal-derived diseases is one that we have to win every time. A pandemic virus needs to win only once and it could be the end of humankind. Isolation: 2nc Health Care 2nc – overview Zoonotic diseases specifically cause extinction Casadevall 12 (Arturo, M.D., Ph.D. in Biochemistry from New York University, Leo and Julia Forchheimer Professor and Chair of the Department of Microbiology and Immunology at Albert Einstein College of Medicine, former editor of the ASM journal Infection and Immunity, “The future of biological warfare,” Microbial Biotechnology Volume 5, Issue 5, pages 584–587, September 2012, http://onlinelibrary.wiley.com/doi/10.1111/j.1751-7915.2012.00340.x/full) In considering the importance of biological warfare as a subject for concern it is worthwhile to review the known existential threats. At this time this writer can identify at three major existential threats to humanity: (i) large-scale thermonuclear war followed by a nuclear winter, (ii) a planet killing asteroid impact and (iii) infectious disease. To this trio might be added climate change making the planet uninhabitable. Of the three existential threats the first is deduced from the inferred cataclysmic effects of nuclear war. For the As to an existential threat from microbes recent decades have provided unequivocal evidence for the ability of certain pathogens to cause the extinction of entire species. Although infectious disease has traditionally not been associated with extinction this view has changed by the finding that a single chytrid fungus was responsible for the extinction of numerous amphibian species (Daszak et al., 1999; Mendelson et al., 2006). Previously, the view that infectious diseases were not a cause of extinction was predicated on the notion that many pathogens required their hosts and that some proportion of the host population was naturally resistant. However, that calculation does not apply to microbes that are acquired directly from the environment and have no need for a host, such as the majority of fungal pathogens. For those types of host–microbe interactions it is possible for the pathogen to kill off every last member of a species without harm to itself, since it would return to its natural habitat upon killing its last host. Hence, from the viewpoint of existential threats environmental microbes could potentially pose a much greater threat to humanity than the known pathogenic microbes, which number somewhere near 1500 species second there is geological evidence for the association of asteroid impacts with massive extinction (Alvarez, 1987). (Cleaveland et al., 2001; Taylor et al., 2001), especially if some of these species acquired the capacity for pathogenicity as a consequence of natural evolution or bioengineering. at: ridley Ridley is wrong Nuccitelli 15 (Dana Nuccitelli is a blogger on environmentguardian.co.uk. He is an environmental scientist and risk assessor, and also contributes to SkepticalScience.comJanuary 21, 2015, “Matt Ridley wants to gamble the Earth’s future because he won’t learn from the past” http://www.theguardian.com/environment/climate-consensus-97-per-cent/2015/jan/21/matt-ridley-wants-togamble-earths-future-because-wont-learn-from-past, ekr) Have you ever watched a zombie movie and wondered if the protagonists will grow physically tired from having to repeatedly kill zombies that inevitably rise once again from the dead? That’s how people often feel when confronted with climate change myths that were debunked years ago. These myths never seem to stay dead, inevitably being revived by climate contrarians no matter how conclusively and repeatedly they’ve been debunked. And so we have writer Matt Ridley once again published in the London Times complaining, “Rather than attack my arguments, my critics like to attack my motives.” That’s undoubtedly because when an individual keeps repeating the same myths over and over again, people eventually grow tired of debunking those myths and naturally question the motives of the individual who keeps making them. Let’s look at a few examples from Ridley’s latest article. He claims not to be worried about global warming for a few reasons, including, The failure of the atmosphere to warm anywhere near as rapidly as predicted was a big reason: there has been less than half a degree of global warming in four decades - and average global surface temperatures have warmed it has slowed down, not speeded up. This is incorrect – between 0.6 and 0.7°C over the past 40 years (lower atmospheric temperatures have also likely warmed more than 0.5°C, though the record hasn’t yet existed for 40 years). During that time, that temperature rise has temporarily both slowed down (during the 2000s, when there was a preponderance of La Niña events) and sped up (during the 1990s, when there was a preponderance of El Niño events). Climate models accurately predicted the long-term global warming trend. Ridley continues, Sea level has risen but at a very slow rate - about Given that sea level has risen faster than predicted, if you’re arguing against the dangers posed by global warming, sea level is a poor choice. Climate research projects a sea level rise in the ballpark of 1 a foot per century. meter (3 feet) by the year 2100 if we follow the business-as-usual path advocated by folks like Matt Ridley. Also, I soon realised that all the mathematical models predicting water vapour (as a greenhouse gas) will amplify global warming because a warmer atmosphere can hold more of it. Observations have confirmed this is exactly what’s happening in the real world. This isn’t an assumption of models – it’s based on scientists’ understanding of basic atmospheric physics. Another thing that gave me pause was rapid warming assume big amplifying feedbacks in the atmosphere, mainly from water vapour Here Ridley is again quite wrong. We know that that I went back and looked at the history of past predictions of ecological apocalypse from my youth - population explosion, oil exhaustion, elephant extinction, rainforest loss, acid rain, the ozone layer, desertification, nuclear winter, the running out of resources, pandemics, falling sperm counts, cancerous pesticide pollution and so forth. There was a consistent pattern of exaggeration, followed by damp squibs: in not a single case was the problem as bad as had been widely predicted by leading scientists. That does not make every new prediction of apocalypse necessarily wrong, of course, but it should encourage scepticism. At least Ridley admits that this is a poor excuse for dismissing the threats posed by climate change, but it’s a far poorer excuse than he realizes. The reason that the worst possible consequences from acid rain, ozone depletion, pesticide pollution, and so forth weren’t realized is that we took action to mitigate those threats. Specifically, we put a price on the pollutants that caused acid rain and ozone depletion, and regulated pesticide use. Those are precisely the solutions proposed to mitigate global warming. Ridley makes a similar error when discussing IPCC global warming projections, My best guess would be about one degree of warming during this century, which is well within the IPCC’s range of possible outcomes. A further 1°C global warming by 2100 is only a possibility in one of the scenarios considered by IPCC (called RCP2.6 or RCP3-PD, where ‘PD’ stands for a rapid peak and decline of carbon emissions). It’s the scenario in which there is an immediate and aggressive global effort to cut carbon pollution. Specifically, human global carbon emissions peak in 2020, after which they Ridley opposes immediate aggressive efforts to cut global carbon pollution. It’s disingenuous at best for him to argue that his beliefs about modest global warming are consistent with the IPCC projections whilst advocating against the relevant pathway. It’s like arguing, “My belief that I can lose weight while eating lots of cake and ice cream decline at a rate of around 3.5% per year, reaching zero in 2070 and continuing to fall as we remove carbon pollution from the atmosphere. Matt is well within medical doctors’ range of my possible health outcomes.” There are numerous other errors and zombie myths in Ridley’s piece that I won’t go into. For example, he revives long-debunked myths about the ‘hockey stick’ and ‘Climategate.’ Worst of all is the conclusion to which Ridley’s flawed arguments lead – that we needn’t take serious action to mitigate global warming because he doesn’t believe climate consequences will be serious. One need only read the climate science literature (summarized by the IPCC) to see how dangerous the potential consequences of climate change are if we fail to take serious action to avoid them. Ridley believes future warming will be relatively small and hence the impacts relatively bearable, but it’s just that – his (non-expert) belief. He argues that rather than mitigate the immense risks posed by global warming, the world should share his belief and take the gamble on the best case scenario that climate change doesn’t turn out to be too terrible. This is the part of the story where we’re obligated to recall that Matt Ridley was the non-executive Chairman of Northern Rock, a British bank that in 2007, was the first in over 150 years to experience a run on its deposits. Under Ridley’s chairmanship, the bank pursued a high-risk, reckless business strategy that eventually backfired, and had to be bailed out by British taxpayers to the tune of £27 billion ($41 billion). Ridley apparently didn’t learn from that fiasco, and wants to repeat the same high-risk strategy with the global climate. His reasoning is based on zombie myths, and if he’s wrong again, this time nobody will be able to step in and bail out the Earth’s inhabitants. 2nc – econ Big data’s key to the global economy – facilitates private growth and innovation on a large scale Polonetsky and Tene 13 (Jules, Co-Chair and Director, Future of Privacy Forum, and Tene, Associate Professor, College of Management Haim Striks School of Law, Israel; Senior Fellow, Future of Privacy Forum; Affiliate Scholar, Stanford Center for Internet and Society, published in the Stanford Law Review, “Privacy and Big Data: Making Ends Meet”, http://www.stanfordlawreview.org/online/privacy-and-big-data/privacy-and-big-data) Big data analysis often benefits those organizations that collect and harness the data. Data-driven profits may be viewed as enhancing allocative efficiency by facilitating the “free” economy.[15] The emergence, expansion, and widespread use of innovative products and services at decreasing marginal costs have revolutionized global economies and societal structures, facilitating access to technology and knowledge[16] and fomenting social change.[17] With more data, businesses can optimize distribution methods, efficiently allocate credit, and robustly combat fraud, benefitting consumers as a whole.[18] But in the absence of individual value or broader societal gain, others may consider enhanced business profits to be a mere value transfer from individuals whose data is being exploited. In economic terms, such profits create distributional gains to some actors (and may in fact be socially regressive) as opposed to driving allocative efficiency. D. Society Finally, some data uses benefit society at large. These include, for example, data mining for purposes of national security. We do not claim that such practices are always justified; rather, that when weighing the benefits of national security driven policies, the effects should be assessed at a broad societal level. Similarly, data usage for fraud detection in the payment card industry helps facilitate safe, secure, and frictionless transactions, benefiting society as a whole. And large-scale analysis of geo-location data has been used for urban planning, disaster recovery, and optimization of energy consumption. E. Benefits Big data creates enormous value for the global economy, driving innovation, productivity, efficiency, and growth. Data has become the driving force behind almost every interaction between individuals, businesses, and governments. Econ decline goes nuclear and escalates Auslin 9 (Michael, Resident Scholar – American Enterprise Institute, and Desmond Lachman – Resident Fellow – American Enterprise Institute, “The Global Economy Unravels”, Forbes, 3-6, http://www.aei.org/article/100187) global chaos followed hard on economic collapse. The mere fact that parliaments across the globe, from America to Japan, are What do these trends mean in the short and medium term? The Great Depression showed how social and unable to make responsible, economically sound recovery plans suggests that they do not know what to do and are simply hoping for the least disruption. Equally worrisome is the adoption of more statist economic programs around the globe, and the concurrent decline of trust in free-market systems. The threat of instability is a pressing concern. China, until last year the world's fastest growing economy, just reported that 20 million migrant laborers lost their jobs. Even in the flush times of recent years, China faced upward of 70,000 labor uprisings a year. A sustained downturn poses grave and possibly immediate threats to Chinese internal stability. The regime in Beijing may be faced with a choice of repressing its own people or diverting their energies outward, leading to conflict with China's neighbors. Russia, an oil state completely dependent on energy sales, has had to put down riots in its Far East as well as in downtown Moscow. Vladimir Putin's rule has been predicated on squeezing civil liberties while providing economic largesse. If that devil's bargain falls apart, then wide-scale repression inside Russia, along with a continuing threatening posture toward Russia's neighbors, is likely. Even apparently stable societies face increasing risk and the threat of internal or possibly external conflict. As Japan's exports have plummeted by nearly 50%, one-third of the country's prefectures have passed emergency economic stabilization plans. Hundreds of thousands of temporary employees hired during the first part of this decade are being laid off. Spain's unemployment rate is expected to climb to nearly 20% by the end of 2010; Spanish unions are already protesting the lack of jobs, and the specter of violence, as occurred in the 1980s, is haunting the country. Meanwhile, in Greece, workers have already taken to the streets. Europe as a whole will face dangerously increasing tensions between native citizens and immigrants, largely from poorer Muslim nations, who have increased the labor pool in the past several decades. Spain has absorbed five million immigrants since 1999, while nearly 9% of Germany's residents have foreign citizenship, including almost 2 million Turks. The xenophobic labor strikes in the U.K. do not bode well for the rest of Europe. A prolonged global downturn, let alone a collapse, would dramatically raise tensions inside these countries. Couple that with possible protectionist legislation in the United States, unresolved ethnic and territorial disputes in all regions of the globe and a loss of confidence that world leaders actually know what they are doing. The result may be a series of small explosions that coalesce into a big bang . Big data is key to the economy – jobs, new industry expansion, and revenue Blackburn 15 (Suzanne, PR Manager at Experian and senior contributor to the Experian WhitePages. Experian is a data marketing analytics company that has been published for over 40 years. “Why Privacy Matters in a Data-Driven Economy”, 3/26, http://www.experian.com/assets/marketing-services/p/ems-why-privacy-matters.pdf) Beyond enabling more convenient and valuable digital experiences, data is now fueling our national and global economy. New business models and ways of doing business, while still in their early stages, are steering the global economy toward a data-driven world of unprecedented access, insight, innovation and interconnectivity. However, as data becomes fundamental to virtually every aspect of our business and professional lives, this data-driven economy is at a crossroads. It will only continue to grow and thrive if we collectively create the conditions where it can remain open, healthy and responsive to the privacy concerns of consumers. Kevin Dean, General Manager and Global Head of Product, Targeting, Experian Marketing Services notes, “The ‘plumbing’ of the data-driven economy, the part that sits out of sight behind the drywall, out of the view of most consumers, is something that many consumers are becoming aware of for the first time.” This white paper will assess the rise of the data-driven economy within the media and advertising industry and the evolution of privacy in that economy: How can we ensure that data is used for good, positive and productive purposes? How can we create the conditions that will ensure a healthy and open data-driven economy that changes the world for the better, many times over? This white paper is for the digital and the data-driven, the organization and the individual, both the business-to-consumer and the business-to-business brand — every link in the chain of the media and advertising ecosystem that is assessing its role in this economy and its future. According to McKinsey, gains for the overall economy as a result of Big Data could be up to $610 billion in annual productivity and cost savings. Since 2007, data-related products and services have generated about 30 percent of real personal consumption growth, according to the Progressive Policy Institute. McKinsey estimated that Big Data could yield benefits for healthcare alone of more than $300 billion annually. According to IDC, 570 new Websites are created every minute. According to IDC, in five years there will be 450 billion transactions per day. According to IBM, by 2020, the amount of information in the digital universe will grow tenfold. Advertising is an immediate example of an industry in the midst of a data-driven growth spurt. In this industry, innovation is taking place at a rapid rate. According to research by industry analyst Scott Brinker, the marketing technology landscape has exploded in the past four years. As of January 2015, Brinker estimates that there are nearly 1,900 marketing-technology venders, up from 947 companies in early 2014 and only 100 in 2011. According to a study conducted by Harvard Business School in 2012, the digital-advertising industry alone employed more than 2 million Americans in 2012, indirectly employing 3.1 million Americans in other sectors. According to the Progressive Policy Institute, the mobile app industry alone now accounts for more than 750,000 jobs. These are jobs that didn’t exist a decade ago. More importantly, ubiquitous consumer data is bringing programmatic media, interactive marketing and digital-technology companies closer together, forming a new hybrid industry with a common goal: to enhance the digital experience of the consumer. 2nc – link Healthcare Fraud is increasing only governmental use of big data can stop it. Gray, Keats Citron, and Rinehart, 2013 (David, Associate Professor, University of Maryland Francis King Carey School of Law, Danielle, Lois K. Macht Research Professor of Law, University of Maryland Francis King Carey School of Law, and Liz Clark, University of Maryland Francis King Carey School of Law, “SYMPOSIUM ON CYBERCRIME: FIGHTING CYBERCRIME AFTER UNITED STATES V. JONES” Journal of Criminal Law & Criminology Lexis) Any reasonable discussion of healthcare fraud must include Medicare. Medicare is a government health insurance program for the elderly and the disabled. n154 Every day, 4.5 million claims for Medicare services are [*771] processed. n155 In 2011, the program covered almost 49 million people, spending over $ 500 billion. n156 The extent of Medicare fraud is unknown, n157 but it is believed to cost the government somewhere between $ 60 billion and $ 90 billion a year. n158 Hospitalization claims are the most common source of civil fraud investigations, while outpatient, medical equipment, and lab work claims are the most common sources of criminal fraud investigations. n159 Home-health agencies and providers of durable medical equipment have particularly high fraud rates. n160 Healthcare fraud generally - and Medicare fraud in particular - frequently involves health providers' charging for services never provided, billing for unnecessary equipment, stealing medical identities, paying kickbacks for referrals, or using a Medicare number for fraudulent billing. Complex schemes often incorporate a mix of strategies. n161 To identify [*772] fraudulent billing practices, automated systems help investigators flag impossible claims, such as a provider's alleged removal of twenty toenails from three toes or bills for more therapy sessions than Newtonian physics would allow. n162 Phantom billing may involve elaborate schemes in which there are in fact no physical clinics, patients, or health practitioners. For example, a member of an Armenian organized crime group recently admitted to creating a network of clinics and providers that existed only on paper, but nevertheless billed Medicare for nearly $ 100 million and received over $ 35 million in payments. n163 Similar to phantom billing is billing for services that are not medically necessary. In one case, a doctor with a penchant for Playboy models and Picassos received "$ 1.2 million from Medicare in 2008 ... a large portion of it from physical therapy," consisting of "heat packs, massage, electrical stimulation and ultrasound." n164 Although government-funded massages are relatively harmless to patients, other unnecessary treatments can be invasive and life threatening. In a recent case, investigators discovered that patients who were disoriented and unable to control their bodily functions were being forced to attend group therapy that served no medical purpose. n165 [*773] Providers altered their records so it would appear that patients benefited from therapy that was anything but helpful. n166 In another case, the government alleged that a nursing home required therapists to use the most expensive treatments on residents, even if the interventions were inappropriate or dangerous. n167 For example, it alleged that a ninety-two-year-old cancer patient in Orlando, who was routinely spitting up blood, nonetheless received 48 minutes of physical therapy, 47 minutes of occupational therapy, and 30 minutes of speech therapy, two days before his death. The day he died, the patient received 35 minutes of physical therapy and was scheduled for more therapy later in the day. n168 CMS reported a dermatologist who, in addition to unnecessarily removing "benign skin lesions," reused sutures, thereby exposing patients to HIV, hepatitis C, and other diseases. n169 Claims for medical equipment are another common target for fraudsters. Two Los Angeles pastors recently were found guilty of running separate schemes involving power wheelchairs. In the first, the conspirators purchased fraudulent medical documentation and billed Medicare $ 6,000 for power wheelchairs that actually cost $ 900. n170 The conspirators also offered wheelchairs and other unnecessary equipment to Medicare beneficiaries in exchange for their Medicare numbers. n171 If Medicare refused to pay for the chairs, the pastor instructed his employees to take the chairs away from the beneficiaries. n172 The funds from the scheme were diverted among sham supply companies run by the pastor's wife and other church members. n173 A second pastor and a doctor who [*774] provided fraudulent documentation pleaded guilty to running a similar conspiracy later in the same year. n174 Prescription medicines provide another rich territory for healthcare fraud. A well-known dialysis provider was accused in 2012 of intentionally wasting medication by giving multiple partial doses, instead of smaller numbers of full doses, in order to inflate charges. n175 Later that same year, a Miami pharmacy owner pleaded guilty to fraud charges for instructing his employees to retrieve from assisted-living facilities unused medication already billed to Medicare and Medicaid so that it could be repackaged and reused. n176 The repackaged medicine was distributed to other assisted-living facilities or the general public and resubmitted to insurance. n177 The pharmacist also paid assisted-living facilities to refer residents. n178 In Baltimore, a pharmacist admitted to purchasing drums of drugs from an unlicensed provider, mislabeling them, and dispensing them to customers. n179 The same pharmacist submitted claims to Medicare for prescription refills that were not dispensed to beneficiaries. n180 Still another pharmacist admitted to paying Medicare and Medicaid beneficiaries for their prescriptions and then submitting reimbursement claims to insurance companies without dispensing the medication. n181 Among his targets were [*775] patients with HIV or mental illness, whose medications are particularly expensive. n182 Patients are not always innocent victims, of course. Beneficiaries often participate in healthcare fraud schemes in exchange for services or kickbacks. n183 Kickbacks range from cash n184 and cigarettes n185 to spa services and lunches. n186 In a massive operation in New York, conspirators paid $ 500,000 to Some of these schemes are far more Dickensian, providing subsistence benefits, such as housing, to vulnerable beneficiaries and then threatening them with homelessness if they refuse to comply with the fraud. n188 Whether through coercion, persuasion, or deception, individuals engaged in fraud expose Medicare beneficiaries, who are often ill or limited in capacity, to substantial risks. Medical identity theft is a significant problem as well. CMS reports that, in 2011, a man was convicted of stealing his brother's medical information and using it for surgery beneficiaries in a special "kickback room." n187 covered under his brother's insurance. [*776] The victim's medical records in turn incorrectly included his brother's HIV-positive Perpetrators also steal the identities of unsuspecting providers who have already been approved by Medicare in order to file fraudulent claims. n190 In one case, a home-health agency owner stopped paying his licensed personnel status, which put the true beneficiary at risk of receiving medically unnecessary drugs and procedures. n189 and, when they quit, billed hundreds of claims under his former employees' licenses. n191 Organized crime is also involved, creating networks of nonexistent clinics based on stolen provider information, often leading to suspicious claims, such as "[a] pregnant woman who gets an ultrasound exam - from an ear, nose and throat doctor[, a] forensic pathologist whose patients walked into his office, rather than being rolled in with toe tags[, a] dermatologist who conducted heart tests[, or a] psychiatrist who performed M.R.I.'s." n192 Although some providers' identities are stolen, others lend, rent, or sell their identities to facilitate fraud schemes. n193 Take, for example, a case in New Jersey where a licensed provider was "frequently either not in the office at all, or was in his personal office watching television." n194 He provided "pre-signed, blank prescription forms" to the unlicensed employees who were diagnosing patients. n195 In another case, unlicensed physicians paid a licensed physician "$ 2,000 a month to review and sign medical records prepared by physician assistants." n196 [*777] Healthcare fraud is increasingly accomplished and facilitated by electronic means. n197 Rather than steal patient information on an individual basis, hackers target medical information databases. In May 2012, a group of hackers based in Eastern Europe breached Utah's healthcare database, gaining access to over 780,000 records, including Social Security numbers and medical diagnosis codes. n198 These records are essential for fraudulent billing. According to one report, "an individual healthcare record is worth more on the black market ($ 50, on average) than a U.S.-based credit card and personal identity with social security number combined." n199 As healthcare fraud moves into the digital arena, traditional methods of detection and prosecution are simply inadequate. A cybercrime requires a cybersolution, which, in the case of healthcare fraud, will almost certainly include Big Data. Only robust data analysis can solve healthcare fraud – Mosaic Theory prevents that. Gray, Keats Citron, and Rinehart, 2013 (David, Associate Professor, University of Maryland Francis King Carey School of Law, Danielle, Lois K. Macht Research Professor of Law, University of Maryland Francis King Carey School of Law, and Liz Clark, University of Maryland Francis King Carey School of Law, “SYMPOSIUM ON CYBERCRIME: FIGHTING CYBERCRIME AFTER UNITED STATES V. JONES” Journal of Criminal Law & Criminology Lexis) The overwhelming majority of data that CMS and its contractors use to detect fraud comes from claims, payment, and referral records. n200 Now that [*778] CMS is partnering with private insurance organizations, it will have access to private claims and other health data. n201 Additionally, the Medicare Integrity Manual lists a dozen types of data that contract agencies should use when investigating suspicious activity, including: (1) the nature of the providers and staff; (2) the structure of the business, overhead costs, and its relationship to other businesses; (3) the amount of business generally and the amount of business from Medicare/Medicaid reimbursements specifically; (4) the types of services rendered; (5) location; (6) history of claims and any previous investigations; and (7) "other information needed to explain and/or clarify the issue(s) in question." n202 In part due to the involvement of international organized crime syndicates, the Department of Justice (DOJ), which investigates and prosecutes fraud cases, considers healthcare fraud an indicator of potential terrorism. n203 DOJ describes healthcare providers as "nontraditional information gatherers [that] can provide [interagency data-sharing] fusion centers with both strategic and tactical information," n204 including "health surveillance networks [and] syndromic surveillance." n205 It recommends that fusion centers, which serve as hubs for local, state, and federal information Access to fusion-center networks means having the ability to mine and analyze vast public databases at the state, local, and federal level; data-broker dossiers on millions of individuals; [*779] private databases held by cooperating entities; video streams from public and private cameras; and far more. In prosecuting fraud cases, DOJ will have access to CMS's data as well as any data aggregated and analyzed by fusion centers. In short, efforts to prevent, detect, and prosecute healthcare fraud are increasingly tied to Big Data. Already an important tool for regulators and law enforcement, Big Data is likely to become a more powerful and important asset in the years to come. n208 The ACA contains a provision requiring the release of some of Medicare's billing data, which previously had been blocked by a court ruling citing physician privacy. n209 CMS has discussed plans to leverage the detection benefits of Big Data to facilitate a move towards "fraud prevention," rather than the former method of paying claims and later attempting to reclaim funds fraudulently acquired. n210 To this end, CMS has developed multiple task forces and agencies that tap gathering and sharing, n206 collaborate with healthcare providers to develop analytical tools. n207 private-sector information technology resources. n211 The most recent initiative is the Fraud Prevention System (FPS), a response to requirements in the Small Business Jobs Act of 2010 "to implement predictive analytics technologies to [*780] identify and prevent the payment of improper claims in the Medicare fee-for-service program." n212 All of Medicare's daily 4.5 million claims run through FPS's "predictive algorithms and other sophisticated analytics," n213 which are similar to those used by credit card companies to detect fraudulent purchases. n214 Although FPS cannot automatically stop payments, it "automatically generates and prioritizes leads for review and investigation." n215 FPS addresses the problem of data silos by analyzing claims nationwide n216 and over a period of time, n217 both of which are necessary for identifying fraudulent behavior. n218 FPS also complements the Automated Provider Screening System; the two systems are now slated for integration. n219 CMS has more plans to expand the reach and power of FPS, including social network analysis n220 and adaptive analytics. n221 According to CMS, in 2011 "FPS also generated leads for 536 new ... investigations, augmented information for 511 pre-existing investigations, and prompted 617 provider interviews and 1,642 beneficiary interviews to verify legitimate provision of Medicare services and supplies." n222 CMS claims that these efforts resulted in a savings of $ 115 million. n223 Although modest when compared to the total of $ 4.1 billion that CMS recovered from fraud schemes through partnerships with private contractors and government agencies in 2011, n224 the program is just getting started, and [*781] officials expect to prevent or recover billions of dollars in losses. n225 Even when FPS was in its infancy, the Wall Street Journal drew attention to suspicious providers using simple data analysis of a database "containing records only through 2008, and including the claims of just 5% of randomly selected Medicare beneficiaries." n226 In 2010, the Journal described the suspect practices of a physical therapist who later pleaded guilty to healthcare fraud. n227 Among other charges, the doctor submitted a claim for a service that occurred while he was on vacation. n228 The Journal used the same comparatively limited data set to identify a surgeon who was practicing in Texas after being temporarily banned from Medicare because he had performed unnecessary and harmful surgeries in New Jersey. n229 The Journal found that the readmitted doctor's death rate was seven times higher than the national average. n230 Another surgeon appeared to perform an unusually high number of multiple spinal operations per patient. n231 Investigating these types of activities requires access to Big Data. With Big Data, governmental systems can identify providers who bill more over a specified time period than other providers in the region. Claims analysis can detect providers who authorize particularly expensive equipment. Analysis of individuals' claims over time can reveal discrepancies or impossibilities, such as multiple hysterectomies, which indicate possible identity theft or kickbacks. Looking at groups of individual claims could also reveal possible kickbacks if, for instance, a sizeable population in a community suddenly switches to a less convenient pharmacy. As FPS incorporates social network models, the system will gain further leverage on its data, allowing it to compare individuals against known criminal associations, including those that work primarily in the virtual world of black-market healthcare data. The more data the system can use to build comparative models, the more accurately the models will reflect standard practice. n232 As evidence of this potential, CMS recently credited "sophisticated data analysis" for the indictment of a home-healthcare physician in "the biggest health-care fraud case brought against a single doctor." n233 The doctor certified over 5,000 patients a year for home-healthcare by having his employees complete certification forms using his forged signature. n234 Although many healthcare fraud cases originate through direct reporting, including qui tam actions, complicated schemes like those involving organized crime are more vulnerable to data analysis, which can review and compare large volumes of claims over time. To achieve its stated goal of stopping fraudulent payments before they reach the provider, CMS will need robust analytical tools that can probe massive quantities of disparate data to flag automatically suspect claims across a wide range of covered services and also evolve to identify new fraudulent behavior as it develops. That capacity is likely to be greatly enhanced in coming years as CMS programs gain access to the vast quantities of consumer and other data currently brokered through third-party aggregators. At each turn, the government and its agents will face potential Fourth Amendment barriers erected by the mosaic theory of Fourth Amendment privacy. 2nc - econ impact innovation solves extinction Heaberlin 4 (Scott W, Nuclear Safety and Technology Applications Product Line @ Pacific Northwest National Laboratory, “A Case for Nuclear-Generated Electricity,” Battelle Press, 2004) Cohen looked at all the various population estimates and concluded that most fell into the range of 4 to 16 billion. Taking the highest value when researchers offered a range, Cohen calculated a high median of 12 billion and taking the lower part of the range a low median of 7.7 billion. The the projections for world population for 2050 are between 7.8 and 12.5 billion. That means we have got no more than 50 years before we exceed the nominal carrying capacity of the earth. Cohen also offers a qualifying observation by stating the "First Law of Information," which asserts that 97.6% of all statistics are made up. This helps us appreciate that application of these numbers to real life is subject to a lot of assumptions and insufficiencies in our understanding of the processes and data. However, we can draw some insights from all of this. What it comes down to is that if you choose the fully sustainable, non-fossil fuel long-term options with only limited social integration, the various estimates Cohen looked at give you a number like 1 billion or less people that the earth can support. That means 5 out of 6 of us have got to go, plus no new babies without an offsetting death. On the other hand, if you let technology continue to do its thing and perhaps get even better, the picture need not be so bleak. We haven't made all our farmland as productive as it can be. Remember, the Chinese get twice the food value per hectare as we do in the United States. There is also a lot of land that would become arable if we could get water to it. And, of course, in case you need to good news in this is 12 billion is twice as many people as we have now. The bad news is that go back and check the title of this book, there are alternatives to fossil fuels to provide the energy to power that technology. So given a positive and perhaps optimistic view of technology, we can look to some of the high technology assumption based studies from Cohen's review. From the semi-credible set of these, we can find estimates from 19 to 157 billion as the number of people the earth could support with a rough average coming in about 60 billion. This is a good time to be reminded of the First Law of Information. The middle to lower end of this range, however, might be done without wholesale social reprogramming. Hopefully we would see the improvement in the quality of life in the developing countries as they industrialize and increase their use of energy. Hopefully, also this would lead to a matching of the reduction in fertility rates that has been The point to all this is the near-term future of the human race depends on technology. If we turn away from technology, a very large fraction of the current and future human race will starve. If we just keep on observed in the developed countries, which in turn would lead to an eventual balancing of the human population. as we are, with our current level of technology and dependence on fossil fuel resources, in the near term it will be a race between fertility decrease and our ability to feed ourselves, with, frankly, disaster the slight odds-on bet. In a slightly longer term, dependence on fossil fuels has got to lead to either environmental disaster. There are no other end points to that road. It doesn't go anywhere else. However, if we accept that it is technology that makes us human, that technology uniquely identifies us as the only animal that can choose its future, we can choose to live, choose to make it a better world for everyone and all life. This means more and better technology. It means more efficient technology that is kinder to the planet but also allows humans to social chaos or support large numbers in a high quality of life. That road is not easy and has a number of ways to screw up. However, it is a road that can lead to a happier place, a better place. Terrorism Links 1nc Social media surveillance is key to solve terrorism – it’s the lynchpin for ISIS and AQAP – only an increase in vigilance and crackdowns on radicalization of social media websites cuts off the key route for training, funding, recruiting, and capabilities of terrorist groups Carmon and Stalinsky 15 (Mr. Carmon is president and founder of the Middle East Media Research Institute. Mr. Stalinsky is the executive director of MEMRI, “Terrorist Use Of U.S. Social Media Is A National Security Threat”, http://www.forbes.com/sites/realspin/2015/01/30/terrorist-use-of-u-s-social-media-is-anational-security-threat/3/, ZS) American companies like Twitter, Facebook, Google, Apple, Microsoft, Yahoo and other popular services, including YouTube, WhatsApp, Skype, Tumblr and Instagram, are facilitating global jihad. This was one of the main subjects of a recent meeting between UK Prime Minister David Cameron and President Obama focusing on cybersecurity and counterterrorism. The president stated, “Social media and the Internet is the primary way in which these terrorism organizations are communicating” and that “we’re still going to have to find ways to make sure that if an AlQaeda affiliate is operating in Great Britain or in the United States, that we can try to prevent real tragedy. And I think the companies want to see that as well. They’re patriots… we’re also going to be in dialogue with the companies to try to make that work.” This follows Robert Hannigan, the U.K.’s Director of the Government Communications Headquarters describing “the largest U.S. technology companies” as “the command-and-control networks of choice for terrorists” in The Financial Times last November. Mr. Hannigan said out loud what for too long too few have: For almost a decade, these companies have helped Al-Qaeda, and are now helping ISIS to fundraise, recruit, indoctrinate, and train new terrorists. Nearly every day brings more news of the arrest of young Westerners for terror activity, planning attacks, or attempting to travel to the Middle East to join a terror organization. ISIS has grasped the effectiveness of social media U.S. social media companies are at the center of each of these cases. ISIS has grasped the effectiveness of social media, culminating in its strategic decision to show the beheading of American journalist James Foley on August 19. It first uploaded the video to YouTube and tweeted a graphic blow-by-blow series of stills showing the knife cutting his throat, the removal of his head, and the placement of his severed head on his lifeless body. This act created an earthquake on social media, as thousands of these tweets went viral. The following day, Twitter CEO, Dick Costolo, tweeted, “We have been and are actively suspending accounts as we discover them related to this graphic imagery.” But the release of the videos of ISIS’s next four beheadings of Americans and Britons were all announced via Twitter—with more graphic images of the beheadings and their aftermath—belying his claim. Furthermore, four months later, the number of graphic jihadi tweets of beheadings and executions is at its peak. Most recently, on January 20, ISIS sent via Twitter an embedded YouTube video featuring Jihadi John, the apparent beheader in its previous videos, threatening to kill two Japanese hostages unless the Japanese government paid a ransom of $200 million within 72 hours. Government should be asking company heads why they aren’t doing more “Why aren’t YouTube, Facebook, and Twitter doing more to stop terrorists from inciting violence?” MSNBC host Ronan Farrow asked in the title of his July 10, 2014 Washington Post op-ed. This is precisely the question that U.S. government officials should be asking the heads of these companies. Farrow also noted that “these companies already know how to police and remove content that violates other laws. Every major social media network employs algorithms that automatically detect and prevent the posting of child pornography. Many, including YouTube, use a similar technique to prevent copyrighted material from hitting the web. Why not, in those overt cases of beheading videos and calls for blood, employ a preventive similar system?” Asked about terrorists’ use of YouTube in a May 2013 CNN interview, Google executive chairman Eric Schmidt claimed: “If there were an algorithm to detect terrorists, trust me, we would use it.” But Google is quite capable of identifying and removing content from its search engine using its algorithms—and has done so on numerous occasions. But why should national security be “entrusted” to Google employees anyway? What are their qualifications to determine what could threaten the lives of Americans? Those who support allowing jihadi content on social media state that such content should be left alone because of its intelligence value. In an October 9 Washington Post op-ed titled “We Shouldn’t Stop Terrorists From Tweeting,” Daniel Byman and Jeremy Shapiro of The Brookings Institute defended Twitter for allowing and not removing jihadi content: “[B]anning particular sites or individuals may make sense if the risk of recruitment and radicalization is high. But those risks have to be weighed against the intelligence value of having groups such as the Islamic State active on social media…” Such an approach is flawed. One can hardly imagine the development of the global jihad movement without the Internet. An entire generation of Muslim youth has been and continues to be radicalized online by violent images and incitements to murder. Recruitment numbers are swelling today because for too long nothing was done to stem the flow of this jihadi content hosted by these services. And, consider that jihadis who post this content are fully aware that it is being monitored by Western security agencies; the argument that allowing them to continue to use these platforms on the chance that their accounts could yield significant intelligence is simply naive. The rebuttal to this being that the government shouldn’t be relying solely on social media for its intelligence gathering. A growing threat to national security Another reminder of the free rein afforded to jihadis online was a January 10 New York Times headline soon after the Paris attacks: “Jihadists and Supporters Take To Social Media To Praise Attack On Charlie Hebdo.” The next day, justice and interior ministers of 12 European countries, including the U.K., France and Germany, issued a joint statement expressing concerns about the Internet being used by terrorists, and calling for tech companies to do more to deal with this issue. On January 12, in further evidence of the growing threat to national security posed by Al-Qaeda’s, ISIS’, and other groups’ cyber jihad activity, pro-ISIS hackers broke into the Twitter and YouTube accounts of U.S. Central Command – CENTCOM – leaking documents and information and live-tweeting as they went. “With the Sony attack that took place, with the Twitter account that was hacked by Islamist jihadist sympathizers yesterday, it just goes to show how much more work we need to do, both public and private sector, to strengthen our cybersecurity,” President Obama warned the following day. Gen. Jack Keane (ret.), former U.S. Army Vice Chief of Staff, understands the strategic importance Al-Qaeda, ISIS, and other jihadi groups place on the use of social media and the damage done by leaving it undisrupted. He stated on Fox News on October 23: “…I think we should clearly appeal to the hosts who are running Twitter, Facebook, the various websites, and shut these things down.” Time for Congress to catch up to terrorist use of the Internet and create and enforce new laws to address this problem The new Congress and the Obama administration should make this issue a priority in 2015. The long-overdue first step in doing so would be summoning the heads of social media companies and having them clarify what exactly their policies are. Solutions could require examination by constitutional law experts, and might need to go all the way to the Supreme Court. There are several clear models for U.S. policy makers to follow which European governments recently have begun to implement. On October 8, the European Commission, with ministers from all 28 EU member states, summoned major U.S. technology companies to a “private” meeting in Luxembourg on terrorist use of the Internet, against the backdrop of the “flow of so-called foreign fighters” as well as “calls for electronic jihad that the E.U. is facing.” The meeting’s goal was to come up with a plan for these companies to stop online radicalization on their websites. It is difficult to understand why no one in the U.S. government has taken similar action yet. These companies should be questioned in a transparent framework, and must commit to tackling the problem of eradicating violent jihadi content from their platforms. It is time for the government to catch up to terrorist use of the Internet and create and enforce new laws to address this problem. The removal of a handful of YouTube videos, Twitter accounts, and Facebook pages is hardly a serious solution. Politics Links 1nc Plan drains PC – link only goes one way – ratchet effect makes repealing current (programs/laws/authorizations) unique - – inertia and terrorism fears outweigh, strong political support only sparks bigger fight Givens, 13 -- Austen, Prof Cybersecurity @ Utica College, Harvard National Security Journal, July, http://harvardnsj.org/2013/07/the-nsa-surveillance-controversy-how-the-ratchet-effect-can-impact-anti-terrorism-laws/ The NSA Surveillance Controversy: How the Ratchet Effect Can Impact Anti-Terrorism Laws On June 5, 2013, the world learned that the National Security Agency (NSA), America’s largest intelligence-gathering organization, had been gathering the metadata of all the phone calls made by Verizon customers since early April 2013. The next day, two prominent newspapers reported that PRISM, a top secret NSA program, had been vacuuming up customer data from some of the world’s largest and best known information technology (IT) firms—including Google, Apple, Facebook, and Microsoft—directly from their servers. Director of National Intelligence James Clapper later clarified that specific requests for customer data from these IT firms were subject to tight legal controls and only targeted non-US citizens. But Clapper’s comments outcry ensued, with some loudly opposing the NSA’s surveillance programs and others forcefully defending them. The New York Times condemned the NSA surveillance in an did little to calm frayed nerves. A public editorial and the American Civil Liberties Union (ACLU) filed a lawsuit against the NSA, challenging the constitutionality of the NSA telephone call metadata collection program. Former Vice President Al Gore called the surveillance “obscenely outrageous” on Twitter. But others came out in support of the NSA’s efforts. Senator Lindsay Graham said “I am a Verizon customer…it doesn’t bother me one bit for the NSA to have my phone number.” Max Boot, a senior fellow with the think tank Council on Foreign Relations, credited the NSA surveillance with helping to reduce the number of terrorist incidents on US soil since the attacks of September 11, 2001. A Pew Research Center poll suggested that there was significant support among the American public for the NSA’s surveillance efforts. Despite the heated rhetoric on both sides of the surveillance debate, the NSA’s collection of telephone call metadata appears to be legal based upon the Foreign Intelligence Surveillance Court’s (FISC) interpretation of section 215 of the USA PATRIOT Act. Perhaps the most interesting remarks about the NSA controversy thus far came from Representative Jim Sensenbrenner, one of the original authors of the USA PATRIOT Act. He wrote that when the Act was first drafted, one of the most controversial provisions concerned the process by which government agencies obtain business records for intelligence or law enforcement purposes. Sensenbrenner stated that particular provision of the Act requires government lawyers to prove to the FISC that a request for specific business records is linked to an “authorized investigation” and further stated that “targeting US citizens is prohibited” as part of the request. Sensenbrenner argued that the NSA telephone metadata collection is a bridge too far and falls well outside the original intended scope of the Act: “[t]he administration claims authority to sift through details of our private lives because the Patriot Act says that it can. I disagree. I authored the Patriot Act, and this [NSA surveillance] is an abuse of that law.” Acknowledging that Sensenbrenner’s statements may have been motivated in part by political interests, the perceived creeping surveillance controversy—is consistent with what is known as the “ratchet effect” in legal scholarship. The ratchet effect is a unidirectional change in some legal variable that can become entrenched over time, setting in motion a process that can then repeat itself indefinitely.[1] For example, some scholars argued that antiterrorism laws tend to erode civil liberties and establish a new baseline of legal “normalcy” from which further extraordinary measures spring in future crises.[2] This process is consistent with the ratchet effect, for it suggests a “stickiness” in anti-terrorism laws that makes it harder to scale back or reverse their provisions. Each new baseline of legal normalcy represents a new launching pad for additional future anti-terrorism measures. There is not universal consensus on whether or not the ratchet effect is expansion of the USA PATRIOT Act—the “abuse” that Sensenbrenner describes in the context of the NSA real, nor on how powerful it may be. Posner and Vermeule call ratchet effect explanations “methodologically suspect.”[3] They note that accounts of the ratchet effect often ring hollow, for they “fail to supply an explanation of such a process…and if there is such a mechanism [to cause the ratchet effect], it is not clear that the resulting ratchet process is bad.”[4] I argue that the recent controversy surrounding the NSA’s intelligence collection efforts underscores the relevance of the ratchet effect to scholarly discussions of anti-terrorism laws. I do not seek to prove or disprove that the recent NSA surveillance controversy illustrates the ratchet effect at work, nor do I debate the potential strength or weakness of the ratchet effect as an explanation for the staying power or growth of anti-terrorism laws. As Sensenbrenner’s recent comments make clear, part of the original intent of the USA PATRIOT Act appears to have been lost in interpretation. It is reasonable to suggest that future anti-terrorism laws may suffer a similar fate. Scholars can therefore benefit from exploring how the USA PATRIOT Act took shape and evolved, and why anti-terrorism laws can be difficult to unwind. Colorblindness Kritik 1nc First, the affirmative’s reaction to NSA surveillance is a product of white privilege. The abuses they’re outraged with aren’t exceptions to the rule; they are the rule. Wise 13 — Timothy J. Wise, anti-racist activist and writer, holds a B.A. in Political Science from Tulane University, 2013 (“Whiteness, NSA Spying and the Irony of Racial Privilege,” Tim Wise’s blog, June 19th, Available Online at http://www.timwise.org/2013/06/whiteness-nsa-spying-andthe-irony-of-racial-privilege/, Accessed 02-17-2015) The idea that with this NSA program there has been some unique blow struck against democracy, and that now our liberties are in jeopardy is the kind of thing one can only believe if one has had the luxury of thinking they were living in such a place, and were in possession of such shiny baubles to begin with. And this is, to be sure, a luxury enjoyed by painfully few folks of color, Muslims in a post-9/11 America, or poor people of any color. For the first, they have long known that their freedom was directly constrained by racial discrimination, in housing, the justice system and the job market; for the second, profiling and suspicion have circumscribed the boundaries of their liberties unceasingly for the past twelve years; and for the latter, freedom and democracy have been mostly an illusion, limited by economic privation in a class system that affords less opportunity for mobility than fifty years ago, and less than most other nations with which we like to compare ourselves. In short, when people proclaim a desire to “take back our democracy” from the national security apparatus, or for that matter the plutocrats who have ostensibly hijacked it, they begin from a premise that is entirely untenable; namely, that there was ever a democracy to take back, and that the hijacking of said utopia has been a recent phenomenon. But there wasn’t and it hasn’t been. Second, their colorblind policy analysis perpetuates racism and inequality. Wise 10 — Timothy J. Wise, anti-racist activist and writer, holds a B.A. in Political Science from Tulane University, 2010 (“With Friends Like These, Who Needs Glenn Beck? Racism and White Privilege on the Liberal-Left,” Tim Wise’s blog, August 17th, Available Online at http://www.timwise.org/2010/08/with-friends-like-these-who-needs-glenn-beck-racism-andwhite-privilege-on-the-liberal-left/, Accessed 02-17-2015) Liberal Colorblindness and the Perpetuation of Racism By “liberal colorblindness” I am referring to a belief that although racial disparities are certainly real and troubling — and although they are indeed the result of discrimination and unequal opportunity — paying less attention to color or race is a progressive and open-minded way to combat those disparities. So, for instance, this is the type of colorblind stance often evinced by teachers, or social workers, or folks who work in non-profit service agencies, or other “helping” professions. Its embodiment is the elementary school teacher who I seem to meet in every town to which I travel who insists “they never even notice color” and make sure to treat everyone exactly the same, as if this were the height of moral behavior and the ultimate in progressive educational pedagogy. But in fact, colorblindness is exactly the opposite of what is needed to ensure justice and equity for persons of color. To be blind to color, as Julian Bond has noted, is to be blind to the consequences of color, “and especially the consequences of being the wrong color in America.” What’s more, when teachers and others resolve to ignore color, they not only make it harder to meet the needs of the persons of color with whom they personally interact, they actually help further racism and racial inequity by deepening denial that the problem exists, which in turn makes the problem harder to solve. To treat everyone the same — even assuming this were possible — is not progressive, especially when some are contending with barriers and obstacles not faced by others. If some are dealing with structural racism, to treat them the same as white folks who aren’t is to fail to meet their needs. The same is true with women and sexism, LGBT folks and heterosexism, working-class folks and the class system, persons with disabilities and ableism, right on down the line. Identity matters. It shapes our experiences. And to not recognize that is to increase the likelihood that even the well-intended will perpetuate the initial injury. Third, their decision to highlight NSA surveillance instead of ongoing, ubiquitous violence against people of color perpetuates white supremacy. This outweighs the case. Wise 13 — Timothy J. Wise, anti-racist activist and writer, holds a B.A. in Political Science from Tulane University, 2013 (“Whiteness, NSA Spying and the Irony of Racial Privilege,” Tim Wise’s blog, June 19th, Available Online at http://www.timwise.org/2013/06/whiteness-nsa-spying-andthe-irony-of-racial-privilege/, Accessed 02-17-2015) So yeah, the government is spying on you precious. And now you’re pissed? This is the irony of privilege: the fact that some have for so long enjoyed it, in its largely unfettered state, is precisely why some of those those same persons are now so exorcised at the thought of potentially being treated like everyone else has been, forever; and it is also why the state was able to get away with it for such an extended period. So long as the only possible targets were racial and religious and class others, shock and outrage could be kept at a minimum. And so the apparatus of profiling and monitoring and snooping and data collection and even targeted assassination grew like mushrooms in the dark. And deep down, most of the same white folks who are now so unhinged by the mere possibility — and a remote one at that — that they will be treated like those others, knew what was going on. And they said little or nothing. White liberals — with some notable exceptions — mostly clucked their tongues and expressed how unfortunate it was that certain people were being profiled, but they rarely spoke out publicly, or challenged those not-so-random searches at the airport, or dared to challenge cops when they saw them harassing, or even brutalizing the black and brown. Plenty of other issues were more pressing. The white conservatives, of course, largely applauded either or both of those. And now, because they mostly ignored (or even in some cases cheered) the violations of Constitutional rights, so long as the violations fell upon someone other than themselves, they are being freshly confronted with the surly adolescent version of the infant to which they gave birth, at least indirectly. And they aren’t too happy with his insolence. Yeah, well, tell it to pretty much every Arab American, every Persian American, every Afghan American, everyone with a so-called Middle Eastern name walking through an airport in this country for the past decade or more. Tell them how now you’re outraged by the idea that the government might consider you a potential terrorist. Tell it to the hundreds of thousands of black men in New York, stopped and frisked by the NYPD over the past fifteen years, whose names and information were entered into police databases, even though they had committed no crime, but just as a precautionary measure, in case they ever decided to commit one. Tell them how tight it makes you to be thought of as a potential criminal, evidence be damned. Tell it to brown folks in Arizona, who worry that the mere color of their skin might provoke a local official, operating on the basis of state law (or a bigoted little toad of a sheriff), to stop them and force them to prove they belong in the country. Explain to them how patently offensive and even hurtful it is to you to be presumed unlawful in such a way as to provoke official government suspicion. Tell it to the veterans of the civil rights struggle whose activities — in the Black Panthers, SNCC, the Young Lords, the Brown Berets, and the American Indian Movement, among others — were routinely monitored (and more to the point actively disrupted and ripped apart) by government intelligence agencies and their operatives. Tell them how incredibly steamed you are that your government might find out what websites you surf, or that you placed a phone call last Wednesday to someone, somewhere. Make sure to explain how such activities are just a step away from outright tyranny and surely rank up there alongside the murder and imprisonment to which their members were subjected. Indeed. And then maybe, just maybe, consider how privilege — being on the upside, most of the time, of systems of inequality — can (and has) let you down, even set you up for a fall. How maybe, just maybe, all the apoplexy mustered up over the NSAs latest outrage, might have been conjured a long time ago, and over far greater outrages, the burdens of which were borne by only certain persons, and not others. Finally, the alternative is to react with indifference to NSA surveillance. Yes, these abuses are bad. But they’re just more of the same in a country that is not and has never been free for people of color. Wise 13 — Timothy J. Wise, anti-racist activist and writer, holds a B.A. in Political Science from Tulane University, 2013 (“Whiteness, NSA Spying and the Irony of Racial Privilege,” Tim Wise’s blog, June 19th, Available Online at http://www.timwise.org/2013/06/whiteness-nsa-spying-andthe-irony-of-racial-privilege/, Accessed 02-17-2015) It’s not that I’m not angry. It’s not that I’m not disturbed, even horrified by the fact that my government thinks it appropriate to spy on people, monitoring their phone calls — to whom we speak and when — among other tactics, all in the supposed service of the national interest. That any government thinks it legitimate to so closely monitor its people is indicative of the inherent sickness of nation-states, made worse in the modern era, where the power to intrude into the most private aspects of our lives is more possible than ever, thanks to the datagathering techniques made feasible by technological advance. That said, I also must admit to a certain nonchalance in the face of the recent revelations about the National Security Agency’s snooping into phone records, and the dust-up over the leaking of the NSA’s program by Ed Snowden. And as I tried to figure out why I wasn’t more animated upon hearing the revelations — and, likewise, why so many others were — it struck me. Those who are especially chapped about the program, about the very concept of their government keeping tabs on them — in effect profiling them as potential criminals, as terrorists — are almost entirely those for whom shit like this is new: people who have never before been presumed criminal, up to no good, or worthy of suspicion. In short, they are mostly white. And male. And middle-class or above. And most assuredly not Muslim. And although I too am those things, perhaps because I work mostly on issues of racism, white privilege and racial inequity — and because my mentors and teachers have principally been people of color, for whom things like this are distressingly familiar — the latest confirmation that the U.S. is far from the nation we were sold as children is hardly Earth-shattering. After all, it is only those who have had the relative luxury of remaining in a child-like, innocent state with regard to the empire in which they reside who can be driven to such distraction by something that, compared to what lots of folks deal with every day, seems pretty weak tea. As Yasuragi, a blogger over at Daily Kos reminded us last week: (This is) the nation that killed protesters at Jackson and Kent State Universities…The nation that executed Fred Hampton in his bed, without so much as a warrant. The nation that still, still, still holds Leonard Peltier in prison. The nation that supported Noriega, the Shah, Trujillo, and dozens of other fascist monsters who did nothing but fuck over their own people and their neighbors. The nation of Joseph McCarthy and his current-day descendants. The nation that allows stop-and-frisk. Before all that: The nation that enforced Jim Crow laws. Before that, the nation that built itself on slavery and the slave trade. And before all of that, the nation that nearly succeeded in the genocide of this continent’s indigenous peoples. So why are you so surprised that our government is gathering yottabytes of data on our phone calls? Let’s be clear, it’s not that the NSA misdeeds, carried out by the last two administrations, are no big deal. They’re completely indefensible, no matter the efforts of the apologists for empire — from the corporate media to President Obama to Dick Cheney — to legitimize them. A free people should not stand for it. Problem is, we are not a free people and never have been, and therein lies the rub. Afro-Pessimism 1nc The only ethical demand is one that calls for the end of the world itself – the system of violent antagonisms means solving for contingent violence only reifies white supremacy and the liberal biopolitical state Wilderson 10, Frank B Wilderson is a professor at UC Irvine, “Red, White, and Black: Cinema and Structure of US Antagonisms,” NN Leaving aside for the moment their state of mind, it would seem that the structure, that is to say the rebar, or better still the grammar of their demands—and, by extension, the grammar of their suffering—was indeed an ethical grammar. Perhaps their grammars are the only ethical grammars available to modern politics and modernity writ large, for they draw our attention not to the way in which space and time are used and abused by enfranchised and violently powerful interests, but to the violence that underwrites the modern world’s capacity to think, act, and exist spatially and temporally. The violence that robbed her of her body and him of his land provided the stage upon which other violent and consensual dramas could be enacted. Thus, they would have to be crazy, crazy enough to call not merely the actions of the world to account but to call the world itself to account, and to account for them no less! The woman at Columbia was not demanding to be a participant in an unethical network of distribution: she was not demanding a place within capital, a piece of the pie (the demand for her sofa notwithstanding). Rather, she was articulating a triangulation between, on the one hand, the loss of her body, the very dereliction of her corporeal integrity, what Hortense Spillers charts as the transition from being a being to becoming a “being for the captor” (206), the drama of value (the stage upon which surplus value is extracted from labor power through commodity production and sale); and on the other, the corporeal integrity that, once ripped from her body, fortified and extended the corporeal integrity of everyone else on the street. She gave birth to the commodity and to the Human, yet she had neither subjectivity nor a sofa to show for it. In her eyes, the world—and not its myriad discriminatory practices, but the world itself—was unethical. And yet, the world passes by her without the slightest inclination to stop and disabuse her of her claim. Instead, it calls her “crazy.” And to what does the world attribute the Native American man’s insanity? “He’s crazy if he thinks he’s getting any money out of us”? Surely, that doesn’t make him crazy. Rather it is simply an indication that he does not have a big enough gun. What are we to make of a world that responds to the most lucid enunciation of ethics with violence? What are the foundational questions of the ethico-political? Why are these questions so scandalous that they are rarely posed politically, intellectually, and cinematically—unless they are posed obliquely and unconsciously, as if by accident? Return Turtle Island to the “Savage.” Repair the demolished subjectivity of the Slave. Two simple sentences, thirteen simple words, and the structure of U.S. (and perhaps global) antagonisms would be dismantled. An “ethical modernity” would no longer sound like an oxymoron. From there we could busy ourselves with important conflicts that have been promoted to the level of antagonisms: class struggle, gender conflict, immigrants rights. When pared down to thirteen words and two sentences, one cannot but wonder why questions that go to the heart of the ethico-political, questions of political ontology, are so unspeakable in intellectual meditations, political broadsides, and even socially and politically engaged feature films. Clearly they can be spoken, even a child could speak those lines, so they would pose no problem for a scholar, an activist, or a filmmaker. And yet, what is also clear—if the filmographies of socially and politically engaged directors, the archive of progressive scholars, and the plethora of Left-wing broadsides are anything to go by—is that what can so easily be spoken is now (five hundred years and two hundred fifty million Settlers/Masters on) so ubiquitously unspoken that these two simple sentences, these thirteen words not only render their speaker “crazy” but become themselves impossible to imagine. Soon it will be forty years since radical politics, Left-leaning scholarship, and socially engaged feature films began to speak the unspeakable. In the 1960s and early 1970s the questions asked by radical politics and scholarship were not “Should the U.S. be overthrown?” or even “Would it be overthrown?” but rather when and how—and, for some, what—would come in its wake. Those steadfast in their conviction that there remained a discernable quantum of ethics in the U.S. writ large (and here I am speaking of everyone from Martin Luther King, Jr., prior to his 1968 shift, to the Tom Hayden wing of SDS, to the Julian Bond and Marion Barry faction of SNCC, to Bobbie Kennedy Democrats) were accountable, in their rhetorical the paradigmatic zeitgeist of the Black Panthers, the American Indian Movement, and the Weather Underground. Radicals and progressives could deride, reject, or chastise armed struggle mercilessly and cavalierly with respect to tactics and the possibility of “success,” but they could not dismiss revolution-as-ethic because they could not make a convincing case— by way of a paradigmatic analysis—that the U.S. was an ethical formation and still hope to maintain credibility as radicals and progressives. Even Bobby Kennedy (a U.S. attorney general and presidential candidate) mused that the law and its enforcers had no ethical standing in the presence of Blacks.1 One could (and many did) acknowledge America’s strength and power. This seldom, however, rose to the level of an ethical assessment, but rather remained an assessment of the so-called “balance of forces.” The machinations, to political discourse of Blacks, and to a lesser extent Indians, circulated too widely to credibly wed the U.S. and ethics. The raw force of COINTELPRO put an end to this trajectory toward a possible hegemony of ethical accountability. Consequently, the power of Blackness and Redness to pose the question—and the power to pose the question is the greatest power of all—retreated as did White radicals and progressives who “retired” from struggle. The question’s echo lies buried in the graves of young Black Panthers, AIM Warriors, and Black Liberation Army soldiers, or in prison cells where so many of them have been rotting (some in solitary confinement) for ten, twenty, thirty years, and at the gates of the academy where the “crazies” shout at passers-by. Gone are not only the young and vibrant voices that affected a seismic shift on the political landscape, but also the intellectual protocols of inquiry, and with them a spate of feature films that became authorized, if not by an unabashed revolutionary polemic, then certainly by a revolutionary zeitgeist. Is it still possible for a dream of unfettered ethics, a dream of the Settlement and the Slave estate’s destruction, to manifest itself at the ethical core of cinematic discourse, when this dream is no longer a constituent element of political discourse in the streets nor of intellectual discourse in the academy? The answer is “no” in the sense that, as history has shown, what cannot be articulated as political discourse in the streets is doubly foreclosed upon in screenplays and in scholarly prose; but “yes” in the sense that in even the most taciturn historical moments such as ours, the grammar of Black and Red suffering breaks in on this foreclosure, albeit like the somatic compliance of hysterical symptoms—it registers in both cinema and scholarship as symptoms of awareness of the structural antagonisms. Between 1967 and 1980, we could think cinematically and intellectually of Blackness and Redness as having the coherence of full-blown discourses. But from 1980 to the present, Blackness and Redness manifests only in the rebar of cinematic and intellectual (political) discourse, that is, as unspoken grammars. This grammar can be discerned in the cinematic strategies (lighting, camera angles, image composition, and acoustic strategies/design), even when the script labors for the spectator to imagine social turmoil through the rubric of conflict (that is, a rubric of problems that can be posed and conceptually solved) as opposed to the rubric of antagonism (an irreconcilable struggle between entities, or positionalities, the resolution of which is not dialectical but entails the obliteration of one of the positions). In other words, even when films narrate a story in which Blacks or Indians are beleaguered with problems that the script insists are conceptually coherent (usually having to do with poverty or the absence of “family values”), the non-narrative, or cinematic, strategies of the film often disrupt this coherence by posing the irreconcilable questions of Red and Black political ontology—or non-ontology. The grammar of antagonism breaks in on the mendacity of conflict. Semiotics and linguistics teach us that when we speak, our grammar goes unspoken. Our grammar is assumed. It is the structure through which the labor of speech is possible. Likewise, the grammar of political ethics—the grammar of assumptions regarding the ontology of suffering—which underwrite Film Theory and political discourse (in this book, discourse elaborated in direct relation to radical action), and which underwrite cinematic speech (in this book, Red, White, and Black films from the mid-1960s to the present) is also unspoken. This notwithstanding, film theory, political discourse, and cinema assume an ontological grammar, a structure of suffering. And the structure of suffering which film theory, political discourse, and cinema assume crowds out other structures of suffering, regardless of the sentiment of the film or the spirit of unity mobilized by the political discourse in question. To put a finer point on it, structures of ontological suffering stand in antagonistic, rather then conflictual, relation to one another (despite the fact that antagonists themselves may not be aware of the ontological positionality from which they speak). Though this is perhaps the most controversial and out-of-step claim of this book, it is, nonetheless, the foundation of the close reading of feature films and political theory that follows. Blackness is always already hyper visible – the affirmative misses the point – some bodies will never have the access to anonymity because of the black aesthetic – the affirmative allows for whiteness to remain invisible and renders blackness as an attractor to violence Yancy 13, George Yancy is a professor of philosophy at McAnulty College who focuses primarily on issues of social justice, “Walking While Black in the ‘White Gaze’” http://opinionator.blogs.nytimes.com/2013/09/01/walking-while-black-in-the-white-gaze/?_r=0, NN My point here is to say that the white gaze is global and historically mobile. And its origins, while from Europe, are deeply seated in the making of America.∂ Black bodies in America continue to be reduced to their surfaces and to stereotypes that are constricting and false, that often force those black bodies to move through social spaces in ways that put white people at ease. We fear that our black bodies incite an accusation. We move in ways that help us to survive the procrustean gazes of white people. We dread that those who see us might feel the irrational fear to stand their ground rather than “finding common ground,” a reference that was made by Bernice King as she spoke about the legacy of her father at the steps of the Lincoln Memorial.∂ The white gaze is also hegemonic, historically grounded in material relations of white power: it was deemed disrespectful for a black person to violate the white gaze by looking directly into the eyes of someone white. The white gaze is also ethically solipsistic: within it only whites have the capacity of making valid moral judgments.∂ Even with the unprecedented White House briefing, our national discourse regarding Trayvon Martin and questions of race have failed to produce a critical and historically conscious discourse that sheds light on what it means to be black in an anti-black America. If historical precedent says anything, this failure will only continue. Trayvon Martin, like so many black boys and men, was under surveillance (etymologically, “to keep watch”). Little did he know that on Feb. 26, 2012, that he would enter a space of social control and bodily policing, a kind of Benthamian panoptic nightmare that would truncate his being as suspicious; a space where he was, paradoxically, both invisible and yet hypervisible.∂ “I am invisible, understand, simply because people [in this case white people] refuse to see me.” Trayvon was invisible to Zimmerman, he was not seen as the black child that he was, trying to make it back home with Skittles and an iced tea. He was not seen as having done nothing wrong, as one who dreams and hopes.∂ As black, Trayvon was already known and rendered invisible. His childhood and humanity were already criminalized as part of a white racist narrative about black male bodies. Trayvon needed no introduction: “Look, the black; the criminal!” Blackness operates on an ontological register – it is impossible to make blackness acceptable within civil society Yancy 08, George Yancy is a professor of philosophy at McAnulty College who focuses primarily on issues of social justice, “Black Bodies, White Gazes: The Continuing Significance of Race “ https://books.google.com/books?id=VQAfAAAAQBAJ&pg=PA21&lpg=PA21&dq=%22On+the+elevator,+ my+Black+body+is+ontologically+mapped,+its+coordinates+lead+to+that+which+is+always+immediately %22&source=bl&ots=11lq3QEyJG&sig=m116eKlVHrBtPWmV9AOYb9v0fZU&hl=en&sa=X&ved=0CCAQ 6AEwAGoVChMI7uOluGUxgIVhz2MCh0F3gf2#v=onepage&q=%22On%20the%20elevator%2C%20my%20Black%20body% 20is%20ontologically%20mapped%2C%20its%20coordinates%20lead%20to%20that%20which%20is%2 0always%20immediately%22&f=false, NN On the elevator, my Black body is ontologically mapped, its cordinates lead to that which is always immediately visible: the Black surface. The point here is that the Black body in relation to the white gam appears in the form of a sheer exteriority, implying that the Black body "shows up," makes itself known M terms of its Black surface. There is only the visible, the concrete, the seen, all there, all at once: a single Black thing, =individuated, threatening, ominous, Black. The white woman thinks she takes no part in this construction: she acts the name of the serious... She apparently fails to see how he identity is shot through in terms of how she construe. me. This failure is to be expected given how white privilege renders invisible, indeed, militates against the recognition of various whitely ways of being-in-the-world. Sullivan notes that the 'habits of white privilege do not merely go noticed. They actively thwart the process of conscious reflation on them, which allows them to seem non-existent even as they continue to function..l. Reform is just reactionary conservatism – their unwillingness to accept that systemic antagonisms cannot be fixed means their project is permeated with whiteness Haritaworn et al. 14, Haritaworn is an assistant professor of sociology, “Queer Necropolitics,” http://www.deanspade.net/wpcontent/uploads/2014/05/Necropolitics-Collection-Article-Final.pdf, NN Critical race theorists have supplied the concept of 'preservation through∂ transformation' to describe the neat trick that civil rights law performed in this∂ dynamic (Harris 2007: 1539-1582; Siegel1997: 1111-1148). In the face of∂ significant resistance to conditions of subjection, law reform tends to provide just∂ enough transfonnation to stabilize and preserve status quo conditions. In the case∂ of widespread black rebellion against white supremacy in the US, civil rights law∂ and colourblind constitutionalism have operated as formal reforms that masked a∂ pe11wtuation of the status quo of violence against and exploitation of black people.∂ Explicit exclusionary policies and practices became officially forbidden, yet the∂ disu·ibution of life chances remained the same or worsened with the growing∂ racialized concentration of wealth in the US, the dismantling of social welfare, and∂ the explosion of criminalization that has developed in the same period as the new∂ logic of race neutrality has declared fairness and justice achieved. Lesbian and gay∂ rights politics' reproduction of the Inythology of antidiscrimination law and the∂ non-stop invocation of'equal rights' frameworks by lesbian and gay rights politics∂ marks an .investment in the legal structures of anti-blackness that have emerged in∂ the wake of Brown. The emergence of the demand for LGBT inclusive hate crime∂ laws and the accomplishment of the Matthew Shepard and james Byrd, Jr. Hate∂ Crimes Prevention Act as a highly lauded federal legislative 'win' for lesbian and ∂ gay rights offers a particularly blatant site of the anti-blackness central to lesbian∂ and gay rights -literally an investment in the expansion ofcriminalization as a core∂ claim and desire of this purported 'frecdom'. 9 In the context of the foundational∂ nature of slavery in US political formation, it is perhaps not surprising to see a∂ political formation of white 'gay and lesbian Americans' articulate a demand fOr∂ fi-eedom that is contingent on the literal caging of black people.∂ The fantasy that fOrmal legal equality is all that is needed to eliminate∂ homophobia and transphobia is harmfUl not only because it participates in the antiblack∂ US progress narrative that civil rights law reforms resolved anti-blackness in∂ the US (thus any remaining suffering or disparity is solely an issue of 'personal∂ responsibility'), 1IJ but also because it constructs an agenda that is harmful to black∂ queer and trans people and other queer and trans people experiencing violent∂ systems mobilized by anti-blackness. Formal marriage rights will not help poor∂ people, people vvhose kids will be stolen by a racially targeted child welfire system∂ regardless of whether or not they can get married, people who do not have∂ immigration status or health benefits to share with a spouse if they had one, people∂ who have no property to pass on to their partners, or people who have no need to∂ be shielded from estate tax. In fact, the current wave of same-sex marriage advocacy∂ emerges at the same rime as another pro-marriage trend, the push by the right wing∂ to reverse feminist wins that had made marriage easier to get out of and the Bushera∂ development of marriage promotion programmes (continued by Obama)∂ targeted at women on welfare (Adams and Coltrane 2007: 17-34; Alternatives to∂ l\!larriage Project 2007; Coltrane and Adams 2003: 363-372; Feld, Rosier and∂ Manning 2002: 173-183; Pear and Kirkpatrick 2007; Rector and Pardue 2004).∂ The explicitly anti-black focus of the attacks on welfare and the mobilization of∂ racialized-genclered images to do this go hand in hand with the pro-marriage gay∂ rights frame that similarly invests in notions of 'personal responsibility', and∂ racializecl-gendered family formation norm enforcement. The articulation of a∂ desire for legal inclusion in the explicitly anti-black, anti-poor governance regime∂ of marriage, and the centralization of marriage rights as the most resourced equality∂ claim of gay and lesbian rights politics, affirms its alliance with anti-blackness.∂ It is easy to imagine other queer political interventions that would take a∂ different approach to concerns about parental rights, child custody and other∂ family law problems. Such approaches centre the experiences of queers facing the∂ worst violence of family law, those whose problems -will not be resolved by samesex∂ marriage parents in prison, parents facing deportation, parents with∂ disabilities, youth in foster care and juvenile punishment systems, parents whose∂ children have been removed because of 'neglect' clue to their poverty. The choice∂ of seeking marriage rights, like the choice to pursue hate crime laws rather than∂ decriminalization, the choice to pursue the Uniting American Families Act 11∂ rather than opposing immigration enforcement and the war on terror, the choice∂ to pursue military service rather than demilitarization, is a choice to pursue a place∂ fOr white gay and lesbian people in constitutively anti-black legal structures. Racial equality under the law is not only impossible but the attempts to re-create and shift the puzzle pieces of civil society mean slavery is reinvented in different ways Woan 11, Master of Arts in Philosophy, Politics, and Law in the Graduate School of Binghamton University, “The value of resistance in a permanently white, civil society,” http://gradworks.umi.com/14/96/1496586.html NN Stokely Carmichael and Charles V. Hamilton, in then influential Black Power, describe reformist strategies as "playing ball" with the white man. They argue that reform plays the white man's game in order to gain rights, i.e. appeal to a white supremacist government that is the precise agent responsible for the original harms they are seeking to alleviate.9 While this may very well result in the granting of new rights previously denied, it maintains a hierarchical system between whites and nonwhites, since the latter will have to continue to appeal to the former to ask for rights they never should have been denied in the first place. This places the former in a position of power to accept or deny such requests. Thus, in Carmichael and Hamilton's view, attempting to resist white supremacy by working within white supremacist institutions maintains a dangerous system of power relations that lock in place the hierarchy between whites and nonwhites. / It is unfortunate enough that members of minority groups face public and private racial discrimination. It is worse, however, to place the burden of combating this discrimination on them. What Carmichael and Hamilton aptly point out is that the hierarchy between races mentioned above is what is responsible for this undue burden. There is not only the constant physical struggle of protesting, writing letters, and being dragged through litigation that can often get expensive, but there is the psychological struggle as well. Why am I not worthy of equal protection under the law? Why is it that others do not even notice the disparate impact of the law? Or, even worse, why is it that those who do notice, seem to not care? / What inevitably comes with these types of reformist strategies is an emotional struggle, namely, an inferiority complex that makes the victimized individual stop and wonder — who put the white man in charge of my body? Appeals to the federal government to repeal discriminatory acts that deny minorities rights becomes analogous to asking whites to eliminate such policies and to allow others access to the same rights they enjoy every day. The racial state becomes in charge of what nonwhites can and cannot do, and when nonwhites continue to go to whites asking them to pass certain policies, nonwhites further legitimate this system of power relations. It is difficult to see how true equality can be achieved wider such a system. / B. Missing the Root Cause: The Racial State / Omi and Winant further support this claim and explain that it is not merely individual policies passed by the United States federal government that are racist, but that racial oppression is a structure of the government itself.10 They describe this structure as the "racial state" to show that the state does not merely support racism, but rather, it supports the concept of race itself. As will be discussed later in this paper, Omi and Winant explain how the state is the agent that has defined race, and that this definition has evolved over time, to maintain the concept of race and support racism. / Given the existence of the racial state, Omi and Winant critique reformist strategies as falling short of achieving normative goals of eliminating racism since the reforms merely get re-equilibriated. A look at the history of racial victories in the United States further supports this critique. Racial victories for one minority were often made possible only with the entrapment of another racial minority. For example, while many celebrate the racial victory of the 1954 Brown v. Board decision, many fail to see this happened the same year as Operation Wetback, which shifted the racial discrimination to a different population, removing close to one million illegal immigrants, mostly Mexicans, from the United States.11 Moreover, soon after the ratification of the Fourteenth and Fifteenth Amendments granting citizenship and suffrage to Blacks. Congress chose to deny citizenship to Chinese immigrants.12 In 1941, shortly after the establishment of the Committee on Fair Employment Practices permitted Blacks into defense industries, Japanese Americans were taken from their homes and sent off to internment camps. Pei-te Lien argues that all of these "coincidences" support critiques of reformist strategies that merely target individual policies, since without challenging the racial state as a whole, even the elimination of these individual policies will fail to eliminate racism, as they will simply replicate themselves or shift elsewhere and target racial minorities in different ways.14 / C. Separatist Movements / This helps to explain why political activists began adopting other more revolutionary strategies. Contrary to Martin Luther King Jr. and many of his followers during the Civil Rights Movement, the Black Power Movement emerged and began advocating for more separatist strategies that rejected making reformist appeals to the United States federal government. In his speech "The Ballot or the Bullet," Malcolm X argued: / When you take your case to Washington D.C., you're taking it to the criminal who's responsible: it's like miming from the wolf to the fox. They're all in cahoots together. They all work political chicanery and make you look like a chump before the eyes of the world. Here you are walking around in America, getting ready to be drafted and sent abroad, like a tin soldier, and when you get over there, people ask you what you are fighting for, and you have to stick your tongue in your cheek. No, take Uncle Sam to court, take him before the world. / Critics of reformist strategies, such as Malcolm X, understood the United States as being inherently racial and thus incapable of reform. They use the "coincidences" listed above as evidence to support this claim. They view the United States federal government as a racial state that will merely continue to define race in new and more modernized ways, ensuring the permanence of racism with the passage of new policies supporting these definitions. This is why they believe reformists are wrong to attack individual policies, rather than the racial state itself. / For example, the legal enforcement of a racially discriminatory housing covenant may have been justified due to a racist belief that members of the minority race restricted from acquiring title within that neighborhood is inferior to the Caucasian race. More specifically, one might support said covenant because one believes the inferiority of that minority race and the potential they might become your neighbor will result in a decrease in the fair market value of your property. After vigorous ongoing protests from civil rights activists, that particular law enforcing those covenants might get repealed. However, the reason for the repeal of that law might arise not from an ethical epiphany, but rather an economic rationale in which the homeowner is shown his property value will remain unaffected, or perhaps even increase. Thus, that particular act may get repealed, but the policymakers responsible for its original draft will still be in power, and will maintain the same beliefs that motivated that piece of legislation in the first place. Because there has been no ethical realization of the injustice in their conduct, the chances remain high that they will construct new, apparently different but equally discriminatory policies that will force activists to join forces once again and continue the same fight. / This is why it is not the individual policies, but the government itself that is the "preeminent site of racial conflict."17 Omi and Winant's proposal of the "racial state" views the government as "inherently racial," meaning it does not simply intervene in racial conflicts, but it is the locus of racial conflict.18 In addition to structuring conceptions of race, the government in the United States is in and of itself racially structured.19 State policies govern racial politics, heavily influencing the public on how race should be viewed. The ways in which it does so changes over time, often taking on a more invisible nature. For example, Omi and Winant describe the racial state as treating race in different ways throughout different periods of time, first as a biologically based essence, and then as an ideology, etc. These policies are followed by racial remedies offered by government institutions, in response to political pressures and in accordance to these different treatments of race, varying in degree depending on the magnitude of the threats those pressures pose to the order of society. Notable achievements during the Civil Rights Movement have served as a doubleedged sword. While the reformist strategies utilized during that period helped make certain advances possible, it also drove other more overt expressions of racism underground. These more invisible instantiations of racial injustice are far more difficult to identify than its previously more explicit forms. Praising these victories risks giving off the illusion that the fight is over and that racism is a description of the past. / For example, the ratification of the Fifteenth Amendment gave off the illusion that all citizens thereafter had equal access to the right to vote. Those who supported its ratification now felt entitled to the moral credentials necessary to legitimize their ability to express racially prejudiced attitudes.21 For example, voter turnout today remains relatively low for Asian-Americans, and many blame this on cultural differences between Asians and Americans.22 Asian-Americans are labeled as apathetic in the political community and they themselves have been attributed the blame for relatively low representation of Asian-Americans in the government today.23 This however, ignores the way in which other more invisible practices serve to obstruct Asian-Americans from being able to exercise their right to vote. / Research by the United States Election Assistance Commission by the Eagleton Institute of Politics at Rutgers University, for example, indicates that restrictive voter identification requirements have effectively served to disenfranchise Asian Pacific Islanders (APIs) from voting.24 In the 2004 election, researchers found APIs in states where voters were required to present proper identification at the polls were 8.5% less likely to vote.25 This study confirmed that voter ID requirements prevented a large number of APIs from voting.26 / Voter suppression tactics also play a large role in the disenfranchisement of APIs. According to a Voter Intimidation and Vote Suppression briefing paper by Demos, a national public policy center, an estimated 50 Asian Americans were selectively challenged at the polls in Alabama during August of 2004, as being ineligible to vote due to insufficient English-speaking skills.27 Many states have allowed this selective challenging of voters to take place at the polls, resulting in a feeling of fear, intimidation, and embarrassment among APIs, driving them away from the polls. / The danger in treasuring monumental victories such as the ratification of the Fifteenth Amendment becomes apparent when people interpret this ratification as an indication that voting discrimination is no longer a problem, and that if the voter turnout of Asian-Americans is consistently low, it must be because they are politically apathetic or disinterested in American ideals. Because they originally supported the ratification of the amendment, whites can now feel as if they have the moral credentials to make conclusions such as the cultural differences rationale. The same can be seen after courts ordered the desegregation of public schools and after affirmative action programs became more widespread. People began assuming AfricanAmericans now had an equal opportunity for education and that if they did not succeed, it must be a reflection of their intelligence or work-ethic, failing to see the ways the problem has not been solved, but rather disguised itself in other costumes, such as tracking programs in schools or teachers who view their presence as merely "affirmative action babies" and expect them to fail. / One might ask, then, why can we not change the racial state one policy at a time? Perhaps one could first work to gain the right to vote, and then move on to combat discriminatory identification requirements and political scare tactics. It would not seem entirely implausible to assume that the success of individual piecemeal reforms within the government could eventually result in a transformation of the institution itself. However, simply eliminating discriminatory policies is insufficient for an overhaul of a racial institution. / Understanding the motivating reasons for the elimination of individual racist policies is a critical factor in determining the success of a movement. While one justification for passing the Fifteenth Amendment might consist of arguments in favor of equality and exposing racial injustice, another justification might involve maintaining order and minimizing disruption, which is important to the federal government and its ability to run smoothly. Thus, the government often seeks out ways to normalize society through eliminating disruptions to preserve order. When those being denied certain rights grow significantly discontent, they rebel and become disruptions to the functioning of white, civil society. This can take the form of civil disobedience, such as protests, peaceful demonstrations, petitions, letters to the government, etc., or more revolutionary measures, such as damaging government offices or violently harassing officials to acknowledge the injustices and change policy. / All of these measures, however peaceful or violent, disrupt society. A town cannot run smoothly if protesters are filling up the streets or blocking frequently-used road paths, and most certainly cannot run smoothly if town halls are being lit on fire. Thus, in order to return to the desired homeostasis, those in power may often compromise and offer to rectify the situation at hand by granting rights to individuals through changes in legislation in order to appease them and "eliminate" the disruption (the protests, demonstrations, etc.). The lack of effort made towards protecting these rights bolsters Bell's argument that these reforms serve more of a symbolic value rather than functional. If still operating under the racial state, these piecemeal reforms will fail to solve the original racial injustices in the long term, as they will only succeed in establishing a new unstable equilibrium, only to be followed with the replication of new racial problems.28 These new problems will once again create resentment, generate protest, and the cycle will begin to replicate itself, ensuring the permanence of racism. Omi and Winant term this cycle of continuous disruption and restoration of order as the trajectory of racial politics.29 This trajectory supports the treatment of racism as inevitable since even if the racial state mitigates racial disruption over a particular policy and "restores order," another policy based off a new definition of race will emerge triggering another racial disruption, continuing this cycle of racial politics The only option for the slave is to reclaim its own death through self-destruction – the black must become the suicide bomber of civil society and use itself as a weapon to break down white structures – it is the most powerful form of necropower to remain incoherent to the liberal interpretations of the sovereign Sexton 10, Jared Sexton, professor at UC Irvine, “People-of-Color-Blindness: Notes on the Afterlife of Slavery” NN The final object of contemplation in Mbembe’s rewriting of Agam- ben’s rewriting of Foucault’s biopolitics is the fin de siècle figure of resis- tance to the colonial occupation of Palestine: the (presumptively male) suicide bomber. The slave, “able to demonstrate the protean capabilities of the human bond through music and the very body that was supposedly possessed by another,” is thus contrasted subtly with the colonized native, whose “body is transformed into a weapon, not in a metaphorical sense but in a truly ballistic sense” — a cultural politics in lieu of an armed struggle in which “to large extent, resistance and self-destruction are synonymous.”35 Resistance to slavery in this account is self-preservative and forged by way of a demonstration of the capabilities of the human bond, whereas resis- tance to colonial occupation is selfdestructive and consists in a demonstra- tion of the failure of the human bond, the limits of its protean capabilities. One could object, in an empiricist vein, that the slave too resists in ways that are quite nearly as self-destructive as an improvised explosive device and that the colonial subject too resists through the creation and perfor- mance of music and the stylization of the body, but that would be to miss the symptomatic value of Mbembe’s theorization.¶ Mbembe describes suicide bombing as being organized by “two apparently irreconcilable logics,” “the logic of martyrdom and the logic of survival,” and it is the express purpose of the rubric of necropolitics to meditate upon this unlikely logical convergence.36 However, there is a discrepancy at the heart of the enterprise. Rightly so, the theorization of necropolitics as a friendly critique of Agamben’s notion of bare life involves an excursus on certain “repressed topographies of cruelty,” including, first of all, slavery, in which “the lines between resistance and suicide, sacri- fice and redemption, martyrdom and freedom become blurred.”37 Yet, as noted, the logic of resistance-as-suicide-as-sacrifice-as-martyrdom is for Mbembe epitomized by the presumptively male suicide bomber at war with colonial occupation, “the most accomplished form of necropower” in the contemporary world, rather than Hartman’s resistant female slave, Celia, engaged in close-quarters combat with the sexual economy of slave society,¶ “the emblematic and paradoxical figure of the state of exception.”38 Why the unannounced transposition? Because the restricted notion of homo sacer — alongside the related notions of bare life and the state of exception— is being used in confusion to account for the effects of the biopolitics of race too generally. The homo sacer, “divested of political status and reduced to bare life,” is distinguished not by her vulnerability to a specific form or degree of statesanctioned violence but by her social proscription from the honor of sacrifice.39 The homo sacer is banned from the witness-bearing function of martyrdom (from the ancient Greek martys, “witness”). Her suffering is therefore imperceptible or illegible as a rule. It is against the law to recognize her sovereignty or self-possession. Narcissism Kritik 1nc Social media nurtures narcissistic self-inflation – the plan intensifies narcissistic capabilities Buffardi and Campbell ’08 [Laura and Keith, psychology professors at the University of Georgia, “Narcissism and Social Networking Web Sites”, Personality and Social Psychology Bulletin, 6/3/2008, http://www.swaraunib.com/indra/Sistem%20informasi/TPB/Narcissism%20and%20Social.pdf // date accessed 6/26/15 K.K] Narcissism refers to a personality trait reflecting a grandiose and inflated self-concept. Specifically, narcissism is associated with positive and inflated self-views of agentic traits like intelligence, power, and physical attractiveness (Brown & Zeigler-Hill, 2004; Campbell, Rudich, & Sedikides, 2002; Gabriel, Critelli, & Ee, 1994; John & Robins, 1994) as well as a pervasive sense of uniqueness (Emmons, 1984) and entitlement (Campbell, Bonacci, & Shelton, 2004).2 From a basic trait perspective, narcissism is associated with a high degree of extraversion/agency and a low level of agreeableness or communion (e.g., Miller & Campbell, 2008; Paulhus & Williams, 2002). A similar high agency pattern (and negative but typically small/nonsignificant correlations with communion) is also found in narcissists’ explicit selfconceptions (Campbell, Foster, & Finkel, 2002), implicit self-conceptions (Campbell, Bosson, Goheen, Lakey, & Kernis, 2007), and implicit motives (Carroll, 1987). Central to most theoretical models of narcissism in social-personality psychology is the use of social relationships in part to regulate self-esteem, self-concept positivity, or narcissistic esteem (Campbell, 1999; Campbell, Brunell, & Finkel, 2006; Morf & Rhodewalt, 2001; Raskin, Novacek, & Hogan, 1991). Narcissists do not focus on interpersonal intimacy, warmth, or other positive long-term relational outcomes, but they are very skilled at both initiating relationships and using relationships to look popular, successful, and high in status in the short term. Narcissists participate in this dynamic “selfconstruction” (Morf & Rhodewalt, 2001) via relationships to constantly affirm[s] their narcissistic esteem. It has been suggested that this process is due, at least partially, to narcissists’ dispositional impulsivity (Vazire & Funder, 2006). How does this narcissistic self-regulation or self-construction (we use these terms largely interchangeably) operate in the context of interpersonal relationships more specifically? First, narcissism is linked positively with relationship formation. For example, narcissism is associated with being (a) liked in initial interactions (Oltmanns, Friedman, Fiedler, & Turkheimer, 2004; Paulhus, 1998), (b) perceived as a leader (Brunell, Gentry, Campbell, & Kuhnert, 2006), (c) perceived as exciting (Foster, Shrira, & Campbell, 2003), (d) socially confident (Brunell, Campbell, Smith, & Krusemark, 2004), (e) entertaining (Paulhus, 1998), and (f) able to obtain sexual partners (Foster, Shrira, & Campbell, 2006). Second, narcissism is associated negatively with seeking out or creating longterm relationships that have qualities of closeness, empathy, or emotional warmth (Brunell et al., 2004; Campbell, 1999; Campbell & Foster, 2002). Third, narcissism is associated with using relationships as an opportunity or forum for self enhancement. For example, narcissists brag and show off (Buss & Chiodo, 1991), perform well when there is an opportunity for public glory (Wallace & Baumeister, 2002), and seek attractive, high-status, “trophy” romantic partners (Campbell, 1999). Others in relationships with narcissistic individuals, however, often suffer in the longer term as narcissism is linked to aggressiveness (Bushman & Baumeister, 1998), psychological control (Campbell, Foster, et al., 2002), game playing and infidelity (Campbell, Foster, et al., 2002; Le, 2005; Schmitt & Buss, 2001), and lower levels of commitment (Campbell & Foster, 2002). Indeed, longitudinal research on relationships has found that the initial likeability associated with narcissism fades and is even reversed in the longer term (Paulhus, 1998). Similarly, longitudinal research in clinical settings has found a significant longterm consequence of narcissism is the suffering of close others (Miller, Campbell, & Pilkonis, 2007). How might narcissism operate in a social networking Web site? These online communities may be an especially fertile ground for narcissists to self-regulate via social connections for two reasons. First, narcissists function well in the context of shallow (as opposed to emotionally deep and committed) relationships. Social networking Web sites are built on the base of superficial “friendships” with many individuals and “sound-byte” driven communication between friends (i.e., wallposts). Certainly, individuals use social networking sites to maintain deeper relationships as well, but often the real draw is the ability to maintain large numbers of relationships (e.g., many users have hundreds or even thousands of “friends”). Second, social networking Web pages are highly controlled environments (Vazire & Gosling, 2004). Owners have complete power over self-presentation on Web pages, unlike most other social contexts. In particular, one can use personal Web pages to select attractive photographs of oneself or write self-descriptions that are self-promoting. Past research shows that narcissists, for example, are boastful and eager to talk about themselves (Buss & Chiodo, 1991), gain esteem from public glory (Wallace & Baumeister, 2002), are prevalent on reality television (Young & Pinsky, 2006), and enjoy looking at themselves on videotape and in the mirror (Robins & John, 1997). Personal Web pages should present a similar opportunity for selfpromotion. In sum, given the behaviors of narcissists in offline relationship contexts, we expect that they will take advantage of the new virtual arena for pursuing a similar self-regulatory agenda. This will include relatively high levels of relationship formation, self-promoting images of oneself, and an overall agentic (rather than communal) self-presentation Narcissim is fundamentally antihumanistic – it creates the possibility for domination and when applied to foreign policy, nuclear war Merton 65 [Thomas Merton, Card cut from the 2002 re-published version, Graduate of Columbia University, Zen Buddhist, “Love and Living”, https://books.google.com/books?id=uHzsRR3OID4C&pg=PT168&lpg=PT168&dq=%22narcissis m%22+AND+%22nuclear+war%22&source=bl&ots=co3kHrdfmY&sig=5heCqgYA1Xeczg5SWe XMYYvjRc4&hl=en&sa=X&ei=bNGRVbLWIcvjQGFqoHYCA&ved=0CCcQ6AEwAg#v=onepage&q&f=false, ZS] The key problem of humanism is the problem of that authentic love which unites man to man not simply in a symbiotic and semiconscious relationship but as person to person in the authentic freedom of a mutual gift. Here we come[s] to the question of narcissism, which is closely related to, in fact inseparable from, alienation. Alienated man is also narcissistic, because his love is regressive, undeveloped, infantile. It would be interesting here to examine the possible analogies between this modem psychological concept and the traditional Christian idea of sin, particularly original sin. They have much in common. The narcissistic personality is centered on the affirmation of itself and its own limited needs and desires. It sees other things and persons as real only insofar as they can be related to these selfish desires. Psychology and anthropology today teach us that primitive forms of religion, particularly those which make considerable use of magic rites, tend to be associated with narcissistic thinking. But we must not place all the blame only on primitive people. Narcissism remains a problem of enormous magnitude, especially in our highly developed modem technological culture, which abounds in its own hidden forms of magic thinking, superstition, ritualism. Our sophisticated modem culture has its taboos, its obsessions, and all that goes into the formation of the neuroses, individual and collective, which so often take the place of formal religion in the minds of men. Erich Fromm even goes so far as to say that much of modem society and its attitudes can be summed up as highly organized narcissism. This fascination with the self as a central and sole reality to be satisfied and catered to in everything is at the root of all idolatrous forms of religion. Narcissism spontaneously projects itself onto an idol from which the satisfaction of its desires is thought to be obtained by magic, by cajoling, by manipulation, or by ruse. The characteristic syndrome of narcissistic thought ends in this immersion in magic and quasi-omnipotent contemplation of the idol, which is the projection of a selfish and infantile need for love or power. Though narcissism can be efficiently employed in building up the immense power structures of industrial and military states, it is essentially antihumanistic. Narcissism is hostile to the true development of man's capacity to love. Narcissism alienates man and his society in a slavery to things—money, machines, commodities, luxuries, fashions, and pseudoculture. The idolatrous mentality of narcissism produces a fake humanism which cynically deifies man in order to cheat him of his human fulfillment and enslave him to the "rat race" for riches, pleasure, and power. Erich Fromm has pointed out the deadly alliance between the narcissistic mentality of mass-man and the destructive tendencies of a society that grows rich on the prospect of nuclear war. The alternative embraces N.S.A surveillance as a means to deconstruct anonymity – policing of social media removes the drive for narcissistic tendencies Rubenfeld 14 (Jed Rubenfeld is a professor of constitutional law at Yale Law School and coauthor of the forthcoming book “The Triple Package.”, “Privacy vs. anonymity in the NSA debate”, http://www.dallasnews.com/opinion/sunday-commentary/20140117-privacy-vs.anonymity-in-the-nsa-debate.ece, ZS) In the world of data gathering, the key concept for setting limits on government surveillance is privacy. But in the world of data mining, the key is anonymity. Anonymity is very different from privacy. Walking the streets, you’re not in private, but you may be anonymous if no one recognizes you. If you go into a store and pay cash for a book, what you’re doing isn’t private, but, again, you may be anonymous, and that anonymity might be very important to you. When people post material on a freely accessible website, their postings are public, not private — but they may well be anonymous. In such contexts, the question is not whether privacy should be honored but whether anonymity should be protected. Anonymity can in some circumstances be a great freedom, worthy of protection. In others, it can encourage vicious behavior and enable crime. Solving the riddle of anonymity is the central question of the brave new digital world, even if our courts haven’t quite yet caught on. When the government engages in data mining, anonymity deserves protection. Consider telephone metadata — the dates, times and numbers of phone calls. Is that information “private”? Thirty-five years ago, in Smith vs. Maryland, the Supreme Court said no. All that information is already turned over to and collected by phone companies. Hence the government can capture metadata without any constitutional restrictions — with no warrant, no probable cause, not even reasonable suspicion. Smith makes intuitive sense to many people. Your metadata is not nearly as personal as your communication content — what you say on the phone or what is said to you. Moreover, even the most personal information is no longer private if exposed enough to others. If you take your laundry to dry cleaners, you can’t complain when they report what they see to the government (which is what phone companies are doing when they turn over your metadata to the NSA). Under Smith, William Pauley, the federal judge who found in December that the NSA metadata program did not violate privacy rights, was absolutely right. But Richard Leon, the federal judge who ruled against the NSA program last month, was also right. Leon saw that there was something wrong in the NSA program apart from whether metadata is private. Given the way cellphones are used today, Leon concluded, metadata can be mined to produce a live-streaming digital portrait of an individual’s entire life. “Records that once would have revealed a few scattered tiles of information about a person,” he wrote, “now reveal an entire mosaic — a vibrant and constantly updating picture of the person’s life.” For example, well-mined metadata could reveal a “wealth of detail” about a person’s “familial, political, professional, religious and sexual associations.” This is an anonymity problem: The NSA cannot create a dossier on you from your metadata unless it knows that you made the calls the agency is looking at. The privacy question is all about data gathering: Should the NSA have access to nationwide metadata? The right answer to that question is yes. But identities should be hidden. Suppose the NSA had access to all the metadata of every call a certain person made over the past five years — but didn’t know who that person was. Instead, the NSA knew only that individual “H4QQ9F” made the calls in question. In that world, there’s no Orwellian surveillance. But suppose that individual H4QQ9F made a call to a known al-Qaeda safe house in Yemen. Then the NSA should be permitted to pierce the veil of anonymity and find out who H4QQ9F is. Privacy was key when the question was whether, or how much of, our private lives could be monitored or recorded. That train has left the station. Today, most of us allow a great deal of our lives to be monitored and recorded — whenever we use a search engine, for example, or buy something online. Even the content of our private communications, such as emails and chats, is now routinely exposed to and stored by people at Facebook or Google. The key question isn’t how to keep information about us from getting out into the world; it’s how that information can be used. The word “privacy” doesn’t appear in the Constitution. Privacy jurisprudence was a creation of the 20th century. Today, we need a new jurisprudence of anonymity. We need laws and technologies that can break through anonymity when people commit crimes or torts online. But we also need laws and technologies that will protect anonymity when government engages in 21st-century data mining. Framework The role of the ballot is to evaluate the most in round ethical advocacy this is paramount for debate- First is fairness- It’s key to neg ground and flex, as well as checks back aff side bias such as first and last speech and picks the focus of the debate. Second is education- Omitting the implications of the affirmative opens the floodgates to recreate the flawed policy. There is no high school equivalent of k education, which means default to education over fairness impacts 2nc Ext: Impact Pathological narcissism collapses dignity and crisis Giroux ’12 [Henry Giroux currently holds the Global TV Network Chair Professorship at McMaster University in the English and Cultural Studies Department. “Disposable Youth, Racialized Memories, and the Culture of Cruelty”, Taylor and Francis, 2012, K.K] As public life is commercialized, commodified, and policed, the pathology of individual entitlement and narcissism erodes those public spaces in which the conditions for conscience, decency, self-respect, and dignity take root. The crisis of youth is symptomatic of the current crisis of democracy, and as such it hails us as much for the threat that it poses as for the challenges and possibilities it invokes. We need to liberate the discourse and spaces of freedom from the plague of consumer narcissism and casino capitalism. We need to engage the struggle to restore and build those public spaces where democratic ideals, visions, and social relations can be nurtured and developed as part of a genuinely meaningful education and politics. The time has come to take seriously the words of the great abolitionist Frederick Douglass, who bravely argued that freedom is an empty abstraction if people fail to act. Douglass insisted that “If there is no struggle there is no progress. Those who profess to favor freedom and yet depreciate agitation, are men [and women] who want crops without plowing up the ground, they want rain without thunder and lightning. They want the ocean without the awful roar of its many waters” (Douglass 1985: 204). The deteriorating state of American youth, especially poor white and minority youth, may be the most serious challenge the United States will face in the 21st century. It is a struggle that demands a new understanding of politics, one that is infused not only with the language of critique, but also with the discourse of possibility. It is a struggle that requires us to think beyond the given, imagine the unimaginable, and combine the lofty ideals of democracy with a willingness to fight for its realization. But this is not a fight we can win through individual struggles or isolated political movements. It demands new modes of solidarity, new political organizations, and a powerful, expansive social movement capable of uniting diverse political interests and groups. It is a struggle that is as educational as it is political, one that must build upon self-awareness as well as historical consciousness. At the present moment, it is a struggle whose call for reflection and action is as necessary as it is urgent. Those of us who believe in justice and human rights need to liberate the discourse and spaces of freedom from the plagues of militarism and consumer narcissism and struggle to build those public spaces where democratic ideals, visions, and social relations can be nurtured and developed as part of a genuinely meaningful education and politics—we need along with young people to build those spaces, social relations, and institutions that give meaning to both the promise of democracy and a future in which young people matter. Narcissistic self-promotion necessitates self-annihilation and sustains Privacy Fatigue – turns the internal link Buffardi and Campbell ’08 [Laura and Keith, psychology professors at the University of Georgia, “Narcissism and Social Networking Web Sites”, Personality and Social Psychology Bulletin, 6/3/2008, http://www.swaraunib.com/indra/Sistem%20informasi/TPB/Narcissism%20and%20Social.pdf // date accessed 6/26/15 K.K] This research has several implications both for narcissism and for Web page–mediated social interaction. First, the expression of narcissism on social networking Web sites is very similar to its expression in other social domains. Narcissism is related to a higher number of social relationships, self-promoting self-presentation, and the perception of having a large number of agentic characteristics. Only two differences were found between narcissism in the “real world” and in online communities. The narcissists’ quotes were judged to be less entertaining than those of non narcissists. This contrasts with the general finding that narcissists are entertaining at first meeting (e.g., Paulhus, 1998). We would like to point out that our incongruent finding, however, is not sufficient to suggest that narcissists’ ability to entertain others in social contexts is subdued online. Rather, it is possible that narcissists’ quotes are actually quite entertaining to peers who know their context but not to our RA coders who were not acquainted with the profile owners personally. Based on our findings, it is also plausible that the extent to which the narcissists’ quotes and other aspects of their profiles were viewed as selfpromoting directly interfered with the quotes’ entertainment and cleverness. Therefore, additional research in which the entertainment value of narcissists’ full profile, rather than just the quotes section, is necessary to determine whether narcissists are less entertaining in online contexts than in faceto-face ones. In addition, the narcissists were judged to be more attractive based on their photos than the non narcissists. This differs from past research that has found no differences in attractiveness between narcissists and nonnarcissists (Gabriel et al., 1994). Why this disparity? One possible explanation is that narcissists’ self-enhancing biases might lead them to consider more attractive pictures of themselves to be more accurate representations of their true likenesses. We would also speculate, however, that the narcissists appear to be attractive on Facebook because they are strategically posting pictures that make them appear sexy and attractive; this was not an option in Gabriel and colleagues’ (1994) study. Second, unacquainted raters are able to judge Web page owners’ narcissism with some level of accuracy. This finding is consistent with those concerning the accuracy of Big Five personality perception based on viewing Web pages (Marcus et al., 2006; Vazire & Gosling, 2004) in that Web page viewers can make reasonable estimates of personality from Web pages. More broadly, the correlation between self-reported narcissism and strangers’ impressions of narcissism also suggests that at least on Facebook, less narcissistic participants do not seem to be using the Internet as a channel for self-promotion. That is, more modest, less self-centered individuals in real life do not appear to be self-promoting to the degree that narcissists are on the Web. Third, our results indicate that, as in past Big Five research (Marcus et al., 2006), viewers use Web page content to form impressions of the Web page owner’s level of narcissism. We found that the quantity of social interaction and main photo in particular played a significant role in this process. Conversely, the raters seemed to have omitted other Facebook features that related to NPI scores, including self-promoting information about the self, self-promoting quotes, less entertaining quotes, main photo sexiness, and fun pictures, in their impression formation. Finally, narcissistic impression ratings related (falsely) to three profile characteristics that did not correlate with owners’ narcissistic personality, namely, quantity of information listed about the self, self-promoting pictures, and provocative pictures. This pattern in raters’ errors of omission and commission preliminarily suggests that individuals who have experience with social networking Web sites, as presumably our raters did, may have developed a system or script (Schank & Abelson, 1977) for viewing such Web pages and efficiently gleaning important information for the context of a social networking community. It is understandable, if this is the case, that an individual’s social capital (how popular and socially active they are quantifiably) and attractiveness, which both can be determined quickly, play[s] an important role in impression formation, as our results suggest. In contrast, the somewhat more difficult to decipher written information, such as that in the About Me and Quotes sections, may be secondary.