Document1 ST. LOUIS URBAN DEBATE LEAGUE 2012-2013 Port Security Neg AT: INHERENCY 2 AT: ECON 9 A2 TERRORISM 25 ALT CAUSE LABOR SHORTAGE 51 AT: INVASIVE SPECIES 55 AT: ORGANIZED CRIME 58 AT: SOLVENCY 64 A2 ECON IMPACT 87 CAPITALISM LINK 88 Page 1 of 89 Document1 ST. LOUIS URBAN DEBATE LEAGUE 2012-2013 AT: Inherency Page 2 of 89 Document1 ST. LOUIS URBAN DEBATE LEAGUE 2012-2013 Squo Solves (Generic) Squo solves—port security and grant distribution improving now Terreri 09—World Trade [April, “The Current State of Port Security,” Web, 10/09, World Trade, Proquest, 6/20/12] Security improved significantly since 9/11 through relationship building and resource sharing among federal, state, and local law enforcement and emergency response agencies, notes Beth Rooney, manager of port security at the Port Authority of NY & NJ. "These improvements are due in large part to physical security improvements, personnel enhancements through training and drills, and through a tremendous amount of work done in collaboration and partnership with other agencies," she says. The Port of NY & NJ is the third largest in the country and it is the highest atrisk port as well. "While folks view us to be the end-all of the port, the reality is we touch only 13 of over 190 commercial maritime facilities in the port," continues Rooney. But the port continues to take an active role in security and has, for the last six years, chaired the Area Maritime Security Committee, a bottom-up approach to security that is working well. Historically, port and terminal operators and law enforcement entities competed for grant dollars. So the port decided to work collaboratively to assure the money went where these various entities felt the greatest risks were, explains Rooney. "We wrote our own document called 'Port-wide Strategic Risk Management Plan' in which we identified initiatives for the next five years that would benefit everyone. This is a huge success story for us because the only reason we could accomplish this was by collaborating with our two states, five boroughs, the City of New York, 17 New York counties, and seven New Jersey counties." This type of plan is now a national requirement for the nation's top 45 ports. The Ports of Los Angeles and Long Beach account for about 45 percent of containerized cargo entering the U.S. Port security is approaching the optimal state in terms of capabilities and initiatives performed to achieve its security mission, adds Cosmo Perrone, director of security for the Port of Long Beach. "We are approaching the point of execution on critical large-capital projects as we continue to look for continuous improvements." He adds that because larger ports are reaching maturity, they will focus on resiliency and the trade community's ability to operate under adverse situations. Like the Port of NY & NJ, the Ports of Long Beach and Los Angeles are landlord ports-as opposed to operator ports-and are not regulated under the Maritime Transportation Security Act. Operator ports adhere to the U.S. Coast Guard's rules for port facilities. "But we have a duty to our customer base as well as to the public at large and to the national economy to assure goods move through our port in an effective and secure manner," says George Cummings, director of port security, Port of Los Angeles. The port developed a layered security model allowing terminal operators, transportation companies, and other stakeholders to operate under a unified security system within one command-and-control center. "We can deploy information in real time to our customers or response agencies, including military organizations." He adds that California's 11 ports are discussing the feasibility of developing a Pacific Coast model of regional integration to facilitate security monitoring and response. Page 3 of 89 Document1 ST. LOUIS URBAN DEBATE LEAGUE 2012-2013 AT: Inherency Funding High Now Port security funding high now Customs and Border Protection, 2006 [ No author given, "An Overall Picture of Port Security", CBP.gov, 07/12/2006, http://www.cbp.gov/xp/cgov/newsroom/fact_sheets/port_security/securing_us_ports.xml, 18/06/2012] Port security has been dramatically strengthened since 9/11. Funding has increased by more than 700 percent since September 11, 2001. Funding for port security was approximately $259 million in FY 2001. DHS spent approximately $1.6 billion on port security in FY 2005. Following 9/11, the federal government has implemented a multi-layered defense strategy to keep our ports safe and secure. New technologies have been deployed with additional technologies being developed and $630 million has been provided in grants to our largest ports including $16.2 million to Baltimore; $32.7 million to Miami; $27.4 million to New Orleans, $43.7 million to New York/New Jersey; and $15.8 million to Philadelphia. Page 4 of 89 Document1 ST. LOUIS URBAN DEBATE LEAGUE 2012-2013 Squo Solves – Tech exists and is being implemented now Tech Exists and has already been implemented in other areas Grant 10- US port security council (Jay Grant is the Director US Port Security Council and the Chief of InterPort Police; Written June 19, 2012; Accessed June 20, 2012; “A leap in technology: fusion authentication” http://www.porttechnology.org/-images/uploads/technical_papers/PTI-26.pdf) The system has been successfully installed by the government in several housing projects throughout the US, along with some other commercial buildings and a police station. We have just begun pilot testing in the port authority environment. Yet as stated, the greatest challenge for any system is adoption and cost. Those factors will be crucial for this or any other system. As new as all this sounds, we are seeing similar programs being tested. The UK has in place facial recognition entries at Gatwick Airport and an employee program at Heathrow. They plan to implement full facial screening for EU passport holders later this year. Again, this moves the bar from verification to identification. Tracking tech exists and is being utilized on a small scale now Walker 12 (Shaun Walker is a writer for PRWeb; Written May 24, 2012; Accessed June 20, 2012; http://www.prweb.com/releases/2012/5/prweb9540171.html; National Security Boosted As A Critical Louisiana Port Installs NextGeneration Technology) The Greater Lafourche Port Commission, in partnership with national security firm Crescent Guardian, Inc., has completed implementation of an advanced video analytics application to accompany its nextgeneration video surveillance system. This milestone ensures that first responders in Port Fourchon are receiving “as they happen” alerts identified automatically by the surveillance system and can coordinate their response in real time. This level of data sharing and interoperability is unprecedented and will aid in lowering response times and overall situational awareness during real-time events, placing the port’s security among the most advanced in the nation. The Greater Lafourche Port Commission's is committed to continually improving the security and emergency response preparedness of Port Fourchon by building a Maritime Domain Awareness System that allows local, state and federal agencies such as Harbor Police, Lafourche Parish Sheriff's Office, LOOP, Lafourche Parish EOC, Fire Central Dispatchers, GOHSEP, Department of Defense, Customs, and Coast Guard to collaborate effectively and become more proactive. To do this, the port's director of information technology, April Danos, wanted to find a way to take all technologies and disparate data and bring them into one common operating picture that would allow these several agencies to work collaboratively within the same situational awareness platform over multiple networks. Crescent Guardian, Inc., a partner security firm of the port, developed an effective solution by providing advanced software that could run the new surveillance system for Fourchon’s Maritime Domain Awareness System, or GLPC-C4. The cutting-edge software allows the system to send alerts and alarms if anomalous behavior is detected, meaning there are "No Rules" to be written prior to their use—Making it one of the easiest and most effective systems in the industry to install and use. “The Port Commission was pleased to work with CGI to integrate BRS Labs’ video analytics into Port Fourchon’s Video Management System and the GLPC-C4 System,” said Director Danos. The US Department of Defense supported Port Fourchon's efforts by sharing the DoD-developed capabilities of the Knowledge Display and Aggregation System (KDAS) to serve as the basis for the Port's incident command and control system. The use of KDAS provides Port Fourchon with the unique ability to network its system with the DoD in the event of an incident requiring information sharing. Page 5 of 89 Document1 ST. LOUIS URBAN DEBATE LEAGUE 2012-2013 Current technology more than adequate—we already have the newest technology Harrald 05 [John R, “Sea Trade and Security: an Assessment of the Post-9/11 Reaction,” Web, Fall 05, http://search.proquest.com.proxy.lib.umich.edu/pqrl/docview/220702986/1376BF5C74E6A8F9B1B/5?accountid=14667, 6/19/12] Innovative technology has been applied to the problem of maritime security in two general areas: (1) container security and (2) vessel identification and surveillance. The advancements in container security include the CBP automated commercial environment, which provides the information necessary to target inspections; improved non-intrusive scanning technology; and the creation of sensorequipped containers. Prior to 9/11, and despite two decades of advances in electronic data interchange, the flow of information within the supply chain's transaction layer and between the transaction layer and the oversight layer was slow and paper-driven. The most revolutionary technological change caused by U.S. government security initiatives, and the least visible, is the automation of this information flow, which allows the effective screening of containers prior to shipment. The second area of improvement is the development of technologies to track containers and to ensure their physical integrity. These include the smart-container initiatives, such as radio frequency identification that can track sensors; sensors that can detect chemicals and radiation; sensors that detect and record intrusions and other anomalies; and antitamper seals. An industry consortium, the Strategic Council on security Technology, has initiated a series of pilot tests of sensor technology called Smart and secure Tradelines (SST).47 For example, the Department of Defense (DOD) and SAVI Technology have developed an SST pilot that uses these technologies to ensure the security of the DOD supply chain.48 Nonintrusive inspections of containers have been improved with radiation monitors, portal sensors and remote monitoring technologies. The SAIC-developed VACIS system uses a gamma-ray imaging system to produce radiographie images that may be transmitted or stored. A mobile VACIS unit may be set up in 10 minutes and can scan a 40-foot container in six seconds.49 VACIS technology is also being applied to the problem of maritime domain awareness-identifying vessels and monitoring those with suspicious cargoes, behavior or ownership. International requirements for AIS and SSAS are coming into force. The U.S. Coast Guard and the Navy are utilizing satellite technology and airborne sensors to locate and track vessels in the maritime domain, and both organizations plan to add unmanned aerial vehicles (UAV) to the mix. The Coast Guard is purchasing Bell Eagle Eye UAVs as part of its fleet modernization program.50 Enhancing communication and information technologies will be required to make the National Maritime Intelligence Integration Center an effective reality. Page 6 of 89 Document1 ST. LOUIS URBAN DEBATE LEAGUE 2012-2013 Squo Solves – Piracy and Oil Current security measures solve maritime oil threats Houreld 11—Associated Press Writer [Katharine, “Oil Tanker Terror Hijacks Easy, Attacks Complex,” Web, 5/21/11, LexisNexis, 6/19/12] To counter attacks, tanker owners have begun putting barbed wire around ship guardrails and installing firehoses that can launch high pressure jets of water at attackers. They are also installing bulletproof glass around ship bridges and accommodation quarters, a vessel's two most vulnerable areas, said Chris Austen, the head of Maritime and Underwater Security Consultants. Some shipping companies also insist their tankers travel through pirate-infested waters only in convoys, added Crispian Cuss, program director at Olive Group, one of the biggest security companies working in the Middle East. If hijackers decide they can't get onboard and steer a ship toward a target without detection, they might try to seize a vessel in port but that would be much risker given the global port security measures in effect in the last decade. The al-Qaida plot found in bin Laden's hideout also mentioned attacking oil facilities, but most oil terminals are considered strategic installations meaning they are protected by roving coast guard boats, radar, divers who conduct inspections and heavy security. Brazil, for example, is justifying the cost of developing a nuclear submarine to protect its vast offshore oil fields. Security levels vary, but the ports that terrorists value the most generally have the heaviest protection, Cuss said. Page 7 of 89 Document1 ST. LOUIS URBAN DEBATE LEAGUE 2012-2013 Squo Solves – Biometric Screening Current programs are sufficient—employee screening, inspections, increased intelligence, partnerships, container inspection, X-ray/gamma ray machines, and radiation detection devices PR Newswire 2011 (American Association of Port Authorities, “10 Years After 9/11, Security Still a Top Priority of U.S. Ports” 6/19/12 Lexis 6/19/12) The industry also maintains ongoing liaison with the federal government's lead port and maritime security agencies. These dialogues address timely security issues such as the Transportation Worker Identification Credential (TWIC), which the TSA and Coast Guard implemented 2007 to ensure those seeking access to secure port areas can be positively identified, have authorization to enter the facility and do not pose a terrorist risk. In concert with public port authorities and terminal operators, the Coast Guard is charged with routinely inspecting and assessing the security of U.S. port facilities and the vessels that call those facilities, in accordance with the MTSA and the International Ship and Port Facility Security Code. Since 9/11, the Coast Guard has instituted innovative programs such as Maritime Safety and Security Teams, enforced security zones, increased its intelligence gathering and analysis capabilities, expanded its partnerships with the maritime industry, international organizations, federal, state and local agencies, and has joined with other agencies within DHS to strengthen U.S. borders and protect America's ports and waterways. The Coast Guard also cross-checks crew lists against terror watch lists in advance of arriving ships. Additionally since 9/11, CBP has initiated: the Container Security Initiative to examine high-risk, U.S.-bound containerized cargoes at foreign ports; the 24-Hour Rule, which requires cargo manifests be submitted a least a day ahead of ship arrivals; C-TPAT which provides expedited inspections for U.S. importers that voluntarily work with CPB to improve baseline security standards for supply chain and container security; and large-scale X-ray, gamma ray and radiation detection devices at U.S. ports to scan the contents of inbound cargo containers. Page 8 of 89 Document1 ST. LOUIS URBAN DEBATE LEAGUE 2012-2013 AT: Econ Page 9 of 89 Document1 ST. LOUIS URBAN DEBATE LEAGUE 2012-2013 1NC Econ Turn :An attack would increase demand for higher security measures both by workers and the government Learner and Thronburg 2006 - Director of the UCLA Anderson Forecast, Chief Economist of the Ceridian-UCLA Pulsel of Commerce, Christopher Thornberg is a founding principal of Beacon Economics [ Chirstopher Thornberg, Edward E Learner, Jon D. Haveman and Howard J. Shatz (editors), Stephen S. Cohen, Peter Gordon, Jon D. Haveman, Matthew C. Hipp, Seth K. Jacobson, \ James E. Moore, II, Qisheng Pan, Harry W. Richardson, Howard J. Shatz, Jay Stowsky, , Ernesto Vilchis, and Amy B. Zegart , Protecting the Nation’s Seaports: Balancing Security and Cost, 2006, http://www.ppic.org/main/publication.asp?i=698, 6/20/12 One result might be that work crews understandably would refuse to work until the government could assure some degree of safety. In another scenario, the ports could be closed not by labor but by the government. If the attack on the World Trade Center was an indication of what might happen in the wake of a serious attack, then the government itself might shut down U.S. ports while deciding how to handle the new crisis. This would imply that the government would have to put some sort of screening process into place rapidly by which safe containers could be separated from potentially dangerous ones, with a second physical screening to detect potential explosives in this latter category. Economists’ predictions of the effect of a supply chain disruption on the economy are highly exaggerated Learner and Thronburg 2006 - Director of the UCLA Anderson Forecast, Chief Economist of the Ceridian-UCLA Pulsel of Commerce, Christopher Thornberg is a founding principal of Beacon Economics [ Chirstopher Thornberg, Edward E Learner, Jon D. Haveman and Howard J. Shatz (editors), Stephen S. Cohen, Peter Gordon, Jon D. Haveman, Matthew C. Hipp, Seth K. Jacobson, \ James E. Moore, II, Qisheng Pan, Harry W. Richardson, Howard J. Shatz, Jay Stowsky, , Ernesto Vilchis, and Amy B. Zegart , Protecting the Nation’s Seaports: Balancing Security and Cost, 2006, http://www.ppic.org/main/publication.asp?i=698, 6/20/12] Previous Port Closures Hold Lessons for the Present When economists trying to make predictions are faced with a long list of unknowns, they can either develop complex models to help answer the questions before them or look to historical events that might provide lessons for the future. The complex questions stemming from a terrorist attack on the port complex cannot be answered easily within a typical static input-output (IO) model, because the economy is flexible and will work to mitigate the potential damage caused by a supply chain disruption. Input-output models assume a mechanical structure in which a resource unused in one place remains unused. For example, there is an assumption that a laid-off worker will not try to find new employment, or that a factory, denied a critical component, will simply shut down instead of finding an alternative supplier. Of course, these assumptions are not true. Input-output models tend to highly exaggerate the true cost (and also the true benefits under other circumstances) of economic events. Improving the scanning program would impede trade and hurt the economy Terreri 09—World Trade [April, “The Current State of Port Security,” Web, 10/09, World Trade, Proquest, 6/20/12] Donnelly at NAM believes the 100 percent scanning directive is heading in the wrong direction. "It treats all cargo the same, spreading our limited enforcement resources across all shipments, rather than targeting shipments from riskier shippers from dubious places. Major transnational companies with overseas plants shipping to their own companies here in the U.S. every two weeks should not be subjected to the same intensive security review as an unknown shipper. Established shippers and importers have invested in government programs like C-TPAT and are sharing information to assure their supply chains are secure. Security Page 10 of 89 checks need to focus where the risks are the greatest." Document1 ST. LOUIS URBAN DEBATE LEAGUE 2012-2013 Turn: Increased trade introduces invasive species, which can`t be fixed— international problem Keller 2011-worked at the Program on the Global Environment at the University of Chicago, Illinois (Reuben P., Charles Perrings- worked at the ecoSERVICES Group in the School of Life Sciences, Arizona State University, Tempe “International Policy Options for Reducing the Environmental Impacts of Invasive Species” Bioscience 12/11 ProQuest 6/20/12) Preventing the spread of nonnative invasive species is an international public good. Some categories of invasive species-such as diseases of humans and livestock-are addressed by international agreements that coordinate efforts to reduce their spread. In contrast, invasive species that primarily cause environmental impacts are managed almost exclusively at the national level. Control of environmental invaders is internationally undersupplied because the efforts of nations that do invest to prevent their spread are undercut by nations that do not . Addressing this problem will require international cooperation. We identify the international approach to controlling human diseases as a model that could provide institutions and mechanisms to map the spread of environmental invaders and assess the risks they impose. This would allow individual nations to manage potential vectors of invasion. Because such a system is unlikely to be implemented in the near future, we make recommendations for intermediate steps, including the widespread adoption of existing risk assessments and importation standards. Keywords: Convention on Biological Diversity, sanitary and phytosanitary agreement, World Health Organization, World Trade Organization, invasive species International trade increases human welfare but also leads to the introduction and establishment of nonnative invasive species, such as human and livestock diseases, pests and diseases of crops, and species that cause environmental harm. The increasingly global nature of trade means that efforts to prevent the spread of invasive species should be internationally coordinated. To this end, there are already relatively advanced international programs in place for identifying and managing the spread of human diseases, and the 178 member nations of the World Organisation for Animal Health (OIE) have agreed to report outbreaks of animal diseases, mostly diseases of livestock, to a central database. These programs allow nations to track invasive species threats and to use the shared information to impose import restrictions. Species known to be diseases and pests of crops are often the focus of quarantine inspections at national borders, but this varies by country and there is little international coordination. In contrast, nonnative invasive species that do not directly affect human health or agriculture are generally perceived to primarily pose risks of environmental harm. Few international agreements exist to control the spread of these species, and at an international scale, they are traded with much less inspection and fewer efforts to prevent their spread. This essay addresses the potential for wiser management of these species, which we refer to as environmental invaders. Despite the lack of international efforts to prevent their spread, environmental invaders have enormous environmental, economic, cultural, and human-health impacts (Pejchar and Mooney 2008, Sala et al. 2000). These include reductions in the populations of desirable native species as a result of predation, competition, parasitism, and disease. An example of this is the invasion of European waterways by North American crayfish, which both compete directly with native crayfish for resources and carry the crayfish plague disease (Aphanomyces astaci) that has devastated European crayfish populations (Gherardi and Holdich 1999). Economic impacts can arise in a variety of ways, including the costs of herbicides and pesticides to control nonnative invaders in national parks and the costs of cleaning industrial facilities that become infested with invaders (e.g., zebra mussel [Dreissena polymorpha] infestations of power plants in the Laurentian Great Lakes require the facilities to close down while workers clean pipes; Leung et al. 2002). Cultural and human-health impacts can also arise in many ways, but a good example comes from cases in which invasive species become so prolific that farmers abandon agricultural land, leading to the loss of traditional farmland and agricultural practices and potentially to human-health impacts from reduced food supplies. This has occurred in Mexico, where it is no longer feasible in some areas to control the invasive bracken fern (Pteridium aquilinum; Schneider and Geoghegan 2006). The introduction of environmental invaders is an externality of trade (Perrings et al. 2002, 2005). That is, the impacts of these species are not incorporated into the costs of doing trade, and those who trade the species have no economic incentive to reduce the invasion risks inherent in their business. For example, the global horticultural trade is responsible for many thousands of invasions of harmful plants and plant diseases around the world (Reichard and White 2001, Dehnen-Schmutz et al. 2007). However, the environmental costs are not borne by either exporters or importers. Instead, these costs are spread widely among society as government agencies spend taxpayer dollars on inspection, interception, eradication, containment, and compensation. Two factors have hampered efforts to slow the international spread of environmental invaders. First, although nations generally act defensively to control invasive species, the benefits arising from that control are almost always shared broadly among those at risk of being invaded, not just among those who pay for the control (Perrings et al. 2002). For example, if a country spends resources to ensure a disease-free horticultural industry, all nations to which it imposed by this trade Page 11 of 89 Document1 ST. LOUIS URBAN DEBATE LEAGUE 2012-2013 exports benefit from a reduced likelihood that they will be invaded. In the absence of cooperation, however, individual countries will protect their own borders but are less likely to commit resources to preventing the export of invaders. Because the invasion risk to which a country is exposed depends on the actions of its neighbors and trading partners, this means that countries face higher risks than they would if there were greater cooperation. Second, controlling the spread of an invasive species is a "weakest-link" public good (Perrings et al. 2002). Although the risks posed by any nation will depend on a complex set of climatic, biogeophysical, and social factors, including the type of trade they engage in and its volume, the overall global risk will be strongly determined by the nations or trades that operate the least effective programs to control species transport. Because removal of an invasive pest from trade requires all those involved to contribute, and because little is gained by providing more than the country making the smallest contribution, there is an incentive to adopt a matching strategy-to converge on the weakest link. This is because unilateral action cannot prevent the pest from continuously spreading through trade (Touza and Perrings 2011). Nevertheless, even though enhancing cooperative efforts should be the ultimate goal of a collective strategy to manage the problem of environmental invasions, there is much that can be done independently. In this article, we identify alternative strategies at the national and international levels for reducing the spread of environmental invaders with or without cooperation. We begin by reviewing existing unilateral defensive efforts to reduce exposure and by identifying programs that have been successful and could be implemented more widely without the need for additional international policy. We then consider the options for effective coordinated international management, building on existing commitments by countries under the Convention on Biological Diversity (CBD) and on the international success achieved in managing human diseases. Finally, we discuss the options for achieving at least some of the gains that could be had from coordinated action without the need for renegotiation of any multilateral agreement. Figure 1 summarizes our recommendations. National efforts to manage the spread of environmental invaders Under the World Trade Organization (WTO) and its constituent agreements, particularly the General Agreement on Tariffs and Trade (GATT) and the Agreement on the Application of Sanitary and Phytosanitary Measures (SPS), individual countries have the right to take actions in restraint of trade if those actions are needed in order to protect food safety and animal or plant health. In contrast to those that deal with human diseases, these agreements authorize only national defensive measures. That is, individual nations have direct responsibility for managing risks to themselves posed by the many vectors of nonnative species introduction (table 1) but are not permitted under the GATT and the SPS agreement to cooperate in the collective control of pest or pathogen transmission through trade restrictions. The standard-setting bodies for the SPS agreement-the International Plant Protection Convention (IPPC), the OIE, and Codex Alimentarius-do cooperate in setting sanitary and phytosanitary standards and reporting requirements for member countries. This has led to the harmonization of rules on classes of traded commodities involving known risks. The OIE has also coordinated veterinary campaigns against particular pathogens within member countries and has achieved success in the eradication of rinderpest, one of the most damaging of all animal pathogens (Normile 2008). But only in the case of novel human diseases does there exist an agreement to take collective action in restraint of trade as a precautionary measure. Environmental invaders can be transported to a country through intentional or unintentional vectors. Regardless of the vector, it is widely accepted that the most cost-effective way to reduce total impacts from nonnative invasive species is to prevent their arrival and establishment (see figure 1a, 1b; IUCN 2000, Leung et al. 2002, Lodge et al. 2006, Keller et al. 2007, 2009). That is, preventing the arrival of an invasive species will generally lead to less harm than addressing the species after it enters a country. Nations can choose from a range of options to prevent a species' arrival, including restrictions on trade in species of concern, requirements on exporters to ensure that invaders do not leave their shores or do not survive transit, and the operations of quarantine and inspection facilities at the point of entry (Lodge et al. 2006). Importantly, policies focused on prevention have more opportunities to shift the burden of responsibility to the industries that profit from risky trade in live organisms (Perrings et al. 2005). As an example of a prevention program, most plant shipments to the United States must be accompanied by a phytosanitary certificate to show that they were produced at a facility following high standards for the control of plant diseases and parasites. This system puts the costs of obtaining certificates and those of producing relatively safe plants onto exporters. In contrast, established plant pest species can generally be controlled only through expensive techniques such as manually pulling plants or the use of herbicides and pesticides. Because it is almost never possible to determine the party responsible for an invasion, these costs have never (to the best of our knowledge) been passed on to importers or consumers who benefited from imports. Intentionally introduced species, including pets, crops, and garden plants (table 1), provide many economic and social benefits. They also often become environmental invaders or act as vectors for environmental invaders (Jeschke and Strayer 2005). Efforts to reduce imports of environmental invaders generally consist of individual-species risk assessments so that resources can be focused on those species posing the highest risk. Because the proportion of traded species that become invasive is generally low (Smith et al. 1999), this approach leaves most species-those with low risk of invasion-unaffected. The approach has been shown to yield financial benefits for importing countries (Keller et al. 2007), whereas fewer invasions confers environmental, social, and agricultural benefits. The most prominent riskassessment procedure currently available is the Australian Weed Risk Assessment (WRA; Pheloung 1995). Australian government scientists developed this tool in the early 1990s, and in 1997, it was introduced as a mandatory screening tool for all new plant species proposed for introduction to Australia. Species assessed as posing a high risk are not allowed to be imported. The WRA has been demonstrated to have good accuracy in Australia, New Zealand, Florida, Hawaii, and the Czech Republic (Gordon et al. 2008). It has been adopted in a modified form by New Zealand. In contrast to intentional introductions, species transported unintentionally have some probability of becoming invasive but are not expected to provide benefits. This means that efforts to prevent their arrival can aim to simply remove all organisms from transport. Although this is conceptually simple, the number and magnitude of unintentional vectors makes preventing introductions an enormous challenge. For example, the global maritime fleet includes more than 99,000 large vessels and moves most international trade (IMO 2009). Each arriving ship presents risks of introducing new nonnative species entrained in its ballast water, attached to its Page 12 of 89 Document1 ST. LOUIS URBAN DEBATE LEAGUE 2012-2013 hull, and in the cargo it offloads (table 1; Keller et al. 2011). It is unlikely that any nation could commit sufficient resources to ensure that all arriving ships are free of invasive species. Each vector of unintentional species transport requires a different management approach. This approach needs to be based on the trade moving the species, the mode of transport, and the available technology. For example, the approaches necessary to limit the movement of fouling organisms of recreational boats are very different from those required to prevent the spread of invasive mollusks on watergarden plants or of forest pests in wooden packaging material. One relatively successful approach to limiting the spread of unintentional invaders is the US phytosanitary certificate system mentioned previously. This program aims to prevent the arrival of diseases, parasites, and plants that unintentionally accompany a traded species. It does this by requiring certain standards of plant and soil hygiene at facilities that grow plants for export to the United States. It is consistent with the United States' obligations as a signatory to the WTO's SPS agreement (Hedley 2004). Although the number of risk-assessment tools and vector management strategies continues to increase, they still provide protection against only a small proportion of the vectors that introduce invasive species. We offer two suggestions for improving this situation within the current international policy framework. First, some existing risk-assessment tools have been shown to perform well in a range of countries (e.g., Gordon et al. 2008), and other nations could adopt those tools. This was done by New Zealand when it adopted a modified version of the Australian WRA. In many cases, it may be possible for nations to relatively cheaply adopt tools developed elsewhere. Second, established national standards for treating vectors of unintentional introduction could be adopted by other countries. For example, the US Phytosanitary Certificate program could probably be adopted by other importing countries because many export facilities are already set up to achieve its standards. Further developing and applying these tools and standards would serve a double purpose by directly protecting those countries that adopt the procedures and by providing indirect protection to other nations that would subsequently be less likely to receive invaders from their trading partners. Although there are potential advances to be made in national defensive policies, these can never provide the level of protection that would arise from increased international cooperation (see figure 1c). Most vectors could be more efficiently rendered free of invasive species in their country of origin. This would, for example, reduce the demand on quarantine facilities at ports of entry. Such coordination is currently unlikely for at least three reasons. First and foremost, there are no international agreements or bodies that are mandated to implement such a coordinated approach. Second, the "free-rider" issue means that the financially rational approach for many countries is to take the benefits from trading with countries that implement higher standards but not to pay the costs to implement those standards in their own operations. Finally, many countries lack the resources, institutions, or political will to implement such policies. Without programs to transfer resources and expertise to these countries, they will remain weak links and will continue to pose a risk to all other nations. Page 13 of 89 Document1 ST. LOUIS URBAN DEBATE LEAGUE 2012-2013 Evidence shows that significant closure of ports would only have a mild effect on the economy Learner and Thronburg 2006 - Director of the UCLA Anderson Forecast, Chief Economist of the Ceridian-UCLA Pulsel of Commerce, Christopher Thornberg is a founding principal of Beacon Economics [ Chirstopher Thornberg, Edward E Learner, Jon D. Haveman and Howard J. Shatz (editors), Stephen S. Cohen, Peter Gordon, Jon D. Haveman, Matthew C. Hipp, Seth K. Jacobson, \ James E. Moore, II, Qisheng Pan, Harry W. Richardson, Howard J. Shatz, Jay Stowsky, , Ernesto Vilchis, and Amy B. Zegart , Protecting the Nation’s Seaports: Balancing Security and Cost, 2006, http://www.ppic.org/main/publication.asp?i=698, 6/20/12] “Surely you must be joking!” might be the immediate response to the conclusion that a significant closure of the ports would have at most a mild effect on the economy. It would seem more likely that a substantial disruption to the supply chain because of a port shutdown would have a very dramatic effect on the production process. Yet all the evidence points to the opposite conclusion. The major labor actions of the sixties had measurable effects on the timing of imports but hardly any on total imports, and there is little or no evidence to support the idea that they had any substantial effect on the overall economy as measured by rising prices, falling employment, or a reduction in production activity. Port shut downs do not adversely affect the broader economy Learner and Thronburg 2006 - Director of the UCLA Anderson Forecast, Chief Economist of the Ceridian-UCLA Pulsel of Commerce, Christopher Thornberg is a founding principal of Beacon Economics [ Chirstopher Thornberg, Edward E Learner, Jon D. Haveman and Howard J. Shatz (editors), Stephen S. Cohen, Peter Gordon, Jon D. Haveman, Matthew C. Hipp, Seth K. Jacobson, \ James E. Moore, II, Qisheng Pan, Harry W. Richardson, Howard J. Shatz, Jay Stowsky, , Ernesto Vilchis, and Amy B. Zegart , Protecting the Nation’s Seaports: Balancing Security and Cost, 2006, http://www.ppic.org/main/publication.asp?i=698, 6/20/12] Indeed, with these results in mind, it is hardly surprising then that we could find little evidence of the port shutdowns within the context of the broader economy. The statistical results reconfirm our eyeball results for the other four variables studied—manufacturing production; consumer spending on durable and non-durable goods; and employment in manufacturing, wholesale trade, and transportation. Very few of the strike indicator variables have any statistical significance, implying that there is little reason to believe that the strikes had any significant effect on the wider economy. Page 14 of 89 Document1 ST. LOUIS URBAN DEBATE LEAGUE 2012-2013 2NC Ext. Econ Page 15 of 89 Document1 ST. LOUIS URBAN DEBATE LEAGUE 2012-2013 AT: Econ – port security impossible hurts the economy Extensive increases in port security undercut the economy—it’s impossible to eliminate every threat Wolf 06—Political Editor and Director for ABC [Z Byron, Political Editor and Deputy Political Director for ABC News, “How Much Is Too Much for Port Security,” Web, 9/13/06, http://abcnews.go.com/US/Politics/ story?id=2425748&page=1, 6/19/12] Despite billions of dollars already spent, he argued, the government can't ensure 100 percent safety. Chertoff the analogy between car accidents and port security, but that's matter how careful drivers were, people were going to die in car crashes. Then he implied the same was true of port security, suggesting there was no way to entirely safeguard America's ports. The federal government has spent $10 billion on port security probably didn't expect to find himself drawing what he did in one awkward exchange. He said to the panel that no since 2004, according to Chertoff. The new bill would allocate nearly $9 billion more over the next five years to beef up security at the nation's ports. While Chertoff encouraged its passage, he tried to convince Sen. Frank Lautenberg, D-N.J., that scanning 100 percent of the cargo coming into the country was logistically impossible. "You know, it's like I get in my car or I put my daughter in my car. I understand it's not 100 percent safe. If I wanted my daughter to be 100 percent safe, I'd put a 5-mile-an-hour speed limit cap on the car, and it wouldn't go more than 5 miles an hour." Noting that the costs would be immense, he also argued against an amendment offered by Sen. Charles Schumer, D-N.Y., that would require screening of all shipping containers coming into the United States. "No matter how hard we may try, we cannot eliminate every possible threat to every individual in every place at every moment. And if we could, it would be at an untenable cost to our liberty and our prosperity," Chertoff said to the committee. "We don't want to undercut our economy while trying to protect it. We also don't want to undercut our civil liberties while trying to protect them." Page 16 of 89 Document1 ST. LOUIS URBAN DEBATE LEAGUE 2012-2013 AT: Econ – hurts small businesses Small businesses and suppliers are currently suffering due to increased security regulations Laite 10—Georgetown University [Parker Stone, “Maritime Trade Security: Promoter of Terrorism?,” Thesis, 5/10, http://repository.library.georgetown.edu/bitstream/handle/10822/553351/laiteParker.pdf?sequence=1, 6/20/12] Regulations often serve as a ‘‘fear factor’’ for small companies with limited resources and the Internet-based paperwork can mean problems for those in rural or remote communities. Add to this the uncertainty of continuously revised regulations under an implement and amend approach, and it is not hard to reach the conclusion that security can drive away the faint-hearted supplier. Micro-businesses and artisans, the path to economic development in many developing countries, will see security as a barrier to growth.32 Non-compliance by developing-world companies can mean more than just increased scrutiny by customs officials and can seriously disadvantage these countries’ trade programs. The American Association of Exporters and Importers (AAEI), for example, has expressed concerns that though importers often lack the “expertise or wherewithal to guarantee container security…[U.S. companies] could be held responsible for security in places where they may have no control, such as the premises of small suppliers in Third World Countries.”34 Since non-compliance with C-TPAT results in disenrollment from the program and a loss of competitive advantage, importers drop small suppliers in the developing world in favor of more established suppliers having better security, often in more developed countries. In fact, a 2007 survey conducted by the University of Virginia, found that 12.2 percent of the C-TPAT member-companies surveyed had rejected foreign suppliers, manufacturers, or vendors due to security concerns in the previous year.35 Small businesses and suppliers are key to the economy The Seattle Times 09 [“Obama Says Small Businesses Key to Economy,” Web, 5/19/09, http://seattletimes.nwsource.com/html/politics/2009238084_apusobamasmallbusiness.html, 6/20/12] WASHINGTON —President Barack Obama says the nation's small businesses are responsible for half of the nation's private sector jobs and deserve support from Washington. Obama on Tuesday welcomed winners of a Small Business Administration award to the White House's East Room. He said some of the nation's best businesses began as small ventures, such as Google and McDonald's. Such businesses' impact goes beyond the economy, Obama said, adding that small business owners help strengthen local neighborhoods. Given everything a small business does for its community, the government should do its part to help leaders, he said. That's why Obama says his economic policies would help pay off private loans and increase government backing for SBA loans. The key to an improved economy is small business and suppliers—government and private sector needs to back down Redmond 12—member of Job Creators Alliance [Billie, “Small Businesses Are Key to the Economy, Not Big Government,” Web, 6/18/12, http://www.usnews.com/opinion/blogs/economic-intelligence/2012/06/18/small-businesses-arekey-to-the-economy-not-big-government, 6/20/12] The solution to the jobs problem is small business, not more government. Job Creators Alliance has laid out a roadmap to sustainable economic recovery—and that path is paved with commonsense regulatory reform, certainty about future taxes, and the return of spending sanity to our federal government. In recent years, the federal government has unleashed a regulatory onslaught on small businesses in the private sector and has made it much harder for the engine of our economy to function as it should. Until policymakers and elected officials start to listen to the voice of the entrepreneur and small business owner, it's hard to see how job creation will come back. A March Small Business Outlook Survey conducted by the U.S. Chamber of Commerce shows that concerns about over-regulation are the highest we've seen in the past year. Small business owners are hesitant to hire because of uncertainty created by the plethora of threatening regulations coming from and pending in Washington. There is something to be said about the correlation between the unemployment rate and the increasing concern about regulations coming out of Washington. America needs the government to step down and let true job creators lead the way to recovery. Page 17 of 89 Document1 ST. LOUIS URBAN DEBATE LEAGUE 2012-2013 AT: Econ – Hurts Consumers Increase in Security will lead to an increase in prices for the consumer Thibault et al, 2006—Marc Thibault is a researcher, Homeland Security Institute [Mary R Brooks is William A. Black Chair of Commerce, Dalhousie University, Mary Brooks was on a Fulbright Fellowship at George Mason University, Kenneth J Button is professor of public policy and director, Center for Transportation Policy and Logistics, George Mason University; George Mason Center for Infrastructure Protections and Homeland Security, The Response of the U.S. Maritime Industry to the New Container Security Initiatives, Transportation Journal, pgs. 5-15, Winter 2006, Proquest 6/19/12] The competitive nature of the shipping industry poses an additional challenge to increase the security of the maritime container supply chain. Vessel operators, ports, and marine terminals compete on the basis of price as well as security, safety, and on-time delivery. Each of these actors provides its customer with a desired level of service by utilizing different combinations of production factors. Each has a strong incentive to minimize its costs because a failure to do so may undermine its profits, excluding it from a shipping network and making it less competitive. Firms that provide higher levels of security than their competitors may have to raise their prices or cut back other types of service they provide their customers, facing the distinct possibility of losing customers to their competitors. Page 18 of 89 Document1 ST. LOUIS URBAN DEBATE LEAGUE 2012-2013 AT: Econ—Developing Countries Current programs impede exports from developing countries, which also harms US economy Laite 10—Georgetown University [Parker Stone, “Maritime Trade Security: Promoter of Terrorism?,” Thesis, 5/10, http://repository.library.georgetown.edu/bitstream/handle/10822/553351/laiteParker.pdf?sequence=1, 6/20/12] Though C-TPAT is likely to improve overall security to the global supply chain, components of the program act as non-tariff barriers to companies in the developing world. According to the program’s security criteria, importers must conduct a comprehensive assessment of their international supply chains including outsourced and contracted elements (e.g. foreign facilities, conveyance, and domestic warehousing) to receive a certification. They are required to work with these business partners to ensure that necessary security measures are in place and adhered to, and are responsible for establishing processes by which business partners are chosen.29 An Importer must also provide information indicating which of their business partners, eligible for C-TPAT, have and have not received a certification. Similarly, those business partners not eligible for the program (e.g. many companies in the developing world) must demonstrate that they have met C-TPAT security criteria.30 To cope with these regulations, many C-TPAT companies contractually require businesses to improve security, extending C-TPAT’s reach well beyond the borders of the United States.31 Lloyd’s Practical Shipping Guide, entitled Risk Management in Port Operations, Logistics and Supply-Chain Security, highlights some of the problems that arise from increased trade security regulations on developing countries: Regulations often serve as a ‘‘fear factor’’ for small companies with limited resources and the Internet-based paperwork can mean problems for those in rural or remote communities. Add to this the uncertainty of continuously revised regulations under an implement and amend approach, and it is not hard to reach the conclusion that security can drive away the faint-hearted supplier. Micro-businesses and artisans, the path to economic development in many developing countries, will see security as a barrier to growth.32 Similar concerns have been voiced at the United Nations Conference on Trade and Development. Members at a recent meeting on the Development of Multimodal Transport and Logistics Services. which “felt that the developing countries had difficulty in meeting the requirements of the C-TPAT, which would significantly affect their exports.”33 Since all C-TPAT importers must prove that the companies they work with at every point in the supply chain meet C-TPAT requirements, companies that cannot afford to meet these requirements – or are ineligible to participate in the program – are flagged for increased security checks by customs officials, resulting in a major non-tariff barrier into the U.S. market. Developing countries have motives for flooding the market—US creates non-tariff barriers that increase the cost of trade Laite 10—Georgetown University [Parker Stone, “Maritime Trade Security: Promoter of Terrorism?,” Thesis, 5/10, http://repository.library.georgetown.edu/bitstream/handle/10822/553351/laiteParker.pdf?sequence=1, 6/20/12] Many laud the benefits of these security initiatives, however, some are concerned that they create non- tariff barriers for trading partners and will “penalize developing countries who may not be able to afford the installation of the required facilities at their ports, and thus be unable to join the [initiatives].”7 In 2003, the OECD estimated the initial burden of implementing supply chain security measures on ship operators to be at least $1.3 billion, and $730 million per year thereafter, with most costs coming from management staff and security-related equipment expenditures. Similarly, the OECD analyzed the cost of system-wide procedural changes, like the United States’ 24-hour advance notice rule, which is estimated to cost approximately $281.7 million8. U.S. programs have also been perceived as non-tariff barriers by some of America’s closest allies. According to the European Commission, the reluctance of Customs and Border Protection (CBP) to allow foreign participation in C-TPAT is discriminatory and increases costs for European exporters. Similarly, CSI causes additional costs and delays in E.U.-U.S. shipments9. When combined with the fact that exporters in developing countries often pay two to three times as much in import customs and duties in destination countries as do exporters in developed countries, it is clear that significant trade barriers to developing countries pervade the new maritime trade security environment10. Page 19 of 89 Document1 ST. LOUIS URBAN DEBATE LEAGUE 2012-2013 Developing countries could flood the market—developed countries dependent on international maritime trade Laite 10—Georgetown University [Parker Stone, “Maritime Trade Security: Promoter of Terrorism?,” Thesis, 5/10, http://repository.library.georgetown.edu/bitstream/handle/10822/553351/laiteParker.pdf?sequence=1, 6/20/12] In today’s globalized world, almost no nation can rely solely on what it produces domestically. Most countries are involved in international trade at some level. Everything from raw materials like oil, copper, and lumber, to consumer goods like food and clothing are transported overseas. Without shipping, intercontinental trade would not exist, nor would the bulk transport of raw materials and the import and export of affordable food and manufactured goods 1. As the most cost-efficient method of bulk transport, over 90% of world trade is carried on the water. Worldwide maritime commerce supports 8.4 million jobs, and over $300 billion in personal income2. There are around 50,000 merchant ships trading internationally, which represent over 150 countries3. In the United States, maritime trade makes up 78% of all international trade4. Annually, U.S. maritime trade amounts to nearly 1.6 billion tons of cargo, valued at over $2 trillion and generating over $21 billion in U.S. customs revenue. This reliance on international maritime trade, however, has not benefited all countries equally. A recent study analyzed the role of maritime freight costs in determination of ocean-shipped imports. By disaggregating imports (including detailed freight charges) from trading partners of 43 countries, the study found that in 2007 maritime transport costs made up about 6 percent of a product’s total cost. On average, this totaled a cost-per-weight shipping rate of about $59 per ton of merchandise. The study concluded that the cost of exporting from developing countries was significantly higher than the cost of exporting from countries within the Organization for Economic Cooperation and Development (OECD), and that it was cheaper to import into developing countries than into OECD countries5. This disparity in shipping costs has significant implications for those in the developing word. The higher cost of shipping for developing countries makes it more difficult for these countries to export their goods to the global market. Conversely, the lower import costs into developing countries makes it easier for OECD-origin products to “flood” the developing world with their products. The Graph 4.1 reveals a significant uptick in shipping costs starting in the 2001-2002 timeframe. This is likely due in part to the trade barriers that resulted because of trade security measures implemented around the world after 9/11. Page 20 of 89 Document1 ST. LOUIS URBAN DEBATE LEAGUE 2012-2013 Programs are non-tariff barriers to developing countries—small suppliers no longer exporting Laite 10—Georgetown University [Parker Stone, “Maritime Trade Security: Promoter of Terrorism?,” Thesis, 5/10, http://repository.library.georgetown.edu/bitstream/handle/10822/553351/laiteParker.pdf?sequence=1, 6/20/12] Although CSI arguably improves U.S. maritime supply-chain security, it also serves as a non-tariff barrier to developing countries whose smaller ports are often unable to afford CSI participation costs.43 The program incentivizes the use of CSI ports. Because goods are scanned prior to their arrival at U.S. ports, resulting in shorter wait times and fewer security checks, a significant number of shipping companies have moved away from smaller non-CSI ports to keep their competitive advantage. The expense of meeting CSI requirements (especially to small port facilities that need to upgrade their systems to handle electronic shipping manifest data, hire new security personnel, and purchase Gamma and X-ray machines, bio sensors, and advanced container locks) limits membership to only the larger and more modern port facilities. According to Luciano Pugliatti of Crown Agents, an NGO working to help developing nations modernize their customs infrastructure, “customs in less-developed countries face problems of corruption, under-capacity, outmoded inspection methods, and loss of national revenue to fraud and smuggling. Such nations don't have the money to buy high-tech inspection equipment, nor do they have the trained personnel to run them."44 India fears that CSI has “imposed additional costs on exports to the United States...[and] may penalize developing countries who may not be able to afford the installation of the required facilities at their ports, and thus are unable to join the US initiative."45 Similarly, Malaysia, is concerned about “who would bear the cost if unloading was delayed or if consignments were detained for further inspection.” 46 Based on documentation fees levied by carriers, the OECD estimates the overall implementation costs of the 24- hour rule to be approximately $281.7 million. This number, however, does not cover the costs associated with delays, liabilities, or fines.47 According to the United Nations Conference on Trade and Development (UNCTD), "non-CSI ports may find it difficult to stay competitive, and as far as U.S. trade is concerned may sooner or later be used only for pre-carriage purposes goods being loaded at one of these ports on feeder vessels to join the nearest CSI port."48 This would disproportionately increase shipping distances and costs for developing countries. Shipping experts like Pugliatti fear that, as a result, increased supply-chain security measures could negate the trade facilitation and modernization that has taken place in the developing world over the past decade by the widening gulf between developed and underdeveloped nations.”49 CSI disadvantages Exporters in the EU as well. According to the EU’s 2009 annual report on US trade and investment barriers, CSI is causing “significant additional costs and delays to shipment of European machinery and electrical equipment to the United States.”50 As a result, a number of small European engineering companies have stopped exporting to the United States.51 The majority of CSI ports are in developed countries; only 12 of 58 (21 percent) CSI ports are located in the developing world.52 Page 21 of 89 Document1 ST. LOUIS URBAN DEBATE LEAGUE 2012-2013 AT: Econ – Can’t solve Internationally Any shipments across water to reach the US often go through many countries and people Lukas, 2004—Analyst with Cato's Center for Trade Policy Studies and U.S. Trade Representative [Title: Protection without protectionism: Reconciling Trade and Homeland Security, April 8 2004, Lukas is also an analyst at the Cato Institute’s Center for Trade Policy Studies. CATO foundation site, http://www.cato.org/pubs/tpa/tpa027.pdf, accessed Jun 19 2012] The manufacturer, the freight forwarder, the railroad, the port authority in Hong Kong, the shipping company, the Port of Manila, the Port of Los Angeles, and an American trucking company all have some control over it at different stages. This scenario is not unusual; indeed, many shipments follow paths far more convoluted than the one described above. According to the Organization for Economic Co-operation and Development, the typical door-todoor journey using a shipping container will involve the interaction of about 25 different actors, generate 30– 40 documents, use 2–3 different transportation modes, and be handled at 12 to 15 physical locations. There are many points during this imaginary journey where the shipment could be susceptible to terrorist infiltration or tampering: at the manufacturer; during or before packing; during movement by rail, especially when the train is stationary at a switching station or side track; at the port in Hong Kong; during the voyage by sea; and finally, at the port in Los Angeles before clearing customs. In addition, if the container had landed in Canada or Mexico and then traveled to the United States by ground—as many cargos do—that would create more points of vulnerability. The fact that thieves regularly violate the integrity of the cargo chain—with worldwide thefts estimated at $30–50 billion per year by the OECD—illustrates the leakiness of today’s international trade environment.19 The ideal security system would offer what experts call “Total Asset Visibility and Authentication”— integrated procedures and technologies that safeguard cargos at all stages of transport. Total Asset Visibility and Authentication would require (1) loading of shipments in a secure facility, by authenticated personnel; (2) verification of the contents of a shipment; (3) security in transit; (4) transmitting the content and manifest information to Customs and stakeholders upon loading; (5) the ability to identify container tampering; and (6) a way for Customs to provide verification of a container’s contents and integrity in a nonintrusive manner at the point of entry. Page 22 of 89 Document1 ST. LOUIS URBAN DEBATE LEAGUE 2012-2013 AT: Econ – No impact 9/11 proves Previous terrorist attacks were not the fault for a slow US economy Learner and Thronburg 2006 - Director of the UCLA Anderson Forecast, Chief Economist of the Ceridian-UCLA Pulsel of Commerce, Christopher Thornberg is a founding principal of Beacon Economics [ Chirstopher Thornberg, Edward E Learner, Jon D. Haveman and Howard J. Shatz (editors), Stephen S. Cohen, Peter Gordon, Jon D. Haveman, Matthew C. Hipp, Seth K. Jacobson, \ James E. Moore, II, Qisheng Pan, Harry W. Richardson, Howard J. Shatz, Jay Stowsky, , Ernesto Vilchis, and Amy B. Zegart , Protecting the Nation’s Seaports: Balancing Security and Cost, 2006, http://www.ppic.org/main/publication.asp?i=698, 6/20/12] Similarly, the U.S. economy did not slow down after the September 11 attacks; indeed, the economy was accelerating its way out of the 2001 business-led downturn that had begun in the middle of although consumer confidence fell sharply after the attacks, consumer spending in the fourth quarter grew at an unprecedented 7 percent seasonally adjusted annual rate (SAAR), one of the sharpest increases seen in the past decade (Figure 2.2). Unemployment did rise sharply after the event, but this seemed to be primarily an acceleration of the employment loss that would have been expected given the weak economic climate. This was especially true because labor markets were still overheated from the techin the midst of 2000. And fueled economic boom of the late nineties. Retail sales did drop sharply in September 2001 but also rebounded sharply in October and returned to trend in November—business delayed, not business cancelled. Indeed, it is hard to find any evidence of an effect of the September 11 attacks on the aggregate economy, with the exception of that on the air travel industry. Even in that case, the industry was in deep trouble beforehand, with profit margins dipping into the red in the beginning of 2000—long before the attacks. Even then, it must be remembered that total consumer spending went up, so the dollars that were not spent on air travel went to some other part of the economy. Page 23 of 89 Document1 ST. LOUIS URBAN DEBATE LEAGUE 2012-2013 AT: Econ – No impact natural disasters prove Natural Disasters Do Not Cause Recessions Learner and Thronburg 2006 - Director of the UCLA Anderson Forecast, Chief Economist of the Ceridian-UCLA Pulsel of Commerce, Christopher Thornberg is a founding principal of Beacon Economics [ Chirstopher Thornberg, Edward E Learner, Jon D. Haveman and Howard J. Shatz (editors), Stephen S. Cohen, Peter Gordon, Jon D. Haveman, Matthew C. Hipp, Seth K. Jacobson, \ James E. Moore, II, Qisheng Pan, Harry W. Richardson, Howard J. Shatz, Jay Stowsky, , Ernesto Vilchis, and Amy B. Zegart , Protecting the Nation’s Seaports: Balancing Security and Cost, 2006, http://www.ppic.org/main/publication.asp?i=698, 6/20/12] More local effects of disasters are easier to see in the data. The three state charts in Figure 2.3 show indexes of the quarterly path of real personal income (adjusted for changes in the consumer price index) for substantial catastrophes in Florida, California, and New York. Hurricane Andrew, the Northridge earthquake, and the September 11 attacks each caused approximately $25 billion to $30 billion worth of destruction in each state’s economy, in constant (2004) dollars. The charts give a rough approximation of the disturbance to the local flow of the economy—business disturbances should result in loss of economic output, and thus income. (Government transfers have been removed to exclude federal disaster relief payments.) In all three cases we also show personal income for the balance of the United States as frame of comparison. The quarter in which the disaster event occurred is highlighted. a Recessions are not caused by natural disasters Learner and Thronburg 2006 - Director of the UCLA Anderson Forecast, Chief Economist of the Ceridian-UCLA Pulsel of Commerce, Christopher Thornberg is a founding principal of Beacon Economics [ Chirstopher Thornberg, Edward E Learner, Jon D. Haveman and Howard J. Shatz (editors), Stephen S. Cohen, Peter Gordon, Jon D. Haveman, Matthew C. Hipp, Seth K. Jacobson, \ James E. Moore, II, Qisheng Pan, Harry W. Richardson, Howard J. Shatz, Jay Stowsky, , Ernesto Vilchis, and Amy B. Zegart , Protecting the Nation’s Seaports: Balancing Security and Cost, 2006, http://www.ppic.org/main/publication.asp?i=698, 6/20/12] All this indicates that disasters, although tragic, are not recession- causing events. Recessions are caused by a sharp, substantial, and sustained reduction in spending by one or more segments of the economy. Typically, this segment is consumer spending on homes and durables, but not always. In the case of the 1953 recession, and in the case of the 2001 recession, Department of Defense spending on the Korean War, and business spending on equipment and software, were the respective segments that experienced reductions. Natural disasters might cause a sharp and substantial decline in consumer spending, but that decline is very short-lived. Within a month or two, there is more consumer spending, not less, because of repair and rebuilding activities. The hype of the effect of a disaster is typically much greater than the reality. Business is only delayed, not cancelled, and the economy can quickly get back on track.2 Page 24 of 89 Document1 ST. LOUIS URBAN DEBATE LEAGUE 2012-2013 A2 Terrorism Page 25 of 89 Document1 ST. LOUIS URBAN DEBATE LEAGUE 2012-2013 1NC Current methods are effective for employee screening—tamper proof and biometric Rockwell 2012- Washington Correspondent for Security News for Government Security News. (Mark, “TSA and U.S. Coast Guard Extend TWIC Renewal” Government Security News, 6/18/2012 <http://www.gsnmagazine.com/node/26569c=maritime_port_security> 6/19/12) The Transportation Security Administration and the U.S. Coast Guard have implemented a new option for ship crews and port workers to renew their security documentation. The two agencies announced a new policy for Transportation Worker Identification Credential (TWIC) cards on June 15 that allows a temporary extension. TWIC cards are the tamper-resistant biometric credential given to maritime workers for unescorted access to secure areas of port facilities, outer continental shelf facilities and ships. Those that need unescorted access to secure areas aboard ships and all Coast Guard credentialed merchant mariners have to possess a TWIC. To get the card, workers have to provide biographic and biometric information, such as fingerprints, sit for a digital photograph and successfully pass a security threat assessment conducted by TSA. Page 26 of 89 Document1 ST. LOUIS URBAN DEBATE LEAGUE 2012-2013 The aff makes the terrorist smarter than they are- this helps them recruit and leads us to over defend ports they aren’t capable of attacking Bynum 10 – Ph.D in political science (Daniel Bynum; Staff Member of the 9/11 Commission , Policy Analyst and Director for Research, Center for Middle East Public Policy, The RAND Corporation, Director of the Center for Peace and Security Studies and the Security Studies Program at the Edmund A. Walsh School of Foreign Service Georgetown University, and holds a Ph.D in Political Science; Written June 14, 2010; Accessed June 19, 2012; Brookings; http://www.brookings.edu/research/opinions/2010/06/14-terrorism-byman, “Most Terrorists Lack Training, Expertise”) In the years after 9/11, the images we were shown of terrorists were largely the same: shadowy jihadists who, even when they were foiled, seemed always to have come terrifyingly close to pulling off a horrific attack. We’ve all become familiar by now with the stock footage of Talibs in black shalwar kameezes zipping across monkey bars or, more recently, perfecting kung fu kicks in some secret training camp. Even in the aftermath of the botched Times Square bombing earlier this spring, the perception persists that our enemies are savvy and sophisticated killers. They’re fanatical and highly organized—twin ideas that at once keep us fearful and help them attract new members. But this view of the jihadist community is wildly off the mark. To be sure, some terrorists are steely and skilled—people like Mohamed Atta, the careful and well-trained head of the 9/11 hijackers. Their leaders and recruiters can be lethally subtle and manipulative, but the quiet truth is that many of the deluded foot soldiers are foolish and untrained, perhaps even untrainable. Acknowledging this fact could help us tailor our counterterrorism priorities—and publicizing it could help us erode the powerful images of strength and piety that terrorists rely on for recruiting and funding. Nowhere is the gap between sinister stereotype and ridiculous reality more apparent than in Afghanistan, where it’s fair to say that the Taliban employ the world’s worst suicide bombers: one in two manages to kill only himself. And this success rate hasn’t improved at all in the five years they’ve been using suicide bombers, despite the experience of hundreds of attacks—or attempted attacks. In Afghanistan, as in many cultures, a manly embrace is a time-honored tradition for warriors before they go off to face death. Thus, many suicide bombers never even make it out of their training camp or safe house, as the pressure from these group hugs triggers the explosives in suicide vests. According to several sources at the United Nations, as many as six would-be suicide bombers died last July after one such embrace in Paktika. Many Taliban operatives are just as clumsy when suicide is not part of the plan. In November 2009, several Talibs transporting an improvised explosive device were killed when it went off unexpectedly. The blast also took out the insurgents’ shadow governor in the province of Balkh. When terrorists do execute an attack, or come close, they often have security failures to thank, rather than their own expertise. Consider Umar Farouk Abdulmutallab—the Nigerian “Jockstrap Jihadist” who boarded a Detroit-bound jet in Amsterdam with a suicidal plan in his head and some explosives in his underwear. Although the media colored the incident as a sophisticated al-Qaeda plot, Abdulmutallab showed no great skill or cunning, and simple safeguards should have kept him off the plane in the first place. He was, after all, traveling without luggage, on a one-way ticket that he purchased with cash. All of this while being on a U.S. government watch list. Fortunately, Abdulmutallab, a college-educated engineer, failed to detonate his underpants. A few months later another college grad, Faisal Shahzad, is alleged to have crudely rigged an SUV to blow up in Times Square. That plan fizzled and he was quickly captured, despite the fact that he was reportedly trained in a terrorist boot camp in Pakistan. Indeed, though many of the terrorists who strike in the West are well educated, their plots fail because they lack operational know-how. On June 30, 2007, two men—one a medical doctor, the other studying for his Ph.D.—attempted a brazen attack on Glasgow Airport. Their education did them little good. Planning to crash their propane-and-petrol-laden Jeep Cherokee into an airport terminal, the men instead steered the SUV, with flames spurting out its windows, into a security barrier. The fiery crash destroyed only the Jeep, and both men were easily apprehended; the driver later died from his injuries. (The day before, the same men had rigged two cars to blow up near a London nightclub. That plan was thwarted when one car was spotted by paramedics and the other, parked illegally, was removed by a tow truck. As a bonus for investigators, the would-be bombers’ cell phones, loaded with the phone numbers of possible accomplices, were salvaged from the cars.) A similar streak of ineptitude has been on display in the United States, where many of those arrested on terrorism-related charges possess long criminal records and little sense of how to put a nefarious idea into action. A group of Miami men schemed (often while smoking marijuana) to attack targets in South Florida as well as the Sears Tower in Chicago, but they couldn’t get their hands on explosives and were uncovered when the FBI easily penetrated their ranks. If our terrorist enemies have been successful at cultivating a false notion of expertise, they’ve done an equally convincing job of casting themselves as pious warriors of God. The Taliban and al-Qaeda rely on sympathizers who consider them devoted Muslims fighting immoral Western occupiers. But intelligence picked up by Predator drones and other battlefield cameras challenges that idea—sometimes rather graphically. One video, captured recently by the thermal-imagery technology housed in a sniper rifle, shows two Talibs in southern Afghanistan engaged in intimate relations with a donkey. Similar videos abound, including groundsurveillance footage that records a Talib fighter gratifying himself with a cow. Pentagon officials and intelligence analysts concede privately that our foes also have a voracious appetite for pornography—hardly shocking behavior for young men, but hard to square with an image of piety. Many laptops seized from the Taliban and al-Qaeda are loaded with smut. U.S. intelligence analysts have devoted considerable time to poring over the terrorists’ favored Web sites, searching for hidden militant messages. “We have terabytes of this stuff,” said one Department of Defense al-Qaeda analyst, speaking on the condition of anonymity. “It isn’t possible that they are encrypting messages in all of this stuff. Some of these guys are just perverts.” Tawdry though this predilection for porn Page 27 of 89 Document1 ST. LOUIS URBAN DEBATE LEAGUE 2012-2013 may be, it is not necessarily trivial. There is, after all, potential propaganda value in this kind of jihadist behavior. Current U.S. public diplomacy centers on selling America to the Muslim world, but we should also work to undermine some of the myths built up around our enemies by highlighting their incompetence, their moral failings, and their embarrassing antics. Beyond changing how the Muslim world perceives terrorists, we can help ourselves make smarter counterterrorism choices by being more realistic about the profile and aptitude of would-be attackers. More and more, as we work to disrupt training efforts, the jihadists we face are likely to be poorly prepared, and while that won’t always ensure a bungled attack, it suggests that terrorists are likely to select targets that are undefended and easy to hit. The United States has spent billions on port security since 9/11, even though terrorists have shown little interest in ports as targets and even less ability to actually strike them. In contrast, even small investments in training for police and airport-security personnel can make a big difference, as these are the people most likely to encounter—and have a chance to disrupt—an unskilled attacker. The difference between a sophisticated killer like Mohamed Atta and so many of his hapless successors lies in training and inherent aptitude. Atta spent months learning his trade in Afghanistan and had the help of al-Qaeda’s senior leadership—a fact that underscores the importance of rooting out al-Qaeda havens in Pakistan. After all, fighting terrorism is a chore made simpler when we can keep the terrorists as inept as most of them naturally are. Page 28 of 89 Document1 ST. LOUIS URBAN DEBATE LEAGUE 2012-2013 No more funding is needed—high risk of overlap in existing grant programs GAO 2012 (“HOMELAND SECURITY: DHS Needs Better Project Information and Coordination among Four Overlapping Grant Programs” Government Accountability Office 2/12 <http://www.gao.gov/products/GAO-12-303> 6/22/12) Multiple factors contribute to the risk of duplication among four FEMA grant programs that GAO studied—the State Homeland Security Program (SHSP), Federal Emergency Urban Areas Security Initiative (UASI), Port Security Grant Program, and Transit Security Grant Program. Specifically, these programs share similar goals, fund similar projects, and provide funds in the same geographic regions. Further, DHS’s ability to track grant funding, specific funding recipients, and funding purposes varies among the programs, giving FEMA less visibility over some grant programs. Finally, DHS’s award process for some programs bases decisions on high-level, rather than specific, project information. Although GAO’s analysis identified no cases of duplication among a sample of grant projects, the above factors collectively put FEMA at risk of funding duplicative projects . FEMA officials stated that there is a trade-off between enhancing management visibility and reducing administrative burden, but also recognized that FEMA should use more specific project-level information for award decisions and have taken initial steps towards this goal. For example, FEMA is considering how to better use existing grant information and has also begun to phase in a However, FEMA has not determined all of its specific data requirements. As FEMA determines these requirements, it will be important to collect the level of information needed to compare projects across grant programs . Given the limitations in currently collected information, FEMA would benefit from collecting information with greater detail as this could help FEMA better position itself to assess applications and ensure that it is using its resources effectively. FEMA, as well as state and local stakeholders, have taken steps to improve coordination in administering the four programs, but FEMA could take further action. For example, FEMA does not internally coordinate application reviews across the four programs. Specifically, the programs are managed by two separate FEMA divisions which review grant applications for each program separately and there is no process in place to ensure that application information is shared among the programs during this process. Thus, it is difficult for FEMA to identify whether grant monies are being used for the same or similar purposes. FEMA could benefit from further examining its internal grant coordination grants management system that includes an explicit goal of collecting project-level information. process, while considering the large volume of grant applications it must process. FEMA introduced some performance measures for the UASI and SHSP programs in 2011 that add value, but these measures do not assess program effectiveness. FEMA has efforts under way to develop outcome measures—that will focus on program effectiveness—for each of the four grant programs in this review, but has not completed these efforts. Further, the FEMA project plan that guides these efforts does not provide information on what measures will be implemented for each grant program and when this will occur. A revised project plan that includes more specific schedule information and accurate implementation timelines could help guide these efforts. DHS also has several efforts under way to measure the collective effectiveness of its grant programs in achieving shared program goals, but these efforts are recent and ongoing. Thus, it is too soon to evaluate the extent to which these initiatives will provide FEMA with the information it needs to determine whether these grant programs are effectively improving the nation’s security. Page 29 of 89 Document1 ST. LOUIS URBAN DEBATE LEAGUE 2012-2013 Economists’ predictions of the effect of a terrorist attack on the economy are highly exaggerated Learner and Thronburg 2006 - Director of the UCLA Anderson Forecast, Chief Economist of the Ceridian-UCLA Pulsel of Commerce, Christopher Thornberg is a founding principal of Beacon Economics [ Chirstopher Thornberg, Edward E Learner, Jon D. Haveman and Howard J. Shatz (editors), Stephen S. Cohen, Peter Gordon, Jon D. Haveman, Matthew C. Hipp, Seth K. Jacobson, \ James E. Moore, II, Qisheng Pan, Harry W. Richardson, Howard J. Shatz, Jay Stowsky, , Ernesto Vilchis, and Amy B. Zegart , Protecting the Nation’s Seaports: Balancing Security and Cost, 2006, http://www.ppic.org/main/publication.asp?i=698, 6/20/12] Previous Port Closures Hold Lessons for the Present When economists trying to make predictions are faced with a long list of unknowns, they can either develop complex models to help answer the questions before them or look to historical events that might provide lessons for the future. The complex questions stemming from a terrorist attack on the port complex cannot be answered easily within a typical static input-output (IO) model, because the economy is flexible and will work to mitigate the potential damage caused by a supply chain disruption. Input-output models assume a mechanical structure in which a resource unused in one place remains unused. For example, there is an assumption that a laid-off worker will not try to find new employment, or that a factory, denied a critical component, will simply shut down instead of finding an alternative supplier. Of course, these assumptions are not true. Input-output models tend to highly exaggerate the true cost (and also the true benefits under other circumstances) of economic events. Terrorism won’t impact the economy – past labor strikes were worse for ports Learner and Thronburg 2006 - Director of the UCLA Anderson Forecast, Chief Economist of the Ceridian-UCLA Pulsel of Commerce, Christopher Thornberg is a founding principal of Beacon Economics [ Chirstopher Thornberg, Edward E Learner, Jon D. Haveman and Howard J. Shatz (editors), Stephen S. Cohen, Peter Gordon, Jon D. Haveman, Matthew C. Hipp, Seth K. Jacobson, \ James E. Moore, II, Qisheng Pan, Harry W. Richardson, Howard J. Shatz, Jay Stowsky, , Ernesto Vilchis, and Amy B. Zegart , Protecting the Nation’s Seaports: Balancing Security and Cost, 2006, http://www.ppic.org/main/publication.asp?i=698, 6/20/12] Of course, a labor action is not the same as a terrorist attack; labor actions can be anticipated to some extent, whereas lack of anticipation is intrinsic to terrorist attacks. However, similarities remain. The labor actions of the sixties and seventies were often marked by wildcat strikes and work slowdowns, deliberately created to reduce or prevent mitigating actions on the part of the companies involved. Furthermore, there cannot now be an unexpected, surprise terrorist strike at U.S. ports. Because of the terrorist threat, many businesses have put in place redundancies and contingencies that will help mitigate the disruption caused by a port attack, just as they undoubtedly did in anticipation of the port strikes that loomed in the 1960s. Furthermore, it is our understanding from interviews with experts, that it is highly unlikely that the physical damage from an attack would be enough to close the combined ports of Los Angeles and Long Beach completely. The size of the port complex and the large amount of excess physical capacity would make it nearly impossible for a conventional attack to stop or even reduce substantially the amount of cargo that currently moves through the ports—as long as authorities intervened to allow displaced shippers to use other parts of the complex. The port might nonetheless be shut down if the dockworkers refused to work or were prevented from working by the government. Such a directive might affect all the ports on one or both coasts. Although the United States is considerably more trade-dependent today than in earlier periods, this potential vulnerability is offset by a number of factors. One is the shift from ship to aircraft for delivery of many high-value, time-sensitive goods, particularly on the export side. Second, countermeasures to a terrorist strike, such as increased inspections of containers, may be more onerous for imports coming from uncertain ports than for exports packaged in the United States. And although a widespread labor action would stop most maritime trade completely, a terrorist strike would only slow trade rather than stop it. When added together, these factors mean that the disruption to the flow of goods as a result of a current terrorist attack could be roughly similar in size to the effect of a major port strike in the 1960s. percent—this during a period when the United States regularly exported more goods than it imported. Page 30 of 89 Document1 ST. LOUIS URBAN DEBATE LEAGUE 2012-2013 Terrorist attacks would disrupt supply chains for only 60 days government is prepared Learner and Thronburg 2006 - Director of the UCLA Anderson Forecast, Chief Economist of the Ceridian-UCLA Pulsel of Commerce, Christopher Thornberg is a founding principal of Beacon Economics [ Chirstopher Thornberg, Edward E Learner, Jon D. Haveman and Howard J. Shatz (editors), Stephen S. Cohen, Peter Gordon, Jon D. Haveman, Matthew C. Hipp, Seth K. Jacobson, \ James E. Moore, II, Qisheng Pan, Harry W. Richardson, Howard J. Shatz, Jay Stowsky, , Ernesto Vilchis, and Amy B. Zegart , Protecting the Nation’s Seaports: Balancing Security and Cost, 2006, http://www.ppic.org/main/publication.asp?i=698, 6/20/12] We believe that the same would be likely after a terrorist attack on a port: Its effects are not likely to show up other than in imports and exports. Of course, our study presumes a short- to medium-term disruption to the supply chain, limited to approximately 60 days, as were the labor actions we study. It is our belief that lengthier disruptions are highly unlikely as long as the government is prepared to intervene. Nuclear Terrorism is unlikely – bomb materials rare and well defended Allison 4- Assistant Secretary of Defense under Clinton (Graham Allison; dean of Harvard's School of Government, Director of the Belfer Center for Science and International Affairs, Special Advisor to the Secretary of Defense under Reagan; Assistant Secretary of Defense under Clinton; recipient of the Defense Medal for Distinguished Public Service; Written November 16, 2004; “Nuclear Terrorism: The Ultimate Preventable Catastrophe”; http://www.carnegiecouncil.org/resources/transcripts/5049.html/_res/id=sa_File1/Nuclear_-Terrorism.pdf; Accessed June 25, 2012) Part II is the more controversial part of the book. The book's conceptual advance has largely gone unrecognized, certainly by the U.S. government, which is that this ultimate terrorist attack, this attack that could kill hundreds of thousands of Americans in one fell swoop, is preventable. However, there is no way, no level of activity, no degree of security, that we could organize that would prevent some future terrorist attacks on America. That will happen 100 percent in my view, and I think most of the national security community is unanimous about that . But the good news with respect to the worst form of terrorist attack, the ultimate terrorist attack, is that that kind of attack is preventable. So how can that be? The answer is because with respect to this ultimate terrorist catastrophe, there exists a strategic narrow to the problem, a chokepoint in effect, which we could choke, and which if we did choke would lead to the reduction of the likelihood of such an event to nearly zero. Now, how does that work? Fortunately, in order to make a nuclear explosion you have to have one of two very rare items or materials, either highly enriched uranium or plutonium. Neither of these materials exists in nature. Neither can be made in your bathtub or in your back yard or in your basement. Each requires a multibillion-dollar investment and a decade-long substantial facility in order to produce highly enriched uranium or plutonium. Iran, for example, has been working on this project for about eighteen years and is just now coming to conclusion. So it's not impossible for a state to do, but it requires a big and substantial—and, indeed, visible—effort. Now, unfortunately, if a terrorist short-circuits this process by starting with highly enriched uranium and plutonium, the rest of the process is rather straightforward. So with respect to the highly enriched uranium that exists today, which is a finite amount of stuff—a lot, but a finite amount—do human beings know how to lock up things successfully that we don't want people to steal? I ask: Does the United States lose any gold from Fort Knox? —Answer: not an ounce. Does Russia lose any treasures from the Kremlin Armory? —No, none. So could you imagine locking up nuclear weapons and material as good as gold Page 31 of 89 Document1 ST. LOUIS URBAN DEBATE LEAGUE 2012-2013 Improving the scanning program would impede trade and hurt the economy Terreri 09—World Trade [April, “The Current State of Port Security,” Web, 10/09, World Trade, Proquest, 6/20/12] Donnelly at NAM believes the 100 percent scanning directive is heading in the wrong direction. "It treats all cargo the same, spreading our limited enforcement resources across all shipments, rather than targeting shipments from riskier shippers from dubious places. Major transnational companies with overseas plants shipping to their own companies here in the U.S. every two weeks should not be subjected to the same intensive security review as an unknown shipper. Established shippers and importers have invested in government programs like C-TPAT and are sharing information to assure their supply chains are secure. Security Page 32 of 89 checks need to focus where the risks are the greatest." Document1 ST. LOUIS URBAN DEBATE LEAGUE 2012-2013 Emphasis on Port Defense is flawed- terrorists will attack easier non-port targets or find new ways around port security Shie 4- from the Institute for National Strategic Studies (Tamar Renee Shie; Institute for National Strategic Studies, National Defense University and a visiting author for CSIS; Written October 15, 2004, Accessed June 19, 2012, http://csis.org/files/media/csis/pubs/-pac0445a.pdf; “Ships and Terrorists – Thinking Beyond Port Security”; CSIS) First, the emphasis on upgrading the security of major ports neglects the fact that these represent only a single link in the transportation chain. A shipping container may pass through some 15 physical locations and some two dozen individuals and/or companies while traveling from departure point to destination. Because containers are only searched at the major port, there is no guarantee they cannot be waylaid in route after that point. Second, the CSI conducts security checks only on U.S. bound containers. Therefore even if a tampered container arrives at a major port, if it is destined for a port other than the U.S., it is more likely to escape notice. Containers between the major ports of Singapore and Shenzhen or Pusan and Hong Kong are not subject to CSI requirements. Yet terrorist assaults on U.S. ships or interests can occur outside the U.S. Third, as major ports increase security, terrorists will look for other maritime targets or other means to target those ports. Terrorists are increasingly aiming at soft targets. Attacking maritime targets has never been particularly easy, often requiring a greater sophistication in planning, training, and coordination than those aimed at many land-based facilities. This is why maritime terrorism is rather rare, and why terrorists are less likely to attack a more secure major port. Yet in considering maritime terrorist threat scenarios – using a ship to smuggle goods or weapons, sinking a vessel in a major shipping thoroughfare, using a ship as a weapon, or even targeting maritime vessels – none require access to a major port or a shipping container to carry out a strike. There remain numerous small ports and small vessels not covered under the new security initiatives. The ISPS Code for instance only covers ships of 500 tons or more and port facilities that serve large international-bound vessels. The Code would not have protected the USS Cole. How else might terrorists strike? Piracy in Southeast Asia may provide a clue as to how terrorists will respond to these new measures. In 2002, there were 161 actual and attempted pirate attacks in Southeast Asian waters. Of those, 73 percent occurred within ports. The following year, of the 187 attacks, only 37 percent occurred within ports. Between the two years, the total number of attacks increased by 26. In the first quarter of 2004, of the 41 reported attacks, only onethird were committed in ports. Also between 2002 and 2003 pirate attacks in traditionally targeted ports fell while they rose in ports where few if any attacks were previously reported. Though it may be too soon to definitively tell, it would appear that pirates are adapting to the more stringent security measures in larger ports. If pirates can do it, so can terrorists. Finally, an attack on a major port does not require terrorists to gain direct access to that port. As pirates are capable of attempting more attacks on vessels at sea, it is not unimaginable that terrorists will commandeer a ship at sea and steer it toward a target. The bomb, biological, chemical or radiological agents, or even nuclear materials, can be loaded onto the ship once seized. Then they head for a port or another ship. The May 2004 collision between two cargo ships off Singapore’s Sentosa Island illustrates how easily terrorists could conduct a similar but more disastrous operation. Page 33 of 89 Document1 ST. LOUIS URBAN DEBATE LEAGUE 2012-2013 Increased trade introduces invasive species, which can`t be fixed—international problem Keller 2011-worked at the Program on the Global Environment at the University of Chicago, Illinois (Reuben P., Charles Perrings- worked at the ecoSERVICES Group in the School of Life Sciences, Arizona State University, Tempe “International Policy Options for Reducing the Environmental Impacts of Invasive Species” Bioscience 12/11 ProQuest 6/20/12) Preventing the spread of nonnative invasive species is an international public good. Some categories of invasive species-such as diseases of humans and livestock-are addressed by international agreements that coordinate efforts to reduce their spread. In contrast, invasive species that primarily cause environmental impacts are managed almost exclusively at the national level. Control of environmental invaders is internationally undersupplied because the efforts of nations that do invest to prevent their spread are undercut by nations that do not. Addressing this problem will require international cooperation. We identify the international approach to controlling human diseases as a model that could provide institutions and mechanisms to map the spread of environmental invaders and assess the risks they impose. This would allow individual nations to manage potential vectors of invasion. Because such a system is unlikely to be implemented in the near future, we make recommendations for intermediate steps, including the widespread adoption of existing risk assessments and importation standards. Keywords: Convention on Biological Diversity, sanitary and phytosanitary agreement, World Health Organization, World Trade Organization, invasive species International trade increases human welfare but also leads to the introduction and establishment of nonnative invasive species, such as human and livestock diseases, pests and diseases of crops, and species that cause environmental harm. The increasingly global nature of trade means that efforts to prevent the spread of invasive species should be internationally coordinated. To this end, there are already relatively advanced international programs in place for identifying and managing the spread of human diseases, and the 178 member nations of the World Organisation for Animal Health (OIE) have agreed to report outbreaks of animal diseases, mostly diseases of livestock, to a central database. These programs allow nations to track invasive species threats and to use the shared information to impose import restrictions. Species known to be diseases and pests of crops are often the focus of quarantine inspections at national borders, but this varies by country and there is little international coordination. In contrast, nonnative invasive species that do not directly affect human health or agriculture are generally perceived to primarily pose risks of environmental harm. Few international agreements exist to control the spread of these species, and at an international scale, they are traded with much less inspection and fewer efforts to prevent their spread. This essay addresses the potential for wiser management of these species, which we refer to as environmental invaders. Despite the lack of international efforts to prevent their spread, environmental invaders have enormous environmental, economic, cultural, and human-health impacts (Pejchar and Mooney 2008, Sala et al. 2000). These include reductions in the populations of desirable native species as a result of predation, competition, parasitism, and disease. An example of this is the invasion of European waterways by North American crayfish, which both compete directly with native crayfish for resources and carry the crayfish plague disease (Aphanomyces astaci) that has devastated European crayfish populations (Gherardi and Holdich 1999). Economic impacts can arise in a variety of ways, including the costs of herbicides and pesticides to control nonnative invaders in national parks and the costs of cleaning industrial facilities that become infested with invaders (e.g., zebra mussel [Dreissena polymorpha] infestations of power plants in the Laurentian Great Lakes require the facilities to close down while workers clean pipes; Leung et al. 2002). Cultural and human-health impacts can also arise in many ways, but a good example comes from cases in which invasive species become so prolific that farmers abandon agricultural land, leading to the loss of traditional farmland and agricultural practices and potentially to human-health impacts from reduced food supplies. This has occurred in Mexico, where it is no longer feasible in some areas to control the invasive bracken fern (Pteridium aquilinum; Schneider and Geoghegan 2006). The introduction of environmental invaders is an externality of trade (Perrings et al. 2002, 2005). That is, the impacts of these species are not incorporated into the costs of doing trade, and those who trade the species have no economic incentive to reduce the invasion risks inherent in their business. For example, the global horticultural trade is responsible for many thousands of invasions of harmful plants and plant diseases around the world (Reichard and White 2001, Dehnen-Schmutz et al. 2007). However, the environmental costs are not borne by either exporters or importers. Instead, these costs are spread widely among society as government agencies spend taxpayer dollars on inspection, interception, eradication, containment, and compensation. Two factors have hampered efforts to slow the international spread of environmental invaders. First, although nations generally act defensively to control invasive species, the benefits arising from that control are almost always shared broadly among those at risk of being invaded, not just among those who pay for the control (Perrings et al. 2002). For example, if a country spends resources to ensure a disease-free horticultural industry, all nations to which it imposed by this trade Page 34 of 89 Document1 ST. LOUIS URBAN DEBATE LEAGUE 2012-2013 exports benefit from a reduced likelihood that they will be invaded. In the absence of cooperation, however, individual countries will protect their own borders but are less likely to commit resources to preventing the export of invaders. Because the invasion risk to which a country is exposed depends on the actions of its neighbors and trading partners, this means that countries face higher risks than they would if there were greater cooperation. Second, controlling the spread of an invasive species is a "weakest-link" public good (Perrings et al. 2002). Although the risks posed by any nation will depend on a complex set of climatic, biogeophysical, and social factors, including the type of trade they engage in and its volume, the overall global risk will be strongly determined by the nations or trades that operate the least effective programs to control species transport. Because removal of an invasive pest from trade requires all those involved to contribute, and because little is gained by providing more than the country making the smallest contribution, there is an incentive to adopt a matching strategy-to converge on the weakest link. This is because unilateral action cannot prevent the pest from continuously spreading through trade (Touza and Perrings 2011). Nevertheless, even though enhancing cooperative efforts should be the ultimate goal of a collective strategy to manage the problem of environmental invasions, there is much that can be done independently. In this article, we identify alternative strategies at the national and international levels for reducing the spread of environmental invaders with or without cooperation. We begin by reviewing existing unilateral defensive efforts to reduce exposure and by identifying programs that have been successful and could be implemented more widely without the need for additional international policy. We then consider the options for effective coordinated international management, building on existing commitments by countries under the Convention on Biological Diversity (CBD) and on the international success achieved in managing human diseases. Finally, we discuss the options for achieving at least some of the gains that could be had from coordinated action without the need for renegotiation of any multilateral agreement. Figure 1 summarizes our recommendations. National efforts to manage the spread of environmental invaders Under the World Trade Organization (WTO) and its constituent agreements, particularly the General Agreement on Tariffs and Trade (GATT) and the Agreement on the Application of Sanitary and Phytosanitary Measures (SPS), individual countries have the right to take actions in restraint of trade if those actions are needed in order to protect food safety and animal or plant health. In contrast to those that deal with human diseases, these agreements authorize only national defensive measures. That is, individual nations have direct responsibility for managing risks to themselves posed by the many vectors of nonnative species introduction (table 1) but are not permitted under the GATT and the SPS agreement to cooperate in the collective control of pest or pathogen transmission through trade restrictions. The standard-setting bodies for the SPS agreement-the International Plant Protection Convention (IPPC), the OIE, and Codex Alimentarius-do cooperate in setting sanitary and phytosanitary standards and reporting requirements for member countries. This has led to the harmonization of rules on classes of traded commodities involving known risks. The OIE has also coordinated veterinary campaigns against particular pathogens within member countries and has achieved success in the eradication of rinderpest, one of the most damaging of all animal pathogens (Normile 2008). But only in the case of novel human diseases does there exist an agreement to take collective action in restraint of trade as a precautionary measure. Environmental invaders can be transported to a country through intentional or unintentional vectors. Regardless of the vector, it is widely accepted that the most cost-effective way to reduce total impacts from nonnative invasive species is to prevent their arrival and establishment (see figure 1a, 1b; IUCN 2000, Leung et al. 2002, Lodge et al. 2006, Keller et al. 2007, 2009). That is, preventing the arrival of an invasive species will generally lead to less harm than addressing the species after it enters a country. Nations can choose from a range of options to prevent a species' arrival, including restrictions on trade in species of concern, requirements on exporters to ensure that invaders do not leave their shores or do not survive transit, and the operations of quarantine and inspection facilities at the point of entry (Lodge et al. 2006). Importantly, policies focused on prevention have more opportunities to shift the burden of responsibility to the industries that profit from risky trade in live organisms (Perrings et al. 2005). As an example of a prevention program, most plant shipments to the United States must be accompanied by a phytosanitary certificate to show that they were produced at a facility following high standards for the control of plant diseases and parasites. This system puts the costs of obtaining certificates and those of producing relatively safe plants onto exporters. In contrast, established plant pest species can generally be controlled only through expensive techniques such as manually pulling plants or the use of herbicides and pesticides. Because it is almost never possible to determine the party responsible for an invasion, these costs have never (to the best of our knowledge) been passed on to importers or consumers who benefited from imports. Intentionally introduced species, including pets, crops, and garden plants (table 1), provide many economic and social benefits. They also often become environmental invaders or act as vectors for environmental invaders (Jeschke and Strayer 2005). Efforts to reduce imports of environmental invaders generally consist of individual-species risk assessments so that resources can be focused on those species posing the highest risk. Because the proportion of traded species that become invasive is generally low (Smith et al. 1999), this approach leaves most species-those with low risk of invasion-unaffected. The approach has been shown to yield financial benefits for importing countries (Keller et al. 2007), whereas fewer invasions confers environmental, social, and agricultural benefits. The most prominent riskassessment procedure currently available is the Australian Weed Risk Assessment (WRA; Pheloung 1995). Australian government scientists developed this tool in the early 1990s, and in 1997, it was introduced as a mandatory screening tool for all new plant species proposed for introduction to Australia. Species assessed as posing a high risk are not allowed to be imported. The WRA has been demonstrated to have good accuracy in Australia, New Zealand, Florida, Hawaii, and the Czech Republic (Gordon et al. 2008). It has been adopted in a modified form by New Zealand. In contrast to intentional introductions, species transported unintentionally have some probability of becoming invasive but are not expected to provide benefits. This means that efforts to prevent their arrival can aim to simply remove all organisms from transport. Although this is conceptually simple, the number and magnitude of unintentional vectors makes preventing introductions an enormous challenge. For example, the global maritime fleet includes more than 99,000 large vessels and moves most international trade (IMO 2009). Each arriving ship presents risks of introducing new nonnative species entrained in its ballast water, attached to its Page 35 of 89 Document1 ST. LOUIS URBAN DEBATE LEAGUE 2012-2013 hull, and in the cargo it offloads (table 1; Keller et al. 2011). It is unlikely that any nation could commit sufficient resources to ensure that all arriving ships are free of invasive species. Each vector of unintentional species transport requires a different management approach. This approach needs to be based on the trade moving the species, the mode of transport, and the available technology. For example, the approaches necessary to limit the movement of fouling organisms of recreational boats are very different from those required to prevent the spread of invasive mollusks on watergarden plants or of forest pests in wooden packaging material. One relatively successful approach to limiting the spread of unintentional invaders is the US phytosanitary certificate system mentioned previously. This program aims to prevent the arrival of diseases, parasites, and plants that unintentionally accompany a traded species. It does this by requiring certain standards of plant and soil hygiene at facilities that grow plants for export to the United States. It is consistent with the United States' obligations as a signatory to the WTO's SPS agreement (Hedley 2004). Although the number of risk-assessment tools and vector management strategies continues to increase, they still provide protection against only a small proportion of the vectors that introduce invasive species. We offer two suggestions for improving this situation within the current international policy framework. First, some existing risk-assessment tools have been shown to perform well in a range of countries (e.g., Gordon et al. 2008), and other nations could adopt those tools. This was done by New Zealand when it adopted a modified version of the Australian WRA. In many cases, it may be possible for nations to relatively cheaply adopt tools developed elsewhere. Second, established national standards for treating vectors of unintentional introduction could be adopted by other countries. For example, the US Phytosanitary Certificate program could probably be adopted by other importing countries because many export facilities are already set up to achieve its standards. Further developing and applying these tools and standards would serve a double purpose by directly protecting those countries that adopt the procedures and by providing indirect protection to other nations that would subsequently be less likely to receive invaders from their trading partners. Although there are potential advances to be made in national defensive policies, these can never provide the level of protection that would arise from increased international cooperation (see figure 1c). Most vectors could be more efficiently rendered free of invasive species in their country of origin. This would, for example, reduce the demand on quarantine facilities at ports of entry. Such coordination is currently unlikely for at least three reasons. First and foremost, there are no international agreements or bodies that are mandated to implement such a coordinated approach. Second, the "free-rider" issue means that the financially rational approach for many countries is to take the benefits from trading with countries that implement higher standards but not to pay the costs to implement those standards in their own operations. Finally, many countries lack the resources, institutions, or political will to implement such policies. Without programs to transfer resources and expertise to these countries, they will remain weak links and will continue to pose a risk to all other nations. Page 36 of 89 Document1 ST. LOUIS URBAN DEBATE LEAGUE 2012-2013 Terrorist are rational and US response- incites more terrorist action Weihao 12 Ph.D Candidate (Weihao Yin is at Virginia TechReserach Assistant at Virginia Tech A NEW FRAMEWORK FOR MARITIME SECURITY INSPECTION UNDER U.S. SECURITY PROTOCOLS 12 PDF http://www.trforum.org/forum/downloads/2012_22_Maritime_Security_Inspection.pdf) Kanev (2005) defined terrorism as the behavior of rational individuals, not as a pathological deviation from an economic point of view. Moreover, Addison, T. and S. Murshed (2002) further pointed out terrorists’ actions of taking the lives of innocent victims serve just as instruments for achieving their political goals as well as economic benefits. At most occasion, terrorists are more concerned whether governments’ reactions such as social policy transformation are consistent with their desired goals or not. The way in which an administration reacts to a terrorist attack is usually to set up new and more aggressive security measures. However, not only do the organized terrorist actions but the ways in which terrorists react to counteraction to terrorism demonstrate their rationality. (Kanev, 2005) To illustrate, increasingly strict security regulations and deployment of advanced security equipment and facilities in airport are possibly reacted by terrorists with attacks on railway and maritime transportation. Therefore, appropriate measures taken will significantly counter the extreme actions of terrorists Page 37 of 89 Document1 ST. LOUIS URBAN DEBATE LEAGUE 2012-2013 2NC Terrorism: costs of port security too high Deterring terrorist by making cost higher than the reward Weihao 12 Ph.D Candidate (Weihao Yin is at Virginia TechReserach Assistant at Virginia Tech A NEW FRAMEWORK FOR MARITIME SECURITY INSPECTION UNDER U.S. SECURITY PROTOCOLS 12 PDF http://www.trforum.org/forum/downloads/2012_22_Maritime_Security_Inspection.pdf) If the target countries are considered as the providers of these two resources as benefits, then9 the terrorists are those who try to take possession of these two resources, and the cost they spend on their “purchasing behavior” is the money and time they spend on terrorist activities such as training participants or accomplices. Thus, terrorists are at the demand side, and the target countries are at the supply side. The behavioral assumption of rationality allows for the explanation of terrorists’ decisions on the number and size of terrorist acts as dependent on marginal benefits and costs of terrorism. Furthermore, the revenue of the supply side could be calculated as the attack intentions discarded by the terrorists due to effective measures taken for protection purposes. This means that by taking proper measures, it is possible to reduce the potential risk of terrorist activities. Furthermore, the target country is regarded as the only “manufacturer” who provides the desired resources in the marketplace such that this country has monopoly of the so-called supply. It has to be pointed out that terrorist groups’ ability to conduct an attack and their determination varies from group to group. If the cost to achieve their goals is prohibitively high, some terrorist groups may give up or at least reconsider their decision. Therefore, the elasticity of the demand may vary for different terrorist organizations, and based on this reason, price discrimination should be used to get the maximum revenue. It means differentiated security measures should be established to ensure that the protection work becomes more effective. More specifically, the segment of high elasticity should receive lower cost, while the resource for preventing terrorists’ action should be exerted in the market segment of low elasticity. Page 38 of 89 Document1 ST. LOUIS URBAN DEBATE LEAGUE 2012-2013 2NC Terrorism: Invasive Species Turn—increased terrorism initiatives make the country more vulnerable to invasive species—post-9/11 empirics prove Associated Press 2011 (“9-11 protections allowed invasive species a way in” The Daily Breeze 10/10/11 ProQuest 6/20/12) AGRICULTURE: A new focus on anti-terrorism took away attention from parasites. FRESNO - Dozens of foreign insects and plant diseases slipped undetected into the United States in the years after 9-11, when authorities were so focused on preventing another attack that they overlooked a pest explosion that threatened the quality of the nation's food supply. At the time, hundreds of agricultural scientists responsible for stopping invasive species at the border were reassigned to anti-terrorism duties in the newly formed Homeland Security Department - a move that scientists say cost billions of dollars in crop damage and eradication efforts from California vineyards to Florida citrus groves. The consequences come home to consumers in the form of higher grocery prices, substandard produce and the risk of environmental damage from chemicals needed to combat the pests. An Associated Press analysis of inspection records found that border-protection officials were so engrossed in stopping terrorists that they all but ignored the country's exposure to destructive new insects and infections - a quietly growing menace that has been attacking fruits and vegetables and even prized forests ever since. "Whether they know it or not, every person in the country is affected by this, whether by the quality or cost of their food, the pesticide residue on food or not being able to enjoy the outdoors because beetles are killing off the trees," said Mark Hoddle, an entomologist specializing in invasive species at the University of California, Riverside. Homeland Security officials acknowledge making mistakes and say they are now working to step up agricultural inspections at border checkpoints, airports and seaports. While not as dire as terrorism, the threat is considerable and hard to contain. Many invasive species are carried into the U.S. by people who are either unaware of the laws or are purposely trying to skirt quarantine regulations. The hardest to stop are fruits, vegetables and spices carried by international travelers or shipped by mail. If tainted with insects or infections, they could carry contagions capable of devastating crops. Plants and cut flowers can harbor larvae, as can bags of bulk commodities such as rice. Beetles have been found hitchhiking on the bottom of tiles from Italy, and boring insects have burrowed into the wooden pallets commonly used in cargo shipments. Invasive species have been sneaking into North America since Europeans arrived on the continent, and many got established long before 9-11. But the abrupt shift in focus that followed the attacks caused a steep decline in agricultural inspections that allowed more pests to invade U.S. farms and forests. Using the Freedom of Information Act, the AP obtained data on border inspections covering the period from 2001 to 2010. The analysis showed that the number of inspections, along with the number of foreign species that were stopped, fell dramatically in the years after the Homeland Security Department was formed. Over much of the same period, the number of crop-threatening pests that got into the U.S spiked, from eight in 1999 to at least 30 last year. The bugs targeted some of the nation's most productive agricultural regions, particularly California and Florida, with their warm year-round climates that make it easy for foreign species to survive the journey and reproduce in their new home. A look at the damage: No fewer than 19 Mediterranean fruit fly infestations took hold in California, and the European grapevine moth triggered spraying and quarantines across wine country. The Asian citrus psyllid, which can carry a disease that has decimated Florida orange groves, crossed the border from Mexico, threatening California's $1.8 billion citrus industry. New Zealand's light brown apple moth also emerged in California, prompting the government in 2008 to bombard the Monterey Bay area with 1,600 pounds of pesticides. The spraying drew complaints that it caused respiratory problems and killed birds. Officials spent $110 million to eradicate the moth, but it didn't work. The sweet orange scab, a fungal disease that infects citrus, appeared in Florida, Texas, Louisiana and Mississippi, which all imposed quarantines. Chili thrips, rice cutworms and the plant disease gladiolus rust also got into Florida, which saw a 27 percent increase in new pests and pathogens between 2003 and 2007. The erythrina gall wasp decimated Hawaii's wiliwili trees, which bear seeds used to make leis. Forests from Minnesota to the Northeast were also affected by beetles such as the emerald ash borer, many of which arrived in Chinese shipping pallets because regulations weren't enforced. In all, the number of pest cases intercepted at U.S. ports of entry fell from more than 81,200 in 2002 to fewer than 58,500 Page 39 of 89 Document1 ST. LOUIS URBAN DEBATE LEAGUE 2012-2013 in 2006, before creeping back up in 2007, when the farm industry and members of Congress began complaining. Once the pests get established, costs can quickly spiral out of control. The most widely quoted economic analysis, conducted in 2004 by Cornell University, puts the total annual cost of all invasive species in the U.S. at $120 billion. Much of that burden is borne by consumers in the form of higher food costs and by taxpayers who pay for government eradication programs. For instance, if the destructive infection known as citrus canker were to become established in California, which produces most of the nation's fresh oranges, consumers would pay up to $130 million more a year for the fruit , according to an ongoing study by scientists at University of California, Davis. Page 40 of 89 Document1 ST. LOUIS URBAN DEBATE LEAGUE 2012-2013 2NC Terrorism Improves terrorist tactics The aff makes the terrorist smarter than they are- this helps them recruit and leads us to over defend ports they aren’t capable of attacking Bynum 10 – Ph.D in political science (Daniel Bynum; Staff Member of the 9/11 Commission , Policy Analyst and Director for Research, Center for Middle East Public Policy, The RAND Corporation, Director of the Center for Peace and Security Studies and the Security Studies Program at the Edmund A. Walsh School of Foreign Service Georgetown University, and holds a Ph.D in Political Science; Written June 14, 2010; Accessed June 19, 2012; Brookings; http://www.brookings.edu/research/opinions/2010/06/14-terrorism-byman, “Most Terrorists Lack Training, Expertise”) In the years after 9/11, the images we were shown of terrorists were largely the same: shadowy jihadists who, even when they were foiled, seemed always to have come terrifyingly close to pulling off a horrific attack. We’ve all become familiar by now with the stock footage of Talibs in black shalwar kameezes zipping across monkey bars or, more recently, perfecting kung fu kicks in some secret training camp. Even in the aftermath of the botched Times Square bombing earlier this spring, the perception persists that our enemies are savvy and sophisticated killers. They’re fanatical and highly organized—twin ideas that at once keep us fearful and help them attract new members. But this view of the jihadist community is wildly off the mark. To be sure, some terrorists are steely and skilled—people like Mohamed Atta, the careful and well-trained head of the 9/11 hijackers. Their leaders and recruiters can be lethally subtle and manipulative, but the quiet truth is that many of the deluded foot soldiers are foolish and untrained, perhaps even untrainable. Acknowledging this fact could help us tailor our counterterrorism priorities—and publicizing it could help us erode the powerful images of strength and piety that terrorists rely on for recruiting and funding. Nowhere is the gap between sinister stereotype and ridiculous reality more apparent than in Afghanistan, where it’s fair to say that the Taliban employ the world’s worst suicide bombers: one in two manages to kill only himself. And this success rate hasn’t improved at all in the five years they’ve been using suicide bombers, despite the experience of hundreds of attacks—or attempted attacks. In Afghanistan, as in many cultures, a manly embrace is a time-honored tradition for warriors before they go off to face death. Thus, many suicide bombers never even make it out of their training camp or safe house, as the pressure from these group hugs triggers the explosives in suicide vests. According to several sources at the United Nations, as many as six would-be suicide bombers died last July after one such embrace in Paktika. Many Taliban operatives are just as clumsy when suicide is not part of the plan. In November 2009, several Talibs transporting an improvised explosive device were killed when it went off unexpectedly. The blast also took out the insurgents’ shadow governor in the province of Balkh. When terrorists do execute an attack, or come close, they often have security failures to thank, rather than their own expertise. Consider Umar Farouk Abdulmutallab—the Nigerian “Jockstrap Jihadist” who boarded a Detroit-bound jet in Amsterdam with a suicidal plan in his head and some explosives in his underwear. Although the media colored the incident as a sophisticated al-Qaeda plot, Abdulmutallab showed no great skill or cunning, and simple safeguards should have kept him off the plane in the first place. He was, after all, traveling without luggage, on a one-way ticket that he purchased with cash. All of this while being on a U.S. government watch list. Fortunately, Abdulmutallab, a college-educated engineer, failed to detonate his underpants. A few months later another college grad, Faisal Shahzad, is alleged to have crudely rigged an SUV to blow up in Times Square. That plan fizzled and he was quickly captured, despite the fact that he was reportedly trained in a terrorist boot camp in Pakistan. Indeed, though many of the terrorists who strike in the West are well educated, their plots fail because they lack operational know-how. On June 30, 2007, two men—one a medical doctor, the other studying for his Ph.D.—attempted a brazen attack on Glasgow Airport. Their education did them little good. Planning to crash their propane-and-petrol-laden Jeep Cherokee into an airport terminal, the men instead steered the SUV, with flames spurting out its windows, into a security barrier. The fiery crash destroyed only the Jeep, and both men were easily apprehended; the driver later died from his injuries. (The day before, the same men had rigged two cars to blow up near a London nightclub. That plan was thwarted when one car was spotted by paramedics and the other, parked illegally, was removed by a tow truck. As a bonus for investigators, the would-be bombers’ cell phones, loaded with the phone numbers of possible accomplices, were salvaged from the cars.) A similar streak of ineptitude has been on display in the United States, where many of those arrested on terrorism-related charges possess long criminal records and little sense of how to put a nefarious idea into action. A group of Miami men schemed (often while smoking marijuana) to attack targets in South Florida as well as the Sears Tower in Chicago, but they couldn’t get their hands on explosives and were uncovered when the FBI easily penetrated their ranks. If our terrorist enemies have been successful at cultivating a false notion of expertise, they’ve done an equally convincing job of casting themselves as pious warriors of God. The Taliban and al-Qaeda rely on sympathizers who consider them devoted Muslims fighting immoral Western occupiers. But intelligence picked up by Predator drones and other battlefield cameras challenges that idea—sometimes rather graphically. One video, captured recently by the thermal-imagery technology housed in a sniper rifle, shows two Talibs in southern Afghanistan engaged in intimate relations with a donkey. Similar videos abound, including groundsurveillance footage that records a Talib fighter gratifying himself with a cow. Pentagon officials and intelligence analysts concede privately that our foes also have a voracious appetite for pornography—hardly shocking behavior for young men, but hard to square with an image of piety. Many laptops seized from the Taliban and al-Qaeda are loaded with smut. U.S. intelligence analysts have Page 41 of 89 Document1 ST. LOUIS URBAN DEBATE LEAGUE 2012-2013 devoted considerable time to poring over the terrorists’ favored Web sites, searching for hidden militant messages. “We have terabytes of this stuff,” said one Department of Defense al-Qaeda analyst, speaking on the condition of anonymity. “It isn’t possible that they are encrypting messages in all of this stuff. Some of these guys are just perverts.” Tawdry though this predilection for porn may be, it is not necessarily trivial. There is, after all, potential propaganda value in this kind of jihadist behavior. Current U.S. public diplomacy centers on selling America to the Muslim world, but we should also work to undermine some of the myths built up around our enemies by highlighting their incompetence, their moral failings, and their embarrassing antics. Beyond changing how the Muslim world perceives terrorists, we can help ourselves make smarter counterterrorism choices by being more realistic about the profile and aptitude of would-be attackers. More and more, as we work to disrupt training efforts, the jihadists we face are likely to be poorly prepared, and while that won’t always ensure a bungled attack, it suggests that terrorists are likely to select targets that are undefended and easy to hit. The United States has spent billions on port security since 9/11, even though terrorists have shown little interest in ports as targets and even less ability to actually strike them. In contrast, even small investments in training for police and airport-security personnel can make a big difference, as these are the people most likely to encounter—and have a chance to disrupt—an unskilled attacker. The difference between a sophisticated killer like Mohamed Atta and so many of his hapless successors lies in training and inherent aptitude. Atta spent months learning his trade in Afghanistan and had the help of al-Qaeda’s senior leadership—a fact that underscores the importance of rooting out al-Qaeda havens in Pakistan. After all, fighting terrorism is a chore made simpler when we can keep the terrorists as inept as most of them naturally are. Page 42 of 89 Document1 ST. LOUIS URBAN DEBATE LEAGUE 2012-2013 2NC Terrorism—No Impact – strikes prove No impact-terrorists attack similar to past labor actions Learner and Thronburg 2006 - Director of the UCLA Anderson Forecast, Chief Economist of the Ceridian-UCLA Pulsel of Commerce, Christopher Thornberg is a founding principal of Beacon Economics [ Chirstopher Thornberg, Edward E Learner, Jon D. Haveman and Howard J. Shatz (editors), Stephen S. Cohen, Peter Gordon, Jon D. Haveman, Matthew C. Hipp, Seth K. Jacobson, \ James E. Moore, II, Qisheng Pan, Harry W. Richardson, Howard J. Shatz, Jay Stowsky, , Ernesto Vilchis, and Amy B. Zegart , Protecting the Nation’s Seaports: Balancing Security and Cost, 2006, http://www.ppic.org/main/publication.asp?i=698, 6/20/12] Therefore, we feel that these historic labor actions correspond closely enough to the kind of port disruption that a terrorist attack might bring to tell us a lot about the probable effect on the national economy of a terrorist attack on the ports. We will show how these labor actions are visible in the import data and export data of the period. In all cases, there was a small increase in import volume before these actions, a drop in volume during the action, and a large surge in import volume after the dispute was settled. Because of the size of that postdisruption volume surge, the overall loss of trade during a labor action was very small and in some cases nonexistent. Trade was postponed but not lost. Page 43 of 89 Document1 ST. LOUIS URBAN DEBATE LEAGUE 2012-2013 2NC Terrorism—No Econ Impact No Impact- A terrorist attack would not affect the economy Learner and Thronburg 2006 - Director of the UCLA Anderson Forecast, Chief Economist of the Ceridian-UCLA Pulsel of Commerce, Christopher Thornberg is a founding principal of Beacon Economics [ Chirstopher Thornberg, Edward E Learner, Jon D. Haveman and Howard J. Shatz (editors), Stephen S. Cohen, Peter Gordon, Jon D. Haveman, Matthew C. Hipp, Seth K. Jacobson, \ James E. Moore, II, Qisheng Pan, Harry W. Richardson, Howard J. Shatz, Jay Stowsky, , Ernesto Vilchis, and Amy B. Zegart , Protecting the Nation’s Seaports: Balancing Security and Cost, 2006, http://www.ppic.org/main/publication.asp?i=698, 6/20/12] This is testimony partly to the great resilience of a modern economy. Short interruptions to supply chains can be mitigated fully by drawing down inventories, especially if they were built up in anticipation of the event. When inventories are depleted and delivery essential, cargo can be shifted to air or land through a neighboring economy. Somewhat longer interruptions can be compensated for through a temporary shift to domestic suppliers—an especially easy alternative if supply chains have built-in redundancies that allow the needed flexibility. Some consumers at the end of the supply chain may have to wait a while or pay higher prices. The sale—and profits—may be postponed, but they are not prevented. Our results do not say that no business was hurt by port labor actions or that profits were not adversely affected by the increase in transaction costs. Some industries, some firms, and some regions were surely adversely affected. Nor do we claim that a terrorist attack on the ports and the resultant disruption to the supply chain would not harm any region or company—certainly some firms and regions would be affected. However, as is often the case in a modern complex economy, when one industry or area suffers as a result of some economic disturbance, another prospers as a result of an offsetting shift in demand: There are winners and losers. Our main point here is that these past disruptions were insufficient to cause any noticeable change in the aggregate flow of the economy: Either the losses were small compared with the overall economy or they were largely offset by gains elsewhere. Page 44 of 89 Document1 ST. LOUIS URBAN DEBATE LEAGUE 2012-2013 2NC Terrorism—No impact – only minor infrastructure damage Terrorist Attacks cause only small setbacks infrastructure Learner and Thronburg 2006 - Director of the UCLA Anderson Forecast, Chief Econmist of the Ceridian-UCLA Pulsel of Commerce, Christopher Thornberg is a founding principal of Beacon Economics [ Chirstopher Thornberg, Edward E Learner, Jon D. Haveman and Howard J. Shatz (editors), Stephen S. Cohen, Peter Gordon, Jon D. Haveman, Matthew C. Hipp, Seth K. Jacobson, \ James E. Moore, II, Qisheng Pan, Harry W. Richardson, Howard J. Shatz, Jay Stowsky, , Ernesto Vilchis, and Amy B. Zegart , Protecting the Nation’s Seaports: Balancing Security and Cost, 2006, http://www.ppic.org/main/publication.asp?i=698, 6/20/12] Another form of secondary losses comes from all the costs that individuals bear to prevent or to insure against future damage. It is easy, however, to overestimate these secondary effects. We have to be careful about distinguishing between events that cause business to be delayed and those that cause business to be cancelled. Very short-run disruptions to trade—whether by severe weather, traffic problems at the port, or a small terrorist attack—have almost no net effect on the economy, since the disruptions caused are little more than what happens during the normal, random, day-to-day life of commerce. Small delays have no measurable effect, and firms very often have excess capacity in order to deal with unexpected fluctuations in demand. And although consumers might stop flying as a result of an incident, they may instead begin to buy more cars sustained shocks to the economy will have any permanent effect on the economy, and here we must be careful to recognize that the economy is composed of conscious agents who will adjust plans and use resources in different ways to mitigate damages. We must not underestimate the resilience of a free-enterprise economy. with the money they did not spend on air travel. Losses in one place may be offset by gains elsewhere. Only Page 45 of 89 Document1 ST. LOUIS URBAN DEBATE LEAGUE 2012-2013 2NC Terrorism—No Tanker Impact Low risk of oil tanker attack – can’t destroy the vessel Houreld 11—Associated Press Writer [Katharine, “Oil Tanker Terror Hijacks Easy, Attacks Complex,” Web, 5/21/11, LexisNexis, 6/19/12] Supertankers the hulking, slow-moving ships that transport half the world's oil have few defenses against terrorist hijackers like those envisioned by Osama bin Laden, security experts said Saturday. AlQaida operatives with enough training could easily manage to capture ships carrying millions of gallons of oil or liquefied natural gas. All they would have to do is imitate the tactics of Somali pirates who already use small boats to overpower tanker crews in mostly remote locations, the experts said. Few supertankers have armed guards, due to gun import laws and the risk of accidental gunfire igniting explosive cargos. But once terrorists captured a supertanker, it wouldn't be so easy to sow the economic chaos and costly environmental destruction bin Laden desired and outlined in secret files captured from his Pakistan hideout. It's actually extremely complex to blow up a supertanker or even sink it near heavily guarded oil shipping lanes like the Suez Canal, the Panama Canal or the Strait of Hormuz at the end of the Persian Gulf. "It would only be a risk if they could sail it undetected and had worked out how to blow it up, which is pretty complicated," said Graeme Gibbon-Brooks, the head of Dryad Maritime Intelligence. Terrorists won’t succeed against tankers—modern ships make attacks difficult Houreld 11—Associated Press Writer [Katharine, “Oil Tanker Terror Hijacks Easy, Attacks Complex,” Web, 5/21/11, LexisNexis, 6/19/12] Intelligence gathered from bin Laden's hideout revealed that al-Qaida realized the tankers would have to be boarded so explosives could be planted inside them. Security experts say, however, blowing them up would be difficult because the tankers have double hulls and compartmentalized holds that prevent oil spills in groundings and can withstand direct hits from rocket propelled grenades. Plus, getting enough explosives aboard the tankers would mean using more speedboats than Somali hijackers normally do to take over the ships and hold crews hostage, Gibbon-Brooks said. Somali pirates have already captured five supertankers, proving that men with little training and basic weapons can easily seize the giant ships. Supertankers move slowly when fully loaded, can be longer than three football fields and generally only have around 20 unarmed crew onboard. Although the size of the ships makes them vulnerable, their slow speed also makes it harder for terrorists to sneak one into a port or a narrow shipping passage. Ships are closely tracked via satellite and any unexplained deviations from their travel plans would immediately raise alarms. Page 46 of 89 Document1 ST. LOUIS URBAN DEBATE LEAGUE 2012-2013 2NC Terrorism—No Piracy Coop Pirates won’t cooperate with terrorists Houreld 11—Associated Press Writer [Katharine, “Oil Tanker Terror Hijacks Easy, Attacks Complex,” Web, 5/21/11, LexisNexis, 6/19/12] While authorities fear that al-Qaida may link up with the Somali pirates who have become so adept at hijacking cargo ships, experts say the chance of any such alliance is remote because the pirates are in the hijacking business for the multimillion-dollar ransoms they get from holding ship crews hostage. If the pirates started working with terrorists, that could seriously hurt their business, said Roger Middleton, a piracy expert with London's Chatham House think tank. "They're multimillionaires running a very important business and don't want to see that jeopardized by too much politics," he said. Page 47 of 89 Document1 ST. LOUIS URBAN DEBATE LEAGUE 2012-2013 AT: Terrorism – No nuke attack on ports Conventional attacks won’t shut down ports and nuke attack unlikely Learner and Thronburg 2006 - Director of the UCLA Anderson Forecast, Chief Economist of the Ceridian-UCLA Pulsel of Commerce, Christopher Thornberg is a founding principal of Beacon Economics [ Chirstopher Thornberg, Edward E Learner, Jon D. Haveman and Howard J. Shatz (editors), Stephen S. Cohen, Peter Gordon, Jon D. Haveman, Matthew C. Hipp, Seth K. Jacobson, \ James E. Moore, II, Qisheng Pan, Harry W. Richardson, Howard J. Shatz, Jay Stowsky, , Ernesto Vilchis, and Amy B. Zegart , Protecting the Nation’s Seaports: Balancing Security and Cost, 2006, http://www.ppic.org/main/publication.asp?i=698, 6/20/12] Although the ports of Los Angeles and Long Beach certainly represent a primary infrastructure target in the United States, a complete shutdown of the ports is highly unlikely as a direct result of some physical attack. There are two reasons for this: the sheer physical scale of the facilities and the large amount of excess physical capacity (as opposed to human capital capacity) currently in place. As shown in the port map on p. xxiii, the two facilities take up approximately 12 square miles of space in a six-by-four-mile area. The complex is broken into a number of separate yards, each completely controlled by a number of independent, competing major shipping lines, each of which have substantial investment in the physical cranes and equipment on their property. Some of these yards are on Terminal Island, connected to the mainland by three road bridges and a railroad; others are on the mainland itself. There are multiple access points into the area as the map shows, including two highways. Even if these roads were shut down, it would be relatively simple to construct a temporary bridge to the island, and although it might have some implications for the movement of ships, no yard would be effectively isolated.3 Conventional weapons would be able to damage, at best, only a small portion of the complex, and would be unable to isolate a substantial portion of the port given the multiple access routes into and out of the area. Even a so-called “dirty bomb” could cover only one or two square miles of area with radioactivity. Given the location on the water, winds would quickly blow most of the radioactive materials away, leaving even most of the initially affected area quickly reusable. The only known weapon that could take out an area of this size for an extended period of time would be a nuclear weapon. It seems more likely that the target of such a horrific device would be a densely populated area, not a port. Page 48 of 89 Document1 ST. LOUIS URBAN DEBATE LEAGUE 2012-2013 AT: Terrorism – only partial shutdown – won’t effect econ If an attack only hit a portion of a port, the port could still function Learner and Thronburg 2006 - Director of the UCLA Anderson Forecast, Chief Economist of the Ceridian-UCLA Pulsel of Commerce, Christopher Thornberg is a founding principal of Beacon Economics [ Chirstopher Thornberg, Edward E Learner, Jon D. Haveman and Howard J. Shatz (editors), Stephen S. Cohen, Peter Gordon, Jon D. Haveman, Matthew C. Hipp, Seth K. Jacobson, \ James E. Moore, II, Qisheng Pan, Harry W. Richardson, Howard J. Shatz, Jay Stowsky, , Ernesto Vilchis, and Amy B. Zegart , Protecting the Nation’s Seaports: Balancing Security and Cost, 2006, http://www.ppic.org/main/publication.asp?i=698, 6/20/12] Given that it is unlikely for the entire port complex to be closed for an extended period as a result of an attack, the next question is what would happen if an attack instead destroyed only a portion of the port facilities. Under this scenario, the effect on trade and any secondary effects would depend on the ability of the functioning portions of the port to pick up the slack. Although the stories of congestion at the port and ongoing plans for expansion seem to imply that the ports are running close to or at capacity, they are not actually near capacity—at least not from a physical perspective. Most of the year, the various facilities run only one shift per day. During periods of increased trade activity, they may run two or, in the most desperate of circumstances, three. Multiple shifts, however, are very unusual because of the increased labor costs and work restrictions of labor agreements. But if the manpower were available, each yard in the facility could likely move at least twice as much merchandise through if it ran 24 hours a day. Indeed, this point has been made clearer than ever in recent months as local officials have moved decisively to reduce midday congestion around the ports by charging a fee to companies that want to move goods and products into and out of the ports during normal business hours. It is understood that the port infrastructure is largely underused during most of the day, and that economic incentives are needed to use it more efficiently. If a portion of the complex were closed as a result of damage to its transportation infrastructure, it would be relatively simple to transfer the shipping into other facilities. We assume that in the event of a national emergency, competing shipping companies would share facilities. The Problem Is With Labor Page 49 of 89 Document1 ST. LOUIS URBAN DEBATE LEAGUE 2012-2013 2NC Terrorism—Terrorists will switch targets Emphasis on Port Defense is flawed- terrorists will attack easier non-port targets or find new ways around port security Shie 4- from the Institute for National Strategic Studies (Tamar Renee Shie; Institute for National Strategic Studies, National Defense University and a visiting author for CSIS; Written October 15, 2004, Accessed June 19, 2012, http://csis.org/files/media/csis/pubs/-pac0445a.pdf; “Ships and Terrorists – Thinking Beyond Port Security”; CSIS) First, the emphasis on upgrading the security of major ports neglects the fact that these represent only a single link in the transportation chain. A shipping container may pass through some 15 physical locations and some two dozen individuals and/or companies while traveling from departure point to destination. Because containers are only searched at the major port, there is no guarantee they cannot be waylaid in route after that point. Second, the CSI conducts security checks only on U.S. bound containers. Therefore even if a tampered container arrives at a major port, if it is destined for a port other than the U.S., it is more likely to escape notice. Containers between the major ports of Singapore and Shenzhen or Pusan and Hong Kong are not subject to CSI requirements. Yet terrorist assaults on U.S. ships or interests can occur outside the U.S. Third, as major ports increase security, terrorists will look for other maritime targets or other means to target those ports. Terrorists are increasingly aiming at soft targets. Attacking maritime targets has never been particularly easy, often requiring a greater sophistication in planning, training, and coordination than those aimed at many land-based facilities. This is why maritime terrorism is rather rare, and why terrorists are less likely to attack a more secure major port. Yet in considering maritime terrorist threat scenarios – using a ship to smuggle goods or weapons, sinking a vessel in a major shipping thoroughfare, using a ship as a weapon, or even targeting maritime vessels – none require access to a major port or a shipping container to carry out a strike. There remain numerous small ports and small vessels not covered under the new security initiatives. The ISPS Code for instance only covers ships of 500 tons or more and port facilities that serve large international-bound vessels. The Code would not have protected the USS Cole. How else might terrorists strike? Piracy in Southeast Asia may provide a clue as to how terrorists will respond to these new measures. In 2002, there were 161 actual and attempted pirate attacks in Southeast Asian waters. Of those, 73 percent occurred within ports. The following year, of the 187 attacks, only 37 percent occurred within ports. Between the two years, the total number of attacks increased by 26. In the first quarter of 2004, of the 41 reported attacks, only onethird were committed in ports. Also between 2002 and 2003 pirate attacks in traditionally targeted ports fell while they rose in ports where few if any attacks were previously reported. Though it may be too soon to definitively tell, it would appear that pirates are adapting to the more stringent security measures in larger ports. If pirates can do it, so can terrorists. Finally, an attack on a major port does not require terrorists to gain direct access to that port. As pirates are capable of attempting more attacks on vessels at sea, it is not unimaginable that terrorists will commandeer a ship at sea and steer it toward a target. The bomb, biological, chemical or radiological agents, or even nuclear materials, can be loaded onto the ship once seized. Then they head for a port or another ship. The May 2004 collision between two cargo ships off Singapore’s Sentosa Island illustrates how easily terrorists could conduct a similar but more disastrous operation. Can’t solve terror – will shift targets from ports Haveman & Schatz 2006 Ph.D in Economics and expert on the economics of seaports, goods movement, and international trade policy and Ph.D in public policy and Senior Economist at RAND.(Jon D. and Howard J. “Protecting the Nation’s Seaports: Balancing Security and Cost” Report for the Public Policy Institute of California. http://www.ppic.org/content/pubs/report/R_606JHR.pdf Accessed: 6/20/2012) Second, there has been recognition throughout the process that strengthening one target necessarily means making other potential targets more vulnerable. Increasing the difficulty of slipping a bomb into a container increases the likelihood that someone might try to bring it into the United States in a yacht, or ship it to Mexico and bring it into the country by truck. Or, with strong enough port security measures, terrorists might change their target focus from ports to the rail system or to shopping malls. Page 50 of 89 Document1 ST. LOUIS URBAN DEBATE LEAGUE 2012-2013 Alt Cause Labor shortage The largest problem a port can have is lack of labor which can be easily solved Learner and Thronburg 2006 - Director of the UCLA Anderson Forecast, Chief Economist of the Ceridian-UCLA Pulsel of Commerce, Christopher Thornberg is a founding principal of Beacon Economics [ Chirstopher Thornberg, Edward E Learner, Jon D. Haveman and Howard J. Shatz (editors), Stephen S. Cohen, Peter Gordon, Jon D. Haveman, Matthew C. Hipp, Seth K. Jacobson, \ James E. Moore, II, Qisheng Pan, Harry W. Richardson, Howard J. Shatz, Jay Stowsky, , Ernesto Vilchis, and Amy B. Zegart , Protecting the Nation’s Seaports: Balancing Security and Cost, 2006, http://www.ppic.org/main/publication.asp?i=698, 6/20/12] The true limiting factor at the ports is not physical capacity but human capacity—labor to run the cranes and to move goods and containers in and out of the yards. If a portion of the facilities were closed, labor shortages in other yards handling the extra traffic could be made up of crews brought in from the closed facilities or even from other port facilities on the West Coast, from emergency aid from the Coast Guard or other military organizations, and eventually by new crews trained over the course of the succeeding weeks. At the same time, a certain amount of shipping could easily be funneled through other West Coast ports with excess physical capacity. In the longer term, shipping could be rerouted to East Coast ports and to refitted West Coast facilities not currently able to handle modern containerized shipping. In short, although the cost of importing products would surely rise as a result of the logistical difficulties created, there is no reason to believe that trade would be substantially interrupted. For those industries that rely on imports to run their business, there would be extra costs in the short run. The longer the disruption the less these costs will be, as better solutions are found. In our view, the true threat to the ports is not the physical damage to facilities, given the excess capacity in the system that could be used in the event of a true emergency. Rather, the true limitation is the unwillingness of labor to work under potentially hazardous conditions. The most dangerous scenario might occur as follows: A single conventional bomb goes off in a containerized shipment, killing or injuring a number of port personnel. The attack is followed by a threat that a number of other similarly rigged containers are on their way into U.S. ports or perhaps have already been offloaded and are awaiting transfer. Page 51 of 89 Document1 ST. LOUIS URBAN DEBATE LEAGUE 2012-2013 Case Turns (Generic) Increased trade introduces invasive species, which can`t be fixed—international problem Keller 2011-worked at the Program on the Global Environment at the University of Chicago, Illinois (Reuben P., Charles Perrings- worked at the ecoSERVICES Group in the School of Life Sciences, Arizona State University, Tempe “International Policy Options for Reducing the Environmental Impacts of Invasive Species” Bioscience 12/11 ProQuest 6/20/12) Preventing the spread of nonnative invasive species is an international public good. Some categories of invasive species-such as diseases of humans and livestock-are addressed by international agreements that coordinate efforts to reduce their spread. In contrast, invasive species that primarily cause environmental impacts are managed almost exclusively at the national level. Control of environmental invaders is internationally undersupplied because the efforts of nations that do invest to prevent their spread are undercut by nations that do not . Addressing this problem will require international cooperation. We identify the international approach to controlling human diseases as a model that could provide institutions and mechanisms to map the spread of environmental invaders and assess the risks they impose. This would allow individual nations to manage potential vectors of invasion. Because such a system is unlikely to be implemented in the near future, we make recommendations for intermediate steps, including the widespread adoption of existing risk assessments and importation standards. Keywords: Convention on Biological Diversity, sanitary and phytosanitary agreement, World Health Organization, World Trade Organization, invasive species International trade increases human welfare but also leads to the introduction and establishment of nonnative invasive species, such as human and livestock diseases, pests and diseases of crops, and species that cause environmental harm. The increasingly global nature of trade means that efforts to prevent the spread of invasive species should be internationally coordinated. To this end, there are already relatively advanced international programs in place for identifying and managing the spread of human diseases, and the 178 member nations of the World Organisation for Animal Health (OIE) have agreed to report outbreaks of animal diseases, mostly diseases of livestock, to a central database. These programs allow nations to track invasive species threats and to use the shared information to impose import restrictions. Species known to be diseases and pests of crops are often the focus of quarantine inspections at national borders, but this varies by country and there is little international coordination. In contrast, nonnative invasive species that do not directly affect human health or agriculture are generally perceived to primarily pose risks of environmental harm. Few international agreements exist to control the spread of these species, and at an international scale, they are traded with much less inspection and fewer efforts to prevent their spread. This essay addresses the potential for wiser management of these species, which we refer to as environmental invaders. Despite the lack of international efforts to prevent their spread, environmental invaders have enormous environmental, economic, cultural, and human-health impacts (Pejchar and Mooney 2008, Sala et al. 2000). These include reductions in the populations of desirable native species as a result of predation, competition, parasitism, and disease. An example of this is the invasion of European waterways by North American crayfish, which both compete directly with native crayfish for resources and carry the crayfish plague disease (Aphanomyces astaci) that has devastated European crayfish populations (Gherardi and Holdich 1999). Economic impacts can arise in a variety of ways, including the costs of herbicides and pesticides to control nonnative invaders in national parks and the costs of cleaning industrial facilities that become infested with invaders (e.g., zebra mussel [Dreissena polymorpha] infestations of power plants in the Laurentian Great Lakes require the facilities to close down while workers clean pipes; Leung et al. 2002). Cultural and human-health impacts can also arise in many ways, but a good example comes from cases in which invasive species become so prolific that farmers abandon agricultural land, leading to the loss of traditional farmland and agricultural practices and potentially to human-health impacts from reduced food supplies. This has occurred in Mexico, where it is no longer feasible in some areas to control the invasive bracken fern (Pteridium aquilinum; Schneider and Geoghegan 2006). The introduction of environmental invaders is an externality of trade (Perrings et al. 2002, 2005). That is, the impacts of these species are not incorporated into the costs of doing trade, and those who trade the species have no economic incentive to reduce the invasion risks inherent in their business. For example, the global horticultural trade is responsible for many thousands of invasions of harmful plants and plant diseases around the world (Reichard and White 2001, Dehnen-Schmutz et al. 2007). However, the environmental costs are not borne by either exporters or importers. Instead, these costs are spread widely among society as government agencies spend taxpayer dollars on inspection, interception, eradication, containment, and compensation. Two factors have hampered efforts to slow the international spread of environmental invaders. First, although nations generally act defensively to control imposed by this trade Page 52 of 89 Document1 ST. LOUIS URBAN DEBATE LEAGUE 2012-2013 invasive species, the benefits arising from that control are almost always shared broadly among those at risk of being invaded, not just among those who pay for the control (Perrings et al. 2002). For example, if a country spends resources to ensure a disease-free horticultural industry, all nations to which it exports benefit from a reduced likelihood that they will be invaded. In the absence of cooperation, however, individual countries will protect their own borders but are less likely to commit resources to preventing the export of invaders. Because the invasion risk to which a country is exposed depends on the actions of its neighbors and trading partners, this means that countries face higher risks than they would if there were greater cooperation. Second, controlling the spread of an invasive species is a "weakest-link" public good (Perrings et al. 2002). Although the risks posed by any nation will depend on a complex set of climatic, biogeophysical, and social factors, including the type of trade they engage in and its volume, the overall global risk will be strongly determined by the nations or trades that operate the least effective programs to control species transport. Because removal of an invasive pest from trade requires all those involved to contribute, and because little is gained by providing more than the country making the smallest contribution, there is an incentive to adopt a matching strategy-to converge on the weakest link. This is because unilateral action cannot prevent the pest from continuously spreading through trade (Touza and Perrings 2011). Nevertheless, even though enhancing cooperative efforts should be the ultimate goal of a collective strategy to manage the problem of environmental invasions, there is much that can be done independently. In this article, we identify alternative strategies at the national and international levels for reducing the spread of environmental invaders with or without cooperation. We begin by reviewing existing unilateral defensive efforts to reduce exposure and by identifying programs that have been successful and could be implemented more widely without the need for additional international policy. We then consider the options for effective coordinated international management, building on existing commitments by countries under the Convention on Biological Diversity (CBD) and on the international success achieved in managing human diseases. Finally, we discuss the options for achieving at least some of the gains that could be had from coordinated action without the need for renegotiation of any multilateral agreement. Figure 1 summarizes our recommendations. National efforts to manage the spread of environmental invaders Under the World Trade Organization (WTO) and its constituent agreements, particularly the General Agreement on Tariffs and Trade (GATT) and the Agreement on the Application of Sanitary and Phytosanitary Measures (SPS), individual countries have the right to take actions in restraint of trade if those actions are needed in order to protect food safety and animal or plant health. In contrast to those that deal with human diseases, these agreements authorize only national defensive measures. That is, individual nations have direct responsibility for managing risks to themselves posed by the many vectors of nonnative species introduction (table 1) but are not permitted under the GATT and the SPS agreement to cooperate in the collective control of pest or pathogen transmission through trade restrictions. The standard-setting bodies for the SPS agreement-the International Plant Protection Convention (IPPC), the OIE, and Codex Alimentarius-do cooperate in setting sanitary and phytosanitary standards and reporting requirements for member countries. This has led to the harmonization of rules on classes of traded commodities involving known risks. The OIE has also coordinated veterinary campaigns against particular pathogens within member countries and has achieved success in the eradication of rinderpest, one of the most damaging of all animal pathogens (Normile 2008). But only in the case of novel human diseases does there exist an agreement to take collective action in restraint of trade as a precautionary measure. Environmental invaders can be transported to a country through intentional or unintentional vectors. Regardless of the vector, it is widely accepted that the most cost-effective way to reduce total impacts from nonnative invasive species is to prevent their arrival and establishment (see figure 1a, 1b; IUCN 2000, Leung et al. 2002, Lodge et al. 2006, Keller et al. 2007, 2009). That is, preventing the arrival of an invasive species will generally lead to less harm than addressing the species after it enters a country. Nations can choose from a range of options to prevent a species' arrival, including restrictions on trade in species of concern, requirements on exporters to ensure that invaders do not leave their shores or do not survive transit, and the operations of quarantine and inspection facilities at the point of entry (Lodge et al. 2006). Importantly, policies focused on prevention have more opportunities to shift the burden of responsibility to the industries that profit from risky trade in live organisms (Perrings et al. 2005). As an example of a prevention program, most plant shipments to the United States must be accompanied by a phytosanitary certificate to show that they were produced at a facility following high standards for the control of plant diseases and parasites. This system puts the costs of obtaining certificates and those of producing relatively safe plants onto exporters. In contrast, established plant pest species can generally be controlled only through expensive techniques such as manually pulling plants or the use of herbicides and pesticides. Because it is almost never possible to determine the party responsible for an invasion, these costs have never (to the best of our knowledge) been passed on to importers or consumers who benefited from imports. Intentionally introduced species, including pets, crops, and garden plants (table 1), provide many economic and social benefits. They also often become environmental invaders or act as vectors for environmental invaders (Jeschke and Strayer 2005). Efforts to reduce imports of environmental invaders generally consist of individual-species risk assessments so that resources can be focused on those species posing the highest risk. Because the proportion of traded species that become invasive is generally low (Smith et al. 1999), this approach leaves most species-those with low risk of invasion-unaffected. The approach has been shown to yield financial benefits for importing countries (Keller et al. 2007), whereas fewer invasions confers environmental, social, and agricultural benefits. The most prominent riskassessment procedure currently available is the Australian Weed Risk Assessment (WRA; Pheloung 1995). Australian government scientists developed this tool in the early 1990s, and in 1997, it was introduced as a mandatory screening tool for all new plant species proposed for introduction to Australia. Species assessed as posing a high risk are not allowed to be imported. The WRA has been demonstrated to have good accuracy in Australia, New Zealand, Florida, Hawaii, and the Czech Republic (Gordon et al. 2008). It has been adopted in a modified form by New Zealand. In contrast to intentional introductions, species transported unintentionally have some probability of becoming invasive but are not expected to provide benefits. This means that efforts to prevent their arrival can aim to simply remove all organisms from transport. Although this is conceptually simple, the number and magnitude of Page 53 of 89 Document1 ST. LOUIS URBAN DEBATE LEAGUE 2012-2013 unintentional vectors makes preventing introductions an enormous challenge. For example, the global maritime fleet includes more than 99,000 large vessels and moves most international trade (IMO 2009). Each arriving ship presents risks of introducing new nonnative species entrained in its ballast water, attached to its hull, and in the cargo it offloads (table 1; Keller et al. 2011). It is unlikely that any nation could commit sufficient resources to ensure that all arriving ships are free of invasive species. Each vector of unintentional species transport requires a different management approach. This approach needs to be based on the trade moving the species, the mode of transport, and the available technology. For example, the approaches necessary to limit the movement of fouling organisms of recreational boats are very different from those required to prevent the spread of invasive mollusks on watergarden plants or of forest pests in wooden packaging material. One relatively successful approach to limiting the spread of unintentional invaders is the US phytosanitary certificate system mentioned previously. This program aims to prevent the arrival of diseases, parasites, and plants that unintentionally accompany a traded species. It does this by requiring certain standards of plant and soil hygiene at facilities that grow plants for export to the United States. It is consistent with the United States' obligations as a signatory to the WTO's SPS agreement (Hedley 2004). Although the number of risk-assessment tools and vector management strategies continues to increase, they still provide protection against only a small proportion of the vectors that introduce invasive species. We offer two suggestions for improving this situation within the current international policy framework. First, some existing risk-assessment tools have been shown to perform well in a range of countries (e.g., Gordon et al. 2008), and other nations could adopt those tools. This was done by New Zealand when it adopted a modified version of the Australian WRA. In many cases, it may be possible for nations to relatively cheaply adopt tools developed elsewhere. Second, established national standards for treating vectors of unintentional introduction could be adopted by other countries. For example, the US Phytosanitary Certificate program could probably be adopted by other importing countries because many export facilities are already set up to achieve its standards. Further developing and applying these tools and standards would serve a double purpose by directly protecting those countries that adopt the procedures and by providing indirect protection to other nations that would subsequently be less likely to receive invaders from their trading partners. Although there are potential advances to be made in national defensive policies, these can never provide the level of protection that would arise from increased international cooperation (see figure 1c). Most vectors could be more efficiently rendered free of invasive species in their country of origin. This would, for example, reduce the demand on quarantine facilities at ports of entry. Such coordination is currently unlikely for at least three reasons. First and foremost, there are no international agreements or bodies that are mandated to implement such a coordinated approach. Second, the "free-rider" issue means that the financially rational approach for many countries is to take the benefits from trading with countries that implement higher standards but not to pay the costs to implement those standards in their own operations. Finally, many countries lack the resources, institutions, or political will to implement such policies. Without programs to transfer resources and expertise to these countries, they will remain weak links and will continue to pose a risk to all other nations. Page 54 of 89 Document1 ST. LOUIS URBAN DEBATE LEAGUE 2012-2013 AT: Invasive Species Page 55 of 89 Document1 ST. LOUIS URBAN DEBATE LEAGUE 2012-2013 AT: Invasive Species—Impacts Invasive species won’t cause extinction—long term effects are increases in biodiversity Craig 10—Department of Marine Sciences, University of Puerto Rico [Matthew T, “Patter Versus Process: Broadening the View of Marine Invasive Species,” Web, 10/10, Marine Biology, Proquest, 6/21/12] The patterns observed as results of invasive species often evoke strong emotional responses as in the short term seemingly catastrophic changes occur. However, in taking a broader look at the processes underlying species invasions and their long-term ecological interactions, we see that they may be a fundamental contributor to the generation of new diversity through Briggs' IAS mechanism. Take for example, the Great Trans Arctic Biotic Interchange (Briggs 1995). The opening of the Berring Straight during the Cenozoic allowed for the exchange of hundreds of species between the North Atlantic and the North Pacific Oceans . Among the Atlantic species of molluscs with Pacific ancestors, nearly 47% evolved into distinct species (Vermeij 2005). Invasive species won’t lead to extinction—marine ecosystems resilient Craig 10—Department of Marine Sciences, University of Puerto Rico [Matthew T, “Patter Versus Process: Broadening the View of Marine Invasive Species,” Web, 10/10, Marine Biology, Proquest, 6/21/12] While invasive species undoubtedly have the tendency to alter ecosystems, the resiliency of marine ecosystems allows the invader to be accommodated through small to large shifts in niche occupancy of native species. Rather than cause extinctions, per se, this accommodation increases ecological interactions among species, which over evolutionary time scales may result in ecological speciation. Briggs thus argues that a three-step process, invasion, accommodation, and speciation (the IAS mechanism), provides a plausible mechanism for invasive species to actually cause an increase in biodiversity. Page 56 of 89 Document1 ST. LOUIS URBAN DEBATE LEAGUE 2012-2013 AT: Invasive Species—Turns Marine invasive species don’t cause extinction of other species but rather it increases biodiversity Craig 10—Department of Marine Sciences, University of Puerto Rico [Matthew T, “Patter Versus Process: Broadening the View of Marine Invasive Species,” Web, 10/10, Marine Biology, Proquest, 6/21/12] In terrestrial and freshwater ecosystems, invasive species have been shown to have severe effects on ecosystems, some of which are so detrimental as to have caused extinctions of native species (e.g., the brown treesnake, Boiga irregularis, on the Pacific island of Guam; Fritts and Rodda 1998). However, in the marine realm, there are no known examples of extinctions directly linked to an invasive species (Briggs 2007; Gurevitch and Padilla 2004). Rather, in this environment, invasive species alter ecosystems to a large degree, but as a general rule the native community accommodates the invasive species without catastrophic consequences. This capacity for accommodation of invasive species by native ecosystems is the focus of a paper by Briggs (2010) that provided a provocative examination of the long-term consequences of invasive species in the marine environment. Briggs presented a potential mechanism to support the hypothesis that invasive species may lead to an overall increase in biodiversity (measured by species richness). While contrary to general opinion, the ideas presented in this paper are logical, well thought out, and force readers to consider aspects of marine invasions in the light of evolutionary biology, something that Dobzhansky would certainly appreciate. With the growing awareness of the alarming rates of biodiversity loss around the planet, there is a ubiquitous tendency to assert that invasions cause a loss of biodiversity (usually measured by species richness). However, as Briggs astutely points out, upon invasion to a new geographic area, species richness (biodiversity) increases if the species becomes established. Thus, an established invasive species would have to cause the extinction of two native species before any negative effects on species richness (biodiversity) would be observed. The quantification of biodiversity loss caused by invasive species hinges in large part upon the scale of observation, both geographic and temporal. If one examines the effects of invaders over small scales of either category, the result is nearly always the observation of fewer species. However, over larger scales, the raw number of species is increased on a geographic scale (unless extirpation of more than one species occurs), and the selective forces that are enhanced through ecological competition may further increase the number of species over long temporal scales. Page 57 of 89 Document1 ST. LOUIS URBAN DEBATE LEAGUE 2012-2013 AT: Organized Crime Page 58 of 89 Document1 ST. LOUIS URBAN DEBATE LEAGUE 2012-2013 AT: Organized Crime – Impact Previous terrorist attacks were not the fault for a slow US economy Learner and Thronburg 2006 - Director of the UCLA Anderson Forecast, Chief Economist of the Ceridian-UCLA Pulsel of Commerce, Christopher Thornberg is a founding principal of Beacon Economics [ Chirstopher Thornberg, Edward E Learner, Jon D. Haveman and Howard J. Shatz (editors), Stephen S. Cohen, Peter Gordon, Jon D. Haveman, Matthew C. Hipp, Seth K. Jacobson, \ James E. Moore, II, Qisheng Pan, Harry W. Richardson, Howard J. Shatz, Jay Stowsky, , Ernesto Vilchis, and Amy B. Zegart , Protecting the Nation’s Seaports: Balancing Security and Cost, 2006, http://www.ppic.org/main/publication.asp?i=698, 6/20/12] Similarly, the U.S. economy did not slow down after the September 11 attacks; indeed, the economy was accelerating its way out of the 2001 business-led downturn that had begun in the middle of although consumer confidence fell sharply after the attacks, consumer spending in the fourth quarter grew at an unprecedented 7 percent seasonally adjusted annual rate (SAAR), one of the sharpest increases seen in the past decade (Figure 2.2). Unemployment did rise sharply after the event, but this seemed to be primarily an acceleration of the employment loss that would have been expected given the weak economic climate. This was especially true because labor markets were still overheated from the techin the midst of 2000. And fueled economic boom of the late nineties. Retail sales did drop sharply in September 2001 but also rebounded sharply in October and returned to trend in November—business delayed, not business cancelled. Indeed, it is hard to find any evidence of an effect of the September 11 attacks on the aggregate economy, with the exception of that on the air travel industry. Even in that case, the industry was in deep trouble beforehand, with profit margins dipping into the red in the beginning of 2000—long before the attacks. Even then, it must be remembered that total consumer spending went up, so the dollars that were not spent on air travel went to some other part of the economy. Page 59 of 89 Document1 ST. LOUIS URBAN DEBATE LEAGUE 2012-2013 AT: Organized Crime—Solvency Conspiracies, corruption, and counter-surveillance by Mexican smuggling organizations make it difficult to detect operations U.S. Immigration and Customs Enforcement '12 ("Border Security Threats to the Homeland: DHS' Response to Innovative Tactics and Techniques" Homeland Security Department Documents and Publications 6/19/2012, Lexis 6/19/2012) Internal conspiracies and corruption are another significant vulnerability seen by HSI in its investigations of smuggling organizations at commercial airports and other U.S. ports of entry. In many of its investigations, HSI sees how these internal conspiracies utilize various employees from multiple companies and positions, including managers and supervisors. Employees utilize innumerable diversionary tactics to smuggle contraband around CBP examination. Finally, Mexican smuggling organizations routinely utilize counter-surveillance methods in an attempt to adjust their methods of operation based on U.S. law enforcement efforts. "Spotters," as they are known, operate almost exclusively in Mexico, rarely entering the United States where they can be detained for questioning or arrest. In addition, modern cellular telephone and radio communication technology make detection even more difficult, as organizations can use them to adjust their modes of operation in order to be more successful. Spending too much money can be bad- criminals will find different ways Willis, Ortiz, 2006 - Willis is the Associate Director at the RAND Homeland Security and Defence Center, Ortiz is a Professor at RAND graduate school [ Henry H. Willis, David S. Ortiz, Securing America's Ports, March 26/2006, http://www.rand.org/commentary/2006/03/26/SDUT.html, 18/06/2012] At some point, spending more money on port security won't make San Diego or the rest of the country any safer. As ports become more difficult to attack, terrorists may choose to attack through other means. This is especially relevant for San Diego, which is close to the U.S. Mexican-border and several international airports. Also, excessive emphasis on port security can actually reduce security as a whole. Impediments to the movement of legitimate cargo may cause that cargo to be moved by other, less secure, means. Page 60 of 89 Document1 ST. LOUIS URBAN DEBATE LEAGUE 2012-2013 AT: Econ–Collapse doesn’t cause war Econ collapse doesn’t cause war Bazzi (Department of Economics at University of California San Diego) and Christopher Blattman (assistant professor of political science and economics at Yale University) November 2011 “Economic Shocks and Conflict: The (Absence Samuel of?) Evidence from Commodity Prices” http://www.chrisblattman.com/documents/research/2011.EconomicShocksAndConflict.pdf?9d 7bd4 VI. Discussion and conclusions A. Implications for our theories of political instability and conflict The state is not a prize?—Warlord politics and the state prize logic lie at the center of the most influential models of conflict, state development, and political transitions in economics and political science. Yet we see no evidence for this idea in economic shocks, even when looking at the friendliest cases: fragile and unconstrained states dominated by extractive commodity revenues. Indeed, we see the opposite correlation: if anything, higher rents from commodity prices weakly 22 lower the risk and length of conflict. Perhaps shocks are the wrong test. Stocks of resources could matter more than price shocks (especially if shocks are transitory). But combined with emerging evidence that war onset is no more likely even with rapid increases in known oil reserves (Humphreys 2005; Cotet and Tsui 2010) we regard the state prize logic of war with skepticism.17 Our main political economy models may need a new engine. Naturally, an absence of evidence cannot be taken for evidence of absence. Many of our conflict onset and ending results include sizeable positive and negative effects.18 Even so, commodity price shocks are highly influential in income and should provide a rich source of identifiable variation in instability. It is difficult to find a better-measured, more abundant, and plausibly exogenous independent variable than price volatility. Moreover, other time-varying variables, like rainfall and foreign aid, exhibit robust correlations with conflict in spite of suffering similar empirical drawbacks and generally smaller sample sizes (Miguel et al. 2004; Nielsen et al. 2011). Thus we take the absence of evidence seriously. Do resource revenues drive state capacity?—State prize models assume that rising revenues raise the value of the capturing the state, but have ignored or downplayed the effect of revenues on self-defense. We saw that a growing empirical political science literature takes just such a revenue-centered approach, illustrating that resource boom times permit both payoffs and repression, and that stocks of lootable or extractive resources can bring political order and stability. This countervailing effect is most likely with transitory shocks, as current revenues are affected while long term value is not. Our findings are partly consistent with this state capacity effect. For example, conflict intensity is most sensitive to changes in the extractive commodities rather than the annual agricultural crops that affect household incomes more directly. The relationship only holds for conflict intensity, however, and is somewhat fragile. We do not see a large, consistent or robust decline in conflict or coup risk when prices fall. A reasonable interpretation is that the state prize and state capacity effects are either small or tend to cancel one another out. Opportunity cost: Victory by default?—Finally, the inverse relationship between prices and war intensity is consistent with opportunity cost accounts, but not exclusively so. As we noted above, the relationship between intensity and extractive commodity prices is more consistent with the state capacity view. Moreover, we shouldn’t mistake an inverse relation between individual aggression and incomes as evidence for the opportunity cost mechanism. The same correlation is consistent with psychological theories of stress and aggression (Berkowitz 1993) and sociological and political theories of relative deprivation and anomie (Merton 1938; Gurr 1971). Microempirical work will be needed to distinguish between these mechanisms. Other reasons for a null result.—Ultimately, however, the fact that commodity price shocks have no discernible effect on new conflict onsets, but some effect on ongoing conflict, suggests that political stability might be less sensitive to income or temporary shocks than generally believed. One possibility is that successfully mounting an insurgency is no easy task. It comes with considerable risk, costs, and coordination challenges. Another possibility is that the counterfactual is still conflict onset. In poor and fragile nations, income shocks of one type or another are ubiquitous. If a nation is so fragile that a change in prices could lead to war, then other shocks may trigger war even in the absence of a price shock. The same argument has been made in debunking the myth that price shocks led to fiscal collapse and low growth in developing nations in the 1980s.19 B. A general problem of publication bias? More generally, these findings should heighten our concern with publication bias in conflict literature. Our results run against a number of published results on commodity shocks and conflict, mainly because of select samples, misspecification, and sensitivity to model assumptions, and, most importantly, alternative measures of instability. Across the social and hard the sciences, there is a concern that the majority of published research findings are false (e.g. Gerber et al. 2001). Ioannidis (2005) demonstrates that a published finding is less likely to be true when there is a greater number and lesser pre-selection of tested relationships; there is greater flexibility in designs, definitions, outcomes, and models; and when more teams are involved in the chase of statistical significance. The cross-national study of conflict is an extreme case of all these. Most worryingly, almost no paper looks at alternative dependent variables or publishes systematic robustness checks. Hegre and Sambanis (2006) have shown that the majority of published conflict results are fragile, though they focus on timeinvariant regressors and not the time-varying shocks that have grown in popularity. We are also concerned there is a “file Page 61 of 89 Document1 ST. LOUIS URBAN DEBATE LEAGUE 2012-2013 drawer problem” (Rosenthal 1979). Consider this decision rule: scholars that discover robust results that fit a theoretical intuition pursue the results; but if results are not robust the scholar (or referees) worry about problems with the data or empirical strategy, and identify additional work to be done. If further analysis produces a robust result, it is published. If not, back to the file drawer. In the aggregate, the consequences are dire: a lower threshold of evidence for initially significant results than ambiguous ones.20 Page 62 of 89 Document1 ST. LOUIS URBAN DEBATE LEAGUE 2012-2013 AT: US China Coop—No coop now Japan is uncertain about entering into trilateralism—its seeming compliance is just a response to pressure Christoffersen 09 [Gaye, “Japan and the East Asian Maritime Security Order: Prospects for Trilateral and Multilateral Cooperation,” Web, 2009, Asian Perspective, Proquest, 6/20/12] Kenneth Pyle has portrayed Japan's expanding security role in the region as reactive. He claims that Japan is responding to a rising China and pressure from the United States to take on a greater role. He argues that the U.S.-Japan military alliance is the central element in a Japan-China-U.S. trilateral relationship.13 Glen Hook has portrayed Japan as the "sandwiched state," caught between U.S. pressure to assume more of a global military role on one side and, on the other side, opposition to overseas deployment by the political opposition in the Japanese parliament (the Diet), peace organizations, and public opinion.14 Yoshihara and Holmes have argued that Japan, confined to the security alliance with the United States, has lost the capacity for strategic thought that might impede Tokyo's ability to respond to China's rising naval power.15 Takashi Inoguchi maintains that Japanese international relations theory has a bumi putra or narrowly indigenous character which makes it hard for Japanese scholars to communicate their visions of international relations, not only with the United States, but also with theorists from China, Taiwan, and South Korea who have understandings of international relations more influenced by U.S. ideas.16 Moreover, Inoguchi argues that grand strategies and international relations theory are produced by great powers, a status that Japan continues to harbor ambivalence about.17 Japan could not want to enter into trilateralism—public is currently clueless and could oppose Christoffersen 09 [Gaye, “Japan and the East Asian Maritime Security Order: Prospects for Trilateral and Multilateral Cooperation,” Web, 2009, Asian Perspective, Proquest, 6/20/12] Tsuneo Watanabe finds the source of the problem in Japanese security policies, which emerge from opaque, backroom circumstances rather than from open public discussion. Because of a "hollowing out" of any real discussion of Japan's defense policy, the public remains clueless. 18 Watanabe argues that there exists a large gap between Japanese civilian and military cultures that makes domestic debate on security policy difficult. The emphasis on nontraditional security issues such as piracy somewhat resolves the problem, since these are considered to contribute to international order rather than preparations for war.19 All of these scholars portray Japan as muddling through, reacting and responding to other countries' initiatives. Page 63 of 89 Document1 ST. LOUIS URBAN DEBATE LEAGUE 2012-2013 AT: Solvency Page 64 of 89 Document1 ST. LOUIS URBAN DEBATE LEAGUE 2012-2013 AT: Solvency—Generic Fixing the all the problems is too difficult—too much dependence on other countries and no clear understanding of risk Harrald 05 [John R, “Sea Trade and Security: an Assessment of the Post-9/11 Reaction,” Web, Fall 05, http://search.proquest.com.proxy.lib.umich.edu/pqrl/docview/220702986/1376BF5C74E6A8F9B1B/5?accountid=14667, 6/19/12] Reliability. The primary goals of programs to date have been improving the security of U.S. ports and of the flow of containerized cargo. The thrust of all the initiatives has come in the form of government-imposed rules and programs. The business case for security has not been made to or accepted by many participants in the global supply chain. This leads to four unresolved issues. (1) The primary supply-chain vulnerabilities are at the ends of the chain-in the warehouses where containers are stuffed and opened, in truck transport (i.e., road stops) and in rail yards. The physical security of these private sector assets throughout the world is critical and extremely difficult to ensure. (2) Security of ships and cargo in foreign ports is beyond the effective control of the U.S. government. It is the responsibility of foreign governments and private companies, and maiding the diplomatic and business case to achieve cooperation is difficult. (3) The focus on container vessels has led to an underestimation of the vulnerabilities of other subsystems. There is no tanker or bulk-cargo analogy to CSI or C-TPAT, nor are tankers and bulk cargoes subject to the 24hour rule. The certainty that the threat is external to the United States has led to an underinvestment in reducing the vulnerability to shore-side security threats, in particular the threat to passenger ferries and cruise ships, so potential mass casualty targets remain vulnerable to conventional attack. (4) The piecemeal implementation of global security programs has created a system without measurable risk-management objectives. International regulators of transportation systems have long wrestled with the "how safe is safe" question. Now they must attempt to define acceptable security. What, for example, is an acceptable probability that a container with terrorist contraband will enter the United States undetected in any given year? The answer to this drives the direct and indirect costs of security interventions, affecting the efficiency of the supply chain and the need for effective faulttolerance and resilience strategies. The US will keep pushing back improvements Calvan 12—Boston Globe Writer [Bobby Caina, “US to Miss Target for Tighter Port Security: Cargo Screening Put Off to 2014,” Web, 6/12/12, Boston Globe, Proquest, 6/20/12] WASHINGTON - The Department of Homeland Security will miss an initial deadline of July 12 to comply with a sweeping federal law meant to thwart terrorist attacks arriving by sea, frustrating border security advocates who worry that the agency has not done enough to prevent dangerous cargo from coming through the country's ocean gateways, including the Port of Boston. Only a small fraction of all metal cargo containers have been scanned before arriving at US ports, and advocates for tighter port security say all maritime cargo needs to be scanned or manually inspected to prevent terrorists from using ships bound for the United States to deliver a nuclear bomb. The scenario might be straight out of a Hollywood script, but the threat of terrorism is not limited to airplanes, according to Homeland Security critics, including Representative Edward Markey of Massachusetts. Markey accuses the agency of not making a good-faith effort to comply with a 2007 law he coauthored requiring all US-bound maritime shipments to be scanned before departing overseas docks. "We're not just missing the boat, we could be missing the bomb," the Malden Democrat said. "The reality is that detonating a nuclear bomb in the United States is at the very top of Al Qaeda's terrorist targets." Only about 5 percent of all cargo containers headed to the United States are screened, according to the government's own estimate, with some shipments getting only a cursory paperwork review. Homeland Security officials argue that wider screening would be cost- prohibitive, logistically and technologically difficult, and diplomatically challenging. While acknowledging the threat as real, they are exercising their right under the 2007 law to postpone for two years the full implementation of the congressionally mandated scanning program. That would set the new deadline for July 2014. Page 65 of 89 Document1 ST. LOUIS URBAN DEBATE LEAGUE 2012-2013 More technology is being used in ports – past years prove CBP.gov 2006 - CBP.gov is the United States Customs and Border Protection website. [No author given, "An Overall Picture of Port Security", CBP.gov, 07/12/2006, http://www.cbp.gov/xp/cgov/newsroom/fact_sheets/port_security/securing_us_ports.xml, 18/06/2012] Use of Cutting-Edge Technology: CBP is currently utilizing large-scale X-ray and gamma ray machines and radiation detection devices to screen cargo. Presently, CBP operates over 825 radiation portal monitors at our nation’s ports (including 181 radiation portal monitors at seaports), utilizes nearly 200 large scale non-intrusive inspection devices to examine cargo, and has issued over 14,000 hand-held radiation detection devices. The President’s FY 2007 budget requests $157 million to secure next-generation detection equipment at our ports of entry. Also, over 1200 canine detection teams, who are capable of identifying narcotics, bulk currency, human beings, explosives, agricultural pests, and chemical weapons are deployed at our ports of entry. We are prepared for attacks on ports - new plans have been established Government Security News, 2012 [Mark Rockwell, Washington Correspondent for GSN, serves a BPA-audited circulation of 35,000 qualified recipients in the fields of physical, IT and homeland security. This audience includes federal, state and local officials, as well as integrators, contractors and suppliers who are similarly involved in homeland security. http://www.gsnmagazine.com/node/26319, 18/06/2012] For instance, the legislation would establish a special assistant to the president for biodefense to coordinate federal biodefense policy; develop a national biodefense plan and a coordinated budget that assess capability gaps and spending inefficiencies. It would also require DHS to establish a national biosurveillance strategy, make first responder vaccinations voluntary and provide response guidance for chemical, biological, radiological, and nuclear incidents. FEMA, for instance, would be tasked with development of a communications plan to provide public information about preventing, preparing for, and responding to a chemical, biological, radiological, and nuclear attack. FEMA would also develop and disseminate integrated public alerts and warnings system pre-scripted messages and message templates to be provided to state, local, and tribal authorities to rapidly disseminate critical information to the public in the event of such an attack. The measure would also authorize the Securing the Cities program to allow for interdiction of a radiological device in high-risk cities. There are many new layers of defense put in place- due to increased experience CBP.gov 2006 - CBP.gov is the United States Customs and Border Protection website. [No author given, "An Overall Picture of Port Security", CBP.gov, 07/12/2006, http://www.cbp.gov/xp/cgov/newsroom/fact_sheets/port_security/securing_us_ports.xml, 18/06/2012] Screening and Inspection: CBP screens 100 percent of all cargo before it arrives in the U.S using intelligence and cutting edge technologies. CBP inspects all high-risk cargo. CSI (Container Security Initiative): Enables CBP, in working high-risk maritime containerized cargo at foreign seaports, before they are loaded on board vessels destined for the United States. In addition to the current 43 foreign ports participating in CSI, many more ports are in the planning stages. By the end of 2006, the number is expected with host government Customs Services, to examine to grow to 50 ports covering 82 percent of transpacific maritime containerized cargo shipped to the U.S. 24-Hour Rule: Under this requirement, manifest information must be provided 24 hours prior to the sea container being loaded onto the vessel in the foreign port. CBP may deny the loading of high-risk cargo while the vessel is still overseas. Page 66 of 89 Document1 ST. LOUIS URBAN DEBATE LEAGUE 2012-2013 AT: Solvency—Wrong Focus Aff plan is focused on the wrong thing—instead of focusing on vulnerability instead of recovery Harrald 05 [John R, “Sea Trade and Security: an Assessment of the Post-9/11 Reaction,” Web, Fall 05, http://search.proquest.com.proxy.lib.umich.edu/pqrl/docview/220702986/1376BF5C74E6A8F9B1B/5?accountid=14667, 6/19/12] Fault Tolerance and Resilience: These two system elements are closely related and must be part of a comprehensive risk-management strategy. Risk cannot be reduced to zero; we cannot eliminate all threats or vulnerabilities. We must therefore be prepared for post-event risk management interventions for all subsystems. Thus far, the global strategy has been vulnerability-focused, with little attention given to resilience and recovery strategies. The Transportation Research Board found organizational and readiness deficiencies in U.S. marine firefighting and marine salvage capabilities that could seriously affect the ability to contain the impacts of a terrorist attack on a U.S. port .52 The global supply chain remains vulnerable to critical nodes, as the United States discovered with the Hurricane Katrinacaused disruption of a significant portion of its energy supply and distribution system, and with the labor conflict that closed West Coast ports in 2004. While the U.S. government is preparing to respond to another terrorist attack, little effort is being made to reduce our dependence on critical physical nodes, to prevent cascading failures or to assist in economic recovery should an attack on the supply chain occur. Page 67 of 89 Document1 ST. LOUIS URBAN DEBATE LEAGUE 2012-2013 AT: Solvency—Turns Private infrastructure is necessary to port security – 85% privately owned Dept. of Homeland Security ’05 [“Review of the Port Security Grant Program” January 2005 http://www.oig.dhs.gov/assets/Mgmt/OIG_05-10_Jan05.pdf - Access Date 6/24/2012] The government’s responsibility to protect the homeland, weighed against the realization that it cannot assume the burden of the costs to protect the nation’s entire critical infrastructure, of which 85% is estimated to be privately owned or controlled, presents a major policy issue for the department. Further complicating the matter is the question of the extent to which the government should pay for the costs to comply with MTSA, a federal mandate to improve port security that Congress has thus far not funded directly. National strategic policies suggest that the government and industry share this burden. According to the National Strategy for Homeland Security, “The private sector should conduct risk assessments on their holdings and invest in systems to protect key assets. The internalization of these costs is not only a matter of sound corporate governance and good corporate citizenship but also an essential safeguard of economic assets for shareholders, employees, and the Nation.” The Physical Protection of Critical Infrastructures and Key Assets identifies planning and resource allocation as one of its five objectives and stresses the importance of incentives for private organizations, and market solutions where appropriate. According to the National Infrastructure Protection Plan, private owners and operators are expected to bear the preponderance of protection and mitigation costs for surface and maritime modes of transportation. Private companies cannot work with the government on port security making the aff unsolvable – afraid of losing competitive advantage Dept. of Homeland Security ’05 [“Review of the Port Security Grant Program” January 2005 http://www.oig.dhs.gov/assets/Mgmt/OIG_05-10_Jan05.pdf - Access Date 6/24/2012] DHS is learning that many private companies are unwilling to share security information and collaborate on security projects with port authorities. Port officials discussed the reluctance of private sector entities to share information about their vulnerabilities for fear of reducing their competitive advantage. Port authorities, while cognizant of this concern, want to establish integrated and portwide security plans and security systems. This requires greater cooperation and increased information sharing on the part of private entities. While there were occasional references to the program’s goal of giving preference to port-wide projects, neither guidance nor reviewer comments indicated this was occurring. The program does not adequately reinforce the cooperative efforts between public and private entities that are required to develop an integrated approach to security. Port security goes unnoticed and as the economy grows, problems will start again Terreri 09—World Trade [April, “The Current State of Port Security,” Web, 10/09, World Trade, Proquest, 6/20/12] Global supply chain security wasn't even a term a mere decade ago, but for today's trade community it is a neverending discussion aimed at producing greater levels of security, notes Kelby Woodard, president of Eden Prairie, Minnesota-based Trade Innovations, specializing in customs compliance and global supply chain security. "What I worry about is complacency, so we need the trade to be fully engaged in supply chain security," he cautions. "Some ask why we continue to require compliance to these initiatives, failing to recognize that the reason nothing has happened is because we are doing all of these things." At the same time, Shaun Donnelly reports that while problems persist in global supply chain security, the downturn in activity due to the recession worldwide is masking some of those problems. "As the economy improves and trade starts to grow again, we believe the problems will manifest themselves again," says Donnelly, senior director of international business policy for the National Association of Manufacturers in Washington, D.C. Page 68 of 89 Document1 ST. LOUIS URBAN DEBATE LEAGUE 2012-2013 Port security initiatives fail- Ships can be attacked at sea or before the reach the US Council on Foreign Relations 12 (an independent, nonpartisan membership organization, think tank on foreign relations; Written January 9, 2012; Accessed June 20, 2012; http://www.cfr.org/africa/global-oceans-regime/p21035#p3; “The Global Oceans Regime”) However, these conventions do not provide comprehensive security solutions for maritime containers, and illegal cargo could be slipped into shipping containers during transit. Since 1992, the IMO has tried to prevent attacks on commercial shipping through the Convention for the Suppression of Unlawful Acts against the Safety of Maritime Navigation, which provides a legal framework for interdicting, detaining, and prosecuting terrorists, pirates, and other criminals on the high seas. In reality, most enforcement action since the 9/11 attacks has focused on securing ports to prevent the use of a ship to attack, rather than to prevent attacks on the ships themselves. Reflecting this imperative, the IMO, with U.S. leadership, implemented the ISPS code in 2004. This code helped create international standards for ship security, requiring ships to have security plans and officers. However, as with port security, the code is not obligatory and no clear process to audit or certify ISPS compliance has been established. Overall, a comprehensive regime for overseeing the safety of international shipping has not been created. Resilience solves better than protection- overprotecting port assets causes economic disruption Hardwood 12 (Matthew Harwood is a staff writer for Secure Management; http://securityma-nagement.com/-news/new- report-examines-resiliency-us-transportation-systems009959?p-age=0%2C0; Written June 8, 2012; Accessed June 20, 2012) Accessed June 20, 2012; “New Report Examines Resiliency of U.S. Transportation Systems”) A new report from a prominent bipartisan think tank questions the resiliency of the U.S. transportation system and the global supply chain if a major terrorist attack occurred. “[T]he U.S. government and the other major trade nations still have no plan to respond and recover from a major security incident involving the global intermodal transportation system," Dr. Stephen Flynn and Sean P. Burke, warn in their report, a More Resilient America: The Case of Transportation, published by the Center for National Policy. "As a result, there could be a weekslong period where the international system of trade and logistics grind to a halt with devastating consequences for the global economy." Resiliency, or the ability to recover quickly after serious disruption, matters more than ever, they argue, as terrorists shift from sophisticated and timeintensive spectacular attacks to crude and quick smaller attacks. This realization, however, means U.S. policymakers’ security mindset must evolve from primarily being focused on prevention and protection to resilience. Otherwise, a perverse incentive is created for terrorists to dream up new ways of attacking these targets, especially those critical to the flow of goods and services within the global supply chain. "If every terrorist act or near-miss leads to new government measures that make transportation systems more inefficient, then an adversary gets a much bigger dividend than the actual attack could deliver," Flynn and Burke, both executives at the George J. Kostas Research Institute for Homeland Security at Northeastern University, write in their report. There’s evidence that terrorists understand this very well. In the November 2010 edition of Inspire, al Qaeda in the Arabian Peninsula (AQAP) gloated that it had spent $4,200 dollars on constructing two printer cartridge bombs that were eventually found on cargo planes destined for the United States. "In such an environment of security phobia that is sweeping America, it is more feasible to stage smaller attacks that involve less players and less time to launch and thus we may circumvent the security barriers America worked so hard to erect," the letter from the editor explained. "This strategy of attacking the enemy with smaller, but more frequent operations is what some may refer to as a strategy of a thousand cuts. The aim is to bleed the enemy to death." In response, the U.S. and other Western nations issued cargo alerts and restrictions, particularly with Yemen, where the bombs entered the air cargo system. AQAP determined the plot, dubbed Operation Hemorrhage and which failed to bring down a plane, was a success. "During the initial discussions of the team it was determined that the success of the operation was to be based on two factors: The first is that the packages pass through the latest security equipment. The second, the spread of fear that would cause the West to invest billions of dollars in new security procedures," AQAP boasted. "We have succeeded in the former and we are now witnessing the inception of the latter." Knowing how terrorist methodology has shifted means “it makes no sense” to jeopardize “the purpose of transportation so as to better protect it," argue Flynn and Burke. Rather they recommend that U.S. policymakers and security professionals commit themselves to reasonable prevention and protection measures that are “not unduly disruptive” and can survive “the-morning-after test” when they fail, therefore maintaining public confidence, while ensuring adequate plans are in place to get the transportation system up and running again quickly after an attack. If they do so, then transportation targets become a waste of terrorists’ time and resources. "When the United States demonstrates that it has the ability to withstand attacks without inflicting damage on the essential systems that underpin our economy and way of life, terrorism becomes a less attractive weapon for America's adversaries,” Flynn and Burke write. Page 69 of 89 Document1 ST. LOUIS URBAN DEBATE LEAGUE 2012-2013 AT: Solvency—Agents Solvency Deficit—Agents provide inaccurate data to ports and hamper their ability to solve Heskerth 10- is a Senior Manager with HM Revenue and Customs (David Hesketh has a Masters in International Customs Law and Administration, a Project Manager for the Department for International Development, and a Senior Manager with HM Revenue and Customs; “Weaknesses in the supply chain: who packed the box?”; http://documentsearch.org/read?=http://-www.worldcustomsjournal.org/media/wcj/-2010/2/Hesketh.pdf; Written September 2010; Accessed June 21, 2012) The complexity of the contracts of carriage and the systems and procedures required to transport goods internationally almost encourage the consignor to employ a Freight Forwarder, or ‘agent’, to manage the door-to-door or container consolidation to de-consolidation process. The Freight Forwarder in one country consigning goods to another Freight Forwarder in the country of destination traverses the Logistics and the Transaction Layers to manage the documentary and transport complexities. So, in addition to the limited data contained in transport documents, the manifest will show consignor to consignee as ‘agent to agent’ rather than the true buyer and seller. In everyday practice, despite the legal requirement to provide accurate data about the goods being carried, about 60 per cent of vessel manifest information is described as ‘agent to agent’ making the data unfit for regulatory pre-arrival risk assessment purposes. Well established commercial practices within the Logistics Layer are masking the accuracy of data thereby increasing the risks posed by a lack of visibility. Annual losses in international trade caused by maritime fraud are estimated to be as high as USD31 billion. Documentary maritime frauds involving the letter of credit and traditional ocean bills of lading account for nearly two-thirds of these losses. Page 70 of 89 Document1 ST. LOUIS URBAN DEBATE LEAGUE 2012-2013 AT: Solvency—PSGP Certain areas can receive funding from 4 grant programs, resulting in wasted, ineffective funding GAO 2012 (“HOMELAND SECURITY: DHS Needs Better Project Information and Coordination among Four Overlapping Grant Programs” Government Accountability Office 2/12 <http://www.gao.gov/products/GAO-12-303> 6/22/12) The four grant programs in our review—SHSP, UASI, PSGP, and TSGP—have overlapping goals, project types, and funding jurisdictions, which increases the risk of duplication among the programs. Although the specifics of the four programs vary, they share the overarching goal of enhancing the capacity of state and local emergency responders to prevent, respond to, and recover from a terrorism incident involving chemical, biological, radiological, nuclear, or other explosive devices, or cyber attacks. More specifically, each program funds similar projects such as training, planning, equipment, and exercises. For example, the four programs have overlapping lists of allowable costs, so certain types of equipment, such as communication radios, may be purchased through each grant program. Further, although the programs target different constituencies, such as states and counties, urban areas, and port or transit stakeholders, there is overlap across recipients. For example, each state and eligible territory receives a legislatively mandated minimum amount of SHSP funding to help ensure that all areas develop a basic level of preparedness, while UASI explicitly targets urban areas most at risk of terrorist attack.20 However, many jurisdictions within designated UASI areas also apply for and receive SHSP funding. Similarly, a port stakeholder in an urban area could receive funding for patrol boats through both PSGP and UASI funding streams, and a transit agency could purchase surveillance equipment with TSGP or UASI dollars. More broadly, any designated high-risk urban area located near major waterways can receive funding through SHSP, UASI, PSGP, and TSGP sources. In March 2011, we reported that overlap among government programs or activities can be harbingers of unnecessary duplication. Further, we commented on FEMA’s full suite of 17 fiscal year 2010 preparedness programs, including the four programs in this review, and noted that FEMA needed to improve oversight and coordination of its grant awards .21 Identifying and mitigating the risk of duplication could help ensure that these four grant programs, which distributed over $20 billion dollars in funding to grant recipients from fiscal years 2002 through 2011, are allocating resources effectively. Table 2 below describes the basic purposes, the types of projects funded, and the eligible applicants of the SHSP, UASI, PSGP, and TSGP programs. FEMA’s ability to track which projects receive funding among the four grant programs is varied because the project-level information FEMA has available to make award decisions—including grant funding amounts, grant recipients, and grant funding purposes—also varies by program. This is due to differences in the grant programs’ administrative processes. For example, in some cases, FEMA relies on stakeholders to review and recommend projects for grant funding—adding layers to the review process. Delegating administrative duties to stakeholders reduces FEMA’s administrative burden, but also contributes to FEMA having less visibility over some grant applications, specifically those funded via SHSP and UASI. A combination of federal statutes and DHS policy determine specific grant allocation mechanisms and the federal partners involved in grants administration. Figure 2 below describes the federal agencies involved, the path of the grant funds to the final recipient, and the application and award process for each grant, as of fiscal year 2011. Lack of information on overlap makes it impossible to know if programs are effective GAO 2012 (“HOMELAND SECURITY: DHS Needs Better Project Information and Coordination among Four Overlapping Grant Programs” Government Accountability Office 2/12 <http://www.gao.gov/products/GAO-12-303> 6/22/12) From fiscal years 2002 through 2011, DHS has distributed about $20.3 billion through four homeland security preparedness grants that specifically target state, urban, port, and transit security. We recognize that even when programs overlap, they may have meaningful differences in their eligibility criteria or objectives, or they may provide similar types of services in different ways. However, because the four DHS programs in our review have similar goals, fund similar types of projects, and are awarded in many of the same urban areas, it will be important for FEMA to take additional measures to help ensure that the risk of duplication is mitigated. FEMA has delegated significant administrative duties to the SAA for the larger SHSP and UASI programs, and FEMA officials recognize the trade-off between decreased visibility over these grants and the reduced administrative burden on FEMA. However, the limited project-level information on how funds are being used and the lack of coordinated reviews of grant applications across programs, increases the risk that FEMA could fund duplicative projects. Additional action could help mitigate this risk. For example, as FEMA develops the ND Grants system, it will be important for the agency to ensure that information collected for all grant programs provides enough detail to allow for project comparisons in order to identify any unnecessary duplication. In addition, while some steps have been taken at the federal, state, and local levels to improve coordination in administering the four grant programs, additional actions could also help reduce the risk of duplication. Page 71 of 89 Document1 ST. LOUIS URBAN DEBATE LEAGUE 2012-2013 For example, without a process to coordinate reviews across the four grant programs, FEMA lacks the information necessary to identify whether grant monies are being used for duplicative purposes, especially since all four grant programs are being reviewed separately, yet have similar allowable costs. Thus, to reduce the risk of duplication, FEMA could benefit from exploring opportunities to enhance its coordination of project reviews across grant programs. Additionally, since DHS’s existing output-based performance measures for the SHSP and UASI programs do not provide DHS with the information it needs to assess grant effectiveness and FEMA has not yet implemented outcome-based performance measures for any of the four programs, it will be difficult for FEMA to fully assess the effectiveness of these grant programs. Because the project plan FEMA has in place to guide its efforts to develop measures does not provide adequate information to determine what measures will be implemented for each grant program and when this implementation will occur, FEMA does not have reasonable assurance that these measures will be implemented in a timely way to help assess the programs’ effectiveness. PSGP cannot solve – multiple warrants Dept. of Homeland Security ’05 [“Review of the Port Security Grant Program” January 2005 http://www.oig.dhs.gov/assets/Mgmt/OIG_05-10_Jan05.pdf - Access Date 6/24/2012] After the first three rounds of grants under the Port Security Grant Program, recipients have spent only a small portion of the entire amount awarded. Of the $515 million awarded in the first three rounds since June 21, 2003, including $75 million provided under ODP’s Urban Area Security Initiative, grant recipients have expended $106.9 million or 21% of total program funding. As a result, the majority of projects have not been completed, and the program has not yet achieved its intended results in the form of actual improvements to port security. Most of the expended funds are from the first round. The time available to obligate funds varied, depending on when DHS announced the availability of funds. In round one, the appropriation language stated that the funds should be expended no later than September 30, 2003. DHS had slightly more than a year and a half to exhaust the funds. As of April 19, 2004, recipients had not drawn down more than 40% of those funds. DHS allowed 12 months to complete projects. Grant recipients said that one year is inadequate because the period begins on the award date, and precedes the date when the program office finally defines the scope of, and approves, the project. The kind of project and the local entity’s acquisition processes also affect the amount of time required to spend the grant funds.37 Program officials said that they granted extensions to the majority of grant recipients in round one.38 They also confronted this issue in later rounds. We attributed the large amount of unspent funds to incomplete applications, the award of hundreds of grants before the full scope and details of the projects were known, and delays in performing work and executing contracts. Projects were rarely ready to be initiated at the time of award. We counted numerous projects where the NRB or ERB stipulated during its review that the applicant needed to clarify the project. This in turn led to a lengthy negotiation process.40 During this process, the applicant and program office further negotiated the scope of the project and the applicant subsequently submitted additional information. Another matter relating to the status of funds is the program office’s ability to monitor these projects properly to ensure, among other things, their timely completion. MARAD had oversight responsibility for round one. TSA, which had primary grant administration responsibilities for rounds two and three, dedicated one full-time person to the operational oversight of port security grant projects. Rounds two and three produced a total of 811 enhanced facility and operational security projects. One person cannot provide adequate oversight for a program of this size. DHS needs to take steps to ensure that it has adequate resources to oversee program implementation effectively and to accommodate the increasing workload of the program. PSGP does not solve for port security – did not achieve previous goals Dept. of Homeland Security ’05 [“Review of the Port Security Grant Program” January 2005 http://www.oig.dhs.gov/assets/Mgmt/OIG_05-10_Jan05.pdf - Access Date 6/24/2012] After three rounds of the Port Security Grant Program, recipients spent only a small portion of the entire amount awarded. Of the $515 million awarded between June 2002 and December 2003, including $75 million provided under the Office for Domestic Preparedness’s (ODP’s) Urban Area Security Initiative (UASI), grant recipients had expended only $106.9 million, or 21% of total program awards as of September 30, 2004. As a result, the majority of projects have not been completed and the program has not yet achieved its intended results in the form of actual improvements to port security. Page 72 of 89 Document1 ST. LOUIS URBAN DEBATE LEAGUE 2012-2013 AT: Solvency—PSGP Focus Bad/Too Small The PSGP has narrow focus and hard to get grants-very competitive. American Enterprise Institute, 2005 [Veronique de Rugy, Is Port Security Spending Making Us Safer, September 7, 2005, http://directory.cip.management.dal.ca/publications/Is%20Port%20Security%20Spending%20Making%20Us%20Safer.pdf, June 22, 2012] The Port Security Grant Program (PSGP) has a narrow focus. It concentrates on funding security upgrades such as new patrol boats, surveillance equipment at roads and bridges, and new command and control facilities, in the hope of mitigating direct attacks on ports. In 2002, Congress provided the first wave of funding to the Transportation Security Administration (TSA), then part of the Department of Transportation, to enhance the security of ports and other facilities. TSA, along with the Maritime Administration (MARAD) and the U.S. Coast Guard (USCG), developed the PSGP, which it continued once it became part of the Department of Homeland Security. In May 2004, the PSGP was transferred to the Office of Domestic Preparedness (ODP). The grants are awarded to state and local governments and private companies. Eligible applicants in each port area may submit one application for funding. Each applicant that meets the requirements of the PSGP Guidelines and Application Kit is evaluated by a field review panel and a national review panel. Grant recipients are selected through a competitive process. The grants are very little-9 billion in 10 years for 361 ports. American Enterprise Institute, 2005 [Veronique de Rugy, Is Port Security Spending Making Us Safer, September 7, 2005, http://directory.cip.management.dal.ca/publications/Is%20Port%20Security%20Spending%20Making%20Us%20Safer.pdf, June 22, 2012] The stated objective of the Port Security Grant Program is to fund security upgrades to help protect ports in case of a terrorist attack. According to an estimate by the Coast Guard, the cost for enhancing security at America’s 361 maritime facilities would be $1.5 billion in the first year, plus an additional $7.3 billion over the next decade. Thus, if the goal is to enhance security in our ports, $140.9 million is likely to be inadequate. That remains true even if we include the $706 million in direct grants already allocated to ports to improve their physical and operational security and spending. In addition, critics have argued that the U.S. port infrastructure is so vast that spreading $140.9 million across the entire nation will not achieve meaningful security either. On the other hand, considering the narrow and specific focus of the grant program, one can argue that there is a limit to how many video surveillance cameras are needed to secure the country and thus four years after the program started, very little money needs to be allocated now to fill that objective. More substantive criticism came from within the Department of Homeland Security. A review of four separate rounds of the Port Security Grant Program conducted by the DHS Inspector General (IG) between December 2003 and May 2004 questioned the merits of hundreds of projects funded with these grants, ultimately raising doubts about the ability of the program to achieve any meaningful security. Page 73 of 89 Document1 ST. LOUIS URBAN DEBATE LEAGUE 2012-2013 Grant allocation is very poor- bad choices prove American Enterprise Institute, 2005 [Veronique de Rugy, Is Port Security Spending Making Us Safer, September 7, 2005, http://directory.cip.management.dal.ca/publications/Is%20Port%20Security%20Spending%20Making%20Us%20Safer.pdf, June 22, 2012] The grant system is meant to be a competitive grant allocation program. In theory, grants are given out based the merits and the expected security returns of applications submitted by individual ports. However, the IG reports that “[t]he program funded projects despite dubious scores by its evaluators against key criteria, raising questions about the merits of several hundred projects.” For instance, more than $130,000 was awarded to a port for a closed-circuit television system even after the field reviewers ranked the project 27th of 29 applications and stated in its internal review documents that “these initiatives would be redundant to what the port authority has in place.” A $25,000 grant was awarded to install video surveillance equipment and alarms at a port next to a luxury entertainment complex that included restaurants, a hotel, and a spa, even though this project was ranked last among the applications. Given the limited budget available, the funding of such lowpriority projects necessarily means that the reverse situation also occurred: many projects were not funded despite strong support from the field review. For instance, in round three, no grants were awarded to 54 projects that were ranked highly, i.e., in the top five of their groups. Private entities also applied for, and received, substantial funding. There, the IG also reported that funds went to projects that were rated below average or worse during the evaluation process, calling into question the merits of these projects. For instance, in rounds two and three, 155 private-sector projects that ranked below average or worse were funded at a cost of $32.4 million. Grant allocation is very poor- unfinished projects prove American Enterprise Institute, 2005 [Veronique de Rugy, Is Port Security Spending Making Us Safer, September 7, 2005, http://directory.cip.management.dal.ca/publications/Is%20Port%20Security%20Spending%20Making%20Us%20Safer.pdf, June 22, 2012] Furthermore, many port security grant recipients have not spent the funds awarded to them : after the first three rounds of grants, including the Urban Area Security Initiative, recipients have spent only 21 percent of the total amount awarded ($107 million out of $515 million). When the grant funds have been spent, the IG reports some questionable uses of the money. For instance, many grants were given to port security projects that “appeared to be for a purpose other than security against an act of terrorism.” Here are some examples: • $351,000 awarded to a port to buy a mobile command center that DHS’s field reviewers said “appears to be a luxury item.” • $10,000 given to one port for encrypted radios that the DHS field staff concluded were not needed and perhaps not compatible with the federal and state radios. • $935,000 awarded to a port where an industrial park was being built, leading the Department staff members to question if the money was in fact an economic grant instead of anti-terrorism financing.• $1,060,000 awarded to a port for fortified crash beams even though the Department field reviewers believed that this project was primarily anti-theft, not anti-terrorism. In the end, the IG’s report on the Port Security Grant Program concludes that the Department has “no assurance that the program is protecting the nation’s most critical and vulnerable port infrastructure and assets.” Accordingly, reform of the grant system is a worthy priority. The good news is that DHS’s Office of Domestic Preparedness, newly in charge of the PSGP allocation, announced in May 2005 that the program was going to be completely revamped so that money would be distributed using a risk-based formula based on the elements of threat, vulnerability, and consequence. Previously, DHS had tried to spread funds to as many applicants as possible, leading to 361 ports receiving security grants. In FY2005, The Nations; 129 largest ports were evaluated using risks elements. Based on ODP’s evaluation, only 66 port areas have been identified as eligible. Successful applicants will be awarded through a competitive process. This is a tremendous improvement. Page 74 of 89 Document1 ST. LOUIS URBAN DEBATE LEAGUE 2012-2013 AT: Solvency—Domestic Ports It is not enough to just put measures in domestic ports, because most shipping comes from outside the US Keefer 7 (Wendy J. Keefer has a JD from Campbell university and specializes in compliance with Title III of the USA PATRIOT ACT, insurance coverage issues, and business and commercial disputes; http://scholarship.law.campbell.edu/cgi/viewcontent.cgi?article=1462&context=clr; Container Port Security: A Layered Defense Strategy to Protect the Homeland and the International Supply Chain; Campbell law review; written Fall 2007; Accessed June 21, 2012) Annually, more than nine million containers enter United States ports and most ships carrying these containers are foreign owned, foreign registered and operated by foreign crews . Thus, any threat of terrorist use of shipping containers or container carrying vessels does not merely arise upon entry into a United States port. Rather, it is too late to combat the threat once the vessel on which terrorists, their supplies or weapons are loaded sail into domestic waters. It is one goal of port security to prevent terrorist entrance into United States waters altogether. The way in which containers are used to pack and carry cargo complicates container security. A single container may contain cargo from many different companies and shippers. These containers are typically loaded somewhere other than the port (e.g., at company warehouses). Each cargo shipment may involve numerous persons and numerous stops from the actual exporter and importer to the various transportation providers that carry the cargo to and from the ports. Each time a container is transferred or opened a risk of tampering or the loading of dangerous cargo exists. Moreover, given economic concerns, attacks targeting United States interests need not occur at or near any of the over three hundred domestic ports; such attacks could occur among ports of foreign nation trading partners. Containers discharged at ports outside the United States , such as Canadian ports, may ultimately be transferred via truck or train into the United States. At all stages of shipment, security measures are needed and the cooperation of public and private parties in both the United States and abroad is vital. It is in every trading country's interest to participate in efforts to secure these shipments. Page 75 of 89 Document1 ST. LOUIS URBAN DEBATE LEAGUE 2012-2013 AT: Solvency—Container Scanning Scanning mandates are ineffective—information sharing and local action is better McNeill 2011-Senior Policy Analyst for Homeland Security at The Heritage Foundation (Jena, Matt Mayer- Visiting Fellow at The Heritage Foundation and President of the Buckeye Institute for Public Policy Solutions “Ten Years After 9/11: Thinking Smarter About Homeland Security” 5/23/11 <http://www.heritage.org/research/reports/2011/05/ten-years-after-9-11-thinking-smarterabout-homeland-security> 6/21/12) Determining which reforms have made us more agile and better prepared for disaster—and which have been a colossal waste of taxpayer dollars—will ensure that future investments are smart investments. To perform such an assessment, one need not resort to hypothetical questions. The 39 terrorist plots foiled since 9/11 are real and compelling stories of what works. The research demonstrates that investments made since 9/11 in tools like the PATRIOT Act—which empowers law enforcement to track down leads in local communities— and in strengthening information-sharing capabilities are the right investments for security. In essence, if intelligence does not flow seamlessly between law enforcement, the U.S. will not be able to stop terrorist plots before the public is in danger. Centralizing Disaster Preparedness Yet, for every dollar spent on the right investments, five more have been spent on silly efforts to childproof the supply chain. Examples of efforts to scan every cargo container or passenger, screen every box, or regulate the way to security are bountiful. These labors have proved to be a black hole: Millions (if not billions) of taxpayer dollars go in with little security to show for the investment. It is also clear that too often, the preference has been to drive homeland security from Washington. Federal bureaucrats have made policy decisions without input from—or better yet, cooperation with—local communities, despite the fact that the communities are the first responders when disaster strikes. The Federal Emergency Management Agency (FEMA) has acquired more power to drive efforts that belong at the state and local levels. One of the most important lessons from 9/11 and subsequently Hurricane Katrina was that state and local governments are the first on the scene when disaster strikes. Washington should not and cannot be the center of the universe for homeland security. Yet each President over the past 50 years has surpassed his predecessor in the number of federal disaster declarations issued—pushing dependency on Washington and shortchanging state and local efforts. Take Steps to Use Resources Wisely Certainly, there are countless positive examples of how post-9/11 reforms continue to make Americans safer against terrorism. The time has come, however, to recalibrate policies that do not make America safer, empower communities to take a greater role in their preparedness efforts, and return to the very principles of federalism that make the nation free, safe, and prosperous. Specifically, Congress and the Administration should: Stop doing stupid security. Congress and the Administration should undertake an honest assessment of which policies are making the nation safer and which are not. For instance, the 100 percent scanning mandate for maritime cargo has been found wholly unworkable in terms of cost and logistics and would cause tremendous backlogs in the supply chain, yet it remains law. Meanwhile, the sunset provisions of the PATRIOT Act—a vital investigative tool—must be reauthorized by May 27. Reform congressional oversight of homeland security. Getting homeland security right in the future relies heavily on Congress’s ability to exercise oversight in an effective manner. The current structure is too chaotic, with too many committees exercising jurisdiction over American security. Congressional leadership should fix this problem by consolidating oversight into the two standing homeland security committees (separating Senate Governmental Affairs from Homeland Security), the appropriations committees, and the intelligence committees. Page 76 of 89 Document1 ST. LOUIS URBAN DEBATE LEAGUE 2012-2013 Increases in inspection of cargo fail, because they burden trade too much Keefer 7 (Wendy J. Keefer has a JD from Campbell university and specializes in compliance with Title III of the USA PATRIOT ACT, insurance coverage issues, and business and commercial disputes; http://scholarship.law.campbell.edu/cgi/viewcontent.cgi?article=1462&context=clr; Container Port Security: A Layered Defense Strategy to Protect the Homeland and the International Supply Chain; Campbell law review; written Fall 2007; Accessed June 21, 2012) Container shipments are indisputably used for illicit purposes. To date, and to our knowledge, potential terrorists attempting to use the anonymity of container shipments to their advantage have all been detected - Farid - or are known to and presumably monitored by the United States - al Qaeda owned vessels. The government has not yet publicly identified any specific terrorist threats to container shipments or the ports through which such shipments pass, but serious gaps in container security required attention. "Like many parts of our society, we thus confront an unknown threat, but a known vulnerability." The only way wholly to ensure terrorists are unable to use containers to import weapons, other supplies or even would-be terrorists themselves is greater, indeed complete, physical inspection of incoming containers. Such inspections would need to be conducted prior to the carrying vessel's entry into U.S. waters. Searches of all entering containers - or even inspection of any statistically significant number of containers - is extremely impractical. The impracticality of large scale inspections is clear when one considers that even now only about 5% of containers entering United States ports are examined to identify their contents. Any large scale expansion of the number of containers examined whether using non-intrusive imaging technology or involving an actual physical search - would be overly burdensome on global trade. Indeed, such security measures may themselves serve one of the potential terrorist goals by slowing maritime trade to an economically unacceptable level. International Coop key to container security- jurisdictional issues, bad conventions, and inaccurate information Heskerth 10- is a Senior Manager with HM Revenue and Customs (David Hesketh has a Masters in International Customs Law and Administration, a Project Manager for the Department for International Development, and a Senior Manager with HM Revenue and Customs; “Weaknesses in the supply chain: who packed the box?”; http://documentsearch.org/read?=http://-www.worldcustomsjournal.org/media/wcj/-2010/2/Hesketh.pdf; Written September 2010; Accessed June 21, 2012) The international trade supply chain has grown in complexity to a point where clear visibility is masked from those who need to know what is going on. International conventions cover the transport of goods between seller and buyer but concentrate more on limiting liabilities than they do on ensuring the accurate description of the goods. The person who knows what is being sent into the supply chain is the person who packed the box or consigned the goods. If the packing list is wrong, not used or hidden from view then the transport documents such as way bills and the manifest are likely to be inaccurate. This poses safety, security, legal compliance and commercial risks. Information required by border enforcement agencies is being asked for further upstream in the supply chain, prior to the goods being loaded. But the consignor, who holds the key to the majority of that information is outside the jurisdiction of the importing country’s authorities so they turn to the carrier and the importer instead. Unfortunately, information held by the carrier is not always accurate and Customs hold the importer accountable for goods they have probably never seen. In these days of information management rather than the physical control of the goods, the role of export data is increasingly important. A multilateral, international legal framework with enforceable jurisdiction is needed with more emphasis placed on the point at which the international movement of the goods begins. The consignor and the true packing list play a key role. A new key performance indicator and critical way-point must be created called the Consignment Completion Point. A web-based, seamless, electronic data ‘pipeline’ needs to link the seller/consignor and the buyer/consignee and the interested economic operators in between. Real-time, accurate data must be assured from the beginning, updated as the goods move, and shared in a risk based, layered approach. Page 77 of 89 Document1 ST. LOUIS URBAN DEBATE LEAGUE 2012-2013 Scanning improvements are pointless—no uniform system Wolf 06—Political Editor and Director for ABC [Z Byron, Political Editor and Deputy Political Director for ABC News, “How Much Is Too Much for Port Security,” Web, 9/13/06, http://abcnews.go.com/US/Politics/ story?id=2425748&page=1, 6/19/12] But many Democrats say that checking a manifest does nothing to verify what is actually inside a cargo container. They point to Hong Kong, where screeners send every container through machines that check for radioactivity. The United States puts containers through similar machines at select ports, and other containers are scanned by hand-held scanners. Chertoff said the widely varying security measures at ports around the globe made screening for radioactivity challenging. "There's nothing I'd like more than to be able to say, 'Wow, we have a way to make every port in the world scan all the radiation overseas.' But I can't do that with a straight face because not every port is physically constructed to be able to do that, and not every country is willing to do that," Chertoff said. Page 78 of 89 Document1 ST. LOUIS URBAN DEBATE LEAGUE 2012-2013 AT: Solvency – Single solutions fail, need a comprehensive approach Single programs fail – comprehensive reforms key to solve Goslin, 8 - Vice President of International Operations for Duos Technologies [Maritime and Port Security by Charles Goslin, Inc. and Former Seinior Advisor to the Regional Joint Terrorism Task Forces in the U.S. http://www.google.com/url?sa=t&rct=j&q=&esrc=s&source=web&cd=7&ved=0CHYQFjAG&url=http%3A%2F%2Fwww.eskema.eu%2FDownloadFile. aspx%3FtableName%3DtblSubjectArticles%26field%3DPDF%2520Filename%26idField%3DsubjectArticleID%26id%3D514&ei=zq9wT4baBuiDsALHt 5X3BQ&usg=AFQjCNFszV4Yx95-79z5BZjgi4ckuDE0IQ&sig2=shSnWWRop3hNee8nzpZigw] No single security countermeasure such as the container security initiative (CSI) or the terrorist watch list, can adequately address port or maritime security and safety concerns. Technology alone cannot secure ports and shipping, nor can adding additional security procedures, physical barriers, or additional manpower fully mitigate the risk. What will work is an integrated, carefully planned approach that incorporates the best elements of technical, physical, procedural and information security disciplines into a comprehensive strategy. Page 79 of 89 Document1 ST. LOUIS URBAN DEBATE LEAGUE 2012-2013 AT: Solvency—Projects Solvency Deficit—port security projects fail, because they are classified from people who could improve them Flynn 11- was the maritime advisor to the Bush Administration (Written in 2011 Stephen Flynn is the President of the Center for National Policy, was a senior fellow at the Council on Foreign Relations, has a Ph.D. in international relations, and was the maritime and homeland security issues advisor to the Bush Administration; Recalibrating Homeland Security; http://opim.wharton.upenn.edu/risk/library/Flynn_Forei-gnAffairs_May-Jun-2011.pdf; Accessed June 24, 2012) On the surface, it seems sensible to avoid releasing information about vulnerabilities or security measures that potential adversaries could exploit. But this insularity often undermines the defense of critical infrastructure, such as seaports, dams, and waterworks. In determining the best way to protect a suspension bridge, for example, the bridge’s chief engineer is likely to have ideas that would not occur to a law enforcement or military professional working in the Department of Homeland Security. But government officials frequently fail to consult that engineer. They will share security information only with vetted company security officers, who in turn are barred from passing this information on to senior executives and managers who do not hold active security clearances. As a result, investment and operational decisions are often made with scant attention paid to the potential security stakes. Page 80 of 89 Document1 ST. LOUIS URBAN DEBATE LEAGUE 2012-2013 AT: Solvency—Safety U.S. can’t solve safety—we have little control over international regulations put forth by the IMO Convention Papp 2012-U.S. Coast Guard Commandant Admiral (“The Law of the Sea Convention: Perspectives from the U.S. Military” DefencePro 6/18/2012 <http://www.defpro.com/news/details/36522/?SID=6333d8234b2346da2f916706fb4d2e1b> 6/20/12) Vibrant and safe U.S. ports are also vital to a healthy and thriving economy. The safety of U.S. ports, and the vessels that call on them, is a function of U.S. port state control. The Coast Guard maintains a comprehensive port state control program, including vessel inspections, assuring the proficiency of mariners, and monitoring port activity to ensure compliance with the highest standards of maritime safety, security, and environmental protection. Uniform international standards, negotiated and adopted through the International Maritime Organization (IMO), are the foundations of this program. These the linchpin of a transportation system that depends on speed—inconsistent and misunderstood standards only lead to expensive delay and mishaps. In international maritime shipping, where a ship may be flagged by one jurisdiction, owned by a party in another jurisdiction, chartered by a party in yet another jurisdiction, sail through the coastal zones of several jurisdictions, and call in the ports of many other jurisdictions, uniformity of standards is key. The concept of port state control recognizes responsibility through the hierarchy of a ship’s affiliations (including owner, ship classification society, and flag state) to comply with these internationally agreed standards, which should result in compliance wherever a ship is located, including when it sails standards, accepted by the international community, are through waters of the United States but is not calling on a U.S. port (and thus not subject to our port state jurisdiction). The shipping standards negotiated at the IMO are the fabric of the port state control regime that is underpinned by the Convention. It is the Convention that sets forth the responsibilities of flag states, port states, and coastal states for shipping, and the Convention is the agreement that holds nations accountable for adhering to those responsibilities. Because of the currently anomalous situation where the United States is a party to the substantive IMO standards, but not the underlying legal framework of the Convention, our ability to ensure comprehensive global accountability demanded by the port state control framework is weakened. Acceding to the Convention would strengthen Coast Guard negotiation efforts at the IMO, where we lead in the continued development of these important international standards. Although other countries look to us for leadership, there is growing skepticism for certain U.S. negotiating positions because the United States is not a party to the Convention. Becoming party to the Convention would increase the Coast Guard’s credibility as a leader at IMO and result in greater effectiveness in ensuring that U.S. interests are reflected in the standards that are ultimately adopted. The Coast Guard needs the Convention to better promote United States safety, security, and environmental interests at the IMO. Page 81 of 89 Document1 ST. LOUIS URBAN DEBATE LEAGUE 2012-2013 AT: Solvency – Radiation Scanners Current radiation scanners can’t detect shielded material Terreri 09—World Trade [April, “The Current State of Port Security,” Web, 10/09, World Trade, Proquest, 6/20/12] Rooney is also concerned about the fact that overseas radiation portal monitors are unable to detect shielded nuclear materials. Another concern relates to U.S. overseas inspectors. "The GAO and others indicate a number of containers are not inspected overseas because of issues including sovereignty and limited resources for equipment and manpower. So these containers are not inspected until they get here." She adds that if the layered approach was working according to expectations, and overseas inspections were taking place as required, there would be no need to re-inspect these containers once they hit U.S. ports. She maintains the model is not working as it should. Page 82 of 89 Document1 ST. LOUIS URBAN DEBATE LEAGUE 2012-2013 AT: Solvency—Federal Government Can’t solve—government regulations are useless without industry agreement Stowsky 06- executive director of the UC Berkeley Project on Information Technology and Homeland Security (“Protecting the Nation`s Seaports: Balancing Security and Cost” PPIC 7/1/06 <www.ppic.org/content/pubs/report/r_606jhr.pdf> 6/21/12) With some 25,000 containers arriving at U.S. docks each day, and tens of thousands traversing ports across the rest of the globe, the opportunities for theft, fraud, smuggling, and terrorist infiltration are enormous. Current security solutions, such as electronic antitamper seals; chemical, radiological, and biological sensors; tracking technologies of various types; and encrypted data transmission, tend to secure the nodes of the supply network rather than providing true end-to-end security along the entire supply chain. To achieve the latter, industry and government agencies will have to agree on technical standards for interoperability and interconnection. Commercial suppliers, shippers, and port operators cannot afford to maintain multiple technical platforms, infrastructure, or communications protocols from the cargo suppliers’ facilities all the way to the final receiving location. So far the U.S. government has been relying mainly on industry self-regulation to bring about standardization. The shipper and carrier industries have been responsive, but only to a point. A regulated security system offers many benefits to commercial shippers and carriers, as it is likely to speed the movement of cargo more rapidly through the world’s ports, freeing ships up more quickly for the next load. U.S. Customs and Border Protection (CBP), which incorporated parts of the Customs Service and is part of the U.S. Department of Homeland Security, has issued some new rules, most prominently a requirement that ocean carriers must file a manifest, electronically, 24 hours before a cargo container bound for the United States is loaded at a foreign port. But the U.S. government has wielded more carrots than sticks Government is more concerned with cost than with security implications Calvan 12—Boston Globe Writer [Bobby Caina, “US to Miss Target for Tighter Port Security: Cargo Screening Put Off to 2014,” Web, 6/12/12, Boston Globe, Proquest, 6/20/12] Homeland Security "has concluded that 100 percent scanning of incoming maritime cargo is neither the most efficient nor cost-effective approach to securing our global supply chain," said Matt Chandler, an agency spokesman. Homeland Security "continues to work collaboratively with industry, federal partners, and the international community to expand these programs and our capability to detect, analyze, and report on nuclear and radiological materials," Chandler said, adding that "we are more secure than ever before." The agency has used what it calls a "risk-based approach" to shipments. As a result, Homeland Security has focused on cargo originating from 58 of the world's busiest seaports, from Hong Kong to Dubai. Last year, US agents stationed at those ports inspected 45,500 shipments determined to be high risk, according to joint testimony by Homeland Security, Coast Guard, and US Customs officials in February before the House Homeland Security Committee. Republicans have been wary of forcing the agency to comply with the scanning mandate because of the presumed cost, perhaps at least $16 billion - a figure disputed by Markey and others who cite estimates that the program could cost a comparatively modest $200 million. Representative Candice Miller, a Michigan Republican who chairs the House subcommittee on border and maritime security, was more inclined to accept the estimate from Homeland Security officials. In light of the country's budget troubles, "we have to try and prioritize," she said. Scanning cargo "100 percent would be optimal," she conceded, "but it's not workable." Still, she acknowledged the need to secure the country's borders, whether by air, land, or sea. There is no dispute that a terrorist attack at a major port could be catastrophic to the global economy. Much of the world's products - T-shirts sewn in China, designer shoes from Italy, and other foreign-made products arrives in the United States in large, metal cargo containers. While some countries have voluntarily improved cargo screening, others have not. Large retailers have opposed measures that could increase their costs. Without full scanning compliance, it is often difficult to determine if shipments have been inspected because cargo is sometimes transferred from ship to ship offshore. "The existing system has some real problems," said Stephen Flynn, the founding codirector of the Kostas Research Institute for Homeland Security at Northeastern University. "We should be focusing on how to improve the system," he said, "and that's really not happening." November will mark a decade since Congress approved the sweeping maritime law that put in place standards and procedures for screening cargo. In 2007, Markey and other Democrats won approval of the 100-percent scanning program, opposed by Homeland Security officials but ultimately signed by President Bush. "They don't agree with the law. They think we should run the risk of nuclear devastation," said Representative Jerrold Nadler, a New York Democrat. Page 83 of 89 Document1 ST. LOUIS URBAN DEBATE LEAGUE 2012-2013 AT: Solvency—Megaport Megaports fails- lack of cooperation and machine maintenance and handling issues Keefer 7 (Wendy J. Keefer has a JD from Campbell university and specializes in compliance with Title III of the USA PATRIOT ACT, insurance coverage issues, and business and commercial disputes; http://scholarship.law.campbell.edu/cgi/viewcontent.cgi?article=1462&context=clr; Container Port Security: A Layered Defense Strategy to Protect the Homeland and the International Supply Chain; Campbell law review; written Fall 2007; Accessed June 21, 2012) Unfortunately, two years into the program many of the ports identified as presenting the greatest risk for nuclear smuggling were not yet agreeable to participate in the program. Many hurdles blocked progress. Political difficulties negotiating agreements with foreign countries and concerns about the additional resources (e.g., employees) participating countries would need to perform the required screening resulted in agreements with only two of the twenty countries in which the top priority ports were located. Moreover, technical difficulties inherent in the actual screening equipment and procedures were less than certain to detect the presence of nuclear or radiological materials . Nonetheless, DOE continues to negotiate agreements for additional participants in the Megaports Initiative. Despite less than glow. Factors such as the distance between the detection equipment and the container or other cargo being screened, difficulties of devices in detecting highly enriched uranium which emits only gamma radiation which can be shielded using substances such as lead, consistency in the settings used on the detection devices, and maintenance of the detection equipment once control is handed over to the foreign country and port officials may hinder detection of smuggled materials. Page 84 of 89 Document1 ST. LOUIS URBAN DEBATE LEAGUE 2012-2013 AT: Solvency – Lack of Consensus No supply chain solvency – lack of consensus and standardization Sadovaya, 2012—PhD Student (PhD Student at Nanyang Technological University” Maritime Security Requirements for Shipping Companies and Ports: Implementation, Importance and Effectiveness PDF May 27, 2012http://www.icms.polyu.edu.hk/ifspa2012/Papers/M05.pdf 6/19/12) Thus, the question about the necessity of unification of the existing common standards and maritime regulations, partly by mutual recognition concept, is widely discussed in the literature (Aigner, 2010; Altemöller, 2011; Gould, et al., 2010; Ireland, 2011; Metaparti, 2010; Mikuriya, 2007; Pallis & Vaggelas, 2008; Stasinopoulos, 2003; Voort, et al., 2002). Widdowson and Holloway (2009) believe that “there is a strong demand for standardization, harmonization and mutual (cross-border) recognition.” The problem of overlapping of security regimes was also discussed in the paper of Grainger (2007), in that the author used the concept of “security spaghetti” to describe the existing situation. However, just a few studies have been conducted on the comparison of security requirements imposed by different regulations. For example, Gutierrez & Hintsa (2006) in their research combined security measures found in different voluntary supply chain security programs. Similarly, our paper provides a list of compulsory and voluntary security requirements for shipping companies and ports, most often met in different regulations. Page 85 of 89 Document1 ST. LOUIS URBAN DEBATE LEAGUE 2012-2013 AT: Solvency – Coast Guard Solves Many partnerships have been made- Coast guard doing its job. American Association of Port Authorities, 2011 [10 years after 9/11, Security Still a Top Priority of U.S. Ports, http://www.prnewswire.com/news-releases/10-years-after-911-security-still-a-top-priority-of-us-ports128888213.html#linktopagetop, 18/06/2012] In concert with public port authorities and terminal operators, the Coast Guard is charged with routinely inspecting and assessing the security of U.S. port facilities and the vessels that call those facilities, in accordance with the MTSA and the International Ship and Port Facility Security Code. Since 9/11, the Coast Guard has instituted innovative programs such as Maritime Safety and Security Teams, enforced security zones, increased its intelligence gathering and analysis capabilities, expanded its partnerships with the maritime industry, international organizations, federal, state and local agencies, and has joined with other agencies within DHS to strengthen U.S. borders and protect America's ports and waterways. The Coast Guard also cross-checks crew lists against terror watch lists in advance of arriving ships. Page 86 of 89 Document1 ST. LOUIS URBAN DEBATE LEAGUE 2012-2013 A2 Econ Impact Port Strikes are more damaging than a terrorist attack Learner and Thronburg 2006 - Director of the UCLA Anderson Forecast, Chief Economist of the Ceridian-UCLA Pulsel of Commerce, Christopher Thornberg is a founding principal of Beacon Economics [ Chirstopher Thornberg, Edward E Learner, Jon D. Haveman and Howard J. Shatz (editors), Stephen S. Cohen, Peter Gordon, Jon D. Haveman, Matthew C. Hipp, Seth K. Jacobson, \ James E. Moore, II, Qisheng Pan, Harry W. Richardson, Howard J. Shatz, Jay Stowsky, , Ernesto Vilchis, and Amy B. Zegart , Protecting the Nation’s Seaports: Balancing Security and Cost, 2006, http://www.ppic.org/main/publication.asp?i=698, 6/20/12] It is distinctly possible that a port strike would cause less damage to the economy than a terrorist attack would. Unlike a terrorist attack, a port strike is predictable because lengthy labor negotiations occur ahead of time. Of course, a terrorist threat is predictable as well, even if the actual attack is not. The probability levels of an actual attack, by comparison, might be substantially smaller, thus leading to less mitigating reaction by business. However, the government typically does not intervene in the event of a labor action, whereas it would in the event of a terrorist strike. As a result, a strike or other work stoppage might cause a greater slowdown in traffic than a terrorist attack might. One objection to this line of inquiry is that we are looking at labor disputes that occurred in the 1960s and 1970s, when the United States was less trade-dependent and in particular less dependent on the imports of parts and intermediate goods. Past shut downs serve as a good estimate for potential future terrorist attacks Learner and Thronburg 2006 - Director of the UCLA Anderson Forecast, Chief Economist of the Ceridian-UCLA Pulsel of Commerce, Christopher Thornberg is a founding principal of Beacon Economics [ Chirstopher Thornberg, Edward E Learner, Jon D. Haveman and Howard J. Shatz (editors), Stephen S. Cohen, Peter Gordon, Jon D. Haveman, Matthew C. Hipp, Seth K. Jacobson, \ James E. Moore, II, Qisheng Pan, Harry W. Richardson, Howard J. Shatz, Jay Stowsky, , Ernesto Vilchis, and Amy B. Zegart , Protecting the Nation’s Seaports: Balancing Security and Cost, 2006, http://www.ppic.org/main/publication.asp?i=698, 6/20/12] All these factors indicate that although past port shutdowns may not be the perfect example of the effect of a terrorist attack on our ports today, they should be very informative. We might consider this a low estimate for the potential for disturbance to the aggregate economy, but it is certainly a solid estimate. Page 87 of 89 Document1 ST. LOUIS URBAN DEBATE LEAGUE 2012-2013 Capitalism Link Ports increase competition reifies the capitalist system International Transport Forum ‘08 [“Joint Transport Research Centre Discussion Paper no. 2008-19 October 2008 – Port Competition and Hinterland Connections” Round Table, 10-11 April 2008 Paris http://www.internationaltransportforum.org/jtrc/discussionpapers/DP200819.pdf - Access Date 6/25/2012] Containerization was a major technological innovation that revolutionized the nature of maritime-based freight transport of manufactured goods. It caused a substantial degree of standardization of port services, implying that ports cannot rely on specialization to maintain market share and generate revenues as much as they used to. With containerization, ports in the same region become closer substitutes, and hence are more exposed to competition from other ports and other routes. This tendency is reinforced by two other factors. First, the use of ever larger container vessels1 implies that fewer port calls are required for the same freight volume. This move to larger ships reduces shipping lines’ dependence on particular ports and intensifies competition among ports for the remaining calls (assuming each port can handle the larger vessels2). Second, the emergence of intermodal rail and barge corridors has extended gateway ports’ geographical reach. The extension of hinterlands leads to more overlap among ports’ hinterlands and hence to stronger competition. These technological factors imply that the exposure of ports to competition has increased. At the same time, there has been widespread adoption by governments of new public management principles and the ensuing devolution of port management has resulted in a more commercial approach to the management of port operations (Brooks and Cullinane, 2007); this has led to intensified port competition as well. This is not to say that all ports behave like private firms as, in many cases, they pursue a mix of private and public objectives and there is considerable public sector involvement in infrastructure supply. The change in port behavior has been facilitated by a rather passive policy context; in section 3, the question to be tackled is: is a more active public policy towards port and supply chain developments now required? Page 88 of 89 Document1 ST. LOUIS URBAN DEBATE LEAGUE 2012-2013 Ports Parallel the capitalist form of market dominance by a handful of large players International Transport Forum ‘08 [“Joint Transport Research Centre Discussion Paper no. 2008-19 October 2008 – Port Competition and Hinterland Connections” Round Table, 10-11 April 2008 Paris http://www.internationaltransportforum.org/jtrc/discussionpapers/DP200819.pdf - Access Date 6/25/2012] The increase in levels of concentration, along several dimensions, is quite spectacular. In 1980 the top 20 of the world’s shipping lines controlled 26% of TEU-slot capacity; by 2007 their share had increased to 81% (Notteboom, 2008).3 Many of these top 20 further concentrate effort by engaging in alliances. Shipping lines also vertically integrate, in some cases working towards “extended gates” where shipping lines take control of inland transport and inland terminals and depots. At the level of port terminal operations, the market share in terms of throughput of the top 10 players rose from 42% in 2001 to 55% in 2005. This raises concerns over increasing market concentration. Some terminal operators have extended vertically in the direction of “terminal operator haulage”. With respect to vertical integration, the current picture is one of widespread experimentation with ways of organizing the supply chain (see Notteboom, 2008, for an overview), and while it is not clear exactly which models will persist, the emerging picture is one of market dominance by a handful of large players at each segment of the supply chain, combined with fringe firms specialising in profitable niche markets. Despite the small number of players, competition in and for the market (within and between ports) is strong, and may be strong enough to alleviate concerns about market power in the supply chain in many circumstances. Concerns were expressed by participants that the market power of integrated, global transport and logistics companies is a concern for ports themselves. Finally, geographical concentration of flows is increasing as well. For example, the North-South imbalance among ports in Europe is growing larger, and this is largely because of more favourable hinterland transport conditions in the North. Page 89 of 89