Drones Aff – University of Michigan 2015 This file has two versions of the 1AC – one with a beefed up privacy advantage and one with a shorter privacy advantage & a drone warfare advantage. If you want to make arguments about probability, the first 1AC is for you; if you want to race to big impacts, the latter is for you. The starter set is designed to provide equitable ground to both sides, as camp goes on you may be wise to rewrite the plan to make the McNeal CP not competitive. 1AC Privacy Contention 1 – Privacy The federal government is ramping up its use of drones for domestic surveillance, this harms the 4th amendment in unprecedented ways Gilens 2013 (Naomi [ACLU Speech, Privacy and Technology Project]; New Documents Reveal U.S. Marshals’ Drones Experiment, Underscoring Need for Government Transparency; https://www.aclu.org/blog/new-documents-reveal-us-marshals-drones-experiment-underscoring-needgovernment-transparency; kdf) The use of surveillance drones is growing rapidly in the United States, but we know little about how the federal government employs this new technology. Now, new information obtained by the ACLU shows for the first time that the U.S. Marshals Service has experimented with using drones for domestic surveillance. We learned this through documents we released today, received in response to a Freedom of Information Act request. The documents are available here. (We also released a short log of drone accidents from the Federal Aviation Administration as well as accident reports and other documents from the U.S. Air Force.) This revelation comes a week after a bipartisan bill to protect Americans’ privacy from domestic drones was introduced in the House. Although the Marshals Service told us it found 30 pages about its drones program in response to our FOIA request, it turned over only two of those pages—and even they were heavily redacted. Here’s what we know from the two short paragraphs of text we were able to see. Under a header entitled “Unmanned Aerial Vehicle, Man-Portable (UAV) Program,” an agency document overview begins: USMS Technical Operations Group's UAV Program provides a highly portable, rapidly deployable overhead collection device that will provide a multi-role surveillance platform to assist in [redacted] detection of targets. Another document reads: This developmental program is designed to provide [redacted] in support of TOG [presumably the agency’s Technical Operations Group] investigations and operations. This surveillance solution can be deployed during [multiple redactions] to support ongoing tactical operations. These heavily redacted documents reveal almost no information about the nature of the Marshals’ drone program. However, the Marshals Service explained to the Los Angeles Times that they tested two small drones in 2004 and 2005. The experimental program ended after both drones crashed. It is surprising that what seems like a small-scale experiment remained hidden from the public until our FOIA unearthed it. Even more surprising is that seven years after the program was discontinued, the Marshals still refuse to disclose almost any records about it. As drone use becomes more and more common, it is crucial that the government’s use of these spying machines be transparent and accountable to the American people. All too often, though, it is unclear which law enforcement agencies are using these tools, and how they are doing so. We should not have to guess whether our government is using these eyes in the sky to spy on us. As my colleague ACLU staff attorney Catherine Crump told me, Americans have the right to know if and how the government is using drones to spy on them. Drones are too invasive a tool for it to be unclear when the public will be subjected to them. The government needs to respect Americans’ privacy while using this invasive technology, and the laws on the books need to be brought up to date to ensure that America does not turn into a drone surveillance state. All over the U.S., states and localities are trying to figure out through the democratic political process exactly what kind of protections we should put in place in light of the growing use of what Time Magazine called “the most powerful surveillance tool ever devised, on- or offline.” These debates are essential to a healthy democracy, and are heartening to see. However, this production from the Marshals Service underscores the need for a federal law to ensure that the government’s use of drones remains open and transparent. A number of federal lawmakers are already pushing to bring the law up to date. Representatives Ted Poe (RTexas) and Zoe Lofgren (D-Calif.) recently introduced the first bipartisan legislation to regulate the government’s use of drones. The proposed legislation, which is supported by the ACLU, would enact judicial and Congressional oversight mechanisms, require government agencies to register all drones and get a warrant when using them for surveillance (except in emergency situations), and prohibit the domestic use of armed drones. We believe this bill—and hopefully a future companion bill in the Senate—will provide a strong foundation for future legislation protecting our privacy rights in the face of proliferating drone surveillance and government secrecy. The current legal framework is inadequate at confronting the privacy concerns posed by drones Rothfuss 2014 (Ian F [George Mason School of Law]; Student Comment: An Economic Perspective on the Privacy Implications of Domestic Drone Surveillance; 10 J.L. Econ. & Pol'y 441; kdf) Introduction A sixteen-hour standoff with police began after a suspect took control of six cows that wandered on to his farm and "chased police off his land with high powered rifles." n1 Without the suspect's knowledge, police used a Predator drone to locate and apprehend him on his 3,000-acre farm. n2 In addition to law enforcement, anyone may buy a handheld drone. The Parrot AR.Drone 2.0, for example, costs less than three hundred dollars and can fly up to 165 feet from its controller while recording and transmitting live high-definition video from the sky. n3 Unmanned aerial vehicles (drones) have become essential to government surveillance overseas and are now being deployed domestically for law enforcement and other purposes. The ability of drones to conduct widespread domestic surveillance has raised serious privacy concerns. Both government and private actors may use drones. Given the proliferation of this new technology, Congress has recently directed the Federal Aviation Administration (FAA) to expedite the licensing process and open the domestic airspace to drones. n4 Situations like the one described above will likely become more common in the near future. n5 Domestic drones [*442] have the potential to allow the government to effectively and efficiently monitor the activities of people across the nation. Part I of this Comment examines the capabilities of drones, discusses currently planned drone deployments, and examines recent developments that have brought the topic of domestic drone surveillance to the forefront of national security law discussions. This comment concludes that current law does not adequately protect privacy interests from the widespread surveillance that could result from the unrestricted domestic use of drones. Part II discusses the sources of the right to privacy and examines the current state of the law. Part III applies an economic perspective to determine the optimal level of domestic drone surveillance that the law should allow. This analysis is based upon a general economic model of surveillance developed by Andrew Song following the September 11, 2001 terrorist attacks. n6 Economic analysis shows that the uncontrolled domestic deployment of drones would lead to an inefficient and unproductive loss of social utility. Prompt legislative action is therefore necessary to address the fundamental privacy challenges presented by the use of drones. Part IV concludes by proposing a legal framework to balance security and other interests while safeguarding the privacy rights of U.S. citizens. As discussed in this comment, such legislation should allow constructive use of the technology within a framework that protects individual privacy rights. I. Background: Domestic Deployment of Drones Recent congressional legislation has directed the FAA to expedite its current licensing process and allow the private and commercial use of drones in U.S. airspace by October 2015. n7 The FAA has streamlined the authorization process to "less than 60 days" for nonemergency drone operations. n8 Among other requirements, the recent legislation directs the FAA to allow government agencies to operate small drones weighing less than 4.4 pounds. n9 The use of drones can be expected to increase dramatically in the coming years. [*443] The FAA has already authorized many police departments and other agencies to use drones. n10 As of November 2012, the FAA oversaw 345 active Certificates of Waiver or Authorization that allow public entities to operate drones in civil airspace. n11 Customs and Border Protection uses Predator drones along the nation's borders "to search for illegal immigrants and smugglers" n12 and "the FBI and Drug Enforcement Administration have used Predators for other domestic investigations." n13 Predators owned by Customs and Border Protection and based at U.S. Air Force bases have been deployed on numerous occasions to assist local law enforcement. n14 One law enforcement agency has even deployed a drone capable of being armed with lethal and non-lethal weapons. n15 Drones also have applications beyond government law enforcement. Drones may be used to provide live video coverage of events without the need to use piloted helicopters and by paparazzi chasing after pictures of celebrities and other public figures. n16 Individuals may use drones to spy on their neighbors, to keep an eye on their children, or to keep tabs on a potentially unfaithful spouse. n17 The possibilities for corporate espionage and the theft of trade secrets are also endless. Drones range in size from handheld units to units the size of large aircraft and have a wide variety of capabilities. n18 Nearly fifty companies are reported to be developing an estimated 150 varieties of drone systems. n19 Users of drones may include the military, federal and local law enforcement agencies, business entities, and private individuals. Drones have many diverse domestic uses including surveillance of dangerous disaster sites, patrolling borders, helping law enforcement locate suspects, monitoring traffic, crop dusting, aerial mapping, media coverage, and many others. n20 [*444] Drones represent an unprecedented convergence of surveillance technologies that could lead to increased security but could also jeopardize the privacy of U.S. citizens. Drones may be equipped with a variety of technologies including high-resolution cameras, n21 face-recognition technology, n22 video-recording capability, n23 heat sensors, n24 radar systems, n25 night vision, n26 infrared sensors, n27 thermal-imaging cameras, n28 Wi-Fi and communications interception devices, n29 GPS, n30 licenseplate scanners, n31 and other systems designed to aid in surveillance. Drones will soon be able to recognize faces and track the movement of subjects with only minimal visual-image data [*445] obtained from aerial surveillance. n32 Drones have the ability to break into wireless networks, monitor cell-phone calls, and monitor entire towns while flying at high altitude. n33 These rapid technological advancements present privacy challenges that were not contemplated when our existing laws were developed. Drones will be used to perpetuate racism Cyril 2015 (Malkia Amala [under and executive director of the Center for Media Justice (CMJ) and cofounder of the Media Action Grassroots Network]; Black America's State of Surveillance; Mar 30; www.progressive.org/news/2015/03/188074/black-americas-state-surveillance; kdf) Today, media reporting on government surveillance is laser-focused on the revelations by Edward Snowden that millions of Americans were being spied on by the NSA. Yet my mother’s visit from the FBI reminds me that, from the slave pass system to laws that deputized white civilians as enforcers of Jim Crow, black people and other people of color have lived for centuries with surveillance practices aimed at maintaining a racial hierarchy. It’s time for journalists to tell a new story that does not start the clock when privileged classes learn they are targets of surveillance. We need to understand that data has historically been overused to repress dissidence, monitor perceived criminality, and perpetually maintain an impoverished underclass. In an era of big data, the Internet has increased the speed and secrecy of data collection. Thanks to new surveillance technologies, law enforcement agencies are now able to collect massive amounts of indiscriminate data. Yet legal protections and policies have not caught up to this technological advance. Concerned advocates see mass surveillance as the problem and protecting privacy as the goal. Targeted surveillance is an obvious answer—it may be discriminatory, but it helps protect the privacy perceived as an earned privilege of the inherently innocent. The trouble is, targeted surveillance frequently includes the indiscriminate collection of the private data of people targeted by race but not involved in any crime. For targeted communities, there is little to no expectation of privacy from government or corporate surveillance. Instead, we are watched, either as criminals or as consumers. We do not expect policies to protect us. Instead, we’ve birthed a complex and coded culture—from jazz to spoken dialects—in order to navigate a world in which spying, from AT&T and Walmart to public benefits programs and beat cops on the block, is as much a part of our built environment as the streets covered in our blood. In a recent address, New York City Police Commissioner Bill Bratton made it clear: “2015 will be one of the most significant years in the history of this organization. It will be the year of technology, in which we literally will give to every member of this department technology that would’ve been unheard of even a few years ago.” Predictive policing, also known as “Total Information Awareness,” is described as using advanced technological tools and data analysis to “preempt” crime. It utilizes trends, patterns, sequences, and affinities found in data to make determinations about when and where crimes will occur. This model is deceptive, however, because it presumes data inputs to be neutral. They aren’t. In a racially discriminatory criminal justice system, surveillance technologies reproduce injustice. Instead of reducing discrimination, predictive policing is a face of what author Michelle Alexander calls the “New Jim Crow”—a de facto system of separate and unequal application of laws, police practices, conviction rates, sentencing terms, and conditions of confinement that operate more as a system of social control by racial hierarchy than as crime prevention or punishment. In New York City, the predictive policing approach in use is “Broken Windows.” This approach to policing places an undue focus on quality of life crimes—like selling loose cigarettes, the kind of offense for which Eric Garner was choked to death. Without oversight, accountability, transparency, or rights, predictive policing is just high-tech racial profiling—indiscriminate data collection that drives discriminatory policing practices. As local law enforcement agencies increasingly adopt surveillance technologies, they use them in three primary ways: to listen in on specific conversations on and offline; to observe daily movements of individuals and groups; and to observe data trends. Police departments like Bratton’s aim to use sophisticated technologies to do all three. They will use technologies like license plate readers, which the Electronic Frontier Foundation found to be disproportionately used in communities of color and communities in the process of being gentrified. They will use facial recognition, biometric scanning software, which the FBI has now rolled out as a national system, to be adopted by local police departments for any criminal justice purpose. They intend to use body and dashboard cameras, which have been touted as an effective step toward accountability based on the results of one study, yet storage and archiving procedures, among many other issues, remain unclear. They will use Stingray cellphone interceptors. According to the ACLU, Stingray technology is an invasive cellphone surveillance device that mimics cellphone towers and sends out signals to trick cellphones in the area into transmitting their locations and identifying information. When used to track a suspect’s cellphone, they also gather information about the phones of countless bystanders who happen to be nearby. The same is true of domestic drones, which are in increasing use by U.S. law enforcement to conduct routine aerial surveillance. While drones are currently unarmed, drone manufacturers are considering arming these remote-controlled aircraft with weapons like rubber bullets, tasers, and tear gas. They will use fusion centers. Originally designed to increase interagency collaboration for the purposes of counterterrorism, these have instead become the local arm of the intelligence community. According to Electronic Frontier Foundation, there are currently seventy-eight on record. They are the clearinghouse for increasingly used “suspicious activity reports”—described as “official documentation of observed behavior reasonably indicative of preoperational planning related to terrorism or other criminal activity.” These reports and other collected data are often stored in massive databases like e-Verify and Prism. As anybody who’s ever dealt with gang databases knows, it’s almost impossible to get off a federal or state database, even when the data collected is incorrect or no longer true. Predictive policing doesn’t just lead to racial and religious profiling—it relies on it. Just as stop and frisk legitimized an initial, unwarranted contact between police and people of color, almost 90 percent of whom turn out to be innocent of any crime, suspicious activities reporting and the dragnet approach of fusion centers target communities of color. One review of such reports collected in Los Angeles shows approximately 75 percent were of people of color. This is the future of policing in America, and it should terrify you as much as it terrifies me. Unfortunately, it probably doesn’t, because my life is at far greater risk than the lives of white Americans, especially those reporting on the issue in the media or advocating in the halls of power. One of the most terrifying aspects of high-tech surveillance is the invisibility of those it disproportionately impacts. The NSA and FBI have engaged local law enforcement agencies and electronic surveillance technologies to spy on Muslims living in the United States. According to FBI training materials uncovered by Wired in 2011, the bureau taught agents to treat “mainstream” Muslims as supporters of terrorism, to view charitable donations by Muslims as “a funding mechanism for combat,” and to view Islam itself as a “Death Star” that must be destroyed if terrorism is to be contained. From New York City to Chicago and beyond, local law enforcement agencies have expanded unlawful and covert racial and religious profiling against Muslims not suspected of any crime. There is no national security reason to profile all Muslims. At the same time, almost 450,000 migrants are in detention facilities throughout the United States, including survivors of torture, asylum seekers, families with small children, and the elderly. Undocumented migrant communities enjoy few legal protections, and are therefore subject to brutal policing practices, including illegal surveillance practices. According to the Sentencing Project, of the more than 2 million people incarcerated in the United States, more than 60 percent are racial and ethnic minorities. But by far, the widest net is cast over black communities. Black people alone represent 40 percent of those incarcerated. More black men are incarcerated than were held in slavery in 1850, on the eve of the Civil War. Lest some misinterpret that statistic as evidence of greater criminality, a 2012 study confirms that black defendants are at least 30 percent more likely to be imprisoned than whites for the same crime. This is not a broken system, it is a system working perfectly as intended, to the detriment of all. The NSA could not have spied on millions of cellphones if it were not already spying on black people, Muslims, and migrants. As surveillance technologies are increasingly adopted and integrated by law enforcement agencies today, racial disparities are being made invisible by a media environment that has failed to tell the story of surveillance in the context of structural racism. Only regulation of domestic drones can prevent warfare on citizens and bolster the industry Ahsanuddin et al 2014 (Sadia - principal investigator for the report and MPAC research fellow; Domestic Drones: Implications for Privacy and Due Process in the United States; Sep 8; www.mpac.org/publications/policy-papers/domestic-drones.php; kdf) Drones also impact due process rights. Drones are perhaps best known for the role they play in conducting signature strikes against suspected militants abroad. Will civilians on American soil ever be subjected to drone attacks? Should civilians fear the weaponization of drones or their use in delivering lethal payloads? Although the Fifth and Fourteenth Amendments assure individuals of the right to due process before the deprivation of life, liberty, or property, these rights have already begun to erode due to the global war on terror and the use of drones to conduct signature strikes by virtue of executive decisions that are devoid of judicial review. With the mass introduction of domestic drones, there remains a threat and real fear that drones may be used to deprive individuals of life, liberty, or property with no opportunity to dispute the charges brought against them. Americans of all ethnicities and creeds are likely to be affected by the domestic deployment of drones. American Muslims have a special contribution to make to this discussion. Having been subjected to special law enforcement attention and scrutiny, American Muslims find themselves particularly susceptible to infractions of civil liberties. As representatives of the American Muslim population and with the expertise to ground our analysis, the Muslim Public Affairs Council (MPAC) proposes the following guidelines to address the issues of law enforcement use of drones, data collection, weaponization of drones, due process, oversight, and transparency: • Law enforcement use of drones should be restricted. • Data collection should be strictly monitored. • The FAA should require, not merely recommend, that test sites incorporate the Fair Information Principles into their privacy policies. • The weaponization of drones should be prohibited. • The right to due process should be preserved. • States and individuals should have the ability to bring a cause of action against an entity that, in operating a drone, violates their rights. • Drone deployment by federal agents must be subjected to Congressional oversight and local public drone use should be subjected to local city council oversight. • The general public should be engaged in the development of policy guidelines by a public body intending to operate drones. • In keeping with the principle of transparency, the FAA should make available to the public the names of drone applicants, the holders of Certificates of Authorization, other licensees, and privacy policies of drone-operating agencies. Adequate protection of privacy is necessary to allow the public to take advantage of drone technology without becoming a society in which every movement is monitored by the authorities. Simultaneously, drone developers need regulations so that they can conduct research and development unimpeded by protests and news reports. Additionally, the weaponization of drones on domestic soil poses a threat to due process rights and public safety. This was acknowledged by Sen. Dianne Feinstein, who called for a total prohibition on the weaponization of domestic drones.13 Indeed, politicians and policymakers representing a broad spectrum of political views advocate regulations for domestic drones. Domestic drones will become weaponized – posing unique risks to civil liberties Greenwald 2013 (Glenn [former columnist on civil liberties and US national security issues for the Guardian. An ex-constitutional lawyer]; The US Needs To Wake Up To Threat Of Domestic Drones; Mar 30; http://www.theguardian.com/commentisfree/2013/mar/29/domestic-drones-unique-dangers; kdf) The use of drones by domestic US law enforcement agencies is growing rapidly, both in terms of numbers and types of usage. As a result, civil liberties and privacy groups led by the ACLU - while accepting that domestic drones are inevitable have been devoting increasing efforts to publicizing their unique dangers and agitating for statutory limits. These efforts are being impeded by those who mock the idea that domestic drones pose unique dangers (often the same people who mock concern over their usage on foreign soil). This dismissive posture is grounded not only in soft authoritarianism (a religious-type faith in the Goodness of US political leaders and state power generally) but also ignorance over current drone capabilities, the ways drones are now being developed and marketed for domestic use, and the activities of the increasingly powerful domestic drone lobby. So it's quite worthwhile to lay out the key under-discussed facts shaping this issue. I'm going to focus here most on domestic surveillance drones, but I want to say a few words about weaponized drones. The belief that weaponized drones won't be used on US soil is patently irrational. Of course they will be. It's not just likely but inevitable. Police departments are already speaking openly about how their drones "could be equipped to carry nonlethal weapons such as Tasers or a bean-bag gun." The drone industry has already developed and is now aggressively marketing precisely such weaponized drones for domestic law enforcement use. It likely won't be in the form that has received the most media attention: the type of large Predator or Reaper drones that shoot Hellfire missiles which destroy homes and cars in Pakistan, Yemen, Somalia, Afghanistan and multiple other countries aimed at Muslims (although US law enforcement agencies already possess Predator drones and have used them over US soil for surveillance). Instead, as I detailed in a 2012 examination of the drone industry's own promotional materials and reports to their shareholders, domestic weaponized drones will be much smaller and cheaper, as well as more agile - but just as lethal. The nation's leading manufacturer of small "unmanned aircraft systems" (UAS), used both for surveillance and attack purposes, is AeroVironment, Inc. (AV). Its 2011 Annual Report filed with the SEC repeatedly emphasizes that its business strategy depends upon expanding its market from foreign wars to domestic usage including law enforcement: AV's annual report added: "Initial likely non-military users of small UAS include public safety organizations such as law enforcement agencies. . . ." These domestic marketing efforts are intensifying with the perception that US spending on foreign wars will decrease. As a February, 2013 CBS News report noted, focusing on AV's surveillance drones: "Now, drones are headed off the battlefield. They're already coming your way. "AeroVironment, the California company that sells the military something like 85 percent of its fleet, is marketing them now to public safety agencies." Like many drone manufacturers, AV is now focused on drone products - such as the "Qube" - that are so small that they can be "transported in the trunk of a police vehicle or carried in a backpack" and assembled and deployed within a matter of minutes. One news report AV touts is headlined "Drone technology could be coming to a Police Department near you", which focuses on the Qube. But another article prominently touted on AV's website describes the tiny UAS product dubbed the "Switchblade", which, says the article, is "the leading edge of what is likely to be the broader, even wholesale, weaponization of unmanned systems." The article creepily hails the Switchblade drone as "the ultimate assassin bug". That's because, as I wrote back in 2011, "it is controlled by the operator at the scene, and it worms its way around buildings and into small areas, sending its surveillance imagery to an i-Pad held by the operator, who can then direct the Switchblade to lunge toward and kill the target (hence the name) by exploding in his face." AV's website right now proudly touts a February, 2013 Defense News article describing how much the US Army loves the "Switchblade" and how it is preparing to purchase more. Time Magazine heralded this tiny drone weapon as "one of the best inventions of 2012", gushing: "the Switchblade drone can be carried into battle in a backpack. It's a kamikaze: the person controlling it uses a real-time video feed from the drone to crash it into a precise target - say, a sniper. Its tiny warhead detonates on impact." What possible reason could someone identify as to why these small, portable weaponized UAS products will not imminently be used by federal, state and local law enforcement agencies in the US? They're designed to protect their users in dangerous situations and to enable a target to be more easily killed. Police agencies and the increasingly powerful drone industry will tout their utility in capturing and killing dangerous criminals and their ability to keep officers safe, and media reports will do the same. The handful of genuinely positive uses from drones will be endlessly touted to distract attention away from the dangers they pose. One has to be incredibly naïve to think that these "assassin bugs" and other lethal drone products will not be widely used on US soil by an already para-militarized domestic police force. As Radley Balko's forthcoming book "Rise of the Warrior Cop" details, the primary trend in US law enforcement is what its title describes as "The Militarization of America's Police Forces". The history of domestic law enforcement particularly after 9/11 has been the importation of military techniques and weapons into domestic policing. It would be shocking if these weapons were not imminently used by domestic law enforcement agencies. In contrast to weaponized drones, even the most naïve among us do not doubt the imminent proliferation of domestic surveillance drones. With little debate, they have already arrived. As the ACLU put it in their recent report: "US law enforcement is greatly expanding its use of domestic drones for surveillance." An LA Times article from last month reported that "federal authorities have stepped up efforts to license surveillance drones for law enforcement and other uses in US airspace" and that "the Federal Aviation Administration said Friday it had issued 1,428 permits to domestic drone operators since 2007, far more than were previously known." Moreover, the agency "has estimated 10,000 drones could be aloft five years later" and "local and state law enforcement agencies are expected to be among the largest customers." Concerns about the proliferation of domestic surveillance drones are typically dismissed with the claim that they do nothing more than police helicopters and satellites already do. Such claims are completely misinformed. As the ACLU's 2011 comprehensive report on domestic drones explained: "Unmanned aircraft carrying cameras raise the prospect of a significant new avenue for the surveillance of American life." Multiple attributes of surveillance drones make them uniquely threatening. Because they are so cheap and getting cheaper, huge numbers of them can be deployed to create ubiquitous surveillance in a way that helicopters or satellites never could. How this works can already been seen in Afghanistan, where the US military has dubbed its drone surveillance system "the Gorgon Stare", named after the "mythical Greek creature whose unblinking eyes turned to stone those who beheld them". That drone surveillance system is "able to scan an area the size of a small town" and "the most sophisticated robotics use artificial intelligence that [can] seek out and record certain kinds of suspicious activity". Boasted one US General: "Gorgon Stare will be looking at a whole city, so there will be no way for the adversary to know what we're looking at, and we can see everything." The NSA already maintains ubiquitous surveillance of electronic communications, but the Surveillance State faces serious limits on its ability to replicate that for physical surveillance. Drones easily overcome those barriers. As the ACLU report put it: I've spoken previously about why a ubiquitous Surveillance State ushers in unique and deeply harmful effects on human behavior and a nation's political culture and won't repeat that here (here's the video (also embedded below) and the transcript of one speech where I focus on how that works). Suffice to say, as the ACLU explains in its domestic drone report: "routine aerial surveillance would profoundly change the character of public life in America" because only drone technology enables such omnipresent physical surveillance. Beyond that, the tiny size of surveillance drones enables them to reach places that helicopters obviously cannot, and to do so without detection. They can remain in the sky, hovering over a single place, for up to 20 hours, a duration that is always increasing - obviously far more than manned helicopters can achieve. As AV's own report put it (see page 11), their hovering capability also means they can surveil a single spot for much longer than many military satellites, most of which move with the earth's rotation (the few satellites that remain fixed "operate nearly 25,000 miles from the surface of the earth, therefore limiting the bandwidth they can provide and requiring relatively larger, higher power ground stations"). In sum, surveillance drones enable a pervasive, stealth and constantly hovering Surveillance State that is now well beyond the technological and financial abilities of law enforcement agencies. One significant reason why this proliferation of domestic drones has become so likely is the emergence of a powerful drone lobby. I detailed some of how that lobby is functioning here, so will simply note this passage from a recent report from the ACLU of Iowa on its attempts to persuade legislators to enact statutory limits on the use of domestic drones: "Drones have their own trade group, the Association for Unmanned Aerial Systems International, which includes some of the nation's leading aerospace companies. And Congress now has 'drone caucuses' in both the Senate and House." Howie Klein has been one of the few people focusing on the massive amounts of money from the drone industry now flowing into the coffers of key Congressional members from both parties in this "drone caucus". Suffice to say, there is an enormous profit to be made from exploiting the domestic drone market, and as usual, that factor is thus far driving the (basically nonexistent) political response to these threats. What is most often ignored by drone proponents, or those who scoff at anti-drone activism, are the unique features of drones: the way they enable more warfare, more aggression, and more surveillance. Drones make war more likely precisely because they entail so little risk to the war-making country. Similarly, while the propensity of drones to kill innocent people receives the bulk of media attention, the way in which drones psychologically terrorize the population - simply by constantly hovering over them: unseen but heard - is usually ignored, because it's not happening in the US, so few people care (see this AP report from yesterday on how the increasing use of drone attacks in Afghanistan is truly terrorizing local villagers). It remains to be seen how Americans will react to drones constantly hovering over their homes and their childrens' schools, though by that point, their presence will be so institutionalized that it will be likely be too late to stop. Notably, this may be one area where an actual bipartisan/trans-partisan alliance can meaningfully emerge, as most advocates working on these issues with whom I've spoken say that libertarian-minded GOP state legislators have been as responsive as more left-wing Democratic ones in working to impose some limits. One bill now pending in Congress would prohibit the use of surveillance drones on US soil in the absence of a specific search warrant, and has bipartisan support. Only the most authoritarian among us will be incapable of understanding the multiple dangers posed by a domestic drone regime (particularly when their party is in control of the government and they are incapable of perceiving threats from increased state police power). But the proliferation of domestic drones affords a real opportunity to forge an enduring coalition in defense of core privacy and other rights that transcends partisan allegiance, by working toward meaningful limits on their use. Making people aware of exactly what these unique threats are from a domestic drone regime is the key first step in constructing that coalition. Anonymity is a vital component of American democracy which is undermined by drones, ushering in a totalitarian state Burow 2013 (Matthew L [Candidate for JD @ New England School of Law]; The Sentinel Clouds above the Nameless Crowd: Prosecuting Anonymity from Domestic Drones; 39 New Eng. J. on Crim. & Civ. Confinement 443; kdf) Walking down the street. Driving a car. Sitting on a park bench. By themselves, these actions do not exhibit an iota of privacy. The individual has no intention to conceal their movements; no confidentiality in their purpose. The individual is in the open, enjoying a quiet day or a peaceful Sunday drive. Yet as Chief Justice Rehnquist commented, there is uneasiness if an individual suspected that these innocuous and benign movements were being recorded and scrutinized for future reference. 119 If the "uneasy" reaction to which the Chief Justice referred is not based on a sense of privacy invasion, it stems from something very close to it-a sense that one has a right to public anonymity. 120 Anonymity is the state of being unnamed. 121 The right to public anonymity is the assurance that, when in public, one is unremarked and part of the undifferentiated crowd as far as the government is concerned. 122 That right is usually surrendered only when one does or says something that merits government attention, which most often includes criminal activity. 123 But when that attention is gained by surreptitiously operated UASs that are becoming more affordable for local law enforcement agencies, 124 "it evades the ordinary checks that constrain abusive law enforcement practices ... : 'limited police resources and community hostility."' 12 5 This association of public anonymity and privacy is not new. 126 Privacy expert and Columbia University Law professor Alan F. Westin points out that "anonymity [] occurs when the individual is in public places or performing public acts but still seeks, and finds, freedom from identification and surveillance." 127 Westin continued by stating that: [A person] may be riding a subway, attending a ball game, or walking the streets; he is among people and knows that he is being observed; but unless he is a well-known celebrity, he does not expect to be personally identified and held to the full rules of behavior and role that would operate if he were known to those observing him. In this state the individual is able to merge into the "situational landscape." 128 While most people would share the intuition of Chief Justice Rehnquist and professor Westin that we expect some degree of anonymity in public, there is no such right to be found in the Constitution. Therefore, with a potentially handcuffed judiciary, the protection of anonymity falls to the legislature. Based on current trends in technology and a keen interest taken by law enforcement in the advancement of UAS integration into national airspace, it is clear that drones pose a looming threat to Americans' anonymity. 129 Even when UASs are authorized for noble uses such as search and rescue missions, fighting wildfires, and assisting in dangerous tactical police operations, UASs are likely to be quickly embraced by law enforcement for more controversial purposes. 130 What follows are compelling interdisciplinary reasons why the legislature should take up the call to protect the subspecies of privacy that is anonymity. A. Philosophic: The Panopticon Harm Between 1789 and 1812, the Panopticon prison was the central obsession of the renowned English philosopher Jeremy Bentham's life. 131 The Panopticon is a circular building with cells occupying the circumference and the guard tower standing in the center. 132 By using blinds to obscure the guards located in the tower, "the keeper [is] concealed from the observation of the prisoners ... the sentiment of an invisible omnipresence."'133 The effect of such architectural brilliance is simple: the lone fact that there might be a guard watching is enough to keep the prisoners on their best behavior. 134 As the twentieth-century French philosopher Michel Foucault observed, the major effect of the Panopticon is "to induce in the inmate a state of conscious and permanent visibility that assures the automatic functioning of power."'135 In Bentham's vision, there is no need for prison bars, chains or heavy locks; the person who is subjected to the field of visibility of the omnipresent guard plays both roles and he becomes the subject of his own subjection. 136 For Foucault, this "panopticism" was not necessarily bad when compared to other methods of exercising control as this sort of "subtle coercion" could lead people to be more productive and efficient members of society. 137 Following Foucault's reasoning, an omnipresent UAS circling above a city may be similar to a Panopticon guard tower and an effective way of keeping the peace. The mere thought of detection may keep streets safer and potential criminals at bay. However, the impact on cherished democratic ideals may be too severe. For example, in a case regarding the constitutionally vague city ordinance that prohibited "nightwalking," Justice Douglas commented on the importance of public vitality and locomotion in America: The difficulty is that [walking and strolling] are historically part of the amenities of life as we have known them. They are not mentioned in the Constitution or in the Bill of Rights. These unwritten amenities have been in part responsible for giving our people the feeling of independence and self-confidence, the feeling of creativity. These amenities have dignified the right of dissent and have honored the right to be nonconformists and the right to defy submissiveness. They have encouraged lives of high spirits rather than hushed, suffocating silence. 138 As Justice Douglas understood, government surveillance stifles the cherished ideal of an American society that thrives on free-spiritedness in public. 39 Without the right to walk the streets in public, free from the fear of high surveillance, our American values would dissipate into that resembling a totalitarian state that attacks the idea of privacy as immoral, antisocial and part of the dissident cult of individualism. 140 This dehumanization justifies the worst atrocities Burow 2013 (Matthew L [Candidate for JD @ New England School of Law]; The Sentinel Clouds above the Nameless Crowd: Prosecuting Anonymity from Domestic Drones; 39 New Eng. J. on Crim. & Civ. Confinement 443; kdf) This Note has explored the philosophical and psychological effects of panoptic surveillance and the need for protection.2 29 A mere suspicion of a UAS flying high in sky can have a chilling effect on democracy that most Americans would consider intolerable. 230 But what about the psychological changes UASs will bring about in law enforcement? The following is an excerpt from a news report on the mindset of UAS pilots who operate military drones in overseas combat missions: Bugsplat is the official term used by US authorities when humans are killed by drone missiles .... [I]t is deliberately employed as a psychological tactic to dehumanise targets so operatives overcome their inhibition to kill .... It was Hitler who coined this phraseology in Nazi Germany during the Holocaust. In Mein Kampf, Hitler refers to Jews as vermin (volksungeziefer) or parasites (volksschtidling). In the infamous Nazi film, Der ewige Jude, Jews were portrayed as harmful pests that deserve to die. Similarly, in the Rwandan genocide, the Tutsis were described as "cockroaches." This is not to infer genocidal intent in US drone warfare, but rather to emphasise the dehumanising effect of this terminology in Nazi Germany and that the very same terms are used by the US in respect of their Pakistani targets. 231 Will John and Jane Doe-the casual saunterer-become part of the next group of bugs that must be swatted in the name of effective law enforcement? In answering that question, we should look to the skies once again and pray to the better angels of our nature for a worthy answer. The surveillance state makes the collapse of the US likely Scheer 2015 (Robert [Prof @ USC’s School of journalism and communication]; They Know Everything About You; Nation Books; p. 176; kdf) WE ARE A NATION THAT HAS LONG CELEBRATED DISSIDENTS throughout the world who dare, often at great risk, to expose the secret actions and challenge the legitimacy of repressive governments. In some cases, we even provide legal sanctuary or asylum for such people. However, when Americans dissent in such radical ways, the opposite is often the case-they are vilified as disloyal and as a threat to our collective security or stability. The assumption, embraced so widely, must be that our system never requires such a fundamental challenge to its authority, as represented by the actions of a Daniel Ellsberg, Thomas Drake, Chelsea Manning, or Edward Snowden. We know, however, from so many historical examples-the Roman Empire, Nazi Germany, the Soviet Union-that unchallenged authority not only will violate human rights but also will ultimately sow the seeds of its own ruin, increasingly blind to its own limitations and flaws. Despite our historically innovative constitutional checks on government power, we are nevertheless always flirting with imperial hubris. We see this clearly in the pattern of lies that defined US foreign policy after 9/11; it is quite apparent that leaving those lies largely unchallenged in the name of classification seriously weakened the position of the United States in the world. The plan is the catalyst that makes privacy possible Ahsanuddin et al 2014 (Sadia - principal investigator for the report and MPAC research fellow; Domestic Drones: Implications for Privacy and Due Process in the United States; Sep 8; www.mpac.org/publications/policy-papers/domestic-drones.php; kdf) Simultaneously, the IHSS survey respondents indicated apprehensiveness over any domestic drone operations: two-thirds expressed concern over potential surveillance in homes or public areas; 65 percent were concerned about safety; and 75 percent were concerned about the government’s ability to regulate use.82 The rapid pace at which drone technology is developing, the lack of clear guidelines protecting privacy and civil liberties, and public concern over these issues indicate an urgent need for action in Congress and state legislatures. Privacy experts agree. In an article in the Stanford Law Review Online, Professor Ryan Calo of the University of Washington School of Law states that drones “may be just the visceral jolt society needs to drag privacy law into the twenty-first century.” American privacy law has developed at a “slow and uneven” pace, whereas technology has developed at a rapid speed. In spite of the development of computers, the Internet, Global-Positioning Systems (GPS), biometrics, gigapixel cameras, face recognition technology, and the widespread use of e-mail and other forms of electronic communication, there has been no attendant development in privacy law. Because drones “threaten to perfect the art of surveillance,” they make for a good catalyst to update privacy law. The need for legislation is clear. With recent revelations that the federal government has been conducting surveillance of the American public on an unprecedented level, the threat that unregulated and immensely capable technologies pose to civil liberties is profound. The law must catch up with technology. Plan The United States federal government should require law enforcement agents to receive a probable cause warrant prior conducting aerial surveillance. Contention 2 – Solvency The plan is the only way to balance privacy and security concerns Rothfuss 2014 (Ian F [George Mason School of Law]; Student Comment: An Economic Perspective on the Privacy Implications of Domestic Drone Surveillance; 10 J.L. Econ. & Pol'y 441; kdf) IV. Legislative and Policy Recommendations This section discusses the current policy and legislative recommendations regarding drone surveillance and applies economic analysis to recommend an optimal way forward. Developing new laws and policies to address the privacy threats presented by domestic drone surveillance will involve the difficult balancing of many special interests and the individual privacy rights of U.S. citizens. n147 Therefore, in drafting a legal framework for domestic drone surveillance, Congress should consider economic factors and establish a framework which allows the use of drones with constraints to protect the privacy interests of U.S. citizens. As an objective methodology, these economic perspectives should lead lawmakers and policymakers to enact rules that will efficiently maximize utility while protecting privacy interests. The new framework should address the privacy concerns arising out of the domestic use of drones, while still allowing society to realize the technological benefits. Congress must consider many factors when determining how to best integrate drones into U.S. airspace. n148 In addition, the proposed policies should be compared with the policies in countries such as the United Kingdom, where general surveillance is more commonplace. n149 In July 2012, the Association for Unmanned Vehicle Systems International (AUVSI) issued a code of conduct that attempted to address concerns associated with the deployment of drones. n150 Among other elements, the code of conduct requires industry members to "respect the privacy of individuals" and "comply with all federal, state, and local laws, ordinances, covenants, and restrictions." n151 The code of conduct has been viewed as insufficient since it only lists broad topics, does not discuss specific privacy concerns, and does not elaborate on how the provisions will be enforced. n152 Current recommendations address a number of concerns regarding the widespread deployment of drones in the United States. Among these are recommendations from the American Civil Liberties Union (ACLU) n153 and legislation currently pending in both houses of Congress. n154 The first group of recommendations to consider is usage restrictions. It is generally accepted that drones and other means of surveillance may be used when a warrant has been issued because probable cause exists. Therefore, the focus of [*459] pending legislation and policy recommendations is on when the use of drones should be allowed without a warrant, if at all. The ACLU proposes that drone use should be limited to three purposes: (1) "where there are specific and articulable grounds to believe that the drone will collect evidence relating to a specific instance of criminal wrongdoing or, if the drone will intrude upon reasonable expectations of privacy, where the government has obtained a warrant based on probable cause;" n155 (2) "where there is a geographically confined, time-limited emergency situation in which particular individuals' lives are at risk;" n156 or (3) "for reasonable non-law enforcement purposes . . . where privacy will not be substantially affected." n157 Similarly, both the House and Senate versions of the Preserving Freedom from Unwanted Surveillance Act of 2013 provide for three exceptions to the warrant requirement: (1) "patrol of borders"; (2) "exigent circumstances"; and (3) "high risk" of terrorist attack, as determined by the Secretary of Homeland Security. n158 The definition of exigent circumstances differs in the two bills. The Senate bill defines exigent circumstances to only include action necessary to "prevent imminent danger to life," n159 while the House bill uses a broader definition that also includes "serious damage to property, or to forestall the imminent escape of a suspect, or destruction of evidence." n160 The broader definition of exigent circumstances in the House of Representatives version of the bill n161 is appropriate since it will give law enforcement more latitude to protect the American people in addition to providing for civil liability n162 as a check against improper use of this authority. The next recommendation is to consider whether there should be an exclusionary rule that would make any evidence gathered without a warrant or other legal authorization inadmissible in a criminal proceeding. The Senate bill also includes an exclusionary rule that would prohibit evidence collected in violation of the Act from being used in criminal prosecution. n163 Exclusionary rules can overdeter criminal investigations. n164 Therefore, unless a compelling case can be made as to why it is necessary, it would be more efficient not to include an exclusionary rule in the legislation. Another consideration is whether drones operating in the United States should be allowed to carry weapons like drones operating overseas which [*460] are used to target enemy combatants. One recommendation is to prohibit law enforcement from arming drones. n165 Drones have the ability to conduct remote precision strikes on suspects, but due process concerns and the dangers resulting from armed unmanned aircraft preclude the viability of this option within the United States. Therefore, domestic drones should be prohibited from carrying weapons of any kind. Congress should enact rules to govern domestic drone use. One recommendation is that Congress should require the Department of Transportation to conduct a Privacy Impact Assessment of the operation of drones domestically. n166 Pending legislation proposes amending the FAA Modernization and Reform Act of 2012 to address drone privacy concerns. n167 With the proper focus on privacy concerns, drones may be deployed domestically while still protecting the privacy of American citizens. In addition, Congress should require a warrant for "extended surveillance of a particular target." n168 As discussed earlier, the Fourth Amendment would not necessarily require a warrant in these situations. Even so, such a requirement extending warrant protections makes sense and will provide a valuable check against law enforcement abuse of the new technology. Congress should require authorization from an independent official for generalized surveillance that collects personally identifiable information such as facial features and license plate numbers. n169 This recommendation would apply to situations where a warrant was not required but personally identifiable information was still being gathered, such as surveillance at a public event. This recommendation should be enacted as a safeguard of the public's privacy interests. To adequately protect privacy interests, Congress should direct that the independent official, vested with decision-making power on applications for general surveillance, be a neutral and detached magistrate who is completely separated from any law enforcement or intelligence agency. As discussed in the previous section, legislation should be crafted to maximize the social utility from the domestic use of drones. The legislation should be structured according to the three levels of scrutiny proposed by Song to ensure that the governmental interest in the surveillance outweighs the disutility or social cost that will result from the loss of privacy. n170 The neutral and detached magistrate discussed above could determine when a sufficient government interest exists to warrant allowing generalized drone surveillance. [*461] Additional policy recommendations include an image retention restriction n171 and a requirement to file a data collection statement to obtain a FAA license to operate a drone. n172 These recommendations should be incorporated into the legislation. Congress should require a data collection statement with applications for a FAA license to operate a drone. A key element of the required data collection statement should address the retention of images and other data obtained. n173 Such a restriction would mandate that all images and other sensory data gathered through surveillance be deleted unless the information serves a valid, legal purpose that requires retention. n174 This restriction is necessary to prevent the government or any other entity from amassing an essentially limitless database of information on the activities of U.S. citizens without a valid and specified purpose. Collectively, enacting these recommendations would prevent widespread, general drone surveillance while allowing drones to be utilized domestically when reasonably warranted to maintain security or protect the interests of American citizens. Therefore, these recommendations would adequately protect the privacy interests of American citizens while allowing law enforcement and other entities to utilize drones to protect our country and serve other worthwhile endeavors. Establishing limits on drones is the only method to revitalize the fourth amendment San Pedro 2014 (Victoria [J.D. Candidate, Stetson University College of Law]; STUDENT WORK: DRONE LEGISLATION: KEEPING AN EYE ON LAW ENFORCEMENT'S LATEST SURVEILLANCE TECHNOLOGY; 43 Stetson L. Rev. 679; kdf) V. CONCLUSION AND RECOMMENDATIONS With the ubiquity of drone licenses among American law enforcement agencies, n288 the drag-net surveillance that was once a laughable concept n289 is now a reality. n290 While state statutes and proposed federal legislation attempt to limit law enforcement's ability to use drones in surveillance efforts, those proposals and statutes do not adequately address the duration of the sur-veillance or the sophistication of the technology used by law enforcement to enhance drone capabilities. Therefore, by requir-ing a warrant and restricting law enforcement from conducting drone surveillance for a period lasting longer than twenty-four hours, the proposed legislation will best address the issues left open by Fourth Amendment jurisprudence. [*720] Further, including the exigent circumstances language into the legislation will allow law enforcement agencies to better understand the circumstances that would permit the use of a drone. Because the courts have addressed exigent circumstances on numerous occasions, n291 law enforcement agencies may already have protocols and officer training dealing with exigent cir-cumstances. Rather than drafting legislation that attempts to describe a circumstance meriting the use of a drone, n292 using the exigent circumstances language will allow law enforcement agen-cies to comply with Fourth Amendment jurisprudence already defined by the Court. Similarly, legislation imposing a time restriction on the dura-tion of the surveillance will provide law enforcement agencies with a bright-line rule that facilitates application across the board. Since the current Fourth Amendment jurisprudence provides that one does not have a reasonable expectation of pri-vacy from all observations of one's property, n293 this statutory lan-guage will provide a reasonable expectation of privacy from prolonged observations of one's property. This proposal would comply with current Fourth Amendment jurisprudence regarding fly-over aerial observations and would also be consistent with the mosaic theory. n294 Further, this proposal limits law enforcement's ability to use any form of drone technology. Given that the technological advancements in this field will likely continue to progress at a rapid pace, any proposed legislation should incorporate an objective standard defining the permissible level of technology or an outright prohibition on the use of all drone surveillance. In this way, we can align the use of this form of technology with Fourth Amendment protections. Rather than providing vague standards, such as technology that is not in general public use, the general restriction provides a bright-line rule to law enforcement agencies. [*721] Therefore, this proposal would allow law enforcement to be exempt from the warrant requirement for exigent circumstances, while also allowing them to obtain a warrant from a neutral and detached magistrate when law enforcement intends to conduct long-term surveillance, thereby ensuring that law enforcement agencies comply with the warrant requirement of the Fourth Amendment and respect citizens' privacy rights. Federal action is uniquely key Harman 2015 (Jane [Former Rep, D-CA]; The undercooked debate on domestic drones; may 1; thehill.com/opinion/op-ed/240728-the-undercooked-debate-on-domestic-drones; kdf) Today, lawmakers worldwide are sleepwalking through a privacy and security crisis. How many secure sites have to be compromised before we wake up to the full challenges posed by commercial and law enforcement UAVs – or, in common parlance, by drones? The Federal Aviation Administration unveiled rules this February that would make it much easier to operate drones in the United States: for law enforcement agencies conducting surveillance, for commercial firms, and for private individuals. Make no mistake: eventually, the last two groups could include bad actors, even terrorists. It’s hard to overstate how undercooked the debate on this future is. The stakes are high; our privacy and our security are at risk. The implications for privacy and surveillance are huge. In 2012, the Supreme Court ruled that tracking a car using an attached GPS beacon, without a warrant, is unconstitutional. But what if police use a roving drone instead? That debate is raging in Virginia now, which two years ago imposed a two-year moratorium on warrantless drone surveillance. That’s where most of the regulatory action is happening on this issue: in concerned states and municipalities across the country. At the federal level, we have a leadership vacuum. With a technological revolution on its way, Washington is AWOL. How do you square this new world with our Constitution? As Brookings Institution senior fellow John Villasenor said in 2012, “The FAA, I would imagine, has more aviation lawyers than Fourth Amendment constitutional lawyers.” Then there are the new security challenges. Authorities have a poor track record detecting small aircraft that fly where they shouldn’t. In 2010, a Mexican government drone went down in an El Paso backyard; though NORAD later said it had been tracking the plane, local officials seem to have been taken entirely by surprise. This month, a postal employee flew a (manned) gyrocopter to Capitol Hill through some of the most restricted airspace in the country. Incidents like these severely undermine confidence in our preparedness. One day, one of the craft slipping under our radar will do us harm. Iran has poured funds into developing a “suicide drone” – essentially a cheap, nimble cruise missile. It’s not hard to imagine terrorists building do-it-yourself versions of the same device, a pipe bomb or pressure cooker strapped to a small UAV. This is a concern others have raised for years, but it took a drone landing feet from the White House for the Secret Service to start trying out jamming technology – an issue they should have been thinking about years ago. Many drone countermeasures are still primitive; some of the solutions are worse than the problem. Popular Science advised the White House, “Simple netting, used often at drone trade shows to keep small drones confident to their exhibitions, could also work, if the President wanted to live inside a net all the time.” We need a serious policy response that engages Congress; federal, state, and local government – and the private sector. This issue is too big for the FAA, too urgent to postpone, and too important to leave off the national agenda. Lately, Congress has devoted impressive attention to new risks in cyberspace. It should put at least as much effort into understanding drones. One option is to encourage commercial firms—through either voluntary or mandatory standards—to hardwire restrictions into the drones they build and sell. Some companies already program their drones to stay out of restricted airspace and away from sensitive sites. Those efforts need a push and a signal boost from government. The justifications for data collection are wrought with faulty logic—only increasing the amount of info available to public can keep us safe Scheer 2015 (Robert [Prof @ USC’s School of journalism and communication]; They Know Everything About You; Nation Books; p. 208-212; kdf) WE MUST CHALLENGE THE ASSUMPTION THAT PROTECTING national security requires sacrificing the constitutional rights of the individual. As pointed out in this book, the Fourth Amendment does not contain an absolute· ban on searches and seizures but, rather, requires a court-authorized warrant based on probable cause of a crime before invading an individual's private space. All Yahoo was asking of the court was that the searches of its company's customers meet this requirement. Instead, the government responded that the so-called War on Terrorism could not be won on that basis, and the secret FISA court endorsed the view. As Stewart Baker, the former NSA general counsel and Homeland Security official in the Bush administration, told the Washington Post after the Yahoo case documents were released: "I'm always astonished how people are willing to abstract these decisions from the actual stakes." He went on to say that "[w]e're talking about trying to gather information about people who are trying to kill us and who will succeed if we don't have robust information about their activities. "26 As demonstrated in previous chapters, however, there is simply no serious evidence that the mass surveillance program initiated under President Bush provided the sort of "robust information" Baker claims was required to identify the people "trying to kill us." Yet, as this book goes to press, we have been presented with still another case study in the rise of a terrorist movement-the Islamic State oflraq and Syria (ISIS), whose members are creating considerable mayhem in Iraq and Syria-for which the mass surveillance techniques of the NSA left us totally unprepared. They appeared suddenly, startlingly so, these black-clad men of ISIS, beheading journalists and others27 as they formed their proclaimed Sunni Caliphate over a broad swath of Syria and lraq. 28 Once again, as with the al Qaeda attacks of 9/11, the fearsome spectacle of a terrorist enemy drove reason from the stage and the chant of war was in the air. The New York Times carried the text ofObama's speech to the nation on September 10, 2014, in which he vowed to "destroy the terrorist group."29 Defense Secretary Chuck Hegel said that ISIS poses an "imminent threat to every interest all the arguments for peace and restraint were cast aside and the defense of privacy and civil liberty seemed an unaffordable indulgence in the rush to combat an enemy of such awesome power and mystery. Lost in the moment of fear-induced passion was the fact that these men of ISIS who so alarmed us, like their cousins we have."30 Suddenly, in al Qaeda, were hardly unknown or mysterious beings, but instead monsters partially of our own creation. Adam Gopnik reinforced this point in an August 2014 article in the New Yorker. "ISIS is a horrible group doing horrible things, and there are many factors behind its rise," he wrote. "But they came to be a threat and a power less because of all we didn't do than because of certain things we did do-foremost among them that massive, forward intervention, the Iraq War. (The historical question to which ISIS is the answer is: What could possibly be worse than Saddam Hussein?)"31 Now, once again-and this time as compared to 9 I 11, when the public was so ill-served with alarmist information about the extent of the terrorist threat-the president was presumably in possession of that vast trove of intelligence data collected by the NSA and analyzed with the brilliant software of the best Silicon Valley datamining companies such as the media-celebrated Palantir. And yet there is no evidence that this costly and intrusive effort was the least bit useful in predicting the rise of ISIS. Clearly, there is a disturbing disconnect between the zeal with which big data is collected and the lack of scientific precision in utilizing that data to make sound policy decisions and to inform the public as to the necessity of action. It is also difficult to see just how that data, based as it is on the minutiae of the lives of much of the world's population, is useful to an understanding of this threat. This book explains the continued rise of a military-intelligence complex that, through the assertion of a pressing danger to national security after 9 I 11, made an unfettered and largely unchallenged claim upon the vast amount of private data collected in a wired world by government and private enterprises. It is a claim based on the unquestioned assumption that what passes for military intelligence is sufficiently and uniquely productive of useful insight to warrant the costs to our democracy as well as our federal budget, and that less invasive means of research such as scholarship, journalism, and traditional shoe-leather spy and detective work are inherently inadequate to the task of protecting us in a cyberworld. It is a commonly persuasive argument and difficult to challenge given that the high-tech surveillance is cloaked in such tight secrecy. In the wake of the Snowden revelations, when there was a much-heightened public awareness of the threat to privacy and a willingness, even on the part of Congress, to address the issue more vigorously, all it took was the appearance of a renewed terrorist threat to develop anew a consensus that privacy needed to be surrendered as an unaffordable risk to the nation's security. Just the opposite is the case. What now passes for military intelligence is a tech -driven oxymoron that denies the place of historical contemplation, cultural and religious study, political complexity, and ethical restraints in assessing dangers to a nation. Never has our nation's foreign policy been so poorly served as in the era of the Internet, with its enormous potential to enlighten us; but the collusions of war-mongering fanatics and profiteers are beyond the comprehension of even the most powerful machines. They must not be beyond the purview of public awareness, however. A fully informed public is the best safeguard against the hazardous foreign entanglements that our founders warned were the main threat to the health of the republic. That is why they enshrined the constitutional protections against unbridled government power they believed would subvert the American experiment in representative governance. We must heed the wisdom of the EFF's senior attorney Lee Tien, who as much as any constitutional lawyer has battled on behalf of those rights. As he summed up in an interview: "We need to fix the national security classification system that has classified so much information that we don't know what's going on. It's hard to know what we should do, but we should all agree that knowing what's happening is the first step. It's dangerous to propose a solution when you don't know what the extent of the problem is. If you asked me before the Snowden revelations, my answer would be different. There are no personal solutions to this; there is nothing we can do individually." "This is a systemic problem," he continued. "It's an institutional problem, it's a political problem. There can only be collective action. That's it. That means we need to call on all of them-individuals, Internet companies, politicians, the government-to fix it, and we need to organize. You can't have a democracy if you don't have sufficient information. We're fighting for the soul of this democracy." Transparency in data collection is crucial Scheer 2015 (Robert [Prof @ USC’s School of journalism and communication]; They Know Everything About You; Nation Books; p. 157-8; kdf) OUR GOVERNMENT, LIKE OTHERS THROUGHOUT history, tells us that repressive, invasive, and paranoid national security policies are for our own good, especially in terms of our safety. Yet where do the prerogatives of a surveillance state driven by fear and governed by secrecy really take us? The reality is that these procedures not only are unconstitutional but all too often lead to bad government policies, both at home and abroad. One need only review the invasion of Iraq to see the folly of toppling a regime that was an implacable enemy of al Qaeda-an invasion driven by a fear of weapons of mass destruction that free access to the available data would have discounted. The direct result, billions of dollars and hundreds of thousands of deaths later, is a fractured Iraq that, at the time of this writing a decade later, seems to be in a constant state of bloody division. Or as veteran correspondent Patrick Cockburn summarized in the London Review of Books in 2014, after the extremist Islamic State of Iraq and Syria (ISIS) seized huge swaths of both countries: For America, Britain and the Western powers, the rise of lsis and the Caliphate is the ultimate disaster. Whatever they intended by their invasion oflraq in 2003 and their efforts to get rid of Assad in Syria since 2011, it was not to see the creation of a jihadi state spanning northern Iraq and Syria run by a movement a hundred times bigger and much better organised than the alQaida of Osama bin Laden. The war on terror for which civil liberties have been curtailed and hundreds of billions of dollars spent has failed miserably.1 The obvious lesson of that debacle, and others like it, is that an informed public with access to accurate information-even when the facts are embarrassing to the government- is the best safeguard against such errors. Aren't we better off knowing when our freedoms are threatened or we are being lied to, even by our own leaders, so that we can rectify such policies? In other words, didn't Edward Snowden, regardless of the legality of his actions, actually make us safer? Excuses for surveillance are unmerited Weiss 2015 (Leonard [visiting scholar at Stanford University’s Center for International Security and Cooperation]; On fear and nuclear terror; Mar 3; Bulletin of the Atomic Scientists 2015, Vol. 71(2) 75–87; kdf) The rise of the national surveillance state. Lowering the risk of terrorism, particularly the nuclear kind, is the quintessential reason that the mandarins of the national security state have given for employing the most invasive national surveillance system in history. “Finding the needle in the haystack” is how some describe the effort to discern terrorist plots from telephone metadata and intercepted communications. But the haystack keeps expanding, and large elements of the American population appear willing to allow significant encroachments on the constitutional protections provided by the Fourth Amendment. The fear of terrorism has produced this change in the American psyche even though there is no evidence that the collection of such data has resulted in the discovery of terrorist plots beyond those found by traditional police and intelligence methods. It is doubtful that we shall soon (if ever) see a return to the status quo ante regarding constitutional protections. This reduction in the freedom of Americans from the prying eyes of the state is a major consequence of the hyping of terrorism, especially nuclear terrorism. This is exemplified by the blithe conclusion in the previously referenced paper by Friedman and Lewis (2014), in which readers are advised to “be more proactive in supporting our government’s actions to ameliorate potential risks.” The National Security Agency should love this. And, authors have motives to exaggerate the threat of terrorism Weiss 2015 (Leonard [visiting scholar at Stanford University’s Center for International Security and Cooperation]; On fear and nuclear terror; Mar 3; Bulletin of the Atomic Scientists 2015, Vol. 71(2) 75–87; kdf) There is a tendency on the part of security policy advocates to hype security threats to obtain support for their desired policy outcomes. They are free to do so in a democratic society, and most come by their advocacy through genuine conviction that a real security threat is receiving insufficient attention. But there is now enough evidence of how such advocacy has been distorted for the purpose of overcoming political opposition to policies stemming from ideology that careful public exposure and examination of data on claimed threats should be part of any such debate. Until this happens, the most appropriate attitude toward claimed threats of nuclear terrorism, especially when accompanied by advocacy of policies intruding on individual freedom, should be one of skepticism. Interestingly, while all this attention to nuclear terrorism goes on, the United States and other nuclear nations have no problem promoting the use of nuclear power and national nuclear programs (only for friends, of course) that end up creating more nuclear materials that can be used for weapons. The use of civilian nuclear programs to disguise national weapon ambitions has been a hallmark of proliferation history ever since the Atoms for Peace program (Sokolski, 2001), suggesting that the real nuclear threat resides where it always has resided-in national nuclear programs; but placing the threat where it properly belongs does not carry the public-relations frisson currently attached to the word “terrorism.” 1AC Big Stick Contention 1 – Privacy The federal government is ramping up its use of drones for domestic surveillance, this harms the 4th amendment in unprecedented ways Gilens 2013 (Naomi [ACLU Speech, Privacy and Technology Project]; New Documents Reveal U.S. Marshals’ Drones Experiment, Underscoring Need for Government Transparency; https://www.aclu.org/blog/new-documents-reveal-us-marshals-drones-experiment-underscoring-needgovernment-transparency; kdf) The use of surveillance drones is growing rapidly in the United States, but we know little about how the federal government employs this new technology. Now, new information obtained by the ACLU shows for the first time that the U.S. Marshals Service has experimented with using drones for domestic surveillance. We learned this through documents we released today, received in response to a Freedom of Information Act request. The documents are available here. (We also released a short log of drone accidents from the Federal Aviation Administration as well as accident reports and other documents from the U.S. Air Force.) This revelation comes a week after a bipartisan bill to protect Americans’ privacy from domestic drones was introduced in the House. Although the Marshals Service told us it found 30 pages about its drones program in response to our FOIA request, it turned over only two of those pages—and even they were heavily redacted. Here’s what we know from the two short paragraphs of text we were able to see. Under a header entitled “Unmanned Aerial Vehicle, Man-Portable (UAV) Program,” an agency document overview begins: USMS Technical Operations Group's UAV Program provides a highly portable, rapidly deployable overhead collection device that will provide a multi-role surveillance platform to assist in [redacted] detection of targets. Another document reads: This developmental program is designed to provide [redacted] in support of TOG [presumably the agency’s Technical Operations Group] investigations and operations. This surveillance solution can be deployed during [multiple redactions] to support ongoing tactical operations. These heavily redacted documents reveal almost no information about the nature of the Marshals’ drone program. However, the Marshals Service explained to the Los Angeles Times that they tested two small drones in 2004 and 2005. The experimental program ended after both drones crashed. It is surprising that what seems like a small-scale experiment remained hidden from the public until our FOIA unearthed it. Even more surprising is that seven years after the program was discontinued, the Marshals still refuse to disclose almost any records about it. As drone use becomes more and more common, it is crucial that the government’s use of these spying machines be transparent and accountable to the American people. All too often, though, it is unclear which law enforcement agencies are using these tools, and how they are doing so. We should not have to guess whether our government is using these eyes in the sky to spy on us. As my colleague ACLU staff attorney Catherine Crump told me, Americans have the right to know if and how the government is using drones to spy on them. Drones are too invasive a tool for it to be unclear when the public will be subjected to them. The government needs to respect Americans’ privacy while using this invasive technology, and the laws on the books need to be brought up to date to ensure that America does not turn into a drone surveillance state. All over the U.S., states and localities are trying to figure out through the democratic political process exactly what kind of protections we should put in place in light of the growing use of what Time Magazine called “the most powerful surveillance tool ever devised, on- or offline.” These debates are essential to a healthy democracy, and are heartening to see. However, this production from the Marshals Service underscores the need for a federal law to ensure that the government’s use of drones remains open and transparent. A number of federal lawmakers are already pushing to bring the law up to date. Representatives Ted Poe (RTexas) and Zoe Lofgren (D-Calif.) recently introduced the first bipartisan legislation to regulate the government’s use of drones. The proposed legislation, which is supported by the ACLU, would enact judicial and Congressional oversight mechanisms, require government agencies to register all drones and get a warrant when using them for surveillance (except in emergency situations), and prohibit the domestic use of armed drones. We believe this bill—and hopefully a future companion bill in the Senate—will provide a strong foundation for future legislation protecting our privacy rights in the face of proliferating drone surveillance and government secrecy. The current legal framework is inadequate at confronting the privacy concerns posed by drones Rothfuss 2014 (Ian F [George Mason School of Law]; Student Comment: An Economic Perspective on the Privacy Implications of Domestic Drone Surveillance; 10 J.L. Econ. & Pol'y 441; kdf) Introduction A sixteen-hour standoff with police began after a suspect took control of six cows that wandered on to his farm and "chased police off his land with high powered rifles." n1 Without the suspect's knowledge, police used a Predator drone to locate and apprehend him on his 3,000-acre farm. n2 In addition to law enforcement, anyone may buy a handheld drone. The Parrot AR.Drone 2.0, for example, costs less than three hundred dollars and can fly up to 165 feet from its controller while recording and transmitting live high-definition video from the sky. n3 Unmanned aerial vehicles (drones) have become essential to government surveillance overseas and are now being deployed domestically for law enforcement and other purposes. The ability of drones to conduct widespread domestic surveillance has raised serious privacy concerns. Both government and private actors may use drones. Given the proliferation of this new technology, Congress has recently directed the Federal Aviation Administration (FAA) to expedite the licensing process and open the domestic airspace to drones. n4 Situations like the one described above will likely become more common in the near future. n5 Domestic drones [*442] have the potential to allow the government to effectively and efficiently monitor the activities of people across the nation. Part I of this Comment examines the capabilities of drones, discusses currently planned drone deployments, and examines recent developments that have brought the topic of domestic drone surveillance to the forefront of national security law discussions. This comment concludes that current law does not adequately protect privacy interests from the widespread surveillance that could result from the unrestricted domestic use of drones. Part II discusses the sources of the right to privacy and examines the current state of the law. Part III applies an economic perspective to determine the optimal level of domestic drone surveillance that the law should allow. This analysis is based upon a general economic model of surveillance developed by Andrew Song following the September 11, 2001 terrorist attacks. n6 Economic analysis shows that the uncontrolled domestic deployment of drones would lead to an inefficient and unproductive loss of social utility. Prompt legislative action is therefore necessary to address the fundamental privacy challenges presented by the use of drones. Part IV concludes by proposing a legal framework to balance security and other interests while safeguarding the privacy rights of U.S. citizens. As discussed in this comment, such legislation should allow constructive use of the technology within a framework that protects individual privacy rights. I. Background: Domestic Deployment of Drones Recent congressional legislation has directed the FAA to expedite its current licensing process and allow the private and commercial use of drones in U.S. airspace by October 2015. n7 The FAA has streamlined the authorization process to "less than 60 days" for nonemergency drone operations. n8 Among other requirements, the recent legislation directs the FAA to allow government agencies to operate small drones weighing less than 4.4 pounds. n9 The use of drones can be expected to increase dramatically in the coming years. [*443] The FAA has already authorized many police departments and other agencies to use drones. n10 As of November 2012, the FAA oversaw 345 active Certificates of Waiver or Authorization that allow public entities to operate drones in civil airspace. n11 Customs and Border Protection uses Predator drones along the nation's borders "to search for illegal immigrants and smugglers" n12 and "the FBI and Drug Enforcement Administration have used Predators for other domestic investigations." n13 Predators owned by Customs and Border Protection and based at U.S. Air Force bases have been deployed on numerous occasions to assist local law enforcement. n14 One law enforcement agency has even deployed a drone capable of being armed with lethal and non-lethal weapons. n15 Drones also have applications beyond government law enforcement. Drones may be used to provide live video coverage of events without the need to use piloted helicopters and by paparazzi chasing after pictures of celebrities and other public figures. n16 Individuals may use drones to spy on their neighbors, to keep an eye on their children, or to keep tabs on a potentially unfaithful spouse. n17 The possibilities for corporate espionage and the theft of trade secrets are also endless. Drones range in size from handheld units to units the size of large aircraft and have a wide variety of capabilities. n18 Nearly fifty companies are reported to be developing an estimated 150 varieties of drone systems. n19 Users of drones may include the military, federal and local law enforcement agencies, business entities, and private individuals. Drones have many diverse domestic uses including surveillance of dangerous disaster sites, patrolling borders, helping law enforcement locate suspects, monitoring traffic, crop dusting, aerial mapping, media coverage, and many others. n20 [*444] Drones represent an unprecedented convergence of surveillance technologies that could lead to increased security but could also jeopardize the privacy of U.S. citizens. Drones may be equipped with a variety of technologies including high-resolution cameras, n21 face-recognition technology, n22 video-recording capability, n23 heat sensors, n24 radar systems, n25 night vision, n26 infrared sensors, n27 thermal-imaging cameras, n28 Wi-Fi and communications interception devices, n29 GPS, n30 licenseplate scanners, n31 and other systems designed to aid in surveillance. Drones will soon be able to recognize faces and track the movement of subjects with only minimal visual-image data [*445] obtained from aerial surveillance. n32 Drones have the ability to break into wireless networks, monitor cell-phone calls, and monitor entire towns while flying at high altitude. n33 These rapid technological advancements present privacy challenges that were not contemplated when our existing laws were developed. Anonymity is a vital component of American democracy which is undermined by drones, ushering in a totalitarian state Burow 2013 (Matthew L [Candidate for JD @ New England School of Law]; The Sentinel Clouds above the Nameless Crowd: Prosecuting Anonymity from Domestic Drones; 39 New Eng. J. on Crim. & Civ. Confinement 443; kdf) Walking down the street. Driving a car. Sitting on a park bench. By themselves, these actions do not exhibit an iota of privacy. The individual has no intention to conceal their movements; no confidentiality in their purpose. The individual is in the open, enjoying a quiet day or a peaceful Sunday drive. Yet as Chief Justice Rehnquist commented, there is uneasiness if an individual suspected that these innocuous and benign movements were being recorded and scrutinized for future reference. 119 If the "uneasy" reaction to which the Chief Justice referred is not based on a sense of privacy invasion, it stems from something very close to it-a sense that one has a right to public anonymity. 120 Anonymity is the state of being unnamed. 121 The right to public anonymity is the assurance that, when in public, one is unremarked and part of the undifferentiated crowd as far as the government is concerned. 122 That right is usually surrendered only when one does or says something that merits government attention, which most often includes criminal activity. 123 But when that attention is gained by surreptitiously operated UASs that are becoming more affordable for local law enforcement agencies, 124 "it evades the ordinary checks that constrain abusive law enforcement practices ... : 'limited police resources and community hostility."' 12 5 This association of public anonymity and privacy is not new. 126 Privacy expert and Columbia University Law professor Alan F. Westin points out that "anonymity [] occurs when the individual is in public places or performing public acts but still seeks, and finds, freedom from identification and surveillance." 127 Westin continued by stating that: [A person] may be riding a subway, attending a ball game, or walking the streets; he is among people and knows that he is being observed; but unless he is a well-known celebrity, he does not expect to be personally identified and held to the full rules of behavior and role that would operate if he were known to those observing him. In this state the individual is able to merge into the "situational landscape." 128 While most people would share the intuition of Chief Justice Rehnquist and professor Westin that we expect some degree of anonymity in public, there is no such right to be found in the Constitution. Therefore, with a potentially handcuffed judiciary, the protection of anonymity falls to the legislature. Based on current trends in technology and a keen interest taken by law enforcement in the advancement of UAS integration into national airspace, it is clear that drones pose a looming threat to Americans' anonymity. 129 Even when UASs are authorized for noble uses such as search and rescue missions, fighting wildfires, and assisting in dangerous tactical police operations, UASs are likely to be quickly embraced by law enforcement for more controversial purposes. 130 What follows are compelling interdisciplinary reasons why the legislature should take up the call to protect the subspecies of privacy that is anonymity. A. Philosophic: The Panopticon Harm Between 1789 and 1812, the Panopticon prison was the central obsession of the renowned English philosopher Jeremy Bentham's life. 131 The Panopticon is a circular building with cells occupying the circumference and the guard tower standing in the center. 132 By using blinds to obscure the guards located in the tower, "the keeper [is] concealed from the observation of the prisoners ... the sentiment of an invisible omnipresence."'133 The effect of such architectural brilliance is simple: the lone fact that there might be a guard watching is enough to keep the prisoners on their best behavior. 134 As the twentieth-century French philosopher Michel Foucault observed, the major effect of the Panopticon is "to induce in the inmate a state of conscious and permanent visibility that assures the automatic functioning of power."'135 In Bentham's vision, there is no need for prison bars, chains or heavy locks; the person who is subjected to the field of visibility of the omnipresent guard plays both roles and he becomes the subject of his own subjection. 136 For Foucault, this "panopticism" was not necessarily bad when compared to other methods of exercising control as this sort of "subtle coercion" could lead people to be more productive and efficient members of society. 137 Following Foucault's reasoning, an omnipresent UAS circling above a city may be similar to a Panopticon guard tower and an effective way of keeping the peace. The mere thought of detection may keep streets safer and potential criminals at bay. However, the impact on cherished democratic ideals may be too severe. For example, in a case regarding the constitutionally vague city ordinance that prohibited "nightwalking," Justice Douglas commented on the importance of public vitality and locomotion in America: The difficulty is that [walking and strolling] are historically part of the amenities of life as we have known them. They are not mentioned in the Constitution or in the Bill of Rights. These unwritten amenities have been in part responsible for giving our people the feeling of independence and self-confidence, the feeling of creativity. These amenities have dignified the right of dissent and have honored the right to be nonconformists and the right to defy submissiveness. They have encouraged lives of high spirits rather than hushed, suffocating silence. 138 As Justice Douglas understood, government surveillance stifles the cherished ideal of an American society that thrives on free-spiritedness in public. 39 Without the right to walk the streets in public, free from the fear of high surveillance, our American values would dissipate into that resembling a totalitarian state that attacks the idea of privacy as immoral, antisocial and part of the dissident cult of individualism. 140 This dehumanization justifies the worst atrocities Burow 2013 (Matthew L [Candidate for JD @ New England School of Law]; The Sentinel Clouds above the Nameless Crowd: Prosecuting Anonymity from Domestic Drones; 39 New Eng. J. on Crim. & Civ. Confinement 443; kdf) This Note has explored the philosophical and psychological effects of panoptic surveillance and the need for protection.2 29 A mere suspicion of a UAS flying high in sky can have a chilling effect on democracy that most Americans would consider intolerable. 230 But what about the psychological changes UASs will bring about in law enforcement? The following is an excerpt from a news report on the mindset of UAS pilots who operate military drones in overseas combat missions: Bugsplat is the official term used by US authorities when humans are killed by drone missiles .... [I]t is deliberately employed as a psychological tactic to dehumanise targets so operatives overcome their inhibition to kill .... It was Hitler who coined this phraseology in Nazi Germany during the Holocaust. In Mein Kampf, Hitler refers to Jews as vermin (volksungeziefer) or parasites (volksschtidling). In the infamous Nazi film, Der ewige Jude, Jews were portrayed as harmful pests that deserve to die. Similarly, in the Rwandan genocide, the Tutsis were described as "cockroaches." This is not to infer genocidal intent in US drone warfare, but rather to emphasise the dehumanising effect of this terminology in Nazi Germany and that the very same terms are used by the US in respect of their Pakistani targets. 231 Will John and Jane Doe-the casual saunterer-become part of the next group of bugs that must be swatted in the name of effective law enforcement? In answering that question, we should look to the skies once again and pray to the better angels of our nature for a worthy answer. Contention 2 – Drone Warfare Covert surveillance is just the beginning—best to block it now Murline 2013 (Anna; Drones over America: public safety benefit or 'creepy' privacy threat?; Marc 13; www.csmonitor.com/USA/Society/2013/0313/Drones-over-America-public-safety-benefit-or-creepyprivacy-threat; kdf) WASHINGTON — Shortly after Alan Frazier became a part-time deputy sheriff in Grand Forks, N.D., the police began looking into the possibility of buying some aircraft to boost their law enforcement capabilities. They wanted some help doing things like finding missing people or carrying out rescues in a region dotted by farmsteads threatened by flooding that wipes out access to roads. Buying a turbine engine helicopter, however, would cost $25 million, a prohibitive price tag even with 11 law enforcement agencies – eight from North Dakota and three in western Minnesota – willing to share the cost. So Mr. Frazier, also an assistant professor of aviation at the University of North Dakota (UND), began looking into unmanned aerial vehicles (UAVs) as a possible alternative. Recommended: Drone warfare: top 3 reasons it could be dangerous for US But what appears, on one level, to be a sensible, practical, and affordable solution for local law enforcement – the price tag for a small UAV is about the cost of a tricked-out new police cruiser at $50,000 – has run smack into public concerns about yet another high-tech invasion of privacy and the popular image of drones as stealthy weapons used against terrorists. Nonetheless, the technology's potential benefits in pursuing a raft of public safety measures at relatively low cost have enormous appeal for law enforcement agencies across the country, since President Obama signed a bill last year directing the Federal Aviation Administration (FAA) to further open US airspace to drones for both public and private use. Even before that, the number of permits, known as certificates of authorization (COAs), that the FAA issued to organizations to fly UAVs more than doubled from 146 in 2009 to 313 in 2011. As of February 2013 there were 327 active COAs. The bulk of these permits go to the US military for training, and the Pentagon expects their numbers to grow considerably in the years to come. According to a March 2011 Pentagon estimate, the Department of Defense will have 197 drones at 105 US bases by 2015. The US Border Patrol has the country's largest fleet of UAVs for domestic surveillance, including nine Predator drones that patrol regions like the Rio Grande, searching for illegal immigrants and drug smugglers. Unlike the missile-firing Predators used by the Central Intelligence Agency to hunt Al Qaeda operatives and their allies, the domestic version of the aircraft – say, those used by the border patrol – is more typically equipped with night-vision technology and long-range cameras that can read license plates. Groups like the American Civil Liberties Union (ACLU) also complain that these drones have see-through imaging technology similar to those used in airports, as well as facial recognition software tied to federal databases. The growth in drones is big business. Some 50 companies are developing roughly 150 systems, according to The Wall Street Journal, ranging from miniature flying mechanical bugs to "Battlestar Galactica"-type hovering unmanned airplanes. It's an industry expected to reach some $6 billion in US sales by 2016. Those forecasts notwithstanding, neither the FAA nor the association of UAV operators says it knows how many nonmilitary drones are operating in the United States. The ACLU is seeking that information. The growth in the development of UAVs by both private companies and the US government has not gone unnoticed, creating a backlash in some communities. In Seattle last month, community members quashed their city's drone program before it even got started. The program was being considered for search-and-rescue operations and some criminal investigations, but was referred to by protesters as "flying government robots watching their every move." Mayor Mike McGinn spoke with Police Chief John Diaz, "and we agreed that it was time to end the unmanned aerial vehicle program," the mayor wrote in a statement. The drones were returned to the manufacturer. Just days earlier, Charlottesville, Va., had become the first city in the country to pass a "no-drone zone" resolution, putting in place a two-year moratorium on the use of drones within Charlottesville limits. "The big concern for us is that they're going to be everywhere," says John Whitehead, an attorney and president of The Rutherford Institute, a civil liberties organization in Charlottesville, which launched a preemptive fight against drones before the city council. The move followed an Obama administration memo justifying the use of drones overseas to kill US citizens suspected of taking part in terrorist activities. "The president says you can take out American citizens in foreign countries," Mr. Whitehead says. if you can do that, you can take out somebody here as well." On March 6, Attorney General Eric Holder may have reinforced such fears in testimony before the Senate Judiciary Committee when he refused to rule out the use of armed drones on US soil in an emergency "to protect the homeland." If it all has an air of hysteria "Well, about it – Mr. Holder said there are no plans for the domestic use of armed drones and called the scenario "entirely hypothetical" and unlikely – privacy groups point to California's Alameda County, where officials insisted they wanted drones for search-and-rescue missions. An internal memo that surfaced from the sheriff's department, however, noted the drones could be used for "investigative and tactical surveillance, intelligence gathering, suspicious persons, and large crowd-control disturbances." The county dropped its plans. The first and only known use of a drone in the arrest of a US citizen occurred in December 2011 in North Dakota, when the Nelson County Sheriff's Department asked to borrow one of the US Customs and Border Protection UAVs. The drone provided a good view of the three sons of the owner of a 3,000-acre farm who were involved in a standoff with law enforcement officers. As a result, police were able to tell that the brothers were unarmed, allowing them to enter the farm and arrest the brothers without the confrontation turning into a shootout. Whitehead imagines a day when drones equipped with sound cannons, which release painful high-decibel sound waves that cause crowds to disperse, could be dispatched by the government to political protests and used as well to "effectively stifle free speech." The concern that such technologies can be misused to invade privacy and suppress free speech "is a legitimate fear," says UND's Frazier. "Anytime we increase the technological capabilities of the government there's a justifiable concern there. But I think these fears can be offset by the fact that the drones we're using have very limited capabilities." Nevertheless, privacy concerns are what have prompted groups including the nonprofit Electronic Frontier Foundation (EFF) to use the Freedom of Information Act to obtain hundreds of documents from the FAA outlining who has been requesting to use drones in America's skies, and why. Roughly 40 percent of the drone flight requests submitted to the FAA are from the US military. "They are flying drones pretty regularly – eight hours a day, five days a week – to train pilots so that they will be able to fly drones," says Jessica Lynch, a staff attorney for EFF. These drones are equipped with infrared scanning capabilities and other surveillance gadgets. "Drones have quite a number of technologies on board, including thermal cameras and the ability to intercept communications," Ms. Lynch says. "If they are training pilots, they are training them in these surveillance tools." FAA regulations stipulate that weaponized drones cannot fly in unrestricted US airspace. The agency also has specific parameters for law enforcement drones. Law enforcement groups, for example, must maintain visual contact with the drone at all times and must also fly at relatively low altitudes. These are regulations with which the Grand Forks Sheriff's Department has become familiar in the three years since it began looking into using drones, first establishing an Unmanned Aerial Systems unit as part of the department and then applying for COAs to use the drones. The unit, which went fully operational Feb. 1, has conducted 250 simulated missions, but has yet to use a drone in an operation. Certification tends to be a lengthy and arduous process, Frazier says, adding that there are also some parameters for usage that are meant to promote safety, but can make it tricky for law enforcement to do its jobs. One provision, for example, is that the drones can fly only by day. Another early rule was that the police had to give 48 hours' notice if they were going to use the drones. "It's tough to predict if there is going to be a fire tomorrow, or a bank robbery the day after tomorrow," he says. The department was able to convince the FAA to let it fly the drones on one-hour notice instead. That said, Frazier understands the public's concerns about the use of drones. For that reason, Grand Forks established a 15-member committee – made up of one-third public safety officials, one-third UND faculty, and one-third community residents – to evaluate the use of drones and to troubleshoot questions and concerns of the public. Every law enforcement action involving the drones is to be reviewed by the committee. Frazier told committee members that the department did not intend to ask for the ability to use the drones for covert surveillance. "We will not use them to, quote, spy on people," Frazier says. Even if that were the intention, he adds, "These small drones are not particularly robust platforms for covert surveillance. I think the public can't understand that my little UAV can only fly for 15 minutes, can't fly out of my line of sight, and can't fly in greater than 15-knot winds." Out of concern that average citizens could be filmed by sensors on the aircraft, one of the committee's first acts was to instruct police to post road signs warning the public when UAVs are in use. Yet some of the conversations EFF's Lynch has had with other law enforcement agencies haven't been as reassuring about privacy, she says. "We've talked to police about this, and they've said, 'Well, we're going to fly the drones in public airspace, and if you walk around in public you don't have an expectation of privacy in your movements.' "While that might be true for a police officer following you down the street, I don't know if that applies when a drone can fly over and surveil everybody walking down that street for an extended period of time," Lynch says. "You can make the case that drones are helping law enforcement better do their jobs for less [cost] and we should incorporate it," she adds. "As technology becomes cheaper and easier to use, it's tempting to use it all the time." That is the fear of Texas state lawmaker Lance Gooden, who in February proposed some of the toughest anti-drone legislation in the country. It would prevent drone operators from collecting images, sounds, and smells – or hovering over any home – without permission. "Two to four years from now, it'll be impossible to get legislation passed because every law enforcement agency will want drones," says Mr. Gooden. While the drone lobby is growing, it is not as powerful as it will become, he adds. Currently, his bill has the support of 101 of the 150 members of the state Legislature. But some longtime drone experts say such laws are overkill and could impede growth of technology that is useful and relatively inexpensive. "The ordinances that have been passed are absolutely absurd," says retired Lt. Gen. David Deptula, the first deputy chief of staff for Intelligence, Reconnaissance, and Surveillance for the US Air Force. "And what's precluded are the very valuable civilian applications in terms of traffic control, firefighting, disaster response, border security, the monitoring of power lines – the list goes on and on." As for privacy concerns, "I can't think of another way of saying it, but that they are unfounded," Deptula adds. "All you have to do is look up in any major metropolitan city and see the cameras all around. And have they ever heard of satellites? Where do they think Google maps come from?" Frazier concurs. People with a good zoom lens have better cameras than do his small drones, he adds, pointing out that one of the Grand Forks Sheriff's Department's drones has a simple off-the-shelf Panasonic. The average GPS-enabled cellphone can now track people and their movements to within a few feet, he notes. That said, "I understand what people mean when they say it's 'creepy,' " Frazier says. "I value my privacy as much as anyone does – it's very sacred in this country." Even if they could do it legally, law enforcement agencies would be making a big mistake using drones for covert surveillance – for the time being, he adds. "It would be a fatal mistake at this point. We really need to take a crawl, walk, run approach. To go to covert surveillance brings us to a run," Frazier says of the law enforcement community. "If that means we're not Buck Rogers in the 21st century, we're comfortable with that." Domestic drones will become weaponized – posing unique risks to civil liberties Greenwald 2013 (Glenn [former columnist on civil liberties and US national security issues for the Guardian. An ex-constitutional lawyer]; The US Needs To Wake Up To Threat Of Domestic Drones; Mar 30; http://www.theguardian.com/commentisfree/2013/mar/29/domestic-drones-unique-dangers; kdf) The use of drones by domestic US law enforcement agencies is growing rapidly, both in terms of numbers and types of usage. As a result, civil liberties and privacy groups led by the ACLU - while accepting that domestic drones are inevitable have been devoting increasing efforts to publicizing their unique dangers and agitating for statutory limits. These efforts are being impeded by those who mock the idea that domestic drones pose unique dangers (often the same people who mock concern over their usage on foreign soil). This dismissive posture is grounded not only in soft authoritarianism (a religious-type faith in the Goodness of US political leaders and state power generally) but also ignorance over current drone capabilities, the ways drones are now being developed and marketed for domestic use, and the activities of the increasingly powerful domestic drone lobby. So it's quite worthwhile to lay out the key under-discussed facts shaping this issue. I'm going to focus here most on domestic surveillance drones, but I want to say a few words about weaponized drones. The belief that weaponized drones won't be used on US soil is patently irrational. Of course they will be. It's not just likely but inevitable. Police departments are already speaking openly about how their drones "could be equipped to carry nonlethal weapons such as Tasers or a bean-bag gun." The drone industry has already developed and is now aggressively marketing precisely such weaponized drones for domestic law enforcement use. It likely won't be in the form that has received the most media attention: the type of large Predator or Reaper drones that shoot Hellfire missiles which destroy homes and cars in Pakistan, Yemen, Somalia, Afghanistan and multiple other countries aimed at Muslims (although US law enforcement agencies already possess Predator drones and have used them over US soil for surveillance). Instead, as I detailed in a 2012 examination of the drone industry's own promotional materials and reports to their shareholders, domestic weaponized drones will be much smaller and cheaper, as well as more agile - but just as lethal. The nation's leading manufacturer of small "unmanned aircraft systems" (UAS), used both for surveillance and attack purposes, is AeroVironment, Inc. (AV). Its 2011 Annual Report filed with the SEC repeatedly emphasizes that its business strategy depends upon expanding its market from foreign wars to domestic usage including law enforcement: AV's annual report added: "Initial likely non-military users of small UAS include public safety organizations such as law enforcement agencies. . . ." These domestic marketing efforts are intensifying with the perception that US spending on foreign wars will decrease. As a February, 2013 CBS News report noted, focusing on AV's surveillance drones: "Now, drones are headed off the battlefield. They're already coming your way. "AeroVironment, the California company that sells the military something like 85 percent of its fleet, is marketing them now to public safety agencies." Like many drone manufacturers, AV is now focused on drone products - such as the "Qube" - that are so small that they can be "transported in the trunk of a police vehicle or carried in a backpack" and assembled and deployed within a matter of minutes. One news report AV touts is headlined "Drone technology could be coming to a Police Department near you", which focuses on the Qube. But another article prominently touted on AV's website describes the tiny UAS product dubbed the "Switchblade", which, says the article, is "the leading edge of what is likely to be the broader, even wholesale, weaponization of unmanned systems." The article creepily hails the Switchblade drone as "the ultimate assassin bug". That's because, as I wrote back in 2011, "it is controlled by the operator at the scene, and it worms its way around buildings and into small areas, sending its surveillance imagery to an i-Pad held by the operator, who can then direct the Switchblade to lunge toward and kill the target (hence the name) by exploding in his face." AV's website right now proudly touts a February, 2013 Defense News article describing how much the US Army loves the "Switchblade" and how it is preparing to purchase more. Time Magazine heralded this tiny drone weapon as "one of the best inventions of 2012", gushing: "the Switchblade drone can be carried into battle in a backpack. It's a kamikaze: the person controlling it uses a real-time video feed from the drone to crash it into a precise target - say, a sniper. Its tiny warhead detonates on impact." What possible reason could someone identify as to why these small, portable weaponized UAS products will not imminently be used by federal, state and local law enforcement agencies in the US? They're designed to protect their users in dangerous situations and to enable a target to be more easily killed. Police agencies and the increasingly powerful drone industry will tout their utility in capturing and killing dangerous criminals and their ability to keep officers safe, and media reports will do the same. The handful of genuinely positive uses from drones will be endlessly touted to distract attention away from the dangers they pose. One has to be incredibly naïve to think that these "assassin bugs" and other lethal drone products will not be widely used on US soil by an already para-militarized domestic police force. As Radley Balko's forthcoming book "Rise of the Warrior Cop" details, the primary trend in US law enforcement is what its title describes as "The Militarization of America's Police Forces". The history of domestic law enforcement particularly after 9/11 has been the importation of military techniques and weapons into domestic policing. It would be shocking if these weapons were not imminently used by domestic law enforcement agencies. In contrast to weaponized drones, even the most naïve among us do not doubt the imminent proliferation of domestic surveillance drones. With little debate, they have already arrived. As the ACLU put it in their recent report: "US law enforcement is greatly expanding its use of domestic drones for surveillance." An LA Times article from last month reported that "federal authorities have stepped up efforts to license surveillance drones for law enforcement and other uses in US airspace" and that "the Federal Aviation Administration said Friday it had issued 1,428 permits to domestic drone operators since 2007, far more than were previously known." Moreover, the agency "has estimated 10,000 drones could be aloft five years later" and "local and state law enforcement agencies are expected to be among the largest customers." Concerns about the proliferation of domestic surveillance drones are typically dismissed with the claim that they do nothing more than police helicopters and satellites already do. Such claims are completely misinformed. As the ACLU's 2011 comprehensive report on domestic drones explained: "Unmanned aircraft carrying cameras raise the prospect of a significant new avenue for the surveillance of American life." Multiple attributes of surveillance drones make them uniquely threatening. Because they are so cheap and getting cheaper, huge numbers of them can be deployed to create ubiquitous surveillance in a way that helicopters or satellites never could. How this works can already been seen in Afghanistan, where the US military has dubbed its drone surveillance system "the Gorgon Stare", named after the "mythical Greek creature whose unblinking eyes turned to stone those who beheld them". That drone surveillance system is "able to scan an area the size of a small town" and "the most sophisticated robotics use artificial intelligence that [can] seek out and record certain kinds of suspicious activity". Boasted one US General: "Gorgon Stare will be looking at a whole city, so there will be no way for the adversary to know what we're looking at, and we can see everything." The NSA already maintains ubiquitous surveillance of electronic communications, but the Surveillance State faces serious limits on its ability to replicate that for physical surveillance. Drones easily overcome those barriers. As the ACLU report put it: I've spoken previously about why a ubiquitous Surveillance State ushers in unique and deeply harmful effects on human behavior and a nation's political culture and won't repeat that here (here's the video (also embedded below) and the transcript of one speech where I focus on how that works). Suffice to say, as the ACLU explains in its domestic drone report: "routine aerial surveillance would profoundly change the character of public life in America" because only drone technology enables such omnipresent physical surveillance. Beyond that, the tiny size of surveillance drones enables them to reach places that helicopters obviously cannot, and to do so without detection. They can remain in the sky, hovering over a single place, for up to 20 hours, a duration that is always increasing - obviously far more than manned helicopters can achieve. As AV's own report put it (see page 11), their hovering capability also means they can surveil a single spot for much longer than many military satellites, most of which move with the earth's rotation (the few satellites that remain fixed "operate nearly 25,000 miles from the surface of the earth, therefore limiting the bandwidth they can provide and requiring relatively larger, higher power ground stations"). In sum, surveillance drones enable a pervasive, stealth and constantly hovering Surveillance State that is now well beyond the technological and financial abilities of law enforcement agencies. One significant reason why this proliferation of domestic drones has become so likely is the emergence of a powerful drone lobby. I detailed some of how that lobby is functioning here, so will simply note this passage from a recent report from the ACLU of Iowa on its attempts to persuade legislators to enact statutory limits on the use of domestic drones: "Drones have their own trade group, the Association for Unmanned Aerial Systems International, which includes some of the nation's leading aerospace companies. And Congress now has 'drone caucuses' in both the Senate and House." Howie Klein has been one of the few people focusing on the massive amounts of money from the drone industry now flowing into the coffers of key Congressional members from both parties in this "drone caucus". Suffice to say, there is an enormous profit to be made from exploiting the domestic drone market, and as usual, that factor is thus far driving the (basically nonexistent) political response to these threats. What is most often ignored by drone proponents, or those who scoff at anti-drone activism, are the unique features of drones: the way they enable more warfare, more aggression, and more surveillance. Drones make war more likely precisely because they entail so little risk to the war-making country. Similarly, while the propensity of drones to kill innocent people receives the bulk of media attention, the way in which drones psychologically terrorize the population - simply by constantly hovering over them: unseen but heard - is usually ignored, because it's not happening in the US, so few people care (see this AP report from yesterday on how the increasing use of drone attacks in Afghanistan is truly terrorizing local villagers). It remains to be seen how Americans will react to drones constantly hovering over their homes and their childrens' schools, though by that point, their presence will be so institutionalized that it will be likely be too late to stop. Notably, this may be one area where an actual bipartisan/trans-partisan alliance can meaningfully emerge, as most advocates working on these issues with whom I've spoken say that libertarian-minded GOP state legislators have been as responsive as more left-wing Democratic ones in working to impose some limits. One bill now pending in Congress would prohibit the use of surveillance drones on US soil in the absence of a specific search warrant, and has bipartisan support. Only the most authoritarian among us will be incapable of understanding the multiple dangers posed by a domestic drone regime (particularly when their party is in control of the government and they are incapable of perceiving threats from increased state police power). But the proliferation of domestic drones affords a real opportunity to forge an enduring coalition in defense of core privacy and other rights that transcends partisan allegiance, by working toward meaningful limits on their use. Making people aware of exactly what these unique threats are from a domestic drone regime is the key first step in constructing that coalition. Domestic armed drones in border regions is setting an international precedentlegislation key to establish a framework for modeling Barry 2013 (Tom Barry, senior policy analyst and director of CIP's TransBorder Project, Barry specializes in immigration policy, homeland security, border security, and the outsourcing of national security. He co-founded the International Relations Center (IRC), and joined CIP in 2007. He has authored or co-authored more than twenty books on Mexico, Central America, the Caribbean, food aid, the United Nations, free trade and U.S. foreign policy. These include The Great Divide: Challenge of U.S.-Mexico Relations in the 1990s (Grove Press), Feeding the Crisis: U.S. Food Aid and Farm Policy in Central America (University of Nebraska), The Next Fifty Years: The United Nations and the United States, and the award-winning Zapata’s Revenge: Free Trade and the Farm Crisis in Mexico (South End Press). He has also edited volumes on foreign policy such as Global Focus: U.S. Foreign policy at the Turn of the Millennium (St. Martin’s Press), Center for International Policy, “Drones Over the Homeland”, http://stratrisks.com/geostrat/16739, April 23, 2013) Drones are proliferating at home and abroad. A new high-tech realm is emerging, where remotely controlled and autonomous unmanned systems do our bidding. Unmanned Aerial Vehicles (UAVs) and Unmanned Aerial Systems (UAS) – commonly known as drones – are already working for us in many ways. This new CIP International Policy the emergence of the homeland security apparatus have put border drones at the forefront of the intensifying public debate about the proper role of drones Report reveals how the military-industrial complex and domestically. Drones Over the Homeland focuses on the deployment of drones by the Department of Homeland Security (DHS), which is developing a drone fleet that it projects will be capable of quickly responding to homeland security threats, national security threats and national emergencies across the entire nation. In addition, DHS says that its drone fleet is available to assist local law-enforcement agencies. Due to a surge in U.S. military contracting since 2001, the United States is the world leader in drone production and deployment. Other nations, especially China, are also rapidly gaining a larger market share of the international drone market. The United States, however, will remain the dominant driver in drone manufacturing and deployment for at least another decade. The central U.S. role in drone proliferation is the direct result of the Pentagon’s rapidly increasing expenditures for UAVs. Also fueling drone proliferation is UAV procurement by the Department of Homeland Security, by other federal agencies such as NASA, and by local police, as well as by Despite its lead role in the proliferation of drones, the U.S. government has failed to take the lead in establishing appropriate regulatory frameworks and oversight processes. Without this necessary regulatory infrastructure – at both individuals and corporations. Drones are also proliferating among state-level Air National Guard units. the national and international levels – drone proliferation threatens to undermine constitutional guarantees, civil liberties and international law. This policy report begins with a brief overview of the development and deployment of UAVs, including a summary of the DHS drone program. The second section details and critically examines the role of Congress and industry in promoting drone proliferation. In the third part, we explore the expanding scope of the DHS drone program, extending to public safety and national security. The report’s fourth section focuses on the stated objectives of the homeland security drone program. It debunks the dubious assertions and myths that DHS wields in presentations to the public and Congress to justify this poorly conceived, grossly ineffective and entirely nonstrategic border program. The report’s final section summarizes our conclusions, and then sets forward our recommendations. I. UAV OVERVIEW AND ORIGIN OF HOMELAND SECURITY DRONES UAVs are ideal instruments for what the military calls ISR (intelligence, surveillance and reconnaissance) missions. Yet, with no need for an onboard crew and with the capacity to hover unseen at high altitudes for long periods, drones also have many nonmilitary uses. Whether deployed in the air, on the ground or in the water, unmanned drones are ideally suited for a broad range of scientific, business, public-safety and even humanitarian tasks. That is due to what are known as the “three Ds” capabilities – Dull (they can work long hours, conducting repetitive tasks), Dirty (drones are impervious to toxicity) and Dangerous (no lives lost if a drone is destroyed). Indicative of the many possibilities for UAV use, some human rights advocates are now suggesting drones can be used to defend human rights, noting their ISR capabilities could be used to monitor human rights violations by repressive regimes and non-state actors in such countries as Syria.1 Manufacturers, led by the largest military contractors, are rapidly producing drones for a boom market, whose customers include governments (with the U.S. commanding dominant market share), law enforcement agencies, corporations, individual consumers and rogue forces. Drones are proliferating so rapidly that a consensus about their formal name has not yet formed. The most common designation is Unmanned Aerial Vehicles (UAVs), although Unmanned Aerial Systems (UAS) is also frequently used. Other less common terms include Unmanned Systems (US) and Remotely Piloted Aircraft (RPA). The more inclusive “Unmanned Systems” term covers ground and marine drones , while highlighting the elaborate control and communications systems used to launch, operate and recover drones. However, because most drones require staffed command-and-control centers, Remotely Piloted Aircraft may be the best descriptive term. DRONES TAKE OFF Although the U.S. military and intelligence sectors had been promoting drone development since the early 1960s,2 it was the Israeli Air Force in the late 1970s that led the way in drone technology and manufacture. However, after the Persian Gulf War in 1991, the U.S. intelligence apparatus and the U.S. Air Force became the major drivers in drone development and proliferation.3 Because the intelligence budget is classified, there are no hard figures publicly available that quantify the intelligence community’s contributions to drone development in the United States. It has been credibly estimated that prior to 2000, such contributions made up about 40% of total drone research and development (R&D) expenditures, with the U.S. Air Force being the other major source of development funds for drone research by U.S. military contractors.4 In the early 1990s, as part of a classified weapons project, the U.S. Air Force and the CIA underwrote and guided the development and production of what became the Predator UAV, the first war-fighting drones that were initially deployed in ISR missions during the Balkan wars in 1995. General Atomics Aeronautical Systems (GA-SI), an affiliate of privately held, San Diego-based company General Atomics, produced the first Predator UAVs – now known as Predator A – with research and development funding from Pentagon, the Air Force and a highly secret intelligence organization called the National Reconnaissance Organization.5 The 1995 deployment of the unarmed Predator A by the CIA and Air Force sparked new interest within the U.S. military and intelligence apparatus, resulting in at least $600 million in new R&D contracting for drones with General Atomics. According to a U.S. Air Force study, “The CIA’s UAV program that existed in the early 1990’s and that still exists today gave Predator and GA-ASI an important opportunity that laid the foundation for Predator’s success.” The study goes on to document what is known of the collaboration between the intelligence community and General Atomics.6 General Atomics is a privately held firm, owned by brothers Neal and Linden Blue. The Blue brothers bought the firm (which was originally a start-up division of General Dynamics) in 1986 for $50 million and the next year hired Ret. Rear Admiral Thomas J. Cassidy to run GA-SI. The Blue brothers are well connected nationally and internationally with arch-conservative, anti-communist networks. These links stem in part from their past associations with right-wing leaders; one such example being the 100,000-acre banana and cocoa farm Neal Blue co-owned with the Somoza family in Nicaragua, another being Linden Blue’s 1961 imprisonment in Cuba shortly before the Bay of Pigs for flying into Cuban airspace, and especially their record of providing substantial campaign support for congressional hawks.7 In 1997, the U.S. Air Force’s high-tech development and procurement divisions took the first steps toward weaponizing the Predator. This push led to the Air Force’s “Big Safari” rapid high-tech acquisitions program, which proved instrumental in having an armed Predator ready for deployment in 2000. The newly weaponized MQ Predator-B was in action from the first day of the invasion of Afghanistan on October 21, 2001, when a Hellfire missile was fired from a remote operator sitting in an improvised command and control center situated in the parking lot of the CIA headquarters in Langley, Virginia.8 The post-9/11 launch of the “global war on terrorism” opened the floodgates for drone R&D funding and procurement by the CIA and all branches of the U.S. military, led by the Air Force. Starting in Afghanistan, and later in Iraq, the Predator transitioned from an unmanned surveillance aircraft to what General Atomics proudly called a “Hunter-Killer.” Since 2004, the CIA and the Joint Special Operations Command, a covert unit of the U.S. military, have routinely made clandestine strikes in Pakistan and more recently in Yemen and Somalia. These clandestine strikes increased during the first Obama The rise of the Predators along with later drone models produced by General Atomics – the Reaper, Guardian and Avenger drones – can be attributed to aggressive marketing, influence-peddling and lobbying initiatives by General Atomics and General Atomics Aeronautical Systems (GA-SI). The selling of the Predator could also count on the close personal ties forged over decades in the military-industrial complex, which resulted in key R&D grants from the military and intelligence sectors. Another important factor in the Predator’s increasing popularity has been General Atomics’ willingness to adapt models to meet varying demands from DOD, DHS and the intelligence community for different armed and unarmed variants. Also working Administration and continued into the second amid growing criticism that drone strikes were unconstitutional and counterproductive.9 in General Atomics favor is its ongoing commitment to curry favor in Congress with substantial campaign contributions and special favors. Speaking at the Citadel on December 11, 2001, President George W. Bush underscored the Predators’ central role in U.S. global counterterrorism missions: “Before the war, the Predator had skeptics because it did not fit the old ways. Now it is clear the military does not have enough unmanned vehicles.”10 At the time, there was widespread public, media and congressional enthusiasm for UAVs where suspected terrorists were purportedly killed with surgical precision while UAV pilots sat in front of video screens out of harm’s way drinking coffee. Little was known then about the high-accident rates for the UAVs or the shocking collateral damage from their targeted strikes. Nor was it well known that the Predators were being piloted from command and control centers at the CIA and at Creech Air Force Base in Nevada. PREDATORS ALIGHT ON THE BORDER In the late-1990s, about the same time that the U.S. Border Patrol started contracting for ground-based electronic surveillance, the agency also began planning to integrate drone surveillance into ground-based electronic surveillance systems. It is also when it began the practice of entering into sole-source contracts with high-tech firms.11 The Border Patrol’s grand high-tech plan was to integrate drone ISR operations with its planned Integrated Surveillance Intelligence System (ISIS).12 The plan, albeit never detailed in the project proposal, was to integrate geospatial images from yet-to-be acquired Border Patrol UAVs into an elaborate command, control and communications systems managed by the Border Patrol – an agency not known for its high-level technical or management skills.13 Soon after the CIA and the U.S. Air Force began flooding General Atomics with procurement contracts for armed Predators in 2001, disarmed Predator UAVs were summoned for border security duty. In 2003, the Border Patrol – with funding not from the Customs and Border Protection (CBP) budget but rather from the Homeland Security’s newly In 2005, CBP took full control over the DHS drone program, with the launch of its own Predator drone program under the supervision of the newly created Office of Air and Marine (OAM). OAM was a CBP division that united all the aerial and marine assets of the Office of the Border Patrol and Immigration and Customs Enforcement (ICE). According to the CBP, “ The UAV program focuses operations on the CBP priority mission of anti-terrorism by helping to identify and intercept potential terrorists and illegal cross-border activity.” Tens of billions of dollars began to flow into the Department of Homeland Security for border security – the term that superseded border control in the aftermath of 9/11 – and the DHS drone program was propelled forward. To direct OAM, DHS appointed Michael C. Kostelnik, a retired Air Force major general. During his tenure in the Air Force, Kostelnik supervised weapons acquisitions and was one of the leading players in encouraging General Atomics to quickly equip the Predator with bombs or missiles.14 The more expensive, armed Predator drones and their variants became the preferred border drone as a result of widespread enthusiasm for the surge in Predator operations in Iraq and Afghanistan and the close collaborative relationship that developed between General Atomics Aeronautical Systems and CBP. CBP began using its first Predator for operations in October 2005, but the drone crashed in April 2006 in the Arizona desert near Nogales due an error made by General Atomics’ created Science and Technology Directorate – began testing small, relatively inexpensive UAVs for border surveillance. contracted pilot. Crash investigators from the National Transportation Safety Board found the pilot had shut off the drone’s engine when he thought he was redirecting the drone’s camera. As Kostelnik explained to the Border and Marine Subcommittee of the House Homeland Security Committee, “There was a momentary loss link that switched to the second control” – and the By early 2013, CBP had a fleet of seven Predator drones and three Guardians drones, all stationed at military bases. Two Guardians – Predators modified for marine surveillance – are based at the Naval Air Station in Corpus Christi, Texas, while another patrols the Caribbean as part of a drug war mission from its base at the Cape Canaveral Air Force Station in Florida. Four of the seven Predators are stationed Predator fell out of the sky.15 The Fleet at Libby Army Airfield, part of Fort Huachuca near the Mexican border in southeastern Arizona, while two have homes at the Grand Forks Air Force Base in North Dakota. The tenth Predator drone will also be based at Cape Canaveral. According to the CBP Strategic Air and Marine Plan of 2010, OAM intends to deploy a fleet of 24 Guardians and Predators. In 2008, as part of its acquisition strategy, CBP planned to have the 24-drone fleet ready by 2016, boasting that OAM would then be capable of deploying drones anywhere in national airspace in three hours or less.16 In late 2012, CBP signed a major new five-drone contract with General Atomics. The $443.1 million five-year contract includes $237.7 million for the prospective purchase of up to 14 additional Predators and Predator variations, and $205.4 million for operational costs and maintenance by General Atomics crews.17 This new contract was signed, despite increasing budget restrictions, a series of critical reports by the Congressional Research Service (CRS), Government Accountability Office and the DHS Office of Inspector General, and continuing technical failures and poor results. Only One Source CBP insists that General Atomics Aeronautical Systems is the only “responsible source” for its drone needs and that no other suppliers or servicers can satisfy agency requirements for these $18-20 million drones. According to CBP’s justification for sole-source contracting, U.S. national security would be put at risk if DHS switched drone contractors. In a November 1, 2012 statement titled “Justification for Other than Full and Open Competition,” DHS contends that “The Predator-B/Guardian UAS combination is unmatched by any other UAS available. To procure an alternative system…or support services…would detrimentally impact national security,” most notably due to “decreased interdictions of contraband (e.g., illegal narcotics, undocumented immigrants).” Furthermore, CBP claimed, “The GA-ASI MQ-9 UAS provides the best value to OAM’s documented and approved operational requirements and programmatic constraints. With 38% of planned systems on-online, MQ-9 operations are mature, well-understood, and a critical component of DHS’s daily Homeland Security campaign.” When asked by this author for information documenting specific data, comparative studies, cost-benefit evaluations, record of the achievements of the drone program, or threat assessment to support such conclusions, CBP simply responded: CBP deploys and operates the UAS only after careful examination where the UAS can most responsibly aid in countering threats of our Nation’s security. As threats change, CBP adjusts its enforcement posture accordingly and may consider moving the location of assets.18 II. MORE DRONE BOOSTERISM THAN OVERSIGHT IN CONGRESS The Pentagon, military, intelligence agencies and military contractors are longtime proponents of UAVs for intelligence, surveillance and reconnaissance (ISR) missions. Following President Bush’s declaration of a “global war on terrorism,” the White House became directly involved in expanding drone deployment in foreign wars – especially in directing drone strikes. The most unabashed advocates of drone proliferation, however, are in Congress. They claim drones can solve many of America’s most pressing problems – from eliminating terrorists to keeping the homeland safe from unwanted immigrants. However, there has been little congressional oversight of drone deployments , both at home and abroad. Since the post- 9/11 congressional interest in drone issues – budgets, role in national airspace, overseas sales, border deployment and UAVs by law enforcement agencies – drone legislation would “increase the number of unmanned aerial vehicles and surveillance equipment….”19 Drone promotion by U.S. representatives and senators in Congress pops up in what at first may seem the unlikeliest of places. Annually, House members join with UAS manufacturers to fill the foyer and front rooms of the Rayburn House Office Building with displays of the latest drones – an industry show introduced in glowing speeches by highly influential House leaders, notably Buck McKeon, the Southern California Republican who chairs the House Armed Service Committee and co-chairs the Congressional Unmanned Systems Caucus (CUSC). Advances in communications, aviation and surveillance technology have all accelerated the coming of UAVs to the home front. Yet drones are not solely about technological advances. Money flows and political influence also factor in. Congressional Caucus on Unmanned Systems At the forefront of the money/politics nexus is the Congressional Caucus on Unmanned Systems (CCUS). Four years ago, the CCUS (then known as the House Unmanned Aerial Vehicle Caucus) was formed by a small group of congressional representatives – mainly Republicans and mostly hailing from districts with drone industries or bases. By late 2012, the House caucus had 60 members and had changed its name to encompass all unmanned systems – whether aerial, marine or ground-based.20 This bipartisan caucus, together with its allies in the drone industry, has been promoting UAV use at home and abroad through drone fairs on Capitol Hill, new legislation and drone-favored budgets. CCUS aims to “educate members of Congress and the public on the strategic, tactical, and scientific value of unmanned systems; actively support further development and acquisition of more systems, and to more effectively engage the civilian aviation community on unmanned system use and safety.”21 In late 2012, the caucus comprised a collection of border hawks, immigration hardliners and leading congressional voices for the military contracting industry. The two caucus co-chairs, Howard “Buck” McKeon, R-California, and Henry Cuellar, D-Texas, are well positioned to accelerate drone proliferation. McKeon, whose southern California district includes major drone production facilities, notably General Atomics, is the caucus founder and chair of the House Armed Services Committee. Cuellar, who represents the Texas border district of Laredo, is the ranking member (and former chairman) of the House Subcommittee on Border and Maritime Security. Other caucus members include Brian Bilbray (R-Calif.), who heads the House Immigration Reform Caucus; Candice Miller (R-Minn.), who heads the Homeland Security subcommittee that reviews the air and marine operations of DHS; Joe Wilson (R-SC); Jerry Lewis (R-Calif.); Dana Rohrabacher (R-Calif.); Loretta Sanchez (D-Calif.); and Duncan Hunter (R-Calif.). Eight caucus members were also members of the powerful House Appropriations Committee in the 112th Congress. The caucus and its leading members (along with drone proponents in the Senate) have played key roles in drone proliferation at home and abroad through channeling earmarks to Predator manufacturer General Atomics, prodding the Department of Homeland Security to establish a major drone program, adding amendments to authorization bills for the Federal Aviation Administration and Department of Defense to ensure the more rapid integration of UAVs into the national airspace, and increasing annual DOD and DHS budgets for drone R&D and procurements. To accelerate drone acquisitions and deployment at home, Congress has an illustrative track record of legislative measures (see accompanying box). Congressional support for the development and procurement of Predators dates back to 1996, and is reflected in the defense and intelligence authorization acts. An Air Force-sponsored study of the Predator’s rise charted the increases mandated by the House Armed Service and the House Intelligence committees over the Predator budget requests made by the Air Force in its budgets requests. Between 1996 and 2006 (ending date of study), “Congress has recommended an increase, over and above USAF requests, in the Predator budget for nearly 10 years in a row. This has resulted in a sum total increase of over a half a billion dollars over the years.”22 Association of Unmanned Vehicle Systems CCUS cosponsors the annual drone fete with the Association of Unmanned Vehicle Systems International (AUVSI), an industry group that brings together the leading drone manufacturers and universities with UAV research projects. AUVSI represents the interests in the expansion of unmanned systems expressed by many of the estimated 100 U.S. companies and academic institutions involved in developing and deploying the some 300 of the currently existing UAV models.23 The drone association has a $7.5-million annual operating budget, including $2 million a year for conferences and trade shows to encourage government agencies and companies to use unmanned aircraft.24 AUVSI also has its own congressional advocacy committee that is closely linked to the caucus. The keynote speaker at the drone association’s annual conference in early 2012 was Representative McKeon. The congressman was also the featured speaker at AUVSI’s AIR Day 2011, in recognition, says AUVSI’s president, that Congressman McKeon “has been one of the biggest supporters of the unmanned systems community.” The close relationship between the congressional drone caucus and AUVSI was reflected in a similar relationship between CBP/OAM and AUVSI. Tom Faller, the CBP official who directed the UAV program at OAM, joined the AUVSI 23-member board-ofdirectors in August 2011, a month before the association hosted a technology fair in the foyer of the Rayburn House Office Building. OAM participated in the fair. Faller resigned from the unpaid position on Nov. 23, 2011 after the Los Angeles Times queried DHS about Faller’s unpaid position in the industry association. Faller is currently subject of a DHS internal ethics-violation investigation.25 Contracts, contributions, earmarks and favors Once a relatively insignificant part of the military-industrial complex, the UAV development and manufacturing sector is currently expanding faster than any other component of military contracting. Drone orders from various federal departments and agencies are rolling in to AUVSI corporate members, including such leading military contractors as General Atomics, Lockheed Martin and Northrop Grumman.26 (Unlike most major military contractors, General Atomics is not a corporation but a privately held firm, whose two major figures are Linden and Neal Blue, both of whom have high security clearances) U.S. government drone purchases – not counting contracts for an array of related UAV services and “payloads” – rose from $588 million to $1.3 billion over the past five years.27 The FY2013 DOD budget includes $5.8 billion for UAVs, which does not include drone spending by the intelligence community, DHS or other federal entities. The Pentagon says that its “high-priority” commitment to expenditures for drone defense and warfare has resulted in “strong funding for unmanned aerial vehicles that enhance intelligence, surveillance, and reconnaissance capabilities.”29 While the relationship between increasing drone contracts and the increasing campaign contributions received by drone caucus members can only be speculated, caucus members are favored recipients of contributions by AUVSI members. In the 2010 and 2012 election cycles, political action committees associated with companies that produce drones donated more than $2.4 million to members of the congressional drone caucus.30 The leading recipient was McKeon, with Representative Silvestre Reyes, the influential Democrat from El Paso (who lost his seat in the 2012 election), coming in a close second.31 General Atomics counted among McKeon’s top five contributors in the last election. (See Figure 1) Frank W. Pace, the director of General Atomics Aeronautical Systems, contributed to two candidates – Buck McKeon and Jerry Lewis – during the 2012 electoral campaign. (See Figure 2) Who were the top recipients of the General Atomics campaign contributions in the 2012 cycle? Four of the top five recipients were not surprising – Buck McKeon, Jerry Lewis, Duncan Hunter and Brian Bilbray – given their record of support for UAVs, and their position among the most influential drone caucus members. (See Figure 3) The relationship that has been consolidating between General Atomics and the U.S. Air Force since the early 1990s has been mediated and facilitated in Congress by influential congressional representatives, led by southern Californian Republican Rep. Jerry Lewis, a member of the House Appropriations Defense Committee and vice-chairman of the House Permanent Select Committee on Intelligence. Lewis, a favored recipient of General Atomics campaign contributions, used his appropriations influence to ensure that the Air Force gained full control of the UAV program by 1998. Lewis, a prominent member of the “Drone Caucus,” has received at least $10,000 every two years in campaign contributions from General Atomics’ political action committee – $80,000 since 1998, according to OpenSecrets.org. During the 2012 campaign cycle, General Atomics was the congressman’s top campaign donor.32 The top ranking recipient of General Atomics’ campaign contributions is not a CUSC member. Senator Diane Feinstein’s (D-Calif.) contributions from General Atomics easily placed her at the top of the list. Feinstein, who chairs the powerful Senate Intelligence Committee, was also favored in campaign contributions by Linden Blue, the president of General Atomics. (See Figure 4) Senator Feinstein has been a highly consistent supporter of the intelligence community and military budgets. Her failure to oppose the clandestine drone strikes ordered by the White House and CIA have sparked widespread criticism by those who argue the strikes are unconstitutional, illegal under international law and counterproductive as a counterterrorism tactic.33 In 2012, General Atomics was Feinstein’s third largest campaign contributor, while other leading contributors were the military contractors General Dynamics (from which General Atomics emerged), BAE Systems and Northrup Grumman.34 Feinstein’s connections to General Atomics extend beyond being top recipient of their campaign contributions. Rachel Miller, a former (2003-2007) legislative assistant for Feinstein, has served as a paid lobbyist for General Atomics, both working directly for the firm (in 2011) and as a General Atomics lobbyist employed by Capitol Solutions (2009 - present), one of the leading lobbying firms contracted by General Atomics.35 And did you know that Linden Blue plans to marry Retired Rear Adm. Ronne Froman? Few others knew about the engagement of this high-society San Diego couple until Senator Feinstein announced the planned marriage at a mid-November 2012 meeting of the downtown San Diego business community – news that quickly appeared in the Society pages of the San Diego Union-Tribune. There has been no explanation offered why Feinstein broke this high-society news, but the announcement certainly did point to the senator’s likely personal connections to Blue and Froman (who was hired by General Atomics as senior vice-president in December 2007 and has since left the firm).36 Campaign contributions and personal connections create goodwill and facilitate contracts. General Atomics also counts on the results produced by a steady stream of lobbying dollars – which have risen dramatically since 2003, and been averaging $2.5 million annually since 2005. In 2012, General Atomics spent $2,470,000 lobbying Congress.37 Congressional earmarks were critical to the rise of the Predator, both its earlier unarmed version as well as the later “Hunter-Killer.” The late senator Daniel K. Inouye, the Hawaii Democrat who chaired the Senate Appropriations Committee, told the New York Times that if the House ban on commercial earmarks that was introduced in 2010 had been in effect earlier, ‘’we would not have the Predator today.’’ Tens of millions of dollars in congressional earmarks in the 1990s went to General Atomics and other military contractors for the early development of what became the Predator program, reported the New York Times.38 Inouye was a source of a number of these multimillion earmarks for General Atomics, whose large campaign contributions to the influential Hawaii senator from 1998 to 2012 ($5000 in this last campaign) could be regarded as thank-you notes since Inouye faced insignificant political opposition. Besides campaign contributions, General Atomics routinely hands out favors to congressional representatives thought likely to support drone proliferation. A 2006 report by the Center for Public Integrity identified Jerry Lewis as one of two congressional members and more than five dozen congressional staffers who traveled overseas courtesy of General Atomics. The center’s report, The ‘Top Gun’ of Travel, observed this “little-known California defense contractor [has] far outspent its industry competitors on travel for more than five years — and in 2005 landed promises of billions of dollars in federal business.” Most of this business was in the form of drone development and procurement by the Pentagon and DHS. Questioned about this pattern of corporate-sponsored trips, Thomas Cassidy, founder of General Atomics Aeronautical Systems, said, “[It’s] useful and very helpful, in fact, when you go down and talk to the government officials to have congressional people go along and discuss the capabilities of [the plane] with them,” A follow-up investigation by the San Diego Union-Tribune reported, “Most of that was spent on overseas travel related to the unmanned Predator spy plane made by General Atomics Aeronautical Systems, an affiliated company.”39 Looking desperately for oversight In practice, there’s more boosterism than effective oversight in the House Homeland Security Committee and its Subcommittee on Border and Maritime Security, which oversees DHS’s rush to deploy drones to keep the homeland secure. The same holds true for most of the more than one hundred other congressional committees that purportedly oversee the DHS and its budget.40 Since DHS’s creation, Congress has routinely approved annual and supplementary budgets for border security that have been higher than those requested by the president and DHS. CCUS member and chair of the House Border and Maritime Security subcommittee, Representative Candice Miller, R-Michigan, is effusive and unconditional in her support of drones. Miller described her personal conviction that drones are the answer to border insecurity at the July 15, 2010 subcommittee hearing on UAVs.41 “You know, my husband was a fighter pilot in Vietnam theater, so—from another generation, but I told him, I said, ‘Dear, the glory days of the fighter jocks are over.’” “The UAVs, the Unmanned Aerial Vehicles are coming,” continued Miller, “and now you see our military siting in a cubicle sometimes in Nevada, drinking a Starbucks, running these things in theater and being incredibly, incredibly successful.” The uncritical drone boosterism in Congress was underscored in a Washington Post article on the use of drones for border security. In his trips to testify on Capitol Hill, Kostelnik said he had never been challenged in Congress about the appropriate use of homeland security drones. “Instead, the question is: ‘Why can’t we have more of them in my district?’” remarked the OAM chief.42 Since 2004, the DHS’s UAV program has drawn mounting concern and criticism from the government’s own oversight and research agencies, including the Congressional Research Service, the Government Accountability Office and the DHS’s own Office of Inspector General.43 These government entities have repeatedly raised questions about the cost-efficiency, strategic focus and performance of the homeland security drones. Yet, rather than subjecting DHS officials to sharp questioning, the congressional committees overseeing homeland security and border security operations have, for the most part, readily and often enthusiastically accepted the validity of undocumented assertions by testifying CBP officials. The House Subcommittee on Border and Maritime Security has been especially notorious for its lack of critical oversight. As part of the budgetary and oversight process, the House and Senate committees that oversee DHS have not insisted that CBP undertake cost-benefit evaluations, institute performance measures, implement comparative evaluations of its high-tech border security initiatives, or document how its UAV program responds to realistic threat assessments. Instead of providing proper oversight and ensuring that CBP/OAM’s drone program is accountable and transparent, congressional members from both parties seem more intent on boosting drone purchases and drone deployment. As CBP was about to begin its first drone deployments in 2005 as part of the Operation Safeguard pilot project, the Congressional Research Service observed: “Congress will likely conduct oversight of Operation Safeguard before considering wider implementation of this technology.” Unfortunately, Congress never reviewed the results of Operation Safeguard pilot project, and CBP declined requests by this writer to release the report of this UAV pilot project.44 Congress has been delinquent in its oversight duties. In addition to the governmental research and monitoring institutions, it has been mainly the nongovernmental sector – including the American Civil Liberties Union, Electronic Frontier Foundation, Center for Constitutional Rights, and the Center for International Policy – that has alerted the public about the lack of transparency and accountability in the DHS drone program and the absence of responsible governance over the domestic and international proliferation of UAVs. In September 2012, the Senate formed its own bipartisan drone caucus, the Senate Unmanned Aerial Systems Caucus, co-chaired by Jim Inhofe (R-Okla.) and Joe Manchin (D-W.Va.). “This caucus will help develop and direct responsible policy to best serve the interests of U.S. national defense and emergency response, and work to address any concerns from senators, staff and their constituents,” said Inhofe.45 It is still too early to ascertain if the Senate’s drone caucus will follow its counterpart in the House in almost exclusively focusing on promoting drone proliferation at home and abroad. It is expected, however, that caucus members will experience increased flows of campaign contributions from the UAS industry. While Senator Manchin just won his first full-term in the 2012 election, Senator Inhofe has been favored by campaign contributions from military contractors, including General Atomics ($14,000 in 2012), since he took office in 2007. His top campaign contributor was Koch Industries. For its part, AUVSI, the drone industry association, gushed in its quickly offered commendation. “I would like to commend Senators Inhofe and Manchin for their leadership and commitment in establishing the caucus, which will enable AUVSI to work with the Senate and stakeholders on the important issues that face the unmanned systems community as the expanded use of the technology transitions to the civil and commercial markets,” said AUVSI President and CEO Michael Toscano. “It is our hope to establish the same open dialogue with the Senate caucus as we have for the past three years with the House Unmanned Systems Caucus,” the AUVSI executive added.46 There is rising citizen concern about drones and privacy and civil rights violations. The prospective opening of national airspace to UAVs has sparked a surge of concern among many communities and states – eleven of which are considering legislation in 2013 that would restrict how police and other agencies would deploy drones. But paralleling new concern about the threats posed by drone proliferation is local and state interest in attracting new UAV testing facilities and airbases for the FAA and other federal entities. FAA and industry projections about the number of UAVs (15,000 by 2020, 30,000 by 2030) that may be using national airspace – the same space used by all commercial and private aircraft – have sparked a surge of new congressional activism, with several new bills introduced by non-drone caucus members in the new Congress that respond to the new fears about drone proliferation. Yet there is no one committee in the House or the Senate that has assumed the responsibility for UAV oversight to lead the way toward creating a foundation of laws there is no federal agency or congressional committee that is providing oversight over drone proliferation – whether in regard to U.S. drone exports, the expanding drone program of DHS, drone-related privacy concerns, or UAV use by private or public firms and agencies. Gerald Dillingham, top official of the Government Accountability Office, testified in Congress about this oversight conundrum. When asked which part of the federal and regulations establishing a political framework for UAV use going forward. At this point, government was responsible for regulating drone proliferation in the interest of public safety and civil rights, the GAO director said, “At best, we can say it’s unknown at this point.”47 III. Homeland security drones are expanding their range beyond the border, crossing over to local law enforcement agencies, other federal civilian operations, and into national security missions. CROSSOVER DRONES BORDER SECURITY TO LOCAL SURVEILLANCE The rapid advance of drone technology has sparked interest by police and sheriff offices in acquiring drones. The federal government has closely nurtured this new eagerness. Through grants, training programs and “centers of excellence,” the Departments of Justice and Homeland Security have been collaborating with the drone industry and local law enforcement agencies to introduce unmanned aerial vehicles to the homeland. One example is DHS’s Urban Areas Security Initiative (UASI), a Federal Emergency Management Agency (FEMA) program established to assist communities with counterterrorism projects that provides grants to enable police and sheriffs departments to launch their own drone programs. In 2011, a DHS UASI grant of $258,000 enabled the Montgomery County Sheriffs Office in Texas to purchase a ShadowHawk drone from Vanguard Defense Industries. DHS UASI grants also allowed the city of Arlington, Texas to buy two small drones.48 Miami also counted on DHS funding to purchase its UAV. According to DHS, UASI “provides funding to address the unique planning, organization, equipment, training, and exercise needs of high-threat, high-density urban areas, and assists them in building an enhanced and sustainable capacity to prevent, protect against, respond to, and recover from acts of terrorism.”49 However, in the UASI project proposals there is little or no mention of terrorism or counterterrorism. Instead, local police forces want drones to bolster their surveillance capabilities and as an adjunct to their SWAT teams and narc squads. DHS is not the only federal department promoting drone deployment in the homeland. Over the past four decades, the Department of Justice’s criminal-justice assistance grants have played a central role in shaping the priorities and operations of state and local law enforcement.50 Through its National Institute of Justice, the Department of Justice (DOJ) has been working closely with industry and local law enforcement to “develop and evaluate low-cost unmanned aircraft systems.”51 In 2011, National Institute of Justice grants went to such large military contractors and drone manufacturers as Lockheed Martin, ManTech and L-3 Systems to operate DOJ-sponsored “centers of excellence” devoted to the use of technology by local law enforcement for surveillance, communications, biometrics and sensors.53 In an October 4, 2012 presentation to the National Defense Industrial Association, OAM chief Kostelnik explained that the CBP drones were not limited to border control duties. The OAM was, he said, the “leading edge of deployment of UAS in the national airspace.” This deployment wasn’t limited to what are commonly understood homeland security missions but extended to “rapid contingency supports” for “Federal/State/Local missions.” According to CBP: OAM provides investigative air and marine support to Immigration and Customs Enforcement, as well as other federal, state, local, and international law enforcement agencies.53 Incidents involving CBP drones in local law enforcement operations have surfaced in media reports, but CBP has thus far DHS and CBP/OAM in particular have failed to define the legal and constitutional limits of its drone operations. Rather than following strict guidelines about the scope of its mission and the range of homeland security drones, Kostelnik argued before the association of military contractors that “CBP operations [are] shaping the UAS policy debate” in the United States. According to Kostelnik, the CBP’s drones are “on the leading edge in homeland security.” This cutting edge role of the CBP/OAM drones not only extends to local and state operations, including support for local not released a record of its support for local and state police, despite repeated requests by media and research organizations. law enforcement, but also to national security. “[The] CBP UAS deployment vision strengthens the National Security Response Capability.” Border Security to National Security Most of the concern about the domestic deployment of drones by DHS has focused on the crossover to law-enforcement missions that threaten privacy and civil rights – and without more regulations in place will accelerate the transition to what critics call a “surveillance society.” Also worth public attention and congressional review is the increasing interface between border drones and national security and military missions. The prevalence of military jargon used by CBP officials – such as “defense in depth” and “situational awareness” – points to at least a rhetorical overlapping of border control and military strategy. Another sign of the increasing coincidence between CBP/OAM drone program and the military is that the commanders and deputies of OAM are retired military officers. Both Major General Michael Kostelnik and his successor Major General Randolph Alles, retired from U.S. Marines, were highly placed military commanders involved in drone development and procurement. Kostelnik was involved in the development of the Predator by General Atomics since the mid-1990s and was an early proponent of providing Air Force funding to weaponize the Predator. As commander of the Marine Corps Warfighting Laboratory, Alles was a leading proponent of having each military branch work with military In promoting – and justifying – the DHS drone program, Kostelnik routinely alluded to the national security potential of drones slated for border security duty. On several occasions Kostelnik pointed to the seamless interoperability with DOD UAV forces. At a moment’s notice, Kostelnik said that OAM could contractors to develop their own drone breeds, including near replicas of the Predator manufactured for the Army by General Atomics.57 be “CHOP’ed” – meaning a Change in Operational Command from DHS to DOD.58 DHS has not released operational data about CBP/OAM drone operations. Therefore, the extent of the participation of DHS drones in domestic and international operations is unknown. But statements by CBP officials and media reports from the Caribbean point to a rapidly expanding participation of DHS Guardian UAVs in drug-interdiction and other unspecified operations as far south as Panama. CBP states that OAM “routinely provides air and marine support to other federal, state, and local law enforcement agencies” and “works with the U.S. military in joint international anti-smuggling operations and in support of National Security Special Events [such as the Olympics].” According to Kostelnik, CBP planned a “Spring 2011 deployment of the Guardian to a Central American country in association with Joint Interagency Task Force South (JIATFSouth) based at the naval station in Key West, Florida.59 JIATF-South is a subordinate command to the United States Southern Command (USSOUTHCOM), whose geographical purview includes the Caribbean, Central America and South America. In mid-2012, CBP/OAM participated in a JIATF-South collaborative venture called “Operation Caribbean Focus” that involved flight over the Caribbean Sea and nations in the region – with the Dominican Republic acting as the regional host for the Guardian operations, which CBP/OAM considers a “prototype for future transit zone UAS deployments.” CBP says that OAM drones have not been deployed within Mexico, but notes that “OAM works in collaboration with the Government of Mexico in addressing border security issues,” without specifying the form and objectives of this collaboration.60 As part of the U.S. global drug war and as an extension of border security, unarmed drones are also The U.S. Northern Command has acknowledged that the U.S. military does fly a $38million Global Hawk drone into Mexico to assist the Mexico’s war against the drug cartels.61 Communities, state crossing the border into Mexico. legislatures and even some congressional members are proceeding to enact legislation and revise ordinances to decriminalize or legalize the consumption of drugs, especially marijuana, targeted by the federal government’s drug war of more than four decades. At the same time, DHS has been escalating its contributions to the domestic and international drug war – in the name of both homeland security and national security. Drug seizures on the border and drug interdiction over coastal and neighboring waters are certainly the top operative priorities of OAM. Enlisting its Guardian drones in SOUTHCOM’s drug interdiction efforts underscores the increasing emphasis within the entire CBP on counternarcotic operations. CBP is a DHS agency that is almost exclusively focused on tactics. While CBP as the umbrella agency and the Office of the Border Patrol and OAM all have strategic plans, these plans are marked by their rigid military frameworks, their startling absence of serious strategic thinking, and the diffuse distinctions between strategic goals and tactics. As a result of the border security buildup, south-north drug flows (particularly cocaine and more high-value drugs) have shifted back to marine smuggling, mainly through the Caribbean, but also through the Gulf of Mexico and the Pacific.62 Rather than CBP/OAM has rationalized the procurement of more UAVs on the shifts in the geographical arenas of the drug war – albeit couching the tactical changes in the new drug war language of “transnational criminal organizations” and “narcoterrorism.” The overriding framework for CBP/OAM operations is evolving from border security and homeland security to national security, as recent CBP presentations about its Guardian deployments illustrates. Shortly before retiring after seven years as OAM first chief, Major General Kostelnik told a gathering of military contractors: “CPB’s UAS Deployment Vision strengthens the reevaluating drug prohibition and drug control frameworks for border policy, National Security Response Capability.”63 He may well be right, but the U.S. public and Congress need to know if DHS plans to institute guidelines and limits that regulate the extent of DHS IV. No Transparency, No Accountability, No Defined Limits to Homeland Security Drone Missions The UAV program of CBP’s Office of Air and Marine is not top secret – there are no secret ops, no targeted killings, no “signature” strikes against operational collaboration with DOD and the CIA. suspected terrorists, no clandestine bases – like the CIA and U.S. military UAV operations overseas. While the UAV program under DHS isn’t classified, information about the program is scarce – shielded by evasive program officials, the classification of key documents, and the failure of CBP/OAM to share information about the number, objectives and performance of its UAV operations. DHS has also not been forthcoming about its partnerships and shared missions with local law enforcement, foreign governments and the U.S. military and intelligence sectors. CBP has kept a tight lid on its drone program. Over the past nine years, CBP has steadily expanded its UAV program without providing any detailed information about the program’s strategic plan, performance and total costs. Information about the homeland security drones has been limited, for the most part, to a handful of CBP announcements about new drone purchases and a series of unverifiable CBP statistics about drone-related drug seizures and immigrant arrests. Domestic drones in the US are unique – other countries use them as a justification for their own programs Gucciardi 2013 (Anthony Gucciardi, creator of Storyleak, accomplished writer, producer, and seeker of truth. His articles have been read by millions worldwide and are routinely featured on major alternative news websites like the infamous Drudge Report, Infowars, NaturalNews, G Edward Griffin's Reality Zone, and many others, “NEW PRECEDENT: ARMED DOMESTIC DRONE STRIKES WILL SOON BE REALITY”, http://www.storyleak.com/armed-domestic-drone-strikes-reality/, May 23, 2013) A new precedent has been set. Despite extensive denial that drone strikes would endanger Americans, Attorney General Eric Holder has now openly admitted that four US citizens were killed through overseas drone strikes since 2009. While not on United States soil, the deaths of the US citizens in nations like Yemen and Pakistan highlight the new precedent being set by US government heads who wish to use drones as a form of lethal enforcement on US soil. With Holder admitting that Americans have already died via drone strikes following his statements that Obama can already initiate drone strikes on US soil, we are now seeing the way paved to go ahead and announce armed drones to fight terrorism here in the US. We all remember the initial rhetoric that drones were ‘no real threat’, and that they were simply unarmed scouting machines used to save lives overseas. Then, we saw them rapidly enter the nation, and we heard the same tired reassurances. We saw them killing innocents overseas with the high powered weaponry being attached to these ‘scouting’ drones, and we see them still doing so today. But, once again, we’re told not to worry. Political talking heads like Eric Holder assure us that domestic drones, for which over 1,400 permits have been issued, are not meant to be used as weapons. Well, that is unless Obama decides to use the drones as a weapon of war on US soil. ARMED DOMESTIC DRONES IN THE NEAR FUTURE Despite the message of assurance regarding the promise that Holder decided to go ahead and announce that it would actually be entirely ‘legal’ for Obama to issue a drone strike on a US citizen on domestic soil. In fact, CNN reports that Holder does not ‘rule out’ the possibility of domestic drone strikes, and that a scenario could occur in the future. And to strike someone with a drone, of course, you would need weaponry. You would need an armed drone. In other words, Holder is going against the major promise by the FAA official who ‘promised’ that no armed drones will be flying on domestic soil. But domestic drones would never turn into government-controlled war machines, Eric don’t worry, Holder says the government has ‘no intention’ right now of issuing drone strikes on US soil. Just like the government never targeted Constitution and conservative-based groups through the IRS and would never use domestic drones to spy on you. Quite simply, if any power is given to these individuals in government, be sure of one thing: they will use it. And knowing the track record of drone strikes overseas and how they greatly affect the innocent, drone strikes on US soil against citizens is an even more serious threat. The 3,000 plus deaths from drone strikes overseas in Pakistan alone, which vastly affect the innocent and non-threatening, have even prompted Google employees and big firms alike to develop charts and interactive maps to detail the deaths in a manner that portrays the reality of the situation. One design firm known as Pitch recently went and created an interactive chart that, along with detailing how less than 2% of strike victims are high priority targets, documents the drone strike deaths throughout recent years. We continue to hear these major announcements from Holder regarding drone strikes, and each time it pushes the precedent further. Each time, he warps the ‘law’ to justify what is being done with drone attacks, and each time we come closer to the announcement that we ‘need’ to use Just wait for the next terrorist hunt in the US for a high profile crime case to hear more from Holder and the gang on why we need armed domestic drones to keep us safe. It already happened with Dorner and others. armed drones against domestic terrorists. Those norms set a dangerous precedent – leads to global conflict escalation – especially in Asia Taylor 2013 [Guy, “U.S. intelligence warily watches for threats to U.S. now that 87 nations possess drones”, http://www.washingtontimes.com/news/2013/nov/10/skys-the-limit-for-wide-wild-world-ofdrones/?page=all] The age of the drone is here, and U.S. intelligence agencies are warily monitoring their proliferation around the globe. China uses them to spy on Japan near disputed islands in Asia. Turkey uses them to eyeball Kurdish activity in northern Iraq. Bolivia uses them to spot coca fields in the Andes. Iran reportedly has given them to Syria to monitor opposition rebels. The U.S., Britain and Israel are the only nations to have fired missiles from remote-controlled drones, but the proliferation of unmanned aerial vehicles has become so prevalent that U.S. intelligence sources and private analysts say it is merely a matter of time before other countries use the technology. “People in Washington like to talk about this as if the supposed American monopoly on drones might end one day. Well, the monopoly ended years ago,” said Peter W. Singer, who heads the Center for 21st Century Security and Intelligence at the Brookings Institution. What’s worse, clandestine strikes carried out by Washington in far-flung corners of the world have set a precedent that could be ugly. Mr. Singer said as many as 87 nations possess some form of drones and conduct various kinds of surveillance either over their own territories or beyond. Among those 87, he said, 26 have either purchased or developed drones equivalent in size to the MQ-1 Predator — the model made by San Diego-based General Atomics. While American Predators and their updated sister, the MQ-9 Reaper, are capable of carrying anti-armor Hellfire missiles, the clandestine nature of foreign drone programs makes it difficult to determine how many other nations have armed drones. Defense industry and other sources who spoke with The Washington Times said 10 to 15 nations are thought to be working hard on doing just that, and China and Iran are among those with the most advanced programs. “Global developments in the UAV arena are being tracked closely,” said one U.S. intelligence official, who spoke with The Times on the condition of anonymity. “Efforts by some countries to acquire armed UAV systems are concerning, not least because of the associated proliferation risk.” Other sources said that while the international media have focused on the controversy and political backlash associated with civilian casualties from U.S. drone strikes in Pakistan, Yemen and Somalia, Washington’s unprecedented success with the technology — both in targeting and killing suspected terrorists — has inspired a new kind of arms race. “It’s natural that other nations and non-state actors, seeing the many ways the U.S. has leveraged the technology, are keen to acquire remotely piloted aircraft,” said Lt. Gen. Robert P. Otto, Air Force deputy chief of staff for intelligence, surveillance and reconnaissance. Race to the skies The number of nations possessing drones nearly doubled from 41 to 76 from 2005 to 2011, according to a report last year by the Government Accountability Office, which highlighted the fact that U.S. companies are no longer alone in manufacturing and marketing the technology. “Many countries acquired their UAVs from Israel,” said the report. It said Germany, France, Britain, India, Russia and Georgia have either leased or purchased Israeli drones, including the Heron, a model that many foreign militaries see as a good alternative to the American-made Predators and Reapers. A report this year by Teal Group, a Virginia-based aerospace and defense industry analysis corporation, said UAVs have come to represent the “most dynamic growth sector” of the global aerospace industry, with spending on drones projected to more than double from roughly $5.2 billion a year today to more than $11 billion in 2022. China is widely seen as a potential powerhouse in the market. Chinese companies have “marketed both armed drones and weapons specifically designed for UAV use,” said Steven J. Zaloga, a top analyst at Teal Group. “It’s a case where if they don’t have the capability today, they’ll have it soon.” Although there is concern in Washington that China will sell the technology to American adversaries, sources say, the U.S. also is pushing ahead with development of its own secretive “next generation” drones. Today’s models emerged in the post-9/11 era of nonconventional conflict — a time when American use of both weaponized and surveillance-only drones has been almost exclusively over chaotic patches of the planet void of traditional anti-aircraft defenses. With little or no need to hide, relatively bulky drones such as the MQ-1 Predator dominated the market. But the “big secret,” Mr. Zaloga said, “is that the U.S. is already working on both armed and unarmed UAVs that can operate in defended airspace.” Another factor likely to fuel the proliferation of armed drones, he said, centers on a global push to make “very small weapons” that can be tailored to fit smaller aircraft. This matters because of the roughly 20,000 drones now in existence, only about 350 are large enough to carry the slate of weapons on the current market. “What the new munitions will do is mean that if you’re operating the smaller UAVs, you’ll be able to put weapons on them,” said Mr. Zaloga. “And those smaller UAVs are being manufactured now by quite a few countries.” In the wrong hands? One serious concern in Washington is that smaller drones could be used by groups such as al Qaeda or Hezbollah, the Iran-backed militant and political organization based in Lebanon that is engaged in a protracted war with Israel. The U.S. intelligence official who spoke with The Times on the condition of anonymity said it is “getting easier for non-state actors to acquire this technology.” Hezbollah leader Hassan Nasrallah made headlines by claiming his group flew a drone into Israeli airspace last year, after Israel announced that it had shot a UAV out of the sky. Although Mr. Nasrallah said the drone was made in Iran and assembled in Lebanon, little is known about precisely what type it was — or whether it was armed. Armed or not, U.S. officials are wary. “No one is turning a blind eye to the growing use of surveillance-only UAV systems — including by non-state actors — even if these systems have a host of beneficial civil applications,” said the official who spoke with The Times. “ One problem is that countries may perceive these systems as less provocative than armed platforms and might use them in cross-border operations in a way that actually stokes regional tension.” That appears to be happening in Asia, where Japan recently threatened to shoot down Chinese drones flying near the disputed Senkaku Islands in the East China Sea. Northeast Asian countries are likely to invest heavily in drone technology, said Patrick M. Cronin, senior director of the Asia-Pacific Security Program at the Center for a New American Security in Washington. “But even before these investments are manifested in wider deployments, Japan will be relying on UAVs for wider and better surveillance, particularly around its southwest island chain, while China will be using them to variably challenge Japanese administrative control and, indirectly, pressure the United States to restrain its ally,” said Mr. Cronin. “This vital new technology is improving situational awareness. But, paradoxically, if used more offensively the same technology may also accelerate a maritime crisis in the East or even South China Sea.” U.S. precedents Others say the U.S. and its closest allies have set a precedent with clandestine drone strikes in foreign lands. Although British forces have carried out hundreds of drone strikes in Afghanistan and Israel has used drone-fired missiles to kill suspected terrorists in Egypt’s Sinai Peninsula, as well as Islamic militants in Gaza, the most widespread use has been directed by the U.S. military and CIA. In addition to strikes in Libya and Somalia, the U.S. has carried out more than 375 strikes in Pakistan and as many as 65 in Yemen over the past nine years, according to the London-based Bureau of Investigative Journalism. The concern, said the Brookings Institution’s Mr. Singer, is that adversaries will point to U.S. behavior as an excuse for carrying out cross-border targeting of “high-value” individuals. “That’s where you have the problem,” he said. “Turkey carries out a strike in northern Iraq and then cites U.S. precedent in Pakistan to justify it. Or Iran carries out a drone strike inside Syria that the Syrian government says it’s fine with because it’s a lawless area where what they call ‘terrorists’ are hanging out, and then they throw the precedent back at the U.S. “That would make it sticky for us,” said Mr. Singer. “That’s not the broader norm we want out there.” Only regulation of domestic drones can prevent warfare on citizens and bolster the industry Ahsanuddin et al 2014 (Sadia - principal investigator for the report and MPAC research fellow; Domestic Drones: Implications for Privacy and Due Process in the United States; Sep 8; www.mpac.org/publications/policy-papers/domestic-drones.php; kdf) Drones also impact due process rights. Drones are perhaps best known for the role they play in conducting signature strikes against suspected militants abroad. Will civilians on American soil ever be subjected to drone attacks? Should civilians fear the weaponization of drones or their use in delivering lethal payloads? Although the Fifth and Fourteenth Amendments assure individuals of the right to due process before the deprivation of life, liberty, or property, these rights have already begun to erode due to the global war on terror and the use of drones to conduct signature strikes by virtue of executive decisions that are devoid of judicial review. With the mass introduction of domestic drones, there remains a threat and real fear that drones may be used to deprive individuals of life, liberty, or property with no opportunity to dispute the charges brought against them. Americans of all ethnicities and creeds are likely to be affected by the domestic deployment of drones. American Muslims have a special contribution to make to this discussion. Having been subjected to special law enforcement attention and scrutiny, American Muslims find themselves particularly susceptible to infractions of civil liberties. As representatives of the American Muslim population and with the expertise to ground our analysis, the Muslim Public Affairs Council (MPAC) proposes the following guidelines to address the issues of law enforcement use of drones, data collection, weaponization of drones, due process, oversight, and transparency: • Law enforcement use of drones should be restricted. • Data collection should be strictly monitored. • The FAA should require, not merely recommend, that test sites incorporate the Fair Information Principles into their privacy policies. • The weaponization of drones should be prohibited. • The right to due process should be preserved. • States and individuals should have the ability to bring a cause of action against an entity that, in operating a drone, violates their rights. • Drone deployment by federal agents must be subjected to Congressional oversight and local public drone use should be subjected to local city council oversight. • The general public should be engaged in the development of policy guidelines by a public body intending to operate drones. • In keeping with the principle of transparency, the FAA should make available to the public the names of drone applicants, the holders of Certificates of Authorization, other licensees, and privacy policies of drone-operating agencies. Adequate protection of privacy is necessary to allow the public to take advantage of drone technology without becoming a society in which every movement is monitored by the authorities. Simultaneously, drone developers need regulations so that they can conduct research and development unimpeded by protests and news reports. Additionally, the weaponization of drones on domestic soil poses a threat to due process rights and public safety. This was acknowledged by Sen. Dianne Feinstein, who called for a total prohibition on the weaponization of domestic drones.13 Indeed, politicians and policymakers representing a broad spectrum of political views advocate regulations for domestic drones. Plan The United States federal government should require law enforcement agents to receive a probable cause warrant prior conducting aerial surveillance. Contention 2 – Solvency The plan is the only way to balance privacy and security concerns Rothfuss 2014 (Ian F [George Mason School of Law]; Student Comment: An Economic Perspective on the Privacy Implications of Domestic Drone Surveillance; 10 J.L. Econ. & Pol'y 441; kdf) IV. Legislative and Policy Recommendations This section discusses the current policy and legislative recommendations regarding drone surveillance and applies economic analysis to recommend an optimal way forward. Developing new laws and policies to address the privacy threats presented by domestic drone surveillance will involve the difficult balancing of many special interests and the individual privacy rights of U.S. citizens. n147 Therefore, in drafting a legal framework for domestic drone surveillance, Congress should consider economic factors and establish a framework which allows the use of drones with constraints to protect the privacy interests of U.S. citizens. As an objective methodology, these economic perspectives should lead lawmakers and policymakers to enact rules that will efficiently maximize utility while protecting privacy interests. The new framework should address the privacy concerns arising out of the domestic use of drones, while still allowing society to realize the technological benefits. Congress must consider many factors when determining how to best integrate drones into U.S. airspace. n148 In addition, the proposed policies should be compared with the policies in countries such as the United Kingdom, where general surveillance is more commonplace. n149 In July 2012, the Association for Unmanned Vehicle Systems International (AUVSI) issued a code of conduct that attempted to address concerns associated with the deployment of drones. n150 Among other elements, the code of conduct requires industry members to "respect the privacy of individuals" and "comply with all federal, state, and local laws, ordinances, covenants, and restrictions." n151 The code of conduct has been viewed as insufficient since it only lists broad topics, does not discuss specific privacy concerns, and does not elaborate on how the provisions will be enforced. n152 Current recommendations address a number of concerns regarding the widespread deployment of drones in the United States. Among these are recommendations from the American Civil Liberties Union (ACLU) n153 and legislation currently pending in both houses of Congress. n154 The first group of recommendations to consider is usage restrictions. It is generally accepted that drones and other means of surveillance may be used when a warrant has been issued because probable cause exists. Therefore, the focus of [*459] pending legislation and policy recommendations is on when the use of drones should be allowed without a warrant, if at all. The ACLU proposes that drone use should be limited to three purposes: (1) "where there are specific and articulable grounds to believe that the drone will collect evidence relating to a specific instance of criminal wrongdoing or, if the drone will intrude upon reasonable expectations of privacy, where the government has obtained a warrant based on probable cause;" n155 (2) "where there is a geographically confined, time-limited emergency situation in which particular individuals' lives are at risk;" n156 or (3) "for reasonable non-law enforcement purposes . . . where privacy will not be substantially affected." n157 Similarly, both the House and Senate versions of the Preserving Freedom from Unwanted Surveillance Act of 2013 provide for three exceptions to the warrant requirement: (1) "patrol of borders"; (2) "exigent circumstances"; and (3) "high risk" of terrorist attack, as determined by the Secretary of Homeland Security. n158 The definition of exigent circumstances differs in the two bills. The Senate bill defines exigent circumstances to only include action necessary to "prevent imminent danger to life," n159 while the House bill uses a broader definition that also includes "serious damage to property, or to forestall the imminent escape of a suspect, or destruction of evidence." n160 The broader definition of exigent circumstances in the House of Representatives version of the bill n161 is appropriate since it will give law enforcement more latitude to protect the American people in addition to providing for civil liability n162 as a check against improper use of this authority. The next recommendation is to consider whether there should be an exclusionary rule that would make any evidence gathered without a warrant or other legal authorization inadmissible in a criminal proceeding. The Senate bill also includes an exclusionary rule that would prohibit evidence collected in violation of the Act from being used in criminal prosecution. n163 Exclusionary rules can overdeter criminal investigations. n164 Therefore, unless a compelling case can be made as to why it is necessary, it would be more efficient not to include an exclusionary rule in the legislation. Another consideration is whether drones operating in the United States should be allowed to carry weapons like drones operating overseas which [*460] are used to target enemy combatants. One recommendation is to prohibit law enforcement from arming drones. n165 Drones have the ability to conduct remote precision strikes on suspects, but due process concerns and the dangers resulting from armed unmanned aircraft preclude the viability of this option within the United States. Therefore, domestic drones should be prohibited from carrying weapons of any kind. Congress should enact rules to govern domestic drone use. One recommendation is that Congress should require the Department of Transportation to conduct a Privacy Impact Assessment of the operation of drones domestically. n166 Pending legislation proposes amending the FAA Modernization and Reform Act of 2012 to address drone privacy concerns. n167 With the proper focus on privacy concerns, drones may be deployed domestically while still protecting the privacy of American citizens. In addition, Congress should require a warrant for "extended surveillance of a particular target." n168 As discussed earlier, the Fourth Amendment would not necessarily require a warrant in these situations. Even so, such a requirement extending warrant protections makes sense and will provide a valuable check against law enforcement abuse of the new technology. Congress should require authorization from an independent official for generalized surveillance that collects personally identifiable information such as facial features and license plate numbers. n169 This recommendation would apply to situations where a warrant was not required but personally identifiable information was still being gathered, such as surveillance at a public event. This recommendation should be enacted as a safeguard of the public's privacy interests. To adequately protect privacy interests, Congress should direct that the independent official, vested with decision-making power on applications for general surveillance, be a neutral and detached magistrate who is completely separated from any law enforcement or intelligence agency. As discussed in the previous section, legislation should be crafted to maximize the social utility from the domestic use of drones. The legislation should be structured according to the three levels of scrutiny proposed by Song to ensure that the governmental interest in the surveillance outweighs the disutility or social cost that will result from the loss of privacy. n170 The neutral and detached magistrate discussed above could determine when a sufficient government interest exists to warrant allowing generalized drone surveillance. [*461] Additional policy recommendations include an image retention restriction n171 and a requirement to file a data collection statement to obtain a FAA license to operate a drone. n172 These recommendations should be incorporated into the legislation. Congress should require a data collection statement with applications for a FAA license to operate a drone. A key element of the required data collection statement should address the retention of images and other data obtained. n173 Such a restriction would mandate that all images and other sensory data gathered through surveillance be deleted unless the information serves a valid, legal purpose that requires retention. n174 This restriction is necessary to prevent the government or any other entity from amassing an essentially limitless database of information on the activities of U.S. citizens without a valid and specified purpose. Collectively, enacting these recommendations would prevent widespread, general drone surveillance while allowing drones to be utilized domestically when reasonably warranted to maintain security or protect the interests of American citizens. Therefore, these recommendations would adequately protect the privacy interests of American citizens while allowing law enforcement and other entities to utilize drones to protect our country and serve other worthwhile endeavors. Establishing limits on drones is the only method to revitalize the fourth amendment San Pedro 2014 (Victoria [J.D. Candidate, Stetson University College of Law]; STUDENT WORK: DRONE LEGISLATION: KEEPING AN EYE ON LAW ENFORCEMENT'S LATEST SURVEILLANCE TECHNOLOGY; 43 Stetson L. Rev. 679; kdf) V. CONCLUSION AND RECOMMENDATIONS With the ubiquity of drone licenses among American law enforcement agencies, n288 the drag-net surveillance that was once a laughable concept n289 is now a reality. n290 While state statutes and proposed federal legislation attempt to limit law enforcement's ability to use drones in surveillance efforts, those proposals and statutes do not adequately address the duration of the sur-veillance or the sophistication of the technology used by law enforcement to enhance drone capabilities. Therefore, by requir-ing a warrant and restricting law enforcement from conducting drone surveillance for a period lasting longer than twenty-four hours, the proposed legislation will best address the issues left open by Fourth Amendment jurisprudence. [*720] Further, including the exigent circumstances language into the legislation will allow law enforcement agencies to better understand the circumstances that would permit the use of a drone. Because the courts have addressed exigent circumstances on numerous occasions, n291 law enforcement agencies may already have protocols and officer training dealing with exigent cir-cumstances. Rather than drafting legislation that attempts to describe a circumstance meriting the use of a drone, n292 using the exigent circumstances language will allow law enforcement agen-cies to comply with Fourth Amendment jurisprudence already defined by the Court. Similarly, legislation imposing a time restriction on the dura-tion of the surveillance will provide law enforcement agencies with a bright-line rule that facilitates application across the board. Since the current Fourth Amendment jurisprudence provides that one does not have a reasonable expectation of pri-vacy from all observations of one's property, n293 this statutory lan-guage will provide a reasonable expectation of privacy from prolonged observations of one's property. This proposal would comply with current Fourth Amendment jurisprudence regarding fly-over aerial observations and would also be consistent with the mosaic theory. n294 Further, this proposal limits law enforcement's ability to use any form of drone technology. Given that the technological advancements in this field will likely continue to progress at a rapid pace, any proposed legislation should incorporate an objective standard defining the permissible level of technology or an outright prohibition on the use of all drone surveillance. In this way, we can align the use of this form of technology with Fourth Amendment protections. Rather than providing vague standards, such as technology that is not in general public use, the general restriction provides a bright-line rule to law enforcement agencies. [*721] Therefore, this proposal would allow law enforcement to be exempt from the warrant requirement for exigent circumstances, while also allowing them to obtain a warrant from a neutral and detached magistrate when law enforcement intends to conduct long-term surveillance, thereby ensuring that law enforcement agencies comply with the warrant requirement of the Fourth Amendment and respect citizens' privacy rights. Federal action is uniquely key Harman 2015 (Jane [Former Rep, D-CA]; The undercooked debate on domestic drones; may 1; thehill.com/opinion/op-ed/240728-the-undercooked-debate-on-domestic-drones; kdf) Today, lawmakers worldwide are sleepwalking through a privacy and security crisis. How many secure sites have to be compromised before we wake up to the full challenges posed by commercial and law enforcement UAVs – or, in common parlance, by drones? The Federal Aviation Administration unveiled rules this February that would make it much easier to operate drones in the United States: for law enforcement agencies conducting surveillance, for commercial firms, and for private individuals. Make no mistake: eventually, the last two groups could include bad actors, even terrorists. It’s hard to overstate how undercooked the debate on this future is. The stakes are high; our privacy and our security are at risk. The implications for privacy and surveillance are huge. In 2012, the Supreme Court ruled that tracking a car using an attached GPS beacon, without a warrant, is unconstitutional. But what if police use a roving drone instead? That debate is raging in Virginia now, which two years ago imposed a two-year moratorium on warrantless drone surveillance. That’s where most of the regulatory action is happening on this issue: in concerned states and municipalities across the country. At the federal level, we have a leadership vacuum. With a technological revolution on its way, Washington is AWOL. How do you square this new world with our Constitution? As Brookings Institution senior fellow John Villasenor said in 2012, “The FAA, I would imagine, has more aviation lawyers than Fourth Amendment constitutional lawyers.” Then there are the new security challenges. Authorities have a poor track record detecting small aircraft that fly where they shouldn’t. In 2010, a Mexican government drone went down in an El Paso backyard; though NORAD later said it had been tracking the plane, local officials seem to have been taken entirely by surprise. This month, a postal employee flew a (manned) gyrocopter to Capitol Hill through some of the most restricted airspace in the country. Incidents like these severely undermine confidence in our preparedness. One day, one of the craft slipping under our radar will do us harm. Iran has poured funds into developing a “suicide drone” – essentially a cheap, nimble cruise missile. It’s not hard to imagine terrorists building do-it-yourself versions of the same device, a pipe bomb or pressure cooker strapped to a small UAV. This is a concern others have raised for years, but it took a drone landing feet from the White House for the Secret Service to start trying out jamming technology – an issue they should have been thinking about years ago. Many drone countermeasures are still primitive; some of the solutions are worse than the problem. Popular Science advised the White House, “Simple netting, used often at drone trade shows to keep small drones confident to their exhibitions, could also work, if the President wanted to live inside a net all the time.” We need a serious policy response that engages Congress; federal, state, and local government – and the private sector. This issue is too big for the FAA, too urgent to postpone, and too important to leave off the national agenda. Lately, Congress has devoted impressive attention to new risks in cyberspace. It should put at least as much effort into understanding drones. One option is to encourage commercial firms—through either voluntary or mandatory standards—to hardwire restrictions into the drones they build and sell. Some companies already program their drones to stay out of restricted airspace and away from sensitive sites. Those efforts need a push and a signal boost from government. The justifications for data collection are wrought with faulty logic—only increasing the amount of info available to public can keep the homeland safe Scheer 2015 (Robert [Prof @ USC’s School of journalism and communication]; They Know Everything About You; Nation Books; p. 208-212; kdf) WE MUST CHALLENGE THE ASSUMPTION THAT PROTECTING national security requires sacrificing the constitutional rights of the individual. As pointed out in this book, the Fourth Amendment does not contain an absolute· ban on searches and seizures but, rather, requires a court-authorized warrant based on probable cause of a crime before invading an individual's private space. All Yahoo was asking of the court was that the searches of its company's customers meet this requirement. Instead, the government responded that the so-called War on Terrorism could not be won on that basis, and the secret FISA court endorsed the view. As Stewart Baker, the former NSA general counsel and Homeland Security official in the Bush administration, told the Washington Post after the Yahoo case documents were released: "I'm always astonished how people are willing to abstract these decisions from the actual stakes." He went on to say that "[w]e're talking about trying to gather information about people who are trying to kill us and who will succeed if we don't have robust information about their activities. "26 As demonstrated in previous chapters, however, there is simply no serious evidence that the mass surveillance program initiated under President Bush provided the sort of "robust information" Baker claims was required to identify the people "trying to kill us." Yet, as this book goes to press, we have been presented with still another case study in the rise of a terrorist movement-the Islamic State oflraq and Syria (ISIS), whose members are creating considerable mayhem in Iraq and Syria-for which the mass surveillance techniques of the NSA left us totally unprepared. They appeared suddenly, startlingly so, these black-clad men of ISIS, beheading journalists and others27 as they formed their proclaimed Sunni Caliphate over a broad swath of Syria and lraq. 28 Once again, as with the al Qaeda attacks of 9/11, the fearsome spectacle of a terrorist enemy drove reason from the stage and the chant of war was in the air. The New York Times carried the text ofObama's speech to the nation on September 10, 2014, in which he vowed to "destroy the terrorist group."29 Defense Secretary Chuck Hegel said that ISIS poses an "imminent threat to every interest all the arguments for peace and restraint were cast aside and the defense of privacy and civil liberty seemed an unaffordable indulgence in the rush to combat an enemy of such awesome power and mystery. Lost in the moment of fear-induced passion was the fact that these men of ISIS who so alarmed us, like their cousins we have."30 Suddenly, in al Qaeda, were hardly unknown or mysterious beings, but instead monsters partially of our own creation. Adam Gopnik reinforced this point in an August 2014 article in the New Yorker. "ISIS is a horrible group doing horrible things, and there are many factors behind its rise," he wrote. "But they came to be a threat and a power less because of all we didn't do than because of certain things we did do-foremost among them that massive, forward intervention, the Iraq War. (The historical question to which ISIS is the answer is: What could possibly be worse than Saddam Hussein?)"31 Now, once again-and this time as compared to 9 I 11, when the public was so ill-served with alarmist information about the extent of the terrorist threat-the president was presumably in possession of that vast trove of intelligence data collected by the NSA and analyzed with the brilliant software of the best Silicon Valley datamining companies such as the media-celebrated Palantir. And yet there is no evidence that this costly and intrusive effort was the least bit useful in predicting the rise of ISIS. Clearly, there is a disturbing disconnect between the zeal with which big data is collected and the lack of scientific precision in utilizing that data to make sound policy decisions and to inform the public as to the necessity of action. It is also difficult to see just how that data, based as it is on the minutiae of the lives of much of the world's population, is useful to an understanding of this threat. This book explains the continued rise of a military-intelligence complex that, through the assertion of a pressing danger to national security after 9 I 11, made an unfettered and largely unchallenged claim upon the vast amount of private data collected in a wired world by government and private enterprises. It is a claim based on the unquestioned assumption that what passes for military intelligence is sufficiently and uniquely productive of useful insight to warrant the costs to our democracy as well as our federal budget, and that less invasive means of research such as scholarship, journalism, and traditional shoe-leather spy and detective work are inherently inadequate to the task of protecting us in a cyberworld. It is a commonly persuasive argument and difficult to challenge given that the high-tech surveillance is cloaked in such tight secrecy. In the wake of the Snowden revelations, when there was a much-heightened public awareness of the threat to privacy and a willingness, even on the part of Congress, to address the issue more vigorously, all it took was the appearance of a renewed terrorist threat to develop anew a consensus that privacy needed to be surrendered as an unaffordable risk to the nation's security. Just the opposite is the case. What now passes for military intelligence is a tech -driven oxymoron that denies the place of historical contemplation, cultural and religious study, political complexity, and ethical restraints in assessing dangers to a nation. Never has our nation's foreign policy been so poorly served as in the era of the Internet, with its enormous potential to enlighten us; but the collusions of war-mongering fanatics and profiteers are beyond the comprehension of even the most powerful machines. They must not be beyond the purview of public awareness, however. A fully informed public is the best safeguard against the hazardous foreign entanglements that our founders warned were the main threat to the health of the republic. That is why they enshrined the constitutional protections against unbridled government power they believed would subvert the American experiment in representative governance. We must heed the wisdom of the EFF's senior attorney Lee Tien, who as much as any constitutional lawyer has battled on behalf of those rights. As he summed up in an interview: "We need to fix the national security classification system that has classified so much information that we don't know what's going on. It's hard to know what we should do, but we should all agree that knowing what's happening is the first step. It's dangerous to propose a solution when you don't know what the extent of the problem is. If you asked me before the Snowden revelations, my answer would be different. There are no personal solutions to this; there is nothing we can do individually." "This is a systemic problem," he continued. "It's an institutional problem, it's a political problem. There can only be collective action. That's it. That means we need to call on all of them-individuals, Internet companies, politicians, the government-to fix it, and we need to organize. can't have a democracy if you don't have sufficient information. We're fighting for the soul of this democracy." You Inherency Inherency – Current Regs Fail Current regs have loopholes that allow for warrantless invasions of privacy New York Times 2015 (Editorial Board; Regulating the Drone Economy; Feb 19; www.nytimes.com/2015/02/19/opinion/regulating-the-drone-economy.html; kdf) Mr. Obama’s action on drone use by government agencies is much more problematic. For example, the president’s memorandum says the government should not retain personally identifiable information collected by drones for more than 180 days. But agencies can keep the data for longer if it is “determined to be necessary to an authorized mission of the retaining agency” — a standard that grants officials far too much latitude. Moreover, the administration says agencies have to provide only a “general summary” of how they use drones, and only once a year. Law enforcement agencies like the F.B.I. and local police departments are already using drones and manned aircraft for surveillance, often without obtaining warrants, but they have said little publicly about what they are doing with the information collected. The use of drones is likely to grow, and the devices could become as common as utility and delivery trucks. At the dawn of this technology, it’s appropriate to set sound safety and privacy rules. Inherency – Yes Border drones Unwarranted drones are proliferating on the borders now Kayyali 2015 (Nadia; Secure Our Borders First Act Would Ensure Proliferation of Drones at the Border; Feb 3; https://www.eff.org/deeplinks/2015/02/secure-our-borders-first-act-would-ensure-proliferationdrones-border; kdf) Secure Our Borders First Act Would Ensure Proliferation of Drones at the Border Security shouldn’t be a synonym for giving up civil liberties. But bills like HR 399 show that lawmakers think it is. The Secure Our Borders First Act is an ugly piece of legislation that’s clearly intended to strongarm the Department of Homeland Security into dealing with the border in a very particular way—with drones and other surveillance technology. The bill appears to have stalled in the House—it was on the calendar for last week but wasn’t voted on, and it's not on the schedule for this week. But it’s not dead yet. And even if it does die, this isn’t the first time Congress has tried to increase the use of drones at the border. In 2013, the Senate passed S.744, the Border Security, Economic Opportunity, and Immigration Modernization Act. The bill called for the use of drones “24 hours per day and for 7 days per week.” The House of Representatives did not pass the legislation, but the drone mandate in HR 399 is eerily similar—and it demonstrates that the idea that drones should be used at the border is persistent. The 72-page piece of legislation, authored by Rep. Michael McCaul from Texas, gives the Department of Homeland Security (DHS) an incredibly specific mandate. It requires DHS to gain “operational control” of high traffic areas within 2 years, and the entire southern border within 5 years. Operational control means “the prevention of all unlawful entries into the United States.” It prescribes exactly how that should be done, and even includes penalties for failure to do so, including pay freezes for government officials. The bill also prescribes how operational control should be obtained. It does this by prescribing what equipment 11 specific border points should use. At several of the points, that equipment includes drones. Additionally, the bill includes the following mandate: The Office of Air and Marine of U.S. Customs and Border Protection [CBP] shall operate unmanned aerial systems not less than 16 hours per day, seven days per week. As the ACLU notes, it’s a little shocking that the bill includes such mandates only “weeks after a damning DHS Inspector General (DHS IG) report titled ‘CBP Drones are Dubious Achievers.’” And that’s just the most recent report. In June of 2012, EFF called attention to another DHS IG report that faulted the DHS for wasting time, money, and resources using drones that were ineffective and lacked oversight. To put it in perspective, Predator drones cost $3,000 per hour to fly. That’s certainly part of the reason that HR 399 authorizes $1 billion in appropriations. Of course, the waste of money in this bill pales in comparison to its potential negative impact on civil liberties. Drones pose a multitude of privacy concerns. Drones can be equipped with, among other capabilities, facial recognition technology, live-feed video cameras, thermal imaging, fake cell phone towers to intercept phone calls, texts and GPS locations, as well as backend software tools like license plate recognition, GPS tracking, and facial recognition. They are capable of highly advanced and near-constant surveillance, and can amass large amounts of data on private citizens, which can then be linked to data collected by the government and private companies in other contexts. Lest it seem that this will only affect communities directly adjacent to the border, or individuals being investigated or pursued by CBP, it’s important to note that the government considers the border to extend 100 miles in, and CBP has certain powers to conduct activities like searches that would be unconstitutional elsewhere. Furthermore, according to documents obtained by the EFF as part of a Freedom of Information Act lawsuit against the agency, CBP appears to be flying drones well within the Southern and Northern US borders for a wide variety of non-border patrol reasons. In fact, the documents showed that between 2010-2012, the number of missions CBP flew for state, local and non-CBP federal agencies increased eight-fold. The silver lining? The legislation hasn’t passed yet. There’s still time to contact your elected representatives and tell them to vote no. AT: New FAA Regs Solve Those regs expand the power of the state Fulton 2015 (Deirdre; Surveillance, Privacy Concerns Raised as FAA Gives Domestic Drones a Nod; Feb 15; www.commondreams.org/news/2015/02/15/surveillance-privacy-concerns-raised-faa-givesdomestic-drones-nod; kdf) Domestic non-military drone use took one step closer to widespread implementation on Sunday, as the Federal Aviation Administration issued proposed regulations for small unmanned aircraft systems in the U.S. According to an FAA press release, the rule would limit flights to daylight and visual-line-of-sight operations. It also addresses height restrictions, operator certification, aircraft registration and marking, and operational limits. In a blow to Google and Amazon, it does not permit drone delivery. Also on Sunday, the White House issued an Executive Order requiring every federal agency to develop "a framework regarding privacy, accountability, and transparency for commercial and private [Unmanned Aircraft Systems] use" within 90 days and with an eye toward protecting personal privacy, civil rights, and civil liberties. "Together, the FAA regulations and the White House order provide some basic rules of the sky that will govern who can fly drones in the United States and under what conditions, while attempting to prevent aviation disasters and unrestrained government surveillance," the Washington Post declared. But civil liberties experts warned that the FAA rules and presidential memo leave the door open for invasions of privacy by the government and corporations. "The proposed rules do absolutely nothing to address privacy, except perhaps require some identifying markings displayed in the 'largest practicable manner' such that you may be able to identify who owns the drone that is spying on you," Ryan Calo wrote at Forbes. "I was on the conference call announcing the new rules and the Secretary of Transportation mentioned the importance of privacy and civil liberties, but this commitment is not reflected in the proposed rules." The Center for Democracy and Technology called on Congress to raise the bar on domestic drone standards. "Drones have the potential for significant societal, scientific, and economic benefits, but also pose new and intrusive privacy problems," CDT senior counsel Harley Geiger said in a press statement. "The White House’s memo requires government agencies to enhance transparency and develop clear rules to protect the privacy of Americans. This is an important and welcome step in advancing drone technology, while protecting civil liberties." Still, he added, "the White House memo itself does not establish strong privacy and transparency drone standards for agencies, leaving it up to the agencies to develop these standards. Because the memo’s requirements are not specific, the drone policies the agencies set for themselves will be key to how individuals’ privacy is actually protected. Congress still has a role to play in setting strong privacy and transparency standards for drone use." One of the most promising applications for domestic drone use is also one of the most troubling: as an internet service platform, giving operators access to vast quantities of data and threatening net neutrality, Drew Mitnick and Jack Bussell note at the blog for Access, a global human rights organization focused on digital freedom. "Drones also increase the opportunities for governments to conduct first-hand surveillance of users’ electronic communications by intercepting signals and information," they write. "Official documents demonstrate that government agencies are already exploring aerial platforms for surveillance technologies, like Stingray technology, which conducts bulk surveillance of user location information... The potential for drones to violate individual rights supports the need for legislation and regulations for government uses of drones as well as commercial vehicles." Privacy Advantage AT: Alt Causes The plan is the catalyst that makes privacy possible Ahsanuddin et al 2014 (Sadia - principal investigator for the report and MPAC research fellow; Domestic Drones: Implications for Privacy and Due Process in the United States; Sep 8; www.mpac.org/publications/policy-papers/domestic-drones.php; kdf) Simultaneously, the IHSS survey respondents indicated apprehensiveness over any domestic drone operations: two-thirds expressed concern over potential surveillance in homes or public areas; 65 percent were concerned about safety; and 75 percent were concerned about the government’s ability to regulate use.82 The rapid pace at which drone technology is developing, the lack of clear guidelines protecting privacy and civil liberties, and public concern over these issues indicate an urgent need for action in Congress and state legislatures. Privacy experts agree. In an article in the Stanford Law Review Online, Professor Ryan Calo of the University of Washington School of Law states that drones “may be just the visceral jolt society needs to drag privacy law into the twenty-first century.” American privacy law has developed at a “slow and uneven” pace, whereas technology has developed at a rapid speed. In spite of the development of computers, the Internet, Global-Positioning Systems (GPS), biometrics, gigapixel cameras, face recognition technology, and the widespread use of e-mail and other forms of electronic communication, there has been no attendant development in privacy law. Because drones “threaten to perfect the art of surveillance,” they make for a good catalyst to update privacy law. The need for legislation is clear. With recent revelations that the federal government has been conducting surveillance of the American public on an unprecedented level, the threat that unregulated and immensely capable technologies pose to civil liberties is profound. The law must catch up with technology. AT: If you have nothing to hide The idea that only those with something to hide should worry trivializes the importance of privacy concerns Scheer 2015 (Robert [Prof @ USC’s School of journalism and communication]; They Know Everything About You; Nation Books; p. 81-82; kdf) An even darker defense of the end-of-privacy doctrine had been offered a month earlier by Google's Eric Schmidt, who impugned the innocence of consumers who worry about snooping by Google and other companies. "If you have something that you don't want anyone to know, maybe you shouldn't be doing it in the first place," Schmidt stated in an interview for a December 2009 CNBC Special, "Inside the Mind of Google."5 The ability of the fast-growing Internet data-mining companies to trivialize privacy concerns succeeded because the target audience of younger consumers was either indifferent to invasions of their privacy or ignorant of the extent and depth of that data collection. It was remarkable that an American social culture that had for so long been moored to a notion of individual sovereignty predicated on the ability to develop one's identity, ideas, and mores in private, had, in a wink, become willing to surrender any such notion. Americans had fought and died for the right to have privately developed papers, conversations, friendships, and diaries, especially in our homes. Yet here we were as a society voluntarily moving so much of that into digital spaces owned and managed by corporations we have no control over. This relinquishing of the most private information about one's essence and aspirations became the norm in a shockingly short period, examined only lightly and in passing. As we shared more and more with ever-widening social networks, it seemed okay as long as the companies securely stored this precious data, to be used only to enhance the consumer experience. We counted on the self-interest of the corporation not to harm us, not to bite the hand that feeds. But the Snowden revelations changed all that by exposing how easily the government could access-and indeed was accessing our personal info. That troubling confluence between the corporate world and the state caught the public's attention in a way that Internet companies feared might be game changing, threatening the culture of trust needed to continue gathering that data. Also straining global confidence in Internet commerce was the shock of those outside the country who had bought into the myth that US-based multinationals were international in their obligations, but who now found them to be subservient to the whims of Washington. 6 That was a message that US companies, up against a saturated domestic market for their products, found particularly alarming, since they depend on global.growth to please shareholders. AT: Nazism example=hyperbole The risk is real Scheer 2015 (Robert [Prof @ USC’s School of journalism and communication]; They Know Everything About You; Nation Books; p. 176; kdf) WE ARE A NATION THAT HAS LONG CELEBRATED DISSIDENTS throughout the world who dare, often at great risk, to expose the secret actions and challenge the legitimacy of repressive governments. In some cases, we even provide legal sanctuary or asylum for such people. However, when Americans dissent in such radical ways, the opposite is often the case-they are vilified as disloyal and as a threat to our collective security or stability. The assumption, embraced so widely, must be that our system never requires such a fundamental challenge to its authority, as represented by the actions of a Daniel Ellsberg, Thomas Drake, Chelsea Manning, or Edward Snowden. We know, however, from so many historical examples-the Roman Empire, Nazi Germany, the Soviet Union-that unchallenged authority not only will violate human rights but also will ultimately sow the seeds of its own ruin, increasingly blind to its own limitations and flaws. Despite our historically innovative constitutional checks on government power, we are nevertheless always flirting with imperial hubris. We see this clearly in the pattern of lies that defined US foreign policy after 9/11; it is quite apparent that leaving those lies largely unchallenged in the name of classification seriously weakened the position of the United States in the world. AT: Law enforcement turns Many law enforcement agents refuse drones – the plan provides them with an effective and constitutional method to do so Sommadossi 2014 (Tiffany; Domestic Surveillance Drones: To Fear or Not to Fear?; Aug 4; www.legislationandpolicy.com/1425/domestic-surveillance-drones-fear-fear/; kdf) While pending federal legislation is an excellent sign that Congress is taking steps to address privacy concerns related to drone surveillance, the question of what to do until federal laws pass remains. The absence of drone privacy restrictions represents a gaping hole in American privacy protections, and also puts law enforcement offices in a predicament. A growing number of law enforcement offices, like the LAPD, are voluntarily refusing to integrate drone technology into its investigations because of public disapproval. The public has made clear that unless strict privacy rules are in place to govern surveillance drones, the benefits they can provide are not worth the significant privacy implications. Therefore, the lack of federal drone law focused on privacy is simultaneously threatening American privacy interests and preventing law enforcement from taking advantage of new technologies. As the Supreme Court’s interpretation of the Fourth Amendment slowly transforms and Congress remains suspicious of government surveillance programs, it will be interesting to see where the pendulum settles on what constitutes a reasonable expectation of privacy in the United States when it comes to government surveillance, particularly from the air. Drones Advantage AT: Drones Good The plan doesn’t eliminate all drones, just puts limits on surveillance Galizio 2014 (Gregory; NOTE: A DIGITAL ALBATROSS: NAVIGATING THE LEGAL FRAMEWORK OF DOMESTIC POLICE DRONE TECHNOLOGY VERSUS PRIVACY RIGHTS IN MASSACHUSETTS AND BEYOND; 20 Suffolk J. Trial & App. Adv. 117; kdf) V. CONCLUSION While law enforcement drones need to be strictly restrained by [*143] statute, the courts, and government agencies, this emerging technology need not be universally condemned as the advent of George Orwell's dystopian world. American legislatures and courts should legally discourage all dragnet surveillance conducted with drones. If sensible legislation, along with strict judicial review, can be established, domestic drones should be integrated into American skies. The courts must evolve and confront the rapid pace of technology with more stringent approaches to protecting privacy rights. On the practical side, civil libertarians should not unconditionally reject law enforcement's operation of drones if used in the same manner as existing police technology. The arrival of domestic drones offers a new battle within the dichotomy of privacy and security interests. Just as drones may benefit domestic security interests, they burden the right of privacy. As drone and other technologies further complicate this legal clash of competing interests, it will be up to lawmakers and judges to offer reasonable and balanced solutions. While drones possess benefits to public safety, the failure to adapt our Fourth Amendment jurisprudence to the digital age will create a digital albatross upon the privacy interests of us all. n156 AT: Drones Save Lives Current tech make drones more dangerous than helpful Guma 2014 (Greg; Drones and Law Enforcement in America: The Unmanned Police Surveillance State; Feb 18; www.globalresearch.ca/drones-and-law-enforcement-in-america-the-unmanned-policesurveillance-state/5330984; kdf) The Defense Committee’s legislative models are designed to satisfy diverse interests. One creates a drone-free zone, while another establishes strict requirements limiting their use by law enforcement agencies and other public officials. The model regulating drone use (rather than outlawing it) allows them to be used with a judicially issued warrant or for limited non-law enforcement purposes like fire detection, hazardous material response, search & rescue, and natural disasters. Beyond constitutional concerns, proposed legislation also addresses some safety issues. According to Buttar, many of the drones currently available to law enforcement have limited flying time, can’t be flown in bad weather, must be flown in sight of an operator, and can only be used during daylight hours, “making them ill-suited to search and rescue missions and best suited for pervasive surveillance.” On the other hand, AP points to some of the attractions driving the rush to drone use. Unmanned aircraft vary widely in size and capability. They can be as small as a bird or look like a children’s remote-controlled toy, and yet can be equipped with highpowered cameras, microphones, heat sensors, facial recognition technology or license plate readers. Similar technology has been used by the US military and CIA to track down Al-Qaida operatives abroad. Law enforcement likes drones because they’re relatively cheap; they reportedly keep down the price by cutting fuel and maintenance costs, as well as reducing manpower. Look at it this way: A police helicopter can cost from $500,000 to $3 million, and about $400 an hour to fly. It can be “affordable” snooping for those with the means of surveillance. AT: Drones Kills ISIS ISIS is structurally incapable of being a threat Matthews and Preble 2015 (Dylan and Christopher [Cato's vice president for defense and foreign policy studies]; Ignore the headlines. The world is getting safer all the time.; Jan 15; www.vox.com/2015/1/14/7546165/world-getting-safer; kdf) DM: Did ISIS change your thinking on this at all? ISIS fighter An ISIS fighter in Syria. (AFP/Getty Images) CP: Not really, for a couple reasons. ISIS may be a terrorist organization, and may be an insurgency, and may be a quasi-nation-state or attempting to become a quasi-nation-state, but it's hard to be all of those things simultaneously. Austin Long writes about this in his chapter, about the differences between insurgents and terrorists. Most terrorists operate in the shadows. The hard part is not killing them, it's finding them. That's why traditional counterterrorism is an intelligence and information-gathering process. It's a lot like police work. By declaring itself a state and raising a flag over territory it seizes and holds, ISIS is trading away one of its key advantages, and opening itself up to more traditional military attacks. It's a virulent, reprehensible state, but it's not clear to me that it's a greater terrorist threat than other organizations that are continuing to operate in the shadows. xt – No ISIS Terror No threat of ISIS terrorism – litany of reasons Byman and Shapiro 2015 (Daniel L [research director @ Center for Middle East Policy, Brookings] and Jeremy [Fellow @ Brookings]; Be Afraid. Be A Little Afraid: The Threat of Terrorism from Western Foreign Fighters in Syria and Iraq; January; www.brookings.edu/research/papers/2015/01/westernforeign-fighters-in-syria-and-iraq-byman-shapiro?rssid=LatestFromBrookings; kdf) Despite these fears and the real danger that motivates them, the Syrian and Iraqi foreign fighter threat can easily be exaggerated. Previous cases and information emerging from Syria suggest several mitigating effects that may reduce—but hardly eliminate—the potential terrorist threat from foreign fighters who have gone to Syria. Those mitigating factors include: • Many die, blowing themselves up in suicide attacks or perishing quickly in firefights with opposing forces. • Many never return home, but continue fighting in the conflict zone or at the next battle for jihad. • Many of the foreign fighters quickly become disillusioned, and a number even return to their home country without engaging in further violence. • Others are arrested or disrupted by intelligence services. Indeed, becoming a foreign fighter—particularly with today’s heavy use of social media—makes a terrorist far more likely to come to the attention of security services. The danger posed by returning foreign fighters is real, but American and European security services have tools that they can successfully deploy to mitigate the threat. These tools will have to be adapted to the new context in Syria and Iraq, but they will remain useful and effective. Key Policy Recommendations The model below shows how the various mitigating factors and effective policies can (though not necessarily will) lessen the danger presented by foreign fighters. Complex Model of Foreign Fighter Radicalization Complex Model of Foreign Fighter Radicalization Decide First is the decision stage. It makes sense to reduce the numbers of those going to the conflict zone in the first place by interfering in the decision to go. After all, those who do not go cannot be radicalized by foreign fighting. Western countries should push a counter-narrative that stresses the brutality of the conflict and the internecine violence among jihadists. However, in general, governments are poor at developing counter-narratives and lack community credibility. It is usually better to elevate existing voices of community leaders who already embrace the counternarrative than to try to handle this directly through government channels. Also vital is developing peaceful alternatives for helping the people affected by the conflicts in the Middle East. Some fighters—certainly not all but a significant portion—were originally motivated by a genuine desire to defend the Syrian people against the brutality of the Assad regime. Encouraging charitable activities, identifying legitimate channels for assistance, and otherwise highlighting what concerned individuals can do to help alleviate the suffering of the Syrian people may siphon off some of the supply of foreign fighters. Local programs for providing assistance can also improve domestic intelligence gathering capabilities in two ways, according to Western security service officials. First, simply being out and about in the community gives government officials more access to information about potential radicals. Families become comfortable with intelligence services, as do community leaders. Second, such programs allow intelligence officials to gain access to individuals who can potentially be recruited to inform on other would-be jihadists. Desired Results: • Talked out of joining the foreign militias by family or community intervention. • Choose peaceful alternative to fighting. Travel The second stage in the foreign fighter radicalization process is the travel to Syria. Disrupting the transit route via Turkey is one of the most promising ways of reducing the threat of foreign fighters to Europe and the United States. Doing so will primarily require better cooperation between Western governments and Turkish authorities, who have not always seen stopping the flow of fighters as their highest priority. But as Turkish authorities are now becoming more worried about the jihadist threat to Turkey, Western security services should establish channels with Turkish intelligence and police to warn them of the presence of specific individuals headed to Syria through Turkey and to encourage Turkey to turn them away from the Turkish border or stop them at the Syrian border and deport them. Though there are other ways into Syria, all are far harder and more costly for Western fighters. Security cooperation among European services and between European and American services is also essential. Intelligence collected from the communications of foreign fighters, shared open source monitoring, and other information from one service can prove vital for discovering transnational networks. Cooperation within Europe is indispensable for stopping travel as jihadists from one European country often try to travel to Turkey and then on to Syria via another European country in an effort to avoid detection. Desired Results: • Arrested en route. • Stopped at border and deported. Train and Fight In the third stage of the process, the foreign fighters receive training and fight in Syria or Iraq, mostly out of the reach of European or American influence. But even here, there are subtle ways of influencing the terrorist indoctrination process. Western security agencies should do everything they can to sow doubt in the minds of extremist leaders in Iraq and Syria about the true loyalties of Western Muslim volunteers. Highlighting information gained from recruits and even disinformation about the degree of infiltration by security services can heighten fears. If jihadist organizations come to view foreigners as potential spies or as corrupting influences, they might assign them to non-combat roles, test their allegiances by offering them the one-way ticket of suicide bombings, or even avoid recruiting them altogether. Desired Results: • Die in the combat zone. • Stay abroad and fight. • Become disillusioned with the struggle. Return Upon the foreign fighters’ return, the fourth stage, it is critical to turn them away from violence and jihad. Western services report that they usually know when individuals return and that many return with doubts. As a first step, security services must triage returnees, identifying which ones deserve the most attention: our interviews indicate triaging is done inconsistently (and in some cases not at all) among the Western security services. Inevitably, some dangerous individuals will be missed, and some individuals identified as not particularly dangerous might later become a threat, but a first look is vital for prioritization. Efforts to promote a counter-narrative are valuable, particularly if they involve parents, preachers and community leaders. Community programs deserve considerable attention. The goal should be to move potential terrorists towards non-violence; since many are in that category already, hounding them with the threat of arrest or otherwise creating a sense of alienation can backfire. In the past, family and community members have at times been successful in steering returned fighters toward a different path, even getting them to inform on their former comrades. Indeed, sending returnees to jail for relatively minor crimes such as going abroad to fight with a foreign terrorist organization against a distant enemy may simply put them in prison for a few years and expose them to the radicalizing elements present in many European prisons, where many minor players become exposed to hardened jihadists and integrate into broader networks. Desired Results: • Arrested and jailed. • De-radicalized and reintegrated. • No desire to attack at home. Plot To disrupt foreign fighters in the fifth and final stage of plotting terrorist attacks, security services must remain focused on the returnee problem and have sufficient resources to monitor the problem as it emerges in their countries. The good news is that going to Syria and Iraq and returning home usually does bring one to the attention the security services. But maintaining vigilance as the numbers increase will be difficult purely for reasons of resources. Marc Hecker, a French expert on terrorism, commented that France could handle the “dozens” who returned from Iraq but would be over-whelmed by the “hundreds” who may come back from Syria. Keeping track of that many suspects, is exceptionally resource intensive, particularly if it involves full-time surveillance. For intelligence services, often the problem is not in accessing or gathering the data, but in processing, analyzing, and following up on it in a timely manner. At the same time, their own effectiveness can work against them: by reducing the problem considerably, they decrease the danger, thereby creating the impression that they need fewer resources. One way to mitigate this effect is for security services to spread the burden of responsibility around by training and sharing information with local police and other law-enforcement and community organizations. Security cooperation among European services and between European and American services is absolutely necessary. Intelligence from the communications of foreign fighters, shared opensource monitoring, and other information obtained by one service can prove crucial for discovering transnational networks. As noted earlier, cooperation within Europe is critical for stopping travel, as jihadists from one European country often try to travel to Turkey and then on to Syria via another European country in order to avoid detection. Desired Results: • Attack foiled by law enforcement. • Attack fails due to lack of training or wrong skills. Conclusion The United States and Europe already have effective measures in place to greatly reduce the threat of terrorism from jihadist returnees and to limit the scale of any attacks that might occur. Those measures can and should be improved—and, more importantly, adequately resourced. But the standard of success cannot be perfection. If it is, then Western governments are doomed to fail, and, worse, doomed to an overreaction which will waste resources and cause dangerous policy mistakes. AT: Plan doesn’t solve foreign drones The plan helps shed light on other drone programs – aff is a critical first step Selinger and Kaag 2015 (Evan and John [Associate prof of philosophy @ U of Massachusetts Lowell]; Why domestic drones stir more debate than ones used in warfighting abroad; Mar 9; http://www.csmonitor.com/World/Passcode/Passcode-Voices/2015/0309/Why-domestic-drones-stirmore-debate-than-ones-used-in-warfighting-abroad kdf) Selinger: Do you think it’s wrong that we’re more concerned about domestic uses of drones than foreign ones? Kaag: Yes. This attitude reflects a disturbing mix of provincialism and exceptionalism that Americans should acknowledge and oppose. We need to come to grips with the “wars” that are being fought in our name and critically evaluate their justifications. And we need to put pressure on the media to continue to cover the stories that allow us to make this crucial evaluation. The asymmetry suggests a strange political and moral myopia. Yes, it’s true that domestic drone surveillance might erode civil liberties, and degrade the political fabric of the United States. To some extent the American public knows this is the case and is invested in moving forward carefully. But it’s equally true in the case of an abuse of drones in the targeted killing program abroad. Drones keep boots off the ground and allow political leaders to execute military strikes without the fear of losing troops. This is mixed blessing. It also allows leaders to circumvent the traditional safeguards that protect against illegitimate military actions. The American public tends to become more interested in armed conflict – its execution and justification – when it faces the traditional sacrifices associated with war. I fear we’ve entered an era of continual warfare where the American public has little incentive to monitor the actions of its leaders. This means we risk losing our democratic hold on an important political issue, shifting power back to leaders who were, at least originally, supposed to be checked by the will of the people. The issue of moral myopia is a bit simpler. Just because it may be true, psychologically, that it’s easier to turn a blind eye to injustice far away, does not mean that it’s morally justified to do so. Many drone strikes are in fact legitimate. But certain signature strikes, I would argue, are not. And the American public should be aware of this difference. AT: Exigent circumstances bad The Supreme Court defines exigent circumstances San Pedro 2014 (Victoria [J.D. Candidate, Stetson University College of Law]; STUDENT WORK: DRONE LEGISLATION: KEEPING AN EYE ON LAW ENFORCEMENT'S LATEST SURVEILLANCE TECHNOLOGY; 43 Stetson L. Rev. 679; kdf) 4. Exigent Circumstances The Court also defined exceptions to the warrant requirement, n107 including the exigent circumstances exception. n108 [*694] Exigent circumstances have been described as "situations where ""real immediate and serious consequences" will "certainly occur" if a police officer postpones action to obtain a warrant.'" n109 Among the situations that the Court described as constituting an exigent circumstance was the instance of "hot pursuit," which occurs when police officers pursue a fleeing felon. n110 Additionally, the Court held that rendering emergency assistance constituted an exigent circumstance. n111 Additionally, in Wayne v. United States, n112 the United States Court of Appeals for the District of Columbia Circuit held that exigent circumstances existed when law enforcement entered "a burning home to rescue occupants or extinguish a fire, to prevent a shooting or to bring emergency aid to an injured person." Police are already trained, adaptation towards drones will be easy San Pedro 2014 (Victoria [J.D. Candidate, Stetson University College of Law]; STUDENT WORK: DRONE LEGISLATION: KEEPING AN EYE ON LAW ENFORCEMENT'S LATEST SURVEILLANCE TECHNOLOGY; 43 Stetson L. Rev. 679; kdf) [*718] Similar to language in currently proposed legislation, n279 exclusionary provisions should be incorporated into the enacted legislation. However, this Article suggests that the exclusionary provisions should be directly tied to Fourth Amendment exceptions that have been addressed by the Supreme Court. For example, instead of providing an exception for "emergency situations" n280 it would be best to use the "exigent circumstances" phraseology that has been previously defined by the Court. n281 This will provide an easy transition for law enforcement agencies that prepare their training and manuals according to existing jurisprudence. If police officers are already trained on what constitutes an "exigent circumstance," that knowledge can be applied to drone surveillance, rather than tasking law enforcement agencies with interpreting anew what constitutes "emergency situations." Time limits good Drones are unique in their ability to capture information, time limits are critical San Pedro 2014 (Victoria [J.D. Candidate, Stetson University College of Law]; STUDENT WORK: DRONE LEGISLATION: KEEPING AN EYE ON LAW ENFORCEMENT'S LATEST SURVEILLANCE TECHNOLOGY; 43 Stetson L. Rev. 679; kdf) E. Proposal for Future Legislation To address the legitimate concerns raised by drone surveillance, Congress should enact legislation that prescribes a time limit on the duration of surveillance. The appropriateness of the time limitation could be determined through a comparison to [*716] another form of surveillance that has been highly regulated by Congress - wiretapping. After the Supreme Court determined the constitutionality of wiretapping in Olmstead, n269 the Court then required law enforcement to obtain a valid warrant before conducting wiretap surveillance. n270 A year after Olmstead, Congress enacted legis-lation codifying the warrant requirement. n271 Along with the codification of the warrant requirement, Congress developed a comprehensive framework for regulating wiretap surveillance. n272 For example, wiretap legislation provides that a warrant must prescribe the duration of allowable surveillance. n273 However, the legislation also states that the surveillance may not extend for more than thirty days. n274 Continuing with the presumption that law enforcement will not seek to obtain a warrant before conducting drone surveillance, imposing a requirement similar to the wiretap requirement will prohibit law enforcement from conducting its surveillance for extended periods. A statutory, bright-line rule requiring a warrant for long-term drone sur-veillance - defining an acceptable period for such surveillance - removes law enforcement's discretion from the equation and ensures that law enforcement receives the proper guidance to determine situations requiring a warrant. Further, such rules limit law enforcement's ability to use drones to conduct long-term surveillance at the expense of an individual's privacy rights. Congress is best suited to determine what distinguishes long-term surveillance from short-term surveillance, as Fourth Amendment jurisprudence lacks a description of long-term sur-veillance. Moreover, the thirty-day period prescribed by the wiretap legislation n275 permits law enforcement to gain too much informa-tion about an individual's daily routine and lifestyle. As cautioned [*717] by the mosaic theory, visual surveillance over an extended period reveals far more about the individual than an isolated observa-tion. n276 While law enforcement can admittedly learn vast amounts of information by tapping one's telephone, n277 the amount and nature of information available from drone surveillance is distinguishable. For example, if a police officer were to conduct wiretap surveillance of John Doe's home to intercept information regarding a drug purchase, the officer would also be privy to Doe's conversations, including a call in which Doe's conversation with his partner turns extremely intimate. On the other hand, if the police officer were conducting surveillance with a drone, he may actually be able to view Doe engaging in intercourse with his partner. Drone use would allow the officer to view such intimate moments countless times during the course of the surveillance. For these reasons, wiretapping's thirty-day limitation period inadequately protects citizens from drone surveillance because of the nature and amount of information available through drone surveillance - a more serious infringement on privacy rights than intercepting telephone communications. Thus, the time limitation for drone surveillance should certainly be less than thirty days. Moreover, considering that previous jurisprudence concerning aerial surveillance discussed fly-over observations that were relatively short in duration, n278 using an hourly component to prescribe the time limitation would be beneficial. An hourly limit provides law enforcement with a brightline rule regarding the permissible scope of surveillance and also limits the impermissi-ble discovery of the patterns, habits, and preferences of an individual's life. To provide some flexibility to law enforcement, the time permitted should not be so limited as to prevent brief aerial observations such as those used in Ciraolo and Riley, but rather the time limitation should be directed at striking a balance between law enforcement's needs and society's expectations of privacy. Thus, the legislation should define long-term sur-veillance as a surveillance lasting longer than twenty-four hours. AT: Warrants PIC 2AC Permutation do the plan and counterplanThe exigent circumstances plank of the plan takes out the link Yang 2014 (Y. Douglas [JD Boston U]; BIG BROTHER'S GROWN WINGS: THE DOMESTIC PROLIFERATION OF DRONE SURVEILLANCE AND THE LAW'S RESPONSE; 23 B.U. Pub. Int. L.J. 343; kdf) a. Rule 1: Warrantless Drone Use Rule 1 embodies the desire of both federal and state legislatures to exclude certain situations from the burden of a warrant requirement. n228 Common examples of non-law enforcement operations include, but are not limited to, land surveying, n229 weather and climate observation and scientific research, n230 wildlife management and protection, n231 and search and rescue missions. n232 In addition to Rule 1's exemption of non-law enforcement uses of drones, Rule 1 also exempts situations where a high risk of terrorist attack or imminent danger to life or property exists. This specific provision finds its inspiration in Virginia's [*377] warrant exception that allows drone use for responses to Amber Alerts, n233 Senior Alerts, n234 and search-and-rescue missions." n235 While the Fourth Amendment covers all government intrusions of privacy, government activity that does not involve criminal investigation tends to involve "a less hostile intrusion than the typical policeman's search for the fruits and instrumentalities of crime." n236 Moreover, drones can be a potent tool to assist in searching for missing persons and in police emergencies, much in the same way that police helicopters and aircraft currently provide aerial support, albeit at a much higher cost and with less flexibility. n237 Rule 1 reflects a desire by federal and state legislative proposals to exempt exigent circumstances from restrictions on drone use. n238 Thus, where a law enforcement agency believes that a particular area, event, or situation poses a high risk of attack by terrorists; or that there is an imminent and articulable threat to a specific person's life or property, substantial legal obstacles should not hamper that agency. Rule 1's first paragraph is a compromise measure that allows the government to promptly respond to urgent situations, while ensuring that the government, and particularly law enforcement agencies, adhere to the privacy protections of the Rule by demonstrating that probable cause of a high risk of terrorist attack existed or that an imminent danger to life or property existed at the time and general location of the drone's operation. n239 Drones will be used to perpetuate racism Cyril 2015 (Malkia Amala [under and executive director of the Center for Media Justice (CMJ) and cofounder of the Media Action Grassroots Network]; Black America's State of Surveillance; Mar 30; www.progressive.org/news/2015/03/188074/black-americas-state-surveillance; kdf) Today, media reporting on government surveillance is laser-focused on the revelations by Edward Snowden that millions of Americans were being spied on by the NSA. Yet my mother’s visit from the FBI reminds me that, from the slave pass system to laws that deputized white civilians as enforcers of Jim Crow, black people and other people of color have lived for centuries with surveillance practices aimed at maintaining a racial hierarchy. It’s time for journalists to tell a new story that does not start the clock when privileged classes learn they are targets of surveillance. We need to understand that data has historically been overused to repress dissidence, monitor perceived criminality, and perpetually maintain an impoverished underclass. In an era of big data, the Internet has increased the speed and secrecy of data collection. Thanks to new surveillance technologies, law enforcement agencies are now able to collect massive amounts of indiscriminate data. Yet legal protections and policies have not caught up to this technological advance. Concerned advocates see mass surveillance as the problem and protecting privacy as the goal. Targeted surveillance is an obvious answer—it may be discriminatory, but it helps protect the privacy perceived as an earned privilege of the inherently innocent. The trouble is, targeted surveillance frequently includes the indiscriminate collection of the private data of people targeted by race but not involved in any crime. For targeted communities, there is little to no expectation of privacy from government or corporate surveillance. Instead, we are watched, either as criminals or as consumers. We do not expect policies to protect us. Instead, we’ve birthed a complex and coded culture—from jazz to spoken dialects—in order to navigate a world in which spying, from AT&T and Walmart to public benefits programs and beat cops on the block, is as much a part of our built environment as the streets covered in our blood. In a recent address, New York City Police Commissioner Bill Bratton made it clear: “2015 will be one of the most significant years in the history of this organization. It will be the year of technology, in which we literally will give to every member of this department technology that would’ve been unheard of even a few years ago.” Predictive policing, also known as “Total Information Awareness,” is described as using advanced technological tools and data analysis to “preempt” crime. It utilizes trends, patterns, sequences, and affinities found in data to make determinations about when and where crimes will occur. This model is deceptive, however, because it presumes data inputs to be neutral. They aren’t. In a racially discriminatory criminal justice system, surveillance technologies reproduce injustice. Instead of reducing discrimination, predictive policing is a face of what author Michelle Alexander calls the “New Jim Crow”—a de facto system of separate and unequal application of laws, police practices, conviction rates, sentencing terms, and conditions of confinement that operate more as a system of social control by racial hierarchy than as crime prevention or punishment. In New York City, the predictive policing approach in use is “Broken Windows.” This approach to policing places an undue focus on quality of life crimes—like selling loose cigarettes, the kind of offense for which Eric Garner was choked to death. Without oversight, accountability, transparency, or rights, predictive policing is just high-tech racial profiling—indiscriminate data collection that drives discriminatory policing practices. As local law enforcement agencies increasingly adopt surveillance technologies, they use them in three primary ways: to listen in on specific conversations on and offline; to observe daily movements of individuals and groups; and to observe data trends. Police departments like Bratton’s aim to use sophisticated technologies to do all three. They will use technologies like license plate readers, which the Electronic Frontier Foundation found to be disproportionately used in communities of color and communities in the process of being gentrified. They will use facial recognition, biometric scanning software, which the FBI has now rolled out as a national system, to be adopted by local police departments for any criminal justice purpose. They intend to use body and dashboard cameras, which have been touted as an effective step toward accountability based on the results of one study, yet storage and archiving procedures, among many other issues, remain unclear. They will use Stingray cellphone interceptors. According to the ACLU, Stingray technology is an invasive cellphone surveillance device that mimics cellphone towers and sends out signals to trick cellphones in the area into transmitting their locations and identifying information. When used to track a suspect’s cellphone, they also gather information about the phones of countless bystanders who happen to be nearby. The same is true of domestic drones, which are in increasing use by U.S. law enforcement to conduct routine aerial surveillance. While drones are currently unarmed, drone manufacturers are considering arming these remote-controlled aircraft with weapons like rubber bullets, tasers, and tear gas. They will use fusion centers. Originally designed to increase interagency collaboration for the purposes of counterterrorism, these have instead become the local arm of the intelligence community. According to Electronic Frontier Foundation, there are currently seventy-eight on record. They are the clearinghouse for increasingly used “suspicious activity reports”—described as “official documentation of observed behavior reasonably indicative of preoperational planning related to terrorism or other criminal activity.” These reports and other collected data are often stored in massive databases like e-Verify and Prism. As anybody who’s ever dealt with gang databases knows, it’s almost impossible to get off a federal or state database, even when the data collected is incorrect or no longer true. Predictive policing doesn’t just lead to racial and religious profiling—it relies on it. Just as stop and frisk legitimized an initial, unwarranted contact between police and people of color, almost 90 percent of whom turn out to be innocent of any crime, suspicious activities reporting and the dragnet approach of fusion centers target communities of color. One review of such reports collected in Los Angeles shows approximately 75 percent were of people of color. This is the future of policing in America, and it should terrify you as much as it terrifies me. Unfortunately, it probably doesn’t, because my life is at far greater risk than the lives of white Americans, especially those reporting on the issue in the media or advocating in the halls of power. One of the most terrifying aspects of high-tech surveillance is the invisibility of those it disproportionately impacts. The NSA and FBI have engaged local law enforcement agencies and electronic surveillance technologies to spy on Muslims living in the United States. According to FBI training materials uncovered by Wired in 2011, the bureau taught agents to treat “mainstream” Muslims as supporters of terrorism, to view charitable donations by Muslims as “a funding mechanism for combat,” and to view Islam itself as a “Death Star” that must be destroyed if terrorism is to be contained. From New York City to Chicago and beyond, local law enforcement agencies have expanded unlawful and covert racial and religious profiling against Muslims not suspected of any crime. There is no national security reason to profile all Muslims. At the same time, almost 450,000 migrants are in detention facilities throughout the United States, including survivors of torture, asylum seekers, families with small children, and the elderly. Undocumented migrant communities enjoy few legal protections, and are therefore subject to brutal policing practices, including illegal surveillance practices. According to the Sentencing Project, of the more than 2 million people incarcerated in the United States, more than 60 percent are racial and ethnic minorities. But by far, the widest net is cast over black communities. Black people alone represent 40 percent of those incarcerated. More black men are incarcerated than were held in slavery in 1850, on the eve of the Civil War. Lest some misinterpret that statistic as evidence of greater criminality, a 2012 study confirms that black defendants are at least 30 percent more likely to be imprisoned than whites for the same crime. This is not a broken system, it is a system working perfectly as intended, to the detriment of all. The NSA could not have spied on millions of cellphones if it were not already spying on black people, Muslims, and migrants. As surveillance technologies are increasingly adopted and integrated by law enforcement agencies today, racial disparities are being made invisible by a media environment that has failed to tell the story of surveillance in the context of structural racism. That’s a unique reason to vote aff Barndt 91 (Joseph R. Barndt co-director of Ministry Working to Dismantle Racism "Dismantling Racism" p. 155) To study racism is to study walls. We have looked at barriers and fences, restraints and limitations, ghettos and prisons. The prison of racism confines us all, people of color and white people alike. It shackles the victimizer as well as the victim. The walls forcibly keep people of color and white people separate from each other; in our separate prisons we are all prevented from achieving the by poverty, subservience, and powerlessness are cruel, inhuman, and unjust; the effects of uncontrolled power, privilege, and greed, which are human potential God intends for us. The limitations imposed on people of color the marks of our white prison, will inevitably destroy us as well. But we have also seen that the walls of racism can be dismantled. We are not condemned to an inexorable fate, but are offered the vision and the possibility of freedom. Brick by brick, stone by stone, the prison of individual, institutional, and cultural racism can be destroyed. You and I are urgently called to join the efforts of those who know it is time to teardown, once and for all, the walls of racism. The danger point of self-destruction seems to be drawing even more near. The results of centuries of national and worldwide conquest and colonialism, of military buildups and violent aggression, of overconsumption and environmental destruction may be reaching a point of no return. A small and predominantly white minority of the global population derives its power and privilege from the sufferings of vast majority of peoples of all color. For the sake of the world and ourselves, we dare not allow it to continue. Warrants revitalizes the Separation of powers Reynolds 2014 (Glenn Harlan [prof of law @ U of Tennessee]; NSA spying undermines separation of powers: Column; www.usatoday.com/story/opinion/2014/02/10/nsa-spying-surveillance-congresscolumn/5340281/; kdf) Most of the worry about the National Security Agency's bulk interception of telephone calls, e-mail and the like has centered around threats to privacy. And, in fact, the evidence suggests that if you've got a particularly steamy phoneor Skype-sex session going on, it just might wind up being shared by voyeuristic NSA analysts. But most Americans figure, probably rightly, that the NSA isn't likely to be interested in their stuff. (Anyone who hacks my e-mail is automatically punished, by having to read it.) There is, however, a class of people who can't take that disinterest for granted: members of Congress and the judiciary. What they have to say is likely to be pretty interesting to anyone with a political ax to grind. And the ability of the executive branch to snoop on the phone calls of people in the other branches isn't just a threat to privacy, but a threat to the separation of powers and the Constitution. As the Framers conceived it, our system of government is divided into three branches -- the executive, legislative and judicial -- each of which is designed to serve as a check on the others. If the president gets out of control, Congress can defund his efforts, or impeach him, and the judiciary can declare his acts unconstitutional. If Congress passes unconstitutional laws, the president can veto them, or refuse to enforce them, and the judiciary, again, can declare them invalid. If the judiciary gets carried away, the president can appoint new judges, and Congress can change the laws, or even impeach. But if the federal government has broad domestic-spying powers, and if those are controlled by the executive branch without significant oversight, then the president has the power to snoop on political enemies, getting an advantage in countering their plans, and gathering material that can be used to blackmail or destroy them. With such power in the executive, the traditional role of the other branches as checks would be seriously undermined, and our system of government would veer toward what James Madison in The Federalist No. 47 called "the very definition of tyranny," that is, "the accumulation of all powers, legislative, executive, and judiciary, in the same hands." That such widespread spying power exists, of course, doesn't prove that it has actually been abused. But the temptation to make use of such a power for self-serving political ends is likely to be very great. And, given the secrecy surrounding such programs, outsiders might never know. In fact, given the compartmentalization that goes on in the intelligence world, almost everyone at the NSA might be acting properly, completely unaware that one small section is devoted to gather political intelligence. We can hope, of course, that such abuses would leak out, but they might not. Rather than counting on leakers to protect us, we need strong structural controls that don't depend on people being heroically honest or unusually immune to political temptation, two characteristics not in oversupply among our political class. That means that the government shouldn't be able to spy on Americans without a warrant — a warrant that comes from a different branch of government, and requires probable cause. The government should also have to keep a clear record of who was spied on, and why, and of exactly who had access to the information once it was gathered. We need the kind of extensive audit trails for access to information that, as the Edward Snowden experience clearly illustrates, don't currently exist. In addition, we need civil damages — with, perhaps, a waiver of governmental immunities — for abuse of power here. Perhaps we should have bounties for whistleblowers, too, to help encourage wrongdoing to be aired. Is this strong medicine? Yes. But widespread spying on Americans is a threat to constitutional government. That is a serious disease, one that demands the strongest of medicines. Strong separation of powers are essential for US global leadership Ikenberry 2001- Professor at Georgetown University (G. John, National Interest, Spring 2001, Lexis) America's mature political institutions organized around the rule of law have made it a relatively predictable and cooperative hegemon. The pluralistic and regularized way in which U.S. foreign and security policy is made reduces surprises and allows other states to build long-term, mutually beneficial relations. The governmental separation of powers creates a shared decision-making system that opens up the process and reduces the ability of any one leader to make abrupt or aggressive moves toward other states. An active press and competitive party First, system also provide a service to outside states by generating information about U.S. policy and determining its seriousness of purpose. The messiness of a democracy can, indeed, frustrate American diplomats and confuse foreign observers. But over the long term, democratic institutions produce more consistent and credible policies--policies that do not reflect the capricious and idiosyncratic whims of an autocrat. Think of the United States as a giant corporation that seeks foreign investors. It is more likely to attract investors if it can demonstrate that it operates according to accepted accounting and fiduciary principles. The rule of law and the institutions of policymaking in a democracy are the political equivalent of corporate transparency and accountability. Sharp shifts in policy must ultimately be vetted within the policy process and pass muster by an array of investigatory and decision-making bodies. Because it is a constitutional, rule-based democracy, outside states are more willing to work with the United States-or, to return to the corporate metaphor, to invest in ongoing partnerships. xt—Drones are racist The plan reverses racist trends Bernd 2015 (Candice; Proposed Rules Regulating Domestic Drone Use Lack Police Warrant Requirement; Feb 24; www.truth-out.org/news/item/29250-proposed-rules-regulating-domestic-droneuse-lack-police-warrant-requirement; kdf) "You're not just talking about the physical border, you're talking about an area that encompasses many major cities that have large minority populations, and the idea that these drones can be flown with little or no privacy protections really mean that, people, just by virtue of living in that region are somehow accepting that they have a right to less privacy," she said. African-American communities could well feel the disproportionate impacts of the integrated use of domestic drones and other surveillance in the coming years, as technologies such as StingRay are already being used mostly in the ongoing war on drugs to track those suspected of selling and buying drugs. The drug war has long negatively impacted communities of color, based on racialized drug policies and racial discrimination by law enforcement; two-thirds of all those convicted of drug crimes are people of color, despite similar rates of drug use among whites and people of color. These already-existing racial disparities in intrusive policing tactics and deployment of surveillance technologies are one of the primary reasons civil liberties experts are saying the government often gets it backward when thinking about privacy issues: deploying intrusive technologies first, and coming up with privacy policies governing their use afterward (when they may already be violating many people's civil rights). "What we see with StingRays is the same phenomenon that we're seeing with [UAS], where federal agencies are using them," Guliani said. "State and local agencies are using them. There's federal dollars that are going to buy them, and we're kind of having the privacy debate after the fact with very little information." AT: Utilitarianism The aff provides the best method for comparing the counterplan and case Rothfuss 2014 (Ian F [George Mason School of Law]; Student Comment: An Economic Perspective on the Privacy Implications of Domestic Drone Surveillance; 10 J.L. Econ. & Pol'y 441; kdf) B. Economic Analysis of Drone Surveillance Song's general economic model of surveillance may be applied to analyze domestic drone surveillance. Drones provide a very effective means to accomplish widespread, general, persistent surveillance. The optimal amount of drone surveillance will occur where the marginal social benefit of surveillance equals or exceeds the marginal social cost or disutility of the surveillance. n143 Therefore, the costs and benefits resulting from drone surveillance must be identified and analyzed. As a result of the availability of efficient widespread surveillance, increased domestic drone surveillance will generate utility in the form of increased security from crime and terrorism. Drones may remain airborne for long periods of time without onboard pilots and are very efficient at providing persistent, widespread surveillance. As a result, the societal utility and disutility caused by the drone surveillance may be compounded. The socially optimal amount of surveillance may increase because drones have the ability to significantly reduce the cost of widespread surveillance. n144 The benefit of this increased security will come at the cost of individual privacy. Given the widespread and pervasive nature of potential domestic drone surveillance, the marginal cost of uncontrolled drone surveillance will likely exceed the marginal benefit of the surveillance. Therefore, such widespread surveillance will be unproductive and inefficient for society. [*457] The law must strive to allow the optimal amount of drone surveillance. If drone surveillance is restricted too much, allowing less than the optimal level, then society will not realize the full benefit that the surveillance can provide in the form of prevention, deterrence, and security. n145 At the same time, if the limits are not strong enough, too much drone surveillance will lead to significant disutility resulting from the loss of privacy. Therefore, the law should be structured to allow drone surveillance up to the point where the social benefit of the surveillance exceeds or equals the marginal social cost or disutility. Following the insights gained from Song's economic model of surveillance, legal rules may be developed to efficiently implement domestic drone surveillance while minimizing disutility and social costs of avoidance. The government should be required to justify the use of domestic drone surveillance to ensure that it is deployed in a manner that benefits society. Drones should only be used when the government is able to satisfy the required levels of scrutiny described in Song's model. n146 Doing so will ensure that the societal benefits to be gained from drone surveillance will outweigh the privacy disutility and social costs that may result from the loss of privacy. The next section will apply this conclusion to analyze the current legislative and policy recommendations for drone surveillance to determine the optimal course of action. AT: Economy DA 2AC Their link is just industry hype – plan wont hurt the economy Bernd 2013 (Candice [assistant editor/reporter with Truthout]; The Coming Domestic Drone Wars; Sep 19; www.truth-out.org/news/item/18951-the-coming-domestic-drone-wars#; kdf) States Push to Regulate Domestic Drones as Industry Pushes Back The Texas law is just one of many pieces of legislation placing restrictions on the use of domestic drones to be introduced in 43 states this year, passing in eight. Many of these state-level bills seek to require search warrants for surveillance drones used by local police departments, and at least six states have required warrants. In 2013, Virginia put in place a two-year moratorium on the use of drones by law enforcement to develop more stringent guidelines. Legislation restricting civilian drone use has passed in states such as Florida, Tennessee, Idaho, Montana and Oregon, but other states such as North Dakota have tried to pass laws that would ban weapons from domestic drones and have failed. But the industry is pushing back against privacy restrictions and regulations on civilian drones, saying the restrictions will hinder job creation. In Maine, Gov. Paul LePage backed up the claim by vetoing a bill that would have required police to obtain a warrant before deploying a drone, citing concerns it would kill new aerospace jobs. "We don't support rewriting existing search warrant requirements under the guise of privacy," Mario Mairena told the AP. Mairena is a government relations manager for the Virginia-based Association for Unmanned Vehicle Systems International (AUVSI), an industry group. The group's website boasts hundreds of corporate members, many of which are defense contractors. The group also has ties to the Unmanned Systems Caucus in Congress. Whether or not requiring a warrant in law enforcement drone operations would kill jobs remains to be seen, but the integration of civilian drones into the NAS would create a considerable economic impact, to be sure. An AUVSI report estimates that that the integration of unmanned systems in the U.S. will generate more than $13.6 billion and create 74,000 jobs within the first three years. But strong regulations of domestic drones in the states may prove especially important depending on what guidelines the FAA puts in place to integrate the technology into the national airspace by 2015, as some experts fear the susceptibility to co-option of unmanned systems by third-party operators could pose serious risks to domestic security. Surveillance guts competitiveness Stiennon 2013 (Richard; NSA Surveillance Threatens US Competitiveness; Jun 7; www.forbes.com/sites/richardstiennon/2013/06/07/nsa-surveillance-threatens-us-competitiveness/; kdf) The vast foreign and domestic spying by the NSA revealed this week threatens the global competitiveness of US tech companies. We are told we live in a digital world and the future is bright for tech startups as costs of launching new products and services plummet and global markets open up to the smallest vendor. Yet, there is a world wide perception that any data that is stored or even routed through the United States is sucked into cavernous NSA data centers for analysis and cataloging. That perception was solidified in 2006 when former AT&T technician Mark Klein blew the whistle on the fiber tap that ATT had provided to the NSA in some of its data centers. Those perceptions have had real consequences for US tech firms seeking to offer global services. Email archiving services such as ProofPoint could not sell to even Canadian customers without building local infrastructure. Even establishing separate data centers in Canada and Europe is not enough to assure customers that their data would forever stay out of the grasp of US intelligence services. One of the fastest growing segments of the tech industry is cloud services, with Salesforce.com one of the leading examples. Box.net, and other cloud storage solutions, are burgeoning. Cloud infrastructure providers like Amazon, Microsoft, and Rackspace are investing billions to serve markets that should be global but will be barred from most countries thanks to the complete abandonment of trust caused by NSA/FBI spying. Since 2006, every time I present outside the US the same question has been asked: “Is the US reading our email?” Answers that allude to ‘protections from abuse’ and ‘oversight’ now seem specious. From this week forward a universal suspicion has transformed into acknowledged fact. Yes, US government agencies are reading email, tracking phone calls, and monitoring all communications. Brian Honan Board Member of the UK & Ireland Chapter of the Cloud Security Alliance provided this opinion: The revelations about the PRISM program could have major implications for US companies doing business within the European Union. Under the EU Data Protection directive it is illegal for European companies to export the personal data of EU citizens to countries outside of the EU and the European Economic Area. Exceptions to this are for certain countries that have similar privacy legislation in place to that of the EU or where the strong contracts protecting the privacy of that data are in place. The US in not one of the approved countries but has put in place the EU Safe Harbor program which US companies can sign up to and agree to apply EU privacy protections to private data. Many of the companies allegedly involved in PRISM are part of the Safe Harbor program. The fact the US government is potentially accessing that data could place the European organisations in breach of EU Data Protection regulations. The news will also heighten concerns many European organisations, especially EU government ones, will have in selecting a US Cloud Provider for their services. Gabriel Yoran, Managing Director and Founder of German security company Steganos added: “The European Union traditionally favors strong privacy regulations. However, this policy has been under attack recently, being seen as a competitive disadvantage in the cloud services space. This could dramatically change now in the light of the recent Verizon findings. Privacy software maker Steganos traditionally stresses it being headquartered in Berlin and therefore subject to the even stricter German data protection law (one of the strictest in the world). According to a February survey, 64% of Steganos customers said it was important or very important to them that Steganos is a Germany-based company.” Trust is the very foundation of all commerce. Once lost it is almost impossible to regain. This week’s revelations that the NSA has blanket data harvesting arrangements with Verizon, ATT, Sprint-Nextel, Google, Microsoft, Apple, Skype, Yahoo, FaceBook and even credit card processors, will have immediate repercussions. Non-US customers of any US business will immediately evaluate their exposure to these new risks and look for alternatives. European, Canadian, and Australian tech companies will profit from this. Competitors in those regions will offer alternatives that will also draw US customers away from the compromised US services. While the FBI and NSA leverage the dramatic intelligence opportunities of a digital world, their Orwellian actions are crushing opportunity for tech giants and startups in the United States. US risks stalling now, especially in high tech services—prevents sustainable growth Muro, et al, February 15 [Mark Muro, a senior fellow and director of policy for the Metropolitan Policy Program, manages the program's economic work and key policy projects. Jonathan Rothwell, February 2015, “Advanced Industries Drive Broad-Based Growth and Prosperity New Brookings report analyzes U.S. advanced industries sector”, http://www.brookings.edu/research/reports2/2015/02/03advanced-industries#/M10420] The need for economic renewal in the U S remains urgent new technologies ranging from robotics and “3-D printing” to digitization provoking genuine excitement nited frustrated. At the same time, astonishing — tates . Years of disappointing job growth and stagnant incomes for the majority of workers have left the nation shaken and advanced the “ of everything”— are even as they make it hard to see where things are going. Hence this paper: At a critical moment, this report asserts the special importance to America’s future of what the paper calls America’s “advanced industries” sector. Characterized by its deep involvement with technology research and development (R&D) and STEM (science, technology, engineering, and math) workers, the sect or encompasses 50 industries ranging from manufacturing industries such as automaking and aerospace high-tech services Their dynamism is going to be a central component of any future revitalized U.S. economy. these industries encompass the country’s best shot at supporting innovative and sustainable growth. Advanced industries represent a sizable economic anchor for the U.S. economy and have led the post-recession employment recovery. the sector packs a massive economic punch. to energy industries such as oil and gas extraction to such as computer software and computer system design, including for health applications. These industries encompass the nation’s “tech” sector at its broadest and most consequential. As such, , inclusive, For that reason, this report provides a wide-angle overview of the advanced industry sector that reviews its role in American prosperity, assesses key trends, and maps its metropolitan and global competitive standing before outlining high-level strategies to enhance that.The overview finds that: 1. Modest in size, As an employer and source of economic activity the advanced industry sector plays a major role in the U.S. economy. As of 2013, the nation’s 50 advanced industries (see nearby box for selection criteria) employed 12.3 million U.S. workers. That amounts to about 9 percent of total U.S. employment. And yet, U.S. advanced industries produce $2.7 trillion in value added annually 17 percent of all GDP That is more than any other sector the sector employs 80 percent of the nation’s engineers; performs 90 percent of private-sector R&D; generates approximately 85 percent of all U.S. patents; and accounts for 60 percent of U.S. exports. Advanced industries also support unusually extensive supply chains and other forms of ancillary economic activity. even with this modest employment base, gross domestic product ( ). — U.S. , including healthcare, finance, or real estate. At the same time, On a per worker basis, advanced industries purchase $236,000 in goods and services from other businesses annually, compared with $67,000 in purchasing by other industries. This spending sustains and creates more jobs. In fact, 2.2 jobs are created domestically for every new advanced industry job—0.8 locally and 1.4 outside of the region. This means that in addition to the 12.3 million workers employed by advanced industries, another 27.1 million U.S. workers owe their jobs to economic activity supported by advanced industries. Directly and indirectly, then, the sector supports almost 39 million jobs—nearly one-fourth of all U.S. employment. In terms of the sector’s growth and change, the total number of jobs in the sector has remained mostly flat since 1980 but its output has soared. From 1980 to 2013 advanced industries expanded at a rate of 5.4 percent annually—30 percent faster than the economy as a whole. Since the Great Recession, moreover, both employment and output have risen dramatically. The sector has added nearly one million jobs since 2010, with employment and output growth rates 1.9 and 2.3 times higher, respectively, than in the rest of the economy. Advanced services led this post-recession surge, and created 65 percent of the new jobs. Computer systems design alone generated 250,000 new jobs. Certain advanced manufacturing industries—especially those involved in transportation equipment—have also added thousands of jobs after decades of losses. Advanced industries also provide extremely high-quality economic opportunities for workers. Workers in advanced industries are extraordinarily productive and generate some $210,000 in annual value added per worker compared with $101,000, on average, outside advanced industries. Because of this, advanced industries compensate their workers handsomely and, in contrast to the rest of the economy, wages are rising sharply. In 2013, the average advanced industries worker earned $90,000 in total compensation, nearly twice as much as the average worker outside of the sector. Over time, absolute earnings in advanced industries grew by 63 percent from 1975 to 2013, after adjusting for inflation. This compares with 17 percent gains outside the sector. Even workers with lower levels of education can earn salaries in advanced industries that far exceed their peers in other industries. In this regard, the sector is in fact accessible: More than half of the sector’s workers possess less than a bachelor’s degree. 2. The advanced industries sector is highly metropolitan and varies considerably in its composition and depth across regions. Advanced industries are present in nearly every U.S. region, but the sector’s geography is uneven. Advanced industries tend to cluster in large metropolitan areas. Looking across the country, the 100 largest metro areas contain 70 percent of all U.S. advanced industries jobs. In terms of the sector’s local clustering, San Jose is the nation’s leading advanced industry hub with 30.0 percent of its workforce employed in the sector. Seattle follows with 16.0 percent of its local jobs in advanced industries. Wichita (15.5 percent); Detroit (14.8 percent), and San Francisco (14.0 percent) follow. Overall, advanced industries account for more than one in 10 jobs in nearly one-quarter of the country’s major metro areas. This clustering occurs in a variety of configurations. Some metropolitan areas—such as Grand Rapids, MI; Portland, OR; and Wichita—focus heavily on advanced manufacturing pursuits such as automotive, semiconductor, or aerospace manufacturing, respectively, while metros like Bakersfield and Oklahoma City exhibit strong energy specializations. By contrast, services such as computer systems design, software, and research and development predominate in metropolitan areas like Boston, San Francisco, and Washington. For their part, San Jose, Detroit, and Seattle exhibit depth and balance across multiple advanced industry categories. Overall, the number of extremely dense concentrations of advanced industry actually has declined. In 1980, 59 of the country’s 100 largest metropolitan areas had at least 10 percent of their workforce in advanced industries. By 2013, only 23 major metro areas contained such sizable concentrations. 3. The U S is losing ground to other countries on advanced industry competitiveness nited tates . The United States has the most productive advanced industries in the world, behind only energy-intensive Norway. However, this declining concentration competitiveness appears to be eroding. The nation’s in advanced industries and its negative trade balance in the sector employment and output as a share of the measures now lags world leaders. do not bode well Since 2000, the sector’s total U.S. . economy has shrunk The nation’s standing on these . Equally worrisome is the balance of trade in the sector. Although advanced industries export $1.1 trillion worth of goods and services each year and account for roughly 60 percent of total U.S. exports, the United States ran a $632 billion trade deficit in the sector in 2012, in line with similar yearly balances since 1999. To be sure, a handful of individual advanced industries such as royalties and other intellectual property and aerospace manufacturing enjoy trade surpluses that exceeded $60 billion and $80 billion in 2012. However, numerous areas of historical strength such as communications equipment, computer equipment, motor vehicles, and pharmaceuticals now run sizeable deficits, as do high-value R&D services and computer and information services. Notwithstanding the nation’s strong innovation enterprise the U S advantage on this front is slipping For certain the advanced industry sector remains the key site of U.S. technology gains. For example, the U.S. share of global R&D and patenting is falling America’s research dominance looks less impressive after adjusting for the size of its working age population nited tates’ . However, the United States is losing ground relative to other countries on measures of innovation performance and capacity. much faster than its share of global GDP and population, meaning that U.S. slippage cannot simply be attributed to demography or macroeconomic convergence. Likewise, . Turning to the nation’s critical regional innovation ecosystems, surprisingly few U.S. metropolitan areas rank among the world’s most innovative—as measured by patent cooperation treaty applications per capita. Among the nation’s most patent-intensive regions, just two—San Diego and the San Jose-San Francisco combined area—rank in the global top 20 and just two more (Boston and Rochester) score in the top 50. The US isn’t key to the global economy Kenny 2015 (Charles; Why the Developing World Won't Catch the U.S. Economy's Cold; May 4; www.bloomberg.com/news/articles/2015-05-04/why-the-developing-world-won-t-catch-the-u-seconomy-s-cold; kdf) Last week the U.S. Commerce Department announced that first-quarter GDP growth for 2015 was an anemic 0.2 percent. This immediately sparked fears that a U.S. slowdown could lead to a global recession. But the cliché about America sneezing and the rest of the world catching the cold doesn’t hold like it used to . The U.S. isn’t as contagious as it was, and developing countries in particular are far more robust to economic shocks. That’s good news for everyone. It means less volatility in Asia, Africa, and Latin America, which contributes to happier people, greater political stability, and stronger long-term growth—all of which should help lift the U.S. out of its own doldrums. A team of IMF researchers has looked at the long-term record of the world’s economies when it comes to growth and recession. They measured how long economies expanded without interruption, as well as the depth and length of downturns. Over the past two decades, low and middle-income economies have spent more time in expansions, while downturns and recoveries have become shallower and shorter. This suggests countries have become more resilient to shocks. In the 1970s and '80s, the median developing economy took more than 10 years after a downturn to recover to the GDP per capita it had prior to that slump. By the early 2000s, that recovery time had dropped to two years. In the 1970s and '80s, countries of the developing world spent more than a third of their time in downturns, but by the 2000s they spent 80 percent of their time in expansions. The first decade of the 21st century was the first time that developing economies saw more expansion and shorter downturns than did advanced economies: Median growth in the developing world was at its highest since 1950 and volatility at its lowest. Developing countries still face a larger risk of deeper recession when terms of trade turn against them, capital flows dry up, or advanced economies enter recessions themselves. But the scale of that risk has diminished. That’s because low and middle-income economies have introduced policy reforms that increase resilience: flexible exchange rates, inflation targeting, and lower debt. Economies with inflationtargeting regimes see recovery periods less than a third as long as economies without targeting, for example. Larger reserves are associated with longer expansions. And median reserves in developing countries more than doubled as a percentage of GDP between the 1990s and 2010. Median external debt has dropped from 60 percent to 35 percent of GDP over that same period. Such policy changes account for two-thirds of the increased recession-resilience of developing countries since the turn of the century, suggest the IMF researchers—leaving external factors, such as positive terms of trade, accounting for just one-third. That’s good news for the developing world—not least because volatile growth is particularly bad for poorer people, who are most at risk of falling into malnutrition or being forced to take children out of school, which has long-term consequences for future earnings. That might help explain the relationship between growth volatility, slower reductions in poverty, and rising inequality. Sudden negative income shocks can also be a factor in sparking violence: When rains fail, the risk of civil war in Africa spikes, and when coffee prices in Colombia fall, municipalities cultivating more coffee see increased drug-related conflict. The African analysis suggests that a five percentage-point drop in income growth is associated with a 10 percent increase in the risk of civil conflict in the following year. Finally, because volatility increases the uncertainty attached to investments, it can also be a drag on overall long-term economic performance. Viktoria Hnatkovska and Norman Loayza of the World Bank estimated that moving from a comparatively stable to a relatively volatile growth trajectory is associated with a drop in average annual growth of as much as 2 percent of GDP. Lower volatility in the developing world and its associated long-term growth performance is also good news for the U.S. A strong global economy is still a positive force for growth in every country, including developed nations. And with the developing world accounting for about one-third of trade and GDP at market rates, as well as three-fifths of U.S. exports, its role in supporting American economic performance has never been greater. Those hoping for a recovery in U.S. output should be grateful for stronger economic immune systems in the rest of the world. 1AR – Link Turn Extension Domestic surveillance causes massive offshoring—undermines the economy Miller 2014 (Hugo; NSA Spying Sends Data Clients North of the Border; Jan 9; www.bloomberg.com/news/articles/2014-01-09/nsa-spying-sends-data-clients-north-of-the-border; kdf) In the British Columbia town of Kamloops, arid as a desert with cool summer nights, Telus Corp. only has to turn on the air conditioning about 40 hours a year to keep its computer servers from overheating. The chilly temperatures are part of Canadian companies’ sales pitch to businesses looking for places to store their growing troves of digital information as cheaply as possible. They also boast of inexpensive hydroelectric power and low seismic activity. And now they’re touting what they say is a new advantage: less snooping. Revelations that the U.S. National Security Agency has spied on data networks run by American companies have given Canadian data-center operators an opportunity. They’re telling customers from Europe and Asia that laws north of the border are more protective of privacy. Sales of storage services in Canada are growing 20 percent a year at Telus and Rogers Communications Inc. U.S.-based technology companies, meanwhile, complain that the NSA scandal has hurt their business. “There is a structural advantage in Canada in that the data is here and the privacy protection is more stringent,” said Lloyd Switzer, who runs Telus’s network of data centers. The company has 10 data centers in Quebec, Ontario, Alberta and British Columbia, where it opened a C$75 million, 215,000-square-foot (20,000square-meter) facility in Kamloops last year. That site has room for six more modules of expansion, which would increase the investment into the hundreds of millions of dollars. -- AT: Canada Good Canada doesn’t solve the aff Miller 2014 (Hugo; NSA Spying Sends Data Clients North of the Border; Jan 9; www.bloomberg.com/news/articles/2014-01-09/nsa-spying-sends-data-clients-north-of-the-border; kdf) Snowden’s Revelation Data privacy came under scrutiny in the U.S. in June after former NSA contractor Edward Snowden revealed that his employer was monitoring phone and e-mail traffic emanating from the U.S. International outrage over NSA surveillance may cost U.S. companies as much as $35 billion in lost revenue through 2016, according to the Information Technology & Innovation Foundation, a policy research group in Washington whose board includes representatives of companies such as International Business Machines Corp. and Intel Corp. Rogers, which competes with Telus for phone and Internet customers, gets about C$70 million ($66 million) in annual revenue from data storage -- still tiny at less than 1 percent of total sales. The unit has had more inquiries in the past 12 months from companies outside North America than in the entire previous decade, A.J. Byers, who heads up the business, said in an interview. Overseas Demand “A lot of international companies trying to gain access to the U.S. used to go directly to the U.S.,” Byers said. “Now we see a lot of European and Asian companies talking to us.” Rogers and Telus are looking to capitalize on the surge in demand for data storage to make up for the slowing growth of smartphones, which more than half of Canadians already have. Stock gains for the companies also have slowed. Shares of Rogers climbed 6 percent last year after gaining 15 percent in 2012. Telus rose 12 percent last year, its smallest annual increase in four years. Last month, a U.S. federal judge ruled that the NSA probably acted illegally in collecting telephone-call data, allowing a lawsuit to go forward claiming the practice violates the U.S. Constitution. U.S. District Judge William H. Pauley III in Manhattan late last month ruled the NSA’s bulk collection of phone records is legal, challenging the earlier ruling. The NSA has said it’s pleased with Pauley’s decision. Facing Charges Snowden has been charged with theft and espionage by the U.S. government and has avoided arrest by remaining in Russia. While editorials in newspapers such as the New York Times have recommended that he get clemency, Janet Napolitano, the former head of the Department of Homeland Security, has said he doesn’t deserve a reprieve. Canada’s Privacy Act, enacted in 1983, imposes obligations on 250 federal-government departments and agencies to limit collection and use of personal information, and gives citizens the right to access that data and correct mistakes. Still, the data-center sales pitch glosses over the long history of intelligence-sharing between Canada and the U.S. The governments have collaborated as far back as the 1940s, said Ron Deibert, an Internet-security expert who runs the University of Toronto’s Citizen Lab. “Anyone who would look to Canada as a safe haven would be fooling themselves,” Deibert said in a phone interview. “Canada would be one of the poorest choices as we have a long-standing relationship with the NSA.” Surveillance Allowed Communications Security Establishment, the country’s intelligence agency for communications and electronics, is forbidden from monitoring purely domestic traffic. Surveillance of foreign communications that involve someone in Canada may be authorized, as long as one of the parties is outside the country -- a rule established after the Sept. 11 terrorist attacks. CSE works with its Five Eyes information-gathering partners -- the U.S., U.K., Australia and New Zealand -- and must comply with Canadian law in its interactions with them, Andrew McLaughlin, a spokesman for the agency, said by e-mail. A CSE commissioner, typically a retired judge, submits an annual report to Canada’s Parliament through the defense ministry. Justice Robert Decary, who did the last such report in June, wrote that he was “deeply disappointed” that legislative amendments to Canada’s National Defense Act proposed by his predecessors that “would improve the provisions that were hastily enacted in the aftermath of September 2001” haven’t yet been adopted. 1AR—No Impact The global economy determines the US economy, not vice versa Rasmus 2015 (Jack; US Economy Collapses Again; May 14; www.counterpunch.org/2015/05/14/useconomy-collapses-again/; kdf) The problem of weak, stop-go, recovery in the U.S. today is further exacerbated by a global economy that continues to slow even more rapidly and, in case after case, slip increasingly into recessions or stagnate at best. Signs of weakness and stress in the global economy are everywhere and growing. Despite massive money injections by its central bank in 2013, and again in 2014, Japan’s economy has fallen in 2015, a fourth time, into recession. After having experienced two recessions since 2009, Europe’s economy is also trending toward stagnation once more after it too, like Japan, just introduced a US$60 billion a month central bank money injection this past winter. Despite daily hype in the business press, unemployment in the Eurozone is still officially at 11.4 percent, and in countries like Spain and Greece, still at 24 percent. Yet we hear Spain is now the ‘poster-boy’ of the Eurozone, having returned to robust growth. Growth for whom? Certainly not the 24 percent still jobless, a rate that hasn’t changed in years. Euro businesses in Spain are doing better, having imposed severe ‘labor market reforms’ on workers there, in order to drive down wages to help reduce costs and boost Spanish exports. Meanwhile, Italy remains the economic black sheep of the Eurozone, still in recession for years now, while France officially records no growth, but is likely in recession as well. Elites in both Italy and France hope to copy Spain’s ‘labor market reforms’ (read: cut wages, pensions, and make it easier to layoff full time workers). In order to boost its growth, Italy is considering, or may have already decided, to redefine its way to growth by including the services of prostitutes and drug dealers as part of its GDP. Were the USA to do the same redefinition, it would no doubt mean a record boost to GDP. Across the Eurozone, the greater economy of its 18 countries still hasn’t reached levels it had in 2007, before the onset of the last recession. Unlike the U.S.’s ‘stop-go’, Europe has been ‘stop-gostop’. AT: Terrorism DA -Look in the aff portion of the terror DA for more work 2AC – No Link Drones are inefficient mechanism to solve terrorism Rothfuss 2014 (Ian F [George Mason School of Law]; Student Comment: An Economic Perspective on the Privacy Implications of Domestic Drone Surveillance; 10 J.L. Econ. & Pol'y 441; kdf) Conclusion U.S. citizens want to be safe from terrorist attacks and other threats, but not at the expense of their privacy rights. Therefore, a delicate balance must be achieved between privacy and security interests. Drones represent a surveillance technology advancement that threatens to dramatically alter the balance between these interests. As discussed in this comment, the current legal framework does not adequately protect privacy from the widespread surveillance that will likely result from the unrestricted domestic use of drones. Therefore, prompt legislative action is necessary to address the fundamental privacy challenges presented by the use of drones. Such legislation should allow for constructive use of drones within a framework that contains restrictions to protect individual privacy rights. While widespread general surveillance could make the nation safer from crime and terrorism, such extensive surveillance will ultimately be inefficient. The surveillance that could result from the domestic use of drones would detract from individual privacy and cause individuals to reduce productive activities and invest in countermeasures. Such "privacy disutility" will outweigh the societal benefits unless domestic drone surveillance is restricted. Therefore, [*462] without legislative action we may soon live in a world where "every time we walk out of our front door we have to look up and wonder whether some invisible eye in the sky is monitoring us." n175 2AC – Cyber War turn Federal regulation of drones is necessary to build safeguards against cyber war Bernd 2013 (Candice [assistant editor/reporter with Truthout]; The Coming Domestic Drone Wars; Sep 19; www.truth-out.org/news/item/18951-the-coming-domestic-drone-wars#; kdf) Domestic Drone Weaknesses Cyber warfare may prove to be the most enduring challenge for the FAA when it comes to ensuring guidelines that will protect Americans adequately as drone technology makes its transition into civilian life. Peter Singer is the director of the Center for 21st Century Security and Intelligence and a senior fellow in the Foreign Policy program at Brookings Institute. He is the author of Wired for War: The Robotics Revolution and Conflict in the 21st Century. According to him, the primary weakness of drone technology is many systems' dependence on GPS signals and remote operation. Even military-grade drone technology can be co-opted, he said. In December 2011, the Iranian Army's electronic warfare unit brought down an American drone, the RQ-170 Sentinel, after it crossed into Iranian airspace. In Iraq in 2009, Iraqi insurgents were able to use $26 software to intercept the video feeds of US Predator drones in a manner "akin to a criminal listening in on the police radio scanner," Singer told Truthout. Most recently, a research team at the University of Texas was able to demonstrate successfully the spoofing of a UAV by creating false civil GPS signals that trick the drone's GPS receiver. "There aren't easy answers to these other than good encryption requirements," Singer told Truthout in an email. The Texas research team hoped to demonstrate the dangers of spoofing early on in the FAA's task to write the mandated rules for UAS integration in the national airspace, and the Department of Homeland Security invited the team to demonstrate the spoofing in New Mexico. "Vulnerability to jamming and spoofing depends highly on the design of the aircraft and control systems and vary across differing architectures. Minimum system performance and design standards developed for civil UAS designs will address these vulnerabilities," an FAA spokesman told Truthout. Whether minimum standards for system performance will be enough to address the changing dynamic of cyber warfare, and for that matter, technology, remains a question, but it's something the FAA and Homeland Security are examining as drone technology becomes more widespread in the US. It’s the most probable existential threat Paikowsky and Baram 2015 (Deganit [post-doctoral fellow at the Davis Institute for International Relations at Hebrew University in Jerusalem and a senior researcher at the Yuval Nee’man Workshop for Science, Technology, and Security at Tel-Aviv University, also a research associate at the Space Policy Institute at George Washington University and a consultant to the space committee of Israel’s National Council for Research and Development] and Gil [Ph.D. candidate in the department of political science at Tel-Aviv University, and a researcher at the Yuval Nee’man workshop for Science, Technology, and Security at Tel-Aviv University]; Space Wars; Jan 7; www.foreignaffairs.com/articles/142690/deganit-paikowsky-and-gilbaram/space-wars?cid=rss-rss_xml-space_wars-000000; kdf) In September 2014, hackers from China broke into the U.S. National Oceanic and Atmospheric Administration (NOAA) network in an attempt to disrupt data related to disaster planning, aviation, and much more coming from U.S. satellites. This breach was the latest in a series of cyberattacks on space systems, exposing the Achilles’ heel of such technology: the vulnerability of its computers and the information it creates and transmits. Cyberattacks, which are on the rise in every industry, pose particularly significant threats to space systems as they are used so ubiquitously in corporate and military operations, making them increasingly attractive targets for hackers. Although only about a dozen countries have the capability to launch a satellite into space , billions of people around the world rely on space systems for nearly every aspect of modern life. Satellites are used to support phones, the Internet, and banking systems. They are also used to monitor land, air, and maritime traffic; facilitate global communications; transmit mass media in real time; monitor the earth for climate change or severe weather threats and natural disasters; gather intelligence; and send early warnings of incoming ballistic missiles. It is no wonder, then, that the global economy depends on communication satellites, navigation systems, and earth-observation satellites. The backbone of all these services consists of 1,200 operational satellites currently orbiting the earth, which have the potential to cause significant tangible damage by attacking national or global space systems across countries and continents. Even a small glitch can wreak havoc. For example, in April 2014, the Glonass System, the Russian equivalent of the American-designed GPS, malfunctioned due to two small mathematical mistakes in the software. Significantly, fixing the system took more than 13 hours, and the half-day breakdown led to severe disruption of Glonass receivers, which affected iPhone5 users. While the disruption was not caused by ambitious hackers, it is easy to see why space systems are the brass ring of cybercrimes: They are low effort and high return. Therefore, a relatively simple hack can inflict considerable damage. It is easy to see why space systems are the brass ring of cybercrimes: They are low effort and high return. Therefore, a relatively simple hack can inflict considerable damage. EASY PREY Although a space system is composed of three connected segments—satellites and spacecraft that orbit the earth, ground stations, and the communication systems that link the two—cybercriminals only need to find the vulnerabilities in one of these segments. For example, for a few hundred dollars, a hacker can buy a small jamming device on the Internet to interfere with satellite signals. “We have to make it (satellite navigation systems) more robust,” warned Colonel Bradford Parkinson, who led the creation of the GPS. “Our cellphone towers are timed with GPS. If they lose that time, they lose sync and pretty soon they don’t operate. Our power grid is synchronized with GPS [and] so is our banking system.” Space systems have become the target of hacking. In July of last year, the United States identified a 28-year-old British citizen who hacked a number of government networks, including NASA. He attempted to grab highly sensitive data and claimed he would “do some hilarious stuff with it.” Four months later, in November 2013, viruses infected the computers used by the International Space Station. Japan’s space agency also discovered a computer virus inside a few of its computers in January 2012 and Germany’s space center recently suffered an espionage attack, with several of its computers getting hit with spyware. Since 2009, the BBC has complained of disruptions to its Persian-language radio and television programs and has accused Tehran of interfering with international satellite broadcasts beamed into Iran. Only after the EU made a diplomatic complaint to pressure Iran to cease and desist did the attacks stop. When North Korea jammed South Korea’s GPS signals in May 2012, it affected the navigation of over 250 flights. The list goes on. One of the reasons space systems, especially commercial ones, are such easy prey is that they often operate with outdated software. Developing a space system is generally a long process that, depending on the complexity of the system, takes several years to complete. And once the system is operational, it is expected to last for at least several years—sometimes even more than a decade. This process makes it difficult to update the system’s security software. Moreover, in many cases, the information systems that are being used to manage space systems are mostly based on commercial “off-the-shelf” products, with known vulnerabilities and low levels of protection, especially compared to supposedly better-protected military systems. In 2014, a number of think-tanks, from the Council on Foreign Relations to London-based Chatham House, as well as the information-security firm IOActive, sounded the alarm on how vulnerable space systems are to cyberattacks. These reports warned of the ease with which backdoors in software—an undetected remote access to a computer—can be exploited, and of the prevalence of unsecured software, non-protected protocols, and unencrypted channels. One of the studies’ recommendations was to immediately remove software updates from the public websites of various companies that provide satellite services and equipment, in order to prevent hackers from reverse-engineering the source code. However, despite these warnings, the space industry is barely aware of these risks and its responses are slow. Herein lies a challenge: to produce and put into practice standards and regulations regarding multinational and commercial activities in space technology and exploration. MOVING FORWARD In the past year, several space-faring nations have begun to tackle the issue. Three months ago, the U.S. Air Force announced that it hopes to develop technologies that would prevent hackers from jamming its satellites. Russia intends to significantly update the robustness and security of its military and government satellite communication system by 2025. Despite these positive steps, national governments and international bodies have more ground to cover. First, governments need to increase their efforts to raise awareness regarding the growing threat of cyberattacks against both government and commercial space systems. Second, in order to provide better protection, governments and corporations should take a holistic rather than piecemeal approach regarding the protection of all segments of their systems, and work toward solutions that will ensure the performance of the systems and their services, rather than protecting a specific asset. For example, satellites are and will continue to be damaged by cyberattacks; but the ability of an entire system to operate smoothly and recover rapidly is more crucial than the security and safety of a single satellite. Third, military, civil, and commercial actors should engage in more dialogue in order to strengthen overall protection. They can do so by sharing information and working jointly toward better standards and regulations. Fourth, governments and international bodies should try to standardize protocols for protecting space systems. For example, when NOAA was breached in September, the Inspector General for the Commerce Department, which oversees the network, had just criticized it for an array of “high-risk vulnerabilities” in the security of its satellite information and weather service systems. It took nearly a month for NOAA to admit it had been hacked. Hiding such information hampers meaningful and timely discussion about the issue and delays the development of preventive measures. Enforcing a standard protocol could help alleviate this problem. And finally, protecting space systems must be an international effort. Spacefaring nations should work together to achieve international cooperation on all of the areas mentioned above: raising awareness, sharing information, and developing much-needed standards. The potential for colossal damage and the relative ease of launching a cyberattack on space systems make them tantalizing targets for cybercriminals. The threat is already at our doorstep, and it will only get bigger. It is time for the international space community to muster the political will to rise to this growing challenge. AT: Other args AT: States CP – Perm do both The perm solves Kaminski 2013 (Margot E [Executive Director of the Information Society Project, Research Scholar, and Lecturer in Law at Yale Law School]; Drone Federalism: Civilian Drones and the Things They Carry; 4 Calif. L. Rev. Circuit 57; kdf) DRONE PRIVACY REGULATIONS There are, broadly speaking, two subjects of drone privacy regulation: law enforcement drone use and civilian drone use. n8 Most advocates and academics have focused on establishing privacy regulations to govern law enforcement drone use. n9 This task is worthy of immediate attention. The FAA already permits law enforcement drone use, where it does not yet permit commercial private drone use. n10 A number of state and federal bills thus propose warrant requirements for drone surveillance by law enforcement. n11 The federal government could regulate law enforcement drone use as it has historically regulated other law enforcement behavior, by providing a floor for state laws. n12 Federal legislation already governs law enforcement use of wiretaps and pen registers. n13 Drone surveillance is likely to additionally involve video surveillance, location tracking, and/or facial recognition, among other possible technologies. Thus federal legislation governing law enforcement surveillance could be expanded to govern location tracking, video surveillance, and the use of facial recognition software by law enforcement. n14 [*60] Regulating law enforcement drone use poses few countervailing dangers from legislating thoughtlessly or in haste; such legislation would implicate Fourth Amendment rights rather than First Amendment rights, so the worst case scenario is that such legislation might eventually be found by courts not to protect enough privacy. n15 AT: FISA Court Model Those courts fail in the context of drones Selinger and Kaag 2015 (Evan and John [Associate prof of philosophy @ U of Massachusetts Lowell]; Why domestic drones stir more debate than ones used in warfighting abroad; Mar 9; http://www.csmonitor.com/World/Passcode/Passcode-Voices/2015/0309/Why-domestic-drones-stirmore-debate-than-ones-used-in-warfighting-abroad kdf) Selinger: Why are you skeptical about replicating the FISA court model in this context? Kaag: The FISA courts are very weird. Our legal system is based on an adversarial model. In other words, courts are places to dispute charges and impartial parties – a judge and jury – make a decision about the case. The FISA courts aren’t like this. At all. FISA requests are not disputed. Only a very, very small percentage of FISA requests have been denied over the courts’ 30 year history. Most are approved as a matter of course. Sarah Kreps and I have argued that one of the more disturbing aspects of the FISA courts are their recent expansion of the “special needs” doctrine, which allows the government to carry out surveillance without detailed warrants in order to address an “overriding public danger.” We are concerned that this sort of governance, when applied to the issue of drones, might provide strategists and policy makers with a type of carte blanche over the targeted killing program. The alternative proposed by the Obama administration – what the President called “an independent oversight board in the executive branch” – doesn’t make us feel much better. It does not address the question of checks and balances that has prompted calls for judicial oversight. 2AC Generic DA Answer A lack of transparency in data collection makes their impact inevitable Scheer 2015 (Robert [Prof @ USC’s School of journalism and communication]; They Know Everything About You; Nation Books; p. 157-8; kdf) OUR GOVERNMENT, LIKE OTHERS THROUGHOUT history, tells us that repressive, invasive, and paranoid national security policies are for our own good, especially in terms of our safety. Yet where do the prerogatives of a surveillance state driven by fear and governed by secrecy really take us? The reality is that these procedures not only are unconstitutional but all too often lead to bad government policies, both at home and abroad. One need only review the invasion of Iraq to see the folly of toppling a regime that was an implacable enemy of al Qaeda-an invasion driven by a fear of weapons of mass destruction that free access to the available data would have discounted. The direct result, billions of dollars and hundreds of thousands of deaths later, is a fractured Iraq that, at the time of this writing a decade later, seems to be in a constant state of bloody division. Or as veteran correspondent Patrick Cockburn summarized in the London Review of Books in 2014, after the extremist Islamic State of Iraq and Syria (ISIS) seized huge swaths of both countries: For America, Britain and the Western powers, the rise of lsis and the Caliphate is the ultimate disaster. Whatever they intended by their invasion oflraq in 2003 and their efforts to get rid of Assad in Syria since 2011, it was not to see the creation of a jihadi state spanning northern Iraq and Syria run by a movement a hundred times bigger and much better organised than the alQaida of Osama bin Laden. The war on terror for which civil liberties have been curtailed and hundreds of billions of dollars spent has failed miserably.1 The obvious lesson of that debacle, and others like it, is that an informed public with access to accurate information-even when the facts are embarrassing to the government- is the best safeguard against such errors. Aren't we better off knowing when our freedoms are threatened or we are being lied to, even by our own leaders, so that we can rectify such policies? In other words, didn't Edward Snowden, regardless of the legality of his actions, actually make us safer? AT: Federalism DA The plan sets a floor – states can go beyond it Kaminski 2013 (Margot E [Executive Director of the Information Society Project, Research Scholar, and Lecturer in Law at Yale Law School]; Drone Federalism: Civilian Drones and the Things They Carry; 4 Calif. L. Rev. Circuit 57; kdf) DRONE PRIVACY REGULATIONS There are, broadly speaking, two subjects of drone privacy regulation: law enforcement drone use and civilian drone use. n8 Most advocates and academics have focused on establishing privacy regulations to govern law enforcement drone use. n9 This task is worthy of immediate attention. The FAA already permits law enforcement drone use, where it does not yet permit commercial private drone use. n10 A number of state and federal bills thus propose warrant requirements for drone surveillance by law enforcement. n11 The federal government could regulate law enforcement drone use as it has historically regulated other law enforcement behavior, by providing a floor for state laws. n12 Federal legislation already governs law enforcement use of wiretaps and pen registers. n13 Drone surveillance is likely to additionally involve video surveillance, location tracking, and/or facial recognition, among other possible technologies. Thus federal legislation governing law enforcement surveillance could be expanded to govern location tracking, video surveillance, and the use of facial recognition software by law enforcement. n14 [*60] Regulating law enforcement drone use poses few countervailing dangers from legislating thoughtlessly or in haste; such legislation would implicate Fourth Amendment rights rather than First Amendment rights, so the worst case scenario is that such legislation might eventually be found by courts not to protect enough privacy. n15