Courts Neg -- MAGS Lab - University of Michigan Debate Camp Wiki

advertisement
Page 1
Courts Fail
Page 2
Circumvention --- 1st Amendment
First Amendment cases fail --- even if the aff fiats First Amendment for the
chilling effect, future courts will default to the original pretrial jungle of
restrictions for plaintiffs
Lynch 7 --- J.D. (Matthew, “CLOSING THE ORWELLIAN LOOPHOLE: THE PRESENT CONSTITUTIONALITY OF BIG
BROTHER AND THE POTENTIAL FOR A FIRST AMENDMENT CURE”, 5 First Amend. L. Rev. 234, Lexis)//trepka
IV. Claim No. 3: Old Reliable, Sometimes - The First Amendment If
the Fourth Amendment and the due-process
right to privacy cannot slay the Orwell Act, its opponents may look to a more creative approach
utilizing the most sacred of constitutional rights: the rights to free speech and association under the First
Amendment. Such an approach may seem counterintuitive considering that opponents to privacy-enhancing statutes, such as news
reporters, often challenge them on First Amendment right-of-access or right-to-publish-information grounds. n77 Indeed, in The Death of
Privacy?, Michael Froomkin details a frightening array of government and private surveillance technologies and efforts before asking
whether a statute to restrict such efforts would [*258] pass First Amendment scrutiny. n78 But he does not discuss whether the First
Amendment might actually require protection from surveillance, or at least from surveillance by the government. This omission is not
unwarranted. Cases
challenging government surveillance on First Amendment grounds are
relatively rare , and such cases rarely reach the merits of the First Amendment claim. Considering the extensive and widely
condemned history of federal government surveillance throughout the Twentieth and early Twenty-First Centuries, this fact is nothing
less than remarkable. n79 Nevertheless, like the right to privacy, dicta in some cases suggest that a First Amendment objection to the
Orwell Act may find some success if it can reach the merits. Perhaps the most optimistic dictum comes from Keith, a Fourth
Amendment case: The price of lawful public dissent must not be a dread of subjection to an unchecked surveillance power. Nor must the
fear of unauthorized official eavesdropping deter vigorous citizen dissent and discussion of Government action in private conversation.
For private dissent, no less than open public discourse, is essential to our free society. n80 Unfortunately for the Anti-Orwellians, the
case did not go as far as this statement suggests; the Court merely ruled that the government must
follow the warrant requirement to conduct surveillance under its powers over domestic security. n81
As discussed above, the Fourth Amendment's warrant requirement has eroded since Katz. n82 Despite
this subsequent shift in the Fourth Amendment, the language above suggests a spirit of judicial suspicion
of government surveillance as to the First Amendment - a spirit that points to the unconstitutionality of the Orwell
Act. But first, the Anti-Orwellians must traverse the uncertain pretrial jungle of standing.
standing issue presents unique problems for Anti-Orwellians because the Orwell Act does
not fit the mold of most laws that fall victim to the First Amendment. By its terms, the Act does not
criminalize any speech, nor does it compel any citizen to profess beliefs that he does not believe.
[*259] The
In fact, it better serves the Act's purpose of protecting national security if all people freely profess
their true beliefs, because the Orwell Act cannot protect the public from a silent terrorist. Nor does it
discriminate against any particular speech on the basis of content or viewpoint, at least on its face; it captures
all communications regardless of subject matter. In short, the Act is not directed at speech, at least under the Court's
current understanding of the doctrine, nor does it regulate conduct. The Act does not truly require speakers to open their speech to
government surveillance; it simply gives the government the power to listen. As the Court stated in Bowens v. Roy, n83 a case that threw
out a free-exercise challenge brought by Stephen Roy to enjoin the government from using the Social Security number of his daughter,
Little Bird of the Snow: Never
to our knowledge has the Court interpreted the First Amendment to require
the Government itself to behave in ways that the individual believes will further his or her spiritual
development or that of his or her family ... . The Free Exercise Clause affords an individual
protection from certain forms of governmental compulsion ; it does not afford an individual
a right to dictate the conduct of the Government's internal procedures ... . The Federal Government's
use of a Social Security number for Little Bird of the Snow does not itself in any degree impair Roy's "freedom to believe, express, and
exercise" his religion. Consequently, [Roy's] objection ... is without merit. n84 The
same reasoning applies to the Speech
Clause, which is phrased in negative terms almost identical to those of the Free Exercise [*260]
Clause. n85 The Court has not suggested that the government has an affirmative duty to foster speech among its citizens, but only a
Page 3
duty not to impair it absent sufficient justification. n86 But the
Orwell Act does not impair the freedom to believe,
express, and exercise one's freedom of speech, at least in the Court's conventional understanding of
impairment as involving some kind of law or regulation outlawing or requiring some
action. The Act, quite simply, requires nothing of citizens and prohibits nothing pertaining to speech. This is not to say that it cannot
have First Amendment consequences, however. Two (somewhat overlapping) lines of cases offer some hope for the Anti-Orwellians:
cases involving a "chilling effect" on the freedom of association, and cases involving a "chilling effect" on speech generally. A.
Associations on the Rocks The term "freedom of association" does not appear in the First Amendment, but it now stands as a "clearly
established" constitutional right. n87 Perhaps fortuitously for Anti-Orwellians, the first case to "establish" the right to free association,
NAACP v. Alabama, n88 rested upon the danger of a chilling effect upon protected freedoms: It is hardly a novel perception that
compelled disclosure of affiliation with groups engaged in advocacy may constitute as effective a restraint on freedom of association as
the forms of governmental action in the cases above [involving regulations having a chill upon speech] were thought likely to produce
upon the particular [*261] constitutional rights there involved. This Court has recognized the vital relationship between freedom to
associate and privacy in one's associations ... . Inviolability of privacy in group association may in many circumstances be indispensable
to preservation of freedom of association, particularly where a group espouses dissident beliefs. n89 Since that time, the Court has
recognized that freedom of association exists "in two distinct senses": the freedom "to enter into and maintain certain intimate human
relationships" (intimate association), and the freedom "to associate for the purpose of engaging in those activities protected by the First
Amendment - speech, assembly, petition for redress of grievances, and the exercise of religion" (expressive association). n90 For the
purposes of the Orwell Act, the first category overlaps in relevant respects with the due-process right to privacy and warrants no further
discussion here. n91 The second category, however, may hold some hope for the Anti-Orwellians. The second category has evolved to
include protection for expressive groups against forced inclusion of unwanted members and restrictions upon their ability to disseminate
their views, two strands that hold little weight in challenging the Orwell Act. But, according to one scholar, "the privacy of the group and
its members remains the core of the right." n92 Unfortunately, if privacy remains the core of associational rights, the Supreme Court has
certainly not treated it as such; it has heard only one case concerning the surveillance of expressive groups and dismissed it for lack of
standing. n93 Indeed, there is a legitimate question as to whether privacy remains at the heart of freedom of association. The Supreme
Court has not cited NAACP for the proposition that freedom of association encompasses privacy of association since 1986, n94 and it has
not issued a ruling on the basis of a right to private association since [*262] 1984. n95 As for the lower courts, some "have held political
surveillance claims justiciable where the surveillance targeted a particular group or individual." n96 The Orwell Act does not target
particular groups or individuals on its face, nor does it "exclude a person from a profession or punish[] him solely because he is a
member of a particular political organization or because he holds certain beliefs," n97 which the First Amendment freedom of association
prohibits. On the other hand, the Supreme Court has not allowed the government to "inquire about an individual's beliefs and
associations" n98 for the purpose of giving or withholding a benefit unless it can show "a substantial relation between the information
sought and a subject of overriding and compelling state interest." n99 In addition, an organization may assert an interest in keeping the
confidentiality of its membership list if the confidentiality is "so related to the right of the members to pursue their lawful private
interests privately and to associate freely with others in so doing as to come within the protection" of the Constitution n100 - that is, if
compelled disclosure "is likely to affect adversely the ability of [the organization] and its members to pursue their collective effort to
foster beliefs which they admittedly have the right to advocate." n101 The Orwell Act would inevitably reveal information regarding
citizens' expressive associations. With cameras, microphones, and email, computer, and phone monitoring, it is unlikely that citizens
could hide their associations from the government while still remaining active members of those groups. The reality of this inevitable
disclosure could provide Anti-Orwellians (or, more specifically, Anti-Orweillian expressive organizations) with two arguments: first, that
the surveillance amounts to compelled disclosure for the purpose of giving or [*263] withholding benefits, and second, that it "chills"
their "collective effort to foster" beliefs through lawful advocacy. The first claim is the more dubious of the two. While the government
"inquires into" associations in the sense that they inquire into all communication through general surveillance, it does not make this
inquiry of associations directly. The government asks no questions; it merely observes. Under such an expansive reading of NAACP, the
government in that case would have been prohibited from discovering the identities of the NAACP's members by indirect methods; for
example, if a citizen came to the attorney general's office and said, "My neighbor told me he is a member of the NAACP," the attorney
general would have to close his ears. Furthermore, NAACP relied at least in part upon evidence that the disclosed members were subject
to private reprisals, n102 whereas the Orwell Act does not authorize disclosure to private individuals and our hypothetical does not
envision abuse of this information by public officials. In addition, the government neither confers nor withholds benefits on the basis of
the Orwell Act, at least in the traditional sense of economic or employment opportunities. The surveillance may lead to consequences the federal government may increase local surveillance of suspicious people or use data against suspects in criminal trials - but it is a
stretch to consider the freedom from increased government suspicion a "benefit" that the government "withholds" as a result of citizens'
associational ties. The second claim holds more promise for Anti-Orwellians in that constant government surveillance would likely
discourage membership in anti-government organizations. n103 Putting aside the question of whether the government surveillance
actually chills expressive association, the Anti-Orwellians face other difficulties in establishing a claim under NAACP - namely, that a
court could easily distinguish the NAACP case on its facts. NAACP was a case involving compelled disclosure of an organization's
member list. While citizens [*264] are "compelled" to reveal their associations under the Orwell Act in the sense that the realities of
government surveillance make it impossible to hide them, the Act requires no affirmative disclosure to the government. It adds no direct
relationship between organizations and the government. In sum, a claim that the Orwell Act violates citizens' rights to engage in
expressive association carries hope in principle, but the claim may fall short in the details. Case law also suggests that surveillance in
itself does not abridge the right to expressive association unless it involves targeted surveillance of certain groups. n104 The government's
efforts regarding general surveillance blend into the Anti-Orwellians' second claim under the First Amendment: that the Orwell Act
chills free speech generally. B. Speech on the Rocks 1. A Brief Historical Perspective The history of domestic surveillance in response to
citizens' exercise of their First Amendment rights is not a proud one. It is divisible into two categories with different degrees of
Page 4
government mens rea: surveillance of individuals because of their messages themselves, n105 and surveillance of individuals because their
messages suggest that they may pose a threat to national security given external events. n106 The first category treats speech as harmful in
itself, at least to the government in power, and surveillance in such circumstances constitutes political espionage. The second category
treats speech as a symptom, a convenient means for criminal profiling based on ideology. [*265] The government's early efforts at
widespread domestic surveillance fell into the profiling category. Following an outbreak of terrorist bombings in 1919, the FBI created
"dossiers detailing the political beliefs of [communists] and other radicals" and arrested thousands of them in the 1920 "Palmer Raids."
n107 These efforts continued to concentrate on suspected communists (as well as fascists and other extremists) immediately prior to
World War II, and communists remained a point of focus through the first thirty years of the Cold War. n108 Surveillance of those of
Middle Eastern descent in the days following the terrorist attacks of 9/11 certainly belongs in this category. After World War II, the
government also began surveillance in the political espionage category: "FBI investigations covered "the entire spectrum of the social
and labor movement in the country,'" all for "pure intelligence" purposes. n109 The FBI's investigation of Martin Luther King, Jr. offers
the most infamous example of this type of surveillance. n110 In these cases, the FBI did more than just keep a watchful eye on dissidents:
it infiltrated dissident groups, sent "poison-pen letters intended to break up marriages," "encouraged gang warfare," and operated "on
the theory that preventing the growth of dangerous groups and the propagation of dangerous ideas would protect the national security
and deter violence." n111 Amid this history of nationwide efforts at surveillance, Anti-Orwellians cannot help but feel dismay at the
relatively small number of free-speech cases addressing the issue of government surveillance. The Supreme Court has heard only one
First Amendment challenge to a systematic government surveillance program, and it dismissed the case for lack of standing. n112 Justice
Thurgood Marshall, sitting as Circuit Justice, heard one case addressing surveillance at one specific event, and [*266] he ruled for the
government on the merits. n113 Lower courts have rarely dealt with the issue since those two Supreme Court rulings in the early 1970s,
and few cases reached the merits. n114 This could, of course, be attributed to a reduction in government domestic surveillance following
the Watergate scandal. But domestic surveillance increased following the terrorist attacks of 9/11; since that time, federal courts have
heard only a handful of cases alleging that federal government surveillance created a "chilling effect" on speech. n115 This discouraging
history may result from the nature of surveillance itself, in that subjects may not know they are under surveillance and thus have no
motivation to seek an injunction to stop it. But it may also result from the tallest pretrial hurdle for "chilling effect" cases: standing. Even
if the Anti-Orwellians can meet these standing requirements, the question of the appropriate level of scrutiny remains. 2. Standing, and
Falling Under traditional standing requirements, the Court requires that plaintiffs show (1) "injury in fact" - that is, a "concrete and
particularized" legal harm that is "actual or imminent, not "conjectural' or "hypothetical'" - that (2) arises from "the challenged action of
the defendant" and (3) is "likely" to be "redressed by a favorable decision." n116 In chilling-effect cases, the first two
requirements are the sticking points: chilling-effect harms are
difficult to prove , and even if they
exist, a court may decide that they arise not from actions of the defendant, but from
" speculative apprehensiveness " that amounts to a "subjective "chill.'" n117 [*267] In addition,
claims carry an inherent contradiction that works against standing. When
plaintiffs claim that government action "chills" their speech, they essentially claim that they lack
the courage to speak out against the government because they fear negative repercussions. Yet the
"chilling-effect"
very act of bringing a public lawsuit against the government is an act of courage in defiance of those
repercussions; if a harm truly existed, if these plaintiffs were truly "chilled," then they would not have
brought suit in the first place. Further, the Supreme Court has refused to give plaintiffs in chilling-effect cases the ability to assert
standing on behalf of less-courageous non-parties to a lawsuit: "if [the plaintiffs] themselves are not chilled, but seek only to represent
those "millions' whom they believe are so chilled, [they] clearly lack that "personal stake in the outcome of the controversy' essential to
standing." n118 Even
if the Anti-Orwellians could overcome this inherent difficulty, the challenge of
showing a concrete and particularized chill remains. The likelihood of success in this element may
depend upon the nature of repercussions for certain speech. Obviously, the more concrete the deterrent against lawful speech, the more
concrete the chill in the eyes of the Court.
Page 5
Circumvention --- 4th Amendment
Even ruling on the 4th amendment is insufficient --- the government can just
get data from associates
Lynch 7 --- J.D. (Matthew, “CLOSING THE ORWELLIAN LOOPHOLE: THE PRESENT CONSTITUTIONALITY OF BIG
BROTHER AND THE POTENTIAL FOR A FIRST AMENDMENT CURE”, 5 First Amend. L. Rev. 234, Lexis)//trepka
Finally, even
if the Court finds that the government interest pales in comparison to any privacy
interests, and it rules against the Orwell Act, Anti-Orwellians face another practical difficulty: the
limitations of the exclusionary rule . While a ruling that strikes down Orwell-Act searches
on Fourth Amendment grounds might bar the admission of a defendant's own
recorded conversations in a court proceeding, it would not bar the admission of the evidence
gained by listening to the conversations of others , because defendants have no standing to
object to violations of the privacy of others. n46 For example, in the prosecution of a drug dealer, the government could
collect recorded communications of all of the drug dealer's associates. Suppose an associate calls another associate and tells him that the
dealer expects a new shipment to arrive at a certain time and location. The government could send officers to that location to arrest the
dealer as he makes the purchase; it could convince the associates to testify against the dealer; and it could even introduce the associates'
conversations against the dealer at trial (subject, of course, to the limitations of the Confrontation Clause and rules of evidence). Other
exceptions to the exclusionary rule, such as attenuation n47 and the independent source doctrine,
n48 give the government opportunities to use [*250] the fruits of unlawful searches of the
defendant himself. In short, the holes in the exclusionary rule give the government little incentive
to abandon such a powerful means of uncovering evidence of criminal activity.
Page 6
Cirvumention --- 5th/14th Amendment
Applying the Fifth/Fourteenth amendment’s protection to privacy is
insufficient --- it won’t be consistently applied afterwards and status quo
surveillance isn’t even unconstitutional
Lynch 7 --- J.D. (Matthew, “CLOSING THE ORWELLIAN LOOPHOLE: THE PRESENT CONSTITUTIONALITY OF BIG
BROTHER AND THE POTENTIAL FOR A FIRST AMENDMENT CURE”, 5 First Amend. L. Rev. 234, Lexis)//trepka
**Orwell Act = hypothetical government program that’s a conglomeration of all status quo government
surveillance programs
III. Claim No. 2: New (Un)Reliable - The Right to Privacy Rather than tying their constitutional hopes to a right with a shrinking scope of
protection, perhaps it would be wiser for Anti-Orwellians to employ a right that has undergone a recent expansion: n50 the
right to
privacy. This "right," which falls under the "substantive force of the liberty protected by the Due Process
Clause" n51 of the Fifth and Fourteenth Amendments, n52 does not explicitly appear within the [*251]
Constitution. But the Court has used it to strike down some laws - primarily morals legislation, at least in the post-Lochner era with broad, sweeping language that could give hope to Anti-Orwellians: Our precedents "have respected the private realm of family life
which the state cannot enter." These matters, involving the most intimate and personal choices a person may make in a lifetime, choices
central to personal dignity and autonomy, are central to the liberty protected by the Fourteenth Amendment. At the heart of liberty is the
right to define one's own concept of existence, of meaning, of the universe, and of the mystery of human life. Beliefs about these matters
could not define the attributes of personhood were they formed under compulsion of the State. n53 Based upon this paragraph alone, the
Orwell Act seems like a government venture into unconstitutional waters. While constant surveillance may not dictate the "choices
central to personal dignity and autonomy" in the same sense that the criminalization of one of those choices would, one could argue that
individuals should be free to "define one's own concept of existence" without the government looking over their shoulders. They may
argue that true dignity, autonomy, and liberty require some breathing room, some private space where people can rest assured that their
are limits to the application of
these broad-stroke principles. The Court does not apply such liberty-promoting statements
lawful words and actions will not fall within the government spotlight. But there
consistently , and the task of convincing the Court to overrule some government action on substantive due-process grounds is
not as simple as fitting it under the wide umbrella of generous dicta. n54 The
Court [*252] instead relies upon a two-step
approach to substantive due process claims: first, the asserted right must be one of "those
fundamental rights and liberties which are, objectively, "deeply rooted in this Nation's
history and tradition,'" and second, the Court must be able to make a "" careful description' of
the asserted fundamental liberty interest." n55 Of course, not all abstract claims of rights require constitutional protection
and recognition from the Court; these purported rights must, in some way, find some basis in the text of the Constitution n56 or American
history and practice, n57 or perhaps some kind of reasoned consensus that the right warrants protection in an "organized society." n58
[*253] A. A Right in Search of a Definition In this case, the Anti-Orwellians could take two approaches. First, they could define their
claim within an already-established right, such as the right to marital privacy n59 or the right of an adult to engage in consensual sexual
relations with another adult n60 (they may also claim that it violates their fundamental free-speech rights under the First Amendment,
and this Article will deal with that issue in the next section). They would simply argue that the Orwell Act violates these rights because it
infringes upon "the liberty relating to intimate relationships, the family, and decisions about whether or not to beget or bear a child." n61
The problem with this approach is that the Orwell Act prohibits nothing. Citizens remain free to make
reproductive decisions, engage in intimate relations, and raise their families as they see fit, so long
as their conduct does not involve abuse , neglect , or other well-established criminal
violations. The Orwell Act does not regulate these matters such that the government removes
choice from the hands of the citizens; if reproductive decision-making is a constitutional right, the
Orwell Act on its face does nothing to ban the exercise of that right. This is not to say that the Orwell Act could
not violate these rights with regard to specific unconstitutional applications in specific, limited contexts. n62 But such misuse of the
gathered information would not render the entire Act unconstitutional; a favorable ruling would merely prohibit the government from
using the information in that way. The key question then becomes whether the government, acting only as a silent observer and listening
in on family life, telephone calls, and [*254] important conversations, effectively deprives Americans of the free exercise of their
Page 7
fundamental rights. It is certainly a plausible argument, considering that the Court often uses spatial metaphors to describe the breadth
of the right ("realm of personal liberty" n63 and "zone of privacy" n64 are two of the most oft-cited examples). But it
may also
conclude that the mere presence of hidden surveillance equipment transmitting data to faceless
computer banks miles away, with no penalty for the lawful exercise of these rights, does not
amount to any meaningful deprivation of these rights at all. Women will still have the freedom to obtain
abortions and couples may still engage in intimate relations. If the worst-case scenario for citizens is that some
nameless, unknown strangers working for the government miles away might see transcripts or
listen to recordings of the citizens practicing their lawful rights, without any authorization to
disclose the information, then any purported deprivation of these rights could be too
speculative to hold up in the Supreme Court.
Page 8
Circumvention --- FISA
FISA restrictions fail --- executive can label anyone an agent of a foreign
power
Pike 7 --- J.D. from Hofstra (Josh, “THE IMPACT OF A KNEE-JERK REACTION: THE PATRIOT ACT AMENDMENTS TO THE
FOREIGN INTELLIGENCE SURVEILLANCE ACT AND THE ABILITY OF ONE WORD TO ERASE ESTABLISHED CONSTITUTIONAL
REQUIREMENTS”, 36 Hofstra L. Rev. 185, Lexis)//trepka
Although FISA defined "foreign intelligence information" with relative clarity, within that definition, the
"national defense or the security of the United States" was not defined with certain
specificity. n69 The failure of Congress to articulate which activities fall under this national
security classification allows surveillance of a foreign power or an agent of a foreign power where the
executive deems the target of surveillance as a threat to national security. Further lowering the
burden on the executive to secure a FISA order, the law allowed a FISA court judge to approve of the
requested surveillance where the judge determines that the evidence presented by the executive official is
"not clearly erroneous." n70 In so concluding, the judge is not required to conduct an in-depth probe into the validity of
the information presented in the application, and instead makes his determination based on the executive official's certification. n71
Due to the great deference given to
[*200] the executive branch to certify that the target of surveillance is a
national security threat with a connection to a foreign power and the minimal inquiry required by the FISA judge into the validity of the
facts, FISA fails to effectively safeguard from abuse possible targets of surveillance by the executive and authorizes
surveillance of United States persons engaged in alleged criminal activities which have garnered Fourth Amendment protection in the
past.
Page 9
Circumvention --- Generic
Courts fail – can’t set a precedent
Correia 15 (Evan, J.D. Candidate, May 2015, Temple University Beasley School of Law, “NOTE &
COMMENT: PULLING BACK THE VEIL OF SECRECY: STANDING TO CHALLENGE THE
GOVERNMENT'S ELECTRONIC SURVEILLANCE ACTIVITIES” // AKONG)
Courts routinely show considerable deference to claims of national security interests,
which are bound to arise in these types of suits. n297 For example, in In re City of New York,
n298 which involved police surveillance of protestors at the 2004 Republican National
Convention, the Second Circuit refused to allow discovery of officers' field reports, even in
redacted form. n299 The court explained that discovery of the field reports would reveal information about undercover
operations and potentially hinder operations in the future. n300 Moreover, "lawsuits designed to uncover surveillance of intellectual
activities may be unable to identify the "intellectual records' gathered by the government due to the way certain surveillance systems
operate." n301 Fusion centers access and analyze private and public databases as well as real-time video feeds without ever creating or
storing records. n302 "Although fusion center surveillance of all individuals' on and offline activities is continuous and totalizing, it does
not necessarily produce records that could be packaged and produced as part of a discovery process." n303 The
expansiveness
of contemporary governmental total information awareness renders the judiciary
incapable of reviewing the majority of situations on an individual basis. n304 Furthermore,
any individual cases that make it to judgment would do little to effectuate any
meaningful change because they would be focused on the intellectual privacy interests
of specific litigants. n305 In other words, any one individual case could not challenge
the systems of totalizing surveillance as a whole. The Klayman and ACLU v. Clapper decisions demonstrate the
potential for the judiciary to subject government surveillance to meaningful scrutiny. n306 Specifically, there must be a review process
that is open and adversarial, as opposed to the one-sided, closed hearings before the FISC in which judges consider only arguments from
the government and operate in secret. n307 However, even
if both suits ultimately succeed on appeal, the impact
would likely affect only the government's collection of metadata. Measures must be adopted to facilitate
meaningful judicial review of other government surveillance programs rather than [*214] the present reliance on the disclosure of
classified material. In the field of electronic surveillance, the role of the judiciary is essential to ensuring a proper separation of powers
and protecting individuals from "unreasonable searches and seizures" by the government as provided by the Fourth Amendment. n308
Page 10
Confusion --- Americans Overseas
Can’t solve --- legal ambiguity
Forgang 9 --- J.D. Candidate at Fordham (Jonathan, "THE RIGHT OF THE PEOPLE": THE NSA, THE FISA
AMENDMENTS ACT OF 2008, AND FOREIGN INTELLIGENCE SURVEILLANCE OF AMERICANS OVERSEAS, Fordham Law
Review, Lexis)//trepka
Answering these allegations, the Director of the NSA, Lieutenant General Keith B. Alexander, said the agency acted with "respect for the
law." n18 The Fourth Amendment, n19 the Foreign Intelligence Surveillance Act (FISA), n20 Executive Order 12,333, n21 and U.S. Signals
Intelligence Directive 18 (USSID 18) n22 govern the NSA's electronic surveillance [*222] activities. The
Highlander
surveillance draws attention to an unresolved Fourth Amendment legal question
about the surveillance of American citizens living outside the United States. Specifically, there is a
controversy over whether the warrant requirement to the Fourth Amendment applies to
surveillance of American citizens overseas . n23 It is estimated that over six million American citizens, including
members of the military, live overseas. n24 While many of the United States' greatest threats come from abroad, government surveillance
outside the country still affects the privacy rights of a substantial number of Americans.
Page 11
Confusion --- Warrants
Ruling on warrants is controversial --- decks solvency
Forgang 9 --- J.D. Candidate at Fordham (Jonathan, "THE RIGHT OF THE PEOPLE": THE NSA, THE FISA
AMENDMENTS ACT OF 2008, AND FOREIGN INTELLIGENCE SURVEILLANCE OF AMERICANS OVERSEAS, Fordham Law
Review, Lexis)//trepka
One point of contention is whether there is a relationship between the clause prohibiting
unreasonable searches and the clause establishing the conditions under which the government may issue
warrants. n45 The U.S. Supreme Court has held that a search without a warrant is generally
unreasonable , with some well-established exceptions such as when police have probable cause or when there are exigent
circumstances. n46 Other Supreme Court decisions have implied, however, that a warrant is not
required at all and the Fourth Amendment only requires that a search be reasonable. n47 The
controversy continues because the Fourth Amendment [*226] does not explicitly state
that the fruits of warrantless or unreasonable searches and seizures must be barred as evidence in
courts of law. n48 Professor Akhil Reed Amar has written that both the exclusionary rule and the warrant requirement are not valid
because the Fourth Amendment at the time of its adoption did not explicitly require warrants, probable cause, or the exclusion of
justification for this view is that the actual text of the Fourth
Amendment does not require a warrant, stating only that "no Warrants shall issue, but upon probable cause." n50
Instead of a warrant requirement, Amar believes that the Fourth Amendment's text only requires that a search is
reasonable . n51 According to Amar, the warrant requirement to the Fourth Amendment is a
illegally obtained evidence. n49 The
purely modern invention . n52
Page 12
Constitutional --- FISA
Doesn’t violate 4th amendment
Pike 7 --- J.D. from Hofstra (Josh, “THE IMPACT OF A KNEE-JERK REACTION: THE PATRIOT ACT AMENDMENTS TO THE
FOREIGN INTELLIGENCE SURVEILLANCE ACT AND THE ABILITY OF ONE WORD TO ERASE ESTABLISHED CONSTITUTIONAL
REQUIREMENTS”, 36 Hofstra L. Rev. 185, Lexis)//trepka
Addressing Fourth Amendment concerns regarding FISA surveillance, the Senate Select
Committee on Intelligence undertook a balancing test, as conducted in the Keith case, where the
government's interest in national security is weighed against the intrusiveness of the surveillance to the targeted individual. n85 The
Committee concluded that the additional procedural safeguards imposed by FISA upon the
executive branch allow the less stringent standards implemented by FISA to be
constitutional under the standards set forth in the Keith [*203] decision. n86 The Committee further
stated that although FISA surveillance diverges from the traditional Fourth Amendment warrant requirements, it was
reasonable and therefore constitutional as FISA created new safeguards for personal
privacy while allowing surveillance "in circumstances where, because of uncertainty about the legal requirements, the Government
may otherwise be reluctant to use this technique for detecting dangerous foreign intelligence and terrorist activities by foreign powers in
this country." n87 Both the text and the history of FISA, while clear that the purpose of a FISA order must be foreign intelligence
gathering, precluded neither the use of foreign surveillance information in criminal proceedings, nor the communication between
criminal prosecutors and foreign intelligence agents conducting FISA surveillance, as long as the primary purpose of the surveillance
remained foreign intelligence gathering.
FISA was intended to authorize domestic surveillance
Plummer 6 --- J.D., Mississippi College School of Law, law clerk for Barnes of the Mississippi Court of
Appeals (Brooke, “Domestic Spying: A Necessity in a Post-9/11 America or an Abuse of Presidential Power?”, Mississippi College Law
Review, Lexis)//trepka
FISA authorizes electronic surveillance only upon certain specified showings, and only if approved
by a court. The statute specifically allows for warrantless wartime domestic electronic surveillance - but only for the first fifteen days of a
war. n10 It makes criminal any electronic surveillance not [*306] authorized by statute (emphasis added); n11 and it expressly establishes
FISA and specified provisions of the federal criminal code (which govern wiretaps for criminal investigation) as the '[exclusive] means by
which electronic surveillance ... may be conducted.' n12 Importantly, FISA
was not intended to apply to
electronic surveillance conducted solely outside of the United States; rather, the statute
"protects U.S. persons who are located in the United States from being targeted in their domestic
or international communications without a court order no matter where the surveillance is being carried out." n13
Page 13
No Court Modeling
The Constitution and political system aren’t modeled anymore
Moravcsik, Professor of Politics & International Affairs at Princeton University, 6-31-5 (Andrew, “Dream
On, America,” Newsweek)
Americans are living in a dream world. Not only do others not share America's self-regard, they no longer aspire
to emulate the country's social and economic achievements. The loss of faith in the American Dream goes beyond this swaggering administration
The truth is that
and its war in Iraq. A President Kerry would have had to confront a similar disaffection, for it grows from the success of something America holds dear: the spread of democracy, free
Countries today have dozens of political, economic and social models to
choose from. Anti-Americanism is especially virulent in Europe and Latin America, where countries have established their own distinctive ways--none made in America.
markets and international institutions--globalization, in a word.
Futurologist Jeremy Rifkin, in his recent book "The European Dream," hails an emerging European Union based on generous social welfare, cultural diversity and respect for
international law--a model that's caught on quickly across the former nations of Eastern Europe and the Baltics. In Asia, the rise of autocratic capitalism in China or Singapore is as
much a "model" for development as America's scandal-ridden corporate culture. "First we emulate," one Chinese businessman recently told the board of one U.S. multinational, "then
we overtake." Many are tempted to write off the new anti-Americanism as a temporary perturbation, or mere resentment. Blinded by its own myth, America has grown incapable of
recognizing its flaws. For there is much about the American Dream to fault. If the rest of the world has lost faith in the American model--political, economic, diplomatic--it's partly for
the very good reason that it doesn't work as well anymore. AMERICAN DEMOCRACY:
Once upon a time, the U.S. Constitution was a
revolutionary document, full of epochal innovations--free elections, judicial review, checks and balances, federalism and, perhaps most important, a Bill of Rights.
In the 19th and 20th centuries, countries around the world copied the document, not least in Latin America. So did Germany and Japan after World War II. Today? When
nations write a new constitution, as dozens have in the past two decades, they seldom look to
the American model . When the soviets withdrew from Central Europe, U.S. constitutional experts rushed in. They got a polite hearing, and were sent
home. Jiri Pehe, adviser to former president Vaclav Havel, recalls the Czechs' firm decision to adopt a European-style parliamentary system with strict limits on campaigning. "For
Europeans, money talks too much in American democracy. It's very prone to certain kinds of corruption, or at least influence from powerful lobbies," he says. "Europeans would not
want to follow that route." They also sought to limit the dominance of television, unlike in American campaigns where, Pehe says, "TV debates and photogenic looks govern election
Kosovo opted for a European constitution. Drafting a postSouth Africa rejected American-style federalism in favor of a German model, which leaders
deemed appropriate for the social-welfare state they hoped to construct. Now fledgling African democracies look to South Africa as their
inspiration, says John Stremlau, a former U.S. State Department official who currently heads the international relations department at the University of Witwatersrand in
Johannesburg: "We can't rely on the Americans." The new democracies are looking for a constitution written in modern
times and reflecting their progressive concerns about racial and social equality, he explains. "To borrow Lincoln's phrase, South Africa is now
Africa's 'last great hope'." Much in American law and society troubles the world these days. Nearly all countries reject the
United States' right to bear arms as a quirky and dangerous anachronism. They abhor the death penalty and demand broader privacy
victories." So it is elsewhere. After American planes and bombs freed the country,
apartheid constitution,
protections. Above all, once most foreign systems reach a reasonable level of affluence, they follow the Europeans in treating the provision of adequate social welfare is a basic right.
All this, says Bruce Ackerman at Yale University Law School, contributes to the growing sense that
American law, once the world standard, has
become "provincial." The United States' refusal to apply the Geneva Conventions to certain terrorist suspects, to ratify global human-rights treaties such as the
innocuous Convention on the Rights of the Child or to endorse the International Criminal Court (coupled with the abuses at Abu Ghraib and Guantanamo) only reinforces the
conviction that America's Constitution and legal system are out of step with the rest of the world.
The Supreme Court isn’t modeled anymore
New York Times 9-18-8 (“U.S. Court, a Longtime Beacon, Is Now Guiding Fewer Nations”)
American legal influence is waning. Even as a debate continues in the court over whether its decisions should ever cite foreign law, a
diminishing number of foreign courts seem to pay attention to the writings of American justices . ''One
But now
of our great exports used to be constitutional law,'' said Anne-Marie Slaughter, the dean of the Woodrow Wilson School of Public and International Affairs at Princeton. ''We are
losing one of the greatest bully pulpits we have ever had.'' From 1990 through 2002, for instance, the Canadian Supreme Court cited decisions of the United States Supreme Court
about a dozen times a year, an analysis by The New York Times found. In the six years since, the annual citation rate has fallen by half, to about six. Australian state supreme courts
cited American decisions 208 times in 1995, according to a recent study by Russell Smyth, an Australian economist. By 2005, the number had fallen to 72. The story is similar around
These days, foreign courts in developed democracies often
cite the rulings of the European Court of Human Rights in cases concerning equality, liberty and prohibitions against cruel treatment,
said Harold Hongju Koh, the dean of the Yale Law School. In those areas, Dean Koh said, '' they tend not to look to the rulings of the U.S.
Supreme Court.'' The rise of new and sophisticated constitutional courts elsewhere is one reason for
the globe, legal experts say, particularly in cases involving human rights.
Page 14
the Supreme Court's fading influence, legal experts said. The new courts are, moreover, generally more
liberal than the Rehnquist and Roberts courts and for that reason more inclined to cite one another.
Specific decisions aren’t modeled – Just the foundations of our system
Klug, Law Professor at the University of Wisconsin, 2K (Heinz, “MODEL AND ANTI-MODEL: THE
UNITED STATES CONSTITUTION AND THE ‘RISE OF WORLD CONSTITUTIONALISM,’” Wisconsin Law
Review, 2000 Wis. L. Rev. 597)
Before discussing the various ways in which the American experience has served as a constitutional model, it
is important to
specify what serves as the model. The model is not merely the constitutional document and its amendments; it is also,
more importantly, the ideas and institutions of American constitutionalism - popular sovereignty, federalism, the
separation of powers, and judicial review - as well as the over two hundred years of constitutional jurisprudence that has flowed from the
Constitution. It is this vision of the United States Constitution, as an elaborated text with a history of structural, institutional, and
jurisprudential changes, that allows us to understand the place of the United States Constitution as the backdrop or wallpaper before
which subsequent constitutional stories, from constitution-making to constitutional adjudication, have evolved. I must also clarify my
use of the idea of a model. By model I mean a general source of ideas, concepts, examples, and even specific constitutional arguments
rather than a mere reproduction or copy of what has occurred or is contained in the United States Constitution or constitutional
jurisprudence. Caution at the notion of a constitutional model is also important. The pure adoption of any particular model or example
does not guarantee any particular outcome. This problem is clearly evident in the experience of the United States in the Philippines,
despite the aim of the United States to establish a different form of colonial relationship. After obtaining formal control from Spain
through the Treaty of Paris in 1898 and after over fifty years of "tutelage" designed to establish an American form of government, the
efforts of the United States seem to have achieved little more than a system of institutional charades, cast aside as soon as they no longer
served those in power. From the passage of the 1934 Philippine Commonwealth and Independence Act, which provided that the
Constitution should "include a [*600] bill of rights and establish a "republican form of government'"; to the subsequent adoption of the
1935 Constitution by a Philippine constitutional convention and the wholesale adoption of American case law, which seems to have been
used as binding precedent; the experience produced no more than a symbolic manifestation of United States constitutionalism. As
Andrzej Rapaczynski argues, "politically speaking, the cloning of America did not effectively protect the Philippines from a dictatorship,
and even the best commentators could not see why the result was not what the Americans had intended." n5 Despite this failure to
clone, the United States constitutional experience has served as a model, in my more general sense of the concept.
As a general model it has served a number of distinct functions. On the one hand, the American constitutional experience offers
examples of a range of structural features, whose evolution and impact may be observed over two centuries. These structural features
include the transformation of the political idea of the separation of powers into a working constitutional principle; the creation of a
federal system providing for the division of powers between a central government and its constituent regions; and finally, the creation of
a range of institutional mechanisms for checking and balancing the exercise of governmental power, which provided political adversaries
multiple sites for raising and contesting issues. On the other hand, the American experiment has raised the banner of individual rights
and through a long and wavering jurisprudence demonstrated how vast areas of political conflict may become judicialized. Although
often criticized as a legalization of politics, the creation of a popular rights consciousness among citizens of the United States has indeed
inspired advocates of human rights and is reflected most clearly in the adoption of international human rights instruments and the post1945 emergence of an international human rights culture. Although less common, the specific doctrines of United States rights
jurisprudence have at times served as a direct model abroad. A significant example of this is the influence of free speech doctrines
flowing from the First Amendment of the United States Constitution on the common law based freedom of speech jurisprudence in
Israel n6 and Australia. n7 However, instead
of specific constitutional doctrines, particular institutional forms, or
even specific constitutional rights, it has been the ideas and broad structural innovations of
American constitutionalism that have found the greatest resonance among constitution-makers
and interpreters. [*601] From the development of a single fundamental law, incorporated within one written document, to the
distribution of public power among different geographic and institutional levels of government, the experience of American
constitutionalism has provided a vast experiment to which constitution-builders abroad could turn. With subsequent waves of
constitution-making these constitutional forms have evolved - both in the United States and abroad - to provide further elucidations of
the original American model that could be relied upon by subsequent waves of constitution-makers.
Other countries aren’t modeling the U.S. anymore – They’re looking to other
countries
Klug, Law Professor at the University of Wisconsin, 2K (Heinz, “MODEL AND ANTI-MODEL: THE
UNITED STATES CONSTITUTION AND THE ‘RISE OF WORLD CONSTITUTIONALISM,’” Wisconsin Law
Review, 2000 Wis. L. Rev. 597)
With the widespread adoption of institutions and constitutional forms genetically tied to the innovations of the American revolution, it is not surprising that both advocates and
detractors of the American experience assume that the United States is, at the beginning of the twenty-first century, the hegemonic model. Despite this assumption,
American
Page 15
scholars participating in what was, in the 1990s, more than a billion dollar program to promote the rule of law around the world, found themselves
in competition with alternative constitutional models. Although the bulk of activity in the post-cold war "rule of law" movement was and
lawyers and
remains focused on judicial and legislative reform designed to promote market economies, it is important to recognize that a central product of this dual [*598] process of political
transformation and rule of law advocacy was fundamental constitutional reform in over half the world - approximately 104 of the 188 members of the United Nations Organization. Of
these, a staggering seventy-eight percent, or approximately eighty-one countries, adopted completely new constitutions. Given our common understanding of the historic influence of
the United States Constitution, described by Louis Henkin as a "source of inspiration and ideas, [which] was studied and appraised by scholars, invoked by publicists, adopted or
many of those who joined the multitude of legal
expeditions to the coal-face of constitution-making in Eastern Europe, Africa, and many other parts of the world, found themselves
confronted with alternative constitutional models. As exporters, advocates of the American model found
that instead of enjoying an unassailable, dominant status, they faced open competition from advocates of the German, Canadian,
Indian, or other constitutional experiences. Given that these alternative constitutional experiences are to a large extent themselves based on the
adapted by revolutionaries, nation builders and statesmen," n4 it is indeed surprising that
American model of constitutionalism, it seems counterintuitive that instead of serving as the dominant model the American experience serves as one of a number of alternative
models, if not as an anti-model. If this impression is correct, then the assumption that the United States Constitution is the model to which the world turned, as States around the
globe engaged in one of the most widespread and profound processes of constitutional and political reconstruction ever, is wrong. What then is the role of the United States
Constitution outside the United States? This Article briefly discusses and evaluates the place of the United States Constitution in the context of a globalizing constitutionalism. It will
emphasize both the enduring contribution to constitutionalism and as the ways in which American constitutionalism and constitutional jurisprudence are being used as the antimodel in many more recent constitution-making processes and in the dramatic expansion of constitutional jurisprudence around the world. I will also discuss the ways in which
United States constitutional jurisprudence and scholarship is both a source of ideas and an outsider to a growing transnational constitutional conversation that is going on most
evidently in the opinions of different constitutional courts and human rights fora. I will argue that although historically the United States Constitution provided an inspiration to
the recent direction of United States constitutional jurisprudence has led most constitution-makers
to seek alternative models. Although these alternatives are, I argue, premised on the fundamental elements of the American constitutional system - on the
many,
development of judicial review, federalism, and the separation of powers in [*599] United States jurisprudence - they have evolved into distinctly different alternatives. Even in those
cases where the United States exercised a great deal of influence in the constitution-making process, the turn to alternative forms means that in many ways the United States
Constitution and the jurisprudence that has flowed from it has, more recently, been providing the anti-model. This trend is even more evident in the constitutional jurisprudence of
different constitutional courts, where United States Supreme Court opinions are discussed and either distinguished or the dissenting opinions of various United States Supreme Court
Justices are quoted as sources of argument for decisions that are diametrically opposite to those reached by United States courts. Finally, I will briefly discuss the implications this
view of a globalizing constitutional discourse may have for the debate in the United States Supreme Court over the use of foreign jurisprudence in interpreting the United States
Constitution.
Even if they win that other countries look at specific decisions, they will
change them to meet the needs of their country. There is no reason they can’t
figure it out on their own.
Klug, Law Professor at the University of Wisconsin, 2K (Heinz, “MODEL AND ANTI-MODEL: THE
UNITED STATES CONSTITUTION AND THE ‘RISE OF WORLD CONSTITUTIONALISM,’” Wisconsin Law
Review, 2000 Wis. L. Rev. 597)
it is in the jurisprudence of Supreme Courts and Constitutional Courts around the world that the true use of the antimodel may be witnessed. The highest courts of constitutional review in Canada, India, South Africa, Zimbabwe, and even the Privy Council of the
House of Lords in reviewing cases from the Commonwealth all engage in extensive discussion of comparative constitutional
jurisprudence and the case law of the United States Supreme Court in particular - quite unlike the rather parochial focus of courts in
the United States. However, despite extensive citation of United States cases and reliance on some of the arguments employed by the United States
Supreme Court, by and large United States jurisprudence has been increasingly used as a counterBut
example , as a source of distinction, or merely distinguished as inapposite.
Other countries don’t model us wholesale – Even if we have some bad
decisions on the books, it doesn’t mean that our overall model is damaged
Klug, Law Professor at the University of Wisconsin, 2K (Heinz, “MODEL AND ANTI-MODEL: THE
UNITED STATES CONSTITUTION AND THE ‘RISE OF WORLD CONSTITUTIONALISM,’” Wisconsin Law
Review, 2000 Wis. L. Rev. 597)
While many features of the American model have been adopted elsewhere, it has been only in very
rare circumstances, such as the Philippines in 1935, where the adopters have not fundamentally transformed the
model to suit their own particular circumstances or to reflect their perceptions of the inadequacy of the original form. In order to reflect this
reality and to [*605] demonstrate the emergence of the role of anti-model, I will separate my discussion of this particular impact of the United States constitutional model into two
distinct phases: first, as an inspiration to or influence on constitution-makers; and second, as a constitutional text or source of constitutional argument for courts empowered to
interpret newly adopted constitutions and/or bills of rights around the globe. For constitution-makers, the United States Constitution was for almost a century-and-a-half, the
essential prototype of a written, single-document constitution. The United States' experience was part of the debates surrounding the creation of new constitutional orders in France
and Germany from the early nineteenth century. Significantly, however, both limited knowledge of the actual United States constitutional experience and even incorrect translation of
the Constitution itself served to limit its impact. Most importantly, the failure or limited success of democratic revolutions in Europe in the middle of the nineteenth century made the
model wholly unsuitable to the forces that restored the position of the monarchy in these nineteenth-century European constitutions. Thus it was only in the twentieth century that
Page 16
constitution-makers
were very reluctant to incorporate some of the most basic American structural and institutional forms. For
example, although notions of federalism and bills of rights were readily taken up, the content was often quite different. Very few constitution-making
bodies accepted the notion of a national government of limited powers; instead, the sub-units - regions and provinces were given limited powers. Likewise, bills of rights were often included but the mechanisms of enforcement
remained weak. In the case of judicial review, for example, many constitutions explicitly adopted the idea of judicial or constitutional review; yet, there was a marked
the American Constitution began to emerge as a popular source of constitutional structures and institutions for constitution-makers. Even then,
reluctance to accept the corresponding American idea of lifetime judicial appointments. Instead, constitution-makers tended to favor limiting judicial appointments to a particular
term of years, thus keeping the membership of the highest constitutional court more closely tied, through the appointment process, to the broad contours of changing political
circumstances. With non-renewable terms of seven to twelve years, constitution-makers in some cases tried to both ensure judicial independence and make the court as a whole
subject to the democratic shifts that produce the changing political forces who control the appointment process.
Page 17
No Norms
No impact to norm setting --- friendly democracies will selectively ignore bad
US norms, and authoritarian nations don’t care either way
John O. McGinnis 7, Professor of Law, Northwestern University School of Law. ** Ilya Somin **
Assistant Professor of Law, George Mason University School of Law. GLOBAL CONSTITUTIONALISM:
GLOBAL INFLUENCE ON U.S. JURISPRUDENCE: Should International Law Be Part of Our Law? 59 Stan.
L. Rev. 1175
The second benefit to foreigners of distinctive U.S. legal norms is information. The
costs and benefits of our norms will
be visible for all to see. n268 Particularly in an era of increased empirical social science testing, over time
we will be able to analyze and identify the effects of differences in norms between the United States and
other nations. n269 Such diversity benefits foreigners as foreign nations can decide to adopt our
good norms and avoid our bad ones .¶ The only noteworthy counterargument is the claim that U.S.
norms will have more harmful effects than those of raw international law, yet other nations will still
copy them. But both parts of this proposition seem doubtful. First, U.S. law emerges from a democratic process that
creates a likelihood that it will cause less harm than rules that emerge from the nondemocratic processes [*1235] that create
international law. Second, other democratic
nations can use their own political processes to screen out
American norms that might cause harm if copied.¶ Of course, many nations remain
authoritarian. n270 But our norms are not likely to have much influence on their choice of norms.
Authoritarian states are likely to select norms that serve the interests of those in power, regardless
of the norms we adopt . It is true that sometimes they might cite our norms as cover
for their decisions. But the crucial word here is "cover." They would have
adopted the same rules, anyway. The cover may bamboozle some and thus be counted a cost. But this would
seem marginal compared to the harm of allowing raw international law to trump domestic law.
Page 18
No I-Law --- Fails
International law doesn’t prevent conflict or constrain nations
Hiken, Associate Director Institute for Public Accuracy, 7-17-’12 (Luke, “The Impotence of International
Law” http://www.fpif.org/blog/the_impotence_of_international_law)
Whenever a lawyer or historian describes how a particular action “violates international law” many people stop
listening or reading further. It is a bit alienating to hear the words “this action constitutes a violation of international law” time and
time again – and especially at the end of a debate when a speaker has no other arguments available. The statement is inevitably followed
by: “…and it is a war crime and it denies people their human rights.” A
plethora of international law violations are
perpetrated by every major power in the world each day, and thus, the empty invocation of
international law does nothing but reinforce our own sense of impotence and helplessness in the
face of international lawlessness. The United States, alone, and on a daily basis violates every principle of
international law ever envisioned: unprovoked wars of aggression; unmanned drone attacks; tortures and renditions;
assassinations of our alleged “enemies”; sales of nuclear weapons; destabilization of unfriendly governments; creating the largest prison
population in the world – the list is virtually endless. Obviously one
would wish that there existed a body of
international law that could put an end to these abuses, but such laws exist in theory, not in
practice. Each time a legal scholar points out the particular treaties being ignored by the superpowers (and everyone else) the only
appropriate response is “so what!” or “they always say that.” If there is no enforcement mechanism
to prevent the violations, and no military force with the power to intervene on behalf of those victimized by the violations, what
possible good does it do to invoke principles of “truth and justice” that border on fantasy? The
assumption is that by invoking human rights principles, legal scholars hope to reinforce the importance of and need for
such a body of law. Yet, in reality, the invocation means nothing at the present time, and goes nowhere. In the real
world, it would be nice to focus on suggestions that are enforceable, and have some potential to prevent the atrocities taking place
around the globe. Scholars who invoke international law principles would do well to add to their analysis, some form of action or
conduct at the present time that might prevent such violations from happening. Alternatively, praying
for rain sounds as
effective and rational as citing international legal principles to a lawless president, and his ruthless
military.
International law isn’t key to global cooperation to solve transnational
problems
Estreicher, Law Professor at NYU, 3 (Samuel, “Rethinking the Binding Effect of Customary International
Law,” Virginia Journal of International Law Association, Fall, 44 Va. J. Int'l L. 5)
As for the subsidiary law that an increasingly interdependent world needs in advance of treaties, traditional
CIL could not easily play this role as it was essentially backwards looking. The new, instantaneous customary
law tries to play this role, but in a way that hardly comports with legitimacy. Without relying on CIL,
states, international organizations, and other actors have ample means of identifying problems
requiring interstate cooperation, drafting instruments that might command state support, and
marshaling the forces of moral suasion. It is hard to see that the "law" aspiration of CIL offers the
prospect of a significant incremental gain. In any event, the ultimate question is whether any such benefit
warrants the accompanying costs - to which I now turn.
International law has ZERO impact on state behavior
Goldsmith, Law Professor at the University of Chicago, 2K (Jack, “Understanding the Resemblance
Between Modern and Traditional Customary International Law,” Virginia Journal of International Law
Association, Winter, 40 Va. J. Int'l L. 639)
The significance of this "new" CIL is controversial. Many believe it is incoherent and illegitimate. n6 Others
view it as a happy development for international law generally and - because the new CIL primarily concerns
Page 19
human rights - for world justice. n7 In this essay we suggest that both critics and proponents of the new CIL
proceed from a faulty premise. The faulty premise is that CIL - either the traditional or the new influences national behavior. In [*641] our view, the new CIL is no less coherent or legitimate than the
old. But this is not because the new CIL is particularly coherent or legitimate, whatever those terms may
mean in this context. It is because the commentators misunderstand how CIL, new or old, operates.
CIL, new and old, reflects patterns of international behavior that result from states pursuing their
national interests. These interests, along with the relative power of each state and other exogenous
features of the international environment, determine which rules of CIL emerge in equilibrium. In
both the traditional and new varieties, CIL as an independent normative force has little if any effect on
national behavior.
The plan does nothing to improve world order
Berkowitz, of the Hoover Institution, 5 (Peter, “BOOKS: Laws of Nations,” April & May,
http://www.hoover.org/publications/policyreview/2939681.html)
Although their book is written with scholarly detachment, it represents a frontal assault on the liberal
internationalist view that international law emerges from reflection on moral principles and that states
comply with it in significant measure because of its moral and legal claim upon them. The authors argue that
states comply with international law for almost exclusively instrumental reasons. This is not to say
that international law is not law. It is to say that the study of it does not provide the key to state conduct
and that the elaboration of it will not decisively improve world order. Nor is it to contend that states
lack good reasons to comply with international law. They often do reasonably comply with their international
obligations — because of a coincidence of interest, or because states gain by coordinating their behavior; or
because cooperation in the short term will result in long term gains, or because of coercion by a stronger state
or states of a weaker state or states. The heart of Goldsmith’s and Posner’s book is their rational-choice
analysis of how customary international law originates and changes, and why states comply with it, and their
examination of why states makes treaties and honor them. It will raise plenty of hackles. The lucidity and
accessibility of their theorizing and the incisiveness of their doctrinal analysis will only heighten the effect.
Yet it is their conclusions about the relation between morals and international law that provides the greatest
challenge to the liberal internationalism Slaughter champions. First, Goldsmith and Posner reject the view
that the increasing propensity of states to adopt the language of international law — particularly the language
of human rights law — is evidence of the power of international human rights norms to shape state conduct.
As with individuals, they argue, so too with states: Talk is cheap. Still, international-law talk serves strategic
purposes. While talking tough about foreign affairs at home, a leader may make concessions or
abdicate responsibilities abroad in ways that are invisible to an uninformed domestic audience.
Alternatively, a leader may attempt to deceive foreign audiences by insisting on his country’s benign
intentions and sincere respect for international norms. Still, liberal internationalists would insist that the
increasing use by foreign leaders of the language of international human rights can’t help but exert a pull on
their own thinking and the formation of state policy. Goldsmith and Posner doubt it. They think there is a
perfectly good explanation, rooted in self-interest, for the fact that the language of international human
rights law has come to supply the moral and legal content for the rhetoric of today’s world leaders: In an
increasingly interconnected world order, a state may develop relations with almost any other state and must
make its case in the most universal language available. Second, and more boldly, the authors contend that a
moral obligation to obey international law does not even exist. They point out that states change regimes; it
would not make sense to hold a state that has made the transition to democracy, for example, to treaties it
signed while under communist dictatorship. They also observe that in the absence of a world government,
there is no clear international authority that promulgates, enforces, and is responsible for the benefits of
international law and to which states therefore might owe allegiance. And they note that the liberal
internationalist practice of treating violations of international law as a step in the emergence of a new legal
Page 20
order — when the violation corresponds with the moral judgments of liberal internationalists, at any rate — is
inconsistent with the usual understanding of legal obligation. As they argue throughout their book,
Goldsmith and Posner maintain that the absence of a moral obligation to obey international law does
not much affect the conduct of states, which have a variety of self-interested reasons for
compliance. In fact, they worry that the view that states possess such obligations may actually promote
greater lawlessness in the international arena. One could wonder, for example, how the rule of law was
served by the liberal internationalist consensus opposing the use of force to remove Saddam Hussein in
March 2003 despite his flouting of 17 resolutions passed by the United Nations Security Council over a
period of 12 years.
Page 21
No I-Law --- Resilient
Liberal international order resilient
Ikenberry, Professor Politics at Princeton, ’10 (G John, “The Liberal International Order and its
Discontents” Millennium: Journal of International Studies,Vol 38 No 3, p 509-521, SagePub)
The Durability of Liberal International Order There are also reasons to think that
this liberal order will persist , even if it continues to evolve.
the violent forces that have overthrown international orders in the past do not seem to operate
today. We live in the longest period of ‘great power peace’ in modern history. The great powers have not found
themselves at war with each other since the guns fell silent in 1945. This non-war outcome is certainly influenced by two realities: nuclear
deterrence, which raises the costs of war, and the dominance of democracies, who have found their own pathway to peace. In the past, the great
Firstly,
moments of order-building came in the aftermath of war when the old order was destroyed. War itself was a ratification of the view that the old order was no longer sustainable. War
In the
absence of great power war it is harder to clear the ground for new ‘constitutional’ arrangements.
Secondly, this order is also distinctive in its integrative and expansive character. In essence, it is ‘easy to join and hard to overturn’. This follows
most fundamentally from the fact that it is a liberal international order – in effect, it is an order that is relatively open and
loosely rulebased. The order generates participants and stakeholders. Beyond this, there are three reasons why the architectural features of this post-war liberal order
reinforce downward and outward integration. One is that the multilateral character of the rules and institutions create
opportunities for access and participation. Countries that want to join in can do so; Japan found itself integrating
broke the old order apart, propelled shifts in world power and opened up the international landscape for new negotiations over the rules and principles of world politics.
through participation in the trade system and alliance partnership. More recently, China has taken steps to join, at least through the world trading system. Joining is not costless.
Membership in institutional bodies such as the WTO must be voted upon by existing members and states must meet specific requirements. But these bodies are not exclusive or
the liberal order is organised around shared leadership and not just the United States . The
G-7/8 is an example of a governance organisation that is based on a collective leadership, and the new G-20 grouping has emerged to provide expanded leadership. Finally, the
order also provides opportunities for a wide array of states to gain access to the ‘spoils of
modernity’. Again, this is not an imperial system in which the riches accrue disproportionately to the centre. States across the system have found ways to integrate into this
order and experience economic gains and rapid growth along the way. Thirdly, rising states do not constitute a bloc that seeks to
overturn or reorganise the existing international order. China, India, Russia, Brazil, South Africa and
others all are seeking new roles and more influence within the global system. But they do not constitute a new coalition of states seeking
global transformation. All of these states are capitalist and as such are deeply embedded in the world economy. Most of them are democratic and embrace the
imperial. Secondly,
political principles of the older Western liberal democracies. At the same time, they all have different geopolitical interests. They are as diverse in their orientations as the rest of the
They are not united by a common principled belief in a postliberal world order. They are all very much inside the existing order and integrated in various ways
into existing governance institutions. Fourthly, the major states in the system – the old great powers and rising states – all have complex alignments of
interests. They all are secure in the sense that they are not threatened by other major states. All worry about radicalism and failed states. Even in the case of the most
fraught relationships – such as the emerging one between the United States and China – there are shared or common interests in
global issues related to energy and the environment. These interests are complex. There are lots of ways in which these countries will
world in regard to energy, religion and ideologies of development.
compete with each other and seek to push ‘adjustment’ to problems onto the other states. But it is precisely the complexity of these shared interests that creates opportunities and
incentives to negotiate and cooperate – and, ultimately, to support the open and rule-based frameworks that allow for bargains and agreements to be reached. Overall, these
the leading states of the world system are travelling along a common pathway to
modernity. They are not divided by great ideological clashes or emboldened by the potential gains
from great power war. These logics of earlier orders are not salient today. Fascism, communism and theocratic dictatorships cannot propel you along the
considerations suggest that
modernising pathway. In effect, if you want to be a modern great power you need to join the WTO. The capitalist world economy and the liberal rules and institutions that it supports
the
liberal character of that system still provides attractions and benefits to most states within it and on
its edges.
– and that support it – are foundational to modernisation and progress. The United States and other Western states may rise or fall within the existing global system but
It doesn’t depend on US leadership
Ikenberry, Professor Politics at Princeton, ’10 (G John, “The Liberal International Order and its
Discontents” Millennium: Journal of International Studies,Vol 38 No 3, p 509-521, SagePub)
Page 22
the American liberal hegemonic order is in crisis. But it is a crisis of
authority within the liberal international order and not a crisis of its underlying principles and
organisational logic. That is, it is a crisis of the American governance of liberal order and not of liberal
order itself. The crisis of liberalism today will ultimately bring forth ‘more liberalism’ . This is true if by liberal
order we mean an open, rule-based relations system organised around expanding forms of
institutionalised cooperation. In this sense, liberal international order can be contrasted with alternative logics of order – blocs, exclusive spheres and closed
geopolitical systems. The future still belongs to the liberal international order. I argue that the
post-Cold War liberal international order is more durable than many think. Russia and China are
not its inevitable enemies. A grand alternative does not exist. To put it sharply: the pathway to the future still runs through
I want to be sceptical of these views. Yes,
institutions and relationships created over the last 60 years. American unipolarity will no doubt eventually give way to something new. Power and authority will shift in the global
the United States and Europe and
rising states – many of which are in Asia – will have more reasons and not fewer reasons to cooperate in open
and rule-based ways. The rest of the article is divided into three parts. Firstly, I will examine the ‘old order’ and highlight its logic and durability. Secondly, I will
assess the sources of crisis. And finally, I will discuss the dilemmas and pathways forward for liberal international order. American-led Liberal International Order Remarkably, we
still live in the international order built by the United States and its allies over a half-century ago. It is
system as they have over the centuries. But rival orders will not emerge – even if new leaders will. In the decades ahead,
a distinctive type of order, organised around open markets, multilateral institutions, cooperative security, alliance partnership, democratic solidarity and United States hegemonic
It is an order anchored in large-scale institutions
leadership.
, which include the United Nations, NATO, the Bretton Woods institutions, the
World Trade Organization, alliance partnerships between the United States and Asian partners, and informal governance groupings such as the G-7/8. In the background, the United
States played a hegemonic role, providing public goods by supporting open markets and the provisioning of security.5
The aff is the 31st case in the decade to deal with international law- can’t send
strong signal
Sloss, Ramsey, and Dodge- Law Profs- August 24, 2010,
David L. Sloss (Santa Clara University - School of Law), Michael D. Ramsey (University of San Diego School
of Law), William S. Dodge (University of California - Hastings College of the Law), The U.S. Supreme Court
and International Law: Continuity and Change,
http://papers.ssrn.com/sol3/papers.cfm?abstract_id=1664773
The twenty-first century’s first decade was an extraordinarily active one for international law in the
Supreme Court, with the Court issuing more than 30 decisions implicating international law. Many
of these decisions came in high-profile cases, and many made important contributions to the Court’s jurisprudence. In
Sanchez-Llamas v. Oregon and Medellin v. Texas, the Court considered the domestic legal status of
treaties and the domestic effects of decisions by the International Court of Justice. It considered the federal judiciary’s
role in applying customary international law under the Alien Tort Statute in Sosa v. AlvarezMachain. In a series of cases including Lawrence v. Texas, Roper v. Simmons, and Graham v. Florida it turned
in part to international law and foreign practice to decide the scope of domestic constitutional
rights. In F. Hoffman-La Roche Ltd. v. Empagran S.A., Morrison v. Australia National Bank and other cases, it used international law
and related principles to constrain the global reach of federal statutes. And in prominent cases arising in the aftermath
of the September 11, 2001 terrorist attacks, the Court grappled with questions of individual rights
and separation of powers in a new kind of international warfare. Many of these decisions were
deeply controversial, provoking strong dissents from Justices not in the majority and strong
criticism from academic and political commentators. Critics and supporters often differed sharply
as to whether the Court’s decisions were faithful to, or a radical departure from, prior precedents .
Indeed, the rhetoric of the criticisms can hardly be overstated: to some, the Court was abandoning a longstanding
commitment to international law; to others, the Court was allowing international law to invade
domestic law at the expense of traditional notions of national sovereignty. To assess the modern Court’s relationship with its
international law past, it is first necessary to understand what has come before. To that end, this volume seeks to provide a complete
account of international law in the Supreme Court’s decisions from the Founding to the present. To assist in this project, we are
fortunate to have assembled a distinguished group of contributors with expertise in international law, foreign affairs law, and legal
Page 23
history. This book will not resolve debates about modern decisions, but we hope that it will inform those debates by providing a better
understanding of the Court’s international law past.
Court is already applying CIL
Sloss, Ramsey, and Dodge- Law Profs- August 24, 2010,
Customary international law’s rebirth in the Supreme Court began with Banco Nacional de Cuba v.
Sabbatino,95 ironically a case that used the act of state doctrine to reject a claim brought under the
international law of expropriation. Sabbatino also expressly disconnected the act of state doctrine from
international law, describing it instead in separation of powers terms. But Sabbatino’s treatment of the act
of state doctrine as federal common law, and its apparent endorsement of the argument that Erie
did not apply to international law, suggested that customary international law might also be
understood as federal common law.96 This question became more pressing towards the end of the
twentieth century with the advent of human rights litigation under the Alien Tort Statute (ATS).
Beginning with Filartiga v. Pena-Irala in 1980,97 lower federal courts used this previously-obscure,
statute as a foundation for suits against foreign officials, and later private corporations, for human
rights abuses. 98 The law these lower courts applied was new, having arisen from the ashes of the
Holocaust. It was also more domestically intrusive than older species of customary international law
because it governed relationships between nations and their own people. In Sosa v. AlvarezMachain,99 the Supreme Court cautiously endorsed the direct application of widely accepted and
specifically defined rules of human rights law under the ATS.100 In answer to the question raised by
Erie, Sosa appeared to treat customary international law as federal common law,101 at least for suits
under the ATS. The extent to which customary international law is federal common law for other purposes
has yet to be worked out,102 but at least to a limited extent Sosa marked customary international law’s
return to the Supreme Court after a long absence. Sosa is remarkable for the attention its opinions pay
to questions of continuity and change. Arguing against the direct application of human rights law, Justice
Scalia pointed to the “avulsive change” wrought by Erie.103 “Post-Erie federal common lawmaking,” he
asserted, “is so far removed from that general-common-law adjudication which applied the ‘law of nations’
that it would be anachronistic to find authorization to do the former in a statutory grant of jurisdiction that
was thought to enable the latter.”104 In reply, the Court’s majority invoked the theme of continuity: “[w]e
think it would be unreasonable to assume that the First Congress would have expected federal courts to lose
all capacity to recognize enforceable international norms simply because the common law might lose some
metaphysical cachet on the road to modern realism.”105
Page 24
No I-Law --- AT: HR
States are rational actors – Human rights laws have ZERO impact on their
behavior
Goldsmith, Law Professor at the University of Chicago, 2K (Jack, “Understanding the Resemblance
Between Modern and Traditional Customary International Law,” Virginia Journal of International Law
Association, Winter, 40 Va. J. Int'l L. 639)
We do not deny that human rights are more salient today than fifty years ago, or that nations take actions
today to redress human rights violations (such as the arrest of Pinochet, or the invasion of Kosovo) that they
probably would not have taken fifty years ago. But these facts do not by themselves demonstrate the efficacy
of the CIL (or other international law) of human rights, n126 as there are many other plausible explanations
for this phenomenon. Contrary to conventional wisdom, international law has long reflected
protections for individuals against the state. n127 These laws had instrumentalist justifications,
sometimes reflecting cooperation, but more reflecting the coercion of powerful nations seeking to promote
security or stability. n128 These latter concerns were made particularly salient by the world wars, and
resulted in an expansion of human rights concerns beyond minority rights to individuals generally. In
addition, changes in technology have affected the enforcement of human rights. Nations have always
been willing to pay, but not willing to pay much, to relieve visible suffering in other countries. n129
Developments since World War II have increased the benefits and lowered the costs of such enforcement.
[*671] The rise of television means that suffering in other countries has become more visible;
ordinary altruists thus gain more by seeing such suffering relieved than in the past, when relief as well as
suffering could be described only in print. Advances in military technology have reduced the cost of
intervening when human rights abuses occur in poor nations. So too have international institutions that
were created to facilitate coordination of security issues, which are also available to coordinate responses to
human rights abuse. This analysis does not deny that citizens of a particular state may feel altruism
toward citizens in other states, particularly those that they see suffering on television. Nor does it deny
that these feelings of altruism count as part of the national interest and may be reflected in a state's policy.
But the state that pursues its interest, so defined, is not motivated by a desire to comply with
international human rights law. As we have stressed, the evidence is precisely the opposite .
If states sought to comply with international norms, which are inherently universalizing, then they
would not enforce human rights selectively. But they do. They incur costs to enforce human rights
only when doing so serves their interests, whether that means an interest in promoting stability in
strategically important states, or an interest in appeasing the selective altruism of domestic interest
groups. V. Conclusion This article has made a methodological point and a substantive point. The
methodological point is that rational choice models provide a fruitful approach to understanding CIL. While
we acknowledge that these models have shortcomings, these shortcomings should not blind one to the
greater inadequacies of traditional international law approaches. As evidence for our view, we offer the
example of the fishing vessel exemption, which should be added to our earlier work on diplomatic immunity,
maritime jurisdiction, and the treatment of neutral trade. n130 The substantive point is not that
international cooperation is impossible, but that it occurs only in limited conditions. We have argued
elsewhere that many of the behavioral regularities called CIL do not reflect meaningful international
cooperation, but rather reflect coincidence of interest or coercion, both of which [*672] lack normative
import. n131 Some behavioral regularities associated with CIL (such as diplomatic immunity) do appear to
reflect genuine cooperation, although this cooperation has a bilateral structure rather than the multilateral
structure assumed by the traditional account. n132 This paper has extended that discussion to the coastal
fishing vessel exemption in the law of prize. There is little evidence that the exemption, whether one wants to
call it CIL or not, is the result of international cooperation. n133 The bulk of the evidence suggests that
nations refrain from seizing fishing vessels when there is no military or economic value in doing so. The
Paquete Habana, an important casebook symbol of the power of CIL, is a hollow shell. This brings us to the
modern CIL of human rights. We deny that modern CIL differs from old CIL in an important way. The
Page 25
essential difference is content: old CIL focused on commercial and military relationships between states;
modern CIL focuses on human rights. But similarities overwhelm this difference. Modern CIL does not
constrain nations any more than old CIL did. When nations decline to violate CIL, this is usually
because they have no reason to violate it. Nations would act no differently if CIL were not
a formally recognized source of law. n134 Modern CIL is mostly aspirational, just as old CIL was. With
old and new CIL alike, nations mouth their agreement to popular ideals as long as there is no cost in
doing so, but abandon their commitments as soon as there is a pressing military or economic or
domestic reason to do so.
Their evidence is just trumped up political rhetoric – U.S. non-adherence to
international human rights treaties and norms has NO impact on other
countries
Moravcsik, Government Professor & Director of the European Center at Harvard, 2 (Andrew,
Multilateralism & U.S. Foreign Policy: Ambivelent Engagement, edited by: Stewart Patrick and Shepard
Forman)
It is often argued that U.S. nonparticipation undermines international human rights institutions, as
well as the global human rights movement. As Patricia Derian asserted before the Senate in 1979:
"Ratification by the United States significantly will enhance the legitimacy and acceptance of these standards.
It will encourage other countries to join those that have already accepted the treaties. And, in countries where
human rights generally are not respected, it will aid citizens in raising human rights issues." Deputy
Secretary of State Warren Christopher went even further, arguing that human rights policy is "a way of taking
the ideological initiative, instead of merely reacting." President Carter himself added that it "might possibly
reverse the tide that has been going against democracies in the past." Many similar quotations could be cited,
since drawing a direct link between U.S. behavior and the effectiveness of international norms has, of
course, a powerful rhetorical appeal. Yet little evidence suggests a close link between U.S. behavior
and international norms, let alone domestic democratization. Everywhere in the world, human
rights norms have spread without much attention to U.S. domestic policy. Under the European
Convention on Human Rights, the Europeans have established the most effective formal system for
supranational judicial review of human rights claims, based in Strasbourg, without U.S. participation. In the
wake of the "third wave" of democratization in Eastern Europe, East Asia, and Latin America,
government after government moved ahead toward more active domestic and international human
rights policies without paying much attention to U.S. domestic practice. Indeed, emerging
democracies in the Western Hemisphere are following Europe's lead in ratifying and accepting
compulsory jurisdiction of a regional human rights court, while ignoring U.S. unwillingness to ratify
the American Convention on Human Rights, let alone accept jurisdiction of a supranational court. One
might argue with equal plausibility that the pride of Latin American democracies in full adherence to the
American Convention on Human Rights is strengthened by the unwillingness of the United States, Canada,
Mexico, and the stable democracies in the anglophone Caribbean to adhere. Likewise, 191 countries have
ratified the CRC in record time without waiting to see what the United States would do. There is little
evidence that Rwandan, Serbian, or Iraqi leaders would have been more humane if the United
States had submitted to more multilateral human rights commitments. The human rights
movement has firmly embedded itself in public opinion and NGO networks, in the United States as
well as elsewhere, despite the dubious legal status of international norms in the United States. In
sum, the consequences of U.S. nonadherence to global norms, while signaling a weakening in
theory, is probably of little import in practice.365
Page 26
Even if their hypocrisy arguments are true, there is no impact – The U.S. can
still be a global human rights leader even if we only selectively ratify human
rights norms
Ignatieff, Carr Professor of Human Rights at the Kennedy School of Government at Harvard, 2 (Michael,
“No Exceptions?,” Legal Affairs, May / June, http://www.legalaffairs.org/issues/May-June2002/review_ignatieff_mayjun2002.msp)
This defense of the United States does not, however, address the charge of hypocrisy. If America wants to be
a human rights leader, the argument goes, it must obey the rules it seeks to champion. Leadership depends
on legitimacy, and legitimacy requires consistency. But it's not clear that the effective use of American
power in fact depends on being consistent, or on being seen by others as legitimate. Perceived
legitimacy eases but it isn't essential to the exercise of power. Being seen as hypocritical or doubledealing may impose some costs on a superpower, but these costs are rarely prohibitive. America has
faced a storm of protest about its treatment of the Guantanamo Bay prisoners—a storm that has led the Bush
Administration to concede that the Geneva Convention should determine which protections Taliban
prisoners (though not Al Qaeda ones) receive. At the same time, the prisoners remain, and are likely to
remain, in American custody and subject to American justice. In another example, Slobodan Milosevic is
in detention in The Hague, thanks in large measure to the pressure of the United States on the
Serbian government. America could exert that pressure despite resisting the creation of a permanent
criminal court with the power to try American citizens. (Milosevic will make much of this resistance to
demonstrate that he is the casualty of victor's justice.) And again, as a matter of equity and ethics, it may be
undesirable for the United States to support international tribunals for others but not for its own citizens. It
is less clear, however, that this prevents American support for these tribunals from being effective. If the
hypocrisy of exceptionalism doesn't prevent the U.S. from promoting human rights abroad, then what's
really at stake is American identity. Those who wish that America didn't except itself, or excepted itself
less often, want the United States to be a certain kind of good international citizen. They want it to be bound,
despite its unique power, by international definitions of a state's responsibility to its own people. This
identity is supposed to make the U.S. more effective by winning over more friends. But it's really about
making America more attractive to itself, a benevolent empire that voluntarily restricts its own sovereignty
for the sake of the greater global good. The problem here is that this benevolent ideal has limited appeal to
the American electorate. To most voters, it makes little sense to say, "Why can't you be more like the
Europeans?" or less plausibly, "Why can't you be more like the Canadians?" In addition, the identity that
internationalists envision is decidedly more liberal than most Americans are comfortable with:
against the death penalty, in favor of a woman's right to choose, in favor of allowing American citizens to be
tried in international courts.
Page 27
AT: FISA Bad --- Needs Warrants
Their privacy arg is hype --- there’s a nuanced compromise between liberty
and terror now
Blum 9 --- attorney for the Department of Homeland Security, M.A. in security studies, J.D. from UChicago
(Stephanie, “ WHAT REALLY IS AT STAKE WITH THE FISA AMENDMENTS ACT OF 2008 AND IDEAS FOR FUTURE
SURVEILLANCE REFORM”, 18 B.U. Pub. Int. L.J. 269, Lexis)//trepka
The need to reconcile domestic intelligence requirements with the protection of civil liberties is a recurring and prominent theme in the
war on terror. While this tension between domestic intelligence gathering and civil liberties can be seen in many contexts since 9/11, this
Article focuses on the Bush administration's Terrorist Surveillance Program (TSP), where the National Security Agency (NSA)
secretly wiretapped Americans without traditional Foreign Intelligence Surveillance Act (FISA) warrants
and the resulting FISA reform legislation culminating in the FISA Amendments Act of 2008 (FAA). In July 2008, the American
Civil Liberties Union (ACLU) filed suit against the FAA arguing that it is unconstitutional; this Article, however,
argues that the FAA is most likely lawful and appears to be a nuanced compromise between the
legitimate need to expeditiously gather intelligence against terrorists and the
protect ion of Americans' civil liberties . In order to draw this conclusion, it is necessary to understand what traditional FISA
requires, how the TSP program departed from that rubric, and how advances in technology and the nature of terrorism have impacted
intelligence gathering. Part I of this Article analyzes the legal framework of domestic spying and discusses the Fourth Amendment, Title
III of the Omnibus Crime Control and Safe Streets Act of 1968, FISA, and changes made to FISA with the USA Patriot Act. Part II
analyzes the Bush administration's warrantless surveillance program and whether, and to what extent, it violated the law. Part III
discusses the challenges posed by terrorism to intelligence gathering and the need for modifications to FISA. Part IV analyzes the FAA of
July 2008 and ponders whether it is just the perception that civil liberties could be eroded, or whether
Americans' civil liberties truly are at risk. Finally, in Part V, this Article argues that in some ways the FAA has not gone far enough in
addressing the underlying problems with conducting surveillance of terrorists and suggests areas for future reform.
Warrants aren’t 4th amendment rights
Fenske 8 --- J.D. Candidate (Dan, “ALL ENEMIES, FOREIGN AND DOMESTIC: ERASING THE DISTINCTION BETWEEN
FOREIGN AND DOMESTIC INTELLIGENCE GATHERING UNDER THE FOURTH AMENDMENT”, 102 Nw. U.L. Rev. 343,
Lexis)//trepka
I. The Evolution of the Warrant and Probable Cause Requirements The
text of the Fourth Amendment does not by its
terms require the government to obtain a warrant before conducting a search n20: [*349] The right of the
people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures, shall not be violated, and
no Warrants shall issue, but upon probable cause, supported by Oath or affirmation, and particularly describing the place to be searched,
and the persons or things to be seized. n21 If
the Framers intended to require warrants - even if only presumptively they could have drafted the Amendment to make that command clear . Instead, they opted for
language that limits the availability of warrants n22: "No Warrants shall issue ... ." This reading
suggests that the Fourth Amendment as understood at the time of its drafting disfavors the use of
warrants. n23 Without the warrant requirement, the touchstone of the Fourth Amendment becomes a
search or seizure's " reasonableness ," which can be assessed by balancing the intrusiveness of the search against the
societal interest in investigating or preventing the particular crime or threat at issue. n24 The
historical
understanding of warrants at the time of the Framing supports the view that the Fourth
Amendment was designed to limit the use [*350] of warrants, not to require them for all searches .
In the pre-revolutionary colonies, a warrant primarily served to insulate a government official from civil liability from a lawsuit
alleging trespass, which was the main method used to punish and deter such a search. n26 Thus, it was not the warrant that determined
the legality of the search, which could have been perfectly acceptable without one. The warrant merely provided a defense at a later civil
action. "Warrants then, were friends of the searcher, not the searched." n27
n25
Page 28
Requiring warrants is unnecessary --- there’s already a ton of exceptions
Blum 9 --- attorney for the Department of Homeland Security, M.A. in security studies, J.D. from UChicago
(Stephanie, “ WHAT REALLY IS AT STAKE WITH THE FISA AMENDMENTS ACT OF 2008 AND IDEAS FOR FUTURE
SURVEILLANCE REFORM”, 18 B.U. Pub. Int. L.J. 269, Lexis)//trepka
I. Legal Background of Domestic Spying A. Fourth Amendment The
Fourth Amendment of the Constitution provides
the foundation for limiting the government's role in collecting domestic surveillance. It protects against
"unreasonable searches and seizures" and requires that warrants be issued only upon "probable
cause." n7 At a fundamental level, it is important to understand that the warrant and reasonableness
requirements are distinct. The Supreme Court has recognized situations where warrants are not
required to conduct a search and seizure because the circumstances are otherwise reasonable ,
and it would be impractical to obtain a warrant. Examples of warrantless searches include the
plain view doctrine , n8 the motor vehicle exception, n9 consensual searches, n10 searches incident
to arrest, n11 and searches in exigent circumstances. n12 [*272] The Supreme Court has further
held that a warrantless search can be constitutional "when special needs, beyond the normal need for
law enforcement, make the warrant and probable cause requirement impracticable ." n13 In
determining whether the "special needs" doctrine applies, the Supreme Court distinguishes searches designed to uncover evidence of
"ordinary criminal wrongdoing" (generally requiring a warrant), and those motivated at a "programmatic level" by other governmental
objectives, n14 such as stops of motorists at roadblocks for the purpose of securing the border or conducting sobriety checkpoints, n15
administrative searches in regulated industries, n16 searches of government employees to test for drugs, n17 and searches of public school
students. n18 In other words, not
every search and seizure requires a warrant. In New Jersey v. T.L.O
the Supreme Court held that the "underlying command of the Fourth Amendment is always
that searches and seizures be reasonable ," and "what is reasonable depends on the context within which a search takes
place." n19 Significantly, for purposes of this article, the Foreign Intelligence Surveillance Court of Review (FISCR) has specifically
held that the government's "programmatic purpose" in obtaining foreign intelligence information is "to
protect the nation against terrorist and espionage threats directed by foreign powers." n20 The
"programmatic purpose" fulfills "a special need" that fundamentally differs from
"ordinary crime control." n21 [*273] Another significant fact about Fourth Amendment jurisprudence is that a
governmental intrusion is only a "search" if it invades a "reasonable expectation of
privacy ." n22 In areas where the Supreme Court has found there to be reasonable expectations of
privacy (such as private conversations), Congress has enacted two significant statutes for purposes of
surveillance: Title III of the Omnibus Crime Control and Safe Streets Act of 1968, n23 dealing with domestic
wiretapping, and the Foreign Intelligence Surveillance Act (FISA), n24 which deals with the collection of foreign intelligence. An
understanding of both of these statutes is fundamental background to analyze and understand what is really at stake with the FAA of
July 2008.
Warrant exceptions disprove their argument
Fenske 8 --- J.D. Candidate (Dan, “ALL ENEMIES, FOREIGN AND DOMESTIC: ERASING THE DISTINCTION BETWEEN
FOREIGN AND DOMESTIC INTELLIGENCE GATHERING UNDER THE FOURTH AMENDMENT”, 102 Nw. U.L. Rev. 343,
Lexis)//trepka
However, the
sheer impracticality of requiring warrants in certain situations led the Court to create a
slew of exceptions to this requirement. n31 As the Katz Court put it: "Searches conducted outside the judicial
process, without prior approval by judge or magistrate, are per se unreasonable under the Fourth Amendment - subject only to a few
specifically established and well-delineated exceptions." n32 Perhaps the
most well known of these [*351] exceptions
Page 29
is for " exigent circumstances ." n33 Under this exception, a warrantless search is constitutional when
obtaining a warrant would be impractical due to an emergency of some sort, such as the need to enter a
dwelling to render aid , n34 to arrest a murderer and search for other accomplices or victims, n35 or to
preserve evidence of a crime . n36 The Court has created so many exceptions to the
warrant requirement n37 that one commentator has asked whether in practice warrants are now the
exception rather than the rule . n38
Page 30
AT: FISA Bad --- Tyranny
FISA averts the worst abuses and can’t be used to try or convict
Blum 9 --- attorney for the Department of Homeland Security, M.A. in security studies, J.D. from UChicago
(Stephanie, “ WHAT REALLY IS AT STAKE WITH THE FISA AMENDMENTS ACT OF 2008 AND IDEAS FOR FUTURE
SURVEILLANCE REFORM”, 18 B.U. Pub. Int. L.J. 269, Lexis)//trepka
C. Foreign Intelligence Surveillance Act of 1978 In 1978, Congress enacted FISA to deal with the unresolved issue of gathering foreign
intelligence (solely domestic intelligence is still governed by Title III). For decades, presidents had conducted electronic surveillance for
national security purposes without a warrant. Indeed, wiretaps for such purposes were authorized by presidents at least since the
administration of Franklin Roosevelt in 1940. n39 In
the 1960s, Presidents Johnson and Nixon used the agency to
listen in on hundreds of Americans , including Vietnam War protesters and the Rev. Martin
Luther King Jr. n40 During the Watergate scandal in the 1970s, President Nixon relied on national security concerns to hide
his wiretapping of domestic political opponents . n41 Between 1975-1976, the Church Committee did an exhaustive
inquiry into domestic spying and discovered (1) that the FBI had conducted 500,000 investigations into
alleged subversives from 1960-1974; (2) that the CIA had engaged in widespread mail-openings in the United States; (3) that
Army intelligence operatives had conducted secret inquiries against 100,000 U.S. citizens opposed to the Vietnam War; (4) that the NSA
monitored every cable sent overseas or received by Americans from 1947 to 1975; and (5) that the NSA conducted surveillance of
telephone conversations of an additional 1680 citizens. n42 All these aforementioned acts were taken with
no judicial
oversight. As a result of these governmental abuses of civil liberties, and as a result of the Keith decision that suggested
that the rules for gathering intelligence may be different than the rules for law enforcement, in 1978 Congress enacted FISA
to replace presidentially ordered surveillance of national security threats and to reign in politically motivated surveillance. n43 FISA
provides a statutory framework for the U.S. government to engage in electronic surveillance and physical
searches n44 to obtain "foreign intelligence information ," which generally encompasses [*276]
evidence of terror ism, espionage , and sabotage . n45 Like Title III, FISA surveillance can target
U.S. citizens as well as foreign nationals inside this country, but provides simplified procedures for obtaining and
executing warrants for both electronic surveillance and physical searches. FISA allows wiretapping of aliens and citizens in the U.S.
based on a finding of probable cause to believe that the target is a member of a foreign terrorist group or an agent of a foreign power. n46
Significantly, unlike
Title III which requires a finding of probable cause that the search will reveal evidence of a crime, under
FISA the government only needs to establish probable cause that the target is a member of
a foreign terrorist group or an agent of a foreign power. This lower threshold for conducting
surveillance under FISA reflects the inherent differences between obtaining surveillance for
intelligence (e.g. prevention) purposes, as opposed to obtaining evidence to be used to convict an individual in a
court of law. Although the Supreme Court has not ruled on the constitutionality of FISA, several lower courts have
upheld its constitutionality even without traditional probable cause, because "governmental
interests in gathering foreign intelligence are of paramount importance to national security, and
may differ substantially from those presented in the normal criminal investigation." n47
Page 31
AT: Rule on Katz
Doesn’t apply --- national security
Blum 9 --- attorney for the Department of Homeland Security, M.A. in security studies, J.D. from UChicago
(Stephanie, “ WHAT REALLY IS AT STAKE WITH THE FISA AMENDMENTS ACT OF 2008 AND IDEAS FOR FUTURE
SURVEILLANCE REFORM”, 18 B.U. Pub. Int. L.J. 269, Lexis)//trepka
Pursuant to the 1967 Supreme Court case Katz v. United States, in order to conduct electronic surveillance of
one's private conversations, a government agent must obtain a warrant from a judicial officer based on
probable cause that criminal activity will be revealed, and the warrant must adhere to the Fourth Amendment's particularity requirements
specifying the place to be searched.
The Court in Katz, however, explicitly declined to extend its holding
to cases "involving the national security." In 1968, Congress passed Title III of the Omnibus Crime Control and Safe
n25
n26
n27
Streets Act of 1968 (Title III) to regulate domestic electronic surveillance to meet the Fourth Amendment's particularity requirements. n28 Congress enacted
Title III to ensure that if the government obtained evidence pursuant to this statutory rubric, it would be admissible in court. Title III only allows
wiretapping for certain enumerated crimes, limits the time period for the surveillance, requires minimization procedures to limit eavesdropping on innocent
parties, and requires reporting to the court on the results of the surveillance. n29 In order to obtain a Title III warrant, the government official must also
explain whether other investigative methods would produce the same results and specify the facilities and communications sought to be intercepted. n30
Title III specified that none of its provisions would "limit the constitutional power of
the President to take such measures as he deems necessary [*274] to protect the Nation against
actual or potential attack or other hostile acts of a foreign power, to obtain foreign intelligence information deemed essential to the security
of the United States," or "limit the constitutional power of the President to take such measures as he
deems necessary to protect the United States against any clear and present danger to the structure or
existence of the Government."
These caveats seemed to suggest that "national security" wiretaps in both
domestic and international investigations could continue outside the parameters of Title III. In 1972, however,
Significantly,
n31
during the Vietnam War, the Supreme Court held in United States v. United States District Court (Keith) that the president had no constitutional power to
conduct warrantless surveillance of domestic individuals and organizations that have "no significant connection" to a foreign power. n32 In Keith, the
defendants were accused of trying to bomb a CIA office in Ann Arbor, Michigan, but there was no connection to a foreign power or entity. The Supreme
Court held that surveillance of domestic targets - even under circumstances of "clear and present" danger - is unconstitutional without a judicial warrant
the Supreme Court left
open the possibility that the president may have authority to conduct warrantless
surveillance of foreign powers and their agents . (This understanding was the primary basis for President Bush's
ordering NSA to conduct warrantless wiretapping post 9/11. ) Significantly, after Keith, every federal appeals court to address the
issue, including the FISCR, has concluded that the president has the inherent authority to conduct
warrantless surveillance to gather foreign intelligence.
based on probable cause, and meeting the particularity requirements of the Fourth Amendment. n33 Nonetheless,
n34
n35
n36
Page 32
AT: Rule on Keith
Keith doesn’t ban domestic searches without warrants
Fenske 8 --- J.D. Candidate (Dan, “ALL ENEMIES, FOREIGN AND DOMESTIC: ERASING THE DISTINCTION BETWEEN
FOREIGN AND DOMESTIC INTELLIGENCE GATHERING UNDER THE FOURTH AMENDMENT”, 102 Nw. U.L. Rev. 343,
Lexis)//trepka
Despite its sweeping rhetoric attesting to the need for full Fourth Amendment protections in
the domestic security context, the
Keith Court opened the door to a relaxed constitutional requirement.
Court found that because the "exact targets ... may be more difficult to identify "
n75 in domestic surveillance than in ordinary crime control, Congress could enact legislation that placed different controls on the
In particular, the
domestic intelligence-gathering machinery than on normal criminal investigations, subject only to the Fourth Amendment's
reasonableness requirement. Congress, however, has not taken the Court up on its offer.
Page 33
AT: Warrants Good --- Dissent
They’ve got it backwards
Fenske 8 --- J.D. Candidate (Dan, “ALL ENEMIES, FOREIGN AND DOMESTIC: ERASING THE DISTINCTION BETWEEN
FOREIGN AND DOMESTIC INTELLIGENCE GATHERING UNDER THE FOURTH AMENDMENT”, 102 Nw. U.L. Rev. 343,
Lexis)//trepka
One of the principle reasons the Keith Court declined to extend the warrant exception to the domestic
intelligence context is the perceived deleterious impact surveillance can have on political dissent. Put
simply, the government's search power could be used to squelch legitimate political opposition. n149 However, this argument ignores
the historical abuse of warrants to further political oppression. It also fails to account for the
fact that criminal law in many cases allows the government to obtain a warrant to search
political groups on the pretext of seeking evidence related to a minor offense , thus actually
enabling searches designed to squelch political dissent. The idea that warrants protect against
political suppression is strange given the historical abuse of warrants by the government and the
resulting distrust of them by the public:
The British Crown employed general warrants to quash political dissent in England as early
as the sixteenth century. The warrant was used against the [*369] press, and authorized both the government and private persons to "seize, take hold and
burn ... books and things ... offensive to the state." n150
Even warrants issued by the judicial branch were viewed as a
mere extension of the Executive's authority , both before and after the adoption of the Fourth Amendment.
As such, the idea that warrants will prevent, rather than further , political oppression is peculiar in
light of the history surrounding the Fourth Amendment. Despite the lack of historical pedigree for this argument,
n151
warrants could theoretically prevent political oppression. By interposing a neutral judge prior to a search that might implicate free speech concerns, the
likelihood that the executive branch will impermissibly suppress such protected speech will be decreased. n152 Much like the argument that warrants prevent
racial discrimination, however, this contention is flawed. First,
a warrant requirement only protects the speech of political
dissenters if the official conducting the search knows she will answer for any failure to obtain a
warrant. In the intelligence context, however, it is likely that a significant portion of intelligence
activity will never be used in a criminal prosecution . As a result of this, and of the
unlikelihood that a subject who is not criminally prosecuted will ever learn about
clandestine intelligence activity directed against her, an intelligence officer is not deterred from
engaging in illegal intelligence gathering without a warrant. n153 The warrant requirement is as powerless here as it is in the
racial discrimination context. n154 Moreover, in those instances where an officer believes that the information she
uncovers will be used in a criminal proceeding, she also knows that she will have to justify the
search before a court. If the courts are concerned with the stifling of political dissent - as they
should be - they can require a higher showing during after-the-fact review of the justification for
the search in these situations. The reasonableness paradigm of the Fourth Amendment should take into account the legitimate political
activities of the subject of a search as weighing against the government's need for information. n155 In this instance, then, it is the
reasonableness requirement - [*370] not warrants - that stands between the citizen and illegal or
abusive surveillance .
Page 34
AT: Warrants Good --- Race
Nope --- structural disincentives check
Fenske 8 --- J.D. Candidate (Dan, “ALL ENEMIES, FOREIGN AND DOMESTIC: ERASING THE DISTINCTION BETWEEN
FOREIGN AND DOMESTIC INTELLIGENCE GATHERING UNDER THE FOURTH AMENDMENT”, 102 Nw. U.L. Rev. 343,
Lexis)//trepka
This is not to say that racial, ethnic, and religious discrimination are not possible concerns in the
intelligence-gathering arena. Evidence of racial discrimination, however, likely would lead an intelligence
search to be deemed unreasonable under the Fourth Amendment. n132 This is true not only because of
the tremendous costs borne by victims of discrimination but also because the search furthers no
legitimate government objective : discrimination merely wastes resources that could be put to more productive use. n133
Because discrimination is wasteful , properly managed and accountable intelligence agencies have
an incentive to avoid harassing minorities via illegitimate intelligence activities. The costs of racial
discrimination when searches are conducted by well run intelligence-gathering agencies, therefore,
are likely to be muted .
Data mining is evenly distributed
Fenske 8 --- J.D. Candidate (Dan, “ALL ENEMIES, FOREIGN AND DOMESTIC: ERASING THE DISTINCTION BETWEEN
FOREIGN AND DOMESTIC INTELLIGENCE GATHERING UNDER THE FOURTH AMENDMENT”, 102 Nw. U.L. Rev. 343,
Lexis)//trepka
The political process can also protect against discriminatory abuses. First, any search regime that is
spread out over the whole of the population - such as data-mining operations to search all
electronic communications for certain words that would indicate a connection to terrorism - ensures that its costs are
borne by the majority of people . n143 As a result, the majority will pressure elected officials in the legislative and
executive branches to narrowly tailor or eliminate the program. n144
The public outcry over the disclosure of the
existence of an NSA database containing millions of Americans' phone records proves this point
too well . n145 Because the political process works in this context, courts do not need to conduct searching review of executive
action.
Page 35
Courts Mini-DAs
Page 36
Court Clog DA
Page 37
1NC Link
Court clog
Citron and Gray 13 (Danielle, Lois K. Macht Research Professor of Law, University of Maryland
School of Law; Affiliate Scholar, Stanford Center on Internet and Society; Affiliate Fellow, Yale Information
Society Project, David, Associate Professor of Law, University of Maryland School of Law, “Addressing the
Harm of Total Surveillance: a Reply to Professor Neil Richards” // AKONG)
Richards proposes to grant individuals standing to challenge governmental surveillance.81 Putting concerns about the constitutionality
of such a challenge aside, his
proposal may raise practical problems. Granting individuals standing
to challenge governmental surveillance of them would overwhelm the courts. There are not
enough judicial resources to adjudicate three hundred million such suits, each of which
could be renewed — almost as soon as it is resolved — on nothing more than suspicion of
continued surveillance because the focus, under Richards’s approach, is on what
information is being gathered. The possibility of a class action would not help matters because individual issues of harm
attached to what particular information is gathered would predominate.82 Suits are also bound to be met with claims of national
security interest, to which courts routinely show considerable deference.83 For example, in litigation involving police surveillance of
protestors at the 2004 Republican National Convention, the Second Circuit refused to allow discovery of officers’ field reports, even in
re- dacted form, because they would reveal information about undercover operations and thus potentially hinder future ones.84
Page 38
2NC AT: Class Action
The aff sends a signal that suits regarding government surveillance will
succeed
Correia 15 (Evan, J.D. Candidate, May 2015, Temple University Beasley School of Law, “NOTE &
COMMENT: PULLING BACK THE VEIL OF SECRECY: STANDING TO CHALLENGE THE
GOVERNMENT'S ELECTRONIC SURVEILLANCE ACTIVITIES” // AKONG)
Granting individuals standing to challenge governmental surveillance would overwhelm
the courts. n293 There are simply not enough judicial resources to adjudicate the
approximately three hundred million suits this proposal could potentially generate. n294
Moreover, each of these suits would have the potential to be renewed almost as soon as it is
resolved based on nothing more than suspicion of continued surveillance because their
focus is on the information being gathered. n295 [*213] The possibility of a class action suit would
not stem the flow if individual lawsuits either because individual issues of harm concerning what
particular information is gathered would predominate. n296
Page 39
Court Legitimacy DA
Page 40
1NC Court Legitimacy DA
Turn – Legitimacy: The plan shreds the legitimacy and independence of the
courts.
Yoo, Law at Berkeley, 97 (John, Law Professor at Berkeley School of Law, “Federal Courts as Weapons of
Foreign Policy: The Case of the Helms-Burton Act,” Hastings International & Comparative Law Review, V.
20:747)
certain types of cases can place demands on the integrity of the federal
courts as well as on their capabilities. My colleague Paul Mishkin has argued that structural injunctions call upon the courts to employ procedures that
undermine the impartiality of the federal judiciary.71 In setting spending priorities for state governments, allocating state resources, and deciding on policies, federal
courts can lose their objectivity and become actors in the political process and in the case itself.72 As cases move into the
remedial stage, federal courts may lose their sense of detachment and become more interested in effective management of the defendant's conduct and of the overall remedy. An
intrusive judiciary, and the failure or shortcomings of its remedies, may breed a lack of confidence in, or even a lack of respect for, the
legitimacy of the federal courts. To be sure, there are a great many differences between structural injunction and foreign relations cases. Nonetheless, suits under
Structural remedies also indicate that certain roles and
Title III of Helms-Burton could invite similar problems. To adjudicate a Title III suit, a federal court will have to determine facts and causation that occurred more than 30 years ago
in another country. Information on the events producing an expropriation may be hard to discover and may be of doubtful reliability, due to the termination of diplomatic and
economic relations between the United States and Cuba. Courts may have to reconstruct complex financial transactions and chains of ownership among many different companies
from many different nations that stretch back to the early 1960s. Courts may need to make sensitive judgments about the political relationships and decisions not just of the present
The Supreme Court long has recognized that adjudicating claims arising from events
and policies abroad present unique problems for the federal courts. In its political question cases, the Court has described its
day, but of the 1960s, 1970s and 1980s.
unwillingness to hear foreign relations cases both because the foreign affairs power is vested in the other branches, and because the judiciary is functionally ill-equipped for the task.
[s]uch decisions are wholly confided by our Constitution to the political departments of the
They are delicate, complex and involve large amounts of prophecy... They are
decisions of a kind for which the Judiciary has neither aptitude, facilities nor responsibility ... "n While the
As Justice Jackson wrote, "
government, Executive and Legislative.
political question doctrine does not apply to Helms-Burton, these concerns about judicial competence ought to be taken into account in evaluating how Title III will operate and
whether it will succeed. Further, as with structural injunctions, Title III remedies may create significant institutional problems for the judiciary. Defendants are likely to have most of
their assets abroad, which would leave the court with little property to attach in order to enforce its judgments. Enforcing judgments abroad is not easy; as the Supreme Court
recognized long ago in Hilton v. Guyot, "[ajs an act of government, [a judgment's] effects are limited to the territory of the sovereign whose court rendered the judgment, unless some
other state is bound by treaty to give the judgment effect in its territory, or unless some other state is willing, for reasons of its own, to give the judgment effect."74 As the United
States has not entered into any international agreements on the enforceability of its judgments abroad, no other nations have a binding obligation to enforce a Title III judgment
against their own nationals.75 These difficulties are only compounded when the foreign nations disagree with the policy of the law that gave rise to the liability, to the extent that they
even enact "clawback" legislation that allows their corporations to sue in their domestic courts to recover awards rendered under American laws.76 Current disagreement with
Such ineffectiveness serves to dilute
public respect for the federal courts, which, as Alexander Hamilton noted in Federalist No. 7S, "have neither Force nor Will, but merely judgment."77 If Title
III leaves the judiciary in the position of issuing judgments that none expect to be enforced, it enhances an image of powerlessness on the part of the courts. It may dilute
the institutional capital of the courts in more important areas (such as constitutional rights), in
which judges must depend on public respect to enforce counter-majoritarian decrees.73 Although
considerations of political capital should not prevent the courts from exercising jurisdiction when the Constitution or federal law require it," they
should inform policy decisions on whether to expand federal jurisdiction in the first place. Powerlessness is not the only
Helms-Burton abroad may mean that few judgments rendered under Title III will be capable of enforcement.
threat to judicial authority. My colleague Martin Shapiro has written that courts in several different cultures possess certain shared characteristics that enhance their social legitimacy,
and hence the willingness of parties and the public to accept their judgments.85 Although courts deviate in different ways from this ideal model, courts essentially find their
As the
adjudicators become less neutral and more a part of the machinery of the state and of the political system,
they lose their legitimacy. "When we move from courts as conflict resolvers to courts as social controllers, their
social logic and their independence is even further undercut. For in this realm, while proceeding in the guise of triadic conflict resolver, courts
clearly operate to impose outside interests on the parties."31 Ironically, granting the courts too much of a certain type of power—that of
enforcer of public policy-also has the effect of threatening judicial integrity. Title III of Helms-Burton may prove to be a
good example of this tension between a court's duty to resolve conflicts on the one hand, and to pursue public policy on the other. In the foreign relations area, a
cause of action is more likely to be seen as a tool for the advancement of a specific public goal,
rather than as the correction of an injustice or inequity. In other words, courts will be acting as instruments of
the national government, even of the State Department, rather than as neutral decisionmakers engaged in conflict resolution. The
legitimacy in the "logic of the triad," as Professor Shapiro describes it—the idea that two parties in conflict refer their dispute to a third, neutral party for resolution.
U.S. House Committee on International Relations made this clear with regard to Title III when it declared that the "purpose of this new civil remedy is, in part, to discourage persons
and companies from engaging in commercial transactions involving confiscated property, and in so doing to deny the Cuban regime the capital generated by such ventures and deter
the exploitation of property confiscated from U.S. nationals."82 Usually, these international relations goals would be achieved by the imposition of economic sanctions by the
executive and legislative branches, rather than through a cause of action in federal court.
Enlisting the judiciary to achieve these purposes encourages a
Page 41
perception of the federal courts as interested implementers of American foreign policy, which will
undermine the legitimacy of the federal courts and of their judgment in the eyes of the public and
of our allies. Judicialization of Cuba policy raises yet another threat to judicial independence. We have discussed the problems that arise both from the frustration of
judicial remedies and from the perception of courts as merely arms of the state. Again as with structural injunctions, a third difficulty may arise when a class of cases calls for a change
in the role of the individual judge. In structural injunctions situations, it will be remembered, judges can lose their objectivity and impartiality as they become interested players in the
political give-and-take that occurs in remedial proceedings. Helms-Burton might produce a similar problem by placing judges in the difficult position either of executing American
foreign policy or of flouting national security concerns. In ruling on the merits of a Title III case, judges may not find it easy cither to put aside their patriotism or to ignore popular
support for Cuba sanctions. The price, however, of giving in to these temptations may be the further loss of neutrality and of legitimacy on the part of the courts. Judicialization of
Cuba policy also will transfer the political bargaining and confrontation that occurs over foreign policy from the Congress and the White House to the courtroom. In the structural
the expansion of the courts' remedial power over
injunction context,
some of the basic decisions of state government, such as budget, tax, and
educational policy resulted in the transformation of the judicial process into a forum for the allocation of resources and the development of public programs.'*3 A similar prospect
foreign policy
may lie in store for the federal courts if the enforcement of
—in this case Cuba policy-becomes the goal of litigation. For example, in Barclays Bank PLC v.
Franchise Tax Board of California?4 a case which challenged the constitutionality of California's tax on multinational corporations, amicus briefs were entered by the United
Kingdom, the European Community, Banque Nationale de Paris, the Confederation of British Industry, the Council of Netherlands Industrial Federations, the Federal of German
Industries, the Japan Federation of Economic Organizations, the Japan Tax Association, Reuters, the U.S. Chamber of Commerce, and dozens of American states." Instead of fighting
in Congress and the executive branch for a different international economic policy, these parties transferred their disputes to a judicial forum because of the Court's jurisdiction over
may breed
politicization, which in the long run would do great harm to the institution of the judiciary.
dormant commerce clause cases. A similar result may occur when Cuba policy becomes a regular subject for federal lawsuits. Judicialization
That undermines judicial independence and the legitimacy of the court
O’scannlian, Federal Judge on the 9th Circuit Court of Appeals, 6 (Diarmuid, “On Judicial Activism:
Judges and the Constitution Today,” Open Spaces Quarterly, volume 3, Number 1, http://www.openspaces.com/article-v3n1-oscannlain.php)
A judge, however, is not expected to act on any person's behalf or pursuant to anyone's direction. Indeed, he must do precisely the opposite
in his official role, spurning not only personal affinities but all communication outside of the courtroom. Even if we were to conceive of a judge as a peculiar kind of agent, one that is
charged with acting without concern for his master, the judge-as-agent could be brought to heel by his master when he is derelict in his duties, however they are framed. That is, the
it is exactly the lack of oversight that makes the judicial office
remarkable. If judges fit easily into the framework of the democratic republic, it is not because they are indirectly representative of the popular will. In my view, judges
fit into our democratic framework not because they choose to exercise their power in popular ways but because they do not actually
exercise personal power at all. Alexander Hamilton captured this idea succinctly with his observation that federal judges have neither force nor will, only
judge would be subject to effective oversight. Nevertheless,
judgment. Unlike executing the law, which is the President's role, or making the law, which is the Congress's, judging is a passive process. A judge confronts the law as it is written and
the facts as they have been placed in evidence. His power may be great over the parties before him, but almost none of it-if exercised properly-can be exerted to advance a judge's own
objectives. It is to guarantee this neutrality that he is given independence. Consider a criminal case. Congress enacts a statute that makes certain conduct a crime and provides a
punishment. Someone violates that law. The Attorney General, who is the President's appointee, then prosecutes. Only upon the confluence of these events does the judge become
involved. With the government and the defendant before him, the judge evaluates whether the specific acts committed by the defendant fall within the ambit of the statute. Whereas
the Congress had broad latitude in formulating the substance of the statute and the President and his officers had significant discretion in their selection of targets and enforcement
strategies, the judge has almost no discretion over the course and outcome of the prosecution. If the law has been correctly enforced against the defendant, the judge must announce
the defendant's conviction; conversely, if the law has not been correctly enforced against the defendant, the judge must acquit. The role of the judge is thus limited to determining
whether the law has been enforced "correctly." This determination is traditionally conceptualized as having two elements. First, the relevant facts must be wholly and accurately
established; second, the law must be faithfully applied to the relevant facts. The skeptic will wonder how it is that the judge can be thought to be any more intrinsically "accurate" or
"faithful" than the prosecutor who comes before him. That is a fair question, and it gets to the heart of the role of the judge. Those terms are meant to depict the consequences of the
decision-making process rather than any metaphysical qualities of the decisions themselves. That is, judicial determinations are presumed to be accurate and faithful exactly because
they are made by someone acting solely as a judge: a person who is new to the dispute (and thus without any vested interest in the outcome), is drawing conclusions through due
process of law in the context of an open and adversarial presentation (in contrast to a one-sided investigation), and is independent (not answerable to the President or Congress).
This presumption, it should be emphasized, does not rest on some unsubstantiated premise that judicial decisions are by their nature good decisions. That is to say, the argument is
not that a decision is "good" because it is made by someone who acts like a judge; rather, a decision is "good" because it is made within an accuracy-enhancing procedure, and judicial
decisions also tend to be "good" because that same procedure is the one that judges use. The Supreme Court has expressly acknowledged that the marginal improvement secured by
this procedure can have constitutional significance even in the context of decisions that are not traditionally reserved to judges. In the 1970 case of Goldberg v. Kelley, the Court
concluded that a state could not constitutionally terminate benefits to a welfare recipient without an adversarial hearing. In prescribing the indispensable elements of the
constitutionally mandated pre-termination proceeding, the Court stated: "The fundamental requisite of due process of law is the opportunity to be heard." The hearing must be "at a
meaningful time and in a meaningful manner." In the present context these principles require that a recipient have timely and adequate notice detailing the reasons for a proposed
termination, and an effective opportunity to defend by confronting any adverse witnesses and by presenting his own arguments and evidence orally. These rights are important in
cases such as those before us, where recipients have challenged proposed terminations as resting on incorrect or misleading factual premises or on misapplication of rules or policies
to the facts of particular cases. The Court's observations underscore the importance of several attributes that are intrinsic to judicial decision-making but typically absent from
executive and legislative decision-making: a neutral arbiter, written notice to the concerned parties, confrontation of adverse witnesses, and opportunity for oral argument.
Unsurprisingly, the Court found these attributes to be critical when rules are applied to "the facts of particular cases." The constitutional underpinnings of the Supreme Court's
decision in Goldberg v. Kelly remind us of an essential element of the judicial inquiry into whether the law has been faithfully applied. Judges must consider not just the relevant
statute whose vindication the executive specifically seeks, but also the procedural and substantive provisions of law that protect individuals from governmental misconduct and
overreaching. In short, judges must ensure that the statute at issue does not, in either its enactment or its enforcement, invade that sphere of constitutional liberty preserved for the
individual. Law and liberty will inevitably conflict. Every individual at his liberty may do anything he is physically capable of doing. An individual under law, however, may do only
what the law has not proscribed, and this will certainly be less than what the individual might otherwise do. Thus, an individual cannot enjoy absolute liberty under the rule of law.
In this light, the rule of law seems distinctly unattractive. Even in that most salubrious of states, the democratic republic, absolute liberty is lost-subsumed to the will of one's
community. The loss of some liberty, however, can improve the value of the remainder. As Thomas Hobbes persuasively observed some three hundred and fifty years ago, too much
liberty results not in happiness but despair: [D]uring the time men live without a common power to keep them all in awe, they are in that condition which is called war, and such a
war as is of every man against every man. . . . In such condition there is no place for industry, because the fruit thereof is uncertain: and consequently no culture of the earth; no
navigation nor use of the commodities that may be imported by sea; no commodious building; no instruments of moving and removing such things as require much force; no
knowledge of the face of the earth; no account of time; no arts; no letters; no society; and, which is worst of all, continual fear and danger of violent death; and the life of man solitary,
poor, nasty, brutish, and short. In the face of such a prospect, we are only too happy to surrender some of our liberty to law. We continue to wonder, however, just how much liberty
we should be surrendering. Too much liberty results in life that is "nasty, brutish, and short," but, as the lives of people in the totalitarian states of the twentieth century made
painfully clear, too much law is no better. One can view the guarantees of individual rights in the Constitution as our nation's documented consensus on where to draw the limits of
law. At the Founding, we viewed the Constitution and the Bill of Rights as constraining the scope of the national government almost exclusively. That government, imperious and
remote, seemed more likely to capitalize upon our collective abdication of individual liberty in a way that would degrade our lives rather than enhance them. We were understandably
Page 42
loath to abdicate too much. At the same time, however, we left to the states relatively unfettered authority to intrude into spheres that we now consider inviolably personal. Most
states lacked provisions analogous to the federal Bill of Rights. Our consensus on the appropriate limits of the law changed, however, by the end of the Civil War. During
Reconstruction, congressional Republicans sought to prevent the reemergence of the sort of oppressive state law that had been increasingly relied upon to prop up slavery in the antebellum South. The Republicans thus proposed and spearheaded the ratification of the Fourteenth Amendment, whose terms imposed upon the states most of the provisions of the Bill
of Rights. As a result, the line between law and liberty encroached further on the power of the state and gave individual liberty a wider scope. The constitutional compromise between
law and liberty has always been subject to dispute. Many people believe that the government is much more substantially limited in what it may do than is apparent on the face of the
Constitution. Others contend the opposite. Occasionally, the dispute has resulted in the revision of the Constitution, as with the Fourteenth Amendment; most of the time, however,
the judge in any given case must prevent a
partisan in the dispute from getting the upper hand. In short, the judge must defend the constitutional
compromise between law and liberty as memorialized in the text of the Constitution itself. To alter the compromise (or to allow it to be altered) is not
no such revision has occurred. In discharging his duty to determine whether the law has been faithfully applied,
faithfully to apply the Constitution but to amend it-to usurp a power reposed exclusively in the people of the United States. Preserving the constitutional compromise between law
and liberty requires federal judges to defer to the legislative and executive branches on all issues properly within the realm of the law. If the text of the Constitution does not preclude
the government's action, the judge must uphold it. He must do so even if the government's action is patently unfair or plainly inappropriate, for determining that something is
the power to direct
government action pursuant to one's own will is precisely the power that a judge lacks. The judge's
duty to apply the law faithfully demands that he do more than merely defer to the political branches of government when they permissibly exercise
governmental power. The very concept of law requires the judge to apply it in a manner that is both predictable and uniform.
"unfair" or "inappropriate" without an independent standard for fairness or appropriateness requires an exercise of sheer will. And
Predictability ensures that everyone knows what the law is at any given point in time. Uniformity ensures that the law is applied in the same way by any judge to any party anywhere
When a judge is swayed by his own sentiment rather than considerations of deference, predictability, and uniformity,
he fails by definition to apply the law faithfully. This is the essence of judicial activism. It is impossible to say with certainty in any given case that the
in the country.
judge's sentiments will lead him to a "bad" decision, but no one could say that they never would. Any of us would appreciate a judge's merciful departure from a draconian law. How
many of us, though, would appreciate a judge's draconian departure from a merciful law? The remedy for a bad law is to change the law through legislative action, not to depart from
it one way or the other in the courts. The solution, in short, is democracy-the political process-and not judicial activism. Judicial activism is not always easily detected, because the
critical elements of judicial activism either are subjective or defy clear and concrete definition. For instance, a critical consideration is the state of mind of the allegedly activist judge.
Judicial activism means not the mere failure to defer to political branches or to vindicate norms of predictability and uniformity; it means only the failure to do so in order to advance
another, unofficial objective. Occasionally, the fact that a judge has an ulterior motive is evident, but oftentimes it is not. We are left to infer the existence of an ulterior motive from
the relative distances that separate the judge's actual decision from the decision that would have been correct and the one that would have most perfectly accorded with the judge's
personal sentiments. This gives rise to another difficulty in detecting judicial activism, which is that we must establish a non-controversial benchmark by which to evaluate how far
from the "correct" decision the supposedly activist judge has strayed. Occasionally this, too, is easy-but not always. Because of the inherent difficulty in detecting judicial activism with
any certainty, many activist decisions may pass without significant criticism and many others may be labeled by particularly sensitive commentators as "activist" when they are not.
Perhaps the most notorious instance of judicial activism is captured in the century-old Supreme Court case, Rector of the Holy Trinity Church v. United States. Congress had enacted
a statute declaring that it shall be unlawful . . . in any manner whatsoever, to prepay the transportation, or in any way assist or encourage the importation or migration, of any alien . .
. into the United States . . . to perform labor or service of any kind. Because the defendant church had contracted with an English clergyman to come to New York City to serve as
rector, the government brought suit under this statute. Both the trial and appellate courts ruled that the Church had violated the law. The Supreme Court disagreed. After observing
that "this is a Christian nation," Justice Brewer reached the remarkable conclusion for the Court that religious ministry could not have been the "labor or service of any kind" that
Congress had intended to proscribe. Justice Brewer plainly thought, and all of his brethren agreed, that his departure from the statute did nothing but benefit the American people.
Even if it was well received at the time, the Court's characterization of the country might not be so benignly received today, particularly as the basis for departing from a statute duly
enacted by our democratically elected representatives. The problem with the Court's decision was that it undermined the predictability and uniformity of the law. Before the Supreme
Court ruled, the statute was clear; afterwards, no one could predict its true scope. Moreover, lower courts would now be free to apply whatever exemptions they, too, thought Congress
Judicial activism
might have intended, regardless of the language Congress actually enacted.
can have consequences that are far more profound than the unregulated
immigration of nineteenth-century English rectors. When applied not simply to arcane statutes but to the United States Constitution-the foundational document of our Republic-
works a seismic shift in the balance between government and individual
judicial activism inevitably
and has often done so
on divisive questions. Take, for example, the question of whether an individual's decision to end his own life is beyond the power of the government to regulate. After the people of
the State of Washington rejected the ballot measure at the polls, several Washington residents brought suit and invited judges to give them what the legislative process would not: a
governmentally enforceable right to assisted suicide. The United States Court of Appeals for the Ninth Circuit, which includes Washington and eight other Western states, eventually
ruled for the plaintiffs, declaring that the Constitution guaranteed each of them a "right to die." This decision, though purportedly compelled by the federal Constitution, rested upon
nothing written in that document. Eight judges of the eleven-judge panel hearing the case simply promulgated a new constitutional right, one unheard of in over two hundred years of
American history. The Supreme Court, in Washington v. Glucksberg, recognized the Ninth Circuit's decision for the rejection of democracy that it was and unanimously reversed, but
not before rivers of ink had flowed in celebration or condemnation of a judgment that seemed intrinsically more political than judicial. Perhaps the outcome reached by the Ninth
Circuit was the better policy, arguably someone who is terminally ill and wants to end his life really should not have to act alone. It is certain that many people other than the plaintiffs
in the Glucksberg case thought so. Even if it were true, which seems rather difficult to ascertain in any objective sense, this belief does not establish that the court made the right
decision, because the court was wrong to make the decision at all. Readers who resist this conclusion need only look at the experience of the people of Oregon. Unlike their northern
neighbors, a majority of Oregonians went to the polls only a couple of years later and enacted a law giving a terminally ill individual the right to physician-assisted suicide.
Nevertheless, just like their northern neighbors, the people of Oregon were rebuked by a federal court declaring that they had overstepped the scope of governmental authority. In
that case, entitled Lee v. Oregon, a federal judge held that in his view there was "no set of facts" in which Oregon's newly enacted assisted suicide law could be considered "rational."
That conclusion must have come as quite a surprise to the thousands upon thousands of Oregonians who voted for the law. Surely, the conclusion must have unsettled the view of the
eight Ninth Circuit judges who had previously joined together in declaring that the Constitution guaranteed the very right to assisted suicide that the same Constitution was now being
read to preclude the people of Oregon from enacting. This uncomfortable tension was resolved when the Ninth Circuit reversed the Lee decision and returned the issue of assisted
suicide once again to the realm of political discourse, where it belongs. Even for someone who cares not a whit about whether an individual has the right to assistance in committing
suicide, these cases underscore the problems that arise when judges purport to apply the law but fail to apply it faithfully-the problems, that is, of judicial activism. The first of these
our democratic republic descends into what Thomas Jefferson famously reviled as "oligarchy." The will
of one judge or a handful is substituted for the will of the popular majority-or, at the very least, the political representatives elected
problems is, of course, that
by and accountable to that majority. Moreover, because judges exert their will, when they do, by pronouncements applied retroactively in individual cases rather than by codified
statutes or rules, the resulting "law" not only lacks democratic validity but predictability and uniformity as well. Decisions that manifest judicial activism do not, in short, amount to
A judicially active
interpretation of the Constitution shifts the dividing line between government power and individual liberty.
what we think of as "law" at all. When it involves constitutional interpretation, judicial activism presents a unique additional problem.
That judge-made shift, unless subsequently repudiated by the Supreme Court, can be remedied only by a constitutional amendment. Ratification of such an amendment, which
The consequence of all of this is that
judicial decisions redefining individual liberties distort the delicate balance of power between the branches of
government. What Congress could once do by the relatively straightforward process of statutory enactment, it can thereafter do only by discharging the Herculean task of
constitutional amendment. Not only does judicial activism in whatever form hobble the political branches of government, it also undermines the
requires supermajorities at both federal and state levels, is arduous by design and, when undertaken, is rarely successful.
Page 43
judiciary itself. Courts, lacking the power to enforce their own judgments, rely on popular confidence in those judgments for their
implementation. Judicial activism erodes this confidence and thereby erodes the efficacy of the judiciary as
a whole. One need not look far to find the breakdown of confidence in, and resulting threat to the independence of, judicial decision-making. By far the most famous such
incident occurred with the advent of the New Deal in the 1930s. Franklin Delano Roosevelt had been elected President after campaigning on the promise of federal relief from the
widespread economic dislocation accompanying the Great Depression. Upon his inauguration, President Roosevelt proposed and, with the assent of the Congress, enacted into law an
unprecedented program of economic reform. After the Supreme Court invalidated several popular statutes at the core of the President's program, the President pursued a plan to
"pack" the Supreme Court. He proposed to increase its membership so that he could appoint enough new Justices to win a majority in future cases. The plan was never executed
because, faced with this threat, the Supreme Court relented and upheld subsequent legislation. It thus appeared that the Supreme Court very nearly became the casualty of its own
political assaults on
judicial decisions
judicial activism. Far from being merely a product of the exigencies of the Great Depression,
specific
still occur.
In the last presidential election, both parties' nominees openly criticized a federal trial judge in New York for his refusal to admit as evidence in a drug prosecution large amounts of
cocaine seized by law enforcement officers. After President Clinton suggested on the campaign trail that the judge might resign his office, the judge reconsidered his ruling and
raises the disturbing specter of judicial decisionmaking by popular will, and the fear that our judges might have become little more than politicians
in robes. What lesson can we learn from these experiences? Judicial activism generates a vicious cycle: it triggers a lack of
confidence in judicial decisions which triggers political meddling which reinforces a lack of confidence in judicial
reversed it. This incident, like the Supreme Court's about-face sixty years earlier,
decisions. A politician in robes is no judge at all. Once a judge imposes his will as legislator, he loses his democratic legitimacy. No one person in a democratic society of 270 million
A judge who wields power like a politician enters the political
process. Having forsaken neutrality, he will soon lose his independence. The people will allow a judge to be
independent only for as long as they perceive him as truly neutral-forsaking decisions based upon his own interests and
biases. Thus, judicial activism encourages political interference both in the process of judging and selection
of judges. One need look no further than the current battle between the White House and the Senate over judicial nominees for a glimpse of the extent to which the judicial
citizens should wield legislative power if only fifty-two people have approved of him.
appointments process has become politicized. Nor does the threat of political interference end after the judge is selected. A multitude of proposals have been offered in Congress to
weaken the independence of the judiciary. Some take the form of constitutional amendments to impose term limits on judges; others have been nothing more sophisticated than calls
Fortunately, judges retainat least for now-their independence to apply the law neutrally and faithfully. But so long as one judge indulges his own
for the impeachment of particular judges who have rendered unpopular decisions. These may be only harbingers of what is to come.
sympathies rather than following the text of the law before him, he will only make it harder for his colleagues to retain the courage to decide cases in faithful, predictable, and uniform
ways.
That collapses our global democratic model
Sobel, President of the American Judicature Society, 5 (Allan, “Executive Director's Report: POLITICAL
ASSAULT ON THE JUSTICE SYSTEM,” Judicature, March – April, 88 Judicature 197)
This unprecedented effort of Congress, with assistance from the Executive Branch, to reenergize a private dispute that had already been considered, reconsidered, and resolved by the
courts, sets a dangerous precedent and has degenerated into an alarming affront against the delicate balance of power that sustains our democracy. The American Judicature Society
Political ambition and political rancor are once again driving our
justice systems to a crossroads of either (1) stability through independence, accountability, and respect, or (2)
timidity and submissiveness through unfair and intemperate criticism, irresponsible threats, and direct assault on their jurisdiction and
powers. Our courts are constitutionally charged with the interpretation of the laws of the land and the protection of our constitutional rights. The judicial branch is
uniquely dependent on what the late Judge Richard Arnold called “the continuing consent of the governed” to fulfill its
mission of interpreting the law and resolving peacefully seemingly irreconcilable differences. If the courts do not have the support of, and are not shown due
is most concerned about the toll this is taking on our courts.
deference by, elected officials, how can we expect citizens, our friends and neighbors, to uphold the sanctity of the law of the land? To meet their common responsibility of protecting
and empowering the citizens of this country, the navigators of each branch of government must remain above the fray of increasing moral and political polarization, resist resorting to
Our democratic government has been
challenged often during its history. It has been wounded over the years by destructive forces from both outside and inside its borders. Through each such
ordeal, however, America has survived and grown stronger to become the leader of the free world, with
the opportunity to serve as an example for emerging democracies around the globe. We could not
do so without a strong, independent, and genuinely respected justice system, at local, state, and federal levels. The
United States at present is the object of unusually intense scrutiny and virulent criticism from all parts of the world. At a time
when we are asking, and in some cases directing, governments across the globe to follow the lead of the United States to
achieve freedom and democracy, it is paramount that the United States, as an example to others, embody and
practice the ideals of the Constitution. It is the sworn duty of our elected officials to respect and protect the judicial
branch. It is the mutual respect of every branch of government that has enabled the country to survive and thrive in spite of significant hardship and challenges to its existence.
incendiary rhetoric for selfish gain, and above all embrace due respect for and deference to one another.
It is not difficult to understand the powerful emotions welling up in Terri Schiavo's family members and other caring and thoughtful people as they watched from the sidelines the 13day dénouement of her life. And in this day when moral outrage, religious zeal, and media sensationalism are the norm in America, one might forgive reckless and emotionally*231
charged, irrational statements directed at those judges, both elected and appointed, who some may deem to be responsible for her death . . . unless those reckless and irrational
Congress and
the Executive
must be
statements emanate from our elected members of government. For it is the members of
those in power in
Branch who
held to a higher standard, who more than anyone must bear responsibility for safeguarding the strength and stability of our courts. The American Judicature Society calls on all
Page 44
respect and support for an independent judiciary
as guardian and arbiter of the rule of law. For history demonstrates that a judiciary independent of special interests and
partisan politics may be necessary to mend the torn seams of this vast and diverse country. The alternative, vividly
suggested in some of the actions and words of recent weeks, is anarchy.
participants in our government, citizens and holders of elected office alike, to step back and recommit to
Page 45
2NC Court Legitimacy DA
Our argument straight turns their internal links – If the court loses it’s
legitimacy, it won’t be effectively modeled by other countries AND even if it is
modeled, the model is a bad one where the court has TOO MUCH POWER.
Limitless judicial review UNDERMINES stable democracies.
Zakaria, Editor of Newsweek & Managing Editor at Foreign Affairs, 97 (Fareed, “The Rise of Illiberal
Democracy,” Foreign Affairs, November / December)
The distinction between liberal and illiberal democracies sheds light on another striking statistical correlation. Political scientists Jack Snyder and Edward Mansfield contend, using
In
countries not grounded in constitutional liberalism, the rise of democracy often brings with it
hyper-nationalism and war-mongering. When the political system is opened up, diverse groups with incompatible interests gain access to power and
an impressive data set, that over the last 200 years democratizing states went to war significantly more often than either stable autocracies or liberal democracies.
press their demands. Political and military leaders, who are often embattled remnants of the old authoritarian order, realize that to succeed that they must rally the masses behind a
national cause. The result is invariably aggressive rhetoric and policies, which often drag countries into confrontation and war. Noteworthy examples range from Napoleon III's
France, Wilhelmine Germany, and Taisho Japan to those in today's newspapers, like Armenia and Azerbaijan and Milosevic's Serbia. The democratic peace, it turns out, has little to
do with democracy. THE AMERICAN PATH AN AMERICAN SCHOLAR recently traveled to Kazakstan on a U.S. government-sponsored mission to help the new parliament draft its
electoral laws. His counterpart, a senior member of the Kazak parliament, brushed aside the many options the American expert was outlining, saying emphatically, "We want our
parliament to be just like your Congress." The American was horrified, recalling, "I tried to say something other than the three words that had immediately come screaming into my
mind: 'No you don't!'" This view is not unusual. Americans in the democracy business tend to see their own system as an unwieldy contraption that no other country should put up
the adoption of some aspects of the American constitutional framework could ameliorate many of
the problems associated with illiberal democracy. The philosophy behind the U.S. Constitution, a fear of accumulated power, is as relevant
with. In fact,
today as it was in 1789. Kazakstan, as it happens, would be particularly well-served by a strong parliament -- like the American Congress -- to check the insatiable appetite of its
president. It is odd that the United States is so often the advocate of elections and plebiscitary democracy abroad. What is distinctive about the American system is not how
democratic it is but rather how undemocratic it is, placing as it does multiple constraints on electoral majorities. Of its three branches of government, one -- arguably paramount -- is
headed by nine unelected men and women with life tenure. Its Senate is the most unrepresentative upper house in the world, with the lone exception of the House of Lords, which is
powerless. (Every state sends two senators to Washington regardless of its population -- California's 30 million people have as many votes in the Senate as Arizona's 3.7 million -which means that senators representing about 16 percent of the country can block any proposed law.) Similarly, in legislatures all over the United States, what is striking is not the
power of majorities but that of minorities. To further check national power, state and local governments are strong and fiercely battle every federal intrusion onto their turf. Private
businesses and other nongovernmental groups, what Tocqueville called intermediate associations, make up another stratum within society. The American system is based on an
avowedly pessimistic conception of human nature, assuming that people cannot be trusted with power. "If men were angels," Madison famously wrote, "no government would be
necessary." The other model for democratic governance in Western history is based on the French Revolution. The French model places its faith in the goodness of human beings.
Once the people are the source of power, it should be unlimited so that they can create a just society. (The French revolution, as Lord Acton observed, is not about the limitation of
sovereign power but the abrogation of all intermediate powers that get in its way.) Most non-Western countries have embraced the French model -- not least because political elites
like the prospect of empowering the state, since that means empowering themselves -- and most have descended into bouts of chaos, tyranny, or both. This should have come as no
surprise. After all, since its revolution France itself has run through two monarchies, two empires, one proto-fascist dictatorship, and five republics. n9 Of course cultures vary, and
different societies will require different frameworks of government. This is not a plea for the wholesale adoption of the American way but rather for a more variegated conception of
Before new policies can be adopted, there lies an intellectual
task of recovering the constitutional liberal tradition, central to the Western experience and to the
development of good government throughout the world. Political progress in Western history has been the result of a growing
liberal democracy, one that emphasizes both parts of that phrase.
recognition over the centuries that, as the Declaration of Independence puts it, human beings have "certain inalienable rights" and that "it is to secure these rights that governments
are instituted." If a democracy does not preserve liberty and law, that it is a democracy is a small consolation. LIBERALIZING FOREIGN POLICY A PROPER appreciation of
constitutional liberalism has a variety of implications for American foreign policy. First, it suggests a certain humility. While it is easy to impose elections on a country, it is more
difficult to push constitutional liberalism on a society. The process of genuine liberalization and democratization is gradual and long-term, in which an election is only one step.
Without appropriate preparation, it might even be a false step. Recognizing this, governments and nongovernmental organizations are increasingly promoting a wide array of
measures designed to bolster constitutional liberalism in developing countries. The National Endowment for Democracy promotes free markets, independent labor movements, and
political parties. The U.S. Agency for International Development funds independent judiciaries. In the end, however, elections trump everything. If a country holds elections,
Washington and the world will tolerate a great deal from the resulting government, as they have with Yeltsin, Akayev, and Menem. In an age of images and symbols, elections are easy
to capture on film. (How do you televise the rule of law?) But there is life after elections, especially for the people who live there. Conversely, the absence of free and fair elections
should be viewed as one flaw, not the definition of tyranny. Elections are an important virtue of governance, but they are not the only virtue. Governments should be judged by
yardsticks related to constitutional liberalism as well. Economic, civil, and religious liberties are at the core of human autonomy and dignity. If a government with limited democracy
steadily expands these freedoms, it should not be branded a dictatorship. Despite the limited political choice they offer, countries like Singapore, Malaysia, and Thailand provide a
better environment for the life, liberty, and happiness of their citizens than do either dictatorships like Iraq and Libya or illiberal democracies like Slovakia or Ghana. And the
pressures of global capitalism can push the process of liberalization forward. Markets and morals can work together. Even China, which remains a deeply repressive regime, has given
its citizens more autonomy and economic liberty than they have had in generations. Much more needs to change before China can even be called a liberalizing autocracy, but that
we need to revive constitutionalism
should not mask the fact that much has changed. Finally,
. One effect of the overemphasis on pure democracy is that
little effort is given to creating imaginative constitutions for transitional countries. Constitutionalism, as it was understood by its greatest eighteenth century exponents, such as
Montesquieu and Madison, is a complicated system of checks and balances designed to prevent the accumulation of power and the abuse of office. This is done not by simply writing
up a list of rights but by constructing a system in which government will not violate those rights. Various groups must be included and empowered because, as Madison explained,
"ambition must be made to counteract ambition." Constitutions were also meant to tame the passions of the public, creating not simply democratic but also deliberative government.
Unfortunately, the rich variety of unelected bodies, indirect voting, federal arrangements, and checks and balances that characterized so many of the formal and informal
constitutions of Europe are now regarded with suspicion. What could be called the Weimar syndrome -- named after interwar Germany's beautifully constructed constitution, which
failed to avert fascism -- has made people regard constitutions as simply paperwork that cannot make much difference. (As if any political system in Germany would have easily
weathered military defeat, social revolution, the Great Depression, and hyperinflation.) Procedures that inhibit direct democracy are seen as inauthentic, muzzling the voice of the
people. Today around the world we see variations on the same majoritarian theme. But the trouble with these winner-take-all systems is that, in most democratizing countries, the
winner really does take all. DEMOCRACY'S DISCONTENTS WE LIVE IN a democratic age. Through much of human history the danger to an individual's life, liberty and happiness
came from the absolutism of monarchies, the dogma of churches, the terror of dictatorships, and the iron grip of totalitarianism. Dictators and a few straggling totalitarian regimes
still persist, but increasingly they are anachronisms in a world of global markets, information, and media. There are no longer respectable alternatives to democracy; it is part of the
fashionable attire of modernity. Thus the problems of governance in the 21st century will likely be problems within democracy. This makes them more difficult to handle, wrapped as
they are in the mantle of legitimacy. Illiberal democracies gain legitimacy, and thus strength, from the fact that they are reasonably democratic. Conversely, the greatest danger that
illiberal democracy poses -- other than to its own people -- is that it will discredit liberal democracy itself, casting a shadow on democratic governance. This would not be
unprecedented. Every wave of democracy has been followed by setbacks in which the system was seen as inadequate and new alternatives were sought by ambitious leaders and
Page 46
restless masses. The last such period of disenchantment, in Europe during the interwar years, was seized upon by demagogues, many of whom were initially popular and even elected.
the most useful role that the international community, and most importantly the United States, can
play is -- instead of searching for new lands to democratize and new places to hold elections -- to consolidate democracy where it has taken root and to encourage
the gradual development of constitutional liberalism across the globe. Democracy without
constitutional liberalism is not simply inadequate, but dangerous, bringing with it the erosion of
liberty, the abuse of power, ethnic divisions, and even war. Eighty years ago, Woodrow Wilson took America into the twentieth
Today, in the face of a spreading virus of illiberalism,
century with a challenge, to make the world safe for democracy. As we approach the next century, our task is to make democracy safe for the world.
The real basis of democracy and for our democratic model is allowing the
people themselves to determine what the Constitution means. The plan sucks
out the vitality of popular constitutionalism and our democratic model.
Kramer, Law Professor at NYU, 1 (Larry, “THE SUPREME COURT 2000 TERM: FOREWORD: WE THE
COURT,” Harvard Law Review, November, 115 Harv. L. Rev. 4)
the current Supreme Court has, by slow degrees, begun
systematically to extend the reach of judicial review. The Rehnquist Court has, quite simply and literally, abandoned
the New Deal settlement, reoccupying ground taken for the people in the 1930s without yielding so much as an inch of territory already held. Change, in itself, is
Which brings us, finally, to the Rehnquist Court. In a manner not unlike the Court of the Gilded Age,
not necessarily wrong. The New Deal system for reconciling judicial supremacy with popular constitutionalism was not the only one possible, and there could be a better one. But
the Rehnquist Court has not offered an alternative accommodation. It has, rather, disowned the notion of popular
constitutionalism altogether, staking its claim to be the only body empowered to interpret fundamental
law with authority. Congress gets to have its say, of course, because the Court reviews actions the legislature has already [*128] taken. But what Congress thinks about
the Constitution carries no formal legal weight in the eyes of the Rehnquist Court, and has only so much practical weight as the Justices think it deserves (which typically turns out to
be not much). A majority of the Court may decide that something is constitutionally permitted, but the notion that the decision whether the thing is permitted might be somebody
else's to make is fast disappearing. More remarkably still, the Justices have not even tried to explain or justify this grab for power - apparently taking it as obvious, as their right,
because the Constitution is "law" and because, if the Constitution is "law," this must mean the whole Constitution. Naturally, assumptions such as these run into difficulty when faced
the Rehnquist Court has simply
repudiated cardinal principles of twentieth-century jurisprudence (including rational basis scrutiny
with judicial doctrines developed under different assumptions. But rather than question the rightness of what it is doing,
of ends-means relationships and deferential review of facts), casting aside a century and a half of hard-earned experience in a spasm of "law is law" formalism. Worse, the Court's felt
The Rehnquist
Court has thus devised rules that artificially limit the authority of lawmakers because it finds such
rules necessary to ensure its ability to dominate constitutional interpretation. The result is a
Constitution that is less and does less, and for no better reasons than the Court's low opinion of Congress and
desire to protect its position as king of the hill. Identifying the origins of this drift toward judicial exclusivity is not easy. I suspect that it began
need to maintain its interpretive supremacy - to ensure that it alone controls the meaning of the Constitution - has itself become a doctrine-shaping imperative.
before the Rehnquist Court, sometime in the years after Cooper v. Aaron. Controversy over judicial supremacy (though not over the Court's decisions) subsided just as the Justices
became increasingly active and ambitious in their interpretations of individual rights. Apart from enforcing these rights, the Warren and Burger Courts made no serious effort to limit
the powers of Congress. This may have been because their members had no interest, and not because they were self-consciously committed to a New Deal vision of popular
constitutionalism, but unarticulated and incipient understandings were irrelevant so long as the actual terms of the settlement were observed. Yet in this environment, the meaning of
the struggle that had been waged to preserve the people's role in defining fundamental law was gradually forgotten, and a notion of the Constitution as nothing more than ordinary
positive law, subject to Supreme Court supervision, came to be pervasively held - by liberals as well as by conservatives, by lawyers as well as by nonlawyers. Based on this
understanding, conservative critics began to present the Court's failure to secure a judicial vision of Article I as a sellout, a failure by the Justices to live up to their constitutional
responsibilities in an important domain. This had no consequences outside the academy so long as the [*129] Court remained in liberal hands. It is only since the consolidation of a
solid conservative majority on the Court, able and willing to be as activist in the domains it cares about as the liberal Court had been in protecting individual rights, that this changed
background understanding has started to bear fruit. While this may make the shift explicable, it does not make it any the less a matter of concern.
We are witnessing
a constitutional revolution, but not the one depicted in the press. The difference between the Rehnquist Court and the Warren Court is not just
It is not just the reinvigoration of judicially enforced federalism. Triumphant
conservative taunts that what is sauce for the goose is sauce for the gander miss the point. The Rehnquist Court's activism explicitly denies the
people any role in determining the ongoing meaning of their Constitution, other than by the grace of the Justices
the beginnings of
a matter of activism in different domains.
themselves (or by the cumbersome process of formal amendment). The practical consequences of this denial are clear in the Court's decisions, which have stripped the federal
A Constitution that truly is nothing more than
ordinary law, that has ceased to be the people's law in any meaningful sense, is as unwarranted as it is unprecedented.
Popular constitutionalism has been an indispensable element of American government from the
beginning, the most profound reflection of what the American Revolution was all about. To squeeze "the people" out of the
Constitution is to squeeze the life out of it.
government of important powers. But its philosophical and, yes, its symbolic importance should not be missed either.
Page 47
The plan is too far in the opposite direction – It creates too much judicial
review which undermines the foundation of our democracy
Kramer, Law Professor at NYU, 5-23-2K (Larry, “The Arrogance of the Court,” Washington Post)
The justices did much more in
than sweep the act off the books. Under a pretense of interpreting the Constitution, they declared that they have the
final say about the expediency of an important, and potentially very large, class of federal laws: not just laws under the
This is an astonishing ruling from a court that professes to care about democratic majorities and respect the political process.
this decision
Commerce Power, which constitute the bulk of modern federal legislation, but many other laws as well. For the limits of all Congress's powers turn eventually on judgments about the
Previous courts have exercised aggressive judicial review, but never like
this. Nothing in the Constitution's language or history supports letting the Supreme Court strike
down laws just because it disagrees with Congress's assessment of how much they are needed. Except for
a brief period in the 1930s when an earlier court tried to stop FDR's New Deal and was decisively repudiated, the court's role has always ended once
it was clear that legislation was rationally related to the exercise of a constitutional power. As Alexander
need for federal action. This is radical stuff.
Hamilton observed back in 1792, rejecting the very same argument as that made by the court today, "the degree in which a measure is necessary can never be a test of the legal right to
judicial review must be contained or we
lose the essence of self-government. They saw that, while courts have a vital role to play in protecting
individuals and minorities from laws that trample their rights, Congress's decisions respecting the need to
exercise its legislative power must otherwise be left to voters and elections. They foresaw that questions would arise over
adopt it." The Founding generation understood, in a way our generation seems to have forgotten, that
the limits of federal authority vis-a-vis the states. But, they said (over and over again), those battles must be waged in the political arena. And so they have been, until now. What kind
of government is it when five justices of the Supreme Court, appointed for life by presidents whose mandates expired long ago, can cavalierly override the decision of a democratically
elected legislature not on the ground that it acted irrationally but because they do not like its reasoning? By what right do these judges claim the authority to second-guess what
Justice Souter in dissent accurately described as a "mountain of data" based on nothing more than their contrary intuitions? This is important.
We have become way
too complacent about letting the Supreme Court run our lives, and the current court has exploited this apathy to extend its authority to
unheard of lengths. Everyone in the country should be incensed by this decision: not because the Violence Against Women Act was so wonderful or so necessary, but because deciding
that it is not--and make no mistake, that is all the majority did--is none of the Supreme Court's business. Yet liberals will sit awkwardly by because they liked the judicial activism we
got from the Warren court, though that court could not touch this one for activism. And, of course, conservatives will gleefully hold their tongues because they never much liked this
law in the first place, and because they adore the court's new federalism (not to mention the chance to see liberals hoist by their own petard). In the meantime, only
democratic government suffers. Ironies this thick would be comical were the stakes not so high.
Page 48
Disease DA
Page 49
1NC Disease
Public health surveillance solves pandemics
Hoppin 12 --- J.D., New York University School of Law (Margaret, “NOTE: OVERLY INTIMATE SURVEILLANCE: WHY
EMERGENT PUBLIC HEALTH SURVEILLANCE PROGRAMS DESERVE STRICT SCRUTINY UNDER THE FOURTEENTH
AMENDMENT”, 87 N.Y.U.L. Rev. 1950, Lexis)//trepka
Public Health Surveillance A. Modern Public Health Surveillance The history of public health surveillance and public health
interventions is both fascinating and complicated: A full account is far beyond the scope of this paper. n11 However, two observations
based on that history frame my argument. First, the basic features of modern public health surveillance are not new; they were
developed as responses to serious contagious disease. Second, public
health surveillance in the United States has, in
general, enabled interventions which - criticisms aside - have effectively addressed the
public health crises they targeted. n12 To give just one example, the surveillance and interventions conducted using New York
City's nineteenth-century tuberculosis registry prevented the spread of tuberculosis. n13 The program was accompanied by an impressive
array of free services that helped to prevent and treat the disease. City and charitable organizations disinfected homes after a tubercular
patient had moved or died, treated patients in facilities established across the City, created open-air programs for children and adults,
and provided financial and logistical aid to tubercular patients. n14 Other municipalities offered similar services to patients. n15 [*1955]
While public health surveillance has undergone radical changes n16 - with technological developments, epidemiologic shifts, and the
rapid expansion and coordination of public health surveillance activities transforming a disparate collection of municipalities, each
battling contagion, into a sophisticated, coordinated, and pervasive public health apparatus - the
purpose remains the same:
to collect and compile information about sick people over time, and then use that information
to protect the public health . A cursory review of government public health activities since the
late medieval period demonstrates
that " throughout history , governments have performed their
public health role by ... taking steps to prevent the spread of epidemics ." n17 Mandatory
quarantine programs - "features of most port towns" in colonial America - provide a dramatic example of
surveillance-based public health interventions. n18 The relevant point is that surveiling individuals to protect the public
health is anything but new. Indeed, the New York City Department of Health and Mental Hygiene intentionally modeled the A1C
Registry - the paradigm of emergent public health surveillance - upon nineteenth-century surveillance and intervention programs that
targeted tuberculosis. n19 The innovations - and the problems - at the heart of emergent programs are that they target individuals who
pose no health risk to others, and they employ technology that enables surveillance that is virtually unlimited in scope.
That’s the only way to prevent extinction
Casadevall 12 March 21st, 2012, Arturo Casaveall is a professor of Microbiology and Immunology at the
Albert Einstein College of Medicine, Arturo, “The future of biological
warfare,”http://onlinelibrary.wiley.com/doi/10.1111/j.1751-7915.2012.00340.x/full
In considering the importance of biological warfare as a subject for concern it is worthwhile to review the known existential threats. At
this time this writer can identify at three major existential threats to humanity: (i) large-scale thermonuclear war followed by a nuclear
winter, (ii) a planet killing asteroid impact and (iii) infectious disease. To this trio might be added climate change making the planet
uninhabitable. Of the three existential threats the first is deduced from the inferred cataclysmic effects of nuclear war. For the second
there is geological evidence for the association of asteroid impacts with massive extinction (Alvarez, 1987). As to an existential threat
decades have provided unequivocal evidence for the ability of certain
pathogens to cause the extinction of entire species. Although infectious disease has traditionally not been associated with
extinction this view has changed by the finding that a single chytrid fungus was responsible for the extinction
from microbes recent
of numerous amphibian species (Daszak et al., 1999; Mendelson et al., 2006). Previously, the view that
infectious diseases were not a cause of extinction was predicated on the notion that many
pathogens required their hosts and that some proportion of the host population was naturally
resistant. However, that calculation does not apply to microbes that are acquired directly from the
environment and have no need for a host, such as the majority of fungal pathogens. For those
Page 50
types of host–microbe interactions it is possible for the pathogen to kill off every last member of a
species without harm to itself, since it would return to its natural habitat upon killing its last host.
Hence, from the viewpoint of existential threats environmental microbes could potentially pose a much greater threat to humanity than
the known pathogenic microbes, which number somewhere near 1500 species (Cleaveland et al., 2001; Tayloret al., 2001), especially if
some of these species acquired the capacity for pathogenicity as a consequence of natural evolution or bioengineering.
Page 51
Spillover
Ruling on the Fourteenth amendment reverses the precedent and spills over
to all disease surveillance
Hoppin 12 --- J.D., New York University School of Law (Margaret, “NOTE: OVERLY INTIMATE SURVEILLANCE: WHY
EMERGENT PUBLIC HEALTH SURVEILLANCE PROGRAMS DESERVE STRICT SCRUTINY UNDER THE FOURTEENTH
AMENDMENT”, 87 N.Y.U.L. Rev. 1950, Lexis)//trepka
The emergent model brings to the fore questions about the constitutional permissibility of the privacy invasion at the core of public
health surveillance programs. In Part II, I describe existing constitutional privacy protections for medical and other personal
information. I
argue that emergent public health surveillance programs - unlike their
predecessors and unlike alternative surveillance models - invade
a fundamental privacy interest and
should accordingly receive strict scrutiny under the Fourteenth Amendment . My argument
is limited to the privacy invasion effected by the government's ongoing and nonconsensual collection of individually-identified health
information, like A1C results. I do not address the privacy implications of individually-targeted health interventions. n63 [*1963] II
Emergent Public Health Surveillance Intrudes upon a Fundamental Interest Emergent public
health surveillance
programs intrude upon a privacy interest that courts should recognize as fundamental for
purposes of the Fourteenth Amendment . Accordingly, emergent programs should be reviewed under a strict
scrutiny standard. n64 The Supreme Court has recognized that the Fourteenth Amendment protects an interest in not disclosing private
health information to the government. n65 However, the Supreme Court has never explained the contours of that right. n66 Moreover,
lower court opinions that address the constitutionality of government public health surveillance
programs are sparse, outdated, and inconsistent. In general, they have upheld public health surveillance
programs against privacy challenges, after applying rational basis review or a deferential
balancing test. n67 Courts need not and should not apply a deferential standard to emergent programs. In Subpart A, I argue that
existing jurisprudence does not require deferential review; in fact, it implicitly and explicitly [*1964] invites more stringent review of
emergent programs like the A1C Registry. In Subpart B, I suggest that, to the extent that the constitutionality of the privacy invasion
effected by emergent public health surveillance programs remains an open question, recent assessments of security surveillance
programs help to provide an answer. I describe three features of security surveillance that have provoked privacy concerns, and that
either do or may increase the constitutional protections for privacy afforded under the Fourth Amendment. Because
emergent
health surveillance programs share those features , courts should similarly enhance the
constitutional scrutiny that applies to those programs under the Fourteenth
Amendment . In Subpart C, I summarize the argument for applying strict scrutiny to emergent programs. A. Health
Information Privacy Precedents This Subpart describes existing Fourteenth Amendment
privacy protections that apply to government public health surveillance programs. Those protections are widely
understood to be limited , and - to the extent the question has been addressed - scholars assume similarly limited
protection would apply to emergent programs. n68
Yes spillover --- the core controversy is the privacy interest and specific
targeting which applies equally to infectious disease and the plan
Hoppin 12 --- J.D., New York University School of Law (Margaret, “NOTE: OVERLY INTIMATE SURVEILLANCE: WHY
EMERGENT PUBLIC HEALTH SURVEILLANCE PROGRAMS DESERVE STRICT SCRUTINY UNDER THE FOURTEENTH
AMENDMENT”, 87 N.Y.U.L. Rev. 1950, Lexis)//trepka
Recognizing that the privacy interest at stake is fundamental would trigger strict scrutiny, under which a reviewing court would inquire
whether the challenged surveillance program was narrowly tailored to further a compelling government interest. n182 In one sense, the
proposed analysis would not depart from past practice. Arguably, the
public health surveillance programs reviewed
by courts to date have not involved a fundamental privacy interest , due to
Page 52
technological limits on the breadth and depth of surveillance, the type of information collected, or program design. In
particular, most public health surveillance programs, such as those that involve anonymized or
consensual data collection , do not intrude upon a fundamental privacy right at all. In addition, the strict
scrutiny analysis may be satisfied when the
surveillance model at the heart of emergent programs - ongoing,
intimate, and individualized surveillance - targets people with a highly infectious disease in
order to prevent the disease from spreading. The critical question is whether emergent surveillance programs
satisfy the narrow tailoring requirement of a strict scrutiny analysis . Part III describes
one approach to finding an answer.
Page 53
Solves Disease
Legislative protections solve health --- there’s a precedent
Hoppin 12 --- J.D., New York University School of Law (Margaret, “NOTE: OVERLY INTIMATE SURVEILLANCE: WHY
EMERGENT PUBLIC HEALTH SURVEILLANCE PROGRAMS DESERVE STRICT SCRUTINY UNDER THE FOURTEENTH
AMENDMENT”, 87 N.Y.U.L. Rev. 1950, Lexis)//trepka
Fortunately, a precise definition of the interest invaded by emergent programs is not required: A
personal
fundamental right to
privacy is deeply rooted in this country's history and tradition. A complete account of legal
[*1985]
and cultural protections for personal privacy is far beyond the scope of this paper, but two examples are particularly worth noting. First,
the history of Fourth Amendment jurisprudence demonstrates that the "most sacred of all areas ... is the home," not because "it is a
physical structure in which someone chooses to live," but because there is a societal consensus that people have "virtually unlimited
expectations of privacy from intrusions" into their homes. n177 A cursory review of Supreme Court cases suggests that we protect the
"home" at least in part because it serves as a proxy for personal privacy. n178 Scholars have made the same observation. n179 Moreover,
robust Fourth Amendment protection of the home is a product of a deep national commitment to preventing government incursions
upon personal privacy that dates to the founding era. n180 Second
- and also relevant in the context of emergent
public health surveillance programs - there is a clear history of judicial and legislative
protections against nonconsensual disclosures of medical information. n181
Page 54
Federalism DA
Page 55
1NC Federalism
The aff’s ruling on the Fourteenth Amendment devastates federalism
Mendenhall 15 --- staff attorney to Chief Justice Roy S. Moore of the Supreme Court of Alabama, adjunct
professor at Faulkner University (Allen, “Is The Fourteenth Amendment Good?”, https://mises.org/library/fourteenthamendment-good)//trepka
Few issues divide libertarians the way the Fourteenth Amendment to the United States Constitution does. Gene Healy has
observed that "[c]lassical liberals of good faith have found themselves on either side of the issue." On the one side are those who praise
the amendment for circumventing the power of the states to prejudice, police, regulate, or otherwise use force to impose discriminatory
laws on their citizens. On the other side are those who, while acknowledging the problematic nature of state misconduct and
wrongdoing, are not willing to condone
and in
the transfer of power from states to the federal government ,
particular to the federal judiciary. The divide comes down to one's views on federalism , i.e., on the
balance or separation of the state and national governments. The
first and fifth sections of the Fourteenth
Amendment are the most controversial . Section One consists of the Citizenship Clause, the Privileges or
Due Process Clause , and the Equal Protection Clause, and Section Five
bestows on the US Congress the authority to enforce the amendment legislatively . These provisions
have vested increased powers in the national government, allowing federal courts to bring
states into compliance with federal laws regarding certain individual rights — or alleged
rights .
Immunities Clause, the
Extinction
Calabresi 95 (Steven G. Calabresi, Associate Professor, Northwestern University School of Law, “A
Government of Limited and Enumerated Powers,” Michigan Law Review December, 1995)
First, the rules of constitutional federalism should be enforced because federalism is a good thing , and it is the
best and most important structural feature of the U.S. Constitution. Second, the political branches cannot be relied upon to enforce
constitutional federalism, notwithstanding the contrary writings of Professor Jesse Choper. Third, the Supreme Court is institutionally
competent to enforce constitutional federalism. Fourth, the Court is at least as qualified to act in this area as it is in the Fourteenth
Amendment area. And, fifth, the doctrine of stare [*831] decisis does not pose a barrier to the creation of any new, prospectively
applicable Commerce Clause case law. The conventional wisdom is that Lopez is nothing more than a flash in the pan. 232 Elite opinion
holds that the future of American constitutional law will involve the continuing elaboration of the Court's national codes on matters like
abortion regulation, pornography, rules on holiday displays, and rules on how the states should conduct their own criminal
investigations and trials. Public choice theory suggests many reasons why it is likely that the Court will continue to pick on the states and
give Congress a free ride. But, it would be a very good thing for this country if the Court decided to surprise us and continued on its way
down the Lopez path. Those of us who comment on the Court's work, whether in the law reviews or in the newspapers, should encourage
the Court to follow the path on which it has now embarked. The country and the world would be a better place if it did. We have seen
that a desire for both international and devolutionary federalism has swept across the world in recent years. To a
significant extent, this is due to
global fascination with and emulation of our own American federalism success story.
The global trend toward federalism is an enormously positive development that greatly increases the
likelihood of future peace, free trade, economic growth, respect for social and cultural diversity, and
protection of individual human rights. It depends for its success on the willingness of sovereign nations to
strike federalism deals in the belief that those deals will be kept . 233 The U.S. Supreme Court can do its part to
encourage the future striking of such deals by enforcing vigorously our own American federalism deal. Lopez could be a first step in that
process, if only the Justices and the legal academy would wake up to the importance of what is at stake.
Page 56
Uniqueness
The tipping point for federalism is coming
Ryan 13 [Erin Ryan, Associate Professor, Lewis & Clark Law School, Portland, Oregon, U.S.A; Fulbright
Professor of Law, Zhongguo Haiyang Daxue (Ocean University), Qingdao, CHINA [. "The Once and Future
Challenges of American Federalism: The Tug of War Within" The Ways of Federalism in Western Countries
and the Horizons of Territorial Autonomy In Spain. Ed. Alberto López Basaguren & Leire San-Epifanio.
Springer]
The dilemmas of American federalism have become especially palpable in recent years, reflecting the
progressing demands on all levels of government to meet the inexorably more complicated challenges of
governance in an increasingly interconnected world.2 Some reflect similar dilemmas in other federalist societies, while
others are unique to our own particular constellation of national, state, and municipal governance.3 Some federalism dilemmas are of
genuine constitutional import, others more sound and fury—signifying little beyond the substantive political agenda of one interest
group or another.4 Each
heralds the potential for real consequences in the political arena—and indeed, these
political consequences of federalism
dilemmas are apparent throughout the policy spectrum. They are visible in the litigation over
health care reform efforts that has now reached the United States Supreme Court5 and in similar battles over
environmental governance and climate policy,6 banking and financial services regulation,7
immigration policy,8 and gay marriage.9 Consequences are also visible in the emergence of popular constitutional political
consequences are what receive the most sustained public attention. The
movements, such as the “Tea Party” 10 and even the “Tenthers.”11 The latter are named for the Tenth Amendment to the U.S.
Constitution that affirms our system of dual sovereignty, which divides sovereign authority between local and national government at
the state and federal levels.12 After decades of playing a merely supporting role in U.S. federalism theory,13 the Tenth Amendment has
emerged as a passionate site of political contest, rallying advocates for state right-to-die legislation,14 home schooling,15 and sectarian
education,16 and among opponents of Medicaid and Medicare,17 federal gun laws,18 tax collection,19 drivers’ license requirements,20
and the deployment of National Guard troops abroad.21
Page 57
--AT: Gay Marriage
The ruling was inevitable, constitutional, and doesn’t affect federalism
Sasson 6/26/15 --- Reporter for WSJ (Eric, “The LGBT Movement's Supreme Court Hero: Anthony Kennedy”,
http://www.newrepublic.com/article/122182/lgbt-movements-supreme-court-hero-anthony-kennedy)//trepka
There was little mystery about who would be writing today's SCOTUS decision on marriage: As he's
done for almost all decisions involving LGBT rights during his tenure, Justice Anthony Kennedy once again took up his pen to write the
majority opinion in a 5-4 ruling that went as far as the court possibly could in defending the rights of same-sex couples. “No
union is
more profound than marriage, for it embodies the highest ideals of love, fidelity, devotion, sacrifice, and family,” Kennedy
writes in the closing paragraph of the court's opinion. “As some of the petitioners in these cases demonstrate,
marriage embodies a love that may endure even past death. It would misunderstand these men and women to say
they disrespect the idea of marriage. Their plea is that they do respect it, respect it so deeply that they seek to find its fulfillment for
themselves. Their
hope is not to be condemned to live in loneliness, excluded from one of civilization’s
oldest institutions. They ask for equal dignity in the eyes of the law. The Constitution grants
them that right.” Make no mistake, this is Kennedy's decision. While he chose, in 2013's United States v.
Windsor, to argue against DOMA on federalism grounds , it was his language regarding the
dignity of same-sex couples and the potential harm inflicted on the children of these couples that
led judges across the country to strike down gay-marriage bans, arguing that the Windsor
ruling effectively made these bans unconstitutional. The domino effect continued until only 14 states
remained without equal marriage rights. Public opinion shifted swiftly from a minority position to 60 percent or more now in
favor in most polls. The court rarely wants to get ahead of public opinion. Still, it's hard not to interpret Kennedy's language in the earlier
Windsor ruling as deliberate, designed to influence lower courts toward rulings which would create the environment where SCOTUS
could comfortably rule in favor of marriage without seeming to be ahead of the curve. Following Thursday's rulings on Obamacare and
housing discrimination, this decision seems to confirm a leftward tilt in the Roberts Court that is leaving conservatives fuming and full of
conspiracy theories. But if those decisions came as somewhat of a surprise, this
one seems to have been foreshadowed
since October, when the Court refused to hear appeals arguments by five states where same-sex marriage was allowed. It was
unlikely that the court would effectively allow marriage in those states (and by default several others), only to later strike down marriage
on the federal level. The
Court consolidated four separate cases to consider its ruling, but most of the
attention has focused on the title case, Obergefell v. Hodges, in which Jim Obergefell wanted the death certificate
of his husband, John Arthur, to reflect that Obergefell was the surviving spouse, something which was still not legally required under
Ohio law. Partners
for more than twenty years, Obergefell and Arthur had flown to Maryland to get
married once they found out that Arthur, long suffering from ALS, had only a few months left to
live. Family members and friends donated the $13,000 to pay for the medical flight to have the ceremony performed in a state where
marriage is legal. These kinds of burdensome trips will soon no longer be necessary—which doesn't mean conservatives have necessarily
given up on the issue completely. On Thursday, Texas AG Ken Paxton told county clerks in his state to wait for “direction and clarity”
from his office before issuing any same-sex marriage licenses. We
have seen this before, notably in Alabama a few
months ago, and will likely see it in Louisiana soon as well, as Governor Bobby Jindal, a
presidential candidate, tries to bolster his conservative cred among Evangelicals. Still, reaction
among mainstream Republicans has been mostly muted so far. Most presidential hopefuls and governors have issued standard-issue
remarks about how they support "traditional marriage." Scott Walker and Mike Huckabee will try, and fail, to goad the others into calls
for a constitutional amendment and promises to protect religious liberty, i.e., the right of “dissenting” people of faith to deny services to
same-sex couples. But all in all, I'm sure the Republicans will be glad that SCOTUS has taken them off the hook on this issue, much as
the court has done in its health care ruling. Outside
of select Republican primaries , rallying against
same-sex marriage doesn't win you votes any more. But the seeming inevitability of this ruling
doesn't make it any less historic. Next weekend in Philadelphia, the LGBT rights movement will celebrate the 50th anniversary of the
“Annual Reminder” marches for equality that began in that city in 1965, at the time the largest demonstrations for gay and lesbian
equality in the world, preceding the Stonewall Riots by four years. Fifty years doesn't seem like a long time, cosmically speaking, but it's
an important reminder, whenever people speak about the “lightning speed” at which gays and lesbians have been securing rights in the
U.S., that the movement didn't begin a few years ago. That the 1980s and '90s brought an AIDS epidemic that ravaged the community
and was largely ignored by the federal government. That in 2004, dozens of states passed same-sex marriage bans. Since then, the LGBT
Page 58
community gathered and regrouped, after tragedy and setback, and continued to push for its rights and dignity. The eloquence of
Kennedy's final paragraph shows that these struggles were not in vain.
Their ev is just media hype
CSM 7/8/15 --- Christian Science Monitor (“Same-sex marriage and federalism: Miles's Law wins, again”,
http://www.csmonitor.com/USA/Politics/Politics-Voices/2015/0708/Same-sex-marriage-and-federalism-Miles-s-Law-winsagain)//trepka
been much in the news lately. Critics of the Supreme Court’s decision on
same-sex marriage say that the justices should have left the matter to the states. A decade ago, however,
many of them favored an amendment to the United States Constitution that would have taken the matter away from
the states and defined marriage only as the union of a man and a woman.
Another example is federalism, which has
Page 59
Link
It’s the core of federalism
Kinsella 9 --- Practicing Patent Attorney, Director of C4SIF (Stephan, “The Libertarian Case Against the Fourteenth
Amendment”, http://www.stephankinsella.com/2009/11/the-libertarian-case-against-the-fourteenth-amendment/)//trepka
The “libertarian” case against it … well that’s a different issue than the legal case. The best legal case is in my view in Raoul Berger’s
works, and in the Slaughterhouse decision itself [for Berger, see his work scanned in here; see also here]. My view on the legalities is that
if nothing else, the
14th amendment is not clear about what privileges or immunities means. And, given
that the broader you construe P-I the more power you grant to the central state, basically eating
away at the core federalist structure of the Constitution itself [a great writer on this is law prof
Tom McAffee; some of his stuff is here; see also my post The Unique American Federal Government], eroding
the “ vertical
separation of power ” and the “limited and enumerated scheme” of powers delegated to the feds, then you have to give the
P-I clause a narrow reading and you have to construe any ambiguity against a grant of power to the feds. This is because if
you find a
right in there, that is a grant of power to the federal government to have jurisdiction over the
states on this matter.
Small decisions are the greatest threat to federalism
Lebow ‘97 (Cynthia, associate Director @ Rand, Univ Tennessee Law Review, 1997, spring, pg lexis)
See Southland, 465 U.S. at 21 (O'Connor, J., dissenting) (noting Rehnquist, C.J., joining opinion of O'Connor, J.); FERC, 456 U.S. at 775
(O'Connor, J., concurring in part and dissenting in part) (noting Rehnquist, C.J., joining in opinion of O'Connor, J.). Justice Powell filed
his own partial dissent in FERC that also deserves mention. FERC, 456 U.S. at 771 (Powell, J., concurring in part and dissenting in part).
Lauding the "appeal" and "wisdom" of Justice O'Connor's dissent, Powell stated that PURPA "intrusively requires [states] to make a
place on their administrative agenda for consideration and potential adoption of federally proposed standards.'" Id. at 771, 775 (Powell,
J., concurring in part and dissenting in part). While finding that precedents of the Court supported the constitutionality of the
substantive provisions of PURPA "on this facial attack," Powell also evoked principles of federalism to warn against the encroachment of
federal authority into state affairs: But I know of no other attempt by the Federal Government to supplant state-prescribed procedures
that in part define the nature of their administrative agencies. If Congress may do this, presumably it has the power to pre-empt statecourt rules of civil procedure and judicial review in classes of cases found to affect commerce. This would be the type of gradual
encroachment hypothesized by Professor Tribe: "Of course, no one expects Congress to obliterate the states, at least in one fell swoop. If
there is any danger, it lies in the tyranny of small decisions in the prospect that Congress will nibble away at
state sovereignty, bit by bit, until someday essentially nothing
is left but a gutted shell ." Id. at 774-75
(Powell, J., concurring in part and dissenting in part) (quoting Laurence H. Tribe, American Constitutional Law 302 (1978)). Despite his
warning, Justice Powell could probably never have envisioned the degree to which Congress would attempt to preempt state court
procedures with respect to tort and product liability actions, areas so traditionally anchored in state common law.
Page 60
Turns Discrimination
Absent the judiciary, decentralized solutions solve
Mendenhall 15 --- staff attorney to Chief Justice Roy S. Moore of the Supreme Court of Alabama, adjunct
professor at Faulkner University (Allen, “Is The Fourteenth Amendment Good?”, https://mises.org/library/fourteenthamendment-good)//trepka
If the federal government were the only or the best mechanism for reducing the type of
discrimination and rights violations prohibited by the Fourteenth Amendment, the Fourteenth
Amendment would be welcome and warranted. But it is not the only conceivable corrective, and besides,
isn't it counterintuitive for libertarians to applaud and champion an increase in both the scope and degree of federal power, even if that
power has, on some occasions, brought about admirable results? In
contexts unrelated to the Fourteenth
Amendment, it is almost never controversial for libertarians to promote nongovernmental, local, or
decentralized cures for unfair, discriminatory laws and practices. It is often alleged that industry and trade and
plain economics are better mechanisms for reducing discriminatory behavior, whether it is based on race, class, sex, gender, and so
forth, than is government force. Yet frequently those libertarians who raise alarm about the Fourteenth Amendment's governmental,
federal, and centralized approaches to discriminatory laws and practices are disingenuously treated, in the place of argument, as
supporters of those laws and practices rather than as principled opponents of federal, centralized reparations for social harms.
Page 61
Turns Privacy
Spills over to overall federalism
Mendenhall 15 --- staff attorney to Chief Justice Roy S. Moore of the Supreme Court of Alabama, adjunct
professor at Faulkner University (Allen, “Is The Fourteenth Amendment Good?”, https://mises.org/library/fourteenthamendment-good)//trepka
Having established the limited reach of the privileges or immunities clause in the Slaughterhouse
Cases, the Supreme Court would later turn to the Equal Protection Clause and the Due Process
Clause to strike down state laws under the Fourteenth Amendment. But the Supreme Court has
not stopped at state laws: gradually it has used the Equal Protection Clause and the Due Process
Clause as a pretext for regulating private citizens and businesses. The Fourteenth
Amendment, which was intended to reduce discrimination, has even been used, ironically, to uphold
affirmative-action programs that discriminate against certain classes of people.
Turns privacy
Mendenhall 15 --- staff attorney to Chief Justice Roy S. Moore of the Supreme Court of Alabama, adjunct
professor at Faulkner University (Allen, “Is The Fourteenth Amendment Good?”, https://mises.org/library/fourteenthamendment-good)//trepka
The Fourteenth Amendment is not itself a positive good but a dangerous animal to be handled with
care. Libertarians as a class have manifest undue devotion to its operation. We need instead an open, honest, and collegial
debate about the merits and function of this amendment, lest other creatures of its likeness rear
their head in the future, and at the expense of our cherished liberties.
Page 62
Impact --- Democracy
Commitment to federalism is critical to global democratic success
Broder 01 (David Broder, Washington Post, June 24, 2001, “Lessons On Freedom”)
Even more persistent were the questions about the role the United States would play, under this new administration, in
supporting democratic movements around the world. It is sobering to be reminded how often, during the long decades of the Cold
War, this country backed (and in some cases, created) undemocratic regimes, simply because we thought military rulers and other
autocrats were more reliable allies against communism. The week of the Salzburg Seminar coincided with President Bush's first tour of
Europe. He was a target of jokes and ridicule for many of the fellows as the week began. But the coverage of his meetings and, especially,
his major address in Poland on his vision of Europe's future and America's role in it, earned him grudging respect, even though it
remains uncertain how high a priority human rights and promotion of democracy will have in the Bush foreign policy. Another great
lesson for an American reporter is that the struggle to maintain the legitimacy of representative government in the eyes of
the public is a worldwide battle. Election turnouts are dropping in almost all the established democracies, so much so that seminar
participants seriously discussed the advisability of compulsory voting, before most of them rejected it as smacking too much of
authoritarian regimes. Political parties -- which most of us have regarded as essential agents of democracy -- are in decline everywhere.
They are viewed by more and more of the national publics as being tied to special interests or locked in increasingly irrelevant or petty
rivalries -- anything but effective instruments for tackling current challenges. One large but unresolved question throughout the week:
Can you organize and sustain representative government without strong parties? The single most impressive visitor to the seminar was
Vaira Vike-Freiberga, the president of Latvia, a woman of Thatcherite determination when it comes to pressing for her country's
admission to NATO, but a democrat who has gone through exile four times in her quest for freedom. She is a member of no party, chosen
unanimously by a parliament of eight parties, and bolstered by her popular support. But how many such leaders are there? Meantime,
even as democracy is tested everywhere from Venezuela to Romania to the Philippines, a new and perhaps tougher accountability
examination awaits in the supranational organizations. The European Union has operated so far with a strong council, where each
nation has a veto, and a weak parliament, with majority rule. But with its membership seemingly certain to expand, the age-old
dilemma of democracy – majority rule vs. minority and individual rights – is bound to come to the fore. The principle of
federalism will be vital to its success. And, once again, the United States has important lessons to teach.
But only if we can keep democracy strong and vital in our own country.
Extinction
Diamond 95 — Senior Fellow at the Hoover Institution (Larry, “Promoting Democracy in the 1990s”,
December 1995, http://wwics.si.edu/subsites/ccpdc/pubs/di/1.htm)
OTHER THREATS This hardly exhausts the lists of threats to our security and well-being in the coming years and decades. In the former
Yugoslavia nationalist aggression tears at the stability of Europe and could easily spread. The flow of illegal drugs intensifies through
increasingly powerful international crime syndicates that have made common cause with authoritarian regimes and have utterly
corrupted the institutions of tenuous, democratic ones. Nuclear, chemical, and biological weapons continue to
proliferate. The
of life on Earth, the global ecosystem, appears increasingly endangered. Most of these new and
unconventional threats to security are associated with or aggravated by the weakness or absence of democracy,
with its provisions for legality, accountability , popular sovereignty, and openness . LESSONS OF THE TWENTIETH
CENTURY The experience of this century offers important lessons. Countries that govern themselves in a truly
democratic fashion do not go to war with one another. They do not aggress against their neighbors to aggrandize
very source
themselves or glorify their leaders. Democratic governments do not ethnically "cleanse" their own populations, and they are much less
likely to face ethnic insurgency. Democracies do not sponsor terrorism against one another. They do
not build w eapons of m ass
d estruction to use on or to threaten one another. Democratic countries form more reliable, open, and enduring trading
partnerships. In the long run they offer better and more stable climates for investment. They are more environmentally
responsible because they must answer to their own citizens, who organize to protest the destruction of their environments.
They are better bets to honor international treaties since they value legal obligations and because their openness makes it much more
difficult to breach agreements in secret. Precisely because, within their own borders, they respect competition, civil liberties, property
rights, and the rule of law, democracies are the only reliable foundation on which a new world order of international security and
prosperity can be built.
Page 63
Impact --- Econ
Federalism is critical to economies of scale – it’s key to production success
and cost division
Calebresi 95 (Stephen Calebresi, Associate Professor, Northwestern University School of Law. B.A. 1980,
J.D. 1983, Yale, “Reflections on United States v. Lopez: “A Government of Limited and Enumerated Powers:
In Defense of United States v. Lopez,” 94 Mich. L. Rev. 752, Michigan Law Review, December 1995)
A third related advantage is that international federations
can undertake a host of governmental activities in
which there are significant economies of scale. This is one reason why federations can provide better for the common
defense than can their constituent parts. Intercontinental ballistic missiles, nuclear-powered aircraft [*772] carriers and submarines,
and B-2 stealth bombers tend to be expensive. Economies
of scale make it cheaper for fifty states to produce one set
of these items than it would be for fifty states to try to produce fifty sets. This is true even without factoring in
the North American regional tensions that would be created if this continent had to endure the presence of fifty nuclear minipowers,
assuming that each small state could afford to own at least one Hiroshima-sized nuclear bomb. Important governmental economies of
scale obtain in other areas, as well, however, going well beyond national defense. For example, there
are important
economies of scale to the governmental provision of space programs, scientific and biomedical
research programs, the creation of transportation infrastructure, and even the running of some kinds of income
and wealth redistribution programs.
Page 64
Impact --- India
Ethnic tensions – federalism prevents them from spilling over
Pye 08 (Political Science, MIT, “The State of India’s Democracy,” June, 2008,
http://www.foreignaffairs.org/20080501fashortreview87356/sumit-ganguly-larry-diamond-marc-fplattner/the-state-of-india-s-democracy.html)
This symposium volume brings together more than a dozen American and Indian scholars to evaluate the state of India's democracy. It
is standard practice to honor India by declaring it, without further analysis, to be the world's largest democracy. The authors of this
volume, in contrast, take it as a given that there are many different versions of democracy and that India is a special case. They begin by
analyzing India's
party system and election results and how the relationship of politics to society leads to the
management of ethnic conflicts. A key factor in the strength of Indian democracy is the country's
successful federalism, the balance achieved between the central government and state and local
authorities. Another key factor in India's democracy is its judiciary. Overall, however, the success of Indian democracy is very much
determined by the country's civil society and the pride Indians take in their democratic institutions. At the same time, Indians are
bothered by corruption in public affairs. The emergence of marginalized elements has further opened the door to graft.
Extinction
Fai in ’01 (Ghulam Nabi, Executive Director of the Kashmiri American Council, The Washington Times,
“The Most Dangerous Place”, July 8, Proquest)
The most dangerous place on the planet is Kashmir, a disputed territory convulsed and illegally occupied for more
than 53 years and sandwiched between nuclear-capable India and Pakistan. It has ignited two wars between the estranged
South Asian rivals in 1948 and 1965, and a third could trigger nuclear volleys and a nuclear winter
threatening the entire globe. The United States would enjoy no sanctuary. This apocalyptic vision is no
idiosyncratic view. The Director of Central Intelligence, the Department of Defense, and world experts generally place Kashmir at
the peak of their nuclear worries. Both India and Pakistan are racing like thoroughbreds to bolster their
nuclear arsenals and advanced delivery vehicles. Their defense budgets are climbing despite widespread misery
amongst their populations. Neither country has initialed the Nuclear Non-Proliferation Treaty, the Comprehensive Test Ban Treaty, or
indicated an inclination to ratify an impending Fissile Material/Cut-off Convention.
Page 65
Impact --- Iraq
Iraq models American federalism
Hulsman 03 (John Hulsman, Ph.D., Research Fellow in European Affairs, The Heritage Foundation,
“Forging a Durable Post-War Political Settlement in Iraq,”
http://www.heritage.org/Research/MiddleEast/bg1632.cfm)
A good political model for such a successful post-war Iraqi federation already exists--the so-called Great Compromise of
1787 that enabled the creation of America's constitutional arrangement among the states. In Iraq's case, this type
of system would give each of the country's three major sub-groups equal representation in an upper
house of the legislature in order to protect each group's interests at the national level. These political
outcomes--an Iraq that can control its own political destiny and that does not threaten that of its neighbors--are critical if an Iraqi
settlement is to be judged a success.
That solves ethnic conflict and secessionism – leads to internal conflict
Brancati 04 – visiting scholar at the Center for the Study of Democratic Politics at Princeton University,
2004 (Can Federalism Stabilize Iraq?, http://www.twq.com/04spring/docs/04spring_brancati.pdf)
The United States devoted nine months to planning the war in Iraq and a mere 28 days to planning the peace, according to senior U.S.
military officials. Much more time has to be invested in the peace, however, if the military achievements of the war are to be preserved
and a stable democracy is to be created in Iraq. Establishing a governmental system that can accommodate Iraq’s
different ethnic and religious groups, previously kept in check by the political and military repression of the Saddam Hussein
regime, is paramount to securing that peace. In the absence of a system uniquely designed toward this end, violent conflicts and
demands for independence are likely to engulf the country. If not planned precisely to meet the specific ethnic and religious divisions at
play, any democratic government to emerge in Iraq is bound to prove less capable of maintaining order than the brutal dictatorship that
preceded it. By dividing power between two levels of government—giving groups greater control over their own political,
social, and economic affairs while making them feel
less exploited as well as more secure—federalism offers the
only viable possibility for preventing ethnic conflict and secessionism as well as establishing a stable
democracy in Iraq. Yet, not just any kind of federal system can accomplish this. Rather, a federal system granting regional
governments extensive political and financial powers with borders drawn along ethnic and religious lines that utilize institutionalized
measures to prevent identity-based and regional parties from dominating the government is required. Equally critical to ensuring
stability and sustainable democracy in Iraq, the new federal system of government must secure the city of Kirkuk, coveted for its vast oil
reserves and pipelines, in the Kurdish-controlled northern region to assure that the Kurds do not secede from Iraq altogether. For its
part, the United States must take a more active role in advising Iraqi leaders to adopt a federal system of government along these lines.
Such a system will help the United States not only to build democracy in Iraq but also to prevent the emergence of a Shi‘a-dominated
government in the country. Without this form of federalism, an
Iraq rife with internal conflict and dominated by one
ethnic or religious group is more likely to emerge, undermining U.S. efforts toward establishing democracy in Iraq as well as
the greater Middle East.
Global nuclear war
Corsi 07 (Jerome, Ph.D. in Political Science – Harvard University, “War with Iran is Imminent”, World Net
Daily, 1-8, http://www.worldnetdaily.com/news/article.asp?ARTICLE_ID=53669)
If a broader war breaks out in Iraq, Olmert will certainly face pressure to send the Israel military into the Gaza after Hamas and
into Lebanon after Hezbollah. If that happens, it will only be a matter of time before Israel and the U.S. have no choice but
to invade Syria . The Iraq war could quickly spin into a regional war, with Israel waiting on the sidelines ready to
launch an air and missile strike on Iran that could include tactical nuclear weapons . With Russia ready to deliver the $1
billion TOR M-1 surface-to-air missile defense system to Iran, military leaders are unwilling to wait too long to attack Iran. Now that
Russia and China have invited Iran to join their Shanghai Cooperation Pact, will Russia and China sit by idly should the U.S. look
like we are winning a wider regional war in the Middle East? If we
get more deeply involved in Iraq, China may have their
war could easily lead into a third world war ,
moment to go after Taiwan once and for all. A broader regional
much as World Wars I and II began.
Page 66
Impact --- Multilat
Federalism is critical to international unity and alliance
Calabresi 95 (Steven G. Calabresi, Associate Professor, Northwestern University School of Law, “A
Government of Limited and Enumerated Powers,” Michigan Law Review December, 1995)
These old geostrategic arguments for federalist
consolidation obviously hold true today and played a role in the forming of
the European Union, the United Nations, and almost every other multinational federation or alliance that has been
created since 1945. Sometimes the geostrategic argument is expanded to become an argument for a multinational defensive alliance, like
NATO, against a destabilizing power, like the former Soviet Union. In this variation, international federalism
is partly a
means of providing for the common defense and partly a means of reducing the
likelihood of intra-alliance warfare in order to produce a united front against the prime
military threat. Providing for the common defense, though, is itself a second and independent reason for forming international
federations. It was a motivation for the formation of the U.S. federation in 1787 and, more recently, the European Union.
Page 67
Impact --- Russia
Federalism is critical to prevent state disintegration and political instability –
causes Russian loose nukes
Hahn 03 (Gordon M. Hahn, Visiting Research Scholar – Stanford U, Demokratizatsiya, Vol. 11, Issue 3,
Summer)
Where did Russia's federal state come from, where has it been, where is it going, and why does it matter beyond a small circle of Russia
specialists? Taking the last question first, the success or failure of Russia's transformation into a stable market democracy will determine
the degree of stability throughout Eurasia. For
such a large multinational state, successful political and
economic development depends on building an efficient democratic federal system. Indeed, one of the
main institutional factors leading to the demise of the Soviet partocratic regime and state was the considerably noninstitutionalized
status of the RSFSR (Russian Republic) in the Soviet Union's pseudofederal, national-territorial administrative structure. Only
a
system can hold together and effectively manage Russia's vast
territory, the awkward administrative structure inherited from the failed USSR, and hundreds of
divergent ethnic, linguistic, and religious interests. Dissolution or even any further weakening of Russia's federal
democratic federal
state could have dire consequences for Russian national and international security by weakening control over
its means of mass destruction.
Russia Federalism is key to prevent Genocide
Dugin 06 (Alexander Dugin, political scientist, “Russia’s Future: A Unitary State or an Ethno-Federation?”
Translated by Denis Shcherbakov Rossiia, No. 4, February 2006)
Experts and political scientists were prompted to consider such questions by reforms to the hierarchy of governance in the course of
2005 - especially the abolition of elections for regional leaders. For example, Alexander Voloshin, former head of the presidential
administration, spoke about a possible scenario for transforming federative Russia into unitary Russia, noting that the ethnic republics,
as self-sufficient regions of the Federation, are hotbeds of tension. Therefore, the process of expanding regions might end in erasing the
borders of the ethnic republics. Meanwhile, Boris Nemtsov agreed with other Russian liberals in naming "the curtailment of federative
principles and local government, leading to a unitary state," among the negative trends of the past year. I'd agree with the liberal
opposition here, but from a completely different standpoint - a Eurasian standpoint. Russia as
a unitary state would be the
worst of all possible options, precisely because it would happen at the expense of genocide for the native ethnic
groups comprising it. This genocide doesn't just threaten ethnic minorities that are assimilated into the majority people; it also
threatens the majority people, which loses its unique ethnic qualities, its native characteristics, originality, traditions; its members
become mere citizens of the nation-state. Consequently, Russia ought to take the federalist path, but with one substantial proviso:
federalism should change from the territorial federalism of today to ethno-federalism - that is, a federation of ethnic groups, or
Eurasian federalism.
Page 68
Impact --- Trade
Federalism is critical to free trade
Calabresi 95 (Steven G. Calabresi, Associate Professor, Northwestern University School of Law. “A
Government of Limited and Enumerated Powers,” Michigan Law Review December, 1995)
A fourth and vital advantage to international
federations is that they can promote the free movement of goods
and labor both among the components of the federation by reducing internal transaction costs and internationally by
providing a unified front that reduces the costs of collective action when bargaining with other
federations and nations. This reduces the barriers to an enormous range of utility-maximizing
transactions thereby producing an enormous increase in social wealth. Many federations have been formed in
part for this reason, including the United States, the European Union, and the British Commonwealth, as well as all the trade-specific
"federations" like the GATT and NAFTA.
Page 69
Impact --- Tyranny
Majority tyranny – federalism provides a check on majoritarianism
Calabresi 95 (Steven G. Calabresi, Associate Professor, Northwestern University School of Law. “A
Government of Limited and Enumerated Powers,” Michigan Law Review December, 1995)
Small state federalism is a big part of what keeps
the peace in countries like the United States and Switzerland. It is a
big part of the reason why we do not have a Bosnia or a Northern Ireland or a Basque country or a Chechnya or a Corsica
or a Quebec problem. 51 American federalism in the end is not a trivial matter or a quaint historical anachronism. Americanstyle federalism is a thriving and vital institutional arrangement - partly planned by the Framers, partly the accident of history
- and it prevents violence and war. It prevents religious warfare, it prevents secessionist warfare,
and it prevents racial warfare. It is part of the reason why democratic majoritarianism in the
United States has not produced violence or secession for 130 years, unlike the situation for example, in England,
France, Germany, Russia, Czechoslovakia, Yugoslavia, Cyprus, or Spain. There is nothing in the U.S.
Constitution that is more important or that has done more to promote peace, prosperity, and freedom than the federal structure of that
great document. There is nothing in the U.S. Constitution that should absorb more completely the attention of the U.S. Supreme Court.
Page 70
Impact --- Water
Federalism is critical to effective water management – nationalization fails
Craig 11 (Robin Kundis Craig, Associate Dean for Environmental Programs, Professor of Law, Florida State
University College of Law, “Adapating Water Federalism to Climate Change Impacts: Energy Policy, Food
Security, and the Allocation of Water Resources,” Environmental and Energy Law and Policy Journal, Vol. 5,
No. 2, January 30, 2011, http://www.law.uh.edu/eelpj/publications/5-2/02Craig.pdf)
That said, however, the
prospect of whole scale nationalization and federalization of water resources should give
pause. Water serves local ecological and economic needs that could easily be sacrificed to national interests,
particularly if Congress pursues a few specific national priorities—national energy security, national food security—with tunnel vision.
304 Moreover, at the extreme, large-scale water transportation on a national scale will be incredibly expensive,
creating a cost-benefit issue that suggests that more efficient means of addressing national water priorities, such as national investment
in upgraded water infrastructure and water conservation, probably exist and should be looked for. The overriding danger that climate
change poses for water law and policy is that governments at all levels will avoid making the hard decisions that climate change demands
until they are regulating in a panicked and reactive emergency mode, eliminating the opportunity to make those decisions in a proactive
and reasoned disaster-avoidance planning mode. The former, panicked, mode is far more likely to result in last-minute nationalization
and federalization of water to ensure the viability of a few priorities. The latter emergency planning mode, in contrast, would allow for
longer-term identification and balancing of multiple priorities at multiple scales. Thus, where exactly the
balance of authority
in water management and allocation actually ends up in the climate change era will, I suspect, depend far more on
how soon all levels of government choose to start planning for climate change‘s impacts on water resources than any theoretical notions
roles —and we are all more likely to end up with a more optimal balance of water
federalism if they all start sooner rather than later.
of ― proper governmental
That decimates the US agriculture sector
WEF 11 (Water Environment Federation, “Water Sector Interdependencies: Summary Report 2011,” 2011,
http://www.wef.org/uploadedFiles/Access_Water_Knowledge/Water_Security_and_Emergency_Response
/Final_WEF_Summary_WSI.pdf)
The water sector and the
the sector is
agriculture and food sector are heavily interdependent. According to the agriculture and food SSP,
dependent upon the water sector, “for clean irrigation and processed water.” This is
certainly true, although understated. In fact, according to the U.S. Geological Survey (USGS), almost 60% of all the world’s
freshwater withdrawals go toward irrigation uses. Agriculture is a major user of ground and surface water in the United States
and, according to the USDA, accounts for 80% of the nation’s consumptive water use and over 90% in
many western states. However, the agriculture and food sector’s dependencies on water go well beyond irrigation. Throughout
the
production, process, and distribution of the nation’s food supply, water use and recovery is essential. The
agriculture and food sector refers to this cycle as the “farm-to-table continuum” and includes the supply chains for feed, animals, and
animal products; crop production; and the supply chains of seed, fertilizer, and other necessary related materials. It also includes the
post-harvesting components of the food supply chain, from processing, production, and packaging through storage and distribution to
retail sales, institutional food services, and restaurant or home consumption. In addition to irrigation, a major user of water
is livestock watering. USGS defines livestock water use as water associated with “livestock watering, feedlots, dairy operations, and
other on-farm needs. This includes water for raising cows, chickens, horses, rabbits, fish, and pets, and also water used in the production
of meats, poultry, eggs, and milk.”
Extinction
Klare, 12 — professor of peace and world security studies at Hampshire College (Michael T., “Michael T.
Klare: The Hunger Wars in Our Future”, 8/8/12, http://www.guernicamag.com/daily/michael-t-klare-thehunger-wars-in-our-future/)
This, however, is just the beginning of the likely consequences: if history is any guide, rising
food prices of this sort will also
lead to widespread social unrest and violent conflict . Because so many nations depend on grain imports from the
U.S. to supplement their own harvests, and because intense drought and floods are damaging crops elsewhere as well, food supplies
Page 71
are expected to shrink and prices to rise across the planet. Food–affordable food–is essential to
human survival and well-being. Take that away, and people become anxious, desperate, and angry. In the United States, food
represents only about 13 percent of the average household budget, a relatively small share, so a boost in food prices in 2013 will probably
not prove overly taxing for most middle- and upper-income families. It could, however, produce considerable hardship for poor and
unemployed Americans with limited resources. “You are talking about a real bite out of family budgets,”commented Ernie Gross, an
agricultural economist at Omaha’s Creighton University. This could add to the discontent already evident in depressed and highunemployment areas, perhaps prompting an intensified backlash against incumbent politicians and other forms of dissent and unrest. It
is in the international arena, however, that the Great Drought is likely to have its most devastating effects. Because so many
nations
depend on grain imports from the U.S. to supplement their own harvests, and because intense drought and
floods are damaging crops elsewhere as well, food supplies are expected to shrink and prices to rise across the planet. “What
happens to the U.S. supply has immense impact around the world,” says Robert Thompson, a food
expert at the Chicago Council on Global Affairs. As the crops most affected by the drought, corn and soybeans, disappear from
world markets, he noted, the price of all grains, including wheat, is likely to soar, causing immense hardship to those
who already have trouble affording enough food to feed their families. The Hunger Games, 2007-2011 What happens next is, of course,
impossible to predict, but if the recent past is any guide, it could turn ugly. In 2007-2008, when rice, corn, and wheat experienced prices
hikes of 100 percent or more, sharply higher prices–especially for bread–sparked “food riots” in more than two dozen countries,
including Bangladesh, Cameroon, Egypt, Haiti, Indonesia, Senegal, and Yemen. In Haiti, the rioting became so violent and public
confidence in the government’s ability to address the problem dropped so precipitously that the Haitian Senate voted to oust the
country’s prime minister, Jacques-Édouard Alexis. In other countries, angry protestors clashed with army and police forces, leaving
scores dead. Those price increases of 2007-2008 were largely attributed to the soaring cost of oil, which made food production more
expensive. (Oil’s use is widespread in farming operations, irrigation, food delivery, and pesticide manufacture.) At the same time,
increasing amounts of cropland worldwide were being diverted from food crops to the cultivation of plants used in making biofuels. The
next price spike in 2010-11 was, however, closely associated with climate change. An intense drought gripped much of eastern Russia
during the summer of 2010, reducing the wheat harvest in that breadbasket region by one-fifth and prompting Moscow to ban all wheat
exports. Drought also hurt China’s grain harvest, while intense flooding destroyed much of Australia’s wheat crop. Together with other
extreme-weather-related effects, these disasters sent wheat prices soaring by more than 50 percent and the price of most food staples by
32 percent. Once again, a surge in food prices resulted in widespread social unrest , this time concentrated in North
Africa and the Middle East. The earliest protests arose over the cost of staples in Algeria and then Tunisia, where–no coincidence–the
precipitating event was a young food vendor,Mohamed Bouazizi, setting himself on fire to protest government harassment. Anger
over rising food and fuel prices combined with long-simmering resentments about government repression and corruption
sparked what became known as the Arab Spring. The rising cost of basic staples, especially a loaf of bread, was also a cause of
unrest in Egypt, Jordan, and Sudan. Other factors, notably anger at entrenched autocratic regimes, may have proved more powerful in
those places, but as the author of Tropic of Chaos, Christian Parenti, wrote, “The initial trouble was traceable, at least in part, to the price
of that loaf of bread.” Until recently, most scientists were reluctant to blame particular storms or droughts on global warming. Now,
however, a growing number of scientists believe that such links can be demonstrated in certain cases. As for the current drought,
analysts are already warning of instability in Africa , where corn is a major staple, and of increased popular
unrest in China, where food prices are expected to rise at a time of growing hardship for that country’s
vast pool of low-income, migratory workers and poor peasants. Higher food prices in the U.S. and China could also lead to
reduced consumer spending on other goods, further contributing to the slowdown in the global economy
and producing yet more worldwide misery, with unpredictable social consequences. The Hunger Games, 2012-?? If
this was just one bad harvest, occurring in only one country, the world would undoubtedly absorb the ensuing hardship and expect to
bounce back in the years to come. Unfortunately, it’s becoming evident that the Great Drought of 2012 is not a one-off event in a single
heartland nation, but rather an inevitable consequence of global warming which is only going to intensify. As a result, we can expect not
just more bad years of extreme heat, but worse years, hotter and more often, and not just in the United States, but globally for the
indefinite future. Until recently, most scientists were reluctant to blame particular storms or droughts on global warming. Now,
however, a growing number of scientists believe that such links can be demonstrated in certain cases. In one recent study focused on
extreme weather events in 2011, for instance, climate specialists at the National Oceanic and Atmospheric Administration (NOAA) and
Great Britain’s National Weather Service concluded that human-induced climate change has made intense heat waves of the kind
experienced in Texas in 2011 more likely than ever before. Published in the Bulletin of the American Meteorological Society, it reported
that global warming had ensured that the incidence of that Texas heat wave was 20 times more likely than it would have been in 1960;
similarly, abnormally warm temperatures like those experienced in Britain last November were said to be 62 times as likely because of
global warming. It is still too early to apply the methodology used by these scientists to calculating the effect of global warming on the
heat waves of 2012, which are proving to be far more severe, but we can assume the level of correlation will be high. And what can we
expect in the future, as the warming gains momentum? When we think about climate change (if we think about it at all), we envision
rising temperatures, prolonged droughts, freakish storms, hellish wildfires, and rising sea levels. Among other things, this will result in
damaged infrastructure and diminished food supplies. These are, of course, manifestations of warming in the physical world, not the
social world we all inhabit and rely on for so many aspects of our daily well-being and survival. The purely physical effects of climate
Page 72
change will, no doubt, prove catastrophic. But the social effects
including, somewhere down the line, food riots, mass
starvation, state collapse, mass migrations, and conflicts of every sort, up to and including full-scale war,
could prove even more disruptive and deadly. In her immensely successful young-adult novel The Hunger Games (and the
movie that followed), Suzanne Collins riveted millions with a portrait of a dystopian, resource-scarce, post-apocalyptic future where
once-rebellious “districts” in an impoverished North America must supply two teenagers each year for a series of televised gladiatorial
games that end in death for all but one of the youthful contestants. These “hunger games” are intended as recompense for the damage
inflicted on the victorious capitol of Panem by the rebellious districts during an insurrection. Without specifically mentioning global
warming, Collins makes it clear that climate change was significantly responsible for the hunger that shadows the North American
continent in this future era. Hence, as the gladiatorial contestants are about to be selected, the mayor of District 12’s principal city
describes “the disasters, the droughts, the storms, the fires, the encroaching seas that swallowed up so much of the land [and] the brutal
war for what little sustenance remained.” The focus is understandably on the immediate consequences of the still ongoing Great
Drought: dying crops, shrunken harvests, and rising food prices. But keep an eye out for the social and political effects … In this, Collins
was prescient, even if her specific vision of the violence on which such a world might be organized is fantasy. While we may never see her
version of those hunger games, do not doubt that some version of them will come into existence–that, in fact, hunger
wars of many
sorts will fill our future. These could include any combination or permutation of the deadly riots that led to the 2008 collapse of
Haiti’s government, the pitched battles between massed protesters and security forces that engulfed parts of Cairo as the Arab Spring
developed, the ethnic struggles over disputed croplands and water sources that have made Darfur a recurring headline of horror in our
world, or the inequitable distribution of agricultural land that continues to fuel the insurgency of the Maoist-inspired Naxalites of India.
Page 73
FISA DAs
Page 74
Deference Now --- FISA
Executive deference now on FISA
Pike 7 --- J.D. from Hofstra (Josh, “THE IMPACT OF A KNEE-JERK REACTION: THE PATRIOT ACT AMENDMENTS TO THE
FOREIGN INTELLIGENCE SURVEILLANCE ACT AND THE ABILITY OF ONE WORD TO ERASE ESTABLISHED CONSTITUTIONAL
REQUIREMENTS”, 36 Hofstra L. Rev. 185, Lexis)//trepka
Those courts affirming the holding of the Truong court, that the primary purpose of warrantless surveillance must be foreign intelligence
gathering and extending its application to FISA authorized surveillance, have not excluded information collected pursuant to a FISA
order in criminal prosecutions where, at the time the information was collected, it could be reasonably anticipated that a criminal
investigation would [*204] result. n88 In United States v. Duggan, the Second Circuit Court of Appeals held that the requirement that
foreign intelligence surveillance "be the primary objective of the surveillance is plain not only from the language of § 1802(b) but also
from the requirements in § 1804 as to what the application must contain." n89 The court concluded that the application process, in
requiring certification of the presented facts by an executive branch official, ensures that the information sought will be for the purpose
of gathering foreign intelligence information. n90 FISA
requires that the FISA court "not ... second-guess the
executive branch official's certification that the objective of the surveillance is foreign
intelligence information," effectively requiring the FISA court to presume the executive branch has the purpose of foreign
intelligence gathering in applying for a FISA application. n91 However, recognizing that such a presumption may lead to future abuse of
FISA surveillance, the court clarified that such a presumption does not "give the government carte blanche to obtain a surveillance order
in violation of a target's right to due process" and may be overcome by a substantial showing that ""a false statement knowingly and
intentionally, or with reckless disregard for the truth was included' in the application and that the allegedly false statement was
"necessary' to the FISA Judge's approval of the application." n92 In
addition to giving deference to the
executive in declaring that the primary purpose of the surveillance was for foreign
intelligence gathering, the Duggan court held that a FISA order is not invalid simply [*205]
because the executive could anticipate that the fruits of the surveillance would be later used
in a criminal trial. n93 The court emphasized that in passing FISA, Congress anticipated
that the concerns of the government with respect to foreign intelligence will overlap those with respect to
law enforcement. n94 The court ultimately concluded that the mere presence of a domestic law enforcement purpose will not
invalidate FISA surveillance where the primary purpose of the surveillance was to gather foreign intelligence information, as certified to
by an executive branch official, where the defendant was engaged in international terrorist acts or the plotting of those acts. n95 While
Duggan and numerous other circuit court decisions have agreed that the proper constitutional requirement for acquiring a FISA order is
that the surveillance be conducted for the primary purpose of gathering foreign intelligence information, numerous courts have simply
applied the plain language of FISA. n96 In assessing the validity of a FISA search, these courts have required a showing that the purpose
of the surveillance, rather than the primary purpose, was to obtain foreign intelligence information and that such information could not
have been acquired through normal investigative techniques. n97 Coincidentally, these courts held, in accordance with those courts
applying the primary purpose test, that where evidence of criminal activity was discovered through a FISA order, such evidence is
admissible in a criminal prosecution of the target of the surveillance. n98 However, the court in United States v. Belfield, while applying
the statutory language of FISA, asserted that the inquiry required under FISA to determine the legality of the surveillance is easier to
satisfy than [*206] the pre-FISA requirement. n99 The court noted that before
FISA, "courts had to determine
whether the surveillance fell within the President's inherent power to conduct electronic
surveillance for foreign intelligence purposes." n100 After FISA, courts merely had "to
determine whether the application and order comply with the statutory requirements." n101
Through this statement, the Belfield court recognized that FISA essentially codified a new standard for
assessing the validity of warrantless foreign intelligence surveillance, whereby the court no
longer must inquire into the nature of the surveillance by the executive, but, assuming that
FISA is constitutional, must determine if the requirements of the statute have been followed. By
making this assertion, the court left unresolved the question of whether the purpose standard used in FISA was the equivalent of the
primary purpose standard iterated in Truong.
Page 75
Deference Now --- CT
Maintaining FISA overreach is key to prosecute terrorists --- it’s upheld by all
lower courts now
Blum 9 --- attorney for the Department of Homeland Security, M.A. in security studies, J.D. from UChicago
(Stephanie, “ WHAT REALLY IS AT STAKE WITH THE FISA AMENDMENTS ACT OF 2008 AND IDEAS FOR FUTURE
SURVEILLANCE REFORM”, 18 B.U. Pub. Int. L.J. 269, Lexis)//trepka
After 9/11, the Department of Justice worked to expand the surveillance tools needed to gather intelligence on terrorist activity.
Approximately five weeks after 9/11, Congress passed the U.S.A. Patriot Act, n68 which, inter alia, increased emergency surveillance
before obtaining a FISA warrant from twenty-four hours to seventy-two hours, n69 expanded the number of FISA judges from seven to
eleven, n70 expanded the availability of physical searches, pen registers, and trap and trace devices, n71 and allowed roving wiretaps. n72 It
also extended the time periods for the surveillance from 90 days to 120 days. n73 While a thorough analysis of the Patriot Act is beyond
it is useful to discuss (arguably)
the most consequential change to FISA: the requirement that a "significant purpose" as
opposed to "the purpose" of the surveillance be to conduct foreign intelligence. Before 9/11, to
the scope of this Article, for purposes of the later discussion in Part IV (analyzing the FAA),
obtain a FISA warrant, the government had to assert that the "purpose of the surveillance is to obtain foreign intelligence information."
Over the years, based on several court decisions, the government interpreted "purpose" to be
"primary purpose " to gain foreign intelligence information. n75 [*281] Furthermore, a 1995 Office of Legal
Counsel (OLC) opinion concluded that "courts are more likely to adopt the 'primary purpose' test than any less stringent
n74
formulation," and that "the greater the involvement of prosecutors in the planning and execution of FISA searches, the greater is the
chance that the government could not assert in good faith that the 'primary purpose' was the collection of foreign intelligence." n76 If
evidence of criminal wrongdoing was discovered pursuant to a properly executed FISA warrant (where the primary purpose was to
collect intelligence), this evidence could still be used at trial. n77 Nonetheless, because of fears that zealous prosecutors would
manipulate FISA warrants to bypass the need to obtain traditional law enforcement warrants under Title III (with the more rigorous
probable cause standard), a "wall" was created that impeded prosecutors from discussing their cases with intelligence officers or
controlling, initiating, or expanding FISA investigations. In fact, "in 1995, the Reno Justice Department issued guidelines that FISA
information could almost never be shared with criminal investigators." n78 It is this artificial wall - one created by custom, bureaucracy,
and practice but not by law - that the 9/11 commissioners criticized in the 9/11 Commission Report. n79 As law professor William Banks
attests, the "FISA wall procedures were designed to protect against using the secretive foreign intelligence collection process in order to
build a criminal case," but "never stood in the way of the sharing of criminal information with intelligence investigators," nor "the
sharing of intelligence information with criminal investigators, so long as the sharing met the foreign intelligence purpose rule." n80
The Patriot Act changed the legal standard for a FISA warrant from one whose "primary
purpose" was to gather foreign intelligence to one that only needed a "significant
purpose ." Some individuals, like law professor Stephen Schulhofer at New York University, argue that adding the word
"significant" [*282] produces a "large change in law enforcement power." n81 According to Schulhofer, the
change to the phrase "significant purpose" from "purpose" means that U.S. citizens and foreign nationals may be exposed to "broad FISA
surveillance" when the government's primary purpose is not to gather foreign intelligence but instead to gather evidence for use at a
criminal trial. n82 Similarly, Banks argues in The Death of FISA that the change to "significant purpose" essentially "gutted the central
premise of FISA" because it allows "the primary objective of the planned surveillance [to be] evidence to support a prosecution." n83
Banks observes that, since
9/11, there has been a "growing criminalization of terrorismrelated activities [that] has made the prosecutorial agenda a larger part of the sphere
of electronic surveillance and has accordingly further complicated the task of managing FISA implementation." n84
Nonetheless, in 2002, the FISCR specifically upheld the change to "significant purpose" as lawful, despite the overlap between
intelligence and criminalization of terrorist activities. As the FISCR explained: [The primary purpose] analysis, in our view, rested on a
false premise and the line the court sought to draw was inherently unstable, unrealistic, and confusing. The false premise was the
assertion that once the government moves to criminal prosecution, its 'foreign policy concerns' recede... . That is simply not true as it
relates to counterintelligence. In that field the government's primary purpose is to halt the espionage or terrorism efforts, and criminal
prosecutions can be, and usually are, interrelated with other techniques used to frustrate a foreign power's efforts. n85 In other words,
criminal prosecution and the gathering of foreign intelligence are often intertwined , and
one way to prevent threats to national security is to prosecute terrorists . Furthermore, the
FISCR aptly noted that the definition of an agent of a foreign power for U.S. persons is rooted in
criminal conduct (i.e. knowingly engaging in activity that may be a crime). n86 The FISCR concluded that
Page 76
unless the government's "sole objective" was to obtain evidence of a past crime, a FISA
warrant should be granted. n87 The FISCR stressed, however, that the "FISA process may not be used to investigate wholly
unrelated ordinary crimes." n88 While the Supreme Court has yet to rule on the constitutionality of FISA or the specific change to
all other courts to consider the issue, except one district court, have agreed with
the FISCR's holding that the change to "significant purpose" is reasonable under the Fourth Amendment. n89
"significant purpose,"
Page 77
Deference Now --- Warrants
Courts are moving away from warrant requirements now
Harvard Law Review 8 (“SHIFTING THE FISA PARADIGM: PROTECTING CIVIL LIBERTIES BY ELIMINATING EXANTE
JUDICIAL APPROVAL”, 121 Harv. L. Rev. 2200, Lexis)//trepka
While full argumentation for the proposition that the Fourth Amendment embodies such an exception is beyond the scope of this Note,
n110
the case law is clear that the true " touchstone of the Fourth Amendment is
reasonableness ," n111 such that the Fourth Amendment only "sometimes ... requires warrants." n112 Especially in light
of the increasing number of exceptions to the warrant requirement, n113 it seems likely that an
exception is appropriate in the context of foreign intelligence surveillance for purposes of national
security, not only in terms of meeting a more formalist reading of the Fourth Amendment, but
even more forcefully meeting a functionalist reading , under which
[*2221] the improved protections of
civil liberties could render the decreased reliance on ex ante judicial review preferable under the Fourth Amendment.
Page 78
Disease DA --- Privacy
The aff’s 4th amendment precedent spills over from security to health --- that
wrecks disease surveillance that depend on privacy invasions
Hoppin 12 --- J.D., New York University School of Law (Margaret, “NOTE: OVERLY INTIMATE SURVEILLANCE: WHY
EMERGENT PUBLIC HEALTH SURVEILLANCE PROGRAMS DESERVE STRICT SCRUTINY UNDER THE FOURTEENTH
AMENDMENT”, 87 N.Y.U.L. Rev. 1950, Lexis)//trepka
Similarities in Security Surveillance and Public Health Surveillance Courts and
commentators have addressed similar questions in the context of security surveillance programs. In
particular, they have identified three features of government security surveillance that make the privacy invasions
especially troubling: the surveillance is increasingly comprehensive and intimate, it involves registries of
unprecedented size and data mining potential, and it targets politically underrepresented domestic
communities . In the context of security surveillance programs, all three features have provoked significant privacy concerns.
B.
However, there is variation in the extent to which courts have incorporated each concern into Fourth Amendment analysis: The
intimate and comprehensive nature of government surveillance is changing the analysis under
the Fourth Amendment and its state counterparts, the targeting of politically underrepresented communities has not
explicitly done so, and the use of registries and data mining falls in the middle. My goal in this Part is to borrow from recent judicial
opinions and public commentary about each feature of security surveillance, and to suggest that emergent public health surveillance
programs raise similar concerns. n105 I do not intend to equate Fourth Amendment doctrine with Fourteenth Amendment doctrine. I
claim only that the Fourth Amendment cases demonstrate a growing judicial recognition that a relationship exists between government
surveillance technologies and methods on the one hand, and the nature of the individual [*1971] privacy interest at stake on the other.
Similarly, I do not claim that the government interventions that may result from surveillance are the same in the security and public
health surveillance contexts. n106 My claim is that emerging
conclusions about the relationship between the
nature of government surveillance and the privacy interest at stake in the security context can
inform a conversation about emergent health programs . The security surveillance cases and
commentary delineate an area of privacy - or alternatively, a type of government intrusion into personal privacy - that may warrant
heightened constitutional protection. The analysis in this Part has two implications. First,
emergent programs may
effect a privacy invasion that violates social and constitutional values. n107 Second, altering constitutional
jurisprudence in response to the changing nature of government surveillance activities is viable and appropriate. To oversimplify, if
developments in security surveillance tactics and technologies can transform a permissible government activity into a "search" under the
Fourth Amendment, which in turn requires ex ante judicial review before the activity can constitutionally occur, then similar
developments in emergent public health surveillance programs may warrant more robust analysis under the Fourteenth Amendment.
Public health surveillance solves pandemics
Hoppin 12 --- J.D., New York University School of Law (Margaret, “NOTE: OVERLY INTIMATE SURVEILLANCE: WHY
EMERGENT PUBLIC HEALTH SURVEILLANCE PROGRAMS DESERVE STRICT SCRUTINY UNDER THE FOURTEENTH
AMENDMENT”, 87 N.Y.U.L. Rev. 1950, Lexis)//trepka
Public Health Surveillance A. Modern Public Health Surveillance The history of public health surveillance and public health
interventions is both fascinating and complicated: A full account is far beyond the scope of this paper. n11 However, two observations
based on that history frame my argument. First, the basic features of modern public health surveillance are not new; they were
developed as responses to serious contagious disease. Second, public
health surveillance in the United States has, in
general, enabled interventions which - criticisms aside - have effectively addressed the
public health crises they targeted. n12 To give just one example, the surveillance and interventions conducted using New York
City's nineteenth-century tuberculosis registry prevented the spread of tuberculosis. n13 The program was accompanied by an impressive
array of free services that helped to prevent and treat the disease. City and charitable organizations disinfected homes after a tubercular
patient had moved or died, treated patients in facilities established across the City, created open-air programs for children and adults,
and provided financial and logistical aid to tubercular patients. n14 Other municipalities offered similar services to patients. n15 [*1955]
While public health surveillance has undergone radical changes n16 - with technological developments, epidemiologic shifts, and the
Page 79
rapid expansion and coordination of public health surveillance activities transforming a disparate collection of municipalities, each
battling contagion, into a sophisticated, coordinated, and pervasive public health apparatus - the
purpose remains the same:
to collect and compile information about sick people over time, and then use that information
to protect the public health . A cursory review of government public health activities since the
late medieval period demonstrates
that " throughout history , governments have performed their
public health role by ... taking steps to prevent the spread of epidemics ." n17 Mandatory
quarantine programs - "features of most port towns" in colonial America - provide a dramatic example of
surveillance-based public health interventions. n18 The relevant point is that surveiling individuals to protect the public
health is anything but new. Indeed, the New York City Department of Health and Mental Hygiene intentionally modeled the A1C
Registry - the paradigm of emergent public health surveillance - upon nineteenth-century surveillance and intervention programs that
targeted tuberculosis. n19 The innovations - and the problems - at the heart of emergent programs are that they target individuals who
pose no health risk to others, and they employ technology that enables surveillance that is virtually unlimited in scope.
Extinction --- no burnout
Casadevall 12 March 21st, 2012, Arturo Casaveall is a professor of Microbiology and Immunology at the
Albert Einstein College of Medicine, Arturo, “The future of biological
warfare,”http://onlinelibrary.wiley.com/doi/10.1111/j.1751-7915.2012.00340.x/full
In considering the importance of biological warfare as a subject for concern it is worthwhile to review the known existential threats. At
this time this writer can identify at three major existential threats to humanity: (i) large-scale thermonuclear war followed by a nuclear
winter, (ii) a planet killing asteroid impact and (iii) infectious disease. To this trio might be added climate change making the planet
uninhabitable. Of the three existential threats the first is deduced from the inferred cataclysmic effects of nuclear war. For the second
there is geological evidence for the association of asteroid impacts with massive extinction (Alvarez, 1987). As to an existential threat
decades have provided unequivocal evidence for the ability of certain
pathogens to cause the extinction of entire species. Although infectious disease has traditionally not been associated with
extinction this view has changed by the finding that a single chytrid fungus was responsible for the extinction
from microbes recent
of numerous amphibian species (Daszak et al., 1999; Mendelson et al., 2006). Previously, the view that
infectious diseases were not a cause of extinction was predicated on the notion that many
pathogens required their hosts and that some proportion of the host population was naturally
resistant. However, that calculation does not apply to microbes that are acquired directly from the
environment and have no need for a host, such as the majority of fungal pathogens. For those
types of host–microbe interactions it is possible for the pathogen to kill off every last member of a
species without harm to itself, since it would return to its natural habitat upon killing its last host.
Hence, from the viewpoint of existential threats environmental microbes could potentially pose a much greater threat to humanity than
the known pathogenic microbes, which number somewhere near 1500 species (Cleaveland et al., 2001; Tayloret al., 2001), especially if
some of these species acquired the capacity for pathogenicity as a consequence of natural evolution or bioengineering.
Page 80
Military DA --- Warrants
Exigent circumstances are key to military effectiveness --- warrants devastate
flexibility
Forgang 9 --- J.D. Candidate at Fordham (Jonathan, "THE RIGHT OF THE PEOPLE": THE NSA, THE FISA
AMENDMENTS ACT OF 2008, AND FOREIGN INTELLIGENCE SURVEILLANCE OF AMERICANS OVERSEAS, Fordham Law
Review, Lexis)//trepka
A warrant requirement is always subject to exceptions. n411 It
is logical that the warrant requirement for surveillance of
Americans overseas should also be subject to many of the same exceptions . The most important
warrant exception for foreign intelligence surveillance is the exigent circumstances
exception . n412 The United States' intelligence agencies, military , and law enforcement
personnel must be able to respond to national security threats with speed and
efficiency . Therefore, any FISA warrant requirement should include an exigent circumstances exception. n413 Beginning
surveillance under this exception should not end the judicial scrutiny of foreign intelligence surveillance. There should still be
accountability when the government uses the exigent circumstances exception. Though the threat
may be imminent enough that it necessarily means that the delay of seeking prior judicial approval is unreasonable, once the necessary
surveillance begins it should be easy to have the FISC quickly review the surveillance's necessity and minimization precautions. The
original FISA rules required approval of surveillance initiated under the exigent circumstances exception within seventy-two hours. n414
However, the
most recent FISA amendments have extended the period for approval of
surveillance begun under exigent circumstances to seven days. n415 A period of warrantless surveillance
should be minimized because there is a significant risk that warrantless surveillance unnecessarily invades Americans' privacy. This
risk is necessary where there is a dire threat to national security. But it is important that an impartial
party assesses whether this threat actually exists and if the surveillance is beneficial. Another necessary exception to
the warrant requirement should be surveillance conducted as part of an American
war effort . The rules of surveillance of civilians should not apply when the government is
acting to obtain surveillance for the war efforts of the United States military. In this scenario there should be few
situations where Americans are surveillance targets of the U.S. military. To the extent that the Highlander surveillance was necessary
military surveillance confined to Iraq and Afghanistan and conducted to protect American troops, the surveillance was justifiable. NSA
surveillance targeting Americans in other parts of the Middle East, when not responding to an immediate threat, however, is
unreasonable unless the NSA submits to prior judicial review of the surveillance.
Decline causes lashout --- specifically China, North Korea, and Russia --- that
escalates
Olsen 14 – (Wyatt; Military’s reduced readiness seen as emboldening China, Russia; May 20; www.stripes.com/news/military-sreduced-readiness-seen-as-emboldening-china-russia-1.283925; kdf)//trepka
Just to the west, China
recently began preparations for what the Philippines described as a possible military
airstrip on a reef in the Spratly Islands , which both countries claim. Meanwhile, Russia has ratcheted up
its presence in the Pacific — including long-range air patrols off the coast of California and near the U.S. territory of Guam —
to gather intelligence and display its military might. The Japan Air Self Defense Force almost doubled its number of scrambles against
Russian aircraft in the 12 months leading up to March compared with the previous year. And
North Korea has intensified
its rhetoric amid what appear to be preparations for its fourth underground nuclear weapons test. The U.S. still maintains the
most formidable force in the Pacific. The Pacific Fleet consists of about 180 ships, which include five aircraft carrier strike groups and
almost 2,000 aircraft, according to U.S. Pacific Command. One aircraft carrier and about 65 ships are permanently forward deployed in
Japan. By comparison, as of last year China’s navy had only 52 frigates and 23 destroyers, many of them antiquated, according to the
Pentagon’s most recent assessment of China’s military. Russia’s Pacific Fleet consists of a missile cruiser, five destroyers and a few dozen
submarines, according to recent news reports. “The U.S. certainly retains an ability to project an awful lot of air and sea power for more
Page 81
limited contingencies — and do so very quickly,” said Anthony Cordesman, a defense expert at the bipartisan Center for Strategic and
International Studies in Washington, D.C. And even if U.S. forces did become embroiled in Pacific confrontations such as those
unfolding in Vietnam and the Philippines, they aren’t the kind of interventions that demand huge follow-up forces, he said. Cordesman
cautioned against equating these kinds of skirmishes with a potential outbreak of hostilities on the Korean peninsula because the U.S. is
prepared and willing to match escalation there, he said. “You’re not going to go to general war over an [exclusive economic zone] or a
reef somewhere in the Pacific,” he said. Still, Cordesman admitted, irrational behavior and
miscalculations
by adversaries
can quickly lead to escalation and “the need for putting many more follow-on forces in the field over time.” Some
experts say that flagging readiness — real or perceived — actually invites escalation by
weakening America’s “deterrent effect ” as China and Russia continue beefing up their Pacific forces.
Page 82
State Secrets DA --- Warrants
Probable cause requirements undermines state secrets privilege and
separation of powers
Pike 7 --- J.D. from Hofstra (Josh, “THE IMPACT OF A KNEE-JERK REACTION: THE PATRIOT ACT AMENDMENTS TO THE
FOREIGN INTELLIGENCE SURVEILLANCE ACT AND THE ABILITY OF ONE WORD TO ERASE ESTABLISHED CONSTITUTIONAL
REQUIREMENTS”, 36 Hofstra L. Rev. 185, Lexis)//trepka
The law should also be amended to give standing to any persons who have been overheard by FISA surveillance, or have a reasonable
suspicion that they were overheard, to challenge the surveillance techniques and the evidence submitted to the FISA court in the
persons should be given an implied right of action to sue the
government for infringing their right to privacy where the evidence submitted to the
government was not sufficient to establish probable cause that the target of the
surveillance had a connection with a foreign power. The burden of proof would be on the individual to disprove
application for FISA surveillance. n204 Such
the government's evidentiary support for the FISA surveillance. Complicating this proposed remedy, in addition to the fact that targets
will not know that they are under investigation, is the
state secrets privilege which allows the government to
refuse disclosure of military and state secrets which, if exposed, pose a reasonable danger of [*229]
threaten ing the safety of the nation. n205 The state secrets doctrine is an evidentiary
privilege which may be invoked by the executive branch to protect military and state secrets from disclosure in a judicial
proceeding. n206 The privilege is only available to the executive and may be invoked only where the court is satisfied that disclosure of
evidence or a response to a question will have a negative effect on national security. n207 In accordance with the Classified Information
Procedures Act of 1980 ("CIPA"), a court reviewing information determined by an executive order to "require protection against
unauthorized disclosure for reasons of national security" may authorize the government to "delete specified items of classified
information from documents to be made available to the defendant through discovery." n208 Since CIPA was enacted by Congress, it can
certainly be amended to allow defendants challenging FISA surveillance to review the evidence against them. However, it
is
unclear if Congress has the authority to revoke the state secrets privilege of the executive
branch. If this privilege is an inherent power of the executive branch, Congress will not
be able to amend the practice and defendants contesting FISA will not be able to review the evidence against them where
the state secrets doctrine is invoked. Congress could, however, enact legislation which mandates that in a challenge to FISA surveillance
the executive branch may invoke the state secrets privilege only if the government pays damages to the defendant, regardless of the
outcome of the case. If the government does not wish to pay damages, the evidence against the defendant must be disclosed. While this
policy would provide defendants with a remedy, it
is unclear if such a coercive measure against the
executive branch in the field of foreign affairs and national security would withstand judicial
scrutiny as it may violate the separation of powers doctrine. If the state secrets privilege
is determined by a court to be an inherent power of the President and the executive branch, there
is little Congress could do to force the President's hand regarding matters strictly delegated
to the executive branch by the Constitution.
Violation of the State Secrets privilege risks nuclear war
Masco 10 --- associate professor of anthropology at the University of Chicago (Joseph, “Sensitive but Unclassified”:
Secrecy and the Counterterrorist State, http://publicculture.org/articles/view/22/3/sensitive-but-unclassified-secrecy-and-thecounterterrorist-state)//trepka
The power of the secret in contemporary American society is difficult to overestimate. Under the U.S. war on
terror (inaugurated during George W. Bush’s administration in 2001), the logics and policy goals of the national security state —
including the rationale for preemptive war, the terms of “extraordinary rendition” and the “detainee,” and the surveillance of U.S.
Page 83
citizens — have all been formally designated as “secrets” under a discourse of imminent threat. However, the “newness” of the war on
terror masks the deep structure of this security logic and the profound mutation in the nature of the state produced by the advent of the
atomic bomb and the accompanying expansion of state secrecy devoted to protecting it. Indeed, the invention of the national security
state after World War II transformed America into a new kind of secret society, one in which state
power rests to an
unprecedented degree precisely on the ability of officials to manage the public/secret divide
through the mobilization of threat. This “secrecy/threat matrix” marks all state secrets as equivalents of the atomic secret,
making revelation a matter not just of politics but of the life or death of the nation-state. The Cold War arms race — founded on the
minute-to- minute possibility of nuclear war — installed the secrecy/threat matrix as the
grounds for a new species of politics in the United States.
Page 84
Terror DA --- Warrants
Maintaining status quo case law is sufficient to uphold privacy considerations
--- the alternative is warrant requirements that hamstring counterterror
operations
Fenske 8 --- J.D. Candidate (Dan, “ALL ENEMIES, FOREIGN AND DOMESTIC: ERASING THE DISTINCTION BETWEEN
FOREIGN AND DOMESTIC INTELLIGENCE GATHERING UNDER THE FOURTH AMENDMENT”, 102 Nw. U.L. Rev. 343,
Lexis)//trepka
Commentators advance many rationales to justify the warrant requirement in general, several of which
this Comment addresses in Part II. However, it should be noted at the outset that the warrant application process conceivably could be
counterterrorism officers must search widely to
gather information on latent threats, a significant amount of the information gathered will
ultimately be unrelated to any terrorist activity. n11 Thus, much of the information gathered through
clandestine intelligence operations will not be used in criminal prosecutions , and these
the only review of intelligence activities by courts. Because
intelligence activities will never come to light. One could therefore assert that the warrant requirement is necessary to provide a judicial
check on the executive's intelligence-gathering prerogative. n12 This Comment rejects this argument for two reasons. First, where
intelligence officers' main concern is not preserving evidence for a future criminal prosecution but
instead uncovering latent plans for a terrorist attack so that it can be prevented, the incentive to
obtain a warrant - even where one is required - is greatly diminished because those officers know they
are unlikely to ever need to justify the search before a court. Thus, the warrant requirement itself may be
inadequate to ensure that a court reviews the domestic intelligence activities of the executive branch. President Bush's authorization of
domestic wiretapping in violation of FISA n13 underscores this point. Second, insofar
as a search is likely to come to light
courts will then be
available to review the intelligence-gathering operations in question. An intelligence officer will [*347] likely
not know for sure whether she will need to justify a search before a court at some point in the future. Even if a warrant is not
required, therefore, a wise officer will take steps to ensure that the search is reasonable , so as to
- whether through leaks to the news media, congressional oversight, or a criminal prosecution - the
ensure favorable judicial review at a later point. Thus, where a search is almost certain never to come to light
(say, because the government has no intention of using the information in a criminal prosecution, but instead to further ongoing military
operations), an officer has little incentive to seek a warrant, making the warrant requirement impotent. But because
there is
some likelihood that the search will be subject to judicial review, an officer likely will take steps to
ensure the reasonableness of that search. Thus, this Comment argues that the debate over whether or
not warrants should be required actually devolves into a debate over whether before-the-fact
review is inherently better than after-the-fact review in the intelligence-gathering context. As noted
more fully in Part II, warrants offer little benefit vis-a-vis after-the-fact review. Furthermore, warrants impose real costs
on intelligence gathering . The warrant's probable cause requirement stifles
many
legitimate intelligence-gathering activities that are vital to uncovering the plans of covert terrorist
agents, n14 and the warrant application process itself can deter legitimate searches. n15 While commentators
advance legitimate policy concerns to justify the warrant requirement, n16 this Comment argues that other measures can
adequately address these concerns without imposing the costs of the warrant process on
intelligence gathering. n17 Given the warrant requirement's burden on counterterrorism and the availability of adequate
alternatives to the warrant, the Court should break with its precedent in the domestic intelligence context - where the stakes are high and adopt a rule that when the government gathers domestic intelligence to thwart a future attack, its conduct is governed solely by the
reasonableness standard and only reviewed by courts after-the-fact. Although such
an approach would require repudiating
Keith, it can fit comfortably within the Court's current Fourth Amendment jurisprudence as an
Page 85
extension of either the " special needs " or foreign intelligence exceptions to the
warrant requirement. n18 This Comment thus does not argue for a radical shift in the Court's
Fourth Amendment case law.
Strict interpretations of the Fourth Amendment don’t solve privacy, but they
make it impossible to prevent a bioweapons attack
Fenske 8 --- J.D. Candidate (Dan, “ALL ENEMIES, FOREIGN AND DOMESTIC: ERASING THE DISTINCTION BETWEEN
FOREIGN AND DOMESTIC INTELLIGENCE GATHERING UNDER THE FOURTH AMENDMENT”, 102 Nw. U.L. Rev. 343,
Lexis)//trepka
Imagine two scenarios. In the first, an American citizen with a connection to al Qaeda conspires with his
cohorts, also American citizens, to attack the United States using biological warfare agents. He surveils
potential sites for the attack - a high-rise tower, an athletic stadium, a government facility - and acquires some of the
materials needed to carry out the attack. Meanwhile, his coconspirators are busy in their makeshift lab concocting the
biological agent to be used in the attack. The members of the group communicate with each other and with their
financial and ideological backers overseas via cell phone, email, and in person. They live in an American city, biding
their time as they wait for their superiors to give them the final go-ahead. The second scenario is identical to the first,
except that no overseas superiors direct and finance the operation. Instead, our terrorist cell is out on
its own, unconnected to - though ideologically compatible with - al Qaeda. Even without its master in a foreign
land, the group has the resources necessary to carry out the attack. In effect, the threat posed in both
scenarios is identical. n1 Despite the indistinguishable threats posed by these two groups, the United States
government is substantially more likely to thwart an attack by the group in the first
scenario. The President has greater authority to conduct counterterrorism surveillance and
intelligence gathering against
groups with foreign connections than against groups with no foreign
connections. This dichotomy derives from the Supreme Court's decision in the Keith case, which
held that a warrant is required for a domestic intelligence search to comport with the Fourth
Amendment. n2 Thus, unlike investigations into groups with foreign connections, domestic terrorist investigations are
subject to far more stringent requirements under the Fourth Amendment . n3 Over the last few
years, much of the scholarship on the Fourth Amendment and intelligence gathering has focused on foreign intelligence gathering within
the United States. n4 President Bush's January 2005 authorization [*345] of warrantless electronic surveillance of al Qaeda-related
communications with overseas connections has generated a wealth of commentary, most of it analyzing whether such conduct violates
the Foreign Intelligence Surveillance Act (FISA), n5 or whether Congress can constitutionally limit the President's power to conduct
foreign intelligence surveillance within the United States. n6 This Comment eschews the separation of powers questions that dominate
these analyses. Instead, it attempts to fill a gap in the scholarship by focusing on purely domestic intelligence gathering that implicates
the Fourth Amendment. This Comment challenges the assertion made by many commentators that warrants, whether for domestic or
foreign intelligence gathering in the United States, should be required because they provide a check on executive discretion. This
Comment argues that warrants
provide only marginal privacy-protection benefits while imposing
real costs on domestic intelligence gathering - defined as intelligence gathering designed to thwart threats
with no foreign connections. The Fourth Amendment's reasonableness touchstone should
supplant the focus the Supreme Court has placed on warrants and probable cause in determining
compliance with the Fourth Amendment in the domestic intelligence-gathering context. Reasonableness inherently involves the
weighing of various interests on both sides of an issue and can therefore take into account the waxing and waning of threats posed
against the United States. n7 Thus, an
intrusive search designed to prevent a terrorist attack might be
reasonable, but the same search using the same means solely to investigate a crime that has
already been committed might be unreasonable . By straight-jacketing itself into a
Page 86
warrant and probable cause analytical framework, the Court forces itself to find exception after
exception when such a framework proves unworkable, n8 due to either the needs of the government [*346] or the nature of the
particular search. n9 Such exceptions to the warrant requirement are understandable because a warrant presumption can, in many
instances, be an effective way to enforce the Fourth Amendment's commands. However, given
that in the domestic
intelligence context, warrants are insufficient to protect Fourth Amendment interests and that
the probable cause requirement for all searches makes effective intelligence gathering
difficult , n10 the Court should extend an exception to the warrant requirement for
domestic intelligence gathering .
It’s uniquely key to prevent terrorism now --- ruling to protect 4th amendment
rights undermines a necessary degree of surveillance with the ever-present
threat of terrorism
Plummer 6 --- J.D., Mississippi College School of Law, law clerk for Barnes of the Mississippi Court of
Appeals (Brooke, “Domestic Spying: A Necessity in a Post-9/11 America or an Abuse of Presidential Power?”, Mississippi College Law
Review, Lexis)//trepka
Benjamin Franklin once famously remarked that "they
that can give up essential liberty to obtain a little temporary
safety deserve neither safety nor liberty." n124 In the midst of the current national debate over the NSA's [*319] domestic
spying program, these words have become a mantra for those who claim that the program cannot withstand scrutiny under the current
law of the United States. However, while Franklin's
notion that liberty cannot be sacrificed for safety is great in theory, it
cannot withstand the reality of a post-9/11 America, at least not in its absolute form.
Franklin could not possibly have envisioned a series of events such as those that transpired on 9/11 and how those events would change
this nation. The American citizenry simply cannot expect the same degree of privacy that it
enjoyed prior to 9/11 while at the same time demanding that its government protect it from an enemy that thrives on such privacy.
However, this
is certainly not to say that civil liberties must always be forsaken for the pursuit of
national security, for to allow that to happen would destroy the values upon which this country was founded. Therefore, perhaps the
greatest challenge faced by the United States as it prosecutes the war on terror is striking the appropriate
balance between the protection of civil liberties and the pursuit of national security. Whether the NSA domestic
spying program strikes this balance remains to be seen. As laudable a goal as national security is, this is still a nation of laws and, as the
foregoing discussion illustrates, there is substantial evidence to support the argument that the NSA program violates these laws.
Nonetheless, one must always remember that the
war on terror is not a conventional war, and it is for this reason
may not be desirable to require that the means used to prosecute this war strictly
comply with laws whose creators could not possibly have conceive d of the realities of a
post-9/11 America. Again, this is not to say that such laws can be disregarded in the pursuit of the safety of the nation, but only to
that it
suggest the laws' requirements be interpreted in light of the nation's current state of affairs, for the failure of those entrusted with the
responsibility of interpreting the law to adapt the law to changing circumstances can lead to more harm than good, especially
when something as serious as national security is at stake. That being said, the NSA domestic
spying program authorized by President Bush may not withstand scrutiny under any interpretation of the relevant laws
and, because of its national significance, the final arbiters of this debate will almost surely be the nine justices of the United States
Supreme Court. Given that the ACLU case is currently making its way through the appeals process, the Court is likely to be faced with
this most important of cases sooner rather than later. Furthermore, due to the recent changes in the Court's make-up, there is no way to
accurately predict how the Court might rule. Regardless, in the meantime, the debate over domestic spying will surely rage on.
Page 87
The plan’s precedent spills over to overall national security
Blum 9 --- attorney for the Department of Homeland Security, M.A. in security studies, J.D. from UChicago
(Stephanie, “ WHAT REALLY IS AT STAKE WITH THE FISA AMENDMENTS ACT OF 2008 AND IDEAS FOR FUTURE
SURVEILLANCE REFORM”, 18 B.U. Pub. Int. L.J. 269, Lexis)//trepka
The legal issues surrounding the NSA wiretapping program are complex, implicating
constitutional law, statutory law, canons of constitutional interpretation, [*285] and national security law. The
purpose of this section is to highlight the main legal issues. This section in no way, however, exhausts all the relevant legal issues. Critics
argue that FISA provides the exclusive manner to conduct foreign surveillance; therefore it was unlawful for President Bush to bypass
its provisions by executive order. These critics also emphasize that FISA already contains provisions for warrantless surveillance such
as allowing emergency wiretaps without a warrant for seventy-two hours as long as a warrant is obtained within that time frame; or
allowing warrantless surveillance fifteen days following a declaration of war by the Congress; or allowing the Attorney General to
conduct warrantless surveillance for up to one year if U.S. persons are not the targets. n99 Hence, critics contend that, given the
exceptions for warrantless surveillance, there was no need for the President to bypass the statutory scheme created by Congress. n100
Furthermore, critics maintain that Congress had been willing to amend FISA as it did with the Patriot Act, so there was no justification
for the executive to unilaterally bypass FISA without Congressional authorization. n101 The Bush administration countered that FISA
was not exhaustive and allowed for subsequent statutes concerning foreign surveillance.
Specifically, FISA prohibits any person from intentionally "engaging ... in electronic surveillance under color of law except as
authorized by statute." n102 Therefore, the Bush administration maintained that in
enacting FISA, Congress
contemplated the possibility that the president might be permitted to conduct electronic
surveillance pursuant to a later-enacted statute that did not incorporate all of the procedural requirements set
forth in FISA, or that did not expressly amend FISA itself. n103 Furthermore, the Bush administration claimed that the AUMF
passed by Congress on September 14, 2001 (which authorizes the president "to use all necessary and
appropriate force against those nations, organizations, or persons he determines planned,
authorized, committed, or aided the terrorist attacks that occurred on September 11, 2001") qualified as such a
statute, authorizing electronic surveillance within the meaning of FISA. n104 According to the Bush administration, the broad
language of the AUMF afforded the president, [*286] at a minimum, discretion to employ the traditional incidents of the use of military
force, which included surveillance. n105 The Bush administration pondered how it could use "force" if it could not first locate the
targets, which obviously required surveillance. The Bush administration further supported a broad reading of the AUMF by citing to
the Supreme Court's decision in the case of Hamdi v. Rumsfeld, n106 where the Court held that the AUMF implicitly authorized the
president to detain enemy combatants, even though the AUMF contained no explicit mention of that power. n107
Ruling on the Fourth Amendment makes it impossible to combat terrorism
Blum 9 --- attorney for the Department of Homeland Security, M.A. in security studies, J.D. from UChicago
(Stephanie, “ WHAT REALLY IS AT STAKE WITH THE FISA AMENDMENTS ACT OF 2008 AND IDEAS FOR FUTURE
SURVEILLANCE REFORM”, 18 B.U. Pub. Int. L.J. 269, Lexis)//trepka
Bush administration felt it needed to bypass FISA because it did not have probable
cause that the targets it sought were agents of foreign powers, or believed it did have probable cause but felt it
did not have adequate time to comply with seeking a FISA warrant. n135 In other words, the rationale for the TSP may have
been based on a belief that the substantive probable cause standard was too demanding ,
or the TSP was preferred in order to simply bypass the procedural requirements of FISA in seeking a warrant . The
Perhaps the
reality may be a little of both. Although Gonzales stated in 2005 that the TSP required the Bush administration have a "reasonable basis" for believing that
one party to the call was a terrorist, n136 it is unresolved whether "reasonable basis" was closer to the predicate "probable cause" required by FISA or the
lesser standard of "reasonable suspicion." n137 The administration has argued both positions. [*291] While Gonzales stated that "reasonable basis" was
Fourth Amendment , reports indicate that General Hayden
stated that the Bush administration had adopted a "reasonable suspicion" standard in
applying the TSP because the probable cause standard in FISA was "too onerous."
essentially the same as "probable cause" under the
n138
n139
Complicating matters more, in 2002, a senator tried to change the "probable cause" standard to "reasonable suspicion" for non-US persons under FISA, but
the Justice Department did not support the change, arguing that the probable cause standard was not an obstacle to effective use of FISA and that the
change to reasonable suspicion would probably be unconstitutional. n140 Such a revelation is especially troubling given General Hayden's statement
regarding adopting "reasonable suspicion" as the TSP standard. In essence, it appears that the Bush administration purposefully opted for the lower
reasonable suspicion standard with no FISA oversight at all. Hence, there appear to be two primary rationales for the TSP: (1) that the probable cause
Page 88
standard is too high and (2) that the procedural requirements seeking a FISA warrant are too burdensome. Each potential explanation is addressed in turn.
A. Substantive Probable Cause Standard To what extent is the probable cause standard under FISA sufficient to counter the terrorist threat? As explained
previously, unlike Title III, FISA does not require probable cause that a crime is being, has been, or is about to occur before the issuance of a warrant, but
rather probable cause that the target is an agent of a foreign power or terrorist group (and for U.S. persons, the additional requirement that the U.S. person
may be engaging in activities that knowingly could be a crime). n141 Despite the lower burden under FISA, several policy makers and lawyers argue that
requiring probable cause that the target is an agent of a foreign power is too onerous and does not appreciate the complexities in detecting terrorist activity.
According to former Deputy Attorney General John Yoo, because FISA "assumes that the government already has [probable cause] to believe that a target is
the agent of the foreign power before it even asks for a warrant," FISA works well when the foreign agents are easy [*292] to detect like "foreign embassy,
officials working for a hostile nation," or "a Soviet KGB agent operating undercover as a diplomat." n142 Al Qaeda poses a different challenge, however; its
members do not work for embassies and are not part of any one nation. Yoo's claims are also supported by former federal prosecutor Andrew McCarthy, n143
and Seventh Circuit appellate judge Richard Posner. n144 As McCarthy explains, "To have probable-cause on a target is to know already that he is dangerous.
That's too late. Today's challenge is to discover the unknown Mohamed Atta in our midst, something that can't be done unless surveillance begins
whenever it is reasonable to suspect a foreign operative." n145 As Yoo describes, "counterterrorism agencies must search for clues among millions of
potentially innocent connections, communications, and links." n146 Judge Posner observes that innocent people may not even be aware that they know or are
abetting a terrorist: "the intelligence services must cast a wide net with a fine mesh to catch the clues that may enable the next attack to be prevented." n147
Hence, according to Yoo, McCarthy, and Posner, U.S. intelligence agents need to be able to follow leads quickly and must act fast on educated guesses.
Consider the following example, which is informed by Yoo's description of intelligence gathering in War By Other Means: an al
Qaeda leader is captured in Europe and his laptop or cell phone has ten U.S. phone numbers on it. It
is questionable whether a FISA judge would find probable cause that the users of the ten
phone numbers are terrorists. Perhaps, the captured terrorist had called a hotel in the United States to merely make a reservation.
Nonetheless, intelligence officials would want to conduct surveillance on the ten
individuals - many who may be innocent and not even aware that their communications may have intelligence value - to
n148
n149
determine if any are terrorists. n150 As Cato Senior Fellow Robert Levy explains, there may be a need to conduct surveillance [*293] on individuals who
have had "contact" (even innocent contact) with al-Qaeda members, even though these people are not "agents" of a foreign power as FISA currently
The government can't get a FISA warrant just to find out whether
someone is a terrorist; it has to already have a reason to believe [s]he's one." According to
requires. n151 Yet, as Posner notes: "
n152
Yoo, even if the phone numbers on the cell phone established probable cause, obtaining a FISA warrant is a cumbersome process in which "FBI and DOJ
lawyers prepare an extensive package of facts and law to present to the FISA court." n153 The attorney general must also sign off on the application and
another national security officer "must certify that the information sought is for foreign intelligence." n154 Yoo maintains that "leads could go stale" during
Yoo concludes that FISA does "not meet today's challenge - a sophisticated,
covert, foreign enemy that does not operate out of embassies like the spies of the Cold War ,
but instead conceals its communications within the billions of innocent phone calls and e-mails sent every day."
General Hayden has
expressed the same concern about leads going stale under a rationale of "hot pursuit,"
where it is felt there is not enough time to obtain a FISA warrant without jeopardizing
the surveillance. For instance, if NSA were spying on a terrorist in Yemen and the terrorist called a person in the United States, then NSA
this time period. n155
n156
n157
could legally listen to the call without a warrant because the target was the Yemeni terrorist. But as soon as the call was complete, NSA could not continue
listening to this American's conversations without a FISA warrant. Yet, according to Hayden, time would be of the essence and there would not be time to
obtain a FISA warrant. n158 While FISA allows a seventy-two hour window to begin surveillance, a warrant application would still need to be prepared
within seventy-two hours, and, more importantly, there must still be probable cause to begin the surveillance. n159 According to Hayden and Yoo, however,
under conditions of hot pursuit, there may not be probable cause that the American is an agent of a terrorist group. He could just be an innocent contact of
al-Qaeda or an agent of a terrorist group; surveillance is necessary to make that determination. As law professor Sims describes, "the warrantless
surveillance program is based on the fear that some relevant communications may slip through the cracks, in a situation in which the government either
Other hypothetical examples also highlight
deficiencies with the probable cause standard. For instance, Senator Malcolm Wallop proposed the following scenario:
Consider the case of someone with knowledge of a band of nuclear terrorists , hiding in
one of a thousand apartments in a huge complex. It would be both reasonable and easy to
tap every telephone in the complex, discard all intercepts but the correct one, and gain the vital information. But that would
involve 999 violations of [FISA]. Assistant Attorney General David Kris described a similar fact pattern during Congressional
testimony: If the government had probable cause that a terrorist possessed a nuclear bomb
somewhere in Georgetown, and was awaiting telephone instructions on how to arm it for
detonation, and if FISA were interpreted not to allow surveillance of every telephone in Georgetown in those
circumstances, the President's assertion of Article II power to do so would be quite persuasive
and attractive to most judges and probably most citizens. While these "ticking bomb"
scenarios may be rare, and arguably farfetched, they do illustrate a potential problem with the
cannot get a FISA warrant or is unwilling to do so." n160 [*294]
n161
n162
Page 89
probable cause standard that could justify rethinking the needed predicate for surveillance. Part V provides some thoughts about
potential reforms.
Procedural amendments bad --- undermine counterterror
Pike 7 --- J.D. from Hofstra (Josh, “THE IMPACT OF A KNEE-JERK REACTION: THE PATRIOT ACT AMENDMENTS TO THE
FOREIGN INTELLIGENCE SURVEILLANCE ACT AND THE ABILITY OF ONE WORD TO ERASE ESTABLISHED CONSTITUTIONAL
REQUIREMENTS”, 36 Hofstra L. Rev. 185, Lexis)//trepka
Along with the required substantive changes to FISA, procedural amendments are also required to ensure that FISA will not be used to
escape the Fourth Amendment. As discussed in Part III, the FISA court currently defers to the executive official's assertion that the
significant purpose of surveillance is for foreign intelligence purposes, absent a determination that such certification is "clearly
erroneous." To
properly ensure that the government's purpose is foreign intelligence
surveillance, rather than defer to the executive official, the determination of whether the proper purpose
of the surveillance is foreign intelligence gathering should be made through a factual
inquiry and review by a FISA court judge of the evidence and sworn affidavit submitted by the
executive attesting to the existence of probable cause to believe that the target of surveillance has a connection with a foreign power.
such review by the court may delay the granting of a FISA order for surveillance, this policy
would do more to ensure the validity of the executive's assertions than the current procedures. This procedural safeguard is especially
necessary in light of the recent disclosure that "the FBI has repeatedly submitted
inaccurate information to the Foreign [*226] Intelligence Surveillance Court ("FISC") in its efforts to obtain
secret warrants in terrorism and espionage cases - severely undermining the Government's credibility in the eye of
the Chief Judge of that Court." n195 However, the problem with such a procedural change, in addition to
dramatically slowing down the government's ability to respond to and effectively
counter threats to national security, lies in the fact that the information before the FISA court was submitted by the
executive branch, and the court, as it is not in the business of collecting facts, has no way to verify that the submitted
facts are true. Though this procedural amendment would delay counterintelligence efforts
and place the court in an unfamiliar role , such a policy would conclusively ensure that the government has a
Although
proper purpose for surveillance.
Another link
Blum 9 --- attorney for the Department of Homeland Security, M.A. in security studies, J.D. from UChicago
(Stephanie, “ WHAT REALLY IS AT STAKE WITH THE FISA AMENDMENTS ACT OF 2008 AND IDEAS FOR FUTURE
SURVEILLANCE REFORM”, 18 B.U. Pub. Int. L.J. 269, Lexis)//trepka
To require a court order for every instance in which a foreign target communicates with
someone inside the United States is to require a court order for every foreign target, and
requiring this would reverse 30 years of established intelligence gathering. The
intelligence community cannot possibly know ahead of time who these terrorists will talk
to. It needs to have the flexibility to monitor calls that may occur between a foreign terrorist and a person
inside the United States. n222
Undermines administrative flexibility
Plummer 6 --- J.D., Mississippi College School of Law, law clerk for Barnes of the Mississippi Court of
Appeals (Brooke, “Domestic Spying: A Necessity in a Post-9/11 America or an Abuse of Presidential Power?”, Mississippi College Law
Review, Lexis)//trepka
In addition to citing the aforementioned cases recognizing a foreign intelligence exception, the Administration relies on the special needs
exception to the Fourth Amendment's warrant requirement in arguing that the program is constitutional. n116 The Administration
Page 90
contends that the
special needs exception is particularly applicable "in circumstances in which
the Government faces an increased need to be able to react swiftly and [*318] flexibly, or
when there are at stake interests in public safety beyond the interests in ordinary
enforcement;" furthermore, the Administration asserts and that "one important factor in establishing 'special needs' is whether
the Government is responding to an emergency that goes beyond the need for general crime control." n117 Therefore, according to
the Administration, in light of the continuing threat of terrorism and the clandestine nature of terrorist
activities, domestic electronic surveillance for the purposes of foreign intelligence fits within the
special needs exception and, therefore, may be carried out without a warrant. n118 Furthermore,
because the Fourth Amendment requires that any search by the government be reasonable,
irrespective of whether a warrant is required, the Administration argues that the invasion
of privacy presented by domestic electronic surveillance of individuals suspected with terrorist ties is reasonable in light
of the "Government's overwhelming interest in detecting and thwarting further al Qaeda attacks." n119 According to the
Administration, this interest renders its electronic surveillance of communications in which one party is a suspected terrorist reasonable.
n120
Supreme Court upholds the “special needs” exception now --- that’s critical to
intelligence gathering
Fenske 8 --- J.D. Candidate (Dan, “ALL ENEMIES, FOREIGN AND DOMESTIC: ERASING THE DISTINCTION BETWEEN
FOREIGN AND DOMESTIC INTELLIGENCE GATHERING UNDER THE FOURTH AMENDMENT”, 102 Nw. U.L. Rev. 343,
Lexis)//trepka
The Court has also frequently cast aside the traditional warrant requirement for searches or
seizures that are conducted for reasons other than criminal law enforcement - the
" special
needs " exception. n39 That is, the Court has allowed warrantless searches on less than probable cause when they
"are designed to serve the government's "special needs, beyond the normal need for law enforcement.'" n40 Under this exception, the
Court has approved a checkpoint to query motorists about a hit-and-run accident n41 and [*352] allowed a public school to test its
student-athletes for drugs at random. n42 Upon
a showing of a special government need, the Court evaluates
the constitutionality of a search merely "by balancing its intrusion on the individual's Fourth
Amendment interests against its promotion of legitimate governmental interests ," n43
i.e., by determining the search's reasonableness. The special needs exception has also been used to
justify warrantless intelligence gathering in the United States. In 2002, the Foreign Intelligence
Surveillance Court of Review (FISCR) n44 heard an appeal by the government from the FISA court's
imposition of certain restrictions on the government's foreign intelligence surveillance operation. n45
Amici, arguing in opposition to the government, n46 claimed that FISA warrants are not warrants within the meaning of the Fourth
Amendment and thus any search conducted under such court authorization for the primary purpose of criminal prosecution is per se
unreasonable. n47 The
FISCR sided with the government, concluding that "the question [is] whether
FISA ... is a reasonable response based on a balance of the legitimate need of the government
for foreign intelligence information to protect against national security threats with the protected
rights of citizens." n48 Under this framework, the court addressed the restrictions imposed by the FISA court, which were designed
to further the proverbial "wall" between intelligence and law enforcement operations and personnel. n49 Amici argued that the wall was
necessary to effectuate the Fourth Amendment's traditional warrant requirement for foreign intelligence searches conducted within the
United States where the government's primary purpose is pursuing criminal prosecution. n50 The
FISCR disagreed, holding
that the Fourth Amendment does not require warrants for searches where a
significant purpose of the search is foreign intelligence gathering . n51 The FISCR's
holding relied in part on the special needs exception . While noting that the special needs exception would
only apply where the government has a purpose beyond criminal law enforcement, the FISCR [*353] held that the proper method of
Page 91
applying the exception is to analyze the programmatic purpose of FISA-related activities, not the purpose for which each individual
search is undertaken. n52 Under this view, the goal of building a case for criminal prosecution can be the purpose of an individual
surveillance activity, so long as such surveillance is part of the broader net under which FISA activities fall, namely the gathering of
foreign intelligence. Thus, it is "the nature of the "emergency,' which is simply another word for threat, [that] takes the matter out of the
realm of ordinary crime control," n53 even though in almost all instances the threat itself may constitute a crime. n54 Ultimately, the court
applied a balancing test and concluded that "FISA as amended is constitutional because the surveillances it authorizes are reasonable."
n55
Imposing warrant requirements overdeters --- decks the entirety of
counterterror operations
Fenske 8 --- J.D. Candidate (Dan, “ALL ENEMIES, FOREIGN AND DOMESTIC: ERASING THE DISTINCTION BETWEEN
FOREIGN AND DOMESTIC INTELLIGENCE GATHERING UNDER THE FOURTH AMENDMENT”, 102 Nw. U.L. Rev. 343,
Lexis)//trepka
themselves overdeter. Put simply, obtaining a warrant is costly . As William Stuntz
argues: Warrants may be costly to the police - not in terms of money or lost convictions, but in time and
energy ... . One of the primary reasons searches conducted with warrants tend so strongly to uncover evidence of crime is that
Finally, warrants may
getting warrants is such a hassle for police officers. In many cases, getting a warrant means a day's worth of paperwork plus sitting
around the courthouse, all for the five-minute meeting with the magistrate... . Such queuing
costs may tend to discourage
officers from using warrants [unless the warrant is likely to bear significant fruit ]. n115 To lower
the costs associated with obtaining a warrant, many jurisdictions have adopted streamlined warrant application procedures. For
instance, magistrates in some places hear applications and issue warrants over the phone. n116 However, if ex parte review of in-person
warrant applications is too biased in the government's favor, n117 then surely rushed over-the-phone applications - where the magistrate
cannot even see the officer to judge his credibility or personally review any supporting documents or evidence the officer may have - only
make the problem worse. Under these lax procedures, one begins to wonder if the warrant has any utility at all. A
warrant
application process that affords any real protection - however slight - would necessarily impose
significant costs on the officers seeking the warrant. This is cause for concern, especially in
the domestic intelligence context. As one scholar notes, the police generally do not seek warrants in
marginal cases (where the chance of uncovering evidence is significant but far from certain), suggesting that one of
the reasons warrants are issued almost without exception is because they are only sought when
it is obvious they will be granted. n118 However, proactive intelligence gathering should
necessarily involve "false positives" - searches that, though reasonable, turn up no evidence of
terrorist activity. n119 But because a warrant is required for a domestic intelligence search, and because the warrant
process is costly , intelligence officers are deterred from seeking a warrant, and [*363] therefore
from searching at all. Many have argued that the FBI did not seek a warrant to search Zacarias
Moussaoui's computer out of fear that a judge would not grant the warrant. n120 The fear of
having a warrant application denied, then, leads to overly cautious intelligence gatherin g
that necessarily decreases the amount of information counterterrorism agencies possess to combat
threats from within. Although intelligence agencies, even absent a warrant requirement, could fail to conduct a search for fear
that a judge will disapprove of the search in after-the-fact review, this scenario is unlikely because a
judge in ex post review
would apply the reasonableness standard , n121 which is less exacting
the government
and more favorable towards
than probable cause. n122 As such, ex post review, consistent with the text of the
Fourth Amendment (which only prohibits "unreasonable" searches), lowers the burden on the government
to justify the search, which in turn would weaken an intelligence agent's fear that he would not
be able to justify a search before a judge after the fact. Even if an agency becomes less sensitive to the possibility of
Page 92
judicial disapproval of warrant applications, there is generally less evidence available to justify a warrant for a prospective terrorist
attack than there would be for other crimes. n123 Thus, both the substantive requirements needed to obtain a warrant and the costs
incurred in the process of obtaining it might prove so high that the warrant requirement actually stifles innovative national security
measures. If the FBI is acting only when it strongly believes there is a specific threat - i.e., when it has probable cause of such a threat - it
may well be too late, and it is certainly too timid. Thus, warrants
deter or outright prevent counterterrorism
intelligence gathering against all but the most obvious, known threats. This creates an
unacceptable risk that the government will be denied information necessary to prevent the deaths of scores
of its citizens .
Page 93
SOP DA
Page 94
1NC SOP
Surveillance would be ruled unconstitutional on a separation of powers
standing – that sets a precedent for judicial protection of separation of
powers
Slobogin 15 (Christopher, Milton Underwood Professor of Law, Vanderbilt University Law School,
“Standing and Covert Surveillance” // AKONG)
One response to standing arguments based on the insights of scholars like Milligan and Richards is that they ignore the close
relationship between standing and the scope of the right in question. n131 Indeed, when
the Fourth Amendment is the
basis for the claim, the Supreme Court has explicitly conflated standing with the
Amendment's substance. In Rakas v. Illinois, n132 [*542] the Court stated that the decision as to
whether a defendant can make a Fourth Amendment claim "forthrightly focuses on the
extent of a particular defendant's rights under the Fourth Amendment, rather than on any
theoretically separate, but invariably intertwined con-cept of standing." n133 If a government action
is not a Fourth Amendment "search" vis-à-vis the litigant, Rakas held, then the litigant lacks standing to challenge it. If that
reasoning is the correct approach to standing, then in cases challenging covert surveillance
on Fourth or First Amendment grounds everything rides on whether the surveillance, as it
operates in the way the plaintiff describes it, infringes the plaintiff's reasonable
expectations of privacy or speech and association interests. n134 While such a finding would presumably
be made in the Clapper case, which involved the alleged interception of the content of overseas phone calls, n135 it is less certain in
connection with collection and querying of metadata. The Fourth Amendment is only meant to protect reasonable expectations of
privacy. n136 Supreme Court case law to date strongly suggests that any privacy one might expect in one's metadata or Internet activity
is unreasonable, because we assume the risk that third parties to which we knowingly impart information(here phone companies and
Internet service providers) will in turn divulge it to the government. n137 The same type of analysis might limit standing in cases
brought under the First Amendment. As the Court intimated in Clapper, n138 one could conclude that even if speech and association are
inhibited by surveillance, that inhibition proximately results from the individual's choices, not from [*243] anything the government has
done to the individual. n139 On this view, even if an individual can show that he or she was targeted, standing to contest surveillance
does not exist unless and until the government uses the seized information against the individual, because otherwise a colorable claim
that a constitutionally cognizable interest was infringed cannot be made. If, despite its impact on political participation, covert
surveillance like the metadata program remains immune from Fourth and First Amendment challenges, there remains another avenue
of attack, derived directly from separation of powers doctrine. In other work, I have argued that, even if the Fourth (or First)
Amendment does not govern a particular type of surveillance, Ely's political process theory provides a basis for challenging panvasive
actions that are the result of a seriously flawed political process. n140 More specifically, panvasive surveillance might be challengeable
on one of three grounds: (1) the surveillance is not authorized by the appropriate legislative body; (2) the authorizing legislative body
does not meaningfully represent the group affected by the surveillance; or (3) the resulting legislation or law enforcement's
implementation of it violates notions underlying the non-delegation doctrine. n141 The first and third of these grounds are based
explicitly on separation of powers concerns. As I pointed out, some panvasive surveillance has not been legislatively authorized or has
been authorized by legislation that does not announce an "intelligible principle" governing the implementing agency. n142 Panvasive
surveillance is also defective under non-delegation principles if, as I have argued is true of the NSA's metadata program, it is
implemented by rules or practices that are not explained, were produced through flawed or nontransparent procedures, or are applied
unevenly. n143 Based on several Supreme Court cases, particularly in the administrative law area, n144 I [*544] concluded that any one
of these deficiencies could be the basis for the claim that the legislature, the relevant law enforcement agency, or both are failing to carry
out their constitutional obligations as law-making and law-implementing bodies. n145 Although this type of claim, like the Fourth and
First Amendment claims, aims at "generalized relief," the
Court itself has often granted standing to individuals
making separation of powers claims. n146 The rationale of these cases is not difficult to
grasp, because it again reflects the political process rationale. Many years ago Justice Brandeis
stated, "[T]he doctrine of the separation of powers was adopted by the convention of 1787
not to promote efficiency but to preclude the exercise of arbitrary power." n147 More recently,
Chief Justice Burger asserted that "checks and balances were the foundation of a structure
of government that would protect liberty." n148 More recently still, in Bond v. United States n149 the
Court stated "[t]he structural principles secured by the separation of powers protect the
Page 95
individual as well." n150 If one accepts the possibility that a separation of powers argument can be made
in covert surveillance cases, then parties who can demonstrate the type of injury described
above--that is, a significant stifling of political participation that, to borrow the Second
Circuit's language in its Clapper decision, n151 is a reasonable, non-fanciful, and nonparanoid reaction to covert surveillance--should have standing to challenge panvasive
surveillance even if it is not a search under the Fourth Amendment or does not abridge First [*545] Amendment freedom. The
merits claim would not be that the surveillance is an unreasonable search or infringement of speech or association rights, but rather that
the legislature has failed in its delegation task or that the relevant law enforcement or intelligence agency has acted in an ultra vires
fashion. These
are the types of separation of powers claims that courts ought to hear because
they assure the proper functioning of the political process that the Court is so eager to
protect (with, inter alia, its standing doctrine). To requote Chief Justice Roberts, "[T]he
obligation of the Judiciary [is] not only to confine itself to its proper role, but to ensure that
the other branches do so as well." n152
Congressional war powers hinge on the degree of separation of powers –
judicial precedent allows Congress to pursue further restrictions on executive
warfighting capabilities
Heder 10 (Adam, J.D., magna cum laude, J. Reuben Clark Law School, Brigham Young University, “THE
POWER TO END WAR: THE EXTENT AND LIMITS OF CONGRESSIONAL POWER,” St. Mary’s Law
Journal Vol. 41 No. 3 // AKONG)
Given the textual and historical silence on the issue of whether Congress may claim statutory authority to terminate a war, this Article
considers structural arguments to determine whether such a power is implied. Two
basic structural principles of the
Constitution are the system of checks and balances and the separation of powers.5 5 These
principles ensure a balanced system in which no branch has overwhelming authority. Any
develop- ment that would tilt the scales too heavily in favor of one branch, therefore, would
violate these fundamental structural principles. As noted, Congress and the Executive share
the war powers.56 While Congress has the power to raise an army,57 delegate funds,58 and declare war,59 the President has the
authority to conduct the war effort.60 Accordingly, the Constitution creates a power-sharing regime in
which Congress and the Executive cooperate, at least to some degree, in the prosecution of
war. Likewise, Congress’s appropriation power and the President’s power to command the armies as he sees fit ensure that neither
branch has final authority in all matters related to the prosecution of war. Thus, whether Congress has the more
robust power to legally terminate a war, apart from its appropriation power, hinges in large
part upon whether the exercise of such a power would be consistent with the principles of
the system of checks and balances and the separation of powers. consistent with the principles of the
system of checks and balances and the separation of powers. This Article first considers the Treaty Clause.61 As with other provisions of
the Constitution, the Treaty Clause erects a power- sharing scheme between the elected branches. Endowing one branch with unilateral
power to terminate war would contradict such a structural scheme. As noted above, the Constitution gives the President the right to
make treaties, which includes the power to make peace treaties.62 Thus, the President’s power to make treaties presumably includes the
power to formally end a war. However, the Clause does not give all treaty power to the President. It stipulates the President may make a
treaty, “provided two thirds of the Senators present concur.”63 The process of formally declaring peace or formally ending a war,
therefore, is a political process in which the President negotiates with the Senate to come up with a satisfactory solution.6 4 The
point is that neither branch has ultimate authority. Rather, the political branches must
cooperate in ratifying peace treaties. Such a scheme is consistent with a system in which the two
political branches share war powers. Indeed, the two branches are expected to cooperate in order to draft a peace
treaty. Instead of Congress having authority to unilaterally order the President to cease military operations, one would expect
the two branches to engage each other politically to work toward a solution. Notwithstanding the
Page 96
other
structural considerations could militate in favor of a robust implied congressional
power to statutorily terminate a war. In accordance with the separation of powers
principle, Congress has the legislative power65 and the President has the executive
power.66 Congress, having the legislative power either to declare war or pass a resolution
authorizing war,67 has the implied legislative power, some might argue, of repealing such
authorization. Under this argument, Congress would have the more robust power to end a
war through means other than its appropriation power. Congress’s enumerated powers
carry with them “subordinate and auxiliary” powers.68 The power to “declare war,”
therefore, assumes the lesser power to legislatively “undeclare” war. Congress did this
during the Vietnam War, when it repealed the Gulf of Tonkin Resolution,69 and
considered similar action in 2007 regarding the Iraq War.70 Whether Congress’s attempts
were or would have been constitutionally appropriate and legally binding upon the
President remains largely unanswered because courts generally refused to adjudicate challenges to the
constitutionality of the Vietnam War.71 Nevertheless, Congress has tried this avenue and likely will
attempt it again.
power-sharing scheme reflected in the Treaty Clause and the war-power-sharing structure of the Con- stitution,
Executive war powers are key to averting extinction
Li 9 (Zheyao, J.D. candidate, Georgetown University Law Center, 2009, B.A., political science and history,
Yale University, 2006, “War Powers for the Fourth Generation: Constitutional Interpretation in the Age of
Asymmetric Warfare,” // AKONG)
A. The Emergence of Non-State Actors
Even as the quantity of nation-states in the world has increased dramatically since the end of World War II, the
institution of the nation-state has been in decline over the past few decades. Much of this decline is the direct result
of the waning of major interstate war, which primarily resulted from the introduction of nuclear weapons.122 The proliferation of
nuclear weapons, and their immense capacity for absolute destruction, has ensured that conventional
wars remain limited in scope and duration. Hence, "both the size of the armed forces and the quantity of weapons at their
disposal has declined quite sharply" since 1945.123 At the same time, concurrent with the decline of the nation-state in the
second half of the twentieth century, non-state actors have increasingly been willing and able to use force to
advance their causes. In contrast to nation-states, who adhere to the Clausewitzian distinction between the ends of policy and the
means of war to achieve those ends, non-state actors do not necessarily fight as a mere means of advancing any coherent policy.
Rather, they
see their fight as a life-and-death struggle , wherein the ordinary terminology of war
as an instrument of policy breaks down because of this blending of means and ends.124 It is the existential nature of
this struggle and the disappearance of the Clausewitzian distinction between war and policy that has given rise to a new generation of
warfare. The concept of fourth-generational warfare was first articulated in an influential article in the Marine Corps Gazette in 1989,
which has proven highly prescient. In describing what they saw as the modem trend toward a new phase of warfighting, the authors
argued that: In broad terms, fourth generation warfare seems likely to be widely dispersed and largely undefined; the distinction
between war and peace will be blurred to the vanishing point. It will be nonlinear, possibly to the point of having no definable
battlefields or fronts. The distinction between "civilian" and "military" may disappear. Actions will occur concurrently throughout all
participants' depth, including their society as a cultural, not just a physical, entity. Major military facilities, such as airfields, fixed
communications sites, and large headquarters will become rarities because of their vulnerability; the same may be true of civilian
equivalents, such as seats of government, power plants, and industrial sites (including knowledge as well as manufacturing industries).
125 It is precisely this blurring of peace and war and the demise of traditionally definable battlefields that
provides the impetus for the formulation of a new theory of war powers . As evidenced by Part M, supra, the
constitutional allocation of war powers, and the Framers' commitment of the war power to two co-equal branches, was
not designed to cope with the current international system, one that is characterized by the persistent
Page 97
machinations of international terrorist organizations, the rise of multilateral alliances, the emergence of
rogue states , and the potentially wide proliferation of easily deployable w eapons of m ass d estruction,
nuclear and otherwise. B. The Framers' World vs. Today's World The Framers crafted the Constitution, and the people ratified
it, in a time when everyone understood that the state controlled both the raising of armies and their use. Today, however, the
threat of
terrorism is bringing an end to the era of the nation-state's legal monopoly on violence, and the kind of war that
existed before-based on a clear division between government, armed forces, and the people-is on the decline. 126 As states are caught
between their decreasing ability to fight each other due to the existence of nuclear weapons and the increasing threat from non-state
actors, it is clear that the Westphalian system of nation-states that informed the Framers' allocation of war powers is no longer the order
of the day. 127 As seen in Part III, supra, the rise of the modem nation-state occurred as a result of its military
effectiveness and ability to defend its citizens. If nation-states such as the United States are unable to adapt to the
changing circumstances of fourth-generational warfare-that is, if they are unable to adequately defend against lowintensity conflict conducted by non-state actors-" then
clearly [the modem state] does not have a future in
front of it .' 128 The challenge in formulating a new theory of war powers for fourthgenerational warfare that remains legally
justifiable lies in the difficulty of adapting to changed circumstances while remaining faithful to the constitutional text and the original
meaning. 29 To that end, it is crucial to remember that the Framers crafted the Constitution in the context of the
Westphalian system of nation-states. The three centuries following the Peace of Westphalia of 1648 witnessed an international
system characterized by wars, which, "through the efforts of governments, assumed a more regular, interconnected character."' 130 That
period saw the rise of an independent military class and the stabilization of military institutions. Consequently, "warfare became more
regular, better organized, and more attuned to the purpose of war-that is, to its political objective."' 1 3'
That era is now
over . Today, the stability of the long-existing Westphalian international order has been greatly eroded in
recent years with the advent of international
terrorist organizations, which care nothing for the traditional
norms of the laws of war. This new global environment exposes the limitations inherent in the interpretational
methods of originalism and textualism and necessitates the adoption of a new method of constitutional interpretation. While one must
always be aware of the text of the Constitution and the original understanding of that text, that very awareness identifies the extent to
which fourth-generational warfare epitomizes a phenomenon unforeseen by the Framers, a problem the constitutional resolution of
which must rely on the good judgment of the present generation. 13 Now, to adapt the constitutional warmarking scheme to the new
international order characterized by fourth-generational warfare, one must understand the threat it is being adapted to confront. C. The
Jihadist Threat The erosion of the Westphalian and Clausewitzian model of warfare and the blurring of the
distinction between the means of warfare and the ends of policy, which is one characteristic of fourthgenerational warfare, apply to al-Qaeda and other adherents of jihadist ideology who view the United States as an
enemy. An excellent analysis of jihadist ideology and its implications for the rest of the world are presented by Professor Mary Habeck.
133 Professor Habeck identifies the centrality of the Qur'an, specifically a particular reading of the Qur'an and hadith (traditions about
the life of Muhammad), to the jihadist terrorists. 134 The jihadis believe that the scope of the Qur'an is universal, and "that their
interpretation of Islam is also intended for the entire world, which must be brought to recognize this fact peacefully if possible and
through violence if not."' 135 Along these lines, the jihadis view the United States and her allies as among the greatest enemies of Islam:
they believe "that every element of modern Western liberalism is flawed, wrong, and evil" because the basis of liberalism is secularism.
136 The jihadis emphasize the superiority of Islam to all other religions, and they believe that "God does not want differing belief
systems to coexist."' 37 For this reason, jihadist groups such as al-Qaeda "recognize that the West will not submit without a fight
and believe in fact that the Christians, Jews, and liberals have united against Islam in a war that will end in the complete
destruction of the unbelievers.' 138 Thus, the adherents of this jihadist ideology, be it al-Qaeda or other
groups, will continue to target the United States until she is destroyed. Their ideology demands it. 139 To
effectively combat terrorist groups such as al-Qaeda, it is necessary to understand not only how they think, but also how they operate.
Al-Qaeda is a transnational organization capable of simultaneously managing multiple operations all over the
world."14 It is both centralized and decentralized: al-Qaeda is centralized in the sense that Osama bin Laden is the unquestioned
leader, but it is decentralized in that its operations are carried out locally, by distinct cells."4 AI-Qaeda benefits immensely from this
arrangement because it can exercise direct control over high-probability operations, while maintaining a distance from low-probability
attacks, only taking the credit for those that succeed. The local terrorist cells benefit by gaining access to al-Qaeda's "worldwide network
of assets, people, and expertise."' 42 Post-September 11 events have highlighted al-Qaeda's resilience. Even as the
United States and her allies fought back, inflicting heavy casualties on al-Qaeda in Afghanistan and destroying dozens of cells
worldwide, "al-Qaeda's networked nature allowed it to absorb the damage and remain a threat." 14 3 This is a far
cry from earlier generations of warfare, where the decimation of the enemy's military forces would generally bring an end to the conflict.
D. The Need for Rapid Reaction and Expanded Presidential War Power By now it should be clear just how different this conflict against
the extremist terrorists is from the type of warfare that occupied the minds of the Framers at the time of the Founding. Rather than
maintaining the geographical and political isolation desired by the Framers for the new country, today's United States is an
international power targeted by individuals and groups that will not rest until seeing her demise. The Global
Page 98
War on Terrorism is not truly a war within the Framers' eighteenth-century conception of the term, and the
normal constitutional provisions regulating the division of war powers between Congress and the President do not apply. Instead, this
"war"
is a struggle for survival and dominance against forces that threaten to destroy the United States and her
allies, and the fourth-generational nature of the conflict, highlighted by an indiscernible distinction between wartime and peacetime,
necessitates an evolution of America's traditional constitutional warmaking scheme. As first illustrated by the military strategist Colonel
John Boyd, constitutional decision-making in the realm of war powers in the fourth generation should consider the implications of the
warfare, quick reactions ,
disrupting the enemy's OODA loop are the keys to victory. "In order to
OODA Loop: Observe, Orient, Decide, and Act. 44 In the era of fourth-generational
proceeding through the OODA Loop rapidly, and
win," Colonel Boyd suggested, "we should operate at a
faster tempo or rhythm than our adversaries." 145 In the
words of Professor Creveld, "[b]oth organizationally and in terms of the equipment at their disposal, the armed forces of the world will
have to adjust themselves to this situation by changing their doctrine, doing away with much of their heavy equipment and becoming
more like police."1 46 Unfortunately, the existing constitutional understanding, which diffuses war power between two branches of
government, necessarily (by the Framers' design) slows down decision- making. In circumstances where war is undesirable (which is,
admittedly, most of the time, especially against other nation-states), the deliberativeness of the existing decision-making process is a
positive attribute. In America's current situation, however, in the midst of the conflict with al-Qaeda and other international
fatal
hindrance to achieving the initiative necessary for victory. As a slow-acting , deliberative body ,
Congress does not have the ability to adequately deal with fast-emerging situations in fourth-generational
warfare. Thus, in order to combat transnational threats such as al-Qaeda, the executive branch must have the
ability to operate by taking offensive military action even without congressional authorization, because only
the executive branch is capable of the swift decision-making and action necessary to prevail in
terrorist organizations, the existing process of constitutional decision-making in warfare may prove a
fourth-generational conflicts against fourthgenerational opponents.
Page 99
2NC Link
Restraints spillover to restrict all presidential war powers
Heder 10 (Adam, J.D., magna cum laude, J. Reuben Clark Law School, Brigham Young University, “THE
POWER TO END WAR: THE EXTENT AND LIMITS OF CONGRESSIONAL POWER,” St. Mary’s Law
Journal Vol. 41 No. 3 // AKONG)
This constitutional silence invokes Justice Rehnquist’s oftquoted language from the landmark “political
question” case, Goldwater v. Carter . 121 In Goldwater , a group of senators challenged President Carter’s
termination, without Senate approval, of the United States ’ Mutual Defense Treaty with Taiwan . 122 A
plurality of the Court held, 123 in an opinion authored by Justice Rehnquist, that this was a nonjusticiable
political question. 124 He wrote: “In light of the absence of any constitutional provision governing the termination of a treaty, . . .
the instant case in my view also ‘must surely be controlled by political standards.’” 125 Notably, Justice Rehnquist relied on the fact that
there was no constitutional provision on point. Likewise, there is no constitutional provision on whether Congress has
the legislative power to limit, end, or otherwise redefine the scope of a war . Though Justice Powell argues in
Goldwater that the Treaty Clause and Article VI of the Constitution “add support to the view that the text of the
Constitution does not unquestionably commit the power to terminate treaties to the President alone ,” 126 the
same cannot be said about Congress’s legislative authority to terminate or limit a war in a way that goes beyond its
explicitly enumerated powers. There are no such similar provisions that would suggest Congress may decline to exercise its
appropriation power but nonetheless legally order the President to cease all military operations. Thus, the case for deference to the
political branches on this issue is even greater than it was in the Goldwater context. Finally, the Constitution does not imply any
additional powers for Congress to end, limit, or redefine a war. The textual and historical evidence suggests the Framers
purposefully declined to grant Congress such powers. And as this Article argues, granting Congress this power
would be inconsistent with the general war powers structure of the Constitution. Such a reading of the
Constitution would unnecessarily empower Congress and tilt the scales heavily in its favor . More over, it would
strip the President of his Commander in Chief authority to direct the movement of troops at a time when the
Executive’s expertise is needed. 127 And fears that the President will grow too powerful are unfounded, given the reasons noted
above. 128 In short, the Constitution does not impliedly afford Congress any authority to prematurely terminate a
war above what it explicitly grants. 129 Declaring these issues nonjusticiable political questions would be the most practical
means of balancing the textual and historical demands, the structural demands, and the practical demands that complex modern
warfare brings . Adjudicating these matters would only lead the courts to engage in impermissible line drawing — lines that would both
confus e the issue and add layers to the text of the Constitution in an area where the Framers themselves declined to give such guidance.
The perception of legislative restrictions on executive war powers signal
weakness and trigger conflict – empirically proven by the War Powers
Resolution
Turner 5 (Robert, Professor, University of Virginia School of Law, “The War Powers Resolution: An
Unnecessary, Unconstitutional Source of "Friendly Fire" in the War Against International Terrorism?” //
AKONG)
partisan bickering was not lost on radical states in the Middle East, and the
Syrian Foreign Minister announced that the United States was "short of breath." [62] The
message had also not escaped radical Muslim militia members in Beirut, and in October U.S.
intelligence intercepted a message between two terrorist units saying: "If we kill 15
Marines, the rest will leave." Inadvertently, by its partisan debate and repeated pronouncements that further Marine
All of this
casualties could provoke another debate and a withdrawal of funds for the deployment (such legislation had already been reported out of
a key House subcommittee), in
their partisan effort to invoke the War Powers Resolution, Congress
had essentially placed a bounty on the lives of American forces. The rest is history. Early on the morning
of Sunday, October 23, 1983, a Mercedes truck loaded with highly-sophisticated explosives drove into the Marine Corps compound at the
Beirut International Airport and exploded. America's
terrorist enemies had capitalized on the
congressional signals of weakness by murdering 241 sleeping marines, sailors, and
soldiers-more Marines than had been lost on any single day since the height of the Vietnam War in 1968 and more American military
Page 100
personnel than had been killed in the Gulf War, Grenada, Haiti, Somalia, the Former Yugoslavia, and all other military operations since
Vietnam until the September 11, 2001 attack on the Pentagon. Just
as Congress had passed the War Powers
Resolution in 1973 to misdirect the American people into believing that it bore no
responsibility for the tragic defeat in Indochina-when, in reality, by cutting off funds it had
snatched defeat from the jaws of victory-after the Beirut bombing Congress demanded that
Commandant Kelley bring them the head of a Marine they could blame the latest
catastrophe upon. General Kelley, an officer of legendary ability, principle, and courage, who was widely expected to soon be
named the first Marine to chair the Joint Chiefs of Staff, refused to sacrifice his subordinates to appease Congress or the press. In taking
a principled stand, he understood that he would never become Chairman. Congress deserves the appreciation of all Americans for its
bipartisan unity immediately following the September 11 terrorist attacks. But the multiple references to the War Powers Resolution in
the statutory authorization approved three days later suggests either that things really have not changed or that the tragedy of October
23, 1983 had been forgotten. The
thousands of people murdered in the World Trade Center and the
Pentagon on September 11, 2001, would not have died had the terrorists been deterred.
Deterrence is a function of perceptions of strength and will. Nothing in the past three
decades has done more to undermine perceptions of U.S. will than the behavior of
Congress, outlawing efforts to prevent international aggression in places like Angola and
Central America and threatening to do so if there were casualties time and again in crisis
spots around the globe. Both Democrats and Republicans have ignored the fundamental
principle that partisan politics should stop at the water's edge. And nothing has facilitated this process
than the War Powers Resolution.
Page 101
Mosaic Theory DA
Page 102
Notes
Here’s the easy explanation of the disad
“Mosaic theory” is an idea first implemented in the judicial branch in a D.C. Circuit Court case United States
v Maynard
Basically it’s that information collected from someone in a public space is not a search as per the 4 th
amendment which defines a search as having an expectation of privacy / not being in a public space
However, when the government collects a lot of information from you in a public space, which is out of the
ordinary / an ordinary person is not expected to assemble that much info from you from public movements,
that violates the expectation of privacy because the government can then assemble that information and
garner details about that life that cannot be understood from merely occasionally learning things about
someone from their public behavior—you can know a lot about someone from GPS tracked movements
This court case only ruled in the context of police putting a GPS device on someones car, and the court ruled
that this violated 4th amendment because of “mosaic theory”
Mosaic theory was implicitly upheld in the supreme court in United States v Jones, but the language was
never used, and mosaic theory has not yet been broadly applied to surveillance policy nor to constitutional
doctrine as a whole—it has not been widely implemented yet because both United States v Jones and United
States v Maynard were solely in the context of GPS tracking of vehicles
There has been a debate in law literature about the efficacy of mosaic theory in constitutional doctrine and
whether and how it can be implemented so as to be narrowly tailored and not hamstring intelligence, which
is proof that it has yet to be so broadly applied
The ambiguity of mosaic theory as it currently exists in Supreme Court opinions in the previous cases means
there are disadvantages to applying it broadly in that fashion
One good part of the debate for the aff and neg might be whether it would be applied narrowly in the context
of the aff or whether it would have far reaching implications on constitutional doctrine and investigative
agencies
The aff can also argue that its key to privacy or that the case would be ruled on exclusively using other bases
The Hafetz card is the best impact card, although that leaves the neg vulnerable to link turns like info
overload and the other components of the terror debate that the neg may want to stay away from (like the
impact perhaps), but it is by far the impact with the best internal links
The neg may go for Congress CP solves the info overload turn but avoids invoking mosaic theory which
further inhibits counterterrorism (a link differential type argument)
Additionally, the drone impact might be paired with some cards from the Drones core that was recently
turned out
The law enforcement internal link can analytically be used as an internal link to a narcoterror impact when
paired with some of the cards in the drug cartels section, but those cards are less stellar
Page 103
Lastly, the privacy impact card functions as a link turns case argument against any courts privacy aff because
if you win the aff is ruled on the basis of mosaic theory, it says that in the absence of a judicial ruling,
congress will establish statutory privacy laws on the use of the technology—the court ruling then deters those
statutory restrictions which would otherwise solve the aff while avoiding the terrorism or whatever other
external impact you read
--Ammar Plumber
Page 104
1NC
Mosaic theory is undeveloped and not yet broadly applied but has basis in the
Supreme Court
Walsh, 12
(Courtney, Special Counsel at Parker Poe Adams & Bernstein LLP, LL.M. Master of Laws from Harvard Law
School, JD law UFlorida, Spring 2012, St. Thomas Law Review, 24 St. Thomas L. Rev. 169, “CRIMINAL LAW
ISSUE: FEATURED CONTRIBUTOR: SURVEILLANCE TECHNOLOGY AND THE LOSS OF SOMETHING
A LOT LIKE PRIVACY: AN EXAMINATION OF THE "MOSAIC THEORY" AND THE LIMITS OF THE
FOURTH AMENDMENT”, lexis, amp)
Litigation in the appellate courts, manifesting itself in a debate over the particular technology of real-time
Global Positioning System ("GPS") surveillance, has once again forced the issue as a problem for
adjudication. Most federal appellate courts, in the context of recent GPS surveillance cases, have taken a
conventional view that privacy, as a matter of Fourth Amendment doctrine, cannot logically expand into the
public sphere. n23 The United States Court of Appeals for the District of Columbia, however, struck out in a
substantially different direction, attempting to reevaluate settled law in light of new surveillance
technologies. In United States v. Maynard, the court, sensing a similar problem as the one posed by
Chief Justice Rehnquist, introduced the "mosaic theory," a conceptually novel approach to
Fourth Amendment law intended to cultivate a constitutionally anchored sphere of privacy
that would attach under conditions of long-term technology-driven surveillance
operations. n24 According to the D.C. Circuit, persistent collection of publicly viewable conduct triggers
Fourth Amendment scrutiny when such information can be aggregated into a "mosaic" that reveals
essentially private insights about a person. n25 In the re-styled case of United States v. Jones, the Supreme
Court had the opportunity to address directly the viability of the lower court's "mosaic theory" approach.
Despite [*174] the Court's avoidance of the "mosaic theory" in its controlling
rationale , a review of the Jones concurring opinions yields one remarkable and irreducible
conclusion. The "mosaic theory," regardless of label, is conceptually alive and well as a
source of future privacy litigation and policymaking. n26 With a majority of the Court
having endorsed the normative assumptions and the analytical framework of the "mosaic
theory," n27 the complete canon of this litigation, from Maynard to its subsequent treatment in
Jones, merits close discussion in order to gain a sense of how this doctrine might
shape future constitutional doctrine and the governance of privacy policy in the
context of surveillance technology. Critics of the Maynard "mosaic" have questioned whether
Fourth Amendment privacy can, with any doctrinal coherence, expand so as to regulate
government surveillance in plainly public areas. n28 Alternatively, even if such a rule can be ascribed to
the Fourth Amendment, a question remains as to whether the Fourth Amendment should have to bear this
weight or whether other policy responses would be more appropriate. n29 Answering these questions
requires a review of the jurisprudential history of privacy and its doctrinal relationship with the Fourth
Amendmen
INSERT LINK
Broader court rulings on mosaic theory hamstring counterterrorism
--new public hearings in courts about mosaic theory in different contexts divulge information about the inner
workings of intelligence agencies and informs covert terrorism strategies
Page 105
--mosaic theory forms the basis of intelligence gathering, and thus broader applications of mosaic theory to
restrict its use in the courts makes counterterrorism impossible
Hafetz, 14
(Jonathan, Associate Professor of Law at Seton Hall University School of Law, author of Habeas Corpus after
9/11: Confronting America’s New Global Detention System, co-editor of The Guantanamo Lawyers: Inside a
Prison Outside the Law, senior attorney at the ACLU and a litigation director at NYU’s Brennan Center for
Justice, 1-17-14, Just Security, “Bulk Data Collection and the Mosaic Theory: A More Balanced Approach to
Information”, http://justsecurity.org/5758/guest-post-bulk-data-collection-mosaic-theory/, amp)
The mosaic theory is a fundamental principle of intelligence gathering. As David Pozen has
explained, “[d]isparate pieces of information, though individually of limited or no utility to their
possessor, can take on added significance where combined with other items of information.”
The theory’s most familiar use has been in the classification of documents and withholding
of documents sought under the Freedom of Information Act (FOIA). The government has
invoked the theory with increasing frequency since 9/11 in resisting FOIA requests
perceived to implicate national security, leading to what Jameel Jaffer has described as “a
concentration of information in government hands.” In Center for National Security
Studies v. U.S. Department of Justice, for example, the D.C. Circuit applied the mosaic theory to
justify the Justice Department’s refusal to provide information about hundreds of
individuals swept up and detained following the 9/11 attacks. The Third Circuit similarly relied
on the theory in North Jersey Media Group v. Ashcroft in upholding the government’s decision to close to the
press and public immigration court hearings involving post-9/11 detainees. The information provided at
public hearings, the Third Circuit reasoned, “could allow terrorist organizations to alter their
patterns of activity to find the most effective means of evading detection,” while
information that was not presented at the hearings could “provide important clues to
terrorists, because it could reveal what the investigation has not yet discovered.”
Absent prevention, nuclear terror risks extinction
Schwartz 15 (Benjamin [Worked at the Departments of State, Defense and Energy]; Right of Boom: The
Aftermath of Nuclear Terrorism; The Overlook Press; p. 1-2; kdf)
IN AN OTHERWISE CALM AND UNEVENTFUL MORNING, A
small nuclear weapon explodes in downtown
Washington, DC. The device generates a yield of fifteen kilotons, roughly the same force unleashed by the bomb Little Boy over
Hiroshima. The
casualty count rises to over a hundred thousand, and the destruction is
measured in hundreds of billions of dollars. The blast's electromagnetic pulse burns out electrical
components across the metropolitan area. Radiation leaves the center of the city
uninhabitable for the first time since it was declared America's capital in 1790, and the scientific community predicts that it will
remain so for a decade. The stock market plunges as investors anticipate draconian customs
regimes that will choke global trade. Fear of further attacks paralyzes America and much of the Western
world. Hours after the explosion, a little unkown terrorist group claims responsibility. It is the first time the president, who was not in
Washington at the time of the blast, and his surviving cabinet members, including the director of national intelligence, have heard of the
group. After searching intelligence databases, analysts report that the group is linked to three hostile governments, all of which have
issued statements condemning the attack and denying involvement. It will take weeks for the remnants of the US intelligence
community to assess that one of these three governments is probably lying, but even then the US government won't have irrefutable
evidence of complicity. Unlike
a ballistic missile or bomb delivered by enemy land-, air-, or seacraft, the origin of
Page 106
what analysts will call a "container-based improvised nuclear device" is difficult to
determine and impossible to prove. Nuclear forensics will ultimately provide strong evidence that the fissile material
used in the device originated from the country under suspicion. Signals intelligence will record celebrations and praise of the attack by
midlevel officials in that country's military and intelligence establishment. However, the
intelligence reporting taken as
a whole will suggest that negligence within that country's weapons industry and at its
nuclear complexes is at least as plausible a scenario as a deliberate transfer by government
officials to the terrorist group. Yet there is no conclusive reporting that points to either
willful negligence or human error. Either way, there is no way to know if the transfer occurred through official policy,
the machinations of a venal or ideologically motivated individual, or simple incompetence. There is almost nothing about the origins of
the attack that the president of the United States knows for certain.
Page 107
Uniqueness
Page 108
AT Non-Unique
The Jones ruling was narrow, and mosaic theory wasn’t explicitly invoked
Pascal, 14
(Brian, research fellow with the University of California Hastings Law School Institute for Innovation Law
and a fellow with Stanford Law School’s Center for Internet and Society, American Bar Association,
Litigation: The Journal of the Section of Litigation, Vol. 40 No. 3, “How Technology Broke Privacy”,
http://www.americanbar.org/publications/litigation_journal/201314/spring/how_technology_broke_privacy.html, amp)
Though the mosaic theory is an attractive argument, it was not the basis for the majority
opinion (though Justice Sotomayor’s concurrence relied on an effectively identical justification). By
declining to explicitly accept the mosaic theory (or a similarly flexible approach), the
Court ensured that its holding in Jones would be so narrow as to be nearly
obsolete the day it was handed down .
Staunch opposition and criticism of mosaic theory remains
Gatewood, 14
(Jace, Georgetown University, A.B., 1983; Georgetown University Law Center, J.D., 1990, Associate Professor
of Law at Atlanta's John Marshall Law School, Nebraska Law Review, 2014, 92 Neb. L. Rev. 504, “ARTICLE:
District of Columbia Jones and the Mosaic Theory - In Search of a Public Right of Privacy: The Equilibrium
Effect of the Mosaic Theory”, lexis, amp)
C. Issues Regarding the Implementation of the Mosaic Theory
The introduction of the mosaic theory into Fourth Amendment jurisprudence has met with
mixed reaction. n180 Those that support the newly formulated theory are staunch
supporters, n181 while those that oppose the new theory are adamant in their opposition.
n182 Whatever side one happens to fall on, the criticism of the mosaic theory is generally
the same . n183
The first issue raised by the adoption of the mosaic theory into Fourth Amendment jurisprudence is how to
determine the scope of the mosaic necessary to create a Fourth Amendment violation. n184 In other words,
how much is too much? The Maynard decision did not express a bright-line rule regarding how much
surveillance is required to create a mosaic sufficient to violate the Fourth Amendment. n185 In addition, it
has been proffered that the pro-mosaic opinions authored in Maynard (Judge Ginsburg) and Jones
(Justices Alito and [*529] Sotomayor) each suggest a different answer. n186 This ambiguity
makes it difficult to apply the mosaic theory. n187
Mosaic theory judicial use isn’t yet established
Gatewood, 14
(Jace, Georgetown University, A.B., 1983; Georgetown University Law Center, J.D., 1990, Associate Professor
of Law at Atlanta's John Marshall Law School, Nebraska Law Review, 2014, 92 Neb. L. Rev. 504, “ARTICLE:
Page 109
District of Columbia Jones and the Mosaic Theory - In Search of a Public Right of Privacy: The Equilibrium
Effect of the Mosaic Theory”, lexis, amp)
The Maynard decision marked a dramatic shift in Fourth Amendment jurisprudence and, at
the time of its decision in 2010, was contrary to holdings of several other circuit courts. n19 When the
Supreme Court reviewed the Maynard decision in 2012 in the retitled action United States v.
Jones, n20 even though the Supreme Court did not resolve the case using the mosaic theory,
Justice Sotomayor's concurring opinion and Justice Alito's concurring opinion, which was signed or
joined by three other justices, endorsed some form of the mosaic theory. n21
In the aftermath of Maynard, many articles were written on the mosaic
theory and its viability for Fourth Amendment application. n22 Some of the articles argued
against the wisdom of the mosaic theory and its use in Fourth Amendment jurisprudence
because of its impracticability. n23 According to those commentators, implementing the mosaic theory
[*508]
would be difficult if not impossible to administer. n24 Without a doubt, the mosaic theory raises several
challenging issues for the future of Fourth Amendment jurisprudence. Notwithstanding, however, and
despite the wide-ranging criticism, the application of the mosaic theory may help establish and restore a
balance between our public and private lives.
Mosaic theory faces opposition and is only narrowly applied now
Arcila, 12
(Fabio Jr, Professor of Law, Touro Law Center, participated pro bono in United States v. Jones by consulting
with Jones's Supreme Court counsel and authoring a historical amicus brief supporting Jones, North
Carolina Law Review, December 2012, 91 N.C.L. Rev. 1, “ARTICLE: GPS TRACKING OUT OF FOURTH
AMENDMENT DEAD ENDS: UNITED STATES V. JONES AND THE KATZ CONUNDRUM*”, lexis, amp)
The D.C. Circuit held that law enforcement engaged in an unconstitutional search under the Fourth
Amendment when it [*12] conducted warrantless GPS tracking of Jones's vehicle for twenty-eight days. n25
Controversially, the D.C. Circuit latched onto the prolonged nature of the surveillance to
invoke the "mosaic theory." n26 In a search and seizure context, mosaic theory posits that privacy
interests, such as those protected under the Fourth Amendment, should be protected in a manner that
guards against collections of small bits of information that individually may not be particularly revealing but
when aggregated may reveal a great deal. n27 By doing so, the court avoided the precedent of United States v.
Knotts, n28 a beeper surveillance case that strongly suggested that Jones enjoyed no privacy protections in
his public movements because "[a] person traveling in an automobile on public thoroughfares has no
reasonable expectation of privacy in his movements from one place to another." n29 The D.C. Circuit
explained:
Here the police used the GPS device not to track Jones's "movements from one place to another," but rather
to track Jones's movements 24 hours a day for 28 days as he moved among scores of places, thereby
discovering the totality and pattern of his movements from place to place to place.
... .
... We hold the whole of a person's movements over the course of a month is not actually exposed to the
public because the likelihood a stranger would observe all those movements is not just remote, it is
essentially nil... . [*13]
... .
Page 110
The whole of one's movements over the course of a month is not constructively exposed to the public because,
like a rap sheet, that whole reveals far more than the individual movements it comprises. The difference is
not one of degree but of kind, for no single journey reveals the habits and patterns that mark the distinction
between a day in the life and a way of life, nor the departure from a routine that, like the dog that did not bark
in the Sherlock Holmes story, may reveal even more. n30
This mosaic approach is controversial because it suggests that some limited degree of
warrantless GPS tracking would be constitutional under the Fourth Amendment, but too
much is not. Where the dividing line is located, and how it is identified, remains a mystery.
The United States sought en banc review, which the D.C. Circuit denied over a vigorous
dissent that gamely challenged the mosaic theory.
The panel opinion seems to recognize that Jones had no reasonable expectation of privacy in any particular
datum revealed by the GPS-augmented surveillance, but somehow acquired one through "the totality of
Jones's movements over the course of a month." In the view of the panel, this is true "because that whole
reveals more ... than does the sum of its parts." While this may be true, it is not evident how it affects the
reasonable expectation of privacy by Jones. The reasonable expectation of privacy as to a person's
movements on the highway is ... zero. The sum of an infinite number of zero-value parts is also zero. n31
Unsurprisingly, the United States targeted the mosaic theory in seeking a reversal from the
Supreme Court, arguing that it leaves law enforcement officers with too much uncertainty
regarding allowable warrantless GPS tracking. n32
Page 111
AT Uniqueness overwhelms
Mosaic theory isn’t well defined or developed now, but the Court is ready to
latch on—magnifies the link
Talai, 14
(Andrew, J.D., University of California, Berkeley, School of Law, 2014; B.A., Anthropology, University of
California, Los Angeles, California Law Review, June 2014, 102 Calif. L. Rev. 729, “COMMENT: Drones and
Jones: The Fourth Amendment and Police Discretion in the Digital Age”, lexis, amp)
While Justice Sotomayor's concurrence also treated the mosaic theory
as a special
application of the Katz test - assessing society's expectations in the digital age - it was
different in two respects. First, Justice Sotomayor embraced a democratic rationale (that is, abuse of
discretion and chilling effects) for the Fourth Amendment. n215 Second, she recognized that democratic
concerns arise "in cases involving even short-term monitoring." n216 Ultimately, her solution was to grapple
with the public thoroughfare doctrine and third-party doctrines, n217 finding that in their present state, these
the exact contours of the mosaic theory are
far from clear , the Jones plurality "suggests that a majority of the Court is ready to
embrace some form of the D.C. Circuit's mosaic theory ." n219
are "ill suited to the digital age." n218 While
Momentum is building in support of mosaic theory, but some opposition and
controversy remains—proves the link
Arcila, 12
(Fabio Jr, Professor of Law, Touro Law Center, participated pro bono in United States v. Jones by consulting
with Jones's Supreme Court counsel and authoring a historical amicus brief supporting Jones, North
Carolina Law Review, December 2012, 91 N.C.L. Rev. 1, “ARTICLE: GPS TRACKING OUT OF FOURTH
AMENDMENT DEAD ENDS: UNITED STATES V. JONES AND THE KATZ CONUNDRUM*”, lexis, amp)
The positions that Justices Alito and Sotomayor took are also important for what they
imply about the Supreme Court's views on mosaic theory. Neither of them use the term,
but they implicitly indicate varying degrees of willingness to accept mosaic
theory as at least part of Fourth Amendment surveillance law.
Justice Alito's thoughts on mosaic theory are implicit in the new temporal distinction he applies when
determining if an objective expectation of privacy exists. It appears that, in his view, what makes brief GPS
monitoring not a "search" under the Fourth Amendment is that it reveals a smaller and thus acceptable
amount of information, such that no objective expectation of privacy is infringed. n293 By contrast, Justice
Alito suggests that what makes prolonged GPS monitoring a Fourth Amendment "search" is that it will reveal
more information, such that an objective expectation of privacy is infringed. n294 If this is correct, Justice
Alito is, even if unconsciously, [*63] endorsing a version of mosaic theory, as he is drawing Fourth
Amendment distinctions based upon the amount of information collected, rather than through some other
measure such as the type of search activity at issue. Importantly, at least three other Justices (Justices
Ginsberg, Breyer, and Kagan, who joined Justice Alito's concurrence) presumably agree
with this implicit embrace of mosaic theory and its incorporation into Fourth Amendment
law, as none of them wrote separately to indicate any qualms about or disagreements with
it.
Page 112
In her separate concurrence, Justice Sotomayor even more clearly endorsed the use of mosaic theory in the
Fourth Amendment. Citing to and even parenthetically quoting from that portion of the New York Court of
Appeals's Weaver decision that relied upon mosaic theory, n295 she pointed to the GPS-enabled capability of
developing a "precise, comprehensive record of a person's public movements that reflects a wealth of detail
about her familial, political, professional, religious, and sexual associations." n296 She went on to specify
that she would ask "whether people reasonably expect that their movements will be recorded and aggregated
in a manner that enables the Government to ascertain, more or less at will, their political and religious
beliefs, sexual habits, and so on." n297 These statements demonstrate that, more than any other Justice, she
would consider the amount and extent of information obtained through surveillance, and thus looks
favorably upon mosaic theory in the context of Fourth Amendment surveillance law.
Justice Scalia is no fan of the mosaic theory, and by extension it appears that the three
Justices who joined him (Chief Justice Roberts and Justices Kennedy and Thomas) are not
either. Justice Scalia derided the mosaic theory implications of Justice Alito's temporal
distinction, pointing to the difficulty of the line-drawing that inevitably follows. n298
Nonetheless, the support evident in Justice Alito's and Justice Sotomayor's concurring
opinions for some iteration of the mosaic theory may have significant implications. They
have added their voices to Weaver's embrace of mosaic theory in a Fourth Amendment [*64] context. n299
After Jones, momentum may be building on this point, as the South Dakota Supreme
Court has added its support as well. n300
Mosaic theory judicial applications are not yet completely solidified
Walsh, 12
(Courtney, Special Counsel at Parker Poe Adams & Bernstein LLP, LL.M. Master of Laws from Harvard Law
School, JD law UFlorida, Spring 2012, St. Thomas Law Review, 24 St. Thomas L. Rev. 169, “CRIMINAL LAW
ISSUE: FEATURED CONTRIBUTOR: SURVEILLANCE TECHNOLOGY AND THE LOSS OF SOMETHING
A LOT LIKE PRIVACY: AN EXAMINATION OF THE "MOSAIC THEORY" AND THE LIMITS OF THE
FOURTH AMENDMENT”, lexis, amp)
[*215] Having isolated the issue reserved in Knotts, Judge Ginsburg determined that Knotts merely stood for
the proposition that individuals traveling in an automobile on a public thoroughfare have no reasonable
expectation of privacy in their "movements from one place to another, not that such a person has no
reasonable expectation of privacy in his movements whatsoever, world without end ... ." n286 Establishing
this narrowed view of Knotts, the court contrasted the facts in Maynard, concluding that the issue of
persistent surveillance raised in this case is the precise problem contemplated and reserved by the Supreme
Court in Knotts. n287 The importance of this conclusion cannot be underestimated, because having shed
the controlling burden of Knotts, the Maynard court could permit itself to engage in the
fuller normative discussion of the Fourth Amendment's boundaries that leads to the
formulation of the "mosaic theory."
Mosaic theory judicial use isn’t yet established
Gatewood, 14
(Jace, Georgetown University, A.B., 1983; Georgetown University Law Center, J.D., 1990, Associate Professor
of Law at Atlanta's John Marshall Law School, Nebraska Law Review, 2014, 92 Neb. L. Rev. 504, “ARTICLE:
Page 113
District of Columbia Jones and the Mosaic Theory - In Search of a Public Right of Privacy: The Equilibrium
Effect of the Mosaic Theory”, lexis, amp)
The Maynard decision marked a dramatic shift in Fourth Amendment jurisprudence and, at
the time of its decision in 2010, was contrary to holdings of several other circuit courts. n19 When the
Supreme Court reviewed the Maynard decision in 2012 in the retitled action United States v.
Jones, n20 even though the Supreme Court did not resolve the case using the mosaic theory,
Justice Sotomayor's concurring opinion and Justice Alito's concurring opinion, which was signed or
joined by three other justices, endorsed some form of the mosaic theory. n21
In the aftermath of Maynard, many articles were written on the mosaic
theory and its viability for Fourth Amendment application. n22 Some of the articles argued
against the wisdom of the mosaic theory and its use in Fourth Amendment jurisprudence
because of its impracticability. n23 According to those commentators, implementing the mosaic theory
[*508]
would be difficult if not impossible to administer. n24 Without a doubt, the mosaic theory raises several
challenging issues for the future of Fourth Amendment jurisprudence. Notwithstanding, however, and
despite the wide-ranging criticism, the application of the mosaic theory may help establish and restore a
balance between our public and private lives.
Mosaic theory faces opposition and is only narrowly applied now
Arcila, 12
(Fabio Jr, Professor of Law, Touro Law Center, participated pro bono in United States v. Jones by consulting
with Jones's Supreme Court counsel and authoring a historical amicus brief supporting Jones, North
Carolina Law Review, December 2012, 91 N.C.L. Rev. 1, “ARTICLE: GPS TRACKING OUT OF FOURTH
AMENDMENT DEAD ENDS: UNITED STATES V. JONES AND THE KATZ CONUNDRUM*”, lexis, amp)
The D.C. Circuit held that law enforcement engaged in an unconstitutional search under the Fourth
Amendment when it [*12] conducted warrantless GPS tracking of Jones's vehicle for twenty-eight days. n25
Controversially, the D.C. Circuit latched onto the prolonged nature of the surveillance to
invoke the "mosaic theory." n26 In a search and seizure context, mosaic theory posits that privacy
interests, such as those protected under the Fourth Amendment, should be protected in a manner that
guards against collections of small bits of information that individually may not be particularly revealing but
when aggregated may reveal a great deal. n27 By doing so, the court avoided the precedent of United States v.
Knotts, n28 a beeper surveillance case that strongly suggested that Jones enjoyed no privacy protections in
his public movements because "[a] person traveling in an automobile on public thoroughfares has no
reasonable expectation of privacy in his movements from one place to another." n29 The D.C. Circuit
explained:
Here the police used the GPS device not to track Jones's "movements from one place to another," but rather
to track Jones's movements 24 hours a day for 28 days as he moved among scores of places, thereby
discovering the totality and pattern of his movements from place to place to place.
... .
... We hold the whole of a person's movements over the course of a month is not actually exposed to the
public because the likelihood a stranger would observe all those movements is not just remote, it is
essentially nil... . [*13]
... .
Page 114
The whole of one's movements over the course of a month is not constructively exposed to the public because,
like a rap sheet, that whole reveals far more than the individual movements it comprises. The difference is
not one of degree but of kind, for no single journey reveals the habits and patterns that mark the distinction
between a day in the life and a way of life, nor the departure from a routine that, like the dog that did not bark
in the Sherlock Holmes story, may reveal even more. n30
This mosaic approach is controversial because it suggests that some limited degree of
warrantless GPS tracking would be constitutional under the Fourth Amendment, but too
much is not. Where the dividing line is located, and how it is identified, remains a mystery.
The United States sought en banc review, which the D.C. Circuit denied over a vigorous
dissent that gamely challenged the mosaic theory.
The panel opinion seems to recognize that Jones had no reasonable expectation of privacy in any particular
datum revealed by the GPS-augmented surveillance, but somehow acquired one through "the totality of
Jones's movements over the course of a month." In the view of the panel, this is true "because that whole
reveals more ... than does the sum of its parts." While this may be true, it is not evident how it affects the
reasonable expectation of privacy by Jones. The reasonable expectation of privacy as to a person's
movements on the highway is ... zero. The sum of an infinite number of zero-value parts is also zero. n31
Unsurprisingly, the United States targeted the mosaic theory in seeking a reversal from the
Supreme Court, arguing that it leaves law enforcement officers with too much uncertainty
regarding allowable warrantless GPS tracking. n32
Page 115
Links
Page 116
Drones --- 1NC
Drone surveillance strengthens the currently narrow mosaic doctrine
Talai, 14
(Andrew, J.D., University of California, Berkeley, School of Law, 2014; B.A., Anthropology, University of
California, Los Angeles, California Law Review, June 2014, 102 Calif. L. Rev. 729, “COMMENT: Drones and
Jones: The Fourth Amendment and Police Discretion in the Digital Age”, lexis, amp)
3. Mosaic Theory and Drones
Under the mosaic theory, only long-term surveillance in public would be considered a
search. In fact, the mosaic theory has only been applied successfully in two cases :
People v. Weaver and United States v. Maynard. n242 Both cases involved affixing a physical
GPS device to a vehicle. The mosaic theory has only been applied to GPS surveillance cases
because it relies on a [*766] substantial period of continuous surveillance or data aggregation in
public movements.
How would the mosaic theory apply to drone surveillance? n243 This analysis uses
the D.C. Circuit's approach to the mosaic theory, as it is the clearest exposition so far. In
Maynard, the court held that twenty-eight days of continuous GPS surveillance of an individual on public
thoroughfares aggregated to a search, but a single "frame" of surveillance would not. n244 The rationale was
that the whole is something different than the sum of its parts - long-term surveillance
contravenes society's expectation of privacy in the whole of our movements. n245 However,
the court did not provide a framework for drawing the line between short-term and long-term surveillance.
In a Justice Stewart-like move, n246 the court left that question for another day. n247 Applying these rules to
the drone problem depends on the duration of the surveillance: "snapshots" would not amount to a search,
while "pervasive" surveillance would. In Brossart, the Predator drone was only aloft for a short period of
time, nowhere near twenty-eight days. Under the D.C. Circuit's logic, there would be no problem with this
mosaic theory would find drone surveillance a search
where a system like ARGUS - designed to capture a 24/7 persistent feed aggregated the sum of an individual's movements .
kind of surveillance. Rather, the
Page 117
Drones --- 2NC
Mosaic theory will be applied --- it’s the only way to solve the aff
Talai, 14
(Andrew, J.D., University of California, Berkeley, School of Law, 2014; B.A., Anthropology, University of
California, Los Angeles, California Law Review, June 2014, 102 Calif. L. Rev. 729, “COMMENT: Drones and
Jones: The Fourth Amendment and Police Discretion in the Digital Age”, lexis, amp)
When applying the Jones majority's rationale to the facts of Brossart, this result makes sense. The trespass
test is narrowly tailored to a physical trespass on private property - this monist inquiry
does not grapple with the complexities of drone surveillance. However pervasive, the extent of
surveillance does not matter. The public thoroughfare distinction is also irrelevant. In fact, it does
not even matter if a drone or a manned aircraft gathered the surveillance. Practically speaking, there is no
claim for trespass against aircrafts flying tens of thousands of feet above private property. n221 Further,
those same aircraft [*762] make no actual physical occupation of private property: as such, there would be
no search under the Jones majority's rule. n222
grapple with drone surveillance .
Thus, only the Katz test and mosaic theory can
Page 118
Police Surveillance --- 1NC
Restricting police surveillance ensures application of mosaic theory
Bedi, 14
(Monu, Assistant Professor, DePaul University College of Law. A.B. Dartmouth College, M.Phil. University of
Cambridge, J.D. Harvard University, Boston University Law Review, December 2014, 94 B.U.L. Rev. 1809,
“Social Networks, Government Surveillance, and the Fourth Amendment Mosaic Theory”, lexis, amp)
2. Rejection of the Public Disclosure and Third Party Doctrines
The most troubling part of adopting the mosaic theory is that it requires the abandonment
of, or dramatic alterations to, the Doctrines. The basic problem is the inherent conflict between the first
and second models of reasonable expectation. While the Doctrines embrace a per se rule focusing solely on
disclosure and why this vitiates privacy, the mosaic theory rests on society's opinion and what it deems
reasonable. n223
Consider the Public Disclosure Doctrine. The fact that public movements are not protected
under the Fourth Amendment is critical to law enforcement investigations. n224 Visual
warrantless surveillance remains a central part of police surveillance. n225 It is not clear to
what extent these practices will remain constitutional with the introduction of the mosaic theory. For
instance, it is common for officers to track vehicles and aggregate information from various
sources over a period of time. n226 As Gray and Citron point out, the "mosaic theory puts
these practices and the line of doctrine endorsing them in obvious jeopardy, particularly
when officers are too successful and their investigations produce too much information." n227
This danger is compounded by the fact that law enforcement may use a combination of
visual and technology-based surveillance (a la Knotts) when investigating a suspect. "How, after all,"
ask Gray and Citron, "are we to distinguish "between the supposed invasion of aggregation of
data between GPS-augmented surveillance and a purely visual surveillance of substantial
length'?" n228 It won't do here to simply say that a specific duration of technology-dependent surveillance
violates the expectation of privacy. The problem is that the Public Disclosure Doctrine treats all
public movements the same, regardless of how much information is disclosed or how long it is
observed. n229 To carve out exceptions based on what society thinks is unreasonable leaves
vulnerable investigative techniques that are essential to effective law enforcement.
The Third Party Doctrine would also be on shaky ground. Here, too, the [*1843] mosaic theory would upset
the voluntary disclosure principle that stands at the heart of this doctrine. n230 Shifting the focus to
what society or an individual deems reasonable (the first model of reasonable expectation of privacy)
would surely frustrate the use of undercover informants or other surreptitious data
collection techniques that do not require a warrant. Imagine a scenario where an informant
is deep undercover for a significant period of time gaining the trust of a suspect. Or imagine an
informant who dupes a suspect into allowing her into her home and disclosing private and incriminating
information. Or perhaps the government simply acquires a wealth of financial records from a suspect's bank.
Currently, all of these types of law enforcement tools do not trigger Fourth Amendment protection because
the individual voluntarily discloses the information to another person or entity. n231
However, under
the mosaic theory, none of these tactics are secure . n232 Societal expectations may find
that these methods, too, impinge on Fourth Amendment rights as they involve unreasonable duplicity and
Page 119
reveal private information. Police would thus find themselves in the new
position of having to
secure a warrant based on probable cause before engaging in these practices.
For some, this conclusion may be welcomed, particularly in today's technological world where disclosures to
various entities and individuals have become ubiquitous. n233 Justice Sotomayor, in fact, raises this
possibility in her concurrence. n234 This Article does not take such a drastic approach, nor would such a
course be desirable. Any such rejection would come at the cost of jettisoning or severely
curtailing essential law enforcement investigative [*1844] techniques that have historically
not been subject to warrant and probable cause requirements. n235
Page 120
Private Communications --- 1NC
Private communications surveillance would implicate and support the use of
mosaic theory
Bedi, 14
(Monu, Assistant Professor, DePaul University College of Law. A.B. Dartmouth College, M.Phil. University of
Cambridge, J.D. Harvard University, Boston University Law Review, December 2014, 94 B.U.L. Rev. 1809,
“Social Networks, Government Surveillance, and the Fourth Amendment Mosaic Theory”, lexis, amp)
Enter the mosaic theory with a focus on intimate associations . n51 While individual
social networking communications would not be protected because of the Third Party
Doctrine, in the aggregate, these communications are more than just a bundle of
transmissions - together they are constitutive of an intimate relationship. If courts care
about the government not interfering in these relationships in the face-to-face context, via direct
application of intimate associational rights, they should similarly care about these relationships on the
Internet when assessing Fourth Amendment protection. n52 This means finding that the
underlying social networking communication passes the Fourth Amendment reasonable
expectation of privacy test, because it is part-and-parcel of an intimate relationship. n53
Page 121
Social Networking --- 1NC
Social networking surveillance would implicate and support the use of mosaic
theory
Bedi, 14
(Monu, Assistant Professor, DePaul University College of Law. A.B. Dartmouth College, M.Phil. University of
Cambridge, J.D. Harvard University, Boston University Law Review, December 2014, 94 B.U.L. Rev. 1809,
“Social Networks, Government Surveillance, and the Fourth Amendment Mosaic Theory”, lexis, amp)
Enter the mosaic theory with a focus on intimate associations . n51 While individual
social networking communications would not be protected because of the Third Party
Doctrine, in the aggregate, these communications are more than just a bundle of
transmissions - together they are constitutive of an intimate relationship. If courts care
about the government not interfering in these relationships in the face-to-face context, via direct
application of intimate associational rights, they should similarly care about these relationships on the
Internet when assessing Fourth Amendment protection. n52 This means finding that the
underlying social networking communication passes the Fourth Amendment reasonable
expectation of privacy test, because it is part-and-parcel of an intimate relationship. n53
Page 122
Social Networking --- 2NC
It has to be applied
Bedi, 14
(Monu, Assistant Professor, DePaul University College of Law. A.B. Dartmouth College, M.Phil. University of
Cambridge, J.D. Harvard University, Boston University Law Review, December 2014, 94 B.U.L. Rev. 1809,
“Social Networks, Government Surveillance, and the Fourth Amendment Mosaic Theory”, lexis, amp)
The Fourth Amendment and technology have always had a volatile relationship. As technology
advances, courts and scholars have struggled to update privacy protection. n1 The Supreme Court
introduced the mosaic theory as one way to combat extended electronic surveillance of a
suspect's movements, though the consensus appears to be that it is not sustainable in the
larger Fourth Amendment framework. n2 This Article deploys the mosaic theory in the
Internet context - particularly social networking sites - where it provides an effective way
to protect communications that would otherwise not pass the reasonable expectation of privacy test under
the Fourth Amendment.
Page 123
TPD --- 1NC
Third Party Doctrine surveillance would implicate and support the use of
mosaic theory
Bedi, 14
(Monu, Assistant Professor, DePaul University College of Law. A.B. Dartmouth College, M.Phil. University of
Cambridge, J.D. Harvard University, Boston University Law Review, December 2014, 94 B.U.L. Rev. 1809,
“Social Networks, Government Surveillance, and the Fourth Amendment Mosaic Theory”, lexis, amp)
2. Rejection of the Public Disclosure and Third Party Doctrines
The most troubling part of adopting the mosaic theory is that it requires the abandonment
of, or dramatic alterations to, the Doctrines. The basic problem is the inherent conflict between the first
and second models of reasonable expectation. While the Doctrines embrace a per se rule focusing solely on
disclosure and why this vitiates privacy, the mosaic theory rests on society's opinion and what it deems
reasonable. n223
Consider the Public Disclosure Doctrine. The fact that public movements are not protected
under the Fourth Amendment is critical to law enforcement investigations. n224 Visual
warrantless surveillance remains a central part of police surveillance. n225 It is not clear to
what extent these practices will remain constitutional with the introduction of the mosaic theory. For
instance, it is common for officers to track vehicles and aggregate information from various
sources over a period of time. n226 As Gray and Citron point out, the "mosaic theory puts
these practices and the line of doctrine endorsing them in obvious jeopardy, particularly
when officers are too successful and their investigations produce too much information." n227
This danger is compounded by the fact that law enforcement may use a combination of
visual and technology-based surveillance (a la Knotts) when investigating a suspect. "How, after all,"
ask Gray and Citron, "are we to distinguish "between the supposed invasion of aggregation of
data between GPS-augmented surveillance and a purely visual surveillance of substantial
length'?" n228 It won't do here to simply say that a specific duration of technology-dependent surveillance
violates the expectation of privacy. The problem is that the Public Disclosure Doctrine treats all
public movements the same, regardless of how much information is disclosed or how long it is
observed. n229 To carve out exceptions based on what society thinks is unreasonable leaves
vulnerable investigative techniques that are essential to effective law enforcement.
The Third Party Doctrine would also be on shaky ground. Here, too, the [*1843] mosaic
theory would upset the voluntary disclosure principle that stands at the heart of this
doctrine. n230 Shifting the focus to what society or an individual deems reasonable (the first model
of reasonable expectation of privacy) would surely frustrate the use of undercover informants or
other surreptitious data collection techniques that do not require a warrant. Imagine a
scenario where an informant is deep undercover for a significant period of time gaining the trust
of a suspect. Or imagine an informant who dupes a suspect into allowing her into her home and disclosing
private and incriminating information. Or perhaps the government simply acquires a wealth of
financial records from a suspect's bank. Currently, all of these types of law enforcement
tools do not trigger Fourth Amendment protection because the individual voluntarily
discloses the information to another person or entity. n231 However, under the mosaic
Page 124
theory, none of these tactics are secure . n232 Societal expectations may find that these
methods, too, impinge on Fourth Amendment rights as they involve unreasonable duplicity and reveal
private information. Police would thus find themselves in the new position of having to secure
a warrant based on probable cause before engaging in these practices.
For some, this conclusion may be welcomed, particularly in today's technological world where disclosures to
various entities and individuals have become ubiquitous. n233 Justice Sotomayor, in fact, raises this
possibility in her concurrence. n234 This Article does not take such a drastic approach, nor would such a
course be desirable. Any such rejection would come at the cost of jettisoning or severely
curtailing essential law enforcement investigative [*1844] techniques that have historically
not been subject to warrant and probable cause requirements. n235
Page 125
TPD --- 2NC
Social networking use of mosaic theory is implicated by analysis of the third
party doctrine
Bedi, 14
(Monu, Assistant Professor, DePaul University College of Law. A.B. Dartmouth College, M.Phil. University of
Cambridge, J.D. Harvard University, Boston University Law Review, December 2014, 94 B.U.L. Rev. 1809,
“Social Networks, Government Surveillance, and the Fourth Amendment Mosaic Theory”, lexis, amp)
Enter the mosaic theory with a focus on intimate associations . n51 While individual
social networking communications would not be protected because of the Third Party
Doctrine, in the aggregate, these communications are more than just a bundle of
transmissions - together they are constitutive of an intimate relationship. If courts care
about the government not interfering in these relationships in the face-to-face context, via direct
application of intimate associational rights, they should similarly care about these relationships on the
Internet when assessing Fourth Amendment protection. n52 This means finding that the
underlying social networking communication passes the Fourth Amendment reasonable
expectation of privacy test, because it is part-and-parcel of an intimate relationship. n53
Page 126
Internal links
Page 127
AT No Spillover
Stare decisis means endorsing mosaic theory has broad implications
Gray and Citron, 13
(David--Associate Professor, University of Maryland Francis King Carey School of Law, Danielle Keats--Lois
K. Macht Research Professor of Law, University of Maryland Francis King Carey School of Law, Affiliate
Scholar, Stanford Center on Internet and Society, Affiliate Fellow, Yale Information Society Project, North
Carolina Journal of Law & Technology, Spring 2013, 14 N.C. J.L. & Tech. 381, “ARTICLE: A Shattered
Looking Glass: The Pitfalls and Potential of the Mosaic Theory of Fourth Amendment Privacy”, lexis, amp)
The mosaic theory endorsed by the U.S. Court of Appeals for the District of Columbia and a majority of concurring Justices in United States v. Jones proposes nothing short of a revolution in Fourth Amendment law.
Never before has the Court suggested that we can have reasonable expectations of privacy in certain
quantities or ag-gregations of information even if we have no such expectations in the constituent parts. n111
As with any doctrinal revolution, the mosaic theory appears to require some blood on the floor. Specifically,
adopting a mosaic approach to the Fourth Amendment may require abandoning or
dramatically altering two important lines of Fourth Amendment law: the public
observation doctrine n112 and the third party doctrine. n113 To the extent that this is so,
commitments to these doctrines, or simply to stare decisis, counsel caution before
adopting a mosaic theory of Fourth Amendment privacy.
Page 128
Impacts
Page 129
Court Failure
Broadening mosaic theory rulings causes court failure and delegitimation
Kerr, 12
(Orin, Fred C. Stevenson Research Professor, George Washington University Law School, December 2012,
Michigan Law Review, 111 Mich. L. Rev. 311, “ARTICLE: THE MOSAIC THEORY OF THE FOURTH
AMENDMENT”, lexis, amp)
The first difficulty with the mosaic theory is the most obvious: its implementation raises so
many difficult questions that it will prove exceedingly hard to administer effectively. Because
the mosaic theory departs dramatically from existing doctrine, implementing it would require the creation of
a new set of Fourth Amendment rules-in effect, a mosaic parallel to the sequential precedents that exist
today. The problem is not only the number of questions but also their difficulty. Many of the
questions raised in Part III of this Article are genuine puzzles that Fourth Amendment text,
principles, and history cannot readily answer.
Judges should be reluctant to open the
legal equivalent of Pandora's Box. Murky standards are not unknown in Fourth Amendment
law, of course. But the murkiness of the mosaic theory is unprecedented . I find it
particularly telling that not even the proponents of the mosaic theory have proposed
answers for how the theory should apply . For example, in one recent article, a group of
scholars who endorsed the mosaic approach dismissed the conceptual difficulties of its implementation on
the ground that answering such puzzles "is why we have judges."199 A pro-mosaic amicus brief in Jones
signed by several prominent legal academics was similarly nonresponsive. 200 The brief brushed off the
difficulties with implementing the mosaic theory by stating that judges encounter vague standards elsewhere
in Fourth Amendment law and they can implement the mosaic theory by "consider[ing] the same criteria
applied to other surveillance situations.120 ' I appreciate such confidence in judicial abilities. But surely
there is a stark difference between applying vague standards and implementing a theory so
mysterious that Fourth Amendment experts decline to express an opinion on how to apply
it. Judges are smart people, but they are not like Moses bringing the tablets down from Mount
Sinai. If the questions raised by the mosaic theory can be answered, proponents of the theory
should answer them. Expressions of confidence that answers can be found do not substitute for
the answers themselves. 20 2 The challenge of answering the questions raised by the mosaic
theory has particular force because the theory attempts to regulate use of changing
technologies. Law enforcement implementation of new technologies can occur very quickly,
while judicial resolution of difficult constitutional questions typically occurs at a more
snail-like pace. As a result, the constantly evolving nature of surveillance practices can lead
new questions to arise faster than courts might settle them. Old practices would likely be
obsolete by the time the courts resolved how to address them, and the newest surveillance
practices would arrive and their legality would be unknown. Like Lucy and Ethel trying to package candy on
the ever-faster conveyor belt,203 the mosaic theory could place judges in the uncomfortable position of
trying to settle a wide range of novel questions for technologies that are changing faster than the courts can
resolve how to regulate them. Consider the changes in location-identifying technologies in the last
three decades. Thirty years ago, the latest in police location-tracking technologies was the
primitive radio beeper seen in Knotts. But radio beepers are obsolete. Today the police have new
tools at their disposal that were unknown in the Knotts era, ranging from GPS devices to cell-site records
to license plate cameras. The rapid pace of technological change creates major difficulties for
Page 130
courts trying to apply the mosaic theory: if the technological facts of the mosaic change quickly over
time, any effort to answer the many difficult questions raised by the mosaic theory will
become quickly outdated. Courts eventually may devise answers to the many questions discussed in Part
III. But by the time they do, the technology is likely to be obsolete.
Court broadened rejection of mosaic theory delegitimizes the court
Kerr, 12
(Orin, Fred C. Stevenson Research Professor, George Washington University Law School, December 2012,
Michigan Law Review, 111 Mich. L. Rev. 311, “ARTICLE: THE MOSAIC THEORY OF THE FOURTH
AMENDMENT”, lexis, amp)
Third, as a normative matter, courts should reject the mosaic theory. The mosaic approach is animated by
legitimate concerns: it aims to maintain the balance of Fourth Amendment protection as technology changes,
a method I have elsewhere called "equilibrium-adjustment." n16 But it aims to achieve this reason-able goal
in a peculiar way. By rejecting the building block of the sequential approach, the mosaic theory would be very
difficult to administer coherently. Even if courts could develop answers to the many questions
the theory raises, doing so would take many years - by which time the technologies
regulated by the theory would become obsolete. The mosaic theory would also deter enactment of
statutory privacy regulations and force judges to consider questions that they are poorly
equipped to answer. If courts must broaden Fourth Amendment rules in response to new technologies,
the better approach is to rule that certain steps are always searches. The model should be the Supreme
Court's famous decision in Katz v. United States, n17 not the concurring opinions in Jones.
Page 131
Drones
Mosaic theory inhibits drone use
Talai, 14
(Andrew, J.D., University of California, Berkeley, School of Law, 2014; B.A., Anthropology, University of
California, Los Angeles, California Law Review, June 2014, 102 Calif. L. Rev. 729, “COMMENT: Drones and
Jones: The Fourth Amendment and Police Discretion in the Digital Age”, lexis, amp)
How would the mosaic theory apply to drone surveillance? n243 This analysis uses
the D.C. Circuit's approach to the mosaic theory, as it is the clearest exposition so far. In
Maynard, the court held that twenty-eight days of continuous GPS surveillance of an individual on public
thoroughfares aggregated to a search, but a single "frame" of surveillance would not. n244 The rationale was
that the whole is something different than the sum of its parts - long-term surveillance
contravenes society's expectation of privacy in the whole of our movements. n245 However,
the court did not provide a framework for drawing the line between short-term and long-term surveillance.
In a Justice Stewart-like move, n246 the court left that question for another day. n247 Applying these rules to
the drone problem depends on the duration of the surveillance: "snapshots" would not amount to a search,
while "pervasive" surveillance would. In Brossart, the Predator drone was only aloft for a short period of
time, nowhere near twenty-eight days. Under the D.C. Circuit's logic, there would be no problem with this
mosaic theory would find drone surveillance a search
where a system like ARGUS - designed to capture a 24/7 persistent feed aggregated the sum of an individual's movements .
kind of surveillance. Rather, the
Page 132
Health data
Mosaic theory inhibits governmental collection of health data
Gray, et al, 13
(David--Associate Professor, University of Maryland Francis King Carey School of Law, Danielle Keats
Citron--Lois K. Macht Research Professor of Law, University of Maryland Francis King Carey School of Law,
Affiliate Scholar, Stanford Center on Internet and Society, Affiliate Fellow, Yale Information Society Project,
Liz Clark Rinehart—Professor University of Maryland Francis King Carey School of Law, Summer 2013,
Journal of Criminal Law and Criminology, 103 J. Crim. L. & Criminology 745, “SYMPOSIUM ON
CYBERCRIME: FIGHTING CYBERCRIME AFTER UNITED STATES V. JONES”, lexis, amp)
The amount of personal information, including health information, aggregated by
government agencies, is referred to as "Big Data," and for good reason. Federal agencies,
state authorities, and their private con-tractors store mind-boggling amounts of information.
Given the quantity and scope of this information, there can be no doubt that Big Data
implicates privacy interests recognized by the mosaic theory of Fourth Amendment privacy
endorsed to varying degrees by the concurring opinions in Jones. n135 As the mosaic theory suggests,
aggregations of rather [*768] innocuous information may "reveal[] more - sometimes a great
deal more - than does the sum of its parts." n136 This is a particularly likely prospect given Big
Data's use of increasingly sophisticated analytics, which promise to reveal far more about us
than is disclosed by the raw bits and bytes, no matter how "big" or small the data. n137 The
dangers are yet more pronounced if health-related data is part of the mix
because of what this information can reveal about the most intimate of our
affairs . n138
Page 133
Law Enforcement
Mosaic theory deters law enforcement agent investigation
Ostrander, 11
(Benjamin, JD Law Notre Dame Law School, Volume 86 Issue 4 Notre Dame Law Review, 7-1-11, “THE
"MOSAIC THEORY" AND FOURTH AMENDMENT LAW”,
http://scholarship.law.nd.edu/cgi/viewcontent.cgi?article=1088&context=ndlr, amp)
The application of the "mosaic theory" to the Fourth Amendment would not only be wrong in
principle, it would be impractical in application. Maynard is steeped in uncertainty as to the effects of the
Fourth Amendment's recognition of an aggregation theory of searches. In articulating a novel theory of
Fourth Amendment law, Maynard lacks an accompanying elucidation of the manner in which the theory
functions in the Fourth Amendment. Maynard left little guidance as to the determination of the
proper scope of the mosaic, whether the theory would implicate other pattern-detecting
investigatory techniques, and the appropriate standard of judicial review. A. The Creation and
Scope of the Mosaic Maynard left little guidance as to what durational threshold must to be
crossed in order for the use of pattern-detecting technology to be sufficiently prolonged as
to render it a search.93 Without a clearly demarcated line, law enforcement agents, judges,
and individuals cannot know when an aggregate of information will receive Fourth
Amendment protection. Law enforcement agents are left to speculate as to how much is too
much. 9 4 This lack of clarity will deter law enforcement agents from utilizing
the full extent of their investigatory power. This is even more problematic with
respect to the "mosaic theory's" creation of retroactive unconstitutionality. 95 As soon as a
pat- tern is created, previously permissible individual law enforcement steps become
unconstitutional. Because the "mosaic theory" retroactively renders the entire mosaic
unconstitutional and subject to suppression, law enforcement agents will be even
more hesitant in exercising the full extent of their investigatory power.
Broad adoption of mosaic theory chills law enforcement investigatory power
Gatewood, 14
(Jace, Georgetown University, A.B., 1983; Georgetown University Law Center, J.D., 1990, Associate Professor
of Law at Atlanta's John Marshall Law School, Nebraska Law Review, 2014, 92 Neb. L. Rev. 504, “ARTICLE:
District of Columbia Jones and the Mosaic Theory - In Search of a Public Right of Privacy: The Equilibrium
Effect of the Mosaic Theory”, lexis, amp)
C. Issues Regarding the Implementation of the Mosaic Theory
The introduction of the mosaic theory into Fourth Amendment jurisprudence has met with mixed reaction.
n180 Those that support the newly formulated theory are staunch supporters, n181 while those that oppose
the new theory are adamant in their opposition. n182 Whatever side one happens to fall on, the criticism of
the mosaic theory is generally the same. n183
Page 134
The first issue raised by the adoption of the mosaic theory into Fourth Amendment jurisprudence is how to
determine the scope of the mosaic necessary to create a Fourth Amendment violation. n184 In other words,
how much is too much? The Maynard decision did not express a bright-line rule regarding how much
surveillance is required to create a mosaic sufficient to violate the Fourth Amendment. n185 In addition, it
has been proffered that the pro-mosaic opinions authored in Maynard (Judge Ginsburg) and Jones (Justices
Alito and [*529] Sotomayor) each suggest a different answer. n186 This ambiguity makes it difficult to
apply the mosaic theory. n187
The second major criticism, and perhaps just as problematic as the first, is determining what search
methods trigger the mosaic theory. n188 What if the government used cell phone location
data, pen registry data, wiretaps, GPS surveillance, and visual surveillance? n189 Which, if
any of these modes of surveillance, would be acceptable for the purpose of a mosaic? What if one
mode of surveillance only reveals limited information? Does that mode of surveillance get aggregated with all
other modes of surveillance or just with similar or the same modes? n190 According to opponents of the
mosaic theory, these questions would need to be addressed if the mosaic theory were adopted. n191
Perhaps the most critical issue raised with respect to adoption of the mosaic theory is the
retroactive unconstitutionality that the mosaic theory may create. n192 It is conceivable that
individual components of a search would not, in and of themselves, constitute a search under any theory of
the Fourth Amendment. But when all the pieces are aggregated together, the mosaic may reveal far more
than the individual pieces, making the individual pieces retroactively unconstitutional. n193
The above, while not exhaustive, could have a chilling effect on law enforcement's
exercise of the full extent of their investigatory power if the mosaic theory is
adopted . n194 But that is exactly the point. Adoption [*530] of the mosaic theory will
force law enforcement officials to adopt guidelines and procedures and make critical decisions
regarding the use of certain investigatory techniques so as to avoid having valuable evidence excluded,
err ing on the side of caution by obtaining a warrant or utilizing their investigatory
methods in a less intrusive or abusive manner. In the wake of advanced technology, the mosaic theory will
provide a balancing effect - equilibrium if you will - between Fourth Amendment privacy rights and the need
for effective and efficient law enforcement by restoring the practical considerations that once limited the
extent to which law enforcement could intrude on one's privacy without violating the Fourth Amendment.
Broad mosaic theory application would prevent informants and police
investigations through the Doctrines
Bedi, 14
(Monu, Assistant Professor, DePaul University College of Law. A.B. Dartmouth College, M.Phil. University of
Cambridge, J.D. Harvard University, Boston University Law Review, December 2014, 94 B.U.L. Rev. 1809,
“Social Networks, Government Surveillance, and the Fourth Amendment Mosaic Theory”, lexis, amp)
2. Rejection of the Public Disclosure and Third Party Doctrines
The most troubling part of adopting the mosaic theory is that it requires the abandonment
of, or dramatic alterations to, the Doctrines. The basic problem is the inherent conflict between the first
and second models of reasonable expectation. While the Doctrines embrace a per se rule focusing solely on
disclosure and why this vitiates privacy, the mosaic theory rests on society's opinion and what it deems
reasonable. n223
Page 135
Consider the Public Disclosure Doctrine. The fact that public movements are not protected
under the Fourth Amendment is critical to law enforcement investigations. n224 Visual
warrantless surveillance remains a central part of police surveillance. n225 It is not clear to
what extent these practices will remain constitutional with the introduction of the mosaic theory. For
instance, it is common for officers to track vehicles and aggregate information from various
sources over a period of time. n226 As Gray and Citron point out, the "mosaic theory puts
these practices and the line of doctrine endorsing them in obvious jeopardy, particularly
when officers are too successful and their investigations produce too much information." n227
This danger is compounded by the fact that law enforcement may use a combination of
visual and technology-based surveillance (a la Knotts) when investigating a suspect. "How, after all,"
ask Gray and Citron, "are we to distinguish "between the supposed invasion of aggregation of
data between GPS-augmented surveillance and a purely visual surveillance of substantial
length'?" n228 It won't do here to simply say that a specific duration of technology-dependent surveillance
violates the expectation of privacy. The problem is that the Public Disclosure Doctrine treats all
public movements the same, regardless of how much information is disclosed or how long it is
observed. n229 To carve out exceptions based on what society thinks is unreasonable leaves
vulnerable investigative techniques that are essential to effective law enforcement .
The Third Party Doctrine would also be on shaky ground. Here, too, the [*1843] mosaic
theory would upset the voluntary disclosure principle that stands at the heart of this
doctrine. n230 Shifting the focus to what society or an individual deems reasonable (the first model
of reasonable expectation of privacy) would surely frustrate the use of undercover informants or
other surreptitious data collection techniques that do not require a warrant. Imagine a
scenario where an informant is deep undercover for a significant period of time gaining the trust
of a suspect. Or imagine an informant who dupes a suspect into allowing her into her home and disclosing
private and incriminating information. Or perhaps the government simply acquires a wealth of
financial records from a suspect's bank. Currently, all of these types of law enforcement
tools do not trigger Fourth Amendment protection because the individual voluntarily
discloses the information to another person or entity. n231 However, under the mosaic
theory, none of these tactics are secure . n232 Societal expectations may find that these
methods, too, impinge on Fourth Amendment rights as they involve unreasonable duplicity and reveal
private information. Police would thus find themselves in the new position of having to secure
a warrant based on probable cause before engaging in these practices.
For some, this conclusion may be welcomed, particularly in today's technological world where disclosures to
various entities and individuals have become ubiquitous. n233 Justice Sotomayor, in fact, raises this
possibility in her concurrence. n234 This Article does not take such a drastic approach, nor would such a
course be desirable. Any such rejection would come at the cost of jettisoning or severely
curtailing essential law enforcement investigative [*1844] techniques that have historically
not been subject to warrant and probable cause requirements. n235
Page 136
Mosaic theory hamstrings law enforcement generically
Walsh, 12
(Courtney, Special Counsel at Parker Poe Adams & Bernstein LLP, LL.M. Master of Laws from Harvard Law
School, JD law UFlorida, Spring 2012, St. Thomas Law Review, 24 St. Thomas L. Rev. 169, “CRIMINAL LAW
ISSUE: FEATURED CONTRIBUTOR: SURVEILLANCE TECHNOLOGY AND THE LOSS OF SOMETHING
A LOT LIKE PRIVACY: AN EXAMINATION OF THE "MOSAIC THEORY" AND THE LIMITS OF THE
FOURTH AMENDMENT”, lexis, amp)
However, a stronger and more specific form of the "unworkability" critique comes in two forms.
The first is that the "mosaic theory" would have the effect of making constitutional
surveillance practices, when applied over time, unconstitutional. In other words, it would
make constitutional practices "retroactively unconstitutional." n430 This criticism is not unfair,
given that neither the Maynard decision nor the Jones concurrences offer much guidance on
the presumed number of days - or weeks - that warrantless surveillance could persist before
it turned into an offending "mosaic" and, therefore, a "search." n431 Howev-er, this situation is
not as untenable as it would first seem. Albeit a slightly different context, this mirrors the problem faced by
the Court as a result of its decision in Gerstein v. Pugh. In Gerstein, the Court held that persons arrested
without a warrant had a right to a "prompt" hearing in front of a neutral and detached magistrate. n432
While there was substantial debate after Gerstein about what "prompt" meant in practical terms, the Court
subsequently remedied this in County of Riverside v. McLaughlin, when it held that a hearing that takes
[*236] place within forty-eight hours of arrest was presumably reasonable. n433 Turn-ing again to the
specific facts in Maynard and Jones, these cases offer little practical guidance, aside from the fourweek bright-line standard, that would assist law enforcement in translating the rule into operation. However, just as in County of Riverside, the Court can announce more specifically tailored rules and
guidelines in the course of future litigation. Alternatively, in the absence of judicial action, the legislative
branch could set policy, regulating the number of days government agents could use GPS technology to
collect location data without a warrant. As one example, Congress, via the Foreign Intelligence Surveil-lance
Act ("FISA"), restricts the Attorney General's authority to conduct warrantless electronic surveil-lance for an
unlimited duration following a declaration of war. n434
A final criticism of the "mosaic theory" is that it does not provide any formulation for
determining the size and scope of a mosaic that would trigger Fourth Amendment scrutiny.
n435 Defense attorneys, attempt-ing to bring entire investigations within the scope of a
"mosaic," could argue that the totality of an inves-tigatory file reveals intimate insights and
facts about a person that would otherwise be unavailable to members of the general public.
n436 Consistent with the "mosaic" formulation, this argument has doctrinal purchase now, as no person
would reasonably expect to be investigated and tracked by a member of the general public; therefore, any
information collected as a part of a law enforcement investigation could be viewed as a
product of a Fourth Amendment "search" and subject to warrant requirements. This
argument foresees that if Maynard were extended to its logical extreme entire investigations
could be subjected to more intense Fourth Amendment scrutiny with few guiding
principles to assist law enforcement in avoid-ing pitfalls. n437 This is a serious critique;
nevertheless, the Maynard court appears to anticipate this concern in attempting to limit [*237] its holding
to the specific context of extended GPS surveillance, reserving questions of prolonged visual or other
surveillance. n438 Turning to Jones, even though Justice Alito's con-currence similarly attempts to limit the
Justice Sotomayor's
opinion illustrates how the "mosaic theory" and its logic, if applied broadly,
application of its rationale to lengthy, technology-driven surveil-lance,
Page 137
can begin to extend well-beyond the specific facts of the present case . Regardless
of any attempt to limit the application of "mosaic theory" rationale, the opinions from Maynard
and Jones offer future criminal liti-gants a credible doctrinal foothold to
argue for far greater court regulation over entire criminal investigations .
Hurts investigative practices
Bedi, 14
(Monu, Assistant Professor, DePaul University College of Law. A.B. Dartmouth College, M.Phil. University of
Cambridge, J.D. Harvard University, Boston University Law Review, December 2014, 94 B.U.L. Rev. 1809,
“Social Networks, Government Surveillance, and the Fourth Amendment Mosaic Theory”, lexis, amp)
The mosaic theory - first articulated by the Supreme Court in United States v. Jones two
years ago - has turned out to be an empty promise of Fourth Amendment protection.
However, this may have less to do with the theory itself and more to do with the context in which it has been
applied. Introduced as a mechanism to combat long-term GPS police surveillance, scholars have
widely criticized the theory as untenable and too costly. Its application jeopardizes longstanding police investigative tactics, including the use of undercover informants and even
short-term human surveillance.
This Article provides the first application of the mosaic theory to social networking communications over the
Internet. The refrain of "the sum is greater than the parts" remains. Only this time it is a group of
communications, not a person's movements, that informs the relevant analysis. This Article employs the
principle of associational rights - referenced by Justice Sotomayor in Jones - as a key ingredient to explaining
why these social networking communications, in the aggregate, merit privacy protection. This is not simply
an academic exercise. In light of the news that the NSA has been collecting messages over sites such as
Facebook, courts need a Fourth Amendment framework to protect these communications where one
currently does not exist. This narrow use of the theory also has the benefit of preserving the
current Fourth Amendment landscape and the police's ability to use a wide range of
investigative tactics.
Page 138
Drug Cartels
Mosaic theory would prevent investigative techniques for narcotics arrests
Gray and Citron, 13
(David--Associate Professor, University of Maryland Francis King Carey School of Law, Danielle Keats--Lois
K. Macht Research Professor of Law, University of Maryland Francis King Carey School of Law, Affiliate
Scholar, Stanford Center on Internet and Society, Affiliate Fellow, Yale Information Society Project, North
Carolina Journal of Law & Technology, Spring 2013, 14 N.C. J.L. & Tech. 381, “ARTICLE: A Shattered
Looking Glass: The Pitfalls and Potential of the Mosaic Theory of Fourth Amendment Privacy”, lexis, amp)
In King, police officers followed a suspect, who had just purchased crack cocaine from an
undercover agent, into an apartment building.93 As they entered the building’s breezeway, they heard a
door close, but could not discern which of two apartments the suspect had entered.94 The officers had no
reason to think that the suspect knew he was being followed, so they had no claim of hot pursuit or any other
emergency at that point.95 They did, however, detect the smell of burning marijuana emanating
from behind one door, so they decided to knock, announce themselves, and request entry. 96 The predictable
ensued. Immediately after announcing their presence, the officers heard noises inside the apartment that
might reasonably have indicated that evidence was being destroyed.97 Based on that suspicion, the
officers forced the door open and entered the apartment.98 Once inside, the officers seized several
people on the scene, conducted a Buie 99 protective sweep, and in the course of that search
found marijuana, cocaine, drug paraphernalia, and cash in plain view.100 As it turned out, the
initial suspect was not in the apartment, but three other people were, including the eventual respondent:
Hollis King.101
King was convicted on several narcotics charges and appealed to the Supreme Court of
Kentucky.102 Although skeptical that the sounds officers heard coming from the apartment were enough to
justify an unwarranted entry under the emergency exception to the warrant clause, the Kentucky court
assumed as much. 103 It nevertheless held that King’s conviction should be vacated because the officers
created the emergency.104 In that court’s view, it was unreasonable from a Fourth Amendment perspective
for officers to knock on the apartment door because it was foreseeable, given the circumstances, that doing so
would create an emergency.105 The U.S. Supreme Court reversed. 106 In doing so, it rejected approaches
adopted in lower courts that required assessing the reasonableness of law enforcement conduct holistically by
looking at the totality of an evolving encounter that eventually resulted in a search or arrest. 107 The Court
instead recommitted itself to assessing the reasonableness of officer conduct at each step of an encounter.
108 The Court therefore held that all the Fourth Amendment requires is that, at each stage
of an evolving investigation or engagement, officers limit themselves to conduct that is
reasonable based on what they know or observe.109 In so holding, the Court reaffirmed its
longstanding commitment110 to an objective and synchronic assessment of Fourth Amendment
reasonableness.
The mosaic theory raises serious concerns when considered in the light of
cases like King . Beyond the mathematical challenge of adding nothings to get something, the very
idea of an additive or holistic approach to evaluating Fourth Amendment reasonableness
runs contrary to the synchronic approach that is a foundation of long-standing Fourth
Amendment analysis.
B. Doctrinal Objections to the Mosaic Theory
Page 139
The mosaic theory endorsed by the U.S. Court of Appeals for the District of Columbia and a majority of
concurring Justices in United States v. Jones proposes nothing short of a revolution in Fourth Amendment
law. Never before has the Court suggested that we can have reasonable expectations of privacy in certain
quantities or aggregations of information even if we have no such expectations in the constituent parts. 111 As
with any doctrinal revolution, the mosaic theory appears to require some blood on the floor.
Specifically, adopting a mosaic approach to the Fourth Amendment may require abandoning
or dramatically altering two important lines of Fourth Amendment law: the public observation
doctrine112 and the third party doctrine.
113 To the extent that this is so, commitments to these doctrines, or simply to stare decisis, counsel
caution before adopting a mosaic theory of Fourth Amendment privacy.
Adopting a mosaic approach to quantitative privacy seems to require abandoning the public observation
doctrine, which is often credited to the Supreme Court’s decision in United States v. Knotts.
114 In Knotts, the Court held that using a beeper device to track a suspect’s car on public streets did not
constitute a “search” because the suspect lacked a reasonable expectation of privacy in his public
movements.115 Although the beeper allowed officers to follow Knotts more efficiently and
with fewer personnel, the Knotts Court specifically declined to hold that using technology
raises any independent Fourth Amendment concerns simply because it makes it easier for
law enforcement officers to conduct surveillance that they are otherwise entitled to do
using traditional means.116
The parallels between Knotts and Jones are obvious. In both cases, law enforcement officers
used a passive signaling device attached to a car. 117 In both cases, the devices revealed only
movements on public streets.118 In both cases, those movements were exposed to public view.119 Given
these similarities, Knotts would seem to control in a case like Jones, thus barring Fourth Amendment review
of GPS-enabled tracking so long as the technology is only used to monitor movements in public.120 Should
the Court eventually adopt a mosaic approach to assessing and protecting quantitative privacy, it
would therefore seem obliged to overrule or modify Knotts and the long line of subsequent cases121
endorsing investigative-surveillance techniques and technologies that merely document what targets
knowingly expose to public view.122
Among the most compelling examples of these potential disruptions is the effect of the mosaic
theory on traditional human surveillance.123 Visual surveillance is a mainstay of
targeted police investigations . Police officers routinely conduct “stake-outs,”
sometimes using teams of officers and vehicles to track suspects as they move through
public spaces . 124 Law enforcement agencies also aggregate information from informants to
develop detailed accounts of suspects’ public movements.125 These practices are not only
commonplace,126 they have been routinely endorsed by courts as well within Fourth Amendment
bounds127—a view that is shared even among mosaic promoters128—because they document conduct and
movements in which the suspect or target has no reasonable expectation of privacy.129 The mosaic
theory puts these practices and the line of doctrine endorsing them in obvious jeopardy ,
particularly when officers are too successful and their investigations produce too much
information.130 How, after all, are we to distinguish “between the supposed invasion by aggregation of data
between the GPS-augmented surveillance and a purely visual surveillance of substantial length”?131
Page 140
In addition to the public observation doctrine, the mosaic theory also threatens to unsettle the “third
party doctrine.”132 The Court has long held that citizens who share information with others assume the
risk that what they share might be passed along to law enforcement.133 Applying this rule, the Court has
held that there is no Fourth Amendment violation if a criminal confederate shares the
confidences of his co-conspirators with police, 134 if a bank shares a customer’s financial records
with law enforcement,135 or if a telephone company discloses records of phone calls customers make or
receive.136 More recently, a New York court ruled that a customer of the social networking website Twitter
137 had no standing to challenge a lawful subpoena issued against the company for locational information
embedded in his posts because he voluntarily shared that information with Twitter.138 As Justice
Sotomayor, who expresses sympathy for some version of the mosaic theory in her Jones concurrence, points
out, “[I]t may be necessary to reconsider the premise that an individual has no reasonable expectation of
privacy in information voluntarily disclosed to third parties.”139 That is because we routinely share vast
quantities of data with private agents, many of whom store it.140 Our Internet service providers track and
keep detailed records of where we go on the internet. 141 Our chosen search engines gather information not
only on our search patterns, but also where we go, what we look at, and what stimuli we react to while online.
142 For most of us, law enforcement would not need to install GPS-enabled devices on our persons or cars if
they wanted to track us in the same way that officers tracked the defendants in Jones because we already
carry GPS chips in our telephones, cars, and computers that pass along information about our movements to
a wide range of third parties, from map services to social network applications and restaurant rating sites.
143 Moreover, these third parties are already in the habit of sharing much of the information they gather.
Data brokers aggregate and analyze vast reservoirs of data from financial institutions, retailers, public
records, social networking sites, and just about anywhere we interact with the physical or virtual worlds.144
The third party doctrine provides the Government with unfettered access to all of this data145—so much so
that Chris Hoofnagle has coined the phrase “Big Brother’s Little Helpers” to describe data brokers like
Acxiom,146 which aggregate data from public and third-party sources to compile detailed mosaics of
information on anyone and everyone.147
The question hinders drug searches and seizures
Kerr, 14
(Orin, Fred C. Stevenson Research Professor, George Washington University Law School , 12-18-14,
Washington Post, “Two district courts adopt the mosaic theory of the Fourth Amendment”,
https://www.washingtonpost.com/news/volokh-conspiracy/wp/2014/12/18/two-district-courts-adopt-themosaic-theory-of-the-fourth-amendment/, amp)
Judge Lawson recognized that his approach raised a difficult question of line-drawing: How
long is long enough for monitoring to constitute a search? He answers:
[C]ourts have confronted similar problems in the past. For instance, how long may law
enforcement detain property waiting for a drug detection dog to arrive for a sniff before the
intrusion matures into a “seizure”? To find an answer, courts must “balance the nature and
quality of the intrusion on the individual’s Fourth Amendment interests against the
importance of the governmental interests alleged to justify the intrusion.” United States v. Place, 462
U.S. 696, 703 (1983).
Mosaic making is key to drug enforcement
Pascal, 14
Page 141
(Brian, research fellow with the University of California Hastings Law School Institute for Innovation Law
and a fellow with Stanford Law School’s Center for Internet and Society, American Bar Association,
Litigation: The Journal of the Section of Litigation, Vol. 40 No. 3, “How Technology Broke Privacy”,
http://www.americanbar.org/publications/litigation_journal/201314/spring/how_technology_broke_privacy.html, amp)
In 2004, the Washington, D.C., Metropolitan Police Department, working with the Federal Bureau of
Investigation, began investigating nightclub owner Antoine Jones for possible narcotics
violations . As part of their investigation, the officers installed a Global Positioning System
(GPS) unit on Jones’s car and used it to track his movements without a warrant. In late 2011, the
case of United States v. Jones reached the Supreme Court, and in January 2012, the Court held that this
warrantless use of a GPS tracker violated Jones’s Fourth Amendment rights. The majority
opinion relied primarily on a trespass argument, stating that it was the government’s placement of the
device on Jones’s private property that generated the constitutional violation. Sifting through the various
concurrences, it is also possible to tally five justices’ worth of support for a more expansive argument that has
come to be known as the “mosaic theory,” a phrase first coined by law professor Orin Kerr. Under the
mosaic theory, the emphasis would rest on the idea that Jones possessed a reasonable
expectation of privacy in his physical location, and, regardless of method, it was improper for the police
to acquire that information without a warrant.
Though the mosaic theory is an attractive argument, it was not the basis for the majority
opinion (though Justice Sotomayor’s concurrence relied on an effectively identical justification). By
declining to explicitly accept the mosaic theory (or a similarly flexible approach), the
Court ensured that its holding in Jones would be so narrow as to be nearly
obsolete the day it was handed down .
In an ever-increasing number of cities throughout the United States, police departments are installing
“automated license plate readers” (ALPR, also called “automated number plate readers,” or ANPR, in
Europe). ALPR systems are networks of cameras that capture the license plate of every car that
drives by, along with a time stamp and geographical location. When the information is combined
into a database and filtered properly, it is possible to track the movements of a car throughout a
city without employing anything so clumsy as a physical GPS unit. In addition, it is possible to
cross-reference the ALPR database with other police data sources. For example, if police receive a 911
call reporting gunshots, they could access the ALPR database and search for any vehicles
registered to individuals who were arrested for gun crimes. An unlucky individual passing by a
few blocks away might find himself the subject of a police investigation, based solely on the route he chose to
drive and his past interactions with law enforcement.
Hypothetical scenarios aside, there are three very real facts about ALPR systems that many privacy advocates
find troubling. The first is that ALPR is indiscriminate: By design, it captures the license plate of every car
that drives by. This means that information about the movements of every individual driving through an
ALPR-enabled city lies buried in police databases, whether or not those individuals are targets of an
investigation. And, make no mistake, these data sets can contain substantial details about an individual’s
habits. They can reveal the times of day when a mother leaves for work and picks up her children, the fact
that an individual visits a mental health professional on Thursday afternoons, or the location of the cheap bythe-hour hotel that two married individuals frequent for late-night trysts.
Page 142
The second concern that ALPR systems raise is one of scale. Thirty years ago, it was comparatively expensive
in terms of manpower and logistics to tail a suspect. If the police wanted to follow an individual’s movements,
they had to devote officers to the task, and, if they were wrong, that time and that effort were entirely wasted.
Today, the same ALPR system that can monitor a thousand cars can just as easily monitor a million. The
scale of this surveillance is subject only to the technical limitations of the ALPR system, and, in practice, this
is not much of a limitation at all. Modern systems can track almost every vehicle in a city, in something
approaching real time, and they can store data long enough to allow police to review an individual’s
movements over the course of prior weeks or months. Legal scholar Woodrow Hartzog has written much
about how some level of obscurity is necessary to maintain basic privacy and freedom within a modern
society, and ALPR systems push in exactly the opposite direction. See Woodrow Hartzog and Evan Selinger,
“Obscurity: A Better Way to Think about Your Data Than ‘Privacy,’” Atlantic, Jan. 17, 2013.
The third, and perhaps incongruous, difficulty with ALPR arises from the fact that these systems are almost
certainly legal. It has long been an accepted legal doctrine that individuals have no reasonable expectation of
privacy in their photographic image in a public place (see, e.g., Katz v. United States 389 U.S. 347 (1967)),
and capturing the images of cars on public roads is all that ALPR systems do. As discussed above, these
photos can paint a picture of an individual’s personal life far more detailed than anything that can be
captured by a single telephoto lens. Despite this, much of Fourth Amendment law stubbornly focuses on
single acts of capture rather than fully comprehending the power of aggregated information.
For all their ubiquity and “creepiness,” at first glance ALPR systems seem a possible boon to defense
attorneys. If these systems capture so many subjects so broadly, then they would be hugely capable in the
discovery of reasonable doubt. After all, any halfway-competent defense attorney, upon learning that his or
her client was charged on the basis of information derived from an ALPR database, would surely subpoena
the contents of that database—perhaps the disclosure of this database might even be required under Brady v.
Maryland. But prosecutors have recognized this possibility as well, and it is exceedingly unlikely that we will
ever see ALPR evidence introduced directly in court. This information is used for investigatory purposes, and
the case that the prosecutor presents to the jury is built on other information, even if it would have been
impossible to uncover these facts without the starting point provided by the ALPR database.
There is nothing inherently wrong with this practice: Bifurcating the investigation from the prosecution and
presenting a coherent, clear story to the jury is a tactic as old as adversarial criminal procedure. However,
when combined with the massive amount of information that law enforcement is able to gather about an
individual from other sources (e.g., from the suspect’s mobile phone, as discussed in Yuri Mikulka’s and
Sarah S. Brooks’s piece elsewhere in this issue), ALPR systems and tools like it have the potential to be put to
use in a far more sinister way.
This is not mere paranoid speculation: In an exclusive story from August 2013, Reuters uncovered
information suggesting that the U.S. Drug Enforcement Agency (DEA), while investigating ordinary
crimes unrelated to terrorism, based their investigations on tips received from a top-secret
Special Operations Division (SOD) within the DEA. This division was initially created to
combat Latin American drug cartels , and it partnered with such agencies as the
Federal Bureau of Investigation, the Central Intelligence Agency, and the National Security
Agency (NSA). However, because the activities of the SOD were secret, DEA agents were
encouraged to use a technique known as “parallel construction” to recreate an investigative
trail, excluding the SOD information. See John Shiffman & Kristina Cooke, “U.S. Directs Agents to Cover
Up Program Used to Investigate Americans,” Reuters, Aug. 5, 2013.
It is impossible to guess at how widespread this practice is, but it would be naïve to assume that the activities
discussed in the Reuters article are the one and only instance in which information collected through the
tools of international intelligence and counterterrorism was put to domestic use. Either way, the existence of
Page 143
large databases of information only makes the practice of parallel construction easier than it
has ever been before.
It’s worth reiterating here two points I raised previously: We shed data constantly, especially in transactions
mediated by electronic communications systems; and information in the aggregate is often far, far more
powerful than the sum of its parts. Taken together, these ideas were the detonator that, in the past few
years, sparked the explosive popularity of “big data” as a phrase, business model,
national
security asset , and philosophy.
Mosaic making is instrumental to narcotics law enforcement
Kerr, 12
(Orin, Fred C. Stevenson Research Professor, George Washington University Law School, 1-23-12, The
Volokh Conspiracy, “What’s the Status of the Mosaic Theory After Jones?”,
http://volokh.com/2012/01/23/whats-the-status-of-the-mosaic-theory-after-jones/, amp)
In his majority opinion, Justice Scalia concludes that the mosaic theory need not be addressed,
but that it is a “novelty” that raises “thorny problems” if embraced. Responding to Alito, Scalia
writes:
There is no precedent for the proposition that whether a search has occurred depends on the nature of the
crime being investigated. And even accepting that novelty, it remains unexplained why a 4-week investigation
a drug-trafficking conspiracy involving substantial
amounts of cash and narcotics is not an “extraordinary offens[e]” which may
permit longer observation . See post, at 13–14. What of a 2-day monitoring of a suspected purveyor
of stolen electronics? Or of a 6-month monitoring of a suspected terrorist? We may have to grapple
with these “vexing problems” in some future case where a classic trespassory search is not involved
and resort must be had to Katz analysis; but there is no reason for rushing forward to resolve them
is “surely” too long and why
here.
Page 144
--Cartels kill econ
Cartel violence destroys the economy
Hodgins 14 (Wesley, Peace, War, and Defense and International Relations, University of North Carolina.
Chapel Hill, “Los Carteles de la Droga: Mexican Drug Cartels and the U.S.-Mexico Security Relationship”
Global Security Studies, Summer 2014, Volume 5, Issue 3 // AKONG)
The problem of the drug cartels must be examined within the context of the economic
relationship between the United States and Mexico. Security of resources, both natural and
manufactured, is critical to the interest of U.S. national security for domestic and international
operations. The United States must maintain access. McCaffrey points out that Mexico is the
twelfth largest economy in the world and is responsible for one-third of the U.S. imported
oil. In addition, 18,000 companies have direct investment in the United States and are
responsible for 47% of Mexico’s direct investment. Finally, Mexico is the source providing
half of our 12 million undocumented illegal immigrants that cross the border to work
agricultural jobs and other low-income employment. Over 1 million people cross the
border into the United States daily (McCaffrey, 4). Therefore, it is obvious that the U.S. has a vested
interest in maintaining productive economic ties and seeking to keep Mexico as a viable
and stable state with their government in control. The alternative would be catastrophic.
If drug cartel violence were to grow to such a level that middle class workers seek refuge
and abandon their jobs across the border or in Mexico’s domestic sector, the U.S. could
lose a critical part of its industry, leading to decreasing imports, less temporary
employment, and foreign divestment out of their fear of violence. To a certain degree, this
process has already begun. Because of the violence, in 2006, many middle- class working
professionals began to leave behind their jobs and find refuge in either the U.S. or Canada for fear of the
cartels. For example, 200,000 people left the city of Juarez that year, fearing for their lives amidst conflict between the cartels and
Mexican law enforcement (McCaffrey, 4). There
are serious economic considerations to be analyzed
when evaluating the implications of Mexican drug cartels in the context of the U.S.-Mexico
security relationship due to America’s vested interests in a stable and productive Mexico.
Page 145
--Afghanistan Drugs Impact
Effective law enforcement solves trafficking --- it’s improving now
GAO 2015 --- Government Accountability Office (“Investigations of Major Drug Trafficking Organizations”)
In response to a congressional request, GAO
assessed Drug Enforcement Administration (DEA) efforts to [inhibit]
immobilize major drug traffickers and their organizations. GAO stated that, because scarce federal resources must be
directed primarily toward the elimination of criminal organizations responsible for supplying drugs, persons at the highest levels of
trafficking enterprises must be detected and immobilized. GAO found that DEA
has adopted various techniques for
focusing its investigative efforts at the highest echelons of drug trafficking organizations, including a code
classification system which categorizes violators. GAO found that federal law enforcement efforts aimed at
[devastating] immobilizing major drug traffickers and their organizations have improved .
It’s uniquely effective in Afghanistan
Baker 11 --- James A Baker III Institute for Public Policy (“Unfinished Business in Afghanistan”,
http://blog.chron.com/bakerblog/2011/07/the-dea%E2%80%99s-unfinished-business-in-afghanistan/)//trepka
Why is the
United States [is] investing so much in terms of DEA personnel, money and other resources into
Afghanistan’s poppy fields ? The answer is as simple as it is counterintuitive: terrorism. As long as opium and heroin
sales fuel terrorism, the United States has an imperative to stem the flow of those funds. The U.S. attacks beginning in October 2001 and
subsequent invasion of Afghanistan led to the dismantling of the Taliban, an insurgent movement that supported the terrorist activities
of Al Qaeda. Profits they derived from opium and heroin sales were used to fill the coffers of the Al Qaeda terrorist network, and the
money was used to corrupt government officials in Afghanistan and fund terrorist activities throughout the world. As a result, opium
cultivation has become one of Afghanistan’s primary sources of illegal revenue and a source of
funding for terrorism. The United Nations Office on Drugs and Crime (UNODC) estimated in its World Drug Report 2011 that
Afghanistan had the potential to produce 3,200 tons of opium, an amount of gum that could yield an equivalent of 390 tons of heroin.
Despite a ban on cultivation of opium poppies enacted in January 2002 and government efforts to eradicate poppy fields, Afghanistan
currently ranks first in the world for poppy cultivation and production. The UNODC also reports that the average price for opium in
Afghanistan increased significantly between March 2010 and March 2011, to $274 per kilogram, an approximate 180 percent increase
over the year before. The rise in prices was attributed to decreased production brought on by poppy blight, an agricultural disease that
nearly decimated opium cultivation. The continued and increased revenues
gained from the sale of Afghan opium
and heroin will continue to be a source of funds for terrorist operations, much to the detriment of the United States. This
is true despite the fact that heroin and other opiates produced in Afghanistan are consumed within the region and in countries along the
supply chain as the drugs head towards the primary consumer market in Europe. The United Kingdom’s Serious Organized Crime
Agency (SOCA) estimates that the majority of the heroin found in Britain is derived from Afghanistan. It is also important to note that
heroin produced in Afghanistan continues to be smuggled into the United States, but in significantly smaller amounts than what is sold
in Europe. The
continued drug trade has caused DEA to shift its mission parameters and operate in
Afghanistan as paramilitary war fighters amid the deadly fields of a terrorist war, creating “ mission
creep ,” slipping away
from serving as a “single-mission” agency. DEA’s current-day presence and warlike posture in Afghanistan also creates an unintended
inversion of the Posse Comitatus Act, the provision of law that prohibits U.S. uniformed soldiers from acting in a domestic law
enforcement capacity. Ironically, assigning U.S. federal law enforcement personnel to perform in a paramilitary capacity overseas tends
to supplant the U.S. military forces that have also been working to rid the country of Afghan drug lords who fund terrorism. This now
defines DEA in a new way: as a hybrid military force that was never envisioned in federal law enforcement prior to 9/11.
Notwithstanding the reasons for removing U.S. military forces from the field of battle, DEA has
made the right choice ,
the only choice that an agency can make — to step into that field of battle in defense of its nation “against all enemies, foreign and
domestic.”
Page 146
Increased drug trafficking wrecks Afghan stability
Inkster, 12 (Nigel, Director of Transnational Threats and Political Risk at the International Institute for Strategic Studies, “Drugs: A
war lost in Afghanistan”, Foreign Policy, 5/29/2012,
http://afpak.foreignpolicy.com/posts/2012/05/29/drugs_a_war_lost_in_afghanistan, JKahn)
The May 20 NATO summit in Chicago was dominated by the issue of Afghanistan. Amidst all the talk about withdrawing international combat troops by 2014, funding the Afghan
National Security Forces beyond 2014, and a doubtful political settlement with the Taliban, one subject was absent from the formal agenda
the drugs trade so entrenched as it is
: drugs . Yet in few other countries is
in Afghanistan. Accounting for between one-quarter and one-third of the national economy, it is an integral part of the
insecurity blighting Afghan life for the past 30 years. Debate may continue for years as to whether the Western intervention in Afghanistan has made the world safer or more
insecure in the post-9/11 era. But it has not only done nothing to reduce global supplies of illicit opium; rather, it has made the problem worse. The international drugs-control
regime, in place since the 1961 Single Convention on Narcotic Drugs came into effect, rests on prohibiting use in consumer countries and reducing supply in producer states. In
Afghanistan, the source of around 60 per cent of the planet's illicit opium and 85 per cent of heroin, the latter objective may never be achieved to any meaningful degree. The boom
years for Afghan poppy cultivation began in the 1970s, thanks to political instability in Southeast Asia's fertile 'Golden Triangle' and bans on the crop in neighbouring Iran and
Pakistan. The Soviet invasion in late 1979 gave local warlords an incentive to plant opium poppies to fund their insurgency against Moscow. In the three decades since, with few other
sources of income, opium production has come to provide for up to half a million Afghan households. The poppy is a hardy, drought-resistant plant, much easier for farmers to grow
than saffron and more profitable than wheat. Both have been offered as alternative crops, but with only limited take-up. The criminal networks that have sprung up around the drugs
principal growing regions, the southern Pashtunare also Taliban strongholds . For all these reasons, NATO efforts to eradicate opium - either by aerial spraying or
trade provide farmers with seeds, fertiliser and cash loans; in short they offer an alternative welfare system. The
dominated provinces of Helmand and Kandahar,
manually- have alienated the population. Indeed, they have often had to be abandoned in the face of popular resistance. Crop disease did more to reduce opium production in 2010
than NATO's counter-narcotics strategy. The United Nations recently reported there had been a 61 percent rebound in opium production in 2011, and prices were soaring. This is a
worrying trend, which seems set to continue after NATO troops leave. Drug seizures, while rising, still account for less than 5% of opium produced. As a general rule, the United
Nations estimates, law-enforcement agencies need to interdict about 70% of supplies to make the drugs trade less financially attractive to traffickers and dealers. In any
circumstances, this is an extremely challenging objective. In the large swathes of Afghanistan where the central government and security forces wield no control, it is completely
unrealistic. Meanwhile, no major trafficker has yet successfully been prosecuted due to a widespread culture of impunity. Alternative approaches have been proposed. Most recently,
in May 2012, Tajik Interior Minister Ramazon Rakhimov proposed that opium should be purchased directly from Afghan farmers to either be used in the pharmaceutical industry or
to be destroyed. He also called on other countries to do the same in a move he deemed essential to fight drug trafficking and narcotics-fuelled terrorism. But this option was tried in
2002 when the United Kingdom had the lead on narcotics reduction, and had to be abandoned in the face of evidence that the purchasing programme constituted a perverse incentive
to increase production. Licit production of opium for medical purposes may be a long-term option for Afghanistan, but not while current conditions of high insecurity and pervasive
corruption persist. In the West, the drugs scourge is mostly thought about in terms of the lives lost, opportunities wasted and the social disruption created through addiction. In
, drugs create a shadow state, fuelling institutional corruption, instability,
violence and human misery. The Taliban, which banned the planting of opium in 2001, was deriving an estimated U.S. $125 million per year from the business by 2009. It
has been an equally important revenue stream for former warlords whose inclusion in the administration of President Hamid Karzai NATO's International
Security Assistance Force (ISAF) has done little to oppose. Such individuals have a powerful vested interest in state weakness to the obvious
fragile and impoverished nations such as Afghanistan
detriment of good governance and institution-building. And all these actors are likely to maximise revenues from opium production in the run-up to the 2014 NATO/ISAF drawdown
What drives it is its huge
profitability, a consequence of continuing Western demand . No-one can confidently predict the consequences of changing the drugs prohibition regime. The
to hedge against an uncertain future. A trade in which so many have vested interests will never be unwound simply or swiftly.
current approach has not achieved the 1961 Single Convention's objectives. But has had the unintended consequence of perpetuating and increasing corruption and instability in parts
of the world least equipped to deal with the consequences. Perhaps our collective experience in Afghanistan should serve as the basis for a serious rethink of global drugs policy? This
would involve a cost/benefit analysis of current policies, scenario planning of the impact of alternative approaches and a much greater focus on demand reduction in consumer states.
narcotics needs to be taken out of the silo it currently inhabits and looked at in the wider context of
international security and development.
The issue of
That goes nuclear – Indo-Pak tensions and Iran
Rubin, 11 (Joel, Director of Policy and Government Affairs, Ploughshares Fund, former congressional aide and diplomat, fellow at
the State Department in both Near Eastern Affairs and Political-Military Affairs, Master’s degree in Public Policy and Business
Administration from Carnegie Mellon University and a Bachelor’s degree in Politics from Brandeis University, Huffington Post, 77/2011,
http://www.huffingtonpost.com/joel-rubin/middle-east-nuclear-threat_b_891178.html, JKahn)
The national security calculus of keeping U.S. forces in Afghanistan has shifted. Any gains that we made from keeping 100,000 American
soldiers in harm's way are now questionable, especially since al Qaeda has been dealt a significant blow with the killing of Osama bin
Laden. President Obama's decision to end the surge by late next year only reinforces this reality. Yet many of the underlying sources of
a region that has deep experience
on nuclear matters -- with nuclear aspirant Iran bordering Afghanistan on one side and nuclear-armed
Pakistan and India on the other -- the United States must take into account the potential for regional nuclear insecurity caused by a
conflict and tension in South and Central Asia will remain after an American withdrawal. In
poorly executed drawdown in Afghanistan. As much as we may like to, we can't just cut and run. So as the United States draws down its
forces, we must take care to leave stable systems and relationships in place; failure to do so could exacerbate historic regional tensions
and potentially create new national security risks. It is therefore essential that Washington policymakers create a comprehensive nuclear
security strategy for the region as part of its Afghanistan withdrawal plans that lays the groundwork for regional stability. We have only
to look to our recent history in the region to understand the importance of this approach. In the 1980s, the U.S. supported the
Mujahedeen against the Soviet Union. When that conflict ended, we withdrew, only to see the rise of al Qaeda -- and its resultant
Page 147
international terrorism -- in the 1990s because we didn't pull out responsibly from Afghanistan. Our choices now in Afghanistan
will
determine the shape of our security challenges in the region for the foreseeable future. And we can't afford for nuclear
weapons to become to South and Central Asia in the 21st century what al Qaeda was in the 1990s to Afghanistan. To avoid such an
outcome, several key objectives must be included in any Afghanistan withdrawal plan. First, current levels of regional insecurity -- which
already are extremely high -- will continue to drive tensions, and quite possibly conflict, amongst the regional powers. Therefore, we
must ensure the implementation of a regional approach to military withdrawal. These efforts must bring all relevant regional players to
the table, particularly the nuclear and potentially nuclear states. Iran and all the countries bordering Afghanistan must be part of this
discussion. Second, the United States must be mindful to not leave a governance vacuum inside Afghanistan. While it is clear that the
current counter-insurgency policy being pursued in Afghanistan is not working at a pace that meets either Western or Afghan
aspirations, it is still essential that Afghanistan not be allowed to implode. We do not need 100,000 troops to do this, and as the
Afghanistan Study Group has recommended, credible political negotiations that emphasize power-sharing and political reconciliation
must take place to keep the country intact while the United States moves out. Third, while the rationale for our presence in Afghanistan - to defeat al Qaeda -- has dissipated, a major security concern justifying our continued involvement in the region -- potential nuclear
conflict between India and Pakistan -- will remain and may actually rise in importance. It is crucial that we keep a particularly close eye
on these programs to ensure that all is done to prevent the illicit transfer or ill-use of nuclear weapons. Regardless of American troop
levels in Afghanistan, the U.S. must maximize its military and intelligence relationships with these countries to continue to both
understand their nuclear intentions and help prevent potential conflict. We must avoid a situation where any minor misunderstanding
or even terrorist act, as happened in Mumbai in 2008, does not set off escalating tensions that lead to a nuclear exchange. Ultimately,
the U.S. will one day leave Afghanistan -- and it may be sooner than anyone expects. The key here is to leave in a way that
promotes regional stability and cooperation, not a power vacuum that could foster proxy conflicts. To ensure that our
security interests are protected and that the region does not get sucked in to a new level of insecurity and tension, a comprehensive
strategy to enhance regional security, maintain a stable Afghanistan, and keep a watchful eye on Pakistan and India is essential.
Taking such steps will help us to depart Afghanistan in a responsible manner that protects our security interests, while not exacerbating
the deep strategic insecurities of a region that has the greatest risk of arms races and nuclear conflict in the world.
Page 148
Privacy
Invoking “mosaic theory” prevents inevitable development of statutory
privacy laws
Kerr, 12
(Orin, Fred C. Stevenson Research Professor, George Washington University Law School, December 2012,
Michigan Law Review, 111 Mich. L. Rev. 311, “ARTICLE: THE MOSAIC THEORY OF THE FOURTH
AMENDMENT”, lexis, amp)
A third difficulty with the mosaic theory is that it may interfere with the development of statutory
privacy laws. As I have explained in another article 2 1 -and as Justice Alito suggested in his concurring
opinion in Jones 219 -- Congress has significant institutional advantages over the courts in
trying to regulate privacy in new technologies. Congress can act quickly, hold hearings, and consider
expert opinion.220 Congress can draw arbitrary lines that don't fit easily within constitutional
doctrine.2 21 And if Congress errs or facts change, Congress can amend its prior handiwork
relatively easily.222 Congress can also regulate using sunset provisions that force the
legislature to revisit the question in light of intervening experience. 23 For these reasons,
legislative privacy laws have considerable institutional advantages over the products of the
comparatively slow and less-informed judicial process.
The mosaic approach could
interfere with statutory solutions in two ways. First, the theory might discourage
legislative action by fostering a sense that the courts have occupied the field . 224
When courts hear a controversial privacy case but rule that the Fourth Amendment does not
apply, the judicial "no" identifies a problem for the legislature to address. The absence of
judicial regulation invites legislative action . Prominent examples include the Right to
Financial Privacy Act of 1978,225 passed in response to United States v. Miller;226 the Pen
Register Statute, 227 passed in response to Smith v. Maryland;228 and the Privacy Protection
Act of 1980,229 passed in response to Zurcher v. Stanford Daily.30 In all three instances,
Congress responded to a Fourth Amendment ruling allowing a controversial
investigatory practice by creating statutory protections . 23 ' The possibility of
mosaic protection complicates the legislative picture because mosaic protections can
overlap with possible statutory solutions and therefore render the case for statutory
protection much less apparent.2 32
Page 149
Social network surveillance
Broad application of mosaic theory blocks social network surveillance
Bedi, 14
(Monu, Assistant Professor, DePaul University College of Law. A.B. Dartmouth College, M.Phil. University of
Cambridge, J.D. Harvard University, Boston University Law Review, December 2014, 94 B.U.L. Rev. 1809,
“Social Networks, Government Surveillance, and the Fourth Amendment Mosaic Theory”, lexis, amp)
Enter the mosaic theory with a focus on intimate associations . n51 While individual
social networking communications would not be protected because of the Third Party
Doctrine, in the aggregate, these communications are more than just a bundle of
transmissions - together they are constitutive of an intimate relationship. If courts care
about the government not interfering in these relationships in the face-to-face context, via direct
application of intimate associational rights, they should similarly care about these relationships on the
Internet when assessing Fourth Amendment protection. n52 This means finding that the
underlying social networking communication passes the Fourth Amendment reasonable
expectation of privacy test, because it is part-and-parcel of an intimate relationship. n53
Page 150
Terrorism
More court trials regarding mosaic theory provide terrorists crucial
information to plan attacks
Davis and Albert, 11
(Charles and Michelle, Professor of Journalism at University of Missouri, April 2011, Vol. 25, No. 2,
Continuum: Journal of Media & Cultural Studies, “Using secrecy to fight terrorism? Access, homeland
security, and the ‘mosaic theory’ as a rationale for closure”, EbscoHost, amp)
What is odd about this order is the thought that reclassifying previously released information could
prove beneficial to national security, especially as this happened within the internet boom. Once
information is available on the internet, it is extremely difficult to remove it completely. As the information
was once available to the public, reclassifying it does not effectively protect it. The courts, however,
consider mosaic theory a privileged defence of withholding information, and often defer to
it in FOIA cases. Judicial deference to the mosaic theory requires three steps: support, or
the evidence needed to back up the argument; specificity, or the extent the government
must tailor the argument to fit the information in question; and plausibility, or the extent
the argument fits the requirement of showing potential harm (Pozen 2005). In fact, the
government believed that, because of the mosaic theory, information released during trials
for the people accused in the 1993 World Trade Center bombings could have given alQaeda, and other people or groups involved, the knowledge necessary to conduct the
attacks on 11 September 2001 (Pozen 2005).
Mosaic making is key to stop terrorism—wouldve prevented 9/11
Pozen, 7
(David, JD Yale Law School, M. Sc. Oxford University, 2007, Yale Law Journal, “The Mosaic Theory,
National Security, and the Freedom of Information Act”,
http://www.yalelawjournal.org/pdf/358_fto38tb4.pdf, amp)
As the mosaic theory has risen to prominence in the Bush Administration’s paradigm shift away from public
disclosure, the theory itself has not changed; rather, the national security landscape has changed, and the
theory has taken on new salience as a result. The dangers of adversarial mosaic-making were brutally
underscored by the 9/11 attacks, as “[i]t is widely believed . . . that the public criminal trials of the men who
attempted to blow up the World Trade Centers in 1993 made available information about
government techniques for monitoring terrorists, as well as critical information about what it would take to
attacks also highlighted our
government’s failure at defensive mosaic-making , at “connecting the dots” that
would have predicted the hijackings.110 Shifting the mosaic-making advantage back to the
federal government will not be easy, however. The government now generates and manages more
actually bring the towers down.”109 Conversely, the
information than ever before, and is increasingly doing so in digital form, which permits users to process,
share, and disseminate the data more easily. The Internet provides a ready medium for adversaries to locate
and transfer this information, while datamining technologies, becoming more powerful and accessible over
time, can help them extract useful knowledge from otherwise unwieldily large or complex data sets.111 Under
Page 151
FOIA, agencies must provide documents in “any form or format requested” that is “readily reproducible,”
including electronic formats.112 Courts have not directly considered whether the mosaic theory becomes
more significant when applied to electronic records, but the Supreme Court has acknowledged in discussing
personal privacy that, because the value of information increases with the facility with which one can use it,
computer compilations pose special dangers.113
More broadly, in the post-9/11 national security landscape, intelligence gathering and
analysis have become perhaps our most important strategic assets,114 while critical infrastructure
data has become a key liability;115 communications and computer technologies have increased the volume,
accessibility, and manipulability of sensitive knowledge and enabled more sophisticated scheming;116 new
types of adversaries—more dispersed, harder to identify, and possibly more ruthless than
their predecessors—have proliferated; and the specter of another attack on U.S. soil has framed
political debate and dictated policymaking. Federal agencies are being pressed to expand
information-sharing with each other,117 but to reduce informationsharing with the public.118 All of
these developments have served to vitalize the role of information in national security strategy. That role,
however, is characterized by uncertainty: As information implicating national security has become more
heterogeneous and more abundant, we increasingly do not know what information matters, or who has it, or
how to control it. As the Director of the University of Maryland’s Center for Information Policy has observed,
“there are thousands of nodes of information in the United States and each does not know what it does not
More than ever, mosaics usable for terrorism and
counterterrorism abound. Seen in this light, the narrowing of FOIA and the expanding role of the
know or what it needs to know.”119
mosaic theory become, normative judgments aside, more understandable.
Congressional delegation is key to counterterrorism
Pozen, 7
(David, JD Yale Law School, M. Sc. Oxford University, 2007, Yale Law Journal, “The Mosaic Theory,
National Security, and the Freedom of Information Act”,
http://www.yalelawjournal.org/pdf/358_fto38tb4.pdf, amp)
If today’s terrorist threats are characterized by their simultaneous intensity and uncertainty,
judicial reluctance to question mosaic theory claims might be seen as a rational response.
Decisionmaking about information disclosure has always been constrained by the practical impossibility of
measuring the costs and benefits of openness versus secrecy. This informational deficit exacerbates a
tension that has always existed in FOIA between the goal of promoting transparent, accountable
government and the imperative not to endanger national security in the process. Yet because the
potential costs of an ill-advised FOIA disclosure, and the difficulties of evaluating what might constitute an
illadvised disclosure, are seen to have increased after 9/11, the balancing calculus has shifted. Adversarial
mosaic-making now seems especially dangerous and unpredictable. In response, post-9/11 courts applying
delegation have upheld agencies’ highly speculative, highly generalized mosaic claims when disclosure would
pose no evident danger; they have demanded little from the agencies in the way of support, specificity, or
plausibility. Delegation errs, more so than deference, on the side of nondisclosure. In its caution, it
instantiates a conservative vision of information policy, wherein executive agencies, not courts, should
control information, and more control is presumed safer. For those who advocate utmost judicial deference
to the Executive in times of emergency, and who see the present as such a time, delegation holds obvious
appeal. Lest they compromise the War on terror, decisions like CNSS, North Jersey Media, and ACLU selfconsciously integrate the mosaic theory into, in the approving words of constitutional scholar John Yoo, “ a
deferential standard of scrutiny that provides the political branches with the flexibility to
Page 152
conduct war successfully.”180 By empowering the Executive with greater control over information,
delegation sacrifices liberty, in the form of governmental transparency, for the sake of security. As with the
shift in power from judiciary to executive, many accept this tradeoff in a time of emergency. From its coinage
in Marchetti, Halkin, and Halperin, the mosaic theory has been a vehicle for increasing judicial deference.
Now that this heightened deference accommodates the War on terror, it may—irrespective of the exceptional
mosaic concerns arising after 9/11—appear particularly prudent and legitimate. An additional argument for
delegation is prudential in a narrower sense: It economizes on administrative and judicial effort. FOIA
requests routinely encompass thousands of pages of government records. Scouring all requested records for
possible mosaics may consume substantial agency resources, especially if the agency does not know what
information (and information technologies) adversaries possess. Although courts have traditionally been
sensitive to such administrative burdens,181 they have demanded that agencies articulate a reasonably
specific justification for each document or section withheld.182 Post-9/11 courts applying delegation, by
contrast, have allowed information withholding under generic, categorical descriptions of mosaic
consequences—in CNSS, recall, the government defended its mosaic claims with the exact declaration it had
used in Detroit Free Press, and won. In a few pages of argument, that declaration swept all information about
all detainees under the mosaic theory, sparing the government the burden of having to “describe, for each
detainee or reasonably defined category of detainees, on what basis it may withhold their names and other
information,” as Judge Tatel’s “more particularized approach” would have demanded.183 The D.C. Circuit
was, in turn, spared the burden of having to evaluate such descriptions, which may have required extensive in
camera review. The difference between deference and delegation is one of degree here, rather than kind; the
mosaic theory deals in aggregates and conjectures and so can always act as a laborsaving device when the
government does not control all of the mosaic’s components. Relative to standard deference under FOIA
national security review, however, delegation saves more effort by extracting nearly all
“particularity” from the process of asserting and analyzing mosaic defenses .
The government needs mosaics to identify terrorists
Denniston, 9
(Lyle, professor of journalism, legal journalist for 50 years, SCOTUS Blog, “Analysis: Dismantling a detention
case, point by point”, http://www.scotusblog.com/2009/05/analysis-dismantling-a-detention-case-pointby-point/, amp)
Kessler allowed the government to proceed on what is called “the mosaic theory” rather than
requiring it to prove directly that Ahmed has been a terrorist — a much harder task. The
“mosaic theory,” often used by the intelligence community to build a case, provides that
single pieces of evidence that may not be strong when looked at singly can be examined
together to form a convincing pattern — here, a pattern of terrorist activity.
Page 153
Third Party Doctrine
Adopting mosaic theory prevents use of the Third Party Doctrine
Bedi, 14
(Monu, Assistant Professor, DePaul University College of Law. A.B. Dartmouth College, M.Phil. University of
Cambridge, J.D. Harvard University, Boston University Law Review, December 2014, 94 B.U.L. Rev. 1809,
“Social Networks, Government Surveillance, and the Fourth Amendment Mosaic Theory”, lexis, amp)
2. Rejection of the Public Disclosure and Third Party Doctrines
The most troubling part of adopting the mosaic theory is that it requires the abandonment
of, or dramatic alterations to, the Doctrines. The basic problem is the inherent conflict between the first
and second models of reasonable expectation. While the Doctrines embrace a per se rule focusing solely on
disclosure and why this vitiates privacy, the mosaic theory rests on society's opinion and what it deems
reasonable. n223
Consider the Public Disclosure Doctrine. The fact that public movements are not protected
under the Fourth Amendment is critical to law enforcement investigations. n224 Visual
warrantless surveillance remains a central part of police surveillance. n225 It is not clear to
what extent these practices will remain constitutional with the introduction of the mosaic theory. For
instance, it is common for officers to track vehicles and aggregate information from various
sources over a period of time. n226 As Gray and Citron point out, the "mosaic theory puts
these practices and the line of doctrine endorsing them in obvious jeopardy, particularly
when officers are too successful and their investigations produce too much information." n227
This danger is compounded by the fact that law enforcement may use a combination of
visual and technology-based surveillance (a la Knotts) when investigating a suspect. "How, after all,"
ask Gray and Citron, "are we to distinguish "between the supposed invasion of aggregation of
data between GPS-augmented surveillance and a purely visual surveillance of substantial
length'?" n228 It won't do here to simply say that a specific duration of technology-dependent surveillance
violates the expectation of privacy. The problem is that the Public Disclosure Doctrine treats all
public movements the same, regardless of how much information is disclosed or how long it is
observed. n229 To carve out exceptions based on what society thinks is unreasonable leaves
vulnerable investigative techniques that are essential to effective law enforcement .
The Third Party Doctrine would also be on shaky ground. Here, too, the [*1843] mosaic
theory would upset the voluntary disclosure principle that stands at the heart of this
doctrine. n230 Shifting the focus to what society or an individual deems reasonable (the first model
of reasonable expectation of privacy) would surely frustrate the use of undercover informants or
other surreptitious data collection techniques that do not require a warrant. Imagine a
scenario where an informant is deep undercover for a significant period of time gaining the trust
of a suspect. Or imagine an informant who dupes a suspect into allowing her into her home and disclosing
private and incriminating information. Or perhaps the government simply acquires a wealth of
financial records from a suspect's bank. Currently, all of these types of law enforcement
tools do not trigger Fourth Amendment protection because the individual voluntarily
discloses the information to another person or entity. n231 However, under the mosaic
theory, none of these tactics are secure . n232 Societal expectations may find that these
Page 154
methods, too, impinge on Fourth Amendment rights as they involve unreasonable duplicity and reveal
private information. Police would thus find themselves in the new position of having to secure
a warrant based on probable cause before engaging in these practices.
For some, this conclusion may be welcomed, particularly in today's technological world where disclosures to
various entities and individuals have become ubiquitous. n233 Justice Sotomayor, in fact, raises this
possibility in her concurrence. n234 This Article does not take such a drastic approach, nor would such a
course be desirable. Any such rejection would come at the cost of jettisoning or severely
curtailing essential law enforcement investigative [*1844] techniques that have historically
not been subject to warrant and probable cause requirements. n235
Page 155
Congress CPs
Page 156
Notes
Oversight Counterplan --- basically establishes a Congressional oversight committee to make sure that the
data isn’t used for blackmail or violating privacy who reviews whether data collecting was legitimate after the
fact. If you want to get around solvency deficits, consider establishing an independent agency to review
decisions that’s not selected from Congresspeople.
Penalties Counterplan --- this just provides an enforcement mechanism for the ExPost/Oversight
Counterplan, creating penalties that arguably create disincentives to bad oversight.
Terry Stops Counterplan --- rather than the aff’s narrow mandate, this lets us maintain broad surveillance for
a short period, and then causes narrower surveillance in the future if we find out that someone’s a terrorist.
The Oversight/Ex Post counterplan is the only one that really solves international perception/credibility
advantages, like PRISM. Terry Stops are good against affs that target specific groups, like the Islamophobia
or LGBT aff.
Funneling CP = high people see first, disclose necessary to lower, etc. Solves a lot of the problems with leaks.
The Other Planks are reasonably self-explanatory and are just explanations and clarifications of how an
oversight committee could/should be constructed.
Note: TSP = Terrorism Surveillance Program, NSA warrantless wiretapping created by Bush
Page 157
Expost/Oversight CP
Page 158
1NC Oversight CP
An oversight committee solves --- it holds the Executive accountable and
forces them disclose illegal surveillance
Fenske 8 --- J.D. Candidate (Dan, “ALL ENEMIES, FOREIGN AND DOMESTIC: ERASING THE DISTINCTION BETWEEN
FOREIGN AND DOMESTIC INTELLIGENCE GATHERING UNDER THE FOURTH AMENDMENT”, 102 Nw. U.L. Rev. 343,
Lexis)//trepka
E. Oversight
and Reporting Requirements Congress could by law require the Executive to report
to congressional oversight committees all warrantless searches and electronic surveillance
conducted in the United States. Indeed, today the Justice Department is required to tell Congress the total number of FISA
warrant applications granted, modified, and denied. n200 Without warrants, the need for oversight is even
greater; thus, Congress should require the Executive to report to it each time a warrantless
domestic intelligence search occurs. Extending this requirement to the domestic intelligence context will ensure that
an independent body reviews all executive actions - even those that would otherwise never come
to light because of failure to prosecute. Finally, Congress should disclose any illegal surveillance to the
subjects of that surveillance so that they can seek redress in court or in an administrative proceeding.
Page 159
2NC Disclosure
Specifically disclosing illegal search material prevents abuses in criminal
trials
Pike 7 --- J.D. from Hofstra (Josh, “THE IMPACT OF A KNEE-JERK REACTION: THE PATRIOT ACT AMENDMENTS TO
THE FOREIGN INTELLIGENCE SURVEILLANCE ACT AND THE ABILITY OF ONE WORD TO ERASE ESTABLISHED
CONSTITUTIONAL REQUIREMENTS”, 36 Hofstra L. Rev. 185, Lexis)//trepka
Currently, 50 U.S.C. § 1806(e) permits any person against whom FISA acquired
information is or has been introduced in a criminal prosecution, to make a motion to "suppress the evidence
obtained or derived from such electronic surveillance on the grounds that - (1) the information was
unlawfully acquired; or (2) the surveillance was not made in conformity with an order of
authorization or approval." n196 However, the acquired information is reviewed in camera and
ex parte by the court and the evidence is disclosed to the defendant only where "such disclosure is necessary to make an accurate
determination of the legality of the surveillance." n197 As asserted by the D.C. Circuit Court of Appeals in United States v. Belfield,
disclosure of FISA acquired information may only occur where, upon initial review by the FISA court,
the legality of the surveillance may have been complicated by "indications of possible
misrepresentation of fact, vague identification of the persons to be surveilled, or surveillance
records which include a significant amount of non-foreign intelligence information, calling
into question compliance with the minimization standards contained in the order." n198 The Belfield court further clarified that the rarity
of such [*227] disclosures to the targets of FISA surveillance is appropriate in light of the delicate and sensitive nature of foreign
intelligence information. n199 While the interest of the government in maintaining secrecy regarding foreign intelligence gathering tactics
is certainly valid, it cannot outweigh the interest in ensuring that a defendant receives a fair trial and is informed of the accusations
against him, as guaranteed by the Sixth Amendment. n200 In
Belfield, the court opined that the privacy rights
of the individual, though not protected through mandatory disclosure of the evidence against him, were protected through the
procedural oversight of FISA surveillances provided by the three branches of government. n201 However, in light of the numerous
procedural and substantive flaws in FISA discussed in Part V and the factual misrepresentations made by the FBI in FISA applications,
the current
procedural oversight is ineffective in protecting the privacy interests of
Americans and permits the abuse of FISA surveillances. n202 To remedy these issues, two
possible solutions are available to the government. The first option is for Congress to amend
FISA to ensure that the DOJ cannot use FISA surveillances as a means to escape the Fourth
Amendment. Such amendments should include the reestablishment of the primary purpose
standard or establishment of the sole purpose standard, defining those crimes which threaten national
security, and allowing the FISA court to review the facts in the FISA order application to verify the connection with a
foreign agent. The second option available is for an amendment to FISA bestowing upon every
defendant prosecuted based on evidence obtained through FISA surveillances the ability to
review the information used against him or her. Currently the law gives a FISA judge discretion
to allow defendants [*228] to view the evidence against them. n203 By revoking the judge's discretion to disclose the
information to the defendant and allowing for the evidence to be presented to the defendant upon the making of such a motion to
disclose, the
defendant would be able to make an informed challenge to the legality of the FISA surveillance
against him, thereby protecting the integrity of the criminal justice system and discouraging wrongful
convictions. To ensure that such an amendment will not create an unnecessary threat to national security,
further procedures should be imposed to ensure that only the defendant and his
attorney are able to review the evidence, and then only in a secure room from which the materials may not
be removed. Additionally, any information revealing procedures and conduct of the government, not including the
Page 160
specific information acquired, which is not available to the public,
defendant.
should be redacted and not made available to the
Page 161
2NC Oversight
Congressional oversight empirically limited abuse --- unfortunately, it expired
in 2012
Blum 9 --- attorney for the Department of Homeland Security, M.A. in security studies, J.D. from UChicago
(Stephanie, “ WHAT REALLY IS AT STAKE WITH THE FISA AMENDMENTS ACT OF 2008 AND IDEAS FOR FUTURE
SURVEILLANCE REFORM”, 18 B.U. Pub. Int. L.J. 269, Lexis)//trepka
This Article suggests that while there is potential for abuse if government officials
violate the clear wording of the FAA (which allows warrantless surveillance of non-US persons reasonably believed to
be outside the United States to gather foreign intelligence), the FAA contains enough ex post review
mechanisms (in the forms of Congressional oversight committees and various inspectors
general) that the Obama administration should allow the FAA to operate as-is, and reevaluate its
effectiveness and protection of civil liberties when it expires in 2012 .
At worst, ex post review is a terminal backstop to their solvency deficits
Harvard Law Review 8 (“SHIFTING THE FISA PARADIGM: PROTECTING CIVIL LIBERTIES BY ELIMINATING EXANTE
JUDICIAL APPROVAL”, 121 Harv. L. Rev. 2200, Lexis)//trepka
2. Policy Benefits. - A proponent of a national security exception notes that "the repeal of FISA ... would simply effectuate the nation's
return to its previous tradition." n114 Yet the obvious retort is that the very abuses detailed in the Church Committee report were a major
product of that tradition. Still, the old tradition did have some benefits that can be obtained by coupling the ex post reasonableness role
of reviewing courts with the political checks described above. For one, rather
than shielding meaningful inquiry, as ex
ante review can, ex post review may produce "a renewed focus on Fourth Amendment
principles " n115 by both the judicial and political branches . Indeed, the more developed factual
setting available in ex post review would help with the effort to define reasonableness. Further, it
could be argued that since
only a small number of people are likely to be affected by surveillance, and especially given that those affected
are likely to be disfavored or underrepresented groups such as members of minority religions or immigrants, the political process
cannot be trusted to perform oversight. Yet ex post judicial review would remain a powerful
check if the government seeks to use FISA-gathered information in other legal settings, such as
criminal trials , habeas corpus proceedings , or motions for prospective relief. Ex post
reasonableness review thus provides an important backstop to the oversight process.
A bipartisan, independent committee overcomes their solvency deficits
Sugiyama and Perry 6 --- J.D.s from UMich Law School (Tara and Marisa, “THE NSA DOMESTIC SURVEILLANCE
PROGRAM: AN ANALYSIS OF CONGRESSIONAL OVERSIGHT DURING AN ERA OF ONE-PARTY RULE”, 40 U. Mich. J.L. Reform
149, Lexis)//trepka
Introduction On December 16, 2005, the New York Times sounded a fire alarm n1 when it revealed that, in response to the September
11, 2001 attacks, President George W. Bush had issued a secret executive order permitting the National Security Agency (NSA) to
conduct warrantless surveillance on individuals within the United States to unearth nascent terrorist activity. n2 The
ex ecutive o rder
n3 purportedly authorized
the NSA to monitor the telephone and email messages of tens of millions of unsuspecting
individuals in its effort to track down links to Al Qaeda. n4 Almost immediately, [*150] various interest groups began to question
the constitutionality of the NSA
domestic surveillance program and to challenge whether the scope of the program
violates the Foreign Intelligence Surveillance Act of 1978 (FISA). n5 Congress
surveillance program largely by
responded to the disclosure of the NSA domestic
shirking its oversight duties . Undaunted by a unified executive branch that shunned
oversight, n6 Democratic members of Congress repeatedly pressed for a comprehensive investigation into the surveillance program. n7
Lacking support from a majority of the Republican members of Congress, however, Democratic efforts
Page 162
at oversight made little headway in breaching the unitary executive wall. n8 Part I of this Note introduces theoretical
models that Congress may employ to conduct oversight of executive branch activities such as the NSA domestic surveillance program.
Part II situates the NSA program within the context of FISA and the USA PATRIOT Act, discussing the controversy surrounding the
legality of the program. Part III examines the strategy employed by the majority party, the minority party, and interest groups in seeking
to conduct oversight of the NSA program, and the response of the executive branch to such efforts. Part IV concludes by analyzing
lessons from the fire-alarm model and proposes alternative methods of congressional oversight. As illustrated in the case of the NSA
domestic surveillance program, when
a single party controls both the executive and the legislative branches, the
fire-alarm model fails to provide sufficient congressional oversight, and short of future elections altering
the balance of power, Congress
should seek new methods that more readily engage bipartisan
support and judicial review to oversee secret executive programs more effectively .
Oversight increases intelligence effectiveness --- Congress’ institutional check
prevents groupthink and solves public support
Ford 7 --- Assistant Professor of Law @ US Military Academy (Christopher, “Intelligence Demands in a Democratic
State: Congressional Intelligence Oversight”, 81 Tul. L. Rev. 721, Lexis)//trepka
VI. The Future of Intelligence Oversight A. Current Proposals for Intelligence Oversight Reform As many commentators have agreed
(and at least one noted), "the American intelligence infrastructure is in the midst of its most radical overhaul since the formation of the
modern Intelligence Community following World War II." n310 Unlike intelligence reform seeking to reign in the rogue elephant, today's
reform concerns "how to get [intelligence] agencies to be more aggressive - and how to get policymakers to use the results to better
effect." n311 Hence, the debate over intelligence reform has centered on reforming those institutions or organizational impediments that
hinder intelligence operations, rather than creating and empowering structures to ensure operations are conducted within the bounds of
the law. n312 Oversight, however, is
intrinsically tied to the conduct of intelligence operations.
Conventional wisdom establishes an inverse relationship between oversight and operations : the more
oversight, the more restricted the operations. This is not, however, a universal tenet. As an initial matter, oversight offers a
broader perspective on the development and execution of intelligence operations. That is to say, the
inclusion of a neutral party offers a check on the dangers of organizational group-think. This quality of
oversight was recognized as early as 1956 when President Eisenhower organized the predecessor to the President's Foreign Intelligence
Advisory Board, whose purpose [*761] is to provide "advice to the President concerning the quality and adequacy of intelligence
collection, of analysis and estimates, of counterintelligence, and of other intelligence activities." n313 Oversight also serves
the
less intuitive role of actually facilitating intelligence operations . The American public is much
more willing to permit unfettered and robust intelligence operations when they know institutional
checks are in place to ensure operations are conducted in accordance with applicable laws and generally accepted public
mores. n314 As discussed at length above, when this assumption of legality and morality is corrupted, the public reaction has proven
formidable. n315 Thus, it is in the interests of the Intelligence Community to be subjected to a certain degree of oversight. n316
Congress, as a representative of the people, necessarily serves as the Intelligence Community's "honest broker." In this role, Congress
must walk a fine line between beneficial and detrimental oversight. The history of congressional oversight, marked by wild oscillations of
interest, demonstrates the inherent difficulty in this task. Following 9/11, various commissions and commentators found a myriad of
issues with Congress's role in intelligence oversight, suggesting Congress has not yet found the appropriate balance.
Solves executive abuse
Rahdert 7 --- Professor of Law (Mark, “DOUBLE-CHECKING EXECUTIVE EMERGENCY POWER: LESSONS FROM HAMDI
AND HAMDAN”, 80 Temp. L. Rev. 451, Lexis)//trepka
Some might argue that the Court's insistence on affirmative congressional authorization was an unnecessary obstruction of executive
authority, or that it amounted to an unnecessary formalism. Once again, I disagree. Requiring
the President to get
congressional approval is neither rude obstructionism nor formalistic cosmetics. It is part of
the constitutional plan . Shared authority is as much a part of that plan as separation of powers. In the case of the
emergency power double check, it ensures the coalescence of the two elected branches of
government in all but purely temporary responses to crisis situations. As events transpired, one could argue
that Hamdan, in particular, obliged Congress, by enacting the MCA, to take a measure of direct responsibility for the military justice
aspects of the war against terror, effectively giving the people a voice about that war, and how it is being waged, in the 2006 elections. To
Page 163
the extent the 2006 elections can be seen as a referendum on the handling of the war against terror, they were at least partly a
referendum against some of the [*488] executive's more extreme measures in dealing with enemy combatants. In
the future, that
voice could be critical in preserving democracy from an autocratic presidency . n226
Key to preventing nuclear war
Forrester 89 (Professor at Hastings College of the Law at University of California, 1989
[Ray, George Washington Law Review, August]
[On the basis of this report, the
startling fact is that one man alone has the ability to start a nuclear
war. A basic theory--if not the basic theory of our Constitution--is that concentration of power in any one person,
or one group, is dangerous to (hu)mankind. The Constitution, therefore, contains a strong system of checks and
balances, starting with the separation of powers between the President, Congress, and the Supreme Court. The message is that no one of
in what is probably the most dangerous governmental power
ever possessed, we find the potential for world destruction lodged in the discretion of one
person.
them is safe with unchecked power. Yet,
Proactive role prevents abuse
Sugiyama and Perry 6 --- J.D.s from UMich Law School (Tara and Marisa, “THE NSA DOMESTIC SURVEILLANCE
PROGRAM: AN ANALYSIS OF CONGRESSIONAL OVERSIGHT DURING AN ERA OF ONE-PARTY RULE”, 40 U. Mich. J.L. Reform
149, Lexis)//trepka
Under the "police-patrol" model of congressional oversight, Congress takes a proactive role in
examining actions of the executive branch to unearth evidence of maladministration. n12 Members of Congress may
conduct this direct form of oversight by requesting documents from the executive branch, holding hearings, and
commissioning reports. n13 The goal of this form of oversight is for members of Congress to identify ,
dissuade , and remedy any executive branch violations of legislative goals. n14
Page 164
AT: DA to Oversight Reform
The link’s non-unique --- attempts at oversight reform are inevitable, it’s a
question of effectiveness
Harrington 7 --- J.D., Albany Law School of Union University (Alexandra, “PRESIDENTIAL POWERS REVISITED:
AN ANALYSIS OF THE CONSTITUTIONAL POWERS OF THE EXECUTIVE AND LEGISLATIVE BRANCHES OVER THE
REORGANIZATION AND CONDUCT OF THE EXECUTIVE BRANCH”, 44 Willamette L. Rev. 63, Lexis)//trepka
F. Post-Cold War The immediate post-Cold War period was a time of relative relaxation, punctuated by the first Gulf War and several
terrorist attacks within and beyond the United States. Support for the first Gulf War was broad-based and Congress was amenable to
declaring war and allowing the Executive to conduct the war largely unfettered by congressional attempts at involvement. n118 President
William Clinton's tenure saw the "peace dividend" idea applied by the Executive and the Legislature to facilitate the downsizing of the
United States military. n119 Although controversial within largely conservative circles and among members of Congress from districts
which were threatened by economic losses as a result, there was not a great deal of tension between the executive and the legislative
branches regarding the decision to downsize. n120 Al-Qaeda's early attempts to damage United States-related targets, such as the U.S.S.
Cole, the U.S. Embassy in Nairobi, Kenya, and even the 1993 World Trade Center bombing, attracted media attention but were largely
handled within the U.S. intelligence community - and, in the case of the World Trade Center bombing, by the Justice Department and
the court system - and there were few congressional attempts to encroach on the powers vested in the Executive in order to reign in this
new threat to American stability. The
sense of increased security which pervaded the United States during the initial post-
Cold War period was shattered by the Al-Qaeda attacks of September 11, 2001. The September 11th attacks were quickly
followed by a broad-based declaration of war against terrorists in general, and Afghanistan in particular. n121 Congress's unofficial
declaration of war was open-ended and allowed the Administration great latitude in the pursuit of an atypical war. n122 The September
11th attacks also resulted in the enactment of the USA PATRIOT Act, granting the executive branch updated powers for the [*80]
upcoming war on transnational terrorism. n123 In
the wake of September 11th and the perceived governmental
failures which became part of the public understanding of the attacks of that day, Congress has
repeatedly attempted to find a way to reform its intelligence oversight structure. n124
However, no concrete revision system has been proposed or debated, and there are widely differing opinions
over any method of reorganizing the congressional oversight committee structure as it relates to the Executive in general and the
intelligence community in particular. n125
Page 165
AT: Judicial Bias
Ex Post review is net better than warrant requirements
Fenske 8 --- J.D. Candidate (Dan, “ALL ENEMIES, FOREIGN AND DOMESTIC: ERASING THE DISTINCTION BETWEEN
FOREIGN AND DOMESTIC INTELLIGENCE GATHERING UNDER THE FOURTH AMENDMENT”, 102 Nw. U.L. Rev. 343,
Lexis)//trepka
E. Warrants Protect Against Police Perjury and Judicial Bias Police
perjury and judicial bias in ex post review are two
significant problems that some argue the warrant requirement alleviates. By requiring review before the
search, warrants ensure that the decision to approve a search is based upon the officer's knowledge at the time of the search and not
upon reasons invented by that officer to justify the search at a suppression hearing or civil damages action. n159 Thus, many deem ex post
review inadequate because it frequently is based upon the officer's recollection of the information he had at the time, which is
manipulable. n160 Moreover, judicial bias may infect the ex post review process because it almost always occurs in the context of a
suppression hearing. n161 The exclusionary rule, n162 and the fact that the police have proffered incriminating evidence against the suspect,
creates a bias on the part of the judge to admit the evidence because if she does not, "the criminal is to go free because the constable has
blundered." n163 This, combined with the incentive provided to the police to perjure themselves, n164 makes it likely that an
unconstitutional search will go without a remedy. n165 That is, where the officer who conducts a search lies about the true rationale for his
search, and the judge is biased in favor of that officer, the likelihood that an unconstitutional search will go unremedied increases
substantially. Thus, both the police perjury and judicial bias problems provide strong support for maintaining the warrant requirement
for domestic intelligence searches because without the warrant requirement, after-the-fact review at a damages action or suppression
hearing would provide the main judicial review of these searches. If this ex post review is inadequate because of perjury or bias, then the
Fourth Amendment's substantive protections would be rendered meaningless. Ultimately, however,
neither of these
arguments support maintaining the warrant requirement for domestic intelligence
searches. First, the inherent [*372] bias against the searched in the ex parte warrant application
process is greater than the potential for bias in after-the-fact review. Second, placing a higher
evidentiary burden on the government to justify a warrantless search could alleviate any
police perjury problems . Third, even if such bias and perjury occurs with enough frequency to seriously
undermine ex post judicial review, the legitimate need of the government to obtain vital intelligence to
prevent terrorist attacks outweighs the costs of such bias and lying. These responses are each discussed
in turn below.
Specifically, reverses bias and prevents perjury
Fenske 8 --- J.D. Candidate (Dan, “ALL ENEMIES, FOREIGN AND DOMESTIC: ERASING THE DISTINCTION BETWEEN
FOREIGN AND DOMESTIC INTELLIGENCE GATHERING UNDER THE FOURTH AMENDMENT”, 102 Nw. U.L. Rev. 343,
Lexis)//trepka
First, the
argument that warrants are necessary to protect against judicial bias in ex post review
presumes that this bias outweighs the inherent bias in a warrant application . Warrants are
issued before a search occurs, ensuring that they are based upon the officer's knowledge at the time and not on fictional reasons made up
after the search to justify it. n166 Warrant
applications are ex parte, however: the subject of the search has no
say or representative to defend his or her position. n167 Thus, unlike after-the-fact review, warrant
applications are inherently biased towards the government because the issuing magistrate
only hears its side of the story . As noted above, when combined with deferential review of issued warrants,
current policy defers to that biased judgment. n168 Adversarial review after the fact, then,
ensures that the judge hears both sides of the story in evaluating the legality of a search. n169 And when that judge is
unbiased, she can fairly view the arguments from both sides, not just one. Moreover, the adversarial process itself
ensures that if the searching officer is lying, his justification for the search will be challenged by
counsel . n170 In short, although bias and police perjury in after-the-fact review are problems, the bias inherent in ex parte warrant
applications is just as significant. As such, the problem of judicial bias in after-the-fact review does not justify the warrant requirement.
Page 166
Second, any
concern that a police or intelligence officer will lie or distort her rationale for conducting a search in
after-the-fact judicial review could be alleviated by placing a higher evidentiary burden on the Executive to justify
a warrantless search. n171 Courts could adopt a rule that an intelligence [*373] officer's recollection of the events leading up to the search
is not on its own enough to satisfy the Fourth Amendment's reasonableness standard. By requiring further evidence to demonstrate the
government's knowledge prior to the search, the
courts will ensure that a testifying intelligence officer is not
making up a rationale ad hoc to justify an unreasonable search . Such corroboration
could include emails or correspondence whose date can be authenticated or other time-verifiable
evidence, so
that the government's knowledge prior to the search could be ascertained.
Importantly , though, this evidence would be necessary not for the government to show
probable cause , as in a warrant application, but instead for a court to merely determine the search's overall
reasonableness . Although one might respond that this would just shift the police perjury back
further in time, this argument is unpersuasive because before the search occurs the officer does
not know what it will turn up, making it difficult if not impossible for him to concoct a lie that will
match what he actually finds during the search. Moreover, even if one worried that placing a higher burden on the
government to justify a search would actually encourage police perjury because officers would need to fabricate more evidence to justify
a search, requiring evidence that can with great certainty prove that the government had legitimate reasons ex ante to conduct a search
mitigates this problem. Warrants
ex post review.
are simply not a prerequisite to protecting against police perjury in
Page 167
AT: L/Flexibility DA
A specific oversight committee solves, but avoids the flexibility net benefit
Fenske 8 --- J.D. Candidate (Dan, “ALL ENEMIES, FOREIGN AND DOMESTIC: ERASING THE DISTINCTION BETWEEN
FOREIGN AND DOMESTIC INTELLIGENCE GATHERING UNDER THE FOURTH AMENDMENT”, 102 Nw. U.L. Rev. 343,
Lexis)//trepka
G. Other Solutions Congress or the Court doubtless could
impose other solutions to protect Fourth
Amendment interests in the absence of the warrant requirement. For instance, the Court could require
heightened scrutiny of searches that implicate the First Amendment, n206 or it could require some corroboration of an officer's
recollection of events that gave him reason to believe a search was reasonable. n207 Congress
could establish an
independent agency whose sole job is to police the intelligence agencies and ferret out illegal
activity. For our purposes, the most important thing to note is that many, if not all, of these solutions could better
protect Fourth Amendment interests than traditional warrants, while giving the Executive the
authority and flexibility it needs to combat domestic national security threats.
Page 168
AT: Not Credible
Ex-post review locks in procedural safeguards that generate credible spillover
Steinberg AND Estrin 14 --- Dean of Maxwell School of Citizenship and Public Affairs at Syracuse
University AND Postdoctoral Associate at Yale (James and Miriam, “Harmonizing Policy and Principle: A Hybrid Model for
Counterterrorism”, 7 J. Nat'l Security L. & Pol'y 161, Lexis)//trepka
Such a formal process would also facilitate another important procedural safeguard , the use of ex
post review of practices, both by the executive branch and Congress . The President's Intelligence Advisory Board, a group of outside
independent intelligence advisors, could serve such a role within the executive branch. The
executive branch would also share the
intelligence record with the relevant committees of Congress, through the House and Senate intelligence committees
for Title 50 operations and the armed services committees for Title 10 operations. The
President is required by law to "ensure
that the congressional intelligence committees are kept fully and currently informed of the
intelligence activities of the United States," n208 but has the option to limit the reporting to the "Gang of Eight"--the leaders of the two parties
in the Senate and House plus the chair and ranking minority members of the intelligence committees -- "[i]f the President determines that it is essential to
limit access to the finding to meet extraordinary circumstances." n209 Because
these individuals cannot share the
info rmation with other members of their committees, discuss it with legal counsel, or even take notes during meetings, this avenue is not the
most effective mechanism for congressional oversight of ongoing counterterrorism operations. n210 To make
congressional review meaningful, the default of reporting to the full intelligence
committees should be respected. These ex post reviews will help recalibrate policy in favor of
detentions and away from targeting, and counter temptations to rely on lethal operations that are outside the review of courts. When the President
announces that "America [*205] does not take strikes when we have the ability to capture individual terrorists; our preference is always to detain,
interrogate, and prosecute," n211 it will be the responsibility of these groups to evaluate this claim against the dossier of intelligence reports the executive
branch used to reach individual targeting decisions. Were alternatives to targeting explored, and was there a serious consideration to pursue them? How
was the decision to target ultimately justified? These determinations are difficult, but our system enables them to be made through the checks and balances
important assurances that the principles are not only
articulated but are being respected , without interfering with the need for timely decision and while
protecting confidentiality of sources and methods. Internal oversight through independent experts and external
oversight through the democratically-elected houses of Congress will help ensure that targeting decisions are actually being carried
out in line with the presidential guidelines, domestic and international law , and constitutional
principles.
of two separate political branches. These reviews can provide
Page 169
AT: Theory
Oversight is the key question for surveillance policymaking
Ford 7 --- Assistant Professor of Law @ US Military Academy (Christopher, “Intelligence Demands in a Democratic
State: Congressional Intelligence Oversight”, 81 Tul. L. Rev. 721, Lexis)//trepka
VII. Conclusion Quite plainly, the
balance of executive autonomy and legislative oversight has not been
resolved. The revelation of the NSA program plainly illustrates this and perfectly reflects recent history which finds a predictable
sequence: public support for operations followed by either an intelligence/military failure or revelations of intelligence improprieties,
followed by public demands for regulation and restraints. International and domestic events, the conduct of the intelligence agencies,
and the perceived threat to national security combine to fuel the public climate that in turn shapes the political response. The
key to
effective policy making in regard to intelligence regulations is striking a balance between the
short-term national security needs of the country, the long-term national security
needs of the country, the liberties guaranteed by our Constitution, and the desires of the American public.
Page 170
AT: Unconstitutional
Congressional oversight of the Executive is constitutional
Sugiyama and Perry 6 --- J.D.s from UMich Law School (Tara and Marisa, “THE NSA DOMESTIC SURVEILLANCE
PROGRAM: AN ANALYSIS OF CONGRESSIONAL OVERSIGHT DURING AN ERA OF ONE-PARTY RULE”, 40 U. Mich. J.L. Reform
149, Lexis)//trepka
I. Theoretical Models of Congressional Oversight The Constitution does not explicitly vest Congress with plenary power to conduct
investigative oversight of the executive branch. n9 The
Supreme Court, however, has interpreted the Constitution as
providing Congress with inherent power to oversee executive [*151] branch activities that may violate
the will of Congress. n10 Accordingly, two primary models have emerged to guide members of Congress through the execution of
their oversight duties: the police-patrol and the fire-alarm models of congressional oversight. n11
Page 171
AT: Unwilling
Congress will do it --- depth report proves
Ford 7 --- Assistant Professor of Law @ US Military Academy (Christopher, “Intelligence Demands in a Democratic
State: Congressional Intelligence Oversight”, 81 Tul. L. Rev. 721, Lexis)//trepka
The 9/11 Commission's report must be distinguished from the report produced by the congressional committee examining the events of
9/11. This latter report, entitled Joint Inquiry into Intelligence Community Activities Before and After the Terrorist Attacks of September
11, 2001 (Joint Inquiry Report), provided markedly different recommendations. n321 Absent among their findings, however, is any
critical self-analysis. Of the report's sixteen "systemic findings" and four "related findings," none expressly discusses congressional
failings or inefficiencies. n322 Further, one commentator has criticized the report as "a dismal failure." n323 The report is not, however,
very presence of a robust report indicates a
congressional willingness to engage in some degree of oversight. The 9/11 Commission fulfilled the
without merit. As an initial matter, the
desires of the vast majority of the American public; thus, the Joint Inquiry Report could have easily been written off as surplusage.
Secondly, as discussed below, the Joint Inquiry Report does provide some valuable
recommendations . And finally, the Joint Inquiry Report provides valuable insight into the
mechanics of the intelligence committees. Through the individual statements of a number of junior senators, one
can readily identify dissent and inefficiencies within the committees. n324
Page 172
Funneling CP
Page 173
1NC Funneling
Information funneling creates sufficient oversight and transparency
Kitrosser 8 --- Associate Professor @ University of Minnesota Law School (Heidi, “THE DOMESTIC
COMMANDER IN CHIEF: CONGRESSIONAL OVERSIGHT OF NATIONAL SECURITY ACTIVITIES: IMPROVING INFORMATION
FUNNELS”, 29 Cardozo L. Rev. 1049, Lexis)//trepka
2. Initial Reflections on Maximizing the Benefits and Minimizing the Costs of Secrecy and Openness Through Information Funneling
Rules Information
funneling rules offer the possibility of compromise between secrecy's costs
and benefits. The implicit goal of such compromise is meaningful oversight that serves
democratic and pragmatic ends while avoiding the costs to those ends of excessive
transparency . The theoretical connection between information funneling and this goal is evident. Yet problems and
uncertainties about funneling remain, as the NSA surveillance controversy exemplifies. While fool-proof rules surely are unattainable,
improvements may be achieved through better attention to the theoretical concerns and goals underlying funneling and the connection
between those factors and funneling rules' details. This section suggests several considerations that ought generally to inform the
creation and application of funneling rules. a. Determining Who Should Receive Funneled Information Directives regarding to whom
information is funneled should be reassessed to determine whether they match funneling's underlying purposes. The need for such
reassessment is illustrated by the NSA surveillance controversy. It is reflected in the conflict over the adequacy of notifying only the
Gang of Eight, rather than the full intelligence committees, of the program. n108 It also is reflected indirectly in post-revelation conflicts
over whether the Senate Intelligence Committee should, like the Senate Judiciary Committee, hold hearings [*1071] on the program.
n109 The latter suggests a related question over how to determine which committees should receive ongoing notice of intelligence
activities. Two sets of concerns must be balanced to answer these questions. On the one hand, restrictions on who receives notice must
not substantially undermine the very purpose of oversight. One complaint about Gang of Eight notifications, for example, is that the
Gang of Eight as a group lacks the power to take recourse in response to what they've been told. n110 A closely related complaint is that
the group's small size, combined with the absence of staffers in most briefings, makes meaningful deliberation and even adequate grasp
of the issues unlikely. n111 On the other hand, requiring disclosure to broader groups could cause one of at least three negative impacts
on oversight goals. First, it could cause leaking and thus endanger national security or discourage executive branch candor in the instant
or future briefings. Second, it could enhance executive branch perceptions of the likelihood of leaks. Those perceptions, even if incorrect,
might lead to a lack of executive branch candor or intransigence in providing witnesses or requested documents. Third, and most
cynically, it could provide the executive branch with ex ante or ex post excuses for avoiding disclosures. In short, broader disclosure
requirements might enable the administration more credibly to claim that it will not or did not share information with Congress in order
to protect the American people. This analysis suggests two basic guidelines to follow in determining to whom information should be
funneled. First, the
powers to have
notified group should be sufficient numerically and in terms of their capacities and
a real chance to influence the programs of which they are informed. Similarly, the group
should be sufficient in size and capacity to understand the information conveyed and to
meaningfully deliberate about the same. Among other things, these points suggest that the practice of
excluding congressional staff members from many intelligence briefings should be reconsidered .
Second, the group must be restricted sufficiently to minimize both the actual and perceived chances of leaks .
Means toward this goal might include some reassessment of security clearance requirements. Such
means might also include
better publicizing of any clearance or related measures to enhance the political viability of
congressional information requests and the political costs of defying the same.
Page 174
2NC Funneling
Funneling solves
Kitrosser 8 --- Associate Professor @ University of Minnesota Law School (Heidi, “THE DOMESTIC
COMMANDER IN CHIEF: CONGRESSIONAL OVERSIGHT OF NATIONAL SECURITY ACTIVITIES: IMPROVING INFORMATION
FUNNELS”, 29 Cardozo L. Rev. 1049, Lexis)//trepka
Introduction In December of 2005, the New York Times broke the story that the U.S. government had, since shortly after September 11,
2001, spied without warrants on international phone calls in apparent contravention of the Foreign Intelligence Surveillance Act (FISA).
n1 Since the story broke, commentary has abounded as to its implications for the Constitution's separation of powers. Most commentary
has debated whether the Bush administration indeed violated FISA and, if so, whether it was constitutionally empowered to do so under
Article II of the Constitution. n2 Also
raised, though to a much lesser degree, is whether the administration was
statutorily required to inform the congressional intelligence committees of its warrantless
surveillance program, whether it violated any such requirement, and whether such a violation would be constitutional. n3
[*1050] Whether the President adequately informed Congress of his actions is a question as significant and complex as whether those
actions violate the law. In
matters of congressional oversight generally, it is difficult and important to balance
the respective values of information flow to the public, information flow between Congress and the President, and
presidential discretion to act swiftly and secretly. And matters are substantially more complicated where national security
is at issue. Both executive branch secrecy needs and congressional information needs often are heightened in this context. Also at issue is
what role, if any, information flow to the public should play. A
major statutory means to reconcile secrecy and
openness needs in the context of inter-branch information-sharing - including in the statute governing information
sharing about the warrantless surveillance program n4 - is what this Article calls an " information funnel"
approach. Such an approach focuses on funneling information only to discrete groups of people.
For example, statutory provisions generally require that intelligence programs be shared with the congressional intelligence committees.
provisions permit certain narrowly defined covert actions to be reported only to
the congressional leadership. n6 The intended benefits of funneling are intuitive. Funneling plainly is directed toward
n5 Other statutory
balancing secrecy needs and openness needs. It demands some inter-branch knowledge sharing without requiring full public or even full
congressional access.
There’s constitutional authority for broader information funneling --- their ev
conflates executive authority with total secrecy
Kitrosser 8 --- Associate Professor @ University of Minnesota Law School (Heidi, “THE DOMESTIC
COMMANDER IN CHIEF: CONGRESSIONAL OVERSIGHT OF NATIONAL SECURITY ACTIVITIES: IMPROVING INFORMATION
FUNNELS”, 29 Cardozo L. Rev. 1049, Lexis)//trepka
First, although "executive privilege" or equivalent terms appear nowhere in the constitutional text, the privilege's supporters
argue that it is implicit in the President's Article II duties. n74 Specifically, supporters argue that the President cannot faithfully fulfill his
duties to execute the law and to serve as Commander-in-Chief unless he can control dissemination of his office's information to ensure
candid discussions with his advisors and to protect national security. n75 Second, supporters argue that history demonstrates that those
who framed and ratified the Constitution expected the President to have the prerogative to keep secrets from Congress. Supporters
argue, first, that this is demonstrated by a series of post-ratification incidents in which Presidents refused to disclose requested
information. n76 They also rely [*1062] heavily on two Federalist Papers, one by Alexander Hamilton and one by John Jay. Each paper
touts as a major advantage of the American presidency its relative capacity for secrecy as opposed to the diminished secret-keeping
capacity of a multi-member body. n77 Elsewhere, I have explained in some detail why I believe that these arguments
are
incorrect and why statutorily based information requests cannot constitutionally be
refused by the executive branch. n78 The following passage summarizes major aspects of the argument against a
constitutional executive privilege and in favor of a congressional prerogative to demand information from the executive branch: n79 It
simply does not follow from the executive branch's institutional skill at secret-keeping that it has a legal prerogative to keep secrets in
the face of checking mechanisms, including congressional requests. Saikrishna Prakash makes this point in his analysis of executive
privilege doctrine. Prakash
points out that historical references to Presidential secrecy ""hardly
demonstrate that the proposed executive would enjoy a constitutional right to an executive
privilege.' The references instead serve only to describe "one of the common attributes of a single executive ... . In the ordinary
course, the President would be able to keep some matters secret.' Whether the President has a constitutional right to
Page 175
keep secrets in the face of Congressional requests is another matter." n80 Constitutional
structure, text and history not only fail to equate Presidential secret-keeping capacity with a secret-keeping right, they indicate that
Presidential capacity necessitates robust structural checking. As I have explained elsewhere, the
Constitution designs a
system that seems to leave room only for political branch secrecy that itself can be checked
through the political process. n81 Thus, while the President has much capacity to engage in secret activities, secrecy's
dangers are mitigated because Congress may pass legislation limiting such activities or
permitting itself or others to obtain information under certain conditions. n82 This constitutional
design is evidenced by a number of factors. First, there is a negative correlation between the relative openness of each political branch
and the relative control that each branch has over the other. Congress
is a relatively transparent and dialoguedriven branch, and its core tasks are to pass laws that the executive branch executes and [*1063] to
oversee such execution . The executive branch, in contrast, is capable of much secrecy, but also is
largely
beholden to legislative directives in order to act . This creates a rather brilliant structure in which the
executive branch can be given vast leeway to operate in secret, but remains subject to being overseen or otherwise restrained in its
secrecy by the legislature. n83 Second, historical
references to secrecy as an advantage of the unitary President particularly two widely cited Federalist papers - also cite accountability and the ability of other
branches and the people to uncover wrongdoing as a major advantage of the unitary President.
This indicates, again, a balanced constitutional design whereby Presidential secrecy is expected but remains on a leash of political
accountability. n84 Third, the only explicit textual reference to secrecy occurs in Article I, § 5, of the Constitution, which requires
Congress to keep journals of its proceedings, but allows each chamber to exempt "such Parts as may in their Judgment require Secrecy."
n85 That fact by itself does not tell us very much, as one could argue that a secret-keeping prerogative is intrinsic in the President's
executive and commander-in-chief duties. What it does reflect, however, is a constitutional structure that permits secrecy only under
conditions that will ensure some political awareness of and ability to check such secrecy. "The very framing of the congressional secrecy
provision as an exception to an openness mandate, combined with [a logical and historical] expectation that a large and deliberative
legislative body generally will operate in sunlight ... suggest a framework wherein final decisions as to political secrecy are trusted only to
bodies likely to face internal and external pressures against such secrecy." n86 Finally, an
executive branch that can keep
secrets but that can be reigned in by Congress reflects the most logical reconciliation of
competing constitutional values. On the one hand, the Constitution clearly values transparency as an operative norm. This is
evidenced by myriad factors, including the necessities of self-government , the First Amendment , and
Article I 's detailed requirements for a relatively open and dialogic legislative process. n87 On the other hand, the
Constitution reflects an understanding that secrecy sometimes is a necessary evil, evidenced both
by the congressional secrecy allowance and by the President's structural secrecy capabilities. n88 Permitting
executive branch secrecy, but requiring it to operate within legislative parameters themselves
open and subject to revision, largely reconcile these two values. n89
Funneling rules uniquely balance secrecy with security
Kitrosser 8 --- Associate Professor @ University of Minnesota Law School (Heidi, “THE DOMESTIC
COMMANDER IN CHIEF: CONGRESSIONAL OVERSIGHT OF NATIONAL SECURITY ACTIVITIES: IMPROVING INFORMATION
FUNNELS”, 29 Cardozo L. Rev. 1049, Lexis)//trepka
Conclusion It
is crucial, perhaps now more than ever, to reconcile legitimate executive branch secrecy
needs with the devastating political and practical consequences of an uninformed Congress
and public. When national security information belongs exclusively to the executive branch, it becomes dangerously easy to persuade
Congress and the public simply to ""trust the President because only he [He?] knows the facts.'" n221 Indeed, there are substantial
political incentives for Congress n222 and psychological incentives for the public n223 to acquiesce in this view. Because
funneling rules plainly are directed at balancing the advantages of openness and secrecy,
they may be uniquely equipped not only to achieve this substantive end, but to overcome
the political and psychological barriers to so doing. With respect to the former, carefully crafted
Page 176
funneling rules might help to ensure necessary information-sharing while protecting national security
and meaningful deliberation . With respect to the latter, openness rules can not be passed or enforced without sufficient
political incentive on the part of the relevant players. By crafting improved funneling rules and vigorously championing
them to the public, to others in Congress, and to executive branch officers, congresspersons can help to bolster and harness
those
incentives . Indeed, it is important for congresspersons not only to engage the public in seeking to pass new funneling
rules, but to engage them regularly on matters of government secrecy and executive branch information-sharing. Ideally, funneling rules
might have a dynamic and ongoing relationship with the political process. Government secrecy must have a degree of political resonance
for funneling rules to be [*1090] crafted, improved and enforced in the first place. At the same time, their very existence and success
may increase their political resonance and the political costs to politicians of violating them or acquiescing in their violation. In short,
well crafted and publicly debated funneling rules hold some promise to attack unwarranted
secrecy on two fronts. First, the rules themselves may be conducive to meaningful informationsharing. Second, the rules may become foci for an ongoing public debate on the risks of excessive
government secrecy and the means to balance secrecy and openness. Should funneling rules help to awaken the public to the dangers of
unchecked government secrecy, that may prove their most important and enduring contribution.
Page 177
AT: Kills deliberation
You’re wrong
Kitrosser 8 --- Associate Professor @ University of Minnesota Law School (Heidi, “THE DOMESTIC
COMMANDER IN CHIEF: CONGRESSIONAL OVERSIGHT OF NATIONAL SECURITY ACTIVITIES: IMPROVING INFORMATION
FUNNELS”, 29 Cardozo L. Rev. 1049, Lexis)//trepka
The intrinsic and instrumental forms of the candor argument can be applied to intra-branch and inter-branch discussions alike. The
arguments as applied to intra-executive branch discussions essentially mirror those made in the previous paragraph. As applied to
discussions with Congress, the arguments are more complex. An
course, would
absolute anti-disclosure stance toward Congress, of
make deliberations between the executive branch and Congress about non-public information
impossible . On the other hand, more moderate disclosure limitations - for example, notifying
only a small number of congresspersons and subjecting them to gag orders - might facilitate candid
and robust deliberation between branches. The intrinsic and instrumental values of
robust inter-branch deliberation might then be realized.
Congressional oversight is key to deliberation --- independently solves interbranch relations
Kitrosser 8 --- Associate Professor @ University of Minnesota Law School (Heidi, “THE DOMESTIC
COMMANDER IN CHIEF: CONGRESSIONAL OVERSIGHT OF NATIONAL SECURITY ACTIVITIES: IMPROVING INFORMATION
FUNNELS”, 29 Cardozo L. Rev. 1049, Lexis)//trepka
ii. Arguments Favoring Disclosures Broad
disclosure rules arguably advance the intrinsic and
instrumental benefits of deliberation within the executive branch and between the
executive and legislative branches. Instrumentally, such rules may foster more substantive, productive and forthright
executive branch deliberations because executive branch actors know that they may be held accountable for their roles in the same.
inter-branch deliberations by providing Congress with
information to facilitate meaningful oversight of the executive branch. The enhancement of
intra-branch and inter-branch [*1070] deliberations has intrinsic value as well, given the constitutional
Similarly, disclosures can improve
significance of these deliberations in our indirect democracy.
Solves public deliberation
Kitrosser 8 --- Associate Professor @ University of Minnesota Law School (Heidi, “THE DOMESTIC
COMMANDER IN CHIEF: CONGRESSIONAL OVERSIGHT OF NATIONAL SECURITY ACTIVITIES: IMPROVING INFORMATION
FUNNELS”, 29 Cardozo L. Rev. 1049, Lexis)//trepka
Deliberations involving the public also are advanced by broad disclosure requirements.
First, to the extent that information is disclosed publicly, public information flow is directly
enhanced , which in turn elevates the likelihood of informed public discourse . Second, to
the extent that information initially is disclosed non-publicly (say, to members of Congress) under liberal
disclosure rules that make eventual public disclosure likely, informed public deliberations again are
enhanced. Increased public deliberation of course is associated with the intrinsic and instrumental benefits of the same.
Page 178
AT: Leaks
Funneling solves leaks
Kitrosser 8 --- Associate Professor @ University of Minnesota Law School (Heidi, “THE DOMESTIC
COMMANDER IN CHIEF: CONGRESSIONAL OVERSIGHT OF NATIONAL SECURITY ACTIVITIES: IMPROVING INFORMATION
FUNNELS”, 29 Cardozo L. Rev. 1049, Lexis)//trepka
[*1072] b. Determining What Conditions to Impose on Those to Whom Information Is Funneled As important as determining who to
inform is deciding what restrictions should be imposed on information recipients. The same basic considerations apply in making this
determination as in deciding who should receive information in the first place. That is, restrictions
must not significantly
undermine the capacity of the informed to assess and respond to the funneled information. At the
same time, restrictions must sufficiently protect against national security risks , the
perception of such risks and the overall likelihood of executive branch defiance. One method that can help to strike this balance is the
use of successive information funnels. In other words, information
might first be funneled to a small group
that is not permitted indiscriminately to disclose information . That small group may, however,
have the power through majority vote or some other constraining mechanism to determine that the
information or parts thereof should be funneled on to a different group. Successive funneling is considered further
in Part III.
No leaks and even if there are, they don’t matter
Kitrosser 8 --- Associate Professor @ University of Minnesota Law School (Heidi, “THE DOMESTIC
COMMANDER IN CHIEF: CONGRESSIONAL OVERSIGHT OF NATIONAL SECURITY ACTIVITIES: IMPROVING INFORMATION
FUNNELS”, 29 Cardozo L. Rev. 1049, Lexis)//trepka
2. Rethinking the Circumstances in Which the Gang of Eight Provisions Can Be Used It
is hard to justify limiting notice of
intelligence activity to the Gang of Eight on the basis of reasonable fears of information
leakage that could harm national security. Congress is considered to have a reliable track
record for non-leakage n138 and it has a political incentive to avoid leaks in order to avoid
blame by the executive branch for the same. n139 Furthermore, the intelligence committees have a variety of
methods to protect classified information including staff clearance policies , nondisclosure policies for members and office security measures. n140 Executive branch claims of national
security secrecy needs also must be taken with a grain of salt given historical indications
that such claims are dramatically overused and that the executive branch itself routinely leaks classified
information for political reasons. n141
Page 179
AT: Staff leaks
No staff leaks --- so much security
Kitrosser 8 --- Associate Professor @ University of Minnesota Law School (Heidi, “THE DOMESTIC
COMMANDER IN CHIEF: CONGRESSIONAL OVERSIGHT OF NATIONAL SECURITY ACTIVITIES: IMPROVING INFORMATION
FUNNELS”, 29 Cardozo L. Rev. 1049, Lexis)//trepka
3. When If Ever Should Staff Be Excluded? Excluding
staff from hearings seems no more reasonable from a
security-based perspective than does excluding members. Staff employees work amidst the same
physical security and under the same non-disclosure agreements as do members. Unlike
also are subject to pre-clearance requirements . n147 Furthermore, staff presence
necessary to make information-sharing meaningful. Complex information about intelligence programs
may be incomprehensible to members, or members may simply lack the time to sift through and make
members, they
often is
sense of the information, without
staff assistance . n148
Page 180
Mandate Intelligence Clearance/Lower
Standing CP
Page 181
1NC Clearance/Lower Standing CP
Intelligence clearance prevents national security objections, and lower
standing solves privacy considerations
Sugiyama and Perry 6 --- J.D.s from UMich Law School (Tara and Marisa, “THE NSA DOMESTIC SURVEILLANCE
PROGRAM: AN ANALYSIS OF CONGRESSIONAL OVERSIGHT DURING AN ERA OF ONE-PARTY RULE”, 40 U. Mich. J.L. Reform
149, Lexis)//trepka
These competing
proposals represent differing views of the need to hold the Bush administration
accountable and the ability of Congress effectively to oversee the NSA surveillance program. On
one side, Senators Specter and Schumer seek to face the legal challenges head-on, presumably to hold the administration accountable for
any actions taken outside the purview of the law. Judicial oversight may determine whether the surveillance program is
legal under current law, but these answers may come too late to provide any real leverage against the administration or to curb the
ongoing surveillance. On the other side, Senator DeWine and his supporters seek to rubber-stamp past and future surveillance in a
manner that may be challenged on Fourth Amendment grounds. n273 Looking forward, effective oversight of the NSA surveillance
program will likely require both judicial and congressional action. One prospective model
of oversight would both
monitor ongoing surveillance activities and provide a grievance mechanism for
individuals [*188] who believe that they have been illegally targeted. Members of a DeWine-like committee
investigating such grievance claims would have intelligence clearances authorizing them to review
classified documents relating to the NSA surveillance program. This clearance requirement would assuage
concerns of the administration regarding the sensitivity of the program and the need to keep what the government
knows and how the government knows it a secret. The administration has thus far rejected ongoing oversight by the FISA court,
but it might be persuaded to support a DeWine-like congressional committee that engages in oversight of the NSA program even if that
committee also has the power to refer questions to the FISA court for review or for consultation. For instance, if both minority and
majority members could seek declaratory opinions from the FISA court on matters within their review, but the FISA court was not a
"required" avenue for approval, perhaps the administration would deem it a feasible means of oversight of the surveillance program.
Alternatively, the newly-created committee could develop a proposal for streamlined FISA court review that would respond to the
administration's concerns that the current FISA process is laborious and slow. A
similar compromise would create a
grievance mechanism for congressional constituents. A DeWine-like committee would be
authorized to hear initial complaints , for example, from citizens or interest groups, and then would refer
cases of suspected illegal activity to the FISA court for more searching review . The subsequent
judicial review could include relaxed standing requirements n274 and be mandated for all cases
referred by the committee. Outside of a change in party leadership or a successful legal challenge, the administration seems
unlikely to accede to any judiciary review of the surveillance program. The best opportunity for change appears to be the upcoming
midterm elections. If the Democrats can successfully take back either house in Congress, they will have significantly more leverage to
pressure the administration to open the surveillance program to oversight. [*189] Conclusion In times such as these when one party
controls both the executive and the legislative branches, the 2006 midterm elections may present the best opportunity to bring greater
congressional oversight to secret executive programs. In the interim, Congress
should take bipartisan steps to investigate
domestic surveillance program and engage the judiciary in a review of the program. The duty of the executive
branch to preserve national security and the interests of Congress in oversight are not mutually
the NSA
exclusive. The United States can and must fight terrorism in a manner that simultaneously preserves the
separation of powers and upholds civil liberties.
Page 182
Modify A1C CP
Modifying the A1C registry solves and prevents the necessity of a court ruling
Hoppin 12 --- J.D., New York University School of Law (Margaret, “NOTE: OVERLY INTIMATE SURVEILLANCE: WHY
EMERGENT PUBLIC HEALTH SURVEILLANCE PROGRAMS DESERVE STRICT SCRUTINY UNDER THE FOURTEENTH
AMENDMENT”, 87 N.Y.U.L. Rev. 1950, Lexis)//trepka
Easy modifications to the surveillance component of the A1C Registry surveillance
would remove doubt about its constitutional status. For example, the program could be consent
based , like Vermont's diabetes registry. n211 Consent would remove privacy concerns ; in
addition, people
who opt in to the program are presumably indicating that they would benefit from
reminders about their health status. Alternatively (or additionally), the A1C Registry could identify
patients by community or health center , instead of by name and [*1994] personal
information. That method would enable city government to direct resources to the communities
that need them most.
Page 183
Other Planks
Page 184
1NC Combine CP
Combining authorization and appropriation authorities is key
Ford 7 --- Assistant Professor of Law @ US Military Academy (Christopher, “Intelligence Demands in a Democratic
State: Congressional Intelligence Oversight”, 81 Tul. L. Rev. 721, Lexis)//trepka
failed to adopt virtually any of the 9/11
Commission recommendations concerning congressional-oversight reform. n317 This failure was largely the result
1. 9/11 Commission Recommendations and Legislation As noted above, Congress
of organizational "turf wars" and partisan squabbling. n318 Many of the commission's recommendations, however, continue to receive
support in Congress. [*762] The Senate version of the IRTPA passed the Senate ninety-six to two and would have implemented many of
critically , the report urged the combination of
congressional authorization and appropriation authorities. n320
the 9/11 Commission's recommendations. n319 Most
Page 185
2NC Combine CP
That solves --- facilitates interbranch cooperation and guarantees effective
enforcement
Ford 7 --- Assistant Professor of Law @ US Military Academy (Christopher, “Intelligence Demands in a Democratic
State: Congressional Intelligence Oversight”, 81 Tul. L. Rev. 721, Lexis)//trepka
1. Committee Reorganization Congressional intelligence committees are presently operating at a
suboptimal level
of efficiency. A number of bureaucratic constructs have markedly reduced the ability of the committees to both ensure legal compliance
and facilitate an aggressive and effective Intelligence Community. To wit, Congress should seek to address three internal areas for
reform: (1) appropriations authority, (2) committee organization, and (3) classification and secrecy.
a. Appropriations Authority Congress should adopt the recommendations of both the 9/11 Commission and the WMD
Commission, and establish either a bicameral intelligence committee or combine the appropriations and
authorizations authorities into a single committee in each chamber. n352 [*767] Presently, the authorizing authorities
(i.e., the intelligence committees) have little say in the appropriation of intelligence monies. Due to the classified nature of the
intelligence budget, the vast majority of the money is "hidden" within the DoD budget and is thus
controlled by the defense committees rather than intelligence committees. n353 This arrangement presents a number of
problems, summarized by one commentator as follows: First, the continuation of the status quo keeps intact the unusual degree of
control over the intelligence budget by appropriators (who write the checks in the end) rather than authorizers (who write the bills
outlining their respective budgets), even though only the latter have a full staff of experts at their disposal. Second, the continuation of
the stares [sic] quo makes it more difficult for Negroponte and his successors to count on a unified budget process, since it forces the
DNI to deal with multiple actors rather than a few individuals. That splintering of jurisdiction, in turn, will make any future attempts at
intelligence reform more difficult to push through Congress. Third and last, the
decision to keep the intelligence budget
split up among separate, classified accounts means that appropriators themselves cannot transfer money among
their respective subcommittees - say, from Defense over to the State Department's Bureau of Intelligence and Research or to
the FBI to aid its counterterrorism efforts - even if they decide that such a transfer reflects an important priority.
n354 The House Committee on Rules is presently considering House Resolution 25, which would create an appropriations
subcommittee for intelligence. n355 This bill was referred to the House Committee on Rules on January 9, 2007. n356 There has been
no action on this issue since. Indeed, the Intelligence Authorization Act for Fiscal Year 2006 did not address this issue. n357 The Senate
bill is not entirely without merit as it: requires a response to a committee request for intelligence within fifteen days of the request,
establishes the Office of the Inspector [*768] General of the Intelligence Community, and empowers nonstatutorily established
inspectors general. n358
Page 186
1NC Committee Reforms
Increase info-sharing, eliminate term limits for half of the committee, all
committee members have same rights and privileges
Ford 7 --- Assistant Professor of Law @ US Military Academy (Christopher, “Intelligence Demands in a Democratic
State: Congressional Intelligence Oversight”, 81 Tul. L. Rev. 721, Lexis)//trepka
b. Committee Organization Beyond the appropriations issues, Congress
must address other lingering organizational
issues such as internal information-sharing and term limits. The Joint Inquiry Report issued by Congress following the
9/11 attacks contained 190 pages of "additional views." n359 These comments were not so much notable for the additional, independent
views on the Intelligence Community, but rather for their illustration of internal strife within the committees. Senators John Kyl and Pat
Roberts detailed at length organizational issues with the manner in which the committee conducted its investigation. n360 Their
comments bear a direct importance to both future investigations and the conduct of the committee operations generally. Their concerns
dealt primarily with the hierarchical nature of the investigation and the retention of information and decision making by the "Big Four" the Chairman and Vice Chairman of the Senate Select Committee on Intelligence and the Chairman and Raking Member of the House
Permanent Select Committee on Intelligence. n361 They note: It is difficult, however, for rank-and-file Members of the two committees
to know how thorough or accurate the Report is because of the way the JIS and the "Big Four' conducted the inquiry, withholding
information and decisions from the Members and SSCI and HPSCI staff throughout the process... . ... . The inquiry was conducted and
overseen in a way that left rank-and-file Members at a distinct disadvantage ... . n362 The Senators then proceed to provide specific
examples of "irregularities" in the conduct of the inquiry. n363 Plainly, if senators are publicly chastising the leadership, there must be
major organizational issues to be addressed by the committees. This problem is further exasperated by the term
both committees, which deny the congressmen the
limits applicable to
opportunity to [*769] forge stronger working
relationships . These term limits were originally introduced to prevent congressional overseers from being co-opted by the
organizations they were overseeing. n364 This prophylactic measure, however, presents a number of issues. The Intelligence Community
is enormous in both terms of personnel and budget, and intelligence operations can be complex affairs running for many years.
Furthermore, the oversight rules applying to different aspects of the Intelligence Community are highly specialized to intelligence law
and are exceedingly complex. n365 Thus, by
the time a new committee member has read into all the
intelligence operations and fully understands the oversight rules, it is time for that member to leave . While the
original reason for term limits remains a legitimate concern, the efficiencies wrought by this change would likely outweigh any potential
for impropriety. Such improprieties
could further be guarded against by providing for term limits on a
small number of seats, thereby ensuring unbiased rotation of members on a regular basis. Such a scheme would
only work, however, where the rotating members were afforded the same rights and privileges as the
permanent members.
Page 187
1NC Framework/Training
Congress should establish a uniform framework for intelligence oversight,
including guidance for training efforts
Ford 7 --- Assistant Professor of Law @ US Military Academy (Christopher, “Intelligence Demands in a Democratic
State: Congressional Intelligence Oversight”, 81 Tul. L. Rev. 721, Lexis)//trepka
2. Uniformity of Oversight In his testimony before the 9/11 Commission, former Congressman and co-chair of the 9/11
Commission, Lee Hamilton, succinctly identified a systemic problem in the Intelligence Community - a lack of unity. n373 The Joint
Inquiry Report quoted his testimony as follows: "U.S.
intelligence is governed by a set of disparate laws
executive orders produced over the last fifty-five years. No
and
single one of these laws provides a comprehensive
legal foundation for our massive intelligence establishment. This is a remarkable state of affairs in a country that takes the
rule of law so seriously... . We need a statutory foundation for U.S. intelligence." n374 [*772] All executive agencies operate under the
rubric of Executive Order 12,333; however, each agency has implemented it differently, thereby creating a patchwork of regulations that
vary from agency to agency. The divergences between agencies are further exasperated by different education-oversight programs for
each agency. n375 This, then, seriously hampers the ability of agencies to work with one another. Where
oversight education is
lacking, incomplete, or incorrect, legal misconceptions develop within the agency regarding what is and is
not "legal." This issue is further complicated by the insular nature of the intelligence establishment,
where each agency perpetuates its own misconceptions. n376 Congress
should establish a uniform framework
for intelligence oversight . This recommendation can take one of two forms. The first, recommended by Congressman
Hamilton, would
establish a " statutory foundation for U.S. intelligence." n377 The second would require
Congress to establish organizations that would then ensure Community uniformity. The establishment of an inspector general and
general counsel in the Office of the DNI, for instance, should significantly facilitate this effort. Further, in
establishing a
uniform framework for oversight rules, Congress should strive to issue clear guidance , free to
the greatest extent possible from legalistic terms and textual constructs. n378 Congress should
mandate and fund annual training on these regulations. Finally, Congress should establish a bipartisan task force,
and require the DNI to do the same, designed to identify and address "legal misconceptions" that pervade the Intelligence Community.
Page 188
1NC Increase People
Increasing the number of people on a committee creates healthy competition
that prevents complacency
Kitrosser 8 --- Associate Professor @ University of Minnesota Law School (Heidi, “THE DOMESTIC
COMMANDER IN CHIEF: CONGRESSIONAL OVERSIGHT OF NATIONAL SECURITY ACTIVITIES: IMPROVING INFORMATION
FUNNELS”, 29 Cardozo L. Rev. 1049, Lexis)//trepka
4. Which Committees Should Have Access to Information? The
NSA surveillance controversy also exposed
difficulties that arise when a committee with jurisdiction overlapping that of an intelligence
committee wishes to hold hearings, but lacks background on or access to some of the complicated,
classified matters involved. These difficulties arose, most notably, when the Senate Intelligence Committee declined to hold
investigative hearings on the surveillance program, n153 while the Senate Judiciary Committee held several hearings to determine what
had transpired and to consider responsive legislation. n154 The Senate Judiciary Committee does not receive statutorily required,
ongoing notice as does (in theory) the Senate Intelligence Committee. Staff and member expertise and member clearance requirements
also differ between the committees. n155 Detailed assessment of which committees, beyond the Intelligence Committees, should receive
notice and on what basis they should receive it is beyond this Article's scope. It is, however, worth flagging the issue and suggesting two
relevant factors that deserve consideration. First, there is the question of whether any committees beyond the [*1079] intelligence
committees should receive statutorily mandated, ongoing intelligence updates. n156 Broader regular disclosures are not novel. Between
1974 and 1981, the President was required by statute to notify "between six and eight congressional committees of covert intelligence
actions." n157 The statutory requirement was modified in 1981, "replacing the reporting requirement to as many as eight committees
with a general requirement to keep the two intelligence committees fully and currently informed of intelligence activities." n158 A
potential cost of broader required disclosures is that the content and frequency of disclosures generally will become diluted. This might
be caused by increased executive branch intransigence based on real or pre-textual concerns about national security or intra-executive
branch deliberative candor. On the other hand, broader
disclosures could spread information to more
committees and enable these committees to better do their intelligence related work. Broader
disclosures also might create healthy intra-chamber competition between committees, reducing
the possibility of complacency or capture on the part of a single, information-monopolizing
committee. n159
Page 189
1NC In Writing/Release Later
In-writing requirements force accountability, and releasing the info in 10
years forces privacy compliance
Kitrosser 8 --- Associate Professor @ University of Minnesota Law School (Heidi, “THE DOMESTIC
COMMANDER IN CHIEF: CONGRESSIONAL OVERSIGHT OF NATIONAL SECURITY ACTIVITIES: IMPROVING INFORMATION
FUNNELS”, 29 Cardozo L. Rev. 1049, Lexis)//trepka
2. Possible New Approaches a. Some Additions to In-Writing Requirements and Public Disclosure Rules Existing rules include some inwriting requirements and the possibility of eventual public disclosure. As noted, both devices have the potential to enhance
accountability, although both have had limited impact thus far. There may be ways to build on these requirements to enhance their
effectiveness without unduly risking increased executive branch intransigence. Two
changes to the existing devices come
to mind - one building on in-writing requirements and one building on public disclosure rules. With respect to the former, the
executive branch presently must put most of its obligatorily disclosed information - including its regular reports to the intelligence
committees and its covert action reporting - in writing. It
might be worth exploring a parallel in-writing
requirement reflecting congresspersons' responses to the information. Any such requirement
should be vague and undemanding so as not to be too onerous or to discourage compliance something to the effect that: "Congresspersons receiving information must, in writing, acknowledge receipt of the same. In the same
document, receiving congresspersons may record any responses on their part to the information, including any responsive actions taken
or follow-up discussions had." Such requirements would be subject to the same confidentiality and security procedures to which written
executive branch disclosures are subject. [*1087] The accountability-enhancing effect of in-writing requirements depends on the
likelihood that others will, at some point, see the written information and draw from it views as to whether the executive branch
complied with its obligations, whether congresspersons pushed for such compliance and whether individual congresspersons were
engaged in the relevant debates. Existing successive funneling rules contribute to these ends. Serious consideration also should be given
to creating presumptive public disclosure/de-classification dates for information funneled to the intelligence committees. This is
analogous to the practice within the executive branch of placing presumptive de-classification dates on some information, with the
presumption subject to reversal. n212 Presumptive
disclosure dates might make the possibility of eventual
public disclosure much more real to participants and enhance the likelihood of
compliance and engagement . At the same time, the possibility of rebutting the presumption
combined with sufficiently distant dates - say, 5-10 years after initial disclosure - should alleviate
reasonable concerns about national security or the integrity of executive branch
discussions. Existing provisions for public disclosure upon special committee or chamber
action can serve as a backup mechanism for cases where immediate public disclosure is
warranted.
Page 190
1NC Vest Powers
CP: Vest “emergency domestic surveillance" powers in a congressional
intelligence committee
Solves, mitigates inefficiency, and ensures SOP
Mehta 7 --- J.D., Harvard Law (Jason, “ASSESSING THE ELECTRONIC SURVEILLANCE MODERNIZATION ACT (ESMA):
DISTORTING, RATHER THAN BALANCING, THE NEED FOR FLEXIBLE ELECTRONIC SURVEILLANCE AND ROBUST
CONGRESSIONAL OVERSIGHT”, 12 J. Tech. L. & Pol'y 225, Lexis)//trepka
A more meaningful role for Congress could be preserved by allowing select
congressional intelligence committees , and not the President, to determine when warrantless
domestic emergency surveillance is appropriate. Forcing these congressional committees , rather
than the President, to determine when to engage in warrantless electronic surveillance will necessarily create a " second
sobering moment " and will require majoritian support. While one might argue that Congress may lack classified
information about pending terrorist threats, there is no reason to believe that the President could not brief and
persuade Congress to authorize warrantless surveillance without compromising sensitive
information. Furthermore, in response to the claim that Congress often moves too slowly, the fear of congressional
inefficiency should be militated when we speak of 15 member congressional committees (as
opposed to 535 members of the full Congress). This
separation of powers framework.
proposal, for example, would more faithfully ensure a robust
Page 191
Penalties CP
Page 192
1NC Penalties
That solves
Fenske 8 --- J.D. Candidate (Dan, “ALL ENEMIES, FOREIGN AND DOMESTIC: ERASING THE DISTINCTION BETWEEN
FOREIGN AND DOMESTIC INTELLIGENCE GATHERING UNDER THE FOURTH AMENDMENT”, 102 Nw. U.L. Rev. 343,
Lexis)//trepka
B. Require
Politically Accountable Executive Officials to Approve All Warrantless Domestic
Surveillance FISA requires that the Attorney General approve any warrantless foreign intelligence
surveillance in the United States. n193 This requirement should also be imposed on warrantless
domestic intelligence searches because it accomplishes two objectives. First, it guarantees that the overzealous
predilections of low-level intelligence officers do not drown out the legitimate privacy
interests of those who are surveilled. Simply because the Attorney General is an executive officer does not mean that she would be less sympathetic
to privacy concerns of surveillance subjects than would a judge. She is politically accountable, and thus must take into account how surveillance would
impair the privacy of citizens if such surveillance were widespread. And further, it is just as possible for an executive officer as it is for a judge to be detached
enough from the situation to make a neutral [*378] decision. n194 By interposing a high-level executive officer who can evaluate the search from the "big
picture," requiring the Attorney General's approval functions much like a warrant, but without the burdensome process associated with obtaining one.
Second, such a rule ensures that a politically accountable individual has the authority to
decide to conduct a warrantless search. n195 Thus, if a search is conducted for an improper purpose, Congress and the electorate know
whom to blame. For these reasons, Congress should require that the Attorney General or another high-ranking executive officer approve warrantless
domestic intelligence searches. C. Harsh Penalties for Those Who Abuse Their Authority Just
as harsh penalties deter individuals
from committing crimes, penalties will deter those officials who abuse their authority to
conduct warrantless surveillance or who misuse lawfully obtained information. n196 The power to conduct warrantless surveillance should
not be taken lightly. Individuals conducting searches will come across personal information that should never
become public knowledge unless necessary to protect the national security. n197 Thus, those officers who use information obtained
through domestic intelligence to blackmail or intimidate subjects of surveillance should be exposed
to criminal sanctions , including jail time and heavy monetary fines . Under such a
regime, the abusive or malicious officer - who is not deterred by the ban on the use of evidence obtained via
such surveillance in non-national security criminal prosecutions - will be deterred by the fear of punishment from
misusing the information he has obtained through intelligence efforts. D. Expanded Whistleblower Protection for Insiders Who Expose Illegal Surveillance
Expanded penalties for those who abuse intelligence-gathering authority are meaningless if those
abuses never come to light . Honest intelligence officers who become aware of illegal
surveillan ce or physical searches in violation of the Fourth Amendment should not be deterred from reporting
such activity
for fear of prosecution under laws that criminalize disclosure [*379] of confidential
information or activity n198 or internal sanctions by their superiors. Over the years, Congress has exempted much of the
intelligence community from whistleblower protection laws, which protect employees who report illegal activities that occur within
their companies or government agencies. n199 Congress should expand whistleblower protection to cover
intelligence officers who report unconstitutional searches and seizures.
Page 193
2NC Penalties
Increasing penalties prevents the worst abuses
Fenske 8 --- J.D. Candidate (Dan, “ALL ENEMIES, FOREIGN AND DOMESTIC: ERASING THE DISTINCTION BETWEEN
FOREIGN AND DOMESTIC INTELLIGENCE GATHERING UNDER THE FOURTH AMENDMENT”, 102 Nw. U.L. Rev. 343,
Lexis)//trepka
F. Expanded
Administrative Remedies for Violations of the Fourth Amendment At the Founding, the
primary remedy for a violation of the Fourth Amendment was a civil damages action. n201 However, the increasingly costly
and time-consuming nature of civil lawsuits, combined with the likelihood that damage
awards will be low, could deter an individual who has suffered a violation of her Fourth
Amendment rights from asserting them in court. n202 Therefore, Congress should expand
administrative remedies to give these individuals meaningful opportunities to assert their
rights. n203 Such remedies could take the form of citizen review boards that hear citizen [*380] complaints and issue punishments, n204
or they could replicate lawsuits in a less costly setting by allowing claims to be brought before an administrative law judge. Even if
administrative remedies or civil actions for Fourth Amendment violations initially are costly, one should not
discard such enforcement mechanisms as insufficient. Fourth Amendment law comes from the
" ground up ," not the "top down," meaning that the courts fashion clearer rules by giving more concrete meaning to terms like
"unreasonable" and "probable cause" in the specific factual situations of actual cases. n205 Thus, if warrants were deemphasized, the
courts would then have to craft practical solutions outside the warrant and probable cause paradigm for Fourth Amendment problems
time a body of law would develop around
the centrality of civil and administrative damages to remedy Fourth Amendment violations,
thereby allowing the Court to craft a Fourth Amendment jurisprudence that maximizes the
that arise. Although there may be growing pains in the beginning, over
effectiveness of these remedies.
Page 194
Terry Stops CP
Page 195
1NC Terry Stops
Terry Stops solve
Blum 9 --- attorney for the Department of Homeland Security, M.A. in security studies, J.D. from UChicago
(Stephanie, “ WHAT REALLY IS AT STAKE WITH THE FISA AMENDMENTS ACT OF 2008 AND IDEAS FOR FUTURE
SURVEILLANCE REFORM”, 18 B.U. Pub. Int. L.J. 269, Lexis)//trepka
The FAA solves the technological problem associated with foreign-to-foreign communications being routed through America.
Unfortunately, it does not appear to adequately address the concern that U.S. persons
unaffiliated with foreign powers may be subjected to warrantless surveillance after being
contacted by foreign terrorist suspects. For instance, if the purpose of the FAA was in part to solve the problems discussed in Part III
concerning an overseas terrorist calling ten phone numbers in America, n259 it does not seem that the FAA resolves that issue. Under the
FAA, while there is no need for a warrant to target the alleged overseas terrorist (who does not even need to be a terrorist but just a
foreign national); n260 it does require the executive branch to obtain a [*309] FISA warrant before conducting follow-up surveillance on
the U.S. person who answered the phone. n261 Under the FAA, as soon as the government targets a U.S. person (no matter where located),
the executive must show probable cause that the U.S. person is an agent of a foreign power. n262 One
solution to this problem is to
use the
equivalent of a "Terry stop" for electronic surveillance-a solution proposed by Kim Taipale,
Executive Director of the Center for Advanced Studies in Science and Technology Policy. As Taipale explains, "where collateral
U.S. person communications are intercepted incidental to a legitimate foreign intelligence intercept, there is no
explicit way consistent with FISA ... to engage in follow up electronic surveillance to determine if probable cause exists to target the
individual, even though the collateral intercept itself may give rise to a constitutionally reasonable suspicion." n263 Pursuant to the
seminal case Terry v. Ohio, n264 a police officer can briefly detain a person for questioning and conduct a limited pat-down frisk if the
officer has "reasonable suspicion" (a standard less than probable cause) to believe that the person may be involved in a crime. n265 If the
Terry stop reveals additional evidence of a crime, that evidence can be used to justify probable cause and a full-scale search or arrest. n266
In the case of electronic surveillance, a "Terry stop" would allow an authorized period for
additional monitoring or initial investigation of the U.S. person in contact with the alleged
terrorist. n267 In other words, in the case of a terrorist who calls a U.S. person, the government could briefly
perform follow-up surveillance on the U.S. person to determine whether the
communications have any intelligence value. If this follow-up surveillance revealed that the
U.S. person was an agent of a foreign power, then a traditional FISA warrant could be
obtained based on probable cause. If the U.S. person's communication was innocent, then the follow-up
surveillance would be minimized .
Page 196
2NC Terry Stops
Terry Stops ban evidence not for national security --- ensures it can’t be used
against citizens --- that solves unrelated prosecutions which ensures rights
Fenske 8 --- J.D. Candidate (Dan, “ALL ENEMIES, FOREIGN AND DOMESTIC: ERASING THE DISTINCTION BETWEEN
FOREIGN AND DOMESTIC INTELLIGENCE GATHERING UNDER THE FOURTH AMENDMENT”, 102 Nw. U.L. Rev. 343,
Lexis)//trepka
on the Use of Seized Evidence for Purposes Other than Domestic Intelligence or
Counterterrorism One of the greatest potential abuses of a domestic intelligence exception to the warrant requirement
would be to allow the exception to creep into everyday law enforcement. Indeed, it was this fear the Court
A. Limitation
addressed in the "special needs" cases by requiring that any police activity qualifying for the exception must not be for the "primary
purpose" of law enforcement. n181 Because legitimate governmental interests outside of law enforcement overlap with criminal law - say,
the government's legitimate concern with protecting its citizens prospectively from drunk drivers n182 or with protecting student athletes
from the effects of drug use n183 - any exception to the [*376] warrant requirement potentially could be used as a mere pretext for
easy solution to this problem exists: ban the use of evidence from a
legal-but-warrantless domestic intelligence search in a criminal prosecution unrelated to the
retrospective law enforcement. An
national security. n184 If such a rule existed, an intelligence officer's incentive to use domestic intelligence as a pretext for mere law
enforcement would vanish because doing so would be of no use in a later criminal prosecution. n185 Although this would not deter the
rare intelligence officer who abuses his authority solely for reasons of caprice or malice, the warrant requirement also does not prevent
this problem: if the officer is acting not to uncover evidence but merely to harass or surveil individuals for his own pleasure, he need not
obtain a warrant because he knows no court will ever review his actions, and thus he will not be held to account for them unless he is
later sued. n186 A ban on the use of evidence gathered in warrantless domestic intelligence searches in criminal prosecutions for crimes
unrelated to national security, then, provides as much protection from overzealous intelligence gathering as one can hope for in this
area. Were Congress not to enact such a ban, the Court could impose it via either the exclusionary rule or the "minimization principle."
n187 One scholar argues that the Fourth Amendment's minimization requirement - where officers conducting a
search are required to use procedures to limit the uncovering of private information unrelated to the subject matter of the search n188 -
provides a constitutional basis for a ban on the use of evidence obtained from warrantless
intelligence searches in criminal prosecutions for crimes unrelated to national security. n189 However, the
minimization principle is designed to ensure that the government does not invade the constitutionally protected interests of the
individual who is being surveilled. n190 Criminal activity, though, is not a constitutionally protected interest. n191 Thus, for this new
constitutional argument to fit within the Court's Fourth [*377] Amendment jurisprudence, the Court would have to hold, for the first
time, that even when the Executive uncovers unrelated criminal activity in the course of a lawful search, the fruits of that search could
not be used to prosecute the unrelated criminality. This would be a fairly significant break from the Court's "plain view" doctrine. n192
Page 197
AT: Unconstitutional
They’re compatible with the 4th amendment
Blum 9 --- attorney for the Department of Homeland Security, M.A. in security studies, J.D. from UChicago
(Stephanie, “ WHAT REALLY IS AT STAKE WITH THE FISA AMENDMENTS ACT OF 2008 AND IDEAS FOR FUTURE
SURVEILLANCE REFORM”, 18 B.U. Pub. Int. L.J. 269, Lexis)//trepka
This Terry stop surveillance approach is likely constitutional . The Supreme Court held in
Keith that the standard of probable cause needed to obtain warrants for intelligence
purposes could be different from the traditional standard used for law enforcement: "Different standards
may be compatible with the Fourth Amendment if they are reasonable both in relation to
the legitimate need [*312] of Government for intelligence information and the protected rights of our citizens." n278 Hence, there is an
argument that one could reframe the question of probable cause from whether the target is an agent of a foreign power to whether the
target has been contacted by a terrorist. In other words, the
probable cause that FISA requires is probably
higher than what is required under the Fourth Amendment.
Page 198
Solves 4th Amendment Rights
Congress solves Fourth Amendment
Fenske 8 --- J.D. Candidate (Dan, “ALL ENEMIES, FOREIGN AND DOMESTIC: ERASING THE DISTINCTION BETWEEN
FOREIGN AND DOMESTIC INTELLIGENCE GATHERING UNDER THE FOURTH AMENDMENT”, 102 Nw. U.L. Rev. 343,
Lexis)//trepka
Before proceeding further, it is important to note what this Comment does not do. Although this Comment's discussion of the efficacy of
warrants and its ultimate finding that warrants should not be required for domestic intelligence surveillance could be used to justify
foreign intelligence [*348] gathering - to buttress the legality of the National Security Agency (NSA) domestic spying program
authorized by President Bush after 9/11 - this Comment in fact cuts the other way. While
the rationales advanced in this
piece support finding that the NSA program does not violate the Fourth Amendment, this
Comment recognizes that Congress has the authority to regulate the intelligence-
gathering apparatus of the executive branch ; n19 thus, the NSA program was illegal at its outset for the
simple reason that it violated FISA. In arguing that the warrant requirement is an ineffective way to police intelligence activities and that
it stifles legitimate intelligence gathering, this Comment proceeds in three parts. Part I discusses the history of the Warrant Clause of the
Fourth Amendment, the case law surrounding the imposition of the warrant supported by probable cause "presumption," the exceptions
to this presumption, and the maintenance of the warrant requirement for domestic intelligence searches. In particular, it focuses on the
Court's atextual - although somewhat justified - imposition of the warrant requirement in the context of criminal investigations, and its
unwise extension of that requirement to the national security arena. Part II analyzes several of the most prominent rationales for the
warrant requirement in general, and specifically in the national security context. It argues that none of these rationales are sufficient to
justify the warrant requirement for domestic intelligence searches. Finally, Part III argues that solutions other than the warrant
requirement - some judicial, some legislative - can better protect Fourth Amendment interests. This Part discusses a few proposals that,
due to the warrant presumption, have not received the attention they deserve. Ultimately, this Comment concludes that the Supreme
Court should discard the warrant requirement for searches conducted in order to uncover information to prevent future domestic
terrorist attacks. None of the usual arguments for why a warrant should be required justifies the warrant requirement in the domestic
legislative and judicial means that
would adequately protect the Fourth Amendment's values . In light of these alternatives, the warrant
intelligence-gathering context. Moreover, there
are a number of
other
requirement is unnecessary and impedes the government's access to the information it needs to prevent terrorist attacks.
Congress is sufficient to create a spillover of Fourth Amendment values
Fenske 8 --- J.D. Candidate (Dan, “ALL ENEMIES, FOREIGN AND DOMESTIC: ERASING THE DISTINCTION BETWEEN
FOREIGN AND DOMESTIC INTELLIGENCE GATHERING UNDER THE FOURTH AMENDMENT”, 102 Nw. U.L. Rev. 343,
Lexis)//trepka
III.
Better Solutions to Intelligence-Gathering Abuse The Supreme Court, for better or
worse, is
the primary enforcer of the Fourth Amendment. Although this is understandable, given the Court's unique
position and ability to check majoritarian excess that can lead to violations of civil liberties, it is unfortunate because it has
created in Congress apathy toward its obligation to participate in the protection of Fourth
Amendment values . n175 This failure on the part of Congress to properly assert itself in
the enforcement of constitutional rights need not continue . The enactment of FISA is a case in
point. Given the widespread acknowledgement that the Constitution does not require that the President conduct foreign intelligence
[*375] surveillance in the United States pursuant to a warrant, n176 Congress - properly exercising its own powers in the foreign
intelligence context - limited the President's authority in order to curb perceived intelligence-gathering
abuse. n177 FISA requires the Executive to obtain a court order for surveillance, though such court orders are not Fourth Amendment
warrants. n178 However, Congress did not hamstring the Executive by requiring court approval
before the commencement of any and all electronic surveillance. In certain emergency situations, the Attorney
General can authorize electronic surveillance for up to seventy-two hours before seeking court approval. n179 This is a practical
recognition that intelligence gathering frequently requires the relaxation of the warrant requirement, but it still ensures that continued
surveillance will be subject to congressional limitations. n180 Congress,
then, has significant authority in the
foreign intelligence arena to create such pragmatic solutions. There is no reason to assume
Page 199
that it could not enact legislation like FISA that is applicable to domestic intelligence . Moreover,
even in the absence of congressional action, the Court could impose solutions by tailoring existing doctrines. The remainder of this
Part discusses examples of possible legislative and judicial solutions .
Congress solves regulation of executive
Fenske 8 --- J.D. Candidate (Dan, “ALL ENEMIES, FOREIGN AND DOMESTIC: ERASING THE DISTINCTION BETWEEN
FOREIGN AND DOMESTIC INTELLIGENCE GATHERING UNDER THE FOURTH AMENDMENT”, 102 Nw. U.L. Rev. 343,
Lexis)//trepka
Further, the exclusionary rule mandates the exclusion of evidence seized unconstitutionally. Were the proposal advanced in this
Comment to be adopted, however, evidence seized pursuant to a warrantless intelligence search would be constitutional - provided the
search is reasonable. Thus, the exclusionary rule as currently understood would not require the exclusion of evidence seized pursuant to
a warrantless intelligence-gathering search. However, if
Congress fails to enact meaningful legislation
to regulate the Executive's surveillance power, the Court should consider mandating the exclusion
of the fruits of a warrantless domestic intelligence search in a prosecution for crimes unrelated to
national security as a prophylactic measure to protect Fourth Amendment rights. In short, banning
the use of such evidence removes any incentive for the executive branch to use its domestic intelligence powers to circumvent the normal
limits on its criminal investigatory power. Congress is the body most appropriate to enact such a prohibition. However, should Congress
prove unwilling to do so, and should it become clear that the Executive is indeed abusing its domestic intelligence power to further
everyday criminal law enforcement, the Supreme Court should consider extending the exclusionary rule or "minimization principle" to
combat such abuse.
Oversight solves liberties
Harvard Law Review 8 (“SHIFTING THE FISA PARADIGM: PROTECTING CIVIL LIBERTIES BY ELIMINATING EXANTE
JUDICIAL APPROVAL”, 121 Harv. L. Rev. 2200, Lexis)//trepka
III. The Primacy of Political Checks In
light of the limitations of ex ante judicial approval to protect
civil liberties, it is necessary to consider an alternative approach . The most attractive solution is a
framework that relies primarily on political checks. Such a system could force public consideration of the difficult weighing of liberty and
security interests and ensure meaningful oversight of the government's conduct of surveillance. n89 Ultimately, a
combination of
the two bills that the two houses of Congress have passed, if modified in several respects, would do
the best job of protecting liberties while enabling efficient and effective surveillance .
Whereas the Senate bill is preferable for drawing back the role of the judiciary in ex ante approval, the House bill offers a host of
potentially powerful oversight mechanisms that are necessary to protect civil liberties .
Congressional oversight only facilitates broader privacy violations
Ford 7 --- Assistant Professor of Law @ US Military Academy (Christopher, “Intelligence Demands in a Democratic
State: Congressional Intelligence Oversight”, 81 Tul. L. Rev. 721, Lexis)//trepka
This tension is perhaps particularly acute in the realm of intelligence operations and oversight where these powers are not expressly
side believes their uninhibited participation is critical for
national security. n16 This Article does not, however, seek to trade in a discussion of the legality of recent practices, but rather
examines this dynamic relationship and, specifically, Congress's role in facilitating both legal and aggressive
intelligence operations. All too often it seems the Executive has viewed Congress as an unwanted partner - interfering with
delegated by the Constitution and each
executive powers and meddling in affairs best left to the professionals in the various agencies within the United States Intelligence
Community (Intelligence Community or Community). Congress
has historically acquiesced, thus largely allowing
the Executive to conduct intelligence operations without oversight. n17 Congress has rejected this historical
generalization twice in the last fifty years: first, and most significantly, in response to the intelligence activities relating to Watergate n18
and the Vietnam War; n19 and then again, [*725] in the late 1980s, in response to the Iran-Contra Affair and other actions involving the
Intelligence Community. n20
Page 200
Solves 14th Amendment
Congress solves Fourteenth Amendment better --- the aff violates the
constitution
Mendenhall 15 --- staff attorney to Chief Justice Roy S. Moore of the Supreme Court of Alabama, adjunct
professor at Faulkner University (Allen, “Is The Fourteenth Amendment Good?”, https://mises.org/library/fourteenthamendment-good)//trepka
Ceding power to federal judges does not predispose them to liberty. Because
Section Five of the Fourteenth
Amendment permits Congress to pass amendments or enact laws dealing with state infringements
on individual liberty, it isn't necessary or constitutionally sound for the federal
judiciary to assume that role. Members of Congress, unlike federal judges who enjoy life tenure, are
accountable to the voters in their states and are thus more likely to suffer from their infidelity to the
Constitution.
Constitution is a d-rule
Stephen L. Carter, professor of law at Yale University, 1987, Brigham Young University Law Review, 1987
BYU L. Rev. 719, HeinOnline, p. 750-751
The problem with this use of our burgeoning public policy science, an inevitable one in an area of theory driven by instrumental
rationality, is that the law itself is stripped of the aura of uniqueness which is assigned to it in liberal theory. The law becomes all too
mutable, and is left as no more than one of the means that must be tested against its efficacy in achieving the desired end. The
Constitution, which is after all a species of law, is thus quite naturally viewed as a political impediment to policy, a barrier that must be
adjusted, through interpretation or amendment, more often than preservation of government under that Constitution is viewed as a
desirable policy in itself. In this the modern student of policy is like the modern moral philosopher – and like a good number of
constitutional theorists as well – in denigrating the value of preserving any particular process and exalting the desirable result. But
constitutionalism assigns enormous importance to process, and consequently assigns costs, albeit
perhaps intangible ones, to violating the constitutional process. For the constitutionalist , as for classical
liberal democratic theory, the autonomy of the people themselves, not the achievement of some wellintentioned government policy, is the ultimate end for which the government exists. As a
consequences, no violation of the means the people have approved for pursuit of policy—here, the
means embodied in the structural provisions of the Constitution, can be justified through reference
to the policy itself as the end.
Page 201
Solves Deontology
Failure to engage in comparative institutional analysis means vote neg on
presumption – they make change less likely to occur
Heminway, 05 (Joan, professor of law at the University of Tennessee, 10 Fordham J. Corp. & Fin. L. 225,
lexis)
This article offers a model for comparative institutional choice specifically for use in the context of federal corporate governance reforms.
It also, however, constitutes part of the larger academic movement advocating comparative institutional analysis.
Comparative institutional analysis is critically important to the work of scholars and other proponents of law reform.
These rule proponents should not suggest changes in legal rules without also suggesting the vehicle for the suggested reforms. The
determination of the appropriate rulemaking body should be accomplished by employing some rigorous form of comparative
institutional analysis. In this regard, the framework included in this article is intended to endorse in full the views of Professor Neil
Komesar when he says: [*384] Unless we do better with the difficult issues of institutional choice, any reforms, changes
and proposals will remain illusory or cosmetic. We will continue to cycle through the same proposals with
the same arguments. Today's policy will always have feet of clay and be replaced by yesterday's rejected
panacea, which somehow reappears (without blemishes) as tomorrow's solution. Attempts to fashion
proposals and programs cannot stop until we fully understand institutional choice. That understanding will be
long in coming and is more likely to occur if judges, lawyers and law reformers seriously struggle with the subject as
they make their decisions and proposals. It is that struggle that I hope for. I want those who make or seek to change law
to seriously confront and address institutional choice and comparison . I recognize that, to do so, they will often have to
rely on intuition and guesses. It is the responsibility of legal academics to provide deeper understanding of these
central issues and, therefore, to improve the ability of those who struggle with these decisions. 581
Seriously none of their stuff assumes the CP—even deontologists agree that
it’s a bad idea to choose an inefficient method
Finnish, 1980
John Finnis, deontologist, teaches jurisprudence and constitutional Law. He has been Professor of Law &
Legal Philosophy since 1989,1980, Natural Law and Natural Rights, pg. 111-2
The sixth requirement has obvious connections with the fifth, but introduces a new range of problems for practical reason,
problems which go to the heart of ‘morality’. For this is the requirement that one bring about good in the world (in one’s own
life and the lives of others) by actions that are efficient for their (reasonable) purpose (s). One must not waste one’s
opportunities by using inefficient methods. One’s actions should be judged by their effectiveness, by their fitness
for their purpose, by their utility, their consequences… There is a wide range of contexts in which it is possible and
only reasonable to calculate, measure, compare, weigh, and assess the consequences of alternative decisions .
Where a choice must be made it is reasonable to prefer human good to the good of animals. Where a choice must be made it is
reasonable to prefer basic human goods (such as life) to merely instrumental goods (such as property). Where damage is
inevitable, it is reasonable to prefer stunning to wounding, wounding to maiming, maiming to death: i.e. lesser rather than
greater damage to one-and-the-same basic good in one-and-the-same instantiation. Where one way of participating in a
human good includes both all the good aspects and effects of its alternative, and more, it is reasonable to prefer
that way: a remedy that both relieves pain and heals is to be preferred to the one that merely relieves pain .
Where a person or a society has created a personal or social hierarchy of practical norms and orientations, through reasonable choice of
commitments, one can in many cases reasonably measure the benefits and disadvantages of alternatives . (Consider a
man who ha decided to become a scholar, or a society that has decided to go to war.) Where one ~is considering objects or activities in
which there is reasonably a market, the market provides a common denominator (currency) and enables a comparison to be made of
prices, costs, and profits. Where there are alternative techniques or facilities for achieving definite, objectives, cost— benefit analysis will
make possible a certain range of reasonable comparisons between techniques or facilities. Over a wide range of preferences and wants, it
is reasonable for an individual or society to seek o maximize the satisfaction of those preferences or wants.
Page 202
Solves Intelligence Framework
Congressional constraints set the framework for intelligence gathering
Steinberg AND Estrin 14 --- Dean of Maxwell School of Citizenship and Public Affairs at Syracuse
University AND Postdoctoral Associate at Yale (James and Miriam, “Harmonizing Policy and Principle: A Hybrid Model for
Counterterrorism”, 7 J. Nat'l Security L. & Pol'y 161, Lexis)//trepka
[*161] INTRODUCTION In the ongoing and evolving response to terrorism, the United States has had to confront a
threat that straddles the line between armed conflict and criminal enterprise. Like traditional warfare, the United
States confronts adversaries with the avowed intention to harm the United States as a political entity and the capacity to inflict massive
casualties and extensive economic and physical destruction. But unlike traditional armed conflict, the adversary represents no state, and
its members wear no uniform announcing their membership in a hostile organization. In this respect, these organizations bear
important similarities to criminal organizations. Twelve years have passed since the terrorist attacks on September 11. What started out
as a concentrated response against one cohesive terrorist organization, al Qaeda, with a concentrated base in Afghanistan and Pakistan,
began to spread as al Qaeda-supported affiliate organizations sprang up in the Arabian Peninsula, Somalia, and the Maghreb. But as
U.S. counterterrorism efforts began to defeat al Qaeda's core -- killing its leader Osama bin-Laden and many in
his senior leadership ranks -- the more diffuse affiliate groups continued to plot attacks aimed at the American homeland.
Sometimes these affiliates planned attacks in coordination with the central al Qaeda organization, as the United States discovered when
it intercepted communications between the leader of al Qaeda's Yemen-based offshoot and Osama bin Laden's successor, Ayman alZawahri, closing nineteen embassies across the Middle East and North Africa as a precaution against. n1 At other times, these terrorist
groups have seemingly acted alone to strike at American and Western targets in their own neighborhoods, with localized attacks against
the U.S. consulate in Benghazi and the BP oil facility in Algeria. Through
Internet magazines and chat rooms, al Qaeda
affiliates could radicalize individuals residing in America, and give them basic training to carry out small-scale
attacks from their home base in American [*162] cities. n2 To deal with these unconventional threats, policymakers have employed a
variety of sometimes controversial tools: some drawn from traditional warfare, some from crime fighting, and other, novel techniques
developed to address this new kind of threat. These latter include indefinite detention without prosecution, "enhanced" interrogation,
rendition to third countries, military tribunals, and targeted killing that successive U.S. administrations have sought to justify under
domestic and international law. The variety of tools, and the choice between them, has been primarily driven by the varying objectives
entailed in the conflict -- to punish bad actors, but more importantly to prevent future acts of terrorism by incapacitating the enemy,
deterring others from joining their ranks and pursuing future attacks, and gathering intelligence to disrupt terrorist plots and dismantle
terrorist networks. In practice, which
tools are used and when is shaped not just by the exigencies of the threat, but also
by constraints imposed by the Congress and the courts, as well as the executive branch's own evolving views
on domestic and international law. These constraints are frequently driven by factors, including political calculation, that are not directly
related to immediate counterterrorism objectives. The result is an operating environment in which the choice of tool is imperfectly
related to the objective, and can lead to unwanted and undesirable outcomes -- for example, a policy environment that leads decisionmakers to favor killing rather than capturing the adversary for reasons unrelated to the safety of U.S. personnel, or that forces the
detention of adversaries outside the United States rather than bringing them to the United States, which can strain U.S. foreign
relations. Even after twelve years, only recently has there been an effort to develop a written framework to guide the U.S. response.
President Obama recently announced the existence of classified Presidential Policy Guidance to govern use-of-force decisions inside the
executive branch. n3 Even now, the public details on what rules would control decisions to detain or target remain slim, and the
language of existing guidance seems to leave much room for flexible and permissive
interpretation. This Article explores the tension between the policy objectives of this conflict (deterrence,
incapacitation, and intelligence gathering ) and the traditional legal frameworks used to justify
them (the law of war and the criminal justice model). Part I examines the rationale for these policy tools and the limitations of each of
the traditional frameworks for this conflict, looking at where historical cases and American principles have drawn the line between
security and [*163] liberty. Part II looks at the ways that, in this conflict, all three branches have worked at cross-purposes and deviated
from what, from a policy perspective, would seem to be a more appropriate legal framework. Finally, Part III lays out the basic
components of a hybrid model, in a way that allows for effective counterterrorism policy without sacrificing legality and principle.
Page 203
Solves Online Privacy/Internet Freedom
Congressional action solves broader online communications
Semitsu 11 --- J.D., University of San Diego School of Law (Junichi, “ From Facebook to Mug Shot: How the Dearth of
Social Networking Privacy Rights Revolutionized Online Government Surveillance”,
http://poseidon01.ssrn.com/delivery.php?ID=18807008603110407107308900309410911000401109105206106101008612612602707
008600610711903701112506311600009810303007008009703011002007500703307200509411508512107902410300606503406700
0089064064116069086091118109096100123023124022127065104095103114020073&EXT=pdf&TYPE=2)//trepka
Even though Facebook could do lots to improve its users‘ consumer privacy rights, the
issues of privacy from
government surveillance originate with the government, not Facebook. Regardless of what social networking will
look like in 2024 or whether our clones will have new ways to tap into new networks, one fact seems inevitable: in the digital world,
social networkers will still store, access, and disseminate personal information through a third party. A digital community on the
magnitude of Facebook will likely depend on some entity that functions as the server or hub for the content. While peer-topeer networks
suggest the possibility of direct communications without third party conduits, the very nature of the Internet makes it difficult to
imagine a social network emerging in isolation without a person or entity hosting or facilitating the exchange. The
resulting
unreasonable expectation of privacy will thus follow those social networkers wherever they go unless
there is congressional intervention or a judicial shift in how the Fourth Amendment is applied to online
communications.
Congressional statute is key to protect online privacy rights
Semitsu 11 --- J.D., University of San Diego School of Law (Junichi, “ From Facebook to Mug Shot: How the Dearth of
Social Networking Privacy Rights Revolutionized Online Government Surveillance”,
http://poseidon01.ssrn.com/delivery.php?ID=18807008603110407107308900309410911000401109105206106101008612612602707
008600610711903701112506311600009810303007008009703011002007500703307200509411508512107902410300606503406700
0089064064116069086091118109096100123023124022127065104095103114020073&EXT=pdf&TYPE=2)//trepka
D. Misplaced Trust Doctrine Another important spinoff of the plain view rule is the misplaced
trust doctrine, which may
apply when a Facebook user voluntarily discloses information to someone who turns out to be an
undercover officer.143 Under this doctrine, a person who mistakenly places her trust in someone who
turns out to be an informant or government agent does not maintain any privacy rights
under the Fourth Amendment.144 The Court has repeatedly refused to adopt the rule that ―the
Fourth Amendment protects a wrongdoer‘s misplaced belief that a person to whom he voluntarily confides his
wrongdoing will not reveal it.‖ 145 Thus, the government has the authority to use undercover operatives to
prevent crime.146 More specifically, the Ninth Circuit has held that government officials must be allowed to take on reasonable
false identities in order to be more convincing in their undercover operations.147 Accordingly, undercover agents can use deception to
procure consent to a search. In
Hoffa v. United States, for example, the Court noted the possibility that
someone will be observed by undercover officers is ―the kind of risk we necessarily assume‖ and ― inherent in
the conditions of human society.‖ 148 While some questioned Hoffa‘s validity after Katz, the Court in United States v.
White reaffirmed the rule that a person does not have any ―justifiable expectation of privacy‖
when making incriminating statements to an informer.149 No federal statute or court has yet had
occasion to draw any boundaries or rules regulating undercover policing on the Internet. Thus, suppose
that Semion Mogilevich, who is on the FBI‘s list of Top Ten Most Wanted Fugitives, has a Facebook page.150 Would a government agent
be forbidden from creating a Facebook account in Semion‘s mother‘s name, uploading an actual photo of her, and naively hoping that he
might divulge his whereabouts? While virtually every government agent to whom I asked this question concluded that this would be
―going too far,‖ neither the agents nor I have found any federal precedent restricting such a deceptive practice. Thus, only state law or
a
congressional statute can protect private conversations from being surreptitiously
documented. For example, the Massachusetts Supreme Court interpreted Article 14 of the state‘s Declaration of Rights to mean that
its citizens can reasonably expect that their private conversations held in private homes are not being electronically transmitted or
recorded by undercover government agents.151
Page 204
Only statutory revisions protect internet freedom, privacy, and prevent crime
--- here’s 6 recommendations
Semitsu 11 --- J.D., University of San Diego School of Law (Junichi, “ From Facebook to Mug Shot: How the Dearth of
Social Networking Privacy Rights Revolutionized Online Government Surveillance”,
http://poseidon01.ssrn.com/delivery.php?ID=18807008603110407107308900309410911000401109105206106101008612612602707
008600610711903701112506311600009810303007008009703011002007500703307200509411508512107902410300606503406700
0089064064116069086091118109096100123023124022127065104095103114020073&EXT=pdf&TYPE=2)//trepka
While the stifling of Facebook activity may be inconsequential, the need for a statutory revision is
paramount. At stake is nothing less than the potential for the Internet to be a utopian marketplace of
ideas and a global community that connects people in an otherwise-isolated digital world. As for statutory revisions, I
propose the SCA be amended to require that any compelled disclosure of electronic information, including content on Facebook, require
full warrant protection. This would require the government to demonstrate probable cause to a neutral magistrate. If, however, the
government will still be allowed to conduct such searches with an administrative subpoena, the ECPA should require that subpoenas
provide meaningful notice to the user to bring the privacy laws closer to the warrantless searches allowed in other contexts. To close
these gaping holes in the current privacy laws, Congress must implement several changes. First, the
Stored Communications
Act needs to be revised to make clear that all forms of content that a person uploads to or
disseminates through Facebook are covered. Given that Facebook reveals ―content‖ that may not neatly fit into the
definition of ―electronic communications,‖ the statute should leave no doubt that all activity on Facebook—including wall postings,
photo-sharing, or event-creating—will be protected. Moreover, in light of all the data that Facebook users provide when joining the site,
the specific subscriber information or ―non-content‖ that can be disclosed without any judicial oversight should also be delineated.
Second, the
SCA must be amended to require the government to obtain a Section 2703(d) order for all
remote computing services (in addition to electronic communications services). Thus, regardless of whether
Facebook is serving as ―storage‖ or as a facilitator of messages, judicial
supervision will be required if any
content stored on the site will be disclosed to the government. Third, the SCA should also impose a
court-order provision on non-governmental entities that compel production of the contents of
electronic communications under § 2703.300 Without this judicial oversight, the voluntary disclosure doctrine would
allow private entities to easily compel such production and hand it over to the government. Moreover, such an amendment would
SCA should state that the exclusionary rule
will apply to evidence obtained in violation of any of these statutory provisions, even if the evidence was
eliminate the conflicting interpretations of the SCA. Fourth, the
not obtained pursuant to a government search under the Fourth Amendment. Without this last component, the SCA, in the criminal
context, will not extend any privacy protections beyond what the Fourth Amendment already guarantees. Fifth, to ensure that
administrative subpoenas do not lead to unjustified intrusions of privacy on the Internet, federal law should ensure judicial safeguards
in the form of a neutral magistrate who protects against over breadth and harassment and requires an explanation as to why a subpoena
is necessary. Moreover, if a subpoena will not provide a user with notice and the chance to file a motion to quash, federal laws should
limit the issuance of subpoenas to life-threatening crimes in which time is of the essence. Sixth, Congress
should mandate
encryption for those government and non-government entities that transmit sensitive or private
information through the Internet. Since not all companies have the resources to do this, the government should
invest in more advanced encryption technology and other cyber-security measures to ensure the
highest safety of sensitive and private content transmitted through the Internet.301 Under the existing
Third Party Doctrine , encryption would increase users‘ expectation of privacy
because Facebook employees would not be able to view all user content. While law enforcement agencies
might argue that this will frustrate efforts to crack down on cybercrime (and all other crime), such encryption measures will
also minimize the crime or cyberterrorism that results when others with more nefarious motives gain
access to such information.
Page 205
Solves Perception --- Generic
CP solves accountability
Harvard Law Review 8 (“SHIFTING THE FISA PARADIGM: PROTECTING CIVIL LIBERTIES BY ELIMINATING EXANTE
JUDICIAL APPROVAL”, 121 Harv. L. Rev. 2200, Lexis)//trepka
B. Using Political Safeguards in Practice In
giving shape to a statutory framework that provides a set of
political checks and balances, it is useful to delineate the various interests that ought to be
protected. First, privacy should be safeguarded to the extent possible. Second, there is independent and
functional value in encouraging public debate and conveying to the public a sense of
responsibility for deciding the difficult issues at play. Third, there must be protection against unlawful
executive action in order to give effect to Congress's intent to "assure the public that it could engage in constitutionally protected
political dissent without fear of surveillance, thus facilitating the exercise of individual liberty that is fundamental to American society."
n98
Public nature guarantees perception of credibility
Sugiyama and Perry 6 --- J.D.s from UMich Law School (Tara and Marisa, “THE NSA DOMESTIC SURVEILLANCE
PROGRAM: AN ANALYSIS OF CONGRESSIONAL OVERSIGHT DURING AN ERA OF ONE-PARTY RULE”, 40 U. Mich. J.L. Reform
149, Lexis)//trepka
Classified programs pose peculiar issues with respect to oversight. Most traditional
methods of formal oversight -
hearings , investigations , and adjusting appropriations - are successful because of their
public nature , particularly when Congress uses them in response to a fire alarm. n263 In the case of the NSA program, the
system broke down both before and after the media sounded the fire alarm. Congressional leaders of both parties failed to object in any
meaningful way when the administration informed them of the program in 2001. n264 The administration also alerted the two presiding
judges of the FISA court to the existence of the program, but the judges failed to take any action or consult with their colleagues. n265
Subsequent efforts at oversight have been quashed by the majority, n266 and debate over the surveillance program is slowly dying down.
Only effective oversight solves international credibility //AT: Hurts National
Security
Kitrosser 8 --- Associate Professor @ University of Minnesota Law School (Heidi, “THE DOMESTIC
COMMANDER IN CHIEF: CONGRESSIONAL OVERSIGHT OF NATIONAL SECURITY ACTIVITIES: IMPROVING INFORMATION
FUNNELS”, 29 Cardozo L. Rev. 1049, Lexis)//trepka
ii. Arguments Favoring Disclosure Arguments also can be advanced to the effect that secrecy often is at best unnecessary and at worst
harmful to national security. To begin with, there is good reason to question the conventional assumption that
there are volumes of information of which it would be dangerous for enemies to learn. Players from across the political
spectrum long have suggested that much of the information classified in the United States should
not be classified. n99 In one striking example, Erwin N. Griswold, the former solicitor general of the
deeply
United States who fought on behalf of the Nixon administration to restrain publication of the classified Pentagon Papers,
acknowledged years after the litigation: "I have never seen any trace of a threat to the national security
from the [Papers'] publication. Indeed, I have never seen it even suggested that there was such an actual threat." n100 In the same
discussion, Griswold deemed it "apparent to any
person who has considerable experience with classified
material that there is massive overclassification and that the principal concern of the
classifiers is not with national security , but rather with governmental embarrassment
of one sort or another." n101 There are persuasive arguments not only that national security based secrecy needs are
dramatically overstated , but that excessive secrecy hurts national security by encouraging
poorly informed and under-vetted decision-making and diminishing the United States'
Page 206
domestic and international credibility . As I have noted elsewhere: Countless scholars, journalists, legislators
and executive branch officials have noted secrecy's
judgment-clouding and security-hindering effects in
relation to historic and current events . For examples of such criticism, one needs to look no further
than commentary on the 2003 invasion of Iraq . It has been argued repeatedly that the reticence of the press and of Congress to ask
[*1067] difficult questions prior to the invasion of Iraq combined with the Bush administration's penchant for secrecy created an insular
White House environment in which debate was stifled, " groupthink"
flourished , and questionable data on weapons of
mass destruction were embraced while predictions of a peaceful, post-invasion Iraq similarly went unquestioned. ... . Similar
concerns have been raised about the negative impact of secrecy on homeland security , both prior to,
and in the wake of, 9-11. ... . Similar analyses about more distant historical events [including the Vietnam War and the Cold War]
abound. ... . [There also is a risk] that secrecy not only will be misused by well-meaning yet overzealous
officials, but that it will intentionally be misused by those set on manipulating public debate
toward their own ends. Indeed, McCarthy's exploitation of government secrecy calls to mind Vice President Cheney's recent
attempts to perpetuate the theory of a link between Al Qaeda and Saddam Hussein through vague public allusions to evidence in the
administration's possession of which others, including the 9-11 Commission, supposedly were not aware. Similarly, concerns long have
been raised about executive branch "spinning of information" through selective declassification or leakage of otherwise classified
information. n102 Such
points are manifest in responses to the administration's arguments for
keeping the NSA surveillance program largely secret. For one thing, critics charge that no convincing explanation has
been offered as to why it would have endangered national security to reveal the program's bare existence to the public, let alone to the
congressional intelligence committees. n103 And while public details of the program remain too scarce as of mid-2007 to evaluate its
effectiveness, efficacy concerns intrinsically are raised by the insular nature of the decision-making process that generated the program.
n104 These efficacy
concerns are exacerbated by post-revelation disclosures that raise questions
about the program's reach, the adequacy of its oversight and mistakes that [*1068] might have occurred in
administering it. n105
Oversight prevents unchecked surveillance --- creates moral authority aborad
Heinrich 6/10/15 --- Office of the Senator (Martin, “Heinrich, Murphy, Schatz Unveil Forward-Looking, Pragmatic Foreign
Policy Principles”, US Official News, Lexis)//trepka
5. Covert
actions like unchecked domestic surveillance or large scale overseas CIA lethal operations
must be constrained . The dramatic expansion of our intelligence apparatus post-9/11,
which operates largely unseen and unchecked, requires greater oversight
and restraint. Decisions
about government surveillance , lethal drone strikes overseas, and interrogation techniques must be made in
the light of day and subject to greater congressional oversight . We can start by consolidating
authority for offensive counterterrorism operations at the Department of Defense instead of the CIA, which has more limited
congressional oversight. We
can also ensure that Congress has greater oversight of "crossover" operations
that overlap committee jurisdictions by requiring briefings on operations to include members
across all relevant committees. 6. We must practice what we preach regarding civil and human
rights, and defend our values internationally. America's reputation as a beacon of freedom and opportunity is a powerful asset - we
must continue to honor our bedrock values of individual liberty and equal treatment under the law. Inadequate respect for
civil rights domestically robs from America the moral authority to root out human rights abuses,
corruption, and violence
abroad . Actions abroad that are illegal under U.S. law and out of step with American values, like torture,
must be absolutely prohibited. Human rights and gender equality should not be viewed as secondary to security issues, but appropriately
recognized as essential to long-term global peace and stability. We can and should do more to support those who are working to create
cultures of tolerance.
Page 207
Solves Perception --- I-Law
Only Congress solves international perception- Court looks too divided
Interview of Noah Feldman- CFR Adjunct Senior Fellow- October 10, 2008, Interviewer: Robert
McMahon, Deputy Editor, CFR.org, The Supreme Court's Mixed Signals on International Law,
http://www.cfr.org/publication/17509/supreme_courts_mixed_signals_on_international_law.html
The U.S. Supreme Court ruled in March 2008 (Medellin v. Texas) that U.S. states were not bound by International
Court of Justice judgment on staying the execution of a Mexican national, running counter to Bush administration
wishes. In a separate judgment (PDF) (Boumediene v. Bush) in June 2008, the court gave Guantanamo Bay detainees the
right to have federal judges review the reason for their detention. That also challenged the White House, this time on its policy of
detaining non-enemy combatants. CFR Adjunct Senior Fellow Noah Feldman says the rulings could send confusing signals to the
rest of the world about U.S. compliance with international obligations. On the death penalty case, he says, the most
important foreign policy consequence is that "legal institutions of the United States including the Supreme Court are very nervous about submitting the United States to the judgment
of these international bodies." You wrote in the New York Times Magazine that the U.S. Supreme Court's landmark rulings last term on the Medellin death penalty case and the
Guantanamo Bay detainee policy were essentially about what sort of constitution we have, either outward facing or inward looking. What does it mean for U.S. foreign policy that
the court seems to be divided down the middle on that question? It means that we're communicating a kind of
schizophrenic vision to those who are watching closely abroad. That's not unheard of. Sometimes
the president will be of one party and Congress of a different party and there are differences in the foreign policy that we're
projecting as a result of that division. But it's starker in the case of legal materials because the Supreme Court really
does have the final say. We don't exactly know in any given situation what Justice [Anthony] Kennedy, who is the swing vote right now, is planning on doing.
Another thing that it communicates to the rest of the world is that this next election is enormously important because, depending on who is elected and which justices they name, we'll
the death penalty ruling, it calls into
question something like seventy other U.S. treaties of a similar nature. Going forward, does this mean
Congress has to weigh in explicitly on these? Yes, with respect to the series of agreements, many of
them bilateral but some of them multilateral. Potentially there are even more than those seventy if
one extrapolates. In any case where the treaty is arguably ambiguous with respect to whether it
should be treated as law in a U.S. court, it is now fairly clear that it will not be treated as law in the
U.S. courts unless Congress weighs in. That means that if you're another country trying to figure out what
we're going to do, your safest bet is to assume we're not going to apply that treaty in our own courts
unless Congress makes a special determination to that effect.
probably have a much more coherent picture in the next five years than we do today. So taking one of the rulings,
The plan is perceived worse internationally – speaking with multiple voices in
foreign policy kills our credibility
Wilkinson, Circuit Judge on the U.S. Court of Appeals for the 4th Circuit, former Law Professor at the
University of Virginia, & former Deputy Assistant Attorney General of the U.S. Department of Justice Civil
Rights Division, 4 (The Honarable J. Harvie, “DEBATE: THE USE OF INTERNATIONAL LAW IN
JUDICIAL DECISIONS,” Harvard Journal of Law & Public Policy, Spring, 27 Harv. J.L. & Pub. Pol'y 423)
So judges must not wade, sua sponte, into international law's deep blue sea. Rather, we ought to ask: How does American law make foreign or international standards relevant? Why
it is important that the United States speak with one, not multiple, voices in
foreign affairs. The Constitution is explicit on this: Article I, Section 10 says that "no State shall enter into any Treaty [or] Alliance" with a foreign power. n9 The
Constitution leaves the conduct of foreign and military affairs largely to the political branches -- not
the courts. The diplomatic credibility of the United States would plummet if the actions and
pronouncements of the executive and legislative branches in foreign and military matters were
later repudiated and contradicted by judicial decree. Where courts go too far, in my view, is where they rely upon international (and mostly
should we ask this threshold question? Because
European) precedents when resolving important and contentious social issues. This "internationalization" of the Constitution on domestic social issues raises three types of problems.
Page 208
Solves Prez Powers
Page 209
Increases Prez Powers
Congress solves prez powers better
Plummer 6 --- J.D., Mississippi College School of Law, law clerk for Barnes of the Mississippi Court of
Appeals (Brooke, “Domestic Spying: A Necessity in a Post-9/11 America or an Abuse of Presidential Power?”, Mississippi College Law
Review, Lexis)//trepka
C. Presidential Inherent Authority The seminal case on the subject of inherent presidential authority is that of Youngstown Sheet & Tube
Co. v. Sawyer, n14 which revolved around whether it was within President Truman's constitutional authority to seize possession and
operation of the nation's steel mills. President Truman offered as justification for his actions the need to prevent the "national
catastrophe" that would have resulted from steel production halting in the United States. n15 The case is famous not for its majority
opinion, which found that President Truman had acted outside of the power conferred upon him by the Constitution, but for Justice
Jackson's concurrence, which delineated the following three zones of presidential power: n16 1.
When the President acts
pursuant to an express or implied authorization of Congress, his authority is at its
maximum, for it includes all that he possesses in his own right plus all that Congress can delegate. In these circumstances, and
in these only, may he be said (for what it may be worth), to personify the federal sovereignty. If his act is held unconstitutional under
these circumstances, it usually means that the Federal Government as an undivided whole lacks power.
A seizure executed by
the President pursuant to an Act of Congress would be supported by the strongest
presumptions and the widest latitude of judicial interpretation, and the burden of persuasion
would rest heavily upon any who might attack it. n17 ... . 2. When the President acts in absence of either a
congressional grant or denial of authority, he can only rely upon his [*307] own independent
powers , but there is a zone of twilight in which he and Congress may have concurrent authority, or in which its distribution is
uncertain. Therefore, congressional inertia, indifference, or quiescence may sometimes, at least as a practical matter,
enable, if not invite, measures on independent presidential responsibility. In this area, any actual test of
power is likely to depend on imperatives of events and contemporary imponderables rather than on abstract theories of law. n18 ... . 3.
When the President takes measure incompatible with the express or implied will of Congress,
his power is at its lowest ebb , for then he can rely only upon his own constitutional powers minus any constitutional
powers of Congress over the matter. Courts can sustain exclusive Presidential control in such a case
only [by] disabling the Congress from acting upon the subject. Presidential claim to a power at once so
conclusive and preclusive must be scrutinized with caution, for what is at stake is the equilibrium established by our constitutional
system. n19
Page 210
Decreases Prez Powers
Congressional constraints undermine prez powers
Harrington 7 --- J.D., Albany Law School of Union University (Alexandra, “PRESIDENTIAL POWERS REVISITED:
AN ANALYSIS OF THE CONSTITUTIONAL POWERS OF THE EXECUTIVE AND LEGISLATIVE BRANCHES OVER THE
REORGANIZATION AND CONDUCT OF THE EXECUTIVE BRANCH”, 44 Willamette L. Rev. 63, Lexis)//trepka
B. Patterns of Congressional Usurpation and Reorganization As discussed above, the years since the end of World War II have seen a
dramatic rise in the incidents of congressional involvement and attempted involvement in areas which were once recognized as the sole
province of the Executive. n260 This represents more than a benign and vigorous attempt to do the duties vested in the legislative
branch by the Constitution; rather, it represents
a bipartisan attempt to enlarge congressional
powers at the expense of the executive branch, particularly in the realm of national security , the
military, and foreign policy. After World War II, Truman's decision to retain an intelligence operation similar to the OSS caused him to
seek funding for the CIA, which in turn resulted in the National Security Act of 1947 and the creation of the CIA as a separate agency.
n261 From this point on, Congress became increasingly interested in the activities of the American intelligence community; this interest
frequently went beyond predictable appropriations reasons. n262 Requests for information on CIA and other intelligence community
member activities during the 1960s and 1970s were made by various congressional committees. n263 When [*99] these requests were
complied with, predictably, they revealed information which was startling and possibly repugnant to some in the public, the government,
and the press, and resulted in the creation of an extensive notification protocol imposed by Congress on the President and members of
the intelligence community whenever covert action was to be used. n264 These actions, though compelling sound bites for television
news show appearances and constituent newsletters, directly interfered with the powers of the Executive to control national security, as
vested in him by the constitutional Commander-in-Chief provision and recognized implicitly and explicitly for centuries.
Intelligence operations have come under increasingly intense scrutiny from various members of
Congress and there has been a chorus of requests for at least the basic elements of the intelligence community's budget to be
declassified and released to the public despite explanations from those in the Executive and intelligence community which highlight
the danger of doing so and the necessity of maintaining the current classified system. n265 At the same time, Congress
imposed strict funding and budgetary restrictions on the intelligence community as a whole through such acts as the
IRTPA, which requires that the DNI inform Congress prior to shifting money from one operation to another even after an internal,
executive finding of necessity has already been made. n266 Congress has periodically
attempted to reorganize
the Executive and its constituent parts. n267 It achieved part of this goal in 2002, with the creation of DHS, and in 2004, with
the creation of the DNI and its attempt to streamline the intelligence community overall. n268 This Article has already shown that the
majority of the provisions in both of these acts were already provided for by Executive Orders issued by the President and, further, that
these acts were enacted despite evidence that the best way to handle the perceived problems with the American intelligence community
legislative branch
encroachment upon the executive branch and its functions, these acts further usurped executive powers and
prior to September 11th was through purely executive action. It is important to note that, in addition to the
[*100] functions by attempting to legislate at least some aspects of the security classification process. Similarly, Congress created the
War Powers Resolution in an attempt to reign in the powers of the Executive under the Commander-in-Chief Clause and its associated
historical construction without regard to the strictures of the Constitution or its Framers regarding the primacy of the Executive in
military affairs. n269 Although it has never been challenged in court, current and past members of Congress agree that the War Powers
Resolution is inherently unconstitutional, and the signing statements of every President since Nixon indicate that this belief is shared by
the executive branch regardless of party affiliation. n270 Recent attempts by Congress to use its appropriations powers to force the
Executive to change its stance on and course in the Iraq war n271 are current illustrations of the fact that the same mindset which
created the War Powers Resolution still exists in
Congress today and that it has become so seethingly anti-Executive that it
threatens to undermine the role of the President as the arbiter of American national
security policy , military policy , and foreign policy . Further, scant attention has been paid to the
question of whether the current "war on terrorism" is in fact a "war" which the Congress can declare or seek to control through measures
other than appropriations restrictions. Using the legal definition of a declaration of war requires that a nation declare war on another
nation. n272 While the war on terror has effectively targeted the former regimes in Afghanistan and Iraq, the current phase of the war is
truly fighting terrorists of all nationalities, who have flocked to an ideology rather than a flag. This issue has not been properly addressed
as members of Congress from both
political parties have eagerly attempted to denigrate the
presidency rather than determining the bounds of their own constitutional abilities.
Page 211
AT: Circumvention
Solves public engagement and forces effective review
Harvard Law Review 8 (“SHIFTING THE FISA PARADIGM: PROTECTING CIVIL LIBERTIES BY ELIMINATING EXANTE
JUDICIAL APPROVAL”, 121 Harv. L. Rev. 2200, Lexis)//trepka
2. Public Engagement. - Putting
Congress in the position of primary responsibility would have the effect
not only of enabling it to exercise review, but in some ways of forcing it to do so. Congress would
have to publicly debate and announce the applicable statutory standards, which, as noted, would mark a
major departure from the TSP. This would require the public to give serious thought as to how to balance the competing
demands in this area of the law. In addition, the American people would be able to demand accountability
from their elected representatives to exercise adequate oversight . Thus, accountability could be demanded of
both the overseeing Congress and the overseen Executive .
Continual monitoring guarantees guideline adoption
Harvard Law Review 8 (“SHIFTING THE FISA PARADIGM: PROTECTING CIVIL LIBERTIES BY ELIMINATING EXANTE
JUDICIAL APPROVAL”, 121 Harv. L. Rev. 2200, Lexis)//trepka
3. Preventing
Unlawful Action. - Of primary importance in this area is Congress's continuing
monitoring of the conduct of surveillance. In this regard, the House bill's provision of consistent
inspectors general review and internal guideline adoption , along with the
Commission it proposes, are quite helpful.
Failure devastates intelligence
Ford 7 --- Assistant Professor of Law @ US Military Academy (Christopher, “Intelligence Demands in a Democratic
State: Congressional Intelligence Oversight”, 81 Tul. L. Rev. 721, Lexis)//trepka
B. Recommendations Clearly the
need for oversight reform in Congress is great. Congress's role in the
oversight process is crucial in both ensuring compliance with the law and in facilitating a
functional, aggressive, and efficient Intelligence Community. An inefficient oversight structure
impairs intelligence operations. The recommendations contained herein are neither unique nor revolutionary, but rather
a common sense distillation of various examinations of Congress's role.
The risk of public disclosure enhances accountability
Kitrosser 8 --- Associate Professor @ University of Minnesota Law School (Heidi, “THE DOMESTIC
COMMANDER IN CHIEF: CONGRESSIONAL OVERSIGHT OF NATIONAL SECURITY ACTIVITIES: IMPROVING INFORMATION
FUNNELS”, 29 Cardozo L. Rev. 1049, Lexis)//trepka
Nonetheless, there
are some formal and informal factors that may enhance Congress' political
incentives to conduct meaningful oversight . One set of formal requirements are the successive funneling
rules described above in Subpart B. The possibility that a Committee majority might at some point vote to
make information more widely available, even public, creates some incentive to act responsibly lest
one's intransigence become widely known. Of course, these successive funneling requirements themselves run into
political accountability problems. Such problems likely account for the fact that neither intelligence committee has used its formal power
to publicize classified information. n204 Successive
funneling rules might, however, contribute to a structure that
facilitates political accountability overall. The impact of successive funneling rules, and the strength of an overall
political accountability structure, might thus be heightened as other elements of the structure are enhanced. Another relevant set of
Page 212
formal factors are requirements that some funneled information be in writing. Once
information is in writing, it becomes
harder for writers or recipients to distance themselves from it if it ever is revealed. The statutory funneling
rules at present contain some in-writing requirements. For example, the intelligence agencies are required to "keep the congressional
intelligence committees fully and currently informed of all ... significant anticipated intelligence activity and any significant intelligence
failure." n205 Such reports must be in writing. n206 Similarly, certain Presidential findings must be made to justify a covert action and
such findings generally must be submitted in writing to the intelligence committees. n207 While delays in notice or temporarily limited
notice are permitted, such delays or limitations must eventually be explained in writing. n208 Factors less formal than statutory and
committee rules can also impact political accountability. The political climate , of course, can be very significant.
Indeed, the mid to late 1970s has been called a high point for congressional oversight of national security. This characterization is
attributed largely to the well-known executive branch abuses, often under the guise of national security, of the late 1960s and [*1086]
early 1970s. n209 These events are thought to have generated an unusually high public tolerance, even appetite, for oversight of the
executive branch. n210 Of course, the political climate cannot by itself ensure effective oversight. Other necessary factors include a
Congress that is not paralyzed from acting by partisanship or by other political disincentives. As Walter Mondale, who as a senator
contributed substantially to the intelligence oversight of the 1970s notes, no one can force Congress to have courage. n211 Political
and congressional cultures are crucial components of effective oversight . The relevant
questions are what if anything might do done to improve oversight cultures and what role if any might formal rule changes play in such
improvements.
Page 213
AT: Classifying Stuff Good
Declassification is key to transparency --- internal checks prevent their disads
Ford 7 --- Assistant Professor of Law @ US Military Academy (Christopher, “Intelligence Demands in a Democratic
State: Congressional Intelligence Oversight”, 81 Tul. L. Rev. 721, Lexis)//trepka
c. Secrecy A comment from Congressman Tim Roemer concurrently illustrates two problems - information sharing within the
committees and the overclassification of information: One of my great frustrations during my service on the Permanent Select
Committee on Intelligence has been the degree to which access to information is restricted, either from the committee or within the
committee, often for reasons that have little or no correlation to national security. Many times, these restrictions have the effect of
impairing the ability of members of the committee to make fully informed decisions on important budgetary or policy matters ... .
Classification should be for important national security reasons ... . n366 [*770] Congressman Roemer is not alone in his criticism. The
Intelligence Community has been roundly criticized for overclassifying information. n367 Millions
of documents are classified every year. n368 By some accounts, a majority of the classified information should not be classified. n369
Most obviously, this
has a tendency to reduce the transparency of government - a principal the Court has
strongly criticized. n370 Further, overclassification has the tendency to dilute the meaning of "secret." The idea is that, when everything
is secret, nothing is secret. Finally, the costs associated with safekeeping, declassifying, or destroying such a volume of documents are
tremendous. This issue was recently addressed by the Subcommittee on National Security, Emerging Threats, and International
Relations in the House Committee on Government Reform; it succinctly summarized the problems arising from this issue:
Overclassification ultimately incurs avoidable fiscal costs and compromises national
security . Adversarial, versus automatic, declassifications procedures are cumbersome and time consuming. Safeguards for
voluminous classified material require costly security measures. And government officials confronted with dizzyingly complex rules for
numerous categories of classified information often [*771] cannot or do not distinguish truly significant security matters from routine
material market secret out of an excess of caution or zeal. n371 Reducing
the classification of documents and
programs would thus produce significant cost savings and increased efficiency. A similar effect could be
found by implementing more automatic declassification protocols. Closely related to the problem of overclassifying information is
the exact opposite - " leaks " of national security information. As noted above, one of the traditional fears of the Executive is the
leaking of information through Congress. This fear, of course, causes the executive to err on the side of caution when sharing sensitive
information. As with free speech, this
unnecessarily " chills " communication between Congress and the
executive. As noted by a member of the Senate Committee composing the Joint Inquiry Report: "Congress should take decisive steps
to help stem our contemporary culture of endemic "leaking' of national security information to the media, so as better to ensure that our
analysts remain better informed about terrorists than the terrorists do about them." n372 Again, this
internal checks.
demands aggressive
Page 214
AT: Courts Key
Only Congress solves --- it spills over to the judiciary
Rahdert 7 --- Professor of Law (Mark, “DOUBLE-CHECKING EXECUTIVE EMERGENCY POWER: LESSONS FROM HAMDI
AND HAMDAN”, 80 Temp. L. Rev. 451, Lexis)//trepka
The implications of this double-check method for the treatment of detainees in the war on terror depend heavily on congressional action,
a result that is generally consistent with the aims of representative democracy. Responsibility falls in the first instance on the people's
elected representatives to set the limits of executive authority in times of proclaimed national security crisis. When
Congress
takes an active role, the courts have the tools they need for an effective executive double
check ; if Congress remains passive , however, there is relatively little the judiciary can do on its own
to restrain executive emergency power. So far in the war on terror, Congress has shown a
disinclination to assume an active limiting role. In light of the Detainee Treatment Act of 2005 ("DTA") n24 and
the Military Commissions Act of 2006 ("MCA"), n25 the double-check theory thus may not have as much impact on the present
administration's conduct of the war on terrorism as some of its critics may have hoped. n26 The military commissions and practices of
detention that were once the objects of executive fiat have now become the artifacts of legislative policy - making the military
commissions for trial of enemy combatants what in other contexts we call, with reason, "Article I courts." If there are to be any further
restraints on their power, they must come from the judiciary acting alone against executive emergency power, a development that is
arguably unprecedented in our history. Nevertheless, the double-check theory's influence has begun to reshape the power contours and
political dynamics of the [*457] present situation, showing that it serves as a more-than-symbolic potential limit on future executive
authority claims.
We’ll turn their courts key claims –
First, court credibility – internationalizing the Constitution undermines
Court credibility and the perception of an independent judiciary
Wilkinson, Circuit Judge on the U.S. Court of Appeals for the 4th Circuit, former Law Professor at the
University of Virginia, & former Deputy Assistant Attorney General of the U.S. Department of Justice Civil
Rights Division, 4 (The Honarable J. Harvie, “DEBATE: THE USE OF INTERNATIONAL LAW IN
JUDICIAL DECISIONS,” Harvard Journal of Law & Public Policy, Spring, 27 Harv. J.L. & Pub. Pol'y 423)
Where courts go too far, in my view, is where they rely upon international (and mostly European) precedents when resolving important and
contentious social issues. This "internationalization" of the Constitution on domestic social issues raises three types of
problems. The first is that an over-reliance on foreign precedents may serve to compromise judicial decisions
in the eyes of the American public. Judges serve as unelected stewards of the Constitution whose power rests in part on their ability
to persuade. While majorities may simmer [*426] when judges vindicate the rights of minorities, in the long run judges can promote respect for their decisions by
appealing to principles that Americans can relate to as part of an American constitutional tradition. The counter-majoritarian difficulty is thus alleviated when judges draw upon
when judges rely on foreign sources, especially for difficult constitutional
they move the bases for judicial decision-making even farther from the
realm of both democratic accountability and popular acceptance. They aggravate the risks already
inherent in having unelected officials overrule popular enactments by creating the perception that
foreign sentiment shapes domestic law. To be sure, examples from other countries may be illuminating. But the Court's legitimacy
must ultimately rest on reliance and reference to the American Constitution and to American democratic; outcomes,
from which their judicial authority springs. By relying on foreign laws and rulings over which the American people have no
control -- either directly through the power of election or even indirectly through the process of judicial appointment -- judges risk estranging and
disempowering the public. I fear that the internationalization of our constitutional values may thus
undermine public acceptance of our judicial system. A closely related danger is that reliance on foreign precedents may stimulate popular
perceptions that judges are out of touch with American culture. The risks of a common perception of judicial distance and removal should not be
underestimated. The detachment and insulation which an independent judiciary properly enjoys
should not be endangered by pronouncements that appear targeted at foreign and domestic elites rather
than the American public at large. The power of persuasion which sustains judicial authority must not
common principles and ideas that form our shared American heritage. But
questions concerning domestic social issues,
Page 215
neglect those very people whose acceptance of judicial decree is most essential. Americans treasure their diversity
and their identity. The great Willa Cather novels, My Antonia and O Pioneers!, still play a prevalent role in the American psyche, and the distance from American to European modes
of thought remains in some vital particulars more psychological than physical. The distinguished Harvard historian, Bernard Bailyn, has noted that the power of the American
Constitution derived from the fact that its framers were proud and stubborn provincials, that they did not accept all the received wisdom of the Continent, and that, for example, the
[*427] animating constitutional idea of dual and concurrent sovereignties actually rejected the contrary notions of the French theorist Montesquieu. n10
That flips all of their human rights and democracy internal links
van Aelstyn, Counsel of Record for the Center for Justice & Accountability, 4 (Nicholas, Brief of the
Center for Justice & Accountability, the International League for Human Rights, & Individual Advoacates for
the Independence of the Judiciary in Emerging Democracies as Amici Curiae in Support of Petitioners, In the
Supreme Court of the United States on Writ of Certiorari to the United States Court of Appeals for the D.C.
Circuit, Fawzi Khalid Abdullah Fahad Al Odah et al., Petitioners v. United States of America et al.,
Respondents, & Shafiq Rasul et al., Petitioners v. George W. Bush, et al., Respondents, Supreme Court case
numbers 03-334 and 03-343)
Many of the newly independent governments that have proliferated over the past five decades have adopted these ideals. They
have emerged from a variety of less-than-free contexts, including the end of European colonial rule in the 1950's and 1960's, the end of the Cold War and the breakup of the former
Soviet Union in the late 1980's and 1990's, the disintegration of Yugoslavia, and the continuing turmoil in parts of Africa, Latin America and southern Asia. Some countries have
successfully transitioned to stable and democratic forms of government that protect individual freedoms and human rights by means of judicial review by a strong and independent
judiciary. Others have suffered the rise of tyrannical and oppressive rulers who consolidated their hold on power in part by diminishing or abolishing the role of the judiciary.
And
still others hang in the balance, struggling against the onslaught of tyrants to establish stable,
democratic governments. In their attempts to shed their tyrannical pasts and to ensure the protection of individual rights, emerging
democracies have consistently looked to the United States and its Constitution in fashioning frameworks that
safeguard the independence of their judiciaries. See Ran Hirschl, The Political Origins of Judicial Empowerment through
Constitutionalization: Lessons from Four Constitutional Revolutions, 25 Law & Soc. Inquiry 91, 92 (2000) (stating that of the “[m]any countries . . . [that] have engaged in
fundamental constitutional reform over the past three decades,” nearly all adopted “a bill of rights and establishe[d] some form of active judicial review”). 19 Establishing
judicial review by a strong and independent judiciary is a critical step in stabilizing and protecting
these new democracies. See Christopher M. Larkins, Judicial Independence and Democratization: A Theoretical and Conceptual Analysis, 44 Am. J. Comp. L. 605,
605-06 (1996) (describing the judicial branch as having "a uniquely important role" in transitional countries, not only to "mediate conflicts between political actors but also [to]
prevent the arbitrary exercise of government power; see also Daniel C. Prefontaine and Joanne Lee, The Rule of Law and the Independence of the Judiciary, International Centre for
an independent judiciary is the key to
upholding the rule of law in a free society . . . . Most countries in transition from dictatorships and/or statist economies recognize the need to create a more
Criminal Law Reform and Criminal Justice Policy (1998) ("There is increasing acknowledgment that
stable system of governance, based on the rule of law."), available at http://www.icclr.law.ubc.ca/Publications/Reports/RuleofLaw. pdf (last visited Jan. 8, 2004). Although the
precise form of government differs among countries, “they ultimately constitute variations within, not from, the American model of constitutionalism . . . [a] specific set of
fundamental rights and liberties has the status of supreme law, is entrenched against amendment or repeal . . . and is enforced by an independent court . . . .” Stephen Gardbaum, The
New Commonwealth Model of Constitutionalism, 49 Am. J. Comp. L. 707, 718 (2001). This phenomenon became most notable worldwide after World War II when certain countries,
such as Germany, Italy, and Japan, embraced independent judiciaries following their bitter experiences under totalitarian regimes. See id. at 714- 15; see also United States v. Then,
many countries have adopted forms of judicial review,
which — though different from ours in many particulars — unmistakably draw their origin and inspiration from American
constitutional theory and practice. See generally Mauro Cappelletti, The Judicial Process in Comparative Perspective (Oxford: Clarendon Press, 1989).”).
56 F.3d 464, 469 (2d Cir. 1995) (Calabresi, J., concurring) (“Since World War II,
It is a trend that continues to this day. 20 It bears mention that the United States has consistently affirmed and encouraged the establishment of independent judiciaries in emerging
democracies. In September 2000, President Clinton observed that "[w]ithout the rule of law, elections simply offer a choice of dictators. . . . America's experience should be put to use
to advance the rule of law, where democracy's roots are looking for room and strength to grow." Remarks at Georgetown University Law School, 36 Weekly Comp. Pres. Doc. 2218
(September 26, 2000), available at http://clinton6.nara.gov/2000/09/2000-09-26- remarks-by-president-at-georgetown-international-lawcenter. html. The United States acts on
these principles in part through the assistance it provides to developing nations. For example, the United States requires that any country seeking assistance through the Millenium
Challenge Account, a development assistance program instituted in 2002, must demonstrate, among other criteria, an "adherence to the rule of law." The White House noted that the
rule of law is one of the "essential conditions for successful development" of these countries. See http://www.whitehouse.gov/infocus/developingnations (last visited Jan. 8, 2004).12
A few examples illustrate the influence of the United States model. On November 28, 1998, Albania adopted a new constitution, representing the culmination of eight years of
democratic reform after the communist rule collapsed. In addition to protecting fundamental individual rights, the Albanian Constitution provides for an independent judiciary
consisting of a Constitutional Court with final authority to determine the constitutional rights of individuals. Albanian Constitution, Article 125, Item 1 and Article 128; see also Darian
Pavli, "A Brief 'Constitutional History' of Albania" available at http://www.ipls.org/services/others/chist.html (last visited Janaury 8, 2004); Jean-Marie Henckaerts & Stefaan Van
der Jeught, Human Rights Protection Under the New Constitutions of Central Europe, 20 Loy. L.A. Int’l & Comp. L.J. 475 (Mar. 1998). In South Africa, the new constitutional
judiciary plays a similarly important role, following generations of an oppressive apartheid regime. South Africa adopted a new constitution in 1996. Constitution of the Republic of
South Africa, Explanatory Memorandum. It establishes a Constitutional Court which “makes the final decision whether an Act of Parliament, a provincial Act or conduct of the
President is constitutional.” Id. at Chapter 8, Section 167, Item (5), available at http://www.polity.org.za/html/govdocs/constitution/saconst.html?r ebookmark=1 (last visited
January 8, 2004); see also Justice Tholakele H. Madala, Rule Under Apartheid and the Fledgling Democracy in Post-Apartheid South Africa: The Role of the Judiciary, 26 N.C. J. Int’l
L. & Com. Reg. 743 (Summer 2001). Afghanistan is perhaps the most recent example of a country struggling to develop a more democratic form of government. Adoption by the Loya
Jirga of Afghanistan's new constitution on January 4, 2004 has been hailed as a milestone. See http://www.cbsnews.com/stories/2004/01/02/world/main59111 6.shtml (Jan 7,
2004). The proposed constitution creates a judiciary that, at least on paper, is "an independent organ of the state," with a Supreme Court empowered to review the constitutionality of
laws at the request of the Government and/or the Courts. Afghan Const. Art. 116, 121 (unofficial English translation), available at http://www.hazara.net/jirga/AfghanConstitutionFinal.pdf (last visited January 8, 2004). See also Ron Synowitz, Afghanistan: Constitutional Commission Chairman Presents Karzai with Long-Delayed Draft Constitution (November
3, 2003), available at http://www.rferl.org/nca/features/2003/11/03112003164239.as p (last visited Jan. 8, 2004). B. Other Nations Have Curtailed Judicial Review During Times Of
Crisis, Often Citing the United States' Example, And Individual Freedoms Have Diminished As A Result. While much of the world is moving to adopt the institutions necessary to
secure individual rights, many still regularly abuse these rights.
One of the hallmarks of tyranny is the lack of a strong and
independent judiciary. Not surprisingly, where countries make the sad transition to tyranny, one of the first victims is the judiciary. Many of the rulers that go down
that road justify their actions on the basis of national security and the fight against terrorism, and, disturbingly, many claim to be modeling their actions on the United States. Again, a
few examples illustrate this trend. In Peru, one of former President Alberto Fujimori’s first acts in seizing control was to assume direct executive control of the judiciary, claiming that
Page 216
it was justified by the threat of domestic terrorism. He then imprisoned thousands, refusing the right of the judiciary to intervene. International Commission of Jurists, Attacks on
Justice 2000-Peru, August 13, 2001, available at http://www.icj.org/news.php3?id_article=2587&lang=en (last visited Jan. 8, 2004). In Zimbabwe, President Mugabe’s rise to
dictatorship has been punctuated by threats of violence to and the co-opting of the judiciary. He now enjoys virtually total control over Zimbabweans' individual rights and the entire
political system. R.W. Johnson, Mugabe’s Agents in Plot to Kill Opposition Chief, Sunday Times (London), June 10, 2001; International Commission of Jurists, Attacks on Justice
2002— Zimbabwe, August 27, 2002, available at http://www.icj.org/news.php3?id_article=2695&lang=en (last visited Jan. 8, 2004). While Peru and Zimbabwe represent an
extreme, the independence of the judiciary is under assault in less brazen ways in a variety of countries today. A highly troubling aspect of this trend is the fact that in many of these
instances 23 those perpetuating the assaults on the judiciary have pointed to the United States’ model to justify their actions. Indeed, many have specifically referenced the United
States’ actions in detaining persons in Guantánamo Bay. For example, Rais Yatim, Malaysia's "de facto law minister" explicitly relied on the detentions at Guantánamo to justify
Malaysia's detention of more than 70 suspected Islamic militants for over two years. Rais stated that Malyasia's detentions were "just like the process in Guantánamo," adding, "I put
the equation with Guantánamo just to make it graphic to you that this is not simply a Malaysian style of doing things." Sean Yoong, "Malaysia Slams Criticism of Security Law
Allowing Detention Without Trial," Associated Press, September 9, 2003 (available from Westlaw at 9/9/03 APWIRES 09:34:00). Similarly, when responding to a United States
Government human rights report that listed rights violations in Namibia, Namibia's Information Permanent Secretary Mocks Shivute cited the Guantánamo Bay detentions, claiming
that "the US government was the worst human rights violator in the world." BBC Monitoring, March 8, 2002, available at 2002 WL 15938703. Nor is this disturbing trend limited to
these specific examples. At a recent conference held at the Carter Center in Atlanta, President Carter, specifically citing the Guantánamo Bay detentions, noted that the erosion of civil
liberties in the United States has "given a blank check to nations who are inclined to violate human rights already." Doug Gross, "Carter: U.S. human rights missteps embolden foreign
dictators," Associated Press Newswires, November 12, 2003 (available from Westlaw at 11/12/03 APWIRES 00:30:26). At the same conference, Professor Saad Ibrahim of the
American University in Cairo (who was jailed for seven years after exposing fraud in the Egyptian election process) said, "Every dictator in the world is using what the United States
has done under the Patriot Act . . . to justify their past violations of human rights and to declare a license to continue to violate human rights." Id. Likewise, Shehu Sani, president of
the Kaduna, Nigeriabased Civil Rights Congress, wrote in the International 24 Herald Tribune on September 15, 2003 that "[t]he insistence by the Bush administration on keeping
Taliban and Al Quaeda captives in indefinite detention in Guantánamo Bay, Cuba, instead of in jails in the United States — and the White House's preference for military tribunals
over regular courts — helps create a free license for tyranny in Africa. It helps justify Egypt's move to detain human rights campaigners as threats to national security, and does the
same for similar measures by the governments of Ivory Coast, Cameroon and Burkina Faso." Available at http://www.iht.com/ihtsearch.php?id=109927&owner=(IHT)&dat
the U
S
sets an important example
e=20030121123259. In our uni-polar world,
nited tates obviously
on these issues. As reflected in the foundational
documents of the United Nations and many other such agreements, the international community has consistently affirmed the value of an independent judiciary to the defense of
universally recognized human rights. In the crucible of actual practice within nations,
many have looked to the United States model when
developing independent judiciaries with the ability to check executive power in the defense of individual rights. Yet others have justified abuses by
reference to the conduct of the United States. Far more influential than the words of Montesquieu and Madison are the actions of the United States. This case starkly
presents the question of which model this Court will set for the world. CONCLUSION Much of the world
models itself after this country’s two hundred year old traditions — and still more on its day to day implementation and expression of
those traditions. To say that a refusal to exercise jurisdiction in this case will have global implications is not mere rhetoric. Resting on this Court’s
decision is not only the necessary role this Court has historically played in this country. Also at stake are the freedoms that many in emerging
democracies around the globe seek to ensure for their peoples.
The aff’s ruling creates a slippery slope
Wilkinson, Circuit Judge on the U.S. Court of Appeals for the 4th Circuit, former Law Professor at the
University of Virginia, & former Deputy Assistant Attorney General of the U.S. Department of Justice Civil
Rights Division, 4 (The Honarable J. Harvie, “DEBATE: THE USE OF INTERNATIONAL LAW IN
JUDICIAL DECISIONS,” Harvard Journal of Law & Public Policy, Spring, 27 Harv. J.L. & Pub. Pol'y 423)
In recent cases, comparative
analysis has appeared to be a one-way ratchet toward expansion of
individual rights and toward restriction of democratic prerogatives. The countries that take a more traditionalist view of social
questions are almost never referred to. And foreign experiences seem to be consulted only on issues in which the United States is more
traditional than other nations. Is this fair? Is this balanced? Again, my point today pertains not to results reached in recent decisions but
the course on which courts are newly embarked presents the
oldest form of legal danger -- that of a treacherous and slippery slope.
to methodology. I hope there will be some recognition that
That turns the case and locks in ineffective foreign policy
Nzelibe, Law Professor at Chicago, 4 (Jide, Bigelow Fellow & Lecturer in Law at the University of Chicago
Law School, “The Uniqueness of Foreign Affairs,” Iowa Law Review, March, 89 Iowa L. Rev. 941)
In many circumstances, the political question doctrine can be justified by the fact that the costs of judicial
intervention in foreign affairs are considerably high while the benefits, if any, are entirely
speculative . At first glance, this rationale seems problematic because any attempt to calculate the costs of judicial intervention
would likely encounter methodological difficulties, especially since there seems to be no clear criteria for comparing judicial versus
political branch performance in foreign affairs controversies. Nonetheless, there are certain institutional considerations that warrant a
intervention in foreign affairs controversies is likely to impose serious costs on the
administration of foreign policy. One such consideration involves the fact that the courts are not capable of understanding or
conclusion that judicial
controlling the effects of their decisions on foreign countries, nor do they have any control over the reaction of foreign countries to their
decisions. The second, yet related, consideration is that the various remedial devices available to the courts - injunctions, writs,
declaratory relief, and contempt orders - are particularly ill-suited to matters relating to foreign affairs. a. Assessing the Costs of Judicial
Page 217
Intervention The costs associated with judicial error are most evident in cases involving controversies over the allocation of war powers.
First, the nature of such controversies often requires immediate attention , and it may prove costly for the
political branches to await the outcome of a judicial determination. Second, to the extent that a determination will turn on whether the
executive branch has produced sufficient evidence to warrant the commencement of military hostilities without congressional
authorization, the consequences of judicial error can be extremely high, if not catastrophic. Imagine, for instance, that the Supreme
Court sets forth a standard for war powers controversies that requires the President to demonstrate that a foreign country imposes an
imminent threat to national security before he can commence military hostilities without congressional authorization. If
the Court
errs in its assessment of the severity of an external threat, its judgment could leave the country
defenseless in the event of an attack. Such difficulties underscore an important difference
[*993] between domestic
controversies and foreign controversies. In a domestic controversy, the costs of judicial error are rarely so immediate and guaranteed to
impact a wide number of the U.S. citizenry. It is also true that in the domestic context, the courts often have ample opportunity, over
time, to correct any prior interpretive errors. This risk of judicial error is implicit in the decisions that treated the legality of the Vietnam
War as a political question. For example, with respect as to whether the President's decision to mine the harbors of North Vietnam
constituted an unauthorized escalation of war under the War Powers Act, the Second Circuit articulated the risk of that court's
involvement in these terms: Judges, deficient in military knowledge, lacking vital information upon which to assess the nature of
battlefield decisions, and sitting thousands of miles from the field of action, cannot reasonably or appropriately determine whether a
specific military operation constitutes an "escalation" of the war or is merely a new tactical approach within a continuing strategic plan ...
Are the courts required to oversee the conduct of the war on a daily basis, away from the scene of action? In this instance, it was the
President's view that the mining of North Vietnam's harbors was necessary to preserve the lives of American soldiers in South Vietnam
and to bring the war to a close. History will tell whether or not that assessment was correct, but without the benefit of such extended
hindsight we are powerless to know. n225 Using this framework, the court concluded that political branches were better equipped to
handle the foreign affairs and war strategy questions before it. One might object and argue that the circumstances described above
would only apply when war or imminent threats to national security issues are at stake. While national security concerns best illustrate
the dangers of judicial intervention, framing this factor exclusively in terms of war is not appropriate. First, as explained in Section A
above, it is often difficult to separate national security issues from other soft diplomacy concerns. n226 Second, and more importantly,
the costs of judicial intervention stem not so much from the fact that war may be a factor, but that the courts are incapable of predicting
whether foreign nations may be affected by a judicial decision, or how such nations may react to such a decision. This latter
consideration extends to issues affecting international trade and commerce, as well as international security. As explained by Justice
Brennan in Container [*994] Corp. of America v. Franchise Tax Board, n227 a case involving a tax dispute, "this Court has little
competence in determining precisely when foreign nations will be offended by particular acts." n228 In the absence of a more precise
understanding of the foreign interests that may be adversely affected by a judicial determination, the
courts have
appropriately left the resolution of such foreign affairs disputes to the political branches.
Retaliation devastates the courts ability to solve any problem
Carrington, Alabama Law, 99 (Paul, “Restoring Vitality to State and Local Politics by Correcting the
Excessive Independence of the Supreme Court,” Alabama Law Review, Winter, v. 50, p. 411)
courts assuming the role of third chamber to bicameral legislatures invite political attack
threatening their own independence, thereby diminishing their competence for the more humdrum, but
more essential, work of enforcing legal rights and duties. When high courts displace legislatures as
cockpits for partisan struggle, there is no organ remaining that is qualified by disinterest to decide
"cases and controversies" involving politically sensitive matters by applying law to fact. For all these reasons,
Justices who are "pragmatists" in the contemporary, permissive sense threaten the political stability of the Republic
and thereby indirectly threaten our civil liberties, civil rights, and market capitalism, all of which
depend on the political stability the Republic affords.
Third,
Congress is key to solvency --- there’s no standing to address domestic
surveillance in court which means the aff gets rolled back
NCC 13 --- National Constitution Center Staff (“Podcast: Kerr, Rotenberg on NSA domestic surveillance”,
http://blog.constitutioncenter.org/2013/10/audio-kerr-rotenberg-on-warrantless-surveillance/)//trepka
Kerr also believes there are problems with Section 215, but the issues should be dealt with by Congress
or the FISA court—and
not the U.S. Supreme Court. In February 2013, the Supreme Court said, in a 5-4
decision , that government warrantless surveillance laws can’t be challenged in court,
Page 218
because plaintiffs don’t have standing to sue over secret procedures that they are unaware of
directly.
Domestic surveillance falls in legislative powers
Kitrosser 8 --- Associate Professor @ University of Minnesota Law School (Heidi, “THE DOMESTIC
COMMANDER IN CHIEF: CONGRESSIONAL OVERSIGHT OF NATIONAL SECURITY ACTIVITIES: IMPROVING INFORMATION
FUNNELS”, 29 Cardozo L. Rev. 1049, Lexis)//trepka
opponents argue that Congress and the President share powers in both military and domestic affairs, that domestic
surveillance falls well within Congress' legislative powers, and that the President thus must conduct any operations
On the constitutional points,
within FISA's parameters. n25 B. Administration Disclosures to Congresspersons Prior to the Program's Public Revelation Also discussed in the wake of the program's public
revelation, though much less so, is whether the administration adequately informed Congress about the program before it became public. Prior to the program's public revealing, the
administration notified only members of the Congressional leadership, or "Gang of Eight," consisting of "the chairmen and ranking minority members of the congressional
intelligence committees, the Speaker and minority leader of the House of Representatives, and the majority and minority leaders of the Senate." n26 Opponents charge that the
administration was obligated to inform the full intelligence committees. n27 Opponents also argue that notification occurred under such constrained conditions that informed
members had no means to seek recourse in response to the information. n28 [*1054] 1. Limiting Notice to the Gang of Eight The legal dimensions of notification are shaped largely by
the National Security Act of 1947, as amended. The intelligence community's current statutory disclosure responsibilities include requirements that the
President "ensure that the congressional intelligence committees are kept fully and currently informed of ... intelligence activities ... including any significant anticipated intelligence
activity" n29 and that the Director of National Intelligence [DNI] and the intelligence agency heads similarly "keep the congressional intelligence committees fully and currently
informed of all intelligence activities," including through written reports on "significant anticipated intelligence activity." n30 In carrying out these duties, the DNI must show "due
regard for the protection from unauthorized disclosure of classified information relating to sensitive intelligence sources and methods or other exceptionally sensitive matters." n31 A
separate statutory provision requires "Presidential approval and reporting of covert actions." n32
Covert actions are distinct from
intelligence activities. The former is limited to "an activity or activities of the United States Government to influence political, economic, or military conditions
abroad, where it is intended that the role of the United States Government will not be apparent or acknowledged publicly." n33 Covert actions do not
include "activities the primary purpose of which is to acquire intelligence." n34 While the
intelligence committees generally must be notified of covert actions, n35 initial notice may be limited to the Gang of Eight n36 where the President deems such limitation "essential ...
to meet extraordinary circumstances affecting vital interests of the United States." n37 When initial notice is restricted to the Gang of Eight, "the President shall fully inform the
congressional intelligence committees in a timely fashion and shall provide a statement of the reasons for not giving prior notice." n38
Page 219
AT: L/NB --- Military DA
Only Congressional authorizations allowed tailored restrictions --- the Courts
undermines executive flexibility
Harvard Law Review 8 (“SHIFTING THE FISA PARADIGM: PROTECTING CIVIL LIBERTIES BY ELIMINATING EXANTE
JUDICIAL APPROVAL”, 121 Harv. L. Rev. 2200, Lexis)//trepka
A. Conceptualizing a System of Political Checks At present, there appears to be a problem of circularity in justifying FISA: those who fear
allowing the courts to impact national security argue that they are not active enough to impact it anyway, while those who fear
abrogation of civil liberties argue that ex ante judicial approval is needed. As one commentator notes, "the fear that a judicial review
requirement would prevent the government from conducting surveillance seems overblown in light of the fact that the FISA court grants
virtually all of the government's requests." n90 In effect, this [*2216] leaves the difficult decisions to the Executive but does not provide
the political accountability necessary to permit the public to influence the way the Executive makes its choices. Moreover,
a focus
on "political judgments" would also maintain the flexibility the government needs to ensure the
continued vitality of the nation that protects those liberties. The testimony during the initial FISA hearings of two
former Attorneys General, themselves responsible for authorizing foreign intelligence surveillance in the pre-FISA arrangement, is
instructive. Former Attorney General Ramsey Clark observed that "we greatly exaggerate the safety and value of" a requirement that "all
wiretaps ... be approved by a judicial officer." Arguing that "the idea that there can be a meticulous review of these applications by the
Judiciary is contrary to our experience," he put primary emphasis on political checks through reporting requirements and congressional
oversight and standard-setting. n91 Additionally, former Attorney General Elliot Richardson noted the "important role in assuring that
this sensitive tool is not abused" to be played by the Senate, via both direct oversight and the confirmation of the Attorney General and
Director of the FBI. n92 More importantly, the legislative history suggests that the most consequential element of FISA is not its judicial
review provisions. Rather, FISA's crucial move was to institute a reliance on the use of "public laws, publicly debated and adopted, which
specify under what circumstances and under what restrictions electronic surveillance for foreign intelligence purposes can be
conducted." n93 The
reliance on political checks proposed in this Note avoids the problem identified by Congress when
that "the substantial safeguards respecting foreign intelligence
electronic surveillance [then] embodied in classified Attorney General procedures" [*2217] were not enough to
overcome "the inappropriateness of relying solely on executive branch discretion to safeguard
civil liberties." n94 Here, the Executive is subject not merely to internally created standards that it
might change or ignore at will, but also to those set down by the statute , which were themselves created
it initially enacted FISA and raised by the TSP -
through the public "weighing of important public policy concerns" that Congress performs. n95 Congress is better
situated constitutionally and better equipped institutionally to make the sort of value
judgments and political determinations that are necessary to fulfill FISA's purposes. If "the government
may abuse FISA in situations like that involving the L.A. Eight, when intrusive electronic surveillance is undertaken based on political
activities, rather than on support for terrorist activities," n96 it seems that Congress
will be much better than courts
at sniffing out such violations and fashioning broader and more flexible remedie s. If one
hopes to realize the core purpose of FISA - as described by the ACLU, "to prevent future presidents from intercepting the "international
communications of American citizens whose privacy ought to be protected under [our] Constitution' ever again" n97 - then a
approach is needed.
new
Page 220
AT: L/NB --- Terror DA
Maintaining warrantless surveillance still maintains privacy --- implementing
a new oversight mechanism would deter and prevent abuse without
undermining counterterror
Blum 9 --- attorney for the Department of Homeland Security, M.A. in security studies, J.D. from UChicago
(Stephanie, “ WHAT REALLY IS AT STAKE WITH THE FISA AMENDMENTS ACT OF 2008 AND IDEAS FOR FUTURE
SURVEILLANCE REFORM”, 18 B.U. Pub. Int. L.J. 269, Lexis)//trepka
Judge Posner suggests a more radical approach. He would allow warrantless international and domestic
surveillance of Americans without basis on any ex ante predicate standard or an attenuated standard, like a
"reason to believe that the surveillance might yield clues to terrorist identities, plans, or
connections." n269 Yet, Judge Posner notes that the more watered-down the predicate standard, the less meaningful role it plays in
deterring abuse: "If all that the government is required to state in its application is that it thinks an interception might yield intelligence
information, judges will have no basis for refusing to grant the application." n270 Instead, Judge Posner would rely more on ex post
reporting mechanisms to control abuse. n271 He would also prevent law
enforcement personnel from using information gleaned by warrantless surveillance for
most non-national security related crimes . n272 For example, if an intelligence officer
overheard a man discussing a murder (not related to terrorism), the officer would have to
minimize and ignore such communication as it would not be related to national security. As
review and
Posner explains, "it is more important that the public tolerate extensive national security surveillance of communications, than that an
occasional run-of-the-mill crime go unpunished because intelligence officers were not permitted to share evidence of such a crime with
law enforcement authorities." n273 In other words, Posner's
solution would rely on minimal, if any, ex ante review
mechanisms and instead rely on extensive ex post reviews to deter and prevent governmental
abuse of warrantless surveillance information. Under the Fourth Amendment,
warrants require probable cause. n274 Some argue that the warrant requirement is unworkable
in the national security context. For example, if the initial determination of an individual's
status as a foreign power agent requires surveillance, then probable cause for such
surveillance will rarely exist . And, although the Fourth Amendment does not require
warrants in all cases, surveillance must at least be reasonable under the circumstances.
n275
As attorney David Rivken notes: [*311] While the Executive can constitutionally carry out a "reasonable" search that infringes on
personal privacy, a
warrant cannot be granted by a court absent "probable cause." Applying the
higher probable cause standard would mean that NSA could only surveil the conversations
of full-fledged al Qaeda agents, leaving invaluable conversations among al Qaeda
sympathizers unmonitored. n276 Therefore, similar to Posner's approach, Rivken
recommends political accountability to deal with abuses but not necessarily ex ante reviews based on probable
cause. He suggests that Congress cut off the funds for NSA surveillance as one way to control
NSA abuses. n277
Programmatic surveillance is constitutional --- oversight solves abuse and
prevents terror
Blum 9 --- attorney for the Department of Homeland Security, M.A. in security studies, J.D. from UChicago
(Stephanie, “ WHAT REALLY IS AT STAKE WITH THE FISA AMENDMENTS ACT OF 2008 AND IDEAS FOR FUTURE
SURVEILLANCE REFORM”, 18 B.U. Pub. Int. L.J. 269, Lexis)//trepka
Page 221
Similarly, in terms of the other hypothetical situations discussed in Section III, n279 the question could be rephrased
as "whether probable cause that wiretapping all 1000 apartments would stop the attack, or
whether wiretapping the phones in Georgetown would avert a nuclear disaster." Such an
approach would, indeed, be lawful. According to Posner, the Supreme Court has suggested that a
dragnet search of every car in an area to locate a bomb would not violate the Fourth
Amendment , even though there would not be probable cause or even reasonable suspicion to
suspect any individual car. n280 Posner believes that the Court would reason that the delay, inconvenience, and privacy
intrusion to the drivers would be outweighed by the danger of a bomb. n281 The situation involving surveillance to
stop a nuclear bomb is even more compelling. In sum, when evaluating the FAA and considering additional
surveillance reform, Congress should consider creating a policy that allows officials to investigate
mere contacts with terrorists without first requiring probable cause to believe that the contact is an
agent of a foreign power. One possible reform could change when intelligence officials are required to use the probable cause standard.
Another way, as suggested by Judge Posner, would be to relax the ex ante inquiry and allow
widespread warrantless surveillance but rely more heavily on ex post
mechanisms to deter and detect abuse . n282 B. Incidental Communications of U.S. Persons Under the FAA,
the potential exists that vast numbers of incidental communications made by U.S. persons will be acquired, especially because the
executive can conduct warrantless surveillance of foreign nationals overseas who may happen to communicate with a U.S. person. While
the FAA requires minimization procedures, as explained in Part IV, there are plenty of exceptions. n283 One way to obviate the concerns
of civil libertarians, who worry that information obtained through warrantless surveillance used to gather foreign intelligence could be
used to prosecute domestic crimes, is to add statutory language limiting the crimes that could be prosecuted using evidence gathered
under the FAA. In other words, officials could use information concerning terrorism for [*313] prosecution, but information concerning
crimes unrelated to terrorism would not be given to law enforcement officials. Law professor Banks proposes a solution calling it an
"exclusionary rule for FISA." n284 Under this proposal, the "government would be prevented from using FISA-obtained information as
evidence in a prosecution of a target for a so-called collateral crime-one having nothing to do with terrorism or national security." n285
Such an exclusionary rule might mitigate potential abuse of the acquisitions of incidental U.S. communications pursuant to the FAA and
would not undermine national security. A second potential problem with collecting vast amounts of data concerns efficacy. Jerry Berman
and Lara Flint from the Center of Democracy and Technology argue that September 11 was not a result of lacking the right intelligence
but rather a result of the government not making effective use of the information already in its possession, and failing to adequately
share information among government agencies. n286 Berman and Flint argue, "granting the government broader authority to collect
vastly greater volumes of information without particularized suspicion could exacerbate this problem." n287 Journalist James Bamford
reaches a similar conclusion: "Those involved in the warrantless eavesdropping operation soon began to realize its limitations. By
gaining speed and freedom, they sacrificed order and understanding." n288 Part of the challenge is recognizing when incidental
When the purpose of
surveillance is to gather intelligence about international terrorism, greater flexibility in
acquiring and storing information is necessary, because innocent-sounding conversations
may later prove to be highly significant, and because individual items of information,
not apparently significant when taken in isolation, may become highly significant when
considered together over time. n289
communications become foreign intelligence. As the court noted in United States v. Rahman:
Page 222
AT: Not Competitive
The federal government is divided into three branches.
Rotunda 01
Richard Rotunda, professor of law at the University of Illinois, 2001; 18 Const. Commentary 319, “The Commerce
Clause, the Political Question Doctrine, and Morrison,” L/N
The Framers sought to protect liberty by creating a central government of enumerated powers. They divided power between the
state and federal governments, and they further divided power within the federal government by splitting
it among the three branches of government, and they further divided the legislative power (the power that the Framers most
feared) by splitting it between two Houses of Congress. n12
Decks solvency
Elmore 80
R.F. Elmore, professor of public affairs at University of Washington, 1980 [Political science quarterly, pg. 605,
(m7,06)]
Analysis of policy choices matters very little if the mechanism for implementing those choices is poorly
understood. In answering the question, “What percentage of the work of achieving a desired governmental action is
done when the preferred analytic alternative has been identified?” Allison estimated that in the normal
case, it was about 10 percent, leaving the remaining 90 percent in the realm of implementation.
Policy making education is found at the agency and implementation level
Schuck 99
Peter H. Schuck, Professor, Yale Law School, and Visiting Professor, New York Law School, Spring (“Delegation
and Democracy” – Cardozo Law Review) http://www.constitution.org/ad_state/schuck.htm
God and the devil are in the
details of policymaking, as they are in most other important things—and the details are to
be found at the agency level. This would remain true, moreover, even if the nondelegation doctrine were revived and
statutes were written with somewhat greater specificity, for many of the most significant impacts on members of the public would still be
indeterminate until the agency grappled with and defined them. Finally, the agency is often the site in which public participation is most
effective. This is not only because the details of the regulatory impacts are hammered out there. It is also because the agency is where the
public can best educate the government about the true nature of the problem that Congress has tried to address. Only the interested
parties, reacting to specific agency proposals for rules or other actions, possess (or have the incentives to ac-quire) the information
necessary to identify, explicate, quantify, and evaluate the real-world consequences of these and alternative proposals. Even when
Congress can identify the first-order effects of the laws that it enacts, these direct impacts seldom exhaust the laws’ policy consequences.
Indeed, first-order effects of policies usually are less significant than the aggregate of more remote effects that ripple through a complex,
interrelated, opaque society. When
policies fail, it is usually not because the congressional purpose was
misunderstood. More commonly, they fail because Congress did not fully appreciate how
the details of policy implementation would confound its purpose. Often, however, this
knowledge can only be gained through active public participation in the policymaking process at the
agency level where these implementation issues are most clearly focused and the stakes in
their correct resolution are highest.
Which agency is the core question of domestic surveillance
Cooper 7 --- Washington Times, senior fellow with the American Civil Rights Union (Horace, “Strike this down”,
http://www.washingtontimes.com/news/2007/oct/23/strike-this-down/)//trepka
In the wake of President Bush’s veto of the State Children’s Health Insurance Program (SCHIP), Congress is preparing for another showdown with the White House. But this time the
dispute won’t be over health care spending for children, instead
the dispute has consequences for all Americans because it is
over which branch of government is best suited to know which ground rules are
needed for fighting the war on terror. The specific conflict is over proposed amendments to the
Page 223
Foreign Intelligence Surveillance Act (FISA) but the broader issue is the distinct differences
between the Congress and the President when it comes to national security. Undoubtedly Article I of the Constitution provides a robust role for Congress in these matters: Congress
has the authority “to declare War, grant letters of Marque and Reprisal, and make rules concerning Captures on Land and Water.” Furthermore Congress is given explicit power to
fund and organize the military, legislate international rules of commerce and punish piracy. But crucially, its authority is dispersed among the two chambers and its powers are best
read as setting policy on broad terms. On the other hand, Article II of the Constitution reveals the primacy of executive authority when it comes to the day to day handling of national
security threats. Article II vests in the presidency the commander in chief power as well as foreign relations authority, executive order authority and related emergency powers. This
combination makes the presidency ideally suited to assess and carry out our nation’s national security needs. The tension between policy setting and day to day implementation is
reflected in the dispute over amendments to the FISA act of 1978. After nearly 20 years, Congress this summer passed amendments that modernized the act by expressly granting the
president broad authority to use today’s cutting-edge technology to engage in international surveillance. But now some in Congress want to roll back that authority. That would be a
dangerous mistake. The new rules work and provide the right balance between civil liberties and national security. Presently, the president is authorized to surveil foreigners without
going to the Foreign Intelligence Surveillance Court (FISC) for permission. Additionally, to protect Americans, the law requires the DOJ to develop and submit to the FISA court a set
of procedures the president will use in making determinations of who is a foreigner. Furthermore, the law authorizes the director of national Intelligence and the attorney general to
require private companies to assist in surveillance of foreign intelligence targets. And finally, the amendments provide those firms a broad grant of immunity from lawsuits as a result
of their assistance. Unfortunately these changes were temporary, as the act expires in February 2008. Worse yet, however is a “replacement” measure being pushed by Rep. John
Conyers — the inaptly named “Restore Act of 2007.” This bill, which is rapidly making its way through Congress, represents an aggressive and unhelpful assertion of congressional
authority. It will cripple our nation’s ability to engage in international electronic intelligence gathering and is a powerful argument for why the framers believed the executive must
take the lead in matters of national security.
Instead of maintaining the distinction between foreign and domestic
intelligence , the so-called Restore Act would force both foreign and domestic surveillance to be
reviewed by the Foreign Intelligence Surveillance Court. Not only would this process needlessly
delay and in many instances eliminate altogether the gathering of vital intelligence, it rests on
dubious constitutional grounds as it encroaches on the president’s independent authority to engage
in international surveillance of foreigners without coordination with Congress or courts. Perhaps most
egregiously, this measure would for the first time cover the American military thereby disrupting their access to actionable intelligence even when needed in a battlefield setting.
Congress vs the Supreme Court is critical in determining questions of
decreasing domestic surveillance
NCC 13 --- National Constitution Center Staff (“Podcast: Kerr, Rotenberg on NSA domestic surveillance”,
http://blog.constitutioncenter.org/2013/10/audio-kerr-rotenberg-on-warrantless-surveillance/)//trepka
How should Congress and the Supreme Court settle questions about warrantless
surveillance by the NSA? Does the secret court that rules on NSA cases need reforms? Orin Kerr of George Washington
University and Marc Rotenberg of the Electronic Privacy Information Center joined the National Constitution Center’s Jeffrey Rosen on
Wednesday to discuss these and other critical privacy issues in an audio interview. Under Section 215 of the Patriot Act and measures
extending the act, the National Security Agency is allowed to collect bulk communications records without a warrant. The NSA gets
permission from the secret Foreign Intelligence Surveillance Act court to take such actions, in the form of blanket requests that are
renewed periodically. Rotenberg’s organization, EPIC,
is challenging the legality of the bulk collection of telephone
warrant . Kerr also believes there are problems with Section
215, but the issues should be dealt with by Congress or the FISA court—and not the U.S. Supreme Court.
records under Section 215 without the issuance of a
Page 224
Other CPs
Page 225
Uniqueness CP for Warrants Bad
Courts should remove the warrant requirement for domestic intelligence
gathering
Fenske 8 --- J.D. Candidate (Dan, “ALL ENEMIES, FOREIGN AND DOMESTIC: ERASING THE DISTINCTION BETWEEN
FOREIGN AND DOMESTIC INTELLIGENCE GATHERING UNDER THE FOURTH AMENDMENT”, 102 Nw. U.L. Rev. 343,
Lexis)//trepka
Conclusion Purely
domestic intelligence searches present the confluence of two important factors: the
government's heightened need for information to protect its citizens from terrorist
attacks, and the Supreme Court's reliance on warrants as an integral part of Fourth Amendment
doctrine. The two factors conflict : a warrant requirement hampers the ability of the government to gather the
intelligence it needs to protect its citizens. The Supreme Court, however, could easily alleviate the burden placed on legitimate
intelligence gathering by casting aside the warrant requirement and its attendant probable cause standard when it stands in the way of
gathering information needed to protect against future terrorist attacks or other threats to national security. Warrants are impotent in
deterring or preventing constitutional violations in the intelligence-gathering context while imposing considerable costs on the
government. Bowing to both common sense and the President's constitutional authority, the courts have recognized such an exception in
connection with foreign intelligence. Given
the threat posed by domestic terrorists and the pliant nature of
reasonableness under the Fourth Amendment, the Court should extend an exception to the warrant
requirement for domestic intelligence gathering in light of the government's heightened need
for counterterrorism intelligence.
Page 226
Grounds CP --- FISA
Courts can rule on SOP doctrine, first, or fourth amendment
Plummer 6 --- J.D., Mississippi College School of Law, law clerk for Barnes of the Mississippi Court of
Appeals (Brooke, “Domestic Spying: A Necessity in a Post-9/11 America or an Abuse of Presidential Power?”, Mississippi College Law
Review, Lexis)//trepka
In response to the Government's contention that Hamdi supports the notion that the
AUMF constitutes congressional authorization of the NSA program, the court took special
note of the Hamdi Court's ruling that, although a citizen of the United States may be
detained as an enemy combatant, "such a citizen must be given Fifth Amendment rights to
contest his classification, including notice and the opportunity to be heard by a neutral magistrate." n64 Interpreting this
language as a mandate that the Constitution be followed regardless of any activity authorized by the AUMF, the court
concluded that, even if the AUMF supercedes FISA, the NSA program still violates the
Separation of Powers doctrine and the First and Fourth Amendments to the
Constitution. n65 Finally, with regard to the Government's reliance on the President's inherent authority, the court found that,
because the office of the President of the United States was created by the Constitution, "all
'inherent powers' must derive from that Constitution;" thus, relying again on Hamdi, the court found
[*312]
that the actions of the Executive branch are subject to the First and Fourth Amendments and that, even in times of war, the President is
not free to disregard the explicit requisites of the Constitution. n66 In light of these findings, the court permanently enjoined the NSA
domestic spying program; n67 however, the Sixth Circuit Court of Appeals subsequently stayed the injunctions pending appeal, finding
that the Government had demonstrated "a substantial likelihood of success on the merits." n68
Page 227
Grounds CP --- Health Surveillance
Rule on 4th Amendment
Hoppin 12 --- J.D., New York University School of Law (Margaret, “NOTE: OVERLY INTIMATE SURVEILLANCE: WHY
EMERGENT PUBLIC HEALTH SURVEILLANCE PROGRAMS DESERVE STRICT SCRUTINY UNDER THE FOURTEENTH
AMENDMENT”, 87 N.Y.U.L. Rev. 1950, Lexis)//trepka
TEXT: [*1951] Introduction Lawmakers, academics, and the American public have expressed increasing concern about three features of
government surveillance: comprehensive and intimate surveillance of individuals, the creation of large databases to which sophisticated
data mining techniques can be applied, and the targeting of politically vulnerable domestic communities. To date, concern about
government surveillance and data collection has focused primarily on security surveillance. n1 Comparable recent developments in
government public health surveillance have received little attention in contrast. n2 The history of public health surveillance and
interventions has been extensively studied, n3 but most chapters of that history focus on communicable diseases. n4 The model of public
health surveillance that [*1952] was developed to fight communicable disease has two components: conducting nonconsensual, intimate
surveillance of persons with a particular disease or health condition and maintaining databases of individually-identified information. n5
Historically, this enabled government interventions that prevented the spread of contagious disease. n6 This model was traditionally
justified both by the nature of the risk created by communicable diseases and by the efficacy of government interventions to mitigate
that risk. n7 Today, non-communicable chronic diseases and obesity present the most serious threats to public health and health care
costs, n8 and public health surveillance programs have accordingly begun to target them. n9 Notably,
government agencies
have begun to target non-communicable, chronic diseases through what I call the
"emergent" model of public health surveillance. In the emergent model, the government (i) conducts nonconsensual,
ongoing, and intimate surveillance of a large number of people because they have a non-communicable health condtion and (ii)
maintains individually-identified databases of the information gathered. The problem is that emergent government surveillance
programs invade a very intimate sphere of personal privacy, despite the fact that the original justifications for doing so do not apply to
non- [*1953] communicable, non-exposure related conditions. Moreover, proponents of emergent programs have not articulated a
satisfactory alternative justification for significantly invading the privacy of people with non-communicable health conditions. This Note
has three parts. In Part I, I briefly summarize the salient features of public health surveillance programs in the United States. Against
that baseline, I describe New York City's A1C Registry as the paradigm of emergent public health surveillance and explain why emergent
programs are likely to proliferate. In Part II, I argue that emergent
intrude upon a privacy interest
forms of public health surveillance
that courts should recognize as fundamental for purposes of the Fourteenth
Amendment's Due Process Clause. The argument proceeds in two parts. First, despite
a widespread assumption to the
contrary, judicial precedent does not require highly deferential review of emergent programs.
Although federal courts reviewing privacy-based challenges to public health programs have historically applied deferential standards of
review, n10 those programs differ in essential respects from emergent public health surveillance. Furthermore,
several
opinions suggest that a more stringent standard of review would apply if the scope of
surveillance increased, as I argue that it has. Second, comparable features of security surveillance
programs have raised considerable public concern and have prompted some courts to
expand the scope of privacy protections under the Fourth Amendment . Given the dearth of
commentary on emergent public health surveillance programs, recent Fourth Amendment
jurisprudence and critical commentary developed in the context of security surveillance provide
useful guideposts . In particular, these paradigms help to delineate the privacy interest at stake in emergent public health
surveillance programs. Part II concludes by explaining that, because they infringe upon a fundamental interest, emergent programs
should receive strict scrutiny. In Part III, I propose several factors to include in the constitutional analysis of emergent public health
surveillance programs. Most important, the narrow tailoring requirement that would apply under a strict scrutiny analysis should
examine the likelihood that the public health interventions enabled by the challenged surveillance program are effective. In the context
of non-contagious diseases, efficacy should mean improvement or risk reduction in the health of the population targeted for surveillance.
Applying the proposed analysis to [*1954] New York's A1C Registry, I conclude that the program may
be unconstitutional.
Page 228
K Stuff
Page 229
Legalism Bad
Legal reforms can’t prevent the ever-expanding surveillance state
Lynch 7 --- J.D. (Matthew, “CLOSING THE ORWELLIAN LOOPHOLE: THE PRESENT CONSTITUTIONALITY OF BIG
BROTHER AND THE POTENTIAL FOR A FIRST AMENDMENT CURE”, 5 First Amend. L. Rev. 234, Lexis)//trepka
This Article explores two questions. First, it asks whether the United States Supreme Court's current
interpretation of the Constitution protects us from Big Brother; that is, could a system of government
surveillance on an Orwellian scale - instigated by another major terrorist attack in the United
States - survive judicial scrutiny under current Supreme Court precedent? To answer this question, the
Article evaluates potential challenges to Big Brother under the Fourth , Fifth , and First
Amendments. Disturbingly, it finds that all leave open the possibility of
constitutionality . In other words, under the right conditions and under current precedent, no
constitutional provision stands firmly between American citizens and Big Brother.
Page 230
Terror Talk Bad --- Privacy
Their narrative of terrorists turns the privacy advantage
Lynch 7 --- J.D. (Matthew, “CLOSING THE ORWELLIAN LOOPHOLE: THE PRESENT CONSTITUTIONALITY OF BIG
BROTHER AND THE POTENTIAL FOR A FIRST AMENDMENT CURE”, 5 First Amend. L. Rev. 234, Lexis)//trepka
The setting of George Orwell's 1984 is nothing short of a nightmare , a dystopian vision of a totalitarian world where
democratic values exist in name only, and the near-total absence of privacy bends people's behavior, their conversations, and even their
minds toward the government's will. From an American perspective, Orwell's fictional characters live under a sort of anti-Constitution.
The Framers obviously did not have the benefit of his cautionary tale when they wrote the Constitution and its Bill of Rights, but their
words and explanatory documents reflect the same fears. American courts have never weighed the constitutionality of Big Brother
because the government has never implemented such a surveillance program, at least not on the scale that Orwell imagined. Voters have
never seriously demanded it, and the government has never before possessed the technological means to make it a reality. Now
that
such means are at the government's disposal, Big Brother has never been closer to realization.
From GPS-tracking and satellite-communications intercepts to facial-recognition cameras and
data-mining software, the government has the means to eavesdrop on virtually any facet of human
life. The persistence and growth of clandestine crimes and societal threats - from mere
software pirating to terrorism and drug trafficking - creates pressure and temptation for
government to use this ever-improving technology more broadly . The latent nature of such
crimes, combined with their high publicity, creates such public paranoia that citizens are often
willing to trade liberty for an increased sense of security.
Page 231
Aff Stuff
Page 232
AT: Disease DA
Disease surveillance fails --- structural issues
Phalkey et al 13 --- Institute of Public Health, University of Heidelberg (Revati, also with Shelby Yamamoto and
Michael Marx from the same institution, and Pradip Awate from the Integrated Disease Surveillance Project in Maharashta, “Challenges
with the implementation of an Integrated Disease Surveillance and Response (IDSR) system: systematic review of the lessons learned”,
http://heapol.oxfordjournals.org/content/early/2013/12/20/heapol.czt097.full)//trepka
Introduction: Despite
a realistic strategy and availability of resources, multiple challenges still
overwhelm countries grappling with the challenges of communicable disease surveillance . The Integrated
Disease Surveillance and Response (IDSR) strategy is by far the most pragmatic strategy in resource-poor settings. The objective of this
study was to systematically review and document the lessons learned and the challenges identified with the implementation of the IDSR
in low- and middle-income countries and to identify the main barriers that contribute to its sub-optimal functioning. Methods: A
systematic review of literature published in English using Web of Knowledge, PubMed, and databases of the World Health Organization
(WHO) and the Centers for Disease Control (CDC) between 1998 and 2012 was undertaken. Additionally, manual reference and grey
literature searches were conducted. Citations describing core and support functions or the quality attributes of the IDSR as described by
WHO and CDC were included in the review. Results: Thirty-three assessment studies met the inclusion criteria.
IDSR strategy has been best adopted and implemented in the WHO–AFRO region. Although significant progress is made in overcoming
gaps still exist . Mixed challenges with core and support
IDSR functions were observed across countries. Main issues identified include non-sustainable financial
resources , lack of co-ordination, inadequate training and turnover of peripheral staff, erratic
feedback , inadequate supervision from the next level, weak laboratory capacities coupled with unavailability of job aids (case
definitions/reporting formats), and poor availability of communication and transport systems
the challenges identified with vertical disease surveillance strategies,
particularly at the periphery. Best outcomes in core functions and system attributes were reported when support surveillance
functions performed optimally. Apart from technical and technological issues, human resources and the health care system structures
that receive the IDSR determine its output. Conclusions: The
challenges identified with IDSR implementation are largely
‘systemic’. IDSR will best benefit from skill-based training of personnel and strengthening of the support
surveillance functions alongside health care infrastructures at the district level.
Page 233
AT: Federalism DA
Gay marriage thumps
AP 6/26/15 (“Neb. Lawmakers React to Gay Marriage Ruling”, http://www.knopnews2.com/home/headlines/Neb-LawmakersReact-to-Gay-Marriage-Ruling--310077891.html)//trepka
Today five
Supreme Court Justices created a new constitutional right based upon sexual choices. The
Constitution doesn’t speak , one way or the other, to the question of same-sex marriage. Under our system of
federalism , the definition of marriage as a male-female union is properly a matter of state law. I agree
with Chief Justice Robert’s contention that “The majority’s decision is an act of will, not legal judgment. The right it announces has no
basis in the Constitution or this Court’s precedent.” The
Court overstepped its proper role in our system
of government. Instead of interpreting and applying the law, the Court invented a new
constitutional right . Nothing in the Constitution mandates a nationwide redefinition of marriage. Sadly, the Court
stripped all Americans of our freedom to debate and decide marriage policy through the democratic process. The freedom to
democratically address the most pressing social issues of the day is the heart of liberty. The Court took that freedom from the people.
Triggers precedent links
Hunter 7/2/15 --- Politico (Jack, “Republicans are too angry about gay marriage”,
http://www.politico.com/magazine/story/2015/07/republicans-gay-marriage-angry-119711.html)//trepka
Rand Paul’s libertarian reaction also charted a more tolerant conservative course.
But were Bush, Rubio and Paul’s reactions good enough to drown out the others? What do most Americans—who overwhelming support
gay marriage—think today about the Republicans’ collective response to this court decision? As a libertarian
conservative, I too had concerns about what this court decision could mean for federalism and what
kind of precedent it set. Roberts’ constitutional concerns also give me pause. Still, I was pleased with the outcome. I wrote
on my Facebook page, “All politics aside, I’m very happy for gay Americans and my country today.”
Triggers their 14th amendment links
Shapiro 6/27/15 --- senior fellow in constitutional studies and editor-in-chief of the Cato Supreme Court
Review at The Cato Institute (Ilya, “Gay Marriage Is Here. Now What?”, http://thefederalist.com/2015/06/27/gay-marriage-ishere-now-what/)//trepka
Just because today’s opinion was expected by nearly everyone doesn’t make it any less momentous. In sometimes-soaring
rhetoric
Kennedy explains that the Fourteenth Amendment’s guarantee of both substantive liberty
and equality means there is no further valid reason to deny this particular institution, the benefit of
these particular laws, to gay and lesbian couples. Okay, fair enough: there’s a constitutional right for gay and lesbian couples to
get marriage licenses—at least so long as everyone else gets them. (We’ll set aside the question of why the government is involved in
marriage in the first place for a later time.)
Page 234
AT: Warrants Bad DA
Warrants are required for domestic intelligence now --- takes out their disad
Fenske 8 --- J.D. Candidate (Dan, “ALL ENEMIES, FOREIGN AND DOMESTIC: ERASING THE DISTINCTION BETWEEN
FOREIGN AND DOMESTIC INTELLIGENCE GATHERING UNDER THE FOURTH AMENDMENT”, 102 Nw. U.L. Rev. 343,
Lexis)//trepka
Despite the unanimity of judicial opinion that a warrant is not required for foreign intelligence
searches, n56 the Supreme Court has not extended the warrant exception to the
domestic intelligence arena . Instead, its 1972 decision in the Keith case remains the
controlling authority governing domestic intelligence searches. n57 In Keith, the Attorney General authorized warrantless
electronic surveillance of three individuals who the government believed were involved in a conspiracy to blow up government property
and who were ultimately indicted for such activity. n58 The defendants moved to suppress the evidence obtained through this warrantless
surveillance, and the district court granted their motion. n59 Before the Supreme Court, the government argued that the wiretaps were
required "to gather intelligence information deemed necessary to protect the nation from attempts of domestic organizations to attack
and subvert the existing structure of the Government," n60 [*354] and that because of this, the surveillance was a "reasonable exercise of
the President's power ... to protect the national security." n61 The Court held that the searches at issue were unconstitutional because they
were conducted without a warrant. n62 The Court reasoned that the ultimate issue was "the "reasonableness' of the search ... in question,
and the way in which that "reasonableness' derives content and meaning through reference to the warrant clause." n63 With this warrant
presumption as the backdrop, the Court turned to the President's constitutional authority. Justice Powell, writing for the Court, found
that "implicit in [the President's duty to preserve, protect and defend the Constitution of the United States] is the power to protect our
Government against those who would subvert or overthrow it by unlawful means," n64 and that electronic surveillance could be a vital
tool in such an endeavor. n65 Powell also noted that numerous Presidents since Harry Truman had sanctioned similar surveillance. n66
Although acknowledging the seriousness of domestic threats and the need of the government to have the means necessary to combat
them, Powell observed that there is, "understandably, a deep-seated uneasiness and apprehension that this capability will be used to
intrude upon cherished privacy of law-abiding citizens." n67 Powell also pointed out that national security surveillance can implicate
freedom of expression protected by the First Amendment and may thus require greater scrutiny under the Fourth Amendment n68:
"History abundantly documents the tendency of Government - however benevolent and benign its motives - to view with suspicion those
who most fervently dispute its policies." n69 With these competing interests in mind, Powell concluded that the issues were "whether the
needs of citizens for privacy and free expression may not be better protected by requiring a warrant before such surveillance is
undertaken" n70 and "whether a warrant requirement would unduly frustrate the efforts of Government to protect itself from acts of
subversion and overthrow directed against it." n71 The
Court bluntly found that the Fourth Amendment interests
could not be adequately protected without warrants because the Executive may improperly
give greater weight to its need to [*355] gather incriminating information than to the privacy
interests of citizens. n72 The " inherent vagueness of the domestic security concept," n73 the breadth of the
reach of intelligence gathering, and its potential to stifle political dissent , Powell explained, all counseled
against an exception to the warrant requirement for domestic intelligence gathering. n74
Page 235
AT: Mosaic DA --- No I/L
Courts defer to other agencies regarding mosaic theory
Davis and Albert, 11
(Charles and Michelle, Professor of Journalism at University of Missouri, April 2011, Vol. 25, No. 2,
Continuum: Journal of Media & Cultural Studies, “Using secrecy to fight terrorism? Access, homeland
security, and the ‘mosaic theory’ as a rationale for closure”, EbscoHost, amp)
The court ruled in favour of US Customs, and when Coastal filed a narrowed FOIA request
later, US Customs claimed there were no documents that fit the parameters of the narrowed
request, and the motion was denied. In the written opinion, the court cites its hesitancy to
disclose the requested information because ‘the information requested, in combination with
other information, could reasonably be used to circumvent the law’ (Coastal Delivery Corp. 2003).
This is a fine example of the ‘mosaic theory’ at work: the ‘other information’ referred to by the court
is not specified; neither is how the law could possibly be circumvented by the combination of information.
The records of package examinations at a Long Beach seaport, combined with unknown bits of information,
could put the seaport and perhaps other ports in jeopardy. In this case, given the vague, suggestive wording
of the court’s opinion, the claim seems far-fetched. But the mosaic theory is not something the
courts usually question. Indeed, the entire concept of the mosaic theory evades any easy
judicial classification, as it relies on secrecy to justify greater secrecy, and rejects by its very
imposition attempts at specificity (Wells 2006).
Mosaic theory received judicial deference from its first appearance in US court law. In the
decision for US v. Marchetti (1972), the mosaic theory was used to prevent a CIA agent from publishing a tellall book. Chief Judge Clement Hayworth cited that in terms of mosaic theory, judges should
defer to agency expertise and avoid review completely. This created a precedent for mosaic
theory in court. Post-9/11, FOIA law was deemed a liability to national security, as it could release
information that could be combined with other information with dangerous results. In 2003, President Bush
issued executive order 13292, which rescinded President Clinton’s limitation to President Reagan’s 1982
executive order, which wrote mosaic theory into law. Bush’s order reintroduced presumption of harm to
national security from the release of information related to foreign governments and permitted the
reclassification of previously declassified information in the name of national security (Pozen 2005).
Precedent cements judicial deference
Pozen, 5
(David, JD Yale Law School, M. Sc. Oxford University, 2007, Yale Law Journal, “The Mosaic Theory,
National Security, and the Freedom of Information Act”,
http://www.yalelawjournal.org/pdf/358_fto38tb4.pdf, amp)
Taken together, then, Marchetti, Halkin, and Halperin, in introducing the mosaic theory to
use it to bolster judicial deference on two levels: They present the
theory as a general reason for courts to fear disclosure and mistrust their own judgment; and they
treat mosaic arguments as a unique rationale for nondisclosure, with lower requirements
for specificity and support. The opinions’ bracing rhetoric, moreover, tints the theory with an element of
mystery and malice. This logic and language continue to undergird mosaic theory
jurisprudence, as essentially every subsequent opinion applying the theory has cited Marchetti, Halkin,
national security law,
and/or Halperin as key precedent, often excerpting the passages quoted above.
Page 236
AT: Mosaic DA --- Privacy Turn
Triggering judicial resolution of mosaic theory is key to privacy
Gray and Citron, 13
(David--Associate Professor, University of Maryland Francis King Carey School of Law, Danielle Keats--Lois
K. Macht Research Professor of Law, University of Maryland Francis King Carey School of Law, Affiliate
Scholar, Stanford Center on Internet and Society, Affiliate Fellow, Yale Information Society Project, North
Carolina Journal of Law & Technology, Spring 2013, 14 N.C. J.L. & Tech. 381, “ARTICLE: A Shattered
Looking Glass: The Pitfalls and Potential of the Mosaic Theory of Fourth Amendment Privacy”, lexis, amp)
This Article has attempted to advance debates after United States v. Jones about the conceptual, doctrinal,
and practical issues that attend the mosaic theory of Fourth Amendment privacy. The discussion has not
produced a clear conclusion. Rather, the goal has been to elaborate the major objections raised against the
mosaic theory to provide guidance for mosaic advocates. Although it is beyond the scope of the present
the core insights that drive the theory warrant
that further development. 253 At its core, the mosaic theory documents perfectly
reasonable expectations that we will not be forced to live in a surveillance state or to abide
constant, indiscriminate surveillance conducted by the Government or its private proxies. 254
That this expectation has firm footing in the Fourth Amendment we take to be a proposition
that is constitutionally unproblematic. 255 The devil may well be in the details, but to the extent the
mosaic theory is understood as a way to conceptualize these privacy interests and corollary
privacy harms, the game is well worth the candle .
Article to advance a mosaic-based proposal,
Page 237
AT: Mosaic DA --- AT: Law/Terror
Judicial mosaic theory rulings carve out a balanced role for mosaic making
that preserves law enforcement—public solves terrorism info gathering
Pozen, 7
(David, JD Yale Law School, M. Sc. Oxford University, 2007, Yale Law Journal, “The Mosaic Theory,
National Security, and the Freedom of Information Act”,
http://www.yalelawjournal.org/pdf/358_fto38tb4.pdf, amp)
Courts should, moreover, consider the flip side of the mosaic theory: Just as the NSA connects
the dots for counterterrorism, the public too can mosaic-make, and thereby respond more
intelligently to threats. Likewise, courts should consider not only how information
technologies might facilitate adversarial mosaic-making, but also how they might combat
such activity. Finally, judges would benefit from a new tool, special masters with intelligence backgrounds,
when faced with particularly speculative mosaic arguments.
The mosaic theory deserves a central place in information-control policy, but a carefully
Conscientious
judges can restore reason and moderation to the theory's use. No one else
will .
circumscribed place; there are serious costs to overusing as well as underusing it.
Page 238
AT: Ex Post CP
Can’t solve racism
Fenske 8 --- J.D. Candidate (Dan, “ALL ENEMIES, FOREIGN AND DOMESTIC: ERASING THE DISTINCTION BETWEEN
FOREIGN AND DOMESTIC INTELLIGENCE GATHERING UNDER THE FOURTH AMENDMENT”, 102 Nw. U.L. Rev. 343,
Lexis)//trepka
In short, although
preventing invidious racial discrimination is a legitimate concern in the
intelligence-gathering domain, warrants do little to solve the problem while imposing real costs. To be sure, ex
post review by courts and political responses have frequently proven insufficient to
protect minorities from discrimination . Undoubtedly more than just lawsuits or political pressure is needed
to combat racism in intelligence gathering. What is important for the purposes of this Comment, however, is merely that
warrants offer few marginal benefits compared to after-the-fact judicial review.
Page 239
AT: Funneling CP
Funneling fails --- it’s not credible and no one can act based on the
information
Kitrosser 8 --- Associate Professor @ University of Minnesota Law School (Heidi, “THE DOMESTIC
COMMANDER IN CHIEF: CONGRESSIONAL OVERSIGHT OF NATIONAL SECURITY ACTIVITIES: IMPROVING INFORMATION
FUNNELS”, 29 Cardozo L. Rev. 1049, Lexis)//trepka
This Article agrees that funneling
is a theoretically and practically important means of reconciling secrecy and openness needs but
contends that funneling has not, in fact, been taken seriously enough. The purpose and utility of funneling have been underexplored, and funneling's propriety and implications thus are poorly understood. Questions remain, for example, over whether funneling
requirements infringe on the separation of powers and thus need not always be obeyed. n7 And it
is uncertain what if
anything should follow from information funneling - whether, for example, those with whom
information is shared should be able to take some action in response to what they learn. n8
Disclosure undermines democratic deliberation --- that devastates rule of law
Kitrosser 8 --- Associate Professor @ University of Minnesota Law School (Heidi, “THE DOMESTIC
COMMANDER IN CHIEF: CONGRESSIONAL OVERSIGHT OF NATIONAL SECURITY ACTIVITIES: IMPROVING INFORMATION
FUNNELS”, 29 Cardozo L. Rev. 1049, Lexis)//trepka
b. Democratic Deliberation and Related Values The other major value invoked in debates about national security disclosures can be
called democratic deliberation. This value encompasses at least three different types of deliberations: intra-executive branch
deliberations, deliberations between Congress and the executive branch, and deliberations that include the public. Unlike national
security, democratic deliberation is not necessarily an end in itself. On the one hand, one can draw upon political and constitutional
theory for the view that public knowledge, dialogic participation and input through voting has intrinsic value. n106 Similarly, interbranch dialogue - and to a lesser extent intra-branch dialogue - can contribute to intrinsically valuable public knowledge and
participation by generating and spreading information and dialogue that might make its way to the public. Furthermore, to the extent
that ours is not a direct democracy but a system in which voters are represented by deliberating government branches, deliberations
within and among these branches may have intrinsic value. On the other hand, democratic deliberation of all three kinds can be
instrumental means of reaching other values, including national security, by increasing the intellectual input that goes into decisionmaking. Democratic
deliberation also can contribute to the rule of law by spreading knowledge of illegalities
that might then be challenged politically or in courts. i. Arguments Against Disclosures A common deliberation-based argument against
less likely to be
candid, robust and productive when participants know that their statements may be shared
disclosures is the candor argument discussed earlier. n107 That is, disclosures and related discussions are
with others. This [*1069] argument can take both instrumental and intrinsic forms that parallel those made about democratic
deliberation generally. Instrumentally, the argument is that decision-making
quality will be compromised by
stunted deliberations . This can negatively impact national security or other ends toward
which the decision-making is directed. One also might find intrinsic value, in an indirect democracy, in robust, candid
exchanges within government branches.
Rule of law is an impact filter --- solves the escalation of nuclear war
Rhyne ’58 [(Former President of the American Bar Assosciation). “Law Day Speech for Voice of America; Text of the original radio
broadcast by Charles S. Rhyne Delivered on the first Law Day, May 1, 1958” http://www.abanet.org/publiced/lawday/rhyne58.html
//wyo-jamie]
rule of law has enabled [hu]mankind to live together peacefully within nations
and it is clear that this same rule of law offers our best hope as a mechanism to achieve and maintain
peace between nations. The lawyer is the technician in man’s relationship to man. There exists a worldwide
challenge to our profession to develop law to replace weapons before the dreadful holocaust of nuclear
war overtake our people.
History teaches that the
Page 240
AT: Legislation CP
Congressional restraints do nothing in the face of broader NSA surveillance
CFDP 13 --- Center for Foreign and Defense Policy (“International Anger Grows Over NSA Spying”, http://www.foreignpolicy.us/international-anger-grows-over-nsa-spying/)//trepka
WASHINGTON, October 26, 2013 — The National Security Administration exists to gather information. It does this mostly by electronic means. This does not mean it has any justification for hacking Angela Merkel’s
cell phone or looking through the bank data of European citizens.
Documents released by Edward Snowden show an NSA acting without
restraint . It goes far beyond anything that should have been authorized and seems to include extensive monitoring of millions of phone calls and
emails every month in friendly countries. Almost every day another story breaks about outrage in other countries over the extent of the NSA’s intrusion into the communications privacy of their citizens, businesses and
political leaders. The level of outrage generated by these practices is still growing, but has already resulted in formal complaints from key American allies like Germany, France, Mexico and Brazil. The European
Parliament has held a hearing on NSA spying and has threatened to withdraw support for the Terrorist Finance Tracking Program if it was a factor in NSA intrusion into European bank records. While wiretaps and data
surveillance of United States citizens are theoretically limited by FISA,
it places no restrictions on U.S. intelligence gathering
operations overseas . We have already seen the NSA ignore these restrictions within our own borders, and with even
fewer limits on their operations in Europe
, it has apparently been unrestrained even by common sense in its intelligence gathering. Common
sense suggests that the NSA at least respect the privacy rights guaranteed to citizens of allied countries as they would those of U.S. citizens. The rights described in the Bill of Rights are not exclusive to American citizens.
They are just a codification of universal rights which are recognized by the United Nations, the European Union, and most civilized countries. Foreign citizens who are outraged about the NSA’s snooping in their
communications are justifiably angry, and more so in the case of their political leaders whose communications are sensitive and should be granted appropriate respect. The German chancellor, members of the European
Parliament and the President of France are not terrorist or criminal suspects, yet their communications have been monitored just like those of more common citizens of their countries. The NSA has apparently hacked
former Mexican President Felipe Calderon’s email, as well as emails of other elected officials in that country. Mexico is lodging a formal protest with the United States government. France’s interior minister, Manuel
Vallas, described the revelations as “shocking” and said that “such practices, if proven, do not have their place between allies and partners.” Chancellor Angela Merkel of Germany said that “Spying among friends is never
acceptable.” She called President Obama personally after hearing that her cell phone may have been targeted and hacked by the NSA. French Prime Minister Jean-Marc Ayrault asked for the issue to be added to the
agenda of the meeting of the European Commission. EC Vice President Vivianne Reding expressed the opinion that “Data protection must apply to everyone — whether we are talking about citizens’ e-mails or Angela
Merkel’s mobile phone.” She is pushing for the adoption of Europe-wide legislation to protect the rights of all citizens from unwarranted surveillance by any government. Dutch Prime Minister Mark Rutte characterized
the NSA surveillance of European citizens as “not acceptable.” Finnish Prime Minister Jyrki Katainen asked the United States to provide “a guarantee that this will never happen again.” Brazil’s Foreign Minister Antonio
Patriota expressed “deep concern at the report that electronic and telephone communications of Brazilian citizens are being the object of espionage by organs of American intelligence,” and said that Brazil would seek
U.N. intervention to protect the privacy rights of citizens. Brazilian President Dilma Rousseff cancelled an official visit to Washington because of the scandal. Some anger has also been directed at countries like Sweden
and Great Britain, which have cooperated with the NSA or provided locations for their communications monitoring facilities. The NSA was established in an earlier era when mass communication was much more
primitive and limited. When it invaded someone’s privacy, it was almost always with a clear objective and usually with specific accountability and oversight. As technology has become more advanced and more
integrated, the NSA’s ability to acquire information has grown beyond anything that could have been imagined a generation ago, and the agency seems to have developed the ethos that if something can be done, then
they should do it. We have a Constitution and laws because sometimes people don’t know where to draw sensible limits on their actions. The prohibitions in the Bill of Rights are broad and inclusive. They ought to be
enough, but sometimes when new crimes or abuses of power are invented, we need new laws to apply the general ideas of the Bill of Rights to a specific situation. If there were ever a time to write a specific law protecting
privacy rights from government intrusion, this is it. This administration and
Congress have paid little attention to the protests of citizens within the United States. A huge rally
is scheduled for Saturday on the national mall, organized by over 100 public interest groups to draw attention to this issue. Yet the only member of Congress speaking is Republican Representative Justin Amash, who has
become well known as a champion of privacy rights. Where is Judiciary Committee Chairman Bob Goodlatte, whose hearings on the NSA this summer seem to have been designed to brush this issue under the rug?
Alienating friendly nations around the world because we have violated the rights of their citizens and their leaders and threatened their own national security could rapidly become a serious problem. Maybe if our
government will not listen to the complaints of our own citizens, it will respond to pressure from our unhappy friends and allies overseas. No one likes what
the NSA has become. It has
exceeded its mandate . It has violated the Bill of Rights. It has violated international law.
Only Supreme Court rulings solves surveillance --- otherwise constitutional
justifications will allow circumvention
AP 2014 (Kimberly Dozier, “US spy court: NSA to keep collecting phone records”, http://phys.org/news/2014-01-spy-court-nsa.html)//trepka
secretive U.S. spy court has ruled again that the National Security Agency can keep collecting every
American's telephone records every day, in the midst of dueling decisions in two other federal courts about whether the
(AP)—A
surveillance program is constitutional. The Foreign Intelligence Surveillance Court on Friday renewed the NSA phone collection
program, said Shawn Turner, a spokesman for the Office of the Director of National Intelligence. Such periodic requests are somewhat
formulaic but required since the program started in 2006. The latest approval was the first since two conflicting court decisions about
whether the program is lawful and since a presidential advisory panel recommended that the NSA no longer be allowed to collect and
store the phone records and search them without obtaining separate court approval for each search. In a statement, Turner said that 15
judges on the U.S. Foreign Intelligence Surveillance Court on 36 occasions over the past seven years have approved the NSA's collection
of U.S. phone records as lawful. Also Friday, government
lawyers turned to U.S. Court of Appeals for the District
that threatens the NSA phone records program. The opposing
lawyer who spearheaded the effort that led to the ruling said he hopes to take the issue directly to the
of Columbia Circuit to block one federal judge's decision
Supreme Court . The Justice Department filed a one-page notice of appeal asking the appeals court to overturn U.S. District
Judge Richard Leon's ruling last month that the program was likely unconstitutional. The government's move had been expected. Larry
Klayman, who filed the class-action suit against President Barack Obama and top administration national security officials, said he
intends to petition the federal appeals court next week to send the case directly to the Supreme Court. Klayman said the move was
justified because the NSA case was a matter of great public importance. "There are exigent circumstances here," Klayman said. "We can't
allow this situation to continue. The
NSA's continuing to spy on everybody." Turner said U.S. intelligence agencies would
Page 241
be willing to modify the phone records surveillance program to provide additional privacy and civil liberties protections as long as it was
still operationally beneficial. He said the Obama administration was carefully evaluating the advisory panel's recent recommendations.
Judges sitting on the secretive spy court have repeatedly approved the program for 90-day periods. They also have
repeatedly
upheld the constitutionality of the program—a judicial bulwark that held strong until Leon's surprise decision last
month. Leon said the NSA's program was "almost Orwellian ," a reference to writer George Orwell's futuristic novel
"1984," and that there was little evidence the operation had prevented terrorist attacks. He ruled against the government but agreed to
postpone shutting down the program until the government could appeal. In a separate case involving the same NSA phone records
program, a district judge in New York last month upheld the government's data collection as lawful. The American Civil Liberties Union,
which lost that case, said this week it will appeal to a federal appeals court in New York.
The NSA empirically ignores Congressional legislation to end surveillance
ZenMate 7/11/15 (“Secret Court Ignores Congress”, https://blog.zenmate.com/secret-court-ignores-congress/)//trepka
On June 29, a
secret court ruled that a federal court and Congress were wrong to end the NSA's bulk
collection of phone metadata; therefore, the mass surveillance can carry on as before — for now.
National Journal reports: "The Foreign Intelligence Surveillance Court [FISC] approved a government request to renew the dragnet
collection of U.S. phone metadata for an additional five months. In his opinion, FISC judge Michael W. Mosman ruled, “Second Circuit
rulings are not binding on the F.I.S.C. and this court respectfully disagrees with that court’s analysis, especially in view of the intervening
enactment of the U.S.A. Freedom Act.” That’s right. The
government to spy on citizens, gave
court, established specifically to judge the merits of applications by the
a green light to the NSA to keep spying on Americans, ignoring
completely the fact that Congress cut off the bulk surveillance
the people, and the plain language of the Fourth Amendment to the Constitution.
program on June 1, the will of
The NSA will lie to Congress --- empirics
Fung 14 --- WashPost (Brian, “Darrell Issa: James Clapper lied to Congress about NSA and should be fired”, https://www.washingtonpost.com/blogs/theswitch/wp/2014/01/27/darrell-issa-james-clapper-lied-to-congress-about-nsa-and-should-be-fired/)//trepka
A group of congressmen led by Rep. Darrell Issa (R-Calif.) is pushing for President Obama to fire James
Clapper, the
director of national intelligence , who they say misled Congress about the extent of the NSA's
surveillance activity. The lawmakers called Clapper's position "incompatible" with the administration's effort to restore trust
in the NSA, according to a letter sent to the White House Monday. The group is mostly Republican, but includes one Democrat, Rep.
Alan Grayson (Fla.). "Director
Clapper continues to hold his position despite lying to Congress
under oath about the existence of bulk data collection programs in March 2013," the letter reads.
"Asking Director Clapper, and other federal intelligence officials who misrepresented programs to Congress and the courts, to report to
you on needed reforms ... is not a credible solution." Last year at a hearing on surveillance, Sen. Ron Wyden asked Clapper whether the
NSA collected "any type of data at all on millions or hundreds of millions of Americans” — to which Clapper said "No, sir ... not
wittingly.” Monday's letter to Obama also called out the administration for not addressing what it called the NSA's attempts to
circumvent and undermine encryption standards that protect secure online communications, an issue that civil liberties advocates have
also addressed in the wake of Obama's NSA reform speech this month.
Page 242
AT: Oversight CP --- FISA
Oversight fails --- perceived as a rubber stamp
Pike 7 --- J.D. from Hofstra (Josh, “THE IMPACT OF A KNEE-JERK REACTION: THE PATRIOT ACT AMENDMENTS TO THE
FOREIGN INTELLIGENCE SURVEILLANCE ACT AND THE ABILITY OF ONE WORD TO ERASE ESTABLISHED CONSTITUTIONAL
REQUIREMENTS”, 36 Hofstra L. Rev. 185, Lexis)//trepka
To remedy these noted abuses, Senator Leahy recommended more effective congressional
oversight , in addition to the increased FBI resources and tools to effectively conduct its
domestic counterterrorism measures. n221 Though the Senator's suggested remedies would help to resolve the
problem, due to the recurrence of the FBI's abuse of power, congressional oversight alone is
not a sufficient remedy. To permanently resolve the issues noted, further procedural
safeguards , such as those suggested in Part VI.A, are required to ensure that the FISA court operates
as an intrusive and thorough check of the FBI's FISA applications rather than a rubber
stamp for the abuse of American's civil liberties. n222
Page 243
AT: Oversight CP --- Generic
Oversight fails --- gets co-opted
Ackerman 13 --- national security editor for Guardian US (Spencer, “Intelligence committee urged to explain if they
withheld crucial NSA document”, http://www.theguardian.com/world/2013/aug/14/nsa-intelligence-committee-under-pressuredocument)//trepka
"The
congressional committees charged with oversight of the intelligence community have long been
captive to, and protective of, the intelligence agencies," said Danielle Brian, executive director of the Project on
Government Oversight. "Many of the congressional staff, in fact, come from those agencies . This latest
revelation demonstrates
the harm caused by that conflict of interest. When the congressional oversight
committee is more loyal to the agency it oversees than to the legislative chamber its members were
elected to serve in, the
public's interest is seriously compromised ." Aftergood made a similar institutional
is a deeper failure here by the intelligence oversight committees to accurately
represent the range of opinions on intelligence policy," he said. "Even post-Snowden, HPSCI held
one open hearing on surveillance policy with no witness providing a critical perspective. Over
point. "There
in the Senate, the
[Senate intelligence committee] has held no open hearings on the subject.
Oversight fails --- Congress falls in line with the executive
Sugiyama and Perry 6 --- J.D.s from UMich Law School (Tara and Marisa, “THE NSA DOMESTIC SURVEILLANCE
PROGRAM: AN ANALYSIS OF CONGRESSIONAL OVERSIGHT DURING AN ERA OF ONE-PARTY RULE”, 40 U. Mich. J.L. Reform
149, Lexis)//trepka
B. Alternatives and Suggestions for Improvement Congress
possesses many alternatives to the fire-alarm model for
conducting oversight, n259 but members of Congress are unlikely to use these methods unless they somehow
advance the goals of the party in power. As the 2006 midterm elections approach and Democrats seek to shift the balance
of power in their favor, they should seek to mobilize interest groups and their political constituencies to press for answers about the NSA
surveillance program. Rather than using the most politically contentious methods of oversight, such as censure or calling for an
independent counsel, minority members need to find creative approaches to oversight that may allow both parties to benefit.
Bipartisanship often works most effectively when the goals of the majority and minority align. For example, Congress held hearings
about the intelligence leading to the Iraq war arguably because both parties stood to gain political ground. n260 With the NSA
surveillance program, however, the administration has polarized the issue by framing it in terms of
security . This approach plays on public fears of terrorism and targets those who seek to
challenge the authority of the administration. If Democrats could successfully reframe the issue in a way that serves the
national
political agenda of the majority, they could potentially achieve greater oversight of the NSA program.
Circumvention decks CP solvency
Kitrosser 8 --- Associate Professor @ University of Minnesota Law School (Heidi, “THE DOMESTIC
COMMANDER IN CHIEF: CONGRESSIONAL OVERSIGHT OF NATIONAL SECURITY ACTIVITIES: IMPROVING INFORMATION
FUNNELS”, 29 Cardozo L. Rev. 1049, Lexis)//trepka
Yet one
can infer a sub-textual argument that the Constitution demands leeway for the
President to circumvent statutory disclosure requirements that he deems antithetical to national
Page 244
security. This point follows from the administration's support generally for a strong constitutional executive
privilege to keep secrets. n42 The point also seems implicit in the administration's many references to the need for secrecy
regarding the warrantless surveillance program's existence. The administration makes such arguments with respect
both to Congress as a whole n43 and to the full intelligence committees' memberships. n44 The arguments are relevant to the
[*1056] administration's statutory disclosure obligations only if they either justify invoking a statutory exemption from disclosure or if
the administration unilaterally may adjust its disclosure obligations as it deems necessary. Considering that the administration
references the need for secrecy about the program regularly and generally - apart from its statutory interpretation point, - and
considering the administration's support for executive privilege, its references seem at least partly to reflect the view that it
constitutionally may circumvent disclosure obligations as it deems necessary.
Won’t comply --- empirics
Kitrosser 8 --- Associate Professor @ University of Minnesota Law School (Heidi, “THE DOMESTIC
COMMANDER IN CHIEF: CONGRESSIONAL OVERSIGHT OF NATIONAL SECURITY ACTIVITIES: IMPROVING INFORMATION
FUNNELS”, 29 Cardozo L. Rev. 1049, Lexis)//trepka
The warrantless surveillance controversy thus reflects at least two sets of problems with the existing system of information
sharing. First, administrations
do not necessarily comply with statutory directives to share information,
and individual congresspersons may acquiesce in, even facilitate , such noncompliance. These phenomena appear grounded in the view that the Constitution gives the President discretion not to comply or at
least in the view that this constitutional interpretation is politically acceptable, even popular, and that challenging it poses political
dangers. Even
where Congress attempts to balance secrecy's dangers and benefits through
funneling requirements, then, such requirements are unlikely to be consistently effective . A
strong defense of Congress' constitutional prerogative to impose information disclosure requirements thus is in order. Second, while
there seems to be broad agreement that information funneling of some kind is a desirable tool, there has been relatively little care paid to
the details of such funneling and to the principles that should underscore those details. This problem is manifest in disputes between the
administration, which argues that its briefings to the Gang of Eight about the warrantless surveillance program were meaningful, and
administration opponents who charge that such briefings were mere "check the box" exercises that offered no avenue for responsive
congressional action. The problem similarly is manifest in disputes over the sufficiency of disclosures by the administration after the
[*1061] program came to the public's attention.
Congressional oversight devastates national security
Kitrosser 8 --- Associate Professor @ University of Minnesota Law School (Heidi, “THE DOMESTIC
COMMANDER IN CHIEF: CONGRESSIONAL OVERSIGHT OF NATIONAL SECURITY ACTIVITIES: IMPROVING INFORMATION
FUNNELS”, 29 Cardozo L. Rev. 1049, Lexis)//trepka
1. Secrecy's
Costs and Benefits in the Context of Congressional Oversight of National Security
Activities It is hardly news that secrecy has costs and benefits. n90 What is striking about these costs and benefits is that they often
consist not only of competing values (e.g., democratic openness versus national security) but also of competing means of achieving the
same value (e.g., national security through openness versus national security through secrecy). n91 Additionally, inter-value and intravalue competition can exist and impact one another simultaneously. For example, openness paradoxically can be furthered by secrecy to
the extent that candor may more likely emerge in a closed, confidential conversation than in a public one. At the same time, the degree to
which confidentiality furthers candor may fluctuate with the extent to which those disclosing information believe (or credibly can argue)
that wider disclosures would harm national security. This example also raises the question of whether the openness fostered by
confidentiality serves related ends such as accountability or security, or whether the secretive nature of the disclosures stymies their
ability to further ends beyond themselves. The various values at stake - whether competing against one another or generating
competition over the best means to achieve the same value - can be grouped into two rough categories. As indicated [*1065] by the
immediately preceding examples, those categories are national security and democratic deliberation. Subsections (a) and (b) elaborate
on the contents of each category and major arguments regarding how secrecy advances and inhibits each one. a. National Security and
Related Values The protection of national security is a key value invoked in debates over the advisability of sharing information with
Congress. n92 The value encompasses the protection of national security and means toward that end. Such means might include, for
Page 245
example, ensuring efficiency and sound judgment in national security operations, facilitating the cooperation of allied nations and the
support of the American people, and preventing enemies of the nation from learning information that could help them in their anti-U.S.
operations. i. Arguments against Disclosure Throughout history, members of the executive branch have argued that national
security would be harmed by their acquiescing to congressional requests for
information . n93 The potential reach of such arguments is exemplified by claims that publicly debating wartime
strategy with Congress threatens national security by undermining troop morale and
popular support. n94 Another argument made against information disclosures is that disclosures hinder the
efficacy of internal executive branch operations and deliberations and thus ultimately hurt
national security. n95 This is a subset of more general executive branch concerns to the effect that candor and efficacy in intraexecutive branch deliberations are impacted negatively by participants' awareness that they might be disclosed. n96 Of course, the most
intuitive and ubiquitous argument for withholding information is that the information could help enemy nations, persons or
organizations. It follows that the
information must remain a closely guarded secret to prevent it from
falling into enemies' hands . This argument pervades political discourse over the recent NSA surveillance controversies.
As noted earlier, for example, the Bush [*1066] Administration argues that it could not have sought specific legislation to authorize the
warrantless surveillance program without "informing our enemies about what we are doing and how we are doing it." n97 And they
claim that national security has been damaged by press reports on the program, as such reports "remind" the enemy that "we are
involved in some kind of surveillance." n98
Reports don’t happen often enough
Mehta 7 --- J.D., Harvard Law (Jason, “ASSESSING THE ELECTRONIC SURVEILLANCE MODERNIZATION ACT (ESMA):
DISTORTING, RATHER THAN BALANCING, THE NEED FOR FLEXIBLE ELECTRONIC SURVEILLANCE AND ROBUST
CONGRESSIONAL OVERSIGHT”, 12 J. Tech. L. & Pol'y 225, Lexis)//trepka
E. Revision of Congressional Oversight Provisions One of the express goals of ESMA is to provide greater congressional oversight to the
President's use of domestic surveillance. ESMA
envisions a greater role for Congress in several ways. First, ESMA would
require that, semiannually, the Attorney General " fully inform the Permanent Select Committee on
Intelligence of the House of Representatives and the Select Committee on Intelligence of the Senate
on electronic surveillance conducted without a court order." n71 Currently, there is no statutory
requirement mandating this report to Congress. Second, ESMA would enhance congressional oversight by
amending the National Security Act of 1947. n72 In particular, ESMA would amend section 413 of the Act to affirmatively allow the Chair
of each of the congressional intelligence committee to inform, on a bipartisan basis, "all members or any individual members of such
committee, and any essential staff of such committee" of a report submitted under 50 U.S.C. §§ 413(a) or (b) ("Reporting of intelligence
activities other than covert actions," "Presidential approval and reporting of covert actions"). n73 Similarly, ESMA
would amend
sections 413(a) and 413(b) to allow for similar sharing and consultation among congressional
intelligence committees. This replaces the current system where only the Chair and Vice-Chair receive this information.
Ostensibly, ESMA's drafters included these provisions to ensure bipartisan information exchange.
Page 246
AT: Oversight CP --- Health Monitoring
Regulation alone can’t solve oppression
Hoppin 12 --- J.D., New York University School of Law (Margaret, “NOTE: OVERLY INTIMATE SURVEILLANCE: WHY
EMERGENT PUBLIC HEALTH SURVEILLANCE PROGRAMS DESERVE STRICT SCRUTINY UNDER THE FOURTEENTH
AMENDMENT”, 87 N.Y.U.L. Rev. 1950, Lexis)//trepka
3. Targeting Politically Vulnerable Domestic Communities Security
surveillance programs that target politically
vulnerable domestic communities for dragnet surveillance have prompted widespread
concern in the last decade, although legal challenges to national security programs generally have not reached a decision on the
merits. n141 For example, politicians and advocacy groups responded promptly to the revelation that New York City Police Department
surveillance programs targeted Arab and Muslim communities in the Northeast. n142 Some politicians publicly declared that the
programs were "disturbing" and said they would not have allowed such a [*1979] program if they had known about it. n143 Academics and
academic institutions expressed similar concern and criticism. n144 Community leaders petitioned the New Jersey Attorney General to
investigate a New Jersey-based surveillance program and give "a full accounting" of ongoing surveillance. n145 In the context of security
surveillance, one commentator advocates robust constitutional privacy protections because "legislative
efforts to regulate
surveillance may ... insufficiently protect the privacy of certain politically unpopular minorities,
like Muslim-Americans." n146 Like Arab and Muslim Americans in the security surveillance context,
n147 people with diabetes, obesity, and certain other chronic conditions are politically vulnerable
in the health surveillance context. Diabetes " disproportionately affects black and Latino New
Yorkers, [and] ... those living in low-income households and neighborhoods," both with respect to its prevalence and
the rates and severity of related complications. n148 The same is true of obesity and obesity-related health problems. n149
In addition, many chronic conditions, including diabetes, are "often perceived as a self-inflicted problem among the elderly who are
sedentary and obese." n150 The argument that governments have "a legitimate interest in controlling [*1980] medical and social costs of
individuals' unhealthy behaviors that are borne by society at large" n151 may be used to justify inappropriate privacy invasions,
especially given that public discourse about obesity is infused with moral condemnation. n152 Judicial recognition that emergent
programs infringe upon constitutionally protected privacy rights would require governments to develop substantive (instead of
rhetorical) justifications for deploying the most invasive types of public health surveillance against vulnerable populations or,
alternatively, to modify those surveillance programs.
Page 247
AT: Oversight CP --- Perm
The perm is the only way to solve SOP and the aff
Rahdert 7 --- Professor of Law (Mark, “DOUBLE-CHECKING EXECUTIVE EMERGENCY POWER: LESSONS FROM HAMDI
AND HAMDAN”, 80 Temp. L. Rev. 451, Lexis)//trepka
Both the legislative and judicial checks have roots in precedent and practice. Foremost, they follow Justice Jackson's famous categorical
analysis of executive power in Steel Seizure, in that they are the legislative and judicial corollaries to his appraisal of executive authority.
n22 Indeed, the recent enemy combatant cases read like an extensive commentary on Jackson's Steel Seizure [*456] concurrence. n23
Effectively, they
require two-branch cooperation either to sustain executive authority or to
constrain it. Alone, either branch's check has limited capacity to restrain executive authority.
When exercised together, however, their double check stands as a potent guarantee against
extravagant assertions of executive emergency power. When this double check has been deployed, as it was
particularly in Hamdan, it results in relatively searching review of executive emergency national security claims, rather than the extreme
deference to executive judgment that those claims have sometimes received, and it subjects executive discretion to constraint through
meaningful legislative oversight.
Maintaining SOP is a d-rule
Branum 02 [Tara, Former Editor of the Texas Review of Law & Politics, “President or King? The Use and Abuse of Executive
Orders in Modern-Day America,” Lexis]
The second consideration addressed by the Court is similar to the first, and it emphasizes the stated belief of the Founders that
preservation of a separation of powers is essential “to preclude the exercise of arbitrary power.” 386 Justice Kennedy recently expressed
this sentiment: [*77] Separation
of powers was designed to implement a fundamental insight:
Concentration of power in the hands of a single branch is a threat to liberty. The Federalist
states the axiom in these explicit terms: “The accumulation of all powers, legislative, executive, and judiciary, in the
same hands . . . may justly be pronounced the very definition of tyranny. ” 387 Separation
of powers is “the absolutely central guarantee of a just Government ” 388 and is therefore
endorsed and protected “as a vital check against tyranny.” 389
Page 248
AT: Terry Stops CP
Links to all our legitimacy offense and can’t solve --- prefer best data
Fagan† and Geller†† 15 --- † Isidor and Seville Sulzbacher Professor of Law, Columbia Law School AND ††
Clinical Associate Professor and Director, Applied Quantitative Research Program, Department of Sociology,
New York University (Isidor and Seville, “Following the Script: Narratives of Suspicion in Terry Stops in Street Policing”,
https://lawreview.uchicago.edu/sites/lawreview.uchicago.edu/files/uploads/82_1/03%20Fagan%20and%20Geller_SYMP_Internet.pd
f)//trepka
Regulation of Terry stops of pedestrians by police requires articulation of the reasonable and
individualized bases of suspicion that motivate their actions. Nearly five decades after Terry,
courts have found it difficult to articulate the boundaries or parameters of reasonable suspicion. The
behavior and appearances of individuals combine with the social and spatial contexts in which police
observe them to create an
algebra of suspicion . Police can proceed to approach and temporarily detain a person at a threshold of
suspicion that courts have been unable and perhaps unwilling to articulate. The result has been sharp
tensions within Fourth Amendment doctrine as to what is reasonable, why, and in what circumstances. The jurisprudence of
suspicion is no clearer today than it was in the aftermath of Terry. This issue has taken center stage in both litigation and policy debates on the
constitutionality of the stop-and-frisk policing regime in New York City. Under this regime, police state the bases of suspicion using a menu of codified stop
rationales with supplemental text narratives to record their descriptions of suspicious behaviors or circumstances that produced actionable suspicion.
Evidence from 4.4 million stops provides an empirical basis to assess the revealed preferences
of police officers as to the bases for these Terry stops. Analyses of this evidence reveal narratives
of suspicion beyond the idiosyncrasies of the individual case that police use to justify their
actions. First, we identify patterns of articulated suspicion. Next, we show the individual factors and social conditions that shape how those patterns are
applied. We also show how patterns evolve over time and become clearer and more refined across a wide range of police stops. That refinement seems to
follow the capacious interpretative room created by four decades of post-Terry Fourth Amendment jurisprudence. Next, we assess the extent of
constitutional compliance and examine the neighborhood and individual factors that predict noncompliance. The results suggest that the observed patterns
of narratives have evolved into shared narratives or scripts of suspicion, and that these patterns are specific to suspect race and neighborhood factors. We
conclude that scripts are expressions of the norms within the everyday organizational exercise of police discretion and that these scripts defeat the
requirement of individualization inherent in case law governing Fourth Amendment stops.
Download