National Security

advertisement
Table of Contents
Topicality ....................................................................................................................................................... 8
Definitions: Above................................................................................................................................. 9
Ought: Stock Definitions ..................................................................................................................... 10
Ought implies Consequentialism ........................................................................................................ 11
Ought implies Contractarionism ......................................................................................................... 12
Ought Implies Kantian Ethics .............................................................................................................. 13
Ought Implies Naturalism (Meta Ethics) ............................................................................................. 14
Ought implies Rights ........................................................................................................................... 15
Definition of Pursuit ............................................................................................................................ 16
Definition of “Security Threat” ........................................................................................................... 17
“National Security” is Resisting Hostile Action ................................................................................... 18
National Security is Cybersecurity, terrorism, and nuclear weapons ................................................. 19
National Security includes Human Trafficking .................................................................................... 20
“Digital Privacy” .................................................................................................................................. 21
Citizens ................................................................................................................................................ 22
Aff ................................................................................................................................................................ 23
National Security ..................................................................................................................................... 24
National Security Does Not Outweigh Privacy .................................................................................... 25
Privacy ..................................................................................................................................................... 26
No Right to Privacy – Reductionst Legal Theory Proves ..................................................................... 27
No Right to Privacy-Constitution......................................................................................................... 28
Limits In Place Prevent Loss of Digital Privacy .................................................................................... 29
Public/Private Distinction Allows Domestic Violence ......................................................................... 30
Terrorism................................................................................................................................................. 31
Digital Surveillance Stops Inevitable Terrorist Attack ........................................................................ 32
Digital Surveillance Key to Stopping Al Qaeda .................................................................................... 33
Digital Surveillance Solves Terrorism (1/2) ......................................................................................... 34
Digital Surveillance Solves Terrorism (2/2) ......................................................................................... 35
Preventing Terrorism Necessitates Domestic Spying ......................................................................... 37
Terrorists Use the Internet to Plan Attacks (1/2)................................................................................ 38
Terrorists Use the Internet to Plan Attacks (2/2)................................................................................ 40
The Internet is Key to Terrorist Communication ................................................................................ 41
Internet Key to Terrorist Funding ....................................................................................................... 42
Internet Key to Terrorist Education .................................................................................................... 43
Cyberterror Impacts: Economy ........................................................................................................... 44
Uniqueness: Risk of Terrorism is High................................................................................................. 45
A2: Terrorists Are Not Tech Savvy ...................................................................................................... 46
A2: Digital Surveillance of Terrorists Outside of US ............................................................................ 47
Cyberattacks ........................................................................................................................................... 48
Cyberattack Impacts: Laundry List ...................................................................................................... 50
Cyberattack Impacts: Terrorists are a Threat ..................................................................................... 51
Cyberattack Impacts: North Korea Is a Threat .................................................................................... 52
Cyberattack Impacts: Iran Is a Threat ................................................................................................. 53
Cyberattack Impact: US Retaliation .................................................................................................... 54
Cyberattack Impacts: Harms National Security .................................................................................. 55
Cyberattack Impacts: Economy........................................................................................................... 56
Cyberattack Impacts: Hurt Businesses ................................................................................................ 58
Cyberattack Impacts: Infrastructure ................................................................................................... 59
Cyberattack Impacts: Mass Death ...................................................................................................... 61
Cyberattack Impacts: Mass Death ...................................................................................................... 62
Cyberattack Impact: Prevents Retaliation .......................................................................................... 63
A2: Cannot Stop Cyberattack .............................................................................................................. 64
Solvency: Digital Surveillance Solves Cyberattacks............................................................................. 65
Cybercrime .............................................................................................................................................. 66
Cybercrime Impacts: Hurts Economy.................................................................................................. 67
Cybercrime Impacts: Worse than Physical Crime ............................................................................... 68
Hackers.................................................................................................................................................... 69
Hackers Destroy Privacy ...................................................................................................................... 70
A2: Hacktivism Good ........................................................................................................................... 71
Prism ....................................................................................................................................................... 72
Prism Solves Terrorism........................................................................................................................ 73
Prism Solves Terrorism........................................................................................................................ 74
A2: Prism Destroys All Privacy............................................................................................................. 75
A2: Congress is Reigning in Prism/NSA Spying.................................................................................... 76
A2: Data Collection Leads to Government Oppression ...................................................................... 77
Espionage ................................................................................................................................................ 78
Espionage-Russia................................................................................................................................. 79
Espionage-China.................................................................................................................................. 80
China Espionage Impact: Innovation .................................................................................................. 82
China Espionage Impact: Competitiveness ......................................................................................... 84
China Espionage Impact-Media .......................................................................................................... 85
Espionage-Iran .................................................................................................................................... 86
A2: Economic Espionage Isn’t Happening ........................................................................................... 87
Patriot Act ............................................................................................................................................... 88
Patriot Act Upholds the Social Contract ............................................................................................. 89
Patriot Act Balances National Security and Privacy ............................................................................ 90
Patriot Act Good – Computer Trespasser Exception Stops Hackers ................................................... 91
A2-“Patriot Act Violates Liberties” ...................................................................................................... 92
FISA Upholds 1st Amendment Protections ......................................................................................... 94
CIPSA ....................................................................................................................................................... 95
A2: Endless Invasion of Privacy ........................................................................................................... 96
Wire Taps ................................................................................................................................................ 98
Wiretaps Solve Terrorism ................................................................................................................... 99
Wiretaps Solve Crime ........................................................................................................................ 100
Human Trafficking ................................................................................................................................. 101
Impacts – Children are Trafficked ..................................................................................................... 102
Solvency: Mobile Phone Searches Solve Human Trafficking ............................................................ 103
A2: Tracking pre-paid phones is against the fourth amendment ..................................................... 104
Crime Impacts ....................................................................................................................................... 105
Impacts: Organized Crime Hurts National Security .......................................................................... 106
Organized Crime Destroys Rule of Law ............................................................................................. 107
Drug Trade Impacts: Drugs & Crime Destroy Society – Laundry List ................................................ 108
Drug Trade Impacts: Drug Money Fuels Terrorism ........................................................................... 109
Drug Trade Impacts: Drug Trade Causes Latin American Instability ................................................ 111
Gangs Impacts: Gangs Cause Crime .................................................................................................. 112
Gangs Impacts: Gangs Key to Drug Trade ......................................................................................... 113
Solvency: Digital Surveillance Solves Organized Crime..................................................................... 114
Wikileaks Harms National Security ....................................................................................................... 115
Wikileaks Threatens National Security ............................................................................................. 116
Wikileaks Threatens National Security ............................................................................................. 118
Wikileaks Helps Terrorists ................................................................................................................. 119
Wikileaks Hurts US-Pakistani Relations ............................................................................................ 120
A2: Wikileaks Solves For Transparency ............................................................................................. 121
A2: Wikileaks Solves For Transparency ............................................................................................. 122
Digital Surveillance Solvency................................................................................................................. 123
Data Collection is Key to Cyber Security Technology........................................................................ 124
A2: Tor Prevents Digital Surveillance ................................................................................................ 125
Transparency......................................................................................................................................... 126
Uniqueness: Privacy Decreasing Now ............................................................................................... 127
Uniqueness: Privacy Violations Inevitable ........................................................................................ 129
Transparency Impacts: Key to Economy ........................................................................................... 131
Now is the Key Time for Transparency ............................................................................................. 132
Link: Pretending Privacy Exists Masks Surveillance (1/2) ................................................................. 134
Link: Pretending Privacy Exists Masks Surveillance (2/2) ................................................................. 136
Alternative Solvency: Transparency Checks Government Oppression (1/2) .................................... 137
Alternative Solvency: Transparency Checks Government Oppression (2/2) .................................... 140
Impacts: Government Secrecy Hurts Government Effectiveness ..................................................... 141
A2: Leaks Bad – They’re Impossible to Stop ..................................................................................... 142
A2: Schneier/”Transparency Destroys Privacy” ................................................................................ 143
Neg ............................................................................................................................................................ 145
Constitutionality.................................................................................................................................... 146
Digital Surveillance Violates 4th Amendment.................................................................................... 147
Privacy ................................................................................................................................................... 149
Privacy is a Human Right ................................................................................................................... 150
Privacy is a Natural Right .................................................................................................................. 151
Right to Privacy Exists – Constitution Proves (1/2) ........................................................................... 152
Right to Privacy Exists – Constitution Proves (2/2) ........................................................................... 153
Right to Privacy Exists – Private Property and Artistic Creation Prove ............................................. 154
Privacy is a Social Good ..................................................................................................................... 155
Privacy Outweighs National Security ................................................................................................ 156
Privacy Impacts: Totalitarianism ....................................................................................................... 158
Privacy Impacts: Autonomy (1/2) ..................................................................................................... 160
Privacy Impacts: Autonomy (2/2) ..................................................................................................... 161
Privacy Impacts: Human Dignity ....................................................................................................... 162
Privacy is a Prerequisite to Rights and Autonomy ............................................................................ 163
Privacy Impacts: Normalization ........................................................................................................ 164
Browser Fingerprinting ..................................................................................................................... 165
Collecting Information Violates Privacy ............................................................................................ 166
Centralized Databases Violate Privacy .............................................................................................. 167
A2: “We Consent to Surveillance” .................................................................................................... 168
Digital Surveillance Bad......................................................................................................................... 169
Electronic Surveillance Prevents Free Society .................................................................................. 170
Surveillance Violates Separation of Powers...................................................................................... 171
Digital Surveillance Hurts US Competitiveness ................................................................................. 172
Surveilance Ineffective-Terrorists ......................................................................................................... 173
Digital Surveillance Does Not Stop Terrorism ................................................................................... 174
Equal Prioritization................................................................................................................................ 175
Hackers.................................................................................................................................................. 176
No Impact to Hackers: Encryption Solves ......................................................................................... 177
Hackers Good-Anonymous ............................................................................................................... 178
Cyberattacks ......................................................................................................................................... 180
No Impact to Cyberattacks: Threat Overblown (1/2) ....................................................................... 181
No Impact to Cyberterror: Threat Overblown (2/2) ......................................................................... 182
Tech Bad................................................................................................................................................ 183
Patriot Act ............................................................................................................................................. 186
Patriot Act Violates Privacy – “Sneak & Peak Searches” .................................................................. 187
WikiLeaks .............................................................................................................................................. 188
A2: Threatens US Diplomacy ............................................................................................................. 189
Shield Laws ............................................................................................................................................ 190
Shield Laws Key to First Ammendment ............................................................................................ 191
A2: Terrorism ........................................................................................................................................ 192
Islamic Terror is Not a Threat............................................................................................................ 193
Domestic Terrorism Is Not a Threat .................................................................................................. 194
Digital Surveillance Does Not Stop Terrorism ................................................................................... 195
Terror Discourse is Bad ..................................................................................................................... 196
Economy................................................................................................................................................ 197
Internal Link: Technological Innovation is Key to the Economy ....................................................... 198
Agamben ............................................................................................................................................... 199
Link: Digital Technology .................................................................................................................... 200
Impacts: State of Exception Destroys All Rights (1/2) ...................................................................... 201
Impacts: State of Exception Destroys All Rights (2/2) ...................................................................... 202
Impacts: State of Exception Allows for Atrocities ............................................................................. 203
Framework ................................................................................................................................................ 204
Autonomy ............................................................................................................................................. 205
Autonomy Requires Freedom from Negative Restraints .................................................................. 206
Autonomy is a Prerequisite to Morality ............................................................................................ 207
Autonomy-Protects Free Speech ...................................................................................................... 209
Autonomy-Individual ........................................................................................................................ 210
Autonomy-Consent Necessary for Morality ..................................................................................... 211
A2: Prefer Justice .............................................................................................................................. 213
Maslow’s Hierarchy of Needs ............................................................................................................... 214
Maslow’s Hierarchy Does Not Exist .................................................................................................. 215
Morality................................................................................................................................................. 216
Morality: Deontology is Best – Rights Prove ..................................................................................... 217
Morality: Intention is Key to Morality............................................................................................... 218
Utilitarianism is best for Determining Political Morality .................................................................. 219
Consequentialism is best for Determining Morality of Policies ........................................................ 220
A2: Human Rights/Rights More Important Than Consequentialism ................................................ 221
Social Contracts..................................................................................................................................... 222
Social Contracts Must be Backed by Force ....................................................................................... 224
Social Contracts Balance Individualism and Cooperation ................................................................. 225
Social Contracts Protect Justice and Rule of Law.............................................................................. 226
Social Contract Requires Protection of Citizen’s Property................................................................ 227
Conractarianism Protects Governments and Society ....................................................................... 228
A2: Utilitarianism Upholds Social Contract ....................................................................................... 229
Justice.................................................................................................................................................... 230
Kantian Justice Requires Restrictions on Freedom by Laws ............................................................. 231
Upholding the “Common Good” is Impossible (1/2) ........................................................................ 232
Upholding the “Common Good” is Impossible (2/2) ........................................................................ 233
Justice Balances Individualism and Cooperation .............................................................................. 234
Freedom/Liberty ................................................................................................................................... 235
Value of Freedom: Freedom and Liberty are Different .................................................................... 236
Security ................................................................................................................................................. 237
Human Security More Important than State Security ...................................................................... 238
Government Must Not Violate Liberty ............................................................................................. 239
Meta-Ethics ............................................................................................................................................... 240
Naturalism............................................................................................................................................. 241
Naturalism Determines Morality ...................................................................................................... 242
Hardwired For Survival...................................................................................................................... 243
Error Theory .......................................................................................................................................... 244
Error Theory Guides Morality ........................................................................................................... 245
Quasi- Realism....................................................................................................................................... 247
Legality .................................................................................................................................................. 248
Law Determines Morality.................................................................................................................. 249
Rule of Law ........................................................................................................................................ 250
Topicality
Definitions: Above
Above means to have a higher rank
Merriam-webster.2013, “Above-Definition and More from the Merriam Webster Free dictionary.”
http://www.merriam-webster.com/dictionary/above
3¶ : in or to a higher rank or number <30 and above>
Ought: Stock Definitions
Ought implies Moral Obligation
Merriuam Webster dictionary, 2013, (http://www.merriam-webster.com/dictionary/ought)
Ought- used to express obligation
Ought- moral obligation
Reasons to prefer
1. Most common sense definition- First Known Use: 12th century, this tells us that this form of definition
has been appropriate for a long time.
2. Meriam Webster is a total access dicitionairy- everybody can access it meaning that people have the
ability to get the definition.
3. For more than 150 years, in print and now online, Merriam-Webster has been America's leading and
most-trusted provider of language information.
4. All Merriam-Webster products and services are backed by the largest team of professional dictionary
editors and writers in America, and one of the largest in the world.
Ought is defined as mandatory.
Black’s Law Dictionary. http://thelawdictionary.org/ought/
This word, though generally directory only, will be taken as mandatory if the context requires it. Life
Ass’n v. SL Louis County Assessors, 49 Mo. 518.
Ought implies Consequentialism
Ought is a propositional operative that questions if a consequence from an action is
desirable
Wedgwood argues. (Ralph, English prof @ carniege melon, “modern day morals.” No date, http://wwwbcf.usc.edu/~wedgwood/meaningofought.htm)
“We can avoid all these problems if we treat ‘ought’ in as a propositional operator. Grammatically,
‘ought’ in English is an auxiliary verb, like the modal auxiliaries ‘can’ and ‘must.’ When an occurrence of
‘ought’ modifies the main verb of a sentence, it can be taken as a propositional operator applying to the
proposition that would be expressed by the unmodified form of that sentence. Thus, the sentence
drinking water ought to be clean and safe in ‘ought’ is a propositional operator applying to the
proposition that would be expressed by the sentence ‘drinking water is clean and safe’”
Ought implies Contractarionism
The governmental obligation focuses on what the people want
Terrence O. Moore, Professor of History at Hillsdale College, degree from u of Chicago, “What Ought
Government to Do (and Not Do)?: Why We Need to Read John Locke” September 1, 2011,
http://ricochet.com/main-feed/What-Ought-Government-to-Do-and-Not-Do-Why-We-Need-to-ReadJohn-Locke
Locke’s considerable narrowing of the scope of government is famously echoed in the Declaration of
Independence with these words: “That to secure these rights [Life, Liberty and the pursuit of
Happiness], Governments are instituted among Men.” Securing rights is what government is supposed
to do. Whenever government exceeds the scope of its original compact or commission, people’s liberty
is in danger. Now it is true that a people may consent to employ government to do any number of things
which seem legitimate. But watch out! The oldest trick in the democratic playbook is for a larger group
of people to get together and consent to take the smaller group’s property. ¶ The Lockean idea of
limited government compels us to ask the question: what is government for—and what is it not for?
Allowing for the fact that there may be any number of functions for government at the state and local
levels (via the Founders’ invention of federalism), what ought thefederal government to do and what
ought it not to do? Voters on the Right need to be specific about what their candidates should do (and
undo) once elected lest vague promises of reduced government spending go nowhere and further
electoral victories be wasted.
Ought Implies Kantian Ethics
Kant defines ought as requiring an imperative.
Hurford, Peter. Political Science and Psychology Major at Denison University. November 4, 2011. The
Meaning of Ought, Part I. http://www.greatplay.net/essays/the-meaning-of-ought-part-i
Kant described “ought” as referring to an imperative, defining two types: a hypothetical imperative
and a categorical imperative:¶ A hypothetical imperative is in the form “If you desire X, you ought to
preform action Y”. For instance, “If you value the lives of others, you ought to not murder people” or “If
you value freedom, you ought not to restrict the speech of others”. It is an ought statement
characterized by a conditional.¶ A categorical imperative is in the form “You ought to preform action Y
(regardless of what you believe or desire)”. For instance, “You ought not to lie” or “You ought not to
steal”. It is a pure, unconditional ought statement.
Ought Implies Naturalism (Meta Ethics)
Ought does not imply morality, natural ethics are more clear.
Beavers, Anthony F. Written for the International Digital Ethics Symposium, Center for Digital Ethics and
Policy, School of Communication, Loyola University. Chicago, October 28th, 2011. Could and Should the
Ought Disappear from Ethics?
http://www.academia.edu/1011404/Could_and_Should_the_Ought_Disappear_from_Ethics
Terra Firma¶ In 2007, Anderson and Anderson wrote, “As Daniel Dennett (2006) recently stat-ed, AI
‘makes philosophy honest.’ Ethics must be made computable in order to make it clear exactly how
agents ought to behave in ethical dilemmas” (16). To rephrase their sentiment, a computable system or
theory of ethics serves to make ethics honest. As I have observed elsewhere (Beavers 2010), it is
common among machine ethicists to note that research in computational ethics can help us better
understand ethics in the case of human beings. This is because of what we must know about ethics in
general to build machines that operate within normative pa-rameters. Unclear intuitions will not do
where engineering specifications and computational clarity are required. So, machine ethicists are
forced head on to en-gage in moral philosophy. Their effort, of course, hangs on a careful analysis of
ethical theories, the role of affect in making moral decisions, relationships be-tween agents and
patients, and so forth. But this is not all. There are other meta-ethical difficulties that must be addressed
as well concerning, particularly, the nature of the moral ought and the necessary and sufficient
conditions for moral agency. Every moral theory makes assumptions about these issues, but, to date,
without the clarity that real-world, working specifications for practical application require. Thus,
computational ethics provides us with the¶ terra firma¶ needed to get some solid footing in the
otherwise vague and messy domain of ethics and helps us answer the question of whether (and if so, to
what extent) we may have been duped by morality.¶ My conclusion here will be that yes, we have been
duped, at least in part. As such, I am departing from Beavers 2009 & 2011, where I suggested that we¶
might ¶ (another past subjunctive) have been in order to argue for something more definite. This
conclusion will be an unhappy one for many, since it will involve throwing out an age-old distinction
between being good and merely acting so that has been at the heart of ethics (according to the
dominant Western paradigm)from its inception. My argument will unfold in three parts: the first will
address the question of moral agents (MAs) in general, after which I will examine what precisely¶ ought
¶ implies when viewed from a moral perspective to isolate what I will identify as the paradox of
automated moral agency (P-AMA). Next to avoid the paradox we will need to define the¶ ought ¶
technically, not morally, a distinction I am partially borrowing from Kant and will make clear later, with
the result that we are left with the sufficiency argument (SA), which states that moral interiority is a
sufficient but not necessary condition for moral agency. If this argument holds, then the kind of moral
interiority that allows an agent to be culpable for its actions is not necessary for ethics. It is rather a
product of our biology that drives humans to be ethical, but it is not the only way this can be done. My
motive in taking this approach is that the problems we are facing as a world are so great that it is time to
put aside the “blame game” and confront them with some sort of no-fault ethics, the details of which
have largely been worked out by Floridi (1999and 2002) and Floridi and Sanders (2001 and 2004),
though more work needs to be done here to draw out the implications where blame and fault are
concerned.
Ought implies Rights
Ought is derived from our rights, if we have the right, we have an obligation to act.
Gewirth Alan, a professor of philosophy at the University of Chicago, “THE 'IS-OUGHT PROBLEM
RESOLVED.”, Proceedings and Addresses of the American Philosophical Association, Vol. 47 (1973 -¶
1974), pp. 34-61, jstor)
I have here presented, then, a complex version of what I have ¶ called the internal model of the relation
between 'ought' and 'is'. ¶ I have not directly defined 'ought' in terms of'is'; rather, I have ¶ held that
the application of 'ought' is entailed by the correlative ¶ concept of having a right. The agent's
application of this concept, ¶ in turn, has been derived from the concept of goods which are the ¶
necessary conditions of all his actions, since he necessarily claims ¶ that he has a right to at least
these goods. And the agent's applica- ¶ tion of the concept of good, finally, has been derived from his
¶ acting for purposes. Since the agent's assertion that he acts for ¶ purposes is an empirical, descriptive
statement, I have in this ¶ indirect way derived 'ought' from 'is'. Whether the derivation is at ¶ each
point definitional or is rather of some other non-arbitrary ¶ sort does not materially affect my
argument, so long as its neces- ¶ sary relation to the context of action is recognized.
Definition of Pursuit
Trying to Achieve Something
Oxford Dictionary (2013, Oxford University Press, http://oxforddictionaries.com/definition/english/pursuance?q=pursuance)
the action of trying to achieve something:
Pursuit of Security includes Cost
David A. Baldwin, 1997, Columbia University Department of Political Science, “The Concept of Security”, Review of International
Studies, Jstor, http://www.jstor.org/stable/20097464
The pursuit of security always involves costs, i.e., the sacrifice of other goals that could have been
pursued with the resources devoted to security. Specification of this dimension of security policy is
important because writers sometimes imply that costs do not matter. One writer, for example,
defines national security in terms of the protection of core values, which he describes as 'interests
that are pursued not withstanding the costs incurred'.55 From the standpoint of a rational policymaker, however, there are no such interests. Costs always matter.
Definition of “Security Threat”
Security threats include Natural Disasters.
David A. Baldwin, 1997, Columbia University Department of Political Science, “The Concept of Security”, Review of International
Studies, Jstor, http://www.jstor.org/stable/20097464
In ordinary language, however, one
often finds references to epidemics, floods, earth quakes, or droughts as
'threats' to acquired values. Ullman and others have argued hat the concept of security should be expanded to include such
phenomena. There seems to be no reason not to use this more expansive concept of threats, especially
since it comports with common usage. Those who wish to refer to conditional commitments to punish by social actors as
security threats may make that clear when specifying this dimension of security.
“National Security” is Resisting Hostile Action
“National security” includes activities that threaten society
Department of Defense Dictionary of Military and Associated Terms. No Date (“national
security”. Accessed 17 July 13. http://www.dtic.mil/doctrine/dod_dictionary/data/n/5673.html)
A collective term encompassing both national defense and foreign relations of the United States.
Specifically, the condition provided by: a. a military or defense advantage over any foreign nation or
group of nations; b. a favorable foreign relations position; or c. a defense posture capable of
successfully resisting hostile or destructive action from within or without, overt or covert. See also
security.
National Security is Cybersecurity, terrorism, and nuclear weapons
The 2013 national security strategy highlights security issues as cyber space, terrorism
and nuclear weapons.
NSSA writes 2013 (“National Security Strategy 2013” pg 6, DoP: 2013, DoA: 7/17/13,
http://www.utexas.edu/lbj/sites/default/files/file/news/National%20Security%20Strategy%202013%20(
Final%20Draft).pdf)
This document details the international environment the United States faces ¶ moving forward and depicts how we can navigate a
peaceful and stable order in ¶ the future by leading the global economy, protecting critical global strategic ¶ interests, and maximizing the
disposition and strength of our military. ¶ Furthermore, the
analysis of emerging and persistent national security
issues –¶ cyberspace, terrorism, and nuclear weapons – emphasizes the opportunity of ¶ American leadership.
National Security includes Human Trafficking
National security includes human trafficking
ARTHUR RIZER, Arthur Rizer is a Trial Attorney with the United States Department of Justice. “Breach: The National Security Implications of
Human Trafficking” 2011, http://widenerlawreview.org/files/2011/03/Rizer-Glaser.pdf
Expanding on this concept, former government official
Joseph Romm41¶ argues that national security relates to
events that “(1) threaten drastically and ¶ over a relatively brief span of time to degrade the quality of
life for the ¶ inhabitants of a state, or (2) threaten significantly to narrow the range of policy ¶ choices
available to the government of a state.”42 “Consequently, Romm ¶ includes on the national security agenda issues
of global warming [and] energy ¶ security” 43 and May even include, as this article argues, human trafficking. ¶
Anything could arguably affect the “way of life” of the American people. ¶ However, because President Clinton’s and Mr. Romm’s portrayal of
national ¶ security focuses more on the people of the United States, rather than President ¶ Bush’s general “interests around the globe,” we
believe that President ¶ Clinton’s and, more specifically, Mr. Romm’s definition of national security is ¶ more appropriate for the subject at
hand.
“Digital Privacy”
Digital privacy is defined as a protection of citizens’ privacy
WiseGeek Online. 2013. What Is Digital Privacy? http://www.wisegeek.com/what-is-digitalprivacy.htm
The concept of digital privacy can best be described as the protection of the information of private
citizens who use digital mediums. However, when people speak about digital privacy, they often are referring to it in
terms of its relation to Internet usage. Despite it being a popular and often incendiary issue, the obstacle of defining what digital
privacy really is can prevent resolution.¶ Digital privacy centers on the fact that using digital mediums to conduct affairs, whether personal or
professional, can leave digital footprints. For example, many Internet users don't realize that information about them and their Internet usage
habits are constantly being logged and stored. A computer's Internet Protocol (IP) address can be traced back to a specific user and, as such, his
website viewing habits can be monitored. Information such as the date and time of his searches, what browser he used to access websites and
even how long he viewed websites can be retained on a search engine's servers. Servers can vary in the length of time they store this
information before deleting it.
Citizens
A citizen is defined as someone who is either born in the U.S. or is naturalized.
U.S. Citizenship and Immigration Services. 01/17/2013. Citizenship.
http://www.uscis.gov/portal/site/uscis/menuitem.eb1d4c2a3e5b9ac89243c6a7543f6d1a/?vgnextoid=a
2ec6811264a3210VgnVCM100000b92ca60aRCRD&vgnextchannel=a2ec6811264a3210VgnVCM100000b
92ca60aRCRD
If you meet certain requirements, you may become a U.S. citizen either at birth or after birth. ¶ To
become a citizen at birth, you must:¶ Have been born in the United States or certain territories or
outlying possessions of the United States, and subject to the jurisdiction of the United States; OR ¶
had a parent or parents who were citizens at the time of your birth (if you were born abroad) and
meet other requirements¶ To become a citizen after birth, you must:¶ Apply for “derived” or
“acquired” citizenship through parents¶ Apply for naturalization¶ For more information, see USCIS
Policy Manual Citizenship and Naturalization Guidance. ¶ The Naturalization Test¶ Most naturalization
applicants are required to take a test on:¶ English¶ Civics (U.S. history and government)
An American citizen is one who constitutionally belongs to the United States.
Smith, Roger M. Alfred ¶ Cowles Professor of ¶ Government at Yale ¶ University. 1985. The Meaning of
American Citizenship. http://www.apsanet.org/imgtest/americancitizenship.pdf
What does it mean to say, "I am an American citizen?" The law supplies ¶ dry technical answers: the
statement means that one falls under a ¶ constitutional or statutory category conferring full
membership in the ¶ American polity. The chief ones are, with minor exceptions, birth within ¶ the
United States, which confers citizenship under the Fourteenth ¶ Amendment, plus birth to American
parents overseas, and ¶ naturalization, categories regulated by federal statutes.
Aff
National Security
National Security Does Not Outweigh Privacy
Officials exaggerate the importance of national security
Greenwald, Glenn. JUNE 10, 2013. Glenn Greenwald on How NSA Leaker Edward Snowden Helped
Expose a "Massive Surveillance Apparatus".
http://www.democracynow.org/2013/6/10/glenn_greenwald_on_how_nsa_leaker. Date Accessed
7/19/13.
This is just the same playbook that U.S. government officials have been using for the last five decades whenever anything gets done
that brings small amounts of transparency to the bad conduct that they do in the dark. They immediately accuse those who
brought that transparency of jeopardizing national security. They try and scare the American public
into believing that they’ve been placed at risk and that the only way they can stay safe is to trust the
people in power to do whatever it is they want to do without any kinds of constraints, accountability
or light of any kind.
Privacy
No Right to Privacy – Reductionst Legal Theory Proves
Reductionism disregards privacy as a right
Casman, Betsey Sue. Master of Arts in Ethics and Policy Studies. 2011. "The Right to Privacy in Light of
the Patriot Act and Social Contract Theory".
http://digitalscholarship.unlv.edu/cgi/viewcontent.cgi?article=2087&context=thesesdissertations. Date
Accessed 7/21/13.
There are two prevailing theories in the literature discussing the right to privacy: ¶ reductionism and
coherentism. The reductionist view is based on the idea that privacy is ¶ essentially an
inconsequential argument. Privacy, in and of itself, is not a specific right, ¶ just merely part of another
right, therefore claims made citing a right to privacy should ¶ not and can not be honored. Edmund
Byrne identifies reductivist privacy theorists in the ¶ legal field as those who believe that legal claims
to privacy can all be resolved by other ¶ areas of law (Alfino, 2003).
No Right to Privacy-Constitution
There is no constitutional basis for the right to privacy.
Harold R. DEMOSS JR, DeMoss practiced law in Houston for 34 years before being appointed in 1991 by former President George H.W.
Bush to the 5th U.S. Circuit Court of Appeals, where he now serves., “Constitutional right to privacy a figment of imagination” DoP:January 15,
2006, DoA: 7/17/13, http://www.chron.com/opinion/outlook/article/Constitutional-right-to-privacy-a-figment-of-1640537.php
In this season of politicized and contentious confirmation hearings to fill vacancies on the U.S. Supreme Court, some of the sharpest debate
and disagreement concerns
a so-called "right of privacy" in the U.S. Constitution.¶ The
advocates of a constitutional right of privacy speak as though that right were expressly
stated and enumerated in the Constitution. But the text of the Constitution does not
contain the word "privacy" or the phrase "right of privacy."¶ Consequently, in my view, a
constitutional "right of privacy" could only be unenumerated and is therefore a figment
of the imagination of a majority of the justices on the modern Supreme Court. Let me explain why.¶ Webster's Dictionary defines
"enumerate" as "to name or count or specify one by one." Roget's Thesaurus states that the synonyms for "enumerate" are "to itemize, list, or
tick off." Adding the negative prefix "un" reverses the definitions or synonyms so that "unenumerated" means not named, not counted, not
specified, not itemized, or not listed.¶ The right of privacy is unenumerated because neither the word privacy nor the phrase right of privacy
appears anywhere in the Constitution or its amendments. Nor does the text contain any words related to other rights the Supreme Court has
found to derive from that right, including the right to an abortion and rights related to sexual preference. Neither "abortion" nor "sexual
preference" appear anywhere in the text of the Constitution.
Limits In Place Prevent Loss of Digital Privacy
There are restraints placed upon how much digital privacy can be conceded
Palin, Philip J, 9/18/11 , Homeland Security Watch, Brennan: Counterterrorism and the Law,
http://www.hlswatch.com/index.php?s=patriot+act , Date Accessed : 7/17/11
We’ve also worked to uphold our values and the rule of law in a second area—our policies and practices here at home. As I said,
we will
use all lawful tools at our disposal, and that includes authorities under the renewed PATRIOT Act. We
firmly believe that our intelligence gathering tools must enable us to collect the information we need
to protect the American people. At the same time, these tools must be subject to appropriate oversight
and rigorous checks and balances that protect the privacy of innocent individuals.¶ As such, we have ensured
that investigative techniques in the United States are conducted in a manner that is consistent with our laws and subject to the supervision of
our courts. We have also taken administrative steps to institute additional checks and balances, above and beyond what is required by law, in
order to better safeguard the privacy rights of innocent Americans.¶ Our democratic
values also include—and our national
security demands—open and transparent government. Some information obviously needs to be
protected. And since his first days in office, President Obama has worked to strike the proper balance
between the security the American people deserve and the openness our democratic society expects .¶
In one of his first acts, the President issued a new Executive Order on classified information that,
among other things, reestablished the principle that all classified information will ultimately be
declassified. The President also issued a Freedom of Information Act Directive mandating that
agencies adopt a presumption of disclosure when processing requests for information. The President
signed into law the first intelligence authorization act in over five years to ensure better oversight of
intelligence activities. Among other things, the legislation revised the process for reporting sensitive intelligence activities to Congress
and created an Inspector General for the Intelligence Community.¶ For the first time, President Obama released the combined budget of the
intelligence community, and reconstituted the Intelligence Oversight Board, an important check on the government’s intelligence activities. The
President declassified and released legal memos that authorized the use, in early times, of enhanced
interrogation techniques. Understanding that the reasons to keep those memos secret had
evaporated, the President felt it was important for the American people to understand how those
methods came to be authorized and used.¶ The President, through the Attorney General, instituted a new process to consider
invocation of the so-called “state secrets privilege,” where the government can protect information in civil lawsuits. This process ensures that
this privilege is never used simply to hide embarrassing or unlawful government activities. But, it also recognizes that its use is absolutely
necessary in certain cases for the protection of national security. I know there has been some criticism of the Administration on this. But by
applying a stricter internal review process, including a requirement of personal approval by the Attorney General, we are working to ensure
that this extraordinary power is asserted only when there is a strong justification to do so.¶
Public/Private Distinction Allows Domestic Violence
Private and public distinction creates spaces where law enforcement won’t engage
domestic violence this allows for it to be perpetrated.
Elizabeth M. Schneider, Professor of Law, 2002 (“BATTERED WOMEN & FEMINIST LAWMAKING” Pg 351
DoP: 7/24/2002, DoA: 7/18/13, http://www.brooklaw.edu/~/media/PDF/LawJournals/JLP_PDF/jlp_vol10ii.ashx)
¶ Privatization arrangements also prevail in many sorts of ¶ employment agreements.80 We have seen
in the United StatesSupreme Court within the last couple of years an endorsement of ¶ the legality and
propriety of these kinds of arrangements, in ¶ which people sign away their right to seek a public
remedy in ¶ favor of a privatized remedy.81 Our president has initiated a ¶ discussion about the
desirability of privatizing much or all of our ¶ Social Security system,82 which is the system of old age
pensions ¶ for people in the United States. It has always been organized as a ¶ public agency,
administered by public servants who were ¶ answerable, as governmental agencies are, but powerful
interests ¶ promote to substitute this public system for a private one by ¶ making security in one’s old
age an individual matter of ¶ accumulating money, investing it, and then moving one’s ¶ investment
around in an entrepreneurial manner. So I see a lot of ¶ evidence that this trend toward privatization is
continuing and ¶ accelerating, and I wonder what that means for the movement for ¶ the protection
of battered and vulnerable women and children. ¶ One of the things that Liz talks about in her book is
the ¶ Violence Against Women Act of 1994.83 But as Renée mentions, ¶ in a development that came
after the book was published, the United States Supreme Court in United States v. Morrison¶ declared
unconstitutional the civil rights remedy of the Violence ¶ Against Women Act, the portions that would
have given women ¶ who were victims of gender-motivated violence a right to seek a ¶ private remedy
in the federal courts of the United States.84 One ¶ can put forth various [one] explanations of this
decision, but to me it ¶ represents a rather subtle statement of the old premise that this ¶ kind of
violence really is a private matter. It is not important ¶ enough, and it does not have significant enough
nation-wide ¶ effects for the federal courts to have any jurisdiction to consider ¶ it. It has to be
considered (if at all) by local courts, by local ¶ authorities. State courts are all right for those cases, but
the ¶ federal courts—the big courts, the important courts, the courts ¶ that deal with momentous
matters significant to the nation and the ¶ nation’s health—really do not have any jurisdiction over this
¶ rather small private matter. I am being perhaps a bit sarcastic,¶ but I think that is a defensible reading
of what the court was ¶ saying in Morrison.¶ 85 And if I am right in my reading of this case ¶ together
with other developments in United States constitutional ¶ law, I see a gradual but relentless
enlargement of this sphere of ¶ privacy, inside of which the government may not or will not be ¶
inclined to look. I do not think that is a good thing for vulnerable ¶ people or for battered women.
Terrorism
Digital Surveillance Stops Inevitable Terrorist Attack
Lack of digital surveillance leads to terrorist attacks
Sorcher, Sara. Staff Editor. June 25, 2013. Insiders: NSA's Communications Surveillance Good Way to
Target Terrorists. http://www.nationaljournal.com/nationalsecurity/insiders-nsa-s-communicationssurveillance-good-way-to-target-terrorists-20130624. Accessed 7/16/2013.
The National Security Agency's surveillance programs are effective tools for seeking out terrorists, according to 85.5 percent of National
Journal's National Security Insiders.¶ "In
the digital age, when every individual's digital trail increases year by
year, there is no faster way to draw a picture of a network, or a conspiracy, than by piecing together
different data streams," one Insider said. "This capability, in years to come, won't be a nice-to-have; it'll be
critical."¶ Another Insider said that the NSA must have the tools necessary to root out terrorists or another
9/11 becomes not just possible, but certain. "If we eliminate the online- and phone-surveillance
programs and a dirty bomb explodes in an American city, we have only ourselves to blame," the Insider
said. "The days of gentlemen not reading other gentlemen's mail are over."
Digital Surveillance Key to Stopping Al Qaeda
US must monitor Al-Qaeda and its different initiatives to prevent terrorism from
spreading.
Evan F. Kohlmann, 2006, Terrorism Researcher, The Real Online Terrorist Threat, Foreign Affairs, Jstor,
http://www.jstor.org/stable/20032074
In truth, although catastrophic computer attacks are not entirely inconceivable, the prospect that militants will be able to execute them
anytime soon has been overblown. Fears of such science-fiction scenarios, moreover, have led policymakers to overlook the fact that terrorists
currently use the Internet as a cheap and efficient way of communicating and organizing. These militants are now dedicated to waging an
innovative, low-intensity military campaign against the United States.Jihadists
are typically organized in small, widely
dispersed units and coordinate their activities online, obviating the need for a central command. Al
Qaeda and similar groups rely on the Internet to contact potential recruits and donors, sway public
opinion, instruct would-be terrorists, pool tactics and knowledge, and organize attacks. The RAND
Corporation's David Ronfeldt andjohn Arquilla have called this phenomenon "netwar," which they define as a form of conflict marked by the
use of "network forms of organization and related doctrines, strategies, and technologies." In
many ways, such groups use the
Internet in the same way that peaceful political organizations do; what makes terrorists' activity
threatening is their intent. To counter terrorists, the U.S. government must learn how to monitor their
activity online, in the same way that it keeps tabs on terrorists in the real world. Doing so will require
a realignment of U.S. intelligence and law enforcement agencies, which lag behind terrorist
organizations in adopting information technologies. At present, unfortunately, senior counterterrorism officials refuse
even to pay lip service to the need for such reforms. That must change-and fast.
Digital Surveillance Solves Terrorism (1/2)
Digital monitoring is useful, empirically has worked and is relatively simple
Tom Gjelten, NPR international correspondent, 6/15/13, The Case For Surveillance: Keeping Up With Terrorist Tactics,
http://www.npr.org/2013/06/15/191694315/high-tech-surveillance-targets-evolving-terrorist-tactics Date accessed 7/17/13
Since public revelations that the National Security Agency is collecting telephone records and reviewing Internet communications in the U.S. and
abroad, officials have been making the case that the programs are vital. They argue that the tactics match the new ways terrorists are planning and
communicating.¶ There was
a time when America's enemies conspired face-to-face, or communicated
through couriers, or by leaving messages for each other somewhere. But in the digital age, that has
changed.¶ FBI Director Robert Mueller made that point back in 2008, as Congress considered whether to amend the Foreign Intelligence
Surveillance Act.¶ "In this day and age, our ability to gain intelligence on the plans, the plots of those who
wish to attack us is dependent on us obtaining information relating to cellphones, Internet, email, wire transfers, all of
these areas," he said.¶ If all the action was in that electronic space five years ago, it's even more so today, as intelligence and security officials
constantly point out.¶ Speaking in February, the NSA's general counsel, Rajesh De, threw out some figures on the explosive growth in
communication data.¶ "More
data crosses the Internet every second today than existed on the Internet 20
years ago. Global mobile traffic grew 70 percent last year alone," he said.¶ Officials say these trends highlight the
challenge facing spy agencies: With so much communication now taking place in the digital world, intelligence officers have to be able to follow
that communication.¶ James Bamford, the author of several books on the NSA, says spies used to focus on getting human sources inside an
organization — agents who could report on what people in the organization were saying and doing. But human sources no longer matter so much,
Bamford says. Intelligence officers use new approaches because their adversaries are interacting in new ways. ¶ "During the day, they're on
cellphones, or they're on email, or they're on social-networking sites. By intercepting that information, you develop patterns and look at who these
people might be involved with," he says. ¶ To justify the
NSA's collection of telephone records and its selective
monitoring of online communication overseas, U.S. officials cite these "revolutionary" changes in the
information space. John Negroponte was the director of National Intelligence when wiretapping programs were expanded during the
Bush administration. He defends the NSA's new emphasis.¶ "I'd say it's a testament to how surveillance methods have kept up with the geometric
progression of these communication methods," he says.¶ Congressional critics of the expanded surveillance operations say they're not convinced
that these programs have really proved their value in fighting terrorism. They ask whether other types of intelligence gathering might be just as
effective.¶ Negroponte, who served as U.S. ambassador to Iraq, says no one method is sufficient. He recalls how in 2006, the
combination
of different intelligence sources led the U.S. military to the head of al-Qaida in Iraq, Abu Musab alZarqawi.¶ "I believe his phone number was detected through human intelligence. Somebody gave us his phone number. Then, that phone
number was monitored through signals intelligence. And then his movements were tracked by geo-spatial intelligence — drones and so forth," he
says. "So it's actually the integration of these different methodologies that actually give you the best results." ¶ The
expanded use of
telephone and Internet surveillance is in part an adaptation to the information revolution. The NSA, the
CIA and other agencies will defend these programs vigorously on that basis, despite concerns that Americans' privacy has been put at risk. ¶ But
that's not the whole story: It's also clear that the programs are popular in the spy business simply because they're convenient and efficient. They
make intelligence gathering easier.
Digital surveillance thwarted over 50 possible terrorist threats
Kastrenakes, Jacob. Journalist. June 18, 2013. 'Over 50' terrorist plots were stopped by surveillance
efforts, says NSA director. http://www.theverge.com/2013/6/18/4441774/over-50-terrorist-plotsstopped-NSA-surveillance. Accessed 7/16/2013.
Speaking to a congressional committee this morning, General Keith Alexander revealed that government surveillance
efforts have thwarted “over 50” possible terrorist threats since 9/11, including plans to bomb the New
York Stock Exchange and NYC subway system. Alexander, who heads the NSA, specifically noted that
programs like the Verizon metadata collection may have been able to stop 9/11 if they had been in
place at the time. He suggested that this program as well as “other intelligence” — which he did not disclose — assisted in foiling the 50
or so threats.
Digital Surveillance Solves Terrorism (2/2)
The solution is not targeted takedowns which provide little intelligence; surveillance is
critical to catching next-generation terrorists
Congressional Research Service. 2007 (An office of the Library of Congress. “Terrorist Capabilities
for Cyberattack: Overview and Policy Issues”. 22 Jan. Accessed 16 July 13.
http://www.gwu.edu/~nsarchiv/NSAEBB/NSAEBB424/docs/Cyber-024.pdf)
Some security experts do not think it is worthwhile to hijack or disrupt the web sites created by
terrorists. This is because terrorists will usually find a way to quickly put their sites back up under
different, multiple names, which may be even more difficult to monitor. Instead, U.S. intelligence
sources can gain valuable information by simply monitoring the web sites they already know about.
This may also include monitoring the Internet addresses of those who frequent these web sites.
However, more skilled analysts are needed to help translate the communications and information that is
posted on the many different terrorist web sites.
It has been empirically proven that digital surveillance disrupts terrorist attacks
Gerstein, Josh-- White House reporter for POLITICO, specializing in legal and national security issues.
June 18th, 2013. “NSA: PRISM stopped NYSE attack.” Published on Politico.com.
Recently leaked communication
surveillance programs have helped thwart more than 50 “potential
terrorist events” around the world since the Sept. 11 attacks, National Security Agency Director Keith
Alexander said Tuesday. Alexander said at least 10 of the attacks were set to take place in the United
States, suggesting that most of the terrorism disrupted by the program had been set to occur abroad.
The NSA also disclosed that [C]ounterterrorism officials targeted fewer than 300 phone numbers or
other “identifiers” last year in the massive call-tracking database secretly assembled by the U.S.
government. Alexander said the programs were subject to “extraordinary oversight.” ”This isn’t some
rogue operation that a group of guys up at NSA are running,” the spy agency’s chief added. The data on
use of the call-tracking data came in a fact sheet released to reporters in connection with a public House
Intelligence Committee hearing exploring the recently leaked telephone data mining program and
another surveillance effort focused on Web traffic generated by foreigners. Alexander said 90 percent of
the potential terrorist incidents were disrupted by the Web traffic program known as PRISM. He was
less clear about how many incidents the call-tracking effort had helped to avert. Deputy FBI Director
Sean Joyce said the Web traffic program had contributed to arrests averting a plot to bomb the New
York Stock Exchange that resulted in criminal charges in 2008. Joyce also indicated that the PRISM
program was essential to disrupting a plot to bomb the New York City subways in 2009 and 40
potential cyber attacks in the years 2001-2009. “Without the [Section] 702 tool, we would not have identified Najibullah
Zazi,” Joyce said.
Terrorists are using the internet to expand, the United States needs to monitor them.
Richard A. Posner, 2008, Senior Lecturer in Law, The University of Chicago. “Privacy, Surveillance, and Law”, The University of Chicago
Law Review, Jstor, http://www.jstor.org/stable/20141907
Privacy is the terrorist's best friend, and the terrorist's privacy has been enhanced by the same
technological developments that have both made data mining feasible and elicited vast quantities of per sonal
information from innocents: the internet, with its anonymity, and the secure encryption of digitized data which, when combined
with that anonymity, make the internet a powerful tool of conspiracy. The government has a compelling
need to exploit digitization in defense of national security. But if it is permitted to do so, intelligence
officers are going to be scrutinizing a mass of personal information about US citizens. And we know that
many people do not like even complete strangers poring over the details of their private lives. But
the fewer of these strangers
who have access to those details and the more profes sional their interest in them, the less the affront
to the sense of privacy. One reason people do not much mind having their bodies examined by
doctors is that they know that doctors' interest in bodies is profes sional rather than prurient ; and we
can hope that the same is true of intelligence professionals.
Preventing Terrorism Necessitates Domestic Spying
We need technology that can gather information against terrorists, even if it
necessitates collecting that of US citizens.
Glenn Sulmasy, 2013, Department of Humanities, Professor of Law, U.S. Coast Guard Academy, “Why We Need Government
Surveillance”, Center for National Policy, http://cnponline.org/ht/d/ViewBloggerThread/i/42295
Opinion: Edward Snowden is a hero The
current threat by al Qaeda and jihadists is one that requires aggressive
intelligence collection and efforts. One has to look no further than the disruption of the New York City subway bombers (the one
being touted by DNI Clapper) or the Boston Marathon bombers to know that the war on al Qaeda is coming home to us, to
our citizens, to our students, to our streets and our subways. This 21st century war is different and
requires new ways and methods of gathering information. As technology has increased, so has our
ability to gather valuable, often actionable, intelligence. However, the move toward "home-grown"
terror will necessarily require, by accident or purposefully, collections of U.S. citizens conversations
with potential overseas persons of interest. Where is NSA leaker Edward Snowden? What could authorities do with
Snowden? Snowden's path to top secret clearance Where is Edward Snowden? An open society, such as the United States, ironically
needs to use this technology to protect itself. This truth is naturally uncomfortable for a country with
a Constitution that prevents the federal government from conducting "unreasonable searches and
seizures." American historical resistance towards such activities is a bedrock of our laws, policies and
police procedures. But what might have been reasonable 10 years ago is not the same any longer. The
constant armed struggle against the jihadists has adjusted our beliefs on what we think our government can, and must, do in order to protect
its citizens. However, when we hear of programs such PRISM, or the Department of Justice getting phone records of scores of citizens without
any signs of suspicious activities nor indications of probable cause that they might be involved in terrorist related activities, the American
demand for privacy naturally emerges to challenge such "trolling" measures or data-mining. The
executive branch, although
particularly powerful in this arena, must ensure the Congress is kept abreast of activities such as these
surveillance programs. The need for enhanced intelligence activities is a necessary part of the war on
al Qaeda, but abuse can occur without ensuring the legislative branch has awareness of aggressive tactics such as these. Our Founding
Fathers, aware of the need to have an energetic, vibrant executive branch in foreign affairs, still anticipated checks upon the presidency by the
legislature. Working
together, the two branches can ensure that both legally, and by policy, this is what
the citizens desire of their government -- and that leaks such as Snowden's won't have the impact and damage that his leaks are
likely to cause.
Terrorists Use the Internet to Plan Attacks (1/2)
Terrorists use the internet to plan attacks
Thomas, Timothy L. Lieutenant Colonel of U.S. Army. 2003. Al Qaeda and the Internet:¶ The Danger¶ of
“Cyberplanning”. http://www.dtic.mil/dtic/tr/fulltext/u2/a485810.pdf. Date Accessed: 7/16/13
We can say with some certainty, al Qaeda loves the Internet. When the latter¶ first appeared, it was hailed as an
integrator of cultures and a medium for¶ businesses, consumers, and governments to communicate with one another. It¶ appeared to offer
unparalleled opportunities for the creation of a “global village.” Today the
Internet still offers that promise, but it also has proven in
some¶ respects to be a digital menace. Its use by al Qaeda is only one example. It also has ¶ provided a
virtual battlefield for peacetime hostilities between Taiwan and¶ China, Israel and Palestine, Pakistan
and India, and China and the United States¶ (during both the war over Kosovo and in the aftermath of the collision between¶
the Navy EP-3 aircraft and Chinese MiG). In times of actual conflict, the Internet¶ was used as a virtual battleground between NATO’s coalition
forces and elements of the Serbian population. These real tensions from a virtual interface involved not only nation-states but also non-state
individuals and groups either¶ aligned with one side or the other, or acting independently. Evidence strongly suggests that terrorists
used
the Internet to plan their¶ operations for 9/11. Computers seized in Afghanistan reportedly revealed
that¶ al Qaeda was collecting intelligence on targets and sending encrypted messages¶ via the
Internet. As recently as 16 September 2002, al Qaeda cells operating in¶ America reportedly were
using Internet-based phone services to communicate¶ with cells overseas. These incidents indicate
that the Internet is being used as a¶ “cyberplanning” tool for terrorists. It provides terrorists with
anonymity, command and control resources, and a host of other measures to coordinate and
integrate attack options.
The internet is used by terrorists to recruit and plan attacks
Mueller, Robert S. 2012 (Director of the Federal Bureau of Investigation. “Statement Before the House
Appropriations Committee, Subcommittee on Commerce, Justice, Science, and Related Agencies”. 7
March. Accessed 16 July 13. http://www.fbi.gov/news/testimony/fbi-budget-request-for-fiscal-year2013)
The basis from which acts of terrorism are committed—from organizations to affiliates/surrogates to
self-radicalized individuals—continue to evolve and expand. Of particular note is al Qaeda’s use of
online chat rooms and websites to recruit and radicalize followers to commit acts of terrorism. And
they are not hiding in the shadows of cyber space: al Qaeda in the Arabian Peninsula has produced a
full-color, English-language online magazine. Terrorists are not only sharing ideas; they are soliciting
information and inviting communication. Al Shabaab, the al Qaeda affiliate in Somalia, uses Twitter to
taunt its enemies—in English—and encourage terrorist activity.
Terrorists use information on the internet to plan attacks
Thomas, Timothy L. 2003. Lieutenant Colonel of U.S. Army. Al Qaeda and the Internet:¶ The Danger¶
of “Cyberplanning”. http://www.dtic.mil/dtic/tr/fulltext/u2/a485810.pdf. Date Accessed: 7/16/13
The Internet is used to gather information on potential targets. The¶ website operated by the Muslim
Hackers Club reportedly featured links to US¶ sites that purport to disclose sensitive information like
code names and radio frequencies used by the US Secret Service. The same website offers tutorials in
viruses, hacking stratagems, network “phreaking” and secret codes, as well as links¶ to other militant
Islamic and cyberprankster web addresses.17Recent targets that¶ terrorists have discussed include the Centers for Disease
Control and Prevention¶ in Atlanta; FedWire, the money-movement clearing system maintained by the¶ Federal Reserve Board; and facilities
controlling the flow of information over¶ the Internet.18Attacks on critical infrastructure control systems would be particularly harmful,
especially on a system such as the Supervisory Control and Data¶ Acquisition (SCADA) system. Thus any information on insecure network
architectures or non-enforceable security protocols is potentially very damaging.¶ Terrorists
have access, like many
Americans, to imaging data on potential targets, as well as maps, diagrams, and other crucial data on
important facilities or networks. Imaging data can also allow terrorists to view counterterrorist ¶
activities at a target site. One captured al Qaeda computer contained engineering¶ and structural architecture features of a dam,
enabling al Qaeda engineers and¶ planners to simulate catastrophic failures.19
Terrorists Use the Internet to Plan Attacks (2/2)
Terrorist groups can use the internet to infiltrate vital US networks and explore their
flaws.
Thomas, Timothy L. Lieutenant Colonel of U.S. Army. 2003. Al Qaeda and the Internet:¶ The Danger¶
of “Cyberplanning”. http://www.dtic.mil/dtic/tr/fulltext/u2/a485810.pdf. Date Accessed: 7/16/13
The Internet can be used to divert attention from a real attack scenario. Al Qaeda can plant threats on
the Internet or via cell phones to mislead law¶ enforcement officials. Terrorists study how the United
States collects and analyzes information, and thus how we respond to information.¶ Terrorists know
when their Internet “chatter” or use of telecommunications increases, US officials issue warnings.
Terrorists can thus introduce false¶ information into a net via routine means, measure the response it
garners from the¶ US intelligence community, and then try to figure out where the leaks are in their ¶
systems or what type of technology the United States is using to uncover their¶ plans. For example, if
terrorists use encrypted messages over cell phones to discuss a fake operation against, say, the Golden Gate Bridge, they can then sit back¶ and
watch to see if law enforcement agencies issue warnings regarding that particular landmark. If they do, then the terrorists know their
communications are¶ being listened to by US officials.3
The Internet is Key to Terrorist Communication
The internet is becoming the premier method of terrorist communication
Congressional Research Service. 2007 (An office of the Library of Congress. “Terrorist Capabilities
for Cyberattack: Overview and Policy Issues”. 22 Jan. Accessed 16 July 13.
http://www.gwu.edu/~nsarchiv/NSAEBB/NSAEBB424/docs/Cyber-024.pdf)
Just as people all over the world now use the Internet, terrorists also use it as a modern tool for
communication. Terrorists and extremist groups have reportedly generated thousands of Internet web
sites to support psychological operations, fund raising, recruitment, and coordination of activities.
Recently, the Department of State’s Counterterrorism Director noted “the most worrisome scenario of
another attack in the homeland is lone operatives who slip into the country and take directions
through cyberspace.” A significant concern is that some of these web sites used for the suspected
terrorist activity are hosted on Internet Service Providers inside the United States. The level of technical
sophistication of the extremist groups that use and operate these web sites has also increased. In 2006 it
was reported that an organization linked to al-Qaeda produced a 26-page manual providing
instructions on the use of the Google search engine to further the goals of global jihad. Recently
British forces in Iraq have found print-outs of Google-Earth pictures that reportedly were to be used
for targeting of coalition forces.
Internet Key to Terrorist Funding
Terrorists can transfer funds digitally, and there is nothing we can do to stop them
Bucci, Steven. 2009 (Director of the Douglas and Sarah Allison Center for Foreign Policy Studies. "The
Confluence of Cyber Crime and Terrorism". 12 Jun. http://www.heritage.org/research/lecture/theconfluence-of-cyber-crime-and-terrorism)
A new wrinkle that is developing is the use of virtual worlds. There is hard evidence of money
transfers having been made within these worlds. This is done by using real cash to buy virtual
currency, conducting various transactions within the virtual environment, and then converting it back
into real cash again in a completely different temporal location. It is all safe, clean, legal, and nearly
impossible to trace.
Internet Key to Terrorist Education
Digital terrorist libraries contain detailed instructions on how to conduct sophisticated
cyber attacks
Congressional Research Service. 2007 (An office of the Library of Congress. “Terrorist Capabilities
for Cyberattack: Overview and Policy Issues”. 22 Jan. Accessed 16 July 13.
http://www.gwu.edu/~nsarchiv/NSAEBB/NSAEBB424/docs/Cyber-024.pdf)
The Washington Times has reported that Islamic extremists are calling for creation of an Islamist
hackers’ army to plan cyberattacks against the U.S. government and that postings on the extremist
bulletin board, al-Farooq, carry detailed cyberattack instructions, and include spyware programs for
download that can be used to learn the passwords of targeted users. Other extremist websites
reportedly resemble online training camps that may offer instructions for how to create a safe-house,
how to clean a rocket-propelled grenade launcher, or what to do if captured.
Terrorist organizations are building out digital libraries with resources on how to
conduct attacks
Congressional Research Service. 2007 (An office of the Library of Congress. “Terrorist Capabilities
for Cyberattack: Overview and Policy Issues”. 22 Jan. Accessed 16 July 13.
http://www.gwu.edu/~nsarchiv/NSAEBB/NSAEBB424/docs/Cyber-024.pdf)
Senior leadership of al-Qaeda, who reportedly have access to the most modern technology equipment,
and other terrorist groups are reportedly building a massive and dynamic online library of training
materials, many of which are supported by subject matter experts who answer questions on message
boards or in chat rooms. This online library covers such areas as how to mix poisons for chemical
attacks, how to ambush U.S. soldiers, how to coordinate a suicide bomb attack, and how to hack
computers. One discussion forum popular with supporters of terrorism is called Qalah, or Fortress,
where potential al Qaeda recruits can find links to the latest in computer hacking techniques in a
discussion area called “electronic jihad.”
Cyberterror Impacts: Economy
Cyber Terror attacks have the capability of causing economic damage- Stock markets
and actual loss to companies
Cashell, Jackson, Jickling, and Webel; 2004 (Brian Cashell, William D. Jackson, Mark Jickling, and
Baird Webel, April 1, 2004, Government and Finance Division, CRS report for Congress, The Economic
Impact of Cyber-attacks, https://www.fas.org/sgp/crs/misc/RL32331.pdf) accessed 7/26/13
A central issue, in both public and private sectors, is whether we are devoting enough resources to
information security. Part of the answer must come from economic analysis. What are the costs, both
historical and potential, of security breaches? How frequently can attacks be expected? Can these
factors be quantified precisely, so that organizations can determine the optimal amount to spend on
information security and measure the effectiveness of that spending? No one in the field is satisfied with
our present ability to measure the costs and probabilities of cyber-attacks. There are no standard
methodologies for cost measurement, and study of the frequency of attacks is hindered by the
reluctance of organizations to make public their experiences with security breaches. This report
summarizes the limited empirical data on attack costs, and surveys recent theoretical work that seeks to
overcome the absence of reliable and comprehensive statistics.
Investigations into the stock price impact of cyber-attacks show that identified target firms suffer
losses of 1%-5% in the days after an attack. For the average New York Stock Exchange Corporation,
price drops of these magnitudes translate into shareholder losses of between $50 million and $200
million. Several computer security consulting firms produce estimates of total worldwide losses
attributable to virus and worm attacks and to hostile digital acts in general. The 2003 loss estimates
by these firms range from $13 billion (worms and viruses only) to $226 billion (for all forms of overt
attacks). The reliability of these estimates is often challenged; the underlying methodology is basically
anecdotal. The insurance industry’s response to rising perceptions of cyber-risk has been twofold.
Initially, most companies excluded, and continue to exclude, cyber-attacks from standard business
insurance coverage. After this initial exclusion, several insurers then began selling specialized cyber-risk
policies. Growth of the market has been slow; lacking the empirical data to construct actuarial tables,
insurers are unable to price risk with the degree of confidence they enjoy in traditional insurance lines.
Uniqueness: Risk of Terrorism is High
Terrorism continuously poses a serious threat to the U.S.
Gertz, Bill, senior editor of the Washington Free Beacon, June 19, 2013
The threat posed by al Qaeda terrorism around the world continues to increase despite President
Barack Obama’s recent claim that the central group behind the Sept. 11, 2001, attacks is on the path to
defeat, according to U.S. and foreign counterterrorism officials and private experts. Obama said in a
speech to the National Defense University May 23 that because of the death of al Qaeda leader Osama
bin Laden and most of his top aides, “we are safer.” While terrorist threats still exist, “the core of al
Qaeda in Pakistan and Afghanistan is on the path to defeat,” the president said. However, a U.S.
counterterrorism official said the threat posed by al Qaeda is growing. “From Africa to Pakistan, it is
spreading systematically,” the official said. The official blamed the Obama administration policy of
focusing its counterterrorism efforts almost exclusively on central al Qaeda. The focus on Pakistan and
Afghanistan resulted in a lack of targeted counterterrorism efforts in other locations, the official said.
The official added that counterterrorism efforts have been weakened by the administration’s policy of
dissociating Islam from al Qaeda and other Islamist terrorism. The policy was a key effort of John
Brennan, White House counterterrorism chief during the first Obama administration. As CIA director,
Brennan has expanded the policy of limiting links between Islam and terrorism at the agency. The result
is that Islamist terror groups are flourishing, posing direct threats to the United States and to U.S.
interests outside the country, the official said. That assessment is bolstered by a new report by the
private Lignet intelligence group. The report made public Tuesday says the U.S. government’s
overreliance on sanctions and surveillance has limited the war on terror. The result is “a decentralized
al Qaeda structure—and a much greater threat,” the report said. “Al Qaeda has transitioned from a
hierarchical cell structure to a franchise organization that is now responsible for four times as many
terrorist attacks a year as it was before 9/11,” the report said.
Terrorist attack against the United States is imminent
Jenkins, Brian Michael. senior adviser to the RAND president. July 10, 2013. Could Terrorists Pull Off a
Mumbai-Style Attack in the U.S.? http://www.usnews.com/opinion/blogs/worldreport/2013/07/10/could-terrorists-launch-a-mumbai-style-attack-in-the-united-states. Date Accessed
7/17/13.
The event provided the latest evidence that the means of an armed terrorist attack are certainly
available in the United States. We've seen it over and over again, in Newtown, Connecticut; Aurora, Colorado; on the campus of
Virginia Tech, to name just a few.¶ Although these killings involved a single shooter without a terror agenda,
they demonstrate that one person, with little or no training, can acquire and effectively use firearms
to achieve high body counts. A review of the most deadly mass killings in the United States, going back
to the Columbine High School murders in 1999, show that an average of 15 people died per attack.
That's close to what each of the trained terrorist teams achieved in Mumbai.¶ [Read the U.S. News Debate:
Should People Be Allowed to Carry Guns Openly?]¶ But acquiring the firepower needed to carry out a mass murder is only one part of the
equation. An armed terrorist attack along the lines of that carried out in Mumbai presents a series of logistical challenges, starting with
recruiting and training a willing and able suicide assault force.¶ In Mumbai, there were 10 terrorists, armed with assault rifles, pistols, grenades
and improvised explosives. They carried out coordinated attacks across the city, paralyzing a metropolis of 14 million people for 60 hours while
mesmerizing the world's media. It was a complex operation and likely the culmination of months of training.¶ There are two ways a Mumbaistyle attack could be carried out in the United States. Terrorist
planners could assemble and train a team of attackers
abroad and attempt to infiltrate them into the United States, or homegrown terrorists could assemble
and launch a Mumbai-style attack. So far, neither has happened in the modern history of terrorism in the United States.¶ Bringing
a team of trained terrorists into the United States would be extremely difficult today, an audacious endeavor even by al-Qaida standards.
Improved intelligence worldwide has degraded the operational capabilities of al-Qaida and has made its operating environment more hostile.
And any large mobilization of terrorist personnel would likely be noticed by intelligence gatherers.
A2: Terrorists Are Not Tech Savvy
Terrorists are more capable with technology than the United States government
Congressional Research Service. 2007 (An office of the Library of Congress. “Terrorist Capabilities
for Cyberattack: Overview and Policy Issues”. 22 Jan. Accessed 16 July 13.
http://www.gwu.edu/~nsarchiv/NSAEBB/NSAEBB424/docs/Cyber-024.pdf)
A recent study of more than 200,000 multimedia documents on 86 sample websites concluded that
extremists exhibited similar levels of web knowledge as U.S. government agencies, and that the
terrorist websites employed significantly more sophisticated multimedia technologies than U.S.
government websites. The study concluded that these extremist websites support advanced Internetbased communication tools such as online forums and chat rooms more frequently than U.S.
government web sites. Because of perceived anonymity, terrorist likely feel safer when working
together on the Internet.
A2: Digital Surveillance of Terrorists Outside of US
Many terrorist websites are hosted on servers within the United States
Congressional Research Service. 2007 (An office of the Library of Congress. “Terrorist Capabilities
for Cyberattack: Overview and Policy Issues”. 22 Jan. Accessed 16 July 13.
http://www.gwu.edu/~nsarchiv/NSAEBB/NSAEBB424/docs/Cyber-024.pdf)
Just as people all over the world now use the Internet, terrorists also use it as a modern tool for
communication. Terrorists and extremist groups have reportedly generated thousands of Internet
web sites to support psychological operations, fund raising, recruitment, and coordination of
activities. Recently, the Department of State’s Counterterrorism Director noted “the most worrisome
scenario of another attack in the homeland is lone operatives who slip into the country and take
directions through cyberspace.” A significant concern is that some of these web sites used for the
suspected terrorist activity are hosted on Internet Service Providers inside the United States. The level
of technical sophistication of the extremist groups that use and operate these web sites has also
increased. In 2006 it was reported that an organization linked to al-Qaeda produced a 26-page manual
providing instructions on the use of the Google search engine to further the goals of global jihad.
Recently British forces in Iraq have found print-outs of Google-Earth pictures that reportedly were to
be used for targeting of coalition forces.
Cyberattacks
US Is Vulnerable to Cyberattacks
Director of National Intelligence agrees US is vulnerable to cyberattacks; we are
compromising information to foreign countries.
James R. Clapper, Director of National Intelligence, 2011, “Statement for the Record on the Worldwide
Threat Assessment of the U.S. Intelligence Community for the House Permanent Select Committee on
Intelligence”,
http://intelligence.house.gov/sites/intelligence.house.gov/files/documents/DNISFR021011.pdf
As we expand our ability to create and share knowledge, maintain our society and produce economic
goods, we are developing new vulnerabilities and enabling those who would steal, corrupt, harm or
destroy public and private assets vital to our national interests. In the past year, we have seen a
dramatic increase in malicious cyber activity targeting US computers and networks; almost two-thirds of
US firms report that they have been the victim of cybersecurity incidents or information breaches,
while the volume of malicious software (“malware”) on American networks more than tripled from
Industry estimates that the production of malware has reached its highest levels, with an
average of 60,000 new pieces identified per day. Almost half of all US computers have been
compromised, according to another industry survey. This current environment favors those who desire
to exploit our vulnerabilities with the trend likely getting worse over the next five years because of the
slow adoption of defensive best practices and rapid advances in offensive vulnerability discovery and
In April a large number of routing paths to various Internet Protocol addresses were
redirected through networks in China for 17 minutes due to inaccurate information posted by a
Chinese Internet Service Provider. This diversion of data would have given the operators of the
servers on those networks the ability to read, delete, or edit e-mail and other information sent along
those paths. This incident affected traffic to and from U.S. Government and military sites, including
sites for the Senate, the Army, the Navy, the Marine Corps, the Air Force, and the office of the
Secretary of Defense, as well as a number of Fortune 500 firms.
information technology supply chain can hide many risks. Such vulnerability was demonstrated by
employees at a US firm who were convicted for supplying counterfeit computer hardware to U.S.
government, military, a
Last year some of our largest information technology and defense contractor companies discovered that
throughout much of 2009 they had been the targets of a systematic effort to penetrate their networks
and acquire proprietary information. The intrusions attempted to gain access to and potentially modify
Our identities are increasingly vulnerable. Cyber criminals are stalking prospective victims on social
networking sites, acquiring personal information to tailor „spear phishing‟ emails to gather 28 more
information that can be used to facilitate identity theft. They are intercepting messages exchanged by
mobile devices to validate transactions, and masquerading as their victims to steal funds from their bank
accounts. Further, the consolidation of data captured in emails, social networks, Internet search
engines, and geographic location of mobile service subscribers increases the potential for
identification and targeting of government personnel by criminals, or by intelligence organizations. In
the last year, we have witnessed the emergence of foreign military capabilities in cyber space. This
formalization of military cyber capabilities creates another tool that foreign leaders may use to
undermine critical infrastructures that were previously assumed secure before or during conflict. The
IC is reaching out to the private sector to ensure current understanding of the dynamic cyber
environment. More government-private sector and international cooperation is still required across the
cybersecurity landscape.
Cyberattack Impacts: Laundry List
Cyber attacks by terrorist organizations are happening in the status quo, and they are
become increasingly dangerous, with some groups gaining the capacity to cripple the
economy and kill millions of civilians by attacking infrastructure
Panetta, Leon. 2012 (United States Secretary of Defense. Published by the United States Department
of Defense online as "Remarks by Secretary Panetta on Cybersecurity to the Business Executives for
National Security, New York City". 11 Oct. Accessed 16 July 13.
http://www.defense.gov/transcripts/transcript.aspx?transcriptid=5136)
I know that when people think of cybersecurity today, they worry about hackers and criminals who
prowl the Internet, steal people's identities, steal sensitive business information, steal even national
security secrets. Those threats are real and they exist today.¶ But the even greater danger [is] -- the
greater danger facing us in cyberspace goes beyond crime and it goes beyond harassment. A cyber
attack perpetrated by nation states or violent extremist groups could be as destructive as the terrorist
attack on 9/11. Such a destructive cyber-terrorist attack could virtually paralyze the nation.¶ Let me
give you some examples of the kinds of attacks that we have already experienced.¶ In recent weeks, as
many of you know, some large U.S. financial institutions were hit by so-called Distributed Denial of
Service attacks. These attacks delayed or disrupted services on customer websites. While this kind of
tactic isn't new, the scale and speed with which it happened was unprecedented.¶ But even more
alarming is an attack that happened two months ago when a very sophisticated virus called Shamoon
infected computers in the Saudi Arabian State Oil Company Aramco. Shamoon included a routine
called a ‘wiper’, coded to self-execute. This routine replaced crucial systems files with an image of a
burning U.S. flag. But it also put additional garbage data that overwrote all the real data on the
machine. More than 30,000 computers that it infected were rendered useless and had to be replaced.
It virtually destroyed 30,000 computers.¶ Then just days after this incident, there was a similar attack on
RasGas of Qatar, a major energy company in the region. All told, the Shamoon virus was probably the
most destructive attack that the private sector has seen to date.¶ Imagine the impact an attack like that
would have on your company or your business.¶ These attacks mark a significant escalation of the cyber
threat and they have renewed concerns about still more destructive scenarios that could unfold.¶ For
example, we know that foreign cyber actors are probing America's critical infrastructure networks.
They are targeting the computer control systems that operate chemical, electricity and water plants
and those that guide transportation throughout this country.¶ We know of specific instances where
intruders have successfully gained access to these control systems. ¶ We also know that they are
seeking to create advanced tools to attack these systems and cause panic and destruction and even
the loss of life.¶ Let me explain how this could unfold. An aggressor nation or extremist group could use
these kinds of cyber tools to gain control of critical switches. They could, for example, derail passenger
trains or even more dangerous, derail trains loaded with lethal chemicals. ¶ They could contaminate
the water supply in major cities or shutdown the power grid across large parts of the country.¶ The
most destructive scenarios involve cyber actors launching several attacks on our critical infrastructure
at one time, in combination with a physical attack on our country. Attackers could also seek to disable
or degrade critical military systems and communication networks.¶ The collective result of these kinds
of attacks could be a cyber Pearl Harbor; an attack that would cause physical destruction and the loss
of life. In fact, it would paralyze and shock the nation and create a new, profound sense of vulnerability.
Cyberattack Impacts: Terrorists are a Threat
Terrorists, given the capability, would launch full-scale cyberattacks
Mueller, Robert S. 2012 (Director of the Federal Bureau of Investigation. “Statement Before the House
Appropriations Committee, Subcommittee on Commerce, Justice, Science, and Related Agencies”. 7
March. Accessed 16 July 13. http://www.fbi.gov/news/testimony/fbi-budget-request-for-fiscal-year2013)
To date, terrorists have not used the Internet to launch a full-scale cyber attack, but we cannot
underestimate their intent. Terrorists have shown interest in pursuing hacking skills. And they may
seek to train their own recruits or hire outsiders, with an eye toward pursuing cyber attacks. These
adaptations of the terrorist threat make the FBI’s counterterrorism mission that much more difficult and
challenging.
Terrorist organization are capable of cyberattacks against both United States
government targets and infrastructure, and they are aware of the value those strikes
hold for their cause
Congressional Research Service. 2007 (An office of the Library of Congress. “Terrorist Capabilities
for Cyberattack: Overview and Policy Issues”. 22 Jan. Accessed 16 July 13.
http://www.gwu.edu/~nsarchiv/NSAEBB/NSAEBB424/docs/Cyber-024.pdf)
A recent study of more than 200,000 multimedia documents on 86 sample websites concluded that
In April 2002, the Central Intelligence Agency (CIA) stated in a letter to the U.S. Senate Select Committee
on Intelligence that cyberwarfare attacks against the U.S. critical infrastructure will become a viable
option for terrorists as they become more familiar with the technology required for the attacks. Also
according to the CIA, various groups, including Al Qaeda and Hizballah, are becoming more adept at
using the Internet and computer technologies, and these groups could possibly develop the skills
necessary for a cyberattack. In February 2005, FBI director Robert Mueller, testified before the Senate
Select Committee on Intelligence that terrorists show a growing understanding of the critical role of
information technology in the U.S. economy and have expanded their recruitment to include people
studying math, computer science, and engineering.
Cyberattack Impacts: North Korea Is a Threat
US and South Korean military secrets are at risk from hackers.
Associated Press, 2013, “Hackers targeting U.S., South Korea are after military secrets, cybersecurity experts say”, CBS News,
http://www.cbsnews.com/8301-202_162-57592604/hackers-targeting-u.s-south-korea-are-after-military-secrets-cybersecurity-experts-say/
The hackers who knocked out tens of thousands of South Korean computers simultaneously this year
are out to do far more than erase hard drives, cybersecurity firms say: They also are trying to steal South
Korean and U.S. military secrets with a malicious set of codes they've been sending through the
Internet for years. The identities of the hackers, and the value of any information they have acquired, are not known
to U.S. and South Korean researchers who have studied line after line of computer code. But they do not
dispute South Korean claims that North Korea is responsible, and other experts say the links to military spying add fuel to Seoul's allegations.
Researchers at Santa Clara, California-based McAfee Labs said the malware was designed to find and upload information referring to U.S. forces
in South Korea, joint exercises or even the word "secret." McAfee said versions of the malware have infected many websites in an ongoing
attack that it calls Operation Troy because the code is peppered with references to the ancient city. McAfee said that in 2009, malware was
implanted into a social media website used by military personnel in South Korea. "This goes deeper than anyone had understood to date, and
it's not just attacks: It's military espionage," said Ryan Sherstobitoff, a senior threat researcher at McAfee who gave The Associated
Press a report that the company is releasing later this week. He analyzed code samples shared by U.S. government partners and private
customers. McAfee found versions of the keyword-searching malware dating to 2009. A South Korean cybersecurity researcher, Simon Choi,
found versions of the code as early as 2007, with keyword-searching capabilities added in 2008.
It was made by the same people
who have also launched prior cyberattacks in South Korea over the last several years, Choi said. Versions
of the code may still be trying to glean military secrets from infected computers. Sherstobitoff said the same
coded fingerprints were found in an attack on June 25 - the anniversary of the start of the 1950-53 Korean War - in which websites for South
Korea's president and prime minister were attacked. A day later the Pentagon said it was investigating reports that personal information about
thousands of U.S. troops in South Korea had been posted online.’
Cyberattack Impacts: Iran Is a Threat
Iranian Hackers have the ability to steal information and use it to shut down energy
and infrastructure.
Dana Liebelson, 2013, reporter for MotherJones, “Why Iran's Hackers Might Be Scarier Than China's”,
http://www.motherjones.com/politics/2013/05/who-has-scarier-hackers-china-or-iran
May was a grim month for American cybersecurity. First, the Obama administration accused China of
hacking government computers, potentially to exploit weaknesses in the US military. Then, US officials
announced that hackers, believed to be sponsored by the Iranian government, had successfully
broken into computer networks that run US energy companies, giving Iran the means to sabotage
power plants. This week, the Washington Post reported that Chinese cyberspies had hacked more than
two dozen big-name US weapons programs, including the F-35 fighter jet, an army program for downing
ballistic missiles, and the Navy's Littoral Combat ship. Not all cyberthreats are equal, but one question
remains: Who poses the greater danger—Chinese or Iranian hackers? To date, Chinese hackers have
gotten more public attention, thanks to a February 2013 New York Times investigation of a top-secret
government hacking operation based in Shanghai, and high-profile attacks, originating from China, on
US media outlets. But experts point out that though China has greater capabilities for cyberwarfare and
is actively stealing US military secrets, Iran's attacks could ultimately be more worrisome, because its
hackers are targeting critical infrastructure and developing the ability to cause serious damage to the
United States' power grid. "The Chinese are engaged in cyberespionage, which is more or less
understood," says Richard Bejtlich, the chief security officer at Mandiant, a company that offers
cybersecurity services for Fortune 100 companies. "We know what lines they will and will not cross. But
a country like Iran is much more willing to be destructive. They go ahead and delete computers, they
corrupt them, and they cause a lot of trouble." James Lewis, a cybersecurity specialist at the Center for
Strategic and International Studies who frequently advises the White House, agrees that Iran's "attacks
on critical infrastructure are probably the bigger threat…Iran is much more unstable." Hackers directly
backed by the Iranian government have demonstrated the capability to destroy critical information
and an interest in causing damage to US computer systems, not simply hacking them to collect
information. According to the Wall Street Journal, in their most recent campaign, Iranian-linked hackers
broke into computer systems to gain information on how US energy companies run their operations,
acquiring the means to "disrupt or destroy them in the future." Iranian hackers were also blamed by
US officials for erasing thousands of hard drives owned by Saudi Aramco, the world's biggest oil
company, in August 2012.
Cyberattack Impact: US Retaliation
Security Leader Says U.S. Would Retaliate Against Cyberattacks
Mark Mazzetti and David E. Sanger.(Authors of New York Times.)"Security Leader Says U.S. Would
RetaliateAgainstCyberattacks."March12,2013.NewYorkTimes.http://www.nytimes.com/2013/03/13/us/
intelligence-official-warns-congress-that-cyberattacks-pose-threat-to-us.html?pagewanted=all&_r=0
The chief of the military’s newly created Cyber Command told Congress on Tuesday that he is
establishing 13 teams of programmers and computer experts who could carry out offensive
cyberattacks on foreign nations if the United States were hit with a major attack on its own networks,
the first time the Obama administration has publicly admitted to developing such weapons for use in wartime.¶ “I would like to be clear that
this team, this defend-the-nation team, is not a defensive team,” Gen. Keith Alexander, who runs both the National Security Agency and the
new Cyber Command, told the House Armed Services Committee. “This
is an offensive team that the Defense
Department would use to defend the nation if it were attacked in cyberspace. Thirteen of the teams
that we’re creating are for that mission alone.”¶ General Alexander’s testimony came on the same day the nation’s top
intelligence official, James R. Clapper Jr., warned Congress that a major cyberattack on the United States
could cripple the country’s infrastructure and economy, and suggested that such attacks now pose the
most dangerous immediate threat to the United States, even more pressing than an attack by global
terrorist networks.¶
Cyberattack Impacts: Harms National Security
Cyberattacks are a serious threat to our national security, lives, infrastructure, and
economy
Dorgan, Byron L. 2013 (Former United States Senator. “Cyber Terror is a New Language Of War We
Barely Understand”. 16 July 13. Accessed 16 July 13. http://www.policymic.com/articles/54927/cyberterror-is-the-new-language-of-war-that-we-understand-only-vaguely)
A new novel I’ve just co-authored with David Hagberg titled Gridlock is a story about a computer virus
created in Russia, stolen by the Iranians and used to shut down the electric power grid in the U.S. It
causes chaos, loss of life, and brings our economy to its knees … all done by an enemy we can’t see
using digital weapons rather than firearms.
Our [the] book is fiction, but that scenario and many others now constitute real and serious threats to
our country every day. Those threats are to our personal identity, our bank accounts and the
information we store on our computers. Most importantly, the threats are to our country and the vital
services and national security interests that are essential to the functioning of our economy.
Cyberattack Impacts: Economy
Cyberterrorism and cyberattacks can cripple the economy, technology leadership, an
harm critical infrastructure
Borchgrave ’12 (Arnaud de Borchgrave, member of the Atlantic Council and editor-at-large at UPI and
the Washington Times, “Cyber Pearl Harbor,” New Atlanticist, 10/2/2012,
http://www.acus.org/new_atlanticist/cyber-pearlharbor?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+new_atlanticist+%28N
ew+Atlanticist%29)
A shadowy hacker group in the Middle East has disrupted the electronic banking operations of some
of the United States' largest financial institutions, The Seattle Times reported. But this is hardly new.
Five years ago, Goldman Sachs' chief technology officer reported this venerable financial institution
had sustained more than 1 million "intrusion attempts in a single day." A military cybernaut expert,
speaking privately, said the Pentagon sustains up to 6 million such probes a day. How many were
successful remains highly classified. But one Pentagon cyber expert said the vast building's internal
communications system was disrupted once for 48 hours. The number of hostile hacker penetrations
remains top secret. At Wells Fargo, U.S. Bancorp and Bank of America, the Seattle newspaper
reported, a group identifying itself as Izz ad-Din al-Qassam Cyber Fighters attacked their websites and
"left customers temporarily unable to access their checking accounts, mortgages and other services."
Electronic crime is a fast-spreading plague. In recent years, there have been massive denial-of-service
attacks. Computers are flooded with communications demands that cause systems to back up, seize
up and shut down. These Islamist cyber fighters said their attacks would continue until a video that
insults Prophet Muhammad and triggered riots from Indonesia to Pakistan to Egypt to Libya is
removed from the Internet. The 15-minute video, the work of a rank amateur, went viral several
weeks ago and can no longer be deleted. Cyber terrorists have been lurking the 'Net a lot longer than
the offending video. And critical electronic infrastructure -- from valves that regulate water flows from
dams to air traffic control and transnational banking systems -- is vulnerable everywhere. Israel and
the United States have been waging electronic warfare against Iran's secret underground uranium
enrichment activities. Clearly, Iran is retaliating by using electronic terrorist groups, both homegrown
and Middle Eastern. In mid-September, the FBI warned of "a new trend in which cyber criminal actors
are using spam and phishing emails" as weapons to attack the global networks of financial
institutions." This week, speaking at a Woodrow Wilson International Center meeting devoted to the
growing cyber threat, U.S. Army Gen. Keith B. Alexander, chief of the U.S. Cyber Command (also head of
the National Security Agency), since it was launched two years ago, said the cyber threat has grown in
10 years "from exploitation to disruption to destruction of computer networks." Russia understood
this when the Soviet Union collapsed. The old Soviet Federal Agency for Government Communications
and Information quickly became a cyber command as the new Russian leaders gave priority to one area
where they could perhaps compensate for U.S. military and economic superiority. This gave the Kremlin
a two-decade lead over the United States. USCYBERCOM under Alexander wasn't activated until
September 2010. China activated a cyber command in the mid-1990s. This week, Alexander said cyber
attacks that would crash stock exchanges and markets "are all possible today." He also said "education
is the key to understand what's already happening." At the same event, U.S. Sen. Susan Collins, R-Maine,
ranking member and former chairwoman of the Homeland Security Committee, said "over 200
cyberattacks against our national assets, such as critical water treatment and transportation networks
are just the tip of the iceberg." Collins said she was most concerned about an attack on the nation's
electric power grid. The electronic stealing of intellectual property is critical and already with us round
the clock. "Imagine," she said, "if someone had stolen iPhone5 information and got to market first."
Some company intrusions simply plant an electronic spy to monitor -- and steal -- proprietary secrets.
Massive electronic threats follow on the heels of massive physical infrastructure threats -- the vast
system of highways, bridges, airports, railroads, pipelines, power lines, dams, waterways, water
treatment plants, schools and other publicly owned and publicly regulated facilities, all dangerously
neglected as hundreds of billions were spent on two wars in Iraq and Afghanistan.
Cyberattack Impacts: Hurt Businesses
Targeted Attacks on SMBs (Small and Medium Sized Businesses) Up
Ryan Naraine, a journalist and social media enthusiast specializing in Internet and computer security
issues, July 13, 2012, “Upsurge in targeted attacks against small businesses”, ZDNET,
http://www.zdnet.com/upsurge-in-targeted-attacks-against-small-businesses-7000000883/, Date
Accessed: July 23, 2013
Symantec is reporting a significant uptick in targeted attacks against SMBs (small- and medium-sized
businesses) in the first half of 2012 with about 36 percent of all targeted attacks hitting businesses
with 250 or fewer employees.¶ According to the Symantec Intelligence Report the 36 percent number is up from
18 percent at the end of December 2011.¶ "50% of attacks focused on companies with less than 2500
employees," the report added, noting that it's possible that smaller companies are now being
targeted as a stepping stone to a larger organization because they may be in the partner ecosystem
and less well-defended. "Targeted attacks are a risk for businesses of all sizes – no one is immune to
these attacks," the company warned.
Cyberattack Impacts: Infrastructure
Cyber attack could shut down the US for weeks, us infrastructure relies on data run
systems
Llewellyn King,executive producer and host of "White House Chronicle", 6/10/12, The Devastating Effects of a Cyber-Attack Against a
Country's Energy Grid, http://oilprice.com/Energy/Energy-General/The-Devastating-Effects-of-a-Cyberattack-Against-a-Countries-EnergyGrid.html, date of access- 7/21/13
Computer war has grown up. It has moved from the age of the equivalent of black powder to the
equivalent of high-explosive shells -- not yet nuclear devices but close.¶ Enemies with sophisticated computer
technology, money and determination can now contemplate the possibility of taking down the
electrical systems of large swaths of the nation. Just a small interruption in power supply is
devastating; as has been demonstrated by the recent power outages in 10 states, caused by severe
weather.¶ The world as we know it stops when power fails; gasoline cannot be pumped, air
conditioning and all other household appliances cannot be used, plunging us into a dark age without
the tools of a dark age – candles, firewood, horses and carts.¶ At the center of this vulnerability is a device most
of us have never heard of but is an essential part of modern infrastructure. It is the programmable
logic controller (PLC).¶ In appearance the PLC is usually a small, black box about the size of a woman's purse. It came on the scene
in the 1960s, when microprocessors became available and has grown exponentially in application and
deployment ever since. The full computerization of the PLC put it silently but vitally in charge of nearly
every commercial/industrial operation, from assembly lines to power dispatch.¶ These devices are the
brain box of everything from air traffic systems to railroads. They replaced old-fashioned relays and
human commands, and made automation truly automatic.¶ The revolution brought on by the PLC is an “ultra-important part” of the
continuing story of technological progress, according to Ken Ball, an engineering physicist who has written a history of these devices.¶ Now
the PLC -- this quiet workhorse, this silent servant -- is a cause of worry; not so much from computer hackers, out
for a bit of fun through manipulating a single controller, but from the wreckage that can be achieved
in a government-sponsored cyberattack with planning and malice aforethought.¶ Such an attack could be
launched for diverse purposes against many aspects of our society. But the most paralyzing would be an attack on the
electrical system; on the controllers that run power plant operations and the grid, from coal to nuclear
to natural gas to wind turbines and other renewables.¶ Such a coordinated attack could bring the
United States to its knees for days or weeks with traffic jams, abandoned cars, closed airports and
hospitals reliant on emergency generators while fuel supplies last.¶
Cyber attack devastating, it would take out important infrastructure necessary to
prevent deaths.
FRANCIS, DAVID. Staff analyst for the fiscal times,3/11/13, The Coming Cyber Attack That Could Ruin Your Life, The fiscal times,
http://www.thefiscaltimes.com/Articles/2013/03/11/The-Coming-Cyber-Attack-that-Could-Ruin-Your-Life.aspx#page1, date access- 7/21/13
Last month, a private security
firm announced that Chinese military hackers had launched attacks on the
U.S. government and private companies nearly 147 times in the last seven years, a formal declaration
of a secret cyber war that’s been going on for decades.¶ This war has not yet had a major impact on the lives of average
American citizens: Attacks have resulted in minor service disruptions only, such as not being able to log into online accounts. ¶ But experts
warn these kinds of service breaks are just a small symptom of the serious damage cyber terrorists
and hackers can cause. Officials have said that hackers could cause a cyber 9/11 – an attack could
cause widespread turmoil, including the disappearance of money, electrical failure, and even death.
And America could be the battlefield in which these new techniques of war are tested. ¶ “An adversary
looking to cause chaos could pick any part of critical infrastructure, from banking to power to health
care,” said Jeffrey Carr, chief executive officer of Taia Global, a cyber security firm. “All of those are
vulnerable to cyber attack.” ¶ The most harmful cyber attacks have the ability to impact nearly every
part of American life, putting lives and essential privacy at risk. Without increased vigilance, experts say it’s only a matter of time
before a worst-case scenario becomes a reality. ¶ Hackers have attempted to infiltrate critical infrastructure components like mass transit and
power grids, although few Americans are aware of it. Former
Defense Secretary Leon Panetta says they have had
limited success. But all it takes it one breach to cause chaos.¶ “We know of specific instances where
intruders have successfully gained access to these [critical infrastructure] systems," Panetta said last October
in New York. "We also know that they are seeking to create advanced tools to attack these systems and
cause panic and destruction and even the loss of life. Ӧ Attacks like the one Panetta described could
turn off the power to large parts of the country. Public transportation systems could malfunction and
operators to lose control of systems that prevent crashes. Attackers could also take down
communication systems and Internet access.¶ According to Tom Kellermann, vice president of cyber
security for Trend Micro, attacks on infrastructure could also provide false information to people
making life and death decisions. For instance, hackers could target air traffic control systems,
providing false information that could cause planes to crash. “Everyone implicitly trusts his or her
computer,” he said. “A cyber attack can corrupt this information.”¶ So far, cyber attacks have had limited access to
bank accounts for short periods of time, and some personal information has been stolen. But according to Larry Ponemon, founder of the
Ponemon Institute, a think tank that studies data privacy, hackers want to do more than disrupt: they want to make money disappear. ¶ “In
a
successful attack against a bank, credentials and passwords are gone,” he said. “Hackers are trying to
go into accounts to steal large sums of money.” Maybe, but imagine, for example, that cyber thieves
were able to steal just 1 percent or less from JP Morgan’s $2 trillion in assets . ¶ Health care systems are
also vulnerable to these kinds of attacks. Many doctors and hospitals are now keeping electronic
medical records. Hackers can get access to this information, making changes that could potentially
lead to deadly instances where doctors prescribe unnecessary drugs or order irrelevant procedures for
the patient. ¶ “I have never seen an industry with more gaping security holes,” Avi Rubin, a computer scientist
and technical director of the Information Security Institute at Johns Hopkins University, told the Washington Post last year. “If our financial
industry regarded security the way the health-care sector does, I would stuff my cash in a mattress under my bed."¶ According to Ponemon,
hackers can target individuals without the person ever knowing it. “An
attack could be occurring if you computer is
running weird and slow,” he said. “Often times, hackers will attack computers at time when the user
is most likely sleeping.” When the system is shut down, of course, hackers can’t get in. Once a system has been infiltrated, there’s no
limit to what hackers can steal.¶ “Hackers have the ability to capture info from your devices. They can steal your password, your documents and
your spreadsheets,” Ponemon said. “You can buy dozens of antivirus programs that usually stop most of the bad stuff out there. But there are
always some malware programs that have no signature and can bypass security.” Equally troubling is the hacker’s ability to conduct surveillance
on a victim, Ponemon said.¶ “They turn on and off your camera,” Ponemon said, referring to the Web cameras that are standard in today’s
computers. “They can hack into the voice part of your phone and wiretap a real conversation or use your phone to listen in on real-time
conversations.”¶ Or as Taia Global’s Carr said, “I don’t think there is a limit on the imagination on how much harm could be done.”
Cyberattack Impacts: Mass Death
Cyber attack could devastate us- defense secretary agrees. Tapping into infrastructure
would shut down the US and lead to mass death.
ELISABETH BUMILLER, staff analyst, 10/11/12, Panetta Warns of Dire Threat of Cyberattack on U.S., New York times,
http://www.nytimes.com/2012/10/12/world/panetta-warns-of-dire-threat-of-cyberattack.html?pagewanted=all&_r=0, date access- 7/21/13
Defense Secretary Leon E. Panetta warned Thursday that the United States was facing the possibility
of a “cyber-Pearl Harbor” and was increasingly vulnerable to foreign computer hackers who could
dismantle the nation’s power grid, transportation system, financial networks and government. In a
speech at the Intrepid Sea, Air and Space Museum in New York, Mr. Panetta painted a dire picture of how such an attack
on the United States might unfold. He said he was reacting to increasing aggressiveness and
technological advances by the nation’s adversaries, which officials identified as China, Russia, Iran and
militant groups. ¶ “An aggressor nation or extremist group could use these kinds of cyber tools to gain
control of critical switches,” Mr. Panetta said. “They could derail passenger trains, or even more
dangerous, derail passenger trains loaded with lethal chemicals. They could contaminate the water
supply in major cities, or shut down the power grid across large parts of the country.” ¶ Defense
officials insisted that Mr. Panetta’s words were not hyperbole, and that he was responding to a recent
wave of cyberattacks on large American financial institutions. He also cited an attack in August on the
state oil company Saudi Aramco, which infected and made useless more than 30,000 computers. ¶ But
Pentagon officials acknowledged that Mr. Panetta was also pushing for legislation on Capitol Hill. It would require new standards
at critical private-sector infrastructure facilities — like power plants, water treatment facilities and gas
pipelines — where a computer breach could cause significant casualties or economic damage. ¶ In August,
a cybersecurity bill that had been one of the administration’s national security priorities was blocked
by a group of Republicans, led by Senator John McCain of Arizona, who took the side of the U.S.
Chamber of Commerce and said it would be too burdensome for corporations. ¶ The most destructive
possibilities, Mr. Panetta said, involve “cyber-actors launching several attacks on our critical
infrastructure at one time, in combination with a physical attack.” He described the collective result as
a “cyber-Pearl Harbor that would cause physical destruction and the loss of life, an attack that would
paralyze and shock the nation and create a profound new sense of vulnerability.” ¶ Mr. Panetta also
argued against the idea that new legislation would be costly for business. “The fact is that to fully
provide the necessary protection in our democracy, cybersecurity must be passed by the Congress,”
he told his audience, Business Executives for National Security. “Without it, we are and we will be
vulnerable.” ¶ With the legislation stalled, Mr. Panetta said President Obama was weighing the option
of issuing an executive order that would promote information sharing on cybersecurity between
government and private industry. But Mr. Panetta made clear that he saw it as a stopgap measure
and that private companies, which are typically reluctant to share internal information with the
government, would cooperate fully only if required to by law. ¶ “We’re not interested in looking at e-mail, we’re not
interested in looking at information in computers, I’m not interested in violating rights or liberties of people,” Mr. Panetta told editors and
reporters at The New York Times earlier on Thursday. “But if there is a code, if there’s a worm that’s being inserted, we need to know when
that’s happening.” ¶
Cyberattack Impacts: Mass Death
Cyberattacks could gridlock society and kill millions
Pogatchnik, Shawn. 2013 (Reporter for the Associated Press. “AP Interview: Ex-FBI Chief on Risk of
Cyber Terror”. 7 July. Accessed 16 July 13. http://bigstory.ap.org/article/ap-interview-ex-fbi-chief-riskcyber-terror)
Speaking to The Associated Press ahead of the Global Intelligence Forum starting Monday in Ireland,
Freeh said hackers seeking to take control of, or take down, key pieces of U.S. infrastructure could do
more damage than the attackers of 9/11. He said computer systems controlling power plants, the
navigation of aircraft and ships, and even the switching of street lights could be hijacked to gridlock
societies and kill large groups of people.
"People traditionally think of this threat as somebody stealing their identity or their credit card
number, or making it inconvenient to go to the ATM (cash machine). That's a very benign view of the
potential for what cyber terrorism really is," Freeh said.
"You could manipulate transportation systems, aviation guidance systems, highway safety systems,
maritime operations systems. You could shut down an energy system in the northeast U.S. in the
middle of winter. The potential for mass destruction in terms of life and property is really only limited
by (the attackers') access and success in penetrating and hijacking these networks," he said.
Cyberattack Impact: Prevents Retaliation
When coupled with a traditional attack, a cyberattack would allow a terrorist
organization to pre-emptively cripple response
Bucci, Steven. 2009 (Director of the Douglas and Sarah Allison Center for Foreign Policy Studies. "The
Confluence of Cyber Crime and Terrorism". 12 Jun. http://www.heritage.org/research/lecture/theconfluence-of-cyber-crime-and-terrorism)
If the attacker has used weapons of mass destruction (chemical, biological, radiological, nuclear, and
high-yield explosives) in the kinetic part of the attack, the cyber component can also hinder the ability
to rally consequence-management assets. The victim will have suffered a catastrophic attack and will
be unable to respond effectively to the results. The continued cyber intrusions will not only keep them
from striking back with any real effect, but may make them ineffectual in mobilizing their firstresponder forces.
A2: Cannot Stop Cyberattack
Successful cyber defense is possible
Dorgan, Byron L. 2013 (Former United States Senator. “Cyber Terror is a New Language Of War We
Barely Understand”. 16 July 13. Accessed 16 July 13. http://www.policymic.com/articles/54927/cyberterror-is-the-new-language-of-war-that-we-understand-only-vaguely)
It is certain that those who wish America ill will continue these attacks. Our new novel describes a
scenario of what could happen if we don’t take these new cyber-terror threats seriously. But if we
understand the threat and work hard with the best and brightest in the public and private sectors, we
can successfully defend America and its citizens against this new weapon used by terrorists.
Solvency: Digital Surveillance Solves Cyberattacks
The NSA’s data mining can stop Cyber Terrorism
Michaels, Jim; 2013 (Military Writer at USA TODAY and author of "A Chance in Hell," a widely
praised book on the Iraq war, June 6, 2013, “NSA data mining can help stop cybercrime, analysts say.”
USA Today (http://www.usatoday.com/story/news/politics/2013/06/06/nsa-data-mining-cyber-crimedata/2397165/) July 22, 2013)
The huge volume of telephone records turned over to the U.S. government could help investigators
identify and deter a range of terrorist acts, including cyberattacks, analysts say. "Once you have this big
chunk of data and you have it forever… you can do all sorts of analytics with it using other data
sources," said Joseph DeMarco, former head of the cybercrime unit in the U.S. attorney's office in
New York City. "A data set like this is the gift that keeps on giving," said DeMarco, a partner at the law
firm DeVore & DeMarco. The government obtained an order from the Foreign Intelligence Surveillance
Court ordering a Verizon subsidiary to turn over phone records to the National Security Agency. The
records do not include the content of phone calls and the order does not authorize eavesdropping.
Still, the information can be helpful to investigators looking for patterns, linking people and networks.
Also, phone numbers can be attached to computers, allowing hackers to get into networks through
telephone lines. The data can also be viewed against other databases that help investigators see
patterns and links among people and networks. "All the data is critical," said Robert Rodriguez, a
cybersecurity expert and former Secret Service agent. The government considers many cyberattacks to be acts of terror,
DeMarco said. "The definition of terrorism includes cyberterrorism," he said. The court order also raises questions about the relationship
between the government and industry at a time when so much critical infrastructure, such as power grids and banking, is in the hands of
industry and may be vulnerable to cyberattack.
US Cyber Command is using digital surveillance to thwart cyberattacks and maintain
offensive capabilities
Talitha Dowds, Director and Senior Fellow of the Proliferation Prevention Program, “A New Phase of
Nuclear Terrorism – Cyber Warfare” DoP: MAR 25, 2011 Date of acees: 7/20/13
http://csis.org/blog/new-phase-nuclear-terrorism-cyber-warfare
As Director of National Intelligence James Clapper discussed the "remote" threat of a major cyberattack
within the next two years, NSA and US Cyber Command director Gen. Keith Alexander told Congress
that the US was training its own cyberwarriors as well. In yesterday's hearing before the House Armed
Services Committee, Alexander emphasized that "this team, this defend-the-nation team, is not a
defensive team... This is an offensive team that the Defense Department would use to defend the
nation if it were attacked in cyberspace. 13 of the teams that we’re creating are for that mission
alone."¶ As The New York Times reports, Alexander says 27 additional teams are dedicated to training
and surveillance, and more will be able to "defend our networks in cyberspace." He did not go into
detail about the projects, but he said that training was the most important task at hand, and that
defense was best served by monitoring incoming traffic to the US with systems that could check for
attacks. Current fears about cyberwarfare have focused on China, which is considered responsible for
recent attacks on The New York Times and other papers, but Clapper has said that "isolated state or
nonstate actors" are more likely to launch high-stakes campaigns that could take out critical
infrastructure.
Cybercrime
Cybercrime Impacts: Hurts Economy
Cybercrimes hurt econ; costs globe billions and U.S. Jobs
Ellyne Phneah, writer for ZDNET, July 23, 2013, “Cybercrime can cost economy up to $500B”, ZDNET,
http://www.zdnet.com/cybercrime-can-cost-economy-up-to-500b-7000018420/, Date Accessed July 23,
2013.
Cybercrimes cost the global economy up to US$500 billion annually, and can potentially result in the
loss of 500,000 jobs in the United States alone. These findings were highlighted in a report released Tuesday
by the Center of Strategic and International Studies (CSIS), and commissioned by McAfee. Aimed at measuring
real-world losses from cyberattacks, the center enlisted economists, intellectual property experts, and security
researchers to develop the report. The researchers also based their estimates on comparisons to real-world
analogies such as losses in car crashes, piracy, pilferage and crime, and drugs. The generally accepted range for
cybercrime losses to the global economy was between US$100 billion and US$500 billion, the report noted.¶ The
report further estimated a total of 508,000 jobs could potentially be lost in the U.S. alone, due to
cyberespionage. The CSIS' commerce department in 2011 estimated US$1 billion in export value was
equal to 5,080 jobs, which meant the high end estimate of US$100 billion in losses would translate to
508,000 lost jobs, the report explained.
Cybercrime Impacts: Worse than Physical Crime
Cost of Cybercrime overtakes Physical Crime IBM Reports
Adam Emery,14 Mar 2006, “U.S. Businesses: Cost of Cybercrime Overtakes Physical Crime”, IBM,
http://www-03.ibm.com/press/us/en/pressrelease/19367.wss#contact, Date Accessed: July 24, 2013
Nearly 60 percent of U.S. businesses believe that cybercrime is more costly to them than physical
crime, reports a recent IBM survey of companies in the healthcare, financial, retail and manufacturing
industries. The costs resulting from cybercrime, these businesses report, are primarily from lost
revenue, loss of current and prospective customers and loss of employee productivity.
Hackers
Hackers Destroy Privacy
Lack of cyber security turns digital privacy- hackers can steal your private information
otherwise.
Steve Largent and Rick Boucher, congressmen, “Good cybersecurity means better privacy – opinion”
March 2013, DoA: 7/17/13 http://money.cnn.com/2013/03/05/technology/security/cybersecurityprivacy/index.html
Such views are nonsense. Quite simply, digital
privacy cannot exist without cybersecurity. Weak security equals
weak privacy. Want better privacy? Raise your security game to prevent hackers from stealing private
data. Let the experts from the private sector and government communicate with each other so when
they see threats, they can alert others and work together to create a solution.¶ Despite this common-sense
connection, a seemingly never-ending debate drags on about how our nation can improve its cybersecurity. There is lots of talk, but little action
to support privacy's enabler.¶ That could change if Congress passes The Cyber Intelligence Sharing and Protection Act (CISPA) and the President
signs it into law. CISPA passed the House (248-168) about a year ago, and since then has been the subject of considerable discussion, with no
discernible progress.¶ Critics don't like the fact that CISPA enables information sharing between the federal government and the private sector
in order to prevent cyberattacks and to pursue cybercriminals, hackers, fraudsters and others intent on harm. As they see it, such cooperation
constitutes a potential privacy invasion that is so egregious as to merit no further consideration.¶ Their concerns are, no doubt, well intended.
But they are also out of touch with reality and risk unintended consequences that only serve to allow cybercriminals to operate with impunity.¶
The breadth and scale of the threat of cyberattacks on our
nation's critical infrastructure -- financial institutions, electric and water utilities and air traffic control
systems, to name just a few -- to say nothing of consumers' personal data, is no longer in debate.
Meanwhile, the avenues and opportunities by which hackers have to penetrate our networks are
growing hand in hand with our increasingly mobile communications ecosystem. On the consumer
side, for example, a recent study concludes more than 40% of U.S. smartphone users will click on
unsafe links this year, potentially spreading malware that can steal data and dollars to their friends, family and colleagues.¶
Related story: Wake up, America! China is attacking¶
Hackers destroy Digital Privacy and violate Constitutional liberties.
Rogers, Mike, Member of the House of Representatives and Chairman of the Permanent Select
Committee on Intelligence. Ruppersburg, Dutch, also a member of the House of Reps, andn a ranking
member on Permanent Select Committee on Intelligence. 4/16/13 Protecting Internet freedom is a
priority http://thehill.com/special-reports/defense-and-cybersecurity-april-2013/294319-protectinginternet-freedom-is-a-priority Date Accessed; 7/20/13
The privacy and civil liberties rights enshrined in the Constitution that we swore to protect are
threatened daily as foreign hackers steal unfathomable amounts of information from our computer
networks. These networks contain our most important personal information, including our banking,
medical and family records. Secure computer networks are vital to ensuring that the Internet remains
a key and open forum for individual expression — America simply cannot turn a blind eye to this
threat any longer.
A2: Hacktivism Good
“Hacktivism” is overblown and doesn’t cause social change
Dorothy E. Denning, 2001, Georgetown University, “ACTIVISM, HACKTIVISM, AND CYBERTERRORISM: THE INTERNET AS A TOOL FOR
INFLUENCING FOREIGN POLICY”, http://ncfm.org/libraryfiles/Children/NetworkNetWar/MR1382.ch8.pdf
In the area of hacktivism, which involves the use of hacking tools and techniques of a disruptive
nature, the Internet will serve mainly to draw attention to a cause, since such incidents are regularly
reported by news media. Whether that attention has the desired effect of changing policy decisions related to the issue at hand is
much less certain. Hacktivists may feel a sense of empowerment, because they can control government computers and get
media attention, but that does not mean they will succeed in changing policy. So far, anecdotal evidence
suggests that for the majority of cases, they will not.
Prism
Prism Solves Terrorism
Prism is necessary to search for terrorists
Schmitt, Eric, Sanger, David E., Savage, Charlie. June 7, 2013. Administration Says Mining of Data Is
Crucial to Fight Terror. http://www.nytimes.com/2013/06/08/us/mining-of-data-is-called-crucial-tofight-terror.html?pagewanted=all. Date Accessed: 7/16/13.
[Obama] argued that “modest encroachments on privacy” — including keeping records of phone numbers called and
the length of calls that can be used to track terrorists, though not listening in to calls — were “worth us doing”
to protect the country. The programs, he said, were authorized by Congress and regularly reviewed by federal courts. ¶ But privacy
advocates questioned the portrayal of the program’s intrusion on Americans’ communications as modest. When Americans
communicate with a targeted person overseas, the program can vacuum up and store for later
searching — without a warrant — their calls and e-mails, too. ¶ Mr. Obama acknowledged that he had hesitations
when he inherited the program from George W. Bush, but told reporters that he soon became convinced of its necessity. “You can’t have 100
percent security and also then have 100 percent privacy and zero inconvenience,” he said. “We’re going to have to make some choices as a
society.” ¶ To defenders of the N.S.A., the Zazi case underscores how the agency’s Internet surveillance system, called
Prism, which
was set up over the past decade to collect data from online providers of e-mail and chat services, has
yielded concrete results. ¶ “We were able to glean critical information,” said a senior intelligence official, who spoke
on the condition of anonymity. “It was through an e-mail correspondence that we had access to only through Prism.” ¶ John Miller, a former
senior intelligence official who now works for CBS News, said on “CBS This Morning,” “That’s how a program like this is supposed to work.” ¶
Veterans of the Obama intelligence agencies say the large collections of digital data are vital in the
search for terrorists. “If you’re looking for a needle in the haystack, you need a haystack,” Jeremy Bash, chief of staff to Leon E. Panetta,
the former C.I.A. director and defense secretary, said on MSNBC on Friday.¶ Under the program, intelligence officials must
present Internet companies with specific requests for information on a case-by-case basis, showing
that the target is a foreigner and located outside the United States, a senior law enforcement official
said Friday. If the N.S.A. comes across information about an American citizen during the search, it
turns over that material to the F.B.I. for an assessment, the official said.
Prism Solves Terrorism
Patriot Act and surveillance of citizens enables NSA to thwart dozens of terrorist
attacks
Cohen, Tom, Staff writer cnn, 6/13/13, CNN, NSA director: Data mining follows law, thwarts terror,
http://www.cnn.com/2013/06/12/politics/nsa-terror-hearing, Date Accessed: 7/17/13
Phone records obtained by the government through a secret surveillance program disclosed last week
helped to prevent "dozens" of terrorist acts, the director of the National Security Agency told a Senate hearing on
Wednesday.¶ Army Gen. Keith Alexander provided the most detailed account so far from a government official of the program in which the
agency collects phone records that then can be accessed under federal court permission to investigate suspected terrorists.¶
The scope of
the secret program – potentially [involved] involving phone records of every American -- set off a political
firestorm when details emerged with publication of a leaked document.¶ Further leaks revealed other secret programs that collect computer
activity and other information.¶ Critics on the right and left accused the government of going well beyond the intended reach of the Patriot Act
enacted after the September 11, 2001, terrorist attacks on the United States.¶
Questioned by senators from both parties at
a hearing on broader cybersecurity issues, Alexander provided a spirited defense for the programs he
described as critical to counter-terrorism efforts.¶ "I think what we're doing to protect American
citizens here is the right thing," he said. "Our agency takes great pride in protecting this nation and our civil liberties and
privacy, and doing it in partnership with this committee, with this Congress, and with the courts."¶ Alexander added that he welcomed a public
debate over protecting America while preserving civil liberties.¶ "To date, we've not been able to explain it because it's classified, so that issue
is something that we're wrestling with," he said. "... This
isn't something that's just NSA or the administration doing
that and so on. This is what ... our nation expects our government to do for us. So, we ought to have that
debate. We ought to put it out there."¶ In the end, he said, some aspects of the giant surveillance apparatus created after 9/11 would have to
remain classified.¶ "And they should be, because if we tell the terrorists every way that we are going to track them, they will get through and
Americans will die," he said.¶ Alexander also rejected the claim that former NSA contractor Edward Snowden, who admitted leaking the topsecret documents on electronic surveillance programs and is now in hiding, could tap into any American's phone or e-mail.¶ "I know of no way
to do that," he said, calling Snowden's statement "false."¶ In an exchange with Democratic
Sen. Patrick Leahy of Vermont,
Alexander said he believed the program under Section 215 of the Patriot Act was "critical" in helping
the intelligence community corroborate information on possible threats.¶ "It is dozens of terrorist
events that these have helped prevent," Alexander said of the Section 215 program and another that collects
information on foreign computer use.¶ He would not discuss specific disrupted plots, saying they were classified, but he told Leahy that the
two programs together played a role in helping to stop a planned attack on the New York subway
system.¶ Information developed overseas was passed along to the FBI, which was able to identify suspect
Najibullah Zazi in Colorado and ultimately uncover a plot, he said. Zazi pleaded guilty to terror-related charges in
2010.¶ In response to questions from senators about why the Section 215 program needed to collect
billions of U.S. phone records, Alexander explained that the agency held the records for five years in
the event that an investigation uncovered an overseas terrorist link to a specific area in the United
States.¶ With a database of phone records, the agency can go "back in time" to figure out the number and date that a suspect called, he
said.¶ "We won't search that unless we have some reasonable, articulable suspicion about a terroristrelated organization," Alexander said.¶ Once permission is granted, "we can now look and say, 'who was
this guy talking to in the United States and why?'"¶ "The system just gives us back who he was talking
to," Alexander explained. "But if you didn't collect it, how do you know who he was talking to?"¶
Obtaining further information, such as the content of the call, would require a court order, he said.¶ GOP
Sen. Mike Johanns of Nebraska pressed Alexander on the issue, asking if the search could span "the breadth of telephone records."¶ "The
American public is fearful that in this massive amount of data you get that there's the ability of the federal government to synthesize that data
and learn something more than maybe what was ever contemplated by the Patriot Act," Johanns said.¶ Alexander will return to the panel on
Thursday to give a classified briefing on the programs in order to provide more information, and he pledged to work with the committee to
come up with more detailed explanations for the American public.¶ He explained his caution on Wednesday by saying revelations such as the
classified documents about the secret programs were harmful to national security efforts.¶ "I would rather take a public beating and people
think I am hiding something than to jeopardize the security of this country," Alexander said.¶
A2: Prism Destroys All Privacy
Obama argues there are limits to the surveillance allowed under Prism.
Hennessey, Kathleen. June 19, 2013. Obama defends NSA digital surveillance programs.
http://www.latimes.com/news/world/worldnow/la-fg-wn-obama-defends-nsa-surveillance20130619,0,3630725.story. Date Accessed 7/17/13.
BERLIN -- President Obama tried to reassure skeptical Europeans about sweeping U.S. digital surveillance
programs expanded under his watch, arguing that the programs are circumscribed, overseen by a court and
effective.¶ "What I can say to everybody in Germany and everybody around the world is this applies very narrowly," Obama said
Wednesday after a meeting in which German Chancellor Angela Merkel pressed the president on whether the programs were violating the
privacy rights of German citizens.¶ "This
is not a situation in which we are rifling through the ordinary emails of
is not a situation where we can go
on to the Internet and start searching any way we want."¶ Obama argued that the collection of bulk data on phone
German citizens or American citizens or French citizens or anybody else," he said. "This
records and Internet activity has averted "at least 50 threats," repeating claims made by other administration officials since details about the
programs were disclosed two weeks ago.
A2: Congress is Reigning in Prism/NSA Spying
The White House has urged Congress to reject the measure to reign in NSA spying.
ThinkProgress; July 24, 2013 (American political blog that provide[s] a forum that advances
progressive ideas and policies, “National Security Brief: White House Calls On Congress To ‘Reject’
Measure Reining In NSA Spying” ThinkProgress.org,
http://thinkprogress.org/security/2013/07/24/2347191/house-nsa/, Date Retrieved; July 24, 2013)
The Hill reports that the House is expected to vote on an amendment to a Defense Appropriations bill
that is aimed at limiting the National Security Agency’s powers to collect information on Americans’
telephone and internet traffic.
One measure — put forward by Rep. Justin Amash (R-MI) — will prevent the NSA from using the
PATRIOT Act to collect records of people who are not under investigation and another says the Agency
cannot target U.S. citizens.
NSA Director Gen. Keith Alexander lobbied the House yesterday in an effort to dial back congressional
opposition to NSA spying and the top Democrat and Republican on the Senate Intelligence Committee
oppose the measures, as does the White House.
“[W]e oppose the current effort in the House to hastily dismantle one of our Intelligence Community’s
counterterrorism tools,” a statement from White House press secretary Jay Carney says. “This blunt
approach is not the product of an informed, open, or deliberative process. We urge the House to
reject the Amash Amendment, and instead move forward with an approach that appropriately takes
into account the need for a reasoned review of what tools can best secure the nation.”
Amash told the New York Times that Alexander’s lobbying didn’t change any minds and that his measure
will most likely pass. “I think the American people are overwhelmingly in support of reining in the
blanket surveillance of the NSA,” he said.
A2: Data Collection Leads to Government Oppression
Data collection helps increase transparency and check government encroachment
Jamie Yap, January 31, 2013, “Big-data analytics can serve as checks and balances”, ZDNET,
http://www.zdnet.com/big-data-analytics-can-serve-as-checks-and-balances-7000010611/, Date
Accessed: July 23, 2013
The ability of big-data collection and analysis can serve as checks and balances on government bodies,
ensuring agencies are both administratively efficient and transparent as public service providers to
citizens.¶ An underlying force of big data is the move from structured to unstructured information such as socialmedia posts, photographs, and video clips. Unless social-media data is controlled or censored by the
government, issues of national interest getting discussed and circulated on social networks can serve
as checks and balances on a country's leaders, said David Menninger, head of business development and
strategy at Greenplum, the big-data analytics provider owned by EMC.¶ "For example, say there's higher
occurrence of a type of complaint about aging infrastructure, that creates a checks and balance for the
authorities," he said at an interview Thursday. Menninger, who is based in the US, was in Singapore to meet
company executives and business partners.¶ Gathering and analyzing all that data enables governments to
better serve the people. They know what critical issues need immediate attention, where to
concentrate their resources, and spend money where it is most needed to do the most good, he
noted.¶ Going a step farther, big-data analytics can also be used to maintain transparency and fight
potential graft in governments, Menninger pointed out.
Espionage
Espionage-Russia
Russian-US Cold War Espionage still a threat
Ross, Brian (Staff Writer ABC News) Jun 2013 Edward Snowden Steps Into Secret U.S.-Russia Spy
Scuffle http://abcnews.go.com/Blotter/edward-snowden-steps-secret-us-russia-spyscuffle/story?id=19495341#.UeViQPlQFZ4 Date Accessed: 7/16/13
An ABC News review of public reports shows that in the past 16 months alone, at least six people have
been accused or convicted of spying for the U.S. in Russia, including two Americans who were kicked out of the country
and four Russians purportedly recruited by U.S. intelligence -- all sent to prison. Another American, a lawyer, was reportedly
expelled from Russia this May because he rebuffed Russian agents' attempt to recruit him to spy for
them.¶ "Espionage is alive and well" between the old Cold War foes, said David Major, a former senior
FBI counter-intelligence officer and now President of the Centre for Counterintelligence and Security
Studies, which tracks spy cases the world over.¶ Some of the cases, like that of blown CIA agent Ryan Fogle, splashed across headlines the
world over. But several others, like the case of a Russian intelligence colonel who worked with the CIA and got 18 years behind bars for it,
barely made a ripple in American media.¶ Prior to 2012,
the whole world took notice in 2010 when the FBI rounded
up 10 undercover Russian agents in America – including the "SoHo Spy" Anna Chapman – but far fewer heard in 2011 when it
was revealed a Russian intelligence official in Moscow had given the spy ring up and then fled to the U.S. That man, Col. Alexander Poteyev,
reportedly had been recruited by the CIA.¶ Now
with Snowden, a former contractor for the National Security
Agency with a head and, reportedly, laptops full of U.S. secrets, Major said the Russians have been
handed a victory, even if Snowden insists he's not working with any governments.¶ "One of the highest
targets [for foreign intelligence agencies] has always been the NSA, one of the hardest targets for them ever to
penetrate," Major said. "[Russian intelligence] is going to look at this case as an opportunity, as a treasure
trove of intelligence that [will be] exploited to the extent that they can, and then when they decide, they'll move
on."
Espionage is a difficult to manage, yet growing problem to the U.S
Lewis, James A(Director of Technology at CSIS) December 2002 Assessing the Risks of Cyber
Terrorism, Cyber War and Other Cyber Threatshttp://www.steptoe.com/publications/231a.pdf Date
Accessed: 7/16/2013
Espionage opportunities created by a greater reliance on internet-accessible computer ¶ networks will
create greater risk for national security than cyber attacks. Terrorist groups ¶ are likely to use the
Internet to collect information on potential targets, and intelligence¶ services can not only benefit
from information openly available on the web but,14 more¶ importantly, can benefit from the ability to
clandestinely penetrate computer networks¶ and collect information that is not publicly available. This is very
different from hacking, ¶ in that in the event of a successful penetration of a hostile network, a terrorist group or an ¶ intelligence
service will want to be as unobtrusive as possible. A sophisticated opponent ¶ might hack into a
system and sit there, collecting intelligence and working to remain ¶ unnoticed. It will not disrupt essential
services or leave embarrassing messages on ¶ websites, but remain quietly in the background collecting information. Collection ¶
techniques for the Internet differ significantly from earlier signals and communications ¶ intercept
techniques, and while different kinds of data will be collected, the overall effect ¶ may be to make
some espionage activities much more rewarding. This topic, the ¶ implications for espionage of the greater use of computer
networks and Internet ¶ protocols, deserves further study.
Espionage-China
Espionage is top threat to the US- China has been accused of espionage
Hosenball, Mark. (Investigative Producer NBC, Staff Writer on Reuters) Mar 2012 Cyber-attacks leading
threat against U.S.: Spy Agencies http://www.reuters.com/article/2013/03/12/us-usa-threatsidUSBRE92B0LS20130312 Date Accessed: 7/15/13
(Reuters) - Intelligence leaders said for the first time on Tuesday that cyber attacks and cyber espionage
have supplanted terrorism as the top security threat facing the United States. That stark assessment, in an
annual "worldwide threat" briefing that covered concerns as diverse as North Korea's belligerence and Syria's civil war, was
reinforced in remarks by the spy chiefs before the Senate Intelligence Committee. They expressed concern that computer
technology is evolving so quickly it is hard for security experts to keep up. "In some cases, the world is
applying digital technologies faster than our ability to understand the security implications and
mitigate potential risks," James Clapper, the Director of National Intelligence, told the committee. In written testimony, Clapper
softened his analysis somewhat, playing down the likelihood of catastrophic attacks on the United States in the near term - either through
digital technologies, or from foreign or domestic militants employing traditional violence. But this year's annual threat briefing underscored
how, a decade after the Iraq war began and nearly two years after the killing of al Qaeda leader Osama bin Laden, digital
assaults on
government and computer networks have supplanted earlier security fears. On Monday, White House
national security adviser Tom Donilon, citing complaints from U.S. businesses about alleged Chinese
cyber espionage, said the issue is a growing challenge to economic relations between the United
States and China.
China cyber attacks are growing and the us needs to actively search for hackers.
David Feith, an editorial page writer for The Wall Street Journal Asia in Hong Kong “Timothy L. Thomas:
Why China Is Reading Your Email” DoP: 2013 March, DoA: 7/17/13 http://stream.wsj.com/story/latestheadlines/SS-2-63399/SS-2-200781/
For several years, Washington has treated China as the Lord Voldemort of geopolitics—the foe who must
not be named, lest all economic and diplomatic hell break loose. That policy seemed to be ending in recent weeks, and
Timothy Thomas thinks it’s about time.¶ The clearest sign of change came in a March 11 speech by Tom Donilon,
President Obama’s national security adviser, who condemned “cyber intrusions emanating from China
on an unprecedented scale” and declared that “the international community cannot tolerate such activity from any country.”
Chinese cyber aggression poses risks “to international trade, to the reputation of Chinese industry and to our overall relations,” Mr. Donilon
said, and Beijing must stop it.¶ “Why did we wait so long?” wonders Mr. Thomas as we sit in the U.S. Army’s Foreign Military Studies Office,
where the 64-year-old retired lieutenant colonel has studied Chinese cyber strategy for two decades. More
than enough evidence
accumulated long ago, he says, for the U.S. to say to Beijing and its denials of responsibility, “Folks, you
don’t have a leg to stand on, sorry.” Beijing's cyber attacks are rooted in military strategy, says one of America's
foremost experts. The best way to combat them is for the U.S. to go on the cyber offensive too.
The US is developing Cyber defense teams to monitor data to protect from cyber
attacks.
Robertson Adi, Adi RobertsonWa is a reporter for The Verge.,“NSA head says 13 'offensive teams' being trained for cyberwarfare” DoP:
3/13/13, DoA: 7/16/13,¶ http://www.theverge.com/2013/3/13/4099958/nsa-head-says-13-offensive-teams-being-trained-for-cyberwarfare
As Director of National Intelligence James Clapper discussed the "remote" threat of a major
cyberattack within the next two years, NSA and US Cyber Command director Gen. Keith Alexander told Congress that the
US was training its own cyberwarriors as well. In yesterday's hearing before the House Armed Services Committee, Alexander
emphasized that "this team, this defend-the-nation team, is not a defensive team... This is an offensive team that the Defense Department
would use to defend the nation if it were attacked in cyberspace. 13 of the teams that we’re creating are for that mission alone."¶ As The New
York Times reports, Alexander says 27 additional
teams are dedicated to training and surveillance, and more will be
able to "defend our networks in cyberspace." He did not go into detail about the projects, but he said that training was the
most important task at hand, and that defense
was best served by monitoring incoming traffic to the US with
systems that could check for attacks. Current fears about cyberwarfare have focused on China, which
is considered responsible for recent attacks on The New York Times and other papers, but Clapper has said that "isolated state
or nonstate actors" are more likely to launch high-stakes campaigns that could take out critical infrastructure.¶
China Espionage Impact: Innovation
China cyber attacks on threaten innovation by top companies
McGarry, Brendan, staff analyst and writer, 5/21/13, China’s Cyber Attacks Threaten Social Order: Analyst, Defense Tech,
http://defensetech.org/2013/05/21/chinas-cyber-attacks-threaten-social-order-analyst/, date access- 7/21/13
China’s communist party that its cyber attacks against Western targets
threaten to undermine the Chinese economy and social order, an analyst said.¶ When asked what President Barack
The U.S. president should tell the leader of
Obama should say to President Xi Jinping at their next meeting in June, James Mulvenon, a vice president at Defense Group Inc., a technology
company in Vienna, Va., was blunt.¶ “This is
imperiling your own economic development, which is imperiling your
social stability, which is your No. 1 priority,” Mulvenon said May 21 during a panel discussion at the Center for Strategic and International
Studies, a think tank in Washington, D.C. “The only message that will get through to a general secretary of the Chinese
communist party is that economic development and social stability are threatened by the brazen scope and scale of
this intrusion.”¶ China was a frequent topic of discussion during the discussion, part of an event called “Threat and Response: Combating
Advanced Attacks and Cyber-Espionage,” which drew a roomful of academics, executives, government and military officials, and reporters.¶
A
Chinese espionage group since 2006 has stolen hundreds of terabytes of information from at least 141
companies across 20 major industries, including aerospace and defense, according to a February report from
Mandiant, a closely held company based in Alexandria, Va., which sells information-security services.¶ Obama should tell Xi that such actions
“are undermining that last remaining pillar of strategic cooperative Sino-U.S. relations,” Mulvenon said. “The
trade and business
community are some of the loudest critics of what’s going on the Chinese side who traditionally have
been the strongest proponents of cooperative Sino-U.S. relations.”¶ Mulvenon also criticized China’s official response
to the report.¶ “The Chinese, in my view, have always been terrible strategic communicators but they
reached a new low recently when their response to the Mandiant report was — and this is an official
spokesman at the Ministry of National Defense said — there is no Unit 61398,” he said. “We have hundreds of pieces of
open-source data identifying that unit is public knowledge,” he added. “Their literally response at the official level is to deny reality.”¶ U.S.
companies are already being hurt by the theft of intellectual property, according to Shawn Henry, president of
CrowdStrike Services, a security technology firm based in San Francisco, and former executive assistant director of the Federal Bureau of
Investigation.
A biotechnology company that typically takes five years to take an idea to market has
noticed Chinese competitors churning out similar products in 18 months, Henry said.¶ “It’s not because they’ve
come up with some newfangled manufacturing process,” he said during the panel. It’s because concept and engineering
resources are “being stolen, and they’re going right from manufacturing and to market.”¶ Chief executive
officers must be responsible for the security of their companies’ networks, according to Chris Inglis, deputy director of the National Security
Agency, the Pentagon’s code-breaking wing.¶ “We need to hold CEOs or the appropriate parties accountable for the resilience, the security,
integrity of those things that generate revenue or generate whatever the business is of that particular organization,” he said in separate
remarks at the event.¶ Similar to the way they pay attention to finances under Sarbanes-Oxley, the 2002 legislation designed to protect
investors from fraudulent accounting practices, executives may “spend an equal amount of time to the integrity and the resilience of their
networks because it’s not just a commodity whose fate may have an effect on their bottom line, it’s a foundation for their business,” Inglis
said.¶ A bill sponsored by Rep. Mike Rogers, R-Mich., chairman of the House Intelligence Committee, would make it easier for intelligence
agencies to share information with the private sector. The legislation, Cyber Intelligence Sharing and Protection Act, H.R. 624, has been referred
to the Senate Intelligence Committee.¶ The U.S. Defense Department in a report released May 5 for the first time blamed China directly for
targeting its computer networks. The attacks
were focused on extracting information, including sensitive defense
technology.¶ “In 2012, numerous computer systems around the world, including those owned by the
U.S. government, continued to be targeted for intrusions, some of which appear to be attributable
directly to the Chinese government and military,” it states. “The accesses and skills required for these
intrusions are similar to those necessary to conduct computer network attacks.Ӧ China called the accusations
“groundless” and “not in line with the efforts made by both sides to strengthen mutual trust and cooperation,” according to a May 9 article
published on the state-run website, “People’s Daily Online.” The country is a “victim itself of cyberattacks,” it states.¶ The
U.S. faces a
dilemma in talks with China because the U.S. has tried to make a distinction between types of spying
in cyberspace, including traditional espionage, which it says cannot be legislated or governed through
treaty, and commercial espionage, which it says can, Mulvenon said.¶ “This has been a real clangor with the Chinese because they
don’t see the distinction because in their system the same people are doing both,” he said. China has single, large-scale, state-owned
companies in each sector of the economy, making it easy for government spies to pass intelligence to corporate executives, he said.¶ “They
don’t believe us when we tell them we are statutorily precluded from doing commercial espionage and we even give them a very practical
reason: We say if the United States conducted commercial espionage on behalf of its companies, we wouldn’t know how to share the proceeds
without somebody who didn’t get it suing us in the U.S. government for anti-trust violations,” Mulvenon said.¶ Russia is much stealthier than
China when it comes to cyberspace espionage, Mulvenon said. “They use a lot more crypto,” he said, referring to cryptography.
China Espionage Impact: Competitiveness
Chinese government-backed hackers have cost the United States nearly $2 trillion in
“lost and stolen property” and hurts economic competitiveness
Kredo, July 22, 2013 (Adam, Adam Kredo is a senior writer for the Washington Free Beacon” Mike
Rogers: China, Iran, and Russia Launching Cyber Attacks Against U.S.”, The Washington Free Beacon,
http://freebeacon.com/mike-rogers-china-iran-and-russia-launching-cyber-attacks-against-u-s/, Date
accessed; July 25, 2013)
Chinese government-backed hackers have cost the United States nearly $2 trillion in “lost and stolen
property” that was seized through illicit Internet attacks, Rep. Mike Rogers (R., Mich.), chairman of
the House Permanent Select Committee on Intelligence, said Monday.¶ The theft of proprietary
information and technology by the Chinese constitutes “the largest transfer of wealth illegally in the
world’s history,” according to Rogers, who warned that the United States is not prepared to combat
these cyber threats.¶ Chinese military units identify vulnerable U.S. companies and then instruct a
team of hackers to steal industrial secrets and other information, according to Rogers, who spoke at an
event sponsored by the International Institute for Strategic Studies (IISS).¶ “We are in a cyber war
today,” Rogers said. “Most Americans don’t know it. They go about their lives happily. But we are in a
cyber war today.”¶ China poses the largest threat, according to Rogers.¶ The Communist regime is
“primarily” engaged in economic espionage, he said, explaining that China’s “military and
intelligences services” have seized U.S. industrial technology, repurposed it domestically, and then
“illegally” competed with the United States in the world market.
China Espionage Impact-Media
The Chinese Govermennt is hacking into American computers to try to intimidate the
media.
Rogers, Mike, Member of the House of Representatives and Chairman of the Permanent Select
Committee on Intelligence. Ruppersburg, Dutch, also a member of the House of Reps, andn a ranking
member on Permanent Select Committee on Intelligence. 4/16/13 Protecting Internet freedom is a
priority http://thehill.com/special-reports/defense-and-cybersecurity-april-2013/294319-protectinginternet-freedom-is-a-priority Date Accessed; 7/20/13
Most associate cybersecurity with the protection of government, utility, transportation and financial
systems. But cybersecurity is not limited to military information and energy grids. National news
organizations including The New York Times, The Wall Street Journal and The Washington Post
recently all reported that they were subject to cyberattacks. The recent cyberattacks on media outlets
were an attempt to intimidate and harass newspapers that dared publish information critical of the
Chinese government. Cyberattackers have hacked into American think tanks that have published
papers critical of the Chinese government, in an attempt to squash any dissent. The Chinese are very
good at squashing internal political dissent, and they are now attempting to bring those threats across
the ocean to our shores.
Espionage-Iran
Iran is a serious cyber threat
J. Nicholas Hoover.Senior editor for InformationWeek Government.April 26, 2012.Congress
RaisesAlarmOnIranianCyberThreat.
InformationWeek.http://www.informationweek.com/government/security/congress-raises-alarm-oniranian-cyber-t/232901044.DateRetrieved: July 17, 2013
The Iranian cyber threat to the United States is on the rise, lawmakers and foreign policy observers warned in a House
Homeland Security Committee hearing Thursday. "There should be little doubt that a country that kills innocent
people around the world, guns down its own people, and threatens Israel would not hesitate to carry
out a cyber-attack against the U.S.," said counterterrorism and intelligence subcommittee chairman
Patrick Meehan, R-Pa., whose subcommittee held a joint hearing with the cybersecurity, infrastructure protection, and security
technologies subcommittee. Warnings about the threat of an Iranian attack came from all angles during the hearing,
but the hearing did not include participation by a single intelligence or military official. Director of National Intelligence James Clapper recently
testified to Iran's improvement in the cyber arena. Meehan
called Iran's growing cyber capabilities a "real and
genuine challenge and threat to the United States and its interests," noting the recent attack of a proIranian group called the Iranian Cyber Army on the government news agency Voice Of America. A
Meehan-penned op-ed titled "Iranian Cyber Threat Cannot Be Underestimated" appeared on the website of Congressional
news site The Hill on Thursday. Panelists called to attention recent media reports about Iranian diplomats involved in planned cyber-attacks
against nuclear power plants and other targets. The country also recently claimed that the downing of a drone inside the country was thanks to
a hack of the drone's GPS signals. "They're taking their gloves off right now in the cyber environment," said Frank Cilluffo, associate VP and
director of the Homeland Security Policy Institute and a former Bush administration homeland security official. Panelists at the session
were quick to point out that Iran does not yet pose the same level of technical threat as Russia and
China, but said that Iran's intentions help make it dangerous. "As yet, Iran has not shown itself to be a
similarly advanced or persistent threat" as Russia and China, Cilluffo said. "The bad news is that what they
lack in capability, they make up for in intent and are not as hesitant as other countries may be." Ilya
Berman, VP of the hawkish and conservative American Foreign Policy Council, agreed with Cilluffo's assessment, adding that Iran poses a
potentially significant threat in the asymmetric world of cyberspace. "Cyberspace
is a field that advantages asymmetric
actors," he said. "As a result, the capabilities are an issue, but intent is even more of an issue. Unlike in
Russian and China, where conflicts exist but at least we have diplomatic relations with those
countries, there are a number of threats on the table with Iran." Berman recommended that the
United States government create a stronger deterrence strategy against Iranian cyber-attacks. "We
have had an abject lack of a deterrent strategy in facing Iran, and [the cyber world] is crying out for a
deterrence strategy so that the Iranian regime recognizes that there are redlines that they can't cross,"
he said.
A2: Economic Espionage Isn’t Happening
Business are afraid to report economic espionage
Danielson 2009 (Mark E.A.,” Economic Espionage: A Framework for a Workable Solution”, writes for
MINN. J.L. SCI. & TECH.,
http://mjlst.umn.edu/prod/groups/ahc/@pub/@ahc/@mjlst/documents/asset/ahc_asset_366029.pdf,
Date accessed; July 25, 2013)
A. ECONOMIC COSTS¶ Quantifying the losses attributed to economic espionage is a ¶ difficult task.
Thefts often go unreported to federal or state law ¶ enforcement agencies. Businesses may be
reluctant to step ¶ forward and admit being targeted for a myriad of reasons. An ¶ admission may
signal to investors that a company is unable to ¶ protect its valuable proprietary information.12 Such
concerns are ¶ valid: studies have indicated that a company’s stock tends to ¶ decline following an
admission it has been struck by economic ¶ espionage.13 An admission may compromise joint
ventures or ¶ forestall lucrative government contracts.14 By naming names, a ¶ business may
prejudice its ability to obtain future contracts in ¶ that state.15 Further, organizations may worry that
by coming ¶ clean they may reveal vulnerabilities and signal to copycats that ¶ they are an easy
target.16
Patriot Act
Patriot Act Upholds the Social Contract
The patriot act works to uphold the social contract
Casman, Betsey Sue. Master of Arts in Ethics and Policy Studies. 2011. "The Right to Privacy in Light of the
Patriot Act and Social Contract Theory".
http://digitalscholarship.unlv.edu/cgi/viewcontent.cgi?article=2087&context=thesesdissertations. Date Accessed 7/21/13.
Locke has placed the ¶ duty the good of society in the hands of the “executor” and describes his duties
outside ¶ which are legislated and sometimes even against the law– he names this “prerogative”. ¶ The
Executive (in the United States) has made no excuses for its behavior in vigilant ¶ surveillance. This
Executive privilege is but the duty of the “executor” to protect.¶ Throughout this document, the
Executive has continually maintained that certain ¶ legislation did not apply when national security
was an issue. This was the basis for ¶ warrantless searches. Exigent circumstances have also been
used to circumvent the ¶ prescribed law. The enactment of the Patriot Act is very clearly and
reasonably designed ¶ for the preservation of life and property; the sole goals that Locke stated were
the purpose ¶ of the society of which men had consigned (at least part of) their rights. Locke’s reason
¶ for the social contract is to retain as much personal freedom with the protection of ¶ authority to
safeguard the property of each and every man
The Patriot Act upholds the social contract
Casman, Betsey Sue. Master of Arts in Ethics and Policy Studies. 2011. "The Right to Privacy in Light of the
Patriot Act and Social Contract Theory".
http://digitalscholarship.unlv.edu/cgi/viewcontent.cgi?article=2087&context=thesesdissertations. Date Accessed 7/21/13.
Though the authors may have described different reasons for entering into the ¶ ‘social contract’, they
all seem to agree that the reason behind the existence of the social ¶ contract and its continued
existence is the security of its citizenry. Therefore, it is agreed upon that society must act for the
interest of the whole when dealing with a threat, ¶ especially a threat on the level of war. It can be
argued that that is the sole purpose of the ¶ Patriot Act and that though some of its individual clauses
or statutes may seem to violate ¶ other tenets held to be sacred to Americans, the Patriot Act as a
whole is designed to ¶ honor and defend the social contract.
Patriot Act Balances National Security and Privacy
Homeland Security says it prioritizes national security at the expense of Privacy while
preserving both – States Secret Privilege proves
Palin, Philip J, 9/18/11, Homeland Security Watch, Brennan: Counterterrorism and the Law,
http://www.hlswatch.com/index.php?s=patriot+act , Date Accessed : 7/17/11
We’ve also worked to uphold our values and the rule of law in a second area—our policies and practices
here at home. As I said, we will use all lawful tools at our disposal, and that includes authorities under
the renewed PATRIOT Act. We firmly believe that our intelligence gathering tools must enable us to
collect the information we need to protect the American people. At the same time, these tools must
be subject to appropriate oversight and rigorous checks and balances that protect the privacy of
innocent individuals.¶ As such, we have ensured that investigative techniques in the United States are
conducted in a manner that is consistent with our laws and subject to the supervision of our courts. We
have also taken administrative steps to institute additional checks and balances, above and beyond what
is required by law, in order to better safeguard the privacy rights of innocent Americans.¶ Our
democratic values also include—and our national security demands—open and transparent
government. Some information obviously needs to be protected. And since his first days in office,
President Obama has worked to strike the proper balance between the security the American people
deserve and the openness our democratic society expects.¶ In one of his first acts, the President
issued a new Executive Order on classified information that, among other things, reestablished the
principle that all classified information will ultimately be declassified. The President also issued a
Freedom of Information Act Directive mandating that agencies adopt a presumption of disclosure
when processing requests for information. The President signed into law the first intelligence
authorization act in over five years to ensure better oversight of intelligence activities. Among other
things, the legislation revised the process for reporting sensitive intelligence activities to Congress and
created an Inspector General for the Intelligence Community.¶ For the first time, President Obama
released the combined budget of the intelligence community, and reconstituted the Intelligence
Oversight Board, an important check on the government’s intelligence activities. The President
declassified and released legal memos that authorized the use, in early times, of enhanced
interrogation techniques. Understanding that the reasons to keep those memos secret had
evaporated, the President felt it was important for the American people to understand how those
methods came to be authorized and used.¶ The President, through the Attorney General, instituted a
new process to consider invocation of the so-called “state secrets privilege,” where the government
can protect information in civil lawsuits. This process ensures that this privilege is never used simply
to hide embarrassing or unlawful government activities. But, it also recognizes that its use is
absolutely necessary in certain cases for the protection of national security. I know there has been
some criticism of the Administration on this. But by applying a stricter internal review process, including
a requirement of personal approval by the Attorney General, we are working to ensure that this
extraordinary power is asserted only when there is a strong justification to do so.¶
Patriot Act Good – Computer Trespasser Exception Stops Hackers
The Patriot Act allows the Government to search a company’s computer system after
an attack.
Nancy J. King, 2003, College of Business, Oregon State University, Electronic Monitoring to Promote National Security Impacts
Workplace Privacy, Employee Responsibilities and Rights Journalhttp://www.cob.sjsu.edu/malos_s/privacy%20and%20national%20security.pdf
The USA PATRIOT Act also [created] some new employer rights that relate to electronic monitoring of
the workplace. The most important new right arises from Section 217 of the USA PATRIOT Act, which creates a
new “computer trespasser” exception to the ECPA.12 This exception authorizes law enforcement to assist employers
who are providers of electronic communications systems when hackers or other unauthorized persons
have accessed the employers’ computer systems. Before the USA PATRIOT ACT, law enforcement
agencies needed a search warrant to intercept the contents of Internet communications sent by a computer
trespasser (for example, a computer hacker), even if the owner of the computer system under attack gave its consent for law enforcement to
intercept electronic communications on that system. Delays in
obtaining a warrant often impaired law enforcement
efforts to apprehend the hacker. Now, employers can permit law enforcement to intercept
communications on the employers’ computer systems.
A2-“Patriot Act Violates Liberties”
Patriot Act vital; safeguards in place to protect liberties
Sales, Nathan A. SEPTEMBER 8, 2011. A Vital Weapon. http://www.nytimes.com/roomfordebate/2011/09/07/do-we-still-need-thepatriot-act/the-patriot-act-is-a-vital-weapon-in-fighting-terrorism. Date Accessed 7/17/13.
America needs the Patriot Act because it helps prevent terrorism while posing little risk to civil
liberties. The law simply lets counterterrorism agents use tools that police officers have used for
decades. And it contains elaborate safeguards against abuse.¶ Consider the three provisions Congress renewed last
May.¶ 1. Congress authorized “roving wiretaps” back in 1986 -- court orders that allow police to monitor criminals even if they switch phones.
The Patriot Act allows the same thing in terrorism investigations. The law levels the playing field: If a roving wiretap is good enough for Tony
Soprano, it’s good enough for Mohamed Atta.¶ The
Patriot Act features strict safeguards. Agents can’t eavesdrop
unless they get a judge’s permission. They must demonstrate that the suspect is a terrorist. And they
must notify the judge when they go up on a new phone.¶ 2. Grand juries in criminal cases routinely
subpoena “business records” from companies like banks and retailers. The Patriot Act lets
counterterrorism agents get the same documents.¶ The law simply lets counterterrorism agents use
tools that police officers have used for decades.¶ The act’s protections are even stronger than the
grand jury rules. Prosecutors issue subpoenas unilaterally, but the Patriot Act requires the F.B.I. to get a judge’s approval. Americans
can’t be investigated on the basis of First Amendment activities, and special limits apply to sensitive materials like medical or library records.¶ 3.
Before 9/11, it was difficult for authorities to monitor “lone wolves” with murky ties to overseas
terrorist groups. The F.B.I. suspected that Zacarias Moussaoui was a terrorist, but agents hadn’t
connected him to Al Qaeda, so it wasn’t clear they could search his apartment. Congress fixed that
problem. Now, agents can monitor a terrorist even if they haven’t yet found evidence he belongs to a
foreign terrorist organization.¶ Again, the Patriot Act has robust safeguards. Agents have to convince a judge to
let them track a lone wolf. This tool can only be used to investigate international terrorism, not domestic. And it doesn’t apply to Americans,
only to temporary visitors like tourists.
Citizens trade off digital privacy for security to prevent terror under the patriot act
Zarka, Heater, Staff writer, 5/8/07, Yahoo, How the Patriot Act Helps United States Citizens, http://voices.yahoo.com/how-patriot-acthelps-united-states-citizens-326827.html, Date accessed: 7/17/13
Many people believe that most terrorist attacks are spontaneous and random. However, the attacks
are methodical and wellplanned. Generally, the terrorists commit numerous crimes before an attack actually occurs. For
example, they may use false student visas to obtain entry, trafficking of drugs, provide material
support to terrorist organizations, and steal weapons and explosives prior to the attack. When all this
activity is going on is when officials need to "pounce" on the terrorists.¶ The PATRIOT Act was established to "deter and
punish terrorist acts in the United States and around the world, to enhance law enforcement
investigatory tools, and for other purposes" (Bullock, Haddow, & Coppola, 2006, pg.519). And in order
to deter terrorist acts, the PATRIOT Act allows the government a variety of "tools". Some of the tools
are as follows: permits the seizure of voicemails, permits execution of a search warrant with delayed
notification (sneak and peek warrants), as well as other procedures.¶ Creates new laws regarding the
financing of terrorist organizations. Permits detention of suspected terrorists for up to seven days
without charges or without initiating deportation. Relaxes the restrictions on information sharing
between agencies. Grants access to internet and computer information. The government can check
medical records, student records, and credit records secretly and without permission. They are also
able to monitor financial activities and records (Bullock, Haddow, & Coppola, 2006). The above is a list of only a few of the
tools available for law enforcement officials concerning terrorism. Most if not all of the above list, will actually allow
officials to notice terrorist activity before an attack occurs. Some of the terrorist activities include
false visas, theft, money laundering, extortion, financial support to terrorist organizations, and selling
drugs. The terrorists commit those activities in order to support themselves, their group, and their
mission (the attack). As mentioned above a terrorist attack is well planned out. With the Patriot Act, we are able to monitor suspected terrorists
without many prior restrictions. The Patriot Act also created new legislation as well as strengthened some penalties for terrorist related crimes, so
instead of 10 years imprisonment they get 15 (example). According to Howard & Sawyer, 2006, "The radicals conclude that the United States has
strategically killed Muslims to terrorize the Islamic nation" (Sawyer, & Howard, 2006, pg.221). Therefore, Al-Qaeda justifies the killing of as
many American citizens as possible as Bin Laden declared war on the U.S. and her allies. That
means that the United States
should be granted extensive authority to monitor terrorist activity. However, as the years have passed
since 9/11 many people are in an uproar about constitutional freedoms and rights concerning the
Patriot Act. It seems like another devastating attack will have to occur on U.S. soil before they realize
the severity of terrorism.¶
FISA Upholds 1st Amendment Protections
FISA protects rights of citizens under the first amendment.
Casman, Betsey Sue. Master of Arts in Ethics and Policy Studies. 2011. "The Right to Privacy in Light of
the Patriot Act and Social Contract Theory".
http://digitalscholarship.unlv.edu/cgi/viewcontent.cgi?article=2087&context=thesesdissertations. Date
Accessed 7/21/13.
Of course, as in every argument or debate, there is an alternate viewpoint. In this ¶ case, there are
some that see the expanded government power from the Patriot Act as an ¶ important tool in the
protection of all Americans. The arrival of September 11, 2001, ¶ ushered in a new and foreboding era
in the history of terrorism. Thus the U.S. ¶ intelligence agencies are faced not only with detecting and
preventing the hijacking of ¶ airliners, but also with detecting and intercepting and preventing
foreign-sponsored ¶ terrorists from unleashing biological, chemical, and portable nuclear weapons
within our ¶ borders, all of which constitute a clear and present security threat to this nation. In order
¶ swiftly and effectively to meet these daunting challenges, speed and secrecy are of the ¶ utmost
importance (Privacy Opposing Viewpoints, 2006). This argument goes on to ¶ note that there is still
protection for citizens even under these heightened security ¶ measures. FISA specifically and
affirmatively seeks to protect and preserve the ¶ inalienable rights guaranteed to American citizens,
as well as to aliens lawfully admitted ¶ for permanent residence. FISA states that ‘no United States
person may be considered a ¶ foreign power or an agent of a foreign power solely upon basis of
activities protected by ¶ the first amendment to the Constitution of the United States’ (Privacy
Opposing ¶ Viewpoints, 2006). Therefore, you are still protected from prosecution from any source ¶
of information gathered against you that is protected by the first amendment, even if your ¶ fourth
amendment rights have been violated to get it.
CIPSA
A2: Endless Invasion of Privacy
Cyber Intelligence Sharing and Protection Act has limitations in place to place to
prevent it from invading your privacy.
Rogers, Mike, Member of the House of Representatives and Chairman of the Permanent Select
Committee on Intelligence. Ruppersburg, Dutch, also a member of the House of Reps, andn a ranking
member on Permanent Select Committee on Intelligence. 4/16/13 Protecting Internet freedom is a
priority http://thehill.com/special-reports/defense-and-cybersecurity-april-2013/294319-protectinginternet-freedom-is-a-priority Date Accessed; 7/20/13
These attackers have stolen Americans’ most personal information, including banking and health
records, which can be used for identity theft or blackmail purposes. Using sophisticated distributed denial of service
attacks, foreign cyberattackers are also shutting down websites critical to Americans’ everyday lives,
such as banking websites — compromising not only your bank account, but also the freedom of the
Internet. CISPA was drafted to protect individuals’ privacy and civil liberties while still enabling
effective cyber threat information-sharing. At the suggestion of several privacy and civil liberties groups, we made
numerous changes to the act to further narrow its scope and purpose to ensure protection of these liberties. CISPA does not
allow the federal government to read your email or your Facebook posts or monitor your Internet
activity. The definitions in the bill were narrowed on the House floor to better ensure the bill’s authorities could not be
misinterpreted or misused for broader purposes. CISPA was also amended to restrict how the government can
use the threat information shared by industry to four narrow categories: cybersecurity; investigation
and prosecution of cybersecurity crimes; protection of individuals from the danger of death or
physical injury; and protection of minors from physical or psychological harm such as child pornography.
CISPA can keep the government in check
Rogers, Mike. Ruppersburg, Dutch.(House of Representatives). 4/16/13 Protecting Internet freedom is a
priority http://thehill.com/special-reports/defense-and-cybersecurity-april-2013/294319-protectinginternet-freedom-is-a-priority Date Accessed; 7/20/13
Contrary to some assertions, CISPA does not provide any new authorities for the government to
monitor private networks. Moreover, a private company can restrict the information it shares, to
minimize or anonymize any personal information before sharing the cyber threat information. CISPA is
also designed to prevent companies from sharing information about an individual customer or
subscriber. Finally, the bill also requires an annual report from the intelligence community’s inspector
general to ensure that none of the information provided to government is mishandled or misused.
Making the Internet more secure will itself protect Americans’ privacy, civil liberties and Internet
freedoms, which are presently being whittled away with each successful foreign cyberattack.
Few of us can imagine life without the Internet. We believe this bill is necessary to protect the very
freedom and openness that created the immeasurable benefits the Internet has provided to the
world.
Wire Taps
Wiretaps Solve Terrorism
Wire Tapping has been instrumental in preventing terrorist attacks
Michael Hewitt, Liberty University, 2008, Running head: WIRETAPPING: A NECESSITY, Wiretapping: A Necessity for Effectively Combating
Terrorism in the 21st Century, http://digitalcommons.liberty.edu/cgi/viewcontent.cgi?article=1040&context=honors
In analyzing post 9-11 wiretapping, it is necessary to analyze the effects that its¶ use has had on national security and domestic society in the
realm of National Security,¶ wiretapping has
proven to be instrumental in the identification and prosecution
of terrorists, effectively helping to diminish this threat. In the domestic realm, wiretapping¶ has
proven to be an effective means of preventing terrorist attacks in the U.S., and of¶ putting Americans
at ease. The most obvious evidence that the use of wiretapping has been successful in¶ protecting
American national security is the "fact that there has been no serious terrorist¶ incident on American
shores since its passage in 2001" (Spangler, 2005, para. 13).¶ Senator Orrin Hatch, R-Utah, and a staunch defender of the Patriot
Act and its¶ wiretapping provisions, has pointed out that “because of necessary secrecy laws, we may¶ never know the full positive effects the
Patriot Act is having on terrorism” (Spangler,¶ 2005, para. 13). Hatch did however note that the Justice Department has credited key¶
provisions of the Patriot Act with playing a role in the terrorism-related convictions of¶ hundreds of suspects.
It has largely been the
tools of wiretapping and other forms of¶ electronic surveillance, which have received the credit for the
success of hundreds of¶ anti-terrorism operations since 2001. Most notable among these operations
was the¶ "recent apprehension in England of scores of suspects, who were charged with making¶ plans
to blow up as many as ten airliners traveling to the United States" (Criminal, 2006,¶ para. 24). In this operation,
electronic surveillance played an instrumental part in¶ allowing British agents to monitor the activities of a terrorist cell. "'We have been¶
looking at meetings, movement, travel, spending and the aspirations of a large group of¶ people' said Peter Clarke, head of Scotland Yard's antiterrorism branch" (ABCNews,¶ 2006, para. 2). In this case, British agents substantially monitored the terrorist cell before ¶ making the arrests.
(ABCNews, 2006, para. 24) Another such situation was the¶ uncovering of "evidence indicating that a Pakistani charity was diverting funds
originally contributed for earthquake relief to finance the planned terrorism attacks on these jumbo¶ jets" (Criminal, 2006, para. 16). It is,
however, difficult to attain the exact details of the¶ results of these operations, because in these investigations, "details leading up to the¶ filing
of formal charges is not usually revealed" (Criminal, 2006, para. 16). It is known¶ however, that since September 11, 2001 thousands of
individuals classified as terrorists¶ have been subjected to electronic surveillance procedures. The surveillance, specifically¶ wiretapping, of
individuals suspected of terrorist activities, has resulted in nearly a 20%¶ conviction rate (Criminal 2006).
Wiretaps Solve Crime
Wiretaps are instrumental in taking down domestic drug trafficking operations
Administrative Office of the U.S. Courts. 2012 (“Wiretap Report 2012”. Accessed 17 July 13.
http://www.uscourts.gov/Statistics/WiretapReports/wiretap-report-2012.aspx)
Federal and state prosecutors often discuss the importance of wiretap surveillance as an investigative
tool. A wiretap in the Eastern District of California uncovered incriminating cellular telephone
communications and text messages that led to the arrest of 32 individuals and the seizure of 19
vehicles, 35 firearms, $650,000 in cash, approximately 5,000 marijuana plants, and about 200 pounds
of processed marijuana. At the state level, a wiretap in Orange County, California, was instrumental in
solving a cold homicide case that occurred in 1988. Without the interceptions, the targeted subjects
probably would not have been arrested and would have escaped prosecution. A wiretap reported for a
previous year in a larceny investigation in Queens County, New York, revealed that a "sophisticated"
group of individuals were counterfeiting checks, money orders, and credit cards that were then used to
commit grand larceny and fraud. Credit-card making machines and counterfeit credit cards were seized,
and 12 individuals were apprehended. Several separate state jurisdictions reported that interceptions
were instrumental in uncovering drug-trafficking organizations operating in the United States.
Wiretaps are key to getting criminals to cooperate with law enforcement
Chang, Alisa. 2012 (Congressional reporter for NPR. “Wall Street Wiretaps: Investigators Use Insiders’
Own Words To Convict Them”. 26 Dec. Accessed 17 Dec 13.
http://www.npr.org/2012/12/26/168021457/wall-street-wiretaps-investigators-use-insiders-ownwords-to-convict-them)
But the problem was, most of these people they confronted would just lawyer up and resist. What the
feds needed was something to make people cooperate. And in early 2008, they decided, let's do a
wiretap. Many of them, like Carroll, were longtime organized crime and narcotics investigators. They
knew, in those worlds, when you needed leverage to make someone cooperate, you recorded them
planning something criminal.
Human Trafficking
Impacts – Children are Trafficked
100,000 children are being used as prostitutes in the U.S. each year.
Stanton, July 8, 2013, (Emily, writer for USN “Study: At Least 100,000 Children Being Used in U.S. Sex
Trade”, Washington Whispers, U.S.News, http://www.usnews.com/news/blogs/washingtonwhispers/2013/07/08/study-at-least-100000-children-being-used-in-us-sex-trade, Date accessed: July
28, 2013)
Sexual trafficking is largely seen as something that happens abroad, but the underground sex trade is
very much alive in the United States – especially for minors, according to a new report from the
National Colloquium on Shelter and Services for Domestic Minor Sex Trafficking Victims.¶ Human
trafficking is a $9.8 billion domestic industry, with at least 100,000 children being used as prostitutes
in America each year, according to the report from Shared Hope International, an organization working
to eradicate sex trading. Shared Hope presented its findings in a congressional briefing Monday
attended by Sens. Rob Portman, R-Ohio, and Richard Blumenthal, D-Conn., co-chairs of the Senate
Caucus to End Human Trafficking and Reps. Ted Poe, R-Texas, and Jim Costa, D-Calif., co-chairs of the
Congressional Caucus for Victims' Rights.
Solvency: Mobile Phone Searches Solve Human Trafficking
Mobile phones searches solve Human trafficking.
Mark Latonero, The Research Director at the University of southern California on Communication Leadership & Policy., “Rise of phones in
human trafficking” DoP: 2012 DoA: 7/17/13, https://technologyandtrafficking.usc.edu/the-rise-of-mobile-phones-in-human-trafficking/
Based on the evidence gathered in the previous section, a key finding of this report is that mobile
phones play a central role in
facilitating potential cases of DMST [ Domestic Minor Sexual Trafficking]. Online advertisements for potential
DMST victims commonly contain a mobile phone contact number. Logistical information such as time, place, pricing, and
types of services are communicated through phone calls or text messages on mobile phones. As an
increasing number of websites develop mobile applications, posting of advertisements can be done
primarily via mobile phone, as can viewing and responding to these advertisements .¶ Because the
social actors involved in trafficking can use mobile phones to communicate, coordinate, organize,
advertise, etc., the information transmitted across mobile networks could serve multiple evidentiary
and investigatory purposes. The widespread use of mobile phones can also be utilized for social outreach and interventions.¶ Scant
research or policy attention to date has focused on the issue of mobile phone use in DMST. The intersection of mobility, digital
technologies, and minor sex trafficking brings new challenges and opportunities that require careful research and
analysis.¶ For example, technology-facilitated sex trafficking networks often rely upon the anonymity or contrived identities of victims and
traffickers in order to operate.[1] According to Samantha Doerr, public affairs manager at Microsoft’s Digital Crimes Unit:¶ “Child sex trafficking
is simply a very different problem than other technology-facilitated child sexual exploitation … We need to look at the methods and language
used for advertising—how johns go about searching, the use of mobile phones in child sex trafficking, and how a transaction is
coordinated.”[2]¶ Although the
field of technology forensics is exploring ways to disrupt human trafficking
online by using trace data to identify perpetrators, mobile technology is already shifting the spaces
from which we can collect those traces.¶
A2: Tracking pre-paid phones is against the fourth amendment
United States Court upheld that the defendant had no reasonable expectation of
privacy.
Latonero, 2012, (Mark, The Research Director at the University of southern California on
Communication Leadership & Policy., “Rise of phones in human trafficking”,
https://technologyandtrafficking.usc.edu/the-rise-of-mobile-phones-in-human-trafficking/, Date
accessed: July 29, 2013)
In a recent case from the United States Court of Appeals for the Sixth Circuit, the court held that the
defendant had no “reasonable expectation of privacy in the data emanating from his [pay-as-you-go]
cell phone that showed its location.”[16] The defendant, a “courier in a large-scale drug-trafficking
operation,” challenged law enforcement agents’ tracking of his cell phone to locate the defendant,
arguing that it constituted a “warrantless search that violated the Fourth Amendment.”[17] In finding
that the defendant’s Fourth Amendment rights had not been violated, the court explained, “if a tool
used to transport contraband gives off a signal that can be tracked for location, certainly the police
can track that signal. The law cannot be that a criminal is entitled to rely on the expected
untrackability of his tools.”[18] This decision calls into question the privacy protection associated with
pre-paid devices.
Crime Impacts
Impacts: Organized Crime Hurts National Security
Organized crime is responsible for the smuggling of drugs, humans, and weapons of
mass destruction, which poses a threat to national security and democracy
Paula Dobriansky,2001 [American foreign policy expert who has served in key roles as a diplomat and policy maker
in the administrations of five U.S. presidents, both Democrat and Republican, “The Explosive Growth of Globalized
Crime,”Arresting Transnational Crime, 2001, (http://guangzhou.usembassychina.org.cn/uploads/images/sqVFYsuZI0LECJTHra1S_A/ijge0801.pdf)]
First, the impact is felt directly on the streets of American communities. Hundreds of thousands of
individuals enter the United States illegally each year. Smuggling of drugs, firearms, stolen cars, child
pornography, and other contraband occurs on a wide scale across our borders. Second, the expansion
of American business worldwide has opened new opportunities for foreign-based criminals. When an
American enterprise abroad is victimized, the consequences may include the loss of profits, productivity,
and jobs for Americans at home. international criminals engage in a variety of activities that pose a
grave threat to the national security of the United States and the stability and values of the entire
world community. Examples include the acquisition of weapons of mass destruction, trade in banned
or dangerous substances, and trafficking in women and children. Corruption and the enormous flow
of unregulated, crime-generated profits are serious threats to the stability of democratic institutions
and free.
Organized Crime Destroys Rule of Law
Organized crime undermines rule of law
United Nations Office of Drugs and Crime; 2013 (“Transnational organized crime threat
assessments”. Accessed 17 July 13. http://www.unodc.org/unodc/data-and-analysis/TOC-threatassessments.html)
The world population grows every year, and so does the volume of exchanges among people. The vast
majority of these exchanges are legitimate and beneficial, but a significant share is not. Transnational
criminal markets crisscross the planet, conveying drugs, arms, trafficked women, toxic waste, stolen
natural resources or protected animals' parts. Hundreds of billions of dollars of dirty money flow
through the world every year, distorting local economies, corrupting institutions and fuelling conflict.
Transnational organized crime has become a central issue in international affairs, an important factor
in the global economy, and an immediate reality for people around the world. Aside from the direct
effects - drug addiction, sexual exploitation, environmental damage and a host of other scourges organized crime has the capacity to undermine the rule of law and good governance, without which
there can be no sustainable development.
Drug Trade Impacts: Drugs & Crime Destroy Society – Laundry List
Drugs and crime destroy economies, erode social relations, undermine democracy,
and result in vigilantism
Office of the President of the United Nations General Assembly’s 66th Session. 2012
(“Thematic Debate of the 66th session of the United Nations General Assembly on Drugs and Crime as a
Threat to Development On the occasion of the UN International Day against Drug Abuse and Illicit
Trafficking”. 26 Jun. Accessed 17 July 13. http://www.un.org/en/ga/president/66/Issues/drugs/drugscrime.shtml)
Drugs and crime undermine[s] development by eroding social and human capital. This degrades
quality of life and can force skilled workers to leave, while the direct impacts of victimisation, as well as fear of crime, may
impede the development of those that remain. By limiting movement, crime impedes access to possible employment and
educational opportunities, and it discourages the accumulation of assets. Crime is also more “expensive” for poor
people in poor countries, and disadvantaged households may struggle to cope with the shock of victimisation .
Drugs and crime also undermine[s] development by driving away business. Both foreign and domestic
investors see crime as a sign of social instability, and crime drives up the cost of doing business. Tourism is a sector
especially sensitive to crime issues. Drugs and crime, moreover, undermine[s] the ability of the state to promote
development by destroying the trust relationship between the people and the state, and undermining
democracy and confidence in the criminal justice system. When people lose confidence in the
criminal justice system, they may engage in vigilantism, which further undermines the state.
Drug Trade Impacts: Drug Money Fuels Terrorism
The drug trade is a major source of terrorist income
McCraw, Steven C. 2003 (Assistant Director of the FBI Office of Intelligence. Testimony given before
the Senate Judiciary Committee. 20 May. Accessed 17 July 13.
http://www.fbi.gov/news/testimony/international-drug-trafficking-and-terrorism)
In framing the issue, the Committee astutely recognizes these links and the threat they present to the American people. That is why all
aspects of the terrorist enterprise including funding and support must be attacked. The criminal nexus to
terrorism including drug trafficking is why our local, state, and federal law enforcement partners throughout the
U.S. and the world are essential to combating global terrorism. They constitute an army of dedicated professionals who bring
tremendous resources and capabilities to the war on terrorism. In fact, the successes of the Joint Terrorism Task Forces are in large part to their
unwavering commitment to the safety of our nation and its citizens.¶ Today's Committee meeting focuses on the ties of drug trafficking and
international terrorism which is clearly a problem. Drug
trafficking is a highly lucrative enterprise generating billions
of dollars in profit that terrorist organizations can easily tap into. The ties between international terrorist
organizations and drug trafficking varies greatly from organization to organization. For example, the Fuerzas Armadas Revolucionarias de
Colombia (FARC), aka the Revolutionary Armed Forces of Colombia, is strongly tied to drug trafficking in Colombia. The
objective of the FARC is to overthrow the established order in Colombia and replace it with a socialist
dictatorship. In its attempts to destabilize the Government of Colombia, the FARC conducts bombings, extortions,
selective assassinations, kidnappings, and armed confrontations with Colombian police and military forces. In an
effort to finance its agenda, the FARC has conducted countless kidnappings for ransom of Colombian and foreign nationals, including the most
recent kidnaping/capture of American citizens in Colombia. They have also forced businesses to pay "war taxes" in exchange for FARC
protection. However, drug
trafficking profits are the FARC's principal source of funding. Moreover, it appears
much of their agenda is based upon protecting and exploiting drug trafficking operations in Colombia and
the region.¶ Historically, Afghanistan has been a major source of heroin throughout the world. Recently, al-Qa'ida
and Sunni extremists have been associated through a number of investigations with drug trafficking. We have
observed elements of the Taliban shipping and selling illegal drugs into the US. A recent joint FBI and DEA
investigation resulted in the arrests of 16 Afghan and Pakistani subjects for involvement in a drug ring that was possibly linked to Al-Qa'ida and
the Taliban. The investigation determined that heroin, grown and processed in Afghanistan and Pakistan, was being shipped to the U.S.
Profits from the sale of the heroin were laundered through Afghan and Pakistani owned businesses and then sent back to
associates of terrorist organizations. Criminal and financial links to the Taliban regime and their involvement with Al-Qa'ida were
established. The subjects were also involved in a number of other criminal activities including document/mail fraud, operating an illegal money
transmitting business, and other white collar crimes.¶ Historically, Hizballah's direct involvement in narcotics trafficking has been limited, and
the group's leaders have condemned the drug trade on religious grounds. However, we
have seen individuals with suspected
Hizballah ties involved in drug related activities and we believe that funds from these activities eventually
make their way to Hizballah coffers in Lebanon. The FBI has investigated and continues to investigate, efforts by individuals and
entities associated with Hizballah to traffic illegal drugs in the U.S. Acts of terrorism attributed to Hizballah have little or no
connection to narcotic issues. Rather, these acts were intended to further their political and terrorist
agendas. Hizballah utilizes funds from drug trafficking as one of many methods to fund these agendas.¶ By way of
example, the FBI conducted an investigation which employed an undercover operation to target Hizballah cells in the U.S. ¶ The investigation
has focused on distinct, but related, criminal enterprises which have participated in a host of criminal activity from fraud schemes to drug
trafficking to fund their activities and provide funds to the overall Hizballah organization. A number of the subjects have been indicted and the
investigation is continuing.¶ The Al-Ittihad al-Islami, or AIAI, Somalia's
largest militant Islamic organization, is suspected
of smuggling an illegal narcotic leaf known as Khat ("cot") into the United States. Arrests and shipment seizures indicate a sharp
increase in demand for the drug. Proceeds from East African Khat sales are likely remitted to Middle Eastern banks via Hawala network
and wire services. It is likely that these funds pass through the hands of suspected AIAI members and other persons
with possible ties to terrorist groups.¶ The bottom line is that terrorists and terrorist groups will resort to any method or means to
fund and facilitate their terrorist agendas. As state sponsorship of terrorism has come under greater international
condemnation, the tremendous profit potential associated with drug trafficking make it an attractive
from the perspective of terrorist groups. This is further evidence that the
prospect of terrorist-related drug trafficking
represents a continuing and significant threat to our national security.
Drug Trade Impacts: Drug Trade Causes Latin American Instability
Drug trafficking breeds instability in Latin America
Williams, Phil. Felbab-Brown, Vanda. 2012 (Phil Williams is the Director of the Matthew B. Ridgway
Center for International Security Studies at the University of Pittsburgh, and Vanda Felbab-Brown is a
fellow at the Latin American Initiative and 21st Century Defense Initiative in Foreign Policy at the
Brookings Institute. April. Accessed 17 July 13.
http://www.strategicstudiesinstitute.army.mil/pubs/people.cfm?authorID=850)
Burgeoning and unconstrained drug production and other illicit economies thus have profound negative consequences
for states and local stability. Most fundamentally, illicit economies provide an opportunity for belligerent
groups to increase their power along multiple dimensions not simply by gaining control of physical resources,
but also [and] by obtaining support from local populations. Such belligerents hence pose a serious security
threat to local governments and, depending on the objectives of the group, to regional and global security and U.S.
interests as well. With large financial profits, the belligerent groups improve their fighting capabilities by
increasing their physical resources, hiring greater numbers of better paid combatants, providing them with better weapons, and simplifying
their logistical and procurement chains. Crucially and frequently neglected in policy considerations, such
belligerents derive
significant political capital—legitimacy with and support from local populations—from their sponsorship of the drug
economy. They do so by protecting the local population’s reliable (and frequently sole source of) livelihood from the efforts of the
government to repress the illicit economy. They also derive political capital by protecting the farmers from brutal and unreliable traffickers, by
bargaining with traffickers for better prices on behalf of the farmers, by mobilizing the revenues from the illicit economies to provide otherwise
absent social services such as clinics and infrastructure, as well as other public goods, and by being able to claim nationalist credit if a foreign
power threatens the local illicit economy. In short, sponsorship
of illicit economies allows nonstate armed groups to
function as security providers and economic and political regulators. They are thus able to transform
themselves from mere violent actors to actors that take on proto-state functions.
Gangs Impacts: Gangs Cause Crime
Gangs are a major source of crime within the United States
Federal Bureau of Investigation. 2011 (“2011 National Gang Threat Assesment”. Acessed 17 July
13. http://www.fbi.gov/stats-services/publications/2011-national-gang-threat-assessment)
There are approximately 1.4 million active street, prison, and OMG gang members comprising more than
33,000 gangs in the United States. Gang membership increased most significantly in the Northeast and Southeast regions, although the West and Great
Lakes regions boast the highest number of gang members. Neighborhood-based gangs, hybrid gang members, and national-level gangs such as the Sureños are
rapidly expanding in many jurisdictions. Many communities are also experiencing an increase in ethnic-based gangs such as African, Asian, Caribbean,
and Eurasian gangs.¶ Gangs are responsible for an average of 48 percent of violent crime in most jurisdictions
and up to 90 percent in several others, according to NGIC analysis. Major cities and suburban areas experience the most gang-related
violence. Local neighborhood-based gangs and drug crews continue to pose the most significant criminal threat in most communities. Aggressive
recruitment of juveniles and immigrants, alliances and conflict between gangs, the release of
incarcerated gang members from prison, advancements in technology and communication, and Mexican
Drug Trafficking Organization (MDTO) involvement in drug distribution have resulted in gang expansion and violence in a
number of jurisdictions.¶ Gangs are increasingly engaging in non-traditional gang-related crime, such as alien smuggling, human
trafficking, and prostitution. Gangs are also engaging in white-collar crime such as counterfeiting, identity theft, and
mortgage fraud, primarily due to the high profitability and much lower visibility and risk of detection and punishment than drug and weapons trafficking.¶
US-based gangs have established strong working relationships with Central American and MDTOs to
perpetrate illicit cross-border activity, as well as with some organized crime groups in some regions of the United States. US-based gangs and
MDTOs are establishing wide-reaching drug networks; assisting in the smuggling of drugs, weapons, and illegal immigrants along the Southwest Border; and serving
as enforcers for MDTO interests on the US side of the border. ¶ Many gang members continue to engage in gang activity while incarcerated. Family members play
pivotal roles in assisting or facilitating gang activities and recruitment during a gang members’ incarceration. Gang members in some correctional facilities are
adopting radical religious views while incarcerated. ¶ Gangs encourage members, associates, and relatives to obtain
law enforcement,
judiciary, or legal employment in order to gather information on rival gangs and law enforcement
operations. Gang infiltration of the military continues to pose a significant criminal threat , as members
of at least 53 gangs have been identified on both domestic and international military installations. Gang members
who learn advanced weaponry and combat techniques in the military are at risk of employing these skills on the street when
they return to their communities.¶ Gang members are acquiring high-powered, military-style weapons and equipment
which poses a significant threat because of the potential to engage in lethal encounters with law enforcement officers and civilians. Typically firearms are acquired
through illegal purchases; straw purchases via surrogates or middle-men, and thefts from individuals, vehicles, residences and commercial establishments. Gang
members also target military and law enforcement officials, facilities, and vehicles to obtain weapons,
ammunition, body armor, police gear, badges, uniforms, and official identification.¶ Gangs on Indian Reservations often emulate
national-level gangs and adopt names and identifiers from nationally recognized urban gangs. Gang members on some Indian Reservations are associating with gang
members in the community to commit crime. ¶ Gangs
are becoming increasingly adaptable and sophisticated, employing new and
to facilitate criminal activity discreetly, enhance their criminal operations, and connect
with other gang members, criminal organizations, and potential recruits nationwide and even worldwide.
advanced technology
Gangs Impacts: Gangs Key to Drug Trade
U.S.-based gangs are integral to international drug trade operations
Schmidt, Mark. 2012 (Staff writer for the Combating Terrorism Center at West Point. “U.S. Gang
Alignment with Mexican Drug Trafficking Organizations”. 22 Mar. Accessed 17 July 13.
http://www.ctc.usma.edu/posts/u-s-gang-alignment-with-mexican-drug-trafficking-organizations)
MDTOs were in search of U.S.-based partners who would not cooperate with law enforcement. Accordingly, the loyalty and discipline
attributes of gangs made them ideal partners. Theoretically, the loyalty and discipline of U.S. gangs would hinder
cooperation with law enforcement, and thus better protect the drug trafficking operation. The success
of their working relationship is, in part, because gangs and Drug Trafficking Organizations (DTOs) are likeminded organizations. As criminal enterprises, loyalty, discipline, and territoriality are cornerstone philosophies
on how gangs and MDTOs manage their respective organizations. This is because criminal enterprises must
function in a covert capacity if they wish to survive law enforcement intervention and rival criminal
takeover. Without loyalty to the organization, whether a gang or a DTO, rivals and law enforcement could easily infiltrate and dismantle the
organization from the inside. Discipline is paramount to keep members inline so that their actions do not disrupt the organization or its
operations. Controlling and expanding one’s territory is also important to the survivability of the organization as it protects the economic area
of operation from competitors.
Solvency: Digital Surveillance Solves Organized Crime
Electronic surveillance is required for taking down organized crime
Boerman, Brian; 2008 (Attorney at Baker Botts LLP, 2008, “BEYOND THE WIRE: AN ANALYSIS OF
NON-TELEPHONIC CONVERSATIONS UNDER TITLE III,” NYU Journal of Law and Liberty, Accessed: July 22,
2013, Page 599-600)
(https://www.law.nyu.edu/ecm_dlv4/groups/public/@nyu_law_website__journals__journal_of_law_an
d_liberty/documents/documents/ecm_pro_060973.pdf)
Electronic surveillance has become, arguably, the greatest weapon on the war against organized
crime. Though organized crime is not limited only to the traditional conception of “the mob,” the use of
wiretaps and electronic bugs against the Mafia in New York is a terrific example of how such
electronic surveillance can be used to increase both the safety and efficiency of law enforcement.
Such tactics were at the heart of the Mafia Commission Trial of the mid-1980s that sent most of the
Mafia leadership to prison. Evidence was gathered from bugs planted in the homes, cars, and meeting
places of Paul Castellano, Anthony “Fat Tony” Salerno, Gennaro “Jerry Lang” Langella, and Anthony
“Tony Ducks” Corallo (so named for his habit of ducking prosecutions). These electronic surveillance
techniques made their capture quicker and easier, and less risky, than if traditional methods had been
used. The non-technological strategy of infiltration can supply a wealth of information but is difficult
and dangerous. Even Joe Pistone, the famed Donnie Brasco, had his investigation supplemented by
wiretaps. Mob informants can be tremendously helpful, but first they must be flipped. Electronic
surveillance can aid in this area as well. For example, Henry Hill cooperated with the government after
hearing a recording where he was marked for execution. Wiretaps have also provided key evidence
against drug rings and motorcycle gangs such as the Bandidos.
Wikileaks Harms National Security
Wikileaks Threatens National Security
Wikileaks is a threat to national security and it is necessary to find the anonymous
sources posting classified information
Montabalno, Elizabeth (Staff Writer Information Weekly)Mar 2010 Army: Wikileaks A National Security
Threat http://www.informationweek.com/government/security/army-wikileaks-a-national-securitythrea/223900094 Date Accessed: 7/16/13
Wikileaks.org is considered a threat to national security because it posts classified intelligence
information, according to a 2008 U.S. Army document Wikileaks posted Monday.¶ The document,
attributed to the Army Counterintelligence Center and titled "Wikileaks.org -- An Online Reference to
Foreign Intelligence Services, Insurgents, or Terrorist Groups?", cited the leaking of classified Army
materials as the chief reason Wikileaks is harmful to national security.¶ "Such information could be of
value to foreign intelligence and security services (FISS), foreign military forces, foreign insurgents, and
foreign terrorist groups for collecting information or for planning attacks against U.S. force, both
within the United States and abroad," the document says.¶ The Army has tried to sniff out a possible
mole within its own ranks who might be leaking materials to Wikileaks, doubting the site's assertion that
it receives classified materials from former government agency employees, according to the
document.¶ "These claims are highly suspect, however, since Wikileaks.org states that the anonymity
and protection of the leakers or whistleblowers is one of its primary goals," according to the
document.¶ Because anyone can post to the site and there is no editorial oversight, the public may use
Wikileaks as a source of misinformation, or to create lies or propaganda to promote a positive or
negative image of a targeted audience, according to the document.
¶ The Army has sought not only to identify anyone within its own ranks leaking documents to the site,
but also to encourage other organizations to do the same to try to take the site down.¶ "Web sites
such as Wikileaks.org have trust as their most important center of gravity by protecting the anonymity
and identity of the insider, leaker, or whistleblower," the document stated. "Successful identification,
prosecution, termination of employment, and exposure of persons leaking the information by the
governments and businesses affected by information posted to Wikileaks.org would damage and
potentially destroy this center of gravity and deter others from taking similar actions."
Wikileaks harms national security and caused the death of foreign intelligence officers
Hoth, Jim (Author of Gateway Pundit, and Washington Post) May 2012 Horrible… Wikileaks Document
Led to Hanging Death of Western Spy This Week in Tehran
http://www.thegatewaypundit.com/2012/05/horrible-wikileaks-document-led-to-hanging-death-ofwestern-spy-this-week-in-tehran/
The leaked US documents by far left hero Bradley Manning and Wikileaks website led to the hanging
death this week of Western spy Majid Jamali Fashi in Tehran. The Wikileaks scandal led to the hanging
death of Western spy Majid Jamali Fashi in Tehran Times of Israel reported, via OrbusMax: WikiLeaks
may have been responsible for exposing Majid Jamali Fashi, the 24-year-old kickboxer who was hanged
in Tehran on Tuesday morning after “confessing” to assassinating a nuclear scientist on behalf of Israel,
a British media report said. The Times of London reported Wednesday that a document from the US
Embassy in Baku, Azerbaijan, seemingly drew attention to Fashi. The September 2009 US diplomatic
document — identified by the code 09BAKU687 — quotes an Iranian source who was a licensed martial
arts coach and trainer as describing to his American contacts pressure from the Iranian regime to train
soldiers and militiamen in martial arts. Fashi was reportedly in Baku for an international martial arts
competition only days before the US Embassy document was written. The suggestion is that the Iranian
authorities identified Fashi as someone who was in illicit contact with the West on the basis of the
document. He was arrested days after the publication of the document by WikiLeaks in December of
2010 and charged with carrying out the January 2010 assassination of nuclear scientist Masoud AliMohammadi on behalf of the Mossad.
Wikileaks is a specific threat to national security and is only the tip of the iceberg –
more groups and people will follow their example
Eric Sterner,
Fellow, The George C. Marshall Institute, February 2011, Date Accessed July 16,2013,
“Wikileaks and Cyberspace Cultures in Conflict”, The George C. Marshall Institute,
http://www.marshall.org/pdf/materials/931.pdf
Wikileaks and Assange represent a mindset as much as a specific security threat to the United States.
The mindset raises long-term challenges for U.S. national security. Even should the United States
successfully deny Wikileaks access to cyberspace and punish it in some fashion for harming U.S.
national security, other individuals and organizations will spring up and perform the same function.
Indeed, multiple mirror websites sprung up with archived Wikileaks data when the latter’s web
presence declined. Former Wikileaks associates have already started a new entity under the moniker
“OpenSecrets.Org.” Writing in The Washington Post, Tim Hwang calls them expansionists, “who hold
that the Web should remake the rest of the world in its own image. They believe that decentralized,
transparent and radically open networks should be the organizing principle for all things in society, big
and small.”9 One often finds a belief that cyberspace also liberates the individual, that it empowers
people to rise above the artificial constraints that social institutions place upon them. Thus, for
expansionists, it becomes essential to the spread of human liberty. Expansionists subscribe to a
certain worldview and often ascribe to themselves some higher responsibility to a principle that
should exempt them from state authority.10 Thus, some give little thought to “hacktivism” against
entities that do not share their worldview, ranging from corporations to governments. In other words,
Wikileaks only represents a surge in the tide of an expansionist worldview. Of course, it is not possible
to define a group that calls itself “expansionist” and subscribes to a specific doctrine. Rather,
expansionism as used here reflects a strain of loosely consistent thought when it comes to discussions of
cyberspace and its relation to society.
Wikileaks Threatens National Security
Wikileaks hurts diplomacy efforts, while justifying weapons proliferation and war
HEATHER HURLBURT, Executive Director of the National Security Network, November 30th, 2010, Date
Accessed July 16, 2013, “Why Wikileaks Is Bad for Progressive Foreign Policy”,
http://www.newrepublic.com/blog/jonathan-cohn/79483/wikileaks-round-iii-will-it-matter-much#
But underlying all those discrete policy positions is a common set of assumptions and values: that we
live in a complex world where posturing, rigid ideology, and indiscriminate use of force will not get us,
as a society or a global commons, to where we need to go; that quiet talk is much more effective than
loud threats; that, in the long run, America’s national interests will be best served if we see and act on
them as inextricably linked with the interests of others. I’ve called them progressive, because they are.
They’re also, with a bit less emphasis on the global good, realist. Or you might simply say they are sane
and reasonable. But if we can’t conduct quiet diplomacy and have it stay quiet, it’s a lot harder to
make this approach work. Could Sadat and Begin have gotten to Camp David without months of quiet
preparation? Could Nixon have gone to China?
And back here within the U.S., you can count upon the opponents of progressive policies to use the
Wikileaks dumps to advance their agenda. They'll take items out of context and use them to justify
ideas like bombing Iran, rejecting the START treaty, and god-knows-what to North Korea. The
Wikileakers claim to promote the politics of peace and moderation. But this latest dump could very
easily have the opposite effect, by giving the absolutists a chance to spread their stereotypes and
illusions of a black and white world.
Wikileaks Helps Terrorists
Wikileaks is detrimental to the government and helps terrorists plan and coordinate
attacks
Leanord, Tom (Staff writer The Telegraph) Mar 2010 Pentagon deems Wikileaks National Security
Threat http://www.telegraph.co.uk/technology/7475050/Pentagon-deems-Wikileaks-a-nationalsecurity-threat.html
WikiLeaks, a non-profit organization which tries to offer a means of anonymously exposing
confidential documents, has become a thorn in the side of governments and private corporations. Its
latest revelation concerns itself, namely a 2008 document attributed to the Army Counterintelligence
Centre which concluded that the site constitutes a threat to military operations and US security. The
information could be used by foreign intelligence, insurgents or terrorists for "planning attacks", the
report added. Its authors warned that the lack of editorial oversight over what could be posted could
lead to it being used to spread lies and propaganda. Their report also revealed that the army had tried
to discover the identity of a possible mole leaking information to the site. An army spokesman
confirmed to the New York Times that the document, which provided no specific evidence to support its
fears, was genuine. Leaks to the site that might have alarmed military chiefs include details of military
equipment, troop strengths and its publication in 2007 of almost the entire order of battle for US
forces in Iraq and Afghanistan. Wikileaks also published a copy of "standard operating procedures" at
the Guantánamo Bay detention centre which purportedly revealed the use of "extreme psychological
stress" on detainees. The website, which relies on donations, almost closed down this year because it
ran out of money. It has also faced attempts by governments such as those of North Korea and Thailand
to block access to its site.
Wikileaks Places Lives at Risk; Gives Terrorists a ‘hit list’.
Robert Winnett, Political Editor for the Daily Telegraph, July 30, 2010, Date Accessed July 16, 2013, The
Telegraph (UK), , “Wikileaks Afghanistan: Taliban ‘hunting down informants,”
http://www.telegraph.co.uk/news/worldnews/asia/afghanistan/7917955/Wikileaks-AfghanistanTaliban-hunting-down-informants.html
More dire, the most recent release included information that identified critical infrastructure
vulnerabilities. Earlier mass releases of classified information and unfiltered military reports from Iraq
and Afghanistan placed the lives of U.S. allies and pro-democracy forces at risk by, among other things,
giving terrorist groups a “hit list.”2
Wikileaks Hurts US-Pakistani Relations
Wikileaks hurts U.S. Pakistani Relations; Released Information Fuels Anti-American
sentiment
Jayshree Bajoria, South Asia researcher at Human Rights Watch, December 6, 2010, Date Accessed July
16th,2013, How WikiLeaks Hurts U.S.-Pakistan Ties, Council on Foreign Relations (CFR),
http://www.cfr.org/pakistan/wikileaks-hurts-us-pakistan-ties/p23565,
The release of thousands of U.S. diplomatic cables (NYT) by WikiLeaks.org has further shaken
Washington's already strained relations with Pakistan, a strategic ally central to any success in
Afghanistan and the fight against terrorism. The cables discuss U.S. concerns over Pakistan's
continued support for certain militant groups, its nuclear program, the country's fragile civil-military
relations, human rights abuses by Pakistan's security services, and more. Pakistani media has been
covering the cable leaks extensively, and some stories have further fueled anti-U.S. sentiment
(Reuters), with Pakistan's right-wing Islamist party Jamaat-e-Islami staging a rally Dec. 5 to protest
Pakistan's alliance (AFP) with the United States.
A2: Wikileaks Solves For Transparency
Wikileaks does not increase transparency – Bypassing the legal framework creates a
governmental backlash that leads to even more secrecy
Fenster, Mark. (Professor at the University of Florida) March 2012. Disclosure's Effects: WikiLeaks and
Transparency. http://works.bepress.com/cgi/viewcontent.cgi?article=1009&context=mark_fenster Date
Accessed: 7/17/2013
First, WikiLeaks’ ability to receive and distribute leaked information cheaply, quickly, and seemingly
unstoppably allows it to bypass the legal framework that would otherwise permit courts and officials
to consider and balance disclosure’s effects. For this reason, WikiLeaks threatens to make
transparency’s balance irrelevant.238 Second, its recent massive disclosures of U.S. military and
diplomatic documents, and the uneven and unpredictable effects they have had to date, should force
us to reconsider and test the assumption that disclosure produces effects that can serve as the basis
for judicial and administrative prediction, calculation, and balancing. For this reason, WikiLeaks
threatens transparency’s balance by disproving its assumption that disclosure guarantees measurable
consequences that can be estimated ex ante.
Turn: Wikileaks decreases transparency by creating a government backlash and
increased digital surveillance
Päivikki Karhula. (Staff Writer for International Federation of Libraries Association) Jan 2011 What is
the effect of WikiLeaksfor Freedom of Information?
http://www.ifla.org/files/assets/faife/publications/spotlights/wikileaks-karhula.pdf Date Accesed:
7/17/13
What is the possible impact of WikiLeaks? Is it going to increase or restore the space of free speech or
advance transparency of public documents? Or is it going to have the opposite effect and make
governments strengthen their restrictions and increase different forms of Internet censorship? There
are several valid concerns and evident signs about stricter legislation and more in depth surveillance
practices which may find their grounds on WikiLeaks. Shortly after cable leaks three US senators
(Ensign, Lieberman, Brown) introduced a bill aimed at stopping WikiLeaks by making it illegal to
publish the names of military or intelligence community informants. According to Brown, The Securing
Human Intelligence and Enforcing Lawful Dissemination Act (SHIELD) would prevent anyone from
compromising national security in the future in a similar manner to WikiLeaks.17 Another bill under
discussion would give the US government extended rights to wiretap all online communication and
Internet traffic including foreign-based service providers. The wiretapping bill would also require
software developers which enable peer-to-peer communication to redesign their service to allow
interception.18 Concerns have been raised if WikiLeaks is used to gain support for this legislation.19
A2: Wikileaks Solves For Transparency
Wikileaks hurts national security; slows declassification and openness in Gov’t
HEATHER HURLBURT, Executive Director of the National Security Network, November 30th, 2010, Date
Accessed July 16, 2013, “Why Wikileaks Is Bad for Progressive Foreign Policy”,
http://www.newrepublic.com/blog/jonathan-cohn/79483/wikileaks-round-iii-will-it-matter-much#
In the last few years, there has been some progress toward classifying fewer documents and using the
more rarefied classifications less frequently. This series of leaks will almost surely reverse that
progress. A top-secret classification would have kept any of these documents off the shared network
from which they were allegedly downloaded by a very junior soldier.
You can bet that the intelligence community will make that point—not only to justify stronger
classification of new documents but also to slow the declassification of old ones. Civilian
administrations at least since Clinton’s have been trying to speed up those efforts. Now they will go
even more slowly, making it harder to learn the whole story of how our government analyzed an
issue, treated an individual, or reacted to a crisis.
And make no mistake: You can't get the comprehensive history of a diplomatic episode from Wikileaks
any more than someone could learn the comprehensive truth about you by downloading the top 20 emails from your inbox right now.
Digital Surveillance Solvency
Data Collection is Key to Cyber Security Technology
Data collection Necessary to keep expanding IT Security efficient.
Eileen Yu, senior editor at ZDNet Asia, where she oversees the business tech news site, June 12, 2013,
“Complexity, targeted attacks to drive security spend to $67B”, ZDNET,
http://www.zdnet.com/complexity-targeted-attacks-to-drive-security-spend-to-67b-7000016717/, Date
Accessed: July 23, 2013
Increasing complexity and number of targeted attacks are pushing companies to spend more on IT
security, driving the global market to a 8.7 percent climb to hit US$67.2 billion this year. ¶ Key market
drivers are mobile security, big data, and advanced targeted attacks.¶ In a statement released Wednesday, Gartner
projected the security technology and service market will further expand to US$86 billion in 2016. The
market researcher pointed to three market drivers: mobile security, big data, and advanced targeted attacks. ¶ To
support these security requirements as well as business needs, more data is needed to more
effectively detect advanced attacks, the research firm added, noting that this presented challenges when
identifying patterns of potential risk across diverse data sources.
A2: Tor Prevents Digital Surveillance
You can reveal the identity of Tor users by scanning data carefully
Biryukov, Alex. Pustogarov, Ivan. Weinmann, Ralf-Philipp. 2013 (Security researchers at the
University of Luxembourg. "Trawling for Tor Hidden Services: Detection, Measurement,
Deanonymization". Accessed 15 July 2013. http://www.ieeesecurity.org/TC/SP2013/papers/4977a080.pdf)
We have analyzed the security properties of Tor hidden services and shown that attacks to
deanonymize hidden services at a large scale are practically possible with only a moderate amount of
resources. We have demonstrated that collecting the descriptors of all Tor hidden services is possible
in approximately 2 days by spending less than USD 100 in Amazon EC2 resources. Running one or more
guard nodes then allows an attacker to correlate hidden services to IP addresses using a primitive
traffic analysis attack. Furthermore, we have shown that attackers can impact the availability and
sample the popularity of arbitrary hidden services not under their control by selectively becoming their
hidden service directories.
Transparency
Uniqueness: Privacy Decreasing Now
No Privacy Now-Social Media
Palmer, Shelly. 06/16/2013. PRISM: There Simply is No Privacy... None.
http://www.huffingtonpost.com/shelly-palmer/prism-there-simply-is-no_b_3451721.html
Being an active member of a social networking community - whether it's Facebook, Twitter, or
anything else - means ceding a fair amount of privacy. The information, photos and check-ins you
share are already public information (to an extent), even if your security settings are maxed out.
Nothing you do on the Internet is truly private, and nothing you put on the Internet will ever really be
deleted. Surrendering your right to privacy is the price of living an Internet-based "connected" life.
There is an immense lack of digital privacy protection regarding mobile phones
Hubert A.-M. Moik. CEO of MobiDigger, a cell phone digital privacy company. August 2012. Protect
your privacy:¶ Mobile & Digital Privacy and Awareness.
http://www.mobidigger.com/2012/Privacy_Study_MobiDigger_2012.pdf. Date Accessed 7/17/13.
Contrary to conventional wisdom, privacy concerns are not limited to the Internet. It also ¶ encloses
mobile phones, which penetration in America reached 104.6% in 2011 (totaling 331.6 ¶ million subscribers) therefore exceeding the US
population1¶ . Even one-third of American ¶ households now have wireless device only2¶ . Users are largely unaware that cell
phone ¶ messages -even simple text messages- ultimately can end up in the hands of strangers and ¶
even on the Internet. Worse, for example, new “smart phones” send information about the ¶ phone’s
location to databases. Though such databases usually are not public, they also are not ¶ private; this information,
then can pose a danger to the person who uses their phone to ¶ communicate with strangers or other acquaintances, to whom they
normally would not reveal ¶ their locations. Private cell-phone information can also be revealed through a “reverse
search,” ¶ in which anyone can search a cell phone number to find the owner’s name and address.
Digital privacy has largely dissappeared
Amy Joi O'Donoghue. Writer for Deseret news.June 7 2013."Addressing the illusion of digital
privacy."Deseret News.http://www.deseretnews.com/article/865581375/Addressing-the-illusion-ofdigital-privacy.html?pg=all. Date Retrieved: July 17, 2013.
“You
can’t have 100 percent security and then also have 100 percent privacy and zero inconvenience,”
President Barack Obama said. “You know, we’re going to have to make some choices as a society.”¶
Some say that choice has already been made in the aftermath of 9/11, with the approval of the Patriot
Act that followed, and the pursuit of security at a time of free-flowing information of all types that
gives the nation's enemies — from individuals to organizations to nations — the ability to cause
catastrophic harm.¶ But it's a choice and policy being assessed this week in the halls of Washington, D.C., as well as in the burgs and
hamlets of the nation by individuals and families who increasingly use technology to navigate their lives.¶ "Digital privacy is an
illusion," said Eric Swedin, a professor at Weber State University who teaches history, particularly the history of technology. Swedin has also
taught computer science and has specialized in information security — such as how hacking works and how to defend a system against
hackers.¶ "When
you do something digitally, it can be monitored and copied. Corporations do this all the
time," Swedin said.¶ He said Google, for example, keeps track of searches.¶ "Google cares not about you as an individual, they care
about you as a marketing category … and this gives you ads that are discerned from your personal searches."¶ Swedin said digital
eavesdropping into cellphone records should not be a surprise given the wide-open nature of the Internet and the domestic security urgency
that gripped the nation in the wake of 9/11.¶ "You
can learn a lot really fast about a person just from looking at that
information," he said. "My suspicion, and it is just a suspicion, is that the intelligence community since
9/11 has been totally enamored with something called 'total information awareness.' It is this belief
that if you have enough data and the right kind of computer programs, you can find criminal behavior
before it happens."
Surveillance happening now, and Citizens like it
James Vlahos Contributing writer at The New York Times Contributing Editor at Popular Mechanics Contributing Editor at Popular Science
October 1, 2009. “Surveillance Society: New High-Tech Cameras Are Watching You Popular mechanics”,
http://www.popularmechanics.com/technology/military/4236865
Most Americans would probably welcome such technology at what clearly is a marquee terrorist target. An
ABC News/Washington
Post poll in July 2007 found that 71 percent of Americans favor increased video surveillance. What people
may not realize, however, is that advanced monitoring systems such as the one at the Statue of Liberty are proliferating
around the country. High-profile national security efforts make the news—wiretapping phone conversations,
Internet moniÂtoring—but state-of-the-art surveillance is increasingly being used in more every-day settings.
By local police and businesses. In banks, schools and stores. There are an estimated 30 million
surveillance cameras now deployed in the United States shooting 4 billion hours of footage a week.
Americans are being watched, all of us, almost everywhere. We have arrived at a unique moment in the history of surveillance.
The price of both megapixels and gigabytes has plummeted, making it possible to collect a previously
unimaginable quantity and quality of data. Advances in processing power and software, meanwhile, are beginning to allow
computers to surmount the greatest limitation of traditional surveillance—the ability of eyeballs to effectively observe the activity on dozens of
video screens simultaneously. Computers can't do all the work by themselves, but they can expand the capabilities of humans exponentially. ¶
Uniqueness: Privacy Violations Inevitable
Violations of our privacy are inevitable, the proliferation of security technology is
increasing rapidly.
Brin, David. Doctor of Philosophy in space science, 2010 fellow at the Institute of Ethics. 1998. The
Transparent Society. “Chapter One: The Challenge of an Open Society.”
http://www.davidbrin.com/transparentsociety1.html
Alas, they do appear to be our only options. For the cameras are on their way, along with data networks that will send a myriad
images flashing back and forth, faster than thought. ¶ In fact, the future has already arrived. The trend began in Britain a decade ago, in the town
of King's Lynn, where sixty remote-controlled video cameras were installed to scan known "trouble spots," reporting directly to police headquarters. The resulting
reduction in street crime exceeded all predictions; in or near zones covered by surveillance, crime dropped to one seventieth of the former amount. The savings in
patrol costs alone paid for the equipment in a few months. Dozens of cities and towns soon followed the example of King's Lynn. Glasgow, Scotland, reported a 68
percent drop in crime citywide, while police in Newcastle fingered over 1,500 perpetrators with taped evidence. (All but seven pleaded guilty, and those seven were
later convicted.) In May 1997, a thousand Newcastle soccer fans rampaged through downtown streets. Detectives studying the video reels picked out 152 faces and
published 80 photographs in local newspapers. In days, all were identified. ¶ Today over
300,000 cameras are in place throughout the
United Kingdom, transmitting round-the-clock images to a hundred constabularies, all of them reporting decreases in public misconduct. Polls
report that the cameras are extremely popular with citizens, though British civil libertarian John Wadham and others have
bemoaned this proliferation of snoop technology, claiming, "It could be used for any other purpose, and of course it could be abused."¶ Visitors to Japan, Thailand,
and Singapore will see that other countries are rapidly following the British example, using closed circuit television (CCTV) to supervise innumerable public areas.* ¶
This trend was slower coming to North America, but it appears to be taking off. After initial experiments garnered
widespread public approval, the City of Baltimore put police cameras to work scanning all 106 downtown intersections. In 1997, New York City began its own
program to set up twenty-four-hour remote surveillance in Central Park, subway stations and other public places. ¶ No
one denies the obvious
and dramatic short-term benefits derived from this early proliferation of surveillance technology. That is not
the real issue. Over the long run, the sovereign folk of Baltimore and countless other communities will have to make the same choices as the inhabitants of
our two mythical cities. Who will ultimately control the cameras?¶ Consider a few more examples:¶ How many parents have
wanted to be a fly on the wall while their child was at day care? This is now possible with a new video monitoring system known as
Kindercam, linked to high-speed telephone lines and a central Internet server. Parents can log on, type "www.kindercam.com," enter their password, and access a
live view of their child in day care at any time, from anywhere in the world. Kindercam will be installed in two thousand daycare facilities nationwide by the end of
1998. Mothers on business trips, fathers who live out of state, as well as distant grandparents can "drop in" on their child daily. Drawbacks? Overprotective parents
may check compulsively. And now other parents can observe your child misbehaving! ¶ Some of the same parents are less happy about the lensed pickups that are
sprouting in their own workplaces, enabling supervisors to tune in on them the same way they use Kindercam to check up on their kids.¶ That is, if they notice the
cameras at all.
At present, engineers can squeeze the electronics for a video unit into a package smaller
than a sugar cube. Complete sets half the size of a pack of cigarettes were recently offered for sale by the Spy Shop, a little store in New York City located
two blocks from the United Nations. Meanwhile, units with radio transmitters are being disguised in clock radios, telephones
and toasters, as part of the burgeoning "nannycam" trend. So high is demand for these pickups, largely by parents eager to check on their babysitters, that just one
firm in Orange County, California, has recently been selling from five hundred to one thousand disguised cameras a month. By the end of 1997, prices had dropped
from $2,500 to $399.¶ Cameras
aren't the only surveillance devices proliferating in our cities. Starting with Redwood City, near
San Francisco, several police departments have begun lacing neighborhoods with sound pickups that transmit directly
back to headquarters. Using triangulation techniques, officials can now pinpoint bursts of gunfire and send patrol units swiftly to the scene, without having to wait
for vague phone reports from neighbors. In 1995 the Defense Department awarded a $1.7 million contract to Alliant Techsystems for its prototype system SECURES,
which tests more advanced sound pickup networks in Washington and other cities. The hope is to distinguish not only types of gunfire but also human voices crying
for help.¶ So far, so good. But from there, engineers say it would be simple to upgrade the equipment, enabling bored monitors
to eavesdrop through open bedroom windows on cries of passion, or family arguments. "Of course we would never go that far," one official said, reassuringly.¶
Consider another piece of James Bond apparatus now available to anyone with ready cash. Today, almost
any electronics store will sell you
night vision goggles using state-of-the-art infrared optics equal to those issued by the military, for less than
the price of a video camera. AGEMA Systems, of Syracuse, New York, has sold several police departments imaging devices that can peer into houses from the street,
discriminate the heat given off by indoor marijuana cultivators, and sometimes tell if a person inside moves from one room to the next. Military and civilian
enhanced-vision technologies now move in lockstep, as they have in the computer field for years. ¶ In other words, even
darkness no longer
guarantees privacy.¶ Nor does your garden wall. In 1995, Admiral William A. Owens, then Vice-Chairman of the Joint Chiefs of Staff,
described a sensor system that he expected to be operational within a few years: a pilotless drone, equipped to provide airborne surveillance for soldiers
in the field. While camera robots in the $1 million range have been flying in the military for some time, the new system will be
extraordinarily cheap and simple. Instead of requiring a large support crew, it will be controlled by one semi-skilled soldier and will fit in the palm of a hand.
Minuscule and quiet, such remote-piloted vehicles, or RPVs, may flit among trees to survey threats near a rifle platoon. When mass-produced in huge quantities,
unit prices will fall.¶ Can
civilian models be far behind? No law or regulation will keep them from our cities for
contraptions will get smaller,
very long. The rich, the powerful, and figures of authority will have them, whether legally or surreptitiously. The
cheaper, and smarter with each passing year.¶ So much for the supposed privacy enjoyed by sunbathers in their own back yards. ¶ Moreover,
surveillance cameras are the tip of the proverbial iceberg. Other entrancing and invasive innovations of the vaunted information age abound. Will a paper envelope
protect the correspondence you send by old-fashioned surface mail when new-style scanners can trace the patterns of ink inside without ever breaking the seal? ¶
say you correspond with others by email and use a computerized encryption program to ensure that your messages
good will all the ciphers and codes do, if some adversary has bought a "back
door" password to your encoding program? Or if a wasp-sized camera-drone flits into your room, sticks to
Let's
are only read by the intended recipient. What
the ceiling above your desk, inflates a bubble lens and watches every key-stroke that you type? (A number of unnerving techno-possibilities will be discussed in
chapter 8.)¶ In late 1997 it was revealed that Swiss police had secretly tracked the whereabouts of mobile phone users via
a telephone company computer that records billions of movements per year. Swisscom was able to locate its mobile subscribers within a few hundred meters. This
aided several police investigations. But civil libertarians expressed heated concern, especially since identical
technology is used worldwide.¶
The same issues arise when we contemplate the proliferation of vast databases containing information about our
lives, habits, tastes and personal histories. As we shall see in chapter 3, the cash register scanners in a million supermarkets, video stores, and pharmacies
already pour forth a flood of statistical data about customers and their purchases, ready to be correlated. (Are you stocking up on
hemorrhoid cream? Renting a daytime motel room? The database knows.) Corporations claim this information helps them serve us more efficiently. Critics respond
that it gives big companies an unfair advantage, enabling them to know vastly more about us than we do about them. Soon,
computers will hold
all your financial and educational records, legal documents, and medical analyses that parse you all the way down
to your genes. Any of this might be examined by strangers without your knowledge, or even against your stated
will.
Transparency Impacts: Key to Economy
Reciprocal transparency is key to economic growth and prosperity
Field, Chris., Western Australian Ombudsman, June 10, 2013, Promoting Accountable and Transparent
Decision Making in the Public Sector,
http://www.ombudsman.wa.gov.au/Publications/Documents/speeches/030610-Speech-by-Chris-Fieldto-Legal-Wise-Conference-2010.pdf
In short, there are very many reasons why accountability and transparency in ¶ government is
important and very many good reasons to be thankful that we largely take ¶ that importance as a
universal truth. For today’s purposes I simply want to focus on one ¶ reason why accountable and
transparent government is important. Accountable and ¶ transparent government is, in my view, an
integral step on the path to creating the most ¶ prosperous, productive economies - economies that
allow individuals, businesses and ¶ governments to create the highest possible standard of living for
the highest possible ¶ number of people. ¶ In its recent 2009 Prosperity Index, the Legatum Institute
assessed 104 countries, ¶ representing approximately 90% of the world’s population, in terms of a
series of measures, such as whether a country possesses “an honest and effective government ¶ that
preserves order and encourages productive citizenship” or whether it features ¶ “transparent and
accountable governing institutions that promote economic growth”.
Now is the Key Time for Transparency
The rise of Technological Surveillance Era is among us, and the result will determine
our future.
Brooke, Heather (Campaigning Journalist and Writer for The Guardian) Nov 2010 WikiLeaks: the
revolution has begun – and it will be digitized.
http://www.guardian.co.uk/commentisfree/2010/nov/29/the-revolution-will-be-digitised Date
Accessed: 7/17/13
But data has a habit of spreading. It slips past military security and it can also leak from WikiLeaks, which is how I
came to obtain the data. It even slipped past the embargoes of the Guardian and other media organizations involved in this story when a rogue
copy of Der Spiegel accidentally went on sale in Basle, Switzerland, on Sunday. Someone bought it, realised what they had, and began scanning
the pages, translating them from German to English and posting updates on Twitter. It would seem digital data respects no authority,
be it the Pentagon, WikiLeaks or a newspaper editor.¶ Individually, we have all already experienced the massive
changes resulting from digitisation. Events or information that we once considered ephemeral and private are
now aggregated, permanent, public. If these cables seem large, think about the 500 million users of Facebook or
the millions of records kept by Google. Governments hold our personal data in huge databases. It used to cost
money to disclose and distribute information. In the digital age it costs money not to.¶ But when data breaches
happen to the public, politicians don't care much. Our privacy is expendable. It is no surprise that the reaction to
these leaks is different. What has changed the dynamic of power in a revolutionary way isn't just the scale of the
databases being kept, but that individuals can upload a copy and present it to the world . In paper form, these cables
equate, on the Guardian's estimate, to some 213,969 pages of A4 paper, which would stack about 25m high – not something that one could
have easily slipped past security in the paper age.¶ To some this marks a crisis, to others an opportunity. Technology is
breaking down traditional social barriers of status, class, power, wealth and geography – replacing them with an
ethos of collaboration and transparency.¶ The former US ambassador to Russia James Collins told CNN the
disclosure of the cables, "will impede doing things in a normal, civilised way". Too often what is normal and
civilised in diplomacy means turning a blind eye to large-scale social injustices, corruption and abuse of power.
Having read through several hundred cables, much of the "harm" is embarrassment and the highlighting of
inconvenient truths. For the sake of a military base in a country, our leaders accept a brutal dictator who
oppresses his population. This may be convenient in the short term for politicians, but the long-term
consequences for the world's citizens can be catastrophic.¶ Leaks are not the problem; they are the symptom.
They reveal a disconnect between what people want and need to know and what they actually do know. The
greater the secrecy, the more likely a leak. The way to move beyond leaks is to ensure a robust regime for the
public to access important information.¶ Thanks to the internet, we have come to expect a greater level of
knowledge and participation in most areas of our lives. Politics, however, has remained resolutely
unreconstructed. Politicians, see themselves as parents to a public they view as children – a public that cannot
be trusted with the truth, nor with the real power that knowledge brings .¶ Much of the outrage about WikiLeaks is not
over the content of the leaks but from the audacity of breaching previously inviolable strongholds of authority. In the past, we deferred
to authority and if an official told us something would damage national security we took that as true. Now the
raw data behind these claims is increasingly getting into the public domain. What we have seen from disclosures
like MPs' expenses or revelations about the complicity of government in torture is that when politicians speak of
a threat to "national security", often what they mean is that the security of their own position is threatened.¶
We are at a pivotal moment where the visionaries at the vanguard of a global digital age are clashing with those
who are desperate to control what we know. WikiLeaks is the guerrilla front in a global movement for greater
transparency and participation. There are projects like Ushahidi that use social networking to create maps
where locals can report incidents of violence that challenge the official version of events. There are activists
seeking to free official data so that citizens can see, for example, government spending in detail .¶ Ironically, the US
state department has been one of the biggest cheerleaders for technical innovation as a means of bringing democracy to places like Iran and
China. President Obama has urged repressive regimes to stop censoring the internet, yet a bill before Congress would allow the attorney
general to create a blacklist of websites. Is robust democracy only good when it's not at home?¶ It used to be that a leader controlled
citizens by controlling information. Now it's harder than ever for the powerful to control what people read, see
and hear. Technology gives people the ability to band together and challenge authority. The powerful have long
spied on citizens (surveillance) as a means of control, now citizens are turning their collected eyes back upon the
powerful (sousveillance).¶ This is a revolution, and all revolutions create fear and uncertainty. Will we move to a
New Information Enlightenment or will the backlash from those who seek to maintain control no matter the
cost lead us to a new totalitarianism? What happens in the next five years will define the future of democracy
for the next century, so it would be well if our leaders responded to the current challenge with an eye on the
future.
Link: Pretending Privacy Exists Masks Surveillance (1/2)
We can never go back to an age with complete privacy, governments that claim to do
so are simply making surveillance more hidden. The only option is to encourage
accountability through complete transparency.
Brin, David. Doctor of Philosophy in space science, 2010 fellow at the Institute of Ethics. 1998. The
Transparent Society. “Chapter One: The Challenge of an Open Society.”
http://www.davidbrin.com/transparentsociety1.html
The issue of threatened privacy has spawned a flood of books, articles and media exposés — from Janna Malamud
Smith's thoughtful Private Matters, and Ellen Alderman and Caroline Kennedy's erudite Right to Privacy all the way to shrill, paranoiac
rants by conspiracy fetishists who see Big Brother lurking around every corner. Spanning this spectrum, however,
there appears to be one common theme. Often the author has responded with a call to arms, proclaiming that
we must become more vigilant to protect traditional privacy against intrusions by faceless (take your pick) government
bureaucrats, corporations, criminals, or just plain busybodies.¶ That is the usual conclusion — but not the one taken here.¶ For in fact, it is
already far too late to prevent the invasion of cameras and databases. The djinn cannot be crammed
back into its bottle. No matter how many laws are passed, it will prove quite impossible to legislate
away the new surveillance tools and databases. They are here to stay.¶ Light is going to shine into nearly
every corner of our lives.¶ The real issue facing citizens of a new century will be how mature adults choose to live
— how they might compete, cooperate and thrive — in such a world. A transparent society.¶ Regarding those cameras for instance —
the ones topping every lamppost in both city one and city two — we can see that very different styles of urban life resulted from just one
decision, based on how people in each town answered the following question.¶ Will average citizens share, along with the mighty, the right to
access these universal monitors? Will common folk have, and exercise, a sovereign power to watch the watchers?¶ Back in
city number
one, Joe and Jane Doe may walk through an average day never thinking about those microcameras overhead.
They might even believe official statements claiming that all the spy eyes were banished and dismantled a year
or two ago, when in fact they were only made smaller, harder to detect. Jane and Joe stroll secure that
their neighbors cannot spy on them (except the old-fashioned way, from overlooking windows). In other words, Jane and Joe
blissfully believe they have privacy.¶ The inhabitants of city number two know better. They realize that, out of
doors at least, privacy has always been an illusion. They know anyone can tune in to that camera on the
lamppost — and they don't much care. They perceive what really matters: that they live in a town
where the police are efficient, respectful, and above all accountable. Homes are sacrosanct, but out on the street
any citizen, from the richest to the poorest, can walk both safely and use the godlike power to zoom at will from vantage point to vantage
point, viewing all the lively wonders of the vast but easily spanned village their metropolis has become, as if by some magic it had turned into a
city not of people but of birds.¶ Sometimes, citizens of city number two find it tempting to wax nostalgic about the old days, before there were
so many cameras, or before television invaded the home, or before the telephone and automobile. But for the most part, city number two's
denizens know those times are gone, never to return. Above all, one
thing makes life bearable: the surety that each
person knows what is going on, with a say in what will happen next. And has rights equal to those of any
billionaire or chief of police
Link: Pretending Privacy Exists Masks Surveillance (2/2)
People have been calling for individuals to retain absolute privacy online, but these
merely cover up the inevitability of surveillance.
Brin, David. Doctor of Philosophy in space science, 2010 fellow at the Institute of Ethics. 1998. The
Transparent Society. “Chapter One: The Challenge of an Open Society.”
http://www.davidbrin.com/transparentsociety1.html
Recent years have witnessed widespread calls to "empower" citizens and corporations with tools of
encryption — the creation of ciphers and secret codes — so that the Internet and telephone lines may soon fill with a
blinding fog of static and concealed messages, a haze of habitual masks and routine anonymity. Some of society's best
and brightest minds have begun extolling a coming "golden age of privacy," when no one need ever
again fear snooping by bureaucrats, federal agents, or in-laws. The prominent iconoclast John Gilmore, who "favors law 'n' chaos over
law 'n' order," recently proclaimed that computers are literally extensions of our minds, and that their contents should remain as private as our
inner thoughts. Another activist, John Perry Barlow, published a widely discussed "A Declaration of Independence of Cyberspace" proclaiming
that the mundane jurisdictions of nations and their archaic laws are essentially powerless and irrelevant to the Internet and its denizens (or
"netizens"). Among the loose clan of self-proclaimed "cypherpunks," a
central goal is that citizens should be armed with
broad new powers to conceal their words, actions, and identities. The alternative, they claim, will be
for all our freedoms to succumb to a looming tyranny.¶ In opposing this modern passion for personal and corporate
secrecy, I should first emphasize that I like privacy! Outspoken eccentrics need it, probably as much or more than those who are reserved. I
would find it hard to get used to living in either of the cities described in the example at the beginning of this chapter. But a few voices out
there have begun pointing out the obvious. Those
cameras on every street corner are coming, as surely as the new
"privacy laws" really prevent hidden eyes from getting tinier,
more mobile and clever? In software form they will cruise the data highways. "Antibug" technologies will arise, but the
resulting surveillance arms race can hardly favor the "little guy." The rich, the powerful, police
agencies, and a technologically skilled elite will always have an advantage.
millennium.¶ Oh, we may agitate and legislate. But can
Alternative Solvency: Transparency Checks Government Oppression
(1/2)
Transparency solves-only by instilling the need for openness can we adequately be
aware of what’s going on to adequately criticize the government and make them
accountable
Brin, David. Doctor of Philosophy in space science, 2010 fellow at the Institute of Ethics. 1998. The
Transparent Society. “Chapter One: The Challenge of an Open Society.”
http://www.davidbrin.com/transparentsociety1.html
What distinguishes society today is not only the pace of events but also the nature of our tool kit for facing the future. Above all, what has
marked our civilization as different is its knack for applying two extremely hard-won lessons from the past.¶ In all of history, we
have
found just one cure for error — a partial antidote against making and repeating grand, foolish mistakes, a remedy
against self-deception. That antidote is criticism.¶ Scientists have known this for a long time. It is the keystone of their success.
A scientific theory gains respect only by surviving repeated attempts to demolish it. Only after platoons of
clever critics have striven to come up with refuting evidence, forcing changes, do a few hypotheses eventually graduate from mere theories to
accepted models of the world.¶ Another
example is capitalism. When it works, under just and impartial rules, the free market
rewards agility, hard work and innovation, just as it punishes the stock prices of companies that make too many mistakes. Likewise, any
believer in evolution knows that death is the ultimate form of criticism, a merciless driver,
transforming species over time.¶ Even in our private and professional lives, mature people realize that improvement
comes only when we open ourselves to learn from our mistakes, no matter how hard we have to grit our teeth, when
others tell us we were wrong. Which brings up a second observation.¶ Alas, criticism has always been what human beings,
especially leaders, most hate to hear.¶ This ironic contradiction, which I will later refer to as the "Paradox of the Peacock," has had
profound and tragic effects on human culture for centuries. Accounts left by past ages are filled with woeful events in
which societies and peoples suffered largely because openness and free speech were suppressed,
leaving the powerful at liberty to make devastating blunders without comment or consent from below.¶ If neo-Western
civilization* has one great trick in its repertoire, a technique more responsible than any other for its success, that trick is
accountability. Especially the knack — which no other culture ever mastered — of making accountability apply to the
mighty. True, we still don't manage it perfectly. Gaffes, bungles and inanities still get covered up. And yet, one can look
at any newspaper or television news program and see an eager press corps at work, supplemented by hordes of righteously indignant
individuals (and their lawyers), all baying for waste or corruption to be exposed, secrets to be unveiled, and nefarious schemes to be nipped in
the bud. Disclosure is a watchword of the age, and politicians have grudgingly responded by passing the Freedom of Information Act (FOIA),
truth-in-lending laws, open-meeting rules, then codes to enforce candor in real estate, in the nutritional content of foodstuffs, in the expense
accounts of lobbyists, and so on.¶ Although this process
of stripping off veils has been uneven, and continues to be a source
of contention, the underlying moral force can be clearly seen pervading our popular culture, in which nearly every
modern film or novel seems to preach the same message — suspicion of authority. The phenomenon is not new to our generation.
Schoolbooks teach that freedom is guarded by constitutional "checks and balances," but those same legal
provisions were copied, early in the nineteenth century, by nearly every new nation of Latin America, and not
one of them remained consistently free. In North America, constitutional balances worked only because
they were supplemented by a powerful mythic tradition, expounded in story, song, and now virtually every Hollywood
film, that any undue accumulation of power should be looked on with concern.¶ Above all, we are encouraged to distrust
government.¶ The late Karl Popper pointed out the importance of this mythology in the dark days during and after World War II, in The
Open Society and its Enemies. Only by insisting on accountability, he concluded, can we constantly remind public
servants that they are servants. It is also how we maintain some confidence that merchants aren't cheating us, or that factories
aren't poisoning the water. As inefficient and irascibly noisy as it seems at times, this habit of questioning authority ensures
freedom far more effectively than any of the older social systems that were based on reverence or
trust.¶ And yet, another paradox rears up every time one interest group tries to hold another accountable in today's society.¶ Whenever
a conflict appears between privacy and accountability, people demand the former for themselves and
the latter for everybody else.¶ The rule seems to hold in almost every realm of modern life, from special prosecutors investigating
the finances of political figures to worried parents demanding that lists of sex offenders be made public. From merchants anxious to see their
customers' credit reports to clients who resent such snooping. From people who "need" caller ID to screen their calls to those worried that their
lives might be threatened if they lose telephone anonymity. From activists demanding greater access to computerized government records in
order to hunt patterns of corruption or incompetence in office to other citizens who worry about release of personal information contained in
those very same records.
Alternative Solvency: Transparency Checks Government Oppression
(2/2)
Transparency is key to government accountability when it comes to digital privacy
Notley, Tanya. Journalist. 4 August 2011. Why digital privacy and security are important for
development. http://www.guardian.co.uk/global-development/poverty-matters/2011/aug/04/digitaltechnology-development-tool. Date Accessed 7/17/13.
If you believe an over-arching ambition of development should be to ensure the benefits of progress and plenty are shared fairly among
citizens, then you will likely agree
it's important to have a government willing to create policies that attempt
to remedy existing inequities. To do this in a democratic way, these policies, and the practices to
implement them, need to be transparent to ensure people can assess how government and
development money is being spent, where it is being distributed and if it achieves what was
intended.¶ Access to information technologies – such as mobile phones, the internet, social
networking sites and video – can play a critical role in helping people hold governments and
development agencies accountable. When used to collect, monitor and assess information about needs, spending, activities and
impacts, technologies support not only accountability but also – by allowing people to participate in their own governance – freedom of
expression and civic participation.
Impacts: Government Secrecy Hurts Government Effectiveness
Secrecy inhibits the government’s effectiveness
Casman, Betsey Sue. Master of Arts in Ethics and Policy Studies. 2011. "The Right to Privacy in Light of the
Patriot Act and Social Contract Theory".
http://digitalscholarship.unlv.edu/cgi/viewcontent.cgi?article=2087&context=thesesdissertations. Date Accessed 7/21/13.
Some literature is much more cautionary in what it infers regarding the Patriot ¶ Act. Where they see the need for the government
intervention, they are still wary in light ¶ of the implications of that much increased and discretionary government power. Seth ¶ Kreimer
examines the accumulation of data by governmental officials and bureaucrats (of ¶ all types governmental and non) in the course of daily
events (license dispensation, benefits, and government proceedings). Kreimer writes, “This
information gathered in ¶ one place
is available in many other arenas. Every employer accumulates information ¶ about her employees;
every granter of credit files data about her customers, every transfer ¶ of funds leaves an increasingly
accessible data trail, all of which is susceptible to ¶ government subpoena or request” (Kreimer, 1991).
Kreimer notes that this expansion of ¶ government translates into an increase of the effective power of
government, which ¶ means an increase in the ability to deploy governmental sanctions effectively. It
also ¶ provides for a less straightforward means of exerting governmental power; it has the ¶ power
through obtained information to publish offender names - a proven deterrent ¶ almost effective as
prosecution. (Kreimer, 1991). Kreimer notes that information is ¶ currency; the prerequisite for political self-determination and a security
against ¶ usurpation by secret cabals. Secrecy interferes with rational decision-making, ¶ accountability, and the
choice of national goals (Kreimer, 1991). Please note that ¶ Kreimer wrote this article in 1991 a full decade before the events that
transpired and the ¶ everlasting impact of September 11, 2001. There was obviously at least some support for ¶ this expansion of the
Government’s gathering and disseminating information (antiprivacy, if you will) before the events of 9/11. The examination of the
Government’s ¶ balancing of act of protecting both privacy rights and right to release information is ¶ studied and reported through the
Government’s use of constitutional law.
A2: Leaks Bad – They’re Impossible to Stop
The United States government does not store data securely enough; Snowden proves
Pogatchnik, Shawn. 2013 (Reporter for the Associated Press. “AP Interview: Ex-FBI Chief on Risk of
Cyber Terror”. 7 July. Accessed 16 July 13. http://bigstory.ap.org/article/ap-interview-ex-fbi-chief-riskcyber-terror)
He said the NSA gave Snowden system-wide access with "the ability to extract and copy top-secret
documents detailing secured and elaborate programs." He noted that a recent PricewaterhouseCoopers
survey found that employee insiders committed around a third of all breaches of sensitive data.
And that, he [Freeh] said, was the biggest issue for government agencies and corporations: What
should be accessible on its own internal intranet connections, and who should be cleared to see it?
As things stand now, he said, "too many people have too much access" to sensitive documents in
companies and government agencies. He suggested that a group's most confidential information might
have to be left without an electronic fingerprint at all and be kept, old school, like the Coca-Cola
company's recipe for its soft drinks once was under lock and key in a safe.
A2: Schneier/”Transparency Destroys Privacy”
Transparency upholds privacy, by checking the surveillance power of the elites and
while creating a mutual respect for the privacy of others
David Brin is a physicist and author of best-selling novels, 08 (“David Brin Rebuts Schnier in Defense of
a Transparent Society,” Wired.com, 03.12.08,
http://www.wired.com/politics/security/news/2008/03/brin_rebuttal)
How did we get the freedom we already have, becoming the first civilization in history to (somewhat) defy ancient patterns?
Yes, it's imperfect, always under threat. We swim against hard currents of human nature. But reciprocal accountability is
the innovation that lets us even try.¶ Schneier claims that The Transparent Society doesn't address
"the inherent value of privacy." But several chapters do, and I conclude that privacy is an inherent human
need, too important to leave in the hands of state elites, who are themselves following ornate
information-control rules written by other elites -- rules, by the way, that never work. (Robert Heinlein said
"'privacy laws' only make the bugs smaller.")¶ Attacking a caricature of my position, Schneier suggests that
transparency would end privacy, making everyone walk around naked. It does take some mental
flexibility to realize how a generally open society will be privacy friendly. But it was a generally open
society that invented modern privacy.¶ Look around. Today, the person who most capably defends
your privacy is ... you. But you can't catch Peeping Toms and busybodies if everyone is shrouded in
clouds of secrecy.¶ Try the "restaurant analogy." People who are nosey, leaning toward other diners in order to snoop, are
caught by those other diners. Moreover, our culture deems such intrusion to be a worse sin than anything that may be
overheard.¶ Now try setting up a restaurant where customer tables are separated by paper shoji screens. ¶ This provides the
surface illusion of greater privacy, but peepers can press their ears against the screen and peer through little slits with
impunity.¶ Which approach better protects privacy? Which have people overwhelmingly chosen?¶ Continuing, Schneier
poses a thought experiment: "Think of your existing power as the exponent in an equation that
determines the value of information. The more power you have, the more additional power you
derive from the new data."¶ But this is precisely the age-old problem that Enlightenment civilization
was invented to solve! Just take Schneier's formulation and replace the words "information" and "new data"
with "secrets." Now, it can be argued that both versions are true. But which version gives you a worse
case of the creeps? If civilization becomes a cloud of secrecy (as some are now trying to achieve),
that's when elites can really exploit disparities of power.¶ How have we fought this? One early Enlightenment trick was
to divide the elites. Sic 'em on each other! Unions versus management, tort lawyers versus megacorporations, regulators versus moguls and
activist nongovernmental organizations against any power center you can name. Non-governmental organizations (NGOs), the boomer
innovation, let citizens clump en masse, pooling influence to increase their common "Schneier exponent" and use information advantageously.
It's an Enlightenment method of great power and flexibility. Each person can find and join an NGO suited to any passion or interest.¶ But the
next step in people empowerment is even more impressive -- those burgeoning "smart mobs" Howard
Rheingold and Vernor Vinge talk about, recently joined by Clay Shirky in Here Comes Everybody. It's agile. It's wired. Every
generation innovates, or the enlightenment dies.¶ Oh, I can hear cynical snorts. Yes, it's flawed! Elites keep rediscovering tricks
of secret collusion. Still, if it's hopeless, how come we're having this conversation?¶ Almost monthly, we hear of some angry
cop arresting a citizen on trumped "privacy violations," for using a cellphone camera or MP3 recorder to capture an interaction
with authority. And each month, judges toss the arrests, forcing police to apologize. Every time. So much for those power
exponents.¶ Schneier even cites this trend, swerving his essay at the end, from doubt into a paean for "sousveillance" or
citizens shining light upward upon the mighty.¶ Or ... a transparent society.¶ How to explain this veer? I suppose that he meant
light should shine in one direction, from masses onto elites, not the other way. Sounds nice. But who defines which other
person is a dangerous elite? Won't the definitions be controlled by, well, elites, who then exploit every exception?¶ And can
you show me once, in history, when elites let themselves be blinded?¶ This flaw erupts in most anti-transparency arguments.
"Light should shine on power groups I worry about, but not at me or mine." Yes, that's human. I'm human too.¶ But look
around the restaurant some time (discreetly) and see your fellow citizens in action -- mostly minding their own business,
enjoying privacy while seldom having to enforce it, needing no screens or vigilant authorities to protect them, or to make them
behave. Privacy is good! And, guess what? It happens when we empower people to see. ¶ Sure, it ain't
perfect. We'll still need protectors. There are countless quibbles. We've a long way to go. ¶ Still, please,
consider how we got what we already have.
Neg
Constitutionality
Digital Surveillance Violates 4th Amendment
Taking away U.S. citizens’ digital privacy in pursuit of national security violates the 4 th
amendment.
Donohue Laura K. Donohue, 2013 [Professor of Law at Georgetown Law and the Director of
Georgetown’s Center on National Security and the Law] “NSA Surveillance may be legal – but it’s
unconstitutional,” The Washington Post, June 21st, 2013. SM
writes:
The National Security Agency’s recently revealed surveillance programs undermine the purpose of the Foreign
Intelligence Surveillance Act, which was established to prevent this kind of overreach. They violate the Fourth
Amendment’s guarantee against unreasonable search and seizure. And they underscore the dangers of growing
executive power. The intelligence community has a history of overreaching in the name of national security. In the mid-1970s, it came to
light that, since the 1940s, the NSA had been collecting international telegraphic traffic from companies, in the process obtaining millions of
Americans’ telegrams that were unrelated to foreign targets. From 1940 to 1973, the CIA and the FBI engaged in covert mail-opening programs
that violated laws prohibiting the interception or opening of mail. The agencies also conducted warrantless “surreptitious entries,” breaking
into targets’ offices and homes to photocopy or steal business records and personal documents. The Army Security Agency intercepted
domestic radio communications. And the Army’s CONUS program placed more than 100,000 people under surveillance, including lawmakers
and civil rights leaders. After an extensive investigation of the agencies’ actions, Congress passed the 1978 Foreign Intelligence Surveillance Act
(FISA) to limit sweeping collection of intelligence and create rigorous oversight. But 35 years later, the NSA is using this law and its subsequent
amendments as legal grounds to run even more invasive programs than those that gave rise to the statute. We’ve learned that in April, the
Foreign Intelligence Surveillance Court (FISC) ordered Verizon to provide information on calls made by each subscriber over a three-month
period. Over the past seven years, similar orders have been served continuously on AT&T, Sprint and other telecommunications providers.
Another program, PRISM, disclosed by the Guardian and The Washington Post, allows the NSA and the FBI to obtain online data including emails, photographs, documents and connection logs. The information that can be assembled about any one person — much less organizations,
social networks and entire communities — is staggering: What we do, think and believe. The government defends the programs’ legality, saying
they comply with FISA and its amendments. It [would] may be right, but only because FISA has ceased to [be] provide a meaningful constraint.
Under the traditional FISA, if the government wants to conduct electronic surveillance, it must make a classified application to a special court,
identitying or describing the target. It must demonstrate probable cause that the target is a foreign power or an agent thereof, and that the
facilities to be monitored will be used by the target. In 2008, Congress added section 702 to the statute, allowing the government to use
electronic surveillance to collect foreign intelligence on non-U.S. persons it reasonably believes are abroad, without a court order for each
target. A U.S. citizen may not intentionally be targeted. To the extent that the FISC sanctioned PRISM, it may be consistent with the law. But it
is disingenuous to suggest that millions of Americans’ e-mails, photographs and documents are “incidental” to
an investigation targeting foreigners overseas. The telephony metadata program raises similar concerns. FISA
did not originally envision the government accessing records. Following the 1995 Oklahoma City bombing,
Congress allowed applications for obtaining records from certain kinds of businesses. In 2001, lawmakers further
expanded FISA to give the government access to any business or personal records. Under section 215 of the
Patriot Act, the government no longer has to prove that the target is a foreign power. It need only state that the
records are sought as part of an investigation to protect against terrorism or clandestine intelligence. This means
that FISA can now be used to gather records concerning individuals who are neither the target of any
investigation nor an agent of a foreign power. Entire databases — such as telephony metadata — can be
obtained, as long as an authorized investigation exists. Congress didn’t pass Section 215 to allow for the
wholesale collection of information. As Rep. F. James Sensenbrenner Jr. (R-Wis.), who helped draft the
statute, wrote in the Guardian: “Congress intended to allow the intelligence communities to access
targeted information for specific investigations. How can every call that every American makes or
receives be relevant to a specific investigation?” As a constitutional matter, the Supreme Court has
long held that, where an individual has a reasonable expectation of privacy, search and seizure may
occur only once the government has obtained a warrant, supported by probable cause and issued by a
judge. The warrant must specify the places to be searched and items to be seized. There are exceptions to the warrant requirement. In 1979
the court held that the use of a pen register to record numbers dialed from someone’s home was not a search. The court suggested that people
who disclose their communications to others assume the risk that law enforcement may obtain the information. More than three decades later,
digitization and the explosion of social-network technology have changed the calculus. In the ordinary course of life, third parties obtain
massive amounts of information about us that, when analyzed, have much deeper implications for our privacy than before. As for Section 702
of FISA,
the Supreme Court has held that the Fourth Amendment does not protect foreigners from
searches conducted abroad. But it has never recognized a foreign intelligence exception to the warrant
requirement when foreign-targeted searches result in the collection of vast stores of citizens’ communications.
Americans reasonably expect that their movements, communications and decisions will not be recorded and
analyzed by the government. A majority of the Supreme Court seems to agree . Last year, the court considered a case
involving 28-day GPS surveillance. Justice Samuel Alito suggested that in most criminal investigations, long-term monitoring “impinges on
expectations of privacy.” Justice Sonia Sotomayor recognized that following a person’s movements “reflects a wealth of detail about her
familial, political, professional, religious, and sexual associations.” [The FISC is supposed to operate as a check. But it is a secret court, notorious
for its low rate of denial. From 1979 to 2002, it did not reject a single application]. Over the past five years, out of nearly 8,600 applications, only
two have been denied. Congress has an opportunity to create more effective checks on executive power. It could withdraw Sections 215 and
702 and introduce new measures to regulate intelligence collection and analysis. There are many options. James Madison put it best: “In
framing a government which is to be administered by men over men, the great difficulty lies in this: you must first enable the government to
control the governed; and in the next place oblige it to control itself.”
Privacy
Privacy is a Human Right
Privacy is a human right – International community agrees
David Banisar of the Electronic Privacy Information Center, 2000. “Privacy And Human
Rights”. http://gilc.org/privacy/survey/intro.html. Date Accessed: 7/22/13
Privacy is a fundamental human right recognized in the UN Declaration of Human Rights, the
International Convenant on Civil and Political Rights and in many other international and regional
treaties. Privacy underpins human dignity and other key values such as freedom of association and
freedom of speech. It has become one of the most important human rights issues of the modern age.
The publication of this report reflects the growing importance, diversity and complexity of this
fundamental right.¶ This report provides details of the state of privacy in fifty countries from around the
world. It outlines the constitutional and legal conditions of privacy protection, and summarizes
important issues and events relating to privacy and surveillance.¶ Nearly every country in the world
recognizes a right of privacy explicitly in their Constitution. At a minimum, these provisions include
rights of inviolability of the home and secrecy of communications. Most recently-written Constitutions
such as South Africa's and Hungary's include specific rights to access and control one's personal
information.¶
Privacy is a Natural Right
Privacy is a natural right which is grounded in the rights of freedom and autonomy.
J. J. BRITZ, prof at University of Pretoria, 1996 (“THE CONCEPT OF PRIVACY”,
http://web.simmons.edu/~chen/nit/NIT'96/96-025-Britz.html)
Privacy can be defined as an individual condition of life characterized by exclusion from publicity
(Neetling et al., 1996, p. 36). The concept follows from the right to be left alone (Stair, 1992, p. 635;
Shank, 1986, p. 12)1 . Shank (1986, p. 13) states that such a perception of privacy set the course for
passing of privacy laws in the United States for the ninety years that followed. As such privacy could
be regarded as a natural right which provides the foundation for the legal right. The right to privacy is
therefore protected under private law.¶ The legal right to privacy is constitutionally protected in most
democratic societies. This constitutional right is expressed in a variety of legislative forms. Examples
include the Privacy Act (1974) in the USA, the proposed Open Democracy Act in South Africa (1996) and
the Data Protection Act in England. During 1994 Australia also accepted a Privacy Charter containing 18
privacy principles which describe the right of a citizen concerning personal privacy as effected by
handling of information by the state (Collier, 1994, p. 44-45). The Organization for Economic and
Coordination and Development (OECD) also accepted in 1980 the Guidelines for the Protection of
Privacy and Transborder Flow of Personal Data (Collier, 1994, p. 41).¶ Privacy is an important right
because it is a necessary condition for other rights such as freedom and personal autonomy. There is
thus a relationship between privacy, freedom and human dignity. Respecting a person's privacy is to
acknowledge such a person's right to freedom and to recognize that individual as an autonomous
human being.
Right to Privacy Exists – Constitution Proves (1/2)
The constitution has the right to privacy engrained inside of it.
Ralph F. Gaebler, professor of law at Indiana state university, “Is There a Natural Law Right to Privacy?”
DoP: 1992, THE AMERICAN JOURNAL OF JURISPRUDENCE,
http://www.repository.law.indiana.edu/cgi/viewcontent.cgi?article=1659&context=facpub
Walter Murphy has recently argued that "the nature of the American¶ Constitution requires recognition of a thick
and powerful right to be¶ let alone."' What is more, he believes this right is so deeply embedded¶ in the
Constitution that society cannot remove it, even through¶ formally permissible means, such as
amendment, without abrogating¶ the Constitution altogether.¶ In general, there is nothing particularly
surprising about the claim¶ that the Constitution includes a right of privacy. And in Murphy's¶ case, in particular,
the claim rests upon thirty years of scholarship.¶ Viewed as a whole, this body of work looms as one of the more¶
passionate, and at the same time formidably coherent contributions¶ to the literature of judicial
politics. 2 As developed in his many articles¶ and books, Murphy's claim for the existence of a right of privacy¶
emerges from his conviction that, since all Constitutional decision makers must adopt a judicial
philosophy with substantive¶ consequences, academic critics, in judging the judges, must in fairness
do the same.' His is essentially a pragmatic claim, justified on the¶ ground that it constitutes the best constitutional policy in a world of¶
judicial politics where many legitimate and contradictory claims are¶ possible
The constitution implies the right to privacy through the as citizens bring in the natural
right for a zone of autonomy
Ralph F. Gaebler, professor of law at Indiana state university, “Is There a Natural Law Right to Privacy?”
DoP: 1992, THE AMERICAN JOURNAL OF JURISPRUDENCE,
http://www.repository.law.indiana.edu/cgi/viewcontent.cgi?article=1659&context=facpub
Murphy makes two distinct arguments to support his conclusion¶ that the Constitution must be interpreted to include a
broad right of¶ privacy. He describes the first argument as based on "constitutional¶ content." It begins
with the assertion that the American Constitution¶ rests upon, or possibly even includes, two political theories, which¶
he calls "constitutionalism" and "representational democracy."¶ Constitutionalism denotes the view
that the Constitution primarily¶ embodies personal liberties. Representational democracy denotes
the¶ view that the Constitution primarily embodies a structure of¶ government based on popular
sovereignty. Although poised in¶ opposition to each other, both of these sub-texts are necessary to¶ make sense of the Constitution, or as
Murphy puts it, to render the¶ document more than "the political version of a seed catalogue." In¶ other words, the Constitution is a
balancing act; it employs the device of checks and counter-checks not only in its provisions for the¶
structure of government, but even in its philosophical outlook. However, constitutionalism is clearly the
more important philosophy¶ of the two, at least for the purpose of establishing the right of¶ privacy.' 2 "The essence
of constitutionalism," according to Murphy,¶ "is that citizens bring rights with them into societ y." These rights¶
comprise a "zone of autonomy," within which "each individual¶ should be immune from
governmental regulation, even regulation¶ that an overwhelming majority of society considers wise
and just."¶ Thus, the right to privacy is implied by the political theory of¶ constitutionalism, which in turn is
part of the Constitution. Murphy¶ also argues that the right of privacy is implied by the theory of¶ representational democracy, a claim that I
will take up later.
Right to Privacy Exists – Constitution Proves (2/2)
The constitution provides a right to privacy by the use of wording such as free and
autonomous
Ralph F. Gaebler, professor of law at Indiana state university, “Is There a Natural Law Right to Privacy?”
DoP: 1992, THE AMERICAN JOURNAL OF JURISPRUDENCE,
http://www.repository.law.indiana.edu/cgi/viewcontent.cgi?article=1659&context=facpub
Murphy's second argument, which he describes as based on¶ "constitutional function," is equally direct. It begins with his¶ commitment to the
ideas that the
Constitution is a "binding statement¶ of a people's aspirations for themselves and their nation." In
Constitution is not merely a charter for government, but¶ serves as the foundation of a
moral community as well. From this¶ premise Murphy argues that the Constitution must include a right of¶
privacy because "the notion of a people as free and autonomous as¶ they can be in an
interdependent world is and has been among the¶ values, goals, and aspirations of U.S. society."¶
other¶ words, the
.Murphy finds evidence of the Constitution's "aspirational" character¶ in its Preamble and in the Declaration of Independence, which he¶ also
regards as a foundational document. Thus, Murphy really regards¶ the U.S. as bound by a constitution, that includes the
Constitution¶ of 1787, as amended, the Declaration of Independence, the two¶ political philosophies already mentioned, and possibly other¶
foundational documents or ideas as well.' 3 This is not to say that we can understand Murphy's argument simply by reading, phrase by¶ phrase,
his admittedly expanded constitution. In a sense, this argument¶ denies that the Constitution can be read at all; rather, it is a¶ continuing
compact, some of whose evidence is composed of written¶ documents.
Right to Privacy Exists – Private Property and Artistic Creation Prove
Rejection of privacy is a violation of human dignity as it publishes information absent
the consent of the victim.
Edward j. Bloustein, prof of law at nyu law; 1964 (“Privacy”, December 1964, pg 971,
http://courses.ischool.berkeley.edu/i205/s10/readings/week11/bloustein-privacy.pdf
The most significant indication of the interest they sought¶ to protect, however, is in their statement
that "the principle¶ which protects personal writings and all other personal productions ...against
publication in any form is in reality not the¶ principle of private property, but that of inviolate
pcrsonality."I¶ I take the principle of "inviolate personality" to posit the individual's independence,
dignity and integrity; it defines man's¶ essence as a unique and self-determining being. It is because
our¶ Western ethico-religious tradition posits such dignity and independence of will in the individual
that the common law secures¶ to a man 'literary and artistic property"-the right to determine¶ "to
what extent his thoughts, sentiments, emotions shall be communicated to others." 4 The literary and
artistic property¶ cases led Warren and Brandeis to the concept of privacy because, for them, it would
have been inconsistent with a belief¶ in man's individual dignity and worth to refuse him the right to¶
determine whether his artistic and literary efforts should be¶ published to the world. He would be
less of a man, less of a¶ master over his own destiny, were he without this right.¶ Thus, I believe that
what provoked Warren and Brandeis¶ to write their article was a fear that a rampant press feeding on¶
the stuff of private life would destroy individual dignity and integrity and emasculate individual freedom
and independence. If¶ this is so, Dean Prosser's analysis of privacy stands clearly at¶ odds with "the
most influential law review article ever published,"¶ one which gave rise to a "new tort,"5 not merely to
a fancy name¶ for "old torts."
Privacy is a Social Good
We ought to protect Privacy as a social good rather than an individual right.
DANIEL J. SOLOVE, 2002, Assistant Professor, Seton Hall Law School, DIGITAL DOSSIERS AND THE DISSIPATION OF FOURTH
AMENDMENT PRIVACY, http://www-bcf.usc.edu/~usclrev/pdf/075502.pdf
Protecting privacy through an architecture of power differs from protecting it as an individual right.
Privacy is often viewed as an individual right.185 It is seen as an individual possession, and its value is defined in
terms of its worth to the individual. This view is severely flawed. John Dewey astutely critiqued the “conception of
the individual as something given, complete in itself, and of liberty as a ready-made possession of the individual, only needing the removal of
external restrictions in order to manifest itself.”186 According to Dewey, the
individual is inextricably connected to
society,187 and rights are not immutable possessions of individuals, but are instrumental in light of
“the contribution they make to the welfare of the community.”188 The problem with viewing rights in
purely individualistic terms is that it pits individual rights against the greater good of the community,
with the interests of society often winning out because of their paramount importance when measured against
one individual’s freedom In contrast, an architecture of power protects privacy differently and is based on
a different conception of privacy. Privacy is not merely a right possessed by individuals, but is a form of freedom
built into the social structure. It is thus an issue about the common good as much as it is about individual rights. It is an issue
about social architecture, about the relationships that form the structure of our society.
Privacy Outweighs National Security
We should promote supporting privacy over the national security interests, or a hybrid
of both. We must err on the side of privacy because governments are likely to abuse
their power.
Lisa Nelson, 2004, University of Pittsburg, Privacy and Technology: Reconsidering a Crucial Public Policy Debate in the Post-September
11 Era, Public Administration Review,
The origin of liberty in democratic theory is best de- scribed by John Stuart Mill as "the civil or social
liberty which exists within the nature and limits of the power which can be legitimately exercised by
society over the individual" (Mill 1956, 2). As Mill explains, the balance between lib- erty and authority is struck
by guaranteeing certain immu- nities that cannot be violated by those holding political authority. If
violated, those in positions of authority have breached their duty as leaders. As a secondary check on political
authority, constitutional checks that are established by the consent of the community are a necessary condition of the acts of governing power
(Mill 1956, 4). In
practice, this means the exercise of political authority is mediated by the immunities of
the citizenry and the consent of the governed. The liberty interest in privacy is construed similarly. To paraphrase Justice
Robert H. Jackson in his concurring opinion on the 1952 Youngstown Sheet and Tube Co. v. Sawyer (343 U.S. 579) decision, "the Fourth
Amendment protects more than privacy; it ensures that governmental invasions of individual privacy
are based upon rules estab- lished by the people, rules our rulers must follow in order to engage in
surveillance." Jackson's description of pri- vacy mirrors that of Mill. The conditions of our liberty interest in privacy are
created by the immunities of the citizenry and the consent of the governed. Each serves as a limit on political
authority. Yet, the analysis is not quite so simple. The equilibrium of this balance between political authority and the liberty
interests of individuals is changed in the face of harm. As Mill explains, government should be established on the
harm principle: "That the sole end for which mankind is warranted, individually or collec- tively, in interfering with the liberty of action of
any of their number, is self-protection. That the only purpose for which power can be rightfully exercised over
any member of a civilized community, against his will, is to prevent harm to others" (Mill 1956, 4). The
authority to interfere with a member of a civilized community in defense of liberty occurs when there is a need to prevent harm. In fact, as Mill
argues, "it is
one of the undisputed functions of government to take precau- tions against crime before it
has been committed, as well as to detect and punish it afterwards" (Mill 1956, 116). Liberty, augmented in
our constitutional framework by the principles of privacy, is mediated by the exercise of political
authority to protect against harm. What is left unanswered is the type and form of political authority that is ideal for preserving
our liberty interests in privacy. In theory, the answer seems quite simple: The exercise of political authority is
justified when the political will nec- essary for the prevention of harm is warranted. Yet, as a practical matter,
the perception of harm-and the justifi- cation of political authority necessary to combat it-is often problematic. As Mill warns, "the
preventative func- tion of government, however, is far more liable to be abused, at the prejudice of
liberty, than the punitive func- tion" (Mill 1956, 116). This concern is particularly acute in the post-September 11 environment
because it is not only the assertion of political authority, but also the architecture of it that potentially threatens our liberty interest in privacy.
Far-reach- ing regulations that enable the gathering and sharing of information, the concentration of
power in the hands of the intelligence community, and the extensive power granted to the executive
branch in the name of the "war on terrorism" is seen as altering the structural balance between
political authority and social and civil liberties at the expense of democratic principles. The call for increased
political authority to protect privacy in the wake of the information age, however, faces similar criticisms. Here, it is argued that under the limits
of the Constitution, there is insufficient legal basis for the exercise of political author- ity to protect privacy. In
this sense, protective
legislation is seen as potentially overstepping the appropriate constitu- tional boundaries of political
authority and squelching free enterprise and innovation in the information age. Though it seems to be at the
other end of the spectrum, the question of whether the Constitution allows for the power of government to adopt and enforce laws to protect
private information from intrusion by the private sector is not unlike the question of whether the events of Septem- ber 11 justify increased
intelligence gathering and surveil- lance. Each is a question of enhanced political authority and its relationship to the liberty interests of privacy.
Yet, the answer is not so easily discerned from either constitu- tional doctrine or public sentiments.
Rather, the public policy debate must account for the interplay between each, because one is not
separate from the other. Interestingly, the war on terror coincides with the ac- celeration of the information age and, as a result,
affects the direction of policy debates regarding each. Perhaps the war on terror seems less intrusive and less
threatening to our privacy because our notions of privacy have been al- tered in an unprecedented
age of information. Surveillance is becoming commonplace, frequent, and innocuous. More- over, the
information age has altered the traditional physi- cal divide between the public and the private with the age of the Interet and other
technologies. Physical locale is no longer the definitional quality of privacy, and, as a re- sult, the traditional demarcation of privacy is no longer
apt in either legal doctrine or societal perceptions. Similarly, the events of September 11 and the subsequent prominence of surveillance and
information gathering may have caused us to be overly sensitized to information sharing in both the government and private sectors. The
events of September 11 and the rise of the informa- tion age challenge the previous balance between political authority and liberty, but it does
not follow that a new bal- ance cannot be struck. Yet,
it is necessary to move the de- bate beyond its current
dichotomy, which tends to view the rise of technology and the information age as intruding on
privacy. The dichotomy is not helpful because it is im- possible to eliminate the specter of terrorism and turn back the clock on the
information age. Instead, each is a new factor to be weighed in the quest for a balance between liberty and
the exercise of political authority. For this, let us return to Mill. As Mill advocates, the balance is
secured by the guar- antee of certain immunities that cannot be violated by those holding political
authority. As a secondary check on po- litical authority, constitutional checks that are established by
the consent of the community are a necessary condition for the acts of governing power. Thus, as a point of
depar- ture, the proper course of policy development to protect privacy while fostering the appropriate exercise of politi- cal authority requires
us to turn to the necessary immuni- ties, which cannot be trammeled, and to the constitutional checks that must remain intact
Privacy Impacts: Totalitarianism
Violations of privacy are the basis for governmental totalitarianism- the German
Democratic Republic proves.
Ron Watson, Department of Political Science, Washington University., “The Ethics of Domestic Government Spying” March 2013¶
http://rewatson.wustl.edu/The%20Ethics%20of%20Domestic%20Government%20Spying.pdf
Although states can hardly do without spies if they wish to remain secure, there is, of¶ course, a darker, more sinister picture of government
spying. This darker picture is one of¶ the
government using spying to control every aspect of people's lives,
compelling them to¶ act and think only in ways sanctioned by the state. Nowhere is this picture
painted more¶ vividly than in Orwell's 1984. Winston, the protagonist, remarks:¶ There was of course no way of
knowing whether you were being watched at any¶ given moment. How often, or on what system, the
Thought Police plugged in on¶ any wire was guesswork. It was even conceivable that they watched
everybody¶ all the time . . . You had to live { did live, from habit that became instinct { in the¶
assumption that every sound you made was overheard, and, except in darkness,¶ every movement
scrutinized. (Orwell 2007, 3)¶ This darker picture of spying cannot be dismissed as unrealistic, merely a
dystopian night-¶ mare. States have often controlled and continue to control their citizens with
spying.¶ Nowhere was this kind of control more complete than in the German Democratic Republic¶
(GDR) during the Cold War, however. Historian Hubertus Knabe summarizes the control¶ exacted by the GDR's secret
police (Stasi) as follows: \Precisely the hidden, but for every¶ citizen tangible omni-presence of the Stasi, damaged
the very basic conditions for individual¶ and societal creativity and development: sense of one's self,
trust, spontaneity." (Bruce¶ 2010, 12)
Violation of privacy leads to a totalitarian state
Daniel J. Solove. Associate professor of law at the George Washington University Law School."The
Digital Person: Technology And Privacy In The Information Age"New York: New York University
Press, 2004.
Orwell's Totalitarian World. Journalists, politicians, and jurists often describe the
problem created by databases with the
metaphor of Big Brother--the harrowing totalitarian government portrayed in George Orwell's 1984. Big Brother is an allknowing, constantly vigilant government that regulates every aspect of one's existence. In every corner are
posters of an enormous face, with "eyes [that] follow you about when you move" and the caption "BIG BROTHER IS WATCHING YOU." ¶ Big
Brother demands complete obedience from its citizens and controls all aspects of their lives. It constructs
the language, rewrites the history, purges its critics, indoctrinates the population, burns books, and obliterates all disagreeable relics from
the past. Big Brother's
goal is uniformity and complete discipline, and it attempts to police people to an
innermost thoughts. Any trace of individualism is quickly suffocated.¶ This
terrifying totalitarian state achieves its control by targeting the private life, employing various techniques of power to
eliminate any sense of privacy. Big Brother views solitude as dangerous. Its techniques of power are
predominantly methods of surveillance. Big Brother is constantly monitoring and spying; uniformed patrols linger on
street corners; helicopters hover in the skies, poised to peer into windows. The primary surveillance tool is a device
unrelenting degree--even their
called a "telescreen" which is installed into each house and apartment. The telescreen is a bilateral television--individuals can watch it, but it
also enables Big Brother to watch them.¶
Privacy needs to be protected in order to retain a balance of power between parties
DANIEL J. SOLOVE, 2002, Assistant Professor, Seton Hall Law School, DIGITAL DOSSIERS AND THE DISSIPATION OF FOURTH
AMENDMENT PRIVACY, http://www-bcf.usc.edu/~usclrev/pdf/075502.pdf
The dangers discussed above illustrate why privacy is integral to freedom in the modern state. Privacy
must be protected by
establishing an architecture of power. The word “architecture” emphasizes that the protection of privacy must be
achieved through establishing a particular social structure that distributes power in our various
relationships. Certain kinds of legal regulation can be readily analogized to architecture. Typically, we view architecture as the design of
buildings and edifices. Buildings structure the way people feel and interact; they form and shape human relationships.182 Neal Kumar Katyal
provides a fascinating account of how physical architecture—the way that neighborhoods and buildings are designed—can affect criminal
behavior.183 Law
resembles architecture in many respects, especially in the way that certain forms of
regulation affect social practices. If we think of law as creating a structure, we can better understand the different forms that
modern regulation must take to protect liberty in the modern state. We have freedom not simply because we have rights.
Our liberty is constructed by various regulatory structures that regulate the safety of the products we buy, the
conditions of the apartments we live in, the way that companies must interact with us, and the sanctity of the environment, among others. An
architecture of power protects a number of social practices of which privacy forms a significant part . It
protects privacy by providing a regulatory structure that shapes relationships and safeguards
individual liberties. At the center of my view is the fact that privacy is an aspect of social practices, which involve relationships with
other people and entities.184 The need for privacy emerges from within a society, from the various social relationships that people form with
each other, with private sector institutions, and with the government. We do not need privacy on a deserted island; rather, the
need for
privacy is engendered by the existence of society, from the fact that we must live together.
Relationships involve some balance of power between the parties. Power is not necessarily a zerosum good, where more power to one party necessarily means less to another. However, certain
configurations of power in these relationships have profound effects on the scope and extent of
freedom, democracy, equality, and other important values. In the modern world, we are increasingly finding ourselves
in a new type of relationship with public and private institutions. These relationships are different because our institutions are more
bureaucratic in nature. Bureaucracies
use more information and often exercise power over people through
the use of personal data. Collecting and using personal information are having an intensifying
influence on the effects of power in our social relationships. Therefore, protecting privacy is critical to
governing these relationships, and consequently, to regulating the tone and tenor of life in the
Information Age.
Privacy Impacts: Autonomy (1/2)
In a world with spying we damage autonomy.
Ron Watson, Department of Political Science, Washington University., “The Ethics of Domestic Government Spying” March 2013¶
http://rewatson.wustl.edu/The%20Ethics%20of%20Domestic%20Government%20Spying.pdf
So widespread intuitions support the principle of just cause for DGS. Let us turn to the¶
consequentialist case for just cause. The sophisticated consequentialist, I suggested in the ¶
introduction, would endorse a simple set of principles for DGS. But which principles would¶ she
endorse? She obviously could not endorse a principle permitting all DGS, since the con-¶ sequences
would be dire. If government agents were always at liberty to spy, people could¶ not develop stable expectations about where, when, and by
whom they are being observed¶ without expending considerable resources on countermeasures, nor could they conceal their¶ personal
information. People's enjoyment of goods requiring even a modicum of privacy¶ would rapidly diminish. People's autonomy
would be
gravely threatened, since the pressures¶ to conform to social norms would be virtually unchecked. The
liberal democratic culture of¶ free thought, free speech, and free action would be stifled.¶ Further, the
bene ts of such a permissive policy would be minimal. Some grave harms¶ might be prevented. But
permitting all spying is more likely to lead to ineffective and even¶ harmful spying. Spying for political
gain and to protect bureaucratic turfs, for example,¶ would likely be rampant.
Privacy hinges on autonomy- it focuses on the control over limitations and
confidentiality
Casman Susanne, professor at UNLV “The Right to Privacy in Light of the Patriot Act and Social Contract Theory”, DoP: 5-1-2011 DoA:
7/15/13 http://digitalscholarship.unlv.edu Pg 17-18
It is differentiated from the total field by virtue of the fact the self is in ¶ some degree involved in excluding in some (or possibly all)
circumstances, some (or ¶ possibly all), other persons from knowledge of the person’s possession. (Bates, 1964). ¶ Ruth
Gavison’s
into three personal basic elements: Solitude: ¶ control over one’s interpersonal
interactions with other people, Confidentiality: control ¶ over other people’s access to information
about oneself, and Autonomy: control over ¶ what one does, i.e. freedom of will. (Boyle, 2003). ¶ What all
of these definitions have in agreement is that privacy is about control, ¶ the amount we wish to
divulge to those around us. They also have as part of their ¶ definition that privacy is both a moral and legal right.
There is a fundamental aspect to ¶ human nature that defines privacy as a basic component. We
assume that privacy is a ¶ moral right, rather than simply a constitutional or legal right. We assume that
decomposition of privacy
privacy is a 18¶ fundamental right, rather than a right that can be explicated in terms of other fundamental ¶ rights (e.g. life, liberty, or
property). (Alfino and Mayes, 2002). Privacy
is an elastic ¶ concept. The limited-access view proposes that privacy
represents control over unwanted ¶ access, or alternatively, the regulation of, limitations on, or
exemption from scrutiny, ¶ surveillance, or unwanted access. Privacy, as a whole or in part, represents
control over ¶ transactions between person (s) and other(s), the ultimate aim of which is to enhance ¶
autonomy and /or minimize vulnerability. (Margulis, 2005).
Privacy protects Autonomy and individuality.
Michael R. Curry, 1997, Department of Geography, University of California, “The Digital Individual and the Private Realm”, Annals of the
Association of American Geographers, http://www.jstor.org/stable/2564405
Yet a bit of reflection suggests the difficulty with all of these positions. The difficulty is, put- ting the matter simply, that the
private
realm performs important functions in the life of the individual and the group. It is in private that
people have the opportunity to become individu- als in the sense that we think of the term. People,
after all, become individuals in the public realm just by selectively making public certain things about
themselves. Whether this is a matter of being selective about one's religious or political views, work history, education, income, or complexion, the important point is this: in a complex society, people adjust their public identities in ways
that they believe best, and they develop those identities in more private settings.
Privacy Impacts: Autonomy (2/2)
Invasions of privacy causes loss of autonomy.
Ron Watson, Department of Political Science, Washington University., “The Ethics of Domestic Government Spying” March 2013¶
http://rewatson.wustl.edu/The%20Ethics%20of%20Domestic%20Government%20Spying.pdf
This line of argument is supported by a further set of responses that people
might have¶ to learning how their
government regulates domestic spying. When principles unfairly or¶ unequally target certain groups,
they can demean, humiliate, and disrespect members of¶ those groups when they become public.
Principles can also have these e ects if they signal¶ to people their chosen pursuits are unworthy,
shameful, or depraved. People's self-respect¶ often depends on the existence of spaces for action free
from government intrusion. Further,¶ when citizens worry that they are under covert observation by
their government, there are a¶ range of activities that can become less enjoyable because they are
less private. Finally, when¶ citizens suspect that the government spies on them, they may lose trust in their government¶ and its
institutions
Privacy is needed in order to retain autonomy
DANIEL J. SOLOVE, 2002, Assistant Professor, Seton Hall Law School, DIGITAL DOSSIERS AND THE DISSIPATION OF FOURTH
AMENDMENT PRIVACY, http://www-bcf.usc.edu/~usclrev/pdf/075502.pdf
government information-gathering can severely constrain democracy and individual selfdetermination. Paul Schwartz illustrates this with his theory of “constitutive privacy.”99 According to Schwartz, privacy is essential
to both individuals and communities: “[C]onstitutive privacy seeks to create boundaries about
personal information to help the individual and define terms of life within the community.”100 As a form
of regulation of information flow, privacy shapes “the extent to which certain actions or expressions of identity
are encouraged or discouraged.”101 Schwartz contends that extensive government oversight over an
individual’s activities can “corrupt individual decision making about the elements of one’s identity.”
Further, inadequate protection of privacy threatens deliberative democracy by inhibiting people from
engaging in democratic activities. This can occur unintentionally; even if government entities are not
attempting to engage in social control, their activities can have collateral effects that harm democracy
and self-determination.
Privacy Impacts: Human Dignity
Violations of privacy lead to a violation of dignity as you ignore the rational
calculations of that individual.
Edward j. Bloustein, prof of law at nyu law; 1964 (“Privacy”, December 1964, pg 971,
http://courses.ischool.berkeley.edu/i205/s10/readings/week11/bloustein-privacy.pdf
The fundamental fact is that our Western culture defines¶ individuality as including [includes] the right
to be free from certain types¶ of intrusions. This measure of personal isolation and personal¶ control
over the conditions of its abandonment is of the very¶ essence of personal freedom and dignity, is part
of what our¶ culture means by these concepts. A man whose home may be¶ entered at the will of
another, whose conversation may be overheard at the will of another, whose marital and familial
intimacies may be overseen at the will of another, is less of a man, has less human dignity, on that
account. He who may intrude¶ upon another at will is the master of the other and, in fact, intrusion is a
primary weapon of the tyrant.7 0¶ I contend that the gist of the wrong in the intrusion cases¶ is not
the intentional infliction of mental distress but rather a¶ blow to human dignity, an assault on human
personality. Eavesdropping and wiretapping, unwanted entry into another's home,¶ may be the
occasion and cause of distress and embarrassment¶ but that is not what makes these acts of intrusion
wrongful. They¶ are wrongful because they are demeaning of individuality, and¶ they are such
whether or not they cause emotional trauma.
Privacy is a Prerequisite to Rights and Autonomy
Privacy is essential to autonomy, protection of rights, and personal freedom
Michael McFarland, President of Holy Cross University, 2000 (a computer scientist with
extensive liberal arts teaching experience and a special interest in the intersection of technology and
ethics, has served as the 31st president of the College of the Holy Cross since July 2000. "Why We Care
about Privacy" http://www.scu.edu/ethics/practicing/focusareas/technology/internet/privacy/whycare-about-privacy.html)
¶ Privacy is important for a number of reasons. Some have to do with the consequences of not having
privacy. People can be harmed or debilitated if there is no restriction on the public's access to and use
of personal information. Other reasons are more fundamental, touching the essence of human
personhood. Reverence for the human person as an end in itself and as an autonomous being requires
respect for personal privacy. To lose control of one's personal information is in some measure to lose
control of one's life and one's dignity. Therefore, even if privacy is not in itself a fundamental right, it
is necessary to protect other fundamental rights.¶ The analysis of Rachels and Fried suggests a deeper
and more fundamental issue: personal freedom. As Deborah Johnson has observed, "To recognize an
individual as an autonomous being, an end in himself, entails letting that individual live his life as he
chooses. Of course, there are limits to this, but one of the critical ways that an individual controls his life
is by choosing with whom he will have relationships and what kind of relationships these will be....
Information mediates relationships. Thus when one cannot control who has information about one,
one loses considerable autonomy."6¶ To lose control of personal information is to lose control of who
we are and who we can be in relation to the rest of society. A normal person's social life is rich and
varied, encompassing many different roles and relationships. Each requires a different persona, a
different face. This does not necessarily entail deception, only that different aspects of the person are
revealed in different roles. Control over personal information and how and to whom it is revealed,
therefore, plays an important part in one's ability to choose and realize one's place in society.
Privacy Impacts: Normalization
Invasions of privacy causes a normalizing effect on society.
Ron Watson, Department of Political Science, Washington University., “The Ethics of Domestic Government Spying” March 2013¶
http://rewatson.wustl.edu/The%20Ethics%20of%20Domestic%20Government%20Spying.pdf
Notice that the dragnet case could plausibly meet all of the four principles discussed¶ above. The problem with cases like Dragnet is that
ordinary people reasonably fear abuse¶ when their personal information is collected in droves; they
also worry that their harmless¶ counter-normative activities will be exposed, punished, or leveraged
against them. They¶ want law enforcement oficials and intelligence agents to possess thick les on
suspected terrorists and criminals, but they worry about these same government agents having
dossiers on¶ law abiding citizens. The temptations to misuse information for prudential or political
gain,¶ they think, are too high. So too are the temptations to police norms prohibiting harmless or¶ even beneficial behavior.
Indeed, the more innocents believe that the government possesses¶ detailed dossiers on them, the more
likely they will be to self-censor, especially when the¶ conduct challenges the government or its
officials. Principles that permit operations like¶ Dragnet, then, are not strategic, since they discourage
people from engaging in a range of¶ harmless or beneficial behaviors. They further risk humiliating or
disrespecting those who¶ engage in harmless but counternormative activities, fomenting paranoia,
undermining trust¶ in the government, and diminishing people's enjoyment of a range of private activities.
Browser Fingerprinting
Browser fingerprinting infringes on digital privacy
Larkin, Erik. Mar 26, 2010. Browser Fingerprints: A Big Privacy Threat.
http://www.pcworld.com/article/192648/browser_fingerprints.html
Forget cookies--even the ultrasneaky, Flash-based "super cookies." A new type of tracking may
identify you far more accurately than any cookie--and you may never know it was there.¶ The method
pulls together innocuous data about your browser, such as plug-ins, system fonts, and your operating
system. Alone, they don't identify you. Together, they're a digital fingerprint.¶ It's like describing a person.
Just saying "brown hair" won't identify anyone. But add in "5 feet, 10 inches tall," "chipped right front tooth," "size 12 shoes,"
and so on, and soon you have enough information to pull someone out of a crowd, even without their name, Social Security
number, or any other of the usual identifiers.¶ Test your browser for unique identifiers without the risk: The Electronic Frontier
Foundation, a privacy advocacy group, has set up an interesting online experiment at Panopticlick.eff.org. Panopticlick gathers
little details about your browser and computer, mostly using Javascript. In my case, the information it gathered about my
browser was enough to uniquely identify my surfing software out of more than 650,000 visitors. Peter Eckersley, a staff
technologist with the EFF, says he and his colleagues de--cided to create the site when he heard rumors about this kind of
tracking. He wanted to see how accurate it might be.¶ Well, it's pretty accurate. And as it turns out, its use is more than a
rumor.¶ Browser fingerprinting was developed for banks to employ to prevent fraud. But now one
company, Scout Analytics, offers it as a service to Web sites, and it collects not just browser data but
also data about how you type--things like your typing speed and typing patterns.¶ This biometric
signature, like the identifiers collected from the browser and the computer, can be gathered using
JavaScript alone, making this form of tracking hard to block. Matt Shanahan, senior vice president of strategy at
Scout Analytics, says that the company sells its service primarily to paid subscription sites, such as those offering real estate
listings, and that it is keen to expand into marketing and advertising by helping sites track visitors in a way that, as he notes, is
more accurate than using cookies. (Cookies can be deleted, which makes a repeat visit look like a new.
Collecting Information Violates Privacy
There are wide sweeping programs to collect our information; this is a violation of
privacy in a new technological age.
Daniel J. Solove. Associate professor of law at the George Washington University Law School."The
Digital Person: Technology And Privacy In The Information Age"New York: New York University Press,
2004.
The government has recently been exploring ways to develop technology to detect patterns of behavior based
on dossiers. In 2002, it was revealed that the Department of Defense was developing a program called Total Information Awareness
(since renamed Terrorism Information Awareness). The program begins with the government amassing
personal information from private-sector sources into a massive database of dossiers on individuals.
Profiling technology is then used to detect those who are likely to be engaged ¶ in criminal activity. When
Congress learned of Total Information Awareness, it halted the program because of its threat to privacy. However, the same
type of collection and use of data envisioned by those who dreamed up Total Information Awareness is already being
carried out by the government. The digital dossiers that continue to grow in the private sector and in
public records are now becoming a tool for the government to monitor and investigate people. The
Secret Paradigm. In another way of understanding privacy that I refer to as the "secrecy paradigm," privacy is invaded by
uncovering one's hidden world, by surveillance, and by the disclosure of concealed information. The
harm such invasions cause consists of inhibition, self-censorship, embarrassment, and damage to one's reputation. The law is heavily influenced
by this paradigm. As
a result, if the information isn't secret, then courts often conclude that the
information can't be private. However, this conception of privacy is not responsive to life in the
modern Information Age, where most personal information exists in the record systems of hundreds of
entities. Life today is fueled by information, and it is virtually impossible to live as an Information Age ghost,
leaving no trail or residue. ¶ The Invasion Conception. Under the traditional view, privacy is violated by the invasive actions of
particular wrongdoers who cause direct injury to victims. Victims experience embarrassment, mental distress, or harm to their reputations. The
law responds when a person's deepest secrets are exposed, reputation is tarnished, or home is invaded. This view, which I call the "invasion
conception," understands privacy to be a kind of invasion in which somebody invades and somebody is invaded. However, digital
dossiers
often do not result in any overt invasion. People frequently don't experience any direct injury when
data about them is aggregated or transferred form one company to another. Moreover, many of the problems of
digital dossiers emerge from the collaboration of a multitude of different actors with different purposes. Each step along the way is
relatively small and innocuous, failing to cause harm that the invasion conception would recognize as
substantial.
Centralized Databases Violate Privacy
Centralizing databases violate privacy
J. J. BRITZ, prof at University of Pretoria, ¶ “THE CONCEPT OF PRIVACY” 1996
http://web.simmons.edu/~chen/nit/NIT'96/96-025-Britz.html
� The merging of databases which contains personal information. This is also known as databanking
(Frocht & Thomas, 1994, p. 24). By this is meant the integration of personal information from a variety
of databases into one central database. The problem here does not in the first place arise from the
integration of the information as such. The main problems include the fact that the individual is not
aware of personal information being integrated into a central database, that the individual does not
know the purpose/s for which the integration is effected, or by whom or for whose benefit the new
database is constructed and whether the information is accurate.6 In order to counter these problems
relating to privacy and the merging of databases the American Congress passed the Computer
Matching and Privacy Protection Act in the 1980s (Benjamin, 1991, p. 11).
A2: “We Consent to Surveillance”
Even giving consent to surveillance doesn’t solve the violation, you don’t know when
where or how they will spy on you.
Ron Watson, Department of Political Science, Washington University., “The Ethics of Domestic Government Spying” March 2013¶
http://rewatson.wustl.edu/The%20Ethics%20of%20Domestic%20Government%20Spying.pdf
The conclusion that we cannot assent to being spied upon might strike some as counterintuitive,
however. They might point to cases in which someone agrees in advance to¶ be spied on, but the
agreement does not specify when, where, or how the spying will take¶ place, thereby leaving open
the possibility that the spy can in particular instances conceal¶ her observation from her target.
Suppose, for example, a homeowner in crime ridden¶ neighborhood consents to being spied on by his
local police department. One can, he agrees,¶ can observe him and his property and conceal this fact
from him and others. This case and¶ others like it suggest that one can assent to be spied upon.
Digital Surveillance Bad
Electronic Surveillance Prevents Free Society
Electronic surveillance is inconsistent with a free society
ACLU. A nonpartisan non-profit organization whose stated mission is "to defend and preserve the
individual rights.March 1, 1998."Electronic surveillance is inconsistent with a free society."American
Civil Liberties Union.http://www.aclu.org/technology-and-liberty/big-brother-wires-wiretapping-digitalage. Date Retrieved: July 7, 2013.
The cryptography debate offers the nation an opportunity to confront the issue of electronic
surveillance anew. If we do not do so in a fully informed and careful way, there will be no limit to the
sweep of new technological opportunities for total surveillance potential. Without the right to strong, non-key
recovery encryption, the black strips on the backs of our credit, cash and identity cards, the electronic keys being distributed by gasoline
companies to enable the purchase of gas with the wave of a wand, the E-Z passes for paying tolls electronically, and the imminent arrival of
compact digital cell phones that also function as computers, e-mailers and pagers, will all be vulnerable to both governmental and
nongovernmental spying, both authorized and unauthorized. The American Civil Liberties Union has historically opposed all forms of electronic
surveillance by the government, and therefore supports the free and unfettered development, production and distribution of the strongest
possible encryption technology.
Electronic surveillance, whether through bugging devices, wiretaps, or ready
access to encryption keys, is fundamentally at odds with personal privacy. It is the worst sort of
general search, which necessarily captures not only the communications of its specific targets, but
those of countless others who happen to come in contact with the targets or use the same lines. Free
citizens must have the ability to conduct direct, instantaneous, spontaneous and private
communication using whatever technology is available. Without the knowledge and assurance that
private communications are, indeed, private, habits based upon fear and insecurity will gradually
replace habits of freedom. The right to privacy has already been severely compromised in this country. Telephones have
been tapped by police at least since 1895, and in the past century there has been a constant tug of
war between the government's impulse to eavesdrop and the public's desire to resist further
encroachments. Although its powers have been limited by both statute and court decision, for all practical purposes the
government has prevailed in this struggle. According to statistics compiled by the Administrative Office of the U.S. Courts,
surreptitious government surveillance is now at record levels.5 From 1985 to 1995, more than 12 million conversations were intercepted
through law enforcement wiretaps, and all but a relative handful were completely innocent (in 1995 alone, nearly two million innocent
conversations were intercepted). Although
government agents must obtain a warrant, their requests for
wiretaps are almost never turned down by judges or magistrates. In fact, only one request by law
enforcement for an intercept has been rejected in the last eight years. As will be explained below, all of this
wiretapping has produced little in the way of results for law enforcement and yet the expansive surveillance capabilities being sought today
through the control of encryption and digital telephony will give the government unprecedented access to all communications -- with or
without a warrant.
Surveillance Violates Separation of Powers
Justifying surveillance in the name of national security violates separation of powers
and avoids oversight
Casman, Betsey Sue. Master of Arts in Ethics and Policy Studies. 2011. "The Right to Privacy in Light of the
Patriot Act and Social Contract Theory".
http://digitalscholarship.unlv.edu/cgi/viewcontent.cgi?article=2087&context=thesesdissertations. Date Accessed 7/21/13.
Congress was not in agreement with this unchecked power of the Executive ¶ branch and countered
Olmstead by enacting the Communications Act of 1934. Within¶ the Communications of Act of 1934
was provision 605. The Michigan Law Review¶ published an article which defined provision 605 as
follows, “605 prohibits both ¶ unauthorized interception of any private radio or wire communications
and unauthorized ¶ use of publication of any information contained in such communications’ (“FISA: ¶
Legislating..” 1980, 1119). Though this provision was upheld by the Supreme Court ¶ when challenged
(Nardone v. United States), it did not stem the continued warrantless ¶ electronic surveillance by the
executive branch. The first reason it did not deter the ¶ executive branch was that the information
was not necessarily being gathered for a ¶ criminal prosecution, but in essence it was being gathered
for information’s sake. With ¶ no trial to dismiss the evidence as illegally obtained, there was no reason
for the ¶ government to rethink its approach to gathering it. The second reason that provision 605 had
little effect was that the executive branch stated that it did not apply to national ¶ security cases.
National security was the justification that was used to circumvent ¶ Congress (and the law) in 1934
and today. Cinquegrana notes, “Almost 7000 wiretaps ¶ and 2200 microphone surveillances were used
by the Executive between 1940 and the ¶ mid-1960’s in internal security investigations concerning
foreign intelligence agents and ¶ Communist Party leaders, as well as major criminal activities.”
Digital Surveillance Hurts US Competitiveness
United States Surveillance Threatens US Competitiveness
Richard Stiennon, 2013 (Forbes staff analyst focusing on it security. “NSA Surveillance Threatens US
Competitiveness” DoP: 6/07/2013, DoA: 7/19/13 http://www.forbes.com/sites/richardstiennon/2013/06/07/nsa-surveillancethreatens-us-competitiveness/)
The vast foreign and domestic spying by the NSA revealed this week threatens the global
competitiveness of US tech companies.¶ We are told we live in a digital world and the future is bright
for tech startups as costs of launching new products and services plummet and global markets open up
to the smallest vendor. Yet, there is a world wide perception that any data that is stored or even
routed through the United States is sucked into cavernous NSA data centers for analysis and
cataloging. That perception was solidified in 2006 when former AT&T technician Mark Klein blew the
whistle on the fiber tap that ATT had provided to the NSA in some of its data centers. Those
perceptions have had real consequences for US tech firms seeking to offer global services. Email
archiving services such as ProofPoint could not sell to even Canadian customers without building local
infrastructure. Even establishing separate data centers in Canada and Europe is not enough to assure
customers that their data would forever stay out of the grasp of US intelligence services.¶ One of the
fastest growing segments of the tech industry is cloud services, with Salesforce.com one of the leading
examples. Box.net, and other cloud storage solutions, are burgeoning. Cloud infrastructure providers
like Amazon, Microsoft, and Rackspace are investing billions to serve markets that should be global
but will be barred from most countries thanks to the complete abandonment of trust caused by
NSA/FBI spying.
Surveilance Ineffective-Terrorists
Digital Surveillance Does Not Stop Terrorism
The US surveillance programs aren’t effective at stopping terrorists-they can’t gain
access to their covert communications.
Bershidsky, Leonid. Staff Editor. Jun 23, 2013. U.S. Surveillance Is Not Aimed at Terrorists.
http://www.bloomberg.com/news/2013-06-23/u-s-surveillance-is-not-aimed-at-terrorists.html.
Accessed 7/16/2013.
“People who radicalise under the influence of jihadist websites often go through a number of stages,” the Dutch
report said. “Their virtual activities increasingly shift to the invisible Web, their security awareness increases and their activities
become more conspiratorial.” ¶ Radicals who initially stand out on the “surface” Web quickly meet people, online or offline, who
drag them deeper into the Web underground. “For many, finally finding the jihadist core forums feels like a warm bath after
their virtual wanderings,” the report said. ¶ When information filters to the surface Web from the core forums, it’s
often by accident. Organizations such as al-Qaeda use the forums to distribute propaganda videos, which careless participants or their
friends might post on social networks or YouTube. ¶ Communication on the core forums is often encrypted. In 2012, a
French court found nuclear physicist Adlene Hicheur guilty of, among other things, conspiring to commit an act of terror for distributing and
using software called Asrar al-Mujahideen, or Mujahideen Secrets. The program employed various cutting-edge encryption methods, including
variable stealth ciphers and RSA 2,048-bit keys. ¶ The NSA’s Prism, according to a classified PowerPoint presentation published by the Guardian,
provides access to the systems of Microsoft Corp. (and therefore Skype), Facebook Inc., Google, Apple Inc. and other U.S. Internet giants. Either
these companies have provided “master keys” to decrypt their traffic - - which they deny -- or the NSA has somehow found other means. Even
complete access to these servers brings U.S. authorities no closer to the core forums . These must be
infiltrated by more traditional intelligence means, such as using agents posing as jihadists or by informants within terrorist
organizations. ¶ Similarly, monitoring phone calls is hardly the way to catch terrorists. They’re generally not
dumb enough to use Verizon. Granted, Russia’s special services managed to kill Chechen separatist leader Dzhokhar Dudayev with a
missile that homed in on his satellite-phone signal. That was in 1996. Modern-day terrorists are generally more aware of
the available technology. ¶ At best, the recent revelations concerning Prism and telephone surveillance might deter potential recruits
to terrorist causes from using the most visible parts of the Internet. Beyond that, the government’s efforts are much more
dangerous to civil liberties than they are to al-Qaeda and other organizations like it.
Digital Surveillance is ineffective at stopping terrorism
Bershidsky, Leonid. Staff Editor. Jun 23, 2013. U.S. Surveillance Is Not Aimed at Terrorists.
http://www.bloomberg.com/news/2013-06-23/u-s-surveillance-is-not-aimed-at-terrorists.html.
Accessed 7/16/2013.
The infrastructure set up by the National Security Agency, however, may only be good for gathering
information on the stupidest, lowest-ranking of terrorists. The Prism surveillance program focuses on
access to the servers of America’s largest Internet companies, which support such popular services as
Skype, Gmail and iCloud. These are not the services that truly dangerous elements typically use.
Equal Prioritization
Achieving a balance of national security objectives and digital privacy is necessary.
Giuseppe, Vaciago is a lecturer in IT Law at University of Milan, focusing his research on cybercrime
and computer forensics. 2013. “Privacy vs. Security? A Dilemma of the Digital Era¶ ”Freedom from Fear
magazine.”
http://www.freedomfromfearmagazine.org/index.php?option=com_content&view=article&id=314:priv
acy-vs-security-a-dilemma-of-the-digital-era&catid=50:issue-7&Itemid=187
First and foremost, there are no winners or losers in the efforts to strike a balance between personal
rights and public order and security, as these two following examples illustrate. On the one side, Europe adopted a
data retention policy necessitating clearer definitions of the types of offences in connection to which
stored personal data may be subjected to disclosure. On the other side, during the Bush
administration the National Security Agency struck a deal with the main national telecommunications
carriers to set up a database of the records of all the phone calls and online activities of American
citizens.¶ Secondly, the EU-US joint statement released in Washington on 28 October 2009, as well as the Stockholm Program of 2
December 2009, are and must be treated as urgent calls for the active implementation of the Cybercrime Convention. Without wishing to
belittle the importance of this Convention, however, it is clear that in an area such as Internet which connects the entire world,
Intergovernmental Organizations also need to intervene, endeavouring to include as many countries as possible. ¶ The third and last
conclusion is more of a hope: the huge potential of the Internet cannot be exploited merely to keep in touch
with old classmates or make free video calls to family and friends. It is precisely as a result of the global interconnectivity it offers, allowing
people from different countries and backgrounds to share information and exchange ideas, that the
Internet must serve as the
starting point for setting up a framework of rules that reconciles privacy protection with the public
interest in detecting, investigating and preventing crime both online and offline, in a manner
satisfactory to all. We managed to draw up the Universal Declaration of Human Rights without the
benefit of the Internet as a universal instrument of peace. Imagine what we can now do, with it.
Hackers
No Impact to Hackers: Encryption Solves
Encrypted communications are practically impossible to crack
Ou, Geore. 2006 (Network engineer. “Is encryption really crackable?”. 30 Apr. Accessed 17 July 13.
http://www.zdnet.com/blog/ou/is-encryption-really-crackable/204)
The problem is compounded by the fact that much of the misinformation out there actually sounds somewhat believable and many people just
don't know what to believe. So to settle this once and for all, let's look at the facts. One of the things that make these myths plausible is the fact
that "128-bit" WEP encryption used in 802.11 Wireless LANs is so pathetically weak. The inside scoop is that WEP was designed during the late
90s during a time when USA export laws were extremely tight. Fearing 802.11 devices would be banned by US export laws, good encryption
algorithms were deliberately passed up by the 802.11 group in favor of a weaker one. The WEP algorithm was fundamentally flawed and the
802.11 standards body knew full well that it wasn't a strong encryption algorithm when they selected it. However, WEP's glaring weaknesses
are not characteristic of any properly implemented symmetric encryption algorithms used in SSL or VPN implementations. To give you an idea
of how good something like DES is, DES
is 30 years old and no one has found any weakness or shortcut for cracking it yet
though it can be brute forced. Brute force techniques are considered impractical because modern encryption
algorithms are 128 to 256 bits long.¶ Further propelling the myth that encryption is worthless is that I often hear people saying
that they heard that a 512 bit RSA key was broken. The truth of the matter is that 512 bit (and recently even 660 bit) RSA keys have been
broken by the University of Bonn in Germany but that is has absolutely nothing to do with the type of encryption that's used for ordinary bulk
encryption. Furthermore, RSA's inventors were well aware of the fact that it takes a much larger key to be secure which is why typical
implementations are at a minimum 768 bits and can easily go up to 2048 bits and beyond. To give you an idea what it takes to
break an
RSA 1620 bit key, you would need a computer with 120 Terabytes of memory before you can even
think about attempting it and the memory requirement virtually rules out massively distributed
cracking methods. Some may ask why use RSA keys when it's many orders of magnitude slower and requires so many more bits to be
secure, the reason is that RSA encryption has the special property of being able to do secure key exchanges in plain sight of an adversary who is
trying to break in but still remain safe. For this reason, RSA keys are strictly used for the initial phases of a secure communication session for the
purpose of Authentication (where one entity proves who they are) and for secure key exchanges (used for bulk symmetric encryption). Once
the initial transaction is complete, the key that was exchanged during the initial RSA phase can now be used for SSL or VPN bulk encryption with
algorithms like RC5, 3DES, or AES.¶ The last big factor in encryption myths and bit size inflation is salesmen and marketers because bigger
numbers always sound nicer. I've had salesmen come in to my office and try to tell me that RSA or AES encryption was worthless and that I
should be using their product which uses some kind of 1000 bit wonder-crypto solution. All it takes is one company to try and out do their
competitors and pitch their products using 4096-bit RSA and the next company will come along and pitch 16384-bit RSA keys in their product.
Many IT consultants will shy away from quoting smaller bit sizes because they're afraid to be out done by their competitors. ¶ Ah, but what
about the dreaded massively distributed cracking brute force method for attacking something like 128 bit RC5 encryption? There
are
massive zombie farms of infected computers throughout the world and some may have gotten as big as 1 million
infected computers. What if that entire army was unleashed upon the commonly used 128 bit RC5
encryption? Surprisingly, the answer is not much. For the sake of argument, let's say we unleash 4.3 billion computers
for the purpose of distributed cracking. This means that it would be 4.3 billion or 2 to the 32 times faster than a single
computer. This means we could simply take 2 to the 128 combinations for 128-bit encryption and divide
it by 2 to the 32 which means that 2 to the 96 bits are left. With 96 bits left, it's still 4.3 billion times
stronger than 64 bit encryption. 64 bit encryption happens to be the world record for the biggest RC5
bit key cracked in 2002 which took nearly 5 years to achieve for a massive distributed attack. ¶ Now that
we know that the distributed attacks will only shave off a few bits, what about Moore's law which historically meant that computers roughly
doubled in speed every 18 months? That means in 48 years we can shave another 32 bits off the encryption armor which means 5 trillion future
computers might get lucky in 5 years to find the key for RC5 128-bit encryption. But with 256-bit AES encryption, that moves the date out
another 192 years before computers are predicted to be fast enough to even attempt a massively distributed attack. To
give you an
idea how big 256 bits is, it's roughly equal to the number of atoms in the universe!¶ Once some of these basic
facts on encryption become clear, "is encryption crackable" isn't the right question because the real question is "when can it be cracked and will
it matter then". This is just like Bank safes which are rated by the time it takes an attacker to crack it open and never sold as "uncrackable".
Encryption strength and the number of bits used are selected based on how many decades the data needs to be kept safe. For a secure ECommerce transaction, the data being transmitted is moot after a few decades which is why 128-bit encryption is perfectly suitable since it's
considered unbreakable for the next few decades. For top secret classified data that needs to remain secret for the next 100 years, the
Government uses NIST certified 256-bit AES encryption. So
the next time someone tells you that encryption is
crackable, ask him if he'll be around on this earth to see it demonstrated.
Hackers Good-Anonymous
Anonymous is good for society because it keeps governments and agencies in check.
Ivanov, Georgi (MA, HBA in Political Science) Jan 2013 What is Anonymous? Everything You Ever
Wanted to Know About the Shadowy Internet Group. http://www.policymic.com/articles/23922/whatis-anonymous-everything-you-ever-wanted-to-know-about-the-shadowy-internet-group Date Accessed:
7/18/13
Understanding Anonymous begins with an overview of their history, beginning with 4chan, and evolving into a
movement whose primary tools of the trade became denial of service and hacking attacks,
accompanied by the public release of sensitive information, including the personal data of individuals
involved with the organization placed in the cross-hairs. The public arm of Anonymous consists of press releases and
videos that are as much information about its activities as they are about its principles, but also provide commentary on current events. The
group does act out against cases where miscarriage of justice or corruption is concerned, and these are
actions that, while controversial, have merit. While hacking attacks are done to symbolize opposition to
one issue or another, leaking information is a practice that predates Anonymous, but still remains a
potent tool in revealing how organizations and governments that would not otherwise release their
information, operate. The consequent fallout creates a public relations disaster for the affected parties,
but it is a reminder that society works best when there is a degree of accountability and trust
between governments and governed.
Encrypted communications are practically impossible to crack
Ou, Geore. 2006 (Network engineer. “Is encryption really crackable?”. 30 Apr. Accessed 17 July 13.
http://www.zdnet.com/blog/ou/is-encryption-really-crackable/204)
The problem is compounded by the fact that much of the misinformation out there actually sounds somewhat believable and many people just
don't know what to believe. So to settle this once and for all, let's look at the facts. One of the things that make these myths plausible is the fact
that "128-bit" WEP encryption used in 802.11 Wireless LANs is so pathetically weak. The inside scoop is that WEP was designed during the late
90s during a time when USA export laws were extremely tight. Fearing 802.11 devices would be banned by US export laws, good encryption
algorithms were deliberately passed up by the 802.11 group in favor of a weaker one. The WEP algorithm was fundamentally flawed and the
802.11 standards body knew full well that it wasn't a strong encryption algorithm when they selected it. However, WEP's glaring weaknesses
are not characteristic of any properly implemented symmetric encryption algorithms used in SSL or VPN implementations. To give you an idea
of how good something like DES is, DES
is 30 years old and no one has found any weakness or shortcut for cracking it yet
though it can be brute forced. Brute force techniques are considered impractical because modern encryption
algorithms are 128 to 256 bits long.¶ Further propelling the myth that encryption is worthless is that I often hear people saying
that they heard that a 512 bit RSA key was broken. The truth of the matter is that 512 bit (and recently even 660 bit) RSA keys have been
broken by the University of Bonn in Germany but that is has absolutely nothing to do with the type of encryption that's used for ordinary bulk
encryption. Furthermore, RSA's inventors were well aware of the fact that it takes a much larger key to be secure which is why typical
implementations are at a minimum 768 bits and can easily go up to 2048 bits and beyond. To give you an idea what it takes to
break an
RSA 1620 bit key, you would need a computer with 120 Terabytes of memory before you can even
think about attempting it and the memory requirement virtually rules out massively distributed
cracking methods. Some may ask why use RSA keys when it's many orders of magnitude slower and requires so many more bits to be
secure, the reason is that RSA encryption has the special property of being able to do secure key exchanges in plain sight of an adversary who is
trying to break in but still remain safe. For this reason, RSA keys are strictly used for the initial phases of a secure communication session for the
purpose of Authentication (where one entity proves who they are) and for secure key exchanges (used for bulk symmetric encryption). Once
the initial transaction is complete, the key that was exchanged during the initial RSA phase can now be used for SSL or VPN bulk encryption with
algorithms like RC5, 3DES, or AES.¶ The last big factor in encryption myths and bit size inflation is salesmen and marketers because bigger
numbers always sound nicer. I've had salesmen come in to my office and try to tell me that RSA or AES encryption was worthless and that I
should be using their product which uses some kind of 1000 bit wonder-crypto solution. All it takes is one company to try and out do their
competitors and pitch their products using 4096-bit RSA and the next company will come along and pitch 16384-bit RSA keys in their product.
Many IT consultants will shy away from quoting smaller bit sizes because they're afraid to be out done by their competitors. ¶ Ah, but what
about the dreaded massively distributed cracking brute force method for attacking something like 128 bit RC5 encryption? There
are
massive zombie farms of infected computers throughout the world and some may have gotten as big as 1 million
infected computers. What if that entire army was unleashed upon the commonly used 128 bit RC5
encryption? Surprisingly, the answer is not much. For the sake of argument, let's say we unleash 4.3 billion computers
for the purpose of distributed cracking. This means that it would be 4.3 billion or 2 to the 32 times faster than a single
computer. This means we could simply take 2 to the 128 combinations for 128-bit encryption and divide
it by 2 to the 32 which means that 2 to the 96 bits are left. With 96 bits left, it's still 4.3 billion times
stronger than 64 bit encryption. 64 bit encryption happens to be the world record for the biggest RC5
bit key cracked in 2002 which took nearly 5 years to achieve for a massive distributed attack. ¶ Now that
we know that the distributed attacks will only shave off a few bits, what about Moore's law which historically meant that computers roughly
doubled in speed every 18 months? That means in 48 years we can shave another 32 bits off the encryption armor which means 5 trillion future
computers might get lucky in 5 years to find the key for RC5 128-bit encryption. But with 256-bit AES encryption, that moves the date out
another 192 years before computers are predicted to be fast enough to even attempt a massively distributed attack. To
give you an
idea how big 256 bits is, it's roughly equal to the number of atoms in the universe!¶ Once some of these basic
facts on encryption become clear, "is encryption crackable" isn't the right question because the real question is "when can it be cracked and will
it matter then". This is just like Bank safes which are rated by the time it takes an attacker to crack it open and never sold as "uncrackable".
Encryption strength and the number of bits used are selected based on how many decades the data needs to be kept safe. For a secure ECommerce transaction, the data being transmitted is moot after a few decades which is why 128-bit encryption is perfectly suitable since it's
considered unbreakable for the next few decades. For top secret classified data that needs to remain secret for the next 100 years, the
Government uses NIST certified 256-bit AES encryption. So
the next time someone tells you that encryption is
crackable, ask him if he'll be around on this earth to see it demonstrated.
Cyberattacks
No Impact to Cyberattacks: Threat Overblown (1/2)
A cyberattack would not be that severe and countries aren’t likely to launch them
against each other.
Lewis, James, author of over 90 papers since becoming director of the technology and public policy program at the center for
strategic and international studies. December of 2002.“Assessing the Risks of Cyber Terrorism, Cyber War, and Other Cyber
Threats” center for strategic and international studies, Washington DC and Steptoe
publications.http://www.steptoe.com/publications/231a.pdf Date Accessed: July 16, 2013
Cyber crime is a serious and growing threat, but the risk to a nation-state in deploying cyber-weapons
against a potential opponent’s economy are probably too great for any country to contemplate these
measures. For example, writers in some of China’s military journals speculated that cyber attacks could
disable American financial markets. The dilemma for this kind of attack is that China is as dependent on the
same financial markets as the United States, and could suffer even more from disruption. With other
critical infrastructures, the amount of damage that can be done is, from a strategic viewpoint, trivial,
while the costs of discovery for a nation state could be very great. These constraints, however, do not apply to
non-state actors like Al Qaeda. Cyber attacks could potentially be a useful tool (albeit not a fatal or
determinative tool) for nonstate actors who reject the global market economy
Cyberterrorism is an overblown threat.
Dorothy E. Denning, 2001, Georgetown University, “ACTIVISM, HACKTIVISM, AND CYBERTERRORISM:
THE INTERNET AS A TOOL FOR INFLUENCING FOREIGN POLICY”,
http://ncfm.org/libraryfiles/Children/NetworkNetWar/MR1382.ch8.pdf
As previously discussed, terrorist groups are using the Internet extensively to spread their message and
to communicate and coordinate action. However, there have been few, if any, computer network
attacks that meet the criteria for cyberterrorism. The 1998 email bombing by the Internet Black Tigers
against the Sri Lankan embassies was perhaps the closest thing to cyberterrorism that has occurred so
far, but the damage cause by the flood of email, for example, pales in comparison to the deaths of 240
people from the physical bombings of the U.S. embassies in Nairobi and Dar es Salaam in August of
that year.
Threat of Cyberterror is overblown – too little payoff for terrorists
Ronald Deibert, 2003, Associate Professor of Political Science and Director of The Citizen Lab, Munk
Centre for International Studies, University of Toronto, Black Code: Censorship, Surveillance, and the
Militarisation of Cyberspace, Journal of International Studies, https://citizenlab.org/wpcontent/uploads/2009/10/Deibert2003.pdf
Accompanying electronic surveillance has been the largely undebated militarization of cyberspace. A
great deal of attention has focused on the question of cyberterrorism, particularly in the wake of 9/11
and fears of potential terrorist use of electronic networks.55 While some see the possibility of an
‘electronic Pearl Harbour’ being unleashed by terrorists, skilled individuals and non-state actors, many
others believe these fears are largely overdrawn and ignore the redundancies built into the
architecture of the Internet as well as the relatively low pay-off for groups whose ultimate aim is
violence.56 In spite of the alarm, there are no empirical examples of cyber-terrorism to date, unless
the term is used so broadly as to encompass politically motivated hacks on websites and occasional
inconveniences caused by denial of service attacks. Rather than tools of mass destruction, threats from
terrorist actors employing the Internet appear to bode little more than periodic disruptions to Internet
traffic.
No Impact to Cyberterror: Threat Overblown (2/2)
Cyberterrorism is not a threat
Green, Joshua. November 2002. The Myth of Cyberterrorism.
http://www.washingtonmonthly.com/features/2001/0211.green.html. Date Accessed 7/20/13.
There's just one problem: There is no such thing as cyberterrorism--no instance of anyone ever having been
killed by a terrorist (or anyone else) using a computer. Nor is there compelling evidence that al Qaeda
or any other terrorist organization has resorted to computers for any sort of serious destructive
activity. What's more, outside of a Tom Clancy novel, computer security specialists believe it is virtually impossible to use the
Internet to inflict death on a large scale, and many scoff at the notion that terrorists would bother
trying. "I don't lie awake at night worrying about cyberattacks ruining my life," says Dorothy Denning, a computer science professor at
Georgetown University and one of the country's foremost cybersecurity experts. "Not only does [cyberterrorism] not rank
alongside chemical, biological, or nuclear weapons, but it is not anywhere near as serious as other
potential physical threats like car bombs or suicide bombers."
Cyberattacks have not occurred
Fisher, Dennis. October 23, 2009. Report: Cyberterror Not a Credible Threat.
http://threatpost.com/report-cyberterror-not-credible-threat-102309/72607. Date Accessed 7/20/13.
A new report by a Washington policy think tank dismisses out of hand the idea that terrorist groups are currently launching cyber attacks and
says that the recent attacks against U.S. and South Korean networks were not damaging enough to be considered serious incidents.The report,
written by James Lewis of the Center for Strategic and International Studies, looks at cyberwar through the prism of the Korean attacks, which
many commentators have speculated originated in North Korea. However, there has been little in the way of proof offered for this assessment,
and Lewis doesn’t go down that road. Instead,
he focuses on whether the attacks constituted an act of war and
whether they could have been the work of a terrorist group.¶ The answer is no on both counts. “The
July event was not a serious attack. It was more like a noisy demonstration. The attackers used basic
technologies and did no real damage. To date, we have not seen a serious cyber attack. That is only
because the political circumstances that would justify such attacks by other militaries have not yet
occurred and because most non-state actors have not yet acquired the necessary capabilities. As an
aside, this last point undermines the notion of cyber terrorism. The alternative to the conclusion that
terrorist groups currently lack the capabilities to launch a cyber attack is that they have these
capabilities but have chosen not to use them. This alternative is nonsensical,” Lewis writes.
Tech Bad
Technopoly creates an endless cycle of dependence, sickening the psyche of the
dependent
Postman, Neil. Technopoly: The Surrender of Culture to Technology, New York, Vintage Books, pp. 71-72. 1992
http://www.ibiblio.org/cmc/mag/1995/mar/hyper/npcontexts_119.html Date accessed- 7/16/13
Technopoly is a state of culture. It is also a state of mind. It consists in the deificaiton of technology,
which means that the culture seeks its authorization in technology, finds its satisfactions in
technology, and takes its orders from technology. This requires the development of a new kind of
social order, and of necessity leads to the rapid dissolution of much that is associated with traditional
beliefs. Those who feel most comfortable in Technopoly are those who are convinced that technical
progress is humanity's superhuman achievement and the instrument by which our most profound
dilemmas may be solved. They also believe that information is an unmixed blessing, which through its
continued and uncontrolled production and dissemination offers increased freedom, creativity, and
peace of mind. The fact that information does none of these things -- but quite the opposite -- seems to change
few opinions, for unwavering beliefs are an inevitable product of the structure of Technopoly. In
particular, Technopoly flourishes when the defenses against information break down. ¶ The
relationship between information and the mechanisms for its control is fairly simple to describe:
Technology increases the available supply of information. As the supply is increased, control
mechanisms are strained. Additional control mechanisms are needed to cope with new information.
When additional control mechanisms are themselves technical, they in turn further increase the
supply of information. When the supply of information is no longer controllable, a general breakdown
in psychic tranquillity and social purpose occurs. Without defenses, people have no way of finding
meaning in their experiences, lose their capacity to remember, and have difficulty imagining
reasonable futures. ¶ One way of defining Technopoly, then, is to say it is what happens to society
when the defenses against information glut have broken down. It is what happens when institutional
life becomes inadequate to cope with too much information. It is what happens when a culture,
overcome by information generated by technology, tries to employ technology itself as a means of
providing clear direction and humane purpose. The effort is mostly doomed to failure. Though it is
sometimes possible to use a disease as a cure for itself, this occurs only when we are fully aware of
the processes by which disease is normally held in check. My purpose here is to describe the defenses that in principle are
available and to suggest how they have become dysfunctional.
Computers and technology create a shield of ignorance to the real threats by hiding it
behind the need for technological advancement and speed.
Postman, Neil. Technopoly: The Surrender of Culture to Technology, New York, Vintage Books, pp. 118-20. 1992
http://www.ibiblio.org/cmc/mag/1995/mar/hyper/npcontexts_119.html Date accessed- 7/16/13
Because of what computers
commonly do, they place an inordinate emphasis on the technical processes of
communications and offer very little in the way of substance. With the exception of the electric light, there never has
been a technology that better exemplifies Marshall McLuhan's aphorism "The medium is the message." The computer is almost all
process. There are, for example, no "great computerers," as there are great writers, painters, or musicians. [I can't resist interjecting here:
there are no great "pencilers" or "brushers" either. What is this guy thinking?] There are "great programs" and "great programmers," but their
greatness lies in their ingenuity either in simulating a human function or in creating new possibilities of calculation, speed, and volume. Of
course, if J. David Bolter is right, it
is possible that in the future computers will emerge as a new kind of book,
expanding and enriching the tradition of writing technologies. Since printing created new forms of literature when it
replaced the handwritten manuscript, it is possible that electronic writing will do the same. But for the moment, computer technology
functions more as a new mode of transportation than a as new means of substantive communication.
It moves information -- lots of it, fast, and mostly in calculating mode. The computer, in fact, makes possible the fulfillment of Descartes' dream
of the mathematization of the world. Computers make it easy to convert facts into statistics and to translate problems into equations. And
whereas this can be useful (as when the process reveals a pattern that would otherwise go unnoticed), it is diversionary and
dangerous when applied indiscriminately to human affairs. So is the computer's emphasis on speed and especially its
capacity to generate and store unprecedented quantities of information. In specialized contexts, the value of calculation, speed, and
voluminous information may go uncontested.
But the "message" of computer technology is comprehensive and
domineering. The computer argues, to put it baldly, that the most serious problems confronting us at both
personal and professional levels require technical solutions through fast access to information
otherwise unavailable. I would argue that this is, on the face of it, nonsense. Our most serious problems are not
technical, nor do they arise from inadequate information. If a nuclear catastrophe occurs, it shall not
be because of inadequate information. Where people are dying of starvation, it does not occur
because of inadequate information. If families break up, children are mistreated, crime terrorizes a
city, education is impotent, it does not happen because of inadequate information. Mathematical equations,
instantaneous communication, and vast quantities of information have nothing whatever to do with any of these problems. And the computer
is useless in addressing them.
Tech pollutes the traditional sense of learning calling into question true learning.
Postman, Neil. Technopoly: The Surrender of Culture to Technology, New York, Vintage Books, pp. 16-19. 1992
http://www.ibiblio.org/cmc/mag/1995/mar/hyper/npcontexts_119.html Date accessed- 7/16/13
We can imagine that Thamus would also have pointed out to Gutenberg, as he did to Theuth, that the
new invention would create a vast population of readers who "will receive a quantity of information
without proper instruction...[who will be filled] will the conceit of wisdom instead of real wisdom"; that
reading, in other words, will compete with older forms of learning. This is yet another principle of technological change we may infer from the
judgment of Thamus:
new technologies compete with old ones -- for time, for attention, for money, for
prestige, but mostly for dominance of their world-view. This competition is implicit once we
acknowledge that the medium contains an ideological bias. And it is a fierce competition, as only
ideological competitions can be. It is not merely a matter of tool against tool -- the alphabet attacking ideographic writing, the
printing press attacking the illuminated manuscript, the photograph attacking the art of painting, television attacking the printed word. When
media make war against each other, it is a case of world-views in collision. In
the United States, we can see such collisions
everywhere -- in politics, in religion, in commerce -- but we see them most clearly in the schools,
where two great technologies confront each other in uncompromising aspect for the control of
students' minds. On the one hand, there is the world of the printed word with its emphasis on logic, sequence, history,
exposition, objectivity, detachment, and discipline. On the other there is the world of television with
its emphasis on imagery, narrative, presentness, simultaneity, intimacy, immediate gratification, and
quick emotional response. Children come to school having been deeply conditioned by the biases of
television. There, they encounter the world of the printed word. A sort of psychic battle takes place,
and there are many casualties -- children who can't learn to read or won't, children who cannot
organize their thought into logical structure even in a simple paragraph, children who cannot attend
to lectures or oral explanations for more than a few minutes at a time. They are failures, but not because they are
stupid. They are failures because there is a media war going on, and they are on the wrong side -- at least
for the moment. Who knows what schools will be like twenty-five years from now? Or fifty? In time, the type of student who is
currently a failure may be considered a success. They type who is now successful may be regarded as
a handicapped learner -- slow to respond, far too detached, lacking in emotion, inadequate in creating mental pictures of reality.
Consider: what Thamus called the "conceit of wisdom" -- the unreal knowledge acquired through the written word -- eventually became the
pre-eminent form of knowledge valued by the schools. There
is no reason to suppose that such a form of knowledge
must always remain so highly valued. To take another example: In introducing the personal computer to the
classroom, we shall be breaking a four-hundred year-old truce between the gregariousness and
openness fostered by orality and the introspection and isolation fostered by the printed word. Orality
stresses group learning, cooperation, and a sense of social responsibility.... Print stresses
individualized learning, competition, and personal autonomy. Over four centuries, teachers, while emphasizing print,
have allowed orality its place in the classroom, and have therefore achieved a kind of pedagogical peace between these two forms of learning,
so that what is valuable in each can be maximized. Now
comes the computer, carrying anew the banner of private
learning and individual problem-solving. Will the widespread use of computers in the classroom
defeat once and for all the claims of communal speech? Will the computer raise egocentrism to the
status of a virtue? These are the kinds of questions that technological change brings to mind when one
grasps ... that technological competition ignites total war, which means it is not possible to contain
the effects of a new technology to a limited sphere of human activity.... What we need to consider
about the computer has nothing to do with its efficiency as a teaching tool. We need to know in what
ways it is altering our conception of learning, and how, in conjunction with television, it undermines
the old idea of school.
Patriot Act
Patriot Act Violates Privacy – “Sneak & Peak Searches”
Under the Patriot Act, the government is allowed to search companies without
warning the subject of the search.
Nancy J. King, 2003, College of Business, Oregon State University, Electronic Monitoring to Promote National Security Impacts
Workplace Privacy, Employee Responsibilities and Rights Journalhttp://www.cob.sjsu.edu/malos_s/privacy%20and%20national%20security.pdf
Second, an
employer may be called upon to assist the government in secret searches of the workplace
under “delayed notification” rules. Section 213 of the USA PATRIOT Act permits searches and seizures by
the government without prompt notice to the subject of the search and seizure when the government
is seeking evidence of a criminal offense. Section 213 searches and seizures have been characterized as “sneak and peek”
because they authorize surreptitious searches and seizures (147 Cong. Rec., 2001). Prior to the USA PATRIOT Act, “sneak and
peek” searches and seizures had only been permitted in two jurisdictions under court rulings by the 2nd
and 9th Circuit Courts of Appeals (U.S. v. Freitas, 1986; U.S. v. Villegas, 1990). Now “sneak and peek” searches and seizures
are lawful across the nation (147 Cong. Rec., 2001). Applying Section 213 to the workplace, employers may be required
to secretly monitor an employee’s electronic communications as part of a government search and
seizure and be prohibited from disclosing its action to the employee under investigation.
WikiLeaks
A2: Threatens US Diplomacy
Wikileaks is not a threat to National Security, Diplomacy between nations will still
continue.
Helller, Kevin J. (Associate Professor at the University of Melbourne) Dec 2010 Why the Benefits of
WikiLeaks Far Outweigh Its Dangers http://opiniojuris.org/2010/12/03/why-wikileaks-good-faroutweighs-its-harm/ Date Accessed: 7/18/13
I have no doubt that some diplomats may respond to WikiLeaks’ disclosures by self-censoring and by
avoiding written communications. But it is difficult to believe that WikiLeaks will have any significant or
lasting effect on the US’s ability to engage in diplomacy with friendly or unfriendly governments ; after
all, this is hardly the first time in U.S. history that diplomatic secrets have been disclosed. Robert Gates, the Secretary of
Defense, said it best a couple of days ago: Let me just offer some perspective as somebody who’s been at this a long
time. Every other government in the world knows the United States government leaks like a sieve , and it
has for a long time. And I dragged this up the other day when I was looking at some of these prospective releases. And this is a quote from John
Adams: ‘How can a government go on, publishing all of their negotiations with foreign nations, I know not. To me, it appears as dangerous and
pernicious as it is novel.’ Now, I’ve
heard the impact of these releases on our foreign policy described as a
meltdown, as a game-changer, and so on. I think those descriptions are fairly significantly
overwrought. The fact is, governments deal with the United States because it’s in their interest, not
because they like us, not because they trust us, and not because they believe we can keep secrets . Many
governments — some governments — deal with us because they fear us, some because they respect us, most
because they need us. We are still essentially, as has been said before, the indispensable nation. So other
nations will continue to deal with us. They will continue to work with us. We will continue to share
sensitive information with one another. Is this embarrassing? Yes. Is it awkward? Yes. Consequences for U.S.
foreign policy? I think fairly modest.
Shield Laws
Shield Laws Key to First Ammendment
Digital surveillance of journalists has a chilling effect on the first amendment, further
reducing our freedoms
Conyers, John Poe, Ted (Congressmen) July 2013 [“A shield law is essential to a robust press.”
http://www.politico.com/story/2013/07/conyers-shield-law-press-freedom-93832.html
Date Accessed: 7/17/13]
A free and robust press is essential to the transparent and effective functioning of our government.
Freedom of the press is enshrined in the First Amendment as a foundational freedom upon which our
other freedoms — including speech and privacy — are premised. An unfettered press can inform the
public about government abuses that threaten our citizens’ rights. This is not a conservative or liberal
principle. It’s an American principle. A free press can hold both Democratic and Republican
administrations accountable, as we’ve seen throughout our history, from Watergate and the Pentagon
Papers to the recent Internal Revenue Service and National Security Agency scandals.
Current events have brought renewed urgency to the need for federal press shield legislation. On May
13, we learned that the Department of Justice had secretly subpoenaed phone records, stemming
from a leak investigation, for more than 20 telephone lines of Associated Press offices and journalists
over a two-month period. A week later, we learned that in connection with a leak investigation
concerning a possible North Korean missile launch, the DOJ had been tracking Fox News reporter
James Rosen’s dealings with the State Department and went so far as to label him a “co-conspirator”
in order to access his personal emails. Such actions sent a chilling signal to both reporters and their
sources.
A2: Terrorism
Islamic Terror is Not a Threat
Terrorism is not the greatest threat to the United States
Shimron, Yonat. 2011. Islamic Terrorism Threat May Be Overblown, Expert Says.
http://www.huffingtonpost.com/2011/08/09/islamic-terrorism-overblown_n_922757.html. Date
Accessed 7/20/13.
“In many ways," said Kurzman, "Islamic terrorism is simply the latest form of transnational revolutionary
violence to grab global attention."¶ Put another way: This too shall pass.¶ While mindful of the pain
and suffering terrorism has caused, Kurzman has written a book challenging the dominant narrative
that worldwide terrorism is out of control.¶ In "The Missing Martyrs: Why There Are So Few Muslim Terrorists," Kurzman
argues that Islamic terrorism has accounted for a miniscule number of murders compared with violent
death tolls from other causes.¶ In the United States, for example, fewer than 40 people died at the
hands of terrorists in the 10 years since the attacks of Sept. 11, 2001. That compares with about
140,000 other murders during the same time.
Terrorism is not a threat, it is only magnified to persecute Muslims
June 10, 2013. ISNA: “Muslim Terrorism is Not a Threat After 9/11″. http://beforeitsnews.com/globalunrest/2013/06/isna-muslim-terrorism-is-not-a-threat-after-911-2455280.html. Date Accessed 7/20/13.
The Islamic Society of North America (ISNA), a U.S. Muslim Brotherhood entity, said that “Muslim terrorism is not a
threat after 9/11” in the May/June issue of its magazine, Islamic Horizons. The Boston bombings, committed by Muslim
terrorists, happened on April 15. Instead, ISNA characterizes anti-Muslim discrimination as the real threat.¶ The
magazine includes an article titled “New York Police Need Strict Oversight” that slams the NYPD’s
counter-terrorism intelligence-gathering operations as an infringement upon Muslims’ rights. The ISNA
article makes the absurd statement:¶ “Despite being proved by reports such as the Triangle Center on Terrorism and Homeland Security that
Muslim terrorism is not a threat after 9/11, [the] NYPD continues to insist that if Muslims have nothing to hide, they should overlook the
violation of their rights.”
Domestic Terrorism Is Not a Threat
Homegrown terrorism is declining, less risk of attack
Brooks, Risa. APRIL 27, 2013. Homegrown terrorism is not on the rise.
http://www.bostonglobe.com/opinion/2013/04/26/threat-jihadist-inspired-homegrown-terrorismremains-small/3o8nzuMFQptSEkKPtfGDqM/story.html. Date Accessed 7/20/13.
Consider the pattern of Muslims arrested on terrorist-related charges in the United States since the
attacks of Sept. 11, 2001. From 2002 to 2008, annual arrests of suspects charged with terrorist-related offenses
ranged from nearly two dozen in 2003 to fewer than five in 2008. In 2009 the number of arrests spiked
to more than 40.¶ Analysts and political officials began to warn that we were finally witnessing the insidious effects of Al Qaeda’s
propaganda on American Muslim citizens and residents. The 2009 arrests were cited as evidence that homegrown terrorism was emerging as a
serious threat. In
2010, however, the number of terrorism-related arrests fell, only to decline further in 2011,
and then again in 2012. In retrospect, the 2009 spike could be explained by several unrelated factors,
including the clustering of arrests of individuals long suspected of having militant sympathies and the
phenomenon of groups of Somalis, primarily from Minnesota, seeking to travel to the Horn of Africa
to join the militant group al-Shabaab.
Digital Surveillance Does Not Stop Terrorism
Terrorists use Tor to avoid digital surveillance and conduct their online activities
Markay, Lachan. 2013 (Former investigative journalist for the Heritage Foundation and current staff
writer for the Washington Free Beacon. “Anonymous Jihad”. 1 July 13. Accessed 16 July 13.
http://freebeacon.com/anonymous-jihad/)
The Tor network has become a go-to means for jihadists and criminals to communicate, raise money,
and buy and sell illicit goods and services without fear of being identified or traced by intelligence or
law enforcement officials.
The network uses technology called “onion routing” (Tor is an acronym for The Onion Router), which
refers to layers of encryption that prevent governments or other users from obtaining information
about users or websites hosted on the network.
Tor uses volunteers’ computers to route traffic through thousands of “nodes” worldwide, obscuring
users’ locations and the sources of data hosted on the network. The technology makes it nearly
impossible to trace or identify the network’s roughly 500,000 daily users.
Terror Discourse is Bad
The Discourse of terrorism leads to flawed counterterrorism policies, only increasing
the number of threats
Joseba Zulaika, PHD and professor at center of Basque Studies, and William A.
Douglass, PHD and Coordinator at Center of Basque studies; 1996 (“Terror and Taboo” X
NS 1996)
So is it not prudent to install metal detectors in airports to try to prevent Lockerbies and Oklahoma
Cities? Of course. Metal detectors are necessary with or without terrorism discourse; our concern is
whether the promotion of terrorism itself as a quintessential threat is necessary and useful. While we
can all agree that we must try to prevent bombings what is lacking is a serious investigation of the
extent to which the discourse itself might be partly responsible for them. It is one of the tenets of
counterterrorism that any interaction with terrorist “other” is violation of a taboo. Terrorists are
kooks, crazies, demented, or at best misguided. Contact with them is polluting; dialogue is pointless
since terrorists are, by definition, outside the pale of reason. Yet as anthropologists working in the
field we have lived many years in communities that have produced “terrorists.” As a practical matter,
we could not simply demonize and then shut them out of awareness. We know that this personal
experience with violent political activists makes us vulnerable to various criticisms. Yet it is the very
strategy of “tabooing” subjects one has never spoken with or contemplated faced-to-face that we will
question on both intellectual `and moral grounds.
Economy
Internal Link: Technological Innovation is Key to the Economy
Technological Innovation accounts for 85% of growth in the economy,
Rosenberg, 2004, (Nathan, Professor of Economics (Emeritus) Stanford University, “ INNOVATION AND
ECONOMIC GROWTH”, pg. 1-2, http://www.oecd.org/cfe/tourism/34267902.pdf, Date accessed: July
28, 2013)
Technological innovation, a major force in economic growth¶ It is taken as axiomatic that innovative
activity has been the single, most important component of long-term economic growth and this paper will
start by drawing upon the findings of a very influential paper published by my colleague at Stanford, Prof. Abramovitx, back in the mid-1950s.¶
In the most fundamental sense, there are only two ways of increasing the output of the economy: (1) you can increase the number of inputs
that go into the productive process, or (2) if you are clever, you can think of new ways in which you can get more output from the same number
of inputs. And, if you are an economist you are bound to be curious to know which of these two ways has been more important - and how
much more important. Essentially what
Abramovitz did was to measure the growth in the output of the
American economy between 1870 and 1950. Then he measured the growth in inputs (of capital and
labor) over the same time period. He then made what were thought to be reasonable assumptions about how much a growth in a
unit of labour and how much a growth in a unit of capital should add to the output of the economy. It turned out that the
measured growth of inputs (i.e., in capital and labor) between 1870 and 1950 could only account for about 15% of
the actual growth in the output of the economy. In a statistical sense, then, there was an unexplained residual
of no less than 85%.¶ Surprisingly enough, no economist had ever undertaken this exercise before - partly because it was only after the
Second World War that reasonably accurate estimates of inputs and outputs for the American economy, over some very long time period,
became available. Now, in any statistical exercise in which you are trying to tease out the relative importance of some variable, and you find
yourself with a residual of 85%, you know you are in big trouble! Yet a number of other economists in the late 1950s and 1960s undertook
similar exercises, using different methodologies, different time periods, and different sectors of the economy, with roughly similar results –
they found themselves left with a very large residual that could not be accounted for. Robert
Solow, who later won a Nobel
Prize in Economics, was one of those other economists who discovered a very large residual, using a very different methodology and
different time period. As it happened, he got the same result for the size of the residual – 85%. It was precisely the size of this
residual that persuaded most economists that¶ technological innovation must have been a major force
in the growth of output in highly industrialised economies.¶ Although it might be tempting to say that the 85% residual
was a negative finding, negative findings can sometimes be extremely useful. In this case the large size of the residual served as a kind of
“wake-up call” to the economics profession because most economists for the previous 200 years had been building models in which economic
growth was treated as if it was primarily a matter of adding more inputs into the productive process, especially inputs of capital. The large
residual told economists that they had to look elsewhere in order to account for economic growth.
Agamben
Link: Digital Technology
Digital Technology de-subjectfys it’s users and allows for them to be considered
expendable.
McWhorter, U of Richmond, “Improper Life: Technology and Biopolitics from Heidegger to Agamben”
DoP: 3-26-2012,DoA: 7/20/13, http://ndpr.nd.edu/news/29756-improper-life-technology-andbiopolitics-from-heidegger-to-agamben/
Like Heidegger, Agamben finds the flattening out or homogenization of human being in modern
technologies deeply disturbing (36). Just as the typewritten word makes one person's (hand)writing
indistinguishable from another's, technologies of all sorts obscure human differences and even
eradicate them. Technology de-subjectifies, rendering people docile, inert, and forgetful of the
essence of proper action (37, 56). De-subjectified, individuals become expendable; they can be
sacrificed. They become, in Agamben's words, Homo sacer, bare life, zoē. This sacrilization of the
masses invites -- to put it bluntly -- mass slaughter. Genocide, unchecked pandemic, spectacular scenes
of regional deprivation and widespread hunger are familiar in our world, even more or less normal and
unremarked. It is exceedingly rare for those responsible for such events to be held to account and
punished. And, on Agamben's analysis, that fact makes perfect sense; the essence of Homo sacer is to be
kill-able with impunity.
Impacts: State of Exception Destroys All Rights (1/2)
The state of exception allows all rights to be suspended indefinitely to preserve
national security
Agamben, philosopher, “The Camp as 'Nomos'” pg 97, 1998, DoA: 7/18/13 Stanford University Press,
http://www.thing.net/~rdom/ucsd/biopolitics/HomoSacer.pdf
The juridical foundation for Schutzhaft [the idea of protective custody] was the proclamation of the
state of siege or of exception and ¶ the corresponding suspension of the articles of the German
constitution that guaranteed personal liberties. ¶ Article 48 of the Weimar constitution read as follows:
“The president of the Reich may, in the case of a ¶ grave disturbance or threat to public security and
order, make the decisions necessary to reestablish public ¶ security, if necessary with the aid of the
armed forces. To this end he may provisionally suspend [ausser ¶ Kraft setzen] the fundamental rights
contained in articles 114,115,117,118, 123, 124, and 153.” From ¶ 1919 to 1924, the Weimar
governments declared the state of exception many times, sometimes ¶ prolonging it for up to five
months (for example, from September 1923 to February 1924). In this sense, when the Nazis took
power and proclaimed the “decree for the protection of the people and State” ¶ (Verordnung zum
Schutz von Volk und Staat) on February 28, 1933, indefinitely suspending the articles of ¶ the
constitution concerning personal liberty, the freedom of expression and of assembly, and the ¶
inviolability of the home and of postal and telephone privacy, they merely followed a practice
consolidated ¶ by previous governments. Yet there was an important novelty. No mention at all was
made of the ¶ expression Ausnahmezustand (“state of exception”) in the text of the decree, which was,
from the juridical ¶ point of view, implicitly grounded in article 48 of the constitution then in force, and
which without a ¶ doubt amounted to a declaration of the state of exception (“articles 114,
115,117,118,123,124, and 153 ¶ of the constitution of the German Reich,” the first paragraph read, “are
suspended until further notice”). ¶ The decree remained de facto in force until the end of the Third
Reich, which has in this sense been aptly ¶ defined as a “Night of St. Bartholomew that lasted twelve
years” (Drobisch and Wieland, System, p. 26). ¶ The state of exception thus ceases to be referred to as
an external and provisional state of factual danger and ¶ comes to be confused with juridical rule itself.
National Socialist jurists were so aware of the particularity of ¶ the situation that they defined it by the
paradoxical expression “state of willed exception” (einen gewollten ¶ Ausnahmezustand). “Through the
suspension of fundamental rights,” writes Werner Spohr, a jurist close to ¶ the regime, “the decree
brings into being a state of willed exception for the sake of the establishment of the ¶ National
Socialist State” (quoted ibid., p. 28).
Impacts: State of Exception Destroys All Rights (2/2)
State of exception leads to a state of permament state martial law, where rights can
be trampled.
Agamben, philosopher, “The Camp as 'Nomos'” pg 97, 1998, DoA: 7/18/13 Stanford University
Presshttp://www.thing.net/~rdom/ucsd/biopolitics/HomoSacer.pdf
The importance of this constitutive nexus between the state of exception and the concentration ¶
camp cannot be overestimated for a correct understanding of the nature of the camp. The
“protection” of ¶ freedom that is at issue in Schutzhaft is, ironically, protection against the suspension
of law that ¶ characterizes the emergency. The novelty is that Schutzhaft is now separated from the
state of exception on ¶ which it had been based and is left in force in the normal situation. The camp
is the space that is opened ¶ when the state of exception begins to become the rule. In the camp, the
state of exception, which was ¶ essentially a temporary suspension of the rule of law on the basis of a
factual state of danger, is now given a ¶ permanent spatial arrangement, which as such nevertheless
remains outside the normal order. When ¶ Himmler decided to create a “concentration camp for
political prisoners” in Dachau at the time of Hitler’s ¶ election as chancellor of the Reich in March 1933,
the camp was immediately entrusted to the SS and – ¶ thanks to Schutzhaft – placed outside the rules
of penal and prison law, which then and subsequently had ¶ no bearing on it. Despite the multiplication
of the often contradictory communiqués, instructions, and ¶ telegrams through which the authorities
both of the Reich and of the individual Länder took care to keep ¶ the workings of Schutzhat as vague as
possible after the decree of February 28, the camp’s absolute ¶ independence from every judicial
control and every reference to the normal juridical order was constantly ¶ reaffirmed. According to the
new notions of the National Socialist jurists (among whom Carl Schmitt was ¶ in the front lines), which
located the primary and immediate source of law in the Führer’s command, ¶ Schutzhaft had,
moreover, no need whatsoever of a juridical foundation in existing institutions and laws, ¶ being “an
immediate effect of the National Socialist revolution” (Drobisch and Wieland, System, p. 27). ¶ Because
of this – that is, insofar as the camps were located in such a peculiar space of exception – Diels, ¶ the
head of the Gestapo, could declare, “Neither an order nor an instruction exists for the origin of the ¶
camps: they were not instituted; one day they were there [sie waren nicht gegründet, sie waren eines
Tages ¶ da] “ (quoted ibid., p. 30). The paradoxical status of the camp as a space of exception must be
considered. The camp is a ¶ piece of land placed outside the normal juridical order, but it is
nevertheless not simply an external space. ¶ What is excluded in the camp is, according to the
etymological sense of the term “exception” (ex-capere), ¶ taken outside, included through its own
exclusion. But what is first of all taken into the juridical order is ¶ the state of exception itself. Insofar as
the state of exception is “willed,” it inaugurates a new juridicopolitical paradigm in which the norm
becomes indistinguishable from the exception. The camp is thus the
Impacts: State of Exception Allows for Atrocities
The state of exception leads to the apex of biopolitical control- it subsumes law and
judicial protections leading to an environment of totalitarian control, that allows for
the extermination of people
Agamben, philosopher, “The Camp as 'Nomos'” pg 97, 1998, DoA: 7/18/13 Stanford University
Presshttp://www.thing.net/~rdom/ucsd/biopolitics/HomoSacer.pdf
Hannah Arendt once observed that in the camps, the principle that supports totalitarian rule and that ¶
common sense obstinately refuses to admit comes fully to light: this is the principle according to
which ¶ “everything is possible.” Only because the camps constitute a space of exception in the sense
we have ¶ examined – in which not only is law completely suspended but fact and law are completely
confused – is ¶ everything in the camps truly possible. If this particular juridico-political structure of the
camps – the task ¶ of which is precisely to create a stable exception – is not understood, the incredible
things that happened ¶ there remain completely unintelligible. Whoever entered the camp moved in a
zone of indistinction ¶ between outside and inside, exception and rule, licit and illicit, in which the
very concepts of subjective ¶ right and juridical protection no longer made any sense. What is more, if
the person entering the camp ¶ was a Jew, he had already been deprived of his rights as a citizen by the
Nuremberg laws and was ¶ subsequently completely denationalized at the time of the Final Solution.
Insofar as its inhabitants were ¶ stripped of every political status and wholly reduced to bare life, the
camp was also the most absolute ¶ biopolitical space ever to have been realized, in which power
confronts nothing but pure life, without any ¶ mediation. This is why the camp is the very paradigm of
political space at the point at which politics ¶ becomes biopolitics and homo sacer is virtually
confused with the citizen. The correct question to pose ¶ concerning the horrors committed in the
camps is, therefore, not the hypocritical one of how crimes of ¶ such atrocity could be committed
against human beings. It would be more honest and, above all, more ¶ useful to investigate carefully
the juridical procedures and deployments of power by which human beings ¶ could be so completely
deprived of their rights and prerogatives that no act committed against them could ¶ appear any
longer as a crime.
Framework
Autonomy
Autonomy Requires Freedom from Negative Restraints
Autonomy requires freedom from coercion, constraint, threat of punishment and
constraint from social mores
Mendus, Susan; 1987 (Morrell Fellow in Toleration at York, and from 1995 to 2000 she was Director
of the Morrell Studies in Toleration Programme, former Academic Co-ordinator for Social Sciences. She
was elected a fellow of the British Academy in 2004. ("Liberty and Autonomy," Proceedings of the
Aristotelian Society, New Series, Vol. 87 (1986 - 1987), pp. 107-120 Published by: Wiley on behalf of The
Aristotelian Society Stable URL: http://www.jstor.org/stable/4545058 Accessed: 28/07/2013 21:46)
We may define the autonomous agent as one who acts in obedience to a law which he has prescribed
for himself. This characterization of autonomy captures three crucial features of the concept: firstly,
the autonomous agent must be in a position to act. He must not be compelled by external forces such
as torture or the threat of legal punishment. Secondly, the autonomous agent's actions must be
performed in obedience to a law: he must not be pathologically driven by desires or impelled by
irresistible urges which are such as to undermine his rationality. He must, in short, be a rational free
chooser. Thirdly, and finally, the autonomous agent must himself create or prescribe the law to which
he is obedient: in addition to being independent of others' coercive actions he must also be
independent of their will. Thus, the agent who conforms, more or less unthinkingly, to the custom and
practice of his day, may be said not to be properly autonomous, since his will is determined by the will
of those around him. This characterization of autonomy therefore requires that the agent possess not
only the standard negative liberties (freedom from coercion, constraint, and threat of punishment),
but also freedom from the suffocating constraint of social mores and customs (from what Mill calls
'the tyranny of public opinion'), and it appears to follow from this that autonomy-based liberalism will
promote a tolerant and plural society, since it will emphasize the need for a wide range of choices
amongst possible life-styles as a necessary condition of autonomy.
Autonomy is a Prerequisite to Morality
Autonomy is necessary for morality, autonomy gives us the power to self determine
morals
Daniel Callahan, Senior Research Scholar and President Emeritus of the Center, Senior Lecturer at the Harvard Medical School and is now
a Senior Scholar at Yale. He received his B.A. from Yale and a Ph.D in philosophy from Harvard. 10/1986, A Moral Good, Not a Moral
Obsession, The Hastings Center, Vol. 14, No. 5, Autonomy, Paternalism, and Community, Date Accessed- 7/21/2013
A major attraction of the concept of autonomy is that it helps to establish moral independence. Not
only does it entail that, as an individual, I am to be treated by others as a moral end rather than a
moral means, it also requires that they allow me to pursue my own moral goods. Autonomy can
thus be understood as the basis for moral enfranchisement, establishing my standing as an equal in
the community and my liberty to pursue my own ends. In the context of medicine, it is a value that has served to
establish the rights of patients over physicians, and the right to be spared the paternalistic interventions of those who think they understand
my welfare better than I do. The
purpose of autonomy is to make me my own moral master. But if autonomy
may serve me in some fundamental ways, what would it be like to live in a community for which
autonomy was the central value? What kind of a medical practice might emerge with patient autonomy as the sole goal? Let me
try to answer that question by first reviewing some of the benefits of giving moral priority to autonomy. Among them are a
recognition of the rights of individuals and of their personal dignity; the erection of a powerful
bulwark against moral and political despotism; a becoming humility about the sources or certainty
of moral claims and demands; and a foundation for the protection of unpopular people and causes
against majoritarian domination. Those are powerful benefits, to be meddled with only at our peril. Nonetheless, I believe that
if autonomy is made the moral goal of a society, or of medical care within that society, then we are equally at
peril in our common life together.
Morality is determined by Autonomy; nothing and no one has the ability to tell us how
we make Moral judgment calls, including any form of social regulation
Schneewind, J.B. Emeritus Professor of Philosophy Johns Hopkins University 1992 The Cambridge
Companion to Kant: 10 – Autonomy, obligation, and virtue pg. 309 – 310
http://universitypublishingonline.org/cambridge/companions/chapter.jsf?bid=CBO9781139000536&cid
=CBO9781139000536A014 Date Accessed: 7/24/13
At the center of Kant's ethical theory is the claim that normal adults are capable of being fully selfgoverning in moral matters. In Kant's terminology, we are "autonomous." Autonomy involves two
components. The first is that no authority external to ourselves is needed to constitute or inform us of
the demands of morality. We can each know without being told what we ought to do because moral
requirements are requirements we impose on ourselves. The second is that in self-government we can
effectively control ourselves. The obligations we impose upon ourselves override all other calls for
action, and frequently run counter to our desires. We nonetheless always have a sufficient motive to
act as we ought. Hence no external source of motivation is needed for our self-legislation to be effective
in controlling our behavior. Kant thinks that autonomy has basic social and political implications.
Although no one can lose the autonomy that is a part of the nature of rational agents, 3 social
arrangements and the actions of others can encourage lapses into governance by our desires, or
heteronomy. Kant, as we shall see, found it difficult to explain just how this could happen,- but he
always held that the moral need for our autonomy to express itself was incompatible with certain
kinds of social regulation. There is no place for others to tell us what morality requires, nor has
anyone the authority to do so - not our neighbors, not the magistrates and their laws, not even those
who speak in the name of God. Because we are autonomous, each of us must be allowed a social
space within which we may freely determine our own action. This freedom cannot be limited to
members of some privileged class. The structure of society must reflect and express the common and
equal moral capacity of its members.
Autonomy-Protects Free Speech
Autonomy recognizes and preserves free speech.
Daniel J. Solove, 2003, Associate Professor, Seton Hall Law School, The Virtues of Knowing Less: Justifying Privacy Protections against
Disclosure, Duke Law Journal, http://www.jstor.org/stable/1373222
One of the most frequently articulated rationales for the value of free speech is that it promotes
individual autonomy.94 As one commentator observes, the "value of free expression..,. rests on its deep relation
to self-respect arising from autonomous self-determination."95 The disclosure of personal information about others
certainly falls within the autonomy of the speaker. Respect for autonomy requires recognition of strong rights of selfexpression. Disclosure protections thus impair the autonomy of speakers who desire to speak about
others. Additionally, free speech can be justified in terms of the autonomy of the listener.96 Under this
view, free speech protects people's freedom of information consumption. Disclosure protections
prevent people from hearing information that they want to know.
Autonomy-Individual
Autonomy is to be preferred in an individual sense, societal autonomy goals are
problematic
Daniel Callahan, Senior Research Scholar and President Emeritus of the Center, Senior Lecturer at the Harvard Medical School and is now
a Senior Scholar at Yale. He received his B.A. from Yale and a Ph.D in philosophy from Harvard. 10/1986, A Moral Good, Not a Moral
Obsession, The Hastings Center, Vol. 14, No. 5, Autonomy, Paternalism, and Community, Date Accessed- 7/21/2013
If we ask what system of values might be best for our individual welfare and desires, then autonomy
is a prime candidate. But if we ask what system of values might be best for our life in community, for
sustaining a viable society and culture, then autonomy may fare less well. We need to give some thought to that
latter question. Yet, in doing so, we may well grant that the notion of autonomy, especially patient autonomy, has hardly become triumphant
in the daily life of medicine; in fact, it is probably still more curtailed or denied than honored. We may also grant the powerful tendency of
technological medicine to dehumanize and depersonalize, to efface or erase individuality, to attend to our organs and parts rather than our
persons. Nor need we deny that, faced with budget pressures and cuts, individual welfare and freedom of choice are likely to be the first
victims. In short, it
may seem churlish or precious to question the value of autonomy in a medical system that only
precisely because autonomy has so often been
held up as the value of the future, the ideal yet to be achieved, it is well to ask what that future might
look like. The trouble with wanting one's dreams to come true is that they may come true.
yesterday first heard of the idea and even today tends to neglect it. Yet
Autonomy-Consent Necessary for Morality
Moral obligations can only be self accepted
Daniel Callahan, Senior Research Scholar and President Emeritus of the Center, Senior Lecturer at the Harvard Medical School and is now
a Senior Scholar at Yale. He received his B.A. from Yale and a Ph.D in philosophy from Harvard. 10/1986, A Moral Good, Not a Moral
Obsession, The Hastings Center, Vol. 14, No. 5, Autonomy, Paternalism, and Community, Date Accessed- 7/21/2013
Let us¶ grant that others should honor my¶ autonomy and that I should honor theirs.¶ Yet if I should
have (or believe I have)¶ moral¶ obligations toward others, could I be¶ relieved of them¶ by their
declaration of au-¶ tonomy in the face of my obligations? If,¶ for example, a physician believes that he¶
or she has an obligation to save the life of¶ another, but that person wants to die, is¶ that¶ obligation
nullified or overridden by¶ the¶ patient's declaration? The common autonomy doctrine would say it is. For if
patients are to be their own moral¶ agents,¶ choosing their own moral good, then no¶ one, it would
seem, could have moral obligations to them that they did not choose to¶ allow. If that is the case, we are still
left¶ with a troubling puzzle. Are we to under-¶ stand that the physician's obligation vanishes once autonomy has been declared, or¶ that it
continues to exist but has been over-¶ ridden by a higher value? If the former is¶ the case, the¶ obligation seems to have no¶ basis whatsoever;
if the latter is the case,¶ then the conscience of the¶ physician seems¶ a fragile, disposable matter.¶
There is no absolute morality, rather it is determined by ourselves with our autonomy.
Further, only a consenting agreement can create moral obligations outside of
respecting others autonomy.
Daniel Callahan, Senior Research Scholar and President Emeritus of the Center, Senior Lecturer at the Harvard Medical School and is now
a Senior Scholar at Yale. He received his B.A. from Yale and a Ph.D in philosophy from Harvard. 10/1986, A Moral Good, Not a Moral
Obsession, The Hastings Center, Vol. 14, No. 5, Autonomy, Paternalism, and Community, Date Accessed- 7/21/2013
If (to be reminded of Wittgenstein) we look not for the meaning of autonomy but for its social uses, what do
we see? 1. As moral agents, we are essentially independent of each other and isolated; we are not
social animals, but morally self-en- closed, self-encompassing animals. 2. There can be no moral
truth or wisdom about individual moral goods and goals and few if any about communal ends;
morality is inherently subjective and relativistic. 3. The ideal relationship among human beings is
the voluntary, contractual relationship of consenting adults; the community has no standing to say
what is good or bad in such relationships. 4. In any weighing of the relative interests of individual
and community, the bur- den of proof is always upon the community to prove its case for restricting
the liberty of individuals. 5. The only moral obligations I have toward others are those I voluntarily
under- take; there can be no such thing as an in- voluntary moral obligation. 6. The only moral
obligations that oth- ers have toward me are those that autonomously I allow them to have; all I am
owed by others is respect for my autonomy. 7. Respect for the autonomy of others is sufficient ground
for overriding my own conscience.
Moral obligations can must be agreed to by all other parties involved, if one disagrees,
they are an coercive attempt to violate their autonomy
Daniel Callahan, Senior Research Scholar and President Emeritus of the Center, Senior Lecturer at the Harvard Medical School and is now
a Senior Scholar at Yale. He received his B.A. from Yale and a Ph.D in philosophy from Harvard. 10/1986, A Moral Good, Not a Moral
Obsession, The Hastings Center, Vol. 14, No. 5, Autonomy, Paternalism, and Community, Date Accessed- 7/21/2013
To¶ go one step further, does a respect for autonomy mean that we are not allowed to¶ imagine a good for others beyond that¶ which¶ they
imagine for themselves? Or¶ that we are not allowed to¶ persuade others¶ that their autonomous moral choices are¶ wrong, or defective, or
less valuable than¶ they might be? Of course we are allowed¶ to do those¶ things. The
moral autonomy of¶ others does not
rule out noncoercive attempts to persuade them to think or act differently. What we cannot do is to
impose¶ our values, or the dictates of our con-¶ science, upon them against their will.¶ Does it then
follow that the¶ only moral¶ obligations we can owe to autonomous¶ moral agents are those¶ formally
agreed to¶ by them in some contractual manner? Apparently so. We can talk with them, exhort¶ them,
attempt to persuade them. What we¶ cannot do, under the¶ implicit mutual contract, is to go one step
beyond the contract,¶ however¶ powerful our sense of obligation¶ might be or however powerful our
alternative notions of what would serve the moral¶ interests of another. The very point of the¶ moral¶
autonomy of another is to empower¶ his or her¶ personal liberty and to restrict¶ that of others toward
him or her.¶ Only a¶ voluntary ceding or suspension of autonomy rights can change the nature of that¶
relationship with others.
A2: Prefer Justice
Autonomy supersedes justice- justice is based off of the idea of self preference
Daniel Callahan, Senior Research Scholar and President Emeritus of the Center, Senior Lecturer at the Harvard Medical School and is now
a Senior Scholar at Yale. He received his B.A. from Yale and a Ph.D in philosophy from Harvard. 10/1986, A Moral Good, Not a Moral
Obsession, The Hastings Center, Vol. 14, No. 5, Autonomy, Paternalism, and Community, Date Accessed- 7/21/2013
It is sometimes said that¶ justice is powerful¶ enough to supersede autonomy, and¶ it is true that most
theories of¶ justice allow¶ the¶ suppression or overriding of individual¶ liberty under some
circumstances. Yet the¶ most popular and influential¶ contemporary¶ theories of justice (at least in the
United¶ States) see the source of a theory of justice¶ in individual needs and¶ desires, and the¶
outcome of a¶ reign of justice as the enthronement of individual¶ autonomy. Justice becomes little
more than a¶way station¶ on the road to self-determination.¶
Maslow’s Hierarchy of Needs
Maslow’s Hierarchy Does Not Exist
There’s no evidence a Hierarchy of Needs exists.
Steve Denning; 2012 (A writer about radical management, leadership, innovation &
narrative3/29/2012 ("What Maslow Missed”,
Forbes.http://www.forbes.com/sites/stevedenning/2012/03/29/what-maslow-missed/, Date Retrieved:
July 27, 2013)
In reviews of research based on Maslow’s theory, little evidence has been found for the ranking of
needs that Maslow described, or even for the existence of a definite hierarchy at all.¶ “Here’s the
problem with Maslow’s hierarchy,” explains Rutledge. “None of these needs — starting with basic
survival on up — are possible without social connection and collaboration…. Without collaboration,
there is no survival. It was not possible to defeat a Woolley Mammoth, build a secure structure, or care
for children while hunting without a team effort. It’s more true now than then. Our reliance on each
other grows as societies became more complex, interconnected, and specialized. Connection is a
prerequisite for survival, physically and emotionally.”¶ “Needs are not hierarchical. Life is messier
than that. Needs are, like most other things in nature, an interactive, dynamic system, but they are
anchored in our ability to make social connections. Maslow’s model needs rewiring so it matches our
brains. Belongingness is the driving force of human behavior, not a third tier activity. The system of
human needs from bottom to top, shelter, safety, sex, leadership, community, competence and trust,
are dependent on our ability to connect with others. Belonging to a community provides the sense of
security and agency that makes our brains happy and helps keep us safe.”
Morality
Morality: Deontology is Best – Rights Prove
Liberal theory prefers deontology
Jeremy Waldron, professor at NYU school of law specializing in constitutional theory, law and
philosophy, legal philosophy and political theory. “moral autonomy and personal autonomy” accessed
7/21/13. http://philosophy.la.psu.edu/jchristman/autonomy/Waldron.pdf
There are several ways in which we may understand a claim that the right has priority over the good.
(1) It may be understood as a claim about the deontological character of political morality - as a denial
of consequentialism, for example. The idea here would be that we do not construct our political
morality by figuring out, first, what is valuable and, secondly, how best to promote it; instead we
establish certain moral absolutes - rights, for example - deontologically, without reference to the
goals that it might be worthwhile for individuals or societies to.69 Or (2) the priority of the right over
the good may be understood as a claim about the relation between individual aspirations and the
social demands of morality. People have their own individual conceptions of the good, but these are
subject to the demands of right conceived as a system of morally reconciling individual ends
Morality: Intention is Key to Morality
Intent rather than result matters. The only relevant thing to the morality of an action
is a good will.
Johnson, Robert, "Kant's Moral Philosophy", The Stanford Encyclopedia of Philosophy (Summer 2010
Edition), Edward N. Zalta (ed.) <http://plato.stanford.edu/archives/sum2010/entries/kant-moral/>.Date
Accessed: 7/23/13
In Kant's terms, a good will is a will whose decisions are wholly determined by moral demands or as he often
refers to this, by the Moral Law. Human beings view this Law as a constraint on their desires, and hence a will in
which the Moral Law is decisive is motivated by the thought of duty. A holy or divine will, if it exists, though good, would not be
good because it is motivated by thoughts of duty. A holy will would be entirely free from desires that might operate independently of morality.
It is the presence of desires that could operate independently of moral demands that makes goodness
in human beings a constraint, an essential element of the idea of ‘duty’. So in analyzing unqualified goodness as it
occurs in imperfectly rational creatures such as ourselves, we are investigating the idea of being
motivated by the thought that we are constrained to act in certain ways that we might not want to, or
the thought that we have moral duties. Kant confirms this by comparing motivation by duty with other sorts of motives, in
particular, with motives of self-interest, self-preservation, sympathy and happiness. He argues that a dutiful action from any of these motives,
however praiseworthy it may be, does not express a good will. Assuming an action
has moral worth only if it expresses a
good will, such actions have no genuine ‘moral worth’. The conformity of one's action to duty in such cases is only related by accident to
content of one's will. For instance, if one is motivated by happiness alone, then had conditions not conspired to align one's duty with one's own
happiness one would not have done one's duty. By contrast, were one to supplant any of these motivations with the motive of duty, the
morality of the action would then express one's determination to act dutifully under any
circumstances. Only then would the action have moral worth. Kant's views in this regard have understandably been
the subject of much controversy. Many object that we do not think better of actions done for the sake of duty than actions
performed out of emotional concern or sympathy for others, especially those things we do for friends and family. Worse, moral worth
appears to require not only that one's actions be motivated by duty, but also that no other motives,
even love or friendship, cooperate. Yet Kant's defenders have argued that his point is not that we do not admire or praise
motivating concerns other than duty, only that from the point of view of someone deliberating about what to do, these concerns are not
decisive in the way that considerations of moral duty are. What
is crucial in actions that express a good will is that the
motivational structure of the agent be arranged so as to give considerations of duty priority over all
other interests. It does not require or even recommend a rule-bound character devoid of the warmth of human emotion. Suppose for the
sake of argument we agree with Kant. We now need to know what distinguishes the principle that lays down our duties from these other
motivating principles, and so makes motivation by it the source of unqualified value.
Morality is based on intention; not consequences
Sayre McCord. Kant’s Grounding for the Metaphysics of Morals; A very brief selective summary of
sections I and II © 2000 http://www.unc.edu/~gsmunc/phil22/Kantsum.pdf Date Accessed: 7/23/13
If a good will is unconditionally good then its value, Kant points out, cannot depend upon its having good
effects. For if its value did depend on its having good effects it would be valuable only on the
condition that it had those effects. Take away the effects and you would take away the source of its
value. Since its value is (by assumption only, so far) unconditional, it must then be valuable even absent its having any
good effects. Its value must be contained within it. Kant supposes that we all have at least some idea of what he is referring to in speaking
of a good will. Loosely speaking, it is the determination to do what, in effect, reason requires as right period. (394-394)
Utilitarianism is best for Determining Political Morality
Utilitarianism is the best moral philosophy for political action and discussions
Shaw, Philosophy Professor, 1999 (William H. Shaw, 1999, Philosophy and Chair of the Philosophy
at SJSU, “contemporary ethics: taking account of utilitarianism” p 171-2)
Utilitarianism ties right and wrong to the promotion of well-being, but it is not only n personal ethic or a guide to individual conduct. lt is also a
"public philosophy°" - that is, a normative basis for public policy and the structuring of our social, legal, and political institutions. Indeed, it was
just this aspect of utilitarianism that primarily engaged Bentham, john Stuart Mill, his father James, and their friends and votaries. For them
utilitarianism was, first and foremost, a social and political philosophy and only secondarily a private or personal moral code. In particular, they
saw utilitarianism as providing the yardstick by which to measure, assess, and, where necessary, reform government social and economic policy
and the judicial institutions of their day. In the public realm,
utilitarianism is especially compelling. Because of its
consequentialist character, a utilitarian approach to public policy requires officials to base their
actions, procedures, and programs on the most accurate and detailed understanding they can obtain
of the circumstances in which they are operating and the likely results of the alternatives open to
them. Realism and empiricism are the hallmarks of a utilitarian orientation, not customary practice,
unverified abstractions, or wishful Promotion of the well being of all seems to be the appropriate,
indeed the only sensible, touchstone for assessing public policies and institutions, and the standard
objections to utilitarianism as a personal morality carry little or no weight against it when viewed as a
public philosophy. Consider, for instance, the criticisms that utilitarianism is too impersonal and ignores one's individual attachments
and personal commitments, that it is coldly calculating and concerned only with maximizing, that it demands too much of moral agents and that
it permits one to violate certain basic moral restraints on the treatment of others. The previous two chapters addressed sorne of these
criticisms; others will be dealt with in Chapter 8. The point here, though, is that far
from undermining utilitarianism as a
public philosophy, these criticisms highlight its strengths. We want public officials to be neutral,
impersonal. and detached and to proceed with their eyes firmly on the effects of the policies they
pursue and the institutions that their decisions shape. Policy making requires public officials to
address general issues, typical conditions. and common circumstances. Inevitably, they must do this
through general rules, not on a case by case basis. As explained later in this chapter, this fact precludes
public officials from violating the rights of individuals as a matter of policy. Moreover, by organizing the efforts of
countless individuals and compelling each of us to play our part in collective endeavors to enhance welfare, public officials can make it less
likely that utilitarianism will demand too much of any one individual because others are doing too little.
Utilitarians — will seek to
direct and coordinate people's actions through effective public policy and to reshape, in utilityenhancing ways, the institutions that structure the choices people face. By doing so, utilitarians can
usually accomplish more good than they can through isolated individual action, however dedicated
and well intentioned. For this reason, they will strive to Easter institutions that false over from
individuals much of the task of promoting the general welfare of society. General welfare is a broad
goal, of course, and sensible policies and institutions will typically focus on more specific desiderata such as promoting productivity, increasing individual freedom and opportunity, improving people’s
physical health, guaranteeing their personal security, and so on — that contribute significantly to
people's well-being. Implementing even there goals can prove difficult. Furthermore, many of the problems facing society have no
simple answers because they are tangled up with contested issues of fact and controversial questions of psychology, sociology, and economics.
To the extent that utilitarians disagree among · themselves over these matters, their policy recommendations will diverge. Nevertheless, by
clarifying what is at stake and continually orienting discussion toward the promotion of well-being, a. utilitarian approach provides the
necessary framework for addressing questions of institutional design and for fashioning effective public policy. The present chapter explicates
the utilitarian approach to three matters that have long engaged social and political philosophers and that concern.
Consequentialism is best for Determining Morality of Policies
The morality of policies are determined by their consequences
David Sanford Horner, 2005 (Policies for a ‘nanosociety’: Can we learn now from our future
mistakes? 2005 - bibliotecavirtual.clacso.org.ar)
At the same time Moor wishes to retain the notion that consequences count that is that ‘…the
evaluation of a given policy requires the evaluation of the consequences and often the consequences
of that policy compared with other consequences of other possible policies’ (Moor, 1999, p.66).
Moor’s approach involves two stages. Firstly, the application of an ‘impartiality test’ and then secondly
the appraisal of the various outcomes and consequences of actions and policies, weighing the good
consequences and the bad consequences, of those policies surviving the impartiality test. In the first
stage deliberation takes place over the various policies to determine whether or not they meet ethical
criteria. A policy is determined to be ethical if (a) it does not cause any unnecessary harm to
individuals and groups and (b) it supports individual rights, the fulfilling of duties etc. In the second
stage the best policy is selected ‘from the set of just policies arrived at in the deliberation stage by
ranking ethical policies in terms of benefits and (justifiable) harms’. In carrying out this evaluation of
policies we are required to: ‘…(a) weigh carefully between the good consequences and bad
consequences in ethical policies, and (b) distinguish between disagreements about facts and
disagreements about principles and values, when deciding which ethical policy should be adopted’
(Tavani, 2004, 60 – 61).
A2: Human Rights/Rights More Important Than Consequentialism
A government’s first obligation is to protect its citizens and have a consequential
concern for their survival and success. Harries explains that governments must weigh
consequences
Owen Harries, editor and founder of National Interest, Senior Fellow at Centre for Independent
Studies, Spring 1993/1994, “Power and Civilization,” The National Interest.
Performance is the test. Asked directly by a Western interviewer, “In principle, do you believe in one
standard of human rights and free expression?”, Lee immediately answers, “Look, it is not a matter of
principle but of practice.” This might appear to represent a simple and rather crude pragmatism. But in
its context it might also be interpreted as an appreciation of the fundamental point made by Max Weber
that, in politics, it is “the ethic of responsibility” rather than “the ethic of absolute ends” that is
appropriate. While an individual is free to treat human rights as absolute, to be observed whatever the
cost, governments must always weigh consequences and the competing claims of other ends. So once
they enter the realm of politics, human rights have to take their place in a hierarchy of interests,
including such basic things as national security and the promotion of prosperity. Their place in that
hierarchy will vary with circumstances, but no responsible government will ever be able to put them
always at the top and treat them as inviolable and over-riding. The cost of implementing and promoting
them will always have to be considered.
Social Contracts
Locke’s Social Contract Protects Citizens from Violence
The purpose of Locke’s social contract is to protect the people from violence
Hayman 1991 (Steven J, Assistant Professor of Law, Chicago-Kent College of Law, Illinois Institute of Technology, THE FIRST DUTY OF
GOVERNMENT: PROTECTION, LIBERTY AND THE FOURTEENTH AMENDMENT, Duke Law Journal,
http://scholarship.law.duke.edu/cgi/viewcontent.cgi?article=3172&context=dlj) Date accessed: 7/26/13
In a state of nature, however, an individual often lacks the power to defend himself against invasion by
others, rendering the enjoyment of his rights "very unsecure.' '32 For this reason, individuals agree to
form a community "for the mutual Preservation of their Lives, Liberties and Estates," which Locke
comprehensively termed "Property.'33 Under the terms of this compact, each individual gives up his
natural power to act for his own preservation "to be regulated by the Laws made by the Society, so far
forth as the preservation of himself, and the rest of that Society shall require." 34 In addition, he "engages his
natural force.., to assist the Executive Power of the Society, as the law thereof shall require." 35 In return, the individual obtains not only
benefits from "the labor, assistance, and society of others in the same Community," but also protection from its whole strength."36 In
short,
according to Locke, the end of government is to direct "the force of all the subjects of the
commonwealth" for the purpose of "preserving the members of the commonwealth in peace from
injury and violence." 37
Locke emphasized that, because government is established for this purpose, it is "obliged" to secure
every individual's life, liberty, and property.38 When it acts contrary to this trust, the government is
dissolved and the community regains the right to establish a new form of government.39 Such dissolution
occurs, in Locke's view, where the government invades the rights of subjects, or where it fails to use its power to secure those rights Locke
implied that the Glorious Revolution of 1688, in which King James II was dethroned and replaced by William and Mary, was justified on these
grounds.
Social Contracts Must be Backed by Force
Social Contract must be backed by force
Hobbes, Thomas, 1651, Leviathan
(https://scholarsbank.uoregon.edu/xmlui/bitstream/handle/1794/748/leviathan.pdf)
A COMMONWEALTH [Society] by acquisition is that where the sovereign power is acquired by force;
and it is acquired by force when men singly, or many together by plurality of voices for fear of death,
or bonds, do authorize all the actions of that man, or assembly, that hath their lives and liberty in his
power. And this kind of dominion, or sovereignty, ¶ [differs] from sovereignty by institution only in
this, that men who choose their sovereign do it for fear of one another, and not of him whom they
institute: but in this case, they subject themselves to him they are afraid of. In both cases they do it
for fear: which is to be noted by them that hold all such covenants, as proceed from fear of death or
violence, void: which, if it were true, no man in any kind of Commonwealth could be obliged to
obedience. ¶ It is true that in a Commonwealth once instituted, or acquired, promises proceeding from
fear of death or violence are no covenants, nor obliging, when the thing promised is contrary to the
laws; but the reason is not because it was made upon fear, but because he that promiseth hath no right
in the thing promised. Also, when he may lawfully perform, and doth not, it is not the invalidity of the
covenant that absolveth him, but the sentence of the sovereign. Otherwise, whensoever a man
lawfully promiseth, he unlawfully breaketh: but when the sovereign, who is the actor, acquitteth him,
then he is acquitted by him that extorted the promise, as by the author of such absolution.
Social Contracts Balance Individualism and Cooperation
The Social Contract respects individuality and preserves cooperation, which ensures
the survival of society – Respect of the private sphere is essential to this concept
Michel Rosenfeld, 1985, Professor of Law, New York Law School, Contract and Justice: The Relation Between Classical Contract
Law and Social Contract Theory, Iowa Law Review, 70 Iowa L. Rev. 769, Lexis.
For those who share the liberal ideal of achieving the greatest possible autonomy for
each individual compatible with both equal autonomy for all and the degree of social
cooperation necessary to insure the survival of society, the conjunction of the social
contract with freedom of contract seems highly desirable. Indeed, this conjunction
not only permits neutrality with respect to individual visions of the good, but also
strictly limits the realm of individual obligations. These results are achieved by dividing the universe of
social relationships into the two separate and distinct spheres of the public and the private. The terms of the social contract govern the
relationships in the public sphere and impose a limited number of obligations owed by each party to the social contract to all the other
parties ot it. Freedom of contract, on the other hand, operates in an extensive private sphere in which individual obligations are limited
to those arising out of particular legal contracts and extend only to the other party or parties to such contract. n4 Thus, in
the
private sphere, no obligation is owed to anyone unless it has been freely chosen, and,
even then, it is only owed to the limited number of individuals to whom the obligor
has freely chosen to make a commitment.
Social Contracts Protect Justice and Rule of Law
Social Contracts protect rule of law and procedural justice.
Michel Rosenfeld, 1985, Professor of Law, New York Law School, Contract and Justice: The Relation Between Classical Contract
Law and Social Contract Theory, Iowa Law Review, 70 Iowa L. Rev. 769, Lexis.
As we have seen, individualism gives rise to circumstances of justice. n60 To
look to individualism for
independent criteria of compensatory and distributive justice, however, is problematic
inasmuch as individualism is committed to allowing each individual to pursue his or her own conception of the good. If an
independent criterion of justice required any particular conception of the common
good, it would be bound to thwart some individual conceptions of the good and thus
contradict the normative aims of individualism. On the other hand, if compensatory and distributive
justice could be achieved by purely procedural means that would not require any
individual to abandon his or her own conception of the good, then individualism's
need for justice could presumably be fulfilled without sacrificing society's neutrality
toward individual conceptions of the good. Contract appears to supply the means towards purely
procedural justice in the context of an individualist society. Indeed, absent any objective or
intersubjective criterion of justice, using contract to achieve purely procedural justice has at least
two major advantages: it preserves individual autonomy while bringing about the
necessary degree of social cooperation, and it balances conflicting self-interests
without requiring any individual to compromise his or her conception of the good.
Social Contract Requires Protection of Citizen’s Property
A government must protect the property of its citizens
Casman, Betsey Sue. Master of Arts in Ethics and Policy Studies. 2011. "The Right to Privacy in Light of
the Patriot Act and Social Contract Theory".
http://digitalscholarship.unlv.edu/cgi/viewcontent.cgi?article=2087&context=thesesdissertations. Date
Accessed 7/21/13.
The power to protect property is ceded to the government. Locke describes this
commonwealth ; “And thus the commonwealth comes by a power to set down what
punishment shall belong to the several transgressions which they think worthy of it,
committed amongst the members of that society (which is the power of making laws) as
well as it has the power to punish any injury done unto any of its members by any one
that is not of it (which is the power of war and peace); and all this for the preservation of
the property of all the members of that society as far as possible” (Locke 2002, 39). This
is how Locke defines the extent of the power of government; it is to protect the property
of its members. Property is understood to mean life, liberty, and estate. Locke is quite
clear that the only role of this legislative control is that which emulates that which man
had in the state of nature. The protection of property of man (including his own life) is
that goal and nothing more
Conractarianism Protects Governments and Society
Contractarianism and Social Contracts protect the government and society.
Michel Rosenfeld, 1985, Professor of Law, New York Law School, Contract and Justice: The Relation Between Classical Contract
Law and Social Contract Theory, Iowa Law Review, 70 Iowa L. Rev. 769, Lexis.
The maximum potential for contract is reached under the contractarian paradigm. Indeed,
for the contractarian not
only is contract just, but it is just because it is contract. At the level of deep structure, then, the
contractarian vision postulates that to be just, human relationships must ultimately
be based on the mutual consent of all affected persons. The theory of the social contract naturally
complements such a vision. Social contract [*805] theory seeks to construct a philosophically
coherent account of the legitimacy of the state and of political institutions that
ultimately rests on the mutual consent of the governed. Moreover, the principal vehicle of the
contractarian vision is the contractual device which supplies the means for achieving pure procedural justice. Finally,
accompanying all this is a body of law that serves the contractarian aim of providing
each individual as much freedom to enter into, and to give shape to, contractual
relationships as is compatible with an equal freedom for every other individual. In
sum, the maximum potential of contract emerges from the deep structure of the
contractarian vision. In that context, the contractual device, social contract theory, and a body
of contract law supporting freedom of contract would work in harmony to achieve
the kind of purely procedural justice designed to bring about the optimal
equilibrium between autonomy and welfare.
A2: Utilitarianism Upholds Social Contract
Utilitarianism does not uphold the Social Contract- Impossible to know other’s
conception of good.
Michel Rosenfeld, 1985, Professor of Law, New York Law School, Contract and Justice: The Relation Between Classical Contract
Law and Social Contract Theory, Iowa Law Review, 70 Iowa L. Rev. 769, Lexis.
Another advantage of the contractarian position is that it respects each individual's
conception of the good. n175 Initially, utilitarianism may appear [*807] similarly committed,
but the process whereby the utilitarian arrives at the formulation of the common
good -- the use of the impartial spectator metaphor -- raises a vexing problem. In real life, the impartial
spectator would have to be an individual or a group of individuals and, as such, would lack two
attributes essential to the impartial spectator theory: thorough impartiality and complete empathy.
Indeed, it appears impossible for one individual, harboring his or her own conception of
the good, to reproduce another's conception of the good without filtering it through
his or her own notions. And even if that were possible, it is highly unlikely that one could exactly reproduce the quality and
intensity of another's emotions. Furthermore, allowing an individual to decipher and interpret
another's conception of the good appears just short of allowing that individual to
judge and criticize the other's perception of self-interest. Mill himself actually took that step by
making a distinction between individuals' "real" interests and their "apparent" interests. n176 Once this distinction is permitted, the
impartial spectators can use the dichotomy between real and apparent interests to impose their own conception of the good on others.
Thus, the
utilitarian appears less likely than the contractarian to promote strict
respect for individual conceptions of the good.
Justice
Kantian Justice Requires Restrictions on Freedom by Laws
Kantian conceptions of justice require external restrictions on freedom by laws to
prevent infringing on others’ freedom
Rosen, Allen D. , author “Kant’s Theory of Justice” 1993 published by Cornell university accessed:
7/21/13 http://books.google.com/books?id=U35BsCUu28C&printsec=frontcover&dq=kant's+theory+of+justice+allen+D.+rosen&hl=en&sa=X&ei=RkrsUe
upB6nYigKl_oGYAg&ved=0CC0Q6AEwAA#v=onepage&q=kant's%20theory%20of%20justice%20allen%20
D.%20rosen&f=false
The same underlying conception of justice is present in all of Kant’s laws and principles of justice. The
“universal law of justice” in the Rechtslehre, for instance, commands us to “act externally in such a
way that the free use of your will can be compatible with the freedom of everyone else according to a
universal law.” Employing much the same language, the “principle of innate freedom” in the
Rechtslehre asserts that “freedom (independence from the constrain of another’s will) insofar as it is
compatible with the freedom of everyone else in accordance with a universal law, is the sole and
original right that belongs to each human being by virtue of his humanity.” Again, in Theory and
Practice Kant defines justice as “the restriction of each individual’s freedom so that it harmonizes with
the freedom of everyone else (insofar as it is possible within the terms of a universal law).” All of
these principles, laws, and definitions express essentially the same thought: that justice is a condition
in which each individual’s external freedom is restricted so as to make it consistent with the free
freedom of all others in the framework of a common law or system of laws.
Upholding the “Common Good” is Impossible (1/2)
Upholding the “common good” is incompatible with a pluralistic society
Thomas Shanks, professor of applied ethics at Santa Clara university, 1992 (“the common good,” 1992
Issues in Ethics V5, N1. Accessed: 7/21/13
http://www.scu.edu/ethics/practicing/decision/commongood.html)
It might seem that since all citizens benefit from the common good, we would all willingly respond to
urgings that we each cooperate to establish and maintain the common good. But numerous observers
have identified a number of obstacles that hinder us, as a society, from successfully doing so.
First, according to some philosophers, the very idea of a common good is inconsistent with a pluralistic
society like ours. Different people have different ideas about what is worthwhile or what constitutes
"the good life for human beings", differences that have increased during the last few decades as the
voices of more and more previously silenced groups, such as women and minorities, have been heard.
Given these differences, some people urge, it will be impossible for us to agree on what particular
kind of social systems, institutions, and environments we will all pitch in to support.
And even if we agreed upon what we all valued, we would certainly disagree about the relative values
things have for us. While all may agree, for example, that an affordable health system, a healthy educational system, and a
clean environment are all parts of the common good, some will say that more should be invested in health than in education,
while others will favor directing resources to the environment over both health and education. Such disagreements are
bound to undercut our ability to evoke a sustained and widespread commitment to the common
good. In the face of such pluralism, efforts to bring about the common good can only lead to adopting
or promoting the views of some, while excluding others, violating the principle of treating people
equally. Moreover, such efforts would force everyone to support some specific notion of the common
good, violating the freedom of those who do not share in that goal, and inevitably leading to
paternalism (imposing one group's preference on others), tyranny, and oppression.
Upholding the “common good” is impossible because free riders will take advantage
of society’s benefits
Thomas Shanks, professor of applied ethics at Santa Clara university, 1992 (“the common good,” 1992
Issues in Ethics V5, N1. Accessed: 7/21/13
http://www.scu.edu/ethics/practicing/decision/commongood.html)
A second problem encountered by proponents of the common good is what is sometimes called the
"free-rider problem". The benefits that a common good provides are, as we noted, available to
everyone, including those who choose not to do their part to maintain the common good. Individuals
can become "free riders" by taking the benefits the common good provides while refusing to do their
part to support the common good. An adequate water supply, for example, is a common good from which all people benefit. But
to maintain an adequate supply of water during a drought, people must conserve water, which entails sacrifices. Some individuals may be
reluctant to do their share, however, since they know that so long as enough other people conserve, they can enjoy the benefits without
reducing their own consumption.
If enough people become free riders in this way, the common good which
depends on their support will be destroyed. Many observers believe that this is exactly what has
happened to many of our common goods, such as the environment or education, where the
reluctance of all person to support efforts to maintain the health of these systems has led to their
virtual collapse.
Upholding the “Common Good” is Impossible (2/2)
Upholding the “common good” is impossible because of society’s promotion of
individualism
Thomas Shanks, professor of applied ethics at Santa Clara university, 1992 (“the common good,” 1992
Issues in Ethics V5, N1. Accessed: 7/21/13
http://www.scu.edu/ethics/practicing/decision/commongood.html)
The third problem encountered by attempts to promote the common good is that of individualism. our
historical traditions place a high value on individual freedom, on personal rights, and on allowing each
person to "do her own thing". Our culture views society as comprised of separate independent
individuals who are free to pursue their own individual goals and interests without interference from
others. In this individualistic culture it is difficult, perhaps impossible, to convince people that they
should sacrifice some of their freedom, some of their personal goals, and some of their self-interest,
for the sake of the "common good". Our cultural traditions, in fact, reinforce the individual who thinks
that she should not have to contribute to the community's common good, but should be left free to
pursue her own personal ends.
Upholding the “common good” is impossible because of unequal burden sharing
Thomas Shanks, professor of applied ethics at Santa Clara university, 1992 (“the common good,” 1992
Issues in Ethics V5, N1. Accessed: 7/21/13
http://www.scu.edu/ethics/practicing/decision/commongood.html)
Finally, appeals to the common good are confronted by the problem of an unequal sharing of burdens.
Maintaining a common good often requires that particular individuals or particular groups bear costs
that are much greater than those borne by others. Maintaining an unpolluted environment, for example, may
require that particular firms that pollute install costly pollution control devices, undercutting profits. Making employment
opportunities more equal may require that some groups, such as white males, sacrifice their own employment chances. Making
the health system affordable and accessible to all may require that insurers accept lower premiums, that physicians accept
lower salaries, or that those with particularly costly diseases or conditions forego the medical treatment on which their live
depend. Forcing particular groups or individuals to carry such unequal burdens "for the sake of the
common good", is, at least arguably, unjust. Moreover, the prospect of having to carry such heavy and
unequal burdens leads such groups and individuals to resist any attempts to secure common goods.
Justice Balances Individualism and Cooperation
Justice serves to protect the contract of cooperation.
Michel Rosenfeld, 1985, Professor of Law, New York Law School, Contract and Justice: The Relation Between Classical Contract
Law and Social Contract Theory, Iowa Law Review, 70 Iowa L. Rev. 769, Lexis.
Logically, it is conceivable that there could be an individualist who would be completely self-sufficient and would interact with no one
else. Under these circumstances, which we might term circumstances of extreme individualism, there would be no need for justice or, for
that matter, for contract. If
we move away from extreme individualism to a situation in which
the individual cannot completely avoid interaction with others, circumstances of
justice then arise. n43 Circumstances of justice exist "whenever mutually disinterested
persons put forward conflicting claims to the division of social advantages under
conditions of moderate scarcity." n44 Indeed, if each individual in seeking to satisfy
his or her self-interest cannot [*780] avoid cooperating in some manner with other
individuals -- even if such cooperation involved only an agreement of mutual forbearance from interfering with each other's
pursuit of self-interest -- a conflict would develop between the need to cooperate and the
desire to achieve the maximum possible advantage from such cooperation. n45 Each
individual would be forced to cooperate with others in order to advance his or her
own self-interests, but would want to keep all the advantages derived from such
cooperation. In this context, the function of justice is to provide normatively compelling means to resolve this conflict. The role of
justice is to determine how the greater benefits created by social cooperation ought to be divided among the various individual members
of society. n46
Freedom/Liberty
Value of Freedom: Freedom and Liberty are Different
Freedom is not the same as liberty – Freedom has built-in restrictions that are key to
protecting people from infringing on the liberty of others
Cooray, PhD from Cambridge, 2012 ["What is Freedom." Dr. L.J. Mark Cooray; Noted Author LLB
(Hons)(Ceylon), Phd (Cambridge), Phd (Colombo) (2012)
http://www.ourcivilisation.com/cooray/cooray.htm; Date accessed: 7/23/13]
What is freedom? How is freedom related to liberty? Liberty conveys the idea of the right or the ability
of the individual to do what he wants. Freedom on the other hand is a word which contains inbuilt
restrictions. My freedom to swing my hands stops at my neighbour's nose. A free society contains
individuals who are free to do what they do, whilst respecting the freedoms of others. Freedom is the
liberty of the individual coupled with concern by the liberated individual for the liberties of others. ¶
Freedom cannot be defined, except through an analysis of the restrictions on human action. ¶
Therefore, the area of freedom available to the individual in any society is a residuary one. The
individual is at liberty to do what law and social custom do not forbid. Therefore, the content of the
restrictions on liberty are important. What distinguishes a free society from other societies is the
nature and extent of the legal and customary restrictions on freedom. ¶ Freedom can be defined only
in terms of the restrictions on freedom - and I show some of the legal restrictions on freedom which
historically evolved and were responsible for the rise of western civilisation are analysed in this paper.
Security
Human Security More Important than State Security
Human security takes priority of the security of the state
Axworthy, 2010 (Lloyd, Jan, 2010. Human Security and Global Governance: Putting People First,
Global Governance. http://www.jstor.org/stable/27800284) Date accessed: 7/26/13
Human security today puts people first and recognizes that their safety is integral to the promotion
and maintenance of international peace and security. The security of states is essential, but not
sufficient, to fully ensure the safety and well-being of the world's peoples. Several current challenges
are particularly compelling. One concerns the evolution of new links between local conflict and the
international economy and the impact of these perverse linkages on vulnerable communities.
Doubtless, high-value commodities like diamonds or oil can prolong and intensify conflict. Angola and
Sierra Leone demonstrate the extreme impact of personal greed on vulnerable populations. The Security
Council embargo on rough diamonds from Sierra Leone is a positive first step toward preventing the use
of profits from diamond sales to finance wars and crimes against civilians.
Government Must Not Violate Liberty
The Government should not intrude on any liberty unless the act itself is deemed
harmful.
Kent Greenawalt, 1989, Cardozo Professor of Jurisprudence, Columbia University, Free Speech Justifications, Columbia Law
Review, Vol. 89, No. 1. http://www.jstor.org/stable/1122730
A political principle of free speech is warranted only if reasons to protect speech go
beyond the reasons for a minimal principle of liberty. According to a minimal
principle of liberty, the government should not prohibit people from acting as they
wish unless it has a positive reason to do so. The ordinary reason for prohibiting
action is that the action is deemed harmful or potentially harmful in some respect; driving a car at 100 miles
per hour is forbidden because people are likely to get hurt. Although sometimes the government may
constrain behavior in order to compel some action that generates a benefit, or may
potentially gen- erate benefits, that subtlety will be disregarded in order to
concentrate on harm. What legitimately counts as "harm" is an important and con- troversial aspect of political theory,4 but
here the term is meant in an inclusive, nonrestrictive sense, including indirect harms, psychological harms, harms to the actor, and even
harms to the natural order. Thus, sexual intercourse between human beings and animals might be pro- hibited on the ground that it has
deleterious indirect effects on family life, is psychologically bad for the people involved, or is intrinsically unnatural. Since
governments have little apparent reason to prohibit action other than to prevent
harm the action may cause, an assumption that people should otherwise be left free
comes very close to being a princi- ple of rationality for governance. A challenge to the principle
is imagi- nable, but the theory of human nature and government it would represent would be most unattractive . Government
control of perfectly harmless actions like whistling in one's room might be a
technique to induce unquestioning obedience to government authority. In that event, the
prohibition would be designed to prevent some harm, such as "unhealthy" independent civic attitudes, but the harm would be un- related
to acts of whistling or their effects.5 Conceivably, such control of "neutral" matters may have a place in training techniques for highly
disciplined subgroups, such as monastic orders or military personnel, but accepting its appropriateness for regulating the general class
of citi- zens would be to embrace the kind of extreme totalitarianism suggested by fantasies like George Orwell's Nineteen Eighty Four.6
The alterna- tive-the "minimal principle of liberty"-is a fundamental premise of all "Western" governments, and in this modest form, is
probably ac- cepted as well by almost all authoritarian or dictatorial governments, whether of the right or the left.7 As
far as
speech is concerned, the minimal principle of liberty establishes that the
government should not interfere with communication that has no potential for harm.
To be significant, a principle of freedom of speech must go beyond this,8 positing
constraints on the regulation of speech that are more robust than constraints on the
regulation of other matters. A principle of free speech could establish more strin- gent constraints than the minimal
principle of liberty either by barring certain possible reasons for prohibition or by establishing a special value for speech. The latter way
is the easier to understand. If some human activities have special value, a good government will need stronger reasons to prohibit them
than to prohibit other activities. If speech has more positive value than acts of physical aggression, for ex- ample, more powerful reasons
will be needed to warrant its suppres- sion. A related but more subtle point is that legislatures or other political actors may be prone in
particular instances to undervalue cer- tain kinds of acts; were that true about speech, a principle of free speech might compensate for
that tendency. In effect, the principle would tell those involved in government that acts of speech should be assumed to have a higher
value than they seem to have in the immedi- ate context.
Meta-Ethics
Naturalism
Acting in accordance with natural facts is the meta-ethic for the round, and as such all
moral argumentation must be consistent with it. Moreover, naturalism best responds
to moral claims.
Papineau [Papineau, David, (Professor of Philosophy of Science at King's College) "Naturalism", (The Stanford Encyclopedia of
Philosophy)]
Realist moral
naturalism also seems better off than non-naturalist realism in two further respects. The first relates to
is hard to see how non-natural moral facts could have any motivating
force: after all, if such facts are incapable of having effects of any kind, they will a fortiori be incapable
of motivating human beings. True, moral motivation is not a straightforward matter for naturalist moral realists either: if moral facts
the motivating force of moral facts. It
are natural, then won't it be possible for someone to recognize their existence, yet not be correspondingly moved to action in any way?
However, there are various responses naturalist realists can make to this challenge. (Ridge 2006 Section 5, Lenman 2006 Section 2.) The other
point on which naturalist moral realists seem better placed than non-naturalists has to do with [in] explaining the supervenience of moral facts
on other facts. As
noted earlier, intuition seems to demands that two situations that are identical with
respect to physical properties will also be morally identical. For naturalists, this will follow from
general naturalist principles. Non-naturalists, by contrast, would seem to lack any obvious
explanation of why moral facts should so supervene on physical facts
Naturalism Determines Morality
Naturalism best responds to moral claims
Papineau [Papineau, David, (Professor of Philosophy of Science at King's College) "Naturalism", (The Stanford Encyclopedia of
Philosophy)]
Realist moral naturalism also seems better off than non-naturalist realism in two further respects. The first relates
to the motivating force of moral facts. It is hard to see how non-natural moral facts could have any motivating
force: after all, if such facts are incapable of having effects of any kind, they will a fortiori be incapable of
motivating human beings. True, moral motivation is not a straightforward matter for naturalist moral realists either: if moral facts are
natural, then won't it be possible for someone to recognize their existence, yet not be correspondingly moved to action in any way? However,
there are various responses naturalist realists can make to this challenge. (Ridge 2006 Section 5, Lenman 2006 Section 2.) The other point on
which naturalist moral realists seem better placed than non-naturalists has to do with [in] explaining the supervenience of moral facts on other
facts. As noted earlier, intuition
seems to demands that two situations that are identical with respect to
physical properties will also be morally identical. For naturalists, this will follow from general
naturalist principles. Non-naturalists, by contrast, would seem to lack any obvious explanation of why
moral facts should so supervene on physical facts
Heredity play a major role in our decision and moral actions as people based on how it
effects our environment.
Fontanilla Conrado , Staff analist, 8/26/12, Does Heredity Influence How Our Life Would Be?
http://conradofontanilla.hubpages.com/hub/Does-Genetics-Influence-Our-Life-Would-Be
It is difficult to separate the effect of heredity or genetics from that of environment. But let's assume
that that can be done. A person may have the genes to enable him to grow 6 ft tall but due to poverty
and inadequacy of food he grew only to 5.5 ft tall. The food is part of his environment. Other parts of his
environment are: relationship with parents, brothers or sisters if he has any, classmates, members of his congregation. He learns moral values
from them.¶ The phrase "would be" in the question pertains to moral values. A crocodile eats any smaller animal in its pond thus he dominates
the pond. Let's say it does not care whether its diet suffers of not. The crocodile is amoral. A man/woman may be imbued with moral values. He
knows what is good or bad according to his/her environment. His/her
genetics affect his/her capacity to learn and to
adapt to his/her environment. But his/her morals guide him/her what s/he "would be." His/her
genetics makes him/her what s/he "is." His/her environment makes him/her what s/he "would be."¶
For example, Einstein, derived from his genetic make up, had the capacity to come up with the formula E = mc2.. During World War II he feared
that Hitler's Germany might have used this formula to develop a powerful bomb as demonstrated by the V-2 rockets that Germany used to
bomb London in 1944. He wrote a letter to President Franklin D. Roosevelt of the U.S. and urged him to develop a bomb for use in retaliation
against Hitler's Germany in case it unleashed an atomic bomb.¶ Then the atomic bombs developed by the U.S were dropped over Nagasaki and
Hirosima killing thousands of Japanese civilians (not combatant soldiers) on the spot and maiming several others for life. Einstein was horrified.
He said that had he known that the atomic bomb would be used on civilians he would not have urged President Roosevelt to make them
(Einstein, A. Ideas and Opinions. 1954).¶ There is duality in man/woman. One part biological; the other moral. ¶ His/her
genetics
enables him to adapt to the environment. S/he is incapable of making his/her own food, unlike plants.
So s/he must eat plants to live. To live is part of "would be." That leads us to consider morality as scaled in degrees.
Eating plant may not arouse some sense of guilt, as a plant is also a creature. Or munching seeds of peanut may give us some pleasure when in
fact we are killing germinal life. Up the ladder, if there is such a moral ladder, consider the consumption of chicken meat. We kill the chicken
when we prepare it for cooking and consumption. Yet we, except some people, do not feel a moral compunction about it.
Hardwired For Survival
Humans are naturally aware of biological survival risks
Jeanna Bryner, staff analyst and editor, 9/24/07, Modern Humans Retain Caveman Survival Instincts, live science,
http://www.livescience.com/4631-modern-humans-retain-caveman-survival-instincts.html Date accessed- 7/16/13
Like hunter-gatherers in the jungle, modern humans are still experts at spotting predators and prey,
despite the developed world's safe suburbs and indoor lifestyle, a new study suggests. ¶ The research, published online this week in the
Proceedings of the National Academy of Sciences , reveals that humans today are hard-wired to pay attention to other people and animals
much more so than non-living things, even if inanimate objects are the primary hazards for modern, urbanized folks. ¶ The researchers
say the finding supports the idea that natural selection molded mechanisms into our ancestors' brains that were
specialized for paying attention to humans and other animals. These adaptive traits were then passed on to
us. ¶ "We're assuming that natural selection takes a long time to build anything anew and that's why this is left over from our past," said study
team member Leda Cosmides, an evolutionary psychologist at the University of California, Santa Barbara (UCSB). ¶ Ancestor's eyes ¶ Immersed
in a
rich, biotic environment, it would have been imperative for our ancestors to monitor both humans
and non-human animals. Predators and prey took many different forms—lions, tigers and bears—and they changed often, so
constant eyeballing was critical. ¶ While the environment has changed since then, with high-rises emerging where forests once took root and
pampered pets taking the place of stalking beasts, our instinct-driven attention has not followed suit. ¶ "Having
this pop-out
attentional bias for animals is sort of a vestigial behavior," said study team member Joshua New of Yale University's
Perception and Cognition Lab. ¶ In the study, groups of undergraduate students from UCSB, watched images displayed on computer
monitors. The flashing images alternated between pairs of various outdoor scenes, with the first image
showing one scene and the next an alternate version of that scene with one change. Participants
indicated each time whether they detected a change. ¶ The photographs included animate categories, such as people and
other animals, as well as inanimate ones, such as plants, artifacts that can be manipulated (stapler or wheelbarrow) and fixed artifacts, such as
landmarks (windmill or house). ¶ Modern hunter-gatherers ¶ Overall,
the subjects were faster and more accurate at
detecting changes involving all animals compared with inanimate objects. They correctly detected nearly 90
percent of the changes to "living" targets compared with 66 percent for inanimate objects. ¶ In particular, the students spotted changes in
elephant and human scenes 100 percent of the time, while they had a success rate of just over 75 percent for photos showing a silo and 67
percent for those with a coffee mug. ¶ Though we are more likely to meet death via an SUV than a charging wildebeest, the results indicated
subjects were slower and less successful at detecting changes to vehicles than to animals. ¶ The researchers compare our attentional bias
toward animals to the appendix, an organ present in modern humans because it was useful for our ancestors, but useless now. ¶ These results
have implications for phobias and other behaviors that involve focus toward specific categories of objects over others. ¶ "People develop
phobias for spiders and snakes and things that were ancestral threats. It's very infrequent to have somebody afraid of cars or electrical outlets,"
New told LiveScience . "Those statistically pose much more of a threat to us than a tiger. That makes it an interesting test case as to why do
tigers still capture attention."
Error Theory
Error Theory Guides Morality
ERROR THEORY DEMANDS THE EPISTEMIC REASON BE SEPARATE FROM MORALITY
Rowland, Richard., Journal on Ethics on Social Philosophy, January 2013, Moral Error Theory and the Arguments from Epistemic
Reasons, http://www.jesp.org/PDF/Moral%20Error%20Theory_final.pdf
Error theorists are not skeptical of hypothetical reasons.10 But they hold ¶ that if there are only
hypothetical reasons, our understanding of morality ¶ is radically mistaken, because our
understanding of morality entails that ¶ there are categorical reasons.¶ 11 However, our understanding
of epistemic ¶ reasons and justification also entails that there are categorical reasons. As ¶ I said, it seems
that there is reason for everyone to believe that dinosaurs ¶ once roamed the earth regardless of what
they want to believe; there ¶ would still be reason for me to believe that I am in my office writing right
¶ now even if believing this made me extremely unhappy or did not promote any of my desires. Two
agents in the same epistemic situation seem ¶ to have the same epistemic reasons, regardless of their
desires or goals or the roles that they find themselves in, just as two people who see a child ¶
drowning seem to have moral reasons to save the child regardless of their ¶ desires, goals or roles. So,
if there are only hypothetical reasons for belief, ¶ our understanding of epistemic reasons is just as
badly mistaken as our ¶ understanding of morality and moral reasons is if there are only hypothetical
reasons for action.
There is a nuanced difference between nihilism and Error Theory, the later concedes
that we try to make moral jdugements.
Joyce, Richard., Entry for Encyclopedia of Ethics, 2013, “NIHILISM”, Encyclopedia,
http://www.victoria.ac.nz/staff/richard_joyce/acrobat/joyce_nihilism.pdf
Even restricting attention to “moral
nihilism,” matters remain indeterminate. Its most ¶ prominent usage in the field of
metaethics treats it as a synonym for “error theory,” therefore ¶ an entry that said only “Nihilism: see ERROR THEORY”
would not be badly misleading. ¶ This would identify moral nihilism as the metaethical view that moral
discourse consists of ¶ assertions that systematically fail to secure the truth. (See Mackie 1977; Joyce
2001.) ¶ A broader definition of “nihilism” would be “the view that there are no moral facts.” This ¶ is
broader because it covers not only the error theory but also noncognitivism (see¶ NONCOGNITIVISM).
Both these theories deny that there are moral facts—the difference ¶ being that the error theorist
thinks that in making moral judgments we try to state facts (but ¶ fail to do so, because there are no
facts of the type in question), whereas the noncognitivist ¶ thinks that in making moral judgments we
do not even try to state facts (because, for ¶ example, these judgments are really veiled commands or
expressions of desire). (In ¶ characterizing noncognitivism in this way, I am sidelining various linguistic permissions that ¶ may be
earned via the quasi-realist program (see QUASI-REALISM).) While it is not ¶ uncommon to see “nihilism” defined in this broader way, few
contemporary noncognitivists ¶ think of themselves as “nihilists,” so it is reasonable to suspect that the extra breadth of the ¶ definition is often
unintentional.
NEITZSCHE SUPPORTS ERROR THEORY
Joyce, Richard., Entry for Encyclopedia of Ethics, 2013, “NIHILISM”, Encyclopedia,
http://www.victoria.ac.nz/staff/richard_joyce/acrobat/joyce_nihilism.pdf
Various eighteenth- and nineteenth-century continental philosophers (e.g., Schopenhauer, Feuerbach,
Fichte, Kierkegaard) are associated in one way or another with nihilism, though their nihilistic streaks
tend to be each so sui generis as to defy easy categorization. Even Nietzsche, who is often treated as a
kind of grandfather of European nihilism, is extremely different to classify (see NIETZSCHE,
FRIEDRICH). In certain moods he seems to be clearly advocating an error theory (moral nihilism). In
Twilight of the Idols he writes: There are absolutely no moral facts. What moral and religious
judgments have in common is the belief in things that are not real. Morality is just an interpretation of
certain phenomena or (more accurately) a misinterpretation. (1889, VIII.1 / 2005: 182)
MORAL ERROR THEORY REJECTS FIRST-ORDER MORAL CLAIMS
Olson, Jonas., Department of Philosophy at Stockholm University, 2010, Error Theory and Reasons to Believe,
people.su.se/~jolso/papers/DefMETapril2010.doc
according to
moral error theory, first-order moral claims are uniformly false. First-order moral claims are claims
that entail something about what some agent morally ought to do or not to do, what would be
morally permissible or impermissible for some agent to do or not to do, what there is moral reasons
for some agent to do or not to do, and the like; or what would be morally good (bad) or morally
(un)desirable, and the like. Hence, if error theory is correct, the claim that, e.g., torture is wrong is
false. But the law of the excluded middle entails that if it is false that torture is wrong, it is true that
torture is not wrong. And the negative claim that torture is not wrong appears to entail that torture is
morally permissible, which is clearly a first-order moral claim. This suggests that contrary to the
contentions of many moral error theorists, moral error theory does have distinctive first-order moral
implications. And rather vulgar ones at that; anything turns out to be morally permissible! I shall not attempt
to resolve this issue here. I note merely that one possible strategy for sidestepping this problem is to
opt for a version of moral error theory that says that first-order moral claims rest on false
presuppositions and are therefore uniformly neither true nor false. In order not to exclude this
version of moral error theory, I shall take moral error theory to be the view that no first-order moral
claim is true. Analogously, I shall take epistemic error theory to be the view that no first-order
epistemic claim is true, where first-order epistemic claims are claims to the effect that there are
epistemic reasons for some agent to believe or not to believe some proposition or that believing some
proposition is or would be permissible or impermissible, and the like.
Before I get started I need to make a brief preliminary remark about formulations of error theories. It is routinely said that
Quasi- Realism
QUASI-REALISM BAD BECAUSE IT LEGITAMIZES CONTRADICTING ETHICS
Moore, A.W., Philosopher of Philosophy at St. Hugh’s College, July 2002, Quasi-Realism and Relativism,
http://users.ox.ac.uk/~shug0255/pdf_files/quasi-realism-and-relativism.pdf
If it is true that ‘an ethic is the propositional reflection of the dispositions ¶ and attitudes, policies and
stances, of people,’ as Simon Blackburn says in ¶ summary of the quasi-realism that he champions in this excellent and wonder- ¶ fully
provocative book (p. 310), then it seems to follow that different dispo- ¶ sitions, attitudes, policies and
stances-different conative stares, for ¶ short-will issue in different ethics, each with an equal claim to
truth; and ¶ this in turn seems to be one thing that could be reasonably meant by that ¶ slippery
polyseme ‘relativism’. If such relativism does follow, a good deal ¶ remains to be said about how much
force it has. At the limit it might do no ¶ more than signal the abstract possibility of an ethic rivalling
that of humans. ¶ More potently, it might somehow legitimize the different ethics of different ¶ groups
of humans in actual conflict with one another. But without the possibility of some such variability of
ethic to match a possible variability of ¶ conative state, the quasi-realist’s claim that an ethic ‘reflects’
a particular ¶ combination of conative states appears hollow.
OUR COGNATIVE STATES EFFECT OUR MORAL STANDARDS
Moore, A.W., Philosopher of Philosophy at St. Hugh’s College, July 2002, Quasi-Realism and Relativism,
http://users.ox.ac.uk/~shug0255/pdf_files/quasi-realism-and-relativism.pdf
The relativism in question is not the view that, had our conative states been different, different ethical
standards might have applied; Blackburn has persistently and persuasively argued that he is not committed to anything like that.
Nor is it the view that, had our conative states been different, we might have applied different ethical
standards; that is a platitude (and scarcely merits the label ‘relativism’). The view is something lying
subtly between these, ¶ namely that, had our conative states been different, we might have applied
different ethical standards and it might have been right for us to do so; we might have had different
ethical beliefs and those different ethical beliefs ¶ might have been true.
Legality
Law Determines Morality
Legality is the base of societal morals
George C. Christie. ON THE MORAL OBLIGATION TO OBEY THELAW. Duke Law Journal December, 1990.
There is, however, an epistemologically more basic point that can be made here. The stark separation between law and morality-the
assumption that the law does not affect morality-is simply untenable. In particular, I wish to assert that the prevailing public morality
of
any society is very definitely influenced by the law. 2 4 No serious observer of American society over the past thirty years,
and certainly no one who has spent a substantial portion of that time in the South, can have any doubt that decisions like Brown v. Board of
Education 25 and federal civil rights legislation
have profoundly influenced public perceptions as to the morality
of segregation. Furthermore, notions as to what constitutes "theft," "fraud," or "stealing" are profoundly
influenced by legal analysis-indeed, "theft" and "fraud" are legal terms of art. My argument, of course, is not
that we should go to the opposite extreme and deny the force of morality in the law; instead, I wish to argue that the two are
inseparable: It is a chicken-and-egg situation. Many of the writers I have mentioned, for example, use the act of promising as
an illustration of the kind of activity that generates moral obligations. Yet, in their often extended discussions as to when promises create
binding moral obligations, they curiously fall back on the analysis used by lawyers to determine whether contracts are legally binding. To
demonstrate that promises create moral obligations in certain circumstances, these writers sometimes cite actual legal decisions and legal
treatises, and they even cite the Uniform Commercial Code and the Restatement of Contracts. 2 6 Some of them even expressly adopt the legal
position that promissory obligations are ultimately created by the reasonable objective expectations of the other parties to the transaction and
not by the actual subjective intent of the alleged promisor 2 7 If the critics of legal obligation are telling us anything, it appears to be that if a
promise creates a legal obligation, it also creates a moral obligation. The example of promising
also shows that the separation of morally significant matters (in which moral obligations
supply the needed direc- tion) from the problems of social coordination in a complex
world (in which law sometimes shows the way) is simply untenable. In a complex world,
everything is a matter of social coordination, as the practice of promising demonstrates.
The point can be made even more decisively by taking a situation that would appear
to provide one of the paradigmatic examples of morality, in and of itself, providing a
sufficient basis of obli- gation, namely, the circumstances under which the killing of
another human being is permissible. It is instructive to note that, when Raz dis- cusses this situation, he talks
of "laws prescribing behaviour which is morally obligatory independently of the law (e.g. prohibiting murder, The example of
promising also shows that the separation of morally significant matters (in which moral obligations supply the needed direction) from the problems of social coordination in a complex world (in which law sometimes shows the way) is simply
untenable. In a complex world, everything is a matter of social coordination, as the practice of promising demonstrates. The
point can be made even more decisively by taking a situation that would appear to provide one of the paradigmatic
examples of morality, in and of itself, providing a sufficient basis of obli- gation, namely, the circumstances under which the
killing of another human being is permissible. It is instructive to note that, when Raz discusses this situation, he talks of
"laws prescribing behaviour which is morally obligatory independently of the law (e.g. prohibiting murder,
Rule of Law
The rule of is necessary to limit abuses of the majority.
Michael Meyer-Resende is a director of Democracy Reporting International, a Berlin-based group promoting
political participation.
09 Democracy Reporting International
http://www.democracy-reporting.org/files/essential_elements_of_democracy_2.pdf date accessed
7/20/13 Democracy Reporting International
There are few definitions of the rule of law in the context of international instruments related to ensuring democratic practices within states.30
Nonetheless, its core meaning is clear. That is, the
rule of law commits all public authorities to comply with
independently and impartially administered legal and justice systems, such that states make
continuous efforts ¶ ‘[g]uaranteeing that no individual or public or private institution is above the
law’.31 Sometimes the rule of law is narrowly construed as an efficient and effective system of justice and
law enforcement. Beyond that, it is also interpreted to imply certain standards for ¶ the legislative process, namely that this should be
an open and transparent process that reflects the will of the people and the outcomes of which are public and freely available. Increasingly, the
rule of law is seen through a broader conceptual framework ¶ that links it to human rights and democratic order; e.g., UN Human Rights
Commission resolution on democracy and the rule of law (resolution 2005/32), the OSCE Copenhagen 1990 commitments and the Charter of
Paris for a New Europe. ¶ As
an inherent element of democracy, the rule of law therefore indicates that the
will of the majority has clear and certain limits, not only in the form of universal human rights, but
also in relation to the constitutional framework of a state. Consequently, for example, public referenda should not be
used to overrule constitutional provisions.
Rule of law ensures security and democracy
Gabriel Marcella, teaches strategy in the Department of National Security and Strategy of the United
States Army War College, Carlisle, Pennsylvania. The Imperative of the Rule of Law in the Democratic
State.¶ DEMOCRATIC GOVERNANCE AND THE RULE ¶ OF LAW:¶ LESSONS FROM COLOMBIA. December
2009 date accessed 7/20/13 http://www.StrategicStudiesInstitute.army.mil/
¶ Any discussion of democratic governance in conflicted societies must begin with security and the ¶
rule of law. Although security, state presence, and social and economic progress are all important
mutually ¶ reinforcing elements in establishing a government’s authority and legitimacy, it is the rule
of law and its ¶ acceptance by the people that binds them all together. Democracy is not possible
without security, and ¶ security without the rule of law is a Hobbesian hell. Achieving security and the rule of law
requires political ¶ will, resources, and time to repair and build institutions and develop the rules of democratic community that ¶ are generally
accepted by the populace. That
is why the Constitution of the United States and the Declaration ¶ of
Independence are such singular documents. They codified a long process of institutional and political ¶
development that began before the Magna Carta in 1215 and ultimately transformed 13 colonies into a ¶ democratic state that survived a
great civil war and is still evolving in the 21st century. Indeed, the Magna ¶ Carta was itself the result of the security and enforcement of the
King’s Law, established by English monarchs as early as Henry II (1154-89). Within the security provided by the Magna Carta, the barons took
the first steps towards what eventually became widespread parliamentary democracy.
The rule of law makes democracy work
because law is the collective will of society, making possible the monopoly on the legitimate use of force, equal rights, and social
order. Six elements comprise the rule of law: order and security, legitimacy, and checks.
Download