1AC - Kavya Chaturvedi and Eve Robinson

advertisement
Plan
In the absence of an individually-tailored warrant obtained via use of a specific
selector term, federal intelligence agencies should cease collection of domestic phone,
internet, email, and associated electronic records. This should include ending the
monitoring of United States persons under Sections 214 and 215 of the USA PATRIOT
Act; Executive Order 12333; and Section 702 of the FISA Amendments Act.
Advantage 1: HUMINT
The squo relies Big Data surveillance. That means info overload & less HUMINT.
Volz, 14
(Dustin, The National Journal, “Snowden: Overreliance on Mass Surveillance Abetted Boston Marathon Bombing: The former
NSA contractor says a focus on mass surveillance is impeding traditional intelligence-gathering efforts—and allowing terrorists
to succeed”, October 20, 2014, ak.)
Edward Snowden on Monday suggested
that if the National Security Agency focused more on traditional
intelligence gathering—and less on its mass-surveillance programs—it could have thwarted the 2013
Boston Marathon bombings. The fugitive leaker, speaking via video to a Harvard class, said that a
preoccupation with collecting bulk communications data has led to resource constraints at U.S.
intelligence agencies, often leaving more traditional, targeted methods of spying on the back burner. "We
miss attacks, we miss leads, and investigations fail because when the government is doing its 'collect it
all,' where we're watching everybody, we're not seeing anything with specificity because it is impossible to
keep an eye on all of your targets," Snowden told Harvard professor and Internet freedom activist Lawrence Lessig. "A good
example of this is, actually, the Boston Marathon bombings." Snowden said that Dzhokhar and Tamerlan Tsarnaev were pointed out by
Russian intelligence to U.S. officials prior to the bombings last year that killed three and left hundreds wounded, but
that such actionable intelligence was largely ignored. He argued that targeted surveillance on known
extremists and diligent pursuit of intelligence leads provides for better counterterrorism efforts than
mass spying. "We didn't really watch these guys and the question is, why?" Snowden asked. "The reality of that is
because we do have finite resources and the question is, should we be spending 10 billion dollars a year on
mass-surveillance programs of the NSA to the extent that we no longer have effective means of traditional
[targeting]?" Anti-spying activists have frequently argued that bulk data collection has no record of
successfully thwarting a terrorist attack, a line of argument some federal judges reviewing the NSA's programs have also used
in their legal reviews of the activities. Snowden's suggestion—that such mass surveillance has not only failed to directly stop
a threat, but actually makes the U.S. less safe by distracting resource-strapped intelligence officials from
performing their jobs—takes his criticism of spy programs to a new level. "We're watching everybody that we have no
reason to be watching simply because it may have value, at the expense of being able to watch specific people
for which we have a specific cause for investigating, and that's something that we need to look carefully
at how to balance," Snowden said.
Big Data kills human-intel – which is key to overall US operations.
Margolis ‘13
Gabriel Margolis – the author presently holds a Master of Arts (MA) in Conflict Management & Resolution from UNC
Wilmington and in his final semester of the program when this article was published in the peer-reviewed journal Global
Security Studies . Global Security Studies (GSS) is a premier academic and professional journal for strategic issues involving
international security affairs. All articles submitted to and published in Global Security Studies (GSS) undergo a rigorous, peerreviewed process. From the article: “The Lack of HUMINT: A Recurring Intelligence Problem” - Global Security Studies - Spring
2013, Volume 4, Issue 2http://globalsecuritystudies.com/Margolis%20Intelligence%20(ag%20edits).pdf
The United States has accumulated an unequivocal ability to collect intelligence as a result of the technological advances of the 20th
century. Numerous methods of collection have been employed in clandestine operations around the world
including those that focus on human, signals, geospatial, and measurements and signals intelligence. An infatuation
with technological methods of intelligence gathering has developed within many intelligence organizations, often
leaving the age old practice of espionage as an afterthought. As a result of the focus on technical methods, some of
the worst intelligence failures of the 20th century can be attributed to an absence of human intelligence. The
21st century has ushered in advances in technology have allowed UAVs to become the ultimate technical intelligence gathering
platform; however human intelligence is still being neglected. The increasing reliance on UAVs will make
the United States susceptible to intelligence failures unless human intelligence can be properly
integrated. In the near future UAVs may be able to gather human level intelligence, but it will be a long time before classical espionage is a
thing of the past.
HUMINT key to success to counter state and non-state threats.
Wilkinson ‘13
Kevin R. Wilkinson – United States Army War College. The author is a former Counterintelligence Company Commander, 205th
Military Intelligence Battalion. This thesis paper was overseen by Professor Charles D. Allen of the Department of Command
Leadership and Management. This manuscript is submitted in partial fulfillment of the requirements of the Master of Strategic
Studies Degree. The U.S. Army War College is accredited by the Commission on Higher Education of the Middle States
Association of Colleges and Schools – “Unparalleled Need: Human Intelligence Collectors in the United States Army” - March
2013 - http://www.dtic.mil/cgi-bin/GetTRDoc?AD=ADA590270
In the twenty-first century, the role of HUMINT is more important than ever. As employed during the Cold War, a
significant portion of intelligence was collected using SIGINT and GEOINT methods. The COE assessment now discerns a hybrid threat encompassing both
conventional and asymmetric warfare, which is difficult to obtain using SIGINT and GEOINT alone. Unlike
environmental conditions
other intelligence collection disciplines,
such as weather or terrain do not hinder HUMINT collectors.12 HUMINT collection played a key role
during Operation IRAQI FREEDOM. OIF was initially a force-on-force ground war using traditional maneuver forces. After six months of
conventional
conflict and on the verge of defeat, the Iraqi armed forces, with the assistance of insurgents, employed asymmetrical warfare . The
continuation of conventional warfare paired with the asymmetric threat created a hybrid threat. HUMINT is effective when
countering a conventional threat that consists of large signatures, such as discerning troop movement. However, it becomes
invaluable when presented with an asymmetrical threat that entails a smaller signature, such as focusing
on groups of insurgents, which other intelligence collection disciplines cannot solely collect on.
Nuclear use is coming. HUMINT key to stay-ahead of these risks.
Johnson ‘9
Dr. Loch K. Johnson is Regents Professor of Political Science at the University of Georgia. He is editor of the journal "Intelligence
and National Security" and has written numerous books on American foreign policy. Dr. Johnson served as staff director of the
House Subcommittee on Intelligence Oversight from 1977 to 1979. Dr. Johnson earned his Ph.D. in political science from the
University of California at Riverside. "Evaluating "Humint": The Role of Foreign Agents in U.S. Security" Paper presented at the
annual meeting of the ISA's 50th ANNUAL CONVENTION "EXPLORING THE PAST, ANTICIPATING THE FUTURE", New York
Marriott Marquis, NEW YORK CITY, NY, USA, Feb 15, 2009 – available via:
http://citation.allacademic.com/meta/p_mla_apa_research_citation/3/1/0/6/6/p310665_index.html
The world is a dangerous place , plagued by the presence of terrorist cells; failed or failing states; competition for
scarce resources, such as oil, water, uranium, and food; chemical, biological, and nuclear weapons, not to mention
bristling arsenals of conventional armaments; and deep-seated animosities between rival nations and factions. For selfprotection, if for no other reason, government officials leaders seek information about the capabilities and—an especially
elusive topic—the intentions of those overseas (or subversives at home) who can inflict harm upon the nation.
That is the core purpose of espionage: to gather information about threats, whether external or internal, and to warn
leaders about perils facing the homeland. Further, the secret services hope to provide leaders with data that can help advance the
national interest—the opportunity side of the security equation. Through the practice of espionage—spying
or clandestine human intelligence : whichever is one's favorite term—the central task, stated baldly, is to steal secrets
from adversaries as a means for achieving a more thorough understanding of threats and opportunities in the world.
National governments study information that is available in the public domain (Chinese newspapers, for example),
but knowledge gaps are bound to arise. A favorite metaphor for intelligence is the jigsaw puzzle. Many of the pieces to the
puzzle are available in the stacks of the Library of Congress or on the Internet; nevertheless, there will continue to be several
missing pieces— perhaps the most important ones. They may be hidden away in Kremlin vaults or in caves where members
of Al Qaeda hunker down in Pakistan's western frontier. The public pieces of the puzzle can be acquired through careful research; but often
discovery of the missing secret pieces has to rely on spying, if they can be found at all. Some things— "mysteries" in the argot
of intelligence professionals—are unknowable in any definitive way, such as who is likely to replace the current leader of North Korea. Secrets,
in contrast, may be uncovered with a combination of luck and skill—say, the number of Chinese nuclear-armed submarines, which are
vulnerable to satellite and sonar tracking. Espionage
can be pursued by way of human agents or with machines,
respectively known inside America's secret agencies as human intelligence ("humint," in the acronym) and
technical intelligence ("techint"). Humint consists of spy rings that rely on foreign agents or "assets" in the field, recruited by intelligence
professionals (known as case officers during the Cold War or. in more current jargon, operations officers). -_ Techint
includes
mechanical devises large and small, including satellites the size of Greyhound buses, equipped with fancy cameras and listening devices
that can see and hear acutely from orbits deep in space; reconnaissance aircraft, most famously the U-2; unmanned aerial vehicles (UAVs) or
drones, such as the Predator—often armed with Hellfire missiles, allowing the option to kill what its handlers have just spotted through the lens
of an onboard camera); enormous ground-based listening antennae, aimed at enemy territory: listening devices clamped surreptitiously on
fiber-optic communications cables that carry telephone conversations; and miniature listening "bugs" concealed within sparkling cut-glass
chandeliers in foreign embassies or palaces. Techint attracts the most funding in Washington, D.C. (machines are costly,
especially heavy satellites that must be launched into space), by a ratio of some nine-to-one over humint in America's widely estimated S50
billion annual intelligence budget. Human spies, though, continue to be recruited by the United States in most every region of the globe. Some
critics contend that these spies contribute little to the knowledge of Washington officials about the state of international affairs; other
authorities maintain, though, that only
human agents can provide insights into that most vital of all national
security questions: the intentions of one's rivals— especially those adversaries who are well armed and
hostile. The purpose of this essay is to examine the value of humint, based on a review7 of the research literature on intelligence, survey
data, and the author's interviews with individuals in the espionage trade. The essay is organized in the following manner: it opens with a primer
on the purpose, structure, and methods of humint; then examines some empirical data on its value; surveys more broadly the pros and cons of
this approach to spying; and concludes with an overall judgment about the value of agents for a nation's security.
Humint key to verification of nuclear weaponization in North Korea.
Johnson ‘9
Dr. Loch K. Johnson is Regents Professor of Political Science at the University of Georgia. He is editor of the journal "Intelligence
and National Security" and has written numerous books on American foreign policy. Dr. Johnson served as staff director of the
House Subcommittee on Intelligence Oversight from 1977 to 1979. Dr. Johnson earned his Ph.D. in political science from the
University of California at Riverside. "Evaluating "Humint": The Role of Foreign Agents in U.S. Security" Paper presented at the
annual meeting of the ISA's 50th ANNUAL CONVENTION "EXPLORING THE PAST, ANTICIPATING THE FUTURE", New York
Marriott Marquis, NEW YORK CITY, NY, USA, Feb 15, 2009 – available via:
http://citation.allacademic.com/meta/p_mla_apa_research_citation/3/1/0/6/6/p310665_index.html
Despite the many negative critiques of humint, former DCI Tenet emphasizes that intelligence is still "primarily a
human endeavor.” — He is obviously not referring to the government's intelligence budget priorities. Recall that the United
States devotes only a small percentage of its annual intelligence budget to human spying. — Spy machines are costly,
while human agents are relatively inexpensive to hire and sustain on an annual stipend. One of the ironies of American
intelligence is that the vast percentage of its spending goes into expensive intelligence hardware, especially
surveillance satellites, even though the value of these machines is questionable in helping the United States
understand such contemporary global concerns as terrorism or China's economic might. Cameras mounted on satellites
or airplanes are unable to peer inside the canvas tents, mud huts, or mountain caves in Afghanistan or Pakistan where terrorists
plan their lethal operations, or into the deep underground caverns where North Koreans construct atomic weapons.
"Space cameras cannot see into factories where missiles are made, or into the sheds of shipyards," writes an intelligence expert.
"Photographs cannot tell whether stacks of drums
outside an assumed chemical-warfare plant contain nerve gas or
oil, or whether they are empty” — _As a U.S. intelligence officer has observed, we need "to know what's inside the
building, not what the building looks like”.
Effective verification creates deals that stop prolif.
Hernandez 13 – Research Associate, Monterey Institute of International Studies (Jason, “Proliferation
Pathways to a North Korean Intercontinental Ballistic Missile”, Nuclear Threat Initiative, Dec. 20, 2013)
RMT
During the Clinton Administration, the United States and
North Korea came extremely close to concluding a "Missile Deal" that would
testing of increasingly longer-range missiles. However, the deal never came to
fruition, and under the Bush Administration it was scrapped completely. One of the primary issues for both the Clinton and Bush administrations was
monitoring and verification. The United States sought a comprehensive monitoring and verification regime that would have permitted U.S.
have halted North Korean development, production, and
inspectors on-site access to rocket and missile facilities, while North Korea believed that the United States could accomplish verification through imagery analysis
and other national technical means. [20] It is therefore likely that any future missile deal negotiations
will focus heavily upon verification.
Detection and Monitoring Any advances in rocket technology using the three pathways described above will require numerous tests before the
missile can be accepted into service and deployed. Given North Korea's limited geographical size, all long-range missile tests will result in
debris falling into international waters. For the December 2012 Unha-3 launch, the rocket's first stage fell into the Yellow Sea, and the second fell off the
coast of the Philippines. By recovering the first stage debris, South Korea was able to confirm some facts about the Unha, while discovering new data that indicated
progress in the Unha's design. The debris demonstrated continued areas of struggle and primitive design elements, such as in the propellant, airframe, and welding,
while also showing program advancements and new design elements, such as the use of steering engines in place of jet vanes for orientation. [21] It is reasonable to
assume that over the course of a testing program, debris will be recovered to enlighten the world on the progress of North Korea's missile program. New
deployment methods, such as the use of silos or road-mobile launchers in pathways two or three will not necessarily be
detected. While the construction of silos could be detected by satellite imagery analysis, it is not guaranteed that the international community would detect
every silo. Iran's Shahab silos went unnoticed in the open source until displayed on Iranian media during the Great Prophet 6 military exercises. [22] A road-mobile
TD-2/Unha would seemingly go undetected unless paraded or displayed publically. The KN-08 was unknown in the open source until it was displayed at the April
2012 military parade in Pyongyang. Deployments and launches of silo-based or road-mobile TD-2/Unha's would be very difficult to detect and monitor. Verification
The issue of verification is complex, and any missile
deal will undoubtedly cover the entirety of North Korea's missile production, from
battlefield and short-range ballistic missiles to space launch vehicles and ICBMs. However, this brief will only address the relationship between a missile deal and
the three pathways to an ICBM. For the purpose of this section, the author assumes that a future missile deal
will either aim to prevent or reverse a
missile program in four key areas: development; manufacturing and production; acquisition; and deployment. The question becomes for each of the three
pathways to an ICBM, can the international community verify that North Korea is abiding by a deal that prevents or reverses 1) development; 2) manufacturing and
production; and 3) deployment of an ICBM?
North Korea prolif is accelerating now- recent submarine tests
Huessy 6/11 (Peter, 2015, Peter Huessy is President of GeoStrategic Analysis, founded in 1981, and the senior defense consultant at the
Air Force Association and National Security Fellow at the American Foreign Policy Council, “North Korea's Serious New Nuclear Missile Threat,”
http://www.gatestoneinstitute.org/5914/north-korea-nuclear-missile)//RTF
North Korea appears to have made significant progress in extending its capability as a nuclear-armed
rogue nation, to where its missiles may become capable of hitting American cities with little or no
warning. What new evidence makes such a threat compelling? North Korea claims to have nuclear warheads small
enough to fit on their ballistic missiles and missiles capable of being launched from a submerged platform such as a submarine.
Shortly after North Korea's April 22, 2015 missile test, which heightened international concern about the military capabilities of North Korea,
U.S. Secretary of State John Kerry urged China and our regional allies to restart the 2003 "six-party talks" aimed at eliminating nuclear weapons
from the Korean peninsula and reining in North Korea's expanding nuclear missile program. There are
some "experts," however,
who believe that North Korea's threat is highly exaggerated and poses no immediate danger to the
United States. Consequently, many believe that, given China's oft-repeated support for a "nuclear weapons free" Korean peninsula, time is
on America's side to get an agreement that will guarantee just such a full de-nuclearization. But, if North Korea's technical
advances are substantive, its missiles, armed with small nuclear weapons, might soon be able to reach
the continental United States -- not just Hawaii and Alaska. Further, if such missile threats were to come from
submarines near the U.S., North Korea would be able to launch a surprise nuclear-armed missile attack
on an American city. In this view, time is not on the side of the U.S. Submarine-launched missiles come without a "return address" to
indicate what country or terrorist organization fired the missile. The implications for American security do not stop there. As North Korea
is Iran's primary missile-development partner, whatever North Korea can do with its missiles and nuclear
warheads, Iran will presumably be able to do as well. One can assume the arrangement is reciprocal.
Given recent warnings that North Korea may have upwards of 20 nuclear warheads, the United States seems to be facing a critical new danger.
Would renewed negotiations with China, Japan, South Korea and North Korea really be able to address this threat? Two years ago, Andrew
Tarantola and Brian Barrett said there was "no reason to panic;" that North Korea was "a long way off" -- in fact "years" -- before its missiles
and nuclear weapons could be "put together in any meaningful way." At the same time, in April 2013, an official U.S. assessment by the
Defense Intelligence Agency stated the U.S. had "moderate" confidence that "North Korea had indeed developed a nuclear device small enough
to mount on a ballistic missile." That was followed up two years later, on April 7, 2015, when the commander of Northcom, Admiral Bill
Gortney, one of the nation's leading homeland security defenders, said the threat was considerably more serious. He noted that, "North Korea
has deployed its new road-mobile KN-08 intercontinental ballistic missile and was capable of mounting a miniaturized nuclear warhead on
it."[1] At a Pentagon press briefing in April, Admiral Cecil Haney, Commander of the US Strategic Command and America's senior military expert
on nuclear deterrence and missile defense, said it was important to take seriously reports that North Korea can now make small nuclear
warheads and put them on their ballistic missiles.[2] And sure
enough, in April, North Korea launched a ballistic missile
from a submerged platform. Media reaction to the North Korean test has been confused. Reuters, citing the analysis of two German
"experts," claimed the North Korean test was fake -- a not-too-clever manipulation of video images. The Wall Street Journal, on May 21, 2015,
echoed this view, noting: "[F]or evidence of North Korea's bending of reality to drum up fears about its military prowess," one need look no
further than a consensus that North Korea "doctored" pictures of an alleged missile test from a submarine. This, they claimed, was proof that
the "technology developments" by North Korea were nothing more than elaborately faked fairy tales. However, Israeli
missile defense
expert Uzi Rubin -- widely known as the "father" of Israel's successful Arrow missile defense program -explained to this author that previous North Korean missile developments, which have often been
dismissed as nothing more than mocked-up missiles made of plywood, actually turned out to be the real
thing -- findings confirmed by subsequent intelligence assessments. Rubin, as well as the South Korean
Defense Ministry, insist that on April 22, the North Korean military did, in fact, launch a missile from a
submerged platform.[3] Kim Jong Un, the "Supreme Leader" of North Korea, supervises the April 22 test-launch of a missile from a
submerged platform. (Image source: KCNA) What gave the "faked" test story some prominence were the misunderstood remarks of the Vice
Chairman of the Joint Chiefs of Staff, Admiral James Winnefeld. He had said, on May 19, that the North Korean missile launch was "not all" that
North Korea said it was. He also mentioned that North Korea used clever video editors to "crop" the missile test-launch images. Apparently,
that was exactly what the editors did. The Admiral, however, never claimed in his speech at the Center for Strategic and International Studies
there had been no successful missile test.[4] The same day, a high-ranking State Department official, Frank Rose -- Assistant
Secretary
of State for Arms Control, Verification, and Compliance -- told a Korean security seminar on Capitol Hill
that North Korea had successfully conducted a "missile ejection" test, but from an underwater barge
rather than a submarine.[5] To confuse matters further, additional pictures were released by the South Korean media to illustrate
stories about the North Korean test. Those pictures, however, were of American missiles, which use both solid and liquid propellant; as a result,
one photo showed a U.S. missile with a solid propellant smoke trail and one, from a liquid propellant, without a smoke trail. These photographs
apparently befuddled Reuters' "experts," who may have jumped to the conclusion that the photos of the North Korean test were "faked," when
they were simply of entirely different missile tests, and had been used only to "illustrate" ocean-going missile launches and not the actual North
Korean test.[6] According to Uzi Rubin, to
achieve the capability to eject a missile from an underwater platform is a
significant technological advancement. The accomplishment again illustrates "that rogue states such as North Korea
can achieve military capabilities which pose a notable threat to the United States and its allies." Rubin also
stated that the North Korean underwater launch test was closely related to the development of a missilefiring submarine, "a first step in achieving a very serious and dangerous new military capability."[7] Admiral
Winnefeld and Secretary Rose, in their remarks, confirmed that the North Korean test was not the "dog and pony show" some have claimed. In
other words, the
U.S. government has officially confirmed that the North Koreans have made a serious step
toward producing a sea-launched ballistic missile capability. While such an operational capability may be "years away,"
Rubin warns that "even many years eventually pass, and it will also take many years to build up the missile defenses, so we had better use the
time wisely."[8] Will diplomacy succeed in stopping the North Korean threats? U.S. Secretary of State John Kerry seemed to think it worth a try;
so he began the push to restart the old 2003 "six-party" talks between the United States, North Korea, Russia, China, South Korea and Japan, to
bring North Korea's nuclear weapons under some kind of international control and eventual elimination. After all, supporters of such talks
claim, similar talks with Iran appear to be leading to some kind of "deal" with Tehran, to corral its nuclear weapons program, so why not
duplicate that effort and bring North Korea back into the non-nuclear fold? What such a "deal," if any, with Iran, will contain, is at this point
unknown. Celebrations definitely seem premature. If the "deal" with North Korea is as "successful" as the P5+1's efforts to rein in Iran's illegal
nuclear weapons program, the prognosis for the success of diplomacy could scarcely be more troubling. Bloomberg's defense writer, Tony
Carpaccio, reflecting Washington's conventional wisdom, recently wrote that of course China will rein in North Korea's nuclear program: "What
might be a bigger preventative will be the protestations of China, North Korea's primary trade partner and only prominent international ally.
Making China angry would put an already deeply impoverished, isolated North Korea in even more dire straits." Unfortunately, no matter how
attractive a strategy of diplomatically ending North Korea's nuclear program might look on the surface, it is painfully at odds with China's
established and documented track record in supporting and carrying out nuclear proliferation with such collapsed or rogue states as Iran, Syria,
Pakistan, North Korea and Libya, as detailed by the 2009 book The Nuclear Express, by Tom C. Reed (former Secretary of the Air Force under
President Gerald Ford and Special Assistant to the President of National Security Affairs during the Ronald Reagan administration) and Daniel
Stillman (former Director of the Lawrence Livermore National Laboratory). Far from being a potential partner in seeking a non-nuclear Korean
peninsula, China, say the authors, has been and is actually actively pushing the spread of nuclear weapons to rogue states, as a means of
asserting Chinese hegemony, complicating American security policy and undermining American influence. The problem is not that China has
little influence with North Korea, as China's leadership repeatedly claims. The problem is that China has no interest in pushing North Korea
away from its nuclear weapons path because the North Korean nuclear program serves China's geostrategic purposes. As Reed and Stillman
write, "China has been using North Korea as the re-transfer point for the sale of nuclear and missile technology to Iran, Syria, Pakistan, Libya
and Yemen". They explain, "Chinese and North Korean military officers were in close communication prior to North Korea's missile tests of 1998
and 2006". Thus, if China takes action to curtail North Korea's nuclear program, China will likely be under pressure from the United States and
its allies to take similar action against Iran and vice versa. China, however, seems to want to curry favor with Iran because of its vast oil and gas
supplies, as well as to use North Korea to sell and transfer nuclear technology to both North Korea and Iran, as well as other states such as
Pakistan. As Reed again explains, "China has catered to the nuclear ambitions of the Iranian ayatollahs in a blatant attempt to secure an
ongoing supply of oil". North Korea is a partner with Iran in the missile and nuclear weapons development business, as Uzi Rubin has long
documented. Thus, it is reasonable to believe that China may see any curtailment of North Korea's nuclear program as also curtailing Iran's
access to the same nuclear technology being supplied by North Korea. Any curtailment would also harm the Chinese nuclear sales business to
Iran and North Korea, especially if China continues to use the "North Korea to Iran route" as an indirect means of selling its own nuclear
expertise and technology to Iran. It is not as if Chinese nuclear proliferation is a recent development or a "one of a kind" activity. As far back as
1982, China gave nuclear warhead blueprints to Pakistan, according to Reed. These findings indicate that China's nuclear weapons proliferation
activities are over three decades old.[9] Reed and Stillman also note that nearly a decade later, China tested a nuclear bomb "for Pakistan" on
May 26, 1990, and that documents discovered in Libya when the George W. Bush administration shut down Libyan leader Muammar Kaddafi's
nuclear program revealed that China gave Pakistan the CHIC-4 nuclear weapon design. Unfortunately, China's nuclear assistance to Pakistan did
not stay just in Pakistan. The nuclear technology made its way from Pakistan to North Korea. For example, high explosive craters, construction
of a 50 megawatt nuclear reactor (finished in 1986) and a secret reprocessing facility begun in 1987 all were done in North Korea with major
Pakistani help from the A.Q. Khan "Nukes R Us" smuggling group, as Reed and Stillman document in their book. Reed and Stillman write that
when, amid disclosures in 2003 of a major Libyan nuclear weapons program, the U.S. government sought help in shutting down the Khan
nuclear smuggling ring, "Chinese authorities were totally unhelpful, to the point of stonewalling any investigation into Libya's nuclear supply
network." More recently, Chinese companies have now twice -- in 2009 and 2011 -- been indicted by the Attorney for the City of New York for
trying to provide Iran with nuclear weapons technology. The indictments document that Chinese companies were selling Iran steel for nuclear
centrifuges and other banned technology. A leaked State Department cable, discussing the indictments at the time, revealed "details on China's
role as a supplier of materials for Iran's nuclear program," and that "China helped North Korea ship goods to Iran through Chinese airports."
And more recently, in April 2015, the Czech government interdicted additional nuclear technology destined for Iran -- the origin of which
remains unknown -- in violation of current sanctions against Iran. From 1982 through at least the first part of 2015, the accumulation of
documentary evidence on nuclear proliferation reveals two key facts: First, despite literally hundreds of denials by Iran that it is seeking nuclear
weapons, and amid current negotiations to end Iran's pursuit of nuclear weapons, there is solid evidence that Iran still seeks nuclear weapons
technology; and that North Korea has nuclear weapons and is advancing their capability. Second, China continues to transfer, through its own
territory, nuclear weapons technology involving both North Korea and Iran. Although the Chinese profess to be against nuclear proliferation,
their track record from the documented evidence illustrates just the opposite. In summary, it
is obvious North Korea's nuclear
weapons and ballistic missiles are a serious threat to America and its allies. And China, from its proliferation record
for the past three decades, is making such a threat more widespread. In this light, is dismissing North Korea's advances in military technology
and ignoring China's record of advancing its neighbors' nuclear weapons technology really best for U.S. interests?
That causes miscalc- leads to global nuclear war
Metz 13 – Chairman of the Regional Strategy and Planning Department and Research Professor of
National Security Affairs at the Strategic Studies Institute (Steven, 3/13/13, “Strategic Horizons:
Thinking the Unthinkable on a Second Korean War,”
http://www.worldpoliticsreview.com/articles/12786/strategic-horizons-thinking-the-unthinkable-on-asecond-korean-war)
Today, North
Korea is the most dangerous country on earth and the greatest threat to U.S. security. For years, the bizarre regime in Pyongyang has
issued an unending stream of claims that a U.S. and South Korean invasion is imminent, while declaring that it will defeat this offensive just as -- according to official
propaganda -- it overcame the unprovoked American attack in 1950. Often the press releases from the official North Korean news agency are absurdly funny, and
American policymakers tend to ignore them as a result. Continuing to do so, though, could be dangerous as events and rhetoric turn even more ominous. In
response to North Korea's Feb. 12 nuclear test, the U.N. Security Council recently tightened existing sanctions against Pyongyang. Even China, North Korea's longstanding benefactor and protector, went along. Convulsed by anger, Pyongyang then threatened a pre-emptive nuclear strike against the United States and South
Korea, abrogated the 1953 armistice that ended the Korean War and cut off the North-South hotline installed in 1971 to help avoid an escalation of tensions
between the two neighbors. A spokesman for the North Korean Foreign Ministry asserted that a second Korean War is unavoidable. He might be right; for the first
time, an official statement from the North Korean government may prove true. No American leader wants another war in Korea. The problem is that the North
Koreans make so many threatening and bizarre official statements and sustain such a high level of military readiness that American
policymakers
to recognize the signs of impending attack. After all, every recent U.S. war began with miscalculation;
American policymakers misunderstood the intent of their opponents, who in turn underestimated American determination. The conflict
might fail
with North Korea could repeat this pattern. Since the regime of Kim Jong Un has continued its predecessors’ tradition of responding hysterically to every action and
statement it doesn't like, it's hard to assess exactly what might push Pyongyang over the edge and cause it to lash out. It could be something that the United States
considers modest and reasonable, or it could be some sort of internal power struggle within the North Korean regime invisible to the outside world. While we
cannot know whether the recent round of threats from Pyongyang is serious or simply more of the same old lathering, it would be prudent to think the unthinkable
Korean War could
begin with missile strikes against South Korean, Japanese or U.S. targets, or with a combination of missile strikes and a major conventional invasion of
the South -- something North Korea has prepared for many decades. Early attacks might include nuclear weapons, but even if they didn't, the United
and reason through what a war instigated by a fearful and delusional North Korean regime might mean for U.S. security. The second
States would probably move quickly to destroy any existing North Korean nuclear weapons and ballistic missiles. The war itself would be extremely costly and
probably long. North Korea is the most militarized society on earth. Its armed forces are backward but huge. It's hard to tell whether the North Korean people,
having been fed a steady diet of propaganda based on adulation of the Kim regime, would resist U.S. and South Korean forces that entered the North or be thankful
for relief from their brutally parasitic rulers. As the conflict in Iraq showed, the United States and its allies should prepare for widespread, protracted resistance even
while hoping it doesn't occur. Extended guerrilla operations and insurgency could potentially last for years following the defeat of North Korea's conventional
military. North Korea would need massive relief, as would South Korea and Japan if Pyongyang used nuclear weapons. Stabilizing North Korea and developing an
effective and peaceful regime would require a lengthy occupation, whether U.S.-dominated or with the United States as a major contributor. The second Korean
War would force military mobilization in the United States. This would initially involve the military's existing reserve component, but it
would probably ultimately require a major expansion of the U.S. military and hence a draft. The military's training infrastructure and the defense industrial base
would have to grow. This would be a body blow to efforts to cut government spending in the United States and postpone serious deficit reduction for so me time,
even if Washington increased taxes to help fund the war. Moreover, a second Korean conflict
would shock the global economy and potentially
have destabilizing effects outside Northeast Asia. Eventually, though, the United States and its allies would defeat the North Korean military. At that point it
would be impossible for the United States to simply re-establish the status quo ante bellum as it did after the first Korean War. The Kim regime is too unpredictable,
desperate and dangerous to tolerate. Hence regime change and a permanent ending to the threat from North Korea would have to be America's strategic objective.
China would pose the most pressing and serious challenge to such a transformation of North Korea. After all, Beijing's intervention saved North Korean dictator Kim
Il Sung after he invaded South Korea in the 1950s, and Chinese assistance has kept the subsequent members of the Kim family dictatorship in power. Since the
second Korean War would invariably begin like the first one -- with North Korean aggression -- hopefully China has matured enough as a great power to allow the
world to remove its dangerous allies this time. If the war began with out-of-the-blue North Korean missile strikes, China could conceivably even contribute to a
multinational operation to remove the Kim regime. Still, China would vehemently oppose a long-term U.S. military presence in North Korea or a unified Korea allied
with the United States. One way around this might be a grand bargain leaving a unified but neutral Korea. However appealing this might be, Korea might hesitate to
adopt neutrality as it sits just across the Yalu River from a China that tends to claim all territory that it controlled at any point in its history. If the aftermath of the
second Korean War is not handled adroitly, the
result could easily be heightened hostility between the United States and China, perhaps even a
new cold war. After all, history shows that deep economic connections do not automatically prevent nations from hostility and
war -- in 1914 Germany was heavily involved in the Russian economy and had extensive trade and financial ties with France and Great Britain. It is not
inconceivable then, that after the second Korean War, U.S.-China relations would be antagonistic and hostile at the same time that the two continued mutual trade
and investment. Stranger things have happened in statecraft.
Plan solves and is reversible. Less Big Data means conventional and targeted human
intel.
Walt, 14
(Stephen M. Walt is the Robert and Renée Belfer professor of international relations at Harvard University, “The Big
Counterterrorism Counterfactual Is the NSA actually making us worse at fighting terrorism?”,
http://www.foreignpolicy.com/articles/2014/11/10/counterterrorism_spying_nsa_islamic_state_terrorist_cve, November 10,
2014, ak.)
The head of the British electronic spy agency GCHQ, Robert Hannigan, created a minor flap last week in an article he wrote for the Financial Times. In effect,
Hannigan argued that more robust encryption procedures by private Internet companies were unwittingly aiding terrorists such as the Islamic State (IS) or al Qaeda,
by making it harder for organizations like the NSA and GCHQ to monitor online traffic. The implication was clear: The more that our personal privacy is respected
and protected, the greater the danger we will face from evildoers. It's a serious issue, and democracies that want to respect individual privacy while simultaneously
keeping citizens safe are going to have to do a much better job of reassuring us that vast and (mostly) secret surveillance capabilities overseen by unelected officials
such as Hannigan won't be abused. I
tend to favor the privacy side of the argument, both because personal freedoms are hard to get
back once lost, but also because there's not much evidence that these surveillance activities are making us
significantly safer.
They seem to be able to help us track some terrorist leaders, but there's a lively debate among scholars over whether tracking and
killing these guys is an effective strategy. The fear of being tracked also forces terrorist organizations to adopt less efficient communications procedures, but it
doesn't seem to prevent them from doing a fair bit of harm regardless. So
here's a wild counterfactual for you to ponder: What
would the United States, Great Britain, and other wealthy and powerful nations do if they didn't have these vast
surveillance powers? What would they do if they didn't have armed drones, cruise missiles, or other implements of destruction that can make it
remarkably easy (and in the short-term, relatively cheap) to target anyone they suspect might be a terrorist? Assuming that there were still violent extremists
plotting various heinous acts, what would these powerful states do if the Internet was there but no one knew how to spy on it? For starters, they'd
have to
rely more heavily on tried-and-true counterterrorism measures: infiltrating extremist organizations and
flipping existing members, etc., to find out what they were planning, head attacks off before they
occurred, and eventually roll up organization themselves. States waged plenty of counterterrorism
campaigns before the Internet was invented, and while it can be difficult to infiltrate such movements and find their vulnerable points,
it's not exactly an unknown art. If we couldn't spy on them from the safety of Fort Meade, we'd
probably be doing a lot more of this.
More funding WON’T solve. Data overload overwhelms intel and guarantees ongoing
resource failures.
Tufekci ‘15
Zeynep Tufekci is a fellow at the Center for Information Technology Policy at Princeton University, an assistant professor at the
School of Information and Department of Sociology at the University of North Carolina, and a faculty associate at the Harvard
Berkman Center for Internet and Society. “Terror and the limits of mass surveillance” – Financial Times’ The Exchange - Feb 3rd
http://blogs.ft.com/the-exchange/2015/02/03/zeynep-tufekci-terror-and-the-limits-of-mass-surveillance/
The most common justification given by governments for mass surveillance is that these tools are
indispensable for fighting terrorism. The NSA’s ex-director Keith Alexander says big data is “what it’s all about”. Intelligence
agencies routinely claim that they need massive amounts of data on all of us to catch the bad guys, like the French brothers who assassinated the cartoonists of
Charlie Hebdo, or the murderers of Lee Rigby, the British soldier killed by two men who claimed the act was revenge for the UK’s involvement in the wars in Iraq and
Afghanistan. But
the assertion that big data is “what it’s all about” when it comes to predicting rare events is not supported
by what we know about how these methods work, and more importantly, don’t work. Analytics on massive datasets can be
powerful in analysing and identifying broad patterns, or events that occur regularly and frequently, but are singularly
unsuited to finding unpredictable, erratic, and rare needles in huge haystacks. In fact, the bigger the haystack — the more
massive the scale and the wider the scope of the surveillance — the less suited these methods are to finding such
exceptional events , and the more they may serve to direct resources and attention away from
appropriate tools
and methods. After Rigby was killed, GCHQ, Britain’s intelligence service, was criticised by many for failing to stop his killers, Michael
Adebolajo and Michael Adebowale. A lengthy parliamentary inquiry was conducted, resulting in a 192-page report that lists all the ways in which Adebolajo and
Adebowale had brushes with data surveillance, but were not flagged as two men who were about to kill a soldier on a London street. GCHQ defended itself by
saying that some of the crucial online exchanges had taken place on a platform, believed to be Facebook, which had not alerted the agency about these men, or the
nature of their postings. The men apparently had numerous exchanges that were extremist in nature, and their accounts were suspended repeatedly by the
platform for violating its terms of service. “If only Facebook had turned over more data,” the thinking goes. But that is misleading, and makes sense only with the
benefit of hindsight. Seeking larger volumes of data, such as asking Facebook to alert intelligence agencies every time that it detects a post containing violence,
would deluge the agencies with multiple false leads that would lead to a data quagmire, rather than clues to impending crimes. For
big data analytics
to work, there needs to be a reliable connection between the signal (posting of violent content) and the event (killing
someone). Otherwise, the signal is worse than useless. Millions of Facebook’s billion-plus users post violent content every day, ranging
from routinised movie violence to atrocious violent rhetoric. Turning over the data from all such occurrences would merely flood the
agencies with “false positives” — erroneous indications for events that actually will not happen. Such data overload is not without
cost, as it takes time and effort to sift through these millions of strands of hay to confirm that they are, indeed, not needles — especially when we don’t even
know what needles look like. All that the investigators would have would be a lot of open leads with no resolution, taking away resources from any
real investigation. Besides, account suspensions carried out by platforms like Facebook’s are haphazard, semi-automated and unreliable indicators. The
flagging system misses a lot more violent content than it flags, and it often flags content as inappropriate even when it is not, and suffers from many biases. Relying
on such a haphazard system is not a reasonable path at all. So is all the hype around big data analytics unjustified? Yes and no. There are appropriate use cases for
which massive datasets are intensely useful, and perform much better than any alternative we can imagine using conventional methods. Successful examples
include using Google searches to figure out drug interactions that would be too complex and too numerous to analyse one clinical trial at a time, or using social
media to detect national-level swings in our mood (we are indeed happier on Fridays than on Mondays). In contrast, consider the “lone wolf” attacker who took
hostages at, of all things, a “Lindt Chocolat Café” in Sydney. Chocolate shops are not regular targets of political violence, and random, crazed men attacking them is
not a pattern on which we can base further identification. Yes, the Sydney attacker claimed jihadi ideology and brought a black flag with Islamic writing on it, but
given the rarity of such events, it’s not always possible to separate the jihadi rhetoric from issues of mental health — every era’s mentally ill are affected by the
cultural patterns around them. This isn’t a job for big data analytics. (The fact that the gunman was on bail facing various charges and was known for sending hate
letters to the families of Australian soldiers killed overseas suggests it was a job for traditional policing). When confronted with their failures in predicting those rare
acts of domestic terrorism, here’s what GCHQ, and indeed the
NSA, should have said instead of asking for increased surveillance capabilities: stop
asking us to collect more and more data to perform an impossible task. This glut of data is making our job harder, not
easier, and the expectation that there will never be such incidents, ever, is not realistic.
Contention 2: Data localization
NSA Surveillance fractures the internet—inhibits effective data sharing
Fisher 13 (Max Fisher staff writer quoting Google CEO and a former State Dept Official, “How anti-NSA
backlash could fracture the Internet along national borders”
http://www.washingtonpost.com/blogs/worldviews/wp/2013/11/01/how-anti-nsa-backlash-couldfracture-the-internet-along-national-borders/, ekr)
Google CEO Eric Schmidt and former State Department official Jared Cohen predicted that the Internet could gradually
fracture into several regional- or country-level mini-Internets. We may be seeing some surprisingly early hints of that process -- but not in the part of the
world where Schmidt predicted it would occur. The Internet could break into pieces, Schmidt and Cohen warned, under pressure from
authoritarian states such as Iran and China, which are working to control online discussion and limit the free exchange of ideas and news online. Under this scenario, the Great
Firewall of China, which separates China's Web from the rest of the world's, could be just the beginning of a gradual process of separation. These authoritarian states also
In a book released earlier this year,
tend to be frequent sources of hacking and cyber-espionage, which could exacerbate the Internet's fracturing by leading democratic countries to wall themselves off from the threats. It would
be the authoritarian Web or Webs breaking apart from the free, democratic Internet. This week saw some signs that the fractured-Internet theory might be coming true, perhaps sooner than
A group of German telecoms have proposed that the country
develop its own, separate Web and e-mail systems, to wall themselves off from the U.S. cyber-snooping that has
Schmidt and Cohen anticipated, but along very different fault lines.
the mere fact that it's being discussed so widely
and seriously is an indication that the Web could indeed break apart. The Post's Michael Birnbaum explains that the German
proposal wouldn't result in a separate Internet, exactly, but it would be a step in that direction -- and it's not just under discussion in Germany. The efforts to nationalize
Internet traffic go beyond Germany. In Brazil, where President Dilma Rousseff was also allegedly monitored by the NSA, the government has
pushed to require U.S. companies to store data about Brazilian customers inside Brazil. European Union
leaders have advocated that their 28 nations develop “cloud” data storage that is independent from
sparked such outrage there. While the plan doesn't appear likely to be carried out anytime soon,
the United States. It's ironic that these Web fault lines would surface among liberal democracies, rather than just between those democracies and authoritarian states, as
Schmidt and Cohen predicted. And, surely, some of this is political, with leaders in Brazil and Germany looking to get out ahead of public outrage against U.S. cyber-monitoring programs. Still,
politics does drive policies. While it's unlikely that Web consumers in these countries would really be willing to shut themselves off from popular U.S. Web services like Google and Facebook,
they are showing much greater interest in limiting the global nature of those services, forcing them to create separate systems within each country and to work under different rules and
India, potentially the world's second-largest Internet market behind China, has already begun to do
this. And that's how the fragmentation of the Web could begin. Even if it never leads the Internet to splinter off into fully separated
pieces, it does reverse the now 20-year process of decentralizing and globalizing the Internet, which is
arguably the most trans-national economic and political network in human history . That's been an enormous boon for U.S.restrictions.
based Web companies, which are globally dominant, as well as for highly advanced American cyber-espionage efforts. (That's a big part of why the United States is the world's leading advocate
As citizens in these countries push for
greater Web sovereignty, that will naturally mean erecting cyber borders to limit the flow of data. The
of a globally open Internet.) But it's also made it harder for other countries to control how they interact with the Web.
Web's global nature has greatly benefited the spread of commerce and ideas -- exactly why authoritarian states want to carve themselves off from it -- but it has also weakened national
borders in ways that many democracies really don't like. It's easy for Chinese hackers to break into Western companies' Web sites and steal their secrets, and in the same way it's easier for
If people in countries such as Germany and Brazil conclude that the
borderless nature of the Internet has more costs than benefits, then the Internet could start fracturing
even earlier than Schmidt anticipated.
U.S. spy agencies to poke into networks around the globe.
Freedom Act insufficient to resolve US tech reputation
The Nation 15 (June 11, 2015, http://www.cfr.org/latin-america-and-the-caribbean/snowden-come-between-us-latin-america/p31109, “@HD New Head 36 light;Study shows
cost of whistle-blower Snowden's revelations to US tech firms” //ekr)
WASHINGTON @BT New Screen/briefs Text - no indent; US
technology companies are getting hit harder than anticipated by
revelations about surveillance programmes led by the National Security Agency, a study showed yesterday. The study by the Information
Technology and Innovation Foundation, a Washington think-tank, said the impact would be greater than its estimate nearly two years ago of losses for the cloudcomputing sector. In 2013, the think-tank estimated that US cloud computing firms could lose between $22 billion and $35 billion (Bt739.8 billion and Bt1.1 trillion)
in overseas business over three years. It
now appears impossible to quantify the economic damage because the entire
sector has been tarnished by the scandal from revelations in documents leaked by former NSA contractor Edward Snowden, the report said.
" These revelations have fundamentally shaken international trust in US tech companies and hurt US
business prospects all over the world," the report said. Study co-author Daniel Castro said the impact is now open-ended, with the NSA scandal having
tarnished a wide range of US tech firms. Since 2013, he said, "we haven't turned this around; it's not just cloud companies. It's all tech
firms implicated by this," he said. "It doesn't show any signs of stopping." @New Subhead;New law insufficient @BT New
Screen/briefs Text - no indent;The report said foreign customers are increasingly shunning US companies, and governments
around the world "are using US surveillance as an excuse to enact a new wave of protectionist policies". One survey cited by the researchers found 25 per cent of
businesses in Britain and Canada planned to pull company data out of the United States as a result of the NSA revelations. Some companies in Europe do not want
their data hosted in North America due to these concerns, the researchers said. Meanwhile,
foreign companies have used the
revelations as a marketing opportunity . "There is also an increasingly distressing trend of countries, such as Australia, China,
Russia, and India, passing laws that prevent their citizens' personal information from leaving the country's
borders, effectively mandating that cloud computing firms build data centres in those countries or risk losing access to their markets." The report said several
US tech firms including Apple and Salesforce have already started to build data centres abroad "to appease foreign watchdogs and privacy advocates". While this
"data nationalism" may create some jobs in the short term, Castro said that countries enacting these policies "are hurting themselves in the long term by cutting
themselves off from the best technology". Castro said the passage of a reform measure last week called
the USA Freedom Act is not
sufficient to repair the reputation of US tech firms . The report recommends further reforms including boosting transparency of
surveillance practices, opposing government efforts to weaken encryption and strengthening its mutual legal assistance treaties with other nations. "Over the last
few years, the US government's failure to meaningfully reform its surveillance practices has taken a serious economic toll on the US tech sector and the total cost
continues to grow each day," Castro said. Castro said the USA Freedom Act, which curbs bulk data collection among its reforms, is "good legislation and a step in the
right direction. We have ignored the economic impact of US surveillance".
Specifically – fracturing devastates the healthcare industry and innovation
Cooper 15 (Rich, Vice President of Research and Emerging Issues at the Chamber of Commerce
Foundation, “Say No To Internet Balkanization”, http://www.uschamberfoundation.org/blog/post/sayno-balkanization-internet/42923)
Last year, the
world celebrated the 25th anniversary of the fall of the Berlin Wall. It was an important
reminder of how walls of all kinds stall progress, not accelerate it . Look at Germany today, Europe’s economic
powerhouse and a far cry from the Cold War days when East Germany was a model for how thoroughly communism could destroy an economy.
There is a clear analogy here to what is happening in the digital world. Balkanization
is the antithesis of what the Internet
was created to do. Balkanization raises virtual borders in what was intended to be a vehicle for sharing
knowledge without regard for national borders. The reason this matters is there are very real and costly consequences
for segregating what was built to be whole. These include: 1. Restricting data restricts innovation. One of the
most exciting aspects of the exponentially growing volume of data in the world today is that it holds the
potential for world-changing ideas, insights, and technologies. Big Data is the ultimate fertile ground for
innovation, with scientists, engineers, doctors, manufacturers, and indeed, all professions across the world gaining greater insight,
discovering new correlations, and developing new tools and practices that improve everyone’s lives. Internet Balkanization threatens
all of that . If the European Union, for example, restricts data access and exchange (as EU countries have debated), it will
create real challenges for industries that thrive on data. The healthcare industry , for example, is passing
the threshold into a new era of medicine , with pharmaceuticals tailored to the individual, doctors using
cognitive computing , and hospitals consolidating and digitizing health records for more effective and
collaborative treatment. All of this requires fast, easy access to data, which is not
compatible with a complex Balkanized and individually silo-ed Internet . If we build walls
online, we will build walls between ourselves and a future of unlimited opportunity and innovation.
Data driven healthcare is the critical factor in disease prevention – revolutionizes
planning and treatment
Marr 15 (Bernard, contributor to Forbes, he also basically wrote the book on internet data – called Big
Data – and is a keynote speaker and consultant in strategic performance, analytics, KPIs and big data,
“How Big Data Is Changing Healthcare”, http://www.forbes.com/sites/bernardmarr/2015/04/21/howbig-data-is-changing-healthcare/)
If you want to find out how Big Data is helping to make the world a better place, there’s no better
example than the uses being found for it in healthcare. The last decade has seen huge advances in the
amount of data we routinely generate and collect in pretty much everything we do, as well as our ability to use
technology to analyze and understand it. The intersection of these trends is what we call “Big Data” and it is helping
businesses in every industry to become more efficient and productive. Healthcare is no different. Beyond improving
profits and cutting down on wasted overhead, Big Data in healthcare is being used to predict epidemics , cure
disease , improve quality of life and avoid preventable deaths. With the world’s population increasing and everyone
living longer, models of treatment delivery are rapidly changing, and many of the decisions behind those
changes are being driven by data . The drive now is to understand as much about a patient as possible,
as early in their life as possible – hopefully picking up warning signs of serious illness at an early enough stage that
treatment is far more simple (and less expensive) than if it had not been spotted until later. So to take a journey through Big Data in healthcare,
let’s start at the beginning – before we even get ill. Wearable blood pressure monitors send data to a smartphone app, then off to the doctor.
(Photo by John Tlumacki/The Boston Globe via Getty Images) Prevention is better than cure Smart phones were just the start. With apps
enabling them to be used as everything from pedometers to measure how far you walk in a day, to calorie counters to help you plan your diet,
millions of us are now using mobile technology to help us try and live healthier lifestyles. More recently, a steady stream of dedicated wearable
devices have emerged such as Fitbit, Jawbone and Samsung Gear Fit that allow you to track your progress and upload your data to be compiled
alongside everyone else’s. In the very near future, you could also be sharing this data with your doctor who will use it as part of his or her
diagnostic toolbox when you visit them with an ailment. Even
if there’s nothing wrong with you, access to huge, ever
growing databases of information about the state of the health of the general public will allow
problems to be spotted before they occur , and remedies – either medicinal or educational – to be prepared in
advance This is leading to ground breaking work, often by partnerships between medical and data
professionals, with the potential to peer into the future and identify problems before they happen. One
recently formed example of such a partnership is the Pittsburgh Health Data Alliance – which aims to take data from various sources (such as
medical and insurance records, wearable sensors, genetic data and even social media use) to draw a comprehensive picture of the patient as an
individual, in order to offer a tailored healthcare package. That person’s data won’t be treated in isolation. It will be compared and analyzed
alongside thousands of others, highlighting specific threats and issues through patterns that emerge during the comparison. This enables
sophisticated predictive modelling to take place – a doctor will be able to assess the likely result of whichever treatment he or she is
considering prescribing, backed up by the data from other patients with the same condition, genetic factors and lifestyle. Programs such as this
are the industry’s attempt to tackle one of the biggest hurdles in the quest for data-driven healthcare: The medical industry collects a huge
amount of data but often it is siloed in archives controlled by different doctors’ surgeries, hospitals, clinics and administrative departments.
Another partnership that has just been announced is between Apple and IBM. The two companies are collaborating on a big data health
platform that will allow iPhone and Apple Watch users to share data to IBM’s Watson Health cloud healthcare analytics service. The aim is to
discover new medical insights from crunching real-time activity and biometric data from millions of potential users.
An international approach is key – only cooperation solves
Donahue et al 10 (Donald A. Donahue Jr, DHEd, MBA, FACHE, Potomac Institute for Policy Studies
and University of Maryland University College Stephen O. Cunnion, MD, PhD, MPH, Potomac Institute
for Policy Studies Fred L. Brocker, MPH, RS, Brocker Staffing & Consulting, Inc. Richard H. Carmona, MD,
MPH, FACS, 17th Surgeon General of the United States & University of
Arizona, https://www.academia.edu/3651172/Soft_Power_of_Solid_Medicine// ekr)
that a broader, coordinated program of medical diplomacy would generate dual benefits:
increased global engagement and stability and the creation of a worldwide disease surveillance network
that could detect and deter an emerging pandemic. Framing the Issue At an April 2008 conference on preparedness hosted by the Potomac Institute
for Policy Studies’ National Security Health Policy Center, Dr. C. Everett Koop observed that our national approach to communicable disease has
not changed in over a century. In Foggy Bottom—at the far end of the National Mall from the Department of Health and Human Services (HHS)— diplomacy is similarly
In this article, the authors argue
practiced as it was 100 years ago. This seemingly strange correlation and recent world events point to the need to augment nineteenth-century “Gunboat Diplomacy” with twenty-first-century
Linking the considerable scientific and public health expertise of HHS to the diplomatic mission of the State
Department would serve to bolster both the U.S.
international diplomacy mission and improve global public health (Avery 2010). The positive impact of projecting quality public health
“Hospital Ship Diplomacy.”
and medical expertise—on a consistent basis—to the developing world is well documented (Gillert 1996). The success of General Petreaus’ approach in Iraq is attributed largely to enhancing
the availability of the civic infrastructure (Patraeus 2006). Médecins San Frontières (Doctors Without Borders) and similar nongovernment organizations (NGOs) sow well documented
international goodwill.
Even the Taliban recognize the value of providing medical infrastructure services where the
government does not. Providing these services was a significant factor in their early successes in parts of Afghanistan and the frontier provinces of Pakistan (Homas 2008). Serving the needs of
vulnerable populations can be an entrée to acceptance, including providing a salve for an otherwise unwanted foreign military presence. It should be noted that when U.S. Marine and French
The efficacy of medical diplomacy in underserved
regions has been validated by first-hand experience. As a young Army medic serving in Phu Bai, Vietnam in 1971, one of the authors built an 80-bed
paratrooper barracks were bombed in Beirut in 1983, Italian medical troops were left unharmed.
hospital which was named “Tu Ai,” a Vietnamese-Buddhist term for peace. This facility provided medical treatment to all in need with no questions asked. After the fall of South Vietnam in
1975, the Tu Ai medical facility was the only one in the I Corps area of operations (and perhaps of all Vietnam) that was allowed by the new government to continue its mission unchanged. It
continues to provide medical care to this very day. There is ample precedent that supporting improvements in world health produces a political payoff, as evidenced by multiple, if sometimes
disjointed, efforts (Avery 2010; Public Health Systems Research Interest Group Advisory Board 2009; Macqueen KM, et al. 2001; Subcommittee on Oversight & Investigations 2008). The U.S.
and other nations’ military organizations routinely conduct medical assistance missions throughout the developing world. The U.S. Agency for International Development (USAID) and a
number of medical NGOs regularly provide disaster and humanitarian medical and public health assistance. Significant goodwill was engendered by deployment of U.S. Army, Navy, and Public
Health Service (PHS) Commissioned Corps resources to Banda Aceh after the 2004 Indian Ocean earthquake and tsunami and, more recently, to Haiti. Relief missions to Pakistan have been
The benefit of having a
robust, organized health and medical presence around the globe to help collect and disseminate medical
information and coordinate public health activities, including humanitarian assistance, is less obvious.
This benefit is manifested in three ways: the fostering of human security, the increase in effectiveness of global
public health efforts, and an increase in political legitimacy (Nye 2004). While it is beyond the scope of this commentary to debate the
mounted following the 2005 earthquake and again in response to recent, epic flooding. Defining an Underutilized Resource as an Available Solution.
components and relative merits of human security, history supports the position that a population with increased levels of disease and illness is more susceptible to destabilizing factors that
can pose direct threats to state viability and create fertile fields for radicalism and insurgency (WHO 2007). This is especially true if there are very clear differences in healthcare and public
health services available to ruling and elite classes compared to that available to the general population. Reflective of this, the National Center for Medical Intelligence (NCMI) routinely
assesses medical information and reports on diseases and poor public health conditions that may contribute to politically destabilizing a county (e.g., AIDS). Despite significant,
initiatives and interest for improving international health throughout the executive branch of the U.S.
government, these collective efforts lack meaningful coordination into a comprehensive approach on foreign health
diplomacy, and therefore fail to realize the cumulative benefit of and the inherent political stabilization impact fostered by an organized and coordinated global health improvement
if disparate,
effort. Even with improved political stability, the need for increased global health capabilities continues unabated. The emergence of SARS, H5N1 influenza, and the pandemic H1N1 outbreak
clearly demonstrates that national borders and ocean expanses no longer protect us from far-flung illnesses. In a global economy and with the ability to travel almost anywhere in the
world within 24–36 hours, a local infectious disease aberration can become an international health crisis in a matter of days. Moreover, because H1N1 influenza turned out to be not as deadly
as feared, the danger of a future calamitous pandemic occurring could be enhanced because the public may not heed future health official warnings. This is not limited to individual perception.
In a rare divergence of political and clinical focus regarding communicable disease, the Parliamentary Assembly of the Council of Europe soundly criticized the World Health Organization
(WHO) and national health authorities for “distortion of priorities of public health services across Europe, waste of large sums of public money, and also unjustified scares and fears about
health risks faced by the European public at large” (Flynn 2010).
Zoonotic diseases coming now – effective healthcare is key to check
Naish 12 (Reporter for Daily Mail, “The Armageddon virus: Why experts fear a disease that leaps from
animals to humans could devastate mankind in the next five years Warning comes after man died from a
Sars-like virus that had previously only been seen in bats Earlier this month a man from Glasgow died
from a tick-borne disease that is widespread in domestic and wild animals in Africa and Asia”
http://www.dailymail.co.uk/sciencetech/article-2217774/The-Armageddon-virus-Why-experts-feardisease-leaps-animals-humans-devastate-mankind-years.html#ixzz3E5kqxjQI)
The symptoms appear suddenly with a headache, high fever, joint pain, stomach pain and vomiting. As the illness progresses, patients can develop large areas of bruising and uncontrolled bleeding. In at least 30 per cent of cases,
Crimean-Congo Viral Hemorrhagic Fever is fatal. And so it proved this month when a 38-year-old garage owner from Glasgow, who had been to his brother’s wedding in Afghanistan, became the UK’s first confirmed victim of the
tick-borne viral illness when he died at the high-security infectious disease unit at London’s Royal Free Hospital. It is a disease widespread in domestic and wild animals in Africa and Asia — and one that has jumped the species
barrier to infect humans with deadly effect. But the unnamed man’s death was not the only time recently a foreign virus had struck in this country for the first time. Last month, a 49-year-old man entered London’s St Thomas’
hospital with a raging fever, severe cough and desperate difficulty in breathing. He bore all the hallmarks of the deadly Sars virus that killed nearly 1,000 people in 2003 — but blood tests quickly showed that this terrifyingly
. Nor was it any other virus yet known to medical science . Worse still, the gasping,
sweating patient was rapidly succumbing to kidney failure, a potentially lethal complication that had
never before been seen in such a case. As medical staff quarantined their critically-ill patient, fearful questions began to mount. The stricken man had recently come from Qatar in the
virulent infection was not Sars
Middle East. What on earth had he picked up there? Had he already infected others with it? Using the latest high-tech gene-scanning technique, scientists at the Health Protection Agency started to piece together clues from tissue
samples taken from the Qatari patient, who was now hooked up to a life-support machine.
The results were extraordinary. Yes, the virus is from the
same family as Sars. But its make-up is completely new . It has come not from humans, but from
animals. Its closest known relatives have been found in Asiatic bats. The investigators also discovered that the virus has already killed someone. Searches of global medical
databases revealed the same mysterious virus lurking in samples taken from a 60-year-old man who had
died in Saudi Arabia in July. Scroll down for video Potentially deadly: The man suffered from CCHF, a disease transmitted by ticks (pictured) which is especially common in East and West Africa
Potentially deadly: The man suffered from CCHF, a disease transmitted by ticks (pictured) which is especially common in East and West Africa When the Health Protection Agency warned the world of this newly- emerging virus last
month, it ignited a stark fear among medical experts. Could this be the next bird flu, or even the next ‘Spanish flu’ — the world’s biggest pandemic, which claimed between 50 million and 100 million lives across the globe from 1918
In all these outbreaks, the virus responsible came from an animal . Analysts now believe that the Spanish flu pandemic originated from a
wild aquatic bird. The terrifying fact is that viruses that manage to jump to us from animals — called zoonoses —
can wreak havoc because of their astonishing ability to catch us on the hop and spread rapidly through
the population when we least expect it. The virus's power and fatality rates are terrifying One leading British virologist, Professor John Oxford at
Queen Mary Hospital, University of London, and a world authority on epidemics, warns that we must
expect an animal-originated pandemic to hit the world within the next five years , with potentially
to 1919?
cataclysmic effects on the human race. Such a contagion, he believes, will be a new strain of super-flu, a highly
infectious virus that may originate in some far-flung backwater of Asia or Africa, and be contracted by
one person from a wild animal or domestic beast, such as a chicken or pig. By the time the first victim has succumbed to this unknown,
unsuspected new illness, they will have spread it by coughs and sneezes to family, friends, and all those gathered anxiously around them. Thanks to our crowded, hyper-connected
world, this doomsday virus will already have begun crossing the globe by air, rail, road and sea before
even the best brains in medicine have begun to chisel at its genetic secrets. Before it even has a name, it will have started to cut its lethal
swathe through the world’s population. The high security unit High security: The high security unit where the man was treated for the potentially fatal disease but later died If this new virus follows the pattern of the pandemic of
They die because of something called a ‘cytokine storm’ — a vast
overreaction of their strong and efficient immune systems that is prompted by the virus. This uncontrolled response burns
them with a fever and wracks their bodies with nausea and massive fatigue. The hyper-activated immune system actually kills the person,
1918-1919, it will cruelly reap mass harvests of young and fit people.
rather than killing the super-virus. Professor Oxford bases his prediction on historical patterns. The past century
example, the 2003 global outbreak of Sars, the severe acute respiratory
syndrome that killed nearly 1,000 people, was transmitted to humans from Asian civet cats in China. More... Man, 38,
has certainly provided us with many disturbing precedents. For
dies from deadly tropical disease after returning to the UK from Afghanistan Nine-year-old who turns YELLOW with anger: Brianna must spend 12 hours a day under UV lights because of rare condition In November 2002, it first
spread among people working at a live animal market in the southern Guangdong province, where civets were being sold.
Nowadays, the threat from such zoonoses is far
greater than ever, thanks to modern technology and human population growt h. Mass transport such as airliners can quickly fan
outbreaks of newly- emerging zoonoses into deadly global wildfires. The Sars virus was spread when a Chinese professor of respiratory medicine treating people with the syndrome fell ill when he travelled to Hong Kong, carrying
the virus with him. By February 2003, it had covered the world by hitching easy lifts with airline passengers. Between March and July 2003, some 8,400 probable cases of Sars had been reported in 32 countries. It is a similar story
with H1N1 swine flu, the 2009 influenza pandemic that infected hundreds of millions throughout the world. It is now believed to have originated in herds of pigs in Mexico before infecting humans who boarded flights to myriad
Once these stowaway viruses get off the plane, they don’t have to learn a new language or new
local customs. Genetically, we humans are not very diverse ; an epidemic that can kill people in one part
destinations.
of the world can kill them in any other just as easily. On top of this, our risk of catching such deadly
contagions from wild animals is growing massively, thanks to humankind’s relentless encroachment
into the world’s jungles and rainforests , where we increasingly come into contact for the first time with
unknown viral killers that have been evolving and incubating in wild creatures for millennia. This month, an international
research team announced it had identified an entirely new African virus that killed two teenagers in the Democratic Republic of the Congo in 2009. The virus induced acute hemorrhagic fever, which causes catastrophic widespread
bleeding from the eyes, ears, nose and mouth, and can kill in days. A 15-year-old boy and a 13-year-old girl who attended the same school both fell ill suddenly and succumbed rapidly. A week after the girl’s death, a nurse who
cared for her developed similar symptoms. He only narrowly survived. The new microbe is named Bas-Congo virus (BASV), after the province where its three victims lived. It belongs to a family of viruses known as rhabdoviruses,
A report in the journal PLoS Pathogens says the virus probably originated in local wildlife and
was passed to humans through insect bites or some other as-yet unidentified means. There are plenty of
which includes rabies.
other new viral candidates waiting in the wings, guts, breath and blood of animals around us . You can, for
example, catch leprosy from armadillos, which carry the virus in their shells and are responsible for a third of leprosy cases in the U.S. Horses can transmit the Hendra virus, which can cause lethal respiratory and neurological
award-winning U.S. natural history writer David Quammen points to a
host of animal-derived infections that now claim lives with unprecedented regularity. The trend can only
get worse , he warns. Quammen highlights the Ebola fever virus, which first struck in Zaire in 1976. The virus’s power is terrifying, with fatality rates as high as 90 per cent. The latest mass outbreak of the virus, in the
disease in people. In a new book that should give us all pause for thought,
Congo last month, is reported to have killed 36 people out of 81 suspected cases. According to Quammen, Ebola probably originated in bats. The bats then infected African apes, quite probably through the apes coming into contact
with bat droppings. The virus then infected local hunters who had eaten the apes as bushmeat. Quammen believes a similar pattern occurred with the HIV virus, which probably originated in a single chimpanzee in Cameroon.
'It is inevitable we will have a global outbreak ' Studies of the virus’s genes suggest it may have first evolved as early as 1908. It was not until the Sixties that it appeared in
humans, in big African cities. By the Eighties, it was spreading by airlines to America. Since then, Aids has killed around 30 million people and infected another 33 million. There is one mercy with Ebola and HIV. They cannot be
If HIV could be
transmitted by air, you and I might already be dead. If the rabies virus — another zoonosis — could be
transmitted by air, it would be the most horrific pathogen on the planet.’ Viruses such as Ebola have another limitation, on top of their method
transmitted by coughs and sneezes. ‘Ebola is transmissible from human to human through direct contact with bodily fluids. It can be stopped by preventing such contact,’ Quammen explains. ‘
of transmission. They kill and incapacitate people too quickly. In order to spread into pandemics, zoonoses need their human hosts to be both infectious and alive for as long as possible, so that the virus can keep casting its deadly
tentacles across the world’s population.
But there is one zoonosis that can do all the right (or wrong) things. It is our old
adversary, flu. It is easily transmitted through the air, via sneezes and coughs. Sars can do this, too. But flu has a further advantage. As Quammen points out: ‘With Sars, symptoms tend to
appear in a person before, rather than after, that person becomes highly infectious. Isolation:
Unlike Sars the symptoms of this new disease may not be
apparent before the spread of infection Isolation : Unlike Sars the symptoms of this new disease may not be apparent before the spread of infection ‘That allowed many
Sars cases to be recognised, hospitalised and placed in isolation before they hit their peak of infectivity. But with influenza and many other diseases, the order is
reversed.’ Someone who has an infectious case of a new and potentially lethal strain of flu can be
walking about innocently spluttering it over everyone around them for days before they become
incapacitated . Such reasons lead Professor Oxford, a world authority on epidemics, to warn that a new global pandemic
of animal-derived flu is inevitable. And, he says, the clock is ticking fast. Professor Oxford’s warning is as stark as it is certain: ‘I think it is inevitable that we
will have another big global outbreak of flu ,’ he says. ‘We should plan for one emerging in 2017-2018.’ But are we
adequately prepared to cope? Professor Oxford warns that vigilant surveillance is the only real answer that we have. ‘
New flu strains are a day-to-day problem and we
have to be very careful to keep on top of them,’ he says. ‘We now have scientific processes enabling us to quickly identify the genome of the virus behind a new illness,
so that we know what we are dealing with. The best we can do after that is to develop and stockpile vaccines and antiviral drugs
that can fight new strains that we see emerging.’ But the Professor is worried our politicians are not taking this certainty of mass death seriously enough. Such laxity could
come at a human cost so unprecedentedly high that it would amount to criminal negligence. The race against newly-emerging animal-derived diseases is one that we have to win every time. A pandemic virus
needs to win only once and it could be the end of humankind.
Contention 3: Solvency
The current Freedom Act is too narrow. It’s limited to phone collection and not other
bulk collection programs.
Kopstein ‘15
Joshua Kopstein is a journalist and researcher. His work focuses on Internet law and disorder, surveillance and government
secrecy. He has written pieces for Slate Magazine and The New Yorker. “USA Freedom Act gives NSA everything it wants — and
less” - Al Jazeera America’s The Scrutineer – June 2nd – http://america.aljazeera.com/blogs/scrutineer/2015/6/2/usa-freedomact-gives-nsa-everything-it-wants--and-less.html
Obama signed the Freedom Act into law later
the Freedom Act has
focused almost exclusively on ending one single National Security Agency program under one single authority: The
secret bulk collection of Americans' phone records under Section 215 of the Patriot Act, revealed almost exactly two years ago by Edward Snowden. Section 215
and two other “emergency” post-9/11 surveillance provisions briefly lapsed Sunday night after the Senate failed to reauthorize them. The new law replaces the NSA’s bulk data
collection with a program that requires telecom companies to retain the data and grant access to
intelligence agencies through more targeted court orders. The other surveillance powers — roving wiretaps and the so-called lone wolf provision — remained
The Senate adopted the House version of the bill, which had been watered down at the behest of intelligence agencies, and President
this evening. While far from what most would recognize as “reform,” at the end of the day, the bill is probably more of a victory for transparency than it is for privacy. That's because
unused even as surveillance hawks raised apocalyptic warnings about letting them expire. Two independent White House panels have found that the metadata collection program has never helped to foil a terrorist plot. A major
appellate court decision also ruled the program was illegal, and that it merely served to create a “vast data bank” of extremely sensitive information — specifically, phone numbers and when and how often they were called —
about millions of innocent Americans. In other words,
the bulk phone records program was on its way out no matter what. The court
ruling could have been a big opportunity to push for an end to all domestic bulk collection under the Patriot Act,
not just phone records. But additional privacy protections had been negotiated away in the House, and
Senate advocates were not given a chance to add them back. The result renders the Freedom Act a
missed opportunity to address countless other NSA authorities, such as Executive Order 12333 and Section
702 of the F ISA A mendments A ct, ones we know (again, thanks to Snowden) continue to collect many other types of data.’
The plan restores language that makes circumvention impossible
Granick ’14 Jennifer Granick is the Director of Civil Liberties at the Stanford Center for Internet and Society. Jennifer was
the Civil Liberties Director at the Electronic Frontier Foundation. Jennifer practices, speaks and writes about computer crime
and security, electronic surveillance, consumer privacy, data protection, copyright, trademark and the Digital Millennium
Copyright Act. From 2001 to 2007, Jennifer was Executive Director of CIS and taught Cyberlaw, Computer Crime Law, Internet
intermediary liability, and Internet law and policy. Before teaching at Stanford, Jennifer earned her law degree from University
of California, Hastings College of the Law and her undergraduate degree from the New College of the University of South
Florida. “USA Freedom Act: Oh, Well. Whatever. Nevermind.” – Just Security - May 21, 2014 http://justsecurity.org/10675/usafreedom-act-oh-well-whatever-nevermind/
The initially promising USA Freedom Act could have ended the previously secret government practices of collecting
Americans’ calling records, internet transactional information and who knows what else in bulk. Today’s version would allow
broad collection to continue under the guise of reform. The initial version of the bill would have
reinforced existing statutory language requiring a showing of “relevance to an authorized investigation”
before agents can get an order requiring production of business records, dialing and routing information, and other
data, and would have added other limits to ensure massive collection would stop. It also would have implemented
mild reforms
to content surveillance under section 702 of the F ISA A mendments A ct, stopping “back door” searches
for Americans’ communications. Last week, a Managers’ Amendment watered those provisions down,
substituting new language that would allow agents to use a “specific selection term” as the “basis for production”.
The bill defined “specific selection term” as something that “uniquely describe[s] a person, entity, or
account.” Given the intelligence community’s success at getting FISA judges to reinterpret obvious language—e.g. “relevance”—in counter-intuitive ways,
people wondered what this new language might mean. There’s deep public mistrust for the intelligence community and for the FISA court, which conspired to allow
bulk collection under spurious legal justifications for years. Worse, there’s deep public mistrust for the law itself, since the intelligence community’s “nuanced”
definitions of normal words have made the public realize that they do not understand the meaning of words like “relevance”, “collection”, “bulk”, or “target”.
The NSA is required to abide by Congressional mandate
Buttar 15 — Shahid Buttar, constitutional lawyer and executive director of the Bill of Rights Defense
Committee, 2015 (“Senate Moves to Check Executive Spying Power,” The Progressive, May 27th,
Available Online at http://progressive.org/news/2015/05/188151/senate-moves-check-executivespying-power, Accessed 06-07-2015)
The political shift indicates a direction for future reform. Who Wins and Who Loses?
already permissive laws
The most obvious losers are the NSA and FBI After 15 years of breaking
the agencies must finally start complying with constitutional
.
, yet not congressional blank checks,
limits Within the agencies, senior leaders of the intelligence establishment also emerge looking like
clowns Section 215 survived this long only because agency officials
lied under oath to evade oversight The Senate's decision to end a program that senators learned about
from whistleblowers
discredits their legacies.
.
.
—including Director of National Intelligence James Clapper and former NSA Director Michael Hayden—
.
, instead of those officials, further
Even if they remain above the law by evading the prosecution for perjury sought by multiple members of Congress, their careers
will be defined by congressional and judicial rejection of illegal programs they built in secret. To the extent intelligence officials are clowns, the many congressional leaders from both parties who supported them are stooges. Establishment Democrats and Republicans alike uncritically
accepted lies, deferred to them and went along with the Beltway consensus - in sharp contrast to their populist colleagues who proved willing to uphold their oath of office to "defend the Constitution against all enemies, foreign and domestic." Several winners also emerged from this
Congressional rejection of mass spying vindicates several principles at once, including transparency,
oversight, checks and balances, the separation of powers and constitutional rights enshrined in the First
and Fourth Amendments
drama.
. Each of those values is cherished across the political continuum, making them especially powerful during a presidential election year. Senator Paul is another clear winner. He demonstrated leadership, surged among
the crowded GOP field of 2016 presidential hopefuls and effectively seized control of the Senate from the majority leader. With its senators leading both the surveillance/secrecy/corruption caucus, as well as the competing constitutional/privacy/accountability caucus, Kentucky could also
claim victory. The US Constitution may be the most important winner. By proxy, "We the People of the United States" actually scored two victories at once. Narrowly, the expiration of Patriot Act Section 215 advances Fourth Amendment privacy interests. Even though mass surveillance
will continue for now under other legal authorities, one program through which our government monitors phone calls and tracks everyone's behavior, regardless of wrongdoing, will end. More broadly,
this vote begins a long-
overdue process of limiting executive powers
congressional assertiveness supports democracy in a long-running battle to avoid the erosion from
within
, expanded during a period of seeming emergency, which grew entrenched despite proving ineffective as well as constitutionally offensive. In this sense,
foreseen by both Alexis de Tocqueville and President and Supreme Allied Commander Dwight Eisenhower. What Comes Next? With reformers having triumphed in Congress, the debate over surveillance reform must expand. Further reforms are necessary to enable an
adversarial process and greater transparency at the secret Foreign Intelligence Surveillance Court, and also to limit other legal authorities - like Executive Order 12333 and FISA Section 702 - used to justify unconstitutional domestic surveillance. It's a good thing that a bipartisan measure,
the Surveillance State Repeal Act (HR 1466), is poised to do exactly that. Rep. Mark Pocan (D-Wisconsin) and Rep. Thomas Massie (R-Kentucky) introduced the SSRA to force the agencies to justify the expansion of any powers from a constitutional baseline, rather than one contrived by a
Congress has long abandoned its role of checking and balancing runaway executive power, but
the Senate's recent vote suggests an overdue awakening
decade of executive lies.
. Members should heed the political wind, and embrace bipartisan calls for aggressive limits as the starting point for
comprehensive surveillance reform.
Download