Sunday Night Speech - sdi 2015

advertisement
Sunday Night Speech - Kick a disad, Extend
a Disad. Extend Case Args
Background information
For tonight’s speech, you will be giving a Negative Block speech (2NC-1NR). It will be up to six minutes
long.
It will be similar to what Harris did during the in-lab debate yesterday.
Guidelines:
 You will extend ONE of the two disads
 You will kick the other disad
 You will extend some arguments against your opponent’s privacy advantage. You can chose
how many arguments to extend and how long you would like to spend on the case. We
would like to see you practice reading some extension ev in the 2NC-1NR when answering
the privacy advantage.
 Prior to the speech, YOU WILL BE ASKED TO TELL YOUR JUDGE HOW LONG YOU INTEND TO
SPEND ON EACH PAGE – example:
o “I plan to kick the politics disad in 15 seconds”
o “I plan to extend the terror disad for 3 mins”
o “I plan to extend answers to the privacy advantage for 2:45”
Blueprint for Flowing
Get one page for the Politics Disad – pre-flow the 1NC shell and 2AC answers (both below).
Get another page for the Terror Disad – pre-flow the 1NC shell and 2AC answers (both below).
Get a final page for the Privacy Advantage – pre-flow the 1AC version, the 1NC frontline (both below)…
We will verbally read the 2AC answers to the 1NC privacy frontline in-front of the lab. We will do this in
order to help you practice flowing. So, you will not be able to fully prep the speech until you hear the
2AC vs. the case.
Background info on the 1AC
Aff Plan
In this hypothetical, the Affirmative plan was from the packet materials. The plan text reads:
Bulk collection of domestic metadata by United States federal intelligence agencies – including
internet, email, and Skype data - should cease.
1AC - Privacy Advantage – longer version
Contention # ____ is Privacy
Privacy outweighs.
- Utilitarian impact calc is skewed; and
- Reject Surveillance as a structural matter of power – even when its
“reformed”, innocents are powerless unless neutral oversight’s in place.
Solove ‘7
Daniel Solove is an Associate Professor at George Washington University Law School and holds a J.D. from Yale Law School. He
is one of the world’s leading expert in information privacy law and is well known for his academic work on privacy and for
popular books on how privacy relates with information technology. He has written 9 books and more than 50 law review
articles – From the Article ““I’ve Got Nothing to Hide” and Other Misunderstandings of Privacy” - San Diego Law Review, Vol.
44, p. 745 - GWU Law School Public Law Research Paper No. 289 – available from download at:
http://papers.ssrn.com/sol3/papers.cfm?abstract_id=998565
It is time to return to the
nothing to hide argument . The reasoning of this argument is that when it comes to
government surveillance or use of personal data, there is no privacy violation if a person has nothing sensitive,
embarrassing, or illegal to conceal. Criminals involved in illicit activities have something to fear, but for the vast majority of
people, their activities are not illegal or embarrassing. Understanding privacy as I have set forth reveals the flaw of the nothing to hide argument at its roots. Many
commentators who respond to the argument attempt a direct refutation by trying to point to things that people would want to hide. But the problem with the
nothing to hide argument is the underlying assumption that privacy is about hiding bad things. Agreeing
with this assumption concedes far
too much ground and leads to an unproductive discussion of information people would likely want or not want to hide. As Bruce
Schneier aptly notes, the nothing to hide argument stems from a faulty “premise that privacy is about hiding a
wrong.”75 The deeper problem with the nothing to hide argument is that it myopically views privacy as a form of concealment or secrecy. But understanding
privacy as a plurality of related problems demonstrates that concealment of bad things is just one among many problems caused by government programs such as
the NSA surveillance and data mining. In the categories in my taxonomy, several problems are implicated. The
NSA programs involve problems of
information collection, specifically the category of surveillance in the taxonomy. Wiretapping involves audio surveillance of people’s conversations.
Data mining often begins with the collection of personal information, usually from various third parties that possess people’s data. Under current Supreme Court
Fourth Amendment jurisprudence, when the government gathers data from third parties, there is no Fourth Amendment protection because people lack a
“reasonable expectation of privacy” in information exposed to others.76 In United States v. Miller, the Supreme Court concluded that there is no reasonable
expectation of privacy in bank records because “[a]ll of the documents obtained, including financial statements and deposit slips, contain only information
voluntarily conveyed to the banks and exposed to their employees in the ordinary course of business.”77 In Smith v. Maryland, the Supreme Court held that people
lack a reasonable expectation of privacy in the phone numbers they dial because they “know that they must convey numerical information to the phone company,”
and therefore they cannot “harbor any general expectation that the numbers they dial will remain secret.”78 As I have argued extensively elsewhere, the lack of
Fourth Amendment protection of third party records results in the government’s ability to access an extensive amount of personal information with minimal
limitation or oversight.79 Many scholars have referred to information collection as a form of surveillance. Dataveillance, a term coined by Roger Clarke, refers to the
“systemic use of personal data systems in the investigation or monitoring of the actions or communications of one or more persons.”80 Christopher Slobogin has
referred to the gathering of personal information in business records as “transaction surveillance.”81 Surveillance
can create chilling effects
on free speech, free association, and other First Amendment rights essential for democracy.82 Even
surveillance of legal activities can inhibit people from engaging in them. The value of protecting against
chilling effects is not measured simply by focusing on the particular individuals who are deterred from
exercising their rights. Chilling effects harm society because, among other things, they reduce the range of
viewpoints expressed and the degree of freedom with which to engage in political activity. The nothing to hide
argument focuses primarily on the information collection problems associated with the NSA programs. It contends that limited surveillance of lawful activity will not
chill behavior sufficiently to outweigh the security benefits. One can certainly quarrel with this argument, but one of the difficulties with chilling effects is that it is
often very hard to demonstrate concrete evidence of deterred behavior.83 Whether the NSA’s surveillance and collection of telephone records has deterred people
from communicating particular ideas would be a difficult question to answer. Far too often, discussions of the NSA surveillance and data mining define the problem
solely in terms of surveillance. To return to my discussion of metaphor, the problems are not just Orwellian, but Kafkaesque. The
NSA programs are
problematic even if no information people want to hide is uncovered. In The Trial, the problem is not inhibited
behavior, but rather
a suffocating powerlessness and vulnerability created by the court system’s use of
personal data and its exclusion of the protagonist from having any knowledge or participation in the process. The harms consist of those created by
bureaucracies—indifference, errors, abuses, frustration, and lack of transparency and accountability. One such harm, for example, which I call aggregation, emerges
from the combination of small bits of seemingly innocuous data.84 When combined, the information becomes much more telling about a person. For the person
who truly has nothing to hide, aggregation is not much of a problem. But in the stronger, less absolutist form of the nothing to hide argument, people argue that
certain pieces of information are not something they would hide. Aggregation, however, means that by combining pieces of information we might not care to
conceal, the government can glean information about us that we might really want to conceal. Part of the
allure of data mining for the
government is its ability to reveal a lot about our personalities and activities by sophisticated means of analyzing data. Therefore,
without greater transparency in data mining, it is hard to claim that programs like the NSA data mining program will not
reveal information people might want to hide, as we do not know precisely what is revealed. Moreover, data mining aims to be predictive
of behavior, striving to prognosticate about our future actions. People who match certain profiles are deemed likely to engage in a similar pattern of behavior. It is
quite difficult to refute actions that one has not yet done. Having nothing to hide will not always dispel predictions of future activity. Another
problem in
the taxonomy, which is implicated by the NSA program, is the problem I refer to as exclusion.85 Exclusion is the problem caused when people are
prevented from having knowledge about how their information is being used, as well as barred from being able to access and correct errors in that data. The NSA
program involves a massive database of information that individuals cannot access. Indeed, the very existence of the program was kept secret for years.86 This kind
of information processing, which forbids people’s knowledge or involvement, resembles in some ways a kind of due process problem. It is a structural problem
involving the way people are treated by government institutions. Moreover, it creates a power imbalance between individuals and the government. To what extent
should the Executive Branch and an agency such as the NSA, which is relatively insulated from the political process and public accountability, have a significant
power over citizens? This
issue is not about whether the information gathered is something people want to
hide, but rather about the power and the structure of government. A related problem involves “secondary use.” Secondary
use is the use of data obtained for one purpose for a different unrelated purpose without the person’s consent. The Administration has said little about how long
the data will be stored, how it will be used, and what it could be used for in the future. The potential future uses of any piece of personal information are vast, and
without limits or accountability on how that information is used, it is hard for people to assess the dangers of the data being in the government’s control. Therefore,
the problem with the nothing to hide argument is that it focuses on just one or two particular kinds of privacy problems—the disclosure of personal information or
surveillance—and not others. It assumes a particular view about what privacy entails, and it sets
important to distinguish here between two ways of
the terms for debate in a manner that is often unproductive. It is
justifying a program such as the NSA surveillance
and data mining program. The first
way is to not recognize a problem. This is how the nothing to hide argument works—it denies even the existence of a problem. The second manner of justifying such
a program is
to acknowledge the problems but contend that the benefits of the NSA program outweigh
the privacy harms . The first justification influences the second, because the low value given to privacy is based upon a narrow view of the problem.
The key misunderstanding is that the nothing to hide argument views privacy in a particular way—as a form of secrecy, as
the right to hide things. But there are many other types of harm involved beyond exposing one’s
secrets to the government. Privacy problems are often difficult to recognize and redress because they create a panoply of types of harm. Courts,
legislators, and others look for particular types of harm to the exclusion of others, and their narrow focus blinds them to seeing other kinds of harms. One of the
difficulties with the nothing to hide argument
is that it looks for a visceral kind of injury as opposed to a
structural one . Ironically, this underlying conception of injury is shared by both those advocating for greater privacy protections and those arguing
in favor of the conflicting interests to privacy. For example, law professor Ann Bartow argues that I have failed to describe
privacy harms in a compelling manner in my article, A Taxonomy of Privacy, where I provide a framework for understanding the manifold different privacy
problems.87 Bartow’s primary complaint is that my taxonomy “frames privacy harms in dry, analytical terms that fail to sufficiently identify and animate the
compelling ways that privacy violations can negatively impact the lives of living, breathing human beings beyond simply provoking feelings of unease.”88 Bartow
claims that the taxonomy
does not have “enough dead bodies” and that privacy’s “lack of blood and death,
or at least of broken bones and buckets of money, distances privacy harms from other categories of tort law. Most
privacy problems lack dead bodies. Of course, there are exceptional cases such as the murders of Rebecca Shaeffer and Amy Boyer. Rebecca
Shaeffer was an actress killed when a stalker obtained her address from a Department of Motor Vehicles record.90 This incident prompted Congress to pass the
Driver’s Privacy Protection Act of 1994.91 Amy Boyer was murdered by a stalker who obtained her personal information, including her work address and Social
Security number, from a database company.92 These examples aside, there is not a lot of death and gore in privacy law. If this is the standard to recognize a
problem, then few privacy problems will be recognized. Horrific cases are not typical, and the purpose of my taxonomy is to explain why most privacy problems are
still harmful despite this fact. Bartow’s objection is actually very similar to the nothing to hide argument. Those
advancing the nothing to hide
argument have in mind a particular kind of visceral privacy harm, one where privacy is violated only when something deeply embarrassing or
discrediting is revealed. Bartow’s
quest for horror stories represents a similar desire to find visceral privacy harms. The problem is that not all
privacy harms are like this. At the end of the day, privacy
is not a horror movie, and demanding more palpable harms will be difficult in many cases.
Yet there is still a harm worth addressing, even if it is not sensationalistic.
In many instances, privacy is
threatened not by singular egregious acts, but by a slow series of relatively minor acts which gradually begin to add up. In this way, privacy problems resemble
certain environmental harms which occur over time through a series of small acts by different actors. Bartow wants to point to a major spill, but gradual pollution by
a multitude of different actors often creates worse problems. The law frequently struggles with recognizing harms that do not result in embarrassment, humiliation,
or physical or psychological injury.93 For example, after the September 11 attacks, several airlines gave their passenger records to federal agencies in direct
violation of their privacy policies. The federal agencies used the data to study airline security.94 A group of passengers sued Northwest Airlines for disclosing their
personal information. One of their claims was that Northwest Airlines breached its contract with the passengers. In Dyer v. Northwest Airlines Corp., the court
rejected the contract claim because “broad statements of company policy do not generally give rise to contract claims,” the passengers never claimed they relied
upon the policy or even read it, and they “failed to allege any contractual damages arising out of the alleged breach.”95 Another court reached a similar
conclusion.96 Regardless of the merits of the decisions on contract law, the cases represent a difficulty with the legal system in addressing privacy problems. The
disclosure of the passenger records represented a “breach of confidentiality.”97 The problems caused by breaches of confidentiality do not merely consist of
individual emotional distress; they involve a violation of trust within a relationship. There is a strong social value in ensuring that promises are kept and that trust is
maintained in relationships between businesses and their customers. The problem of secondary use is also implicated in this case.98 Secondary use involves data
collected for one purpose being used for an unrelated purpose without people’s consent. The airlines gave passenger information to the government for an entirely
different purpose beyond that for which it was originally gathered. Secondary use problems often do not cause financial, or even psychological, injuries. Instead, the
harm is one of power imbalance. In Dyer, data was disseminated in a way that ignored airline passengers’ interests in the data despite promises made in the privacy
policy. Even if the passengers were unaware of the policy, there is a social value in ensuring that companies adhere to established limits on the way they use
personal information. Otherwise, any stated limits become meaningless, and companies have discretion to boundlessly use data. Such a state of affairs can leave
nearly all consumers in a powerless position. The harm, then, is less one to particular individuals than it is a structural harm. A similar problem surfaces in another
case, Smith v. Chase Manhattan Bank.99 A group of plaintiffs sued Chase Manhattan Bank for selling customer information to third parties in violation of its privacy
policy, which stated that the information would remain confidential. The court held that even presuming these allegations were true, the plaintiffs could not prove
any actual injury: [T]he “harm” at the heart of this purported class action, is that class members were merely offered products and services which they were free to
decline. This does not qualify as actual harm. The complaint does not allege any single instance where a named plaintiff or any class member suffered any actual
harm due to the receipt of an unwanted telephone solicitation or a piece of junk mail.100 The court’s view of harm, however, did not account for the breach of
confidentiality. When
balancing privacy against security, the privacy harms are often characterized in terms of
injuries to the individual, and the interest in security is often characterized in a more broad societal way. The
security interest in the NSA programs has often been defined improperly. In a Congressional hearing, Attorney General
Alberto Gonzales stated: Our enemy is listening, and I cannot help but wonder if they are not shaking their heads in amazement at the thought that anyone would
imperil such a sensitive program by leaking its existence in the first place, and smiling at the prospect that we might now disclose even more or perhaps even
unilaterally disarm ourselves of a key tool in the war on terror.101 The balance between privacy and security is often cast in terms of whether a particular
government information collection activity should or should not be barred. The
issue, however, often is not whether the NSA or other government
agencies should be allowed to engage in particular forms of information gathering; rather, it is what kinds of
oversight and accountability we want in place when the government engages in searches and seizures. The government can
employ nearly any kind of investigatory activity with a warrant supported by probable cause. This is a mechanism of oversight—it
forces government officials to justify their suspicions to a neutral judge or magistrate before engaging in the tactic. For
example, electronic surveillance law allows for wiretapping, but limits the practice with judicial supervision, procedures to minimize the breadth of the wiretapping,
and requirements that the law enforcement officials report back to the court to prevent abuses.102 It is these procedures that the Bush Administration has ignored
by engaging in the warrantless NSA surveillance. The question is not whether we want the government to monitor such conversations, but whether the Executive
Branch should adhere to the appropriate oversight procedures that Congress has enacted into law, or should covertly ignore any oversight. Therefore, the security
interest should not get weighed in its totality against the privacy interest. Rather, what should get weighed is the extent of marginal limitation on the effectiveness
of a government information gathering or data mining program by imposing judicial oversight and minimization procedures. Only in cases where such procedures
will completely impair the government program should the security interest be weighed in total, rather than in the marginal difference between an unencumbered
program versus a limited one. Far too
often, the balancing of privacy interests against security interests takes place in a
manner that severely shortchanges the privacy interest while inflating the security interests . Such is the
logic of the nothing to hide argument. When
examined
the argument is unpacked, and its underlying assumptions
can see how it shifts the debate to its terms , in which it draws power from its
unfair advantage. It is time to pull the curtain on the nothing to hide argument. Whether explicit or not, conceptions of privacy underpin
and challenged, we
nearly every argument made about privacy, even the common quip “I’ve got nothing to hide.” As I have sought to demonstrate in this essay, understanding privacy
as a pluralistic conception reveals that we are often talking past each other when discussing privacy issues. By focusing more specifically on the related problems
under the rubric of “privacy,” we can better address each problem rather than ignore or conflate them. The nothing to hide argument speaks to some
problems, but not to others. It represents
a singular and narrow way of conceiving of privacy, and it wins by excluding
consideration of the other problems often raised in government surveillance and data mining
programs. When engaged with directly, the nothing to hide argument can ensnare, for it forces the debate to focus on its narrow understanding of privacy. But
when confronted with the plurality of privacy problems implicated by government data collection and use beyond
surveillance and disclosure, the nothing to hide argument, in the end, has nothing to say.
Put privacy before security. The ballot should create a side constraint where ends
don’t justify the means. This is especially applies to data collection in the absence of
probable cause.
Albright ‘14
Logan Albright is the Research Analyst at FreedomWorks, and is responsible for producing a wide variety of written content for
print and the web, as well as conducting research for staff media appearances and special projects. He received his Master’s
degree in economics from Georgia State University. “The NSA's Collateral Spying” – Freedom Works - 07/08/2014 http://www.freedomworks.org/content/nsas-collateral-spying
In short, the report, based on information obtained by Edward Snowden, reveals that during the course of its ordinary, otherwise legal surveillance operations,
the NSA also collected data on large numbers of people who were not specifically targeted. The agency
calls this practice “incidental surveillance.” I call it “collateral spying.” The report found that, on average, 9 out of every 10 people
spied on were not the intended target. The NSA has the legal authority to obtain a warrant based on
probable cause in order to surveil an individual. No one is disputing that. But when this targeting results
in collateral spying on vast numbers of innocents, in the absence of probable cause and the corresponding warrants, that is a
major problem. The NSA has asserted that such incidental data collection is inevitable, and to a certain extent that’s likely true. It is
should obviously be
minimized as far as possible , and at the very least the information should be immediately
purged from government databases , not stored for years on end. In any case, the whole situation is indicative of
understandable that in some situations the NSA may learn information about people other than the direct target, but this
the agency’s cavalier attitude towards individual rights. While
national security is a concern we all share, the ends do not justify
the means when those means involve violate the constitutional protections afforded to citizens by our nation’s founders. It is
not okay to violate the rights of an innocent in the process of achieving a broader goal, even
if that goal is noble. The way the NSA has been behaving is Machiavellian in the most literal sense. In his 16th century
political treatise, The Prince, Niccolo Machiavelli recognized a harsh reality of politics that still plagues us half a millennium later, writing, “A prince wishing to keep
his state is very often forced to do evil.” Taking Machiavelli’s advice as a
green light for immoral behavior has been the problem with
governments throughout history, a problem the founding fathers sought to avoid by setting down precise guidelines for what the government could and could not
do in the form of a Constitution. The disregard of these rules, and the
argument that there should be a national security
exception to the Fourth Amendment, undermines the entire purpose of the American experiment, and restores the European-style
tyrannies the revolutionaries fought against.
Even within a utilitarian framework, privacy outweighs for two reasons:
First – Structural bias. Their link inflates the security risk and their impact’s an
epistemologically wrong.
Solove ‘8
Daniel Solove is an Associate Professor at George Washington University Law School and holds a J.D. from Yale Law School. He
is one of the world’s leading expert in information privacy law and is well known for his academic work on privacy and for
popular books on how privacy relates with information technology. He has written 9 books and more than 50 law review
articles – From the Article: “Data Mining and the Security-Liberty Debate” - University of Chicago Law Review, Vol. 74, p. 343,
2008 - http://papers.ssrn.com/sol3/papers.cfm?abstract_id=990030
Data mining is one issue in a larger debate about security and privacy. Proponents of data mining justify it as an
essential tool to protect our security. For example, Judge Richard Posner argues that “[i]n an era of global terrorism and proliferation of weapons of mass destruction, the government has a
compelling need to gather, pool, sift, and search vast quantities of information, much of it personal.”9 Moreover, proponents of security measures argue that we must provide the executive branch with the discretion it needs to
protect us. We cannot second guess every decision made by government officials, and excessive meddling into issues of national security by judges and oth-ers lacking expertise will prove detrimental. For example, William Stuntz
contends that “effective, active government—government that innovates, that protects people who need protecting, that acts aggressively when action is needed—is dying. Privacy and transparency are the diseases. We need to
find a vaccine, and soon.”10 Stuntz concludes that “[i]n an age of terrorism, privacy rules are not simply unaffordable. They are perverse.”11 We live in an “age of balancing,” and
and civil liberties are not absolute.12 Thus,
how the balancing occurs
the prevailing view is that most rights
liberty must be balanced against security. But there are systematic problems with
that inflate the importance of the security interests and diminish the value of
the liberty interests .
In this essay, I examine some common difficulties in the way that liberty is balanced against security in the context of data mining. Countless discussions about the tradeoffs
liberty interests are cast as individual
rights and balanced against the security interests, which are cast in terms of the safety of society as a whole. Courts and
between security and liberty begin by taking a security proposal and then weighing it against what it would cost our civil liberties. Often, the
commentators defer to the government’s assertions about the effectiveness of the security interest. In the context of data mining, the liberty interest is limited by narrow understandings of privacy that neglect to account for many
privacy problems.
As a result, the balancing concludes with a victory in favor of the security interest. But
as I will argue,
privacy concerns are significantly greater than
acknowledged. These problems undermine the balancing process and skew results toward
the security side of the scale.
important dimensions of data mining’s security benefits require more scrutiny, and the
have
currently
d
ed the
Debates about data mining begin with the assumption that it is an essential tool in protecting our security. Terrorists lurk among us, and ferreting
them out can be quite difficult. Examining data for patterns will greatly assist in this endeavor, the argument goes, because certain identifiable characteristics and behaviors are likely to be associated with terrorist activity. Often,
little more is said, and the debate pro-ceeds to examine whether privacy is important enough to refrain from using such an effective terrorism-fighting tool. Many discussions about security and liberty proceed in this fashion. They
commence by assuming that a particular security measure is effective, and the only remaining question is whether the liberty interest is strong enough to curtail that measure. But given the gravity of the security concerns over
terrorism, the liberty interest has all but lost before it is even placed on the scale. Judge Richard Posner argues that judges should give the executive branch considerable deference when it comes to assessing the security measures
it proposes. In his recent book, Not a Suicide Pact: The Constitution in a Time of National Emergency,13 Posner contends that judicial restraint is wise because “when in doubt about the actual or likely consequences of a measure,
the pragmatic, empiricist judge will be inclined to give the other branches of government their head.”14 According to Posner, “[j]udges aren’t supposed to know much about national security.”15 Likewise, Eric Posner and Adrian
Vermeule declare in their new book, Terror in the Balance: Security, Liberty, and the Courts,16 that “the executive branch, not Congress or the judicial branch, should make the tradeoff between security and liberty.”17 Moreover,
Posner and Vermeule declare that during emergencies, “[c]onstitutional rights should be relaxed so that the executive can move forcefully against the threat.”18 The problem with such deference is that, historically, the executive
branch has not always made the wisest national security decisions. Nonetheless, Posner and Vermeule contend that notwithstanding its mistakes, the executive branch is better than the judicial and legislative branches on
institutional competence grounds.19 “Judges are generalists,” they observe, “and the political insulation that protects them from current politics also deprives them of information, especially information about novel security
threats and necessary responses to those threats.”20 Posner and Vermeule argue that during emergencies, the “novelty of the threats and of the necessary responses makes judicial routines and evolved legal rules seem
inapposite, even obstructive.”21 “Judicial routines” and “legal rules,” however, are the cornerstone of due process and the rule of law—the central building blocks of a free and democratic society. At many times, Posner,
Vermeule, and other strong proponents of security seem to focus almost exclusively on what would be best for security when the objective should be establishing an optimal balance between security and liberty. Although such a
balance may not promote security with maximum efficiency, it is one of the costs of living in a constitutional democracy as opposed to an authoritarian political regime. The executive branch may be the appropriate branch for
developing security measures, but this does not mean that it is the most adept branch at establishing a balance between security and liberty. In our constitutional democracy, all branches have a role to play in making policy. Courts
protect constitutional rights not as absolute restrictions on executive and legislative policymaking but as important interests to be balanced against government interests. As T. Alexander Aleinikoff notes, “balancing now dominates
major areas of constitutional law.”22 Balancing occurs through various forms of judicial scrutiny, requiring courts to analyze the weight of the government’s interest, a particular measure’s effectiveness in protecting that interest,
and the extent to which the government interest can be achieved without unduly infringing upon constitutional rights.23 For balancing to be meaningful, courts must scrutinize both the security and liberty interests. With
deference, however, courts fail to give adequate scrutiny to security interests. For example, after the subway bombings in London, the New York Police Department began a program of random searches of people’s baggage on the
subway. The searches were conducted without a warrant, probable cause, or even reasonable suspicion. In MacWade v Kelly,24 the United States Court of Appeals for the Second Circuit upheld the program against a Fourth
Amendment challenge. Under the special needs doctrine, when exceptional circumstances make the warrant and probable cause requirements unnecessary, the search is analyzed in terms of whether it is “reasonable.”25
Reasonableness is determined by balancing the government interest in security against the interests in privacy and civil liberties.26 The weight of the security interest should turn on the extent to which the program effectively
improves subway safety. The goals of the program may be quite laudable, but nobody questions the importance of subway safety. The critical issue is whether the search program is a sufficiently effective way of achieving those
goals that it is worth the tradeoff in civil liberties. On this question, unfortunately, the court deferred to the law enforcement officials, stating that the issue “is best left to those with a unique understanding of, and responsibility
for, limited public resources, including a finite number of police officers.” 27 In determining whether the program was “a reasonably effective means of addressing the government interest in deterring and detecting a terrorist
attack on the subway system,”28 the court refused to examine the data to assess the program’s effectiveness.29 The way the court analyzed the government’s side of the balance would justify nearly any search, no matter how
ineffective. Although courts should not take a know-it-all attitude, they should not defer on such a critical question as a security measure’s effectiveness. The problem with many security measures is that they are not wise
expenditures of resources. A small number of random searches in a subway system of over four million riders a day seems more symbolic than effective because the odds of the police finding the terrorist with a bomb are very low.
The government also argued that the program would deter terrorists from bringing bombs on subway trains, but nearly any kind of security measure can arguably produce some degree of deterrence. The key issue, which the court
did not analyze, is whether the program would lead to deterrence significant enough to outweigh the curtailment of civil liberties. If courts fail to question the efficacy of security measures, then the security interest will prevail
nearly all the time. Preventing terrorism has an immensely heavy weight, and any given security measure will provide a marginal advancement toward that goal. In the defer-ence equation, the math then becomes easy. At this
point, it is futile to even bother to look at the civil liberties side of the balance. The government side has already won. Proponents of deference argue that if courts did not defer, then they would be substituting their judgment for
that of executive officials, who have greater expertise in understanding security issues. Special expertise in national security, however, is often not necessary for balancing security and liberty. Judges and legislators should require
the experts to persuasively justify the security measures being developed or used. Of course, in very complex areas of knowledge, such as advanced physics, nonexperts may find it difficult to understand the concepts and
comprehend the terminology. But it is not clear that security expertise involves such sophisticated knowledge that it would be incomprehensible to nonexperts. Moreover, the deference argument conflates evaluating a particular
security measure with creating such a measure. The point of judicial review is to subject the judgment of government officials to critical scrutiny rather than blindly accept their authority. Critical inquiry into factual matters is not
the imposition of the judge’s own judgment for that of the decisionmaker under review.30 Instead, it is forcing government officials to explain and justify their policies. Few will quarrel with the principle that courts should not
“second guess” the decisions of policy experts. But there is a difference between not “second guessing” and failing to critically evaluate the factual and empirical evidence justifying the government programs. Nobody will contest
the fact that security is a compelling interest. The key issue in the balancing is the extent to which the security measure furthers the interest in security. As I have argued elsewhere, whenever courts defer to the government on the
effectiveness of a government security measure, they are actually deferring to the government on the ultimate question as to whether the measure passes constitutional muster.31 Deference by the courts or legislature is an
abdication of their function. Our constitutional system of government was created with three branches, a design structured to establish checks and balances against abuses of power. Institutional competence arguments are often
made as if they are ineluctable truths about the nature of each governmental branch. But the branches have all evolved considerably throughout history. To the extent a branch lacks resources to carry out its function, the answer
should not be to diminish the power of that branch but to provide it with the necessary tools so it can more effectively carry out its function. Far too often, unfortunately, discussions of institutional competence devolve into broad
generalizations about each branch and unsubstantiated assertions about the inherent superiority of certain branches for making particular determinations. It is true, as Posner and Vermeule observe, that historically courts have
been deferential to the executive during emergencies.32 Proponents of security measures often advance what I will refer to as the “pendulum theory”—that in times of crisis, the balance shifts more toward security and in times of
peace, the balance shifts back toward liberty. For example, Chief Justice Rehnquist argues that the “laws will thus not be silent in time of war, but they will speak with a somewhat different voice.”33 Judge Posner contends that the
liberties curtailed during times of crisis are often restored during times of peace.34 Deference is inevitable, and we should accept it without being overly concerned, for the pendulum will surely swing back. As I argue elsewhere,
however, there have been many instances throughout US history of needless curtailments of liberty in the name of security, such as the Palmer Raids, the Japanese Internment, and the McCarthy communist hearings.35 Too often,
such curtailments did not stem from any real security need but because of the “personal agendas and prejudices” of government officials.36 We should not simply accept these mistakes as inevitable; we should seek to prevent
them from occurring. Hoping that the pendulum will swing back offers little consolation to those whose liberties were infringed or chilled. The protection of liberty is most important in times of crisis, when it is under the greatest
threat. During times of peace, when our judgment is not clouded by fear, we are less likely to make unnecessary sacrifices of liberty. The threat to liberty is lower in peacetime, and the need to protect it is not as dire. The greatest
need for safeguarding liberty is during times when we least want to protect it. In order to balance security and liberty, we must assess the security interest. This involves evaluating two components—the gravity of the security
It is often merely assumed without question that the secu-rity threat from terrorism is one
of the gravest dangers we face in the modern world. But this assumption might be wrong. Assessing the risk of harm from terrorism is very difficult
threat and the effectiveness of the security measures to address it.
because terrorism is such an irregular occurrence and is constantly evolving. If we examine the data from previous terrorist attacks, however,
severely overstated.
the threat of terrorism has been
For example, many people fear being killed in a terrorist attack, but based on statistics from terrorism in the United States,
the risk of dying from
terrorism is miniscule. According to political scientist John Mueller, [e]ven with the September 11 attacks included in the count . . . the number of Americans killed by international terrorism since the late
1960s (which is when the State Department began its accounting) is about the same as the number killed over the same period by lightning, or by accident-causing deer, or by severe allergic reactions to peanuts.37 Add up
the eight deadliest terrorist attacks in US history, and they amount to fewer than four thousand fatalities.38
In contrast, flu and pneumonia deaths are estimated to be around sixty thousand per year.39 Another forty thousand die in auto accidents each year.40 Based on our experience with terrorism thus far, the risk of
dying from terrorism is very low on the relative scale of fatal risks. Dramatic events and media attention can cloud
a rational assessment of risk.
The year 2001 was not just notable for the September 11 attacks. It was also the summer of the shark bite, when extensive media coverage about shark
bites led to the perception that such attacks were on the rise. But there were fewer shark attacks in 2001 than in 2000 and fewer deaths as well, with only four in 2001 as compared to thirteen in 2000.41 And regardless of which
year had more deaths, the number is so low that an attack is a freak occurrence. It is certainly true that our past experience with terrorism might not be a good indicator of the future. More treacherous terrorism is possible, such
as the use of nuclear or biological weapons. This complicates our ability to assess the risk of harm from terrorism. Moreover, the intentional human conduct involved in terrorism creates a sense of outrage and fear that ordinary
deaths do not engender. Alleviating fear must be taken into account, even if such fear is irrationally high in relation to other riskier events such as dying in a car crash. But enlightened policy must not completely give in to the panic
most policymakers find it quite difficult to
assess the threat of terrorism modestly. In the face of widespread public panic, it is hard for government officials to make only moderate changes. Something dramatic must be done,
or political heads will roll. Given the difficulty in assessing the security threat in a more rational manner, it is imperative that the courts meaningfully analyze the effectiveness of security measures. Even if panic and fear
might lead to the gravity of the threat being overstated, we should at least ensure that the measures taken to
promote security are sufficiently effective to justify the cost. Unfortunately, as I will discuss in the next section, rarely do discussions about the sacrifice of civil liberties explain the corresponding
security benefit, why such a benefit cannot be achieved in other ways, and why such a security measure is the best and most rational one to take. Little scrutiny is given to security
measures. They are often just accepted as a given, no matter how ill-conceived or ineffective they might be. Some ineffective security measures are largely symbolic,
and irrational fear of the moment. It should certainly attempt to quell the fear, but it must do so thoughtfully. Nevertheless,
such as the New York City subway search program. The searches are unlikely to catch or deter terrorists because they involve only a miniscule fraction of the millions of daily passengers. Terrorists can just turn to other targets or
simply attempt the bombing on another day or at another train station where searches are not taking place. The vice of symbolic security programs is that they result in needless sacrifices of liberty and drain resources from other,
more effective security measures. Nevertheless, these programs have a virtue—they can ameliorate fear because they are highly visible. Ironically, the subway search program’s primary benefit was alleviating people’s fear (which
was probably too high), albeit in a deceptive manner (as the program did not add much in the way of security).
Data mining represents another kind of security measure, one that currently has little
proven effectiveness and little symbolic value. Data mining programs are often not visible enough to the public to quell much fear. Instead, their benefits come primarily from their actual effectiveness in
reducing terrorist threats, which remains highly speculative. Thus far,
data mining is not very accurate
in the behavioral predictions it makes. For example, there are
approximately 1.8 million airline passengers each day.42 A data mining program to identify terrorists with a false positive rate of 1 percent (which would be exceedingly low for such a program) would flag eighteen thousand people
as false positives. This is quite a large number of innocent people. Why is the government so interested in data mining if it remains unclear whether it will ever be very accurate or workable? Part of the government’s interest in
data mining stems from the aggressive marketing efforts of database companies. After September 11, database companies met with government officials and made a persuasive pitch about the virtues of data mining.43 The
just because data mining might
be effective for businesses trying to predict customer behavior does not make it effective for the
government trying to predict who will engage in terrorism. A high level of accuracy is not necessary when data mining is used by businesses to target
technology sounds quite dazzling when presented by skillful marketers, and it can work quite well in the commercial setting. The problem, however, is that
marketing to consumers, because the cost of error to individuals is minimal. Amazon.com, for example, engages in data mining to determine which books its customers are likely to find of interest by comparing bookbuying
patterns among its customers. Although it is far from precise, it need not be because there are few bad consequences if it makes a wrong book recommendation. Conversely, the consequences are vastly greater for government
I do not believe that the case has been made that data mining is a wise expenditure of
security resources. Those who advocate for security should be just as outraged as those on the liberty side of the debate. Although courts should not micromanage which security measures the government
data mining. Ultimately,
chooses, they should examine the effectiveness of any given security measure to weigh it against the liberty costs. Courts should not tell the executive branch to modify a security measure just because they are not convinced it is
The very point of protecting liberty is to
demand that sacrifices to liberty are not in vain and that security interests, which compromise civil
liberties, are sufficiently effective to warrant the cost.
the best one, but they should tell the executive that a particular security measure is not effective enough to outweigh the liberty costs.
Second - Relative certainty. The disad only may cause violence - surveillance definitely
does. Privacy is paramount for dignity and protecting our unique individuality.
Schneier ‘6
Bruce Schneier is a fellow at the Berkman Center for Internet & Society at Harvard Law School, a program fellow at the New
America Foundation's Open Technology Institute and the CTO of Resilient Systems. He is the author of Beyond Fear: Thinking
Sensibly About Security in an Uncertain World. Commentary, “The Eternal Value of Privacy”, WIRED, May 18, 2006,
http://www.wired.com/news/columns/1,70886-0.html
The most common retort against privacy advocates -- by those in favor of ID checks, cameras, databases, data mining and
other wholesale surveillance measures -- is this line: "If you aren't doing anything wrong, what do you have to
hide?" Some clever answers: "If I'm not doing anything wrong, then you have no cause to watch me."
"Because the government gets to define what's wrong, and they keep changing the definition." "Because you might do something wrong
with my information." My problem with quips like these -- as right as they are -- is that they accept the premise
that privacy is about hiding a wrong. It's not. Privacy is an inherent human right, and a requirement for
maintaining
the human condition with
dignity and respect. Two proverbs say it best: Quis custodiet custodes ipsos? ("Who watches
the watchers?") and "Absolute power corrupts absolutely." Cardinal Richelieu understood the value of surveillance when he famously said, "If one would give me six
lines written by the hand of the most honest man, I would find something in them to have him hanged." Watch someone long enough, and you'll find something to
arrest -- or just blackmail -- with. Privacy
is important because without it, surveillance information will be
abused : to peep, to sell to marketers and to spy on political enemies -- whoever they happen to be at the time. Privacy protects us from
abuses by those in power, even if we're doing nothing wrong at the time of surveillance. We do nothing wrong
when we make love or go to the bathroom. We are not deliberately hiding anything when we seek out private places for reflection or conversation. We keep private
journals, sing in the privacy of the shower, and write letters to secret lovers and then burn them.
Privacy is a basic human need.
A
future in which privacy would face constant assault was so alien to the framers of the Constitution that it never occurred to them to call out privacy as an explicit
right. Privacy was inherent to the nobility of their being and their cause. Of course being watched in your own home was unreasonable. Watching at all was an act
so unseemly as to be inconceivable among gentlemen in their day. You watched convicted criminals, not free citizens. You ruled your own home. It's intrinsic to the
concept of liberty. For
if we are observed in all matters, we are constantly under threat of correction, judgment,
criticism, even plagiarism
of our own uniqueness . We become children, fettered under watchful eyes, constantly fearful
that -- either now or in the uncertain future -- patterns we leave behind will be brought back to implicate
us, by whatever authority has now become focused upon our once-private and innocent acts. We lose
our individuality , because everything we do is observable and recordable. How many of us have paused
during conversation in the past four-and-a-half years, suddenly aware that we might be eavesdropped on? Probably it
was a phone conversation, although maybe it was an e-mail or instant-message exchange or a conversation in a public place. Maybe
the topic was terrorism, or politics, or Islam. We stop suddenly, momentarily afraid that our words might be
taken out of context, then we laugh at our paranoia and go on. But our demeanor has changed, and our
words are subtly altered. This is the loss of freedom we face when our privacy is taken from us. This is life in former East Germany, or life in Saddam
Hussein's Iraq. And it's our future as we allow an ever-intrusive eye into our personal, private lives. Too many wrongly characterize the
debate as "security versus privacy." The real choice is liberty versus control. Tyranny, whether it arises
under threat of foreign physical attack or under constant domestic authoritative scrutiny, is still
tyranny. Liberty requires security without intrusion, security plus privacy. Widespread police surveillance is the very
definition of a police state. And that's why we should champion privacy even when we have nothing to hide.
The 4th Amendment outweighs. An ethical ballot can’t even consider their security
impact. That would treat privacy as mere inconvenience – obliterating liberty.
Smith ‘14
Peter J. Smith IV – attorney for the law firm LUKINS & ANNIS and Lead Council for This brief was was signed by the entire legal
team, which includes four attorneys from the ELECTRONIC FRONTIER FOUNDATION and three additional attorneys from the
AMERICAN CIVIL LIBERTIES UNION FOUNDATION - APPELLANT’S REPLY BRIEF in the matter of Smith v. Obama – before the
United States Ninth Circuit Court of Appeals. October 16th – available at: https://www.eff.org/document/smiths-reply-brief
The government argues that it would be more convenient for law enforcement if the courts established
a bright-line rule that extinguished all privacy in information shared with others. See Gov’t Br. 40. The government is
surely right about this. The Bill of Rights exists, however, not to serve governmental efficiency but to safeguard
individual liberty. Cf. Bailey v. United States, 133 S. Ct. 1031, 1041 (2013) (“ ‘[T]he mere fact that law enforcement
may be made more efficient can never by itself justify disregard of the Fourth
Amendment .’” (quoting Mincey v. Arizona, 437 U.S. 385, 393 (1978))); Riley, 134 S. Ct. at 2493 (“Our cases have historically recognized that the
warrant requirement is ‘an important working part of our machinery of government,’ not merely
‘an inconvenience to be somehow “weighed” against the claims of police efficiency. ’”
(quoting Coolidge v. New Hampshire, 403 U.S. 443, 481 (1971))). Notably, the government made the same appeal for a bright-line rule in Jones and Maynard, see,
e.g., Brief for the United States at 13, Jones, 132 S. Ct. 945, but the Supreme Court and D.C. Circuit rejected it.
Reject those privacy violations as an a priori imperative. Also proves that the disad’s
all hype.
Wyden ‘14
(et al; This amicus brief issued by three US Senators - Ron Wyden, Mark Udall and Martin Heinrich. Wyden and Udall sat on the
Senate Select Committee on Intelligence and had access to the meta-data program. “BRIEF FOR AMICI CURIAE SENATOR RON
WYDEN, SENATOR MARK UDALL, AND SENATOR MARTIN HEINRICH IN SUPPORT OF PLAINTIFF-APPELLANT, URGING REVERSAL
OF THE DISTRICT COURT” – Amicus Brief for Smith v. Obama – before the United States Ninth Circuit Court of Appeals - Appeal
from the United States District Court District of Idaho The Honorable B. Lynn Winmill, Chief District Judge, Presiding Case No.
2:13-cv-00257-BLW – Sept 9th, 2014 – This Amicus Brief was prepared by CHARLES S. SIMS from the law firm PROSKAUER ROSE
LLP. This pdf can be obtained at: https://www.eff.org/document/wyden-udall-heinrich-smith-amicus)
Respect for Americans’ privacy is not a matter of convenience, but a Constitutional imperative .
Despite years of receiving classified briefings and asking repeated questions of intelligence officials in both
have seen no evidence that bulk collection accomplishes anything
that other less intrusive surveillance authorities could not. Bulk collection is not only a significant threat
to the constitutional liberties of Americans, but a needless one.9
private and public settings, amici
Reject utilitarianism. It shatters all ethics and justifies the worst atrocities.
Holt ‘95
(Jim Holt is an American philosopher, author and essayist. He has contributed to The New York Times, The New York Times
Magazine, The New York Review of Books, The New Yorker, The American Scholar, and Slate. He hosted a weekly radio spot on
BBC for ten years and he writes frequently about politics and philosophy. New York Times, “Morality, Reduced To Arithmetic,”
August 5, p. Lexis)
Can the deliberate massacre of innocent people ever be condoned? The atomic bombs dropped on Hiroshima and Nagasaki on Aug. 6 and 9, 1945, resulted in the deaths of 120,000 to 250,000
Japanese by incineration and radiation poisoning. Although a small fraction of the victims were soldiers, the great majority were noncombatants -- women, children, the aged. Among the
justifications that have been put forward for President Harry Truman’s decision to use the bomb, only one is worth taking seriously -- that it saved lives. The alternative, the reasoning goes,
was to launch an invasion. Truman claimed in his memoirs that this would have cost another half a million American lives. Winston Churchill put the figure at a million. Revisionist historians
have cast doubt on such numbers. Wartime documents suggest that military planners expected around 50,000 American combat deaths in an invasion. Still, when Japanese casualties, military
and civilian, are taken into account, the overall invasion death toll on both sides would surely have ended up surpassing that from Hiroshima and Nagasaki. Scholars will continue to argue over
whether there were other, less catastrophic ways to force Tokyo to surrender. But given the fierce obstinacy of the Japanese militarists, Truman and his advisers had some grounds for
believing that nothing short of a full-scale invasion or the annihilation of a big city with an apocalyptic new weapon would have succeeded. Suppose they were right. Would this prospect have
In the debate over the question, participants on both sides have been playing the
numbers game. Estimate the hypothetical number of lives saved by the bombings, then add up the actual lives
lost. If the first number exceeds the second, then Truman did the right thing; if the reverse, it was wrong to have dropped the bombs. That is one approach to the matter -- the utilitarian
approach. According to utilitarianism, a form of moral reasoning that arose in the 19th century, the goodness or evil of an action is determined
justified the intentional mass killing of the people of Hiroshima and Nagasaki?
solely by its consequences. If somehow you can save 10 lives by boiling a baby, go ahead and boil that
baby . There is, however, an older ethical tradition, one rooted in Judeo-Christian theology, that takes a quite different view. The gist of it is
Some actions, this tradition holds, can never be justified by
their consequences; they are absolutely forbidden. It is always wrong to boil a baby even if lives are
saved thereby. Applying this absolutist morality to war can be tricky. When enemy soldiers are trying to enslave or kill us, the principle of self-defense permits us to kill them
expressed by St. Paul’s condemnation of those who say, “Let us do evil, that good may come.”
(though not to slaughter them once they are taken prisoner). But what of those who back them? During World War II, propagandists made much of the “indivisibility” of modern warfare: the
idea was that since the enemy nation’s entire economic and social strength was deployed behind its military forces, the whole population was a legitimate target for obliteration. “There are no
civilians in Japan,” declared an intelligence officer of the Fifth Air Force shortly before the Hiroshima bombing, a time when the Japanese were popularly depicted as vermin worthy of
extermination. The boundary between combatant and noncombatant can be fuzzy, but the distinction is not meaningless, as the case of small children makes clear. Yet is wartime killing of
those who are not trying to harm us always tantamount to murder? When naval dockyards, munitions factories and supply lines are bombed, civilian carnage is inevitable. The absolutist moral
tradition acknowledges this by a principle known as double effect: although it is always wrong to kill innocents deliberately, it is sometimes permissible to attack a military target knowing some
noncombatants will die as a side effect. The doctrine of double effect might even justify bombing a hospital where Hitler is lying ill. It does not, however, apply to Hiroshima and Nagasaki.
Transformed into hostages by the technology of aerial bombardment, the people of those cities were intentionally executed en masse to send a message of terror to the rulers of Japan. The
practice of ordering the massacre of civilians to bring the enemy to heel scarcely began with Truman. Nor did the bomb result in casualties of a new order of magnitude. The earlier bombing of
Tokyo by incendiary weapons killed some 100,000 people. What Hiroshima and Nagasaki did mark, by the unprecedented need for rationalization they presented, was the triumph of
utilitarian thinking in the conduct of war. The conventional code of noncombatant immunity -- a product of several centuries of ethical progress among nations, which had
been formalized by an international commission in the 1920’s in the Hague -- was swept away. A simpler axiom took its place: since war is hell, any means necessary may be used to end, in
Churchill’s words, “the vast indefinite butchery.” It
is a moral calculus that, for all its logical consistency, offends
our deep-seated intuitions about
the
sanctity of life -- our conviction that a person is always to be treated as an end, never as a means. Left up to
the warmakers, moreover, utilitarian calculations are susceptible to bad-faith reasoning: tinker with the
numbers enough and virtually any atrocity can be excused in the national interest. In January, the
world commemorated the 50th anniversary of the liberation of Auschwitz, where mass slaughter was committed as an end in itself -- the ultimate evil. The moral nature of Hiroshima is
the bomb’s sinister legacy is
plain: it has inured us to the idea of reducing innocents to instruments and morality to arithmetic.
ambiguous by contrast. Yet in the postwar era, when governments do not hesitate to treat the massacre of civilians as just another strategic option,
1NC Section
1NC – Terror Disad
Uniqueness – Domestic surveillance successfully checks terror incidents now. Prefer
longitudinal studies.
Boot ‘13
Max Boot is a Senior Fellow in National Security Studies at the Council on Foreign Relations. In 2004, he was named by the
World Affairs Councils of America as one of "the 500 most influential people in the United States in the field of foreign policy."
In 2007, he won the Eric Breindel Award for Excellence in Opinion Journalism. From 1992 to 1994 he was an editor and writer at
the Christian Science Monitor. Boot holds a bachelor's degree in history, with high honors, from the University of California,
Berkeley and a master's degree in history from Yale University. Boot has served as an adviser to U.S. commanders in Iraq and
Afghanistan. He is the published author of Invisible Armies: An Epic History of Guerrilla Warfare from Ancient Times to the
Present. From the article: “Stay calm and let the NSA carry on” - LA Times – June 9th http://articles.latimes.com/2013/jun/09/opinion/la-oe-boot-nsa-surveillance-20130609
After 9/11, there was a widespread expectation of many more terrorist attacks on the United States. So far that hasn't
happened. We haven't escaped entirely unscathed (see Boston Marathon, bombing of), but on the whole we have been a lot safer than most
security experts, including me, expected. In light of the current controversy over the National Security Agency's monitoring of telephone calls and
emails, it is worthwhile to ask: Why is that? It is certainly not due to any change of heart among our enemies.
Radical Islamists still want to kill American infidels. But the vast majority of the time, they fail. The Heritage Foundation estimated last year that
50 terror attacks on the American
ist
homeland had been foiled since 2001. Some, admittedly, failed through sheer incompetence on the part of the would-be terrorists. For instance, Faisal Shahzad, a Pakistani American
jihadist, planted a car bomb in Times Square in 2010 that started smoking before exploding, thereby alerting two New Yorkers who in turn called police, who were able to defuse it. But it would be naive to adduce all of our security
more attacks would have succeeded absent the ramped-up counter-terrorism efforts
undertaken by the U.S. intelligence community, the military and law enforcement. And a large element of the intelligence community's
success lies in its use of special intelligence — that is, communications intercepts. The CIA is notoriously deficient in human intelligence — infiltrating spies into terrorist
success to pure serendipity. Surely
organizations is hard to do, especially when we have so few spooks who speak Urdu, Arabic, Persian and other relevant languages. But the NSA is the best in the world at intercepting communications.
That is the
most important technical advantage we have in the battle against fanatical foes who will not
hesitate to sacrifice their lives to take ours. Which brings us to the current kerfuffle over two NSA monitoring programs that
have been exposed by the Guardian and the Washington Post. One program apparently collects metadata on all telephone calls made in the United States. Another program provides access
to all the emails, videos and other data found on the servers of major Internet firms such as Google, Apple and
Microsoft. At first blush these intelligence-gathering activities raise the specter of Big Brother snooping on ordinary American
citizens who might be cheating on their spouses or bad-mouthing the president. In fact, there are considerable safeguards built into both programs
to ensure that doesn't happen. The phone-monitoring program does not allow the NSA to listen in on
conversations without a court order. All that it can do is to collect information on the time, date and
destination of phone calls. It should go without saying that it would be pretty useful to know if someone in the U.S. is calling a number in Pakistan or Yemen that is used by a terrorist organizer. As for
the Internet-monitoring program, reportedly known as PRISM, it is apparently limited to "non-U.S. persons" who are abroad and thereby enjoy no constitutional protections. These are hardly rogue operations. Both programs were
initiated by President George W. Bush and continued by President Obama with the full knowledge and support of Congress and continuing oversight from the federal judiciary. That's why the leaders of both the House and Senate
intelligence committees, Republicans and Democrats alike, have come to the defense of these activities.
It's possible that, like all government programs, these could be
abused — see, for example, the IRS making life tough on tea partiers. But there is no evidence of abuse so far and plenty of evidence —
in the lack of successful terrorist attacks — that these programs have been effective in disrupting terrorist plots. Granted there is something inherently
creepy about Uncle Sam scooping up so much information about us. But Google, Facebook, Amazon, Twitter, Citibank and other companies know at least as much about us, because they use very similar data-mining programs to
track our online movements. They gather that information in order to sell us products, and no one seems to be overly alarmed. The NSA is gathering that information to keep us safe from terrorist attackers. Yet somehow its actions
have become a "scandal," to use a term now loosely being tossed around. The real scandal here is that the Guardian and Washington Post are compromising our national security by telling our enemies about our intelligencegathering capabilities. Their news stories reveal, for example, that only nine Internet companies share information with the NSA. This is a virtual invitation to terrorists to use other Internet outlets for searches, email, apps and all
to stop or scale back the NSA's special intelligence efforts would amount to
unilateral disarmament in a war against terrorism that is far from over.
the rest. No intelligence effort can ever keep us 100% safe, but
(Note to students: a “longitudinal study” is research carried out over an extended period of time. In this
case, several years.)
Link – curtailing surveillance boosts terror risks. That risk’s serious and
underestimated.
Lewis ‘14
James Andrew Lewis is a senior fellow and director of the Strategic Technologies Program at the Center for Strategic and
International Studies in Washington, D.C., where he writes on technology, security, and the international economy. Before
joining CSIS, he worked at the US Departments of State and Commerce as a Foreign Service officer and as a member of the
Senior Executive Service. His diplomatic experience included negotiations on military basing in Asia, the Cambodia peace
process, and the five-power talks on arms transfer restraint. Lewis received his Ph.D. from the University of Chicago.
“Underestimating Risk in the Surveillance Debate” - CENTER FOR STRATEGIC & INTERNATIONAL STUDIES - STRATEGIC
TECHNOLOGIES PROGRAM – December - http://csis.org/publication/underestimating-risk-surveillance-debate
Americans are reluctant to accept terrorism is part of their daily lives, but attacks have been planned or
attempted against American targets (usually airliners or urban areas) almost every year since 9/11. Europe faces even
greater risk, given the thousands of European Union citizens who will return hardened and radicalized from fighting in Syria and Iraq. The threat of attack
is easy to exaggerate, but that does not mean it is nonexistent. Australia’s then-attorney general said in August 2013 that
communications surveillance had stopped four “mass casualty events” since 2008. The constant planning and preparation for attack by terrorist groups is not
apparent to the public. The
dilemma in assessing risk is that it is discontinuous. There can be long periods with
no noticeable activity, only to have the apparent calm explode. The debate over how to reform
surveillance has discounted this risk. Communications surveillance is an essential law
enforcement and intelligence tool. There is no replacement for it. Some suggestions for alternative
communications
approaches to surveillance, such as the idea that the National Security Agency (NSA) only track known or suspected terrorists,
reflect wishful thinking, as it is the unknown terrorist who will inflict the greatest harm.
Vigilance link - Strong intel gathering’s key to discourages initiation of BW attacks.
Pittenger ‘14
US Rep. Robert Pittenger, chair of Congressional Task Force on Terrorism, “Bipartisan bill on NSA data collection protects both
privacy and national security” - Washington Examiner, 6/9/14, http://washingtonexaminer.com/rep.-robert-pittengerbipartisan-bill-on-nsa-data-collection-protects-both-privacy-and-nationalsecurity/article/2549456?custom_click=rss&utm_campaign=Weekly+Standard+Story+Box&utm_source=weeklystandard.com&
utm_medium=referral
This February, I took
that question to a meeting of European Ambassadors at the Organization for Security and Cooperation in
Europe. During the conference, I asked three questions: 1. What is the current worldwide terrorist threat? 2. What is America’s role in addressing and mitigating this
threat? 3. What
role does intelligence data collection play in this process, given the multiple platforms for attack
including physical assets, cyber, chemical, biological , nuclear and the electric grid? Each ambassador
acknowledged the threat was greater today than before 9/11, with al Qaeda and other extreme Islamist terrorists
stronger, more sophisticated, and having a dozen or more training camps throughout the Middle East and
Africa. As to the role of the United States, they felt our efforts were primary and essential for peace and
security around the world. Regarding the intelligence-gathering, their consensus was, “We want privacy,
but we must have your intelligence .” As a European foreign minister stated to me, “Without U.S. intelligence, we are blind.” We
cannot yield to those loud but misguided voices who view the world as void of the deadly and destructive
intentions of unrelenting terrorists. The number of terrorism-related deaths worldwide doubled between 2012 and
2013, jumping from 10,000 to 20,000 in just one year. Now is not the time to stand down. Those who embrace an altruistic
worldview should remember that vigilance and strength have deterred our enemies in the past.
That same commitment is required today to defeat those who seek to destroy us and our way of life. We must
make careful, prudent use of all available technology to counter their sophisticated operations if we are to maintain our
freedom and liberties.
Bioterror attacks cause extinction
Mhyrvold ‘13
Nathan, Began college at age 14, BS and Masters from UCLA, Masters and PhD, Princeton “Strategic Terrorism: A Call to
Action,” Working Draft, The Lawfare Research Paper Series Research paper NO . 2 – 2013
As horrible as this would be, such a pandemic is by no means the worst attack one can imagine, for several reasons. First, most
of the classic
bioweapons are based on 1960s and 1970s technology because the 1972 treaty halted bioweapons
development efforts in the United States and most other Western countries. Second, the Russians, although solidly
committed to biological weapons long after the treaty deadline, were never on the cutting edge of biological research. Third and most important, the
science
and technology of molecular biology have made enormous advances, utterly transforming the field in the last
few decades. High school biology students routinely perform molecular-biology manipulations that would
have been impossible even for the best superpower-funded program back in the heyday of biologicalweapons research. The biowarfare methods of the 1960s and 1970s are now as antiquated as the
lumbering mainframe computers of that era. Tomorrow’s terrorists will have vastly more deadly bugs to
choose from. Consider this sobering development: in 2001, Australian researchers working on mousepox, a nonlethal virus that infects mice (as chickenpox
does in humans), accidentally discovered that a simple genetic modification transformed the virus.10, 11 Instead of producing mild symptoms, the new virus killed
60% of even those mice already immune to the naturally occurring strains of mousepox. The new virus, moreover, was unaffected by any existing vaccine or
antiviral drug. A team of researchers at Saint Louis University led by Mark Buller picked up on that work and, by late 2003, found a way to improve on it: Buller’s
variation on mousepox was 100% lethal, although his team of investigators also devised combination vaccine and antiviral therapies that
were partially effective in protecting animals from the engineered strain.12, 13 Another saving grace is that the genetically altered virus is no
longer contagious. Of course, it is quite possible that future tinkering with the virus will change that
property, too. Strong reasons exist to believe that the genetic modifications Buller made to mousepox would work
for other poxviruses and possibly for other classes of viruses as well. Might the same techniques allow chickenpox or another poxvirus
that infects humans to
be turned into a 100% lethal bioweapon, perhaps one that is resistant to any known antiviral therapy?
I’ve asked this question of experts many times, and no one has yet replied that such a manipulation
couldn’t be done. This case is just one example. Many more are pouring out of scientific journals and conferences every
year. Just last year, the journal Nature published a controversial study done at the University of Wisconsin–Madison in which virologists enumerated the changes
one would need to make to a highly lethal strain of bird flu to make it easily transmitted from one mammal to another.14 Biotechnology
is advancing
so rapidly that it is hard to keep track of all the new potential threats . Nor is it clear that anyone is even trying. In addition to
lethality and drug resistance, many other parameters can be played with, given that the infectious power of an
epidemic depends on many properties, including the length of the latency period during which a person is
contagious but asymptomatic. Delaying the onset of serious symptoms allows each new case to spread to more
people and thus makes the virus harder to stop. This dynamic is perhaps best illustrated by HIV , which is very
difficult to transmit compared with smallpox and many other viruses. Intimate contact is needed, and even then, the infection rate is low. The
balancing
factor is that HIV can take years to progress to AIDS , which can then take many more years to kill the
victim. What makes HIV so dangerous is that infected people have lots of opportunities to infect others. This property has allowed HIV to claim more than 30
million lives so far, and approximately 34 million people are now living with this virus and facing a highly uncertain future.15 A
virus genetically
engineered to infect its host quickly, to generate symptoms slowly —say, only after weeks or months—and to spread easily
vastly more devastating than HIV . It could silently
penetrate the population to unleash its deadly effects suddenly . This type of epidemic would be
through the air or by casual contact would be
almost impossible to combat because most of the infections would occur before the epidemic became obvious.
A technologically sophisticated terrorist group could develop such a virus and kill a large part of humanity with
it. Indeed, terrorists may not have to develop it themselves: some scientist may do so first and publish the details. Given the
rate at which biologists are making discoveries about viruses and the immune system, at some point in the
near future, someone may create
artificial pathogens that could drive the human race to
extinction . Indeed, a detailed species-elimination plan of this nature was openly proposed in a scientific
journal. The ostensible purpose of that particular research was to suggest a way to extirpate the malaria mosquito, but similar
techniques could be directed toward humans.16 When I’ve talked to molecular biologists about this method, they are quick to point out that it
is slow and easily detectable and could be fought with biotech remedies. If you challenge them to come up with improvements to the suggested attack plan,
however, they have plenty of ideas. Modern
biotechnology will soon be capable, if it is not already, of
bringing about
the demise of the human race — or at least of killing a sufficient number of people to end high-tech
civilization and set humanity back 1,000 years or more. That terrorist groups could achieve this level of technological sophistication
may seem far-fetched, but keep in mind that it takes only a handful of individuals to accomplish these tasks. Never has lethal power of this potency been accessible
to so few, so easily. Even more dramatically than nuclear proliferation, modern biological science has frighteningly undermined the correlation between the lethality
of a weapon and its cost, a fundamentally stabilizing mechanism throughout history. Access to extremely lethal agents—lethal enough to exterminate Homo
sapiens—will be available to anybody with a solid background in biology, terrorists included.
The Disad turns the case via rollback and new civil liberty violations. Status Quo
detection is key.
Clarke ‘13
(et al; This is the Final Report and Recommendations of The President’s Review Group on Intelligence and Communications
Technologies. President Obama ordered a blue-ribbon task force to review domestic surveillance. This report releases the
findings of that group. The report was headed by five experts – including Richard Alan Clarke, who is the former National
Coordinator for Security, Infrastructure Protection, and Counter-terrorism for the United States. Other expert contributors
include Michael Joseph Morell, who was the deputy director of the Central Intelligence Agency and served as acting director
twice in 2011 and from 2012 to 2013 and Cass Robert Sunstein, who was the Administrator of the White House Office of
Information and Regulatory Affairs in the Obama administration and is currently a Professor of Law at Harvard Law School.
“LIBERTY AND SECURITY IN A CHANGING WORLD” – December 12th, 2013 – Easily obtained via a google search.
https://www.google.com/url?sa=t&rct=j&q=&esrc=s&source=web&cd=1&cad=rja&uact=8&ved=0CB4QFjAA&url=https%3A%2F
2Fwww.whitehouse.gov%2Fsites%2Fdefault%2Ffiles%2Fdocs%2F2013-12
12_rg_final_report.pdf&ei=Db0yVdDjKIKdNtTXgZgE&usg=AFQjCNH0S_Fo9dckL9bRarVpi4M6pq6MQ&bvm=bv.91071109,d.eXY)
The September 11 attacks were a vivid demonstration of the need for detailed information about the
activities of potential terrorists. This was so for several reasons. First, some information, which could have been useful, was
not collected and other information, which could have helped to prevent the attacks, was not shared among departments. Second, the scale of damage that 21st-century terrorists can inflict is far greater than
anything that their predecessors could have imagined. We are no longer dealing with threats from firearms and conventional explosives, but with the
possibility of
w
eapons of
m d
ass
estruction,
including nuclear devices and biological and chemical agents. The damage that such attacks could inflict on the nation,
measured in terms of loss of life, economic and social disruption, and the consequent sacrifice of civil liberties, is extraordinary. The events of September 11 brought this home with crystal clarity. Third, 21st-century terrorists
operate within a global communications network that enables them both to hide their existence from outsiders and to communicate with one another across continents at the speed of light. Effective safeguards against terrorist
attacks require the technological capacity to ferret out such communications in an international communications grid. Fourth, many of the international terrorists that the United States and other nations confront today cannot
realistically be deterred by the fear of punishment. The conventional means of preventing criminal conduct—the fear of capture and subsequent punishment—has relatively little role to play in combating some contemporary
terrorists. Unlike the situation during the Cold War, in which the Soviet Union was deterred from launching a nuclear strike against the United States in part by its fear of a retaliatory counterattack, the terrorist enemy in the 21stcentury is not a nation state against which the United States and its allies can retaliate with the same effectiveness. In such circumstances, detection in advance is essential in any effort to “provide for the common defence.” Fifth,
the threat of massive terrorist attacks involving nuclear, chemical, or biological weapons can generate a chilling and destructive environment of fear and anxiety among our nation’s citizens.
If Americans came
to believe that we are infiltrated by enemies we cannot identify and who have the power to bring death, destruction, and chaos to our lives on a massive scale, and that preventing
such attacks is beyond the capacity of our government , the quality of national life would be
greatly imperiled. Indeed, if a similar or even more devastating attack were to occur in the future, there would almost
surely be an impulse to increase the use of surveillance technology to prevent further strikes, despite the potentially
corrosive effects on individual freedom and self-governance.
1NC –Politics shell
Obama’s all in on TPP, but PC key to bring deal itself across congressional finish line –
it’s the mother of all trade fights because its perceived as setting the new framework
for ALL FUTURE TRADE DEALS
Vinik, 15 -- Danny Vinik is a staff writer at The New Republic, New Republic, 4/8/15,
http://www.newrepublic.com/article/121476/trans-pacific-partnership-foundation-all-future-tradedeals
A theme runs through these four disagreements: They're overrated. The actual effects of the TPP are exaggerated. Labor
unions warn
about mass job losses and the Obama Administration touts the significant labor provisions in the law, but
the academic evidence largely points to small job losses or gains. The left demands a chapter on currency manipulation
while knowing that the 11 other TPP countries will never accept one without significant restrictions on
the Federal Reserve. Even for Washington, a town where every policy decisions becomes
a massive lobbying free-for-all, the TPP seems overblown. Until, that is, you consider what’s
really at stake with the TPP . "I think its larger importance is trying to establish a new
framework under which global trade deals will be done, ” said Hanson. “Now that the [World
Trade Organization] seems to be pretty much ineffective as a form for negotiating new trade deals, we
need a new rubric." Looked at through that lens, it makes sense why both the unions and the
Obama administration have spent so much political capital on the TPP. If the TPP sets the
framework for future trade deals , it could be a long time before unions have the
leverage again to push for a crackdown on currency manipulation. They understand, as the
Obama Administration and many interest groups do , what much of the media doesn't: The TPP isn't
just a 12-country trade deal. It's much bigger than that. When I shared this theory with Jared Bernstein, he
began to rethink his position. “When you put it that way, I kind of feel myself being pulled back into the initial title of my post,” he said. “In
other words, if this is the last big trade deal , then perhaps the absence of a currency chapter is a
bigger deal than I thought.” If the TPP could determine the course of global trade for decades
to come , then each interest group has a huge incentive to fight for every last policy
concession . It explains why labor and business groups are putting huge amounts of
money into this fight. That money and the accompanying rhetoric has only made it
harder for policy journalists to cut through these complex debates. It may take decades before we really
understand the stakes of the TPP.
Freedom act was delicate balancing act – ANY additional changes drain PC and
guarantee intense opposition – congressional leadership, GOP, law enforcement
Gross, 6/5 – Grant, Grant Gross covers technology and telecom policy in the U.S. government for the IDG News Service, and is based
in Washington, D.C., IDG News Service, PC World, 6/5/15, http://www.pcworld.com/article/2932337/dont-expect-major-changes-to-nsasurveillance-from-congress.html
What’s in the USA Freedom Act? Some critics have blasted the USA Freedom Act as fake reform, while supporters have called it the biggest
overhaul of U.S. surveillance program in decades. Many civil liberties and privacy groups have come down in the middle of those two views,
calling it modest reform of the counterterrorism Patriot Act. The law aims to end the NSA’s decade-plus practice of collecting U.S. telephone
records in bulk, while allowing the agency to search those records in a more targeted manner. The law also moves the phone records database
from the NSA to telecom carriers, and requires the U.S. Foreign Intelligence Surveillance Court (FISC) to consult with tech and privacy experts
when ruling on major new data collection requests from the NSA. It also requires all significant FISC orders from the last 12 years to be released
to the public. The new law limits bulk collection of U.S. telephone and business records by requiring the FBI, the agency that applies for data
collection, to use a “specific selection term” when asking the surveillance court to authorize records searches. The law prohibits the FBI and
NSA from using a “broad geographic region,” including a city, county, state or zip code, as a search term, but it doesn’t otherwise define
“specific search term.” That’s a problem, according to critics. The surveillance court could allow, for example, “AT&T” as a specific search term
and give the NSA the authority to collect all of the carrier’s customer records. Such a ruling from FISC would seem to run counter to
congressional intent, but this is the same court that defined all U.S. phone records as “relevant” to a counterterrorism investigation under the
old version of the Patriot Act’s Section 215. The USA Freedom
Act also does nothing to limit the NSA’s surveillance of overseas
limiting that NSA program, called Prism in 2013
Internet traffic, including the content of emails and IP voice calls. Significantly
Snowden leaks, will
be a difficult task in Congress , with many lawmakers unconcerned
about the
privacy rights of people who don’t vote in U.S. elections. Still, the section of the Foreign Intelligence Surveillance Act that authorizes those NSA
foreign surveillance programs sunsets in 2017, and that deadline will force Congress to look at FISA, although lawmakers may wait until the last
minute, as they did with the expiring sections of the Patriot Act covered in the USA Freedom Act. The House Judiciary Committee will continue
its oversight of U.S. surveillance programs, and the committee will address FISA before its provisions expire, an aide to the committee said.
Republican leaders opposed to more changes Supporters of new reforms will have to bypass
congressional leadership , however. Senate Republican leaders attempted to derail even the USA
Freedom Act and refused to allow amendments that would require further changes at the
NSA. In the House, Republican leaders threatened to kill the USA Freedom Act if the Judiciary
Committee amended the bill to address other surveillance programs. Still, many House members, both Republicans
and Democrats, have pushed for new surveillance limits, with lawmakers adding an amendment to end so-called backdoor government
searches of domestic communications to a large appropriations bill this week. Obama’s administration has threatened to veto the
appropriations bill for several unrelated reasons, but several House members have pledged to push hard to prohibit the FBI and CIA from
searching the content of reportedly tens of thousands of U.S. communications swept up in an NSA surveillance program targeting overseas
terrorism suspects. Closing that surveillance backdoor is a top priority for civil liberties groups, said Neema Singh Guliani, a legislative counsel
with the American Civil Liberties Union’s Washington, D.C., legislative office. “We’ve had this statute that masquerades as affecting only people
abroad, but the reality is that it sweeps up large numbers of U.S. persons,” she said. Other changes possible Advocates and lawmakers will also
push for a handful of other surveillance reforms in the coming months. The
changes most likely to pass make limited
changes to surveillance programs, however. While not tied to NSA surveillance, lawmakers will press for changes to the 29-year-old
Electronic Communications Privacy Act (ECPA), a wiretap law that gives law enforcement agencies warrantless access to emails and other
communications stored in the cloud for more than six months. A House version of ECPA reform counts more than half the body as co-sponsors.
Still, tech companies and civil liberties groups have been pushing since 2010 to have those communications protected by warrants, but
law
enforcement agencies and some Republican lawmakers have successfully opposed the changes .
Another bill that may gain traction in coming months is the Judicial Redress Act, a bill that would allow citizens of some countries to file lawsuits
under the U.S. Privacy Act if government agencies misuse their records. “The Privacy Act offers limited protections, even to Americans, but
passage of this bill would be an important first step to addressing especially European concerns that US privacy reforms won’t help them,” said
Berin Szoka, president of free market think tank TechFreedom. Public pressure, along with potentially new leaks, will be the key to driving any
more surveillance changes, advocates said. “The public will for mass surveillance laws was made very clear recently, and that’s partly why we
saw much of Congress flock to whatever could be called surveillance reform,” said Tiffiniy Cheng, a founder of digital rights group Fight for the
Future. “No one is fooled by USA
Freedom—it’s a weak piece of legislation that uses exceptions in legislative
language to codify the NSA’s practice of surveilling most people.” Congress has much work left to do, Cheng said by
email. “After the recent showdown and public outcry, USA Freedom is at best, seen as a beginning of surveillance reform, not the end,” she
said.
Impact is multiple scenarios for conflict throughout asia and east asia – impact D and
thumpers don’t apply – TPP is necessary AND sufficient condition, accesses every
structural check – 11 reasons
-
Pivot
Institutions and Rules that moderate and constrain Territorial disputes and escalation
US regional leadership
Perception and credibility of US regional commitment
Perception and Regional credibility of US-Japan alliance effectiveness
Economy
Trade
Economic interdependence
Peaceful china rise and transition
Rule of law
Outweighs US military shift
Economist 14. [11-15-14 --- http://www.economist.com/news/special-report/21631797-americaneeds-push-free-trade-pact-pacific-more-vigorously-americas-big-bet]
Mr Froman, the trade tsar, puts
TPP into a dauntingly ambitious context. He calls it central to America’s pivot
to Asia , a chance to show the country’s commitment to creating institutions that
moderate territorial disputes , and an opportunity to show emerging economies (meaning China)
what economic rules the global economy should follow . “At a time when there is uncertainty
about the direction of the global trading system , TPP can play a central role in setting
rules of the road for a critical region in flux,” he says. The flipside of this is that failure becomes
an even bigger risk , which Mr Froman acknowledges. Perhaps in an effort to prod a somnolent, introspective Congress into action,
he makes the dramatic claim that failure could mean America “would forfeit its seat at the centre of the
global economy”. Many pundits in Washington agree that American leadership in Asia is on the
table . Michael Green of the Centre for Strategic and International Studies says TPP failure would “ undermine the
impression of the United States as a Pacific power and look like an abdication of
leadership ”. It would also take pressure off Japan and China to reform their economies. Mireya Solís, a
Japan expert at the Brookings Institution, says it would be a “ devastating blow to the United States’
credibility ”. Those views are echoed in East Asia. Mr Tay in Singapore says TPP failure would be a
disaster: “If the domestic issues of these two countries cannot be resolved, there is no sense that
the US-Japan alliance can provide any kind of steerage for the region.” Deborah Elms, head of
the Singapore-based Asian Trade Centre, suggests that so far the American pivot has manifested itself mainly as an extra 1,000 marines
Without TPP, all the pivot amounts to is a few extra boots on the
ground in Darwin,” she says. Even members of America’s armed forces are worried . As one senior serving
officer in the Pacific puts it, “the TPP unites countries that are committed to a trade-based
future, transparency and the rule of law. It is the model that the United States and Europe
have advanced versus that advanced by China. It is an opportunity to move the arc of Chinese
development, or identify it as a non-participant.”
stationed in Australia. “
Nuclear war
Landay 00 (Jonathan S., National Security and Intelligence Correspondent, Knight Ridder/Tribune
News Service, 3-10, Lexis)
Few if any experts think China and Taiwan, North Korea and South Korea, or India and Pakistan are spoiling to fight. But
even a minor miscalculation by any of them could destabilize Asia, jolt the global economy and even start
a nuclear war . India, Pakistan and China all have nuclear weapons, and North Korea may have a few, too. Asia
lacks the kinds of organizations, negotiations and diplomatic relationships that helped keep an uneasy peace for five
decades in Cold War Europe. “Nowhere else on Earth are the stakes as high and relationships so
fragile ,” said Bates
Gill, director of northeast Asian policy studies at the Brookings Institution, a Washington think tank. “We see the
great power interest overlaid with lingering confrontations with no institutionalized
security mechanism in place. There are elements for potential disaster.” In an effort to cool the region’s tempers, President
convergence of
Clinton, Defense Secretary William S. Cohen and National Security Adviser Samuel R. Berger all will hopscotch Asia’s capitals this month. For
America, the stakes could hardly be higher. There are 100,000 U.S. troops in Asia committed to defending Taiwan, Japan
and South Korea, and the
U nited S tates would instantly become embroiled if Beijing moved against Taiwan or
North Korea attacked South Korea. While Washington has no defense commitments to either India or Pakistan, a conflict between the
two could end the global taboo against using nuclear weapons and demolish the already shaky international
nonproliferation regime. In addition, globalization has made a stable Asia, with its massive markets, cheap labor,
exports and resources, indispensable to the U.S. economy. Numerous U.S. firms and millions of American jobs
depend on trade with Asia that totaled $600 billion last year, according to the Commerce Department.
1NC Case Frontline vs. the Privacy advantage
1. Counter-bias – their epistemology’s more flawed. Excess fear of surveillance
means Aff scholarship’s MORE of an exaggeration than ours.
McDonough ‘15
(Shannon McDonough – Instructor in Social Sciences at Allen University. The author holds a B.A. in Sociology from Miami
University, Ohio and an M.A. Sociology from The University of South Carolina. This article is co-authored by Mathieu Deflem – a
Professor at the University of South Carolina in the Department of Sociology. His research areas include law, policing, terrorism,
popular culture, and sociological theory. “The Fear of Counterterrorism: Surveillance and Civil Liberties Since 9/11” – From the
Journal: Society - February 2015, Volume 52, Issue 1, pp 70-79 – obtained via the Springer database collection).
Civil liberties organizations as well as a number of academic scholars have routinely criticized post-9/11
counterterrorism initiatives as unconstitutional and major threats to civil liberties and privacy. Harmonizing with the claims from civil
liberties groups are contributions in the popular and scholarly discourse on surveillance and counterterrorism that lament the
purported negative impact of government al policies and related surveillance and intelligence activities on personal rights
and liberties. The revelations by former security contractor Edward Snowden in June 2013 concerning alleged spying practices by
the National Security Agency (NSA) greatly reinvigorated these debates. We investigate here if there is any counterevidence to the alarmist statements that are often made in the popular and scholarly discourse on civil
liberties and surveillance. Against the background of academic scholarship on surveillance and criticisms from civil liberty and privacy groups,
we rely on archival sources, government documents, and media reports to examine a variety of claims made
concerning civil liberties violations by security agencies. Our analysis reveals that at least a sizeable number of
claims raised against counterterrorism practices are without objective foundation in terms of
any actual violations. As an explanation for this marked discrepancy, we suggest that, as various survey data show, there is a
relatively distinct , albeit it uneven and not entirely stable, culture of privacy and civil liberties in contemporary
American society which independently contributes to a fear of counterterror ism, rather than of
terrorism . These specific cultural sensitivities bring about an increase in the amount of civil rights allegations
independent of actual violations thereof.
2. Rights can’t be absolute – as they sometimes conflict with other “rights”. If
some rights were absolute, privacy wouldn’t be one of them.
Himma ‘7
Kenneth - Associate Professor of Philosophy, Seattle Pacific University. The author holds JD and PhD and was formerly a
Lecturer at the University of Washington in Department of Philosophy, the Information School, and the Law School. “Privacy vs.
Security: Why Privacy is Not an Absolute Value or Right”. San Diego Law Review, Vol. 44, p. 859, 2007. Available at SSRN:
http://ssrn.com/abstract=994458
It is perhaps worth noting that absolutist
conceptions are not limited to privacy rights. Some people take the position that the moral
right to life is absolute; on an absolutist conception of the right to life, it is never justified to take the life of a person—and this rules out not only the death penalty,
but the use of deadly force in defense of the lives of innocent others from a culpable attack. Many people take an absolutist view with respect to something they
call a “right to information,” holding that there should be no restrictions of any kind, including legal protection of intellectual property rights, on the free flow of
information. As this view has most famously, and idiosyncratically, been put by John Perry Barlow, “information wants to be free.”5 When it comes to rights,
absolutist talk among theorists, lawyers, and ordinary folk is not at all uncommon these days. Indeed,
nature, absolute and hence that it is a conceptual truth that
some people seem to think that rights are, by
all rights are absolute. Consider the following quote from Patrick Murphy, a Democrat
who ran for Congress in 2006: I am also very concerned about the erosion of constitutional rights and civil liberties over the past few years. I taught Constitutional
Law at West Point, and it makes me so angry to see our elected leaders in Washington—specifically the White House and the Republican leadership in Congress—
pushing policies that erode the foundation of this country. The equal protection clause of the constitution is absolute. The right to privacy is absolute. The right to
assemble is absolute. Yet time and time again, the administration has supported, and the Congressional leadership has supported nominees and policies that do not
follow the constitution. With my background, I can add to this debate. And I’m not afraid to take a stand for what’s right.6 As Murphy explains it, every right in the
Constitution is absolute and hence utterly without exception. As there is nothing in the Constitution or any legal instrument or norm that suggests or entails that
constitutional rights are absolute, it is reasonable to think that Murphy believes, as many people do, that it is part of the very meaning of having a right that it can
never justifiably be infringed. This is why debates about political issues are frequently framed in terms of whether there is some right that protects the relevant
interests; rights provide the strongest level of moral or legal protection of the relevant interests. It is certainly true that rights provide a higher level of protection
than any other considerations that are morally relevant, but it is not because rights are, by nature, absolute. Rights provide robust protection of the relevant
interests because it is a conceptual truth that the infringement of any right cannot be justified by an appeal of the desirable consequences of doing so. No matter
how many people it might make happy, it would be wrong to intentionally kill an innocent person because her right to life takes precedence over the interests of
other people in their own happiness. As Ronald Dworkin famously puts this conceptual point, rights trump consequences.7 But this conceptual truth about rights
does not imply rights are, by nature, absolute. The claim that rights trump consequences implies only that some stronger consideration than the desirable
there is some such consideration that
would justify infringing some rights. One such candidate, of course, is the existence of other more important
rights. It is commonly thought that at least some rights are commensurable and can be ranked in a hierarchy that expresses the relative weight each right in the
hierarchy has with respect to other rights. For example, one might think that the right to life is at the top of the hierarchy of
commensurable rights, and that property rights are in this hierarchy also. This would explain the common intuition that one may
use deadly force when necessary to defend innocent lives from culpable attack, but not when necessary only to defend
consequences of infringing a right can justify doing so. This latter claim leaves open the possibility that
property rights from violation. If, as seems clear from this example, it is possible for two rights to conflict and for one to outweigh the other, it follows that rights are
not, by nature, absolute. What may explain the mistaken view that rights are necessarily absolute is confusion about the relationship of various terms that flesh out
the status, origin, and contours of moral rights and obligations. For example, rights
are frequently described as “inviolable,” meaning that
a right can never be justifiably violated. This, of course, is a conceptual truth; to say that a right is violated is to say that its infringement is without justification.
But this does not imply that rights can never be justifiably infringed; a person’s right to life can be
justifiably infringed if he (they) culpably shoots at an innocent person and there is no other way to save that
person’s life except through use of lethal force in defense of his life. Rights are also thought, by nature, to be supreme, relative to some
system of norms—moral, social, or legal—in the sense that they cannot be defeated by other kinds of protections; moral rights are thought to be supreme over all
other kinds of considerations, including social and legal rights. But
this does not imply that rights are absolute because it says
nothing about the relative importance of one right to another; it simply asserts that, by nature, rights
outweigh all other relevant considerations. Supremacy and inviolability are part of the very nature of a right, but these properties do not entail
that rights are, by nature, absolute. Of course, the negation of the claim that all rights are absolute does not imply that no rights are absolute. The possibility of
conflicts between any two rights does not preclude there being one right that wins every conflict because it is absolute, and hence, without exception. A moral
pacifist, for example, takes this view of the moral right to life and holds that intentional killing of a human being is always wrong. Moreover, if there are two rights
that do not come into conflict with each other and win in conflicts with all other rights, those two rights might be absolute. One might think, for example, that the
rights to privacy and life can never conflict and that both are absolute. I
am somewhat skeptical that any right is absolute in this strong sense,
but if there are any, it will not be privacy.
As we will see in more detail, privacy is commensurable with other rights, like the right to
life, which figures into the right to security. It seems clear that privacy rights and the right to life can come into conflict. For
example, a psychologist
might be justified in protecting a patient’s privacy interests even though doing so includes information
that might prevent that person from committing a minor property crime of some kind, but she would not be
justified in protecting that information if the psychologist knows its disclosure is necessary to prevent a
murder. In any event, I will discuss these kinds of examples in more detail below.
3. (analytic) - The Aff uses people as a means to an end, too. They just flip the
script. Victims from the disad shouldn’t be a “means” to the Aff’s pro-privacy
“end”.
4. Security interests are competing rights claims that impact serous moral
questions.
Himma ‘7
Kenneth - Associate Professor of Philosophy, Seattle Pacific University. The author holds JD and PhD and was formerly a
Lecturer at the University of Washington in Department of Philosophy, the Information School, and the Law School. “Privacy vs.
Security: Why Privacy is Not an Absolute Value or Right”. San Diego Law Review, Vol. 44, p. 859, 2007. Available at SSRN:
http://ssrn.com/abstract=994458
At the outset, it is important to stress that security interests do not embrace interests not immediately
related to the survival and minimal physiological well-being of the individual. My interest in security encompasses my
interest in continuing life, my interest in being free from the kind of physical injury that threatens my ability to provide for myself,
my interest in being free from the kind of financial injury that puts me in conditions of health- or life-threatening poverty, and my interest in being
free from psychological trauma inflicted by others that renders me unable to care for myself. My interest in security is a
negative one in the sense that it is protected by a moral right constituted, in part, by moral obligations owed to me by other people to
refrain from committing acts of violence or theft capable of causing serious threats to my health, well-being, and
life. While it is difficult to draw the line between a serious harm and a nonserious harm, it will have to suffice for my purposes to say that a serious harm is one
that interferes significantly with the daily activities that not only give my life meaning, but make it possible for me to continue to survive. Significant
trauma to the brain not only interferes with many activities that constitute what Don Marquis calls the “goodness of life,”19 but also interferes with my
ability to make a living teaching and writing philosophy—while a mildly bruised arm does not. Where exactly to draw the line is not
entirely clear, but for my purposes I do not think much turns on it as long as it is understood that security interests do not include minor injuries of any kind. I
imagine the boundaries of the relevant notion of seriousness are likely to be contested in any event, but all would agree that the interest in security, by nature,
It should be abundantly clear that morality protects these
interests in the strongest terms available to it. Unless one is a complete skeptic about morality and moral objectivity,
protects only against threats of serious injuries.
little argument is needed to show that we have a moral right to be free from acts that pose a high risk of
causing either our death or grievous injuries to our bodies. Moreover, I would hazard that non-skeptics about morality would also accept that the
moral right to physical security is sufficiently important that a state is, as a matter of political morality, obligated to protect it, by criminalizing attacks on it, as a
condition of its legitimacy. No state authority
that failed to protect this right could be morally legitimate; at the very least
interests are not, however,
no state authority that failed to do so could be justified in claiming a legitimate monopoly over the use of force. Security
just about our own well-being; they encompass the well-being of other persons whose activities conduce to our
own physical security. We are social beings who live in societies in which there is a pronounced division of labor that makes the security of one person dependent
upon the security of other persons in a variety of ways—some more abstract, some less abstract.
5. Assessing Utilitarian consequences are good. Putting ethics in a vacuum is
morally irresponsible.
Issac, ‘2
(Jeffery, Professor of Political Science at Indiana University, Dissent, Vol. 49 No. 2, Spring)
Politics, in large part, involves contests over the distribution and use of power. To accomplish anything in the political world one must attend to
the means that are necessary to bring it about. And to develop such means is to develop, and to exercise, power. To say this is not to say that
power is beyond morality. It is to say that power is not reducible to morality. As writers such as Niccolo Machiavelli, Max Weber, Reinhold
Niebuhr, Hannah Arendt have taught, an unyielding
concern with moral goodness undercuts political responsibility.
The concern may be morally laudable, reflecting a kind of personal integrity, but it suffers from three fatal flaws: (1) It fails to see that
the purity of one’s intentions does not ensure the achievement of what one intends. Abjuring violence or
refusing to make common cause with morally comprised parties may seem like the right thing, but if such tactics entail impotence,
then it is hard to view them as serving any moral good beyond the clean conscience of their supporters;
(2) it fails to see that in a world of real violence and injustice, moral purity is not simply a form of powerlessness, it
is often a form of complicity in injustice. This is why, from the standpoint of politics-as opposed to religion-pacifism is always a
potentially immoral stand. In categorically repudiating violence, it refuses in principle to oppose certain violent injustices with any effect; and
(3)
it fails to see that politics is as much about unintended consequences as it is about intentions; it is the
effects of action, rather than the motives of action, that is most significant. Just as the alignment with “good” may
engender impotence, it is often the pursuit of “good” that generates evil. This is the lesson of communism in
the twentieth century: it is not enough that one’s goals be sincere or idealistic; it is equally important,
always , to ask about the effects of pursuing these goals and to judge these effects in pragmatic and
historically contextualized ways. Moral absolutism
inhibits this judgment. It alienates those who are not true believers. It
promotes arrogance. And it undermines political effectiveness.
6. Alt cause – corporate privacy infringements are far worse and the public readily
accepts it.
Lewis ‘14
James Andrew Lewis is a senior fellow and director of the Strategic Technologies Program at the Center for Strategic and
International Studies in Washington, D.C., where he writes on technology, security, and the international economy. Before
joining CSIS, he worked at the US Departments of State and Commerce as a Foreign Service officer and as a member of the
Senior Executive Service. His diplomatic experience included negotiations on military basing in Asia, the Cambodia peace
process, and the five-power talks on arms transfer restraint. Lewis received his Ph.D. from the University of Chicago.
“Underestimating Risk in the Surveillance Debate” - CENTER FOR STRATEGIC & INTERNATIONAL STUDIES - STRATEGIC
TECHNOLOGIES PROGRAM – December - http://csis.org/publication/underestimating-risk-surveillance-debate
Some of the unhappiness created by the Edward Snowden leaks reflects the unspoken recognition that online
privacy has changed
irrevocably. The precipitous decline in privacy since the Internet was commercialized is the elephant in
the room we ignore in the surveillance debate. America’s privacy laws are both limited in scope and out of date. Although a majority
of Americans believe privacy laws are inadequate, the
surveillance debate has not led to a useful discussion of privacy in
the context of changed technologies and consumer preferences. Technology is more intrusive as companies pursue
revenue growth by harvesting user data. Tracking online behavior is a preferred business model. On average, there are 16 hidden
tracking programs on every website. The growing market for “big data” to predict consumer behavior and
target advertising will further change privacy. Judging by their behavior, Internet users are willing to
exchange private data for online services. A survey in a major European country found a majority of Internet users
disapproved of Google out of privacy concerns, but more than 80 percent used Google as their search engine. The
disconnect between
consumer statements and behavior reduces the chances of legislating better protections.
7. No impact to a 4th Amendment violation – the Special Needs Doctrine justifies
minor privacy intrusions
Branda ‘14
(et al; JOYCE R. BRANDA, Acting Assistant Attorney General, BRIEF FOR THE APPELLEES - Amicus Brief for Smith v. Obama –
before the United States Ninth Circuit Court of Appeals. “Amici” means “friend of the court” and – in this context - is legal
reference to the Reporters Committee – October 2nd - https://www.eff.org/document/governments-smith-answering-brief)
Even if plaintiff had a cognizable privacy interest in Verizon Wireless’s business records—and she does not—the Fourth
Amendment would permit the government to acquire those records under the special needs doctrine.
The Section 215 telephony-metadata program serves the paramount government interest in preventing and
disrupting terrorist attacks on the United States, a compelling special governmental need. And because of the
significant safeguards in the program—including a requirement of court authorization based on reasonable suspicion before a human analyst
accesses the data—the impact on cognizable privacy interests is at most minimal.
8. Plan will get circumvented
Granick ‘14
Jennifer Granick is the Director of Civil Liberties at the Stanford Center for Internet and Society. Jennifer was the Civil Liberties
Director at the Electronic Frontier Foundation. Jennifer practices, speaks and writes about computer crime and security,
electronic surveillance, consumer privacy, data protection, copyright, trademark and the Digital Millennium Copyright Act. From
2001 to 2007, Jennifer was Executive Director of CIS and taught Cyberlaw, Computer Crime Law, Internet intermediary liability,
and Internet law and policy. Before teaching at Stanford, Jennifer earned her law degree from University of California, Hastings
College of the Law and her undergraduate degree from the New College of the University of South Florida. “USA Freedom Act:
Oh, Well. Whatever. Nevermind.” – Just Security - May 21, 2014 http://justsecurity.org/10675/usa-freedom-act-oh-wellwhatever-nevermind/
Additionally, in December of 2013, Deputy
Attorney General James Cole testified before the Senate Judiciary
Committee that the NSA might continue its bulk collection of nearly all domestic phone call records, even if
the original USA FREEDOM ACT passed into law. As I wrote at the time, this testimony shows that the
Administration and the intelligence community believe they can do whatever they want, regardless of
the law s Congress passes, so long they can convince one of the judges appointed to the secretive Foreign Intelligence
Surveillance Court (FISC) to agree. All they need is some legal hook they can present with a
straight face.
2AC Section
2AC vs. TPP
1. Zero chance congress rejects TPP post fast track approval – structural factors
Stoltzfoos, 6/23 -- Rachel, Reporter @ Daily Caller, Daily Caller, 6/23/15,
http://dailycaller.com/2015/06/23/congress-secures-trade-promotion-authority-forobama/
TPA would give Congress more power to shape the trade agreement by defining specific objectives the president must work toward in a deal,
and by setting new transparency rules. But once
the president submits a deal to Congress, TPA greatly restricts the
Senate’s ability to block or complicate the deal. Any deal the president submits to Congress in
the next six years is almost guaranteed to pass , because the Senate must promptly approve or
reject the deal with no chance to amend it and little time for debate. And just 51 votes would be
required for passage — a far cry from the 61 votes required for major legislation. (RELATED: Why Are Senate
Republicans So Eager To Cede Their Trade Authority To Obama?)What do you think? Obama says he needs TPA to conclude a massive
trade deal, the Trans-Pacific Partnership, which he is currently negotiating with 11 other countries. And the Republicans who fought
for the deal say TPA is key to future free trade agreements that will benefit the U.S. economy.What do you think? Critics contend its a
dangerous concession of Senate power to a president that can’t be trusted.
2. There’s bipartisan momentum for curtailing surveillance
Weisman, 13 (Jonathan Weisman, political writer for NYT, 7-28-2013, "Momentum Builds against
N.S.A. Surveillance", New York Times, http://www.nytimes.com/2013/07/29/us/politics/momentumbuilds-against-nsa-surveillance.html, DA: 5-30-2015)
WASHINGTON — The movement to crack down on government surveillance started with an odd couple from Michigan,
Representatives Justin Amash, a young libertarian Republican known even to his friends as “chief wing nut,” and John Conyers Jr., an elder of
the liberal left in his 25th House term. But what began on the political fringes only a week ago has
built a momentum that
even critics say may be unstoppable , drawing support from Republican and Democratic leaders,
attracting moderates in both parties and pulling in some of the most respected voices on national
security in the House. The rapidly shifting politics were reflected clearly in the House on Wednesday, when a plan to defund the
National Security Agency’s telephone data collection program fell just seven votes short of passage. Now, after initially signaling that they were
comfortable with the scope of the N.S.A.’s collection of Americans’ phone and Internet activities, but not their content, revealed last month by
Edward J. Snowden, lawmakers are
showing an increasing willingness to use legislation to curb those actions.
work on
legislation in the House Judiciary Committee to significantly rein in N.S.A. telephone surveillance. Mr. Sensenbrenner
Representatives Jim Sensenbrenner, Republican of Wisconsin, and Zoe Lofgren, Democrat of California, have begun
said on Friday that he would have a bill ready when Congress returned from its August recess that would restrict phone surveillance to only
those named as targets of a federal terrorism investigation, make significant changes to the secret court that oversees such programs and give
businesses like Microsoft and Google permission to reveal their dealings before that court. “There
is a growing sense that things
have really gone a-kilter here,” Ms. Lofgren said. The sudden reconsideration of post-Sept. 11 counterterrorism policy has taken much
of Washington by surprise. As the revelations by Mr. Snowden, a former N.S.A. contractor, were gaining attention in the news media, the White
House and leaders in both parties stood united behind the programs he had unmasked. They were focused mostly on bringing the leaker to
justice. Backers of sweeping surveillance powers now say they recognize that changes are likely, and they are taking steps to make sure they
maintain control over the extent of any revisions. Leaders of the Senate Intelligence Committee met on Wednesday as the House deliberated to
try to find accommodations to growing public misgivings about the programs, said the committee’s chairwoman, Senator Dianne Feinstein,
Democrat of California. Senator Mark Udall, a Colorado Democrat and longtime critic of the N.S.A. surveillance programs, said he had taken part
in serious meetings to discuss changes. Senator Saxby Chambliss of Georgia, the ranking Republican on the panel, said, “We’re talking through it
right now.” He added, “There are a lot of ideas on the table, and it’s pretty obvious that we’ve got some uneasy folks.” Representative Mike
Rogers, a Michigan Republican and the chairman of the House Intelligence Committee, has assured House colleagues that an intelligence policy
bill he plans to draft in mid-September will include new privacy safeguards. Aides familiar with his efforts said the House Intelligence
Committee was focusing on more transparency for the secret Foreign Intelligence Surveillance Court, which oversees data gathering, including
possibly declassifying that court’s orders, and changes to the way the surveillance data is stored. The legislation may order such data to be held
by the telecommunications companies that produce them or by an independent entity, not the government. Lawmakers say their votes
to
restrain the N.S.A. reflect a gut-level concern among voters about personal privacy. “I represent a very
reasonable district in suburban Philadelphia, and my constituents are expressing a growing concern on the sweeping
amounts of data that the government is compiling,” said Representative Michael G. Fitzpatrick, a moderate Republican
who represents one of the few true swing districts left in the House and who voted on Wednesday to limit N.S.A. surveillance. Votes from the
likes of Mr. Fitzpatrick were not initially anticipated when Republican leaders chided reporters for their interest in legislation that they said
would go nowhere. As the House slowly worked its way on Wednesday toward an evening vote to curb government surveillance, even
proponents of the legislation jokingly predicted that only the “wing nuts” — the libertarians of the right, the most ardent liberals on the left —
would support the measure. Then Mr. Sensenbrenner, a Republican veteran and one of the primary authors of the post-Sept. 11 Patriot Act,
stepped to a microphone on the House floor. Never, he said, did he intend to allow the wholesale vacuuming up of domestic phone records,
nor did his legislation envision that data dragnets would go beyond specific targets of terrorism investigations. “The time has come to stop it,
and the way we stop it is to approve this amendment,” Mr. Sensenbrenner said. He had not intended to speak, and when he did, he did not say
much, just seven brief sentences. “I was able to say what needed to be said in a minute,” he said Friday. Lawmakers from both parties said the
brief speech was a pivotal moment. When the tally was final, the effort to end the N.S.A.’s programs had fallen short, 205 to 217. Supporters
included Republican leaders like Representative Cathy McMorris Rodgers of Washington and Democratic leaders like Representative James E.
Clyburn of South Carolina. Republican moderates like Mr. Fitzpatrick and Blue Dog Democrats like Representative Kurt Schrader of Oregon
joined with respected voices on national security matters like Mr. Sensenbrenner and Ms. Lofgren. Besides Ms. McMorris Rodgers,
Representative Lynn Jenkins of Kansas, another member of the Republican leadership, voted yes. On the Democratic side, the chairman of the
House Democratic Caucus, Representative Xavier Becerra of California, and his vice chairman, Representative Joseph Crowley of New York,
broke with the top two Democrats, Representatives Nancy Pelosi of California and Steny H. Hoyer of Maryland, who pressed hard for no votes.
On Friday, Ms. Pelosi, the House minority leader and a veteran of the Intelligence Committee, and Mr. Hoyer
dashed off a letter
to the president warning that even those Democrats who had stayed with him on the issue on Wednesday would
be seeking changes. That letter included the signature of Mr. Conyers, who is rallying an increasingly unified
Democratic caucus to his side, as well as 61 House Democrats who voted no on Wednesday but are now publicly signaling their
discontent. “Although some of us voted for and others against the amendment, we all agree that there are lingering questions and concerns
about the current” data collection program, the letter stated. Representative Reid Ribble of Wisconsin, a Republican who voted for the curbs
and predicted that changes to the N.S.A. surveillance programs were now unstoppable, said: “This was in many respects a vote intended to
send a message. The vote was just too strong.” Ms. Lofgren said the White House and Democratic and Republican leaders had not come to grips
with what she called “a grave sense of betrayal” that greeted Mr. Snowden’s revelations. Since the Bush administration, lawmakers had been
repeatedly assured that such indiscriminate collection of data did not exist, and that when targeting was unspecific, it was aimed at people
abroad. The movement against the N.S.A. began with the fringes of each party. Mr. Amash of Michigan began pressing for an amendment on
the annual military spending bill aimed at the N.S.A. Leaders of the Intelligence Committee argued strenuously that such an amendment was
not relevant to military spending and should be ruled out of order. But Mr. Amash, an acolyte of Ron Paul, a libertarian former congressman,
persisted and rallied support. Mr. Sensenbrenner and Ms. Lofgren said they were willing to work with the House and Senate intelligence panels
to overhaul the surveillance programs, but indicated that they did not believe those panels were ready to go far enough. “I would just hope the
Intelligence Committees will not stick their heads in the sand on this,” Mr. Sensenbrenner said.
3. No link - Fiat means the plan passes immediately and without any
disagreements.
4. Political capital doesn’t exist and isn’t key to their DA- more likely winners win
Michael Hirsch ‘13, chief correspondent for National Journal. He also contributes to 2012 Decoded. Hirsh previously
served as the senior editor and national economics correspondent for Newsweek, based in its Washington bureau. He was also
Newsweek’s Washington web editor and authored a weekly column for Newsweek.com, “The World from Washington.” Earlier
on, he was Newsweek’s foreign editor, guiding its award-winning coverage of the September 11 attacks and the war on terror.
He has done on-the-ground reporting in Iraq, Afghanistan, and other places around the world, and served as the Tokyo-based
Asia Bureau Chief for Institutional Investor from 1992 to 1994. http://www.nationaljournal.com/magazine/there-s-no-suchthing-as-political-capital-20130207
On Tuesday, in his State of the Union address, President Obama will do what every president does this time of year. For about 60 minutes, he will lay out a sprawling and ambitious wish list highlighted by gun control and immigration reform, climate change and debt reduction. In
response, the
pundits will do what they always do
this time of year: They will
talk about
how unrealistic most of the proposals are, discussions often informed by sagacious reckonings of
much political capital Obama possesses to push his program through
“
”
bearing on what actually happens
talked
seriously
about
Obama having enough political
. Most of
how
this talk will have no
Three months ago
if someone had
capital to oversee
both immigration and gun-control
this person would have been called crazy
In
over the next four years. Consider this:
, just before the November election,
passage of
reform
legislation at the beginning of his second term—
even after winning the election by 4 percentage points and 5 million votes (the actual final tally)—
and stripped of his pundit’s license. (It doesn’t exist, but it ought to.)
his first term
Obama didn’t dare to even bring up gun control
And yet, for reasons that have very little to do with Obama’s
political capital chances are fair that both will now happen What changed In the case of gun control
Newtown
, in a starkly polarized country, the president had been so frustrated by GOP resistance that he finally issued a limited executive order last August permitting immigrants who entered the country illegally as children to work without fear of deportation for
at least two years.
, a Democratic “third rail” that has cost the party elections and that actually might have been even less popular on the right than the
president’s health care law.
“
personal prestige or popularity—variously put in terms of a “mandate” or
”—
.
it wasn’t the election. It was the horror of the 20 first-graders who were slaughtered in
?
, of course,
, Conn., in mid-December. The sickening reality of little girls and boys riddled with bullets from a high-capacity assault weapon seemed to precipitate a sudden tipping point
in the national conscience. One thing changed after another. Wayne LaPierre of the National Rifle Association marginalized himself with poorly chosen comments soon after the massacre. The pro-gun lobby, once a phalanx of opposition, began to fissure into reasonables and crazies.
Former Rep. Gabrielle Giffords, D-Ariz., who was shot in the head two years ago and is still struggling to speak and walk, started a PAC with her husband to appeal to the moderate middle of gun owners. Then she gave riveting and poignant testimony to the Senate, challenging lawmakers:
“Be bold.” As a result, momentum has appeared to build around some kind of a plan to curtail sales of the most dangerous weap ons and ammunition and the way people are permitted to buy them. It’s impossible to say now whether such a bill will pass and, if it does, whether it will make
anything more than cosmetic changes to gun laws. But one thing is clear: The political tectonics have shifted dramatically in very little time. Whole new possibilities exist now that didn’t a few weeks ago.
Meanwhile
, the Republican members of the Senate’s so-called
immigration
turnaround has very little to do with Obama’s personal influence
It has almost
entirely to do with
the
Hispanic vote
movement on immigration has come out
of the Republican Party’s introspection
Gang of Eight are pushing hard for a new spirit of compromise on
reform, a sharp change after an election year in which the GOP standard-bearer declared he would make life so miserable for the 11 million illegal immigrants in the U.S. that they would
“self-deport.” But this
—his political mandate, as it were.
just two numbers: 71 and 27. That’s 71 percent for Obama, 27 percent for Mitt Romney,
breakdown of the
in the 2012 presidential election. Obama drove home his advantage by giving a
speech on immigration reform on Jan. 29 at a Hispanic-dominated high school in Nevada, a swing state he won by a surprising 8 percentage points in November. But the
recent
mainly
, and the realization by its more thoughtful members, such as Sen. Marco Rubio of Florida and Gov. Bobby Jindal of Louisiana, that without such a shift the party may be facing
demographic death in a country where the 2010 census showed, for the first time, that white births have fallen into the minority. It’s got nothing to do with Obama’s political capital or, indeed, Obama at all. The point is not that “political capital” is a meani ngless term. Often it is a
synonym for “mandate” or “momentum” in the aftermath of a decisive election—and just about every politician ever elected has tried to claim more of a mandate than he actually has. Certainly, Obama can say that because he was elec ted and Romney wasn’t, he has a better claim on
the country’s mood and direction. Many pundits still defend political capital as a useful metaphor at least. “It’s an unquantifiable but meaningful concept,” says Norman Ornstein of the American Enterprise Institute. “You can’t really look at a president and say he’s got 37 ounces of
the idea of political capita
is so poorly
defined that presidents and pundits often get it wrong.
capital
conveys that we know more than we really do about ever-elusive
political power
political capital. But the fact is, it’s a concept that matters, if you have popularity and some momentum on your side.” The real problem is that
l—or mandates, or momentum—
“Presidents usually over-estimate it,” says George Edwards, a presidential scholar at Texas A&M University. “The best kind of political
capital—some sense of an electoral mandate to do something—is very rare. It almost never happens. In 1964, maybe. And to some degree in 1980.” For that reason, political
the idea
the
unforeseen events can suddenly change everything
is a concept that misleads far more than it enlightens. It is distortionary. It
concept of
, and it discounts the way
. Instead, it suggests, erroneously, that a political figure has a concrete amount of political capital to invest, just as
someone might have real investment capital—that a particular leader can bank his gains, and the size of his account determines what he can do at any given moment in history. Naturally, any president has practical and electoral limits. Does he have a majority in both chambers of
Congress and a cohesive coalition behind him? Obama has neither at present. And unless a surge in the economy—at the moment, still stuck—or some other great victory gives him more momentum, it is inevitable that the closer Obama gets to the 2014 election, the less he will be able
to get done. Going into the midterms, Republicans will increasingly avoid any concessions that make him (and the Democrats) stronger. But the abrupt emergence of the immigration and gun-control issues illustrates how suddenly shifts in mood can occur and how political interests can
align in new ways just as suddenly. Indeed, the pseudo-concept of political capital masks a larger truth about Washington that is kindergarten simple: You just don’t know what you can do until you try. Or as Ornstein himself once wrote years ago, “Winning wins.” In theory, and in
depending on Obama’s handling of any
issue, even in a polarized time he could still deliver on
his second-term goals depending on
the breaks
political capital is, at best, an empty concept
that almost nothing in the academic literature successfully quantifies or even defines it.
practice,
particular
,
his skill and
,
a lot of
. Unforeseen catalysts can appear, like Newtown. Epiphanies can dawn, such as when many Republican Party leaders suddenly woke up in panic to
the huge disparity in the Hispanic vote. Some political scientists who study the elusive calculus of how to pass legislation and run successful presidencies say that
and
,
“It can refer to a very abstract thing, like a
president’s popularity, but there’s no mechanism there. That makes it kind of useless,” says Richard Bensel, a government professor at Cornell University. Even Ornstein concedes that the calculus is far more complex than the term suggests.
Winning on
one issue often changes the calculation for the next issue; there is never any known amount
of capital
Ornstein says. “If
they think he’s going to win, they may change positions to get on the winning side. It’s a bandwagon
effect.Ӧ
¶
. “The idea here is, if an issue comes up where the conventional wisdom is that president is not going to get what he wants, and he gets it, then each time that happens, it changes the calculus of the other actors”
ALL THE WAY WITH LBJ
Sometimes, a clever practitioner of power can get more done just because he’s aggressive and knows the hallways of Congress w ell. Texas A&M’s Edwards is right to say that the outcome of the 1964 election, Lyndon Johnson’s landslide
victory over Barry Goldwater, was one of the few that conveyed a mandate. But one of the main reasons for that mandate (in addition to Goldwater’s ineptitude as a candidate) was President Johnson’s masterful use of power leading up to that election, and his ability to get far more
done than anyone thought possible, given his limited political capital. In the newest volume in his exhaustive study of LBJ, The Passage of Power, historian Robert Caro recalls Johnson getting cautionary advice after he assumed the presidency from the assassinated John F. Kennedy in late
1963. Don’t focus on a long-stalled civil-rights bill, advisers told him, because it might jeopardize Southern lawmakers’ support for a tax cut and appropriations bills the president needed. “One of the wise, practical people around the table [said that] the presidency has only a certain
amount of coinage to expend, and you oughtn’t to expend it on this,” Caro writes. (Coinage, of course, was what political capital was called in those days.) Johnson replied, “Well, what the hell’s the presidency for?” Johnson didn’t worry about coinage, and he got the Civil Rights Act
enacted, along with much else: Medicare, a tax cut, antipoverty programs. He appeared to understand not just the ways of Congress but also the way to maximize the momentum he possessed in the lingering mood of national grief and determination by picking the right issues, as Caro
records. “Momentum is not a mysterious mistress,” LBJ said. “It is a controllable fact of political life.” Johnson had the skill and wherewithal to realize that, at that moment of history, he could have unlimited coinage if he handled the politics right. He did. (At least until Vietnam, that is.)
And then there are the presidents who get the politics, and the issues, wrong. It was the last president before Obama who was just starting a second term, George W. Bush, who really revived the claim of political capital, which he was very fond of wielding. Then Bush promptly
demonstrated that he didn’t fully understand the concept either. At his first news conference after his 2004 victory, a confident-sounding Bush declared, “I earned capital in the campaign, political capital, and now I intend to spend it. That’s my style.” The 43rd president threw all of his
political capital at an overriding passion: the partial privatization of Social Security. He mounted a full-bore public-relations campaign that included town-hall meetings across the country. Bush failed utterly, of course. But the problem was not that he didn’t have enough political capital.
Yes, he may have overestimated his standing. Bush’s margin over John Kerry was thin—helped along by a bumbling Kerry campaign that was almost the mirror image of Romney’s gaffe-filled failure this time—but that was not the real mistake. The problem was that whatever credibility or
stature Bush thought he had earned as a newly reelected president did nothing to make Social Security privatization a better idea in most people’s eyes. Voters didn’t trust the plan, and four years later, at the end of Bush’s term, the stock-market collapse bore out the public’s skepticism.
Privatization just didn’t have any momentum behind it, no matter who was pushing it or how much capital Bush spent to sell it. The mistake that Bush made with Social Security, says John Sides, an associate professor of political science at George Washington University and a wellfollowed political blogger, “was that just because he won an election, he thought he had a green light. But there was no sense of any kind of public urgency on Social Security reform. It’s like he went into the garage where various Republican policy ideas were hanging up and picked one. I
don’t think Obama’s going to make that mistake.… Bush decided he wanted to push a rock up a hill. He didn’t understand how steep the hill was. I think Obama has more momentum on his side because of the Republican Party’s concerns about the Latino vote and the shooting at
Obama may get his way
not because of his reelection,
but because Republicans are
beginning to doubt whether taking a hard line on fiscal policy is a good idea
¶
¶
Newtown.”
also
on the debt ceiling,
Sides says, “
,” as the party suffers in the polls.
THE REAL LIMITS ON POWER
Presidents
are limited in what they can do by time and attention span, of course, just as much as they are by electoral balances in the House and Senate. But this, too, has nothing to do with political capital. Another well-worn meme of recent years was that Obama used up too much political capital
passing the health care law in his first term. But the real problem was that the plan was unpopular, the economy was bad, and the president didn’t realize that the national mood (yes, again, the national mood) was at a tipping point against big-government intervention, with the tea-party
revolt about to burst on the scene. For Americans in 2009 and 2010—haunted by too many rounds of layoffs, appalled by the Wall Street bailout, aghast at the amount of federal spending that never seemed to find its way into their pockets—government-imposed health care coverage
was simply an intervention too far. So was the idea of another economic stimulus. Cue the tea party and what ensued: two titanic fights over the debt ceiling. Obama, like Bush, had settled on pushing an issue that was out of sync with the country’s mood. Unlike Bush, Obama did
ultimately get his idea passed. But the bigger political problem with health care reform was that it distracted the government’s attention from other issues that people cared about more urgently, such as the need to jump-start the economy and financial reform. Various congressional
staffers told me at the time that their bosses didn’t really have the time to understand how the Wall Street lobby was riddling the Dodd-Frank financial-reform legislation with loopholes. Health care was sucking all the oxygen out of the room, the aides said. Weighing the imponderables
of momentum, the often-mystical calculations about when the historic moment is ripe for an issue, will never be a science. It is mainly intuition, and its best practitioners have a long history in American politics. This is a tale told well in Steven Spielberg’s hit movie Lincoln. Daniel DayLewis’s Abraham Lincoln attempts a lot of behind-the-scenes vote-buying to win passage of the 13th Amendment, banning slavery, along with eloquent attempts to move people’s hearts and minds. He appears to be using the political capital of his reelection and the turning of the tide in
the Civil War. But it’s clear that a surge of conscience, a sense of the changing times, has as much to do with the final vote as all the backroom horse-trading. “The reason I think the idea of political capital is kind of distorting is that it implies you have chits you can give out to people. It
really oversimplifies why you elect politicians, or why they can do what Lincoln did,” says Tommy Bruce, a former political consultant in Washington. Consider, as another example, the storied political career of President Franklin Roosevelt. Because the mood was ripe for dramatic change
in the depths of the Great Depression, FDR was able to push an astonishing array of New Deal programs through a largely compliant Congress, assuming what some described as near-dictatorial powers. But in his second term, full of confidence because of a landslide victory in 1936 that
brought in unprecedented Democratic majorities in the House and Senate, Roosevelt overreached with his infamous Court-packing proposal. All of a sudden, the political capital that experts thought was limitless disappeared. FDR’s plan to expand the Supreme Court by putting in his
judicial allies abruptly created an unanticipated wall of opposition from newly reunited Republicans and conservative Southern Democrats. FDR thus inadvertently handed back to Congress, especially to the Senate, the power and influence he had seized in his first term. Sure, Roosevelt
had loads of popularity and momentum in 1937. He seemed to have a bank vault full of political capital. But, once again, a president simply chose to take on the wrong issue at the wrong time; this time, instead of most of the political interests in the country aligning his way, they opposed
him. Roosevelt didn’t fully recover until World War II, despite two more election victories. In terms of Obama’s second-term agenda, what all these shifting tides of momentum and political calculation mean is this: Anything goes. Obama has no more elections to win, and he needs to
if he picks issues
there is no reason to
think he can’t win far more victories than
careful calculators of political capital believe is possible
If he can get
some early wins
that will create momentum, and one win may well lead
to others. “Winning wins
worry only about the support he will have in the House and Senate after 2014. But
that the country’s mood will support—such as, perhaps, immigration reform and gun control—
any of the
now
,
including battles over tax reform and deficit reduction. Amid today’s atmosphere of Republican self-doubt, a new, more mature Obama seems to be emerging, one who has his agenda clearly in mind and will ride the mood of the country more adroitly.
—as he already has, apparently, on the fiscal cliff and the upper-income tax increase—
.” Obama himself learned some hard lessons over the past four years about the falsity of the political-capital concept. Despite his decisive victory over John McCain in 2008, he fumbled the selling of his $787 billion
stimulus plan by portraying himself naively as a “post-partisan” president who somehow had been given the electoral mandate to be all things to all people. So Obama tried to sell his stimulus as a long-term restructuring plan that would “lay the groundwork for long-term economic
growth.” The president thus fed GOP suspicions that he was just another big-government liberal. Had he understood better that the country was digging in against yet more government intervention and had sold the stimulus as what it mainly was—a giant shot of adrenalin to an
economy with a stopped heart, a pure emergency measure—he might well have escaped the worst of the backlash. But by laying on ambitious programs, and following up quickly with his health care plan, he only sealed his reputation on the right as a closet socialist. After that, Obama’s
public posturing provoked automatic opposition from the GOP, no matter what he said. If the president put his personal imprimatur on any plan—from deficit reduction, to health care, to immigration reform—Republicans were virtually guaranteed to come out against it. But this year,
when he sought to exploit the chastened GOP’s newfound willingness to compromise on immigration, his approach was different. He seemed to understand that the Republicans needed to reclaim immigration reform as their own issue, and he was willing to let them have some credit.
When he mounted his bully pulpit in Nevada, he delivered another new message as well: You Republicans don’t have to listen to what I say anymore. And don’t worry about who’s got the political capital. Just take a hard look at where I’m saying this: in a state you were supposed to have
won but lost because of the rising Hispanic vote. Obama was cleverly pointing the GOP toward conclusions that he knows it is already reaching on its own: If you, the Republicans, want to have any kind of a future in a vastly changed electoral map, you have no choice but to move. It’s
your choice.
5. The Recent Freedom Act and the TPA prove “winner’s win”. Obama wanted
both laws – and got them both. Those successes made him look strong – and
now it’s hard to disagree with him. The Aff plan is just another victory.
6. Political Capital is not real. It’s a myth- Congress votes based on ideology
Frank Moraes is a freelance writer with broad interests. He is educated as a scientist with a PhD in
Atmospheric Physics. He has worked in climate science, remote sensing, and throughout the computer
industry. And he has taught physics. 1-8-2013 http://the-reaction.blogspot.com/2013/01/politicalcapital-is-myth.html
Yesterday, Jonathan Chait metaphorically scratched his head: "Nominating Hagel Most Un-Obama Thing Ever." He can't understand this nomination given that (1)
Hagel will be a hard sell and (2) Obama doesn't much listen to his advisers anyway. It is interesting speculation, but I wouldn't have even thought about it had he not
written, "Why
waste political capital picking a fight that isn't essential to any policy goals?"¶ This brought to mind something that
has been on my mind for a while, as in posts like "Bipartisan Consensus Can Bite Me." I'm afraid that just like Santa Claus and most conceptions of
God, " Political Capital" is a myth. I think it is just an idea that Villagers find comforting. It is a neat
narrative in which one can straightjacket a political fight. Otherwise, it is just bullshit .¶ Let's go back to late 2004, after Bush Jr was reelected. He said, "I earned capital in the political campaign and I intend to spend it." What was this thing that Bush intended to
spend? It is usually said that political capital is some kind of mandate from the masses. But that is clearly not what Bush meant. He got a mandate to fuck the poor
and kill the gays. But he used his political capital to privatize Social Security. One could say that this proves the point, but does anyone really think if Bush had
decided to use his political capital destroying food stamps and Medicaid that he would have succeeded any better? The truth was that Bush's political capital didn't
exist.¶ Let's
look at more recent events: the Fiscal Cliff. Obama didn't win that fight because the people who voted for him
demanded it. He won it because everyone knew that in the new year he would still be president. Tax rates were going up.
Boehner took the Fiscal Cliff deal because it was the best deal that he felt he could get. He didn't fold
because of some magic p olitical c apital that Obama could wave over him.¶ There is no doubt that public opinion does affect how politicians
act. Even politicians in small safe districts have to worry that larger political trends may end up making them look stupid, out of touch, or just cruel. But beyond that,
they really don't care. If they did, then everyone in the House would now be a Democrat: after all, Obama won a mandate and the associated
p olitical c apital. But they don't, because presidential elections have consequences -- for who's in the White House. They don't have much
consequence for the representative from the Third District of California.
2AC vs. the Terror Disad
1. US losing the war on terror
Miller ‘15
Internally quoting Director of National Intelligence James R. Clapper Jr. - Greg Miller - Intelligence reporter for the Washington
Post; former national security correspondent for the Los Angeles Times and co-author of The Interrogators: Inside the Secret
War against al Qaeda - “In campaign against terrorism, U.S. enters period of pessimism and gloom” – Washington Post - March
7 - http://www.washingtonpost.com/world/national-security/in-campaign-against-terrorism-us-enters-period-of-pessimismand-gloom/2015/03/07/ca980380-c1bc-11e4-ad5c-3b8ce89f1b89_story.html
In congressional testimony recently, Director of National Intelligence James R. Clapper Jr. went beyond the usual litany of threats to say that terrorism
trend lines were worse “than at any other point in history.” Maj. Gen. Michael Nagata, commander of U.S.
Special Operations forces in the Middle East, told participants on a counter-terrorism strategy call that he regarded the Islamic State as a greater menace than alQaeda ever was. Speaking at a New York police terrorism conference, Michael Morell, former deputy director of the CIA, said he had come to doubt that he would
live to see the end of al-Qaeda and its spawn. “This is long term,” he said. “My children’s generation and my grandchildren’s generation will still be fighting this
fight.” The
assessments reflect a pessimism that has descended on the U.S. counterterrorism community
over the past year amid a series of discouraging developments. Among them are the growth of the Islamic
State, the ongoing influx of foreign fighters into Syria, the collapse of the U.S.-backed government in Yemen and the downward
spiral of Libya’s security situation. The latest complication came Saturday, when the terrorist group Boko Haram in Nigeria carried out a series of suicide
bombings and reportedly declared its allegiance to the Islamic State. Unlike the waves of anxiety that accompanied the emergence of new terrorist plots over the
past decade, the latest shift in mood seems more deep-seated. U.S. officials depict a bewildering landscape in which al-Qaeda and the brand of Islamist militancy it
inspired have not only survived 14 years of intense counterterrorism operations but have also spread. Officials emphasize that their campaign has accomplished
critical goals. In particular, most officials and experts now see the risk of a Sept. 11-scale attack as infinitesimal, beyond the reach of al-Qaeda and its scattered
affiliates. Still, the
adjusted outlook contrasts sharply with the surge of optimism that followed the killing of Osama
bin Laden in 2011 and the dawn of the Arab Spring, which was initially seen as a political awakening across the Middle East that might render al-Qaeda and its
archaic ideology irrelevant. Within months of bin Laden’s death, then-Defense Secretary Leon E. Panetta said he was convinced “that we’re within reach of
strategically defeating al-Qaeda.” President Obama echoed that view in subsequent years by saying that al-Qaeda was on “a path to defeat” and, more recently,
that the then-nascent Islamic State was analogous to a junior varsity sports team. Such
upbeat characterizations have all but
evaporated.
2. Turn – Arab-American coop:
o mass surveillance kills law enforcement coop with US-Arab Americans –
that’s key to check terror.
Risen ‘14
(Internally quoting Vanda Felbab-Brown, a senior fellow on foreign policy at the Brookings Institution. Tom Risen is a reporter
for U.S. News & World Report. “Racial Profiling Reported in NSA, FBI Surveillance” - U.S. News & World Report - July 9, 2014 http://www.usnews.com/news/articles/2014/07/09/racial-profiling-reported-in-nsa-fbi-surveillance)
The National Security Agency and the FBI have reportedly been overzealous trying to prevent terrorist attacks to the point
that anti-Islamic racism in those agencies led to the surveillance of prominent Muslim-Americans,
revealing a culture of racial profiling and broad latitude for spying on U.S. citizens. An NSA document leaked by
former agency contractor Edward Snowden to reporter Glenn Greenwald shows 202 Americans targeted among the approximately 7,485 email addresses
monitored between 2002 and 2008, Greenwald’s news service The Intercept reports. To monitor Americans, government agencies must first make the case to the
Foreign Intelligence Surveillance Court that there is probable cause that the targets are terrorist agents, foreign spies or “are or may be” abetting sabotage,
espionage or terrorism. Despite this filter The Intercept identified five Muslim-Americans with high public profile including civil rights leaders, academics, lawyers
and a political candidate. Racial profiling of Muslims by security officers has been a controversy since the terrorist attacks of 2001 spiked fears about al-Qaida
trainees preparing more attacks. The New York Police Department has disbanded its unit that mapped New York’s Muslim communities that designated surveillance
of mosques as “terrorism enterprise investigations” after pressure from the Justice Department about aggressive monitoring by police. A 2005 FBI memo about
surveillance procedures featured in The Intercept story uses a fake name “Mohammed Raghead” for the agency staff exercise. This latest report about email
surveillance of successful Muslim-Americans is akin to “McCarthyism” that fed paranoia about communist spies during the Cold War, says Reza Aslan, a professor at
the University of California, Riverside. “The
notion that these five upstanding American citizens, all of them prominent public individuals,
represent a threat to the U.S. for no other reason than their religion is an embarrassment to the FBI and an
affront to the constitution,” Aslan says. There is a risk of radicalization among citizens Americans, evidenced by some who have gone to
fight jihads in Syria and Somalia, but mass shootings carried out by U.S. citizens of various racial backgrounds occurs much more often, says Vanda
Felbab-Brown, a senior fellow on foreign policy at the Brookings Institution. Since 1982, there have been at least 70 mass
shootings across the U.S. “We
have seen very little domestic terrorism in the U.S.,” Felbab-Brown says. This lack of
terrorism is due in part to the willingness of the Islamic community to cooperate with
law enforcement to identify possible radical threats , out of gratitude that the U.S. is a stable, secure country
compared with the Middle East, she says. “ That could go sour if law enforcement becomes too aggressive, too
extreme ,” she says.
o The turn’s unique – relations are low now. We also control the vital internal
link:
Ramirez ‘4
(et al; Deborah A. Ramirez, Professor of Law at Northeastern University. She holds a JD from Harvard University, "Developing
partnerships between law enforcement and American Muslim, Arab, and Sikh communities: a promising practices guide"
(2004). Partnering for Prevention & Community Safety Initiative Publications. Paper 4. http://hdl.handle.net/2047/d20004127)
For all these reasons, in a post-September 11th world, it
is critical for law enforcement and the Muslim, Arab, and Sikh
communities in this country to strengthen their relationships. Historically, these relationships have not
existed in any significant way. Prior to September 11th, law enforcement primarily focused their community policing efforts on
other communities of color – Latinos, Asians, African-Americans, etc. Similarly, hate crime enforcement efforts mostly focused on crimes
against the gay community, Jews, Latinos, Asians and African-Americans. Consequently few state, local or federal law enforcement agencies
had any significant contact with the Arab, Muslim, or Sikh communities prior to September of 2001. It is the premise of the Partnering for
Prevention and Community Safety Initiative that Americans
will only truly be safe from terrorist attacks when law
enforcement agencies adopts a strategy focused on building trust and strengthening relationships with
the Muslim, Arab, and Sikh communities. This paradigm is not only more consistent with our
constitutional ideals, it also represents our best hope for securing our homeland.
3. No link – targeted warrants, which plan allows, solve the terror disad just as
well.
Wyden ‘14
(et al; This amicus brief issued by three US Senators - Ron Wyden, Mark Udall and Martin Heinrich. Wyden and Udall sat on the
Senate Select Committee on Intelligence and had access to the meta-data program. “BRIEF FOR AMICI CURIAE SENATOR RON
WYDEN, SENATOR MARK UDALL, AND SENATOR MARTIN HEINRICH IN SUPPORT OF PLAINTIFF-APPELLANT, URGING REVERSAL
OF THE DISTRICT COURT” – Amicus Brief for Smith v. Obama – before the United States Ninth Circuit Court of Appeals - Appeal
from the United States District Court District of Idaho The Honorable B. Lynn Winmill, Chief District Judge, Presiding Case No.
2:13-cv-00257-BLW – Sept 9th, 2014 – This Amicus Brief was prepared by CHARLES S. SIMS from the law firm PROSKAUER ROSE
LLP. Amici” means “friend of the court” and – in this context - is legal reference to Wyden, Udall, etc. This pdf can be obtained
at: https://www.eff.org/document/wyden-udall-heinrich-smith-amicus)
As members of the Senate Select Committee on Intelligence, amici Senators Wyden and Udall have for years
participated in the oversight of government surveillance conducted under the Patriot Act that they knew would astonish
most Americans. They sought to warn the public about those activities as best they could without disclosing classified information. They also co-sponsored an
amendment to the Patriot Act’s reauthorization that sought to address the problem of government officials “secretly reinterpret[ing] public laws and statutes” and
“describ[ing] the execution of these laws in a way that misinforms or misleads the public.” See 157 Cong. Rec. S3360 (daily ed. May 25, 2011) (introducing SA 384 to
S. 990, 112th Cong. § 3 (2011)); see also 157 Cong. Rec. S3386 (daily ed. May 26, 2011) (statement of Sen. Wyden) (“The fact is anyone can read the plain text of the
PATRIOT Act. Yet many Members of Congress have no idea how the law is being secretly interpreted by the executive branch.”); 157 Cong. Rec. S3258 (daily ed. May
24, 2011) (statement of Sen. Udall) (“Congress is granting powers to the executive branch that lead to abuse, and, frankly, shield the executive branch from
accountability”). Now that the government’s bulk call-records program has been documented and exposed, the
executive branch has retreated
from frequently repeated claims about its necessity and expressed an intent to end government bulk collection under section 215. Press Release,
FACT SHEET: The Administration’s Proposal for Ending the Section 215 Bulk Telephony Metadata Program (Mar. 27, 2014), http://www.whitehouse.gov/the-pressoffice/2014/03/27/fact-sheet-administration-s-proposal-ending-section-215-bulk-telephony-m (“White House Press Release”). While Senators Udall, Heinrich and
Wyden broadly support a policy aimed at ending the government’s indiscriminate collection of telephony metadata, they share a concern that there is no plan to
suspend the bulk collection of Americans’ phone records in the absence of new legislation, which is not necessarily imminent. Meanwhile, the government
continues to defend its bulk call-record collection program vigorously against statutory and constitutional challenges in the courts. Amici
submit this
brief to respond to the government’s argument that its collection of bulk call records is necessary to defend the nation
against terrorist attacks. Amici make one central point: as members of the committee charged with overseeing the
National Security Agency’s surveillance, amici have reviewed this surveillance extensively and have seen no evidence that the bulk
collection of Americans’ phone records has provided any intelligence of value that could not have been gathered
through means that caused far less harm to the privacy interests of millions of Americans. The government has at its disposal a
number of authorities that allow it to obtain the call records of suspected terrorists and those in contact with suspected terrorists. It appears to amici that these
more targeted authorities could have been used to obtain the information that the government has
publicly claimed was crucial in a few important counterterrorism cases.
4. Terrorist can’t obtain and correctly deploy bioweapons
Ouagrham-Gormley 14
Sonia Ben Ouagrham-Gormley is Assistant Professor of Public and International Affairs at George Mason University. She worked
for a decade at the Monterey Institute for International Studies. She was for two years research director of the James Martin
Center for Nonproliferation Studies office in Kazakhstan and was founding editor of the International Export Control Observer,
Cornell University Press, November 2014, “Barriers to Bioweapons”,
http://www.cornellpress.cornell.edu/book/?GCOI=80140100857780
In both the popular imagination and among lawmakers and national security experts, there exists the belief that with sufficient
motivation and material resources, states or terrorist groups can produce bioweapons easily, cheaply,
and successfully. In Barriers to Bioweapons, Sonia Ben Ouagrham-Gormley challenges this perception by showing that bioweapons
development is a difficult, protracted, and expensive endeavor, rarely achieving the
expected results whatever the magnitude of investment. Her findings are based on extensive
interviews she conducted with former U.S. and Soviet-era bioweapons scientists and on careful analysis of archival data
and other historical documents related to various state and terrorist bioweapons programs. Bioweapons development relies on living
organisms that are
sensitive to their environment and handling conditions, and therefore behave unpredictably . These
features place a greater premium on specialized knowledge. Ben Ouagrham-Gormley posits that lack of access to
such
intellectual capital constitutes the greatest barrier to the making of bioweapons. She
integrates theories drawn from economics, the sociology of science, organization, and management with her empirical research. The resulting theoretical
framework rests on the idea that the pace and success of a bioweapons development program can be measured by its ability to ensure the creation and transfer of
scientific and technical knowledge. The
specific organizational, managerial, social, political, and economic conditions
necessary for success are difficult to achieve, particularly in covert programs where the
need to prevent detection imposes managerial and organizational conditions that conflict with
knowledge production.
5. Bioterror risk is low and wouldn’t kill many people anyway.
Keller 13
(Rebecca, 7 March 2013, Analyst at Stratfor, “Bioterrorism and the Pandemic Potential,” Stratfor,
http://www.stratfor.com/weekly/bioterrorism-and-pandemic-potential)
The risk of
an accidental release of H5N1 is similar to that of other infectious pathogens currently being
studied. Proper safety standards are key, of course, and experts in the field have had a year to determine
the best way to proceed, balancing safety and research benefits. Previous work with the virus was conducted at
biosafety level three out of four, which requires researchers wearing respirators and disposable gowns to work in pairs in a negative pressure
environment. While many of these labs are part of universities, access is controlled either through keyed entry or even palm scanners. There
are roughly 40 labs that submitted to the voluntary ban. Those wishing to resume work after the ban was lifted must comply with guidelines
requiring strict national oversight and close communication and collaboration with national authorities. The
risk of release either
through accident or theft cannot be completely eliminated, but given the established parameters the
risk is minimal . The use of the pathogen as a biological weapon requires an assessment of whether a
non-state actor would have the capabilities to isolate the virulent strain, then weaponize and distribute
it. Stratfor has long held the position that while terrorist organizations may have rudimentary capabilities regarding
biological weapons, the likelihood of a successful attack is very low . Given that the laboratory
version of H5N1 -- or any influenza virus, for that matter -- is a contagious pathogen, there would be two
possible modes that a non-state actor would have to instigate an attack. The virus could be refined and
then aerosolized and released into a populated area, or an individual could be infected with the virus
and sent to freely circulate within a population. There are severe constraints that make success using
either of these methods unlikely. The technology needed to refine and aerosolize a pathogen for a
biological attack is beyond the capability of most non-state actors. Even if they were able to develop a
weapon, other factors such as wind patterns and humidity can render an attack ineffective. Using a
human carrier is a less expensive method, but it requires that the biological agent be a contagion. Additionally,
in order to infect the large number of people necessary to start an outbreak, the infected carrier must
be mobile while contagious, something that is doubtful with a serious disease like small pox. The
carrier also cannot be visibly ill because that would limit the necessary human contact.
6. No rollback — Boston bombing proves fear won’t spike out of control.
Hayes 13
Danny Hayes, associate professor of political science at George Washington University, focusing on political communication and
political behavior; co-author of Influence from Abroad, a book about Americans' views toward U.S. foreign policy, 2013 (“Why
the Boston Marathon bombing won’t erode civil liberties,” Wonkblog, The Washington Post, April 28 th, Available Online at
http://www.washingtonpost.com/blogs/wonkblog/wp/2013/04/28/why-the-boston-maraton-bombing-wont-erode-civilliberties/, Accessed 06-21-2013)
From the moment that Boston bombing suspect Dzhokhar Tsarnaev was pulled out of a boat in Watertown, Mass., the
debate over civil liberties and domestic anti-terrorism policies, largely dormant in recent years, was reignited. Noting that “the
homeland is the battlefield,” Sen. Lindsey Graham (R-S.C.) urged the Obama administration to designate Tsarnaev, an American citizen, as an enemy combatant.
Civil liberties groups then objected when authorities decided not to read Miranda rights to the Boston Marathon bombing suspect, invoking a public safety
exception. Speculation also arose
that police might now find it easier to persuade the public to support the use of
surveillance technology and domestic drones. “After Boston,” Ryan Gallagher wrote this week in Slate, “the balance in the struggle between privacy
and security may swing back in their favor.” But research conducted shortly after 9/11, combined with some recent polling
data, suggests that Americans may be unlikely to trade civil liberties for a greater sense of security as a
result of the bombing. That’s because the attack hasn’t made the public significantly more fearful of
future domestic terrorism, and because trust in government is low . After 9/11, concern over terrorism
skyrocketed. In a Gallup survey fielded in the days before the attack, less than one-half of one percent of Americans said terrorism was the country’s most
important problem. But in October 2001, 46 percent did. These worries boosted support for legislation, such as the USA PATRIOT Act,
that expanded law enforcement’s power to investigate suspected terrorism, even as those measures were criticized for eroding civil liberties protections. In a survey
conducted between November 2001 and January 2002, political scientists Darren Davis and Brian Silver designed a series of questions to explore the tradeoffs
between security and civil liberties. They began by asking people whether they agreed more with the statement that “in order to curb terrorism in this country, it
will be necessary to give up some civil liberties” or that “we should preserve our freedoms above all, even if there remains some risk of terrorism.” Forty-five
percent of Americans chose the first option, indicating a willingness to give up some freedoms in exchange for greater security. When respondents were asked
about the tradeoffs involving specific measures, there was wide variation. Davis and Silver found that very few Americans – eight percent – believed that the
government should have the power to investigate people who participate in nonviolent protests. And just 18 percent said they supported racial profiling. But when
asked, for instance, whether they agreed that “high school teachers have the right to criticize America’s policies toward terrorism” or that “high school teachers
should defend America’s policies in order to promote loyalty to our country,” 60 percent said teachers should back the government. Perhaps not surprisingly, the
biggest influence on whether people were willing to offer pro-security over pro-civil liberties responses was their fear of a second attack. Respondents who believed
another terrorist act was imminent were more likely to support tradeoffs in favor of security. Importantly, Davis and Silver found that the relationship was strongest
among people who expressed high levels of political trust: People who believe the government typically does the right thing and who were fearful of another
terrorist attack were the most willing to relinquish civil liberties protections. Those findings are consistent with a series of studies by Stanley Feldman, Leonie Huddy
and their colleagues at Stony Brook University. In one survey conducted between October 2001 and March 2002, the researchers found that 86 percent of
Americans said they were “very” or “somewhat” concerned about another domestic terrorist act. The greater the concern, the more likely respondents were to
support the use of government-issued ID cards and allowing authorities to monitor phone calls and e-mail. But in
contrast to 9/11, polling since
the Boston Marathon suggests that the bombing has made Americans only slightly more fearful of future
terrorist attacks than they were beforehand. Fifty-eight percent of respondents in a Pew poll conducted April 18-21 said they were “very” or
“somewhat” worried about another attack on the United States. That was no higher, however, than when the same question was asked in November 2010. And it
was significantly lower than the 71 percent who said they were worried in October 2001. A slightly different question in a Washington Post poll taken April 17-18
found that 69 percent of Americans said that the possibility of a major terrorist attack worried them either “a great deal” or “somewhat.” That figure was only a few
percentage points higher than when the same question was asked in 2007 and 2008. In
addition, political trust is lower today than it
was in 2001, when public confidence in government rose sharply after the terrorist attacks. If Davis and Silver’s findings are
correct, then greater
skepticism of government – produced in part by the struggling economy – should limit the public’s
willingness to give law enforcement more latitude . Ultimately, the scope of the Boston tragedy was smaller than 9/11,
which could help explain its limited effect on the public. It may also be that because
Americans believe terrorist attacks are now a
fundamental part of life in the United States , any single event will have a more muted effect
on public opinion . And because the Tsarnaev brothers have not been connected to any known terrorist organizations, Americans may feel less
under siege than they did when al-Qaeda and Osama bin Laden were identified as the perpetrators of the 2001 attacks. Regardless of the reason, all
of this
suggests that policymakers are likely to face a more difficult task than they did after 9/11 in persuading the public
to support additional security measures that infringe on Americans’ freedoms.
Download