A2 Circumvention DA Updates --a2 circumvention – generic No circumvention – prefer empirics and authoritative independent review Bora 14 (Kukil Bora, International Business Times, “NSA Internet Surveillance Is Legal, A Presidential Privacy Board Concludes,” 7-2-2014, http://www.ibtimes.com/nsa-internet-surveillance-legal-presidential-privacy-board-concludes-1617270) The NSA's current spying activities function under a provision known as Section 702, which has its roots in the Terrorist Surveillance Program implemented after the 9/11 attacks. It was added in 2008 to the Foreign Intelligence Surveillance Act of 1978 to allow the agency to collect and track electronic communications initiated by foreigners living outside the U.S. when their telephone calls, emails, web chats and text messages enter the country. Section 702 also covers the divisive PRISM program, which allows NSA to collect foreign communication data from technology companies, such as Google Inc. (NASDAQ:GOOGL), Facebook Inc (NASDAQ:FB), Microsoft Corporation (NASDAQ:MSFT) and Apple Inc. (NASDAQ:AAPL). The NSA is accused of also spying on communications made by Americans, in its effort to glean information on terrorist activities and foreign intelligence. After the unauthorized disclosure of classified documents by former NSA systems administrator Edward Snowden, many people expressed concerns, and criticized as unconstitutional, the practice of secretly collecting troves of data about Americans' communications over the Internet without their approval. However, the board, which consists of a Democratic federal judge, two privacy experts and two former Republican justice department officials, found that the NSA surveillance is legal and realistic. “Overall, the board finds that the protections contained in the Section 702 minimization procedures are reasonably designed and implemented to ward against the exploitation of information acquired under the program for illegitimate purposes,” the board said in the report. “The board has seen no trace of any such illegitimate activity associated with the program, or any attempt to intentionally circumvent legal limits .” The report also offered recommendations to help the government push NSA programs “into the sphere of reasonableness” to ensure that the agency can perform its duties while operating within Constitutional limits. However, according to Associated Press, exactly how the government would utilize the information obtained through Section 702, and the extent to which the information would help authorities investigate domestic law enforcement cases, remains unclear. --a2 circumvention – intel-sharing Foreign partners won’t circumvent Shane 13 (Scott Shane, New York Times, “Ex-Contractor Is Charged in Leaks on N.S.A. Surveillance,” 6-21-2013, http://www.nytimes.com/2013/06/22/us/snowden-espionage-act.html?_r=0) In the latest installment of the Snowden disclosures on Friday, The Guardian reported that the N.S.A.’s British counterpart has tapped into hundreds of fiber-optic communications lines and is sharing a vast quantity of e-mail and Internet traffic with American intelligence. Under a program called Tempora, the British agency, known as G.C.H.Q., has been able to tap into 200 of the approximately 1,600 high-capacity fiber cables in and out of Britain and aspires to be able to tap 400 lines at once, harvesting a staggering amount of information, the British newspaper reported. The documents said that G.C.H.Q., which has worked very closely with the N.S.A. for decades, may store the content of the communications flowing over the cables for three days and the so-called metadata — information about who is contacting whom at what time — for 30 days. During that time, analysts from both G.C.H.Q. and the N.S.A. are able to search the stored data for information of interest. The disclosures of the G.C.H.Q. initiative, called “Mastering the Internet,” immediately raised a question among privacy advocates: whether the N.S.A. might be able to obtain information about Americans from G.C.H.Q. that it is prohibited by law or regulations from collecting itself. An N.S.A. spokeswoman, Judith Emmel, said the agency does not use foreign partners to evade American restrictions. “Any allegation that N.S.A. relies on its foreign partners to circumvent U.S. law is absolutely false,” she said. “N.S.A. does not ask its foreign partners to undertake any intelligence activity that the U.S. government would be legally prohibited from undertaking itself.” Ms. Emmel said the N.S.A. “is unwavering in its respect for U.S. laws and policies” and has “a rigorous internal compliance program” as well as oversight from Congress and the Foreign Intelligence Surveillance Court. One document released by Mr. Snowden lent some support for the Obama administration’s insistence that the N.S.A. is tightly controlled. In a confidential briefing, The Guardian reported, a G.C.H.Q. legal adviser declared: “We have a light oversight regime compared with the U.S.” --a2 circumvention – privates Private sector won’t circumvent Tim Worstall, 13, "NSA's PRISM Sounds Like A Darn Good Idea To Me: This Is What Governments Are For," Forbes, http://www.forbes.com/sites/timworstall/2013/06/07/nsas-prism-sounds-like-a-darn-good-idea-to-me-this-is-what-governmentsare-for/ There’s been a joint investigation by the Washington Post and The Guardian into an NSA program called PRISM. The allegation is that the National Security Agency (NSA) has backdoor access to the systems and data of the major internet firms, Microsoft MSFT -0.77%, Google GOOG -0.68%, Apple AAPL -0.56%, Facebook FB +0.03% and so on, and they routinely use this to monitor what people are saying and doing. With one caveat this is in fact what governments are supposed to do so I’m at something of a loss in understanding why people seem to be getting so outraged about it. The WaPo piece is here, a couple from The Guardian here and here. It’s worth pointing out that the companies themselves are vehemently denying that the NSA has such backdoor access to the data. However, senior executives from the internet companies expressed surprise and shock and insisted that no direct access to servers had been offered to any government agency. The top-secret NSA briefing presentation set out details of the PRISM program, which it said granted access to records such as emails, chat conversations, voice calls, documents and more. The presentation the listed dates when document collection began for each company, and said PRISM enabled “direct access from the servers of these US service providers: Microsoft, Yahoo YHOO -2.43%, Google, Facebook, Paltalk, AOL AOL +0.06%, Skype, YouTube, Apple”. Senior officials with knowledge of the situation within the tech giants admitted to being confused by the NSA revelations, and said if such data collection was taking place, it was without companies’ knowledge. An Apple spokesman said: “We have never heard of PRISM. We do not provide any government agency with direct access to our servers and any agency requesting customer data must get a court order,” he said. Whether the claim of direct access is true or not is one thing. But the much larger point is that this sort of behaviour is not something that we should be shouting about government doing. It’s something that we should be shouting about government not doing. A2 Terrorism DA Updates IMPACT DEFENSE 2ac No impact to terror- even the government has conceded it’s not an existential risk Mueller and Stewart 15, (Mueller, leading expert on terrorism, Stewart, member of the Australian Legislative Assembly of Queensland, “Terrorism poses no existential threat to America. We must stop pretending otherwise”, http://www.theguardian.com/commentisfree/2015/feb/24/terrorism-poses-no-existential-threat-to-america 2/15/15, John and Mark, The Guardian, p.1) One of the most unchallenged, zany assertions during the war on terror has been that terrorists present an existential threat to the United States, the modern state and civilization itself. This is important because the overwrought expression, if accepted as valid, could close off evaluation of security efforts. For example, no defense of civil liberties is likely to be terribly effective if people believe the threat from terrorism to be existential. At long last, President Barack Obama and other top officials are beginning to back away from this absurd position. This much overdue development may not last, however. Extravagant alarmism about the pathological but selfdestructive Islamic State (Isis) in areas of Syria and Iraq may cause us to backslide. The notion that international terrorism presents an existential threat was spawned by the traumatized in the immediate aftermath of 9/11. Rudy Giuliani, mayor of New York at the time, recalls that all security experts” expected “dozens and dozens and multiyears of attacks like this” and, in her book The Dark Side, Jane Mayer observed that “the only certainty shared by virtually the entire American intelligence community” was that “a second wave of even more devastating terrorist attacks on America was imminent”. Duly terrified, US intelligence services were soon imaginatively calculating the number of trained al-Qaida operatives in the United States to be between 2,000 and 5,000. Also compelling was the extrapolation that, because the 9/11 terrorists were successful with box-cutters, they might well be able to turn out nuclear weapons. soon it was being authoritatively proclaimed that atomic terrorists could “destroy civilization as we know it” and that it was likely that a nuclear terrorist attack on the United States would transpire by 2014. No atomic terrorists have yet appeared (al-Qaida’s entire budget in 2001 for research on all weapons of mass destruction totaled less than $4,000), and intelligence has been far better at counting al-Qaida operatives in the country than at finding them. But the notion that terrorism presents an existential threat has played on. By 2008, Homeland Security Secretary Michael Chertoff declared it to be a “significant existential” one - carefully differentiating it, apparently, from all those insignificant existential threats Americans have faced in the past. The bizarre formulation survived into the Obama years. In October 2009, Bruce Riedel, an advisor to the new administration, publicly maintained the al-Qaida threat to the country to be existential. In 2014, however, things began to change. In a speech at Harvard in October, Vice President Joseph Biden offered the thought that “we face no existential threat – none – to our way of life or our ultimate security.” After a decent interval of three months, President Barack Obama reiterated this point at a press conference, and then expanded in an interview a few weeks later, adding that the US should not “provide a victory to these terrorist networks by over-inflating their importance and suggesting in some fashion that they are an existential threat to the United States or the world order.” Later, his national security advisor, Susan Rice, echoed the point in a formal speech. It is astounding that these utterances – “blindingly obvious” as security specialist Bruce Schneier puts it – appear to mark the first time any officials in the United States have had the notion and the courage to say so in public. Whether that development, at once remarkable and absurdly belated, will have some consequence, or even continue, remains to be seen. Senators John McCain and Lindsay Graham have insisted for months that Isis presents an existential threat to the United States. An alarmed David Brooks reported that financial analysts have convinced themselves that the group has the potential to generate a worldwide “economic cataclysm.” And General Michael Flynn, recently retired as head of the Defense Intelligence Agency, has been insisting that the terrorist enemy is “committed to the destruction of freedom and the American way of life” while seeking “world domination, achieved through violence and bloodshed.” It was reported that his remarks provoked nods of approval, cheers and “ultimately a standing ovation” from the audience. Thus even the most modest imaginable effort to rein in the war on terror hyperbole may fail to gel. 1ar Terrorism not a threat- exaggeration made by governments as excuse for illegal surveillance and for money Walt 15 (STEPHEN M, Stephen Martin Walt is an American professor of international affairs at Harvard University's John F. Kennedy School of Government. After attaining his B.A., Walt began graduate work at UC Berkeley, graduating with a M.A in Political Science in 1978, and a Ph.D. in Political Science in 1983. “Think Before You March” Why mass rallies and photo ops are the wrong response to attacks like “Charlie Hebdo.””http://foreignpolicy.com/2015/01/16/think-before-you-march-charlie-hebdoislamist-terrorism/ January 16) How should one respond to the recent attacks in Paris? Whether you are a political leader, a prominent pundit, or just an ordinary citizen, what is the most constructive way to react when a handful of people are singled out and brutally killed? Being outraged by these senseless deaths is easy, but it’s not especially effective or illuminating. What really matters is how societies facing the danger of terrorism deal with it, and I worry that the reflexive responses we have seen over the past week are unintentionally aiding the terrorists’ broader purpose. For example, was that inspiring mass march in Paris on Jan. 11 really the best response? To be sure, it is gratifying to see the outpouring of support for the victims and the vocal defiance directed toward the terrorists, along with eloquent defenses of the broad principle of free expression. It is equally encouraging to see these attacks condemned by a diverse array of political and religious leaders, including prominent representatives of the Arab and Islamic worlds. But these dramatic gestures also magnify the importance of a heinous act committed by some otherwise marginal individuals, and they reinforce the perception that such people present a large, growing, insidious, and existential threat to our civilization’s future and our own personal safety. A shocking event such as this one requires more from us than just expressions of sympathy and defiance, however appropriate those emotional reactions may be. It also requires us to think calmly and rationally about what has happened, why it has happened, and what the most effective responses would be. If we let anger, emotion, or political opportunism dictate our reaction, we are likely to lash out at the wrong targets, take actions that merely confirm the terrorists’ own self-justifying narrative, and make it easier for them to recruit new followers. Any one of these things will make this problem worse instead of better. Let’s begin by recognizing what these murderers sought to achieve by targeting Charlie Hebdo and a kosher market. Apart from a simple desire for revenge (more below about that), part of their aim was to provoke precisely the sort of overreaction that would bolster their narratives about the West’s “war on Islam” and make them appear to be the staunchest defenders of an oppressed religion. As Juan Cole noted here, fueling a broad civilizational conflict between Islam and the West is precisely what these groups want, because it would aid their recruiting efforts and make them look like heroes instead of criminals. Like other extremists in Iraq, the Balkans, and elsewhere, they know that violence is intensely polarizing and frequently leads governments to react foolishly. Just look at the U.S. response to the 9/11 attacks: Instead of focusing its attention solely on al Qaeda, George W. Bush’s administration chose to invade Iraq, a senseless and unnecessary diversion that eventually helped spawn the Islamic State. Today, more than 10 years after 9/11 and more than 20 years after the World Trade Center bombing, we need most of all to keep the terrorist threat in perspective . It is clearly a problem — especially given the number of people still flocking to the Islamic State’s banner — but the actual danger from terrorism remains modest. According to the Global Terrorism Index, there were roughly 18,000 worldwide deaths from terrorism in 2013. That sounds like a big number until one realizes that the vast majority of these deaths occurred in places where active insurgencies are operating (Nigeria, Afghanistan, Pakistan, Iraq, and Syria, etc.). Deaths or injuries resulting from terrorism in the rest of the world — including the United States, France, and the rest of Europe — remain quite low, especially when compared with other risks (highway fatalities, household accidents, preventable disease, or ordinary murders). Not counting suicides, about 30 Americans are shot dead every day. By comparison, the risk that an American or European will be killed or harmed by terrorists overstating the risk of terrorism can be just as bad as ignoring it. In the present context, overstating the risk fuels Islamophobia, and growing anti-Muslim sentiment will inevitably remains (fortunately) vanishingly small. point is not to trivialize what happened last week in Paris, but to emphasize that encourage a few more Muslims to embrace the jihadi cause. It leads governments around the world to devote excessive resources to counterterrorist activities. Exaggerated fears of terrorism led many Americans to support Bush’s misbegotten invasion of Iraq, and similar fears led President Barack Obama to escalate and prolong U.S. involvement in Afghanistan to little purpose. Shamefully, it led the United States (and some of its allies) to engage in acts of torture and illegal surveillance, thereby threatening America’s core political values. A few months from now, inflated fears of terrorism could propel even France’s National Front into office, a step that would reinforce nationalist tendencies within Europe and put the future of the European Union in doubt. To be honest, I don’t fully understand why it is so hard for most societies to calibrate the actual danger from terrorism properly. Although the evidence clearly shows that the danger individuals face from terrorist violence is vastly smaller than many other risks, you wouldn’t know it by looking at how Western democracies have reacted over the past decade or more. Some commentators say this is because terrorist violence seems “random” or unpredictable, but that’s equally true of other dangers (such as highway accidents) that don’t generate the same hype or the same frantic public response. Others scholars suggest the problem lies in the nature of terrorist violence itself: Because human beings are hard-wired to react to dramatic or vivid events, then events like the Paris attacks exert undue weight on our perceptions of how the world works. Even when such events are very rare and the consequences are limited, people believe attacks are more likely and more lethal than they really are. Governments will also exaggerate the danger if they focus primarily on what terrorists say they want to do instead of focusing on what they are actually able to do. Terrorist organizations threaten horrific things in order to scare others and to keep their members motivated, but terrorism itself remains a weapon of the weak. If the Islamic State, al Qaeda, or other groups had lots of precision-guided weapons, supersonic planes, drones, ballistic missiles, warships, and other sophisticated power-projection capabilities, they could do enormous damage and put tens of thousands of lives at risk. But because they lack these abilities, they have to rely on clandestine plots that usually fail or on small-scale operations that attract a lot of attention but whose destructive effects are inherently limited. I suspect the real reason we exaggerate these threats has more to do with domestic politics than with the true level of danger. Whenever a terrorist incident occurs, politicians are quick to accuse incumbents of failing to do enough to prevent such actions. The fear of such accusations, of course, encourages officials to overreact so that they aren’t vulnerable to the charge of insufficient vigilance. The ever-growing coterie of terrorism experts and counterterrorism consultants is equally quick to hype the danger and prescribe responses because that is what keeps all that money flowing into their coffers. With a few exceptions, the official national security establishment isn’t about to downplay the danger either, because threat inflation is its lifeblood too. And the media has every reason to join the chorus of doom and gloom: Even a small terrorist incident gets lots of people watching, listening, or reading online, especially when it occurs in Paris, London, or some other Western city. 1ar- media hype Terrorism is no threat; feds exaggerate and media is compliant with the lies Smith, 2013 (Patrick L. has been a correspondent, commentator, editor, and critic for more than 30 year. Smith has won two Overseas Press Club Awards as well as other honors and prizes. His reportage, commentary, essays, and reviews have appeared in The New York Times, Business Week, TIME, The Washington Quarterly, World Policy Journal, The Globalist, The Nation, and numerous other publications“"Chatter" from "affiliates" causes a "crisis," while media reports nonsense generated to justify NSA surveillance” http://www.salon.com/2013/08/09/there_is_no_terrorist_threat_the_feds_want_you_to_think_there_is_compliant_media_goes_along/ August 9. There is no terrorist threat: The feds want you to think there is, compliant media goes along . Summertime, and the chicanery is easy. The Obama administration’s latest rendering of our invisible but eternal “terrorist threat,” I mean. After a week of ghost stories about an imminent but vaporous plot on the part of an al-Qaida “affiliate” — this is the big new word — it is hard to decide which is more disheartening: 1) The White House’s blithe if clumsy deployment of factoids, 2) the supine complicity of the media (and this, frankly, is my choice), or 3) the willingness of honorable liberals and capital-D Democrats to go along with the show simply because Obama is maestro and one stays with Obama no matter what he does. Nothing can be said for certain as to what prompted the State Department to close more than 20 embassies and consulates in the Middle East and North Africa last Sunday, and this is by design. But it is no excuse not to raise the possibility that Americans are eating a summer salad of nonsense served to justify objectionable surveillance practices now coming in for scrutiny. This prospect seems so self-evident that one feels almost silly raising it, except that so few have. Let us insert it into the conversation. To me, the silence among our newspapers and broadcasters on this point confirms only how dangerously circumscribed American political discourse has become. It is all text and subtext now, and the subtext, by definition, is known but never allowed to pierce the surface of silence. Washington has been erecting a quite warped worldview atop the terror narrative since 2001, if there is anyone left who has not noticed. Our oncepromising president has signed on, and plenty of people seem intent on not noticing this. But flinching is of no use. It is imperative that this nation come to clear, proper terms with the question of terror. Reversion to the paranoid style, a habit that dates to America’s founding, is already producing damaging consequences. UNIQUENESS 2ac Terrorism declining- cause is free political space Chapman 13 (,Steve. “The Decline of Terrorism, ” http://www.realclearpolitics.com/articles/2013/04/18/the_decline_of_terrorism_118011.html Steve Chapman is a columnist and editorial writer for the Chicago Tribune. His twice-a-week column on national and international affairs, distributed by Creators Syndicate, appears in some 50 papers across the country. He attended Harvard University, where he was on the staff of The Harvard Crimson, and graduated with honors in 1976. He has been a fellow at the American Academy in Berlin and the Hoover Institution at Stanford University, and has served on the Visiting Committee of the University of Chicago Law School, April 18) Our era is known as the Age of Terror, and no wonder. Twelve years ago, the United States suffered its worst terrorist attack ever, and since then, we have lived under the shadow of atrocities designed to frighten as well as kill. The bombs that went off in Boston put to rest the hope that with al-Qaida largely demolished, we could rest easy. This episode was a gruesome reminder of the toxicity of political extremism and our vulnerability to it. There are people out there who want to kill innocent Americans, and there is no reliable way to stop them all. The question looking back is: Who did it? The question looking forward is: What's next? But horrifying though the Boston attack was, we don't really live in an age of terror. In relative terms, believe it or not, it's really an age of peace and safety. We are not immune to radical violence. But we have far less of it than we used to. Back in 1993, al-Qaida operatives set off a truck bomb in the basement of New York's World Trade Center, killing six and injuring more than 1,000. Two years later, Timothy McVeigh detonated explosives at the federal building in Oklahoma City, leaving 168 people dead. Those were preludes to the horror of 9/11. But since then, terrorism has not proliferated -- just the opposite. From 1991 through 2000, reports the National Consortium for the Study of Terrorism and Responses to Terrorism at the University of Maryland, the United States had an average of 41 terrorist attacks per year. From 2002 through 2010, the number was just 16 per year. Even the 1990s were nothing compared to the 1960s and 1970s, when homegrown terrorism reached epidemic levels. The violence came from both the right and the left. The Ku Klux Klan assassinated civil rights leader Medgar Evers and killed four black girls by blowing up a church in Birmingham, Ala. Anti-Castro militants committed dozens of bombings in Miami. The Weather Underground mounted its own campaign of bombings, including blasts at the U.S. Capitol, the Pentagon and the State Department. In 1970, antiwar radicals destroyed a University of Wisconsin science lab and killed a postdoctoral researcher. "Bombing has reached gigantic proportions," New York City's police commissioner told Congress. The New York Times reported, "From January 1969 to April 7, 1970, the country suffered 4,330 bombings" that caused 43 deaths. Not all leftist radicals joined in. "Sniping," noted The Times, "appears to be the preferred style of violence for black militants." The volume of mayhem is hard to imagine in our more peaceful age. The trend over the past few decades has been away from the use of physically destructive means to achieve ideological ends. How come? It's not because we have more police or better crime-fighting technology, though those help. It's a reflection of an often polarized but essentially healthy political culture. Murderous movements simply don't flourish in modern America. A soil that is ideal for robust and often vitriolic debate offers little sustenance to the weeds of violent extremism. In the weeks after 9/11, it was widely assumed that terrorist attacks and suicide bombings would proliferate within our borders. But al-Qaida didn't inspire a legion of followers and imitators any more than McVeigh did. The uprisings they hoped to produce never ignited. American Muslims almost unanimously rejected the call to religious war, even after the U.S. invaded Afghanistan and Iraq. A big reason for the ebbing of violence is that American society has come so far. In the 1960s, blacks suffered severe discrimination and had little political power. During the Vietnam War, 18-year-olds were forced to risk death for a cause many rejected. The second-class status of women fueled political alienation. Protests often evoked brutal responses from police. Those festering social ills have vanished or subsided. America is a freer and more open place for people of all kinds. Even Muslims are not less satisfied with the direction of the country than their neighbors: They are more satisfied . Our political rhetoric is sometimes irresponsible. But the safety valve of untrammeled free speech seems to keep it from turning into actual violence. Fire-eaters can engage in political theater without proceeding to incendiary action. Those who resort to killing innocents achieve nothing but the defeat of their own cause. Americans have no sympathy for political violence. And that's a pretty good inoculation against it. SURVEILLANCE DEFENSE 2ac Bulk collection can’t stop terrorism Nakashima 14, National Security Reporter for the Washington Post. Degree in Humanities from UC Berkley. (Ellen, “NSA phone record collection does little to prevent terrorist attacks, group says” Washington Post, http://www.washingtonpost.com/world/national-security/nsa-phone-record-collection-does-little-to-prevent-terrorist-attacks-groupsays/2014/01/12/8aa860aa-77dd-11e3-8963-b4b654bcc9b2_story.html, 1-24-14) An analysis of 225 terrorism cases inside the United States since the Sept. 11, 2001, attacks has concluded that the bulk collection of phone records by the National Security Agency “has had no discernible impact on preventing acts of terrorism.” In the majority of cases, traditional law enforcement and investigative methods provided the tip or evidence to initiate the case, according to the study by the New America Foundation, a Washington-based nonprofit group. The study, to be released Monday, corroborates the findings of a White House-appointed review group, which said last month that the NSA counterterrorism program “was not essential to preventing attacks” and that much of the evidence it did turn up “could readily have been obtained in a timely manner using conventional [court] orders.” Under the program, the NSA amasses the metadata — records of phone numbers dialed and call lengths and times — of virtually every American. Analysts may search the data only with reasonable suspicion that a number is linked to a terrorist group. The content of calls is not collected. The new study comes as President Obama is deliberating over the future of the NSA’s bulk collection program. Since it was disclosed in June, the program has prompted intense debate over its legality, utility and privacy impact. Senior administration officials have defended the program as one tool that complements others in building a more complete picture of a terrorist plot or network. And they say it has been valuable in knocking down rumors of a plot and in determining that potential threats against the United States are nonexistent. Director of National Intelligence James R. Clapper Jr. calls that the “peace of mind” metric. In an opinion piece published after the release of the review group’s report, Michael Morell, a former acting CIA director and a member of the panel, said the program “needs to be successful only once to be invaluable.” The researchers at the New America Foundation found that the program provided evidence to initiate only one case, involving a San Diego cabdriver, Basaaly Moalin, who was convicted of sending money to a terrorist group in Somalia. Three co-conspirators were also convicted. The cases involved no threat of attack against the United States. “The overall problem for U.S. counterterrorism officials is not that they need vaster amounts of information from the bulk surveillance programs, but that they don’t sufficiently understand or widely share the information they already possess that was derived from conventional law enforcement and intelligence techniques,” said the report, whose principal author is Peter Bergen, director of the foundation’s National Security Program and an expert on terrorism. In at least 48 instances, traditional surveillance warrants obtained from the Foreign Intelligence Surveillance Court were used to obtain evidence through intercepts of phone calls and e-mails, said the researchers, whose results are in an online database. More than half of the cases were initiated as a result of traditional investigative tools. The most common was a community or family tip to the authorities. Other methods included the use of informants, a suspiciousactivity report filed by a business or community member to the FBI, or information turned up in investigations of non-terrorism cases. But Richard Clarke, a member of the White House review panel and a former White House counterterrorism adviser, said he thinks the NSA can use traditional methods — such as obtaining a court order — to obtain data as part of counterterrorism investigations. “Although we might be safer if the government had ready access to a massive storehouse of information about every detail of our lives, the impact of such a program on the quality of life and on individual freedom would simply be too great,” the group’s report said. Said Clarke: “Even if NSA had solved every one of the [terrorist] cases based on” the phone collection, “we would still have proposed the changes.” Supporters of the NSA program said it’s important for the agency to maintain the database of phone records so that analysts can query it quickly. One phone company executive concurred that the private sector can’t “mine” records the same way as the NSA because their databases aren’t as comprehensive. “So if they call us at 3 o’clock in the morning and said, ‘We got a big issue and we need something in an hour,’ we couldn’t do that,” said the executive, who was not authorized to speak on the record and spoke on the condition of anonymity. “But if they say, ‘Give it to us in the next two weeks,’ yes, we could probably do that.” According to the New America Foundation, after the NSA shared Moalin’s number with the FBI, the bureau waited two months to begin an investigation and wiretap his phone. 1ar The NSA bulk data collection programs have not been as useful as the NSA says it would be in stopping terrorist attacks. Bergen et al 13 researchers for a think tank, the New America Foundation ’14 (Peter, David Sterman, Emily Schneider, Bailey Cahall, Peter Bergen is a director of national security at the New American Foundation and national security analyst for CNN, David Sterman and Emily Schneider are research assistants and Bailey Cahall is a research associate. “Do NSA's Bulk Surveillance Programs Stop Terrorists?“, New America Foundation, http://pierreghz.legtux.org/streisand/autoblogs/frglobalvoicesonlineorg_0e319138ab63237c2d2aeff84b4cb506d936eab8/media/e 1982452.Bergen_NAF_NSA20Surveillance_1_0.pdf, Pgs. 1-3,) On June 5, 2013, the Guardian broke the first story in what would become a flood of revelations regarding the extent and nature of the NSA’s surveillance programs.1 Facing an uproar over the threat such programs posed to privacy, the Obama administration scrambled to defend them as legal and essential to U.S. national security and counterterrorism. Two weeks after the first leaks by former NSA contractor Edward Snowden were published, President Obama defended the NSA surveillance programs during a visit to Berlin, saying: “We know of at least 50 threats that have been averted because of this information not just in the United States, but, in some cases, threats here in Germany. So lives have been saved.” Gen. Keith Alexander, the director of the NSA, testified before Congress that: “the information gathered from these programs provided the U.S. government with critical leads to help prevent over 50 potential terrorist events in more than 20 countries around the world.”3 Rep. Mike Rogers (RMich.), chairman of the House Permanent Select Committee on Intelligence, said on the House floor the government’s claims about the role that NSA “bulk” surveillance of phone and email communications records has had in keeping the United States safe from terrorism shows that these claims are overblown and even misleading. An in-depth in July that “54 times [the NSA programs] stopped and thwarted terrorist attacks both here and in Europe – saving real lives.” [However, our review of analysis of 225 individuals recruited by al-Qaeda or a like-minded group or inspired by al-Qaeda’s ideology, and charged in the United States with an act of terrorism since 9/11, demonstrates that traditional investigative methods, such as the use of informants, tips from local communities, and targeted intelligence operations, provided the initial impetus for investigations in the majority of cases, while the contribution of NSA’s bulk surveillance programs to these cases was minimal. Indeed, the controversial bulk collection of American telephone metadata, which includes the telephone numbers that originate and receive calls, as well as the time and date of those calls but not their content, under Section 215 of the USA PATRIOT Act, appears to have played an identifiable role in, at most, 1.8 percent of these cases. NSA programs involving the surveillance of non- U.S. persons outside of the United States under Section 702 of the FISA Amendments Act played a role in 4.4 percent of the terrorism cases we examined, and NSA surveillance under an unidentified authority played a role in 1.3 percent of the cases we examined.] Regular FISA warrants not issued in connection with Section 215 or Section 702, which are the traditional means for investigating foreign persons, were used in at least 48 (21 percent) of the cases we looked at, although it’s unclear whether these warrants played an initiating role or were used at a later point in the investigation. (Click on the link to go to a database of all 225 individuals, complete with additional details about them and the government’s investigations of these cases: http://natsec.newamerica.net/nsa/analysis). Surveillance of American phone metadata has had no discernible impact on preventing acts of terrorism and only the most marginal of impacts on preventing terrorist related activity, such as fundraising for a terrorist group. Furthermore, our examination of the role of the database of U.S. citizens’ telephone metadata in the single plot the government uses to justify the importance of the program – that of Basaaly Moalin, a San Diego cabdriver who in 2007 and 2008 provided $8,500 to al-Shabaab, al-Qaeda’s affiliate in Somalia – calls into question the necessity of the Section 215 bulk collection program. According to the government, the database of American phone metadata allows intelligence authorities to quickly circumvent the traditional burden of proof associated with criminal warrants, thus allowing them to “connect the dots” faster and prevent future 9/11-scale attacks. Yet in the Moalin case, after using the NSA’s phone database to link a number in Somalia to Moalin, the FBI waited two months to begin an investigation and wiretap his phone. Although it’s unclear why there was a delay between the NSA tip and the FBI wiretapping, court documents show there was a two-month period in which the FBI was not monitoring Moalin’s calls, despite official This undercuts the government’s theory that the database of Americans’ telephone metadata is necessary to expedite the investigative process, since it clearly didn’t expedite the process in the single case the government uses to extol its virtues. Additionally, a careful review of three of the key terrorism cases the government has cited to defend NSA bulk surveillance programs reveals that government officials have exaggerated the role of the NSA in the cases against David Coleman Headley and Najibullah Zazi, and the significance of the threat posed by statements that the bureau had Moalin’s phone number and had identified him. a notional plot to bomb the New York Stock Exchange. In 28 percent of the cases we reviewed, court records and public reporting do not identify which specific methods initiated the investigation. These cases, involving 62 individuals, may have been initiated by an undercover informant, an undercover officer, a family member tip, other traditional law enforcement methods, CIA- or FBI generated intelligence, NSA surveillance of some kind, or any number of other methods. In 23 of these 62 cases (37 percent), an informant was used. However, we were unable to determine whether the informant initiated the investigation or was used after the investigation was initiated as a result of the use of some other investigative means. Some of these cases may also be too recent to have developed a public record large enough to identify which investigative tools were used. We have also identified three additional plots that the government has not publicly claimed as NSA successes, but in which court records and public reporting suggest the NSA had a role. However, it is not clear whether any of those three cases involved bulk surveillance programs. Finally, the overall problem for U.S. counterterrorism officials is not that they need vaster amounts of information from the bulk surveillance programs, but that they don’t sufficiently understand or widely share the information they already possess that was derived from conventional law enforcement and intelligence techniques. This was true for two of the 9/11 hijackers who were known to be in the United States before the attacks on New York and Washington, as well as with the case of Chicago resident David Coleman Headley, who helped plan the 2008 terrorist attacks in Mumbai, and it is the unfortunate pattern we have also seen in several other significant terrorism cases. FAILED STATES TURN 2ac Failed states key to terrorism Piazza 08 (James A. Piazza is Associate Professor and Director of Graduate Studies at Penn State University, Ph.D., New York University. “Incubators of Terror: Do Failed and Failing States Promote Transnational Terrorism?” Published Aug 7, 2008. http://onlinelibrary.wiley.com/doi/10.1111/j.1468-2478.2008.00511.x/full#b17) But Hehir (2007) argues that this is only one possible dimension of state failure . In addition to “coercive incapacity,” failed states suffer from “administrative incapacity,” which involves a failure to provide the basic services that most citizens expect from modern governments, such as a minimal level of personal security, economic stability, and functioning bureaucratic and judicial institutions. Rotberg (2002) explains that failed states are unable to provide “political goods,” and describes a pattern of distinguishing features that failed states exhibit: government failure to maintain the essential wellbeing of their populations and/or governments that have begun to “prey upon their own citizens” through kleptocracy; a sustained degradation of the infrastructure necessary for citizens to maintain a “normal” life, resulting in substantial humanitarian crises and/or migration; widespread lawlessness to the point that criminal groups act with impunity or rival the authority of government actors; and a transference of some or many citizens’ loyalties to non-state actors in many parts of the country. First, because they lack the ability to project power internally and have incompetent and corrupt law enforcement capacities, failed and failing states provide opportunities, and lower costs, for terrorist groups to organize, train, generate revenue, and set up logistics and communications beyond those afforded by the network of safe houses in non-failed states .1 Terrorist groups can therefore develop their own capabilities with little governmental interference or scrutiny. This phenomenon is also referred to as the exploitation of “stateless areas,” or the use of actual, spatial regions of a country that are beyond the policing control of the central government and within which non-state actors can set up autonomous political, economic, and social institutions, or the segments of the polity of a country that are impenetrable by state power and provide networks of resistance to state authority. An example of the former would be the southern region of Afghanistan where the Taliban is active, and an example of the latter would be the system of radical “madrassas” or religious schools in Pakistan. The presence of stateless areas within states frees-up group resources otherwise allocated towards evading government agents and permit more extensive and aggressive fundraising, recruitment, and training efforts . Those groups with ambitions to launch transnational attacks, in particular have more extensive logistical and training needs and therefore need autonomous space without the costs of evading law enforcement. 1ar Failed states have lots of recruits for terror groups. Piazza 08 (James A. Piazza is Associate Professor and Director of Graduate Studies at Penn State University, Ph.D., New York University. “Incubators of Terror: Do Failed and Failing States Promote Transnational Terrorism?” Published Aug 7, 2008. http://onlinelibrary.wiley.com/doi/10.1111/j.1468-2478.2008.00511.x/full#b17) Second, failed states offer terrorist groups a larger pool of potential recruits because they contain large numbers of insecure, disaffected, alienated, and disloyal citizens for whom political violence is an accepted avenue of behavior .2 Failed states are chronically unable to provide basic security and economic sustenance to their citizens, and thereby give rise to what Ehrlich and Liu (2002) and O’Neil (2002) identify as a key contributing factor to the growth of terrorism—“basic human insecurity.” Also, Gunaratna (2002) argues that poor governance, poor economic development, corruption, and lack of human rights—all hallmarks of failed states—sharpen the appeal of fanaticism, and by extension terrorism, among potential political actors. Failed states, through their incompetence, create “political goods vacuums” into which terrorist groups can step and parcel out personal security, economic assistance, or other services to win the support of the local population and widen their activities.3 Failed states have high levels of corruption within the governments Piazza 08 (James A. Piazza is Associate Professor and Director of Graduate Studies at Penn State University, Ph.D., New York University. “Incubators of Terror: Do Failed and Failing States Promote Transnational Terrorism?” Published Aug 7, 2008. http://onlinelibrary.wiley.com/doi/10.1111/j.1468-2478.2008.00511.x/full#b17) Finally, as recognized states in the international system, failed states retain the “outward signs of sovereignty” (Takeyh and Gvosdev 2002, 100). This helps to promote transnational terrorist groups in two ways. First, the principle of state sovereignty places legal limits on intervention by other states, thereby shielding terrorists from the military and law enforcement capacity of outside countries targeted by or interested in addressing terrorism. Second, failed states are sovereign and legally recognized states, and so their government officials, who are often underpaid, poorly trained and monitored, and are therefore highly corruptible, can provide terrorists with access to legal documentation, such as passports, visas and end-user certificates to import and export arms, in exchange for money, political support, or physical protection. Failed states are the root cause of terrorism Rotberg 02 (Robert I. Rotberg is Director of the Program on Intrastate Conflict at Harvard University's John F. Kennedy School of Government and President of the World Peace Foundation. “Failed States in a World of Terror” Published: July/August 2002, Foreign Affairs Magazine https://www.foreignaffairs.com/articles/2002-07-01/failed-states-world-terror) Although the phenomenon of state failure is not new, it has become much more relevant and worrying than ever before. In less interconnected eras, state weakness could be isolated and kept distant. Failure had fewer implications for peace and security. Now, these states pose dangers not only to themselves and their neighbors but also to peoples around the globe. Preventing states from failing, and resuscitating those that do fail, are thus strategic and moral imperatives. But failed states are not homogeneous. The nature of state failure varies from place to place, sometimes dramatically. Failure and weakness can flow from a nation's geographical, physical, historical, and political circumstances, such as colonial errors and Cold War policy mistakes. More than structural or institutional weaknesses, human agency is also culpable, usually in a fatal way. Destructive decisions by individual leaders have almost always paved the way to state failure. President Mobutu Sese Seko's three-plus decades of kleptocratic rule sucked Zaire (now the Democratic Republic of Congo, or DRC) dry until he was deposed in 1997. In Sierra Leone, President Siaka Stevens (1967-85) systematically plundered his tiny country and instrumentalized disorder. President Mohamed Siad Barre (1969-91) did the same in Somalia. These rulers were personally greedy, but as predatory patrimonialists they also licensed and sponsored the avarice of others, thus preordaining the destruction of their states. Today's failed states, such as Afghanistan, Sierra Leone, and Somalia, are incapable of projecting power and asserting authority within their own borders, leaving their territories governmentally empty. This outcome is troubling to world order, especially to an international system that demands -- indeed, counts on -- a state's capacity to govern its space. Failed states have come to be feared as "breeding grounds of instability, mass migration, and murder" (in the words of political scientist Stephen Walt), as well as reservoirs and exporters of terror. The existence of these kinds of countries, and the instability that they harbor, not only threatens the lives and livelihoods of their own peoples but endangers world peace. Failed states have no ability to monitor insurgents within their own borders. Krasner and Pascual 05 (Stephen Krasner is an international relations professor at Stanford University and is a former Director of Policy Planning at the United States Department of State and Carlos Pascual is the State Department's Coordinator for Reconstruction and Stabilization. He previously served as U.S. Ambassador to Ukraine. “Addressing State Failure” Published: July/August 2005, https://www.foreignaffairs.com/articles/2005-07-01/addressing-state-failure) Further complicating matters, modern conflicts are far more likely to be internal, civil matters than to be clashes between opposing countries. "State death" as a result of external invasion, common before World War II, has almost disappeared since 1945. The lack of good governance in weak states means they often do not have the ability to deal with disaffected or criminal groups within their own borders. Recent scholarship suggests that civil strife is no more likely in ethnically or religiously divided countries than it is in homogeneous ones. Internal discord is more likely to arise in countries suffering from poverty, a highly unequal income distribution, recent decolonization, weak institutions, ineffective police and counterinsurgency forces, and difficult terrain -- conditions that allow small guerrilla bands to thrive. Valuable raw materials, such as diamonds or oil, also tend to spark conflict among competitors who want to seize control of the wealth. Warring groups generally have easy access to weapons and may even control territory, giving them a base for launching attacks on the state, its citizens, or its neighbors. Other nonstate actors, including transnational terrorist organizations, can also take root in such environments, posing a threat to global security. EUROPE COOP TURN 2ac NSA overreach hurts US-EU terror cooperation Mix 15 (Derek E. , Analyst in European Affairs “The United States and Europe: Current Issues,” https://www.fas.org/sgp/crs/row/RS22163.pdf , February 3) In 2013, press reports began surfacing about U.S. National Security Agency (NSA) surveillance programs in the United States and Europe created tensions in the transatlantic relationship. Among other allegations, the reports asserted that objects of U.S. spying included the EU offices in Washington, DC and the cell phone of German Chancellor Angela Merkel. The information was based on leaked, classified documents obtained from Edward Snowden, a former NSA contractor; and focused on operations allegedly conducted by the NSA and the UK’s Government Communications Headquarters (the UK’s signals intelligence agency). The reports raised serious concerns on both sides of the Atlantic about the extent of U.S. surveillance operations, the degree of involvement by European intelligence services, and the appropriate balance between promoting security and upholding privacy rights and civil liberties. Some observers worry that the allegations have resulted in lasting damage to transatlantic trust, negatively affecting U.S.-European political, security, and economic ties. Many European leaders, EU officials, and European citizens were deeply dismayed by the reports and concerned that such operations could violate European privacy rights and civil liberties and compromise the security of European citizens’ personal data. Criticism has been most pronounced in Germany, where disclosed NSA activities appear to have been broad in scope and the issue of government surveillance of private citizens evokes particularly strong feelings due to the legacy of domestic spying by the Nazi and East German regimes. Many analysts point out that the fallout from the reports could have implications for U.S.- European cooperation on counterterrorism and data privacy by complicating negotiations about renewal of the SWIFT and passenger name record (PNR) agreements (in 2015 and 2019, respectively), as well as the proposed Data Privacy and Protection Agreement. In the European Parliament, the reports exacerbated long-standing objections to the SWIFT and PNR agreements and intensified MEPs’ concerns about U.S. data protection safeguards and access to European citizens’ personal data . In the aftermath of the reports, the European Parliament called for 17 suspension of the U.S.-EU Safe Harbor agreement that allows commercial data exchanges, and there have been suggestions that the purported U.S. surveillance activities may have a wider effect on economic relations, including with regard to negotiations on the proposed TTIP. 1ar- aff solves coop Europe specifically hates surveillance of information held by US companies- the aff solves their concerns Moyer 13 (Edward, Edward Moyer is an associate editor at CNET News and a many-year veteran of the writing and editing world “Eye on surveillance: France's PRISM, EU's concerns,” Eye on surveillance: France's PRISM, EU's concerns July 4) Valls isn't the only European concerned about the U.S. National Security Agency: The European Parliament has adopted a joint, cross-party resolution to begin investigations into widespread NSA surveillance of the citizens of member states. As Zack Whittaker at CNET sister site ZDNet reports, the vote calls on the U.S. "to suspend and review any laws and surveillance programs that 'violate the fundamental right of EU citizens to privacy and data protection,' as well as Europe's 'sovereignty and jurisdiction'." The resolution also gives the European Commission the go-ahead to suspend data-sharing laws between Europe and the U.S., should the commission decide[d] to. The resolution says the EC should "give consideration to all the instruments at their disposal in discussions and negotiations with the U.S...including the possible suspension of the passenger name record (PNR) and terrorist finance tracking program (TFTP) agreements. " If the PNR were put on ice, flights between the U.S. and Europe could conceivably be grounded. The vote also notes "concern" over PRISM surveillance programs involving EU countries including Germany, the Netherlands, Poland, and Sweden. And it gives the European Parliament's Civil Liberties, Justice and Home Affairs committee the greenlight to start gathering evidence from U.S. and EU sources on how surveillance activities might violate EU citizens' rights to privacy and data protection. The committee plans to deliver its conclusions by the end of the year. In other Europe-related news, the Guardian cited a German government spokesman in reporting that "a working group of high-level U.S. and German intelligence experts will begin 'an immediate and intense discussion' over the issues of data protection and intelligence collection" to address mounting European concerns that are "threatening to overshadow trade negotiations and damage Silicon Valley exports." Those talks could begin as soon as Monday. Also, EC Vice President Neelie Kroes said in a statement after the meeting of the European Cloud Partnership Board that though "cloud computing helps us benefit from the data revolution and is a gift to our economy," questions surrounding surveillance efforts are a problem. "If European cloud customers cannot trust the United States government or their assurances [regarding surveillance efforts], then maybe they won't trust U.S. cloud providers either. That is my guess. And if I am right then there are multibillion euro consequences for American companies." "We need trust," Kroes said. "In some cases, of course, it may be legitimate for authorities to access, to some degree, information held online; child protection and terrorism are good examples. Such access must be based on transparent rule of law, and is the exception to the rule." Is all this world-shaking cloak-and-dagger business beginning to sound like fodder for a Hollywood-style film? Well, a group of Hong Kong-based indie filmmakers have already been there, done that -- sort of. The Wall Street Journal's Speakeasy blog recently noted the posting to YouTube of the 5-minute short "Verax," which imagines what might have happened as U.S. and Chinese intelligence officers raced to find PRISM leaker Edward Snowden as he hid out in Hong Kong. Co-creator Marcus Tsui described the effort to Speakeasy as "a snapshot in time," as residents of the city speculated about the fate of Snowden, who was eventually allowed to leave the city because a U.S. extradition request did not fully comply with Hong Kong law. Snowden has reportedly filed for political asylum in 20 countries but is still apparently holed up in the transit section of Russia's Sheremetyevo airport. And Mashable reported today that members of Iceland's Pirate Party introduced a bill that would give Snowden Icelandic citizenship, should he end up in that country. The film's title, "Verax" ("truth teller" in Latin), refers to the code-name Snowden used when dealing with The Washington Post, to which, along with the U.K.'s Guardian, he leaked top-secret documents regarding NSA spying programs. Here's the film. We imagine someone will make a feature length movie about the Snowden saga one of these days. Regulation of domestic surveillance is sufficient to solve- it’s key to compliance with international agreements PROFFITT 13 (BRIAN , Brian Proffitt is a technology expert specializing in enterprise, cloud computing and big data with 23 years of journalism and publishing experience. He is the author of 24 books on mobile technology and personal computing and an adjunct instructor at top-ranked Mendoza College of Business at the University of Notre Dame. Breathing is a hobby. “PRISM Fallout: U.S. Internet Companies Stained By Intelligence Actions Is the cloud about to be geo-fenced into Balkanized collections of data thanks to PRISM? ,” http://readwrite.com/2013/07/03/prism-fallout-usinternet-companies-stained-by-intelligence-actions, JUL 3) It was bound to happen sooner or later: faced with mounting global criticism on its use of Internet data to monitor international denizens for intelligence reasons, the U.S. is now starting right up there with China as safest places to store data on the Web. If trust in U.S. web and data services continues to erode, the future of global cloud computing will be a much different place than what is currently envisioned. The AP is reporting today that German Interior Minister Hans-Peter Friedrich is warning anyone on the Internet to avoid using U.S.-based services such as those from Facebook, Google or Microsoft. … Friedrich told reporters in Berlin on Wednesday that "whoever fears their communication is being intercepted in any way should use services that don't go through American servers ." Germany is only one of several nations that are particularly angered by revelations that the U.S. apparently is engaging in wide-scale intelligence gathering using data collected directly from private Internet firms via the so-called PRISM project. If the allegations implied by the leaked PRISM documents are true, then PRISM would seriously jeopardize business relations between the U.S. and other countries. The European Union may be the first relationship to get damaged. See also: PRISM Fallout: In Cloud We Don't Trust? In order to comply with strict E.U. data laws, which essentially prevent data being stored outside an E.U. member nation's borders, the E.U. and the U.S. have established a Safe Harbor agreement that enables data to be stored in U.S.-based cloud services so long as the U.S. service providers self-regulate themselves to maintain strict standards of privacy protections. Recent assertions show that U.S. intelligence services may actually have on-site equipment on PRISM participants' property, despite repeated denials from those services, which also include Yahoo, PalTalk, AOL, Skype, YouTube and Apple. If the information from the leaked PRISM documents is true, this is a serious breach of their Safe Harbor agreement. Even if PRISM turns out to be fictitious, just the hint that something like PRISM could exist could evaporate a large amount of trust and business for U.S. cloud vendors—even ones not named in the PRISM documents. Friedrich's comments today are a sharp reminder of just how fast the relationship between E.U. and U.S. companies could deteriorate Bound by law not to discuss what they are doing to help intelligence services, the named PRISM companies and services are facing a P.R. nightmare, where all they can do is deny and hope the problem goes away. International policy makers are growing increasingly angered at what they see as U.S. arrogance . (Yesterday's search of Bolivian President Evo Morales's plane by Austrian authorities in Vienna for Edward Snowden, the self-identified leaker of the PRISM documents, probably does not help that perception.) We may very well be heading for a new geo-fenced world of data isolationism, where the storage of data across international borders will not be so commonplace as it is today. If that becomes the case, how will the Internet landscape work then? Will apps that sell on an international scale be forced to maintain separate Balkanized data collections for each nation served? Or will any Internet-based company now be forced to lock down their data in direct defiance of state-sanctioned data collection operations? Neither choice seems palatable, but to regain the trust and business of a global audience, the U.S. may have to take such drastic measures. What's your picture of a post-PRISM Internet future? The perception of restoring oversight is key to solve European concerns Lister 13 (Tim, CNN, 10-25-2013, "Europe falls out of love with Obama over NSA spying claims," CNN, http://www.cnn.com/2013/10/24/world/europe/europe-us-surveillance/) On July 24, 2008, then-presidential candidate Barack Obama addressed tens of thousands of Germans on the avenue that leads from the Brandenburg Gate in Berlin. In a pointed reference to the outgoing administration of President George W. Bush, he promised a new era of "allies who will listen to each other, who will learn from each other, who will, above all, trust each other." One German present among the hugely enthusiastic crowd said the occasion reminded him of Berlin's famous "Love Parade." No U.S. politician since John F. Kennedy had so captured Europeans' imagination. Five years on, in the words of the song, it's a case of "After the Love Has Gone." The U.S. ambassador in Berlin has been summoned to the foreign ministry over reports in Der Spiegel that the U.S. National Security Administration (NSA) monitored Chancellor Angela Merkel's official cellphone. His counterpart in Paris received a similar summons earlier this week after revelations in Le Monde. Merkel says Europe's trust must be repaired after U.S. spying claims Both Der Spiegel and Le Monde used documents provided by former NSA contractor Edward Snowden. U.S. denies report it spied on Merkel. One of Chancellor Merkel's closest allies, Defense Minister Thomas de Maiziere told broadcaster ARD there would be consequences. "We can't simply turn the page," he warned. Der Spiegel reported Thursday that Thomas Oppermann, who leads the parliamentary committee that scrutinizes Germany's intelligence services, complained that "the NSA's monitoring activities have gotten completely out of hand, and take place beyond all democratic controls ." In an article for the forthcoming edition of Foreign Affairs magazine, Henry Farrell and Martha Finnemore argue that it's the disclosure of such practices rather than their existence that is damaging . "When these deeds turn out to clash with the government's public rhetoric, as they so often do, it becomes harder for U.S. allies to overlook Washington's covert behavior and easier for U.S. adversaries to justify their own," they write. "The U.S. government, its friends, and its foes can no longer plausibly deny the dark side of U.S. foreign policy and will have to address it head-on," they argue. Among the Twitterati, #merkelphone has gained some traction, with the famous Obama motif "Yes We Can" finding a new interpretation. And the European media has begun to debate whether the revelations provided by Edward Snowden to The Guardian and other newspapers will do to Obama's image on the continent what the Iraq war did to that of President George W. Bush. Hyperbole perhaps, but the Obama administration is on the defensive, caught between fuller disclosure of just what the NSA has been up to and the need to protect intelligence-gathering methods. The president himself received what German officials describe as an angry call from Merkel Wednesday demanding assurances that there is no American eavesdropping on her conversations. The language out of the White House has been less than forthright, with spokesman Jay Carney saying that "the president assured the chancellor that the United States is not monitoring, and will not monitor, the communications of the chancellor." His careful avoidance of the past tense has heightened suspicions in Europe that only the Snowden disclosures have forced a change of practice. Even pro-U.S. newspapers like the Frankfurter Allgemeine Zeitung are in full throttle, writing that: "The government in Washington has apparently not yet understood the level of damage that continues to be caused by the activities of American intelligence agencies in Europe." Le Monde reported that the NSA collected details of millions of phone calls made in France, and described it indignantly as "intrusion, on a vast scale, both into the private space of French citizens as well as into the secrets of major national firms." French Prime Minister Jean-Marc Ayrault commented it was "incredible that an allied country like the United States at this point goes as far as spying on private communications that have no strategic justification, no justification on the basis of national defense." The U.S. Director of National Intelligence insisted in a curt statement that "the allegation that the National Security Agency collected more than 70 million "recordings of French citizens' telephone data" is false." But President Obama called his French counterpart, Hollande, and the White House subsequently acknowledged the allegations had raised "legitimate questions for our friends and allies." The fall-out may be more than rhetorical. Germany's opposition Social Democrats are asking whether the European Union can -- or should -- agree a free trade deal with the U.S. in the current atmosphere. Negotiations on the Transatlantic Trade and Investment Partnership were already in a fragile state and will not be helped by claims in Le Monde that large French corporations such as telecom company Alcatel-Lucent have been targeted by the NSA. The European parliament has always been prickly about data-sharing with the U.S., and for years held up the U.S. Treasury's efforts to use the SWIFT interbank apparatus to keep tabs on terrorists' financial flows. The parliament this week passed a non-binding resolution calling for the agreement that was eventually reached to be suspended . And a parliamentary committee has agreed tough measures that would forbid U.S. companies providing data services in Europe to transfer the information to the U.S. without obtaining permission. The legislation must be agreed with member states, but for those hoping to get the provision deleted the wind is blowing in the wrong direction. Not unlike the WikiLeaks disclosures, reports based on the Snowden documents have caused embarrassment and friction around the world. President Dilma Rousseff of Brazil cancelled a visit to the United States after it was alleged that the NSA had intercepted her messages as well as communications from the state oil company, Petrobras, now one of the biggest players in the oil industry. Spiegel reported the U.S. had also accessed emails to and from former Mexican President Felipe Calderón while he was still in office. Obama, in his address to the U.N. General Assembly last month, tried to head off the gathering storm - saying: "We've begun to review the way that we gather intelligence, so that we properly balance the legitimate security concerns of our citizens and allies with the privacy concerns that all people share." U.S. spy chief says reports of NSA logging French phone calls are false And there is a hint in the U.S. response this week that, to borrow from Hamlet: "The lady doth protest too much." The NSA itself has made the point that "the United States gathers foreign intelligence of the type gathered by all nations." The UK and France are among governments that run their own expansive technical programs. Der Spiegel reported -- again based on Snowden's disclosures -- that the British equivalent of the NSA was involved in a cyber-attack against Belgium's state-run telecommunications company, Belgacom. The company would only say that "the intruder had massive resources, sophisticated means and a steadfast intent to break into our network." The Europeans have been very grateful to share the benefits of the NSA's immense data-gathering abilities in counter-terrorism and other fields. U.S. diplomatic cables disclosed by WikiLeaks show Germany was enthusiastic in 2009 and 2010 for closer links with the NSA to develop what is known as a High Resolution Optical System (HiROS) -- a highly advanced "constellation" of reconnaissance satellites. One cable from the U.S. Embassy in Berlin said: "Germany anticipates that their emergence as a world leader in overhead reconnaissance will generate interest from the USG and envisions an expansion of the intelligence relationship." The 9/11 attacks changed espionage beyond recognition, leading to massive investment in the U.S. in "technical means" -- the flagship of which is the enormous NSA data center being completed in Bluffdale, Utah. Its computing power, according to the specialist online publication govtech.com is "equivalent to the capacity of 62 billion iPhone 5s." But 9/11 also shifted the balance between intelligence-gathering and civil liberties, with the U.S. federal government acquiring new powers in the fight against terrorism -- some sanctioned by Congress but others ill-defined. The technology that allows such enormous data-harvesting cannot be put back in the box, but the limits to its use pose an equally huge challenge. Ultimately, the Europeans need to collaborate with the U.S. on intelligence-gathering, to deal with international terrorism, cyber threats and organized crime. But the Snowden allegations, whether reported accurately or not, have changed the public perception and mood in Europe, obliging leaders like Merkel to take a tougher stand. At least there has been plenty of room for black humor amid the diplomatic back-and-forth. "Earnest question: What do European leaders talk about that's worth spying on?" asked Politico's Blake Hounshell on Twitter, while New York Times London bureau chief Steve Erlanger quipped: "I'm not sure I'd want to listen in to Silvio Berlusconi's cellphone." NSA surveillance hurts EU-US cooperation Ball 13 (James, special projects editor, The Guardian. 10/25. www.theguardian.com/world/2013/oct/24/nsa-surveillance-worldleaders-calls) The National Security Agency monitored the phone conversations of 35 world leaders after being given the numbers by an official in another US government department, according to a classified document provided by whistleblower Edward Snowden. The confidential memo reveals that the NSA encourages senior officials in its "customer" departments, such the White House, State and the Pentagon, to share their "Rolodexes" so the agency can add the phone numbers of leading foreign politicians to their surveillance systems. The document notes that one unnamed US official handed over 200 numbers, including those of the 35 world leaders, none of whom is named. These were immediately "tasked" for monitoring by the NSA. The revelation is set to add to mounting diplomatic tensions between the US and its allies, after the German chancellor Angela Merkel on Wednesday accused the US of tapping her mobile phone. After Merkel's allegations became public, White House press secretary Jay Carney issued a statement that said the US "is not monitoring and will not monitor" the German chancellor's communications. But that failed to quell the row, as officials in Berlin quickly pointed out that the US did not deny monitoring the phone in the past. Arriving in Brussels for an EU summit Merkel accused the US of a breach of trust. "We need to have trust in our allies and partners, and this must now be established once again. I repeat that spying among friends is not at all acceptable against anyone, and that goes for every citizen in Germany." The NSA memo obtained by the Guardian suggests that such surveillance was not isolated, as the agency routinely monitors the phone numbers of world leaders – and even asks for the assistance of other US officials to do so. The memo, dated October 2006 and which was issued to staff in the agency's Signals Intelligence Directorate (SID), was titled "Customers Can Help SID Obtain Targetable Phone Numbers". It begins by setting out an example of how US officials who mixed with world leaders and politicians could help agency surveillance. "In one recent case," the memo notes, "a US official provided NSA with 200 phone numbers to 35 world leaders … Despite the fact that the majority is probably available via open source, the PCs [intelligence production centers] have noted 43 previously unknown phone numbers. These numbers plus several others have been tasked." The document continues by saying the new phone numbers had helped the agency discover still more new contact details to add to their monitoring: "These numbers have provided lead information to other numbers that have subsequently been tasked." But the memo acknowledges that eavesdropping on the numbers had produced "little reportable intelligence". In the wake of the Merkel row, the US is facing growing international criticism that any intelligence benefit from spying on friendly governments is far outweighed by the potential diplomatic damage. The memo then asks analysts to think about any customers they currently serve who might similarly be happy to turn over details of their contacts. "This success leads S2 [signals intelligence] to wonder if there are NSA liaisons whose supported customers may be willing to share their 'Rolodexes' or phone lists with NSA as potential sources of intelligence," it states. "S2 welcomes such information!" The document suggests that sometimes these offers come unsolicited, with US "customers" spontaneously offering the agency access to their overseas networks. "From time to time, SID is offered access to the personal contact databases of US officials," it states. "Such 'Rolodexes' may contain contact information for foreign political or military leaders, to include direct line, fax, residence and cellular numbers." The Guardian approached the Obama administration for comment on the latest document. Officials declined to respond directly to the new material, instead referring to comments delivered by Carney at Thursday's daily briefing. Carney told reporters: "The [NSA] revelations have clearly caused tension in our relationships with some countries, and we are dealing with that through diplomatic channels. "These are very important relations both economically and for our security, and we will work to maintain the closest possible ties." The public accusation of spying on Merkel adds to mounting political tensions in Europe about the scope of US surveillance on the governments of its allies, after a cascade of backlashes and apologetic phone calls with leaders across the continent over the course of the week. Asked on Wednesday evening if the NSA had in the past tracked the German chancellor's communications, Caitlin Hayden, the White House's National Security Council spokeswoman, said: "The United States is not monitoring and will not monitor the communications of Chancellor Merkel. Beyond that, I'm not in a position to comment publicly on every specific alleged intelligence activity." At the daily briefing on Thursday, Carney again refused to answer repeated questions about whether the US had spied on Merkel's calls in the past. The NSA memo seen by the Guardian was written halfway through George W Bush's second term, when Condoleezza Rice was secretary of state and Donald Rumsfeld was in his final months as defence secretary. Merkel, who, according to Reuters, suspected the surveillance after finding her mobile phone number written on a US document, is said to have called for US surveillance to be placed on a new legal footing during a phone call to President Obama. "The [German] federal government, as a close ally and partner of the US, expects in the future a clear contractual basis for the activity of the services and their co-operation," she told the president. The leader of Germany's Green party, Katrin Goring-Eckhart, called the alleged spying an "unprecedented breach of trust" between the two countries. Earlier in the week, Obama called the French president François Hollande in response to reports in Le Monde that the NSA accessed more than 70m phone records of French citizens in a single 30-day period, while earlier reports in Der Spiegel uncovered NSA activity against the offices and communications of senior officials of the European Union. The European Commission, the executive body of the EU, this week backed proposals that could require US tech companies to seek permission before handing over EU citizens' data to US intelligence agencies, while the European parliament voted in favour of suspending a transatlantic bank data sharing agreement after Der Spiegel revealed the agency was monitoring the international bank transfer system Swift. 1ar- coop key to terror NSA overreach undermines counter-terror operations- international cooperation is key Riechmann 13 (Deb, journalist for the Associated Press. "NSA Spying Threatens U.S. Foreign Policy Efforts" www.huffingtonpost.com/2013/10/26/nsa-spying-foreign-policy_n_4166076.html) Secretary of State John Kerry went to Europe to talk about Mideast peace, Syria and Iran. What he got was an earful of outrage over U.S. snooping abroad. President Barack Obama has defended America's surveillance dragnet to leaders of Russia, Mexico, Brazil, France and Germany, but the international anger over the disclosures shows no signs of abating in the short run. Longer term, the revelations by former National Security Agency contractor Edward Snowden about NSA tactics that allegedly include tapping the cellphones of as many as 35 world leaders threaten to undermine U.S. foreign policy in a range of areas. This vacuum-cleaner approach to data collection has rattled allies. "The magnitude of the eavesdropping is what shocked us," former French Foreign Minister Bernard Kouchner said in a radio interview. "Let's be honest, we eavesdrop too. Everyone is listening to everyone else. But we don't have the same means as the United States, which makes us jealous." So where in the world isn't the NSA? That's one big question raised by the disclosures. Whether the tapping of allies is a step too far might be moot. The British ambassador to Lebanon, Tom Fletcher, tweeted this past week: "I work on assumption that 6+ countries tap my phone. Increasingly rare that diplomats say anything sensitive on calls." Diplomatic relations are built on trust. If America's credibility is in question, the U.S. will find it harder to maintain alliances, influence world opinion and maybe even close trade deals. Spying among allies is not new. Madeleine Albright, secretary of state during the Clinton administration, recalled being at the United Nations and having the French ambassador ask her why she said something in a private conversation apparently intercepted by the French. The French government protested revelations this past week that the NSA had collected 70.3 million French-based telephone and electronic message records in a 30-day period. Albright says Snowden's disclosures have hurt U.S. policymakers. "A lot of the things that have come out, I think are specifically damaging because they are negotiating positions and a variety of ways that we have to go about business," Albright said at a conference hosted by the Center for American Progress in Washington. "I think it has made life very difficult for Secretary Kerry. ... There has to be a set of private talks that, in fact, precede negotiations and I think it makes it very, very hard." The spy flap could give the Europeans leverage in talks with the U.S. on a free trade agreement, which would join together nearly half of the global economy. "If we go to the negotiations and we have the feeling those people with whom we negotiate know everything that we want to deal with in advance, how can we trust each other?" asked Martin Schulz, president of the European Parliament. Claude Moniquet, a former French counterintelligence officer and now director of Brussels-based European Strategic Intelligence and Security Center, said the controversy came at a good time for Europe "to have a lever, a means of pressure ... in these negotiations." To Henry Farrell and Martha Finnemore at George Washington University, damage from the NSA disclosures could "undermine Washington's ability to act hypocritically and get away with it." The danger in the disclosures "lies not in the new information that they reveal but in the documented confirmation they provide of what the United States is actually doing and why," they wrote in Foreign Affairs. "When these deeds turn out to clash with the government's public rhetoric, as they so often do, it becomes harder for U.S. allies to overlook Washington's covert behavior and easier for U.S. adversaries to justify their own." They claim the disclosures forced Washington to abandon its "naming-and-shaming campaign against Chinese hacking." The revelations could undercut Washington's effort to fight terrorism, says Kiron Skinner, director of the Center for International Relations and Politics at Carnegie Mellon University. The broad nature of NSA surveillance goes against the Obama administration's claim that much of U.S. espionage is carried out to combat terrorism, she said. "If Washington undermines its own leadership or that of its allies, the collective ability of the West to combat terrorism will be compromised," Skinner said. "Allied leaders will have no incentive to put their own militaries at risk if they cannot trust U.S. leadership." The administration asserts that the U.S. is amassing intelligence of the type gathered by all nations and that it's necessary to protect the U.S. and its allies against security threats. Kerry discussed the NSA affair in Europe with French and Italian officials this past week. Most governments have not retaliated, but some countries are pushing back. Germany and France are demanding that the administration agree by year's end to new rules that could mean an end to reported American eavesdropping on foreign leaders, companies and innocent citizens. Brazilian President Dilma Rousseff canceled her official state visit to the White House. She ordered measures aimed at greater Brazilian online independence and security after learning that the NSA intercepted her communications, hacked into the state-owned Petrobras oil company's network and spied on Brazilians. Brazil says it is working with other countries to draft a U.N. General Assembly resolution that would guarantee people's privacy in electronic communications. A European Parliament committee approved rules that would strengthen online privacy and outlaw the kind of data transfers the U.S. is using for its spying program. European lawmakers have called for the suspension of an agreement that grants U.S. authorities access to bank data needed for terrorism-related investigations. "We need trust among allies and partners," said German Chancellor Angela Merkel, whose cellphone was allegedly tapped by the NSA. "Such trust now has to be built anew." U.S. – E.U. cooperation key for counter-terrorism Mix 15 (Derek E. , Analyst in European Affairs “The United States and Europe: Current Issues,” https://www.fas.org/sgp/crs/row/RS22163.pdf , February 3) The United States and European countries have been cooperating in efforts to counter the Islamic State and seek a political solution to the conflict in Syria. Recent estimates suggest that upward of 3,000 European citizens have traveled to Syria and Iraq to join groups involved in the conflict, and the potential threat posed by returning “foreign fighters” has become a central concern. U.S.-EU counterterrorism cooperation has been strong since 9/11, although differences regarding data privacy have posed some key information-sharing challenges. The United States and Europe remain central actors in negotiations seeking to reach an agreement that ensures that Iran’s nuclear program can be used solely for peaceful purposes. While an extensive array of U.S. and EU sanctions have worked to isolate and pressure Iran, the final outcome of talks remains uncertain. • The United States and EU share broad objectives with regard to resolving the IsraeliPalestinian conflict. Increased European support for recognizing Palestinian statehood, however, has diverged from the approach taken by the United States and strained Europe’s relationship with Israel. • The United States and the EU have the largest trade and investment relationship in the world. The two sides have been negotiating a free trade agreement, the Transatlantic Trade and Investment Partnership (TTIP) aimed at boosting jobs and growth on both sides, but obstacles could make it difficult to conclude a deal by the end of 2015. While the conditions that fueled the Eurozone crisis from 2010-2012 appear to have stabilized, there is considerable doubt that underlying economic problems in Europe have been fully resolved. • Allegations of U.S. spying and surveillance programs in Europe have caused a sharp backlash and damaged transatlantic trust. Although tensions appear to have proven manageable and U.S. intelligence cooperation with European governments continues, data privacy concerns could complicate future talks on U.S.-EU information-sharing agreements. The United States takes over the chairmanship of the Arctic Council in May 2015. The Artic is increasingly viewed as a region of potential economic and geopolitical importance. As the United States and Europe face a changing geopolitical environment, some observers assert that the global influence of the Euro-Atlantic partnership is in decline. In addition, the Obama Administration’s announced intention of “rebalancing” U.S. foreign policy toward Asia has caused some anxiety among Europeans. Overall, however, most analysts maintain that the United States and Europe are likely to remain one another’s closest partner, and that U.S.-European cooperation is likely to remain the foundation of international action on a wide range of critical issues. US-EU cooperation is key to stopping terror Mix, 2015 (Derek E. , Analyst in European Affairs “The United States and Europe: Current Issues,” https://www.fas.org/sgp/crs/row/RS22163.pdf , February 3) Overall, in the years since the 9/11 attacks, transatlantic cooperation on counterterrorism has been strong. U.S. and European officials from the cabinet level down maintain regular dialogues on issues related to homeland security and counterterrorism . In 2010, new U.S.-EU treaties on extradition and mutual legal assistance entered into force. The United States and the EU have also reached agreements on container security and sharing airline passenger data as part of their efforts to strengthen aviation, transport, and border security. In addition, the United States and the EU actively work together to track and counter the financing of terrorism, in forums such as the Financial Action Task Force and through information sharing deals such as the U.S.-EU “SWIFT agreement,” which allows U.S. authorities access to financial data held by a Belgium-based consortium of international banks as part of the U.S. Treasury Department’s Terrorist Finance Tracking Program (TFTP). While the EU has been increasing its relevance in this area, bilateral intelligence sharing and law enforcement cooperation between the United States and individual European countries also remains key to disrupting terrorist plots and apprehending those involved . Although overall counterterrorism cooperation is strong, areas of tension exist. European policy makers have had significant concerns over the adequacy of data privacy safeguards in a number of U.S.-EU information-sharing arrangements. The EU considers data privacy a basic right and has strict regulations protecting personal data. During the past several years, objections raised in the European Parliament complicated and delayed the adoption of the most recent version of the SWIFT deal and the agreement on sharing airline passenger name record (PNR) data. The United States and the EU have been negotiating a framework Data Privacy and Protection Agreement (DPPA) since 2011. Over the past decade, the United States and the EU have largely aligned their lists of entities designated as terrorist organizations. In July 2013, the EU added Hezbollah’s military wing to its terrorist list, a move welcomed as a positive step by U.S. officials. Successive U.S. Administrations and many Members of Congress have long urged the EU to include Hezbollah on its common terrorist list. Critics contend, however, that listing only Hezbollah’s military wing is insufficient because Hezbollah is still allowed to fundraise in Europe and there is no meaningful distinction between Hezbollah’s political and military wings. In December 2014, the General Court of the European Union ruled that Hamas should be removed from the EU’s common list of designated terrorist organizations on procedural grounds related to the decision-making process used in adding the group to the list over a decade ago. The EU External Action Service responded that the ruling was not a political or substantive decision made by EU governments, and that restrictive measures against Hamas will remain in place as an appeal process goes forward. The United States and Israel both urged the EU to maintain its sanctions against Hamas. 1ar- Germany module Regulations of domestic surveillance key to US-German cooperation Pangburn 13 (DJ, A contributor for NY Times, Vice, and others. He has a BS in Political science “Surveillance for All: Foreign Governments' Responses to the PRISM Scandal Are Telling,” http://motherboard.vice.com/blog/surveillance-for-all-foreigngovernments-responses-to-the-prism-scandal-are-enlightening , , June 20) One other thing to keep in mind when looking at the various international responses to the NSA program is that each country's political leaders will have a different response to the revelations. Support or opposition sometimes falls along party lines—those who are currently in power, and those seeking to upset the status quo. "We want to know what the government knew about it and whether there was any benefit for the German authorities in what the US authorities did."— Michael Hartmann Germany's Chancellor Andrea Merkel, for instance, noted the need for telecommunications surveillance, but with " due diligence" undertaken to ensure privacy . “Free democracies live off people having a feeling of security,” Merkel said. Choice words. Secure from foreign aggressors and terrorists, as well as the eyes of Big Brother. This might have been a good discussion to have before the Snowden leak, when Germany—like other European countries—was benefiting from America's dirty work. Not convinced of her pandering? “It’s necessary for us to debate these issues,” she said. “People have concerns.” Well, indeed, people had concerns about NSA surveillance even before Snowden's leaks. What we can learn here is that Merkel didn't seem to have any concerns pre-Snowden; or, at least she didn't express them publicly. Michael Hartmann, spokesman on domestic issues for Germany's Social Democratic Party (SPD), echoes this sentiment. " We want to know what the government knew about it and whether there was any benefit for the German authorities in what the US authorities did, " Hartmann told the Guardian. "We can't accept this although we know that after 9/11 there were new rules and we have to be careful and well informed, but you can't defend our free society by destroying it." Peter Schaar, Germany's federal data protection commissioner, is of the same opinion. "So far, the US has no adequate level of data protection guaranteed in law and with independent oversight, like in Europe," Schaar told the Guardian. "It's essential for me that we cannot ignore anymore the question of what happens with the data of the private sector if it's collected by US or third-party companies and public authorities want to surveill this data." "I don't know how far European governments are informed over the details of US authorities to the data," Schaar added. "[B]ut one problem might be that the data gathered by the US authorities comes back from the US to Europe and is used by European authorities. We have to discuss this with our governments." That solves terrorism Miko and Froehlich 14 (Francis T., Christian, Specialist in International Relations Foreign Affairs, Defense, and Trade Division, Research Associate Foreign Affairs, Defense, and Trade Division “Germany’s Role in Fighting Terrorism: Implications for U.S. Policy” http://fas.org/irp/crs/RL32710.pdf, December 27 ) This report examines Germany’s response to global Islamic terrorism after the September 11, 2001 attacks in the United States. It looks at current German strategy, domestic efforts, and international responses, including possible gaps and weaknesses. It examines the state of U.S.-German cooperation, including problems and prospects for future cooperation. This report may be updated as needed. Although somewhat overshadowed in the public view by the strong and vocal disagreements over Iraq policy, U.S.-German cooperation in the global fight against international terrorism has to be extensive. German support is particularly important because several Al Qaeda members and 9/11 plotters lived there and the country is a key hub for the transnational flow of persons and goods. Domestically, Germany faces the challenge of having a sizable population of Muslims, some with extremist views, whom terrorists might seek to recruit. German counterterrorism strategy shares a number of elements with that of the United States, although there are clear differences in emphasis. Like the United States, Germany now sees radical Islamic terrorism as its primary national security threat and itself as a potential target of attack. Today, Germany also recognizes that threats to its domestic security lie far beyond its own borders, in places such as Afghanistan. Germany has introduced a number of policy, legislative, and organizational reforms since 9/11 to make the country less hospitable to potential terrorists. Despite these reforms, critics point to continuing problems hampering Germany’s domestic efforts. German law enforcement and intelligence communities face more bureaucratic hurdles, stricter constraints, and closer oversight than those in many other countries. The German government has sent troops into combat beyond Europe for the first time since World War II. Currently Germany has about 7,800 troops based abroad of which some forty percent are directly engaged in counterterror missions. In Afghanistan, some 2,300 German soldiers participate in the International Security Assistance Force (ISAF). Germany’s role in Afghanistan’s stabilization and reconstruction is substantial. German military efforts have been hampered to some extent by delays in implementing military reforms to make German forces more expeditionary. A key question for U.S. German relations is whether differences on issues such as Iraq policy — shaped by different national interests, practices, and historical experiences — will harm U.S.-German cooperation against terrorism. Some believe that understanding and accepting these differences (agreeing to disagree) may be the best approach to enhancing future U.S.-German cooperation in the global war on terrorism. Both countries have strong incentives to make the cooperation work. EMERGING POWERS 2ac NSA overreach hurts cooperation with emerging powers- that’s key to global security efforts Lewis , Director of CSIS, 15 (James, Director And Senior Fellow, Strategic Technologies Program, Center for Strategic and International Studies, Senate Foreign Relations Subcommittee on East Asia, the Pacific and International Cybersecurity Policy Hearing: [1], March 14. "Cybersecurity: Setting The Rules For Responsible Global Cyber Behavior.", proquest, http://www.foreign.senate.gov/imo/media/doc/051415_REVISED_Lewis_Testimony.pdf ) Dealing with these countries also requires a broad diplomatic strategy to win support from key allies and from emerging new powers, like Brazil, India and others. These new powers from a middle ground between western democracies and authoritarian regimes, and the policies these countries choose to pursue will determine the future of the internet and cybersecurity. Most of the new powers support fundamental human rights, and in particular freedom of speech and free access to information . This puts them at odds with the authoritarian view of cyberspace, but they also believe that national sovereignty and government must play a larger role in internet matters, and they were troubled by the NSA revelations, factors that work against U.S. influence. To win the global support, the U.S. needs persuasive arguments on privacy, internet governance, and the use of force in cyberspace. We do not now have these persuasive arguments and some of what we say now about the internet is seen as duplicitous. The NSA leaks of the last two years, whose selective release is used intentionally to damage the U.S., have not helped us. Cybersecurity is a military and intelligence contest with dangerous opponents . There are significant trade issues. The internet has immense political effect that threatens authoritarian regimes and has led them to mount significant challenges to market and democratic ideals and the international institutions created to support them. The focal point of this challenge is to reduce U.S. influence, not just over the internet but also in trade, security, and finance. We face a determined effort to dismantle American leadership in international affairs. Cooperation with emerging powers is key to counter-terror efforts Jones 11 (Bruce, director and senior fellow at the NYU Center on Int'l Cooperation and Senior fellow at the Brookings Institution. "Beyond Blocs: The West, Rising Powers, and Interest-Based International Cooperation. October. www.stanleyfoundation.org/publications/pab/jonespab1011b.pdf) The first pattern worth observing here is the sustained intensive cooperation since 9/11 between the United States, Russia, India, China, and myriad other states on combating Al Qaeda and other forms of terrorism. At times, this cooperation took the ugly form of a “you kill your terrorists and we’ll kill ours” compact. The fissure in this sphere was not between the United States and the emerging powers ; far from it. Instead, the public split was between the United States and Europe over the question of the application of international legal and human rights standards in the counterterrorist endeavor. This is not to say that the United States and the emerging powers agreed or agree on all things terrorist. Indeed, the political/ideological dispute over whether Palestinian nonstate actors are engaged in terrorism or resistance continues unabated at the United Nations—but that issue divides the United States as much from Europe as it does from the emerging powers. Operationally, though, intelligence sharing and political backing for counterterrorist moves has been remarkably steady between the United States , Russia, and the emerging powers. This is unsurprising. Terrorism poses simultaneous both to sovereign security as well as to the very infrastructural networks on which globalization depends, and the United States and the emerging powers share profound interests in protecting both . India module Domestic surveillance hurts US-Indian cooperation Burke 13 (Jason, south Asia correspondent, The Guardian. 9/25. www.theguardian.com/world/2013/sep/25/nsa-surveillanceindian-embassy-un-mission) The US National Security Agency may have accessed computers within the Indian embassy in Washington and mission at the United Nations in New York as part of a huge clandestine effort to mine electronic data held by its south Asian ally. Documents released by the US whistleblower Edward Snowden also reveal the extent and aggressive nature of other NSA datamining exercises targeting India as recently as March of this year. The latest revelations – published in the Hindu newspaper – came as Manmohan Singh, the Indian prime minister, flew to Europe on his way to the US, where he will meet President Barack Obama. The NSA operation targeting India used two datamining tools, Boundless Informant and Prism, a system allowing the agency easy access to the personal information of non-US nationals from the databases of some of the world's biggest tech companies, including Apple, Google, Microsoft and Yahoo. In June, the Guardian acquired and published top-secret documents about Boundless Informant describing how in March 2013 the NSA, alongside its effort to capture data within the US, also collected 97bn pieces of intelligence from computer networks worldwide. The largest amount of intelligence was gathered from Iran, with more than 14bn reports in that period, followed by 13.5bn from Pakistan. Jordan, one of America's closest Arab allies, came third with 12.7bn, Egypt fourth with 7.6bn and India fifth with 6.3bn. Though relations between India and the US were strained for many decades, they have improved considerably in recent years. President George Bush saw India as a potential counterweight to China and backed a controversial civil nuclear agreement with Delhi. Obama received a rapturous welcome when he visited in 2010, though concrete results of the warmer relationship have been less obvious. According to one document obtained by the Hindu, the US agency used the Prism programme to gather information on India's domestic politics and the country's strategic and commercial interests, specifically categories designated as nuclear, space and politics. A further NSA document obtained by the Hindu suggests the agency selected the office of India's mission at the UN in New York and the country's Washington embassy as "location targets" where records of Internet traffic, emails, telephone and office conversations – and even official documents stored digitally – could potentially be accessed after programs had been clandestinely inserted into computers. In March 2013, the NSA collected 6.3bn pieces of information from internet networks in India and 6.2bn pieces of information from the country's telephone networks during the same period, the Hindu said. After the Guardian reported in June that Pm program allowed the NSA "to obtain targeted communications without having to request them from the service providers and without having to obtain individual court orders", both US and Indian officials claimed no content was being taken from the country's networks and that the programs were intended to aid "counter-terrorism". Syed Akbaruddin, an external affairs ministry spokesperson, said on Wednesday there was no further comment following the latest revelations. Siddharth Varadajaran, editor of the Hindu, said the Indian government's "remarkably tepid and even apologetic response to the initial set of disclosures" made the story a "priority for Indians". A home ministry official told the newspaper the government had been "rattled" to discover the extent of the the programme's interest in India. "It's not just violation of our sovereignty, it's a complete intrusion into our decisionmaking process," the official said. Professor Gopalapuram Parthasarathy, a former senior diplomat, said no one should be surprised by the Hindu's story. "Everybody spies on everyone else. Some just have better gadgets. If we had their facilities, I'm sure we would do it too. The US-Indian relationship is good and stable and if they feel India merits so much attention then good for us," he told the Guardian. Others have been less phlegmatic. Gurudas Dasgupta, a leader of the Indian Communist party, asked the government to raise the issue with Obama. Anja Kovacs of the Delhi-based Internet Democracy Project said the articles showed that such datamining was not about any broader "struggle to protect society as a whole through something like fighting terrorism, but about control". The Hindu argued that "the targeting of India's politics and space programme by the NSA busts the myth of close strategic partnership between India and US", pointing out that the other countries targeted in the same way as India "are generally seen as adversarial" by Washington. Improved US-Indian security cooperation is key to fighting terrorism Panda 14 (Ankit, 10/2. Ankit Panda is a foreign affairs analyst, writer, and editor with expertise in international relations, political economy, international security, and crisis diplomacy. He has been an editor at The Diplomat since 2013. thediplomat.com/2014/10/10-takeaways-on-us-india-security-cooperation/) 7. The statement understandably has a broad focus on countering terror groups in South Asia and elsewhere. The statement mentions the Islamic State, Al Qaeda, Lashkar-e-Taiba, the Haqqani Network, Jaish-e-Mohammed, and the D-Company. The statement was relatively specific on areas of U.S.-India cooperation on counter-terrorism, highlighting the “dismantling of safe havens for terrorist and criminal networks, to disrupt all financial and tactical support for networks.” Furthermore, the statement identifies areas for growth in bilateral cooperation on criminal law enforcement, military information exchange, and legal cooperation — all areas where considerable lacunae exist in Indo-U.S. security ties. In the context of cooperation in these areas, the statement mentions interdicting terrorist activities in cyberspace — an area of concern for both countries. CHINA TURN 2ac Surveillance overreach hurts US-Chinese tech cooperation Song 13 (Sophie, Sophie is a graduate of Northwestern University. She covers the emerging markets in Southeast Asia, with a particular interest in foreign investment in the region. “Growing Chinese Animosity Following PRISM Revelations Could Threaten Tech Firms' Prospects In World's No. 2 Economy,” http://www.ibtimes.com/growing-chinese-animosity-following-prism-revelations-could-threaten-tech-firms-prospects-worlds-no , July 19) Edward Snowden’s revelations about the U.S. government’s PRISM surveillance program have triggered a backlash against American technology firms that threatens their growth in the world's second-largest economy. Following Snowden's exposure of PRISM Chinese authorities and the public have become increasingly worried about exposure to U.S. technology and equipment, according to a note published on Thursday by the Rhodium Group (RHG), a New York-based advisory firm that frequently provides business insights related to China. When the leak of PRISM hit Chinese media in early June, two major storylines emerged. The first accused the U.S. of operating under double standards – the U.S. government was monitoring other nations, companies and individuals, while accusing China and Chinese companies like Huawei Technology Co Ltd (SHE:002502) and ZTE Corporation (SHE:000063) of aiding the Chinese government in conducting espionage, as PRISM proved. The other headline, far more threatening to U.S. and other foreign businesses, according to RHG, is what the state-run media termed a “de-Cisco campaign.” The state-backed China Economic Weekly ran a cover story calling eight U.S. companies – Cisco Systems, Inc. (NASDAQ:CSCO), International Business Machines Corp. (NYSE:IBM), Google Inc. (NASDAQ:GOOG), QUALCOMM (NASDAQ:QCOM), Intel Corporation (NASDAQ:INTC), Apple Inc. (NASDAQ:AAPL), Oracle Corporation (NYSE:ORCL) and Microsoft Corporation (NASDAQ:MSFT) – the eight “guardian warriors” that had “ seamlessly penetrated ” Chinese society. The weekly newspaper called Cisco “the most horrible”, given its over 50 percent market share in China’s information infrastructure in financial, military, government and transportation sectors. In the past, comparative advantage in IT innovation has made U.S. equipment suppliers’ products more popular than those of Chinese suppliers, but if recent rhetoric is any indication that popularity may end in the near future. The Chinese government has already spent massive sums developing its own supercomputers and satellite navigation systems, and now Chinese officials seem to think Chinese companies like Huawei and ZTE, the very companies that have been repeatedly suspected of espionage in the west, are mature enough to replace Cisco, Microsoft and IBM. This could be bad news for both sides. China is a fast-growing market and a large contributor to these tech companies’ overall revenue. If the campaign against American companies gains traction these firms could see their market share dwindle. Last year, following the House report warning Huawei may pose a security risk, Unicom, China’s leading telecom operator, replaced Cisco routers in one of its backbone networks, citing security concerns. Other similar replacements may happen in the future. The effects could even trickle down to other U.S. firms, in particular those firms in supplying the tech giants. Cisco’s equipment and network is too widespread in China to be eliminated completely in the short term, if ever. Any policy like the de-Cisco campaign would almost certainly damage China’s economic and security interests, by radicalizing foreign trading partners who may be less willing to engage positively with China across a wider portfolio of interests, according to RHG’s research note. Now most of the back and forth remains China will not drop the issue without further investigation, and as such, the fates of American firms under suspicion in uncertain at best. “The situation for the American technology firms in China is not very clear right now.” Bao said. “We don’t think Huawei and other Chinese firms can replace the technology 100 percent, but when the issue concerns national security, China is unlikely to back down.” rhetoric, but Beibei Bao, a New York-based China analyst at Rhodium Group and the author of the report, believes the situation will likely escalate. Cooperation necessary between US – China to stop terrorism deLeon and Jiemian 14 (Rudy - Secretary of Defense for Clinton’s administration, and Yang – Professor, ph.D in political science ,“U.S.-China Relations Toward a New Model of Major Power Relationship,” https://www.americanprogress.org/wp-content/uploads/2014/02/ChinaReport-Full.pdf ,February) Officials and experts in both countries need a more effective dialogue with their citizens on the importance of the U.S.-China relationship and what newmodel relations exercise is designed to prevent and achieve. There are many positive stories of workaday Sino-American cooperation that do not make the mainstream press and are therefore not known to the public —and in some cases to key political leaders, particularly at the local level. For example, the American and Chinese Coast Guards cooperate frequently and effectively on an operational level, but that kind of operational cooperation is not as likely to attract media attention as bilateral flare-ups on sensitive issues. As one Chinese participant in our dialogues pointed out, we should seek to increase the attention paid to the positive attributes of the relationship that can shift the focus from “crisis management” to “opportunity management.” There are many areas of cooperation that could be expanded, including counterpiracy efforts; U.N. peacekeeping operations, or UNPKO; joint humanitarian, disaster-relief, and search-and-rescue exercises; multilateral military exercises or exercises hosted by third countries; professional military educational exchanges; maritime law enforcement; fisheries protection; taking steps to counter nuclear proliferation; and international terrorism. To build up a NMMPR is also in the common interests of regional and global order in transition. Both China and the United States are two key players with systematic influence on the international order in transition. A constructive bilateral relationship is the foundation of effective cooperation on both regional and global levels. On the one hand, if these two countries are able to work together, they can play a leading role in global and regional governance through coordinated policies on climate change, economic and financial governance, energy security, anti-global poverty and sustainable development, nonproliferation and international counterterrorism, and other global and regional challenges . On the other hand, neither bilateral confrontation nor G-2 would be welcomed by the international community as other members will either have to choose the side or worry about their respective national interests that would be jeopardized. For the collective interests of international community, a stable and healthy China-U.S. relationship based upon mutual respect and win-win cooperation could contribute to peace, security, and prosperity around the world. 1ar- plan solves China Restoring confidence in protection of domestically held data is critical to Chinese perceptions SHAHANI, 2014 (AARTI ,Aarti Shahani is a Tech Reporter on NPR's Business Desk, where she covers breaking news, and does investigative and enterprise reporting.“A Year After Snowden, U.S. Tech Losing Trust Overseas,”http://www.npr.org/sections/alltechconsidered/2014/06/05/318770896/a-yearafter-snowden-u-s-tech-losing-trust-overseas , June 5) This week marks the one-year anniversary of the Snowden revelations. Whatever you may think about Edward Snowden’s the man — is he a traitor or a hero? — one fact is indisputable. His leaks shook the world technology industry to its core. And the reverberations keep on coming. Take Cisco. The Silicon Valley giant is now at risk of losing its once-stellar reputation with foreign customers — at the exact same moment it needs to grow abroad. Security Worries For The Cloud Cisco is one of the companies that connect us to the cloud, by making routers and switches. About half of its business is abroad, and every year Cisco throws an event for its customers. The latest one was a concert by rock legend Lenny Kravitz. He performed at AT&T Park in San Francisco and, between the crowd's cheers, he complained about the weather. "It's cold here. I live in the Bahamas." Many in the audience came from much farther away. In fact, 25,000 high-powered executives from around the world flew into town. To keep growing, Cisco needs the trust of these foreign customers. The Snowden revelations don't help. Take one man I randomly bump into, Elly Resende from Brazil. He is responsible for the technology for staging the 2016 Olympic Games in Rio. He's the kind of guy who dives headfirst into the newest gadgets and gear. "I'm like a freak with ... I like technology a lot," he says. But this past year, he hit the brakes on a hot trend: cloud computing. That's when you put data online, in servers that can be outside your own country. Mike Janke is the chief executive officer of Silent Circle, a company that sells privacy devices and apps. ALL TECH CONSIDERED A Privacy Capitalist Wins Big After Snowden Cisco provides cloud services and was putting them on display prominently at the conference. Resende is a client who is skeptical. While he likes the convenience of accessing data from anywhere, he's worried about security — especially with data that is valuable to the competition, like athletes' training results. "This is a concern especially after the Snowden thing," he says. "How do you guarantee that your data is accessed only by you? Who else has the same access to the information that you produce, you think you control?" Plenty Of Questions From Customers Cisco hears such concerns all over the world. "I think it's been pretty universal outside of the U.S.," says Christopher Young, Cisco senior vice president of security. "So you can go to Latin America, you can go to Europe, to Asia, and there's many examples of customers asking those questions." The very first Snowden revelation — which was about the National Security Agency spying on phone calls — did not rock the high-tech industry. But the news bomb that came one day later, about a program called PRISM, did. The U.S. was tapping directly into the central servers of nine leading Internet companies including Microsoft, Yahoo, Google, Facebook and Apple. The journalist who broke the Snowden story, Glenn Greenwald, published a picture of a Cisco router allegedly intercepted in the mail, taken out of the box and tampered with by the NSA.i The journalist who broke the Snowden story, Glenn Greenwald, published a picture of a Cisco router allegedly intercepted in the mail, taken out of the box and tampered with by the NSA. No Place to Hide / Metropolitan Books Suddenly cloud computing could be a platform for mass surveillance. American tech companies could be working hand-in-hand with their government, and foreign clients would not get the memo. Young says the revelations have shaken customer confidence: "People say, 'Hey, we've known Cisco for a long time. We know we trust you guys. But given what's going on, how much can we really trust you?' " The answer is a moving target because the revelations keep on coming. Recently Cisco got caught in the cross hairs. The journalist who broke the Snowden story, Glenn Greenwald, published a picture of a Cisco router allegedly intercepted in the mail, taken out of the box and tampered with by the NSA. Another progressive journalist, Amy Goodman, asked Greenwald about it on her show Democracy Now: "So they get the Cisco router — with the knowledge or without the knowledge of Cisco?" Greenwald responded, "It's unclear." 'More Shoes To Drop?' Cisco says it was not aware of its routers being hacked. And CEO John Chambers wrote an open letter to President Obama, telling him that the actions, if true, "undermine confidence in our industry." Chambers also urged standards of conduct that meet national security objectives without jeopardizing business interests. It's not every day that an industry in hypergrowth loses trust with its customers in a big way. Andrew Bartels, with Forrester Research, studies cloud computing. "At this point, we don't know which direction it's going to take," he says. "Is everything out? Or [are] there still more shoes to drop?" By his estimate, a sector that hardly existed five years ago will be worth $191 billion by 2020. But that big number, he says, hides the rates at which different countries are moving to the cloud, and new resistance to that move. "You found in Europe, Germany in particular, companies putting those plans on the shelf because of the privacy issues," Bartels says. According to a study by German high-tech association Bitkom, cloud use grew just 3 percent in 2013, compared with a 9 percent increase in 2012. When Brazilian President Dilma Rousseff found out her emails were monitored by the NSA, she called for an end to the unquestioned use of U.S.-based servers. Bartels says, "That in turn has cascaded through the Brazilian government, which does still own a certain large portion of the economy." And businesses are realizing that cloud computing exposes them to new levels of domestic spying, Bartels says. "In China’ s or like Russia, I think the issue here is concerns in the private sector about giving business information to the government," he says. In this messy landscape, Cisco is losing ground. In its last quarterly earnings call, the company reported that orders from emerging countries fell 7 percent — down 27 percent in Brazil alone, 8 percent in China and 28 percent in Russia. The company and its Silicon Valley competitors are now retooling services, trying to rebuild trust — or offer more secure products. markets like ISIS TURN 2ac US-led international cooperation is key to stop ISIS- unilateral action alone will inevitably fail Katulis, Lang, and Singh 14 (Brian Senior Fellow at American Progress, Hardin Senior Fellow at American Progress and Vikram Vice President for National Security and International Policy at American Progress, Defeating ISIS: An Integrated Strategy to Advance Middle East Stability. https://www.americanprogress.org/issues/security/report/2014/09/10/96739/defeatingisis-an-integrated-strategy-to-advance-middle-east-stability/) As with efforts to counter extremism elsewhere, defeating ISIS will require a concentrated effort over time. Any successful U.S. strategy must be built on a foundation of regional cooperation that requires coordinated action from U.S. partners—a central concept of the Counterterrorism Partnership Fund that President Barack Obama proposed earlier this year. The strategy will be multifaceted, involving intelligence cooperation, security support, vigorous regional and international diplomacy, strategic communications and public diplomacy, and political engagement. While military action alone will be insufficient to defeat ISIS, the United States and other nations may need to undertake airstrikes and provide military assistance to disrupt and degrade ISIS in Syria. These strikes should be conducted in concert with regional and international partners. Ideally, such airstrikes would receive the support from the United Nations or—absent action to authorize the use of force by the U.N. Security Council—from a coalition of America’s Gulf partners and North Atlantic Treaty Organization, or NATO, allies. As always, the United States should reserve the right to undertake unilateral military action to defend the homeland or protect U.S. personnel from imminent harm. Whether unilaterally or with partners, U.S. military strikes should be limited in terms of scope and duration and under clear oversight of Congress. As CAP said in June when it advocated for action against ISIS in Iraq, “The United States should not undertake military action lightly and should be wary of unintended consequences. But not all military action is the same. Ground troops or invasions to control a country are very different from limited air strikes or targeted assistance to help push back terrorist extremists.” Focusing too much on direct U.S. military action in the fight against ISIS ignores the equally important diplomatic and economic steps that will be required to defeat this extremist group. U.S. military strikes or even boots on the ground cannot defeat ISIS alone and could become a rallying cry and recruitment tool for extremists, repeating one of the most costly strategic errors of the 2003 Iraq War. At the same time, building a unified, committed coalition to effectively degrade ISIS will require intense diplomatic and military leadership from the United States to mobilize and coordinate partners. The United States must leverage its unique capabilities in the military, security assistance, and intelligence arenas. Working together, nations committed to defeating ISIS should take concerted action to empower regional and local forces to fight back against ISIS terrorism. CYBER-TERROR TURN 2ac Absent the Plan; US security surveillance policies lead to cyber-attack Lewis , Director of CSIS, 15 (James, Director And Senior Fellow, Strategic Technologies Program, Center for Strategic and International Studies, Senate Foreign Relations Subcommittee on East Asia, the Pacific and International Cybersecurity Policy Hearing: [1], March 14. "Cybersecurity: Setting The Rules For Responsible Global Cyber Behavior.", proquest, http://www.foreign.senate.gov/imo/media/doc/051415_REVISED_Lewis_Testimony.pdf ) For the U.S., better cybersecurity requires changing the behavior of four countries. Russia is the principle source of cyber crime and extremely active in political-military espionage, and is the most skilled opponent we face. China leads in economic cyber espionage. Iran has developed significant cyber capabilities and uses them to apply political pressure on the U.S. It has also done the network reconnaissance necessary to launch cyber attacks against critical infrastructures, as have China and Russia. North Korea has invested for decades in building cyber attack capabilities. There are also jihadist groups who have rudimentary cyber capabilities. Hezbollah and the Syrian Electronic Army are connected to Iran and through Iran, perhaps to Russia. ISIS, with its sophisticated internet skill, bears watching carefully as a group that could develop the capability for low-level attack. Dealing with these countries also requires a broad diplomatic strategy to win support from key allies and from emerging new powers, like Brazil, India and others. These new powers from a middle ground between western democracies and authoritarian regimes, and the policies these countries choose to pursue will determine the future of the internet and cybersecurity. Most of the new powers support fundamental human rights, and in particular freedom of speech and free access to information. This puts them at odds with the authoritarian view of cyberspace, but they also believe that national sovereignty and government must play a larger role in internet matters, and they were troubled by the NSA revelations, factors that work against U.S. influence. To win the global support, the U.S. needs persuasive arguments on privacy, internet governance, and the use of force in cyberspace. We do not now have these persuasive arguments and some of what we say now about the internet is seen as duplicitous. The NSA leaks of the last two years, whose selective release is used intentionally to damage the U.S., have not helped us. Cybersecurity is a military and intelligence contest with dangerous opponents. There are significant trade issues. The internet has immense political effect that threatens authoritarian regimes and has led them to mount significant challenges to market and democratic ideals and the international institutions created to support them. The focal point of this challenge is to reduce U.S. influence, not just over the internet but also in trade, security, and finance. We face a determined effort to dismantle American leadership in international affairs. TECH COMPANIES 2ac Cooperation between Government surveillance and the private industry is key to breaking down terrorism- the plan is key to restoring trust necessary to effective surveillance Michaels, J.D, 08 (Don Michaels: J.d. from Yale, Prof at UCLA Law School “All the President's Spies: Private-Public Intelligence Partnerships in the War on Terror” California Law Review: Vol. 96, No. 4 (Aug., 2008), pp. 901-966, http://www.jstor.org/stable/20441037 (pg. 901)) Unable to target or repel terrorists using conventional military tactics and munitions alone, the United States is acutely aware that today's pivotal battlefield is an informational one. Teams of U.S. intelligence agents, acting as eavesdroppers, infiltrators, interrogators, and data-miners, must race against the clock to anticipate terrorists' actions, frustrate their missions, and dismantle their infrastructure.' Because the U.S. government does not know the who, what, where, and when of the next terrorist strike, but recognizes that the plot might be hatched on domestic soil, its first step must be to cast a wide net to gather all sorts of data points, any one of which might be the clue that leads intelligence agents to prevent another September 11-like catastrophe.3 In this regard, there is no better ally than the private sector. Its comparative advantage over the government in acquiring vast amounts of potentially useful data is a function both of industry's unparalleled access to the American public's intimate affairsaccess given by all those who rely on businesses to facilitate their personal, social, and economic transactions-and of regulatory asymmetries insofar as private organizations can at times obtain and share information more easily and under fewer legal restrictions than the government can when it collects similar information on its own. 1ar Cooperation with private companies allows access to a wider data set which prevents terror Michaels, J.D. 08 (Don Michaels: J.d. from Yale, Prof at UCLA Law School “All the President's Spies: Private-Public Intelligence Partnerships in the War on Terror” California Law Review: Vol. 96, No. 4 (Aug., 2008), pp. 901-966, http://www.jstor.org/stable/20441037 (pg. 908)) Technological advances and the concomitant universal reliance on such innovations to communicate and to conduct personal and business transactions electronically have generated an unprecedented number of data points about individuals who use email, surf the web, speak via telephone, wire money, bank, travel commercially, and transact business via the Internet.18 All of the information about particular electronic transactions (and all of the background details people supply to subscribe to shopping or frequent-traveler membership clubs or to gain access to websites' content) is possessed in large measure by private firms involved in commerce, finance, and telecommunications.'9 With high-powered computers and increasingly sophisticated software,20 analysts can mine these stores of data and detect particularly significant patterns of behavior, including activities ostensibly indicative of terrorist planning. People simply do not interface with the government in the same ways or with the same frequency as they do with the private sector, and thus the intelligence agencies find themselves particularly drawn to, and in some respects dependent upon, private data resources.2 Cooperation solves-Private data regulations are less restricted, leading to an increase in available data Michaels, J. D, 08 (Don Michaels: J.d. from Yale, Prof at UCLA Law School “All the President's Spies: Private-Public Intelligence Partnerships in the War on Terror” California Law Review: Vol. 96, No. 4 (Aug., 2008), pp. 901-966, http://www.jstor.org/stable/20441037 (pg. 908-909)) Coupled with the private sector's attractiveness as a convenient repository of information is its legal allure, notably in instances when private data gathering is subject to less stringent regulation than what the government faces. That is, federal lawenforcement and intelligence-gathering offices (along with, for example, health and labor departments) are at times comparatively hamstrung in their direct ability to collect and catalog private, personal information about U.S. persons.23 The reasons for this asymmetry include legislative happenstance, consumer convenience, and the assumption that private businesses can do less "harm" with personal information than the government can. But if the government can convince private businesses to share their data collections, it can make an end-run around the more stringent restrictions limiting its ability to access information directly. Private Sector cooperation is key to prevent terror Wiktorowicz and Amanullah 15 (Quintan Wiktorowicz is a PhD from Cornell. He served as senior adviser for technology at the Department of State from 2011-2014, “How tech can fight extremism” Published: Feb 17, 2015, http://www.cnn.com/2015/02/16/opinion/wiktorowicz-tech-fighting-extremism/) Violent extremists like the self-proclaimed Islamic State of Iraq and Syria, or ISIS, have become increasingly sophisticated at creating dense, global networks of support online, networks that are helping these groups run virtual circles around governments and communities. And it is activities like these that have raised a disturbing prospect, one that has serious implications for fighting extremism: We could lose the information war. It's with this troubling reality in mind that the Obama administration will this week hold a Summit on Countering Violent Extremism, where it will underscore the importance of technology companies in the fight against terrorist recruitment. This is critical. As Robert Hannigan, director of Britain's Government Communications Headquarters (the National Security Agency's sister organization), emphasized, technology companies' services "have become the command-and-control networks of choice for terrorists." ISIS, in particular, has proven virulent in using technology to radicalize. It has mobilized armies of online followers to engage audiences in ways that take advantage of the decentralized and open nature of the Internet, leveraging online tools such as Twitter, Facebook, Ask.fm, Kik, SoundCloud and Instagram, to name just a few. Indeed, in a single day this past summer, ISIS supporters sent out some 40,000 tweets, and supporters often repetitively tweet specific hashtags at particular times of day to maximize message trending. ISIS also has strategically run hashtag campaigns to tap into trending topics on Twitter, such as the World Cup and Ebola, which have nothing to do with violent extremism. ISIS-linked extremists have used social media to focus group messages, disseminate ideological simulator games, and broadcast high production videos, and the group has created its own technologies, including a smartphone app released last year that amplifies its messaging campaigns. Governments are struggling to keep up. How should they respond? For a start, they need to leverage the talent, creativity and capabilities of the private sector. Yet involving technology companies in countering extremism will be challenging. True, the U.S. government has been engaging Google, Twitter, Facebook and other large companies on the problem since at least 2008. But while this has generated a few initiatives, such as social media training for Muslim Americans and the Network Against Violent Extremism online network catalyzed by Google Ideas, we have yet to see the scale of involvement required for strategic impact. Part of the challenge is that, although large companies clearly want to help, they have to navigate complicated priorities that distinguish them from governments, such as shareholders, profits, brands and market forces. Just as importantly, these high-profile companies could face real safety risks. When Twitter shut down ISISaffiliated accounts last year, for example, a prominent ISIS supporter called for the assassination of Twitter employees. Given recent attacks in Paris and Sydney, these kinds of threats are chilling. The Obama administration will therefore need to figure out how to help companies navigate the inherent risks of the private sector countering violent extremism. One solution is to encourage the involvement of more agile start-ups that are willing to move into niche markets like countering extremist messaging. These companies are lean, hungry and less encumbered by the risk calculations that circumscribe large companies. Moreover, the start-up community is increasingly emphasizing social impact as a core business imperative, and this trend likely will accelerate as more millennials start new businesses. Interestingly, research shows that millennials place a premium on investments that generate positive social impact. Just as importantly, the counter-extremism "marketplace" is in many ways better suited to small, flexible businesses than large companies. Radicalization is driven by a host of different factors (such as identity crises, a sense of disempowerment, a desire for adventure, and even misguided idealism), each of which represents a potential business opportunity. Large companies may not be interested in addressing these market needs if it takes them away from their core products and services, leaving room for a constellation of specialized start-ups. The Muslim youth market, in particular, is experiencing immense political, cultural and religious transformations, and many large companies are nervous about the volatility. As a result, the 500 million-strong Muslim youth market is woefully underserved. Start-ups, especially those from within Muslim communities, may be better positioned and motivated to address Muslim youth needs in a way that helps counter radicalization. At the White House Summit, the President will likely call on technology companies for help, and we encourage the administration to involve talented and passionate start-ups in addition to brand name companies. This week, to support the summit and facilitate greater private sector involvement, we will launch a specialized start-up incubator (Affinis Labs) and are forming a $5 million private equity fund for start-ups involved in countering extremism. The reality is that ISIS operates like a mission-driven, agile start-up to spread its evil ideology, and we will not defeat it through government and large corporations alone. America is the vanguard of entrepreneurship and innovation, and there are start-ups ready to heed President Obama's call, including start-ups led by passionate Muslim Americans who are building businesses and social enterprises that challenge violent extremist narratives. We believe firmly that American entrepreneurs are ready to support the fight against radicalization. Tech companies key to solve terror Schechner and Gauthier ’15 [Sam Schechner and David Gauthier-Villars Feb. 17, 2015 5:11 p.m. ET . Sam is a Europe Tech Correspondent, The Wall Street Journal. Sam covers technology across Europe, based out of the Wall Street Journal's Paris bureau. He has previously served as a French business correspondent and covered the U.S. television industry. Sam has been a reporter for the Journal since 2005. David Gauthier-Villars is a Deputy Bureau Chief, The Wall Street Journal. Accessed June 25, 2015, “Tech Companies Are Caught in the Middle of Terror Fight” http://www.wsj.com/articles/tech-companies-arecaught-in-the-middle-of-terror-fight-1424211060]//JZ WB French Interior Minister Bernard Cazeneuve heads to Silicon Valley this week to enlist a new force in his fight on terror: U.S. tech giants. Weeks after deadly terror attacks in Paris , and days after apparent copycat shootings in Denmark, France’s top cop plans to meet on Friday with senior executives at Apple Inc.,Google Inc., Facebook Inc., and Twitter Inc . His message : U.S. tech companies and social networks must do more to rid their services of extremist postings , and should open up encryption to ease government surveillance . “We are facing a new threat,” Mr. Cazeneuve said in an interview ahead of the trip. “We need tech companies to realize that they have an important role to play .” Mr. Cazeneuve’s West Coast tour—coming after a layover Wednesday and Thursday in Washington to attend a summit on terror—raises European pressure on U.S. tech companies over how best to use the Internet to fight terrorists. Executives say it thrusts them into a tricky dilemma—how to support their users’ privacy and free-speech rights while also being tough on terrorism. In Paris and other European capitals, government officials say Islamic State and other insurgencies have succeeded in harnessing social networks to rally scores of young Europeans to their cause, and lure hundreds of converts to the battlegrounds in Syria and Iraq. Online videos showing the beheading of U.S. reporter James Foley and other hostages by Islamic State are terrorism propaganda that must be censored, they say. But until recently, some of the same European governments were assailing some of the same companies for allegedly being overly cooperative with the U.S. National Security Agency, U.S. tech executives say. “Internet companies find themselves caught in the middle,” said Eduardo Ustaran, a privacy lawyer for Hogan Lovells who represents some tech companies. “On one hand, there is a need to make sure these horrible attacks don’t recur . “At a gathering of European law enforcement representatives in Luxembourg last October, U.S. companies including Google, Facebook, Twitter and Microsoft Corp. pledged to help governments . But in meetings since then, the European officials and company representatives have sparred on important issues, such as whether the companies can or should pre-emptively filter their services for terrorist content, or respond only when it is flagged by governments, people familiar with the meetings said. Mr. Cazeneuve, who has dealt with U.S. companies over tax issues during his one-year stint as budget minister until last spring, said he expects them to step up their effort in censoring content that could be regarded as hate speech. “What would be the interest of tech companies in broadcasting hateful images that incite terrorism?” he said. When it comes to terror, U.S. tech executives respond they already cooperate extensively with governments , particularly in emergencies like the ones France and Denmark recently endured, both by removing content from terrorist groups, and by turning over user data. On Jan. 7, when videos proliferated of masked gunmen shooting a French policeman at close range, Google’s YouTube was able to remove copies of the footage in minutes , French officials said. T he company says it removed 14 million videos in 2014 for featuring gratuitous violence, incitement to violence or hate speech . That same day, Microsoft says it was able to turn over content from email accounts linked to the Kouachi brothers—suspected of being the killers—w ithin some 45 minutes. The request came through an emergency channel from French prosecutors to the U.S. Federal Bureau of Investigation, Microsoft said. But people within the companies also say that they will only go so far, given the pressure they still feel to fight government surveillance in the wake of the Snowden leaks. “Over the last three years, first Edward Snowden and now [Islamic State], we have seen the political debate about government access to information swing from one end of the spectrum to the other,” said Rachel Whetstone, Google’s global head of public policy, in a speech to the Bavarian parliament earlier this month. Ms. Whetstone is among the Google executives Mr. Cazeneuve is set to meet on Friday, his office said. One flash point on the agenda is encryption. Politicians and law-enforcement officials in the U.K., France, and U.S. have said that encrypted communications on apps like Facebook’s WhatsApp or Apple’s new iPhone pose a problem because companies say they don’t have the ability to unlock them even when they receive valid law-enforcement requests. Mr. Cazeneuve says he plans to push the topic in California. “It is a central issue,” he said. Apple Inc. Chief Executive Tim Cook defended the company’s stance last week, sayingweakening privacy controls could “risk our way of life.” Other companies argue that creating back doors to encryption would give a leg up to criminal hackers, and weaken security for all Internet users. “Given most people use the Internet for the reasons it was intended, we shouldn’t weaken security and privacy protections for the majority to deal with the minority who don’t,” said Google’s Mr. Whetstone. INFO OVERLOAD 2ac Too much data collection hinders security. The Washington Blog citing Binney, Former Head of the NSA’s global intelligence gathering operations. (Washingtons Blog, “NSA Admits It Collects Too MUCH Info to Stop Terror Attacks” Washingtons Blog, http://www.washingtonsblog.com/2015/05/nsa-admits-it-collects-too-much-info-to-stop-terror-attacks.html, 5-7-15) Top security experts agree that mass surveillance is ineffective … and actually makes us MORE vulnerable to terrorism. For example, the former head of the NSA’s global intelligence gathering operations – Bill Binney – says that the mass surveillance INTERFERES with the government’s ability to catch bad guys, and that the government failed to stop 9/11, the Boston Bombing, the Texas shootings and other terror attacks is because it was overwhelmed with data from mass surveillance on Americans. Binney told Washington’s Blog: A good deal of the failure is, in my opinion, due to bulk data. So, I am calling all these attacks a result of “Data bulk failure.” Too much data and too many people for the 10-20 thousand analysts to follow. Simple as that. Especially when they make word match pulls (like Google) and get dumps of data selected from close to 4 billion people. This is the same problem NSA had before 9/11. They [the NSA] had data that could have prevented 9/11 but did not know they had it in their data bases. This back then when the bulk collection was not going on. Now the problem is orders of magnitude greater. Result, it’s harder to succeed. Expect more of the same from our deluded government that thinks more data improves possibilities of success. All this bulk data collection and storage does give law enforcement a great capability to retroactively analyze anyone they want. But, of course,that data cannot be used in court since it was not acquired with a warrant. Binney and other high-level NSA whistleblowers noted last year: On December 26, for example, The Wall Street Journal published a lengthy front-page article, quoting NSA’s former Senior Technical Director William Binney (undersigned) and former chief of NSA’s SIGINT Automation Research Center Edward Loomis (undersigned) warning that NSA is drowning in useless data lacking adequate privacy provisions, to the point where it cannot conduct effective terrorist-related surveillance and analysis. A recently disclosed internal NSA briefing document corroborats the drowning, with the embarrassing admission, in bureaucratize, that NSA collection has been “outpacing” NSA’s ability to ingest, process, and store data – let alone analyze the take. Indeed, the pro-spying NSA chief and NSA technicians admitted that the NSA was drowning in too much data 3 months before 9/11: In an interview, Air Force Lt. Gen. Michael Hayden, the NSA’s director … suggested that access isn’t the problem. Rather, he said, the sheer volume and variety of today’s communications means “there’s simply too much out there, and it’s too hard to understand.” “What we got was a blast of digital bits, like a fire hydrant spraying you in the face,” says one former NSA technician with knowledge of the project. “It was the classic needle-in-the-haystack pursuit, except here the haystack starts out huge and grows by the second,” the former technician says. NSA’s computers simply weren’t equipped to sort through so much data flying at them so fast. And see this. If more traditional anti-terror efforts had been used, these terror plots would have been stopped. So why does the NSA collect so much information if it admits that it’s drowning in info? Here are a few hints. Add-Ons EU RELATIONS 2ac add-on – eu rel i/l The EU’s trust with the U.S. was broken by PRISM; coordination between the EU and the U.S. won’t happen till this is fixed. PROFFITT 13 (BRIAN , Brian Proffitt is a technology expert specializing in enterprise, cloud computing and big data with 23 years of journalism and publishing experience. He is the author of 24 books on mobile technology and personal computing and an adjunct instructor at top-ranked Mendoza College of Business at the University of Notre Dame. Breathing is a hobby. “PRISM Fallout: U.S. Internet Companies Stained By Intelligence Actions Is the cloud about to be geo-fenced into Balkanized collections of data thanks to PRISM? ,” http://readwrite.com/2013/07/03/prism-fallout-us-internet-companies-stained-by-intelligence-actions, JUL 3) It was bound to happen sooner or later: faced with mounting global criticism on its use of Internet data to monitor international denizens for intelligence reasons, the U.S. is now starting right up there with China as safest places to store data on the Web. If trust in U.S. web and data services continues to erode, the future of global cloud computing will be a much different place than what is currently envisioned. The AP is reporting today that German Interior Minister Hans-Peter Friedrich is warning anyone on the Internet to avoid using U.S.-based services such as those from Facebook, Google or Microsoft. … Friedrich told reporters in Berlin on Wednesday that "whoever fears their communication is being intercepted in any way should use services that don't go through American servers." Germany is only one of several nations that are particularly angered by revelations that the U.S. apparently is engaging in wide-scale intelligence gathering using data collected directly from private Internet firms via the socalled PRISM project. If the allegations implied by the leaked PRISM documents are true, then PRISM would seriously jeopardize business relations between the U.S. and other countries. The European Union may be the first relationship to get damaged. See also: PRISM Fallout: In Cloud We Don't Trust? In order to comply with strict E.U. data laws, which essentially prevent data being stored outside an E.U. member nation's borders, the E.U. and the U.S. have established a Safe Harbor agreement that enables data to be stored in U.S.-based cloud services so long as the U.S. service providers self-regulate themselves to maintain strict standards of privacy protections. Recent assertions show that U.S. intelligence services may actually have on-site equipment on PRISM participants' property, despite repeated denials from those services, which also include Yahoo, PalTalk, AOL, Skype, YouTube and Apple. If the information from the leaked PRISM documents is true, this is a serious breach of their Safe Harbor agreement. Even if PRISM turns out to be fictitious, just the hint that something like PRISM could exist could evaporate a large amount of trust and business for U.S. cloud vendors—even ones not named in the PRISM documents. Friedrich's comments today are a sharp reminder of just how fast the relationship between E.U. and U.S. companies could deteriorate. Advertisement — Continue reading below Bound by law not to discuss what they are doing to help intelligence services, the named PRISM companies and services are facing a P.R. nightmare, where all they can do is deny and hope the problem goes away. International policy makers are growing increasingly angered at what they see as U.S. arrogance. (Yesterday's search of Bolivian President Evo Morales's plane by Austrian authorities in Vienna for Edward Snowden, the selfidentified leaker of the PRISM documents, probably does not help that perception.) We may very well be heading for a new geofenced world of data isolationism, where the storage of data across international borders will not be so commonplace as it is today. If that becomes the case, how will the Internet landscape work then? Will apps that sell on an international scale be forced to maintain separate Balkanized data collections for each nation served? Or will any Internet-based company now be forced to lock down their data in direct defiance of state-sanctioned data collection operations? Neither choice seems palatable, but to regain the trust and business of a global audience, the U.S. may have to take such drastic measures. What's your picture of a post-PRISM Internet future? --xt prism hurts eu rel NSA overreach hurts US-EU terror cooperation Mix 15 (Derek E. , Analyst in European Affairs “The United States and Europe: Current Issues,” https://www.fas.org/sgp/crs/row/RS22163.pdf , February 3) In 2013, press reports began surfacing about U.S. National Security Agency (NSA) surveillance programs in the United States and Europe created tensions in the transatlantic relationship. Among other allegations, the reports asserted that objects of U.S. spying included the EU offices in Washington, DC and the cell phone of German Chancellor Angela Merkel. The information was based on leaked, classified documents obtained from Edward Snowden, a former NSA contractor; and focused on operations allegedly conducted by the NSA and the UK’s Government Communications Headquarters (the UK’s signals intelligence agency). The reports raised serious concerns on both sides of the Atlantic about the extent of U.S. surveillance operations, the degree of involvement by European intelligence services, and the appropriate balance between promoting security and upholding privacy rights and civil liberties. Some observers worry that the allegations have resulted in lasting damage to transatlantic trust, negatively affecting U.S.-European political, security, and economic ties. Many European leaders, EU officials, and European citizens were deeply dismayed by the reports and concerned that such operations could violate European privacy rights and civil liberties and compromise the security of European citizens’ personal data. Criticism has been most pronounced in Germany, where disclosed NSA activities appear to have been broad in scope and the issue of government surveillance of private citizens evokes particularly strong feelings due to the legacy of domestic spying by the Nazi and East German regimes. Many analysts point out that the fallout from the reports could have implications for U.S.- European cooperation on counterterrorism and data privacy by complicating negotiations about renewal of the SWIFT and passenger name record (PNR) agreements (in 2015 and 2019, respectively), as well as the proposed Data Privacy and Protection Agreement. In the European Parliament, the reports exacerbated long-standing objections to the SWIFT and PNR agreements and intensified MEPs’ concerns about U.S. data protection safeguards and access to European citizens’ personal data. In the aftermath of the reports, the European Parliament called for 17 suspension of the U.S.-EU Safe Harbor agreement that allows commercial data exchanges, and there have been suggestions that the purported U.S. surveillance activities may have a wider effect on economic relations, including with regard to negotiations on the proposed TTIP. U.S. – E.U. cooperation key for counter-terrorism Mix 15 (Derek E. , Analyst in European Affairs “The United States and Europe: Current Issues,” https://www.fas.org/sgp/crs/row/RS22163.pdf , February 3) The United States and European countries have been cooperating in efforts to counter the Islamic State and seek a political solution to the conflict in Syria. Recent estimates suggest that upward of 3,000 European citizens have traveled to Syria and Iraq to join groups involved in the conflict, and the potential threat posed by returning “foreign fighters” has become a central concern. U.S.-EU counterterrorism cooperation has been strong since 9/11, although differences regarding data privacy have posed some key information-sharing challenges. The United States and Europe remain central actors in negotiations seeking to reach an agreement that ensures that Iran’s nuclear program can be used solely for peaceful purposes. While an extensive array of U.S. and EU sanctions have worked to isolate and pressure Iran, the final outcome of talks remains uncertain. • The United States and EU share broad objectives with regard to resolving the IsraeliPalestinian conflict. Increased European support for recognizing Palestinian statehood, however, has diverged from the approach taken by the United States and strained Europe’s relationship with Israel. • The United States and the EU have the largest trade and investment relationship in the world. The two sides have been negotiating a free trade agreement, the Transatlantic Trade and Investment Partnership (TTIP) aimed at boosting jobs and growth on both sides, but obstacles could make it difficult to conclude a deal by the end of 2015. While the conditions that fueled the Eurozone crisis from 2010-2012 appear to have stabilized, there is considerable doubt that underlying economic problems in Europe have been fully resolved. • Allegations of U.S. spying and surveillance programs in Europe have caused a sharp backlash and damaged transatlantic trust. Although tensions appear to have proven manageable and U.S. intelligence cooperation with European governments continues, data privacy concerns could complicate future talks on U.S.-EU information-sharing agreements. The United States takes over the chairmanship of the Arctic Council in May 2015. The Artic is increasingly viewed as a region of potential economic and geopolitical importance. As the United States and Europe face a changing geopolitical environment, some observers assert that the global influence of the Euro-Atlantic partnership is in decline. In addition, the Obama Administration’s announced intention of “rebalancing” U.S. foreign policy toward Asia has caused some anxiety among Europeans. Overall, however, most analysts maintain that the United States and Europe are likely to remain one another’s closest partner, and that U.S.-European cooperation is likely to remain the foundation of international action on a wide range of critical issues. HEGEMONY 2ac add-on – heg i/l NSA overreach is broadly spurring counter-balancing across security and economic sectors – plan key Lewis , Director of CSIS, 3/15 (James, Director And Senior Fellow, Strategic Technologies Program, Center for Strategic and International Studies, Senate Foreign Relations Subcommittee on East Asia, the Pacific and International Cybersecurity Policy Hearing: [1], "Cybersecurity: Setting The Rules For Responsible Global Cyber Behavior.", proquest, http://www.foreign.senate.gov/imo/media/doc/051415_REVISED_Lewis_Testimony.pdf ) Dealing with these countries also requires a broad diplomatic strategy to win support from key allies and from emerging new powers, like Brazil, India and others. These new powers from a middle ground between western democracies and authoritarian regimes, and the policies these countries choose to pursue will determine the future of the internet and cybersecurity. Most of the new powers support fundamental human rights, and in particular freedom of speech and free access to information. This puts them at odds with the authoritarian view of cyberspace, but they also believe that national sovereignty and government must play a larger role in internet matters, and they were troubled by the NSA revelations, factors that work against U.S. influence. To win the global support, the U.S. needs persuasive arguments on privacy, internet governance, and the use of force in cyberspace. We do not now have these persuasive arguments and some of what we say now about the internet is seen as duplicitous. The NSA leaks of the last two years, whose selective release is used intentionally to damage the U.S., have not helped us. Cybersecurity is a military and intelligence contest with dangerous opponents. There are significant trade issues. The internet has immense political effect that threatens authoritarian regimes and has led them to mount significant challenges to market and democratic ideals and the international institutions created to support them. The focal point of this challenge is to reduce U.S. influence, not just over the internet but also in trade, security, and finance. We face a determined effort to dismantle American leadership in international affairs . TECH LEADERSHIP 2ac add-on – tech lead i/l NSA Surveillance has angered U.S. Tech companies- Damaged Reputations Gustin ‘13, Fellow at Harvard University, Graduate from Columbia University (Sam Gustin, “NSA Spying Scandal Could Cost U.S. Tech Giants Billions”, Time Magazine, http://business.time.com/2013/12/10/nsa-spying-scandal-could-cost-u-s-tech-giants-billions/, December 10, 2013) The National Security Agency spying scandal could cost the top U.S. tech companies billions of dollars over the next several years, according to industry experts. In addition to consumer Internet companies, hardware and cloud-storage giants like IBM, Hewlett-Packard, and Oracle could suffer billions of dollars in losses if international clients take their business elsewhere. Now, the nation’s largest Internet companies are calling for Congress and President Obama to reform the U.S. government’s secret surveillance programs. Google, Apple, Microsoft, Yahoo, Twitter and Facebook are facing intense scrutiny following revelations from former NSA contractor Edward Snowden, who leaked classified documents about the NSA’s snooping programs. In particular, the tech giants have been stung by disclosures about a classified U.S. intelligence system called PRISM, which the NSA used to examine data — including e-mails, videos and online chats — via requests made under the Foreign Intelligence Surveillance Act (FISA). Snowden’s disclosures stoked privacy concerns about how the largest U.S. tech companies handle their vast troves of user data. Since then, the companies have strenuously denied that they give the NSA “direct” or unfettered access to their computer the NSA taps directly into the networks of the tech giants, a disclosure that prompted outrage from top company executives, most notably Eric Schmidt, Google’s executive chairman. After Snowden’s leak, the Information Technology & Innovation Foundation (ITIF), a non-partisan, D.C.-based think tank, published a report saying that U.S. cloud computing providers could lose as much as $35 billion by 2016 because of the NSA revelations. ITIF senior analyst Daniel Castro, the report’s author, wrote that Snowden’s disclosures “will likely have an immediate and lasting impact on the competitiveness of the U.S. cloud computing industry if foreign customers decide the risks of storing data with a U.S. company outweigh the benefits.” Analysts at Forrester, the respected tech industry research firm, went even further. In a blog post, Forrester analyst James Staten projected a net loss for the Internet service provider industry of as much as $180 billion by 2016, which would amount to a 25% decline in the overall information technology services market. “All from the unveiling of a single kangaroo-court action called PRISM,” Staten wrote. His estimate includes domestic clients, which could bypass U.S. cloud providers for international rivals, as well as non-U.S. cloud providers, which could lose as much as 20% of their business due to foreign governments servers, and they’ve waged a public competition to demonstrate their commitment to transparency. But recent reports have described how — like Germany — which have their own secret snooping programs. With numbers at that scale, it’s not hard to understand why the top U.S. Internet companies are vehemently protesting the government’s secret surveillance programs. Silicon Valley executives frequently tout their belief in idealistic principles like free speech, transparency and privacy. But it would be naive to think that they also aren’t deeply concerned about the impact of the NSA revelations on the bottom line. “Businesses increasingly recognize that our government’s out-of-control surveillance hurts their bottom line and costs American jobs,” Rep. Justin Amash, the Michigan Republican and outspoken critic of the NSA’s secret programs, told TIME by email. “It violates the privacy of their a coalition of the largest U.S. Internet companies launched a campaign to pressure the government to reform its surveillance programs. “People won’t use technology they don’t trust,” said Microsoft general counsel Brad Smith. “Governments have put customers and it erodes American businesses’ competitive edge.” On Monday, this trust at risk, and governments need to help restore it.” Several tech CEOs, including Google’s Larry Page, Yahoo’s Marissa Mayer and Facebook’s Mark Zuckerberg, are personally throwing their weight behind the effort. It’s the most high-profile effort yet The coalition is calling for limits on government authority to collect user information; better oversight and accountability; greater transparency about the government’s demands; respect for the free flow of data across borders; and the avoidance of conflict between governments. “Recent revelations about government surveillance activities have shaken the trust of our users, and it is by the tech titans to repair the damage to their corporate reputations caused by the NSA revelations. time for the United States government to act to restore the confidence of citizens around the world,” said Mayer, Yahoo’s CEO. Page, Google’s CEO, said: “The security of users’ data is critical, which is why we’ve invested so much in encryption and fight for transparency around government requests for information. This is undermined by the apparent wholesale collection of data, in secret and without independent oversight, by many governments around the world.” Monday’s statement by the leading Internet companies is the most forceful sign yet that they are serious about repairing the damage done to their reputations — and future business prospects — by the NSA revelations. But one group of companies that has also been implicated in the Snowden leaks remains conspicuously absent: The nation’s largest telecom companies. Both AT&T and Verizon have remained stone-cold silent about their role in the NSA’s programs. Last week, AT&T said it planned to ignore a shareholder proposal calling for greater transparency about government data requests. The United States government is now at a crossroads. America faces difficult choices about how to balance the vital imperatives of national security and consumer privacy. For years, civil liberties groups warned that the Internet giants posed the greatest risk to privacy in the digital age. After the Snowden revelations, it’s become clear that the gravest threat to civil liberties comes not from the private sector, but from the U.S. government itself. U.S. policymakers must decide if they wish to continue down the path toward an ever-more intrusive surveillance state — risking billions of dollars in damage to the U.S. economy — or apply real oversight and reform to an intelligence apparatus that has undermined confidence in the government and the nation’s most innovative and profitable business.. --xt prism hurts tech lead NSA Surveillance Forces Companies To Move Overseas- IBM Proves Miller ‘14, Graduate from Yale University’s Writing Program (Claire Cain Miller, “Revelations of NSA Spying Cost American Companies”, New York Times, http://www.nytimes.com/2014/03/22/business/fallout-from-snowden-hurting-bottom-line-of-tech-companies.html, March 21, 2014) SAN FRANCISCO — Microsoft has lost customers, including the government of Brazil. IBM is spending more than a billion dollars to build data centers overseas to reassure foreign customers that their information is safe from prying eyes in the United States government. And tech companies abroad, from Europe to South America, say they are gaining customers that are shunning United States providers, suspicious because of the revelations by Edward J. Snowden that tied these providers to the National Security Agency’s vast surveillance program. Even as Washington grapples with the diplomatic and political fallout of Mr. Snowden’s leaks, the more urgent issue, companies and analysts say, is economic. Technology executives, including Mark Zuckerberg of Facebook, raised the issue when they went to the White House on Friday for a meeting with President Obama. It is impossible to see now the full economic ramifications of the spying disclosures — in part because most companies are locked in multiyear contracts — but the pieces are beginning to add up as businesses question the trustworthiness of American technology products. The confirmation hearing last week for the new N.S.A. chief, the video appearance of Mr. Snowden at a technology conference in Texas and the drip of new details about government spying have kept attention focused on an issue that many tech executives hoped would go away. Despite the tech companies’ assertions that they provide information on their customers only when required under law — and not knowingly through a back door — the perception that they enabled the spying program has the United States cloud computing industry could lose $35 billion by 2016. Forrester Research, a technology research firm, said the losses could be as high as $180 billion, or 25 percent of industry revenue, based on the size of the cloud computing, web hosting and outsourcing markets and the worst case for damages. The business effect of the disclosures about the N.S.A. is felt most in the daily lingered. “It’s clear to every single tech company that this is affecting their bottom line,” said Daniel Castro, a senior analyst at the Information Technology and Innovation Foundation, who predicted that conversations between tech companies with products to pitch and their wary customers. The topic of surveillance, which rarely came up before, is now “the new normal” in these conversations, as one tech company executive described it. “We’re hearing from customers, especially global enterprise customers, that they care more than ever about where their content is stored and how it is used and secured,” said John E. Frank, deputy general counsel at Microsoft, which has been publicizing that it allows customers to store their data in Microsoft data centers in certain countries. At the same time, Mr. Castro said, companies say they believe the federal government is only making a bad situation worse. “Most of the companies in this space are very frustrated because there hasn’t been any kind of response that’s made it so they can go back to their customers and say, ‘See, this is what’s different now, you can trust us again,’ ” he said. In some cases, that has meant forgoing potential revenue. Though it is hard to quantify , American businesses are being left off some requests for proposals from foreign customers that previously would have included them, said James Staten, a cloud computing analyst at Forrester who has read clients’ requests for proposals. There are German companies, Mr. Staten said, “explicitly not inviting certain American companies to join.” He missed opportunities added, “It’s like, ‘Well, the very best vendor to do this is IBM, and you didn’t invite them.’ ” The result has been a boon for foreign companies. Runbox, a Norwegian email service that markets itself as an alternative to American services like Gmail and says it does not comply with foreign court orders seeking personal information, reported a 34 percent annual increase in customers after news of the N.S.A. surveillance. Brazil and the European Union, which had used American undersea cables for intercontinental communication, last month decided to build their own cables between Brazil and Portugal, and gave the contract to Brazilian and Spanish companies. Brazil also announced plans to abandon Microsoft Outlook for its own email system that uses Brazilian data centers. Mark J. Barrenechea, chief executive of OpenText, Canada’s largest software company, said an anti-American attitude took root after the passage of the Patriot Act, the counterterrorism law passed after 9/11 that expanded the government’s surveillance powers. But “the volume of the discussion has risen significantly post-Snowden,” he said. For instance, after the N.S.A. surveillance was revealed, one of OpenText’s clients, a global steel manufacturer based in Britain, demanded that its data not cross United States borders. “Issues like privacy are more important than finding the cheapest price,” said Matthias Kunisch, a German software executive who spurned United States cloud computing providers for Deutsche Telekom. “Because of Snowden, our customers have the perception that American companies have connections to the N.S.A.” Security analysts say that ultimately the fallout from Mr. Snowden’s revelations could mimic what happened to Huawei, the Chinese technology and telecommunications company, which was forced to abandon major acquisitions and contracts when American lawmakers claimed that the company’s products contained a backdoor for the People’s Liberation Army of China — even though this claim was companies have complained to government officials that federal actions are hurting American technology businesses. But companies fall silent when it comes to specifics about economic harm, whether to avoid frightening shareholders or because it is too early to produce concrete evidence. “The companies need to keep the priority on the never definitively verified. Silicon Valley government to do something about it, but they don’t have the evidence to go to the government and say billions of dollars are not coming to this country,” Mr. Staten said. Some American companies say the business hit has been minor at most. John T. Chambers, the chief executive of Cisco Systems, said in an interview that the N.S.A. disclosures had not affected Cisco’s sales “in a major way.” Although deals in Europe and Asia have been slower to close, he said, they are still being completed — an experience echoed by several other computing companies. Still, the business blowback can be felt in other ways than lost customers. Security analysts say tech companies have collectively spent millions and possibly billions of dollars adding state-of-the-art IBM said in January that it would spend $1.2 billion to build 15 new data centers, including in London, Hong Kong and Sydney, Australia, to lure foreign customers that are sensitive about the location of their data. Salesforce.com announced similar plans this month. Germany and Brazil, where it was revealed that the N.S.A. spied on government leaders, have been particularly adversarial encryption features to consumer services, like Google search and Microsoft Outlook, and to the cables that link data centers at Google, Yahoo and other companies. toward American companies and the government. Lawmakers, including in Germany, are considering legislation that would make it costly or even technically impossible for American tech companies to operate inside their borders. Yet some government officials say laws like this could have a motive other than protecting privacy. Shutting out American companies “means more business for local companies,” Richard A. Clarke, a former White House counterterrorism adviser, said last month. CHILLING EFFECT 2ac add-on – chilling effect i/l Government Surveillance limits freedom of assembly by creating fear among citizens. Starr et al 08 (Amory Starr-Ph.D. in Sociology from University of California, Luis A. Fernandez- Ph.D. in Justice Studies from Arizona State University, Randall Amster- J.D. from Brooklyn Law School and a Ph.D. in Justice Studies from Arizona State University, Lesley J. Wood- Ph.D. from Columbia University, Manuel J. Caro- Ph.D. in Sociology from the University of Miami, “The Impacts of State Surveillance on Political Assembly and Association: A Socio-Legal Analysis,” Published in Qualitative Sociology, Date: 10 July 2008, http://link.springer.com/article/10.1007/s11133-008-9107-z/fulltext.html) As we have shown, current surveillance is an alarming threat to mobilizations (constitutionally protected assemblies) and social movement organizations (protected associations). Our findings about the post-Seattle era are consistent with studies of previous eras (Marx 1970, 1974, 1979, 1988, 1992; Flam 1998; Churchill and VanderWall 1990, 2002; Donner 1980, 1990; Schultz and Schultz 1989, 2001; Powers 1987; Cunningham 2004; Davenport 2005, 2006; Boykoff 2006) with the enhancements of technology and influenced by the current popular leniency for policing and criminalization. Readers may be surprised by the broadbased nature of current surveillance and by the inclusion of pacifist organizations among targets. However, as Cunningham (2004) has documented, the lack of criminal standard or test is nothing new. And Donner (1990) traces the recent history of “terrorist” accusations against pacifist organizations to the early 1980s targeting of anti-nuclear, anti-death penalty, and Latin American solidarity organizations by local police, as well as federal agencies. Disruptive counterinsurgent activity against organizations which have not met a criminal standard was officially forsworn with the closure of COINTELPRO. Yet these same acts are now undertaken by a network of law enforcement organizations. We are concerned by social movement organizations’ persistent attempt to rationalize surveillance and repression. Rather than opposing government repression, too many organizations work to reinforce a hard line between legal and illegal political activities (a distinction also claimed by the organizations who refused interviews on these grounds), expending extensive resources in “careful wording” which they believe will keep them safe. This conceptual framework simply does not correspond with scholarship on surveillance, which documents a long and continuing history of targeting of non-criminal organizations on the basis of their political ideas. Lack of clarity about who is targeted for surveillance has led to a rationalization of repression, taking the form of blaming young people for their repression (particularly for “provoking” police actions at protests); and little support for “Green Scare” defendants and others facing illegal investigations, “terrorist” indictments, absurd bonds, and decades-long sentences for non-violent political activities. Rationalization collaborates with the creeping criminalization of dissent and political activity. As shown above, the impacts of surveillance on associations included: fundraising, relations with members, reputation and connections with allies, redirection of agendas, displacement of strategic framing, and foreclosure of space for civil disobedience. Interviewees’ quantification of activists who have dropped out due to surveillance was striking. Moreover, rather than finding the customary dualism in which hardcore activists become more militant while others become more moderate . (Lichbach 1995; White 1989; Tarrow 1998; Zwerman and Steinhoff 2005) we found signs of pervasive pacification. In lieu of going “underground” to continue their actions (Davenport 2006; Johnston 2005; Zwerman et al. 2000), organizations are abandoning “grey area” civil disobedience activities and moving toward doing exclusively educational and permitted activities. Yet, knowing that even educational events are under surveillance, organizations do not feel safe even undertaking this most pacific type of action, increasing the risk and burden on groups wishing to participate in democratic dialogue . We heard reports from all types of groups that strategic and ideological dialogue has been both reduced and self-censored. We were most alarmed to find security culture displacing organizing culture in most groups, including peace groups, pacifist groups, and other groups who only do legal activities. Activists concerned about creeping criminalization of grey and formerly legal activity take extreme precautions, foregoing inclusivity and destroying all written records of their work . Groups also reported not taking notes at meetings. “We’re afraid to have a piece of paper with anything written on it at the end of any meeting.” Many interviewees, having internalized suspicion of undercovers, said that they don’t want to be seen writing anything down, as it would make them look as if they are surveilling the meeting. Moreover, concerned about future investigations, they do not keep diaries. This lack of archiving is the destruction in advance of the history of the movement, with implications for social movements’ capacity for active reflexivity. Moreover, affiliations become more temporary and less committed, with the result that “I’ve noticed a big shift from long-term strategizing and community building.” Conservative decisions on the part of activists and organizations are understandable in light of the costs of surveillance to organizational resources. The government provides no administrative mechanisms of accountability for false accusations, improper or unwarranted investigations, or erroneous surveillance. One organization that was illegally searched spent more than 1500 hours of volunteer time dealing with the fallout for their membership and relations with other organizations. Their lawsuit for damages took 5 years to resolve. Of the 71 organizations in our study, only two had managed to take legal action regarding surveillance. Our findings indicate that the harm suffered by political organizations and individuals as a result of widespread surveillance, infiltration, and documentation, is legally cognizable and not at all speculative (cf. ACLU-NCA 2005), suggesting that legal standing can be established to overcome the burdens raised by the case of Laird v. Tatum, 408 US 1 (1972). Based on our reading of Cunningham (2004) and our data, we conclude that much current law enforcement surveillance is more properly conceptualized as counterinsurgency. The implementation of counterinsurgency (whose destructiveness is well-established) against a social movement (whose agenda is well known to be noncriminal) violates the fundamental protections of the First Amendment (which is the foundation of a democratic society, variously conceptualized as a marketplace of ideas, a context of free debate and dissent, or self-governance). Our socio-legal analysis encourages a shift in the unit of analysis and litigation from individual activists and organizations to the context of diverse associational activities which make assembly possible: the social movement. If a social movement could gain standing as a class, it could include event participants who are not members of an organization, as well as dissenters who may have never taken action because of anticipatory conformity. The concept of social movements can bind overt repression, indirect interference (with fundraising, networks, etc.), and intimidating chilling effects. We also point to the need for a legal concept which could provide the basis for complaints regarding violations of the rights of political organizations and movements. Melucci emphasizes “collective action as a social production, as a purposive, meaningful and relational orientation” (1996, p. 386). Associational life depends on membership, donations, and access to space in which people feel comfortable engaging political ideas. Assaults on organizations that deprive them of resources and democratic space, and which burden potential participants with excessive risk amount to what are understood on an individual level as assault or excessive use of force. If private enterprise is protected by tort law from libel, denial of service, interference with customer access to premises, (tortious interference), then nonprofit organizations and civil society groups should also be protected from interference with advantageous relationships that affect their resources, capacity to mobilize them, and opportunity to compete in the marketplace of ideas. --xt prism chills rights Privacy protections are critical human rights law—key to democratic norms Banisar and Davies 98 (This report was written by Privacy International with a grant provided by the Open Society Institute. The primary authors of this report are David Banisar of the Electronic Privacy Information Center and Simon Davies of Privacy International. Additional research was provided by Wayne Madsen, Michael Kassner, Ronnie Breckheimer, and Shauna Van Dongen. Knowledgeable individuals from academia, government, human rights groups and other fields were asked to submit reports and information. Their reports were supplemented with information gathered from Constitutions, laws, international and national government documents, news reports, human rights reports and other sources. A list of contributors is located at Appendix D. 1998, Privacy and Human Rights," Open Society Institute, http://gilc.org/privacy/survey/intro.html, Accessed: 5-26-2015, /Bingham-MB) OVERVIEW Privacy is a fundamental human right recognized in the UN Declaration of Human Rights, the International Convenant on Civil and Political Rights and in many other international and regional treaties. Privacy underpins human dignity and other key values such as freedom of association and freedom of speech. It has become one of the most important human rights issues of the modern age . The publication of this report reflects the growing importance, diversity and complexity of this fundamental right. This report provides details of the state of privacy in fifty countries from around the world. It outlines the constitutional and legal conditions of privacy protection, and summarizes important issues and events relating to privacy and surveillance. Nearly every country in the world recognizes a right of privacy explicitly in their Constitution. At a minimum, these provisions include rights of inviolability of the home and secrecy of communications. Most recently-written Constitutions such as South Africa's and Hungary's include specific rights to access and control one's personal information. In many of the countries where privacy is not explicitly recognized in the Constitution, such as the United States, Ireland and India, the courts have found that right in other provisions . In many countries, international agreements that recognize privacy rights such as the International Covenant on Civil and Political Rights or the European Convention on Human Rights have been adopted into law. In the early 1970s, countries began adopting broad laws intended to protect individual privacy. Throughout the world, there is a general movement towards the adoption of comprehensive privacy laws that set a framework for protection. Most of these laws are based on the models introduced by the Organization for Economic Cooperation and Development and the Council of Europe. In 1995, conscious both of the shortcomings of law, and the many differences in the level of protection in each of its States, the European Union passed a Europe-wide directive which will provide citizens with a wider range of protections over abuses of their data.[fn 1] The directive on the "Protection of Individuals with regard to the processing of personal data and on the free movement of such data" sets a benchmark for national law. Each EU State must pass complementary legislation by October 1998. The Directive also imposes an obligation on member States to ensure that the personal information relating to European citizens is covered by law when it is exported to, and processed in, countries outside Europe. This requirement has resulted in growing pressure outside Europe for the passage of privacy laws. More than forty countries now have data protection or information privacy laws. More are in the process of being enacted. Reasons for Adopting Comprehensive Laws There are three major reasons for the movement towards comprehensive privacy and data protection laws. Many countries are adopting these laws for one or more reasons. To remedy past injustices. Many countries, especially in Central Europe, South America and South Africa, are adopting laws to remedy privacy violations that occurred under previous authoritarian regimes. To promote electronic commerce. Many countries, especially in Asia, but also Canada, have developed or are currently developing laws in an effort to promote electronic commerce. These countries recognize consumers are uneasy with their personal information being sent worldwide. Privacy laws are being introduced as part of a package of laws intended to facilitate electronic commerce by setting up uniform rules. To ensure laws are consistent with Pan-European laws. Most countries in Central and Eastern Europe are adopting new laws based on the Council of Europe Convention and the European Union Data Protection Directive. Many of these countries hope to join the European Union in the near future. Countries in other regions, such as Canada, are adopting new laws to ensure that trade will not be affected by the requirements of the EU Directive. Continuing Problems Even with the adoption of legal and other protections, violations of privacy remain a concern. In many countries, laws have not kept up with the technology, leaving significant gaps in protections. In other countries, law enforcement and intelligence agencies have been given significant exemptions. Finally, in the absence of adequate oversight and enforcement, the mere presence of a law may not provide adequate protection. There are widespread violations of laws relating to surveillance of communications, even in the most democratic of countries. The U.S. State Department's annual review of human rights violations finds that over 90 countries engage in illegally monitoring the communications of political opponents, human rights workers, journalists and labor organizers. In France, a government commission estimated in 1996 that there were over 100,000 wiretaps conducted by private parties, many on behalf of government agencies. In Japan, police were recently fined 2.5 million yen for illegally wiretapping members of the Communist party. Police services, even in countries with strong privacy laws, still maintain extensive files on citizens not accused or even suspected of any crime . There are currently investigations in Sweden and Norway, two countries with the longest history of privacy protection for police files. Companies regularly flaunt the laws, collecting and disseminating personal information. In the United States, even with the long-standing existence of a law on consumer credit information, companies still make extensive use of such information for marketing purposes. THREATS TO PRIVACY The increasing sophistication of information technology with its capacity to collect, analyze and disseminate information on individuals has introduced a sense of urgency to the demand for legislation . Furthermore, new developments in medical research and care, telecommunications, advanced transportation systems and financial transfers have dramatically increased the level of information generated by each individual. Computers linked together by high speed networks with advanced processing systems can create comprehensive dossiers on any person without the need for a single central computer system. New technologies developed by the defense industry are spreading into law enforcement, civilian agencies, and private companies. According to opinion polls, concern over privacy violations is now greater than at any time in recent history. [fn 2] Uniformly, populations throughout the world express fears about encroachment on privacy, prompting an unprecedented number of nations to pass laws which specifically protect the privacy of their citizens. Human rights groups are concerned that much of this technology is being exported to developing countries which lack adequate protections. Currently, there are few barriers to the trade in surveillance technologies. It is now common wisdom that the power, capacity and speed of information technology is accelerating rapidly. The extent of privacy invasion -- or certainly the potential to invade privacy -- increases correspondingly. Beyond these obvious aspects of capacity and cost, there are a number of important trends that contribute to privacy invasion : GLOBALISATION removes geographical limitations to the flow of data. The development of the Internet is perhaps the best known example of a global technology. CONVERGENCE is leading to the elimination of technological barriers between systems. Modern information systems are increasingly interoperable with other systems, and can mutually exchange and process different forms of data. MULTI-MEDIA fuses many forms of transmission and expression of data and images so that information gathered in a certain form can be easily translated into other forms. Technology transfer and policy convergence The macro-trends outlined above have had particular effect on surveillance in developing nations. In the field of information and communications technology, the speed of policy convergence is compressed. Across the surveillance spectrum -- wiretapping, personal ID systems, data mining, censorship or encryption controls -- it is the West which invariably sets a proscriptive pace.[fn 3] Governments of developing nations rely on first world countries to supply them with technologies of surveillance such as digital wiretapping equipment, deciphering equipment, scanners, bugs, tracking equipment and computer intercept systems. The transfer of surveillance technology from first to third world is now a lucrative sideline for the arms industry . [fn 4] According to a 1997 report "Assessing the Technologies of Political Control" commissioned by the European Parliament's Civil Liberties Committee and undertaken by the European Commission's Science and Technology Options Assessment office (STOA), [fn 5] much of this technology is used to track the activities of dissidents, human rights activists, journalists, student leaders, minorities, trade union leaders, and political opponents. The report concludes that such technologies (which it describes as "new surveillance technology") can exert a powerful 'chill effect' on those who "might wish to take a dissenting view and few will risk exercising their right to democratic protest". Large scale ID systems are also useful for monitoring larger sectors of the population. As Privacy International observed, "In the absence of meaningful legal or constitutional protections, such technology is inimical to democratic reform. It can certainly prove fatal to anyone 'of interest' to a regime." Government and citizen alike may benefit from the plethora of IT schemes being implemented by the private and public sectors. New "smart card" projects in which client information is placed on a chip in a card may streamline complex transactions. The Internet will revolutionize access to basic information on government services. Encryption can provide security and privacy for all parties. However, these initiatives will require a bold, forward looking legislative framework. Whether governments can deliver this framework will depend on their willingness to listen to the pulse of the emerging global digital economy and to recognize the need for strong protection of privacy. Gov Surveillance kills freedom of assembly Starr et al 08 (Amory Starr-Ph.D. in Sociology from University of California, Luis A. Fernandez- Ph.D. in Justice Studies from Arizona State University, Randall Amster- J.D. from Brooklyn Law School and a Ph.D. in Justice Studies from Arizona State University, Lesley J. Wood- Ph.D. from Columbia University, Manuel J. Caro- Ph.D. in Sociology from the University of Miami, “The Impacts of State Surveillance on Political Assembly and Association: A Socio-Legal Analysis,” Published in Qualitative Sociology, Date: 10 July 2008, http://link.springer.com/article/10.1007/s11133-008-9107-z/fulltext.html) We now know more about surveillance than how victims feel about it; we also know a good deal about its intents. Cunningham explains that intelligence operations can serve two goals, investigation of federal crimes and (the more controversial) precautionary monitoring through information gathering about organizations. Counterintelligence operations may take a preventative goal, to “actively restrict a target’s ability to carry out planned actions” or may take the form of provocation for the purpose of entrapment of targets in criminal acts. (2004, p. 6) Some of the “normal intelligence” activities undertaken by the FBI outside of official COINTELPRO which nevertheless have a preventative counterintelligence function are: harassment by surveillance and/or purportedly criminal investigations, pressured recruitment of informants, infiltration, break-ins, and labeling or databasing which harms the group’s reputation impacting its ability to communicate with the media, draw new members, and raise funds, “exacerbat[ing] a climate in which seemingly all mainstream institutions opposed the New Left in some way.” In addition, infiltrators acting as agent provocateurs is, inexplicably, a part of normal intelligence operations (pp. 180–214). Can these kinds of operations be understood as violations, not only of individuals’ political rights, but against associations themselves? Since associations and social movements work for decades, they have interests separate from their participants. Previous literature shows that knowledge (or fear) of surveillance and infiltration forces organizations to direct their energies toward defensive maintenance and away from the pursuit of broader goals. (Boykoff 2006; Cunningham 2004; Davenport 2005; Flam 1998; Goldstein 1978; Marx 1970, 1974, 1979, 1988) Alternately, activists may respond by turning from overt collective forms of resistance toward more covert, individualistic forms of resistance (Davenport 2006, Johnston 2005, Zwerman et al. 2000) or to the emergence of more militant, even violent, factions (della Porta 1995). Organizations’ funding, relationships with other groups, the press, and the public may be affected as well (Marx 1970, 1974, 1979, 1988; US Congress 1976; Theoharis 1978; Churchill and Vander Wall 1988; Davenport 2006; Klatch 2002; Schultz and Schultz 2001). The current NSA is threatening individual liberties Jordan 06 (David Alan Jordan- J.D. with honors 2003, Washington and Lee University School of Law “Decrypting the Fourth Amendment: Warrantless NSA Surveillance and the Enhanced Expectation of Privacy Provided by Encrypted Voice Over Protocol” Published: BCL 5/1/06, http://lawdigitalcommons.bc.edu/cgi/viewcontent.cgi?article=2330&context=bclr) The broad scope of the NSA's vigilant efforts has the potential to threaten the legitimate rights of American citizens, and appropriate checks must be in place.234 FISA provides a well-established legal framework that has protected the rights of American citizens from unwarranted government surveillance since 1978.235 Although it appears that this framework recently may have been circumvented through a secret executive order,236 warrantless surveillance of Americans is nothing new.2 37 Gaps in our legal protections have existed since FISA's enactment.2 38 The NSA's minimization procedures provide strong protection for the rights of U.S. citizens under most circumstances, but they allow breaches to occur in situations that are arguably the most crucial. Although the NSA is required to destroy information inadvertently obtained about U.S. citizens in most cases, the current minimization procedures allow the agency effectively to initiate criminal investigations by turning over such information to law enforcement if criminal conduct is revealed. This places Americans at risk of criminal prosecution resulting from warrantless eavesdropping on their private telecommunications. This should not be permitted . Although it may not be practicable for the NSA to obtain a warrant in every case where information about U.S. citizens may be inadvertently acquired, the heightened expectation of privacy provided by encrypted Internet telephony should require additional limitations on what may be done with such information after it is acquired. USSID 18 must be redrafted to forbid the use of inadvertently obtained information for the purpose of initiating criminal investigations against the government would be ensuring that the NSA stays focused on its primary mission-protecting the United States from terrorism and foreign intelligence operations-and not engaging in general criminal investigations domestically . Under the current directive, the NSA has an incentive to collect as much U.S. citizens unless exigent circumstances are presented. By disallowing the use of such information for these purposes, "inadvertently acquired" information as possible. If the possibility of using such information to initiate unrelated criminal investigations were removed, the agency would cease to have an the agency with an incentive to maintain its focus on foreign terrorism and counterintelligence, and it would curb the temptation to stray into unrelated matters more appropriately left to those charged with domestic law enforcement. This solution would allow the NSA to protect U.S. national security, while also enabling American citizens to communicate with foreign acquaintances without fear . It would also have the benefit of restoring public confidence in the NSA, effectively combating the perception that the agency engages in frequent violations of the very rights it was created to defend. incentive to collect information unrelated to its national security mission. This would provide Domestic Surveillance in Status Quo causes “Chilling Effect”, effectively killing civil liberties- Plan Solves Gardella, 06 (Todd, "BEYOND TERRORISM: THE POTENTIAL CHILLING EFFECT ON THE INTERNET OF BROAD LAW ENFORCEMENT LEGISLATION," No Publication, http://search.proquest.com.proxy.lib.umich.edu/pqrl/docview/216777370/fulltext/2801B54E0FF345A4PQ/1?accountid=14667) 48 In addition to privacy issues , there is also concern that this provision will result in a chilling effect upon people 's reading habits.49 Within the context of the Internet, online vendors have claimed this provision has had an adverse impact on ecommerce, with the thrust of the dissension coming from online booksellers.50 Although the government has provided limited information to the public regarding its use of this section,51 the Justice Department disclaims any charges of abuse and suggests that concerns over library surveillance are overblown .52 As with the surveillance provisions, this section was enacted as a sunset provision, scheduled to expire after four years.53 "[T]he Supreme Court has been careful and vigilant in protecting free speech on the Internet."127 The series of cases where the Court sustained online free speech protections against so compelling a governmental interest as the protection of children manifests the Court's deference to free expression in cyberspace.128 Recently, the Supreme Court sought to compel the government to explore alternative technologies as a means to further the government interest rather than rely on legislation that would impermissibly chill protected speech as an incidence to its enforcement .129 In justifying its protective disposition toward cyberspace, the Court has distinguished the Internet from traditional broadcast media.130 The characteristics of the Internet, however, continue to change; the challenge thus lies in developing sound principles to fit a medium where the constituent properties rapidly continue to evolve. Online speech generally is protected by the First Amendment to the same extent as speech in newspapers or magazines. 131 Legislatures have wide latitude, however, to discriminate among various mediabecause such discrimination is based on the medium and is thus content-neutral-when drafting statutory media rights and privileges .132 This leaves open, for example, the question regarding the extent to which those who publish on the Internet can consider themselves "journalists" for the purpose of invoking the privileges customarily granted to that profession.133 As "hloggers"134 continue to log on in droves-and as their influence and value continue to be recognized135-the boundaries of such privileges remain nebulous . Thus , it seems the fundamental status distinction that has granted the press considerable protection in our society cannot be easily translated to apply within cyberspace . The challenge here lies in applying the rights and privileges appurtenant to the status of a person when the distributive nature of the source of online content makes it difficult to classify the persons providing that content.136 Regardless of any ability to claim special press privileges, publishers of online content are still entitled to fundamental free speech protections.137While considering speech within the context of cyberspace, the definition of speech itself warrants discussion. Traditionally, political justifications have served as the strongest basis for protecting speech.138 Several courts, however, have upheld the notion that computer code itself constitutes protected free speech.139 Of course, the Supreme Court has long recognized the notion that " 'all ideas having even the slightest redeeming social importance,' including those concerning 'the advancement of truth, science, morality, and arts' have the full protection of the First Amendment."140 Computer code, however, serves a broader purpose than the mere conveyance of ideas; not only does code have substantial value as a language for communicating ideas,141 but in the aggregate it composes the framework of the Internet, serving as its rivets and I-beams. It also acts as the law of cyberspace.142 As such, computer code falls within the category of multi-purpose speech, warranting strict scrutiny by courts.143Although a prior restraint on the publication of scientific speech has been upheld in lower federal courts on the ground of national security, the Supreme Court has never decided a case in which the issue was the constitutionality of suppressing scientific speech.144 This leaves open the possibility that when the Court does confront this issue, it may be "facing a case where the government's argument for suppression will be hard for the Justices to resist."145 This is especially true considering that "some scientific speech is now capable of facilitating some extremely serious harms ."146While many of the cases that relate to the Internet are a testament to the modern Supreme Court's strong protection of free speech, 147 history demonstrates that the Court has acted with skepticism toward new technology .148 "After all, it took the Court 35 years, two World Wars and a Great Depression to ... extend free speech and free press protections to motion pictures."149 In coupling this perspective of thin protection with the current war on terror, one has to consider that free speech protection on the Internet may be quite fragile .150