2015 NDI 6WS – Topicality Wave 1 **SUBSTANTIAL** MUST BE ELIMINATION Description Substantial modifies curtailment meaning while restriction might normally be a curtailment substantial modifies it to require that it is completely eliminated. 1NC A. Interpretation: Substantially curtailing domestic surveillance necessitates elimination. Substantially is without material qualification Black’s Law 91 (Dictionary, p. 1024) Substantially - means essentially; without material qualification. Sharply curtailing something means eliminating it. Ackerman 14 (Spencer, national security editor for Guardian US. A former senior writer for Wired, “Failure to pass US surveillance reform bill could still curtail NSA powers,” October 3rd, 2014, http://www.theguardian.com/world/2014/oct/03/usa-freedom-act-house-surveillance-powers)//ghsVA Two members of the US House of Representatives are warning that a failure to pass landmark surveillance reform will result in a far more drastic curtailment of US surveillance powers – one that will occur simply by the House doing nothing at all. As the clock ticks down on the 113th Congress, time is running out for the USA Freedom Act, the first legislative attempt at reining in the National Security Agency during the 9/11 era. Unless the Senate passes the stalled bill in the brief session following November’s midterm elections, the NSA will keep all of its existing powers to collect US phone records in bulk, despite support for the bill from the White House, the House of Representatives and, formally, the NSA itself. But supporters of the Freedom Act are warning that the intelligence agencies and their congressional allies will find the reform bill’s legislative death to be a cold comfort. On 1 June 2015, Section 215 of the Patriot Act will expire. The loss of Section 215 will deprive the NSA of the legal pretext for its bulk domestic phone records dragnet. But it will cut deeper than that: the Federal Bureau of Investigation will lose its controversial post-9/11 powers to obtain vast amounts of business records relevant to terrorism or espionage investigations. Those are investigative authorities the USA Freedom Act leaves largely untouched. Section 215’s expiration will occur through simple legislative inertia, a characteristic of the House of Representatives in recent years. Already, the House has voted to sharply curtail domestic Freedom Act in May and voting the following month dragnet surveillance , both by passing the to ban the NSA from warrantlessly searching through its troves of international communications for Americans’ identifying information. Legislators are warning that the next Congress, expected to be more Republican and more hostile to domestic spying, is unlikely to reauthorise Section 215. B. Violation: They only place a restriction or regulation. C. Reasons to prefer 1. Limits – They justify an infinite number of affirmatives – there are thousands of ways the aff could tinker with the scope, target, or means of any of the thousand surveillance programs which makes it impossible for the neg to prepare. 2. Ground – Allows them to spike out of any disad by claiming that they’re only a minor reduction. Forces us to rely on the worst forms of generic argumentation. Competing interpretations, reasonability makes judge intervention inevitable. MUST BE AT LEAST 13% 1NC – 13% A. Interpretation: Substantial indicates that the aff has to reduce surveillance by at least 13%. Substantial Curtailment is at LEAST 13 percent Utter 77 (Utter http://courts.mrsc.org/mc/courts/zsupreme/088wn2d/088wn2d0909.htm, This is from a formal court decision between Shell Oil and the appellant Norward Brooks, Decisions were made by Wright, C.J., and Rosellini, Hamilton, Stafford, Brachtenbach, Horowitz, Dolliver, and Hicks, JJ.) The act specifies the particular circumstances in which one who leaves employment due to a labor dispute may qualify for compensation, despite the voluntary character of such a termination. "An individual shall be disqualified for benefits for any week with respect to which the commissioner finds that his unemployment is due to a stoppage of work which exists because of a labor dispute at the factory, establishment, or other premises at which he is or was last employed . . ." RCW 50.20.090. The parties concede each claimant was unemployed because of the labor dispute. The next issue presented then is whether there was a "stoppage of work" which raises the ancillary issues of how that term is to be defined and whether the record supports the findings of the commissioner. The term "stoppage of work" refers to the operation of the employer's plant or business rather than the activity of individual employees. LAWRENCE BAKING CO. v. UNEMPLOYMENT COMPENSATION COMM'N, 308 Mich. 198, 13 N.W.2d 260, 154 A.L.R. 660 (1944), CERT. DENIED, 323 U.S. 738, 89 L. Ed. 591, 65 S. Ct. 43 (1944). SEE CONSTRUCTION OF PHRASE "STOPPAGE OF WORK" IN STATUTORY PROVISION DENYING UNEMPLOYMENT COMPENSATION BENEFITS DURING STOPPAGE RESULTING FROM LABOR DISPUTE, Annot., 61 A.L.R.3d 693 (1975); Shadur, UNEMPLOYMENT BENEFITS AND THE "LABOR DISPUTE" DISQUALIFICATION, 17 U. Chi. L. Rev. 294 (1950). Cases from other jurisdictions interpreting statutes similar to RCW 50.20.090 are in general agreement that the term "stoppage of work" is most often defined in terms of a substantial curtailment of the employer's overall operations at the particular situs in question. MOUNTAIN STATES TEL. & TEL. CO. v. SAKRISON, 71 Ariz. 219, 225 P.2d 707 (1950); INTER-ISLAND RESORTS, LTD. v. AKAHANE, 46 Hawaii 140, 377 P.2d 715 (1962); GENERAL ELEC. CO. v. DIRECTOR OF EMPLOYMENT SECURITY, 349 Mass. 358, 208 N.E.2d 234 (1965); TRAVIS v. GRABIEC, 52 Ill. 2d 175, 287 N.E.2d 468 (1972). SEE Whether there is a substantial curtailment is resolved by application of a number of established criteria to the facts of the particular case. There are a few fixed boundaries for the meaning of the term "substantial" in this context. The attempts by other courts to devise a formula based upon a percentage of reduction in normal production or operations by which a line delineating substantial from nonsubstantial could be established have varied from 50 percent of normal production in early decisions to as low as a 20 percent decline in business activity in subsequent decisions. More recently, the difficulty of applying a fixed percentage concept to define "substantial" has resulted in courts assessing a Annot., SUPRA, 61 A.L.R.3d 693, 5, at 705. number of factors.¶ The specific criteria accented by the commissioner in this case were whether there was a diminution in production and whether there was a substantial curtailment of other normal nonproduction "operations." The parties concede and the court found there was no curtailment of production. The parties then focused on whether there was a substantial curtailment of other, nonproduction related, operations. Appellant placed its primary emphasis upon disruptions resulting from the necessity to reassign nonproduction personnel. Of the nonproduction staff, a total of 64 employees out of the total employment complement of 381 employees, were reassigned. Because these individuals were not replaced, there was at least a 16 percent reduction in the overall personnel within the employer's operations. Appellant argues a 16 percent reduction in overall personnel constitutes a substantial curtailment of normal employer operations. Jurisdictions outside the state of Washington considering the same question have varied in their conclusions, ranging from a low of perhaps 13 percent to a high of over 50 percent in personnel reduction as being indicative of "substantial curtailment" of employer operations. COMPARE MOUNTAIN STATES TEL. & TEL. CO. v. SAKRISON, SUPRA, AND GENERAL ELEC. CO. v. DIRECTOR OF EMPLOYMENT SECURITY, SUPRA. Appellant asserts first the commissioner's decision was fundamentally wrong as a matter of law in that he failed to consider the nature of the work that was not being performed in relation to the total operation of the refinery, and that he should have considered factors other than simply the reduction in overall personnel. We do not read the record as limiting the commissioner's determination solely to that factor. In this context, in his decision the commissioner discussed at length another case involving a strike at a refinery which is in many respects factually similar to this situation. TRAVIS v. GRABIEC, SUPRA. He emphasized the strike in TRAVIS had caused a severe curtailment in overall operations, including the destroying of work in the treatment and research department and the suspension of construction and maintenance work, as well as truck and barge transportation. He recognized that these factors had led the court in that case to find significant evidence of a stoppage of work despite the fact that for a period of time full production of barrels of oil per day was carried on by a skeleton force working abnormal hours and performing abnormal functions. Later in his opinion the commissioner made it clear that he believed the impact on normal operations caused by the reduction in personnel was not as severe as that in the TRAVIS case. B. Violation: The aff has not substantially curtailed domestic surveillance C. Reasons to prefer 1. Limits- The topic is already massive and has a huge aff side bias. A strict definition of substantial is key to creating debates with clash and negative ground. 2. Topic Research and education- they shift the focus of the topic from discussions about large forms of surveillance to finding the smallest aff. Competing interpretations, reasonability makes judge intervention inevitable. 2NC Overview Our interpretation is the substantial curtailment at the very least is 13% Their interpretation allows for an infinite number of tiny affs that have no substantial negative ground. A big topic restricts debates about specific mechanisms and internal link scenarios and focuses on broad unspecific policies. Modeling policy makers gives us the best form of education because it teaches us methods to solve real world problems. Only our interpretation allows for competitive debates with substantial literature on both sides. Fairness is essential to maintaining the educational practices of debate. Their model incentivizes research on fringe policies, rather than substantive claims about the topic. Lack of negative literature disincentives students from researching and creating case and to instead go for generics. Research skills and education allow debaters to identify problems in the real world and create solutions. Prefer our evidence Our evidence is from an official US court ruling. It is the only evidence that speaks to all official court rulings of the term “substantial curtailment” and says that the lowest a judge has EVER decided is 13%. **CURTAIL** MUST BE ELIMINATION Eliminate – 1NC A. Interpretation: Curtailing domestic surveillance necessitates elimination. Ackerman 14 (Spencer, national security editor for Guardian US. A former senior writer for Wired, “Failure to pass US surveillance reform bill could still curtail NSA powers,” October 3rd, 2014, http://www.theguardian.com/world/2014/oct/03/usa-freedom-act-house-surveillance-powers)//ghsVA Two members of the US House of Representatives are warning that a failure to pass landmark surveillance reform will result in a far more drastic curtailment of US surveillance powers – one that will occur simply by the House doing nothing at all. As the clock ticks down on the 113th Congress, time is running out for the USA Freedom Act, the first legislative attempt at reining in the National Security Agency during the 9/11 era. Unless the Senate passes the stalled bill in the brief session following November’s midterm elections, the NSA will keep all of its existing powers to collect US phone records in bulk, despite support for the bill from the White House, the House of Representatives and, formally, the NSA itself. But supporters of the Freedom Act are warning that the intelligence agencies and their congressional allies will find the reform bill’s legislative death to be a cold comfort. On 1 June 2015, Section 215 of the Patriot Act will expire. The loss of Section 215 will deprive the NSA of the legal pretext for its bulk domestic phone records dragnet. But it will cut deeper than that: the Federal Bureau of Investigation will lose its controversial post-9/11 powers to obtain vast amounts of business records relevant to terrorism or espionage investigations. Those are investigative authorities the USA Freedom Act leaves largely untouched. Section 215’s expiration will occur through simple legislative inertia, a characteristic of the House of Representatives in recent years. Already, the House has voted to sharply curtail domestic Freedom Act in May and voting the following month dragnet surveillance , both by passing the to ban the NSA from warrantlessly searching through its troves of international communications for Americans’ identifying information. Legislators are warning that the next Congress, expected to be more Republican and more hostile to domestic spying, is unlikely to reauthorise Section 215. B. Violation: The aff is a reduction, not a curtailment because it does not eliminate surveillance programs. C. Reasons to prefer 1. Limits – They justify an infinite number of affirmatives – there are thousands of ways the aff could tinker with the scope, target, or means of any of the thousand surveillance programs which makes it impossible for the neg to prepare. 2. Ground – Allows them to spike out of any disad by claiming that they’re only a minor reduction. Forces us to rely on the worst forms of generic argumentation. Competing interpretations, reasonability makes judge intervention inevitable. 2NC Overview Our interpretation is that you must eliminate, not just implement a minor reduction, in order for it to constitute a curtailment. Your aff ____ (Insert Specific Aff Mechanism) ____ which doesn’t meet our interpretation. Topical version of the aff – eliminate instead of reduce which solves all of their offense because it allows us to discuss and learn about their affirmative without collapsing limits and ground. 2NC Limits/Case List XT There are only 3 real evaluative terms in the resolution – defining and limiting them is necessary in order to make this topic manageable. Allowing curtailment to be minor reductions allows the aff to alter any aspect of any surveillance program. The aff could – - Reduce the scope of PRISM by exempting senior citizens. - Reduce the means of PRISM by excluding data from AT&T. - Reduce the amount of money spent on PRISM. - Reduce the duration of the PRISM program. Think about all of the thousands of ways the aff could scale back programs without eliminating them and think about the hundreds of different surveillance programs that exist. Their interpretation collapses the limiting function of the resolution and destroys any semblance of predictable negative ground. MUST BE REDUCTION 1NC – Reduce A. Interpretation: Curtail means to reduce not eliminate. Merriam Webster NO DATE (Merriam Webster Dictionary, Online Dictionary, “Curtail,” http://www.merriam-webster.com/dictionary/curtail)//ghs-VA to reduce or limit (something) B. Violation: The aff eliminates a program. C. Reasons to prefer 1. Topic Education – Congressional debates are about restrictions on current programs not elimination which kills predictable clash and core topic learning. 2. Limits – They allow the aff to defend a massive array of mechanisms that range from small reductions to complete eliminations. Forcing the aff to defend only reduction provides a stable and predictable stasis for negative ground. Competing interpretations, reasonability makes judge intervention inevitable. 2NC Overview Our interpretation is that curtailment means reduction, not elimination. Your aff ____ (Insert Specific Aff Mechanism) ____ which doesn’t meet our interpretation. Topical version of the aff – reduce a specific part of ____ (Insert Aff) ____ rather than eliminate the entire program. Solves their offense because it still constrains the topic literature but allows for more focused and pragmatic debates. 2NC Topic Education XT Policymakers aren’t debating the merits of elimination – rather debates are centered on the question of what additional restrictions are necessary to balance privacy versus security. Their interpretation forces us into a binary between no security or no privacy which eliminates the compromise aspect of policy making. Only our interpretation allows for a reasonable middle ground that fosters pragmatic discussions of surveillance. They focus our discussion on the question of whether or not surveillance programs should exist instead of focusing the discussion on how they should be curtailed. AT: Curtail = Elimination Curtail is distinct from elimination – our evidence is comparative. Williams 2K (Cary, a Lawyer with Williams, Williams & Williams, P.C, “American Federation of Government Employees, Local 1145 and Department of Justice, Federal Bureau of Prisons, United States Penitentiary, Atlanta, GA,” October 4, 2000, http://www.cpl33.info/files/USP_Atlanta__Annual_Leave_during_ART.pdf)//ghs-VA The Agency relies on the language of Article 19, Section 1.2. for its right to "curtail" scheduled annual leave during training. The record is clear that the Agency has limited or curtailed leave during ART in the past, and has the right to do so in the future. But there in curtailing leave during ART is a difference and totally eliminating it . There was no testimony regarding the intent of the parties in including the term "curtail" in Section 1.2., but Websters New Twentieth Century Dictionary (2nd Ed) defines the term as, "to cut short, import of the term "curtail" in the Agreement based on these definitions is to cut back the number of leave slots, but there is no proof the parties intended to give the Agency the right to totally eliminate leave slots in the absence of clear proof of an emergency or other unusual situation. The same dictionary on the other hand defines "eliminate" as, "to take out, get rid of, reject or ornit". From a comparison of the two terms there is clearly a difference in curtailing and eliminating annual leave. I disagree with the Agency's reduce, shorten, lessen, diminish, decrease or abbreviate". The contention that curtailing leave can also mean allowing zero leave slots. If the parties had intended such a result they would have simply stated the Agency could terminate or eliminate annual leave during training and/or other causes. This language would leave no doubt the Agency had the right to implement the policy it put in place for January I through March 25, 2000. That language, however, is not in the Agreement, and the term "curtail" does not allow the Agency to totally eliminate all scheduled annual leave during the year. 2NC Interpretation XT Curtail means to reduce not eliminate. Merriam Webster NO DATE (Merriam Webster Dictionary, Online Dictionary, “Curtail,” http://www.merriam-webster.com/dictionary/curtail)//ghs-VA to reduce or limit (something) Curtail is a reduction in quantity. Oxford NO DATE (Oxford Dictionary, online dictionary, “curtail,” http://www.oxforddictionaries.com/us/definition/american_english/curtail)//ghs-VA Reduce in extent or quantity; impose a restriction on Curtail is to reduce not to eliminate – we have comparative evidence. Barratt and Ord 15 (Own Cotton-Barratt, professor @ University of Oxford, Toby Ord, professor @ University of Oxford, “Existential Risk and Existential Hope: Definitions,” 2015, http://www.fhi.ox.ac.uk/Existential-risk-and-existential-hope.pdf)//ghs-VA Is this an existential catastrophe? Bostrom’s definition doesn’t clearly specify whether it should be considered as one. Either answer leads to some strange conclusions. Saying it’s not an existential catastrophe seems wrong as it’s exactly the kind of thing that we should strive to avoid for the same reasons we wish to avoid existential catastrophes. Saying it is an existential catastrophe is very odd if humanity does escape and recover – then the loss of potential wasn’t permanent after all. The problem here is that potential isn’t binary. Entering the regime certainly seems to curtail the potential, but not to eliminate it. Curtailment are additional regulations. Martin 12 (Robert, J.D., “HUMAN RESOURCES & EMPLOYMENT LAW CUMULATIVE CASE BRIEFS AND NOTES,” October 11, 2012, https://www.lexisnexis.com/Community/labor-employment-law/cfsfilesystemfile.ashx/__key/CommunityServer.Components.PostAttachments/00.00.08.42.73/HumanResources-and-Employment-Law-cumulative-database_2D00_Master-2012-10_2D00_12.doc)//ghs-VA (a) Section 3 intrudes on the field of alien registration, a field in which Congress has left no room for States to regulate. In Hines, a state alienregistration program was struck down on the ground that Congress intended its “complete” federal registration plan to did not allow the States to “curtail or complement” federal law or “enforce additional or auxiliary regulations.” Id., at 66–67. The federal registration framework remains be a “single integrated and all-embracing system.” 312 U. S., at 74. That scheme comprehensive. Because Congress has occupied the field, even complementary state regulation is impermissible. Pp. 8–11. (b) Section 5(C)’s criminal penalty stands as an obstacle to the federal regulatory system. The Immigration Reform and Control Act of 1986 (IRCA), a comprehensive framework for “combating the employment of illegal aliens,” Hoffman Plastic Compounds, Inc. v. NLRB, 535 U. S. 137, 147, makes it illegal for employers to knowingly hire, recruit, refer, or continue to employ unauthorized workers, 8 U. S. C. §§1324a(a)(1)(A), (a)(2), and requires employers to verify prospective employees’ employment authorization status, §§1324a(a)(1)(B), Language in federal documents creates a definite distinction between prohibition and curtailment as a reduction. Department of Justice NO DATE (United States Department of Justice, “National Firearms Act,” https://www.atf.gov/rules-and-regulations/national-firearms-act)//ghs-VA While the NFA was enacted by Congress as an exercise of its authority to tax, the NFA had an underlying purpose unrelated to revenue collection. As the legislative history of the law discloses, its underlying purpose was to curtail, if not prohibit , transactions in NFA firearms. Congress found these firearms to pose a significant crime problem because of their frequent use in crime, particularly the gangland crimes of that era such as the St. Valentine’s Day Massacre. The $200 making and transfer taxes on most NFA firearms were considered quite severe and adequate to carry out Congress’ purpose to discourage or eliminate transactions in these firearms. The $200 tax has not changed since 1934. **ITS** MUST BE GOVERNMENT 1NC – Possessive A. Interpretation: Its means possessive. Dictionary.com NO DATE (Online Dictionary, “its” http://dictionary.reference.com/browse/its)//ghs-VA the possessive form of it1.(used as an attributive adjective) B. Violation: The surveillance must be conducted by the USFG. C. Reasons to prefer 1. Limits – Gives them access to plans based on private surveillance which allows for an infinite number of private industry based affs that makes it impossible for the neg to prepare. 2. Topic Education – They shift the focus from government to corporate surveillance programs which kills predictable clash and core topic learning. Competing interpretations, reasonability makes judge intervention inevitable. 2NC Overview Our interpretation is that the USFG has to conduct the surveillance that the 1AC curtails. Your aff ____ (Insert Specific Aff Mechanism) ____ which isn’t topical. Ours is more qualified A. Grammar Bagovich 13 (Sydnee, bachelor’s degree from Robert Morris University and an MBA from The Katz Graduate School of Business at The University of Pittsburgh, “How to Write Like You Care,” August 01, 2013, http://www.grammarly.com/blog/2013/how-to-write-like-you-care/)//ghs-VA Its, your, and their are all possessive pronouns. Since the possession is already included in the word, no apostrophes are needed. Other possessive pronouns include: my, him, her, our. None of these words require an apostrophe. B. Our authors are all professors and etymologists who analyze the structure and meaning of words. 2NC Limits/Case List XT This topic is massive – the only hope of a limited topic is to draw lines around what kinds of surveillance the government can curtail. Your interpretation justifies the government reducing corporate, private, or any surveillance conducted by a third party. Forcing the neg to research private actors creates an unreasonable research burden and incentivizes defaulting to generics hurting argument innovation. A precise definition of “its” allows us to have in-depth focused debates about the topic. Without the ability to focus preparation, the Affirmative would never have to defend their arguments against a well-equipped opponent, which prevents us from learning how to effectively advocate for our positions. Our interpretation would justify Case List: Big Stick Privacy, FISA Court, Patriot act, Sarbanes Oxley, Drones, Dual Use, and Borders affs. 2NC Topic Education XT The USFG conducts the most egregious forms of surveillance in the status quo that affects everyone – fostering discussions that shift the focus to them creates civic education that enables us to create change and produces the necessary legal language to advocate for reform. Government surveillance always affects everyone versus corporate surveillance that affects certain groups of people. 2NC Interpretation XT Its means possessive. Dictionary.com NO DATE (Online Dictionary, “its” http://dictionary.reference.com/browse/its)//ghs-VA the possessive form of it1.(used as an attributive adjective) Indicates possession as related to the agent. Merriam Webster NO DATE (Merriam Webster Dictionary, online dictionary, “its,” http://www.merriam-webster.com/dictionary/its)//ghs-VA of or relating to it or itself especially as possessor, agent, or object of an action <going to its kennel> <a child proud of its first drawings> <its final enactment into law> Its without the apostrophe indicates possession. Straus 12 (Jane, etymologist, “Its vs. It’s,” April 12, 2012, http://data.grammarbook.com/blog/pronouns/1-grammar-error/)//ghs-VA Rule 1: When you mean it is or it has, use an apostrophe. Examples: It’s a nice day. It’s your right to refuse the invitation. It’s been great getting to know you. Rule 2: When paw. you are using its as a possessive, don’t use the apostrophe. Examples: The cat hurt its **DOMESTIC SURVEILLANCE** CANT RELATE TO FOREIGN POWER 1NC – Domestic A. Interpretation: Domestic means physically within the U.S. borders. DOD 82 (Department of Defense, regulation sets forth procedures governing the activities of DoD intelligence components that affect United States persons, “PROCEDURES GOVERNING THE ACTIVITIES OF DOD INTELLIGENCE COMPONENTS THAT AFFECT UNITED STATES PERSONS,” December 1982, https://fas.org/irp/doddir/dod/d5240_1_r.pdf)//ghs-VA C10.2.1. Domestic activities refers to activities that take place within the United States that do not involve a significant connection with a foreign power, organization or person. C10.2.2. The term organization includes corporations and other commercial organizations, academic institutions, clubs, professional societies, associations, and any other group whose existence is formalized in some manner or otherwise functions on a continuing basis. C10.2.3. An organization within the United States means all organizations physically located within the geographical boundaries of the United States whether or not they constitute a United States persons. Thus, a branch, subsidiary, or office of an organization within the United States, which is physically located outside the United States , is not considered as an organization within the United States. B. Violation: The aff has restricted forms of surveillance that affect foreign powers C. Reasons to prefer 1. Limits – They justify an infinite number of foreign embassy and cable-based monitoring affs shifting the topic base and exploding limits. 2. Topic Education – they shift the focus of the topic away from the way surveillance affects us to how it impacts foreign entities. Competing interpretations, reasonability makes judge intervention inevitable. 2NC Overview Our interpretation is that in order to be considered domestic surveillance it cannot have a significant connection to a foreign power and be within the U.S. Borders. Your aff ____ (Insert Specific Aff Mechanism) ____ which means you don’t meet our interp. Evidence Comparison 1. Our evidence is from the department of defense that gives the governments interpretation of what is considered domestic. Prefer the DOD – they’re one of the largest organizations in the U.S. and in charge of defense. DOD NO DATE (Department of Defense, Government Agency, “About the Department of Defense (DOD),” http://www.defense.gov/about/)//ghs-VA The Department of Defense is America's oldest and largest government agency. With our military tracing its roots back to pre-Revolutionary times, the Department of Defense has grown and evolved with our nation. Today, the Department, headed by Secretary of Defense Ash Carter, is not only in charge of the military, but it also employs a civilian force of thousands. With over 1.4 million men and women on active duty, and 718,000 civilian personnel, we are the nation's largest employer. Another 1.1 million serve in the National Guard and Reserve forces. More than 2 million military retirees and their family members receive benefits. Headquarters of the Department of Defense, the Pentagon is one of the world's largest office buildings. It is twice the size of the Merchandise Mart in Chicago, and has three times the floor space of the Empire State Building in New York. Built during the early years of World War II, it is still thought of as one of the most efficient office buildings in the world. Despite 17.5 miles of corridors it takes only seven minutes to walk between any two points in the building. The national security depends on our defense installations and facilities being in the right place, at the right time, with the right qualities and capacities to protect our national resources. Those resources have never been more important as America fights terrorists who plan and carry out attacks on our facilities and our people. Our military service members and civilians operate in every time zone and in every climate. More than 450,000 employees are overseas, both afloat and ashore. The Defense Department manages an inventory of installations and facilities to keep Americans safe. The Department’s physical plant is huge by any standard, consisting of more than several hundred thousand individual buildings and structures located at more than 5,000 different locations or sites. When all sites are added together, the Department of Defense utilizes over 30 million acres of land. 2. Our evidence is in the context of government surveillance and how it operates in the U.S. 2NC Limits/Case List XT This topic is massive – the only hope of a limited topic is to draw lines around what domestic surveillance is. Allowing domestic to be surveillance that impacts foreign powers allows the aff to curtail surveillance relating to any part of the world. The aff could – - Curtail surveillance of fiber optics that run through our country. - Curtail surveillance of ships passing through our harbors. - Curtail surveillance of foreign embassies - Curtail immigration surveillance from all countries around the world. Our interpretation creates the necessary divide between foreign and domestic that is necessary for a limited topic. Think about the number of ways the aff could scale back programs that have connections to hundreds of foreign powers. Their interpretation collapses the limiting function of the resolution and destroys any semblance of predictable negative ground. Our interpretation limits the topics to debates about the way surveillance affects us as citizens. CANT INVOLVE TARGETS CONSENT 1NC – No Consent A. Interpretation: Surveillance means the target cannot consent. FISA 78 (Foreign Intelligence Surveillance Act, Legal Document Outlining Electronic Surveillance Within The United States For Foreign Intelligence Purposes, “Foreign Intelligence Surveillance Act of 1978. 50 us e 1801,” http://www.gpo.gov/fdsys/pkg/STATUTE-92/pdf/STATUTE-92-Pg1783.pdf)//ghs-VA (f) "Electronic surveillance" means— (1) the acquisition by an electronic, mechanical, or other surveillance device of the contents of any wire or radio communication sent by or intended to be received by a particular, known United States person who is in the United States, if the contents are acquired by intentionally targeting that United States person, under circumstances in which a person •'• has a reasonable expectation of privacy and a warrant would be required for law enforcement purposes; (2) the acquisition by an electronic, mechanical, or other surveillance device of the contents of any wire communication to or from a person in the United States, without the consent of any party thereto , if such acquisition occurs in the United States ; (3) the intentional acquisition by an electronic, mechanical, or other surveillance device of the contents of any radio communication, under circumstances in which a person has a reasonable expectation of privacy and a warrant would be required for law enforcement purposes, and if both the sender and all intended recipients are located within the United States; or (4) the installation or use of an electronic, mechanical, or other surveillance device in the United States for monitoring to acquire information, other than from a wire or radio communication, under circumstances in which a person has a reasonable expectation of privacy and a warrant would be required for law enforcement purposes. B. Violation: The target has consented to the surveillance. C. Reasons to prefer 1. Limits – Would justify an infinite number of affs that curtail contracts between the government and organizations which makes neg prep impossible kills clash. 2. Topic Education – they move the debate away from privacy versus utility which kills predictability and core topic learning. 3. Extra-topicality – Justifies any number of untopical actions, which kills neg prep and causes a rush to generics. Competing interpretations, reasonability makes judge intervention inevitable. 2NC Overview Our interpretation says that the target of surveillance cannot consent to being surveilled. Your aff _____ (Insert Specific Aff Mechanism) _____ which means you don’t meet our interpretation. There’s no topical version of the aff – this aff is a whole separate lit base which is a bad direction for the topic to move in. Meta-data is a huge topic area already and is important to talk about especially with recent controversies. Our interpretation is also more qualified and the basis for federal definitions of domestic surveillance. EPIC 15 (Electronic Privacy Information Center, non-profit organization of legal analysts, “Foreign Intelligence Surveillance Court (FISC),” 2015, https://epic.org/privacy/surveillance/fisa/fisc/)//ghs-VA The FISC has jurisdiction to hear applications for, and issue orders authorizing, four traditional FISA activities: electronic surveillance, physical searches, pen/trap surveillance, and compelled production of business records. In addition, the FISC has jurisdiction to review the government's targeting and minimization procedures related to programmatic surveillance certified under Section 702 of the FISA Amendments Act of 2008. The FISC was originally composed of seven district judges, from seven circuits, appointed by the Chief Justice of the United States to serve for a maximum of seven years. In 2001, amendments in the USA PATRIOT Act increased the number of judges on the Court to eleven, with three required to live within 20 miles of the District of Columbia. The Chief Justice appoints a Presiding Judge for the court from amongst these eleven judges. The FISC operates out of a secure location in the federal courthouse in Washington, D.C., but can authorize searches or surveillance "anywhere within the United States." The FISC operations are largely kept secret due to the sensitive nature of the proceedings, and the court's ex parte process is primarily non-adversarial. The target of the order is not given an opportunity to appear at the hearing or informed of the presence of the order. However, the court rules of procedure do allow the electronic service providers and business order recipients to petition to challenge or modify any order. Records from FISC hearings are not revealed, even to petitioners challenging surveillance orders under the court rules. The FISC has discretion to publish its opinions. FISC Review of FISA Applications Traditional FISA investigative tools include: electronic surveillance, physical searches, pen/trap surveillance, and orders compelling production of business records. In order to conduct electronic surveillance or a physical search, the government must apply to the FISC and show probable cause to believe that the target is a "foreign power" or an "agent of a foreign power." For electronic surveillance, the government must also establish that the facilities are being used by an agent of a foreign power or a foreign power. For physical searches, the government must show that the place to be searched contains "foreign intelligence information" and that it is used, owned, or possessed by an agent of a foreign power or a foreign power. The government must also provide a description of the information sought and the places or facilities that will be searched. When the FISC grants applications for surveillance it issues a "primary order" finding that all the FISA requirements were met . The FISC also issues a "secondary order" providing that "upon request of the applicant," a specified third party must "furnish the applicant forthwith with all information, facilities, or technical assistance necessary" to accomplish the search "in such a manner as will protect its secrecy and produce a minimum of interference." Assisting third parties, such as telephone and Internet service providers, are compensated for any assistance rendered, and can keep certain records under security procedures adopted by the government. 2NC Limits/Case List XT Your interpretation allows for SOX, Fracking Regulation, TSA, and more because you can simply curtail contractual agreements between the government and citizens or corporations which explodes limits because there’s a whole separate lit base about corporations who have agreements with the USFG, your interpretation would allow for curtailment in all of those areas which means the neg is dis-incentivized from doing specific work and will default to generics. Discussions of surveillance is important and we won’t get that if we debate the same two process counterplans. Our interpretation allows for innovation with constraints – SSRA, Big Stick Privacy Affs, FISA Court, and Border 1AC’s are all topical under our interpretation. Limited case lists allow for the negative to have specific prep which guarantees topic specific quality debates and puts both sides on an equal playing field. Government Info Gathering that people or businesses opt into or consent to: - Food stamps SEC Financial Regulatory Compliance Export Control Licensing Federal Standardized Testing Taxes Census FDA Regulatory Compliance Federal Wage Regulations Office of Workers Compensation Program Regulations Federal Contract Compliance Regulations Federal Safety Regulations There are a litany of things businesses consent to information wise to the government – this is JUST TECH. EDGE NO DATE (Enterprise Development & Growth Engine, Execution-MiH EDGE is an unmatched platform, which provides an organization with a capacity to significantly boost the field/front-end effectiveness, “Business Metadata for IT,” http://www.executionmih.com/metadata/business.php)//ghs-VA As you will learn further in Metadata Management section, business Metadata is a bigger challenge than IT metadata, because the IT related meta-data is belonging to an environment, which is mostly owned by IT. Secondly, IT folks are wired to manage these kinds of initiatives. For business environment, this is a fairly new concept and we are still in the beginning of the evolution life-cycle. This by no means underplays challenge related to the technical metadata, as it is not far ahead in the evolution curve. Even today, IT has a challenge for having robust all-encompassing repositories. Examples of the Business Meta-data Business Model Business data models Business Analysis models (for business modeling) Business Hierarchies (from a business analyst point of view) Business dimensions and attributes with business descriptions Data Management Data Groups Data Custodians owning the data Data stewards responsible for the health of the data. Data quality Data quality business rules Data Quality statistics Data Analysis and Reporting Business Reports Definition Data Analysis definition in the reports (what analysis is done in the reports, why and how it is done) Reports structure and layout Performance Management Measures and key performance metrics Performance dashboards and scorecards Documents Rules Policies Standard Operating procedures Legal Contracts Business rules and processes Business Processes Business Rules 2NC Extra-Topicality XT Even if they win their education is good, it’s short circuited by a lack of engagement— if they are not predictable that skews negative strategy and turns education arguments – that was above. Staying within the bounds of the topic is necessary for engagement which is a key internal link to advocacy skills which outweighs their education arguments because it’s the only thing we take from debate. 2NC Ground XT Their interpretation also removes core negative arguments – critiques and disads based around rights violations are removed if the aff can get the target to consent. 2NC Knowledge O/W Debates over meta-data and the NSA and uniquely key now – outweighs your education claims. Mimoso 14 (Michael, award-winning journalist and former Editor of Information Security magazine, a two-time finalist for national magazine of the year. He has been writing for business-to-business IT websites and magazines for over 10 years, with a primary focus on information security, “NSA Reforms Demonstrate Value of Public Debate,” March 26, 2014, https://threatpost.com/nsa-reformsdemonstrate-value-of-public-debate/105052)//ghs-VA The president’s proposal would end the NSA’s collection and storage of phone data; those records would remain with the providers and the NSA would require judicial permission under a new court order to access those records. The House bill, however, requires no prior judicial approval; a judge would rule on the request after the FBI submits it to the telecommunications company. “ It’s absolutely crucial to understand the details of how these things will work ,” the ACLU’s Kaufman said in reference to the “new court order” mentioned in the New York Times report. “There is no substitute for robust Democratic debate in the court of public opinion and in the courts. The system of oversight is broke and issues like these need to be debated in public .” Phone metadata and dragnet collection of digital data from Internet providers and other technology companies is supposed to be used to map connections between foreigners suspected of terrorism and threatening the national security of the U.S. The NSA’s dragnet , however, also swept up communication involving Americans that is supposed to be collected and accessed only with a court order. The NSA stood by claims that the program was effective in stopping hundreds of terror plots against U.S. interests domestic and foreign. Those numbers, however, quickly were lowered as they were challenged by Congressional committees and public scrutiny. “The president said the effectiveness of this program was one of the reasons it was in place,” Kaufman said. “But as soon as these claims were made public, journalists, advocates and the courts pushed back and it could not withstand the scrutiny. It’s remarkable how quickly [the number of] plots turned into small numbers. The NSA was telling FISC the program was absolutely necessary to national security, but the government would not go nearly that far in defending the program. That shows the value of public debate and an adversarial process in courts.” AT: PRISM Not Topical Our interpretation says that the target of surveillance cannot consent to being surveilled. This doesn’t mean they cannot know about it, which is distinct. AT: Hurts Neg Generics Just because certain generics like consult, tradeoff disads, and politics have existed on previous topics doesn’t mean they should on this one – our interpretation incentivizes research and innovation and prevents laziness to defaulting to arguments made on previous topics. Disads like the big data, president powers, corporation’s disad all focus on the topic literature versus bad generics that have existed forever which forces innovation. 2NC Interpretation XT Executives order set the precedent that surveillance means no consent. XO 12333 (Executive Order 12333, “Executive Order 12333--United States intelligence activities,” The provisions of Executive Order 12333 of Dec. 4, 1981, appear at 46 FR 59941, 3 CFR, 1981 Comp., p. 200, http://www.archives.gov/federal-register/codification/executive-order/12333.html)//ghs-VA (b) Electronic surveillance means acquisition of a nonpublic communication by electronic means without the consent of a person who is a party to an electronic communication or, in the case of a nonelectronic communication, without the consent of a person who is visibly present at the place of not including the use of radio direction-finding equipment solely to determine the location of a transmitter. communication, but There’s an across government consensus that surveillance means no consent. Jordan 11 (David Alan Jordan, New York University School of Law, “U.S. Intelligence Law,” 2011, https://books.google.com/books?id=C2b6mqniwyAC&printsec=frontcover#v=onepage&q&f=false)//ghs -VA Administrative Law Executive Order 12333, United States Intelligence Activities, 3.5(C) (20I0) Electronic surveillance means acquisition of a nonpublic communication by electronic means without the consent of a person who is a party to an electronic communication or, in the case of a non-electronic communication, without the consent of a person who is visibly present at the place of communication, but not including the use of radio direction-finding equipment solely to determine the location of a transmitter. Department of Defense Regulation 5240.1-R, Procedures Governing the Activities of DOD Intelligence Components that Affect U.S. Persotis, f DL1.1.9 (Dec. 1982): Electronic Surveillance Acquisition of a nonpublic communication by electronic means without the consent of a person who is a party to an electronic communication or, in the case of a nonelectronic communication, without the consent of a person who is visibly present at the place of communication, but not including the use of radio direction finding equipment solely to determine the location of a transmitter. (Electronic surveillance within the United States is subject to the definitions in the Foreign Intelligence Surveillance Act of 1978 (reference (b)).) Surveillance applied empirically necessitates a lack of consent. Lee et al 12 (Lisa M. Lee, the Office of Surveillance, Epidemiology, and Laboratory Services at the Centers for Disease Control and Prevention (CDC), Charles M. Heilig, with the Tuberculosis Trials Consortium, Angela White, with the J. L. Rotman Institute of Philosophy, University of Western Ontario, “Ethical Justification for Conducting Public Health Surveillance Without Patient Consent,” 2012 January; 102(1): 38–44, http://www.ncbi.nlm.nih.gov/pmc/articles/PMC3490562/)//ghs-VA Public health surveillance by necessity occurs without explicit patient consent . There is strong legal and scientific support for maintaining name-based reporting of infectious diseases and other types of public health surveillance. We present conditions under which surveillance without explicit patient consent is ethically justifiable using principles of contemporary clinical and public health ethics. Overriding individual autonomy must be justified in terms of the obligation of public health to improve population health, reduce inequities, attend to the health of vulnerable and systematically disadvantaged persons, and prevent harm. In addition, data elements collected without consent must represent the minimal necessary interference, lead to effective public health action, and be maintained securely. Surveillance involves access to information that you expect not to be shared without your consent. Lemos 11 (Andre, University of Baha, “Locative Media and Surveillance at the Boundaries of Informational Territories,” 2011, https://books.google.com/books?id=quEd4w61EYoC&printsec=frontcover#v=onepage&q&f=false)//ghsVA The question I would pose is whether the term surveillance can be generalized to cover ALL these actions and systems. I do not believe that when I use Facebook I am under surveillance (the information is protected and there is no intent). But Facebook can be used for surveillance (if there is unauthorized access to my personal data and intent with a view to avoiding or causing something), I am not convinced that control, monitoring and surveillance are the same thing or that systems (social networks) that collect non-nominal data and cross these with other nonnominal data in databases in other systems inherently constitute surveillance. To my mind these systems monitor and control , which is dangerous precisely because such monitoring and control can give rise, a posteriori, to a form of individual or group surveillance. It should be noted that locative media pose a threat to private life and anonymity. Privacy can be defined as the control and possession of personal information, as well as the use that is made of it subsequently. Anonymity in turn implies an absence of information about an individual and an absence of control over the collection of personal information (GOW. 2005). Privacy is one of the pillars of democratic societies, as it: CANT CURTAIL FOREIGN-FOREIGN 1NC – Cannot Be Foreign-to-Foreign A. Interpretation: One end of the communication has to be a citizen of the U.S. located in the U.S. FISA 78 (Foreign Intelligence Surveillance Act, Legal Document Outlining Electronic Surveillance Within The United States For Foreign Intelligence Purposes, “Foreign Intelligence Surveillance Act of 1978. 50 us e 1801,” http://www.gpo.gov/fdsys/pkg/STATUTE-92/pdf/STATUTE-92-Pg1783.pdf)//ghs-VA (f) "Electronic surveillance" means— (1) the acquisition by an electronic, mechanical, or other surveillance device of the contents of any wire or radio communication sent by or intended to be received by a particular, known United States person who is in the United States , if the contents are acquired by intentionally targeting that United States person, under circumstances in which a person •'• has a reasonable expectation of privacy and a warrant would be required for law enforcement purposes; (2) the acquisition by an electronic, mechanical, or other surveillance device of the contents of any wire communication to or from a person in the United States, without the consent of any party thereto, if such acquisition occurs in the United States; (3) the intentional acquisition by an electronic, mechanical, or other surveillance device of the contents of any radio communication, under circumstances in which a person has a reasonable expectation of privacy and a warrant would be required for law enforcement purposes, and if both the sender and all intended recipients are located within the United States; or (4) the installation or use of an electronic, mechanical, or other surveillance device in the United States for monitoring to acquire information, other than from a wire or radio communication, under circumstances in which a person has a reasonable expectation of privacy and a warrant would be required for law enforcement purposes. B. Violation: The sender or receiver are not from the U.S. C. Reasons to prefer 1. Limits – Justifies affs that choose any country of the week exploding limits which kills neg prep causing a rush to generics. 2. Topic Education – Shifts the controversy away from constitutional rights violations of citizens that are at the core of the topic lit which hurts predictability and core topic learning. Competing interpretations, reasonability makes judge intervention inevitable. 1NC – PRISM Violation Repealing PRISM isn’t T – Collects foreigners’ information. Saletan 13 (Will Salten, writer @ Slate, “PRISM Planet,” Jun 6, 2013, http://www.slate.com/articles/technology/technology/2013/06/prism_and_u_s_citizens_does_the_gov ernment_s_cyber_surveillance_program.html)//ghs-VA This is the problem at the core of PRISM, a U.S. surveillance program disclosed yesterday by the Washington Post and the Guardian. The government has decided that the difficulty of distinguishing foreigners from Americans won’t be its problem anymore. It will be your problem. Counterterrorism officers will scan everything that goes through the Internet, collect the stuff that sounds like it might belong to foreigners, and figure out later whether what they’re reading actually belongs to a U.S. citizen . Unlike the NSA’s phone surveillance program (code-named BLARNEY), which I defended yesterday, PRISM captures the content of electronic communications, not just “metadata” such as the time and length of phone calls. A PRISM briefing slide lists the kinds of materials intelligence analysts can get through the system, including email, videos, VoIP, and online chats. The Post, paraphrasing a “User’s Guide for PRISM Skype Collection,” says Skype “can be monitored for audio when one end of the call is a conventional telephone and for any combination of ‘audio, video, chat, and file transfers’ when Skype users connect by computer alone.” The official who leaked this document told the Post that through PRISM, surveillance officers “literally can watch your ideas form as you type.” 2NC Overview Our interpretation is that in order for something to be considered surveillance the data must be received or sent by a U.S. Citizen residing in the U.S. They ____ (Insert Specific Aff Mechanism) ____ which means they don’t meet our interpretation. Our interpretation is also more qualified and the basis for federal definitions of domestic surveillance. EPIC 15 (Electronic Privacy Information Center, non-profit organization of legal analysts, “Foreign Intelligence Surveillance Court (FISC),” 2015, https://epic.org/privacy/surveillance/fisa/fisc/)//ghs-VA The FISC has jurisdiction to hear applications for, and issue orders authorizing, four traditional FISA activities: electronic surveillance, physical searches, pen/trap surveillance, and compelled production of business records. In addition, the FISC has jurisdiction to review the government's targeting and minimization procedures related to programmatic surveillance certified under Section 702 of the FISA Amendments Act of 2008. The FISC was originally composed of seven district judges, from seven circuits, appointed by the Chief Justice of the United States to serve for a maximum of seven years. In 2001, amendments in the USA PATRIOT Act increased the number of judges on the Court to eleven, with three required to live within 20 miles of the District of Columbia. The Chief Justice appoints a Presiding Judge for the court from amongst these eleven judges. The FISC operates out of a secure location in the federal courthouse in Washington, D.C., but can authorize searches or surveillance "anywhere within the United States." The FISC operations are largely kept secret due to the sensitive nature of the proceedings, and the court's ex parte process is primarily non-adversarial. The target of the order is not given an opportunity to appear at the hearing or informed of the presence of the order. However, the court rules of procedure do allow the electronic service providers and business order recipients to petition to challenge or modify any order. Records from FISC hearings are not revealed, even to petitioners challenging surveillance orders under the court rules. The FISC has discretion to publish its opinions. FISC Review of FISA Applications Traditional FISA investigative tools include: electronic surveillance, physical searches, pen/trap surveillance, and orders compelling production of business records. In order to conduct electronic surveillance or a physical search, the government must apply to the FISC and show probable cause to believe that the target is a "foreign power" or an "agent of a foreign power." For electronic surveillance, the government must also establish that the facilities are being used by an agent of a foreign power or a foreign power. For physical searches, the government must show that the place to be searched contains "foreign intelligence information" and that it is used, owned, or possessed by an agent of a foreign power or a foreign power. The government must also provide a description of the information sought and the places or facilities that will be searched. When the FISC grants applications for surveillance it issues a "primary order" finding that all the FISA requirements were met . The FISC also issues a "secondary order" providing that "upon request of the applicant," a specified third party must "furnish the applicant forthwith with all information, facilities, or technical assistance necessary" to accomplish the search "in such a manner as will protect its secrecy and produce a minimum of interference." Assisting third parties, such as telephone and Internet service providers, are compensated for any assistance rendered, and can keep certain records under security procedures adopted by the government. Proves our argument about limits and predictability – our evidence is contextualized to the USFG and shows that it excludes foreign-to-foreign communication which means we never had the ability to prepare. 2NC Limits/Case List XT The phrase “domestic surveillance” allows the aff to do potentially anything within the U.S. The only chance of limiting the topic is through defining the area and targets they can surveil. Your interpretation allows you to choose any country of the week to base your advantages around based on the extra-topical portions of the plan. Under-limiting the topic is dangerous because allowing them to access the data of foreign-domestic surveillance explodes affirmative ground and gives them the ability to choose advantages all around the world which causes the neg to rush to generic process CP’s and destroys in depth debate which crushes topic education and engagement. Outweighs because detailed and precise debates on this topic are especially important. Mimoso 14 (Michael, award-winning journalist and former Editor of Information Security magazine, a two-time finalist for national magazine of the year. He has been writing for business-to-business IT websites and magazines for over 10 years, with a primary focus on information security, “NSA Reforms Demonstrate Value of Public Debate,” March 26, 2014, https://threatpost.com/nsa-reformsdemonstrate-value-of-public-debate/105052)//ghs-VA The president’s proposal would end the NSA’s collection and storage of phone data; those records would remain with the providers and the NSA would require judicial permission under a new court order to access those records. The House bill, however, requires no prior judicial approval; a judge would rule on the request after the FBI submits it to the telecommunications company. “ It’s absolutely crucial to understand the details of how these things will work ,” the ACLU’s Kaufman said in reference to the “new court order” mentioned in the New York Times report. “There is no substitute for robust Democratic debate in the court of public opinion and in the courts. The system of oversight is broke and issues like these need to be debated in public .” Phone metadata and dragnet collection of digital data from Internet providers and other technology companies is supposed to be used to map connections between foreigners suspected of terrorism and threatening the national security of the U.S. The NSA’s dragnet , however, also swept up communication involving Americans that is supposed to be collected and accessed only with a court order. The NSA stood by claims that the program was effective in stopping hundreds of terror plots against U.S. interests domestic and foreign. Those numbers, however, quickly were lowered as they were challenged by Congressional committees and public scrutiny. “The president said the effectiveness of this program was one of the reasons it was in place,” Kaufman said. “But as soon as these claims were made public, journalists, advocates and the courts pushed back and it could not withstand the scrutiny. It’s remarkable how quickly [the number of] plots turned into small numbers. The NSA was telling FISC the program was absolutely necessary to national security, but the government would not go nearly that far in defending the program. That shows the value of public debate and an adversarial process in courts.” Easy topical version of the aff – you simply limit the targets to be individuals who are sending or receiving messages and are U.S. citizens living within the U.S. This means the same types of plans are justified but the targets are differentiated which gives reasonable limits on the affirmative in terms of ground which promotes equity of ground. 2NC Topic Education XT You shift the debate away from the heart of the topic – all controversy surrounding surveillance programs are round constitutional violations such as the fourth amendment. Shifting the debate away from there takes away critical neg ground such as critiques with rights based links and disads based on the perception of the plans effect on U.S. citizens. Also proves our predictability arguments – shifting the stasis puts us at a disadvantage leaving us unprepared and destroys fairness meaning the aff wins every debate on squirrely affs. AT: FISA Doesn’t Spec U.S. Persons Protect America Act clarifies that in order for it to be surveillance it has to be sent or received by a Citizen of the US located within the US, being intentionally targeted. Bazan 8 (Elizabeth B. Bazan, Legislative Attorney American Law Division, “P.L. 110-55, the Protect America Act of 2007: Modifications to the Foreign Intelligence Surveillance Act,” February 14, 2008, https://www.fas.org/sgp/crs/intel/RL34143.pdf)//ghs-VA New Section 105A of FISA, as added by Section 2 of P.L. 110-55, states: Nothing under section 101(f) shall in the definition of electronic surveillance be construed to encompass surveillance directed at a person reasonably believed to be located outside of the United States . Section 101(f) of FISA, 50 U.S.C. § 1801(f), sets forth the definition of “electronic surveillance” under the statute. It provides: (f) “Electronic surveillance” means — (1) the acquisition by an electronic, mechanical, or other surveillance device of the contents of any wire or radio communication sent by or intended to be received by a particular, known United States person6 who is in the United States, if the contents are acquired by intentionally targeting that United States person , under circumstances in which a person has a reasonable expectation of privacy and a warrant would be required for law enforcement purposes; 2NC Interpretation XT Foreign-to-foreign communication isn’t topical – it’s foreign intelligence. Mayer 14 (Jonathan, Lawyer @ Stanford, “Executive Order 12333 on American Soil, and Other Tales from the FISA Frontier,” December 3, 2014, http://webpolicy.org/2014/12/03/eo-12333-on-americansoil/)//ghs-VA The United States is the world’s largest telecommunications hub. Internet traffic and voice calls are routinely routed through the country, even though both ends are foreign. According to leaked documents, the NSA routinely scoops up many of these two-end foreign communications as they flow through American networks.2 The agency calls it “ International Transit Switch Collection,” operated under “Transit Authority.” That authority stems from Executive Order 12333, not the Foreign Intelligence Surveillance Act. FISA surveillance defines domestic surveillance as communication that begins or ends in the US. Mayer 14 (Jonathan, Lawyer @ Stanford, “Executive Order 12333 on American Soil, and Other Tales from the FISA Frontier,” December 3, 2014, http://webpolicy.org/2014/12/03/eo-12333-on-americansoil/)//ghs-VA The term “electronic surveillance” has a precise (and counterintuitive) meaning in FISA. There are multiple parts to the definition; the component that directly addresses wireline intercepts is 50 U.S.C. § 1801(f)(2). It encompasses: the acquisition . . . of the contents of any wire communication to or from a person in the United States . . . if such acquisition occurs in the United States A two-end foreign communication is, of course, not “to or from a person in the United States.” When the NSA intercepts a two-end foreign wireline communication, then, it hasn’t engaged in “electronic surveillance.”3 Domestic Surveillance can’t involve a significant foreign connection. Jordan 11 (David Alan Jordan, New York University School of Law, “U.S. Intelligence Law,” 2011, https://books.google.com/books?id=C2b6mqniwyAC&printsec=frontcover#v=onepage&q&f=false)//ghs -VA C2.2.3. Domestic activities refers to activities that take place within the United States that do not involve a significant connection with a foreign power, organization, or person. Foreign-to-foreign, even if the data permeates the U.S., is foreign surveillance. Mayer 14 (Jonathan, Lawyer @ Stanford, “Executive Order 12333 on American Soil, and Other Tales from the FISA Frontier,” December 3, 2014, http://webpolicy.org/2014/12/03/eo-12333-on-americansoil/)//ghs-VA 3. These Aren’t “Domestic” Communications Under FISA and the Wiretap Act Both the Wiretap Act and FISA include exclusivity provisions. The Wiretap Act text, in 18 U.S.C. § 2511(2)(f), reads: [Procedures] in [the Wiretap Act, the Stored Communications Act, and FISA] shall be the exclusive means by which electronic surveillance, as defined in [FISA], and the interception of domestic wire, oral, and electronic communications may be conducted. The similar FISA text, in 50 U.S.C. § 1812, says: Except as [otherwise expressly authorized by statute,] the procedures of [the Wiretap Act, the Stored Communications Act, the Pen Register Act, and FISA] shall be the exclusive means by which electronic surveillance and the interception of domestic wire, oral, or electronic communications may be conducted. Once again unpacking the legalese, these parallel provisions establish exclusivity for 1) “electronic surveillance” and 2) interception of “domestic” communications. As I explained above, intercepting a twoend foreign wireline communication doesn’t constitute “electronic surveillance .” As for what counts as a “domestic” communication, the statutes seem to mean a communication wholly within the United States.7 A two-end foreign communication would plainly flunk that definition. So, there’s the threestep maneuver. If the NSA intercepts foreign-to-foreign voice or Internet traffic, as it transits the United States, that isn’t covered by either FISA or the Wiretap Act. All that’s left is Executive Order 12333. MUST HAVE EXPECTATION OF PRIVACY 1NC – Expectation of Privacy Surveillance requires a violation of someone’s reasonable expectation of privacy. FISA 78 (Foreign Intelligence Surveillance Act, Legal Document Outlining Electronic Surveillance Within The United States For Foreign Intelligence Purposes, “Foreign Intelligence Surveillance Act of 1978. 50 us e 1801,” http://www.gpo.gov/fdsys/pkg/STATUTE-92/pdf/STATUTE-92-Pg1783.pdf)//ghs-VA (f) "Electronic surveillance" means— (1) the acquisition by an electronic, mechanical, or other surveillance device of the contents of any wire or radio communication sent by or intended to be received by a particular, known United States person who is in the United States, if the contents are acquired by intentionally targeting that United States person, under circumstances in which a person •'• has a reasonable expectation of privacy and a warrant would be required for law enforcement purposes ; (2) the acquisition by an electronic, mechanical, or other surveillance device of the contents of any wire communication to or from a person in the United States, without the consent of any party thereto, if such acquisition occurs in the United States; (3) the intentional acquisition by an electronic, mechanical, or other surveillance device of the contents of any radio communication, under circumstances in which a person has a reasonable expectation of privacy and a warrant would be required for law enforcement purposes, and if both the sender and all intended recipients are located within the United States; or (4) the installation or use of an electronic, mechanical, or other surveillance device in the United States for monitoring to acquire information, other than from a wire or radio communication, under circumstances in which a person has a reasonable expectation of privacy and a warrant would be required for law enforcement purposes. B. Violation: C. Reasons to prefer 1. Limits – infinitely increases the number of affs and reduces the topic to simple observation – explodes limits and makes neg prep impossible which causes a rush to generics. 2. Topic Education – Shifts the topic away from rights violations which is at the core of the topic lit which wrecks predictability and kills topic education. Competing interpretations, reasonability makes judge intervention inevitable. 1NC – TSA Violation No expectation of privacy at the airport. Cavuto 15 (Neil, reporter @ Fox News, “TSA Official Shares Photo of Passenger's Cash-Filled Luggage on Twitter,” July 1st, 2015, http://insider.foxnews.com/2015/07/01/tsa-official-tweets-photopassengers-cash-filled-luggage-twitter)//ghs-VA Farbstein told The Washington Post that "the carry-on bag of the passenger alarmed because of the large unknown bulk in his carry-on bag. When TSA officers opened the bag to determine what had caused the alarm, the money was sitting inside. Quite unusual. TSA alerted the airport police, who were investigating." She did not respond to questions about whether posting the photo to social media violated the passenger's privacy rights. On "Your World," attorney Lisa Giovinazzo said the incident is strange, but passengers can't expect to have privacy while traveling. " There's no expectation of privacy , we all go through the same security and we know that everything will be scanned," she stated. 2NC Overview Our interpretation is that in order for something to be considered surveillance the target they’re surveilling needs to have a reasonable expectation of privacy based on legal precedent. Your aff ____ (Insert Specific Aff Mechanism) ____ which means you don’t meet our interpretation. Our interpretation is also more qualified and the basis for federal definitions of domestic surveillance. EPIC 15 (Electronic Privacy Information Center, non-profit organization of legal analysts, “Foreign Intelligence Surveillance Court (FISC),” 2015, https://epic.org/privacy/surveillance/fisa/fisc/)//ghs-VA The FISC has jurisdiction to hear applications for, and issue orders authorizing, four traditional FISA activities: electronic surveillance, physical searches, pen/trap surveillance, and compelled production of business records. In addition, the FISC has jurisdiction to review the government's targeting and minimization procedures related to programmatic surveillance certified under Section 702 of the FISA Amendments Act of 2008. The FISC was originally composed of seven district judges, from seven circuits, appointed by the Chief Justice of the United States to serve for a maximum of seven years. In 2001, amendments in the USA PATRIOT Act increased the number of judges on the Court to eleven, with three required to live within 20 miles of the District of Columbia. The Chief Justice appoints a Presiding Judge for the court from amongst these eleven judges. The FISC operates out of a secure location in the federal courthouse in Washington, D.C., but can authorize searches or surveillance "anywhere within the United States." The FISC operations are largely kept secret due to the sensitive nature of the proceedings, and the court's ex parte process is primarily non-adversarial. The target of the order is not given an opportunity to appear at the hearing or informed of the presence of the order. However, the court rules of procedure do allow the electronic service providers and business order recipients to petition to challenge or modify any order. Records from FISC hearings are not revealed, even to petitioners challenging surveillance orders under the court rules. The FISC has discretion to publish its opinions. FISC Review of FISA Applications Traditional FISA investigative tools include: electronic surveillance, physical searches, pen/trap surveillance, and orders compelling production of business records. In order to conduct electronic surveillance or a physical search, the government must apply to the FISC and show probable cause to believe that the target is a "foreign power" or an "agent of a foreign power." For electronic surveillance, the government must also establish that the facilities are being used by an agent of a foreign power or a foreign power. For physical searches, the government must show that the place to be searched contains "foreign intelligence information" and that it is used, owned, or possessed by an agent of a foreign power or a foreign power. The government must also provide a description of the information sought and the places or facilities that will be searched. When the FISC grants applications for surveillance it issues a "primary order" finding that all the FISA requirements were met . The FISC also issues a "secondary order" providing that "upon request of the applicant," a specified third party must "furnish the applicant forthwith with all information, facilities, or technical assistance necessary" to accomplish the search "in such a manner as will protect its secrecy and produce a minimum of interference." Assisting third parties, such as telephone and Internet service providers, are compensated for any assistance rendered, and can keep certain records under security procedures adopted by the government. 2NC Limits/Case List XT The phrase “domestic surveillance” without constraint allows the aff to do virtually anything – creating a limited interpretation that allows for innovation with constraint is necessary to produce good debates. Reducing the topic to simple observation on anything allows the aff to run functionally unlimited number of plans. They would justify watching TSA, Sarbanes Oxley, Borders, or any aff based around pure observation and completely lacks a legal basis. Your interpretation would allow for curtailment in all of those areas which means the neg never has specific prep and is forced to read generics. That leads to un-educational repetitive debates and puts the negative at a huge disadvantage which turns their education arguments. Our interpretation would allow for SSRA, FISA Court Affs, Employee Protection affs, which still allows for innovation within all the federal programs but still places constraints that promotes equitable ground. 2NC Topic Education XT You shift the debate away from the heart of the topic – all controversy surrounding surveillance programs are round constitutional violations such as the fourth amendment. Shifting the debate away from there takes away critical neg ground such as critiques with rights based links and disads based on the perception of the plans effect on U.S. citizens. Also proves our predictability arguments – shifting the stasis puts us at a disadvantage leaving us unprepared and destroys fairness meaning the aff wins every debate on squirrely affs. AT: Smith v Maryland/Katz Federal courts have concluded that people’s emails have a reasonable expectation of privacy – it’s still under the purview of the fourth amendment. Team 14 2011 (Online anonymous blog concerned with surveillance in the 21st Century, “Reasonable Expectation of Privacy,” April 2011, https://wikispaces.psu.edu/display/IST432SP11Team14/Reasonable+Expectation+of+Privacy)//ghs-VA Privacy is defined as "the expectation that confidential personal information disclosed in a private place will not be disclosed to third parties, when that disclosure would cause either embarrassment or emotional distress to a person of reasonable sensitivities". Reasonable expectation of privacy is an issue dealing with the Fourth Amendment of the United States Constitution. In the constitution the Fourth Amendment known as "The right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures, shall not be violated, and no Warrants shall issue, but upon probable cause, supported by Oath or affirmation, and particularly describing the place to be searched, and the persons or things to be seized." To learn more about the Fourth Amendment click here. Expectation of privacy is defined as the belief in the existence of freedom from unwanted governmental intrusion of personal property, house, or persons. Expectation of privacy is similar but not the same thing as right of privacy . There are two different types of reasonable expectation of privacy, subjective expectation of privacy and objective, legitimate or reasonable expectation of privacy. Subjective expectation of privacy is the opinion of someone that a certain event or occurrence is private whereas objective, legitimate, or reasonable expectation of privacy is a generalized idea of privacy known by society. A person may not have an expectation of privacy in public places except a ones residence, hotel room, in a place of business, public restroom, private portions of a jailhouse, and or a phone booth. A personal vehicle is known as a subjective expectation of privacy, but does not always fall under the category of objective expectation of privacy, like a house. The expectation of privacy plays a crucial part when deciding if a search and seizure is a correct or incorrect. In order to follow the Fourth Amendment, the US congress has come up with a two part test to help make a decision if a search and seizure is appropriate. The two circumstances of the test are; (1) governmental action must take into consideration the individual's subjective expectation of privacy and (2) the expectation of privacy must be reasonable, in that society agrees and recognizes it. Since the Fourth Amendment was written way before any kind of technology with memory capabilities, the law has adapted and caught up with the times. Surveillance equipment has recently diminished the expectation of privacy . With today's technology, we can watch and predict criminals next moves. Also, we can find out information about a person and look up background and history information. Computer and internet users are constantly logging their history onto their hard drives. Government forces can retrieve this information and use it in a trial if needed. E-mails, e-mail addresses, IP addresses, and websites are all recorded and could be searched. Today, the Federal courts agree that the sender of an email has an objectively reasonable expectation of privacy in the content of a message while it is in transmission. Even under Katz there’s still no expectation of privacy. Donahue 14 (Laura K, Prof Law @ Georgetown Law Center, "ARTICLE: BULK METADATA COLLECTION: STATUTORY AND CONSTITUTIONAL CONSIDERATIONS," Summer 2014, 37 Harv. J.L. & Pub. Pol'y 757)//ghs-VA Under Katz, in turn, Americans do not expect that their telephony metadata will be collected and analyzed. n20 Most Americans do not even realize what can be learned from such data, making invalid any claim that they reasonably expect the government to have access to such information. The courts also have begun to recognize, in a variety of contexts, the greater incursions into privacy represented by new technologies. AT: No Expectation of Privacy for PRISM Data mining still violates reasonable expectations of privacy – the fourth amendment simply operates in a diminished capacity. Grier 1 (Manton M. Grier, Graduated @ Colombia University, “Software Formerley known as Carnivore: When Does E-Mail Surveillance Encroach upon a Reasonable Expectation of Privacy,” 2001, http://heinonline.org/HOL/LandingPage?handle=hein.journals/sclr52&div=43&id=&page=)//ghs-VA B. What is a Reasonable Expectation of Privacy? Although not explicit in the United States Constitution, a reasonable expectation of privacy exists in the context of the Fourth Amendment's right to be free from unreasonable searches and seizures. In Katz v. United States,6 the United States Supreme Court accepted this view by declaring "the Fourth Amendment protects people, not places."37 In Katz the Court held that recording Katz's telephone conversations in aphone booth constituted a search under the Fourth Amendment because the conduct "violated the privacy upon which he justifiably relied while using the telephone booth . . . ."' Although the Katz majority opinion did not mention the phrase "reasonable expectation of privacy," Justice Harlan formulated a test in his concurrence for measuring this expectation.3 Under Justice Harlan's test a search violates a person's reasonable expectation of privacy if (1) the person has exhibited an actual (subjective) expectation of privacy and (2) that expectation is one which society recognizes as reasonable (objective).' Justice Harlan, however, later de-emphasized the importance of a subjective expectation of privacy.4' Moreover, he suggested an expectation must be more than merely reasonable; something else was required.42 He proposed the "something else" was a balancing of "the nature of a particular practice and the likely extent of its impact on the individual's sense of security balanced against the utility of the conduct as a technique of law enforcement." Subsequent Supreme Court cases have held that the reasonableness of a search, and whether a legitimate expectation of privacy exists, is determined by balancing the needs of the government versus the rights of a particular individual." Thus, an individual may possess an expectation of privacy, but this expectation is unreasonable if the court concludes that the governmental interest outweighs the individual's privacy interest.45 When an individual's expectation of privacy is deemed unreasonable, the Fourth Amendment provides no protection, regardless of whether a warrant was properly obtained.' However, if an individual's expectation is reasonable, the Fourth Amendment provides protection from police intrusion absent a warrant supported by probable cause. 7 Finding bright guidelines for this balancing test has proved elusive. Nevertheless, delineations of what is considered a reasonable expectation of privacy, however vague, can be placed on a spectrum,"8 and the Court will recognize those expectations as either legitimate, diminished, or altogether nonexistent."9 On one end of this spectrum are situations where an individual experiences the greatest expectation of privacy. Thus, legitimate expectations are found, for example, in the privacy of one's home, especially at night,5" or in one's personal effects."' In the middle of this spectrum are instances where an individual experiences a diminished expectation, such as in a car 2 or at a business establishment.53 However, perhaps the best way to define a reasonable expectation of privacy is to examine those situations where there is no legitimate expectation. Thus, the Supreme Court has found, for example, there is no reasonable expectation of privacy in the contents of a conversation divulged to a third party,54 in something knowingly exposed to the public,5 or in the garbage on the side of the street. C. A Reasonable Expectation of Privacy While Using E-Mail Electronic mail, commonly known as "e-mail," is a medium of communication transmitted via computers connected over either the Internet (World Wide Web) or an intranet (your office system). 7 In many respects, email is a hybrid of the postal mail and the telephone. Communication via e-mail is similar to postal mail because both (1) are written communications; (2) allow for the attachment of items, such as files or pictures; (3) lack voice inflection, which affects the recipient's ability to judge the tone of the communication; and (4) cannot be retracted once sent. On the other hand, e-mail is similar to a phone call because the communication is virtually instantaneous and is electronic, meaning it is capable of being intercepted by electronic means. Understanding how an e-mail message is sent and received requires a cursory understanding of how the Internet works. The Internet is basically "a network of networks." 'Rather than a physical entity, it is "a giant network which interconnects innumerable smaller groups of linked computer networks." 59 Because the smaller networks are owned by various individuals or organizations, public and private, the Internet is essentially a decentralized, global cyberspace that links the entire world. When an e-mail is sent via the Internet, the message is not sent as a whole entity; rather, it is divided into a series of "packets" which are reassembled at the receiving end.6' These packets may take many and varying paths to their destination."2 If certain computers along the path become overloaded, some packets will travel through less congested computers.63 Because e-mail is not sealed or secure, intermediate computers may be used to access or. view the message, unless it is encrypted.' The first federal appellate court to address the issue of an individual's reasonable expectation of privacy in the use of e-mail was the Court of Appeals for the Armed Forces.6 In United States v. Maxwell the appellant had been convicted of knowingly transporting or receiving child pornography in violation of the Sexual Exploitation and Other Abuse of Children Act of 1978.6 The appellant was discovered by an FBI sting that targeted a child pornography ring operating on the Internet service provider America Online (AOL).67 On the one hand, the court found that the appellant "possessed a reasonable expectation of privacy , albeit a limited one," in the e-mails he sent via AOL." The court stressed that these e-mail messages were privately stored by AOL,69 thus affording more protection than, for example, an e-mail transmitted at work. The court, however, also determined that expectations of privacy depend on the type of e-mail used and on the indentity of the intended recipient.7" Thus, the court found that "[m]essages sent to the public at large in the 'chat room' or e-mail that is 'forwarded' from correspondent to correspondent [lose] any semblance of privacy. In United States v. Monroe," the United States Court of Appeals for the Armed Forces, while acknowledging its holding in Maxwell, found the appellant had no reasonable expectation of privacy in his e-mail messages that were viewed by Air Force personnel who maintained the network system.73 In distinguishing Monroe from the holding in Maxwell, the court noted that in Maxwell, AOL contractually agreed not to disclose subscribers' e-mail.74 Thus, e-mails sent at work or through the Internet itself, absent contractual guarantees, experience a diminished degree of protection from the Fourth Amendment. In sum, the use of e-mail falls into the middle of the spectrum-a diminished expectation of privacy. On the one hand, the use of e-mail is generally subject to the same Fourth Amendment protections found in the use of the telephone and postal mail,76 and the sender of an e-mail can reasonably expect that the contents will remain private and free from police intrusion, absent a search warrant supported by probable cause." On the other hand, "chat" messages,78 received e-mails, 79 forwarded e-mails, 0 and e-mails divulged to third parties"' afford no reasonable expectation of privacy. Thus, in order to implicate the Fourth Amendment, it is necessary to determine how, when, where, and to whom the e-mail was sent. Privacy expectations are diminished but still exist – means it still operates within the purview of expected privacy rights. Ashdown 81 (Gerald, Professor of Law, West Virginia University College of Law, “The Fourth Amendment and the "Legitimate Expectation of Privacy",” 34 Vand. L. Rev. 1289 1981)//ghs-VA In addition to combining the notion of standing with substantive fourth amendment law under the "legitimate expectation of privacy" scope of fourth amendment rights—are dependent upon what a majority of the Court chooses to recognize as constitutionally legitimate.33 This formula, the Court in Rakas also reaffirmed that such expectations^—and thus the approach has permitted the Court to develop a new graduated view of fourth amendment rights in which some expectations of privacy are less legitimate—and thus less entitled to protection—than others. While finding privacy expectations to be clearly legitimate in some situations78 and completely absent in others,7* the deal with automobiles, in Court also has chosen to recognize a middle ground, predominantly in cases that which privacy expectations are diminished and fourth amendment protection is concomitantly reduced .75 Thus, the Burger Court's view of the fourth amendment, although perhaps still in its incipient stages, appears to be reducible to a three-tiered hierarchical scheme, with protection being dependent upon the Court's willingness to recognize asserted privacy interests as either legitimate, diminished, or altogether nonexistent. When the Court is willing to recognize a claimed privacy interest as legitimate, full fourth amendment safeguards, including both the probable cause and warrant requirements, are applicable. In other words, the Court demands strict compliance with the fourth amendment's warrant clause in these cases. In United States v. Chadwick,8 for example, the government argued that the fourth amendment warrant clause protected only those interests traditionally associated with the home. Chief Justice Burger's majority opinion, however, stated that "a fundamental purpose of the Fourth Amendment [was] to safeguard individuals from unreasonable government invasions of legitimate privacy interests, and not simply those interests found inside the four walls of the home.'"7 The Chief Justice concluded that the users of a locked footlocker, which was characterized as a repository of personal effects, enjoyed a legitimate expectation of privacy in the contents of the locker, and that the warrant clause therefore applied. In a later case the Court held that the same privacy expectations and warrant requirement applied to an unlocked suitcase found in an automobile, even though automobiles themselves traditionally had been provided with less fourth amendment protection.78 Recently, a plurality of the Court in Robbins v. California9 expanded these holdings to apply to any closed, opaque container.80 Other privacy interests that the Court has found to be legitimate and thus governed by the warrant clause include those associated with the home,81 packaged films,82 and telephone booths.83 The second level in the new hierarchy of fourth amendment interests comprises those cases in which the Court has concluded that the privacy expectation in question is diminished or reduced. This category apparently is governed by the fourth amendment's reasonableness clause rather than its warrant clause. Thus, in a relatively recent line of cases, the Court has held warrantless searches of automobiles to be reasonable on the ground that any expectation of privacy in a car is diminished.8 The Court has justified this conclusion in a variety of ways, reasoning that automobiles, unlike houses, are constantly used in plain view for transportation,85 are extensively regulated by the state,86 are often subject to official inspection, and are frequently taken into police custody.8 Another area of police activity to which the Court applies this second category of diminished privacy expectations is public arrests. Although it was not specifically stated in Watson v. United States,8 a case upholding the validity of warrantless public arrests, a majority of the Justices apparently felt that privacy expectations. are diminished when a person is in public.89 Juxtaposing United States v. Santana"° with Payton v. New York91 makes it even more clear that this was the implication intended by the Court in Watson. In Santana the Court upheld the warrantless arrest of a defendant who had been standing in the doorway to her home. The majority concluded that since the defendant was not in an area where she had any expectation of privacy, the situation was governed by Watson. The Payton Court, on the other hand, stressed individual privacy to invalidate a warrantless arrest made in a private dwelling, declaring that in no setting "is the zone of privacy more clearly defined than when bounded by the unambiguous physical dimensions of an individual's home. 9' 2 Although Justice Rehnquist's majority opinion in Santana stated that the defendant lacked an expectation of privacy while in the doorway of her home, he undoubtedly meant that her expectation of privacy merely was diminished, since public arrests, unlike other situations in which the Court has found a complete absence of privacy interests, 9" are governed by the fourth amendment probable cause requirement. 9 4 That a person retains some privacy interest in his person when he appears in public was indicated in Terry v. Ohio in which the Court noted that the fourth amendment applies whenever an individual harbors a reasonable expectation of privacy. "Unquestionably," the Court stated, "petitioner was entitled to the protection of the Fourth Amendment as he walked down the street in Cleveland."96 It can be seen from the Court's treatment of public arrests and vehicular searches that in those cases in which the new notion of diminished privacy expectations applies, generally only probable cause, and not a warrant, is required. In a few instances, however, the Supreme Court has relied on its diminished expectations rationale to justify a law enforcement practice even when probable cause was absent. Examples of this can be found in South Dakota v. Opperman97 and Bell v. Wolfish." In Opperman the Court relied on the diminished expectation of privacy in a vehicle to hold that a police inventory search without probable cause of an automobile that had been impounded for multiple parking violations was not "unreasonable." Similarly, in Bell the Court found that any privacy expectation of pretrial detainees necessarily is diminished- and thus outweighed-by the need of the institution to conduct strip searches following contact visits. The Court concluded that these searches, including body cavity inspections, are reasonable under the fourth amendment even though conducted on less than probable cause.99 More recently, a majority of the Court upheld the detention without probable cause of persons found at the scene of the execution of a search warrant.100 The Court reasoned that only a limited interest in personal security was involved, that sufficient law enforcement interests were present, and that the issuance of a search warrant provided sufficient articulable suspicion to support the detention. The majority thus held that the officer's actions met the standard of reasonableness embodied in the fourth amendment. The Supreme Court thus has subsumed the Camara/Terry reasonableness analysis under its second category of fourth amendment interests in which the expectations of privacy concerned are of reduced significance.102 With privacy interests diminished, they easily are outweighed by the law enforcement interests in question; the amount of fourth amendment protection in this category is then dependent upon how the Court strikes the reasonableness balance. Although application of the reasonableness clause to this classification generally has resulted in probable cause-but not warrants-being required, the Supreme Court occasionally has viewed the privacy interests at issue to be of such reduced importance in comparison to law enforcement needs that it has justified dispensing with the necessity of probable cause as a prerequisite for particular police conduct. The third and final classification under the Supreme Court's current vision of the fourth amendment comprises those cases in which the Court has found an absence of any privacy expectation whatsoever. This category is the most problematic of the three, since the conclusion that no legitimate expectation of privacy exists at all excludes the particular interest or activity from fourth amendment protection and frees the police practice concerned from either constitutional or judicial control. Because the fourth amendment has been geared to the protection of privacy interests, if the Court is able to conclude that no privacy expectation exists, the fourth amendment affords no protection against the activities of the police regardless of their general contravention of fourth amendment principles. This conclusion in essence means that the commands of the fourth amendment-both the warrant and reasonableness clauses-do not apply in such cases. In other words, the police simply are not required to justify their actions by either probable cause or reasonable suspicion, since, according to the Supreme Court, the object of the fourth amendment-privacy-is not implicated in these cases. CANT BE GENERAL OBSERVATION 1NC – Prohibitive Intent A. Surveillance is preventative rather than general observations. Lemos 11 (Andre, University of Baha, “Locative Media and Surveillance at the Boundaries of Informational Territories,” 2011, https://books.google.com/books?id=quEd4w61EYoC&printsec=frontcover#v=onepage&q&f=false)//ghsVA Although they often appear to be synonymous, it is important to distinguish between informational control, monitoring and surveillance so that the problem can be better understood. We consider control to be the supervision of activities, or actions normally associated with government and authority over people, actions and processes. Monitoring can be considered a form of observation to gather information with a view to making projections or constructing scenarios and historical records, i.e., the action of following up and evaluating data. Surveillance, however, can be defined as an act intended to avoid something , as an observation whose purposes are preventive or as behavior that is attentive, cautious or careful. It is interesting to note that in English and French the two words “vigilant” and “surveillance”, each of which is spelt the same way and has the same meaning in both languages, are applied to someone who is particularly watchful and to acts associated with legal action or action by the police intended to provide protection against crime, respectively. We shall define surveillance as actions that imply control and monitoring in accordance with Gow, for whom surveillance "implies something quite specific as the intentional observation of someone's actions or the intentional gathering of personal information in order to observe actions taken in the past or future" (Gow. 2005. p. 8). According to this definition, surveillance actions presuppose monitoring and control, but not all forms of control and/or monitoring can be called surveillance. It could be said that all forms of surveillance require two elements: intent with a view to avoiding/causing something and identification of individuals or groups by name. It seems to me to be difficult to say that there is surveillance if there is no identification of the person under observation (anonymous) and no preventive intent (avoiding something). To my mind it is an exaggeration to say, for example, that the system run by my cell phone operator that controls and monitors my calls is keeping me under surveillance. Here there is identification but no intent. However, it can certainly be used for that purpose. The Federal Police can request wiretaps and disclosure of telephone records to monitor my telephone calls. The same can be said about the control and monitoring of users by public transport operators. This is part of the administrative routine of the companies involved. Once again, however, the system can be used for surveillance activities (a suspect can be kept under surveillance by the companies' and/or police safety systems). Note the example further below of the recently implemented "Navigo "card in France. It seems to me that the social networks, collaborative maps, mobile devices, wireless networks and countless different databases that make up the information society do indeed control and monitor and offer a real possibility of surveillance. B. Violation: They curtail general observations which lack a preventative intent. C. Reasons to prefer 1. Limits – Affs about general observations can collect data over a million different things which makes neg prep impossible and causes a rush to generics. 2. Topic education – shifts it away from the core controversy of things like PRISM which wrecks predictability and kills core topic learning. Competing interpretations, reasonability makes judge intervention inevitable. 2NC Overview Our interpretation is that in order for something to be considered surveillance it must have a prohibitive intent. Your aff ____ (Insert Specific Aff Mechanism) ____ which means you don’t meet our interpretation. 2NC Limits/Case List XT Your interpretation allows for affs about general observation such as curtailment of Global Earth Observation, NOAA Observation programs, Survey data about poverty. Explodes limits and shifts the stasis to a whole other lit base which means they can access thousands of more affs about general observations. Think about the millions of different observations governments can make, allowing them would create an unreasonable research burden forcing the neg to read generics. Their interpretation collapses the limiting function of the resolution and destroys any semblance of predictable negative ground. 2NC Topic Education XT Controversies like rights violations versus terror are at the core of the topic, your interpretation shifts that stasis to observation which proves our predictability arguments which turns fairness and education – their benefits are short circuited by a lack of engagement which is a key internal link to advocacy skills which outweighs their education arguments because it’s the only thing we take from debate. Our education outweighs – detailed and precise debates on this topic are especially important. Mimoso 14 (Michael, award-winning journalist and former Editor of Information Security magazine, a two-time finalist for national magazine of the year. He has been writing for business-to-business IT websites and magazines for over 10 years, with a primary focus on information security, “NSA Reforms Demonstrate Value of Public Debate,” March 26, 2014, https://threatpost.com/nsa-reformsdemonstrate-value-of-public-debate/105052)//ghs-VA The president’s proposal would end the NSA’s collection and storage of phone data; those records would remain with the providers and the NSA would require judicial permission under a new court order to access those records. The House bill, however, requires no prior judicial approval; a judge would rule on the request after the FBI submits it to the telecommunications company. “ It’s absolutely crucial to understand the details of how these things will work ,” the ACLU’s Kaufman said in reference to the “new court order” mentioned in the New York Times report. “There is no substitute for robust Democratic debate in the court of public opinion and in the courts. The system of oversight is broke and issues like these need to be debated in public .” Phone metadata and dragnet collection of digital data from Internet providers and other technology companies is supposed to be used to map connections between foreigners suspected of terrorism and threatening the national security of the U.S. The NSA’s dragnet, however, also swept up communication involving Americans that is supposed to be collected and accessed only with a court order. The NSA stood by claims that the program was effective in stopping hundreds of terror plots against U.S. interests domestic and foreign. Those numbers, however, quickly were lowered as they were challenged by Congressional committees and public scrutiny. “The president said the effectiveness of this program was one of the reasons it was in place,” Kaufman said. “But as soon as these claims were made public, journalists, advocates and the courts pushed back and it could not withstand the scrutiny. It’s remarkable how quickly [the number of] plots turned into small numbers. The NSA was telling FISC the program was absolutely necessary to national security, but the government would not go nearly that far in defending the program. That shows the value of public debate and an adversarial process in courts.” 2NC Interpretation XT Surveillance deals with prevention and has specific purpose. Bush 2 (Eric J, M.D., “The role of surveillance in national animal health strategies,” 2002, http://www.caribvet.net/en/system/files/gua00_8_rolesurveillance.pdf)//ghs-VA A broader definition of surveillance is sought along with a more holistic approach to disease prevention and control . Future surveillance efforts must go beyond screening individual animals and become an ongoing process for collection, analysis and interpretation of health related events in animal populations to detect health problems based on an epidemiological description of trends and patterns. Intervention measures should be expanded beyond movement control (import restrictions, herd quarantine) to incorporate/include diverse response capabilities. Furthermore, to be effective, surveillance information must be distributed on a timely basis to those involved in the planning, implementation, and/or evaluation of prevention and control measures. Surveillance is a priori about prevention and isn’t general. Lee et al 12 (Lisa M. Lee, the Office of Surveillance, Epidemiology, and Laboratory Services at the Centers for Disease Control and Prevention (CDC), Charles M. Heilig, with the Tuberculosis Trials Consortium, Angela White, with the J. L. Rotman Institute of Philosophy, University of Western Ontario, “Ethical Justification for Conducting Public Health Surveillance Without Patient Consent,” 2012 January; 102(1): 38–44, http://www.ncbi.nlm.nih.gov/pmc/articles/PMC3490562/)//ghs-VA Public health surveillance is defined as the ongoing, systematic collection, analysis, and interpretation of healthrelated data with the a priori purpose of preventing or controlling disease or injury, or of identifying unusual events of public health importance, followed by the dissemination and use of information for public health action. Surveillance has the purpose of being a form of “preventative law enforcement” Bloss 7 (William, Department of Political Science and Criminal Justice, The Citadel, South Carolina, USA, “Escalating U.S. Police Surveillance after 9/11: an Examination of Causes and Effects,” Part 1, 4(3): 208228, http://www.surveillance-and-society.org/articles4(3)/escalating.pdf)//ghs-VA Views of surveillance and privacy have changed dramatically in recent years. Some commentators assert that the U.S. has experienced a progressive shift in the balance between police surveillance authority and individual privacy rights (Chang, 2003; Bloss, 2005). Others cite the terrorist attacks on September 11, 2001 (9/11 hereafter) as a watershed event that provided the catalyst for the widening of police surveillance and search authority (Posner, 2003; Romero, 2003). The record is replete with examples of U.S. official responses to perceived public safety threats that have precipitated an increase in police surveillance activity (Brown, 2003). Events such as the detention of Japanese descendents during World War II, McCarthy anti-communist investigations, anti-crime campaigns, anti-drug wars, and current counter-terrorism policies provide evidence that U.S. public safety strategies commonly involve a prominent police surveillance and search role (Cole, 2003; Abrams, 2005). Faced with modern transnational crime and terrorism, operating in a technologically fluid global environment, the extant official strategy obligates the police to ensure greater public safety under increasingly unpredictable circumstances (Posner, 2003; Stohl, 2003; Kugler and Frost, 2001). In what Cole (2003:13) refers to as “preventive law enforcement,” the legal and operational response has been to use greater surveillance to reduce threats and prosecute transnational offenders. Since the police often lack the manpower and technical expertise to keep pace with global terrorists and criminals, they have widened their surveillance capability by collaborating with private commercial enterprises to obtain personal data or to eavesdrop on the public (O’Harrow, 2005; Bridis and Solomon, 2006). The central position of this paper is that U.S. lawmakers and courts have terrorism and crime threats reacted to perceived global by modifying established civil privacy protections, under the aegis of “ preventive law enforcement ,” thereby giving the police broader surveillance powers (Cole, 2003). As a result, the police have transformed their operational approaches and surveillance practices to focus more on information and intelligence gathering (Peterson, 2005; Carter, 2004). This has produced a new privacy paradigm, as the balance between police surveillance authority and civil privacy protection shifts. This paper explains the factors that have caused or contributed to this transition and its effect on civil privacy and civil life in U.S. society. Surveillance is preventative rather than general observations – only our author make a distinctions. Lemos 11 (Andre, University of Baha, “Locative Media and Surveillance at the Boundaries of Informational Territories,” 2011, https://books.google.com/books?id=quEd4w61EYoC&printsec=frontcover#v=onepage&q&f=false)//ghsVA Although they often appear to be synonymous, it is important to distinguish between informational control, monitoring and surveillance so that the problem can be better understood. We consider control to be the supervision of activities, or actions normally associated with government and authority over people, actions and processes. Monitoring can be considered a form of observation to gather information with a view to making projections or constructing scenarios and historical records, i.e., the action of following up and evaluating data. Surveillance, however, can be defined as an act intended to avoid something , as an observation whose purposes are preventive or as behavior that is attentive, cautious or careful. It is interesting to note that in English and French the two words “vigilant” and “surveillance”, each of which is spelt the same way and has the same meaning in both languages, are applied to someone who is particularly watchful and to acts associated with legal action or action by the police intended to provide protection against crime, respectively. We shall define surveillance as actions that imply control and monitoring in accordance with Gow, for whom surveillance "implies something quite specific as the intentional observation of someone's actions or the intentional gathering of personal information in order to observe actions taken in the past or future" (Gow. 2005. p. 8). According to this definition, surveillance actions presuppose monitoring and control, but not all forms of control and/or monitoring can be called surveillance. It could be said that all forms of surveillance require two elements : intent with a view to avoiding/causing something and identification of individuals or groups by name. It seems to me to be difficult to say that there is surveillance if there is no identification of the person under observation (anonymous) and no preventive intent (avoiding something). To my mind it is an exaggeration to say, for example, that the system run by my cell phone operator that controls and monitors my calls is keeping me under surveillance. Here there is identification but no intent. However, it can certainly be used for that purpose. The Federal Police can request wiretaps and disclosure of telephone records to monitor my telephone calls. The same can be said about the control and monitoring of users by public transport operators. This is part of the administrative routine of the companies involved. Once again, however, the system can be used for surveillance activities (a suspect can be kept under surveillance by the companies' and/or police safety systems). Note the example further below of the recently implemented "Navigo "card in France. It seems to me that the social networks, collaborative maps, mobile devices, wireless networks and countless different databases that make up the information society do indeed control and monitor and offer a real possibility of surveillance. Surveillance is specifically to prevent something. Merriam Webster (Merriam Webster, Online Dictionary, “surveillance,” http://www.merriamwebster.com/dictionary/surveillance)//ghs-VA the act of carefully watching someone or something especially in order to prevent or detect a crime. AT: Surveillance Has Other Priorities Surveillance is a priori about prevention and isn’t general. Lee et al 12 (Lisa M. Lee, the Office of Surveillance, Epidemiology, and Laboratory Services at the Centers for Disease Control and Prevention (CDC), Charles M. Heilig, with the Tuberculosis Trials Consortium, Angela White, with the J. L. Rotman Institute of Philosophy, University of Western Ontario, “Ethical Justification for Conducting Public Health Surveillance Without Patient Consent,” 2012 January; 102(1): 38–44, http://www.ncbi.nlm.nih.gov/pmc/articles/PMC3490562/)//ghs-VA Public health surveillance is defined as the ongoing, systematic collection, analysis, and interpretation of healthrelated data with the a priori purpose of preventing or controlling disease or injury, or of identifying unusual events of public health importance, followed by the dissemination and use of information for public health action. CANT BE TARGETED 1NC – Can’t be Targeted A. Interpretation: Surveillance means mass surveillance. Langmuir 63 (A. D. Langmuir, “The surveillance of communicable diseases of national importance,” The New England Journal of Medicine, vol. 268, pp. 182–192, 1963. http://www.nejm.org/doi/pdf/10.1056/NEJM196301242680405) Surveillance, when applied to a disease, means the continued watchfulness over the distribution and trends of incidence through the systematic collection, consolidation and evaluation of morbidity and mortality reports and other relevant data. Intrinsic in the concept is the regular dissemination of the basic data and interpretations to all who have contributed and to all others who need to know” [67. Substantially is without material qualification Black’s Law 91 (Dictionary, p. 1024) Substantially - means essentially; without material qualification. B. Violation: The aff curtails targeted surveillance C. Reasons to prefer 1. Limits – They justify an infinite number of affirmatives – they allow for thousands of different targeted mechanisms which makes it impossible for the neg to prepare each individual target. 2. Topic Education – they foster discussions about targeted forms of monitoring that detract us from learning about mass surveillance writ large – kills predictable clash and core topic learning Competing interpretations, reasonability makes judge intervention inevitable. 2NC Overview Our interpretation is that surveillance has to be indiscriminant monitoring not targeted. Anything that targets a specific group of people or specific type of activity is NOT surveillance. Your aff _____ (Insert Specific Aff Mechanism) _____ which means you don’t meet our interpretation. Topical version of the aff – use the same mechanism of the aff just make it indiscriminate. Solves your education claims because we can still have the same discussions just tie them to their larger context. 2NC Limits/Case List XT There are only 3 real evaluative terms in the resolution – defining and limiting them is necessary in order to make this topic manageable. Allowing curtailment to target individual groups allows for infinite variations and permutations of affs. Restricting targeted surveillance fosters discussion about the large forms of surveillance that affect the most people. There are an infinite number of different groups that could potentially be targeted. Making the negative research the individual groups creates an unreasonable research burden preventing substantive and quality clash. They would allow – - Curtailing surveillance on senior citizens - Curtailing surveillance of ocean acidification - Curtailing surveillance of squirrel populations - Curtailing surveillance of Northwestern Debaters Clash fosters debates were students can debate the specific warrants behind their advantages and mechanisms. This turns students into excellent advocates who can thoroughly defend every part of their advocacy, allowing us to create the most real world change. We would allow for SSRA, Dual-Use, Prism, NSA, Freedom-Act affs. **OTHER DEFINITIONS** CURTAIL Both Reduce and Eliminate Curtail can be to eliminate OR just reduce. Farlex NO DATE (The Free Online Dictionary by Farlex, “curtail,” http://www.thefreedictionary.com/curtail)//ghs-VA To cut short or reduce: We curtailed our conversation when other people entered the room. DOMESTIC Can’t Target Your interpretation is impossible – we can’t limit by targets. Stray 13 (Jonathan, freelance journalist and a former editor for the Associated Press. He teaches computational journalism at Columbia University, “What You Need to Know About the NSA’s Surveillance Programs,” August 5th, 2013, http://www.propublica.org/article/nsa-data-collectionfaq)//ghs-VA Massive amounts of raw Internet traffic The NSA intercepts huge amounts of raw data, and stores billions of communication records per day in its databases. Using the NSA’s XKEYSCORE software, analysts can see “nearly everything a user does on the Internet” including emails, social media posts, web sites you visit, addresses typed into Google Maps, files sent, and more. Currently the NSA is only authorized to intercept Internet communications with at least one end outside the U.S., though the domestic collection program used to be broader. But because there is no fully reliable automatic way to separate domestic from international communications , this program also captures some amount of U.S. citizens’ purely domestic Internet activity , such as emails, social media posts, instant messages, the sites you visit and online purchases you make. The contents of an unknown number of phone calls There have been several reports that the NSA records the audio contents of some phone calls and a leaked document confirms this. This reportedly happens “on a much smaller scale” than the programs above, after analysts select specific people as “targets.” Calls to or from U.S. phone numbers can be recorded, as long as the other end is outside the U.S. or one of the callers is involved in "international terrorism". There does not seem to be any public information about the collection of text messages, which would be much more practical to collect in bulk because of their smaller size. The NSA has been prohibited from recording domestic communications since the passage of the Foreign Intelligence Surveillance Act but at least two of these programs -- phone records collection and Internet cable taps -- involve huge volumes of Americans’ data. Does the NSA record everything about everyone, all the time? The NSA records as much information as it can, subject to technical limitations (there’s a lot of data) and legal constraints. This currently includes the metadata for nearly all telephone calls made in the U.S. (but not their content) and massive amounts of Internet traffic with at least one end outside the U.S. It’s not clear exactly how many cables have been tapped, though we know of at least one inside the U.S., a secret report about the program by the NSA’s Inspector General mentions multiple cables, and the volume of intercepted information is so large that it was processed at 150 sites around the world as of 2008. We also know that Britain’s GCHQ, which shares some intelligence with the NSA, had tapped over 200 cables as of 2012, belonging to seven different telecommunications companies. Until 2011 the NSA also operated a domestic Internet metadata program which collected mass records of who emailed who even if both parties were inside the U.S. Because it is not always possible to separate domestic from foreign communications by automatic means, the NSA still captures some amount of purely domestic information, and it is allowed to do so by the Foreign Intelligence Surveillance Court. Geography & No Foreign Domestic means physically within the U.S. borders. DOD 82 (Department of Defense, regulation sets forth procedures governing the activities of DoD intelligence components that affect United States persons, “PROCEDURES GOVERNING THE ACTIVITIES OF DOD INTELLIGENCE COMPONENTS THAT AFFECT UNITED STATES PERSONS,” December 1982, https://fas.org/irp/doddir/dod/d5240_1_r.pdf)//ghs-VA C10.2.1. Domestic activities refers to activities that take place within the United States that do not involve a significant connection with a foreign power, organization or person. C10.2.2. The term organization includes corporations and other commercial organizations, academic institutions, clubs, professional societies, associations, and any other group whose existence is formalized in some manner or otherwise functions on a continuing basis. C10.2.3. An organization within the United States means all organizations physically located within the geographical boundaries of the United States whether or not they constitute a United States persons. Thus, a branch, subsidiary, or office of an organization within the United States, which is physically located outside the United States , is not considered as an organization within the United States. Surveillance includes ALL residents inside the U.S. Donohue 6 (Laura, A.B., Dartmouth; M.A., University of Ulster, Northern Ireland; Ph.D., Cambridge University; J.D., Stanford, “Anglo-American privacy and surveillance,” March 22, 2006, http://rocket.csusb.edu/~tmoody/F07%20362%20spy%20donahue.html)//ghs-VA 5. The Foreign Intelligence Surveillance Act As the extent of the domestic surveillance operations emerged, Congress attempted to scale back the Executive's power while leaving some flexibility to address national security threats. (183) The legislature focused on the targets of surveillance, limiting a new law to foreign powers, and agents of foreign powers--which included groups "engaged in international terrorism or activities in preparation therefor." (184) Congress distinguished between U.S. and non-U.S. persons, creating tougher standards for the former. (185) The Foreign Intelligence Surveillance Act ("FISA") considered any "acquisition by an electronic, mechanical, or other surveillance device of the contents of any wire or radio communication," as well as other means of surveillance, such as video, to fall under the new restrictions. (186) Central to the statute's understanding of surveillance was that, by definition, consent had not been given by the target. Otherwise, the individual would have a reasonable expectation of privacy and, under ordinary circumstances, the Fourth Amendment would require a warrant. (187) FISA provided three ways to initiate surveillance: Attorney General Certification, application to the Foreign Intelligence Surveillance Court ("FISC"), and emergency powers. Of these, the second serves as the principal means via which surveillance is conducted. (188) Under this mechanism, to open surveillance on a suspect, the executive branch applies to FISC, a secret judicial body, for approval. (189) The application must provide the name of the federal officer requesting surveillance and the identity of the target (if known), or a description of the target. (190) It must include a statement of facts supporting the claim that the target is a foreign power (or an agent thereof) and that the facilities to be monitored are currently, or expected to be, used by a foreign power or her agent. (191) Probable cause must be presented that the individual qualifies as a foreign power and will be using the facilities surveilled. (192) The application must describe the "nature of the information sought and the type of communications or activities to be subjected to the surveillance." Importantly, the court is not required to determine that probable cause exists as to whether any foreign intelligence information will be uncovered. (193) The application requires a designated national security or defense officer to certify that the information is related to foreign intelligence, and that "such information cannot reasonably be obtained by normal investigative techniques." (194) It must specify how the surveillance is to be affected (including whether physical entry is required). (195) It includes all previous applications involving the "persons, facilities, or places specified in the application,' and actions taken by the court on these cases must accompany the application. (196) The form includes an estimate of time required for surveillance and requires an explanation as to why authority should not terminate at the end of the requested period. (197) Finally, if more than one surveillance device is to be used, the applicant must address the minimization procedures and describe the range of devices to be employed. (198) In addition to this information, the judge may request additional data. (199) In 1994, Congress amended the statute to allow for warrantless, covert physical searches (not just electronic communications' intercepts) when targeting "premises, information, material, or property used exclusively by, or under the open and exclusive control of, a foreign power or powers." (200) The statute requires that there be no substantial likelihood that the facilities targeted are the property of a U.S. person. (201) Applications must include the same information as for electronic surveillance. (202) Twice a year the Attorney General informs Congress of the number of applications for physical search orders, the number granted, modified, or denied, and the number of physical searches that ensued. (203) Footnote (185): The former included citizens and resident aliens, as well incorporated entities and unincorporated persons qualified as an "agent of a foreign power" by associations with a substantial number of U.S. persons. Non-U.S. virtue of membership --e.g., if they were an officer or employee of a foreign power, or if they participated in an international terrorist organization. Id. [section] 1801(i). U.S. persons had to engage knowingly in the collection of intelligence contrary to U.S. interests, the assumption of false identity for the benefit of a foreign power, and aiding or abetting others to the same. Id. [section] 1801(b). Includes the Borders Courts have decided domestic surveillance includes the area around the borders. Stanley and Steinhardt 3 (Jay Stanley, Senior Policy Analyst with the American Civil Liberties Union’s Speech, Privacy and Technology Project, Barry Steinhardt, Director of the ACLU's Program on Technology and Liberty, “Bigger Monster, Weaker Chains: The Growth of an American Surveillance Society,” January 2003, https://www.aclu.org/files/FilesPDFs/aclu_report_bigger_monster_weaker_chains.pdf)//ghs-VA Historically, the courts have been slow to adapt the Fourth Amendment to the realities of developing technologies. It took almost 40 years for the U.S. Supreme Court to recognize that the Constitution applies to the wiretapping of telephone conversations. (Erosion of the Fourth Amendment) "In recent years – in no small part as the result of the failed 'war on drugs' – Fourth Amendment principles have been steadily eroding. The circumstances under which police and other government officials may conduct warrantless searches has been rapidly expanding. The courts have allowed for increased surveillance and searches on the nation’s highways and at our 'borders' (the legal definition of which actually extends hundreds of miles inland from the actual border). And despite the Constitution’s plain language covering 'persons' and 'effects,' the courts have increasingly allowed for warrantless searches when we are outside of our homes and 'in public.' Here the courts have increasingly found we have no 'reasonable expectation' of privacy and that therefore the Fourth Amendment does not apply." Prefer our interpretation – it cites the fourth amendment which is the a priori limit on domestic surveillance. Cole and Lederman 6 (David Cole, B.A., J.D., Yale, Teaches Law at Georgetown University, Martin S. Lederman, A.B., University of Michigan; J.D., Yale, Deputy Assistant Attorney General in the Department of Justice's Office, “The National Security Agency’s Domestic Spying Program: Framing the Debate,” May 2006, https://www.acslaw.org/files/Microsoft%20Word%20-%2012_NSA_Debate.pdf)//ghs-VA We do not dispute that, absent congressional action, the President might have inherent constitutional authority to collect “signals intelligence” about the enemy abroad. Nor do we dispute that, had Congress taken no action in this area, the President might well be constitutionally empowered to conduct domestic surveillance directly tied and narrowly confined to that goal—subject, of course, to Fourth Amendment limits. Indeed, in the years before FISA was enacted, the federal law involving wiretapping specifically provided that “[n]othing contained in this chapter or in section 605 of the Communications Act of 1934 shall limit the constitutional power of the President . . . to obtain foreign intelligence information deemed essential to the security of the United States.” 18 U.S.C. § 2511(3) (1976). U.S. Citizens Only Domestic surveillance covers U.S. citizens only – our evidence is exclusive and draws a specific distinction. Ross 12 (Jeffery Ian, Ph.D. is a Professor in the School of Criminal Justice, College of Public Affairs, and a Research Fellow of the Center for International and Comparative Law, “An Introduction Into Political Crime,” 2012, https://books.google.com/books?id=c32GRo3zBdEC&printsec=frontcover#v=onepage&q&f=false)//ghsVA Domestic surveillance consists of a variety of information-gathering activities, conducted primarily by the state's coercive agencies (that is, police, national security, and the military). These actions are carried out against citizens, foreigners, organizations (for example, businesses, political parties, etc.), and foreign governments. Such operations usually include opening mail, listening to telephone conversations (eavesdropping and wiretapping), reading electronic communications, and infiltrating groups (whether they are legal, illegal, or deviant). Although a legitimate law enforcement /intelligence-gathering technique, surveillance is often considered unpalatable to the public in general and civil libertarians in particular. This is especially true when state agents break the law by conducting searches without warrants, collecting evidence (hat is beyond the scope of a warrant, or harassing and/or destabilizing their targets.1 These activities are illegal (because the Constitution, statutes, regulations, and ordinances specify the conditions under which surveillance may be conducted), and they violate individual rights to privacy. Not only should legitimate surveillance be distinguished from illegal domestic surveillance, but the latter practice should also be separated from espionage/ spying.2 In short, spying/espionage, covered in chapter four, is conducted against a foreign government, its businesses, and/or its citizens, and illegal domestic surveillance takes place inside a specific individuals country. Limits on Surveillance Key Defining domestic surveillance is a critical prerequisite to debate – takes out reasonability arguments as well. Small 8 (Matthew, US Air Force Academy, “His Eyes are Watching You: Domestic Surveillance, Civil Liberties and Executive Power during Times of National Crisis,” 2008, http://cspc.nonprofitsoapbox.com/storage/documents/Fellows2008/Small.pdf)//ghs-VA Before one can make any sort of assessment of domestic surveillance policies , it is first necessary to narrow the scope of the term “domestic surveillance.” Domestic surveillance is a subset of intelligence gathering. Intelligence, as it is to be understood in this context, is “information that meets the stated or understood needs of policy makers and has been collected, processed and narrowed to meet those needs” (Lowenthal 2006, 2). In essence, domestic surveillance is a means to an end; the end being intelligence. The intelligence community best understands domestic surveillance as the acquisition of nonpublic information concerning United States persons (Executive Order 12333 (3.4) (i)). With this definition domestic surveillance remains an overly broad concept. Limits regarding domestic and foreign surveillance is key to good policy. Dyer 12 (William R, M.A. in Intelligence studies @ American University, “UNMANNED AERIAL VEHICLES: THE CHANGING ROLE FROM INTERNATIONAL TO DOMESTIC INTELLIGENCE,” February 26, 2012, http://www.apus.edu/content/dam/online-library/masters-theses/Dyer-2012.pdf)//ghs-VA Congress will need to review current laws in existence today and make adjustments as necessary to clearly draw the line between domestic surveillance and foreign intelligence and develop practical procedures for the performance of duties relating to agencies required to conduct surveillance. Having a clear legal framework as a foundation can assist other agencies such as the FAA, Customs and Border Patrol, FBI, and local law enforcement agencies to establish policy governing their respective organization, making it easy to utilize the flexibilities of RPA surveillance over current methods. By having well thought out legal guidance, larger agencies such as DOD and DHS will be able to participate in domestic programs that will assist in protecting the national security interests of the United States. In addition, the Federal Government will need to work closely with civil liberty organizations such as the ACLU to form a partnership that provide legislation that both parties can accept instead of more ambiguous language that continue to blur the lines between homeland security and personal privacy. US Citizen & Non-Public The agent being surveilled must be a US Citizen and the information must be nonpublic. IT Law 15 (IT Law Wiki, Law network, “Domestic surveillance,” http://itlaw.wikia.com/wiki/Domestic_surveillance)//ghs-VA Domestic surveillance is the acquisition of nonpublic information concerning United States persons. Domestic Surveillance finds non-public information about US Citizens. Small 8 (Matthew, US Air Force Academy, “His Eyes are Watching You: Domestic Surveillance, Civil Liberties and Executive Power during Times of National Crisis,” 2008, http://cspc.nonprofitsoapbox.com/storage/documents/Fellows2008/Small.pdf)//ghs-VA Before one can make any sort of assessment of domestic surveillance policies, it is first necessary to narrow the scope of the term “domestic surveillance.” Domestic surveillance is a subset of intelligence gathering. Intelligence, as it is to be understood in this context, is “information that meets the stated or understood needs of policy makers and has been collected, processed and narrowed to meet those needs” (Lowenthal 2006, 2). In essence, domestic surveillance is a means to an end; the end being intelligence. The intelligence community best understands domestic surveillance as the acquisition of nonpublic information concerning United States persons (Executive Order 12333 (3.4) (i)). With this definition domestic surveillance remains an overly broad concept. Applies to Foreign Soil Domestic Surveillance applies to US Citizens in other countries. Mayer 14 (Jonathan, Lawyer @ Stanford, “Executive Order 12333 on American Soil, and Other Tales from the FISA Frontier,” December 3, 2014, http://webpolicy.org/2014/12/03/eo-12333-on-americansoil/)//ghs-VA Surveillance Targeting Americans Worldwide Much like Executive Order 12333 can operate on American soil, FISA can operate on foreign soil. The first area that I’d like to flag is surveillance intentionally directed against Americans. If the NSA targets a U.S. person, anywhere in the world, that’s covered by FISA. And it generally requires a court order.17 There are two sources for this protection. U.S. persons inside the United States are covered by the traditional FISA “electronic surveillance” provisions, even if interception occurs outside the United States.18 U.S. persons outside the United States are protected by the FISA Amendments Act, which added new procedures for if the person or both the person and the interception are outside the United States. Within US Borders Domestic surveillance collects information of people within the border. Avilez et al 14 (Marie Avilez, Catherine Ciriello, Christophe Combemale, Latif Elam, Michelle Kung, Emily LaRosa, Cameron Low, Madison Nagle, Rachel Ratzlaff Shriver, Colin Shaffer; Senior Capstone Students, “Ethics, History, and Public Policy,” December 10, 2014, http://www.cmu.edu/hss/ehpp/documents/2014-City-Surveillance-Policy.pdf)//ghs-VA Domestic surveillance – collection of information about the activities of private individuals/organizations by a government entity within national borders; this can be carried out by federal, state and/or local officials SURVEILLANCE Must be Located in the U.S. Domestic Surveillance means the person MUST be located in the U.S. even if the data is routed through a domestic server – it’s grounded in the federal literature. Seamon 7 (Richard Henry, Professor, University of Idaho College of Law, “Domestic Surveillance for International Terrorists: Presidential Power and Fourth Amendment Limits,” 2007, http://www.hastingsconlawquarterly.org/archives/V35/I3/seamon.pdf)//ghs-VA Congress responded in August 2007 by enacting the Protect America Act of 2007." The Act "clarifies" that FISA's definition of "electronic surveillance" does not "encompass surveillance directed at a person reasonably believed to be located outside of the United States ., 56 This clarification at the very least frees the government from having to obtain a FISA warrant to intercept foreign-to-foreign communications. Some argue that the Act goes much farther-contending that it, in fact, authorizes the entire TSP and then some.57 Concern about the scope of the Act, compounded by the extraordinary speed with which it was enacted, led Congress to include a provision that causes the Act to sunset in six months. 8 Regardless of the scope and duration of the Act, as developed below, its authorization of some aspects of the TSP is relevant both to whether the TSP falls within the President's power and to whether the TSP violates the Fourth Amendment Footnote (56): Protect America Act § 2 (provision entitled "Clarification of Electronic Surveillance of Persons Outside the United States") (to be codified as 50 U.S.C. § 1805a). Info to Govern Behavior Surveillance involves gathering info to influence future behavior. Fuchs 10 (Christian, Department of Informatics and Media Studies, Uppsala University, “The Internet & Surveillance - Research Paper Series,” October 1, 2010, http://www.sns3.uti.at/wpcontent/uploads/2010/10/The-Internet-Surveillance-Research-Paper-Series-1-Christian-Fuchs-HowSurveillance-Can-Be-Defined.pdf)//ghs-VA “Surveillance involves the collection and analysis of information about populations in order to govern their activities” (Haggerty and Ericson 2006, 3). Surveillance regulates future behavior. Fuchs 10 (Christian, Department of Informatics and Media Studies, Uppsala University, “The Internet & Surveillance - Research Paper Series,” October 1, 2010, http://www.sns3.uti.at/wpcontent/uploads/2010/10/The-Internet-Surveillance-Research-Paper-Series-1-Christian-Fuchs-HowSurveillance-Can-Be-Defined.pdf)//ghs-VA Surveillance is “the garnering and processes of personal information to regulate, control, manage and enable human individual and collective behaviour” General Info Gathering Surveillance is general info gathering. Fuchs 10 (Christian, Department of Informatics and Media Studies, Uppsala University, “The Internet & Surveillance - Research Paper Series,” October 1, 2010, http://www.sns3.uti.at/wpcontent/uploads/2010/10/The-Internet-Surveillance-Research-Paper-Series-1-Christian-Fuchs-HowSurveillance-Can-Be-Defined.pdf)//ghs-VA ”Surveillance involves the observation, recording and categorization of information about people, processes and institutions” (Ball and Webster 2003, 1). Ball and Webster (2003, 7f) identify besides three negative forms of surveillance (categorical suspicion, categorical seduction, categorical exposure) also a positive one, namely categorical care. Surveillance gathers data and info about people. Fuchs 10 (Christian, Department of Informatics and Media Studies, Uppsala University, “The Internet & Surveillance - Research Paper Series,” October 1, 2010, http://www.sns3.uti.at/wpcontent/uploads/2010/10/The-Internet-Surveillance-Research-Paper-Series-1-Christian-Fuchs-HowSurveillance-Can-Be-Defined.pdf)//ghs-VA Dandeker (2006, 225) identifies three meanings of the term surveillance: “(1) the collection and storage of information, presumed to be useful, about people or objects; (2) the supervision of the activities of people or objects through the issuing of instructions or the physical design of the natural and built environments; and (3) the application of information-gathering activities to the business of monitor-ing the behaviour of those under supervision and, in the case of subject populations, their compliance with instructions, or with non-subject populations, their compliance with agreements, or simply monitoring their behaviour from which, as in the control of disease, they may have expressed a with to benefit”. Foucault General Watching Surveillance isn’t static and can manifest itself in any relationship. Shawki 9 (Sharif, Professor @ Illinois Western University "Surveillance and Foucault: Examining the Validity of Foucault's Notions Concerning Surveillance through a Study of the United States and the United Kingdom" (2009). Honors Projects. Paper 23. http://digitalcommons.iwu.edu/socanth_honproj/23)//ghs-VA Before the application sections commence, Foucault's definition of surveillance will be given to provide a clear picture as to what the term encompasses. First of all, the French word that Foucault utilizes is surveiller. As the translator to Discipline and Punish notes, there is no proper English equivalent The English correspondent of surveiller, "surveillance," is too restricted and too technical.86 Thus, Foucault defines surveillance as a potentially aggressive action. It is clearly not neutral and can be used by one side to subjugate another. There are always motives behind surveillance and these motives are usually self-serving. Foucault defines surveillance as a watch kept over a person or a group. But one must realize that this simple definition contains several components. Foucault considers surveillance in both a personal and complex manner. Surveillance can take place between two people such as neighbors. This type of surveillance is very simple and usually involves insignificant issues. At the same time, surveillance can involve many people as well as institutions. Thus, commanders can surveille many soldiers because these commanders have been given the authority to do so. Therefore, surveillance is not considered as one static entity. This is a benefit because Foucault allows himself to consider personal self-surveillance as well as institutional surveillance. AT: Foucault General Foucault’s wrong and outdated. Fuchs 10 (Christian, Department of Informatics and Media Studies, Uppsala University, “The Internet & Surveillance - Research Paper Series,” October 1, 2010, http://www.sns3.uti.at/wpcontent/uploads/2010/10/The-Internet-Surveillance-Research-Paper-Series-1-Christian-Fuchs-HowSurveillance-Can-Be-Defined.pdf)//ghs-VA Some scholars argue that Foucault’s notion of surveillance is outdated because surveillance would today no longer be centralized, but operate in a decentralized and networked form so that there is not a central surveilling power, but many disperse and heterogeneous agents of surveillance. “Certainly, surveillance today is more decentralized, less subject to spatial and temporal constraints (location, tie of day, etc.), and less organized than ever before by the dualisms of observer and observed, subject and object, individual and mass. The system of control is deterritorializing” (Bogard 2006, 102). Lace (2005, 210) argues that “allusions to Big Brother scrutiny are becoming dated – instead, we now are moving towards a society of ‘little brothers’” (see also Castells 2004, 342; Solove 2004, 32) that she terms a democratized surveillance society. Haggerty and Ericson (2000/2007) define surveillance based on Gilles Deleuze and Félix Guattari as assemblage. The surveillant assemblage means “a rhizomatic levelling of the hierarchy of surveillance, such that groups which were previously exempt from routine surveillance are now increasingly being monitored” (Haggerty and Ericson 2000/2007, 104). They argue that one should conceive contemporary surveillance with analytical tools that are different from Foucault and Orwell . Haggerty (2006) calls for demolishing Foucault’s notion of the panopticon. Haggerty and Ericson (2000/2007) argue that contemporary surveillance is heterogeneous, involves humans and non-humans, state and extra-state institutions, “allows for the scrutiny of the powerful by both institutions and the general population” (Haggerty and Ericson 2000/2007, 112). They interpret Mathiesen as saying that synopticism means “’bottom-up’ forms of observation” (Haggerty and Ericson 2000/2007, 113). Hier (2003/2007, 118) argues that the surveillant assemblage brings about “a partial democratization of surveillance hierarchies”. FISA Electronic Surveillance Two requirements 1. The target cannot consent 2. Either the receiving or sending agent must be within the U.S. FISA 78 (Foreign Intelligence Surveillance Act, Legal Document Outlining Electronic Surveillance Within The United States For Foreign Intelligence Purposes, “Foreign Intelligence Surveillance Act of 1978. 50 us e 1801,” http://www.gpo.gov/fdsys/pkg/STATUTE-92/pdf/STATUTE-92-Pg1783.pdf)//ghs-VA (f) "Electronic surveillance" means— (1) the acquisition by an electronic, mechanical, or other surveillance device of the contents of any wire or radio communication sent by or intended to be received by a particular, known United States person who is in the United States, if the contents are acquired by intentionally targeting that United States person, under circumstances in which a person •'• has a reasonable expectation of privacy and a warrant would be required for law enforcement purposes; (2) the acquisition by an electronic, mechanical, or other surveillance device of the contents of any wire communication to or from a person in the United States, without the consent of any party thereto , if such acquisition occurs in the United States ; (3) the intentional acquisition by an electronic, mechanical, or other surveillance device of the contents of any radio communication, under circumstances in which a person has a reasonable expectation of privacy and a warrant would be required for law enforcement purposes, and if both the sender and all intended recipients are located within the United States; or (4) the installation or use of an electronic, mechanical, or other surveillance device in the United States for monitoring to acquire information, other than from a wire or radio communication, under circumstances in which a person has a reasonable expectation of privacy and a warrant would be required for law enforcement purposes. Focused and Systematic Surveillance is focused and systematic. Richards 13 (NM Richards, Professor of Law, Washington University School of Law, “THE DANGERS OF SURVEILLANCE,” 2013, http://harvardlawreview.org/wpcontent/uploads/pdfs/vol126_richards.pdf)//ghs-VA Reviewing the vast surveillance studies literature, Professor David Lyon concludes that surveillance is primarily about power, but it is also about personhood.8 Lyon offers a definition of surveillance as “the focused, systematic and routine attention to personal details for purposes of influence, management, protection or direction.”9 Four aspects of this definition are noteworthy, as they expand our understanding of what surveillance is and what its purposes are. First, it is focused on learning information about individuals. Second, surveillance is systematic; it is intentional rather than random or arbitrary. Third, surveillance is routine — a part of the ordinary administrative apparatus that characterizes modern societies.10 Fourth, surveillance can have a wide variety of purposes — rarely totalitarian domination, but more typically subtler forms of influence or control.1 Surveillance is systematic and ongoing (Tobacco Free Initiative 2003, The World Health Organization Tobacco Free Initiative is part of the Noncommunicable Diseases and Mental Health cluster at WHO headquarters in Geneva, Switzerland. http://www.who.int/tobacco/surveillance/about_surveillance/en/) Surveillance is systematic ongoing collection, collation and analysis of data and the timely dissemination of information to those who need to know so that action can be taken. Surveillance is based on Data (B. C. K. Choi and A. W. P. Pak, “Lessons for surveillance in the 21st century: a historical perspective from the past five millennia,” Sozial- und Praventivmedizin, vol. 46, no. 6, pp. 361–368, 2001. http://link.springer.com/article/10.1007/BF01321662) Surveillance is based upon successful analysis of population-based, on-going data (e.g., death records). There are several basic principles of data analysis: reduce volumes of data to a few easy-to-understand tables, then interpret them, and prepare a few brief and precise paragraphs, so as to gain profit from the data analysis, in order to understand the increase and decrease of diseases [7]. Surveillance means watchfulness over trends (A. D. Langmuir, “The surveillance of communicable diseases of national importance,” The New England Journal of Medicine, vol. 268, pp. 182–192, 1963. http://www.nejm.org/doi/pdf/10.1056/NEJM196301242680405) Surveillance, when applied to a disease, means the continued watchfulness over the distribution and trends of incidence through the systematic collection, consolidation and evaluation of morbidity and mortality reports and other relevant data. Intrinsic in the concept is the regular dissemination of the basic data and interpretations to all who have contributed and to all others who need to know” [67. Specific People & Purpose Surveillance isn’t general but has a specific purpose. Macnish 12 (Kevin, Professor @ the University of Leeds, “Surveillance Ethics,” 2012, http://www.iep.utm.edu/surv-eth/)//ghs-VA Surveillance involves paying close and sustained attention to another person. It is distinct from casual yet focused people-watching, such as might occur at a pavement cafe, to the extent that it is sustained over time. Furthermore the design is not to pay attention to just anyone, but to pay attention to some entity (a person or group) in particular and for a particular reason. Nor does surveillance have to involve watching. It may also involve listening, as when a telephone conversation is bugged, or even smelling, as in the case of dogs trained to discover drugs, or hardware which is able to discover explosives at a distance. AT: Specific Purpose Your interpretation is outdated. Liscouski 14 (Bob, more then 30 years of experience in security and law enforcement, and he is the Executive Vice President of Integrated Strategies Group, “Changing the Definition of Surveillance in the Age of Converged Risk,” March 1, 2014, http://www.securitymagazine.com/articles/85274-changingthe-definition-of-surveillance-in-the-age-of-converged-risk)//ghs-VA Surveillance deals with the act of carefully watching someone or something with the specific intent to prevent or detect a crime. A couple of decades ago that would have been a true definition as it related to protecting an enterprise against threats with limited capabilities and limited access to the enterprise. “Watching one thing” was sufficient. However, in our current technological state, that simple definition now involves more complexity and sophistication than ever before. The explosive growth of technological capabilities and people that can use them to probe, prepare and perpetrate an attack or criminal act against a geographically dispersed enterprise from thousands of miles away, undermines traditional surveillance strategies. Technologically Based Surveillance only uses specific forms of tech. Fuchs 10 (Christian, Department of Informatics and Media Studies, Uppsala University, “The Internet & Surveillance - Research Paper Series,” October 1, 2010, http://www.sns3.uti.at/wpcontent/uploads/2010/10/The-Internet-Surveillance-Research-Paper-Series-1-Christian-Fuchs-HowSurveillance-Can-Be-Defined.pdf)//ghs-VA Surveillance is “the act of monitoring the behaviour of another either in real-time using cameras, audio devices or key-stroke monitoring, or in chosen time by data mining records of internet transactions” (Wall 2007, 230). AT: XO 12333 Your interpretation is about foreign intelligence gathering – not domestic. Mayer 14 (Jonathan, Lawyer @ Stanford, “Executive Order 12333 on American Soil, and Other Tales from the FISA Frontier,” December 3, 2014, http://webpolicy.org/2014/12/03/eo-12333-on-americansoil/)//ghs-VA When the National Security Agency collects data inside the United States, it’s regulated by the Foreign Intelligence Surveillance Act. There’s a degree of court supervision and congressional oversight. When the agency collects data outside the United States, it’s regulated by Executive Order 12333. That document embodies the President’s inherent Article II authority to conduct foreign intelligence. There’s no court involvement, and there’s scant legislative scrutiny. So, that’s the conventional wisdom. American soil: FISA. Foreign soil: EO 12333. Unfortunately, the legal landscape is more complicated. FRAMEWORK/EDUCATION STUFF Public Debate – Mimoso Debates over meta-data and the NSA and uniquely key now – outweighs your education claims. Mimoso 14 (Michael, award-winning journalist and former Editor of Information Security magazine, a two-time finalist for national magazine of the year. He has been writing for business-to-business IT websites and magazines for over 10 years, with a primary focus on information security, “NSA Reforms Demonstrate Value of Public Debate,” March 26, 2014, https://threatpost.com/nsa-reformsdemonstrate-value-of-public-debate/105052)//ghs-VA The president’s proposal would end the NSA’s collection and storage of phone data; those records would remain with the providers and the NSA would require judicial permission under a new court order to access those records. The House bill, however, requires no prior judicial approval; a judge would rule on the request after the FBI submits it to the telecommunications company. “ It’s absolutely crucial to understand the details of how these things will work ,” the ACLU’s Kaufman said in reference to the “new court order” mentioned in the New York Times report. “There is no substitute for robust Democratic debate in the court of public opinion and in the courts. The system of oversight is broke and issues like these need to be debated in public .” Phone metadata and dragnet collection of digital data from Internet providers and other technology companies is supposed to be used to map connections between foreigners suspected of terrorism and threatening the national security of the U.S. The NSA’s dragnet , however, also swept up communication involving Americans that is supposed to be collected and accessed only with a court order. The NSA stood by claims that the program was effective in stopping hundreds of terror plots against U.S. interests domestic and foreign. Those numbers, however, quickly were lowered as they were challenged by Congressional committees and public scrutiny. “The president said the effectiveness of this program was one of the reasons it was in place,” Kaufman said. “But as soon as these claims were made public, journalists, advocates and the courts pushed back and it could not withstand the scrutiny. It’s remarkable how quickly [the number of] plots turned into small numbers. The NSA was telling FISC the program was absolutely necessary to national security, but the government would not go nearly that far in defending the program. That shows the value of public debate and an adversarial process in courts.” Education – Giroux Political engagement is necessary – your ethical education absent concrete political reform is the exact reason the lefts progressivism fails. Giroux 15 (Henry, currently holds the McMaster University Chair for Scholarship in the Public Interest in the English and Cultural Studies Department and the Paulo Freire Chair in Critical Pedagogy at The McMaster Institute for Innovation & Excellence, “Orwell, Huxley and the Scourge of the Surveillance State,” 30 June 2015, http://www.truth-out.org/news/item/31639-orwell-huxley-and-the-scourge-ofthe-surveillance-state)//ghs-VA In this instance, the surveillance state is one that not only listens, watches and gathers massive amounts of information through data mining, allegedly for the purpose of identifying "security threats." It also acculturates the public into accepting the intrusion of commercial surveillance technologies - and, perhaps more vitally, the acceptance of privatized, commodified values - into all aspects of their lives. In other words, the most dangerous repercussions of a near total loss of privacy involve more than the unwarranted collecting of information by the government: We must also be attentive to the ways in which being spied on has become not only normalized, but even enticing, as corporations up the pleasure quotient for consumers who use new digital technologies and social networks - not least of all by and for simulating experiences of community. Many individuals, especially young people , now run from privacy and increasingly demand services in which they can share every personal facet of their lives. While Orwell's vision touches upon this type of control, there is a notable difference that he did not foresee. According to Pete Cashmore, while Orwell's "Thought Police tracked you without permission, some consumers are now comfortable with sharing their The state and corporate cultural apparatuses now collude to socialize everyone - especially young people into a regime of security and commodification in which their identities, values and desires are inextricably tied to a culture of commodified addictions, self-help, therapy and social indifference. every move online." (17) Intelligence networks now inhabit the world of major corporations such as Disney and Bank of America as well as the secret domains of the NSA, FBI and 15 other intelligence agencies. As Edward Snowden's revelations about the PRISM program revealed, the NSA has also collected personal data from many of the world's largest internet companies, including Apple, Google, Yahoo and Facebook. According to a senior lawyer for the NSA, the internet companies "were fully aware of the surveillance agency's widespread collection of data." (18) The fact is that Orwell's and Huxley's ironic representations of the modern totalitarian state - along with their implied defense of a democratic ideal rooted in the right to privacy and the right to be educated in the capacity to be autonomous and critical thinkers - have been transformed and mutilated almost beyond recognition by the material and ideological registers of a worldwide neoliberal order. Just as we can envision Orwell's and Huxley's dystopian fables morphing over time from "realistic novels" into a "real life documentary," and now into a form of "reality TV," privacy and freedom have been radically altered in an age of permanent, nonstop global exchange and circulation. That is, in the current moment, the right to privacy and freedom has been usurped by the seductions of a narcissistic culture and casino capitalism's unending desire to turn every relationship into an act of commerce and to make all aspects of daily life subject to market forces under watchful eyes of both government and corporate regimes of surveillance In a world devoid of care, compassion and protection, personal privacy and freedom are no longer connected and resuscitated through their connection to public life, the common good or a vulnerability born of the recognition of the frailty of human life. Culture loses its power as the bearer of public memory, civic literacy and the lessons of history in a social order in which the worst excesses of capitalism are left unchecked and a consumerist ethic "makes impossible any shared recognition of common interests or goals." (19) With the rise of the punishing state along with a kind of willful amnesia taking hold of the larger culture, we see little more than a paralyzing fear and apathy in response to the increasing exposure of formerly private spheres to data mining and manipulation, while the concept of privacy itself has all but expired under a "broad set of panoptic practices." (20) With individuals more or less succumbing to this insidious cultural shift in their daily lives, there is nothing to prevent widespread collective indifference to the growth of a surveillance culture, let alone an authoritarian state. The worst fears of Huxley and Orwell merge into a dead zone of historical amnesia as more and more people embrace any and every new electronic device regardless of the risks it might pose in terms of granting corporations and governments increased access to and power over their choices and movements. Detailed personal information flows from the sphere of entertainment to the deadly serious and integrated spheres of capital accumulation and policing as they are collected and sold to business and government agencies that track the populace for either commercial purposes or for fear of a possible threat to the social order and its established institutions of power. Power now imprisons not only bodies under a regime of surveillance and a mass incarceration state but also subjectivity itself, as the threat of state control is now coupled with the seductions of the new forms of passivity-inducing soma: electronic technologies, a pervasive commodified landscape and a mind-numbing celebrity culture. The Growing Role of Private Security Companies Underlying these everyday conveniences of modern life, as Boghosian documents in great detail, is the growing Orwellian partnership between the militarized state and private security companies in the United States. Each day, new evidence surfaces pointing to the emergence of a police state that has produced ever more sophisticated methods for surveillance in order to enforce a mass suppression of the most essential tools for democratic dissent: "the press, political activists, civil rights advocates and conscientious insiders who blow the whistle on corporate malfeasance and government abuse." (21) As Boghosian points out, Nowhere is this more evident than in US public schools where young people are being taught that they are a generation of suspects, subject to the presence of armed police and security guards, drug-sniffing dogs and an array of surveillance apparatuses that chart "By claiming that anyone who questions authority or engages in undesired political speech is a potential terrorist threat, this government-corporate partnership makes a mockery of civil liberties." (22) their every move, not to mention in some cases how they respond emotionally to certain pedagogical practices. Whistleblowers are not only punished by the government; their lives are also turned upside down in the process by private surveillance agencies and major corporations that now work in tandem. For instance, Bank of America assembled 15 to 20 bank officials and retained the law firm of Hunton & Williams in order to devise "various schemes to attack WikiLeaks and [journalist Glenn] Greenwald whom they thought were about to release damaging information about the bank." (23) It is worth repeating that Orwell's vision of surveillance and the totalitarian state look mild next to the emergence of a corporate-state surveillance system that wants to tap into every conceivable mode of communication, collect endless amounts of metadata to be stored in vast intelligence storage sites around the country and potentially use that data to repress any vestige of dissent. (24) As Huxley anticipated, any critical analysis must move beyond documenting abuses of power to how addressing contemporary neoliberal modernity has created a social order in which individuals become complicit with authoritarianism. That is, how is unfreedom internalized? What and how do state- and corporate-controlled institutions, cultural apparatuses, social relations and policies contribute to making a society's plunge into dark times self-generating as Huxley predicted? Put differently, what is the educative nature of a repressive politics and how does it function to secure the consent of the US public? And, most importantly, how can it be challenged and under what circumstances? The nature of repression has become more porous, employing not only brute force, but also dominant modes of education, persuasion and authority. Aided by a public pedagogy, produced and circulated through a machinery of consumption and public relations tactics, a growing regime of repression works through the homogenizing forces of the market to support the widespread embrace of an authoritarian culture and police state. Relentlessly entertained by spectacles, people become not only numb to violence and cruelty but begin to identify with an authoritarian worldview. As David Graeber suggests, the police "become the almost obsessive objects of imaginative identification in popular culture ... watching movies, or viewing TV shows that invite them to look at the world from a police point of view." (25) But it is not just the spectacle of violence that ushers individuals into a world in which brutality becomes a primary force for mediating relations as well as the ultimate source of pleasure; there is also the production of an unchecked notion of individualism that both dissolves social bonds and removes any viable notion of agency from the landscape of social responsibility and ethical consideration. Absorbed in privatized orbits of consumption, commodification and display, Americans vicariously participate in the toxic pleasures of the authoritarian state. Violence has become the organizing force of a society driven by a noxious notion of privatization in which it becomes difficult for ideas to be lifted into the public realm. Under such circumstances, politics is eviscerated because it now supports a market-driven view of society that has turned its back on the idea that social values, public trust and communal relations are fundamental to a democratic society. This violence against the bonds of sociality undermines and dissolves the nature of social obligations as freedom becomes an exercise in self-development rather than social responsibility. This upending of the social and critical modes of agency mimics not just the death of the radical imagination, but also a notion of banality made famous by Hannah Arendt who argued that at the root of totalitarianism was a kind of thoughtlessness, an inability to think, and a type of outrageous indifference in which, "There's simply the reluctance ever to imagine what the other person is experiencing." (26) Confronting the Threat of Authoritarianism By integrating insights drawn from both Huxley and Orwell, it becomes necessary for any viable critical analysis to take a long view, contextualizing the contemporary moment as a new historical conjuncture in which political rule has been replaced by corporate sovereignty, consumerism becomes the only obligation of citizenship, and the only value that matters is exchange value. Precarity has replaced social protections provided by the state, just as the state cares more about building prisons and infantilizing the US public than it does about providing all of its citizens with quality educational institutions and health care. The United States is not just dancing into oblivion as Huxley suggested; it is also being pushed into the dark recesses of an authoritarian state. Orwell wrote dystopian novels but he believed that the sheer goodness of human nature would in the end be enough for individuals to develop modes of collective resistance that he could only imagine in the midst of the haunting specter of totalitarianism. Huxley was more indebted to Kafka's notion of destabilization, despair and hopelessness. For Huxley, the subject had lost his or her sense of agency and had become the product of a scientifically manufactured form of idiocy and conformity. Progress had been transformed into its opposite, and science needed to be liberated from itself. As Theodor Adorno has pointed out, where Huxley fails is that he has no sense of resistance. According to Adorno, "The weakness of Huxley's entire conception is that it makes all its concepts relentlessly dynamic but nevertheless The authoritarian nature of the corporate-state surveillance apparatus and security system with its "urge to surveil, eavesdrop on, spy on, monitor, record, and save every communication of any sort on the planet" (28) can only be fully understood when its ubiquitous tentacles are connected to wider cultures of control and punishment, including security-patrolled corridors of public schools, the rise in supermax prisons, the hypermilitarization of local police forces, the justification of secret arms them against the tendency to turn into their own opposites." (27) Hence, the forces of resistance are not simply underestimated but rendered impotent. prisons and state-sanctioned torture abroad, and the increasing labeling of dissent as an act of terrorism in the United States. (29) This is part of Orwell's narrative, but it does not go far enough. The new authoritarian, corporatedriven state deploys more subtle tactics to depoliticize public memory and promote the militarization of everyday life. Alongside efforts to defund public and higher education and to attack the welfare state, a wide-ranging assault is being waged across the culture on all spheres that encourage the public to hold power accountable. If these public institutions are destroyed, there will be few sites left in which to nurture the critical formative cultures capable of educating people to challenge the range of injustices plaguing the United States and the forces that reproduce them. One particular challenge comes from the success of neoliberal tyranny to dissolve those social bonds that entail a sense of responsibility toward others and form the basis for political consciousness. Under the new authoritarian state, perhaps the gravest threat one faces is not simply being subject to the dictates of what Quentin Skinner calls "arbitrary power," but failing to respond with outrage when "my liberty is also being violated, and not merely by the fact that someone is reading my emails but also by the fact that someone has the power to do so should they choose." (30) The situation is dire when people no longer seem interested in contesting such power. It is precisely the poisonous spread of a broad culture of political indifference that puts at risk the fundamental principles of justice and freedom, which lie at the heart of a robust democracy. The democratic imagination has been transformed into a data machine that marshals its inhabitants into the neoliberal dream world of babbling consumers and armies of exploitative labor whose ultimate goal is to accumulate capital and initiate individuals into the brave new surveillance-punishing state that merges Orwell's Big Nothing will change unless people begin to take seriously the subjective underpinnings of oppression in the United States and what it might require to make such issues meaningful in order to make them critical and transformative. As Charles Derber has explained, Brother with Huxley's mind-altering soma. knowing "how to express possibilities and convey them authentically and persuasively seems crucially important " (31) if any viable notion of resistance is to take place. The current regime of authoritarianism is reinforced through a new and pervasive sensibility in which people surrender themselves to both the capitalist system and a general belief in its call for security. It does not simply repress independent thought, but constitutes new modes of thinking through a diverse set of cultural apparatuses ranging from the schools and media to the internet. The fundamental question in resisting the transformation of the United States into a 21st century authoritarian society must concern the educative nature of politics - that is, what people believe and how their individual and collective dispositions and capacities to be either willing or resistant agents are shaped. I want to conclude by recommending five initiatives, though incomplete, that might help young people and others challenge the current oppressive historical conjuncture in which they along with other oppressed groups now find themselves. My focus is on higher education because that is the one institution that is under intense assault at the moment because it has not completely surrendered to the Orwellian state. (32) A Resource for Resistance: Reviving the Radical Imagination First, there is a need for what can be called a revival of the radical imagination. This call would be part of a larger project "to reinvent democracy in the wake of the evidence that, at the national level, there is no democracy - if by 'democracy' we mean effective popular participation in the crucial decisions affecting the community." (33) Democracy entails a challenge to the power of those individuals, financial elites, ruling groups and large-scale enterprises that have hijacked democracy. At the very least, this means refusing to accept minimalist notions of democracy in which elections become the measure of democratic participation. Far more crucial is the struggle for the development of public spaces and spheres that produce a formative culture in which the US public can imagine forms of democratic self-management of what can be called "key economic, political, and social institutions." (34) One step in this direction would be for young people, intellectuals, scholars and others to go on the offensive in defending higher education as a public good, resisting as much as possible the ongoing attempt by financial elites to view its mission in instrumental terms as a workstation for capital. This means fighting back against a conservative-led campaign to end tenure, define students as consumers, defund higher education and destroy any possibility of faculty governance by transforming most faculty into adjuncts. Higher education should be harnessed neither to the demands of the warfare state nor to the instrumental needs of corporations. In fact, it should be viewed as a right rather than as an entitlement. Nowhere is this assault on higher education more evident than in the efforts of billionaires such as Charles and David Koch to finance academic fields and departments, and to shape academic policy in the interest of indoctrinating the young into the alleged neoliberal, free market mentality. It is also evident in the repressive policies being enacted at the state level by right-wing politicians. For instance, in Florida, Gov. Rick Scott's task force on education has introduced legislation that would lower tuition for degrees friendly to corporate interests in order to "steer students toward majors that are in demand in the job market." (35) In Wisconsin, Gov. Scott Walker drew up a proposal to remove the public service philosophy focus from the university's mission statement, which says that the university's purpose is to solve problems and improve people's lives. He also scratched out the phrase "the search for truth" and substituted both ideas with a vocabulary stating that the university's goal is to meet "the state's work force needs." (36) But Walker's disdain for higher education as a public good can be more readily understood given his hatred of unions, particularly those organized for educators. How else to explain his egregious comparison of union protesters to the brutal terrorists and thugs that make up ISIS and his ongoing attempts to eliminate tenure at Wisconsin's public universities as well as to eviscerate any vestige of shared governance. (37) Another egregious example of neoliberalism's Orwellian assault on higher education can be found in the policies promoted by the Republican Party members who control the North Carolina Board of Governors. Just recently it has decimated higher education in that state by voting to cut 46 academic degree programs. One member defended such cuts with the comment: "We're capitalists, and we have to look at what the demand is, and we have to respond to the demand." (38) The ideology that drives this kind of market-driven assault on higher education was made clear by the state's Republican governor, Pat McCrory, who said in a radio interview, "If you want to take gender studies, that's fine, go to a private school and take it. But I don't want to subsidize that if that's not going to get someone a job." (39) This is more than an example of crude economic instrumentalism; it is also a recipe for instituting an academic culture of thoughtlessness and a kind of stupidity receptive to what Hannah Arendt once called totalitarianism. Crafting Educational Counternarratives Second, young people and progressives need to create the institutions and public spaces in which education becomes central as a counternarrative that serves to both reveal, interrogate and overcome the common sense assumptions that provide the ideological and affective webs that tie many people to forms of oppression . Domination is not just structural and its subjective roots and pedagogical mechanisms need to be viewed as central to any politics that aims to educate, change individual and collective consciousness, and contribute to broadbased social formations. Relatedly, a coalition of diverse social movements, from unions to associations of artists, educators and youth groups, needs to develop a range of alternative public spheres in which young people and others can become cultural producers capable of writing themselves back into the discourse of democracy while bearing witness to a range of ongoing injustices from police violence to the violence of the financial elite. Rejecting Criminalization Third, the United States has become a society in which the power at the state and national levels has become punitive for most Americans and beneficial for the financial and corporate elite. Punishment creep now reaches into almost every commanding institution that holds sway over the US public and its effects are especially felt by poor people, Black people, young people and the elderly. Millions of young men are held in prisons and jails across the United States, and most of them for nonviolent crimes. Working people are punished after a lifetime of work by having their pensions either reduced or taken away. Poor people are denied Medicaid because right-wing politicians believe the poor should be financially responsible for their health care. And so it goes. The United States is one of the few countries that allows teenagers to be tried as adults, even though there are endless stories of such youth being abused, beaten and in some cases committing suicide as a result of such savage treatment. Everywhere we look in US society, routine behavior is being criminalized. If you owe a parking ticket, you may end up in jail. If you violate a dress code as a student, you may be handcuffed by the police and charged with a criminal offense. A kind of mad infatuation with violence is matched by an increase in state lawlessness. In particular, young people have been left out of the discourse of democracy. They are the new disposables who lack jobs, a decent education, hope and any semblance of a future better than the one their parents inherited. In addition, an increasing number of youth suffer mental anguish and overt distress, even, perhaps especially, among the college-bound, debt-ridden and unemployed whose numbers are growing exponentially. Many reports claim that "young Americans are suffering from rising levels of anxiety, stress, depression and even suicide." For example, "One out of every five young people and one out of every four college students ... suffers from some form of diagnosable mental illness." (40) According to one survey, "44 percent of young aged 18 to 24 say they are excessively stressed." (41) One factor may be that there are so few jobs for young people. In fact the jobless rate for Americans aged 15 to 24 stands at 15.8 percent, more than double the unemployment rate of 6.9 percent for all ages, according to the World Bank. (42) Facing what Richard Sennett calls the "specter of uselessness," the war on youth serves as a reminder of how finance capital has abandoned any viable vision of democracy, including one that would support future generations. The war on youth has to be seen as a central element of state terrorism and as the claims and promises of a neoliberal utopia have been transformed into an Orwellian and Dickensian nightmare, the United States continues to succumb to the pathologies of political corruption, the redistribution of wealth upward into the hands of the 1%, the rise of the surveillance state and the use of the criminal legal system as a way of dealing with social problems. At the same time, Orwell's dark fantasy of an authoritarian future continues without enough massive opposition as students and low-income and poor youth of color are exposed to a lowintensity war in which they are held hostage to a neoliberal discourse that translates systemic issues crucial to critically engaging the current regime of neoliberalism. Reclaiming Emancipatory Morality Fourth, into problems of individual responsibility. This individualization of the social is one of the most powerful ideological weapons used by the current authoritarian regime and must be challenged . Under the star of Orwell, morality loses its emancipatory possibilities and degenerates into a pathology in which misery is denounced as a moral failing. Under the neo-Darwinian ethos of survival of the fittest, the ultimate form of entertainment becomes the pain and humiliation of others, especially those considered disposable and powerless, who are no longer an object of compassion, but of ridicule and amusement. This becomes clear in the endless stories we are now hearing from US politicians disdaining the poor as moochers who don't need welfare but stronger morals. This narrative can also be heard from conservative pundits, such as New York Times columnist David Brooks, who epitomize this view. According to Brooks, poverty is a matter of the poor lacking virtue, middle-class norms and decent moral codes. (43) For Brooks, the problems of the poor and disadvantaged can be solved "through moral education and self-reliance ... high-quality relationships and strong familial ties." (44) In this discourse, soaring inequality in wealth and income, high levels of unemployment, stagnant economic What Brooks and other conservatives conveniently disregard are the racist nature of the drug wars, the strangle hold of the criminal legal system on poor Black communities, police violence, mass unemployment for Black youth, poor quality education in lowincome neighborhoods, and the egregious effect of mass incarceration on communities of color. Paul Krugman growth and low wages for millions of working Americans are ignored. gets it right in rebutting the argument that all the poor need are the virtues of middle-class morality and a good dose of resilience. (45) He writes: So it is ... disheartening still to see commentators suggesting that the poor are causing their own poverty, and could easily escape if only they acted like members of the upper middle class.... Shrugging your shoulders as you attribute it all to values is an act of malign neglect. don't need lectures on morality, The poor they need more resources - which we can afford to provide - and better economic opportunities, which we can also afford to provide through everything from training and subsidies to higher minimum wages. (46) Developing a Language of Critique and Possibility Lastly, any attempt to make clear the massive misery, exploitation, corruption and suffering produced under casino capitalism must develop both a language of critique and possibility. It is not enough to simply register what is wrong with US society ; it is also crucial to do so in a way that enables people to recognize themselves in such discourses in a way that both inspires them to be more critical and energizes them to do something about it. In part, this suggests a politics that is capable of developing a comprehensive vision of analysis and struggle that "does not rely on single issues." (47) It is only through an understanding of the wider relations and connections of power that the US public can overcome uninformed practice, isolated struggles and modes of singular politics that become insular and self-sabotaging. This means developing modes of analyses capable of connecting isolated and individualized issues to more generalized notions of freedom, and developing theoretical frameworks in which it becomes possible to translate private troubles into broader more systemic conditions. In short, this suggests developing modes of analyses that connect the dots historically and relationally. It also means developing a more comprehensive vision of politics and change. The key here is the notion of translation, that is, the need to translate private troubles into broader public issues and understand how systemic modes of analyses can be helpful in connecting a range of issues so as to be able to build a united front in the call for a radical democracy. This is a particularly important goal given that the fragmentation of the left has been partly responsible for its inability to develop a wide political and ideological umbrella to address a range of problems extending from extreme poverty, the assault on the environment, the emergence of the permanent warfare state, the rollback of voting rights, the assault on public servants, women's rights and social provisions, and a range of other issues that erode the possibilities for a radical democracy. The dominating mechanisms of casino capitalism in both their symbolic and material registers reach deep into every aspect of US society. Any successful movement for a radical democracy will have to wage a struggle against the totality of this new mode of authoritarianism rather than isolating and attacking specific elements of its anti-democratic ethos. Metadata Education Good Metadata is going to define privacy in the 21st century – education over it is important. Latamore 11 (G. Berton, Editor in Chief of Wikibon, “Storage Peer Incite,” Jan 17, 2011, http://wikibon.org/wiki/v/Cloud_Meta_Data:_Driving_New_Business_Model)//ghs-VA Traditionally, metadata has been fairly simple and low-level. In the age of cloud services, however, it is taking on a much more important role , and it is becoming more complex. If you buy books on Amazon.com, for instance, you are familiar with the suggestions it provides based on your past purchases. Those are based on an analysis of metadata showing the relationships between books you buy and other purchasers and other books like those you buy that they purchased. That is getting reasonably complex. But that, we believe, is only the beginning. In the future metadata will span the cloud to link data entities on different computers, in different databases, on different services, to provide services that will become an important part of our lives in the 21st Century. Today that is impossible, because the basic tools and standards do not yet exist. In their paper "Angels in our Midst: Associative Metadata in Cloud Storage", Dr. Tom Coughlin and Mike Alvarado present a model architecture based on automated tools they call "Guardian Angels" that watch over data relationships and create metadata and a mechanism for managing and securing that metadata, the "Invisible College." They presented this paper at Wikibon's Nov. 2 Peer Incite Meeting. The recording is available in the Wikibon Peer Incite Archive. All this may sound pretty esoteric, the area of academics and techies in large cloud service providers. But in fact it is important to every organization doing business over the Internet, which today is practically every organization in existence . Complex metadata is the basis for targeted Internet advertising and other automated customer, employee, constituent, and donor management services. Therefore, every organization has a stake in the issue of developing effective standards and management tools for metadata. This means that you need to push your vendors to develop and use open metadata standards. Metadata creates the distinction between what the government can and cannot collect – it will define privacy in the 21st century. Wagner 13 (David, holds English and Political Science B.A.s from UC Berkeley, “Why Metadata Is Shaping The Future of Privacy,” June 7, 2013, http://www.kpbs.org/news/2013/jun/07/why-metadatashaping-future-privacy/)//ghs-VA But what exactly is metadata? What can the government learn from it? And why has the term suddenly appeared at the center of so many debates on the future of privacy? To get answers on those questions, I called Pam Dixon, director of the San Diego-based think tank World Privacy Forum. "Metadata, very simply put, is everything around the conversation but not including the conversation," says Dixon. "For example, the phone numbers of both parties. Where you were when you made the call and where that person who you called was. How long your call was. When you called them." Put another way: No, the government can't eavesdrop on your late-night pizza delivery orders. They'd need a warrant for that. But metadata gives them access to nearly everything else, like your location, your number, and how long the conversation lasted. They can use that information to paint a very detailed picture of your life. We know for sure that Verizon records have been hauled in for the last three months, and probably a lot longer. Senator Feinstein admitted as much when she told MSNBC, "There is nothing new in this program. The fact of the matter is, that this was a routine three-month approval under seal that was leaked." The order requiring Verizon to turn over records on all their customers didn't come from a typical court. It was handed down from the FISA court, a secretive judicial entity authorized by the Foreign Intelligence Surveillance Act of 1978 and expanded under the post-9/11 Patriot Act. "The way that the FISA court collected this information is through what's called a business records provision," says Dixon. In the wake of the Patriot Act, this so-called transactional information is not protected as private information. That's why metadata is such a significant term — if separates what the government can and can't obtain without a warrant. Dixon thinks the terms currently attached to metadata, words like "business" and "transactional," are misnomers. "These are actually very personal records." Dixon says we should get used to hearing the word metadata. Going forward, the question of what is and what isn't metadata will shape American privacy law . "That exact question is under discussion by some of the best minds in privacy," says Dixon. In fact, the line between non-private metadata and content protected by the Fourth Amendment is already forming important distinctions in another facet of the government's surveillance program. On Thursday, The Washington Post revealed that the NSA has also been tapping into the servers of giant tech companies like Google, Apple, and Facebook since 2007. That probing, undertaken by a previously covert NSA program called PRISM, is different from the Verizon case because it accesses actual content, like emails and online search histories, not just the metadata. "Metadata is a very important thing to watch out for," says Dixon. Government officials say that sifting through metadata helps them track down terrorists and foil potential attacks. They insist that this information doesn't breech any one person's privacy. But Dixon thinks metadata gives government says, "It is absolute computer child's play." agents more than enough clues to hone in on specific individuals. She Metadata controls the conversation about information risk. Vellante 11 (David, Co-founder & co-CEO SiliconANGLE Media, industry analyst, entrepreneur, co-host of theCUBE, “Metadata in the Cloud: Creating New Business Models,” Jan 17, 2011, http://wikibon.org/wiki/v/Cloud_Meta_Data:_Driving_New_Business_Model)//ghs-VA As more valuable personal and corporate information is stored in both public and private clouds, organizations will increasingly rely on an expanded view of metadata to both create new value streams and mitigate information risk. By its very nature, cloud architectures allow greater degrees of sharing and collaboration and present new opportunities and risks for information professionals. Incremental value from cloud metadata will be created by leveraging "associative context" created by software that observes users and their evolving relationships with content elements that are both internal and external to an organization. This software will create metadata that allows individuals and organizations to extract even more value from information. These were the ideas put forth by Dr. Tom Coughlin and Mike Alvarado, who presented these concepts to the Wikibon community from a new paper: Angels in our Midst: Associative Metadata in Cloud Storage. What is Metadata and Why is it Important? Metadata is data about data. It is high-level information that includes when something was done, where it was done, the file type and format of the data, the original source, etc. The notion of metadata can be expanded to include information about how content is being used, who is using the content, and when multiple pieces of content are being used can relevant and valuable associations be observed? According to the authors, users should think about the different types and levels of metadata - low-level metadata that provide (for example) information about physical location of blocks, all the way to higher level metadata that can go beyond descriptive to include judgemental information. In other words, what does this content mean and is it relevant to a particular objective or initiative? For example, will I like how it tastes? Will it be cosmetically appealing to me? By leveraging metadata more intelligently, organizations can begin to extract new business value from information and potentially introduce new business models for value creation. Underpinning this opportunity is the relationships between content elements, which the authors refer to as associative metadata. What's Needed to Exploit Associative Metadata? According to Alvarado and Coughlin, if we're going to create associative metadata we need an agent that can be an objective observer. Since individual humans often create many of those relationships, software that is intelligent enough to create new metadata around those interactions and relationships is needed to watch what users are doing. The authors refer to this agent as a "Guardian Angel." Further, to extend the notion of metadata to an even higher, more rich and complex level, the paper puts forth the notion of "The Invisible College," which is a tool for managing the relationships between Guardian Angels and a useful framework for creating a more intricate system of data systems. What Different Types of Metadata Exist? On the call, Todd, an IT practitioner put forth a simple metadata model that included three layers: Basic metadata - low level data - e.g. block level information about where data is stored and how often it is accessed. File-level metadata - more complex data from file systems. Content-level metadata - metadata that might be found in content management systems such as file type and other more meaningful data such as: "Is this email from the CEO?" or "Is the mammogram positive?" Each metadata type is actionable. For example, basic metadata can be used to automate tiering; file-system data can be used to speed performance, and high-level metadata can be used to take business actions. The key challenge is how to capture, process, analyze, and manage all this metadata in an expedient manner. How Will these Metadata be Managed? The authors have put forth in their paper a taxonomy for metadata that is very granular but broken down along two high levels: Meaning Metadata, Basic Metadata. The paper defines an OSI-like model with a physical layer through operational into semantic and contextual layers. The definition of these layers, their interaction and management, will be vital to harnessing the power of this metadata. A key limiting factor is the raw power of systems and the ability to keep pace not only with user interactions but machine-to- machine (M2M) communications. The community discussed the possibility of a Hadoop-like framework, Hadoop itself or other semantic web technologies to be applied to evolving metadata architectures. Rather than shoving the data into a big data repository, the idea is to distribute the metadata and allow parallel processing concepts to operate in tandem. By allowing the metadata to remain distributed, massive volumes of data can be managed and analyzed in real or near-real time, thereby providing a step function in metadata exploitation. Does such a framework exist today specifically designed for cloud metadata management? To the community's knowledge, not per se, but there are numerous open source initiatives such as Hadoop that have the potential to be applied to solving this problem and creating new opportunities for metadata management in cloud environments. What about Privacy and Security in the Cloud? Cloud information storage is accomplished by providing access to stored assets over TCP/IP networks, whether public or private. Cloud computing increases the need to protect content in new ways specifically because the physical perimeter of the organization and its data are fluid. The notion of building a moat to protect the queen in her castle is outmoded in the cloud, because sometimes the queen wants to leave the castle. Compounding the complexity of privacy and data protection is the idea that associations and interactions will dramatically increase between users, users-and-machines, and machines themselves . According to Alvarado and Coughlin, not surprisingly, one answer to this problem is metadata . New types of metadata, according to the authors, will evolve to ensure data integrity, security, and privacy with content that is shared and created by individuals, groups, and machines. For example, metadata could evolve to monitor the physical location of files and ensure that the physical storage of that data complies with local laws that might require that data is not stored outside a particular country. Location services is currently one of the hottest areas in business but it lacks a mechanism to enable the levels of privacy users desire. The services in the Internet world are often being introduced under conditions where they are outstripping the ability of infrastructure to provide a mature framework for issues like corporate policy or effective policy. Mechanism that are described in the paper can make infrastructure more predisposed to keep new service ideas in sync with necessary protection and other mechanisms which are being added after the fact. If developers had access to a toolkit before they deploy that is easily accessible, we would be ahead of the game. The authors state the following: "Whatever data system solutions arise, they will have identifiable characteristics such as automated or semi-automated information classification and inventory algorithms with significance and retention bits, automated information access path management, information tracking and simulated testing access (repeated during the effective life time of information for quality assurance), and automated information metadata reporting." A key concern in the Wikibon community is the notion of balancing information value with information risk. Specifically, business value constricts as organizations increasingly automate the policing of data and information, and striking a risk reduction/value creation balance is an ongoing challenge for CIOs. The bottom line is that the degree of emphasis on risk versus value will depend on a number of factors, including industry, regulatory requirements, legal issues, past corporate history, culture, company status (i.e. private versus publicly traded), and other issues. When will Architectures and Products Emerge? Clearly the authors ideas are futuristic in nature, however the value of this exercise is that Alvarado and Coughlin are defining an end point and helping users and vendors visualize the possibility of cloud computing in the context of creating new business models. The emphasis on metadata underscores the importance of defining, understanding and managing metadata to create new business opportunities and manage information risk. The role of metadata in this regard is undeniable and while solutions on the market are limited today, they are beginning to come to fruition in pockets. Key developments are occurring within standards communities to address this opportunity, and the authors believe that these efforts are beginning to coalesce around the Angel and Invisible College notion. Specifically they cite the evolution of Intel's work on Fodor. As well, clearly mashups using Google mapping capabilities with GPS triangulation extensively use metadata to create new value. Frameworks like Hadoop could be instrumental in providing fast analytics for big data and other semantic web technologies are emerging to address these issues. From a storage perspective, few suppliers are actively talking about this opportunity in their marketing, but several have advanced development projects to better understand how to exploit metadata for classification, policy automation, collaboration, and the like. Action item: Initial cloud computing deployments have been accelerated due to the economic crisis, and many have focused on reducing costs. At the same time, numerous organizations are enabling new business models using cloud platforms. These initiatives are creating truckloads of data and metadata, and users and vendors must identify opportunities to both harness and unleash metadata to mitigate information risks and at the same time create new value pathways. The degree to which this is possible will be a function of an organization's risk tolerance, its culture, regulatory compliance edicts, and a number of other factors. Whatever the path, fundamental to managing data in the 21st century . metadata exploitation will be McArthur 11 (John, President of Cameron University in Lawton-Fort Sill, Oklahoma with a branch in Duncan, Oklahoma. Cameron University is a public, master’s degree, “Metadata Helping Organizations Say Yes to Cloud Services,” Jan 17, 2011, http://wikibon.org/wiki/v/Cloud_Meta_Data:_Driving_New_Business_Model)//ghs-VA Well-functioning organizations have developed structures to balance requirements for revenue creation, cost containment, and risk management to deliver predictable profit and growth. Within most organizations, the IT department is often charged with many of the cost-reduction initiatives, legal, audit, security, and compliance departments are charged with risk reduction, and the line-of-business is charged with driving increased value and revenue. The development and evolution of private- and public-cloud services promise decreased costs for the IT department through super-consolidation and the efficiency of shared infrastructure services. Business units see cloud-based services enabling increased revenue and value, not only by offering a more scalable and flexible infrastructure but also by leveraging the combined data of the organization and the knowledge gleaned from other users of the cloud. Those charged with risk management will be appropriately concerned about data privacy, data security, data loss, and legal and regulatory compliance for both public and private clouds. That said, companies that fail to embrace private and public cloud approaches run the risk of revenue stagnation and high costs, which promises certain, if slow, death. Cloud metadata is the key to satisfying the concerns of risk managers , while enabling IT and revenue-producing business units to fully embrace and exploit these new service-delivery models. Such a model of cloud metadata is detailed in a document created by Tom Coughlin and Mike Alvarado entitled "Angels in our Midst: Associative Metadata in Cloud Storage." For risk managers concerned about placing data in a shared infrastructure, the "Basic Data Levels" of metadata, described in the first four layers of the model, can be used to control access, determine which files and data should be encrypted, and control where data is allowed to move and be shared both within and outside the walls of the corporation. For risk managers concerned about compliance with security and privacy laws, the "Meaning Levels" of metadata, described in the top three layers of the model, can enable the analysis of customers and their relationships while ensuring that customer-unique identifying information is protected. Organizations need to consider all three dimensions: revenue and value creation, cost control, and risk management. Organizations will have differing views of the appropriate balance among revenue, cost, and risk, depending upon their industry, company history, financial position, and extent of regulatory oversight, but all three constituencies must have a seat at the table. It’s always easy to kill something by saying it’s too risky. The inherent risk, however, lies in not finding ways to say ‘yes’ and being left behind. Action item: With the increased availability of private- and public-cloud infrastructure and applications, organizations should bring together the key stakeholders for revenue growth, cost containment, and risk management. The priority of the stakeholders should be to establish and leverage a new hierarchy of metadata to enable organizations to manage risk while exploiting the cost benefits and value creation of cloud-based infrastructure. Floyer 11 (David, Wikibon’s resident CTO. Floyer spent more than twenty years at IBM holding positions in research, “Metadata for Big Data and the Cloud,” Jan 17, 2011, http://wikibon.org/wiki/v/Cloud_Meta_Data:_Driving_New_Business_Model)//ghs-VA You are driving with the family on a long journey at 7p.m. Your dashboard computer displays a selection of restaurants and hotels that meet your budget, culinary preferences, and location, with a special offer for a family room. There is an attractive offer from a hotel if you drive another 20 miles. Behind this display is derived from a large amount of data put into context – and the only way to provide such information cost effectively is to use metadata inferences in real or next-to-real time. Metadata, the data that describes data, becomes an imperative in the world of “Big Data” and the cloud. As more of the data is distributed in the cloud and across the enterprise, the model of holding central databases becomes less relevant, especially for unstructured and semistructured data. Moving vast amounts of data from one place to another within or outside the enterprise is not economically viable. It is faster and more efficient to select the data locally by shipping the code to the data, the Hadoop model. Good metadata is a key enabler of this approach. There is already some metadata in place; files have a date created/modified and file size, JPEGs have data about the camera settings and location, and there are many other examples. But metadata standards are fragmented and incomplete, and cracking open files to investigate properties requires too much compute and elapsed time. A paper by Tom Coughlin and Mike Alvarado entitled "Angels in our Midst: Associative Metadata in Cloud Storage" is an interesting attempt to put a framework model (Figure 1) in place for metadata. The authors have taken an OSI-like layered model, split into to major components:- Basic Data Levels – four layers that focus on traditional metadata Meaning Data Levels – three layers that focus on meaning and context IT organizations and vendors should recognize that completely new models of doing business are evolving that are enabled by an effective metadata model that has industry acceptance. Within IT, metadata can be used to assist in deleting data, as well as enabling more effective utilization of data value. Current methods of inferring metadata retrospectively are inadequate. Nawotka 11 (Edward, Editor-in-Chief of Publishing Perspectives, “Why Metadata is the Key to Your Digital Future,” July 29, 2011, http://publishingperspectives.com/2011/07/why-metadata-is-the-key-toyour-digital-future/)//ghs-VA Q: What is Metadata and why is it so important for publishing? Metadata might still sound like something intimidating for some, but it is actually very simple. Metadata is all of the information associated with a book or publication that is used to produce, publish, distribute, market, promote and sell the book. This includes very simple things, such as the title, author of a book, cover and format, to much more complicated data, such as the terms of the publishing contract, rights information, print run, sales data, reviews, etc. It usually takes the form of a file contained in a database that will contain information for all the publishers books. This file can then be output into a digital file or spreadsheet that can be used by search engines, retailers and other digital media to display and sell your book. Q: Why is it important for publishers to continually educate themselves and update their knowledge about Metadata? Metadata is, essentially, the story of the book. It tells people everything they need to know about about the book and how to work with it. Without good metadata in place, every person who comes in contact with the book — from the editor to the printer to the bookseller — will have to recreate the metadata for the book, which can introduce errors. If one person accidentally spells the author’s name wrong, to take one example, that might never be fixed and people looking for the book in a computer database would never be able to find book in the system. The book — and all that investment in time, money and effort — would essentially be lost as well. Formats and devices may change — and we honestly don’t know what the publishing landscape will look like in five to ten years — but metadata is the one thing you can confidently take control of now, no matter what happens in the future. Q: What are the benefits of developing better metadata? The good news is that getting the metadata right will ensure that people who are looking for your book — whether it’s a novel or a textbook on biochemistry — will be able to find it when they search for it online. Search engines, social networks, ebook retailers all depend on metadata to help users find their book. Get it wrong and they’ll never find it and you’ll lose the sale; get it right and it is going to be the first book that will pop up after a search query. That’s just good sales and marketing. It’s also all-important for libraries who want to be able to manage their collections and help patrons. Q: How can publishers incorporate a better metadata strategy into their digital workflow? It is essentially the same as what you do for print, only instead of doing it for a physical book, you’re doing it for a digital file. The important thing to remember is metadata changes as it moves through the system as different people at the publishing house work on it. The editor might make revisions to the description of the book’s content, the marketing department would add details about sales, as would the publicity department after the book goes out into the world. Metadata also allows you to revise and refine the information as new taxonomies, standards and practices emerge, thus ensuring that your book is futureproofed. Q: Isn’t metadata just something the digital departments of publishers need to worry about? Simply put, it needs to be a part of everyone’s job description . The problem comes when a house instills a “digital director” and everyone else starts to think “well, that’s not my job anymore.” Metadata is a tool that everyone can use to help make a book a success and keep it alive in the marketplace much longer. Many people outsource their metadata for e-books to the service providers who also convert and/or distribute their e-books, which can also work very well — provided they are one in the same. Having different sets of metadata spread across too many companies gets complicated when you want to change something and makes fixing problems when they arise all the more complicated.