If you enjoyed this fine book from PARADIGM RESEARCH, you'll be glad to know that we offer a complete menu of affirmatives, disadvantages, counterplans, kritiks, LD & Public Forum research, and much more. Shop our online store anytime - www.oneparadigm.com Catalogue is available on website The Paradigm Affirmatives #4: Electronic Communication July 2015 Copyright © 2015 by Paradigm Research, Inc. All rights reserved. First Edition Printed In The United States Of America For information on Paradigm Debate Products: PARADIGM RESEARCH P.O. Box 14924 Minneapolis, MN 55414 Phone: 651.307.6980 Toll Free / Fax: 844.277.2536 Web: www.oneparadigm.com E-mail: [email protected] All rights are reserved. This book, or parts thereof, may not be reproduced by any means - graphic, electronic, or mechanical, including photocopying, recording, taping, or information storage and retrieval systems - without the written permission of the publisher. Making copies of this book, or any portion, is a violation of United States and international copyright laws. Electronic Communication Affirmative: Index Electronic Communication Affirmative: Introduction .......................................................................................5 Electronic Communications First Affirmative Electronic Communication Affirmative: First Affirmative—Status Quo...........................................................9 Electronic Communication Affirmative: First Affirmative—Solvency (Congress Limits) .............................. 12 Electronic Communication Affirmative: First Affirmative—Solvency (FCC Oversight) ................................ 13 Electronic Communication Affirmative: First Affirmative—Solvency (SSRA) .............................................. 15 Electronic Communication Affirmative: First Affirmative—Solvency (Core) ................................................ 17 Electronic Communication Affirmative: First Affirmative—Democracy Advantage ...................................... 18 Electronic Communication Affirmative: First Affirmative—Internet Advantage ............................................ 21 Status Quo Extensions Status Quo: Topshelf Ext ................................................................................................................................. 26 Status Quo: EO 12333 Programs ..................................................................................................................... 28 Status Quo: FISA Fails Now ............................................................................................................................ 31 Status Quo: Mass Surveillance Now ................................................................................................................ 32 Status Quo: Mass Surveillance Understated..................................................................................................... 34 Status Quo: Obama Reforms Fail..................................................................................................................... 35 Status Quo: Oversight Failures ........................................................................................................................ 37 Status Quo: Section 215 Reforms Inadequate .................................................................................................. 38 Status Quo: USA Freedom Act Fails ............................................................................................................... 39 Solvency Extensions Solvency: Ban Mass Surveillance .................................................................................................................... 43 Solvency: Congressional Actions..................................................................................................................... 45 Solvency: Congressional Oversight ................................................................................................................. 48 Solvency: FCC Oversight ................................................................................................................................ 49 Solvency: Surveillance State Reform Act ........................................................................................................ 51 Democracy Advantage Extensions Democracy Adv: Internal Link—General ........................................................................................................ 57 Democracy Adv: Internal Link—Modeling ..................................................................................................... 60 Democracy Adv: Internal Link—NSA............................................................................................................. 61 Democracy Adv: Impact Ext ............................................................................................................................ 62 Internet Advantage Extensions Internet Adv: Brinks ........................................................................................................................................ 63 Internet Adv: Internal Link—Topshelf ............................................................................................................ 64 Internet Adv: Internal Link—China ................................................................................................................. 65 Internet Adv: Internal Link—General .............................................................................................................. 67 Internet Adv: Internal Link—Hypocrisy .......................................................................................................... 69 Internet Adv: Internal Link—Global Governance / ITU .................................................................................. 70 Internet Adv: Internal Link—Localization....................................................................................................... 72 Internet Adv: Internal Link—Rallying Point ................................................................................................... 73 Internet Adv: Internal Link—U.S. Leadership ................................................................................................. 74 Internet Adv: Impact—Multiwarrant / Topshelf .............................................................................................. 75 Internet Adv: Impact—China Stability ............................................................................................................ 77 Internet Adv: Impact—Democracy .................................................................................................................. 78 Internet Adv: Impact—Economy (General) ..................................................................................................... 79 Internet Adv: Impact—Economy (Innovation) ................................................................................................ 80 Internet Adv: Impact—Economy (Jobs) .......................................................................................................... 82 Internet Adv: Impact—Economy (Tech Sector) .............................................................................................. 83 Internet Adv: Impact—Human Rights ............................................................................................................. 85 Internet Adv: Impact—Innovation / Leadership .............................................................................................. 86 Internet Adv: Impact—Rights .......................................................................................................................... 87 Internet Adv: Impact—Trade ........................................................................................................................... 88 Internet Adv: Solvency—Domestic Reform Key ............................................................................................. 89 Internet Adv: Solvency—Transparency ........................................................................................................... 90 Internet Adv: Solvency—Answers to “Irreversible” ........................................................................................ 92 Add-On Advantages Allied Cooperation Add-On: 2AC ................................................................................................................... 93 Cybersecurity Add-On: 2AC............................................................................................................................ 95 Human Rights Add-On: 2AC ........................................................................................................................... 96 Paradigm Research 2015-2016 CX—Electronic Communication Aff Offcase Answers Disadvantage Ans: Terrorism—General .......................................................................................................... 97 Disadvantage Ans: Terrorism—Cooperation Turn ........................................................................................ 100 Disadvantage Ans: Terrorism—Effectiveness Exaggerated........................................................................... 101 Disadvantage Ans: Terrorism—Effectiveness Exaggerated (Specific Cases) ................................................ 102 Disadvantage Ans: Terrorism—Empirically .................................................................................................. 104 Disadvantage Ans: Terrorism—Focus Turn .................................................................................................. 106 Disadvantage Ans: Terrorism—Human Intelligence Tradeoff Turn .............................................................. 107 Disadvantage Ans: Terrorism—Human Intelligence Turn (Answers to “It Fails”) ........................................ 110 Disadvantage Ans: Terrorism—Human Intelligence Turn (Answers to “SIGINT Superior”) ....................... 111 Disadvantage Ans: Terrorism—Information Overload Turn ......................................................................... 112 Disadvantage Ans: Terrorism—Terror—Other Means Solve ........................................................................ 115 Disadvantage Ans: Terrorism—Smart Power Turn ....................................................................................... 116 Disadvantage Ans: Terrorism—Trust Turn.................................................................................................... 117 Disadvantage Ans: Terrorism—Answers to “Dozens of Attacks Stopped” ................................................... 118 Disadvantage Ans: Terrorism—Answers to “FISA Links” ............................................................................ 120 Disadvantage Ans: Terrorism—Answers to “Information Key” / “Transparency Links” .............................. 121 Disadvantage Ans: Terrorism—Answers to “Lone Wolf” ............................................................................. 122 Disadvantage Ans: Terrorism—Answers to “NAS/NRC Report / No Alternative” ....................................... 123 Disadvantage Ans: Terrorism—Answers to “Would Have Stopped 9/11” .................................................... 126 4 Paradigm Research 2015-2016 CX—Electronic Communication Aff Electronic Communication Affirmative: Introduction The recent revelations from Edward Snowden, a former contractor with the National Security Administration (NSA), sparked a domestic and international firestorm over the extent and effects of the U.S.’s growing domestic and international surveillance programs. Many of the most controversial components of the program deal with the agency’s surveillance of electronic communications. The affirmative case in this book adopts a macro-level perspective on the controversy, and proposes several different restrictions on the U.S.’s electronic surveillance programs. The case has very strong advantage arguments and touches on many “core of the topic” issues, offering you substantial competitive benefits while allowing you to explore many of the most important issues raised by the resolution. Many of the objections raised against the NSA programs concern the type and scope of surveillance. One important element that distinguishes current programs from their predecessors is that they involve “programmatic” surveillance, which differs substantially from the traditional “particularized” surveillance approaches that predominated prior to the widespread use of integrated communications networks. The technical and policy differences between these surveillance schemes are outlined in a recent law review article: Programmatic surveillance initiatives like these differ in simple yet fundamental ways from the traditional forms of monitoring with which many people are familiar--i.e., individualized or particularized surveillance. Individualized surveillance takes place when authorities have some reason to think that a specific, known person is breaking the law. Investigators will then obtain a court order authorizing them to collect information about the target, with the goal of assembling evidence that can be used to establish guilt in subsequent criminal proceedings. Individualized surveillance is common in the world of law enforcement, as under Title III of the Omnibus Crime Control and Safe Streets Act of 1968. It is also used in national security investigations. FISA allows authorities to obtain a court order to engage in wiretapping if they demonstrate, among other things, probable cause to believe that the target is "a foreign power or an agent of a foreign power." By contrast, programmatic surveillance has very different objectives and is conducted in a very different manner. It usually involves the government collecting bulk data and then examining it to identify previously unknown terrorists, spies, and other national security threats. A good example of the practice is link analysis, in which authorities compile large amounts of information, use it to map the social networks of known terrorists--has anyone else used the same credit card as Mohamed Atta?--and thus identify associates with whom they may be conspiring. (It is also possible, at least in theory, to subject these large databases to pattern analysis, in which automated systems search for patterns of behavior that are thought to be indicative of terrorist activity, but it's not clear that the NSA is doing so here.) Suspects who have been so identified can then be subjected to further forms of monitoring to determine their intentions and capabilities, such as wiretaps under FISA or other authorities. In a sense, programmatic surveillance is the mirror image of individualized surveillance. With individualized monitoring, authorities begin by identifying a suspect and go on to collect information; with programmatic monitoring, authorities begin by collecting information and go on to identify a suspect. [Nathan Alexander Sales, Associate Professor, Law, Syracuse University, “Domesticating Programmatic Surveillance: Some Thoughts on the NSA Controversy,” I/S: A JOURNAL OF LAW AND POLICY FOR THE INFORMATION SOCIETY v. 10, Summer 2014, p. 527-528] Programmatic surveillance is viewed by critics are highly problematic because of the broad scope and indiscriminate nature of the programs. Generally speaking, the federal government is able to gather data under three circumstance—criminal investigations, foreign intelligence investigations inside the U.S., and foreign intelligence investigations outside the U.S. In general, the federal government is prohibited from intercepting the contents of private telephone calls and e-mails of any person, except in three circumstances. First, in the context of criminal investigations, Title III of the Electronic Communications Privacy Act authorizes the government to intercept such communications if a federal judge issues a warrant based on a finding that there is probable cause to believe that an individual is committing, has committed, or is about to commit a federal crime and that communications concerning that crime will be seized as a result of the proposed interception. Second, as enacted in 1978, FISA authorized the federal government to intercept electronic 5 Paradigm Research 2015-2016 CX—Electronic Communication Aff communications if a judge of the FISC issues a warrant based on a finding that the purpose of the surveillance is to obtain foreign intelligence information, the interception takes place inside the United States, and there is probable cause to believe that the target of the surveillance is an agent of a foreign power (which includes, among other things, individuals engaged in international terrorism, the international proliferation of weapons of mass destruction, and clandestine intelligence activities). Third, there is foreign intelligence surveillance that takes place outside the United States. At the time FISA was enacted, Congress expressly decided not to address the issue of electronic surveillance of persons located outside the United States, including American citizens, noting that the “standards and procedures for overseas surveillance may have to be different than those provided in this bill for electronic surveillance within the United States.” It was apparently assumed that intelligence collection activities outside the United States would be conducted under the Executive Branch’s inherent constitutional authority and the statutory authorizations granted to each Intelligence Community agency by Congress, and that it would be governed by presidential Executive Orders and by procedures approved by the Attorney General. To that end, in 1981 President Ronald Reagan issued Executive Order 12333, discussed above, which (as amended) specifies the circumstances in which the nation’s intelligence agencies can engage in foreign intelligence surveillance outside the United States. [Richard A. Clarke et al., President’s Review Group on Intelligence and Communications Technologies, LIBERTY AND SECURITY IN A CHANGING WORLD, Report and Recommendations, 12—12—13, p. 131-132] Mass surveillance can occur in any of these areas, although it is far and away most common in foreign and domestic intelligence contexts. One important thing to note, however, is that the NSA has been accused of providing information obtained in intelligence investigations to domestic law enforcement agencies, raising serious civil rights concerns. Agencies are able to obtain electronic surveillance orders under both Title III and through the Federal Intelligence Surveillance Court (FISC), a special, secret court created by congress in 1978 to address the thorny technical and legal challenges of regulating intelligence work on U.S. soil. The major differences and similarities between these two schemes are explained in the following quote: Under the statutory scheme designed by Congress in 1978, orders issued by the FISA Court share a critical feature with regular Title III warrants: both require prior judicial scrutiny of an application for an order authorizing electronic surveillance in a particular case. This is not to say, however, that FISA orders are equivalent to warrants issued by regular federal courts. Title III allows a court to enter an ex parte order authorizing electronic surveillance if it determines, on the basis of the facts submitted in the government’s application, that “there is probable cause for belief that an individual is committing, has committed, or is about to commit” a specified predicate offense. By contrast, FISA’s highest standard, which is reserved for the targeting of U.S. persons, requires a showing of probable cause that the target’s activities “involve or may involve” a violation of U.S. criminal law. While Congress intended for this standard to approach the threshold for criminal warrants (as discussed above), the absolute secrecy surrounding the FISA procedure precludes a full understanding of how this standard operates in practice. For example, documents leaked by Edward Snowden revealed that the government had obtained FISA orders targeting prominent Muslim American community leaders with no apparent connection to criminal activity. Traditional FISA orders also require much less proof that the surveillance activities will yield the information sought. Under Title III, the government must demonstrate probable cause to believe that particular communications concerning specified crimes will be obtained through an interception. Under FISA, the government instead must show probable cause that the facilities at which the surveillance is directed are used by a foreign power or its agent; it need not show probable cause that collecting on these facilities will yield the desired information. A high-level government official must certify that the information sought is foreign intelligence information and designate the type of information being sought. However, the court reviews the substance of this certification only when the target is a U.S. person, and even then, the court’s review is limited to determining whether the certificate is “clearly erroneous.” As the legislative history of the statute itself acknowledges, this “standard of review is not, of course, comparable to a probable cause finding by the judge.” Like warrant applications under Title III, FISA applications are generally heard on an ex parte basis. However, unlike individuals monitored under Title III, those whose communications are intercepted under FISA are highly unlikely to receive notice of the intrusion. Title III requires notice to the target (and, within the discretion of the judge, to other persons whose communications were intercepted) once the surveillance order expires. FISA does not require notice 6 Paradigm Research 2015-2016 CX—Electronic Communication Aff unless the government “intends to enter into evidence or otherwise use or disclose” such communications in a trial or other legal proceedings. Moreover, recent reports suggest that the government has taken a very narrow view of when and how this notice requirement applies. [Elizabeth Goitein and Faiza Patel, Co-Directors, Liberty and National Security Program, Brennan Center for Justice, WHAT WENT WRONG WITH THE FISA COURT, Brennan Center for Justice, New York University School of Law, 2015, p. 18] Although many analysts are highly critical of the issuance of Title III warrants, a majority of objections to current surveillance programs arise from programs authorized by the FISC. These criticisms have become even stronger since a series of amendments to the 1978 FISA enacted by Congress in 2008, which some advocates maintain set the stage for the troubling programs revealed by Snowden. The affirmative case included in the text includes three different plans designed to address the problems with the U.S.’s current mass surveillance programs. The solvency evidence included with each plan can be supplemented with the “Core” solvency evidence, which is useful irrespective of which solvency mechanisms you choose. The first plan option is a simple, “vanilla” version that imposes congressional limits on mass surveillance. There is good evidence arguing that congressional action is necessary to both rein in the democracy-threatening effects of mass surveillance and to the restore the country’s Internet credibility. As noted previously, the reforms advanced in the USA Freedom Act are grossly inadequate. If you wanted to, you could specify an array of potential reforms, including amendments to the Privacy Act, a total ban on mass surveillance, a prohibition on metadata, etc. However, given the general nature of the solvency evidence, there is little reason to over-specify the restrictions, unless you decide to write a new advantage that is based upon a very specific set of restrictions. The second plan option is the one that requires the most explanation. The plan requires that the NSA surveillance activities that occur on domestic communications infrastructure (including cell networks, the domestic Internet, phone landlines, etc.) be subjected to oversight by the Federal Communications Commission (FCC), the federal agency tasked with the regulation America’s telecommunications companies and infrastructure. The solvency evidence, from a new law review article by Audra Healy, contends that FCC oversight would be an effective vehicle for implementing the array of reforms suggested by the Privacy and Civil Liberties Oversight Board (PCLOB), a federal blue-ribbon panel that recently conducted a review of the NSA’s activities. The solvency evidence is quite detailed, and makes a strong case for the use of FCC oversight as a means of reining in NSA abuses and signaling to the American public and international community that our elected officials are serious about curbing excessive NSA practices. Regardless, it would make sense for you to track down and read the original Healy article—doing so will help increase the depth and quality of your cross-x answers and solvency arguments. A third plan option is to enact the Surveillance State Repeal Act (SSRA), a reform bill proposed this past year by U.S. representatives Pocan and Massie. The bill would effectively repeal the 2001 PATRIOT Act and the 2008 FISA Amendments Act (FAA), and advance other protections designed to safeguard individual privacy against government intrusion, including reforms to the FISA Court. The bill is far more expansive than the recently passed USA Freedom Act, and many privacy activists argue that a root-and-branch reform like that embodied in the SSRA is necessary to both remove the legal authorities that allow widespread NSA surveillance and to signal to the agency that congress and the public will not tolerate domestic spying without very strong national security justification. If you are worried about solving for big-stick surveillance-based impacts, this is a solid option, although the broad nature of the reforms does leave you vulnerable to a variety of plan-inclusive counterplans. Each plan option includes good solvency evidence for the two advantages included in the 1AC—Democracy and the Internet. The Democracy Advantage argues that mass domestic surveillance corrodes the deliberative and oversight mechanisms that allow our own government to function as a democracy, while also undermining the signal that our country sends globally about the importance of civil liberties and respect for the rule of law. The Internet Advantage claims that U.S. surveillance schemes are fostering a global backlash that threatens the “nationalization” of the global Internet, potentially through changes to global Internet governance and/or data traffic and storage localization 7 Paradigm Research 2015-2016 CX—Electronic Communication Aff requirements. There is very good evidence arguing that a failure to substantially overhaul our mass electronic surveillance risks the fragmentation of the Internet, which would in turn undercut the Internet’s economic and freedom-promoting potential. The cards on this advantage are really good, and we would not be surprised if the argument featured in many 2ARs this season. Finally, this book includes an extensive set of answers to the ubiquitous “Terrorism Disadvantage,” which promises to be one of the strongest negative generic arguments on this topic. Although some of the negative link arguments are pretty solid, they tend to be relatively narrow and a bit repetitive. A well-prepared affirmative should be able to overwhelm the negative with nuanced link turn arguments, waiting to capitalize on a block error with a bevy of new evidence on the strongest link turn or two in the 1AR. A particularly compelling link turn is the allied cooperation argument, which argues that U.S. mass surveillance schemes deter our allies from cooperating with us in counterterrorism programs. There is good evidence claiming that this cooperation is far more important than the any information gained from NSA programs. The human intelligence (HUMINT) turn is also pretty strong—some advocates argue that a focus on electronic surveillance trades off with traditional spying techniques, which are more likely to obtain the information that our government needs to stop terrorist attacks. A third effective link turn is the information overload argument, which claims that government efforts to gather more data into an “information haystack” makes it much harder for us to find the needles (valuable information). Critics like to point to the fact that the U.S. had adequate information to piece together the 9/11 attacks in advance, yet failed to do so. There are also several other effective turns, and given the commonality of the Terror DA, you would be well-served to familiarize yourself with your various link turn options. You should also remember that many of these arguments can be used by other cases that impose some limits on mass surveillance, whether through court action, congressional reform, or tweaks to the Federal Intelligence Surveillance Court. Cases like this one are likely what most supporters envisioned when they voted for this particular topic, and the evidence does not disappoint—the advantages and solvency mechanisms offered here are a good start, but with some work you can readily customize your case to fit your argument interests and the demands of your circuit. Best of luck! 8 Paradigm Research 2015-2016 CX—Electronic Communication Aff Electronic Communication Affirmative: First Affirmative—Status Quo Observation One: The Status Quo A. The USA Freedom Act left the National Security Administration untouched—mass surveillance remains the norm Michael Brenner, Professor, International Affairs, University of Pittsburgh, “The NSA’s Second Coming,” HUFFINGTON POST, 6— 8—15, www.huffingtonpost.com/michael-brenner/the-nsas-second-coming_b_7535058.html, accessed 6-9-15. Americans have acquired a fondness for worlds of make-believe. Torture was done by "a few bad apples." Or, we must await the "verdict of history" to judge how our invasion of Iraq turned out. Or, America is besieged by hordes of crazed Islamist terrorists scaling the walls and dedicated to surpassing the horror of 9/11. Or, The Sniper salvaged American dignity and self-respect from that tragic fiasco. Or, that it was a brilliant CIA and valiant Seals who avenged a righteous America by storming Abbottabad to assassinate an infirmed old man in his bed. This last is one of the threads of make-believe woven into the fabricated narrative about the Congressional psycho-drama this past week over electronic spying on Americans. That engrossing campfire tale has our noble representatives struggling to find the path of Solomonic wisdom that walks a tightrope between security and liberty. We awaited in suspense to see if the perilous feat would reach its goal. We agonized at word of the NSA being forced by obedience to the Law to shut down its all-seeing networks -- thereby, for a few hours, leaving America exposed to the diabolical schemes of the bearded devils. The White House warned that we are playing "Russian roulette" with the country's very survival. No one pressed the question of all six chambers in fact being uncharged. That all makes for one awesome production. Doubtless there will be a film adaptation immortalized in a script by Bob Woodward. Something like that will happen -- even though it is a concocted yarn whose meaning has been twisted and whose significance has been vastly inflated. For the truth is that what Congress did, and what it did not do earlier, changes very little -- and nothing of cardinal importance. The main effect is to give the impression of change so as to release pressure for reform that might really be meaningful. The base truth is that everything that counts remains the same. To entrench and to legitimate a system of massive surveillance that undercuts our privacy while doing nothing to secure our well-being. Matters of Fact 1. The so-called restrictions on bulk data collection apply only to telephone calls. All else is exempted: emails, Internet searches, social media, and info regarding each that is retained in our communicating devices. 2. The restrictions on real-time surveillance of telephone calls can be overcome by the granting of a warrant by the FISA upon request by NSA, FBI, Justice Department, CIA -- not to speak of local authorities. That Court, over the past eight years, has refused only 11 of 33,900 requests. The judges, by the way, are handpicked by Supreme Court Chief Justice John Roberts who has jumped into the policy arena by declaring himself strongly opposed to any tightening of restrictions on how the court operates or on the NSA's methods. The FISA court's attitude toward government spying on Americans has been generous to the extreme. Former lead judge of the FISA Court, John D. Bates, has campaigned vigorously on behalf of the status quo. He even objected to the extra workload of requiring that courts approve all national security letters, which are administrative subpoenas allowing the F.B.I. to obtain records about communications and financial transactions without court approval. 3. The specified targets may be organizations, groups and networks as well as an individual. In practice, that means each grant of surveillance power may authorize comprehensive electronic spying on hundreds or thousands of citizens. Currently the NSA is overwhelmed by the billions of communications they register and try to catalogue each week. Long-term data retention only makes sense if there is a project afoot to exploit it systematically in order to control, to suppress, to penalize. There is no such Big Brother plan in place or on the horizon. NSA operations fortunately have instead been conceived and managed by fantasists and bureaucratic empire builders -- as is demonstrated by Edward Snowden's leaks of their immense target list and their major intelligence failures. 4. The terms of the warrants allow for a twostep "hop" from the identified target to others whose suspect communications emerge from the initial combing. 9 Paradigm Research 2015-2016 CX—Electronic Communication Aff Electronic Communication Affirmative: First Affirmative—Status Quo [cont’d] B. Specifically, mass surveillance continues under a number of other authorities—the ‘fix’ to Section 215 ignores other statutes and Executive Order 12333, which enable massive domestic surveillance Stephen Vladeck, Professor, Law, American University, “Forget the Patriot Act – Here Are the Privacy Violations You Should Be Worried About,” FOREIGN POLICY, 6—1—15, https://foreignpolicy.com/2015/06/01/section-215-patriot-act-expires-surveillancecontinues-fisa-court-metadata/, accessed 6-1-15. But whatever the merits of the competing sides in this debate, the larger problem is that this conversation has missed the forest for a very small — and largely irrelevant — tree. In fact, from the perspective of individual privacy rights, the phone records program is much less problematic than the government’s other authorities to conduct mass surveillance under Executive Order 12333 and the 2008 FISA Amendments Act. And so, in focusing on how to “fix” Section 215, we’ve given short shrift to the far more significant problems raised by these other authorities — and, just as importantly, the broader lessons we should be taking away from the surveillance reform conversation that Snowden started. To understand the significance of these other authorities, it’ll help to describe their aims: Executive Order 12333, issued in 1981, is directed at the overseas interception of communications — both metadata and content — of non-citizens outside the United States, who, under a 1990 Supreme Court decision, categorically lack Fourth Amendment rights. The 2008 FISA Amendments Act was enacted to close a loophole that new technology had helped to create, where non-citizens outside the United States were nevertheless communicating through servers or other telecommunications infrastructure located stateside, which the government could not surveil under the executive order. Ordinarily, the government needs a warrant before collecting the content of domestic communications, one based upon a judge’s determination that there’s good reason to believe a particular individual either is engaged in the commission of a crime or is an agent of a foreign power. But Executive Order 12333 and the 2008 FISA statute, by focusing on individuals who fall outside the Fourth Amendment, capitalize on the lack of constitutionally required individualized assessments and instead allow the government to engage in bulk collection of such information — as if it were using an industrial vacuum cleaner to pick up individual particles of dirt. It’s easy to see how these authorities could cause diplomatic headaches (as, for example, with the contretemps surrounding U.S. surveillance of German Chancellor Angela Merkel’s cell phone). But most commentators have assumed that, at least legally, the validity of these programs turns on their overseas focus. After all, if the government is only targeting the communications of non-citizens outside the United States, what could possibly be the constitutional objection? The answer, we now know, has everything to do with technology. Although the government is only allowed to “target” non-citizens outside the United States, it is inevitable, given how it collects information under both of these regimes, that the communications of U.S. citizens and non-citizens lawfully present in the United States will also be collected, albeit “incidentally,” as the government puts it. After all, when thousands of unrelated emails and other electronic communications are bundled together in a packet that travels through an Internet switch that’s physically located in the United States (for the 2008 statute) or overseas (for Executive Order 12333), it’s simply not possible for the government to only collect the communications between non-U.S. citizens and leave the others untouched, any more so than it’s possible for a vacuum to segregate particles of dirt. To be sure, the U.S. government doesn’t dispute that it routinely collects the communications of U.S. citizens. Instead, it has argued that any potential for abuse is mitigated by so-called “minimization requirements” — procedural rules that require the relevant intelligence agency to take steps to avoid the improper retention and use of communications collected under these authorities. The government’s defense, as we’ve come to learn, is flawed in two vital respects: First, as several sincedisclosed opinions from the FISA Court have made clear, the government’s minimization requirements under the 2008 statute were often too skimpy, allowing the retention and use of information that both the statute and the Fourth Amendment prohibit. Second — and perhaps more importantly — even where the minimization rules were legally sufficient, there have been numerous instances in which government officials violated them, with the FISA Court only discovering the abuses after they were voluntarily reported by Justice Department lawyers. As a result, the government collected and retained a large volume of communications by U.S. citizens that neither Congress nor the Constitution allowed it to acquire. More alarmingly, with regard to collection under Executive Order 12333, there isn’t any similar judicial review (or meaningful congressional oversight), which means that it has entirely been up to the government to police itself. As State Department whistleblower John Napier Tye explained last summer, there is every reason to doubt that such internal accountability has provided a sufficient check. In his words, “Executive Order 12333 contains nothing to prevent the NSA from collecting and storing all … communications … provided that such collection occurs outside the United States in the course of a lawful foreign intelligence investigation.” To put the matter bluntly, whereas the Section 215 debate has addressed whether the government can collect our phone records, Executive Order 12333 and the 2008 FISA Amendments Act allow the government to collect a lot of what we’re actually saying, whether on the phone, in our emails, or even to our search engines. There is no question that, from a privacy perspective, these programs are far more pernicious than what’s been pegged to Section 215. There is also no question that such collection raises even graver constitutional questions than the phone records program. Whereas there is an open debate over our expectation of privacy in the metadata we voluntarily provide to our phone companies, there’s no doubt that we have an expectation of privacy in the content of our private communications. Why, then, has all the fuss been around Section 215 and the phone records program, while the far more troubling surveillance authorities provided by Executive Order 12333 and the 2008 FISA Amendments Act have flown under the radar? Part of it may be because of the complexities described above. After all, it’s easy for people on the street to <<continued, no text removed>> 10 Paradigm Research 2015-2016 CX—Electronic Communication Aff Electronic Communication Affirmative: First Affirmative—Status Quo [cont’d] <<continued, no text removed>> understand what it means when the government is collecting our phone records; it’s not nearly as obvious why we should be bothered by violations of minimization requirements. Part of it may also have to do with the government’s perceived intent. Maybe it seems more troubling when the government is intentionally collecting our phone records, as opposed to “incidentally” (albeit knowingly) collecting the contents of our communications. And technology may play a role, too; how many senders of emails know where the server is located on which the message is ultimately stored? If we don’t realize how easily our communications might get bundled with those of noncitizens outside the United States, we might not be worried about surveillance targeted at them. But whatever the reason for our myopic focus on Section 215, it has not only obscured the larger privacy concerns raised by these other authorities, but also the deeper lessons we should have taken away from Snowden’s revelations. However much we might tolerate, or even embrace, the need for secret government surveillance programs, it is all-but-inevitable that those programs will be stretched to — and beyond — their legal limits. That’s why it’s important not only to place substantive limits upon the government’s surveillance authorities, but also to ensure that they are subject to meaningful external oversight and accountability as well. And that’s why the denouement of Section 215 debate has been so disappointing. This should have been a conversation not just about the full range of government surveillance powers, including Executive Order 12333 and the 2008 FISA Amendments Act, but also about the role of the FISA Court and of congressional oversight in supervising those authorities. Instead, it devolved into an over-heated debate over an over-emphasized program. Congress has tended to a paper cut, while it ignored the internal bleeding. Not only does the expiration of Section 215 have no effect on the substance of other surveillance authorities, it also has no effect on their oversight and accountability. Reaching some degree of closure with regard to the phone records program may leave many with the impression that America has concluded a meaningful and productive national debate over surveillance reform. We haven’t. And although the 2008 FISA Amendments Act is also set to expire — on December 31, 2017 — the debate over Section 215 leaves little reason to believe that we’ll have it then, either. 11 Paradigm Research 2015-2016 CX—Electronic Communication Aff Electronic Communication Affirmative: First Affirmative—Solvency (Congress Limits) Hence we offer the following plan: The United States Congress should substantially curtail mass domestic surveillance. Funding and enforcement are guaranteed. Observation Two: Solvency A. Current reforms are not enough—the only way to protect ourselves is to ban all mass surveillance Fred Branfman, journalist, “We Live Under a Total Surveillance State in America—Can We Prevent It from Evolving into a Full-Blown Police State?” ALTERNET, 9—25—13, www.alternet.org/activism/we-live-under-total-surveillance-state-america-can-we-prevent-itevolving-full-blown-police, accessed 6-1-15. These were clearly illusory reforms, as the Electronic Frontier Foundation noted, that would continue mass surveillance of Americans. First, the Executive would continue to only tell Congress and the Judiciary what it felt was "appropriate" for them to know—including the FISC "adversary"; second, the "legal rationales" for Executive wrongdoing are just that: rationales which no one concerned about Executive surveillance can take seriously; and thirdly four of the five "outside experts" Obama wound up appointing are all deeply implicated in Executive wrongdoing, including former CIA Deputy Director Michael Morrell, and they are to report to director of National Intelligence James Clapper, a key architect of the surveillance state. Predictably, the first meeting of this Potemkin Panel did not even discuss NSA surveillance of innocent Americans and only confined itself to private sector concerns. Open Technology Institute director Sascha Meinrath, who attended the meeting, declared that “My fear is it's a simulacrum of meaningful reform … Its function is to bleed off pressure, without getting to the meaningful reform." A N.Y. Times editorial accurately noted that "President Obama proposed a series of measures on Friday that only tinker around the edges of the nation's abusive surveillance programs. It is the existence of these programs that is the problem, not whether they are modestly transparent. As long as the N.S.A. believes it has the right to collect records of every phone call ... then none of the promises to stay within the law will mean a thing." Mr. Obama's "reforms" thus still envision continued Executive collection of hundreds of millions of Americans' phone and Internet records. Believers in democracy must set their own “red line” against surveillance of innocent Americans. A line must be drawn somewhere. Once we allow the Executive to store all our emails and Internet communications for all time, why not allow them to read them if they decide it might protect somebody, somewhere, sometime? Why should a court get involved? Don't we trust them? As Edward Snowden has said, “the Internet is on principle a system that you reveal yourself to in order to fully enjoy, which differentiates it from, say, a music player. It is a TV that watches you.” But this does not "protect" us nearly as efficiently as would a real TV or flat screen equipped with a transponder allowing them to watch us whenever they wish. Where do we draw the line? Mr. Obama and present congressional leaders’ typically honeyed words mean nothing absent a complete halt to gathering information on innocent Americans. Republican House Judiciary Chair Robert Goodlatte, for example, recently declared "I am committed to … our nation's intelligence collection programs includ(ing) robust oversight, additional transparency, and protections for Americans' civil liberties." But at the same time he stated that “eliminating this program altogether without careful deliberation would not reflect our duty, under article I of the constitution, to provide for the common defense," and had opposed the Conyers-Amash amendment in July that would have ended NSA surveillance of innocent Americans. The “reforms” proposed by Goodlatte and other Republican House leaders are clearly meant to head off any significant reform of NSA mass surveillance. A serious attempt to bring democracy to America must have the following bottom line: no mass surveillance of any kind of Americans about whom there is no evidence of wrongdoing. None. The first and necessary step toward creating a "functioning democracy" in America is for both the House and Senate to pass the Conyers-Amash amendment forbidding NSA mass collection of phone and Internet American records of innocent Americans. B. Congress should end programmatic surveillance Elizabeth Goitein and Faiza Patel, Co-Directors, Liberty and National Security Program, Brennan Center for Justice, WHAT WENT WRONG WITH THE FISA COURT, Brennan Center for Justice, New York University School of Law, 2015, p. 45. The most effective reform would be for Congress to end programmatic surveillance. This would entail expressly prohibiting bulk collection under Section 215 and similar provisions, as well as repealing Section 702 and replacing it with a regime requiring an individualized court order for the interception of communications involving U.S. persons, regardless of whether they are the identified target of the surveillance. Ending programmatic surveillance would return the FISA Court to its traditional role of applying the law to the facts of a particular case. This would mitigate many of the Article III concerns relating to the absence of a case or controversy. If the standard for issuing a surveillance order were sufficiently strict (discussed below), ending programmatic surveillance could address Fourth Amendment objections as well. But these changes would not fully cement the constitutional status of the FISA Court’s activities. FISA orders will never look entirely like criminal warrants because they rarely culminate in criminal prosecutions, thus removing the primary vehicle for challenging their legitimacy. Concerns about the lack of adversarial process thus would remain even if programmatic surveillance were replaced with an individualized regime. To address them, the reforms listed in the next section would be needed. 12 Paradigm Research 2015-2016 CX—Electronic Communication Aff Electronic Communication Affirmative: First Affirmative—Solvency (FCC Oversight) Hence we offer the following plan: The United States federal government should curtail National Security Administration surveillance by subjecting its activities on domestic communications infrastructure to oversight by the Federal Communications Commission. Funding and enforcement are guaranteed. Observation Two: Solvency A. FCC oversight is necessary and effective—Congress should enact the plan Audra Healey, J.D. Candidate, “A Tale of Two Agencies: Exploring Oversight of the National Security Administration by the Federal Communications Commission,” FEDERAL COMMUNICATIONS LAW JOURNAL v. 67 n. 1, 2014, p. 111-114. Congress is equipped to enact legislation codifying FCC oversight of the NSA by virtue of both current law and the PCLOB’s recommendations. First, the Telecommunications Act can serve as the basis for the FCC to take action to further develop its protection of consumers on the Internet, Moreover, there has been some movement in Congress calling on the FCC to take action regarding the NSA phone database, indicating the possibility of the FCC taking up an oversight role. 116 Further, Congress gave the FCC broad investigation, regulatory, and enforcement powers, as well as the privacy-focused directive of implementing Consumer Propriety Network Information protection. Additionally, the first PCLOB Report calls for extensive changes in the NSA and FISA Court regime while the second report calls expressly for industry input and expertise: the FCC could facilitate some of the suggested changes through its subject matter expertise. Even as the FCC is set up to facilitate the PCLOB recommendations, Congress needs to codify the legal authority for the FCC to do this specifically. Granting express legal authority is key, as organic statutes of agencies determine what a given agency can and cannot do. Congressional authorization would be a logical outgrowth of both the FCC’s regulatory interests and current legal recommendations regarding NSA oversight. A. Congress should amend the organic statutes of the FCC and NSA and encourage participation in the FISA Court. The lack of oversight of NSA data collection practices will continue to be problematic moving forward, as national security is an ongoing concern and technology is a large part of life in a modern society. There is need for effective and transparent oversight of the NSA’s data collection. As such, Congress should act by amending the organic statutes of both the NSA and the FCC to provide the FCC with oversight authority over the NSA, and by allowing the FCC to participate as amicus curiae with the FISA Court. 1. Congress should amend the NSA organic statute to provide for collection of data by the FCC. The NSA needs transparent and easily understood oversight. While it should not have to disclose national security information, the agency should be required to disclose basic statistics, such as how much information it is gathering, similar to Recommendation 9 in the second PCLOB Report. This would at least illustrate to the public, via the FCC, that the NSA is targeting its surveillance at legitimate threats to national security—rather than performing blanket surveillance of all Internet users. Further, these reforms would comport with the PCLOB’s enumerated Recommendations. As of now, “lawmakers and the public do not have even a rough estimate of how many communications of U.S. persons are acquired under section 702.” Because the NSA is required to target foreign communications in order for its surveillance to be lawful, an annual snapshot showing the volume of its surveillance will help foster some degree of transparency, helping assure citizens that their privacy is not being intruded upon, without hampering legitimate national security efforts. This expanded role for the FCC in relation to the NSA should be codified by Congress. First, Congress should amend the NSA’s organic statute to require the agency to comply with FCC requests for data. Additionally, while the FCC does not have the security clearance to review the substance of the surveillance, such clearance is not necessary on an agency-wide basis. Instead, Congress should require the NSA to provide targeting statistics that could be reasonably disclosed, or at least preliminary statistics that could focus the FCC’s inquiry. This new legislation is all that is necessary to facilitate oversight on the NSA side, as the FCC will require most of the congressional authorization. 2. The FCC’s organic statute should be amended to allow the FCC authority over NSA data collection and participation in the FISA Court. To enact a solution based on FCC oversight of NSA data collection, Congress should pass legislation allowing the FCC to collect information from the NSA, and to allow the FCC to submit its findings about this data to congressional oversight committees as well as the FISA Court. While novel, this solution is in keeping with the PCLOB recommendations, particularly the recommendation emphasizing the need for the NSA to publicly disclose the scope of its surveillance. Moreover, it is not uncommon for agencies to have oversight authority over other agencies. Thus, this type of interagency accountability could be codified to provide the FCC with oversight authority over NSA data collection. Congress should first authorize the FCC to request certain types of data from the NSA. Similar to the PCLOB’s recommendation, this data, rather than being substantive, would be statistical; for instance, it might include data and the basic context surrounding how many communications providers from which the NSA is collecting metadata, or how many email contact lists the NSA is gathering. This would thereby provide oversight over the relevancy problem, wherein the NSA collects information in such wide swaths so as not to be tied to any particularized inquiry. The FCC would therefore be in a position to review the volume of information, while keeping it confidential. The legislation should also include authorization for the FCC to interact with the other oversight bodies. Congress should give the FCC the authority to send any of the statistics that the agency finds problematic to the FISA Court and the relevant congressional committees, and should provide for the FCC to be informed of <<continued, no text removed>> 13 Paradigm Research 2015-2016 CX—Electronic Communication Aff Electronic Communication Affirmative: First Affirmative—Solvency (FCC Oversight) [cont’d] <<continued, no text removed>> proceedings implicating data collection over which the FCC would be granted authority. Additionally, Congress should provide a mechanism for the FCC to liaise with Congress on a regular basis specifically about the NSA data collection since it involves sensitive information: for instance, setting out regular reports or allowing Congress to send inquiries to the FCC as needed on the technical aspects of the NSA’s methods of data collection. The language could also allow for public comment on NSA collection to some extent, modeled on the current FCC notice and comment procedures. The FCC could thereby ask for generalized comments without disclosing the exact nature of its inquiry. Thus, the FCC could solicit public comment on the underlying idea of NSA surveillance as it relates to the communications infrastructure and incorporate valid comments in its representations to the relevant oversight mechanisms. This would enable the FCC to incorporate comments by carriers and consumer interest groups into the oversight process and allow some degree of public participation without sacrificing national security. Moreover, the legislation must include a mechanism for protecting national security information. The FCC has knowledge about the underlying infrastructure where the data is coming from as well as experience dealing with sensitive information. However, there are valid concerns in disclosing any sort of information implicating national security. To that end, Congress may wish to consider adding a position in the FCC for an intelligence officer with clearance who can look into relevance when the amounts of data raise a red flag in the FCC’s internal process for reviewing the data. Moreover, placement of a member of an NSA staffer in the FCC would facilitate inter-agency cooperation and dialogue about data collection. For enforcement, in order to preserve national security, Congress should avoid providing the FCC any mechanism to call the NSA before it via hearing. However, the FCC would be able to report specially to the House and Senate committees, as well as petition the FISA Court as amicus curae. Additionally, if the PCLOB wants to stay involved and keep developing oversight, Congress should provide an avenue for the FCC to call forth another PCLOB investigation should the need arise. B. FCC oversight is superior to the status quo—multiple reasons Audra Healey, J.D. Candidate, “A Tale of Two Agencies: Exploring Oversight of the National Security Administration by the Federal Communications Commission,” FEDERAL COMMUNICATIONS LAW JOURNAL v. 67 n. 1, 2014, p. 108-110. 2. FCC oversight of the NSA could confer significant benefits. The lack of oversight indicates the need for a solution that is publically visible but would not undermine national security: due to its relevant expertise, the FCC is that solution. First, there are benefits specific to the FCC’s area of expertise which make it well-suited to provide insight into the data collection regarding the public good and communications infrastructure. Second, the FCC’s unique insights into the technological aspects of the Internet put the agency in a position to be uniquely helpful to congressional oversight committees. Moreover, the FCC is also particularly well-suited to provide oversight consistent with plans advocated by the PCLOB: for instance, specially providing the FISA Court with useful and insightful amicus curiae briefs. There are significant benefits to the FCC being the agency to provide insight into the NSA’s monitoring activities. The NSA gets the information it collects from “major Internet switches” and depending on the type of surveillance, does not have to notify the companies from which it collects data. However, the FCC could, with additional congressional authority, provide insight into basic statistics about the information collected by the NSA: for instance, volume, requiring the NSA to at least show patterns (i.e., the “relationship mapping” aspects). This could be beneficial to the national security mission: by providing a volumetric, technical analysis, based on practices that can be described, the FCC could help focus the NSA’s data collection, and thereby contribute to the effort to reduce overcollection, as well as provide a grounds for congressional monitoring and more effective court cases. Moreover, the FCC routinely deals with sensitive information and collecting public comments. For instance, the FCC often makes certain pieces of information confidential in its proceedings. Recently, the agency issued protective orders in its comment-seeking proceeding regarding the Technological Transition of the Nations Communications Infrastructure. This experience would facilitate the FCC acting as a bridge between the NSA and its oversight mechanisms. Additionally the PCLOB report calls for a similar oversight scheme. The PCLOB, in its first report, calls for the government to work with Internet service providers and other companies that regularly receive FISA production orders to develop rules permitting the companies to voluntarily disclose certain statistical information. Additionally, the PCLOB recommends that the government publicly disclose detailed statistics to provide a more complete picture of government surveillance operations. The PCLOB also recommends that independent experts as well as telecommunications service providers help assess at least one data collection technique. The FCC regularly interacts with these companies in its own rulemaking proceedings, and would therefore be in a position to facilitate independent expertise being utilized in assessing the efficacy of the collection. This is not only because the agency works with the companies and the infrastructure involved already, but also because the FCC’s general technical expertise places the agency in a position to consider what types of statistics would be helpful to the public. The need for expertise in determining the technical aspects of whether the data being collected is authorized is not limited to DOJ and NSA efforts, but extends to the FISA Court. In its first report, the PCLOB calls for Congress to enact legislation enabling the FISA Court to hear independent views. While a federal agency rather than an “independent” entity, the FCC would be particularly well-suited to bolster the outside input and provide the FISA Court with information regarding the impact on telecommunications, particularly the Internet, of NSA surveillance of the American public. The FCC would be a particularly helpful independent view to involve in the FISA Court proceedings because of its technical expertise. Furthermore, the FCC has significant experience dealing with sensitive information, such as trade secrets. Both these traits make the agency particularly well-suited to provide helpful insights to the FISA Court. 14 Paradigm Research 2015-2016 CX—Electronic Communication Aff Electronic Communication Affirmative: First Affirmative—Solvency (SSRA) Hence we offer the following plan: The United States federal government should enact the Surveillance State Repeal Act. Funding and enforcement are guaranteed. Observation Two: Solvency A. The SSRA solves—allows targeted surveillance while rendering mass surveillance illegal Shahid Buttar, Executive Director, Bill of Rights Defense Committee, “Can the Surveillance State Repeal Act Shift the Course on Spying?” OCCUPY, 4—8—15, www.occupy.com/article/can-surveillance-state-repeal-act-shift-course-spying, accessed 5-11-15. Eager to reset the debate and anchor it in long overdue transparency, a bipartisan block of representatives have introduced a bill to restore civil liberties, privacy, and freedom of thought. The Surveillance State Repeal Act, HR 1466, would do this by repealing the twin pillars of the NSA dragnet: the PATRIOT Act (not only the three expiring provisions) and the 2008 FISA amendments. On multiple occasions, executive officials have lied under oath to congressional oversight committees about the scope of domestic surveillance. Yet the very same officials still appear in oversight hearings as if they maintained any credibility. It took whistleblowers resigning their careers to prove that senior government officials’ blithe assurances to Congress were in fact self-serving lies. Some members of Congress paid attention: the authors of the PATRIOT Act moved to curtail their own legislative opus, and have encouraged their colleagues not to reauthorize the expiring provisions unless they are first curtailed. HR 1466 (the SSRA) represents a profound challenge by members of Congress from across the political spectrum fed up with the national security establishment and its continuing assault on our Constitution. By repealing the twin pillars of the surveillance dragnet, the SSRA would essentially shift the burden of proof, forcing intelligence agencies like the NSA and FBI to justify the expansion of their powers from a constitutional baseline, rather then the illegitimate status quo. Most policymakers forget the 9/11 commission’s most crucial finding: the intelligence community's failures that enabled the 9/11 attacks were not failures of limited data collection, but rather failures of data sharing and analysis. Over the last 15 years, Congress has allowed the agencies to expand their collection capacities, solving an imaginary problem while creating a host of real threats to U.S. national security far worse than any act of rogue violence: the specter of state omniscience, immune from oversight and accountability, and thus vulnerable to politicization. This was among the fears of which President Eisenhower warned us in his last speech as President. Meanwhile, the SSRA would preserve what the PATRIOT Act’s authors have said they meant to authorize: targeted investigations of particular people suspected by authorities to present potential threats. HR 1466 would also advance transparency, both by protecting conscientious whistleblowers from the corrupt retaliation of agencies and careerists, and by giving judges on the secret FISA court access to technical expertise they have been denied. Finally, the bill would directly address disturbing government duplicity, prohibiting agencies from hacking encryption hardware and software, and from using an executive order authorizing foreign surveillance as a basis to monitor Americans. Mass surveillance has never been popular in America. Hundreds of cities and multiple states have raised their voices seeking a restoration of constitutional limits on an increasingly imperial federal executive. Nor is mass surveillance constitutional. A 1979 case contorted by agency lawyers into providing a legal basis for surveillance stands for nothing of the sort: Smith v Maryland was a case addressing targeted surveillance of a particular person, based on reasonable suspicion, limited to a particular time. Intelligence agencies today monitor every American, without any basis for suspicion, all the time. Members of Congress who remember their oaths of office should support the SSRA to force a long overdue transparent debate. And Americans who value privacy, checks and balances, or freedom of thought should take a moment to educate Members of Congress who might not. 15 Paradigm Research 2015-2016 CX—Electronic Communication Aff Electronic Communication Affirmative: First Affirmative—Solvency (SSRA) [cont’d] B. Status quo reforms are simply inadequate to rein in the surveillance state—we need the Surveillance State Repeal Act to impose meaningful limits on NSA surveillance Rush Holt, U.S. Representative, “Time to End the ‘Surveillance State’,” MSNBC, 1—17—14, www.msnbc.com/msnbc/time-end-thesurveillance-state, accessed 3-20-15. The president’s remark came in a nearly hour-long speech intended to calm public fury over the National Security Agency’s abuses of its surveillance authority. His speech suggested that the intelligence community is undergoing meaningful reforms, but the truth is that the president’s reform proposals are not nearly as exhaustive, or as effective, as he implied. We should start by remembering that the NSA’s abusive practices originated in the organizational culture of the intelligence community as a whole: collect everything, keep everything – forever. The NSA has dedicated, patriotic Americans who employ astounding, sophisticated capabilities and who are developing more every day. Naturally, in their zeal to do their job, they want to use their capabilities to the fullest, even if this tramples on the rights of Americans or is ineffective. But rather than meaningfully reining in these capabilities, the president’s proposals continue to allow surveillance of Americans without requiring a Fourth Amendment determination of probable cause. They continue to regard Americans as suspects first and citizens second. They continue to allow the government to build backdoors into computer software and hardware. They fail to strengthen protections for whistleblowers who uncover abusive spying. The most disturbing omission from President Obama’s reforms was any commitment to enforcing the Fourth Amendment’s warrant-based, probable-cause standard for seizing and searching the communications of any American. Instead, the president required only “reasonable suspicion” to query the NSA’s mass surveillance databases – a much lower standard that was already in place during the abuses uncovered to date. In embracing the “reasonable suspicion” doctrine, the president overruled his own task force on surveillance reform and endorsed a practice that a U.S. District Court judge has found unconstitutional. He also misinterpreted the intent of our Founders when they wrote the Bill of Rights in the first place. In his history lesson he omitted discussion of the despised general warrants that colonists found so daunting and frightening and that have returned now in the wholesale collection of data on Americans. The Fourth Amendment does not exist to impede police or intelligence agencies. To the contrary, it exists to hold to hold government agents to a high standard – to ensure that they act on the basis of evidence and pursue real culprits, rather than wasting time and resources on wild goose chases. The president also left unaddressed the subversion of encryption standards by the NSA, as well as its efforts to pressure companies to build “back doors” into their products to facilitate NSA access to hardware, firmware, or software. American tech companies stand to lose billions of dollars in overseas business due to the revelation that the NSA has pressured them to hamper their own products. That economic toll seems likely to mount in the months ahead. And of course, the president’s remarks left unaddressed a deeper problem: how can we trust that the intelligence community is being honest about its own activities? Even I, as a member of Congress, have been repeatedly misled by the NSA. In December 2005, for instance, when I was a member of the House Permanent Select Committee on Intelligence, I asked NSA Director Keith Alexander whether the NSA was spying on Americans. He assured me they were not. One week later, The New York Times ran its initial story on what is now known as the “Stellar Wind” warrantless surveillance program. How, in an atmosphere of such secrecy, can the public ever gain full confidence that the NSA is operating within legal bounds? Because the work of the NSA is so extensive and so technical, courts overseeing its programs need enhanced technical expertise. And because the NSA’s executives are so skilled at presenting only the information they chose, full oversight is possible only with inside information from whistleblowers who understand the programs. Without whistleblower protections for intelligence employees that are similar to those afforded to other government employees, Congress and the public will learn of failures or abuses too late, if ever. But the president’s proposals omitted any mention of whistleblower protections, as well. Even the modest improvements that the president announced – for instance, requiring a cost-benefit analysis before spying on the heads of state of foreign nations, rather than simply spying on everyone – are subject to reversal at a stroke of the president’s pen. These new standards are backed only by the president’s good intentions. But as Daniel Webster observed in an earlier age, “Good intentions will always be pleaded for every assumption of authority. It is hardly too strong to say that the Constitution was made to guard the people against the dangers of good intentions. There are men in all ages who mean to govern well, but they mean to govern. They promise to be good masters, but they mean to be masters.” Our duty is to ensure that our nation remains under the rule of law, not the whims of those in power. We must eliminate these NSA programs and their actual and latent potential for abuse. To achieve that end, Congress should pass the Surveillance State Repeal Act – legislation I’ve authored that would repeal the laws that made the NSA’s abuses possible in the first place. 16 Paradigm Research 2015-2016 CX—Electronic Communication Aff Electronic Communication Affirmative: First Affirmative—Solvency (Core) C. Bulk data collection is the core of the problem Harley Geiger, Senior Counsel and Deputy Director, Project on Freedom, Security, and Technology, Center for Democracy and Technology, Testimony before the Senate Selection Committee on Intelligence, 6—5—14, www.intelligence.senate.gov/140605/geiger.pdf, accessed 2-18-15. Although questions remain and further debate is needed in many areas, a near consensus has emerged on a critical issue that has been of central focus to the American public: The government’s bulk collection of records of phone calls and emails to, from and within the United States is both intrusive and unnecessary, and Congress must act to prohibit this activity. The vehicle with the most headway in accomplishing this goal is the bicameral, bipartisan USA FREEDOM Act. The USA FREEDOM Act directly takes on the bulk collection problem, attempting to prohibit untargeted mass collection while preserving the key requirement of prior court approval for surveillance demands, without unreasonably interfering with the government’s ability to make targeted record requests. The legislation also pursues other important reforms, including permitting greater company disclosure regarding national security orders, and enhancing transparency of the Foreign Intelligence Surveillance Court (FISC). D. The NSA will not circumvent the plan—reaction to USA Freedom Act proves Spencer Ackerman, journalist, “Fears NSA Will Seek to Undermine Surveillance Reform,” THE GUARDIAN, 6—1—15, www.theguardian.com/us-news/2015/jun/01/nsa-surveillance-patriot-act-congress-secret-law, accessed 6-3-15. Despite that recent history, veteran intelligence attorneys reacted with scorn to the idea that NSA lawyers will undermine surveillance reform. Robert Litt, the senior lawyer for director of national intelligence, James Clapper, said during a public appearance last month that creating a banned bulk surveillance program was “not going to happen”. “The whole notion that NSA is just evilly determined to read the law in a fashion contrary to its intent is bullshit, of the sort that the Guardian and the left – but I repeat myself – have fallen in love with. The interpretation of 215 that supported the bulk collection program was creative but not beyond reason, and it was upheld by many judges,” said the former NSA general counsel Stewart Baker, referring to Section 215 of the Patriot Act. This is the section that permits US law enforcement and surveillance agencies to collect business records and expired at midnight, almost two years after the whistleblower Edward Snowden revealed to the Guardian that the Patriot Act was secretly being used to justify the collection of phone records from millions of Americans. With one exception, the judges that upheld the interpretation sat on the non-adversarial Fisa court, a body that approves nearly all government surveillance requests and modifies about a quarter of them substantially. The exception was reversed by the second circuit court of appeals. Baker, speaking before the Senate voted, predicted: “I don’t think anyone at NSA is going to invest in looking for ways to defy congressional intent if USA Freedom is adopted.” E. Data collection practices are pivotal—they magnify the synergistic effects of multiple surveillance schemes Jay Stanley and Barry Steinhardt, staff, Technology and Liberty Program, BIGGER MONSTER, WEAKER CHAINS: THE GROWTH OF AN AMERICAN SURVEILLANCE SOCIETY, American Civil Liberties Union, 1—03, p. 11. Multiple surveillance techniques added together are greater than the sum of their parts. One example is face recognition, which combines the power of computerized software analysis, cameras, and databases to seek matches between facial images. But the real synergies of surveillance come into play with data collection. The growing piles of data being collected on Americans represent an enormous invasion of privacy, but our privacy has actually been protected by the fact that all this information still remains scattered across many different databases. As a result, there exists a pent-up capacity for surveillance in American life today – a capacity that will be fully realized if the government, landlords, employers, or other powerful forces gain the ability to draw together all this information. A particular piece of data about you – such as the fact that you entered your office at 10:29 AM on July 5, 2001 – is normally innocuous. But when enough pieces of that kind of data are assembled together, they add up to an extremely detailed and intrusive picture of an individual’s life and habits. 17 Paradigm Research 2015-2016 CX—Electronic Communication Aff Electronic Communication Affirmative: First Affirmative—Democracy Advantage Advantage One: Democracy A. Congress and the courts are failing to act to check executive-driven surveillance abuses—threatens our democratic form of government American Civil Liberties Union (ACLU), A CALL TO COURAGE: RECLAIMING OUR LIBERTIES TEN YEARS AFTER 9/11, 9— 11, p. 27. These stories contain key elements of our post-9/11 national “surveillance society.” The executive branch has taken advantage of our society’s technological revolution—on which Americans increasingly rely for the benefits and conveniences it brings to every aspect of our personal and professional lives—to monitor us without any suspicion of wrongdoing. Every day, the NSA (which is just one of 16 major intelligence agencies in the United States) is now able to intercept and store 1.7 billion e-mails, phone calls, and other communications. Today, the government is able to spy on our speech and actions through our mobile smartphones, GPS location tracking, and search engines, to name a few. Congress has not only failed to curb the executive’s violations, it has ratified them. Courts have, for the most part, refused to review the legality of executive authorities or violations, dismissing challenges on procedural grounds. And the American public is left almost entirely in the dark. Together, these elements constitute a profound threat to democratic government. Because citizens cannot object to clandestine governmental activities about which they are systematically deceived, checks and balances are particularly critical. When the government institutions that are responsible for providing those checks fail to do so, the result is a national surveillance society in which Americans’ right to privacy is under unprecedented siege. B. Mass surveillance threatens to destroy our democracy Shayana Kadidal, Senior Managing Attorney, Center for Constitutional Rights, “NSA Surveillance: The Implications for Civil Liberties,” I/S: A JOURNAL OF LAW AND POLICY FOR THE IFNORMATION SOCIETY v. 10 n. 2, 2014, p. 477-478. Snowden’s first sentence neatly summarizes the polling data I described earlier. The second illustrates the potential scope for corruption of the democratic process posed by sweeping content and metadata surveillance, whether or not Congress is exempted from some or all of it. Mass surveillance of this all-seeing scale, with the government able to assemble together everything about us that exists outside of our heads–all of our consumer activities, all of our communication patterns and other social connection–is arguably fundamentally incompatible with democratic self-governance. One reason the Framers paid so much attention to protecting property rights from the state is that they thought private property ensured autonomy from the state; give the government sufficient power to control wealth and the means to produce it, and the people would not be independent enough to control the government. Essentially, to have a democracy, you need the citizenry to be somewhat autonomous from government, independent of all-encompassing government control. Mass surveillance threatens that independence enough to corrupt democracy itself. When the government “can literally see your thoughts form as you type,” your degree of control over government is at the very least limited by the same sort of self-censorship that afflicts the lawyers and journalists who first sued over these NSA Program in 2006. C. NSA surveillance of political leaders limits their ability to exercise effective oversight—risks corrupting the political process Shayana Kadidal, Senior Managing Attorney, Center for Constitutional Rights, “NSA Surveillance: The Implications for Civil Liberties,” I/S: A JOURNAL OF LAW AND POLICY FOR THE IFNORMATION SOCIETY v. 10 n. 2, 2014, p. 476-477. That brings me to one final thought on checks-and-balances: To what extent are judges, members of Congress and other elected officials exempted from NSA surveillance? If they are not, the chilling effect that afflicts attorneys and journalists applies here as well and has similarly-enormous potential to corrupt the political process. Imagine Anthony Weiner had not accidentally mass-tweeted that fateful photograph, and had remained in the House, but knew that the NSA knew about his habits–and was casting the deciding vote on a bill limiting the powers of the NSA? Such a scenario is not entirely the stuff of fiction: FBI director J. Edgar Hoover had accumulated dossiers on all sorts of elected officials, which is why James Comey’s term in that same office has been limited to ten years by statute–to avoid allowing any future FBI director to accumulate that much dirt on (and accompanying passive leverage over) Congressmen. Even Supreme Court justices had been surveilled in the past, as the Church Committee discovered. Perhaps one consequence of the accumulation of private conversations from foreign leaders’ cell phones and email accounts will be not to undermine their negotiating positions at the G20 or the UN directly, but to allow the accumulation of leverage by discovering embarrassing secrets in their closets. Either way, the potential for surveillance corrupting the political process extends to multinational negotiations between democracies as well. 18 Paradigm Research 2015-2016 CX—Electronic Communication Aff Electronic Communication Affirmative: First Affirmative—Democracy Advantage [cont’d] D. Democracy promotion is critical to prevent terrorism and instability, generate peace and economic trade, and decrease the risk of refugee flows. Paul D. Miller, Assistant Professor of International Security Affairs at the National Defense University in Washington DC, SURVIVAL, “American Grand Strategy and the Democratic Peace,” vol. 54, no. 2, April–May 2012, pp. 49–76, accessed 5-20-2015: academic search premiere. A grand strategy that includes promoting the democratic peace has much to recommend it. The historical evidence seems convincing: established democracies rarely, if ever, fight one another. The more states that adopt democracy, the fewer there are that are likely to become enemies of the United States. Additionally, as summarised by Sean M. Lynn Jones, editor of International Security, democracy has a number of other benefits directly helpful for US national security. Democracies are less likely to use violence against their own people and therefore less likely to draw in outside intervention. They rarely sponsor international terrorism. Democracies have better long-run economic prospects, rarely experience famine, and produce fewer refugees than non-democracies, which means they require less international aid, are more likely to trade with and invest in the United States, and are more likely to become centres of innovation and productivity. Scholars have offered a range of reasons why democracies rarely fight one another, which collectively suggest that the benefits of democracy are not ephemeral accidents but permanent features of this form of government. Citizens of democracies believe they share values with other democracies, and thus are slower to see other democracies as potential enemies or combatants. Democracy enforces peaceful dispute-resolution domestically, a norm that democratic leaders may simply transplant to the international arena, especially in disputes with other democracies. Institutional considerations are also relevant. Democracies typically constrain the government’s war powers through civilian control and checks and balances, making it harder to launch a war. The public, which pays the cost of war in a democracy, is likely to be more selective about the wars it chooses to fight. And democracies are unable to control information about themselves because of the freedoms of speech and press, which decreases misperceptions that could lead to war and, in a militarised dispute, improves the credibility of a democracy’s military threats and hence decreases opponents’ willingness to gamble on war. E. Democratization helps to check the rise of aggressive hegemons in Eurasia and deal with the threat of failed states, including terrorism, proliferation, disease, and piracy. Paul D. Miller, Assistant Professor of International Security Affairs at the National Defense University in Washington DC, SURVIVAL, “American Grand Strategy and the Democratic Peace,” vol. 54, no. 2, April–May 2012, pp. 49–76, accessed 5-20-2015: academic search premiere. Promoting democracy also fits naturally with other long-standing components of US grand strategy. Washington has, for example, long sought to prevent the rise of a hostile hegemon in strategically important areas of the world – especially Europe or East Asia – by maintaining a favourable balance of power through military dominance and a network of allies. Preventing hegemony has rightly animated US policy for generations, from its tack-and weave between Britain and France from 1776 to 1815 to its involvement in both World Wars and the Cold War. A commitment to democracy is, in a sense, the corollary to resistance to hegemony, as democratic systems are defined by a diffusion of power among many actors, thus limiting the chances for tyranny. The same holds internationally: the United States should work to keep power diffused among many sovereign states and international organisations to prevent the rise of a hostile, coercive hegemon. Regimes committed to those ideals at home are more likely to apply them abroad, while autocracies are more likely to seek to expand their power at others’ expense, both domestically and internationally. The growth of democracy abroad alters the balance of power in the United States’ favour. Finally, promoting democracy is well suited to one of the major challenges of the twenty-first century: state failure and its attendant threats. The United States can and should respond to the rising tide of state failure across the world with democratic peace-building interventions. The consequences of state failure and anarchy across much of the world – including the rise of terrorist groups, organised crime, drug cartels, human traffickers, nuclear smugglers, pandemic disease and piracy – collectively erode global stability and liberalism and raise the cost of US leadership. Effective democratic peace-building (meaning peace-building that is well armed, well-funded and well planned) is the answer to this challenge. When successful, it holds out the promise not just of treating these various symptoms, but of addressing the disease. The alternative is to play global Whack-a-Mole with the crisis du jour, sniping pirates one day, drone-bombing terrorists or barricading drug cartels into narco-statelets the next. Such policy is reactive, defensive and events-driven, the opposite of what strategy is supposed to be. A grand strategy would complement these immediate, short-term actions to stave off threats with longer-term efforts to address the underlying challenges to stability and democracy. 19 Paradigm Research 2015-2016 CX—Electronic Communication Aff Electronic Communication Affirmative: First Affirmative—Democracy Advantage [cont’d] F. Restrictions on domestic surveillance are critical to protecting democratic self-governance—are also key to our democratic model Richard A. Clarke et al., President’s Review Group on Intelligence and Communications Technologies, LIBERTY AND SECURITY IN A CHANGING WORLD, Report and Recommendations, 12—12—13, p. 154. Against that background, FISA’s especially strict limitations on government surveillance of United States persons reflects not only a respect for individual privacy, but also—and fundamentally—a deep concern about potential government abuse within our own political system. The special protections for United States persons must therefore be understood as a crucial safeguard of democratic accountability and effective self-governance within the American political system. In light of that history and those concerns, there is good reason for every nation to enact special restrictions on government surveillance of those persons who participate directly in its own system of self-governance. As an aside, we note that the very existence of these protections in the United States can help promote and preserve democratic accountability across the globe. In light of the global influence of the United States, any threat to effective democracy in the United States could have negative and far-reaching consequences in other nations as well. By helping to maintain an effective system of checks and balances within the United States, the special protections that FISA affords United States persons can therefore contribute to sustaining democratic ideals abroad. 20 Paradigm Research 2015-2016 CX—Electronic Communication Aff Electronic Communication Affirmative: First Affirmative—Internet Advantage Advantage Two: The Internet A. Internet governance is on the brink—we need to act to keep it open Brett D. Schaefer, Senior Research Fellow, “Internet Governance: Past, Present, Future,” SAVING INTERNET FREEDOM, Special Report n. 168, Heritage Foundation, 6—3—15, p. 13. The future of Internet governance is at a crossroads. No system of Internet governance is perfect, including the current system, which many countries resent because of a perceived dominance by the U.S. However, the strong growth of the Internet in recent decades, and the economic growth resulting from that development, illustrate the virtues of the minimal governance model. The greatest risk to this successful model would arise from granting a more overt governance role to states either through the ITU or another intergovernmental organization, or by enhancing government authority within ICANN. The March 2014 NTIA announcement clearly expresses the U.S. preference that governments and intergovernmental organizations should be relegated to a backseat role, following the lead of the private sector and civil society. Most of the private sector represented in the multi-stakeholder community supports this U.S. perspective on Internet governance. However, many powerful governments would prefer to exert tighter control of and oversight over the Internet. There are ample opportunities for countries that want more direct government control of the Internet to press their agenda. It is unclear how this dispute will be resolved. But the stakes are high. If Internet functions and freedom are harmed or subjected to unnecessary regulatory burdens or political interference, not only would there be economic damage, but a vital forum for freedom of speech and political dissent would be compromised. B. Localization remains a substantial threat in the long run—the threat of NSA surveillance will catalyze it Danielle Kehl et al., policy analyst, “Surveillance Costs: The NSA’s Impact on the Economy, Internet Freedom & Cybersecurity,” POLICY PAPER, Open Technology Institute, New America, 7—14, p. 17. Moreover, while the recent developments may temper short-term concerns, they could also set the stage for more troubling changes in the long run. Until recently, most foreign countries have accepted the fact that the U.S. has a comparative advantage in the technology industry that is extremely difficult to challenge. In a number of cases, however, the threat of NSA surveillance may be the catalyst that forces countries to invest heavily in markets that they would otherwise have left to the U.S., including cloud computing and data storage—a shift that will be worth huge amounts of money over time. There is some risk at the moment that the short-term logistical challenges of requiring data localization or turning away from U.S. companies will create a false sense of security among U.S. policymakers and business leaders, obscuring the fact that the United States will squander massive economic value in the long term if it fails to address issues raised by NSA surveillance. 21 Paradigm Research 2015-2016 CX—Electronic Communication Aff Electronic Communication Affirmative: First Affirmative—Internet Advantage [cont’d] C. A free and open Internet is vital to solving virtually all of the problems that we face David Eagleman, Director, Laboratory for Perception and Action, Baylor College of Medicine, “Six Ways the Internet Will Save Civilization,” WIRED, 11—9—10, www.wired.co.uk/magazine/archive/2010/12/start/apocalypse-no, accessed 3-11-15. Many great civilisations have fallen, leaving nothing but cracked ruins and scattered genetics. Usually this results from: natural disasters, resource depletion, economic meltdown, disease, poor information flow and corruption. But we’re luckier than our predecessors because we command a technology that no one else possessed: a rapid communication network that finds its highest expression in the internet. I propose that there are six ways in which the net has vastly reduced the threat of societal collapse. Epidemics can be deflected by telepresence One of our more dire prospects for collapse is an infectious-disease epidemic. Viral and bacterial epidemics precipitated the fall of the Golden Age of Athens, the Roman Empire and most of the empires of the Native Americans. The internet can be our key to survival because the ability to work telepresently can inhibit microbial transmission by reducing human-to-human contact. In the face of an otherwise devastating epidemic, businesses can keep supply chains running with the maximum number of employees working from home. This can reduce host density below the tipping point required for an epidemic. If we are well prepared when an epidemic arrives, we can fluidly shift into a self-quarantined society in which microbes fail due to host scarcity. Whatever the social ills of isolation, they are worse for the microbes than for us. The internet will predict natural disasters We are witnessing the downfall of slow central control in the media: news stories are increasingly becoming user-generated nets of up-to-the-minute information. During the recent California wildfires, locals went to the TV stations to learn whether their neighbourhoods were in danger. But the news stations appeared most concerned with the fate of celebrity mansions, so Californians changed their tack: they uploaded geotagged mobile-phone pictures, updated Facebook statuses and tweeted. The balance tipped: the internet carried news about the fire more quickly and accurately than any news station could. In this grass-roots, decentralised scheme, there were embedded reporters on every block, and the news shockwave kept ahead of the fire. This head start could provide the extra hours that save us. If the Pompeiians had had the internet in 79AD, they could have easily marched 10km to safety, well ahead of the pyroclastic flow from Mount Vesuvius. If the Indian Ocean had the Pacific’s networked tsunami-warning system, South-East Asia would look quite different today. Discoveries are retained and shared Historically, critical information has required constant rediscovery. Collections of learning -- from the library at Alexandria to the entire Minoan civilisation -- have fallen to the bonfires of invaders or the wrecking ball of natural disaster. Knowledge is hard won but easily lost. And information that survives often does not spread. Consider smallpox inoculation: this was under way in India, China and Africa centuries before it made its way to Europe. By the time the idea reached North America, native civilisations who needed it had already collapsed. The net solved the problem. New discoveries catch on immediately; information spreads widely. In this way, societies can optimally ratchet up, using the latest bricks of knowledge in their fortification against risk. Tyranny is mitigated Censorship of ideas was a familiar spectre in the last century, with state-approved news outlets ruling the press, airwaves and copying machines in the USSR, Romania, Cuba, China, Iraq and elsewhere. In many cases, such as Lysenko’s agricultural despotism in the USSR, it directly contributed to the collapse of the nation. Historically, a more successful strategy has been to confront free speech with free speech -- and the internet allows this in a natural way. It democratises the flow of information by offering access to the newspapers of the world, the photographers of every nation, the bloggers of every political stripe. Some posts are full of doctoring and dishonesty whereas others strive for independence and impartiality -- but all are available to us to sift through. Given the attempts by some governments to build firewalls, it’s clear that this benefit of the net requires constant vigilance. Human capital is vastly increased Crowdsourcing brings people together to solve problems. Yet far fewer than one per cent of the world’s population is involved. We need expand human capital. Most of the world not have access to the education afforded a small minority. For every Albert Einstein, Yo-Yo Ma or Barack Obama who has educational opportunities, uncountable others do not. This squandering of talent translates into reduced economic output and a smaller pool of problem solvers. The net opens the gates education to anyone with a computer. A motivated teen anywhere on the planet can walk through the world’s knowledge -- from the webs of Wikipedia to the curriculum of MIT’s OpenCourseWare. The new human capital will serve us well when we confront existential threats we’ve never imagined before. Energy expenditure is reduced Societal collapse can often be understood in terms of an energy budget: when energy spend outweighs energy return, collapse ensues. This has taken the form of deforestation or soil erosion; currently, the worry involves fossil-fuel depletion. The internet addresses the energy problem with a natural ease. Consider the massive energy savings inherent in the shift from paper to electrons -- as seen in the transition from the post to email. Ecommerce reduces the need to drive long distances to purchase products. Delivery trucks are more eco-friendly than individuals driving around, not least because of tight packaging and optimisation algorithms for driving routes. Of course, there are energy costs to the banks of computers that underpin the internet -- but these costs are less than the wood, coal and oil that would be expended for the same quantity of information flow. The tangle of events that triggers societal collapse can be complex, and there are several threats the net does not address. But vast, networked communication can be an antidote to several of the most deadly diseases threatening civilisation. The next time your coworker laments internet addiction, the banality of tweeting or the decline of face-to-face conversation, you may want to suggest that the net may just be the technology that saves us. 22 Paradigm Research 2015-2016 CX—Electronic Communication Aff Electronic Communication Affirmative: First Affirmative—Internet Advantage [cont’d] D. An open Internet is key to U.S. economic growth, exports and innovation Ron Wyden, U.S. Senator, Statement before the Senate Finance Committee, Subcommittee on International Trade, Customs and Global Competitiveness, 11—18—10, www.finance.senate.gov/imo/media/doc/111810rw.pdf, accessed 3-7-15. There is rampant global protectionism being deployed against America’s digital exports and the purpose of today’s hearing is to expose it, describe it, and identify ways to combat it. Today we shine new light onto an old issue: the importance of keeping the modes of international trade open. Whether it’s the Oregon Trail, the Silk Road or the World Wide Web, safe and efficient trade routes that enable people to connect allow economies to grow. The modes over which trade is conducted changed over time, but the fundamentals do not. The development of civilization parallels the growth of open trade routes and the Internet represents the trade route of the 21st century. Keeping the Internet open – at home and overseas – is of paramount importance to the American economy because it is increasingly the primary way that the global population will communicate, create, and conduct commerce. The United States economy faced some dark times over the last two years, but one big bright spot is the continued innovation in the digital economy. American companies, whether they are designing and manufacturing semiconductors or rearranging the way that people socialize and engage in commerce, are transforming the global society in profound, irreversible ways. The innovation isn’t just happening in the Silicon Valley. It’s literally occurring in every community around the nation. To be sure, Intel, Facebook, and Apple, come to mind when many of us think of the digital economy, but these firms are also the platforms upon which further innovation occurs, and by which a seller in the Pacific Northwest can reach a buyer in Southeast Asia without leaving her desk. This is why I am very pleased that Mike Sax is here today from Eugene, Oregon. Mike develops applications that piggyback onto mobile IT platforms, like Apple’s iPhone. Thanks to Mike, over a million early iPhone adopters around the world could download his app to type their e‐mail and text messages much easier. Mike is here representing hundreds of small developers and entrepreneurs all around the country. The ability of American IT companies to penetrate foreign markets directly affects American companies’ ability to increase exports of goods and services, digital or otherwise. So when an Internet website is blocked or filtered, or data flow is impeded, it has a direct impact on the American economy and its ability to produce the new, good paying jobs that we need. As American technology firms create and expand global market for digital products, and outpace their competitors doing so, foreign governments are resorting to discriminatory measures against U.S. technology and content providers. According to industry sources that relied on the work of the Open Network Initiative, more than 40 countries impose broad restrictions on online information, which represents a ten‐fold increase from just a decade ago. In many cases, this censorship does not aim to serve a repressive political motive, but rather a protectionist commercial one. These actions constitute a direct economic threat to the United States. We have seen this time and time again. American firms drive innovation but then foreign regimes think they have a license to disfavor American technology because their own companies cannot get off the starting line. 23 Paradigm Research 2015-2016 CX—Electronic Communication Aff Electronic Communication Affirmative: First Affirmative—Internet Advantage [cont’d] E. Economic decline causes a global war Harold James, Professor, History, Princeton University, “Debate: Is 2014, Like 1914, a Prelude to World War?” GLOBE AND MAIL, 6—24—14, www.theglobeandmail.com/globe-debate/read-and-vote-is-2014-like-1914-a-prelude-to-world-war/article19325504/, accessed 9-22-14. Some of the dynamics of the pre-1914 financial world are now re-emerging. Then an economically declining power, Britain, wanted to use finance as a weapon against its larger and faster growing competitors, Germany and the United States. Now America is in turn obsessed by being overtaken by China – according to some calculations, set to become the world’s largest economy in 2014. In the aftermath of the 2008 financial crisis, financial institutions appear both as dangerous weapons of mass destruction, but also as potential instruments for the application of national power. In managing the 2008 crisis, the dependence of foreign banks on U.S. dollar funding constituted a major weakness, and required the provision of large swap lines by the Federal Reserve. The United States provided that support to some countries, but not others, on the basis of an explicitly political logic, as Eswar Prasad demonstrates in his new book on the “Dollar Trap.” Geo-politics is intruding into banking practice elsewhere. Before the Ukraine crisis, Russian banks were trying to acquire assets in Central and Eastern Europe. European and U.S. banks are playing a much reduced role in Asian trade finance. Chinese banks are being pushed to expand their role in global commerce. After the financial crisis, China started to build up the renminbi as a major international currency. Russia and China have just proposed to create a new credit rating agency to avoid what they regard as the political bias of the existing (American-based) agencies. The next stage in this logic is to think about how financial power can be directed to national advantage in the case of a diplomatic tussle. Sanctions are a routine (and not terribly successful) part of the pressure applied to rogue states such as Iran and North Korea. But financial pressure can be much more powerfully applied to countries that are deeply embedded in the world economy. The test is in the Western imposition of sanctions after the Russian annexation of Crimea. President Vladimir Putin’s calculation in response is that the European Union and the United States cannot possibly be serious about the financial war. It would turn into a boomerang: Russia would be less affected than the more developed and complex financial markets of Europe and America. The threat of systemic disruption generates a new sort of uncertainty, one that mirrors the decisive feature of the crisis of the summer of 1914. At that time, no one could really know whether clashes would escalate or not. That feature contrasts remarkably with almost the entirety of the Cold War, especially since the 1960s, when the strategic doctrine of Mutually Assured Destruction left no doubt that any superpower conflict would inevitably escalate. The idea of network disruption relies on the ability to achieve advantage by surprise, and to win at no or low cost. But it is inevitably a gamble, and raises prospect that others might, but also might not be able to, mount the same sort of operation. Just as in 1914, there is an enhanced temptation to roll the dice, even though the game may be fatal. 24 Paradigm Research 2015-2016 CX—Electronic Communication Aff Electronic Communication Affirmative: First Affirmative—Internet Advantage [cont’d] F. U.S. efforts to increase privacy will help restore trust lost because of the Snowden revelations Ben FitzGerald and Robert Butler, Center for a New American Security, “NSA Revelations: Fallout Can Serve Our Nation,” REUTERS, 12—18—13, http://blogs.reuters.com/great-debate/2013/12/18/nsa-revelations-fallout-can-serve-our-nation/, accessed 3-2-15. As the crisis grows, many in Congress and the executive branch now focus on explaining why these programs are critical to countering terrorist threats and securing the country. President Barack Obama’s meeting with technology leaders Tuesday marks an early signal of willingness to engage in open dialogue. But until Washington fully addresses the concerns of these various groups through tangible government reform, the fallout will likely worsen. Trust has been the principal casualty in this unfortunate affair. The American public, our nation’s allies, leading businesses and Internet users around the world are losing faith in the U.S. government’s role as the leading proponent of a free, open and integrated global Internet. In discussing how the nation’s privacy and civil rights are being safeguarded, the administration and Congress inadvertently dismiss surveillance concerns. Government officials maintain its programs are legal, critical for national security, effective and managed with strict oversight — and thus should continue. Yet legality does not confer legitimacy. The current approach to surveillance is widely viewed with skepticism and may even be unconstitutional. While no government will be able to persuade all foreigners that its spying efforts are in the service of good, there are steps Washington can and should take to limit the continuing damage from the Snowden fallout. Washington must try to rebuild the trust. There are several proposals presented already that would take steps in this direction. The European Commission, for example, outlined six areas of action that it insists would restore trust in data flows between the United States and the European Union — including reforms in data protection and privacy standards. This would establish, or reinforce, agreed-upon rules and programs for government data collection on citizens, legal frameworks to manage the transfer of that data between governments and methods for judicial redress when required. This initiative is crucial because it enforces mutual accountability for all participants. In addition, leading technology companies have laid out five principles for reform — data collection, oversight, transparency, data flow and government collaboration. Addressing these principles will, the companies say, provide protection from overly intrusive surveillance — and thereby encourage continued use of the businesses’ products and services. These proposals merit attention. Loss of trust, however, remains the fundamental issue. Washington cannot fix this just by acceding to reforms suggested by others. The administration, with congressional support, must launch a proactive reform agenda, which would demonstrate an understanding of citizens’ concerns — allies and businesses alike. The components are straightforward: public outreach to concerned constituencies, such as Tuesday’s meeting with technology leaders, amendments to policy and law — for example, updating the Safe Harbor frameworks for privacy protection — and review of the National Security Agency’s oversight mechanisms. While these procedural steps are clear, the government can do more. The Snowden revelations are about trust as much as technological frontiers — so Washington’s efforts must focus on confidence building. Security and openness need not be mutually exclusive and technological capability should not be the key to defining operational limits. Confidence can be re-established through government-led development of the explicit principles that set a better balance between security and openness. These principles must be formalized in government agencies’ policies, federal laws, Supreme Court rulings and congressional oversight establishing the government mechanisms to balance security and openness. Credibly addressing this balance represents Washington’s best chance to rebuild the trust that has been so eroded. It is also an opportunity to recast the Snowden revelations as a reason to establish international norms that will govern all nations that are now developing and using similar surveillance capabilities. What is required is to establish standards that Washington can hold itself and others to in terms of healthy collaboration with business, productive relationships with allies and appropriate protections for the data of private citizens. Powerful surveillance capabilities will only grow over time. The United States must therefore establish a new “higher ground” in the international community to lead morally as well as technologically and ensure mutual accountability among governments. The key is to act quickly. Though the United States needs to retain robust foreign surveillance, it is clear that the fallout from the NSA revelations will continue until proactive steps — rooted in trust, policy and law — are taken. G. Surveillance reform is critical to restoring U.S. tech leadership Daniel Castro, Vice President and Alan McQuinn, Research Assistant, “Beyond the USA Freedom Act: How U.S. Surveillance Still Subverts U.S. Competitiveness,” Information Technology & Innovation Foundation, 6—15, p. 7. When historians write about this period in U.S. history it could very well be that one of the themes will be how the United States lost its global technology leadership to other nations. And clearly one of the factors they would point to is the long-standing privileging of U.S. national security interests over U.S. industrial and commercial interests when it comes to U.S. foreign policy. This has occurred over the last few years as the U.S. government has done relatively little to address the rising commercial challenge to U.S. technology companies, all the while putting intelligence gathering first and foremost. Indeed, policy decisions by the U.S. intelligence community have reverberated throughout the global economy. If the U.S. tech industry is to remain the leader in the global marketplace, then the U.S. government will need to set a new course that balances economic interests with national security interests. The cost of inaction is not only short-term economic losses for U.S. companies, but a wave of protectionist policies that will systematically weaken U.S. technology competiveness in years to come, with impacts on economic growth, jobs, trade balance, and national security through a weakened industrial base. Only by taking decisive steps to reform its digital surveillance activities will the U.S. government enable its tech industry to effectively compete in the global market. 25 Paradigm Research 2015-2016 CX—Electronic Communication Aff Status Quo: Topshelf Ext 1. The threat of surveillance creep is real—driven by multiple factors Leslie Harris, President and CEO, Center for Democracy & Technology, Testimony before the European Parliament LIBE Committee Inquiry on Electronic Mass Surveillance of EU Citizens, 9—24—13, www.cdt.org/files/pdfs/LIBEtestimony24September.pdf, accessed 2-18-15. Recent revelations about the scope and scale of surveillance programs in the U.S. and in some EU Member State have highlighted what national security officials candidly admit: that we have entered a “golden age of surveillance.” There are at least three factors driving a paradigm shift away from particularized or targeted monitoring to systemic or bulk collection, in which government agencies seek larger and larger volumes of data, claiming that bulk access is necessary to find “the needle in the haystack.” First, the storage revolution and big data analytic capabilities, combined with fears about terrorism, are driving a steadily growing governmental appetite for access to data held by the private sector. Governments are demanding more data on the theory that big data analytic capabilities will allow them to extract small but crucial pieces of information from huge datasets. Second, as Internet-based services have become globalized, transborder surveillance has flourished, posing new challenges for human rights. As Frank La Rue, Special Rapporteur on the Promotion and Protection of the Right to Freedom of Expression, noted, there is “serious concern with regard to the extraterritorial commission of human rights violations and the inability of individuals to know they might be subject to foreign surveillance, challenge decisions with respect to foreign surveillance or seek remedies.” Gone are the days when intelligence agencies had to establish foreign listening posts or position satellites or antennas to capture communications that stayed largely within the country of origin. Now, in many instances, communications pass through or are stored in other countries. In that respect, the United States has a unique position in terms of access to global communications data since a great deal of global communications travel over U.S. networks or are stored with U.S. cloud companies. Third, national security legal authorities have become increasingly powerful since 9/11 in the U.S. and in Europe. It has long been the case that governments have claimed greater powers to collect data in the name of national security than in ordinary criminal law enforcement cases. In the post 9/11 world, activities conducted in the U.S. (and possibly in other countries) under these separate rules for national security have vastly expanded even as privacy safeguards have eroded. 2. The NSA has initiated massive surveillance programs G. Alex Sinha, fellow, Human Rights Watch, WITH LIBERTY TO MONITOR ALL: HOW LARGE-SCALE US SURVEILLANCE IS HARMING JOURNALISM, LAW AND AMERICAN DEMOCRACY, Human Rights Watch & the ACLU, 7—14, p. 1-2. The United States government today is implementing a wide variety of surveillance programs that, thanks to developments in its technological capacity, allow it to scoop up personal information and the content of personal communications on an unprecedented scale. Media reports based on revelations by former National Security Agency (NSA) contractor Edward Snowden have recently shed light on many of these programs. They have revealed, for example, that the US collects vast quantities of information—known as “metadata”— about phone calls made to, from, and within the US. It also routinely collects the content of international chats, emails, and voice calls. It has engaged in the large-scale collection of massive amounts of cell phone location data. Reports have also revealed a since-discontinued effort to track internet usage and email patterns in the US; the comprehensive interception of all of phone calls made within, into, and out of Afghanistan and the Bahamas; the daily collection of millions of images so the NSA can run facial recognition programs; the acquisition of hundreds of millions of email and chat contact lists around the world; and the NSA’s deliberate weakening of global encryption standards. 26 Paradigm Research 2015-2016 CX—Electronic Communication Aff Status Quo: Topshelf Ext [cont’d] 3. The NSA is engaging in domestic surveillance—email, phone monitoring Audra Healey, J.D. Candidate, “A Tale of Two Agencies: Exploring Oversight of the National Security Administration by the Federal Communications Commission,” FEDERAL COMMUNICATIONS LAW JOURNAL v. 67 n. 1, 2014, p. 95-96. Despite its foreign-centric mission and the express limits on its domestic authority, the NSA has increasingly turned its attention to activities of persons within the United States in the wake of 9/11. For instance, in 2006, it was discovered that the NSA had created a call database in 2001 that collected tens of millions of citizens’ phone records from data provided by AT&T, Verizon, and BellSouth. “[T]he largest database ever assembled in the world” at the time, its goal was to log “every call ever made within the nation’s borders.” The NSA itself has acknowledged its serious obligation to operate effectively in an increasingly interconnected and globalized world without stepping on the toes of civil liberties for the sake of national security. Additionally, the NSA’s intrusions into domestic communications extend beyond call data to reach citizens’ activity on the Internet. For years, the NSA “unlawfully gathered tens of thousands of emails and other electronic communications between Americans” as part of the agency’s broader collection of communications as they “flow across Internet hubs” under Section 702 of FISA. Pursuant to these practices, the NSA may have intercepted as many as 56,000 domestic electronic communications through various methods, some of which the FISA Court has found unconstitutional. 4. Bulk data is untouched—the NSA can collect it via multiple authorities, despite the fact that it does not increase our security Michael Brenner, Professor, International Affairs, University of Pittsburgh, “The NSA’s Second Coming,” HUFFINGTON POST, 6— 8—15, www.huffingtonpost.com/michael-brenner/the-nsas-second-coming_b_7535058.html, accessed 6-9-15. Americans have acquired a fondness for worlds of make-believe. Torture was done by "a few bad apples." Or, we must await the "verdict 11. United States Intelligence agencies have multiple, redundant methods for acquiring bulk data or specific data. They also have multiple legal justifications, however contrived they might be; those justifications are extremely difficult to challenge in the federal courts who have pretty much neutered themselves on these types of security issues. Where top officials, including the President, feel it necessary, they have few qualms about skirting the law. 12. There is not a single documented instance wherein bulk data collection, or its variants, has resulted in stymying a terrorist plot in the United States. When questioned before Congressional Committees, Clapper and then NSA chief General Keith Alexander claimed that there were 56 cases. That number quickly dropped to six, then "one or two," then one. That supposed case referred to the notorious pseudo-plot of a Corpus Christi used car salesman being approached by an anonymous Iranian agent to assassinate the Saudi Ambassador to Washington -- such information as exists having in fact been derived from conventional sources. Boston and Ft. Hood slipped under the misdirected and ill-conceived dragnet. 27 Paradigm Research 2015-2016 CX—Electronic Communication Aff Status Quo: EO 12333 Programs 1. EO 12333 programs sweep up information on millions of Americans Alvaro Bedoya, Executive Director, Georgetown Center on Privacy and Technology, “Executive Order 12333 and the Golden Number,” JUST SECURITY, 10—9—14, http://justsecurity.org/16157/executive-order-12333-golden-number/, accessed 3-17-15. Since Tye’s op-ed, critics have countered that the use of the 12333 data (e.g. for law enforcement purposes) raises significant constitutional concerns. These arguments about the proper scope of minimization are important and valid, but they do not address the core of Tye’s complaint. As he told Ars Technica: “My complaint is not that [the NSA is] using [Executive Order 12333] to target Americans. My complaint is that the volume of incidental collection on US persons is unconstitutional.” Too few people are focusing on the simple question that Tye is challenging us to ask: How many Americans’ communications are caught up in 12333 collection in the first place? That number matters – a lot. It matters from a policy perspective: It may not make sense for Congress to allow a more lax set of collection and minimization standards for 12333 collection if those programs collect as much if not more Americans’ data than FISA collection. The number matters from a democratic perspective: Americans, and their elected officials, cannot reach an informed opinion of these programs if they don’t know how broadly they impact Americans. Most critically, that number matters for the Fourth Amendment. Americans’ Fourth Amendment rights don’t stop at the border. Even where the acquisition of foreign intelligence information abroad is found to fall within the foreign intelligence exception to the warrant requirement, that acquisition must still satisfy the Fourth Amendment’s reasonableness requirement. (See Laura Donohue’s forthcoming Harvard Journal of Law and Policy article on section 702 for an in-depth discussion of the application of the reasonableness requirement abroad.) If an “incidental” collection of an Americans’ data is too substantial, that collection may be rendered unreasonable by that fact alone. As Judge Bates wrote in his October 2011 opinion on section 702 collection: [T]he acquisition of non-target information is not necessarily reasonable under the Fourth Amendment simply because its collection is incidental to the purpose of the search or surveillance. […] There surely are circumstances in which incidental intrusions can be so substantial as to render a search or seizure unreasonable. Bates went on to clarify that an incidental collection of Americans’ data can be particularly problematic for Fourth Amendment purposes if the data are entirely unrelated to the targeted facility. “The distinction is significant and impacts the Fourth Amendment balancing,” he wrote. Based on this reasoning, Judge Bates found that the NSA’s October 2011 proposed targeting and minimization procedures were not consistent with the Fourth Amendment. Judge Bates did not reach this ruling because he discovered that the targeting procedures would result in the discovery of millions, or even hundreds of thousands of Americans’ communications. No, the offending acquisition collected “roughly two to ten thousand discrete wholly domestic communications […] as well as tens of thousands of other communications that are to or from a United States person or a person in the United States but that are neither to, from, nor about a targeted selector.” This bears repeating: Judge Bates found the 702 targeting procedures unconstitutional because they collected tens of thousands of U.S. person communications. We need to know approximately how many Americans’ communications are collected under 12333. That’s the golden number. But we don’t know it. Apparently, neither does the NSA. In a December 2013 Washington Post article on the use of 12333 to collect cellphone location records, the NSA demurred an attempt to estimate how many Americans were swept up in that program: “It’s awkward for us to try to provide any specific numbers,” one intelligence official said in a telephone interview. An NSA spokeswoman who took part in the call cut in to say the agency has no way to calculate such a figure. Yet in that same story, a “senior collection manager, speaking on the condition of anonymity but with permission from the NSA,” appears to have told the Post that “data are often collected from the tens of millions of Americans who travel abroad with their cellphones every year.” In a separate Post story in October 2013 on the use of 12333 to collect address books globally, two U.S. senior intelligence officials told Bart Gellman and Ashkan Soltani that that program sweeps in the contacts of many Americans. “They declined to offer an estimate but did not dispute that the number is likely to be in the millions or tens of millions,” wrote Gellman and Soltani. Behind closed doors, the intelligence community seems to acknowledge a scale of 12333 collection on Americans that far outstrips the collection that Judge Bates found unconstitutional under section 702. 2. EO 12333 is the foundation of the NSA’s legal authority Committee on Responding to Section 5(d) of Presidential Policy Directive 28 (PDD-28): The Feasibility of Software to Provide Alternatives to Bulk Signals Intelligence Collection; Computer Science and Telecommunications Board; Division on Engineering and Physical Sciences; National Research Council (NRC), BULK COLLECTION OF SIGNALS INTELLIGENCE: TECHNICAL OPTIONS, 2015, p. 22. The legal authorities under which NSA operates are described in a public document entitled NSA Missions, Authorities, Oversight and Partnerships. As noted above, these authorities include Executive Order 12333 and the Foreign Intelligence Surveillance Act of 1978, as amended. Executive Order 12333 is the foundational authority on which NSA relies to collect, retain, analyze, and disseminate foreign SIGINT information. 28 Paradigm Research 2015-2016 CX—Electronic Communication Aff Status Quo: EO 12333 Programs [cont’d] 3. EO 12333 programs collect enormous quantities of information about Americans Alvaro Bedoya, Executive Director, Georgetown Center on Privacy and Technology, “Executive Order 12333 and the Golden Number,” JUST SECURITY, 10—9—14, http://justsecurity.org/16157/executive-order-12333-golden-number/, accessed 3-17-15. Executive Order 12333, by contrast, allows for pure bulk collection of overseas electronic communications. There is no requirement that electronic surveillance under 12333 be targeted at a particular individual, organization or facility. A recent directive from the President (PPD-28) explains: References to signals intelligence collected in “bulk” mean the authorized collection of large quantities of signals intelligence data which, due to technical or operational considerations, is acquired without the use of discriminants (e.g., specific identifiers, selection terms, etc.). (Emphasis mine.) Indeed, 12333 lets the government conduct any electronic surveillance, so long as it does so from a location abroad, so long as it does not affirmatively target a U.S. person, and so long as it is done for a “foreign intelligence or counterintelligence purpose.” The resultant difference in scale of collection is significant. In his 2011 opinion, Judge Bates stated that NSA acquired over 250 million Internet communications annually under section 702; the Washington Post revealed that a single program under 12333 collected nearly 5 billion cellphone location records every day. This may be a bit of an apples-to-oranges comparison, but it’s an instructive one nonetheless. The untargeted nature and massive scope of 12333 collection strongly suggest that it may be used to collect far more U.S. person communications than are collected under section 702. Moreover, because 12333 allows for bulk collection, it would seem to stand a high chance of capturing Americans’ communications that are, in fact, entirely unrelated to foreign intelligence – precisely the category of protected communications that Judge Bates found so problematic. Curiously, the new report on 12333 from the NSA’s Civil Liberties and Privacy Office explicitly excludes bulk collection from its analysis. 4. EO 12333 enables very invasive surveillance, and Obama’s reforms don’t address that Margo Schlanger Professor, Law, University of Michigan, “Guest Post: US Intelligence Reforms Still Allow Plenty of Suspicionless Spying on Americans,” JUST SECURITY, 1—13—15, http://justsecurity.org/20033/guest-post-intelligence-reforms-plentysuspicionless-surveillance-americans/, accessed 3-17-15. Last week, the Obama Administration released a report and documents cataloging progress toward signals intelligence (SIGINT) reform goals set a year ago by the President in a document known as PPD-28. PPD-28 promises foreigners some of the same privacy protections given to US citizens and residents. But it turns out that those protections, even for citizens, are fairly meager, in ways that have not yet fully entered the public conversation about surveillance. US citizens and residents have been — and remain — exposed to suspicionless electronic surveillance. Implementation of PPD-28 will do little to change that. To my mind, the surveillance I’m about to describe, which proceeds under Executive Order 12333, rather than FISA, is far more worrisome than the programs under Section 215 of the Patriot Act and Section 702 of the FISA Amendments Act that have received so much recent attention. (For example, here and here for Section 215, here and here for Section 702, and here and here for more general info.) This is content surveillance that applies to both wholly and partially domestic communications of US citizens and residents. The access and analysis rules are very, very loose. There is no judicial supervision of any kind, and Congress does almost no 12333 oversight. (See here for more on how FISA and 12333 differ). 5. EO 12333 allows the NSA to collect virtually any information about us it wants Margo Schlanger Professor, Law, University of Michigan, “Guest Post: US Intelligence Reforms Still Allow Plenty of Suspicionless Spying on Americans,” JUST SECURITY, 1—13—15, http://justsecurity.org/20033/guest-post-intelligence-reforms-plentysuspicionless-surveillance-americans/, accessed 3-17-15. The point is, so far as U.S. surveillance law is concerned, the NSA can, if it chooses, “collect [nearly] everything” — including your domestic phone calls and emails — so long as it does not select which communications to collect using the identity of a “particular, known” communicant. To be precise, it can collect communications where at least one party is abroad if it can find a non-wired way in. And it can collect even entirely domestic communications if it can find a wire to tap abroad — like the Transatlantic cable — that is carrying those conversations. Some have pointed out that methods exist to push domestic Internet traffic abroad to take advantage of these FISA omissions. Such constraints as exist on this kind of collection — and concomitant retention, analysis, use, and dissemination — are based not on FISA, but on non-statutory sources implementing Executive Order 12333 and, since last year, PPD-28. The 12333 implementing procedures — Department of Defense Directive 5240.1-R and US Signals Intelligence Directive 18 (USSID 18) — make it clear that the NSA does indeed purposefully collect the content of US communications without FISA regulation. 29 Paradigm Research 2015-2016 CX—Electronic Communication Aff Status Quo: EO 12333 Programs [cont’d] 6. EO 12333 authorizes massive surveillance—information about Americans will inevitably get sucked up by the programs Margo Schlanger Professor, Law, University of Michigan, “Guest Post: US Intelligence Reforms Still Allow Plenty of Suspicionless Spying on Americans,” JUST SECURITY, 1—13—15, http://justsecurity.org/20033/guest-post-intelligence-reforms-plentysuspicionless-surveillance-americans/, accessed 3-17-15. Let’s start with what we know, and then dive into how we know it. What do we know? Non-selective “vacuum cleaner” SIGINT collection — mass collection of communications unlimited by particular communicants or subjects — is outside FISA’s ambit, so long as the collection is either done abroad (for wire communications like those carried on landlines or cables) or involves at least one foreign communicant (for wireless communications). This kind of collection can and does include wholly and partially domestic communications of US citizens and residents. Once collected, analysis of these communications is also outside FISA’s ambit. Instead, the use of SIGINT that was collected vacuum-cleaner-style is limited by PPD-28 to six topics: detecting and countering espionage, terrorism, weapons of mass destruction, cybersecurity threats, threats to the armed services, and transnational crime. This kind of entirely unlimited SIGINT collection is not favored, however: According to its new policies implementing PPD-28, when “practicable,” the NSA searches for communications containing specific terms that narrow its collection to topics like “nuclear proliferation, oil sales, [and] economics.” Economics! Again, so long as the collection is either done abroad (for wire communications) or involves at least one foreign communicant (for wireless communications), FISA does not regulate term searching based on subject matter, rather than the identity of a communicant. And because this approach uses a “discriminant,” it is not deemed “bulk” collection for purposes of PPD-28. It may thereafter be searched by the NSA for any and all foreign intelligence purposes, not just the six topics identified above. When the NSA uses subject matter searching — whether to acquire data or to search raw SIGINT acquired in bulk or otherwise — there is a mild tailoring requirement. Specifically, policy requires use of only selection terms that are reasonably likely to flag communications that include foreign intelligence topics (like oil sales). Policy also requires the NSA to try to develop selection techniques that “defeat, to the greatest extent practicable under the circumstances” interception of non-foreign intelligence communications. While we don’t know what “practicable” means in this context, term searching is very familiar; just think of using Google or Westlaw. It seems inevitable that this approach exposes an extraordinary amount of innocent Americans’ communications to the eyes of intelligence analysts. So, when the President says that foreigners will get the same protections against surveillance as US citizens and residents, keep in mind that those protections leave a lot out. 7. The NSA engages in massive global electronic communications surveillance under Executive Order 12333 Danielle Kehl et al., policy analyst, “Surveillance Costs: The NSA’s Impact on the Economy, Internet Freedom & Cybersecurity,” POLICY PAPER, Open Technology Institute, New America, 7—14, p. 4. Beyond NSA surveillance inside the United States under Section 215 and Section 702, the NSA engages in massive surveillance of Internet and telephone communications outside of the country as well. Unconstrained by statute and subject only to Executive Branch oversight under the Reagan-era Executive Order 12333,9 this extraterritorial surveillance was revealed in October 2013 to include the monitoring of key private data links that connect Google and Yahoo data centers around the world—monitoring that in just 30 days processed 181,280,466 new records that traversed those links. Similarly, the NSA is using Executive Order 12333 to authorize the collection of millions of email address books globally, and the recording of vast numbers of international phone calls—sometimes all of the phone traffic in an entire country. Executive Order 12333 is also presumably the authority under which the NSA is assisting British intelligence agencies in acquiring millions of webcam photos sent by users of Yahoo, and under which the NSA is collecting over five billion cell phone location data points per day, enabling it to track individuals’ movements and relationships with others. 8. EO 12333 is currently not subjected to substantial congressional oversight Laura K. Donohue, Professor, Law, Georgetown University, “Section 702 and the Collection of International Telephone an Internet Content,” HARVARD JOURNAL OF LAW & PUBLIC POLICY v. 38, Winter 2015, p. 151. Some of the regulations implementing Executive Order 12,333 have been made publicly available. But many of the guidelines, and the programs conducted under the order, remain veiled from public scrutiny. Even Congress has limited view. Although the procedures approved by the Attorney General under the order must be provided to the Congressional intelligence committees, SSCI Chairman, Senator Dianne Feinstein, has acknowledged that the committee does not conduct extensive oversight of intelligence gathering conducted under the order's auspices. 30 Paradigm Research 2015-2016 CX—Electronic Communication Aff Status Quo: FISA Fails Now 1. Legal developments are eroded the protections against domestic spying contained in the original FISA Elizabeth Goitein and Faiza Patel, Co-Directors, Liberty and National Security Program, Brennan Center for Justice, WHAT WENT WRONG WITH THE FISA COURT, Brennan Center for Justice, New York University School of Law, 2015, p. 19. Although the Supreme Court in Keith attempted to distinguish between surveillance of domestic organizations and surveillance of foreign powers, the demarcation was never clean and has become ever more strained. Advances in technology mean that the exercise of authorities aimed at foreigners abroad inevitably picks up swaths of information about Americans who should enjoy constitutional protections. But rather than develop additional safeguards for this information, the law has developed in the opposite direction: the government’s authority to collect communications pursuant to its foreign intelligence-gathering authorities has expanded significantly. At the same time, the safeguard of judicial review — already limited when FISA was first enacted in 1978 — has eroded to nearnothingness. Indeed, in some cases, the role played by the FISA Court is so different from the normal function of a court that it likely violates the Constitution’s separation of powers among the legislative, executive, and judicial branches. 2. FISA-authorized searches are highly invasive—multiple reasons Robert C. Power, Associate Dean, Widener University School of Law, “’Intelligence’ Searches and Purpose: A Significant Mismatch Between Constitutional Criminal Procedure and the Law of Intelligence-Gathering,” PACE LAW REVIEW v. 30, Winter 2010, p. 678680. No one can doubt that the electronic surveillance and physical searches authorized by FISA are extremely intrusive on personal privacy. Electronic surveillance has been recognized as among the most invasive of government investigative techniques since Berger v. New York, where the Court stated: "Few threats to liberty exist which are greater than that posed by the use of eavesdropping devices." The Court was equally clear in Keith: There is, understandably, a deep-seated uneasiness and apprehension that this [electronic surveillance] capability will be used to intrude upon cherished privacy of law-abiding citizens. We look to the Bill of Rights to safeguard this privacy. Though physical entry of the home is the chief evil against which the wording of the Fourth Amendment is directed, its broader spirit now shields private speech from unreasonable surveillance. Interceptions of telephone conversations or face-to-face meetings, and physical invasions of a person's home, even with a warrant, are frightening and degrading and a strong reason for the prominence of the Fourth Amendment in constitutional text and history. Two additional aspects of FISA searches illustrate the fact that their impact is unmatched among generally lawful intelligence-gathering activities. First, the lack of a criminal probable cause requirement opens the door to government action based on general notions of subversion, disloyalty, or vocal policy disagreement. It is for this reason that FISA explicitly provides that "no United States person may be considered a foreign power or an agent of a foreign power solely upon the basis of activities protected by the first amendment to the Constitution of the United States." While this should help protect many within the class of U.S. persons, the need to include it proves the potential threat to liber-ties. Here again the Keith Court was direct: Official surveillance, whether its purpose be criminal investigation or ongoing intelligence gathering, risks infringement of constitutionally protected privacy of speech. Security surveillances are especially sensitive because of the inherent vagueness of the domestic security concept, the necessarily broad and continuing nature of intelligence gathering, and the temptation to utilize such surveillances to oversee political dissent. Second, FISA searches are exceptionally lengthy. Electronic surveillance can be authorized for a year, and extensions are possible; the same authorization periods apply even to physical searches. In contrast, electronic surveillance orders in criminal investigations can only be valid for up to thirty days. Under typical search law, a physical search occurs once, within fourteen days of the issuance of the search warrant. 31 Paradigm Research 2015-2016 CX—Electronic Communication Aff Status Quo: Mass Surveillance Now 1. The NSA is engaged in a massive spying program—multiple indicators prove Nadia Kayyali and Mark Rumold, staff, “What We Learned About NSA Spying in 2014—And What We're Fighting to Expose in 2015: 2014 in Review,” Electronic Frontier Foundation, 12—28—14, www.eff.org/deeplinks/2014/12/what-we-learned-about-nsa-spying2014-and-what-were-fighting-expose-2015, accessed 2-17-15. Despite the slowdown, in 2014, we learned still more about the NSA’s surveillance programs than we knew before. We learned that: Through the NSA’s Mystic program, the agency records every single cell phone conversation in the Bahamas and Afghanistan, storing those conversations for up to 30 days. The NSA specifically targets sys admins—the people who are often charged with keeping networks safe and secure. The NSA and its partners exploits mobile apps, such as the popular Angry Birds game, to access users’ private information such as location, home address, gender, and more. The NSA sought to develop capabilities to infect millions of computers with malware implants as part of its TURBINE program. The NSA’s Dishfire operation collects 200 million text messages daily from users around the globe. The NSA “intercepts ‘millions of images per day’ — including about 55,000 ‘facial recognition quality images’” and processes them with powerful facial recognition software. The NSA spies on civic leaders and model citizens—The Intercept put a face to NSA spying, publishing a profile of five American Muslim leaders who have been targeted for surveillance. They including an attorney, two professors, a former member of the Bush administration, and the founder of the Council on American-Islamic Relations. Despite all this additional information, too much still remains secret. 2. We now have no expectation of privacy in our electronic communications Lauren Regan, Executive director, Civil Liberties Defense Center, “Electronic Communications Surveillance,” MONTHLY REIVEW v. 66 n. 3, July-August 2014, http://monthlyreview.org/2014/07/01/electronic-communications-surveillance/, accessed 3-11-15. The government is collecting information on millions of citizens. Phone, Internet, and email habits, credit card and bank records— virtually all information that is communicated electronically is subject to the watchful eye of the state. The government is even building a nifty, 1.5 million square foot facility in Utah to house all of this data. With the recent exposure of the NSA’s PRISM program by whistleblower Edward Snowden, many people—especially activists—are wondering: How much privacy do we actually have? Well, as far as electronic privacy, the short answer is: None. None at all. There are a few ways to protect yourself, but ultimately, nothing in electronic communications is absolutely protected. In the United States, surveillance of electronic communications is governed primarily by the Electronic Communications Privacy Act of 1986 (ECPA), which is an extension of the 1968 Federal Wiretap act (also called “Title III”) and the Foreign Intelligence Surveillance Act (FISA). Other legislation, such as the USA PATRIOT Act and the Communications Assistance for Law Enforcement Act (CALEA), supplement both the ECPA and FISA. 3. The capacity for state surveillance and wrong-doing has surged American Civil Liberties Union (ACLU), INFORMATIONAL PRIVACY IN THE DIGITAL AGE, 2—15, p. 2. At the same time, State capacities to intercept and process large numbers of electronic data have grown exponentially, opening the door to unprecedented levels of intrusion into our private lives. Official documents, including some that were leaked to the press by NSA whistleblower Edward Snowden and others that were released in response to litigation, reveal that numerous governments have capitalized on this confluence of events to collect and analyze vast quantities of data on countless people, most of whom are not suspected of wrongdoing. 4. The NSA is engaged in bulk data collection American Civil Liberties Union (ACLU), “How the NSA’s Surveillance Procedures Threaten Americans’ Privacy,” 2013, www.aclu.org/how-nsas-surveillance-procedures-threaten-americans-privacy, accessed 2-19-15. 4. The Procedures permit the NSA to collect international communications, including Americans' international communications, in bulk. On its face, the Act permits the NSA to conduct dragnet surveillance, not just surveillance of specific individuals. Officials who advocated for the Act made clear that this was one of its principal purposes, and unsurprisingly, the Procedures give effect to that design. While they require the government to identify a "target" outside the country, once the target has been identified the Procedures permit the NSA to sweep up the communications of any foreigner who may be communicating "about" the target. The Procedures contemplate that the NSA will do this by "employ[ing] an Internet Protocol filter to ensure that the person from whom it seeks to obtain foreign intelligence information is located overseas," by "target[ing] Internet links that terminate in a foreign country," or by identifying "the country code of the telephone number." However the NSA does it, the result is the same: millions of communications may be swept up, Americans' international communications among them. 32 Paradigm Research 2015-2016 CX—Electronic Communication Aff Status Quo: Mass Surveillance Now [cont’d] 5. The NSA’s revealed surveillance programs are vast Bruce Schneier, cryptographer, “Bruce Schneier: NSA Spying Is Making Us Less Safe,” interviewed by David Talbot, MIT TECHNOLOGY REVIEW, 9—23—13, www.technologyreview.com/news/519336/bruce-schneier-nsa-spying-is-making-us-less-safe/, accessed 2-18-15. Taken together, what do all of the Snowden documents leaked thus far reveal that we didn’t know already? Those of us in the security community who watch the NSA had made assumptions along the lines of what Snowden revealed. But there was scant evidence and no proof. What these leaks reveal is how robust NSA surveillance is, how pervasive it is, and to what degree the NSA has commandeered the entire Internet and turned it into a surveillance platform. We are seeing the NSA collecting data from all of the cloud providers we use: Google and Facebook and Apple and Yahoo, etc. We see the NSA in partnerships with all the major telcos in the U.S., and many others around the world, to collect data on the backbone. We see the NSA deliberately subverting cryptography, through secret agreements with vendors, to make security systems less effective. The scope and scale are enormous. 6. The surveillance budget is huge—at least $75B Jay Stanley, Senior Policy Analyst, Speech, Privacy & Technology Project, “How to Think About the National Security State,” American Civil Liberties Union, Free Future, 9—5—13, www.aclu.org/blog/how-think-about-national-security-state, accessed 6-2-15. The United States has grown a gigantic national security state. According to one analyst, our overall annual security budget is now more than $1.2 trillion. And we now know that includes at least $75 billion for “intelligence.” In the wake of Edward Snowden’s revelations that the NSA has been operating well outside any reasonable reading of the statutes on which it relies, and outside any national consensus over the proper limits to domestic spying, what are we to make of this behemoth? How we think about our national security state is a very important question, not least because it suggests what direction we ought to take moving forward. 7. The NSA program is a widespread information dragnet—it is far more than phone call records American Civil Liberties Union (ACLU), INFORMATIONAL PRIVACY IN THE DIGITAL AGE, 2—15, p. 25. Recent developments invite specific Committee guidance on the practice of mass surveillance. In June of 2013, media outlets began reporting on enormous surveillance programs run by the United States and various allies, courtesy of leaked documents taken from the United States’ National Security Agency (NSA) by whistleblower and former NSA contractor Edward Snowden. Snowden’s documents revealed a wide range of programs—aimed both at people inside and outside the U.S.—that threaten the right to informational privacy in an unprecedented way. The data collected by the NSA as part of various programs include phone call records; cell phone location information; internet activity; the content of phone conversations; the content of chats and emails; photographs of millions of people’s faces; and more. 33 Paradigm Research 2015-2016 CX—Electronic Communication Aff Status Quo: Mass Surveillance Understated 1. Our evidence understates the problem—there is still a lot about NSA spying that we do not know Nadia Kayyali and Mark Rumold, staff, “What We Learned About NSA Spying in 2014—And What We're Fighting to Expose in 2015: 2014 in Review,” Electronic Frontier Foundation, 12—28—14, www.eff.org/deeplinks/2014/12/what-we-learned-about-nsa-spying2014-and-what-were-fighting-expose-2015, accessed 2-17-15. In fact, some of the most significant information about the NSA’s surveillance programs still remain secret. Despite one of the most significant leaks in American history and despite a promise to declassify as much information as possible about the programs, nearly two years later the government still refuses to provide the public with the information it needs. For example, government officials still have not answered a simple, yet vitally important, question: what type of information does the NSA collect about millions, or hundreds of millions, of Americans (or the citizens of any other country, for that matter)? And the government still refuses to release some of the most significant decisions of the Foreign Intelligence Surveillance Court—the secret court tasked with monitoring the government’s surveillance programs. 2. Mass surveillance is particularly dangerous—mission creep Glenn Greenwald, journalist, “UN Report Finds Mass Surveillance Violates International Treaties and Privacy Rights,” THE INTERCEPT, 10—15—14, https://firstlook.org/theintercept/2014/10/15/un-investigator-report-condemns-mass-surveillance/, accessed 3-8-15. While worthless in counter-terrorism policies, the UN report warned that allowing mass surveillance to persist with no transparency creates “an ever present danger of ‘purpose creep,’ by which measures justified on counter-terrorism grounds are made available for use by public authorities for much less weighty public interest purposes.” Citing the UK as one example, the report warned that, already, “a wide range of public bodies have access to communications data, for a wide variety of purposes, often without judicial authorization or meaningful independent oversight.” 3. Post-9/11 programs need to be scaled back—we overreached Richard A. Clarke et al., President’s Review Group on Intelligence and Communications Technologies, LIBERTY AND SECURITY IN A CHANGING WORLD, Report and Recommendations, 12—12—13, p. 77. It is now time to step back and take stock. With the benefit of experience, and as detailed below, we conclude that some of the authorities that were expanded or created in the aftermath of September 11 unduly sacrifice fundamental interests in individual liberty, personal privacy, and democratic governance. We believe that our recommended modifications of those authorities strike a better balance between the competing interests in providing for the common defense and securing “the Blessings of Liberty to ourselves and our Posterity.” We make these recommendations with a profound sense of caution, humility, and respect, and with full awareness that they will require careful deliberation and close attention to consequences. There is no doubt that the degree of safety and security our nation has enjoyed in the years since September 11 has been made possible in no small part by the energetic, determined, and effective actions of the Intelligence Community. For that, all Americans should be both proud and grateful. But even that degree of success does not mean that we cannot strike a better balance for the future. 34 Paradigm Research 2015-2016 CX—Electronic Communication Aff Status Quo: Obama Reforms Fail 1. Obama’s reforms simply do not adequately address NSA domestic spying Mark Rumold, staff, “One Year Later, Obama Failing on Promise to Rein in NSA,” Electronic Frontier Foundation, 2—3—15, www.eff.org/deeplinks/2015/02/one-year-later-obama-failing-promise-rein-nsa, accessed 2-17-15. A year ago, President Obama made tepid promises to reform the NSA (check out our analysis of those commitments). Today, he followed up with more specifics. What do you need to know? His reform plan: Fails to fix the problem of unconstitutional National Security Letters The President’s reform proposes a three-year limit on the gag order that accompanies each NSL, but even a three-year limit fails to cure the constitutional problem. Only a prompt and fully considered decision by a judge that a provider should remain gagged is sufficient. Doesn’t stop the bulk collection of data on innocent Americans’ digital communications If the Intelligence Community was serious about protecting privacy, it could end the bulk collection of Americans’ communications data—under Section 215 of the Patriot Act or under any provision of law—tomorrow. The President’s proposals do not curb the mass collection of phone records under Section 215, and the proposals affirmatively allow bulk collection to occur for six, broadly defined categories of intelligence collection. Continues "backdoor" surveillance on Americans without a warrant When the intelligence community performs surveillance under Section 702 of the FISA Amendments Act, it sweeps in the communications of millions of Americans without a warrant. The President’s Review Group recommended the government obtain a warrant before it searched for communications of US persons contained within its vast database. The President rejected that proposal. Fails to provide non-US persons with the same privacy protections afforded US persons On a daily basis, the United States intelligence community collects vast amounts of information about millions of people around the world. While the President’s proposals take a step forward in unifying the retention requirements applicable to collected non-US person information, they fail to afford the same privacy protections afforded US persons, and they fail to rein in bulk collection in the first place. President Obama still has time in office to make this right, and he’s got ample power to rein in NSA overreach without Congress lifting a finger. But if he continues to offer these weak reforms, then he should be prepared for a major Congressional battle when sections of the Patriot Act come up for reauthorization in June. 2. Obama is continuing Bush-era secret surveillance programs American Civil Liberties Union (ACLU), A CALL TO COURAGE: RECLAIMING OUR LIBERTIES TEN YEARS AFTER 9/11, 9— 11, p. 28. The Obama administration, like the Bush administration before it, has used excessive secrecy to hide possibly unconstitutional surveillance. Two members of Congress have been ringing alarm bells about the government’s use of Patriot Act authorities, urging additional congressional oversight—to no avail. Hobbled by executive claims of secrecy, Senators Ron Wyden and Mark Udall have nevertheless warned their colleagues that the government is operating under a “reinterpretation” of the Patriot Act that is so broad that the public will be stunned and angered by its scope, and that the executive branch is engaging in dragnet surveillance in which “innocent Americans are getting swept up.” History threatens to repeat itself. But the American public deserves more than another secret showdown; and we should not have to rely on government whistleblowers to come forward at the risk of criminal prosecution, to act as a check and balance on an unaccountable executive. 35 Paradigm Research 2015-2016 CX—Electronic Communication Aff Status Quo: Obama Reforms Fail [cont’d] 3. The reforms in Obama’s PDD-28 will do little to check dragnet NSA surveillance Margo Schlanger Professor, Law, University of Michigan, “Guest Post: US Intelligence Reforms Still Allow Plenty of Suspicionless Spying on Americans,” JUST SECURITY, 1—13—15, http://justsecurity.org/20033/guest-post-intelligence-reforms-plentysuspicionless-surveillance-americans/, accessed 3-17-15. As might be expected, both vacuum-cleaner and term-searching techniques pull in massive amounts of raw data. The same training slides (on slide 69) explain: “[R]aw SIGINT databases contain completely innocent U.S. person communications and non-foreign intelligence information as well as FI [foreign intelligence].” As a result, NSA personnel are not free to trawl those databases willy nilly. Rather, “to protect the privacy rights of US citizens, the Justice Department has determined search of these databases are a collection/targeting activity.” (Slide 70.) This means searches of already-collected raw data are required to follow the USSID-18 tailoring rules. It bears reemphasizing that those tailoring rules are pretty loose. They require merely that searches of already-collected raw SIGINT be reasonably likely to retrieve foreign intelligence, and that such searches be designed to the extent practicable not to retrieve other communications. PPD-28 adds the smallest bit of extra protection. It limits what it describes as “bulk” collection to six specified purposes (detecting and countering espionage, terrorism, weapons of mass destruction, cybersecurity threats, threats to the armed services, and transnational crime). These are considerably narrower than “foreign intelligence. But the narrower purpose rules of PPD-28 don’t cover collection that uses term searching, no matter how wide-open these terms are, or how much data is acquired under them. Quite the contrary; such collection is excluded by definition. PPD-28 states: “References to signals intelligence collected in ‘bulk’ mean the authorized collection of large quantities of signals intelligence data which, due to technical or operational considerations, is acquired without the use of discriminants (e.g., specific identifiers, selection terms, etc.).” (Emphasis added). Moreover, the Directive specifically states that its limits on “bulk” collection “do not apply to signals intelligence data that is temporarily acquired to facilitate targeted collection.” This carve-out is revealing: there would be no reason for it unless the NSA does, in fact, “temporarily acquire” data and then subject it to various searches that facilitate “targeted” collection for purposes not authorized for bulk collection. (Note that PPD-28 does not define “targeted;” I infer that “targeted” here covers use of topical selection terms as well as communicant targeting, but I may be incorrect in this inference.) And finally, the NSA procedures released last week, which now govern SIGINT procedures for non-US persons, constrain the agency the tiniest bit more, stating a preference for collecting data on specific subjects instead of collecting everything: Whenever practicable, collection will occur through the use of one or more SELECTION TERMS in order to focus the collection on specific foreign intelligence targets (e.g., a specific, known international terrorist or terrorist group) or specific foreign intelligence topics (e.g., the proliferation of weapons of mass destruction by a foreign power or its agents). Note, though, that notwithstanding the parenthetical examples, subject matter searching can be for any foreign intelligence topic (oil sales, economics, etc.), not just counterterrorism or counterproliferation. So, all of this together adds up to the list I started off with, and to extraordinarily broad access by the NSA to your domestic communications. Lots of unanswered questions remain: what about FBI and CIA? How much unfiltered content communication data does the IC actually collect? How much does it retain? And so on. We’d need much more transparency to answer those questions and dozens more that deserve answers. 36 Paradigm Research 2015-2016 CX—Electronic Communication Aff Status Quo: Oversight Failures 1. Congressional oversight fails now—misleading statements, and the committees do not have complete information G. Alex Sinha, fellow, Human Rights Watch, WITH LIBERTY TO MONITOR ALL: HOW LARGE-SCALE US SURVEILLANCE IS HARMING JOURNALISM, LAW AND AMERICAN DEMOCRACY, Human Rights Watch & the ACLU, 7—14, p. 15-16. Both the US House of Representatives and the Senate have standing Committees on Intelligence and on the Judiciary, which are designed, in theory, to provide oversight over the intelligence community’s activities. However, much of what these committees do is itself secret. Moreover, effective oversight requires that the intelligence community candidly share information with these committees. As Senator Ron Wyden, from the Senate Intelligence Committee, has noted, senior officials have repeatedly made misleading statements about their activities in congressional hearings. Senate Intelligence Committee Chairman Dianne Feinstein has also noted that the intelligence community has failed fully to inform the committee about its surveillance activities. 2. Most of the NSA’s programs have no oversight—likely violate the Fourth Amendment Christopher Slobogin, Professor, Law, Vanderbilt University, “Standing and covert Surveillance,” WORKING PAPER n. 15-5, Vanderbilt University Law School, 2—18—15, p. 5. Most of this surveillance takes place without any type of judicial authorization, or is authorized only by the Foreign Intelligence Surveillance Court (FISC), which operates in secret. Although regulation of these practices has recently ramped up, even today the decision about what to collect and what to target and query is largely in the hands of executive agency officials. Thus, good arguments can be made that much, if not all, of this surveillance is unconstitutional under the Fourth Amendment, the First Amendment, separation of powers doctrine, or some combination thereof. But these arguments may never be fully fleshed out in the courts because of the Supreme Court’s standing doctrine. 37 Paradigm Research 2015-2016 CX—Electronic Communication Aff Status Quo: Section 215 Reforms Inadequate 1. Section 215 is only the tip of the iceberg Julian Assange, WikiLeaks, “Julian Assange: Despite Congressional Standoff, NSA Has Secret Authority to Continue Spying Unabated,” interviewed by Amy Goodman, DEMOCRACY NOW, 5—27—15, www.democracynow.org/2015/5/27/julian_assange_despite_congressional_standoff_nsa, accessed 5-28-15. The Edward Snowden revelations documented various forms of National Security Agency spying and secret interpretations of U.S. law that have been constructed by the Justice Department and the FISA courts. Now, some of those hinged on Section 215 of the USA PATRIOT Act, a secret interpretation, that has been found just this month to be unlawful in the U.S. Federal Court of Appeals. Now, that has dovetailed with the electoral process in the United States, and so there’s now increasing push to be—increasing push for popularism. Rand Paul and Ron Wyden have tapped into that. The USA PATRIOT Act has been on rolling sunset clauses since 2001. The sunset clause is June the 1st, and so Ron Wyden and Rand Paul engaged in a filibuster, pushing the passage of the renewal of the PATRIOT Act off to a week where Congress had scheduled to be away all the way leading up to June 1st. So unless there’s an emergency recall of enough of the Senate and Congress, the sunset clause will hit, and that means there will have to be a new PATRIOT Act reintroduced. So it will have to be resuscitated as opposed to having a rollover, and that’s a more involved process. However, our sources say that the NSA is not too concerned, that it has secret interpretations of other authorities that give it much the same power that it would have had under the secret interpretation of 215 and other areas of the USA PATRIOT Act. What Edward Snowden revealed about the secret interpretation of Section 215 of the PATRIOT Act was that the National Security Agency was using it to bulk-collect the calling records, every day, of essentially every American in the United States—the majority of the big telecommunications companies. However, that’s only a very small part of the National Security Agency’s mass interception system. On one hand, it can suck information out of the—of Google, Facebook and so on, under the PRISM system; and on the other hand, even more data is collected as a result of information flowing across the border of the United States or across borders of the United Kingdom, which has a sharing agreement with the National Security Agency. 2. The USA Freedom Act is inadequate—only addresses Section 215 in any meaningful way Mieke Eoyang, Direction, National Security Program, Third Way, “A Modest Proposal: FAA Exclusivity for Collection Involving U.S. Technology Companies,” LAWFARE, 11—24—14, www.lawfareblog.com/modest-proposal-faa-exclusivity-collection-involving-ustechnology-companies, accessed 3-16-15. Even if the USA Freedom Act had moved forward on the Senate floor during the lame duck session, it would not have been sufficient to address all the concerns raised in the current electronic surveillance debates. The USA Freedom Act focuses on limiting collection of data on Americans here in the US under Section 215 of the PATRIOT ACT, and as such, it’s a crucial reform. Under existing statutes on electronic surveillance, Section 215 and the FISA Amendments Act (FAA), the government can compel cooperation from the companies that hold the data under certain statutory conditions. Both of these statutes authorize collection programs that the companies are aware of and must participate in. In these programs, the government knocks at the front door to get the data it needs. But reforming these programs doesn’t address another range of problems---those that relate to allegations of overseas collection from US companies without their cooperation. 3. The USA Freedom Act does little to end bulk surveillance—only the phone metadata program Spencer Ackerman, journalist, “Fears NSA Will Seek to Undermine Surveillance Reform,” THE GUARDIAN, 6—1—15, www.theguardian.com/us-news/2015/jun/01/nsa-surveillance-patriot-act-congress-secret-law, accessed 6-3-15. The USA Freedom Act, a compromise bill, would not have an impact on the vast majority of NSA surveillance. It would not stop any overseas-focused surveillance program, no matter how broad in scope, nor would it end the NSA’s dragnets of Americans’ international communications authorized by a different law. Other bulk domestic surveillance programs, like the one the Drug Enforcement Agency operated, would not be impacted. The rise of what activists have come to call “bulky” surveillance, like the “large collections” of Americans’ electronic communications records the FBI gets to collect under the Patriot Act, continue unabated – or, at least, will, once the USA Freedom Act passes and restores the Patriot Act powers that lapsed at midnight on Sunday. That collection, recently confirmed by a largely overlooked Justice Department inspector general’s report, points to a slipperiness in shuttering surveillance programs – one that creates opportunities for clever lawyers. 38 Paradigm Research 2015-2016 CX—Electronic Communication Aff Status Quo: USA Freedom Act Fails 1. The USA Freedom Act bungled the metadata reforms—the NSA will continue with business-as-usual Scott Shackford, staff, “Is the USA Freedom At the Best We Can Expect Right Now?” REASON, Hit & Run Blog, 5—20—15, http://reason.com/blog/2015/05/20/is-the-usa-freedom-act-the-best-we-can-e, accessed 6-5-15. While the bill has many significant flaws, the USA Freedom Act vote is also historic: it’s the first time since the 1970s that Congress has indicated its intention to restrict the vast powers of intelligence agencies like the NSA, rather than exponentially expand them. It also shows the power that investigative journalism and brave whistleblowing can have on even the most entrenched government interests. Two years ago, debating these modest changes would’ve been unthinkable, and it is absolutely a vindication for Edward Snowden. Unfortunately, the bill is also woefully inadequate and largely symbolic, and Congress would’ve been better off letting Section 215 of the Patriot Act expire permanently. The USA Freedom Act supposedly bans bulk collection of phone records or any other private records, and we certainly hope it actually does. But its provisions are vague and confusing, leading many legal experts to believe they could be re-interpreted in secret—by NSA lawyers with a history of warping the common definitions of ordinary words beyond recognition—and could lead the FISA court to continue to allow the NSA to collect large quantities of Americans’ data in secret. (The administration will shamefully now re-start the phone program that expired on Monday for six months, as allowed under the new law's "transition" period.) 2. The USA Freedom Act will only have small effects on surveillance Neema Singh Guliani, Legislative Counsel, “What’s Next for Surveillance Reform After the USA Freedom Act,” American Civil Liberties Union, Washington Markup, 6—3—15, www.aclu.org/blog/washington-markup/whats-next-surveillance-reform-after-usafreedom-act, accessed 6-5-15. By a 67-32 margin Tuesday, Congress passed the USA Freedom Act — a significant milestone in our efforts to rein in NSA surveillance. The bill marks the first time since passage of the Foreign Intelligence Surveillance Act in 1978 that Congress has taken steps to restrict — rather than expand — the government’s surveillance authority. To be clear, the bill that passed yesterday is not as strong as we wanted. It is markedly weaker than the original version of the USA Freedom Act that the ACLU first supported in 2013, which itself left many serious surveillance abuses untouched. And while the ACLU was neutral on the version of USA Freedom that ultimately passed, we were a vocal critic of its shortcomings and supported a sunset of the provisions in an effort to advance more comprehensive reform. 3. The law does not meaningfully constrain the NSA Michael Brenner, Professor, International Affairs, University of Pittsburgh, “The NSA’s Second Coming,” HUFFINGTON POST, 6— 8—15, www.huffingtonpost.com/michael-brenner/the-nsas-second-coming_b_7535058.html, accessed 6-9-15. Americans have acquired a fondness for worlds of make-believe. Torture was done by "a few bad apples." Or, we must await the "verdict Belief that the United States is in grave and imminent danger from serious terrorist attack is the cornerstone premise holding up the massive edifice of our Intelligence apparatus. To acknowledge that this rendering of reality is groundless is to cut the ground from under the pervasive view that extraordinary measures to protect the United States' security are imperative. For the promoters of draconian surveillance, this is tantamount to a silver bullet that stops in its tracks the momentum -- political, intellectual -- pushing toward building the security state. As William Pitt warned us: "Necessity is the plea for every infringement of human liberty. It is the argument of tyrants; it is the creed of slaves." The United States Freedom Act does not trouble Intelligence agency leaders. They have widely assumed, as admitted in private statements, that the compromise provisions merely create a few procedural inconveniences that could be circumvented or neutralized by exploiting loopholes - no more than speed bumps. None of the Agency's core activities would be significantly affected. So there is no reason for anyone in the intelligence agencies to sweat the small stuff: a shift in the number of days the NSA can retain the sweepings of Metadata collection; or whether the data should be held at their storage lock-up or the one across the street protected by a bicycle lock and owned by a very accommodating neighbor? And who's checking, anyway -- the FBI? the FCC? We have created a monster. A Great White Whale that rapaciously stalks the electronic seas devouring all within reach regardless of species or nutritional value. 39 Paradigm Research 2015-2016 CX—Electronic Communication Aff Status Quo: USA Freedom Act Fails [cont’d] 4. Freedom Act contains far too weak “reasonable and articulable suspicion” standards Elizabeth Atkins, J.D. Candidate, “Spying on Americans: At What Point Does the NSA’s Collection and Searching of Metadata Violate the Fourth Amendment?” WASHINGTON JOURNAL OF LAW, TECHNOLOGY & ARTS v. 10, Summer 2014, p. 84-86. The Government's proposed legislation is ineffective because it fails to raise the needed threshold to probable cause and continues to diminish citizens' privacy concerns. Representative James Sensenbrenner, Jr., the original author of the USA PATRIOT ACT and lead author on the proposed USA FREEDOM Act, acknowledged that "the NSA was doing some things that were far beyond what the intent of the law should have been . . . ." He criticized Senator Feinstein's proposed legislation, specifically noting that her bill "is a joke" and her view is essentially that "if you like your NSA, you can keep it." What Congress and the President fail to mention, however, is that the problem lies not only with mass collection of metadata, but also in the way the Government is able to access and search the metadata. This troubling standard remains unchanged and leaves the door open to a multitude of privacy violations. President Obama's Policy Directive is superficial because it fails to provide any substantial changes that protect privacy rights. In President Obama's speech to the American people, he proudly claimed to end Section 215 metadata collection "as it currently exists." However, bulk collection is not the biggest problem. The problem is not where the metadata is being stored, but how the metadata is accessed. First, President Obama limited the NSA to searching metadata within only two hops of the selection term being used instead of three. Second, the metadata would no longer be collected in bulk by the NSA but would remain with the phone companies. Third, the NSA would obtain the records pursuant to individual orders from FISC. Although these recommendations appear to solve the problem of "dragnet surveillance," they fail to provide any real safety from abuse by the NSA. The problem with President Obama's Presidential Policy Directive is that it is not binding. Presidential Directives can be amended or withdrawn at any time by the current President. Even if Americans trust President Obama to follow through on the policy directives he proposed, the president in 2016 could reverse those changes with the swipe of a pen. Unless codified in a statute by Congress, any future president, at any time and for any reason, could re-instate the third hop and bring metadata collection back under the purview of the NSA. Additionally, none of the bills Congress has offered produce any substantial change to Section 215. None of the thirty-plus bills mention raising the standard from reasonable, articulable suspicion to probable cause. Most of the bills proposed, including the flagship USA FREEDOM Act, herald an ending to bulk metadata collection. However, the USA FREEDOM Act barely amends the current standard. Current law requires the government to submit a statement of facts showing reasonable grounds to believe that the tangible things or records sought are relevant to an authorized investigation. Yet Section 101 of the USA FREEDOM Act would require the Government to show that the tangible things sought are relevant and material to an authorized investigation and that they pertain to (a) a foreign power or an agent of a foreign power, (b) the activities of a suspected agent of a foreign power who is the subject of such an authorized investigation, or (c) an individual in contact with, or known to, a suspected agent of a foreign power who is the subject of such authorized investigation. This proposed change only narrows what can be considered an "authorized investigation." The NSA would still be able to collect and search metadata based on the lowered standard of reasonable and articulable suspicion. 5. Limits of USA Freedom Act—702, 12333, whistleblowers Human Rights Watch, “Strengthen the USA Freedom Act,” 5—19—15, www.hrw.org/news/2015/05/19/strengthen-usa-freedom-act, accessed 6-1-15. What the USA Freedom Act does not do: Does nothing to address mass surveillance under Section 702 of the FISA Amendments Act or Executive Order 12333. The majority of the NSA dragnet surveillance of people outside the US occurs under these two legal authorities. For example, the NSA compels Internet companies to provide access communications and personal data (PRISM) and requires telecom companies to assist with mass fiber optic cable tapping of traffic coming into the US (Upstream) under Section 702. The USA Freedom Act only addresses bulk records collection under the Patriot Act and certain other laws. Congress should next take up reforms to rein in mass surveillance under these legal authorities. Does not provide needed protections for whistleblowers who might reveal similar surveillance abuses in the future. President Obama has welcomed the current debate over privacy and surveillance in the digital age. This debate would not be possible without the work of whistleblowers like Edward Snowden and others who came before him. Yet existing laws and practices give would-be whistleblowers (especially those in the intelligence community) few internal ways to disclose governmental misconduct, no recourse when existing options are inaccessible or unresponsive, and no meaningful right to challenge official retaliation and defend themselves from criminal and civil liability. 40 Paradigm Research 2015-2016 CX—Electronic Communication Aff Status Quo: USA Freedom Act Fails [cont’d] 6. National Security Letters make the new reforms largely meaningless Shane Harris, journalist, “Zombie Patriot Act Will Keep U.S. Spying—Even if the Original Dies,’ DAILY BEAST, 5—31—15, www.thedailybeast.com/articles/2015/05/31/zombie-patriot-act-will-keep-u-s-spying-even-if-the-original-dies.html, accessed 6-1-15. Then there’s another powerful tool that the FBI and intelligence agencies have long had in their arsenal and still will—national security letters. They make it relatively easy for investigators to gather up all kinds of communications records. This authority can be used to collect phone, Internet, and financial records. National security letters were actually around before the Patriot Act became law in 2001, but the legislation lowered the standard that the government must meet to obtain them. They’ll still be comparatively easy to get now that portions of the Patriot Act are off the books. 7. The USA Freedom Act is limited—does not address Section 702, Executive Order 12333, or new surveillance technologies Human Rights Watch, “Strengthen the USA Freedom Act,” 5—19—15, www.hrw.org/news/2015/05/19/strengthen-usa-freedom-act, accessed 6-1-15. Human Rights Watch has supported the USA Freedom Act because it is a modest, if incomplete, first step down the long road to reining in the NSA excesses. Beyond ending bulk records collection, the bill would begin to reform the secret Foreign Intelligence Surveillance Act (FISA) Court, which oversees NSA surveillance, and would introduce new transparency measures to improve oversight. In passing the bill, the House of Representatives also clarified that it intends the bill to be consistent with the Second Circuit’s ruling, so as to not weaken its findings. The bill is no panacea and, as detailed below, would not ensure comprehensive reform. It still leaves open the possibility of large-scale data collection practices in the US under the Patriot Act. It does not constrain surveillance under Section 702 of the FISA Amendments Act nor Executive Order 12333, the primary legal authorities the government has used to justify mass surveillance of people outside US borders. And the bill does not address many modern surveillance capabilities, from mass cable tapping to use of malware, intercepting all mobile calls in a country, and compromising the security of mobile SIM cards and other equipment and services. 8. The USA Freedom Act does little to limit bulk surveillance Spencer Ackerman, journalist, “Fears NSA Will Seek to Undermine Surveillance Reform,” THE GUARDIAN, 6—1—15, www.theguardian.com/us-news/2015/jun/01/nsa-surveillance-patriot-act-congress-secret-law, accessed 6-3-15. The USA Freedom Act, a compromise bill, would not have an impact on the vast majority of NSA surveillance. It would not stop any overseas-focused surveillance program, no matter how broad in scope, nor would it end the NSA’s dragnets of Americans’ international communications authorized by a different law. Other bulk domestic surveillance programs, like the one the Drug Enforcement Agency operated, would not be impacted. The rise of what activists have come to call “bulky” surveillance, like the “large collections” of Americans’ electronic communications records the FBI gets to collect under the Patriot Act, continue unabated – or, at least, will, once the USA Freedom Act passes and restores the Patriot Act powers that lapsed at midnight on Sunday. 9. The USA Freedom Act did very little to meaningfully rein in the surveillance state—only limits the small bulk phone records program Paul Waldman, journalist, “A Reality Check on the Future of Government Spying,” WASHINGTON POST, Plum Line, 6—3—15, www.washingtonpost.com/blogs/plum-line/wp/2015/06/03/a-reality-check-on-the-future-of-government-spying/, accessed 6-7-15. It’s tempting to hail the passage yesterday of the subtly-named USA Freedom Act as a victory for civil liberties in America and a step toward a healthy recalibration of the government’s surveillance policies. But if that’s your feeling today, you might want to think twice. Not only are the changes the Freedom Act makes to existing practices relatively minor, both parties have signed on with the dramatic expansion of surveillance on law-abiding Americans that occurred after September 11. And both will continue to support it. The Freedom Act does take the bulk collection of Americans’ telephone records out of the hands of the National Security Agency and leaves those records with the phone companies; it sets up procedures for the NSA to get access to those records when it wants to. But the truth is that this program wasn’t particularly useful for the NSA to begin with. The government has been unable to point to a single terrorist attack that was thwarted by the use of these records. Not only that, just last month an appeals court ruled that the bulk collection program went way beyond anything envisioned by the section of the USA Patriot Act that was used to justify it, and it was therefore illegal 41 Paradigm Research 2015-2016 CX—Electronic Communication Aff Status Quo: USA Freedom Act Fails [cont’d] 10. The USA Freedom Act does not end backdoor searches of Americans’ Internet records Steven Nelson, journalist, “Senate Passes Freedom Act, Ending Patriot Act Provision Lapse,” U.S. NEWS & WORLD REPORT, 6— 2—15, www.usnews.com/news/articles/2015/06/02/senate-passes-freedom-act-ending-patriot-act-provision-lapse, accessed 6-7-15. Jameel Jaffer, American Civil Liberties Union deputy legal director, said the Freedom Act is "the most important surveillance reform bill since 1978, and its passage is an indication that Americans are no longer willing to give the intelligence agencies a blank check.” The ACLU was publicly neutral on the bill. “Still, no one should mistake this bill for comprehensive reform," Jaffer said in a statement. "The bill leaves many of the government’s most intrusive and overbroad surveillance powers untouched, and it makes only very modest adjustments to disclosure and transparency requirements.” Snowden, speaking via video feed with Amnesty International UK interviewers shortly before the vote, said the Freedom Act was “a first step and an important step” and heralded the phone program’s demise as a significant victory in pushing back on government claims to need enhanced powers. The bill does not include some popular reforms, such as a ban on "backdoor" searches of American Internet records, which passed the House by a veto-proof majority last year. 11. The USA Freedom Act only affects phone records—not other mass surveillance Scott Bomboy, staff, “USA Freedom Act Signed, So What’s Next for NSA Spying?” CONSTITUTIONAL DAILY, National Constitution Center, 6—3—15, http://blog.constitutioncenter.org/2015/06/usa-freedom-act-signed-so-whats-next-for-nsa-spying/, accessed 6-5-15. Surveillance will certainly continue under other parts of the act and under other government programs designed to combat terrorism. But the fight in Congress may just be getting started. The New York Times says that Senator Mike Lee and Senator Pat Leahy are moving on to targeting the government program that allows e-mails older than six months to be read by investigators. Congressional reformers may also seek to limit the Foreign Intelligence Surveillance Act. And there is debate in the House and Senate about other spying provisions. “Some of us don’t think USA Freedom sufficiently ends bulk metadata collection. In fact, [the government] will still contend after the act passes that they can bulk collect all of the websites and emails and all that content,” said Representative Thomas Massie. “Read it closely, it’s only about your phone calls.” 12. USA Freedom Act has been watered down—will do little to end metadata collection Scott Shackford, staff, “Is the USA Freedom At the Best We Can Expect Right Now?” REASON, Hit & Run Blog, 5—20—15, http://reason.com/blog/2015/05/20/is-the-usa-freedom-act-the-best-we-can-e, accessed 6-5-15. But what the USA Freedom Act actually does is fairly modest compared to the amount of surveillance authority the NSA had claimed for itself. It will end the bulk collection of phone metadata collection under Section 215, but that's not the only avenue by which the federal government claims authority to collect huge amounts of private information. Furthermore, right now we're seeing the third attempt to get the act passed, and the strength of the reforms has been watered down along the way. Indeed, some of the reforms called for in the act (storing the telecommunications data with the companies rather than the government and requiring the government to request it) came from former NSA Director Keith Alexander. The support of the Obama Administration has itself given some pause, due to its role in fighting lawsuits against the program and the blatant deception of current Director of Intelligence James Clapper before the Senate about the existence of mass phone record collection. 13. Current reforms are so watered down that they are meaningless Laura Pitter, Senior National Security Counsel, Human Rights Watch, “It’s Been a year Since Snowden, and Nothing’s Really Changed,” FOREIGN POLICY, 6—5—14, http://foreignpolicy.com/2014/06/05/its-been-a-year-since-snowden-and-nothings-reallychanged/, accessed 3-13-15. It’s been a year since we woke to media reports on June 5 that the National Security Agency (NSA) has been sweeping up the phone records of everyone in the United States. The news was a shock — but as it turns out, it was also only the beginning. In the following months, we’ve seen a mountain of other revelations: of breathtaking data hauls that collect billions of Internet communications from around the world, gag orders that bar companies from warning their customers of privacy violations, spying on world leaders, and even systemic efforts by the U.S. government to break and undermine commercial encryption software. What we’ve seen far too little of over the past year is any real change. In the wake of the Edward Snowden leaks, the United States has denied some of the allegations, and disclosed — under pressure — a tiny bit of information about some of its programs. But very little has been done to rein in the surveillance itself. The few proposed reforms we have seen have been so watered down that none come close to adequately restraining the government’s capacity for mass electronic surveillance. 42 Paradigm Research 2015-2016 CX—Electronic Communication Aff Solvency: Ban Mass Surveillance 1. Congress should ban mass surveillance and launch an investigation into current abuses Council on American-Islamic Relations (CAIR), “Oppose Warrantless Government Spying on American Phone Calls and Emails,” 8— 5—13, www.cair.com/government-affairs/12047-oppose-warrantless-government-spying-on-american-phone-calls-and-emails.html, accessed 5-1-15. While some in Congress and the White House say that these spying programs are lawful under the Patriot Act and Foreign Intelligence Surveillance Act, CAIR and the civil rights community believes that the Fourth Amendment of the U.S. Constitution is clear: The right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures, shall not be violated, and no Warrants shall issue, but upon probable cause ... CAIR recommends Congress to amend Section 215 of the USA PATRIOT Act, the state secrets privilege, and the FISA Amendments Act to ensure that the unwarranted surveillance of internet activity and phone records from citizens residing in the US is, in fact, illegal and to ensure that violations would be reviewed in a public court. CAIR recommends for the creation of an investigative committee to reveal the extent and scope of these spying programs, and for a possible inquiry by the congressional ethics committees, depending on the results of the investigation. This should be done with the intent of holding elected officials accountable for their involvement in furthering or enabling this unwarranted surveillance. CAIR also recommends for this investigation to determine what criteria have been used to collect records, and to determine for how long these records are being stored. Without information regarding these criteria that purportedly establish "foreignness," CAIR remains concerned that these programs have been discriminating against citizens on the basis of religion and national origin. Legislative initiatives like these are necessary to protect the fourth amendment rights of all American citizens, including members of the American Muslim community which has been subject to unwarranted and discriminatory acts of surveillance for more than a decade. 2. The government should not be able to collect non-public personal information Richard A. Clarke et al., President’s Review Group on Intelligence and Communications Technologies, LIBERTY AND SECURITY IN A CHANGING WORLD, Report and Recommendations, 12—12—13, p. 108-109. We recommend that, as a general rule, and without senior policy review, the government should not be permitted to collect and store all mass, undigested, non-public personal information about individuals to enable future queries and data-mining for foreign intelligence purposes. Any program involving government collection or storage of such data must be narrowly tailored to serve an important government interest. We will turn shortly to the section 215 bulk telephony meta-data program. But to orient that discussion and to establish governing principles, we begin with a broader question, which involves the production not only of telephone calling records, but also of every other type of record or other tangible thing that could be obtained through a traditional subpoena, including bank records, credit card records, medical records, travel records, Internet search records, e-mail records, educational records, library records, and so on. 3. The PATRIOT Act should be amended to end bulk data collection Leslie Harris, President and CEO, Center for Democracy & Technology, Testimony before the European Parliament LIBE Committee Inquiry on Electronic Mass Surveillance of EU Citizens, 9—24—13, www.cdt.org/files/pdfs/LIBEtestimony24September.pdf, accessed 2-18-15. First, the PATRIOT Act should be amended to make it clear that the law does not permit the NSA to collect telephone, Internet, and other records in bulk. Instead, collection should be limited to records that pertain to terrorists, spies and the like, and to those in direct contact with them. This reform would ensure that the innocent, everyday communications of Americans, including those with family, friends and colleagues in Europe, are not swept up into a vast NSA database to be queried at the NSA’s discretion. Members of Congress have introduced eight bills intended to end bulk collection; none has yet been approved by the relevant committees. 43 Paradigm Research 2015-2016 CX—Electronic Communication Aff Solvency: Ban Mass Surveillance [cont’d] 4. We need legislation that prohibits bulk collection programs Harley Geiger, Senior Counsel and Deputy Director, Project on Freedom, Security, and Technology, Center for Democracy and Technology, Testimony before the Senate Selection Committee on Intelligence, 6—5—14, www.intelligence.senate.gov/140605/geiger.pdf, accessed 2-18-15. The driving force behind the USA FREEDOM Act has been the need to prohibit bulk collection of Americans’ sensitive personal information. Ending “bulk collection” does not just mean ceasing nationwide untargeted surveillance dragnets, but prohibiting largescale government collection and retention of non-public records about persons who are not connected to national security threats. It would merely perpetuate existing problems to allegedly prohibit nationwide “bulk collection” while permitting collection on the scale of a state or city, or of millions of users of an Internet service provider, with a single FISA order. Unfortunately, the USA FREEDOM Act, as passed by the House of Representatives, does not clearly prohibit such activity, nor does it take sufficient steps to protect the privacy of innocent individuals that would be swept up in such broad surveillance. 5. Congress is particularly well-positioned to protect electronic and records privacy David Cole, Professor, Law, Georgetown University, “Can Congress Protect Digital Privacy from NSA Spying?,” JUST SECURITY, 2—4—14, http://justsecurity.org/6746/congress-protect-digital-privacy-nsa-spying/, accessed 3-17-15. I also argue that, as Justice Samuel Alito noted in United States v. Jones, Congress is particularly well situated to provide privacy protection from advancing technology. It has frequently done so in the past, responding to Court decisions declining to protect bank, credit card, and pen register information by enacting statutes that regulate and limit the government’s access to such records as a statutory matter. So, too, Congress has protected video rental records, and imposed special safeguards on subpoenas directed to the press and to innocent third parties, where the Supreme Court had not or would not recognize Fourth Amendment protection. A Congressional response is particularly warranted here, because the administration has interpreted Section 215 in a strained manner, contrary to its plain meaning and the intent of those who enacted it, to give the government free access to the business records of everyone, without any showing of any particular record’s nexus to terrorist activity. 44 Paradigm Research 2015-2016 CX—Electronic Communication Aff Solvency: Congressional Actions 1. Congress needs to act to reform the NSA programs—vital to protecting our privacy David Cole, Professor, Law, Georgetown University, Testimony before the House Judiciary Committee, 2—4—14, http://judiciary.house.gov/_cache/files/744cf1cd-f600-4bf1-81a0-0527125a8e21/david-cole-testimony.pdf, accessed 2-15-15. But the revelations also demonstrate that unless the law is adapted to catch up to technological change, we are at risk of forfeiting our privacy by default. This truth has been recognized by President Obama in his NSA speech, by his expert Review Group, and by the Privacy and Civil Liberties Oversight Board. It’s been recognized by scholars across the country. And it’s been recognized, in different contexts, by most members of the Supreme Court. Just as privacy laws had to adapt to the invention of the automobile, the telephone, the beeper, the GPS, and the thermal imaging device, so, too, they need to adapt to the government’s increasing ability to use computers to collect and analyze massive amounts of digital data about all of us. Congress has a critical role to play in adjusting the law to reflect the challenges of technology. As Justice Samuel Alito noted in the Supreme Court’s most recent foray into this area, United States v. Jones, 132 S. Ct. 945, 964 (2012), “a legislative body is well situated to gauge changing public attitudes, to draw detailed lines, and to balance privacy and public safety in a comprehensive way.” Unlike a court, Congress can consider the problem from a broader perspective. Congress can respond more quickly than the courts. And Congress may have a better sense of the privacy demands of the American people. Thus, Congress has in the past often responded to Supreme Court decisions that did not extend Fourth Amendment protection to particular forms of investigation by imposing statutory limits that protect the American people’s privacy. 2. Congress should order that incidentally collected domestic data cannot be used by intelligence agencies without a court order Tyler C. Anderson, J.D. Candidate, “Toward Institutional Reform of Intelligence Surveillance: A Proposal to Amend the Foreign Intelligence Surveillance Act,” HARVARD LAW & POLICY REVIEW v. 8, Summer 2014, p. 429-430. Third, Congress should modify Section 1881a so that it explicitly states that any collateral data on U.S. persons collected by intelligence agencies cannot be used for intelligence purposes without specific FISC authorization. Here, Congress could insert a new requirement below Section 1881a(d)(1)(B) of the act, stating that any incidental data pertaining to U.S. persons and collected by intelligence agencies cannot be used without first obtaining a FISC warrant under Section 1881b or 1881c of the act or through normal Title III electronic surveillance procedures for criminal investigations. This proposal would remedy much of the criticism generated by the programs and methods recently reported by The Guardian. While Congress need not adopt such a proposal wholesale, clarifying and narrowing the types of activity that give rise to FAA surveillance would help strengthen the rule-of-law principles our system of governance embodies. 3. Congress should restrict surveillance by amending the FAA to precisely define the conduct that warrants surveillance and expand oversight Tyler C. Anderson, J.D. Candidate, “Toward Institutional Reform of Intelligence Surveillance: A Proposal to Amend the Foreign Intelligence Surveillance Act,” HARVARD LAW & POLICY REVIEW v. 8, Summer 2014, p. 435-436. Intelligence surveillance, as governed by the Foreign Intelligence Surveillance Amendments Act, is in need of re-form. Congress passed the original Foreign Intelligence Surveillance Act in order to help American intelligence agencies conduct surveillance in a pre-internet, pre-cellphone era, wanting to give the executive branch broad power to spy on non-U.S. citizens abroad, while protecting to the fullest extent possible the privacy of U.S. persons within the United States. In the years following September 11, 2001, Congress enacted the Foreign Intelligence Surveillance Amendments Act in order to grant executive branch agencies broader surveillance power than the agencies had under the original FISA. First, the FAA established a uniform process for seeking judicial authorization of electronic surveillance. Second, the FAA created a broad category of intelligence surveillance that would not be subject to ex-ante judicial scrutiny and would only be granted limited ex-post judicial review. The near-consensus on the issue is that the FAA overly delegates broad surveillance authority to intelligence agencies and minimizes the level of judicial and congressional oversight exercised over these agencies. Moreover, outside the executive branch, there is no substantial political coalition opposing FISA reform efforts. Instead, the current system is largely a product of congressional gridlock and inertia. Despite such inaction, these problems cannot be ignored. Congress should amend the FAA to reduce the scope of surveillance authority granted to intelligence agencies. Congress should do this by more precisely defining the conduct that would warrant intelligence surveillance targeting. Additionally, Congress should expand the oversight of intelligence surveillance by both Congress and the courts to ensure that the government does not exceed the authority granted under the FAA. 45 Paradigm Research 2015-2016 CX—Electronic Communication Aff Solvency: Congressional Actions [cont’d] 4. Congress should narrow the circumstances in which FISA authorizes surveillance Tyler C. Anderson, J.D. Candidate, “Toward Institutional Reform of Intelligence Surveillance: A Proposal to Amend the Foreign Intelligence Surveillance Act,” HARVARD LAW & POLICY REVIEW v. 8, Summer 2014, p. 427-429. The first step Congress should take in reforming the FAA is to narrow and clarify what would give an intelligence agency authority to initiate electronic surveillance. Many have argued that one of the reasons the FAA has attracted so much negative attention is simply that the general public does not understand what type of behavior the act implicates. This is not due to apathy, but rather to vagueness and secrecy because so much of the information surrounding FISA is classified. Currently, the language of 50 U.S.C. § 1801 suggests that the FAA is construed incredibly broadly by intelligence agencies--an agency need only reasonably suspect that a target has committed or could commit any act "that would be a criminal violation if committed within the jurisdiction of the United States or any State" as long as a target was reasonably suspected of being an agent of a foreign power. As the Snowden leaks demonstrate, ] this provision has in fact been used to conduct broad-ranging surveillance. Moreover, the act gives no guidance as to what constitutes "reasonable suspicion" by an intelligence agency. The most sweeping provision, Section 1881a, goes further by failing even to include such a requirement, requiring only that an intelligence agency not "intentionally target a U.S. person" in order to conduct surveillance activities. By implication, such a person may be subject to surveillance if her data is knowingly, recklessly, or negligently collected. As the American people discovered by the disclosures of Edward Snowden, this is exactly how the NSA and the FISA Court have interpreted this language. Congress should remedy the over-collection of data and clarify what behavior warrants surveillance by narrowing these provisions. In order to limit this expansive agency discretion, Congress could amend the FAA's most sweeping provision, Section 1881a, to require that intelligence agencies "reasonably suspect the surveillance targets of being agents of a foreign power" as defined in 50 U.S.C. § 1801. This requirement, as explained above, was incorporated by definition into the FAA in Sections 1881b and 1881c, but not 1881a, and could be added after Section 1881a(g)(2)(A)(v), adopting the language "targets are reasonably believed to be a foreign power, an agent of a foreign power, or an officer or employee of a foreign power." Furthermore, if Congress were to require that intelligence agencies swear to and demonstrate such reasonable suspicion when they apply for a FISC warrant, then much of the criticism of the Act's legal overbreadth would be alleviated, as 1881a could then only be used to target legally suspected terrorists. Additionally, Congress should narrow the type of activity that constitutes reasonable suspicion by an intelligence agency that a U.S. person is an "agent of a foreign power" in Sections 1881b and 1881c, which it could accomplish by narrowing the definition of "international terrorism." One version of this proposal has already been put forth by Seventh Circuit Judge Richard Posner. In Judge Posner's proposal, the FAA would add an additional targeting requirement such that intelligence agencies would need to reasonably suspect that targets are threats to national security. Specifically, he would define "threat to national security" to implicate only "threats involving a potential for mass deaths or catastrophic damage to property or to the economy," and leave to traditional law enforcement the surveillance of acts that include "ecoterrorism, animal-rights terrorism, and other political violence that, though criminal, does not threaten catastrophic harm." 5. Congress should bar the NSA from obtaining information from other intelligence agencies that would be illegal for the NSA to collect for itself Leslie Harris, President and CEO, Center for Democracy & Technology, Testimony before the European Parliament LIBE Committee Inquiry on Electronic Mass Surveillance of EU Citizens, 9—24—13, www.cdt.org/files/pdfs/LIBEtestimony24September.pdf, accessed 2-18-15. Finally, conducting surveillance through the back door should be outlawed. The U.S. Congress should bar the NSA from circumventing U.S. law by obtaining from other intelligence agencies information U.S. law bars it from collecting itself. It should also bar the NSA from searching through data collected in the PRISM program for information about Americans unless it meets the domestic standard for surveillance of Americans. 46 Paradigm Research 2015-2016 CX—Electronic Communication Aff Solvency: Congressional Actions [cont’d] 6. Congress should enact uniform privacy protections Jay Stanley and Barry Steinhardt, staff, Technology and Liberty Program, BIGGER MONSTER, WEAKER CHAINS: THE GROWTH OF AN AMERICAN SURVEILLANCE SOCIETY, American Civil Liberties Union, 1—03, p. 15. Although broad-based protections against government surveillance, such as the wiretap laws, are being weakened, at least they exist. But surveillance is increasingly being carried out by the private sector – frequently at the behest of government – and the laws protecting Americans against non-governmental privacy invasions are pitifully weak. In contrast to the rest of the developed world, the U.S. has no strong, comprehensive law protecting privacy – only a patchwork of largely inadequate protections. For example, as a result of many legislators’ discomfort over the disclosure of Judge Robert Bork’s video rental choices during his Supreme Court confirmation battle, video records are now protected by a strong privacy law. Medical records are governed by a separate, far weaker law that allows for widespread access to extremely personal information. Financial data is governed by yet another “privacy” law – Gramm-Leach – which as we have seen really amounts to a license to share financial information. Another law protects only the privacy of children under age 13 on the Internet. And layered on top of this sectoral approach to privacy by the federal government is a geographical patchwork of constitutional and statutory privacy protections in the states. The patchwork approach to privacy is grossly inadequate. As invasive practices grow, Americans will face constant uncertainty about when and how these complex laws protect them, contributing to a pervasive sense of insecurity. With the glaring exception of the United States, every advanced industrialized nation in the world has enacted overarching privacy laws that protect citizens against private-sector abuses. When it comes to this fundamental human value, the U.S. is an outlaw nation. For example, the European Union bars companies from evading privacy rules by transferring personal information to other nations whose data-protection policies are “inadequate.” That is the kind of law that is usually applied to Third World countries, but the EU counts the United States in this category. We need to develop a baseline of simple and clear privacy protections that crosses all sectors of our lives and give it the force of law. Only then can Americans act with a confident knowledge of when they can and cannot be monitored. 7. Our privacy laws need to be updated to reflect current technical realities David Cole, Professor, Law, Georgetown University, Testimony before the House Judiciary Committee, 2—4—14, http://judiciary.house.gov/_cache/files/744cf1cd-f600-4bf1-81a0-0527125a8e21/david-cole-testimony.pdf, accessed 2-15-15. This is a very troubling development for those who believe, as the framers did, that privacy is essential to democracy. As Justice Alito recognized in United States v. Jones, which involved the use of much less sophisticated technology -- a GPS -- to monitor the public travel of an automobile for 28 days, our privacy has long rested as much on the practical difficulties of tracking us as on any legal protections: In the pre-computer age, the greatest protections of privacy were neither constitutional nor statutory, but practical. Traditional surveillance for any extended period of time was difficult and costly and therefore rarely undertaken. The surveillance at issue in this case--constant monitoring of the location of a vehicle for four weeks--would have required a large team of agents, multiple vehicles, and perhaps aerial assistance. Only an investigation of unusual importance could have justified such an expenditure of law enforcement resources. Devices like the one used in the present case, however, make long-term monitoring relatively easy and cheap. Just as the GPS makes it cheap to monitor citizens’ public travel, so the proliferation of digital information about almost every interaction we have, coupled with advances in computer technology, make it possible to collect and aggregate massive amounts of personally revealing data about all of us. If privacy laws are not adapted to take these developments into account, privacy as we have long known and cherished it will not survive. 47 Paradigm Research 2015-2016 CX—Electronic Communication Aff Solvency: Congressional Oversight 1. Effective congressional oversight requires hiring significantly more staff Fred Branfman, journalist, “We Live Under a Total Surveillance State in America—Can We Prevent It from Evolving into a Full-Blown Police State?” ALTERNET, 9—25—13, www.alternet.org/activism/we-live-under-total-surveillance-state-america-can-we-prevent-itevolving-full-blown-police, accessed 6-1-15. D. Congress Must Have The Capacity To Genuinely Oversee Executive Agencies Members of the Senate and House Intelligence Committees must assert their right to be treated as genuine representatives of the governed. To begin with, they must demand the right to take notes on classified material the Executive shows them and to have properly cleared staff members accompany or represent them at briefings. They must punish NSA staff members who play Orwellian word games with them, refusing to answer questions honestly unless the exact words are used as the NSA defines them, which they keep secret. Members must also insist that they be given all information on NSA activities. At present, the NSA withholds significant information even from Senate and House Intelligence Committee members. Legislators must severely punish Executive Branch officials who continue to hide significant information from them. Most importantly, however, Congress cannot exercise constitutionally-required oversight of Executive Branch activities unless they can independently investigate them. The Intelligence Committees, like the FISA courts (please see below), must hire significantly more staff, with the knowledge, power and mandate to oversee Executive Branch military, intelligence and police activities that potentially threaten the democratic rights of the American people. 2. Requiring greater information sharing is necessary to check abuses by the executive branch Paul M. Schwartz, Professor, Law, University of California, Berkeley, “Warrantless Wiretapping, FISA Reform, and the Lessons of Public Liberty: A Comment on Holmes’s Jorde Lecture,” CALIFORNIA LAW REIVEW v. 97 n. 2, 2009, p. 427. The institutional questions loom large, in my view, and steps are needed to improve the performance of all branches of the government. Here, I will only sketch some of the possibilities. Regarding the executive branch, as Katyal and Caplan have argued, for example, "[i]f we want to create the conditions for an executive that acts with greater fidelity to the law, greater attention to internal checks is likely to be necessary."' 0 5 Part of these checks will come from greater information sharing among the branches. Here is a way of furthering public liberty-it will ensure that many participants in democratic rule will know about executive branch activities beyond "a closed circle of like-minded political appointees" (as Holmes puts it)." 3. Congress has a lousy track record in carrying through on oversight—needs to expand it Paul M. Schwartz, Professor, Law, University of California, Berkeley, “Warrantless Wiretapping, FISA Reform, and the Lessons of Public Liberty: A Comment on Holmes’s Jorde Lecture,” CALIFORNIA LAW REIVEW v. 97 n. 2, 2009, p. 427-428. As promising as these opportunities are for congressional involvement, it is necessary to note a poor past track record for this branch of government in carrying out oversight in a far simpler and less controversial area of telecommunications surveillance. As I have discussed elsewhere, Congress has manifested a notable lack of interest in obtaining pen register reports from the Department of Justice as required by statute. Pen registers are devices that record not the content of telephone conversations, but the telephone numbers of outgoing and incoming calls. The Patriot Act of 2001 amended the Pen Register Act to more broadly include "dialing, routing, addressing, or signaling information" ("DRAS information") in its definition of data that fall under the statute. IP addresses and email addressing data ("to" and "from" lines on email and routing) are an example of DRAS information. The lack of pen register reports leads to a significant gap in knowledge about law enforcement use of its authorities under the Pen Register Act, an essential part of the framework for domestic electronic surveillance in the United States. More broadly, much of the past congressional oversight of telecommunications surveillance law has represented a kind of "privacy theater." By this term, I mean that the law creates rituals of behavior, such as a formal requirement that pen register reports be sent to Congress, and the payoff is the creation of a myth of oversight. It is likely, moreover, to be far more difficult for Congress to engage in effective engagement with executive branch behavior in the foreign intelligence area. There is also a real risk that the FAA's oversight requirements will simply contribute to a new kind of privacy theater and bolster the old, reassuring myth that if excesses exist, Congress will respond by enacting reforms. 48 Paradigm Research 2015-2016 CX—Electronic Communication Aff Solvency: FCC Oversight 1. Granting oversight authority to the FCC is the best way to rein in the NSA Audra Healey, J.D. Candidate, “A Tale of Two Agencies: Exploring Oversight of the National Security Administration by the Federal Communications Commission,” FEDERAL COMMUNICATIONS LAW JOURNAL v. 67 n. 1, 2014, p. 93-94. According to recent disclosures, the National Security Agency (“NSA”) has been collecting information from hundreds of millions of email accounts and phone numbers, many belonging to Americans. The NSA’s strategy is to use this information to “draw detailed maps of a person’s life, as told by personal, professional, political, and religious connections.” Former NSA director Gen. Keith Alexander argued that the agency’s bulk collection of email and call detail records is necessary because the government “need[s] the haystack to find the needle.” The NSA’s extensive surveillance of U.S. citizens was brought into the spotlight by the recent disclosures of former NSA contractor Edward Snowden. The first of Snowden’s disclosures, released by The Guardian on Wednesday, June 5, 2013, revealed that the NSA was collecting phone call detail records from millions of U.S. consumers on a daily basis. This has prompted widespread public concern about the extensive information collection policy of the NSA. As technology continues to develop and the Internet continues to play a major role in modern life, governmental monitoring of Internet activity will likely become an area of increasing concern. The best way to ensure proper oversight of this monitoring is by empowering an administrative agency: namely, the Federal Communications Commission (the “FCC”). This Note will address what role the FCC could and should play in overseeing intelligence activities that implicate individual privacy on the Internet and telecommunications networks. This Note argues that the FCC, as the expert independent agency that routinely deals with the Internet and telecommunications networks, has both the tools and capacity to provide some oversight and protection for Internet users. Part II discusses the background of each agency, beginning with the NSA, then delves into the FCC and its efforts to keep pace with the ever-changing Internet. Part III argues that, because the existing mechanisms for overseeing governmental, domestic surveillance programs are inadequate, and given the FCC’s long history of scrutinizing the interplay of national security and privacy involving telecommunications, Congress should empower the FCC to address privacy concerns raised by the NSA’s surveillance of U.S. citizens. Part IV discusses how the FCC could address NSA surveillance activities, laying out possible, practical solutions that Congress should provide. 2. The FCC can work—does well in adapting to regulation of new technologies Audra Healey, J.D. Candidate, “A Tale of Two Agencies: Exploring Oversight of the National Security Administration by the Federal Communications Commission,” FEDERAL COMMUNICATIONS LAW JOURNAL v. 67 n. 1, 2014, p. 97-98. The FCC makes a conscious effort to adapt to new technology. Established by the Communications Act of 1934, 30 the FCC regulates interstate and international communications by radio, television, wire, satellite, and cable in all 50 states, the District of Columbia, and U.S. territories. As the agency’s then-Chairman acknowledged in 2012, the FCC necessarily plays a role in facilitating the continuing development of the Internet. Moreover, the FCC’s governing statutes empower the agency to investigate and regulate actual and potential breaches in communications privacy that threaten customer proprietary network information (“CPNI”), among other types of customer information. This authority encompasses not only traditional mediums of telecommunications, such as the Public Switched Telephone Network, but also newer mediums, such as the Internet, to the extent that the FCC considers providers of Internet traffic to be “telecommunications carriers.” Communications privacy plays an important role in the FCC’s formulation of policies and procedures to promote the use and development of the Internet, and the FCC may even have substantial authority to act in this area. The agency recognizes that the adoption of broadband is affected by consumer’s perception of their online privacy and security. Indeed, the FCC has made a point of adapting to and fostering privacy and security on the Internet by developing industry standards to regulate communications providers as new technology has developed. To that end, the agency puts a strong emphasis on working with industry leaders, academics, engineers, federal partners, as well as companies that work to build and expand Internet infrastructure and services, representatives from state and local entities, and Internet entrepreneurs and pioneers. The FCC has thus made a point to stay abreast of new technological developments in Internet and broadband technology, while working to facilitate consumer use of and confidence in this technology. 49 Paradigm Research 2015-2016 CX—Electronic Communication Aff Solvency: FCC Oversight [cont’d] 3. The FCC can be tasked to engage in NSA oversight—has sufficient expertise Audra Healey, J.D. Candidate, “A Tale of Two Agencies: Exploring Oversight of the National Security Administration by the Federal Communications Commission,” FEDERAL COMMUNICATIONS LAW JOURNAL v. 67 n. 1, 2014, p. 106-108. C. The FCC mission can be naturally expanded to protect privacy in relation to surveillance. The FCC has a strong privacy background as well as a strong history of promoting openness and transparency on the Internet. First, this section shows the FCC has been extending many of its regulations to the Internet and adapting to changes in technology as it does so. Second, the FCC has a strong history of protecting the nation’s communications infrastructure. The FCC has experience with accounting for the globalized nature of communications. This section next argues that the FCC’s background in these areas prepares the agency to step into a new role overseeing the NSA collection of data. Finally, this section discusses the benefits of tasking the FCC with this important oversight role. 1. The FCC has strong a background and significant expertise that will allow the agency to provide oversight of the NSA. Since the “advent of the Internet,” the FCC has been involved in regulating this facet of the nation’s communications infrastructure. For instance, as early as 1980, the FCC considered the extent to which information processing (as involved in Internet services) required further or different regulation from other communications networks. In 1980, the FCC began to recognize a distinction between basic and enhanced services, and applied this distinction until its codification in the Telecommunications Act of 1996. Following codification, the FCC continued its use of this framework, but expanded its scope to include elements of Internet infrastructure, such as broadband connectivity. However, the FCC remained willing to consider applying its regulatory framework to new technologies. This flexibility has helped the agency adapt to new and changing technology as it influences the nation’s communications infrastructure. Additionally, the FCC acknowledges the impact of privacy on the Internet. The recognition that “[c]onsumers’ privacy needs are no less important when consumers communicate over and use broadband Internet access than when they rely on [telephone] services,” has played a large part in FCC policy, as the agency has long supported protecting the privacy of broadband users. The FCC further ensures that consumers have control over how their information is used, and that they are protected from “malicious third parties.” Moreover, there is a direct link between consumer confidence and the adoption of new technology, which the agency has taken into account as it formulates new policies. As former Chairman Genachowski explained, in the FCC’s view, “[i]f consumers lose trust in the Internet, this will suppress broadband adoption and online commerce and communication, and all the benefits that come with it.” Moreover, the FCC has recognized that it can, and should, play a major role in protecting privacy and consumer confidence in the Internet, including working with industry members to provide best practices for security and encouraging broadband adoption. The next logical step is for Congress to authorize the FCC to further develop Internet privacy principles in the context of protecting consumers from NSA monitoring of their Internet communications and access of the Internet providers’ infrastructure to do so. 4. The FCC is best positioned to address the challenges posed by NSA oversight Audra Healey, J.D. Candidate, “A Tale of Two Agencies: Exploring Oversight of the National Security Administration by the Federal Communications Commission,” FEDERAL COMMUNICATIONS LAW JOURNAL v. 67 n. 1, 2014, p. 116. The FCC is in a position to provide oversight and transparency to the NSA Internet monitoring scandal. As an agency tasked with regulating the technology and communications sectors, the FCC has been keeping up with the infrastructure and development of technology vis-à-vis the Internet as it pertains to its congressional mandate and its own regulations. Moreover, there would not be an intrusion onto national security efforts because only the volume of information collected would be disclosed. The current crisis in public confidence shows that there is a place for the FCC to be an integral part of the oversight process. The FCC would focus the inquiry of the congressional oversight committees and provide the FISA Court with much-needed outside perspective and technical assistance, while simultaneously giving the public some comfort and adding transparency to the process. This inter-agency monitoring could increase accountability and public confidence in a way that traditional oversight mechanisms cannot: thus, the FCC is in a unique position to add value to the oversight of the NSA and Congress should pursue codifying this solution. 50 Paradigm Research 2015-2016 CX—Electronic Communication Aff Solvency: Surveillance State Reform Act 1. Comprehensive reform is necessary to solve—“nibbling around the edges” is doomed to fail Alex Marthews, National Chair, “Go Big or Go Home: Pass the New Surveillance State Repeal Act,” RESTORE THE FOURTH, 2015, http://restorethe4th.com/blog/go-big-or-go-home-pass-the-new-surveillance-state-repeal-act/, accessed 4-27-15. Nearly two years after Snowden began revealing them, Congress has done nothing to fix the US government's massively abusive surveillance practices. They think Americans will be OK with an unconstitutional, sprawling, mass-surveillance empire intruding into every part of our lives. We’re not. It’s time to take a stand. We’ve seen what happens when reformers try to nibble around the edges, when we try to pre-compromise with the intelligence community. We saw a good reform bill last session, the “USA FREEDOM Act”, get stripped of nearly everything worth doing as it passed through the process, and then it failed anyway. So this time, we’re setting out for what we’d really like to see happen–a bill that embodies our vision for a new way of dealing with security and surveillance. Restore The Fourth has been working quietly with a new coalition of surveillance reform groups and with representatives interested in real reform, and today we’re helping to launch HR 1466, the Surveillance State Repeal Act. Co-sponsored by Rep. Thomas Massie (R-KY) and Rep. Mark Pocan (D-WI), this bill strikes at the heart of the surveillance state. The SSRA: repeals the PATRIOT Act; repeals the FISA Amendments Act; requires the destruction of information gathered under that Act; reforms the Foreign Intelligence Surveillance Court; bans law enforcement “back doors” into our hardware and software; requires annual audits of intelligence community practices; protects intelligence community whistleblowers; and requires a probable cause warrant for information on US persons gathered under Executive Order 12333. It is the only comprehensive surveillance reform bill in this Congress, and it deserves maximum publicity and support. 2. We should implement to SSRA to check NSA over-surveillance Alex Marthews, National Chair, “Go Big or Go Home: Pass the New Surveillance State Repeal Act,” RESTORE THE FOURTH, 2015, http://restorethe4th.com/blog/go-big-or-go-home-pass-the-new-surveillance-state-repeal-act/, accessed 4-27-15. The SSRA... 1. Repeals the PATRIOT Act and the FISA Amendments Act. The PATRIOT Act was passed by a panicked Congress in the weeks following the 9/11 attacks. At the time, it was a wet dream for law enforcement. Since then, it’s become clear that it doesn’t meaningfully help with thwarting terrorist attacks. What it is very good at is legitimating activities more appropriate for the East German secret police than for a free republic. Secret national security letters that recipients can’t talk about or challenge. Phone metadata dragnets sweeping up calls from Pawtucket to Peoria. So-called “roving wiretaps” that deeply violate the Fourth Amendment requirement for particularized probable cause. This was all meant to be “emergency” legislation. The emergency is long past, and it’s time to bury the PATRIOT Act in the unhallowed ground it deserves. The FISA Amendments Act was passed after the Bush administration’s illegal mass surveillance became public. Its purpose was to give a vague color of law to their intentional violations, prevent their prosecution, and also give immunity to the criminals running our telecommunications companies who went along with administration requests rather than protecting their users. It also turned the Fourth Amendment on its head, by approving warrants connected to a “program” rather than a person. Not only would SSRA repeal the FISA Amendments Act, but it would require the destruction of any information gathered under it. 2. Reforms the Foreign Intelligence Surveillance Court set up after the surveillance scandals of the 1970s. It increases the independence of judges by extending their terms from seven to ten years and allowing them to have multiple terms on the Court. It allows technical experts to be appointed to assist the judges in forming a more critical and independent view of administration demands. 3. Bans the farcical practice of mandating “back doors” for government access to hardware and software. Computer security can’t be designed to provide a “magic golden key” to the US government (while also making systems vulnerable to foreign governments and black-hat hackers). You’re either vulnerable or you’re not. The US government should be promoting secure cyber-infrastructure, not holding conferences on how to weaken it. 4. Improves transparency by requiring the GAO to audit domestic surveillance annually. Famously, there’s a GAO room at the NSA that is empty, because too many members of Congress don’t want to appear unpatriotic by calling on GAO to investigate a surveillance agency. Required annual audits would overcome that problem. 5. Sets out whistleblower procedures for employees of or contractors to intelligence agencies, requires the Comptroller General to investigate and report on their complaints, and prohibits retaliation against them. 6. For the first time, meaningfully limits collection under Executive Order 12333, requiring (for US persons) a valid warrant based on probable cause. In short, this is a blockbuster bill. If passed, it would undo much of the enormous damage done to the Bill of Rights after the September 11 attacks. It would return us to a path we should never have left, where we investigate Americans only when we have reason to. At the same time, we believe it will increase our actual security. We have been trying too much to control our own citizens and the world by surveilling them into sullen and resentful silence; we make a desolation, and call it peace. If instead we practice justice, promote peace, and let people pursue their ideas and aspirations freely, we will be far more secure in the long run. 51 Paradigm Research 2015-2016 CX—Electronic Communication Aff Solvency: Surveillance State Reform Act [cont’d] 3. The plan ends NSA efforts to undercut Internet security Scott Shane and Nicole Perlroth, journalists, “Legislation Seeks to Bar N.S.A. Tactic in Encryption,” NEW YORK TIMES, 9—6—13, www.nytimes.com/2013/09/07/us/politics/legislation-seeks-to-bar-nsa-tactic-in-encryption.html, accessed 3-20-15. After disclosures about the National Security Agency’s stealth campaign to counter Internet privacy protections, a congressman has proposed legislation that would prohibit the agency from installing “back doors” into encryption, the electronic scrambling that protects e-mail, online transactions and other communications. Representative Rush D. Holt, a New Jersey Democrat who is also a physicist, said Friday that he believed the N.S.A. was overreaching and could hurt American interests, including the reputations of American companies whose products the agency may have altered or influenced. “We pay them to spy,” Mr. Holt said. “But if in the process they degrade the security of the encryption we all use, it’s a net national disservice.” Mr. Holt, whose Surveillance State Repeal Act would eliminate much of the escalation in the government’s spying powers undertaken after the 2001 terrorist attacks, was responding to news reports about N.S.A. documents showing that the agency has spent billions of dollars over the last decade in an effort to defeat or bypass encryption. The reports, by The New York Times, ProPublica and The Guardian, were posted online on Thursday. The agency has encouraged or coerced companies to install back doors in encryption software and hardware, worked to weaken international standards for encryption and employed custom-built supercomputers to break codes or find mathematical vulnerabilities to exploit, according to the documents, disclosed by Edward J. Snowden, the former N.S.A. contractor. The documents show that N.S.A. cryptographers have made major progress in breaking the encryption in common use for everyday transactions on the Web, like Secure Sockets Layer, or SSL, as well as the virtual private networks, or VPNs, that many businesses use for confidential communications among employees. Intelligence officials say that many of their most important targets, including terrorist groups, use the same Webmail and other Internet services that many Americans use, so it is crucial to be able to penetrate the encryption that protects them. In an intense competition with other sophisticated cyberespionage services, including those of China and Russia, the N.S.A. cannot rule large parts of the Internet off limits, the officials argue. A statement from the director of national intelligence, James R. Clapper Jr., criticized the reports, saying that it was “not news” that the N.S.A. works to break encryption, and that the articles would damage American intelligence collection. The reports, the statement said, “reveal specific and classified details about how we conduct this critical intelligence activity.” “Anything that yesterday’s disclosures add to the ongoing public debate,” it continued, “is outweighed by the road map they give to our adversaries about the specific techniques we are using to try to intercept their communications in our attempts to keep America and our allies safe and to provide our leaders with the information they need to make difficult and critical national security decisions.” But if intelligence officials felt a sense of betrayal by the disclosures, Internet security experts felt a similar letdown — at the N.S.A. actions. “There’s widespread disappointment,” said Dan Kaminsky, a prominent security researcher. “This has been the stuff of wild-eyed accusations for years. A lot of people are heartbroken to find out it’s not just wild-eyed accusations.” Sascha Meinrath, the director of the Open Technology Institute, a research group in Washington, said the reports were “a startling indication that the U.S. has been a remarkably irresponsible steward of the Internet,” which he said the N.S.A. was trying to turn into “a massive platform for detailed, intrusive and unrestrained surveillance.” 4. We need to extend whistleblower protections to rein in the national surveillance state Rush Holt, U.S. Representative, “Here’s What Real Reform of the NSA Looks Like,” interviewed by Timothy B. Lee, WASHINGTON POST, 8—2—13, www.washingtonpost.com/blogs/the-switch/wp/2013/08/02/heres-what-real-reform-of-the-nsa-looks-like, accessed 427-15. Your proposal also would extend whistleblower protections to national security cases, right? Yes, the legislation provides whistleblower protection for people who work in the intelligence agencies. Right now, they have no whistleblower protection comparable to what exists in other agencies. Especially in the [intelligence] agencies we need that. In agencies that are dominated by secrecy and deception, Congress simply won't know and surely the public won't know either what is being done in their name. If there had been whistleblower protection, I'm quite sure that Snowden would not have done what he did. Yet we could have, as the president has said, a national debate about what needs to be done in spying on Americans and others. My bill essentially extends to employees of the intelligence community the kinds of protections that exist in other agencies. They would be able to go to Congress or to designated officials like inspectors general without having to fear workplace retribution. Think of the case of Thomas Drake. He uncovered what I think would have to be called waste and perhaps fraud [at the NSA], and he took that up the chain, and he was severely disciplined for it. It hurt him professionally, and as we know, the way the story played out, the court chastised the NSA for the treatment. It just shows that you can't take this up the chain in the agency as a whistleblower and expect fair treatment. 52 Paradigm Research 2015-2016 CX—Electronic Communication Aff Solvency: Surveillance State Reform Act [cont’d] 5. The plan is necessary—we need root-and-branch reform, which is vital to restoring U.S. tech leadership Sascha Meinrath, Director, X-Lab, “Opinion: Meaningful Surveillance Reform Must Prioritize Civil Liberties,” CHRISTIAN SCIENCE MONITOR, 3—24—15, www.csmonitor.com/World/Passcode/Passcode-Voices/2015/0324/Opinion-Meaningful-surveillance-reformmust-prioritize-civil-liberties, accessed 4-27-15. Now is the time for meaningful surveillance reform. Across the political spectrum, from the progressive left to libertarian right, there is widespread agreement that mass surveillance has exceeded the bounds of legality, morality, and efficacy. Today, the key ingredients for a successful surveillance reform agenda can be found in the boldly titled Surveillance State Repeal Act. Among its bold provisions, it repeals the Patriot Act and the excesses of the 2008 amendment to the Foreign Intelligence Surveillance Act. It would also restore our civil liberties by clearing out legislation that even the Patriot Act’s main author, Rep. Jim Sensenbrenner (R) of Wisconsin, has stated is extremely troubling. The Surveillance State Repeal Act begins with the right questions: What parts of these laws, which have proven to be the catalysts for widespread civil liberties violations, should we even keep? What kinds of surveillance actually work? While many have made light of Benjamin Franklin’s quote, “Those who would give up essential liberty, to purchase a little temporary safety, deserve neither liberty nor safety,” few have trivialized the conditions undergirding his missive – namely, that interpretations of law were often “‘of an extraordinary nature,’ without informing us wherein that extraordinary nature consisted,” and rejected participatory democracy for “disagreeing with new discovered meanings, and forced constructions of a clause in the proprietary [secret] commission.” The parallels to the current surveillance state that the proposed repeal act aims to address couldn’t be clearer. Previous reform efforts have floundered because they compromised – attempting to lessen the diminution of our freedoms, rather than prioritizing our inherent and inalienable right to “the preservation of life, liberty and the pursuit of happiness.” Surveillance reform needs grassroots support – same as the millions of people who killed the Stop Online Piracy Act in 2012 by overloading congressional phone lines – in order to pass, and Americans of all stripes are only mobilized by unambiguous and forceful legislation to protect their rights. The Surveillance repeal act is clear, concise, and accessible (the latest version is less than 10 pages long), and rolls back some of the worst constitutional abuses with a hard reset of the US government’s surveillance powers. The proposal enables a much-needed debate about how to effectively stop terrorism, ensure national security, and preserve the civil liberties that are the heart of American democracy. As Alexis de Tocqueville wrote over 150 years ago, “What good does it do me, after all, if an ever-watchful authority keeps an eye out to ensure that my pleasures will be tranquil and races ahead of me to ward off all danger, sparing me the need even to think about such things, if that authority, even as it removes the smallest thorns from my path, is also absolute master of my liberty.” Even while the repeal act is being debated, surveillance reformers have the opportunity to strictly limit the scope of the Patriot Act by refusing "clean" reauthorization of Section 215 of the bill, which has been interpreted to authorize the National Security Agency’s mass surveillance of telephone records, and, as Sen. Ron Wyden (D) of Oregon recently revealed, even more surveillance than is publicly known. FreedomWorks policy analyst Jason Pye argues that sunsetting 215 is also crucial for the US tech industry, which is being shut out of business abroad in light of weak protections for data stored in the US. Informed decisions would be greatly aided by the public release of the mandatory Department of Justice report on how Section 215 is being used, which, despite a mandate to create twice-yearly reports, the last public release was nine years ago. As government surveillance expert and watchdog, Marcy Wheeler, points out, we shouldn’t reauthorize an invasive surveillance law if even the most minimal oversight procedures aren’t currently being followed. Legislative fixes are essential, but insufficient to rein in mass surveillance. To restore civil liberties we need to address the use of Executive Order 12333, which has been interpreted by the intelligence community to authorize many of their programs. The good news is that the Obama administration, with the flick of a pen, has the authority to unilaterally revoke this facet surveillance regime; we just need a bold administration that leads by example. The problems of our current mass surveillance regime extend into the judiciary as well – with the rubber-stamping of key activities by secret courts initially intended to oversee the intelligence community. As recently declassified documents have shown, the secret FISA Court has issued rulings that are almost always in favor of the intelligence community, even while acknowledging that that same intelligence community has been systematically misleading the FISA Court. And since the FISA Court issues rulings in secret – the kind of activity rightfully condemned when used by regimes like Iran and North Korea –we often don’t learn about the myriad abuses that are occurring (and certainly, even today, only know a subset of the abuses that may be ongoing). While a “collect-it-all” mentality may seem wise upon first blush, as Pat Eddington at the Cato Institute has noted, retrospective analyses have repeatedly confirmed that the Intelligence Community missed known connections that predicted terrorist attacks within the US. In essence, systematically violating our civil liberties in the name of security has undermined the former without accomplishing the latter. The Internet is global, and as a global leader, the US helps set the standards for acceptable behavior. Mass domestic and foreign spying legitimates the same behavior by other regimes while simultaneously creating a perverse incentive to create a more fractured global communications system. In the long run, international rules and agreements are needed to prevent a 21st century cybersiege where the information and communications of US citizens is actively vacuumed up by dozens of nations all around the globe. It’s time for the US to start acting like the ethical Internet steward that it once was. The Surveillance State Repeal Act makes a giant step toward protecting our civil liberties and restoring global trust. 53 Paradigm Research 2015-2016 CX—Electronic Communication Aff Solvency: Surveillance State Reform Act [cont’d] 6. The SSRA rolls back domestic surveillance and provides meaningful protections to whistleblowers RT, staff, “Bipartisan Bill Would Repeal Patriot Act, Cut Down American Surveillance,” 3—25—15, http://rt.com/usa/243745-billrepeal-patriot-act-surveillance/, accessed 4-27-15. The bipartisan Surveillance State Repeal Act, if passed, would repeal dragnet surveillance of Americans’ personal communications, overhaul the federal domestic surveillance program, and provide protections for whistleblowers. House lawmakers Mark Pocan (D-Wis.) and Thomas Massie (R-Ky.) are co-sponsoring bill H.R.1466, which was introduced on Tuesday and would repeal the 2001 Patriot Act, limit powers of the FISA Amendments Act, and prohibit retaliation against federal national security whistleblowers, according to The Hill. “The Patriot Act contains many provisions that violate the Fourth Amendment and have led to a dramatic expansion of our domestic surveillance state,” said Rep. Massie in a statement. "Our Founding Fathers fought and died to stop the kind of warrantless spying and searches that the Patriot Act and the FISA Amendments Act authorize. It is long past time to repeal the Patriot Act and reassert the constitutional rights of all Americans.” Specifically, the bill would revoke all the powers of the Patriot Act, and instruct the Director of National Intelligence and the Attorney General to destroy any information collected under the FISA Amendments Act concerning any US person not under investigation. It would repeal provisions of the FISA Amendments Act to ensure surveillance of email data only occurs with a valid warrant based on probable cause. The bill would also prohibit the government from mandating that manufacturers build mechanisms allowing the government to bypass encryption in order to conduct surveillance. Specifically, the bill would revoke all the powers of the Patriot Act, and instruct the Director of National Intelligence and the Attorney General to destroy any information collected under the FISA Amendments Act concerning any US person not under investigation. It would repeal provisions of the FISA Amendments Act to ensure surveillance of email data only occurs with a valid warrant based on probable cause. The bill would also prohibit the government from mandating that manufacturers build mechanisms allowing the government to bypass encryption in order to conduct surveillance. Additionally, the bill would protect a federal whistleblower’s efforts to expose mismanagement, waste, fraud, abuse, or criminal behavior. It would also make retaliation against anyone interfering with those efforts – such as threatening them with punishment or termination – illegal. “Really, what we need are new whistleblower protections so that the next Edward Snowden doesn’t have to go to Russia or Hong Kong or whatever the case may be just for disclosing this,” Massie said. There have been previous attempts to limit dragnet surveillance under the Patriot Act since former National Security Agency analyst Edward Snowden leaked information regarding the programs in 2013, but the Senate bill introduced in 2013 never reached the floor for a vote. “The warrantless collection of millions of personal communications from innocent Americans is a direct violation of our constitutional right to privacy,” said Rep. Pocan in a statement. “Revelations about the NSA’s programs reveal the extraordinary extent to which the program has invaded Americans’ privacy. I reject the notion that we must sacrifice liberty for security – we can live in a secure nation which also upholds a strong commitment to civil liberties. This legislation ends the NSA’s dragnet surveillance practices, while putting provisions in place to protect the privacy of American citizens through real and lasting change.” 7. The SSRA is critical to effective oversight Rush Holt, U.S. Representative, “Here’s What Real Reform of the NSA Looks Like,” interviewed by Timothy B. Lee, WASHINGTON POST, 8—2—13, www.washingtonpost.com/blogs/the-switch/wp/2013/08/02/heres-what-real-reform-of-the-nsa-looks-like, accessed 427-15. What can be done to make the intelligence community more transparent and accountable? Part of the problem is that the NSA has been using these [laws] as excuses for doing a lot of things. And the FISA court has been insufficient in its review. That's why I think they should be repealed. Can the NSA, can the CIA, can other intelligence agencies do things that are not in the national interest? You bet they can. They have from time to time over decades. Congress has to do a better job of oversight. There's no question that it's made hard when the intelligence agencies obfuscate and cherry-pick what they tell Congress. No one likes to be criticized, and therefore no agency likes Congressional oversight. But many agencies understand that for this government with balance of powers to work, they have to cooperate in the oversight. You've heard no doubt members of Congress who have served on the Intelligence Committees say they have to play a form of 20 questions with intelligence witnesses. For many of the witnesses, their idea of being straightforward and honest is giving the narrowest possible specific answer to a question, not really providing the information Congress actually needs. They play a little game to see if members of Congress will ask these specific questions, to which they'll give an answer that's relevant. If a member doesn't ask that specific question, the intelligence officials will leave the meeting room smiling to themselves about protecting the secrecy of their agency. It's a game that doesn't serve the oversight process, it's a game that doesn't serve America well. 54 Paradigm Research 2015-2016 CX—Electronic Communication Aff Solvency: Surveillance State Reform Act [cont’d] 8. The SSRA imposes massive The SSRA solves any circumvention issues—forces transparency, implements strong oversight, and forces the surveillance establishment to justify their programs Shahid Buttar, Director, Civil Rights Enforcement and Executive Director, Bill of Rights Defense committee, , “Back to Square One on Spying,” Green Shadow Cabinet, 3—26—15, http://greenshadowcabinet.us/statements/back-square-one-spying, accessed 4-27-15. Eager to reset the debate and anchor it in long overdue transparency, a bipartisan block of representatives have introduced a bill to restore civil liberties, privacy, and freedom of thought. The Surveillance State Repeal Act, HR 1466, would do this by repealing the twin pillars of the NSA dragnet: the PATRIOT Act (not only the three expiring provisions) and the 2008 FISA amendments. On multiple occasions, executive officials have lied under oath to congressional oversight committees about the scope of domestic surveillance. Yet the very same officials still appear in oversight hearings as if they maintained any credibility. It took whistleblowers resigning their careers to prove that senior government officials’ blithe assurances to Congress were in fact self-serving lies. Some members of Congress paid attention: the authors of the PATRIOT Act moved to curtail their own legislative opus, and have encouraged their colleagues not to reauthorize the expiring provisions unless they are first curtailed. HR 1466 (the SSRA) represents a profound challenge by members of Congress from across the political spectrum fed up with the national security establishment and its continuing assault on our Constitution. By repealing the twin pillars of the surveillance dragnet, the SSRA would essentially shift the burden of proof, forcing intelligence agencies like the NSA and FBI to justify the expansion of their powers from a constitutional baseline, rather then the illegitimate status quo. Most policymakers forget the 9/11 commission’s most crucial finding: the intelligence community's failures that enabled the 9/11 attacks were not failures of limited data collection, but rather failures of data sharing & analysis. Over the last 15 years, Congress has allowed the agencies to expand their collection capacities, solving an imaginary problem while creating a host of real threats to US national security far worse than any act of rogue violence: the specter of state omniscience, immune from oversight and accountability, and thus vulnerable to politicization. This was among the fears of which President Eisenhower warned us in his last speech as President. Meanwhile, the SSRA would preserve what the PATRIOT Act’s authors have said they meant to authorize: targeted investigations of particular people suspected by authorities to present potential threats. HR 1466 would also advance transparency, both by protecting conscientious whistleblowers from the corrupt retaliation of agencies and careerists, and by giving judges on the secret FISA court access to technical expertise they have been denied. Finally, the bill would directly address disturbing government duplicity, prohibiting agencies from hacking encryption hardware and software, and from using an executive order authorizing foreign surveillance as a basis to monitor Americans. Mass surveillance has never been popular in America. Hundreds of cities and multiple states have raised their voices seeking a restoration of constitutional limits on an increasingly imperial federal executive. Nor is mass surveillance constitutional. A 1979 case contorted by agency lawyers into providing a legal basis for surveillance stands for nothing of the sort: Smith v Maryland was a case addressing targeted surveillance of a particular person, based on reasonable suspicion, limited to a particular time. Intelligence agencies today monitor every American, without any basis for suspicion, all the time. Members of Congress who remember their oaths of office should support the SSRA to force a long overdue transparent debate. And Americans who value privacy, checks & balances, or freedom of thought should take a moment to educate Members of Congress who might not. 9. The SSRA solves both overreaching domestic surveillance and security backdoors without undermining our counterterror efforts Mark Kibbe, President and CEO, “Letter in Support of the Surveillance State Repeal Act,” FREEDOMWORKS, 3—24—15, www.freedomworks.org/content/letter-support-surveillance-state-repeal-act, accessed 4-27-15. The Surveillance State Repeal Act would repeal the misguided USA PATRIOT Act and the FISA Amendments Act of 2008. The PATRIOT Act, passed in the panicked aftermath of the tragic September 11th attacks, gives the federal government an unprecedented amount of power to monitor the private communications of U.S. citizens without a warrant. The FISA Amendments Act of 2008 expanded the wiretapping program to grant the government more power. Both laws clearly violate our 4th Amendment right against unreasonable searches. The Surveillance State Repeal Act would prohibit the government from collecting information on U.S. citizens obtained through private communications without a warrant. It would mandate that the Government Accountability Office (GAO) regularly monitor domestic surveillance programs for compliance with the law and issue an annual report. A section of the bill explicitly forbids the government from mandating that electronic manufacturers install “back door” spy software into their products. This is a legitimate concern due to a recently released security report finding government spying software on hard drives in personal computers in the United States. It’s important to note that the Surveillance State Repeal Act saves anti-terrorism tools that are useful to law enforcement. It retains the ability for government surveillance capabilities against targeted individuals, regardless of the type of communications methods or devices being used. It would also protect intelligence collection practices involving foreign targets for the purpose of investigating weapons of mass destruction. 55 Paradigm Research 2015-2016 CX—Electronic Communication Aff Solvency: Surveillance State Reform Act [cont’d] 10. The current reforms are laughable—former NSA director agrees Dan Froomkin, journalist, “Hayden Mocks Extent of Post-Snowden Reform: ‘And This Is It After Two years? Cool!” THE INTERCEPT, 6—17—15, https://firstlook.org/theintercept/2015/06/17/hayden-mocks-extent-post-snowden-surveillance-reform-2years-cool/, accessed 6-29-15. Former National Security Agency director Michael Hayden on Monday marveled at the puny nature of the surveillance reforms put in place two years after NSA whistleblower Edward Snowden revealed a vast expansion of intrusive U.S. government surveillance at home and abroad. Hayden mocked the loss of the one program that was reined in — the NSA’s bulk collection of metadata information about domestic phone calls — calling it “that little 215 program.” And he said if someone had told him two years ago that the only effect of the Snowden revelations would be losing it, his reaction would have been: “Cool!” Here is the video and the full text of his remarks: If somebody would come up to me and say “Look, Hayden, here’s the thing: This Snowden thing is going to be a nightmare for you guys for about two years. And when we get all done with it, what you’re going to be required to do is that little 215 program about American telephony metadata — and by the way, you can still have access to it, but you got to go to the court and get access to it from the companies, rather than keep it to yourself” — I go: “And this is it after two years? Cool!” Hayden was speaking at the annual meeting of the Wall Street Journal CFO Network, an event hosted “by the Journal’s senior editors” for “an invitation-only group of more than 100 chief financial officers of the world’s largest companies.” Asked if he thought Snowden was a foreign agent, Hayden said: “I’ve got my suspicions,” although he acknowledged, “I’ve got no evidence.” Some opponents of massive government surveillance hailed the passage, earlier this month, of the USA Freedom Act. And it did, in fact, mark the first time that Congress has limited the executive branch’s surveillance authority over four decades of explosive growth. But some observers noted that it was a very small step at best. The program was just one out of the multitude Snowden revealed — and was so blatantly out of line that its end was virtually a foregone conclusion as soon as it was exposed. Seemingly irreconcilable media coverage reflected the reality that the reform bill was both important and, from the NSA’s perspective, trivial. Hayden’s remarks were the most blunt yet emphasizing that latter point. 56 Paradigm Research 2015-2016 CX—Electronic Communication Aff Democracy Adv: Internal Link—General 1. Granting expansive surveillance powers in the president would simply cripple our democracy Bruce Fein, constitutional expert, “Presidential Authority to Gather Foreign Intelligence,” PRESIDENTIAL STUDIES QUARTERLY v. 37 n. 1, 3—07, p. 35. The nation might be marginally safer from foreign terrorists if the Constitution-crowned the president with absolute power to spy on American citizens at any time or place on his say-so alone. But it would cripple democracy. The people would be frightened from criticizing the government or undertaking anything unorthodox or nonconformist. The president would assemble a vast pool of political intelligence to intimidate or destroy his opponents. With little or no public questioning or challenge, presidential hubris would inescapably give birth to foreign follies. The Founding Fathers had a better idea in sticking with checks and balances, the worst architecture for maintaining a strong and flourishing democracy except for all others that have been attempted or conceived. 2. The surveillance programs threaten the foundation of our democracy—chill the practice of journalism and law G. Alex Sinha, fellow, Human Rights Watch, WITH LIBERTY TO MONITOR ALL: HOW LARGE-SCALE US SURVEILLANCE IS HARMING JOURNALISM, LAW AND AMERICAN DEMOCRACY, Human Rights Watch & the ACLU, 7—14, p. 1. For much of its history, the United States has held itself out as a model of freedom, democracy, and open, accountable government. Freedoms of expression and association, as well as rights to a fair trial, are protected by the Constitution, and US officials speak with pride of the freedom of the media to report on matters of public concern and hold government to account for its actions. Yet, as this report documents, today those freedoms are very much under threat due to the government’s own policies concerning secrecy, leak prevention, and officials’ contact with the media, combined with large-scale surveillance programs. If the US fails to address these concerns promptly and effectively, it could do serious, long-term damage to the fabric of democracy in the country. Specifically, this report documents the effects of large-scale electronic surveillance on the practice of journalism and law, professions that enjoy special legal protections because they are integral to the safeguarding of rights and transparency in a democracy. To document these effects, we interviewed 92 people, including 46 journalists and 42 lawyers, about their concerns and the ways in which their behavior has changed in light of revelations of large-scale surveillance. We also spoke to current and former senior government officials who have knowledge of the surveillance programs to understand their perspective, seek additional information, and take their concerns into account in our analysis. Whether reporting valuable information to the public, representing another’s legal interests, or voluntarily associating with others in order to advocate for changes in policy, it is often crucial to keep certain information private from the government. In the face of a massively powerful surveillance apparatus maintained by the US government, however, that privacy is becoming increasingly scarce and difficult to ensure. As a result, journalists and their sources, as well as lawyers and their clients, are changing their behavior in ways that undermine basic rights and corrode democratic processes. 3. ‘Total surveillance’ threatens democracy and liberty Danielle Keats Citron and David Gray, University of Maryland School of Law, “Addressing the Harm of Total Surveillance: A Reply to Professor Neil Richards,” HARVARD LAW REVIEW FORUM v. 126, 2013, p. 268-269. Rather than assigning primary edged perils of broader types of surveillance, the law’s focus should be on the dangers of totalizing surveillance. Information privacy scholars and surveillance studies theorists alike have long adhered to this approach, and for good reason. Technologies like Virtual Alabama and the fusion-center network amass, link, analyze, and share mass quantities of information about individuals, much of which is quotidian. What is troubling about these technologies is not what information they gather, but rather the broad, indiscriminate, and continuous nature of the surveillance they facilitate. Video cameras may be trained on street corners, drugstore aisles, or a school’s bathroom entrances. The information they gather likely does not implicate intellectual activities. They nonetheless create and sustain the kind of surveil-lance state that is anathema to liberty and democratic culture. Fusion centers rely upon data-broker dossiers, much of which has nothing to do with intellectual endeavors. There is no doubt, however, that continuously streaming all of this information into the information-sharing environment facilitates the sort of broad and indiscriminate surveillance that is characteristic of a surveillance state. 57 Paradigm Research 2015-2016 CX—Electronic Communication Aff Democracy Adv: Internal Link—General [cont’d] 4. Even if the intent is not totalitarian, the program itself enables it Jonathan Schell, fellow, The Nation Institute, “Edward Snowden and Chelsea Manning, the New Dissidents?” THE NATION, 9—4— 13, www.thenation.com/article/176032/edward-snowden-and-chelsea-manning-new-dissidents, accessed 2-22-15. And certainly, the four Poles, of all people, are as fully aware as any sensible person of the abyss of difference that separates the Obama administration from, say, the regime of Joseph Stalin, slayer of tens of millions of his own people. And yet it is chillingly true at the same time that the US government has gone further than any previous government—not excluding Stalin’s—in setting up machinery that satisfies certain tendencies that are in the genetic code of totalitarianism. One is the ambition to invade personal privacy without check or possibility of individual protection. This was impossible in the era of mere phone wiretapping, before the recent explosion of electronic communications—before the cellphones that disclose the whereabouts of their owners, the personal computers with their masses of personal data and easily penetrated defenses, the e-mails that flow through readily tapped cables and servers, the biometrics, the streetcorner surveillance cameras. But now, to borrow the name of an intelligence program from the Bush years, “Total Information Awareness” is technologically within reach. The Bush and Obama administrations have taken giant strides in this direction. That China and Russia—and Britain, and many other countries—have done the same is hardly comforting to the humble individual under the eye of the universal spying apparatus. A second totalitarian tendency has been the ambition to control the entire globe—a goal built into fascist as well as communist ideologies of the early twentieth century. In Hannah Arendt’s words, “Evidence that totalitarian governments aspire to conquer the globe and bring all countries on earth under their domination can be found repeatedly in Nazi and Bolshevik literature.” Neither achieved it, or even came close. But now, in the limited arena of information, a sort of shadow or rudiment of this ambition is near realization by the “sole superpower,” the United States. Much attention has been paid to Americans’ loss of privacy rights, but relatively overlooked in the debate over the government’s surveillance activities (at least in the United States) has been that all foreign communications—including those occurring in the lands of close allies, such as Germany—are fair game and are being swept into the US data banks. The extent of the US global reach over information was mirrored in Snowden’s fate. Astonishingly, almost no fully democratic country would have him. (The conspicuous exception was Bolivia, whose president suffered the indignity of a forced diversion and landing of his plane when he was suspected of carrying Snowden to safety.) Almost all others, including Poland, bowed to US pressure, actual or potential, to refuse Snowden protection. The Polish letter writers were scandalized by this spectacle. “The fact that only dictatorial governments agreed to give him shelter shames the democratic states,” they wrote. “Our democracies discredit themselves with their indifference and cowardice in this matter.” What happened to Snowden in Moscow diagramed the new global reality. He wanted to leave Russia, but the State Department, in an act of highly dubious legality, stripped him of his passport, leaving him—for purposes of travel, at least—stateless. Suddenly, he was welcome nowhere in the great wide world, which shrank down to a single point: the transit lounge at Sheremetyevo. Then, having by its own action trapped him in Russia, the administration mocked and reviled him for remaining in an authoritarian country. Only in unfree countries was Edward Snowden welcome. What we are pleased to call the “free world” had become a giant prison for a hero of freedom. 5. Domestic spying is antithetical to basic democratic principles Zach Beauchamp, “A Guide to Thinking about NSA Surveillance and Democracy,” THINK PROGRESS, 8—6—13, http://thinkprogress.org/security/2013/08/06/2423191/surveillance-democracy-nsa/, accessed 2-22-15. The issue’s actually more basic that Rosen makes it to be. Spying itself is intrinsically at odds with democratic governance and yet simultaneously something virtually all of us believe the state should be doing, at least to a certain degree. Understanding how to square that theoretical circle clarifies how we should think about the relationship between democracy and the NSA. Democracies, like plants, thrive on sunlight. The heart of a democracy, the idea of government by the consent of the governed, requires that the governed know enough about how they are being governed in order to give real consent. If the government wouldn’t tell me, say, what it was doing with the economy, it’d be hard to argue that I was consenting in any real sense to the economic policies of the current government. Spying is by its very nature antithetical to this basic democratic principle. The CIA, NSA, DIA, and all the other sneaky government organizations whose acronym ends in “A” need to do their work in secret for it to be effective at all. An operation to, say, sabotage Iran’s nuclear program with a computer virus is not the sort of thing that can be announced publicly before launch. So long as we think that some kind of international spying and covert operations is critical to national security (which, even if the specific Iran example isn’t, it in principle almost certainly is), then it seems like we’re consigned to a future in which a significant part of the government is tasked with doing things that can’t in principle be democratically authorized by American citizens. 58 Paradigm Research 2015-2016 CX—Electronic Communication Aff Democracy Adv: Internal Link—General [cont’d] 6. Mass surveillance threatens our democratic form of government—chills dissent Kate Martin, Center for National Security Studies, Testimony before the House Judiciary Committee, 7—17—13, lexis. As others have detailed, there are serious questions whether these bulk collection programs are within the intended statutory authorizations, e.g., the domestic telephony meta-data program under sec. 215. There are serious constitutional concerns about the breadth of and lack of individualized suspicion or particularity in these programs. And there are serious questions whether the secrecy built into the programs is constitutional and whether it is consistent with effective oversight or a working system of checks and balances. In examining these authorities and programs, it is important to review not only whether private information about Americans held in government databases is adequately protected from rogue employees or contractors stealing or misusing the information. While safeguards are needed against that kind of privacy abuse, the more important danger is that there are inadequate safeguards against government violations of the law or against deliberate misuse of the information to target the government’s political opponents, chill dissent or unconstitutionally profile minority communities. As the original Framers recognized, all governments may succumb to the temptations of power. In my lifetime Senator McCarthy smeared civil servants, the FBI tried to blackmail Dr. Martin Luther King in order to weaken the civil rights movement, President Nixon created an enemies list of his political opponents, and the Justice Department wrote a secret legal opinion that the President could break the law in secret if he deemed it necessary for national security. 59 Paradigm Research 2015-2016 CX—Electronic Communication Aff Democracy Adv: Internal Link—Modeling 1. U.S. programs are modeled—threatens democratic governance Eileen Donahoe, Visiting Scholar, Freeman Spogli Institute for International Studies, Stanford University and former U.S. Ambassador to the U.N. Human Rights Council, “Why the NSA Undermines National Security,” REUTERS, 3—6—14, http://blogs.reuters.com/great-debate/2014/03/06/why-nsa-surveillance-undermines-national-security/, accessed 3-14-15. The U.S. model of mass surveillance will be followed by others and could unintentionally invert the democratic relationship between citizens and their governments. Under the cover of preventing terrorism, authoritarian governments may now increase surveillance of political opponents. Governments that collect and monitor digital information to intimidate or squelch political opposition and dissent can more justifiably claim they are acting with legitimacy. For human rights defenders and democracy activists worldwide, the potential consequences of the widespread use by governments of mass surveillance techniques are dark and clear. Superior information is powerful, but sometimes it comes at greater cost than previously recognized. When trust and credibility are eroded, the opportunity for collaboration and partnership with other nations on difficult global issues collapses. The ramifications of this loss of trust have not been adequately factored into our national security calculus. 2. Our surveillance systems invite abuse by other countries Bruce Schneier, journalist and author, “How the NSA Threatens National Security,” THE ATLANTIC, 1—6—14, www.theatlantic.com/technology/archive/2014/01/how-the-nsa-threatens-national-security/282822/#about-the-authors, accessed 2-1915. And finally, these systems are susceptible to abuse. This is not just a hypothetical problem. Recent history illustrates many episodes where this information was, or would have been, abused: Hoover and his FBI spying, McCarthy, Martin Luther King Jr. and the civil rights movement, anti-war Vietnam protesters, and—more recently—the Occupy movement. Outside the U.S., there are even more extreme examples. Building the surveillance state makes it too easy for people and organizations to slip over the line into abuse. It's not just domestic abuse we have to worry about; it's the rest of the world, too. The more we choose to eavesdrop on the Internet and other communications technologies, the less we are secure from eavesdropping by others. Our choice isn't between a digital world where the NSA can eavesdrop and one where the NSA is prevented from eavesdropping; it's between a digital world that is vulnerable to all attackers, and one that is secure for all users. 60 Paradigm Research 2015-2016 CX—Electronic Communication Aff Democracy Adv: Internal Link—NSA 1. We need to increase accountability in our NSA programs—is vital to democracy Kevin Bankston, Policy Director, Open Technology Institute, New America Foundation, Center for Democracy and Technology, Testimony before the Senate Judiciary Committee, Subcommittee on Privacy, Technology and the Law, 11—13—13, www.judiciary.senate.gov/imo/media/doc/11-13-13BankstonTestimony.pdf, accessed 3-10-15. Democracy requires accountability, and accountability requires transparency. As Congress recognized when it imposed detailed reporting requirements regarding law enforcement wiretaps, public understanding of how the government uses its surveillance powers is a critical check on abuse. The need for such a check is even greater in the context of national security investigations, where the vagueness and breadth the government’s mandate, the greater level of secrecy, and the lack of traditional checks and balances like individualized and particularized probable cause-based warrants and adversarial proceedings in open courts, all heighten the risk of overreach and abuse. Detailed government reporting on how national security surveillance authorities are being used is critical to maintaining accountability. However, neither the rudimentary reporting that is currently required by law, which is basically a tally of the number of different types of orders issued, nor the additional annual reporting promised in August by the Director of National Intelligence, is sufficient. That is because neither the statutorily required reporting nor the DNI’s voluntary reporting give any indication of how many people are actually having their data provided to or obtained by the government under any particular legal authority. Indeed, the limited additional reporting proposed by the DNI—which would only indicate how many individuals have had their data “targeted” by the government—would be affirmatively misleading. For example, the DNI’s proposed reporting for 2012 would only have indicated that around 300 individuals had their data “targeted” under Section 215 of the PATRIOT Act. Yet we now know that the government has used Section 215 of the PATRIOT Act to obtain the phone records of everyone in the country. Such falsely reassuring reporting would do more harm than good. 2. NSA activities threaten our democratic system of government Jameel Jaffer, Deputy Legal Director, ACLU Foundation and Laura W. Murphy, Director, Washington Legislative Office, ACLU, Testimony before the House Judiciary Committee, 7—17—13, http://www.fed-soc.org/publications/detail/jameel-jaffer-and-lauramurphy-testimony-before-the-house-committee-on-the-judiciary-oversight-hearing-on-the-administrations-use-of-fisa-authorities, accessed 2-22-15. To say that the NSA‘s activities present a grave danger to American democracy is no overstatement. Thirty-seven years ago, after conducting a comprehensive investigation into the intelligence abuses of the previous decades, the Church Committee warned that inadequate regulations on government surveillance ―threaten[ed] to undermine our democratic society and fundamentally alter its nature.‖ This warning should have even more resonance today, because in recent decades the NSA‘s resources have grown, statutory and constitutional limitations have been steadily eroded, and the technology of surveillance has become exponentially more powerful. Because the problem Congress confronts today has many roots, there is no single solution to it. It is crucial, however, that Congress take certain steps immediately. It should amend relevant provisions of FISA to prohibit suspicionless, ―dragnet‖ monitoring or tracking of Americans‘ communications. It should require the publication of past and future FISC opinions insofar as they evaluate the meaning, scope, or constitutionality of the foreign-intelligence laws. It should ensure that the public has access to basic information, including statistical information, about the government‘s use of new surveillance authorities. It should also hold additional hearings to consider further amendments to FISA—including amendments to make FISC proceedings more transparent. 3. The NSA program is a massive threat to core democratic principles John Prados, senior fellow, National Security Archive, “Demystifying the NSA Surveillance Program,” HISTORY NEWS NETWORK, 7—15—13, http://hnn.us/article/152605, accessed 2-22-15. A key purpose of law is to prevent the state from trampling the rights of citizens. Here the state has the capability to spy and the citizen has no protection. That Big Brother is watching does not make it right—or legal. The assumption that government will eavesdrop anyway is simply an excuse to avoid the debate which has become so crucial. The fact is that the Fourth Amendment to the Constitution ensures the privacy of the individual in person, property, and effects. The cellphone/notebook/laptop/pc and their contents are personal effects. The surveillance program which targets externals and leads to the surveillance of effects is a plain violation of the Constitution no matter what the excuse. The existence of case law that holds a person has no reasonable expectation of privacy in communications externals—or as quaintly phrased in the Patriot Act, “business records”—merely reflects the history that relevant cases were decided before eavesdropping techniques became as sophisticated as they now are. Individuals cannot even be recognized as standing before the courts to bring suit against these practices, and Government is the only party in actions at the FISC, whose proceedings and decisions are secret. Scarier still, the accumulated NSA database and more intrusive “take” will be used as tools of investigations aimed at ordinary people. The NSA database amounts to a buzz saw hanging over the heads of citizens. This entire framework is a violation of democratic principles. It needs to become part of the debate. 61 Paradigm Research 2015-2016 CX—Electronic Communication Aff Democracy Adv: Impact Ext 1. Democracy is good--decreases war, prolif, famine, terrorism, bolsters U.S. interests Morton H. Halperin, senior advisor, Open Society Institute, "Unconventional Wisdom," FOREIGN POLICY, January/February 2011, www.foreignpolicy.com/articles/2011/01/02/unconventional_wisdom?page=0,11, accessed 6-7-15. For there is one thing the neocons get right: As I argue in The Democracy Advantage, democratic governments are more likely than autocratic regimes to engage in conduct that advances U.S. interests and avoids situations that pose a threat to peace and security. Democratic states are more likely to develop and to avoid famines and economic collapse. They are also less likely to become failed states or suffer a civil war. Democratic states are also more likely to cooperate in dealing with security issues, such as terrorism and proliferation of weapons of mass destruction. As the bloody aftermath of the Iraq invasion painfully shows, democracy cannot be imposed from the outside by force or coercion. It must come from the people of a nation working to get on the path of democracy and then adopting the policies necessary to remain on that path. But we should be careful about overlearning the lessons of Iraq. In fact, the outside world can make an enormous difference in whether such efforts succeed. There are numerous examples-starting with Spain and Portugal and spreading to Eastern Europe, Latin America, and Asia-in which the struggle to establish democracy and advance human rights received critical support from multilateral bodies, including the United Nations, as well as from regional organizations, democratic governments, and private groups. It is very much in America's interest to provide such assistance now to new democracies, such as Indonesia, Liberia, and Nepal, and to stand with those advocating democracy in countries such as Belarus, Burma, and China. It will still be true that the United States will sometimes need to work with a nondemocratic regime to secure an immediate objective, such as use of a military base to support the U.S. mission in Afghanistan, or in the case of Russia, to sign an arms-control treaty. None of that, however, should come at the expense of speaking out in support of those struggling for their rights. Nor should we doubt that America would be more secure if they succeed. 2. Democracy locks in U.S. leadership--multiple reasons Paul D. Miller, Assistant Professor, International Security Affairs, National Defense University, "American Grand Strategy and the Democratic Peace," SURVIVAL v. 54 n. 2, April-May 2012, p. 60. Promoting democracy also fits naturally with other long-standing components of US grand strategy. Washington has, for example, long sought to prevent the rise of a hostile hegemon in strategically important areas of the world – especially Europe or East Asia – by maintaining a favourable balance of power through military dominance and a network of allies. Preventing hegemony has rightly animated US policy for generations, from its tack-and-weave between Britain and France from 1776 to 1815 to its involvement in both World Wars and the Cold War. A commitment to democracy is, in a sense, the corollary to resistance to hegemony, as democratic systems are defined by a diffusion of power among many actors, thus limiting the chances for tyranny. The same holds internationally: the United States should work to keep power diffused among many sovereign states and international organisations to prevent the rise of a hostile, coercive hegemon. Regimes committed to those ideals at home are more likely to apply them abroad, while autocracies are more likely to seek to expand their power at others’ expense, both domestically and internationally. The growth of democracy abroad alters the balance of power in the United States’ favour 3. Democracy is the best form of government--protects liberty, checks corruption Francis Fukuyama, Professor, International Political Economy, School of Advanced International Studies, Johns Hopkins University and Michael McFaul, senior fellow, Hoover Institution, "Should Democracy Be Promoted or Demoted?" Stanley Foundation, 6--07, p. 4. First and foremost, democracy is the best system of government. Winston Churchill was right: democracy is a terrible system of government, but still better than all of the others that have been tried. Democracy provides the best institutional form for holding rulers accountable to their people. If leaders must compete for popular support to obtain and retain power, then they will be more responsive to the preferences of the people, in contrast to rulers who do not govern on the basis of popular support. The institutions of democracy also prevent abusive rule, constrain bad rule, and provide a mechanism for removing corrupt or ineffective rule. Furthermore, democracy provides the setting for political competition, which in turn is a driver for better governance. Like markets, political competition between contending leaders, ideas, and organizations produces better leaders, ideas, and organizations (which is the premise of the Bridging the Foreign Policy Divide project). At a minimum, democracy provides a mechanism for removing bad rulers in a way that autocracy does not. The absence of political competition in autocracies produces complacency, corruption, and has no mechanism for producing new leaders. 62 Paradigm Research 2015-2016 CX—Electronic Communication Aff Internet Adv: Brinks 1. The entire future of Internet governance hangs in the balance Laura K. Donohue, Professor, Law, Georgetown University, “High Technology, Consumer Privacy, and U.S. National Security,” BUSINESS LAW REVIEW (forthcoming), 2015, p. 11, http://scholarship.law.georgetown.edu/cgi/viewcontent.cgi?article=2469&context=facpub, accessed 5-9-15. In the wake of the Snowden documents, ICANN and Brazil have formed an alliance, condemning U.S. actions. Concern about the latest revelations spurred a major conference in April 2014, the Global Multistakeholder Conference on the Future of Internet Governance. The purpose of the meeting, which was held in Sao Paulo, was “to produce universal internet principles and an institutional framework for multi-stakeholder Internet governance.” It is not clear how the newest shifts will be resolved—either temporarily or in the future. But significant questions have been raised: How should the Internet governance be structured to ensure legitimacy and compliance? Who gets to make the decision about what such governance looks like? Which bodies have the authority to establish future rules and procedures? How are such bodies constituted and who selects their membership? These questions are fundamentally at odds with the decentralization tendencies in the Internet—tendencies that have been exaggerated post-Snowden as a result of regional efforts to expand the local sphere of influence and to protect consumer and state privacy from U.S. surveillance. The U.S. government’s failure to address the situation domestically has undermined the tech industry. Despite calls from the companies for legislative reform to address the breadth of the NSA programs, there has been no significant shift that would allow companies to approach their customers to say, with truth, that the situation has changed. Resultantly, American companies are losing not just customers, but also the opportunity to submit proposals for contracts for which they previously would have been allowed to compete. The future of Internet governance hangs in the balance. 2. There is a growing push for national regulation of the Internet—we need to combat it James L. Gattuso, Senior Research Fellow, SAVING INTERNET FREEDOM, Special Report n. 168, Heritage Foundation, 6—3—15, p. 2. But these changes are not universally welcomed. The disruptive force of the Internet is a threat to those who have enjoyed unchallenged political power and economic rents from the status quo ante. This has led to attempts by governments around the world to limit its use, and forestall the changes that it makes possible. The trend is disturbing. In its 2014 survey of the state of Internet freedom around the globe, Freedom House records the fourth straight year of declining freedom on the Net. From 2013 to 2014, Freedom House found 41 countries passing or proposing online-speech restrictions and arrests related to online political speech in 38 countries. Moreover, it reports continued widespread blocking and filtering of online content by governments, as well as government-sponsored cyberattacks against other countries’ governments and businesses. Infringements on the Internet are not limited to the world’s dictatorships. The European Union, for example, recently required search engines, upon request, to remove links to categories of personal information, such as prior bankruptcies, which courts deem no longer relevant or lack a compelling public interest meriting disclosure—in effect forcing search engines, such as Google, to censor content. 3. The door is open to global regulation—U.S. stepping down from ICANN leadership role James L. Gattuso, Senior Research Fellow, SAVING INTERNET FREEDOM, Special Report n. 168, Heritage Foundation, 6—3—15, p. 2. Global Internet governance. Many nations, such as China and Russia, have made no secret of their desire to limit speech on the Internet. Even some democratic nations have supported limiting freedoms online. With the U.S. government’s decision to end its oversight of the Internet Corporation for Assigned Names and Numbers (ICANN), the private, nonprofit organization that manages name and number assignments on the Internet, these countries see a chance to fill the vacuum, and to use ICANN’s Internet governance role to limit expression on the Web. 63 Paradigm Research 2015-2016 CX—Electronic Communication Aff Internet Adv: Internal Link—Topshelf 1. The surveillance program imposes enormous costs—undermines our economy, internet freedom, diplomacy, and cybersecurity Danielle Kehl et al., policy analyst, “Surveillance Costs: The NSA’s Impact on the Economy, Internet Freedom & Cybersecurity,” POLICY PAPER, Open Technology Institute, New America, 7—14, p. 2. While intelligence officials have vigorously defended the merits of the NSA programs, they have offered little hard evidence to prove their value—and some of the initial analysis actually suggests that the benefits of these programs are dubious. Three different studies— from the President’s Review Group on Intelligence and Communications Technologies, the Privacy and Civil Liberties Oversight Board, and the New America Foundation’s International Security Program—question the value of bulk collection programs in stopping terrorist plots and enhancing national security. Meanwhile, there has been little sustained discussion of the costs of the NSA programs beyond their impact on privacy and liberty, and in particular, how they affect the U.S. economy, American foreign policy, and the security of the Internet as a whole. This paper attempts to quantify and categorize the costs of the NSA surveillance programs since the initial leaks were reported in June 2013. Our findings indicate that the NSA’s actions have already begun to, and will continue to, cause significant damage to the interests of the United States and the global Internet community. Specifically, we have observed the costs of NSA surveillance in the following four areas: • Direct Economic Costs to U.S. Businesses: American companies have reported declining sales overseas and lost business opportunities, especially as foreign companies turn claims of products that can protect users from NSA spying into a competitive advantage. The cloud computing industry is particularly vulnerable and could lose billions of dollars in the next three to five years as a result of NSA surveillance. • Potential Costs to U.S. Businesses and to the Openness of the Internet from the Rise of Data Localization and Data Protection Proposals: New proposals from foreign governments looking to implement data localization requirements or much stronger data protection laws could compound economic losses in the long term. These proposals could also force changes to the architecture of the global network itself, threatening free expression and privacy if they are implemented. • Costs to U.S. Foreign Policy: Loss of credibility for the U.S. Internet Freedom agenda, as well as damage to broader bilateral and multilateral relations, threaten U.S. foreign policy interests. Revelations about the extent of NSA surveillance have already colored a number of critical interactions with nations such as Germany and Brazil in the past year. • Costs to Cybersecurity: The NSA has done serious damage to Internet security through its weakening of key encryption standards, insertion of surveillance backdoors into widely-used hardware and software products, stockpiling rather than responsibly disclosing information about software security vulnerabilities, and a variety of offensive hacking operations undermining the overall security of the global Internet. 2. NSA programs are dangerous—undermine creativity and innovation, democracy, and counterterrorism cooperation Stephen Schulhofer, Professor, Law, New York University, “Making Sense of the NSA Metadata Collection Program (Part II),” JUST SECURITY, 11—8—13, http://justsecurity.org/2985/making-sense-nsa-metadata-collection-program-part-ii/, accessed 2-27-15. In this post I turn a spotlight on the first of those two crucial points. The fact is that despite its undeniable value (its potential to catch the elusive terrorist who might otherwise evade law enforcement attention), the NSA program has costly side effects. Three in particular stand out – metadata surveillance will stultify the vibrancy and creativity that drive America’s cultural and economic success; it will undermine freedom of the press and democratic deliberation; and – paradoxically – it will even weaken the effectiveness of the counterterrorism effort itself. The drawbacks are so acute that no thoughtful supporter of a strong counterterrorism machinery should rest content with the observation that metadata collection can pay off in various actual or hypothetical scenarios. Whether our top priority is the defense of civil liberties or prevention of the next attack, in either case it is imperative to seek out alternatives that promise similar advantages without the NSA program’s dangerous consequences. In a subsequent installment of this comment, I will focus on concrete ways that viable threshold requirements for data acquisition, together with stronger mechanisms of accountability, transparency and independent oversight, can preserve virtually all of the NSA program’s value at considerably lower cost to our democracy and to law enforcement itself. 64 Paradigm Research 2015-2016 CX—Electronic Communication Aff Internet Adv: Internal Link—China 1. China is using “sovereignty” justifications to confound U.S. efforts to promote an open Internet Amy Chang, Research Associate, Center for a New American Security, “How the ‘Internet with Chinese Characteristics’ Is Rupturing the Web,” HUFFINGTON POST, 2—14—15, www.huffingtonpost.com/amy-chang-/china-internet-sovereignty_b_6325192.html, accessed 3-2-15. China is openly undermining the United States' vision of a free and open Internet. Motivated by maintaining the fragile balance between information control, social and political stability, and continued modernization and economic growth for an online population of over 600 million, the Chinese government is attempting to alter how nations understand their role in Internet governance through a concept called "Internet sovereignty." Internet sovereignty refers to the idea that a country has the right to control Internet activity within its own borders, and it is what China refers to as a natural extension of a nation-state's authority to handle its own domestic and foreign affairs. For the United States and other Western nations, however, Internet governance is delegated to an inclusive and distributed set of stakeholders including government, civil society, the private sector, academia, and national and international organizations (also known as the multi-stakeholder model of Internet governance). Lu Wei, the head of the State Internet Information Office and the director of a powerful cybersecurity strategy group comprised of China's top leaders, is the administrative ringleader of the Chinese Internet. With a long background working in China's propaganda apparatus, Lu has been behind China's recent campaigns promoting its conception of Internet sovereignty abroad, including a trip to Washington D.C. and Silicon Valley in the first week of December. 2. The NSA problems are adding momentum to Chinese efforts Amy Chang, Research Associate, Center for a New American Security, “How the ‘Internet with Chinese Characteristics’ Is Rupturing the Web,” HUFFINGTON POST, 2—14—15, www.huffingtonpost.com/amy-chang-/china-internet-sovereignty_b_6325192.html, accessed 3-2-15. China has engaged the international community on this front, wishing to signal to other countries that it is a responsible and cooperative actor on technology issues. Understanding that international norms and law have yet to codify Internet governance and cyber activity, China has invested significant effort to set the course for international norms in Internet governance. China's push for Internet sovereignty gained momentum abroad after Edward Snowden released information about U.S. National Security Agency surveillance programs. Capitalizing on the anti-U.S. sentiment in other authoritarian countries like Russia, Iran, and Saudi Arabia, China wooed developing countries with growing online populations to consider the benefits of control of the Internet. 65 Paradigm Research 2015-2016 CX—Electronic Communication Aff Internet Adv: Internal Link—China [cont’d] 3. The surveillance programs are driving countries into the arms of Russia and China—they gut our Internet freedom efforts Danielle Kehl et al., policy analyst, “Surveillance Costs: The NSA’s Impact on the Economy, Internet Freedom & Cybersecurity,” POLICY PAPER, Open Technology Institute, New America, 7—14, p. 21-22. However, the Internet governance conversation took a dramatic turn after the Snowden disclosures. The annual meeting of the Freedom Online Coalition occurred in Tunis in June 2013, just a few weeks after the initial leaks. Unsurprisingly, surveillance dominated the conference even though the agenda covered a wide range of topics from Internet access and affordability to cybersecurity. Throughout the two-day event, representatives from civil society used the platform to confront and criticize governments about their monitoring practices. NSA surveillance would continue to be the focus of international convenings on Internet Freedom and Internet governance for months to come, making civil society representatives and foreign governments far less willing to embrace the United States’ Internet Freedom agenda or to accept its defense of the multi-stakeholder model of Internet governance as a anything other than self-serving. “One can come up with all kinds of excuses for why US surveillance is not hypocrisy. For example, one might argue that US policies are more benevolent than those of many other regimes… And one might recognize that in several cases, some branches of government don’t know what other branches are doing… and therefore US policy is not so much hypocritical as it is inadvertently contradictory,” wrote Eli Dourado, a researcher from the Mercatus Center at George Mason University in August 2013. “But the fact is that the NSA is galvanizing opposition to America’s internet freedom agenda.” The scandal revived proposals from both Russia and Brazil for global management of technical standards and domain names, whether through the ITU or other avenues. Even developing countries, many of whom have traditionally aligned with the U.S. and prioritize access and affordability as top issues, “don’t want US assistance because they assume the equipment comes with a backdoor for the NSA. They are walking straight into the arms of Russia, China, and the ITU.” Consequently, NSA surveillance has shifted the dynamics of the Internet governance debate in a potentially destabilizing manner. The Snowden revelations “have also been well-received by those who seek to discredit existing approaches to Internet governance,” wrote the Center for Democracy & Technology’s Matthew Shears. “There has been a long-running antipathy among a number of stakeholders to the United States government’s perceived control of the Internet and the dominance of US Internet companies. There has also been a long-running antipathy, particularly among some governments, to the distributed and open management of the Internet.” Shears points out that evidence of the NSA’s wide-ranging capabilities has fueled general concerns about the current Internet governance system, bolstering the arguments of those calling for a new government-centric governance order. At the UN Human Rights Council in September 2013, the representative from Pakistan—speaking on behalf of Cuba, Venezuela, Zimbabwe, Uganda, Ecuador, Russia, Indonesia, Bolivia, Iran, and China—explicitly linked the revelations about surveillance programs to the need for reforming Internet governance processes and institutions to give governments a larger role. Surveillance issues continued to dominate the conversation at the 2013 Internet Governance Forum in Bali as well, where “debates on child protection, education and infrastructure were overshadowed by widespread concerns from delegates who said the public’s trust in the internet was being undermined by reports of US and British government surveillance.” 66 Paradigm Research 2015-2016 CX—Electronic Communication Aff Internet Adv: Internal Link—General 1. The NSA programs are undermining the effectiveness of the U.S.’s global internet policy Kim Zetter, journalist, “Personal Privacy Is Only One of the Costs of NSA Surveillance,” WIRED, 7—29—14, www.wired.com/2014/07/the-big-costs-of-nsa-surveillance-that-no-ones-talking-about/, accessed 2-19-15. Finally, the NSA’s spying activities have greatly undermined the government’s policies in support of internet freedom around the world and its work in advocating for freedom of expression and combating censorship and oppression. “As the birthplace for so many of these technologies, including the internet itself, we have a responsibility to see them used for good,” then-Secretary of State Hillary Clinton said in a 2010 speech launching a campaign in support of internet freedom. But while “the US government promotes free expression abroad and aims to prevent repressive governments from monitoring and censoring their citizens,” the New American report notes, it is “simultaneously supporting domestic laws that authorize surveillance and bulk data collection.” The widespread collection of data, which has a chilling effect on freedom of expression, is precisely the kind of activity for which the U.S. condemns other countries. This hypocrisy has opened a door for repressive regimes to question the US role in internet governance bodies and has allowed them to argue in favor of their own governments having greater control over the internet. At the UN Human Rights Council in September 2013, the report notes, a representative from Pakistan—speaking on behalf of Cuba, Iran, China and other countries—said the surveillance programs highlighted the need for their nations to have a greater role in governing the internet. 2. The programs threaten our Internet freedom agenda Danielle Kehl and Kevin Bankston, Open Technology Institute, “A Year After Snowden, the Real Costs of NSA Surveillance,” CNN, 6—4—14, www.cnn.com/2014/06/04/opinion/kehl-bankston-nsa-surveillance/, accessed 2-20-15. NSA's surveillance programs have also impacted U.S. foreign policy goals and hurt our relations with strategic allies, as we've found in preparing for an upcoming report on the topic. The credibility of the Internet Freedom agenda, a major initiative launched by Secretary of State Hillary Clinton in 2010, has been sapped. Russia and China, which have sought to exert greater control over the Internet for many years, are growing more skeptical of the American role in governance of the Internet. German Chancellor Angela Merkel was enraged to discover that the NSA had listened to calls on her personal cell phone, creating tension between the United States and Germany as the two must work together on issues such as the Ukraine crisis. Brazilian President Dilma Rousseff became the first world leader to turn down a state dinner with the President of the United States. 3. NSA surveillance has undermined our ability to head off national Internet regulation—is in a holding pattern now Brett D. Schaefer, Senior Research Fellow, “Internet Governance: Past, Present, Future,” SAVING INTERNET FREEDOM, Special Report n. 168, Heritage Foundation, 6—3—15, p. 12. Unfortunately, the leaking of National Security Agency (NSA) surveillance in 2013 eroded the support that the U.S. had in these debates, despite the fact that NSA surveillance has nothing to do with the NTIA’s oversight of ICANN, and spurred renewed efforts to end U.S. oversight of ICANN. The NTIA announcement of March 2014 temporarily blunted these calls. NETmundial’s Global Multistakeholder Meeting on the Future of Internet Governance in 2014 in Brazil, at which many countries were believed to be poised to call for U.N. oversight of the Internet, instead ended up endorsing the bottom-up, multi-stakeholder-driven model for Internet governance that the U.S. supports. Similarly, the 2014 ITU Plenipotentiary Conference in Busan, South Korea, could have been a more lopsided replay of the WCIT, but ended up not adopting measures to extend ITU authority to cover the Internet, with a large number of countries endorsing the multistakeholder model for Internet governance. In essence, the debate is on hold until everyone can digest the results of the IANA stewardship and accountability transition proposals currently being developed by ICANN and the multi-stakeholder community. Once finalized, these proposals will be reviewed and approved by the multi-stakeholder community, the ICANN board of directors, and the NTIA. 67 Paradigm Research 2015-2016 CX—Electronic Communication Aff Internet Adv: Internal Link—General [cont’d] 4. Our surveillance programs undermine our capacity to promote international internet freedom Human Rights Watch, “Human Rights Watch Comments for the Review Group on Intelligence and Communications Technologies,” 10—11—13, www.hrw.org/news/2013/10/11/human-rights-watch-comments-review-group-intelligence-and-communicationstechnologie, accessed 2-18-15. The impact surveillance programs have on fundamental human rights and on Internet governance policies globally should be of concern to the Review Group and fall within the Review Group’s mandate. A. Internet Freedom and Human Rights Since at least 2010, the Obama administration has made Internet freedom a signature foreign policy priority. The US has been instrumental in attracting allies to take part in the Freedom Online Coalition of governments and promoting human rights online at key international venues like the UN Human Rights Council and the Internet Governance Forum. In 2013 alone, the State Department and USAID awarded $25 million to “groups working to advance Internet freedom -- supporting counter-censorship and secure communications technology, digital safety training, and policy and research programs for people facing Internet repression.” Today, however, the US government’s ability to promote Internet freedom at the global level has been deeply undermined by revelations about US surveillance programs. By ignoring the privacy interests of non-US persons, in both law and rhetoric, the US has alienated key allies and undermined its moral standing on Internet freedom, making diplomatic efforts to challenge abuses to the right to privacy and freedom of expression abroad less effective. 68 Paradigm Research 2015-2016 CX—Electronic Communication Aff Internet Adv: Internal Link—Hypocrisy 1. Current surveillance hurts our diplomacy—opens us to accusations of hypocrisy Richard Fontaine, Senior Fellow, “Bringing Liberty Online: Reenergizing the Internet Freedom Agenda in a Post-Snowden Era,” POLICY BRIEF, Center for a New American Security, 9—14, p. 5. While continuing to execute the Internet freedom agenda, U.S. officials have attempted to reconcile their government’s surveillance practices with its expressed desire for greater online freedom. This is challenging, to say the least. U.S. officials draw a critical distinction between monitoring communications for purposes of protecting national security and surveillance aimed at repressing political speech and activity. While this distinction is intuitive to many Americans, it is likely to be lost on many others, particularly where autocratic regimes consider domestic political dissent to be a national security threat. At its bluntest, the American position is that it is legitimate, for example, for the U.S. government, but not for the Chinese government, to surveil Chinese citizens. This is and will remain a tough sell. 2. The programs compromise U.S. efforts to promote an open internet—charges of hypocrisy Danielle Kehl et al., policy analyst, “Surveillance Costs: The NSA’s Impact on the Economy, Internet Freedom & Cybersecurity,” POLICY PAPER, Open Technology Institute, New America, 7—14, p. 21. Although there were questions from the beginning about whether the United States would hold itself to the same high standards domestically that it holds others to internationally, the American government has successfully built up a policy and programming agenda in the past few years based on promoting an open Internet. These efforts include raising concerns over Internet repression in bilateral dialogues with countries such as Vietnam and China, supporting initiatives including the Freedom Online Coalition, and providing over $120 million in funding for “groups working to advance Internet freedom – supporting counter-censorship and secure communications technology, digital safety training, and policy and research programs for people facing Internet repression.” However, the legitimacy of these efforts has been thrown into question since the NSA disclosures began. “Trust has been the principal casualty in this unfortunate affair,” wrote Ben FitzGerald and Richard Butler in December 2013. “The American public, our nation’s allies, leading businesses and Internet users around the world are losing faith in the U.S. government’s role as the leading proponent of a free, open and integrated global Internet.” 3. Broader Western hypocrisy in Internet counter-terror fuels authoritarian regulations Evgeny Morozov, Fellow, New America Foundation and Visiting Scholar, Stanford University, THE NET DELUSION: THE DARK SIDE OF INTERNET FREEDOM, 2011, New York: Public Affairs, p. 224. As long as Western governments regulate the Internet out of concerns for terrorism or crime, as they currently aspire to, they also legitimize similar efforts—but this time done primarily for political reasons—undertaken by authoritarian governments. Even worse, in areas like cybercrime, the military and intelligence communities on both sides of the Atlantic would actually be quite happy to see Russian and Chinese governments establish stronger control over their respective national Internets. The West’s own desire to have those governments do something about uncontrollable, even if hardly devastating, cyber-attacks that are regularly unleashed by their hacker populations trumps the impetus to promote abstract goods like Internet freedom simply because the security of America’s own trade secrets always comes before the security of foreigners’ social networking profiles. 69 Paradigm Research 2015-2016 CX—Electronic Communication Aff Internet Adv: Internal Link—Global Governance / ITU 1. Surveillance policies undermine our ability to maintain a multistakeholder Internet governance model Richard A. Clarke et al., President’s Review Group on Intelligence and Communications Technologies, LIBERTY AND SECURITY IN A CHANGING WORLD, Report and Recommendations, 12—12—13, p. 214-216. The United States has strongly supported an inclusive multi-stakeholder model of Internet governance in order to maintain and expand a globally interoperable, open, and secure Internet architecture to which all people have access. This multi-stakeholder approach incorporates input from industry, governments, civil society, academic institutions, technical experts, and others. This approach has emphasized the primacy of interoperable and secure technical standards, selected with the help of technical experts. A competing model, favored by Russia and a number of other countries, would place Internet governance under the auspices of the United Nations and the International Telecommunications Union (ITU). This model would enhance the influence of governments at the expense of other stakeholders in Internet governance decisions, and it could legitimize greater state control over Internet content and communications. In particular, this model could support greater use of “localization” requirements, such as national laws requiring servers to be physically located within a country or limits on transferring data across borders. The press revelations about US surveillance have emboldened supporters of localization requirements for Internet communications. Brazil, Indonesia, and Vietnam have proposed requiring e-mails and other Internet communications to be stored locally, in the particular country. Although generally favoring the multi-stakeholder approach to many Internet governance issues, the EU has also shifted in the direction of localization requirements. In the second half of 2013, the EU Parliament voted in favor of a proposal to limit international data flows; this provision would prohibit responding to lawful government requests, including from the US courts and government, until release of such records were approved by a European data protection authority. Public debate has suggested a possible mix of motives supporting such localization requirements, including (1) concern about how records about their citizens will be treated in the US; (2) support for local cloud providers and other information technology companies with the effect of reducing the market share of US providers; and (3) use of the localization proposals as a way to highlight concerns about US intelligence practices and create leverage for possible changes in US policy. Whatever the mix of motives, press reports about US surveillance have posed new challenges for the longstanding US policy favoring the multi-stakeholder approach to Internet governance as well as US opposition to localization requirements. 2. Governments are increasingly turning to legal regimes to restrict Internet freedom Vauhini Vara, journalist, “The World Cracks Down on the Internet,” NEW YORKER, 12—4—14, www.newyorker.com/tech/elements/world-cracks-internet, accessed 6-1-15. What’s behind the decline in Internet freedom throughout the world? There could be several reasons for it, but the most obvious one is also somewhat mundane: especially in countries where people are just beginning to go online in large numbers, governments that restrict freedom offline—particularly authoritarian regimes—are only beginning to do the same online, too. What’s more, governments that had been using strategies like blocking certain Web sites to try to control the Internet are now realizing that those approaches don’t actually do much to keep their citizens from seeing content that the governments would prefer to keep hidden. So they’re turning to their legal systems, enacting new laws that restrict how people can use the Internet and other technologies. “There is definitely a sense that the Internet offered this real alternative to traditional media—and then government started playing catch-up a little bit,” Earp told me. “If a regime has developed laws and practices over time that limit what the traditional media can do, there’s that moment of recognition: ‘How can we apply what we learned in the traditional media world online?’ ” 70 Paradigm Research 2015-2016 CX—Electronic Communication Aff Internet Adv: Internal Link—Global Governance / ITU [cont’d] 3. Spying opens the door for stronger international controls of the Internet Steffan Rhys, journalist, “Edward Snowden Leaks ‘Could Put Internet Freedoms at Risk’,” WALES ONLINE, 11—20—13, lexis. The internet's freedoms could be at risk as governments seek to exploit the Edward Snowden leaks to increase their power and influence, a Conservative MP has warned. Alun Cairns (Vale of Glamorgan) said some nations were questioning the US government's relationship with the inter-net and intending to change it in the wake of intelligence exposed by the former National Security Agency contractor. But Mr Cairns said the internet's contents, innovation and investment could be at risk as some countries, which would envy the US's reputation for protecting human rights and freedom of expression, sought greater control. He explained the internet's numbering and naming system is operated by the Internet Corporation for Assigned Names and Numbers (Icann) under a US government contract, which some nations were seeking to change. Mr Cairns told a Westminster Hall debate on governance of the internet: "While the internet is renowned for being a worldwide network free from central control and co-ordination, there is a technical need for some key parts of the internet to be globally coordinated and this co-ordination role is undertaken by Iana (Internet Assigned Numbers Authority). "The Icann performs the Iana functions under the US government contract and I think that is particularly relevant. "It is this relationship with the US government that some organisations and some nations are concerned about and are seeking to change. "The fallout from the Edward Snowden revelations was a genuine concern to some at the IGF (Internet Governance Forum) but I would suggest is being used as an opportunity to gain stronger control of the internet by others. "What I'm saying is that some governments are calling for changes to the way in which the internet is governed, potentially risking the freedoms it has brought about and using information shared by Edward Snowden as the reason, or should I say the excuse, to do so. "I believe that the internet must remain open, where the oversight arises from the joint action of international organisations, industry and civil society. "But I am concerned that other nations are calling for control, which could limit its contents and as a result the innovation and ingenuity and investment." 71 Paradigm Research 2015-2016 CX—Electronic Communication Aff Internet Adv: Internal Link—Localization 1. Surveillance programs are spurring data localization initiatives—risks balkanization Richard Fontaine, Senior Fellow, “Bringing Liberty Online: Reenergizing the Internet Freedom Agenda in a Post-Snowden Era,” POLICY BRIEF, Center for a New American Security, 9—14, p. 4. The reactions to the Snowden disclosures threatened to go beyond verbal denunciations, diplomatic protests and critical press. The most serious commercial fallout came in the rising support for data localization requirements. Russia in July 2014 approved legislation that requires data operators to store the personal data of its citizens within the country’s borders. Indonesia, Brazil and Vietnam have also called for their citizens’ data held by companies such as Facebook to be stored domestically. Data localization has been debated in the European Parliament and elsewhere on the continent as well. Apart from the chilling effect on innovation and the loss of business to America companies, Internet freedom itself could become a casualty of such mandates. If a user’s data must be held within the borders of a repressive country, its government will have new opportunities to censor, monitor and disrupt online information flows. Such moves, combined with increasing questions about the multi-stakeholder approach to Internet governance (and possible support for a government-driven approach), together give rise to concerns about the potential “Balkanization” of the Internet, in which a constellation of national-level systems could take the place of the current global online infrastructure. As former NSA general counsel Stewart Baker warned, “The Snowden disclosures are being used to renationalize the Internet and roll back changes that have weakened government control of information.” This is evident in other proposed steps as well. Brazil and the European Union have announced plans for an undersea cable that would route data transmissions directly between Europe and Latin America and bypass the United States. The European Union threatened to suspend the Safe Harbor data-sharing agreement with the United States and promulgated new rules for it that EU officials said stemmed directly from worries after the Snowden disclosures. 2. U.S. surveillance drives localization---will backfire, increases international repression Anupam Chander, Professor, Law, University of California-Davis and Uyen P. Le, Fellow, California International Law Center, “Breaking the Web: Data Localization vs. the Global Internet,” UC DAVIS LEGAL STUDIES RESEARCH PAPER SERIES n. 378, 4—14, p. 3. Efforts to keep data within national borders have gained traction in the wake of revelations of widespread electronic spying by United States intelligence agencies. Governments across the world, indignant at the recent disclosures, have cited foreign surveillance as an argument to prevent data from leaving their borders, allegedly into foreign hands. Putting data in other nations jeopardizes the security and privacy of such information, the argument goes. We define “data localization” measures as those that specifically encumber the transfer of data across national borders. These measures take a wide variety of forms—from rules preventing information from being sent outside the country, to rules requiring prior consent of the data subject before information is transmitted across national borders, to rules requiring copies of information to be stored domestically, to even a tax on the export of data. We argue here that data localization will backfire, that it in fact undermines privacy and security, while still leaving data vulnerable to foreign surveillance. Even more important, data localization increases the ability of governments to surveil and even oppress their own populations. 72 Paradigm Research 2015-2016 CX—Electronic Communication Aff Internet Adv: Internal Link—Rallying Point 1. Our ability to promote an open Internet hangs in the balance—compromised by the NSA programs Richard Fontaine, Senior Fellow, “Bringing Liberty Online: Reenergizing the Internet Freedom Agenda in a Post-Snowden Era,” POLICY BRIEF, Center for a New American Security, 9—14, p. 1. The 2013 revelations of mass surveillance by the U.S. government transformed the global debate about Internet freedom. Where once Washington routinely chided foreign governments and their corporate collaborators for engaging in online censorship, monitoring and other forms of Internet repression, the tables have turned. Edward Snowden, a former National Security Agency (NSA) contractor, leaked thousands of documents revealing America’s most secret electronic surveillance programs, unleashing a tidal wave of criticism and charges of hypocrisy, many directed at some of the very U.S. officials who have championed online freedom. America’s Internet freedom agenda – the effort to preserve and extend the free flow of information online – hangs in the balance. Already a contested space, the Internet after the Snowden revelations has become even more politically charged, with deep international divisions about its governance and heated battles over its use as a tool of political change. With 2.8 billion Internet users today, and several billion more expected over the next decade, the contest over online freedom grows more important by the day. As an ever-greater proportion of human activity is mediated through Internet-based technologies, the extent of online rights and restrictions takes on an increasingly vital role in political, economic and social life. 2. The surveillance program revelations sparked a firestorm—have become a rallying point for closed Internet forces Richard Fontaine, Senior Fellow, “Bringing Liberty Online: Reenergizing the Internet Freedom Agenda in a Post-Snowden Era,” POLICY BRIEF, Center for a New American Security, 9—14, p. 3. The dramatic revelations about NSA spying that began to emerge in June 2013 provoked a storm of international reaction. Political leaders expressed outrage at American surveillance practices and threatened a raft of retaliatory measures. President Dilma Rousseff of Brazil cancelled a planned state visit to the United States and the Brazilian government later organized an international meeting (NetMundial) to discuss the future of Internet governance. German Chancellor Angela Merkel was deeply affronted by the alleged monitoring of her personal cellphone. Chinese and other officials charged America with blatant hypocrisy. The fallout affected the private sector as well; where previously the focus of many observers had been on the aid given by U.S. companies to foreign governments engaged in Internet repression, the gaze shifted to the role American corporations play – wittingly or not – in enabling U.S. surveillance. Countries that had been the target of American reproaches rebuked the U.S. government for what they saw as hypocrisy. The United Nations and other international venues became platforms for international criticism of the United States. Germany and Brazil together sponsored a resolution adopted by the U.N. General Assembly in late 2013 backing a “right to privacy” in the digital age. In June 2014, the U.N. High Commissioner for Human Rights issued a report that endorsed digital privacy as a human right and criticized mass surveillance as “a dangerous habit rather than an exceptional measure.” Some European officials began to question the existing Internet governance model itself. In a statement, the European Commission said, “Recent revelations of large-scale surveillance have called into question the stewardship of the US when it comes to Internet Governance. So given the US-centric model of Internet Governance currently in place, it is necessary to broker a smooth transition to a more global model.” 73 Paradigm Research 2015-2016 CX—Electronic Communication Aff Internet Adv: Internal Link—U.S. Leadership 1. Dragnet surveillance programs undermine the U.S.’s internet leadership Human Rights Watch, “Human Rights Watch Comments for the Review Group on Intelligence and Communications Technologies,” 10—11—13, www.hrw.org/news/2013/10/11/human-rights-watch-comments-review-group-intelligence-and-communicationstechnologie, accessed 2-18-15. The United States has been a leader in promoting Internet freedom around the world and its Internet industry has become an engine of growth in today’s globally connected economy. However, US credibility has been deeply undermined by recent revelations about the vast extent of its secret dragnet surveillance programs that have violated human rights, and that bear serious implications for global internet governance and economic competitiveness. The summer of 2013 has been marked by a familiar pattern: a press disclosure suggests previously unknown government surveillance or data collection programs. This is followed by assurances from the Obama administration that the National Security Agency’s surveillance programs are targeted, proportional, and subject to oversight. Documents then emerge that undermine this narrative. The pattern then repeats itself, undermining public trust in government’s commitment to human rights. 2. Surveillance hurts our ability to push a globally open internet—empowers regimes like Iran and China Kenneth Roth, Executive Director, Human Rights Watch, “The NSA’s Global Threat to Free Speech,” NEW YORK REVIEW OF BOOKS, 11—18—13, www.hrw.org/news/2013/11/18/nsa-s-global-threat-free-speech, accessed 2-19-15. Current proposals to change the way the Internet is regulated could, if implemented, also facilitate efforts by foreign governments to gather information on their own citizens’ electronic activities. The Internet is governed mainly through informal cooperative arrangements among numerous public and private entities, but a US-based organization, the Internet Corporation for Assigned Names and Numbers, or ICANN, is responsible for, among other things, coordinating the assignment of unique identifiers that allow computers around the world to find and recognize each other. A private board of directors runs ICANN, but the US Commerce Department has a large part in its management. It may seem anomalous that the US government would have such influence over a global network like the Internet, and now that the United States has proven such an unreliable guardian of our privacy, there have been renewed calls to replace the current system with a UN agency such as the International Telecommunications Union. But few believe that such a system would protect free speech on the Internet because it would likely defer to governments that want to prioritize national sovereignty over the free flow of information and ideas. Greater national control would make it easier for governments to wall off national Internets, as China has tried to do with its Great Firewall and Iran has threatened to do with a “national information network,” enabling censorship and undermining the powerful potential of cyberspace to connect people around the world. The NSA’s electronic spying has also done much to discredit the US government’s reputation as an outspoken champion of Internet freedom. Most notably under the leadership of former Secretary of State Hillary Clinton, the US has regularly criticized countries for detaining dissident bloggers or users of social media. But today, although the United States continues to respect freedom of expression on and off line, that virtue is easily overshadowed by Washington’s indifference to Internet privacy. And even America’s reputation for respecting free speech is undermined when the Obama administration tries to extradite and prosecute Edward Snowden for an alleged security breach that many see as legitimate whistleblowing. 74 Paradigm Research 2015-2016 CX—Electronic Communication Aff Internet Adv: Impact—Multiwarrant / Topshelf 1. An open Internet is key to global innovation and freedom Julius Genachowski, Chair, Federal Communications Commission and Lee C. Bollinger, President, Columbia University, “The Plot to Block Internet Freedom,” FOREIGN POLICY, 3—16—13, http://foreignpolicy.com/2013/04/16/the-plot-to-block-internet-freedom/, accessed 3-11-15. The Internet has created an extraordinary new democratic forum for people around the world to express their opinions. It is revolutionizing global access to information: Today, more than 1 billion people worldwide have access to the Internet, and at current growth rates, 5 billion people — about 70 percent of the world’s population — will be connected in five years. But this growth trajectory is not inevitable, and threats are mounting to the global spread of an open and truly "worldwide" web. The expansion of the open Internet must be allowed to continue: The mobile and social media revolutions are critical not only for democratic institutions’ ability to solve the collective problems of a shrinking world, but also to a dynamic and innovative global economy that depends on financial transparency and the free flow of information. The threats to the open Internet were on stark display at last December’s World Conference on International Telecommunications in Dubai, where the United States fought attempts by a number of countries — including Russia, China, and Saudi Arabia — to give a U.N. organization, the International Telecommunication Union (ITU), new regulatory authority over the Internet. Ultimately, over the objection of the United States and many others, 89 countries voted to approve a treaty that could strengthen the power of governments to control online content and deter broadband deployment. In Dubai, two deeply worrisome trends came to a head. First, we see that the Arab Spring and similar events have awakened nondemocratic governments to the danger that the Internet poses to their regimes. In Dubai, they pushed for a treaty that would give the ITU’s imprimatur to governments’ blocking or favoring of online content under the guise of preventing spam and increasing network security. Authoritarian countries’ real goal is to legitimize content regulation, opening the door for governments to block any content they do not like, such as political speech. Second, the basic commercial model underlying the open Internet is also under threat. In particular, some proposals, like the one made last year by major European network operators, would change the ground rules for payments for transferring Internet content. One species of these proposals is called "sender pays" or "sending party pays." Since the beginning of the Internet, content creators — individuals, news outlets, search engines, social media sites — have been able to make their content available to Internet users without paying a fee to Internet service providers. A sender-pays rule would change that, empowering governments to require Internet content creators to pay a fee to connect with an end user in that country. Sender pays may look merely like a commercial issue, a different way to divide the pie. And proponents of sender pays and similar changes claim they would benefit Internet deployment and Internet users. But the opposite is true: If a country imposed a payment requirement, content creators would be less likely to serve that country. The loss of content would make the Internet less attractive and would lessen demand for the deployment of Internet infrastructure in that country. Repeat the process in a few more countries, and the growth of global connectivity — as well as its attendant benefits for democracy — would slow dramatically. So too would the benefits accruing to the global economy. Without continuing improvements in transparency and information sharing, the innovation that springs from new commercial ideas and creative breakthroughs is sure to be severely inhibited. To their credit, American Internet service providers have joined with the broader U.S. technology industry, civil society, and others in opposing these changes. Together, we were able to win the battle in Dubai over sender pays, but we have not yet won the war. Issues affecting global Internet openness, broadband deployment, and free speech will return in upcoming international forums, including an important meeting in Geneva in May, the World Telecommunication/ICT Policy Forum. The massive investment in wired and wireless broadband infrastructure in the United States demonstrates that preserving an open Internet is completely compatible with broadband deployment. According to a recent UBS report, annual wireless capital investment in the United States increased 40 percent from 2009 to 2012, while investment in the rest of the world has barely inched upward. And according to the Information Technology and Innovation Foundation, more fiber-optic cable was laid in the United States in 2011 and 2012 than in any year since 2000, and 15 percent more than in Europe. All Internet users lose something when some countries are cut off from the World Wide Web. Each person who is unable to connect to the Internet diminishes our own access to information. We become less able to understand the world and formulate policies to respond to our shrinking planet. Conversely, we gain a richer understanding of global events as more people connect around the world, and those societies nurturing nascent democracy movements become more familiar with America’s traditions of free speech and pluralism. That’s why we believe that the Internet should remain free of gatekeepers and that no entity — public or private — should be able to pick and choose the information web users can receive. That is a principle the United States adopted in the Federal Communications Commission’s 2010 Open Internet Order. And it’s why we are deeply concerned about arguments by some in the United States that broadband providers should be able to block, edit, or favor Internet traffic that travels over their networks, or adopt economic models similar to international sender pays. We must preserve the Internet as the most open and robust platform for the free exchange of information ever devised. Keeping the Internet open is perhaps the most important free speech issue of our time. 75 Paradigm Research 2015-2016 CX—Electronic Communication Aff Internet Adv: Impact—Multiwarrant / Topshelf [cont’d] 2. Internet openness is critical—key to diplomacy, economic growth Shanthi Kalathil, “Internet Freedom: A Background Paper,” TOWARD A SINGLE GLOBAL DIGITAL ECONOMY, 10—10, p. 67. As use of the Internet has grown exponentially around the world, so too have concerns about its defining attribute as a free and open means of communication. Around the world, countries, companies and citizens are grappling with thorny issues of free expression, censorship and trust. With starkly different visions for the Internet developing, this era presents challenges—and also opportunities—for those who wish to ensure the Internet remains a backbone of liberty and economic growth. U.S. officials have made clear their vision for the Internet’s future. President Obama, in a speech before the UN General Assembly, said that the U.S. is committed to promoting new communication tools, “so that people are empowered to connect with one another and, in repressive societies, to do so with security. We will support a free and open Internet, so individuals have the information to make up their own minds.” His words were reinforced by FCC Chairman Julius Genachowski: “It is essential that we preserve the open Internet and stand firmly behind the right of all people to connect with one another and to exchange ideas freely and without fear.” Indeed, a free, widely accessible Internet stands at the heart of both global communication and global commerce. Internet freedom enables dialogue and direct diplomacy between people and civilizations, facilitating the exchange of ideas and culture while bolstering trade and economic growth. Conversely, censorship and other blockages stifle both expression and innovation. When arbitrary rules privilege some and not others, the investment climate suffers. Nor can access be expanded if end users have no trust in the network. 76 Paradigm Research 2015-2016 CX—Electronic Communication Aff Internet Adv: Impact—China Stability 1. Internet freedom will stabilize China—benefits of transparency Katherine Tsai, attorney, “How to Create International Law: The Case of Internet Freedom in China,” DUKE JOURNAL OF COMPARATIVE & INTERNATIONAL LAW v. 21, Winter 2011, p. 425. On the other hand, China could benefit domestically from permitting internet freedom. Internet freedom could strengthen its government by providing greater transparency to its citizens and thereby increasing standards of government accountability. A policy of internet freedom could encourage media companies such as Google and Time Warner to expand their operations in China, thereby creating jobs for Chinese citizens. The increased presence of foreign companies could develop the skill and knowledge base of Chinese employees, and consequently foster greater innovation and entrepreneurship in China. By allowing internet freedom, China would signal to its domestic constituents and to the international community that it is committed to technological innovation and a legal environment that welcomes foreign technology and telecommunications companies. 2. A free Internet enables democratic dissent in China Patrick Ford, J.D. Candidate, “Freedom of Expression through Technological Networks: Accessing the Internet as a Fundamental Human Right,” WISCONSIN INTERNATIONAL LAW JOURNAL v. 32, Spring 2014, p. 151-152. In addition to the Middle East and Africa, Chinese citizens have also used social media and other technology to speak out against the government. At half a billion, China has the largest number of Internet users in the world. Even though China has the largest number of Internet users, this number only amounts to 40% of China's total population, and is very low by the standards of developed economies. Nonetheless, it is growing fast, increasing by more than fifty million users in 2011. While China has the largest number of Internet users, Internet censorship in China is among the most stringent in the world. Nonetheless, there have been some instances where Chinese citizens have used the Internet, social media, and other digital technology to alter the political process and promote change. 77 Paradigm Research 2015-2016 CX—Electronic Communication Aff Internet Adv: Impact—Democracy 1. The Internet can promote democratization—social mobilization Richard Fontaine, Senior Fellow and Will Rogers, Research Associate, INTERNET FREEDOM: A FOREIGN POLICY IMPERATIVE IN THE DIGITAL AGE, Center for a New American Security, 6—11, p. 16. New media might also affect intergroup relations, by generating new connections among individuals, spreading information and bringing together people and groups. (Some have worried about the opposite effect – the tendency of the Internet to polarize individuals and groups around particular ideological tendencies.) This may occur not only within countries, but also among them; the protests in Tunisia sparked a clear rise in political consciousness and activism across the Arab world – much of it facilitated by Internet-based communications and satellite television. It may also take place over a long period of time; Clay Shirky, an expert at New York University, argues that a “densifying of the public sphere” may need to occur before an uprising turns into a revolution. New communications technologies could also affect collective action, by helping change opinion and making it easier for individuals and groups to organize protests in repressive countries. Unconnected individuals dissatisfied with the prevailing politics may realize that others share their views, which might form the basis for collective action. Relatively small groups, elites or other motivated dissidents might use the Internet to communicate or organize protests. Even if the number of committed online activists is small, they might nevertheless disseminate information to the general population or inspire more widespread protests. Again, it is important to distinguish such action from group “slacktivism;” as the successful protests in Egypt showed, the regime only began to teeter when thousands of citizens physically occupied Tahrir Square. Though initial protests may have been organized via Facebook, the Mubarak government would still be in power if the protests had been confined only to cyberspace. 2. The Internet needs to remain open—government control allows the crushing of dissent Richard Fontaine, Senior Fellow and Will Rogers, Research Associate, INTERNET FREEDOM: A FOREIGN POLICY IMPERATIVE IN THE DIGITAL AGE, Center for a New American Security, 6—11, p. 16. These new technologies clearly affect regime policies as well. Governments have employed a huge array of techniques aimed at controlling the Internet and ensuring that their political opponents cannot use it freely. This goes well beyond censorship, which garners the bulk of popular attention. Autocracies also regularly monitor dissident communications; mobilize regime defenders; spread propaganda and false information designed to disrupt protests and outside groups; infiltrate social movements; and disable dissident websites, communications tools and databases. These and other practices can also induce self-censorship and other forms of self-restraint by publishers, activists, online commentators and opposition politicians. Autocrats can also turn dissidents’ use of the Internet against them. In Iran, for example, users of social media – which linked their accounts to those of other protestors – inadvertently created a virtual catalogue of political opponents that enabled the government to identify and persecute individuals. The regime established a website that published photos of protestors and used crowd sourcing to identify the individuals’ names 3. The Internet can promote democratization—rallies outside interest and support Richard Fontaine, Senior Fellow and Will Rogers, Research Associate, INTERNET FREEDOM: A FOREIGN POLICY IMPERATIVE IN THE DIGITAL AGE, Center for a New American Security, 6—11, p. 17. Beyond these effects, new media can affect external attention, by transmitting images and information to the outside world, beyond the control of government-run media and regime censorship and spin. Such attention can mobilize sympathy for protestors or hostility toward repressive regimes, as occurred when the video of Neda Agha-Soltan moved from YouTube to mainstream media. Digital videos and information may also have a rebound effect; information transmitted out of Egypt and Libya by social networking and videohosting sites during the protests in those countries made its way back in via widely watched satellite broadcasts. This effect could be particularly pronounced in countries like Yemen, where Internet penetration is low but Al Jazeera is widely viewed. Similarly, print journalists have found sources and stories through social media and have used the same media to push their articles out to the world. 78 Paradigm Research 2015-2016 CX—Electronic Communication Aff Internet Adv: Impact—Economy (General) 1. A free Internet is critical to the economy Edward J. Black, President & CEO, Computer & communications Industry Association, Testimony before the Senate Judiciary Committee, 12—11—13, www.judiciary.senate.gov/imo/media/doc/12-11-13BlackTestimony.pdf, accessed 3-10-15. The members of the committee are no doubt familiar with the great commercial benefits the open Internet provides. It allows small-andmedium-size businesses to access markets and customers well beyond their reach in the brick and mortar world, lowers costs along the entirety of global supply chains, increases efficiency in business from the Fortune 500 down to the smallest mom-and-pop shop, and is the catalyst for the online services marketplace, one of the greatest economic drivers in the country today. As an example of the immense economic benefit of the Internet, the Boston Consulting Group conducted a study in 2012 analysing the economic promise of the Internet economy. The study predicts that the Internet economy in the G- 20 will reach $4.2 trillion by 2016. Another study, conducted by the McKinsey Global Institute, estimates that 21% of GDP growth over the past 5 years is attributable to the Internet and that 2.6 jobs are created for every job lost. And, perhaps more telling, the same study estimates that 75% of the economic value of the Internet accrues to traditional sectors of the economy in the form of greater efficiency and expanded market access. The U.S. government has even taken notice. A recent comprehensive report from the U.S. International Trade Commission (ITC) noted, “digital trade continues to grow both in the U.S. economy and globally” and that a “further increase in digital trade is probable, with the U.S. in the lead.” In fact, the report also shows, U.S. digital exports have exceeded imports and that surplus has continually widened since 2007. As traditional manufacturing and lower-skill service sector jobs migrate overseas, the Internet, and the innovative ecosystem that it has spawned, is becoming increasingly important to our global economic competitiveness. As a result, the economic security risks posed by NSA surveillance, and the international political reaction to it, should not be subjugated to traditional national security arguments, as our global competitiveness is essential to long-term American security. It is no accident that the official National Security Strategy of the United States includes increasing exports as a major component of our national defense strategy. 2. Internet restrictions hurt growth—impose costs, undercuts the economy-boosting free flow of ideas Philip L. Verveer, Coordinator for International Communications and Information Policy, U.S. State Department, STATES NEWS SERVICE, 5—12—12, Gale Group. This is why the economics case for Internet Freedom--the case appealing to more immediate self-interest--is very important. And, as I am about to describe, that case is not as well developed as the rights-based case. The economic case for Internet Freedom is grounded on at least two propositions. The first is that interfering with the use of the Internet as a commercial channel inevitably will impose costs. We might think of this as the transactional case. This raises the question of whether it is possible to interfere with the Internet as a transmitter of political and related ideas while maintaining it at full, or at least acceptable, efficiency for economic purposes. The second proposition is more fundamental. It is based on the intuition that serious reductions in the free flow of ideas will harm a society's ability to engage in innovation and thus ultimately will handicap economic growth. We might think of this as the cultural/psychological case in the sense the effects of censorship and repression on culture and behavior. Secretary Clinton addressed both of these matters in her second Internet Freedom speech: Walls that divide the internet, that block political content, or ban broad categories of expression, or allow certain forms of peaceful assembly but prohibit others, or intimidate people from expressing their ideas are far easier to erect than to maintain. Not just because people using human ingenuity find ways around them and through them but because there isn't an economic internet and a social internet and a political internet: there's just the internet. And maintaining barriers that attempt to change this reality entails a variety of costs--moral, political, and economic. Countries may be able to absorb these costs for a time, but we believe they are unsustainable in the long run. There are opportunity costs for trying to be open for business but closed for free expression--costs to a nation's education system, its political stability, its social mobility, and its economic potential. 3. A free Internet is vital to capturing its economic benefits Richard Fontaine, Senior Fellow and Will Rogers, Research Associate, INTERNET FREEDOM: A FOREIGN POLICY IMPERATIVE IN THE DIGITAL AGE, Center for a New American Security, 6—11, p. 17. The economic impact of the Internet might affect the degree of democratization in a country. The Internet has increased labor productivity and corresponding economic growth, which may help middle classes emerge in developing countries. Because new middle classes tend to agitate for democratic rights, new technologies could indirectly promote democratization. In 2011, Clinton referenced a related dynamic, the “dictator’s dilemma,” stating that autocrats “will have to choose between letting the walls fall or paying the price to keep them standing … by resorting to greater oppression and enduring the escalating opportunity cost of missing out on the ideas that have been blocked and people who have been disappeared.” In other words, an autocrat can either repress the Internet or enjoy its full economic benefits, but not both. 79 Paradigm Research 2015-2016 CX—Electronic Communication Aff Internet Adv: Impact—Economy (Innovation) 1. An open Internet is key to economic growth—innovation Philip L. Verveer, Coordinator for International Communications and Information Policy, U.S. State Department, STATES NEWS SERVICE, 5—12—12, Gale Group. This obviously is related to the far larger matter of the prerequisites for economic growth. As it happens, we have a reasonably clear sense of what they are. Sustained economic growth requires a stable level of security where citizens have protection from violence from both internal and external sources. So a state is necessary, but so are appropriate and effective institutions. The state must be what Professors Acemoglu and Robinson in their recent book Why Nations Fail call inclusive and non-extractive. Opportunities to amass wealth must be widely available rather than limited to a small, politically powerful segment of the population. And those with governing authority must not make excessive extractions of the society's wealth. They must not be rent seekers, pursuing the accumulation of wealth for themselves, their families, and their retainers, a phenomenon that continues to be all too prevalent in our world. The ideal, then, involves the creation of a legal and regulatory milieu that is conducive to investment. This prototypically consists of a stable, reliable rule of law that, among other things, assures that contractual commitments are honored. The ideal also involves an autonomous judiciary for purposes of arbitration of disputes and to oversee those matters that warrant the imposition of social controls. We need these institutional arrangements for purposes of economic growth, but there remains the interesting possibility that Internet Freedom has a critical connection to innovation--a connection that involves respect for and encouragement of personal autonomy. At the risk of intruding on the prerogatives of the tenured, I would like to propose one approach to the question based on an historical analogy. This follows the suggestion of Thomas Spavins, a valued colleague who has been providing his expert advice on all things related to the Internet. Economic historians have addressed the question of why over the last five centuries Western Europe has experienced a great increase in wealth. One of the most prominent academicians, Joel Mokyr of Northwestern University, has produced very important insights. Professor Mokyr identifies several relevant factors. One is especially intriguing for present purposes. It involves the freedom of individuals to pursue their ideas as they wished, free from the strictures of authority. To quote Professor Mokyr, it is: the Enlightenment notion of freedom of expression. In our age, we think of technological change as natural and obvious; indeed, we consider its absence a source of concern. Not so in the past: inventors were seen as disrespectful, rebelling against the existing order, threatening the stability of the regime and the Church, and jeopardizing employment. In the eighteenth century, this notion slowly began to give way to tolerance, to the belief that those with odd notions should be allowed to subject them to a market test. ... Words like "heretic" to describe innovators began to disappear. This insight, it seems to me, provides an entirely plausible basis for the belief that Internet Freedom leads to innovation and economic growth. Or, stated differently, that the absence of Internet Freedom diminishes a society's economic growth. In any event, scholars would perform a material service to all of us interested in information and communications technologies if they would take up the study of Internet Freedom, either in the manner of Professor Mokyr or otherwise. 2. A free internet is vital to innovation and economic growth Richard A. Clarke et al., President’s Review Group on Intelligence and Communications Technologies, LIBERTY AND SECURITY IN A CHANGING WORLD, Report and Recommendations, 12—12—13, p. 12. Promoting Prosperity, Security, and Openness in a Networked World. The United States must adopt and sustain policies that support technological innovation and collaboration both at home and abroad. Such policies are central to economic growth, which is promoted in turn by economic freedom and spurring entrepreneurship. For this reason, the United States must continue to establish and strengthen international norms of Internet freedom and security. 80 Paradigm Research 2015-2016 CX—Electronic Communication Aff Internet Adv: Impact—Economy (Innovation) [cont’d] 3. A strong Internet is key to the economy—innovation, new products, manufacturing Joshua Meltzer, fellow, Global Economy and Development, Brookings Institution, “The Internet, Cross-Border Data Flows and International Trade,” ISSUES IN TECHNOLOGY INNOVATION n. 22, 2—13, p. 2. Over 2.3 billion people have access to the Internet and this figure is expected to grow to five billion by 2020. The Internet’s economic power and potential are massive in several respects. First, the Internet allows for the aggregation and globalization of markets, providing new opportunities for business and consumers. Second, the Internet is a key driver of innovation and productivity growth because it reduces transaction costs and enables businesses to better utilize existing resources. In addition, individuals can acquire new skills via the Internet, thus improving human capital. The Internet has also underpinned the development of some of the most innovative companies in the world and, in some cases, entirely new business models which bring users and information together. Social networking sites such as Facebook and Google+ host user-generated content and promote social and commercial connections. Companies such as Amazon, Apple and eBay have successfully used the Internet to generate e-commerce and mobile application platforms that connect buyers and sellers across the U.S. and globally. And growth in mobile devices such as tablets and smart phones has underpinned growth in mobile software delivered online and mobile web traffic. In fact, mobile data traffic is forecast to grow 18 times between 2011 and 2016. Traditional manufacturing and services companies are also benefiting from Internet-enabled applications and commerce. For instance, the Internet has enabled entrepreneurs and businesses to access services and customers globally at lower costs. And cloud computing is utilizing the Internet and the ability to move data across borders to change the way computers are used, reducing costs while providing access to a full range of computer services. 81 Paradigm Research 2015-2016 CX—Electronic Communication Aff Internet Adv: Impact—Economy (Jobs) 1. An effective Internet is a huge promoter of job growth Robert M. McDowell, Commissioner, Federal Communications Commission, “The U.N. Threat to Internet Freedom,” WALL STREET JOURNAL, 2—21—12, p. A19. Net access, especially through mobile devices, is improving the human condition more quickly -- and more fundamentally -- than any other technology in history. Nowhere is this more true than in the developing world, where unfettered Internet technologies are expanding economies and raising living standards. Farmers who live far from markets are now able to find buyers for their crops through their Internet-connected mobile devices without assuming the risks and expenses of traveling with their goods. Worried parents are able to go online to locate medicine for their sick children. And proponents of political freedom are better able to share information and organize support to break down the walls of tyranny. The Internet has also been a net job creator. A recent McKinsey study found that for every job disrupted by Internet connectivity, 2.6 new jobs are created. It is no coincidence that these wonderful developments blossomed as the Internet migrated further away from government control. 2. A strong Internet is critical to job creation Joshua Meltzer, fellow, Global Economy and Development, Brookings Institution, “The Internet, Cross-Border Data Flows and International Trade,” ISSUES IN TECHNOLOGY INNOVATION n. 22, 2—13, p. 3. To date, the United States has been, and remains, the focal point of the Internet and the burgeoning area of Internet policy. The U.S. captures the most value from the Internet, receiving more than 30 percent of global Internet revenues. However, most developed countries have reaped significant benefits from the Internet. A McKinsey Global Institute study estimated that the Internet contributed over 10 percent to GDP growth in the last five years to the world’s top ten economies and for every job lost as a result of the Internet, 2.6 jobs have been created. The Internet is also an increasingly significant driver of job creation and economic growth in the developing world. According to a World Bank report, providing Internet access to rural communities in developing countries provides important access to new services such as real time information on the price of agriculture products, giving small businesses greater control over their sales. Indeed, there is evidence that every ten percentage-point increase in the penetration of broadband services leads to a 1.3 percent increase in economic growth. But this contribution of the Internet to GDP is less than for developed countries, suggesting significant scope for growth. 82 Paradigm Research 2015-2016 CX—Electronic Communication Aff Internet Adv: Impact—Economy (Tech Sector) 1. High tech is key to the U.S. economy, drives innovation Laura K. Donohue, Professor, Law, Georgetown University, “High Technology, Consumer Privacy, and U.S. National Security,” BUSINESS LAW REVIEW (forthcoming), 2015, p. 15, http://scholarship.law.georgetown.edu/cgi/viewcontent.cgi?article=2469&context=facpub, accessed 5-9-15. A strong economy also ensures that citizens have their needs met, with sufficient income levels for housing, food, clothing, and education. This, in turn, generates social and political stability, which allows for the development of communities, which creates greater cohesion among citizens. It also contributes to the evolution of democratic deliberations, reinforcing the rule of law. Economic security allows for growth and innovation, which is fed by education and opportunity. Innovation, in turn, allows the country to continue to adapt to the evolving environment and international context. There are further considerations. But these suffice to illustrate the importance of economic strength to U.S. national security writ large. High technology is central to the U.S. economy. A recent study by the Bay Area Economic Council Institute sought to ascertain how important the high tech industry is just for the U.S. labor market. It found that not only are high-tech jobs critical for generating employment in other sectors, but that growth in the high-tech sector has increasingly been happening in areas of great economic and geographic diversity, suggesting that the high-tech industry is not limited to one ethic, social, or economic strata. High-technology has been one of the fastest-growing sectors: between 2004 and 2012, the employment growth in high-tech outpaced private sector growth by a ratio of 3:1. Jobs in Science, Technology, Engineering, and Mathematics (STEM) outpaced job gains across all occupations by a ratio of 27:1. Employment predictions put the demand for high-tech workers to increase 16.2% 2011 to 2020, with STEM employment increasing 13.3% during the same period. The study found that the generation of jobs in high-technology had far-reaching effects. In addition to the income gains generated by innovation, productivity and a global marketplace, high-technology industrial growth generated other types of jobs. Health care, education, law, restaurants, hotels and personal services, as well as goods-producing construction sectors grew in tandem with high tech, largely because of a local multiplier effect: “For each job created in the local high-tech sector,” the study concluded, “approximately 4.3 jobs are created in the local nontradable sector in the long run.” Even as early as 2002, the National Science Foundation found that the global market for hightechnology goods is growing at a swifter rate than for other manufactured goods. More than this, “high-technology industries are driving economic growth around the world.” 2. These industries are vital to innovation Mark Murro et al., senior fellow, AMERICAN’S ADVANCED INDUTRIES: WHAT THEY ARE, WHERE THEY ARE, AND WHY THEY MATTER, Brookings Institution, 2—15, p. 15-16. Represents a key site of innovative activity. Related to their orientation toward key national challenges is the fact that advanced industries are the nation’s principle locus of industrial innovation. Innovation matters to nations, states, regions, companies, and families because it represents the only viable avenue for high-wage economies to increase productivity and continue to improve their citizens’ standard of living in the long run. Advanced industries matter inordinately because, by definition, they draw together society’s innovation resources. In particular, they are the primary site of the R&D spending that drives product and process innovation in the economy. As such, the sector is the nation’s top source of the innovation that drives increased productivity, which in turn generates increased profits and market share for firms, growth for industries, and broad economic benefits for households, regions, and the nation. The sector’s significance as a source of innovation is likely undercounted. Considering that three-fourths of U.S. firms perform no R&D, economist David Audretsch asks, “Where do innovative firms with little or no R&D get the knowledge inputs?” The answer is from “spillovers” from the most R&D-intensive firms such as those in the advanced industries sector. Because innovative companies cannot capture all of the knowledge generated from their R&D investments, other firms that employ similar processes or create complementary products often acquire the new knowledge through imitation, use, worker turnover, or other ways. So advanced industry innovation investments, activities, and advances “spill over” to other areas. They radiate. And in some cases, such as with IT products and services, advanced industry technologies have emerged as “general purpose technologies” that have enabled truly significant productivity advances throughout the economy. Consider, for example, the IT ecosystem. Although iconic firms such as IBM, AT&T, Microsoft, and Google created the IT ecosystem, thousands of other firms and entrepreneurs in nearly every other industry have reaped the bulk of the economic rewards. Altogether, the application of IT advancements in the United States has been responsible for more than 30 percent of labor productivity growth economy-wide over the past decade. Information technology is not the only general purpose technology generating a sizable impact. Others include the genomic revolution, the arrival of advanced material science, and emerging new developments in advanced robotics and machine learning. For example, McKinsey & Co. estimates that the economic impact of gene sequencing in health care, agriculture, and biofuels will equal more than $1 trillion during the next decade. In the coming decades, new general purpose technologies introduced by the advanced industries sector, such as nanotechnology and advanced energy storage, may emerge as major sources of economic growth. 83 Paradigm Research 2015-2016 CX—Electronic Communication Aff Internet Adv: Impact—Economy (Tech Sector) [cont’d] 3. Tech innovation and competitiveness are key to the economy Mark Murro et al., senior fellow, AMERICAN’S ADVANCED INDUTRIES: WHAT THEY ARE, WHERE THEY ARE, AND WHY THEY MATTER, Brookings Institution, 2—15, p. 14-15. But the advanced industries sector also represents a compelling economic fact. As the leading location of technological development and its application in the United States, the sector plays a pivotal role in generating prosperity across the nation. Specifically, the advanced industries sector: ● Encompasses many of the nation’s most crucial industries. Advanced industries are in many respects their nations’ linchpin industries—the industries that, in developed economies, establish technological advantage and embody national competitiveness. Sizable in their own right, these industries frequently make disproportionate contributions to GDP through aboveaverage productivity, which is a leading predictor of worker wages. Likewise, because of the complexity of their products and services, these industries support long chains of raw materials providers, specialized parts suppliers, and assorted service providers. Although it is certainly true that supply chains are increasingly global, trade data suggest that the United States retains many of their highest-value portions. Economic literature also suggests that advanced industries have high employment and output multipliers—measures of the ancillary economic activity one job spurs elsewhere in the economy—given the above-average wages they pay and their strong links to other sectors of the economy, both for inputs and through their broader impacts. Yet the sector’s significance goes far beyond its size. Advanced industries possess outsized economic importance for the nation and its regions. Nearly every advanced industry resides in the traded sector—the sector that competes internationally, sells abroad at least partially, and returns sales revenue to America. Traded sector industries are essential to a nation’s prosperity. As innovation experts Stephen Ezell and Robert Atkinson write, “It’s simply impossible to have a vibrant national economy without a globally competitive traded sector.” For a nation that has been running significant trade deficits for years, including in “advanced technology products,” advanced industries will be instrumental in reducing them. Beyond matters of productivity and trade, the advanced industries sector looms large in supporting such national and global objectives as national security, energy independence, food sustainability, health, and rising standards of living. The aerospace, electronics, and communications industries play a significant role in delivering the goods and services that help nations respond to threats such as terrorism, environmental disasters, and pandemics. The electric power, oil and gas, and scientific research industries are helping the world maintain access to—and store—low-cost, secure sources of energy, including clean energy. (Witness the progress that “cleantech” advanced industries have made in reducing the cost of photovoltaics and boosting the energy density of storage devices.) As the world’s population grows, biotechnology industries are enabling the world to feed its population through innovations in plant genomics, high-yield seeds, and improved crop and water management. Likewise, medical, pharmaceutical, genomic, electronic, and “big-data” advanced industries are all working to advance the health of the nation and world through the development of remote monitoring, new prevention and treatments, and personalized medicines. Consumer-oriented advanced industries such as electronics, computers, motor vehicles, and appliances, for their part, have materially improved household standards of living by expanding purchasing options, bringing time- and money-saving capabilities to the average person, and driving prices down and quality up. In short, U.S. advanced industries are engaged in delivering highly important goods and services that respond directly to the nation’s most pressing challenges. 4. IT is vital to the overall economy Mark Murro et al., senior fellow, AMERICAN’S ADVANCED INDUTRIES: WHAT THEY ARE, WHERE THEY ARE, AND WHY THEY MATTER, Brookings Institution, 2—15, p. 16. No technology better epitomizes how advanced industries support U.S. economic growth through innovation and its wide adoption than information technology (IT). Prior to the mid-1990s productivity growth from IT remained almost exclusively within those firms producing software and hardware (all in advanced industries). Yet in the decade following 1995, productivity gains from IT came predominately from firms outside of the IT sector, particularly in high-value advanced industries such as management and R&D consulting, medical devices, and precision instrument manufacturing. These firms began leveraging IT to improve operations and to grow. During this period, IT was responsible for two-thirds of U.S. productivity growth, despite the IT sector only employing 2.5 percent of the workforce directly. Research by Jorgenson, Ho, and Samuels shows that total factor productivity increased sharply in sectors that used IT extensively during the 1990s and fell in those that did not. During the years 1995–2000 sectors using IT registered 10 times higher total factor productivity than other sectors. Since then, the retail, wholesale, and hospitality sectors have begun to invest heavily in IT, and IT was responsible for more than one-third of total labor productivity growth between 2002 and 2012. The further dissemination of IT into large and conspicuously lagging sectors—namely health care and education—promises even greater productivity gains. The 30-year trajectory of IT illustrates a critical economic point: U.S. economic growth is contingent on waves of game-changing technologies that are typically introduced by a subset of advanced industry firms, then adopted by whole industries, and finally diffused into every corner of the economy. 84 Paradigm Research 2015-2016 CX—Electronic Communication Aff Internet Adv: Impact—Human Rights 1. Use of the Internet is the cornerstone of our human rights Philip L. Verveer, Coordinator for International Communications and Information Policy, U.S. State Department, STATES NEWS SERVICE, 5—12—12, Gale Group. Everyone has the right to freedom of opinion and expression; this right includes freedom to hold opinions without interference and to seek, receive and impart information and ideas through any media and regardless of frontiers. The right "to seek, receive and impart information and ideas through any media and regardless of frontiers" is the embodiment of the rights-based case for Internet Freedom, articulated some two decades before the concepts that, reduced to practice, became the Internet. The Uniform Declaration is just that, a declaration. While it enjoys great moral authority, it is not binding, in the sense of international law. But the International Covenant on Civil and Political Rights, derived from the Universal Declaration, is. Adopted by the General Assembly in 1966, but also signed and ratified by most nations, with some notable exceptions, it is a binding, multilateral treaty. Article 19.2 mirrors the Universal Declaration in holding that: Everyone shall have the right to freedom of expression; this right shall include freedom to seek, receive and impart information and ideas of all kinds, regardless of frontiers, either orally or in print, in the form of art, or through any other media of his choice. From a juridical perspective, then, there is a compelling case for Internet Freedom grounded in human rights. The problem, of course, is that it is not enough to persuade countries that have strong reasons to interfere with Internet Freedom. 2. Internet restrictions violate international human rights law Patrick Ford, J.D. Candidate, “Freedom of Expression through Technological Networks: Accessing the Internet as a Fundamental Human Right,” WISCONSIN INTERNATIONAL LAW JOURNAL v. 32, Spring 2014, p. 169-170. Technological networks such as the Internet and its media, have redefined the ways that people are able to receive and impart information and express their opinions. Furthermore, the ordinary meaning of the language in Article 19 of the Universal Declaration, as well as the other conventions on human rights, demonstrates that people have a fundamental right to accessing the technological networks such as the Internet and its media. Other international materials further bolster this conclusion. As a result, state action that restricts or blocks its citizens' access to technological networks-like the Internet-constitutes a human rights violation unless it is prescribed by law, pursues some legitimate aim, and is necessary for achieving that aim. Courts that hear such cases must be careful that laws, which have a legitimate purpose and seem necessary for achieving that purpose, are not a pretext for blocking or censoring the Inter-net. Furthermore, until the ICJ is able to hear cases brought by individuals against states which are not parties to the other conventions on human rights, those individuals will be hard pressed to find a remedy. 3. We have an international right to Internet access—has become fundamental to our lives Nicola Lucchi, Associate Professor, Jonkoping International Business School, “Internet Content and Human Rights,” VANDERBILT JOURNAL OF ENTERTAINMENT AND TECHNOLOGY LAW, Summer 2014, p. 810-811. Extensive information and communication-technology infrastructure and widespread flows of information have be-come fundamental and distinctive features of our lives. This increasingly pervasive, variegated, and constantly changing interaction between communication technologies and society brings with it a broad range of legal and ethical dilemmas, especially those pertaining to protection and promotion of the freedom of expression. Electronic communication tools hold the potential to positively or negatively affect the rights of the individual. The Internet has become an essential instrument and can now be viewed as a condition necessary for the proper enjoyment of a series of rights, including the rights to access information and to communicate. As a consequence, any regulatory and policy measures that affect the digital-information infrastructure and its content should be consistent with the basic rights and liberties of human beings. This Article will investigate the challenges and opportunities for freedom of speech and human rights on the Internet. In particular, it examines how Internet content governance is posing provocative and fascinating regulatory issues directly related to the growing possibilities offered by computer-mediated communication. This debate is not simply "technical," but also political, legal, and social since it involves sustainable, value-oriented solutions, and, perhaps more importantly, the awareness of the human-rights dimension of Internet governance. Emphasis will rest on how developments in Internet regulation and Internet technologies can pose risks for human rights, particularly in relation to freedoms of expression, association, information, communication, and privacy. 85 Paradigm Research 2015-2016 CX—Electronic Communication Aff Internet Adv: Impact—Innovation / Leadership 1. The rollback of Internet freedom threatens U.S. leadership James Poulos, journalist, “There’s a Global War for Internet Freedom. And the U.S. Is Losing,” THE WEEK, 3—9—15, http://theweek.com/articles/542945/theres-global-war-internet-freedom-losing, accessed 6-1-15. The spread of the illiberal internet into the democratic world dramatically underscores that online freedom is under global attack from two directions. Not only is security of the body used as a rationale to foreclose liberty; security of the psyche, the heart, and the soul are as well. The measures used to enforce such total security are not at all restricted to the logic of speech restrictions that the West developed in such close contiguity with the rule of law. They are not only divorced completely from the West's secular conceptual framework of reasonableness; they are also unhinged from the West's religious conceptual framework of forbearance. As such, they present Americans, and all humans, with a true catastrophe. It is not the end of the world, of course, if some people wind up doomed to live more narrowed, confined lives than others. But the global undoing of freedom online actually constitutes a geostrategic challenge to the U.S. that Americans almost certainly lack the will and the resources to combat, reverse, and defeat. Not only is there no popular movement to use federal power to "take back the internet" across the planet. There is no popular capability to crowd-source that level of undertaking. Instead, there is a vague, stupid, nervous sense that we are somehow inured to the transformation of digital life into an environment deeply alien and inimical to the civilization that produced our own. Humanity faces the daunting prospect of a colossal, epochal break — the ideological severance of the cyberworld from the physical world, the better to use the former to reshape the latter in a universal image of servility or worse. Americans complain about their tech titans, whose proudly flaunted wealth seems so unfairly unearned. The reality is, they are becoming the only people who can save us from an internet worse than no internet at all. 2. Tech innovation depends on an open internet Dean C. Garfield, President & CEO, Information Technology Industry Council (ITI), Testimony before the Senate Select Committee on Intelligence, 6—5—14, www.itic.org/dotAsset/9c88f111-2149-434f-a250-7700ede27dd8.pdf, accessed 2-18-15. I am proud to represent a sector that is changing the world for good—in every meaning of that word. Technological capabilities and innovations have changed the way we live, work, and play. We can wear a watch that is both a phone and a biometric device that can monitor our heart rate. We can drive cars that can slow down on their own to avoid accidents. We have access to three-dimensional printers that one day will produce organs and limbs to expedite transplants. And many of us can work from wherever we happen to be thanks to a device in our hands and the availability of important data to our fingertips. Technological capabilities and continuous innovation rely on an ecosystem that is global in nature. An Internet governance model that is open, integrated, and borderless has made all this possible. The tech sector is committed to sustaining this model because it has served this nation and our world well. The revelations about data collection by the National Security Agency (NSA) are having a significant economic impact on our sector. Further, this also has the potential for seriously damaging long-term implications on the global economy for innovation and Internet governance. 86 Paradigm Research 2015-2016 CX—Electronic Communication Aff Internet Adv: Impact—Rights 1. The Internet is vital to our future freedoms—we need to preserve it Philip L. Verveer, Coordinator for International Communications and Information Policy, U.S. State Department, STATES NEWS SERVICE, 5—12—12, Gale Group. These developments continue to produce changes so fundamental in economics, politics, culture, and social relationships that we cannot hope to understand them in any comprehensive way. As Hegel said, "The owl of Minerva flies only at dusk," and we are much closer to sunrise than to sunset. But we do know some things. One of them--a very important thing about which we can feel very secure--is that the Internet is a great enabler of human expression, association, and assembly; and another thing--about which we can feel equally confident--is that the Internet is a great enabler of increases in material well being. One of the most important responsibilities confronting us today is assuring that these Internet-related opportunities are not impaired. This is a responsibility not just to ourselves and our descendants, but to people like Joel whose life's work helped to provide the opportunities. 2. The internet promotes rights—facilitates cross-cultural communication Patrick Ford, J.D. Candidate, “Freedom of Expression through Technological Networks: Accessing the Internet as a Fundamental Human Right,” WISCONSIN INTERNATIONAL LAW JOURNAL v. 32, Spring 2014, p. 143. As technology has evolved, access to digital information and communication technologies has greatly increased. Currently, ordinary citizens in underdeveloped nations have greater access to information online than President Bill Clinton had in the mid-1990s. Over the last few years, one digital technology in particular has had a profound impact on politics and civil society: the Internet, with its extensive blogging websites and its proliferating array of social-media tools such as Facebook, Twitter, and YouTube. Because of the number of people now using social media and blogging websites, and the revolutionary way it allows these people to communicate with each other, "these electronic tools have provided new, breathtakingly dynamic, and radically decentralized means for people and organizations to communicate and cooperate with one another for political and civic ends." In particular this technology has allowed citizens of the world expand their political, social, and economic freedom. 3. An open internet promotes individual freedom and human development Nicola Lucchi, Associate Professor, Jonkoping International Business School, “Internet Content and Human Rights,” VANDERBILT JOURNAL OF ENTERTAINMENT AND TECHNOLOGY LAW, Summer 2014, p. 813-814. Technological developments in communication have brought revolutionary opportunities and changes to how people obtain, process, and exchange information. In this framework, one of the contemporary and emerging challenges for the legal and regulatory regime is shaping a modern interpretation of freedom of thought and expression. The rapidly evolving media revolution has generated a number of new regulatory initiatives designed to reduce systemic risks associated with this means of communication "ranging from risks to children, to privacy, to intellectual property rights, to national security, which might more indirectly, and often unintentionally, enhance or curtail freedom of expression." As Yochai Benkler so eloquently expressed in The Wealth of Networks, [a] series of changes in the technologies, economic organization, and social practices of production in this environment has created new opportunities for how we make and exchange information, knowledge, and culture ... . This new freedom holds great practical promise: as a dimension of individual freedom; as a platform for better democratic participation; as a medium to foster a more critical and self-reflective culture; and, in an increasingly information-dependent global economy, as a mechanism to achieve improvements in human development everywhere. 87 Paradigm Research 2015-2016 CX—Electronic Communication Aff Internet Adv: Impact—Trade 1. Internet restrictions undermine global trade flows Joshua Meltzer, fellow, Global Economy and Development, Brookings Institution, “The Internet, Cross-Border Data Flows and International Trade,” ISSUES IN TECHNOLOGY INNOVATION n. 22, 2—13, p. 1. The Internet is becoming a key platform for commerce that is increasingly happening between buyers and sellers located in different countries, thereby driving international trade. Additionally, as the Internet enables cross-border data flows this is also underpinning global economic integration and international trade. For instance, cross-border data flows are now intrinsic to commerce, from Internetbased communications like email and platforms such as eBay and Facebook that bring buyers and sellers together, from the financial transaction to purchase the product in other countries to the downloading of the goods and services. Despite the growing significance of the Internet for international trade, governments are restricting the Internet in ways that reduce the ability of businesses and entrepreneurs to use the Internet as a place for international commerce and limits the access of consumers to goods and services. Some of these restrictions are being used to achieve legitimate goals such as preventing cybercrime or restricting access to morally offensive content, but may be applied more broadly than necessary to achieve those objectives. In other cases, Internet restrictions are targeting foreign businesses and the sale of goods and services online in order to benefit local ones. Such Internet restrictions are discriminatory and harm international trade. 2. Openness is important to maintaining the economic and trade benefits of the Internet Harold Feld, Senior Vice President, Public Knowledge, Testimony before the House Committee on Energy & Commerce and House Committee on Foreign Affairs, 2—5—13, http://docs.house.gov/meetings/IF/IF16/20130205/100221/HHRG-113-IF16-Wstate-FeldH20130205.pdf, accessed 3-2-15. On the economic side, the Internet and information technology industries continue to be the thriving sector in a slumping global economy. According to OECD (Organization for Economic Cooperation and Development) calculations, in 2009 some 12% of the value added of the nonfinancial business sector in the United States could be attributed to Internet-related activities. At present, the Internet contributes more of a percentage to America's GDP than traditional industry sectors like information and technical services, construction, education, agriculture, and arts, entertainment, and recreation. And it comprises about 5.5 percent or $252 billion of all retail. U.S. economic growth and international trade are dependent upon bringing the world around to our vision of democracy, rule of law, and trade to other nations. Any U.S. trade representative can argue the benefits of free trade to their counterpart in another country, but open access to American products, exports, and consumers online can spread the opportunity of international trade to even the smallest town or village with a broadband connection. American businesses will lose these opportunities for trade and economic expansion if we do not share our vision and success with open Internet communication with the developing world. 88 Paradigm Research 2015-2016 CX—Electronic Communication Aff Internet Adv: Solvency—Domestic Reform Key 1. Domestic laws strongly affect the efficacy of our international efforts to promote an open Internet David A. Gross, former Coordinator of International Communications and Information Policy, U.S. Department of State, Testimony before the House Committee on Energy & Commerce and House Committee on Foreign Affairs, 2—5—13, http://docs.house.gov/meetings/IF/IF16/20130205/100221/HHRG-113-IF16-Wstate-GrossD-20130205.pdf, accessed 3-2-15. Looking ahead, we must recognize the obvious – Internet policy issues affect virtually everyone in the world, and U.S. leadership depends on the power of its forward looking arguments, not just on the historical fact that the United States gave the world a transformational technology. Although establishing a global Internet policy that ensures that individuals, the private sector, and governments work together appropriately to create a safe, secure and sustainable Internet for everyone will be long, complex and challenging, we are fortunate that the United States has a well-established road map to follow. We can continue to lead the world toward greater prosperity and the socially transformational benefits long associated with the Internet. But when we discuss domestically laws and regulations that affect the Internet it is important to recognize that other countries will look carefully at our decisions. We should be prepared for other governments to act based upon what we do – rather than what we say – when making decisions both for their own countries as well as internationally 2. Surveillance reform is vital to ensuring that the global internet remains free and open Kenneth Roth, Executive Director, Human Rights Watch, “The NSA’s Global Threat to Free Speech,” NEW YORK REVIEW OF BOOKS, 11—18—13, www.hrw.org/news/2013/11/18/nsa-s-global-threat-free-speech, accessed 2-19-15. With the NSA’s motto seemingly “If it can be accessed, take it,” one is left with the impression that the US government never undertook a basic analysis of the costs and benefits of NSA surveillance. On the cost side must be weighed not simply the invasion of our privacy but also the harm it does to the unimpeded flow of information over the Internet. Americans may undervalue privacy, but they do tend to understand the importance of free expression. On the benefits side, the NSA has failed to show that the mass scooping up of our electronic communications has meaningfully augmented the targeted electronic surveillance—focused on particular individuals who can be shown to pose a threat—that should be part of any counterterrorism effort. The US government has been at pains to come up with any terrorist plot that would not have been halted but for its mass collection of our communications. In September I asked the White House counsel, Kathryn Ruemmler, about this lack of demonstrable benefit. She fell back on the argument that one must consider the information gained by the surveillance as part of a “mosaic” of information collected by other means. But that was the same rationale— the same word—used by the Bush administration to justify detaining people for interrogation who seemed to have no relevant information to offer. Obama has stopped some of the worst Bush counterterrorism practices. He now needs to go beyond the cheap reassurances he offered us after the first Snowden revelations and rein in the NSA. If the United States wants to preserve the Internet as a vital and free network for connecting people the world over, it will need to reform its own surveillance policies to respect the privacy not only of Americans but also of everyone else. 3. We need to address surveillance—undermines Internet freedom and risks the collapse of our tech companies Evgeny Morozov, journalist, “Who’s the True Enemy of Internet Freedom—China, Russia, or the US?” GUARDIAN, 1—3—15, www.theguardian.com/commentisfree/2015/jan/04/internet-freedom-china-russia-us-google-microsoft-digital-sovereignty, accessed 6-115. However, Russia, China and Brazil are simply responding to the extremely aggressive tactics adopted by none other than the US. In typical fashion, though, America is completely oblivious to its own actions, believing that there is such a thing as a neutral, cosmopolitan internet and that any efforts to move away from it would result in its “Balkanisation”. But for many countries, this is not Balkanisation at all, merely de-Americanisation. US companies have been playing an ambiguous role in this project. On the one hand, they build efficient and highly functional infrastructure that locks in other countries, creating long-term dependencies that are very messy and costly to undo. They are the true vehicles for whatever is left of America’s global modernisation agenda. On the other hand, the companies cannot be seen as mere proxies for the American empire. Especially after the Edward Snowden revelations clearly demonstrated the cosy alliances between America’s business and state interests, these companies need to constantly assert their independence – occasionally by taking their own government to court – even if, in reality, most of their interests perfectly align with those of Washington. This explains why Silicon Valley has been so vocal in demanding that the Obama administration do something about internet privacy and surveillance: if internet companies were seen as compromised parties here, their business would collapse. Just look at the misfortunes of Verizon in 2014: uncertain of the extent of data-sharing between Verizon and the NSA, the German government ditched its contract with the US company in favour of Deutsche Telekom. A German government spokesman said at the time: “The federal government wants to win back more technological sovereignty, and therefore prefers to work with German companies.” 89 Paradigm Research 2015-2016 CX—Electronic Communication Aff Internet Adv: Solvency—Transparency 1. Transparency over the NSA programs is vital to restoring international trust Kevin Bankston, Policy Director, Open Technology Institute, New America Foundation, Center for Democracy and Technology, Testimony before the Senate Judiciary Committee, Subcommittee on Privacy, Technology and the Law, 11—13—13, www.judiciary.senate.gov/imo/media/doc/11-13-13BankstonTestimony.pdf, accessed 3-10-15. Particularly in the wake of recent revelations about the nature of the National Security Agency’s surveillance programs, we believe that this level of transparency about what the companies do—and don’t do—when the government demands their users’ data is critically important for three reasons I’ll discuss today: First, the American people have a clear right and need to know this information, so that they may have a more informed public debate about the appropriateness of the government’s use of its surveillance authorities, and so as to better ensure that those authorities are not misused or abused. Second, the companies have a clear First Amendment right to share this information, and the government’s attempt to gag them and prevent them from sharing even this most basic data is clearly unconstitutional. Third, greater transparency is urgently necessary to restore the international community’s trust in the US Internet industry and the US government, in the face of widespread concern from foreign governments and Internet users about the privacy and security of data that is transmitted to or through the United States. We must take this opportunity to demonstrate that Americans’ constitutional rights and everyone’s human rights are being respected. And if the numbers show otherwise, we must take this opportunity to reform our surveillance laws to better protect our rights as well as our national security. 2. Transparency is critical to rebuilding trust Danielle Kehl et al., policy analyst, “Surveillance Costs: The NSA’s Impact on the Economy, Internet Freedom & Cybersecurity,” POLICY PAPER, Open Technology Institute, New America, 7—14, p. 37. Increased transparency about how the NSA is using its authorities, and how U.S. companies do—or do not—respond when the NSA demands their data is critical to rebuilding the trust that has been lost in the wake of the Snowden disclosures. In July 2013, a coalition of large Internet companies and advocacy groups provided a blueprint for the necessary transparency reforms, in a letter to the Obama Administration and Congress calling for “greater transparency around national security-related requests by the US government to Internet, telephone, and web-based service providers for information about their users and subscribers.” Major companies including Facebook, Google, and Microsoft—joined by organizations such as the Center for Democracy and Technology, New America’s Open Technology Institute, and the American Civil Liberties Union—demanded that the companies be allowed to publish aggregate numbers about the specific types of government requests they receive, the types of data requested, and the number of people affected. They also urged the government to issue its own transparency reports to provide greater clarity about the scope of the NSA’s surveillance programs. “This information about how and how often the government is using these legal authorities is important to the American people, who are entitled to have an informed public debate about the appropriateness of those authorities and their use, and to international users of US-based service providers who are concerned about the privacy and security of their communications,” the letter stated. 90 Paradigm Research 2015-2016 CX—Electronic Communication Aff Internet Adv: Solvency—Transparency [cont’d] 3. Increased transparency is necessary to restoring trust in U.S. tech companies—this is critical to the future of the Internet Kevin Bankston, Policy Director, Open Technology Institute, New America Foundation, Center for Democracy and Technology, Testimony before the Senate Judiciary Committee, Subcommittee on Privacy, Technology and the Law, 11—13—13, www.judiciary.senate.gov/imo/media/doc/11-13-13BankstonTestimony.pdf, accessed 3-10-15. In addition to the companies having a First Amendment right to speak, and we the people having a right to hear what those willing speakers have to say, we also all have a shared interest in restoring the trust in the US Internet industry that has been lost as a result of the NSA’s surveillance programs, the secrecy surrounding them, and the reporting (and in some cases misreporting) of the nature and scope of those programs. The international outcry over the NSA’s activities is substantial, and has doubtlessly impacted the competiveness of US Internet companies that serve international users. A study by the Information Technology & Innovation Foundation in the beginning of August—when much about the NSA’s activities was still unreported—predicted that the US cloud computing industry stands to lose $22 to $35 billion over the next three years in response to the NSA scandal. Forrester Research, building on the work of ITIF, concluded that the damage could be much greater, as high as $180 billion, or a quarter of all information technology service provider revenues in the same timeframe. Internet industry leaders like Mark Zuckerberg of Facebook are warning that international users of US services are losing trust in US Internet companies, and US telecommunications providers like AT&T are already seeing the NSA scandal interfere with their international business dealings. Meanwhile, some European policymakers are threatening to revoke the “safe harbor” agreement that allows US companies to process the personal data of European users, while a number of international leaders are discussing how to avoid the use of American services and to provide for—or require—the localization of Internet data and services. Congress needs to act quickly to remedy this growing trust gap that threatens the future of our Internet economy, and to allow the affected companies themselves to directly speak to and rebuild trust with their users about how they respond to the US government’s demands for user data. Such transparency, in addition to serving the economic interest of the United States and helping to protect the constitutional rights of American companies and the American people, also and importantly helps to promote and preserve the human rights of all people who use the Internet. As an international leader in the promotion of “Internet Freedom” as a human rights imperative, the US must also be a leader when it comes to transparency around Internet surveillance—and, to the extent that transparency reveals abuse, a leader in surveillance reform. 91 Paradigm Research 2015-2016 CX—Electronic Communication Aff Internet Adv: Solvency—Answers to “Irreversible” 1. The damage is not irreversible, but the status quo will only benefit Chinese tech companies Danielle Kehl et al., policy analyst, “Surveillance Costs: The NSA’s Impact on the Economy, Internet Freedom & Cybersecurity,” POLICY PAPER, Open Technology Institute, New America, 7—14, p. 11. Outside of the cloud computing industry, it is still too early to tell which of these shifts may be temporary and which will have a more lasting impact. Despite an interest in finding alternatives, foreign companies and governments are also discovering the challenges of avoiding U.S. businesses altogether—either because of path dependence, because switching costs are too high, or because there simply are not enough alternative providers in certain markets that offer comparable products at the same prices. This is particularly true for large government deals and enterprise solutions, markets that many American businesses dominate, because of the amount of time, money, and effort it would take to move away from U.S. companies. Some have cynically argued that the biggest “winners” in the long run will be Chinese companies like Huawei, which are also vulnerable to state eavesdropping but may be cheaper than the American alternatives. 2. We need to act now to limit the backlash to U.S. tech companies Danielle Kehl et al., policy analyst, “Surveillance Costs: The NSA’s Impact on the Economy, Internet Freedom & Cybersecurity,” POLICY PAPER, Open Technology Institute, New America, 7—14, p. 11. The pressure is increasing on American companies to respond to the revelations in order to mitigate potential backlash and prevent foreign companies from poaching their business. According to the R Street Institute study, “It appears the NSA’s aggressive surveillance has created an overall fear among U.S. companies that there is ‘guilt by association’ from which they need to proactively distance themselves.” Some companies have tried to regain trust by publicly stating that they are not part of PRISM or other NSA programs, issuing disclaimers along the lines of those published by Amazon and Salesforce in June 2013. Others that have been directly linked to the NSA programs have publicly criticized the American government and called for greater transparency in order to rebuild user confidence and counteract potential economic harms. To that end, nine major American companies—AOL, Apple, Dropbox, Facebook, Google, LinkedIn, Microsoft, Twitter, and Yahoo—joined together in the “Reform Government Surveillance” campaign in January 2014, where they launched a website and wrote an open letter to government leaders laying out principles for surveillance reform, including an end to bulk collection and opposition to data localization requirements. Since the launch, the coalition has urged reform on Capitol Hill through outreach and letters to Congress, supported the February 2014 “The Day We Fight Back” activist campaign, and hired a lobbyist to bolster their efforts to curb the NSA’s reach. This unlikely, public partnership of some of Internet’s biggest rivals speaks to the seriousness of the threats to their collective business interests. Indeed, according to an April 2014 Harris poll commissioned by a data security company, nearly half of the 2,000 respondents (47 percent) have changed their online behavior since the NSA leaks, paying closer attention not only to the sites they visit but also to what they say and do on the Internet. In particular, 26 percent indicated that they are now doing less online shopping and banking since learning the extent of government surveillance programs. Clearly, there are significant financial incentives for companies to distance themselves from the programs, and as a result, they are expending capital—actual and political—to do so. 3. We have not yet crossed the brink in terms of balkanization / data localization Richard Fontaine, Senior Fellow, “Bringing Liberty Online: Reenergizing the Internet Freedom Agenda in a Post-Snowden Era,” POLICY BRIEF, Center for a New American Security, 9—14, p. 4. A cautionary note is in order when interpreting the reactions to the Snowden affair. Some developments – such as data localization requirements and worries about a splintering Internet – predated the revelations and have been accelerated rather than prompted by them. Autocratic governments also drew lessons from the technology-fueled Arab Spring, resulting in actions aimed at limiting Internet freedom. Other white-hot responses cooled when rhetoric turned to action. Brazil’s new “Marco Civil” Internet law, approved in April 2014, left out a number of the strongest responses that had been widely debated in the run-up to its adoption. The EU did not go through with its threatened Safe Harbor data-exchange boycott. And for all of the worries about laws that would require the local storage of users’ data, few countries have actually passed them. Nevertheless, the potential for such fallout remains. 92 Paradigm Research 2015-2016 CX—Electronic Communication Aff Allied Cooperation Add-On: 2AC A. Mass surveillance undermines cooperation with our allies Eileen Donahoe, Visiting Scholar, Freeman Spogli Institute for International Studies, Stanford University and former U.S. Ambassador to the U.N. Human Rights Council, “Why the NSA Undermines National Security,” REUTERS, 3—6—14, http://blogs.reuters.com/great-debate/2014/03/06/why-nsa-surveillance-undermines-national-security/, accessed 3-14-15. Some have argued, though, that there is a big difference between the U.S. government engaging in mass-surveillance activities and authoritarian governments doing so. That “big difference” is supposed to be democratic checks and balances, transparency and adherence to the rule of law. Current NSA programs, however, do not operate within these constraints. With global standards for digital surveillance now being set, our political leaders must remember that U.S. security depends upon much more than unimpeded surveillance capabilities. As German Chancellor Angela Merkel, one of President Barack Obama’s most trusted international partners, has wisely reminded us, just because we can do something does not mean that we should do it. National security policies that fail to calculate the real costs of arbitrary mass surveillance threaten to make us less secure. Without trusted and trusting partners, U.S. priority initiatives in complex global negotiations will be non-starters. The president, his advisers and our political leaders should reassess the costs of the NSA’s spy programs on our national security, our freedom and our democracy. By evaluating these programs through a smart-power lens, we will be in a stronger position to regain the global trust and credibility so central to our national security. B. Strong allied relations are key to U.S. leadership Joseph S. Nye Jr., Professor, JFK School of Government, Harvard University, “American Power in the 21st Century Will Be Defined by the ‘Rise of the Rest’,” WASHINGTON POST, 6—28—13, http://articles.washingtonpost.com/2013-0628/opinions/40255646_1_american-power-u-s-economy-united-states, accessed 3-24-15. In the last century, the United States rose from the status of second-tier power to being the world’s sole superpower. Some worry that the United States will be eclipsed in this century by China, but that is not the problem. There is never just one possible outcome. Instead, there are always a range of possibilities, particularly regarding political change in China. Aside from the political uncertainties, China’s size and high rate of economic growth will almost certainly increase its strength in relation to the United States. But even when China becomes the world’s largest economy, it will lag decades behind the United States in per-capita income, which is a better measure of an economy’s sophistication. Moreover, given our energy resources, the U.S. economy will be less vulnerable than the Chinese economy to external shocks. Growth will bring China closer to the United States in power resources, but as Singapore’s former prime minister Lee Kwan Yew has noted, that does not necessarily mean that China will surpass the United States as the world’s most powerful country. Even if China suffers no major domestic political setbacks, projections based on growth in gross domestic product alone ignore U.S. military and “soft power” advantages as well as China’s geopolitical disadvantages in the Asian balance of power. The U.S. culture of openness and innovation will keep this country central in an information age in which networks supplement, if not fully replace, hierarchical power. The United States is well positioned to benefit from such networks and alliances if our leaders follow smart strategies. In structural terms, it matters that the two entities with per-capita income and sophisticated economies similar to that of the United States — Europe and Japan — are both allied with the United States. In terms of balances-of-power resources, that makes a large difference for the net position of American power, but only if U.S. leaders maintain the alliances and institutional cooperation. In addition, in a more positive sum view of power with, rather than over, other countries, Europe and Japan provide the largest pools of resources for dealing with common transnational problems. On the question of absolute — rather than relative — American decline, the United States faces serious domestic problems in debt, secondary education and political gridlock. But these issues are only part of the picture. Of the many possible futures, stronger cases can be made for the positive over the negative. Among the negative futures, the most plausible is one in which the United States overreacts to terrorist attacks by turning inward and closing itself off to the strength it obtains from openness. But barring such mistaken strategies, there are, over a longer term, solutions to the major problems that preoccupy us. Of course, for political or other reasons, such solutions may remain forever out of reach. But it is important to distinguish between situations that have no solutions and those that, at least in principle, can be solved. Decline is a misleading metaphor and, fortunately, President Obama has rejected the suggested strategy of “managing decline.” As a leader in research and development, higher education and entrepreneurial activity, the United States is not in absolute decline, as happened in ancient Rome. In relative terms, there is a reasonable probability that the United States is likely to remain more powerful than any single state in the coming decades. We do not live in a “post-American world,” but neither do we live any longer in the “American era” of the late 20th century. In terms of primacy, the United States will be “first” but not “sole.” No one has a crystal ball, but the National Intelligence Council (which I once chaired) may be correct in its 2012 projection that although the unipolar moment is over, the United States probably will remain first among equals among the other great powers in 2030 because of the multifaceted nature of its power and legacies of its leadership. The power resources of many states and non-state actors will rise in the coming years. U.S. presidents will face an increasing number of issues in which obtaining our preferred outcomes will require power with others as much as power over others. Our leaders’ capacity to maintain alliances and create networks will be an important dimension of our hard and soft power. Simply put, the problem of American power in the 21st century is not one of a poorly specified “decline” or being eclipsed by China but, rather, the “rise of the rest.” The paradox of American power is that even the largest country will not be able to achieve the outcomes it wants without the help of others. 93 Paradigm Research 2015-2016 CX—Electronic Communication Aff Allied Cooperation Add-On: 2AC [cont’d] C. U.S. leadership is key to global stability and addressing a number of existential threats Zachary Keck, assistant Editor, “America’s Relative Decline: Should We Panic?” THE DIPLOMAT, 1—24—14, http://thediplomat.com/2014/01/americas-relative-decline-should-we-panic/, accessed 3-30-14. Still, on balance, the U.S. has been a positive force in the world, especially for a unipolar power. Certainly, it’s hard to imagine many other countries acting as benignly if they possessed the amount of relative power America had at the end of the Cold War. Indeed, the British were not nearly as powerful as the U.S. in the 19th Century and they incorporated most of the globe in their colonial empire. Even when it had to contend with another superpower, Russia occupied half a continent by brutally suppressing its populace. Had the U.S. collapsed and the Soviet Union emerged as the Cold War victor, Western Europe would likely be speaking Russian by now. It’s difficult to imagine China defending a rule-based, open international order if it were a unipolar power, much less making an effort to uphold a minimum level of human rights in the world. Regardless of your opinion on U.S. global leadership over the last two decades, however, there is good reason to fear its relative decline compared with China and other emerging nations. To begin with, hegemonic transition periods have historically been the most destabilizing eras in history. This is not only because of the malign intentions of the rising and established power(s). Even if all the parties have benign, peaceful intentions, the rise of new global powers necessitates revisions to the “rules of the road.” This is nearly impossible to do in any organized fashion given the anarchic nature of the international system, where there is no central authority that can govern interactions between states. We are already starting to see the potential dangers of hegemonic transition periods in the Asia-Pacific (and arguably the Middle East). As China grows more economically and militarily powerful, it has unsurprisingly sought to expand its influence in East Asia. This necessarily has to come at the expense of other powers, which so far has primarily meant the U.S., Japan, Vietnam and the Philippines. Naturally, these powers have sought to resist Chinese encroachments on their territory and influence, and the situation grows more tense with each passing day. Should China eventually emerge as a global power, or should nations in other regions enjoy a similar rise as Kenny suggests, this situation will play itself out elsewhere in the years and decades ahead. All of this highlights some of the advantages of a unipolar system. Namely, although the U.S. has asserted military force quite frequently in the post-Cold War era, it has only fought weak powers and thus its wars have been fairly limited in terms of the number of casualties involved. At the same time, America’s preponderance of power has prevented a great power war, and even restrained major regional powers from coming to blows. For instance, the past 25 years haven’t seen any conflicts on par with the Israeli-Arab or Iran-Iraq wars of the Cold War. As the unipolar era comes to a close, the possibility of great power conflict and especially major regional wars rises dramatically. The world will also have to contend with conventionally inferior powers like Japan acquiring nuclear weapons to protect their interests against their newly empowered rivals. But even if the transitions caused by China’s and potentially other nations’ rises are managed successfully, there are still likely to be significant negative effects on international relations. In today’s “globalized” world, it is commonly asserted that many of the defining challenges of our era can only be solved through multilateral cooperation. Examples of this include climate change, health pandemics, organized crime and terrorism, global financial crises, and the proliferation of weapons of mass destruction, among many others. A unipolar system, for all its limitations, is uniquely suited for organizing effective global action on these transnational issues. This is because there is a clear global leader who can take the initiative and, to some degree, compel others to fall in line. In addition, the unipole’s preponderance of power lessens the intensity of competition among the global players involved. Thus, while there are no shortages of complaints about the limitations of global governance today, there is no question that global governance has been many times more effective in the last 25 years than it was during the Cold War. The rise of China and potentially other powers will create a new bipolar or multipolar order. This, in turn, will make solving these transnational issues much more difficult. Despite the optimistic rhetoric that emanates from official U.S.-China meetings, the reality is that Sino-American competition is likely to overshadow an increasing number of global issues in the years ahead. If other countries like India, Turkey, and Brazil also become significant global powers, this will only further dampen the prospects for effective global governance. 94 Paradigm Research 2015-2016 CX—Electronic Communication Aff Cybersecurity Add-On: 2AC A. Spying threatens cybersecurity—makes companies reluctant to cooperate with the NSA, leaving our infrastructure vulnerable Aliya Sternstein, “Industry Backlash against Surveillance Jeopardizes Cybersecurity,” NEXTGOV, 9—5—13, www.nextgov.com/cybersecurity/2013/09/industry-backlash-against-surveillance-jeopardizes-cybersecurity/69940/, accessed 2-22-15. The private sector’s distrust of the National Security Agency following domestic spying revelations could undermine efforts to secure systems running utilities and other vital U.S. industries, former federal civilian and military officials say. NSA, maker of arguably the best encryption tools to protect data, now is attracting more attention for decrypting everyone else’s data, after disclosures by ex-NSA contractor Edward Snowden of massive Internet surveillance. "NSA has postured itself as a neutral arbiter who could provide these capabilities to the private sector and really didn't necessarily want much in return," said Christopher Finan, a former White House and Pentagon official who, until July, was involved in a Defense Department cyber offense research program called Plan X. "I don’t know if they can present themselves as the same honest broker now that we’re seeing the enormous quantities of data that they are actually taking in." Traditionally, private industry has counted on NSA's cybersecurity expertise for incident response, even though a 2003 presidential directive assigned the Homeland Security Department the primary job of securing key U.S. sectors. Now, many of those critical infrastructure firms might shun any government help, former officials said. Going forward, private cyber forensics firms and nonprofit research institutes could see increased demand. "Part of the fallout from the NSA revelations is that the private sector has somewhat less confidence in government to manage its information and its networks. I think that neither DHS nor DoD grow in stature in the eyes of industry because government, generally, is viewed with increased scrutiny,” said Alec Ross, a former senior State Department Internet policy adviser for the Obama administration. He added, “Ironically, any decreased confidence in government by industry comes in no small measure because of wariness of government contractors. The fact that such a screwed up kid as Edward Snowden was able to access extremely sensitive content does not build confidence." James Lewis, a fellow at the Center for Strategic and International Studies who advises agencies and Congress on cybersecurity, said there definitely will be reluctance to turn to NSA for protection -- and that is unfortunate. The degree of government involvement in regulating cybersecurity and facilitating the exchange of information about threats will remain status quo, he said. "If anything we’re just a little further back because NSA playing a larger role is definitely out of the question, but that doesn't mean that we’ll do something else. It just that it means that we’ll do less of what we’re doing now." B. Cyber attacks risks provoking a nuclear war between the U.S. and Russia James E. Cartwright, USMC General (ret. And former Vice Chair, Joint Chiefs of Staff and Vladimir Dvorkin, Major General (ret.), Russia’s Strategic Rocket Force, “How to Avert a Nuclear War,” NEW YORK TIMES, 4—19—15, www.nytimes.com/2015/04/20/opinion/how-to-avert-a-nuclear-war.html, accessed 6-3-15. We find ourselves in an increasingly risky strategic environment. The Ukrainian crisis has threatened the stability of relations between Russia and the West, including the nuclear dimension — as became apparent last month when it was reported that Russian defense officials had advised President Vladimir V. Putin to consider placing Russia’s nuclear arsenal on alert during last year’s crisis in Crimea. Diplomatic efforts have done little to ease the new nuclear tension. This makes it all the more critical for Russia and the United States to talk, to relieve the pressures to “use or lose” nuclear forces during a crisis and minimize the risk of a mistaken launch. The fact is that we are still living with the nuclear-strike doctrine of the Cold War, which dictated three strategic options: first strike, launch on warning and post-attack retaliation. There is no reason to believe that Russia and the United States have discarded these options, as long as the architecture of “mutually assured destruction” remains intact. For either side, the decision to launch on warning — in an attempt to fire one’s nuclear missiles before they are destroyed — would be made on the basis of information from early-warning satellites and ground radar. Given the 15- to 30-minute flight times of strategic missiles, a decision to launch after an alert of an apparent attack must be made in minutes. This is therefore the riskiest scenario, since provocations or malfunctions can trigger a global catastrophe. Since computerbased information systems have been in place, the likelihood of such errors has been minimized. But the emergence of cyberwarfare threats has increased the potential for false alerts in early-warning systems. The possibility of an error cannot be ruled out. American officials have usually played down the launch-on-warning option. They have argued instead for the advantages of post-attack retaliation, which would allow more time to analyze the situation and make an intelligent decision. Neither the Soviet Union nor Russia ever stated explicitly that it would pursue a similar strategy, but an emphasis on mobile missile launchers and strategic submarines continues to imply a similar reliance on an ability to absorb an attack and carry out retaliatory strikes. Today, however, Russia’s early warning system is compromised. The last of the satellites that would have detected missile launches from American territory and submarines in the past stopped functioning last fall. This has raised questions about Russia’s very ability to carry out launch-on-warning attacks. 95 Paradigm Research 2015-2016 CX—Electronic Communication Aff Human Rights Add-On: 2AC A. NSA surveillance undermines our human rights leadership Steven Watt, senior staff attorney, Human Rights Program, ACLU, “Obama Needs to Use this U.N. Meeting to Back Privacy as a Human Right,” DEFENSE ONE, 3—13—14, www.defenseone.com/ideas/2014/03/obama-needs-use-un-meeting-back-privacy-humanright/80425/?oref=d-river, accessed 3-1-15. Privacy rights, however, are not absolute. Governments can legitimately interfere with a person’s privacy under narrow circumstances, such as during emergencies or threats to national security. These circumstances, however, do not provide the government with a license to run roughshod over people’s privacy rights. Instead, governments must justify their actions and show that any interference with privacy, such as surveillance powers, is established in laws and regulations, which are clear and precise, necessary to achieve legitimate government objectives, and proportionate to achieving those limited goals. Privacy also requires an independent, impartial, and competent judicial or administrative tribunal to oversee the government’s conduct. And when abuse and mistakes occur, government officials and others responsible must be held accountable. The NSA’s mass surveillance programs fail to meet these exacting standards. And in doing so, they violate the United States’ international human rights obligation to respect and ensure the privacy rights of U.S. and non-U.S. citizens, both inside and outside the United States, alike. This year, President Obama singled out China and Russia as countries that fail to discuss their surveillance programs or the privacy concerns of their citizens and others. He also announced that our government should be “held to a different standard precisely because we have been at the forefront of defending personal privacy and human dignity.” Unfortunately, the United States record on privacy belies this rhetoric. To start regaining its human rights leadership role, the United States should recognize, without equivocation, that privacy is a human right. B. Stronger human rights are key to global stability William W. Burke-White, Lecturer, Public and International Affairs and Senior Special Assistant to the Dean, Woodrow Wilson School of Public and International Affairs, Princeton University, “Human Rights and National Security: The Strategic Correlation,” THE HARVARD ENVIRONMENTAL LAW REVIEW v. 17, Spring 20 04, p. 268. Given the linkage between a state's domestic human rights record and its propensity to engage in international aggression, U.S. national security could be enhanced by a greater emphasis on the promotion of human rights in U.S. foreign policy. In short, better human rights practices around the globe make the United States safer and more secure. The human rights informed foreign policy presented here is intended to supplement and alter--not replace--traditional foreign policy. Such a policy would not neglect national security concerns, but rather would understand the promotion of national security and human rights to be related and mutually reinforcing goals. The linkage between human rights and international aggression offers a new means of predicting, preventing, and addressing potential aggressor states. Further, it suggests alternative mechanisms for dealing with pressing threats such as terrorism and WMD. Finally, it offers a new opportunity for renewed U.S. engagement with the U.N. in protecting international peace and security. 96 Paradigm Research 2015-2016 CX—Electronic Communication Aff Disadvantage Ans: Terrorism—General 1. Nationalizing counterterror is inefficient and dehumanizing Steven R. Morrison, Assistant Professor, Law, University of North Dakota, “War in the Digital Age: The System of Domestic Counterterrorism Law Enforcement,” STANFORD LAW & POLICY REVIEW v. 25, 2014, p. 376-377. Conversely, nationalized criminal justice tends to produce law enforcement approaches that contain a number of inefficiencies. First, nationalized criminal justice tends to be politicized. Since prohibition, the media and national political figures have used a perpetual crime wave to justify their existence. Whether the concern was alcohol, communism, drugs, or terrorists, nationalized crime moves respond not solely to demands of justice or nuanced policy needs, but also to politicized fears that are rarely reflective of reality. Relative to the actual danger, inordinate amounts of resources have been directed at these concerns. Second, nationalized criminal justice tends to dehumanize offenders by viewing them not as people or community members, but merely as criminals. This approach discounts the value of leniency and dismisses alternative sentencing as an ineffective attempt at rehabilitation and an elision of retributivist principles. Third, nationalized criminal justice tends to be blind to local needs and concerns. Disgruntled members of the American populace who may tend toward terrorist conduct probably do not do so for the same reasons, or in the same ways. The missing Somali teens in Minneapolis in 2009, thought to have joined Al Shabaab; lone wolves who took criminal action, like the Times Square would-be bomber Faisal Shahzad; those who responded to a government sting and may be mentally ill, like Rezwan Ferdaus; and those who responded to a government sting based on arrogant anger, like Tarik Shah, would all probably respond differently to different interventions. Managing the domestic war on terror from Washington, as has been the case, may not produce the nuanced justice that traditional criminal law demands. It is unclear, furthermore, that centralized policing ensures public safety more than localized approaches. It is clear, however, that the positive feedback loop engendered by massive, centralized policing creates inefficiencies and unjust outcomes. 2. Terrorists can go low-tech and dodge electronic surveillance programs Shayana Kadidal, Senior Managing Attorney, Center for Constitutional Rights, “NSA Surveillance: The Implications for Civil Liberties,” I/S: A JOURNAL OF LAW AND POLICY FOR THE IFNORMATION SOCIETY v. 10 n. 2, 2014, p. 474-475. Finally, any such system, no matter how sophisticated, would be easy to avoid if terrorist conspirators simply took a low-tech approach. Recall that by the afternoon of 9/11 there were already pundits on the networks announcing that soon the public would hear about how the plotters pulled it off with encryption. Instead, they used the most primitive of techniques: staying off-grid, communicating in code when they did use email (from public computer terminals), etc. As Newsweek summarized it, “[t]he NSA’s top brass assumes that if a threat does not show up in its databases, it doesn’t exist. As one woman who lives online, Marcy Wheeler, said, the next terrorist attack will come from a group that stays offline ‘and we’re going to be hit bad by it because we have this hubris about the degree to which all people live online.’” 3. Mass data collection isn’t justified even if they win the full weight of their terrorism link arguments Richard A. Clarke et al., President’s Review Group on Intelligence and Communications Technologies, LIBERTY AND SECURITY IN A CHANGING WORLD, Report and Recommendations, 12—12—13, p. 114-115. Third, one might argue that, despite these concerns, the hypothetical mass collection of personal information would make it easier for the government to protect the nation from terrorism, and it should therefore be permitted. We take this argument seriously. But even if the premise is true, the conclusion does not necessarily follow. Every limitation on the government’s ability to monitor our conduct makes it more difficult for the government to prevent bad things from happening. As our risk-management principle suggests, the question is not whether granting the government authority makes us incrementally safer, but whether the additional safety is worth the sacrifice in terms of individual privacy, personal liberty, and public trust. Although we might be safer if the government had ready access to a massive storehouse of information about every detail of our lives, the impact of such a program on the quality of life and on individual freedom would simply be too great. And this is especially true in light of the alternative measures available to the government. Specifically, even if the government cannot collect and store for future use massive amounts of personal information about our lives, it would still be free under section 215 to obtain specific information relating to specific individuals or specific terrorist threats from banks, telephone companies, credit card companies, and the like—when it can demonstrate to the FISC that it has reasonable grounds to access such information 97 Paradigm Research 2015-2016 CX—Electronic Communication Aff Disadvantage Ans: Terrorism—General [cont’d] 4. Most of the leads generated from NSA-style surveillance are worthless House Committee on the Judiciary Majority Staff, REINING IN THE IMPERIAL PRESIDENCY: LESSONS AND RECOMMENDATIONS RELATING TO THE PRESIDENCY OF GEORGE W. BUSH, Final Report to Chairman John Conyers, Jr., 3—09, p. 165. A former senior prosecutor stated that “[t]he information was so thin, and the connections were so remote, that they never led to anything, and I never heard any follow-up,” and FBI resources were sidetracked on fruitless investigations of “dead ends or innocent Americans.” Indeed, the leads from the President’s surveillance program were seen as so unproductive within the FBI that agents joked that “a new bunch of tips meant more calls to Pizza Hut,” even after the NSA began ranking its tips in response to FBI complaints. FBI Director Mueller testified to the Senate that “most leads [received by the FBI], whether it be from the NSA or overseas from the CIA, ultimately turn out not to be valid or worthwhile.” And when interviewed by Wolf Blitzer on May 14, 2006, then-Senate Majority Leader Bill Frist (R-TN), while defending the program’s lawfulness, refused to identify or even acknowledge any specific successes against terrorism, even though he was asked three separate times whether “there has been one success story that you can point to.” 5. There are very few terrorists who are touched by domestic surveillance protections Bruce Fein, constitutional expert, “Presidential Authority to Gather Foreign Intelligence,” PRESIDENTIAL STUDIES QUARTERLY v. 37 n. 1, 3—07, p. 34. Yoo also neglects to remember that virtually all Al Qaeda intelligence is gathered outside of FISA because the NSA’s electronic surveillance and physical searches generally target persons in foreign countries. Intelligence experts estimate the number of genuine Al Qaeda members in the United States at one to two dozen. They pose less of a threat to the people of the United States than do the perpetrators of the approximately twenty thousand murders committed annually here. The latter criminals do not make known their antisocial propensities to the world. It is more difficult to establish probable cause to obtain a search or arrest warrant against them than it is to obtain a FISA warrant to spy on a suspected foreign agent. Yet the Constitution does not permit abandonment of the Fourth Amendment to make foiling murder easier. It does not even permit watering down the Fourth Amendment to thwart domestic terrorism a la Timothy McVeigh. There is even less reason for relaxing the amendment’s privacy protection in targeting American citizens on American soil for electronic surveillance and physical searches in pursuit of foreign intelligence on international terrorism. 6. The absence of prosecutions indicates that the NSA programs are only of limited effectiveness Jameel Jaffer, fellow, Open Society Foundations, “Needles Are Harder to Find in Bigger Haysticks,” NEW YORK TIMES, Room for Debate, 6—10—13, www.nytimes.com/roomfordebate/2013/06/09/is-the-nsa-surveillance-threat-real-or-imagined, accessed 2-19-15. Joshua, I agree with you that effectiveness matters. I can’t help but be skeptical, though. If these dragnet programs are effective, where’s the evidence? As you note, at least one of the success stories identified by anonymous intelligence officials—the story relating to Zazi— seems not to withstand scrutiny. Let’s also note that there’s no evidence the government has relied on evidence derived from these dragnet programs in criminal prosecutions. If these dragnet programs had been effective, wouldn’t we have seen at least a handful of criminal prosecutions? Of course intelligence surveillance has many purposes; gathering evidence of criminal activity is just one of them. Still, shouldn’t the apparent absence of any criminal prosecution make us question how necessary the programs really are? 7. Mass surveillance programs have never stopped a terrorist attack Conor Friedersdorf, staff, “The Last Defenders of the NSA,” THE ATLANTIC, 5—19—15, www.theatlantic.com/politics/archive/2015/05/the-last-defenders-for-the-phone-dragnet/393581/, accessed 5-31-15. And even his best-in-class effort fell well short. To illustrate the ongoing threat of terrorism, he begins his article by referencing the Islamists killed while trying to attack Pamella Geller’s cartoon contest, noting that while they were quickly shot dead, “There may not be heavy security in place the next time ISIS attacks.” While true, what’s more relevant is that the phone dragnet did nothing to help prevent the attack even though it was very much operational, just as it failed to stop the Tsarnaev brothers before they attacked Boston. In both cases no more lives would’ve been lost without it. “The pesky, rather inconvenient fact is that the government's mass surveillance programs operating under Section 215 of the Patriot Act have never stopped an act of terrorism,” the ACLU notes. “That is not the opinion of the NSA's most ardent critics, but rather the findings of the president's own review board and the Privacy and Civil Liberties Oversight Board. This program has had over a decade to prove its value, and yet there is no evidence that it has helped identify a terrorism suspect or ‘made a concrete different in the outcome of a counterterrorism investigation.’” 98 Paradigm Research 2015-2016 CX—Electronic Communication Aff Disadvantage Ans: Terrorism—General [cont’d] 8. It is statistically impossible for mass surveillance to decrease terror attacks Ray Corrigan, Senior Lecturer, Mathematics, Computing, and Technology, Open University, “Mass Surveillance Will Not Stop Terrorism,” SLATE, 1—25—15, www.slate.com/articles/health_and_science/new_scientist/2015/01/mass_surveillance_against_terrorism_gathering_intelligence_on_all_ is_statistically.html, accessed 2-19-15. It is statistically impossible for total population surveillance to be an effective tool for catching terrorists. Even if your magic terroristcatching machine has a false positive rate of 1 in 1,000—and no security technology comes anywhere near this—every time you asked it for suspects in the U.K. it would flag 60,000 innocent people. Law enforcement and security services need to be able to move with the times, using modern digital technologies intelligently and through targeted data preservation—not a mass surveillance regime—to engage in court-supervised technological surveillance of individuals whom they have reasonable cause to suspect. That is not, however, the same as building an infrastructure of mass surveillance. Mass surveillance makes the job of the security services more difficult and the rest of us less secure. 9. Surveillance is not preventative—too many dots, does better at backtracking attacks Joshua A Kroll, staff, “The Cyber Conundrum,” AMERICAN PROSPECT, 6—1—15, http://prospect.org/article/cyber-conundrum, accessed 6-4-15. Surveillance of adversaries, both overseas and domestically with an appropriate court order, is prudent and necessary to prevent attacks and inform diplomatic and military decisions. Universal domestic surveillance is harder to justify on the merits. Officials argue that they need all of the data if we want them to connect the dots. But the problem is not a lack of dots. More often, the problem is that the dots can be connected in too many ways. There is no reliable way to tell in advance which pattern marks an impending attack and which simply reflects one of the endless permutations of human social behavior. Surveillance data is more useful in hindsight. In the Sony Pictures hack, intelligence and investigation were critical in connecting the dots after the attack had happened, even though they did very little to prevent the attack or to discover it in the year or so that it was ongoing. 10. The NSAs program will only catch incompetent terrorists Leonid Bershidsky, “U.S. Surveillance Is not Aimed at Terrorists,” BLOOMBERG, 6—23—13, www.bloomberg.com/news/2013-0623/u-s-surveillance-is-not-aimed-at-terrorists.html, accessed 2-22-15. The debate over the U.S. government’s monitoring of digital communications suggests that Americans are willing to allow it as long as it is genuinely targeted at terrorists. What they fail to realize is that the surveillance systems are best suited for gathering information on law-abiding citizens. People concerned with online privacy tend to calm down when told that the government can record their calls or read their e-mail only under special circumstances and with proper court orders. The assumption is that they have nothing to worry about unless they are terrorists or correspond with the wrong people. The infrastructure set up by the National Security Agency, however, may only be good for gathering information on the stupidest, lowest-ranking of terrorists. The Prism surveillance program focuses on access to the servers of America’s largest Internet companies, which support such popular services as Skype, Gmail and iCloud. These are not the services that truly dangerous elements typically use. 11. There is no real evidence that the program is effective Yochai Benkler, “Fact: The NSA Gets Negligible Intel from Americans’ Metadata. So End Collection,” GUARDIAN, 10—8—13, www.theguardian.com/commentisfree/2013/oct/08/nsa-bulk-metadata-surveillance-intelligence, accessed 2-22-15. It is hardly surprising that supporters of bulk collection fervently believe it is critical to national security. No psychologically wellbalanced person could permit herself to support a program that compromises the privacy of tens of millions of Americans, costs billions of dollars, and imposes direct and articulable harm to cyber security by undermining the security of commercial products and public standards without holding such a belief truly and honestly. But the honest faith of insiders that their bureaucratic mission is true and critical is no substitute for credible evidence. A dozen years of experience has produced many public overstatements and much hype from insiders, but nothing to support the proposition that the program works at all, much less that its marginal contribution is significant enough to justify its enormous costs in money, freedom, and destabilization of internet security. No rational cost-benefit analysis could justify such a leap of faith. If the NSA cannot show real, measurable evidence of its effectiveness, evidence that doesn't collapse as soon as it is examined and isn't a vague appeal to amorphous, measurement-free "peace of mind", its bulk collection program has to go. 99 Paradigm Research 2015-2016 CX—Electronic Communication Aff Disadvantage Ans: Terrorism—Cooperation Turn - Spying won’t work—spurs a global reaction/backlash that confounds surveillance efforts Martha Mendoza, “ Backlash Grows to NSA Surveillance,” ASSOCIATED PRESS, 10—13—13, www.denverpost.com/nationworld/ci_24297907/backlash-grows-nsa-surveillance, accessed 2-22-15. From Silicon Valley to the South Pacific, counterattacks to revelations of widespread National Security Agency surveillance are taking shape, from a surge of new encrypted e-mail programs to technology that sprinkles the Internet with red-flag terms to confuse would-be snoops. Policymakers, privacy advocates and political leaders around the world have been outraged at the near weekly disclosures from former intelligence contractor Edward Snowden that expose sweeping U.S. government surveillance programs. "Until this summer, people didn't know anything about the NSA," said Amy Zegart, co-director of the Center for International Security and Cooperation at Stanford University. "Their own secrecy has come back to bite them." Activists are fighting back with high-tech civil disobedience, entrepreneurs want to cash in on privacy concerns, Internet users want to keep snoops out of their computers and lawmakers want to establish stricter parameters. Some of the tactics are more effective than others. For example, Flagger, a program that adds words like "blow up" and "pressure cooker" to web addresses that users visit, is probably more of a political statement than actually confounding intelligence agents. Developer Jeff Lyon in Santa Clara, Calif., said he is delighted if it generates social awareness, and that 2,000 users have installed it to date. He said, "The goal here is to get a critical mass of people flooding the Internet with noise and make a statement of civil disobedience." University of Auckland associate professor Gehan Gunasekara said he has received "overwhelming support" for his proposal to "lead the spooks in a merry dance," visiting radical websites and setting up multiple online identities. And "pretty soon everyone in New Zealand will have to be under surveillance," he said. Electronic Frontier Foundation activist Parker Higgens in San Francisco has a more direct strategy: by using encrypted e-mail and browsers, he creates more smoke screens for the NSA. "Encryption loses its value as an indicator of possible malfeasance if everyone is using it," he said. CryptoParties are springing up around the world as well. They are small gatherings where hosts teach attendees, who bring their digital devices, how to download and use encrypted email and secure Internet browsers. "Honestly, it doesn't matter who you are or what you are doing. If the NSA wants to find information, they will," said organizer Joshua Smith. "But we don't have to make it easy for them." 100 Paradigm Research 2015-2016 CX—Electronic Communication Aff Disadvantage Ans: Terrorism—Effectiveness Exaggerated 1. Claims of program effectiveness are hollow and ill-supported Jameer Jaffer, fellow, Open Society Foundations, “Secrecy and Freedom,” NEW YORK TIMES, Room for Debate, 6—9—13, www.nytimes.com/roomfordebate/2013/06/09/is-the-nsa-surveillance-threat-real-or-imagined, accessed 2-22-15. Joshua, I agree with you that effectiveness matters. I can’t help but be skeptical, though. If these dragnet programs are effective, where’s the evidence? As you note, at least one of the success stories identified by anonymous intelligence officials—the story relating to Zazi— seems not to withstand scrutiny. Let’s also note that there’s no evidence the government has relied on evidence derived from these dragnet programs in criminal prosecutions. If these dragnet programs had been effective, wouldn’t we have seen at least a handful of criminal prosecutions? Of course intelligence surveillance has many purposes; gathering evidence of criminal activity is just one of them. Still, shouldn’t the apparent absence of any criminal prosecution make us question how necessary the programs really are? Lacking any more solid evidence of success, you fall back on the point that “the people who created and oversee” these programs “believe they are effective.” But unfortunately there are many reasons to question the trust you imply we should put in our national security agencies when they tell us, in essence, “we need more power to make you safe.” 2. The program has only stopped one attack—should be ended Yochai Benkler, “Fact: The NSA Gets Negligible Intel from Americans’ Metadata. So End Collection,” GUARDIAN, 10—8—13, www.theguardian.com/commentisfree/2013/oct/08/nsa-bulk-metadata-surveillance-intelligence, accessed 2-22-15. Congress may be on the verge of prohibiting the NSA from continuing its bulk telephony metadata collection program. Two weeks ago, the Senate national security dissenters: Wyden, Udall, Paul, and Blumenthal proposed prohibition. Last week, the move received a major boost from a bipartisan proposal by core establishment figures: Senator Patrick Leahy, and Representatives Jim Sensenbrenner and John Conyers. It's a prohibition whose time has come. Dragnet surveillance, or bulk collection, goes to the heart of what is wrong with the turn the NSA has taken since 2001. It implements a perpetual "state of emergency" mentality that inverts the basic model outlined by the fourth amendment: that there are vast domains of private action about which the state should remain ignorant unless it provides clear prior justification. And all public evidence suggests that, from its inception in 2001 to this day, bulk collection has never made more than a marginal contribution to securing Americans from terrorism, despite its costs. In a 2 October hearing of the Senate judiciary committee, Senator Leahy challenged the NSA chief, General Keith Alexander: Would you agree that the 54 cases that keep getting cited by the administration were not all plots, and that of the 54 only 13 had some nexus to the US? Would you agree with that, yes or no? Alexander responded: Yes. Leahy then demanded that Alexander confirm what his deputy, Christopher Inglis, had said in the prior week's testimony: that there is only one example where collection of bulk data is what stopped a terrorist activity. Alexander responded that Inglis might have said two, not one. In fact, what Inglis had said the week before was that there was one case "that comes close to a but-for example and that's the case of Basaaly Moalin". So, who is Moalin, on whose fate the NSA places the entire burden of justifying its metadata collection program? Did his capture foil a second 9/11? A cabby from San Diego, Moalin had immigrated as a teenager from Somalia. In February, he was convicted of providing material assistance to a terrorist organization: he had transferred $8,500 to alShabaab in Somalia. After the Westgate Mall attack in Nairobi, few would argue that al-Shabaab is not a terrorist organization. But alShabaab is involved in a local war, and is not invested in attacking the US homeland. The indictment against Moalin explicitly stated that al-Shabaab's enemies were the present Somali government and "its Ethiopian and African Union supporters". Perhaps, it makes sense for prosecutors to pursue Somali Americans for doing essentially what some Irish Americans did to help the IRA; perhaps not. But this single successful prosecution, under a vague criminal statute, which stopped a few thousand dollars from reaching one side in a local conflict in the Horn of Africa, is the sole success story for the NSA bulk domestic surveillance program. 101 Paradigm Research 2015-2016 CX—Electronic Communication Aff Disadvantage Ans: Terrorism—Effectiveness Exaggerated (Specific Cases) 1. Bulk surveillance does little to stop threats—claims to the contrary are overblown Peter Bergen, Director, National Security Program, New America Foundation, with David Sterman, Emily Schneider and Bailey Cahall, “Do NSA’s Bulk Surveillance Programs Stop Terrorists?” New America Foundation, 1—14, p. 1-2. However, our review of the government’s claims about the role that NSA “bulk” surveillance of phone and email communications records has had in keeping the United States safe from terrorism shows that these claims are overblown and even misleading.* An indepth analysis of 225 individuals recruited by al-Qaeda or a like-minded group or inspired by al-Qaeda’s ideology, and charged in the United States with an act of terrorism since 9/11, demonstrates that traditional investigative methods, such as the use of informants, tips from local communities, and targeted intelligence operations, provided the initial impetus for investigations in the majority of cases, while the contribution of NSA’s bulk surveillance programs to these cases was minimal. Indeed, the controversial bulk collection of American telephone metadata, which includes the telephone numbers that originate and receive calls, as well as the time and date of those calls but not their content, under Section 215 of the USA PATRIOT Act, appears to have played an identifiable role in, at most, 1.8 percent of these cases. NSA programs involving the surveillance of non-U.S. persons outside of the United States under Section 702 of the FISA Amendments Act played a role in 4.4 percent of the terrorism cases we examined, and NSA surveillance under an unidentified authority played a role in 1.3 percent of the cases we examined. Regular FISA warrants not issued in connection with Section 215 or Section 702, which are the traditional means for investigating foreign persons, were used in at least 48 (21 percent) of the cases we looked at, although it’s unclear whether these warrants played an initiating role or were used at a later point in the investigation. (Click on the link to go to a database of all 225 individuals, complete with additional details about them and the government’s investigations of these cases: http://natsec.newamerica.net/nsa/analysis). 2. Claims of NSA effectiveness are exaggerated—Zazi plot Peter Bergen, Director, National Security Program, New America Foundation, with David Sterman, Emily Schneider and Bailey Cahall, “Do NSA’s Bulk Surveillance Programs Stop Terrorists?” New America Foundation, 1—14, p. 10. The 2009 plot by Najibullah Zazi et al. to attack the New York subway: This case involved a foiled plot by Colorado resident Najibullah Zazi and two co-conspirators in New York, Zarein Ahmedzay and Adis Medunjanin, to bomb the New York City subway system in 2009. The government has claimed the case as an NSA success. Yet, the Zazi case was initiated not by the NSA but by British intelligence, according to a senior U.S. counterterrorism official with direct knowledge of the case whom we consulted. Also, although the NSA was involved in intercepting Zazi’s email to an al-Qaeda operative in Pakistan, this was an instance where the same result could have been obtained through traditional targeted investigative methods. The email address Zazi communicated with was known to belong to an al-Qaeda figure for at least five months prior to the NSA’s interception of Zazi’s email, due to a British intelligence operation in April 2009. The British shared their findings with U.S. intelligence, which then chose to use the NSA surveillance program to monitor the email address. The knowledge that the email address was that of an alQaeda associate would have been sufficient to obtain a traditional, targeted criminal or FISA warrant for the email’s contents. The NSA may have opted to use the Section 702 authority, but the case, as currently explained in the public record, does not provide evidence for the need for bulk surveillance authorities. It is also worth noting that the contribution from the bulk collection of Americans’ telephone metadata under Section 215 was minimal, at best, in this case. The FBI identified a phone number included in Zazi’s email and ran it against the NSA’s phone metadata collected under Section 215 authority. The query provided a previously unknown second phone number belonging to Adis Medunjanin, one of Zazi’s co-conspirators, who was already a suspect in the plot. This brings into question how the government measures the “contribution” of the NSA to terrorism cases and whether the “contributions” cited by officials reflect important and unique contributions to those cases by the NSA. 102 Paradigm Research 2015-2016 CX—Electronic Communication Aff Disadvantage Ans: Terrorism—Effectiveness Exaggerated (Specific Cases) [cont’d] 3. Claims of NSA effectiveness are exaggerated—Ouazzani plot Peter Bergen, Director, National Security Program, New America Foundation, with David Sterman, Emily Schneider and Bailey Cahall, “Do NSA’s Bulk Surveillance Programs Stop Terrorists?” New America Foundation, 1—14, p. 10. Khalid Ouazzani et al.’s provision of funds to al-Qaeda and the nascent plot to attack the New York Stock Exchange: Khalid Ouazzani, a Kansas City small business owner, and his two co-conspirators, Sabirhan Hasanoff, a New York accountant, and Wesam ElHanafi, a New York computer engineer, provided tens of thousands of dollars to al-Qaeda figures over a number of years. One of Ouazzani’s coconspirators also cased the New York Stock Exchange for a potential attack and produced a report for their handlers, though the plot was more notional than operational. The U.S. government has cited surveillance conducted under Section 702 as the cause of its investigation. While little evidence is available to contest the government’s assertion that the NSA under Section 702 played a role in this investigation, the seriousness of the threat is debatable. Even the government noted in a sentencing memorandum that the casing of the New York Stock Exchange by one of the defendants resulted in only a one-page report that was “rudimentary and of limited use.” During an interrogation, one of their contacts overseas (whose name was redacted in court documents) denied that there was “any real intention to plan or coordinate such an operation.” The plot was not a serious threat, though the contact these defendants had with foreign terrorists, which led them to provide a total of about $67,000 and supplies to their contacts abroad, was certainly worrisome. 4. Claims of NSA effectiveness are exaggerated—Coleman Headley plot Peter Bergen, Director, National Security Program, New America Foundation, with David Sterman, Emily Schneider and Bailey Cahall, “Do NSA’s Bulk Surveillance Programs Stop Terrorists?” New America Foundation, 1—14, p. 9-10. C. In three of the key terrorism cases it has cited to defend NSA bulk surveillance programs, the government has exaggerated the role of the NSA in two of them and the significance of the threat posed by the third case. When the Snowden leaks first broke, the government declassified some of the details of four terrorism cases to make its defense of the NSA bulk surveillance programs. One was the Moalin case discussed in the previous section. The three others, involving surveillance under Section 702, are discussed below. (More detail about all of these cases can be found in the Appendix.) An examination of the terrorism cases that the government has cited to defend the NSA program attack the JyllandsPosten newspaper: David Coleman Headley plotted to attack the Danish newspaper Jyllands-Posten in Copenhagen in 2009. The newspaper had become the focus of controversy after publishing cartoons depicting the Prophet Mohammed. The U.S. government has claimed that it used NSA surveillance under Section 702 to identify Headley as a threat and prevent the attack. Tahawwur Rana, a Chicago businessman who allowed Headley to use his travel agency as a front, was found guilty of providing support to Headley’s activities after Headley gave extensive testimony against him at trial. However, the NSA’s bulk surveillance programs likely played only a secondary role, if any, to British intelligence in discovering Headley’s plotting. In June 2009, Headley was planning to meet with two British extremists who were already under surveillance in the United Kingdom. Headley, who played a key role in planning the 2008 terrorist attacks in Mumbai, confirmed that he had met these two extremists in Britain when he was later interrogated by Indian authorities following his arrest in October 2009. According to reports by ProPublica, this meeting between Headley and the British extremists sparked the investigation into Headley, and the NSA’s role was merely following up and identifying the individual in question as Headley. Moreover, the government had received multiple tips over the years from individuals who knew Headley, including two of his wives, that he was likely a terrorist. So, even if the NSA played some kind of role in building the case against Headley, his case represents a colossal failure of the counterterrorism apparatus, which despite receiving multiple tips, failed to catch Headley, even after he assisted with the 2008 Mumbai attack. The main lesson from the Headley case should be the need for better information-sharing between law enforcement and intelligence agencies – not the development of a sprawling collection system. 103 Paradigm Research 2015-2016 CX—Electronic Communication Aff Disadvantage Ans: Terrorism—Empirically 1. There is no empirical evidence that dragnet domestic surveillance decreases terror threats Adrienne Ratner, J.D. Candidate, “Warrantless Wiretapping: The Bush Administration’s Failure to Jam an Elephant into a Mousehole,” HASTINGS CONSTITUTIONAL LAW QUARTERLY v. 37, Fall 2009, p. 195-196. In addition to FISA not being restrictive enough to warrant unlimited electronic surveillance, there is no clear basis that mass electronic surveillance results in the production of substantive intelligence and, specifically, has produced any tangible results in the war on terrorism. After the NSA began conducting warrantless wiretapping, what the agency gained in speed and freedom, it sacrificed in order and understanding. In addition, of all the terrorist prosecutions since September 11, the vast majority were charged with "material support" to a group the government has labeled terrorist under a very broad statute; the government has obtained a number of convictions or guilty pleas, but none of the defendants have been charged with engaging in terrorist activity. The only criminal conviction involving an actual terrorist incident since September 11 was that of shoe bomber Richard Reid, captured simply because an alert airline employee noticed him trying to light his shoe on fire. Dragnet surveillance has failed to detect a terrorist cell within the United States. The results of electronic surveillance are largely unknowable given its secret nature; but as far as the public knows, warrantless domestic electronic surveillance has failed to yield "useful dots" - substantive intelligence - or help the government "connect the dots," while the risk to civil liberties is enormous. 2. There is zero reason to believe that FISA impedes counterterrorism—empirical record Adrienne Ratner, J.D. Candidate, “Warrantless Wiretapping: The Bush Administration’s Failure to Jam an Elephant into a Mousehole,” HASTINGS CONSTITUTIONAL LAW QUARTERLY v. 37, Fall 2009, p. 194-195. The government's argument that FISA impeded effective intelligence gathering is equally implausible. Passed in 1978, the Foreign Intelligence Surveillance Act created a separate, secret court, the Foreign Intelligence Surveillance Court ("FISC"), to consider warrant requests and ostensibly ensure a check on the activities of the executive branch. All of the FISC's opinions and Justice Department guidance documents are kept secret: The government is not required to disclose the number of U.S. citizens who are subjected to each type of FISA surveillance, where surveillance occurred, the average length of surveillance and extensions, or the number of targets subsequently arrested and convicted. Regarding clandestine physical searches, the government need not show any special need for secrecy or give any notice; FISA permits secrecy that the Fourth Amendment clearly prohibits outside the intelligence-gathering context. The FISC has given virtually universal approval to the large number of government requests for electronic surveil-lance: From 19972002, the government made between 749 and 1,228 applications for electronic surveillance each year. The FISC approved every single one. After September 11, Congress passed the Patriot Act, increasing the government's authority to collect and share wiretap information between agencies and authorizing surveillance where the purpose was not exclusively to gather foreign intelligence information. With the passage of the Patriot Act, government use of FISA warrants exploded. In short, before and after September 11, 2001, the FISC allowed the President to do almost any eavesdropping he wanted: the warrant requirement did not impede effective or efficient intelligence gathering. Moreover, if the executive found FISA to be impeding intelligence gathering, the President could have gone to a very accommodating Congress to amend the law to extend to the executive even greater eaves-dropping powers. 3. NSA circumvention of FISA has not stopped a single terrorist attack Bruce Fein, constitutional expert, “Presidential Authority to Gather Foreign Intelligence,” PRESIDENTIAL STUDIES QUARTERLY v. 37 n. 1, 3—07, p. 24. The NSA’s circumvention of FISA has yielded no demonstrable national security benefits. President Bush has not identified even one terrorist attack that was frustrated by warrantless spying on American citizens. In contrast, the White House has described in some detail the terrorism that was allegedly frustrated by the CIA’s secret imprisonments and interrogations of the “Al Qaeda 14.” In signing the Military Commissions Act of 2006, President Bush elaborated: “The CIA program helped us identify terrorists who were sent to case targets inside the United States, including financial buildings in major cities on the East Coast. And the CIA program helped us stop the planned strike on U.S. Marines in Djibouti, a planned attack on the U.S. consulate in Karachi, and a plot to hijack airplanes and fly them into Heathrow Airport and Canary Wharf in London.” Bush has conspicuously remained as silent as the Sphinx about the NSA’s warrantless surveillance success stories because there are none to tell. If there were, they would have been leaked and declassified long ago. 104 Paradigm Research 2015-2016 CX—Electronic Communication Aff Disadvantage Ans: Terrorism—Empirically [cont’d] 4. Mass surveillance won’t stop attacks—multiple recent examples prove Patrick Eddington, policy analyst, Cato Institute, “No, Mass Surveillance Won’t Stop Terrorist Attacks,” REASON, 1—27—15, http://reason.com/archives/2015/01/27/mass-surveillance-and-terrorism#.undnpk:U8Io, accessed 2-19-15. But would more mass surveillance have prevented the assault on the Charlie Hebdo office? Events from 9/11 to the present help provide the answer: 2009: Umar Farouk Abdulmutallab—i.e., the "underwear bomber"—nearly succeeded in downing the airline he was on over Detroit because, according to then-National Counterterrorism Center (NCC) director Michael Leiter, the federal Intelligence Community (IC) failed "to connect, integrate, and fully understand the intelligence" it had collected. 2009: Army Major Nidal Hasan was able to conduct his deadly, Anwar al-Awlaki-inspired rampage at Ft. Hood, Texas, because the FBI bungled its Hasan investigation. 2013: The Boston Marathon bombing happened, at least in part, because the CIA, Department of Homeland Security (DHS), FBI, NCC, and National Security Agency (NSA) failed to properly coordinate and share information about Tamerlan Tsarnaev and his family, associations, and travel to and from Russia in 2012. Those failures were detailed in a 2014 report prepared by the Inspectors General of the IC, Department of Justice, CIA, and DHS. 2014: The Charlie Hebdo and French grocery store attackers were not only known to French and U.S. authorities but one had a prior terrorism conviction and another was monitored for years by French authorities until less than a year before the attack on the magazine. No, mass surveillance does not prevent terrorist attacks. It’s worth remembering that the mass surveillance programs initiated by the U.S. government after the 9/11 attacks—the legal ones and the constitutionally-dubious ones—were premised on the belief that bin Laden’s hijacker-terrorists were able to pull off the attacks because of a failure to collect enough data. Yet in their subsequent reports on the attacks, the Congressional Joint Inquiry (2002) and the 9/11 Commission found exactly the opposite. The data to detect (and thus foil) the plots was in the U.S. government’s hands prior to the attacks; the failures were ones of sharing, analysis, and dissemination. That malady perfectly describes every intelligence failure from Pearl Harbor to the present day. 5. There is simply no evidence that the NSA’s dragnet programs are making us any safer Bruce Schneier, journalist and author, “How the NSA Threatens National Security,” THE ATLANTIC, 1—6—14, www.theatlantic.com/technology/archive/2014/01/how-the-nsa-threatens-national-security/282822/#about-the-authors, accessed 2-1915. Ubiquitous surveillance should have died with the fall of Communism, but it got a new—and even more dangerous—life with the intelligence community's post-9/11 "never again" terrorism mission. This quixotic goal of preventing something from happening forces us to try to know everything that does happen. This pushes the NSA to eavesdrop on online gaming worlds and on every cell phone in the world. But it's a fool's errand; there are simply too many ways to communicate. We have no evidence that any of this surveillance makes us safer. NSA Director General Keith Alexander responded to these stories in June by claiming that he disrupted 54 terrorist plots. In October, he revised that number downward to 13, and then to "one or two." At this point, the only "plot" prevented was that of a San Diego man sending $8,500 to support a Somali militant group. We have been repeatedly told that these surveillance programs would have been able to stop 9/11, yet the NSA didn't detect the Boston bombings—even though one of the two terrorists was on the watch list and the other had a sloppy social media trail. Bulk collection of data and metadata is an ineffective counterterrorism tool. 105 Paradigm Research 2015-2016 CX—Electronic Communication Aff Disadvantage Ans: Terrorism—Focus Turn 1. Greater protections help counterterror operations—focus our resources Lisa Graves, Executive Director, Center for Media and Democracy, “The Right to Privacy in Light of Presidents' Programs: What Project MINARET's Admissions Reveal about Modern Surveillance of Americans,” TEXAS LAW REVIEW v. 88, 6—10, p. 18931894. All that is to say that the revolution in digital communications and communication patterns - which served as one of the rationales for the push to change FISA to permit more warrantless electronic surveillance - actually warrants greater privacy protections for Americans, not weaker ones. And, it is my view that greater privacy protections for Americans will help ensure that precious anti-terrorism resources and Americans' precious tax dollars are not squandered capturing, storing, and analyzing innocent Americans. These tools, this weapon of surveillance capacity to capture almost every electronic conversation one has and all the data about who our friends and family are, should not be turned on Americans. 2. Mass surveillance fails—diverts resources Ray Corrigan, Senior Lecturer, Mathematics, Computing, and Technology, Open University, “Mass Surveillance Will Not Stop Terrorism,” SLATE, 1—25—15, www.slate.com/articles/health_and_science/new_scientist/2015/01/mass_surveillance_against_terrorism_gathering_intelligence_on_all_ is_statistically.html, accessed 2-19-15. Police, intelligence, and security systems are imperfect. They process vast amounts of imperfect intelligence data and do not have the resources to monitor all known suspects 24/7. The French authorities lost track of these extremists long enough for them to carry out their murderous acts. You cannot fix any of this by treating the entire population as suspects and then engaging in suspicionless, blanket collection and processing of personal data. Mass data collectors can dig deeply into anyone’s digital persona but don’t have the resources to do so with everyone. Surveillance of the entire population, the vast majority of whom are innocent, leads to the diversion of limited intelligence resources in pursuit of huge numbers of false leads. Terrorists are comparatively rare, so finding one is a needle-in-ahaystack problem. You don’t make it easier by throwing more needleless hay on the stack. 106 Paradigm Research 2015-2016 CX—Electronic Communication Aff Disadvantage Ans: Terrorism—Human Intelligence Tradeoff Turn 1. Mass surveillance programs trade-off with traditional intelligence techniques—more likely to catch extremists Dustin Volz, journalist, “Snowden: Overreliance on Mass Surveillance Abetted Boston Marathon Bombing,” NATIONAL JOURNAL, 10—20—14, www.nationaljournal.com/tech/snowden-overreliance-on-mass-surveillance-abetted-boston-marathon-bombing-20141020, accessed 3-22-15. Edward Snowden on Monday suggested that if the National Security Agency focused more on traditional intelligence gathering—and less on its mass-surveillance programs—it could have thwarted the 2013 Boston Marathon bombings. The fugitive leaker, speaking via video to a Harvard class, said that a preoccupation with collecting bulk communications data has led to resource constraints at U.S. intelligence agencies, often leaving more traditional, targeted methods of spying on the back burner. "We miss attacks, we miss leads, and investigations fail because when the government is doing its 'collect it all,' where we're watching everybody, we're not seeing anything with specificity because it is impossible to keep an eye on all of your targets," Snowden told Harvard professor and Internet freedom activist Lawrence Lessig. "A good example of this is, actually, the Boston Marathon bombings." Snowden said that Dzhokhar and Tamerlan Tsarnaev were pointed out by Russian intelligence to U.S. officials prior to the bombings last year that killed three and left hundreds wounded, but that such actionable intelligence was largely ignored. He argued that targeted surveillance on known extremists and diligent pursuit of intelligence leads provides for better counterterrorism efforts than mass spying. "We didn't really watch these guys and the question is, why?" Snowden asked. "The reality of that is because we do have finite resources and the question is, should we be spending 10 billion dollars a year on mass-surveillance programs of the NSA to the extent that we no longer have effective means of traditional [targeting]?" Anti-spying activists have frequently argued that bulk data collection has no record of successfully thwarting a terrorist attack, a line of argument some federal judges reviewing the NSA's programs have also used in their legal reviews of the activities. Snowden's suggestion—that such mass surveillance has not only failed to directly stop a threat, but actually makes the U.S. less safe by distracting resource-strapped intelligence officials from performing their jobs—takes his criticism of spy programs to a new level. "We're watching everybody that we have no reason to be watching simply because it may have value, at the expense of being able to watch specific people for which we have a specific cause for investigating, and that's something that we need to look carefully at how to balance," Snowden said. 2. Mass surveillance programs do not make us safer—traditional intelligence techniques are more effective Stephen M. Walt, Professor, International Relations, Harvard University, “The Big Counterterrorism Counterfactual,” FOREIGN POLICY, 11—10—14, http://foreignpolicy.com/2014/11/10/the-big-counterterrorism-counterfactual/, accessed 3-3-15. It’s a serious issue, and democracies that want to respect individual privacy while simultaneously keeping citizens safe are going to have to do a much better job of reassuring us that vast and (mostly) secret surveillance capabilities overseen by unelected officials such as Hannigan won’t be abused. I tend to favor the privacy side of the argument, both because personal freedoms are hard to get back once lost, but also because there’s not much evidence that these surveillance activities are making us significantly safer. They seem to be able to help us track some terrorist leaders, but there’s a lively debate among scholars over whether tracking and killing these guys is an effective strategy. The fear of being tracked also forces terrorist organizations to adopt less efficient communications procedures, but it doesn’t seem to prevent them from doing a fair bit of harm regardless. So here’s a wild counterfactual for you to ponder: What would the United States, Great Britain, and other wealthy and powerful nations do if they didn’t have these vast surveillance powers? What would they do if they didn’t have armed drones, cruise missiles, or other implements of destruction that can make it remarkably easy (and in the short-term, relatively cheap) to target anyone they suspect might be a terrorist? Assuming that there were still violent extremists plotting various heinous acts, what would these powerful states do if the Internet was there but no one knew how to spy on it? For starters, they’d have to rely more heavily on tried-and-true counterterrorism measures: infiltrating extremist organizations and flipping existing members, etc., to find out what they were planning, head attacks off before they occurred, and eventually roll up organization themselves. States waged plenty of counterterrorism campaigns before the Internet was invented, and while it can be difficult to infiltrate such movements and find their vulnerable points, it’s not exactly an unknown art. If we couldn’t spy on them from the safety of Fort Meade, we’d probably be doing a lot more of this. 107 Paradigm Research 2015-2016 CX—Electronic Communication Aff Disadvantage Ans: Terrorism—Human Intelligence Tradeoff Turn [cont’d] 3. Failure to expand our human intelligence capabilities only increases the risks of deadly intelligence failures Gabriel Margolis, Conflict Management and Resolution Graduate Program, University of North Carolina-Wilmington, “The Lack of HUMINT: A Recurring Intelligence Problem,” GLOBAL SECURITY STUDIES v. 4 n. 2, Spring 2013, p. 43. The United States has accumulated an unequivocal ability to collect intelligence as a result of the technological advances of the 20th century. Numerous methods of collection have been employed in clandestine operations around the world including those that focus on human, signals, geospatial, and measurements and signals intelligence. An infatuation with technological methods of intelligence gathering has developed within many intelligence organizations, often leaving the age old practice of espionage as an afterthought. As a result of the focus on technical methods, some of the worst intelligence failures of the 20th century can be attributed to an absence of human intelligence. The 21st century has ushered in advances in technology have allowed UAVs to become the ultimate technical intelligence gathering platform; however human intelligence is still being neglected. The increasing reliance on UAVs will make the United States susceptible to intelligence failures unless human intelligence can be properly integrated. In the near future UAVs may be able to gather human level intelligence, but it will be a long time before classical espionage is a thing of the past. 4. Intelligence is key to addressing an array of threats—human intelligence competes for resources with more technical programs Loch K. Johnson, Professor, Political Science, University of Georgia, “Evaluating ‘Humint’: The Role of Foreign Agents in U.S. Security, Paper Presented at the ISA’s 50th Annual Convention, 2—15—09, http://citation.allacademic.com/meta/p_mla_apa_research_citation/3/1/0/6/6/p310665_index.html, accessed 12-22-14. The world is a dangerous place, plagued by the presence of terrorist cells; failed or failing states; competition for scarce resources, such as oil, water, uranium, and food; chemical, biological, and nuclear weapons, not to mention bristling arsenals of conventional armaments; and deep-seated animosities between rival nations and factions. For self-protection, if for no other reason, government officials leaders seek information about the capabilities and—an especially elusive topic—the intentions of those overseas (or subversives at home) who can inflict harm upon the nation. That is the core purpose of espionage: to gather information about threats, whether external or internal, and to warn leaders about perils facing the homeland. Further, the secret services hope to provide leaders with data that can help advance the national interest—the opportunity side of the security equation. Through the practice of espionage— spying or clandestine human intelligence: whichever is one’s favorite term—the central task, stated baldly, is to steal secrets from adversaries as a means for achieving a more thorough understanding of threats and opportunities in the world. National governments study information that is available in the public domain (Chinese newspapers, for example), but knowledge gaps are bound to arise. A favorite metaphor for intelligence is the jigsaw puzzle. Many of the pieces to the puzzle are available in the stacks of the Library of Congress or on the Internet; nevertheless, there will continue to be several missing pieces—perhaps the most important ones. They may be hidden away in Kremlin vaults or in caves where members of Al Qaeda hunker down in Pakistan’s western frontier. The public pieces of the puzzle can be acquired through careful research; but often discovery of the missing secret pieces has to rely on spying, if they can be found at all. Some things— “mysteries” in the argot of intelligence professionals—are unknowable in any definitive way, such as who is likely to replace the current leader of North Korea. Secrets, in contrast, may be uncovered with a combination of luck and skill— say, the number of Chinese nuclear-armed submarines, which are vulnerable to satellite and sonar tracking. Espionage can be pursued by way of human agents or with machines, respectively known inside America’s secret agencies as human intelligence (“humint,” in the acronym) and technical intelligence (“techint”). Humint consists of spy rings that rely on foreign agents or “assets” in the field, recruited by intelligence professionals (known as case officers during the Cold War or, in more current jargon, operations officers).i Techint includes mechanical devises large and small, including satellites the size of Greyhound buses, equipped with fancy cameras and listening devices that can see and hear acutely from orbits deep in space; reconnaissance aircraft, most famously the U-2; unmanned aerial vehicles (UAVs) or drones, such as the Predator—often armed with Hellfire missiles, allowing the option to kill what its handlers have just spotted through the lens of an onboard camera); enormous ground-based listening antennae, aimed at enemy territory; listening devices clamped surreptitiously on fiber-optic communications cables that carry telephone conversations; and miniature listening “bugs” concealed within sparkling cut-glass chandeliers in foreign embassies or palaces. Techint attracts the most funding in Washington, D.C. (machines are costly, especially heavy satellites that must be launched into space), by a ratio of some nine-to-one over humint in America’s widely estimated $50 billion annual intelligence budget. Human spies, though, continue to be recruited by the United States in most every region of the globe. 108 Paradigm Research 2015-2016 CX—Electronic Communication Aff Disadvantage Ans: Terrorism—Human Intelligence Tradeoff Turn [cont’d] 5. Human intelligence information is important in making the rest of the intelligence setup more effective Gabriel Margolis, Conflict Management and Resolution Graduate Program, University of North Carolina-Wilmington, “The Lack of HUMINT: A Recurring Intelligence Problem,” GLOBAL SECURITY STUDIES v. 4 n. 2, Spring 2013, p. 50. The U.S. intelligence culture tends to focus on technical means of intelligence like GEOINT, SIGINT, and MASINT. The tendency of the U.S. to employ its technological capacity has often left intelligence operations lacking something. HUMINT is missing. The lack of HUMINT in intelligence operations leaves analysts staring at pictures, frantically searching through communications, reading newspapers, and measuring emissions to ascertain what is going on. HUMINT gives operations valuable direction by uncovering intentions and capabilities to corroborate what the technical intelligence may, or may not affirm. However, because of the U.S. emphasis on the technical INTs, HUMINT was sometimes absent or susceptible to CI, resulting in some of the greatest intelligence failures and close calls in CIA history. 6. We need to place more focus on human intelligence Gabriel Margolis, Conflict Management and Resolution Graduate Program, University of North Carolina-Wilmington, “The Lack of HUMINT: A Recurring Intelligence Problem,” GLOBAL SECURITY STUDIES v. 4 n. 2, Spring 2013, p. 56. The pattern that emerges when reflecting upon intelligence failures of the 20th century shows that no single form of intelligence collection does well by itself. HUMINT is especially detrimental to overlook or ignore because covert actions are often subject to bad information, CI, and mismanagement from policy-makers. The U.S. fascination and focus on technical methods of intelligence has made some operations especially susceptible to CI and other forms of failure when areas of HUMINT are not addressed. This problem has come to an apex in the form of UAV technology and the implementation of signature strikes. UAVs can contain GEOINT, SIGINT, and MASINT capabilities and can therefore immediately operate based upon technical intelligence. The United States has focused on the technical methods of intelligence gathering, and once again HUMINT is missing. Signature strikes are not based upon HUMINT, which brings to mind the various intelligence failures that failed to incorporate HUMINT into their modus operandi. 109 Paradigm Research 2015-2016 CX—Electronic Communication Aff Disadvantage Ans: Terrorism—Human Intelligence Turn (Answers to “It Fails”) 1. Human intelligence can be enormously valuable, even accounting for its limitations Loch K. Johnson, Professor, Political Science, University of Georgia, “Evaluating ‘Humint’: The Role of Foreign Agents in U.S. Security, Paper Presented at the ISA’s 50th Annual Convention, 2—15—09, http://citation.allacademic.com/meta/p_mla_apa_research_citation/3/1/0/6/6/p310665_index.html, accessed 12-22-14. The collection of intelligence is pursued as a means for informing the foreign policy and security deliberations of America’s leaders. “Many elements make up a decision,” Secretary of State Dean Rusk has said. “First, though, one must grapple with the facts. What is the situation?” In determining “the situation” overseas, no single “int” is sufficient. Success depends on the synergism of all the ints working together, just as an engine performs best when each of its cylinders is firing. As a former CIA officer notes, the “‘ints’ can be teamed to operate jointly.” Both survey data and qualitative case studies of collection operations indicate that humint contributes regularly, and sometimes significantly to this synergism—particularly against certain targets like terrorists, narcotics dealers, and weapons proliferators, as well as events and conditions in much of the developing world. Humint must be approached warily, however; assets are corruptible and a depressingly high number of foreign recruits have proven to be doubled. Further, a large percentage have offered inaccurate and sometimes fabricated reports, as the postmortem results on the Cuban missile crisis illustrate. Nevertheless, humint successes like Col. Penkovsky, Adolf G. Tolkachev (a Soviet aviation specialist), and a host of others—including several who managed during the Cold War to penetrate the Soviet intelligence services (though seldom the political or military leadership ranks in Moscow)— underscore how crucial the payoff can be from classical espionage. 2. Human intelligence is useful despite any problems with it Gabriel Margolis, Conflict Management and Resolution Graduate Program, University of North Carolina-Wilmington, “The Lack of HUMINT: A Recurring Intelligence Problem,” GLOBAL SECURITY STUDIES v. 4 n. 2, Spring 2013, p. 46. Despite the shortcomings of HUMINT, it still has tremendous significance. “Clandestine sources may make up only 10 or 20 percent of the inputs to intelligence analysis, agent reports can provide insights that are truly valuable.” The insights of the agents are valuable because they are experts in their respective fields, and are on the ground to watch the developments unfold firsthand. HUMINT should give analysts a perspective that ‘puts their fingers on the pulse’ of the situation; allowing them to know what is happening on the ground. Arthur Hulnick points out that “agents can bring us material that cannot be obtained by technical sensors or developed by diplomats. It seems foolish to give up the possibility of learning inside information from a well-placed source.” 110 Paradigm Research 2015-2016 CX—Electronic Communication Aff Disadvantage Ans: Terrorism—Human Intelligence Turn (Answers to “SIGINT Superior”) 1. Signals intelligence has a number of limitations Gabriel Margolis, Conflict Management and Resolution Graduate Program, University of North Carolina-Wilmington, “The Lack of HUMINT: A Recurring Intelligence Problem,” GLOBAL SECURITY STUDIES v. 4 n. 2, Spring 2013, p. 46-47. “Signals intelligence (SIGINT) is the interception and decoding of foreign electronic communications.” It is made up of communication intelligence, electronic intelligence, and telemetry intelligence. Communications intelligence (COMINT) is the monitoring of communications in whatever form they can be conveyed. Operation Gold was a mission during the Cold War which utilized communications intelligence. “Agents tunneled half a mile into East Berlin and set up a listening post to intercept Russian and East German military communications.” COMINT has several weaknesses; communication has to exist for it to be intercepted. A target can go ‘off the grid’, rendering the COMINT operation irrelevant. Encoded communications can also pose a problem to SIGINT analyst whether the code is verbal, written, or within computer programs. Electronic intelligence (ELINT) is the interception of electronic emissions, and telemetry intelligence (TELINT) detects signals given off from weapons. “TELINT and ELINT offer valuable information on weapons capabilities that would otherwise be unknown or would require far more risky human intelligence operation to obtain.” Although these are not forms of communication, these disciplines of intelligence are able to discern what has happened from either electronic signals or those given off by weapons of mass destruction (WMD). 2. Terrorist groups have an easier time dodging signals intelligence operations Gabriel Margolis, Conflict Management and Resolution Graduate Program, University of North Carolina-Wilmington, “The Lack of HUMINT: A Recurring Intelligence Problem,” GLOBAL SECURITY STUDIES v. 4 n. 2, Spring 2013, p. 47. An issue that arises in SIGINT is referred to as risk versus take. This implies that the value of intelligence must be weighed against the dissemination of technology to enemies and political fallout. Terrorists and other criminal groups may also pose a problem to SIGINT because they emanate a much smaller signature than a country or no signal at all. “Against terrorists, drug dealers, or organized criminal groups, however, our ability to collect information will depend on the extent to which these groups use communications that can be intercepted.” Additional problems which plague the future of SIGINT are a lack of language skills and the rate at which new technologies are introduced. Foreign language skills are generally lacking within the United States and fast pace of changing technology that SIGINT collectors must keep up with make SIGINT a complex undertaking. Moore’s law states that “that processor speeds, or overall processing power for computers wills double every two years.” This means that SIGINT is constantly changing and hard to maintain. 111 Paradigm Research 2015-2016 CX—Electronic Communication Aff Disadvantage Ans: Terrorism—Information Overload Turn 1. Our agencies end up getting overwhelmed by the sheer volume of information Sebastian Rotella, Pulitzer Prize winning journalist, “How the NSA’s High-Tech Surveillance Helped Europeans Catch Terrorists,” PROPUBLICA, 6—19—13, www.propublica.org/article/how-the-nsas-high-tech-surveillance-helped-europeans-catch-terrorists, accessed 2-22-15. At the same time, some European experts see the furor as a sign that the strengths of the American giant intertwine with its weaknesses. U.S. agencies devote huge resources to sophisticated technology to the detriment of analysis and human spying, they say. As a result, they say, U.S. agencies sometimes appear overwhelmed by the sheer volume of information. “The problem is not collecting information, it’s understanding it,” said Alain Bauer, a well-connected French criminologist who has served as a presidential adviser. “What is the sense of such programs? They are too big. They will not work. We are a former colonial empire. We know the value of human intelligence. It is more efficient and less expensive than technological fetishism. Fortunately, we do not have enough money to do it the other way.” 2. Data overload actually makes it harder to prevent attacks Jameel Jaffer, fellow, Open Society Foundations, “Needles Are Harder to Find in Bigger Haysticks,” NEW YORK TIMES, Room for Debate, 6—10—13, www.nytimes.com/roomfordebate/2013/06/09/is-the-nsa-surveillance-threat-real-or-imagined, accessed 2-19-15. It’s also worth remembering that the intelligence community’s biggest challenge has never been collecting information; the biggest challenge has always been making sense of it. Launching new programs to collect more information can be a good way to pad the pockets of defense contractors and data-miners, but, as many have noted, it isn’t usually a good way to identify terrorist threats. The analogy is now a bit threadbare, but it’s still useful: You don’t find needles by building bigger haystacks. After the NSA launched the warrantless wiretapping program, FBI agents repeatedly complained that they were drowning in useless information. (Eric Lichtblau wrote: “The torrent of tips led [the FBI] to few potential terrorists inside the country they did not know of from other sources and diverted agents from counterterrorism work they viewed as more productive.”). One of the 9/11 Commission’s most important observations was that the intelligence community had information in the summer of 2001 that could have allowed it to prevent the 9/11 attacks. The problem wasn’t that it lacked information, but that it didn’t understand the information it had. 3. Dragnet mass surveillance fails—generates too much information Jay Stanley, Senior Policy Analyst, Speech, Privacy & Technology Project, “The Burdens of Total Surveillance,” American Civil Liberties Union, Free Future, 4—30—13, www.aclu.org/blog/burdens-total-surveillance, accessed 6-2-15. It’s not clear what information the CIA’s request was based upon, but reportedly it came from Russian authorities. It is also possible that Tsarnaev’s communications were flagged by US agencies such as the NSA. Either way, it seems as though there’s a real possibility that Tamerlan’s name came to the attention of the authorities through some dragnet-style surveillance technique. If so, the conundrum for the authorities is this: When surveillance takes place on such a mass scale, it is impossible to pay close attention to everything. Even with automated electronic systems used for the eavesdropping, attempting to flag certain conversations or certain subjects as “suspicious” for human analysts, the volume of false positives is always going to dwarf real alarms. The world is just too full of too enormous a variety of conversations for such monitoring to be very precise. Think of all that the NSA or its Russian equivalent must pick up—from those who speak with unintentionally alarming metaphors or double meanings, to fiction authors discussing scenarios, to fans discussing movie or book plots, to harmless but slightly crazy people talking nonsense. Yet because of the dragnet nature of such surveillance, when one of the many, many false positives later turns into a true threat, and everybody starts looking at what happened, the government is highly likely to have some information on the person. And everyone is going to look at the fact that the government flagged that person and ask, “why didn’t you do more about that?” If you create a total-surveillance time machine, there will always be dots that can be connected in hindsight. 112 Paradigm Research 2015-2016 CX—Electronic Communication Aff Disadvantage Ans: Terrorism—Information Overload Turn [cont’d] 4. We need limits—the NSA is current suffering from information overload Audra Healey, J.D. Candidate, “A Tale of Two Agencies: Exploring Oversight of the National Security Administration by the Federal Communications Commission,” FEDERAL COMMUNICATIONS LAW JOURNAL v. 67 n. 1, 2014, p. 102. Moreover, according to some classified intelligence documents released by The Washington Post and other outlets, the NSA appears to be overwhelmed by the sheer amount of data it is has collected, which indicates that the mechanisms in place do not adequately help the NSA to focus its search. For instance, the NSA has begun to implement a program (SCISSORS) in order to focus on the portion of the data that is relevant amongst the mass of data collected. This is because the NSA was collecting broad swaths of data with “little or no [foreign intelligence] information.” The first PCLOB report indicates that the NSA metadata collection program does not pass any semblance of relevancy standards to target the data to a specific question of national security; this is because the NSA does not have reason to suspect the owners of the metadata, unlike in other cases where the collection was lawful. 5. Mass surveillance undermines counterterror efforts—information overload Stan Ward, “NSA Swamped with Data Overload Also Trashes the Constitution,” BEST VPN, 5—18—15, www.bestvpn.com/blog/19187/nsa-swamped-with-data-overload-also-trashes-the-constitution/, accessed 6-22-15. Almost on the second anniversary of the Edward Snowden revelations, another (in)famous NSA whistleblower has again spoken up. This comes at a pivotal juncture in the legislative calendar as contentious debate about surveillance rages over the impending sunset of some of the Patriot Act. It has long been an argument of the civil liberties crowd that bulk data gathering was counter-productive, if not counter- intuitive. The argument was couched in language suggesting that to “collect it all”, as the then NSA director James Clapper famously decried, was to, in effect, gather nothing, as the choking amounts of information collected would be so great as to be unable to be analyzed effectively. This assertion is supported by William Binney, a founder of Contrast Security and a former NSA official, logging more than three decades at the agency. In alluding to what he termed “bulk data failure”, Binney said that an analyst today can run one simple query across the NSA’s various databases, only to become immediately overloaded with information. With about four billion people (around two-thirds of the world’s population) under the NSA and partner agencies’ watchful eyes, according to his estimates, there is far too much data being collected. “That’s why they couldn’t stop the Boston bombing, or the Paris shootings, because the data was all there… The data was all there… the NSA is great at going back over it forensically for years to see what they were doing before that. But that doesn’t stop it.” Binney is in a position to know, earning his stripes during the terrorism build up that culminated with the 9/11 World Trade Center bombing in 2001. He left just days after the draconian legislation known as the USA Patriot Act was enacted by Congress on the heels of that attack. One of the reasons which prompted his leaving was the scrapping of a surveillance system on which he long worked, only to be replaced by more intrusive systems. It is interesting to note here that Edward Snowden, in alluding to Binney, said he was inspired by Binney’s plight, and that this, in part, prodded him to leak thousands of classified documents to journalists. Little did Binney know that his work was to be but the tip of the iceberg in a program that eventually grew to indiscriminately “collect it all.” 6. The NSA programs tradeoff with catching people like the Boston Marathon bombers Lee Ferran, journalist, “Snowden: Wasted Surveillance Resources May Have Stopped Boston Bombing,” ABC NEWS, 3—10—14, http://abcnews.go.com/blogs/headlines/2014/03/snowden-wasted-surveillance-resources-may-have-stopped-boston-bombing/, accessed 3-22-15. National Security Agency leaker Edward Snowden said today that rather than helping combat terrorism, the U.S. government's massive surveillance programs have led to "tremendous intelligence failures" and may have contributed to allowing the deadly Boston Marathon bombing to have taken place. "We're monitoring everybody's communications, instead of suspects' communications," Snowden said during a live video conference at Austin's popular South by Southwest festival. "That lack of focus has caused us to miss leads that we should've had. Tamerlan Tsarnaev, one of the Boston bombers, the Russians had warned us about him… And if we hadn't spent so much on mass surveillance, if we had followed the traditional models, we might've caught him." In 2011 Russian intelligence requested the FBI and CIA to separately help them investigate Tamerlan's possible ties to Islamic extremism. Months later, the FBI closed their investigation after concluding that Tamerlan did not pose a threat. In April 2013, authorities allege Tamerlan and his little brother Dzhokhar set off a pair of bombs near the finish line of the Boston Marathon, killing three and injuring more than 260 others. Tamerlan was killed in a shootout with police days later, and Dzhokhar was arrested and has pleaded not guilty to terrorism-related charges. He could face the death penalty. The New York Times reported weeks after the bombing that the FBI concluded there was little the Bureau could have done to prevent the attacks. 113 Paradigm Research 2015-2016 CX—Electronic Communication Aff Disadvantage Ans: Terrorism—Information Overload Turn [cont’d] 7. Data overload limits metadata program effectiveness Shayana Kadidal, Senior Managing Attorney, Center for Constitutional Rights, “NSA Surveillance: The Implications for Civil Liberties,” I/S: A JOURNAL OF LAW AND POLICY FOR THE IFNORMATION SOCIETY v. 10 n. 2, 2014, p. 470-471. Mass surveillance of the scope described in the Snowden documents should present other problems in theory as well. General Alexander’s claim that the NSA seeks to “collect everything” implicitly assumes that size of the data pool gathered equals success. But intelligence experts themselves have long warned of the danger that the more data you collect, the more chaff there is hiding the kernels of wheat, the more haystack hiding the needle. (Alexander’s response to this before Congress was: “You need the haystack to find the needle,” which perhaps only proves that the actual meaning of farm metaphors is lost on high-tech executives.) The New York Times and Washington Post reported very early on in 2006 that the targeted NSA Program produced lots of bad leads that were passed on to the FBI for further investigation, resulting in both dead ends–“more calls to Pizza Hut,” in the words of an FBI agent quoted in the Times’ story–and, of course, the lost opportunity costs of the wasted effort in pursuing those leads to being with. (Curiously, the only reason this evidence of the poor practical efficacy of the NSA Program came out in 2006 was likely that natural interagency rivalries gave the FBI an incentive to leak information to reporters–a dynamic that seems to have played out between the FBI and CIA throughout various torture-related FOIA releases.) The Washington Post has similarly unearthed and published a slide revealing some of the NSA’s current over-collection problems: because spammers got into an email account the agency was surveilling, the web of connections from sent emails out of that compromised account became so huge it was flooding their entire collection system, eventually forcing NSA to cut off that target from surveillance. (Perhaps the lesson for civil libertarians here is to periodically click on those Nigerian emails to protect your Gmail account from surveillance.) 114 Paradigm Research 2015-2016 CX—Electronic Communication Aff Disadvantage Ans: Terrorism—Terror—Other Means Solve 1. Claims about NSA effectiveness are wrong—traditional investigative techniques were the cornerstone of most counterterror investigations Peter Bergen, Director, National Security Program, New America Foundation, with David Sterman, Emily Schneider and Bailey Cahall, “Do NSA’s Bulk Surveillance Programs Stop Terrorists?” New America Foundation, 1—14, p. 4. After examining all 225 cases of individuals charged with some kind of terrorism crime, we drew several conclusions. A. Traditional investigative methods initiated the majority of terrorism cases. Traditional investigative methods initiated 60 percent of the cases we identified. In 5 percent of the cases, a violent incident occurred prior to prevention, and in 28 percent of the cases – involving 62 individuals – court records and public reporting do not identify which methods initiated the investigation. The unclear cases may have been initiated by an undercover informant, a family member tip, other traditional law enforcement methods, CIA- or FBI-generated intelligence, NSA surveillance of some kind, or any number of other methods. Additionally, some of these cases may be too recent to have developed a public record large enough to identify which investigative tools were used. In 23 of these 62 unclear cases (37 percent), an informant was involved, though we were unable to determine whether the informant initiated the investigation. The widespread use of informants suggests that if there was an NSA role in these cases, it was limited and insufficient to generate evidence of criminal wrongdoing without the use of traditional investigative tools. NSA surveillance of any kind, whether bulk or targeted of U.S. persons or foreigners, played an initiating role in only 7.5 percent of cases. To break that down further: The controversial bulk collection of telephone metadata appears to have played an identifiable role in, at most, 1.8 percent of the terrorism cases we examined. In a further 4.4 percent of the cases, NSA surveillance under Section 702 of targets reasonably believed to be outside of the country that were communicating with U.S. citizens or residents likely played a role, while NSA surveillance under an unknown authority likely played a role in 1.3 percent of the cases we examined 2. There is little credible evidence that the NSA itself has been successful in foiling attacks—other means have been used Teun van Dongen, “The NSA Isn’t Foiling Terrorist Plots,” FOREIGN POLICY IN FOCUS, 10—9—13, www.alternet.org/nsa-isntfoiling-terrorist-plots, accessed 2-22-15. Admittedly we do not know how all terrorist plots have been detected. But going by what we do know, the conclusion is simple: terrorist plots have been foiled in all sorts of ways, few of which had anything to do with mass digital surveillance. True, in the case of the dismantlement of the Sauerland Cell in Germany in 2007, NSA information played a role. But whether the authorities got this information from “digital dragnet surveillance” or from more individualized and targeted monitoring is hard to tell. It might be tempting to give the NSA the benefit of the doubt, given that the organization speaks on the basis of information that we do not have. But such dubious claims about the effectiveness of the digital surveillance programs fit seamlessly into a pattern of misinformation and deceit. The U.S. government acknowledged the existence of PRISM only after Edward Snowden had leaked details about it to The Guardian. Moreover, when the news broke, President Obama and Director of National Intelligence James Clapper tried to downplay the scale of the digital data gathering, even though we know now that the NSA is essentially making a back-up of pretty much all conceivable forms of online communication. President Obama further promised that “ nobody is listening to your phone calls,” but it later became clear that the NSA can access the content of phone calls and e-mails if it so desires. Congressional oversight is poor, privacy rules are frequently broken, and the NSA liberally shares data with other intelligence agencies and foreign governments. Against this background of disputed or outright false government claims, the public is wise to be skeptical of the NSA’s claims about the effectiveness of the digital surveillance programs. The recent revelations may be mind-boggling in their technological, legal, and procedural complexities, but the bottom line is quite simple: The first credible piece of evidence that these programs are doing any good in the fight against terrorism has yet to surface. Until such evidence is provided, the Obama administration is only eroding the trust of the citizens it is claiming to protect. 115 Paradigm Research 2015-2016 CX—Electronic Communication Aff Disadvantage Ans: Terrorism—Smart Power Turn 1. Ending mass surveillance would force us to adopt a better “smart power” strategy to deal with terrorism Stephen M. Walt, Professor, International Relations, Harvard University, “The Big Counterterrorism Counterfactual,” FOREIGN POLICY, 11—10—14, http://foreignpolicy.com/2014/11/10/the-big-counterterrorism-counterfactual/, accessed 3-3-15. Second, if we didn’t have all these expensive high-tech capabilities, we might spend a lot more time thinking about how to discredit and delegitimize the terrorists’ message, instead of repeatedly doing things that help them make their case and recruit new followers. Every time the United States goes and pummels another Muslim country — or sends a drone to conduct a "signature strike" — it reinforces the jihadis’ claim that the West has an insatiable desire to dominate the Arab and Islamic world and no respect for Muslim life. It doesn’t matter if U.S. leaders have the best of intentions, if they genuinely want to help these societies, or if they are responding to a legitimate threat; the crude message that drones, cruise missiles, and targeted killings send is rather different. If we didn’t have all these cool hightech hammers, in short, we’d have to stop treating places like Afghanistan, Pakistan, Iraq, and Syria as if they were nails that just needed another pounding, and we might work harder at marginalizing our enemies within their own societies. To do that, we would have to be building more effective partnerships with authoritative sources of legitimacy within these societies, including religious leaders. Our failure to do more to discredit these movements is perhaps the single biggest shortcoming of the entire war on terror, and until that failure is recognized and corrected, the war will never end. 2. Curtailing mass surveillance will force us to adopt a smarter counter-terror strategy Stephen M. Walt, Professor, International Relations, Harvard University, “The Big Counterterrorism Counterfactual,” FOREIGN POLICY, 11—10—14, http://foreignpolicy.com/2014/11/10/the-big-counterterrorism-counterfactual/, accessed 3-3-15. Lastly, if U.S. leaders had to think harder about where to deploy more expensive resources, they might finally start thinking about the broader set of U.S. and Western policies that have inspired some of these movements in the first place. Movements like IS, al Qaeda, alNusra Front, al-Shabab, or the Taliban are in some ways indigenous movements arising from local circumstances, but they did not spring up out of nowhere and the United States (and other countries) bear some (though not all) blame for their emergence and growth. To say this is neither to defend nor justify violent extremism, nor to assert that all U.S. policies are wrong; it is merely to acknowledge that there is a causal connection between some of what we do and some of the enemies we face. But if some of the things the United States (or its allies) is doing are making it unpopular in certain parts of the world, and if some of that unpopularity gets translated into violent extremism that forces us to spend hundreds of billions of dollars trying to protect ourselves, then maybe we ought to ask ourselves if every single one of those policies makes sense and is truly consistent with U.S. interests and values. And if not, then maybe we ought to change some of them, if only to take some steam out of the extremist enterprise. What I’m suggesting, in short, is that the "surveil and strike" mentality that has dominated the counterterrorism effort (and which is clearly reflected in Hannigan’s plea to let Big Brother — oops, I mean the NSA and GCHQ — keep its eyes on our communications) is popular with government officials because it’s relatively easy, plays to our technological strengths, and doesn’t force us to make any significant foreign-policy changes or engage in any sort of self-criticism at all. If we can solve the terrorist problem by throwing money at it, and enriching some defense contractors and former government officials in the process, what’s not to like? To be clear: I’m not suggesting we dismantle the NSA, fire all our cryptographers, and revert to Cordell Hull’s quaint belief that "gentlemen [or ladies] do not read each other’s mail." But until we see more convincing evidence that the surveillance of the sort Hannigan was defending has really and truly kept a significant number of people safer from foreign dangers, I’m going to wonder if we aren’t overemphasizing these activities because they are relatively easy for us, and because they have a powerful but hard-to-monitor constituency in Washington and London. In short, we’re just doing what comes naturally, instead of doing what might be more effective. 3. Cutting back mass surveillance would force us to be more judicious in the use of force / boots on the ground Stephen M. Walt, Professor, International Relations, Harvard University, “The Big Counterterrorism Counterfactual,” FOREIGN POLICY, 11—10—14, http://foreignpolicy.com/2014/11/10/the-big-counterterrorism-counterfactual/, accessed 3-3-15. Third, and somewhat paradoxically, if we didn’t have drones and the NSA, we’d have to think more seriously about boots on the ground, at least in some places. But having to think harder about such decisions might be a good thing, because it would force the United States (or others) to decide which threats were really serious and which countries really mattered. It might even lead to the conclusion that any sort of military intervention is counterproductive. As we’ve seen over the past decade, what the NSA, CIA, and Special Ops Command do is in some ways too easy: It just doesn’t cost that much to add a few more names to the kill list, to vacuum up a few more terabytes of data, or to launch a few more drones in some new country, and all the more so when it’s done under the veil of secrecy. I’m not saying that our current policy is costless or that special operations aren’t risky; my point is that such activities are still a lot easier to contemplate and authorize than a true "boots on the ground" operation. By making it easier, however, the capabilities make it easier for our leaders to skirt the more fundamental questions about interests and strategy. It allows them to "do something," even when what is being done won’t necessarily help. 116 Paradigm Research 2015-2016 CX—Electronic Communication Aff Disadvantage Ans: Terrorism—Trust Turn - Metadata programs decrease trust in law enforcement—undermines counterterror programs Stephen Schulhofer, Professor, Law, New York University, “Making Sense of the NSA Metadata Collection Program (Part II),” JUST SECURITY, 11—8—13, http://justsecurity.org/2985/making-sense-nsa-metadata-collection-program-part-ii/, accessed 2-27-15. Efforts like the NSA sweeps actually undermine the counterterrorism effort itself. The reason is that these types of programs generate profound mistrust of government in general and of law enforcement in particular. We have already seen dramatic examples in the way that the Snowden revelations of our spying on allies has angered European leaders and endangered our working relationships with them. Although this breach eventually will be healed, alienation and mistrust among ordinary citizens is equally important, and it will not be so easily remedied. That mistrust, in turn, has a strong chilling effect on the willingness of law-abiding, loyal citizens to cooperate in the counterterrorism effort – for example by working with officials in local counterterrorism programs or by alerting law enforcement to various kinds of suspicious behavior. This dynamic has been demonstrated in several decades of extensive law enforcement research, including research focused specifically on counterterrorism policies and their impact on Muslim communities in the West. In one study, for example, Muslim-Americans in New York City were 61% less likely to report potentially suspicious precursors of terrorism when they felt that counterterrorism policies were being unfairly set and implemented. (See Schulhofer, Tyler & Huq, American Policing at a Crossroads: Unsustainable Policies and the Procedural Justice Alternative, 101 J. Crim. L. & Criminology 335, 364-74 (2011).) his last point underscores the most important, but least appreciated, “given” of the counterterrorism enterprise. Because the consequences of a terrorist attack could be so catastrophic, citizens and public officials alike tend to support strong law enforcement more readily than they do in ordinary times. The perception is that strong measures are acceptable because the top priority must be to reduce the risk of attack. And strong measures, whatever their drawbacks, at least seem to offer ways to reduce that risk. The central lesson of smart law enforcement, however, is that there are no risk-free choices. Strengthening the powers of the executive enhances some of our defenses against terrorism, but it weakens others – many of which, including community trust and cooperation, are absolutely essential to reducing the dangers of terrorism. Against this background, we must – for the sake of our democracy and even for the sake of our physical security – find ways to dissipate the cloud of mistrust that now hangs over NSA surveillance. 117 Paradigm Research 2015-2016 CX—Electronic Communication Aff Disadvantage Ans: Terrorism—Answers to “Dozens of Attacks Stopped” 1. Claims that the NSA programs have stopped dozens of terrorist attacks are just false—multiple reasons Cindy Cohn and Nadia Kayyali, staff, “The Top 5 Claims That Defenders of the NSA Have to Stop Making to Remain Credible,” Electronic Frontier Foundation, 6—2—14, www.eff.org/deeplinks/2014/06/top-5-claims-defenders-nsa-have-stop-making-remaincredible, accessed 2-20-15. 1. The NSA has Stopped 54 Terrorist Attacks with Mass Spying The discredited claim NSA defenders have thrown out many claims about how NSA surveillance has protected us from terrorists, including repeatedly declaring that it has thwarted 54 plots. Rep. Mike Rogers says it often. Only weeks after the first Snowden leak, US President Barack Obama claimed: “We know of at least 50 threats that have been averted” because of the NSA’s spy powers. Former NSA Director Gen. Keith Alexander also repeatedly claimed that those programs thwarted 54 different attacks. Others, including former Vice President Dick Cheney have claimed that had the bulk spying programs in place, the government could have stopped the 9/11 bombings, specifically noting that the government needed the program to locate Khalid al Mihdhar, a hijacker who was living in San Diego. Why it’s not credible: These claims have been thoroughly debunked. First, the claim that the information stopped 54 terrorist plots fell completely apart. In dramatic Congressional testimony, Sen. Leahy forced a formal retraction from NSA Director Alexander in October, 2013: "Would you agree that the 54 cases that keep getting cited by the administration were not all plots, and of the 54, only 13 had some nexus to the U.S.?" Leahy said at the hearing. "Would you agree with that, yes or no?" "Yes," Alexander replied, without elaborating. But that didn’t stop the apologists. We keep hearing the “54 plots” line to this day. As for 9/11, sadly, the same is true. The government did not need additional mass collection capabilities, like the mass phone records programs, to find al Mihdhar in San Diego. As ProPublica noted, quoting Bob Graham, the former chair of the Senate Intelligence Committee: U.S. intelligence agencies knew the identity of the hijacker in question, Saudi national Khalid al Mihdhar, long before 9/11 and had the ability find him, but they failed to do so. "There were plenty of opportunities without having to rely on this metadata system for the FBI and intelligence agencies to have located Mihdhar," says former Senator Bob Graham, the Florida Democrat who extensively investigated 9/11 as chairman of the Senate’s intelligence committee. Moreover, Peter Bergen and a team at the New America Foundation dug into the government’s claims about plots in America, including studying over 225 individuals recruited by al Qaeda and similar groups in the United States and charged with terrorism, and concluded: Our review of the government’s claims about the role that NSA "bulk" surveillance of phone and email communications records has had in keeping the United States safe from terrorism shows that these claims are overblown and even misleading... When backed into a corner, the government’s apologists cite the capture of Zazi, the so-called New York subway bomber. However, in that case, the Associated Press reported that the government could have easily stopped the plot without the NSA program, under authorities that comply with the Constitution. Sens. Ron Wyden and Mark Udall have been saying this for a long time. Both of the President’s hand-picked advisors on mass surveillance concur about the telephone records collection. The President’s Review Board issued a report in which it stated “the information contributed to terrorist investigations by the use of section 215 telephony meta-data was not essential to preventing attacks,” The Privacy and Civil Liberties Oversight Board (PCLOB) also issued a report in which it stated, “we have not identified a single instance involving a threat to the United States in which [bulk collection under Section 215 of the Patriot Act] made a concrete difference in the outcome of a counterterrorism investigation.” And in an amicus brief in EFF’s case First Unitarian Church of Los Angeles v. the NSA case, Sens. Ron Wyden, Mark Udall, and Martin Heinrich stated that, while the administration has claimed that bulk collection is necessary to prevent terrorism, they “have reviewed the bulk-collection program extensively, and none of the claims appears to hold up to scrutiny.” Even former top NSA official John Inglis admitted that the phone records program has not stopped any terrorist attacks aimed at the US and at most, helped catch one guy who shipped about $8,000 to a Somalian group that the US has designated as a terrorist group but that has never even remotely been involved in any attacks aimed at the US. 118 Paradigm Research 2015-2016 CX—Electronic Communication Aff Disadvantage Ans: Terrorism—Answers to “Dozens of Attacks Stopped” [cont’d] 2. Government claims of NSA program effectiveness are greatly exaggerated—should be discounted Peter Bergen, Director, National Security Program, New America Foundation, with David Sterman, Emily Schneider and Bailey Cahall, “Do NSA’s Bulk Surveillance Programs Stop Terrorists?” New America Foundation, 1—14, p. 11. D. The administration has repeatedly exaggerated the role of NSA bulk surveillance programs in preventing terrorism and is misleading the public when it says that 9/11 could have been prevented by such programs when, in fact, better information-sharing about already existing intelligence would have been far more effective in preventing 9/11. Members of Congress, senior government officials, and NSA officials have justified the programs with statements about how many terrorist events the surveillance programs have foiled – citing a total of 54 “events” around the globe, of which 13 were in the United States – and have warned of the risk of a future 9/11-like attack if the programs were curtailed. As mentioned above, President Obama defended the NSA surveillance programs during a visit to Berlin in June, saying: “We know of at least 50 threats that have been averted because of this information not just in the United States, but, in some cases, threats here in Germany. So lives have been saved.” Gen. Alexander testified before Congress that: “the information gathered from these programs provided the U.S. government with critical leads to help prevent over 50 potential terrorist events in more than 20 countries around the world.” Rep. Mike Rogers, chairman of the House Permanent Select Committee on Intelligence, said on the chamber floor in July that NSA programs “stopped and thwarted terrorist attacks both here and in Europe – saving real lives” a total of 54 times. The government’s defense has demonstrated a lack of precision regarding the exact nature of the threats in the terrorism cases the government has claimed were prevented by NSA surveillance. Were they real attacks that were thwarted? Serious plots that were still somewhere in the planning stages? Plots that were concerning, but never really operational? Or did they involve some sort of terrorismsupport activity, such as fundraising? President Obama has called them “threats,” Gen. Alexander called them “events” and then later used the term “activities,” while Rep. Rogers and one of Gen. Alexander’s slides at the 2013 Black Hat conference referred to them as “attacks.” Sen. Leahy brought attention to this disconnect at a Senate Judiciary Committee hearing in July 2013, saying he had been shown a classified list of “terrorist events” detected through surveillance which did not show that “dozens or even several terrorist plots” had been thwarted by the collection of American telephone metadata under Section 215. Sen. Leahy asked Gen. Alexander: “Would you agree that the 54 cases that keep getting cited by the administration were not all plots, and of the 54, only 13 had some nexus to the U.S.?” and Gen. Alexander’s reply was a simple “Yes.” On this key point, beyond his one-word answer, the NSA director did not elaborate while under oath. 119 Paradigm Research 2015-2016 CX—Electronic Communication Aff Disadvantage Ans: Terrorism—Answers to “FISA Links” 1. FISA does nothing to limit foreign intelligence David Cole, Professor, Georgetown University, “Are You a Terrorist or an American?: An Analysis of Immigration Law Post 9/11: Reviving the Nixon Doctrine: NSA Spying, the Commander-in-Chief, and Executive Power in the War on Terror,” WASHINGTON AND LEE JOURNAL OF CIVIL RIGHTS AND SOCIAL JUSTICE v. 13, Fall 2006, p. 32. In assessing this argument, it is important to first note what FISA does and does not regulate. Administration de-fenders have repeatedly argued that if the president is wiretapping an al Qaeda member in Afghanistan, it should not have to turn off the wiretap simply because he happens to call someone within the United States. The simple answer is that nothing in FISA would compel that result. FISA does not regulate electronic surveillance acquired abroad and targeted at non-U.S. persons, even if the surveillance happens to collect information on a communication with a U.S. person. FISA's requirements are triggered only when the surveillance is "targeting [a] United States person who is in the United States," or the surveillance "acquisition occurs in the United States." Thus, the hypothetical tap on the al Qaeda member abroad is not governed by FISA at all. 2. FISA does not infringe on the president’s power to engage the enemy—only applies to domestic communications David Cole, Professor, Georgetown University, “Are You a Terrorist or an American?: An Analysis of Immigration Law Post 9/11: Reviving the Nixon Doctrine: NSA Spying, the Commander-in-Chief, and Executive Power in the War on Terror,” WASHINGTON AND LEE JOURNAL OF CIVIL RIGHTS AND SOCIAL JUSTICE v. 13, Fall 2006, p. 33. Because FISA leaves unregulated electronic surveillance conducted outside the United States and not targeted at U.S. persons, it leaves to the president's unfettered discretion a wide swath of "signals intelligence." Moreover, it does not actually prohibit any signals intelligence regarding al Qaeda, but merely requires judicial approval where the surveillance targets a U.S. person or is acquired here. As such, the statute cannot reasonably be said to intrude impermissibly upon the president's ability to "engage the enemy," and certainly does not come anywhere close to "prohibit[ing] the President from undertaking actions necessary to fulfill his constitutional obligation to protect the Nation from foreign attack," as the Justice Department claims. Again, if, as President Bush concedes, Congress can absolutely prohibit certain methods of "engaging the enemy," such as torture, surely it can impose reasonable regulations on electronic surveillance of U.S. persons. 120 Paradigm Research 2015-2016 CX—Electronic Communication Aff Disadvantage Ans: Terrorism—Answers to “Information Key” / “Transparency Links” 1. There is little benefit to more information—bigger issue is how we share it Peter Bergen, Director, National Security Program, New America Foundation, with David Sterman, Emily Schneider and Bailey Cahall, “Do NSA’s Bulk Surveillance Programs Stop Terrorists?” New America Foundation, 1—14, p. 2-3. Finally, the overall problem for U.S. counterterrorism officials is not that they need vaster amounts of information from the bulk surveillance programs, but that they don’t sufficiently understand or widely share the information they already possess that was derived from conventional law enforcement and intelligence techniques. This was true for two of the 9/11 hijackers who were known to be in the United States before the attacks on New York and Washington, as well as with the case of Chicago resident David Coleman Headley, who helped plan the 2008 terrorist attacks in Mumbai, and it is the unfortunate pattern we have also seen in several other significant terrorism cases. 2. Basic transparency measures won’t compromise the effectiveness of the NSA Kevin Bankston, Policy Director, Open Technology Institute, New America Foundation, Center for Democracy and Technology, Testimony before the Senate Judiciary Committee, Subcommittee on Privacy, Technology and the Law, 11—13—13, www.judiciary.senate.gov/imo/media/doc/11-13-13BankstonTestimony.pdf, accessed 3-10-15. NSA directors past and present are rightly unconcerned about tipping off the terrorists that purportedly use Gmail, Facebook, Twitter, and Yahoo with their general statements. First, because any bad guys presumably already assume that each Internet service is being surveilled to some extent; second, because no bad guys can tell whether they in particular have been targeted yet—even if they already know from the companies’ law enforcement reporting, or from Generals Alexander and Keith themselves, that the government routinely seeks information from a wide range of Internet services. Basic information about how the government is using its various surveillance authorities isn’t of use to terrorists. It is, however, of great use to the American people and users of American Internet services who are trying to evaluate whether or not the US government’s surveillance powers are being used in a reasonable and proportionate manner. 121 Paradigm Research 2015-2016 CX—Electronic Communication Aff Disadvantage Ans: Terrorism—Answers to “Lone Wolf” 1. Surveillance data is not useful in catching lone wolf terrorists Matthew Harwood, Editor, “The Lone-Wolf Terror Trap: Why the Cure Will Be Worse Than the Disease,” American Civil Liberties Union, Speak Freely, 2—5—15, www.aclu.org/blog/lone-wolf-terror-trap-why-cure-will-be-worse-disease, accessed 6-2-15. The "literature" on both terrorism and the lone wolf should be approached with a healthy degree of skepticism. To this day, there is little consensus on what exactly terrorism is; the same is true of the lone-wolf variety. In the media and in recent academic studies, what separates the lone-wolf terrorist from the phenomenon in general is the perpetrator. Lone wolves are, by definition, solitary individuals, almost always men, often with mental health problems, who lash out violently against civilian targets. At least in some fashion, they are spurred on by belief. Researcher Michael Becker defines it this way: "Ideologically driven violence, or attempted violence, perpetrated by an individual who plans and executes an attack in the absence of collaboration with other individuals or groups." Although you wouldn't know it at the moment in America, the motivation for such attacks can run the gamut from religiously inspired anti-abortion beliefs to white supremacism, from animal rights to an al-Qaeda-inspired worldview. According to the literature, lone wolves are unique in the annals of terrorism because of the solitariness with which they plan and carry out their acts. They lack peer or group pressure and their crimes are conceived and executed without assistance. In this way, they bear a strong resemblance to the individual school shooters and rampage killers that Americans are already so used to. One practical reason many such individuals act alone, according to researchers, is fear of detection. In "Laws for the Lone Wolf," white supremacist Tom Metzger wrote: "The less any outsider knows, the safer and more successful you will be. Keep your mouth shut and your ears open. Never truly admit to anything." (Before 9/11, lonewolf terrorism in America was overwhelmingly a right-wing affair.) This isn't to say that individuals who commit political violence don't talk to anyone before they attack. Recent research into 119 lone-actor terrorists in the United States and Europe, who were either convicted of such a crime or died during it, finds that they often expressed their extremist beliefs, grievances, and sometimes their violent intentions to others -- mostly friends and family or online communities. The good news should be that family, friends, and colleagues might be able to help prevent those close to them from engaging in political violence if, as a society, we were to adopt strategies that built trust of law enforcement in the public, particularly affected communities, rather than fear and suspicion. (But given the record these last years, don't hold your breath.) On the other hand, the methods that the police and national security state seem to be exploring to deal with the issue – like trying to determine what kinds of individuals will join terrorist groups or profiling lone wolves – won't work. The reasons individuals join terrorist groups are notoriously complex, and the same holds true for politically violent people who act alone. After reviewing those 119 lone-wolf cases, for example, the researchers concluded, "There was no uniform profile of lone-actor terrorists." Even if a "profile" were to emerge, they added, it would be essentially worthless: "[T]he use of such a profile would be unwarranted because many more people who do not engage in lone-actor terrorism would share these characteristics, while others might not but would still engage in lone-actor terrorism." 2. The surveillance measures that might catch some lone wolf terrorists pose an enormous threat to our civil liberties Matthew Harwood, Editor, “The Lone-Wolf Terror Trap: Why the Cure Will Be Worse Than the Disease,” American Civil Liberties Union, Speak Freely, 2—5—15, www.aclu.org/blog/lone-wolf-terror-trap-why-cure-will-be-worse-disease, accessed 6-2-15. Other proposed solutions to the "lone-wolf" problem are even more indiscriminate. In a recent book, former RAND Corporation analyst Jeffrey Simon offers an inventory of possible technological strategies for identifying the wolf in sheep's clothing before he attacks. These are typical of our moment and include the widespread use of Internet-enabled smart surveillance cameras, as well as the active, suspicionless monitoring of Internet and social media usage. Another increasingly popular approach he suggests is the expansion of biometric collection, meaning the government would assemble biological traits unique to each individual, such as facial dimensions and DNA, without any evidence of wrongdoing. It should be noted that such an approach – and it's typical of the direction the national security state and law enforcement have taken in these years – would represent a fundamental assault on a free society. Such "countermeasures" should send a shiver down your spine. Simon seems to recognize this, writing, "Privacy issues will have to be addressed, including the willingness of the public to have their facial expressions, eye movements, heart rates, breathing patterns, and other characteristics captured by sophisticated sensors wherever they go in order for a decision to be made by others concerning what they might be intending to do." The dangers to Americans in allowing government agencies to collect such intimate information in order to discover whether any of them are possible lone wolves should be obvious in terms of the destruction of privacy, among other things. The result would be both an Orwellian world and a hopeless one in safety terms. It's already clear that none of these expensive and advanced technological "solutions" will work. Totally innocent conduct ("false positives") will overwhelm the truly menacing. Some of these approaches, like surveillance cameras, may help finger a perpetrator after the crime, while others, such as trying to identify who will engage in terrorism by his body language, will only further contribute to the security theater the government has staged since 9/11. 122 Paradigm Research 2015-2016 CX—Electronic Communication Aff Disadvantage Ans: Terrorism—Answers to “NAS/NRC Report / No Alternative” 1. The NAS report does not prove that we need bulk data programs Nadia Kayyali, staff, “New Report on Bulk Collection Shows That There’s No Magical Solution to Bad Policy,” Electronic Frontier Foundation, 1—21—15, www.eff.org/deeplinks/2015/01/new-report-bulk-collection-shows-theres-no-magical-solution-bad-policy, accessed 2-17-15. PPD 28 asked for a limited technical assessment. And that’s the substance of the report. Some analyses of the report from the media seem to misunderstand this, emphasizing that the report finds “no effective alternative to the government’s ‘bulk collection.’” But the report makes it clear that it does not address “policy questions and tried to avoid making judgments about them." In fact, as the report aptly (and repeatedly) points out: Other groups, such as the President's Review Group on Intelligence and Communications Technologies and the Privacy and Civil Liberties Oversight Board (in its Section 215 report) have said that bulk collection of telephone metadata is not justified. These were policy and legal judgments that are not in conflict with the committee's conclusion that there is no software technique that will fully substitute for bulk collection; there is no technological magic. That’s right. There’s no software magic that can recreate the past in the same way that bulk collection of the phone records of millions of innocent people can. That’s all the report (unsurprisingly) concludes about bulk collection. 2. There are plenty of viable alternatives to bulk data collection Nadia Kayyali, staff, “New Report on Bulk Collection Shows That There’s No Magical Solution to Bad Policy,” Electronic Frontier Foundation, 1—21—15, www.eff.org/deeplinks/2015/01/new-report-bulk-collection-shows-theres-no-magical-solution-bad-policy, accessed 2-17-15. While our current lack of a software time-machine may be a disappointment, it does not mean there is no alternative to bulk collection. Alternatives abound. Indeed, in the context of Section 215 and the bulk collection of Americans’ phone records, after just six months of public debate and deliberation, an alternative was proposed that would ensure that the intelligence community has the “necessary and appropriate tools to help keep us safe,” while “end[ing] the dragnet collection of phone records under Section 215 of the PATRIOT Act.” But the government hasn’t made it easy to have an honest debate about bulk surveillance, since as the report notes, “Very little has been made public about actual cases where U.S. SIGINT has contributed to counterterrorism…The selection of the cases that were made public, the details of the accounts, and their significance have all been controversial.” Compounding these shortcomings, officials have made trumped-up claims about the effectiveness of bulk collection—claims that have been criticized by the President’s Review Board and the Privacy and Civil Liberties Oversight Board, among others. It’s impossible to have an honest debate without access to facts. Ultimately, as the report points out “whether the gain in privacy is worth the loss [of bulk collection] is a policy question that the committee does not address”—and it’s one we might not even need to answer. We’re confident that alternatives to bulk collection exist—alternatives that can be created through honest and full public debate, alternatives that preserve important national security functions without compromising the privacy of millions. So there may be no technological magic bullet. And there may not even be a political magic bullet. But that doesn’t mean there aren’t solutions. 123 Paradigm Research 2015-2016 CX—Electronic Communication Aff Disadvantage Ans: Terrorism—Answers to “NAS/NRC Report / No Alternative” [cont’d] 3. The NRC report exaggerates the value of bulk intelligence Marshall Erwin, counterterrorism analyst, “The Intelligence Time Machine,” JUST SECURITY, 4—30—15, http://justsecurity.org/22560/intelligence-time-machine/, accessed 6-7-15. The Superiority of Targeted Collection. There is good reason to believe that the ability to retrospectively mine bulk intelligence traffic isn’t as valuable as the NRC expects. The two broadest NSA programs to have received public scrutiny are its bulk phone records program (Section 215) and Internet content collection program (Section 702). Several rigorous reviews (for example here, here, and here) have been conducted of the Section 215 program and have concluded that the program is not an effective counterterrorism tool. At the same time, the consensus has emerged that NSA’s Section 702 program — a targeted program, albeit one that does incidentally sweep up the communications of some non-targets— is vital to national security. These conclusions are the opposite of what one would expect from the NRC’s analysis. The NRC was content to limit the scope of its review to “technical aspects of signals intelligence,” without regard to the practicalities of intelligence work or the details of any particular bulk collection program. It is therefore able to argue that the conclusions from other reviews of NSA’s programs “were policy and legal judgments that are not in conflict with the committee’s conclusion that there is no software technique that will fully substitute for bulk collection.” Nonetheless, it is hard to read those other reviews and not conclude that there is something missing from the NRC’s report. One can’t generalize about bulk collection based on an analysis of just two actual intelligence programs. But experience fighting al-Qaeda over the last decade has shown there are diminishing returns to data collection. In many of the most significant counterterrorism failures over the last decade, problems stemmed from having too much information, not too little. Intelligence time machines don’t actually seem to work that well as intelligence tools. Bulk collection programs are inferior substitutes for targeted ones. There are two fundamental reasons why this is the case. First, intelligence analysis isn’t about looking back. It is about looking forward. This is the basic distinction that separates intelligence analysis from criminal investigations. Criminal investigations seek information about a crime that has taken place. Indeed, intelligence time machines are most valuable when our intelligence community has already failed, after a terrorist attack has occurred, when we are seeking to reconstruct the events that led to that attack. Intelligence analysis involves anticipating threats, identifying the information needed to understand those threats, and then doing what is necessary to get that information. Intelligence professionals often talk about the intelligence life cycle: intelligence requirements drive collection operations, operations generate actual intelligence that is disseminated and analyzed, and analysts use that information to define new intelligence requirements. The intelligence life cycle entails an entirely different approach to intelligence collection than the one described by the NRC committee. The intelligence time machine tries to short circuit the cycle by seeking to satisfy intelligence requirements before those requirements have actually been defined. In so doing, it breaks the iterative process that allows for actual knowledge accumulation within the IC. Second, intelligence is all about the details. Bulk collection programs inherently sacrifice precision and detail for breadth. This is true in two respects. It is the content of communications that is always the most valuable for intelligence purposes because it contains the details necessary to power sophisticated analysis. Bulk metadata programs will never cut it because metadata doesn’t include those details. Conversely, bulk content collection has its own set of problems. Because the content of communications is typically unstructured, it is more difficult to synthesize and surface the most important details to intelligence analysts. This leaves those details hidden in the haystack, never to be found unless the analyst already knows exactly what they are looking for. And again, analysts only know exactly what they are looking for at the point when the intelligence community has already failed. Good intelligence work involves the accumulation of discrete pieces of information that one knows to be credible and significant. It is a process of building a pool of knowledge. This is what drives most intelligence successes. Conceptually, it does not fundamentally involve the whittling away of huge quantities data, the vast majority of which we know beforehand to be useless. And to the extent that analytic work requires whittling down vast amounts of useless data, this is actually a drawback that makes the job hard and increases the likelihood that important pieces of intelligence will be missed. 124 Paradigm Research 2015-2016 CX—Electronic Communication Aff Disadvantage Ans: Terrorism—Answers to “NAS/NRC Report / No Alternative” [cont’d] 4. The NRC is wrong about bulk collection—it’s report uses impossible standards Marshall Erwin, counterterrorism analyst, “The Intelligence Time Machine,” JUST SECURITY, 4—30—15, http://justsecurity.org/22560/intelligence-time-machine/, accessed 6-7-15. The NRC’s report threatens to serve as the foundation for future thought about how the IC should respond to the age of big data, which is why its analysis is both important and problematic. Its baseline conclusion is that “[t]here is no software technique that will fully substitute for bulk collection where it is relied on to answer queries about the past after new targets become known.” Outside of the narrowest technical context, this conclusion is fundamentally wrong. In practice, targeted approaches will more than substitute for bulk collection. The NRC Report. The NRC report is the result of a process started by Presidential Policy Directive 28, which asked the Office of the Director of National Intelligence (ODNI) to “assess the feasibility of creating software that would allow the IC to conduct targeted information acquisition [of signal intelligence] rather than bulk collection.” The ODNI requested that the National Academies form a committee to study the question. The NRC report is the product of that committee’s work. The NRC’s conclusion is based on comparing prospective collection methodologies against intelligence time machines. An intelligence time machine is a concept first articulated to me by network security expert Eric Rescorla. The idea is that there may be some point in the future when an intelligence analyst will wish he had collected some piece of intelligence in the past. But he can’t know today exactly what intelligence he may want in the future, so any selective collection method always leaves open the possibility that he may fail to collect what he will need. If instead he collects everything, he has effectively built himself a sort of time machine: in the future, he can go back and reprocess the data to find the intelligence he didn’t know he would need at the time it was collected. Here is how the NRC committee puts it: A key value of bulk collection is its record of past SIGINT that may be relevant to subsequent investigations. If past events become interesting in the present, because intelligence-gathering priorities change to include detection of new kinds of threats or because of new events such as the discovery that an individual is a terrorist, historical events and the context they provide will be available for analysis only if they were previously collected. This is the basis of the committee’s conclusion that no software technique will fully substitute for bulk collection. The committee caveats this finding with sub-conclusions that address alternatives to bulk collection. But those alternatives are only a “partial substitute” because they can’t theoretically provide as much value as an intelligence time machine. Put in this context, it should be clear what the problem is here. It doesn’t take a presidentially mandated committee full of distinguished technical experts to tell you that a time machine could be useful to have around. Of course, notionally, a time machine could be quite handy. Intelligence officials and surveillance reform advocates could all probably agree on that point. The committee’s conclusion — that a software technique that allows you to look into the past is theoretically better than software that doesn’t allow you to do so — is at once both true and trivial. The triviality makes it difficult to see how this report makes a meaningful contribution to debates about bulk collection. Furthermore, this conclusion based on a highly theoretical premise breaks down when applied to the realities of intelligence analysis. 5. The NRC report is wrong—the value of bulk data collection is limited Marshall Erwin, counterterrorism analyst, “The Intelligence Time Machine,” JUST SECURITY, 4—30—15, http://justsecurity.org/22560/intelligence-time-machine/, accessed 6-7-15. Conclusions. The NRC committee essentially concluded that intelligence time machines make sense in theory. But the committee reached that conclusion by ignoring the details of how intelligence analysis actually works. As in the business of intelligence, the details here should matter, and the reality is that intelligence time machines fail in practice. Bulk collection programs are less effective than targeted ones, a conclusion that runs counter to the NRC’s analysis. Further, bulk collection efforts make targeted programs less valuable by burying good intelligence within larger volumes of useless information. Reliance on intelligence time machines may thus hurt the IC more than they help, ensuring that analysts have the information they need to disrupt the next terrorist attack but that they only find that information after the attack has occurred. 125 Paradigm Research 2015-2016 CX—Electronic Communication Aff Disadvantage Ans: Terrorism—Answers to “Would Have Stopped 9/11” 1. The NSA program would not have stopped 9/11—don’t believe the hype Peter Bergen, Director, National Security Program, New America Foundation, with David Sterman, Emily Schneider and Bailey Cahall, “Do NSA’s Bulk Surveillance Programs Stop Terrorists?” New America Foundation, 1—14, p. 12. The administration has also deliberately tried to present the issue as one of preventing future 9/11s, taking advantage of the emotional resonances of that day. However, our review suggests that this rhetorical framing does not in any way accurately reflect the character of the plots that might be cited to justify the NSA programs. NSA talking points acquired by Al Jazeera through a Freedom of Information Act request, for example, demonstrate that the administration considered the 9/11 attacks a key point in its defense of the NSA programs. The talking points included statements such as, “NSA AND ITS PARTNERS MUST MAKE SURE WE CONNECT THE DOTS SO THAT THE NATION IS NEVER ATTACKED AGAIN LIKE IT WAS ON 9/11.” Spokespeople were also encouraged to use “SOUND BITES THAT RESONATE,” specifically, “I MUCH PREFER TO BE HERE TODAY EXPLAINING THESE PROGRAMS, THAN EXPLAINING ANOTHER 9/11 EVENT THAT WE WERE NOT ABLE TO PREVENT.” Administration officials have adhered to the talking points’ advice to utilize the 9/11 attacks to defend the program. During a House intelligence committee hearing on June 18, 2013, Gen. Alexander invoked 9/11 using language very close to that in the talking points, stating, “Let me start by saying that I would much rather be here today debating this point than trying to explain how we failed to prevent another 9/11.” Indeed, the need to prevent a future 9/11 functions as the central framing for the administration’s case. In an October 29, 2013, House intelligence committee hearing on the NSA programs featuring Gen. Alexander and Director of National Intelligence James Clapper, the 9/11 attacks were mentioned 14 times. 2. Loosening warrant requirements would have done nothing to stop 9/11 Adrienne Ratner, J.D. Candidate, “Warrantless Wiretapping: The Bush Administration’s Failure to Jam an Elephant into a Mousehole,” HASTINGS CONSTITUTIONAL LAW QUARTERLY v. 37, Fall 2009, p. 193-194. Not only was the TSP an unconstitutional executive act that violates the public's Fourth Amendment rights, it also failed to resolve intelligence problems. The conventional wisdom after September 11, 2001, was that U.S. national security agencies failed to "connect the dots" before the attacks. In contrast, others saw a more critical intelligence failure that there were "too few useful dots." By circumventing FISA, however, the TSP solved neither of these institutional problems. The government defends the TSP with the argument that FISA impeded intelligence work by creating a "wall" that restricted the degree of cooperation between law enforcement and intelligence collectors and limited the use of information in criminal prosecutions. Neither of these arguments explain the government's failure to intervene in the September 11 terrorist attacks when the NSA had conducted judicially authorized electronic surveillance since 1999 on two September 11 terrorists, Khalid al-Mihdhar and Nawaf al-Hazmi, and had shared their identities with the CIA and FBI. Eliminating the requirement for court approval of electronic surveillance would have done nothing to improve intelligence efforts related to the September 11 terrorist attacks. 3. Looser FISA provisions would not have prevented 9/11—the Commission report proves Bruce Fein, constitutional expert, “Presidential Authority to Gather Foreign Intelligence,” PRESIDENTIAL STUDIES QUARTERLY v. 37 n. 1, 3—07, p. 24. President Bush has chosen to flout FISA for more than five years with no evidence that its mild restraints on foreign intelligence collection impair the defeat of international terrorism. His motivations have been fivefold: to gather political intelligence against his domestic critics, to chill dissent by creating an aura of intimidation, to cripple Congress as a check on presidential power, to warn courts against second-guessing national security decisions of the commander in chief, and to concoct an appearance of toughness on terrorism. FISA did not facilitate the success of the 9/11 hijackers. The 9/11 Commission did not find that the hijackings would have been averted if the president had enjoyed unchecked power to spy. On July 31, 2002, the Bush administration testified to the Senate Intelligence Committee that FISA was nimble, flexible, and impeccable as an instrument for nipping terrorist plots in the bud. 126
© Copyright 2026 Paperzz