Professional Documents
Culture Documents
Strat Sheet
Their 1AC and a sample 1NC are included below. The plan text
doesnt specify which agency does the plan but their solvency
evidence specifies congress so you can read XO if you want.
Other than XO, there is T-Domestic, a PIC for tangible w/ the
net benefit of terror, specific Terror DA links and a Security K.
The PIC argues that tangible threat is too specific and
doesnt take in account fake threats. We should analyze all
threats regardless of being fake or real.
1NC Security K, PIC w/ Terror DA, T-Domestic, Case
2NC- Security K or PIC, Case
1NR Terror DA
2NR Security K or PIC w/ Terror DA, Case
-Allen Xu
Questions? Email xuallen99@gmail.com
Their 1AC
1AC Inherency
The recent USA Freedom Act, did not reform the NSAs the
mass collection of domestic communication under Section 702
of the FISA Amendments Act.
Goitein 15,
Elizabeth, Co-Director of the Brennan Center for Justices Liberty and National
Security Program, 6-5-2015, "Who really wins from NSA reform?," MSNBC,
http://www.msnbc.com/msnbc/freedom-act-who-really-wins-nsa-reform
The USA Freedom Act will end the bulk collection of phone metadata and prohibit similar
programs for any type of business records under foreign intelligence collection
authorities. For phone records, the government may obtain metadata on an ongoing basis only for suspected
terrorists and those in contact with them. For other types of records, the government must tie its request for
records to a specific selection term, such as a person, address, or account. Given the surge in surveillance since
9/11, the USA Freedom Acts imposition of constraints on collection is historic. Indeed, the USA Freedom Act is the
most significant limitation on foreign intelligence surveillance since the 1970s. If faithfully implemented a critical
Even under
USA Freedom, however, the government is still able to pull in a great deal of
information about innocent Americans. Needless to say, not everyone in contact with a suspected
caveat, to be sure the law will meaningfully curtail the overbroad collection of business records.
terrorist is guilty of a crime; even terrorists call for pizza delivery. Intelligence officials also may need to obtain
records like flight manifests that include information about multiple people, most of whom have nothing to do
with terrorism. Some of this overcollection may be inevitable, but its effects could be mitigated. For instance,
agencies could be given a short period of time to identify information relevant to actual suspects, after which they
would have to destroy any remaining information. USA Freedom fails to impose such limits. More fundamentally,
bulk collection of business records is only one of the many intelligence activities that abandoned the individualized
Until a few years ago, if the NSA, acting within the United
States, wished to obtain communications between Americans and foreigners, it had
to convince the FISA Court that the individual target was a foreign power or its
agent. Today, under Section 702 of the FISA Amendments Act, the NSA may target
any foreigner overseas and collect his or her communications with Americans
without obtaining any individualized court order. Under Executive Order 12333, which governs the
NSAs activities when it conducts surveillance overseas, the standards are even more lax. The result is mass
surveillance programs that make the phone metadata program seem dainty in
comparison. Even though these programs are nominally targeted at foreigners, they
incidentally sweep in massive amounts of Americans data, including the content
of calls, e-mails, text messages, and video chats. Limits on keeping and using such information
are weak and riddled with exceptions. Moreover, foreign targets are not limited to suspected
terrorists or even agents of foreign powers. As the Obama administration recently
acknowledged, foreigners have privacy rights too , and the ability to eavesdrop on any foreigner
suspicion approach after 9/11.
overseas is an indefensible violation of those rights. Intelligence officials almost certainly supported USA Freedom
because they hoped it would relieve the post-Snowden pressure for reform. Their likely long-term goal is to avoid
changes to Section 702, Executive Order 12333, and the many other authorities that permit intelligence collection
calculus, USA Freedom may prove to be a Pyrrhic victory. But if the law clears the way for further reforms across the
full range of surveillance programs, history will vindicate the privacy advocates who supported it.
The answer
to what USA Freedom means for our liberties lies, not in the text of the law, but in
the unwritten story of what happens next.
Ordinary Internet users, American and non-American alike, far outnumber legally
targeted foreigners in the communications intercepted by the National Security
Agency from U.S. digital networks, according to a four-month investigation by The Washington Post. Nine of
10 account holders found in a large cache of intercepted conversations , which former NSA
contractor Edward Snowden provided in full to The Post, were not the intended surveillance targets but
were caught in a net the agency had cast for somebody else. Many of them were Americans.
Nearly half of the surveillance files, a strikingly high proportion, contained names, email addresses or other details that the NSA marked as belonging to U.S. citizens or
residents. NSA analysts masked, or minimized, more than 65,000 such references to protect Americans privacy, but The
Post found nearly 900 additional e-mail addresses, unmasked in the files, that could be strongly linked to U.S. citizens or
The surveillance files highlight a policy dilemma that has been aired only
abstractly in public. There are discoveries of considerable intelligence value in the
intercepted messages and collateral harm to privacy on a scale that the Obama
administration has not been willing to address. Among the most valuable contents which The Post will
U.S.residents.
not describe in detail, to avoid interfering with ongoing operations are fresh revelations about a secret overseas nuclear project,
double-dealing by an ostensible ally, a military calamity that befell an unfriendly power, and the identities of aggressive intruders
into U.S. computer networks. Months of tracking communications across more than 50 alias accounts, the files show, led directly to
the 2011 capture in Abbottabad of Muhammad Tahir Shahzad, a Pakistan-based bomb builder, and Umar Patek, a suspect in a 2002
terrorist bombing on the Indonesian island of Bali. At the request of CIA officials, The Post is withholding other examples that officials
stories of love and heartbreak, illicit sexual liaisons, mental-health crises, political and religious conversions, financial anxieties and
disappointed hopes. The daily lives of more than 10,000 account holders who were not targeted are catalogued and recorded
nevertheless. In order to allow time for analysis and outside reporting, neither Snowden nor The Post has disclosed until now that he
closely controlled data repositories, and for more than a year, senior government officials have depicted it as beyond Snowdens
reach.The Post reviewed roughly 160,000 intercepted e-mail and instant-message conversations, some of them hundreds of pages
long, and 7,900 documents taken from more than 11,000 online accounts. The material spans President Obamas first term, from
data on the move as it crosses the U.S. junctions of global voice and data networks .
No government oversight body, including the Justice Department, the Foreign Intelligence Surveillance Court,
intelligence committees in Congress or the presidents Privacy and Civil Liberties Oversight Board, has delved into a
comparably large sample of what the NSA actually collects not only from its
targets but also from people who may cross a targets path.
Under Section 702, targeting can occur for the purpose of collecting foreign
intelligence information even though there is no court review of any particular
target. Instead, the super secret FISA court merely determines whether the guidelines under which the
surveillance is conducted are reasonably designed to result in the targeting of non-Americans abroad and that
This means incidental surveillance may occur purely
because someone communicated with an individual engaged in activities that may
have broadly defined foreign intelligence value . For example, the communications of
someone who communicates with a person abroad whose activities might relate to
the conduct of U.S. foreign affairs can be collected, absent any independent
assessment of necessity or accuracy.
minimization guidelines are reasonable.
As another example, under traditional FISA for intelligence surveillance in the U.S. of people in the U.S. your
communications could be incidentally collected only if you were in direct contact with a suspected agent of a
foreign power, and additionally if the Foreign Intelligence Surveillance Court had affirmed this suspicion based on
And, these invasions are magnified because the data is the full
content of the communication.
Goitein 15,
Elizabeth, Co-Director of the Brennan Center for Justices Liberty and National
Security Program., 6-5-2015, "Who really wins from NSA reform?," MSNBC,
http://www.msnbc.com/msnbc/freedom-act-who-really-wins-nsa-reform
Some of this overcollection may be inevitable, but its effects could be mitigated .
For instance, agencies could be given a short period of time to identify information relevant to actual suspects, after
which they would have to destroy any remaining information. USA Freedom fails to impose such limits. More
fundamentally, bulk collection of business records is only one of the many intelligence activities that abandoned the
suspected terrorists or even agents of foreign powers. As the Obama administration recently acknowledged,
foreigners have privacy rights too, and the ability to eavesdrop on any foreigner overseas is an indefensible
they saw it as the first skirmish in a long battle to rein in surveillance authorities. Their eye is on the prize: a return
to the principle of individualized suspicion as the basis for surveillance. If intelligence officials are correct in their
calculus, USA Freedom may prove to be a Pyrrhic victory. But if the law clears the way for further reforms across the
The answer
to what USA Freedom means for our liberties lies, not in the text of the law, but in
the unwritten story of what happens next.
full range of surveillance programs, history will vindicate the privacy advocates who supported it.
Sinha, 2014
G. Alex Sinha is an Aryeh Neier fellow with the US Program at Human Rights Watch
and the Human Rights Program at the American Civil Liberties Union, July 2014
With Liberty to Monitor All How Large-Scale US Surveillance is Harming Journalism,
Law, and American Democracy Human Rights Watch,
http://www.hrw.org/node/127364
defended the surveillance programs as essential to protecting US national security. In a world of constantly shifting
global threats, officials argue that the US simply cannot know in advance which global communications may be
relevant to its intelligence activities, and that as a result, it needs the authority to collect and monitor a broad
swath of communications. In our interviews with them, US officials argued that the programs are effective, plugging
operational gaps that used to exist, and providing the US with valuable intelligence. They also insisted the programs
are lawful and subject to rigorous and multi-layered oversight, as well as rules about how the information obtained
through them is used. The government has emphasized that it does not use the information gleaned from these
that are in the process of expanding their surveillance capabilities. It also damages US credibility in advocating
internationally for internet freedom, which the US has listed as an important foreign policy objective since at least
And, these privacy violations are more dangerous than any risk
of terrorism, which is magnified by the fact that surveillance
fails to prevent attacks.
Schneier, 2014
Bruce Schneier a fellow at the Berkman Center for Internet and Society at Harvard
Law School, a board member of the Electronic Frontier Foundation, an Advisory
Board Member of the Electronic Privacy Information Center, and the CTO at Resilient
Systems, Inc.,1-6-2014, "Essays: How the NSA Threatens National Security,"
Schneier On Security,
https://www.schneier.com/essays/archives/2014/01/how_the_nsa_threaten.html
We have no evidence that any of this surveillance makes us safer . NSA Director General
Keith Alexander responded to these stories in June by claiming that he disrupted 54 terrorist plots. In October, he
costs, as country after country learns of our surveillance programs against their citizens. I'm also talking about the
It breaks so much of what our society has built. It breaks our political
systems, as Congress is unable to provide any meaningful oversight and citizens are kept in the dark about what
government does. It breaks our legal systems, as laws are ignored or reinterpreted, and people are unable
to challenge government actions in court . It breaks our commercial systems, as U.S. computer
cost to our society.
products and services are no longer trusted worldwide. It breaks our technical systems, as the very protocols of the
problem. Recent history illustrates many episodes where this information was, or would have been, abused: Hoover
and his FBI spying, McCarthy, Martin Luther King Jr. and the civil rights movement, anti-war Vietnam protesters, and
more recentlythe Occupy movement. Outside the U.S., there are even more extreme examples .
Building
the surveillance state makes it too easy for people and organizations to slip over the
line into abuse.
PoKempne 2014,
Dinah, General Counsel at Human Rights Watch, The Right Whose Time Has Come
(Again): Privacy in the Age of Surveillance 1/21/14 http://www.hrw.org/worldreport/2014/essays/privacy-in-age-of-surveillance
Technology has invaded the sacred precincts of private life, and unwarranted
exposure has imperiled our security, dignity, and most basic values. The law must
rise to the occasion and protect our rights. Does this sound familiar? So argued Samuel
Warren and Louis Brandeis in their 1890 Harvard Law Review article announcing
The Right to Privacy. We are again at such a juncture . The technological developments they
saw as menacingphotography and the rise of the mass circulation pressappear rather quaint to us now. But the
harms to emotional, psychological, and even physical security from unwanted exposure seem just as vivid in our
digital age.Our
abilities to amass and search these endless digital records, giving them the power to know us in extraordinary
detail.
In a world where we share our lives on social media and trade immense amounts of personal
information for the ease and convenience of online living, some have questioned whether privacy is
a relevant concept. It is not just relevant, but crucial.
Indeed, privacy is a gateway right that affects our ability to exercise almost every
other right, not least our freedom to speak and associate with those we choose,
make political choices, practice our religious beliefs, seek medical help, access
education, figure out whom we love, and create our family life. It is nothing less
than the shelter in which we work out what we think and who we are; a fulcrum of
our autonomy as individuals.
The importance of privacy, a right we often take for granted, was thrown into sharp relief in
2013 by the steady stream of revelations from United States government files released by former National
Security Agency (NSA) contractor Edward Snowden, and published in the Guardian and other major newspapers
around the world. These revelations, supported by highly classified documents, showed the US, the UK,
and other governments engaged in global indiscriminate data interception, largely
unchecked by any meaningful legal constraint or oversight, without regard for the
rights of millions of people who were not suspected of wrongdoing.
Haggerty, 2015
Kevin D. Professor of Criminology and Sociology at the University of Alberta, Whats
Wrong with Privacy Protections? in A World Without Privacy: What Law Can and
Should Do? Edited by Austin Sarat p. 230
the exceptional disruption of privacy for legitimate state reasons cannot and should
not be mistaken for a usual and customary rule of mass invasion of people's private
lives without their informed consent. Benjamin Franklin wisely and succinctly
expressed the point: "Those who surrender freedom for security will not have, nor
do they deserve, either one." In relinquishing our privacy to government, we also
lose the freedom to control, and act on, our personal information, which is what
defines us individually, and collectively, as free agents and a free nation. In a world
devoid of freedom to control who we are, proclaiming that we are "secure" is an
empty platitude.
When historians write about this period in U.S. history it could very well be that one of the
themes will be how the United States lost its global technology leadership to other
nations. And clearly one of the factors they would point to is the long-standing
privileging of U.S. national security interests over U.S. industrial and commercial
interests when it comes to U.S. foreign policy. This has occurred over the last few years as the U.S.
government has done relatively little to address the rising commercial challenge to
U.S. technology companies, all the while putting intelligence gathering first and foremost.
Indeed, policy decisions by the U.S. intelligence community have reverberated
throughout the global economy. If the U.S. tech industry is to remain the leader in
the global marketplace, then the U.S. government will need to set a new course that
balances economic interests with national security interests. The cost of inaction is
not only short-term economic losses for U.S. companies, but a wave of protectionist
policies that will systematically weaken U.S. technology competiveness in years to come,
with impacts on economic growth, jobs, trade balance, and national security
through a weakened industrial base. Only by taking decisive steps to reform its
digital surveillance activities will the U.S. government enable its tech industry to
effectively compete in the global market.
A Global economy running on a single engine is better than one that needs jump
leads. The American economy is motoring again, to the relief of exporters from
Hamburg to Hangzhou. Firms added more than 1m net new jobs in the past three months, the best showing
since 1997 (see article). Buoyed up by cheap petrol, Americans are spending; in January consumer sentiment
jumped to its highest in more than a decade.
in 2015, faster than the world economy as a whole . All this is good. But growing dependence on
the American economyand on consumers in particularhas unwelcome echoes. A decade ago American
consumers borrowed heavily and recklessly. They filled their ever-larger houses with goods from China; they fuelled
gas-guzzling cars with imported oil. Big exporters recycled their earnings back to America, pushing down interest
rates which in turn helped to feed further borrowing. Europe was not that different. There, frugal Germans financed
debt binges around the euro areas periphery.After the financial crisis, the hope was of an end to these imbalances.
Debt-addicted Americans and Spaniards would chip away at their obligations; thrifty German and Chinese
consumers would start to enjoy life for once. At first, this seemed to be happening. Americas trade deficit, which
but imports are down by more. And over the past year the renminbi, which rose by more than 10% against the
dollar in 2010-13, has begun slipping again, to the annoyance of American politicians. A mericas
economy is
warping as a result. Consumptions contribution to growth in the fourth quarter of
2014 was the largest since 2006. The trade deficit is widening. Strip out oil, and Americas trade deficit
grew to more than 3% of GDP in 2014, and is approaching its pre-recession peak of about 4%. The worlds
reliance on America is likely to deepen. Germans are more interested in shipping savings abroad
than investing at home (see article). Households and firms in Europes periphery are overburdened with debt,
workers wages squeezed and banks in no mood to lend. Like Germany, Europe as a whole is relying on exports.
China is rebalancing, but not fast enough: services have yet to account for more than half of annual Chinese output.
In response to growing discontent with US surveillance, one political response has been
to push for more technological sovereignty and data nationalisation. The
Snowden disclosures have therefore had serious implications on the development of
the Internet and hastened trends to balkanize the Internet to the detriment of the
development of a wide, vast and easily accessible online network. The Internet as we
knew it, or believed we knew it, is a global platform for exchange of information, open and
free debate, and commerce. But Brazil and the European Union , for example,
announced plans to lay a $185 million undersea fibre-optic cable between them to
108.
thwart US surveillance. German politicians also called for the development of a German internet for
German customers data to circumvent foreign servers and the information to stay on networks that would fully be
disclosures, the European Parliament adopted a report on the NSA surveillance programme in February 2014 161,
which argues that the EU should suspend bank data and Safe Harbour agreements on data privacy (voluntary data
protection standards for non-EU companies transferring EU citizens personal data to the US) with the United States.
MEPs added that the European Parliament should only give its consent to the EU-US free trade deal (TTIP) that is
advocated the creation of a European data cloud that would require all data from European consumers to be
Some
nations, such as Australia, France, South Korea, and India, have already
implemented a patchwork of data-localisation requirements according to two legal
scholars.162
stored or processed within Europe, or even within the individual country of the consumer concerned.
themselves off from the rest (or even if parts of what we could call the liberal
democratic Internet do the same), the result over the long term will be slower
growth and a smaller GDP per capita in less well-connected nations. Some people
might look at this situation and be convinced that excluding people in non-liberal
democracies from the economic potential of the Internet is not right. In normative
terms, these people might deserve to be connected, at the very least so that they
can benefit from the same economic boon as those in more well connected
advanced liberal democracies. In other words, average Internet users in liberal
democracies should care about Internet fragmentation because it is essentially an
issue of equality of opportunity.Other people might only be convinced by the idea
that poverty, inequality, and relative deprivation, while by no means sufficient
causes of terrorism, insurgency, aggression and unrest, are likely to contribute to
the potential for an increasingly conflictual world. Most average Internet users in
Liberal democracies would likely agree that preventing flashes of unrest (like the
current ISIL conflict in Iraq and Syria) is better than having to expend blood and
treasure to try and fix them after they have broken out. Preventive measures can
include ensuring solid GDP growth through global interconnection in every country,
even if this is not, as I mentioned before, going to be enough to fix every problem
every time. Overall, the dangers of a fragmented Internet are real and the average
user in liberal democracies should care. With truly global forces at play, it is
daunting to think of what the average user might do to combat fragmentation.
Really only one step is realistic. Users need to recognize that the system works best
and contributes most to the content and material well-being of all Internet users
when it approaches its ideal technical design of universal interoperability. Societies
will rightly determine that some things need to be walled off, blocked or filtered
because this digital content has physical world implications that are not acceptable
(child pornography, vitriolic hate speech, death threats, underage bullying on social
media, etc.). However, in general, citizens should resist Internet fragmentation
efforts in any form by putting pressure on their national politicians, Internet Service
Providers, and content intermediaries, like Google, to respect the fundamental (and
fundamentally beneficial) universally interoperable structure of the Internet. To do
otherwise is to accept the loss of potential future global prosperity and to encourage
a world that is unequal and prone to conflict and hardship.
Some of the dynamics of the pre-1914 financial world are now re-emerging. Then an
economically declining power, Britain, wanted to use finance as a weapon against
its larger and faster growing competit ors, Germany and the United States. Now America is in
turn obsessed by being overtaken by China according to some calculations, set to become the
instruments for the application of national power. In managing the 2008 crisis, the dependence of foreign banks on
U.S. dollar funding constituted a major weakness, and required the provision of large swap lines by the Federal
Reserve. The United States provided that support to some countries, but not others, on the basis of an explicitly
political logic, as Eswar Prasad demonstrates in his new book on the Dollar Trap.
Geo-politics is intruding
into banking practice elsewhere. Before the Ukraine crisis, Russian banks were trying to acquire assets
in Central and Eastern Europe. European and U.S. banks are playing a much reduced role in Asian trade finance.
Chinese banks are being pushed to expand their role in global commerce. After the financial crisis, China started to
build up the renminbi as a major international currency. Russia and China have just proposed to create a new credit
The next
stage in this logic is to think about how financial power can be directed to national
advantage in the case of a diplomatic tussle. Sanctions are a routine (and not terribly successful)
rating agency to avoid what they regard as the political bias of the existing (American-based) agencies.
part of the pressure applied to rogue states such as Iran and North Korea. But financial pressure can be much more
powerfully applied to countries that are deeply embedded in the world economy. The test is in the Western
imposition of sanctions after the Russian annexation of Crimea. President Vladimir Putins calculation in response is
that the European Union and the United States cannot possibly be serious about the financial war. It would turn into
a boomerang: Russia would be less affected than the more developed and complex financial markets of Europe and
remarkably with almost the entirety of the Cold War, especially since the 1960s, when the strategic doctrine of
The idea of
network disruption relies on the ability to achieve advantage by surprise, and to win
at no or low cost. But it is inevitably a gamble, and raises prospect that others
might, but also might not be able to, mount the same sort of operation. Just as in
1914, there is an enhanced temptation to roll the dice, even though the game may
be fatal.
Mutually Assured Destruction left no doubt that any superpower conflict would inevitably escalate.
In 2010, then secretary of state Hillary Clinton gave a speech declaring Internet freedom a
major US foreign policy goal. To this end, the US State Department funds and supports a variety of
programs worldwide, working to counter censorship, promote encryption, and enable anonymity, all designed " to
ensure that any child, born anywhere in the world, has access to the global Internet
as an open platform on which to innovate, learn, organize, and express herself free
from undue interference or censorship." This agenda has been torpedoed by the
awkward realization that the US and other democratic governments conducted the same
types of surveillance they have criticized in more repressive countries. Those
repressive countries are seizing on the opportunity, pointing to US surveillance as a
justification for their own more draconian Internet policies: more surveillance, more
censorship, and a more isolationist Internet that gives individual countries more
control over what their citizens see and say . For example, one of the defenses the
government of Egypt offered for its plans to monitor social media was that "the US
listens in to phone calls, and supervises anyone who could threaten its national
security." Indians are worried that their government will cite the US's actions to justify surveillance in that
country. Both China and Russia publicly called out US hypocrisy. This affects Internet freedom
worldwide. Historically, Internet governancewhat little there waswas largely left to the
United States, because everyone more or less believed that we were working for the security of the Internet
instead of against it. But now that the US has lost much of its credibility, Internet
governance is in turmoil. Many of the regulatory bodies that influence the Internet are trying to figure out
what sort of leadership model to adopt. Older international standards organizations like the International
Telecommunications Union are trying to increase their influence in Internet governance and develop a more
This still leaves open the question of what is driving authoritarian innovation in cyberspace .
Deibert identifies
increased government emphasis on cybersecurity as one driver : cybercrime and terrorism
are serious concerns, and governments have a legitimate interest in combatting them. Unfortunately, when
democratic governments use mass surveillance and other tools to police
cyberspace, it can have the effect of providing cover for authoritarian regimes to
use similar techniques for repressive purposesespecially, as Deibert notes, since former NSA
contractor Edward Snowdens disclosure of US mass surveillance programs. Second, Deibert
observes that authoritarian demand for cybersecurity technology is often met by
private firms based in the democratic worlda group that Reporters Without Borders (RSF) calls the
Corporate Enemies of the Internet. Hacking Team, an Italian firm mentioned in the RSF report, is just one
example: The Guardian reports that leaked internal documents suggest Hacking Teams clients include the
governments of Azerbaijan, Kazakhstan, Uzbekistan, Russia, Bahrain, Saudi Arabia, and the United Arab Emirates.
in a world where Big Brother and Big Data share so many of the
same needs, the political economy of cybersecurity must be singled out as a major
driver of resurgent authoritarianism in cyberspace. Given these powerful forces, it will be
Deibert writes that
difficult to reverse the authoritarian surge in cyberspace. Deibert offers some possible solutions: for starters, he
writes that the political economy of cybersecurity can be altered through stronger export controls, smart
sanctions, and a monitoring system to detect abuses. Further, he recommends that cybersecurity trade fairs open
their doors to civil society watchdogs who can help hold governments and the private sector accountable. Similarly,
Deibert suggests that opening regional cybersecurity initiatives to civil society participation could mitigate
violations of user rights. This might seem unlikely to occur within some authoritarian-led intergovernmental
organizations, but setting a normative expectation of civil society participation might help discredit the efforts of
This hardly exhausts the lists of threats to our security and well-being in the coming years and decades. In the
former Yugoslavia nationalist aggression tears at the stability of Europe and could easily spread. The flow of illegal
drugs intensifies through increasingly powerful international crime syndicates that have made common cause with
Nuclear,
chemical, and biological weapons continue to proliferate. The very source of life on
Earth, the global ecosystem, appears increasingly endangered . Most of these new and
unconventional threats to security are associated with or aggravated by the weakness or
absence of democracy, with its provisions for legality, accountability, popular sovereignty, and openness.
LESSONS OF THE TWENTIETH CENTURY The experience of this century offers important lessons. Countries that
govern themselves in a truly democratic fashion do not go to war with one another.
They do not aggress against their neighbors to aggrandize themselves or glorify their leaders.
Democratic governments do not ethnically "cleanse" their own populations, and
they are much less likely to face ethnic insurgency. Democracies do not sponsor
authoritarian regimes and have utterly corrupted the institutions of tenuous, democratic ones.
terrorism against one another. They do not build weapons of mass destruction to use
on or to threaten one another. Democratic countries form more reliable, open, and enduring trading
partnerships. In the long run they offer better and more stable climates for investment. They are more
environmentally responsible because they must answer to their own citizens, who organize to protest the
destruction of their environments. They are better bets to honor international treaties since they value legal
obligations and because their openness makes it much more difficult to breach agreements in secret. Precisely
1AC Plan
Plan: The United States federal government should limit the
scope of its domestic surveillance under Section 702 of the
Foreign Intelligence Surveillance Act to communications whose
sender or recipient is a valid intelligence target and whose
targets pose a tangible threat to national security.
1AC Solvency
The plan solves, limiting the purposes of 702 collection to a
tangible threat to national security is critical to solve
overcollection.
Sinha, 2014
G. Alex Sinha is an Aryeh Neier fellow with the US Program at Human Rights Watch
and the Human Rights Program at the American Civil Liberties Union, July 2014
With Liberty to Monitor All How Large-Scale US Surveillance is Harming Journalism,
Law, and American Democracy Human Rights Watch,
http://www.hrw.org/node/127364
Narrow the purposes for which all foreign intelligence surveillance may be
conducted and limit such surveillance to individuals, groups, or entities who pose a
tangible threat to national security or a comparable state interest. o Among other steps, Congress
should pass legislation amending Section 702 of FISA and related surveillance authorities to
narrow the scope of what can be acquired as foreign intelligence information,
which is now defined broadly to encompass, among other things, information related to
the conduct of the foreign affairs of the United States. It should be restricted to what is
necessary and proportionate to protect legitimate aims identified in the ICCPR, such as national security. In
practice,
this should mean that the government may acquire information only from
individuals, groups, or entities who pose a tangible threat to national security
narrowly defined, or a comparable compelling state interest.
Collection of communications about targets that are neither to nor from targets
should be prohibited. The Government takes the position that Section 702 permits it to collect not only
C.
communications that are to or from a foreign intelligence target, but also communications that are about the
target because they mention an identifier associated with the target.17 The practice directs the focus of
surveillance away from suspected wrongdoers and permits the NSA to target communications between individuals
government to target the communications of persons reasonably believed to be abroad, but it never defines the
term target. However, throughout Section 702, the term is used to refer to the targeting of an individual rather
content of a communication.18 Further, the entire congressional debate on Section 702 includes no reference to
collecting communications about a foreign target, and significant debate about collecting communications to or
As a result, the NSA has the capability to search any Internet communication going into or out of the U.S.22 without
results in the collection of multi-communication transactions, (MCTs) which include tens of thousands wholly
domestic communications each year.23 The FISC required creation of new minimization rules for MCTs in 2011, but
did not limit their collection.24 The mass searching of communications content inside the United States, knowing
that it the communications searched include tens of thousands of wholly domestic communications each year,
International Studies. He was the first-ever director of privacy and civil liberties for
the White House National Security Staff. Under George W. Bush, he was the first
deputy for civil liberties for the director of national intelligence, from 2006 to 2009.
He was the national security counsel for the American Civil Liberties Union from
2001 to 2006. He is a graduate of Harvard Law School and Dartmouth College, 4-132015, "The Good News About Spying," Foreign Affairs,
https://www.foreignaffairs.com/articles/united-states/2015-04-13/good-news-aboutspying
The United States should also pivot from its defensive position and take the lead on
global privacy. The United States has an impressive array of privacy safeguards, and it has even imposed new
ones that protect citizens of every country. Despite their weaknesses, these safeguards are still
the strongest in the world. The U.S. government should not be shy about trumpeting
them, and should urge other countries to follow its lead. It could begin by engaging
with close allies, like the United Kingdom, Germany, and other European countries,
urging them to increase transparency and judicial supervision of their own
communications surveillance activities.
to seek intrusive new powers despite evidence such programs would not have prevented attacks. Prime Minister
David Cameron of Britain recently mused, Do we want to allow a means of communication between people which
we cannot read? He soon found his answer, proclaiming that for too long, we have been a passively tolerant
from reaction and fear in favor of resilience and reason. With each court victory, with every
change in the law, we demonstrate facts are more convincing than fear. As a
society, we rediscover that the value of a right is not in what it hides, but in what it
protects.
Sample 1NC
T-Domestic
Interpretation Domestic surveillance deals with
communication inside the US
HRC 14 (Human Rights Council 2014, IMUNC2014,
https://imunc.files.wordpress.com/2014/05/hrc-study-guide.pdf)
Domestic surveillance: Involves the monitoring, interception, collection,
analysis, use, preservation, retention of, interference with, or access to
information that includes, reflects, or arises from or a persons
communications in the past, present or future with or without their
consent or choice, existing or occurring inside a particular country.
what most Americans understand but what the media, civil libertarians and many members of Congress refuse to
within the U.S. the one the media has suddenly decided it loves after bad-mouthing it for years as a rubber-
Voters:
1. Limits- The affs interpretation allows them to have a
surveillance policy that affects any country, which
overstretches the negs research burden by a factor 196,
because all surveillance becomes topical, no matter what the
target country is.
Security K
Framing the economy in terms of security discourse leads
states to implement unreliable policies, destroying the
economic strength they attempt to preserve
Lipschutz 98 (Ronnie Lipschutz, PhD in Politics and Director at UC Santa
Cruz, 1998, On Security p. 11-12,
http://people.ucsc.edu/~rlipsch/index.html/A.Lipschutz%20VITA.11.pdf)
The ways in which the framing of threats is influenced by a changing global economy is seen nowhere more clearly
than in recent debates over competitiveness and "economic security." What does it mean to be competitive? Is a
national industrial policy consistent with global economic liberalization? How is the security component of this issue
Crawford (Chapter 6: "Hawks, Doves, but no Owls: The New Security Dilemma
Under International Economic Interdependence") shows how strategic economic
interdependence--a consequence of the growing liberalization of the global economic system, the
socially constructed? Beverly
increasing availability of advanced technologies through commercial markets, and the ever-increasing velocity of
the product cycle--undermines
What,
then, is the solution to this "new security dilemma," as Crawford has stylized it?
According to Crawford, state decisionmakers can respond in three ways. First,
they can try to restore state autonomy through self-reliance although, in
doing so, they are likely to undermine state strength via reduced
competitiveness. Second, they can try to restrict technology transfer to
potential enemies, or the trading partners of potential enemies , although this
begins to include pretty much everybody. It also threatens to limit the market shares of
those corporations that produce the most innovative technologies. Finally,
they can enter into co-production projects or encourage strategic alliances
among firms. The former approach may slow down technological
development; the latter places control in the hands of actors who are
driven by market, and not military, forces. They are, therefore, potentially
unreliable. All else being equal, in all three cases, the state appears to be
a net loser where its security is concerned. But this does not prevent the state from trying
to gain.
first volume of The History of Sexuality addresses himself to the problem of a power that is less repressive than
productive, less life-threatening than, in his words, "life-administering:' Power, he contends, "exerts a positive
influence on life . . . [and] endeavors to administer, optimize, and multiply it, subjecting it to precise controls
and comprehensive regulations:' In his brief comments on what he calls "the atomic situation;' however,
Foucault insists as well that the productiveness of modern power must not be mistaken for a uniform repudiation
Such
massive inequality and the suffering and political corruption it produces
point to the need for critical analysis in which the separation of power and
politics can be understood. This means developing terms that clarify how
power becomes global even as politics continues to function largely at the
national level, with the effect of reducing the state primarily to custodial, policing, and punishing functions
at least for those populations considered disposable. The state exercises its slavish role in the form of lowering
taxes for the rich, deregulating corporations, funding wars for the benefit of the defense industries, and devising
other welfare services for the ultra-rich. There is no escaping the global politics of finance capital and the global
culture of commodification, entertainment, distraction, and exclusion. In opposing the emergence of the United
States as both a warfare and a punishing state,
Social responsibility
gives way to organized infantilization and a flight from responsibility.
Crucial here is the need to develop new cultural and political vocabularies
that can foster an engaged mode of citizenship capable of naming the
corporate and academic interests that support the warfare state and its
apparatuses of violence, while simultaneously mobilizing social
movements to challenge and dismantle its vast networks of power. One
central pedagogical and political task in dismantling the warfare state is,
therefore, the challenge of creating the cultural conditions and public
spheres that would enable the U.S. public to move from being spectators
of war and everyday violence to being informed and engaged citizens.
Unfortunately, major cultural apparatuses like public and higher education,
which have been historically responsible for educating the public, are becoming little more than
market-driven and militarized knowledge factories. In this particularly insidious role,
educational institutions deprive students of the capacities that would
enable them not only to assume public responsibilities, but also to actively
participate in the process of governing. Without the public spheres for
itself is now privatized, instrumentalized, commodified, and increasingly militarized.
structuring forces of
violence and militarization, which produce a surplus of fear, insecurity, and
a weakened culture of civic engagementone in which there is little room
for reasoned debate, critical dialogue, and informed intellectual exchange .
Patricia Clough and Craig Willse are right in arguing that we live in a society in which the
production and circulation of death functions as political and economic
recovery.57 The United States understood as a warfare state prompts a new
urgency for a collective politics and a social movement capable of
negating the current regimes of political and economic power, while
imagining a different and more democratic social order. Until the
ideological and structural foundations of violence that are pushing U.S. society over the
abyss are addressed, the current warfare state will be transformed into a
full-blown authoritarian state that will shut down any vestige of
democratic values, social relations, and public spheres. At the very least,
the U.S. public owes it to its children and future generations, if not the
future of democracy itself, to make visible and dismantle this machinery of
violence while also reclaiming the spirit of a future that works for life rather than deaththe future of the
good. This regime of punishment and privatization is organized around the
current authoritarianism, however dressed up they appear in the spectacles of consumerism and celebrity culture.
It is time for educators, unions, young people, liberals, religious organizations, and other groups to
connect the dots, educate themselves, and develop powerful social
movements that can restructure the fundamental values and social
relations of democracy while establishing the institutions and formative
cultures that make it possible. Stanley Aronowitz is right in arguing that:
the system survives on the eclipse of the radical imagination , the absence of a
viable political opposition with roots in the general population, and the conformity of its
intellectuals who, to a large extent, are subjugated by their secure berths
in the academy [and though] we can take some solace in 2011, the year of the protesterit would be
premature to predict that decades of retreat, defeat and silence can be reversed overnight without a commitment
to what may be termed a long march through the institutions, the workplaces and the streets of the capitalist
metropoles.58 The current protests among young people, workers, the unemployed, students, and others are
young people for democratic transformations, any attempt at radical change will more than likely be cosmetic.
Any viable challenge to the new authoritarianism and its theater of cruelty
and violence must include developing a variety of cultural discourses and
sites where new modes of agency can be imagined and enacted,
particularly as they work to reconfigure a new collective subject, modes of
sociality, and alternative conceptualizations of the self and its
relationship to others.59 Clearly, if the United States is to make a claim
to democracy, it must develop a politics that views violence as a moral
monstrosity and war as virulent pathology. How such a claim to politics unfolds remains to
be seen. In the meantime, resistance proceeds, especially among the young people who now carry the banner of
struggle against an encroaching authoritarianism that is working hard to snuff out all vestiges of democratic life.
Counterplan
Plan: The United States federal government should limit the
scope of its domestic surveillance under Section 702 of the
Foreign Intelligence Surveillance Act to communications whose
sender or recipient is a valid intelligence target and whose
targets pose a threat to national security.
Tangible threat requires facts of danger
Supreme Court of Georgia 6 (Decatur County v. Bainbridge Post
Searchlight, SUPREME COURT OF GEORGIA, Fulton County D. Rep. 2191, July 6,
2006, Lexis)
In our litigious society, a governmental agency always faces some threat of suit. To construe the term potential
litigation to include an unrealized or idle threat of litigation would seriously undermine the purpose of the Act. Such
a construction is overly broad. HN4Go to this Headnote in the case. Construing OCGA 50-14-2 (1) narrowly, we
hold that a meeting may not be closed to discuss potential litigation under the attorney-client exception unless the
comparable writing that presents the party's claim and manifests a solemn intent to sue, [cit.]; (2) previous or preexisting litigation between the parties or proof of ongoing litigation concerning similar claims, [cit.]; or (3) proof that
a party has both retained counsel with respect to the claim at issue and has expressed an intent to sue, [cit.] This
list is not intended to be exhaustive but merely illustrative of circumstances that a trial court may consider, in the
exercise of its discretion, that take the threat of litigation out of the realm of remote and speculative and into the
realm of realistic and tangible.
information
gathered from these programs provided the U.S. government with critical
the cyber threat has evolved far beyond simply stealing the stealing of personal or proprietary information, for
example-to include more disruptive activity, such as distributed denial of service attacks that may temporarily
degrade websites; and more alarmingly, we now see an evolution toward truly destructive activity. Secretary
Panetta, for example, recently discussed what he described as probably the most destructive attack the private
sector has seen to date a computer virus used to infect computers in the Saudi Arabian State Oil Company
Aramco in mid-2012, which virtually destroyed 30,000 computers. *** Within this context, big data presents
opportunities and challenges for the government and the private sector. Improving our ability to gain insights from
large and complex collections of data holds the promise of accelerating progress across a range of fields from
health care to earth science to biomedical research. But perhaps nowhere are the challenges and opportunities of
big data as stark as in the national security field, where the stakes are so high both in terms of the threats we
seek to defeat, and of the liberties we simultaneously seek to preserve. This reality is readily apparent in the
evolving and dynamic cyber environment, and perhaps no more so than for an agency at the crossroads of the
being investigated by the FBI learns that his home phone is subject to a wiretap, common sense tells us that he will
not use that telephone any longer. The same is true for NSA .
platforms and submarine-launched ballistic missiles (SLBM). This provides terrorists with multiple locations for attaining access to
these weapons. Further, under NATO nuclear weapons sharing, the US has supplied nuclear weapons to Belgium, Germany, Italy, the
plans of terrorists may include items such as reconnaissance, social engineering, and crossing borders which remain unique
between states. The potential collapse of a state also presents a challenge. Following the collapse of the Soviet Union, Belarus,
Kazakhstan, and Ukraine were in possession of nuclear weapons. These have since been transferred to Russia, but there was, and
still is, considerable concern over the security and integrity of those weapons, especially in the face of a destabilized government
increased this high pressure tension, as the ability of a submarine to sneak up close to a states border before launch significantly
to reduce the time it takes to disseminate plans to nuclear forces may expand the use of computers in nuclear command and
control, or lead to the introduction of fail-deadly and autonomous systems. This chapter is by no means comprehensive, However it
sheds some light on the operations of nuclear command and control and the difficulties in defending those systems from cyber
terrorism. Many of the details of nuclear command and control are classified, so the information provided below may be outdated.
However it points towards a pattern, and there is no certainty these systems and procedures have been updated since entering
open source knowledge. Further, terrorists do not have to restrict themselves to unclassified data, and therefore may be able to
obtain up to date information. The United States The US employs a nuclear deterrence triad consisted of nuclear-capable long
range bombers, SLBMs, and land based intercontinental ballistic missiles (ICBMs), as well as an arsenal of nonstrategic (tactical)
nuclear weapons. US nuclear command and control covers a geographically dispersed force with the US President, as Commander in
Chief, being the highest authority in the decision to make a nuclear launch. There is a hierarchy of succession in the event the
President cannot perform this duty, such as if the President were killed in an attack. Additionally, once the order to launch is given, it
travels down a chain of command; the President does not press the button, so to speak, nor is the President physically present at
the launch location. These locations would be targets in a nuclear war, so it is imperative that the leader not be there. Additionally,
multiple independent launch locations make this impossible (except for cases in which multiple missiles are tied together in a Single
Integrated Operational Plan). So it is theoretically possible to subvert this control by falsifying the order at any number of locations
down that chain of command. The infrastructure that supports the President in his decision to launch nuclear weapons is the Nuclear
Command and Control System (NCCS). The NCCS must support situation monitoring, tactical warning and attack assessment of
missile launches, senior leader decision making, dissemination of Presidential force-direction orders, and management of
geographically dispersed forces (Critchlow 2006). Key US nuclear command centres include fixed locations, such as the National
Military Command Center (NMCC) and the Raven Rock Mountain Complex (Site R), and mobile platforms, such as the E-4B National
Airborne Operations Center (NAOC) and the Mobile Consolidated Command Center (MCCC). The US seeks to integrate its nuclear
forces into its vision of command, control, computers, communications, intelligence, surveillance, and reconnaissance (C4ISR)
hinting towards a greater reliance on computer technology in maintaining and upgrading its nuclear force, not only to combat
against Cold War style nuclear war, but also against perceived emerging threats from China, Iran and North Korea. In particular the
US recognises these states potential to use nuclear weapons detonated at high altitude to create an electromagnetic pulse (EMP).
The threat of EMP was known during the Cold War, and a considerable amount of attention has been paid to hardening nuclear
systems (Critchlow 2006). The Minimum Essential Emergency Communications Network (MEECN) links to the ICBMs, bombers, and
submarine forces. Information widely available on the internet shows the US is seeking to upgrade the MEECNs satellite
communications capability through Advanced Extremely High Frequency and the Transformational Communications Satellite
programs. Cyber terrorists may use this knowledge to research these new forms, or to expose weaknesses in the old system before
upgrades are completed. Early warning systems and communications are essential to assessing whether a nuclear launch has been
made and communicating the orders to launch a retaliatory strike. Falsifying the data provided by either of these systems would be
of prime interest to terrorists. Commands emanating from the NAOC for example, include Extremely High Frequency and Very Low
Frequency/Low Frequency links, and its activation during a traditional terrorist attack, as happened on 9/11, could provide additional
clues as to its vulnerabilities. Blogging communities have also revealed that the 9/11 terrorist attacks revealed insights into the US
continuity of operations plan as high level officials were noted heading to specific installations (Critchlow 2006). One tool designed
by the US for initiating a nuclear launch is the nuclear football. It is a specially outfitted briefcase which can be used by the
President to authorize a nuclear strike when away from fixed command centres. The President is accompanied by an aide carrying
the nuclear football at all times. This aide, who is armed and possibly physically attached to the football, is part of a rotating crew of
Presidential aides (one from each of the five service branches). The football contains a secure satellite communication link and any
other material the President may need to refer to in the event of its use, sometimes referred to as the playbook. The attack options
provided in the football include single ICBM launches and large scale pre-determined scenarios as part of the Single Integrated
Operational Plan. Before initiating a launch the President must be positively identified using a special code on a plastic card,
sometimes referred to as the gold codes or the biscuit. The order must also be approved by a second member of the government
as per the two-man rule (Pike 2006). In terms of detecting and analysing a potential attack, that is, distinguishing a missile attack
from the launch of a satellite or a computer glitch, the US employs dual phenomenology. This means two different systems must be
used to confirm an attack, such as radar and satellite. Terrorists trying to engage a launch by falsifying this data would need to
determine which two systems were being used in coordination at the target location and spoof both systems. Attempting to falsify
commands from the President would also be difficult. Even if the chain of command is identified, there are multiple checks and
balances. For example, doctrine recommends that the President confer with senior commanders. The Chairman of the Joint Chiefs of
Staff is the primary military advisor to the President. However, the President may choose to consult other advisors as well. Trying to
identify who would be consulted in this system is difficult, and falsification may be exposed at any number of steps. The 2006
Quadrennial Defense Review emphasizes that new systems of command and control must be survivable in the event of cyber
warfare attacks. On the one hand, this shows that the US is aware of the potential danger posed by computer network operations
and are taking action to prevent it. On the other hand, this shows that they themselves see computer network operations as a
weakness in their system. And the US continues to research new ways to integrate computer systems into their nuclear command
and control, such as IP-based communications, which they admit, has not yet been proven to provide the high degree of assurance
this sort are rendered daily, as a result of events as diverse as missiles being tested, or fired for example, Russias firing of Scud
missiles into Chechnya peaceful satellites being lofted into space, or wildfires and solar reflections off oceans and clouds. If an
incoming missile strike is anticipated, the president and his top nuclear advisors would quickly convene an emergency telephone
conference to hear urgent briefings. For example, the war room commander in Omaha would brief the president on his retaliatory
options and their consequences, a briefing that is limited to 30 seconds. All of the large-scale responses comprising that briefing are
designed for destroying Russian targets by the thousands, and the president would have only a few minutes to pick one if he wished
to ensure its effective implementation. The order would then be sent immediately to the underground and undersea launch crews,
Case
Privacy Rights
Surveillance outweighs and privacy violations are
overstretched post-Snowden solves security threats
Gallington 13 -- (Daniel J. Gallington, senior policy and program adviser at the
George C. Marshall Institute in Arlington VA, served in senior national policy
positions in the Office of the Secretary of Defense, the Department of ?Justice, and
as bipartisan general counsel for the U.S. Senate Select Committee on Intelligence,
The Case for Internet Surveillance, US News,
http://www.usnews.com/opinion/blogs/world-report/2013/09/18/internetsurveillance-is-a-necessary-part-of-national-security, Accessed 07-02-15)
the recent public debate
brought on by Edward Snowden's disclosures is far more mundane, and far less
sensational than the media would perhaps like it to be . Also In that case, the real issue set
If the answer to these questions continues to be yes and it most likely is then
boils down to the following set of key questions, best answered by our Congress specifically the Intelligence
committees working with some other key committees after a searching inquiry and a series of hearings, as many
of them open as possible. Were the established and relevant laws, regulations and procedures complied with? Are
the established laws, regulations and procedures up to date for current Internet and other technologies? Is there
reason to add new laws, regulations and procedures? Is there a continued requirement based on public safety to
be able to do intrusive surveillance, including Internet surveillance, against spies, terrorists or criminals? In sum,
the idea that we have somehow "betrayed" or "subverted" the Internet (or the
telephone for that matter) is as my mom also used to say "just plain silly." Such kinds of
inaccurate statements are emotional and intended mostly for an audience with
preconceived opinions or that hasn't thought very hard about the dangerous
consequences of an Internet totally immune from surveillance . In fact, it
seems time for far less sensationalism primarily by the media and far more
objectivity. In the final analysis, my mom probably had it right: "Those kind of people, sure".
of national security and foreign policy. The press can certainly be depended on to
pursue the story, not least because of a certain guild anger over the detention
recently of Guardian journalist Glenn Greenwalds partner, David Miranda, by British
police at Londons Heathrow Airport, and the British governments decision to force
the Guardian to destroy the disks it had containing Snowdens data in the papers
London office with two officials from CGHQ, the British equivalent of the NSA,
looking on. But while the surveillance scandal has both engaged and enraged the
elites, when all is said and done, the general public does not seem nearly as
concerned. Why? In an age dominated by various kinds of techno-utopianism the
conviction that networking technologies are politically and socially emancipatory
and that massive data collection will unleash both efficiency in business and
innovation in science the idea that Big Data might be your enemy is antithetical
to everything we have been encouraged to believe. A soon-to-be-attained critical
mass of algorithms and data has been portrayed as allowing individuals to
customize the choices they make throughout their lives. Now, the data sets and
algorithms that were supposed to set us free seem instead to have been turned
against us.
Morozov takes the ideas of what he calls cyber-utopians and shows how reality
perverts them in one political situation after another. In Iran, the regime used the
internet to crush the internet-driven protests in June 2009. In Russia, neofascists use
the internet to organize pogroms. And on and on. Morozov has written hundreds of
pages to make the point that technology is amoral and cuts many different ways.
Just as radio can bolster democracy or as in Rwanda incite genocide, so the
internet can help foment a revolution but can also help crush it. This seems obvious,
yet it has often been entirely lost as grand claims are made for the internets
positive, liberating qualities. And suddenly here are Tunisia and, even more
dramatically, Egypt, simultaneously proving and refuting Morozovs argument. In
both cases, social networking allowed truths that had been whispered to be widely
broadcast and commented upon. In Tunisia and Egypt and now across the Arab
world Facebook and Twitter have made people feel less alone in their rage at the
governments that stifle their lives. There is nothing more politically emboldening
than to feel, all at once, that what you have experienced as personal bitterness is
actually an objective condition, a universal affliction in your society that therefore
can be universally opposed. Yet at the same time, the Egyptian government shut
off the internet, which is an effective way of using the internet. And according to
one Egyptian blogger, misinformation is being spread through Facebook as it was
in Iran just as real information was shared by anti-government protesters. This is
the dark side of internet freedom that Morozov is warning against. It is the
freedom to wantonly crush the forces of freedom. All this should not surprise
anyone. It seems that, just as with every other type of technology of
communication, the internet is not a solution to human conflict but an amplifier for
all aspects of a conflict. As you read about pro-government agitators charging into
crowds of protesters on horseback and camel, you realize that nothing has changed
in our new internet age. The human situation is the same as it always was, except
that it is the same in a newer and more intense way. Decades from now, we will no
doubt be celebrating a spanking new technology that promises to liberate us from
the internet. And the argument joined by Morozov will occur once again.
Econ
Growth rates are unsustainable we are exceeding the earths
biophysical limits
Klitgaar and Krall 11 (Kent A. Klitgaard, , Lisi Krall, ,Ecological economics,
degrowth, and institutional change, 12/12/2011, Ecological Economics journal issue
no. 84 pages 247-248, www.elsevier.com/ locate/ecolecon)
The age of economic growth is coming to an end. The mature economies of the
industrial North have already entered the initial stages of the era of degrowth. This
is evidenced by data that show overall economic activity has increased at a
decreasing rate since the Golden Age of 1960s postwar capitalism turned into the
era of stagflation in the 1970s. Despite the supposed revival of growth in the
neoliberal age, percentage growth rates have continued their secular decline. In the
United States real GDP growth was lower in the1980s and 1990s than in the 1970s
and lower still in the first years of the 21st century (Tables 1). While percentage
growth rates may have declined over the last five decades the absolute size of the
economy, as measured by real gross domestic product (for all its flaws) has
increased, more than tripling from 1970 until 2011. This creates a dilemma within
our present institutional context. Absolute growth, which uses more resources,
especially fossil fuel resources, destroys more habitat, and emits more carbon and
other pollutants into the planet's sinks, has grown exponentially. At the same time,
relative, or percentage growth, upon which employment depends, has fluctuated
over the same decades and shows a downward trend. We are growing too fast to
remain within the limits of the biophysical system. At the same time the world
economy is growing too slowly to provide sufficient employment and there appears
to be a secular decline at work. Despite rapid and sustained rates of economic
growth in many newly emerging market economies (e.g. Brazil, India and China)
patterns of declining growth rates also exist for the world economy (Table 2). The
reduction in the long-term growth rates, especially for mature market economies, is
not something we must contend with in the distant future. They have been
occurring for decades. Neither are they simply the result of misguided policy, as
growth rates have fallen in times of both liberal and conservative policy regimes.
Rather, we believe the growth rate decline is embedded deeply within the
institutional structure of the economy, as well as within biophysical limits. Clearly a
better understanding of the complex dynamics of the interactions of the economic
and biophysical systems is needed to provide important insights for the degrowth
and steady-state agendas. While ecological economics has addressed ecological
limits, it has not explored as fully the limits to growth inherent in a market system.
The analysis of biophysical limits has been the strength of ecological economics.
Beginning with the work of Herman Daly, who placed the economy within the
context of a finite and non-growing biophysical system, through the first 1997 text
by Robert Costanza and colleagues, ecological economists have carefully delineated
limits such as the climate change, the human appropriation of the products of
photosynthesis, and biodiversity loss (Costanza et al., 1997). Subsequent analyses
by Rees and Wackernagel showed that the human ecological footprint now exceeds
the earth's biocapacity, and the Limits to Growth studies by Meadows et al.
concluded that human activity has overshot the carrying capacity and the scale of
human activity is unlikely to be maintained into the next century. The work of many
energy analysts (Campbell, 2005; Campbell and Laherrere, 1998; Deffeyes, 2001;
Hall and Klitgaard, 2011; Hallock et al., 2004; Heinberg, 2005; Simmons, 2006)
concludes that we are at or near the global peak of fossil hydrocarbons and future
economic activity will be impacted strongly by more expensive and less available
petroleum. The second set of limits is internal and is to be found in the dynamics of
the accumulation process, involving the complex structural interaction of
production, consumption, and distribution. The internal limits that gear the economy
toward both cyclical variation and secular stagnation have not been considered
systematically by ecological economists. When the economy reached these limits
historically the result has been a series of periodic recessions and depressions.
Renewed growth has been the answer, just as it is now. If the system reaches its
own internal limits at the same time the world reaches its external biophysical limits
we will have a profound challenge because we need a way to facilitate decent
standards of living when economic growth can no longer be the vehicle to maintain
incomes and assure social stability. In the last instance, a system in overshoot can
neither growits way out of its inherent tendency toward stagnation, nor can it grow
its way into sustainability. We believe it is unlikely that the present system of
capitalism, dominated by multinational corporations, globalization, speculative
finance, and dependence upon fossil fuels, can adjust to the era of degrowth and
remain intact as is. In order to devise an economy that meets human needs as it
approaches both sets of limits, ecological economics needs to understand more fully
the structural and institutional dimensions of the internal and external limits, as well
as the interaction between the two. This is our challenge, and it is a difficult one.
Ecological economics can better understand the necessary institutional
configuration of the non-growing economy only by an improved understanding of
the dynamics of growth and capital accumulation, because it is here that the
inherent tendencies to stagnate and the resolution to stagnation are found.
the only two recent periods that have seen a major reduction in global
CO2 emissions both occurred in periods of very sudden, rapid, socially disruptive, and painful
periods of forced economic degrowth-namely the breakdown of the Soviet bloc and the current
The stark reality is that
financial-economic crisis. Strikingly, in May 2009, the International Energy Agency reported that, for the first
time since 1945, global demand for electricity was expected to fall. Experience has town that a lot of time
regulatory reforms, rather than on more fundamental changes in social relations. This is true for governments,
multilateral institutions, and also large sectors of so-called 'civil society:' especially the major national and
international trade unions and their federations, and NOOs. And despite the patent inadequacy of this
approach, regulatory efforts will certainly continue to be pursued . Furthermore, they may well
contribute to shoring up legitimacy , at least in the short term, and in certain predominantly-northern
countries where the effects Of climate changes are less immediately visible and impact on pepplds lives less
directly. Nonetheless, it is becoming increasingly clear that solutions will not be found at this level.
the global economy grows, the faster the living systems of the planet collapse. In
addition, this growth increases inequality and undermines democracy, multiplying
the number of social problems that erode human communities. In a nutshell, we
have created a dysfunctional economic system that, when it works according to its
self-imposed mandate of growing the pace of production and consumption, destroys
the ecological systems upon which it depends. And when it does not grow, it
becomes socially unsustainable. In a game with these rules, there is no way to win!
The main reason for the divergence: Direct transmission from a U.S. slowdown to
other economies through exports is just not large enough to spread a U.S. demand
problem globally, Goldman Sachs economists Dominic Wilson and Stacy Carlson
wrote in a Sept. 22 report entitled If the U.S. sneezes... Limited Exposure Take the
so-called BRIC countries of Brazil, Russia, India and China. While exports account for
almost 20 percent of their gross domestic product, sales to the U.S. compose less
than 5 percent of GDP, according to their estimates. That means even if U.S. growth
slowed 2 percent, the drag on these four countries would be about 0.1 percentage
point, the economists reckon. Developed economies including the U.K., Germany
and Japan also have limited exposure, they said. Economies outside the U.S. have
room to grow that the U.S. doesnt, partly because of its outsized slump in house
prices, Wilson and Carlson said. The drop of almost 35 percent is more than twice as
large as the worst declines in the rest of the Group of 10 industrial nations, they
found. The risk to the decoupling wager is a repeat of 2008, when the U.S. property
bubble burst and then morphed into a global credit and banking shock that
ricocheted around the world. For now, Goldman Sachss index of U.S. financial
conditions signals that bond and stock markets arent stressed by the U.S. outlook.
Weaker Dollar The break with the U.S. will be reflected in a weaker dollar, with the
Chinese yuan appreciating to 6.49 per dollar in a year from 6.685 on Oct. 1,
according to Goldman Sachs forecasts. The bank is also betting that yields on U.S.
10-year debt will be lower by June than equivalent yields for Germany, the U.K.,
Canada, Australia and Norway. U.S. notes will rise to 2.8 percent from 2.52 percent,
Germanys will increase to 3 percent from 2.3 percent and Canadas will grow to 3.8
percent from 2.76 percent on Oct. 1, Goldman Sachs projects. Goldman Sachs isnt
alone in making the case for decoupling. Harris at BofA Merrill Lynch said he didnt
buy the argument prior to the financial crisis. Now he believes global growth is
strong enough to offer a handkerchief to the U.S. as it suffers a growth recession
of weak expansion and rising unemployment, he said. Giving him confidence is his
calculation that the U.S. share of global GDP has shrunk to about 24 percent from
31 percent in 2000. He also notes that, unlike the U.S., many countries avoided
asset bubbles, kept their banking systems sound and improved their trade and
budget positions. Economic Locomotives A book published last week by the World
Bank backs him up. The Day After Tomorrow concludes that developing nations
arent only decoupling, they also are undergoing a switchover that will make them
such locomotives for the world economy, they can help rescue advanced nations.
Among the reasons for the revolution are greater trade between emerging markets,
the rise of the middle class and higher commodity prices, the book said. Investors
are signaling they agree. The U.S. has fallen behind Brazil, China and India as the
preferred place to invest, according to a quarterly survey conducted last month of
1,408 investors, analysts and traders who subscribe to Bloomberg. Emerging
markets also attracted more money from share offerings than industrialized nations
last quarter for the first time in at least a decade, Bloomberg data show. Room to
Ease Indonesia, India, China and Poland are the developing economies least
vulnerable to a U.S. slowdown, according to a Sept. 14 study based on trade ties by
HSBC Holdings Plc economists. China, Russia and Brazil also are among nations with
more room than industrial countries to ease policies if a U.S. slowdown does weigh
on their growth, according to a policy- flexibility index designed by the economists,
who include New York-based Pablo Goldberg. Emerging economies kept their
powder relatively dry, and are, for the most part, in a position where they could act
countercyclically if needed, the HSBC group said. Links to developing countries are
helping insulate some companies against U.S. weakness. Swiss watch manufacturer
Swatch Group AG and tire maker Nokian Renkaat of Finland are among the
European businesses that should benefit from trade with nations such as Russia and
China where consumer demand is growing, according to BlackRock Inc. portfolio
manager Alister Hibbert. Theres a lot of life in the global economy, Hibbert, said
at a Sept. 8 presentation to reporters in London.
No impactstatistics prove
Drezner 12 Daniel is a professor in the Fletcher School of Law and Diplomacy
at Tufts. (The Irony of Global Economic Governance: The System Worked, October
2012, http://www.globaleconomicgovernance.org/wp-content/uploads/IR-ColloquiumMT12-Week-5_The-Irony-of-Global-Economic-Governance.pdf)
The final outcome addresses a dog that hasnt barked: the effect of the Great
Recession on cross-border conflict and violence. During the initial stages of the
crisis, multiple analysts asserted that the financial crisis would lead states to
increase their use of force as a tool for staying in power.37 Whether through greater
internal repression, diversionary wars, arms races, or a ratcheting up of great power
conflict, there were genuine concerns that the global economic downturn would lead
to an increase in conflict. Violence in the Middle East, border disputes in the South
China Sea, and even the disruptions of the Occupy movement fuel impressions of
surge in global public disorder. The aggregate data suggests otherwise,
however. The Institute for Economics and Peace has constructed a Global Peace
Index annually since 2007. A key conclusion they draw from the 2012 report is that
The average level of peacefulness in 2012 is approximately the same as it was in
2007.38 Interstate violence in particular has declined since the start of the
financial crisis as have military expenditures in most sampled countries. Other
studies confirm that the Great Recession has not triggered any increase in
violent conflict; the secular decline in violence that started with the end of the
Cold War has not been reversed.39 Rogers Brubaker concludes, the crisis has not
to date generated the surge in protectionist nationalism or ethnic exclusion that
might have been expected.40 None of these data suggest that the global economy
is operating swimmingly. Growth remains unbalanced and fragile, and has clearly
slowed in 2012. Transnational capital flows remain depressed compared to pre-crisis
levels, primarily due to a drying up of cross-border interbank lending in Europe.
Currency volatility remains an ongoing concern. Compared to the aftermath of other
postwar recessions, growth in output, investment, and employment in the
developed world have all lagged behind. But the Great Recession is not like other
postwar recessions in either scope or kind; expecting a standard V-shaped
recovery was unreasonable. One financial analyst characterized the post-2008
global economy as in a state of contained depression.41 The key word is
contained, however. Given the severity, reach and depth of the 2008 financial
crisis, the proper comparison is with Great Depression. And by that standard, the
outcome variables look impressive. As Carmen Reinhart and Kenneth Rogoff
concluded in This Time is Different: that its macroeconomic outcome has been only
the most severe global recession since World War II and not even worse must be
regarded as fortunate.42
Internet Freedom
And US allies destroy i-freedom signal
Hanson 10/25/12, Nonresident Fellow, Foreign Policy, Brookings
http://www.brookings.edu/research/reports/2012/10/25-ediplomacy-hanson-internetfreedom
Another challenge is dealing with close partners and allies who undermine internet
freedom. In August 2011, in the midst of the Arab uprisings, the UK experienced a
different connection technology infused movement, the London Riots. On August 11,
in the heat of the crisis, Prime Minister Cameron told the House of Commons: Free
flow of information can be used for good. But it can also be used for ill. So we are
working with the police, the intelligence services and industry to look at whether it
would be right to stop people communicating via these websites and services when
we know they are plotting violence, disorder and criminality. This policy had farreaching implications. As recently as January 2011, then President of Egypt, Hosni
Mubarak, ordered the shut-down of Egypts largest ISPs and the cell phone network,
a move the United States had heavily criticized. Now the UK was contemplating the
same move and threatening to create a rationale for authoritarian governments
everywhere to shut down communications networks when they threatened
violence, disorder and criminality. Other allies like Australia are also pursuing
restrictive internet policies. As OpenNet reported it: Australia maintains some of
the most restrictive Internet policies of any Western country When these allies
pursue policies so clearly at odds with the U.S. internet freedom agenda, several
difficulties arise. It undermines the U.S. position that an open and free internet is
something free societies naturally want. It also gives repressive authoritarian
governments an excuse for their own monitoring and filtering activities. To an
extent, U.S. internet freedom policy responds even-handedly to this challenge
because the vast bulk of its grants are for open source circumvention tools that can
be just as readily used by someone in London as Beijing, but so far, the United
States has been much more discreet about criticising the restrictive policies of allies
than authoritarian states.
Solvency
And the exec can circumvent via national security letters
Sanchez 15 (Julien, a Senior Fellow at the Cato Institute, Dont (Just) Let the Sun
Go Down on Patriot Powers, May 29, 2015, http://motherboard.vice.com/read/dontjust-let-the-sun-go-down-on-patriot-powers)
Also permanent are National Security Letters or NSLs, which allow the FBI to obtain
a more limited range of telecommunications and financial records without even
needing to seek judicial approval. Unsurprisingly, the government loves these
streamlined tools, and used them so promiscuously that the FBI didnt even bother
using 215 for more than a year after the passage of the Patriot Act. Inspector
General reports have also made clear that the FBI is happy to substitute NSLs
for 215 orders when even the highly accommodating FISC manages a rare display
of backbone. In at least one case, when the secret court refused an application for
journalists records on First Amendment grounds, the Bureau turned around and
obtained the same data using National Security Letters.
Two months later, many of the same companies and organizations issued another
letter supporting surveillance transparency legislation proposed by Senator Al
Franken (D-MN) and Representative Zoe Lofgren (D-CA) that would have
implemented many of the original letters recommendations.334 Elements of both
bills, consistent with the coalitions recommendations, were included in the original
version of the USA FREEDOM Act introduced in the House and the Senateas were
new strong transparency provisions requiring the FISA court to declassify key legal
opinions to better educate the public and policymakers about how it is interpreting
and implementing the law. Such strong new transparency requirements are
consistent with several recommendations of the Presidents Review Group335 and
would help address concerns about lack of transparency raised by the UN High
Commissioner for Human Rights.336
Offcase
T-Domestic
Interpretation Domestic surveillance deals with
communication inside the US
HRC 14 (Human Rights Council 2014, IMUNC2014,
https://imunc.files.wordpress.com/2014/05/hrc-study-guide.pdf)
Domestic surveillance: Involves the monitoring, interception, collection,
analysis, use, preservation, retention of, interference with, or access to
information that includes, reflects, or arises from or a persons
communications in the past, present or future with or without their
consent or choice, existing or occurring inside a particular country.
what most Americans understand but what the media, civil libertarians and many members of Congress refuse to
within the U.S. the one the media has suddenly decided it loves after bad-mouthing it for years as a rubber-
Voters:
1. Limits- The affs interpretation allows them to have a
surveillance policy that affects any country, which
overstretches the negs research burden by a factor 196,
because all surveillance becomes topical, no matter what the
target country is.
PIC Tangible
1NC
Plan: The United States federal government should limit the
scope of its domestic surveillance under Section 702 of the
Foreign Intelligence Surveillance Act to communications whose
sender or recipient is a valid intelligence target and whose
targets pose a threat to national security.
Tangible threat requires facts of danger
Supreme Court of Georgia 6 (Decatur County v. Bainbridge Post
Searchlight, SUPREME COURT OF GEORGIA, Fulton County D. Rep. 2191, July 6,
2006, Lexis)
In our litigious society, a governmental agency always faces some threat of suit. To construe the term potential
litigation to include an unrealized or idle threat of litigation would seriously undermine the purpose of the Act. Such
a construction is overly broad. HN4Go to this Headnote in the case. Construing OCGA 50-14-2 (1) narrowly, we
hold that a meeting may not be closed to discuss potential litigation under the attorney-client exception unless the
comparable writing that presents the party's claim and manifests a solemn intent to sue, [cit.]; (2) previous or preexisting litigation between the parties or proof of ongoing litigation concerning similar claims, [cit.]; or (3) proof that
a party has both retained counsel with respect to the claim at issue and has expressed an intent to sue, [cit.] This
list is not intended to be exhaustive but merely illustrative of circumstances that a trial court may consider, in the
exercise of its discretion, that take the threat of litigation out of the realm of remote and speculative and into the
realm of realistic and tangible.
information
gathered from these programs provided the U.S. government with critical
2NC
Broad NSA access to US data is crucial to preventing terrorist
attacks in the US their authors vastly underestimate the
probability of attack. You need to evaluate link through a very
high probability of attempted attack
Lewis 14 (James, senior fellow and director of the Strategic Technologies Program
at the Center for Strategic and International Studies, Underestimating Risk in the
Surveillance Debate, http://csis.org/files/publication/141209_Lewis_UnderestimatingRisk_Web.pdf)
Americans are reluctant to accept terrorism is part of their daily lives, but attacks have been planned or attempted
against American targets (usually airliners or urban areas) almost every year since 9/11. Europe faces even greater
risk, given the thousands of European Union citizens who will return hardened and radicalized from fighting in Syria
and Iraq. The threat of attack is easy to exaggerate, but that does not mean it is nonexistent. Australias thenattorney general said in August 2013 that communications surveillance had stopped four mass casualty events
Some of the unhappiness created by the Edward Snowden leaks reflects the unspoken recognition that online
privacy has changed irrevocably. The precipitous decline in privacy since the Internet was commercialized is the
elephant in the room we ignore in the surveillance debate. Americas privacy laws are both limited in scope and out
of date. Although a majority of Americans believe privacy laws are inadequate, the surveillance debate has not led
to a useful discussion of privacy in the context of changed technologies and consumer preferences. Technology is
more intrusive as companies pursue revenue growth by harvesting user data. Tracking online behavior is a
preferred business model. On average, there are 16 hidden tracking programs on every website. The growing
market for big data to predict consumer behavior and target advertising will further change privacy. Judging by
their behavior, Internet users are willing to exchange private data for online services. A survey in a major European
country found a majority of Internet users disapproved of Google out of privacy concerns, but more than 80 percent
used Google as their search engine. The disconnect between consumer statements and behavior reduces the
chances of legislating better protections. We have global rules for finance and air travel, and it is time to create
rules for privacy, but governments alone cannot set these rules, nor can a single region impose them. Rules also
need to be reciprocal. NSA bears the brunt of criticism, but its actions are far from unique. All nations conduct some
kind of communications surveillance on their own populations, and many collect against foreign targets. Getting
this consensus will be difficult. There is no international consensus on privacy and data protection. EU efforts to
legislate for the entire world ignore broad cultural differences in attitudes toward privacy, and previous EU privacy
rules likely harmed European companies ability to innovate. Finding a balance between privacy, security, and
innovation will not be easy since unconstrained collection creates serious concerns while a toorestrictive approach
threatens real economic harm. Espionage and Counterterrorism NSA carried out two kinds of signals intelligence
programs: bulk surveillance to support counterterrorism and collection to support U.S. national security interests.
The debate over surveillance unhelpfully conflated the two programs. Domestic bulk collection for counterterrorism
is politically problematic, but assertions that a collection program is useless because it has not by itself prevented
an attack reflect unfamiliarity with intelligence. Intelligence does not work as it is portrayed in filmssolitary agents
do not make startling discoveries that lead to dramatic, last-minute success. Success is the product of the efforts of
teams of dedicated individuals from many agencies, using many tools and techniques, working together to
assemble fragments of data from many sources into a coherent picture. In practice, analysts must simultaneously
explore many possible scenarios. A collection program contributes by not only what it reveals, but also what it lets
us reject as false. The Patriot Act Section 215 domestic bulk telephony metadata program provided information that
allowed analysts to rule out some scenarios and suspects. The consensus view from interviews with current and
former intelligence officials is that while metadata collection is useful, it is the least useful of the collection
programs available to the intelligence community. If there was one surveillance program they had to give up, it
would be 215, but this would not come without an increase in risk. Restricting metadata collection will make it
national security problems: nonproliferation, counterintelligence (including Russian covert influence operations in
Europe), and arms sales to China. The United States failed to exercise sufficient oversight over intelligence
collection, but the objectives set for NSA reflect real security problems for the United States and its allies. The
notion that friends dont spy on friends is naive. The United States has friends that routinely spy on it and yet are
strong security partners. Relations among powerful states are complex and not explained by simple bromides drawn
from personal life. The most startling thing about U.S. espionage against Germany was the absence of a strategic
calculation of risk and benefit. There are grounds for espionage (what other major power has a former leader on
Russias payroll?), but the benefits were outweighed by the risk to the relationship. The case for spying on Brazil is
even weaker. While Brazil is often antagonistic, it poses no risk to national security. If economic intelligence on
Brazil is needed, the private sector has powerful incentives and legitimate means to obtain information and usually
cooperation with other countries, including the United States. Precise metrics on risk and effectiveness do not exist
for surveillance, and we are left with conflicting opinions from intelligence officials and civil libertarians as to what
the new
context for the surveillance debate is that the likelihood of attack is
increasing. Any legislative change should be viewed through this lens.
makes counterterrorism successful. Given resurgent authoritarianism and continuing jihad,
technical intelligence becomes. The fewer boots on the ground we have in Afghanistan, for example, the greater our
reliance will become on technical collection. The more we rely on drone strikes, rather than large troop movements,
in areas where we lack large human networks, the more we rely on technical intelligence. Particularly if one
imagines staying on offense against a metastasizing Al Qaeda in the context of a withdrawal from Afghanistan and
a narrowingor a formal endof the AUMF conflict, the burden on technical intelligence collection to keep us in the
game will be huge even ignoring the many other foreign intelligence and national security interests Section 702
surveillance supports.
Section 702 is a complicated statute, and it is only one part of a far more
permits the NSA to acquire
without an individualized warrant the communications of non-US persons
reasonably believed to be overseas when those communications are
transiting the United States or stored in the United States. Under these
complicated, larger statutory arrangement. But broadly speaking, it
Terror DA
Links
Increasing transparency alerts terrorists of NSA tactics
increases the risk of cyberterrorism
De 14 (Rajesh,General Counsel, National Security Agency, The NSA and
Accountability in an Era of Big Data, JOURNAL OF NATIONAL SECURITY LAW &
POLICY, May 8th 2014,p.4, http://jnslp.com/wp-content/uploads/2014/05/The-NSAand-Accountability-in-an-Era-of-Big-Data.pdf)
the cyber threat has evolved far beyond simply stealing the stealing of personal or proprietary information, for
example-to include more disruptive activity, such as distributed denial of service attacks that may temporarily
degrade websites; and more alarmingly, we now see an evolution toward truly destructive activity. Secretary
Panetta, for example, recently discussed what he described as probably the most destructive attack the private
sector has seen to date a computer virus used to infect computers in the Saudi Arabian State Oil Company
Aramco in mid-2012, which virtually destroyed 30,000 computers. *** Within this context, big data presents
opportunities and challenges for the government and the private sector. Improving our ability to gain insights from
large and complex collections of data holds the promise of accelerating progress across a range of fields from
health care to earth science to biomedical research. But perhaps nowhere are the challenges and opportunities of
big data as stark as in the national security field, where the stakes are so high both in terms of the threats we
seek to defeat, and of the liberties we simultaneously seek to preserve. This reality is readily apparent in the
evolving and dynamic cyber environment, and perhaps no more so than for an agency at the crossroads of the
being investigated by the FBI learns that his home phone is subject to a wiretap, common sense tells us that he will
not use that telephone any longer. The same is true for NSA .
1. End Programmatic Surveillanceor If Programmatic Surveillance Continues, Reform It One of the major
criticisms of the governments use of FISA to emerge in the recent debate is that the Court has shifted from
approving individual surveillance or search requests directed at a particular agent of a foreign power or foreign
power, to a practice of approving programmatic requests for collection authority. The criticism is a repudiation of
not only the bulk telephone metadata program, but also of section 702 of FISA, which was added to the Act in 2008.
Section 702 authorizes the Director of National Intelligence and the Attorney General to issue directives to
communications service providers under a set of procedures and certifications that have been approved by FISC.
Referring to the collection authorized by Section 702 as programmatic can lead to misunderstanding.
Acquisition under section 702 is programmatic in the sense that the Court
approves rules and procedures by which the acquisition takes place. The
Court does not, under section 702, make a substantive finding about a
particular target. It does not approve individual requests for collection.
Instead, the FISC approves the rules and procedures, and then intelligence
community personnel abide by a decision-making process in which there
are actual intended targets of acquisition. In his February 4, 2015 remarks at Brookings,
ODNI General Counsel Bob Litt described it this way: Contrary to some claims, this [section 702
collection] is not bulk collection; all of the collection is based on
identifiers, such as telephone numbers or email addresses, that we have reason to believe
are being used by non-U.S. persons abroad to communicate or receive foreign intelligence
information. Regardless of the characterization, however, it is correct to say that section 702 allows
the intelligence community, not the Court, to make the substantive
determination about what targets to collect against. Those decisions are
made consistent with intelligence community leadership and policymaker
strategic priorities, which Litt also discussed in his February 4th remarks. Targets are selected
based on their anticipated or demonstrated foreign intelligence value . And
targeting decisions are subject to continuous oversight by compliance, legal and civil liberties protection authorities
internal to NSA, and external at the Office of the Director of National Intelligence and the Department of Justice. The
question, then, is why was the change needed in 2008? And, if the Brennan Centers recommendation were
accepted, what would be the alternatives? What follows is a shorthand answer to the first question (which I
previously addressed here): basically, the change was needed because the pre-2008 definitions in FISA technically
required that the government obtain a probable-cause based order from the Court in order to collect the
communications of Terrorist A in Afghanistan with Terrorist B in Iraq. This was a problem for at least two reasons:
one, as non-U.S. persons outside the United States, Terrorist A and Terrorist B are not entitled to Constitutional
extremely condensed version of the justification for 702 and does not cover additional reasons that 702 was sought.
The FBI tracked Zazi as he traveled to New York to meet with co-conspirators, where they were planning to conduct
accuracy of the information released by Snowden, the types of programs described by the material contribute to
national security and its release, regardless of its validity, will negatively impact US security.
Given the challenging and complex national security picture the United States faces today, I would think that most
responsible leaders and policymakers would say, no thanks to that option. A second option would be to conduct
the acquisition, but without FISC supervision. This would be a perverse outcome of the surveillance debate. It is
also, probably, in the current environment, not possible as a practical matter, because an additional reason
702
Security K
1NC
Framing the economy in terms of security discourse leads
states to implement unreliable policies, destroying the
economic strength they attempt to preserve
Lipschutz 98 (Ronnie Lipschutz, PhD in Politics and Director at UC Santa
Cruz, 1998, On Security p. 11-12,
http://people.ucsc.edu/~rlipsch/index.html/A.Lipschutz%20VITA.11.pdf)
The ways in which the framing of threats is influenced by a changing global economy is seen nowhere more clearly
than in recent debates over competitiveness and "economic security." What does it mean to be competitive? Is a
national industrial policy consistent with global economic liberalization? How is the security component of this issue
Crawford (Chapter 6: "Hawks, Doves, but no Owls: The New Security Dilemma
Under International Economic Interdependence") shows how strategic economic
interdependence--a consequence of the growing liberalization of the global economic system, the
socially constructed? Beverly
increasing availability of advanced technologies through commercial markets, and the ever-increasing velocity of
the product cycle--undermines
What,
then, is the solution to this "new security dilemma," as Crawford has stylized it?
According to Crawford, state decisionmakers can respond in three ways. First,
they can try to restore state autonomy through self-reliance although, in
doing so, they are likely to undermine state strength via reduced
competitiveness. Second, they can try to restrict technology transfer to
potential enemies, or the trading partners of potential enemies , although this
begins to include pretty much everybody. It also threatens to limit the market shares of
those corporations that produce the most innovative technologies. Finally,
they can enter into co-production projects or encourage strategic alliances
among firms. The former approach may slow down technological
development; the latter places control in the hands of actors who are
driven by market, and not military, forces. They are, therefore, potentially
unreliable. All else being equal, in all three cases, the state appears to be
a net loser where its security is concerned. But this does not prevent the state from trying
to gain.
first volume of The History of Sexuality addresses himself to the problem of a power that is less repressive than
productive, less life-threatening than, in his words, "life-administering:' Power, he contends, "exerts a positive
influence on life . . . [and] endeavors to administer, optimize, and multiply it, subjecting it to precise controls
and comprehensive regulations:' In his brief comments on what he calls "the atomic situation;' however,
Foucault insists as well that the productiveness of modern power must not be mistaken for a uniform repudiation
Such
massive inequality and the suffering and political corruption it produces
point to the need for critical analysis in which the separation of power and
politics can be understood. This means developing terms that clarify how
power becomes global even as politics continues to function largely at the
national level, with the effect of reducing the state primarily to custodial, policing, and punishing functions
at least for those populations considered disposable. The state exercises its slavish role in the form of lowering
taxes for the rich, deregulating corporations, funding wars for the benefit of the defense industries, and devising
other welfare services for the ultra-rich. There is no escaping the global politics of finance capital and the global
culture of commodification, entertainment, distraction, and exclusion. In opposing the emergence of the United
States as both a warfare and a punishing state,
Social responsibility
gives way to organized infantilization and a flight from responsibility.
Crucial here is the need to develop new cultural and political vocabularies
that can foster an engaged mode of citizenship capable of naming the
corporate and academic interests that support the warfare state and its
apparatuses of violence, while simultaneously mobilizing social
movements to challenge and dismantle its vast networks of power. One
central pedagogical and political task in dismantling the warfare state is,
therefore, the challenge of creating the cultural conditions and public
spheres that would enable the U.S. public to move from being spectators
of war and everyday violence to being informed and engaged citizens.
Unfortunately, major cultural apparatuses like public and higher education,
which have been historically responsible for educating the public, are becoming little more than
market-driven and militarized knowledge factories. In this particularly insidious role,
educational institutions deprive students of the capacities that would
enable them not only to assume public responsibilities, but also to actively
participate in the process of governing. Without the public spheres for
itself is now privatized, instrumentalized, commodified, and increasingly militarized.
structuring forces of
violence and militarization, which produce a surplus of fear, insecurity, and
a weakened culture of civic engagementone in which there is little room
for reasoned debate, critical dialogue, and informed intellectual exchange .
Patricia Clough and Craig Willse are right in arguing that we live in a society in which the
production and circulation of death functions as political and economic
recovery.57 The United States understood as a warfare state prompts a new
urgency for a collective politics and a social movement capable of
negating the current regimes of political and economic power, while
imagining a different and more democratic social order. Until the
ideological and structural foundations of violence that are pushing U.S. society over the
abyss are addressed, the current warfare state will be transformed into a
full-blown authoritarian state that will shut down any vestige of
democratic values, social relations, and public spheres. At the very least,
the U.S. public owes it to its children and future generations, if not the
future of democracy itself, to make visible and dismantle this machinery of
violence while also reclaiming the spirit of a future that works for life rather than deaththe future of the
good. This regime of punishment and privatization is organized around the
current authoritarianism, however dressed up they appear in the spectacles of consumerism and celebrity culture.
It is time for educators, unions, young people, liberals, religious organizations, and other groups to
connect the dots, educate themselves, and develop powerful social
movements that can restructure the fundamental values and social
relations of democracy while establishing the institutions and formative
cultures that make it possible. Stanley Aronowitz is right in arguing that:
the system survives on the eclipse of the radical imagination , the absence of a
viable political opposition with roots in the general population, and the conformity of its
intellectuals who, to a large extent, are subjugated by their secure berths
in the academy [and though] we can take some solace in 2011, the year of the protesterit would be
premature to predict that decades of retreat, defeat and silence can be reversed overnight without a commitment
to what may be termed a long march through the institutions, the workplaces and the streets of the capitalist
metropoles.58 The current protests among young people, workers, the unemployed, students, and others are
young people for democratic transformations, any attempt at radical change will more than likely be cosmetic.
Any viable challenge to the new authoritarianism and its theater of cruelty
and violence must include developing a variety of cultural discourses and
sites where new modes of agency can be imagined and enacted,
particularly as they work to reconfigure a new collective subject, modes of
sociality, and alternative conceptualizations of the self and its
relationship to others.59 Clearly, if the United States is to make a claim
to democracy, it must develop a politics that views violence as a moral
monstrosity and war as virulent pathology. How such a claim to politics unfolds remains to
be seen. In the meantime, resistance proceeds, especially among the young people who now carry the banner of
struggle against an encroaching authoritarianism that is working hard to snuff out all vestiges of democratic life.
2NC Framework
Interp: The aff must defend the political implications of the
plan as well as the epistemological and methodological
groundings of the 1AC. The securitized ideology of the 1ac
must be justified, before moving on to questions of policy.
Giroux says Debate is primarily an educational activity the
signal sent intellectually outweighs any specific policy
proposal- our method is comparatively better than any
roleplaying strategy- we must use pedagogical approaches to
deconstruct the securitized logic. Only through critical analysis
can we create a new political vocabulary that challenges the
militarism of the squo
1. Education
A) Real world as intellectuals we can move thought in the
direction of a new modernity that challenges securitization and
the assumptions behind the plan the same way that
intellectuals during the Enlightenment contributed to a
general shift in human thinking if our vision of the world
would result in less violence, you should vote for it.
B) Policy failure if their assumptions continually result in
data/error replication, there is no reason to use debate to train
us to be advocates in that system focusing on short-term
problem solving instead of broader theoretical issues
guarantees policy failure thats Cuomo- we have to deal with
the way war is woven into the fabric of life or else it will result
in crisis politics that results in constant securitization look at
what happened after 9/11 and WW2
Security politics assures the constant reproduction of the very
problems it seeks to eradicate
problematics are detailed and elaborated in terms of discrete forms of knowledge as well as interlocking policy
continuous resolutions of policymakers. Policy "actors" develop and compete on the basis of the expertise
that grows up around such problems or clusters of problems and their client populations. Here, too, we may also
discover what might be called "epistemic entrepreneurs." Albeit the market for discourse is prescribed and policed
in ways that Foucault indicated, bidding to formulate novel problematizations they seek to "sell" these, or otherwise
encounter with life, is problematizable. Any problematization is capable of becoming a policy problem.
Governmentality thereby creates a market for policy, for science and for policy
science, in which problematizations go looking for policy sponsors while policy sponsors fiercely compete on behalf
of their favored problematizations. Reproblematization of problems is constrained by the institutional and
ideological investments surrounding accepted "problems," and by the sheer difficulty of challenging the inescapable
ontological and epistemological assumptions that go into their very formation. There is nothing so fiercely
contested as an epistemological or ontological assumption. And there is nothing so fiercely ridiculed as the
suggestion that the real problem with problematizations exists precisely at the level of such assumptions. Such
"paralysis of analysis" is precisely what policymakers seek to avoid since they are
compelled constantly to respond to circumstances over which they ordinarily have in fact both more and less
exhaust what "politics," locally as well as globally, is about.[ 36] It is here that the "emergence" characteristic of
policy increasingly also become a matter of definition as well, since the concept population does not have a stable
referent either and has itself also evolved in biophilosophical and biomolecular as well as Foucauldian "biopower"
ways.
2NC - Links
Democratic global peace is an act of securitization that
ensures total war
Burke 7 (Anthony Burke, Senior Lecturer at School of Politics and International
Relations at University of New South Wales, Beyond Security, Ethics and Violence:
War against the Other pg 231232,https://books.google.com/books/about/Security_Strategy_and_Critical_Theory.ht
ml?id=RYgi4GOgy_0C)
the first act in America's 'forward strategy of freedom' was to invade
and attempt to subjugate Iraq, suggesting that, if 'peace' is its object, its
means is war: the engine of history is violence, on an enormous and tragic
scale, and violence is ultimately its only meaning. This we can glimpse in 'Toward a
Yet
Pacific Union', a deeply disingenuous chapter of Fukuyama's The End of History and the Last Man. This text divides
the earth between a 'post-historical' world of affluent developed democracies where 'the old rules of power-politics
have decreasing relevance', and a world still 'stuck in history' and 'riven with a variety of religious, national and
ideological conflicts'. The two worlds will maintain 'parallel but separate existences' and interact only along axes of
threat, disturbance and crucial strategic interest: oil, immigration, terrorism and the proliferation of weapons of
'design of nature' writing its bliss on the world.73 The bliss 'freedom'
offers us, however, is the bliss of the graveyard, stretching endlessly into
a world marked not by historical perfection or democratic peace, bu t by
the eternal recurrence of tragedy, as ends endlessly disappear in the
means of permanent war and permanent terror. This is how we must understand both the
prolonged trauma visited on the people of Iraq since 1990, and the inflammatory impact the US invasion will have
on the new phenomenon of global antiWestern terrorism. American exceptionalism has deluded US policymakers
into believing that they are the only actors who write history, who know where it is heading, and how it will play out,
and that in its service it is they (and no-one else) who assume an unlimited freedom to act. As a senior adviser to
Bush told a journalist in 2002: 'We're an empire now, and when we act, we create our own reality . . We're history's
actors."
or economic well-being, the significant conceptual consistency between economic security and liberal orderbuilding also had a strategic ideological role .
By playing on notions of economic wellbeing, economic security seemed to emphasize economic and thus
human needs over military ones. The reshaping of global capital , international
order and the exercise of state power could thus look decidedly liberal and
humanitarian. This appearance helped co-opt the liberal Left into the process
and, of course, played on individual desire for personal security by using
notions such as personal freedom and social equality . Marx and Engels once
highlighted the historical role of the bourgeoisie in shaping the world according to its own interests. The need of a
constantly expanding market for its products chases the bourgeoisie over the whole surface of the glove. It must
nestle everywhere, settle everywhere, establish connections everywhere It compels all nations, on pain of
extinction, to adopt the bourgeois mode of production; it compels them to become bourgeois in themselves. In
one word, it creates a world after its own image. In the second half of the twentieth century this ability to batter
down all Chinese walls would still rest heavily on the logic of capital, but would also come about it part under the
national security implies the interrelatedness of so many different social, economic, political and military factors
that more or less any development anywhere can be said to impact on liberal order in general and Americas core
For example, in security studies the argument is made that the concept of security prevalent within the discipline of
international relations does not capture contemporary security practices.21 While the notion of security signifies an
practices, yet it is unable to reflect the consequences of a practical application of economic models. Further,
the
transformation of global finance and the redefinition of national borders
that accompanied it have brought new masters of risk (Sinclair, 2005) who are
dispersed globally. Today, financial data are given meaning by an assemblage of
economic actors, models and practices and not by nation-states representatives. In addition,
rates or capital controls were subject to security considerations. Since the 1980s, however,
the war on terror has been redefining the social dimension of world
society in three ways. First, we witness the advent of new security actors and practices. Increasingly,
insurance companies and banks are seen as security actors that shape
practices (Aradau & Van Munster, 2007). Insurances and banks may hedge terrorism-related risks, dividing
those risks up and selling them to those willing to take the risks (Lobo-Guerrero, 2008). Second,
private military companies are increasingly seen as stand-alone actors .
Third, as Mick Dillon and Luis Lobo-Guerrero (2008) have pointed out, security is not something that takes
place at national borders, but affects our everyday lives (see also Lobo-Guerrero,
2008). New security practices change the ways in which human beings
are included and excluded. Ultimately, risk even impacts on how things,
events, facts are produced. Risk redefines the boundary between
knowledge and non-knowledge, defining the kind of knowledge that is
constitutive for producing something as a political, legal or financial entity. In this
context, it is noteworthy that some commentators speak of a commodification of the future, of life and of security
(Krahmann, 2006: 379404).
had already done something like that, with a fair amount of success, in Afghanistan; his father had
crisply slapped Panama into shape; Reagan had straightened out Grenada; and Bill Clinton had invaded
Haiti and bombed the hell out of Bosnia and Serbia with the same lofty goal at least partly in mind.
Further, the Australians had recently done it in East Timor and the British in Sierra Leone (Mueller
2004, ch. 7). Critics have argued that democracy can't be spread at the point of a gun, but these
cases, as well as the experience with the defeated enemies after World War II, suggests that it
sometimes can be, something that supporters of the administration were quick to point out (Kaplan
and Kristol 2003, 98-99. Frum and Perle 2003, 163). Even Russett, a prominent democratic-peace
analyst, eventually, if rather reluctantly, concedes the possibility (2005, 398-400; see also Peceny and
Pickering 2006). However, Bush and some of his supporters--particularly those
War Over Iraq, Lawrence Kaplan and William Kristol apply due reverence
to the sanctified correlation--"democracies rarely, if ever, wage war
against one another"--and then extrapolate fancifully to conclude that
"The more democratic the world becomes, the more likely it is to be
congenial to America" (2003, 104-5). And war architect Paul Wolfowitz also seems to have
believed that the war would become an essential stage on the march toward freedom and democracy
(Woodward 2004, 428). In a 2004 article proposing what he calls "democratic realism," Charles
Krauthammer urges taking "the risky but imperative course of trying to reorder the Arab world," with a
"targeted, focused" effort that would (however) be "limited" to "that Islamic crescent stretching from
North Africa to Afghanistan" (2004 23, 17). And in a speech in late 2006, he continued to champion
what he calls "the only plausible answer," an ambitious undertaking that involves "changing the
culture of that area, no matter how slow and how difficult the process. It starts in Iraq and Lebanon,
and must be allowed to proceed." Any other policy, he has divined, "would ultimately bring ruin not
only on the U.S. but on the very idea of freedom." And Kaplan and Kristol stress that "The mission
begins in Baghdad, but does not end there....War in Iraq represents but the first installment...Duly
armed, the United States can act to secure its safety and to advance the cause of liberty--in Baghdad
and beyond" (2003, 124-25). With that, laments Russett, democracy and democratic peace
may perhaps have its endearing side, how deeply that passion is (or was) really shared by his neoConservative allies could be questioned. That is, did they really believe that the United States which,
as Francis Fukuyama notes, "cannot eliminate poverty or raise test scores in Washington, DC," could
"bring democracy to a part of the world that has stubbornly resisted it and is virulently anti-American
to boot" (2004, 60)? Although they hype democracy, David Frum and Richard Perle carefully caution
that "in the Middle East, democratization does not mean calling immediate elections and then living
with whatever happens next," but rather "opening political spaces," "creating representative
institutions," "deregulating the economy," "shrinking and reforming the Middle Eastern pubic sector,"
and "perhaps above all" changing the educational system (2003, 162-63). Similarly, Krauthammer's
"democratic realism" approach doesn't seem, actually, to stress democracy all that much. (Its wildly
extravagant calls for massive warfare over a very substantial portion of the globe--only "limited" in
comparison to Bush's exuberant crusadery--suggests it is rather lacking in realism as well.) Most
interesting is a call issued by neo-Conservatism's champion guru, Norman Podhoretz, in the runup to
the war. He strongly advocated expanding Bush's "axis of evil" beyond Iraq, Iran, and North Korea "at a
minimum" to embrace "Syria and Lebanon and Libya, as well as 'friends' of America like the Saudi
royal family and Egypt's Hosni Mubarak, along with the Palestinian Authority." However , Podhoretz
proved to be less mystical (or simply less devious) than other neocons
about democracy by pointedly adding "the alternative to these regimes
could easily turn out to be worse, even (or especially) if it comes into
power through democratic elections." Accordingly, he emphasized, "it will be necessary
for the United States to impose a new political culture on the defeated parties."14 (Although Podhoretz
may be more realistic that others about democracy, his extravagant notion that the US would
somehow have the capacity to impose a new political culture throughout the non-Israeli Middle East is,
like Krauthammer's comparable vision, so fantastic as to border on the deranged.) Indeed, after
one looks beneath the boilerplate about democracy and the democratic
peace, what seems to be principally motivating at least some of these
people is a strong desire for the United States to use military methods to
make the Middle East finally and once and for all safe for Israel (Drew 2003,
22; Fukuyama 2004; Roy 2003). All of them are devoted supporters of Israel, and they seem to display
far less interest in advocating the application of military force to deal with unsavory dictatorial regimes
in other parts of the world that do not seem to threaten Israel--such as Burma, Zimbabwe, Sudan,
Haiti, or Cuba. As John Mearsheimer and Stephen Walt point out in their discussion of what they call
"The Israel Lobby" (2006), such policy advocacy is entirely appropriate and fully democratic: "There is
nothing improper about American Jews and their Christian allies attempting to sway US policy"
(although they also note that Jewish Americans generally actually were less likely to support the war
than was the rest of the population). Democracy, as noted earlier, is centrally characterized by the
contestings of isolated, self-serving, and often tiny special interest groups and their political and
bureaucratic allies. What happened with Iraq policy was democracy in full
flower. It does not follow, of course, that policies so generated are necessarily wise, and
Mearsheimer and Walt consider that the results of much of the Lobby's efforts--certainly in this case-have been detrimental to American (and even Israeli) national interest, although their contentions that
the Lobby was "critical" or "a key factor" in the decision to go to war or that that decision would "have
been far less likely" without the Lobby's efforts would need more careful analysis. It is also their view
that the Lobby has too much influence over U.S foreign policy--a conclusion, as it happens, that is
shared by 68 percent of over 1000 international relations scholars who responded to a 2006 survey.15
However that may be, it could certainly be maintained that, as an Israeli scholar puts it, the United
States by its action eliminated what Israel considered at the time to be a most "threatening neighbor"
(Baram 2007). Following this line of thinking, then, the Israel Lobby and its allies
East, the arguments they proffered for going to war stressed national security issues, not democracy
ones--the notion that Saddam's Iraq was a threat to the United States because of its development, or
potential development, of weapons of mass destruction and of its connections to terrorist groups out to
get the United States (Roy 2003). The democracy argument rose in significance, notes
billion dollars and several thousand American lives in order to bring democracy to...Iraq" would "have
been laughed out of court" (2005). Moreover, when given a list of foreign policy goals, the American
public has rather consistently ranked the promotion of democracy lower--often much lower--than such
goals as combating international terrorism, protecting American jobs, preventing the spread of nuclear
weapons, strengthening the United Nations, and protecting American businesses abroad (see Figure 1).
2NC Alternative
A complete rejection of dominant security allows us to recraft
security to include a structuralist and pluralist paradigm-The
affsvision views of security fail in the context of Latin America
129.105.215.146 on Tue, 23 Jul 2013 20:53:29 PM All use subject to JSTOR Terms and ConditionsLLOYD PETTIFORD
of International Relations from the Pluralist and Structuralist paradigms suggest that traditional
concepts of security have kept important issues off the political agenda.
Of course, attempts to re-conceptualise security will not be free of political implications either. With the ending
of the Cold War and the recognition of, for example, environmental problems, even for Western developed states,
Thus
some attempts to expand the concept of security seem to fit the new
interests of the world's powerful in the extent to which they include environmen- tal matters
other concerns have
and the definition of sustainable development used. In redefining security to include the environment in ways
which do not suggest the need for significant restructuring of the global political economy, the concerns of the
world's most powerful states are kept at the forefront of International Relations. In this sense the definition of
security may be changing but it will still be a concept which, while it can be applied to the Third World, will be
for a full understanding of it. One can go beyond the traditional definition
of security or the limited expansion envisaged by those arguing for environmental security. Security
can be re-conceptualised as, or including, ecological sustainability and the need for fundamental
inadequate
structural changes in the political system. There seems to be an important danger in this; too many new concerns
may be squeezed into security, causing the concept to become so broad that the division between security and
International Relations in general become very blurred. It is thus difficult to avoid the conclusion that the debate
redefine security may not be the answer. To improve our understanding of InternThe traditional concept of security
does not show itself amenable to stretching. Stretching causes the concept to lose meaning without offering any
compensat- ing advantage. Thus, rather than redefine security, as traditionally understood, it might be enough
to recognise its limitations in terms of when and where it should be applied, and to investigate its linkages to
other areas of International Relations. Traditional security could then continue to exist alongside more serious
considerations of problems of more interest to Third World states, such as environmental problems and survival
within the world economy, using non-Realist tools of analysis. The current period of change and uncertainty
about the future suggests that International Relations would be well served by a period of coexistent ational
Relations it may be more important to recognise that the current historical juncture allows us to broaden the focus
revolutionary parties is also a positive development. The history of the European left during the twentieth century provides myriad
examples of the ways in which the fetishization of party organizations has led to bureaucratic immobility and the confusion of means
with ends (see, for example, Salvadori 1990). The failure of the Bolshevik experiment illustrates how disciplined, vanguard parties
are an ideal vehicle for totalitarian domination (Serge 1984). Faith in the infallible party has obviously been the source of strength
and comfort to many in this period and, as the experience of the southern Wales coalfield demonstrates, has inspired brave and
progressive behavior (see, for example, the account of support for the Spanish Republic in Francis 1984). But such parties have so
often been the enemies of emancipation that they should be treated with the utmost caution. Parties are necessary, but their
to the German security debate of the 1970s (Risse-Kappen 1994: 186ff.); it was subsequently popularized by the Palme Commission
liberal arms control community in the United States, Western European peace researchers, security specialists in the center-left
political parties of Western Europe, and Soviet institutchiks members of the influential policy institutes in the Soviet Union such
as the United States of America and Canada Institute (Landau 1996: 52-54; Risse-Kappen 1994: 196-200; Kaldor 1995; Spencer
such as churches and trade unions quickly supported the ideas promoted by peace researchers and the SPD (Risse-Kappen 1994:
207). Similar pressures even had an effect on the Reagan administration . As
Risse-Kappen notes: When the Reagan administration brought hard-liners into power, the US arms control community was removed
together with pressure from the European allies. (Risse-Kappen 1994: 205; also Cortright 1993: 90-110). Although it would be
difficult to sustain a claim that the combination of critical movements and intellectuals persuaded the Reagan government to adopt
various East-West links, which included arms control institutions, Pugwash conferences, interparty contacts, and even direct
Evangelista 1995; Kaldor 1995; Checkel 1993; Risse-Kappen 1994; Landau 1996 and Spencer 1995 concentrate on the role of the
Pugwash conferences). This group, including Palme Commission member Georgii Arbatov, Pugwash attendee Andrei
Kokoshin , and Sergei Karaganov, a senior adviser who was in regular contact with the Western peace researchers Anders Boserup
contrast to the situation in the early 1980s, common security is part of the common sense of security discourse. As MccGwire points
out, the North Atlantic Treaty Organization (NATO) (a common defense pact) is using the rhetoric of common security in order to
Moreover, the adoption of the concept of common security by official circles provides critics with a useful tool for (immanently)
critiquing aspects of security policy (as MccGwire 1997 demonsrates in relation to NATO expansion). The example of common
SECURITY STUDIES AND THE THEORY-PRACTICE NEXUS Although most proponents of critical security studies reject aspects of
Gramscis theory of organic intellectuals, in particular his exclusive concentration on class and his emphasis on the guiding role of
the party, the desire for engagement and relevance must remain at the heart of their project. The example of the peace movement
suggests that critical theorists can still play the role of organic intellectuals and that this organic relationship need not confine itself
to a single class; it can involve alignment with different coalitions of social movements that campaign on an issue or a series of
critical or new social movements, such as peace activism, the struggle for human rights, and the survival of minority cultures
can become a force for the direction of action. Again, Gramscis work is insightful. In the
Prison Notebooks, Gramsci advances a sophisticated analysis of how dominant discourses play a vital role in upholding particular
political and economic orders, or, in Gramscis terminology, historic blocs (Gramsci 1971: 323-377). Gramsci adopted Machiavellis
view of power as a centaur, ahlf man, half beast: a mixture of consent and coercion. Consent is produced and reproduced by a ruling
hegemony that holds sway through civil society and takes on the status of common sense; it becomes subconsciously accepted and
even regarded as beyond question. Obviously, for Gramsci, there is nothing immutable about the values that permeate society; they
can and do change. In the social realm, ideas and institutions that were once seen as natural and beyond question (i.e.,
commonsensical) in the West, such as feudalism and slavery, are now seen as anachronistic, unjust, and unacceptable. In Marxs
well-worn phrase, All that is solid melts into the air. Gramscis intention is to harness this potential for change and ensure that it
moves in the direction of emancipation. To do this he suggests a strategy of a war of position (Gramsci 1971: 229-239). Gramsci
argues that in states with developed civil societies, such as those in Western liberal democracies, any successful attempt at
sentiment along more familiar Quaker lines of speaking truth to power (this sentiment is also central to Said 1994) or even along
the eisteddfod lines of speaking truth against the world. Of course, traditional strategists can, and indeed do, sometimes claim a
similar role. Colin S. Gray, for example, states that strategists must be prepared to speak truth to power (Gray 1982a: 193). But
the difference between Gray and proponents of critical security studies is that, whereas the former seeks to influence policymakers
in particular directions without questioning the basis of their power, the latter aim at a thoroughgoing critique of all that traditional
critical security studies in attempting to undermine the prevailing orthodoxy is ultimately educational. As Gramsci notes, every
relationship of hegemony is necessarily a pedagogic relationship (Gramsci 1971: 350; see also the discussion of critical pedagogy
delusion. (cited in Kellner 1992: vii) Such unobtrusive yet insistent work does not in itself create the social change to which
Adorno alludes. The conceptual and the practical dangers of collapsing practice
into theory must be guarded against. Rather, through their educational
activities, proponent of critical security studies should aim to provide
support for those social movements that promote emancipatory social
change. By providing a critique of the prevailing order and legitimating
alternative views, critical theorists can perform a valuable role in
supporting the struggles of social movements. That said, the role of theorists is not to direct and
instruct those movements with which they are aligned; instead, the relationship is reciprocal. The experience of the European, North
American, and Antipodean peace movements of the 1980s shows how influential social movements can become when their efforts
are harnessed to the intellectual and educational activity of critical thinkers. For example, in his account of New Zealands
interested in issues of security and strategy drew strength and succor from each others efforts. If such critical social movements do
not exist, then this creates obvious difficulties for the critical theorist. But even under these circumstances, the theorist need not
abandon all hope of an eventual orientation toward practice. Once again, the peace movement of the 1980s provides evidence of
the possibilities. At that time, the movement benefited from the intellectual work undertaken in the lean years of the peace
movement in the late 1970s. Some of the theories and concepts developed then, such as common security and nonoffensive
defense, were eventually taken up even in the Kremlin and played a significant role in defusing the second Cold War. Those ideas
developed in the 1970s can be seen in Adornian terms of the a message in a bottle, but in this case, contra Adornos expectations,
they were picked up and used to support a program of emancipatory political practice. Obviously, one would be nave to understate
the difficulties facing those attempting to develop alternative critical approaches within academia. Some of these problems have
been alluded to already and involve the structural constraints of academic life itself. Said argues that many problems are caused by
thinkers risked demonization and in some countries far worse in order to challenge received wisdom, thus arguably playing a crucial
role in the very survival of the human race, should act as both an inspiration and a challenge to critical security studies.
%20despondent%2C%20but%20as%20countless%20struggles%20for
%20freedom&f=false)
We can
critique the machinic frameworks of possibility represented by law, policy,
economic regulation, and diplomacy, while challenging the way these
institutions deploy language to draw individual subjects into their
consensual web. This suggests, at least provisionally, a dual strategy. The first asserts the space for
both a totalizing and individualizing blackmail and promise, it is at these levels that we can intervene.
agency, both in challenging available possibilities for being and their larger socioeconomic implications. Roland
Bleiker formulates an idea of agency that shifts away from the lone (male) hero overthrowing the social order in a
decisive act of rebellion to one that understands both the thickness of social power and its "fissures,"
possibilities that transgress and call into question the boundaries of the self, society, and the international that
security seeks to imagine and police. The second seeks new ethical principles based on a critique of the rigid and
repressive forms of identity that security has heretofore offered. Thus writers such as Rosalyn Diprose, William Connolly, and Moira Gatens have sought to imagine a new ethical relationship that thinks difference not on the basis of
the same but on the basis of a dialogue with the other that might, allow space for the unknown and unfamiliar, for a
"debate and engagement with the other's law and the other's ethics"an encounter that involves a transformation
than the other. Thus while the sweep and power of security must be
acknowledged, it must also be refused: at the simultaneous levels of
individual identity, social order, and macroeconomic possibility, it would
entail another kind of work on "ourselves"a political refusal of the One,
the imagination of an other that never returns to the same. It would be to
ask if there is a world after security, and what its shimmering possi bilities
might be.
of the self rather
suppresses all issues of power and turns political questions into debates
about the most efficient way to achieve 'security', despite the fact that we are never quite told
- never could be told - what might count as having achieved it. Security politics is, in this sense, an
anti-politics,"' dominating political discourse in much the same manner as the security state tries to dominate human
beings, reinforcing security fetishism and the monopolistic character of
security on the political imagination. We therefore need to get beyond
security politics, not add yet more 'sectors' to it in a way that simply expands the scope of the
state and legitimises state intervention in yet more and more areas of our lives. Simon Dalby reports a personal communication
filled with a new vision or revision of security in which it is re-mapped or civilised or gendered or humanised or expanded or
whatever. All of these ultimately remain within the statist political imaginary, and consequently end up reaffirming the state as the
adequate to the kind of society we want. Thus while much of what I have said here has been of a negative order, part of the
against security politics would allow us to circumvent the debilitating effect achieved
through the constant securitising of social and political issues, debilitating in the sense that 'security' helps
consolidate the power of the existing forms of social domination and justifies the shortcircuiting of even the most democratic forms. It would also allow us to forge another kind of
politics centred on a different conception of the good. We need a new way of thinking and
talking about social being and politics that moves us beyond security. This would perhaps be
emancipatory in the true sense of the word. What this might mean, precisely,
must be open to debate. But it certainly requires recognising that security is an illusion that has forgotten it is an illusion; it requires
recognising that security is not the same as solidarity;
2NC Impact
This quest for security in an inherently chaotic and insecure
world guarantees extinction
Burke 7 (Anthony Burke, Senior Lecturer at School of Politics and International
Relations at University of New South Wales, Beyond Security, Ethics and Violence:
War against the Other,
https://books.google.com/books/about/Security_Strategy_and_Critical_Theory.html?
id=RYgi4GOgy_0C)
Bacon thought of the new scientific method not merely as way of achieving a purer access to truth and
epistemological certainty, but as liberating a new power that would enable the creation of a new kind of Man. He
opened the Novum Organum with the statement that 'knowledge and human power are synonymous', and later
wrote of his 'determination...to lay a firmer foundation, and extend to a greater distance the boundaries of human
power and dignity'.67 In a revealing and highly negative comparison between 'men's lives in the most polished
countries of Europe and in any wild and barbarous region of the new Indies' -- one that echoes in advance
Kissinger's distinction between post-and pre-Newtonian cultures -- Bacon set out what was at stake in the
advancement of empirical science: anyone making this comparison, he remarked, 'will think it so great, that man
his empire over creation, both of which can be partially recovered even in this life, the first by religion and faith, the
second by the arts and sciences. For creation did not become entirely and utterly rebellious by the curse, but in
consequence of the Divine decree, 'in the sweat of thy brow thou shalt eat bread'; she is now compelled by our
labours (not assuredly by our disputes or magical ceremonies) at length to afford mankind in some degree his
There is a breathtaking, world-creating hubris in this statement -one that, in many ways, came to characterise western modernity itself,
and which is easily recognisable in a generation of modern technocrats
like Kissinger. The Fall of Adam was the Judeo-Christian West's primal creation myth, one that marked
bread...69 #
humankind as flawed and humbled before God, condemned to hardship and ambivalence. Bacon forecast here a
return to Eden, but one of man's own making. This truly was the death of God, of putting man into God's place, and
his discovery of
the innermost secrets of matter and energy, of the fires that fuelled the
stars -- had not 'enhanced human power and dignity' as Bacon claimed,
but instead brought destruction and horror. Scientific powers that had
been consciously applied in the defence of life and in the hope of its
betterment now threatened its total and absolute destruction . This would not
acknowledge its renewed intimacy with contingency and evil. Man's empire over creation --
prevent a legion of scientists, soldiers and national security policymakers later attempting to apply Bacon's faith in
invention and Descartes' faith in mathematics to make of the Bomb a rational weapon. # Oppenheimer -- who
the
weapons resisted control, resisted utility, that 'with the release of atomic
energy quite revolutionary changes had occurred in the techniques of
warfare'.73 Yet Bacon's legacy, one deeply imprinted on the strategists, was his view that truth and utility are
resolutely opposed the development of the hydrogen bomb -- understood what the strategists could not: that
'perfectly identical'.74 In 1947 Oppenheimer had clung to the hope that 'knowledge is good...it seems hard to live
any other way than thinking it was better to know something than not to know it; and the more you know, the
better'; by 1960 he felt that 'terror attaches to new knowledge. It has an unmooring quality; it finds men
unprepared to deal with it.'75 # Martin Heidegger questioned this mapping of natural science onto the social world
in his essays on technology -- which, as 'machine', has been so crucial to modern strategic and geopolitical thought
as an image of perfect function and order and a powerful tool of intervention. He commented that, given that
modern technology 'employs exact physical science...the deceptive illusion arises that modern technology is
applied physical science'.76 Yet as the essays and speeches of Oppenheimer attest ,
potent object of desire, not merely as an instrument of power but as a promise and conduit of certainty itself. In the
telling and disturbing -- because they underline the ontological force of the instrumental view of politics. In The
Question Concerning Technology, Heidegger's striking argument was that in the modernising West technology is not
merely a tool, a 'means to an end'. Rather technology has become a governing image of the modern universe, one
that has come to order, limit and define human existence as a 'calculable coherence of forces' and a 'standing
reserve' of energy. Heidegger wrote: 'the threat to man does not come in the first instance from the potentially
lethal machines and apparatus of technology. The actual threat has already affected man in his essence.'77 # This
process Heidegger calls 'Enframing' and through it the scientific mind demands that 'nature reports itself in some
Man is
not a being who makes and uses machines as means, choosing and
limiting their impact on the world for his ends; rather man has imagined
way or other that is identifiable through calculation and remains orderable as a system of information'.
this
framework within the international systems current period, various
different global concepts in specific areas such as security have not been
honed. Human security visualizes a new global order founded on global
humanism. The core issue is to solve the populations basic needs within
the framework of globalization and interdependence. This delicate balance demands,
deals with the processes and seeks to influence future courses of action. A vision of the future is essential. In
on the one hand, a tendency to unify behaviour, consumption and ideals centred on universal values and, on the
other, the requirement to recognize and respect diversity and particular identities and cultures. We have seen,
It also
has an adverse effect on cultural practices and national and local
identities. All of this is taking place in a context of economic and social
polarization in various areas of the world. The result is local
ungovernability, which transfers instability to the global system and
regional sub-systems. A zero-sum security concept asserts that there is
no absolute security and that the greater security of one actor must mean
a greater degree of insecurity for another. In the case of human security,
we can assert that the vulnerabilities of one are manifested as
vulnerabilities of all. For example, in Latin America this requires that we pay greater attention to and
however, that globalization also increases differences and does notin and of itselfmeet any needs.
2NC Perm
The permutation fails you cant re-appropriate your security
discoursethe 1AC leaves it unquestioned
Burke 2 (Anthony Burke, Senior Lecturer at School of Politics and International
Relations at University of New South Wales Aporias of Security, January-March
2002, http://www.jstor.org/stable/40645035?seq=1#page_scan_tab_contents)
humanist critiques of security uncover an aporia within the concept of
security. An aporia is an event that prevents a metaphysical discourse
from fulfilling its promised unity--not a contradiction that can be brought
into the dialectic, smoothed over, and resolved into the unity of the
concept, but an untotalizable problem at the heart of the concept,
disrupting its trajectory, emptying out its fullness, opening out its closure .
Thus
Derrida writes of aporia being an "impasse," a path that cannot be traveled; an "interminable experience" that,
however, "must remain if one wants to think, to make come or to let come any event of decision or responsibility."
(13) As an event, Derrida sees the aporia as something like a stranger crossing the threshold of a foreign land: yet
the aporetic stranger "does not simply cross a given threshold" but
"affects the very experience of the threshold . . . to the point of
annihilating or rendering indeterminate all the distinctive signs of a prior
identity, beginning with the very border that delineated a legitimate home
and assured lineage, names and language." (14) Thus it is important to open up and focus
on aporias: they bring possibility, the hope of breaking down the hegemony
and assumptions of powerful political concepts, to think and create new
social, ethical, and economic relationships outside their oppressive
structures of political and epistemological order--in short, they help us to think new
paths. Aporias mark not merely the failure of concepts but a new potential to experience and imagine the
impossible. This is where the critical and life-affirming potential of genealogy can come into play. My particular
beings as we know them'.84 Whilst this would not be true of all just war advocates, I suspect that even as they are
so concerned with the ought, moral theories of violence grant too much unquestioned power to the is. The problem
here lies with the confidence in being -- of 'human beings as we know them' -- which ultimately fails to escape a
formation. Neither the progressive flow of history nor the pacific tendencies of an international society of republican
enframing world view has come to stand in for being itself. Enframing, argues Heidegger, 'does not simply endanger
man in his relationship to himself and to everything that is...it drives out every other possibility of revealing...the
rule of Enframing threatens man with the possibility that it could be denied to him to enter into a more original
revealing and hence to experience the call of a more primal truth.'87 # What I take from Heidegger's argument --
Case
Economy Advantage
DeDev 1NC
Growth rates are unsustainable we are exceeding the earths
biophysical limits
Klitgaar and Krall 11 (Kent A. Klitgaard, , Lisi Krall, ,Ecological economics,
degrowth, and institutional change, 12/12/2011, Ecological Economics journal issue
no. 84 pages 247-248, www.elsevier.com/ locate/ecolecon)
The age of economic growth is coming to an end. The mature economies of the
industrial North have already entered the initial stages of the era of degrowth. This
is evidenced by data that show overall economic activity has increased at a
decreasing rate since the Golden Age of 1960s postwar capitalism turned into the
era of stagflation in the 1970s. Despite the supposed revival of growth in the
neoliberal age, percentage growth rates have continued their secular decline. In the
United States real GDP growth was lower in the1980s and 1990s than in the 1970s
and lower still in the first years of the 21st century (Tables 1). While percentage
growth rates may have declined over the last five decades the absolute size of the
economy, as measured by real gross domestic product (for all its flaws) has
increased, more than tripling from 1970 until 2011. This creates a dilemma within
our present institutional context. Absolute growth, which uses more resources,
especially fossil fuel resources, destroys more habitat, and emits more carbon and
other pollutants into the planet's sinks, has grown exponentially. At the same time,
relative, or percentage growth, upon which employment depends, has fluctuated
over the same decades and shows a downward trend. We are growing too fast to
remain within the limits of the biophysical system. At the same time the world
economy is growing too slowly to provide sufficient employment and there appears
to be a secular decline at work. Despite rapid and sustained rates of economic
growth in many newly emerging market economies (e.g. Brazil, India and China)
patterns of declining growth rates also exist for the world economy (Table 2). The
reduction in the long-term growth rates, especially for mature market economies, is
not something we must contend with in the distant future. They have been
occurring for decades. Neither are they simply the result of misguided policy, as
growth rates have fallen in times of both liberal and conservative policy regimes.
Rather, we believe the growth rate decline is embedded deeply within the
institutional structure of the economy, as well as within biophysical limits. Clearly a
better understanding of the complex dynamics of the interactions of the economic
and biophysical systems is needed to provide important insights for the degrowth
and steady-state agendas. While ecological economics has addressed ecological
limits, it has not explored as fully the limits to growth inherent in a market system.
The analysis of biophysical limits has been the strength of ecological economics.
Beginning with the work of Herman Daly, who placed the economy within the
context of a finite and non-growing biophysical system, through the first 1997 text
by Robert Costanza and colleagues, ecological economists have carefully delineated
limits such as the climate change, the human appropriation of the products of
photosynthesis, and biodiversity loss (Costanza et al., 1997). Subsequent analyses
by Rees and Wackernagel showed that the human ecological footprint now exceeds
the earth's biocapacity, and the Limits to Growth studies by Meadows et al.
concluded that human activity has overshot the carrying capacity and the scale of
human activity is unlikely to be maintained into the next century. The work of many
energy analysts (Campbell, 2005; Campbell and Laherrere, 1998; Deffeyes, 2001;
Hall and Klitgaard, 2011; Hallock et al., 2004; Heinberg, 2005; Simmons, 2006)
concludes that we are at or near the global peak of fossil hydrocarbons and future
economic activity will be impacted strongly by more expensive and less available
petroleum. The second set of limits is internal and is to be found in the dynamics of
the accumulation process, involving the complex structural interaction of
production, consumption, and distribution. The internal limits that gear the economy
toward both cyclical variation and secular stagnation have not been considered
systematically by ecological economists. When the economy reached these limits
historically the result has been a series of periodic recessions and depressions.
Renewed growth has been the answer, just as it is now. If the system reaches its
own internal limits at the same time the world reaches its external biophysical limits
we will have a profound challenge because we need a way to facilitate decent
standards of living when economic growth can no longer be the vehicle to maintain
incomes and assure social stability. In the last instance, a system in overshoot can
neither growits way out of its inherent tendency toward stagnation, nor can it grow
its way into sustainability. We believe it is unlikely that the present system of
capitalism, dominated by multinational corporations, globalization, speculative
finance, and dependence upon fossil fuels, can adjust to the era of degrowth and
remain intact as is. In order to devise an economy that meets human needs as it
approaches both sets of limits, ecological economics needs to understand more fully
the structural and institutional dimensions of the internal and external limits, as well
as the interaction between the two. This is our challenge, and it is a difficult one.
Ecological economics can better understand the necessary institutional
configuration of the non-growing economy only by an improved understanding of
the dynamics of growth and capital accumulation, because it is here that the
inherent tendencies to stagnate and the resolution to stagnation are found.
the only two recent periods that have seen a major reduction in global
CO2 emissions both occurred in periods of very sudden, rapid, socially disruptive, and painful
periods of forced economic degrowth-namely the breakdown of the Soviet bloc and the current
The stark reality is that
financial-economic crisis. Strikingly, in May 2009, the International Energy Agency reported that, for the first
time since 1945, global demand for electricity was expected to fall. Experience has town that a lot of time
countries where the effects Of climate changes are less immediately visible and impact on pepplds lives less
directly. Nonetheless, it is becoming increasingly clear that solutions will not be found at this level.
DeDev 2NC
Growth is not sustainablemodels prove
Fagnart 14 (Jean-Francois Fagnart, Marc Germain, Energy, complexity and
sustainable long-term growth, Elsevier, September 2nd, 2014)
This note has reconsidered what type of long-term growth is possible in a model with expanding product variety a la
Gross- man and Helpman (1991) where all human activities require en- ergy . In this framework, we
have linked the complexity of final production to the number of different components (or inputs) en- tering into its
assembly process. We have considered two cases, whether complexity is costly or not, i.e. whether product
complex- ity increases the energy requirements of production operations or not .
complexity on energy consumption is nil or not too strong and (ii) if the energy intensiveness of the innovation
process (the research activities in the present model) tends towards zero .
$, is defined as; Pressure on nature p.c. = carbon dioxide damage p.c. +mineral depletion p.c. +energy depletion
p.c. +net forest depletion p.c. Unless otherwise indicated,
World
Development Indicator (WDI) database3 of the World Bank (World Bank, 2012), and are summarized in Table 2.
See Table A1 for a detailed explanation and sources of all variables. Table 1 shows that the pressure on nature takes
different forms in different income groups. Comparatively, net deforestation and mineral depletion in low-income
countries, energy depletion and CO2 damage in middle-income countries and energy depletion in high-income
countries constitute the major sources of the pressure on nature. When we look at the shares of each component in
relationship is not linear across different income groups. Due to the possible existence of endogeneity and omitted
variable biases cross-country relationship does not necessarily prove causation. Consider for example Turkey and
Finland. Finland is richer and exerts less pressure on her nature, so a simple crosscountry comparison would
suggest that higher per capita income causes less pressure on nature. But the right question to ask should be
whether a country is more likely to exert less pressure on nature as it becomes richer or not. In Fig. 3, we plot the
changes in log per capita income against changes in pressure on nature between 1970 and 2008. This helps to
eliminate the time-invariant country- fixed effects. But even after eliminating them, the positive relation between
income and pressure on nature remains. While differencing variables helps to remove the time-invariant
characteristics of countries, it does not necessarily heal the simultaneity bias. That is, the positive relationship
emerged in the plot-diagram may be arisen due to some other factor affecting both economic growth and pressure
on nature. The preliminary analysis of the data by plot diagrams presented in Figs. 2 and 3 helps us to find the right
econometric method to study the economic growth-environmental pressure relationship. We will come back to this
issue in the next subsection. Table 2 presents the descriptive statistics of the observations included in the
regression analysis.
We found
that 10% increase in openness ratio increases the per capita pressure on nature by
9.5%. This is in line with the conclusion reached by Borghesi and Vercelli (2003). The regression results support our
hypothesis that the governance structure is positively related with environmental
sustainability which also confirms the findings of the earlier studies mentioned above. More specifically, we found that a unit
increase in the rule of law indicator decreases the per capita pressure on nature by 0.5%. Together with the effects of
increasing openness to trade, the positive relationship between rule of law (or
quality of institutions) and environmental protection calls for a closer look at the
current globalization patterns. The environmental consequences of deregulation efforts by international
more investment. Increasing integration to the global system through trade increases the pressure on environment.
institutions like IMF, WB and WTO during the sample period is worth to mention. As Tisdell (2001) and Esty (2001) argue, existing
environmental and social constraints were gradually eroded by the indiscriminate deregulation of world trade. In the same spirit,
Daly (1993) argues that free trade promotes competition that results in lowering of environmental standards as well as wages, which
in turn, increases environmental degradation in developing and unemployment in high-income countries. The experience of Mexico,
as a middleincome country receiving a good deal of foreign direct investment especially after the NAFTA agreement is telling.
Steininger (1994) reports that lower environmental standards in Mexico played a crucial role in the concentration of maquiladoras
along the USbordering area, and this resulted in increasing unemployment in US and environmental damage and health problems in
Mexico. Coming to the education, we find a statistically significant result between the secondary school enrollment rate and
pressure on nature, yet the positive sign of the estimate is not as expected, possibly due to the very limited availability of data
especially for low and middle-income countries. Overall, we see that even after controlling for various structural and institutional
Our
results suggest that there is a positive relationship between income per
capita and per capita pressure on nature. The effect is much stronger in
middle-income countries than in low and high-income countries. After controlling for
various covariates, institutional and structural, the positive effect still continues to hold. Our conclusions are
fairly robust to the inclusion of these covariates, and to the inclusion and exclusion of countries from the sample. The
regression results shed doubts on the environmental sustainability of the growth
indicators, the positive relationship between income and pressure on nature continues to hold. 5. Concluding remarks
producers in the global supply chain, achieving environmental sustainability without jeopardizing the other determinants of human
welfare continues to be a big challenge that has to be confronted.
It is equally possible, however, that a renewed crisis would trigger a renewed surge in
policy coordination. As John Ikenberry has observed, the complex interdependence that is
unleashed in an open and loosely rule-based order generates some expanding realms of
exchange and investment that result in a growing array of firms, interest groups and other
sorts of political stakeholders who seek to preserve the stability and openness of the
system.103 The post-2008 economic order has remained open, entrenching
these interests even more across the globe . Despite uncertain times, the open economic
system that has been in operation since 1945 does not appear to be closing anytime
soon.
One year ago, the world seemed as if it might be coming apart. The global financial
system, which had fueled a great expansion of capitalism and trade across the
world, was crumbling. All the certainties of the age of -globalization--about the
virtues of free markets, trade, and technology--were being called into question.
Faith in the American model had collapsed. The financial industry had crumbled.
Once-roaring emerging markets like China, India, and Brazil were sinking. Worldwide
trade was shrinking to a degree not seen since the 1930s. Pundits whose
bearishness had been vindicated predicted we were doomed to a long, painful bust,
with cascading failures in sector after sector, country after country. In a widely cited
essay that appeared in The Atlantic this May, Simon Johnson, former chief
economist of the International Monetary Fund, wrote: "The conventional wisdom
among the elite is still that the current slump 'cannot be as bad as the Great
Depression.' This view is wrong. What we face now could, in fact, be worse than the
Great Depression." Others predicted that these economic shocks would lead to
political instability and violence in the worst-hit countries. At his confirmation
hearing in February, the new U.S. director of national intelligence, Adm. Dennis
Blair, cautioned the Senate that "the financial crisis and global recession are likely
to produce a wave of economic crises in emerging-market nations over the next
year." Hillary Clinton endorsed this grim view. And she was hardly alone. Foreign
Policy ran a cover story predicting serious unrest in several emerging markets. Of
one thing everyone was sure: nothing would ever be the same again. Not the
financial industry, not capitalism, not globalization. One year later, how much has
the world really changed? Well, Wall Street is home to two fewer investment banks
(three, if you count Merrill Lynch). Some regional banks have gone bust. There was
some turmoil in Moldova and (entirely unrelated to the financial crisis) in Iran.
Severe problems remain, like high unemployment in the West, and we face new
problems caused by responses to the crisis--soaring debt and fears of inflation. But
overall, things look nothing like they did in the 1930s. The predictions of economic
and political collapse have not materialized at all. A key measure of fear and
fragility is the ability of poor and unstable countries to borrow money on the debt
markets. So consider this: the sovereign bonds of tottering Pakistan have returned
168 percent so far this year. All this doesn't add up to a recovery yet, but it does
reflect a return to some level of normalcy. And that rebound has been so rapid that
even the shrewdest observers remain puzzled. "The question I have at the back of
my head is 'Is that it?' " says Charles Kaye, the co-head of Warburg Pincus. "We had
this huge crisis, and now we're back to business as usual?" This revival did not
happen because markets managed to stabilize themselves on their own. Rather,
governments, having learned the lessons of the Great Depression, were determined
not to repeat the same mistakes once this crisis hit. By massively expanding state
support for the economy--through central banks and national treasuries--they
buffered the worst of the damage. (Whether they made new mistakes in the process
remains to be seen.) The extensive social safety nets that have been established
across the industrialized world also cushioned the pain felt by many. Times are still
tough, but things are nowhere near as bad as in the 1930s, when governments
played a tiny role in national economies. It's true that the massive state
interventions of the past year may be fueling some new bubbles: the cheap cash
and government guarantees provided to banks, companies, and consumers have
fueled some irrational exuberance in stock and bond markets. Yet these rallies also
demonstrate the return of confidence, and confidence is a very powerful economic
force. When John Maynard Keynes described his own prescriptions for economic
growth, he believed government action could provide only a temporary fix until the
real motor of the economy started cranking again--the animal spirits of investors,
consumers, and companies seeking risk and profit. Beyond all this, though, I believe
there's a fundamental reason why we have not faced global collapse in the last
year. It is the same reason that we weathered the stock-market crash of 1987, the
recession of 1992, the Asian crisis of 1997, the Russian default of 1998, and the
The main reason for the divergence: Direct transmission from a U.S. slowdown to
other economies through exports is just not large enough to spread a U.S. demand
problem globally, Goldman Sachs economists Dominic Wilson and Stacy Carlson
wrote in a Sept. 22 report entitled If the U.S. sneezes... Limited Exposure Take the
so-called BRIC countries of Brazil, Russia, India and China. While exports account for
almost 20 percent of their gross domestic product, sales to the U.S. compose less
than 5 percent of GDP, according to their estimates. That means even if U.S. growth
slowed 2 percent, the drag on these four countries would be about 0.1 percentage
point, the economists reckon. Developed economies including the U.K., Germany
and Japan also have limited exposure, they said. Economies outside the U.S. have
room to grow that the U.S. doesnt, partly because of its outsized slump in house
prices, Wilson and Carlson said. The drop of almost 35 percent is more than twice as
large as the worst declines in the rest of the Group of 10 industrial nations, they
found. The risk to the decoupling wager is a repeat of 2008, when the U.S. property
bubble burst and then morphed into a global credit and banking shock that
ricocheted around the world. For now, Goldman Sachss index of U.S. financial
conditions signals that bond and stock markets arent stressed by the U.S. outlook.
Weaker Dollar The break with the U.S. will be reflected in a weaker dollar, with the
Chinese yuan appreciating to 6.49 per dollar in a year from 6.685 on Oct. 1,
according to Goldman Sachs forecasts. The bank is also betting that yields on U.S.
10-year debt will be lower by June than equivalent yields for Germany, the U.K.,
Canada, Australia and Norway. U.S. notes will rise to 2.8 percent from 2.52 percent,
Germanys will increase to 3 percent from 2.3 percent and Canadas will grow to 3.8
percent from 2.76 percent on Oct. 1, Goldman Sachs projects. Goldman Sachs isnt
alone in making the case for decoupling. Harris at BofA Merrill Lynch said he didnt
buy the argument prior to the financial crisis. Now he believes global growth is
strong enough to offer a handkerchief to the U.S. as it suffers a growth recession
of weak expansion and rising unemployment, he said. Giving him confidence is his
calculation that the U.S. share of global GDP has shrunk to about 24 percent from
31 percent in 2000. He also notes that, unlike the U.S., many countries avoided
asset bubbles, kept their banking systems sound and improved their trade and
budget positions. Economic Locomotives A book published last week by the World
Bank backs him up. The Day After Tomorrow concludes that developing nations
arent only decoupling, they also are undergoing a switchover that will make them
such locomotives for the world economy, they can help rescue advanced nations.
Among the reasons for the revolution are greater trade between emerging markets,
the rise of the middle class and higher commodity prices, the book said. Investors
are signaling they agree. The U.S. has fallen behind Brazil, China and India as the
preferred place to invest, according to a quarterly survey conducted last month of
1,408 investors, analysts and traders who subscribe to Bloomberg. Emerging
markets also attracted more money from share offerings than industrialized nations
last quarter for the first time in at least a decade, Bloomberg data show. Room to
Ease Indonesia, India, China and Poland are the developing economies least
vulnerable to a U.S. slowdown, according to a Sept. 14 study based on trade ties by
HSBC Holdings Plc economists. China, Russia and Brazil also are among nations with
more room than industrial countries to ease policies if a U.S. slowdown does weigh
on their growth, according to a policy- flexibility index designed by the economists,
who include New York-based Pablo Goldberg. Emerging economies kept their
powder relatively dry, and are, for the most part, in a position where they could act
countercyclically if needed, the HSBC group said. Links to developing countries are
helping insulate some companies against U.S. weakness. Swiss watch manufacturer
Swatch Group AG and tire maker Nokian Renkaat of Finland are among the
European businesses that should benefit from trade with nations such as Russia and
China where consumer demand is growing, according to BlackRock Inc. portfolio
manager Alister Hibbert. Theres a lot of life in the global economy, Hibbert, said
at a Sept. 8 presentation to reporters in London.
Many emerging economies entered the 2008-2009 crisis with healthy balance
sheets. In most cases governments reacted quickly and flexibly, rolling out stimulus
programs or even expanding poverty-reduction programs. Increasingly, the same
countries that have embraced globalization and markets are starting to build social
safety nets. And there's another factor: Trade is becoming more evenly
distributed throughout the world. China is now a bigger market for Asian exporters
than the United States. Some economists are talking about "emerging market
decoupling." Jonathan Anderson, an emerging-markets economist at the Swiss
bank UBS, showed in one recent report how car sales in emerging markets have
actually been rising during this latest bout of turmoil -- powerful evidence that
emerging economies no longer have to sneeze when America catches a
cold. Aphitchaya Nguanbanchong, a consultant for the British-based aid
organization Oxfam, has studied the crisis's effects on Southeast Asian economies.
"The research so far shows that the result of the crisis isn't as bad as we were
expecting," she says. Indonesia is a case in point: "People in this region and at the
policy level learned a lot from the past crisis." Healthy domestic demand cushioned
the shock when the crisis hit export-oriented industries; the government weighed in
immediately with hefty stimulus measures. Nguanbanchong says that she has been
surprised by the extent to which families throughout the region have kept spending
money on education even as incomes have declined for some. And that, she says,
reinforces a major lesson that emerging-market governments can take away from
the crisis: "Governments should focus more on social policy, on health, education,
and services. They shouldn't be intervening so much directly in the economy itself."
During the first few weeks of 2012, the markets are following
the prevailing narrative that the U.S. economy has
decoupled from the widely known troubles of Europe, and
the somewhat less discussed prevailing risks from China. In a
decoupling scenario, a country or region is deemed to be
able to withstand the troubles going on outside of its own
borders because of its own internal economic strength. I see
two major problems with this thesis. First, the U.S. economy is
not growing at the recently predicted robust rate of 4-5%;
rather it is struggling to achieve a rate of 2-2.5%. This leaves
little cushion to withstand the contagion from a major
economic fallout from either Europe or China, or for that
matter, economic shocks that have yet to surface. A significant
European debt default, banking failure, natural disasters or geopolitical
events, would surely impact the U.S. economy and markets beyond the
current level of fragile growth we simply dont have the levels of
productivity requisite to absorb a major blow. Second, it was only a
Specifically, when a country suffers from increased mass violence, a leader may
choose to use external force with the anticipation that such foreign policy action will
increase national solidarity and consequently (although indirectly) solve the
problem of mass violence.4 By comparison, an economic downturn or government
instability will not necessarily generate incentives for the cohesionary use of force,
since increasing national solidarity does not typically constitute a possible solution
for dealing with such domestic problems. In sum, exploring the cohesionary
incentives of political leaders and examining mass violence as a causal factor
presents a more plausible route to untangling the relationship between domestic
instability and the use of force in international crises (see DeRouen and Goldfinch,
2005). These considerations lead to my baseline hypothesis: Hypothesis 1: A
countrys likelihood of using external force in an international crisis increases in the
presence of an increased level of mass violence within its borders. There exists a
consensus among scholars that external conflict increases internal cohesion and
political centralization. That said, most scholars note that the level of cohesion in a
group achieved by an external conflict also depends on certain conditions pertaining
to the nature of the group and Downloaded from ips.sagepub.com at Harvard
Libraries on October 5, 2014 308 International Political Science Review 32(3) the
nature of the external conflict (see Coser, 1956; Stein, 1976). Among these
necessary preconditions (which act as intervening variables), the most important
factors that scholars propose are (1) the presence of a degree of group consensus
(solidarity) pre-dating the external conflict, and (2) a given groups perception of the
external conflict as a severe threat. Regarding the nature of the external conflict,
Coser (1956) who sought to systematize and qualify Simmels (1955) original ingroup/out-group argument differentiates between violent and non-violent conflict
by arguing that only violent conflict generates a sense of a serious threat to a given
group and thereby increases cohesion. Taking into account this qualification, I focus
on international crises that involve violent military acts. To capture the role of preexisting group solidarity, I take into consideration whether a given country is made
up of a heterogeneous society with ethno-religious divisions. Many scholars suggest
that civil violence seems to break out more frequently in countries with multiple
ethnic, linguistic, or religious groups (e.g. Ellingsen, 2000; Vanhanen, 1999). I
expect that ones attachment to the nation as a whole (rather than to his or her subnational ethnic group) is likely to be weaker in a country that is composed of
ethnically diverse groups compared with a country that is ethnically more
homogenous. This is because sub-national group affiliations in an ethnically plural
society may inhibit the potential for developing strong overall group identity
affiliations at the national level. Consequently, given an identity divided between
national and ethnoreligious attachments, external conflict is less likely to elicit as
much cohesionary power in a plural society as it is in a more homogenous one. In
such cases, the political leader of an ethnically divided country may have less
incentives to resort to cohesionary external conflict and may thus choose to deal
with ongoing mass violence through other policy means such as the suppression of
violent groups or the co-opting of opposition groups (see Bueno de Mesquita, 1980:
36198; Richards et al., 1993). On the other hand, I expect that a political leader of
a significant increase in the level of domestic violence during the relevant period
preceding the crisis, a code of 2 if the level is normal, and a code of 3 if there is a
significant decrease. I collapse the ICB variable into a dichotomous variable and
code it as 1 if there is a significant increase in the level of mass violence and 0
otherwise. In this way, I obtain a more direct measure to test my hypotheses. Last,
the ICB dataset uses a code of 4 if the crisis actor is a newly independent state. I
exclude the observations of this category from the analysis for this variable (as well
as for the measures of economic downturn and government instability), since such
cases do not provide information on the level of the domestic problem under
investigation. Economic downturn. This variable assesses the overall state of the
economy for the crisis actor during the period preceding a crisis. I base this
measure on the ICB variable labeled economic status of actor, which provides a
summary indicator of the cost of living, unemployment, food prices, labor
disruption, and consumer goods shortages. Since there is a considerable amount of
missing data for a number of individual economic indicators, this composite index
takes advantage of the available partial information, and thus enables a more
parsimonious model. The data are examined from the year of the crisis to the fourth
preceding year. The ICB dataset has the values coded as 1 if there is an increase in
economic problems, 2 if the economic situation is normal, and 3 if there is a
decrease in economic problems. For a more direct measure of worsening economic
conditions, I generate a dichotomous variable and code the cases where there is a
significant increase in economic problems as 1 and 0 otherwise. Downloaded
from ips.sagepub.com at Harvard Libraries on October 5, 2014 Sirin 311
Government instability. The ICB actor-level dataset provides information on whether
the crisis actor experiences government instability, which may include executive,
constitutional, legal, and/ or administrative structure changes within the relevant
period preceding an international crisis. For this measure, the ICB dataset codes the
observations as 1 if there is a significant increase in government instability, 2 if
the government is stable, and 3 if there is a significant decrease in government
instability. For a more direct measure of escalating governmental instability, I create
a dichotomous variable coding the cases where there is a significant increase in the
level of government instability as 1 and 0 otherwise. Ethno-religious
heterogeneity. For the operationalization of this concept, I use two different
measures that I adopt from the dataset of Fearon and Laitins (2003) study. The first
measure is the number of distinct languages spoken by groups exceeding 1 percent
of the countrys population (see Grimes and Grimes, 1996). The second alternative
measure captures the level of religious fractionalization, which Fearon and Laitin
constructed using data from the CIA Factbook and other sources. In order to test my
interactive hypothesis (H2), I generate two alternative multiplicative variables by
interacting mass violence separately with each of the two measures of ethnoreligious heterogeneity. Regime type. The ICB dataset provides five different
categories of this indicator including democratic regime, civil authoritarian regime,
military-direct rule, military-indirect rule, and military dual authority. I generate a
dummy variable where 1 denotes democratic regimes and 0 denotes
authoritarian regimes, mainly because the original variable does not differentiate
between levels of democracy while providing dissimilar types of authoritarianism.6
Control variables Power discrepancy. Several studies of state dyads have
violent triggers. For this variable, I employ the original ICB indicator trigger to
foreign policy crisis, which ranges from 1 (verbal act) to 9 (violent act) in line with
the triggers level of intensity. Empirical results Some states are more likely than
others to get involved in international crises, such as major powers and enduring
rivals. An attempt to identify possible factors that are specific to each crisis actor
would be a strenuous and redundant task. Instead, I employ a panel-estimated
approach random effects probit to control for country-specific effects likely to be
present in the error term. In accordance with my theoretical framework, I adopt the
crisis actor as my unit of analysis. The baseline analytical model is as follows: Pr(Y ij
= 1 | X ij , v i ) = f(b 0 + b 1 (mass violence) ij + b 2 (economic downturn) ij + b 3
(government instability) ij + b 4 (power discrepancy) ij + b 5 (contiguity) ij + b 6
(gravity) ij + b 7 (trigger level) ij + b 8 (regime type) ij + v i ) where Pr(Y ij = 1 | X
ij , v i ) denotes the probability of external use of force; vi represents unit-specific
effects. For the analysis of the interactive effects of mass violence and ethnoreligious heterogeneity, I add a multiplicative interaction variable to the baseline
model, along with the constitutive terms of that interaction. For the testing of my
hypotheses regarding regime type differences, I run the baseline model (excluding
the regime type variable) for the subsets of democracies and autocracies. As the
Wald 2 results of the analyses demonstrate (see Tables 2, 3 and 4), the fit of each
model is good. Downloaded from ips.sagepub.com at Harvard Libraries on October
5, 2014 Sirin 313 Table 1. Frequency of the Use of Force according to a Crisis Actors
Experience of Domestic Problems Prior to an International Crisis, 19182005 Mass
violence Economic downturn Government instability 0 1 0 1 0 1 No use of force Use
of force 443 226 76 52 317 178 151 67 403 212 117 64 Use of force % 33% 40%
36% 30% 34% 35% Table 1 provides descriptive statistics on the cross-tabulations
of the use of force in international crises with three different forms of domestic
problems (mass violence, economic downturn, and government instability). Among
crisis actors who experience increased mass violence prior to the crisis, 40 percent
use force. By comparison, if the country does not experience an increase in mass
violence, only 33 percent resort to the use of force. In cases of economic decline, 30
percent of crisis actors use force, whereas cases of no economic downturn
demonstrate the use of force 36 percent of the time. Finally, a change in the level of
government instability indicates almost no variation across the use of force and
non-use of force options (34 percent for no government instability and 35 percent
for increased government instability). These preliminary results fall in line with my
theoretical expectations that increased mass violence is more likely to lead to the
use of force rather than other forms of domestic problems.
Another challenge is dealing with close partners and allies who undermine internet
freedom. In August 2011, in the midst of the Arab uprisings, the UK experienced a
different connection technology infused movement, the London Riots. On August 11,
in the heat of the crisis, Prime Minister Cameron told the House of Commons: Free
flow of information can be used for good. But it can also be used for ill. So we are
working with the police, the intelligence services and industry to look at whether it
would be right to stop people communicating via these websites and services when
we know they are plotting violence, disorder and criminality. This policy had farreaching implications. As recently as January 2011, then President of Egypt, Hosni
Mubarak, ordered the shut-down of Egypts largest ISPs and the cell phone network,
a move the United States had heavily criticized. Now the UK was contemplating the
same move and threatening to create a rationale for authoritarian governments
everywhere to shut down communications networks when they threatened
violence, disorder and criminality. Other allies like Australia are also pursuing
restrictive internet policies. As OpenNet reported it: Australia maintains some of
the most restrictive Internet policies of any Western country When these allies
pursue policies so clearly at odds with the U.S. internet freedom agenda, several
difficulties arise. It undermines the U.S. position that an open and free internet is
something free societies naturally want. It also gives repressive authoritarian
governments an excuse for their own monitoring and filtering activities. To an
extent, U.S. internet freedom policy responds even-handedly to this challenge
because the vast bulk of its grants are for open source circumvention tools that can
be just as readily used by someone in London as Beijing, but so far, the United
States has been much more discreet about criticising the restrictive policies of allies
than authoritarian states.
China is openly undermining the United States' vision of a free and open Internet.
Motivated by maintaining the fragile balance between information control, social
and political stability, and continued modernization and economic growth for an
online population of over 600 million, the Chinese government is attempting to alter
how nations understand their role in Internet governance through a concept called
"Internet sovereignty."
Internet sovereignty refers to the idea that a country has the right to control
Internet activity within its own borders, and it is what China refers to as a natural
extension of a nation-state's authority to handle its own domestic and foreign
affairs. For the United States and other Western nations, however, Internet
governance is delegated to an inclusive and distributed set of stakeholders
including government, civil society, the private sector, academia, and national and
international organizations (also known as the multi-stakeholder model of Internet
governance).
am. While these actions may be necessary to achieve important policy goals, these
policies may distort cross - border information flows and trade. Meanwhile, US,
Canadian and European firms provide much of the infrastructure as well as censor
ware or blockin g services to their home governments and repressive states such as
Iran, Russia, and China
We, the undersigned individuals and organizations, are writing to express our deep
concerns about the Restoration of Americas Wire Act (H.R. 4301), which would
institute a de facto ban on internet gaming in all 50 states. The legislation is a broad
overreach by the federal government over matters traditionally reserved for the
states. H.R. 4301 will reverse current law in many states and drastically increase the
federal governments regulatory power. As we have seen in the past, a ban will not
stop online gambling. Prohibiting states from legalizing and regulating the practice
only ensures that it will be pushed back into the shadows where crime can flourish
with little oversight. In this black market, where virtually all sites are operated from
abroad, consumers have little to no protection from predatory behavior. Perhaps
even more concerning is the fact that this bill allows the federal government to take
a heavy hand in regulating the Internet, opening the door for increased Internet
regulation in the future. By banning a select form of Internet commerce, the
federal government is setting a troubling precedent and providing fodder to
those who would like to see increased Internet regulation in the future. We
fear that H.R. 4301 will begin a dangerous process of internet censorship that
will simultaneously be circumvented by calculated international infringers while
constraining the actions of private individuals and companies in the United States.
that may be interpreted as calling for religious and ethnic violence against both
Hindus and Muslims. Moreover, a 2009 study found that Microsoft has been
censoring what users in the United Arab Emirates, Syria, Algeria, and Jordan could
find through its Bing search engine much more heavily than the governments of
those countries.
now spot Facebook's "Like" button on many sitesso there are growing incentives
to tell sites who you are. Many of us would eagerly trade our privacy for a discount
coupon to be used at the Apple store. From the government end, growing concerns
over child pornography, copyright violations, cybercrime, and cyberwarfare also
make it more likely that there will be more ways in which we will need to prove our
identity online. The future of Internet control is thus a function of numerous (and
rather complex) business and social forces; sadly, many of them originating in free
and democratic societies. Western governments and foundations can't solve the
censorship problem by just building more tools; they need to identify, publicly
debate, and, if necessary, legislate against each of those numerous forces. The
West excels at building and supporting effective tools to pierce through the firewalls
of authoritarian governments, but it is also skilled at letting many of its corporations
disregard the privacy of their users, often with disastrous implications for those who
live in oppressive societies. Very litde about the currently fashionable imperative to
promote Internet freedom suggests that Western policymakers are committed to
resolving the problems that they themselves have helped to create. We Don't
Censor; We Outsource! Another reason why so much of today's Internet censorship
is invisible is because it's not the governments who practice it. While in most cases
it's enough to block access to a particular critical blog post, it's even better to
remove that blog post from the Internet in its entirety. While governments do not
have such mighty power, companies that enable users to publish such blog posts on
their sites can do it in a blink. Being able to force companies to police the Web
according to a set of some broad guidelines is a dream come true for any
government. It's the companies who incur all the costs, it's the companies who do
the dirty work, and it's the companies who eventually get blamed by the users.
Companies also are more likely to catch unruly content, as they know their online
communities better than government censors. Finally, no individual can tell
companies how to run those communities, so most appeals to freedom of
expression are pointless. Not surprisingly, this is the direction in which Chinese
censorship is evolving. According to research done by Rebecca MacKinnon, who
studies the Chinese Internet at New America Foundation and is a former CNN
bureau chief in Beijing, censorship of Chinese user-generated content is "highly
decentralized," while its "implementation is left to the Web companies themselves".
To prove this, in mid-2008 she set up anonymous accounts on a dozen Chinese blog
platforms and published more than a hundred posts on controversial subjects, from
corruption to AIDS to Tibet, to each of them. MacKinnon's objective was to test if
and how soon they would be deleted. Responses differed widely across companies:
The most vigilant ones deleted roughly half of all posts, while the least vigilant
company censored only one. There was little coherence to the companies' behavior,
but then this is what happens when governments say "censor" but don't spell out
what it is that needs to be censored, leaving it for the scared executives to figure
out. The more leeway companies have in interpreting the rules, the more
uncertainty there is as to whether a certain blog post will be removed or allowed to
stay. This Kafkaesque uncertainty can eventually cause more harm than censorship
itself, for it's hard to plan an activist campaign if you cannot be sure that your
content will remain available. This also suggests that, as bad as Google and
Facebook may look to us, they still probably undercensor compared to most
Privacy Advantage
boils down to the following set of key questions, best answered by our Congress specifically the Intelligence
committees working with some other key committees after a searching inquiry and a series of hearings, as many
of them open as possible. Were the established and relevant laws, regulations and procedures complied with? Are
the established laws, regulations and procedures up to date for current Internet and other technologies? Is there
reason to add new laws, regulations and procedures? Is there a continued requirement based on public safety to
be able to do intrusive surveillance, including Internet surveillance, against spies, terrorists or criminals? In sum,
the idea that we have somehow "betrayed" or "subverted" the Internet (or the
telephone for that matter) is as my mom also used to say "just plain silly." Such kinds of
inaccurate statements are emotional and intended mostly for an audience with
preconceived opinions or that hasn't thought very hard about the dangerous
consequences of an Internet totally immune from surveillance . In fact, it
seems time for far less sensationalism primarily by the media and far more
objectivity. In the final analysis, my mom probably had it right: "Those kind of people, sure".
One of the legacies 2013 will leave behind, as Andrea Peterson wrote recently in The Washington Post, is that it was
allowed to continue without public scrutiny or reform, is a day in which rights are unduly sacrificed without the
informed consent of the public.
that isn't optimized for data collection and analysis. I would use Gmail for my email, if Google would let me pay for
service that didn't "analyze (my) content" apart from filtering out spam and malware. Google doesn't offer that
option, as far as I can tell, and that's a shame if not, given its clout, a small scandal. Also this week,
Advertising Age, a top trade journal for the ad industry, reported that tech
companies led by Google, Microsoft, Apple and Facebook are moving swiftly to fix
what they plainly see as a bug in the system: It's more difficult to spy on us as
effectively when we use our mobile devices than when we're typing and clicking
away on our laptops. Here's a particularly creepy quote in the story, courtesy of a mobile advertising
executive: The universal ID today in the world is your Facebook log-in. This industry-wide challenge of mobile
tracking has sort of quietly been solved, without a lot of fanfare. Facebook may be getting the message that
people don't trust it, which shouldn't be surprising given the company's long record of bending its rules to give
users less privacy. CEO Mark Zuckerberg told the New York Times' Farhad Manjoo that many upcoming products and
services wouldn't even use the name "Facebook," as the company pushes further and further into its users' lives.
The report concluded: If the new plan succeeds, then, one day large swaths of Facebook may not look like
Facebook and may not even bear the name Facebook. It will be everywhere, but you may not know it. Maybe.
But Facebook will know you. And like Google, Facebook won't let me pay for its otherwise excellent service,
something I'd gladly do if it would agree not to spy on me. Barring that, what I do to employ countermeasures
wherever possible, and to make choices in the services I use such as relying more and more on the DuckDuckGo
search engine. DuckDuckGo isn't as likely to give me the results I want as easily as Google, but it has proved to be
good enough for most purposes. But in a week when news organizations (like this one) won Pulitzer prizes for
elites, when all is said and done, the general public does not seem nearly as
concerned. Why? In an age dominated by various kinds of techno-utopianism the
conviction that networking technologies are politically and socially emancipatory
and that massive data collection will unleash both efficiency in business and
innovation in science the idea that Big Data might be your enemy is antithetical
to everything we have been encouraged to believe. A soon-to-be-attained critical
mass of algorithms and data has been portrayed as allowing individuals to
customize the choices they make throughout their lives. Now, the data sets and
algorithms that were supposed to set us free seem instead to have been turned
against us.
Facebook Users Experience Privacy Fatigue -- Facebook users are struggling to keep
up with the "dizzying" number of changes to privacy settings made by the social
network, a survey has found. Almost half (48%) of those questioned by consumer magazine Which? Computing
confessed they had failed to keep track of all the security changes that had been introduced, while almost a fifth
(19%) said they had never altered their privacy settings. Despite concerns about the amount of personal
information being published by users of the website, many could be suffering "privacy fatigue", the magazine
Although Facebook has introduced a slew of changes over the past two
years, respondents had on average changed their privacy settings just twice . Rob
suggested.
Reid, scientific policy adviser for Which?, said: "Many Facebook users have never changed their privacy settings and
those who have do it far less often than Facebook makes changes. "This
in terms of outrage, apathy and even ignorance. When interviewing people about the topic in downtown San
a number of people of all ages who had not heard the news, and
more than one who asked what the NSA was. The rest had various reasons for not
being terribly concerned. Privacy is already dead When the news broke on Wednesday, a
Francisco, we found
number of people responded online by saying an extensive government surveillance program wasn't surprising and
just confirmed what they already knew. The lack of shock wasn't limited to savvy technologists who have been
following reports from organizations like the Electronic Frontier Foundation, or EFF, that cover possible monitoring
that his information wasn't going to be private, but still lamented that privacy no longer exists. "I don't like it, but
what can I do about it?" he said. "I'm
government benefits, enter into a contract with any government unit, file a report in connection with environmental
Better coordination
might also be possible between governments at the local, state, national, and even
international levels. In the private sector, free flows of financial data also create efficiency gains. From a
or other regulatory programs, or otherwise transfer information to the government.
seller's point of view, detailed information about the buyer allows more efficient provision of goods and services.
Detailed information permits "one-to-one" marketing, so buyers get precisely what they most value, and so sellers
can avoid unwanted inventory and can produce exactly what buyers want. n87 Ever-expanding computing power and
the growth of the Internet mean that the costs of assembling, processing, and communicating personal data
continue to fall rapidly. As the private sector develops new means for processing personal information, the
information also becomes potentially available to the government. [*493] In the area of information processing, the
Morozov takes the ideas of what he calls cyber-utopians and shows how reality
perverts them in one political situation after another. In Iran, the regime used the
internet to crush the internet-driven protests in June 2009. In Russia, neofascists use
the internet to organize pogroms. And on and on. Morozov has written hundreds of
pages to make the point that technology is amoral and cuts many different ways.
Just as radio can bolster democracy or as in Rwanda incite genocide, so the
internet can help foment a revolution but can also help crush it. This seems obvious,
yet it has often been entirely lost as grand claims are made for the internets
positive, liberating qualities. And suddenly here are Tunisia and, even more
dramatically, Egypt, simultaneously proving and refuting Morozovs argument. In
both cases, social networking allowed truths that had been whispered to be widely
broadcast and commented upon. In Tunisia and Egypt and now across the Arab
world Facebook and Twitter have made people feel less alone in their rage at the
governments that stifle their lives. There is nothing more politically emboldening
than to feel, all at once, that what you have experienced as personal bitterness is
actually an objective condition, a universal affliction in your society that therefore
can be universally opposed. Yet at the same time, the Egyptian government shut
off the internet, which is an effective way of using the internet. And according to
one Egyptian blogger, misinformation is being spread through Facebook as it was
in Iran just as real information was shared by anti-government protesters. This is
the dark side of internet freedom that Morozov is warning against. It is the
freedom to wantonly crush the forces of freedom. All this should not surprise
anyone. It seems that, just as with every other type of technology of
communication, the internet is not a solution to human conflict but an amplifier for
all aspects of a conflict. As you read about pro-government agitators charging into
crowds of protesters on horseback and camel, you realize that nothing has changed
in our new internet age. The human situation is the same as it always was, except
that it is the same in a newer and more intense way. Decades from now, we will no
doubt be celebrating a spanking new technology that promises to liberate us from
the internet. And the argument joined by Morozov will occur once again.
New media, such as blogs, Twitter, Facebook, and YouTube, have played a major role
in episodes of contentious political action. They are often described as important
tools for activists seeking to replace authoritarian regimes and to promote freedom
and democracy, and they have been lauded for their democratizing potential.
Despite the prominence of Twitter revolutions, color revolutions, and the like in
public debate, policymakers and scholars know very little about whether and how
new media affect contentious politics. Journalistic accounts are inevitably
based on anecdotes rather than rigorously designed research. Although
data on new media have been sketchy, new tools are emerging that measure
linkage patterns and content as well as track memes across media outlets and thus
might offer fresh insights into new media. The impact of new media can be better
understood through a framework that considers five levels of analysis: individual
transformation, intergroup relations, collective action, regime policies, and external
attention. New media have the potential to change how citizens think or act,
mitigate or exacerbate group conflict, facilitate collective action, spur a backlash
among regimes, and garner international attention toward a given country.
Evidence from the protests after the Iranian presidential election in June 2009
suggests the utility of examining the role of new media at each of these five levels.
Although there is reason to believe the Iranian case exposes the potential benefits
of new media, other evidencesuch as the Iranian regimes use of the same social
network tools to harass, identify, and imprison protesterssuggests that, like any
media, the Internet is not a magic bullet. At best, it may be a rusty
bullet. Indeed, it is plausible that traditional media sources were equally if not
more important. Scholars and policymakers should adopt a more nuanced view of
new medias role in democratization and social change, one that recognizes that
new media can have both positive and negative effects. Introduction In January
2010, U.S. Secretary of State Hillary Clinton articulated a powerful vision of the
Internet as promoting freedom and global political transformation and rewriting the
rules of political engagement and action. Her vision resembles that of others who
argue that new media technologies facilitate participatory politics and mass
mobilization, help promote democracy and free markets, and create new kinds of
global citizens. Some observers have even suggested that Twitters creators should
receive the Nobel Peace Prize for their role in the 2009 Iranian protests.1 But not
everyone has such sanguine views. Clinton herself was careful to note when sharing
her vision that new media were not an unmitigated blessing. Pessimists argue
that these technologies may actually exacerbate conflict, as exemplified in
Kenya, the Czech Republic, and Uganda, and help authoritarian regimes monitor
and police their citizens. 2 They argue that new media encourage self-segregation
and polarization as people seek out only information that reinforces their prior
beliefs, offering ever more opportunities for the spread of hate, misinformation, and
prejudice.3 Some skeptics question whether new media have significant effects at
all. Perhaps they are simply a tool used by those who would protest in any event or
a trendy hook for those seeking to tell political stories. Do new media have real
consequences for contentious politicsand in which direction?4 The sobering
answer is that, fundamentally, no one knows. To this point, little research has
sought to estimate the causal effects of new media in a methodologically rigorous
fashion, or to gather the rich data needed to establish causal influence. Without
rigorous research designs or rich data, partisans of all viewpoints turn to
anecdotal evidence and intuition
The assumption that the uncensored accessibility of the Internet encourages the
struggle for democracy has to be differentiated. At first sight, the case studies seem
to confirm the statement, since Egypt, featuring a usually uncensored access to the
Internet, has witnessed mass mobilisations organised over the Internet while Tunisia
had not. However, the mere availability of freely accessible Internet is not a
sufficient condition insofar as mobilisations in Egypt took place when a relative
small portion of the population had Internet access and, on the other hand,
mobilisation witnessed a decline between 2005 and 2008 although the number of
Internet users rose during the same period. As there is no direct correlation
between increased Internet use and political action organised through this
medium, we have to assume a more complex relationship. A successful social
movement seems to need more than a virtual space of debate to be successful,
although such a space can be an important complementary factor in opening
windows and expanding the realm of what can be said in public. A political
movement revolves around a core of key actors, and "netizens" qualify for this task.
The Internet also features a variety of tools that facilitate the organisation of events.
However, to be successful, social movements need more than a well-organised
campaign. In Egypt, we witnessed an important interaction between print and
online media, between the representatives of a relative elitist medium and the
traditional, more accessible print media. A social movement needs to provide
frames resonating with grievances of the public coupled with periods of increased
public attention to politics in order to create opportunity structures. To further
transport their message and to attract supporters, a reflection of the struggle of the
movement with the government in the "classical" media such as newspapers and
television channels is necessary to give the movement momentum outside the
Internet context.
Solvency
No Solvency Circumvention
FISA will circumvent
Bendix and Quirk 15 (assistant professor of political science at Keene State
College; Phil Lind Chair in U.S. Politics and Representation at the University of British
Columbia)
(William Bendix and Paul J. Quirk, Secrecy and negligence: How Congress lost
control of domestic surveillance, Issues in Governance Studies, March 2015,
http://www.brookings.edu/~/media/research/files/papers/2015/03/02-secrecynegligence-congres-surveillance-bendix-quirk/ctibendixquirksecrecyv3.pdf)
Also permanent are National Security Letters or NSLs, which allow the FBI to obtain
a more limited range of telecommunications and financial records without even
needing to seek judicial approval. Unsurprisingly, the government loves these
streamlined tools, and used them so promiscuously that the FBI didnt even bother
using 215 for more than a year after the passage of the Patriot Act. Inspector
General reports have also made clear that the FBI is happy to substitute NSLs
for 215 orders when even the highly accommodating FISC manages a rare display
of backbone. In at least one case, when the secret court refused an application for
journalists records on First Amendment grounds, the Bureau turned around and
obtained the same data using National Security Letters.
First, the United States, like many countries, concentrates much of its surveillance
efforts abroad. Indeed, the Foreign Intelligence Surveillance Act is focused on
gathering information overseas, limiting data gathering largely only when it
implicates U.S. persons.174 The recent NSA surveillance disclosures have revealed
extensive foreign operations.175 Indeed, constraints on domestic operations may
well have spurred the NSA to expand operations abroad. As the Washington
Post reports, Intercepting communications overseas has clear advantages
for the NSA, with looser restrictions and less oversight.176 Deterred by a
2011 ruling by the Foreign Intelligence Surveillance Court barring certain broad
domestic surveillance of Internet and telephone traffic,177 the NSA may have
increasingly turned its attention overseas. Second, the use of malware eliminates
even the need to have operations on the ground in the countries in which
surveillance occurs. The Dutch newspaper NRC Handelsblad reports that the NSA
has infiltrated every corner of the world through a network of malicious
malware.178 A German computer expert noted that data was intercepted here [by
the NSA] on a large scale.179 The NRC Handelsblad suggests that the NSA has
even scaled the Great Firewall of China,180 demonstrating that efforts to keep
information inside a heavily secured and monitored ironclad firewall do not
necessarily mean that it cannot be accessed by those on the other side of the earth.
This is a commonplace phenomenon on the Internet, of course. The recent
enormous security breach of millions of Target customers in the United States likely
sent credit card data of Americans to servers in Russia, perhaps through the
installation of malware on point-of-sale devices in stores.
Such moves are destined to have only a modest effect on foreign reactions. U.S.
surveillance will inevitably continue under any reasonably likely scenario
(indeed, despite the expressions of outrage, not a single country has said that it
would cease its surveillance activities). Many of the demands such as for greater
transparency will not be met, simply due to the clandestine nature of electronic
espionage. Any limits on surveillance that a govern- ment might announce will
not be publicly verifiable and thus perhaps not fully credible. Nor will there be an
international no-spying convention to reassure foreign citizens that their
communications are unmonitored. As it has for centuries, state- sponsored
espionage activities are likely to remain accepted international practice,
unconstrained by international law. The one major possible shift in policy following
the Snowden affair a stop to the bulk collection of telecommunications metadata
in the United States will not constrain the activ- ity most disturbing to foreigners;
that is, Americas surveillance of them. At the same time, U.S. offi- cials are
highly unlikely to articulate a global right to privacy (as have the U.N. High
Commissioner for Human Rights and some foreign officials), akin to that derived
from the U.S. Constitutions fourth amendment, that would permit foreigners to sue
in U.S. courts to enforce such a right.39 The Obama administrations January 2014
presidential directive on signals intelligence refers, notably, to the legiti- mate
privacy interests of all persons, regardless of nationality, and not to a privacy
right.40
Two months later, many of the same companies and organizations issued another
letter supporting surveillance transparency legislation proposed by Senator Al
Franken (D-MN) and Representative Zoe Lofgren (D-CA) that would have
implemented many of the original letters recommendations.334 Elements of both
bills, consistent with the coalitions recommendations, were included in the original
version of the USA FREEDOM Act introduced in the House and the Senateas were
new strong transparency provisions requiring the FISA court to declassify key legal
opinions to better educate the public and policymakers about how it is interpreting
and implementing the law. Such strong new transparency requirements are
consistent with several recommendations of the Presidents Review Group335 and
would help address concerns about lack of transparency raised by the UN High
Commissioner for Human Rights.336