Evidence version 5

March 11, 2018 | Author: Anonymous | Category: Social Science, Political Science, Government
Share Embed Donate


Short Description

Download Evidence version 5...

Description

Table of Contents Topicality ....................................................................................................................................................... 8 Definitions: Above................................................................................................................................. 9 Ought: Stock Definitions ..................................................................................................................... 10 Ought implies Consequentialism ........................................................................................................ 11 Ought implies Contractarionism ......................................................................................................... 12 Ought Implies Kantian Ethics .............................................................................................................. 13 Ought Implies Naturalism (Meta Ethics) ............................................................................................. 14 Ought implies Rights ........................................................................................................................... 15 Definition of Pursuit ............................................................................................................................ 16 Definition of “Security Threat” ........................................................................................................... 17 “National Security” is Resisting Hostile Action ................................................................................... 18 National Security is Cybersecurity, terrorism, and nuclear weapons ................................................. 19 National Security includes Human Trafficking .................................................................................... 20 “Digital Privacy” .................................................................................................................................. 21 Citizens ................................................................................................................................................ 22 Aff ................................................................................................................................................................ 23 National Security ..................................................................................................................................... 24 National Security Does Not Outweigh Privacy ....................................... Error! Bookmark not defined. Privacy ..................................................................................................................................................... 26 No Right to Privacy – Reductionst Legal Theory Proves ..................................................................... 27 No Right to Privacy-Constitution......................................................................................................... 28 Limits In Place Prevent Loss of Digital Privacy .................................................................................... 29 Public/Private Distinction Allows Domestic Violence ......................................................................... 31 Terrorism................................................................................................................................................. 32 Digital Surveillance Stops Inevitable Terrorist Attack ........................................................................ 33 Digital Surveillance Key to Stopping Al Qaeda .................................................................................... 34 Digital Surveillance Solves Terrorism (1/2) ......................................................................................... 35 Digital Surveillance Solves Terrorism (2/2) ......................................................................................... 36 Preventing Terrorism Necessitates Domestic Spying ......................................................................... 38 Terrorists Use the Internet to Plan Attacks (1/2)................................................................................ 39 Terrorists Use the Internet to Plan Attacks (2/2)................................................................................ 42 The Internet is Key to Terrorist Communication ................................................................................ 43 Internet Key to Terrorist Funding ....................................................................................................... 44

Internet Key to Terrorist Education .................................................................................................... 45 Cyberterror Impacts: Economy ........................................................................................................... 46 Uniqueness: Risk of Terrorism is High................................................................................................. 47 A2: Terrorists Are Not Tech Savvy ...................................................................................................... 51 A2: Digital Surveillance of Terrorists Outside of US ............................................................................ 52 Cyberattacks ........................................................................................................................................... 55 Cyberattack Impacts: Laundry List ...................................................................................................... 57 Cyberattack Impacts: Terrorists are a Threat ..................................................................................... 58 Cyberattack Impacts: North Korea Is a Threat .................................................................................... 59 Cyberattack Impacts: Iran Is a Threat ................................................................................................. 60 Cyberattack Impact: US Retaliation .................................................................................................... 61 Cyberattack Impacts: Harms National Security .................................................................................. 62 Cyberattack Impacts: Economy........................................................................................................... 63 Cyberattack Impacts: Hurt Businesses ................................................................................................ 65 Cyberattack Impacts: Infrastructure ................................................................................................... 66 Cyberattack Impacts: Mass Death ...................................................................................................... 68 Cyberattack Impacts: Mass Death ...................................................................................................... 69 Cyberattack Impact: Prevents Retaliation .......................................................................................... 70 A2: Cannot Stop Cyberattack .............................................................................................................. 71 Solvency: Digital Surveillance Solves Cyberattacks............................................................................. 72 Cybercrime .............................................................................................................................................. 73 Cybercrime Impacts: Hurts Economy.................................................................................................. 74 Cybercrime Impacts: Worse than Physical Crime ............................................................................... 75 Hackers.................................................................................................................................................... 76 Hackers Destroy Privacy ...................................................................................................................... 77 A2: Hacktivism Good ........................................................................................................................... 78 Prism ....................................................................................................................................................... 79 Prism Solves Terrorism........................................................................................................................ 87 Prism Solves Terrorism........................................................................................................................ 88 A2: Prism Destroys All Privacy............................................................................................................. 91 A2: Congress is Reigning in Prism/NSA Spying.................................................................................... 92 A2: Data Collection Leads to Government Oppression ...................................................................... 93 Espionage ................................................................................................................................................ 94 Espionage-Russia................................................................................................................................. 95 Espionage-China.................................................................................................................................. 96

China Espionage Impact: Innovation .................................................................................................. 98 China Espionage Impact: Competitiveness ....................................................................................... 100 China Espionage Impact-Media ........................................................................................................ 101 Espionage-Iran .................................................................................................................................. 102 A2: Economic Espionage Isn’t Happening ......................................................................................... 103 Patriot Act ............................................................................................................................................. 104 Patriot Act Upholds the Social Contract ........................................................................................... 105 Patriot Act Balances National Security and Privacy .......................................................................... 106 Patriot Act Good – Computer Trespasser Exception Stops Hackers ................................................. 107 A2-“Patriot Act Violates Liberties” .................................................................................................... 108 FISA Upholds 1st Amendment Protections ....................................................................................... 110 CIPSA ..................................................................................................................................................... 111 A2: Endless Invasion of Privacy ......................................................................................................... 112 Wire Taps .............................................................................................................................................. 114 Wiretaps Solve Terrorism ................................................................................................................. 115 Wiretaps Solve Crime ........................................................................................................................ 116 Human Trafficking ................................................................................................................................. 117 Impacts – Children are Trafficked ..................................................................................................... 118 Solvency: Mobile Phone Searches Solve Human Trafficking ............................................................ 119 A2: Tracking pre-paid phones is against the fourth amendment ..................................................... 120 Crime Impacts ....................................................................................................................................... 121 Impacts: Organized Crime Hurts National Security .......................................................................... 122 Organized Crime Destroys Rule of Law ............................................................................................. 127 Drug Trade Impacts: Drugs & Crime Destroy Society – Laundry List ................................................ 128 Drug Trade Impacts: Drug Money Fuels Terrorism ........................................................................... 129 Drug Trade Impacts: Drug Trade Causes Latin American Instability ................................................ 131 Gangs Impacts: Gangs Cause Crime .................................................................................................. 132 Gangs Impacts: Gangs Key to Drug Trade ......................................................................................... 133 Solvency: Digital Surveillance Solves Organized Crime..................................................................... 134 Wikileaks Harms National Security ....................................................................................................... 135 Wikileaks Threatens National Security ............................................................................................. 136 Wikileaks Threatens National Security ............................................................................................. 138 Wikileaks Helps Terrorists ................................................................................................................. 139 Wikileaks Hurts US-Pakistani Relations ............................................................................................ 140 A2: Wikileaks Solves For Transparency ............................................................................................. 141

A2: Wikileaks Solves For Transparency ............................................................................................. 142 Digital Surveillance Solvency................................................................................................................. 143 Data Collection is Key to Cyber Security Technology........................................................................ 144 A2: Tor Prevents Digital Surveillance ................................................................................................ 145 Transparency......................................................................................................................................... 146 Uniqueness: Privacy Decreasing Now ............................................................................................... 147 Uniqueness: Privacy Violations Inevitable ........................................................................................ 149 Transparency Impacts: Key to Economy ........................................................................................... 151 Now is the Key Time for Transparency ............................................................................................. 152 Link: Pretending Privacy Exists Masks Surveillance (1/2) ................................................................. 154 Link: Pretending Privacy Exists Masks Surveillance (2/2) ................................................................. 156 Alternative Solvency: Transparency Checks Government Oppression (1/2) .................................... 157 Alternative Solvency: Transparency Checks Government Oppression (2/2) .................................... 159 Impacts: Government Secrecy Hurts Government Effectiveness ..................................................... 160 A2: Leaks Bad – They’re Impossible to Stop ..................................................................................... 161 A2: Schneier/”Transparency Destroys Privacy” ................................................................................ 162 Neg ............................................................................................................................................................ 172 Constitutionality.................................................................................................................................... 173 Digital Surveillance Violates 4th Amendment.................................................................................... 174 Privacy ................................................................................................................................................... 176 Privacy is a Human Right ................................................................................................................... 177 Privacy is a Natural Right .................................................................................................................. 178 Right to Privacy Exists – Constitution Proves (1/2) ........................................................................... 179 Right to Privacy Exists – Constitution Proves (2/2) ........................................................................... 180 Right to Privacy Exists – Private Property and Artistic Creation Prove ............................................. 181 Privacy is a Social Good ..................................................................................................................... 182 Privacy Outweighs National Security ................................................................................................ 183 Privacy Impacts: Totalitarianism ....................................................................................................... 185 Privacy Impacts: Autonomy (1/2) ..................................................................................................... 187 Privacy Impacts: Autonomy (2/2) ..................................................................................................... 188 Privacy Impacts: Human Dignity ....................................................................................................... 189 Privacy is a Prerequisite to Rights and Autonomy ............................................................................ 190 Privacy Impacts: Normalization ........................................................................................................ 191 Browser Fingerprinting ..................................................................................................................... 192 Collecting Information Violates Privacy ............................................................................................ 193

Centralized Databases Violate Privacy .............................................................................................. 194 A2: “We Consent to Surveillance” .................................................................................................... 195 Digital Surveillance Bad......................................................................................................................... 196 Electronic Surveillance Prevents Free Society .................................................................................. 197 Surveillance Violates Separation of Powers...................................................................................... 198 Digital Surveillance Hurts US Competitiveness ................................................................................. 199 Surveilance Ineffective-Terrorists .............................................................. Error! Bookmark not defined. Digital Surveillance Does Not Stop Terrorism ................................................................................... 208 Equal Prioritization................................................................................................................................ 219 Hackers.................................................................................................................................................. 220 No Impact to Hackers: Encryption Solves ......................................................................................... 221 Hackers Good-Anonymous ............................................................................................................... 222 Cyberattacks ......................................................................................................................................... 224 No Impact to Cyberattacks: Threat Overblown (1/2) ....................................................................... 225 No Impact to Cyberterror: Threat Overblown (2/2) ......................................................................... 226 Tech Bad................................................................................................................................................ 228 Patriot Act ............................................................................................................................................. 231 Patriot Act Violates Privacy – “Sneak & Peak Searches” .................................................................. 232 WikiLeaks .............................................................................................................................................. 233 A2: Threatens US Diplomacy ............................................................................................................. 234 Shield Laws ............................................................................................................................................ 235 Shield Laws Key to First Ammendment ............................................................................................ 236 A2: Terrorism ............................................................................................. Error! Bookmark not defined. Islamic Terror is Not a Threat............................................................................................................ 204 Domestic Terrorism Is Not a Threat .................................................................................................. 205 Digital Surveillance Does Not Stop Terrorism ................................................................................... 206 Terror Discourse is Bad ..................................................................................................................... 207 Economy................................................................................................................................................ 237 Internal Link: Technological Innovation is Key to the Economy ....................................................... 248 Agamben ............................................................................................................................................... 249 Link: Digital Technology .................................................................................................................... 259 Impacts: State of Exception Destroys All Rights (1/2) ...................................................................... 261 Impacts: State of Exception Destroys All Rights (2/2) ...................................................................... 262 Impacts: State of Exception Allows for Atrocities ............................................................................. 263 Framework ................................................................................................................................................ 273

Autonomy ............................................................................................................................................. 274 Autonomy Requires Freedom from Negative Restraints .................................................................. 275 Autonomy is a Prerequisite to Morality ............................................................................................ 276 Autonomy-Protects Free Speech ...................................................................................................... 278 Autonomy-Individual ........................................................................................................................ 279 Autonomy-Consent Necessary for Morality ..................................................................................... 280 A2: Prefer Justice .............................................................................................................................. 282 Maslow’s Hierarchy of Needs ............................................................................................................... 283 Maslow’s Hierarchy Does Not Exist .................................................................................................. 284 Morality................................................................................................................................................. 285 Morality: Deontology is Best – Rights Prove ..................................................................................... 286 Morality: Intention is Key to Morality............................................................................................... 287 Utilitarianism is best for Determining Political Morality .................................................................. 288 Consequentialism is best for Determining Morality of Policies ........................................................ 289 A2: Human Rights/Rights More Important Than Consequentialism ................................................ 290 Social Contracts..................................................................................................................................... 291 Social Contracts Must be Backed by Force ....................................................................................... 293 Social Contracts Balance Individualism and Cooperation ................................................................. 294 Social Contracts Protect Justice and Rule of Law.............................................................................. 295 Social Contract Requires Protection of Citizen’s Property................................................................ 296 Conractarianism Protects Governments and Society ....................................................................... 297 A2: Utilitarianism Upholds Social Contract ....................................................................................... 298 Justice.................................................................................................................................................... 299 Kantian Justice Requires Restrictions on Freedom by Laws ............................................................. 300 Upholding the “Common Good” is Impossible (1/2) ........................................................................ 301 Upholding the “Common Good” is Impossible (2/2) ........................................................................ 302 Justice Balances Individualism and Cooperation .............................................................................. 303 Freedom/Liberty ................................................................................................................................... 304 Value of Freedom: Freedom and Liberty are Different .................................................................... 305 Security ................................................................................................................................................. 306 Human Security More Important than State Security ...................................................................... 307 Government Must Not Violate Liberty ............................................................................................. 308 Meta-Ethics ............................................................................................................................................... 319 Naturalism............................................................................................................................................. 320 Naturalism Determines Morality ...................................................................................................... 321

Hardwired For Survival...................................................................................................................... 322 Error Theory .......................................................................................................................................... 323 Error Theory Guides Morality ........................................................................................................... 324 Quasi- Realism....................................................................................................................................... 326 Legality .................................................................................................................................................. 327 Law Determines Morality.................................................................................................................. 328 Rule of Law ........................................................................................................................................ 329

Topicality

Definitions: Above Above means to have a higher rank Merriam-webster.2013, “Above-Definition and More from the Merriam Webster Free dictionary.” http://www.merriam-webster.com/dictionary/above 3¶ : in or to a higher rank or number

Ought: Stock Definitions Ought implies Moral Obligation Merriuam Webster dictionary, 2013, (http://www.merriam-webster.com/dictionary/ought) Ought- used to express obligation Ought- moral obligation

Reasons to prefer 1. Most common sense definition- First Known Use: 12th century, this tells us that this form of definition has been appropriate for a long time. 2. Meriam Webster is a total access dicitionairy- everybody can access it meaning that people have the ability to get the definition. 3. For more than 150 years, in print and now online, Merriam-Webster has been America's leading and most-trusted provider of language information. 4. All Merriam-Webster products and services are backed by the largest team of professional dictionary editors and writers in America, and one of the largest in the world.

Ought is defined as mandatory. Black’s Law Dictionary. http://thelawdictionary.org/ought/ This word, though generally directory only, will be taken as mandatory if the context requires it. Life Ass’n v. SL Louis County Assessors, 49 Mo. 518.

Ought implies Consequentialism Ought is a propositional operative that questions if a consequence from an action is desirable Wedgwood argues. (Ralph, English prof @ carniege melon, “modern day morals.” No date, http://wwwbcf.usc.edu/~wedgwood/meaningofought.htm) “We can avoid all these problems if we treat ‘ought’ in as a propositional operator. Grammatically, ‘ought’ in English is an auxiliary verb, like the modal auxiliaries ‘can’ and ‘must.’ When an occurrence of ‘ought’ modifies the main verb of a sentence, it can be taken as a propositional operator applying to the proposition that would be expressed by the unmodified form of that sentence. Thus, the sentence drinking water ought to be clean and safe in ‘ought’ is a propositional operator applying to the proposition that would be expressed by the sentence ‘drinking water is clean and safe’”

Ought implies Contractarionism The governmental obligation focuses on what the people want Terrence O. Moore, Professor of History at Hillsdale College, degree from u of Chicago, “What Ought Government to Do (and Not Do)?: Why We Need to Read John Locke” September 1, 2011, http://ricochet.com/main-feed/What-Ought-Government-to-Do-and-Not-Do-Why-We-Need-to-ReadJohn-Locke Locke’s considerable narrowing of the scope of government is famously echoed in the Declaration of Independence with these words: “That to secure these rights [Life, Liberty and the pursuit of Happiness], Governments are instituted among Men.” Securing rights is what government is supposed to do. Whenever government exceeds the scope of its original compact or commission, people’s liberty is in danger. Now it is true that a people may consent to employ government to do any number of things which seem legitimate. But watch out! The oldest trick in the democratic playbook is for a larger group of people to get together and consent to take the smaller group’s property. ¶ The Lockean idea of limited government compels us to ask the question: what is government for—and what is it not for? Allowing for the fact that there may be any number of functions for government at the state and local levels (via the Founders’ invention of federalism), what ought thefederal government to do and what ought it not to do? Voters on the Right need to be specific about what their candidates should do (and undo) once elected lest vague promises of reduced government spending go nowhere and further electoral victories be wasted.

Ought Implies Kantian Ethics Kant defines ought as requiring an imperative. Hurford, Peter. Political Science and Psychology Major at Denison University. November 4, 2011. The Meaning of Ought, Part I. http://www.greatplay.net/essays/the-meaning-of-ought-part-i Kant described “ought” as referring to an imperative, defining two types: a hypothetical imperative and a categorical imperative:¶ A hypothetical imperative is in the form “If you desire X, you ought to preform action Y”. For instance, “If you value the lives of others, you ought to not murder people” or “If you value freedom, you ought not to restrict the speech of others”. It is an ought statement characterized by a conditional.¶ A categorical imperative is in the form “You ought to preform action Y (regardless of what you believe or desire)”. For instance, “You ought not to lie” or “You ought not to steal”. It is a pure, unconditional ought statement.

Ought Implies Naturalism (Meta Ethics) Ought does not imply morality, natural ethics are more clear. Beavers, Anthony F. Written for the International Digital Ethics Symposium, Center for Digital Ethics and Policy, School of Communication, Loyola University. Chicago, October 28th, 2011. Could and Should the Ought Disappear from Ethics? http://www.academia.edu/1011404/Could_and_Should_the_Ought_Disappear_from_Ethics Terra Firma¶ In 2007, Anderson and Anderson wrote, “As Daniel Dennett (2006) recently stat-ed, AI ‘makes philosophy honest.’ Ethics must be made computable in order to make it clear exactly how agents ought to behave in ethical dilemmas” (16). To rephrase their sentiment, a computable system or theory of ethics serves to make ethics honest. As I have observed elsewhere (Beavers 2010), it is common among machine ethicists to note that research in computational ethics can help us better understand ethics in the case of human beings. This is because of what we must know about ethics in general to build machines that operate within normative pa-rameters. Unclear intuitions will not do where engineering specifications and computational clarity are required. So, machine ethicists are forced head on to en-gage in moral philosophy. Their effort, of course, hangs on a careful analysis of ethical theories, the role of affect in making moral decisions, relationships be-tween agents and patients, and so forth. But this is not all. There are other meta-ethical difficulties that must be addressed as well concerning, particularly, the nature of the moral ought and the necessary and sufficient conditions for moral agency. Every moral theory makes assumptions about these issues, but, to date, without the clarity that real-world, working specifications for practical application require. Thus, computational ethics provides us with the¶ terra firma¶ needed to get some solid footing in the otherwise vague and messy domain of ethics and helps us answer the question of whether (and if so, to what extent) we may have been duped by morality.¶ My conclusion here will be that yes, we have been duped, at least in part. As such, I am departing from Beavers 2009 & 2011, where I suggested that we¶ might ¶ (another past subjunctive) have been in order to argue for something more definite. This conclusion will be an unhappy one for many, since it will involve throwing out an age-old distinction between being good and merely acting so that has been at the heart of ethics (according to the dominant Western paradigm)from its inception. My argument will unfold in three parts: the first will address the question of moral agents (MAs) in general, after which I will examine what precisely¶ ought ¶ implies when viewed from a moral perspective to isolate what I will identify as the paradox of automated moral agency (P-AMA). Next to avoid the paradox we will need to define the¶ ought ¶ technically, not morally, a distinction I am partially borrowing from Kant and will make clear later, with the result that we are left with the sufficiency argument (SA), which states that moral interiority is a sufficient but not necessary condition for moral agency. If this argument holds, then the kind of moral interiority that allows an agent to be culpable for its actions is not necessary for ethics. It is rather a product of our biology that drives humans to be ethical, but it is not the only way this can be done. My motive in taking this approach is that the problems we are facing as a world are so great that it is time to put aside the “blame game” and confront them with some sort of no-fault ethics, the details of which have largely been worked out by Floridi (1999and 2002) and Floridi and Sanders (2001 and 2004), though more work needs to be done here to draw out the implications where blame and fault are concerned.

Ought implies Rights Ought is derived from our rights, if we have the right, we have an obligation to act. Gewirth Alan, a professor of philosophy at the University of Chicago, “THE 'IS-OUGHT PROBLEM RESOLVED.”, Proceedings and Addresses of the American Philosophical Association, Vol. 47 (1973 -¶ 1974), pp. 34-61, jstor) I have here presented, then, a complex version of what I have ¶ called the internal model of the relation between 'ought' and 'is'. ¶ I have not directly defined 'ought' in terms of'is'; rather, I have ¶ held that the application of 'ought' is entailed by the correlative ¶ concept of having a right. The agent's application of this concept, ¶ in turn, has been derived from the concept of goods which are the ¶ necessary conditions of all his actions, since he necessarily claims ¶ that he has a right to at least these goods. And the agent's applica- ¶ tion of the concept of good, finally, has been derived from his ¶ acting for purposes. Since the agent's assertion that he acts for ¶ purposes is an empirical, descriptive statement, I have in this ¶ indirect way derived 'ought' from 'is'. Whether the derivation is at ¶ each point definitional or is rather of some other non-arbitrary ¶ sort does not materially affect my argument, so long as its neces- ¶ sary relation to the context of action is recognized.

Definition of Pursuit Trying to Achieve Something Oxford Dictionary (2013, Oxford University Press, http://oxforddictionaries.com/definition/english/pursuance?q=pursuance) the action of trying to achieve something:

Pursuit of Security includes Cost David A. Baldwin, 1997, Columbia University Department of Political Science, “The Concept of Security”, Review of International Studies, Jstor, http://www.jstor.org/stable/20097464

The pursuit of security always involves costs, i.e., the sacrifice of other goals that could have been pursued with the resources devoted to security. Specification of this dimension of security policy is important because writers sometimes imply that costs do not matter. One writer, for example, defines national security in terms of the protection of core values, which he describes as 'interests that are pursued not withstanding the costs incurred'.55 From the standpoint of a rational policymaker, however, there are no such interests. Costs always matter.

Definition of “Security Threat” Security threats include Natural Disasters. David A. Baldwin, 1997, Columbia University Department of Political Science, “The Concept of Security”, Review of International Studies, Jstor, http://www.jstor.org/stable/20097464 In ordinary language, however, one

often finds references to epidemics, floods, earth quakes, or droughts as 'threats' to acquired values. Ullman and others have argued hat the concept of security should be expanded to include such phenomena. There seems to be no reason not to use this more expansive concept of threats, especially since it comports with common usage. Those who wish to refer to conditional commitments to punish by social actors as security threats may make that clear when specifying this dimension of security.

“National Security” is Resisting Hostile Action “National security” includes activities that threaten society Department of Defense Dictionary of Military and Associated Terms. No Date (“national security”. Accessed 17 July 13. http://www.dtic.mil/doctrine/dod_dictionary/data/n/5673.html) A collective term encompassing both national defense and foreign relations of the United States. Specifically, the condition provided by: a. a military or defense advantage over any foreign nation or group of nations; b. a favorable foreign relations position; or c. a defense posture capable of successfully resisting hostile or destructive action from within or without, overt or covert. See also security.

National Security is Cybersecurity, terrorism, and nuclear weapons The 2013 national security strategy highlights security issues as cyber space, terrorism and nuclear weapons. NSSA writes 2013 (“National Security Strategy 2013” pg 6, DoP: 2013, DoA: 7/17/13, http://www.utexas.edu/lbj/sites/default/files/file/news/National%20Security%20Strategy%202013%20( Final%20Draft).pdf) This document details the international environment the United States faces ¶ moving forward and depicts how we can navigate a peaceful and stable order in ¶ the future by leading the global economy, protecting critical global strategic ¶ interests, and maximizing the disposition and strength of our military. ¶ Furthermore, the

analysis of emerging and persistent national security issues –¶ cyberspace, terrorism, and nuclear weapons – emphasizes the opportunity of ¶ American leadership.

National Security includes Human Trafficking National security includes human trafficking ARTHUR RIZER, Arthur Rizer is a Trial Attorney with the United States Department of Justice. “Breach: The National Security Implications of Human Trafficking” 2011, http://widenerlawreview.org/files/2011/03/Rizer-Glaser.pdf Expanding on this concept, former government official

Joseph Romm41¶ argues that national security relates to events that “(1) threaten drastically and ¶ over a relatively brief span of time to degrade the quality of life for the ¶ inhabitants of a state, or (2) threaten significantly to narrow the range of policy ¶ choices available to the government of a state.”42 “Consequently, Romm ¶ includes on the national security agenda issues of global warming [and] energy ¶ security” 43 and May even include, as this article argues, human trafficking. ¶ Anything could arguably affect the “way of life” of the American people. ¶ However, because President Clinton’s and Mr. Romm’s portrayal of national ¶ security focuses more on the people of the United States, rather than President ¶ Bush’s general “interests around the globe,” we believe that President ¶ Clinton’s and, more specifically, Mr. Romm’s definition of national security is ¶ more appropriate for the subject at hand.

“Digital Privacy” Digital privacy is defined as a protection of citizens’ privacy WiseGeek Online. 2013. What Is Digital Privacy? http://www.wisegeek.com/what-is-digitalprivacy.htm The concept of digital privacy can best be described as the protection of the information of private citizens who use digital mediums. However, when people speak about digital privacy, they often are referring to it in terms of its relation to Internet usage. Despite it being a popular and often incendiary issue, the obstacle of defining what digital privacy really is can prevent resolution.¶ Digital privacy centers on the fact that using digital mediums to conduct affairs, whether personal or professional, can leave digital footprints. For example, many Internet users don't realize that information about them and their Internet usage habits are constantly being logged and stored. A computer's Internet Protocol (IP) address can be traced back to a specific user and, as such, his website viewing habits can be monitored. Information such as the date and time of his searches, what browser he used to access websites and even how long he viewed websites can be retained on a search engine's servers. Servers can vary in the length of time they store this information before deleting it.

Citizens A citizen is defined as someone who is either born in the U.S. or is naturalized. U.S. Citizenship and Immigration Services. 01/17/2013. Citizenship. http://www.uscis.gov/portal/site/uscis/menuitem.eb1d4c2a3e5b9ac89243c6a7543f6d1a/?vgnextoid=a 2ec6811264a3210VgnVCM100000b92ca60aRCRD&vgnextchannel=a2ec6811264a3210VgnVCM100000b 92ca60aRCRD If you meet certain requirements, you may become a U.S. citizen either at birth or after birth. ¶ To become a citizen at birth, you must:¶ Have been born in the United States or certain territories or outlying possessions of the United States, and subject to the jurisdiction of the United States; OR ¶ had a parent or parents who were citizens at the time of your birth (if you were born abroad) and meet other requirements¶ To become a citizen after birth, you must:¶ Apply for “derived” or “acquired” citizenship through parents¶ Apply for naturalization¶ For more information, see USCIS Policy Manual Citizenship and Naturalization Guidance. ¶ The Naturalization Test¶ Most naturalization applicants are required to take a test on:¶ English¶ Civics (U.S. history and government)

An American citizen is one who constitutionally belongs to the United States. Smith, Roger M. Alfred ¶ Cowles Professor of ¶ Government at Yale ¶ University. 1985. The Meaning of American Citizenship. http://www.apsanet.org/imgtest/americancitizenship.pdf What does it mean to say, "I am an American citizen?" The law supplies ¶ dry technical answers: the statement means that one falls under a ¶ constitutional or statutory category conferring full membership in the ¶ American polity. The chief ones are, with minor exceptions, birth within ¶ the United States, which confers citizenship under the Fourteenth ¶ Amendment, plus birth to American parents overseas, and ¶ naturalization, categories regulated by federal statutes.

Aff

National Security

Americans Support National Security Efforts American citizens support national security efforts even in light of civil liberties. Knickerbocker, Brad. He’s been the San Francisco bureau chief, Washington bureau news manager and Pentagon correspondent, National News Editor, and Chief Editorial Writer. June 9, 2013. “How do Americans feel about NSA surveillance? Ambivalent.” Date accessed: July 29, 2013. Since the terrorist attacks of 9/11, the public has been generally supportive of national security efforts – sometimes finding those more important than any concern about privacy and other things dear to civil liberties advocates. “Voters give government leeway to snoop” reads the headline on James Hohmann’s piece on Politico.com. “Privacy is sort of like the deficit: In the abstract, voters rate it a serious concern,” Mr. Hohmann writes. “But drill down, and they don’t want to cut the entitlements that balloon federal spending – or end programs that have prevented terrorist attacks.

Especially if Americans don’t believe their own computers and phones are being monitored, they are willing to give the government a long leash.” “I wouldn’t want to minimize the concern over privacy at all because it’s definitely there. But at the same time, especially in

the wake of Boston and the constant threat people are feeling … protection is foremost,” Carroll Doherty, associate director of the Pew Research Center for the People and the Press, told Politico. “In this general tradeoff, when push comes to shove … more people consistently since 9/11 said protecting the country is a greater concern than restricting civil liberties.” John Dickerson at Slate takes a similar line, headlining his piece “Why Americans Don’t Fear the NSA.” “Polls suggest that people often support measures to catch terrorists that infringe on civil liberties,” he writes. “In a New York Times/CBS poll taken after the Boston Marathon bombing, 78 percent of people said surveillance cameras were a good idea. A CNN poll taken a month later showed the same support for cameras….” "It's important to recognize that you can't have 100 percent security and also then have 100 percent privacy and zero inconvenience," President Obama said the other day. "I think the American people understand that there are some trade-offs involved.”

Americans are comfortable with trading off privacy for security Pew Research Center for the People and the Press “Majority Views NSA Phone Tracking a s Acceptable Anti-terror Tactic” 2013 A majority of Americans – 56% – say the National Security Agency’s (NSA) program tracking the telephone records of millions of Americans is an acceptable way for the government to investigate terrorism, though a substantial minority – 41% – say it is unacceptable. And while the public is more evenly divided over the government’s monitoring of email and other online activities to prevent possible terrorism, these views are largely unchanged since 2002, shortly after the 9/11 terrorist attacks. The latest national survey by the Pew Research Center and The Washington Post, conducted June 6-9 among 1,004 adults, finds no indications that last week’s revelations of the government’s collection of phone records and internet data have altered fundamental public views about the tradeoff between investigating possible terrorism and protecting personal privacy. Currently 62%

say it is more important for the federal government to investigate possible terrorist threats, even if that intrudes on personal privacy. Just 34% say it is more important for the government not to intrude on personal privacy, even if that limits its ability to investigate possible terrorist threats. These opinions have changed little since an ABC News/Washington Post survey in January 2006. Currently, there are only modest partisan differences in these opinions: 69%

of Democrats say it is more important for the government to investigate terrorist threats, even at the expense of personal privacy, as do 62% of Republicans and 59% of independents. However, while six-in-ten or more in older age groups say it is more important to investigate terrorism even if it intrudes on privacy, young people are divided: 51% say investigating terrorism is more important while 45% say it is more important for the government not to intrude on personal privacy, even if that limits its ability to investigate possible threats. The survey finds that while there are apparent differences between the NSA surveillance programs under the Bush and Obama administrations, overall public reactions to both incidents are similar. Currently, 56% say it is acceptable that the NSA “has been getting secret court orders to track telephone calls of millions of Americans in an effort to investigate terrorism.” In January 2006, a few weeks after initial new reports of the Bush administration’s surveillance program, 51% said it was acceptable for the NSA to investigate “people suspected of involvement with terrorism by secretly listening in on telephone calls and reading e-mails between some people in the United States and other countries, without first getting court approval to do so.” However, Republicans and Democrats have had very different views of the two operations.

Privacy

No Right to Privacy – Reductionst Legal Theory Proves Reductionism disregards privacy as a right Casman, Betsey Sue. Master of Arts in Ethics and Policy Studies. 2011. "The Right to Privacy in Light of the Patriot Act and Social Contract Theory". http://digitalscholarship.unlv.edu/cgi/viewcontent.cgi?article=2087&context=thesesdissertations. Date Accessed 7/21/13. There are two prevailing theories in the literature discussing the right to privacy: ¶ reductionism and coherentism. The reductionist view is based on the idea that privacy is ¶ essentially an inconsequential argument. Privacy, in and of itself, is not a specific right, ¶ just merely part of another right, therefore claims made citing a right to privacy should ¶ not and can not be honored. Edmund Byrne identifies reductivist privacy theorists in the ¶ legal field as those who believe that legal claims to privacy can all be resolved by other ¶ areas of law (Alfino, 2003).

No Right to Privacy-Constitution There is no constitutional basis for the right to privacy. Harold R. DEMOSS JR, DeMoss practiced law in Houston for 34 years before being appointed in 1991 by former President George H.W. Bush to the 5th U.S. Circuit Court of Appeals, where he now serves., “Constitutional right to privacy a figment of imagination” DoP:January 15,

2006, DoA: 7/17/13, http://www.chron.com/opinion/outlook/article/Constitutional-right-to-privacy-a-figment-of-1640537.php In this season of politicized and contentious confirmation hearings to fill vacancies on the U.S. Supreme Court, some of the sharpest

debate

and disagreement concerns

a so-called "right of privacy" in the U.S. Constitution.¶ The advocates of a constitutional right of privacy speak as though that right were expressly stated and enumerated in the Constitution. But the text of the Constitution does not contain the word "privacy" or the phrase "right of privacy."¶ Consequently, in my view, a constitutional "right of privacy" could only be unenumerated and is therefore a figment of the imagination of a majority of the justices on the modern Supreme Court. Let me explain why.¶ Webster's Dictionary defines "enumerate" as "to name or count or specify one by one." Roget's Thesaurus states that the synonyms for "enumerate" are "to itemize, list, or tick off." Adding the negative prefix "un" reverses the definitions or synonyms so that "unenumerated" means not named, not counted, not specified, not itemized, or not listed.¶ The right of privacy is unenumerated because neither the word privacy nor the phrase right of privacy appears anywhere in the Constitution or its amendments. Nor does the text contain any words related to other rights the Supreme Court has found to derive from that right, including the right to an abortion and rights related to sexual preference. Neither "abortion" nor "sexual preference" appear anywhere in the text of the Constitution.

Limits In Place Prevent Loss of Digital Privacy There are restraints placed upon how much digital privacy can be conceded Palin, Philip J, 9/18/11 , Homeland Security Watch, Brennan: Counterterrorism and the Law, http://www.hlswatch.com/index.php?s=patriot+act , Date Accessed : 7/17/11 We’ve also worked to uphold our values and the rule of law in a second area—our policies and practices here at home. As I said,

we will use all lawful tools at our disposal, and that includes authorities under the renewed PATRIOT Act. We firmly believe that our intelligence gathering tools must enable us to collect the information we need to protect the American people. At the same time, these tools must be subject to appropriate oversight and rigorous checks and balances that protect the privacy of innocent individuals.¶ As such, we have ensured that investigative techniques in the United States are conducted in a manner that is consistent with our laws and subject to the supervision of our courts. We have also taken administrative steps to institute additional checks and balances, above and beyond what is required by law, in order to better safeguard the privacy rights of innocent Americans.¶ Our democratic

values also include—and our national security demands—open and transparent government. Some information obviously needs to be protected. And since his first days in office, President Obama has worked to strike the proper balance between the security the American people deserve and the openness our democratic society expects.¶ In one of his first acts, the President issued a new Executive Order on classified information that, among other things, reestablished the principle that all classified information will ultimately be declassified. The President also issued a Freedom of Information Act Directive mandating that agencies adopt a presumption of disclosure when processing requests for information. The President signed into law the first intelligence authorization act in over five years to ensure better oversight of intelligence activities. Among other things, the legislation revised the process for reporting sensitive intelligence activities to Congress and created an Inspector General for the Intelligence Community.¶ For the first time, President Obama released the combined budget of the intelligence community, and reconstituted the Intelligence Oversight Board, an important check on the government’s intelligence activities. The

President declassified and released legal memos that authorized the use, in early times, of enhanced interrogation techniques. Understanding that the reasons to keep those memos secret had evaporated, the President felt it was important for the American people to understand how those methods came to be authorized and used.¶ The President, through the Attorney General, instituted a new process to consider invocation of the so-called “state secrets privilege,” where the government can protect information in civil lawsuits. This process ensures that this privilege is never used simply to hide embarrassing or unlawful government activities. But, it also recognizes that its use is absolutely necessary in certain cases for the protection of national security. I know there has been some criticism of the Administration on this. But by applying a stricter internal review process, including a requirement of personal approval by the Attorney General, we are working to ensure that this extraordinary power is asserted only when there is a strong justification to do so.¶

Stifles Change Emphasis on privacy rights limits public change. Baker, C. Edwin. Nicholas F. Gallichio Professor of Law, University of Pennsylvania. 2004. “Auotnomy and Informational Privacy, or Gossip: The Central Meaning of the First Amendment.” Page 255-257. Nevertheless, another possible basis for the

growing popularity of privacy rights may be a sign of cultural sickness. Troublingly, the high valuation of privacy may reflect increasing desires to withdraw from civil society and especially from the public sphere. This increasingly common preference for virtually complete withdrawal stands in dramatic contrast to the classic vision of a private realm as a necessary base to which a person periodically repairs, but always with the hope and expectation of returning to the public world. My fear is that the

current positive valuation of privacy reflects a society in which all value is increasingly seen as located in private life. To an increasing extent, people seem to find all meaning in private interactions of family and other personal associations or, even more disconcertingly, in a more purely commodityoriented world of private consumption with value largely based on wealth and material goods.117 According to this account, the valueorientation of commercial advertisers has virtually won. My concern

is not with people recognizing that privacy and private life have true worth, but with their loss of a sense of value in public life. The public sphere is increasingly devalued and disinhabited. Though this point requires more development, my claim is that as a normative matter, the classical vision of society and of public life is more appealing, and the newer vision of “withdrawal” represents a dangerous decline.¶ Withdrawal represents a direct threat to the First Amendment values of dissent and challenge to the status quo.118 Often people will not merely withdraw themselves, but will also seek to enforce withdrawal. They fear that an active public sphere would disrupt conventional norms and private life. Not everyone loves a parade if, for example, it is a civil rights, antiwar, or neo–Nazi march. In his useful study of gay politics, Larry Gross noted how protection of privacy has been central to the gay agenda. In the years immediately after the “liberal” British Wolfenden Report in 1957,119 which recommended decriminalizing private homosexual behavior, and the British adoption of this policy, what resulted was an increase in prosecutions for arguably public homosexual behavior as the government tried to enforce closeting. Gross explained that mainstream opinion was often most adamant about preserving the public prevalence of heterosexual norms. Conservative policy could tolerate the private practice of homosexuality, while focusing its attention on the suppression of any public expression of homosexuality.120 In an American example of the same phenomenon, the Houston Post, which apparently accepted the private homosexuality of its star minority columnist, nevertheless fired him when it became known that the paper had forced him to delete from his column a public disclosure of his homosexuality. Eventually, the paper rehired him, but only after public protests by Houston’s Hispanic com- munity and the local chapter of Queer Nation.121

Public/Private Distinction Allows Domestic Violence Private and public distinction creates spaces where law enforcement won’t engage domestic violence this allows for it to be perpetrated. Elizabeth M. Schneider, Professor of Law, 2002 (“BATTERED WOMEN & FEMINIST LAWMAKING” Pg 351 DoP: 7/24/2002, DoA: 7/18/13, http://www.brooklaw.edu/~/media/PDF/LawJournals/JLP_PDF/jlp_vol10ii.ashx)

¶ Privatization arrangements also prevail in many sorts of ¶ employment agreements.80 We have seen in the United StatesSupreme Court within the last couple of years an endorsement of ¶ the legality and propriety of these kinds of arrangements, in ¶ which people sign away their right to seek a public remedy in ¶ favor of a privatized remedy.81 Our president has initiated a ¶ discussion about the desirability of privatizing much or all of our ¶ Social Security system,82 which is the system of old age pensions ¶ for people in the United States. It has always been organized as a ¶ public agency, administered by public servants who were ¶ answerable, as governmental agencies are, but powerful interests ¶ promote to substitute this public system for a private one by ¶ making security in one’s old age an individual matter of ¶ accumulating money, investing it, and then moving one’s ¶ investment around in an entrepreneurial manner. So I see a lot of ¶ evidence that this trend toward privatization is continuing and ¶ accelerating, and I wonder what that means for the movement for ¶ the protection of battered and vulnerable women and children. ¶ One of the things that Liz talks about in her book is the ¶ Violence Against Women Act of 1994.83 But as Renée mentions, ¶ in a development that came after the book was published, the United States Supreme Court in United States v. Morrison¶ declared unconstitutional the civil rights remedy of the Violence ¶ Against Women Act, the portions that would have given women ¶ who were victims of gender-motivated violence a right to seek a ¶ private remedy in the federal courts of the United States.84 One ¶ can put forth various [one] explanations of this decision, but to me it ¶ represents a rather subtle statement of the old premise that this ¶ kind of violence really is a private matter. It is not important ¶ enough, and it does not have significant enough nation-wide ¶ effects for the federal courts to have any jurisdiction to consider ¶ it. It has to be considered (if at all) by local courts, by local ¶ authorities. State courts are all right for those cases, but the ¶ federal courts—the big courts, the important courts, the courts ¶ that deal with momentous matters significant to the nation and the ¶ nation’s health—really do not have any jurisdiction over this ¶ rather small private matter. I am being perhaps a bit sarcastic,¶ but I think that is a defensible reading of what the court was ¶ saying in Morrison.¶ 85 And if I am right in my reading of this case ¶ together with other developments in United States constitutional ¶ law, I see a gradual but relentless enlargement of this sphere of ¶ privacy, inside of which the government may not or will not be ¶ inclined to look. I do not think that is a good thing for vulnerable ¶ people or for battered women.

Terrorism

Digital Surveillance Stops Inevitable Terrorist Attack Lack of digital surveillance leads to terrorist attacks Sorcher, Sara. Staff Editor. June 25, 2013. Insiders: NSA's Communications Surveillance Good Way to Target Terrorists. http://www.nationaljournal.com/nationalsecurity/insiders-nsa-s-communicationssurveillance-good-way-to-target-terrorists-20130624. Accessed 7/16/2013. The National Security Agency's surveillance programs are effective tools for seeking out terrorists, according to 85.5 percent of National Journal's National Security Insiders.¶ "In

the digital age, when every individual's digital trail increases year by year, there is no faster way to draw a picture of a network, or a conspiracy, than by piecing together different data streams," one Insider said. "This capability, in years to come, won't be a nice-to-have; it'll be critical."¶ Another Insider said that the NSA must have the tools necessary to root out terrorists or another 9/11 becomes not just possible, but certain. "If we eliminate the online- and phone-surveillance programs and a dirty bomb explodes in an American city, we have only ourselves to blame," the Insider said. "The days of gentlemen not reading other gentlemen's mail are over."

Digital Surveillance Key to Stopping Al Qaeda US must monitor Al-Qaeda and its different initiatives to prevent terrorism from spreading. Evan F. Kohlmann, 2006, Terrorism Researcher, The Real Online Terrorist Threat, Foreign Affairs, Jstor, http://www.jstor.org/stable/20032074 In truth, although catastrophic computer attacks are not entirely inconceivable, the prospect that militants will be able to execute them anytime soon has been overblown. Fears of such science-fiction scenarios, moreover, have led policymakers to overlook the fact that terrorists currently use the Internet as a cheap and efficient way of communicating and organizing. These militants are now dedicated to waging an innovative, low-intensity military campaign against the United States.Jihadists

are typically organized in small, widely dispersed units and coordinate their activities online, obviating the need for a central command. Al Qaeda and similar groups rely on the Internet to contact potential recruits and donors, sway public opinion, instruct would-be terrorists, pool tactics and knowledge, and organize attacks. The RAND Corporation's David Ronfeldt andjohn Arquilla have called this phenomenon "netwar," which they define as a form of conflict marked by the use of "network forms of organization and related doctrines, strategies, and technologies." In

many ways, such groups use the Internet in the same way that peaceful political organizations do; what makes terrorists' activity threatening is their intent. To counter terrorists, the U.S. government must learn how to monitor their activity online, in the same way that it keeps tabs on terrorists in the real world. Doing so will require a realignment of U.S. intelligence and law enforcement agencies, which lag behind terrorist organizations in adopting information technologies. At present, unfortunately, senior counterterrorism officials refuse even to pay lip service to the need for such reforms. That must change-and fast.

Digital Surveillance Solves Terrorism (1/2) Digital monitoring is useful, empirically has worked and is relatively simple Tom Gjelten, NPR international correspondent, 6/15/13, The Case For Surveillance: Keeping Up With Terrorist Tactics, http://www.npr.org/2013/06/15/191694315/high-tech-surveillance-targets-evolving-terrorist-tactics Date accessed 7/17/13 Since public revelations that the National Security Agency is collecting telephone records and reviewing Internet communications in the U.S. and abroad, officials have been making the case that the programs are vital. They argue that the tactics match the new ways terrorists are planning and communicating.¶ There was

a time when America's enemies conspired face-to-face, or communicated through couriers, or by leaving messages for each other somewhere. But in the digital age, that has changed.¶ FBI Director Robert Mueller made that point back in 2008, as Congress considered whether to amend the Foreign Intelligence Surveillance Act.¶ "In this day and age, our ability to gain intelligence on the plans, the plots of those who wish to attack us is dependent on us obtaining information relating to cellphones, Internet, email, wire transfers, all of these areas," he said.¶ If all the action was in that electronic space five years ago, it's even more so today, as intelligence and security officials constantly point out.¶ Speaking in February, the NSA's general counsel, Rajesh De, threw out some figures on the explosive growth in communication data.¶ "More

data crosses the Internet every second today than existed on the Internet 20 years ago. Global mobile traffic grew 70 percent last year alone," he said.¶ Officials say these trends highlight the challenge facing spy agencies: With so much communication now taking place in the digital world, intelligence officers have to be able to follow that communication.¶ James Bamford, the author of several books on the NSA, says spies used to focus on getting human sources inside an organization — agents who could report on what people in the organization were saying and doing. But human sources no longer matter so much, Bamford says. Intelligence officers use new approaches because their adversaries are interacting in new ways. ¶ "During the day, they're on cellphones, or they're on email, or they're on social-networking sites. By intercepting that information, you develop patterns and look at who these people might be involved with," he says. ¶ To justify the

NSA's collection of telephone records and its selective monitoring of online communication overseas, U.S. officials cite these "revolutionary" changes in the information space. John Negroponte was the director of National Intelligence when wiretapping programs were expanded during the Bush administration. He defends the NSA's new emphasis.¶ "I'd say it's a testament to how surveillance methods have kept up with the geometric progression of these communication methods," he says.¶ Congressional critics of the expanded surveillance operations say they're not convinced that these programs have really proved their value in fighting terrorism. They ask whether other types of intelligence gathering might be just as effective.¶ Negroponte, who served as U.S. ambassador to Iraq, says no one method is sufficient. He recalls how in 2006, the

combination of different intelligence sources led the U.S. military to the head of al-Qaida in Iraq, Abu Musab alZarqawi.¶ "I believe his phone number was detected through human intelligence. Somebody gave us his phone number. Then, that phone number was monitored through signals intelligence. And then his movements were tracked by geo-spatial intelligence — drones and so forth," he says. "So it's actually the integration of these different methodologies that actually give you the best results."¶ The

expanded use of telephone and Internet surveillance is in part an adaptation to the information revolution. The NSA, the CIA and other agencies will defend these programs vigorously on that basis, despite concerns that Americans' privacy has been put at risk.¶ But that's not the whole story: It's also clear that the programs are popular in the spy business simply because they're convenient and efficient. They make intelligence gathering easier.

Digital surveillance thwarted over 50 possible terrorist threats Kastrenakes, Jacob. Journalist. June 18, 2013. 'Over 50' terrorist plots were stopped by surveillance efforts, says NSA director. http://www.theverge.com/2013/6/18/4441774/over-50-terrorist-plotsstopped-NSA-surveillance. Accessed 7/16/2013. Speaking to a congressional committee this morning, General Keith Alexander revealed that government surveillance efforts have thwarted “over 50” possible terrorist threats since 9/11, including plans to bomb the New York Stock Exchange and NYC subway system. Alexander, who heads the NSA, specifically noted that programs like the Verizon metadata collection may have been able to stop 9/11 if they had been in place at the time. He suggested that this program as well as “other intelligence” — which he did not disclose — assisted in foiling the 50 or so threats.

Digital Surveillance Solves Terrorism (2/2) The solution is not targeted takedowns which provide little intelligence; surveillance is critical to catching next-generation terrorists Congressional Research Service. 2007 (An office of the Library of Congress. “Terrorist Capabilities for Cyberattack: Overview and Policy Issues”. 22 Jan. Accessed 16 July 13. http://www.gwu.edu/~nsarchiv/NSAEBB/NSAEBB424/docs/Cyber-024.pdf) Some security experts do not think it is worthwhile to hijack or disrupt the web sites created by terrorists. This is because terrorists will usually find a way to quickly put their sites back up under different, multiple names, which may be even more difficult to monitor. Instead, U.S. intelligence sources can gain valuable information by simply monitoring the web sites they already know about. This may also include monitoring the Internet addresses of those who frequent these web sites. However, more skilled analysts are needed to help translate the communications and information that is posted on the many different terrorist web sites.

It has been empirically proven that digital surveillance disrupts terrorist attacks Gerstein, Josh-- White House reporter for POLITICO, specializing in legal and national security issues. June 18th, 2013. “NSA: PRISM stopped NYSE attack.” Published on Politico.com. Recently leaked communication

surveillance programs have helped thwart more than 50 “potential terrorist events” around the world since the Sept. 11 attacks, National Security Agency Director Keith Alexander said Tuesday. Alexander said at least 10 of the attacks were set to take place in the United States, suggesting that most of the terrorism disrupted by the program had been set to occur abroad. The NSA also disclosed that [C]ounterterrorism officials targeted fewer than 300 phone numbers or other “identifiers” last year in the massive call-tracking database secretly assembled by the U.S. government. Alexander said the programs were subject to “extraordinary oversight.” ”This isn’t some rogue operation that a group of guys up at NSA are running,” the spy agency’s chief added. The data on use of the call-tracking data came in a fact sheet released to reporters in connection with a public House Intelligence Committee hearing exploring the recently leaked telephone data mining program and another surveillance effort focused on Web traffic generated by foreigners. Alexander said 90 percent of the potential terrorist incidents were disrupted by the Web traffic program known as PRISM. He was less clear about how many incidents the call-tracking effort had helped to avert. Deputy FBI Director Sean Joyce said the Web traffic program had contributed to arrests averting a plot to bomb the New York Stock Exchange that resulted in criminal charges in 2008. Joyce also indicated that the PRISM program was essential to disrupting a plot to bomb the New York City subways in 2009 and 40 potential cyber attacks in the years 2001-2009. “Without the [Section] 702 tool, we would not have identified Najibullah Zazi,” Joyce said.

Terrorists are using the internet to expand, the United States needs to monitor them. Richard A. Posner, 2008, Senior Lecturer in Law, The University of Chicago. “Privacy, Surveillance, and Law”, The University of Chicago Law Review, Jstor, http://www.jstor.org/stable/20141907

Privacy is the terrorist's best friend, and the terrorist's privacy has been enhanced by the same technological developments that have both made data mining feasible and elicited vast quantities of per sonal information from innocents: the internet, with its anonymity, and the secure encryption of digitized data which, when combined with that anonymity, make the internet a powerful tool of conspiracy. The government has a compelling need to exploit digitization in defense of national security. But if it is permitted to do so, intelligence officers are going to be scrutinizing a mass of personal information about US citizens. And we know that

many people do not like even complete strangers poring over the details of their private lives. But

the fewer of these strangers who have access to those details and the more profes sional their interest in them, the less the affront to the sense of privacy. One reason people do not much mind having their bodies examined by doctors is that they know that doctors' interest in bodies is profes sional rather than prurient; and we can hope that the same is true of intelligence professionals.

Preventing Terrorism Necessitates Domestic Spying We need technology that can gather information against terrorists, even if it necessitates collecting that of US citizens. Glenn Sulmasy, 2013, Department of Humanities, Professor of Law, U.S. Coast Guard Academy, “Why We Need Government Surveillance”, Center for National Policy, http://cnponline.org/ht/d/ViewBloggerThread/i/42295 Opinion: Edward Snowden is a hero The

current threat by al Qaeda and jihadists is one that requires aggressive intelligence collection and efforts. One has to look no further than the disruption of the New York City subway bombers (the one being touted by DNI Clapper) or the Boston Marathon bombers to know that the war on al Qaeda is coming home to us, to our citizens, to our students, to our streets and our subways. This 21st century war is different and requires new ways and methods of gathering information. As technology has increased, so has our ability to gather valuable, often actionable, intelligence. However, the move toward "home-grown" terror will necessarily require, by accident or purposefully, collections of U.S. citizens conversations with potential overseas persons of interest. Where is NSA leaker Edward Snowden? What could authorities do with Snowden? Snowden's path to top secret clearance Where is Edward Snowden? An open society, such as the United States, ironically needs to use this technology to protect itself. This truth is naturally uncomfortable for a country with a Constitution that prevents the federal government from conducting "unreasonable searches and seizures." American historical resistance towards such activities is a bedrock of our laws, policies and police procedures. But what might have been reasonable 10 years ago is not the same any longer. The constant armed struggle against the jihadists has adjusted our beliefs on what we think our government can, and must, do in order to protect its citizens. However, when we hear of programs such PRISM, or the Department of Justice getting phone records of scores of citizens without any signs of suspicious activities nor indications of probable cause that they might be involved in terrorist related activities, the American demand for privacy naturally emerges to challenge such "trolling" measures or data-mining. The

executive branch, although particularly powerful in this arena, must ensure the Congress is kept abreast of activities such as these surveillance programs. The need for enhanced intelligence activities is a necessary part of the war on al Qaeda, but abuse can occur without ensuring the legislative branch has awareness of aggressive tactics such as these. Our Founding Fathers, aware of the need to have an energetic, vibrant executive branch in foreign affairs, still anticipated checks upon the presidency by the legislature. Working

together, the two branches can ensure that both legally, and by policy, this is what the citizens desire of their government -- and that leaks such as Snowden's won't have the impact and damage that his leaks are likely to cause.

Terrorists Use the Internet to Plan Attacks (1/2) Terrorists use the internet to plan attacks Thomas, Timothy L. Lieutenant Colonel of U.S. Army. 2003. Al Qaeda and the Internet:¶ The Danger¶ of “Cyberplanning”. http://www.dtic.mil/dtic/tr/fulltext/u2/a485810.pdf. Date Accessed: 7/16/13 We can say with some certainty, al Qaeda loves the Internet. When the latter¶ first appeared, it was hailed as an integrator of cultures and a medium for¶ businesses, consumers, and governments to communicate with one another. It¶ appeared to offer unparalleled opportunities for the creation of a “global village.” Today the

Internet still offers that promise, but it also has proven in some¶ respects to be a digital menace. Its use by al Qaeda is only one example. It also has¶ provided a virtual battlefield for peacetime hostilities between Taiwan and¶ China, Israel and Palestine, Pakistan and India, and China and the United States¶ (during both the war over Kosovo and in the aftermath of the collision between¶ the Navy EP-3 aircraft and Chinese MiG). In times of actual conflict, the Internet¶ was used as a virtual battleground between NATO’s coalition forces and elements of the Serbian population. These real tensions from a virtual interface involved not only nation-states but also non-state individuals and groups either¶ aligned with one side or the other, or acting independently. Evidence strongly suggests that terrorists

used the Internet to plan their¶ operations for 9/11. Computers seized in Afghanistan reportedly revealed that¶ al Qaeda was collecting intelligence on targets and sending encrypted messages¶ via the Internet. As recently as 16 September 2002, al Qaeda cells operating in¶ America reportedly were using Internet-based phone services to communicate¶ with cells overseas. These incidents indicate that the Internet is being used as a¶ “cyberplanning” tool for terrorists. It provides terrorists with anonymity, command and control resources, and a host of other measures to coordinate and integrate attack options.

The internet is used by terrorists to recruit and plan attacks Mueller, Robert S. 2012 (Director of the Federal Bureau of Investigation. “Statement Before the House Appropriations Committee, Subcommittee on Commerce, Justice, Science, and Related Agencies”. 7 March. Accessed 16 July 13. http://www.fbi.gov/news/testimony/fbi-budget-request-for-fiscal-year2013) The basis from which acts of terrorism are committed—from organizations to affiliates/surrogates to self-radicalized individuals—continue to evolve and expand. Of particular note is al Qaeda’s use of online chat rooms and websites to recruit and radicalize followers to commit acts of terrorism. And they are not hiding in the shadows of cyber space: al Qaeda in the Arabian Peninsula has produced a full-color, English-language online magazine. Terrorists are not only sharing ideas; they are soliciting information and inviting communication. Al Shabaab, the al Qaeda affiliate in Somalia, uses Twitter to taunt its enemies—in English—and encourage terrorist activity.

Terrorists use information on the internet to plan attacks Thomas, Timothy L. 2003. Lieutenant Colonel of U.S. Army. Al Qaeda and the Internet:¶ The Danger¶ of “Cyberplanning”. http://www.dtic.mil/dtic/tr/fulltext/u2/a485810.pdf. Date Accessed: 7/16/13 The Internet is used to gather information on potential targets. The¶ website operated by the Muslim Hackers Club reportedly featured links to US¶ sites that purport to disclose sensitive information like code names and radio frequencies used by the US Secret Service. The same website offers tutorials in viruses, hacking stratagems, network “phreaking” and secret codes, as well as links¶ to other militant Islamic and cyberprankster web addresses.17Recent targets that¶ terrorists have discussed include the Centers for Disease Control and Prevention¶ in Atlanta; FedWire, the money-movement clearing system maintained by the¶ Federal Reserve Board; and facilities controlling the flow of information over¶ the Internet.18Attacks on critical infrastructure control systems would be particularly harmful, especially on a system such as the Supervisory Control and Data¶ Acquisition (SCADA) system. Thus any information on insecure network architectures or non-enforceable security protocols is potentially very damaging.¶ Terrorists

have access, like many Americans, to imaging data on potential targets, as well as maps, diagrams, and other crucial data on

important facilities or networks. Imaging data can also allow terrorists to view counterterrorist ¶ activities at a target site. One captured al Qaeda computer contained engineering¶ and structural architecture features of a dam, enabling al Qaeda engineers and¶ planners to simulate catastrophic failures.19

A2: Terrorist Don’t use Internet Terrorists do use the Internet—they use it to communicate and send emails, they outline their philosophy for everyone to see, and they outline their strategy. Ian Brown and Douwe Korff [Associate Director of Cyber Security at University of Oxford, UK, Professor of International Law at London Metropolitan University, Terrorism and the Proportionality of Internet Surveillance, European Journal of Criminology, Mar 26, 2009, Pages 123-124] Terrorist use of new technologies provides new opportunities for intelligence gathering and disruption of operations by intelligence agencies. They can use active and passive attacks (e.g. viruses and surveillance/traffic analysis) on terrorist computers to gather address books, cookies, passwords and similar information. Counter-terrorist operations include the use of black propaganda to destroy trust. If agencies can identify and ‘take out’ purveyors of good technical information, they can flood channels with mis- information and leave the less informed to propagate bad information. At

the same time they gather intelligence on participants, organizations and their modus operandi. Most ideological debate takes place on open recognized sites, including senior participants, which allows up-and-coming leaders to be identified (Shahar 2007). Jihadi websites provide much information about their organizations, including core beliefs; ideological divisions; ultimate goals and overall game plan; methods proposed to reach these goals; who makes decisions and how these are made. They often detail ideological splits and identify clerics who will dispute Qu’ranic interpretations who can be co-opted, intimidated or killed, providing a mechanism for intelligence agencies to challenge terror groups’ legitimacy and siphon off recruits. Movements often split over theo- logical (not tactical) disagreements.

The internet is becoming the premier method of terrorist communication Congressional Research Service. 2007 (An office of the Library of Congress. “Terrorist Capabilities for Cyberattack: Overview and Policy Issues”. 22 Jan. Accessed 16 July 13. http://www.gwu.edu/~nsarchiv/NSAEBB/NSAEBB424/docs/Cyber-024.pdf) Just as people all over the world now use the Internet, terrorists also use it as a modern tool for communication. Terrorists and extremist groups have reportedly generated thousands of Internet web sites to support psychological operations, fund raising, recruitment, and coordination of activities. Recently, the Department of State’s Counterterrorism Director noted “the most worrisome scenario of another attack in the homeland is lone operatives who slip into the country and take directions through cyberspace.” A significant concern is that some of these web sites used for the suspected terrorist activity are hosted on Internet Service Providers inside the United States. The level of technical sophistication of the extremist groups that use and operate these web sites has also increased. In 2006 it was reported that an organization linked to al-Qaeda produced a 26-page manual providing instructions on the use of the Google search engine to further the goals of global jihad. Recently British forces in Iraq have found print-outs of Google-Earth pictures that reportedly were to be used for targeting of coalition forces.

Terrorists Use the Internet to Plan Attacks (2/2) Terrorist groups can use the internet to infiltrate vital US networks and explore their flaws. Thomas, Timothy L. Lieutenant Colonel of U.S. Army. 2003. Al Qaeda and the Internet:¶ The Danger¶ of “Cyberplanning”. http://www.dtic.mil/dtic/tr/fulltext/u2/a485810.pdf. Date Accessed: 7/16/13 The Internet can be used to divert attention from a real attack scenario. Al Qaeda can plant threats on the Internet or via cell phones to mislead law¶ enforcement officials. Terrorists study how the United States collects and analyzes information, and thus how we respond to information.¶ Terrorists know when their Internet “chatter” or use of telecommunications increases, US officials issue warnings. Terrorists can thus introduce false¶ information into a net via routine means, measure the response it garners from the¶ US intelligence community, and then try to figure out where the leaks are in their ¶ systems or what type of technology the United States is using to uncover their¶ plans. For example, if terrorists use encrypted messages over cell phones to discuss a fake operation against, say, the Golden Gate Bridge, they can then sit back¶ and watch to see if law enforcement agencies issue warnings regarding that particular landmark. If they do, then the terrorists know their communications are¶ being listened to by US officials.3

The Internet is Key to Terrorist Communication The internet is becoming the premier method of terrorist communication Congressional Research Service. 2007 (An office of the Library of Congress. “Terrorist Capabilities for Cyberattack: Overview and Policy Issues”. 22 Jan. Accessed 16 July 13. http://www.gwu.edu/~nsarchiv/NSAEBB/NSAEBB424/docs/Cyber-024.pdf) Just as people all over the world now use the Internet, terrorists also use it as a modern tool for communication. Terrorists and extremist groups have reportedly generated thousands of Internet web sites to support psychological operations, fund raising, recruitment, and coordination of activities. Recently, the Department of State’s Counterterrorism Director noted “the most worrisome scenario of another attack in the homeland is lone operatives who slip into the country and take directions through cyberspace.” A significant concern is that some of these web sites used for the suspected terrorist activity are hosted on Internet Service Providers inside the United States. The level of technical sophistication of the extremist groups that use and operate these web sites has also increased. In 2006 it was reported that an organization linked to al-Qaeda produced a 26-page manual providing instructions on the use of the Google search engine to further the goals of global jihad. Recently British forces in Iraq have found print-outs of Google-Earth pictures that reportedly were to be used for targeting of coalition forces.

Internet Key to Terrorist Funding Terrorists can transfer funds digitally, and there is nothing we can do to stop them Bucci, Steven. 2009 (Director of the Douglas and Sarah Allison Center for Foreign Policy Studies. "The Confluence of Cyber Crime and Terrorism". 12 Jun. http://www.heritage.org/research/lecture/theconfluence-of-cyber-crime-and-terrorism) A new wrinkle that is developing is the use of virtual worlds. There is hard evidence of money transfers having been made within these worlds. This is done by using real cash to buy virtual currency, conducting various transactions within the virtual environment, and then converting it back into real cash again in a completely different temporal location. It is all safe, clean, legal, and nearly impossible to trace.

Internet Key to Terrorist Education Digital terrorist libraries contain detailed instructions on how to conduct sophisticated cyber attacks Congressional Research Service. 2007 (An office of the Library of Congress. “Terrorist Capabilities for Cyberattack: Overview and Policy Issues”. 22 Jan. Accessed 16 July 13. http://www.gwu.edu/~nsarchiv/NSAEBB/NSAEBB424/docs/Cyber-024.pdf) The Washington Times has reported that Islamic extremists are calling for creation of an Islamist hackers’ army to plan cyberattacks against the U.S. government and that postings on the extremist bulletin board, al-Farooq, carry detailed cyberattack instructions, and include spyware programs for download that can be used to learn the passwords of targeted users. Other extremist websites reportedly resemble online training camps that may offer instructions for how to create a safe-house, how to clean a rocket-propelled grenade launcher, or what to do if captured.

Terrorist organizations are building out digital libraries with resources on how to conduct attacks Congressional Research Service. 2007 (An office of the Library of Congress. “Terrorist Capabilities for Cyberattack: Overview and Policy Issues”. 22 Jan. Accessed 16 July 13. http://www.gwu.edu/~nsarchiv/NSAEBB/NSAEBB424/docs/Cyber-024.pdf) Senior leadership of al-Qaeda, who reportedly have access to the most modern technology equipment, and other terrorist groups are reportedly building a massive and dynamic online library of training materials, many of which are supported by subject matter experts who answer questions on message boards or in chat rooms. This online library covers such areas as how to mix poisons for chemical attacks, how to ambush U.S. soldiers, how to coordinate a suicide bomb attack, and how to hack computers. One discussion forum popular with supporters of terrorism is called Qalah, or Fortress, where potential al Qaeda recruits can find links to the latest in computer hacking techniques in a discussion area called “electronic jihad.”

Cyberterror Impacts: Economy Cyber Terror attacks have the capability of causing economic damage- Stock markets and actual loss to companies Cashell, Jackson, Jickling, and Webel; 2004 (Brian Cashell, William D. Jackson, Mark Jickling, and Baird Webel, April 1, 2004, Government and Finance Division, CRS report for Congress, The Economic Impact of Cyber-attacks, https://www.fas.org/sgp/crs/misc/RL32331.pdf) accessed 7/26/13 A central issue, in both public and private sectors, is whether we are devoting enough resources to information security. Part of the answer must come from economic analysis. What are the costs, both historical and potential, of security breaches? How frequently can attacks be expected? Can these factors be quantified precisely, so that organizations can determine the optimal amount to spend on information security and measure the effectiveness of that spending? No one in the field is satisfied with our present ability to measure the costs and probabilities of cyber-attacks. There are no standard methodologies for cost measurement, and study of the frequency of attacks is hindered by the reluctance of organizations to make public their experiences with security breaches. This report summarizes the limited empirical data on attack costs, and surveys recent theoretical work that seeks to overcome the absence of reliable and comprehensive statistics. Investigations into the stock price impact of cyber-attacks show that identified target firms suffer losses of 1%-5% in the days after an attack. For the average New York Stock Exchange Corporation, price drops of these magnitudes translate into shareholder losses of between $50 million and $200 million. Several computer security consulting firms produce estimates of total worldwide losses attributable to virus and worm attacks and to hostile digital acts in general. The 2003 loss estimates by these firms range from $13 billion (worms and viruses only) to $226 billion (for all forms of overt attacks). The reliability of these estimates is often challenged; the underlying methodology is basically anecdotal. The insurance industry’s response to rising perceptions of cyber-risk has been twofold. Initially, most companies excluded, and continue to exclude, cyber-attacks from standard business insurance coverage. After this initial exclusion, several insurers then began selling specialized cyber-risk policies. Growth of the market has been slow; lacking the empirical data to construct actuarial tables, insurers are unable to price risk with the degree of confidence they enjoy in traditional insurance lines.

Uniqueness: Risk of Terrorism is High Terrorism continuously poses a serious threat to the U.S. Gertz, Bill, senior editor of the Washington Free Beacon, June 19, 2013 The threat posed by al Qaeda terrorism around the world continues to increase despite President Barack Obama’s recent claim that the central group behind the Sept. 11, 2001, attacks is on the path to defeat, according to U.S. and foreign counterterrorism officials and private experts. Obama said in a speech to the National Defense University May 23 that because of the death of al Qaeda leader Osama bin Laden and most of his top aides, “we are safer.” While terrorist threats still exist, “the core of al Qaeda in Pakistan and Afghanistan is on the path to defeat,” the president said. However, a U.S. counterterrorism official said the threat posed by al Qaeda is growing. “From Africa to Pakistan, it is spreading systematically,” the official said. The official blamed the Obama administration policy of focusing its counterterrorism efforts almost exclusively on central al Qaeda. The focus on Pakistan and Afghanistan resulted in a lack of targeted counterterrorism efforts in other locations, the official said. The official added that counterterrorism efforts have been weakened by the administration’s policy of dissociating Islam from al Qaeda and other Islamist terrorism. The policy was a key effort of John Brennan, White House counterterrorism chief during the first Obama administration. As CIA director, Brennan has expanded the policy of limiting links between Islam and terrorism at the agency. The result is that Islamist terror groups are flourishing, posing direct threats to the United States and to U.S. interests outside the country, the official said. That assessment is bolstered by a new report by the private Lignet intelligence group. The report made public Tuesday says the U.S. government’s overreliance on sanctions and surveillance has limited the war on terror. The result is “a decentralized al Qaeda structure—and a much greater threat,” the report said. “Al Qaeda has transitioned from a hierarchical cell structure to a franchise organization that is now responsible for four times as many terrorist attacks a year as it was before 9/11,” the report said.

Terrorist attack against the United States is imminent Jenkins, Brian Michael. senior adviser to the RAND president. July 10, 2013. Could Terrorists Pull Off a Mumbai-Style Attack in the U.S.? http://www.usnews.com/opinion/blogs/worldreport/2013/07/10/could-terrorists-launch-a-mumbai-style-attack-in-the-united-states. Date Accessed 7/17/13. The event provided the latest evidence that the means of an armed terrorist attack are certainly available in the United States. We've seen it over and over again, in Newtown, Connecticut; Aurora, Colorado; on the campus of Virginia Tech, to name just a few.¶ Although these killings involved a single shooter without a terror agenda, they demonstrate that one person, with little or no training, can acquire and effectively use firearms to achieve high body counts. A review of the most deadly mass killings in the United States, going back to the Columbine High School murders in 1999, show that an average of 15 people died per attack. That's close to what each of the trained terrorist teams achieved in Mumbai.¶ [Read the U.S. News Debate: Should People Be Allowed to Carry Guns Openly?]¶ But acquiring the firepower needed to carry out a mass murder is only one part of the equation. An armed terrorist attack along the lines of that carried out in Mumbai presents a series of logistical challenges, starting with recruiting and training a willing and able suicide assault force.¶ In Mumbai, there were 10 terrorists, armed with assault rifles, pistols, grenades and improvised explosives. They carried out coordinated attacks across the city, paralyzing a metropolis of 14 million people for 60 hours while mesmerizing the world's media. It was a complex operation and likely the culmination of months of training.¶ There are two ways a Mumbaistyle attack could be carried out in the United States. Terrorist

planners could assemble and train a team of attackers abroad and attempt to infiltrate them into the United States, or homegrown terrorists could assemble and launch a Mumbai-style attack. So far, neither has happened in the modern history of terrorism in the United States.¶ Bringing a team of trained terrorists into the United States would be extremely difficult today, an audacious endeavor even by al-Qaida standards. Improved intelligence worldwide has degraded the operational capabilities of al-Qaida and has made its operating environment more hostile. And any large mobilization of terrorist personnel would likely be noticed by intelligence gatherers.

Terror threat increases with escaped al-Qaeda leaders while Iraq copes with lose of U.S. expertise. Yasee, Jabbar. Washington Post writer. Sly, Liz. , Post’s Beirut bureau chief, Washington Post writer. July 22, 2013. Washington Post. Iraq jailbreak highlights al-Qaeda affiliate’s ascendancy. Date accessed: July 26, 2013. Iraq’s Interior Ministry said in a statement that an

unspecified number of prisoners had escaped from Abu Ghraib but none from a second facility that also came under assault. In Washington, U.S. officials closely monitoring the jailbreak said the number of escapees was thought to be 500 to 600, including a significant number of al-Qaeda operatives.¶ Members of the Iraqi parliament who said they had been briefed by security officials asserted that the escapees included some top “emirs,” or leaders, of the al-Qaeda in Iraq franchise, many of whom had been captured by U.S. troops.¶ Iraq’s security forces set up checkpoints on highways leading west to Syria and Jordan and around Baghdad’s airport to snare fugitives. At least some prisoners were recaptured in the dragnet, according to Iraqi news media reports.¶ But even if the prisoners are recaptured, the

scale of the attacks on the heavily guarded facilities reinforced an impression among many Iraqis that their security forces are struggling to cope with a resurgent al-Qaeda since U.S. forces withdrew in 2011, taking with them much of the expertise and technology that had been used to hold extremists at bay.

Terror Threat Increasing

Goes Nuclear Terrorists have capabilities of accumulating weapons of mass destruction Perl, Raphael. December 21, 2004. Head of the OSCE Action against Terrorism Unit, Specialist in International Affairs Foreign Affairs and National Defense Division. Terrorism and National Security: Issues and Trends. http://www.fas.org/irp/crs/IB10119.pdf. Date Accessed 7/28/13. Looming over the entire issue of¶ international terrorism is a trend toward¶ proliferation of weapons of mass destruction¶ (WMD). For instance, Iran, seen as the most¶ active state sponsor of terrorism, has been¶ secretly conducting a longstanding uranium¶ enrichment program, and North Korea has¶ both admitted to having a clandestine program¶ for uranium enrichment and claimed to have¶ nuclear weapons. (See CRS Issue Brief¶ IB91141, North Korea’s Nuclear Weapons¶ Program.) On December 19, 2003, Iran signed¶ an agreement allowing international inspections of nuclear sites; on December 21, 2003¶ Libya announced similar intentions. Indications have also surfaced that Al Qaeda has¶ attempted to acquire chemical, biological,¶ radiological, and nuclear weapons. As a¶ result, stakes in the war against international¶ terrorism are increasing and margins for error¶ in selecting appropriate policy instruments to¶ prevent terrorist attacks are diminishing.

A2: Terrorists Are Not Tech Savvy Terrorists are more capable with technology than the United States government Congressional Research Service. 2007 (An office of the Library of Congress. “Terrorist Capabilities for Cyberattack: Overview and Policy Issues”. 22 Jan. Accessed 16 July 13. http://www.gwu.edu/~nsarchiv/NSAEBB/NSAEBB424/docs/Cyber-024.pdf) A recent study of more than 200,000 multimedia documents on 86 sample websites concluded that extremists exhibited similar levels of web knowledge as U.S. government agencies, and that the terrorist websites employed significantly more sophisticated multimedia technologies than U.S. government websites. The study concluded that these extremist websites support advanced Internetbased communication tools such as online forums and chat rooms more frequently than U.S. government web sites. Because of perceived anonymity, terrorist likely feel safer when working together on the Internet.

A2: Digital Surveillance of Terrorists Outside of US Many terrorist websites are hosted on servers within the United States Congressional Research Service. 2007 (An office of the Library of Congress. “Terrorist Capabilities for Cyberattack: Overview and Policy Issues”. 22 Jan. Accessed 16 July 13. http://www.gwu.edu/~nsarchiv/NSAEBB/NSAEBB424/docs/Cyber-024.pdf) Just as people all over the world now use the Internet, terrorists also use it as a modern tool for communication. Terrorists and extremist groups have reportedly generated thousands of Internet web sites to support psychological operations, fund raising, recruitment, and coordination of activities. Recently, the Department of State’s Counterterrorism Director noted “the most worrisome scenario of another attack in the homeland is lone operatives who slip into the country and take directions through cyberspace.” A significant concern is that some of these web sites used for the suspected terrorist activity are hosted on Internet Service Providers inside the United States. The level of technical sophistication of the extremist groups that use and operate these web sites has also increased. In 2006 it was reported that an organization linked to al-Qaeda produced a 26-page manual providing instructions on the use of the Google search engine to further the goals of global jihad. Recently British forces in Iraq have found print-outs of Google-Earth pictures that reportedly were to be used for targeting of coalition forces.

A2: Terror Talk Turn: Defining terrorism is critical in solving it – this outweighs your root cause arguments TTSRL 8 (Transnational Terrorism, Security and the Rule of Law, policy Brif no. 2, 10/1/8, www.transnationalterrorism.eu/tekst/publications/WP3%20Del%204.pdf) JPG Yet the

real business can be spoiled, some authors claim, by the lack of a universally agreed definition of terrorism. ‘An objective definition of terrorism is not only possible: it is also indispensable to any serious attempt to combat terrorism,’ holds Ganor (quoted in Schmid, 2004a: 375). He thus reiterated his earlier statement on the importance of this issue, in which he had declared that a common understanding of what constitutes terrorism is important, among other purposes, for 1) a development of common international strategies, 2) effective results of the international mobilization against terrorism, 3) enforcement of international agreements against terrorism, and 4) effective extradiction procedures (Ganor, 1998). Similarly, Schmid also points to a positive role of a universal definition in coordinating the states’ anti-terrorist strategies, quoting Dean and Alexander, who consider the absence of a universal definition of terrorism as the main factor likely to encourage future terrorism – more eminent than, e.g., disagreement as to the root causes, religionization of politics or exploitation of the media (Schmid, 2004a: 378). However, the focus is here shifted from the academia to the fields of strategic and legal discourse, and Ganor and Schmid’s statements therefore cannot be considered as proper arguments in favour of the universal academic definition of terrorism. Nonetheless, they pave the way to the conclusion that in fact, there is a search going on not for one universal definition of terrorism, but for manifold definitions of terrorism, which, in each of the fields listed above (academic, strategic and legal), are required to play a peculiar role and therefore focus on various issue areas in their quest. Whereas the

strategic discourse may be assumed to be primarily concerned with terrorism as a method of combat, in the legal discourse, the focus rests rather with those who can be punished for commiting terrorist acts, the perpetrators. In the absence of a universal legal definition, capabilities of prosecuting those who commit terrorist crimes are limited – nullum crimen sine lege – and the extradition channels are obstructed. Defining terrorism is key to prevent abuses of it – the alternative allows cooption TTSRL 8 (Transnational Terrorism, Security and the Rule of Law, policy Brif no. 2, 10/1/8, www.transnationalterrorism.eu/tekst/publications/WP3%20Del%204.pdf) JPG The first reason is that the absence of a commonly accepted definition invites abuse. In view of the delegitimization, stigmatization and securitization issues discussed in the next section, this seems to be a serious case for expanding a common understanding of terrorism. Double standards and the might makes right principle applied both in the international and domestic scene – styling resistance movements, guerillas or mere political opposition as “terrorists” - have in recent times become a favourite instrument of authoritarian governments to legitimize crushing those actors abroad – in which the label “terrorism” is used as a powerful instrument in the hands of the stronger. This should be, it can be argued, prevented on normative grounds. The academia, which ought to be critical towards the realm of politics – even if it cannot be detached from it – should then play a crucial role in the deconstruction of similar processes. Yet, to meet such expectations, it should possess useful instruments of analysis. In line with the “strategic” argument outlined above, Jessica Stern of Harvard University also concedes that ‘how we define terrorism profoundly influences how we respond to it’. Yet she adds another reason in favour of the definition – its relevance for theory and research: ‘The

definition inevitably determines the kind of data we collect and analyze, which in turn influences our understanding of trends and our predictions about the future’ (1999: 12). The same argument is presented by Schmid, who speaks of the universalist definition as a prerequisite of a ‘responsible theory’ (2006: 3). Such arguments may be radicalized: arbitrariness in definitions as points of departure for research perhaps not only influences academics’ results and hinders their comparability, but it also generates a sense of uncertainty that the participants in the discourse talk about, indeed, the same phenomenon at any given point of time, which limits their potential for cooperation. Uniformly

defining

terrorism in the academia thus seems relevant both in theoretical and practical terms. From the theoretical point of view, such clarification would provide a paradigmatic stable point of departure for the research on terrorism – instead of the current state of confusion where results of individual researchers and teams can be compared or complement each other only to a limited extent. From

the practical point of view, it

invite abuse.

would contribute to mitigating the ambiguities associated with the term that

Cyberattacks

US Is Vulnerable to Cyberattacks Director of National Intelligence agrees US is vulnerable to cyberattacks; we are compromising information to foreign countries. James R. Clapper, Director of National Intelligence, 2011, “Statement for the Record on the Worldwide Threat Assessment of the U.S. Intelligence Community for the House Permanent Select Committee on Intelligence”, http://intelligence.house.gov/sites/intelligence.house.gov/files/documents/DNISFR021011.pdf As we expand our ability to create and share knowledge, maintain our society and produce economic goods, we are developing new vulnerabilities and enabling those who would steal, corrupt, harm or destroy public and private assets vital to our national interests. In the past year, we have seen a dramatic increase in malicious cyber activity targeting US computers and networks; almost two-thirds of US firms report that they have been the victim of cybersecurity incidents or information breaches, while the volume of malicious software (“malware”) on American networks more than tripled from Industry estimates that the production of malware has reached its highest levels, with an average of 60,000 new pieces identified per day. Almost half of all US computers have been compromised, according to another industry survey. This current environment favors those who desire to exploit our vulnerabilities with the trend likely getting worse over the next five years because of the slow adoption of defensive best practices and rapid advances in offensive vulnerability discovery and In April a large number of routing paths to various Internet Protocol addresses were redirected through networks in China for 17 minutes due to inaccurate information posted by a Chinese Internet Service Provider. This diversion of data would have given the operators of the servers on those networks the ability to read, delete, or edit e-mail and other information sent along those paths. This incident affected traffic to and from U.S. Government and military sites, including sites for the Senate, the Army, the Navy, the Marine Corps, the Air Force, and the office of the Secretary of Defense, as well as a number of Fortune 500 firms. information technology supply chain can hide many risks. Such vulnerability was demonstrated by employees at a US firm who were convicted for supplying counterfeit computer hardware to U.S. Last year some of our largest information technology and defense contractor companies discovered that throughout much of 2009 they had been the targets of a systematic effort to penetrate their networks and acquire proprietary information. The intrusions attempted to gain access to and potentially modify the contents of source code repositories, the intellectual „crown jew Our identities are increasingly vulnerable. Cyber criminals are stalking prospective victims on social networking sites, acquiring personal information to tailor „spear phishing‟ emails to gather 28 more information that can be used to facilitate identity theft. They are intercepting messages exchanged by mobile devices to validate transactions, and masquerading as their victims to steal funds from their bank accounts. Further, the consolidation of data captured in emails, social networks, Internet search engines, and geographic location of mobile service subscribers increases the potential for identification and targeting of government personnel by criminals, or by intelligence organizations. In the last year, we have witnessed the emergence of foreign military capabilities in cyber space. This formalization of military cyber capabilities creates another tool that foreign leaders may use to undermine critical infrastructures that were previously assumed secure before or during conflict. The IC is reaching out to the private sector to ensure current understanding of the dynamic cyber environment. More government-private sector and international cooperation is still required across the cybersecurity landscape.

Cyberattack Impacts: Laundry List Cyber attacks by terrorist organizations are happening in the status quo, and they are become increasingly dangerous, with some groups gaining the capacity to destroy the economy and kill millions of civilians by attacking infrastructure Panetta, Leon. 2012 (United States Secretary of Defense. Published by the United States Department of Defense online as "Remarks by Secretary Panetta on Cybersecurity to the Business Executives for National Security, New York City". 11 Oct. Accessed 16 July 13. http://www.defense.gov/transcripts/transcript.aspx?transcriptid=5136) I know that when people think of cybersecurity today, they worry about hackers and criminals who prowl the Internet, steal people's identities, steal sensitive business information, steal even national security secrets. Those threats are real and they exist today.¶ But the even greater danger [is] -- the greater danger facing us in cyberspace goes beyond crime and it goes beyond harassment. A cyber attack perpetrated by nation states or violent extremist groups could be as destructive as the terrorist attack on 9/11. Such a destructive cyber-terrorist attack could virtually paralyze the nation.¶ Let me give you some examples of the kinds of attacks that we have already experienced.¶ In recent weeks, as many of you know, some large U.S. financial institutions were hit by so-called Distributed Denial of Service attacks. These attacks delayed or disrupted services on customer websites. While this kind of tactic isn't new, the scale and speed with which it happened was unprecedented.¶ But even more alarming is an attack that happened two months ago when a very sophisticated virus called Shamoon infected computers in the Saudi Arabian State Oil Company Aramco. Shamoon included a routine called a ‘wiper’, coded to self-execute. This routine replaced crucial systems files with an image of a burning U.S. flag. But it also put additional garbage data that overwrote all the real data on the machine. More than 30,000 computers that it infected were rendered useless and had to be replaced. It virtually destroyed 30,000 computers.¶ Then just days after this incident, there was a similar attack on RasGas of Qatar, a major energy company in the region. All told, the Shamoon virus was probably the most destructive attack that the private sector has seen to date.¶ Imagine the impact an attack like that would have on your company or your business.¶ These attacks mark a significant escalation of the cyber threat and they have renewed concerns about still more destructive scenarios that could unfold.¶ For example, we know that foreign cyber actors are probing America's critical infrastructure networks. They are targeting the computer control systems that operate chemical, electricity and water plants and those that guide transportation throughout this country.¶ We know of specific instances where intruders have successfully gained access to these control systems. ¶ We also know that they are seeking to create advanced tools to attack these systems and cause panic and destruction and even the loss of life.¶ Let me explain how this could unfold. An aggressor nation or extremist group could use these kinds of cyber tools to gain control of critical switches. They could, for example, derail passenger trains or even more dangerous, derail trains loaded with lethal chemicals. ¶ They could contaminate the water supply in major cities or shutdown the power grid across large parts of the country.¶ The most destructive scenarios involve cyber actors launching several attacks on our critical infrastructure at one time, in combination with a physical attack on our country. Attackers could also seek to disable or degrade critical military systems and communication networks.¶ The collective result of these kinds of attacks could be a cyber Pearl Harbor; an attack that would cause physical destruction and the loss of life. In fact, it would paralyze and shock the nation and create a new, profound sense of vulnerability.

Cyberattack Impacts: Terrorists are a Threat Terrorists, given the capability, would launch full-scale cyberattacks Mueller, Robert S. 2012 (Director of the Federal Bureau of Investigation. “Statement Before the House Appropriations Committee, Subcommittee on Commerce, Justice, Science, and Related Agencies”. 7 March. Accessed 16 July 13. http://www.fbi.gov/news/testimony/fbi-budget-request-for-fiscal-year2013) To date, terrorists have not used the Internet to launch a full-scale cyber attack, but we cannot underestimate their intent. Terrorists have shown interest in pursuing hacking skills. And they may seek to train their own recruits or hire outsiders, with an eye toward pursuing cyber attacks. These adaptations of the terrorist threat make the FBI’s counterterrorism mission that much more difficult and challenging.

Terrorist organization are capable of cyberattacks against both United States government targets and infrastructure, and they are aware of the value those strikes hold for their cause Congressional Research Service. 2007 (An office of the Library of Congress. “Terrorist Capabilities for Cyberattack: Overview and Policy Issues”. 22 Jan. Accessed 16 July 13. http://www.gwu.edu/~nsarchiv/NSAEBB/NSAEBB424/docs/Cyber-024.pdf) A recent study of more than 200,000 multimedia documents on 86 sample websites concluded that In April 2002, the Central Intelligence Agency (CIA) stated in a letter to the U.S. Senate Select Committee on Intelligence that cyberwarfare attacks against the U.S. critical infrastructure will become a viable option for terrorists as they become more familiar with the technology required for the attacks. Also according to the CIA, various groups, including Al Qaeda and Hizballah, are becoming more adept at using the Internet and computer technologies, and these groups could possibly develop the skills necessary for a cyberattack. In February 2005, FBI director Robert Mueller, testified before the Senate Select Committee on Intelligence that terrorists show a growing understanding of the critical role of information technology in the U.S. economy and have expanded their recruitment to include people studying math, computer science, and engineering.

Cyberattack Impacts: North Korea Is a Threat US and South Korean military secrets are at risk from hackers. Associated Press, 2013, “Hackers targeting U.S., South Korea are after military secrets, cybersecurity experts say”, CBS News, http://www.cbsnews.com/8301-202_162-57592604/hackers-targeting-u.s-south-korea-are-after-military-secrets-cybersecurity-experts-say/

The hackers who knocked out tens of thousands of South Korean computers simultaneously this year are out to do far more than erase hard drives, cybersecurity firms say: They also are trying to steal South Korean and U.S. military secrets with a malicious set of codes they've been sending through the Internet for years. The identities of the hackers, and the value of any information they have acquired, are not known to U.S. and South Korean researchers who have studied line after line of computer code. But they do not dispute South Korean claims that North Korea is responsible, and other experts say the links to military spying add fuel to Seoul's allegations. Researchers at Santa Clara, California-based McAfee Labs said the malware was designed to find and upload information referring to U.S. forces in South Korea, joint exercises or even the word "secret." McAfee said versions of the malware have infected many websites in an ongoing attack that it calls Operation Troy because the code is peppered with references to the ancient city. McAfee said that in 2009, malware was implanted into a social media website used by military personnel in South Korea. "This goes deeper than anyone had understood to date, and it's not just attacks: It's military espionage," said Ryan Sherstobitoff, a senior threat researcher at McAfee who gave The Associated Press a report that the company is releasing later this week. He analyzed code samples shared by U.S. government partners and private customers. McAfee found versions of the keyword-searching malware dating to 2009. A South Korean cybersecurity researcher, Simon Choi, found versions of the code as early as 2007, with keyword-searching capabilities added in 2008.

It was made by the same people who have also launched prior cyberattacks in South Korea over the last several years, Choi said. Versions of the code may still be trying to glean military secrets from infected computers. Sherstobitoff said the same coded fingerprints were found in an attack on June 25 - the anniversary of the start of the 1950-53 Korean War - in which websites for South Korea's president and prime minister were attacked. A day later the Pentagon said it was investigating reports that personal information about thousands of U.S. troops in South Korea had been posted online.’

Cyberattack Impacts: Iran Is a Threat Iranian Hackers have the ability to steal information and use it to shut down energy and infrastructure. Dana Liebelson, 2013, reporter for MotherJones, “Why Iran's Hackers Might Be Scarier Than China's”, http://www.motherjones.com/politics/2013/05/who-has-scarier-hackers-china-or-iran May was a grim month for American cybersecurity. First, the Obama administration accused China of hacking government computers, potentially to exploit weaknesses in the US military. Then, US officials announced that hackers, believed to be sponsored by the Iranian government, had successfully broken into computer networks that run US energy companies, giving Iran the means to sabotage power plants. This week, the Washington Post reported that Chinese cyberspies had hacked more than two dozen big-name US weapons programs, including the F-35 fighter jet, an army program for downing ballistic missiles, and the Navy's Littoral Combat ship. Not all cyberthreats are equal, but one question remains: Who poses the greater danger—Chinese or Iranian hackers? To date, Chinese hackers have gotten more public attention, thanks to a February 2013 New York Times investigation of a top-secret government hacking operation based in Shanghai, and high-profile attacks, originating from China, on US media outlets. But experts point out that though China has greater capabilities for cyberwarfare and is actively stealing US military secrets, Iran's attacks could ultimately be more worrisome, because its hackers are targeting critical infrastructure and developing the ability to cause serious damage to the United States' power grid. "The Chinese are engaged in cyberespionage, which is more or less understood," says Richard Bejtlich, the chief security officer at Mandiant, a company that offers cybersecurity services for Fortune 100 companies. "We know what lines they will and will not cross. But a country like Iran is much more willing to be destructive. They go ahead and delete computers, they corrupt them, and they cause a lot of trouble." James Lewis, a cybersecurity specialist at the Center for Strategic and International Studies who frequently advises the White House, agrees that Iran's "attacks on critical infrastructure are probably the bigger threat…Iran is much more unstable." Hackers directly backed by the Iranian government have demonstrated the capability to destroy critical information and an interest in causing damage to US computer systems, not simply hacking them to collect information. According to the Wall Street Journal, in their most recent campaign, Iranian-linked hackers broke into computer systems to gain information on how US energy companies run their operations, acquiring the means to "disrupt or destroy them in the future." Iranian hackers were also blamed by US officials for erasing thousands of hard drives owned by Saudi Aramco, the world's biggest oil company, in August 2012.

Cyberattack Impact: US Retaliation Security Leader Says U.S. Would Retaliate Against Cyberattacks Mark Mazzetti and David E. Sanger.(Authors of New York Times.)"Security Leader Says U.S. Would RetaliateAgainstCyberattacks."March12,2013.NewYorkTimes.http://www.nytimes.com/2013/03/13/us/ intelligence-official-warns-congress-that-cyberattacks-pose-threat-to-us.html?pagewanted=all&_r=0 The chief of the military’s newly created Cyber Command told Congress on Tuesday that he is establishing 13 teams of programmers and computer experts who could carry out offensive cyberattacks on foreign nations if the United States were hit with a major attack on its own networks , the first time the Obama administration has publicly admitted to developing such weapons for use in wartime.¶ “I would like to be clear that this team, this defend-the-nation team, is not a defensive team,” Gen. Keith Alexander, who runs both the National Security Agency and the new Cyber Command, told the House Armed Services Committee. “This

is an offensive team that the Defense Department would use to defend the nation if it were attacked in cyberspace. Thirteen of the teams that we’re creating are for that mission alone.”¶ General Alexander’s testimony came on the same day the nation’s top intelligence official, James R. Clapper Jr., warned Congress that a major cyberattack on the United States could cripple the country’s infrastructure and economy, and suggested that such attacks now pose the most dangerous immediate threat to the United States, even more pressing than an attack by global terrorist networks.¶

Cyberattack Impacts: Harms National Security Cyberattacks are a serious threat to our national security, lives, infrastructure, and economy Dorgan, Byron L. 2013 (Former United States Senator. “Cyber Terror is a New Language Of War We Barely Understand”. 16 July 13. Accessed 16 July 13. http://www.policymic.com/articles/54927/cyberterror-is-the-new-language-of-war-that-we-understand-only-vaguely) A new novel I’ve just co-authored with David Hagberg titled Gridlock is a story about a computer virus created in Russia, stolen by the Iranians and used to shut down the electric power grid in the U.S. It causes chaos, loss of life, and brings our economy to its knees … all done by an enemy we can’t see using digital weapons rather than firearms. Our [the] book is fiction, but that scenario and many others now constitute real and serious threats to our country every day. Those threats are to our personal identity, our bank accounts and the information we store on our computers. Most importantly, the threats are to our country and the vital services and national security interests that are essential to the functioning of our economy.

Cyberattack Impacts: Economy Cyberterrorism and cyberattacks can demolish the economy, technology leadership, an harm critical infrastructure Borchgrave ’12 (Arnaud de Borchgrave, member of the Atlantic Council and editor-at-large at UPI and the Washington Times, “Cyber Pearl Harbor,” New Atlanticist, 10/2/2012, http://www.acus.org/new_atlanticist/cyber-pearlharbor?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+new_atlanticist+%28N ew+Atlanticist%29) A shadowy hacker group in the Middle East has disrupted the electronic banking operations of some of the United States' largest financial institutions, The Seattle Times reported. But this is hardly new. Five years ago, Goldman Sachs' chief technology officer reported this venerable financial institution had sustained more than 1 million "intrusion attempts in a single day." A military cybernaut expert, speaking privately, said the Pentagon sustains up to 6 million such probes a day. How many were successful remains highly classified. But one Pentagon cyber expert said the vast building's internal communications system was disrupted once for 48 hours. The number of hostile hacker penetrations remains top secret. At Wells Fargo, U.S. Bancorp and Bank of America, the Seattle newspaper reported, a group identifying itself as Izz ad-Din al-Qassam Cyber Fighters attacked their websites and "left customers temporarily unable to access their checking accounts, mortgages and other services." Electronic crime is a fast-spreading plague. In recent years, there have been massive denial-of-service attacks. Computers are flooded with communications demands that cause systems to back up, seize up and shut down. These Islamist cyber fighters said their attacks would continue until a video that insults Prophet Muhammad and triggered riots from Indonesia to Pakistan to Egypt to Libya is removed from the Internet. The 15-minute video, the work of a rank amateur, went viral several weeks ago and can no longer be deleted. Cyber terrorists have been lurking the 'Net a lot longer than the offending video. And critical electronic infrastructure -- from valves that regulate water flows from dams to air traffic control and transnational banking systems -- is vulnerable everywhere. Israel and the United States have been waging electronic warfare against Iran's secret underground uranium enrichment activities. Clearly, Iran is retaliating by using electronic terrorist groups, both homegrown and Middle Eastern. In mid-September, the FBI warned of "a new trend in which cyber criminal actors are using spam and phishing emails" as weapons to attack the global networks of financial institutions." This week, speaking at a Woodrow Wilson International Center meeting devoted to the growing cyber threat, U.S. Army Gen. Keith B. Alexander, chief of the U.S. Cyber Command (also head of the National Security Agency), since it was launched two years ago, said the cyber threat has grown in 10 years "from exploitation to disruption to destruction of computer networks." Russia understood this when the Soviet Union collapsed. The old Soviet Federal Agency for Government Communications and Information quickly became a cyber command as the new Russian leaders gave priority to one area where they could perhaps compensate for U.S. military and economic superiority. This gave the Kremlin a two-decade lead over the United States. USCYBERCOM under Alexander wasn't activated until September 2010. China activated a cyber command in the mid-1990s. This week, Alexander said cyber attacks that would crash stock exchanges and markets "are all possible today." He also said "education is the key to understand what's already happening." At the same event, U.S. Sen. Susan Collins, R-Maine, ranking member and former chairwoman of the Homeland Security Committee, said "over 200 cyberattacks against our national assets, such as critical water treatment and transportation networks are just the tip of the iceberg." Collins said she was most concerned about an attack on the nation's electric power grid. The electronic stealing of intellectual property is critical and already with us round

the clock. "Imagine," she said, "if someone had stolen iPhone5 information and got to market first." Some company intrusions simply plant an electronic spy to monitor -- and steal -- proprietary secrets. Massive electronic threats follow on the heels of massive physical infrastructure threats -- the vast system of highways, bridges, airports, railroads, pipelines, power lines, dams, waterways, water treatment plants, schools and other publicly owned and publicly regulated facilities, all dangerously neglected as hundreds of billions were spent on two wars in Iraq and Afghanistan.

Cyberattack Impacts: Hurt Businesses Targeted Attacks on SMBs (Small and Medium Sized Businesses) Up Ryan Naraine, a journalist and social media enthusiast specializing in Internet and computer security issues, July 13, 2012, “Upsurge in targeted attacks against small businesses”, ZDNET, http://www.zdnet.com/upsurge-in-targeted-attacks-against-small-businesses-7000000883/, Date Accessed: July 23, 2013 Symantec is reporting a significant uptick in targeted attacks against SMBs (small- and medium-sized businesses) in the first half of 2012 with about 36 percent of all targeted attacks hitting businesses with 250 or fewer employees.¶ According to the Symantec Intelligence Report the 36 percent number is up from 18 percent at the end of December 2011.¶ "50% of attacks focused on companies with less than 2500 employees," the report added, noting that it's possible that smaller companies are now being targeted as a stepping stone to a larger organization because they may be in the partner ecosystem and less well-defended. "Targeted attacks are a risk for businesses of all sizes – no one is immune to these attacks," the company warned.

Cyberattack Impacts: Infrastructure Cyber attack could shut down the US for weeks, us infrastructure relies on data run systems Llewellyn King,executive producer and host of "White House Chronicle", 6/10/12, The Devastating Effects of a Cyber-Attack Against a Country's Energy Grid, http://oilprice.com/Energy/Energy-General/The-Devastating-Effects-of-a-Cyberattack-Against-a-Countries-EnergyGrid.html, date of access- 7/21/13

Computer war has grown up. It has moved from the age of the equivalent of black powder to the equivalent of high-explosive shells -- not yet nuclear devices but close.¶ Enemies with sophisticated computer technology, money and determination can now contemplate the possibility of taking down the electrical systems of large swaths of the nation. Just a small interruption in power supply is devastating; as has been demonstrated by the recent power outages in 10 states, caused by severe weather.¶ The world as we know it stops when power fails; gasoline cannot be pumped, air conditioning and all other household appliances cannot be used, plunging us into a dark age without the tools of a dark age – candles, firewood, horses and carts.¶ At the center of this vulnerability is a device most of us have never heard of but is an essential part of modern infrastructure. It is the programmable logic controller (PLC).¶ In appearance the PLC is usually a small, black box about the size of a woman's purse. It came on the scene in the 1960s, when microprocessors became available and has grown exponentially in application and deployment ever since. The full computerization of the PLC put it silently but vitally in charge of nearly every commercial/industrial operation, from assembly lines to power dispatch.¶ These devices are the brain box of everything from air traffic systems to railroads. They replaced old-fashioned relays and human commands, and made automation truly automatic.¶ The revolution brought on by the PLC is an “ultra-important part” of the continuing story of technological progress, according to Ken Ball, an engineering physicist who has written a history of these devices.¶ Now

the PLC -- this quiet workhorse, this silent servant -- is a cause of worry; not so much from computer hackers, out for a bit of fun through manipulating a single controller, but from the wreckage that can be achieved in a government-sponsored cyberattack with planning and malice aforethought.¶ Such an attack could be launched for diverse purposes against many aspects of our society. But the most paralyzing would be an attack on the electrical system; on the controllers that run power plant operations and the grid, from coal to nuclear to natural gas to wind turbines and other renewables.¶ Such a coordinated attack could bring the United States to its knees for days or weeks with traffic jams, abandoned cars, closed airports and hospitals reliant on emergency generators while fuel supplies last.¶

Cyber attack devastating, it would take out important infrastructure necessary to prevent deaths. FRANCIS, DAVID. Staff analyst for the fiscal times,3/11/13, The Coming Cyber Attack That Could Ruin Your Life, The fiscal times, http://www.thefiscaltimes.com/Articles/2013/03/11/The-Coming-Cyber-Attack-that-Could-Ruin-Your-Life.aspx#page1, date access- 7/21/13 Last month, a private security

firm announced that Chinese military hackers had launched attacks on the U.S. government and private companies nearly 147 times in the last seven years, a formal declaration of a secret cyber war that’s been going on for decades.¶ This war has not yet had a major impact on the lives of average American citizens: Attacks have resulted in minor service disruptions only, such as not being able to log into online accounts. ¶ But experts warn these kinds of service breaks are just a small symptom of the serious damage cyber terrorists and hackers can cause. Officials have said that hackers could cause a cyber 9/11 – an attack could cause widespread turmoil, including the disappearance of money, electrical failure, and even death. And America could be the battlefield in which these new techniques of war are tested. ¶ “An adversary looking to cause chaos could pick any part of critical infrastructure, from banking to power to health care,” said Jeffrey Carr, chief executive officer of Taia Global, a cyber security firm. “All of those are

vulnerable to cyber attack.” ¶ The most harmful cyber attacks have the ability to impact nearly every part of American life, putting lives and essential privacy at risk. Without increased vigilance, experts say it’s only a matter of time before a worst-case scenario becomes a reality. ¶ Hackers have attempted to infiltrate critical infrastructure components like mass transit and power grids, although few Americans are aware of it. Former

Defense Secretary Leon Panetta says they have had limited success. But all it takes it one breach to cause chaos.¶ “We know of specific instances where intruders have successfully gained access to these [critical infrastructure] systems," Panetta said last October in New York. "We also know that they are seeking to create advanced tools to attack these systems and cause panic and destruction and even the loss of life. ”¶ Attacks like the one Panetta described could turn off the power to large parts of the country. Public transportation systems could malfunction and operators to lose control of systems that prevent crashes. Attackers could also take down communication systems and Internet access.¶ According to Tom Kellermann, vice president of cyber security for Trend Micro, attacks on infrastructure could also provide false information to people making life and death decisions. For instance, hackers could target air traffic control systems, providing false information that could cause planes to crash. “Everyone implicitly trusts his or her computer,” he said. “A cyber attack can corrupt this information.”¶ So far, cyber attacks have had limited access to bank accounts for short periods of time, and some personal information has been stolen. But according to Larry Ponemon, founder of the Ponemon Institute, a think tank that studies data privacy, hackers want to do more than disrupt: they want to make money disappear. ¶ “In

a successful attack against a bank, credentials and passwords are gone,” he said. “Hackers are trying to go into accounts to steal large sums of money.” Maybe, but imagine, for example, that cyber thieves were able to steal just 1 percent or less from JP Morgan’s $2 trillion in assets. ¶ Health care systems are also vulnerable to these kinds of attacks. Many doctors and hospitals are now keeping electronic medical records. Hackers can get access to this information, making changes that could potentially lead to deadly instances where doctors prescribe unnecessary drugs or order irrelevant procedures for the patient. ¶ “I have never seen an industry with more gaping security holes,” Avi Rubin, a computer scientist and technical director of the Information Security Institute at Johns Hopkins University, told the Washington Post last year. “If our financial industry regarded security the way the health-care sector does, I would stuff my cash in a mattress under my bed."¶ According to Ponemon, hackers can target individuals without the person ever knowing it. “An

attack could be occurring if you computer is running weird and slow,” he said. “Often times, hackers will attack computers at time when the user is most likely sleeping.” When the system is shut down, of course, hackers can’t get in. Once a system has been infiltrated, there’s no limit to what hackers can steal.¶ “Hackers have the ability to capture info from your devices. They can steal your password, your documents and your spreadsheets,” Ponemon said. “You can buy dozens of antivirus programs that usually stop most of the bad stuff out there. But there are always some malware programs that have no signature and can bypass security.” Equally troubling is the hacker’s ability to conduct surveillance on a victim, Ponemon said.¶ “They turn on and off your camera,” Ponemon said, referring to the Web cameras that are standard in today’s computers. “They can hack into the voice part of your phone and wiretap a real conversation or use your phone to listen in on real-time conversations.”¶ Or as Taia Global’s Carr said, “I don’t think there is a limit on the imagination on how much harm could be done.”

Cyberattack Impacts: Mass Death Cyber attack could devastate us- defense secretary agrees. Tapping into infrastructure would shut down the US and lead to mass death. ELISABETH BUMILLER, staff analyst, 10/11/12, Panetta Warns of Dire Threat of Cyberattack on U.S., New York times, http://www.nytimes.com/2012/10/12/world/panetta-warns-of-dire-threat-of-cyberattack.html?pagewanted=all&_r=0, date access- 7/21/13

Defense Secretary Leon E. Panetta warned Thursday that the United States was facing the possibility of a “cyber-Pearl Harbor” and was increasingly vulnerable to foreign computer hackers who could dismantle the nation’s power grid, transportation system, financial networks and government. In a speech at the Intrepid Sea, Air and Space Museum in New York, Mr. Panetta painted a dire picture of how such an attack on the United States might unfold. He said he was reacting to increasing aggressiveness and technological advances by the nation’s adversaries, which officials identified as China, Russia, Iran and militant groups. ¶ “An aggressor nation or extremist group could use these kinds of cyber tools to gain control of critical switches,” Mr. Panetta said. “They could derail passenger trains, or even more dangerous, derail passenger trains loaded with lethal chemicals. They could contaminate the water supply in major cities, or shut down the power grid across large parts of the country.” ¶ Defense officials insisted that Mr. Panetta’s words were not hyperbole, and that he was responding to a recent wave of cyberattacks on large American financial institutions. He also cited an attack in August on the state oil company Saudi Aramco, which infected and made useless more than 30,000 computers. ¶ But Pentagon officials acknowledged that Mr. Panetta was also pushing for legislation on Capitol Hill. It would require new standards at critical private-sector infrastructure facilities — like power plants, water treatment facilities and gas pipelines — where a computer breach could cause significant casualties or economic damage. ¶ In August, a cybersecurity bill that had been one of the administration’s national security priorities was blocked by a group of Republicans, led by Senator John McCain of Arizona, who took the side of the U.S. Chamber of Commerce and said it would be too burdensome for corporations. ¶ The most destructive possibilities, Mr. Panetta said, involve “cyber-actors launching several attacks on our critical infrastructure at one time, in combination with a physical attack.” He described the collective result as a “cyber-Pearl Harbor that would cause physical destruction and the loss of life, an attack that would paralyze and shock the nation and create a profound new sense of vulnerability.” ¶ Mr. Panetta also argued against the idea that new legislation would be costly for business. “The fact is that to fully provide the necessary protection in our democracy, cybersecurity must be passed by the Congress,” he told his audience, Business Executives for National Security. “Without it, we are and we will be vulnerable.” ¶ With the legislation stalled, Mr. Panetta said President Obama was weighing the option of issuing an executive order that would promote information sharing on cybersecurity between government and private industry. But Mr. Panetta made clear that he saw it as a stopgap measure and that private companies, which are typically reluctant to share internal information with the government, would cooperate fully only if required to by law. ¶ “We’re not interested in looking at e-mail, we’re not interested in looking at information in computers, I’m not interested in violating rights or liberties of people,” Mr. Panetta told editors and reporters at The New York Times earlier on Thursday. “But if there is a code, if there’s a worm that’s being inserted, we need to know when that’s happening.” ¶

Cyberattack Impacts: Mass Death Cyberattacks could gridlock society and kill millions Pogatchnik, Shawn. 2013 (Reporter for the Associated Press. “AP Interview: Ex-FBI Chief on Risk of Cyber Terror”. 7 July. Accessed 16 July 13. http://bigstory.ap.org/article/ap-interview-ex-fbi-chief-riskcyber-terror) Speaking to The Associated Press ahead of the Global Intelligence Forum starting Monday in Ireland, Freeh said hackers seeking to take control of, or take down, key pieces of U.S. infrastructure could do more damage than the attackers of 9/11. He said computer systems controlling power plants, the navigation of aircraft and ships, and even the switching of street lights could be hijacked to gridlock societies and kill large groups of people. "People traditionally think of this threat as somebody stealing their identity or their credit card number, or making it inconvenient to go to the ATM (cash machine). That's a very benign view of the potential for what cyber terrorism really is," Freeh said. "You could manipulate transportation systems, aviation guidance systems, highway safety systems, maritime operations systems. You could shut down an energy system in the northeast U.S. in the middle of winter. The potential for mass destruction in terms of life and property is really only limited by (the attackers') access and success in penetrating and hijacking these networks," he said.

Cyberattack Impact: Prevents Retaliation When coupled with a traditional attack, a cyberattack would allow a terrorist organization to pre-emptively cripple response Bucci, Steven. 2009 (Director of the Douglas and Sarah Allison Center for Foreign Policy Studies. "The Confluence of Cyber Crime and Terrorism". 12 Jun. http://www.heritage.org/research/lecture/theconfluence-of-cyber-crime-and-terrorism) If the attacker has used weapons of mass destruction (chemical, biological, radiological, nuclear, and high-yield explosives) in the kinetic part of the attack, the cyber component can also hinder the ability to rally consequence-management assets. The victim will have suffered a catastrophic attack and will be unable to respond effectively to the results. The continued cyber intrusions will not only keep them from striking back with any real effect, but may make them ineffectual in mobilizing their firstresponder forces.

A2: Cannot Stop Cyberattack Successful cyber defense is possible Dorgan, Byron L. 2013 (Former United States Senator. “Cyber Terror is a New Language Of War We Barely Understand”. 16 July 13. Accessed 16 July 13. http://www.policymic.com/articles/54927/cyberterror-is-the-new-language-of-war-that-we-understand-only-vaguely) It is certain that those who wish America ill will continue these attacks. Our new novel describes a scenario of what could happen if we don’t take these new cyber-terror threats seriously. But if we understand the threat and work hard with the best and brightest in the public and private sectors, we can successfully defend America and its citizens against this new weapon used by terrorists.

Solvency: Digital Surveillance Solves Cyberattacks The NSA’s data mining can stop Cyber Terrorism Michaels, Jim; 2013 (Military Writer at USA TODAY and author of "A Chance in Hell," a widely praised book on the Iraq war, June 6, 2013, “NSA data mining can help stop cybercrime, analysts say.” USA Today (http://www.usatoday.com/story/news/politics/2013/06/06/nsa-data-mining-cyber-crimedata/2397165/) July 22, 2013) The huge volume of telephone records turned over to the U.S. government could help investigators identify and deter a range of terrorist acts, including cyberattacks, analysts say. "Once you have this big chunk of data and you have it forever… you can do all sorts of analytics with it using other data sources," said Joseph DeMarco, former head of the cybercrime unit in the U.S. attorney's office in New York City. "A data set like this is the gift that keeps on giving," said DeMarco, a partner at the law firm DeVore & DeMarco. The government obtained an order from the Foreign Intelligence Surveillance Court ordering a Verizon subsidiary to turn over phone records to the National Security Agency. The records do not include the content of phone calls and the order does not authorize eavesdropping. Still, the information can be helpful to investigators looking for patterns, linking people and networks. Also, phone numbers can be attached to computers, allowing hackers to get into networks through telephone lines. The data can also be viewed against other databases that help investigators see patterns and links among people and networks. "All the data is critical," said Robert Rodriguez, a cybersecurity expert and former Secret Service agent. The government considers many cyberattacks to be acts of terror, DeMarco said. "The definition of terrorism includes cyberterrorism," he said. The court order also raises questions about the relationship between the government and industry at a time when so much critical infrastructure, such as power grids and banking, is in the hands of industry and may be vulnerable to cyberattack.

US Cyber Command is using digital surveillance to thwart cyberattacks and maintain offensive capabilities Talitha Dowds, Director and Senior Fellow of the Proliferation Prevention Program, “A New Phase of Nuclear Terrorism – Cyber Warfare” DoP: MAR 25, 2011 Date of acees: 7/20/13 http://csis.org/blog/new-phase-nuclear-terrorism-cyber-warfare As Director of National Intelligence James Clapper discussed the "remote" threat of a major cyberattack within the next two years, NSA and US Cyber Command director Gen. Keith Alexander told Congress that the US was training its own cyberwarriors as well. In yesterday's hearing before the House Armed Services Committee, Alexander emphasized that "this team, this defend-the-nation team, is not a defensive team... This is an offensive team that the Defense Department would use to defend the nation if it were attacked in cyberspace. 13 of the teams that we’re creating are for that mission alone."¶ As The New York Times reports, Alexander says 27 additional teams are dedicated to training and surveillance, and more will be able to "defend our networks in cyberspace." He did not go into detail about the projects, but he said that training was the most important task at hand, and that defense was best served by monitoring incoming traffic to the US with systems that could check for attacks. Current fears about cyberwarfare have focused on China, which is considered responsible for recent attacks on The New York Times and other papers, but Clapper has said that "isolated state or nonstate actors" are more likely to launch high-stakes campaigns that could take out critical infrastructure.

Cybercrime

Cybercrime Impacts: Hurts Economy Cybercrimes hurt econ; costs globe billions and U.S. Jobs Ellyne Phneah, writer for ZDNET, July 23, 2013, “Cybercrime can cost economy up to $500B”, ZDNET, http://www.zdnet.com/cybercrime-can-cost-economy-up-to-500b-7000018420/, Date Accessed July 23, 2013. Cybercrimes cost the global economy up to US$500 billion annually, and can potentially result in the loss of 500,000 jobs in the United States alone. These findings were highlighted in a report released Tuesday by the Center of Strategic and International Studies (CSIS), and commissioned by McAfee. Aimed at measuring real-world losses from cyberattacks, the center enlisted economists, intellectual property experts, and security researchers to develop the report. The researchers also based their estimates on comparisons to real-world analogies such as losses in car crashes, piracy, pilferage and crime, and drugs. The generally accepted range for cybercrime losses to the global economy was between US$100 billion and US$500 billion, the report noted.¶ The

report further estimated a total of 508,000 jobs could potentially be lost in the U.S. alone, due to cyberespionage. The CSIS' commerce department in 2011 estimated US$1 billion in export value was equal to 5,080 jobs, which meant the high end estimate of US$100 billion in losses would translate to 508,000 lost jobs, the report explained.

Cybercrime Impacts: Worse than Physical Crime Cost of Cybercrime overtakes Physical Crime IBM Reports Adam Emery,14 Mar 2006, “U.S. Businesses: Cost of Cybercrime Overtakes Physical Crime”, IBM, http://www-03.ibm.com/press/us/en/pressrelease/19367.wss#contact, Date Accessed: July 24, 2013 Nearly 60 percent of U.S. businesses believe that cybercrime is more costly to them than physical crime, reports a recent IBM survey of companies in the healthcare, financial, retail and manufacturing industries. The costs resulting from cybercrime, these businesses report, are primarily from lost revenue, loss of current and prospective customers and loss of employee productivity.

Hackers

Hackers Destroy Privacy Lack of cyber security turns digital privacy- hackers can steal your private information otherwise. Steve Largent and Rick Boucher, congressmen, “Good cybersecurity means better privacy – opinion” March 2013, DoA: 7/17/13 http://money.cnn.com/2013/03/05/technology/security/cybersecurityprivacy/index.html Such views are nonsense. Quite simply, digital

privacy cannot exist without cybersecurity. Weak security equals weak privacy. Want better privacy? Raise your security game to prevent hackers from stealing private data. Let the experts from the private sector and government communicate with each other so when they see threats, they can alert others and work together to create a solution.¶ Despite this common-sense connection, a seemingly never-ending debate drags on about how our nation can improve its cybersecurity. There is lots of talk, but little action to support privacy's enabler.¶ That could change if Congress passes The Cyber Intelligence Sharing and Protection Act (CISPA) and the President signs it into law. CISPA passed the House (248-168) about a year ago, and since then has been the subject of considerable discussion, with no discernible progress.¶ Critics don't like the fact that CISPA enables information sharing between the federal government and the private sector in order to prevent cyberattacks and to pursue cybercriminals, hackers, fraudsters and others intent on harm. As they see it, such cooperation constitutes a potential privacy invasion that is so egregious as to merit no further consideration.¶ Their concerns are, no doubt, well intended. But they are also out of touch with reality and risk unintended consequences that only serve to allow cybercriminals to operate with impunity.¶

The breadth and scale of the threat of cyberattacks on our nation's critical infrastructure -- financial institutions, electric and water utilities and air traffic control systems, to name just a few -- to say nothing of consumers' personal data, is no longer in debate. Meanwhile, the avenues and opportunities by which hackers have to penetrate our networks are growing hand in hand with our increasingly mobile communications ecosystem. On the consumer side, for example, a recent study concludes more than 40% of U.S. smartphone users will click on unsafe links this year, potentially spreading malware that can steal data and dollars to their friends, family and colleagues.¶ Related story: Wake up, America! China is attacking¶

Hackers destroy Digital Privacy and violate Constitutional liberties. Rogers, Mike, Member of the House of Representatives and Chairman of the Permanent Select Committee on Intelligence. Ruppersburg, Dutch, also a member of the House of Reps, andn a ranking member on Permanent Select Committee on Intelligence. 4/16/13 Protecting Internet freedom is a priority http://thehill.com/special-reports/defense-and-cybersecurity-april-2013/294319-protectinginternet-freedom-is-a-priority Date Accessed; 7/20/13 The privacy and civil liberties rights enshrined in the Constitution that we swore to protect are threatened daily as foreign hackers steal unfathomable amounts of information from our computer networks. These networks contain our most important personal information, including our banking, medical and family records. Secure computer networks are vital to ensuring that the Internet remains a key and open forum for individual expression — America simply cannot turn a blind eye to this threat any longer.

A2: Hacktivism Good “Hacktivism” is overblown and doesn’t cause social change Dorothy E. Denning, 2001, Georgetown University, “ACTIVISM, HACKTIVISM, AND CYBERTERRORISM: THE INTERNET AS A TOOL FOR INFLUENCING FOREIGN POLICY”, http://ncfm.org/libraryfiles/Children/NetworkNetWar/MR1382.ch8.pdf

In the area of hacktivism, which involves the use of hacking tools and techniques of a disruptive nature, the Internet will serve mainly to draw attention to a cause, since such incidents are regularly reported by news media. Whether that attention has the desired effect of changing policy decisions related to the issue at hand is much less certain. Hacktivists may feel a sense of empowerment, because they can control government computers and get media attention, but that does not mean they will succeed in changing policy. So far, anecdotal evidence suggests that for the majority of cases, they will not.

Econ

Attacks on Small Businesses Up Targeted Attacks on Small and Medium Sized Businesses increased in 2012. Ryan Naraine, a journalist and social media enthusiast specializing in Internet and computer security issues, July 13, 2012, “Upsurge in targeted attacks against small businesses”, ZDNET, http://www.zdnet.com/upsurge-in-targeted-attacks-against-small-businesses-7000000883/, Date Accessed: July 23, 2013 Symantec is reporting a significant uptick in targeted attacks against SMBs (small- and medium-sized businesses) in the first half of 2012 with about 36 percent of all targeted attacks hitting businesses with 250 or fewer employees.¶ According to the Symantec Intelligence Report (download PDF) the 36 percent number is up from 18 percent at the end of December 2011.¶ "50% of attacks focused on companies with less than 2500 employees," the report added, noting that it's possible that smaller companies are now being targeted as a stepping stone to a larger organization because they may be in the partner ecosystem and less well-defended. "Targeted attacks are a risk for businesses of all sizes – no one is immune to these attacks," the company warned.

Cybercrime Hurts Businesses Cost of Cybercrime overtakes Physical Crime IBM Reports Adam Emery,14 Mar 2006, “U.S. Businesses: Cost of Cybercrime Overtakes Physical Crime”, IBM, http://www-03.ibm.com/press/us/en/pressrelease/19367.wss#contact, Date Accessed: July 24, 2013 Nearly 60 percent of U.S. businesses believe that cybercrime is more costly to them than physical crime, reports a recent IBM survey of companies in the healthcare, financial, retail and manufacturing industries. The costs resulting from cybercrime, these businesses report, are primarily from lost revenue, loss of current and prospective customers and loss of employee productivity.

Cyber Crime on the Rise, ATM Hesit nets $45 Million PAISLEY DODDS, London bureau chief for The Associated Press, 05/11/2013 ,“World Attempts To Adjust To The 3Rise Of Cyber Crime”, Huffington Post, http://www.huffingtonpost.com/2013/05/11/cyber-crime-rise-worries-world_n_3259640.html, Date Accessed: July 24, 2013 International law enforcement agencies say the recent $45 million dollar ATM heist is just one of many scams they're fighting in an unprecedented wave of sophisticated cyberattacks.¶ Old-school robberies by masked criminals are being eclipsed by stealth multimillion dollar cybercrime operations which are catching companies and investigators by surprise.¶ "We are seeing an unprecedented number of cyberscams that include phishing for financial data, viruses, credit card fraud and others," Marcin Skowronek, an investigator at Europol's European Cybercrime Center in The Hague said on Saturday.U.S. Investigators said Thursday a gang hit cash machines in 27 countries in two attacks — the first netting $5 million in December and then $40 million in February in a 10-hour spree that involved about 36,000 transactions.¶ Hackers got into bank databases, eliminated withdrawal limits on prepaid debit cards and created access codes. Others loaded that data onto any plastic card — even a hotel keycard — with a magnetic stripe¶ A similar scam yielded some 50 arrests this year in Europe during a joint police operation between Romanian police and Europol, Skowronek said.¶ The operation took more than a year, involved some 400 police officers across Europe and required work comparing bank losses to illegal transactions and then cross-referencing suspects, said Skowronek, who said many national police forces were beefing up their undercover work in the cyberworld to catch criminals. ¶ Some 36,000 debit card and credit card holders in some 16 countries were affected, Skowronek said. The amount stolen was unclear. "Compare this to a physical bank security. If someone walks in today, they're probably not going to get very much money, the dye pack is going to explode, they will be caught on video, they're probably not going to get away with it, and they're probably going to spend a long time in jail," said Urban. "Online, in the cyberworld, we're not there yet."

Cybercrime overtakes drug market costing the global economy $338 Billion a year Zack Whittaker, September 7, 2011, “Cybercrime costs $338bn to global economy; More lucrative than drugs trade”, ZD NET, http://www.zdnet.com/blog/btl/cybercrime-costs-338bn-to-global-economymore-lucrative-than-drugs-trade/57503, Date Accessed: July 26, 2013 cybercrime is costing the global economy $338 billion a year, overtaking a still a lucrative trade in the underground drugs market.¶ The Norton Cybercrime Report 2011 outlines the cost of cybercrime worldwide, with 74 million in the United States alone falling victim to online scams, phishing attacks and exploitative malware; costing the U.S. economy an estimated $32 billion. ¶ But the report suggests that more than 69 percent, at two-thirds of online adults, have fallen victim to cybercrime; a figure that is still on the rise. Norton reports that

Businesses Retaliate Businesses vow to retaliate against cyber attacks Paresh Dave, 5/31/13, Business Reporter at Los Angeles Times, Business Reporter at San Francisco Chronicle, Los Angeles Time, http://articles.latimes.com/2013/may/31/business/la-fi-hacking-back-20130531, Doa- 7/29/13

Frustrated by their inability to stem an onslaught of computer hackers, some companies are considering adopting the standards of the Wild West to fight back against online bandits.¶ In taking an eyefor-an-eye approach, some of the companies that have been attacked are looking at retaliating against the attackers, covertly shutting down computers behind the cyber assaults or even spreading a new virus to stymie the hackers.¶ Such retaliation is illegal in the United States, but companies see it as a way to curtail the breaches, particularly if the attack is originating from another country, where the legality of retaliatory attacks is unclear.¶ Companies also view counterattacking as a way to bypass U.S. authorities, avoiding publicly admitting that they've been attacked and exposing themselves to lawsuits from loss of confidential data or service disruptions.¶ Many companies that have publicly acknowledged costly cyber breaches declined to say whether they retaliated or considered hacking back, and no company was willing to talk about the issue out of fear of additional attacks. ¶ But analysts say hacking back has become part of a serious debate among companies, lawmakers and cyber-security experts.¶ "From

a technical perspective, it's not that challenging," in and shutting them down isn't

said Alex Harvey, a security strategist for the security solutions provider Fortinet. " Breaking

hard, but a new one will just pop. You'll get a couple of minutes of peace and quiet."¶ Security platform provider FireEye says a single organization is targeted by malware about every three minutes. From detection to damage control, the average firm of more than 1,000 workers spends nearly $9 million annually on cyber security, according a survey last year by the independent Ponemon Institute .¶

In a recent report about combating intellectual property theft, a private commission led by former U.S. Ambassador to China Jon Huntsman Jr. and former Director of National Intelligence Dennis Blair called for "informed deliberations" about whether corporations and individuals should have more flexibility to defend intrusions.¶ Federal lawmakers remain at odds about how to deter cyber crime. Many in the security industry strongly advise against retaliation. Federal law bars any unauthorized computer intrusion, and it offers no exception for digital self-defense.¶ "I don't think companies should be hiring gunslingers to fight back," FireEye co-founder Ashar Aziz said. "Before we encourage every random company to hack, we have to look at what makes sense to disrupt cyber crime." ¶ Aziz and other information security experts promote what they say are smarter alternatives. For instance, companies can bolster security by creating multiple versions of sensitive data, with only one version being the legitimate one. In that case, attackers are likely to get their hands on worthless data rather than precious information.¶

Companies remain intrigued by the idea of shutting down an attacker's system.¶ The report from the commission chaired by Huntsman and Blair notes that counterattacks have the potential to deter hackers because the cost of doing business rises. However, the commission stopped short of recommending legalizing retaliatory hacking "because of the larger questions of collateral damage."¶ Many

cyber attacks rely on a network of computers. These infected machines might be owned by innocent Internet users who, for example, accidentally clicked on a bad link in their email. Surreptitiously accessing this computer violates federal law, even if it's to update out-of-date software or remove the malicious program.¶ "If Honda comes over and attacks Ford, then Ford can't send someone over to attack Honda," said Anthony DiBello, head of strategic partnerships at Pasadena-based Guidance Software.¶ But some legal experts say it's not so clear-cut. Under one legal argument, the hacker becomes subject to the rules and policies of the organization it attacks by virtue of connecting to that network. Counterattacks could be justified in the same way that an employer has the right to monitor activities on an employee's work computer.¶ Microsoft Corp. has taken another approach, considered by some to be a "responsible" counterattack. The company sues unidentified hackers and secures court approval to shut down computers engaged in malicious activity. But that approach may not be feasible for most companies, which don't have the computer giant's cash coffer.¶ Rodney Joffe, senior technologist at the security software manufacturer Neustar Inc. and a regular cyber-security advisor to the White House, said counterattacks and even legally sanctioned actions provide only temporary relief.¶ "It makes a great splash and creates a sudden vacuum, but there's hundreds of people who fit into that vacuum because it doesn't take attackers very long to climb back over the wall," Joffe said.

Econ Decline-War And Economic decline causes war Sean O’Donnell, staff writer, 2-26-2009, “Will this recession lead to World War III?,” Baltimore Republican Examiner, http://www.examiner.com/republican-in-baltimore/will-this-recession-lead-toworld-war-iii Could the current economic crisis affecting this country and the world lead to another world war? The answer may be found by looking back in history. One of the causes of World War I was the economic rivalry that existed between the nations of Europe. In the 19th century France and Great Britain became wealthy through colonialism and the control of foreign resources. This forced other up-and-coming nations (such as Germany) to be more competitive in world trade which led to rivalries and ultimately, to war. After the Great Depression ruined the economies of Europe in the 1930s, fascist movements arose to seek economic and social control. From there fanatics like Hitler and Mussolini took over Germany and Italy and led them both into World War II. With most

of North America and Western Europe currently experiencing a recession, will competition for resources and economic rivalries with the Middle East, Asia, or South American cause another world war? Add in nuclear weapons and Islamic fundamentalism and things look even worse. Hopefully the economy gets better before it gets worse and the terrifying possibility of World War III is averted. However sometimes history repeats itself.

Solvency-Data Collection Data collection Necessary to keep expanding IT Security efficient. Eileen Yu, senior editor at ZDNet Asia, where she oversees the business tech news site, June 12, 2013, “Complexity, targeted attacks to drive security spend to $67B”, ZDNET, http://www.zdnet.com/complexity-targeted-attacks-to-drive-security-spend-to-67b-7000016717/, Date Accessed: July 23, 2013 Increasing complexity and number of targeted attacks are pushing companies to spend more on IT security, driving the global market to a 8.7 percent climb to hit US$67.2 billion this year.¶ Key market drivers are mobile security, big data, and advanced targeted attacks.¶ In a statement released Wednesday, Gartner projected the security technology and service market will further expand to US$86 billion in 2016. The market researcher pointed to three market drivers: mobile security, big data, and advanced targeted attacks. ¶ To support these security requirements as well as business needs, more data is needed to more effectively detect advanced attacks, the research firm added, noting that this presented challenges when identifying patterns of potential risk across diverse data sources.

Constitution People interpret the constitution differently all the time, for example, whether the second amendment allows people to own machine guns. No reason why it is the law that everyone must follow. Mount, Steve [Bachelor of Arts, Political Science, 1989, University of Vermont]. "Constitutional Topic: Constitutional Interpretation." US Constitution.net. Craig Walenta, 24 Jan. 2010. Web. 25 June 2013. . The Constitution is short; it cannot and does not attempt to cover every eventuality. Even when it seems it is clear, there can be conflicting rights, conflicting spheres of power. When disputes arise, it comes time for people, and most importantly judges of the Judicial Branch, to interpret the Constitution. The concept of constitutional interpretation is foreign in some countries, where the constitution makes a reasonable effort to cover every eventuality. These constitutions are generally rigid and little changing, adapting slowly to advances in political views, popular opinion, technology, and changes in government. The U.S. Constitution, however, has been termed a Living Constitution, in part because it grows and adapts to internal and external pressures, changing from one era and generation to the next. When a new situation arises, or even a new variation on an old situation, the Constitution is often looked to for guidance. It is at this point that the various interpretations of the Constitution come into play. There

is no one right way to interpret the Constitution, and people often do not always stick to one interpretation. Below, then, are the major divisions in interpretation; your own personal beliefs may fall into several of these categories: Originalism, Modernism/Instrumentalism, Liberalism Historical/Contemporary, Democratic/Normative Reinforcement.

Prism

Prism Solves Terrorism Prism is necessary to search for terrorists Schmitt, Eric, Sanger, David E., Savage, Charlie. June 7, 2013. Administration Says Mining of Data Is Crucial to Fight Terror. http://www.nytimes.com/2013/06/08/us/mining-of-data-is-called-crucial-tofight-terror.html?pagewanted=all. Date Accessed: 7/16/13. [Obama] argued that “modest encroachments on privacy” — including keeping records of phone numbers called and the length of calls that can be used to track terrorists, though not listening in to calls — were “worth us doing” to protect the country. The programs, he said, were authorized by Congress and regularly reviewed by federal courts. ¶ But privacy advocates questioned the portrayal of the program’s intrusion on Americans’ communications as modest. When Americans communicate with a targeted person overseas, the program can vacuum up and store for later searching — without a warrant — their calls and e-mails, too. ¶ Mr. Obama acknowledged that he had hesitations when he inherited the program from George W. Bush, but told reporters that he soon became convinced of its necessity. “You can’t have 100 percent security and also then have 100 percent privacy and zero inconvenience,” he said. “We’re going to have to make some choices as a society.” ¶ To defenders of the N.S.A., the Zazi case underscores how the agency’s Internet surveillance system, called

Prism, which was set up over the past decade to collect data from online providers of e-mail and chat services, has yielded concrete results. ¶ “We were able to glean critical information,” said a senior intelligence official, who spoke on the condition of anonymity. “It was through an e-mail correspondence that we had access to only through Prism.” ¶ John Miller, a former senior intelligence official who now works for CBS News, said on “CBS This Morning,” “That’s how a program like this is supposed to work.” ¶

Veterans of the Obama intelligence agencies say the large collections of digital data are vital in the search for terrorists. “If you’re looking for a needle in the haystack, you need a haystack,” Jeremy Bash, chief of staff to Leon E. Panetta, the former C.I.A. director and defense secretary, said on MSNBC on Friday.¶ Under the program, intelligence officials must present Internet companies with specific requests for information on a case-by-case basis, showing that the target is a foreigner and located outside the United States, a senior law enforcement official said Friday. If the N.S.A. comes across information about an American citizen during the search, it turns over that material to the F.B.I. for an assessment, the official said.

Prism Solves Terrorism Patriot Act and surveillance of citizens enables NSA to thwart dozens of terrorist attacks Cohen, Tom, Staff writer cnn, 6/13/13, CNN, NSA director: Data mining follows law, thwarts terror, http://www.cnn.com/2013/06/12/politics/nsa-terror-hearing, Date Accessed: 7/17/13

Phone records obtained by the government through a secret surveillance program disclosed last week helped to prevent "dozens" of terrorist acts, the director of the National Security Agency told a Senate hearing on Wednesday.¶ Army Gen. Keith Alexander provided the most detailed account so far from a government official of the program in which the agency collects phone records that then can be accessed under federal court permission to investigate suspected terrorists.¶

The scope of

the secret program – potentially [involved] involving phone records of every American -- set off a political firestorm when details emerged with publication of a leaked document.¶ Further leaks revealed other secret programs that collect computer activity and other information.¶ Critics on the right and left accused the government of going well beyond the intended reach of the Patriot Act enacted after the September 11, 2001, terrorist attacks on the United States.¶

Questioned by senators from both parties at a hearing on broader cybersecurity issues, Alexander provided a spirited defense for the programs he described as critical to counter-terrorism efforts.¶ "I think what we're doing to protect American citizens here is the right thing," he said. "Our agency takes great pride in protecting this nation and our civil liberties and privacy, and doing it in partnership with this committee, with this Congress, and with the courts."¶ Alexander added that he welcomed a public debate over protecting America while preserving civil liberties.¶ "To date, we've not been able to explain it because it's classified, so that issue is something that we're wrestling with," he said. "... This

isn't something that's just NSA or the administration doing that and so on. This is what ... our nation expects our government to do for us. So, we ought to have that debate. We ought to put it out there."¶ In the end, he said, some aspects of the giant surveillance apparatus created after 9/11 would have to remain classified.¶ "And they should be, because if we tell the terrorists every way that we are going to track them, they will get through and Americans will die," he said.¶ Alexander also rejected the claim that former NSA contractor Edward Snowden, who admitted leaking the topsecret documents on electronic surveillance programs and is now in hiding, could tap into any American's phone or e-mail.¶ "I know of no way to do that," he said, calling Snowden's statement "false."¶ In an exchange with Democratic

Sen. Patrick Leahy of Vermont, Alexander said he believed the program under Section 215 of the Patriot Act was "critical" in helping the intelligence community corroborate information on possible threats.¶ "It is dozens of terrorist events that these have helped prevent," Alexander said of the Section 215 program and another that collects information on foreign computer use.¶ He would not discuss specific disrupted plots, saying they were classified, but he told Leahy that the

two programs together played a role in helping to stop a planned attack on the New York subway system.¶ Information developed overseas was passed along to the FBI, which was able to identify suspect Najibullah Zazi in Colorado and ultimately uncover a plot, he said. Zazi pleaded guilty to terror-related charges in 2010.¶ In response to questions from senators about why the Section 215 program needed to collect billions of U.S. phone records, Alexander explained that the agency held the records for five years in the event that an investigation uncovered an overseas terrorist link to a specific area in the United States.¶ With a database of phone records, the agency can go "back in time" to figure out the number and date that a suspect called, he said.¶ "We won't search that unless we have some reasonable, articulable suspicion about a terroristrelated organization," Alexander said.¶ Once permission is granted, "we can now look and say, 'who was this guy talking to in the United States and why?'"¶ "The system just gives us back who he was talking to," Alexander explained. "But if you didn't collect it, how do you know who he was talking to?"¶ Obtaining further information, such as the content of the call, would require a court order, he said.¶ GOP Sen. Mike Johanns of Nebraska pressed Alexander on the issue, asking if the search could span "the breadth of telephone records."¶ "The American public is fearful that in this massive amount of data you get that there's the ability of the federal government to synthesize that data and learn something more than maybe what was ever contemplated by the Patriot Act," Johanns said.¶ Alexander will return to the panel on Thursday to give a classified briefing on the programs in order to provide more information, and he pledged to work with the committee to come up with more detailed explanations for the American public.¶ He explained his caution on Wednesday by saying revelations such as the classified documents about the secret programs were harmful to national security efforts.¶ "I would rather take a public beating and people think I am hiding something than to jeopardize the security of this country," Alexander said.¶

Prism Constitutional Supreme court affirms that surveillance doesn’t violate the fourth amendment John Yoo, 6/7/13, political appointee, the Deputy Assistant U.S. Attorney General in the Office of Legal Counsel, Department of Justice, during the George W. Bush administration, http://www.nationalreview.com/corner/350498/nsas-surveillance-no-clear-constitutional-violationsjohn-yoo, Doa- 7/29/13 The latest Obama administration controversy will not prove as bad as it first seems. Apparently, the administration has been asking Verizon for all of the “metadata” on all of its customers’ calling — the phone numbers called and received, but not the content of the calls themselves.¶ In the days after the September 11, 2001 attacks, the Bush administration’s Justice Department (in which I served) approved a program that may have relied on similar technology, but was far narrower in scope. Both programs, however, seek to use communications coming into the United States from a known terrorist abroad to identify an alQaeda network within the country.¶ The

program does not represent a violation of the Constitution because the Fourth Amendment does not protect dialed phone numbers, in contrast to the content of the communications, because individuals lose privacy over those numbers when they are given to the phone company. The Constitution protects the content of the communications, whether it be a phone call, e-mail, or old-fashioned letter. And Congress approved a change to the FISA statute to allow such collection, and a court of federal judges approved it. And as commander-in-chief, the president has the wartime authority to find and intercept enemy communications, known as signals intelligence. Analyzing such metadata — what is sometimes called data mining — is perhaps the most effective way to find terrorist cells in the U.S. and stop future attacks because the Obama administration has dropped our best methods for producing intelligence (the detention and interrogation of al-Qaeda leaders).¶ The revelation of broad e-mail surveillance is more troubling, but it is because we don’t know the program’s scope. If the program only intercepts the content of e-mails for foreigners abroad, as is being reported, there is no constitutional violation. As the

Supreme Court has made clear, the Fourth Amendment does not protect the communications of non-U.S. persons that take place abroad. In fact, the Justices reached that conclusion because they observed that it would be impossible for the U.S. to fight a war against a foreign enemy if limited by the Fourth Amendment. Allowing the government to intercept foreign, potentially enemy signals intelligence abroad without a warrant recognizes the reality of war, as opposed to the precise targeting of communications that would apply if domestic law enforcement were the framework.¶ We shouldn’t expect any measured response to the Obama administration’s program from the usual libertarian critics, should we? When news broke in 2006 that the National Security Agency had been collecting phone-call metadata, Senate Democrats called for President Bush’s censure or perhaps impeachment, New York Times and Washington Post editorial writers attacked Bush as a violator of the Constitution, academic leaders such as Yale law-school dean Harold Koh called it “quite shocking” and without judicial approval, and Senator Patrick Leahy had a hearing where he yelled “are you telling me that tens of millions of Americans are involved with al-Qaeda?”¶ I suspect that we will hear nary a peep from these sources about Obama, proving yet again that the criticism of the Bush anti-terrorism programs was motivated by partisan politics, not enduring principle. But, unfortunately, the program will be questioned because of the Obama administration’s serious mistakes on its IRS investigations into conservative groups and Justice Department surveillance of journalists to stop leaks. The Obama administration’s destruction of the American people’s trust in their government’s ability to run its core tax and law-enforcement functions will harm our government’s ability to carry out its duty to protect the nation.

Prism Legal PRISM is legal under the Patriot Act, there has yet to be a successful constitutional challenge to it. Bill Blum, former judge and death penalty defense attorney, Is the Surveillance State Constitutional?, Jun 11, 2013¶ Truth Dig,http://www.truthdig.com/report/item/is_the_surveillance_state_constitutional_20130611/, Doa7/29/13 The surveillance state is real and very much alive, but is it legal? The answer may surprise you. Despite constitutional protections against unlawful search and seizure, the Supreme Court and Congress have given the other branch of American government extraordinary power.¶ As classified documents recently published by The Guardian and The Washington Post reveal, the FBI and the National Security Agency are collecting the phone activity logs (the so-called metadata, encompassing billions of calls per day) of all telephone users in the country. The revelations also confirm that the feds are collecting, screening and reading at least some of the emails and other electronic communications made by suspected terrorists abroad, some of which might “incidentally” include communications made or received by Americans at home, to quote from the declassification memo released Saturday by James Clapper, the director of national intelligence, describing the NSA’s PRISM computer system used to acquire such information. ¶ Surely, you might think, such all-encompassing surveillance must be unconstitutional, and ultimately will be stopped or modified by the Supreme Court. ¶ Think again. President Obama, among many others, has assured us that the government’s spying operations are entirely legal. ¶ The problem is not that the president has taken leave of his senses, or suddenly taken the rest of us for fools. The problem is that he may well be correct, at least according to the way the Supreme Court has thus far interpreted the Constitution. Because of their classified status, and notwithstanding the recent press revelations, the NSA surveillance operations’ extent and exact methodology remain largely unknown. But from a civil liberties standpoint, what we do know isn’t very encouraging. ¶ Phone Records¶ Operating under various code

names, such as Trailblazer, Stellar Wind and Ragtime, authority for the 215

collection of telephone metadata—the phone numbers each of us calls and the numbers of those who call us—derives from Sections and 505 of

the Patriot Act, which was initially passed in 2001 and amended key provisions of the Foreign Intelligence Surveillance Act.¶ the FBI on behalf of the NSA to apply for court orders requiring phone companies to produce business records “to protect against international terrorism or clandestine intelligence activities.” The section served as the legal basis for the order published by The Guardian that was Section 215 (codified at 18 United States Code 1861) authorizes

issued in April by the Foreign Intelligence Surveillance Court to Verizon Business Services.¶ The court deliberates in secret, issues its orders on an “ex parte” basis without hearing from those affected by them, and only rarely publishes its decisions, although the Justice Department reports annually to Congress on the overall volume of surveillance applications. In 2012, the FBI submitted 1,789 applications to the Foreign Intelligence Surveillance Court. One was withdrawn; all the others were approved. ¶ Section

505 (codified at 18 USC 2709) authorizes the FBI to issue national security letters, without any judicial oversight, to obtain subscriber information and toll billing records from telecom carriers. Recipients of national security letters are subject to gag orders that forbid them from ever revealing the letters’ existence. In 2011, the FBI issued 16,511 such letters. ¶ Those seeking to declare these sections unconstitutional face at least one enormous obstacle: the 1979 case of Smith v. Maryland, in which the Supreme Court held that telephone users have no reasonable expectation of privacy in the records of their calling activities. As the Smith ruling instructs, absent a privacy expectation, no illegal search within the meaning of the Fourth Amendment occurs. Unless the Supreme Court overrules or distinguishes Smith from the NSA’s current spying platforms, legal challenges to orders like the one issued to Verizon are likely to meet with little success.

A2: Prism Destroys All Privacy Obama argues there are limits to the surveillance allowed under Prism. Hennessey, Kathleen. June 19, 2013. Obama defends NSA digital surveillance programs. http://www.latimes.com/news/world/worldnow/la-fg-wn-obama-defends-nsa-surveillance20130619,0,3630725.story. Date Accessed 7/17/13. BERLIN -- President Obama tried to reassure skeptical Europeans about sweeping U.S. digital surveillance programs expanded under his watch, arguing that the programs are circumscribed, overseen by a court and effective.¶ "What I can say to everybody in Germany and everybody around the world is this applies very narrowly," Obama said Wednesday after a meeting in which German Chancellor Angela Merkel pressed the president on whether the programs were violating the privacy rights of German citizens.¶ "This

is not a situation in which we are rifling through the ordinary emails of is not a situation where we can go on to the Internet and start searching any way we want."¶ Obama argued that the collection of bulk data on phone German citizens or American citizens or French citizens or anybody else," he said. "This

records and Internet activity has averted "at least 50 threats," repeating claims made by other administration officials since details about the programs were disclosed two weeks ago.

A2: Congress is Reigning in Prism/NSA Spying The White House has urged Congress to reject the measure to reign in NSA spying. ThinkProgress; July 24, 2013 (American political blog that provide[s] a forum that advances progressive ideas and policies, “National Security Brief: White House Calls On Congress To ‘Reject’ Measure Reining In NSA Spying” ThinkProgress.org, http://thinkprogress.org/security/2013/07/24/2347191/house-nsa/, Date Retrieved; July 24, 2013) The Hill reports that the House is expected to vote on an amendment to a Defense Appropriations bill that is aimed at limiting the National Security Agency’s powers to collect information on Americans’ telephone and internet traffic. One measure — put forward by Rep. Justin Amash (R-MI) — will prevent the NSA from using the PATRIOT Act to collect records of people who are not under investigation and another says the Agency cannot target U.S. citizens. NSA Director Gen. Keith Alexander lobbied the House yesterday in an effort to dial back congressional opposition to NSA spying and the top Democrat and Republican on the Senate Intelligence Committee oppose the measures, as does the White House. “[W]e oppose the current effort in the House to hastily dismantle one of our Intelligence Community’s counterterrorism tools,” a statement from White House press secretary Jay Carney says. “This blunt approach is not the product of an informed, open, or deliberative process. We urge the House to reject the Amash Amendment, and instead move forward with an approach that appropriately takes into account the need for a reasoned review of what tools can best secure the nation.” Amash told the New York Times that Alexander’s lobbying didn’t change any minds and that his measure will most likely pass. “I think the American people are overwhelmingly in support of reining in the blanket surveillance of the NSA,” he said.

A2: Data Collection Leads to Government Oppression Data collection helps increase transparency and check government encroachment Jamie Yap, January 31, 2013, “Big-data analytics can serve as checks and balances”, ZDNET, http://www.zdnet.com/big-data-analytics-can-serve-as-checks-and-balances-7000010611/, Date Accessed: July 23, 2013 The ability of big-data collection and analysis can serve as checks and balances on government bodies, ensuring agencies are both administratively efficient and transparent as public service providers to citizens.¶ An underlying force of big data is the move from structured to unstructured information such as socialmedia posts, photographs, and video clips. Unless social-media data is controlled or censored by the government, issues of national interest getting discussed and circulated on social networks can serve as checks and balances on a country's leaders, said David Menninger, head of business development and strategy at Greenplum, the big-data analytics provider owned by EMC.¶ "For example, say there's higher occurrence of a type of complaint about aging infrastructure, that creates a checks and balance for the authorities," he said at an interview Thursday. Menninger, who is based in the US, was in Singapore to meet company executives and business partners.¶ Gathering and analyzing all that data enables governments to better serve the people. They know what critical issues need immediate attention, where to concentrate their resources, and spend money where it is most needed to do the most good, he noted.¶ Going a step farther, big-data analytics can also be used to maintain transparency and fight potential graft in governments, Menninger pointed out.

Espionage

Espionage-Russia Russian-US Cold War Espionage still a threat Ross, Brian (Staff Writer ABC News) Jun 2013 Edward Snowden Steps Into Secret U.S.-Russia Spy Scuffle http://abcnews.go.com/Blotter/edward-snowden-steps-secret-us-russia-spyscuffle/story?id=19495341#.UeViQPlQFZ4 Date Accessed: 7/16/13 An ABC News review of public reports shows that in the past 16 months alone, at least six people have been accused or convicted of spying for the U.S. in Russia, including two Americans who were kicked out of the country and four Russians purportedly recruited by U.S. intelligence -- all sent to prison. Another American, a lawyer, was reportedly expelled from Russia this May because he rebuffed Russian agents' attempt to recruit him to spy for them.¶ "Espionage is alive and well" between the old Cold War foes, said David Major, a former senior FBI counter-intelligence officer and now President of the Centre for Counterintelligence and Security Studies, which tracks spy cases the world over.¶ Some of the cases, like that of blown CIA agent Ryan Fogle, splashed across headlines the world over. But several others, like the case of a Russian intelligence colonel who worked with the CIA and got 18 years behind bars for it, barely made a ripple in American media.¶ Prior to 2012,

the whole world took notice in 2010 when the FBI rounded up 10 undercover Russian agents in America – including the "SoHo Spy" Anna Chapman – but far fewer heard in 2011 when it was revealed a Russian intelligence official in Moscow had given the spy ring up and then fled to the U.S. That man, Col. Alexander Poteyev, reportedly had been recruited by the CIA.¶ Now

with Snowden, a former contractor for the National Security Agency with a head and, reportedly, laptops full of U.S. secrets, Major said the Russians have been handed a victory, even if Snowden insists he's not working with any governments.¶ "One of the highest targets [for foreign intelligence agencies] has always been the NSA, one of the hardest targets for them ever to penetrate," Major said. "[Russian intelligence] is going to look at this case as an opportunity, as a treasure trove of intelligence that [will be] exploited to the extent that they can, and then when they decide, they'll move on."

Espionage is a difficult to manage, yet growing problem to the U.S Lewis, James A(Director of Technology at CSIS) December 2002 Assessing the Risks of Cyber Terrorism, Cyber War and Other Cyber Threatshttp://www.steptoe.com/publications/231a.pdf Date Accessed: 7/16/2013 Espionage opportunities created by a greater reliance on internet-accessible computer ¶ networks will create greater risk for national security than cyber attacks. Terrorist groups ¶ are likely to use the Internet to collect information on potential targets, and intelligence¶ services can not only benefit from information openly available on the web but,14 more¶ importantly, can benefit from the ability to clandestinely penetrate computer networks¶ and collect information that is not publicly available. This is very different from hacking, ¶ in that in the event of a successful penetration of a hostile network, a terrorist group or an ¶ intelligence service will want to be as unobtrusive as possible. A sophisticated opponent ¶ might hack into a system and sit there, collecting intelligence and working to remain ¶ unnoticed. It will not disrupt essential services or leave embarrassing messages on ¶ websites, but remain quietly in the background collecting information. Collection ¶ techniques for the Internet differ significantly from earlier signals and communications ¶ intercept techniques, and while different kinds of data will be collected, the overall effect ¶ may be to make some espionage activities much more rewarding. This topic, the ¶ implications for espionage of the greater use of computer networks and Internet ¶ protocols, deserves further study.

Espionage-China Espionage is top threat to the US- China has been accused of espionage Hosenball, Mark. (Investigative Producer NBC, Staff Writer on Reuters) Mar 2012 Cyber-attacks leading threat against U.S.: Spy Agencies http://www.reuters.com/article/2013/03/12/us-usa-threatsidUSBRE92B0LS20130312 Date Accessed: 7/15/13 (Reuters) - Intelligence leaders said for the first time on Tuesday that cyber attacks and cyber espionage have supplanted terrorism as the top security threat facing the United States. That stark assessment, in an annual "worldwide threat" briefing that covered concerns as diverse as North Korea's belligerence and Syria's civil war, was reinforced in remarks by the spy chiefs before the Senate Intelligence Committee. They expressed concern that computer technology is evolving so quickly it is hard for security experts to keep up. "In some cases, the world is applying digital technologies faster than our ability to understand the security implications and mitigate potential risks," James Clapper, the Director of National Intelligence, told the committee. In written testimony, Clapper softened his analysis somewhat, playing down the likelihood of catastrophic attacks on the United States in the near term - either through digital technologies, or from foreign or domestic militants employing traditional violence. But this year's annual threat briefing underscored how, a decade after the Iraq war began and nearly two years after the killing of al Qaeda leader Osama bin Laden, digital

assaults on government and computer networks have supplanted earlier security fears. On Monday, White House national security adviser Tom Donilon, citing complaints from U.S. businesses about alleged Chinese cyber espionage, said the issue is a growing challenge to economic relations between the United States and China.

China cyber attacks are growing and the us needs to actively search for hackers. David Feith, an editorial page writer for The Wall Street Journal Asia in Hong Kong “Timothy L. Thomas: Why China Is Reading Your Email” DoP: 2013 March, DoA: 7/17/13 http://stream.wsj.com/story/latestheadlines/SS-2-63399/SS-2-200781/ For several years, Washington has treated China as the Lord Voldemort of geopolitics—the foe who must not be named, lest all economic and diplomatic hell break loose. That policy seemed to be ending in recent weeks, and Timothy Thomas thinks it’s about time.¶ The clearest sign of change came in a March 11 speech by Tom Donilon, President Obama’s national security adviser, who condemned “cyber intrusions emanating from China on an unprecedented scale” and declared that “the international community cannot tolerate such activity from any country.” Chinese cyber aggression poses risks “to international trade, to the reputation of Chinese industry and to our overall relations,” Mr. Donilon said, and Beijing must stop it.¶ “Why did we wait so long?” wonders Mr. Thomas as we sit in the U.S. Army’s Foreign Military Studies Office, where the 64-year-old retired lieutenant colonel has studied Chinese cyber strategy for two decades. More

than enough evidence accumulated long ago, he says, for the U.S. to say to Beijing and its denials of responsibility, “Folks, you don’t have a leg to stand on, sorry.” Beijing's cyber attacks are rooted in military strategy, says one of America's foremost experts. The best way to combat them is for the U.S. to go on the cyber offensive too.

The US is developing Cyber defense teams to monitor data to protect from cyber attacks. Robertson Adi, Adi RobertsonWa is a reporter for The Verge.,“NSA head says 13 'offensive teams' being trained for cyberwarfare” DoP: 3/13/13, DoA: 7/16/13,¶ http://www.theverge.com/2013/3/13/4099958/nsa-head-says-13-offensive-teams-being-trained-for-cyberwarfare As Director of National Intelligence James Clapper discussed the "remote" threat of a major cyberattack within the next two years, NSA and US Cyber Command director Gen. Keith Alexander told Congress that the US was training its own cyberwarriors as well. In yesterday's hearing before the House Armed Services Committee, Alexander emphasized that "this team, this defend-the-nation team, is not a defensive team... This is an offensive team that the Defense Department would use to defend the nation if it were attacked in cyberspace. 13 of the teams that we’re creating are for that mission alone."¶ As The New York Times reports, Alexander says 27 additional

teams are dedicated to training and surveillance, and more will be able to "defend our networks in cyberspace." He did not go into detail about the projects, but he said that training was the

most important task at hand, and that defense

was best served by monitoring incoming traffic to the US with systems that could check for attacks. Current fears about cyberwarfare have focused on China, which is considered responsible for recent attacks on The New York Times and other papers, but Clapper has said that "isolated state or nonstate actors" are more likely to launch high-stakes campaigns that could take out critical infrastructure.¶

China Espionage Impact: Innovation China cyber attacks on threaten innovation by top companies McGarry, Brendan, staff analyst and writer, 5/21/13, China’s Cyber Attacks Threaten Social Order: Analyst, Defense Tech, http://defensetech.org/2013/05/21/chinas-cyber-attacks-threaten-social-order-analyst/, date access- 7/21/13

China’s communist party that its cyber attacks against Western targets threaten to undermine the Chinese economy and social order, an analyst said.¶ When asked what President Barack The U.S. president should tell the leader of

Obama should say to President Xi Jinping at their next meeting in June, James Mulvenon, a vice president at Defense Group Inc., a technology company in Vienna, Va., was blunt.¶ “This is

imperiling your own economic development, which is imperiling your

social stability, which is your No. 1 priority,” Mulvenon said May 21 during a panel discussion at the Center for Strategic and International Studies, a think tank in Washington, D.C. “The only message that will get through to a general secretary of the Chinese communist party is that economic development and social stability are threatened by the brazen scope and scale of this intrusion.”¶ China was a frequent topic of discussion during the discussion, part of an event called “Threat and Response: Combating Advanced Attacks and Cyber-Espionage,” which drew a roomful of academics, executives, government and military officials, and reporters.¶

A

Chinese espionage group since 2006 has stolen hundreds of terabytes of information from at least 141 companies across 20 major industries, including aerospace and defense, according to a February report from Mandiant, a closely held company based in Alexandria, Va., which sells information-security services.¶ Obama should tell Xi that such actions “are undermining that last remaining pillar of strategic cooperative Sino-U.S. relations,” Mulvenon said. “The

trade and business community are some of the loudest critics of what’s going on the Chinese side who traditionally have been the strongest proponents of cooperative Sino-U.S. relations.”¶ Mulvenon also criticized China’s official response to the report.¶ “The Chinese, in my view, have always been terrible strategic communicators but they reached a new low recently when their response to the Mandiant report was — and this is an official spokesman at the Ministry of National Defense said — there is no Unit 61398,” he said. “We have hundreds of pieces of open-source data identifying that unit is public knowledge,” he added. “Their literally response at the official level is to deny reality.”¶ U.S. companies are already being hurt by the theft of intellectual property, according to Shawn Henry, president of CrowdStrike Services, a security technology firm based in San Francisco, and former executive assistant director of the Federal Bureau of Investigation.

A biotechnology company that typically takes five years to take an idea to market has noticed Chinese competitors churning out similar products in 18 months, Henry said.¶ “It’s not because they’ve come up with some newfangled manufacturing process,” he said during the panel. It’s because concept and engineering resources are “being stolen, and they’re going right from manufacturing and to market.”¶ Chief executive officers must be responsible for the security of their companies’ networks, according to Chris Inglis, deputy director of the National Security Agency, the Pentagon’s code-breaking wing.¶ “We need to hold CEOs or the appropriate parties accountable for the resilience, the security, integrity of those things that generate revenue or generate whatever the business is of that particular organization,” he said in separate remarks at the event.¶ Similar to the way they pay attention to finances under Sarbanes-Oxley, the 2002 legislation designed to protect investors from fraudulent accounting practices, executives may “spend an equal amount of time to the integrity and the resilience of their networks because it’s not just a commodity whose fate may have an effect on their bottom line, it’s a foundation for their business,” Inglis said.¶ A bill sponsored by Rep. Mike Rogers, R-Mich., chairman of the House Intelligence Committee, would make it easier for intelligence agencies to share information with the private sector. The legislation, Cyber Intelligence Sharing and Protection Act, H.R. 624, has been referred to the Senate Intelligence Committee.¶ The U.S. Defense Department in a report released May 5 for the first time blamed China directly for targeting its computer networks. The attacks

were focused on extracting information, including sensitive defense technology.¶ “In 2012, numerous computer systems around the world, including those owned by the U.S. government, continued to be targeted for intrusions, some of which appear to be attributable directly to the Chinese government and military,” it states. “The accesses and skills required for these intrusions are similar to those necessary to conduct computer network attacks.”¶ China called the accusations “groundless” and “not in line with the efforts made by both sides to strengthen mutual trust and cooperation,” according to a May 9 article published on the state-run website, “People’s Daily Online.” The country is a “victim itself of cyberattacks,” it states.¶ The

U.S. faces a dilemma in talks with China because the U.S. has tried to make a distinction between types of spying in cyberspace, including traditional espionage, which it says cannot be legislated or governed through treaty, and commercial espionage, which it says can, Mulvenon said.¶ “This has been a real clangor with the Chinese because they don’t see the distinction because in their system the same people are doing both,” he said. China has single, large-scale, state-owned companies in each sector of the economy, making it easy for government spies to pass intelligence to corporate executives, he said.¶ “They

don’t believe us when we tell them we are statutorily precluded from doing commercial espionage and we even give them a very practical reason: We say if the United States conducted commercial espionage on behalf of its companies, we wouldn’t know how to share the proceeds without somebody who didn’t get it suing us in the U.S. government for anti-trust violations,” Mulvenon said.¶ Russia is much stealthier than China when it comes to cyberspace espionage, Mulvenon said. “They use a lot more crypto,” he said, referring to cryptography.

China Espionage Impact: Competitiveness Chinese government-backed hackers have cost the United States nearly $2 trillion in “lost and stolen property” and hurts economic competitiveness Kredo, July 22, 2013 (Adam, Adam Kredo is a senior writer for the Washington Free Beacon” Mike Rogers: China, Iran, and Russia Launching Cyber Attacks Against U.S.”, The Washington Free Beacon, http://freebeacon.com/mike-rogers-china-iran-and-russia-launching-cyber-attacks-against-u-s/, Date accessed; July 25, 2013) Chinese government-backed hackers have cost the United States nearly $2 trillion in “lost and stolen property” that was seized through illicit Internet attacks, Rep. Mike Rogers (R., Mich.), chairman of the House Permanent Select Committee on Intelligence, said Monday.¶ The theft of proprietary information and technology by the Chinese constitutes “the largest transfer of wealth illegally in the world’s history,” according to Rogers, who warned that the United States is not prepared to combat these cyber threats.¶ Chinese military units identify vulnerable U.S. companies and then instruct a team of hackers to steal industrial secrets and other information, according to Rogers, who spoke at an event sponsored by the International Institute for Strategic Studies (IISS).¶ “We are in a cyber war today,” Rogers said. “Most Americans don’t know it. They go about their lives happily. But we are in a cyber war today.”¶ China poses the largest threat, according to Rogers.¶ The Communist regime is “primarily” engaged in economic espionage, he said, explaining that China’s “military and intelligences services” have seized U.S. industrial technology, repurposed it domestically, and then “illegally” competed with the United States in the world market.

China Espionage Impact-Media The Chinese Govermennt is hacking into American computers to try to intimidate the media. Rogers, Mike, Member of the House of Representatives and Chairman of the Permanent Select Committee on Intelligence. Ruppersburg, Dutch, also a member of the House of Reps, andn a ranking member on Permanent Select Committee on Intelligence. 4/16/13 Protecting Internet freedom is a priority http://thehill.com/special-reports/defense-and-cybersecurity-april-2013/294319-protectinginternet-freedom-is-a-priority Date Accessed; 7/20/13 Most associate cybersecurity with the protection of government, utility, transportation and financial systems. But cybersecurity is not limited to military information and energy grids. National news organizations including The New York Times, The Wall Street Journal and The Washington Post recently all reported that they were subject to cyberattacks. The recent cyberattacks on media outlets were an attempt to intimidate and harass newspapers that dared publish information critical of the Chinese government. Cyberattackers have hacked into American think tanks that have published papers critical of the Chinese government, in an attempt to squash any dissent. The Chinese are very good at squashing internal political dissent, and they are now attempting to bring those threats across the ocean to our shores.

Espionage-Iran Iran is a serious cyber threat J. Nicholas Hoover.Senior editor for InformationWeek Government.April 26, 2012.Congress RaisesAlarmOnIranianCyberThreat. InformationWeek.http://www.informationweek.com/government/security/congress-raises-alarm-oniranian-cyber-t/232901044.DateRetrieved: July 17, 2013 The Iranian cyber threat to the United States is on the rise, lawmakers and foreign policy observers warned in a House Homeland Security Committee hearing Thursday. "There should be little doubt that a country that kills innocent people around the world, guns down its own people, and threatens Israel would not hesitate to carry out a cyber-attack against the U.S.," said counterterrorism and intelligence subcommittee chairman Patrick Meehan, R-Pa., whose subcommittee held a joint hearing with the cybersecurity, infrastructure protection, and security technologies subcommittee. Warnings about the threat of an Iranian attack came from all angles during the hearing, but the hearing did not include participation by a single intelligence or military official. Director of National Intelligence James Clapper recently testified to Iran's improvement in the cyber arena. Meehan

called Iran's growing cyber capabilities a "real and genuine challenge and threat to the United States and its interests," noting the recent attack of a proIranian group called the Iranian Cyber Army on the government news agency Voice Of America. A Meehan-penned op-ed titled "Iranian Cyber Threat Cannot Be Underestimated" appeared on the website of Congressional news site The Hill on Thursday. Panelists called to attention recent media reports about Iranian diplomats involved in planned cyber-attacks against nuclear power plants and other targets. The country also recently claimed that the downing of a drone inside the country was thanks to a hack of the drone's GPS signals. "They're taking their gloves off right now in the cyber environment," said Frank Cilluffo, associate VP and director of the Homeland Security Policy Institute and a former Bush administration homeland security official. Panelists at the session

were quick to point out that Iran does not yet pose the same level of technical threat as Russia and China, but said that Iran's intentions help make it dangerous. "As yet, Iran has not shown itself to be a similarly advanced or persistent threat" as Russia and China, Cilluffo said. "The bad news is that what they lack in capability, they make up for in intent and are not as hesitant as other countries may be." Ilya Berman, VP of the hawkish and conservative American Foreign Policy Council, agreed with Cilluffo's assessment, adding that Iran poses a potentially significant threat in the asymmetric world of cyberspace. "Cyberspace

is a field that advantages asymmetric actors," he said. "As a result, the capabilities are an issue, but intent is even more of an issue. Unlike in Russian and China, where conflicts exist but at least we have diplomatic relations with those countries, there are a number of threats on the table with Iran." Berman recommended that the United States government create a stronger deterrence strategy against Iranian cyber-attacks. "We have had an abject lack of a deterrent strategy in facing Iran, and [the cyber world] is crying out for a deterrence strategy so that the Iranian regime recognizes that there are redlines that they can't cross," he said.

A2: Economic Espionage Isn’t Happening Business are afraid to report economic espionage Danielson 2009 (Mark E.A.,” Economic Espionage: A Framework for a Workable Solution”, writes for MINN. J.L. SCI. & TECH., http://mjlst.umn.edu/prod/groups/ahc/@pub/@ahc/@mjlst/documents/asset/ahc_asset_366029.pdf, Date accessed; July 25, 2013) A. ECONOMIC COSTS¶ Quantifying the losses attributed to economic espionage is a ¶ difficult task. Thefts often go unreported to federal or state law ¶ enforcement agencies. Businesses may be reluctant to step ¶ forward and admit being targeted for a myriad of reasons. An ¶ admission may signal to investors that a company is unable to ¶ protect its valuable proprietary information.12 Such concerns are ¶ valid: studies have indicated that a company’s stock tends to ¶ decline following an admission it has been struck by economic ¶ espionage.13 An admission may compromise joint ventures or ¶ forestall lucrative government contracts.14 By naming names, a ¶ business may prejudice its ability to obtain future contracts in ¶ that state.15 Further, organizations may worry that by coming ¶ clean they may reveal vulnerabilities and signal to copycats that ¶ they are an easy target.16

Patriot Act

Patriot Act Upholds the Social Contract The patriot act works to uphold the social contract Casman, Betsey Sue. Master of Arts in Ethics and Policy Studies. 2011. "The Right to Privacy in Light of the Patriot Act and Social Contract Theory". http://digitalscholarship.unlv.edu/cgi/viewcontent.cgi?article=2087&context=thesesdissertations. Date Accessed 7/21/13.

Locke has placed the ¶ duty the good of society in the hands of the “executor” and describes his duties outside ¶ which are legislated and sometimes even against the law– he names this “prerogative”. ¶ The Executive (in the United States) has made no excuses for its behavior in vigilant ¶ surveillance. This Executive privilege is but the duty of the “executor” to protect.¶ Throughout this document, the Executive has continually maintained that certain ¶ legislation did not apply when national security was an issue. This was the basis for ¶ warrantless searches. Exigent circumstances have also been used to circumvent the ¶ prescribed law. The enactment of the Patriot Act is very clearly and reasonably designed ¶ for the preservation of life and property; the sole goals that Locke stated were the purpose ¶ of the society of which men had consigned (at least part of) their rights. Locke’s reason ¶ for the social contract is to retain as much personal freedom with the protection of ¶ authority to safeguard the property of each and every man

The Patriot Act upholds the social contract Casman, Betsey Sue. Master of Arts in Ethics and Policy Studies. 2011. "The Right to Privacy in Light of the Patriot Act and Social Contract Theory". http://digitalscholarship.unlv.edu/cgi/viewcontent.cgi?article=2087&context=thesesdissertations. Date Accessed 7/21/13.

Though the authors may have described different reasons for entering into the ¶ ‘social contract’, they all seem to agree that the reason behind the existence of the social ¶ contract and its continued existence is the security of its citizenry. Therefore, it is agreed upon that society must act for the interest of the whole when dealing with a threat, ¶ especially a threat on the level of war. It can be argued that that is the sole purpose of the ¶ Patriot Act and that though some of its individual clauses or statutes may seem to violate ¶ other tenets held to be sacred to Americans, the Patriot Act as a whole is designed to ¶ honor and defend the social contract.

Patriot Act Balances National Security and Privacy Homeland Security says it prioritizes national security at the expense of Privacy while preserving both – States Secret Privilege proves Palin, Philip J, 9/18/11, Homeland Security Watch, Brennan: Counterterrorism and the Law, http://www.hlswatch.com/index.php?s=patriot+act , Date Accessed : 7/17/11 We’ve also worked to uphold our values and the rule of law in a second area—our policies and practices here at home. As I said, we will use all lawful tools at our disposal, and that includes authorities under the renewed PATRIOT Act. We firmly believe that our intelligence gathering tools must enable us to collect the information we need to protect the American people. At the same time, these tools must be subject to appropriate oversight and rigorous checks and balances that protect the privacy of innocent individuals.¶ As such, we have ensured that investigative techniques in the United States are conducted in a manner that is consistent with our laws and subject to the supervision of our courts. We have also taken administrative steps to institute additional checks and balances, above and beyond what is required by law, in order to better safeguard the privacy rights of innocent Americans.¶ Our democratic values also include—and our national security demands—open and transparent government. Some information obviously needs to be protected. And since his first days in office, President Obama has worked to strike the proper balance between the security the American people deserve and the openness our democratic society expects.¶ In one of his first acts, the President issued a new Executive Order on classified information that, among other things, reestablished the principle that all classified information will ultimately be declassified. The President also issued a Freedom of Information Act Directive mandating that agencies adopt a presumption of disclosure when processing requests for information. The President signed into law the first intelligence authorization act in over five years to ensure better oversight of intelligence activities. Among other things, the legislation revised the process for reporting sensitive intelligence activities to Congress and created an Inspector General for the Intelligence Community.¶ For the first time, President Obama released the combined budget of the intelligence community, and reconstituted the Intelligence Oversight Board, an important check on the government’s intelligence activities. The President declassified and released legal memos that authorized the use, in early times, of enhanced interrogation techniques. Understanding that the reasons to keep those memos secret had evaporated, the President felt it was important for the American people to understand how those methods came to be authorized and used.¶ The President, through the Attorney General, instituted a new process to consider invocation of the so-called “state secrets privilege,” where the government can protect information in civil lawsuits. This process ensures that this privilege is never used simply to hide embarrassing or unlawful government activities. But, it also recognizes that its use is absolutely necessary in certain cases for the protection of national security. I know there has been some criticism of the Administration on this. But by applying a stricter internal review process, including a requirement of personal approval by the Attorney General, we are working to ensure that this extraordinary power is asserted only when there is a strong justification to do so.¶

Patriot Act Good – Computer Trespasser Exception Stops Hackers The Patriot Act allows the Government to search a company’s computer system after an attack. Nancy J. King, 2003, College of Business, Oregon State University, Electronic Monitoring to Promote National Security Impacts Workplace Privacy, Employee Responsibilities and Rights Journalhttp://www.cob.sjsu.edu/malos_s/privacy%20and%20national%20security.pdf

The USA PATRIOT Act also [created] some new employer rights that relate to electronic monitoring of the workplace. The most important new right arises from Section 217 of the USA PATRIOT Act, which creates a new “computer trespasser” exception to the ECPA.12 This exception authorizes law enforcement to assist employers who are providers of electronic communications systems when hackers or other unauthorized persons have accessed the employers’ computer systems. Before the USA PATRIOT ACT, law enforcement agencies needed a search warrant to intercept the contents of Internet communications sent by a computer trespasser (for example, a computer hacker), even if the owner of the computer system under attack gave its consent for law enforcement to intercept electronic communications on that system. Delays in

obtaining a warrant often impaired law enforcement efforts to apprehend the hacker. Now, employers can permit law enforcement to intercept communications on the employers’ computer systems.

A2-“Patriot Act Violates Liberties” Patriot Act vital; safeguards in place to protect liberties Sales, Nathan A. SEPTEMBER 8, 2011. A Vital Weapon. http://www.nytimes.com/roomfordebate/2011/09/07/do-we-still-need-thepatriot-act/the-patriot-act-is-a-vital-weapon-in-fighting-terrorism. Date Accessed 7/17/13.

America needs the Patriot Act because it helps prevent terrorism while posing little risk to civil liberties. The law simply lets counterterrorism agents use tools that police officers have used for decades. And it contains elaborate safeguards against abuse.¶ Consider the three provisions Congress renewed last May.¶ 1. Congress authorized “roving wiretaps” back in 1986 -- court orders that allow police to monitor criminals even if they switch phones. The Patriot Act allows the same thing in terrorism investigations. The law levels the playing field: If a roving wiretap is good enough for Tony Soprano, it’s good enough for Mohamed Atta.¶ The

Patriot Act features strict safeguards. Agents can’t eavesdrop unless they get a judge’s permission. They must demonstrate that the suspect is a terrorist. And they must notify the judge when they go up on a new phone.¶ 2. Grand juries in criminal cases routinely subpoena “business records” from companies like banks and retailers. The Patriot Act lets counterterrorism agents get the same documents.¶ The law simply lets counterterrorism agents use tools that police officers have used for decades.¶ The act’s protections are even stronger than the grand jury rules. Prosecutors issue subpoenas unilaterally, but the Patriot Act requires the F.B.I. to get a judge’s approval. Americans can’t be investigated on the basis of First Amendment activities, and special limits apply to sensitive materials like medical or library records. ¶ 3.

Before 9/11, it was difficult for authorities to monitor “lone wolves” with murky ties to overseas terrorist groups. The F.B.I. suspected that Zacarias Moussaoui was a terrorist, but agents hadn’t connected him to Al Qaeda, so it wasn’t clear they could search his apartment. Congress fixed that problem. Now, agents can monitor a terrorist even if they haven’t yet found evidence he belongs to a foreign terrorist organization.¶ Again, the Patriot Act has robust safeguards. Agents have to convince a judge to let them track a lone wolf. This tool can only be used to investigate international terrorism, not domestic. And it doesn’t apply to Americans, only to temporary visitors like tourists.

Citizens trade off digital privacy for security to prevent terror under the patriot act Zarka, Heater, Staff writer, 5/8/07, Yahoo, How the Patriot Act Helps United States Citizens, http://voices.yahoo.com/how-patriot-acthelps-united-states-citizens-326827.html, Date accessed: 7/17/13 Many people believe that most terrorist

attacks are spontaneous and random. However, the attacks are methodical and wellplanned. Generally, the terrorists commit numerous crimes before an attack actually occurs. For example, they may use false student visas to obtain entry, trafficking of drugs, provide material support to terrorist organizations, and steal weapons and explosives prior to the attack. When all this activity is going on is when officials need to "pounce" on the terrorists.¶ The PATRIOT Act was established to "deter and punish terrorist acts in the United States and around the world, to enhance law enforcement investigatory tools, and for other purposes" (Bullock, Haddow, & Coppola, 2006, pg.519). And in order to deter terrorist acts, the PATRIOT Act allows the government a variety of "tools". Some of the tools are as follows: permits the seizure of voicemails, permits execution of a search warrant with delayed notification (sneak and peek warrants), as well as other procedures.¶ Creates new laws regarding the financing of terrorist organizations. Permits detention of suspected terrorists for up to seven days without charges or without initiating deportation. Relaxes the restrictions on information sharing between agencies. Grants access to internet and computer information. The government can check medical records, student records, and credit records secretly and without permission. They are also able to monitor financial activities and records (Bullock, Haddow, & Coppola, 2006). The above is a list of only a few of the tools available for law enforcement officials concerning terrorism. Most if not all of the above list, will actually allow officials to notice terrorist activity before an attack occurs. Some of the terrorist activities include false visas, theft, money laundering, extortion, financial support to terrorist organizations, and selling drugs. The terrorists commit those activities in order to support themselves, their group, and their

mission (the attack). As mentioned above a terrorist attack is well planned out. With the Patriot Act, we are able to monitor suspected terrorists without many prior restrictions. The Patriot Act also created new legislation as well as strengthened some penalties for terrorist related crimes, so instead of 10 years imprisonment they get 15 (example). According to Howard & Sawyer, 2006, "The radicals conclude that the United States has strategically killed Muslims to terrorize the Islamic nation" (Sawyer, & Howard, 2006, pg.221). Therefore, Al-Qaeda justifies the killing of as many American citizens as possible as Bin Laden declared war on the U.S. and her allies. That

means that the United States should be granted extensive authority to monitor terrorist activity. However, as the years have passed since 9/11 many people are in an uproar about constitutional freedoms and rights concerning the Patriot Act. It seems like another devastating attack will have to occur on U.S. soil before they realize the severity of terrorism.¶

FISA Upholds 1st Amendment Protections FISA protects rights of citizens under the first amendment. Casman, Betsey Sue. Master of Arts in Ethics and Policy Studies. 2011. "The Right to Privacy in Light of the Patriot Act and Social Contract Theory". http://digitalscholarship.unlv.edu/cgi/viewcontent.cgi?article=2087&context=thesesdissertations. Date Accessed 7/21/13. Of course, as in every argument or debate, there is an alternate viewpoint. In this ¶ case, there are some that see the expanded government power from the Patriot Act as an ¶ important tool in the protection of all Americans. The arrival of September 11, 2001, ¶ ushered in a new and foreboding era in the history of terrorism. Thus the U.S. ¶ intelligence agencies are faced not only with detecting and preventing the hijacking of ¶ airliners, but also with detecting and intercepting and preventing foreign-sponsored ¶ terrorists from unleashing biological, chemical, and portable nuclear weapons within our ¶ borders, all of which constitute a clear and present security threat to this nation. In order ¶ swiftly and effectively to meet these daunting challenges, speed and secrecy are of the ¶ utmost importance (Privacy Opposing Viewpoints, 2006). This argument goes on to ¶ note that there is still protection for citizens even under these heightened security ¶ measures. FISA specifically and affirmatively seeks to protect and preserve the ¶ inalienable rights guaranteed to American citizens, as well as to aliens lawfully admitted ¶ for permanent residence. FISA states that ‘no United States person may be considered a ¶ foreign power or an agent of a foreign power solely upon basis of activities protected by ¶ the first amendment to the Constitution of the United States’ (Privacy Opposing ¶ Viewpoints, 2006). Therefore, you are still protected from prosecution from any source ¶ of information gathered against you that is protected by the first amendment, even if your ¶ fourth amendment rights have been violated to get it.

CIPSA

A2: Endless Invasion of Privacy Cyber Intelligence Sharing and Protection Act has limitations in place to place to prevent it from invading your privacy. Rogers, Mike, Member of the House of Representatives and Chairman of the Permanent Select Committee on Intelligence. Ruppersburg, Dutch, also a member of the House of Reps, andn a ranking member on Permanent Select Committee on Intelligence. 4/16/13 Protecting Internet freedom is a priority http://thehill.com/special-reports/defense-and-cybersecurity-april-2013/294319-protectinginternet-freedom-is-a-priority Date Accessed; 7/20/13 These attackers have stolen Americans’ most personal information, including banking and health records, which can be used for identity theft or blackmail purposes. Using sophisticated distributed denial of service attacks, foreign cyberattackers are also shutting down websites critical to Americans’ everyday lives, such as banking websites — compromising not only your bank account, but also the freedom of the Internet. CISPA was drafted to protect individuals’ privacy and civil liberties while still enabling effective cyber threat information-sharing. At the suggestion of several privacy and civil liberties groups, we made numerous changes to the act to further narrow its scope and purpose to ensure protection of these liberties. CISPA does not allow the federal government to read your email or your Facebook posts or monitor your Internet activity. The definitions in the bill were narrowed on the House floor to better ensure the bill’s authorities could not be misinterpreted or misused for broader purposes. CISPA was also amended to restrict how the government can use the threat information shared by industry to four narrow categories: cybersecurity; investigation and prosecution of cybersecurity crimes; protection of individuals from the danger of death or physical injury; and protection of minors from physical or psychological harm such as child pornography.

CISPA can keep the government in check Rogers, Mike. Ruppersburg, Dutch.(House of Representatives). 4/16/13 Protecting Internet freedom is a priority http://thehill.com/special-reports/defense-and-cybersecurity-april-2013/294319-protectinginternet-freedom-is-a-priority Date Accessed; 7/20/13 Contrary to some assertions, CISPA does not provide any new authorities for the government to monitor private networks. Moreover, a private company can restrict the information it shares, to minimize or anonymize any personal information before sharing the cyber threat information. CISPA is also designed to prevent companies from sharing information about an individual customer or subscriber. Finally, the bill also requires an annual report from the intelligence community’s inspector general to ensure that none of the information provided to government is mishandled or misused. Making the Internet more secure will itself protect Americans’ privacy, civil liberties and Internet freedoms, which are presently being whittled away with each successful foreign cyberattack. Few of us can imagine life without the Internet. We believe this bill is necessary to protect the very freedom and openness that created the immeasurable benefits the Internet has provided to the world.

Wire Taps

Wiretaps Solve Terrorism Wire Tapping has been instrumental in preventing terrorist attacks Michael Hewitt, Liberty University, 2008, Running head: WIRETAPPING: A NECESSITY, Wiretapping: A Necessity for Effectively Combating Terrorism in the 21st Century, http://digitalcommons.liberty.edu/cgi/viewcontent.cgi?article=1040&context=honors In analyzing post 9-11 wiretapping, it is necessary to analyze the effects that its¶ use has had on national security and domestic society in the realm of National Security,¶ wiretapping has

proven to be instrumental in the identification and prosecution of terrorists, effectively helping to diminish this threat. In the domestic realm, wiretapping¶ has proven to be an effective means of preventing terrorist attacks in the U.S., and of¶ putting Americans at ease. The most obvious evidence that the use of wiretapping has been successful in¶ protecting American national security is the "fact that there has been no serious terrorist¶ incident on American shores since its passage in 2001" (Spangler, 2005, para. 13).¶ Senator Orrin Hatch, R-Utah, and a staunch defender of the Patriot Act and its¶ wiretapping provisions, has pointed out that “because of necessary secrecy laws, we may¶ never know the full positive effects the Patriot Act is having on terrorism” (Spangler,¶ 2005, para. 13). Hatch did however note that the Justice Department has credited key¶ provisions of the Patriot Act with playing a role in the terrorism-related convictions of¶ hundreds of suspects.

It has largely been the tools of wiretapping and other forms of¶ electronic surveillance, which have received the credit for the success of hundreds of¶ anti-terrorism operations since 2001. Most notable among these operations was the¶ "recent apprehension in England of scores of suspects, who were charged with making¶ plans to blow up as many as ten airliners traveling to the United States" (Criminal, 2006,¶ para. 24). In this operation, electronic surveillance played an instrumental part in¶ allowing British agents to monitor the activities of a terrorist cell. "'We have been¶ looking at meetings, movement, travel, spending and the aspirations of a large group of¶ people' said Peter Clarke, head of Scotland Yard's antiterrorism branch" (ABCNews,¶ 2006, para. 2). In this case, British agents substantially monitored the terrorist cell before ¶ making the arrests. (ABCNews, 2006, para. 24) Another such situation was the¶ uncovering of "evidence indicating that a Pakistani charity was diverting funds originally contributed for earthquake relief to finance the planned terrorism attacks on these jumbo¶ jets" (Criminal, 2006, para. 16). It is, however, difficult to attain the exact details of the¶ results of these operations, because in these investigations, "details leading up to the¶ filing of formal charges is not usually revealed" (Criminal, 2006, para. 16). It is known¶ however, that since September 11, 2001 thousands of individuals classified as terrorists¶ have been subjected to electronic surveillance procedures. The surveillance, specifically¶ wiretapping, of individuals suspected of terrorist activities, has resulted in nearly a 20%¶ conviction rate (Criminal 2006).

Wiretaps Solve Crime Wiretaps are instrumental in taking down domestic drug trafficking operations Administrative Office of the U.S. Courts. 2012 (“Wiretap Report 2012”. Accessed 17 July 13. http://www.uscourts.gov/Statistics/WiretapReports/wiretap-report-2012.aspx) Federal and state prosecutors often discuss the importance of wiretap surveillance as an investigative tool. A wiretap in the Eastern District of California uncovered incriminating cellular telephone communications and text messages that led to the arrest of 32 individuals and the seizure of 19 vehicles, 35 firearms, $650,000 in cash, approximately 5,000 marijuana plants, and about 200 pounds of processed marijuana. At the state level, a wiretap in Orange County, California, was instrumental in solving a cold homicide case that occurred in 1988. Without the interceptions, the targeted subjects probably would not have been arrested and would have escaped prosecution. A wiretap reported for a previous year in a larceny investigation in Queens County, New York, revealed that a "sophisticated" group of individuals were counterfeiting checks, money orders, and credit cards that were then used to commit grand larceny and fraud. Credit-card making machines and counterfeit credit cards were seized, and 12 individuals were apprehended. Several separate state jurisdictions reported that interceptions were instrumental in uncovering drug-trafficking organizations operating in the United States.

Wiretaps are key to getting criminals to cooperate with law enforcement Chang, Alisa. 2012 (Congressional reporter for NPR. “Wall Street Wiretaps: Investigators Use Insiders’ Own Words To Convict Them”. 26 Dec. Accessed 17 Dec 13. http://www.npr.org/2012/12/26/168021457/wall-street-wiretaps-investigators-use-insiders-ownwords-to-convict-them) But the problem was, most of these people they confronted would just lawyer up and resist. What the feds needed was something to make people cooperate. And in early 2008, they decided, let's do a wiretap. Many of them, like Carroll, were longtime organized crime and narcotics investigators. They knew, in those worlds, when you needed leverage to make someone cooperate, you recorded them planning something criminal.

Human Trafficking

Impacts – Children are Trafficked 100,000 children are being used as prostitutes in the U.S. each year. Stanton, July 8, 2013, (Emily, writer for USN “Study: At Least 100,000 Children Being Used in U.S. Sex Trade”, Washington Whispers, U.S.News, http://www.usnews.com/news/blogs/washingtonwhispers/2013/07/08/study-at-least-100000-children-being-used-in-us-sex-trade, Date accessed: July 28, 2013) Sexual trafficking is largely seen as something that happens abroad, but the underground sex trade is very much alive in the United States – especially for minors, according to a new report from the National Colloquium on Shelter and Services for Domestic Minor Sex Trafficking Victims.¶ Human trafficking is a $9.8 billion domestic industry, with at least 100,000 children being used as prostitutes in America each year, according to the report from Shared Hope International, an organization working to eradicate sex trading. Shared Hope presented its findings in a congressional briefing Monday attended by Sens. Rob Portman, R-Ohio, and Richard Blumenthal, D-Conn., co-chairs of the Senate Caucus to End Human Trafficking and Reps. Ted Poe, R-Texas, and Jim Costa, D-Calif., co-chairs of the Congressional Caucus for Victims' Rights.

Solvency: Mobile Phone Searches Solve Human Trafficking Mobile phones searches solve Human trafficking. Mark Latonero, The Research Director at the University of southern California on Communication Leadership & Policy., “Rise of phones in human trafficking” DoP: 2012 DoA: 7/17/13, https://technologyandtrafficking.usc.edu/the-rise-of-mobile-phones-in-human-trafficking/ Based on the evidence gathered in the previous section, a key finding of this report is that mobile

phones play a central role in facilitating potential cases of DMST [ Domestic Minor Sexual Trafficking]. Online advertisements for potential DMST victims commonly contain a mobile phone contact number. Logistical information such as time, place, pricing, and types of services are communicated through phone calls or text messages on mobile phones. As an increasing number of websites develop mobile applications, posting of advertisements can be done primarily via mobile phone, as can viewing and responding to these advertisements.¶ Because the social actors involved in trafficking can use mobile phones to communicate, coordinate, organize, advertise, etc., the information transmitted across mobile networks could serve multiple evidentiary and investigatory purposes. The widespread use of mobile phones can also be utilized for social outreach and interventions.¶ Scant research or policy attention to date has focused on the issue of mobile phone use in DMST. The intersection of mobility, digital technologies, and minor sex trafficking brings new challenges and opportunities that require careful research and analysis.¶ For example, technology-facilitated sex trafficking networks often rely upon the anonymity or contrived identities of victims and traffickers in order to operate.[1] According to Samantha Doerr, public affairs manager at Microsoft’s Digital Crimes Unit:¶ “Child sex trafficking is simply a very different problem than other technology-facilitated child sexual exploitation … We need to look at the methods and language used for advertising—how johns go about searching, the use of mobile phones in child sex trafficking, and how a transaction is coordinated.”[2]¶ Although the

field of technology forensics is exploring ways to disrupt human trafficking online by using trace data to identify perpetrators, mobile technology is already shifting the spaces from which we can collect those traces.¶

A2: Tracking pre-paid phones is against the fourth amendment United States Court upheld that the defendant had no reasonable expectation of privacy. Latonero, 2012, (Mark, The Research Director at the University of southern California on Communication Leadership & Policy., “Rise of phones in human trafficking”, https://technologyandtrafficking.usc.edu/the-rise-of-mobile-phones-in-human-trafficking/, Date accessed: July 29, 2013) In a recent case from the United States Court of Appeals for the Sixth Circuit, the court held that the defendant had no “reasonable expectation of privacy in the data emanating from his [pay-as-you-go] cell phone that showed its location.”[16] The defendant, a “courier in a large-scale drug-trafficking operation,” challenged law enforcement agents’ tracking of his cell phone to locate the defendant, arguing that it constituted a “warrantless search that violated the Fourth Amendment.”[17] In finding that the defendant’s Fourth Amendment rights had not been violated, the court explained, “if a tool used to transport contraband gives off a signal that can be tracked for location, certainly the police can track that signal. The law cannot be that a criminal is entitled to rely on the expected untrackability of his tools.”[18] This decision calls into question the privacy protection associated with pre-paid devices.

Crime

Data mining-Prevents Crime Data mining prevents crime; Richmond Crime Rates Prove Nicola Leske, East Coast Tech Correspondent for Reuters, June 12, 2012, Charleston Police to use data mining to fight crime, Reuters,http://blogs.reuters.com/mediafile/2012/06/12/charleston-police-to-usedata-mining-to-fight-crime/, Date Accessed July 21,2013 IBM can point to some successes: Richmond, Virginia, which in 2005 was ranked the fifth most dangerous city in the United States dropped to the 99th spot after it began using IBM’s data mining technology to reduce crime.

Data mining can be used to predict and prevent crimes; Charleston Police Department to use it. Nicola Leske, East Coast Tech Correspondent for Reuters, June 12, 2012, Charleston Police to use data mining to fight crime, Reuters,http://blogs.reuters.com/mediafile/2012/06/12/charleston-police-to-usedata-mining-to-fight-crime/, Date Accessed July 21,2013 It’s not quite Minority Report but the Charleston Police Department in South Carolina aims to predict and prevent crimes from happening with the help of IBM’s data analytics tools. To start the CPD wants to focus on reducing the happen at similar times of day and in similar locations.

number of burglaries in Charleston which it says often

“The

individuals committing these crimes tend to have predictable patterns, and incidents usually take place near their homes or familiar locations. In addition, property crimes are not displaceable crimes, which means the criminals won’t simply move two miles to another location’” the CDP said.

IBM’s predictive analytivcs software aims to uncover hidden patterns and insights from structured and unstructured data to pinpint where and when a crime would be committed. It also promises that its models will help anticipate threats, identify suspicious actors and effectivley allocate resources. Eventually the Charleston police wants to use IBM’s software to localize what it calls criminal hotspots and deploy police officers accordingly to prevent crimes befor they occur. Charleston has more than 400 police officers who work on evaluating and forecasting crime patterns. It joins cities such as New York, Rochester, Las Vegas, Memphis, Los Angeles, Vancouver or Richmonf that use IBM software to fight crime.

Crime Becoming Increasing Complex; Dating mining is necessary to Deter Crime LEUL WOLDU ASEGEHGN, July 2003, “THE APPLICATION OF DATA MINING IN CRIME PREVENTION: THE CASE OF OROMIA POLICE COMMISSION”, ADDIS ABABA UNIVERSITY SCHOOL OF GRADUATE STUDIES, http://shawndra.pbworks.com/f/THE+APPLICATION+OF+DATA+MINING+IN+CRIME+PREVENTION+THE+ CASE+OF+OROMIA+POLICE+COMMISSION.pdf, Crime has increasingly become as complex as human nature. Modern technological advancement and tremendous progress in communication have facilitated criminals of every corner of the world to commit a crime using sophisticated equipment in one place and then escape to another place (Thakur, 2003). These days the glob is facing the proliferation of problems such as illicit drug trafficking, smuggling, hijacking, kidnapping, and terrorism.

However, these days Law

enforcement and investigating agencies have recognized the tremendous value in extracting hidden knowledge embedded in their data warehouses which could be valuable in the process of combating crimes (Megaputer Intelligence, 2002). The police departments want to reveal frequent crime patterns from historical reports to help them investigate new cases. Most law enforcement agencies today are faced with large volume of data that must be processed and transformed into useful information (Brown, 2003). Data mining can greatly improve crime analysis and aid in reducing and preventing crime. Brown (2003) stated "no field is in greater need of data mining technology than law enforcement." One of the early applications of data mining in the law enforcement was by the FBI of the federal government of the United State for the investigation of the Oklahoma City bombing case. The

FBI adopted data mining techniques to scrutinize large volume of data gathered from various sources to track down criminals (Berry and Linoff, 1997). Similarly, Berry and Linoff (1997) reported that the Treasury Department of the United States adopted data mining technology to extract suspicious money laundering or fraud patterns. This is particularly aiming at detecting criminals involving in money laundry or fraud

Datamining can detect crimes. Shyam Varan Nath, President and Founder at Oracle Exadata SIG, President and Founder at Oracle BIWA SIG Oracle Corporation, No Date, “ Crime Pattern Detection Using Data Mining”, Brown Computer Science, http://cs.brown.edu/courses/csci2950-t/crime.pdf,Date Accessed July 21,2013 Data mining can be used to model crime detection problems. Crimes are a social nuisance and cost our society dearly in several ways. Any research that can help in solving crimes faster will pay for itself. About 10% of the criminals commit about 50% of the crimes. Here we look at use of clustering algorithm for a data mining approach to help detect the crimes patterns and speed up the process of solving crime. We will look at k-means clustering with some enhancements to aid in the process of identification of crime patterns. We applied these techniques to real crime data from a sheriff’s office and validated our results. We also use semi-supervised learning technique here for knowledge discovery from the crime records and to help increase the predictive accuracy. We also developed a weighting scheme for attributes here to deal with limitations of various out of the box clustering tools and techniques. This easy to implement data mining framework works with the geo- spatial plot of crime and helps to improve the productivity of the detectives and other law enforcement officers. It can also be applied for counter terrorism for homeland security.¶ Cluster

(of crime) has a special meaning and refers to a geographical group of crime, i.e. a lot of crimes in a given geographical region. Such clusters can be visually represented using a geo-spatial plot of the crime overlayed on the map of the police jurisdiction. The densely populated group of crime is used to visually locate the ‘hot-spots’ of crime. However, when we talk of clustering from a data-mining standpoint, we refer to similar kinds of crime in the given geography of interest. Such clusters are useful in identifying a crime pattern or a crime spree. Some well-known examples of crime patterns are the DC sniper, a serial-rapist or a serial killer. These crimes may involve single suspect or may be committed by a group of suspects. The below figure shows the plot of geospatial clusters of crime.¶

Data Mining Decreases Crime Rates; Memphis Proves ¶ Emily Badger, staff writer at The Atlantic Cities, MAR 14, 2012, “How To Catch a Criminal With Data”, The Atlantic Cities, http://www.theatlanticcities.com/technology/2012/03/how-catch-criminaldata/1477/, Date Accessed: July 21, 2013¶ About seven years ago, researchers from the University of Memphis approached the city’s police department with the idea that they might be able to detect patterns in local crime – geographic hot spots on the city’s map and moments in time when they’re most likely to flare up – if they could just have access to the department’s crime data. Police departments produce reams of this stuff: arrest warrants, crime-scene reports, traffic citations, mug shots, dispatch transcripts and incident times. But that data has traditionally been painstaking to cross-reference, to mine for connections and even future trends.¶ You can almost picture a scene out of that iconic moment in Moneyball, when the grizzled veterans learn that their time-honed human intuition may be replaced by an algorithm. But, of course, analytics work. Williams pulls up some of the most recent results at hand. Comparing the period of March 1-13 this year to the same stretch of 2006, the

year in which Memphis really got this program underway, serious crime (the homicides, robberies, rapes, vehicle thefts, etc.) fell by 31.2 percent in the city. And it’s not just that crime

dropped, or that officers can now hand over stronger cases to prosecutors.¶ The

software here was relying only on data already contained within the police department (this does suggest that a first-time offender would have been much harder to catch). But that data has never been this useful before. ¶ “The problem of these islands of information is arguably the No. 1 problem,” says Mark Cleverley, director for IBM Public Safety Solutions, who was standing nearby. “And it’s an old problem.” ¶ Combine

these tools with other streams of information from outside of a police department, and they become even more effective. Subpoenaed phone or financial transaction records can instantly be visualized for connections. Or otherwise mundane insights – say the first Tuesday of every month is a common payday for local cash workers – can be woven into predictive models.

Datamining can prevent crimes. The Economist, Jul 20th 2013, “Predictive policing Don’t even think about it”, http://www.economist.com/news/briefing/21582042-it-getting-easier-foresee-wrongdoing-and-spotlikely-wrongdoers-dont-even-think-about-it, Date Accessed: July 21,2013 Intelligent policing can convert these modest gains into significant reductions in crime. Cops working with predictive systems respond to call-outs as usual, but when they are free they return to the spots which the computer suggests. Officers may talk to locals or report problems, like broken lights or unsecured properties, that could encourage crime. Within

six months of introducing predictive techniques in the Foothill area of Los Angeles, in late 2011, property crimes had fallen 12% compared with the previous year; in neighbouring districts they rose 0.5% (see chart). Police in Trafford, a suburb of Manchester in north-west England, say relatively simple and sometimes cost-free techniques, including routing police driving instructors through high-risk areas, helped them cut burglaries 26.6% in the year to May 2011, compared with a decline of 9.8% in the rest of the city.¶ So far, predictions have mostly been made about people who have already had contact with the justice system—such as convicted criminals. The growth of social media provides a lot of crunchable data on everyone else. Firms that once specialized in helping executives measure how web users feel about their brands now supply products that warn police when civil unrest approaches, and help them closely follow crises. Cops in California admit to trawling social networks for early warnings of wild parties. ECM Universe, an American firm, offers software that crawls sites “rife with extremism” to identify people who deserve closer attention.¶ These projects make life difficult for many criminals. But smart ones use the internet to make predictions of their own. Nearly 80% of previously arrested burglars surveyed in 2011 by Friedland, a security firm, said information drawn from social media helps thieves plan coups. Status updates and photographs generate handy lists of tempting properties with absent owners. It does not take a crystal ball to work out what comes next.

Richmond Fights Crime with Data Mining Ian Harvey, Aug. 6, 2007, “Fighting crime with databases”, CBC News, http://www.cbc.ca/news/background/tech/data-mining.html, Date Accessed: July 21, 2013 Using some sophisticated software and hardware they started overlaying crime reports with other data, such as weather, traffic, sports events and paydays for large employers. The data was analyzed three times a day and something interesting emerged: Robberies spiked on paydays near cheque cashing storefronts in specific neighbourhoods. Other clusters also became apparent, and pretty soon police were deploying resources in advance and predicting where crime was most likely to occur.

Coupled with some other technological advancement, such as surveillance videos wirelessly transmitted to patrol cars, major crime rates dropped 21 per cent from 2005 to 2006. In 2007, major crime is down another 19 per cent.

Data mining solves for crime; Vancouver decreases property crime by 24% Ryan Prox, Professor at Simon Fraser University Surrey in BC, July 11th 2013, “How Vancouver Tapped Big Data Analytics to Fight Crime”, A Smarter Planet Blog,

http://asmarterplanet.com/blog/2013/07/how-vancouver-tapped-big-data-analytics-to-fightcrime.html, Date Accessed: July 24, 2013 Since the deployment of investigative big data analytics software from IBM and geospatial mapping software from Esri in 2009, the Vancouver PD has been able to spot where crime is headed, and, in many cases, help stop it before it otherwise would occur. Property crime rates have dropped citywide per 1,000 residents by 24 percent and violent crime rates have decreased by nine percent from 2007 to 2011. Here are videos about the project. As a result of this project, the PD had undergone an important cultural shift. Analysis is now front and center throughout the decision making process. It’s used to determine how to effectively deploy officers, how to best assess situations, and how to plan for large scale events like the Winter Olympics, which Vancouver hosted in 2010.

Impacts: Organized Crime Hurts National Security Organized crime is responsible for the smuggling of drugs, humans, and weapons of mass destruction, which poses a threat to national security and democracy Paula Dobriansky,2001 [American foreign policy expert who has served in key roles as a diplomat and policy maker in the administrations of five U.S. presidents, both Democrat and Republican, “The Explosive Growth of Globalized Crime,”Arresting Transnational Crime, 2001, (http://guangzhou.usembassychina.org.cn/uploads/images/sqVFYsuZI0LECJTHra1S_A/ijge0801.pdf)]

First, the impact is felt directly on the streets of American communities. Hundreds of thousands of individuals enter the United States illegally each year. Smuggling of drugs, firearms, stolen cars, child pornography, and other contraband occurs on a wide scale across our borders. Second, the expansion of American business worldwide has opened new opportunities for foreign-based criminals. When an American enterprise abroad is victimized, the consequences may include the loss of profits, productivity, and jobs for Americans at home. international criminals engage in a variety of activities that pose a grave threat to the national security of the United States and the stability and values of the entire world community. Examples include the acquisition of weapons of mass destruction, trade in banned or dangerous substances, and trafficking in women and children. Corruption and the enormous flow of unregulated, crime-generated profits are serious threats to the stability of democratic institutions and free.

Organized Crime Destroys Rule of Law Organized crime undermines rule of law United Nations Office of Drugs and Crime; 2013 (“Transnational organized crime threat assessments”. Accessed 17 July 13. http://www.unodc.org/unodc/data-and-analysis/TOC-threatassessments.html) The world population grows every year, and so does the volume of exchanges among people. The vast majority of these exchanges are legitimate and beneficial, but a significant share is not. Transnational criminal markets crisscross the planet, conveying drugs, arms, trafficked women, toxic waste, stolen natural resources or protected animals' parts. Hundreds of billions of dollars of dirty money flow through the world every year, distorting local economies, corrupting institutions and fuelling conflict. Transnational organized crime has become a central issue in international affairs, an important factor in the global economy, and an immediate reality for people around the world. Aside from the direct effects - drug addiction, sexual exploitation, environmental damage and a host of other scourges organized crime has the capacity to undermine the rule of law and good governance, without which there can be no sustainable development.

Drug Trade Impacts: Drugs & Crime Destroy Society – Laundry List Drugs and crime destroy economies, erode social relations, undermine democracy, and result in vigilantism Office of the President of the United Nations General Assembly’s 66th Session. 2012 (“Thematic Debate of the 66th session of the United Nations General Assembly on Drugs and Crime as a Threat to Development On the occasion of the UN International Day against Drug Abuse and Illicit Trafficking”. 26 Jun. Accessed 17 July 13. http://www.un.org/en/ga/president/66/Issues/drugs/drugscrime.shtml) Drugs and crime undermine[s] development by eroding social and human capital. This degrades quality of life and can force skilled workers to leave, while the direct impacts of victimisation, as well as fear of crime, may impede the development of those that remain. By limiting movement, crime impedes access to possible employment and educational opportunities, and it discourages the accumulation of assets. Crime is also more “expensive” for poor people in poor countries, and disadvantaged households may struggle to cope with the shock of victimisation . Drugs and crime also undermine[s] development by driving away business. Both foreign and domestic investors see crime as a sign of social instability, and crime drives up the cost of doing business. Tourism is a sector especially sensitive to crime issues. Drugs and crime, moreover, undermine[s] the ability of the state to promote development by destroying the trust relationship between the people and the state, and undermining democracy and confidence in the criminal justice system. When people lose confidence in the criminal justice system, they may engage in vigilantism, which further undermines the state.

Drug Trade Impacts: Drug Money Fuels Terrorism The drug trade is a major source of terrorist income McCraw, Steven C. 2003 (Assistant Director of the FBI Office of Intelligence. Testimony given before the Senate Judiciary Committee. 20 May. Accessed 17 July 13. http://www.fbi.gov/news/testimony/international-drug-trafficking-and-terrorism) In framing the issue, the Committee astutely recognizes these links and the threat they present to the American people. That is why all

aspects of the terrorist enterprise including funding and support must be attacked. The criminal nexus to terrorism including drug trafficking is why our local, state, and federal law enforcement partners throughout the U.S. and the world are essential to combating global terrorism. They constitute an army of dedicated professionals who bring tremendous resources and capabilities to the war on terrorism. In fact, the successes of the Joint Terrorism Task Forces are in large part to their unwavering commitment to the safety of our nation and its citizens.¶ Today's Committee meeting focuses on the ties of drug trafficking and international terrorism which is clearly a problem. Drug

trafficking is a highly lucrative enterprise generating billions of dollars in profit that terrorist organizations can easily tap into. The ties between international terrorist organizations and drug trafficking varies greatly from organization to organization. For example, the Fuerzas Armadas Revolucionarias de Colombia (FARC), aka the Revolutionary Armed Forces of Colombia, is strongly tied to drug trafficking in Colombia. The objective of the FARC is to overthrow the established order in Colombia and replace it with a socialist dictatorship. In its attempts to destabilize the Government of Colombia, the FARC conducts bombings, extortions, selective assassinations, kidnappings, and armed confrontations with Colombian police and military forces. In an effort to finance its agenda, the FARC has conducted countless kidnappings for ransom of Colombian and foreign nationals, including the most recent kidnaping/capture of American citizens in Colombia. They have also forced businesses to pay "war taxes" in exchange for FARC protection. However, drug

trafficking profits are the FARC's principal source of funding. Moreover, it appears much of their agenda is based upon protecting and exploiting drug trafficking operations in Colombia and the region.¶ Historically, Afghanistan has been a major source of heroin throughout the world. Recently, al-Qa'ida and Sunni extremists have been associated through a number of investigations with drug trafficking. We have observed elements of the Taliban shipping and selling illegal drugs into the US. A recent joint FBI and DEA investigation resulted in the arrests of 16 Afghan and Pakistani subjects for involvement in a drug ring that was possibly linked to Al-Qa'ida and the Taliban. The investigation determined that heroin, grown and processed in Afghanistan and Pakistan, was being shipped to the U.S.

Profits from the sale of the heroin were laundered through Afghan and Pakistani owned businesses and then sent back to associates of terrorist organizations. Criminal and financial links to the Taliban regime and their involvement with Al-Qa'ida were established. The subjects were also involved in a number of other criminal activities including document/mail fraud, operating an illegal money transmitting business, and other white collar crimes.¶ Historically, Hizballah's direct involvement in narcotics trafficking has been limited, and the group's leaders have condemned the drug trade on religious grounds. However, we

have seen individuals with suspected Hizballah ties involved in drug related activities and we believe that funds from these activities eventually make their way to Hizballah coffers in Lebanon. The FBI has investigated and continues to investigate, efforts by individuals and entities associated with Hizballah to traffic illegal drugs in the U.S. Acts of terrorism attributed to Hizballah have little or no connection to narcotic issues. Rather, these acts were intended to further their political and terrorist agendas. Hizballah utilizes funds from drug trafficking as one of many methods to fund these agendas.¶ By way of example, the FBI conducted an investigation which employed an undercover operation to target Hizballah cells in the U.S. ¶ The investigation has focused on distinct, but related, criminal enterprises which have participated in a host of criminal activity from fraud schemes to drug trafficking to fund their activities and provide funds to the overall Hizballah organization. A number of the subjects have been indicted and the investigation is continuing.¶ The Al-Ittihad al-Islami, or AIAI, Somalia's

largest militant Islamic organization, is suspected of smuggling an illegal narcotic leaf known as Khat ("cot") into the United States. Arrests and shipment seizures indicate a sharp increase in demand for the drug. Proceeds from East African Khat sales are likely remitted to Middle Eastern banks via Hawala network and wire services. It is likely that these funds pass through the hands of suspected AIAI members and other persons with possible ties to terrorist groups.¶ The bottom line is that terrorists and terrorist groups will resort to any method or means to fund and facilitate their terrorist agendas. As state sponsorship of terrorism has come under greater international condemnation, the tremendous profit potential associated with drug trafficking make it an attractive

from the perspective of terrorist groups. This is further evidence that the

prospect of terrorist-related drug trafficking represents a continuing and significant threat to our national security.

Drug Trade Impacts: Drug Trade Causes Latin American Instability Drug trafficking breeds instability in Latin America Williams, Phil. Felbab-Brown, Vanda. 2012 (Phil Williams is the Director of the Matthew B. Ridgway Center for International Security Studies at the University of Pittsburgh, and Vanda Felbab-Brown is a fellow at the Latin American Initiative and 21st Century Defense Initiative in Foreign Policy at the Brookings Institute. April. Accessed 17 July 13. http://www.strategicstudiesinstitute.army.mil/pubs/people.cfm?authorID=850) Burgeoning and unconstrained drug production and other illicit economies thus have profound negative consequences for states and local stability. Most fundamentally, illicit economies provide an opportunity for belligerent groups to increase their power along multiple dimensions not simply by gaining control of physical resources, but also [and] by obtaining support from local populations. Such belligerents hence pose a serious security threat to local governments and, depending on the objectives of the group, to regional and global security and U.S. interests as well. With large financial profits, the belligerent groups improve their fighting capabilities by increasing their physical resources, hiring greater numbers of better paid combatants, providing them with better weapons, and simplifying their logistical and procurement chains. Crucially and frequently neglected in policy considerations, such

belligerents derive significant political capital—legitimacy with and support from local populations—from their sponsorship of the drug economy. They do so by protecting the local population’s reliable (and frequently sole source of) livelihood from the efforts of the government to repress the illicit economy. They also derive political capital by protecting the farmers from brutal and unreliable traffickers, by bargaining with traffickers for better prices on behalf of the farmers, by mobilizing the revenues from the illicit economies to provide otherwise absent social services such as clinics and infrastructure, as well as other public goods, and by being able to claim nationalist credit if a foreign power threatens the local illicit economy. In short, sponsorship

of illicit economies allows nonstate armed groups to function as security providers and economic and political regulators. They are thus able to transform themselves from mere violent actors to actors that take on proto-state functions.

Gangs Impacts: Gangs Cause Crime Gangs are a major source of crime within the United States Federal Bureau of Investigation. 2011 (“2011 National Gang Threat Assesment”. Acessed 17 July 13. http://www.fbi.gov/stats-services/publications/2011-national-gang-threat-assessment) There are approximately 1.4 million active street, prison, and OMG gang members comprising more than 33,000 gangs in the United States. Gang membership increased most significantly in the Northeast and Southeast regions, although the West and Great Lakes regions boast the highest number of gang members. Neighborhood-based gangs, hybrid gang members, and national-level gangs such as the Sureños are rapidly expanding in many jurisdictions. Many communities are also experiencing an increase in ethnic-based gangs such as African, Asian, Caribbean, and Eurasian gangs.¶ Gangs are responsible for an average of 48 percent of violent crime in most jurisdictions and up to 90 percent in several others, according to NGIC analysis. Major cities and suburban areas experience the most gang-related violence. Local neighborhood-based gangs and drug crews continue to pose the most significant criminal threat in most communities. Aggressive recruitment of juveniles and immigrants, alliances and conflict between gangs, the release of incarcerated gang members from prison, advancements in technology and communication, and Mexican Drug Trafficking Organization (MDTO) involvement in drug distribution have resulted in gang expansion and violence in a number of jurisdictions.¶ Gangs are increasingly engaging in non-traditional gang-related crime, such as alien smuggling, human trafficking, and prostitution. Gangs are also engaging in white-collar crime such as counterfeiting, identity theft, and mortgage fraud, primarily due to the high profitability and much lower visibility and risk of detection and punishment than drug and weapons trafficking.¶ US-based gangs have established strong working relationships with Central American and MDTOs to perpetrate illicit cross-border activity, as well as with some organized crime groups in some regions of the United States. US-based gangs and MDTOs are establishing wide-reaching drug networks; assisting in the smuggling of drugs, weapons, and illegal immigrants along the Southwest Border; and serving as enforcers for MDTO interests on the US side of the border. ¶ Many gang members continue to engage in gang activity while incarcerated. Family members play pivotal roles in assisting or facilitating gang activities and recruitment during a gang members’ incarceration. Gang members in some correctional facilities are adopting radical religious views while incarcerated. ¶ Gangs encourage members, associates, and relatives to obtain

law enforcement, judiciary, or legal employment in order to gather information on rival gangs and law enforcement operations. Gang infiltration of the military continues to pose a significant criminal threat , as members of at least 53 gangs have been identified on both domestic and international military installations. Gang members who learn advanced weaponry and combat techniques in the military are at risk of employing these skills on the street when they return to their communities.¶ Gang members are acquiring high-powered, military-style weapons and equipment which poses a significant threat because of the potential to engage in lethal encounters with law enforcement officers and civilians. Typically firearms are acquired through illegal purchases; straw purchases via surrogates or middle-men, and thefts from individuals, vehicles, residences and commercial establishments. Gang

members also target military and law enforcement officials, facilities, and vehicles to obtain weapons, ammunition, body armor, police gear, badges, uniforms, and official identification.¶ Gangs on Indian Reservations often emulate national-level gangs and adopt names and identifiers from nationally recognized urban gangs. Gang members on some Indian Reservations are associating with gang members in the community to commit crime. ¶ Gangs

are becoming increasingly adaptable and sophisticated, employing new and to facilitate criminal activity discreetly, enhance their criminal operations, and connect with other gang members, criminal organizations, and potential recruits nationwide and even worldwide. advanced technology

Gangs Impacts: Gangs Key to Drug Trade U.S.-based gangs are integral to international drug trade operations Schmidt, Mark. 2012 (Staff writer for the Combating Terrorism Center at West Point. “U.S. Gang Alignment with Mexican Drug Trafficking Organizations”. 22 Mar. Accessed 17 July 13. http://www.ctc.usma.edu/posts/u-s-gang-alignment-with-mexican-drug-trafficking-organizations) MDTOs were in search of U.S.-based partners who would not cooperate with law enforcement. Accordingly, the loyalty and discipline attributes of gangs made them ideal partners. Theoretically, the loyalty and discipline of U.S. gangs would hinder cooperation with law enforcement, and thus better protect the drug trafficking operation. The success of their working relationship is, in part, because gangs and Drug Trafficking Organizations (DTOs) are likeminded organizations. As criminal enterprises, loyalty, discipline, and territoriality are cornerstone philosophies on how gangs and MDTOs manage their respective organizations. This is because criminal enterprises must function in a covert capacity if they wish to survive law enforcement intervention and rival criminal takeover. Without loyalty to the organization, whether a gang or a DTO, rivals and law enforcement could easily infiltrate and dismantle the organization from the inside. Discipline is paramount to keep members inline so that their actions do not disrupt the organization or its operations. Controlling and expanding one’s territory is also important to the survivability of the organization as it protects the economic area of operation from competitors.

Solvency: Digital Surveillance Solves Organized Crime Electronic surveillance is required for taking down organized crime Boerman, Brian; 2008 (Attorney at Baker Botts LLP, 2008, “BEYOND THE WIRE: AN ANALYSIS OF NON-TELEPHONIC CONVERSATIONS UNDER TITLE III,” NYU Journal of Law and Liberty, Accessed: July 22, 2013, Page 599-600) (https://www.law.nyu.edu/ecm_dlv4/groups/public/@nyu_law_website__journals__journal_of_law_an d_liberty/documents/documents/ecm_pro_060973.pdf) Electronic surveillance has become, arguably, the greatest weapon on the war against organized crime. Though organized crime is not limited only to the traditional conception of “the mob,” the use of wiretaps and electronic bugs against the Mafia in New York is a terrific example of how such electronic surveillance can be used to increase both the safety and efficiency of law enforcement. Such tactics were at the heart of the Mafia Commission Trial of the mid-1980s that sent most of the Mafia leadership to prison. Evidence was gathered from bugs planted in the homes, cars, and meeting places of Paul Castellano, Anthony “Fat Tony” Salerno, Gennaro “Jerry Lang” Langella, and Anthony “Tony Ducks” Corallo (so named for his habit of ducking prosecutions). These electronic surveillance techniques made their capture quicker and easier, and less risky, than if traditional methods had been used. The non-technological strategy of infiltration can supply a wealth of information but is difficult and dangerous. Even Joe Pistone, the famed Donnie Brasco, had his investigation supplemented by wiretaps. Mob informants can be tremendously helpful, but first they must be flipped. Electronic surveillance can aid in this area as well. For example, Henry Hill cooperated with the government after hearing a recording where he was marked for execution. Wiretaps have also provided key evidence against drug rings and motorcycle gangs such as the Bandidos.

Wikileaks Harms National Security

Wikileaks Threatens National Security Wikileaks is a threat to national security and it is necessary to find the anonymous sources posting classified information Montabalno, Elizabeth (Staff Writer Information Weekly)Mar 2010 Army: Wikileaks A National Security Threat http://www.informationweek.com/government/security/army-wikileaks-a-national-securitythrea/223900094 Date Accessed: 7/16/13 Wikileaks.org is considered a threat to national security because it posts classified intelligence information, according to a 2008 U.S. Army document Wikileaks posted Monday.¶ The document, attributed to the Army Counterintelligence Center and titled "Wikileaks.org -- An Online Reference to Foreign Intelligence Services, Insurgents, or Terrorist Groups?", cited the leaking of classified Army materials as the chief reason Wikileaks is harmful to national security.¶ "Such information could be of value to foreign intelligence and security services (FISS), foreign military forces, foreign insurgents, and foreign terrorist groups for collecting information or for planning attacks against U.S. force, both within the United States and abroad," the document says.¶ The Army has tried to sniff out a possible mole within its own ranks who might be leaking materials to Wikileaks, doubting the site's assertion that it receives classified materials from former government agency employees, according to the document.¶ "These claims are highly suspect, however, since Wikileaks.org states that the anonymity and protection of the leakers or whistleblowers is one of its primary goals," according to the document.¶ Because anyone can post to the site and there is no editorial oversight, the public may use Wikileaks as a source of misinformation, or to create lies or propaganda to promote a positive or negative image of a targeted audience, according to the document. ¶ The Army has sought not only to identify anyone within its own ranks leaking documents to the site, but also to encourage other organizations to do the same to try to take the site down.¶ "Web sites such as Wikileaks.org have trust as their most important center of gravity by protecting the anonymity and identity of the insider, leaker, or whistleblower," the document stated. "Successful identification, prosecution, termination of employment, and exposure of persons leaking the information by the governments and businesses affected by information posted to Wikileaks.org would damage and potentially destroy this center of gravity and deter others from taking similar actions."

Wikileaks harms national security and caused the death of foreign intelligence officers Hoth, Jim (Author of Gateway Pundit, and Washington Post) May 2012 Horrible… Wikileaks Document Led to Hanging Death of Western Spy This Week in Tehran http://www.thegatewaypundit.com/2012/05/horrible-wikileaks-document-led-to-hanging-death-ofwestern-spy-this-week-in-tehran/ The leaked US documents by far left hero Bradley Manning and Wikileaks website led to the hanging death this week of Western spy Majid Jamali Fashi in Tehran. The Wikileaks scandal led to the hanging death of Western spy Majid Jamali Fashi in Tehran Times of Israel reported, via OrbusMax: WikiLeaks may have been responsible for exposing Majid Jamali Fashi, the 24-year-old kickboxer who was hanged in Tehran on Tuesday morning after “confessing” to assassinating a nuclear scientist on behalf of Israel, a British media report said. The Times of London reported Wednesday that a document from the US Embassy in Baku, Azerbaijan, seemingly drew attention to Fashi. The September 2009 US diplomatic document — identified by the code 09BAKU687 — quotes an Iranian source who was a licensed martial arts coach and trainer as describing to his American contacts pressure from the Iranian regime to train soldiers and militiamen in martial arts. Fashi was reportedly in Baku for an international martial arts competition only days before the US Embassy document was written. The suggestion is that the Iranian authorities identified Fashi as someone who was in illicit contact with the West on the basis of the

document. He was arrested days after the publication of the document by WikiLeaks in December of 2010 and charged with carrying out the January 2010 assassination of nuclear scientist Masoud AliMohammadi on behalf of the Mossad.

Wikileaks is a specific threat to national security and is only the tip of the iceberg – more groups and people will follow their example Eric Sterner,
Fellow, The George C. Marshall Institute, February 2011, Date Accessed July 16,2013, “Wikileaks and Cyberspace Cultures in Conflict”, The George C. Marshall Institute, http://www.marshall.org/pdf/materials/931.pdf Wikileaks and Assange represent a mindset as much as a specific security threat to the United States. The mindset raises long-term challenges for U.S. national security. Even should the United States successfully deny Wikileaks access to cyberspace and punish it in some fashion for harming U.S. national security, other individuals and organizations will spring up and perform the same function. Indeed, multiple mirror websites sprung up with archived Wikileaks data when the latter’s web presence declined. Former Wikileaks associates have already started a new entity under the moniker “OpenSecrets.Org.” Writing in The Washington Post, Tim Hwang calls them expansionists, “who hold that the Web should remake the rest of the world in its own image. They believe that decentralized, transparent and radically open networks should be the organizing principle for all things in society, big and small.”9 One often finds a belief that cyberspace also liberates the individual, that it empowers people to rise above the artificial constraints that social institutions place upon them. Thus, for expansionists, it becomes essential to the spread of human liberty. Expansionists subscribe to a certain worldview and often ascribe to themselves some higher responsibility to a principle that should exempt them from state authority.10 Thus, some give little thought to “hacktivism” against entities that do not share their worldview, ranging from corporations to governments. In other words, Wikileaks only represents a surge in the tide of an expansionist worldview. Of course, it is not possible to define a group that calls itself “expansionist” and subscribes to a specific doctrine. Rather, expansionism as used here reflects a strain of loosely consistent thought when it comes to discussions of cyberspace and its relation to society.

Wikileaks Threatens National Security Wikileaks hurts diplomacy efforts, while justifying weapons proliferation and war HEATHER HURLBURT, Executive Director of the National Security Network, November 30th, 2010, Date Accessed July 16, 2013, “Why Wikileaks Is Bad for Progressive Foreign Policy”, http://www.newrepublic.com/blog/jonathan-cohn/79483/wikileaks-round-iii-will-it-matter-much# But underlying all those discrete policy positions is a common set of assumptions and values: that we live in a complex world where posturing, rigid ideology, and indiscriminate use of force will not get us, as a society or a global commons, to where we need to go; that quiet talk is much more effective than loud threats; that, in the long run, America’s national interests will be best served if we see and act on them as inextricably linked with the interests of others. I’ve called them progressive, because they are. They’re also, with a bit less emphasis on the global good, realist. Or you might simply say they are sane and reasonable. But if we can’t conduct quiet diplomacy and have it stay quiet, it’s a lot harder to make this approach work. Could Sadat and Begin have gotten to Camp David without months of quiet preparation? Could Nixon have gone to China? And back here within the U.S., you can count upon the opponents of progressive policies to use the Wikileaks dumps to advance their agenda. They'll take items out of context and use them to justify ideas like bombing Iran, rejecting the START treaty, and god-knows-what to North Korea. The Wikileakers claim to promote the politics of peace and moderation. But this latest dump could very easily have the opposite effect, by giving the absolutists a chance to spread their stereotypes and illusions of a black and white world.

Wikileaks Helps Terrorists Wikileaks is detrimental to the government and helps terrorists plan and coordinate attacks Leanord, Tom (Staff writer The Telegraph) Mar 2010 Pentagon deems Wikileaks National Security Threat http://www.telegraph.co.uk/technology/7475050/Pentagon-deems-Wikileaks-a-nationalsecurity-threat.html WikiLeaks, a non-profit organization which tries to offer a means of anonymously exposing confidential documents, has become a thorn in the side of governments and private corporations. Its latest revelation concerns itself, namely a 2008 document attributed to the Army Counterintelligence Centre which concluded that the site constitutes a threat to military operations and US security. The information could be used by foreign intelligence, insurgents or terrorists for "planning attacks", the report added. Its authors warned that the lack of editorial oversight over what could be posted could lead to it being used to spread lies and propaganda. Their report also revealed that the army had tried to discover the identity of a possible mole leaking information to the site. An army spokesman confirmed to the New York Times that the document, which provided no specific evidence to support its fears, was genuine. Leaks to the site that might have alarmed military chiefs include details of military equipment, troop strengths and its publication in 2007 of almost the entire order of battle for US forces in Iraq and Afghanistan. Wikileaks also published a copy of "standard operating procedures" at the Guantánamo Bay detention centre which purportedly revealed the use of "extreme psychological stress" on detainees. The website, which relies on donations, almost closed down this year because it ran out of money. It has also faced attempts by governments such as those of North Korea and Thailand to block access to its site.

Wikileaks Places Lives at Risk; Gives Terrorists a ‘hit list’. Robert Winnett, Political Editor for the Daily Telegraph, July 30, 2010, Date Accessed July 16, 2013, The Telegraph (UK), , “Wikileaks Afghanistan: Taliban ‘hunting down informants,” http://www.telegraph.co.uk/news/worldnews/asia/afghanistan/7917955/Wikileaks-AfghanistanTaliban-hunting-down-informants.html More dire, the most recent release included information that identified critical infrastructure vulnerabilities. Earlier mass releases of classified information and unfiltered military reports from Iraq and Afghanistan placed the lives of U.S. allies and pro-democracy forces at risk by, among other things, giving terrorist groups a “hit list.”2

Wikileaks Hurts US-Pakistani Relations Wikileaks hurts U.S. Pakistani Relations; Released Information Fuels Anti-American sentiment Jayshree Bajoria, South Asia researcher at Human Rights Watch, December 6, 2010, Date Accessed July 16th,2013, How WikiLeaks Hurts U.S.-Pakistan Ties, Council on Foreign Relations (CFR), http://www.cfr.org/pakistan/wikileaks-hurts-us-pakistan-ties/p23565, The release of thousands of U.S. diplomatic cables (NYT) by WikiLeaks.org has further shaken Washington's already strained relations with Pakistan, a strategic ally central to any success in Afghanistan and the fight against terrorism. The cables discuss U.S. concerns over Pakistan's continued support for certain militant groups, its nuclear program, the country's fragile civil-military relations, human rights abuses by Pakistan's security services, and more. Pakistani media has been covering the cable leaks extensively, and some stories have further fueled anti-U.S. sentiment (Reuters), with Pakistan's right-wing Islamist party Jamaat-e-Islami staging a rally Dec. 5 to protest Pakistan's alliance (AFP) with the United States.

A2: Wikileaks Solves For Transparency Wikileaks does not increase transparency – Bypassing the legal framework creates a governmental backlash that leads to even more secrecy Fenster, Mark. (Professor at the University of Florida) March 2012. Disclosure's Effects: WikiLeaks and Transparency. http://works.bepress.com/cgi/viewcontent.cgi?article=1009&context=mark_fenster Date Accessed: 7/17/2013 First, WikiLeaks’ ability to receive and distribute leaked information cheaply, quickly, and seemingly unstoppably allows it to bypass the legal framework that would otherwise permit courts and officials to consider and balance disclosure’s effects. For this reason, WikiLeaks threatens to make transparency’s balance irrelevant.238 Second, its recent massive disclosures of U.S. military and diplomatic documents, and the uneven and unpredictable effects they have had to date, should force us to reconsider and test the assumption that disclosure produces effects that can serve as the basis for judicial and administrative prediction, calculation, and balancing. For this reason, WikiLeaks threatens transparency’s balance by disproving its assumption that disclosure guarantees measurable consequences that can be estimated ex ante.

Turn: Wikileaks decreases transparency by creating a government backlash and increased digital surveillance Päivikki Karhula. (Staff Writer for International Federation of Libraries Association) Jan 2011 What is the effect of WikiLeaksfor Freedom of Information? http://www.ifla.org/files/assets/faife/publications/spotlights/wikileaks-karhula.pdf Date Accesed: 7/17/13 What is the possible impact of WikiLeaks? Is it going to increase or restore the space of free speech or advance transparency of public documents? Or is it going to have the opposite effect and make governments strengthen their restrictions and increase different forms of Internet censorship? There are several valid concerns and evident signs about stricter legislation and more in depth surveillance practices which may find their grounds on WikiLeaks. Shortly after cable leaks three US senators (Ensign, Lieberman, Brown) introduced a bill aimed at stopping WikiLeaks by making it illegal to publish the names of military or intelligence community informants. According to Brown, The Securing Human Intelligence and Enforcing Lawful Dissemination Act (SHIELD) would prevent anyone from compromising national security in the future in a similar manner to WikiLeaks.17 Another bill under discussion would give the US government extended rights to wiretap all online communication and Internet traffic including foreign-based service providers. The wiretapping bill would also require software developers which enable peer-to-peer communication to redesign their service to allow interception.18 Concerns have been raised if WikiLeaks is used to gain support for this legislation.19

A2: Wikileaks Solves For Transparency Wikileaks hurts national security; slows declassification and openness in Gov’t HEATHER HURLBURT, Executive Director of the National Security Network, November 30th, 2010, Date Accessed July 16, 2013, “Why Wikileaks Is Bad for Progressive Foreign Policy”, http://www.newrepublic.com/blog/jonathan-cohn/79483/wikileaks-round-iii-will-it-matter-much# In the last few years, there has been some progress toward classifying fewer documents and using the more rarefied classifications less frequently. This series of leaks will almost surely reverse that progress. A top-secret classification would have kept any of these documents off the shared network from which they were allegedly downloaded by a very junior soldier. You can bet that the intelligence community will make that point—not only to justify stronger classification of new documents but also to slow the declassification of old ones. Civilian administrations at least since Clinton’s have been trying to speed up those efforts. Now they will go even more slowly, making it harder to learn the whole story of how our government analyzed an issue, treated an individual, or reacted to a crisis. And make no mistake: You can't get the comprehensive history of a diplomatic episode from Wikileaks any more than someone could learn the comprehensive truth about you by downloading the top 20 emails from your inbox right now.

Digital Surveillance Solvency

Data Collection is Key to Cyber Security Technology Data collection Necessary to keep expanding IT Security efficient. Eileen Yu, senior editor at ZDNet Asia, where she oversees the business tech news site, June 12, 2013, “Complexity, targeted attacks to drive security spend to $67B”, ZDNET, http://www.zdnet.com/complexity-targeted-attacks-to-drive-security-spend-to-67b-7000016717/, Date Accessed: July 23, 2013 Increasing complexity and number of targeted attacks are pushing companies to spend more on IT security, driving the global market to a 8.7 percent climb to hit US$67.2 billion this year. ¶ Key market drivers are mobile security, big data, and advanced targeted attacks.¶ In a statement released Wednesday, Gartner projected the security technology and service market will further expand to US$86 billion in 2016. The market researcher pointed to three market drivers: mobile security, big data, and advanced targeted attacks. ¶ To support these security requirements as well as business needs, more data is needed to more effectively detect advanced attacks, the research firm added, noting that this presented challenges when identifying patterns of potential risk across diverse data sources.

A2: Tor Prevents Digital Surveillance You can reveal the identity of Tor users by scanning data carefully Biryukov, Alex. Pustogarov, Ivan. Weinmann, Ralf-Philipp. 2013 (Security researchers at the University of Luxembourg. "Trawling for Tor Hidden Services: Detection, Measurement, Deanonymization". Accessed 15 July 2013. http://www.ieeesecurity.org/TC/SP2013/papers/4977a080.pdf) We have analyzed the security properties of Tor hidden services and shown that attacks to deanonymize hidden services at a large scale are practically possible with only a moderate amount of resources. We have demonstrated that collecting the descriptors of all Tor hidden services is possible in approximately 2 days by spending less than USD 100 in Amazon EC2 resources. Running one or more guard nodes then allows an attacker to correlate hidden services to IP addresses using a primitive traffic analysis attack. Furthermore, we have shown that attackers can impact the availability and sample the popularity of arbitrary hidden services not under their control by selectively becoming their hidden service directories.

Transparency

Uniqueness: Privacy Decreasing Now No Privacy Now-Social Media Palmer, Shelly. 06/16/2013. PRISM: There Simply is No Privacy... None. http://www.huffingtonpost.com/shelly-palmer/prism-there-simply-is-no_b_3451721.html Being an active member of a social networking community - whether it's Facebook, Twitter, or anything else - means ceding a fair amount of privacy. The information, photos and check-ins you share are already public information (to an extent), even if your security settings are maxed out. Nothing you do on the Internet is truly private, and nothing you put on the Internet will ever really be deleted. Surrendering your right to privacy is the price of living an Internet-based "connected" life.

There is an immense lack of digital privacy protection regarding mobile phones Hubert A.-M. Moik. CEO of MobiDigger, a cell phone digital privacy company. August 2012. Protect your privacy:¶ Mobile & Digital Privacy and Awareness. http://www.mobidigger.com/2012/Privacy_Study_MobiDigger_2012.pdf. Date Accessed 7/17/13. Contrary to conventional wisdom, privacy concerns are not limited to the Internet. It also ¶ encloses mobile phones, which penetration in America reached 104.6% in 2011 (totaling 331.6 ¶ million subscribers) therefore exceeding the US population1¶ . Even one-third of American ¶ households now have wireless device only2¶ . Users are largely unaware that cell phone ¶ messages -even simple text messages- ultimately can end up in the hands of strangers and ¶ even on the Internet. Worse, for example, new “smart phones” send information about the ¶ phone’s location to databases. Though such databases usually are not public, they also are not ¶ private; this information, then can pose a danger to the person who uses their phone to ¶ communicate with strangers or other acquaintances, to whom they normally would not reveal ¶ their locations. Private cell-phone information can also be revealed through a “reverse search,” ¶ in which anyone can search a cell phone number to find the owner’s name and address.

Digital privacy has largely dissappeared Amy Joi O'Donoghue. Writer for Deseret news.June 7 2013."Addressing the illusion of digital privacy."Deseret News.http://www.deseretnews.com/article/865581375/Addressing-the-illusion-ofdigital-privacy.html?pg=all. Date Retrieved: July 17, 2013. “You

can’t have 100 percent security and then also have 100 percent privacy and zero inconvenience,” President Barack Obama said. “You know, we’re going to have to make some choices as a society.”¶ Some say that choice has already been made in the aftermath of 9/11, with the approval of the Patriot Act that followed, and the pursuit of security at a time of free-flowing information of all types that gives the nation's enemies — from individuals to organizations to nations — the ability to cause catastrophic harm.¶ But it's a choice and policy being assessed this week in the halls of Washington, D.C., as well as in the burgs and hamlets of the nation by individuals and families who increasingly use technology to navigate their lives.¶ "Digital privacy is an illusion," said Eric Swedin, a professor at Weber State University who teaches history, particularly the history of technology. Swedin has also taught computer science and has specialized in information security — such as how hacking works and how to defend a system against hackers.¶ "When

you do something digitally, it can be monitored and copied. Corporations do this all the time," Swedin said.¶ He said Google, for example, keeps track of searches.¶ "Google cares not about you as an individual, they care about you as a marketing category … and this gives you ads that are discerned from your personal searches."¶ Swedin said digital eavesdropping into cellphone records should not be a surprise given the wide-open nature of the Internet and the domestic security urgency that gripped the nation in the wake of 9/11.¶ "You

can learn a lot really fast about a person just from looking at that information," he said. "My suspicion, and it is just a suspicion, is that the intelligence community since

9/11 has been totally enamored with something called 'total information awareness.' It is this belief that if you have enough data and the right kind of computer programs, you can find criminal behavior before it happens."

Surveillance happening now, and Citizens like it James Vlahos Contributing writer at The New York Times Contributing Editor at Popular Mechanics Contributing Editor at Popular Science October 1, 2009. “Surveillance Society: New High-Tech Cameras Are Watching You Popular mechanics”, http://www.popularmechanics.com/technology/military/4236865 Most Americans would probably welcome such technology at what clearly is a marquee terrorist target. An

ABC News/Washington Post poll in July 2007 found that 71 percent of Americans favor increased video surveillance. What people may not realize, however, is that advanced monitoring systems such as the one at the Statue of Liberty are proliferating around the country. High-profile national security efforts make the news—wiretapping phone conversations, Internet moniÂtoring—but state-of-the-art surveillance is increasingly being used in more every-day settings. By local police and businesses. In banks, schools and stores. There are an estimated 30 million surveillance cameras now deployed in the United States shooting 4 billion hours of footage a week. Americans are being watched, all of us, almost everywhere. We have arrived at a unique moment in the history of surveillance. The price of both megapixels and gigabytes has plummeted, making it possible to collect a previously unimaginable quantity and quality of data. Advances in processing power and software, meanwhile, are beginning to allow computers to surmount the greatest limitation of traditional surveillance—the ability of eyeballs to effectively observe the activity on dozens of video screens simultaneously. Computers can't do all the work by themselves, but they can expand the capabilities of humans exponentially. ¶

Uniqueness: Privacy Violations Inevitable Violations of our privacy are inevitable, the proliferation of security technology is increasing rapidly. Brin, David. Doctor of Philosophy in space science, 2010 fellow at the Institute of Ethics. 1998. The Transparent Society. “Chapter One: The Challenge of an Open Society.” http://www.davidbrin.com/transparentsociety1.html Alas, they do appear to be our only options. For the cameras are on their way, along with data networks that will send a myriad images flashing back and forth, faster than thought. ¶ In fact, the future has already arrived. The trend began in Britain a decade ago, in the town of King's Lynn, where sixty remote-controlled video cameras were installed to scan known "trouble spots," reporting directly to police headquarters. The resulting reduction in street crime exceeded all predictions; in or near zones covered by surveillance, crime dropped to one seventieth of the former amount. The savings in patrol costs alone paid for the equipment in a few months. Dozens of cities and towns soon followed the example of King's Lynn. Glasgow, Scotland, reported a 68 percent drop in crime citywide, while police in Newcastle fingered over 1,500 perpetrators with taped evidence. (All but seven pleaded guilty, and those seven were later convicted.) In May 1997, a thousand Newcastle soccer fans rampaged through downtown streets. Detectives studying the video reels picked out 152 faces and published 80 photographs in local newspapers. In days, all were identified. ¶ Today over

300,000 cameras are in place throughout the United Kingdom, transmitting round-the-clock images to a hundred constabularies, all of them reporting decreases in public misconduct. Polls report that the cameras are extremely popular with citizens, though British civil libertarian John Wadham and others have bemoaned this proliferation of snoop technology, claiming, "It could be used for any other purpose, and of course it could be abused." ¶ Visitors to Japan, Thailand, and Singapore will see that other countries are rapidly following the British example, using closed circuit television (CCTV) to supervise innumerable public areas.*¶

This trend was slower coming to North America, but it appears to be taking off. After initial experiments garnered widespread public approval, the City of Baltimore put police cameras to work scanning all 106 downtown intersections. In 1997, New York City began its own program to set up twenty-four-hour remote surveillance in Central Park, subway stations and other public places. ¶ No

one denies the obvious and dramatic short-term benefits derived from this early proliferation of surveillance technology. That is not the real issue. Over the long run, the sovereign folk of Baltimore and countless other communities will have to make the same choices as the inhabitants of our two mythical cities. Who will ultimately control the cameras?¶ Consider a few more examples:¶ How many parents have wanted to be a fly on the wall while their child was at day care? This is now possible with a new video monitoring system known as Kindercam, linked to high-speed telephone lines and a central Internet server. Parents can log on, type "www.kindercam.com," enter their password, and access a live view of their child in day care at any time, from anywhere in the world. Kindercam will be installed in two thousand daycare facilities nationwide by the end of 1998. Mothers on business trips, fathers who live out of state, as well as distant grandparents can "drop in" on their child daily. Drawbacks? Overprotective parents may check compulsively. And now other parents can observe your child misbehaving! ¶ Some of the same parents are less happy about the lensed pickups that are sprouting in their own workplaces, enabling supervisors to tune in on them the same way they use Kindercam to check up on their kids.¶ That is, if they notice the cameras at all.

At present, engineers can squeeze the electronics for a video unit into a package smaller than a sugar cube. Complete sets half the size of a pack of cigarettes were recently offered for sale by the Spy Shop, a little store in New York City located two blocks from the United Nations. Meanwhile, units with radio transmitters are being disguised in clock radios, telephones and toasters, as part of the burgeoning "nannycam" trend. So high is demand for these pickups, largely by parents eager to check on their babysitters, that just one firm in Orange County, California, has recently been selling from five hundred to one thousand disguised cameras a month. By the end of 1997, prices had dropped from $2,500 to $399.¶ Cameras

aren't the only surveillance devices proliferating in our cities. Starting with Redwood City, near

San Francisco, several police departments have begun lacing neighborhoods with sound pickups that transmit directly back to headquarters. Using triangulation techniques, officials can now pinpoint bursts of gunfire and send patrol units swiftly to the scene, without having to wait for vague phone reports from neighbors. In 1995 the Defense Department awarded a $1.7 million contract to Alliant Techsystems for its prototype system SECURES, which tests more advanced sound pickup networks in Washington and other cities. The hope is to distinguish not only types of gunfire but also human voices crying for help.¶ So far, so good. But from there, engineers say it would be simple to upgrade the equipment, enabling bored monitors to eavesdrop through open bedroom windows on cries of passion, or family arguments. "Of course we would never go that far," one official said, reassuringly.¶ Consider another piece of James Bond apparatus now available to anyone with ready cash. Today, almost

any electronics store will sell you night vision goggles using state-of-the-art infrared optics equal to those issued by the military, for less than the price of a video camera. AGEMA Systems, of Syracuse, New York, has sold several police departments imaging devices that can peer into houses from the street, discriminate the heat given off by indoor marijuana cultivators, and sometimes tell if a person inside moves from one room to the next. Military and civilian enhanced-vision technologies now move in lockstep, as they have in the computer field for years. ¶ In other words, even

darkness no longer

guarantees privacy.¶ Nor does your garden wall. In 1995, Admiral William A. Owens, then Vice-Chairman of the Joint Chiefs of Staff, described a sensor system that he expected to be operational within a few years: a pilotless drone, equipped to provide airborne surveillance for soldiers in the field. While camera robots in the $1 million range have been flying in the military for some time, the new system will be extraordinarily cheap and simple. Instead of requiring a large support crew, it will be controlled by one semi-skilled soldier and will fit in the palm of a hand. Minuscule and quiet, such remote-piloted vehicles, or RPVs, may flit among trees to survey threats near a rifle platoon. When mass-produced in huge quantities, unit prices will fall.¶ Can

civilian models be far behind? No law or regulation will keep them from our cities for contraptions will get smaller,

very long. The rich, the powerful, and figures of authority will have them, whether legally or surreptitiously. The

cheaper, and smarter with each passing year.¶ So much for the supposed privacy enjoyed by sunbathers in their own back yards. ¶ Moreover, surveillance cameras are the tip of the proverbial iceberg. Other entrancing and invasive innovations of the vaunted information age abound. Will a paper envelope protect the correspondence you send by old-fashioned surface mail when new-style scanners can trace the patterns of ink inside without ever breaking the seal?¶

say you correspond with others by email and use a computerized encryption program to ensure that your messages good will all the ciphers and codes do, if some adversary has bought a "back door" password to your encoding program? Or if a wasp-sized camera-drone flits into your room, sticks to Let's

are only read by the intended recipient. What

the ceiling above your desk, inflates a bubble lens and watches every key-stroke that you type? (A number of unnerving techno-possibilities will be discussed in chapter 8.)¶ In late 1997 it was revealed that Swiss police had secretly tracked the whereabouts of mobile phone users via a telephone company computer that records billions of movements per year. Swisscom was able to locate its mobile subscribers within a few hundred meters. This aided several police investigations. But civil libertarians expressed heated concern, especially since identical

technology is used worldwide.¶ The same issues arise when we contemplate the proliferation of vast databases containing information about our lives, habits, tastes and personal histories. As we shall see in chapter 3, the cash register scanners in a million supermarkets, video stores, and pharmacies

already pour forth a flood of statistical data about customers and their purchases, ready to be correlated. (Are you stocking up on hemorrhoid cream? Renting a daytime motel room? The database knows.) Corporations claim this information helps them serve us more efficiently. Critics respond that it gives big companies an unfair advantage, enabling them to know vastly more about us than we do about them. Soon,

computers will hold all your financial and educational records, legal documents, and medical analyses that parse you all the way down to your genes. Any of this might be examined by strangers without your knowledge, or even against your stated will.

Transparency Impacts: Key to Economy Reciprocal transparency is key to economic growth and prosperity Field, Chris., Western Australian Ombudsman, June 10, 2013, Promoting Accountable and Transparent Decision Making in the Public Sector, http://www.ombudsman.wa.gov.au/Publications/Documents/speeches/030610-Speech-by-Chris-Fieldto-Legal-Wise-Conference-2010.pdf In short, there are very many reasons why accountability and transparency in ¶ government is important and very many good reasons to be thankful that we largely take ¶ that importance as a universal truth. For today’s purposes I simply want to focus on one ¶ reason why accountable and transparent government is important. Accountable and ¶ transparent government is, in my view, an integral step on the path to creating the most ¶ prosperous, productive economies - economies that allow individuals, businesses and ¶ governments to create the highest possible standard of living for the highest possible ¶ number of people. ¶ In its recent 2009 Prosperity Index, the Legatum Institute assessed 104 countries, ¶ representing approximately 90% of the world’s population, in terms of a series of measures, such as whether a country possesses “an honest and effective government ¶ that preserves order and encourages productive citizenship” or whether it features ¶ “transparent and accountable governing institutions that promote economic growth”.

Now is the Key Time for Transparency The rise of Technological Surveillance Era is among us, and the result will determine our future. Brooke, Heather (Campaigning Journalist and Writer for The Guardian) Nov 2010 WikiLeaks: the revolution has begun – and it will be digitized. http://www.guardian.co.uk/commentisfree/2010/nov/29/the-revolution-will-be-digitised Date Accessed: 7/17/13 But data has a habit of spreading. It slips past military security and it can also leak from WikiLeaks, which is how I came to obtain the data. It even slipped past the embargoes of the Guardian and other media organizations involved in this story when a rogue copy of Der Spiegel accidentally went on sale in Basle, Switzerland, on Sunday. Someone bought it, realised what they had, and began scanning the pages, translating them from German to English and posting updates on Twitter. It would seem digital data respects no authority,

be it the Pentagon, WikiLeaks or a newspaper editor.¶ Individually, we have all already experienced the massive changes resulting from digitisation. Events or information that we once considered ephemeral and private are now aggregated, permanent, public. If these cables seem large, think about the 500 million users of Facebook or the millions of records kept by Google. Governments hold our personal data in huge databases. It used to cost money to disclose and distribute information. In the digital age it costs money not to.¶ But when data breaches happen to the public, politicians don't care much. Our privacy is expendable. It is no surprise that the reaction to these leaks is different. What has changed the dynamic of power in a revolutionary way isn't just the scale of the databases being kept, but that individuals can upload a copy and present it to the world . In paper form, these cables equate, on the Guardian's estimate, to some 213,969 pages of A4 paper, which would stack about 25m high – not something that one could have easily slipped past security in the paper age.¶ To some this marks a crisis, to others an opportunity. Technology is

breaking down traditional social barriers of status, class, power, wealth and geography – replacing them with an ethos of collaboration and transparency.¶ The former US ambassador to Russia James Collins told CNN the disclosure of the cables, "will impede doing things in a normal, civilised way". Too often what is normal and civilised in diplomacy means turning a blind eye to large-scale social injustices, corruption and abuse of power. Having read through several hundred cables, much of the "harm" is embarrassment and the highlighting of inconvenient truths. For the sake of a military base in a country, our leaders accept a brutal dictator who oppresses his population. This may be convenient in the short term for politicians, but the long-term consequences for the world's citizens can be catastrophic.¶ Leaks are not the problem; they are the symptom. They reveal a disconnect between what people want and need to know and what they actually do know. The greater the secrecy, the more likely a leak. The way to move beyond leaks is to ensure a robust regime for the public to access important information.¶ Thanks to the internet, we have come to expect a greater level of knowledge and participation in most areas of our lives. Politics, however, has remained resolutely unreconstructed. Politicians, see themselves as parents to a public they view as children – a public that cannot be trusted with the truth, nor with the real power that knowledge brings .¶ Much of the outrage about WikiLeaks is not over the content of the leaks but from the audacity of breaching previously inviolable strongholds of authority. In the past, we deferred to authority and if an official told us something would damage national security we took that as true. Now the raw data behind these claims is increasingly getting into the public domain. What we have seen from disclosures like MPs' expenses or revelations about the complicity of government in torture is that when politicians speak of a threat to "national security", often what they mean is that the security of their own position is threatened.¶ We are at a pivotal moment where the visionaries at the vanguard of a global digital age are clashing with those who are desperate to control what we know. WikiLeaks is the guerrilla front in a global movement for greater transparency and participation. There are projects like Ushahidi that use social networking to create maps where locals can report incidents of violence that challenge the official version of events. There are activists seeking to free official data so that citizens can see, for example, government spending in detail.¶ Ironically, the US state department has been one of the biggest cheerleaders for technical innovation as a means of bringing democracy to places like Iran and China. President Obama has urged repressive regimes to stop censoring the internet, yet a bill before Congress would allow the attorney general to create a blacklist of websites. Is robust democracy only good when it's not at home?¶ It used to be that a leader controlled

citizens by controlling information. Now it's harder than ever for the powerful to control what people read, see and hear. Technology gives people the ability to band together and challenge authority. The powerful have long

spied on citizens (surveillance) as a means of control, now citizens are turning their collected eyes back upon the powerful (sousveillance).¶ This is a revolution, and all revolutions create fear and uncertainty. Will we move to a New Information Enlightenment or will the backlash from those who seek to maintain control no matter the cost lead us to a new totalitarianism? What happens in the next five years will define the future of democracy for the next century, so it would be well if our leaders responded to the current challenge with an eye on the future.

Link: Pretending Privacy Exists Masks Surveillance (1/2) We can never go back to an age with complete privacy, governments that claim to do so are simply making surveillance more hidden. The only option is to encourage accountability through complete transparency. Brin, David. Doctor of Philosophy in space science, 2010 fellow at the Institute of Ethics. 1998. The Transparent Society. “Chapter One: The Challenge of an Open Society.” http://www.davidbrin.com/transparentsociety1.html The issue of threatened privacy has spawned a flood of books, articles and media exposés — from Janna Malamud Smith's thoughtful Private Matters, and Ellen Alderman and Caroline Kennedy's erudite Right to Privacy all the way to shrill, paranoiac rants by conspiracy fetishists who see Big Brother lurking around every corner. Spanning this spectrum, however, there appears to be one common theme. Often the author has responded with a call to arms, proclaiming that we must become more vigilant to protect traditional privacy against intrusions by faceless (take your pick) government bureaucrats, corporations, criminals, or just plain busybodies.¶ That is the usual conclusion — but not the one taken here.¶ For in fact, it is already far too late to prevent the invasion of cameras and databases. The djinn cannot be crammed back into its bottle. No matter how many laws are passed, it will prove quite impossible to legislate away the new surveillance tools and databases. They are here to stay.¶ Light is going to shine into nearly every corner of our lives.¶ The real issue facing citizens of a new century will be how mature adults choose to live — how they might compete, cooperate and thrive — in such a world. A transparent society.¶ Regarding those cameras for instance — the ones topping every lamppost in both city one and city two — we can see that very different styles of urban life resulted from just one decision, based on how people in each town answered the following question.¶ Will average citizens share, along with the mighty, the right to access these universal monitors? Will common folk have, and exercise, a sovereign power to watch the watchers?¶ Back in

city number one, Joe and Jane Doe may walk through an average day never thinking about those microcameras overhead. They might even believe official statements claiming that all the spy eyes were banished and dismantled a year or two ago, when in fact they were only made smaller, harder to detect. Jane and Joe stroll secure that their neighbors cannot spy on them (except the old-fashioned way, from overlooking windows). In other words, Jane and Joe blissfully believe they have privacy.¶ The inhabitants of city number two know better. They realize that, out of doors at least, privacy has always been an illusion. They know anyone can tune in to that camera on the lamppost — and they don't much care. They perceive what really matters: that they live in a town where the police are efficient, respectful, and above all accountable. Homes are sacrosanct, but out on the street any citizen, from the richest to the poorest, can walk both safely and use the godlike power to zoom at will from vantage point to vantage point, viewing all the lively wonders of the vast but easily spanned village their metropolis has become, as if by some magic it had turned into a city not of people but of birds.¶ Sometimes, citizens of city number two find it tempting to wax nostalgic about the old days, before there were so many cameras, or before television invaded the home, or before the telephone and automobile. But for the most part, city number two's denizens know those times are gone, never to return. Above all, one

thing makes life bearable: the surety that each person knows what is going on, with a say in what will happen next. And has rights equal to those of any billionaire or chief of police

Link: Pretending Privacy Exists Masks Surveillance (2/2) People have been calling for individuals to retain absolute privacy online, but these merely cover up the inevitability of surveillance. Brin, David. Doctor of Philosophy in space science, 2010 fellow at the Institute of Ethics. 1998. The Transparent Society. “Chapter One: The Challenge of an Open Society.” http://www.davidbrin.com/transparentsociety1.html Recent years have witnessed widespread calls to "empower" citizens and corporations with tools of encryption — the creation of ciphers and secret codes — so that the Internet and telephone lines may soon fill with a blinding fog of static and concealed messages, a haze of habitual masks and routine anonymity. Some of society's best and brightest minds have begun extolling a coming "golden age of privacy," when no one need ever again fear snooping by bureaucrats, federal agents, or in-laws. The prominent iconoclast John Gilmore, who "favors law 'n' chaos over law 'n' order," recently proclaimed that computers are literally extensions of our minds, and that their contents should remain as private as our inner thoughts. Another activist, John Perry Barlow, published a widely discussed "A Declaration of Independence of Cyberspace" proclaiming that the mundane jurisdictions of nations and their archaic laws are essentially powerless and irrelevant to the Internet and its denizens (or "netizens"). Among the loose clan of self-proclaimed "cypherpunks," a

central goal is that citizens should be armed with broad new powers to conceal their words, actions, and identities. The alternative, they claim, will be for all our freedoms to succumb to a looming tyranny.¶ In opposing this modern passion for personal and corporate secrecy, I should first emphasize that I like privacy! Outspoken eccentrics need it, probably as much or more than those who are reserved. I would find it hard to get used to living in either of the cities described in the example at the beginning of this chapter. But a few voices out there have begun pointing out the obvious. Those

cameras on every street corner are coming, as surely as the new "privacy laws" really prevent hidden eyes from getting tinier, more mobile and clever? In software form they will cruise the data highways . "Antibug" technologies will arise, but the resulting surveillance arms race can hardly favor the "little guy." The rich, the powerful, police agencies, and a technologically skilled elite will always have an advantage. millennium.¶ Oh, we may agitate and legislate. But can

Alternative Solvency: Transparency Checks Government Oppression (1/2) Transparency solves-only by instilling the need for openness can we adequately be aware of what’s going on to adequately criticize the government and make them accountable Brin, David. Doctor of Philosophy in space science, 2010 fellow at the Institute of Ethics. 1998. The Transparent Society. “Chapter One: The Challenge of an Open Society.” http://www.davidbrin.com/transparentsociety1.html What distinguishes society today is not only the pace of events but also the nature of our tool kit for facing the future. Above all, what has marked our civilization as different is its knack for applying two extremely hard-won lessons from the past.¶ In all of history, we

have found just one cure for error — a partial antidote against making and repeating grand, foolish mistakes, a remedy against self-deception. That antidote is criticism.¶ Scientists have known this for a long time. It is the keystone of their success. A scientific theory gains respect only by surviving repeated attempts to demolish it. Only after platoons of clever critics have striven to come up with refuting evidence, forcing changes, do a few hypotheses eventually graduate from mere theories to accepted models of the world.¶ Another

example is capitalism. When it works, under just and impartial rules, the free market

rewards agility, hard work and innovation, just as it punishes the stock prices of companies that make too many mistakes. Likewise, any

believer in evolution knows that death is the ultimate form of criticism, a merciless driver, transforming species over time.¶ Even in our private and professional lives, mature people realize that improvement comes only when we open ourselves to learn from our mistakes, no matter how hard we have to grit our teeth, when others tell us we were wrong. Which brings up a second observation.¶ Alas, criticism has always been what human beings, especially leaders, most hate to hear.¶ This ironic contradiction, which I will later refer to as the "Paradox of the Peacock," has had profound and tragic effects on human culture for centuries. Accounts left by past ages are filled with woeful events in which societies and peoples suffered largely because openness and free speech were suppressed, leaving the powerful at liberty to make devastating blunders without comment or consent from below.¶ If neo-Western civilization* has one great trick in its repertoire, a technique more responsible than any other for its success, that trick is accountability. Especially the knack — which no other culture ever mastered — of making accountability apply to the mighty. True, we still don't manage it perfectly. Gaffes, bungles and inanities still get covered up. And yet, one can look at any newspaper or television news program and see an eager press corps at work, supplemented by hordes of righteously indignant individuals (and their lawyers), all baying for waste or corruption to be exposed, secrets to be unveiled, and nefarious schemes to be nipped in the bud. Disclosure is a watchword of the age, and politicians have grudgingly responded by passing the Freedom of Information Act (FOIA), truth-in-lending laws, open-meeting rules, then codes to enforce candor in real estate, in the nutritional content of foodstuffs, in the expense accounts of lobbyists, and so on.¶ Although this process

of stripping off veils has been uneven, and continues to be a source of contention, the underlying moral force can be clearly seen pervading our popular culture, in which nearly every modern film or novel seems to preach the same message — suspicion of authority. The phenomenon is not new to our generation. Schoolbooks teach that freedom is guarded by constitutional "checks and balances," but those same legal provisions were copied, early in the nineteenth century, by nearly every new nation of Latin America, and not one of them remained consistently free. In North America, constitutional balances worked only because they were supplemented by a powerful mythic tradition, expounded in story, song, and now virtually every Hollywood film, that any undue accumulation of power should be looked on with concern.¶ Above all, we are encouraged to distrust government.¶ The late Karl Popper pointed out the importance of this mythology in the dark days during and after World War II, in The Open Society and its Enemies. Only by insisting on accountability, he concluded, can we constantly remind public servants that they are servants. It is also how we maintain some confidence that merchants aren't cheating us, or that factories aren't poisoning the water. As inefficient and irascibly noisy as it seems at times, this habit of questioning authority ensures freedom far more effectively than any of the older social systems that were based on reverence or trust.¶ And yet, another paradox rears up every time one interest group tries to hold another accountable in today's society.¶ Whenever a conflict appears between privacy and accountability, people demand the former for themselves and

the latter for everybody else.¶ The rule seems to hold in almost every realm of modern life, from special prosecutors investigating the finances of political figures to worried parents demanding that lists of sex offenders be made public. From merchants anxious to see their customers' credit reports to clients who resent such snooping. From people who "need" caller ID to screen their calls to those worried that their lives might be threatened if they lose telephone anonymity. From activists demanding greater access to computerized government records in order to hunt patterns of corruption or incompetence in office to other citizens who worry about release of personal information contained in those very same records.

Alternative Solvency: Transparency Checks Government Oppression (2/2) Transparency is key to government accountability when it comes to digital privacy Notley, Tanya. Journalist. 4 August 2011. Why digital privacy and security are important for development. http://www.guardian.co.uk/global-development/poverty-matters/2011/aug/04/digitaltechnology-development-tool. Date Accessed 7/17/13. If you believe an over-arching ambition of development should be to ensure the benefits of progress and plenty are shared fairly among citizens, then you will likely agree

it's important to have a government willing to create policies that attempt to remedy existing inequities. To do this in a democratic way, these policies, and the practices to implement them, need to be transparent to ensure people can assess how government and development money is being spent, where it is being distributed and if it achieves what was intended.¶ Access to information technologies – such as mobile phones, the internet, social networking sites and video – can play a critical role in helping people hold governments and development agencies accountable. When used to collect, monitor and assess information about needs, spending, activities and impacts, technologies support not only accountability but also – by allowing people to participate in their own governance – freedom of expression and civic participation.

Impacts: Government Secrecy Hurts Government Effectiveness Secrecy inhibits the government’s effectiveness Casman, Betsey Sue. Master of Arts in Ethics and Policy Studies. 2011. "The Right to Privacy in Light of the Patriot Act and Social Contract Theory". http://digitalscholarship.unlv.edu/cgi/viewcontent.cgi?article=2087&context=thesesdissertations. Date Accessed 7/21/13. Some literature is much more cautionary in what it infers regarding the Patriot ¶ Act. Where they see the need for the government intervention, they are still wary in light ¶ of the implications of that much increased and discretionary government power. Seth ¶ Kreimer examines the accumulation of data by governmental officials and bureaucrats (of ¶ all types governmental and non) in the course of daily events (license dispensation, benefits, and government proceedings). Kreimer writes, “This

information gathered in ¶ one place is available in many other arenas. Every employer accumulates information ¶ about her employees; every granter of credit files data about her customers, every transfer ¶ of funds leaves an increasingly accessible data trail, all of which is susceptible to ¶ government subpoena or request” (Kreimer, 1991). Kreimer notes that this expansion of ¶ government translates into an increase of the effective power of government, which ¶ means an increase in the ability to deploy governmental sanctions effectively. It also ¶ provides for a less straightforward means of exerting governmental power; it has the ¶ power through obtained information to publish offender names - a proven deterrent ¶ almost effective as prosecution. (Kreimer, 1991). Kreimer notes that information is ¶ currency; the prerequisite for political self-determination and a security against ¶ usurpation by secret cabals. Secrecy interferes with rational decision-making, ¶ accountability, and the choice of national goals (Kreimer, 1991). Please note that ¶ Kreimer wrote this article in 1991 a full decade before the events that transpired and the ¶ everlasting impact of September 11, 2001. There was obviously at least some support for ¶ this expansion of the Government’s gathering and disseminating information (antiprivacy, if you will) before the events of 9/11. The examination of the Government’s ¶ balancing of act of protecting both privacy rights and right to release information is ¶ studied and reported through the Government’s use of constitutional law.

A2: Leaks Bad – They’re Impossible to Stop The United States government does not store data securely enough; Snowden proves Pogatchnik, Shawn. 2013 (Reporter for the Associated Press. “AP Interview: Ex-FBI Chief on Risk of Cyber Terror”. 7 July. Accessed 16 July 13. http://bigstory.ap.org/article/ap-interview-ex-fbi-chief-riskcyber-terror) He said the NSA gave Snowden system-wide access with "the ability to extract and copy top-secret documents detailing secured and elaborate programs." He noted that a recent PricewaterhouseCoopers survey found that employee insiders committed around a third of all breaches of sensitive data. And that, he [Freeh] said, was the biggest issue for government agencies and corporations: What should be accessible on its own internal intranet connections, and who should be cleared to see it? As things stand now, he said, "too many people have too much access" to sensitive documents in companies and government agencies. He suggested that a group's most confidential information might have to be left without an electronic fingerprint at all and be kept, old school, like the Coca-Cola company's recipe for its soft drinks once was under lock and key in a safe.

A2: Schneier/”Transparency Destroys Privacy” Transparency upholds privacy, by checking the surveillance power of the elites and while creating a mutual respect for the privacy of others David Brin is a physicist and author of best-selling novels, 08 (“David Brin Rebuts Schnier in Defense of a Transparent Society,” Wired.com, 03.12.08, http://www.wired.com/politics/security/news/2008/03/brin_rebuttal) How did we get the freedom we already have, becoming the first civilization in history to (somewhat) defy ancient patterns? Yes, it's imperfect, always under threat. We swim against hard currents of human nature. But reciprocal accountability is the innovation that lets us even try.¶ Schneier claims that The Transparent Society doesn't address "the inherent value of privacy." But several chapters do, and I conclude that privacy is an inherent human need, too important to leave in the hands of state elites, who are themselves following ornate information-control rules written by other elites -- rules, by the way, that never work. (Robert Heinlein said "'privacy laws' only make the bugs smaller.")¶ Attacking a caricature of my position, Schneier suggests that transparency would end privacy, making everyone walk around naked. It does take some mental flexibility to realize how a generally open society will be privacy friendly. But it was a generally open society that invented modern privacy.¶ Look around. Today, the person who most capably defends your privacy is ... you. But you can't catch Peeping Toms and busybodies if everyone is shrouded in clouds of secrecy.¶ Try the "restaurant analogy." People who are nosey, leaning toward other diners in order to snoop, are caught by those other diners. Moreover, our culture deems such intrusion to be a worse sin than anything that may be overheard.¶ Now try setting up a restaurant where customer tables are separated by paper shoji screens. ¶ This provides the surface illusion of greater privacy, but peepers can press their ears against the screen and peer through little slits with impunity.¶ Which approach better protects privacy? Which have people overwhelmingly chosen?¶ Continuing, Schneier

poses a thought experiment: "Think of your existing power as the exponent in an equation that determines the value of information. The more power you have, the more additional power you derive from the new data."¶ But this is precisely the age-old problem that Enlightenment civilization was invented to solve! Just take Schneier's formulation and replace the words "information" and "new data" with "secrets." Now, it can be argued that both versions are true. But which version gives you a worse case of the creeps? If civilization becomes a cloud of secrecy (as some are now trying to achieve), that's when elites can really exploit disparities of power.¶ How have we fought this? One early Enlightenment trick was to divide the elites. Sic 'em on each other! Unions versus management, tort lawyers versus megacorporations, regulators versus moguls and activist nongovernmental organizations against any power center you can name. Non-governmental organizations (NGOs), the boomer innovation, let citizens clump en masse, pooling influence to increase their common "Schneier exponent" and use information advantageously. It's an Enlightenment method of great power and flexibility. Each person can find and join an NGO suited to any passion or interest.¶ But the

next step in people empowerment is even more impressive -- those burgeoning "smart mobs" Howard Rheingold and Vernor Vinge talk about, recently joined by Clay Shirky in Here Comes Everybody. It's agile. It's wired. Every generation innovates, or the enlightenment dies.¶ Oh, I can hear cynical snorts. Yes, it's flawed! Elites keep rediscovering tricks of secret collusion. Still, if it's hopeless, how come we're having this conversation?¶ Almost monthly, we hear of some angry cop arresting a citizen on trumped "privacy violations," for using a cellphone camera or MP3 recorder to capture an interaction with authority. And each month, judges toss the arrests, forcing police to apologize. Every time. So much for those power exponents.¶ Schneier even cites this trend, swerving his essay at the end, from doubt into a paean for "sousveillance" or citizens shining light upward upon the mighty.¶ Or ... a transparent society.¶ How to explain this veer? I suppose that he meant

light should shine in one direction, from masses onto elites, not the other way. Sounds nice. But who defines which other person is a dangerous elite? Won't the definitions be controlled by, well, elites, who then exploit every exception?¶ And can you show me once, in history, when elites let themselves be blinded?¶ This flaw erupts in most anti-transparency arguments. "Light should shine on power groups I worry about, but not at me or mine." Yes, that's human. I'm human too.¶ But look around the restaurant some time (discreetly) and see your fellow citizens in action -- mostly minding their own business, enjoying privacy while seldom having to enforce it, needing no screens or vigilant authorities to protect them, or to make them behave. Privacy is good! And, guess what? It happens when we empower people to see.¶ Sure, it ain't

perfect. We'll still need protectors. There are countless quibbles. We've a long way to go. ¶ Still, please, consider how we got what we already have.

A2: Agamben

Rights Agamben’s attempt to remove the limits on being destroys any possibility of rights that can help to preserve human dignity Frances Daly, philosophy researcher, Australian National University, BORDERLANDS, 2004, http://www.borderlandsejournal.adelaide.edu.au/vol3no1_2004/daly_noncitizen.htm There is much in Agamben’s analysis of contemporary society, particularly via his use of a Debordian critique of the spectacle, that forcefully restates some of the central problems of social life that we perceive in commodification, a fetishized distancing and an alienation of the very nature of what it means to be human. But perhaps the

rather overstated or one-dimensional nature of Agamben's understanding of alienation reveals one of the problems with his use of this critique. He refers to the "absolutely banal man" who is tempted to evil by the powers of right and law (Agamben, 1993; 32); we have the 'falsification of all production' and the 'complete control of social memory and social communication'; or the "absolute systematic falsification of truth, of language and opinion […] without escape" (Agamben, 2002). Because it is precisely in such a critique that one would expect Agamben to not merely acknowledge the "complete triumph of the spectacle" but to explain the relation between the spectacle and what 'positive possibility' there remains within conditions of alienation that might be used to counter these conditions. There would seem to be an enormous gap between Agamben's critique of this society and the state of simply being that continues to be a possibility. This

state of death that Agamben would argue now colonizes all structures of power and that eradicates any experience of democracy might well still possess some kind of antagonistic clash, as Toni Negri argues, but it is difficult for us to see just where resistance to this state might emerge (Negri, 2003: 1). Certainly, Agamben calls for making all residents of extraterritorial space (which would include both citizen and non-citizen) as existing within a position of exodus or refuge, and in this we can perhaps see some basis for resistance. A position of refuge, he argues, would be able to "act back onto" territories as states and 'perforate' and alter' them such that "the citizen would be able to recognize the refugee that he or she is" (Agamben, 2000: 26). In this Agamben directs our attention usefully to the importance of the refugee today – both in terms of the plight of refugees and their presence in questioning any assumption about citizen rights, and also in placing the refugee, or "denizen" as he says using Tomas Hammar's term, as the central figure of a potential politics (Agamben, 2000: 23). But

he also reduces the concepts of right and the values they involve to forms of State control, eliding all difference within right and thereby terminating an understanding of the reasons for a disjuncture between legality and morality and of an existing separation of rights from the ideal of ethicality, in which liberation and dignity exist to be realized beyond any form of contract. . It is always possible to suppose that a self-fashioned potentiality is simply available to us, and in some senses it is, but not because a type of theory merely posits the social and the historical as completely open to our manipulation or 'perforation'. Likewise, we cannot merely assume that changing 'forms of life' necessarily amount to types of refusal. Such a claim would only make sense if it were put forward on the basis of an appreciation of an impulse to freedom from particular types of constraint and oppression. It would also require a sense of how this impulse takes place within a variety of conditions, some of which might be easily altered and some of which might not. In the absence of an engaged sense of what this impulse means, and of the context in which elements of freedom and unfreedom do battle, it is impossible to speculate on the nature of the subjectivity or potentiality which might be emerging or which might be in stages of decomposition.

Agamben merely presumes that a strategy by which we all identify as refugees will renew a politics and thereby end the current plight of the refugee, as if no other reality impinges on this identification. This is also assumed on the basis that the State – in Agamben's theorizing, the abstraction of an all-encompassing, leviathan State – is equally, readily and easily liable to perforation.

This contradiction is indicative of a wider problem where what we encounter is a form of critique that is oddly inappropriate to the type of issue it addresses. . Much can be said in criticism of the doctrine of right, of the limited nature of the understanding of freedom and rights in documents on rights, of the assumption of the place of citizen rights as the locus of the fundamental rights of the human, and most significantly, the absence of any sense of the undetermined nature of what being might mean. But what

must be stated, I feel, is that it would be a serious impoverishment of the ethical problem that we currently face to deny any potential value of rights in carrying forth traces of an impetus towards human dignity, of the ideals of freedom and equality, and to thus reduce rights to what might be termed an absolute politics. Rights cannot be reduced to citizenship rights as if the ideas of rights and citizenship are coterminous. What most critically needs to be understood is, firstly, why values of freedom and equality have such a limited and fragile place within conditions of such inordinate legalism, and, secondly, what the absence of freedom, which the cause of human rights inevitably suggests, means for the installation of any such rights. Without such an understanding we are left with a gestural politics that contains a posture of radicalism but one

which fails to connect the aspirations of those who are struggling to achieve elementary rights with a vision of a world that could accord them a degree of dignity.

Alt-Fails Agambens solutions are utopian and collapse into totalitarianism Kohn 2k6 (Margaret, assistant professor of political science @ the u of florida, Bare Life and the Limits of Law, Theory and Event 9.2) Is there an alternative to this nexus of anomie and nomos produced by the state of exception? Agamben invokes genealogy and politics as two interrelated avenues of struggle. According to Agamben, "To show law in its nonrelation to life and life in its nonrelation to law means to open a space between them for human action, which once claimed for itself the name of 'politics'." (88) In a move reminiscent of Foucault,

Agamben suggests that breaking the discursive lock on dominant ways of seeing, or more precisely not seeing, sovereign power is the only way to disrupt its hegemonic effects. Agamben clearly hopes that his theoretical analysis could contribute to the political struggle against authoritarianism, yet he only offers tantalizingly abstract hints about how this might work. Beyond the typical academic conceit that theoretical work is a decisive element of political struggle, Agamben seems to embrace a utopianism that provides little guidance for political action. He imagines, "One day humanity will play with law just as children play with disused objects, not in order to restore them to their canonical use but to free them from it for good." (64) More troubling is his messianic suggestion that "this studious play" will usher in a form of justice that cannot be made juridical. Agamben might do well to consider Hannah Arendt's warning that the belief in justice unmediated by law was one of the characteristics of totalitarianism. It might seem unfair to focus too much attention on Agamben's fairly brief discussion of alternatives to the sovereignty-exception-law nexus, but it is precisely those sections that reveal the flaws in his analysis. It also brings us back to our original question about how to resist the authoritarian implications of the state of exception without falling into the liberal trap of calling for more law. For

Agamben, the problem with the "rule of law" response to the war on terrorism is that it ignores the way that the law is fundamentally implicated in the project of sovereignty with its corollary logic of exception. Yet the solution that he endorses reflects a similar blindness. Writing in his utopian-mystical mode, he insists, "the only truly political action, however, is that which severs the nexus between violence and law."(88) Thus Agamben, in spite of all of his theoretical sophistication, ultimately falls into the trap of hoping that politics can be liberated from law, at least the law tied to violence and the demarcating project of sovereignty.

Must Engage Policy To Change Policy involvement is inevitable- we need to proactively engage in policy making for movements to be effective Makani 2k Themba-Nixon, Executive Director of The Praxis Project, Former California Staffer, Colorlines. Oakland: Jul 31, 2000.Vol.3, Iss. 2; pg. 12 The flourish and passion with which she made the distinction said everything. Policy is for wonks, sell-out politicians, and ivory-tower eggheads. Organizing is what real, grassroots people do. Common as it may be, this distinction doesn't bear out in the real world. Policy is more than law. It is any written agreement (formal or informal) that specifies how an institution, governing body, or community will address shared problems or attain shared goals. It spells out the terms and the consequences of these agreements and is the

policies reflect the political agenda of powerful elites. Yet, policy can be a force for change-especially when we bring our base and community organizing into the process. In essence, policies are the codification of power relationships and resource allocation. Policies are the rules of the world we live in. Changing the world means changing the rules. So, if organizing is about changing the rules and building power, how can organizing be separated from policies? Can we really speak truth to power, fight the right, stop corporate abuses, or win racial justice without contesting the rules and the rulers, the policies and the policymakers? The answer is no-and double no for people of color. codification of the body's values-as represented by those present in the policymaking process. Given who's usually present, most

Today, racism subtly dominates nearly every aspect of policymaking. From ballot propositions to city funding priorities, policy is increasingly about the control, de-funding, and disfranchisement of communities of color. What Do We Stand For? Take the public conversation about welfare reform, for example. Most of us know it isn't really about putting people to work. The right's message was framed around racial stereotypes of lazy, cheating "welfare queens" whose poverty was "cultural." But the new welfare policy was about moving billions of dollars in individual cash payments and direct services from welfare recipients to other, more powerful, social actors. Many

of us were too busy to tune into the welfare policy drama in Washington, only to find it washed up right on our doorsteps. Our members are suffering from workfare policies, new regulations, and cutoffs. Families who were barely getting by under the old rules are being pushed over the edge by the new policies. Policy doesn't get more relevant than this. And so we got involved in policy-as defense. Yet we have to do more than block their punches. We have to start the fight with initiatives of our own. Those who do are finding offense a bit more fun than defense alone. Living wage ordinances, youth development initiatives, even gun control and alcohol and tobacco policies are finding their way onto the public agenda, thanks to focused community organizing that leverages power for community-driven initiatives. - Over

600 local policies have been passed to regulate the tobacco industry. Local 100 gun control and violence prevention policies have been enacted since 1991. - Milwaukee, Boston, and Oakland are among the cities that have passed living wage ordinances: local laws that guarantee higher than minimum wages for workers, coalitions have taken the lead by writing ordinances that address local problems and organizing broad support for them. - Nearly

usually set as the minimum needed to keep a family of four above poverty. These are just a few of the examples that demonstrate how

local policy advocacy has made inroads in areas where positive national policy had been stalled by conservatives. Increasingly, the local policy arena is where the action is and where activists are finding success. Of course, corporate interests-which are usually the target of these policies-are gearing up in defense. Tactics include front groups, organizing for

economic pressure, and the tried and true: cold, hard cash. Despite these barriers, grassroots organizing can be very effective at the smaller scale of local politics. At the local level, we have greater access to elected officials and officials have a greater reliance on their constituents for reelection. For example, getting 400 people to show up at city hall in just about any city in the U.S. is quite impressive. On the other hand, 400 people at the state house or the Congress would have a less significant impact. Add to that the fact that all 400 people at city hall are usually constituents, and the impact is even greater. Recent trends in government underscore the importance of local policy. Congress has enacted a series of measures devolving significant power to state and local government. Welfare, health care, and the regulation of food and drinking water safety are among the areas where states and localities now have greater rule. Devolution has some negative consequences to be sure. History has taught us that, for social services and civil rights in particular, the lack of clear federal standards and mechanisms for accountability lead to uneven enforcement and even discriminatory implementation of policies. Still, there

are real opportunities for advancing progressive initiatives in this more localized environment. Greater local control can mean greater community power to shape and implement important social policies that were heretofore out of reach. To do so will require careful attention to the mechanics of local policymaking and a clear blueprint of what we stand for. Getting It in Writing Much of the work of framing what we stand for takes place in the shaping of demands. By getting into the policy arena in a proactive manner, we can take our demands to the next level. Our demands can become law, with real consequences if the agreement is broken. After all the organizing, press work, and effort, a group should leave a decisionmaker with more than a handshake and his

or her word. Of course,

this work requires

a certain amount of

interaction with "the suits," as well as struggles with the it's worth demanding, it's worth

bureaucracy, the technical language, and the all-too-common resistance by decisionmakers. Still, if

having in writing-whether as law, regulation, or internal policy. From ballot initiatives on rent control to laws requiring worker protections, organizers are leveraging their power into written policies that are making a real difference in their communities. Of course, policy work is just one tool in our organizing arsenal, but it is a tool we simply can't afford to ignore. Making policy work an integral part of organizing will require a certain amount of retrofitting. We will need to develop the capacity to translate our information, data, and experience into stories that are designed to affect the public conversation. Perhaps most important, we will need to move beyond fighting problems and on to framing solutions that bring

A2: Data mining causes corruption

Data Mining can prevent government corruption Jamie Yap, January 31, 2013, “Big-data analytics can serve as checks and balances”, ZDNET, http://www.zdnet.com/big-data-analytics-can-serve-as-checks-and-balances-7000010611/, Date Accessed: July 23, 2013 The ability of big-data collection and analysis can serve as checks and balances on government bodies, ensuring agencies are both administratively efficient and transparent as public service providers to citizens.¶ An underlying force of big data is the move from structured to unstructured information such as socialmedia posts, photographs, and video clips. Unless social-media data is controlled or censored by the government, issues of national interest getting discussed and circulated on social networks can serve as checks and balances on a country's leaders, said David Menninger, head of business development and strategy at Greenplum, the big-data analytics provider owned by EMC.¶ "For example, say there's higher occurrence of a type of complaint about aging infrastructure, that creates a checks and balance for the authorities," he said at an interview Thursday. Menninger, who is based in the US, was in Singapore to meet company executives and business partners.¶ Gathering and analyzing all that data enables governments to better serve the people. They know what critical issues need immediate attention, where to concentrate their resources, and spend money where it is most needed to do the most good, he noted.¶ Going a step farther, big-data analytics can also be used to maintain transparency and fight potential graft in governments, Menninger pointed out.

Neg

Constitutionality

Digital Surveillance Violates 4th Amendment Taking away U.S. citizens’ digital privacy in pursuit of national security violates the 4th amendment. Donohue Laura K. Donohue, 2013 [Professor of Law at Georgetown Law and the Director of Georgetown’s Center on National Security and the Law] “NSA Surveillance may be legal – but it’s unconstitutional,” The Washington Post, June 21st, 2013. SM writes: The National Security Agency’s recently revealed surveillance programs undermine the purpose of the Foreign Intelligence Surveillance Act, which was established to prevent this kind of overreach. They violate the Fourth Amendment’s guarantee against unreasonable search and seizure. And they underscore the dangers of growing executive power. The intelligence community has a history of overreaching in the name of national security. In the mid-1970s, it came to light that, since the 1940s, the NSA had been collecting international telegraphic traffic from companies, in the process obtaining millions of Americans’ telegrams that were unrelated to foreign targets. From 1940 to 1973, the CIA and the FBI engaged in covert mail-opening programs that violated laws prohibiting the interception or opening of mail. The agencies also conducted warrantless “surreptitious entries,” breaking into targets’ offices and homes to photocopy or steal business records and personal documents. The Army Security Agency intercepted domestic radio communications. And the Army’s CONUS program placed more than 100,000 people under surveillance, including lawmakers and civil rights leaders. After an extensive investigation of the agencies’ actions, Congress passed the 1978 Foreign Intelligence Surveillance Act (FISA) to limit sweeping collection of intelligence and create rigorous oversight. But 35 years later, the NSA is using this law and its subsequent amendments as legal grounds to run even more invasive programs than those that gave rise to the statute. We’ve learned that in April, the Foreign Intelligence Surveillance Court (FISC) ordered Verizon to provide information on calls made by each subscriber over a three-month period. Over the past seven years, similar orders have been served continuously on AT&T, Sprint and other telecommunications providers. Another program, PRISM, disclosed by the Guardian and The Washington Post, allows the NSA and the FBI to obtain online data including emails, photographs, documents and connection logs. The information that can be assembled about any one person — much less organizations, social networks and entire communities — is staggering: What we do, think and believe. The government defends the programs’ legality, saying they comply with FISA and its amendments. It [would] may be right, but only because FISA has ceased to [be] provide a meaningful constraint. Under the traditional FISA, if the government wants to conduct electronic surveillance, it must make a classified application to a special court, identitying or describing the target. It must demonstrate probable cause that the target is a foreign power or an agent thereof, and that the facilities to be monitored will be used by the target. In 2008, Congress added section 702 to the statute, allowing the government to use electronic surveillance to collect foreign intelligence on non-U.S. persons it reasonably believes are abroad, without a court order for each target. A U.S. citizen may not intentionally be targeted. To the extent that the FISC sanctioned PRISM, it may be consistent with the law. But it

is disingenuous to suggest that millions of Americans’ e-mails, photographs and documents are “incidental” to an investigation targeting foreigners overseas. The telephony metadata program raises similar concerns. FISA did not originally envision the government accessing records. Following the 1995 Oklahoma City bombing, Congress allowed applications for obtaining records from certain kinds of businesses. In 2001, lawmakers further expanded FISA to give the government access to any business or personal records. Under section 215 of the Patriot Act, the government no longer has to prove that the target is a foreign power. It need only state that the records are sought as part of an investigation to protect against terrorism or clandestine intelligence. This means that FISA can now be used to gather records concerning individuals who are neither the target of any investigation nor an agent of a foreign power. Entire databases — such as telephony metadata — can be obtained, as long as an authorized investigation exists. Congress didn’t pass Section 215 to allow for the

wholesale collection of information. As Rep. F. James Sensenbrenner Jr. (R-Wis.), who helped draft the statute, wrote in the Guardian: “Congress intended to allow the intelligence communities to access targeted information for specific investigations. How can every call that every American makes or receives be relevant to a specific investigation?” As a constitutional matter, the Supreme Court has long held that, where an individual has a reasonable expectation of privacy, search and seizure may occur only once the government has obtained a warrant, supported by probable cause and issued by a judge. The warrant must specify the places to be searched and items to be seized. There are exceptions to the warrant requirement. In 1979 the court held that the use of a pen register to record numbers dialed from someone’s home was not a search. The court suggested that people who disclose their communications to others assume the risk that law enforcement may obtain the information. More than three decades later, digitization and the explosion of social-network technology have changed the calculus. In the ordinary course of life, third parties obtain massive amounts of information about us that, when analyzed, have much deeper implications for our privacy than before. As for Section 702 of FISA,

the Supreme Court has held that the Fourth Amendment does not protect foreigners from searches conducted abroad. But it has never recognized a foreign intelligence exception to the warrant

requirement when foreign-targeted searches result in the collection of vast stores of citizens’ communications. Americans reasonably expect that their movements, communications and decisions will not be recorded and analyzed by the government. A majority of the Supreme Court seems to agree . Last year, the court considered a case involving 28-day GPS surveillance. Justice Samuel Alito suggested that in most criminal investigations, long-term monitoring “impinges on expectations of privacy.” Justice Sonia Sotomayor recognized that following a person’s movements “reflects a wealth of detail about her familial, political, professional, religious, and sexual associations.” [The FISC is supposed to operate as a check. But it is a secret court, notorious for its low rate of denial. From 1979 to 2002, it did not reject a single application]. Over the past five years, out of nearly 8,600 applications, only two have been denied. Congress has an opportunity to create more effective checks on executive power. It could withdraw Sections 215 and 702 and introduce new measures to regulate intelligence collection and analysis. There are many options. James Madison put it best: “In framing a government which is to be administered by men over men, the great difficulty lies in this: you must first enable the government to control the governed; and in the next place oblige it to control itself.”

Privacy

Privacy is a Human Right Privacy is a human right – International community agrees David Banisar of the Electronic Privacy Information Center, 2000. “Privacy And Human Rights”. http://gilc.org/privacy/survey/intro.html. Date Accessed: 7/22/13 Privacy is a fundamental human right recognized in the UN Declaration of Human Rights, the International Convenant on Civil and Political Rights and in many other international and regional treaties. Privacy underpins human dignity and other key values such as freedom of association and freedom of speech. It has become one of the most important human rights issues of the modern age. The publication of this report reflects the growing importance, diversity and complexity of this fundamental right.¶ This report provides details of the state of privacy in fifty countries from around the world. It outlines the constitutional and legal conditions of privacy protection, and summarizes important issues and events relating to privacy and surveillance.¶ Nearly every country in the world recognizes a right of privacy explicitly in their Constitution. At a minimum, these provisions include rights of inviolability of the home and secrecy of communications. Most recently-written Constitutions such as South Africa's and Hungary's include specific rights to access and control one's personal information.¶

Privacy is a Natural Right Privacy is a natural right which is grounded in the rights of freedom and autonomy. J. J. BRITZ, prof at University of Pretoria, 1996 (“THE CONCEPT OF PRIVACY”, http://web.simmons.edu/~chen/nit/NIT'96/96-025-Britz.html)

Privacy can be defined as an individual condition of life characterized by exclusion from publicity (Neetling et al., 1996, p. 36). The concept follows from the right to be left alone (Stair, 1992, p. 635; Shank, 1986, p. 12)1 . Shank (1986, p. 13) states that such a perception of privacy set the course for passing of privacy laws in the United States for the ninety years that followed. As such privacy could be regarded as a natural right which provides the foundation for the legal right. The right to privacy is therefore protected under private law.¶ The legal right to privacy is constitutionally protected in most democratic societies. This constitutional right is expressed in a variety of legislative forms. Examples include the Privacy Act (1974) in the USA, the proposed Open Democracy Act in South Africa (1996) and the Data Protection Act in England. During 1994 Australia also accepted a Privacy Charter containing 18 privacy principles which describe the right of a citizen concerning personal privacy as effected by handling of information by the state (Collier, 1994, p. 44-45). The Organization for Economic and Coordination and Development (OECD) also accepted in 1980 the Guidelines for the Protection of Privacy and Transborder Flow of Personal Data (Collier, 1994, p. 41).¶ Privacy is an important right because it is a necessary condition for other rights such as freedom and personal autonomy. There is thus a relationship between privacy, freedom and human dignity. Respecting a person's privacy is to acknowledge such a person's right to freedom and to recognize that individual as an autonomous human being.

Right to Privacy Exists – Constitution Proves (1/2) The constitution has the right to privacy engrained inside of it. Ralph F. Gaebler, professor of law at Indiana state university, “Is There a Natural Law Right to Privacy?” DoP: 1992, THE AMERICAN JOURNAL OF JURISPRUDENCE, http://www.repository.law.indiana.edu/cgi/viewcontent.cgi?article=1659&context=facpub Walter Murphy has recently argued that "the nature of the American¶ Constitution requires recognition of a thick and powerful right to be¶ let alone."' What is more, he believes this right is so deeply embedded¶ in the Constitution that society cannot remove it, even through¶ formally permissible means, such as amendment, without abrogating¶ the Constitution altogether.¶ In general, there is nothing particularly surprising about the claim¶ that the Constitution includes a right of privacy. And in Murphy's¶ case, in particular, the claim rests upon thirty years of scholarship.¶ Viewed as a whole, this body of work looms as one of the more¶ passionate, and at the same time formidably coherent contributions¶ to the literature of judicial politics. 2 As developed in his many articles¶ and books, Murphy's claim for the existence of a right of privacy¶ emerges from his conviction that, since all Constitutional decision makers must adopt a judicial philosophy with substantive¶ consequences, academic critics, in judging the judges, must in fairness do the same.' His is essentially a pragmatic claim, justified on the¶ ground that it constitutes the best constitutional policy in a world of¶ judicial politics where many legitimate and contradictory claims are¶ possible

The constitution implies the right to privacy through the as citizens bring in the natural right for a zone of autonomy Ralph F. Gaebler, professor of law at Indiana state university, “Is There a Natural Law Right to Privacy?” DoP: 1992, THE AMERICAN JOURNAL OF JURISPRUDENCE, http://www.repository.law.indiana.edu/cgi/viewcontent.cgi?article=1659&context=facpub Murphy makes two distinct arguments to support his conclusion¶ that the Constitution must be interpreted to include a broad right of¶ privacy. He describes the first argument as based on "constitutional¶ content." It begins with the assertion that the American Constitution¶ rests upon, or possibly even includes, two political theories, which¶ he calls "constitutionalism" and "representational democracy."¶ Constitutionalism denotes the view that the Constitution primarily¶ embodies personal liberties. Representational democracy denotes the¶ view that the Constitution primarily embodies a structure of¶ government based on popular sovereignty. Although poised in¶ opposition to each other, both of these sub-texts are necessary to¶ make sense of the Constitution, or as Murphy puts it, to render the¶ document more than "the political version of a seed catalogue." In¶ other words, the Constitution is a balancing act; it employs the device of checks and counter-checks not only in its provisions for the¶ structure of government, but even in its philosophical outlook. However, constitutionalism is clearly the more important philosophy¶ of the two, at least for the purpose of establishing the right of¶ privacy.' 2 "The essence of constitutionalism," according to Murphy,¶ "is that citizens bring rights with them into societ y." These rights¶ comprise a "zone of autonomy," within which "each individual¶ should be immune from governmental regulation, even regulation¶ that an overwhelming majority of society considers wise and just."¶ Thus, the right to privacy is implied by the political theory of¶ constitutionalism, which in turn is part of the Constitution. Murphy¶ also argues that the right of privacy is implied by the theory of¶ representational democracy, a claim that I will take up later.

Right to Privacy Exists – Constitution Proves (2/2) The constitution provides a right to privacy by the use of wording such as free and autonomous Ralph F. Gaebler, professor of law at Indiana state university, “Is There a Natural Law Right to Privacy?” DoP: 1992, THE AMERICAN JOURNAL OF JURISPRUDENCE, http://www.repository.law.indiana.edu/cgi/viewcontent.cgi?article=1659&context=facpub Murphy's second argument, which he describes as based on¶ "constitutional function," is equally direct. It begins with his¶ commitment to the ideas that the

Constitution is a "binding statement¶ of a people's aspirations for themselves and their nation." In Constitution is not merely a charter for government, but¶ serves as the foundation of a moral community as well. From this¶ premise Murphy argues that the Constitution must include a right of¶ privacy because "the notion of a people as free and autonomous as¶ they can be in an interdependent world is and has been among the¶ values, goals, and aspirations of U.S. society. "¶ other¶ words, the

.Murphy finds evidence of the Constitution's "aspirational" character¶ in its Preamble and in the Declaration of Independence, which he¶ also regards as a foundational document. Thus, Murphy really regards¶ the U.S. as bound by a constitution, that includes the Constitution¶ of 1787, as amended, the Declaration of Independence, the two¶ political philosophies already mentioned, and possibly other¶ foundational documents or ideas as well.' 3 This is not to say that we can understand Murphy's argument simply by reading, phrase by¶ phrase, his admittedly expanded constitution. In a sense, this argument¶ denies that the Constitution can be read at all; rather, it is a¶ continuing compact, some of whose evidence is composed of written¶ documents.

Right to Privacy Exists – Private Property and Artistic Creation Prove Rejection of privacy is a violation of human dignity as it publishes information absent the consent of the victim. Edward j. Bloustein, prof of law at nyu law; 1964 (“Privacy”, December 1964, pg 971, http://courses.ischool.berkeley.edu/i205/s10/readings/week11/bloustein-privacy.pdf The most significant indication of the interest they sought¶ to protect, however, is in their statement that "the principle¶ which protects personal writings and all other personal productions ...against publication in any form is in reality not the¶ principle of private property, but that of inviolate pcrsonality."I¶ I take the principle of "inviolate personality" to posit the individual's independence, dignity and integrity; it defines man's¶ essence as a unique and self-determining being. It is because our¶ Western ethico-religious tradition posits such dignity and independence of will in the individual that the common law secures¶ to a man 'literary and artistic property"-the right to determine¶ "to what extent his thoughts, sentiments, emotions shall be communicated to others." 4 The literary and artistic property¶ cases led Warren and Brandeis to the concept of privacy because, for them, it would have been inconsistent with a belief¶ in man's individual dignity and worth to refuse him the right to¶ determine whether his artistic and literary efforts should be¶ published to the world. He would be less of a man, less of a¶ master over his own destiny, were he without this right.¶ Thus, I believe that what provoked Warren and Brandeis¶ to write their article was a fear that a rampant press feeding on¶ the stuff of private life would destroy individual dignity and integrity and emasculate individual freedom and independence. If¶ this is so, Dean Prosser's analysis of privacy stands clearly at¶ odds with "the most influential law review article ever published,"¶ one which gave rise to a "new tort,"5 not merely to a fancy name¶ for "old torts."

Privacy is a Social Good We ought to protect Privacy as a social good rather than an individual right. DANIEL J. SOLOVE, 2002, Assistant Professor, Seton Hall Law School, DIGITAL DOSSIERS AND THE DISSIPATION OF FOURTH AMENDMENT PRIVACY, http://www-bcf.usc.edu/~usclrev/pdf/075502.pdf

Protecting privacy through an architecture of power differs from protecting it as an individual right . Privacy is often viewed as an individual right.185 It is seen as an individual possession, and its value is defined in terms of its worth to the individual. This view is severely flawed. John Dewey astutely critiqued the “conception of the individual as something given, complete in itself, and of liberty as a ready-made possession of the individual, only needing the removal of external restrictions in order to manifest itself.”186 According to Dewey, the

individual is inextricably connected to society,187 and rights are not immutable possessions of individuals, but are instrumental in light of “the contribution they make to the welfare of the community.”188 The problem with viewing rights in purely individualistic terms is that it pits individual rights against the greater good of the community, with the interests of society often winning out because of their paramount importance when measured against one individual’s freedom In contrast, an architecture of power protects privacy differently and is based on a different conception of privacy. Privacy is not merely a right possessed by individuals, but is a form of freedom built into the social structure. It is thus an issue about the common good as much as it is about individual rights. It is an issue about social architecture, about the relationships that form the structure of our society.

Privacy Outweighs National Security We should promote supporting privacy over the national security interests, or a hybrid of both. We must err on the side of privacy because governments are likely to abuse their power. Lisa Nelson, 2004, University of Pittsburg, Privacy and Technology: Reconsidering a Crucial Public Policy Debate in the Post-September 11 Era, Public Administration Review,

The origin of liberty in democratic theory is best de- scribed by John Stuart Mill as "the civil or social liberty which exists within the nature and limits of the power which can be legitimately exercised by society over the individual" (Mill 1956, 2). As Mill explains, the balance between lib- erty and authority is struck by guaranteeing certain immu- nities that cannot be violated by those holding political authority. If violated, those in positions of authority have breached their duty as leaders. As a secondary check on political authority, constitutional checks that are established by the consent of the community are a necessary condition of the acts of governing power (Mill 1956, 4). In

practice, this means the exercise of political authority is mediated by the immunities of the citizenry and the consent of the governed. The liberty interest in privacy is construed similarly. To paraphrase Justice Robert H. Jackson in his concurring opinion on the 1952 Youngstown Sheet and Tube Co. v. Sawyer (343 U.S. 579) decision, "the Fourth Amendment protects more than privacy; it ensures that governmental invasions of individual privacy are based upon rules estab- lished by the people, rules our rulers must follow in order to engage in surveillance." Jackson's description of pri- vacy mirrors that of Mill. The conditions of our liberty interest in privacy are created by the immunities of the citizenry and the consent of the governed. Each serves as a limit on political authority. Yet, the analysis is not quite so simple. The equilibrium of this balance between political authority and the liberty interests of individuals is changed in the face of harm. As Mill explains, government should be established on the harm principle: "That the sole end for which mankind is warranted, individually or collec- tively, in interfering with the liberty of action of any of their number, is self-protection. That the only purpose for which power can be rightfully exercised over any member of a civilized community, against his will, is to prevent harm to others" (Mill 1956, 4). The authority to interfere with a member of a civilized community in defense of liberty occurs when there is a need to prevent harm. In fact, as Mill argues, "it is

one of the undisputed functions of government to take precau- tions against crime before it has been committed, as well as to detect and punish it afterwards" (Mill 1956, 116). Liberty, augmented in our constitutional framework by the principles of privacy, is mediated by the exercise of political authority to protect against harm. What is left unanswered is the type and form of political authority that is ideal for preserving our liberty interests in privacy. In theory, the answer seems quite simple: The exercise of political authority is justified when the political will nec- essary for the prevention of harm is warranted. Yet, as a practical matter, the perception of harm-and the justifi- cation of political authority necessary to combat it-is often problematic. As Mill warns, "the preventative func- tion of government, however, is far more liable to be abused, at the prejudice of liberty, than the punitive func- tion" (Mill 1956, 116). This concern is particularly acute in the post-September 11 environment because it is not only the assertion of political authority, but also the architecture of it that potentially threatens our liberty interest in privacy.

Far-reach- ing regulations that enable the gathering and sharing of information, the concentration of power in the hands of the intelligence community, and the extensive power granted to the executive branch in the name of the "war on terrorism" is seen as altering the structural balance between political authority and social and civil liberties at the expense of democratic principles. The call for increased political authority to protect privacy in the wake of the information age, however, faces similar criticisms. Here, it is argued that under the limits of the Constitution, there is insufficient legal basis for the exercise of political author- ity to protect privacy. In

this sense, protective legislation is seen as potentially overstepping the appropriate constitu- tional boundaries of political authority and squelching free enterprise and innovation in the information age. Though it seems to be at the other end of the spectrum, the question of whether the Constitution allows for the power of government to adopt and enforce laws to protect private information from intrusion by the private sector is not unlike the question of whether the events of Septem- ber 11 justify increased intelligence gathering and surveil- lance. Each is a question of enhanced political authority and its relationship to the liberty interests of privacy.

Yet, the answer is not so easily discerned from either constitu- tional doctrine or public sentiments. Rather, the public policy debate must account for the interplay between each, because one is not separate from the other. Interestingly, the war on terror coincides with the ac- celeration of the information age and, as a result, affects the direction of policy debates regarding each. Perhaps the war on terror seems less intrusive and less threatening to our privacy because our notions of privacy have been al- tered in an unprecedented age of information. Surveillance is becoming commonplace, frequent, and innocuous. More- over, the information age has altered the traditional physi- cal divide between the public and the private with the age of the Interet and other technologies. Physical locale is no longer the definitional quality of privacy, and, as a re- sult, the traditional demarcation of privacy is no longer apt in either legal doctrine or societal perceptions. Similarly, the events of September 11 and the subsequent prominence of surveillance and information gathering may have caused us to be overly sensitized to information sharing in both the government and private sectors. The events of September 11 and the rise of the informa- tion age challenge the previous balance between political authority and liberty, but it does not follow that a new bal- ance cannot be struck. Yet,

it is necessary to move the de- bate beyond its current dichotomy, which tends to view the rise of technology and the information age as intruding on privacy. The dichotomy is not helpful because it is im- possible to eliminate the specter of terrorism and turn back the clock on the information age. Instead, each is a new factor to be weighed in the quest for a balance between liberty and the exercise of political authority. For this, let us return to Mill. As Mill advocates, the balance is secured by the guar- antee of certain immunities that cannot be violated by those holding political authority. As a secondary check on po- litical authority, constitutional checks that are established by the consent of the community are a necessary condition for the acts of governing power. Thus, as a point of depar- ture, the proper course of policy development to protect privacy while fostering the appropriate exercise of politi- cal authority requires us to turn to the necessary immuni- ties, which cannot be trammeled, and to the constitutional checks that must remain intact

Privacy Impacts: Totalitarianism Violations of privacy are the basis for governmental totalitarianism- the German Democratic Republic proves. Ron Watson, Department of Political Science, Washington University., “The Ethics of Domestic Government Spying” March 2013¶ http://rewatson.wustl.edu/The%20Ethics%20of%20Domestic%20Government%20Spying.pdf Although states can hardly do without spies if they wish to remain secure, there is, of¶ course, a darker, more sinister picture of government spying. This darker picture is one of¶ the

government using spying to control every aspect of people's lives, compelling them to¶ act and think only in ways sanctioned by the state. Nowhere is this picture painted more¶ vividly than in Orwell's 1984. Winston, the protagonist, remarks:¶ There was of course no way of knowing whether you were being watched at any¶ given moment. How often, or on what system, the Thought Police plugged in on¶ any wire was guesswork. It was even conceivable that they watched everybody¶ all the time . . . You had to live { did live, from habit that became instinct { in the¶ assumption that every sound you made was overheard, and, except in darkness,¶ every movement scrutinized. (Orwell 2007, 3)¶ This darker picture of spying cannot be dismissed as unrealistic, merely a dystopian night-¶ mare. States have often controlled and continue to control their citizens with spying.¶ Nowhere was this kind of control more complete than in the German Democratic Republic ¶ (GDR) during the Cold War, however. Historian Hubertus Knabe summarizes the control¶ exacted by the GDR's secret police (Stasi) as follows: \Precisely the hidden, but for every¶ citizen tangible omni-presence of the Stasi, damaged the very basic conditions for individual¶ and societal creativity and development: sense of one's self, trust, spontaneity." (Bruce¶ 2010, 12)

Violation of privacy leads to a totalitarian state Daniel J. Solove. Associate professor of law at the George Washington University Law School."The Digital Person: Technology And Privacy In The Information Age"New York: New York University Press, 2004. Orwell's Totalitarian World. Journalists, politicians, and jurists often describe the

problem created by databases with the metaphor of Big Brother--the harrowing totalitarian government portrayed in George Orwell's 1984. Big Brother is an allknowing, constantly vigilant government that regulates every aspect of one's existence. In every corner are posters of an enormous face, with "eyes [that] follow you about when you move" and the caption "BIG BROTHER IS WATCHING YOU." ¶ Big Brother demands complete obedience from its citizens and controls all aspects of their lives. It constructs the language, rewrites the history, purges its critics, indoctrinates the population, burns books, and obliterates all disagreeable relics from the past. Big Brother's

goal is uniformity and complete discipline, and it attempts to police people to an innermost thoughts. Any trace of individualism is quickly suffocated.¶ This terrifying totalitarian state achieves its control by targeting the private life, employing various techniques of power to eliminate any sense of privacy. Big Brother views solitude as dangerous. Its techniques of power are predominantly methods of surveillance. Big Brother is constantly monitoring and spying; uniformed patrols linger on street corners; helicopters hover in the skies, poised to peer into windows. The primary surveillance tool is a device unrelenting degree--even their

called a "telescreen" which is installed into each house and apartment. The telescreen is a bilateral television--individuals can watch it, but it also enables Big Brother to watch them.¶

Privacy needs to be protected in order to retain a balance of power between parties DANIEL J. SOLOVE, 2002, Assistant Professor, Seton Hall Law School, DIGITAL DOSSIERS AND THE DISSIPATION OF FOURTH AMENDMENT PRIVACY, http://www-bcf.usc.edu/~usclrev/pdf/075502.pdf The dangers discussed above illustrate why privacy is integral to freedom in the modern state. Privacy

must be protected by establishing an architecture of power. The word “architecture” emphasizes that the protection of privacy must be

achieved through establishing a particular social structure that distributes power in our various relationships. Certain kinds of legal regulation can be readily analogized to architecture. Typically, we view architecture as the design of buildings and edifices. Buildings structure the way people feel and interact; they form and shape human relationships.182 Neal Kumar Katyal provides a fascinating account of how physical architecture—the way that neighborhoods and buildings are designed—can affect criminal behavior.183 Law

resembles architecture in many respects, especially in the way that certain forms of regulation affect social practices. If we think of law as creating a structure, we can better understand the different forms that modern regulation must take to protect liberty in the modern state. We have freedom not simply because we have rights. Our liberty is constructed by various regulatory structures that regulate the safety of the products we buy, the conditions of the apartments we live in, the way that companies must interact with us, and the sanctity of the environment, among others. An architecture of power protects a number of social practices of which privacy forms a significant part. It protects privacy by providing a regulatory structure that shapes relationships and safeguards individual liberties. At the center of my view is the fact that privacy is an aspect of social practices, which involve relationships with other people and entities.184 The need for privacy emerges from within a society, from the various social relationships that people form with each other, with private sector institutions, and with the government. We do not need privacy on a deserted island; rather, the

need for privacy is engendered by the existence of society, from the fact that we must live together. Relationships involve some balance of power between the parties. Power is not necessarily a zerosum good, where more power to one party necessarily means less to another. However, certain configurations of power in these relationships have profound effects on the scope and extent of freedom, democracy, equality, and other important values. In the modern world, we are increasingly finding ourselves in a new type of relationship with public and private institutions. These relationships are different because our institutions are more bureaucratic in nature. Bureaucracies

use more information and often exercise power over people through the use of personal data. Collecting and using personal information are having an intensifying influence on the effects of power in our social relationships. Therefore, protecting privacy is critical to governing these relationships, and consequently, to regulating the tone and tenor of life in the Information Age.

Privacy Impacts: Autonomy (1/2) In a world with spying we damage autonomy. Ron Watson, Department of Political Science, Washington University., “The Ethics of Domestic Government Spying” March 2013¶ http://rewatson.wustl.edu/The%20Ethics%20of%20Domestic%20Government%20Spying.pdf

So widespread intuitions support the principle of just cause for DGS. Let us turn to the¶ consequentialist case for just cause. The sophisticated consequentialist, I suggested in the ¶ introduction, would endorse a simple set of principles for DGS. But which principles would¶ she endorse? She obviously could not endorse a principle permitting all DGS, since the con-¶ sequences would be dire. If government agents were always at liberty to spy, people could¶ not develop stable expectations about where, when, and by whom they are being observed¶ without expending considerable resources on countermeasures, nor could they conceal their¶ personal information. People's enjoyment of goods requiring even a modicum of privacy¶ would rapidly diminish. People's autonomy

would be gravely threatened, since the pressures¶ to conform to social norms would be virtually unchecked. The liberal democratic culture of¶ free thought, free speech, and free action would be stifled.¶ Further, the bene ts of such a permissive policy would be minimal. Some grave harms¶ might be prevented. But permitting all spying is more likely to lead to ineffective and even¶ harmful spying. Spying for political gain and to protect bureaucratic turfs, for example,¶ would likely be rampant.

Privacy hinges on autonomy- it focuses on the control over limitations and confidentiality Casman Susanne, professor at UNLV “The Right to Privacy in Light of the Patriot Act and Social Contract Theory”, DoP: 5-1-2011 DoA: 7/15/13 http://digitalscholarship.unlv.edu Pg 17-18 It is differentiated from the total field by virtue of the fact the self is in ¶ some degree involved in excluding in some (or possibly all) circumstances, some (or ¶ possibly all), other persons from knowledge of the person’s possession. (Bates, 1964). ¶ Ruth

Gavison’s into three personal basic elements: Solitude: ¶ control over one’s interpersonal interactions with other people, Confidentiality: control ¶ over other people’s access to information about oneself, and Autonomy: control over ¶ what one does, i.e. freedom of will. (Boyle, 2003). ¶ What all of these definitions have in agreement is that privacy is about control, ¶ the amount we wish to divulge to those around us. They also have as part of their ¶ definition that privacy is both a moral and legal right. There is a fundamental aspect to ¶ human nature that defines privacy as a basic component. We assume that privacy is a ¶ moral right, rather than simply a constitutional or legal right. We assume that decomposition of privacy

privacy is a 18¶ fundamental right, rather than a right that can be explicated in terms of other fundamental ¶ rights (e.g. life, liberty, or property). (Alfino and Mayes, 2002). Privacy

is an elastic ¶ concept. The limited-access view proposes that privacy represents control over unwanted ¶ access, or alternatively, the regulation of, limitations on, or exemption from scrutiny, ¶ surveillance, or unwanted access. Privacy, as a whole or in part, represents control over ¶ transactions between person (s) and other(s), the ultimate aim of which is to enhance ¶ autonomy and /or minimize vulnerability. (Margulis, 2005).

Privacy protects Autonomy and individuality. Michael R. Curry, 1997, Department of Geography, University of California, “The Digital Individual and the Private Realm”, Annals of the Association of American Geographers, http://www.jstor.org/stable/2564405 Yet a bit of reflection suggests the difficulty with all of these positions. The difficulty is, put- ting the matter simply, that the

private realm performs important functions in the life of the individual and the group. It is in private that people have the opportunity to become individu- als in the sense that we think of the term. People, after all, become individuals in the public realm just by selectively making public certain things about themselves. Whether this is a matter of being selective about one's religious or political views, work history, education, income, or complexion, the important point is this: in a complex society, people adjust their public identities in ways that they believe best, and they develop those identities in more private settings.

Privacy Impacts: Autonomy (2/2) Invasions of privacy causes loss of autonomy. Ron Watson, Department of Political Science, Washington University., “The Ethics of Domestic Government Spying” March 2013¶ http://rewatson.wustl.edu/The%20Ethics%20of%20Domestic%20Government%20Spying.pdf This line of argument is supported by a further set of responses that people

might have¶ to learning how their government regulates domestic spying. When principles unfairly or¶ unequally target certain groups, they can demean, humiliate, and disrespect members of¶ those groups when they become public. Principles can also have these e ects if they signal¶ to people their chosen pursuits are unworthy, shameful, or depraved. People's self-respect¶ often depends on the existence of spaces for action free from government intrusion. Further,¶ when citizens worry that they are under covert observation by their government, there are a¶ range of activities that can become less enjoyable because they are less private. Finally, when¶ citizens suspect that the government spies on them, they may lose trust in their government¶ and its institutions

Privacy is needed in order to retain autonomy DANIEL J. SOLOVE, 2002, Assistant Professor, Seton Hall Law School, DIGITAL DOSSIERS AND THE DISSIPATION OF FOURTH AMENDMENT PRIVACY, http://www-bcf.usc.edu/~usclrev/pdf/075502.pdf

government information-gathering can severely constrain democracy and individual selfdetermination. Paul Schwartz illustrates this with his theory of “constitutive privacy.”99 According to Schwartz, privacy is essential to both individuals and communities: “[C]onstitutive privacy seeks to create boundaries about personal information to help the individual and define terms of life within the community.”100 As a form of regulation of information flow, privacy shapes “the extent to which certain actions or expressions of identity are encouraged or discouraged.”101 Schwartz contends that extensive government oversight over an individual’s activities can “corrupt individual decision making about the elements of one’s identity.” Further, inadequate protection of privacy threatens deliberative democracy by inhibiting people from engaging in democratic activities. This can occur unintentionally; even if government entities are not attempting to engage in social control, their activities can have collateral effects that harm democracy and self-determination.

Governmental digital surveillance impairs autonomy and self-governance. Oshana, Marina. Ph.D.: University of California, Davis. Social Philosophy & Policy Foundation. “How Much Should We Value Autonomy” 2003. Page 112-113. Date Accessed: 7/26/13. In less than normal circumstances, threats to the autonomy of deserving individuals can be great. Protections from the tyranny of majority sentiment, from encroachment upon civil liberties and constitutionally mandated rights, and from the infliction of loss, falsehood, duplicity, and the like take on a heightened urgency. In the aftermath of the December 7, 1941 attack on Pearl Harbor, Japanese-American citizens who had harmed no one were dispossessed of their autonomy and their property, and were treated in this way with the overwhelming approval of the United States populace. In

the aftermath of the unprecedented terrorist events of September 11, 2001, circumstances have been anything but normal. A rekindled patriotism has tempered the willingness of many American citizens to criticize openly, or even question, the political and military policies of the United States.

Restrictions that fetter individual autonomy have become commonplace and enjoy increasing public approval.29 There is heightened support for surveillance cameras on select street corners of select urban neighborhoods. Passenger profiling and personal searches at public transport facilities have increased. Investigations of personal computer use and electronic communication have intensified. Persons have been detained, incommunicado, for unspecified crimes. Although restrictions on autonomy are not always or principally privacy concerns, privacy protections are generally essential for autonomy. The aforementioned security measures, both overt and covert, yield, at a minimum, a decline in the level of civil liberty that most of us cherish and regard as crucial to unimpaired selfgovernance. (Detainment by federal authorities for weeks or months unambiguously assails the detainee’s exercise of self-government.)

Privacy Impacts: Human Dignity Violations of privacy lead to a violation of dignity as you ignore the rational calculations of that individual. Edward j. Bloustein, prof of law at nyu law; 1964 (“Privacy”, December 1964, pg 971, http://courses.ischool.berkeley.edu/i205/s10/readings/week11/bloustein-privacy.pdf The fundamental fact is that our Western culture defines¶ individuality as including [includes] the right to be free from certain types¶ of intrusions. This measure of personal isolation and personal¶ control over the conditions of its abandonment is of the very¶ essence of personal freedom and dignity, is part of what our¶ culture means by these concepts. A man whose home may be¶ entered at the will of another, whose conversation may be overheard at the will of another, whose marital and familial intimacies may be overseen at the will of another, is less of a man, has less human dignity, on that account. He who may intrude¶ upon another at will is the master of the other and, in fact, intrusion is a primary weapon of the tyrant.7 0¶ I contend that the gist of the wrong in the intrusion cases¶ is not the intentional infliction of mental distress but rather a¶ blow to human dignity, an assault on human personality. Eavesdropping and wiretapping, unwanted entry into another's home,¶ may be the occasion and cause of distress and embarrassment¶ but that is not what makes these acts of intrusion wrongful. They¶ are wrongful because they are demeaning of individuality, and¶ they are such whether or not they cause emotional trauma.

Privacy is a Prerequisite to Rights and Autonomy Privacy is essential to autonomy, protection of rights, and personal freedom Michael McFarland, President of Holy Cross University, 2000 (a computer scientist with extensive liberal arts teaching experience and a special interest in the intersection of technology and ethics, has served as the 31st president of the College of the Holy Cross since July 2000. "Why We Care about Privacy" http://www.scu.edu/ethics/practicing/focusareas/technology/internet/privacy/whycare-about-privacy.html) ¶ Privacy is important for a number of reasons. Some have to do with the consequences of not having privacy. People can be harmed or debilitated if there is no restriction on the public's access to and use of personal information. Other reasons are more fundamental, touching the essence of human personhood. Reverence for the human person as an end in itself and as an autonomous being requires respect for personal privacy. To lose control of one's personal information is in some measure to lose control of one's life and one's dignity. Therefore, even if privacy is not in itself a fundamental right, it is necessary to protect other fundamental rights.¶ The analysis of Rachels and Fried suggests a deeper and more fundamental issue: personal freedom. As Deborah Johnson has observed, "To recognize an individual as an autonomous being, an end in himself, entails letting that individual live his life as he chooses. Of course, there are limits to this, but one of the critical ways that an individual controls his life is by choosing with whom he will have relationships and what kind of relationships these will be.... Information mediates relationships. Thus when one cannot control who has information about one, one loses considerable autonomy."6¶ To lose control of personal information is to lose control of who we are and who we can be in relation to the rest of society. A normal person's social life is rich and varied, encompassing many different roles and relationships. Each requires a different persona, a different face. This does not necessarily entail deception, only that different aspects of the person are revealed in different roles. Control over personal information and how and to whom it is revealed, therefore, plays an important part in one's ability to choose and realize one's place in society.

Privacy Impacts: Normalization Invasions of privacy causes a normalizing effect on society. Ron Watson, Department of Political Science, Washington University., “The Ethics of Domestic Government Spying” March 2013¶ http://rewatson.wustl.edu/The%20Ethics%20of%20Domestic%20Government%20Spying.pdf Notice that the dragnet case could plausibly meet all of the four principles discussed¶ above. The problem with cases like Dragnet is that

ordinary people reasonably fear abuse¶ when their personal information is collected in droves; they also worry that their harmless¶ counter-normative activities will be exposed, punished, or leveraged against them. They¶ want law enforcement oficials and intelligence agents to possess thick les on suspected terrorists and criminals, but they worry about these same government agents having dossiers on¶ law abiding citizens. The temptations to misuse information for prudential or political gain,¶ they think, are too high. So too are the temptations to police norms prohibiting harmless or¶ even beneficial behavior. Indeed, the more innocents believe that the government possesses¶ detailed dossiers on them, the more likely they will be to self-censor, especially when the¶ conduct challenges the government or its officials. Principles that permit operations like¶ Dragnet, then, are not strategic, since they discourage people from engaging in a range of¶ harmless or beneficial behaviors. They further risk humiliating or disrespecting those who¶ engage in harmless but counternormative activities, fomenting paranoia, undermining trust¶ in the government, and diminishing people's enjoyment of a range of private activities.

Browser Fingerprinting Browser fingerprinting infringes on digital privacy Larkin, Erik. Mar 26, 2010. Browser Fingerprints: A Big Privacy Threat. http://www.pcworld.com/article/192648/browser_fingerprints.html Forget cookies--even the ultrasneaky, Flash-based "super cookies." A new type of tracking may identify you far more accurately than any cookie--and you may never know it was there.¶ The method pulls together innocuous data about your browser, such as plug-ins, system fonts, and your operating system. Alone, they don't identify you. Together, they're a digital fingerprint.¶ It's like describing a person. Just saying "brown hair" won't identify anyone. But add in "5 feet, 10 inches tall," "chipped right front tooth," "size 12 shoes," and so on, and soon you have enough information to pull someone out of a crowd, even without their name, Social Security number, or any other of the usual identifiers.¶ Test your browser for unique identifiers without the risk: The Electronic Frontier Foundation, a privacy advocacy group, has set up an interesting online experiment at Panopticlick.eff.org. Panopticlick gathers little details about your browser and computer, mostly using Javascript. In my case, the information it gathered about my browser was enough to uniquely identify my surfing software out of more than 650,000 visitors. Peter Eckersley, a staff technologist with the EFF, says he and his colleagues de--cided to create the site when he heard rumors about this kind of tracking. He wanted to see how accurate it might be.¶ Well, it's pretty accurate. And as it turns out, its use is more than a rumor.¶ Browser fingerprinting was developed for banks to employ to prevent fraud. But now one

company, Scout Analytics, offers it as a service to Web sites, and it collects not just browser data but also data about how you type--things like your typing speed and typing patterns.¶ This biometric signature, like the identifiers collected from the browser and the computer, can be gathered using JavaScript alone, making this form of tracking hard to block. Matt Shanahan, senior vice president of strategy at Scout Analytics, says that the company sells its service primarily to paid subscription sites, such as those offering real estate listings, and that it is keen to expand into marketing and advertising by helping sites track visitors in a way that, as he notes, is more accurate than using cookies. (Cookies can be deleted, which makes a repeat visit look like a new.

Collecting Information Violates Privacy There are wide sweeping programs to collect our information; this is a violation of privacy in a new technological age. Daniel J. Solove. Associate professor of law at the George Washington University Law School."The Digital Person: Technology And Privacy In The Information Age"New York: New York University Press, 2004. The government has recently been exploring ways to develop technology to detect patterns of behavior based on dossiers. In 2002, it was revealed that the Department of Defense was developing a program called Total Information Awareness (since renamed Terrorism Information Awareness). The program begins with the government amassing personal information from private-sector sources into a massive database of dossiers on individuals. Profiling technology is then used to detect those who are likely to be engaged ¶ in criminal activity. When Congress learned of Total Information Awareness, it halted the program because of its threat to privacy. However, the same type of collection and use of data envisioned by those who dreamed up Total Information Awareness is already being carried out by the government. The digital dossiers that continue to grow in the private sector and in public records are now becoming a tool for the government to monitor and investigate people. The Secret Paradigm. In another way of understanding privacy that I refer to as the "secrecy paradigm," privacy is invaded by uncovering one's hidden world, by surveillance, and by the disclosure of concealed information. The harm such invasions cause consists of inhibition, self-censorship, embarrassment, and damage to one's reputation. The law is heavily influenced by this paradigm. As

a result, if the information isn't secret, then courts often conclude that the information can't be private. However, this conception of privacy is not responsive to life in the modern Information Age, where most personal information exists in the record systems of hundreds of entities. Life today is fueled by information, and it is virtually impossible to live as an Information Age ghost, leaving no trail or residue. ¶ The Invasion Conception. Under the traditional view, privacy is violated by the invasive actions of particular wrongdoers who cause direct injury to victims. Victims experience embarrassment, mental distress, or harm to their reputations. The law responds when a person's deepest secrets are exposed, reputation is tarnished, or home is invaded. This view, which I call the "invasion conception," understands privacy to be a kind of invasion in which somebody invades and somebody is invaded. However, digital

dossiers often do not result in any overt invasion. People frequently don't experience any direct injury when data about them is aggregated or transferred form one company to another. Moreover, many of the problems of digital dossiers emerge from the collaboration of a multitude of different actors with different purposes. Each step along the way is relatively small and innocuous, failing to cause harm that the invasion conception would recognize as substantial.

Centralized Databases Violate Privacy Centralizing databases violate privacy J. J. BRITZ, prof at University of Pretoria, ¶ “THE CONCEPT OF PRIVACY” 1996 http://web.simmons.edu/~chen/nit/NIT'96/96-025-Britz.html � The merging of databases which contains personal information. This is also known as databanking (Frocht & Thomas, 1994, p. 24). By this is meant the integration of personal information from a variety of databases into one central database. The problem here does not in the first place arise from the integration of the information as such. The main problems include the fact that the individual is not aware of personal information being integrated into a central database, that the individual does not know the purpose/s for which the integration is effected, or by whom or for whose benefit the new database is constructed and whether the information is accurate.6 In order to counter these problems relating to privacy and the merging of databases the American Congress passed the Computer Matching and Privacy Protection Act in the 1980s (Benjamin, 1991, p. 11).

A2: “We Consent to Surveillance” Even giving consent to surveillance doesn’t solve the violation, you don’t know when where or how they will spy on you. Ron Watson, Department of Political Science, Washington University., “The Ethics of Domestic Government Spying” March 2013¶ http://rewatson.wustl.edu/The%20Ethics%20of%20Domestic%20Government%20Spying.pdf

The conclusion that we cannot assent to being spied upon might strike some as counterintuitive, however. They might point to cases in which someone agrees in advance to¶ be spied on, but the agreement does not specify when, where, or how the spying will take¶ place, thereby leaving open the possibility that the spy can in particular instances conceal¶ her observation from her target. Suppose, for example, a homeowner in crime ridden¶ neighborhood consents to being spied on by his local police department. One can, he agrees,¶ can observe him and his property and conceal this fact from him and others. This case and¶ others like it suggest that one can assent to be spied upon.

Digital Surveillance Bad

Electronic Surveillance Prevents Free Society Electronic surveillance is inconsistent with a free society ACLU. A nonpartisan non-profit organization whose stated mission is "to defend and preserve the individual rights.March 1, 1998."Electronic surveillance is inconsistent with a free society."American Civil Liberties Union.http://www.aclu.org/technology-and-liberty/big-brother-wires-wiretapping-digitalage. Date Retrieved: July 7, 2013. The cryptography debate offers the nation an opportunity to confront the issue of electronic surveillance anew. If we do not do so in a fully informed and careful way, there will be no limit to the sweep of new technological opportunities for total surveillance potential. Without the right to strong, non-key recovery encryption, the black strips on the backs of our credit, cash and identity cards, the electronic keys being distributed by gasoline companies to enable the purchase of gas with the wave of a wand, the E-Z passes for paying tolls electronically, and the imminent arrival of compact digital cell phones that also function as computers, e-mailers and pagers, will all be vulnerable to both governmental and nongovernmental spying, both authorized and unauthorized. The American Civil Liberties Union has historically opposed all forms of electronic surveillance by the government, and therefore supports the free and unfettered development, production and distribution of the strongest possible encryption technology.

Electronic surveillance, whether through bugging devices, wiretaps, or ready access to encryption keys, is fundamentally at odds with personal privacy. It is the worst sort of general search, which necessarily captures not only the communications of its specific targets, but those of countless others who happen to come in contact with the targets or use the same lines. Free citizens must have the ability to conduct direct, instantaneous, spontaneous and private communication using whatever technology is available. Without the knowledge and assurance that private communications are, indeed, private, habits based upon fear and insecurity will gradually replace habits of freedom. The right to privacy has already been severely compromised in this country. Telephones have been tapped by police at least since 1895, and in the past century there has been a constant tug of war between the government's impulse to eavesdrop and the public's desire to resist further encroachments. Although its powers have been limited by both statute and court decision, for all practical purposes the government has prevailed in this struggle. According to statistics compiled by the Administrative Office of the U.S. Courts, surreptitious government surveillance is now at record levels.5 From 1985 to 1995, more than 12 million conversations were intercepted through law enforcement wiretaps, and all but a relative handful were completely innocent (in 1995 alone, nearly two million innocent conversations were intercepted). Although

government agents must obtain a warrant, their requests for wiretaps are almost never turned down by judges or magistrates. In fact, only one request by law enforcement for an intercept has been rejected in the last eight years. As will be explained below, all of this wiretapping has produced little in the way of results for law enforcement and yet the expansive surveillance capabilities being sought today through the control of encryption and digital telephony will give the government unprecedented access to all communications -- with or without a warrant.

Surveillance Violates Separation of Powers Justifying surveillance in the name of national security violates separation of powers and avoids oversight Casman, Betsey Sue. Master of Arts in Ethics and Policy Studies. 2011. "The Right to Privacy in Light of the Patriot Act and Social Contract Theory". http://digitalscholarship.unlv.edu/cgi/viewcontent.cgi?article=2087&context=thesesdissertations. Date Accessed 7/21/13.

Congress was not in agreement with this unchecked power of the Executive ¶ branch and countered Olmstead by enacting the Communications Act of 1934. Within¶ the Communications of Act of 1934 was provision 605. The Michigan Law Review¶ published an article which defined provision 605 as follows, “605 prohibits both ¶ unauthorized interception of any private radio or wire communications and unauthorized ¶ use of publication of any information contained in such communications’ (“FISA: ¶ Legislating..” 1980, 1119). Though this provision was upheld by the Supreme Court ¶ when challenged (Nardone v. United States), it did not stem the continued warrantless ¶ electronic surveillance by the executive branch. The first reason it did not deter the ¶ executive branch was that the information was not necessarily being gathered for a ¶ criminal prosecution, but in essence it was being gathered for information’s sake. With ¶ no trial to dismiss the evidence as illegally obtained, there was no reason for the ¶ government to rethink its approach to gathering it. The second reason that provision 605 had little effect was that the executive branch stated that it did not apply to national ¶ security cases. National security was the justification that was used to circumvent ¶ Congress (and the law) in 1934 and today. Cinquegrana notes, “Almost 7000 wiretaps ¶ and 2200 microphone surveillances were used by the Executive between 1940 and the ¶ mid-1960’s in internal security investigations concerning foreign intelligence agents and ¶ Communist Party leaders, as well as major criminal activities.”

Digital Surveillance Hurts US Competitiveness United States Surveillance Threatens US Competitiveness Richard Stiennon, 2013 (Forbes staff analyst focusing on it security. “NSA Surveillance Threatens US Competitiveness” DoP: 6/07/2013, DoA: 7/19/13 http://www.forbes.com/sites/richardstiennon/2013/06/07/nsa-surveillancethreatens-us-competitiveness/)

The vast foreign and domestic spying by the NSA revealed this week threatens the global competitiveness of US tech companies.¶ We are told we live in a digital world and the future is bright for tech startups as costs of launching new products and services plummet and global markets open up to the smallest vendor. Yet, there is a world wide perception that any data that is stored or even routed through the United States is sucked into cavernous NSA data centers for analysis and cataloging. That perception was solidified in 2006 when former AT&T technician Mark Klein blew the whistle on the fiber tap that ATT had provided to the NSA in some of its data centers. Those perceptions have had real consequences for US tech firms seeking to offer global services. Email archiving services such as ProofPoint could not sell to even Canadian customers without building local infrastructure. Even establishing separate data centers in Canada and Europe is not enough to assure customers that their data would forever stay out of the grasp of US intelligence services.¶ One of the fastest growing segments of the tech industry is cloud services, with Salesforce.com one of the leading examples. Box.net, and other cloud storage solutions, are burgeoning. Cloud infrastructure providers like Amazon, Microsoft, and Rackspace are investing billions to serve markets that should be global but will be barred from most countries thanks to the complete abandonment of trust caused by NSA/FBI spying.

Terrorism

Terrorism Impact-D Terrorism is no longer a threat. Van Buren, Peter. "A Child's Guide to Why NSA Surveillance Is Bad." The Huffington Post. TheHuffingtonPost.com, 07 June 2013. Web. 02 July 2013. Prior to 9/11 we did not have a mass-scale terror act (by foreigners; American Citizen Timothy McVeigh pulled one off.) Since 9/11 we have not had a mass-scale terror attack. We can say 9/11 was a one-off, an aberration, and cannot be a justification for everything the government wishes to do. There is also the question of why, if the NSA is vacuuming up everything, and even sharing that collection abroad, this all needs to be kept secret from the American people. If it is for our own good, the government should be proud to tell us what they are doing for us, instead of being embarrassed when it leaks. If you're not doing anything wrong then you've got nothing to hide, right?

The threat presented by terrorism is insignificant, we are just as likely to be killed by a comet Mueller, October 2005, (John, “Is There Still a Terrorist Threat?”, Foreign Affairs v. 85 n. 5, pg. 2) But while keeping such potential dangers in mind, it is worth remembering that the total number of people killed since 9/11 by al Qaeda or al Qaeda-like operatives outside of Afghanistan and Iraq is not much higher than the number who drown in bathtubs in the United States in a single year, and that the lifetime chance of an American being killed by international terrorism is about one in 80,000 -- about the same chance of being killed by a comet or a meteor. Even if there were a 9/11scale attack every three months for the next five years, the likelihood that an individual American would number among the dead would be two hundredths of a percent (or one in 5,000). Although it remains heretical to say so, the evidence so far suggests that fears of the omnipotent terrorist -- reminiscent of those inspired by images of the 20-foot-tall Japanese after Pearl Harbor or the 20-foot-tall Communists at various points in the Cold War (particularly after Sputnik) -- may have been overblown, the threat presented within the United States by al Qaeda greatly exaggerated. The massive and expensive homeland security apparatus erected since 9/11 may be persecuting some, spying on many, inconveniencing most, and taxing all to defend the United States against an enemy that scarcely exists.

You aren’t likely to die from terror

Ritholtz

13

Barry , 4/29/ , : State University of New York at Stony Brook, Yeshiva University, Benjamin N. Cardozo School of Law, economic analyst, cnbc journalist Calm Down: You Are More Likely to Be Killed By Mundane Things than Terrorism, http://www.ritholtz.com/blog/2013/04/calm-down-you-are-more-likely-to-be-killed-by-mundane-things-than-terrorism/, Doa- 7/30/13

You are 17,600 times more likely to die from heart disease than from a terrorist attack¶ – You are 12,571 times more likely to die from cancer than from a terrorist attack¶ — You are 11,000 times more likely to die in an airplane accident than from a terrorist plot involving an airplane¶ — You are 1048 times more likely to die from a car accident than from a terrorist attack¶ –You are 404 times more likely to die in a fall than from a terrorist attack¶ — You are 87 times more likely to drown than die in a terrorist attack¶ – You are 13 times more likely to die in a railway accident than from a terrorist attack¶ –You are 12 times more likely to die from accidental suffocation in bed than from a terrorist attack¶ –You are 9 times more likely to choke to death on your own vomit than die in a

terrorist attack¶ –You are 8 times more likely to be killed by a police officer than by a terrorist¶ –You are 8 times more likely to die from accidental electrocution than from a terrorist attack¶ – You are 6 times more likely to die from hot weather than from a terrorist attack¶ Let’s look at some details from the most recent official statistics.¶ The U.S. Department of State reports that only 17 U.S. citizens were killed worldwide as a result of terrorism in 2011. That figure includes deaths in Afghanistan, Iraq and all other theaters of war.¶ In contrast, the American agency which tracks health-related issues – the U.S. Centers for Disease Control – rounds up the most prevalent causes of death in the United States:¶ ¶ Comparing the CDC numbers to terrorism deaths means:¶ – You are 35,079 times more likely to die from heart disease than from a terrorist attack¶ – You are 33,842 times more likely to die from cancer than from a terrorist attack¶ (Keep in mind when reading this entire piece that we are consistently and substantially understating the risk of other causes of death as compared to terrorism, because we are comparing deaths from various causes within the United States against deaths from terrorism worldwide.)¶ Wikipedia notes that obesity is a a contributing factor in 100,000–400,000 deaths in the United States per year. That makes obesity 5,882 to times 23,528 more likely to kill you than a terrorist.¶ The annual number of deaths in the U.S. due to avoidable medical errors is as high as 100,000. Indeed, one of the world’s leading medical journals – Lancet – reported in 2011:¶ A November, 2010, document from the Office of the Inspector General of the Department of Health and Human Services reported that, when in hospital, one in seven beneficiaries of Medicare (the government-sponsored health-care programme for those aged 65 years and older) have complications from medical errors, which contribute to about 180 000 deaths of patients per year.¶ That’s just Medicare beneficiaries, not the entire American public. Scientific American noted in 2009:¶ Preventable medical mistakes and infections are responsible for about 200,000 deaths in the U.S. each year, according to an investigation by the Hearst media corporation.¶ But let’s use the lower – 100,000 – figure. That still means that you are 5,882 times more likely to die from medical error than terrorism.¶ The CDC says that some 80,000 deaths each year are attributable to excessive alcohol use. So you’re 4,706 times more likely to drink yourself to death than die from terrorism.¶ Wikipedia notes that there were 32,367 automobile accidents in 2011, which means that you are 1,904 times more likely to die from a car accident than from a terrorist attack. CNN’s Fareed Zakaria noted this week: “Since 9/11, foreigninspired terrorism has claimed about two dozen lives in the United States. (Meanwhile, more than 100,000 have been killed in gun homicides and more than 400,000 in motor-vehicle accidents.) ”¶ According to a 2011 CDC report, poisoning from prescription drugs is even more likely to kill you than a car crash. Indeed, the CDC stated in 2011 that – in the majority of states – your prescription meds are more likely to kill you than any other source of injury. So your meds are thousands of times more likely to kill you than Al Qaeda.¶ The number of deaths by suicide has also surpassed car crashes, and many connect the increase in suicides to the downturn in the economy. Around 35,000 Americans kill themselves each year (and more American soldiers die by suicide than combat; the number of veterans committing suicide is astronomical and under-reported). So you’re 2,059 times more likely to kill yourself than die at the hand of a terrorist.¶ The CDC notes that there were 7,638 deaths from HIV and 45 from syphilis, so you’re 452 times more likely to die from risky sexual behavior than terrorism.¶ The National Safety Council reports that more than 6,000 Americans die a year from falls … most of them involve people falling off their roof or ladder trying to clean their gutters, put up Christmas lights and the like. That means that you’re 353 times more likely to fall to your death doing something idiotic than die in a terrorist attack.¶ The agency in charge of workplace safety – the U.S. Occupational Safety and Health Administration – reports that 4,609 workers were killed on the job in 2011 within the U.S. homeland. In other words, you are 271 times more likely to die from a workplace accident than terrorism.¶ The CDC notes that 3,177 people died of “nutritional deficiencies” in 2011, which means you are 187 times more likely to starve to death in American than be killed by terrorism.¶ Scientific American notes:¶ You might have toxoplasmosis, an infection caused by the microscopic parasite Toxoplasma gondii, which the CDC estimates has infected about 22.5 percent of Americans older than 12 years old¶ Toxoplasmosis is a brain-parasite. The CDC reports that more than 375 Americans die annually due to toxoplasmosis. In addition, 3 Americans died in 2011 after being exposed to a brain-eating amoeba. So you’re about 22 times more likely to die from a brain-eating zombie parasite than a terrorist.¶ There were at least 155 Americans killed by police officers in the United States in 2011. That means that you were more than 9 times more likely to be killed by a law enforcement officer than by a terrorist.¶ And – according to the 2011 Report on Terrorism from the National Counter Terrorism Center – Americans are just as likely to be “crushed to death by their televisions or furniture each year” as they are to be killed by terrorists.¶ Let’s switch to 2008, to take advantage of another treasure trove of data.¶ According to the Council on Foreign Relations, 33 U.S. citizens were killed worldwide in 2008 from terrorism. There were 301,579,895 Americans living on U.S. soil in 2008, so the risk of dying from terrorist attacks in 2008 was 1 in 9,138,785.¶ This graphic from the National Safety Council – based upon 2008 data – shows the relative risks of dying from various causes:¶ If the risk of being killed by a terrorist were added to the list, the dot would be so small that it would be hard to see. Specifically, the risk of being killed by terrorism in 2008 was 14 times smaller than being killed by fireworks.¶ [The risk of being killed by terrorism] compares annual risk of dying in a car accident of 1 in 19,000; drowning in a bathtub at 1 in 800,000; dying in a building fire at 1 in 99,000; or being struck by lightning at 1 in 5,500,000. In other words, in the last five years you were four times more likely to be struck by lightning than killed by a terrorist.¶ The National Consortium for the Study of Terrorism and Responses to Terrorism (START) has just published, Background Report: 9/11, Ten Years Later [PDF]. The report notes, excluding the 9/11 atrocities, that fewer than 500 people died in the U.S. from terrorist attacks between 1970 and 2010.¶ Terrorism pushes our emotional buttons. And politicians and the media tend to blow the risk of terrorism out of proportion. But as the figures above show, terrorism is a very unlikely cause of death.

The impacts of terrorism are overblown and over estimated. Bailey, Ronald. Writer, Award winning Science Correspondent, Lecturer at several prestigious Universities like Harvard, Rutgers and Yale. "How Scared of Terrorism Should You Be?." reason.com. Reason Foundation, 6 Sep 2011. Web. 31 Jul 2013. . Checking the Global Terrorism Database, one finds that an additional 14 Americans were killed in broadly defined domestic terrorism incidents since September 2001. Five died from anthrax attacks (2001); two died in an

attack on a Knoxville church (2008); two are suspected to have been killed by members of the Minutemen American Defense group in Arizona (2009); an abortion provider was killed in Wichita, Kansas (2009); a guard was stabbed to death at the Holocaust Museum in Washington, D.C., (2009); two died in Austin when a man crashed his light plane into a government building over a dispute with the IRS (2009); and a neo-

adds up to a grand total of 30 Americans killed in terrorist incidents inside the United States in the last 10 years.¶ Taking these figures into account, a rough calculation suggests that in the last five years, your chances of being killed by a terrorist are about one in 20 million. This compares annual risk of dying in a car accident of 1 in 19,000; drowning in a bathtub at 1 in 800,000; dying in a building fire at 1 in 99,000; or being struck by lightning at 1 in 5,500,000. In other words, in the last five years you were four times more likely to be struck by lightning than killed by a terrorist. Malthusian terrorist was shot by police during a hostage incident at the Discovery Channel in Silver Spring, Maryland (2009). That

Islamic Terror is Not a Threat Terrorism is not the greatest threat to the United States Shimron, Yonat. 2011. Islamic Terrorism Threat May Be Overblown, Expert Says. http://www.huffingtonpost.com/2011/08/09/islamic-terrorism-overblown_n_922757.html. Date Accessed 7/20/13. “In many ways," said Kurzman, "Islamic terrorism is simply the latest form of transnational revolutionary violence to grab global attention."¶ Put another way: This too shall pass.¶ While mindful of the pain and suffering terrorism has caused, Kurzman has written a book challenging the dominant narrative that worldwide terrorism is out of control.¶ In "The Missing Martyrs: Why There Are So Few Muslim Terrorists," Kurzman argues that Islamic terrorism has accounted for a miniscule number of murders compared with violent death tolls from other causes.¶ In the United States, for example, fewer than 40 people died at the hands of terrorists in the 10 years since the attacks of Sept. 11, 2001. That compares with about 140,000 other murders during the same time.

Terrorism is not a threat, it is only magnified to persecute Muslims June 10, 2013. ISNA: “Muslim Terrorism is Not a Threat After 9/11″. http://beforeitsnews.com/globalunrest/2013/06/isna-muslim-terrorism-is-not-a-threat-after-911-2455280.html. Date Accessed 7/20/13. The Islamic Society of North America (ISNA), a U.S. Muslim Brotherhood entity, said that “Muslim terrorism is not a threat after 9/11” in the May/June issue of its magazine, Islamic Horizons. The Boston bombings, committed by Muslim terrorists, happened on April 15. Instead, ISNA characterizes anti-Muslim discrimination as the real threat.¶ The magazine includes an article titled “New York Police Need Strict Oversight” that slams the NYPD’s counter-terrorism intelligence-gathering operations as an infringement upon Muslims’ rights. The ISNA article makes the absurd statement:¶ “Despite being proved by reports such as the Triangle Center on Terrorism and Homeland Security that Muslim terrorism is not a threat after 9/11, [the] NYPD continues to insist that if Muslims have nothing to hide, they should overlook the violation of their rights.”

Domestic Terrorism Is Not a Threat Homegrown terrorism is declining, less risk of attack Brooks, Risa. APRIL 27, 2013. Homegrown terrorism is not on the rise. http://www.bostonglobe.com/opinion/2013/04/26/threat-jihadist-inspired-homegrown-terrorismremains-small/3o8nzuMFQptSEkKPtfGDqM/story.html. Date Accessed 7/20/13. Consider the pattern of Muslims arrested on terrorist-related charges in the United States since the attacks of Sept. 11, 2001. From 2002 to 2008, annual arrests of suspects charged with terrorist-related offenses ranged from nearly two dozen in 2003 to fewer than five in 2008. In 2009 the number of arrests spiked to more than 40.¶ Analysts and political officials began to warn that we were finally witnessing the insidious effects of Al Qaeda’s propaganda on American Muslim citizens and residents. The 2009 arrests were cited as evidence that homegrown terrorism was emerging as a serious threat. In

2010, however, the number of terrorism-related arrests fell, only to decline further in 2011, and then again in 2012. In retrospect, the 2009 spike could be explained by several unrelated factors, including the clustering of arrests of individuals long suspected of having militant sympathies and the phenomenon of groups of Somalis, primarily from Minnesota, seeking to travel to the Horn of Africa to join the militant group al-Shabaab.

Digital Surveillance Does Not Stop Terrorism Terrorists use Tor to avoid digital surveillance and conduct their online activities Markay, Lachan. 2013 (Former investigative journalist for the Heritage Foundation and current staff writer for the Washington Free Beacon. “Anonymous Jihad”. 1 July 13. Accessed 16 July 13. http://freebeacon.com/anonymous-jihad/) The Tor network has become a go-to means for jihadists and criminals to communicate, raise money, and buy and sell illicit goods and services without fear of being identified or traced by intelligence or law enforcement officials. The network uses technology called “onion routing” (Tor is an acronym for The Onion Router), which refers to layers of encryption that prevent governments or other users from obtaining information about users or websites hosted on the network. Tor uses volunteers’ computers to route traffic through thousands of “nodes” worldwide, obscuring users’ locations and the sources of data hosted on the network. The technology makes it nearly impossible to trace or identify the network’s roughly 500,000 daily users.

Terror Discourse is Bad The Discourse of terrorism leads to flawed counterterrorism policies, only increasing the number of threats Joseba Zulaika, PHD and professor at center of Basque Studies, and William A. Douglass, PHD and Coordinator at Center of Basque studies; 1996 (“Terror and Taboo” X NS 1996) So is it not prudent to install metal detectors in airports to try to prevent Lockerbies and Oklahoma Cities? Of course. Metal detectors are necessary with or without terrorism discourse; our concern is whether the promotion of terrorism itself as a quintessential threat is necessary and useful. While we can all agree that we must try to prevent bombings what is lacking is a serious investigation of the extent to which the discourse itself might be partly responsible for them. It is one of the tenets of counterterrorism that any interaction with terrorist “other” is violation of a taboo. Terrorists are kooks, crazies, demented, or at best misguided. Contact with them is polluting; dialogue is pointless since terrorists are, by definition, outside the pale of reason. Yet as anthropologists working in the field we have lived many years in communities that have produced “terrorists.” As a practical matter, we could not simply demonize and then shut them out of awareness. We know that this personal experience with violent political activists makes us vulnerable to various criticisms. Yet it is the very strategy of “tabooing” subjects one has never spoken with or contemplated faced-to-face that we will question on both intellectual `and moral grounds.

Digital Surveillance Does Not Stop Terrorism The US surveillance programs aren’t effective at stopping terrorists-they can’t gain access to their covert communications. Bershidsky, Leonid. Staff Editor. Jun 23, 2013. U.S. Surveillance Is Not Aimed at Terrorists. http://www.bloomberg.com/news/2013-06-23/u-s-surveillance-is-not-aimed-at-terrorists.html. Accessed 7/16/2013. “People who radicalise under the influence of jihadist websites often go through a number of stages,” the Dutch report said. “Their virtual activities increasingly shift to the invisible Web, their security awareness increases and their activities become more conspiratorial.” ¶ Radicals who initially stand out on the “surface” Web quickly meet people, online or offline, who drag them deeper into the Web underground. “For many, finally finding the jihadist core forums feels like a warm bath after their virtual wanderings,” the report said. ¶ When information filters to the surface Web from the core forums, it’s often by accident. Organizations such as al-Qaeda use the forums to distribute propaganda videos, which careless participants or their friends might post on social networks or YouTube. ¶ Communication on the core forums is often encrypted. In 2012, a French court found nuclear physicist Adlene Hicheur guilty of, among other things, conspiring to commit an act of terror for distributing and using software called Asrar al-Mujahideen, or Mujahideen Secrets. The program employed various cutting-edge encryption methods, including variable stealth ciphers and RSA 2,048-bit keys. ¶ The NSA’s Prism, according to a classified PowerPoint presentation published by the Guardian, provides access to the systems of Microsoft Corp. (and therefore Skype), Facebook Inc., Google, Apple Inc. and other U.S. Internet giants. Either these companies have provided “master keys” to decrypt their traffic - - which they deny -- or the NSA has somehow found other means. Even

complete access to these servers brings U.S. authorities no closer to the core forums . These must be infiltrated by more traditional intelligence means, such as using agents posing as jihadists or by informants within terrorist organizations. ¶ Similarly, monitoring phone calls is hardly the way to catch terrorists. They’re generally not dumb enough to use Verizon. Granted, Russia’s special services managed to kill Chechen separatist leader Dzhokhar Dudayev with a missile that homed in on his satellite-phone signal. That was in 1996. Modern-day terrorists are generally more aware of the available technology. ¶ At best, the recent revelations concerning Prism and telephone surveillance might deter potential recruits to terrorist causes from using the most visible parts of the Internet. Beyond that, the government’s efforts are much more dangerous to civil liberties than they are to al-Qaeda and other organizations like it.

Digital Surveillance is ineffective at stopping terrorism Bershidsky, Leonid. Staff Editor. Jun 23, 2013. U.S. Surveillance Is Not Aimed at Terrorists. http://www.bloomberg.com/news/2013-06-23/u-s-surveillance-is-not-aimed-at-terrorists.html. Accessed 7/16/2013. The infrastructure set up by the National Security Agency, however, may only be good for gathering information on the stupidest, lowest-ranking of terrorists. The Prism surveillance program focuses on access to the servers of America’s largest Internet companies, which support such popular services as Skype, Gmail and iCloud. These are not the services that truly dangerous elements typically use.

Data Mining Ineffective Data Mining doesn’t efficiently prevent terrorism; Costs outweigh the benefits. Bruce Schneier, March 9th 2006, American cryptographer, computer security specialist, writer, and author of several books on general security topics, computer security and cryptography, “Why Data Mining Won’t Stop Terror”, Wired, http://www.wired.com/politics/security/commentary/securitymatters/2006/03/70357?currentPage=all, Date Accessed: July 28, 2013 Security is always a trade-off, and for a system to be worthwhile, the advantages have to be greater than the disadvantages. A national security data-mining program is going to find some percentage of real attacks and some percentage of false alarms. If the benefits of finding and stopping those attacks outweigh the cost -- in money, liberties, etc. -- then the system is a good one. If not, you'd be better off spending that capital elsewhere.¶ Data

mining works best when you're searching for a well-defined profile, a reasonable number of attacks per year and a low cost of false alarms. Credit-card fraud is one of data mining's success stories: all credit-card companies mine their transaction databases for data for spending patterns that indicate a stolen card.¶ Many credit-card thieves share a pattern -- purchase expensive luxury goods, purchase things that can be easily fenced, etc. -- and data mining systems can minimize the losses in many cases by shutting down the card. In addition, the cost of false alarms is only a phone call to the cardholder asking him to verify a couple of purchases. The cardholders don't even resent these phone calls -- as long as they're infrequent -- so the cost is just a few minutes of operator time.¶ Terrorist plots are different. There is no well-defined profile and attacks are very rare. Taken together, these facts mean that data-mining systems won't uncover any terrorist plots until they are very accurate, and that even very accurate systems will be so flooded with false alarms that they will be useless. ¶ All data-mining systems fail in two different ways: false positives and false negatives. A false positive is when the system identifies a terrorist plot that really isn't one. A false negative is when the system misses an actual terrorist plot. Depending on how you "tune" your detection algorithms, you can err on one side or the other: you can increase the number of false positives to ensure you are less likely to miss an actual terrorist plot, or you can reduce the number of false positives at the expense of missing terrorist plots.¶ To reduce both those numbers, you need a well-defined profile. And that's a problem when it comes to terrorism. In hindsight, it was really easy to connect the 9/11 dots and point to the warning signs, but it's much harder before the fact. Certainly, many terrorist plots share common warning signs, but each is unique, as well. The better you can define what you're looking for, the better your results will be. Data

mining for terrorist plots will be sloppy, and it'll be hard to find anything useful.¶ Data mining is like searching for a needle in a haystack. There are 900 million credit cards in circulation in the United States. According to the FTC September 2003 Identity Theft Survey Report, about 1 percent (10 million) cards are stolen and fraudulently used each year.¶ When

it comes to terrorism, however, trillions of connections exist between people and events -- things that the data-mining system will have to "look at" -- and very few plots. This rarity makes even accurate identification systems useless.¶ Let's look at some numbers. We'll be optimistic -- we'll assume the system has a one in 100 false-positive rate (99 percent accurate), and a one in 1,000 false-negative rate (99.9 percent accurate). Assume 1 trillion possible indicators to sift through: that's about 10 events -- e-mails, phone calls, purchases, web destinations, whatever -- per person in the United States per day. Also assume that 10 of them are actually terrorists plotting. ¶ This unrealistically accurate system will generate 1 billion false alarms for every real terrorist plot it uncovers. Every day of every year, the police will have to investigate 27 million potential plots in order to find the one real terrorist plot per month. Raise that false-positive accuracy to an absurd 99.9999 percent and you're still chasing 2,750 false alarms per day -- but that will inevitably raise your false negatives, and you're going to miss some of those 10 real plots.¶ This isn't anything new. In statistics, it's called the "base rate fallacy," and it applies in other domains as well. For example, even highly accurate medical tests are useless as diagnostic tools if the incidence of the disease is rare in the general population. Terrorist

attacks are also rare, any "test" is going to result in an endless stream of false alarms.¶ This is exactly the sort of thing we saw with the NSA's

eavesdropping program: the New York Times reported that the computers spat out thousands of tips per month. Every one of them turned out to be a false alarm.¶ And the cost was enormous -- not just for the FBI agents running around chasing dead-end leads instead of doing things that might actually make us safer, but also the cost in civil liberties. The fundamental freedoms that make our country the envy of the world are valuable, and not something that we should throw away lightly.¶ Data mining can work. It helps Visa keep the costs of fraud down, just as it helps Amazon alert me to books I might want to buy and Google show me advertising I'm more likely to be interested in. But these are all instances where the cost of false positives is low (a phone call from a Visa operator or an uninteresting ad) in systems that have value even if there is a high number of false negatives.¶ Finding

terrorism plots is not a problem that lends itself to data mining. It's a needle-in-ahaystack problem, and throwing more hay on the pile doesn't make that problem any easier. We'd be far better off putting people in charge of investigating potential plots and letting them direct the computers, instead of putting the computers in charge and letting them decide who should be investigated. Data-mining harms citizens and is ineffective because terrorists and criminals can evade data searches. Codevilla, Angelo; Angelo Codevilla is a professor of international relations at Boston University. He served as a U.S. Navy officer, a foreign service officer, and professional staff member of the Select Committee on Intelligence of the United States Senate; June 14, 2013; "Government Data Mining Threatens Our Citizens, Not Our Enemies." http://cnsnews.com/blog/angelo-codevilla/government-datamining-threatens-our-citizens-not-our-enemies#sthash. Date Accessed: 7/29/2013 Nevertheless, in the 21st century as in World War II, US intelligence puts the bulk of its COMINT resources in sorting through electronic haystacks. Worse, it

is recording as many of ordinary citizens' electronic communications as it can get. ¶ This poses no problems to enemies and criminals, while exposing every ordinary citizen to whatever the government may wish to visit upon him.¶ After 9/11, the Defense Department started putting together a computer program it called Total Information Awareness, to bring together all publicly available (and some non publicly available) information about Americans, such as records of telephone calls, credit card transactions, internet and e-mail usage, especially concerning "sensitive" subjects such as contacts with foreigners, but by no means limited to that. The program would sift these gargantuan records in search of "patterns or associations" that would warrant further investigation.¶ After a public outcry, the program shifted to the National Security Agency (NSA), which was already doing something similar with patterns of communication between phones and computers in America and abroad. NSA called it "Transactional Analysis." But this

affection for "data mining" can mean only that no sector of the universe of communications is any more interesting than any other. It is a declaration of intellectual bankruptcy akin to airport screeners paying equal attention to grandmas as to imams. ¶ In short: If you have an idea of what you are looking for, you do not need data mining. If you do not, data mining will only provide excuses for indulging your prejudices. The alternative to picking conversations out of cyberspace is to pick them up live through remote sensing, or as they are being transmitted - more like bugging than wiretapping.¶ It happens that technologies for such things as reading vibrations from windows and emanations from cables have made enormous advances and, though only a small part of the US COMINT budget, they have produced disproportionately big results. But to

"bug" someone is somehow to designate him as an enemy. Yet, sorting through electronic haystacks is so attractive precisely because it avoids explicit political choices.¶ For example, though US officials wring hands over the fact that financing for much anti-American terror comes from the vast Saudi Arabian royal family and entourage, they have been unwilling to commit emplaced sensors to finding out who is doing what because they would not want to act on the information. They prefer to argue about who our enemies may be. Unfortunately, the US government has come to default conclusions about who the real enemies are - American conservatives.¶ The

facts about data mining:¶ It is useful when keyed to known targets or known incidents AND the persons involved do not take fundamental precautions.¶ These precautions have long been easily available to serious criminals, as well as terrorists.¶ Vast troves that consist almost exclusively of data on innocent Americans beg to be used against them.¶ The Foreign Intelligence Surveillance Act of 1978 and the special court it established cannot hinder abuses. They only legitimize them.¶ Herewith explanations.¶ The best example of what data mining can do comes from the CIA's 2003 kidnapping of Abu Omar on the streets of Milan Italy. CIA contractors then drove Omar to the US air base at Aviano and then flew him to Egypt. Italian police, using cell phone records, found that a few phones had made a pattern of calls around the place of the kidnapping. From that, they reconstructed every detail of the entire episode, including the identities of the CIA people involved. It helped that

these master spies had left their frequent flier numbers at the hotel to get credit, and that they used credit cards traceable to the CIA. ¶ But what happens when the targets are intelligent human beings? Anyone who steps up to a checkout stand at Walmart or CVS in a border city like Tucson may notice that the person ahead is buying several piles of prepaid

cell phones, and paying for each separately, in cash. These phones are destined for drug cartels. Each phone is used to make just one call or to receive just one call. After that they are thrown in the dumpster. Why? Because, by doing that simple little maneuver, the criminals defeat all the hundreds of billions of high-tech that the US government is throwing into data mining.¶ There is another way to do that. If you are working for a foreign government, or otherwise have serious money, you can have foolproof encryption devices. Even your numbers can be hidden from the US government's big ear.¶

False Hits Collecting data from US citizens produces false hits. Carl Bialik “Ethics Aside, Is NSA’s Spy Tool Efficient” Published by the Wall Street Journal on June 14, 2013. Qualifications [ Senior special writer for the Wall Street Journal in London, Bachelor’s degree in mathematics and physics from Yale University] Reports about the National Security Agency's program to collect vast amounts of data on personal electronic communications have created an uproar about the implications for privacy. But some statisticians and security experts have raised another objection: As

a terror-fighting tool, it is highly inefficient and has some serious downsides.¶ Their reasoning: Any automated approach to spotting something rare necessarily produces false positives. That means for every correctly identified target, many more alarms that go off will prove to be incorrect. So if there are vastly more innocent people than would-be terrorists whose communications are monitored, even an extremely accurate test would ensnare many non-terrorists.¶ A Ph.D. candidate in computational ecology wrote on his blog last week that even a very accurate algorithm for identifying terrorist communications could produce about 10,000 false positives for every real "hit," creating a haystack of false leads to chase in order to find every needle. Several media reports repeated the figure, and some experts agreed. "The false positives will kill you in this kind of system," said Bruce Schneier, a security technologist at U.K. telecommunications company BT

Group PLC.¶ Several statisticians agreed with his basic point. Even if the NSA's algorithm "is terribly clever and has a very high sensitivity and specificity, it cannot avoid having an immense false-positive rate," said Peter F. Thall, a biostatistician at the University of Texas' M.D. Anderson Cancer Center. In his arena, false positives mean patients may get tests or treatment they don't need. For the NSA, false positives could mean innocent people are monitored, detained, find themselves on no-fly lists or are otherwise inconvenienced, and that the agency spends resources inefficiently.

Surveillance Ineffective Digital surveillance was unable to prevent the boston bombing Knickerbocker, Brad. He’s been the San Francisco bureau chief, Washington bureau news manager and Pentagon correspondent, National News Editor, and Chief Editorial Writer. June 9, 2013. “How do Americans feel about NSA surveillance? Ambivalent.” Date accessed: July 29, 2013. Why weren’t US Army Maj. Nidal Hasan’s e-mail contacts with radical cleric Anwar al-Awlaki (the American-born imam later killed in a US drone attack in Yemen) seen as reason enough to possibly head off Hasan’s killing 13 people at the Army post in Texas? Why

weren’t the Tsarnaev brothers’ possible links to radical Islam – including older brother Tamerlan Tsarnaev’s six-month trip to Russia, where he spent considerable time in the Islamic republics of Chechnya and Dagestan – enough to tip off the FBI to investigate further? Shortly after that trip, Tamerlan began posting YouTube videos exhorting jihad. Connecting the dots is exactly what the National Security Agency says it’s trying to do with the now-revealed programs vacuuming up billions of bits of “meta-data” on telephone calls and Internet use.

A2: Use a Nuke TERRORISTS ARE UNLIKELY TO BE ABLE TO USE A NUCLEAR WEAPON Keller, May 26, 2002, (Bill, “Nuclear Nightmares”, New York Times, http://www.faughnan.com/scans/020525_NuclearInevitableReivewNYT.pdf, Date accessed: July 30, 2013) If a terrorist did get his hands on a nuclear warhead, he would still face the problem of setting it off. American warheads are rigged with multiple PAL's ( ''permissive action links'') -- codes and self-disabling devices designed to frustrate an unauthorized person from triggering the explosion. General Habiger says that when he examined Russian strategic weapons he found the level of protection comparable to our own. ''You'd have to literally break the weapon apart to get into the gut,'' he told me. ''I would submit that a more likely scenario is that there'd be an attempt to get hold of a warhead and not explode the warhead but extract the plutonium or highly enriched uranium.'' In other words, it's easier to take the fuel and build an entire weapon from scratch than it is to make one of these things go off.

Terrorists will stick with conventional weapons-trends prove. Mueller 1/1/2008 [John Woody Hayes Chair of National Security Studies, Mershon Center Professor of Political Science Department of Political Science, Ohio State University. THE ATOMIC TERRORIST: ASSESSING THE LIKELIHOOD Prepared for presentation at the Program on International Security Policy, University of Chicago, January 15, 2008 ] The bottom line. Keller suggests that "the best reason for thinking it won't happen is that it hasn't happened yet," and that, he worries, "is terrible logic" (2002). "Logic" aside, there

is another quite good reason for thinking it won't happen: the task is bloody difficult. The science fiction literature, after all, has been spewing out for decades--centuries, even--a wealth of imaginative suggestions about things that might come about that somehow haven't managed to do so. We continue to wait, after all, for those menacing and now-legendary invaders from Mars. Meanwhile, although there have been plenty of terrorist attacks in the world since 2001, all (thus far, at least) have relied on conventional destructive methods--there hasn't even been the occasional gas bomb. In effect the terrorists seem to be heeding the advice found in a memo on an al-Qaeda laptop seized in Pakistan in 2004: "Make use of that which is available...rather than waste valuable time becoming despondent over that which is not within your reach" (Whitlock 2007). That is: Keep it simple, stupid. In fact, it seems to be a general historical regularity that terrorists tend to prefer weapons that they know and understand, not new, exotic ones (Rapoport 1999, 51; Gilmore 1999, 37; Schneier 2003, 236). Indeed, the truly notable innovation for terrorists over the last few decades has not been in qualitative improvements in ordnance at all, but rather in a more effective method for delivering it: the suicide bomber (Pape 2005, Bloom 2005).

The probability of nuclear terrorism is low and it wont cause extinction Bulletin of Atomic Scientists ’04 [November 1, Vol. 60, #6, Lexis] There are too many different ways in which terrorists could perpetrate some kind of nuclear attack to mention in this limited space. But keep this in mind: There

have been zero cases of nuclear terrorism --neither nuclear nor radiological. There are no known cases of theft or purchase of an intact nuclear weapon, so a terrorist attack with one is more than unlikely. There has not been any documented theft of enough fissile material for a crude nuke--although there have been attempts. There has never been a dirty bomb attack. There has never been a case of nuclear plant sabotage. If there were, it would be awful--but not the end of humanity.

No Risk of Nuclear Terrorism-Technical and Logisitical blocks are impossible to overcome Mueller 1/1/2008 [John Woody Hayes Chair of National Security Studies, Mershon Center Professor of Political Science Department of Political Science, Ohio State University. THE ATOMIC TERRORIST: ASSESSING THE LIKELIHOOD Prepared for presentation at the Program on International Security Policy, University of Chicago, January 15, 2008 ] It is essential to note, however, that making a bomb is an extraordinarily difficult task. Thus, a set of counterterrorism and nuclear experts interviewed in 2004 by Dafna Linzer for the Washington Post pointed to the "enormous technical and logistical obstacles confronting would-be nuclear terrorists, and to the fact that neither al-Qaeda nor any other group has come close to demonstrating the means to overcome them." Allison nonetheless opines that a dedicated terrorist group, al-Qaeda in particular, could get around all the problems in time and eventually steal, produce, or procure

a "crude" bomb or device,

one that he however acknowledges would be "large, cumbersome, unsafe, unreliable, unpredictable, and inefficient" (2004, 97; see also Bunn and Wier 2006, 139; Pluta and Zimmerman 2006, 61). In his recent book, Atomic Bazaar: The Rise of the Nuclear Poor, William Langewiesche spends a great deal of time and effort assessing the process by means of which a terrorist group could come up with a bomb. Unlike Allison, he concludes that it "remains very, very unlikely. It's a possibility, but unlikely." Also: The best information is that no

one has gotten anywhere near this. I mean, if you look carefully and practically at this process, you is no public case, at least known, of any appreciable amount of weapons-grade HEU [highly enriched uranium] disappearing. And that's the first see that it is an enormous undertaking full of risks for the would-be terrorists. And so far there step. If you don't have that, you don't have anything.

A2: Al-Qaeda Wants Nuke Al Qaeda doesn’t have interest in nuclear weapons Gavin, Francis J. 2010 Gavin is Tom Slick Professor of International Affairs and Director of the Robert S. Strauss Center for International Security and Law, Lyndon B. Johnson School of Public Affairs, University of Texas at Austin “Same As It Ever Was” International Security 34:3 January 7, 2010. http://www.mitpressjournals.org/doi/pdfplus/10.1162/isec.2010.34.3.7) A recent study contends that al-Qaida’s

interest in acquiring and using nuclear weapons may be overstated. Anne Stenersen, a terrorism expert, claims that “looking at statements and activities at various levels within the al-Qaida network, it becomes clear that the network’s interest in using unconventional means is in fact much lower than commonly thought.”55 She further states that “CBRN [chemical, biological, radiological, and nuclear] weapons do not play a central part in al-Qaida’s strategy.”56 In the 1990s, members of al-Qaida debated whether to obtain a nuclear device. Those in favor sought the weapons primarily to deter a U.S. attack on al-Qaida’s bases in Afghanistan. This assessment reveals an organization

at odds with that laid out by nuclear alarmists of terrorists obsessed with using nuclear weapons against the U nited States regardless of the consequences. Stenersen asserts, “Although there have been various reports stating that al-Qaida attempted to buy nuclear material in the nineties, and possibly recruited skilled scientists, it appears that al-Qaida central have not dedicated a lot of time or effort to developing a high-end CBRN capability. . . . Al-Qaida central never had a coherent strategy to obtain CBRN: instead, its members were divided on the issue, and there was an awareness that militarily effective weapons were extremely difficult to obtain.” 57 Most

terrorist groups “assess nuclear terrorism through the lens of their political goals and may judge that it does not advance their interests.”58 As Frost has written, “The risk of nuclear terrorism, especially true nuclear terrorism employing bombs powered by nuclear fission, is overstated, and that popular wisdom on the topic is significantly flawed.”59

A2: NSA Prevented Terrorism The NSA’s claim of preventing terrorism is not reliable Lendman 13. Stephen Lendman. 2013. [Research Associate at the Center for Research on Globalization] “NSA Chief General Keith Alexander Lies to Congress.” Global Research. June 15, 2013. SWL In testimony before Senate Appropriations Committee members, NSA Director General Keith Alexander defended the indefensible. He lied doing so. He falsely claimed NSA spying foiled “dozens” of terror plots. ¶ He “didn’t elaborate on the attacks that were stopped, other than to tie them to two well-known foiled 2009 plots.” More on them below. No such plots existed. They were invented. Innocent victims were falsely accused. ¶ No verifiable evidence shows any plots were foiled on Alexander’s watch. He’s been NSA chief since August 1, 2005. His claims don’t wash. ¶ He committed perjury. He’s guilty on multiple counts. Don’t expect recrimination against him. Key Senate members are fully briefed. They’re complicit in state crimes. So are many other congressional members. ¶ Post 9/11, Washington declared war on Islam. Muslims became America’s enemy of choice. They’ve been wrongfully vilified and dehumanized as terrorists. ¶ So-called

terror plots are fake. None existed earlier. None exist now. Dozens of innocent men and women were falsely charged, prosecuted, convicted and given long prison terms. Expect more innocent victims persecuted ahead. ¶ Alexander referred to Najibullah Zazi and David Coleman Headley. ¶ Justice Department officials claimed Zazi “received bomb-making instructions in Pakistan, purchased components of improvised explosive devices, and traveled to New York City on September 10 (2009) in furtherance of his criminal plans .” ¶ No evidence whatever supported government accusations. Zazi got no bomb-making instructions. He planned no crimes. His so-called ingredients included hydrogen peroxide, acetone and hydrochloric acid. ¶ He bought them at a beauty shop. He did so legally. Anyone can buy the same things. Hydrogen peroxide’s a common bleaching agent. It’s a mild disinfectant. ¶ Acetone’s an inflammable organic solvent. It’s used in nail polish remover, plastics and for cleaning purposes. ¶ Hydrochloric acid’s used in oil production, ore reduction, food processing, pickling, metal cleaning, and over-the-counter eye lubricants, among other applications. It’s found diluted in stomachs. ¶ Zazi’s alleged plot was fabricated. Authorities claimed he planned to attack New York commuter trains and/or other high-profile New York targets. No motive was explained. None existed. ¶ No legitimate evidence surfaced. None was presented. Innocence is no defense. Zazi was declared guilty by accusation. ¶ According to Justice Department officials, Healy was guilty of “a dozen federal terrorism crimes relating to his role in planning the November 2008 terrorist attacks in Mumbai, India, and a subsequent proposed attack on a newspaper in Denmark.” ¶ No verifiable evidence links him to any crimes. CIA, Mossad, India’s Research Analysis Wing (RAW, and perhaps Pakistan’s ISI were behind twelve coordinated shooting and bombing Mumbai attacks. They were false flags. ¶ DOJ officials fabricated charges against Healy and others. He’s innocent but guilty as charged. Thousands of political prisoners rot in America’s gulag. ¶ Media scoundrels pronounce guilt before trial. They do so in the court of public opinion. They support the worst state crimes. They violate core journalistic ethics. They [did] it unapologetically. They betray their readers, viewers and listeners in the process. ¶ Post-9/11, dozens of Muslims were falsely convicted of terrorism and/or conspiracy to commit it. ¶ Alexander’s claims about NSA spying foiling plots and keeping America safe don’t wash. ¶ On June 12, London’s Guardian headlined “Senators press NSA director for answers on secret surveillance program.” ¶ It was more show-and-tell than holding Alexander accountable. Congress is fully briefed on what’s ongoing. Key members know the worst of it. Permitting it makes them complicit. ¶ FBI Director Robert Mueller lied like Alexander. In testimony before House Judiciary Committee members, he claimed spying could have foiled 9/11. It will prevent “another Boston,” he said. ¶ Both incidents were state-sponsored false flags. Mueller didn’t explain. House

members didn’t ask. Perhaps they know and don’t need to. Maybe key House and Senate members are briefed in advance of US-staged terror plots. ¶ Mueller claims watering down spying leaves America vulnerable. “If you narrow (the scope of surveillance), you narrow the dots and that might be the dot that prevents the next Boston,” he said. ¶ America has no enemies except ones it invents. Mueller lied to Congress. He committed perjury like Alexander. He remains unaccountable.

A2: Prism Prevented NYC Bombing Digital surveillance was not necessary to stop the NYC subway bombing Apuzzo and Goldman 06/11/13 (Matt, Adam. NYC bomb plot details settle little in NSA debate http://www.huffingtonpost.com/2013/06/11/nyc-bomb-plot_n_3423721.html) WASHINGTON -- The Obama administration declassified a handful of details Tuesday that credited its PRISM Internet spying program with intercepting a key email that unraveled a 2009 terrorist plot in New York.¶ The details, declassified by the director of national intelligence, were circulated on Capitol Hill as part of government efforts to tamp down criticism of two recently revealed National Security Agency surveillance programs.¶ Najibullah Zazi's foiled plot to bomb the New York subways has become the centerpiece of that effort. It remains the most serious al-Qaida plot inside the United States since the 9/11 terror attacks.¶ In the rush to defend the surveillance programs, however, government officials have changed their stories and misstated key facts of the Zazi plot. And they've left out one important detail: The email that disrupted the plan could easily have been intercepted without PRISM.¶ The debate over the surveillance echoes one from years earlier, over President George W. Bush's warrantless wiretapping and harsh interrogation tactics. Critics said the government had gone too far but the administration said the techniques were lawful and kept America safe.¶ "What is clear from this information released by the DNI is that each of these programs is authorized by law, overseen by Congress and the courts and subject to ongoing and rigorous oversight," said Sen. Mitch McConnell, R-Ky.¶ Zazi,

an Afghan-American cab driver living in the Denver suburbs, was an al-Qaida-trained bomber. In September 2009, he sent a coded message to a Yahoo email address in Pakistan. Months earlier, British officials had linked the Yahoo address to a known al-Qaida operative.¶ "The marriage is ready," the email said in part.¶ The NSA intercepted that email, touching off a frenzied two-week investigation in New York and Colorado that led to Zazi's arrest. He pleaded guilty and provided information that helped send two friends to prison.¶ That much has been known for years. The government has put Zazi back in the news now because the Washington Post and Guardian newspapers revealed the existence of two classified surveillance programs last week.¶ In one program, the government sweeps up the phone records of millions of Americans every day and stores them in a digital library. That program was authorized by the USA Patriot Act, passed shortly after 9/11.¶ The second, called PRISM, taps into major U.S. technology companies and monitors emails in the search for foreign terrorists. That program was authorized by 2007 and 2008 laws that allow the government to monitor, without specific warrants, emails believed to belong to foreigners.¶ When news of the phone-records program broke, officials quickly credited it with thwarting an attack.¶ "Within the last few years, this program was used to stop a terrorist attack in the United States," said Rep. Mike Rogers, the Republican chairman of the House Intelligence Committee.¶ A senior intelligence official confirmed soon afterward that Rogers was talking about Zazi, but offered no explanation.¶ On Sunday, Sen. Dianne Feinstein, the Democratic chairwoman of the Senate Intelligence Committee, also credited the phone program with thwarting the Zazi plot.¶ Now, in talking points declassified by the administration, the government says that Internet eavesdropping, not archiving phone records, disrupted Zazi's plans.¶ The

use of PRISM to catch Zazi does little to resolve one of the key questions in the surveillance debate: whether the government needs to take such vast amounts of data, sometimes sweeping up information on American citizens, to keep the country safe.¶ That's because, even before the surveillance laws of 2007 and 2008, the FBI had the authority to – and did, regularly – monitor email accounts linked to terrorists. The only difference was, before the laws changed, the government needed a warrant.¶ To get a warrant, the law requires that the government show that the target is a suspected member of a terrorist group or foreign government, something that had been well established at that point in the Zazi case.¶ In using Zazi to defend the surveillance program, government officials have further confused things by misstating key details about the plot.¶ Director of National Intelligence James Clapper said investigators "found backpacks with bombs." Really, the bombs hadn't been completed and the backpacks the FBI found were unrelated to the plot.¶ Feinstein said the FBI had Zazi under surveillance for six months. Court testimony showed Zazi was watched only for about two weeks before he was arrested.¶ ___¶ Associated Press writer Donna Cassata contributed to this report.¶

Equal Prioritization Achieving a balance of national security objectives and digital privacy is necessary. Giuseppe, Vaciago is a lecturer in IT Law at University of Milan, focusing his research on cybercrime and computer forensics. 2013. “Privacy vs. Security? A Dilemma of the Digital Era¶ ”Freedom from Fear magazine.” http://www.freedomfromfearmagazine.org/index.php?option=com_content&view=article&id=314:priv acy-vs-security-a-dilemma-of-the-digital-era&catid=50:issue-7&Itemid=187 First and foremost, there are no winners or losers in the efforts to strike a balance between personal rights and public order and security, as these two following examples illustrate. On the one side, Europe adopted a data retention policy necessitating clearer definitions of the types of offences in connection to which stored personal data may be subjected to disclosure. On the other side, during the Bush administration the National Security Agency struck a deal with the main national telecommunications carriers to set up a database of the records of all the phone calls and online activities of American citizens.¶ Secondly, the EU-US joint statement released in Washington on 28 October 2009, as well as the Stockholm Program of 2 December 2009, are and must be treated as urgent calls for the active implementation of the Cybercrime Convention. Without wishing to belittle the importance of this Convention, however, it is clear that in an area such as Internet which connects the entire world, Intergovernmental Organizations also need to intervene, endeavouring to include as many countries as possible.¶ The third and last

conclusion is more of a hope: the huge potential of the Internet cannot be exploited merely to keep in touch with old classmates or make free video calls to family and friends. It is precisely as a result of the global interconnectivity it offers, allowing people from different countries and backgrounds to share information and exchange ideas, that the

Internet must serve as the starting point for setting up a framework of rules that reconciles privacy protection with the public interest in detecting, investigating and preventing crime both online and offline, in a manner satisfactory to all. We managed to draw up the Universal Declaration of Human Rights without the benefit of the Internet as a universal instrument of peace. Imagine what we can now do, with it.

Hackers

No Impact to Hackers: Encryption Solves Encrypted communications are practically impossible to crack Ou, Geore. 2006 (Network engineer. “Is encryption really crackable?”. 30 Apr. Accessed 17 July 13. http://www.zdnet.com/blog/ou/is-encryption-really-crackable/204) The problem is compounded by the fact that much of the misinformation out there actually sounds somewhat believable and many people just don't know what to believe. So to settle this once and for all, let's look at the facts. One of the things that make these myths plausible is the fact that "128-bit" WEP encryption used in 802.11 Wireless LANs is so pathetically weak. The inside scoop is that WEP was designed during the late 90s during a time when USA export laws were extremely tight. Fearing 802.11 devices would be banned by US export laws, good encryption algorithms were deliberately passed up by the 802.11 group in favor of a weaker one. The WEP algorithm was fundamentally flawed and the 802.11 standards body knew full well that it wasn't a strong encryption algorithm when they selected it. However, WEP's glaring weaknesses are not characteristic of any properly implemented symmetric encryption algorithms used in SSL or VPN implementations. To give you an idea of how good something like DES is, DES

is 30 years old and no one has found any weakness or shortcut for cracking it yet though it can be brute forced. Brute force techniques are considered impractical because modern encryption algorithms are 128 to 256 bits long.¶ Further propelling the myth that encryption is worthless is that I often hear people saying that they heard that a 512 bit RSA key was broken. The truth of the matter is that 512 bit (and recently even 660 bit) RSA keys have been broken by the University of Bonn in Germany but that is has absolutely nothing to do with the type of encryption that's used for ordinary bulk encryption. Furthermore, RSA's inventors were well aware of the fact that it takes a much larger key to be secure which is why typical implementations are at a minimum 768 bits and can easily go up to 2048 bits and beyond. To give you an idea what it takes to

break an RSA 1620 bit key, you would need a computer with 120 Terabytes of memory before you can even think about attempting it and the memory requirement virtually rules out massively distributed cracking methods. Some may ask why use RSA keys when it's many orders of magnitude slower and requires so many more bits to be secure, the reason is that RSA encryption has the special property of being able to do secure key exchanges in plain sight of an adversary who is trying to break in but still remain safe. For this reason, RSA keys are strictly used for the initial phases of a secure communication session for the purpose of Authentication (where one entity proves who they are) and for secure key exchanges (used for bulk symmetric encryption). Once the initial transaction is complete, the key that was exchanged during the initial RSA phase can now be used for SSL or VPN bulk encryption with algorithms like RC5, 3DES, or AES.¶ The last big factor in encryption myths and bit size inflation is salesmen and marketers because bigger numbers always sound nicer. I've had salesmen come in to my office and try to tell me that RSA or AES encryption was worthless and that I should be using their product which uses some kind of 1000 bit wonder-crypto solution. All it takes is one company to try and out do their competitors and pitch their products using 4096-bit RSA and the next company will come along and pitch 16384-bit RSA keys in their product. Many IT consultants will shy away from quoting smaller bit sizes because they're afraid to be out done by their competitors. ¶ Ah, but what about the dreaded massively distributed cracking brute force method for attacking something like 128 bit RC5 encryption? There

are massive zombie farms of infected computers throughout the world and some may have gotten as big as 1 million infected computers. What if that entire army was unleashed upon the commonly used 128 bit RC5 encryption? Surprisingly, the answer is not much. For the sake of argument, let's say we unleash 4.3 billion computers for the purpose of distributed cracking. This means that it would be 4.3 billion or 2 to the 32 times faster than a single computer. This means we could simply take 2 to the 128 combinations for 128-bit encryption and divide it by 2 to the 32 which means that 2 to the 96 bits are left. With 96 bits left, it's still 4.3 billion times stronger than 64 bit encryption. 64 bit encryption happens to be the world record for the biggest RC5 bit key cracked in 2002 which took nearly 5 years to achieve for a massive distributed attack. ¶ Now that we know that the distributed attacks will only shave off a few bits, what about Moore's law which historically meant that computers roughly doubled in speed every 18 months? That means in 48 years we can shave another 32 bits off the encryption armor which means 5 trillion future computers might get lucky in 5 years to find the key for RC5 128-bit encryption. But with 256-bit AES encryption, that moves the date out another 192 years before computers are predicted to be fast enough to even attempt a massively distributed attack. To

give you an idea how big 256 bits is, it's roughly equal to the number of atoms in the universe!¶ Once some of these basic facts on encryption become clear, "is encryption crackable" isn't the right question because the real question is "when can it be cracked and will it matter then". This is just like Bank safes which are rated by the time it takes an attacker to crack it open and never sold as "uncrackable". Encryption strength and the number of bits used are selected based on how many decades the data needs to be kept safe. For a secure ECommerce transaction, the data being transmitted is moot after a few decades which is why 128-bit encryption is perfectly suitable since it's considered unbreakable for the next few decades. For top secret classified data that needs to remain secret for the next 100 years, the Government uses NIST certified 256-bit AES encryption. So

the next time someone tells you that encryption is crackable, ask him if he'll be around on this earth to see it demonstrated.

Hackers Good-Anonymous Anonymous is good for society because it keeps governments and agencies in check. Ivanov, Georgi (MA, HBA in Political Science) Jan 2013 What is Anonymous? Everything You Ever Wanted to Know About the Shadowy Internet Group. http://www.policymic.com/articles/23922/whatis-anonymous-everything-you-ever-wanted-to-know-about-the-shadowy-internet-group Date Accessed: 7/18/13 Understanding Anonymous begins with an overview of their history, beginning with 4chan, and evolving into a movement whose primary tools of the trade became denial of service and hacking attacks, accompanied by the public release of sensitive information, including the personal data of individuals involved with the organization placed in the cross-hairs. The public arm of Anonymous consists of press releases and videos that are as much information about its activities as they are about its principles, but also provide commentary on current events. The group does act out against cases where miscarriage of justice or corruption is concerned, and these are actions that, while controversial, have merit. While hacking attacks are done to symbolize opposition to one issue or another, leaking information is a practice that predates Anonymous, but still remains a potent tool in revealing how organizations and governments that would not otherwise release their information, operate. The consequent fallout creates a public relations disaster for the affected parties, but it is a reminder that society works best when there is a degree of accountability and trust between governments and governed.

Encrypted communications are practically impossible to crack Ou, Geore. 2006 (Network engineer. “Is encryption really crackable?”. 30 Apr. Accessed 17 July 13. http://www.zdnet.com/blog/ou/is-encryption-really-crackable/204) The problem is compounded by the fact that much of the misinformation out there actually sounds somewhat believable and many people just don't know what to believe. So to settle this once and for all, let's look at the facts. One of the things that make these myths plausible is the fact that "128-bit" WEP encryption used in 802.11 Wireless LANs is so pathetically weak. The inside scoop is that WEP was designed during the late 90s during a time when USA export laws were extremely tight. Fearing 802.11 devices would be banned by US export laws, good encryption algorithms were deliberately passed up by the 802.11 group in favor of a weaker one. The WEP algorithm was fundamentally flawed and the 802.11 standards body knew full well that it wasn't a strong encryption algorithm when they selected it. However, WEP's glaring weaknesses are not characteristic of any properly implemented symmetric encryption algorithms used in SSL or VPN implementations. To give you an idea of how good something like DES is, DES

is 30 years old and no one has found any weakness or shortcut for cracking it yet though it can be brute forced. Brute force techniques are considered impractical because modern encryption algorithms are 128 to 256 bits long.¶ Further propelling the myth that encryption is worthless is that I often hear people saying that they heard that a 512 bit RSA key was broken. The truth of the matter is that 512 bit (and recently even 660 bit) RSA keys have been broken by the University of Bonn in Germany but that is has absolutely nothing to do with the type of encryption that's used for ordinary bulk encryption. Furthermore, RSA's inventors were well aware of the fact that it takes a much larger key to be secure which is why typical implementations are at a minimum 768 bits and can easily go up to 2048 bits and beyond. To give you an idea what it takes to

break an RSA 1620 bit key, you would need a computer with 120 Terabytes of memory before you can even think about attempting it and the memory requirement virtually rules out massively distributed cracking methods. Some may ask why use RSA keys when it's many orders of magnitude slower and requires so many more bits to be secure, the reason is that RSA encryption has the special property of being able to do secure key exchanges in plain sight of an adversary who is trying to break in but still remain safe. For this reason, RSA keys are strictly used for the initial phases of a secure communication session for the purpose of Authentication (where one entity proves who they are) and for secure key exchanges (used for bulk symmetric encryption). Once the initial transaction is complete, the key that was exchanged during the initial RSA phase can now be used for SSL or VPN bulk encryption with algorithms like RC5, 3DES, or AES.¶ The last big factor in encryption myths and bit size inflation is salesmen and marketers because bigger numbers always sound nicer. I've had salesmen come in to my office and try to tell me that RSA or AES encryption was worthless and that I should be using their product which uses some kind of 1000 bit wonder-crypto solution. All it takes is one company to try and out do their competitors and pitch their products using 4096-bit RSA and the next company will come along and pitch 16384-bit RSA keys in their product. Many IT consultants will shy away from quoting smaller bit sizes because they're afraid to be out done by their competitors. ¶ Ah, but what about the dreaded massively distributed cracking brute force method for attacking something like 128 bit RC5 encryption? There

are massive zombie farms of infected computers throughout the world and some may have gotten as big as 1 million infected computers. What if that entire army was unleashed upon the commonly used 128 bit RC5

encryption? Surprisingly, the answer is not much. For the sake of argument, let's say we unleash 4.3 billion computers for the purpose of distributed cracking. This means that it would be 4.3 billion or 2 to the 32 times faster than a single computer. This means we could simply take 2 to the 128 combinations for 128-bit encryption and divide it by 2 to the 32 which means that 2 to the 96 bits are left. With 96 bits left, it's still 4.3 billion times stronger than 64 bit encryption. 64 bit encryption happens to be the world record for the biggest RC5 bit key cracked in 2002 which took nearly 5 years to achieve for a massive distributed attack. ¶ Now that we know that the distributed attacks will only shave off a few bits, what about Moore's law which historically meant that computers roughly doubled in speed every 18 months? That means in 48 years we can shave another 32 bits off the encryption armor which means 5 trillion future computers might get lucky in 5 years to find the key for RC5 128-bit encryption. But with 256-bit AES encryption, that moves the date out another 192 years before computers are predicted to be fast enough to even attempt a massively distributed attack. To

give you an idea how big 256 bits is, it's roughly equal to the number of atoms in the universe!¶ Once some of these basic facts on encryption become clear, "is encryption crackable" isn't the right question because the real question is "when can it be cracked and will it matter then". This is just like Bank safes which are rated by the time it takes an attacker to crack it open and never sold as "uncrackable". Encryption strength and the number of bits used are selected based on how many decades the data needs to be kept safe. For a secure ECommerce transaction, the data being transmitted is moot after a few decades which is why 128-bit encryption is perfectly suitable since it's considered unbreakable for the next few decades. For top secret classified data that needs to remain secret for the next 100 years, the Government uses NIST certified 256-bit AES encryption. So

the next time someone tells you that encryption is crackable, ask him if he'll be around on this earth to see it demonstrated.

Cyberattacks

No Impact to Cyberattacks: Threat Overblown (1/2) A cyberattack would not be that severe and countries aren’t likely to launch them against each other. Lewis, James, author of over 90 papers since becoming director of the technology and public policy program at the center for strategic and international studies. December of 2002.“Assessing the Risks of Cyber Terrorism, Cyber War, and Other Cyber Threats” center for strategic and international studies, Washington DC and Steptoe publications.http://www.steptoe.com/publications/231a.pdf Date Accessed: July 16, 2013

Cyber crime is a serious and growing threat, but the risk to a nation-state in deploying cyber-weapons against a potential opponent’s economy are probably too great for any country to contemplate these measures. For example, writers in some of China’s military journals speculated that cyber attacks could disable American financial markets. The dilemma for this kind of attack is that China is as dependent on the same financial markets as the United States, and could suffer even more from disruption. With other critical infrastructures, the amount of damage that can be done is, from a strategic viewpoint, trivial, while the costs of discovery for a nation state could be very great. These constraints, however, do not apply to non-state actors like Al Qaeda. Cyber attacks could potentially be a useful tool (albeit not a fatal or determinative tool) for nonstate actors who reject the global market economy

Cyberterrorism is an overblown threat. Dorothy E. Denning, 2001, Georgetown University, “ACTIVISM, HACKTIVISM, AND CYBERTERRORISM: THE INTERNET AS A TOOL FOR INFLUENCING FOREIGN POLICY”, http://ncfm.org/libraryfiles/Children/NetworkNetWar/MR1382.ch8.pdf As previously discussed, terrorist groups are using the Internet extensively to spread their message and to communicate and coordinate action. However, there have been few, if any, computer network attacks that meet the criteria for cyberterrorism. The 1998 email bombing by the Internet Black Tigers against the Sri Lankan embassies was perhaps the closest thing to cyberterrorism that has occurred so far, but the damage cause by the flood of email, for example, pales in comparison to the deaths of 240 people from the physical bombings of the U.S. embassies in Nairobi and Dar es Salaam in August of that year.

Threat of Cyberterror is overblown – too little payoff for terrorists Ronald Deibert, 2003, Associate Professor of Political Science and Director of The Citizen Lab, Munk Centre for International Studies, University of Toronto, Black Code: Censorship, Surveillance, and the Militarisation of Cyberspace, Journal of International Studies, https://citizenlab.org/wpcontent/uploads/2009/10/Deibert2003.pdf Accompanying electronic surveillance has been the largely undebated militarization of cyberspace. A great deal of attention has focused on the question of cyberterrorism, particularly in the wake of 9/11 and fears of potential terrorist use of electronic networks.55 While some see the possibility of an ‘electronic Pearl Harbour’ being unleashed by terrorists, skilled individuals and non-state actors, many others believe these fears are largely overdrawn and ignore the redundancies built into the architecture of the Internet as well as the relatively low pay-off for groups whose ultimate aim is violence.56 In spite of the alarm, there are no empirical examples of cyber-terrorism to date, unless the term is used so broadly as to encompass politically motivated hacks on websites and occasional inconveniences caused by denial of service attacks. Rather than tools of mass destruction, threats from terrorist actors employing the Internet appear to bode little more than periodic disruptions to Internet traffic.

No Impact to Cyberterror: Threat Overblown (2/2) Cyberterrorism is not a threat Green, Joshua. November 2002. The Myth of Cyberterrorism. http://www.washingtonmonthly.com/features/2001/0211.green.html. Date Accessed 7/20/13. There's just one problem: There is no such thing as cyberterrorism--no instance of anyone ever having been killed by a terrorist (or anyone else) using a computer. Nor is there compelling evidence that al Qaeda or any other terrorist organization has resorted to computers for any sort of serious destructive activity. What's more, outside of a Tom Clancy novel, computer security specialists believe it is virtually impossible to use the Internet to inflict death on a large scale, and many scoff at the notion that terrorists would bother trying. "I don't lie awake at night worrying about cyberattacks ruining my life," says Dorothy Denning, a computer science professor at Georgetown University and one of the country's foremost cybersecurity experts. "Not only does [cyberterrorism] not rank alongside chemical, biological, or nuclear weapons, but it is not anywhere near as serious as other potential physical threats like car bombs or suicide bombers."

Cyberattacks have not occurred Fisher, Dennis. October 23, 2009. Report: Cyberterror Not a Credible Threat. http://threatpost.com/report-cyberterror-not-credible-threat-102309/72607. Date Accessed 7/20/13. A new report by a Washington policy think tank dismisses out of hand the idea that terrorist groups are currently launching cyber attacks and says that the recent attacks against U.S. and South Korean networks were not damaging enough to be considered serious incidents.The report, written by James Lewis of the Center for Strategic and International Studies, looks at cyberwar through the prism of the Korean attacks, which many commentators have speculated originated in North Korea. However, there has been little in the way of proof offered for this assessment, and Lewis doesn’t go down that road. Instead,

he focuses on whether the attacks constituted an act of war and whether they could have been the work of a terrorist group.¶ The answer is no on both counts. “The July event was not a serious attack. It was more like a noisy demonstration. The attackers used basic technologies and did no real damage. To date, we have not seen a serious cyber attack. That is only because the political circumstances that would justify such attacks by other militaries have not yet occurred and because most non-state actors have not yet acquired the necessary capabilities. As an aside, this last point undermines the notion of cyber terrorism. The alternative to the conclusion that terrorist groups currently lack the capabilities to launch a cyber attack is that they have these capabilities but have chosen not to use them. This alternative is nonsensical,” Lewis writes.

Cyber-warfare is extremely overblown and an ineffective form of terror Ranum, Marcus. Senior scientist at TruSecure Corp and the author of The Myth of Homeland Security. 27th May 2013. “Cyberwar myths: Are cyberwarfare and cyberterrorism overblown?” Accessed: July 29 2013. We've lived under the cyberwar/cyberterrorist cloud for more than a decade. But, we've yet to see a single, credible "cyberwarfare" event. And there's good reason: Cyberwarfare simply isn't an effective form of warfare . A digital attack could cause significant disruptions, but it wouldn't come close to the specter of nuclear Armageddon during the

let's debunk five key myths of cyberwarfare: The whole notion of cyberwarfare is a scam. Cyberwarfare Is New. Dust off your history books. Combatants have used information-based countermeasures and deception since ancient times. In the modern context, the only difference is that it occurs in cyberspace. During the late-1990s war in Bosnia, hackers reportedly attacked NATO headquarters, disrupting communications channels to stop the bombing of Serbian positions. Assuming this did happen (NATO never confirmed the report), the cyberattacks would have Cold War. To better understand the hollowness of this threat,

forced NATO to take some counteraction. But, the Serbians and their underground supporters had little effect on the bombing campaign. Hackers Set the Tone.

If hackers can break into enterprise and government systems with relative ease, then a cyberwarrior's job should be simple, right? Not exactly. To launch a successful attack, cyberwarriors would need predictably effective and highly discriminating weapons -- things that hackers don't have. Common crackers and script-kiddies benefit from the randomness of their haphazard targeting and can't attack critical targets of choice at will. Cyberwarfare Could Devastate the Economy.

Demagogues talk about cyberwarfare causing mass disruption of critical services that might ruin the

economy. But, one of 9/11's important lessons is the resiliency of the U.S. economy. Cyberwarriors or digital terrorists could cause inconveniences and disruptions -- maybe even cause the economy to sputter -- but it's unlikely they could do permanent damage. Cyberwarfare is an Efficient Form of Offense. Cyberwar is often touted as a battlefield equalizer through which a poor nation or terrorist group could attack a superior force to soften targets in advance of physical strikes. This is utterly ridiculous. Even if a cyberattack reduces a target's responsiveness, you still need a viable military force to take and hold territory. Demagogues argue that cyberwarfare is an option for a nation or terrorist group that just wants to inflict damage and spread fear. The

sad truth is that a single fanatic with a gun and homemade explosives is vastly more effective.¶ Cyberwarfare Is Anonymous. What good is anonymity if you're trying to strike fear into a target population or persuade a government to change its policies? There's a reason why terrorists blow up buses and buildings: It's how they get on the six o'clock news. Cyberwarfare units and terrorists may use the Internet to conceal their nefarious activities, but they'll usually race to take credit once their plans come to fruition. For nation-states, an anonymous digital attack might be useful for tweaking a superior enemy, but their identities will eventually be discovered. The whole notion of cyberwarfare is a scam. The security community has been treated to the constant drumbeat of cyberwarfare FUD, but, in the absence of a real threat, we're left with little more than Chicken Little hype and unfounded speculation. ¶ Should we discount the possibility? Like

most things in security, common sense and attention to detail will go a lot farther toward improving security than trying to scare people with tales of cyber-invaders.

Major Cyber Attack Unlikely to Happen James Bingham, June 6, 2013, “Is the threat of a "cyber Pearl Harbor" as potent as some have suggested?”, http://www.cfr.org/cybersecurity/threat-cyber-pearl-harbor-potent-some-havesuggested/p30863, Date Accessed: July 30, 2013 The most pressing cyber threat is not likely to be a single, sudden attack that cripples the United States. Such attacks are probably limited to sophisticated state actors; they involve elaborate intelligence preparation, great uncertainty for the attacker, and are subject to some deterrence. Director

of National Intelligence James R. Clapper Jr. testified that there was only a "remote chance" of "a major cyberattack against U.S. critical infrastructure systems during the next two years that would result in long-term, wide-scale disruption of services."

Tech Bad Technopoly creates an endless cycle of dependence, sickening the psyche of the dependent Postman, Neil. Technopoly: The Surrender of Culture to Technology, New York, Vintage Books, pp. 71-72. 1992 http://www.ibiblio.org/cmc/mag/1995/mar/hyper/npcontexts_119.html Date accessed- 7/16/13

Technopoly is a state of culture. It is also a state of mind. It consists in the deificaiton of technology, which means that the culture seeks its authorization in technology, finds its satisfactions in technology, and takes its orders from technology. This requires the development of a new kind of social order, and of necessity leads to the rapid dissolution of much that is associated with traditional beliefs. Those who feel most comfortable in Technopoly are those who are convinced that technical progress is humanity's superhuman achievement and the instrument by which our most profound dilemmas may be solved. They also believe that information is an unmixed blessing, which through its continued and uncontrolled production and dissemination offers increased freedom, creativity, and peace of mind. The fact that information does none of these things -- but quite the opposite -- seems to change few opinions, for unwavering beliefs are an inevitable product of the structure of Technopoly. In particular, Technopoly flourishes when the defenses against information break down. ¶ The relationship between information and the mechanisms for its control is fairly simple to describe: Technology increases the available supply of information. As the supply is increased, control mechanisms are strained. Additional control mechanisms are needed to cope with new information. When additional control mechanisms are themselves technical, they in turn further increase the supply of information. When the supply of information is no longer controllable, a general breakdown in psychic tranquillity and social purpose occurs. Without defenses, people have no way of finding meaning in their experiences, lose their capacity to remember, and have difficulty imagining reasonable futures. ¶ One way of defining Technopoly, then, is to say it is what happens to society when the defenses against information glut have broken down. It is what happens when institutional life becomes inadequate to cope with too much information. It is what happens when a culture, overcome by information generated by technology, tries to employ technology itself as a means of providing clear direction and humane purpose. The effort is mostly doomed to failure. Though it is sometimes possible to use a disease as a cure for itself, this occurs only when we are fully aware of the processes by which disease is normally held in check. My purpose here is to describe the defenses that in principle are available and to suggest how they have become dysfunctional.

Computers and technology create a shield of ignorance to the real threats by hiding it behind the need for technological advancement and speed. Postman, Neil. Technopoly: The Surrender of Culture to Technology, New York, Vintage Books, pp. 118-20. 1992 http://www.ibiblio.org/cmc/mag/1995/mar/hyper/npcontexts_119.html Date accessed- 7/16/13 Because of what computers

commonly do, they place an inordinate emphasis on the technical processes of communications and offer very little in the way of substance. With the exception of the electric light, there never has been a technology that better exemplifies Marshall McLuhan's aphorism "The medium is the message." The computer is almost all process. There are, for example, no "great computerers," as there are great writers, painters, or musicians. [I can't resist interjecting here: there are no great "pencilers" or "brushers" either. What is this guy thinking?] There are "great programs" and "great programmers," but their greatness lies in their ingenuity either in simulating a human function or in creating new possibilities of calculation, speed, and volume. Of course, if J. David Bolter is right, it

is possible that in the future computers will emerge as a new kind of book, expanding and enriching the tradition of writing technologies. Since printing created new forms of literature when it replaced the handwritten manuscript, it is possible that electronic writing will do the same. But for the moment, computer technology

functions more as a new mode of transportation than a as new means of substantive communication.

It moves information -- lots of it, fast, and mostly in calculating mode. The computer, in fact, makes possible the fulfillment of Descartes' dream of the mathematization of the world. Computers make it easy to convert facts into statistics and to translate problems into equations. And

whereas this can be useful (as when the process reveals a pattern that would otherwise go unnoticed), it is diversionary and dangerous when applied indiscriminately to human affairs. So is the computer's emphasis on speed and especially its capacity to generate and store unprecedented quantities of information. In specialized contexts, the value of calculation, speed, and voluminous information may go uncontested.

But the "message" of computer technology is comprehensive and domineering. The computer argues, to put it baldly, that the most serious problems confronting us at both personal and professional levels require technical solutions through fast access to information otherwise unavailable. I would argue that this is, on the face of it, nonsense. Our most serious problems are not technical, nor do they arise from inadequate information. If a nuclear catastrophe occurs, it shall not be because of inadequate information. Where people are dying of starvation, it does not occur because of inadequate information. If families break up, children are mistreated, crime terrorizes a city, education is impotent, it does not happen because of inadequate information. Mathematical equations, instantaneous communication, and vast quantities of information have nothing whatever to do with any of these problems. And the computer is useless in addressing them.

Tech pollutes the traditional sense of learning calling into question true learning. Postman, Neil. Technopoly: The Surrender of Culture to Technology, New York, Vintage Books, pp. 16-19. 1992 http://www.ibiblio.org/cmc/mag/1995/mar/hyper/npcontexts_119.html Date accessed- 7/16/13

We can imagine that Thamus would also have pointed out to Gutenberg, as he did to Theuth, that the new invention would create a vast population of readers who "will receive a quantity of information without proper instruction...[who will be filled] will the conceit of wisdom instead of real wisdom"; that reading, in other words, will compete with older forms of learning. This is yet another principle of technological change we may infer from the judgment of Thamus:

new technologies compete with old ones -- for time, for attention, for money, for prestige, but mostly for dominance of their world-view. This competition is implicit once we acknowledge that the medium contains an ideological bias. And it is a fierce competition, as only ideological competitions can be. It is not merely a matter of tool against tool -- the alphabet attacking ideographic writing, the printing press attacking the illuminated manuscript, the photograph attacking the art of painting, television attacking the printed word. When media make war against each other, it is a case of world-views in collision. In

the United States, we can see such collisions everywhere -- in politics, in religion, in commerce -- but we see them most clearly in the schools, where two great technologies confront each other in uncompromising aspect for the control of students' minds. On the one hand, there is the world of the printed word with its emphasis on logic, sequence, history, exposition, objectivity, detachment, and discipline. On the other there is the world of television with its emphasis on imagery, narrative, presentness, simultaneity, intimacy, immediate gratification, and quick emotional response. Children come to school having been deeply conditioned by the biases of television. There, they encounter the world of the printed word. A sort of psychic battle takes place, and there are many casualties -- children who can't learn to read or won't, children who cannot organize their thought into logical structure even in a simple paragraph, children who cannot attend to lectures or oral explanations for more than a few minutes at a time. They are failures, but not because they are stupid. They are failures because there is a media war going on, and they are on the wrong side -- at least for the moment. Who knows what schools will be like twenty-five years from now? Or fifty? In time, the type of student who is currently a failure may be considered a success. They type who is now successful may be regarded as a handicapped learner -- slow to respond, far too detached, lacking in emotion, inadequate in creating mental pictures of reality. Consider: what Thamus called the "conceit of wisdom" -- the unreal knowledge acquired through the written word -- eventually became the pre-eminent form of knowledge valued by the schools. There

is no reason to suppose that such a form of knowledge must always remain so highly valued. To take another example: In introducing the personal computer to the classroom, we shall be breaking a four-hundred year-old truce between the gregariousness and openness fostered by orality and the introspection and isolation fostered by the printed word. Orality stresses group learning, cooperation, and a sense of social responsibility.... Print stresses

individualized learning, competition, and personal autonomy. Over four centuries, teachers, while emphasizing print, have allowed orality its place in the classroom, and have therefore achieved a kind of pedagogical peace between these two forms of learning, so that what is valuable in each can be maximized. Now

comes the computer, carrying anew the banner of private learning and individual problem-solving. Will the widespread use of computers in the classroom defeat once and for all the claims of communal speech? Will the computer raise egocentrism to the status of a virtue? These are the kinds of questions that technological change brings to mind when one grasps ... that technological competition ignites total war, which means it is not possible to contain the effects of a new technology to a limited sphere of human activity.... What we need to consider about the computer has nothing to do with its efficiency as a teaching tool. We need to know in what ways it is altering our conception of learning, and how, in conjunction with television, it undermines the old idea of school.

Patriot Act

Patriot Act Violates Privacy – “Sneak & Peak Searches” Under the Patriot Act, the government is allowed to search companies without warning the subject of the search. Nancy J. King, 2003, College of Business, Oregon State University, Electronic Monitoring to Promote National Security Impacts Workplace Privacy, Employee Responsibilities and Rights Journalhttp://www.cob.sjsu.edu/malos_s/privacy%20and%20national%20security.pdf Second, an

employer may be called upon to assist the government in secret searches of the workplace under “delayed notification” rules. Section 213 of the USA PATRIOT Act permits searches and seizures by the government without prompt notice to the subject of the search and seizure when the government is seeking evidence of a criminal offense. Section 213 searches and seizures have been characterized as “sneak and peek” because they authorize surreptitious searches and seizures (147 Cong. Rec., 2001). Prior to the USA PATRIOT Act, “sneak and peek” searches and seizures had only been permitted in two jurisdictions under court rulings by the 2nd and 9th Circuit Courts of Appeals (U.S. v. Freitas, 1986; U.S. v. Villegas, 1990). Now “sneak and peek” searches and seizures are lawful across the nation (147 Cong. Rec., 2001). Applying Section 213 to the workplace, employers may be required to secretly monitor an employee’s electronic communications as part of a government search and seizure and be prohibited from disclosing its action to the employee under investigation.

WikiLeaks

A2: Threatens US Diplomacy Wikileaks is not a threat to National Security, Diplomacy between nations will still continue. Helller, Kevin J. (Associate Professor at the University of Melbourne) Dec 2010 Why the Benefits of WikiLeaks Far Outweigh Its Dangers http://opiniojuris.org/2010/12/03/why-wikileaks-good-faroutweighs-its-harm/ Date Accessed: 7/18/13 I have no doubt that some diplomats may respond to WikiLeaks’ disclosures by self-censoring and by avoiding written communications. But it is difficult to believe that WikiLeaks will have any significant or lasting effect on the US’s ability to engage in diplomacy with friendly or unfriendly governments ; after all, this is hardly the first time in U.S. history that diplomatic secrets have been disclosed. Robert Gates, the Secretary of Defense, said it best a couple of days ago: Let me just offer some perspective as somebody who’s been at this a long time. Every other government in the world knows the United States government leaks like a sieve , and it has for a long time. And I dragged this up the other day when I was looking at some of these prospective releases. And this is a quote from John Adams: ‘How can a government go on, publishing all of their negotiations with foreign nations, I know not. To me, it appears as dangerous and pernicious as it is novel.’ Now, I’ve

heard the impact of these releases on our foreign policy described as a meltdown, as a game-changer, and so on. I think those descriptions are fairly significantly overwrought. The fact is, governments deal with the United States because it’s in their interest, not because they like us, not because they trust us, and not because they believe we can keep secrets . Many governments — some governments — deal with us because they fear us, some because they respect us, most because they need us. We are still essentially, as has been said before, the indispensable nation. So other nations will continue to deal with us. They will continue to work with us. We will continue to share sensitive information with one another. Is this embarrassing? Yes. Is it awkward? Yes. Consequences for U.S. foreign policy? I think fairly modest.

Shield Laws

Shield Laws Key to First Ammendment Digital surveillance of journalists has a chilling effect on the first amendment, further reducing our freedoms Conyers, John Poe, Ted (Congressmen) July 2013 [“A shield law is essential to a robust press.” http://www.politico.com/story/2013/07/conyers-shield-law-press-freedom-93832.html Date Accessed: 7/17/13] A free and robust press is essential to the transparent and effective functioning of our government. Freedom of the press is enshrined in the First Amendment as a foundational freedom upon which our other freedoms — including speech and privacy — are premised. An unfettered press can inform the public about government abuses that threaten our citizens’ rights. This is not a conservative or liberal principle. It’s an American principle. A free press can hold both Democratic and Republican administrations accountable, as we’ve seen throughout our history, from Watergate and the Pentagon Papers to the recent Internal Revenue Service and National Security Agency scandals. Current events have brought renewed urgency to the need for federal press shield legislation. On May 13, we learned that the Department of Justice had secretly subpoenaed phone records, stemming from a leak investigation, for more than 20 telephone lines of Associated Press offices and journalists over a two-month period. A week later, we learned that in connection with a leak investigation concerning a possible North Korean missile launch, the DOJ had been tracking Fox News reporter James Rosen’s dealings with the State Department and went so far as to label him a “co-conspirator” in order to access his personal emails. Such actions sent a chilling signal to both reporters and their sources.

Economy

Regular Crime Worse Cybercrime is not the only way to steal Trade secrets. The Economist, February 23, 2013, (“Who needs cyber-spying?”, The Economist, http://www.economist.com/news/china/21572250-old-fashioned-theft-still-biggest-problem-foreigncompanies-china-who-needs, Date accessed: July 30, 2013) ON JANUARY 5th, in a night raid, a gang of criminals broke into a factory near Shanghai owned by Mercury Cable, an American manufacturer of high-voltage equipment. The thieves took not only raw materials but machinery from production lines as well.¶ Who was responsible? Todd Harris, the firm’s American boss, blames a gang led by a former manager at the plant. He claims local police have refused to take action despite repeated complaints, and that former employees and local officials are colluding to “set up a Chinese company making knockoffs.” Cybercrime may be

sexier, but the hard reality for companies doing business in China is that oldfashioned skulduggery remains a bigger threat.¶ The Mercury saga is a common tale. A foreign businessman comes to China with dollar signs in his eyes, struggles initially, then finds promising local managers who speak English, and he hands over the keys to his factory. He visits occasionally to woo local politicians over endless banquets. The business at last booms, until one day everything suddenly falls apart.

Typically, the foreign firm loses vital intellectual property (IP) and assets, and cannot find any local remedy.

China Responds Turn: China will respond to US efforts to crack down on hacking by hacking more. Doing nothing would be the best option. Riley, May 23, 2013, (Michael, senior writer for BloombergBusinessweek, “How the U.S. Government Hacks the World”, BloombergBusinessweek, http://www.businessweek.com/articles/2013-05-23/howthe-u-dot-s-dot-government-hacks-the-world#p1, Date accessed: July 31, 2013) The key role NSA hackers play in intelligence gathering makes it difficult for Washington to pressure other nations—China in particular—to stop hacking U.S. companies to mine their databanks for product details and trade secrets. In recent months the Obama administration has tried to shame China by publicly calling attention to its cyber-espionage program, which has targeted numerous companies, including Google (GOOG), Yahoo! (YHOO), and Intel (INTC), to steal source code and other secrets. This spring, U.S. Treasury Secretary Jacob Lew and General Martin Dempsey, chairman of the Joint Chiefs of Staff, traveled to Beijing to press Chinese officials about the hacking. National Security Advisor Thomas Donilon is scheduled to visit China on May 26.¶ The

Chinese response, essentially: Look who’s talking. “You go in there, you sit across from your counterpart and say, ‘You spy, we spy, but you just steal the wrong stuff.’ That’s a hard conversation,” says Michael Hayden, who headed the NSA, and later the CIA, under Bush. “States spying on states, I got that,” says Hayden, now a principal at the Chertoff Group, a Washington security consulting firm. “But this isn’t that competition. This is a nation-state attempting espionage on private corporations. That is not an even playing field.”¶ The tension between the two nations escalated in May, when a Pentagon report to Congress for the first time officially linked China’s government directly to the hacking of U.S. defense contractors. It revealed that U.S. intelligence had been tracking a vast hacking bureaucracy adept at stealing technology from American companies. China’s leaders have long denied being behind the hacks. An article about the Pentagon report in the official People’s Daily newspaper called the U.S. the “real hacking empire.”¶ The U.S. government doesn’t deny that it engages in cyber espionage. “You’re not waiting for someone to decide to turn information into electrons and photons and send it,” says Hayden. “You’re commuting to where the information is stored and extracting the information from the adversaries’ network. We are the best at doing it. Period.” The U.S. position is that some kinds of hacking are more acceptable than others—and the kind the NSA does is in keeping with unofficial, unspoken rules going back to the Cold War about what secrets are OK for one country to steal from another. “China is doing stuff you’re not supposed to do,” says Jacob Olcott, a principal at Good Harbor Security Risk Management, a Washington firm that advises hacked companies.¶ The men and women who hack for the NSA belong to a secretive unit known as Tailored Access Operations. It gathers vast amounts of intelligence on terrorist financial networks, international money-laundering and drug operations, the readiness of foreign militaries, even the internal political squabbles of potential adversaries, according to two former U.S. government security officials, who asked not to be named when discussing foreign intelligence gathering. For years, the NSA wouldn’t acknowledge TAO’s existence. A Pentagon official who also asked not to be named confirmed that TAO conducts cyber espionage, or what the Department of Defense calls “computer network exploitation,” but emphasized that it doesn’t target technology, trade, or financial secrets. The official says the number of people who work for TAO is classified. NSA spokeswoman Vaneé Vines would not answer questions about the unit.¶ The two former security officials agreed to describe the operation and its activities without divulging which governments or entities it targets. According to the former officials, U.S. cyberspies, most from military units who’ve received specialized training, sit at consoles running sophisticated hacking software, which funnels information stolen from computers around the world into a “fusion center,” where intelligence analysts try to make sense of it all. The NSA is prohibited by law from spying on people or entities within the U.S., including noncitizens, or on U.S. citizens abroad. According to one of the former officials, the amount of data the unit harvests from overseas computer networks, or as it travels across the Internet, has grown to an astonishing 2 petabytes an hour—that’s nearly 2.1 million gigabytes, the equivalent of hundreds of millions of pages of text.¶ The agency has managed to automate much of the process, one of the former officials says, requiring human hackers to intervene only in cases of the most well-protected computers. Just like spies in the physical world, the U.S. cyberspies take pains to obscure their tracks or disguise themselves as something else—hackers from China, say—in case their activities are detected.¶ Even as the rest of the Pentagon budget shrinks, the importance of the NSA’s hacking operations has helped create a booming cyber-industrial complex. Specialized units of big defense contractors, and boutique firms that create hacking tools, look for security flaws in popular software programs that allow government hackers to take over computers. A company called KEYW does a robust business training hackers for U.S. intelligence, says Chief Executive Officer Leonard Moodispaw, who cautions that he can’t reveal more. “Our federal partners don’t like it if we’re too explicit.”¶ All this activity gives China leverage against Washington’s complaints, says Steven Aftergood, director of the Project on Government Secrecy at the Federation of American Scientists.

Beijing can turn U.S. protests about industrial espionage around and claim that Washington is doing something even worse. “It’s OK to steal plans for a new automobile,” Aftergood says the Chinese can argue, “but not our national secrets.”

Crime

Gangs The Internet is not essential to gangs Pyrooz , David, Decker Scott , and Moule Richard. "Study Explores Gang Activity on the Internet." shsujc.blogspot.com. Sam Houston State University, 20 Mar 2013. Web. 29 Jul 2013. . Gangs do not use the Internet for purposes instrumental to the group, such as recruiting new members, drug distribution, meetings or other organizational activities. Gang members recognized that law enforcement monitored their online behaviors, so they limited their discussion of gang activities on the Internet or social media sites. Only 20 percent of gang members surveyed said that their gang had a web site or social media page, and one-third of those were password protected. ¶ Gang members recognized the importance of the Internet, but sites were used mainly as status symbols. Instead of exploiting the Internet for criminal opportunities, YouTube, Facebook, or other social media is used much like an “electronic graffiti wall,” according the study.

Crime Low Crime Rate Lowest in 40 Years RICHARD A. OPPEL Jr., May 23, 2011, “Steady Decline in Major Crime Baffles Experts”, NY Times, http://www.nytimes.com/2011/05/24/us/24, crime.html, Date Accessed: July 23, 2013 The number of violent crimes in the United States dropped significantly last year, to what appeared to be the lowest rate in nearly 40 years, a development that was considered puzzling partly because it ran counter to the prevailing expectation that crime would increase during a recession.¶ In all regions, the country appears to be safer. The odds of being murdered or robbed are now less than half of what they were in the early 1990s, when violent crime peaked in the United States. Small towns, especially, are seeing far fewer murders: In cities with populations under 10,000, the number plunged by more than 25 percent last year.

Impact Turn Organized crime decreases robbery, theft, kidnapping, and provide a level of security. Felbab-Brown, Vanda. Fellow in Foreign Policy at the Brookings Institution. August 2012. “Organized Criminals Won’t Fade Away” Organized crime has a particularly vicious impact on the state if it can create strong bonds with larger segments of the population than the state can. Many

people around the world in areas with an inadequate or problematic state presence, great poverty, and social and political marginalization are dependent on illicit economies for their livelihood.¶ Criminal (as well as militant) groups provide the marginalized population with employment and an opportunity for social advancement. They can also provide a level of security, suppressing robberies, thefts, kidnapping, and murders as well as providing informal courts, despite their being instigators of crime and instability in the first place. As a result, criminal entities can gain political capital with local communities.\

Data-Mining Bad Data mining inefficient; wastes money and leads to dead ends Arshad Mohammed and Sara Kehaulani Goo. Washington Post Staff Writers, June 15, 2006, Washington Post,http://www.washingtonpost.com/wp dyn/content/article/2006/06/14/AR2006061402063_2.html, Date Accessed July 21, 2013 "Out of pure resource allocation, it is so unlikely to provide something useful and so likely to provide dead ends and false leads that you are going to spend an enormous amount of resources on things that don't pan out," he said. "Before you start searching haystacks for needles, you've got to have some reason to believe that the needles are there."¶ The federal government's most public experiment with data mining since the terrorist attacks in 2001 failed to get off the ground, after the Homeland Security Department spent $200 million on it and the technology failed to prove what it set out to do, according to several former U.S. officials familiar with the program.¶ The system, originally called CAPPS II, sought to comb airline passenger records and verify information that fliers provided about themselves with information provided by companies that aggregate data about consumers. The problem, according to several officials who worked closely on the program but declined to speak publicly about it, was that the information about consumers was never proved to be effective in evaluating the risk posed by an airline passenger.

Human Trafficking

Technology Doesn’t Solve There is little research on technology helping decrease sex trafficking. boyd, danah, Senior Researcher, Microsoft Research and Research Assistant Professor, NYU, Casteel, Research Assistant, Microsoft Research, Thakor, Mitali, Research Assistant, Microsoft Research and PhD student, MIT, Johnson, Rane. Principal Research Director, Microsoft Research, 2011. Human Trafficking and Technology: A framework for understanding the role of technology in the commercial sexual exploitation of children in the U.S. Page 1. http://research.microsoft.com/en-us/collaboration/focus/education/htframework-2011.pdf. Date Accessed: 7/30/13.

To date, there is little empirical research into the role that technology plays in human trafficking. As a result, new interventions and policies are being driven by intuition, speculation, and extrapolation from highly publicized incidents. In order to move towards a more coherent and grounded approach to addressing the role of technology, it is important to begin untangling technology’s role in different facets of the human trafficking ecosystem.

Traditional Sources Sex trafficking tips came from traditional sources. Farell, Amy. Ph.D.,Jack McDevitt, Ph.D., Rebecca Pfeffer, M.A., Stephanie Fahy, M.A., NORTHEASTERN UNIVERSITY INSTITUTE ON RACE AND JUSTICE SCHOOL OF CRIMINOLOGY AND CRIMINAL JUSTICE, Colleen Owens, Meredith Dank, Ph.D., William Adams, M.P.P.

2012

URBAN INSTITUTE JUSTICE POLICY CENTER. April . “Identifying Challenges to Improve the Investigation and Prosecution of State and Local Human Trafficking Cases.” Page 44. http://www.urban.org/UploadedPDF/412593-State-and-Local-Human-Trafficking-Cases.pdf. Date Accessed: 7/30/13. There are numerous methods that law enforcement agencies in our study sites reported as helping them identify cases of human trafficking. The

most frequent method of identification of human trafficking cases was a tip (either from the community, a victim services organization, or through a hotline call), which was cited in 39% of human trafficking investigations (see Table 3.4). In 10% of cases the victim self-reported their victimization to the police, and in another 3% of cases the victim’s family reported the victimization. In 3% of the cases, human trafficking was identified in response to a call for service. Together,

these traditionally reactive identification strategies were used to identify 55% of all the cases we reviewed.

Internal Link: Technological Innovation is Key to the Economy Technological Innovation accounts for 85% of growth in the economy, Rosenberg, 2004, (Nathan, Professor of Economics (Emeritus) Stanford University, “ INNOVATION AND ECONOMIC GROWTH”, pg. 1-2, http://www.oecd.org/cfe/tourism/34267902.pdf, Date accessed: July 28, 2013) Technological innovation, a major force in economic growth¶ It is taken as axiomatic that innovative activity has been the single, most important component of long-term economic growth and this paper will start by drawing upon the findings of a very influential paper published by my colleague at Stanford, Prof. Abramovitx, back in the mid-1950s.¶ In the most fundamental sense, there are only two ways of increasing the output of the economy: (1) you can increase the number of inputs that go into the productive process, or (2) if you are clever, you can think of new ways in which you can get more output from the same number of inputs. And, if you are an economist you are bound to be curious to know which of these two ways has been more important - and how much more important. Essentially what

Abramovitz did was to measure the growth in the output of the American economy between 1870 and 1950. Then he measured the growth in inputs (of capital and labor) over the same time period. He then made what were thought to be reasonable assumptions about how much a growth in a unit of labour and how much a growth in a unit of capital should add to the output of the economy. It turned out that the measured growth of inputs (i.e., in capital and labor) between 1870 and 1950 could only account for about 15% of the actual growth in the output of the economy. In a statistical sense, then, there was an unexplained residual of no less than 85%.¶ Surprisingly enough, no economist had ever undertaken this exercise before - partly because it was only after the Second World War that reasonably accurate estimates of inputs and outputs for the American economy, over some very long time period, became available. Now, in any statistical exercise in which you are trying to tease out the relative importance of some variable, and you find yourself with a residual of 85%, you know you are in big trouble! Yet a number of other economists in the late 1950s and 1960s undertook similar exercises, using different methodologies, different time periods, and different sectors of the economy, with roughly similar results – they found themselves left with a very large residual that could not be accounted for. Robert

Solow, who later won a Nobel Prize in Economics, was one of those other economists who discovered a very large residual, using a very different methodology and different time period. As it happened, he got the same result for the size of the residual – 85%. It was precisely the size of this residual that persuaded most economists that¶ technological innovation must have been a major force in the growth of output in highly industrialised economies.¶ Although it might be tempting to say that the 85% residual was a negative finding, negative findings can sometimes be extremely useful. In this case the large size of the residual served as a kind of “wake-up call” to the economics profession because most economists for the previous 200 years had been building models in which economic growth was treated as if it was primarily a matter of adding more inputs into the productive process, especially inputs of capital. The large residual told economists that they had to look elsewhere in order to account for economic growth.

Tabloid Geopolitics

Link-Fear Tabloid Geopolitics uses ready-made stories of fear to control the public – Tabloid agents use discursive tactics to determine who is and isn’t a legitimate speaker Debrix, Francois., assistant professor of IR @ American International, 2008, (Francois, Tabloid Terror: War, Culture, and Geopolitics)pg. 150-152 Judith Butler has argued that public debate in the United States in the aftermath ¶ of 9/11 has been characterized by an exclusion of dissent.

Political and media ¶ discourses, Butler goes on to remark, have been driven by the desire to produce ¶ labels (traitor, terrorist-sympathizer, leftist, internationalist, postmodernist, and so ¶ on) that support ready-made explanations aimed at creating a “climate of fear in ¶ which to voice a certain view is to risk being branded and shamed with a heinous ¶ appellation.”¶ 27 Inside the contemporary spaces of alleged debate or dialogue of the global ¶



mediascape, critical reflection is rendered obsolete, useless, and possibly threatening to the nation and its people. Thus, Henry Giroux adds that, “[j]ust as violence is staged as a global spectacle, language, sound, and image lose their critical functions as they are turned into weapons to combat an enemy that is ubiquitous and to glorify a politics mobilized around an unrelenting campaign of fear.” 28¶ Butler’s and Giroux’s insights are perspicacious commentaries on the ¶ discursive politics of popular shows like The O’Reilly Factor and many other ¶ seemingly open ¶









and free-flowing public debates about the future of the United ¶ States and its people in an age of global terror. But these

commentaries are also ¶ lucid recognitions of the powerful and dreadful consequences of the ideological ¶ work of imposition, control, and domination of tabloid geopolitics as a discourse of fear, terror, and war. As I have shown in the previous chapters, tabloid geopolitics (in its different instantiations as tabloid realism before 9/11, as tabloid idealism or imperialism after 9/11, and perhaps as a more defensive and desperate ¶ – but also more vicious – tabloid imperialistic and aggressive narrative after the ¶ debacle of the war in Iraq) is a

set of discursive and/or visual representations that ¶ seek to take over the American cultural landscape in order to determine what can or cannot be said in the public domain in the new millennium. By dictating what ¶ will be legitimately uttered or not, tabloid geopolitical discourses and representations also decide who will count as valued speaking subjects, as subjects capable of pronouncing “truths.” In addition, the tabloid texts, sights, and sounds also ¶ reveal to their readers/viewers/listeners what or who is not worthy of interest or, ¶ worse yet, what or who needs to be abjected, dehumanized, and eventually killed. ¶ Thus, this tabloid discursive and representational production constantly ¶



threatens speaking subjects – whoever they are, and whatever they may want to say – with a potentially “uninhabitable identification” (as ¶



Butler puts it).¶ 29¶ Speaking

subjects ¶ (“us” and “them”), if and when they dare to speak, are interpellated into compliance with the dominant narratives and images and into acceptance of not being allowed to voice doubt or questioning. As Giroux clarifies, “in this cold new world, the language of politics is increasingly mediated through a ¶

spectacle of terrorism in which fear and violence become central modalities through which to grasp the meaning of self in society.” ¶



Link: International Relations International relations is steeped in a long history of discursive storytelling that privileges dangers and threats to shock the audience Debrix, assistant professor of IR @ American International; 8 (Francois, Tabloid Terror: War, Culture, and Geopolitics)pg. 40

In an age dominated by tabloid culture and in which politics is increasingly experienced by the public as trash entertainment, international politics also becomes a ¶ prime target of sensationalism, scandal news, injustice reporting, and crude moralizing. As we saw in Chapter 1, the Y2K (non-)event and the fear of cyberterrorism already contributed to a fusion of international political matters (national ¶ security, state sovereignty, warfare) with low or middlebrow modes of cultural ¶ representation and truth-telling (via cable TV news programs, the internet, home ¶ videos, and so on). Thus, since the late 1990s, American foreign policy and those ¶ who hope to influence its formulation have not been immune from the spread of ¶ tabloid culture. Moreover, those who have written about the foreign affairs of the ¶ United States of late, consciously or not, have often found themselves adopting a style of writing and presentation that is characteristically and perhaps purposefully tabloid. They ¶

seek to shock their audience, try to take them by surprise, announce impending dangers and disasters for the American nation, develop stereotypes about the world outside US borders, and desperately attempt to construct ¶ new international relations villains. Whereas the intervention of ¶

tabloid culture into the domain of international politics can be seen as a late modern or postmodern phenomenon, the conceptualization of international politics and formulation of foreign policies in the United States have gone through historical stages when relatively similar ¶



discourses and representations of popular or even populist geopolitics took place. The point I wish to make about tabloid

culture’s use in certain foreign policy and security ¶ studies circles today is not that it is a unique trend, or that it is not based on any ¶ prior discursive tradition. On the contrary, as I hinted at in the introduction to this ¶ ¶



book, the tabloid genre of writing American foreign policy draws on a rich legacy ¶ of popular cultural and middlebrow media constructions. Yet, as suggested above ¶ and in the Introduction, the tabloid (realist) genre discussed in this chapter also ¶ possesses specific traits that explain its contemporary appeal and suggest that it is ¶ not just any reproduction of previous popular geopolitics.

Impacts Tabloid Imperialism limits what can be said and heard in public debates – Their appeals to horrific impacts turns political agents into apologists for the war machine Debrix, assistant professor of IR @ American International; 8 (Francois, Tabloid Terror: War, Culture, and Geopolitics)pg. 152-153 At the same time, though, the passage from tabloid realism to tabloid imperialism was more than mere technical fine-tuning (although the tabloid style of the ¶ discourse and representations certainly made it look as if it was a continuation of ¶ what had been initiated in the late 1990s). Unlike tabloid realism, tabloid imperialism as a discursive/representational construct was no longer about proliferating simulated scenarios or models (World War III, an electronic or digital Pearl ¶ Harbor, holographic maps, and so forth). Rather, tabloid

imperialism became a ¶ matter of deploying vivid, gruesome, or “factual” situations and so-called events, ¶ and more importantly of attaching those real or imagined phenomena to larger than-life and ideationally superior reasons, rationalizations, and ideologies, so ¶ that Americans could not just fear or panic, but also could openly hate, abject, ¶ dehumanize, and agonize over life and death. The new tabloid imperialistic scenarios provided by intellectuals and pundits of statecraft and war (and their media, government, and military supports and supporters) ¶

were not concerned with simulation any more. They were now interested in recapturing good old representation, and in excavating from it images, symbols, or messages that could help to better produce meaning, reality, and truth by idealizing, rationalizing, and ¶



(conveniently also) glossing over those that “we,”

Americans, had to demonize, bestialize, or ¶ kill through “our” heroic actions. Whereas simulation was a crucial technique for tabloid (hyper-)realists, tabloid imperialists openly embraced transcendence and sublimation instead as their main discursive, representational and, finally, ideational strategies. After 9/11, the buffering ¶





effect offered by simulation models was ¶ no longer potent. A new Pearl Harbor (although not electronic or digital) was said ¶ to have taken place. As many in the media had noted, the reality of the terrorist ¶ attacks made Hollywood-type trompe l’oeilfictions look obsolete. And

tabloid ¶ geopolitical scientists no longer had to craft virtual dangers in order to encourage American citizens to be afraid, seek revenge, assault others, and support an ¶ unending war on and of terror.

Tabloid geopolitics uses discourses of threat and security to control the public sphere with entertaining pseudo-realities of political fear – This turns us into passive viewers and prevents public discussion of matters that are meaningful to our personal experiences Debrix, assistant professor of IR @ American International; 8 (Francois, Tabloid Terror: War, Culture, and Geopolitics)pg. 43-45 At the same time though, Gregory’s point about the impact of the form/style ¶ of the medium, of popular culture in general, on the formation of contemporary ¶ imaginative political geographies does not go far enough in diagnosing the peculiarities (and specific rules of formation and

the tabloid genre of geopolitical reporting and truth-telling ¶ today is directly affected by the form of the medium. As will be seen below, the particular form of this medium is a effects) of what I have called tabloid ¶ geopolitics. Indeed,



primary reason why producers of contemporary geopolitical discourses, foreign policy analyses, and American security narratives find the ¶

tabloid genre attractive. The

tabloid medium allows scholars, ¶ journalists, pundits, and all sorts of experts to deploy relatively ahistorical – but ¶ imaginative and ideological – discourses in textual and representational contexts ¶ that do not (have to) abide by rules of temporal and spatial contingency (the realities they describe are at once past, present or future, as we started to see in Chapter 1 in relation to cyberterror). Sharp, for example, had indicated that Reader’s¶ Digest’s production of “clearheaded facts” was crucial to the magazine’s mission ¶ of educating the public.¶ 24¶ The American citizen had to learn about the Cold War ¶ (as presented from a specifically selected perspective) in order to become more ¶ knowledgeable about the threats and dangers. But, as will also be shown below, ¶ the

tabloid discourse of contemporary international politics (and tabloid realism ¶ in particular) does not claim to provide knowledge, and its geopolitical imageries and imaginative geographies are not meant to be instructive or educational. 25¶ Instead, as I already noted in Chapter 1, ¶



tabloid geopolitics intends to spread a ¶ sense of anxiety and insecurity by providing spectacular scenarios and doomsday ¶ prophecies about “realities” that are generally not tangible or sometimes may not ¶

even be immediately meaningful to the reader’s or viewer’s personal experience. ¶ The “dumbing down” effect of/in the tabloid genre once

again gives priority to ¶ entertainment value, and it seeks to condition the public through a lack of knowledge (which often is also an excess of information). Tabloid geopolitical experts ¶ can thus be presented as and remain uncontested “authority figures” who play the ¶ part of knowledgeable intellectuals of statecraft, as the last thing the producers ¶ and operators of tabloid geopolitical media and literatures want is for their audience to know (what they are up to).¶ Thus,

contemporary tabloid geopolitical discourses do not create

the kind of ¶ “active subjectivity” that some critical geopolitical scholars have argued the reading or watching of popular texts or shows with (geo)political messages and effects ¶ supposedly require. As Gregory intimated was at play recently when US audiences consumed images and commentaries on the war in Iraq in the US media for example, the reading/viewing subject of today’s tabloid geopolitics is generally ¶

asked The reconstruction of American security culture 45 to occupy a very passive position. 26¶ This

postmodern version of popular geopolitics adopts a tabloid approach so that the main task asked of the reader/viewer ¶ is to sit down, enjoy the show, and, of course, remain fearful. Other subjects, ¶ agents, and authorities, the tabloid reader/viewer is being told, are doing the acting and are being vigilant on his or her behalf. Unlike some of ¶





the recommended ¶ or expected popular Cold War reactions (to the red scare visible on Engelhardt’s ¶ “red maps,” for example), today’s consumer of tabloid geopolitical literatures and ¶ shows does not have to constantly spy on his/her neighbors since the producers of ¶ the “spectacle” are already doing this, supposedly on this consumer’s or citizen’s ¶ behalf. Thus, by and large, adherence to and acceptance of the tabloid narrative ¶ is the main thing that is demanded of the (now passive) “subject” of this popular ¶ geopolitical genre. At the same time, the tabloid narrative today erases any critical ¶ ability that may have remained in previous popular geopolitical enterprises, since ¶ the discourses or representations tabloid geopolitics now provides are simply to ¶ be taken at face value. Its imaginative geographies are meant to be the exact renditions of the way things really are and of the way politics and ideology ought to be. ¶ The facts, events, issues, maps, figures, statistics, and images displayed through ¶ the tabloid medium are what they are, so-called “purely objective realities” that ¶ are not supposed to be contested and do not even require active recognition or ¶ acquiescence.

Alternative We must embrace the insecurity of the other in order to keep from demonizing our fears and causing self-destruction Debrix, assistant professor of IR @ American International; 8, (Francois, Tabloid Terror: War, Culture, and Geopolitics)pg. 158-160 The return to non-violence and non-destruction in this apparently unending era of the war on terror – if there is to be such an eventual or eventful return, such a returning event – thus requires a double, complementary movement. It ¶ requires that a tense but salutary balancing act be restored between our fear of the ¶ other (which, ultimately for Levinas, is the fear of our own fragility and death) ¶ and our fear of causing harm to the other. Internal or personal psychoses and ¶ traumas, impossibilities of deciding, undecidabilities (disarming as all these may ¶ be) may well be better, and may leave us better off (as safe/saved human bodies), ¶ than turning our fears into vengeance, retribution, and war. But accepting to live ¶ with those psychoses and traumas, with incomprehension after ¶

9/11, also requires ¶ that the therapies and feel-good remedies readily prescribed by our contemporary ¶ public comforters and media counselors be constantly challenged, as these tabloid pathologists’ discourses, intent on finding the “truth” about the trauma in the ¶ form of others to be abjected and killed, often cause far more harm than good. ¶ Among

the therapies that must be questioned and probably rejected are all those ¶ media representations – used as supports for a message of fear about one’s survival rather than one of fear for one’s life that also recognizes the anxiety about ¶ terminating other lives – that placard faces of others that are never meant to reveal ¶ a precariousness of life. Images of faces of others we have killed (those of dead ¶ Iraqi soldiers seen in Chapter 5, for example), of others we have tortured (the Abu ¶ Ghraib pictures), of others we have abjected (Saddam’s portrait, the 9/11 terrorists’ mug-shots), and of others we have been saving (young Ali and his maimed ¶ body as we saw in Chapter 5) also deface the face of the other and, like the tabloid geopolitical discourses that they reinforce, help us to resolve the ethical tension ¶ that might otherwise keep war and agony at bay.¶ 54¶ Butler is right when she writes that all these representations, discourses ¶ and images of and about America at war “seem to suspend the precariousness ¶ of life.”¶ 55¶ As I suggested above, any

attempt at restoring the balance or tension ¶ between the apparently contradictory impulses to kill and to fear to kill require ¶ some representational violence, some discursive rupture, some interruption of the ¶ sublime image. Butler’s and Levinas’ call for a return to the precariousness of life ¶ through a rediscovery of the face of the other (and of the ethical tensions this face ¶ allegorizes) is a fine and justified undertaking. But it still relies upon a form of ¶ hope (the hope that Americans will start to fear as much about killing others as ¶ they do about being killed) rather than on what might be done for events, surprises ¶ as events, to happen, without the hope or expectation that they will happen.¶ 56¶ As ¶ I argued at the end of Chapter 5, it is time to be without hope. It is also time to ¶ stop placing all our hopes in the person or figure of the other, even if the other ¶ presents himself or herself to us as a face that asks us not to kill or not to die alone. ¶ Restoring the precariousness of life (of our lives and of others’) may demand a ¶ certain politics of resistance, one that is neither active nor passive, but that seeks ¶ to take advantage of opportunities presented here and there in everyday American ¶ popular and political culture for representational ruptures. An image that shocks, ¶ that destabilizes, that arrests does not have to make sense, does not have to be ¶ recuperated by meaning, and does not have to be transcended. A geopolitical discourse of imperialism, agonal sovereignty, or surrender of society, law, and culture to the terror of the war machine does not have to be accepted as yet another ¶ piece of defensive or protective American ideology in times of war, for example. ¶ Rather, such images

and discourses need to be confronted (when they happen and ¶ as they happen) with a silence, a meaninglessness, a gaping wound in the field of ¶ vision, an unprepared spontaneous reaction perhaps, an unexpected and aleatory ¶ defiance, in other words, with anything that can prolong the moment of incomprehension and undecidability of meaning, with any tool or technique that can ¶ postpone the rationalizations and justifications that the media and other dominant ¶ actors of the public sphere are likely to want to impose. Our precariousness of life ¶ may be dependent upon being on the lookout for events (other sublime events that ¶ surprise) or primal scenes (that shock, as I put it in the Introduction) that do not ¶ terrorize by means of an overwhelmingly vigilantist

discourse or by naming or ¶ labeling but, instead, that put us face to face with the incommensurability of the ¶ to-come, of a future not decided beforehand, of an eventness beyond representation (because it cannot even be imagined). Precarious lives may be saved if we ¶ – and others – make the space and take the time to resist having to make sense ¶ of discourses and representations that are far too eager to make sense and far too ¶ quick to produce meaning whereas, upon closer examination, and if we were afforded the space and time to reflect upon them, it would become obvious that they ¶ make no sense at all and that their so-called meaning is nothing but a succession ¶ of carefully crafted mediatized or tabloidized truth-effects. In the end, if

we care to rescue our fear of killing others, if we care to retrieve some possibly democratic ¶ questioning, and if we care to save ourselves, this is perhaps what the event and ¶ its to-come have to look like: open spaces and temporal gaps of non-sense and ¶ incommensurate meaning that actually allow us to think, and especially to think about what we are doing when we ¶

melancholically long for the past or when we apprehensively project a supposedly better, safer, and less “evil” future. Perhaps ¶ Levinas should be given the final word. Levinas writes: “The relationship with the ¶ other will never be the feat of grasping a possibility . . . [and] the ¶

future is [also] ¶ what is in no way grasped . . . [The future is] absolutely surprising.”¶ 57¶ Levinas

¶ adds: “The other is the future. The very relationship with the other is the relationship with the future.”¶ 58 For our sake and for the ¶

sake of the other, may the future be more precarious than it presently is. ¶

Transparency

Transparency Transparency movement hurts faith in political system; perfect openness does not take into account the complexity, and sensitivity of certain information. Lawrence Lessig , Professor of Law at Harvard Law School, and Director of the Edmond J. Safra Center for Ethics at Harvard University, October 9, 2009, “Against Transparency”, The New Republic, http://www.newrepublic.com/article/books-and-arts/against-transparency#, Date Accessed: July 19, 2013 How could anyone be against transparency? Its virtues and its utilities seem so crushingly obvious. But I have increasingly come to worry that there is an error at the core of this unquestioned goodness. We

are not thinking critically enough about where and when transparency works, and where and when it may lead to confusion, or to worse. And I fear that the inevitable success of this movement--if pursued alone, without any sensitivity to the full complexity of the idea of perfect openness--will inspire not reform, but disgust. The "naked transparency movement," as I will call it here, is not going to inspire change. It will simply push any faith in our political system over the cliff.

Agamben

Link: Digital Technology Digital Technology de-subjectfys it’s users and allows for them to be considered expendable. McWhorter, U of Richmond, “Improper Life: Technology and Biopolitics from Heidegger to Agamben” DoP: 3-26-2012,DoA: 7/20/13, http://ndpr.nd.edu/news/29756-improper-life-technology-andbiopolitics-from-heidegger-to-agamben/ Like Heidegger, Agamben finds the flattening out or homogenization of human being in modern technologies deeply disturbing (36). Just as the typewritten word makes one person's (hand)writing indistinguishable from another's, technologies of all sorts obscure human differences and even eradicate them. Technology de-subjectifies, rendering people docile, inert, and forgetful of the essence of proper action (37, 56). De-subjectified, individuals become expendable; they can be sacrificed. They become, in Agamben's words, Homo sacer, bare life, zoē. This sacrilization of the masses invites -- to put it bluntly -- mass slaughter. Genocide, unchecked pandemic, spectacular scenes of regional deprivation and widespread hunger are familiar in our world, even more or less normal and unremarked. It is exceedingly rare for those responsible for such events to be held to account and punished. And, on Agamben's analysis, that fact makes perfect sense; the essence of Homo sacer is to be kill-able with impunity.

Link-Terrorism The 1AC reproduces terror discursively, which justifies securitizing the state of exception. Agamben ‘01 (Giorgio, professor at the university of Verona, On Security and Terror, 9/20//shree) Today we face extreme and most dangerous developments in the thought of security. IN the course of a gradual neutralization of politics and the progressive surrender of traditional tasks of the state, security becomes the basic principle of state activity. What used to one amoung several definitive measures of public administration until the first half of the twentieth century, now becomes the sole criterium of political legitimation. The thought of security bears within it an essential risk. A state which has security as its sole task and source of legitimacy is fragile organism; it can always be provoked by terrorism to become itself terroristic. We should not forget that the first major organization of terror after the war, the Organization de ASmee Secrete (OAS), was established by a French general, who thought of himself as a patriot, convinced that

When Politics, the way it was understood by theorist itself to police, the difference between state and terrorism threatens to disappears. In the end security and terrorism may form a single deadly system, in which they justify and legitimate each others’ actions. terrorism was the only answer the guerrilla phenomenon in Algeria and Indochina. of the “science of police” in the eighteenth century, reduces

Impacts: State of Exception Destroys All Rights (1/2) The state of exception allows all rights to be suspended indefinitely to preserve national security Agamben, philosopher, “The Camp as 'Nomos'” pg 97, 1998, DoA: 7/18/13 Stanford University Press, http://www.thing.net/~rdom/ucsd/biopolitics/HomoSacer.pdf The juridical foundation for Schutzhaft [the idea of protective custody] was the proclamation of the state of siege or of exception and ¶ the corresponding suspension of the articles of the German constitution that guaranteed personal liberties. ¶ Article 48 of the Weimar constitution read as follows: “The president of the Reich may, in the case of a ¶ grave disturbance or threat to public security and order, make the decisions necessary to reestablish public ¶ security, if necessary with the aid of the armed forces. To this end he may provisionally suspend [ausser ¶ Kraft setzen] the fundamental rights contained in articles 114,115,117,118, 123, 124, and 153.” From ¶ 1919 to 1924, the Weimar governments declared the state of exception many times, sometimes ¶ prolonging it for up to five months (for example, from September 1923 to February 1924). In this sense, when the Nazis took power and proclaimed the “decree for the protection of the people and State” ¶ (Verordnung zum Schutz von Volk und Staat) on February 28, 1933, indefinitely suspending the articles of ¶ the constitution concerning personal liberty, the freedom of expression and of assembly, and the ¶ inviolability of the home and of postal and telephone privacy, they merely followed a practice consolidated ¶ by previous governments. Yet there was an important novelty. No mention at all was made of the ¶ expression Ausnahmezustand (“state of exception”) in the text of the decree, which was, from the juridical ¶ point of view, implicitly grounded in article 48 of the constitution then in force, and which without a ¶ doubt amounted to a declaration of the state of exception (“articles 114, 115,117,118,123,124, and 153 ¶ of the constitution of the German Reich,” the first paragraph read, “are suspended until further notice”). ¶ The decree remained de facto in force until the end of the Third Reich, which has in this sense been aptly ¶ defined as a “Night of St. Bartholomew that lasted twelve years” (Drobisch and Wieland, System, p. 26). ¶ The state of exception thus ceases to be referred to as an external and provisional state of factual danger and ¶ comes to be confused with juridical rule itself. National Socialist jurists were so aware of the particularity of ¶ the situation that they defined it by the paradoxical expression “state of willed exception” (einen gewollten ¶ Ausnahmezustand). “Through the suspension of fundamental rights,” writes Werner Spohr, a jurist close to ¶ the regime, “the decree brings into being a state of willed exception for the sake of the establishment of the ¶ National Socialist State” (quoted ibid., p. 28).

Impacts: State of Exception Destroys All Rights (2/2) State of exception leads to a state of permament state martial law, where rights can be trampled. Agamben, philosopher, “The Camp as 'Nomos'” pg 97, 1998, DoA: 7/18/13 Stanford University Presshttp://www.thing.net/~rdom/ucsd/biopolitics/HomoSacer.pdf The importance of this constitutive nexus between the state of exception and the concentration ¶ camp cannot be overestimated for a correct understanding of the nature of the camp. The “protection” of ¶ freedom that is at issue in Schutzhaft is, ironically, protection against the suspension of law that ¶ characterizes the emergency. The novelty is that Schutzhaft is now separated from the state of exception on ¶ which it had been based and is left in force in the normal situation. The camp is the space that is opened ¶ when the state of exception begins to become the rule. In the camp, the state of exception, which was ¶ essentially a temporary suspension of the rule of law on the basis of a factual state of danger, is now given a ¶ permanent spatial arrangement, which as such nevertheless remains outside the normal order. When ¶ Himmler decided to create a “concentration camp for political prisoners” in Dachau at the time of Hitler’s ¶ election as chancellor of the Reich in March 1933, the camp was immediately entrusted to the SS and – ¶ thanks to Schutzhaft – placed outside the rules of penal and prison law, which then and subsequently had ¶ no bearing on it. Despite the multiplication of the often contradictory communiqués, instructions, and ¶ telegrams through which the authorities both of the Reich and of the individual Länder took care to keep ¶ the workings of Schutzhat as vague as possible after the decree of February 28, the camp’s absolute ¶ independence from every judicial control and every reference to the normal juridical order was constantly ¶ reaffirmed. According to the new notions of the National Socialist jurists (among whom Carl Schmitt was ¶ in the front lines), which located the primary and immediate source of law in the Führer’s command, ¶ Schutzhaft had, moreover, no need whatsoever of a juridical foundation in existing institutions and laws, ¶ being “an immediate effect of the National Socialist revolution” (Drobisch and Wieland, System, p. 27). ¶ Because of this – that is, insofar as the camps were located in such a peculiar space of exception – Diels, ¶ the head of the Gestapo, could declare, “Neither an order nor an instruction exists for the origin of the ¶ camps: they were not instituted; one day they were there [sie waren nicht gegründet, sie waren eines Tages ¶ da] “ (quoted ibid., p. 30). The paradoxical status of the camp as a space of exception must be considered. The camp is a ¶ piece of land placed outside the normal juridical order, but it is nevertheless not simply an external space. ¶ What is excluded in the camp is, according to the etymological sense of the term “exception” (ex-capere), ¶ taken outside, included through its own exclusion. But what is first of all taken into the juridical order is ¶ the state of exception itself. Insofar as the state of exception is “willed,” it inaugurates a new juridicopolitical paradigm in which the norm becomes indistinguishable from the exception. The camp is thus the

Impacts: State of Exception Allows for Atrocities The state of exception leads to the apex of biopolitical control- it subsumes law and judicial protections leading to an environment of totalitarian control, that allows for the extermination of people Agamben, philosopher, “The Camp as 'Nomos'” pg 97, 1998, DoA: 7/18/13 Stanford University Presshttp://www.thing.net/~rdom/ucsd/biopolitics/HomoSacer.pdf Hannah Arendt once observed that in the camps, the principle that supports totalitarian rule and that ¶ common sense obstinately refuses to admit comes fully to light: this is the principle according to which ¶ “everything is possible.” Only because the camps constitute a space of exception in the sense we have ¶ examined – in which not only is law completely suspended but fact and law are completely confused – is ¶ everything in the camps truly possible. If this particular juridico-political structure of the camps – the task ¶ of which is precisely to create a stable exception – is not understood, the incredible things that happened ¶ there remain completely unintelligible. Whoever entered the camp moved in a zone of indistinction ¶ between outside and inside, exception and rule, licit and illicit, in which the very concepts of subjective ¶ right and juridical protection no longer made any sense. What is more, if the person entering the camp ¶ was a Jew, he had already been deprived of his rights as a citizen by the Nuremberg laws and was ¶ subsequently completely denationalized at the time of the Final Solution. Insofar as its inhabitants were ¶ stripped of every political status and wholly reduced to bare life, the camp was also the most absolute ¶ biopolitical space ever to have been realized, in which power confronts nothing but pure life, without any ¶ mediation. This is why the camp is the very paradigm of political space at the point at which politics ¶ becomes biopolitics and homo sacer is virtually confused with the citizen. The correct question to pose ¶ concerning the horrors committed in the camps is, therefore, not the hypocritical one of how crimes of ¶ such atrocity could be committed against human beings. It would be more honest and, above all, more ¶ useful to investigate carefully the juridical procedures and deployments of power by which human beings ¶ could be so completely deprived of their rights and prerogatives that no act committed against them could ¶ appear any longer as a crime.

Terrorism-Root Cause The reaction to terrorism with the creation of the state of exception perpetuates a cycle of endless terrorism as supporters rally around their leader against the cruel oppressive Americans Aretxaga 1 – Professor of Anthropology at the University of Texis at Austin, visiting professor at the University of Chicago, former professor at Harvard University [“Terror as Thrill: First Thoughts on the ‘War on Terrorism’ Anthropological Quarterly, Vol. 75, No. 1, Winter 2001, Published by The Feorge Washington University Institute for Ethnographic Research, pp. 139-150. http://www.jstor.org/stable/3318342] For much of the Muslim world, the

U.S. is perceived as the terrorist while Osama bin Laden is the unjustly persecuted saint. To elaborate, bin Laden has emerged as a master of effects. Appearing against the background of a rock the same day George Bush announced the beginning of air strikes in Afghanistan, relaxed, enveloped in the imagery of the desert and speaking softly about justice and the end of Muslim humiliation, Osama bin Laden is-as he warns the U.S.-the mirror image of George Bush at the very moment he launches the U.S. attack on Afghanistan. The mighty military power of a world alliance bombing 143 a devastated Muslim country contrasts with the single, outdated rifle leaning against the rock wall next to Osama bin Laden; the image of a single ana- choret facing an empire, the word "terrorism" binding them in a circular accu- sation of phantom terror. We

are in what Derrida has called "a phantomatic mode of production" caught in the production and actualization of mirroring phantoms: Islamist and Western terrorisms.3 Making Terrorism "To break up the superstition and breaking of legality should be our aim. Nothing would please me more than to see Inspector Heat and his likes take to shooting us down in broad daylight with the approval of the public. Half our battle will be won then; the desintegration of the old morality would have set in its very tem- ple. That is what you ought to aim at. "Joseph Conrad The Secret Agent For all its proclaimed novelty,

the layout of the war has been quite conventional and follows a well-known routine of American military intervention: dis- play of military might, surgical airstrikes and covert operations. On the part of the Taliban cum bin Laden network the war takes the form of guerrilla warfare against Western imperialism and particularly the U.S.. This war takes place in the invisible space of the terror imaginary of he U.S. (attacks on buildings and gov- ernment, germ infection, etc.) and in the visibly impoverished landscape of Afghanistan. If bin Laden's objective is to galvanize support for a radical Islamist movement, the medium is the spectacle created by the imbalance of the strug- gle, an imbalance that evokes Western imperialism, historical humiliation and arbitrary violence. On

the one hand, the war triggers outrage and sympathy among the discontented population of the Middle East, on the other hand, it justifies (and even demands) the suicide attacks on the American population. These two moments are bound together through the psychic mechanism of identification, already signaled by Freud as the primary glue of social groups. First there is identification with the carefully built figure of martyrs in the face of unjust and overpowering violence; then identification with the paladins of justice weilding the sword of God. Of course, this process is mirrored in the U.S.: identification with the victims gives way to identification with the warring gov- ernment through the binding affective force of patriotism. At the level of public representation, the double figure of martyr and state- like force, these two poles of identification were incarnated in the figures of Osama bin Laden and his aide Sleiman Abou-Gheith. While the first spoke of in- justice and peace for Palestinians, the second, in a more stately appearance, threatened a continuing "storm of airplanes."4 The extreme craftiness at using modern technology to tap and recreate anew an old cluster of religious images, contradicts the opinion that assigns to Islamic radicalism an entrenchment in past tradition. The Taliban, like Osama bin Laden's brand of radicalism, does not represent the force of timeless tradition, but a contemporary creation of tra- dition, a concomitant effect of modernity well known to students of national- ism. If the "invention of tradition"5 is not new to the students of political movements, neither are the tactics that bin Laden is using. The use of an out- rageous attack as a provocation for massive use of force, preferably employed indiscriminately, is typical of anti-colonial guerrilla warfare. A brutally illustra- tive example of this tactic is Gillo Pontecorvo's now classic film, "The Battle of Algiers." State

force with its accompanying dirty wars, secret operations and special commandoes or death squads-that is, the use of terror to combat 'terrorism'-reproduce the very terrorist practices they want to eliminate, creating a closed dynamic of mimetic violence that can reproduce organized terror ad infinitum, narrowing if not closing the space for political engagements of other kinds. At the level of the political imaginary we are aiding the discursive and military construction of Terrorism with a capital T, a political figure that was in the making for some time, but which has finally made its world debut after September 11; it as an absolutized enemy with a

phantasmic character, rapid- ly becoming, in the midst of the anthrax scare, mystery and thrill, something like the figure of the "Joker" in the film "Batman."

Sex Trafficking Anti-trafficking strategies will continue to fail unless we are able to overcome bare life; only the alt can solve Shelly Feldman, Charles Geisler, and Gayatria A. Menon, 2011, “Accumulating Insecurity Violence and Disposession in the making of everyday life”, University of Georgia Press, http://books.google.com/books?hl=en&lr=&id=sQ2KD0CFZ0MC&oi=fnd&pg=PA166&dq=agamben+human+trafficking+exception&ots=o4dtF5D IRk&sig=izV4qOR0hVTluuGXws75vf166Ss#v=onepage&q&f=false, Date Accessed: July 31, 2013 The end of the cold saw the reemergence of human trafficking on the global political agenda as a new security threat integrated in a continuum of organized crime, illegal migration, drug trafficking, and terrorism. The words of the U.S. Immigration and Customs Enforcement agency (2007) echo this logic: “The threat to the United States posed by criminal organizations engaged in smuggling of any kind cannot be overemphasized. By exploiting vulnerabilities in border integrity, these criminal smuggling organizations, whether they traffic in humans, narcotics, or counterfeit merchandise, are an unquestionable threat to the security of the United States.” While the myth of white slavery was reactivated in the public imaginary, security professionals rendered the problem of human trafficking actionable as a security threat (Aradu 2008). In the midst of a context defined by the “War on Terror”, human trafficking has never been far from the overarching concerns with terrorism, organized crime, or irregular migration. In Europe, the EU Hague Programme on the area of freedom, security, and justice has reinforced the securitization of human trafficking by enjoining the member states to develop a more effective approach to “cross-border problems such as illegal migration, trafficking in and smuggling of human beings, terrorism and organized crime, as well as the prevention thereof” (Council of the European Union 2004, 3). Placed in this continuum of threats, human trafficking appeared to partake of the sovereign inscription of power that has been characteristic of national security. Anti-

Trafficking strategies entailed the sovereign abandonment of women whose irregular status removed them from the purview of law while being included as de facto sources of labor. Victims of trafficking were to be deported or criminalized in a sovereign move to reduce vulnerabilities and reinforce the “carapace” of the state against undesirable circulations of people.¶ The accounts of victims of trafficking render them as bare, depoliticized life, life which exists beyond the law. Their stories unravel ineluctably and women appear as pure marionettes, deprived of an agency and almost inexplicably having events and people “turn” on them. Boyfriends become traffickers and friends turn into exploiters and profiteers in the blink of an eye. This unexpected turn of events appears to propel them toward the exceptional situation. Their

existence “beyond the law” renders them vulnerable both to what Butler (2004,65) has called “petty sovereigns,” the traffickers who can function in this interstitial space, and the “sovereign police” (Agamben 1998, 174). Amnesty International, as many other NGOs involved in anti-traffickings campaigns, as argued that women are “systematically subjected to torture, including rape and other forms of cruel, inhuman and degrading treatment” (Amnesty International 2004). Women’s confessionary stories are renditions of “bare life,” lived outside the law where life can be sacrificed with impunity:¶ Through the paradoxical combination of exceptional suffering and “normality,” trafficked women are tentatively misidentified from categories of migrants, criminals, or prostitutes. Women who are trafficked into prostitution, the argumetnt goes, should not be deprived of their rights on grounds that they are undocumented migrants. The “guilt” of migrants who cross borders illegally, bio political assaying of life proceeds through the epistemically driven and continuously changing interrogation of the worth and eligibility of the living across a terrain of value that is constantly changing” (Dillon 2005, 41). There is a suggestion here that the bio politics of security operates in conjunction with the sovereign power to draw boundaries. Nonetheless, there is no indication of how these boundaries could be made more porous and categorizations challenged. How can dangerous others become victims worthy of protections? ¶ An

essential element of protection of victims of trafficking and their rights must be that States do not prosecute or punish trafficked persons for traffickingrelated offences such as holding false passports or working without authorization, even if they agreed to hold false documents or to work without authorization. Whether prostitution is legal or not, States should not prosecute persons for being trafficked into sexual exploitation, even if the person originally agreed to work in the sex industry. (United Nations Office on Drugs and Crime [UNODC] 2006)¶ If the sovereign pardon mediates the transformation of abject lives into lives worthy of care, how is it possible that victims of trafficking are never effectively pardoned? Victims of trafficking are eventually voluntarily returned home, after having testified against their traffickers and having undergone more or less extended periods of rehabilitation. Instead of deportation, voluntary return. Instead of detention centers, rehabilitation shelters. Instead of illegal migrants, victims. Although deployed upon supposedly different categories of subjects, the measures employed do not appear very different. In the shift from illegal migration to an emphasis on the human rights of victims of trafficking—a shift that has been made possible by the mobilization of NGOs in the anti-trafficking struggle—what appears to change is rather the form of incarceration or the mode of normalization. In order to account for the political effects of the sovereign pardon, I turn to Foucault’s “minor” texts on the lettres de cachet. Sovereign

pardon does not restore normality as juridical accounts tell us. It ultimately does not restore to their anonymity and everydayness. Rather, the sovereign pardon creates new forms of disciplinary and bio political normalization and extends the reach of power. In France, sovereign pardons led to the “great confinement” of the seventeenth and eighteenth centuries. In England, starting from the seventeenth century, the pardon was used to ease labor shortages in the colonies and gave rise to the transportation of felons to the New World (Moore 1989, 19). The pardon

was not necessarily based on the evidence of innocence. It could be based on character evidence about the defendant—and information from people who knew the defendant—about whether he or she would reform. Just like transportation in England, internment in France was indicative of the power of sovereign pardons. Defendants could be pardoned if they reformed. Therefore, internment was not simply the rise of a “better” way of punishing, but also emerged in relation to pardon and the extension of sovereign power into a normalizing force for the purpose of protecting pardoned lives. ¶ The sovereign pardon legitimates normalization as merciful action. Although often experienced as punishment, correction cannot be challenged on the same grounds as unjust punishment. Having recourse to pardon leaves the law in place and justifies forms of punishment that do not apply to reformable individuals. The sovereign pardon is not indicative of supreme authority and the arbitrary power of decision of life or death, as in Agamben’s conceptualization. As Farge and Foucault’s historical inquiries into the archives of the Bastille have shown, the pardon was equally underpinned by the power of Patriarchal families.The lettres de cachet targeted excesses to the traditional geographies of labor and the family (Farge and Foucault 1982, 30). Those who disturbed the order of the family were to be punished: unfaithful wives, squandering husbands, and disobedient children. Those who did not belong to a family were the beggars and vagabonds who “acted as disturbers in the system of protections and obligations” (Donzelot 1979, 49).

Alternative Alternative: Embrace whatever being-The acceptance of being in whatever form it comes, that belongs by its simple fact of existence. This can create a community that is not grounded in the state. Chang, September, 1993,(Heesok, Department of English Vassar College, “Postmodern Communities: The Politics of Oscillation”, http://pmc.iath.virginia.edu/text-only/issue.993/review-3.993, Date accessed: July 28, 2013) In order to rescue community from its nostalgic (and¶ finally Christian) assumptions we must, Nancy thinks, return¶ to ontology (first philosophy). A serious reflection on¶ community requires we answer the call to rethink-at the¶ most mundane level--what it means to be-in-common. ¶ [43] For Nancy this call does not arise from a utopian or¶ humanist appeal for a reorganization of social relations in¶ which community is posited as the end result, the work, of a¶ subject labouring on itself. The

obscure exigency of¶ community comes from the existential position of our¶ being-there, thrown into the world. This being-there is not¶ a punctual self-presence, a being-oneself. Community or¶ being-in-common is not a predicate of an essentially¶ solitary entity. Rather, being-there (%Dasein%) is none¶ other than a being-with (%Mitsein%). The very possibility¶ of my being alone depends on my ontological potential to¶ share my existence. Emphasizing Heidegger's differential and relational¶ definition of Dasein in order to underline our constitutive¶ being-in-common may be easy enough to follow. What is much¶ more difficult to grasp is that for Nancy, our strange¶ built-in sociality does not provide any groundwork for¶ building a community in any identifiable sense. On the¶ contrary, the fact that we *are* (ontologically) only in¶ relation to one another thwarts-or *resists* (a key word¶ for Nancy)--in advance any self- or communitarian¶ identification with this or that identity trait (being red,¶ being Italian, being communist--to cite Agamben's examples).¶ Our being-in-common is a limit-experience, a feeling for our¶ finitude. What we share at the end of ourselves,¶ ecstatically (so to speak), is not our shared individuality,¶ but our uncommon *singularity*. ¶ [45] The experience of this sharing should not be understood¶ as a selfless fusion into a group (both Nancy and Agamben¶ write continuously against the unsurpassed danger of our¶ political modernity: fascism, Nazism). Rather, our shared¶ singularity takes the form of an *exposure*. We are exposed¶ to the absence of any substantial identity to which we could¶ belong. Exposure

to singularity: that means to be scattered¶ together, like strangers on a train, not quite face-to-face,¶ oscillating between the poles of communion and¶ disaggregation.^14^ It is this banal relation without¶ relation that exposes our preidentical singularity, our¶ being-in-common. ¶ [46] Coming now to Agamben, I believe his work helps us to¶ approach this renewed question of community from another¶ angle. Specifically, he gives positive content to what¶ Nancy is inclined, I think, to describe negatively: namely,¶ the concept of singularity. ¶ [47] _The Coming Community_ opens like this: "The coming¶ being is whatever being. In the Scholastic enumeration of¶ transcendentals (%quodlibet ens est unum, verum, bonum seu¶ perfectum%--whatever entity is one, true, good, or perfect),¶ the term that, remaining unthought in each, conditions the¶ meaning of all the others is the adjective %quodlibet%. The¶ common translation of this term as 'whatever' in the sense¶ of 'it does not matter which, indifferently' is certainly¶ correct, but in its form the Latin says exactly the¶ opposite: %Quodlibet ens% is not 'being, it does not matter¶ which,' but rather 'being such that it always matters.' The¶ Latin always already contains, that is, a reference to the¶ will (%libet%). Whatever being has an original relation to¶ desire" (1). ¶ [48] The basis of the coming community, the singular being,¶ is whatever being--not in the sense of "I don't care what¶ you are," but rather, "I care for you *such as you are*." ¶ As *such* you are freed from belonging either to the¶ emptiness of the universal or the ineffability of the¶ individual. ¶ [49] In

Agamben's elaboration of singularity, human identity¶ is not mediated by its belonging to some set or class (being¶ old, being American, being gay). Nor does it consist in the¶ simple negation of all belonging (here Agamben parts company¶ with Bataille's notion of the "negative community," the¶ community of those who have no community). Rather, whatever¶ names a sort of radical generosity with respect to¶ belonging. The singular being is not the being who belongs¶ only here or there, but nor is it the being who belongs¶ everywhere and nowhere (flipsides of the same empty¶ generality). This other being always matters to me not¶ because I am drawn to this or that trait, nor because I¶ identify him or her with a favoured race, class, or gender. ¶ And certainly not because he or she belongs to a putatively¶ universal set like humanity or the human race. ¶ [50] The other always matters to me only when I am taken¶ *with all of his/her traits, such as they are*. This¶ defining generosity of the singular means that %quodlibet¶ ens% is not determined by this or that belonging, but by the¶ condition of belonging itself. It belongs to belonging. ¶ The

singularity of being resides in its exposure to an¶ unconditional belonging.¶ [51] Such a singularly exposed being wants to belong--which¶ is to say, it

belongs to want, or, for lack of a less¶ semantically burdened and empty word, to love: "The¶ singularity exposed as such is whatever you *want*, that is,¶ lovable" (2). ¶ [52] We must be careful here not to conflate Agamben's¶ exposition of whatever being with a more familiar discourse¶ on love: "Love is never directed toward this or that¶ property of the loved one (being blond, being small, being¶ tender, being lame), but neither does it neglect the¶ properties in favor of an insipid generality (universal¶ love): The lover wants the loved one *with all of its¶ predicates*, its being such as it is. The lover desires the¶ *as* only insofar as it is *such*--this is the lover's¶ particular fetishism" (2).¶ [53] But what could a thing with all of its predicates look¶ like? Agamben

gives us the example of the human face. ¶ Every face is singular. This does not mean a face¶ individuates a pre-existing form or universalizes individual¶ features. The face as such is utterly indifferent to what¶ makes it different and yet similar. It is impossible to¶ determine from which sphere--the common or the proper--the¶ face derives its singular expressivity. ¶ [54] In this the face is not unlike handwriting in which it¶ is impossible to draw the line between what makes this¶ signature at the same time common and proper, legible and¶ unique. We cannot say for certain whether this hand and¶ this face actualize a universal form, or whether the¶ universal form is engendered by these million different¶ scripts and faces. ¶ [55] Whatever being emerges, like handwriting, like the¶ face, on "a line of sparkling alternation" (20) between¶ language and word, form and expression, potentiality and¶ act. "This is how we must read the theory of those medieval¶ philosophers," Agamben writes, "who held that the passage¶ from potentiality to act, from common form to singularity,¶ is not an event accomplished once and for all, but an¶ infinite series of modal oscillations" (19).^15^ The coming¶ community is founded on the imperceptible oscillations of¶ whatever being. ¶ [56] But what, finally, might the *politics* of whatever¶ belonging be? ¶ [57] Agamben

envisions the coming politics not as a¶ hegemonic struggle between classes for control of the State,¶ but as an inexorable agon between whatever singularity and¶ state organization. What the State cannot digest is not the¶ political affirmations of identity (on the contrary), but¶ the formation of a community not grounded in any belonging¶ except for the human co-belonging to whatever being. ¶ [58] "What was most striking about the demonstrations of the¶ Chinese May," Agamben points out, "was the relative absence¶ of determinate contents in their demands" (85). ¶ [59] Here Agamben surely also has in mind the singular¶ example of May 68. I would even say _The Coming Community_¶ is (not unlike Vattimo's book) a belated response to the¶ radical promise--let's say (using the wrong idiom perhaps),¶ the promise of human happiness--exposed in that event. ¶ [60] In these works by two important Italian thinkers,¶ philosophy becomes once again, perhaps, a kind of¶ homesickness, a longing to belong. To a permanent¶ disorientation. To oscillation. To whatever.

A2: Alt Utopian The alternative is neither utopian nor impossible – embracing whatever being is key to emancipation. Prozorov, 9 – Professor of Political Science at the University of Helenski (Sergie, “The Appropriation of Abandonment: Giorgio Agamben on the State of Nature and the Political”, February 15 th, International Studies Association, http://www.allacademic.com/meta/p313215_index.html) In his analysis of contemporary world politics (1993; 63-65, 79-86; 2000, 73-90, 109-120), which goes beyond the critique of sovereignty to address the wider context of global capitalism from a post-Marxist perspective of e.g. Walter Benjamin and Guy Debord (see Passavant 2007, 149-153), Agamben offers a somewhat similar diagnosis of the dissolution of sovereignty in the global ‘society of the spectacle’, with three

his non-identitarian and antistatist politics does not seek control of the state but rather the deactivation of its powers and its expulsion from the domain of social life, which permits the rearticulation of zoe and bios in the figure of the integral form-of-life. Secondly, while the indirect powers of Schmitt’s lifetime were animated by a certain positive project of transformation, Agamben’s ethics of inoperosity brackets off the teleological dimension of politics and instead focuses on the free use of the ruins of the sovereign order rather than the reconstruction of a new order upon these ruins. Thirdly, these indirect powers are no longer defined in particularistic terms of class, race, ethnicity, etc. but in the neo-universalist terms of ‘whatever singularity’, which wagers on the important caveats that arise from the features of his post-sovereign politics addressed above. Firstly,

attainment of peace not through the reciprocity of mutual recognition under a better covenant but in the cessation of the struggle for recognition as such. What Agamben

proposes is the radicalization of the dismantlement of sovereign statehood by ‘whatever powers’ that are indiscernible in identitarian and statist terms. Concurring with Schmitt’s critique of the nihilistic and depoliticizing tendencies of global liberalism, Agamben nonetheless finds in this very degradation of politics that ‘all over the planet unhinges and empties traditions and beliefs, ideologies and religions, identities and communities’ (1993, 83) the possibility of a radically new form of political praxis. Whereas utopian thought easily provides us with elaborate visions of a better future, to which it can never lead us, since its site is by definition a nonplace, Agamben’s post-sovereign politics draws its austere resources from the very degradation of historical forms of life in the contemporary global state of exception and thus does not require the articulation of a new emancipatory project. While the conversion of the disastrous scene of contemporary nihilism into the ethos of integral life is not predetermined within history as its telos and rather requires a radical interruption of the historical process as such (see Prozorov 2009), any possible obstacles to such a conversion are presently removed by the process of the dissolution of particularistic communities, the emptying out of traditions and the liquidation of identities. It is for this reason that despite

the bleak and even morbid character of the subject-matter of Agamben’s writings, he is able to claim that he is far less pessimistic than his critical interlocutors (see Smith 2004). [The] planetary petty bourgeoisie is probably the form in which humanity is moving towards its own destruction. But this also means that the petty bourgeoisie represents an opportunity unheard of in the history of humanity that it must at all costs not let slip away. Because if instead of continuing to search for a proper identity in the already improper and senseless form of individuality, humans were to succeed in belonging to this impropriety as such, in making of the proper being- thus not an identity and an individual property but a singularity without identity, then they would for the first time enter into a community without presuppositions and without subjects. (Agamben 1993, 65)

Ontology First Our Interpretation is that ontological questions come before any political actions can take place-- it is a prerequisite to all political considerations Dillon, Prof of Politics- University of Lancaster, 99 [Michael, Moral Spaces p. 97-98] Heirs to all this, we find ourselves in the turbulent and now globalized wake of its confluence. As Heidegger-himself an especially revealing figure of the deep and mutual implication of the philosophical and the political4-never tired of pointing out, the

relevance of ontology to all other kinds of thinking is fundamental and inescapable. For one cannot say anything about any-thing that is, without always already having made assumptions about the is as such. Any mode of thought, in short, always already carries an ontology sequestered within it. What this ontological turn does to other-regional-modes of thought is to challenge the ontology within which they operate. The implications of that review reverberate through-out the entire mode of thought, demanding a reappraisal as fundamental as the reappraisal ontology has demanded of philosophy. With ontology at issue, the entire foundations or underpinnings of any mode of thought are rendered problematic. This applies as much to any modern discipline of thought as it does to the question of modernity as such, with the exception, it seems, of science, which, having long ago given up the ontological questioning of when it called itself natural philosophy, appears now, in its industrialized and corporatized form, to be invulnerable to ontological perturbation. With its foundations at issue, the very authority of a mode of thought and the ways in which it characterizes the critical issues of freedom and judgment (of what kind of universe human beings inhabit, how they inhabit it, and what counts as reliable knowledge for them in it) is also put in question. The

very ways in which Nietzsche, Heidegger, and other continental philosophers challenged Western ontology, simultaneously, therefore reposed the fundamental and inescapable difficulty, or aporia, for human being of decision and judgment. In other words, whatever ontology you subscribe to, knowingly or unknowingly, as a human being you still have to act. Whether or not you know or acknowledge it, the ontology you subscribe to will construe the problem of action for you in one way rather than another. You may think ontology is some arcane question of philosophy, but Nietzsche and Heidegger showed that it intimately shapes not only a way of thinking, but a way of being, a form of life. Decision, a fortiori political decision, in short, is no mere technique. It is instead a way of being that bears an understanding of Being, and of the fundaments of the human way of being within it. This applies, indeed applies most, to those mock -innocent political slaves who claim only to be technocrats of decision making.

Ontology precedes policy – policy without recognition of ontological flaws have been empirically bad Spanos 8 (William V, Professor of English at Binghamton University, Global American: The Devastation of Language Under the Dictatorship of the Public Realm, p. 172-173, Muse) PJ This argument against the Bush administration and its intellectual deputies by oppositional intellectuals is manifest. There is no question that

this presidential administration has gone farther than any other in the history of the U.S. to relocate the power to govern, constitutionally allocated jointly to the Congress, the judiciary, and the executive branches, in the presidency. And this revolutionary reactionary turn behooves oppositional intellectuals to resist this ominous political momentum, that is, to participate in politics, in a far more active way than heretofore. But this oppositional representation of the U.S.’s relation to the world, though true in part, is not finally commensurate with the sociopolitical realities of what the neoconservative deputies of the dominant culture have called the “American Century”—the global realities, that is, produced under the aegis of a commoditydriven techno-capitalist, and republican “America,” the America, in the phrase coined by Theodore Roosevelt, as “Leader of the Free World.” Nor, therefore, is the consequent tendency of recent American oppositional intellectuals to over-determine politics as the privileged site of resistance adequate to the imperatives of these global realities. In the following, all too brief remarks,

I want to suggest, not an a comportment towards political resistance that perceives the act of thinking as ontologically prior to, yet indissolubly related with politics. I have inferred this comportment from the decisive disintegration of the base/superstructure and/or disciplinary models of the representation of being enabled by the poststructuralist revolution, but, contrary to the poststructuralists’ tendency to restrict the implications of this revolution to the site of language (textuality) as such, I have, like alternative to this kind of disciplinary oppositional politics, but

Edward W. Said, understood this revolution as a historical and “worldly” one.2 More specifically, I read the “postmodern” revolution in

thinking, misnamed “theory” (from the Greek, theoria, to see) as

the precipitate of the fulfillment in postEnlightenment, capitalist/democratic America of the binary logic of the languages of Western civilization that had their origin in a metaphysical interpretation of being that reduces the many into the One, difference to Identity, be-ing to Being, or, in the binary that has not been emphasized enough, temporality into Spatial (or Territorialized) Object. In other words, I read this revolution as the coming to its end of a gradual but necessary and relentless process of reification—which is to say, of hardening and decay—that has rendered the originative language of thinking depthless: an abstract, quantitative, calculative, and instrumental—utterly thoughtless—sociopolitical agent of brutal violence, torture, mutilation, dispossession, death on those constituencies of the human community (and the land that sustains them) that this system of language and thought deem expendable, those who, in Michel Foucault’s phrase, do not prove “useful and docile” to the dominant culture.

The power of policymaking lies in its ability to construct a binary opposition between productive and flawed discussions; moving towards epistemological and ontological forms of kritik is key to examine the way in which policymaking predetermines all the answers. Bleiker, 00 Ph.D. visiting research and teaching affiliations at Harvard, Cambridge, Humboldt, Tampere, Yonsei and Pusan National University as well as the Swiss Federal Institute of Technology and the Institute of Social Studies in The Hague,(Roland, Popular Dissent, Human Agency and Global Politics, Cambridge University Press) An approach that specifies operational schemes recognises these limits to cognition. Instead of establishing a new and better theory of agency, it is content with formulating a framework that facilitates understanding of how human agency is incessantly constituted and reconstituted in the context of transversal struggles. Expressed in de Certeau's language, one

must comprehend forms of action in the context of their regulatory environment. Such an approach departs from ways in which traditional philosophy (and, by extension, international theory) has framed the understanding of human action. This framing process has revolved around three ways of explaining action: teleological, causal and intentional. 39 My analysis breaks with most elements that are entailed in this mode of analysis. It

does not assume that agency can be assessed only by establishing links between means and ends. It does not assume that every form of agency needs an identifiable agent that causes an identifiable outcome. It does not assume that agency occurs only if it stands in a relationship with a declared intention. What is left of the concept of human agency if one no longer relies upon causal, teleological and intentional explanations? The Interlude situated between chapters 7 and 8 deals with this question at a conceptual level. Its objective is to outline a framework that facilitates an understanding of the discursive conditions that are necessary for the exertion of human agency. From this vantage point, the

most potent forms of transversal dissent operate in tactical, rather than strategic ways. They move along an indeterminate trajectory, transgress political boundaries and slowly transform values. They becomes visible and effective only through maturation over time and space. A further deconstruction of the notion of discourse is necessary to appreciate the unfolding of transversal dissent through tactic and temporality. Despite their power to frame the world, discourses are not monolithic forces that crush everything in sight. They are often thin, unstable, fragmented. They contain cracks. By moving from epistemological to ontological levels of analysis, the inquiry explores the ways in which people can resist discursive domination (chapter 7). Human beings have hyphenated identities. Furthermore, these identities are not frozen in time, but part of a constantly unfolding process of becoming. By tapping into these multiple and shifting dimensions of Being, individuals are able to think and act beyond the narrow confines of the established discursive order. They engage in everyday forms of resistance that allow them to reshape the social context in which they are embedded. Such forms of discursive dissent can be found in countless seemingly insignificant daily acts of defiance. They

transform values, transgress boundaries and may eventually promote social change far more effectively than the so-called great events of international politics.

Framework

Autonomy

Autonomy Requires Freedom from Negative Restraints Autonomy requires freedom from coercion, constraint, threat of punishment and constraint from social mores Mendus, Susan; 1987 (Morrell Fellow in Toleration at York, and from 1995 to 2000 she was Director of the Morrell Studies in Toleration Programme, former Academic Co-ordinator for Social Sciences. She was elected a fellow of the British Academy in 2004. ("Liberty and Autonomy," Proceedings of the Aristotelian Society, New Series, Vol. 87 (1986 - 1987), pp. 107-120 Published by: Wiley on behalf of The Aristotelian Society Stable URL: http://www.jstor.org/stable/4545058 Accessed: 28/07/2013 21:46) We may define the autonomous agent as one who acts in obedience to a law which he has prescribed for himself. This characterization of autonomy captures three crucial features of the concept: firstly, the autonomous agent must be in a position to act. He must not be compelled by external forces such as torture or the threat of legal punishment. Secondly, the autonomous agent's actions must be performed in obedience to a law: he must not be pathologically driven by desires or impelled by irresistible urges which are such as to undermine his rationality. He must, in short, be a rational free chooser. Thirdly, and finally, the autonomous agent must himself create or prescribe the law to which he is obedient: in addition to being independent of others' coercive actions he must also be independent of their will. Thus, the agent who conforms, more or less unthinkingly, to the custom and practice of his day, may be said not to be properly autonomous, since his will is determined by the will of those around him. This characterization of autonomy therefore requires that the agent possess not only the standard negative liberties (freedom from coercion, constraint, and threat of punishment), but also freedom from the suffocating constraint of social mores and customs (from what Mill calls 'the tyranny of public opinion'), and it appears to follow from this that autonomy-based liberalism will promote a tolerant and plural society, since it will emphasize the need for a wide range of choices amongst possible life-styles as a necessary condition of autonomy.

Autonomy is a Prerequisite to Morality Autonomy is necessary for morality, autonomy gives us the power to self determine morals Daniel Callahan, Senior Research Scholar and President Emeritus of the Center, Senior Lecturer at the Harvard Medical School and is now a Senior Scholar at Yale. He received his B.A. from Yale and a Ph.D in philosophy from Harvard. 10/1986, A Moral Good, Not a Moral Obsession, The Hastings Center, Vol. 14, No. 5, Autonomy, Paternalism, and Community, Date Accessed- 7/21/2013

A major attraction of the concept of autonomy is that it helps to establish moral independence. Not only does it entail that, as an individual, I am to be treated by others as a moral end rather than a moral means, it also requires that they allow me to pursue my own moral goods. Autonomy can thus be understood as the basis for moral enfranchisement, establishing my standing as an equal in the community and my liberty to pursue my own ends. In the context of medicine, it is a value that has served to establish the rights of patients over physicians, and the right to be spared the paternalistic interventions of those who think they understand my welfare better than I do. The

purpose of autonomy is to make me my own moral master. But if autonomy may serve me in some fundamental ways, what would it be like to live in a community for which autonomy was the central value? What kind of a medical practice might emerge with patient autonomy as the sole goal? Let me try to answer that question by first reviewing some of the benefits of giving moral priority to autonomy. Among them are a recognition of the rights of individuals and of their personal dignity; the erection of a powerful bulwark against moral and political despotism; a becoming humility about the sources or certainty of moral claims and demands; and a foundation for the protection of unpopular people and causes against majoritarian domination. Those are powerful benefits, to be meddled with only at our peril. Nonetheless, I believe that if autonomy is made the moral goal of a society, or of medical care within that society, then we are equally at peril in our common life together.

Morality is determined by Autonomy; nothing and no one has the ability to tell us how we make Moral judgment calls, including any form of social regulation Schneewind, J.B. Emeritus Professor of Philosophy Johns Hopkins University 1992 The Cambridge Companion to Kant: 10 – Autonomy, obligation, and virtue pg. 309 – 310 http://universitypublishingonline.org/cambridge/companions/chapter.jsf?bid=CBO9781139000536&cid =CBO9781139000536A014 Date Accessed: 7/24/13 At the center of Kant's ethical theory is the claim that normal adults are capable of being fully selfgoverning in moral matters. In Kant's terminology, we are "autonomous." Autonomy involves two components. The first is that no authority external to ourselves is needed to constitute or inform us of the demands of morality. We can each know without being told what we ought to do because moral requirements are requirements we impose on ourselves. The second is that in self-government we can effectively control ourselves. The obligations we impose upon ourselves override all other calls for action, and frequently run counter to our desires. We nonetheless always have a sufficient motive to act as we ought. Hence no external source of motivation is needed for our self-legislation to be effective in controlling our behavior. Kant thinks that autonomy has basic social and political implications. Although no one can lose the autonomy that is a part of the nature of rational agents, 3 social arrangements and the actions of others can encourage lapses into governance by our desires, or heteronomy. Kant, as we shall see, found it difficult to explain just how this could happen,- but he always held that the moral need for our autonomy to express itself was incompatible with certain kinds of social regulation. There is no place for others to tell us what morality requires, nor has anyone the authority to do so - not our neighbors, not the magistrates and their laws, not even those who speak in the name of God. Because we are autonomous, each of us must be allowed a social

space within which we may freely determine our own action. This freedom cannot be limited to members of some privileged class. The structure of society must reflect and express the common and equal moral capacity of its members.

Autonomy-Protects Free Speech Autonomy recognizes and preserves free speech. Daniel J. Solove, 2003, Associate Professor, Seton Hall Law School, The Virtues of Knowing Less: Justifying Privacy Protections against Disclosure, Duke Law Journal, http://www.jstor.org/stable/1373222

One of the most frequently articulated rationales for the value of free speech is that it promotes individual autonomy.94 As one commentator observes, the "value of free expression..,. rests on its deep relation to self-respect arising from autonomous self-determination."95 The disclosure of personal information about others certainly falls within the autonomy of the speaker. Respect for autonomy requires recognition of strong rights of selfexpression. Disclosure protections thus impair the autonomy of speakers who desire to speak about others. Additionally, free speech can be justified in terms of the autonomy of the listener.96 Under this view, free speech protects people's freedom of information consumption. Disclosure protections prevent people from hearing information that they want to know.

Autonomy-Individual Autonomy is to be preferred in an individual sense, societal autonomy goals are problematic Daniel Callahan, Senior Research Scholar and President Emeritus of the Center, Senior Lecturer at the Harvard Medical School and is now a Senior Scholar at Yale. He received his B.A. from Yale and a Ph.D in philosophy from Harvard. 10/1986, A Moral Good, Not a Moral Obsession, The Hastings Center, Vol. 14, No. 5, Autonomy, Paternalism, and Community, Date Accessed- 7/21/2013

If we ask what system of values might be best for our individual welfare and desires, then autonomy is a prime candidate. But if we ask what system of values might be best for our life in community, for sustaining a viable society and culture, then autonomy may fare less well. We need to give some thought to that latter question. Yet, in doing so, we may well grant that the notion of autonomy, especially patient autonomy, has hardly become triumphant in the daily life of medicine; in fact, it is probably still more curtailed or denied than honored. We may also grant the powerful tendency of technological medicine to dehumanize and depersonalize, to efface or erase individuality, to attend to our organs and parts rather than our persons. Nor need we deny that, faced with budget pressures and cuts, individual welfare and freedom of choice are likely to be the first victims. In short, it

may seem churlish or precious to question the value of autonomy in a medical system that only precisely because autonomy has so often been held up as the value of the future, the ideal yet to be achieved, it is well to ask what that future might look like. The trouble with wanting one's dreams to come true is that they may come true. yesterday first heard of the idea and even today tends to neglect it. Yet

Autonomy-Consent Necessary for Morality Moral obligations can only be self accepted Daniel Callahan, Senior Research Scholar and President Emeritus of the Center, Senior Lecturer at the Harvard Medical School and is now a Senior Scholar at Yale. He received his B.A. from Yale and a Ph.D in philosophy from Harvard. 10/1986, A Moral Good, Not a Moral Obsession, The Hastings Center, Vol. 14, No. 5, Autonomy, Paternalism, and Community, Date Accessed- 7/21/2013

Let us¶ grant that others should honor my¶ autonomy and that I should honor theirs.¶ Yet if I should have (or believe I have)¶ moral¶ obligations toward others, could I be¶ relieved of them¶ by their declaration of au-¶ tonomy in the face of my obligations? If,¶ for example, a physician believes that he¶ or she has an obligation to save the life of¶ another, but that person wants to die, is¶ that¶ obligation nullified or overridden by¶ the¶ patient's declaration? The common autonomy doctrine would say it is. For if patients are to be their own moral¶ agents,¶ choosing their own moral good, then no¶ one, it would seem, could have moral obligations to them that they did not choose to¶ allow. If that is the case, we are still left¶ with a troubling puzzle. Are we to under-¶ stand that the physician's obligation vanishes once autonomy has been declared, or¶ that it continues to exist but has been over-¶ ridden by a higher value? If the former is¶ the case, the¶ obligation seems to have no¶ basis whatsoever; if the latter is the case,¶ then the conscience of the¶ physician seems¶ a fragile, disposable matter.¶

There is no absolute morality, rather it is determined by ourselves with our autonomy. Further, only a consenting agreement can create moral obligations outside of respecting others autonomy. Daniel Callahan, Senior Research Scholar and President Emeritus of the Center, Senior Lecturer at the Harvard Medical School and is now a Senior Scholar at Yale. He received his B.A. from Yale and a Ph.D in philosophy from Harvard. 10/1986, A Moral Good, Not a Moral Obsession, The Hastings Center, Vol. 14, No. 5, Autonomy, Paternalism, and Community, Date Accessed- 7/21/2013

If (to be reminded of Wittgenstein) we look not for the meaning of autonomy but for its social uses, what do we see? 1. As moral agents, we are essentially independent of each other and isolated; we are not social animals, but morally self-en- closed, self-encompassing animals. 2. There can be no moral truth or wisdom about individual moral goods and goals and few if any about communal ends; morality is inherently subjective and relativistic. 3. The ideal relationship among human beings is the voluntary, contractual relationship of consenting adults; the community has no standing to say what is good or bad in such relationships. 4. In any weighing of the relative interests of individual and community, the bur- den of proof is always upon the community to prove its case for restricting the liberty of individuals. 5. The only moral obligations I have toward others are those I voluntarily under- take; there can be no such thing as an in- voluntary moral obligation. 6. The only moral obligations that oth- ers have toward me are those that autonomously I allow them to have; all I am owed by others is respect for my autonomy. 7. Respect for the autonomy of others is sufficient ground for overriding my own conscience.

Moral obligations can must be agreed to by all other parties involved, if one disagrees, they are an coercive attempt to violate their autonomy Daniel Callahan, Senior Research Scholar and President Emeritus of the Center, Senior Lecturer at the Harvard Medical School and is now a Senior Scholar at Yale. He received his B.A. from Yale and a Ph.D in philosophy from Harvard. 10/1986, A Moral Good, Not a Moral Obsession, The Hastings Center, Vol. 14, No. 5, Autonomy, Paternalism, and Community, Date Accessed- 7/21/2013 To¶ go one step further, does a respect for autonomy mean that we are not allowed to¶ imagine a good for others beyond that¶ which¶ they imagine for themselves? Or¶ that we are not allowed to¶ persuade others¶ that their autonomous moral choices are¶ wrong, or defective, or less valuable than¶ they might be? Of course we are allowed¶ to do those¶ things. The

moral autonomy of¶ others does not rule out noncoercive attempts to persuade them to think or act differently. What we cannot do is to

impose¶ our values, or the dictates of our con-¶ science, upon them against their will.¶ Does it then follow that the¶ only moral¶ obligations we can owe to autonomous¶ moral agents are those¶ formally agreed to¶ by them in some contractual manner? Apparently so. We can talk with them, exhort¶ them, attempt to persuade them. What we¶ cannot do, under the¶ implicit mutual contract, is to go one step beyond the contract,¶ however¶ powerful our sense of obligation¶ might be or however powerful our alternative notions of what would serve the moral¶ interests of another. The very point of the¶ moral¶ autonomy of another is to empower¶ his or her¶ personal liberty and to restrict¶ that of others toward him or her.¶ Only a¶ voluntary ceding or suspension of autonomy rights can change the nature of that¶ relationship with others.

A2: Prefer Justice Autonomy supersedes justice- justice is based off of the idea of self preference Daniel Callahan, Senior Research Scholar and President Emeritus of the Center, Senior Lecturer at the Harvard Medical School and is now a Senior Scholar at Yale. He received his B.A. from Yale and a Ph.D in philosophy from Harvard. 10/1986, A Moral Good, Not a Moral Obsession, The Hastings Center, Vol. 14, No. 5, Autonomy, Paternalism, and Community, Date Accessed- 7/21/2013

It is sometimes said that¶ justice is powerful¶ enough to supersede autonomy, and¶ it is true that most theories of¶ justice allow¶ the¶ suppression or overriding of individual¶ liberty under some circumstances. Yet the¶ most popular and influential¶ contemporary¶ theories of justice (at least in the United¶ States) see the source of a theory of justice¶ in individual needs and¶ desires, and the¶ outcome of a¶ reign of justice as the enthronement of individual¶ autonomy. Justice becomes little more than a¶way station¶ on the road to self-determination.¶

Maslow’s Hierarchy of Needs

Maslow’s Hierarchy Does Not Exist There’s no evidence a Hierarchy of Needs exists. Steve Denning; 2012 (A writer about radical management, leadership, innovation & narrative3/29/2012 ("What Maslow Missed”, Forbes.http://www.forbes.com/sites/stevedenning/2012/03/29/what-maslow-missed/, Date Retrieved: July 27, 2013) In reviews of research based on Maslow’s theory, little evidence has been found for the ranking of needs that Maslow described, or even for the existence of a definite hierarchy at all.¶ “Here’s the problem with Maslow’s hierarchy,” explains Rutledge. “None of these needs — starting with basic survival on up — are possible without social connection and collaboration…. Without collaboration, there is no survival. It was not possible to defeat a Woolley Mammoth, build a secure structure, or care for children while hunting without a team effort. It’s more true now than then. Our reliance on each other grows as societies became more complex, interconnected, and specialized. Connection is a prerequisite for survival, physically and emotionally.”¶ “Needs are not hierarchical. Life is messier than that. Needs are, like most other things in nature, an interactive, dynamic system, but they are anchored in our ability to make social connections. Maslow’s model needs rewiring so it matches our brains. Belongingness is the driving force of human behavior, not a third tier activity. The system of human needs from bottom to top, shelter, safety, sex, leadership, community, competence and trust, are dependent on our ability to connect with others. Belonging to a community provides the sense of security and agency that makes our brains happy and helps keep us safe.”

Morality

Morality: Deontology is Best – Rights Prove Liberal theory prefers deontology Jeremy Waldron, professor at NYU school of law specializing in constitutional theory, law and philosophy, legal philosophy and political theory. “moral autonomy and personal autonomy” accessed 7/21/13. http://philosophy.la.psu.edu/jchristman/autonomy/Waldron.pdf There are several ways in which we may understand a claim that the right has priority over the good. (1) It may be understood as a claim about the deontological character of political morality - as a denial of consequentialism, for example. The idea here would be that we do not construct our political morality by figuring out, first, what is valuable and, secondly, how best to promote it; instead we establish certain moral absolutes - rights, for example - deontologically, without reference to the goals that it might be worthwhile for individuals or societies to.69 Or (2) the priority of the right over the good may be understood as a claim about the relation between individual aspirations and the social demands of morality. People have their own individual conceptions of the good, but these are subject to the demands of right conceived as a system of morally reconciling individual ends

Morality: Intention is Key to Morality Intent rather than result matters. The only relevant thing to the morality of an action is a good will. Johnson, Robert, "Kant's Moral Philosophy", The Stanford Encyclopedia of Philosophy (Summer 2010 Edition), Edward N. Zalta (ed.) .Date Accessed: 7/23/13 In Kant's terms, a good will is a will whose decisions are wholly determined by moral demands or as he often refers to this, by the Moral Law. Human beings view this Law as a constraint on their desires, and hence a will in which the Moral Law is decisive is motivated by the thought of duty. A holy or divine will, if it exists, though good, would not be good because it is motivated by thoughts of duty. A holy will would be entirely free from desires that might operate independently of morality.

It is the presence of desires that could operate independently of moral demands that makes goodness in human beings a constraint, an essential element of the idea of ‘duty’. So in analyzing unqualified goodness as it occurs in imperfectly rational creatures such as ourselves, we are investigating the idea of being motivated by the thought that we are constrained to act in certain ways that we might not want to, or the thought that we have moral duties. Kant confirms this by comparing motivation by duty with other sorts of motives, in particular, with motives of self-interest, self-preservation, sympathy and happiness. He argues that a dutiful action from any of these motives, however praiseworthy it may be, does not express a good will. Assuming an action

has moral worth only if it expresses a

good will, such actions have no genuine ‘moral worth’. The conformity of one's action to duty in such cases is only related by accident to content of one's will. For instance, if one is motivated by happiness alone, then had conditions not conspired to align one's duty with one's own happiness one would not have done one's duty. By contrast, were one to supplant any of these motivations with the motive of duty, the

morality of the action would then express one's determination to act dutifully under any circumstances. Only then would the action have moral worth. Kant's views in this regard have understandably been the subject of much controversy. Many object that we do not think better of actions done for the sake of duty than actions performed out of emotional concern or sympathy for others, especially those things we do for friends and family. Worse, moral worth appears to require not only that one's actions be motivated by duty, but also that no other motives, even love or friendship, cooperate. Yet Kant's defenders have argued that his point is not that we do not admire or praise motivating concerns other than duty, only that from the point of view of someone deliberating about what to do, these concerns are not decisive in the way that considerations of moral duty are. What

is crucial in actions that express a good will is that the motivational structure of the agent be arranged so as to give considerations of duty priority over all other interests. It does not require or even recommend a rule-bound character devoid of the warmth of human emotion. Suppose for the sake of argument we agree with Kant. We now need to know what distinguishes the principle that lays down our duties from these other motivating principles, and so makes motivation by it the source of unqualified value.

Morality is based on intention; not consequences Sayre McCord. Kant’s Grounding for the Metaphysics of Morals; A very brief selective summary of sections I and II © 2000 http://www.unc.edu/~gsmunc/phil22/Kantsum.pdf Date Accessed: 7/23/13 If a good will is unconditionally good then its value, Kant points out, cannot depend upon its having good effects. For if its value did depend on its having good effects it would be valuable only on the condition that it had those effects. Take away the effects and you would take away the source of its value. Since its value is (by assumption only, so far) unconditional, it must then be valuable even absent its having any good effects. Its value must be contained within it. Kant supposes that we all have at least some idea of what he is referring to in speaking of a good will. Loosely speaking, it is the determination to do what, in effect, reason requires as right period. (394-394)

Utilitarianism is best for Determining Political Morality Utilitarianism is the best moral philosophy for political action and discussions Shaw, Philosophy Professor, 1999 (William H. Shaw, 1999, Philosophy and Chair of the Philosophy at SJSU, “contemporary ethics: taking account of utilitarianism” p 171-2) Utilitarianism ties right and wrong to the promotion of well-being, but it is not only n personal ethic or a guide to individual conduct. lt is also a "public philosophy°" - that is, a normative basis for public policy and the structuring of our social, legal, and political institutions. Indeed, it was just this aspect of utilitarianism that primarily engaged Bentham, john Stuart Mill, his father James, and their friends and votaries. For them utilitarianism was, first and foremost, a social and political philosophy and only secondarily a private or personal moral code. In particular, they saw utilitarianism as providing the yardstick by which to measure, assess, and, where necessary, reform government social and economic policy and the judicial institutions of their day. In the public realm,

utilitarianism is especially compelling. Because of its consequentialist character, a utilitarian approach to public policy requires officials to base their actions, procedures, and programs on the most accurate and detailed understanding they can obtain of the circumstances in which they are operating and the likely results of the alternatives open to them. Realism and empiricism are the hallmarks of a utilitarian orientation, not customary practice, unverified abstractions, or wishful Promotion of the well being of all seems to be the appropriate, indeed the only sensible, touchstone for assessing public policies and institutions, and the standard objections to utilitarianism as a personal morality carry little or no weight against it when viewed as a public philosophy. Consider, for instance, the criticisms that utilitarianism is too impersonal and ignores one's individual attachments and personal commitments, that it is coldly calculating and concerned only with maximizing, that it demands too much of moral agents and that it permits one to violate certain basic moral restraints on the treatment of others. The previous two chapters addressed sorne of these criticisms; others will be dealt with in Chapter 8. The point here, though, is that far

from undermining utilitarianism as a public philosophy, these criticisms highlight its strengths. We want public officials to be neutral, impersonal. and detached and to proceed with their eyes firmly on the effects of the policies they pursue and the institutions that their decisions shape. Policy making requires public officials to address general issues, typical conditions. and common circumstances. Inevitably, they must do this through general rules, not on a case by case basis. As explained later in this chapter, this fact precludes public officials from violating the rights of individuals as a matter of policy. Moreover, by organizing the efforts of countless individuals and compelling each of us to play our part in collective endeavors to enhance welfare, public officials can make it less likely that utilitarianism will demand too much of any one individual because others are doing too little.

Utilitarians — will seek to direct and coordinate people's actions through effective public policy and to reshape, in utilityenhancing ways, the institutions that structure the choices people face. By doing so, utilitarians can usually accomplish more good than they can through isolated individual action, however dedicated and well intentioned. For this reason, they will strive to Easter institutions that false over from individuals much of the task of promoting the general welfare of society. General welfare is a broad goal, of course, and sensible policies and institutions will typically focus on more specific desiderata such as promoting productivity, increasing individual freedom and opportunity, improving people’s physical health, guaranteeing their personal security, and so on — that contribute significantly to people's well-being. Implementing even there goals can prove difficult. Furthermore, many of the problems facing society have no simple answers because they are tangled up with contested issues of fact and controversial questions of psychology, sociology, and economics. To the extent that utilitarians disagree among · themselves over these matters, their policy recommendations will diverge. Nevertheless, by clarifying what is at stake and continually orienting discussion toward the promotion of well-being, a. utilitarian approach provides the necessary framework for addressing questions of institutional design and for fashioning effective public policy. The present chapter explicates the utilitarian approach to three matters that have long engaged social and political philosophers and that concern.

Consequentialism is best for Determining Morality of Policies The morality of policies are determined by their consequences David Sanford Horner, 2005 (Policies for a ‘nanosociety’: Can we learn now from our future mistakes? 2005 - bibliotecavirtual.clacso.org.ar) At the same time Moor wishes to retain the notion that consequences count that is that ‘…the evaluation of a given policy requires the evaluation of the consequences and often the consequences of that policy compared with other consequences of other possible policies’ (Moor, 1999, p.66). Moor’s approach involves two stages. Firstly, the application of an ‘impartiality test’ and then secondly the appraisal of the various outcomes and consequences of actions and policies, weighing the good consequences and the bad consequences, of those policies surviving the impartiality test. In the first stage deliberation takes place over the various policies to determine whether or not they meet ethical criteria. A policy is determined to be ethical if (a) it does not cause any unnecessary harm to individuals and groups and (b) it supports individual rights, the fulfilling of duties etc. In the second stage the best policy is selected ‘from the set of just policies arrived at in the deliberation stage by ranking ethical policies in terms of benefits and (justifiable) harms’. In carrying out this evaluation of policies we are required to: ‘…(a) weigh carefully between the good consequences and bad consequences in ethical policies, and (b) distinguish between disagreements about facts and disagreements about principles and values, when deciding which ethical policy should be adopted’ (Tavani, 2004, 60 – 61).

A2: Human Rights/Rights More Important Than Consequentialism A government’s first obligation is to protect its citizens and have a consequential concern for their survival and success. Harries explains that governments must weigh consequences Owen Harries, editor and founder of National Interest, Senior Fellow at Centre for Independent Studies, Spring 1993/1994, “Power and Civilization,” The National Interest. Performance is the test. Asked directly by a Western interviewer, “In principle, do you believe in one standard of human rights and free expression?”, Lee immediately answers, “Look, it is not a matter of principle but of practice.” This might appear to represent a simple and rather crude pragmatism. But in its context it might also be interpreted as an appreciation of the fundamental point made by Max Weber that, in politics, it is “the ethic of responsibility” rather than “the ethic of absolute ends” that is appropriate. While an individual is free to treat human rights as absolute, to be observed whatever the cost, governments must always weigh consequences and the competing claims of other ends. So once they enter the realm of politics, human rights have to take their place in a hierarchy of interests, including such basic things as national security and the promotion of prosperity. Their place in that hierarchy will vary with circumstances, but no responsible government will ever be able to put them always at the top and treat them as inviolable and over-riding. The cost of implementing and promoting them will always have to be considered.

Social Contracts

Locke’s Social Contract Protects Citizens from Violence The purpose of Locke’s social contract is to protect the people from violence Hayman 1991 (Steven J, Assistant Professor of Law, Chicago-Kent College of Law, Illinois Institute of Technology, THE FIRST DUTY OF GOVERNMENT: PROTECTION, LIBERTY AND THE FOURTEENTH AMENDMENT, Duke Law Journal, http://scholarship.law.duke.edu/cgi/viewcontent.cgi?article=3172&context=dlj) Date accessed: 7/26/13

In a state of nature, however, an individual often lacks the power to defend himself against invasion by others, rendering the enjoyment of his rights "very unsecure.' '32 For this reason, individuals agree to form a community "for the mutual Preservation of their Lives, Liberties and Estates," which Locke comprehensively termed "Property.'33 Under the terms of this compact, each individual gives up his natural power to act for his own preservation "to be regulated by the Laws made by the Society, so far forth as the preservation of himself, and the rest of that Society shall require." 34 In addition, he "engages his natural force.., to assist the Executive Power of the Society, as the law thereof shall require." 35 In return, the individual obtains not only benefits from "the labor, assistance, and society of others in the same Community," but also protection from its whole strength."36 In

short,

according to Locke, the end of government is to direct "the force of all the subjects of the commonwealth" for the purpose of "preserving the members of the commonwealth in peace from injury and violence." 37 Locke emphasized that, because government is established for this purpose, it is "obliged" to secure every individual's life, liberty, and property.38 When it acts contrary to this trust, the government is dissolved and the community regains the right to establish a new form of government.39 Such dissolution occurs, in Locke's view, where the government invades the rights of subjects, or where it fails to use its power to secure those rights Locke implied that the Glorious Revolution of 1688, in which King James II was dethroned and replaced by William and Mary, was justified on these grounds.

Social Contracts Must be Backed by Force Social Contract must be backed by force Hobbes, Thomas, 1651, Leviathan (https://scholarsbank.uoregon.edu/xmlui/bitstream/handle/1794/748/leviathan.pdf) A COMMONWEALTH [Society] by acquisition is that where the sovereign power is acquired by force; and it is acquired by force when men singly, or many together by plurality of voices for fear of death, or bonds, do authorize all the actions of that man, or assembly, that hath their lives and liberty in his power. And this kind of dominion, or sovereignty, ¶ [differs] from sovereignty by institution only in this, that men who choose their sovereign do it for fear of one another, and not of him whom they institute: but in this case, they subject themselves to him they are afraid of. In both cases they do it for fear: which is to be noted by them that hold all such covenants, as proceed from fear of death or violence, void: which, if it were true, no man in any kind of Commonwealth could be obliged to obedience. ¶ It is true that in a Commonwealth once instituted, or acquired, promises proceeding from fear of death or violence are no covenants, nor obliging, when the thing promised is contrary to the laws; but the reason is not because it was made upon fear, but because he that promiseth hath no right in the thing promised. Also, when he may lawfully perform, and doth not, it is not the invalidity of the covenant that absolveth him, but the sentence of the sovereign. Otherwise, whensoever a man lawfully promiseth, he unlawfully breaketh: but when the sovereign, who is the actor, acquitteth him, then he is acquitted by him that extorted the promise, as by the author of such absolution.

Social Contracts Balance Individualism and Cooperation The Social Contract respects individuality and preserves cooperation, which ensures the survival of society – Respect of the private sphere is essential to this concept Michel Rosenfeld, 1985, Professor of Law, New York Law School, Contract and Justice: The Relation Between Classical Contract Law and Social Contract Theory, Iowa Law Review, 70 Iowa L. Rev. 769, Lexis.

For those who share the liberal ideal of achieving the greatest possible autonomy for each individual compatible with both equal autonomy for all and the degree of social cooperation necessary to insure the survival of society, the conjunction of the social contract with freedom of contract seems highly desirable. Indeed, this conjunction not only permits neutrality with respect to individual visions of the good, but also strictly limits the realm of individual obligations. These results are achieved by dividing the universe of social relationships into the two separate and distinct spheres of the public and the private. The terms of the social contract govern the relationships in the public sphere and impose a limited number of obligations owed by each party to the social contract to all the other parties ot it. Freedom of contract, on the other hand, operates in an extensive private sphere in which individual obligations are limited to those arising out of particular legal contracts and extend only to the other party or parties to such contract. n4 Thus, in

the private sphere, no obligation is owed to anyone unless it has been freely chosen, and, even then, it is only owed to the limited number of individuals to whom the obligor has freely chosen to make a commitment.

Social Contracts Protect Justice and Rule of Law Social Contracts protect rule of law and procedural justice. Michel Rosenfeld, 1985, Professor of Law, New York Law School, Contract and Justice: The Relation Between Classical Contract Law and Social Contract Theory, Iowa Law Review, 70 Iowa L. Rev. 769, Lexis. As we have seen, individualism gives rise to circumstances of justice. n60 To

look to individualism for independent criteria of compensatory and distributive justice, however, is problematic inasmuch as individualism is committed to allowing each individual to pursue his or her own conception of the good. If an independent criterion of justice required any particular conception of the common good, it would be bound to thwart some individual conceptions of the good and thus contradict the normative aims of individualism. On the other hand, if compensatory and distributive justice could be achieved by purely procedural means that would not require any individual to abandon his or her own conception of the good, then individualism's need for justice could presumably be fulfilled without sacrificing society's neutrality toward individual conceptions of the good. Contract appears to supply the means towards purely procedural justice in the context of an individualist society. Indeed, absent any objective or intersubjective criterion of justice, using contract to achieve purely procedural justice has at least two major advantages: it preserves individual autonomy while bringing about the necessary degree of social cooperation, and it balances conflicting self-interests without requiring any individual to compromise his or her conception of the good.

Social Contract Requires Protection of Citizen’s Property A government must protect the property of its citizens Casman, Betsey Sue. Master of Arts in Ethics and Policy Studies. 2011. "The Right to Privacy in Light of the Patriot Act and Social Contract Theory". http://digitalscholarship.unlv.edu/cgi/viewcontent.cgi?article=2087&context=thesesdissertations. Date Accessed 7/21/13. The power to protect property is ceded to the government. Locke describes this commonwealth ; “And thus the commonwealth comes by a power to set down what punishment shall belong to the several transgressions which they think worthy of it, committed amongst the members of that society (which is the power of making laws) as well as it has the power to punish any injury done unto any of its members by any one that is not of it (which is the power of war and peace); and all this for the preservation of the property of all the members of that society as far as possible” (Locke 2002, 39). This is how Locke defines the extent of the power of government; it is to protect the property of its members. Property is understood to mean life, liberty, and estate. Locke is quite clear that the only role of this legislative control is that which emulates that which man had in the state of nature. The protection of property of man (including his own life) is that goal and nothing more

Conractarianism Protects Governments and Society Contractarianism and Social Contracts protect the government and society. Michel Rosenfeld, 1985, Professor of Law, New York Law School, Contract and Justice: The Relation Between Classical Contract Law and Social Contract Theory, Iowa Law Review, 70 Iowa L. Rev. 769, Lexis. The maximum potential for contract is reached under the contractarian paradigm. Indeed,

for the contractarian not only is contract just, but it is just because it is contract. At the level of deep structure, then, the contractarian vision postulates that to be just, human relationships must ultimately be based on the mutual consent of all affected persons. The theory of the social contract naturally complements such a vision. Social contract [*805] theory seeks to construct a philosophically coherent account of the legitimacy of the state and of political institutions that ultimately rests on the mutual consent of the governed. Moreover, the principal vehicle of the contractarian vision is the contractual device which supplies the means for achieving pure procedural justice. Finally,

accompanying all this is a body of law that serves the contractarian aim of providing each individual as much freedom to enter into, and to give shape to, contractual relationships as is compatible with an equal freedom for every other individual. In sum, the maximum potential of contract emerges from the deep structure of the contractarian vision. In that context, the contractual device, social contract theory, and a body of contract law supporting freedom of contract would work in harmony to achieve the kind of purely procedural justice designed to bring about the optimal equilibrium between autonomy and welfare.

A2: Utilitarianism Upholds Social Contract Utilitarianism does not uphold the Social Contract- Impossible to know other’s conception of good. Michel Rosenfeld, 1985, Professor of Law, New York Law School, Contract and Justice: The Relation Between Classical Contract Law and Social Contract Theory, Iowa Law Review, 70 Iowa L. Rev. 769, Lexis.

Another advantage of the contractarian position is that it respects each individual's conception of the good. n175 Initially, utilitarianism may appear [*807] similarly committed, but the process whereby the utilitarian arrives at the formulation of the common good -- the use of the impartial spectator metaphor -- raises a vexing problem. In real life, the impartial spectator would have to be an individual or a group of individuals and, as such, would lack two attributes essential to the impartial spectator theory: thorough impartiality and complete empathy. Indeed, it appears impossible for one individual, harboring his or her own conception of the good, to reproduce another's conception of the good without filtering it through his or her own notions. And even if that were possible, it is highly unlikely that one could exactly reproduce the quality and intensity of another's emotions. Furthermore, allowing an individual to decipher and interpret another's conception of the good appears just short of allowing that individual to judge and criticize the other's perception of self-interest. Mill himself actually took that step by making a distinction between individuals' "real" interests and their "apparent" interests. n176 Once this distinction is permitted, the impartial spectators can use the dichotomy between real and apparent interests to impose their own conception of the good on others. Thus, the

utilitarian appears less likely than the contractarian to promote strict respect for individual conceptions of the good.

Justice

Kantian Justice Requires Restrictions on Freedom by Laws Kantian conceptions of justice require external restrictions on freedom by laws to prevent infringing on others’ freedom Rosen, Allen D. , author “Kant’s Theory of Justice” 1993 published by Cornell university accessed: 7/21/13 http://books.google.com/books?id=U35BsCUu28C&printsec=frontcover&dq=kant's+theory+of+justice+allen+D.+rosen&hl=en&sa=X&ei=RkrsUe upB6nYigKl_oGYAg&ved=0CC0Q6AEwAA#v=onepage&q=kant's%20theory%20of%20justice%20allen%20 D.%20rosen&f=false The same underlying conception of justice is present in all of Kant’s laws and principles of justice. The “universal law of justice” in the Rechtslehre, for instance, commands us to “act externally in such a way that the free use of your will can be compatible with the freedom of everyone else according to a universal law.” Employing much the same language, the “principle of innate freedom” in the Rechtslehre asserts that “freedom (independence from the constrain of another’s will) insofar as it is compatible with the freedom of everyone else in accordance with a universal law, is the sole and original right that belongs to each human being by virtue of his humanity.” Again, in Theory and Practice Kant defines justice as “the restriction of each individual’s freedom so that it harmonizes with the freedom of everyone else (insofar as it is possible within the terms of a universal law).” All of these principles, laws, and definitions express essentially the same thought: that justice is a condition in which each individual’s external freedom is restricted so as to make it consistent with the free freedom of all others in the framework of a common law or system of laws.

Upholding the “Common Good” is Impossible (1/2) Upholding the “common good” is incompatible with a pluralistic society Thomas Shanks, professor of applied ethics at Santa Clara university, 1992 (“the common good,” 1992 Issues in Ethics V5, N1. Accessed: 7/21/13 http://www.scu.edu/ethics/practicing/decision/commongood.html) It might seem that since all citizens benefit from the common good, we would all willingly respond to urgings that we each cooperate to establish and maintain the common good. But numerous observers have identified a number of obstacles that hinder us, as a society, from successfully doing so. First, according to some philosophers, the very idea of a common good is inconsistent with a pluralistic society like ours. Different people have different ideas about what is worthwhile or what constitutes "the good life for human beings", differences that have increased during the last few decades as the voices of more and more previously silenced groups, such as women and minorities, have been heard. Given these differences, some people urge, it will be impossible for us to agree on what particular kind of social systems, institutions, and environments we will all pitch in to support. And even if we agreed upon what we all valued, we would certainly disagree about the relative values things have for us. While all may agree, for example, that an affordable health system, a healthy educational system, and a clean environment are all parts of the common good, some will say that more should be invested in health than in education, while others will favor directing resources to the environment over both health and education. Such disagreements are

bound to undercut our ability to evoke a sustained and widespread commitment to the common good. In the face of such pluralism, efforts to bring about the common good can only lead to adopting or promoting the views of some, while excluding others, violating the principle of treating people equally. Moreover, such efforts would force everyone to support some specific notion of the common good, violating the freedom of those who do not share in that goal, and inevitably leading to paternalism (imposing one group's preference on others), tyranny, and oppression.

Upholding the “common good” is impossible because free riders will take advantage of society’s benefits Thomas Shanks, professor of applied ethics at Santa Clara university, 1992 (“the common good,” 1992 Issues in Ethics V5, N1. Accessed: 7/21/13 http://www.scu.edu/ethics/practicing/decision/commongood.html) A second problem encountered by proponents of the common good is what is sometimes called the "free-rider problem". The benefits that a common good provides are, as we noted, available to everyone, including those who choose not to do their part to maintain the common good. Individuals can become "free riders" by taking the benefits the common good provides while refusing to do their part to support the common good. An adequate water supply, for example, is a common good from which all people benefit. But to maintain an adequate supply of water during a drought, people must conserve water, which entails sacrifices. Some individuals may be reluctant to do their share, however, since they know that so long as enough other people conserve, they can enjoy the benefits without reducing their own consumption.

If enough people become free riders in this way, the common good which depends on their support will be destroyed. Many observers believe that this is exactly what has happened to many of our common goods, such as the environment or education, where the reluctance of all person to support efforts to maintain the health of these systems has led to their virtual collapse.

Upholding the “Common Good” is Impossible (2/2) Upholding the “common good” is impossible because of society’s promotion of individualism Thomas Shanks, professor of applied ethics at Santa Clara university, 1992 (“the common good,” 1992 Issues in Ethics V5, N1. Accessed: 7/21/13 http://www.scu.edu/ethics/practicing/decision/commongood.html) The third problem encountered by attempts to promote the common good is that of individualism. our historical traditions place a high value on individual freedom, on personal rights, and on allowing each person to "do her own thing". Our culture views society as comprised of separate independent individuals who are free to pursue their own individual goals and interests without interference from others. In this individualistic culture it is difficult, perhaps impossible, to convince people that they should sacrifice some of their freedom, some of their personal goals, and some of their self-interest, for the sake of the "common good". Our cultural traditions, in fact, reinforce the individual who thinks that she should not have to contribute to the community's common good, but should be left free to pursue her own personal ends.

Upholding the “common good” is impossible because of unequal burden sharing Thomas Shanks, professor of applied ethics at Santa Clara university, 1992 (“the common good,” 1992 Issues in Ethics V5, N1. Accessed: 7/21/13 http://www.scu.edu/ethics/practicing/decision/commongood.html) Finally, appeals to the common good are confronted by the problem of an unequal sharing of burdens. Maintaining a common good often requires that particular individuals or particular groups bear costs that are much greater than those borne by others. Maintaining an unpolluted environment, for example, may require that particular firms that pollute install costly pollution control devices, undercutting profits. Making employment opportunities more equal may require that some groups, such as white males, sacrifice their own employment chances. Making the health system affordable and accessible to all may require that insurers accept lower premiums, that physicians accept lower salaries, or that those with particularly costly diseases or conditions forego the medical treatment on which their live depend. Forcing particular groups or individuals to carry such unequal burdens "for the sake of the

common good", is, at least arguably, unjust. Moreover, the prospect of having to carry such heavy and unequal burdens leads such groups and individuals to resist any attempts to secure common goods.

Justice Balances Individualism and Cooperation Justice serves to protect the contract of cooperation. Michel Rosenfeld, 1985, Professor of Law, New York Law School, Contract and Justice: The Relation Between Classical Contract Law and Social Contract Theory, Iowa Law Review, 70 Iowa L. Rev. 769, Lexis. Logically, it is conceivable that there could be an individualist who would be completely self-sufficient and would interact with no one else. Under these circumstances, which we might term circumstances of extreme individualism, there would be no need for justice or, for that matter, for contract. If

we move away from extreme individualism to a situation in which the individual cannot completely avoid interaction with others, circumstances of justice then arise. n43 Circumstances of justice exist "whenever mutually disinterested persons put forward conflicting claims to the division of social advantages under conditions of moderate scarcity." n44 Indeed, if each individual in seeking to satisfy his or her self-interest cannot [*780] avoid cooperating in some manner with other individuals -- even if such cooperation involved only an agreement of mutual forbearance from interfering with each other's pursuit of self-interest -- a conflict would develop between the need to cooperate and the desire to achieve the maximum possible advantage from such cooperation. n45 Each individual would be forced to cooperate with others in order to advance his or her own self-interests, but would want to keep all the advantages derived from such cooperation. In this context, the function of justice is to provide normatively compelling means to resolve this conflict. The role of justice is to determine how the greater benefits created by social cooperation ought to be divided among the various individual members of society. n46

Freedom/Liberty

Value of Freedom: Freedom and Liberty are Different Freedom is not the same as liberty – Freedom has built-in restrictions that are key to protecting people from infringing on the liberty of others Cooray, PhD from Cambridge, 2012 ["What is Freedom." Dr. L.J. Mark Cooray; Noted Author LLB (Hons)(Ceylon), Phd (Cambridge), Phd (Colombo) (2012) http://www.ourcivilisation.com/cooray/cooray.htm; Date accessed: 7/23/13] What is freedom? How is freedom related to liberty? Liberty conveys the idea of the right or the ability of the individual to do what he wants. Freedom on the other hand is a word which contains inbuilt restrictions. My freedom to swing my hands stops at my neighbour's nose. A free society contains individuals who are free to do what they do, whilst respecting the freedoms of others. Freedom is the liberty of the individual coupled with concern by the liberated individual for the liberties of others. ¶ Freedom cannot be defined, except through an analysis of the restrictions on human action. ¶ Therefore, the area of freedom available to the individual in any society is a residuary one. The individual is at liberty to do what law and social custom do not forbid. Therefore, the content of the restrictions on liberty are important. What distinguishes a free society from other societies is the nature and extent of the legal and customary restrictions on freedom. ¶ Freedom can be defined only in terms of the restrictions on freedom - and I show some of the legal restrictions on freedom which historically evolved and were responsible for the rise of western civilisation are analysed in this paper.

Security

Human Security More Important than State Security Human security takes priority of the security of the state Axworthy, 2010 (Lloyd, Jan, 2010. Human Security and Global Governance: Putting People First, Global Governance. http://www.jstor.org/stable/27800284) Date accessed: 7/26/13 Human security today puts people first and recognizes that their safety is integral to the promotion and maintenance of international peace and security. The security of states is essential, but not sufficient, to fully ensure the safety and well-being of the world's peoples. Several current challenges are particularly compelling. One concerns the evolution of new links between local conflict and the international economy and the impact of these perverse linkages on vulnerable communities. Doubtless, high-value commodities like diamonds or oil can prolong and intensify conflict. Angola and Sierra Leone demonstrate the extreme impact of personal greed on vulnerable populations. The Security Council embargo on rough diamonds from Sierra Leone is a positive first step toward preventing the use of profits from diamond sales to finance wars and crimes against civilians.

Government Must Not Violate Liberty The Government should not intrude on any liberty unless the act itself is deemed harmful. Kent Greenawalt, 1989, Cardozo Professor of Jurisprudence, Columbia University, Free Speech Justifications, Columbia Law Review, Vol. 89, No. 1. http://www.jstor.org/stable/1122730

A political principle of free speech is warranted only if reasons to protect speech go beyond the reasons for a minimal principle of liberty. According to a minimal principle of liberty, the government should not prohibit people from acting as they wish unless it has a positive reason to do so. The ordinary reason for prohibiting action is that the action is deemed harmful or potentially harmful in some respect; driving a car at 100 miles per hour is forbidden because people are likely to get hurt. Although sometimes the government may constrain behavior in order to compel some action that generates a benefit, or may potentially gen- erate benefits, that subtlety will be disregarded in order to concentrate on harm. What legitimately counts as "harm" is an important and con- troversial aspect of political theory,4 but here the term is meant in an inclusive, nonrestrictive sense, including indirect harms, psychological harms, harms to the actor, and even harms to the natural order. Thus, sexual intercourse between human beings and animals might be pro- hibited on the ground that it has deleterious indirect effects on family life, is psychologically bad for the people involved, or is intrinsically unnatural. Since

governments have little apparent reason to prohibit action other than to prevent harm the action may cause, an assumption that people should otherwise be left free comes very close to being a princi- ple of rationality for governance. A challenge to the principle is imagi- nable, but the theory of human nature and government it would represent would be most unattractive . Government control of perfectly harmless actions like whistling in one's room might be a technique to induce unquestioning obedience to government authority. In that event, the

prohibition would be designed to prevent some harm, such as "unhealthy" independent civic attitudes, but the harm would be un- related to acts of whistling or their effects.5 Conceivably, such control of "neutral" matters may have a place in training techniques for highly disciplined subgroups, such as monastic orders or military personnel, but accepting its appropriateness for regulating the general class of citi- zens would be to embrace the kind of extreme totalitarianism suggested by fantasies like George Orwell's Nineteen Eighty Four.6 The alterna- tive-the "minimal principle of liberty"-is a fundamental premise of all "Western" governments, and in this modest form, is probably ac- cepted as well by almost all authoritarian or dictatorial governments, whether of the right or the left.7 As

far as speech is concerned, the minimal principle of liberty establishes that the government should not interfere with communication that has no potential for harm. To be significant, a principle of freedom of speech must go beyond this,8 positing constraints on the regulation of speech that are more robust than constraints on the regulation of other matters. A principle of free speech could establish more strin- gent constraints than the minimal principle of liberty either by barring certain possible reasons for prohibition or by establishing a special value for speech. The latter way is the easier to understand. If some human activities have special value, a good government will need stronger reasons to prohibit them than to prohibit other activities. If speech has more positive value than acts of physical aggression, for ex- ample, more powerful reasons will be needed to warrant its suppres- sion. A related but more subtle point is that legislatures or other political actors may be prone in particular instances to undervalue cer- tain kinds of acts; were that true about speech, a principle of free speech might compensate for that tendency. In effect, the principle would tell those involved in government that acts of speech should be assumed to have a higher value than they seem to have in the immedi- ate context.

Deontology Bad

Deontology Bad-Impractical Deontology doesn’t apply to governmental policies because the theory is impractical; it is impossible to consider every individualistic viewpoint of morality. Woller, 1997 (Gary, Economics Professor at BYU, “A Forum On the Role of Environmental Ethics in Restructuring Environmental Policy and Law for the Next Century.” Policy Currents, June 1997, http://higherlogicdownload.s3.amazonaws.com/APSANET/8cecdffe-5e63-45a8-91764574182cf42d/UploadedFiles/Vol.%207,%20No.%202.pdf, p. 11) At the same time, deontologically based ethical systems have severe practical limitations as a basis for public policy. At best, a priori moral principles provide only general guidance to ethical dilemmas in public affairs and do not themselves suggest appropriate public policies, and at worst, they create a regimen of regulatory unreasonableness while failing to adequately address the problem or actually making it worse. For example, a moral obligation to preserve the environment by no means implies the best way, or any way for that matter, to do so, just as there is no a priori reason to believe that any policy that claims to preserve the environment will actually do so. Any number of policies might work, and others, although seemingly consistent with the moral principle, will fail utterly. That deontological principles are an inadequate basis for environmental policy is evident in the rather significant irony that most forms of deontologically based environmental laws and regulations tend to be implemented in a very utilitarian manner by street-level enforcement officials. Moreover, ignoring the relevant costs and benefits of environmental policy and their attendant incentive structures can, as alluded to above, actually work at cross purposes to environmental preservation. (There exists an extensive literature on this aspect of regulatory enforcement and the often perverse outcomes of regulatory policy. See, for example, Ackerman, 1981; Bartrip and Fenn, 1983; Hawkins, 1983, 1984; Hawkins and Thomas, 1984.) Even the most die-hard preservationist/deontologist would, I believe, be troubled by this outcome. The above points are perhaps best expressed by Richard Flathman, The number of values typically involved in public policy decisions, the broad categories which must be employed and above all, the scope and complexity of the consequences to be anticipated militate against reasoning so conclusively that they generate an imperative to institute a specific policy. It is seldom the case that only one policy will meet the criteria of the public interest (1958, p. 12). It therefore follows that in a democracy, policymakers have an ethical duty to establish a plausible link between policy alternatives and the problems they address, and the public must be reasonably assured that a policy will actually do something about an existing problem; this requires the means-end language and methodology of utilitarian ethics. Good intentions, lofty rhetoric, and moral piety are an insufficient, though perhaps at times a necessary, basis for public policy in a democracy.

Util Bad

Util Bad-Individual Rights Utilitarianism cannot protect rights – exclusive focus on the pursuit of welfare causes the trampling of rights will conflict with the pursuit of welfare Erin Byrnes, JD U Arizona, 1999, “Therapeutic Jurisprudence: Unmasking White Privelege to Expose the Fallacy of White Innocense,” 41 Ariz. L. Rev. 535 Moral rights are objectionable not only because they lack social recognition but also because they necessarily imply a correlation between rights and duties. Again, utilitarianism's specific

rejection of the tie between rights and duties renders recognition of white privilege nearly impossible. Without this recognition, there can be no meaningful solution. 247 If accepted, moral rights would provide the grounds for the appraisal of law and other social institutions, a system of appraisal antithetical to utilitarianism's rubric of assessment. Moral rights carry with them the expectation that institutions will be erected with an eye towards respect and furtherance of such rights. 248 Such a proposition would certainly require more than just striving towards colorblindness were it applied to affirmative action. Utilitarianism,

however, requires that institutions and rights be evaluated solely with respect to the promotion of human welfare, welfare being the satisfaction of overall citizen desires. 249 The assumption, implicit in the foregoing argument, is that moral rights neither fit perfectly nor converge with legal rights. 250 This may not necessarily be the case. David Lyons' "theory of moral rights exclusion" discusses the way in which utilitarians conceive of moral rights working at odds with the utilitarian goal. 251 Lyons' theory describes the way in which a moral right, at some point, gains enough currency to warrant individual exercise of that right. According to Lyons, when a moral right has reached this point, it has achieved the "argumentative threshold" and gains normative force. 252 The potential for this occurrence is precisely what leads to the utilitarian rejection of moral rights. Rejection is predicated on the fact that once the argumentative threshold is reached, a presumption is created against interference upon the individual exercise [*564] of the right. 253 Under

a system which recognized moral rights, but still organized itself according to the utilitarian goal of achieving human welfare (which is happiness), individual rights would purportedly run headlong into the pursuit of welfare. 254 Though the pursuit of welfare would be deemed morally relevant and would justify a course of action on welfare's behalf, in a scenario where that course of action constituted a mere "minimal increment of utility," it would be incapable of overcoming the argumentative threshold of rights. 255 Thus, the argument is that the recognition of moral rights is diametrically opposed to utilitarianism because in a moral rights regime, rights act as a limitation upon the utilitarian goal of fulfilling as many individual desires as possible.

Util Bad-Predictions Our predictions are flawed, meaning that utilitarianism can never know if they picked the best deciscion Odell, 04. Jack, associate professor of philosophy at the university of Illinois, on consequentialist ethics, pg 103.) Of all the objections A through J, A is the most easily answered. Our study of Russell’s version of act utilitarianism has taught us that any philosopher who promotes act utilitarianism has to concede that its classic formulation always act to maximize the good in the world is indefensible for two reasons. First, the actual consequences of any given action are never available for examination at the time of the action, since they have not yet happened, and so they cannot be a factor in an ethical decision. Second, it cannot make any sense to say one’s actual choice is objectively a better choice than its options. Since none of the options were chosen, we cannot know what their consequences are, and for this reason we cannot be sure what to compare with the consequences of our actual choice. The maxim has to be reformulated in a subjective format, as it is in “act so as to maximize the expectable good in the world.” The act utilitarian has to be satisfied with intended or predicted consequences, and not actual ones.”

Util Bad-Majority Tyranny Utilitarianism justifies the tyranny of the majority and the oppression of the minority. Maximiano, Jose Mario. Associate Professor of business ethics DLSU School of Business, November 6, 2003. Business World, “The View from Taft,” p. Lexis) According to the utilitarian principle, the correct action, decision or judgment is the one that will produce the greatest net benefits at the lowest net costs for the greatest number of people. Sad to say, this principle has no eyes to see and no brains to know who are those who have less in life, and those who are disadvantaged and less gifted. Like a horse with blinders, utilitarianism automatically focuses on the majority, regardless of socio-economic status. In the application of the utilitarian principle, therefore, it is possible that those who have more in life would benefit more, while those with less would benefit less. The utilitarian principle seems inadequate when applied to situations that involve the basic rights of others. Was the government ethically correct in demolishing some shanties to pave the way for the beautification project specifically for a visiting leader? Similarly, was the government ethically correct to drive away some indigenous tribes to give way for the construction of a dam? While some would see beautification, greening, cleaning and the construction of the dam as benefits, others may see the same as unjust and unfair, and hence as costs, because

those projects may at times violate the basic rights of others.

Probability

Ignore Low Probability Extremely low probabilities should count as zero—even if there’s some risk, policy decisions can’t be justified by vanishingly small probabilities RESCHER 2003 (Nicholas, Prof of Philosophy at the University of Pittsburgh, Sensible Decisions: Issues of Rational Decision in Personal Choice and Public Policy, p. 49-50) On this issue there is a systemic disagreement between probabilists working on theory-oriented issues in mathematics or natural science and decision theorists who work on practical decision-oriented issues relating to human affairs. The former takes the line that small number are small numbers and must be taken into account as such—that is, the small quantities they actually are. The latter tend to take the view that small probabilities represent extremely remote prospect and can be written off. (De minimis non curat lex, as the old precept has it: in human affairs there is no need to bother with trifles.) When something is about as probable as a thousand fair dice when tossed a thousand times coming up all sixes, then, so it is held, we can pretty well forget about it as a worthy of concern. As a matter of practical policy, we operate with probabilities on the principle that when x ≤ E, then x = 0. We take the line that in our human dealings in real-life situations a sufficiently remote possibility can—for all sensible purposes—be viewed as being of probability zero. Accordingly, such remote possibilities can simply be dismissed, and the outcomes with which they are associated can accordingly be set aside. And in “the real world” people do in fact seem to be prepared to treat certain probabilities as effectively zero, taking certain sufficiently improbable eventualities as no long representing real possibilities. Here an extremely improbable event is seen as something we can simply write off as being outside the range of appropriate concern, something we can dismiss for all practical purposes. As one writer on insurance puts it: [P]eople…refuse to worry about losses whose probability is below some threshold. Probabilities below the threshold are treated as though they were zero. No doubt, remote-possibility events having such a minute possibility can happen in some sense of the term, but this “can” functions somewhat figuratively—it is no longer seen as something that presents a realistic prospect.

Low Probability-Policy Paralysis Focusing on catastrophic, low probability impacts causes policy paralysis. POSNER 2004 (Richard, US Court of Appeals judge and Senior Lecturer at the University of Chicago Law School, Catastrophe: Risk and Response 19) The reason for the hedge in “essentially” is that I want to avoid making claims of metaphysical certainty. From a scientific standpoint, anything is possible. But some possibilities really are too remote to be worth worrying about, such as the possibility that my next breath will create a black hole or that the entire human population will be persuaded to commit suicide. To put this differently, we have to be selective in responding to the catastrophic risks because if we allow our imaginations to multiply their number indefinitely we’ll end up doing nothing about any of them.

The “any risk” logic would make all decision making impossible—evaluate probability over magnitude MESKILL 2009 (David, professor at Colorado School of Mines and PhD from Harvard, “The "One Percent Doctrine" and Environmental Faith,” Dec 9, http://davidmeskill.blogspot.com/2009/12/onepercent-doctrine-and-environmental.html) Tom Friedman's piece today in the Times on the environment (http://www.nytimes.com/2009/12/09/opinion/09friedman.html?_r=1) is one of the flimsiest pieces by a major columnist that I can remember ever reading. He applies Cheney's "one percent doctrine" (which is similar to the environmentalists' "precautionary principle") to the risk of environmental armageddon. But this doctrine is both intellectually incoherent and practically irrelevant. It is intellectually incoherent because it cannot be applied consistently in a world with many potential disaster scenarios. In addition to the global-warming risk, there's also the asteroid-hitting-the-earth risk, the terrorists-with-nuclear-weapons risk (Cheney's original scenario), the super-duper-pandemic risk, etc. Since each of these risks, on the "one percent doctrine," would deserve all of our attention, we cannot address all of them simultaneously. That is, even within the one-percent mentality, we'd have to begin prioritizing, making choices and trade-offs. But why then should we only make these trade-offs between responses to disaster scenarios? Why not also choose between them and other, much more cotidien, things we value? Why treat the unlikely but cataclysmic event as somehow fundamentally different, something that cannot be integrated into all the other calculations we make? And in fact, this is how we behave all the time. We get into our cars in order to buy a cup of coffee, even though there's some chance we will be killed on the way to the coffee shop. We are constantly risking death, if slightly, in order to pursue the things we value. Any creature that adopted the "precautionary principle" would sit at home - no, not even there, since there is some chance the building might collapse. That creature would neither be able to act, nor not act, since it would nowhere discover perfect safety. Friedman's approach reminds me somehow of Pascal's wager - quasi-religious faith masquerading as rational deliberation (as Hans Albert has pointed out, Pascal's wager itself doesn't add up: there may be a God, in fact, but it may turn out that He dislikes, and even damns, people who believe in him because they've calculated it's in their best interest to do so). As my friend James points out, it's striking how descriptions of the environmental risk always describe the situation as if it were five to midnight. It must be near midnight, since otherwise there would be no need to act. But it can never be five *past* midnight, since then acting would be pointless and we might as well party like it was 2099. Many religious movements - for example the early Jesus movement - have exhibited precisely this combination of traits: the looming apocalypse, with the time (just barely) to take action.

Meta-Ethics

Naturalism Acting in accordance with natural facts is the meta-ethic for the round, and as such all moral argumentation must be consistent with it. Moreover, naturalism best responds to moral claims. Papineau [Papineau, David, (Professor of Philosophy of Science at King's College) "Naturalism", (The Stanford Encyclopedia of Philosophy)] Realist moral

naturalism also seems better off than non-naturalist realism in two further respects. The first relates to is hard to see how non-natural moral facts could have any motivating force: after all, if such facts are incapable of having effects of any kind, they will a fortiori be incapable of motivating human beings. True, moral motivation is not a straightforward matter for naturalist moral realists either: if moral facts the motivating force of moral facts. It

are natural, then won't it be possible for someone to recognize their existence, yet not be correspondingly moved to action in any way? However, there are various responses naturalist realists can make to this challenge. (Ridge 2006 Section 5, Lenman 2006 Section 2.) The other point on which naturalist moral realists seem better placed than non-naturalists has to do with [in] explaining the supervenience of moral facts on other facts. As

noted earlier, intuition seems to demands that two situations that are identical with respect to physical properties will also be morally identical. For naturalists, this will follow from general naturalist principles. Non-naturalists, by contrast, would seem to lack any obvious explanation of why moral facts should so supervene on physical facts

Naturalism Determines Morality Naturalism best responds to moral claims Papineau [Papineau, David, (Professor of Philosophy of Science at King's College) "Naturalism", (The Stanford Encyclopedia of Philosophy)]

Realist moral naturalism also seems better off than non-naturalist realism in two further respects. The first relates to the motivating force of moral facts. It is hard to see how non-natural moral facts could have any motivating force: after all, if such facts are incapable of having effects of any kind, they will a fortiori be incapable of motivating human beings. True, moral motivation is not a straightforward matter for naturalist moral realists either: if moral facts are natural, then won't it be possible for someone to recognize their existence, yet not be correspondingly moved to action in any way? However, there are various responses naturalist realists can make to this challenge. (Ridge 2006 Section 5, Lenman 2006 Section 2.) The other point on which naturalist moral realists seem better placed than non-naturalists has to do with [in] explaining the supervenience of moral facts on other facts. As noted earlier, intuition

seems to demands that two situations that are identical with respect to physical properties will also be morally identical. For naturalists, this will follow from general naturalist principles. Non-naturalists, by contrast, would seem to lack any obvious explanation of why moral facts should so supervene on physical facts

Heredity play a major role in our decision and moral actions as people based on how it effects our environment. Fontanilla Conrado , Staff analist, 8/26/12, Does Heredity Influence How Our Life Would Be? http://conradofontanilla.hubpages.com/hub/Does-Genetics-Influence-Our-Life-Would-Be

It is difficult to separate the effect of heredity or genetics from that of environment. But let's assume that that can be done. A person may have the genes to enable him to grow 6 ft tall but due to poverty and inadequacy of food he grew only to 5.5 ft tall. The food is part of his environment. Other parts of his environment are: relationship with parents, brothers or sisters if he has any, classmates, members of his congregation. He learns moral values from them.¶ The phrase "would be" in the question pertains to moral values. A crocodile eats any smaller animal in its pond thus he dominates the pond. Let's say it does not care whether its diet suffers of not. The crocodile is amoral. A man/woman may be imbued with moral values. He knows what is good or bad according to his/her environment. His/her

genetics affect his/her capacity to learn and to adapt to his/her environment. But his/her morals guide him/her what s/he "would be." His/her genetics makes him/her what s/he "is." His/her environment makes him/her what s/he "would be."¶ For example, Einstein, derived from his genetic make up, had the capacity to come up with the formula E = mc2.. During World War II he feared that Hitler's Germany might have used this formula to develop a powerful bomb as demonstrated by the V-2 rockets that Germany used to bomb London in 1944. He wrote a letter to President Franklin D. Roosevelt of the U.S. and urged him to develop a bomb for use in retaliation against Hitler's Germany in case it unleashed an atomic bomb.¶ Then the atomic bombs developed by the U.S were dropped over Nagasaki and Hirosima killing thousands of Japanese civilians (not combatant soldiers) on the spot and maiming several others for life. Einstein was horrified. He said that had he known that the atomic bomb would be used on civilians he would not have urged President Roosevelt to make them (Einstein, A. Ideas and Opinions. 1954).¶ There is duality in man/woman. One part biological; the other moral. ¶ His/her

genetics enables him to adapt to the environment. S/he is incapable of making his/her own food, unlike plants. So s/he must eat plants to live. To live is part of "would be." That leads us to consider morality as scaled in degrees. Eating plant may not arouse some sense of guilt, as a plant is also a creature. Or munching seeds of peanut may give us some pleasure when in fact we are killing germinal life. Up the ladder, if there is such a moral ladder, consider the consumption of chicken meat. We kill the chicken when we prepare it for cooking and consumption. Yet we, except some people, do not feel a moral compunction about it.

Hardwired For Survival Humans are naturally aware of biological survival risks Jeanna Bryner, staff analyst and editor, 9/24/07, Modern Humans Retain Caveman Survival Instincts, live science, http://www.livescience.com/4631-modern-humans-retain-caveman-survival-instincts.html Date accessed- 7/16/13

Like hunter-gatherers in the jungle, modern humans are still experts at spotting predators and prey, despite the developed world's safe suburbs and indoor lifestyle, a new study suggests. ¶ The research, published online this week in the Proceedings of the National Academy of Sciences , reveals that humans today are hard-wired to pay attention to other people and animals much more so than non-living things, even if inanimate objects are the primary hazards for modern, urbanized folks. ¶ The researchers

say the finding supports the idea that natural selection molded mechanisms into our ancestors' brains that were specialized for paying attention to humans and other animals. These adaptive traits were then passed on to us. ¶ "We're assuming that natural selection takes a long time to build anything anew and that's why this is left over from our past," said study team member Leda Cosmides, an evolutionary psychologist at the University of California, Santa Barbara (UCSB). ¶ Ancestor's eyes ¶ Immersed in a

rich, biotic environment, it would have been imperative for our ancestors to monitor both humans and non-human animals. Predators and prey took many different forms—lions, tigers and bears—and they changed often, so constant eyeballing was critical. ¶ While the environment has changed since then, with high-rises emerging where forests once took root and pampered pets taking the place of stalking beasts, our instinct-driven attention has not followed suit. ¶ "Having

this pop-out attentional bias for animals is sort of a vestigial behavior," said study team member Joshua New of Yale University's Perception and Cognition Lab. ¶ In the study, groups of undergraduate students from UCSB, watched images displayed on computer monitors. The flashing images alternated between pairs of various outdoor scenes, with the first image showing one scene and the next an alternate version of that scene with one change. Participants indicated each time whether they detected a change. ¶ The photographs included animate categories, such as people and other animals, as well as inanimate ones, such as plants, artifacts that can be manipulated (stapler or wheelbarrow) and fixed artifacts, such as landmarks (windmill or house). ¶ Modern hunter-gatherers ¶ Overall,

the subjects were faster and more accurate at detecting changes involving all animals compared with inanimate objects. They correctly detected nearly 90 percent of the changes to "living" targets compared with 66 percent for inanimate objects. ¶ In particular, the students spotted changes in elephant and human scenes 100 percent of the time, while they had a success rate of just over 75 percent for photos showing a silo and 67 percent for those with a coffee mug. ¶ Though we are more likely to meet death via an SUV than a charging wildebeest, the results indicated subjects were slower and less successful at detecting changes to vehicles than to animals. ¶ The researchers compare our attentional bias toward animals to the appendix, an organ present in modern humans because it was useful for our ancestors, but useless now. ¶ These results have implications for phobias and other behaviors that involve focus toward specific categories of objects over others. ¶ "People develop phobias for spiders and snakes and things that were ancestral threats. It's very infrequent to have somebody afraid of cars or electrical outlets," New told LiveScience . "Those statistically pose much more of a threat to us than a tiger. That makes it an interesting test case as to why do tigers still capture attention."

Error Theory

Error Theory Guides Morality ERROR THEORY DEMANDS THE EPISTEMIC REASON BE SEPARATE FROM MORALITY Rowland, Richard., Journal on Ethics on Social Philosophy, January 2013, Moral Error Theory and the Arguments from Epistemic Reasons, http://www.jesp.org/PDF/Moral%20Error%20Theory_final.pdf

Error theorists are not skeptical of hypothetical reasons.10 But they hold ¶ that if there are only hypothetical reasons, our understanding of morality ¶ is radically mistaken, because our understanding of morality entails that ¶ there are categorical reasons.¶ 11 However, our understanding of epistemic ¶ reasons and justification also entails that there are categorical reasons. As ¶ I said, it seems that there is reason for everyone to believe that dinosaurs ¶ once roamed the earth regardless of what they want to believe; there ¶ would still be reason for me to believe that I am in my office writing right ¶ now even if believing this made me extremely unhappy or did not promote any of my desires. Two agents in the same epistemic situation seem ¶ to have the same epistemic reasons, regardless of their desires or goals or the roles that they find themselves in, just as two people who see a child ¶ drowning seem to have moral reasons to save the child regardless of their ¶ desires, goals or roles. So, if there are only hypothetical reasons for belief, ¶ our understanding of epistemic reasons is just as badly mistaken as our ¶ understanding of morality and moral reasons is if there are only hypothetical reasons for action.

There is a nuanced difference between nihilism and Error Theory, the later concedes that we try to make moral jdugements. Joyce, Richard., Entry for Encyclopedia of Ethics, 2013, “NIHILISM”, Encyclopedia, http://www.victoria.ac.nz/staff/richard_joyce/acrobat/joyce_nihilism.pdf Even restricting attention to “moral

nihilism,” matters remain indeterminate. Its most ¶ prominent usage in the field of metaethics treats it as a synonym for “error theory,” therefore ¶ an entry that said only “Nihilism: see ERROR THEORY” would not be badly misleading. ¶ This would identify moral nihilism as the metaethical view that moral discourse consists of ¶ assertions that systematically fail to secure the truth. (See Mackie 1977; Joyce 2001.) ¶ A broader definition of “nihilism” would be “the view that there are no moral facts.” This ¶ is broader because it covers not only the error theory but also noncognitivism (see¶ NONCOGNITIVISM). Both these theories deny that there are moral facts—the difference ¶ being that the error theorist thinks that in making moral judgments we try to state facts (but ¶ fail to do so, because there are no facts of the type in question), whereas the noncognitivist ¶ thinks that in making moral judgments we do not even try to state facts (because, for ¶ example, these judgments are really veiled commands or expressions of desire). (In ¶ characterizing noncognitivism in this way, I am sidelining various linguistic permissions that ¶ may be earned via the quasi-realist program (see QUASI-REALISM).) While it is not ¶ uncommon to see “nihilism” defined in this broader way, few contemporary noncognitivists ¶ think of themselves as “nihilists,” so it is reasonable to suspect that the extra breadth of the ¶ definition is often unintentional.

NEITZSCHE SUPPORTS ERROR THEORY Joyce, Richard., Entry for Encyclopedia of Ethics, 2013, “NIHILISM”, Encyclopedia, http://www.victoria.ac.nz/staff/richard_joyce/acrobat/joyce_nihilism.pdf Various eighteenth- and nineteenth-century continental philosophers (e.g., Schopenhauer, Feuerbach, Fichte, Kierkegaard) are associated in one way or another with nihilism, though their nihilistic streaks tend to be each so sui generis as to defy easy categorization. Even Nietzsche, who is often treated as a kind of grandfather of European nihilism, is extremely different to classify (see NIETZSCHE,

FRIEDRICH). In certain moods he seems to be clearly advocating an error theory (moral nihilism). In Twilight of the Idols he writes: There are absolutely no moral facts. What moral and religious judgments have in common is the belief in things that are not real. Morality is just an interpretation of certain phenomena or (more accurately) a misinterpretation. (1889, VIII.1 / 2005: 182)

MORAL ERROR THEORY REJECTS FIRST-ORDER MORAL CLAIMS Olson, Jonas., Department of Philosophy at Stockholm University, 2010, Error Theory and Reasons to Believe, people.su.se/~jolso/papers/DefMETapril2010.doc

according to moral error theory, first-order moral claims are uniformly false. First-order moral claims are claims that entail something about what some agent morally ought to do or not to do, what would be morally permissible or impermissible for some agent to do or not to do, what there is moral reasons for some agent to do or not to do, and the like; or what would be morally good (bad) or morally (un)desirable, and the like. Hence, if error theory is correct, the claim that, e.g., torture is wrong is false. But the law of the excluded middle entails that if it is false that torture is wrong, it is true that torture is not wrong. And the negative claim that torture is not wrong appears to entail that torture is morally permissible, which is clearly a first-order moral claim. This suggests that contrary to the contentions of many moral error theorists, moral error theory does have distinctive first-order moral implications. And rather vulgar ones at that; anything turns out to be morally permissible! I shall not attempt to resolve this issue here. I note merely that one possible strategy for sidestepping this problem is to opt for a version of moral error theory that says that first-order moral claims rest on false presuppositions and are therefore uniformly neither true nor false. In order not to exclude this version of moral error theory, I shall take moral error theory to be the view that no first-order moral claim is true. Analogously, I shall take epistemic error theory to be the view that no first-order epistemic claim is true, where first-order epistemic claims are claims to the effect that there are epistemic reasons for some agent to believe or not to believe some proposition or that believing some proposition is or would be permissible or impermissible, and the like. Before I get started I need to make a brief preliminary remark about formulations of error theories. It is routinely said that

Quasi- Realism QUASI-REALISM BAD BECAUSE IT LEGITAMIZES CONTRADICTING ETHICS Moore, A.W., Philosopher of Philosophy at St. Hugh’s College, July 2002, Quasi-Realism and Relativism, http://users.ox.ac.uk/~shug0255/pdf_files/quasi-realism-and-relativism.pdf

If it is true that ‘an ethic is the propositional reflection of the dispositions ¶ and attitudes, policies and stances, of people,’ as Simon Blackburn says in ¶ summary of the quasi-realism that he champions in this excellent and wonder- ¶ fully provocative book (p. 310), then it seems to follow that different dispo- ¶ sitions, attitudes, policies and stances-different conative stares, for ¶ short-will issue in different ethics, each with an equal claim to truth; and ¶ this in turn seems to be one thing that could be reasonably meant by that ¶ slippery polyseme ‘relativism’. If such relativism does follow, a good deal ¶ remains to be said about how much force it has. At the limit it might do no ¶ more than signal the abstract possibility of an ethic rivalling that of humans. ¶ More potently, it might somehow legitimize the different ethics of different ¶ groups of humans in actual conflict with one another. But without the possibility of some such variability of ethic to match a possible variability of ¶ conative state, the quasi-realist’s claim that an ethic ‘reflects’ a particular ¶ combination of conative states appears hollow.

OUR COGNATIVE STATES EFFECT OUR MORAL STANDARDS Moore, A.W., Philosopher of Philosophy at St. Hugh’s College, July 2002, Quasi-Realism and Relativism, http://users.ox.ac.uk/~shug0255/pdf_files/quasi-realism-and-relativism.pdf

The relativism in question is not the view that, had our conative states been different, different ethical standards might have applied; Blackburn has persistently and persuasively argued that he is not committed to anything like that. Nor is it the view that, had our conative states been different, we might have applied different ethical standards; that is a platitude (and scarcely merits the label ‘relativism’). The view is something lying subtly between these, ¶ namely that, had our conative states been different, we might have applied different ethical standards and it might have been right for us to do so; we might have had different ethical beliefs and those different ethical beliefs ¶ might have been true.

Legality

Law Determines Morality Legality is the base of societal morals George C. Christie. ON THE MORAL OBLIGATION TO OBEY THELAW. Duke Law Journal December, 1990. There is, however, an epistemologically more basic point that can be made here. The stark separation between law and morality-the assumption that the law does not affect morality-is simply untenable. In particular, I wish to assert that the prevailing public morality

of

any society is very definitely influenced by the law. 2 4 No serious observer of American society over the past thirty years, and certainly no one who has spent a substantial portion of that time in the South, can have any doubt that decisions like Brown v. Board of Education 25 and federal civil rights legislation

have profoundly influenced public perceptions as to the morality of segregation. Furthermore, notions as to what constitutes "theft," "fraud," or "stealing" are profoundly influenced by legal analysis-indeed, "theft" and "fraud" are legal terms of art. My argument, of course, is not that we should go to the opposite extreme and deny the force of morality in the law; instead, I wish to argue that the two are inseparable: It is a chicken-and-egg situation. Many of the writers I have mentioned, for example, use the act of promising as an illustration of the kind of activity that generates moral obligations. Yet, in their often extended discussions as to when promises create binding moral obligations, they curiously fall back on the analysis used by lawyers to determine whether contracts are legally binding. To demonstrate that promises create moral obligations in certain circumstances, these writers sometimes cite actual legal decisions and legal treatises, and they even cite the Uniform Commercial Code and the Restatement of Contracts. 2 6 Some of them even expressly adopt the legal position that promissory obligations are ultimately created by the reasonable objective expectations of the other parties to the transaction and not by the actual subjective intent of the alleged promisor 2 7 If the critics of legal obligation are telling us anything, it appears to be that if a

promise creates a legal obligation, it also creates a moral obligation. The example of promising also shows that the separation of morally significant matters (in which moral obligations supply the needed direc- tion) from the problems of social coordination in a complex world (in which law sometimes shows the way) is simply untenable. In a complex world, everything is a matter of social coordination, as the practice of promising demonstrates. The point can be made even more decisively by taking a situation that would appear to provide one of the paradigmatic examples of morality, in and of itself, providing a sufficient basis of obli- gation, namely, the circumstances under which the killing of another human being is permissible. It is instructive to note that, when Raz dis- cusses this situation, he talks of "laws prescribing behaviour which is morally obligatory independently of the law (e.g. prohibiting murder, The example of promising also shows that the separation of morally significant matters (in which moral obligations supply the needed direction) from the problems of social coordination in a complex world (in which law sometimes shows the way) is simply untenable. In a complex world, everything is a matter of social coordination, as the practice of promising demonstrates. The point can be made even more decisively by taking a situation that would appear to provide one of the paradigmatic examples of morality, in and of itself, providing a sufficient basis of obli- gation, namely, the circumstances under which the killing of another human being is permissible. It is instructive to note that, when Raz discusses this situation, he talks of "laws prescribing behaviour which is morally obligatory independently of the law (e.g. prohibiting murder,

Rule of Law The rule of is necessary to limit abuses of the majority. Michael Meyer-Resende is a director of Democracy Reporting International, a Berlin-based group promoting political participation.

09 Democracy Reporting International

http://www.democracy-reporting.org/files/essential_elements_of_democracy_2.pdf date accessed 7/20/13 Democracy Reporting International There are few definitions of the rule of law in the context of international instruments related to ensuring democratic practices within states.30 Nonetheless, its core meaning is clear. That is, the

rule of law commits all public authorities to comply with independently and impartially administered legal and justice systems, such that states make continuous efforts ¶ ‘[g]uaranteeing that no individual or public or private institution is above the law’.31 Sometimes the rule of law is narrowly construed as an efficient and effective system of justice and law enforcement. Beyond that, it is also interpreted to imply certain standards for ¶ the legislative process, namely that this should be an open and transparent process that reflects the will of the people and the outcomes of which are public and freely available. Increasingly, the rule of law is seen through a broader conceptual framework ¶ that links it to human rights and democratic order; e.g., UN Human Rights Commission resolution on democracy and the rule of law (resolution 2005/32), the OSCE Copenhagen 1990 commitments and the Charter of Paris for a New Europe. ¶ As

an inherent element of democracy, the rule of law therefore indicates that the will of the majority has clear and certain limits, not only in the form of universal human rights, but also in relation to the constitutional framework of a state. Consequently, for example, public referenda should not be used to overrule constitutional provisions.

Rule of law ensures security and democracy Gabriel Marcella, teaches strategy in the Department of National Security and Strategy of the United States Army War College, Carlisle, Pennsylvania. The Imperative of the Rule of Law in the Democratic State.¶ DEMOCRATIC GOVERNANCE AND THE RULE ¶ OF LAW:¶ LESSONS FROM COLOMBIA. December 2009 date accessed 7/20/13 http://www.StrategicStudiesInstitute.army.mil/ ¶ Any discussion of democratic governance in conflicted societies must begin with security and the ¶ rule of law. Although security, state presence, and social and economic progress are all important mutually ¶ reinforcing elements in establishing a government’s authority and legitimacy, it is the rule of law and its ¶ acceptance by the people that binds them all together. Democracy is not possible without security, and ¶ security without the rule of law is a Hobbesian hell. Achieving security and the rule of law requires political ¶ will, resources, and time to repair and build institutions and develop the rules of democratic community that ¶ are generally accepted by the populace. That

is why the Constitution of the United States and the Declaration ¶ of Independence are such singular documents. They codified a long process of institutional and political ¶ development that began before the Magna Carta in 1215 and ultimately transformed 13 colonies into a ¶ democratic state that survived a great civil war and is still evolving in the 21st century. Indeed, the Magna ¶ Carta was itself the result of the security and enforcement of the King’s Law, established by English monarchs as early as Henry II (1154-89). Within the security provided by the Magna Carta, the barons took the first steps towards what eventually became widespread parliamentary democracy.

The rule of law makes democracy work

because law is the collective will of society, making possible the monopoly on the legitimate use of force, equal rights, and social order. Six elements comprise the rule of law: order and security, legitimacy, and checks.

View more...

Comments

Copyright � 2017 NANOPDF Inc.
SUPPORT NANOPDF