Professional Documents
Culture Documents
Michigan 15
HJPV
Specter CP
Michigan 15
HJPV
Notes
Blanket immunity/amnesty in this context means that telecommunications companies arent subject to lawsuits regarding
illegal surveillance whether that be government enforced surveillance or corporate surveillance.
PRISM was what the TSP became although it doesnt fulfill the original role of the program.
One slight problem with the CP is that the solvency evidence for the specific amendment to the bill is very limited, but the
good news is that the original piece of evidence is very solid
This should be paired with a corporations fill in circumvention argument.
Returning the current program back to the TSP would also allow for a legislative check on executive surveillance. This is
because the whole reason that the TSP was removed was because Bush found another way to collect data without a
legislative check. The original TSP allows for the Congress to check the executive on surveillance issues.
Specter CP
Michigan 15
HJPV
Negative
Specter CP
Michigan 15
HJPV
1nc
The United States Federal government should amend the FISA
Amendments Act of 2008 to remove blanket immunity provisions for
telecommunications companies. The United States federal
government should oversight of the Planning Tool for Resource
Integration, Synchronization, and Management (PRISM) program to
the Terrorist Surveillance Program.
The CP allows for FISA effectiveness and Congressional oversightsolves all sqou NSA overstretch and the terror DA
HLR, 09 (Harvard Law Review, Student run publication with articles from professors, judges, practitioners, and
students; February 2009; Harvard Law Review, Vol. 122, No. 4 (Feb., 2009), pp. 1271-1278; Electronic Surveillance
Congress Grants Telecommunications Companies Retroactive Immunity from Civil Suits for Complying with NSA
Terrorist Surveillance Program. Fisa Amendments Act of 2008, Pub. L. No. 110-261, 122 Stat. 2436; JSTOR)//JPM
Specter CP
Michigan 15
HJPV
review the legality of the TSP and the constitutionality of the President's
assertions of executive authority. Proponents of the blanket immunity provision argued that it was necessary for a number of reasons, including
fairness and national security.42 However, the amendment proposed by Senator Specter would
have addressed most of these concerns while avoiding many of the
problems of the blanket immunity provision. Congress should have
adopted this amendment instead. When Congress enacted FISA, it
attempted to establish a clear and exclusive framework for all parties to follow
when the government seeks the aid of private companies in conducting electronic
surveillance.43 Members of the Bush Administration appear to have acknowledged that the TSP operated outside this
statutory framework,44 but they argue that the TSP was nevertheless legally justified both by the Authorization for
Use of Military Force45 (AUMF) passed by Congress in 2001 and by the President's inherent
authority under Article II of the Constitution.46 The blanket immunity
provision undermines FISA by granting retroactive immunity to
telecommunications companies without requiring any showing that
they reasonably believed that assisting the intelligence agencies was
legal;47 the Attorney General merely has to certify that the company was told by
the government that its actions were legal.48 Since the Administration appears to
have based its legal reasoning upon executive authority rather than compliance
with FISA,49 neither the companies nor the President needed to believe they were
complying with FISA in order for the companies to receive immunity. Congress
has therefore allowed the Administration and private companies to act outside of
the statutory framework that Congress created. The effectiveness of FISA as a
comprehensive scheme governing electronic surveillance is undermined if the
President can circumvent its procedures simply by asserting that he has the
executive authority to act outside of its framework. FISA's effectiveness will
be further undermined if telecommunications companies are willing
to cooperate with intelligence agencies even when FISA procedures
have not been followed. Furthermore, as the intelligence community increasingly
relies on the help of private companies to conduct electronic surveillance, it is
essential that a range of government actors - including Congress - gets to weigh
in on important policy considerations, including the proper balance between
individual privacy rights and national security.50 Congress can and should
serve as a check on the executive, as the executive branch may be
"institutionally predisposed" to value security over civil liberties.51 It is
therefore important that Congress establish the proper procedures for the
Administration to follow when it works with the private sector to conduct
electronic surveillance, and that Congress then makes sure that these procedures
are followed. When the Administration and private parties act outside of the
statutory framework, they should pay a price, even if Congress would have
approved of their actions had its approval been sought; in this case, that price
should be civil liability. There is nothing wrong with Congress changing FISA at
the request of the Administration; in other provisions of the Act, Congress does
just that - it updates and changes the procedures for conducting electronic
surveillance.52 However, in order for Congress to play a meaningful role in
determining surveillance policy, the Administration should have to
seek Congress's approval before making a major policy change and
acting outside the statutory framework. Despite its intention to limit extralegal abe able to determine the validity of the
Specter CP
Michigan 15
HJPV
Administration's argument that the President has the inherent constitutional authority to conduct electronic surveillance without congressional approval and that this authority is
supplemented by the AUMF.55 Regardless of whether the Administration's arguments would hold up in court, a decision one way or the other would provide more certainty to all parties
will of good faith, thereby providing them with the desired immunity and encouraging their future cooperation. In addition to addressing many of the concerns of the proponents of blanket
the Specter amendment would also have reduced some of the problems
caused by the blanket immunity provision. First, by protecting companies only
after a judicial finding that they acted in reasonable good faith, Congress would
have sent a clear signal to private companies that they must determine for
themselves whether a government request for assistance is legal. Congress would
also have sent a message to the President that he cannot ignore existing statutes
and authorize private parties to commit potentially unlawful actions without
being subjected to intense judicial scrutiny. Congress would therefore have
encouraged both the Administration ad the private sector to comply with FISA.
As a result, Congress would have reasserted its role in determining the proper
surveillance procedures by holding parties accountable for circumventing those
procedures. The Specter amendment may also have allowed courts to rule
directly on the legality of several aspects of the TSP. Finally, the amendment
immunity,
Specter CP
Michigan 15
HJPV
would have given private citizens the "ability to vindicate their rights in court
regarding wiretapping abuses of the past."62 Senator Specter's amendment
presented Congress with an opportunity to encourage both the executive branch
and the private sector to follow the law, to provide some accountability for what
appear to be extensive violations of the law, and to reassert itself as an important
player in the debate over how to conduct electronic surveillance. Congress could
have achieved these goals without making any major sacrifices in terms of
fairness or national security. Yet Congress, at the behest of the Administration and
the telecommunications industry, instead chose to provide blanket immunity to
the telecommunications companies and virtually ensure that important legal
questions about the TSP will remain unanswered.63 Although it is important to
encourage cooperation between telecommunications companies and the
intelligence agencies, it is also important for Congress to play a role in
determining the proper balance between security and civil liberties rather than
leaving such a determination to the Administration.64 By allowing the
Administration and telecommunications companies to ignore FISA with
impunity, Congress has abdicated this responsibility.
Specter CP
Michigan 15
HJPV
Solves: PRISM
Blanket immunity is the biggest problem facing domestic surveillance
pre-req to aff solvency
EFF, 2008 (Electronic Frontier Foundation, leading nonprofit organization defending civil liberties in the digital
world; 2008; Archive: The Case Against Retroactive Amnesty for Telecoms; https://www.eff.org/pages/case-againstretroactive-amnesty-telecoms)//JPM
The litigation against AT&T and other companies is based upon clear, first-hand
whistleblower documentary evidence authenticated in court by AT&T itself in the
course of unsuccessfully trying to protect the documents as trade secret s that for
years on end every e-mail, every text message, and every phone call carried over
the massive fiber-optic links of sixteen separate companies routed through AT&Ts
Internet hub in San Francisco hundreds of millions of private, domestic
communications have been illegally copied in their entirety by AT&T and
knowingly diverted wholesale by means of multiple splitters into a secret room
controlled exclusively by the NSA. The whistleblower also discovered that there
were at least five other such rooms in San Diego, Los Angeles, San Jose, Seattle
and Atlanta. Any filtering of the information took place only after the entire fiberoptic data stream was copied and diverted into the secret room. As Judge Walker has
held, it
simply
cannot be
credibly
Specter CP
Michigan 15
HJPV
Greenwald, 13 (Glen, journalist, constitutional lawyer, and author of four New York Times best-selling books
on politics and law. His most recent book, No Place to Hide, is about the U.S. surveillance state and his experiences
reporting on the Snowden documents around the world. Prior to his collaboration with Pierre Omidyar, Glenns column
was featured at The Guardian and Salon. He was the debut winner, along with Amy Goodman, of the Park Center I.F.
Stone Award for Independent Journalism in 2008, and also received the 2010 Online Journalism Award for his
investigative work on the abusive detention conditions of Chelsea Manning. For his 2013 NSA reporting; 6/6/13; "Digital
blackwater": the National Security Administration, telecommunications companies and state-corporate crime;
http://go.galegroup.com.proxy.lib.umich.edu/ps/retrieve.do?
sgHitCountType=None&sort=RELEVANCE&docType=Report&prodId=AONE&tabID=T002&searchId=R1&resultListTyp
e=RESULT_LIST&searchType=AdvancedSearchForm&contentSegment=¤tPosition=1&searchResultsType=Single
Tab&inPS=true&userGroupName=lom_umichanna&docId=GALE%7CA403918836&contentSet=GALE
%7CA403918836)//JPM
In this article, we
corporate crime
occurs when corporations employed by a government engage in organizational
Specter CP
Michigan 15
HJPV
deviance at the direction of, or with the tacit approval of, that government. Statefacilitated corporate crime occurs when government institutions of social control
are guilty of clear failure to create regulatory institutions capable of restraining
deviant business activities, either because of direct collusion between business
and government or because they adhere to shared goals whose attainment would
be hampered by aggressive regulation. (Michalowski and Kramer 2006: 21) Although the
NSA surveillance can be seen as an example of both types, we focus here on
examining the mass surveillance of telecommunications data as state-facilitated,
documenting the direct collusion between telecommunications companies and
the government and the weak legislative privacy protections that allow such
companies to collect large amounts of personal, private data about individuals.
The NSA, Telecommunications Companies and Illegal Spying: A Brief History The NSA has long coupled
with the corporate sector to conduct warrantless surveillance of Americans. As
Bamford (2008) wrote, the "rocky marriage" between the NSA and telecommunications
companies began in the days following World War I, when cable companies
turned over telegraph messages to the NSA. Project Minaret was a programme of
the 1970s in which Radio Corporation of America (RCA), Western Union and other companies
gave the NSA all incoming and outgoing US telephone calls and telegrams (Chaterjee 2013b). For decades,
telecommunications leaders like AT&T "... have had a very secret, very cozy relationship with the NSA through the
National Security Agency Advisory Board (NSAAB), made up of top company executives" (Bamford 2008). Project
Minaret, and others like it,
Specter CP
Michigan 15
HJPV
whether that be people's email, Web surfing, or any other data ... A lot of this was
domestic" (in Bamford 2008: 191). Much of this huge volume of data collected
through the NSA's NARUS system located at AT&T's San Francisco
office came from the telecommunications company's partners, like
Sprint and Qwest
Specter CP
Michigan 15
HJPV
Specter CP
Michigan 15
HJPV
During the last five years of legislative debates over the PATRIOT Act, Congress
has failed to define or control surveillance policy. Prior to the Snowden leaks,
most members had little awareness of NSA activities and Congress had little
capacity to impose constraints. Now, more than 18 months after Snowden
exposed the mass seizure of phone records, not much has changed . To a great extent, the
source of difficulty has been the inadequacy of the institutional arrangements for
legislative deliberation on secret programs. Some members have declined
opportunity to learn about domestic-spying practices, while others have opposed
placing restrictions on the NSA for fear of giving terrorists any tactical
advantage. If Congress had conducted thorough, informed deliberations at all stages,
we suspect it would have endorsed extensive collection of communication
records, but it would have also imposed limitations and constraints to minimize
the harm to privacy interests. Instead, it gave the executive branch essentially
unfettered authority to operate a massively intrusive program.
The testimony during the initial FISA hearings of two former Attorneys General,
themselves responsible for authorizing foreign intelligence surveillance in the
pre-FISA arrangement, is instructive. Former Attorney General Ramsey Clark observed
that we greatly exaggerate the safety and value of a requirement that all
wiretaps . . . be approved by a judicial officer. Arguing that [t]he idea that there can be a
meticulous review of these applications by the Judiciary is contrary to our
experience, he put primary emphasis on political checks through reporting
requirements and congressional oversight and standard-setting.91 Additionally,
former Attorney General Elliot Richardson noted the important role in assuring
that this sensitive tool is not abused to be played by the Senate, via both direct oversight and the
confirmation of the Attorney General and Director of the FBI.92 More importantly, the legislative history suggests that the most
consequential element of FISA is not its judicial review provisions. Rather,
FISAs crucial move was to institute a reliance on the use of public laws, publicly
debated and adopted, which specify under what circumstances and under what
restrictions electronic surveillance for foreign intelligence purposes can be
conducted.93 The reliance on political checks proposed in this Note avoids the
problem identified by Congress when it initially enacted FISA and raised by the
Specter CP
Michigan 15
HJPV
Specter CP
Michigan 15
HJPV
FISA does provide some added protection for U.S. citizens and permanent
resident aliens (referred to as U.S. persons in FISA). To obtain a FISA warrant targeting a U.S. person, there
must also be probable cause to believe that the person is knowingly engaged in
activities that involve or may involve a violation of the criminal statutes of the
United States.48 In other words, while suspicion of illegal activity is not
required in the case of aliens who are not permanent residents as applied to
them, membership in a terrorist group or Applications for FISA warrants go to
federal judges that comprise the Foreign Intelligence Surveillance Court (FISC). Like a grand
jury proceeding, the FISC conducts its business ex parte, meaning the
government is the only party present at its proceedings. Appeals from the FISC
go to the FISCR. The FISC has jurisdiction to hear applications for, and to grant
court orders approving, electronic surveillance or physical searches anywhere in
the United States to obtain foreign intelligence information under FISA. In order for
an executive official to get a FISA warrant to conduct electronic surveillance, the FISC
must approve several requirements: (1) probable cause that the target is an agent
of a foreign power or a foreign power (and the additional requirements discussed above if the target is
a U.S. person);50 (2) probable cause that the target is using or about to use the facility
to be monitored;51 (3) applicable minimization procedures designed to
minimize the acquisition and retention, and to prevent the dissemination, of
information concerning U.S. persons that is unrelated to foreign-intelligence;52
(4) a certification that the information sought cannot reasonably be obtained by
normal investigative techniques,53 and (5) the Attorney General must approve
the application and a high-ranking intelligence official must certify that a
significant purpose of the surveillance is to gain foreign intelligence
information.54 If the target is a U.S. person, the basis for the aforementioned
review is subject to review for clear error.55
Specter CP
Michigan 15
HJPV
Specter CP
Michigan 15
HJPV
transparency. We need meaningful rules for minimizing data gathered and stored about Americans, rules that require the
NSA to delete data to which it should not have access. In the 1970s, the Church Committee investigated intelligence
gathering by the NSA, CIA, and FBI. It was able to reform these agencies only after extensive research and discovery. We
need a similar committee now. We need to convince President Obama to adopt the recommendations of his own NSA
review group. And we need to give the Privacy and Civil Liberties Oversight Board real investigative powers. Those
recommendations all pertain to strategic oversight of mass surveillance. Next, lets consider tactical oversight. One
primary mechanism for tactical oversight of government surveillance is the warrant process. Contrary to what many
government officials argue, warrants do not harm security. They
surveillance orders
bypass this process entirely. We know, for example, that US Cellular received only two judicially approved
wiretap orders in 2012and another 10,801 subpoenas for the same types of information without any judicial oversight
whatsoever. All of this needs to be fixed. Start
Specter CP
Michigan 15
HJPV
The 9/11 attacks exposed the dangerous wall separating the intelligence and lawenforcement communities. In response, Congress developed a number of tools to
eliminate those barriers so that critical information could be timely and
appropriately shared to address radical Islamic terrorism . Among them was Section 215 of the
USA Patriot Act. In 2006, the National Security Agency transitioned the bulk telephonemetadata acquisition program authorized under the presidents Terrorist
Surveillance Program to the business-records court-order authority of
Section 215 . Since shortly after 9/11, this program has been helping to
keep Americans safe by acquiring non-content call records, i.e.,
telephone numbers and the date, time, and duration of a call. This
program has yielded invaluable intelligence that has helped prevent
attacks and uncovered terrorist plots.
The TSP in its current form (PRISM) wont stop attacks a revival of
the original program is needed
Taylor, 13 (Robert, writer for PolicyMic; 7/19/13; PRISM Probably Never Stopped and Never Will Stop a
Terrorist Attack; http://mic.com/articles/49449/prism-probably-never-stopped-and-never-will-stop-a-terroristattack)//JPM
Thanks to NSA whistleblower Edward Snowden, we now know many of the dirty details
behind the U.S. government's surveillance programs and the creation of a vast
surveillance and data storage system. Not only has Snowden helped further
unturn the rock of secrecy behind these surveillance programs but his revelations
and leaks have helped spark the debate about the proper balancing of freedom
and security. If we are to supposedly accept these unprecedented powers and
violations of civil liberties, does this type of mass surveillance at least actually
keep us safe? While the official party line, repeated ad nauseum, is that the NSA
surveillance program has helped stop "dozens" of terrorist attacks, a closer look
at the claims made by the White House and the program's defenders cast serious
doubt about the program's actual effectiveness. In a recent congressional hearing, Senators Mark
Udall and Ron Wyden released a joint statement calling on NSA head General Keith Alexander "Emperor
Alexander" of the covert national security state to be more forthcoming about
the surveillance program. The senators argue that the attacks Alexander claims
were thwarted "appear to have been identified using other collection methods.
Specter CP
Michigan 15
HJPV
The public deserves a clear explanation. They also could have been one of the
FBI's many, many "terrorism" sting operations. Washington's Blog cites numerous sources
including an NSA veteran, Fortune Management, Wired, and constitutional and military law expert Jonathan Turley
which show that the
Specter CP
Michigan 15
HJPV
Nakashima, 07 (Ellen, writer for The Washington Post, national security reporter for The Washington Post.
She focuses on issues relating to intelligence, technology and civil liberties. She previously served as a Southeast Asia
correspondent for the paper. She wrote about the presidential candidacy of Al Gore and co-authored a biography of Gore,
and has also covered federal agencies, Virginia state politics and local affairs. She joined the Post in 1995; Nov. 1, 2007;
Roadblock for Telecom Immunity; http://www.washingtonpost.com/wpdyn/content/article/2007/10/31/AR2007103103126.html)//JPM
In a blow to the Bush administration, the
Specter CP
Michigan 15
HJPV
two weeks ago as part of a larger bill to amend the Foreign Intelligence
Surveillance Act, which governs some aspects of domestic surveillanc e. The Judiciary
Committee will take up the bill next. Immunity "is designed to shield this administration
from accountability for conducting surveillance outside the law," Leahy said. Dismissing
the lawsuits would eliminate "perhaps the only avenue" for "an honest
assessment" of the legality of the warrantless surveillance program , he said. Specter
agreed that the "courts ought not to be closed" to such lawsuits. "If, at this late date,
the Congress bails out whatever was done before -- and we can't even discuss
what has been done -- that is just an open invitation for this kind of conduct in
the future," he said. Specter added that he thinks the carriers "have a strong, equitable case" but that his
inclination is toward indemnification, where the government would assume any financial penalties. Sen. Dianne
Feinstein (D-Calif.) said the immunity provision was one of "two big issues" she had
with the bill, and she suggested that limiting damages might be an alternative.
She noted that the lawsuits could cost carriers as much as $30 billion in penalties
-- a problem if taxpayers were to pick up the tab. Assistant Attorney General Kenneth L.
Wainstein told the committee that immunity was a question of "fairness" for the carriers. He
also said that proceeding with the cases risks the divulgence of classified
information. The government has invoked a claim of state secrets to stop the
litigation. "If we don't prevail with state secrets," Wainstein said, "then there's no
guarantee that that information is not going to get out. In fact, even just the filing of lawsuits
and the allegations made can actually end up . . . compromising sensitive sources
and methods."
Blanket amnesty for telecommunications companies are unpopular in
Congress- Blue America lobby
Klein, 08 (Howie, writer for HuffPo; 7/18/2008; Blue America Thanks Some Of The Patriots Who Stood Up For
The Constitution; http://www.huffingtonpost.com/howie-klein/blue-america-thanks-some_b_111919.html)//JPM
"The
House of Representatives, with the support of Republican Scott Garrett, recently passed a bill that
would grant President Bush and future administrations unprecedented powers to spy on
American citizens without a warrant or review by any judge or court. The new law
would also let our nation's largest telecom companies off the hook for knowingly
violating the law and releasing their customers' private information at the behest
of George Bush. "Our constitutional right to protection against unsupervised
searches was written into our Bill of Rights for good reason by Founders whom
we rightly celebrate. "Neither President Bush nor Scott Garrett are as wise as James Madison. "It is
unfortunate that it appears that the telecom industry has managed to falsely conflate its
quest for retroactive immunity for lawbreaking with the issue of national security.
The Founding Fathers understood that our safety as a nation depended on our
being a nation of laws. Retroactive immunity undermines the rule of law, and
therefore undermines our principles and security as a nation. "The President, his
advisers, and his rubber stamps in Congress , including Scott Garrett, have demonstrated a
pattern of disregard for the laws of the United States. This bill not only immunizes
telecom companies from lawsuits, but it would also block the American people
from ever knowing the full extent of the Bush Administration's illegal behavior. "I
urge my fellow Democrats in the Senate to vote against this unnecessary and
deeply troubling law. "I believe that Congress must protect the rights of citizens and
the laws of our country from career politicians in Washington too willing to cave
Specter CP
Michigan 15
HJPV
to special interests and endanger the fundamental rights that we, as Americans,
hold so dear." State Senator Andrew Rice (D-OK) is running a strong campaign against one
of the most extremist members of the U.S. Senate , James Inhofe, who raked in $12,550
from the Telecoms this year and was determined to grant them retroactive
immunity -- and positively giddy about giving the government the right to listen in to all phone conversations and
read all e-mails without a court order. Andrew disagrees -- strongly: "Congress must remain vigilant in
order to protect Americans from another terrorist attack. However, the bill that is
before Congress this week bargains away the privacy of law-abiding American
citizens while protecting the companies that allegedly participated in the
President's illegal wiretapping program. The Senate should stick to the narrow fix it set out to
accomplish by making it clear that the government does not have to obtain a warrant to listen to foreign-to-foreign
communications. Instead, this
rubber stamp corporate shill John Cornyn has taken $15,250 from the Telecom
industry this year and he is as eager as Inhofe to grant them retroactive
immunity. Rick has thought about the issue more seriously and from a different
perspective than just helping out campaign contributors. "Many times throughout my
lifetime I have sworn an oath to protect and defend the Constitution of the United States . This isn't a part-time
Constitution. We as a nation cannot grant anyone sweeping amnesty if they break
the rules. It's appalling that my opponent, John Cornyn, puts his special interest
campaign contributors ahead of the Constitution. Texans have had enough.
Americans will not accept an abuse of power, and they will not accept corporations getting away with breaking the law.
We already have a law in place that balances national security concerns while
adhering to the Constitution. This is not the time to compromise the privacy of
the American people and not the time to disregard the Constitution of United
States. I regret that the Senate has voted this way." Jim Himes is standing firmly with his state's
senior senator, Chris Dodd on this issue. Fake moderate Chris Shayes is once again eager to rubber stamp the BushCheney agenda, somehow trying to say that granting Bush the ability to wiretap all American citizens without a court order
makes us "safe." Jim sees right through that craven, partisan posturing: "In
Specter CP
Michigan 15
HJPV
there's a terror cell, they can get a warrant.... The government ought not be taking
away our freedoms." Darcy Burner is running against a corporate hack and
rubber stamp in Washington, Dave Reichert, who is all about rewarding his
corporate donors with retroactive immunity. Reichert took $6,000 for the
Telecoms so far this year and thinks they should not be accountable for crimes they may have committed. Darcy has
been one of the most outspoken opponents of this bill; watch the 30 second video. After the bill passed in the House, she
didn't despair; she start rallying for action: Like many of you, I'm
Specter CP
Michigan 15
HJPV
Byellin, 7/10/15 (Jeremy, attorney practicing in the areas of family law and estate planning; Today in 2008:
the FISA Amendments Act of 2008 are signed into law; http://blog.legalsolutions.thomsonreuters.com/legalresearch/today-in-2008-the-fisa-amendments-act-of-2008-are-signed-into-law/#sthash.eBlyln0M.dpuf)//JPM
The CISA* bill will maintain sqou blanket immunity and government
overreach only the CP checks
*The CISA bill has been introduced but not passed the Senate or House
-The argument is that even though its marketed as a cyber security bill, its really more of a surveillance bill, so
if the opponent asks you why its relevant say that
Specter CP
Michigan 15
HJPV
Jaycox, 3/19/15 (Mark, Legislative Analyst for EFF, educated at Reed College, spent a year abroad at the
University of Oxford (Wadham College), and concentrated in Political History, Former legislative research assistant for
Lexis Nexis; Senate Intelligence Committee Advances Terrible "Cybersecurity" Bill Surveillance Bill in Secret Session;
https://www.eff.org/deeplinks/2015/03/senate-intelligence-committee-advances-terrible-cybersecurity-billsurveillance)//JPM
The Senate Intelligence Committee advanced a terrible cybersecurity bill called the
Cybersecurity Information Sharing Act of 2015 (CISA) to the Senate floor last week. The new chair (and
huge fan of transparency) Senator Richard Burr may have set a record as he kept the bill
secret until Tuesday night. Unfortunately, the newest Senate Intelligence bill is
one of the worst yet. Cybersecurity bills aim to facilitate information sharing
between companies and the government, but their broad immunity clauses for
companies, vague definitions, and aggressive spying powers make them secret
surveillance bills. CISA marks the fifth time in as many years that Congress has tried to pass "cybersecurity"
legislation. Join us now in killing this bill. The newest Senate Intelligence bill joins other
cybersecurity information sharing legislation like Senator Carper's Cyber Threat
Sharing Act of 2015. All of them are largely redundant. Last year, President Obama signed
Executive Order 13636 (EO 13636) directing the Department of Homeland Security (DHS) to
expand current information sharing programs. In February, he signed another
Executive Order encouraging regional cybersecurity information sharing and
creating yet another Cyber Threat Center. Despite this, members of Congress like
Senators Dianne Feinstein and Richard Burr continue to introduce bills that
would destroy privacy protections and grant new spying powers to companies.
New Countermeasures and Monitoring Powers Aside from its redundancy, the Senate Intelligence bill grants two new
authorities to companies. First, the bill authorizes companies to launch countermeasures (now called "defensive
measures" in the bill) for a "cybersecurity purpose" against a "cybersecurity threat." "Cybersecurity purpose" is so broadly
defined that it means almost anything related to protecting (including physically protecting) an information system, which
can be a computer or software. The same goes for a "cybersecurity threat," which includes anything that "may result" in an
unauthorized effort to impact the availability of the information system. Even with the changed language, it's
still
unclear what restrictions exist on "defensive measures." Since the definition of
"information system" is inclusive of files and software, can a company that has a
file stolen from them launch "defensive measures" against the thief's computer?
What's worse, the bill may allow such actions as long as they don't cause "substantial"
harm. The bill leaves the term "substantial" undefined. If true, the
countermeasures "defensive measures" clause could increasingly encourage
computer exfiltration attacks on the Interneta prospect that may appeal to
some "active defense" (aka offensive) cybersecurity companies, but does not favor
the everyday user. Second, the bill adds a new authority for companies to monitor
information systems to protect an entity's hardware or software. Here again, the
broad definitions could be used in conjunction with the monitoring clause to spy
on users engaged in potentially innocuous activity. Once collected, companies can
then share the information, which is also called cyber threat indicators, freely
with government agencies like the NSA. Sharing Information with NSA Such sharing will
occur because under this bill, DHS would no longer be the lead agency making
decisions about the cybersecurity information received, retained, or shared to
companies or within the government. Its new role in the bill mandates DHS send
information to agencieslike the NSA"in real-time." The bill also allows
companies to bypass DHS and share the information immediately with other
agencies, like the intelligence agencies, which ensures that DHS's current privacy
protections wont be applied to the information. The provision is ripe for
improper and over-expansive information sharing. Overbroad Use of Information Once the
Specter CP
Michigan 15
HJPV
Specter CP
Michigan 15
HJPV
--A2: Circumvention
CP avoids circumvention- civil justice system
McGarity et al 13 (Thomas O., CPR Member Scholar, Prof. at UT, Editor of the Texas Law Review, leading
scholar in the fields of both administrative law and environmental law; Sidney A. Shapiro, Prof. Law at Wake Forest,
Frank U. Fletcher Chair of Administrative Law; Nicholas Vidargas, former Policy Analyst with the Center for Progressive
Reform, honors attorney fellow at the U.S. Environmental Protection Agency, Region 9, Office of Regional Counsel, in San
Francisco, where he worked on enforcement of the Comprehensive Environmental Response, Compensation, and Liability
Act and on Clean Water Act rulemaking, and where he initiated the first enforcement action under the Clean Air Act
General Duty Clause in Region 9, Stanford University Grad; March 2013; Sweeping Corporate Immunity for the Fuel
Industry: The Next Front in the Corporate Accountability Wars;
http://www.progressivereform.org/articles/Corporate_Immunity_Fuel_Industry_1303.pdf)//JPM
The civil justice system not only serves as a backstop for federal regulation, it supports federal
regulation and makes it more effective. Professor Thomas McGarity describes the
informational interactions between regulatory agencies and the courts as
feedback loops ... in which each institution draws on information, experience
and different incentives of the other.62 Immunity legislation eliminates this
possibility that the civil justice system will make the regulatory system more
effective. As a result of tort actions, Congress is informed of problems in the regulatory
system. Consider, for example, how the civil justice system prompted legislation
and regulation in response to the Ford Explorer/Firestone tire problem. In 2000,
Congress passed the Transportation Recall Enhancement, Accountability and
Documentation (TREAD) Act, which required NHTSA to develop a new system for gathering and analyzing
reports of tire, equipment, and motor vehicle defects.63 Regulatory agencies obtain technical data,
analyses of the state of the science from the relevant literature, and other
information that can inform subsequent regulatory decisions. At the same time, the
courts look to the agencies for analysis of the risks and benefits of regulated
products, as well as regulatory standards that can factor into decisions about
whether regulated parties have met their duty of care. Feedback loops have
unquestionably improved the quality of decision-making in both institutions.64
Immunity legislation destroys the feedback loop, unwisely limiting the useful
information that is obtained from the tort system. Tort claims filed in state courts are a primary
source of information for agencies about potential holes or gaps in the regulatory protection system. Simply by virtue of
a claim having been filed, the tort system provides signals that defects may exist or existing safety standards may be
inadequate. The
Specter CP
Michigan 15
HJPV
gun documents showing that the petroleum companies knew full well that MTBE was contaminating groundwater, that
it caused that water to be unfit for drinking, and that they had not disclosed information to EPA. If
Congress
passes the DFA, there will be no civil justice actions to ferret out evidence of
corporate misconduct relating to ethanol and future fuel additives. Adequate
protection of public health depends on the continued existence of state common
law as a complement to federal regulation. Common law has a unique ability to
provide corrective justice and is a useful way to fill regulatory gaps caused by
outdated or imperfect regulation. States have traditionally enjoyed primary authority to protect the
health, safety, and welfare of their citizens. Federal immunity legislation such as sweeping fuel
immunity efforts weaken this fundamental principle of American government in
a simplistic effort to relieve corporate defendants of liability for producing
dangerous products.
Specter CP
Michigan 15
HJPV
The federal judge who is considering all of the lawsuits against communications
carriers has already held that the common law state secrets privilege does not
prevent phone companies like AT&T from presenting their defenses to the court,
in camera and ex parte. To the extent that Congress wants to ensure this result, EFF urges Congress to
clarify that FISAs existing security procedures, codified at 18 USC 1806(f ), already
permit defendants in the pending cases to present all relevant evidence in their
defense. EFF has shared such draft language with key Members of Congress and staff.
Specter CP
Michigan 15
HJPV
The courts should be allowed to determine whether the President has exceeded
his powers by obtaining wholesale access to the domestic communications of
millions of ordinary Americans from AT&T and the other communications
companies, based on the claim that Article II of the Constitution and the Authorization for Use of Military
Force in Afghanistan allowed both the President and the companies to ignore the Fourth
Amendment, FISA, and multiple other privacy statutes.
Specter CP
Michigan 15
HJPV
Specter CP
Michigan 15
HJPV
There is no evidence that this litigation has or will reduce the defendant
companies bottom lines or customer base, and vague assertions that the pending
litigation might result in reputational damage to the defendant companies is
utterly belied by the facts. Despite nearly two years of very public litigation in which
AT&T has lost motions at every turn, AT&T just announced record profits for the
third quarter of 2007: a 41% increase over the previous year. AT&T publicly
attributed its success to signing a record number of new customers . As to possible
threats faced by the companies and their personnel here and abroad, permitting the litigation to proceed
will not increase such risk as already may exist . Ironically, telecommunications
companies recent hand-in-glove participation in national security surveillance
has been perhaps most effectively broadcast around the globe by the
Administration, including statements by the Director of National Intelligence ,
along with other senior Bush Administration officials. Silencing the pending suits will not expunge
these admissions from the public record. Further, it strains credulity to suggest that
the foreign enemies of the nation have not been aware for decades of this
obviously necessary partnership
Specter CP
Michigan 15
HJPV
Under the longstanding rules of the Foreign Intelligence Surveillance Act, the government was free to
engage in dragnet wiretapping outside the United States, but in order to tap
communications inside the country, the government needed court approval and
individualized warrants if an Americans communications would be caught.
Additionally, the bill grants amnesty to the nations telecoms that are being sued for
allegedly breaking federal wiretapping laws by turning over billions of Americans
call records to government data-mining programs and giving the government
access to internet and phone infrastructure inside the country. The bill strips the
right of a federal district court to decide whether the companies violated federal
laws prohibiting wiretapping without a court order. Instead, the attorney general
would need only certify to the court either that a sued company did not
participate, or that the government provided some sort of written request to the
companies that said that the president authorized the program and that his
lawyers deemed it to be legal. That would be presented to federal district court Judge Vaughn Walker, who
is overseeing the more than 40 consolidated cases against the telecoms. Walkers authority would be
limited to judging whether the preponderance of the evidence is that the
companies did get a written request, and if he finds that to be true as the Senate
Intelligence Committee has already publicly stated he must dismiss the cases. Thats immunity,
and its unconstitutional, according to the ACLUs Caroline Fredrickson. "The telecom companies
simply have to produce a piece of paper we already know exists, resulting in
immediate dismissal," Fredrickson said in a written statement. "Thats not accountability.
Loopholes and judicial theater dont do our Fourth Amendment rights justice."
Hoyer, under pressure from so-called Blue Dog Democrats wanting to avoid being
labeled soft on terrorism in the fall campaigns, justified the bill as a necessary
compromise. "It is the result of compromise, and like any compromise is not perfect, but I believe it strikes a sound
balance," Hoyer said in a press release announcing the deal. Thats a significant change for Hoyer, who in March in a
House floor speech opposed blanket immunity, saying "I submit that a reasonable responsible Congress would not
seek to immunize conduct without knowing what conduct or misconduct it is immunizing." The
Specter CP
Michigan 15
HJPV
Affirmative
Specter CP
Michigan 15
HJPV
Specter CP
Michigan 15
HJPV
Fails 2ac
Legal in roads to blanket immunity allow for functional checks
against overstretch- Attorney General specifically answers their
author
Sanchez, 08 (Julian, American libertarian writer living in Washington, D.C.. Currently a Senior fellow at the Cato
Institute, he previously covered technology and privacy issues as the Washington Editor for Ars Technica;
There are 50 ways to leave your lover, but only
Specter CP
Michigan 15
HJPV
are planning new attacks on our country ... that will make Sept. 11 pale
by comparison." Mr. Bush said he would not agree to giving the House more time to
debate a measure the Senate passed Tuesday governing the government's ability
to work with telecommunications companies to eavesdrop on phone calls and emails between suspected terrorists. The bill gives phone companies retroactive
protection from lawsuits filed on the basis of cooperation they gave the
government without court permission - something Mr. Bush insisted was included in the bill. About
40 lawsuits have been filed against telecom companies by people alleging violations of wiretapping and privacy laws. The
House did not include the immunity provision in a similar bill it passed last year. " In
order to be able to
Specter CP
Michigan 15
HJPV
Specter CP
Michigan 15
HJPV
Econ DA
Blanket immunity provisions stops the Telecom. Industry from being
subject to expensive lawsuits and upholds governmental cooperation
key to the overall industry (same card as below)
Etzioni, 3/9/15 (Amitai, prof. of IR at George Washington, senior adviser to the Carter White House and taught at
Columbia University, Harvard University, and the University of California at Berkeley; Do Tech Companies Owe It to the
Public to Cooperate With Surveillance?; http://www.theatlantic.com/politics/archive/2015/03/tech-companies-owe-itto-the-public-to-cooperate-with-surveillance/387094/)//JPM
Chi et al, 2014 (Jian, China Unicom; Wenji Chen, China Center for Information Industry Development;
Yaoqiang Han, China Center for Information Industry Development; Jing Li; Master Candidate
School of Software and Microelectronics, Peking
University; Research on Fourth Generation 4G Mobile Communication Industry Spillover Effect Empirical Case Study
of Beijing; file:///Users/jpmickyd/Downloads/lemcs0573.pdf)//JPM
AbstractAlong
research to analyze its spillovers effect. It uses the input-output model to carry an empirical study of mobile
communications (4G) spillovers effect. At last, from the perspective of both qualitative and quantitative, it analyzes the
contribution of mobile communication (4G) industry to the economy and society. Keywords- mobile communications
(4G); spillovers effect; empirical research I. INTRODUCTION With the accelerating informatization all around the
world, the
Specter CP
Michigan 15
HJPV
industries, the development of the whole economy and society has a considerable
contribution rate. As a supportive and high permeability basic industry,
telecommunication industry makes a considerable contribution to
the development of the whole economy and society . 4G technology is
an important component of the
world economy . The world's major telecom operators will or have started to deploy 4G
commercial network. By 2015, the global industry scale of communication, including 4G,
will reach 1.5 billion Yuan.
new growth point of
Specter CP
Michigan 15
HJPV
199096 was attributable to IT . Rller and Waverman (2001) find that up to one third
of OECD economic growth
197090
is attributable to
Specter CP
Michigan 15
HJPV
TSP Plank
Specter CP
Michigan 15
HJPV
Fails 2ac
TSP fails to solve attacks worse than the sqou, guts FISA
effectiveness
Anderson, 08 (Austin, J.D./M.B.A from Ohio State Moritz College of Law
and Fisher College of Business, Class of 2009. He received a Bachelor of Arts degree in
Political Science from Baylor University in 2004; 2008; The Terrorist Surveillance Program: Assessing the Legality of
the Unknown; http://moritzlaw.osu.edu/students/groups/is/files/2012/02/Anderson.pdf)//JPM
Despite the dearth of information regarding the TSP, commentators
Specter CP
Michigan 15
HJPV
clause necessary and appropriate force provided the president with the
authority to detain enemy combatants because the detention of troops was a
fundamental incident of waging war.53 Some critics contend that the use of electronic
surveillance is not a fundamental incident to war. On its face, a more likely interpretation is that
the act of capturing a prisoner of war on the battlefield is far easier to classify as a
fundamental incident of waging war than intercepting communication between
U.S. citizens and suspected terrorists abroad.54 Furthermore, wiretaps gather a
broader range of information without discerning whether the content has any
relation to national security.55 The existence of a congressionally approved
manner of using wiretaps necessitates the finding that this less discerning
method of gathering information is not a fundamental incident to war.56 As
previously noted, FISA contains two exceptions that provide conditions where the
government may conduct electronic surveillance without first obtaining a
warrant.57 Some critics believe that the presence of the second exception reinforces the
illegitimacy of the TSP. Suzanne Spaulding, who served as the executive director of the National Commission
on Terrorism, noted: FISA anticipates situations in which speed is essential. It allows
the government to start eavesdropping without a court order and to keep it going
for a maximum of three days. And while the FISA application process is often burdensome in routine
cases, it can also move with remarkable speed when necessary, with applications written and approved in just a few
hours.58 Additionally, the special court overseeing FISA warrants has been extremely accommodating over the years;
through December 25, 2005, only four of 5,645 applications for warrants were denied.59 Critics contend that the
collective weight of these arguments proves that Congress did not amend FISA through the AUMF. With FISA surviving
without amendment, the TSP was subject to the procedural guidelines established in the Act. The TSP indisputably
operated outside the FISA regulations; therefore, critics conclude that the program was a clear violation of federal law.
Specter CP
Michigan 15
HJPV
Ext. Fails
CP cant solve privacy infringes on 1st and 4th amendment rights
Anderson, 08 (Austin, J.D./M.B.A from Ohio State Moritz College of Law
and Fisher College of Business, Class of 2009. He received a Bachelor of Arts degree in
Political Science from Baylor University in 2004; 2008; The Terrorist Surveillance Program: Assessing the Legality of
the Unknown; http://moritzlaw.osu.edu/students/groups/is/files/2012/02/Anderson.pdf)//JPM
The Bush administration and critics of the
Prefer empirics- previous court cases prove its illegal and violates
FISA
Anderson, 07 (Austin, J.D./M.B.A from Ohio State Moritz College of Law
and Fisher College of Business, Class of 2009. He received a Bachelor of Arts degree in
Political Science from Baylor University in 2004; 2007; The Terrorist Surveillance Program: Assessing the Legality of
the Unknown; http://moritzlaw.osu.edu/students/groups/is/files/2012/02/Anderson.pdf, HeinOnline)//JPM
The response to the revelation of the TSP in The New York Times has been
significant.161 Several law schools across the nation have held symposia on the
topic.162 Members of Congress, from both parties, introduced a number of bills
on the topic in 2006. In January 2007, The New York Times described the
controversy as 13 months of bruising national debate.163 Perhaps the most
relevant response to the TSP is the recent litigation challenging the abandoned
programs legality. In August 2006, the American Civil Liberties Union won a
judgment against the National Security Agency.164 In the opinion, District Judge
Taylor found the TSP unconstitutional in that it violated the Fourth Amendment
and FISA.165 The administration appealed the case, and the Sixth Circuit
Specter CP
Michigan 15
HJPV
vacated the district courts judgment in July 2007.166 The Circuit Courts
decision turned on the Plaintiffs standing, rather than the constitutionality of
the TSP.167 Another case, Al-Haramain Islamic Foundation, Inc. v. Bush, has
made national headlines in 2007.168 Al-Haramain sued the Bush administration
for allegedly conducting warrantless surveillance on the organization and its
directors.169 The district court denied the governments motion to dismiss or, in
the alternative, for summary judgment, a decision from which the Defendants
appealed.170 The case appeared before the United States Court of Appeals for the
Ninth Circuit on August 15, 2007, for oral arguments,171 and the Court held that
Plaintiffs could not establish standing because the state secrets privilege
presently empowered the government to withhold evidence.172 However, the
Ninth Circuit remanded the case to the district court for a determination on the
issue of whether FISA could preempt the state secrets privilege.173