Professional Documents
Culture Documents
Millennial Debate
November 12, 2015 Policy Update
Millennial Debate
November 12, 2015 Policy Update
Millennial Debate
November 12, 2015 Policy Update
Executive Power DA NU
NU new ruling on telephone records
Charlie Savage, 11-9-15, New York Times, Judge Deals a Blow to NSA Data
Collection Program, http://www.nytimes.com/2015/11/10/us/politics/judgedeals-a-blow-to-nsa-phone-surveillance-program.html DOA: 11-12-15
AfederaljudgeonMondaypartlyblockedthe
NationalSecurityAgency
sprogramthat
systematicallycollectsAmericansdomesticphonerecordsinbulkjustweeksbeforetheagencywas
scheduledtoshutitdownandreplaceit.Thejudgesaidtheprogramwasmostlikely
unconstitutional.Inaseparatecasechallengingtheprogram,afederalappealscourtinNewYorkonOct.
30haddeclinedtoweighinontheconstitutionalissues,sayingitwouldbeimprudenttointerferewithan
orderlytransitiontoareplacementsystemafterNov.29ButonMonday,ina43pageruling,Judge
RichardJ.LeonofUnitedStatesDistrictCourtfortheDistrictofColumbiawrotethattheconstitutional
issuesweretooimportanttoleaveunansweredinthehistoryoftheprogram,whichtracesbacktoafterthe
Sept.11terroristattacksandcametolightin2013inleaksbyEdwardJ.Snowden,theformerintelligence
contractor.Withthegovernmentsauthoritytooperatethebulktelephonymetadataprogramquickly
comingtoanend,thiscaseisperhapsthelastchapterinthejudiciarysevaluationofthisparticular
programscompatibilitywiththeConstitution,hewrote.Itwillnot,however,bethelastchapterinthe
ongoingstruggletobalanceprivacyrightsandnationalsecurityinterestsunderourConstitutioninanage
ofevolvingtechnologicalwizardry.Undertheprogram,theN.S.A.hasbeencollectingAmericansphone
recordsinbulkfromtelephonecompanies.Itusesthedatatoanalyzesociallinksbetweenpeopletohunt
forhiddenassociatesofterrorismsuspects.JudgeLeonspecificallyorderedtheN.S.A.tostopcollecting
phonerecordsforonecustomerofVerizon:alawyerinCaliforniaandhislawfirm.Buthedidso,he
wrote,knowingthattheJusticeDepartmenthadsaidthatblockingthecollectionofjustonepersons
recordsmightrequireshuttingdowntheentireprogrambecauseitwouldbetechnicallydifficulttoscreen
himout.TheJusticeDepartmentsaiditwasreviewingthedecisionbuthadnocommentaboutwhetherit
wouldappealtheinjunction.ReutersreportedonMondaythattheN.S.A.hadsentamemotoCongress
sayingthattestingofthereplacementsystemhadbegun.Theprogrambeganbasedonaunilateralclaim
ofexecutivepowerbyPresidentGeorgeW.Bush.In2006,theJusticeDepartmentpersuadedtheForeign
IntelligenceSurveillanceCourttobeginissuingordersfortheprogramunderaninterpretationofa
provisionoftheU.S.A.PatriotActthatpermitscollectionofbusinessrecordsrelevanttoanational
securityinvestigation.
Millennial Debate
November 12, 2015 Policy Update
federalappealscourtblockedexecutiveordersdesignedtoshieldmillionsofundocumented
immigrantsfromdeportation.
Millennial Debate
November 12, 2015 Policy Update
thatwillendthiscollectionoftherecords.InsteadtheNSAwillbe
allowedtosearchthephonecompaniesdatabasesforsuchcallrecords,butonlyifitgetsawarrant.That
changewilltakeeffectonNov.29,andgovernmentlawyershadurgedJudgeLeontoallowtheNSAto
conductatransitiontothenewsystemonitsownschedule.JudgeLeonrejectedthatrequest.Henotedthat
withthecomingchanges,thecasemaymarkthelastchapterinthecurrentfightoverthegovernments
collectionofphonerecords.Buthesaidtheconstitutionalissuespresentedarecrucialones,andthatthe
casewouldntendthedebateoverthegovernmentsuseoftechnologytoconductsurveillance.Although
thiscourtappreciatesthezealousnesswithwhichthegovernmentseekstoprotectthecitizensofournation,
thatsamegovernmentbearsjustasgreataresponsibilitytoprotecttheindividuallibertiesofthosevery
citizens,hewrote.JudgeLeonalsorefusedtostayhisordertoallowtimeforfurtherappeals.However,
therulingaffectsonlysomeoftheplaintiffsinthisparticularcase,sincetheydemonstratedincourt
thattheirrecordswerebeingcollected.Lastmonth,afederalappealscourtinNewYorkruledinthe
oppositedirectiononthesameissue,sayingthephonerecordscollectioncouldcontinue
untilthe
programchangesattheendofNovember.
Millennial Debate
November 12, 2015 Policy Update
Nuclear Terrorism
Millennial Debate
November 12, 2015 Policy Update
The
problem has manifesting itself in central Europe where Hungary is besieged by growing numbers of
refugees passing through from Serbia and Croatia, forcing its government to build fences to stem the
influx. Hungarian prime minister Viktor Orbn warned European life and its established laws were under
threat from huge numbers of people heading through the continent from war-torn states in the Middle East.
In a defence against criticism of the aggressive stance against refugees taken by the country , he said
yesterday: "Our borders are in danger. Our way of life where we respect the law is in danger. "The whole of
Hungary and Europe is in danger. "The migrants are blitzing us." Hungary and Serbia have constantly been
at each others' throats over the issue, with Budapest urging its non-EU neighbours to do more to help
tackle the growing neighbours migrants. It is now sending troops armed with rubber bullets and tear gas to
cooperating Europe. "Mr Orban is right in stating that it would only worth to talk about quotas if we can
control the registration of the migrants coming to Europe. And so far no country has any idea how to do
that. "That's what the Hungarian Government has done, though it risks projecting an image of inhumanity."
He said reports of a Croatian train filled with 1,000 migrants illegally entering Hungary last week, could
easily be the sort of act that escalates the currently fraught situation. Politicians in Budapest described the
train's unannounced arrival as a "major, major incident". Mr Pinter said: "What did the Croatian
government think when they sent a train with 40 fully armed police officers on it, crossing the border at a
red signal? In the worse cases an afair like this can lead to an outbreak of a war." The escalating situation
Celente,
who is a trend forecaster in the United States, said the current crisis
draws huge parallels with a previous global conflict - in this case the
Second World War. He blames America's attacks on Libya, Iraq and most recently Syria, for
on the continent has also drawn interest across the Atlantic Ocean. Like Mr Pinter, Gerald
bringing "refugees of war" to Europe. Mr Celente said this is going hand in hand with trade wars, with
China devaluing its currency to gain a global advantage, similar to what happened prior to the Second
World War. Considering the current situation in Syria, where America is bombing president Bashar alAssad's regime while Vladimir Putin's Russia is defending him by attacking ISIS, his warnings are all too
clear. He said: "We're on the march to war. History is repeating itself. "It's a
repeat of the 1930s. The crash of 1929, the Great Depression, currency wars, trade wars, world war.
"We've got the panic of '08, the Great Recession, currency wars, trade wars and now we're seeing the
refugees of war sweeping on the shores of Europe." He said
Millennial Debate
November 12, 2015 Policy Update
alongside the rising tension between global superpowers is the threat emanating from Islamic State. Just
weeks ago Italian prime minister Sergio Mattarella said the seeds of a major conflict were being planted
across the region, with religious-based terrorism at the root of it. Speaking at a meeting of world leaders in
Millennial Debate
November 12, 2015 Policy Update
10
India-Pakistan Escalation
Next India-Pakistan crisis escalates, no deterrence
Dr. Qaisar Rashid, November 11, 2015, Daily Times,
http://www.dailytimes.com.pk/opinion/11-Nov-2015/nuclear-threat-in-southasia 11-12-15 Nuclear Threat in South Asia
Thecombinationofsizeofnuclearweaponswiththerangeofmissileshasprecipitatedthenuclear
threatinSouthAsiabetweenitstwonuclearstates,PakistanandIndia.Toelaborate,nuclearweapons
attachedtoshortrangemissilesposeonefacetofthechallengewhereasnuclearweaponsmountedonlong
rangemissilesofferanotherfacetofchallenge;bothchallengesarequiteremovedfromtheambitof
nuclearisationfordeterrencepurposes.OnOctober20,bymakingadeclarationthatithaddeveloped
lowyieldTacticalNuclearWeapons(TNWs)whetherornotattachedtoshortrangemissilesPakistan
mighthavestruggledtoemboldenitssecuritybut,atthesametime,Pakistaninvitedafive
dimensionalrisk.First,bydeclaringtheuseofTNWsagainstIndiasColdStartDoctrine,Pakistan
indicatedloweringthenuclearthresholdagainstIndia.Second,Pakistaninadvertentlyallurednon
stateactors,bothlocalandforeign,tofigureoutthepossibilitiesforprocuring,somehow,TNWs.
Third,Pakistanraisedthefearsoftheconcernedtothinkofapossibilityfornuclearterrorismasan
upgradedversionofthe9/11attackscoupledwiththefactthatPakistanisdeprivedofnonnuclear
proliferationcredentials.Fourth,Pakistaninvitedtheattentionofthecountriesengagedindealingwith
Iran(tomakeIrancapitsnuclearambitionsformilitarypurposes)todealnowwithPakistantoo.Fifth,
PakistanhasincreasedthechancesofitsvulnerabilitytothepreemptiveapplicationofUNSecurity
CouncilResolution1540passedinApril2004:Callingonallstatestorefrainfromsupporting,byany
means,nonstateactorswhoattempttoacquire,use,ortransfernuclearweaponsortheirdeliverysystems.
Pakistanseemstobeoblivioustothreefactsthatrelaytheremaybehighconsequencesforalow
probabilityact.First,throughtheKargilwarof1999,Pakistanhasprovedthatasubconventionalwar(ora
lowintensityconflict)belowthenuclearthresholdcanbepossibleacrosstheLineofControl(LoC)before
athirdpartysuchastheUSconvenesdiplomaticinterventiontodampendownthecrisis.Thedangernow
isthatthisprecedentmaybereplicatedormodifiedbyIndianexttimetointroduceaconflictacrossthe
LoCoreventheinternationalborder.Second,PakistanhastaughtIndiathefutilityofalargescalestand
off(onthepatternofthe1990and20012002crises).Thedangernowisthattheseprecedentscanhelp
Indiamodifyitsstrategynexttimetoachieveitsconflictobjectives.Third,thesubconventionalwarof
Kargilin1999acrosstheLoCandtheasymmetricconflict(orawarofattrition)intheformofthe
Mumbaiattacksin2008(plustheGurdaspurattackin2015)acrosstheinternationalborderwithIndia
haverenderedthetraditionalconceptofnucleardeterrenceobsoleteinSouthAsia.Nevertheless,the
confidenceofPakistan(initsengagementwithIndia)predicatingonasubconventionalwaracrossthe
LoCoralargescaleprolongedmilitarystandoffalongtheinternationalborder(besidestheLoCand
workingboundary)inthehopeofcrisisreductioninducedbythethirdpartysdiplomaticintervention
soonerorlaterwillbefraughtwithrisks.Itisalsoprobablethatthecrisis,inwhateverform,maynot
recedenexttimetothelevelofnormalcyand,instead,assumesanunpredictable,perilousturn
makingitdifficultforanycrisisactivatortoresolveitinanonviolentway.BothPakistanandIndia
seemtoberevelinginfivemajorillusions.First,bothcanbehaveastheUSandtheformerSoviet
Union,thetwonuclearcumsuperpowers,actedduringtheColdWarerabylettingnuclear
deterrencecircumventaconventionalwarbetweenthem.Thispointiswithoutrealisingthefactthat
thetwosuperpowerslockedhornswitheachotheronanideologicalstruggleandnotonterritorial
disputes,whichissomethingthathasintroducedbitternessintoPakIndiarelations.Secondly,both
PakistanandIndiacansustaintheconsequencesofthekindofColdWargoingonbetweenthem.Inits
wake,theColdWarbetweentheUSandtheformerSovietUnionwitnessedoneofthemthelatter
Millennial Debate
November 12, 2015 Policy Update
11
crumbleintopiecesunderitsownweight.Thirdly,bothPakistanandIndiabelievethatnuclear
deterrenceworkedinthepasttoavoidawarunderthefearofmutuallyassureddestruction(byusing
strategiclargeyieldnuclearweapons)andcanonceagainplaythesamerole.Thispointiswithout
consideringthefactthatbothhaveenteredtheeraofTNWsthatarebothportableandhandy.
Fourth,bothPakistanandIndiacancontinuebankingonthethirdpartysdiplomaticintervention
toreducethenearwarcrisisbetweenthem,astheUShasdoneeverytimeinthepast,andthesamecan
happenagaindispassionately.Thispointiswithoutrealisingthefactthat,since1999,theUShasmoved
nearertoIndiaandfartherfromPakistan.ThemajorhindrancetotheestrangementbetweenPakistanand
theUSistheongoingwaronterrorsecondedbytheengagementofUSforcesinAfghanistan.TheUS
prefersnottoannoyPakistanatthistime.Fifth,bothPakistanandIndiathinkthattheirtheoreticalnuclear
principles,strategiesanddoctrinesareequallyworkablepractically.Thisisdespitethefactthatneitherof
themtestedtheseparadigmsontheground,astherehastakenplacenonuclearwarbetweenthem.
Computerbasedsimulationsarenotanalternativeforaphysicalbattleground.
SouthAsiahastranscendedthelimitsofpossessingnuclearweaponsfordeterrencepurposes,thereby
makingtheconceptofnuclearisationfordeterrencepurposesdeadandrenderingtheconceptofminimal
credibleorcredibleminimaldeterrenceoutdated.Theaddedpressureisexertedbytheabsenceofany
treatyagreeingonnofirstnuclearstrikeagainsttheother.Furthermore,withtheloweringofthenuclear
threshold,thechancesofabruptoraccidentalescalationofanuclearwarhaveincreasedmanifoldbetween
PakistanandIndia.Unfortunately,inPakistan,thereisavailablenointernalhandletoturnoffthenuclear
menace.
Millennial Debate
November 12, 2015 Policy Update
12
Millennial Debate
November 12, 2015 Policy Update
13
Thatisanunacceptablecosttopay.MauronisaysthatYes,therearehundredsofcasesoflostorstolen
radioactivematerialeveryyear,thoughoverwhelminglynothighlyenricheduraniumorplutonium.And
yettherehasneverbeenadetonateddirtybombinhistory.Ever.Simplybecausesomethingterriblehas
nothappeneddoesnotmeanthatitcannotorwillnothappen.Thisisthefallacyofusingpast
performancetopredictfuturebehavior;everystockbrokerwarnsyouaboutdoingthis.Aspace
shuttlehadneverblownup,beforeonedid.Atsunamihadneverstruckanuclearpowerplant,until
onedid.Aterroristgrouphadneverflownplanesintoofficetowers,untilonedid.
Millennial Debate
November 12, 2015 Policy Update
14
Millennial Debate
November 12, 2015 Policy Update
15
Mauronicallsthisfearirrational,andsaysthatmyclaimofradioactivecontaminationcausingan
affectedcitycentertoshutdownisridiculous.Heelaborates,sayingthat
WhatCirincionemeans(butdoesntsay)isthatpublicofficials,panickingbecauseoftheperceptionof
radioactivedispersalintheircity,willordertheevacuationofpeoplefromthecontaminatedareatoinclude
ahealthybufferareafurtherout,notbecauseoftheactualpublichealthriskofafewmillicuriesof
radiationexposureeveryday,butbecausetheydontwanttobefiredasaresultofnotbeingreactive
enough.
DowntownWashingtonisasmallpieceofrealestate.Infact,allthreebranchesofthefederalgovernment
areonlyabouttwomilesapartfromoneanother.DoesMauronireallythinkthatifsomeoneweretosetoff
adirtybombsomewhereonPennsylvaniaAvenue,thefederalgovernmentwouldcontinuetofunction?
IfIfoundoutthatadirtybombhadexplodedontheNationalMall,andthatmyofficewasahalfmile
awayandthewindwasblowingawayfromme,wouldIstayatwork?Noway.Andneither,Iwouldbet,
wouldMauronievenknowingagreatdealaboutthelimitationsofsuchadevice.Certainlynooneelse
inthecitywouldstayinplace,calmlycontinuingtowork.Thecitywouldbeinamasspanic.Irrational?
Maybe.Butveryrealterrorwouldgripthecity.
Thiswouldnotimpactjusttheuninformedpublic,anditwouldnotbeoverinjustoneday.Ifevena
smalldirtybombattackdosedtheU.S.Capitol,SupremeCourt,orHouseorSenateofficebuildingswith
cesium(whichbondswithcementbytheway),wouldanyofthethousandsoflegislativeorjudicialstaffers
whokeepthegovernmentrunningreallycomebacktowork?IrememberwhentheRayburnHouseOffice
BuildingwaswrappedinplasticandworkersinHAZMATmoonsuitsworkedfordaysafterananthrax
scarein2001.
OneofthemajorconcernsaboutthedirtybombthreattotheportsofLosAngelesandLongBeachisthe
potentialforanextendedshutdownoftheregionsoperations.Whileitisveryhardtopredicthowlongthe
portswouldbeinoperableitisunderstoodthatlargeareasoftheportswouldbesubjectedtoshort,
medium,orevenlongtermclosuresbecauseof:concernsofdockworkersaboutreturningtowork,
concernsofshippersaboutdeliveringgoodstotheharbors,[and]extensiveproceduresrelatedto
decontaminationactivities.
ThecontinuedshutdownofthePortofLosAngeleswouldbeeconomicallydevastating.Thereportgoes
on:
Severalshutdownscenarioswereanalyzed,rangingfromshort(15days)tomedium(120days)tolong
(oneyear).The15dayshutdownhasasmallimpact(about$300million)becausemostshipswould
simplywaitouttheportclosuresandbusinesseswouldbesuppliedthroughotherports.The120dayand
Millennial Debate
November 12, 2015 Policy Update
16
oneyearshutdowns,incontrast,havesignificantimpacts($63and$252billion,respectively)becausethey
accountfortheeconomicimpactsofadelayofdeliveringgoodsaswellasallrippleeffectsthroughoutthe
nationseconomythatsuchlongtermdelaysinvolve.Thisincludescostsrangingfromthelossoflocal
dockworkerjobstothereducedincomeandpossibleforcedclosureofnationwidebusinessesnotreceiving
necessarypartsorretailproducts.
Millennial Debate
November 12, 2015 Policy Update
17
Millennial Debate
November 12, 2015 Policy Update
18
A. Economic Costs
By some estimates, U.S. companies stand to lose billions of dollars from
consumers choosing non-U.S. technology service providers that they perceive
as less vulnerable to U.S. surveillance. In July 2013, a month after the
Snowden disclosures, a Cloud Security Alliance survey found that 66% of nonU.S. members reported that they had either canceled a project with or were
less likely to use U.S.-based cloud service providers. n132 Analysts estimated
that the U.S. cloud computing industry could lose between $ 35 billion and $
180 billion. n133 A January 2014 survey suggests these predictions may
already be playing out: 25% of 300 British and Canadian businesses surveyed
indicated that they were moving their data outside of the United States. n134
One Washington, D.C.-based privacy lawyer warns that American companies
are "taking a beating in the market place" as a result of perceived
discrepancies in privacy protections. n135 In anticipating that countries will
develop stricter domestic privacy regulations and data-localization laws, the
Information Technology and Innovation Fund predicts that growth in the U.S.
technology-services industry could slow by as much as four percent.
Millennial Debate
November 12, 2015 Policy Update
19
M.P.P. 2016. Daniel Severson served as a Harvard Presidential Public Service Fellow at the U.S.
Department of Defense, and a Council of American Ambassadors Fellow at the U.S. Department
of State
Millennial Debate
November 12, 2015 Policy Update
20
M.P.P. 2016. Daniel Severson served as a Harvard Presidential Public Service Fellow at the U.S.
Department of Defense, and a Council of American Ambassadors Fellow at the U.S. Department
of State
p. 488-9
Fourth, the U.S. government may view the economic costs as tolerable. One
recent study attempted to quantify the annual costs of cyber crime and cyber
espionage by analogizing them to the costs of doing business in other
industries. The report noted that car crashes, maritime piracy, and pilferage
of sales inventory each cost society roughly one percent of national income
per year. n151 Despite these costs, we continue to drive cars, use giant
merchant ships, and sell goods because these activities provide aggregate
benefits in efficiency and convenience. The U.S. government may have made
a similar calculation: although surveillance may cost U.S. firms, such costs
are acceptable in light of the benefits to national security, whether that
means information to combat international terrorism or strategic intelligence
to inform foreign policy. The costs may even be more tolerable than other
accepted costs. For instance, automobile accidents cost the United States
between $ 99 billion to $ 168 billion per year, or between 0.7% and 1.2% of
GDP, a cost we are willing to accept because of the benefits such
transportation provides. n152 By contrast, estimates indicate NSA
surveillance costs U.S. cloud computing firms (a major sector of the U.S.
economy) less--between $ 17.5 billion and $ 90 billion over two years (20142016). n153 While these cost figures are not entirely comparable, they
suggest that the government may have reason to consider the costs to
society as acceptable.
Millennial Debate
November 12, 2015 Policy Update
21
Fifth, it is possible that the damage is done, and that further government
action will not help U.S. firms in a meaningful way. In this sense, Snowden's
unauthorized disclosure of sensitive documents may have created a one-time
sunk cost. If this is true, then the economic cost is unavoidable but should not
afect future decision-making.
Millennial Debate
November 12, 2015 Policy Update
22
Millennial Debate
November 12, 2015 Policy Update
23
Even state laws cant control it, and its free from federal
law
Jason Kreag, Associate Professor, University of Arizona, October 2015, Boston
University Law Review, Going Local: The Fragmentation of Genetic
Surveillance, http://www.bu.edu/bulawreview/files/2015/10/KREAG.pdf DOA:
11-12-15, p. 1493
This Article makes three claims. First, cutting-edge genetic surveillance
issues are playing out on the local level, free from federal regulation and
often in the absence of state or local laws. n4 Second, this Article responds to
Professor Rachel Harmon's challenge to scholars to help law enforcement
establish "harm-efficient policing" practices by identifying and measuring
external harms generated by policing that are not captured by law
enforcement's narrow focus on solving crime.
Millennial Debate
November 12, 2015 Policy Update
24
Millennial Debate
November 12, 2015 Policy Update
25
total discretion about who to target for inclusion in these databases. This has
resulted in police seeking out the "usual suspects" - poor people of color - to
secure DNA samples for these databases.
Millennial Debate
November 12, 2015 Policy Update
26
Millennial Debate
November 12, 2015 Policy Update
27
databases and for expunging DNA records. n57 Adopters argue that local
databases are more efficient, providing hit confirmations within days of
submitting DNA samples to the laboratory as opposed to taking six months to
a year, which is common when dealing with CODIS. n58
Millennial Debate
November 12, 2015 Policy Update
28
Millennial Debate
November 12, 2015 Policy Update
29
Yet, the majority of these individuals will never be the subject of a DNA hit.
Furthermore, if law enforcement's use of local databases follows the patterns
of other surveillance techniques, people of color will disproportionately feel
this increased surveillance of innocent people. n211
Scholars have criticized over-inclusive surveillance techniques that scoop up
large numbers of innocent people in order to identify the few actual
ofenders. n212 Some scholars have proposed theoretical schemes to limit
police activities that are over-inclusive in order to curb the harms borne by
innocent people. n213 However, these schemes are in tension with the very
premise of local databases. These databases are designed with the
assumption that they will ultimately include a large number of DNA profiles
from people who will never be linked to a crime. Law enforcement officials
accept this outcome in exchange for the better odds that a larger database
will yield more hits to actual perpetrators. n214
Some will argue that there is no, or at best only a very small, privacy
deprivation that results from adding DNA profiles of innocent, law-abiding
people to local databases, concluding that because these people will not
commit crimes in the future their privacy interests are not diminished. For a
variety of reasons, I disagree. First, DNA matches in local DNA databases will
not only identify potential perpetrators of criminal activity, they also have the
potential to highlight innocent, but highly personal and/or embarrassing
information. n215 For example, the use of familial searches, a common
practice for local databases, has the potential to identify previously unknown
biological relationships. n216 Similarly, when police arrive at the scene of a
burglary and ask the victim and her family to provide DNA samples for
elimination purposes, the victim might be forced to tell the police that she
was having an afair, and with whom she was having an afair, so as to
eliminate the possibility that her afair partner is accused of the burglary.
In addition, there is the risk that awareness of one's DNA profile being
included in a local database will alter behavior and limit self-expression. To be
certain, altering behavior is one of the stated goals of DNA databases and all
police surveillance activities. n218 Proponents and courts emphasize the
ability of DNA databases to deter crime. n219 However, like other
surveillance techniques, genetic surveillance carries the potential to alter
innocent behavior, curb unpopular behavior, and limit political and
associational freedom. In the summer of 2012, the NYPD's use of its local
database during the Occupy Wall Street protests demonstrated how genetic
surveillance can chill political activity. n220 The NYPD collected DNA from a
chain that it believed protestors used, and it quickly compared the DNA to
profiles from other unsolved crimes in the NYPD database. n221 When the
profile from the chain matched to an unsolved murder, the news linking an
Occupy Protester to a prior murder quickly gripped the national media. n222
However, almost as quickly as the sensational story broke, the NYPD
admitted that the purported match was the result of a lab error. n223 The
aggressive use of DNA analysis at the scene of one of the protests and the
fact that the purported link to a murder was leaked so quickly prompted
criticism of the NYPD's practices. Professor David Kaye explained:
Millennial Debate
November 12, 2015 Policy Update
30
What's interesting is taking [the DNA] from a chain that so many people could
have touched and then running that through the database of crime-scene
samples ... . I guess that's creative. They're either very committed to finding
clues, no matter how weak, or they're out to get a group of people. n224
In addition to chilling political expression, the expansion of genetic
surveillance carries the potential for more insidious invasions of privacy.
Professor Kimberly Bailey has characterized how ongoing and comprehensive
police surveillance "has a chilling efect on poor people of color's selfdetermination, self-expression, and freedom of association." n225 In more
concrete terms, the expansion of genetic surveillance will afect routine daily
decisions, such as whether to spend time outside with friends and which
route to take to school or work so as to minimize the opportunity for an
unwelcome encounter with the police.
Local databases also present new privacy threats because they promise to
expand the use of familial DNA searches. n227 Such searches, which are
performed after law enforcement fail to find an exact match to a known
individual, ofer law enforcement the fallback of trying to identify a family
member of the actual perpetrator. n228 Armed with the identification of a
family member, law enforcement can pursue the family member to identify
the actual source of the crime-scene DNA. Currently, CODIS restricts law
enforcement's use of familial searches. n229 Many states have also adopted
laws prohibiting such searches. n230 However, in the states where
lawmakers have remained silent on this issue, local databases have the
capability of performing familial searches. n231 Indeed, the ability to perform
familial searching is one of the reasons why the Arizona Department of Public
Safety developed its non-CODIS database.
The expansion of local DNA databases also brings into sharper focus the fears
many privacy advocates raised about CODIS. In short, they feared that once
the FBI's DNA database was created, it would be too tempting for law
enforcement to be able to limit its use, causing the tool to evolve and reach
deeper into our lives. n233 CODIS's growth demonstrates the merit of these
fears. CODIS expanded from an initial focus on collecting profiles from
ofenders convicted of certain violent crimes, to including all felony ofenders,
to now including all arrestees. n234 Similarly, after first prohibiting familial
searches, CODIS now permits them in certain circumstances. n235 These
advocates also fear what might come next, when technology allows us to
glean even more information from an individual's DNA sample. n236 They are
particularly fearful of the possibility that law enforcement might use genetic
samples to attempt to identify a genetic predisposition to crime. n237
Finally, the expansion of local databases will contribute further to the erosion
of privacy protections, to the extent that people come to expect increased
surveillance. Fourth Amendment privacy protection is linked to society's
reasonable expectations of privacy. n238 As many have noted, this standard
is fluid, but it has historically moved in the direction of society accepting
lesser privacy protections. Law enforcement's expansion of genetic
Millennial Debate
November 12, 2015 Policy Update
31
surveillance has contributed to this trend, and the trend will continue as it
becomes routine for even small agencies to build local databases.
Millennial Debate
November 12, 2015 Policy Update
32
Importantly, this message can also negatively impact the habits of police.
Professor David Sklansky has observed this in the context of officers who
repeatedly invade citizens' privacy interests, a prospect that seems quite
applicable to the populating of local databases. n245 Professor Sklansky
theorizes: Privacy violations are harmful not solely because of their efects on
the victims, but also, and maybe mostly, because of the habits and ways of
thinking they engrain in the violators... . [Such violations] can train
individuals and organizations in habits of dehumanization and
depersonalization. n246
Scholars have criticized other aspects of the criminal justice system that
cause similar harms in identifying the potential wrongdoer as someone with
reduced dignity interests. n247 For example, in the parole context, Professor
Cecelia Klingele warns that our system reinforces divisive assumptions that
those implicated in the criminal justice system are inherently diferent and,
perhaps, less human than people who have not been arrested or convicted.
The expanded use of local DNA databases carries the potential to do the
same thing.
Millennial Debate
November 12, 2015 Policy Update
33
Millennial Debate
November 12, 2015 Policy Update
34
Millennial Debate
November 12, 2015 Policy Update
General Privacy/Surveillance
35
Millennial Debate
November 12, 2015 Policy Update
36
Millennial Debate
November 12, 2015 Policy Update
37
Millennial Debate
November 12, 2015 Policy Update
38
Millennial Debate
November 12, 2015 Policy Update
39
Millennial Debate
November 12, 2015 Policy Update
40
Millennial Debate
November 12, 2015 Policy Update
41
Millennial Debate
November 12, 2015 Policy Update
42
Millennial Debate
November 12, 2015 Policy Update
43
Millennial Debate
November 12, 2015 Policy Update
44
Millennial Debate
November 12, 2015 Policy Update
45
disclosure. n278 The third potential issue in squaring this doctrine with
warrantless government surveillance of customer data is that a corporation
probably does not have enough of an independent "personal" interest in the
confidential information of its customers to assert the right to nondisclosure.
n279 In this context, a corporation's right of privacy rests more securely on
Fourth Amendment principles than it does on a tenuous right to nondisclosure
of personal information.
Conclusion
The interests protected by the right to privacy are multifaceted, and not
limited to protecting the emotional security of individual human beings;
privacy also shields interests related to property, autonomy, and
confidentiality, all of which are of profound importance to corporations. Aside
from the corporation's stand-alone interest in protecting pecuniary interests,
a corporate right to privacy in the personal records of customers vindicates a
public interest in ensuring that government surveillance is bounded by the
Constitution. Corporations are better situated to assert a right to privacy in
the context of Section 702 programs, in part because corporations, not the
targeted users, are the custodians of user data, and in part because of the
evolution of Fourth Amendment doctrine. Thus, recognizing a corporate right
to privacy in sensitive customer records serves the purposes of protecting the
corporation's stand-alone interests, acting as a check on government
surveillance, and protecting the more personal and emotional aspects of the
right to privacy of the customers.
Millennial Debate
November 12, 2015 Policy Update
46
Millennial Debate
November 12, 2015 Policy Update
47
M.P.P. 2016. Daniel Severson served as a Harvard Presidential Public Service Fellow at the U.S.
Department of Defense, and a Council of American Ambassadors Fellow at the U.S. Department
of State
Millennial Debate
November 12, 2015 Policy Update
48
M.P.P. 2016. Daniel Severson served as a Harvard Presidential Public Service Fellow at the U.S.
Department of Defense, and a Council of American Ambassadors Fellow at the U.S. Department
of State
Millennial Debate
November 12, 2015 Policy Update
49
Millennial Debate
November 12, 2015 Policy Update
50
M.P.P. 2016. Daniel Severson served as a Harvard Presidential Public Service Fellow at the U.S.
Department of Defense, and a Council of American Ambassadors Fellow at the U.S. Department
of State, p. 471-2
Millennial Debate
November 12, 2015 Policy Update
51
Millennial Debate
November 12, 2015 Policy Update
52
Millennial Debate
November 12, 2015 Policy Update
53
attention fades over time. By June 2014, global media coverage had already
declined to less than two percent of the reporting from the initial maelstrom.
n160 Therefore, the U.S. government might reasonably conclude that
diplomatic tensions will ease over time.
Millennial Debate
November 12, 2015 Policy Update
54
Millennial Debate
November 12, 2015 Policy Update
55
but the Committee emphasizes that a State Party must "respect and ensure
the rights laid down in the Covenant to anyone within the power or efective
control of that State Party, even if not situated within the territory of the
State." n169 Essentially, the HRC reads the phrase "subject to [a State
Party's] jurisdiction" expansively to include persons "within the power or
efective control of the forces of a State Party acting outside its territory."
n170 The Committee emphasizes that such obligations would obtain, for
instance, for persons under the control of a State Party's peacekeeping force,
but the Committee notes that the obligations apply "regardless of the
circumstances in which such power or efective control was obtained." n171
Given this interpretation, some human rights advocates argue that the NSA's
surveillance of foreigners abroad amounts to "efective control" of their
correspondence, and therefore that such surveillance "interferes" with the
right to privacy. n172 Because the section 702 program involves the
compelled assistance of communications service providers, these advocates
argue the surveillance necessarily occurs within U.S. territory or within its
jurisdiction. And because large volumes of foreign-to-foreign Internet traffic
travel over U.S.-based infrastructure, the treaty may also apply to many
surveillance activities conducted pursuant to Executive Order 12333.
The argument is tenuous for several reasons. First, the Human Rights
Committee's interpretations are not binding, and the U.S. government has
never committed to them. The HRC is charged with receiving reports
submitted by nations under the ICCPR's self-reporting provisions and issuing
"such general comments as it may consider appropriate." n174 The
Committee has assumed broader powers of interpretation, but its original
mandate is narrower and nonbinding. n175 Contrary to the HRC, the U.S.
government contends that the ICCPR's obligations do not run to activity
outside a State Party's jurisdiction. According to the U.S. government, the text
of the treaty imposes a "dual requirement": obligations only apply when a
person is both within U.S. territory and under its jurisdiction. n176 The
treaty's negotiating history confirms this interpretation. Anxious about the
ICCPR applying to foreign persons under U.S. occupation after World War II,
the United States suggested adding the phrase "within its territory." n177 The
language was adopted, and subsequent eforts to remove the phrase failed.
n178 But even if one reads "and" as "or" and the ICCPR were to apply to U.S.
electronic surveillance activities outside the United States, the U.S.
government may nevertheless satisfy its obligations. For instance, section
702 programs--which limit collection to specific national security purposes-are not necessarily "arbitrary or unlawful," especially in the absence of an
international norm as to when surveillance of another state's citizens
amounts to "arbitrary or unlawful" action. n179 In sum, under the ICCPR the
United States is bound--as a matter of international law, but not domestic
law--to protect the right to privacy of citizens and aliens alike. But, according
to longstanding U.S. interpretations of international law, that obligation does
not apply extraterritorially. n180
As a practical matter, it is also worth noting that currently no one can obtain
a legal remedy for U.S. violations of the ICCPR. Under the U.S. Constitution,
treaties are the "supreme Law of the Land," n181 but the Supreme Court has
Millennial Debate
November 12, 2015 Policy Update
56
held that only self-executing treaties provide rules of decision for U.S. courts.
n182 When the Senate provided its advice and consent to the ICCPR, it
attached a declaration that Articles 1-27 of the treaty are not self-executing.
n183 Consequently, although the treaty binds the United States as a matter
of international law, state and federal courts are not bound to enforce its
terms. On the international plane, the United States has not signed the
Optional Protocol to the ICCPR, which extends the Human Rights Committee's
powers to cover complaints by private individuals. n184 Therefore,
individuals also cannot appeal alleged violations to the HRC.
Second, even if the ICCPR did apply to U.S. extraterritorial activities,
surveillance does not naturally amount to "efective control" of a person.
Such an interpretation seems strained. Interference with correspondence
hardly amounts to efective control of a person in the same manner as
physical detention. It is far from obvious that intercepting an individual's
communications would render her subject to the jurisdiction of the state
conducting surveillance.
Third, international human rights law was not thought to cover foreign
surveillance until very recently. Snowden's unauthorized disclosures are not
the first to reveal the U.S. government's spying on Western allies. As recently
as 2001, a major controversy emerged over ECHELON, a signals intelligence
collection program conducted by the United States and certain allies.
Although the means and scope always remained unclear, under the program
Anglo-American countries intercepted communications around the world,
including in Europe. European leaders protested, and the European
Parliament created a special committee to investigate the program. The
resulting report noted that ECHELON could conduct "quasi-total surveillance"
by intercepting "any telephone, fax, Internet or e-mail message sent by any
individual." n185 However, the report concluded that ECHELON did not
violate existing EU law, n186 and failed to address whether the program
violated the ICCPR. n187 The EU report noted that European states conducted
massive surveillance programs, n188 but it did not address whether those
programs violated the ICCPR, either. That the Committee investigated
ECHELON thoroughly but did not study the program's compliance with the
ICCPR nor EU country surveillance programs' compliance with the treaty,
suggests the EU may have believed either that such espionage did not in fact
violate international law or that any such violations were so pervasive as to
be legally irrelevant. Moreover, given that states have practiced massive
surveillance routinely under the ICCPR, the proper interpretation is that the
ICCPR does not apply to such electronic surveillance. In any event, the idea
that international human rights law applies to electronic surveillance appears
to be of only recent vintage.
Fourth, no international law prohibits peacetime espionage. Under the Lotus
principle, absent an explicit prohibition, sovereign states retain general
freedom of action. n189 Because international law has never prohibited
intelligence gathering, n190 states may engage in it freely, subject to
traditional consequences outside international law, such as diplomatic
expulsions, punishment of captured spies, and public denunciations.
Millennial Debate
November 12, 2015 Policy Update
57
Millennial Debate
November 12, 2015 Policy Update
58
M.P.P. 2016. Daniel Severson served as a Harvard Presidential Public Service Fellow at the U.S.
Department of Defense, and a Council of American Ambassadors Fellow at the U.S. Department
of State, p. 495
Assessing the economic and diplomatic costs versus the benefits of U.S.
surveillance necessarily involves a high degree of indeterminacy. It would be
difficult to measure the impact of extending various privacy protections to
non-U.S. persons. Even if the impact could be measured, some of the key
supporting facts and conclusions would certainly (and perhaps justifiably)
remain classified. The risks associated with granting more protections to nonU.S. persons are not obviously large or small. They involve uncertainty. In this
sense, the lack of protections may be viewed as a safeguard against
international terrorism, espionage, and other threats to national security.
Does it make sense to terminate that policy? In the face of uncertain but
potentially devastating risks, incentives push in the other direction. Moreover,
it is important to remember that the IC collects information not only to detect
and thwart international terrorism and espionage, but also to facilitate the
conduct of foreign afairs. Extending privacy protections may slow or restrict
such activities to the point where valuable information is lost. If valuable
information is lost, then the question becomes whether it is worth incurring
the cost of economic harm and diplomatic irritation. Only if the diplomatic
and economic harms are significant and sustained should the United States
consider placing substantial constraints on signals intelligence gathering. In
the event, the economic costs may be exaggerated, and such costs may also
decline over time as the controversy fades from view. The diplomatic costs
also appear temporary; many countries, including U.S. allies and partners,
spy on each other's citizens, and diplomatic relations are improving.
M.P.P. 2016. Daniel Severson served as a Harvard Presidential Public Service Fellow at the U.S.
Millennial Debate
November 12, 2015 Policy Update
59
Department of Defense, and a Council of American Ambassadors Fellow at the U.S. Department
of State, p. 498-9
Millennial Debate
November 12, 2015 Policy Update
60
Millennial Debate
November 12, 2015 Policy Update
61
Third, bringing more programs under the FISA framework raises a potential
constitutional objection. A full treatment of the constitutional question
remains outside the scope of this Note. However, it is worth noting that the
President and Congress share war powers and some foreign afairs
responsibilities. On the one hand, enacting legislation that sets standards for
executive action appears to be well within Congress's Article I powers. On the
other hand, the President has expertise in conducting foreign afairs and
needs discretion to exercise his Article II powers efectively. n221 When the
President directs foreign surveillance, he does so pursuant to his powers as
Commander in Chief and head of the Executive Branch. Conducting foreign
surveillance to understand the capabilities, plans, and intentions of foreign
actors and threats to the United States falls squarely within those powers. For
Congress to inject statutory constraints on those powers or impose judicial
oversight would alter the distribution of foreign afairs powers between the
President and the Congress, thereby raising a potential constitutional
problem.
Millennial Debate
November 12, 2015 Policy Update
62
Millennial Debate
November 12, 2015 Policy Update
63
resulted in higher casualties than all previous terrorist incidents in the United
States combined. n208 The logic also assumes that among the people who
are opposed to the United States, more of them live abroad than within the
country. It follows that the threat is greater overseas.
Second, the government does not collect foreign intelligence information
merely to thwart international terrorist or other hostile attacks. The
government also collects information to generate knowledge and seize
opportunities for foreign afairs purposes, such as preparing for trade
negotiations and assessing economic trends in foreign countries.
Third, by enacting FISA the Congress determined that foreign intelligence
collection in the domestic context presents a special danger to U.S.
democratic institutions. The risk of politically motivated targeting and other
abuses rises when the government directs its powerful tools of foreign
surveillance inward. n209 A government's surveillance against its own people
is particularly dangerous because the government can deprive liberty or
allocate benefits and burdens based on what it knows about a person's
private life. Surveillance also risks chilling freedom of expression and
association, as persons change their behavior in order to avoid these risks.
Because most foreigners are not subject to U.S. jurisdiction, government
surveillance of foreigners generally poses fewer risks. To be sure, signals
intelligence collection on foreigners could chill freedom of expression abroad,
as foreigners change their communication behaviors in an attempt to avoid
U.S. surveillance. Given international commerce, such a chilling efect abroad
could negatively impact U.S. economic interests, as foreigners restrict the
scope of their creative activities. But these chilling efects are speculative and
any efect would be smaller than in the domestic context. Therefore, even
though some may argue that the government could possibly save more
American lives by directing its surveillance powers inward, the cost to
democratic institutions would prove too high. Overall, the U.S. person
distinction serves an important purpose.
Eliminating the distinction would also threaten to lower the protections U.S.
persons already enjoy. Under the current legal framework, providing identical
protections to U.S. persons and non-U.S. persons would efectively prevent
bulk signals intelligence collection outside of the United States altogether.
Sections 703 and 704 of the FAA restrict the targeting of U.S. persons outside
the United States, a category of foreign intelligence previously outside the
scope of FISA. Under both sections, the FISC must find probable cause that
the target is reasonably believed to be located outside the United States, and
probable cause that the target is a foreign power, an agent of a foreign
power, or an officer or employee of a foreign power. If non-U.S. persons were
aforded the same protections as U.S. persons--in other words if the scheme
"leveled up" protections for non-U.S. persons--then all collection on foreigners
outside the United States would need to follow section 703 and 704
prescriptions. Because these provisions require an individualized showing of
probable cause, the government would need to make individual applications
for FISC warrants, thereby preventing bulk collection. Faced with this
prospect, the government would either need to cancel bulk signals
Millennial Debate
November 12, 2015 Policy Update
intelligence collection programs or alter the legal standard, which would
efectively water down the predicate for U.S. persons.
64
Millennial Debate
November 12, 2015 Policy Update
65
M.P.P. 2016. Daniel Severson served as a Harvard Presidential Public Service Fellow at the U.S.
Department of Defense, and a Council of American Ambassadors Fellow at the U.S. Department
of State, p. 509
The above analysis outlines the costs involved in abandoning the distinction,
but other considerations are noteworthy, too. At present, political
considerations probably push against abolishing the distinction. An American
president considering extending privacy protections to foreigners may need
to convince a skeptical public that increased protections for non-U.S. persons
would not expose the United States to greater threat. The American public
may also wonder why the U.S. government should extend protections to
foreigners if no other country has so far been willing to do the same. n210
Few if any countries protect non-citizens in signals intelligence collection
abroad. Indeed, as Justice Powell has noted, "it would be contrary to the
public interest for Government to deny itself the prudent and lawful
employment of those very techniques which are employed against the
Government and its lawabiding [sic] citizens." n211 It is worth noting that the
constituencies most likely to favor eliminating the distinction--illegal aliens
and lawfully admitted aliens on student or other temporary visas in the
United States, as well as foreigners outside the United States--have limited
political power within the United States. Perhaps for this reason, Congress has
never publicly debated altering the standards for non-U.S. persons. n212
Foreigners do have some leverage, however. For instance, if citizens in Italy
or Germany grew sufficiently upset about U.S. signals intelligence activities,
those countries could withdraw support for U.S. naval and other military
installations. Those bases are crucial to U.S. force projection around the
world. Because the U.S. government depends on cooperative relationships
with other countries to achieve its national security and interests, strong
objections from key partners could prompt more serious consideration of this
issue. Absent a change in circumstances, however, the political climate in
the United States will likely not prompt active consideration of any changes to
the protections for non-U.S. persons.
Millennial Debate
November 12, 2015 Policy Update
66
Millennial Debate
November 12, 2015 Policy Update
67
Millennial Debate
November 12, 2015 Policy Update
68
Doing so saves resources and focuses collection eforts. However, a rule that
narrows collection absolutely seems untenable in practice.
Retention. The main restriction on retention is that information with no
foreign intelligence value must be purged no later than five years from
collection. A commitment to purge irrelevant information would theoretically
benefit foreigners who do not want the government to retain highly personal
or embarrassing information about them. And if the data is irrelevant, then
the government loses nothing if it purges the data. However, limiting
retention would be unlikely to satisfy foreigners who worry more about the
collection of information in the first instance. Such a policy then would
provide little value. Even if limits on retention were seen as valuable, it would
prove difficult to implement. When reviewing intelligence, analysts often find
it difficult to assess whether a given piece of information has foreign
intelligence value. In order to justify purging a piece of information, an NSA
analyst must determine not only that the piece of information has no present
foreign intelligence value to her, but also that such intelligence would not
ofer valuable information to any present or future foreign intelligence need.
n218 Valuable information might be lost. Five years might not aford a
sufficient period of time for the data to be exploited, as the IC might wish to
use the data for assessing patterns over longer time periods. Moreover, a rule
that requires purging information of no value could impose a high
administrative cost, not to mention privacy cost, as analysts would be
required to examine information that would have gone untouched. The
increased costs could be time-bound; if the government imposed retention
standards, it could spur the IC to invest in technologies to filter and purge
information automatically. However, the viability of such solutions remains
unknown. Therefore, absent a viable technological solution, additional
retention requirements would likely impose significant administrative cost
and could result in loss of valuable information. For some or all of these
reasons, the five-year destruction requirement announced in the Signals
Intelligence Reform 2015 Anniversary Report includes significant exceptions.
Dissemination. The chief privacy protections with regard to dissemination are
twofold. First, identifying information can only be disseminated if it is
necessary to understand the value of the foreign intelligence. Second,
generic phrases must be substituted so as not to identify U.S. persons. As
applied to non-U.S. persons, the purported benefits of these measures would
be to ensure that personal information is redacted and viewed only by those
officials with a need to know. While these prescriptions seem reasonable, in
practice they would entail significant costs. Policymakers often need to know
names, places, and other identifiers in order to assess foreign intelligence
information. If an agency must use a vague identifier, such as "SOMALI
PERSON 1," before it shares that information with another agency, it could
turn intelligence sharing into a guessing game. The dissemination protections
therefore also entail nontrivial cost.
Oversight. Another option would be to pass legislation that places all signals
collection programs (not only the one authorized in section 702) under the
FISA framework. In general, FISA does not cover surveillance conducted
outside of the United States. n219 In theory, a congressional debate and vote
Millennial Debate
November 12, 2015 Policy Update
69
to bring more programs under FISA would ensure the public weighs the costs
and benefits of the programs. Having the FISC sign of on programs--even if
through broad certifications, such as the section 702 certifications that do not
specify facilities or targets--would also lend a judicial imprimatur of legitimacy
to the programs. In addition, reporting statistics on U.S. intelligence gathering
abroad could bolster confidence that the U.S. government does not engage in
indiscriminate mass surveillance.
M.P.P. 2016. Daniel Severson served as a Harvard Presidential Public Service Fellow at the U.S.
Department of Defense, and a Council of American Ambassadors Fellow at the U.S. Department
of State, p. 507
Millennial Debate
November 12, 2015 Policy Update
70
Millennial Debate
November 12, 2015 Policy Update
71
Interagency Coordination CP
Interagency coordination solves the diplomatic irritation
and economic costs
Daniel Severson, Summer 2015, Harvard International Law Journal,
http://www.harvardilj.org/wp-content/uploads/562Severson.pdf American
Surveillance of Non-US Persons: Why New Privacy Protections Ofer Only
Cosmetic Change, DOA: 11-13-15 Severson -- J.D. 2016; Harvard Kennedy School,
M.P.P. 2016. Daniel Severson served as a Harvard Presidential Public Service Fellow at the U.S.
Department of Defense, and a Council of American Ambassadors Fellow at the U.S. Department
of State, p. 511-12
Millennial Debate
November 12, 2015 Policy Update
72
M.P.P. 2016. Daniel Severson served as a Harvard Presidential Public Service Fellow at the U.S.
Department of Defense, and a Council of American Ambassadors Fellow at the U.S. Department
of State, p. 514
Millennial Debate
November 12, 2015 Policy Update
73
in the same direction. At some point, I fear, that will lead to a serious national
security failure." n248 While PPD-28 largely reflects current practice, it could
create room for further expansions in the future. Policymakers will want to
weigh these options carefully. In an age of rapid technological change,
balancing privacy and national security admits of no easy solutions.
Millennial Debate
November 12, 2015 Policy Update
74
ETC
Millennial Debate
November 12, 2015 Policy Update
75
Should v. Shall
Should is advisory, shall is a requirement
Daniel Severson, Summer 2015, Harvard International Law Journal,
http://www.harvardilj.org/wp-content/uploads/562Severson.pdf American
Surveillance of Non-US Persons: Why New Privacy Protections Ofer Only
Cosmetic Change, DOA: 11-13-15 Severson -- J.D. 2016; Harvard Kennedy School,
M.P.P. 2016. Daniel Severson served as a Harvard Presidential Public Service Fellow at the U.S.
Department of Defense, and a Council of American Ambassadors Fellow at the U.S. Department
of State
Interestingly, the interim status report to PPD-28, which the DNI released on
October 17, 2014, changes the operative language from "shall" to "should."
n121 "Shall" generally imposes a requirement, while "should" is merely
advisory. Under the status report, each intelligence agency "should consider"
disseminating and retaining non-U.S. person information using U.S. person
standards.
Millennial Debate
November 12, 2015 Policy Update
76
Millennial Debate
November 12, 2015 Policy Update
77
Millennial Debate
November 12, 2015 Policy Update
78
interests, much like an injured party in a typical lawsuit has the ability to
choose which lawyer will represent his or her interests.
The introduction of a public advocate is especially needed in the FISC
because, as Clapper v. Amnesty International USA made clear, it is very
difficult for plaintifs to meet the standing requirements in order represent
their interests in front of the FISC. n268 Another reason that a public
advocate should be an essential component of FISC proceedings is that the
fundamental function of the court has developed over time and now the FISC
"regularly assesses "broad constitutional questions' and establishes
"important judicial precedents, with almost no public scrutiny.'" n269 Because
of the impact these decisions have on the everyday lives of U.S. citizens, it is
essential that FISC proceedings become more adversarial to improve judicial
decision making.
Millennial Debate
November 12, 2015 Policy Update
79
Millennial Debate
November 12, 2015 Policy Update
80
Millennial Debate
November 12, 2015 Policy Update
81
Millennial Debate
November 12, 2015 Policy Update
82
Law School. His work history includes work at the Georgia Capital Defender's
Office, the University of Michigan Health System, Human Rights Watch as a
Program in Refugee and Asylum Law Fellow, and public service in civil rights
enforcement. Azadeh Shahshahani is President of the National Lawyers Guild
and previously served as National Security/Immigrants' Rights Project
Director with the ACLU of Georgia. She is a 2004 graduate of the University of
Michigan Law School and also has a Master's in Modern Middle Eastern and
North African Studies from Michigan. Tye Tavaras has a background in
International Studies, Arabic, and Public International Law. She is a graduate
of Emory University, The American University in Cairo, and Emory University
School of Law), University of Pennsylvania Journal of Law & Social Change,
Indiscriminate Power: Racial Profiling and Surveillance Since 9/11,
http://scholarship.law.upenn.edu/cgi/viewcontent.cgi?
article=1183&context=jlasc DOA: 11-13-15
However disorganized it may be, the American surveillance regime is very
efective at certain components of its job, regardless of their legality. The FBI
and other agencies regularly map everyday activities, targeting ethnic
communities and engaging in blatant, if sometimes seemingly innocent,
racial profiling. Such programs invade the privacy of millions of Americans
under no justifiable pretense. An examination of what the government looks
for, and how it approaches the information it is seeking, can explain - though
not excuse - the type of information they are currently gathering.
Millennial Debate
November 12, 2015 Policy Update
Race-Based Surveillance
83
Millennial Debate
November 12, 2015 Policy Update
84
Millennial Debate
November 12, 2015 Policy Update
85
Law School. His work history includes work at the Georgia Capital Defender's
Office, the University of Michigan Health System, Human Rights Watch as a
Program in Refugee and Asylum Law Fellow, and public service in civil rights
enforcement. Azadeh Shahshahani is President of the National Lawyers Guild
and previously served as National Security/Immigrants' Rights Project
Director with the ACLU of Georgia. She is a 2004 graduate of the University of
Michigan Law School and also has a Master's in Modern Middle Eastern and
North African Studies from Michigan. Tye Tavaras has a background in
International Studies, Arabic, and Public International Law. She is a graduate
of Emory University, The American University in Cairo, and Emory University
School of Law), University of Pennsylvania Journal of Law & Social Change,
Indiscriminate Power: Racial Profiling and Surveillance Since 9/11,
http://scholarship.law.upenn.edu/cgi/viewcontent.cgi?
article=1183&context=jlasc DOA: 11-13-15, p. 825
This racial, ethnic, religious, and political profiling is an afront not to only the
collective consciousness, but the FBI's own internal directives. The U.S.
Department of Justice's Guidance Regarding the Use of Race by
Federal Law Enforcement Agencies n17 prohibits race from being
used "to any degree" in law enforcement action or decision-making
without a specific indication of its appropriateness (i.e., a specific description
of a particular perpetrator, witness, or other actor). n18 However, in the
case of national security and border integrity investigations, this
restriction is very neatly loop-holed out of existence. n19 These
exceptions, barely facially neutral, lead to the targeting of Latino
populations (given that our most active border is to the south) and
Middle Eastern populations (given the colloquial association between
terrorism and persons of Middle Eastern origin). Most unfortunately, the
historical lack of religious profiling restrictions has led to the further
victimization of ethnic and immigrant populations, given the extensive
intersection of immigration status and minority religious status (i.e., Islam).
n20 Middle Eastern Muslim immigrants, for example, already have
three strikes against them in the surveillance regime - and as such,
their information and personal liberty are likely far from secure.
Millennial Debate
November 12, 2015 Policy Update
86
Millennial Debate
November 12, 2015 Policy Update
87
apparently warrant suspicion. n74 The FBI was monitoring the "Black
Separatist Threat" by noting rallies opposing the police killings of African
Americans in Atlanta; noting dated eight-year-old information that a
prominent Nation of Islam official had operated in Atlanta, and that "in
December 2001, ... there [was] a strong alliance between the Crips and NBPP
[the New Black Panther Party] in Atlanta"; and outlining the population
percentages of African Americans through time and their projected growth in
the future. n75 Another document appears to track the activities and
nationalities of students and others in technological businesses, noting the
types of immigrants in Atlanta, recent census data, and various technical and
scientific conferences in the area, concluding with a list of U.S. military
installations in the Atlanta area. n76 Other documents reveal assessments of
the numbers of foreign-born persons in Atlanta; n77 "moderate confidence"
information about the existence of Hizballah in Atlanta, which presumably
relies partly on demographic and census information for support; n78 and an
extensive look at the presence of persons of a variety of Latino nationalities,
justified by the presence of some persons of those nationalities in the gang
Mara Salvatrucha ("MS-13") - also noting the use of deportation as an
alternative means of threat elimination when information is insufficient to
[*294] warrant criminal prosecution. n79 These local assessments, coupled
with similar assessments across the country, n80 exhibit the blatant use of
ethnic and demographic information as a primary component of domestic
security threat assessments by the FBI.
Millennial Debate
November 12, 2015 Policy Update
88
Racist Profiling
Systemic discrimination against racial minorities that
operates to protect whites
Torrest et al, 2015, Carlos Torres, Azadeh Shahshahani, and Tye Tavaras,
University of Pennsylvania Journal of Law and Social Change, (Carlos Torres is
a graduate of the University of Pennsylvania and the University of Michigan
Law School. His work history includes work at the Georgia Capital Defender's
Office, the University of Michigan Health System, Human Rights Watch as a
Program in Refugee and Asylum Law Fellow, and public service in civil rights
enforcement. Azadeh Shahshahani is President of the National Lawyers Guild
and previously served as National Security/Immigrants' Rights Project
Director with the ACLU of Georgia. She is a 2004 graduate of the University of
Michigan Law School and also has a Master's in Modern Middle Eastern and
North African Studies from Michigan. Tye Tavaras has a background in
International Studies, Arabic, and Public International Law. She is a graduate
of Emory University, The American University in Cairo, and Emory University
School of Law), University of Pennsylvania Journal of Law & Social Change,
Indiscriminate Power: Racial Profiling and Surveillance Since 9/11,
http://scholarship.law.upenn.edu/cgi/viewcontent.cgi?
article=1183&context=jlasc DOA: 11-13-15,
Discrimination and discriminatory legal wrangling is no stranger to the
American scene. From the expulsion of Native American tribes in
violation of treaty obligations, to the three-fifths clause of our
Constitution, to internment of Japanese-Americans during World War II,
the U.S. government has taken sweeping actions to "secure" this
country for its nominally (and inconsistently) "white" n87 citizenry to
the detriment of people of color and immigrants. Modern expressions
of these tactics have manifested in discriminatory enforcement
against, and searches of, populations of people of color and
immigrants (in spite of the fact that actual drug possession rates do
not significantly differ between races n88 and rates of usage for
some drugs are twice as high for Caucasians as they are for nonCaucasian populations n89), disproportionate arrest n90 and
imprisonment of people of color and immigrants, n91 and now the
targeting of ethnic and religious minority populations for
surveillance and control.
Millennial Debate
November 12, 2015 Policy Update
89
Millennial Debate
November 12, 2015 Policy Update
90
Millennial Debate
November 12, 2015 Policy Update
91
Millennial Debate
November 12, 2015 Policy Update
92
Millennial Debate
November 12, 2015 Policy Update
93
Millennial Debate
November 12, 2015 Policy Update
94
Millennial Debate
November 12, 2015 Policy Update
95
government agencies, including but not limited to the TSA and the CBP. n182
Even in times of war, however, status discrimination is always outside of a
government's permitted tool set.
Aside from violating the rights to privacy, current monitoring practices are
founded on the profiling of potential suspects based on racial, ethnic,
religious, and other status grounds. The International Convention on the
Elimination of Racial Discrimination ("CERD") sets clear guidelines and
recommendations regarding state actions and policies that may rely on racial
distinctions. n183 The CERD defines "racial discrimination" as:
any distinction, exclusion, restriction or preference based on race, colour,
descent, or national or ethnic origin which has the purpose or efect of
nullifying or impairing the recognition, enjoyment or exercise, on an equal
footing, of human rights and fundamental freedoms in the political, economic,
social, cultural or any other field of public life. n184
As parties to this treaty, states agree to the definitions therein, and also
agree to review governmental policies, and to amend or rescind those that
perpetuate racial discrimination. n185 Despite this requirement, the United
States has expanded surveillance and intelligence powers and
authorizations clearly targeting people based on racial, ethnic, religious, or
other status grounds.
VIII. PRIVACY IN INTERNATIONAL LAW
Although the right to privacy is not as absolute as freedom from status
discrimination, limitations on privacy are only justified in accord with the
provisions and objectives of the ICCPR. In Toonen v. Australia, the United
Nations Human Rights Committee, the body that monitors the
implementation of the ICCPR, explained that it "interprets the requirement of
reasonableness [in ICCPR article 17] to imply that any interference with
privacy must be [*306] proportional to the end sought and be necessary in
the circumstances of any given case." n186 In the case of surveillance, one
would need to determine whether perpetual monitoring is necessary and
proportionate to the end sought. The end in this case is threat assessment
and, should a threat be discovered, attempts at prevention. In the case of
perpetual monitoring, the scope is shockingly broad. n187 These means are
simply not necessary or proportional to achieve the desired outcome.
Outside of treaties, the international community has crafted a significant
number of guidelines regarding privacy and surveillance. More specifically,
the United Nations has taken a leading role in defining the right to privacy in
the digital age, particularly given the special vulnerabilities of electronic
communications and digital identities. n188 The discussion surrounding the
right to privacy in the digital age began with a resolution in which the United
Nations General Assembly expressed concern about the impact that
surveillance has on human rights and affirmed that rights must be
protected in online formats just as in real life. n189 The General Assembly
also called upon states to:
Millennial Debate
November 12, 2015 Policy Update
96
Millennial Debate
November 12, 2015 Policy Update
97
drew distinct boundaries between war and peace and ratcheting up the level
of subversion of rights that is commonly acceptable to the public during
times of "war." The former General Counsel of the U.S. Department of
Defense, Jeh Johnson, stated in a speech at Oxford University in 2012 that
""war' must be regarded as a finite, extraordinary and unnatural state of
afairs." n198 The war on terror, with its unknowable opponent, unattainable
objectives, and consequently indeterminate duration, shatters that traditional
conception and, with it, the associated norms of governmental behavior and
public expectations.
The U.S. government has used the war on terror, to justify a number
of rights restrictions for U.S. citizens and individuals it has detained
on an indefinite basis. This "war" of indefinite duration has served as
a justification for torture and the expansion of surveillance powers.
Although the derogation of certain rights is allowed during times of certain
predefined security crises, its continuation through a perpetual security
crisis risks permanent rights infringements, and even the ultimate
destruction of rights. The increase in rights abuses and racial
targeting on American soil is but a single consequence of perpetual,
normalized war.
X. CONCLUSION
The U.S. government has used a heavy hand to sort our nation by color, and
continues to do so. The cultural and political motives of control and
maintenance of the status quo exhibited during COINTELPRO are also part of
the modern surveillance culture, albeit now more often along religious lines
and diferently drawn ethnic lines. Although current surveillance and
intelligence eforts are intense, there have been recommendations, as early
as 1970, that they be intensified further. n199 Suggestions ranged from
opening physical mail to permitting surveillance of any foreign national "of
interest" in the United States, and from increasing group-characteristic
studies to ramping up CIA surveillance of American students and others living
abroad:
(1) "coverage by NSA of the communications of U.S. citizens using
international facilities;"
(2) "intensification" of "electronic surveillances and penetrations" directed at
individuals and groups "who pose a major threat to the internal security" and
at "foreign nationals" in the United States "of interest to the intelligence
community;"
(3) removal of restrictions on "legal" mail coverage and relaxation of
"restrictions on covert coverage" [mail opening] on "selected targets of
priority foreign intelligence and internal security interest;"
(4) modification of "present restrictions" on "surreptitious entry" to allow
"procurement of vitally needed foreign cryptographic material" and "to permit
selective use" against "high priority internal security targets;"
Millennial Debate
November 12, 2015 Policy Update
98
Millennial Debate
November 12, 2015 Policy Update
99
Millennial Debate
November 12, 2015 Policy Update
100
Millennial Debate
November 12, 2015 Policy Update
101
Millennial Debate
November 12, 2015 Policy Update
102
Millennial Debate
November 12, 2015 Policy Update
103