Professional Documents
Culture Documents
For twenty years, the Missouri State Debate Institute has offered an excellent
educational experience in the middle of the high school topic. MSDI is distinct from
other camps in six ways. First, our skills focus assures that a typical 2-week debater
gets nearly 80 speeches, including over 20 debates. Second, we emphasize the
largest cases on topic, with students getting both aff and neg rounds on each. Third,
our senior faculty are comparable with top lab leaders in any camp. Fourth, MSDI
students can earn highly transferable college credit in public speaking for a minimal
cost. Fifth, we respect variance in home debate circuits our goal is to improve line
by line debating in ways that will help students no matter who judges in their home
circuit. Finally, our price is below any comparable camp and far below most camps.
Our 2016 information will be available shortly at:
http://debate.missouristate.edu/camp.htm.
Missouri State University is a large comprehensive university (enrollment over 24k),
with nearly any major you might want. The university has excellent academic
scholarship support most debaters combine academic entitlement scholarships
(guaranteed based on GPA/test scores) with debate scholarships. The Spicer Debate
Forum competes in two year-long policy debate formats: NDT and NFA-LD. Weve
national semis or finals in both in the last decade. Our debaters have an average
GPA over 3.5, a 97% graduation rate, and 70% complete law/grad school afterward.
Our program is a high-impact academic experience with an exceptional alumni
network. Please contact Dr. Eric Morris for more information
(EricMorris@MissouriState.edu).
http://debate.missouristate.edu/
http://www.missouristate.edu/FinancialAid/scholarships/
1AC Inherency/Solvency
Recent passage of the USA Freedom Act by the US Congress
may have been a step in the right direction, but it did not go
nearly far enough in protecting the privacy of United States
citizens. It left many programs that sustain bulk data
collection untouched, meaning we are still at risk. We should
take steps toward real reform.
KEVIN GOSZTOLA JUNE 7, 2015 AT 8:00 AM PDT The US Surveillance State
Now That USA Freedom Act is Law http://firedoglake.com/2015/06/07/podcast-theus-surveillance-state-now-that-usa-freedom-act-is-law/
The USA Freedom Act was signed into law this past week. It was viewed as both a
victory for those concerned with privacy and restricting the National Security
Agencys mass surveillance and also as a law that did not go far enough in
restricting spy agencies. In fact, the USA Freedom Act further codified the post-9/11
legal framework for surveillance and resurrected Patriot Act provisions, which
expired for a couple days. The law did do away with the NSAs control of all
Americans domestic call records. On the other hand, it left other programs, policies
and practices, which NSA whistleblower Edward Snowden revealed to the public,
entirely untouched. For example, backdoor searches under Section 702 of the
FISA Amendments Act can continue, which means the NSA can collect emails,
browsing and chat history of US citizens without a warrant.
that if Congress merely does a clean reauthorization of Section 215, then the
district court in ACLU v. Clapper will enjoin the government from using Section 215
as authorization for the call records dragnet, because the district court is bound by
the Second Circuit decision. However, if a reauthorization made it clear that
Congress intended to reject the Second Circuits narrow reading of the law, it could
cause further confusion and the government could argue that Congress has fully
embraced the dragnet. Were encouraging people to call Congress and tell their
lawmakers to reject Senator McConnell's clean reauthorization in order to avoid the
risk that Congress might reject the Second Circuits decision The USA Freedom Act
Must Be Strengthened In light of the Second Circuits decision, EFF asks Congress to
strengthen its proposed reform of Section 215, the USA Freedom Act. Pending those
improvements, EFF is withdrawing our support of the bill. Were urging Congress to
roll the draft back to the stronger and meaningful reforms included in the 2013
version of USA Freedom and affirmatively embrace the Second Circuits opinion on
the limits of Section 215. Most importantly, the Second Circuits correct
interpretation of the law should be expressly embraced by Congress in order to
avoid any confusion going forward about what the key terms in the statute mean,
especially the terms relevant and investigation. This recognition could be in the
bill itself or, less preferably, in legislative history. The House Judiciary Committee
has already included such language in its report to the full House of
Representatives, but now the Senate must include the language in the bill or in its
own legislative history. This easy task will make sure that the law is not read as
rejecting the Second Circuits reading and will help ensure that the USA Freedom Act
actually accomplishes its goal of ending bulk collection. The House Report on USA
Freedom, issued today, takes a step forward by stating that: Congress decision to
leave in place the relevance standard for Section 501 orders should not be
construed as Congress intent to ratify the FISA Courts interpretation of that term.
These changes restore meaningful limits to the relevance requirement of Section
501, consistent with the opinion of the U.S. Court of Appeals for the Second Circuit
in ACLU v. Clapper. Ensuring that the Senate doesn't move away from the legislative
history should be a top priority as the bill moves forward. But thats the bare
minimum Congress must do. The Second Circuit, and especially Judge Sacks
concurrence, noted a lack of both transparency and a true adversary in the FISA
Court. The 2014 and 2013 USA Freedom Act had stronger FISA Court reforms,
particularly around the creation of a special advocate who would argue against the
government in the FISA Court. The Second Circuits opinion also emphasizes that
typical subpoenas seek only records of "suspects under investigation, or of people
or businesses that have contact with such subjects." Under the current USA
Freedom Act, the government can collect records of a "second hop,"the numbers,
and associated metadata, that have been in contact with the numbers collected
initiallywithout any additional authorization. The bill should be changed so that
the government must file another application for any further records it wants to
collect. Automatically obtaining a "second hop" is unacceptable because it sweeps
in too many peoples records. The current USA Freedom Act is also out-of-sync with
the courts narrow view of permissible collection of records because it lacks a
rigorous definition of the "specific selection term" the government can use to
identify the records it wants to collect. This can be addressed by two changes: (1)
drawing upon last year's definition in the USA Freedom Act; and, (2) closing down
potential loopholes like the definition of "address" or the use of a "person" to
include a corporate person. Restoring Important Parts of 2013s USA Freedom Act
This is also an opportunity and a new context for Congress to address the
shortcomings of the newly introduced USA Freedom Act that we previously wrote
about. Congress should put back key provisions that were dropped along the way as
well as remove those that were introduced at the behest of the intelligence
community. First, the "super minimization" procedures, which were key privacy
procedures that mandated the deletion of any information obtained about a person
not connected to the investigation, should be reintroduced. Key provisions
establishing a higher legal standard and compliance assessment for the use of pen
register/trap-and-trace devices, legal standing to sue the government over
surveillance practices, and the original transparency provisions allowing
government and corporate disclosure of surveillance orders should also be
resuscitated.
definitions about what can and cannot be collected by the agency. For instance, an
earlier version more clearly defined the scope of what the NSA could grab under
Section 215 of the Patriot Act, which has formed the legal basis for gathering the
metadata of phone calls. Under an earlier version of the USA Freedom Act, the
government would have been required to base any demand for phone metadata or
other records on a specific selection term that uniquely describe[s] a person,
entity, or account. Under the House version, this definition was broadened to mean
a discrete term, such as a term specifically identifying a person, entity, account,
address, or device, used by the government to limit the scope of information
sought, according to Human Rights Watch. This definition is too open-ended and
ambiguous to prevent the sort of creative interpretation by intelligence agencies
that has been used to justify overbroad collection practices in the past, the group
claims. The New America Foundations Open Technology Institute is similarly
disappointed in the final House bill. Taken together, the Institute wrote, the
changes to this definition may still allow for massive collection of millions of
Americans private information based on very broad selection terms such as a zip
code, an area code, the physical address of a particular email provider or financial
institution, or the IP address of a web hosting service that hosts thousands of web
sites.
1AC Plan
The United States federal government should substantially
curtail its domestic surveillance by increasing restrictions on
bulk collection of domestic phone, internet, email, and-or
associated electronic records. This should include, at least,
requiring use of a specific selection term to satisfy the
reasonable, articulable suspicion standard, requiring super
minimization procedures that delete information obtained
about a person not connected to the investigation, and
requiring meaningful disclosure and limitation of so-called
backdoor searches currently authorized under Section 702 of
the FISA Amendments Act.
where weve buried the bad stuff. Consider The Washington Posts front-page headline last week that gushingly
characterized the Labor Departments minimal monthly employment numbers as a jobs boom. The Bureau of
time job. In 1983, after a severe recession when unemployment climbed to more than 10 percent at one point, the
Reagan economy created 1.1 million jobs just in September. Thats a jobs boom. But this isnt not when there
are still more than 8.6 million workers without jobs who want them, says the Business Insider. To be
fair, The Washington Post admitted that not everything was coming up roses, and that there is room for
improvement on the jobs front. But it buried those negative figures at the end of a very long story. Among them:
About 2.5 million people have been out of work for six months or longer, while nearly 7 million are in part-time jobs
even though they would like [and need] full-time positions . Youve got a lot of people who are trading one
struggle, which is unemployment, for another struggle, which is underemployment, Jason Richardson, research
the
conference call with reporters. Industrial production is down and we view that as a concern, he said.
America to Japan, are unable to make responsible, economically sound recovery plans suggests that they do not
know what to do and are simply hoping for the least disruption. Equally worrisome is the adoption of more statist
The threat of
instability is a pressing concern . China, until last year the world's fastest growing economy, just
reported that 20 million migrant laborers lost their jobs. Even in the flush times of recent years, China faced
upward of 70,000 labor uprisings a year. A sustained downturn poses grave and
possibly immediate threats to Chinese internal stability . The regime in Beijing may be faced
economic programs around the globe, and the concurrent decline of trust in free-market systems.
with a choice of repressing its own people or diverting their energies outward, leading to conflict with China's
Russia, an oil state completely dependent on energy sales, has had to put down riots in its
Far East as well as in downtown Moscow . Vladimir Putin's rule has been predicated on squeezing civil
liberties while providing economic largesse. If that devil's bargain falls apart, then wide-scale repression
inside Russia, along with a continuing threatening posture toward Russia's neighbors,
is likely. Even apparently stable societies face increasing risk and the threat of internal or possibly external
neighbors.
conflict. As Japan's exports have plummeted by nearly 50%, one-third of the country's prefectures have passed
emergency economic stabilization plans. Hundreds of thousands of temporary employees hired during the first part
of this decade are being laid off. Spain's unemployment rate is expected to climb to nearly 20% by the end of 2010;
Spanish unions are already protesting the lack of jobs, and the specter of violence, as occurred in the 1980s, is
Europe as a whole
will face dangerously increasing tensions between native citizens and immigrants, largely from
haunting the country. Meanwhile, in Greece, workers have already taken to the streets.
poorer Muslim nations, who have increased the labor pool in the past several decades. Spain has absorbed five
million immigrants since 1999, while nearly 9% of Germany's residents have foreign citizenship, including almost 2
A prolonged
global downturn, let alone a collapse, would dramatically raise tensions inside these
countries. Couple that with possible protectionist legislation in the United States, unresolved ethnic
and territorial disputes in all regions of the globe and a loss of confidence that world leaders
actually know what they are doing. The result may be a series of small explosions that
coalesce into a big bang.
million Turks. The xenophobic labor strikes in the U.K. do not bode well for the rest of Europe.
protectionist legislation like the notorious Smoot-Hawley bill. Introduced at the start
of the Great Depression, it triggered a series of tit-for-tat economic responses,
which many commentators believe helped turn a serious economic downturn into a prolonged
and devastating global disaster . But if history is any guide, those lessons will have been long forgotten
during the next collapse. Eventually,
Authorities and ordinary citizens will likely scrutinize the cross-border movement of Americans and outsiders
officials try to limit the fallout from decades of ill-conceived, corrupt, and reckless policies, they will introduce controls on foreign
exchange. Foreign individuals and companies seeking to acquire certain American infrastructure assets, or trying to buy property
and other assets on the cheap thanks to a rapidly depreciating dollar, will be stymied by limits on investment by noncitizens.
Those efforts will cause spasms to ripple across economies and markets,
disrupting global payment, settlement, and clearing mechanisms . All of this will, of
course, continue to undermine business confidence and consumer spending. In a world
of lockouts and lockdowns, any link that transmits systemic financial pressures across markets through arbitrage or portfolio-based
risk management, or that allows diseases to be easily spread from one country to the next by tourists and wildlife, or that otherwise
The rise in
isolationism and protectionism will bring about ever more heated arguments and
facilitates unwelcome exchanges of any kind will be viewed with suspicion and dealt with accordingly.
dangerous confrontations over shared sources of oil, gas, and other key
commodities as well as factors of production that must, out of necessity, be acquired from
less-than-friendly nations. Whether involving raw materials used in strategic industries or basic necessities such as
food, water, and energy, efforts to secure adequate supplies will take increasing precedence
in a world where demand seems constantly out of kilter with supply . Disputes over the
misuse, overuse, and pollution of the environment and natural resources will become more
commonplace. Around the world, such tensions will give rise to full-scale military
saber rattling and interdictions by rogue nations running amok. Age-old clashes will also
take on a new, more heated sense of urgency.
posture toward Taiwan, while Iran may embark on overt colonization of its
neighbors in the Mideast. Israel, for its part, may look to draw a dwindling list of
allies from around the world into a growing number of conflicts . Some observers, like John
Mearsheimer, a political scientist at the University of Chicago, have even speculated that an intense confrontation between the
United States and China is inevitable at some point. More than a few disputes will turn out to be almost wholly ideological.
Growing cultural and religious differences will be transformed from wars of words to battles soaked in blood.
Long-
The most traditional approach to the relationship between economic relations and conflict focuses on
explaining how economic ties linking nations change the incentives of actors in the
international system. Beginning in the modern era, scholar-statesmen such as Richard Cobden
and Norman Angell argued that interdependence, primarily in the form of interstate trade, raises
the opportunity costs of war, thus making contests less likely. The logic of these arguments
is that a war between trading partners would likely disrupt that trade, forcing states to seek other
markets. This would require a shift to different, less lucrative, trade partners.3 Others argue that, as
trade increases, states can achieve gains more efficiently through economic means
than through warfare. In other words, when states can grow their economies through
international commerce, there is a decreased incentive to attempt to do so through
territorial conflict.4 Open financial and goods markets may also create similar disincentives for
states to fight.5
temporal domain and unit of analysis.7 The relationship between trade and conflict is likely more
complex than initially theorized. First, high levels of trade dependence may embolden a states
opponents.8 Responding to this critique, Patrick McDonald argues that scholars must shift their focus
from aggregate trade flows to the extent to which states pursue free trade policies.9 Han Dorussen
offers another important theoretical refinement, noting that the opportunity costs of conflict created by
different types of trade vary significantly. Two factors he points to that raise the opportunity costs of
conflict created by trade are lower factor mobility and higher asset specificity.10 Finally, the effects of
trade interdependence may be contingent on the mediating effects of democracy.11
One strain of research focuses on ways that trade may make conflict less likely through mechanisms
other than raising the opportunity costs of war. Etel Solingen, for example, argues that trade allows
economic relations are also crucial. Erik Gartzke, Quan Li, and Charles Boehmer
argue that, along with trade, interstate monetary policy cooperation and capital flows
reduce the likelihood of conflict by allowing states in crisis situations to send costly
signals without needing to resort to violence or crisis escalation that may precipitate
violence.15 Building on this, Gartzke argues that interdependencedefined as including trade,
development, open financial markets, and monetary policy coordination reduces conflict by (1)
aligning states interests, which gives them less to fight over; (2) providing a means
of peacefully securing resources; and (3) allowing states to foresee the costs of
fighting, which facilitates bargaining and compromise.16
decline and the security and defence behaviour of interdependent states. Research in this vein has been considered
at systemic, dyadic and national levels. Several notable contributions follow. First, on the systemic level, Pollins
rhythms in the
global economy are associated with the rise and fall of pre-eminent power and the
often bloody transition from one pre-eminent leader to the next . As such, exogenous
shocks such as economic crises could usher in a redistribution of relative power (see
also Gilpin, 10981) that leads to uncertainty about power balances, increasing the risk of
miscalculation (Fearon, 1995). Alternatively, even a relatively certain redistribution of power
could lead to a permissive environment for conflict as a rising power may seek to
challenge a declining power (Werner, 1999). Seperately, Polllins (1996) also shows that global economic
(2008) advances Modelski and Thompsons (1996) work on leadership cycle theory, finding that
cycles combined with parallel leadership cycles impact the likelihood of conflict among major, medium, and small
powers, although he suggests that the causes and connections between global economic conditions and security
conditions remain unknown. Second, on a dyadic level, Copelands (1996,2000) theory of trade expectations
suggests that future expectation of trade is a significant variable in understanding economic conditions and
interdependent states. Third, others have considered the link between economic decline and external armed
mutually reinforcing. Economic conflict tends to spawn internal conflict, which in turn returns the favour. Moreover,
the presence of a recession tends to amplify the extent to which international and
external conflicts self-reinforce each other . (Blomberg & Hess, 2002, p.89). Economic decline has
also been linked with an increase in the likelihood of terrorism (Blomberg, Hess, & Weerapana, 2004), which has the
capacity to spill across borders and lead to external tensions. Furthermore, crises generally reduce the popularity of
a sitting government. Diversionary
own.172 Toward the end of the essay, Farrell and Finnemore suggest, The U.S.
government, its friends, and its foes can no longer plausibly deny the dark side of
U.S. foreign policy and will have to address it head-on. Indeed, the U.S. is currently
working to repair damaged bilateral and multilateral relations with countries from
Germany and France to Russia and Israel,173 and it is likely that the effects of the
NSA disclosures will be felt for years in fields far beyond Internet policy.174
blocking or favoring of online content under the guise of preventing spam and increasing network security.
Authoritarian countries' real goal is to legitimize content regulation, opening the door for governments to block any
content they do not like, such as political speech. Second, the basic commercial model underlying the open Internet
is also under threat. In particular, some proposals, like the one made last year by major European network
operators, would change the ground rules for payments for transferring Internet content. One species of these
proposals is called "sender pays" or "sending party pays." Since the beginning of the Internet, content creators -individuals, news outlets, search engines, social media sites -- have been able to make their content available to
Internet users without paying a fee to Internet service providers. A sender-pays rule would change that,
empowering governments to require Internet content creators to pay a fee to connect with an end user in that
country. Sender pays may look merely like a commercial issue, a different way to divide the pie. And proponents of
sender pays and similar changes claim they would benefit Internet deployment and Internet users. But the opposite
is true: If a country imposed a payment requirement, content creators would be less likely to serve that country.
The loss of content would make the Internet less attractive and would lessen
demand for the deployment of Internet infrastructur e in that country. Repeat the
process in a few more countries, and the growth of global connectivity -- as well as its
attendant benefits for democracy -- would slow dramatically. So too would the benefits
accruing to the global economy. Without continuing improvements in transparency and information
sharing, the innovation that springs from new commercial ideas and creative breakthroughs is sure to be severely
international forums, including an important meeting in Geneva in May, the World Telecommunication/ICT Policy
Forum. The massive investment in wired and wireless broadband infrastructure in the United States demonstrates
that preserving an open Internet is completely compatible with broadband deployment. According to a recent UBS
report, annual wireless capital investment in the United States increased 40 percent from 2009 to 2012, while
investment in the rest of the world has barely inched upward. And according to the Information Technology and
Innovation Foundation, more fiber-optic cable was laid in the United States in 2011 and 2012 than in any year since
2000, and 15 percent more than in Europe.
countries are cut off from the World Wide Web. Each person who is unable to connect to
the Internet diminishes our own access to information. We become less able to
understand the world and formulate policies to respond to our shrinking planet .
Conversely, we gain a richer understanding of global events as more people connect around the world, and those
societies nurturing nascent democracy movements become more familiar with America's traditions of free speech
and pluralism. That's why we believe that the Internet should remain free of gatekeepers a nd
that no entity -- public or private -- should be able to pick and choose the information web users can receive. That is
a principle the United States adopted in the Federal Communications Commission's 2010 Open Internet Order. And
it's why we are deeply concerned about arguments by some in the United States that broadband providers should
be able to block, edit, or favor Internet traffic that travels over their networks, or adopt economic models similar to
quickly and accurately than any news station could. In this grass-roots,
decentralised scheme, there were embedded reporters on every block, and the
news shockwave kept ahead of the fire. This head start could provide the extra
hours that save us. If the Pompeiians had had the internet in 79AD, they could have
easily marched 10km to safety, well ahead of the pyroclastic flow from Mount
Vesuvius. If the Indian Ocean had the Pacifics networked tsunami-warning
system, South-East Asia would look quite different today. Discoveries are
retained and shared Historically, critical information has required constant
rediscovery. Collections of learning -- from the library at Alexandria to the entire
Minoan civilisation -- have fallen to the bonfires of invaders or the wrecking ball of
natural disaster. Knowledge is hard won but easily lost. And information that
survives often does not spread. Consider smallpox inoculation: this was under
way in India, China and Africa centuries before it made its way to Europe . By the
time the idea reached North America, native civilisations who needed it
had already collapsed. The net solved the problem. New discoveries catch
on immediately; information spreads widely. In this way, societies can optimally
ratchet up, using the latest bricks of knowledge in their fortification against risk.
Tyranny is mitigated Censorship of ideas was a familiar spectre in the last
century, with state-approved news outlets ruling the press, airwaves and copying
machines in the USSR, Romania, Cuba, China, Iraq and elsewhere. In many
cases, such as Lysenkos agricultural despotism in the USSR, it directly
contributed to the collapse of the nation. Historically, a more successful
strategy has been to confront free speech with free speech -- and the
internet allows this in a natural way. It democratises the flow of information by
offering access to the newspapers of the world, the photographers of every nation,
the bloggers of every political stripe. Some posts are full of doctoring and
dishonesty whereas others strive for independence and impartiality -- but all are
available to us to sift through. Given the attempts by some governments to build
firewalls, its clear that this benefit of the net requires constant vigilance. Human
capital is vastly increased Crowdsourcing brings people together to solve
problems. Yet far fewer than one per cent of the worlds population is involved. We
need expand human capital. Most of the world not have access to the education
afforded a small minority. For every Albert Einstein, Yo-Yo Ma or Barack Obama who
has educational opportunities, uncountable others do not. This squandering of
talent translates into reduced economic output and a smaller pool of problem
solvers. The net opens the gates education to anyone with a computer. A
motivated teen anywhere on the planet can walk through the worlds knowledge -from the webs of Wikipedia to the curriculum of MITs OpenCourseWare . The new
human capital will serve us well when we confront existential threats
weve never imagined before. Energy expenditure is reduced Societal
collapse can often be understood in terms of an energy budget: when energy
spend outweighs energy return, collapse ensues. This has taken the form of
deforestation or soil erosion; currently, the worry involves fossil-fuel
depletion. The internet addresses the energy problem with a natural ease.
Consider the massive energy savings inherent in the shift from paper to electrons -as seen in the transition from the post to email. Ecommerce reduces the need to
drive long distances to purchase products. Delivery trucks are more ecofriendly than individuals driving around, not least because of tight packaging and
optimisation algorithms for driving routes. Of course, there are energy costs to the
banks of computers that underpin the internet -- but these costs are less than the
wood, coal and oil that would be expended for the same quantity of information
flow. The tangle of events that triggers societal collapse can be complex, and there
are several threats the net does not address. But vast, networked communication
can be an antidote to several of the most deadly diseases threatening civilisation.
The next time your coworker laments internet addiction, the banality of tweeting or
the decline of face-to-face conversation, you may want to suggest that the net may
just be the technology that saves us.
is interested in using social media services only to broadcast itself; it has no interest
in interacting with the outside world in a meaningful way.No Hope for the Future?
It is a terrible sign that Chinas crackdown on VPNs does not seem to have lessened
after the conclusion of the 18th Party Congress. And at the same time, despite a
couple years of massive expenditures in return for almost nothing in the way of
results, China has shown no signs of wanting to adjust its shut-up-and-let-me-talkdammit approach to soft power.Chinas state media frequently complains that the
West doesnt understand China, but China has steadfastly refused to use internet
platforms like Twitter and Facebook to attempt to increase that understanding in any
meaningful way. And although the government remains dedicated to improving
Chinese soft power, I have seen no signs that it is inclined to attempt a shift in
strategy anytime soon.In the long term, I suspect the Great Firewall will prove to be
domestically unsustainable. But until the wall comes down, Chinas attempts at soft
power are little more than a pipe dream, and its economic growth, especially in the
tech arena, is ultimately going to be limited by the severe barriers it has erected
between itself and the world at large.
such wars can occur. Indeed, in that case, the conflict almost slipped into a nuclear
war. Pakistans foreign secretary threatened that, if the war escalated, his country
felt free to use any weapon in its arsenal. During the conflict, Pakistan did move
nuclear weapons toward its border, while India, it is claimed, readied its own nuclear
missiles for an attack on Pakistan. At the least, though, dont nuclear weapons deter
a nuclear attack? Do they? Obviously, NATO leaders didnt feel deterred, for,
throughout the Cold War, NATOs strategy was to respond to a Soviet conventional
military attack on Western Europe by launching a Western nuclear attack on the
nuclear-armed Soviet Union. Furthermore, if U.S. government officials really believed
that nuclear deterrence worked, they would not have resorted to championing Star
Wars and its modern variant, national missile defense. Why are these vastly
expensiveand probably unworkablemilitary defense systems needed if other
nuclear powers are deterred from attacking by U.S. nuclear might? Of course, the
bottom line for those Americans convinced that nuclear weapons safeguard them
from a Chinese nuclear attack might be that the U.S. nuclear arsenal is far greater
than its Chinese counterpart. Today, it is estimated that the U.S. government
possesses over five thousand nuclear warheads, while the Chinese government has
a total inventory of roughly three hundred. Moreover, only about forty of these
Chinese nuclear weapons can reach the United States. Surely the United States
would win any nuclear war with China. But what would that victory entail? A
nuclear attack by China would immediately slaughter at least 10 million Americans
in a great storm of blast and fire, while leaving many more dying horribly of sickness
and radiation poisoning. The Chinese death toll in a nuclear war would be far higher.
Both nations would be reduced to smoldering, radioactive wastelands. Also,
radioactive debris sent aloft by the nuclear explosions would blot out the sun and
bring on a nuclear winter around the globedestroying agriculture, creating
worldwide famine, and generating chaos and destruction.
Inherency/Solvency extension
Surveillance state is high now the USA Freedom Act changed
nothing
Solomon 6/5 Norman Solomon, Author, 'War Made Easy: How Presidents and
Pundits Keep Spinning Us to Death', The USA Freedom Act Is a Virtual Scam,
Huffington Post, June 5th, 2015, http://www.huffingtonpost.com/norman-solomon/theusa-freedom-act-is-a_b_7519046.htmlCR
Some foes of mass surveillance have been celebrating the final passage of
Thomas Drake sounds decidedly glum. The new law, he tells me, is "a new spy program." It restarts
some of the worst aspects of the Patriot Act and further codifies systematic violations of Fourth Amendment rights.
In Oslo as part of a "Stand Up For Truth" tour, Drake warned at a public forum on Wednesday that "national
security" has become "the new state religion." Meanwhile, his Twitter messages were calling the USA Freedom Act
an "itty-bitty step" -- and a "stop/restart kabuki shell game" that "starts with restarting bulk collection of phone
Drake is a
former senior executive of the National Security Agency -- and a whistleblower who
records." That downbeat appraisal of the USA Freedom Act should give pause to its celebrants.
endured prosecution and faced decades in prison for daring to speak truthfully about NSA activities. He ran afoul of
vindictive authorities because he refused to go along with the NSA's massive surveillance program after 9/11. Drake
understands how the NSA operates from the highest strategic levels. He notes a
telling fact that has gone virtually unacknowledged by anti-surveillance
boosters of the USA Freedom Act: "NSA approved." So, of course, did the
top purveyor of mendacious claims about the U.S. government's
surveillance programs -- President Obama -- who eagerly signed the "USA
Freedom" bill into law just hours after the Senate passed it. A comparable
guardian of our rights, House Speaker John Boehner, crowed: "This
legislation is critical to keeping Americans safe from terrorism and
protecting their civil liberties." While some organizations with civil-liberties credentials have
responded to the USA Freedom Act by popping open champagne bottles at various decibels, more sober
assessments have also been heard. Just after senators approved the bill and sent it to the president, Demand
Progress issued a statement pointing out: "The Senate just voted to reinstitute certain lapsed surveillance
authorities -- and that means that USA Freedom actually made Americans less free." Another astute assessment
came from CREDO, saying that Congress had just created "sweeping new authorities for the government to conduct
Stockholm to Berlin. Traveling as part of the tour, I've been struck by the intensity of interest from audiences in the
countries we've already visited -- Great Britain, Norway and Sweden -- where governments have moved to worsen
repressive policies for mass surveillance. Right now, many people in Europe and elsewhere who care about civil
liberties and want true press freedom are looking at the United States: to understand what an aroused citizenry
might be able to accomplish, seeking to roll back a dangerous accumulation of power by an ostensibly democratic
While the government has framed Section 702 as a targeted program that
primarily affects suspected terrorists rather than normal individuals a sentiment
echoed by the Privacy and Civil Liberties Oversight Board in a report which CDT and
others roundly criticized the Washington Post report tells a troublingly different
story: Based on a study of the largest sample of Section 702 data analyzed to date,
approximately 90% of the text messages, emails, instant messages, and other
Advantage - Economy
"The consumer is healing," said Hooper. "We're seeing more jobs, better
quality in jobs, and we should see a resulting pickup in retail spending.
And that should really help the economy." Hooper added that her datadependent view seems very much in line with Federal Reserve Chair Janet Yellen's
outlook. Hooper expects the Fed to start raising rates at its September meeting, yet
she does not believe the Fed will go overboard in calendar year 2015. "We could see
just one and done for the year or potentially two and done for the year," said
Hooper. "This is very much a data-dependent decision-making process, the path not
just liftoff, and so our expectation is it's going to be low and long." As a result of the
Fed's move toward tightening, Hooper said she expects a step up in volatility,
although the choppiness won't hold back stocks from moving higher as a result of
the better performing economy. "We think the stock market will digest it fairly
quickly," said Hooper. " We are going to see higher volatility for a time but
likely a bias towards the upside. What we are likely to see is more
volatility and more downside potential in the bond market. That is, after
all, what the Fed has manipulated over the last few years of QE. So our
expectation is that's what is going to be more negatively affected." Although she
expects stocks to rise, Hooper does not advocate investors stay concentrated in
domestic large-cap names. The market will move too fast for that to work, in her
view. "They need to have exposure outside the U.S. and they need to have
adequate exposure within the U.S. across styles, across capitalizations because we
expect a lot of rotation among these sectors and these market capitalizations," said
Hooper. " This is going to be an environment that's really fast moving.
Asset classes are going to dominate for a time and then, of course, be
taken over by other asset classes." What would throw off her forecast? "If the
Fed acts in September, and many investors don't expect it, we could see a
disruption in the markets," said Hoooper. "Again, it's likely to impact bonds more
than stocks but it could be substantial."
Economy fragile
Chico Harlan, 5-29-2015, "U.S. economy shrinks in first quarter, raising
questions about underlying strength," Washington Post,
http://www.washingtonpost.com/blogs/wonkblog/wp/2015/05/29/analysts-expectdecline-in-u-s-gdp-in-first-quarter/
The U.S. economy shrank at an annualized pace of 0.7 percent in the first three months of
the year, according to government data released Friday morning, a tumble for a
recovering nation that until recently seemed poised for takeoff. The contraction , the
countrys third in the aftermath of the Great Recession, pro vides a troubling picture of
an economy that many figured would get a lift from cheap oil, rapid hiring and growing
consumer confidence. Instead, consumers have proved cautious, and oil companies
have frozen investment all while a nasty winter caused havoc for transportation
and construction and a strong dollar widened the trade deficit. The numbers
released Friday were a revision of earlier figures that had shown GDP growing in the
first quarter at 0.2 percent. Markets had since expected the downward revision, in
large part because of recent data showing the trade deficit at a 6-year high.
Though the United States has shaken off nasty quarters in the past, including one
year ago, this time the rebound doesnt appear to be so dramatic. Halfway through the
second quarter, economists say growth again appears to be below expectations. Many
analysts expect the GDP to expand roughly 2 percent in the second quarter, while
the Federal Reserve Bank of Atlanta takes an even darker view, predicting an
expansion of just 0.8 percent. That would leave the United States with six months of
economic standstill. In 2014, the economy contracted 2.1 percent in the first
quarter. But growth was rapid for the rest of the year, expanding 4.6 percent in the
second quarter and 5 percent in the third. Really the interesting question is how
much of this will bounce back, said Jeremy Lawson, a chief economist at Standard
Life Investments, an asset management firm. My take is that activity will rebound
more slowly than it did last year. Some of these downward pressures are more
persistent than in the past.1
Election officials in India canceled a deal with Google to improve voter registration.
In China, sales of Cisco routers dropped 10 percent in a recent quarter. European
regulators threatened to block AT&T's purchase of the wireless provider Vodafone.
The technology industry is being roiled by the so-called Snowden Effect, as disclosures by
former National Security Agency contractor Edward Snowden about the extent of American spying worldwide
over Silicon Valley's involvement in the government surveillance program was initially limited to European
politicians "taking advantage of this moment to beat up on the U.S." "But the reports from the industry are showing
The
impact of the Snowden leaks could threaten the future architecture of the modern
Internet. In recent years, computing power has shifted from individual PCs to the so-called
cloud -- massive servers that allow people to access their files from anywhere. The Snowden revelations
undermined trust in U.S.-based cloud services by revealing how some of the largest
American tech companies using cloud computing -- including Google and Yahoo -had their data accessed by the NSA. About 10 percent of non-U.S. companies have
canceled contracts with American cloud providers since the NSA spying program
was disclosed, according to a survey by the Cloud Security Alliance, an industry group. U.S. cloud providers
that it is more than that," he added. "This is more than just a flash in the pan. This is really starting to hurt."
could lose as much as $35 billion over the next three years as fears over U.S. government surveillance prompt
foreign customers to transfer their data to cloud companies in other countries, according to a study by the
Information Technology and Innovation Foundation, a nonpartisan think tank based in Washington, D.C. " If
European cloud customers cannot trust the United States government , then maybe they
won't trust U.S. cloud providers either ," Neelie Kroes, European commissioner for digital affairs, said
last summer after the NSA revelations were made public. "If I am right, there are multibillion-euro consequences for
American companies. If I were an American cloud provider, I would be quite frustrated with my government right
now." European officials and companies have been especially troubled by the Snowden leaks because European
privacy laws are more stringent than those in the United States. After documents from Snowden revealed that the
NSA had tapped German Chancellor Angela Merkels phone calls, she said Europeans should promote domestic
Internet companies over American ones in order to avoid U.S. surveillance. German Interior Minister Hans-Peter
Friedrich has suggested that people who are worried about government spying should stop using Google and
Facebook altogether. "Whoever fears their communication is being intercepted in any way should use services that
don't go through American servers," Friedrich said after Snowden leaked the NSA documents. Chris Lamoureux, the
customers have
requested that the company avoid storing their information in U.S.-based data
centers, hoping to make it more difficult for the NSA to gain access . "They've said, 'We
executive vice president of the company Veriday, told The WorldPost that some of his
don't want you to put our data in the U.S. because we're worried about what we're seeing and hearing over there
right now,'" said Lamoureux, whose Ottawa-based company develops web applications for banks, governments and
retailers. Some argue that President Barack Obama has added to the tech industry's troubles abroad by
emphasizing how the NSA surveillance program focused on people outside the United States, where most of Silicon
Valley's customers are located. "Those customers, as well as foreign regulatory agencies like those in the European
Union, were being led to believe that using US-based services meant giving their data directly to the NSA,"
journalist Steven Levy wrote in a recent article in Wired magazine. Hoping to reassure overseas customers,
major
tech companies (including AOL, which owns The Huffington Post Media Group) have asked the
Obama administration for permission to be more open about how they responded to
past requests for data from the U.S. government. They argue the government
snooped on their networks without their knowledge . Recent reports based on documents
provided by Snowden revealed that the NSA spied on Google and Yahoo customers,
unbeknownst to the companies, by secretly tapping cables that connect data
centers around the world. "The impression is that the tech industry is in league with
the U.S. government," Cate said. "But the industry would like to give the impression
that they're victims of the U.S. government, too. " On Wednesday, Microsoft said it would
offer customers who are wary about NSA surveillance the ability to store their data
outside the United States. Meanwhile, some foreign tech companies are trying to capitalize on the distrust
between U.S. tech firms and their customers around the world. Swisscom, a cloud provider in Switzerland, is
developing a service that would attract customers looking to store data under the country's strict privacy laws and
away "from the prying eyes of foreign intelligence services," Reuters reported. Germany's three largest email
providers have also created a new service, called "Email Made in Germany," designed to thwart the NSA by
encrypting messages through servers located within the country, The Wall Street Journal reported. But Cate said
that any businesses that try to avoid surveillance by boycotting U.S. tech companies are not really protecting their
data from the NSA. After all, intelligence agencies in France and Spain also spied on their own citizens, and passed
on that information to the NSA, according to documents from Snowden. "It doesn't make a difference what you do
with your data -- the NSA is going break into it," Cate said. "But that doesn't mean U.S. industry isn't going to get
hurt along the way."
, according to industry
storage giants
largest Internet companies are calling for Congress and President Obama to reform the U.S. governments secret
surveillance programs. Google, Apple, Microsoft, Yahoo, Twitter and Facebook are facing intense scrutiny following
revelations from former NSA contractor Edward Snowden, who leaked classified documents about the NSAs
snooping programs. In particular, the tech giants have been stung by disclosures about a classified U.S. intelligence
system called PRISM, which the NSA used to examine data including e-mails, videos and online chats via
requests made under the Foreign Intelligence Surveillance Act (FISA).
Snowdens disclosures
stoked privacy concerns about how the largest U.S. tech companies
handle their vast troves of user data.
they give the NSA direct or unfettered access to their computer servers, and theyve waged a public competition
to demonstrate their commitment to transparency. But recent reports have described how the NSA taps directly into
the networks of the tech giants, a disclosure that prompted outrage from top company executives, most notably
Eric Schmidt, Googles executive chairman. (MORE: AT&T to Shareholders: No NSA Snooping Data for You) After
Snowdens leak,
(ITIF), a non-
providers could lose as much as $35 billion by 2016 because of the NSA
revelations . ITIF senior analyst Daniel Castro, the reports author, wrote that Snowdens
disclosures will likely have an immediate and lasting impact on the
competitiveness of the U.S. cloud computing industry if foreign
customers decide the risks of storing data with a U.S. company outweigh
the benefits.
Analysts at Forrester, the respected tech industry research firm, went even further. In a blog
post, Forrester analyst James Staten projected a net loss for the Internet service provider industry of as much as
$180 billion by 2016, which would amount to a 25% decline in the overall information technology services market.
All from the unveiling of a single kangaroo-court action called PRISM, Staten wrote. His estimate includes domestic
clients, which could bypass U.S. cloud providers for international rivals, as well as non-U.S. cloud providers, which
could lose as much as 20% of their business due to foreign governments like Germany which have their own
secret snooping programs. With numbers at that scale, its not hard to understand why the top U.S. Internet
companies are vehemently protesting the governments secret surveillance programs. Silicon Valley executives
frequently tout their belief in idealistic principles like free speech, transparency and privacy. But it would be naive to
think that they also arent deeply concerned about the impact of the NSA revelations on the bottom line.
Businesses increasingly recognize that our governments out-of-control surveillance hurts their bottom line and
costs American jobs, Rep. Justin Amash, the Michigan Republican and outspoken critic of the NSAs secret
programs, told TIME by email. It violates the privacy of their customers and it erodes American businesses
competitive edge. On Monday, a coalition of the largest U.S. Internet companies launched a campaign to pressure
the government to reform its surveillance programs. People wont use technology they dont trust, said Microsoft
general counsel Brad Smith. Governments have put this trust at risk, and governments need to help restore it.
Several tech CEOs, including Googles Larry Page, Yahoos Marissa Mayer and Facebooks Mark Zuckerberg, are
personally throwing their weight behind the effort. (MORE: NSA Scandal: As Tech Giants Fight Back, Phone Firms
Stay Mum) Its the most high-profile effort yet by the tech titans to repair the damage to their corporate reputations
caused by the NSA revelations. The coalition is calling for limits on government authority to collect user information;
better oversight and accountability; greater transparency about the governments demands; respect for the free
flow of data across borders; and the avoidance of conflict between governments. Recent revelations about
government surveillance activities have shaken the trust of our users, and it is time for the United States
government to act to restore the confidence of citizens around the world, said Mayer, Yahoos CEO. Page, Googles
CEO, said: The security of users data is critical, which is why weve invested so much in encryption and fight for
transparency around government requests for information. This is undermined by the apparent wholesale collection
of data, in secret and without independent oversight, by many governments around the world. Mondays
statement by the leading Internet companies is the most forceful sign yet that they are serious about repairing the
damage done to their reputations and future business prospects by the NSA revelations. But one group of
companies that has also been implicated in the Snowden leaks remains conspicuously absent: The nations largest
telecom companies. Both AT&T and Verizon have remained stone-cold silent about their role in the NSAs programs.
Last week, AT&T said it planned to ignore a shareholder proposal calling for greater transparency about government
data requests.
The
These companies may be just dealing with the difficulty in meeting our
Cisco
Systems Inc., the worlds biggest networking equipment maker, received 42 percent of its $46.1 billion in fiscal
2012 revenue from outside the U.S., according to data compiled by Bloomberg. Symantec Corp., the biggest maker
of computer-security software based in Mountain View, California, reported 46 percent of its fiscal 2013 revenue of
$6.9 billion from markets other than the U.S., Canada and Latin America. Intel Corp., the worlds largest
semiconductor maker, reported 84 percent of its $53.3 billion in fiscal 2012 revenue came from outside the U.S.,
according to data compiled by Bloomberg. Exact Flipping The New York Times, the U.K.s Guardian and ProPublica
reported in early September that NSA has cracked codes protecting e-mail and Web content and convinced some
equipment and device makers to build backdoors into products. That followed earlier reports that the NSA was
obtaining and analyzing communications records from phone companies and Internet providers.
The
companies
Customers buy
products and services based on a companys reputation, and the NSA has
single-handedly tarnished the reputation of the entire U.S. tech
industry,
said Daniel Castro, the reports author and an analyst with the non-partisan research group in
Washington, in an e-mail. I suspect many foreign customers are going to be shopping elsewhere for their hardware
and software. Chips, Devices The latest disclosures were based on documents provided by Edward Snowden, the
former NSA contractor accused of espionage by the U.S. whos now in Russia under temporary asylum.
While
The
documents also said the NSA was trying to work with makers of chips used in Virtual Private Network and Web
encryption devices. The German magazine Der Spiegel separately reported the NSA cracked encryption codes to
listen in on the 1.4 billion smartphones in use worldwide, including Apple Inc.s iPhone. Google, Facebook Inc. and
Yahoo yesterday petitioned the U.S. Foreign Intelligence Surveillance Court, which rules on warrants for domestic
data, for permission to publish the types of requests theyve received from the NSA. The three companies were
among 22 that sent a letter in July to President Barack Obama and congressional leaders urging that the companies
be allowed to say more about their dealings with the agency. Companies Defense Cisco said it doesnt customize
equipment to enable surveillance. Ciscos product development practices specifically prohibit any intentional
behaviors or product features which are designed to allow unauthorized device or network access, exposure of
sensitive device information, or a bypass of security features or restrictions, John Earnhardt, spokesman for the
San Jose, California-based company, said in a statement. Symantec said in a statement that it learned of the NSAs
encryption cracking in the media. We had no prior knowledge about this program, said Anna Zvagelskaya, of
public relations firm Weber Shandwick, which represents Symantec. We have long held that Intel does not
participate in alleged government efforts to decrease security in technology, Lisa Malloy, an Intel spokeswoman,
said in an e-mail. Congress, Huawei While foreign firms may be more suspicious of some U.S.- made technologies,
the impact of the disclosures may be limited, said Charles Kolodgy, a security analyst with IDC. Its a worldwide
market and some companies may try to benefit from not being a U.S.-based company, but the real issue is
enterprises are trying to protect themselves in most cases from cyber criminals or malicious insiders or
competitors, he said in an interview. Theyre not so concerned with what a nation-state is doing, The marketleading gear is often market-leading because its the best. Weve gone past being able to source everything within a
country. The NSA revelations also may undermine congressional efforts to block U.S. sales of networking
equipment made by Huawei and ZTE Corp., Chinas second-largest phone-equipment maker, also based in
Shenzhen. A House Intelligence Committee report released in October 2012 said the companies close ties to the
Chinese government and its ability to build backdoors into U.S. computer networks might allow China to disrupt
power grids, financial networks or other critical infrastructure. That suspicion applies to almost every government
and technology company, William Plummer, a Huawei spokesman, said in an e-mail.
Threats to data
he said.
Plummer called the U.S. governments pursuit of Huawei an innuendo-driven political exercise and for industry
and government to leave political games behind and pursue real solutions to more secure networks and data.
impossible to see now the full economic ramifications of the spying disclosures in
part because most companies are locked in multiyear contracts but the pieces
are beginning to add up as businesses question the trustworthiness of American
technology products. The confirmation hearing last week for the new N.S.A. chief,
the video appearance of Mr. Snowden at a technology conference in Texas and the
drip of new details about government spying have kept attention focused on an
issue that many tech executives hoped would go away. Despite the tech companies
assertions that they provide information on their customers only when required
under law and not knowingly through a back door the perception that they
enabled the spying program has lingered. Its clear to every single tech company
that this is affecting their bottom line, said Daniel Castro, a senior analyst at the
Information Technology and Innovation Foundation, who predicted that the United
States cloud computing industry could lose $35 billion by 2016. Forrester Research,
a technology research firm, said the losses could be as high as $180 billion, or 25
percent of industry revenue, based on the size of the cloud computing, web hosting
and outsourcing markets and the worst case for damages. The business effect of
the disclosures about the N.S.A. is felt most in the daily conversations between tech
companies with products to pitch and their wary customers. The topic of
surveillance, which rarely came up before, is now the new normal in these
conversations, as one tech company executive described it. Were hearing from
customers, especially global enterprise customers, that they care more than ever
about where their content is stored and how it is used and secured, said John E.
Frank, deputy general counsel at Microsoft, which has been publicizing that it allows
customers to store their data in Microsoft data centers in certain countries. At the
same time, Mr. Castro said, companies say they believe the federal government is
only making a bad situation worse. Most of the companies in this space are very
frustrated because there hasnt been any kind of response thats made it so they
can go back to their customers and say, See, this is whats different now, you can
trust us again, he said. In some cases, that has meant forgoing potential revenue.
Though it is hard to quantify missed opportunities, American businesses are being
left off some requests for proposals from foreign customers that previously would
have included them, said James Staten, a cloud computing analyst at Forrester who
has read clients requests for proposals. There are German companies, Mr. Staten
said, explicitly not inviting certain American companies to join. He added, Its
like, Well, the very best vendor to do this is IBM, and you didnt invite them. The
result has been a boon for foreign companies.
-- among others
-- have been
, a Reuters
report said Wednesday. The number of approved foreign technology brands fell by a third, based on an analysis of
the procurement list. Less than half of those companies with security products remain on the list. Although a
number of reasons were cited,
guarantees" than overseas rivals in the wake of the Edward Snowden leaks . Some
reports have attempted to pin a multi-billion dollar figure on the impact
the leaks. In reality,
of
government's procurement list changes coincided with a series of high profile leaks that showed the US government
have been on an international mass surveillance spree, as well as hacking expeditions into technology companies,
governments, and the personal cellphones of world leaders. Concerned about backdoors implanted by the NSA,
those revelations sparked a change in Chinese policy by forcing Western technology companies to hand over their
source code for inspection. That led to an outcry in the capital by politicians who in the not-so-distant past accused
Chinese companies of doing exactly the same thing.
cybersecurity standoff continues , it's come too late for Silicon Valley companies, which are
Microsoft said in January at its fiscal
fourth-quarter earnings that China "fell short" of its expectations, which chief
executive Satya Nadella described as a "set of geopolitical issues" that the company
was working through. He did not elaborate. Most recently, HP said on Tuesday at its
fiscal first-quarter earnings call that it had "execution issues" in China thanks to the
"tough market" with increasing competition from the local vendors approved by the
already suffering financially thanks to the NSA's activities.
Chinese government. But one company stands out: Cisco probably suffered the worst
of all. Earlier this month at its fiscal second-quarter earnings, the
networking giant said it took a 19 percent revenue ding in China, amid
claims the NSA was installing backdoors and implants on its routers in
transit . China remains a vital core geography for most US technology giants with a global reach. But until
some middle-ground can be reached between the two governments, expect Silicon Valley's struggles in the country
to only get worse.
L Cloud Computing
Bulk internet data collection is uniquely devastating to the
cloud computing industry. Several expert surveys indicate
huge businesses loss.
Danielle Kehl, et.al (with Kevin Bankston, Robyn Greene & Robert Morgus) New
Americas Open Technology Institute July 2014 Policy Paper Surveillance Costs: The
NSAs Impact on the Economy, Internet Freedom & Cybersecurity
https://www.newamerica.org/downloads/Surveilance_Costs_Final.pdf
Recent reports suggest that things are, in fact, moving in the direction that analysts
like Castro and Staten suggested.50 A survey of 1,000 [Information and
Communications Technology (ICT)] decision-makers from France, Germany, Hong
Kong, the UK, and the USA in February and March 2014 found that the disclosures
have had a direct impact on how companies around the world think about ICT and
cloud computing in particular.51 According to the data from NTT Communications,
88 percent of decision-makers are changing their purchasing behavior when it
comes to the cloud, with the vast majority indicating that the location of the data is
very important. The results do not bode well for recruitment of new customers,
either62 percent of those currently not storing data in the cloud indicated that the
revelations have since prevented them from moving their ICT systems there. And
finally, 82 percent suggested that they agree with proposals made by German
Chancellor Angela Merkel in February 2014 to have separate data networks for
Europe, which will be discussed in further detail in Part III of this report. Providing
direct evidence of this trend, Servint, a Virginia-based webhosting company,
reported in June 2014 that international clients have declined by as much as half,
dropping from approximately 60 percent of its business to 30 percent since the
leaks began.52
Election officials in India canceled a deal with Google to improve voter registration.
In China, sales of Cisco routers dropped 10 percent in a recent quarter. European
regulators threatened to block AT&T's purchase of the wireless provider Vodafone.
The technology industry is being roiled by the so-called Snowden Effect, as disclosures by
former National Security Agency contractor Edward Snowden about the extent of American spying worldwide
companies' role in the NSA scandal. Fred Cate, a law professor at Indiana University, said criticism
over Silicon Valley's involvement in the government surveillance program was initially limited to European
politicians "taking advantage of this moment to beat up on the U.S." "But the reports from the industry are showing
The
impact of the Snowden leaks could threaten the future architecture of the modern
Internet. In recent years, computing power has shifted from individual PCs to the so-called
cloud -- massive servers that allow people to access their files from anywhere. The Snowden revelations
undermined trust in U.S.-based cloud services by revealing how some of the largest
American tech companies using cloud computing -- including Google and Yahoo -had their data accessed by the NSA. About 10 percent of non-U.S. companies have
canceled contracts with American cloud providers since the NSA spying program
was disclosed, according to a survey by the Cloud Security Alliance, an industry group. U.S. cloud providers
that it is more than that," he added. "This is more than just a flash in the pan. This is really starting to hurt."
could lose as much as $35 billion over the next three years as fears over U.S. government surveillance prompt
foreign customers to transfer their data to cloud companies in other countries, according to a study by the
Information Technology and Innovation Foundation, a nonpartisan think tank based in Washington, D.C. " If
European cloud customers cannot trust the United States government , then maybe they
won't trust U.S. cloud providers either ," Neelie Kroes, European commissioner for digital affairs, said
last summer after the NSA revelations were made public. "If I am right, there are multibillion-euro consequences for
American companies. If I were an American cloud provider, I would be quite frustrated with my government right
now." European officials and companies have been especially troubled by the Snowden leaks because European
privacy laws are more stringent than those in the United States. After documents from Snowden revealed that the
NSA had tapped German Chancellor Angela Merkels phone calls, she said Europeans should promote domestic
Internet companies over American ones in order to avoid U.S. surveillance. German Interior Minister Hans-Peter
Friedrich has suggested that people who are worried about government spying should stop using Google and
Facebook altogether. "Whoever fears their communication is being intercepted in any way should use services that
don't go through American servers," Friedrich said after Snowden leaked the NSA documents. Chris Lamoureux, the
customers have
requested that the company avoid storing their information in U.S.-based data
centers, hoping to make it more difficult for the NSA to gain access . "They've said, 'We
executive vice president of the company Veriday, told The WorldPost that some of his
don't want you to put our data in the U.S. because we're worried about what we're seeing and hearing over there
right now,'" said Lamoureux, whose Ottawa-based company develops web applications for banks, governments and
retailers. Some argue that President Barack Obama has added to the tech industry's troubles abroad by
emphasizing how the NSA surveillance program focused on people outside the United States, where most of Silicon
Valley's customers are located. "Those customers, as well as foreign regulatory agencies like those in the European
Union, were being led to believe that using US-based services meant giving their data directly to the NSA,"
major
tech companies (including AOL, which owns The Huffington Post Media Group) have asked the
Obama administration for permission to be more open about how they responded to
past requests for data from the U.S. government. They argue the government
snooped on their networks without their knowledge . Recent reports based on documents
provided by Snowden revealed that the NSA spied on Google and Yahoo customers,
unbeknownst to the companies, by secretly tapping cables that connect data
centers around the world. "The impression is that the tech industry is in league with
the U.S. government," Cate said. "But the industry would like to give the impression
that they're victims of the U.S. government, too. " On Wednesday, Microsoft said it would
offer customers who are wary about NSA surveillance the ability to store their data
outside the United States. Meanwhile, some foreign tech companies are trying to capitalize on the distrust
journalist Steven Levy wrote in a recent article in Wired magazine. Hoping to reassure overseas customers,
between U.S. tech firms and their customers around the world. Swisscom, a cloud provider in Switzerland, is
developing a service that would attract customers looking to store data under the country's strict privacy laws and
away "from the prying eyes of foreign intelligence services," Reuters reported. Germany's three largest email
providers have also created a new service, called "Email Made in Germany," designed to thwart the NSA by
encrypting messages through servers located within the country, The Wall Street Journal reported. But Cate said
that any businesses that try to avoid surveillance by boycotting U.S. tech companies are not really protecting their
data from the NSA. After all, intelligence agencies in France and Spain also spied on their own citizens, and passed
on that information to the NSA, according to documents from Snowden. "It doesn't make a difference what you do
with your data -- the NSA is going break into it," Cate said. "But that doesn't mean U.S. industry isn't going to get
hurt along the way."
L Sec 702
Sec 702 program destroys trust in American businesses and
competitiveness in the global marketplace
Danielle Kehl, et.al (with Kevin Bankston, Robyn Greene & Robert Morgus) New
Americas Open Technology Institute July 2014 Policy Paper Surveillance Costs: The
NSAs Impact on the Economy, Internet Freedom & Cybersecurity
https://www.newamerica.org/downloads/Surveilance_Costs_Final.pdf
Trust in American businesses has taken a significant hit since the initial reports on
the PRISM program suggested that the NSA was directly tapping into the servers of
nine U.S. companies to obtain customer data for national security investigations.28
The Washington Posts original story on the program provoked an uproar in the
media and prompted the CEOs of several major companies to deny knowledge of or
participation in the program.29 The exact nature of the requests made through the
PRISM program was later clarified,30 but the public attention on the relationship
between American companies and the NSA still created a significant trust gap,
especially in industries where users entrust companies to store sensitive personal
and commercial data. Last years national security leaks have also had a
commercial and financial impact on American technology companies that have
provided these records, noted Representative Bob Goodlatte, a prominent
Republican leader and Chairman of the House Judiciary Committee, in May 2014.
They have experienced backlash from both American and foreign consumers and
have had their competitive standing in the global marketplace damaged.31
L - Protectionism
NSA digital surveillance destroys US competitiveness and is
used to justify data protectionism and strains relations with
China
DANIEL CASTRO AND ALAN MCQUINN | JUNE 2015 Beyond the USA
Freedom Act: How U.S. Surveillance Still Subverts U.S. Competitiveness
http://www2.itif.org/2015-beyond-usa-freedom-act.pdf?
_ga=1.86597016.1417756247.1435604368
The ability of companiesboth tech and traditionalto easily share data across
borders has brought a vast array of benefits to countries, companies, consumers,
and economies through increased efficiency, decreased costs, and improved
services.26 And yet nations have continued to erect barriers to cloud computing
and cross-border data flows, much to their own detriment.27 While some defenders
of these policies have asserted that they are designed to increase the privacy or
security of their citizens data, it is clear that they are also motivated by misguided
self-interest. By creating rules that advantage domestic firms over foreign firms,
many countries believe they will build a stronger domestic tech industry or gain
short-term economic value, such as jobs in domestic data centers. In reality, these
policies unwittingly limit the ability of a countrys own firms to innovate by shielding
them from international competition.28 These policies not only limit the number of
services that a countrys citizens and businesses can enjoy, but also harm that
countrys productivity and competitiveness. Some countries used U.S. surveillance
laws to justify data protectionism even before Snowdens NSA revelations. For
example, when Rackspace built data centers in Australia in 2012, an Australian
competitor stirred up fears that the United States would use the Patriot Act to track
Australian citizens as a means to force Rackspace out of Australia.29 In addition,
this same Australian company funded a report calling on Australian policymakers to
impose additional regulations designed to put foreign cloud computing competitors
at a disadvantage.30 However, since the recent NSA revelations, the use of privacy
concerns to justify protectionist barriers has grown significantly. Amid growing antiU.S. sentiment, Europe has seen calls for data localization requirements,
procurement preferences for European providers, and even a Schengen area for
dataa system that keeps as much data in Europe as possibleas ways to
promote deployment of cloud services entirely focused on the European market.31
France and Germany have even started to create dedicated national networks:
Schlandnet for the former and the Sovereign Cloud for the latter. 32 The French
government has gone so far as to put 150 million ($200 million) into two start-ups,
Numergy and Cloudwatt, to create a domestic infrastructure independent of U.S.
tech giants.33 Furthermore, some groups have invoked U.S. cyberespionage to
argue that European citizens are not adequately protected and are calling for the
removal of the safe harbor agreementan agreement that allows Internet
companies to store data outside of the European Union. Yet if this were removed it
would cut Europeans off from many major Internet services. 34 There is also an
increasingly distressing trend of countries, such as Australia, China, Russia, and
India, passing laws that prevent their citizens personal information from leaving the
countrys borderseffectively mandating that cloud computing firms build data
centers in those countries or risk losing access to their markets. For example, in
2014 Russian implemented and Indonesia began considering policies that would
require Internet-based companies to set up local data centers.35 These policies are
often a veiled attempt to spur short term economic activity by creating data-center
jobs. However, this benefit is often outweighed by the substantial cost of building
unnecessary data centers, a cost that is eventually passed along to the countrys
citizens. Several U.S. tech giants, such Apple and Salesforce, have already started
to build their data centers abroad to appease foreign watchdogs and privacy
advocates.36 For example, Amazon started running Internet services and holding
data in Germany for its European business partners in an effort to downplay threats
of online spying.37 Protectionist policies in China have further strained the U.S. tech
industry. In January 2015, the Chinese government adopted new regulations that
forced companies that sold equipment to Chinese banks to turn over secret source
code, submit to aggressive audits, and build encryption keys into their products.38
While ostensibly an attempt to strengthen cybersecurity in critical Chinese
industries, many western tech companies saw these policies as a shot across the
bow trying to force them out of Chinas markets. After all, the Chinese government
had already launched a de-IOE movementIOE stands for IBM, Oracle and EMC
to convince its state-owned banks to stop buying from these U.S. tech giants. 39 To
be sure, the Chinese government recently halted this policy under U.S. pressure.40
However, the halted policy can be seen as a part of a larger clash between China
and the United States over trade and cybersecurity. Indeed, these proposed barriers
were in part a quid pro quo from China, after the United States barred Huawei, a
major Chinese computer maker, from selling its products in the United States due to
the fear that this equipment had back doors for the Chinese government.41 Since
the Snowden revelations essentially gave them cover, Chinese lawmakers have
openly called for the use of domestic tech products over foreign goods both to boost
the Chinese economy and in response to U.S. surveillance tactics. This system of
retaliation has not only led to a degradation of business interests for U.S. tech
companies in China, but also disrupted the dialogue between the U.S. government
and China on cybersecurity issues.42
NSA surveillance would cost cloud computing companies somewhere around $21.5
billion to $35 billion. But last week it upped that figure to an unspecified amount.
Daniel Castro and Alan McQuinn, authors of a new ITIF report, say: Since then, it has
become clear that the US tech industry as a whole, not just the cloud computing
sector, has under-performed as a result of the Snowden revelations. Therefore, the
economic impact of US surveillance practices will likely far exceed ITIFs initial $35
billion estimate. ITIF hit out at what it sees as a lack of strong enough action by the
US government to address the situation the impact of programs such as PRISM:
Foreign companies have seized on these controversial policies to convince their
customers that keeping data at home is safer than sending it abroad, and foreign
governments have pointed to US surveillance as justification for protectionist
policies that require data to be kept within their national borders. In the most
extreme cases, such as in China, foreign governments are using fear of digital
surveillance to force companies to surrender valuable intellectual property, such as
source code. In the short term, U.S. companies lose out on contracts, and over the
long term, other countries create protectionist policies that lock U.S. businesses out
of foreign markets. This not only hurts U.S. technology companies, but costs
American jobs and weakens the US trade balance.
efforts to weaken encryption and strengthening its mutual legal assistance treaties
with other nations. "Over the last few years, the US government's failure to
meaningfully reform its surveillance practices has taken a serious economic toll on
the US tech sector and the total cost continues to grow each day," Castro said.
Castro said the USA Freedom Act, which curbs bulk data collection among its
reforms, is "good legislation and a step in the right direction. We have ignored the
economic impact of US surveillance."
IL- Spillover
Economic impact of NSA spills over into other industries
Danielle Kehl, et.al (with Kevin Bankston, Robyn Greene & Robert Morgus) New
Americas Open Technology Institute July 2014 Policy Paper Surveillance Costs: The
NSAs Impact on the Economy, Internet Freedom & Cybersecurity
https://www.newamerica.org/downloads/Surveilance_Costs_Final.pdf
The economic impact of NSA spying does not end with the American cloud
computing industry. According to The New York Times, Even as Washington
grapples with the diplomatic and political fallout of Mr. Snowdens leaks, the more
urgent issue, companies and analysts say, is economic.59 In the past year, a
number of American companies have reported declining sales in overseas markets
like China (where, it must be noted, suspicion of the American government was
already high before the NSA disclosures), loss of customers including foreign
governments, and increased competition from non-U.S. services marketing
themselves as secure alternatives to popular American products. There is already
significant linking NSA surveillance to direct harm to U.S. economic interests. In
November 2013, Cisco became one of the first companies to publicly discuss the
impact of the NSA on its business, reporting that orders from China fell 18 percent
and that its worldwide revenue would decline 8 to 10 percent in the fourth quarter,
in part because of continued sales weakness in China.60 New orders in the
developing world fell 12 percent in the third quarter, with the Brazilian market
dropping roughly 25 percent of its Cisco sales.61 Although John Chambers, Ciscos
CEO, was hesitant to blame all losses on the NSA, he acknowledged that it was
likely a factor in declining Chinese sales62 and later admitted that he had never
seen as fast a decline in an emerging market as the drop in China in late 2013.63
These numbers were also released before documents in May 2014 revealed that the
NSAs Tailored Access Operations unit had intercepted network gearincluding
Cisco routersbeing shipped to target organizations in order to covertly install
implant firmware on them before they were delivered.64 In response, Chambers
wrote in a letter to the Obama Administration that if these allegations are true,
these actions will undermine confidence in our industry and in the ability of
technology companies to deliver products globally.65
American companies are also losing out on business opportunities and contracts
with large companies and foreign governments as a result of NSA spying. According
to an article in The New York Times, American businesses are being left off some
requests for proposals from foreign customers that previously would have included
them.70 This refers to German companies, for example, that are increasingly
uncomfortable giving their business to American firms. Meanwhile, the German
government plans to change its procurement rules to prevent American companies
that cooperate with the NSA or other intelligence organizations from being awarded
federal IT contracts.71 The government has already announced it intends to end its
contract with Verizon, which provides Internet service to a number of government
departments.72 There are indications that Verizon is legally required to provide
certain things to the NSA, and thats one of the reasons the cooperation with
Verizon wont continue, a spokesman for the German Interior Ministry told the
Associated Press in June.73 The NSA disclosures have similarly been blamed for
Brazils December 2013 decision to award a $4.5 billion contract to Saab over
Boeing, an American company that had previously been the frontrunner in a deal to
replace Brazils fleet of fighter jets.74 Welber Barral, a former Brazilian trade
secretary, suggested to Bloomberg News that Boeing would have won the contract
a year earlier,75 while a source in the Brazilian government told Reuters that the
NSA problem ruined it for the Americans.76 As we will discuss in greater depth in
the next section, Germany and Brazil are also considering data localization
proposals that could harm U.S. business interests and prevent American companies
from entering into new markets because of high compliance costs.
A2 Econ resilient
No resiliency
Nouriel Roubini (professor of economics at New York University's Stern School of
Business, is co-founder and chairman of Roubini Global Economics (RGE)) and
Michael Moran (RGE's vice president, executive editor, and chief geostrategy
analyst) October 11, 2010 Avoid the Double Dip
http://www.foreignpolicy.com/articles/2010/10/11/avoid_the_double_dip?page=0,0
Roughly three years since the onset of the financial crisis, the U.S. economy
increasingly looks vulnerable to falling back into recession. The United States is
flirting with "stall speed," an anemic rate of growth that, if it persists, can lead to
collapses in spending, consumer confidence, credit, and other crucial engines of
growth. Call it a "double dip" or the Great Recession, Round II: Whatever the term,
we're talking about a negative feedback loop that would be devilishly hard to break.
If Barack Obama wants a realistic shot at a second term, he'll need to act quickly
and decisively to prevent this scenario. Near double-digit unemployment is the root
of the problem. Without job creation there's a lack of consumer spending, which
represents 40 percent of domestic GDP. To date, the U.S. government has
responded creatively and massively to the near collapse of the financial system,
using a litany of measures, from the bank bailout to stimulus spending to low
interest rates. Together, these policies prevented a reprise of the Great Depression.
But they also created fiscal and political dilemmas that limit the usefulness of
traditional monetary and fiscal tools that policymakers can turn to in a pinch. With
interest rates near zero percent already, the Federal Reserve has few bullets left in
its holster to boost growth or fend off another slump. This lack of available good
options was patently on display in August when Fed Chairman Ben Bernanke spoke
with a tinge of resignation about new "quantitative easing" interventions in the
mortgage and bond markets -- a highly technical suggestion that, until the recent
crisis, amounted to heresy among Fed policymakers. It certainly hasn't helped that
the U.S. federal deficit has reached heights that make additional stimulus spending,
of the kind that helped kindle the mini-recovery of early 2010, politically impossible.
No resiliency
RAMPELL 11 economics reporter for The New York Times; wrote for the
Washington Post editorial pages and financial section (Catherine, Second Recession
in U.S. Could Be Worse Than First. August 7.
http://www.nytimes.com/2011/08/08/business/a-second-recession-could-be-muchworse-than-the-first.html?pagewanted=all)
If the economy falls back into recession, as many economists are now warning, the
bloodletting could be a lot more painful than the last time around.
But the economy is much
weaker than it was at the outset of the last recession in December 2007,
with most major measures of economic health including jobs, incomes,
output and industrial production worse today than they were back then .
Given the tumult of the Great Recession, this may be hard to believe.
And growth has been so weak that almost no ground has been recouped ,
even though a recovery technically started in June 2009. It would be disastrous if we entered
into a recession at this stage, given that we havent yet made up for the last recession, said
Conrad DeQuadros, senior economist at RDQ Economics. When the last downturn hit, the credit bubble left
Americans with lots of fat to cut, but a new one would force families to cut from the bone. Making things worse,
policy makers used most of the economic tools at their disposal to combat the last recession, and have few options
available. Anxiety and uncertainty have increased in the last few days after the decision by Standard & Poors to
downgrade the countrys credit rating and as Europe continues its desperate attempt to stem its debt crisis.
President Obama acknowledged the challenge in his Saturday radio and Internet address, saying the countrys
urgent mission now was to expand the economy and create jobs. And Treasury Secretary Timothy F. Geithner said
in an interview on CNBC on Sunday that the United States had a lot of work to do because of its long-term and
unsustainable fiscal position. But he added, I have enormous confidence in the basic regenerative capacity of the
American economy and the American people. Still, the numbers are daunting. In the four years since the
Today the economy has 5 percent fewer jobs or 6.8 million than it had before the last recession began. The
unemployment rate was 5 percent then, compared with 9.1 percent today.
who are working are generally working less; the typical private sector worker has a shorter
workweek today than four years ago. Employers shed all the extra work shifts and weak or extraneous employees
down 4 percent, not counting payments from the government for things like unemployment benefits. Income levels
are low, and moving in the wrong direction: private wage and salary income actually fell in June, the last month for
economy were healthy, total consumer spending would be higher because of population growth. And with
construction nearly nonexistent and home prices down 24 percent since December 2007, the country does not have
a buffer in housing to fall back on. Of all the major economic indicators, industrial production as tracked by the
Federal Reserve is by far the worst off. The Feds index of this activity is nearly 8 percent below its level in
December 2007. Likewise, and perhaps most worrisome, is the track record for the countrys overall output.
According to newly revised data from the Commerce Department, the economy is smaller today than it was when
the recession began, despite (or rather, because of) the feeble growth in the last couple of years. If the economy
flooded the financial markets with money by buying billions in mortgage securities and Treasury bonds, and
economists do not even agree on whether those purchases substantially helped the economy. So the Fed may not
see much upside to going through another politically controversial round of buying. There
are only so
many times the Fed can pull this same rabbit out of its hat, said Torsten
Slok, the chief international economist at Deutsche Bank . Congress had some room
financially and politically to engage in fiscal stimulus during the last recession. But at the end of
2007, the federal debt was 64.4 percent of the economy. Today, it is
estimated at around 100 percent of gross domestic product, a share not seen
since the aftermath of World War II, and there is little chance of lawmakers reaching consensus
on additional stimulus that would increase the debt. There is no approachable precedent, at least in the postwar
era, for what happens when an economy with 9 percent unemployment falls back into recession, said Nigel Gault,
chief United States economist at IHS Global Insight. The
A2 Decoupling
The US is key to the global economy no decoupling
Caploe 2009 David Caploe (the CEO of the Singapore-incorporated American
Centre for Applied Liberal Arts and Humanities in Asia) April 2009 Focus Still on
America to Lead Global Recovery Online
While superficially sensible, this view is deeply problematic. To begin with, it ignores the fact that the global
economy has in fact been 'America-centred' for more than 60 years. Countries - China, Japan, Canada, Brazil, Korea,
Mexico and so on - either sell to the US or they sell to countries that sell to the US. To put it simply, Mr Obama
doesn't seem to understand that there is no other engine for the world economy - and hasn't been for the last six
If the US does not drive global economic growth, growth is not going to
happen. Thus, US policies to deal with the current crisis are critical not just domestically, but
also to the entire world. This system has generally been advantageous for all concerned. America gained
decades.
certain historically unprecedented benefits, but the system also enabled participating countries - first in Western
this
deep inter-connection between the US and the rest of the world also explains how the
collapse of a relatively small sector of the US economy - 'sub-prime' housing, logarithmically
exponentialised by Wall Street's ingenious chicanery - has cascaded into the worst global economic
crisis since the Great Depression . To put it simply, Mr Obama doesn't seem to understand that there
is no other engine for the world economy - and hasn't been for the last six decades.
Europe and Japan, and later, many in the Third World - to achieve undreamt-of prosperity. At the same time,
If the US does not drive global economic growth, growth is not going to happen. Thus, US policies to deal with the
current crisis are critical not just domestically, but also to the entire world. Consequently, it is a matter of global
concern that the Obama administration seems to be following Japan's 'model' from the 1990s: allowing major banks
to avoid declaring massive losses openly and transparently, and so perpetuating 'zombie' banks - technically alive
but in reality dead. As analysts like Nobel laureates Joseph Stiglitz and Paul Krugman have pointed out, the
administration's unwillingness to confront US banks is the main reason why they are continuing their increasingly
inexplicable credit freeze, thus ravaging the American and global economies. Team Obama seems reluctant to
acknowledge the extent to which its policies at home are failing not just there but around the world as well. Which
If the US can't or won't or doesn't want to be the global economic engine, which
country will? The obvious answer is China . But that is unrealistic for three reasons.
First, China's economic health is more tied to America's than practically any other
country in the world. Indeed, the reason China has so many dollars to invest
everywhere - whether in US Treasury bonds or in Africa - is precisely that it has structured its own
economy to complement America's. The only way China can serve as the engine of
the global economy is if the US starts pulling it first. Second, the US-centred system began at a
time when its domestic demand far outstripped that of the rest of the world. The fundamental source of
its economic power is its ability to act as the global consumer of last resort. China,
however, is a poor country, with low per capita income, even though it will soon pass Japan as the world's
second largest economy. There are real possibilities for growth in China's domestic
demand. But given its structure as an export-oriented economy, it is doubtful if
even a successful Chinese stimulus plan can pull the rest of the world along unless
and until China can start selling again to the US on a massive scale . Finally, the key
'system' issue for China - or for the European Union - in thinking about becoming the engine of the world
economy - is monetary: What are the implications of having your domestic currency become the global reserve
raises the question:
currency? This is an extremely complex issue that the US has struggled with, not always successfully, from 1959 to
the present. Without going into detail, it can safely be said that though having the US dollar as the world's medium
of exchange has given the US some tremendous advantages, it has also created huge problems, both for America
The Chinese leadership is certainly familiar with this history. It will try
to avoid the yuan becoming an international medium of exchange until it feels much more
and the global economic system.
confident in its ability to handle the manifold currency problems that the US has grappled with for decades. Given
the US will remain the engine of global economic recovery for the foreseeable future,
even though other countries must certainly help. This crisis began in the US - and it
is going to have to be solved there too.
all this,
change would be steadier. In surveying those risks, the report stressed the likelihood that terrorism and
Terrorisms
appeal will decline if economic growth continues in the Middle East and youth unemployment is
nonproliferation will remain priorities even as resource issues move up on the international agenda.
reduced. For those terrorist groups that remain active in 2025, however, the diffusion of technologies and
scientific knowledge will place some of the worlds most dangerous capabilities within their reach. Terrorist groups
in 2025 will likely be a combination of descendants of long established groupsinheriting organizational structures,
command and control processes, and training procedures necessary to conduct sophisticated attacksand newly
emergent collections of the angry and disenfranchised that become self-radicalized, particularly in the absence of
that existed between the great powers for most of the Cold War would emerge naturally in the Middle East with a
red lines between those states involved are not well established. The close proximity of potential nuclear rivals
combined with underdeveloped surveillance capabilities and mobile dual-capable Iranian missile systems also will
The
lack of strategic depth in neighboring states like Israel, short warning and missile
flight times, and uncertainty of Iranian intentions may place more focus on
preemption rather than defense, potentially leading to escalating crises.Types of conflict that
the world continues to experience, such as over resources, could reemerge,
particularly if protectionism grows and there is a resort to neo-mercantilist
practices. Perceptions of renewed energy scarcity will drive countries to take actions to assure their future
access to energy supplies. In the worst case, this could result in interstate conflicts if government
produce inherent difficulties in achieving reliable indications and warning of an impending nuclear attack.
leaders deem assured access to energy resources, for example, to be essential for maintaining domestic stability
and the survival of their regime. Even actions short of war, however, will have important geopolitical implications.
Maritime security concerns are providing a rationale for naval buildups and modernization efforts, such as Chinas
and Indias development of blue water naval capabilities.
If
the
turns inward, one of the most obvious funding targets may be military . Buildup
of regional naval capabilities could lead to increased tensions , rivalries, and counterbalancing
indeed
moves, but it also will create opportunities for multinational cooperation in protecting critical sea lanes. With water
also becoming scarcer in Asia and the Middle East, cooperation to manage changing water resources is likely to
be increasingly difficult both within and between states in a more dog-eat-dog world.
democracy similar to those of the first. Whatever the trigger, the unlimited exercise of
national sovereignty, exclusive self-interest and rejection of outside interference
would self-interest and rejection of outside interference would likely be amplified, emptying, perhaps entirely, the half-full
glass of multilateralism, including the UN and the European Union. Many of the more likely conflicts, such as between Israel and Iran or
India and Pakistan, have potential religious dimensions. Short of war, tensions such as those related to immigration might become unbearable.
amiliar issues of creed and identity could be exacerbated . One way or another, the secular
rational approach would be sidestepped by a return to theocratic absolutes , competing
or converging with secular absolutes such as unbridled nationalism .
F
Protectionism impacts
Protectionism lowers the threshold for all conflict makes
escalation more likely causes a laundry list of impacts *card
says prevents Iran conflict
Stewart Patrick (senior fellow and director of the Program on International
Institutions and Global Governance at the Council on Foreign Relations) March
2009 Protecting Free Trade The National Interest
http://nationalinterest.org/article/protecting-free-trade-3060
President Obama and his foreign counterparts should reflect on the lessons of the
1930s-and the insights of Cordell Hull. The longest-serving secretary of state in
American history (1933-1944), Hull helped guide the United States through the
Depression and World War II. He also understood a fundamental truth: "When goods
move, soldiers don't." In the 1930s, global recession had catastrophic political
consequences-in part because policymakers took exactly the wrong approach.
Starting with America's own Smoot Hawley Tariff of 1930, the world's major trading
nations tried to insulate themselves by adopting inward looking protectionist and
discriminatory policies. The result was a vicious, self-defeating cycle of tit-for-tat
retaliation. As states took refuge in prohibitive tariffs, import quotas, export
subsidies and competitive devaluations, international commerce devolved into a
desperate competition for dwindling markets. Between 1929 and 1933, the value of
world trade plummeted from $50 billion to $15 billion. Global economic activity
went into a death spiral, exacerbating the depth and length of the Great
Depression. The economic consequences of protectionism were bad enough. The
political consequences were worse. As Hull recognized, global economic
fragmentation lowered standards of living, drove unemployment higher and
increased poverty-accentuating social upheaval and leaving destitute populations
"easy prey to dictators and desperadoes." The rise of Nazism in Germany, fascism in
Italy and militarism in Japan is impossible to divorce from the economic turmoil,
which allowed demagogic leaders to mobilize support among alienated masses
nursing nationalist grievances. Open economic warfare poisoned the diplomatic
climate and exacerbated great power rivalries, raising, in Hull's view, "constant
temptation to use force, or threat of force, to obtain what could have been got
through normal processes of trade." Assistant Secretary William Clayton agreed:
"Nations which act as enemies in the marketplace cannot long be friends at the
council table." This is what makes growing protectionism and discrimination among
the world's major trading powers today so alarming. In 2008 world trade declined
for the first time since 1982. And despite their pledges, seventeen G-20 members
have adopted significant trade restrictions. "Buy American" provisions in the U.S.
stimulus package have been matched by similar measures elsewhere, with the EU
ambassador to Washington declaring that "Nobody will take this lying down."
Brussels has resumed export subsidies to EU dairy farmers and restricted imports
from the United States and China. Meanwhile, India is threatening new tariffs on
steel imports and cars; Russia has enacted some thirty new tariffs and export
subsidies. In a sign of the global mood, WTO antidumping cases are up 40 percent
since last year. Even less blatant forms of economic nationalism, such as banks
restricting lending to "safer" domestic companies, risk shutting down global capital
flows and exacerbating the current crisis. If unchecked, such economic nationalism
could raise diplomatic tensions among the world's major powers. At particular risk
are U.S. relations with China, Washington's most important bilateral interlocutor in
the twenty-first century. China has called the "Buy American" provisions "poison"not exactly how the Obama administration wants to start off the relationship. U.S.
Treasury Secretary Timothy Geithner's ill-timed comments about China's currency
"manipulation" and his promise of an "aggressive" U.S. response were not especially
helpful either, nor is Congress' preoccupation with "unfair" Chinese trade and
currency practices. For its part, Beijing has responded to the global slump by rolling
back some of the liberalizing reforms introduced over the past thirty years. Such
practices, including state subsidies, collide with the spirit and sometimes the law of
open trade. The Obama administration must find common ground with Beijing on a
coordinated response, or risk retaliatory protectionism that could severely damage
both economies and escalate into political confrontation. A trade war is the last
thing the United States needs, given that China holds $1 trillion of our debt and will
be critical to solving flashpoints ranging from Iran to North Korea. In the 1930s,
authoritarian great-power governments responded to the global downturn by
adopting more nationalistic and aggressive policies. Today, the economic crisis may
well fuel rising nationalism and regional assertiveness in emerging countries. Russia
is a case in point. Although some predict that the economic crisis will temper
Moscow's international ambitions, evidence for such geopolitical modesty is slim to
date. Neither the collapse of its stock market nor the decline in oil prices has kept
Russia from flexing its muscles from Ukraine to Kyrgyzstan. While some expect the
economic crisis to challenge Putin's grip on power, there is no guarantee that
Washington will find any successor regime less nationalistic and aggressive. Beyond
generating great power antagonism, misguided protectionism could also exacerbate
political upheaval in the developing world. As Director of National Intelligence
Dennis Blair recently testified, the downturn has already aggravated political
instability in a quarter of the world's nations. In many emerging countries, including
important players like South Africa, Ukraine and Mexico, political stability rests on a
precarious balance. Protectionist policies could well push developing economies and
emerging market exporters over the edge. In Pakistan, a protracted economic crisis
could precipitate the collapse of the regime and fragmentation of the state. No
surprise, then, that President Obama is the first U.S. president to receive a daily
economic intelligence briefing, distilling the security implications of the global crisis.
Mansfield and Pevehouse have demonstrated that trade between nations makes
them less likely to wage war on each other -- and keeps internecine spats from
spiraling out of control. They also found these trends are more pronounced among
democratic countries with a strong tradition of respect for the rule of law. Countries
that trade with each other are far less likely to confront each other on the battlefield
than are countries with no trade relationship. And the size of the economies
involved doesn't affect this relationship, which means small, weak countries can
enhance their defense capabilities simply by increasing trade with the world's
economic giants. Experts, including Mansfield and Pevehouse, say intensive trade
integration, perhaps more than any other factor, has led to an unprecedented five
decades of peace in Western Europe.
U.S. foreign policy and will have to address it head-on. Indeed, the U.S. is currently
working to repair damaged bilateral and multilateral relations with countries from
Germany and France to Russia and Israel,173 and it is likely that the effects of the
NSA disclosures will be felt for years in fields far beyond Internet policy.174
countries such as Russia, Saudi Arabia, China and others sought to use the
gathering to establish new international rules through the ITU governing the
internet. Although many believe that WCIT failed because 55 countriesincluding
the United States, virtually all of Europe, and other internet-leading countries such
as Kenya and Indiadid not sign the revised treaty, in reality WCIT was an
important early chapter in the critical global process of determining the internet's
political and policy futureand in turn, its technical and economic future. It is
important to recognize that the internet's political and policy future will be shaped
by American leadershipnot just through traditional U.S. rhetoric about
competition, private sector leadership, and multi-stakeholder decisionmaking, but
by America's ability to walk the talk by showing unequivocally that the ideals we
preach internationally are fully reflected in what we do at home. American
policymakers recognize that what we do domestically is watched and analyzed with
great care by much of the rest of the world. For example, before the WCIT
negotiations began in Dubai, Congress unanimously passed resolutions on internet
governance that stated that the United States should continue to preserve and
advance the multi-stakeholder governance model under which the Internet has
thrived as well as resist the imposition of an International Telecommunication Union
(ITU) mandated international settlement regime on the Internet. Declaring, among
other things, that it is essential that the Internet remain stable, secure, and free
from government control. Congress's Clear Message Was Heard This action was
important not only because of the substance of Congress's statements, but also
because the world understood just how extraordinary it is for our Congress to act
with unanimity, especially in an era when Congress has immense difficulty reaching
consensus on almost anything. At the end of WCIT, I heard from many foreign
officials that they knew that the United States would not sign the revised treaty with
its Internet-related provisions because Congress had sent a clear and unequivocal
message that such an agreement was unacceptable to the American people.
Looking ahead, we must recognize the obviousinternet policy issues affect
virtually everyone in the world, and U.S. leadership depends on the power of its
forward looking arguments, not just the historical fact that the United States gave
the world a transformational technology. Although establishing global internet policy
will be long, complex and challenging, we are fortunate that we have a wellestablished road map to follow. No Room for Hypocrisy We can continue to lead the
world toward greater prosperity and the socially transformational benefits long
associated with the internet. But if we fail to match our words with action; if we
insist that others avoid an approach that imposes regulations and laws that limit the
internet's capacity to advance freedom, openness and creativity, micromanages
markets, or limits competition and investment, but do otherwise at home, then the
world will quickly recognize our hypocrisy.
Mason University in August 2013. But the fact is that the NSA is galvanizing
opposition to Americas internet freedom agenda.189 The scandal revived
proposals from both Russia and Brazil for global management of technical standards
and domain names, whether through the ITU or other avenues. Even developing
countries, many of whom have traditionally aligned with the U.S. and prioritize
access and affordability as top issues, dont want US assistance because they
assume the equipment comes with a backdoor for the NSA. They are walking
straight into the arms of Russia, China, and the ITU.190
to business as usual when tensions still remain over U.S. spying allegations.220
The Guardian called the visit frosty and awkward.221 The German Parliament
has also begun hearings to investigate the revelations and suggested that it is
weighing further action against the United States.222 Moreover, the disclosures
have weakened the United States relationship with emerging powers like Brazil,
where the fallout from NSA surveillance threatens to do more lasting damage.
Brazilian President Dilma Rousseff has seized on the NSA disclosures as an
opportunity to broaden Brazils influence not only in the Internet governance field,
but also on a broader range of geopolitical issues. Her decision not to attend an
October 2013 meeting with President Barack Obama at the White House was a
direct response to NSA spyingand a serious, high-profile snub. In addition to
cancelling what would have been the first state visit by a Brazilian president to the
White House in nearly 20 years, Rousseffs decision marked the first time a world
leader had turned down a state dinner with the President of the United States.223 In
his statement on the postponement, President Obama was forced to address the
issue of NSA surveillance directly, acknowledging that he understands and regrets
the concerns disclosures of alleged U.S. intelligence activities have generated in
Brazil and made clear that he is committed to working together with President
Rousseff and her government in diplomatic channels to move beyond this issue as a
source of tension in our bilateral relationship.224 Many observers have noted that
the Internet Freedom agenda could be one of the first casualties of the NSA
disclosures. The U.S. government is fighting an uphill battle at the moment to regain
credibility in international Internet governance debates and to defend its moral high
ground as a critic of authoritarian regimes that limit freedom of expression and
violate human rights online. Moreover, the fallout from the NSAs surveillance
activities has spilled over into other areas of U.S. foreign policy and currently
threatens bilateral relations with a number of key allies. Going forward, it is critical
that decisions about U.S. spying are made in consideration of a broader set of
interests so that they do not impedeor, in some cases, completely undermine
U.S. foreign policy goals.
The greatest threat facing Internet governance is the way too much power afforded
to governments to control communication on the network . To me, this is mainly
manifested in the increasing actions of online mass surveillance carried out by some
governments and the threats that this poses to privacy; and the ability of some
governments to stop all Internet communication using a kill switch. Weve seen this happen in Egypt
during the 18 days that brought Mubarak down, but its also still happening on a smaller scale in parts
of Egypt (mainly the Sinai), with the government claiming its done in the interest of national
security. Sam Dickinson, writer and and public affairs consultant. www.linguasynaptica.com The
greatest threat to Internet governance is external politics. Its got nothing to do with
the Internet itself. Its developments like the revelations of widespread NSA
surveillance and existing tensions between countries with rival political views.
Resentment towards the USA means that NSA surveillance is being used as a catchall argument in Internet governance discussions . Equally, stakeholders from Western
developed countries often automatically view with suspicion the different perspectives of those from
the Middle East, Russia, and China. The less-than-perfect human rights records of many of these
countries is used as unstated justification that their views on non-human rights related are somehow
less legitimate than those from more enlightened developed countries. Combine these wider political
prejudices held by stakeholders with the looming deadline to reframe the WSIS vision for the next
decade, and you end up with a significantly reduced chance of real progress in Internet governance.
Pam Little, former Senior Director of Compliance at ICANN, Australia Governments. I see governments
as a two-way sword in that trust has been breached or eroded, which in turn could undermine the
success or full potential of the Internet as an enabler and tool for innovation, e-commerce and the free
flow of information. This brings me to a related issue, the U.S. governments influence over ICANN and
control over the domain name system (through the IANA contract). To me, this is no longer appropriate
so to the extent that such legacy influence continues, it would continue to plague ICANN and ICANN
will continue to suffer a legitimacy problem Fiona Alexander Associate Administrator for
International Affairs NTIA, USA We clearly face challenges to maintain a free and open
L China censorship
States are continuing to justify internet repression and
censorship on the basis of our data collection policies. The
dangers are snowballing.
Washington Post, 2014 (Citing a Freedom House report. In the global
struggle for Internet freedom, the Internet is losing, report finds 12-4-14.
http://www.washingtonpost.com/blogs/the-switch/wp/2014/12/04/in-the-globalstruggle-for-internet-freedom-the-internet-is-losing-report-finds/)
The year 2014 marks the moment that the world turned its attention to writing laws
to govern what happens on the Internet. And that has not been a great thing,
according to an annual report from the U.S.-based pro-democracy think tank
Freedom House.
Traditionally, countries eager to crack down on their online critics largely resorted to
blocking Web sites and filtering Internet content, with the occasional offline
harassment of dissidents. But that has changed, in part because online activists
have gotten better at figuring out ways around those restrictions; Freedom House
points to Greatfire, a service that takes content blocked in mainland China and
hosts it on big, global platforms, like Amazon's servers, that the Chinese
government finds both politically and technologically difficult to block.
In the wake of these tactics, repressive regimes have begun opting for a "technically
uncensored Internet," Freedom House finds, but one that is increasingly controlled
by national laws about what can and can't be done online. In 36 of the 65 countries
surveyed around the world the state of Internet freedom declined in 2014,
according to the report.
Russia, for example, passed a law that allows the country's prosecutor general to
block "extremist" Web sites without any judicial oversight. Kazakstan passed a
similar law. Vietnam passed decrees cracking down on any critiques of the state on
social media sites. Nigeria passed a law requiring that Internet cafes keep logs of
the customers who come into their shops and use their computers.
There's a bigger worry at work, too, Freedom House says: the potential for a
"snowball effect." More and more countries, the thinking goes, will adopt these sorts
of restrictive laws. And the more that such laws are put in place, the more they fall
within the range of acceptable global norms.
Also shifting those norms? According to Freedom House, "Some states are using the
revelations of widespread surveillance by the U.S. National Security Agency (NSA)
as an excuse to augment their own monitoring capabilities, frequently with little or
no oversight, and often aimed at the political opposition and human rights
activists."
also need support of the military and security apparatus for his reforms as he takes
on vested interests in the party leadership, provincial governments and large state
enterprises, and this makes compromise with Japan more difficult. Chinese public
opinion is also hostile to Japan, evident in opinion polls, social media and the ease
with which anti-Japanese boycotts occur.
So, domestic politics as well as geopolitics are driving both China and Japan to be
more assertive, and this worries Washington. When Abe visited the controversial
Yasukuni shrine for Japanese war dead at the end of December, it not only stoked
tension with China and South Korea which issued strong protests, the United States
publicly stated it was "disappointed."
In his comments at Davos, Abe, presumably thinking of the strong trade links
between his country and China, said the economic links between Germany and
Britain did not prevent war in 1914. Some listening to the Japanese prime minister
came away with the impression he thinks pecuniary interests may not be strong
enough to deter a military clash.
If a conflict between Beijing and Tokyo were to break out, the US could not bank on
its other ally in the region, Seoul, given the tense relations between South Korea
and Japan which have their own territorial and historical disputes. So Washington
would choose between honoring its defense treaty with Japan and avoiding direct
conflict with China. As Washington would stand to lose the trust of many allies in the
region and is not noted for eating humble pie, the odds would suggest support for
Japan. So if there is any parallel with 1914, it could turn out to be in how cascading
alliance commitments can cause a wider war.
buffetedbyaseriesoftensionsandmisunderstandings .Manyofthesefrictionsappeartohaveresultedfromamore
assertiveChinesepostureintheSouthChinaSea.Almosteveryweek,Asianheadlinesseemtobedominatedbyreportsof
jingoisticstatementsoverdisputedislets,orofarenewedboutofaggressivemaneuveringbyboatsfromoneofBeijingsnumerousmaritime
agencies.WhenattemptingtoexplainthisupsurgeinChinesepugnacity,analystshavepointedtotherisingpower'sselectiveinterpretationofthe
lawoftheseaandgrowingunwillingnesstocompromiseoverwhatitcallsitsbluenationalsoil,particularlywhenconfrontedwithan
increasinglyintransigentdomesticpopulace.Othershavepointedtothemoreimmediatelytangiblebenefitstobederivedfromthepresenceof
numerousoffshoreoilandgasdepositswithincontestedwaters.Strangelyenough,however,oneoftheprincipalexplanationsforChinas
increasedpricklinesstowardsforeignmilitarypresencewithinitsmaritimebackyardhasyettobeclearlyarticulated.Indeed, notonlyisthe
SouthChinaSeaoneoftheworldsbusiesttradethoroughfares,italsohappenstobetheroamingpenof
Chinasemergingballisticmissilesubmarinefleet ,whichisstationedatSanya,onthetropicalIslandofHainan.The
UnitedStates,withitsarrayofadvancedantisubmarinewarfareassetsandhydrographicresearchvesselsdeployedthroughouttheregion,
givesBeijingtheunwelcomeimpressionthatUncleSamcantstoppeeringintoitsnuclearnursery .When
Chinesenavalstrategistsdiscusstheirmaritimeenvirons,thesentimenttheyconveyisoneofperpetualembattlement.PointingtotheUSs
extendednetworkofalliesintheIndoPacificregion,andtotheirownrelativeisolation,ChinesestrategistsfearthatBeijings
growingnavycouldbeensnaredwithinthefirstislandchainaregionwhichtheydescribeasstretchingfromJapan
allthewaytotheIndonesianarchipelago .Applyingthismaritimesiegementalitytonavalplanning;theyfretthattheUS
Navycouldlocateandneutralizetheirfledglingunderseadeterrentintheveryfirstphasesofconflict,beforeitevenmanagestoslipthroughthe
chinksoffirstislandchain.ThisconcernhelpsexplainChina'sgrowingintolerancetoforeignmilitaryactivitiesintheSouthChinaSea.
Tellingly,someofthemostnervewrackingstandoffsinvolvingUSandChineseforceshaveunfoldedincloseproximitytoHainan.The
infamousEp3crisis,duringwhichaUSspyplaneenteredintocollisionwithaChinesefighterjet,occurredwhiletheplanescrewwas
attemptingtocollectintelligenceonnavalinfrastructuredevelopment.Similarly,theUSNSImpeccableincident,duringwhichaUS
hydrographicvesselwasdangerouslyharassedbyfiveChineseships,tookplaceapproximatelyseventymilestothesouthofHainan.Duringthe
confrontation,ChinesesailorsreportedlyattemptedtounhooktheImpeccablestowedacousticarraysonars.Inpublic,China'sprotestsover
foreignmilitaryactivitiesarecouchedinterritorialterms.Inprivate,however,Chinesepolicymakersreadilyacknowledgethecentralityofthe
nucleardimension.ThusinthecourseofadiscussionwithaformerChineseofficial,Iwastoldthateventhoughterritorialissuesareof
importance,ourmajorconcernisthesanctityofourfutureseabaseddeterrent.Hethenwentontodescribe,withaflickerofamusement,how
fishermenoffthecoastofHainanregularlysnagUSsonarsintheirnets,andareencouragedtosellthembacktothelocalauthoritiesinexchange
forfinancialcompensation.Ofcourse,suchcatandmousegamesarenothingnewandareperfectlylegalprovidedtheyoccurwithin
internationalwatersorairspace.DuringtheColdWar,AmericanandSovietshipswouldfrequentlyconductforwardintelligencegathering
missions,sometimesinverycloseproximitytoeachothersshores.Atthetime,Americanthinkerscautionedthatsuch
riskybehavior
couldpotentiallyleadtomisinterpretationandnucleardisaster .UnliketheSoviets,however,whocouldconfinethe
movementsoftheirboomerstothefrigid,lonelywatersoftheBarentsandOkhotskseas,theChinesehavechosentoerecttheir
nuclearsubmarinebasesmackbanginthemiddleofoneoftheworldsbusiestmaritimehighways .
Needlesstosay,thislocationishardlyideal.Whenitcomestopickingstrategicrealestateintheirnearseas,theChinesehavebuta
limitedrosterofoptions.Afterall,theirmaritimebackyardisgirdedbyasturdypalisadeofstateswhich
increasinglyviewChinasmeteoricrise,andattendanttruculenceatsea,withamixtureofalarmand
dismay.Likeadragoncaughtflounderinginabathtub,Chinasnavalambitionsaresimplytoobroadandgrandioseforitsconstrictedmaritime
geography.ThisperceivedlackofstrategicdepthprovidesapartialexplanationtoBeijingsincreasedobduracyoverterritorialdisputesinthe
SouthChinaSea.Inordertobetterprotectitsvaluablesubsurfaceassets,Chinaaimstoestablisharingofmaritimewatchtowersorbastions
aroundHainan.AbsolutecontrolovertheremoteSpratlyislands,inadditiontothemoreproximateParacels,wouldgreatlyfacilitatethis
concentricdefensiveconfiguration.Untilnotlongago,Chinasstrategicsubmarineforcewasntreallytakenseriously.Theirlone092Xiaclass
boatwasdeemedtooantiquatedandnoisytobeanythingmorethanasymbolofBeijingsdesireforgreatpowerstatus.Someobservershad
venturedthatChinawouldbecontenttorelyalmostexclusivelyonitsrapidlymodernizinglandbasedmissilesystemforitsdeterrent.Recent
developments,however,suggestthatthismaybeabouttochange.InitslatestreporttoCongress,theUSChinaEconomicandSecurityReview
CommissionstatedthatChinacouldsoonequipitsnewclassofJinsubmarineswiththeJL2ballisticmissile,whichhasarangeof
approximately4600miles.ThiswouldenableBeijing,thereportadds,toestablishanearcontinuousatseastrategicdeterrent.Inall
likelihoodthisforcewillbeberthedatHainan.ThesecondObamaAdministrationwillthereforehavetheunenviabletaskof
dealingwithtensionsinaregionwhichisnotonlyriddledwithterritorialdivisions,butisalso rapidly
morphingintooneoftheworldsmostsensitivenuclearhotspots
this issue, but I cant seem to improve upon now-President Putins crystallization of the effort that has been afoot for quite some time. More importantly, I
think we should take President Putin very seriously. 1 Vladimir Putin, Prime Minister of the Russian Federation, Working Day, GOVT OF THE RUSSIAN
FEDN, http://premier.gov.ru/eng/events/news/15601/ (June 15, 2011) (last visited May 14, 2012). Six months separate us from the renegotiation of the
affect global economic growth and determine whether political liberty can
proliferate During the treaty negotiations, the most lethal threat to Internet freedom may not come from a full frontal assault, but through
insidious and seemingly innocuous expansions of intergovernmental powers. This subterranean effort is already under way. While influential ITU Member
States have put forth proposals calling for overt legal expansions of United Nations or ITU authority over the Net, ITU officials have publicly declared that
the ITU does not intend to regulate Internet governance while also saying that any regulations should be of the light-touch variety.2 But which is it? It is
not possible to insulate the Internet from new rules while also establishing a new light touch regulatory regime. Either a new legal paradigm will emerge
in December or it wont. The choice is binary. Additionally, as a threshold matter, it is curious that ITU officials have been opining on the outcome of the
treaty negotiation. The ITUs Member States determine the fate of any new rules, not ITU leadership and staff. I remain hopeful that the diplomatic process
will not be subverted in this regard. As a matter of process and substance, patient and persistent incrementalism is the Nets most dangerous enemy and
it is the hallmark of many countries that are pushing the pro- regulation agenda. Specifically, some ITU officials and Member States have been discussing
an alleged worldwide phone numbering crisis. It seems that the world may be running out of phone numbers, over which the ITU does have some
jurisdiction. 2 Speech by ITU Secretary-General Tour, The Challenges of Extending the Benefits of Mobile (May 1,
2012),http://www.itu.int/net/pressoffice/press_releases/index.aspx?lang=en (last visited May 29, 2012). 2 Today, many phone numbers are used for voice
over Internet protocol services such as Skype or Google Voice. To function properly, the software supporting these services translate traditional phone
numbers into IP addresses. The Russian Federation has proposed that the ITU be given jurisdiction over IP addresses to remedy the phone number
shortage.3 What is left unsaid, however, is that potential ITU jurisdiction over IP addresses would enable it to regulate Internet services and devices with
abandon. IP addresses are a fundamental and essential component to the inner workings of the Net. Taking their administration away from the bottom- up,
non-governmental, multi-stakeholder model and placing it into the hands of international bureaucrats would be a grave mistake. Other efforts to expand
the ITUs reach into the Internet are seemingly small but are tectonic in scope. Take for example the Arab States submission from February that would
change the rules definition of telecommunications to include processing or computer functions.4 This change would essentially swallow the Internets
functions with only a tiny edit to existing rules.5 When ITU leadership claims that no Member States have proposed absorbing Internet governance into the
ITU or other intergovernmental entities, the Arab States submission demonstrates that nothing could be further from the truth. An infinite number of
avenues exist to 3 Further Directions for Revision of the ITRs, Russian Federation, CWG-WCIT12 Contribution 40, at 3 (2011), http://www.itu.int/md/T09CWG.WCIT12-C-0040/en (last visited May 29, 2012) (To oblige ITU to allocate/distribute some part of IPv6 addresses (as same way/principle as for
telephone numbering, simultaneously existing of many operators/numbers distributors inside unified numbers space for both fixed and mobile phone
services) and determination of necessary requirements.). 4 Proposed Revisions, Arab States, CWG-WCIT12 Contribution 67, at 3 (2012),
http://www.itu.int/md/T09- CWG.WCIT12-C-0067/en (last visited May 29, 2012). 5 And Iran argues that the current definition already includes the Internet.
Contribution from Iran, The Islamic Republic of Iran, CWG-WCIT12 Contribution 48, Attachment 2 (2011), http://www.itu.int/md/T09-CWG.WCIT12- C0048/en (last visited May 29, 2012). 3 accomplish the same goal and it is camouflaged subterfuge that proponents of Internet freedom should watch for
most vigilantly. Other examples come from China. China would like to see the creation of a system whereby Internet users are registered using their IP
addresses. In fact, last year, China teamed up with Russia, Tajikistan and Uzbekistan to propose to the UN General Assembly that it create an
International Code of Conduct for Information Security to mandate international norms and rules standardizing the behavior of countries concerning
information and cyberspace.6 Does anyone here today believe that these countries proposals would encourage the continued proliferation of an open
and freedom-enhancing Internet? Or would such constructs make it easier for authoritarian regimes to identify and silence political dissidents? These
proposals may not technically be part of the WCIT negotiations, but they give a sense of where some of the ITUs Member States would like to go. Still
other proposals that have been made personally to me by foreign government officials include the creation of an international universal service fund of
sorts whereby foreign usually state-owned telecom companies would use international mandates to charge certain Web destinations on a per-click
basis to fund the build-out of broadband infrastructure across the globe. Google, iTunes, Facebook and Netflix are mentioned most often as prime sources
the U.S. and like-minded proponents of Internet freedom and prosperity across the globe should resist efforts
to expand the powers of intergovernmental bodies over the Internet 6 Letter dated 12 September
of funding. In short,
2011 from the Permanent Representatives of China, the Russian Federation, Tajikistan, and Uzbekistan to the United Nations addressed to the SecretaryGeneral, Item 93 of the provisional agenda - Developments in the field of information and telecommunications in the context of international security, 66th
Session of the United Nations General Assembly, Annex (Sep. 14, 2011),
http://www.cs.brown.edu/courses/csci1800/sources/2012_UN_Russia_and_China_Code_o_Conduct.pdf (last visited May 29, 2012). 4 5 even in the smallest
of ways. As my supplemental statement and analysis explains in more detail below,
devastating to global economic activity , but it would hurt the developing world
the most.
Thank you for the opportunity to appear before you today and I look forward to your questions. * * * FCC Commissioner Robert M.
McDowell Supplemental Statement and Analysis May 31, 2012 Thank you, Chairman Walden and Ranking Member Eshoo, for holding this hearing. Its topic
is among the most important public policy issues affecting global commerce and political freedom: namely, whether the International Telecommunication
Union (ITU), or any other intergovernmental body, should be allowed to expand its jurisdiction into the operational and economic affairs of the Internet. As
we head toward the treaty negotiations at the World Conference on International Telecommunications (WCIT) in Dubai in December, I urge governments
around the world to avoid the temptation to tamper with the Internet. Since its privatization in the early 1990s, the Internet has flourished across the world
under the current deregulatory framework. In fact, the long-standing international consensus has been to keep governments from regulating core
functions of the Internets ecosystem. Yet, some nations, such as China, Russia, India, Iran and Saudi Arabia, have been pushing to reverse this course by
giving the ITU or the United Nations itself, regulatory jurisdiction over Internet governance. The ITU is a treaty-based organization under the auspices of
the United Nations.1 Dont take my word for it, however. As Russian Prime Minister Vladimir Putin said almost one year ago, the goal of this well-organized
and energetic effort is to establish international control over the Internet using the monitoring and supervisory capabilities of the [ITU]. 2 Motivations of
some ITU Member states vary. Some of the arguments in support of such actions may stem from frustrations with the operations of Internet Corporation
for Assigned Names and Numbers (ICANN). Any concerns regarding ICANN, however, should not be used as a pretext to end the multi-stakeholder model
that has served all nations especially the developing world so well. Any reforms to ICANN should take place through the bottom-up multi-stakeholder
process and should not arise through the WCITs examination of the International Telecommunication Regulations (ITR)s. Constructive reform of the ITRs
may be needed. If so, the scope of any review should be limited to traditional telecommunications services and not expanded to include information
services or any form of Internet services. Modification of the current multi- stakeholder Internet governance model may be necessary as well, but we
should all work together to ensure no intergovernmental regulatory overlays are placed into this sphere. Not only would nations surrender some of their
national sovereignty in such a pursuit, but they would suffocate their own economies as well, while politically paralyzing engineering and business
decisions within a global regulatory body. 1 History, ITU, http://www.itu.int/en/about/Pages/history.aspx (last visited May 14, 2012). 2 Vladimir Putin, Prime
Minister of the Russian Federation, Working Day, GOVT OF THE RUSSIAN FEDN, http://premier.gov.ru/eng/events/news/15601/ (June 15, 2011) (last visited
May 14, 2012). Every day headlines tell us about industrialized and developing nations alike that are awash in debt, facing flat growth curves, or worse,
Not only must governments, including our own, tighten their fiscal belts, but they
must also spur economic expansion. An unfettered Internet offers the brightest ray
of hope for growth during this dark time of economic uncertainty, not more
regulation. Indeed, we are at a crossroads for the Internets future. One path holds
great promise, while the other path is fraught with peril. The promise , of course, lies with
keeping what works, namely maintaining a freedom-enhancing and open Internet
while insulating it from legacy regulations . The peril lies with changes that would ultimately sweep up Internet services
shrinking GDPs.
into decades-old ITU paradigms. If successful, these efforts would merely imprison the future in the regulatory dungeon of the past.
The
A
balkanized Internet would not promote global free trade or increase living
standards. At a minimum, it would create extreme uncertainty and raise costs for all users
across the globe by rendering an engineering, operational and financial morass. For
the current successful model and those Member States who decide to opt out to place themselves under an intergovernmental regulatory regime.
instance, Harvard and the Massachusetts Institute of Technology (MIT) recently announced placing many of their courses online for free for anyone to
uncertainty
use. The
and economic and engineering chaos associated
9 Cisco Visual Networking
Index: Global M obile Data Traffic Forecast Update, 2011-201 6 , CISCO, at 3 (Feb. 14, 2012),
http://www.cisco.com/en/US/solutions/collateral/ns341/ns525/ns537/ns705/ns827/white_paper_c11- 520862.pdf (last visited May 24, 2012). 10 McKinsey
Aspiring Countries Report at 1. 11 Id. at 3-4, 23. 12 Id. at iv, 4, 23. And 73 percent of Internet users do not speak English as a first language. Id. at iv. 13 Id.
at 2, 8-9, 26-27. 14 Id. at 2. 15 Id. at v. 16 McKinsey Global Institute, Internet Matters: The Nets Sweeping Impact on Growth, Jobs, and Prosperity , MCK
INSEY & CO., at 3, 21 (May 2011), http://www.mckinsey.com/Insights/MGI/Research/Technology_and_Innovation/Internet_matters (last visited May 24,
impressive run , one that has averted partisan politics and lobbyists and helped
keep the Internet as a free platform.
I think that our losing such a leadership role is a mistake for the U nited
S tates and the principles of Net Neutrality. Yet in the spirit of compromise, I
commend Obama for taking a stand within our borders. Now he needs to take
the next step.
The hope I have is that whatever new governance structure emerges for
ICANN in 2015 turns into a United Nations of Internet protection where the entire
world has access to a free Internet. However, if the new structure cannot guarantee
Net Neutrality, then I believe the U.S. government should revoke its decision to
relinquish leadership. The risk is too great and the ramifications too
frightening to idly stand by and allow any other conclusion.
of State Hillary Rodham Clinton urged countries to join us in the bet we have made,
a bet that an open Internet will lead to stronger, more prosperous countries.13
Given the evidence we discuss throughout this report, this bet is one worth making.
2AC
A2 Terror DA
NSA bulk internet data collection techniques impeded our
ability to fight the war on terror 4 key reasons.
Danielle Kehl, et.al (with Kevin Bankston, Robyn Greene & Robert Morgus) New
Americas Open Technology Institute July 2014 Policy Paper Surveillance Costs: The
NSAs Impact on the Economy, Internet Freedom & Cybersecurity
https://www.newamerica.org/downloads/Surveilance_Costs_Final.pdf
Given the amount of information the NSA is collecting, it is not surprising that the
agency would also take aggressive steps to improve its ability to read that
information. According to the black budget released by The Washington Post in
August 2013, 21 percent of the intelligence budget (roughly $11 billion) goes toward
the Consolidated Cryptologic Program, with a staff of 35,000 in the NSA and the
armed forces surveillance and code breaking units.237 The resources devoted to
signals intercepts are extraordinary, wrote Barton Gellman and Greg Miller.238
However, the agency has employed a variety of methods to achieve this goal far
beyond simple code-breakingmethods that directly undermine U.S. cybersecurity,
not just against the NSA, but also against foreign governments, organized crime,
and other malicious actors. In this section, we consider four different ways that the
NSA has damaged cybersecurity in pursuit of its signals intelligence goals: (1) by
deliberately engineering weaknesses into widely-used encryption standards; (2) by
inserting surveillance backdoors in widely-used software and hardware products; (3)
by stockpiling information about security vulnerabilities for its own use rather than
disclosing those vulnerabilities so that they can be remedied; and (4) by engaging
in a wide variety of offensive hacking techniques to compromise the integrity of
computer systems and networks around the world, including impersonating the web
sites of major American companies like Facebook and LinkedIn.
and iCloud. These are not the services that truly dangerous elements typically use.
A few weeks ago, National Security Agency whistleblower Edward Snowden leaked
documents diagramming the existence of a program called PRISM. Supposedly this
program enabled the NSA to tap into the content of communications from the major
tech giants but only specific information and only if they had a court order, NSA
officials later claimed. Later, when Congress pressed for information and
justification for such a program, NSA director Keith Alexander claimed they had
stopped 50 terrorist acts, 10 of which were aimed at the U.S. Former vice president
Dick Cheney raised the stakes, asserting PRISM could have stopped 9/11. Dubious
claims at best. There are multiple platforms and methods to avoid the higher, more
visible side of the Internet. Even Bin Laden was smart enough to use a courier and
hand written notes to give orders. The real terrorist planners prefer to "remain in
the undernet," writes Bershidsky. From Bloomberg: In 2012, a French court found
nuclear physicist Adlene Hicheur guilty of, among other things, conspiring to
commit an act of terror for distributing and using software called Asrar alMujahideen, or Mujahideen Secrets. The program employed various cutting-edge
encryption methods, including variable stealth ciphers and RSA 2,048-bit keys. A
mathmetician found out when he hacked into Google last year that they were only
using 512 bit keys for their email communications. Likely they've upgraded, but the
anecdote goes to show just how sophisticated terrorist planners can get. Earlier this
year we covered an element of the undernet called "Tor." Certainly the paranoid
upper echelons of Al Qaeda would use this side-road rather than the general
Internet super highway. Those aren't the only options either when it comes to
avoding PRISM. "At best," writes Bershidsky, "the recent revelations concerning
Prism and telephone surveillance might deter potential recruits to terrorist causes
from using the most visible parts of the Internet."
metadata, which includes the telephone numbers that originate and receive calls,
as well as the time and date of those calls but not their content, under Section 215
of the USA PATRIOT Act, appears to have played an identifiable role in initiating, at
most, 1.8 percent of these cases. NSA programs involving the surveillance of nonU.S. persons outside of the United States under Section 702 of the FISA
Amendments Act played a role in 4.4 percent of the terrorism cases we examined,
and NSA surveillance under an unidentified authority played a role in 1.3 percent of
the cases we examined.
any particular American. But it surely does have probable cause to investigate any American who makes a call to
Yemen at 11 a.m., Sanaa time, hangs up after a few seconds, and then gets a call from a different Yemeni number
search them for patterns like this one. But that would be very expensive, and its effectiveness would really only be
as good as the weakest, least cooperative carrier. And even then
real-time information sharing -- any reasonably intelligent U.S.-based terrorist would just
The only way to
make the system work, and the only way to identify and monitor the one American
who was plotting with al Qaeda's operatives in Yemen, would be to pool all the carriers'
data on U.S. calls to and from Yemen and to search it all together -- and for the costs to be borne by all of us,
buy his first throwaway phone from one carrier and his second phone from a different carrier.
not by the carriers. In short, the government would have to do it. To repeat, this really is hypothetical; while I've had
clearances both as the NSA's top lawyer and in the top policy job at the Department of Homeland Security, I have
it's not
that hard to imagine circumstances in which the government needs to obtain
massive amounts of information about Americans yet also needs to remain bound
by the general rule that it may only monitors those whom it legitimately suspects of
being terrorists or spies. The technique that squares that circle is minimization . As
not been briefed on this program. (If I had, I wouldn't be writing about it.) But the example shows that
from arbitrary searches. In the standard law enforcement model that we're all familiar with, privacy is
protected because the government doesn't get access to the information until it presents evidence to the court
sufficient to identify the suspects. In the alternative model, the government gets possession of the data but is
prohibited by the court and the minimization rules from searching it until it has enough evidence to identify terror
risk that it will break the rules -- even rules enforced by a two-party, three-branch system of checks and balances.
When I first read the order, even I had a moment of chagrin and disbelief at its sweep. But for those who don't like
Aligning with the findings of a review committee appointed by the White House, a
report published Monday from the New America Foundation found that the NSAs
bulk collection of phone data has not prevented terror attacks.
NAF carried out an in-depth analysis of 225 individuals recruited by al-Qaida or a
like-minded group or inspired by al-Qaedas ideology, and charged in the United
States with an act of terrorism since 9/11. The study found that traditional
investigative methods, such as the use of informants, tips from local communities,
and targeted intelligence operations, provided the initial impetus for investigations
in the majority of cases, while the contribution of NSAs bulk surveillance programs
to these cases was minimal.
The think tanks conclusions are strong, challenging government claims that
metadata collections of U.S. telephonic communications is necessary to national
security:
Surveillance of American phone metadata has had no discernible impact on
preventing acts of terrorism and only the most marginal of impacts on preventing
terrorist-related activity, such as fundraising for a terrorist group. Furthermore, our
examination of the role of the database of U.S. citizens telephone metadata in the
single plot the government uses to justify the importance of the program that of
Basaaly Moalin, a San Diego cabdriver who in 2007 and 2008 provided $8,500 to alShabaab, al-Qaedas affiliate in Somalia calls into question the necessity of the
Section 215 bulk collection program.
The findings of the NAF and the White Houses NSA advisory committee not only call
into question NSA practices brought to light by Edward Snowden. They highlight the
ease with which the administration has been willing to deceive the American public
about the necessity of surveillance dragnets. NSA officials had claimed that phone
data collections had been necessary in thwarting as many as 54 terror plots. NSA
director Keith Alexander was forced to admit that the figure was fabricated during a
congressional hearing. At best, one case can be used in support of the efficacy of
phone data hoarding for preventing terror plots.
While the official party line, repeated ad nauseum, is that the NSA surveillance
program has helped stop "dozens" of terrorist attacks, a closer look at the claims
made by the White House and the program's defenders cast serious doubt about
the program's actual effectiveness. In a recent congressional hearing, Senators
Mark Udall and Ron Wyden released a joint statement calling on NSA head General
Keith Alexander "Emperor Alexander" of the covert national security state to
be more forthcoming about the surveillance program. The senators argue that the
attacks Alexander claims were thwarted "appear to have been identified using other
collection methods. The public deserves a clear explanation. They also could have
been one of the FBI's many, many "terrorism" sting operations. Washington's Blog
cites numerous sources including an NSA veteran, Fortune Management, Wired,
and constitutional and military law expert Jonathan Turley which show that the
NSA PRISM program, and other Orwellian surveillance programs, are useless and
ineffective, resulting in false information and are actually hindering the process of
good police work and intelligence gathering. It didn't stop the Boston Bombing or
9/11 either. Apparently the more eyes Big Brother has, the less he actually sees.
The surveillance state is, after all, a massive centrally-planned government
bureaucracy so one shouldn't be surprised by incompetence. Do we really want to
entrust the government this type of surveillance power "to keep us safe" when it
doesn't even know who it's killing with drone strikes? But if surveillance programs
are largely ineffective, why do they exist? Like virtually all government restrictions
on liberty, especially ones as sweeping as the PATRIOT Act and PRISM, the desire for
more intrusive control lies at the heart of any state's power. Dissent against the
welfare-warfare state is growing, and any ideological threat to this institutionalized
plunder is met with far more attention than, say, prosecuting rape in the military.
Cynical? Perhaps. But what does it say when the likes of Senator Dianne Feinstein,
House Speaker John Boehner and former Vice President Dick Cheney all call Edward
Snowden a "traitor" for leaking information about the NSA spy program to the
public? Treason is defined in the Constitution as giving "aid and comfort" to the
enemy. According to this Washington "bipartisan consensus" of accepted political
thought, "the enemy" Snowden aided are Americans and anyone around the world
sympathetic to civil liberties, privacy and the rule of law. If Snowden is a traitor,
then I don't want to see what a patriot looks like. They know that the more truth
comes out about the national security state that permeates American society like a
cancer, the more Americans will likely be outraged and demand answers they don't
have. This is why the Obama administration is waging such a ruthless war on
whistleblowers. This is nothing new, however, in even America's short history. The
first whistleblower against the domestic police state was illegally detained and
deported, Wilson and FDR tightened the screws, and the 1947 National Security Act
in which President Truman wanted "to scare the hell out of the American people"
entrenched the national security state. The "war on terror" has built and
expanded upon these previous encroachments of liberty and is now used to
predictably smear the messenger and fear-monger to justify this level of secrecy
and surveillance. As a result, we have sacrificed so much liberty in the name of
professed security, and have neither. Given that you are eight times more likely to
killed by the state than by a terrorist a threat that is compounded by such a
reckless, lawless and militaristic foreign policy a government that has
there. The open case is founded upon a series of emails exchanged between a
Pakistani registered email account sana_pakhtana@yahoo.com and an email
account admittedly used by Naseer humaonion@yahoo.com between 30 November
2008 and 3 April 2009. The Security Services assessment is that the user of the
sana_pakhtana account was an Al Qaeda associate Therefore, this information
was obtained even before Zazi was a suspect in any kind of terror plot. PRISM was
not responsible. But as we have seen in the past, this administration will keep on
trotting out lie after lie in an effort to keep anyone from knowing what they were
really up to. Now, let me tell you why I firmly believe PRISM was not about catching
terrorists, although they may have used it as such at one time or another. Heres my
scenario. A young Muslim travels from the US to Russia, where he is radicalized. The
Russians contact the US and the FBI investigates the young man. If PRISM were truly
a tool to catch terrorists, would they not have gone into their massive collection of
data and listened to his phone calls and read his emails. And armed with that
monitor the mosque he attended. Perhaps even listened to his rant in favor of Jihad.
Had any of this had been done, he would not have been able to, with the help of his
brother, bomb the Boston Marathon. This was the textbook case for PRISM as a tool
to fight terrorism. Yet, it was never used. maybe they were too busy visiting Ted
Nugent?
helped foil a plot or expose a conspirator but one of the ones he listed was the
subway plot. Nor has any other evidence been advanced by anyone to show that
metadata gathering was critical in stopping any plots. But what is known is that
thousands of Americans died to bankroll this questionable surveillance.
make sure we connect the dots so that the nation is never attacked again like it was
on 9/11," and "I much prefer to be here today explaining these programs than
explaining another 9/11 event that we were not able to prevent," Al Jazeera
revealed. But even though the attack on the World Trade Center was used as
justification for expanding the intelligence community's powers in the first place,
the new report suggests that the 9/11 hijackers didn't succeed by totally blindsiding
the US, but because the government bungled the early warnings. "The overall
problem for US counterterrorism officials is not that they need the information from
the bulk collection of phone data, but that they dont sufficiently understand or
widely share the information they already possess that is derived from conventional
law enforcement and intelligence techniques," wrote New American Foundation
National Security Director Peter Bergen. Now it's over a decade later and the US
government has backdoor access into basically the entire digiverse, with no
evidence to prove the dubious data collection is doing anything at all useful. Last
month, Obama's advisory panel determined the agencys spy operations are "not
essential to preventing attacks," and handed him 46 recommendations for
reforming the programs. Unfortunately, sources say the president has embraced the
terrorism justification and isnt expected to make any major moves to narrow the
scope of domestic surveillance, just call for minor changes to reassure Americans
that their civil liberties aren't being trampled.
There are sensible reforms that can significant limit the collateral damage to privacy
caused by Section 702 without impeding national security. Limiting the purposes for
which Section 702 can be conducted will narrow the degree to which
communications are monitored between individuals not suspected of wrongdoing or
connected to national security threats. Closing retention loopholes present in the
Minimization Guidelines governing that surveillance will ensure that when
Americans communications are incidentally collected, they are not kept absent
national security needs. And closing the backdoor search loophole would ensure
that when Americans communications are retained because they communicated
with a target of Section 702 surveillance, they couldnt be searched unless the
standards for domestic surveillance of the American are met.
and Mark
collection] programs played the kind of central role in these cases that
officials have said, said Michael German, a lawyer and former undercover FBI agent who now works for
the American Civil Liberties Union. Since contract computer technician and self-proclaimed whistleblower Edward
Snowden revealed the existence of two huge top-secret NSA data-gathering programs this month, officials have
struggled to justify them to the public without worsening the damage they say the revelations have caused to
national security. This week, intelligence officials at a rare public hearing told the House Permanent Select
Committee on Intelligence that more than 50 terrorist plots, 10 to 12 of which involved a target in the U.S., had
been foiled using intelligence from at least one of the NSA programs. One of them, which uses a computer system
called Prism to get real-time access to electronic communications carried by U.S. Internet and technology
companies, is authorized under Section 702 of the Foreign Intelligence Surveillance Act (FISA) amendments of 2008.
Prism, which allows the NSA to eavesdrop on email and text messages, as well as Internet telephone and video chat
services such as Skype, is used only against targets reasonably believed to be foreigners outside the U.S., officials
say. They acknowledge that some Americans communications are collected inadvertently because they are in
touch with targeted suspects. But there has been more concern about the second program exposed by Mr.
Snowden, which is authorized under Section 215 of the USA Patriot Act, a large suite of anti-terrorism laws passed
hurriedly in the wake of the Sept. 11, 2001, terrorist attacks. Under this program, the NSA collects so-called
metadata time, duration and destination number about every telephone call made in the U.S. Officials told the
House intelligence committee that the data helped them identify contacts between terrorists abroad and their
associates in the U.S. But even FBI Director Robert S. Mueller III acknowledged Wednesday that this huge NSA
database of domestic phone calls was only a contributing factor; one dot amongst a number of dots, in many of
the 10 to 12 cases involving a planned attack in the U.S. The one case that he said wholly relied on the program
was a 2003 probe that began after a tipoff about a San Diego-based supporter of al-Shabab, a Somali terrorist
group with links to al Qaeda. We closed the investigation down, said Mr. Mueller, explaining that agents were
unable to find evidence of a terrorist connection. In 2007, the NSA gave the FBI a phone number in San Diego that
they said had been in contact with a phone in East Africa they were monitoring. They could not tell what calls were
made to that telephone line in East Africa, said Mr. Mueller. And consequently, they took that number, ran it
against the database and came up with this telephone number in San Diego. Officials then had to go through the
additional legal process to get the name of the phone subscriber, ensure that there was predication, meaning
sufficient grounds to open a full federal investigation, and obtain a warrant for a wiretap. On the basis of that
surveillance, four men were convicted this year of fundraising for al-Shabab. That is one case where you have
[Section] 215 [data-gathering authority] standing by itself, Mr. Mueller told Senate Judiciary Committee Chairman
Patrick J. Leahy, Vermont Democrat. But Mr. Wyden and Mr. Udall, the two Democrats who have seen classified
information about the cases, said Mr. Mueller and other officials were giving credit to Section 215 domestic
collection for foiling plots that actually were thwarted using foreign intelligence programs such as Section 702.
accused Fort Hood shooter Maj. Nidal Hasan as a jihadist called the case
a stark example of the impact of the data explosion. The exponential growth in the amount of electronically
stored information is a critical challenge to the FBI, the commission concluded. Also Thursday, the FBI
acknowledged that Deputy Director Sean Joyce misspoke this week in describing to lawmakers details about
another of those four cases, involving a Kansas City man called Khalid Ouazzini. Mr. Ouazzini was placed under
court-ordered surveillance by the FBI after the NSA discovered he had been in email contact with a terrorist suspect
in Yemen, Mr. Joyce said. He added that the surveillance uncovered a nascent plot to bomb the New York Stock
Exchange. Was the plot serious? he was asked. I think the jury considered it serious, since they were all
convicted, he replied. But an FBI official acknowledged Thursday that Mr. Ouazzini and two associates in New York
had merely pleaded guilty to lesser charges of money laundering or providing support to terrorist groups.
Nevertheless, the official defended that case as an example of the programs success regardless of the specific
convictions ultimately achieved. We stand behind the example that was provided, he said. Nonetheless, doubts
continued to surface about the other two cases as well. In the case of David Headley, the Pakistani-American
charged with aiding the 2008 Mumbai terrorist attack, the ACLUs Mr. German said the FBI had received no fewer
than five separate tipoffs that he was visiting terror training camps two of them from his ex-wives. Authorities
said Headley was planning an attack on the Danish newspaper that printed multiple satirical cartoons of Islams
Prophet Muhammad when the NSA program enabled officials to catch up to him. The most serious attack officials
say was thwarted was Najibullah Zazis attempt to bomb the New York subway. Zazi was caught because his al
Qaeda handler in Pakistan was emailing him from the same Yahoo account that he had used to communicate with a
British-based terrorist cell broken up the previous year, official said.
Feinstein et al. took to the Sunday talk shows, many hadalready raised
credible doubts about the necessity of PRISM in the Zazi investigation,
including Adam Goldman, who co-bylined today's AP story: Which brings
us to the Associated Press takedown.
did use PRISM to capture the incriminating missive, but here's the thing:
they didn't have to. Although 2007 and 2008 laws gave the FBI the goahead to monitor email accounts linked to known terrorists without a
warrant, investigators would have easily gotten a warrant to monitor the
account in question anyway : "To get a warrant, the law requires that the government show that the
target is a suspected member of a terrorist group or foreign government, something that had been well established
at that point in the Zazi case."
: the ACLU
filed suit against the NSA on Tuesday, claiming that the programs violate the First and Fourth amendments, along
with Section 215 of the Patriot Act itself. Or, they could mount their new defense in response to one of the other
pending lawsuits against them for PRISM-like programs, like the two pending lawsuits filed by the Electronic Frontier
Foundation before last week's news even broke.
A2 Politics
NSA surveillance unpopular with republicans 2 to 1 margin
Lee 13 (Timothy B. Lee, senior editor at Vox, former writer for Washington Post,
Ars Technica, and Forbes, Poll: Republicans hate NSA spying. Democrats are
ambivalent., The Washington Post, June 12, 2013,
http://www.washingtonpost.com/blogs/wonkblog/wp/2013/06/12/poll-republicanshate-nsa-spying-democrats-are-ambivalent/) Wang
A majority of Americans, 53 percent, disapprove of two National Security Agency
surveillance programs whose existence was reported last week. A Gallup poll found that just 37
percent approved of the NSA's efforts to "compile telephone call logs and Internet communications."
Interestingly,
with Democrats more likely to approve. In contrast, a Pew/Washington Post survey found that a majority of voters
approved of surveillance when told that the programs were supervised by the courts and intended to "investigate
terrorism."
privacy marks a key feature of public assessments, representing a break from similar debates during George W.
Bush's presidency. A July Washington Post-ABC News poll before the latest disclosures reported by The Post
found
NSA's phone and Internet surveillance program intrudes on some Americans' privacy
rights. What's more, Democrats and Republicans who did see intrusions were about equally
likely to say they were "not justified:" 51 and 52 percent respectively. Nearly six in 10
political independents who saw intrusions said they are unjustified . There was less
partisan agreement in 2006, when news about the George W. Bush administration's warrantless wiretapping
program broke. That January, a Post-ABC poll found 73 percent of Democrats but only 50 percent of Republicans
said federal agencies were intruding on some Americans' privacy rights.
USA Freedom is the most significant national surveillance reform in the last
30 years, said Harley Geiger, advocacy director and senior counsel at the Center for Democracy and
Technology. It demonstrates that the era of rubber stamping mass surveillance is over. Several other
groups including the American Civil Liberties Union, the Internet Infrastructure
Coalition, and the Open Technology Institute expressed similar sentiments. Were
celebrating because, however small, this bill marks a day that some said could
never happen a day when the NSA saw its surveillance power reduced by
Congress, the Electronic Frontier Foundation wrote. But most reform groups also noted that the
Freedom Act leaves unchanged many other controversial surveillance practices. For
instance, the Freedom Act does not change a FISA provision referred to as Section
702, which the government has used as its authority to conduct extensive
surveillance on online communications. The government has cited Section 702 as its authority for
NSA quiz.
programs like PRISM for collecting huge quantities of data directly from servers and networks belonging to several
Internet giants including Google, Microsoft, Yahoo, and Facebook.
USA
Freedom Act is definitely not the last word. Whenever a program expires or whenever funding is
required, those are must-pass pieces of legislation that present opportunities for
refinement, Massie told the Guardian on Tuesday. Lofgren and another civil libertarian, Republican Ted
Poe of Texas, will propose an amendment to the same appropriations bill that would
block the Federal Bureau of Investigation from inserting vulnerabilities into
encryption on mobile devices. The FBI director, James Comey, is currently campaigning against tech
companies that are expanding encryption for their commercial products. Privacy is a constitutional
right, whether the FBI likes it or not, Poe told the Guardian on Tuesday. Another congressional privacy advocate,
Democrat Jared Polis of Colorado, will push a further amendment to the appropriations bill
that would in effect block the Drug Enforcement Agency from collecting Americans
phone data in bulk a recently exposed surveillance program that preceded the
NSAs now-shuttered bulk collection. The Guardian has acquired the text of all these
amendments. Polis told the Guardian he wanted to rein in the DEAs unwarranted and unconstitutional
program, calling the Freedom Act the beginning of a reform process, not the conclusion
of one.
Google has been investigated by government officials for promoting its own
products in search results above competitors' and has been revealed as one of
Washington's biggest lobbyists. Subpar labor conditions and worker suicides at Apple's factories
have made headlines. Amazon has been getting bad press lately for the abominable conditions in its
warehouses and for bullying publishers to get more favorable terms, making it impossible or difficult
for customers to purchase certain titles. The list goes on. Meanwhile, these companies keep
expanding, buying up competition and staking their claim on new technological frontiers, from mobile
messaging and virtual reality to home appliances and transportation. As an independent documentary
filmmaker and activist, I'm dependent on new technologies and aware of their potential; in many ways,
I'm a prime candidate for championing the digital revolution. But like a growing number of my fellow
citizens, I'm worried that we've taking the wrong turn on the road to the future, which is
Look
around and it's clear that we are not seeing a revolution but a rearrangement, with
why I wrote my book The People's Platform: Taking Back Power and Culture in the Digital Age.
architectural, economic, and social hierarchies warping the web and many of the problems of the old
model--centralization, consolidation, and commercialization--perpetuated and even intensified online.
It turns out the old dinosaurs are adapting to digital life just fine. Legacy media companies like Disney,
Time Warner, and CBS are doing great; their share prices rising. At the same time, a new crop of
behemoths has emerged: Apple, Amazon, Facebook, and Google are now some of the biggest
companies on earth. Google, Facebook, and many other major social platforms, are dependent on the
advertising dollar. Only they are far more ubiquitous and invasive. They monitor our private
thoughts and track our every move, sucking up our personal data in order to better
serve marketers, who are the real paying customers. "Surveillance is the business
model of the Internet," as technologist Bruce Schneier has said, and the NSA and
other state agencies piggyback on these private sector practices. To put things in
perspective, Disney didn't read your diary and your mail or follow you around the mall. For too long
we've been talking about what the Internet might hypothetically do. But the fact is that
technologies do not emerge in a vacuum; economic forces in particular shape the evolution of
our tools. In an age of increasing inequality and diminishing democracy, this is a
major cause for concern. Our communications system is at a crossroads -- one path
leading to an increasingly corporatized and commercialized world where we are
treated as targeted consumers, the other to a true cultural commons where we are
nurtured as citizens and creators. A more open and egalitarian media system is
possible, but technology alone will not bring it about.
Politico (http://www.politico.com/story/2015/01/tech-lobby-apple-amazon-facebook-google-
Apple, Amazon and Facebook shelled out record amounts to influence Washington; Google posted one of its biggest
lobbying years ever; and a slew of new tech companies dipped their toes into politics for the first time in 2014 a
sign of the industrys deepening effort to shape policymaking in D.C. The sharp uptick in
spending
into a
said Ryan Triplette, a Republican lobbyist for Franklin Square Group, which
represents companies like Apple and Google. They began opening up their view as their businesses have grown
and not just looking at traditional technology issues. Apple, which mostly avoided D.C. under the watch of late CEO
Steve Jobs, grew its lobbying balance sheet to just over $4.1 million last year from $3.3 million in 2013, according to
from around $3.5 million in 2013 correspond with the companys own Washington makeover. The e-commerce
last year jumped into new lines of business, expanding its pursuit of
government contracts while eyeing a new drone delivery service, prompting it to
hire a slew of new lobbyists and move to a bigger downtown D.C. office. Amazon is also fighting the
giant
Federal Trade Commission over how it handled app purchases made by kids. Apple, Amazon and Google declined to
comment on the record. Facebook did not reply to a request for comment. For all their efforts,
these tech
have already
patent litigation reform a critical issue for tech companies like Google
that want to curb lawsuits from so-called patent trolls. Theres also talk of boosting the number of foreign highskilled workers, something industry titans have coveted as part of broader immigration reform. The looming
expiration of key Patriot Act surveillance authorities means Congress must also wade back into the fight over what
data the NSA can collect a major issue for tech companies stung by Edward Snowdens leaks about the agencys
spying via popular Internet services. And lawmakers are plugging into new issues like drones and wearable
technology that are important to Silicon Valley. No doubt, Internet and tech companies are a bigger and more
important part of the economy period. Its natural theyre going to be more involved in the political process, said
Ed Black, president of the Computer and Communications Industry Association, a trade group whose members
include Amazon, Facebook and Google.
not only do
they have to
be more actively involved because they have to fight off hostile efforts.
Google is the leader of the tech pack when it comes to lobbying: The company, which until October owned Motorola
Mobility, spent more than $17 million in 2014 its second-most expensive year after 2012, when it battled back a
federal antitrust investigation. The search giants D.C. operation, led by former GOP Rep. Susan Molinari, relocated
last year to a new, sprawling 54,000-square-foot office steps from the Capitol. Facebook, for its part, spent more
than $9.3 million in 2014, up from $6.4 million in 2013. The companys most recent lobbying report points to its
work on privacy and security issues along with Internet access and trade, as Facebook aims to expand its service
worldwide and avoid foreign rules that might restrict where it stores user data.
a major player in the emerging sector of connected home devices,
photo messages,
new consultants from the firm Heather Podesta + Partners after a major data breach registered on Washingtons
radar. Other prominent tech companies retained new help, as well. Netflix grew its lobbying roster amid the fight at
the FCC over net neutrality. And Uber added D.C. lobbyists to win new allies for its ride-hailing app, which has
triggered fights with state and local regulators and cab operators nationwide. And a coalition of tech titans like
Apple, Google and Microsoft banded together to invest in an anti-NSA snooping coalition, Reform Government
Surveillance, which spent $230,000 in 2014.
on its efforts
to win favor with lawmakers , up 17 percent over the same period last year (but
down from roughly $5.3 million last quarter). Among major tech-related companies only
Comcast spent more last quarter . The cable giant, of course, is trying to win
approval for its $45 billion
2014, though
mega merger with Time Warner Cable. Over the first nine months of
, Google has spent $13 million on lobbying, more than any other tech
company. Comcast, by comparison, has spent about $11.8 million, AT&T has doled
out roughly $11 million, and Facebook has spent $7.35 million. Google's ramped up
spending over the last quarter relative to the same period in 2013 makes it a bit of an outlier in the tech sector.
Nine of the 15 tech companies monitored by Consumer Watchdog, an advocacy group, dialed back their lobbying
spending last quarter compared to the third quarter of 2013. Facebook was among the
that
six
Companies ]
increased their lobbying efforts , upping third-quarter spending 70 percent, from $1.44
million last year to $2.45 million this year. Amazon's lobbying bill, at $1.18 million, reached seven figures in a
quarter for just the second time, as the retailer upped third-quarter lobbying by 51 percent over 2013. What are the
tech giants buying with that money? "
think that they're going to get something for it ," says John M. Simpson of Consumer
Watchdog. "Sometimes it's as much about what isn't being passed as what is being passed." Google's most recent
filing indicates it has lobbied politicians on a host of issues, from cybersecurity and privacy issues to intellectual
property enforcement and patent law. It has also lobbied lawmakers on trade agreements like the Trans-Pacific
Partnership, international tax reform, immigration policies, wind power, health IT and data policies, and "unmanned
aerial vehicle technology," or drones.