Polished Neg Ev

download Polished Neg Ev

of 26

Transcript of Polished Neg Ev

  • 8/10/2019 Polished Neg Ev

    1/26

    BROWN SCHOOL DEBATE

    BROWN BD

    NCFL 2K14 1

    NEG

    Contents

    Case Construction ......................................................................................................................................... 2

    4 Facets of Privacy ........................................................................................................................... 4

    When privacy is dismantled ............................................................................................................. 5

    The term security is used to eliminate the threats they have created............................................ 6

    The term terror is a rhetorical tool .................................................................................................. 7

    Terror is a word manipulated to benefit the oppressors actions .................................................... 8

    (Rebuttal)Defeats purpose of why this country was founded .................................................................... 9

    Infringes on Autonomy .................................................................................................................. 10

    Loss of privacy creates and perpetuates power disparities. ......................................................... 11

    Terrorism is not severe enough to justify NSA surveillance .......................................................... 12

    NSA Surveillance is Inefficient........................................................................................................ 14

    NSA surveillance lends itself to use in unethical persuasion ......................................................... 15

    Unauthorized collection frequently occurs ................................................................................... 16

    The right to privacy is eroding ....................................................................................................... 17

    Collecting phone records inefficient .............................................................................................. 18

    The NSA fails to differentiate between foreign and American content ........................................ 19

    The NSA is only held nominally accountable to Congress ............................................................. 20

    Twelve Examples of NSA Abuse ..................................................................................................... 21

    NSA Surveillance Encourages Underground Activity ..................................................................... 22

    National security is not an indiscriminate pretense ...................................................................... 23

    Success of NSA Surveillance Greatly Exaggerated ......................................................................... 24

    The FISA Court refuses to keep the NSA in check .......................................................................... 25

  • 8/10/2019 Polished Neg Ev

    2/26

    BROWN SCHOOL DEBATE

    BROWN BD

    NCFL 2K14 2

    Case Construction

    Facets of National SecurityWright University, FBI's foreign counterintelligence mission,http://www.wright.edu/rsp/Security/T1threat/Nstl.htm

    The FBI's foreign counterintelligence mission is set out in a strategy known as the National Security

    Threat List (NSTL). The NSTL combines two elements:

    First is the Issues Threat List -- a list of eight categories of activity that are a national security

    concern regardless of what foreign power or entity engages in them.

    Second is the Country Threat List -- a classified list of foreign powers that pose a strategic

    intelligence threat to U.S. security interests. The activities of these countries are so hostile, or ofsuch concern, that counterintelligence or counterterrorism investigations are warranted to

    precisely describe the nature and scope of the activities as well as to counter specific identified

    activities.

    1. Terrorism

    This issue concerns foreign power-sponsored or foreign power-coordinated activities that:

    Involve violent acts, dangerous to human life, that are a violation of the criminal laws of the

    United States or of any State, or that would be a criminal violation if committed within the

    jurisdiction of the United States or any state;

    Appear to be intended to intimidate or coerce a civilian population, to influence the policy of a

    government by intimidation or coercion, or to affect the conduct of a government by

    assassination or kidnapping; and Occur totally outside the United States or transcend national boundaries in terms of the means

    by which they are accomplished, the persons they appear intended to coerce or intimidate, or

    the locale in which their perpetrators operate or seek asylum.

    2. Espionage

    This issue concerns foreign power-sponsored or foreign power-coordinated intelligence activity directed

    at the U.S. Government or U.S. corporations, establishments, or persons, which involves the

    identification, targeting and collection of U.S. national defense information.

    3. Proliferation

    This issue concerns foreign power-sponsored or foreign power-coordinated intelligence activity directed

    at the U.S. Government or U.S. corporations, establishments or persons, which involves:

    The proliferation of weapons of mass destruction to include chemical, biological, or nuclear

    weapons, and delivery systems of those weapons of mass destruction; or

    The proliferation of advanced conventional weapons.

    4. Economic Espionage

    This issue concerns foreign power-sponsored or foreign power-coordinated intelligence activity directed

    at the U.S. Government or U.S. corporations, establishments, or persons, which involves:

    The unlawful or clandestine targeting or acquisition of sensitive financial, trade or economic

    policy information, proprietary economic information, orcritical technologies;or

    The unlawful or clandestine targeting or influencing of sensitive economic policy decisions.

    http://www.wright.edu/rsp/Security/T1threat/Mctl.htm#Militarily%20Criticalhttp://www.wright.edu/rsp/Security/T1threat/Mctl.htm#Militarily%20Critical
  • 8/10/2019 Polished Neg Ev

    3/26

    BROWN SCHOOL DEBATE

    BROWN BD

    NCFL 2K14 3

    5. Targeting the National Information Infrastructure

    This issue concerns foreign power-sponsored or foreign power-coordinated intelligence activity directed

    at the U.S. Government or U.S. corporations, establishments, or persons, which involves the targeting of

    facilities, personnel, information, or computer, cable, satellite, or telecommunications systems which

    are associated with the National Information Infrastructure. Proscribed intelligence activities include: Denial or disruption of computer, cable, satellite or telecommunications services;

    Unauthorized monitoring of computer, cable, satellite or telecommunications systems;

    Unauthorized disclosure of proprietary or classified information stored within or communicated

    through computer, cable, satellite or telecommunications systems;

    Unauthorized modification or destruction of computer programming codes, computer network

    databases, stored information or computer capabilities; or

    Manipulation of computer, cable, satellite or telecommunications services resulting in fraud,

    financial loss or other federal criminal violations.

    6. Targeting the U.S. Government

    This issue concerns foreign power-sponsored or foreign power-coordinated intelligence activity directed

    at the U.S. Government or U.S. corporations, establishments, or persons, which involves the targeting of

    government programs, information, or facilities or the targeting or personnel of the:

    U.S. intelligence community;

    U.S. foreign affairs, or economic affairs community; or

    U.S. defense establishment and related activities of national preparedness.

    7. Perception Management

    This issue concerns foreign power-sponsored or foreign power-coordinated intelligence activity directed

    at the U.S. Government or U.S. corporations, establishments, or persons, which involves manipulating

    information, communicating false information, or propagating deceptive information and

    communications designed to distort the perception of the public (domestically or internationally) or of

    U.S. Government officials regarding U.S. policies, ranging from foreign policy to economic strategies.

    8. Foreign Intelligence Activities

    This issue concerns foreign power-sponsored or foreign power-coordinated intelligence activityconducted in the U.S. or directed against the United States Government, or U.S. corporations,

    establishments, or persons, that is not described by or included in the other issue threats.

  • 8/10/2019 Polished Neg Ev

    4/26

    BROWN SCHOOL DEBATE

    BROWN BD

    NCFL 2K14 4

    4 Facets of Privacy

    David BanisarAnd Simon Davies, Deputy Director Of Privacy International(PI) And Director

    General Of Privacy International And A Visiting Fellow At The London School Of Economics, Fall, 1999in"Global Trends In Privacy Protection: An International Survey of Privacy, Data Protection, And

    Surveillance Laws And Developments," The John Marshall Journal Of Computer & Information Law, 18 J.

    Marshall J. Computer & Info. L. 1

    Definitions of privacy vary widely according to context and environment. In many countries, the concept

    has been fused with data protection, which interprets privacy in terms of managing personal

    information. Outside this rather strict context, privacy protection is frequently seen as a way of drawing

    the line at how far society can intrude into a person's affairs. It can be divided into the following facets:

    Information privacy ,involving the establishment of rules governing the collection and handling of

    personal data such as credit information and medical records; Bodily privacy ,concerning theprotection of people's physical beings against invasive procedures such as drug testing and cavity

    searches; Privacy of communications, covering the security and privacy of mail, telephones, email and

    other forms of communication; and Territorial privacy , concerning the setting of limits on intrusion

    into the domestic and other environments such as the workplace or public space. The lack of a single

    definition should not imply that the issue lacks importance. As one writer observed, "In one

    sense, all human rights are aspects of the right to privacy."

  • 8/10/2019 Polished Neg Ev

    5/26

    BROWN SCHOOL DEBATE

    BROWN BD

    NCFL 2K14 5

    When privacy is dismantled

    Evgeny Morozovon October 22, 2013 Sprios Smitis, 1985http://www.technologyreview.com/featuredstory/520426/the-real-privacy-problem/

    He also recognized that privacy is not an end in itself. Itsa means of achieving a certain ideal of

    democratic politics, where citizens are trusted to be more than just self-contented suppliers of

    information to all-seeing and all-optimizing technocrats. Whereprivacy is dismantled,warned

    Simitis, boththe chance for personal assessment of the political process and the opportunity to

    develop and maintain a particular style of life fade.

    http://www.technologyreview.com/contributor/evgeny-morozov/http://www.technologyreview.com/contributor/evgeny-morozov/http://www.technologyreview.com/contributor/evgeny-morozov/
  • 8/10/2019 Polished Neg Ev

    6/26

  • 8/10/2019 Polished Neg Ev

    7/26

    BROWN SCHOOL DEBATE

    BROWN BD

    NCFL 2K14 7

    The term terror is a rhetorical tool

    Greenwald 8/15/12(Glenn, Glenn Greenwald is a former Constitutional and civil rights litigator and is the author of three New York Times Bests elling books: two on theBush administration's executive power and foreign policy abuses, and his latest book, With Liberty and Justice for Some, an indictment of America's two-tiered system of justice. Greenwald

    was named by The Atlantic as one of the 25 most influential political commentators in the nation. He is the recipient of the first annual I. F. Stone Award for Independent Journalism, and is the

    winner of the 2010 Online Journalism Association Award for his investigative work on the arrest and oppressive detention of Bradley Manning. The sham terrorism expert industry,

    http://www.salon.com/2012/08/15/the_sham_terrorism_expert_industry/)

    The very concept of Terrorism is inherently empty, illegitimate, and meaningless. Terrorism itself is

    not an objective term or legitimate object of study, but was conceived of as a highly politicized

    instrumentand has been used that way ever since. The best scholarship on this issue, in my view,

    comes from Remi Brulin, who teaches at NYU and wrote his PhD dissertation at the Sorbonne in Paris on

    the discourse of Terrorism. When I interviewed him in 2010, he described the history of the term it

    was pushed by Israel in the 1960s and early 1970s as a means of universalizing its conflicts (this isnt our

    fight against our enemies over land; its the EntireWorlds Fight against The Terrorists!). The term was

    then picked up by the neocons in the Reagan administration to justify their covert wars in Central

    America (in a test run for what they did after 9/11, they continuously exclaimed: were fighting against

    The Terrorists in Central America, even as they themselves armed and funded classic Terror groups in El

    Salvador and Nicaragua). From the start, the central challenge was how to define the term so as to

    include the violence used by the enemies of the U.S. and Israel, while excluding the violence the U.S.,

    Israel and their allies used, both historically and presently.

    http://www.salon.com/2012/08/15/the_sham_terrorism_expert_industry/http://www.salon.com/2012/08/15/the_sham_terrorism_expert_industry/
  • 8/10/2019 Polished Neg Ev

    8/26

  • 8/10/2019 Polished Neg Ev

    9/26

    BROWN SCHOOL DEBATE

    BROWN BD

    NCFL 2K14 9

    Defeats purpose of why this country was founded

    Shane R. Heskin, legal scholar, 1999, Albany Law Review, High Court Studies: Floridas StateConstitutional Adjudication: A Significant Shift As Three New Members Take Seats On The States

    Highest Court, pp. 1573-74

    Running through all of these decisions, however, is the courts' deeply imbedded belief, rooted in our

    constitutional traditions, that an individual has a fundamental right to be left alone so that he is free

    to lead his private life according to his own beliefs free from unreasonable governmental

    interference. Surely nothing, in the last analysis, is more private or more sacred than one's religion or

    view of life, and here the courts, quite properly, have given great deference to the individual's right to

    make decisions vitally affecting his private life according to his own conscience. It is difficult to overstate

    this right because it is, without exaggeration, the very bedrock on which this country was founded.

  • 8/10/2019 Polished Neg Ev

    10/26

    BROWN SCHOOL DEBATE

    BROWN BD

    NCFL 2K14 10

    Infringes on Autonomy

    Deborah G. Johnson, Computer Ethics,Englewood Cliffs, NJ: Prentice-Hall (1985): 65.

    The analysis of Rachels and Fried suggests a deeper and more fundamental issue: personal freedom. AsDeborah Johnson has observed, "To recognize an individual as an autonomous being, an end in himself,

    entails letting that individual live his life as he chooses. Of course, there are limits to this, but one of the

    critical ways that an individual controls his life is by choosing with whom he will have relationships and

    what kind of relationships these will be.... Information mediates relationships. Thus when one cannot

    control who has information about one, one loses considerable autonomy."6

  • 8/10/2019 Polished Neg Ev

    11/26

    BROWN SCHOOL DEBATE

    BROWN BD

    NCFL 2K14 11

    Loss of privacy creates and perpetuates power disparities.

    Katrin Schatz Byford, attorney and legal scholar, 1998, Rutgers Computer and Technology

    Law Journal, Privacy in Cyberspace: Constructing a Model of Privacy for the Electronic

    Communications Environment, pp. 23-24

    Once we regard privacy as implicated in the construction and transformation of all social relations, its

    value transcends that of a mere personal right to be left alone. Instead, privacy becomes an integral

    element of the sociopolitical process. Knowledge is power, and in any social interaction, an imbalance in

    the amount and nature of personal information possessed by each party creates and perpetuates power

    disparities. In a society where surveillance and the collection of personal information have become

    institutionalized, those who control the data collection process have potentially immense social

    power at their disposal. But their activities are likely to engender distrust and resentment and, insofar

    as surveillance in public settings is perceived as unavoidable, may cause others to withdraw from public

    participation altogether. Rather than eliminate the dividing line that separates public from private,information gathering may cause its entrenchment by driving those subject to observation into a strictly

    private sphere. As a consequence, access to political power is likely to be left in the hands of those able

    to control the collection and distribution of information.

  • 8/10/2019 Polished Neg Ev

    12/26

    BROWN SCHOOL DEBATE

    BROWN BD

    NCFL 2K14 12

    Terrorism is not severe enough to justify NSA surveillance

    Friedersdorf, Connor. The Irrationality of Giving Up This Much Liberty to Fight Terrorism The

    Atlantic. June 10, 2013.

    Of course we should dedicate significant resources and effort to stopping terrorism. But consider some

    hard facts. In 2001, the year when America suffered an unprecedented terrorist attack -- by far the

    biggest in its history -- roughly 3,000 people died from terrorism in the U.S.

    Let's put that in context. That same year in the United States:

    71,372 died of diabetes.

    29,573 were killed by guns.

    13,290 were killed in drunk driving accidents.

    That's what things looked like at the all-time peak for deaths by terrorism. Now let's take a longer view.We'll choose an interval that still includes the biggest terrorist attack in American history: 1999 to 2010.

    Again, terrorists killed roughly 3,000 people in the United States. And in that interval, roughly 150,000

    were killed in drunk-driving accidents, roughly 360,000 were killed by guns (actually, the figure the CDC

    gives is 364,483 -- in other words, by rounding, I just elided more gun deaths than there were total

    terrorism deaths).

    Measured in lives lost, during an interval that includes the biggest terrorist attack in American

    history, guns posed a threat to American lives that was more than 100 times greater than the threat

    of terrorism. Over the same interval, drunk driving threatened our safety 50 times more than

    terrorism.

    Those aren't the only threats many times more deadly than terrorism, either.

    The CDC estimates that food poisoning kills roughly 3,000 Americans every year. Every year, food-borne

    illness takes as many lives in the U.S. as were lost during the high outlier of terrorism deaths. It's a killer

    more deadly than terrorism. Should we cede a significant amount of liberty to fight it?

    Government officials, much of the media, and most American citizens talk about terrorism as if they're

    totally oblivious to this context -- as if it is different than all other threats we face, in both kind and

    degree. Since The Guardian and other news outlets started revealing the scope of the surveillance state

    last week, numerous commentators and government officials, including President Obama himself, have

    talked about the need to properly "balance" liberty and security.

  • 8/10/2019 Polished Neg Ev

    13/26

  • 8/10/2019 Polished Neg Ev

    14/26

    BROWN SCHOOL DEBATE

    BROWN BD

    NCFL 2K14 14

    NSA Surveillance is Inefficient

    Bialik, Carl. Ethics Aside, Is NSAs spy Tool Efficient Wall Street Journal. June 14, 2013.

    A Ph.D. candidate in computational ecology wrote on his blog last week that even a very accurate

    algorithm for identifying terrorist communications could produce about 10,000 false positives for

    every real "hit," creating a haystack of false leads to chase in order to find every needle. Several

    media reports repeated the figure, and some experts agreed. "The false positives will kill you in this kind

    of system," said Bruce Schneier, a security technologist at U.K. telecommunications company BT Group

    PLC.

    The value of these monitoring tools also depends on another question, though, that can be addressed:

    whether sifting for terrorism could be similar to screening for a rare disease. Corey Chivers, the fourth-year graduate student at McGill University in Montreal who wrote the blog post noted above, based his

    calculation on assuming the two kinds of screening are identical mathematically. The thinking goes like

    this: If you apply a test for something very rare to a population, even if it can be relied on to identify

    people who possess certain traits, there are so many more who don't that the false positives will vastly

    outnumber the correct hits.

    Mr. Chivers said he never intended his proposed ratio to be very precise. Still, he said, his point stands:

    "Even if those numbers were vastly different, you're still going to have a large false-positive rate."

    Several statisticians agreed with his basic point . Even if the NSA's algorithm "is terribly clever and has

    a very high sensitivity and specificity, it cannot avoid having an immense false-positive rate," said

    Peter F. Thall, a biostatistician at the University of Texas' M.D. Anderson Cancer Center. In his arena,

    false positives mean patients may get tests or treatment they don't need. For the NSA, false positives

    could mean innocent people are monitored, detained, find themselves on no-fly lists or are otherwise

    inconvenienced, and that the agency spends resources inefficiently.

  • 8/10/2019 Polished Neg Ev

    15/26

    BROWN SCHOOL DEBATE

    BROWN BD

    NCFL 2K14 15

    NSA surveillance lends itself to use in unethical persuasion

    Richards, Neil."The Dangers of Surveillance." Harvard Law Review 126 (2013): n. pag. Web. 02 Oct.

    2013

    Governments also use the power of surveillance to control behavior. For example, one of the

    justifications for massive CCTV networks in modern urban areas is that they allow police greater

    ability to watch and influence what happens on city streets. Certainly, the presence of cameras or police

    can persuade citizens to obey the law, but they can have other effects as well. The surveillance studies

    literature has documented the use of government CCTV assemblages to direct public behavior

    towards commerce and away from other activities ranging from crime to protest. In Britain, where

    the science of surveillance-based control is at its most advanced, CCTV operates in connection with

    court-ordered injunctions, known as Anti-Social Behavior Orders or ASBOs, to move groups of non-

    purchasing teens out of the commercial cores of cities, using surveillance and the power of the state to

    ensure that commerce continues efficiently.

    The bottom line about surveillance and persuasion is this: Surveillance gives the watcher information

    about the watched. That information gives the watcher increased power over the watched that can be

    used to persuade, influence, or otherwise control them, even if they do not know they are being

    watched. Sometimes this power is undeniably a good thing, for example when police are engaged in riot

    control. But we should not forget that surveillance represents a persuasive power shift whether the

    watcher is a government agent or a corporate marketer. We have legal doctrines dealing with power

    imbalances between both consumers and businesses, such as the doctrine of unconscionability and

    consumer protection law. We also have legal doctrines protecting citizens from state coercion, such as

    the unconstitutional conditions doctrine and the First Amendments protections of freedom of thought

    and conscience. In an age of surveillance, when technological change gives the watcher enhanced

    powers of persuasion, it may well be time to think about updating those doctrines to bring them into

    the digital age.

    This evidence shows how surveillance unjustly concentrates power into the hands of a few. While this

    alone doesnt prove anything, it will be useful with the issue of accountability, showing how this new

    threat to civil liberties is gaining more power and virtually unchecked by the rest of the government.

  • 8/10/2019 Polished Neg Ev

    16/26

    BROWN SCHOOL DEBATE

    BROWN BD

    NCFL 2K14 16

    Unauthorized collection frequently occurs

    Phillip, Abby D. "Obama vs. Washington Post: Whos Right onNSA Surveillance? ABC News Network,

    13 Aug. 2013.

    Pressreports that the National Security Agency broke privacy rules thousands of times per year and

    reportedly sought to shield required disclosure of privacy violations are extremely disturbing, said

    House Minority Leader Nancy Pelosi, D-Calif., noting that instances of non-compliance are required by

    law to be reported to Congress.

    Well let you be the judge:

    Obama:

    Well, the fact that I said that the programs are operating in a way that prevents abuse, that continues to

    be true, without the reforms.

    The NSA audit obtained by The [Washington] Post, dated May 2012, counted 2,776 incidents in the

    preceding 12 months of unauthorized collection, storage, access to or distribution of legally

    protected communications. Most were unintended. Many involved failures of due diligence or

    violations of standard operating procedure. The most serious incidents included a violation of a

    court order and unauthorized use of data about more than 3,000 Americans and green-card holders .

    This card is extremely impactful. Not only does it present a serious statistic about the unintentional

    stealing of legally protected information, but it also shows that the claims being made by the

    government about the legitimacy of the surveillance programs are significantly different than what thenumbers show. Additionally, this card can be used to illustrate the fact that the NSA is not giving its due

    respect to Congress by disclosing instances of non-compliance with the law. Surveillance is illegally

    violating right, being lied about to the public, and undermining the checks and balances of the state.

  • 8/10/2019 Polished Neg Ev

    17/26

    BROWN SCHOOL DEBATE

    BROWN BD

    NCFL 2K14 17

    The right to privacy is eroding

    Risen, James, and Laura Poitras. "N.S.A. Gathers Data on Social Connections of U.S. Citizens." New

    York TImes, 28 Sept. 2013.

    The spy agency, led by Gen. Keith B. Alexander, an unabashed advocate for more weapons in the hunt

    for information about the nations adversaries, clearly views its collections of metadata as one of its

    most powerful resources. N.S.A. analysts can exploit that information to develop a portrait of an

    individual, one that is perhaps more complete and predictive of behavior than could be obtained by

    listening to phone conversations or reading e-mails, experts say.

    Phone and e-mail logs, for example, allow analysts to identify peoples friends and associates, detect

    where they were at a certain time, acquire clues to religious or political affiliations, and pick up sensitive

    information like regular calls to a psychiatrists office, late-night messages to an extramarital partner orexchanges with a fellow plotter.

    Metadatacan be very revealing,said Orin S. Kerr, a law professor at George Washington

    University. Knowingthings like the number someone just dialed or the location of the persons

    cellphone is going to allow them to assemble a picture of what someone is up to. Itsthe digital

    equivalent of tailing a suspect.

    While a "digitial equivalent of tailing a suspect" sounds promising in terms of law enforcement, if this

    argument is expanded, the impact of this card is that nearly every individual is being digitally followed by

    the NSA at all times due to metadata collection.

  • 8/10/2019 Polished Neg Ev

    18/26

    BROWN SCHOOL DEBATE

    BROWN BD

    NCFL 2K14 18

    Collecting phone records inefficient

    Tom Cohenand Bill Mears, CNN. August 1, 2013. http://edition.cnn.com/2013/07/31/politics/nsa-

    surveillance/index.html.

    There is little evidence the U.S. government's sweeping collection of phone records, as revealed by

    admitted intelligence leaker Edward Snowden, has helped prevent terror attacks as national security

    officials have claimed, a top senator said on Wednesday.

    Senate Judiciary Committee Chairman Patrick Leahy [stated] "If this program is not effective, it has to

    end," the Vermont Democrat said of the phone record collection program under Section 215 of the

    Patriot Act. He noted that classified details provided by the NSA on how the initiative had been used do

    NOT "reflect dozens or even several terrorist plots" that it helped prevent "let alone 54 as some havesuggested."

    At Wednesday's hearing, Justice Department and security officials conceded the lack of direct causal

    links between the Section 215 phone record collection and thwarted attacks.

  • 8/10/2019 Polished Neg Ev

    19/26

  • 8/10/2019 Polished Neg Ev

    20/26

    BROWN SCHOOL DEBATE

    BROWN BD

    NCFL 2K14 20

    The NSA is only held nominally accountable to Congress

    Bendix, Williamand Paul J. Quirk. Institutional Failure in Surveillance Policymaking: Deliberating the

    Patriot Act. Brookings Institution. July 2013. Web.

    As often occurs in national-security policy, Congress had difficulty exerting influence on issues that

    demanded secrecy. If all 535 members routinely participated in classified discussions, damaging leaks

    might be almost constant. Instead, Congress normally settles for limited briefings, typically including

    only members of the Intelligence committees. On especially sensitive matters, briefings have been

    limited to eight congressional leaders. This system has preserved secrecy but often at the expense of

    genuine congressional participation. With only four members from each party privy to critical

    information, legislators will rarely resist the administration position on a major issue.

    As recent reports on the metadata program show, Congress has struggled to conduct effective

    oversight of domestic spying. Although Congress received briefings, many lawmakers only learned of

    the program when The Guardian ran its stories. Members on the Intelligence committees received the

    bulk of the briefings, and provided opportunities for their colleagues in the House and Senate to view

    top-secret files. But many skipped the sessions because classified briefings were seen as pointless.

    Lawmakers could not take notes, consult experts, or discuss technical matters with staff, thus limiting

    their ability to assess classified information.

    These restrictions did not apply to members on the Intelligence committees, who were uniquely able to

    follow the metadata program. But the Intelligence panels lacked a hands-on familiarity with the legal

    issues concerning both records seizures and the FISA Court procedures, because the Judiciary

    committees had done most of the work on the Patriot Act. But even if the Intelligence panels had

    sufficient legal understanding, they were confined to discuss policy in a classified setting and

    therefore were in no position to mobilize Congress against a presidential program that few members

    knew about or understood.

  • 8/10/2019 Polished Neg Ev

    21/26

  • 8/10/2019 Polished Neg Ev

    22/26

    BROWN SCHOOL DEBATE

    BROWN BD

    NCFL 2K14 22

    NSA Surveillance Encourages Underground Activity

    Ian Duncan and Justin Fenton. Silk Road Arrrest Exposes a Hidden Internet. Tribune Business News.

    October 6, 2013. Web. October 7, 2013.

    The events of the past week have drawn renewed attention to the underground of the Internet, where

    users hide their identities, bounce information around the world to obscure its origin, access hidden

    sites with extensions like ".onion" and spend digital currency known as Bitcoins.

    But experts say the technology that allows drug dealers and child pornographers to flourish is also a

    legitimate protector of Internet privacy and a crucial check on government power. So-called Deep Web

    applications have helped activists drive forward the Arab Spring and get around China's Great Firewall.

    Some of the tools used by Silk Road and its patrons were developed by the U.S. government, and

    observers say they could become increasingly popular here as the populace reckons with revelations of

    vast Internet surveillance by the National Security Agency.

    "Why wouldn't you be interested in anonymity, with all the recent releases of information that the NSA

    has been pervasively tracking almost everything we do online?" asked Michael Taylor, a computer

    science professor at the University of California, San Diego. "It gets back to the fundamental freedoms

    that Americans tend to believe they have."

    This source explains one of the fundamental issues with NSA surveillanceit encourages criminals to go

    even further beyond detection. This phenomenon has fueled the Silk Road, an underground online

    market for drug dealers and other criminal transactions.

  • 8/10/2019 Polished Neg Ev

    23/26

    BROWN SCHOOL DEBATE

    BROWN BD

    NCFL 2K14 23

    National security is not an indiscriminate pretense

    Walt, Stephen.Sullivan, the NSA, and the Terrorism Threat. Foreign Policy. 6 June 2013. Web.http://walt.foreignpolicy.com/posts/2013/06/06/sullivan_the_nsa_and_the_terrorism_threat

    This claim depends on the belief that jihadism really does pose some sort of horrific threat to American

    society. This belief is unwarranted, however, provided that dedicated and suicidal jihadists never gain

    access to nuclear weapons. Conventional terrorism -- even of the sort suffered on 9/11 -- is not a serious

    threat to the U.S. economy, the American way of life, or even the personal security of the overwhelming

    majority of Americans, because al Qaeda and its cousins are neither powerful nor skillful enough to

    do as much damage as they might like. And this would be the case even if the NSA weren't secretly

    collecting a lot of data about domestic phone traffic. Indeed, as political scientist John Mueller and

    civil engineer Mark Stewart have shown, post-9/11 terrorist plots have been mostly lame and inept, and

    Americans are at far greater risk from car accidents, bathtub mishaps, and a host of other undramatic

    dangers than they are from "jihadi terrorism." The Boston bombing in April merely underscores this

    point: It was a tragedy for the victims but less lethal than the factory explosion that occurred that

    same week down in Texas. But Americans don't have a secret NSA program to protect them from

    slipping in the bathtub, and Texans don't seem to be crying out for a "Patriot Act" to impose better

    industrial safety. Life is back to normal here in Boston (Go Sox!), except for the relatively small number

    of people whose lives were forever touched by an evil act.

    Terrorism often succeeds when its targets overreact, thereby confirming the extremists' narrative

    and helping tilt opinion toward their cause. Thus, a key lesson in dealing with these (modest) dangers

    is not to exaggerate them or attribute to enemies advantages that they do not possess.

  • 8/10/2019 Polished Neg Ev

    24/26

  • 8/10/2019 Polished Neg Ev

    25/26

    BROWN SCHOOL DEBATE

    BROWN BD

    NCFL 2K14 25

    The FISA Court refuses to keep the NSA in check

    Sprigman, Christopherand Jennifer Granick. FISA Court Rolls Over, Plays Dead. Center for Internet

    and Society. Stanford Law School. 28 August 2013. Web.http://cyberlaw.stanford.edu/publications/fisa-court-rolls-over-plays-dead

    So what did the court do when it found out it had been lied to, that purely domestic communications

    were fair game, that untold numbers of innocent people were being illegally spied on, and that all the

    safeguards in place needed to be rethought?

    Nothing, really. The court suggested the NSA should train its analysts to notice when their queries

    turned up an MCT i.e., an Internet transaction containing multiple messagesand then to look

    carefully at all the by-catch. If existing procedures allowed them to use anything in those purely

    domestic messages that they were never supposed to have collected in the first place, great!

    Otherwise, only after collection and review, should the information be deleted. The NSA adopted thisapproach, and continues to blithely collect Internet transactions containing wholly domestic

    communications between innocent Americans to this day.

    So in the face of illegal, unconstitutional and potentially criminal conduct conduct about which the

    NSA repeatedly lied to the FISA court the FISA court corrected the problem by requiring banner

    warnings that something might be an MCT, and an extra round of review by NSA analysts. The real

    problemthat the NSA regularly collects Americansmost private communications that the law does

    not permit it to collect and lies about it to the FISA courtwas simply waved away.

    In other words, the NSA intentionally collects purely domestic American communications which itassured the American people were off-limits. But the FISA court allows the government to use these

    communications to criminally investigate us, and for foreign intelligence purposes.

    The harms to civil liberties are already a well-established and often-tread point in discussing NSA

    surveillance. This behavior shows a more worrying precedent: supposedly regulatory government bodies

    are ostensibly being held subservient to the goals of a single powerful agency. Even if we were to

    accept that the NSAsnational security work is worthwhile, the pretense under which this work is

    done is unacceptable in any governmental structure that wishes to remain accountable to both itself

    and its people.

  • 8/10/2019 Polished Neg Ev

    26/26

    BROWN SCHOOL DEBATE

    BROWN BD

    NCFL 2K14 26