Bulk Data Affirmative - JDI 2015

download Bulk Data Affirmative - JDI 2015

of 211

Transcript of Bulk Data Affirmative - JDI 2015

  • 7/25/2019 Bulk Data Affirmative - JDI 2015

    1/211

    **AFF**

  • 7/25/2019 Bulk Data Affirmative - JDI 2015

    2/211

    InherencyRepeal of 215 doesnt solve legislation is necessary to limit XO 12!ye 1"John Napier Tye. July 18, 2014. The Washington Post. Meet Executie !r"er 12###$ The %eagan rule that lets the N&' spy on

    '(ericans http$))***.*ashingtonpost.co()opinions)(eet+executie+or"er+12###+the+reagan+rule+that+lets+the+nsa+spy+on+a(ericans)2014)0)18)-#"2ac22+0-#+11e4+8e/+"0"e80c2story.ht(l 3John Napier Tye sere" as section chie or nternetree"o( in the &tate 5epart(ent6s 7ureau o 5e(ocracy, u(an %ights an" 9aor ro( January 2011 to 'pril 2014. e is no* alegal "irector o 'aa:, a gloal a"ocacy organi:ation.;

  • 7/25/2019 Bulk Data Affirmative - JDI 2015

    3/211

    1 2 contains nothing to prevent the ;&A from collecting and storing all s(chcomm(nications 8 content as #ell as metadata 8 provided that s(ch collectionocc(rs o(tside the ,nite" &tates in the co(rse of a la#f(l foreign intelligenceinvestigation. ;o #arrant or co(rt approval is re6(ired, an" such collection neer nee"e reporte" to Bongress. None o the reor(s that !a(a announce" earlier this year *ill aect

    such collection.

  • 7/25/2019 Bulk Data Affirmative - JDI 2015

    4/211

    &olvency!he Freedom Act did nothing and #arrantless ;&A s(rveillance contin(es.;apolitano (Andrew, 6/10/15, a former judge of the Superior Court of New

    Jerse, is an ana!st for the "o# News Channe!$ %e has written se&en 'oos on

    the )$S$ Constitution$=9ies the goern(ent is telling you>http$))***.*ashingtonti(es.co()ne*s)201/)Aun)10)an"re*+napolitano+ree"o(+act+ails+to+curtail+nsa), Google, 5!' )2#)1/; ))DucD9ast *eeD, %epulicans an" 5e(ocrats inBongressAoine" Presi"ent !a(a in congratulating the(seles or ta(ing theNational &ecurity 'gency6s

    oracious appetite or spying. 7y per(itting one section o the Patriot 'ct to expire an" y replacing it *iththe @&'

  • 7/25/2019 Bulk Data Affirmative - JDI 2015

    5/211

    apitalism Adv

  • 7/25/2019 Bulk Data Affirmative - JDI 2015

    6/211

    1A Adv &hell!he ;&A monati/es private data?en/ner 13%oert, -)2#)1#, Preious 3liDeyour K http$))***.truth+out.org)opinion)ite()21/+totalitarian+paranoia+in+the+post+or*ellian+sureillance+state))OucDSWe "on6t en"orse that glangThe reelations o *histle+lo*ers such as Bhelsea Manning, Jere(y a((on" an" E"*ar" &no*"en aout goern(ent la*lessness an" corporate spying proi"e a ne* (eaning i not a reitali:e" urgency an" releance to George !r*ells "ystopian ale 1-84.!r*ell oere" his rea"ers an i(age o the (o"ern state that ha" eco(e "ystopian + one in *hich priacy as a ciil irtue an" a crucial right *as no longer alue" as a (easure o the roust strength o a healthy an" thriing "e(ocracy. !r*ell *as clear that the right to

    priacy ha" co(e un"er egregious assault. 7ut the right to priacy pointe" to so(ething (ore sinister than the iolation o in"ii"ual rights. When ruthlessly transgresse", the issue o priacy eca(e a (oral an" political principle y *hich to assess the nature, po*eran" seerity o an e(erging totalitarian state. 's i(portant as !r*ells *arning *as in she""ing light on the horrors o (i"+20th century totalitarianis( an" the en"less regi(es o state spying i(pose" on citi:ens, the text seres as a rilliant ut li(ite" (etaphor or(apping the expansie traAectory o gloal sureillance an" authoritarianis( no* characteristic o the irst "eca"es o the ne* (illenniu(. 's MarAorie Bohn has in"icate", U!r*ell neer coul" hae i(agine" that the National &ecurity 'gency 3N&'; *oul" a(ass(eta"ata on illions o our phone calls an" 200 (illion o our t ext (essages eery "ay. !r*ell coul" not hae oreseen that our goern(ent *oul" rea" the content o our e(ails, ile transers, an" lie chats ro( the social (e"ia *e use.U n his i"eotape" Bhrist(as(essage, &no*"en reerences !r*ells *arning o Uthe "angers o (icrophones, i"eo ca(eras an" Ts that *atch us,U2 allo*ing the state to regulate suAects *ithin th e (ost inti(ate spaces o priate lie. 7ut these ol"er (o"es o sureillance, &no*"en elaorates,ho*eer, are nothing co(pare" to *hat is use" to inringe on our personal priacy to"ay.

  • 7/25/2019 Bulk Data Affirmative - JDI 2015

    7/211

    a""ress exclusiely the iolations co((itte" y the corporate+sureillance state. n this instance, the s(rveillance an"security state is one that not only listens, *atches an" gathers massive amo(nts of informationthrough "ata (ining necessary or i"entiying consu(er populationsut also acc(lt(rates thep(%lic into accepting the intr(sion of s(rveillance technologies an" priati:e" co((o"iie"alues into all aspects o their lies. Personal inor(ation is *illingly gien oer to social (e"iaan" other corporate+ase" *esites an" gathere" "aily as people (oe ro( one targete" *e siteto the next across (ultiple screens an" "igital apparatuses. 's 'riel 5or(an points out, =social (e"ia users gla"ly gie up their lierty an" priacy, inarialy or the(ost eneolent o platitu"es an" reasons,> all the *hile en"lessly shopping online an" texting.' This collecting o inor(ation (ight e (ost ei"ent in the i"eo ca(eras that inhait eery pulic space ro( the streets, co((ercial estalish(ents an" *orDplaces tothe schools our chil"ren atten" as *ell as in the (yria" scanners place" at the entry points o airports, stores, sporting eents an" th e liDe. Fet the (ost i(portant transgression (ay not only e happening through the un*arrante" *atching, listening an" collecting oinor(ation ut also in a culture that nor(ali:es sureillance y upping the pleasure Huotient an" entice(ents or consu(ers *ho use the ne* "igital technologies an" social net*orDs to si(ulate alse notions o co((unity an" to sociali:e young people into a culture osecurity an" co((o"iication in *hich their i"entities, alues an" "esires are inextricaly tie" to a culture o priate a ""ictions, sel+help an" co((o"iication. &ureillance ee"s on the relate" notions o ear an" "elusion. 'uthoritarianis( in its conte(porary(aniestations, as ei"ence" so grippingly in !r*ells text, no longer "epen"s on the ra* "isplays o po*er ut instea" has eco(e o(niscient in a culture o control in *hich the (ost cherishe" notions o agency collapse into unaashe" narcissistic exhiitions an"conessions o the sel, sering as *illing o""er or the spying state. The sel has eco(e not si(ply the suAect o sureillance ut a *illing participant an" oAect. !perating o the assu(ption that so(e in"i i"uals *ill not *illingly turn their priate l ies oer to thespying state an" corporations, the N&' an" other intelligence agencies *orD har" to create a turnDey authoritarian state in *hich the Uelectronic selU eco(es pulic property. Eery space is no* enclose" *ithin the purie* o an authoritarian society that atte(pts togoern the entirety o social l ie. 's Jonathan &chell points out$ ThanDs to &no*"en, *e also Dno* that unDno*n olu(es o liDe inor(ation are eing extracte" ro( nternet an" co(puter co(panies, inclu"ing Microsot, Fahoo, Google,

  • 7/25/2019 Bulk Data Affirmative - JDI 2015

    8/211

    i(portant than consciousness, *hat Marx calls the etishis( o co((o"ities arises. u(an eings orget that they arethe source o alue in their *ealth an" thinD that it is the source o their alue.

    Be have an A priori ethical o%ligation to re0ect capitalism (tilitarianrationale cant acco(nt for the degraded life chances of %illions across the

    glo%e capitalism ma$es its victims anonymo(s destroying the a%ility to findval(e in life and ma$es impact calc(l(s impossi%le&laoA Ci/e$ and Glyn 'aly , &enior 9ecturer in Politics in the

  • 7/25/2019 Bulk Data Affirmative - JDI 2015

    9/211

    O(r privacy is no# at ris$ in (nprecedented #ays, ut, sa"ly, the legal syste( is lagging ehin"the pace o innoation. n"ee", the last (aAor priacy la*, the Electronic Bo((unications Priacy 'ct, *as passe" in 1-8YWhile anup"ate to the la*++ spurre" on y the General Petraeus scan"al ++ is in the *orDs, it only ai(s to a"" so(e (ore protection

    to electronic co((unication liDe e(ails. This still "oes not shiel" our priacy ro( other, possily nearious,*ays that our "ata can e collecte" an" put to use. &o(e legislators *oul" (uch rather not hae legal restrictionsthat coul", as%ep. Marsha 7lacDurnstate" in anop+e",Uthreaten the lieloo" o the nternet$ "ata.U Bonsi"er %ep. 7lacDurns

    re(arDs "uring an 'pril 2010 Bongressional hearing$ UL'n" *hat happens *hen you ollo* the European priacy (o"el an" taDeinor(ation out o the inor(ation econo(y ... %eenues all, innoation stalls an" you lose out to innoators *ho choose to *orDelse*here.U Een though the practices o (any co(panies such as

  • 7/25/2019 Bulk Data Affirmative - JDI 2015

    10/211

    Repression of freedom is intrinsically tied to political violence this is themost li$ely scenario for deathR(mmel 23%.J., 11)2#)02, proessor o political science at uniersity o a*aii, 5!' )2/)1/, Google, =

  • 7/25/2019 Bulk Data Affirmative - JDI 2015

    11/211

    ariation a(ong nations in their "eelop(ent, po*er, culture, region, an" politicsK calculate" the aerage nu(er Dille" or "e(ocracies,authoritarian regi(es 3people are partly ree;, an" totalitarian ones 3no ree"o( ;, an" liste" the results inTale /.2ro((yPo*er OillsKan" plotte" the results in

  • 7/25/2019 Bulk Data Affirmative - JDI 2015

    12/211

    2A &olves apNSA Surveillance is a rampant form of capitalistdomination trading individual privacy for capital gain isthe epitome of neoliberal ideaology.

    5ai" Drice)1)1"+http$))(onthlyreie*.org)2014)0)01)the+ne*+sureillance+nor(al)=TheNe* &ureillance Nor(al> 3senior reporter or the (onthly reie*; )) DucDThe National &ecurity 'gency 3N&' ; "ocu(ent cache release" y E"*ar" &no*"en reeals anee" to re+theori:e the role o state an" corporate sureillance syste(s in an age o neolieralgloal capitalis(. While (uch re(ains unDno*ale to us, *e no* are in a *orl" *here priate co((unications are legile in preiously inconceiale *ays, i"eologies o sureillanceare un"ergoing rapi" transor(ations, an" the co((o"iication o (eta"ata 3an" othersureillance intelligence; transor(s priacy. n light o this, *e nee" to consi"er ho* the N&'an" corporate (eta"ata (ining conerge to support the interests o capital .This is an age oconerging state an" corporate sureillance. 9iDe other eatures o the political econo(y, these shits "eelop *ith apparent in"epen"ence o institutional (otiations, yet corporate an" spyagencies6 practices share co((on appetites or (eta"ata. &no*"en6s reelations o the N&'6s gloal sureillance progra(s raises the possiility that the stateintelligence apparatus is use" or in"ustrial espionage in *ays that coul" unite goern(ental

    intelligence an" corporate interests Cor *hich there appears to e historical prece"ent.

    Theconergence o the interests, incenties, an" (etho"s o @.&. intelligence agencies, an" thecorporate po*ers they sere, raise Huestions aout the *ays that theN&' an" B' ulill theirroles, *hich hae een "escrie" y or(er B' agent Philip 'gee as$ =the secret police o @.&.capitalis(, plugging up leaDs in the political "a( night an" "ay so that sharehol"ers o @.&.co(panies operating in poor countries can continue enAoying the rip+o.>1There is a long history in the @nite" &tates o oer*hel(ing

    pulic opposition to ne* or(s o electronic sureillance. Police, prosecutors, an" spy agencies hae recurrently use" pulic crisesCranging ro( the 9in"ergh ay Di"napping, *ars, clai(e" threats o organi:e" cri(e an" terror attacDs, to (arshal expan"e" statesureillance po*ers.25uring the t*o "eca"es prece"ing the -)11 terror attacDs, Bongress perio"ically c onsi"ere" "eeloping legislation estalishing rights o priacyK ut een in the pre+nternet age, corporate interests scoe" at the nee" or any such protections. Pre]2001 critiHues o electronic+sureillance ocuse" on priacy rights an" threats to oun"aries et*een in"ii"uals, corporations, an" the stateK *hat *oul" later e Dno*n as (eta"ata collection *ere then roa"ly un"erstoo" as iolating share" notions o priacy, an" asexposing the scaol"ing o a police state or a corporate panopticon inhaite" y consu(ers liing in a George TooDer painting. The rapi" shits in @.&. attitu"es aoring expan"e" "o(estic intelligence po*ers ollo*ing -)11 *ere signiicant. n the su((er o 2001,"istrust o the

  • 7/25/2019 Bulk Data Affirmative - JDI 2015

    13/211

    sureillance are un"ergoing rapi" transor(ations, an" the co((o"iication o (eta"ata 3an"other sureillance intelligence; transor(s priacy. n light o this, *e nee" to consi"er ho* theN&' an" corporate (eta"ata (ining conerge to support the interests o capital . This is an age oconerging state an" corporate sureillance. 9iDe other eatures o the political econo(y, these shits "eelop *ith apparent in"epen"ence o institutional(otiations, yet corporate an" spy agencies6 practices share co((on appetites or (eta"ata. &no*"en6s reelations o the N&'6s gloalsureillance progra(s raises thepossiility that the state intelligence apparatus is use" or in"ustrial espionage in *ays that coul"unite goern(ental intelligence an" corporate interests Cor *hich there appears to e historicalprece"ent. The conergence o the interests, incenties, an" (etho"s o @.&. intelligence agencies,an" the corporate po*ers they sere, raise Huestions aout the *ays that theN&' an" B' ulilltheir roles, *hich hae een "escrie" y or(er B' agent Philip 'gee as$ =the secret police o@.&. capitalis(, plugging up leaDs in the political "a( night an" "ay so that sharehol"ers o @.&.co(panies operating in poor countries can continue enAoying the rip+o.>1There is a long history in the @nite" &tates ooer*hel(ing pulic opposition to ne* or(s o electronic sureillance. Police, prosecutors, an" spy agencies hae recurrently use" pulic crisesCranging ro( the 9in"ergh ay Di"napping, *ars, clai(e"

    threats o organi:e" cri(e an" terror attacDs, to (arshal expan"e" state sureillance po*ers.25uring the t*o "eca"es prece"ing the -)11 terror attacDs, Bongress perio"ically consi"ere" "eeloping legislationestalishing rights o priacyK ut een in the pre+ nternet age, corporate interests scoe" at the nee" or any such protections. Pre]2001 critiHues o electronic+sureillance ocuse" on priacy rights an" threats tooun"aries et*een in"ii"uals, corporations, an" the stateK *hat *oul" later e Dno*n as (eta"ata collection *ere then roa"ly un"erstoo" as iolating share" notions o priacy, an" as exposing the scaol"ing oa police state or a corporate panopticon inhaite" y consu(ers liing in a George TooDer painting. The rapi" shits in @.&. attitu"es aoring expan"e" "o(estic intelligence po*ers ollo*ing -)11 *ere signiicant.n the su((er o 2001, "istrust o the 11We nee" to "eelop critical ra(e*orDs consi"ering ho* N&'an" B' sureillance progra(s articulate not only*ith the @nite" &tates6"o(estic an" international security apparatus, ut*ith current international capitalistor(ations.While secrecyshrou"s our un"erstan"ing othese relationships, B'historyproi"es exa(ples o so(e *ays that intelligence operations hae supporte" an" inor(e" past@.&. econo(ic entures. When these historical patterns are co(ine" *ith"etails ro(&no*"en6s"isclosures *ein" continuities o (eans, (otie, an" opportunity or neolieral auses o state intelligence or priate gains.T h e N & ' a n " t h e P r o ( i s e o n " u s t r i a l E s p i o n a g e

    *ith 1n March 201# Blapper lie" to Bongress, clai(ingthatthe N&'*as notcollecting ="ata on(illions or hun"re"s o(illions o '(ericans.>18e has (ore recentlyclai(e" the N&'"oes not =use our oreign intelligence capailities to steal the tra"e secrets ooreign co(panies onehaloCor gie intelligence *e collecttoC@&co (panies to enhance their i nternational co(petitieness or increase their otto( line.> 1-!er the course o seeral years,the N&'6s !peration &hotgiant hacDe"into the serers o Bhinese teleco((unications giant ua*ei. &hotgiant initially sought to learnaout the People6s9ieration 'r(y6saility to (onitor ua*ei6sclient6s co((unications, ut the N&' later installe" hi""en =acD "oors> inua*ei6srouters an" "igital s*itchesCthe exact actiities that the @.&. goern(ent ha" long *arne" @.&.usinesses that ua*ei ha" "on e. 20&uch operations raise the possiility o the N&'gaining Dno*le"ge to e use" or econo(ic gainy the B', N&'e(ployees,or @.&.corporations.When

    presse" onthese issues, a White ouse spoDesperson clai(e" =*e "o not gie intelligence *e collectto @.&. co(panies to enhance their international co(petitieness or increase their otto(line. Many countries cannotsaythe sa(e.> 'ter this N&'operation *as reeale", ua*ei senior executie Willia(Plu((er note" that =the irony is that exactly *hat they are "oing to us is *hatthey hae al*ays charge" that the Bhinese are "oing through us.> 21There are (any historical exa(ples o intelligence personnel using inor(ationacHuire" through the course o their *orD or personal gain, such as selling intelligence inor(ationto another po*er.7ut *hat *e nee" to ocus upon i s aHualitatiely "ierent pheno(enon$ the use o such inor(ation or corporate proit or (arDetspeculation. n 1-2, *hile i nestigating Nixon6spresi"ential ca(paign inance irregularities, the &enate 22'ter thesuco((ittee ocuse"its attentions on other (ore signiicant instances o B'ill egal actiities, %ooseelt ace" no legal conseHuences or these actiities. The (ostrigorous stu"y to "ate "ocu(enting intelligence "ata eing use" or econo(ic gains in stocD (arDettra"ing *as recently pulishe" y econo(ists 'rin"raAit 5ue, Ethan Oaplan, an" &uresh Nai"u. The authors "eelope" e(pirical (easures to "eter(ine *hether classiie" Dno*le"ge o i(pen"ing B'operations has historically een use" to generate proits in this (anner. 2#5ue, Oaplan,an"

    Nai"urecogni:e" that(ost regi(es historicallyoerthro*n yB'coups ha" nationali:e" in"ustries that *ere once priately hel" yinternational corporationsKpost+coup these in"ustries returne" to the preious corporate o*ners. Thereore, oreDno*le"ge o upco(ing coups ha" a signiicantinancial alue in the stocD(arDet. The authors "eelope" a series o (easures to "etect *hether,"uring past B'coups, there *ere "etectile patterns o stocD tra"ing taDing a"antage o classiie" intelligence "irecties,*hich *ere Dno*nonly to the B 'an" Presi"ent. Their stu"yselecte" only B'coups *ithno* "eclassiie"planning"ocu(ents, *hich atte(pte" to install ne* regi(es, an" in *hich the targete" pre+coup goern(ents ha" nationali:e" once+priate (ultinational in"ustries. They sa(ple" ie o t*enty+our i"entiie" coertB'coups (eeting these three criteria$ ran31-/#;, Guate(ala 31-/4;,Bongo 31-0]1-1;, Bua 3aile" 7ay o Pigs coup, 1-1;, an" Bhile 31-#;. 5aily stocDreturns o co(panies that ha" een nationali:e" y the goern(entstargete" yB'coups *ere use" to co(pare inancial returns eore presi"ential coup authori:ations an" ater the coups. 5ue, Oaplan, an" Nai"u oun" that our "ays ater the authori:ation ocoups their sa(ple o stocDs rapi"ly rose 3eore pulic a*areness o these co(ing secretcoups;$ or Bongo there *as a 1. percent increase on the "ayo the a uthori:ation, an" a 22. percent return ro(the aseline our "ays later.The Guate(ala stocDs sho*e" a 4.- percentincrease upon coup authori:ation, a 1.1 percent increase our"ays later, an" 20./percent seen "ays laterK the ranian stocDs rose .4percentour "ays ater authori:ation, 10.# percent seen"ays later, an" 20.2 percent sixteen "ays later. They oun" ei"ence osigniicant econo(ic ga ins occurring inthe stocD (arDet, *ith =the relatie percentage eneit othe coup attriutale to ex ante authori:ation eents,*hich a(ount to //.0Q inBhile, .1Q in Guate(ala, 2.4Q in Bongo,an" 8.-Q inran.> 245ue, Oaplan, an" Nai"u conclu"e" that=priate inor(ation regar"ing coup authori:ationsan" planning increase"the stocDprices oexpropriate" (ultinationals that stoo" to eneitro(regi(e change. The presence o these anor(al returns suggests that there *ere leaDs oclassiie" inor(ationto asset tra"ers.>2/7y ocusing on tra"ing occurring at the pointo the top secret presi"ential authori:ations, they oun" that gains (a"e ro(stocDuys at the ti(e o authori:ations =*ere three ti(es larger in (agnitu"e than price changes ro(the coups the(seles.> 2t re(ains unDno*n *hether those proiting *ere lonein"ii"uals 3either B'e(ployees or their proxies;, or *hether these inest(ents *ere con"ucte" y the B' to generate un"s or its lacD ops. We"o not Dno* ho* such past (easures ointelligence+insi"er proiteering "o or "o not relate to t he N&'6s presentgloal sureillance operations. While &no*"en release" "ocu(ents 3an" state" that (ore *ille orthco(ing; in"icating N&'sureillance ocorporations aroun" the *orl", *e "o not un"erstan" ho* the N&'puts to use the intelligence they collect. Een *ith these leaDs the

    N&'largely re(ains a lacDox, an" our Dno*le"ge oits speciic actiities are li(ite". Fet, the ease *ith*hicha (i""le+leel unctionary liDe &no*"enaccesse" a *ealth oaluale intelligence "ata necessarilyraises Huestions aout ho* the N&'6s (assie "ata collections (ay e use" or sel+sering econo(ic interests.5ue, Oaplan, an" Nai"uestalish past insi"er exploitations ointelligence "ata,an" *ith the gro*th o insi"er+cheater capitalis(o the type "ocu(ente" inMichael 9e*is6s Flash+oys,an" expensie priateinsi"e+the+elt*ay ne*sletters, there are tangile (arDets or the in"ustrial espionage collecte" an" analy:e" ythe N&'an" B'un"er these progra(s. &no*"en, ater all, *as Aust one otens othousan"s o people *ith access to the sorto "ata *ith extraor"inary alue onloor o gloal capitalis(6scasinos. T h e o r i : i n g B a p i t a l i s ( 6 s P e r a s i e & u r e i l l a n c e B u l t u r e Notions opriacyan" sureillance are al*ays culturallyconstructe"

    an" are e(e""e" *ithin econo(ic an" social or(ations o the larger society. &o(e centrali:e"state+socialistsyste(s, such as the @&&%or East Ger(any, "eelope" intrusie sureillance syste(s, an incessantan" eectie the(e oanti+&oietpropagan"a. The "e(ocratic+socialist or(ations, such as those oconte(porarynorthern Europe, hae la*s that signiicantly li(itthe or(s o electronic sureillance an" the collectiono (eta"ata, co(pare" to 'nglo+@.&.practice . 5espite

    http://monthlyreview.org/2014/07/01/the-new-surveillance-normal/#en1http://monthlyreview.org/2014/07/01/the-new-surveillance-normal/#en1http://monthlyreview.org/2014/07/01/the-new-surveillance-normal/#en2http://monthlyreview.org/2014/07/01/the-new-surveillance-normal/#en2http://monthlyreview.org/2014/07/01/the-new-surveillance-normal/#en2http://monthlyreview.org/2014/07/01/the-new-surveillance-normal/#en3http://monthlyreview.org/2014/07/01/the-new-surveillance-normal/#en3http://monthlyreview.org/2014/07/01/the-new-surveillance-normal/#en3http://monthlyreview.org/2014/07/01/the-new-surveillance-normal/#en4http://monthlyreview.org/2014/07/01/the-new-surveillance-normal/#en4http://monthlyreview.org/2014/07/01/the-new-surveillance-normal/#en4http://monthlyreview.org/2014/07/01/the-new-surveillance-normal/#en5http://monthlyreview.org/2014/07/01/the-new-surveillance-normal/#en5http://monthlyreview.org/2014/07/01/the-new-surveillance-normal/#en5http://monthlyreview.org/2014/07/01/the-new-surveillance-normal/#en6http://monthlyreview.org/2014/07/01/the-new-surveillance-normal/#en6http://monthlyreview.org/2014/07/01/the-new-surveillance-normal/#en7http://monthlyreview.org/2014/07/01/the-new-surveillance-normal/#en7http://monthlyreview.org/2014/07/01/the-new-surveillance-normal/#en7http://monthlyreview.org/2014/07/01/the-new-surveillance-normal/#en9http://monthlyreview.org/2014/07/01/the-new-surveillance-normal/#en8http://monthlyreview.org/2014/07/01/the-new-surveillance-normal/#en8http://monthlyreview.org/2014/07/01/the-new-surveillance-normal/#en8http://monthlyreview.org/2014/07/01/the-new-surveillance-normal/#en9http://monthlyreview.org/2014/07/01/the-new-surveillance-normal/#en9http://monthlyreview.org/2014/07/01/the-new-surveillance-normal/#en9http://monthlyreview.org/2014/07/01/the-new-surveillance-normal/#en10http://monthlyreview.org/2014/07/01/the-new-surveillance-normal/#en10http://monthlyreview.org/2014/07/01/the-new-surveillance-normal/#en10http://monthlyreview.org/2014/07/01/the-new-surveillance-normal/#en11http://monthlyreview.org/2014/07/01/the-new-surveillance-normal/#en11http://monthlyreview.org/2014/07/01/the-new-surveillance-normal/#en11http://monthlyreview.org/2014/07/01/the-new-surveillance-normal/#en13http://monthlyreview.org/2014/07/01/the-new-surveillance-normal/#en12http://monthlyreview.org/2014/07/01/the-new-surveillance-normal/#en12http://monthlyreview.org/2014/07/01/the-new-surveillance-normal/#en12http://monthlyreview.org/2014/07/01/the-new-surveillance-normal/#en14http://monthlyreview.org/2014/07/01/the-new-surveillance-normal/#en13http://monthlyreview.org/2014/07/01/the-new-surveillance-normal/#en13http://monthlyreview.org/2014/07/01/the-new-surveillance-normal/#en13http://monthlyreview.org/2014/07/01/the-new-surveillance-normal/#en14http://monthlyreview.org/2014/07/01/the-new-surveillance-normal/#en14http://monthlyreview.org/2014/07/01/the-new-surveillance-normal/#en16http://monthlyreview.org/2014/07/01/the-new-surveillance-normal/#en15http://monthlyreview.org/2014/07/01/the-new-surveillance-normal/#en15http://monthlyreview.org/2014/07/01/the-new-surveillance-normal/#en15http://monthlyreview.org/2014/07/01/the-new-surveillance-normal/#en16http://monthlyreview.org/2014/07/01/the-new-surveillance-normal/#en16http://monthlyreview.org/2014/07/01/the-new-surveillance-normal/#en16http://monthlyreview.org/2014/07/01/the-new-surveillance-normal/#en17http://monthlyreview.org/2014/07/01/the-new-surveillance-normal/#en17http://monthlyreview.org/2014/07/01/the-new-surveillance-normal/#en17http://monthlyreview.org/2014/07/01/the-new-surveillance-normal/#en18http://monthlyreview.org/2014/07/01/the-new-surveillance-normal/#en18http://monthlyreview.org/2014/07/01/the-new-surveillance-normal/#en18http://monthlyreview.org/2014/07/01/the-new-surveillance-normal/#en20http://monthlyreview.org/2014/07/01/the-new-surveillance-normal/#en19http://monthlyreview.org/2014/07/01/the-new-surveillance-normal/#en19http://monthlyreview.org/2014/07/01/the-new-surveillance-normal/#en19http://monthlyreview.org/2014/07/01/the-new-surveillance-normal/#en20http://monthlyreview.org/2014/07/01/the-new-surveillance-normal/#en20http://monthlyreview.org/2014/07/01/the-new-surveillance-normal/#en20http://monthlyreview.org/2014/07/01/the-new-surveillance-normal/#en21http://monthlyreview.org/2014/07/01/the-new-surveillance-normal/#en21http://monthlyreview.org/2014/07/01/the-new-surveillance-normal/#en21http://monthlyreview.org/2014/07/01/the-new-surveillance-normal/#en22http://monthlyreview.org/2014/07/01/the-new-surveillance-normal/#en22http://monthlyreview.org/2014/07/01/the-new-surveillance-normal/#en22http://monthlyreview.org/2014/07/01/the-new-surveillance-normal/#en22http://monthlyreview.org/2014/07/01/the-new-surveillance-normal/#en23http://monthlyreview.org/2014/07/01/the-new-surveillance-normal/#en23http://monthlyreview.org/2014/07/01/the-new-surveillance-normal/#en23http://monthlyreview.org/2014/07/01/the-new-surveillance-normal/#en23http://monthlyreview.org/2014/07/01/the-new-surveillance-normal/#en25http://monthlyreview.org/2014/07/01/the-new-surveillance-normal/#en24http://monthlyreview.org/2014/07/01/the-new-surveillance-normal/#en24http://monthlyreview.org/2014/07/01/the-new-surveillance-normal/#en24http://monthlyreview.org/2014/07/01/the-new-surveillance-normal/#en26http://monthlyreview.org/2014/07/01/the-new-surveillance-normal/#en25http://monthlyreview.org/2014/07/01/the-new-surveillance-normal/#en25http://monthlyreview.org/2014/07/01/the-new-surveillance-normal/#en25http://monthlyreview.org/2014/07/01/the-new-surveillance-normal/#en26http://monthlyreview.org/2014/07/01/the-new-surveillance-normal/#en26http://monthlyreview.org/2014/07/01/the-new-surveillance-normal/#en26http://monthlyreview.org/2014/07/01/the-new-surveillance-normal/#en1http://monthlyreview.org/2014/07/01/the-new-surveillance-normal/#en2http://monthlyreview.org/2014/07/01/the-new-surveillance-normal/#en3http://monthlyreview.org/2014/07/01/the-new-surveillance-normal/#en4http://monthlyreview.org/2014/07/01/the-new-surveillance-normal/#en5http://monthlyreview.org/2014/07/01/the-new-surveillance-normal/#en6http://monthlyreview.org/2014/07/01/the-new-surveillance-normal/#en7http://monthlyreview.org/2014/07/01/the-new-surveillance-normal/#en8http://monthlyreview.org/2014/07/01/the-new-surveillance-normal/#en9http://monthlyreview.org/2014/07/01/the-new-surveillance-normal/#en10http://monthlyreview.org/2014/07/01/the-new-surveillance-normal/#en11http://monthlyreview.org/2014/07/01/the-new-surveillance-normal/#en12http://monthlyreview.org/2014/07/01/the-new-surveillance-normal/#en13http://monthlyreview.org/2014/07/01/the-new-surveillance-normal/#en14http://monthlyreview.org/2014/07/01/the-new-surveillance-normal/#en15http://monthlyreview.org/2014/07/01/the-new-surveillance-normal/#en16http://monthlyreview.org/2014/07/01/the-new-surveillance-normal/#en17http://monthlyreview.org/2014/07/01/the-new-surveillance-normal/#en18http://monthlyreview.org/2014/07/01/the-new-surveillance-normal/#en19http://monthlyreview.org/2014/07/01/the-new-surveillance-normal/#en20http://monthlyreview.org/2014/07/01/the-new-surveillance-normal/#en21http://monthlyreview.org/2014/07/01/the-new-surveillance-normal/#en22http://monthlyreview.org/2014/07/01/the-new-surveillance-normal/#en23http://monthlyreview.org/2014/07/01/the-new-surveillance-normal/#en24http://monthlyreview.org/2014/07/01/the-new-surveillance-normal/#en25http://monthlyreview.org/2014/07/01/the-new-surveillance-normal/#en26
  • 7/25/2019 Bulk Data Affirmative - JDI 2015

    14/211

    the signiicant li(itations hin"ering analysis o the intentionally secret actiities o intelligenceagencies operating outsi"e o pulic accountaility an" syste(s o legal accountaility, the"ocu(ents (a"e aailale y *histlelo*ers liDe &no*"en an" WiDi9eaDs, an" Dno*le"ge opast intelligence agencies6 actiities, proi"e inor(ation that can help us "eelop a useulra(e*orD or consi"ering the uses to *hich these ne* inasie electronic sureillancetechnologies can e put. We nee" a theory o sureillance that incorporates the political econo(yo the @.&. national security state an" the corporate interests *hich it seres an" protects . &uchanalysis nee"s an econo(ic oun"ation an" a ie* that looDs eyon" cultural categoriesseparating co((erce an" state security syste(s "esigne" to protect capital.The (eta"ata,aluale priate corporate "ata, an" ruits o in"ustrial espionage gathere" un"er P%&M an"otherN&' progra(s allpro"uce ino r(ation o such a high alue that it see(s liDely so(e o it*ill e use" in a context o gloal capital . t (atters little *hat legal restrictions are in placeK in agloal, high+tech, capitalist econo(y such inor(ation is inarialy co((o"iie". t is liDely toe use" to$ acilitate in"ustrial or corporate saotage operations o the sort inlicte" y the&tuxnet *or(K steal either corporate secrets or N&' use, or oreign corporate secrets or @.&.corporate useK (aDe inest(ents y intelligence agencies inancing their o*n operationsK orsecure personal inancial gain y in"ii"uals *orDing in the intelligence sector. The rise o ne* inasie technologiescoinci"es *ith the "ecline o i"eological resistance to sureillance an" the co(pilation o (eta"ata. The spee" o '(ericans6 a"option o i"eologies e(racing preiously unthinDale leels o corporate an" statesureillance suggests a continue" pulic acceptance o a ne* sureillance nor(al *ill continue to "eelop *ith l ittle resistance. n a *orl" *here t he B' can hacD the co(puters o &enator

  • 7/25/2019 Bulk Data Affirmative - JDI 2015

    15/211

    2A !ry or 'ieIts !ry or die for the affFoster G5John 7ella(y in the May]June 200/ issue o

  • 7/25/2019 Bulk Data Affirmative - JDI 2015

    16/211

    2A &olves !errorismapitalist ine6(alities are the root ca(se of terrorism.Slater 6(*hi!ip, 10/+5/6 Former professor and chair, Brandeis Sociology Department, Google,DOA 6/22/15 !he -oot Causes of errorism and .h No ne .ants to nd

    hem http2//www$hu3ngtonpost$4om/phi!ips!ater/theroot4ausesofterror'7+866$htm!//9'u4Eeryone talDs aout ighting terroris( at the roots, ut no one "oes anything aout it . ts(uch easier++an" reliees (ore anxiety an" rustration++to go o( so(eo"y. MaDing U*arU on terroris( is a lot liDe taDing acouple o "rinDs to cure a hangoer ++an enAoyale short+ter( solution an" a "isastrouslong+ter( one.7ut long+ter( solutions hae neer pl aye" *ell in Washington, the lan" o the HuicD ix. Nor *ith the '(erican pulic or that (atter++ourinstant+gratiication consu(er society has a ey o corporations co(peting to (aDe thatinstant een shorter. The people *ho "o (ost t o o(ent terroris( are not the un"a(entalist i(a(s an" ayatollahs, *ho only exploit the hopelessness aroun"the(. Thepeople *ho "o the (ost are those *ho create that hopelessness in the irst place ++the oil (onarchies, or exa(ple.

  • 7/25/2019 Bulk Data Affirmative - JDI 2015

    17/211

    A! FA &olves apIf requested, telecommunication companies are requiredto provide data information to the federal governmentPease 6!"

    : ;r$ %aro!d *ease, e#pert on the )nited States Constitution, who has taughthistor and po!iti4a! s4ien4e from this perspe4ti&e for o&er +5 ears at aftCo!!ege< June 1=$ +015< %ar!andai!$4omnd the new sp !aw more hpe than su'stan4e with on! s!ight! !ess intrusi&e sping !aws than the

    pre&ious 4iti?en sp !aw @ he *atriot A4t. Private communications are still

    con#scated and stored against the $ill of its o$ner and

    $ithout probable cause or $arrant. n4e a 4onspira4 theor, unti! dwardSnowden, two ears ago, pro&ided the indisputa'!e e&iden4e that the go&ernment a4ti&e! spies on its ownpeop!e in the freest !and in the wor!d$ ;eep rwe!!ian go&ernmenta! intrusion into the !i&es of inno4entAmeri4ans is the new norma! and is to 4ontinue as 'efore with one diBeren4e$ he notorious Se4tion +15,

    authori?ing 'u! data 4o!!e4tion, was changed requiring private

    telecommunication companies to collect the bul% data &it is

    no$ illegal for them not to' and store the information

    themselves at their o$n e(pense, rather than to immediately

    give it to the government as before. Ama?ing! this is just after a )S ;epartmentof Justi4e report re&ea!ed the ": did not identif an major 4ase de&e!opments that resu!ted from use ofthe re4ords o'tained in response to Se4tion +15 orders$ f it has not he!ped the go&ernment 4at4h a sing!e'ad gu in a!! these ears, wh then do we do itD his is ne&er e#p!ained$ t must 'e a'out power$ Se4tion+15 was a!so used to tra4 >nan4ia! data and transa4tions and to o'tain 4ompaniesE nternet 'usinessre4ords$ t was dward Snowden who en!ightened us on the e#tent of its in&asi&eness to persona!information$ %e wrote2 he NSA has 'ui!t an infrastru4ture that a!!ows it to inter4ept a!most e&erthing$

    .ith this 4apa'i!it, the &ast majorit of human 4ommuni4ations are automati4a!! ingested withouttargeting$ f wanted to see our emai!s or our wifeEs phone, a!! ha&e to do is use inter4epts$ 4an get

    our emai!s, passwords, phone re4ords, 4redit 4ards$ )elecommunication companies

    no$ must provide the information $hen requested by the

    federal government. )hey have lost their freedom not to

    collect and not to give your private information. )hey are no$,

    in essence, agents of the federal government and bul% data

    collection continue under them. As su4h the *SA +reedom Act

    provides these corporations liability protection shou!d ou wish to sue fortheir dis4!osure of our sensiti&e information$ Some 4a!! it a she!! game< the federa! go&ernment sti!! gets

    our information just as 'efore$ *ro'a'! 4o!umnist ;anie! F4adams said it 'est in an arti4!e he"reedom A4t is .-S than the *atriot A4t, 'e4ause it turns private

    telecommunications companies into depositories of -precrime/

    data for future use of state security agencies0. n other words, anindi&idua! under no suspi4ion of an 4rime and thus deser&ing fu!! "ourth and "ifth Amendment prote4tionwi!! ne&erthe!ess >nd himse!f pro&iding e&iden4e against his future se!f shou!d that person e&er fa!! undersuspi4ion$ hat is not jurispruden4e in a free so4iet$ roni4a!! the +nd )$S$ Cir4uit Court of Appea!s justru!ed 'u! 4o!!e4tion of 4iti?ensE re4ords an i!!ega! a4t$ Congress ignored this ru!ing and essentia!! de4!ared

  • 7/25/2019 Bulk Data Affirmative - JDI 2015

    18/211

    the same pra4ti4e !ega! in the )SA "reedom A4t$ F4adams ass, %ow does maing an un4onstitutiona!and i!!ega! a4t into a !ega! one a 'ene>t to 4i&i! !i'ertiesD

  • 7/25/2019 Bulk Data Affirmative - JDI 2015

    19/211

    y%er &ec(rity Adv

  • 7/25/2019 Bulk Data Affirmative - JDI 2015

    20/211

    , E(lnera%le to Attac$ ;o#Infrastr(ct(re is v(lnera%le to attac$ no# targeted attac$s are occ(rringand #e do not have ade6(ate defenseAssante 1"

    Michael 'ssante. 11)11)2014. '(ericas Britical nrastructure s ulnerale To Byer 'ttacDs.http$))***.ores.co()sites)realspin)2014)11)11)a(ericas+critical+inrastructure+is+ulnerale+to+cyer+attacDs)3Mr. 'ssante is"irector o n"ustrial Bontrol &yste(s as *ell as &uperisory Bontrol an" 5ata 'cHuisition Net*orDs or the &'N& nstitute.;

    Americas critical infrastr(ct(re 8the (tilities refineries military defense systems #ater treatment plants and other facilities on #hich #e depend every day8has%ecome its soft (nder%elly the place #here #e are no# most v(lnera%le to attac$.?!er the past 2/ years, h(ndreds of tho(sands of analog controls in these acilities have %eenreplaced #ith digital systems.5igital controls proi"e acility operators an" (anagers *ith re(ote isiility an"control oer eery aspect o their operations, inclu"ing the lo*s an" pressures in reineries, the generation an" trans(ission o po*erin the electrical gri", an" the te(peratures in nuclear cooling to*ers. n "oing so, they hae (a"e in"ustrial acilities (ore eicient

    an" (ore pro"uctie.?7ut the sa(e connectivitythat (anagers use to collect "ata an" control "eices allo#s cy%erattac$ers to get into control system net#or$s to steal sensitive information disr(pt

    processes and ca(se damage to e6(ipment. Kac$ers incl(ding those in hinaR(ssia and the @iddle )ast have ta$en notice. While early control syste( reaches *ere ran"o(,acci"ental inections, ind(strial control systems today have %ecome the o%0ect of targetedattac$s %y s$illed and persistent adversaries.?n"ustrial control syste(s are eing targete"?!herecently discovered Ind(strial ontrol &ystem mod(les of the KAE)X tro0an areone eample. !he mal#are infiltrated an indeterminate n(m%er of critical facilities%y attaching itself to soft#are (pdates distri%(ted %y control system man(fact(rers .When acilities "o*nloa"e" the up"ates to their net*orD, 'E use" open co((unication stan"ar"s to collect inor(ation ro(

    control "eices an" sen" that inor(ation to the attacDers or analysis. !his type of attac$ represents asignificant threat to confidential prod(ction data and corporate intellect(alproperty and may also %e an early indicator of an advanced targeted attac$ on anorgani/ations prod(ction control systems.?Other hac$s represent a direct threat tothe safety of ,.&. citi/ens. Earlier this year, the

  • 7/25/2019 Bulk Data Affirmative - JDI 2015

    21/211

    threats have movedeyon" (oies, cre"it car"s an" anD accounts tothe aility to hacD into comp(ter systems thatcontrol vital infrastr(ct(re.??While the nee" to a""ress cyer security reaches has resonate" *ith e"eral la*(aDers, signiicant change to thecountry6s cyer security lan"scape hit a goern(ent roa"locD as Bongress struggle" to un"erstan" ho* (uch change priate in"ustry an" the pulic is*illing to accept.?' ill y Baliornia &en. 5ianne

  • 7/25/2019 Bulk Data Affirmative - JDI 2015

    22/211

    ?in$ Bea$ened )ncryption;&A %(l$ data collection has #ea$ened cy%er sec(rity it gives a roadmap tohac$ers and has #ea$ened encryption programs'onah(e 1" 3Eileen,+ isiting scholar at &tanor" @niersitys ;What is (ost "isconcerting is that the ;&As mass s(rveillance techni6(es havecompromised the sec(rity of telecomm(nication net#or$s social media platformsprivate-sector data storage and p(%lic infrastr(ct(re sec(rity systems.A(thoritarian governments and hac$ers no# have a roadmap tosurreptitiously tapinto private net#or$sor their o*n nearious purposes.? +y #ea$ening encryptionprograms and planting %ac$door entries to encryption soft#are the ;&A hasdemonstrated ho# it is possi%le to infiltrate and violate information-sec(ritysystems .n eect, the spy agency has (o"ele" anarchic ehaior that (aDes eeryone less sae.?

    ;&A s(rveillance techni6(es are deli%erately #ea$ening cy%er sec(rity no#

    only ending %(l$ data collection red(ces v(lnera%ilityNehl 1"5anielle Oehl. J@9F #1 2014. o* the N&' urts !ur Econo(y, Byersecurity, an"

  • 7/25/2019 Bulk Data Affirmative - JDI 2015

    23/211

  • 7/25/2019 Bulk Data Affirmative - JDI 2015

    24/211

    ?in$ hinese Attac$hina has the reso(rces and access to attac$ no#@aloof 12 percent ofthe #orlds comm(nications giving it the a%ility to (nderta$e remote ind(strialespionage and even sa%otage electronically of critical infrastr(ct(res in the , nited& tates and in other ind(striali/ed co(ntries. !he hinese government and itsDeoples ?i%eration Army are ac6(iring the access thro(gh t#o hinese companiesK(a#ei !ech nologies o. ?td and C!) orporation , teleco((unications experts hae tol" WN5. Withthis access, the sources say, the Bhinese are *orDing on the other 20 percent. !he t#o companies give thehinese remote electronic 3%ac$door4 access thro(gh the e6(ipment they have

    installed in telecomm(nications net#or$s in 1"> co(ntries . The Bhinese co(panies serice 4/ o the*orl"6s /0 largest teleco( operators. 'uthors 7rett M. 5ecDer an" 7ill Triplett cut through the og o soothing, pro+Bhina propagan"ato reeal the truth, in =7o*ing to 7eiAing.> n 2000, ua*ei *as irtually unDno*n outsi"e Bhina, ut y 200- it ha" gro*n to e oneo the largest, secon" only to Ericsson. 's a conseHuence, sources say that any inor(ation traersing =any> ua*ei eHuippe" net*orDisn6t sae unless it has (ilitary encryption. !ne source *arne", =een then, there is no "out that the Bhinese are *orDing ery har" to"ecipher anything encrypte" that they intercept.>

    hina can attac$ o(r systems no# an attac$ #o(ld #ea$en o(r military andsa%otage #eapons systems@aloof 12 the report sai", =consistently i"entiy logistics an" B4&% inrastructure as @.&. strategic centers o graity suggesting

    http://www.wnd.com/2012/07/chinese-have-pervasive-access-to-80-of-worlds-telecoms/http://www.wnd.com/2012/07/chinese-have-pervasive-access-to-80-of-worlds-telecoms/http://www.wnd.com/2012/07/chinese-have-pervasive-access-to-80-of-worlds-telecoms/http://www.wnd.com/2012/07/chinese-have-pervasive-access-to-80-of-worlds-telecoms/
  • 7/25/2019 Bulk Data Affirmative - JDI 2015

    25/211

    that D?A commanders #ill almost certainly attempt to target these systems #ith %othelectronic co(ntermeas(re #eapons and net#or$ attac$ and eploitation toolsliDely ina"ance o actual co(at to delay ,.&. entry or degrade capa%ilities in a conflict.> The report, title"=!ccupying the nor(ation igh Groun"$ Bhinese Bapailities or Bo(puter Net*orD !perations an" Byer Espionage,> sai" that

    many of the findingsactually came from hinese so(rce materials incl(ding

    a(thoritative D?A p(%lications. While ua*ei has "enie" to WN5 that it has capailities that are o concern to theouse ntelligence Bo((ittee, so(rces point to a partic(lar technology that K(a#ei hasdeveloped called 'eep Dac$et Inspection or 5P, #hich gives itan" ITE capa%ilities thatpose potential threats to ,.&. sec(rity. 'DI is the $ey technology in high-capacitydata interception and mining, accor"ing to a WN5 source *ho ie*e" ua*ei6s Po*erPoint presentation. The entire(atter eca(e an issue *hen ua*ei last

  • 7/25/2019 Bulk Data Affirmative - JDI 2015

    26/211

    Internal ?in$ y%er Attac$onventional Attac$y%er #ar increases li$elihood of conventional #arlar$e and Nna$e 1>%ichar" BlarDe an" %oert O. OnaDe 2010 Byer War$ The Next Threat To National &ecurity 'n" What To 5o 'out thttp$))***.npr.org)te(plates)story)story.phpstory"b120-0#8 3%ichar" '. BlarDe is an internationally+recogni:e" expert on

    security, inclu"ing ho(elan" security, national security, cyer security, an" counterterroris(. BlarDe sere" three Presi"ents as asenior White ouse '"isor. Prior to his White ouse years, BlarDe sere" or 1- years in the Pentagon, the ntelligence Bo((unity,an" &tate 5epart(ent. %oert O. OnaDe is an international aairs ello* in resi"ence at the Bouncil on

  • 7/25/2019 Bulk Data Affirmative - JDI 2015

    27/211

    co(ntry,U accor"ing to the report, *hich the Pentagon is (an"ate" to co(plete un"er the 2011 5eense 'uthori:ation 'ct. The5eense 5epart(ent operates a (assie net*orD eniron(ent, *ith (ore than 1/,000 co(puter net*orDs consisting o seen (illionco(puters scattere" aroun" the *orl", 'r(y Gen. Oeith 'lexan"er, hea" o the National &ecurity 'gency 3N&'; an" co((an"er o

    @.&. Byer Bo((an", tol" eWEEO recently. 'efense officials have stated in the past that thenet#or$s are pro%ed millions of times a day trying to find and etract data . !ne "eenseco(pany lost (ore than 24,000 iles as part o a net*orD reach in March. !he report reserves the right todefend not 0(st the nation %(t vario(s other related interests as #ellU sai" Ba(eron Ba(p,a security researcher at E&ET, noting that the policy #o(ld cover the (se of proy force so long as itcan %e considered as %eing in o(r interests. The @nite" &tates *ill con"uct a (ilitary striDe only *henall other options hae een exhauste" an" only *hen the risDs o not "oing anything out*eigh the risDs o acting, the report sai". Thecyer+operations *ill still ollo* the sa(e rules o ar(e" conlict the "eense "epart(ent ollo*s or UDineticU *arare on the groun",accor"ing to the Pentagon.

    y%er Attac$s #ill lead to a #ar cy%er damages #ill %e #eighed as physicaldamagesB&Q 11Lhttp$))online.*sA.co()article)&7100014240/202#04/#104/#//2#1#/8218.ht(l, May #0, 2011, Byer Bo(at$ 'ct o War,&!7'N G!%M'N 'n" J@9'N E. 7'%NE&U'ct o *arU is a political phrase, not a legal ter(, sai" Bharles 5unlap, a retire" 'ir

  • 7/25/2019 Bulk Data Affirmative - JDI 2015

    28/211

    Impact hina Bar,.&.-hina #ar leads to etinction&traits !imes >>June 2/, 2000 lexis &traits Ti(es

    TE high+intensity scenario postulates a cross+strait *ar escalating into a ull+scale #ar %et#een the ,& and hina. Washington *ere to conclu"e that splitting Bhina *oul" etter sere its national interests, then a ull+scale *ar eco(es

    unaoi"ale. Bonlict on such a scale #o(ld em%roil other co(ntries ar an" near and++ horror o horrors ++raise the possi%ility of a n(clear #ar. 7eiAing has alrea"y tol" the @& an" Japan priately that it consi"ers anycountry proi"ing ases an" logistics support to any @& orces attacDing Bhina as elligerent parties open to its retaliation. n the

    region, this (eans &outh Oorea, Japan, the Philippines an", to a lesser extent, &ingapore. Bhina *ere to retaliate, east Asia#ill %e set on fire. 'n" the conlagration (ay not en" there as opport(nistic po#ers else#here maytry to overt(rn the eisting #orld order. With the @& "istracte", %ussia (ay seeD to re"eine Europes politicallan"scape. The alance o po*er in the Mi""le East (ay e si(ilarly upset y the liDes o raH. n south 'sia, hostilities et*een n"iaan" PaDistan, each ar(e" *ith its o*n nuclear arsenal, coul" enter a ne* an" "angerous phase. Will a ull+scale &ino+@& *ar lea" to anuclear *ar 'ccor"ing to General Matthe* %i"ge*ay, co((an"er o the @& Eighth 'r(y *hich ought against the Bhinese in theOorean War, the @& ha" at the ti(e thought o using nuclear *eapons against Bhina to sae the @& ro( (ilitary "eeat. n his ooDThe Oorean War, a personal account o the (ilitary an" political aspects o the conlict an" its i(plications on uture @& oreign

    policy, Gen %i"ge*ay sai" that @& *as conronte" *ith t*o choices in Oorea ++ truce or a roa"ene" *ar, *hich coul" hae le" to theuse o nuclear *eapons. the @& ha" to resort to nuclear *eaponry to "eeat Bhina long eore the latter acHuire" a si(ilar capaility,

    there is little hope of #inning a #ar against hina/0 years later, short o using nuclear *eapons. The @&esti(ates that hina possesses a%o(t 2> n(clear #arheads that can destroy ma0orAmerican cities. +ei0ing also seems prepared to go for the n(clear option. A hinesemilitary officer disclosedrecently that +ei0ing #as considering a revie# of its non first(se principle regarding n(clear #eapons. MaAor+General Pan IhangHiang, presi"ent o the (ilitary+un"e"nstitute or &trategic &tu"ies, tol" a gathering at the Woo"ro* Wilson nternational Bentre or &cholars in Washington that although

    the goern(ent still ai"e" y that principle, there *ere strong pressures ro( the (ilitary to "rop it. e sai" militaryleaders considered the (se of n(clear #eapons mandatory if the co(ntry ris$eddismem%ermentas a result o oreign interention. Gen %i"ge*ay sai" that sho(ld that come to pass #e

    #o(ld see the destr(ction of civili/ation .

  • 7/25/2019 Bulk Data Affirmative - JDI 2015

    29/211

    Impact y%er Barfare S9eneraly%erattac$ ca(ses #ar!(c$er 1"PatricD TucDer is technology e"itor or 5eense !ne. e6s also the author o The NaDe" release" We"nes"ay, sai" thecurrent preoccupation *ith cyer conlict is pro"uct o sot*are (erchants looDing to hype pulic anxiety against an eternallyunconHuerale threat. t6s the ol" phanto( o the =cyer Pearl aror,> a concept co((only cre"ite" to or(er 5eense &ecretary9eon Panetta ut that is actually as ol" as the *orl" *i"e *e. t "ates acD to security expert Winn &ch*artau6s testi(ony toBongress in 1--1, *hen he *arne" o an =electronic Pearl aror> an" sai" it *as =*aiting to occur.> More than t*o "eca"es later,*e6re still *aiting. The Pe* report oers, i nothing else, an opportunity to looD at ho* the cyer lan"scape has change" an" ho* it

    *ill continue to eole et*een no* an" 202/. Potential nrastructure ulnerailities A $ey concern for many of

    the eperts De# intervie#ed is infrastr(ct(re #here very real cy%er v(lnera%ilitiesdo eist and are gro#ing.&te*art 7aDer, or(er general counsel or the National &ecurity 'gency an" a partner atWashington, 5.B.+ase" la* ir( &teptoe Johnson tol" Pe*, =y%er#ar 0(st plain ma$es sense.Attac$ing the po#er grid or other ind(strial control systems is asymmetrical anddenia%le and devilishly effective . Dl(s it gets easier every year. Be (sed to #orrya%o(t R(ssia and hina ta$ing do#n o(r infrastr(ct(re. ;o# #e have to #orrya%o(t Iran and &yria and ;orth Norea .Next up$ e:ollah an" 'nony(ous.> Jere(y Epstein, a seniorco(puter scientist *orDing *ith the National &cience

  • 7/25/2019 Bulk Data Affirmative - JDI 2015

    30/211

    partic(larly relevant to red(cing the hair trigger post(re of eisting n(cleararsenals. 'll co(puters *hich are connecte" to the internet are susceptile to iniltration an" re(ote control. Bo(puters *hichoperate on a close" net*orD (ay also e co(pro(ise" y arious hacDer (etho"s, such as priilege escalation, roa(ing noteooDs,*ireless access points, e(e""e" exploits in sot*are an" har"*are, an" (aintenance entry points.

  • 7/25/2019 Bulk Data Affirmative - JDI 2015

    31/211

    Impact alc(l(sy%er attac$s are on par #ith n(clear #interInformation Bee$ nor(ation WeeD June 02, 200 The (pact ! Byer*arare http$))***.inor(ation*eeD.co()the+i(pact+o+cyer*arare)1--8001#1

    Byer*arare$ What *ill it looD liDe, ho* *ill *e "een" against it Those Huestions hae taDen on ne* urgency, as the possiilityeco(es (ore real. %ecently, the 7altic nation o )stonia s(ffered several #ee$s of distri%(ted denial-of-service attac$s against %oth government and private-sector Be% sites . 'n" late last(onth, a report ro( the 5epart(ent o 5eense sai" the Peoples 9ieration 'r(y o Bhina is uil"ing up its cyer*ararecapailities, een creating (al*are that coul" e use" against ene(y co(puter syste(s in irst+striDe attacDs. To "ate, there hae een

    no proen, "ocu(ente" cases o one nation attacDing another ia cyerspace. Fet cy%er#arfare is a chillingprospect thats treated among most nations #ith m(ch the same reverence asBol" War

    players treate" the idea of n(clear #inter mainly %eca(se of the potential large-scaleeconomic disr(ption that #o(ld follo# says o*ar" &ch(i"t, a former Bhite Ko(secy%ersec(rity adviser and former chief sec(rity officerat e+ay and @icrosoft. !his#o(ld incl(de shortages of s(pplies that co(ld affect %oth citi/ens and the military, he

    says. The cy%erattac$s against )stonia primarily targeted the government %an$ingmedia and police sites and they affected the f(nctioning of the rest of the net#or$infrastr(ct(rein Estonia,U the European Net*orD an" nor(ation &ecurity 'gency, or EN&', reporte" on its We site. 's aresult, targete" sites *ere inaccessile outsi"e o Estonia or exten"e" perio"s in or"er to ri"e out the attacDs an" to try an" (aintainserices *ithin the country.

    y%er attac$s have the highest pro%a%ility and magnit(de %illions ofattac$s e6(ita%le to a %om%Fo ;e#s 1>

  • 7/25/2019 Bulk Data Affirmative - JDI 2015

    32/211

    A=! 3y%er Attac$s in the Dast4!here is a distinction #e have engaged in limited #ar o(r evidence istal$ing a%o(t (nrestricted #ar&himaell et. Al. >2

    Ti(othy &hi(aell, Phil Willia(s Basey 5unley 2002 Bountering cyer *ar 3Ti(othy &hi(eall is a senior analyst *ith the BE%T'nalysis Benter o Barnegie Mellon @niersity, Pittsurgh, Pennsylania, *ith speciic interests in cyer *ar an" cyer terroris(.Phil Willia(s, a or(er N'T! ello*, is a proes+ sor at the @niersity o Pittsurgh an" a isiting scientist at the BE%T 'nalysisBenter. Basey 5unley is a or(er intelligence analyst, an" lea"s the BE%T 'nalysis Benter.;n this connection, it is *orth e(phasising that cyer *ar is not the "eace(ent o *e sites o*ne" y a rial nation, organisation or

    political (oe(ent. Een *hen they acco(pany other tensions or hostilities C as they "i" "uring N'T!6s Oosoo air ca(paign in

    1--- C such attacDs on *e sites are est un"erstoo" as a or( o harass(ent or graiti an" not as cyer *ar per se. !here are,neertheless, several levels of cy%er #ar o *hich three stan" out$ cy%er #ar as an ad0(nct tomilitary operationsL limited cy%er #arL and (nrestricted cy%er #ar .Bhen modernmilitary esta%lishments are involved in military hostilities a $ey o%0ective is toachieve information s(periority or information dominance in the %attle space. !hisre6(ires s(ppressing enemy air defences %loc$ing and=or destroying radar, an" the liDe.The ai(, in Blause*it:ian ter(s, is to increase the =og o *ar> or the ene(y an" to re"uce it or one6s o*n orces. This can e

    achiee" through "irect (ilitary striDes "esigne" to "egra"e the ene(y6s inor(ation+processing an" co((unications syste(s or yattacDing the syste(s internally to achiee, not "enial o serice, ut a "enial o capaility. n eect, this or( o cyer *arare

    ocuses al(ost exclusiely on (ilitary cyer targets. In a limited cy%er #ar the informationinfrastr(ct(re is the medi(m target and #eapon of attac$ #ith little or no real-#orld action accompanying the attac$. 's the (e"iu( o attacD the informationinfrastr(ct(re forms the vector %y #hich the attac$ is delivered to the target C otenthrough interconnections et*een the ene(y an" its allies, using linDs or sharing resources or "ata, or through *i"e+area net*orDconnections. 'lternatiely, an insi"e agent (ight place (alicious sot*are "irectly on the ene(y6s net*orDs. 's the target o attacD,the inrastructure or(s a (eans y *hich the eectieness o the ene(y is re"uce". Net*orDs acilitate organisational (issions.

    'egrading net#or$ capacity inhi%its or prevents operations that depend on thenet#or$.5egra"ing the leel o serice on the net*orD coul" orce the ene(y to resort to acDup (eans or so(e operations,*hich (ight expose a""itional ulnerailities. 5egra"ing the Huality o the "ata on a net+ *orD (ight een orce the ene(y to

    Huestion the Huality o the inor(ation aailale to (aDe "ecisions. 's the *eapon o attacD, the inrastructure coul" e pererte" toattacD itsel C either ia the i(plantation o (ultiple pieces o (alicious sot*are, or ia "elierate actions that exploit *eaDnesses.

    ?imited cy%er #ar of this $ind co(ld %e designed to slo# an adversaryspreparations for military intervention as part of an economic #arfare campaign , or as

    part o the (anoeuring that typically acco(panies a crisis or conrontation et*een states. @ore serio(s, an" perhaps (oreliDely, than limited cy%er #ar is #hat can %e termed (nrestricted cy%er #ar a form of#arfare that has three ma0or characteristics. First it is comprehensive in scope andtarget coverage #ith no distinctions %et#een military and civilian targets or %et#eenthe home front and the fighting front. &econd (nrestricted cy%er #ar has physicalconse6(ences and cas(alties some of #hich #o(ld res(lt from attac$s deli%eratelyintended to create mayhem and destr(ction and some of #hich #o(ld res(lt from

    the erosion of #hat might %e termed civilian command and control capa%ilities inareas s(ch as air-traffic control emergency-service management #ater- reso(rcemanagement and po#er generation. !hird the economic and social impact 8 inaddition to the loss of life 8 co(ld %e profo(nd. An (nrestricted cy%er campaign#o(ldal(ost certainly %e directed primarily against the target co(ntrys critical nationalinfrastr(ct(re$ energy, transportation, inance, *ater, co((unications, e(ergency serices an" the inor+ (ationinrastructure itsel. t *oul" liDely cross oun"+ aries et*een goern(ent an" priate sectors, an", i sophisticate" an" coor"inate",

  • 7/25/2019 Bulk Data Affirmative - JDI 2015

    33/211

    *oul" hae oth i((e"iate i(pact an" "elaye" conseHuences. @lti(ately, a n (nrestricted cy%er attac$ #o(ldli$ely res(lt in significant loss of life as #ell as economic and social degradation.

  • 7/25/2019 Bulk Data Affirmative - JDI 2015

    34/211

    A=! 3;o hina Bar4hina and the ,& are preparing for #ar no# any accidental escalation #illtrigger conflict asymmetrical attac$s li$e cy%er #ar are a li$ely triggerDills%(ry 1"

    MB'E9 P99&7@%F. N!EM7E% 1#, 2014. Bhina an" the @nite" &tates 're Preparing orWar. http$))oreignpolicy.co()2014)11)1#)china+an"+the+unite"+states+are+preparing+or+*ar)3Michael Pillsury is the "irector o the Benter on Bhinese &trategy at the u"son nstitute;'t a No. 12 ne*s conerence in 7eiAing, General &ecretary o the Bo((unist Party i Jinping an" @.&. Presi"ent 7aracD !a(aagree" to notiy the other si"e eore (aAor (ilitary actiities, an" to "eelop a set o rules o ehaior or sea an" air encounters, in

    or"er to aoi" (ilitary conrontations in 'sia. UIts incredi%ly important that #e avoid inadvertentescalation,U 7en %ho"es, a @.&. "eputy national security a"isor, *as Huote" y the Wall &treet Journal as saying. 'nUaccidental circ(mstance,U he sai", co(ld lead into so(ething that coul" precipitate conflict.?&ho(ld #e really %e #orried a%o(t #ar %et#een the ,nite" &tates and hinaT :es .!er the lastour "eca"es o stu"ying Bhina I have spo$en #ith h(ndreds of mem%ers ofBhina6s (ilitary,thePeople6s 9ieration 'r(y 3D?A;, and read co(ntless hinese military 0o(rnalsan" strategy articles.

    hinese military and political leaders %elieve that their co(ntry is at the center ofAmerican #ar planning. n other *or"s, +ei0ing %elieves that the ,nite" &tates is readyingitself for the possi%ility of a conflict #ith hina 8 and that it m(st prepare for thatevent(ality.?!ensions are highnot Aust %eca(se of +ei0ings rapidly epanding military%(dget, or ecause the ,nite" &tates contin(es to commit a n increasingly high percentage ofits military assets to the Dacific as part o its UrealanceU strategy. %ather, the iggest prole( is hineseopacity. While it6s heartening to hear i agree to instruct the P9' to e (ore open *ith regar" to the @nite" &tates, it is "outulthis *ill lea" to any real changes. ?Washington is *illing to share a sustantial a(ount o (ilitary inor(ation *ith Bhina, in or"er toUre"uce the chances o (isco((unication, (isun"erstan"ing or (iscalculation,U as then @.&. 5eense &ecretary %oert Gates sai"

    "uring a January 2011 trip to 7eiAing. 7ut the hinese leadership *hich %enefits fromouscation an"asymmetric tactics ref(ses to comm(nicate its militarys intentions. Bhinese lea"ership,*hich eneits ro( ouscation an" asy((etric tactics, reuses to co((unicate its (ilitary6s intentions.?5espite repeate" entreaties

    ro( '(erican oicials, +ei0ing is (n#illing to tal$ a%o(t (any Dey (ilitary issues C liDe the scope an"intentions o its rapi" orce uil"up, "eelop(ent o technologies that coul" cripple '(erican naal orces in the region, an" itsmilitarys involvement in cy%erattac$s against the ,nite" &tates C that *oul" lo*er riction et*eenthe t*o si"es. 'n" so(eti(es, as in 2010 ater @.&. ar(s sales to Tai*an, 7eiAing reaDs o (ilitary+to+(ilitary contacts altogether C

    lea"ing to an especially trouling silence.?As a res(lt there is a gro#ing mistr(sto Bhina a(ong (anythoughtul people in the @.&. goern(ent. Bhinese (ilitary oicers hae co(plaine" to (e that Aournals o the '(erican *ar collegesno* eature articles on *ar *ith Bhina, an" ho* the @nite" &tates can *in. '

  • 7/25/2019 Bulk Data Affirmative - JDI 2015

    35/211

    'emocracy Adv

  • 7/25/2019 Bulk Data Affirmative - JDI 2015

    36/211

    2A +(l$ 'ata &olves +ac$sliding+(l$ collection violates the onstit(tion ca(ses %ac$sliding other nations#ill %ac$lash&orcher 15

    &'%' &!%BE%. May 201/. Bhristian &cience Monitor. nluencers$ Bongress shoul" en" N&'ulD "ata collection. http$))passco"e.cs(onitor.co()inluencers+sureillance 3This articlegathere" (ore than -0 high+proile security an" priacy experts or the nluencers Poll.;o*eer, they "iere" on the reasons *hy. U!#o years ago people learned that intelligence agencieshave %een indiscriminately collectingthe private recordso innocent people aroun" the *orl". !hisis a violation ofasic h(man rightsan" it (ust en",U sai" '(ie &tepanoich, senior policy counsel at 'ccess, ahu(an rights organi:ation.?eather West, ro( nternet peror(ance an" security co(pany Blou"

  • 7/25/2019 Bulk Data Affirmative - JDI 2015

    37/211

  • 7/25/2019 Bulk Data Affirmative - JDI 2015

    38/211

    cond(cted?(nder &ection 215 meets that standard. . %eco((en"ations or &ection 21/ Progra(?Recommendation 1. !he government sho(ld end its &ection 21/ %(l$ telephone?recordsprogram.?The &ection 215 %(l$ telephone records program is not s(staina%le from alegal or?policy perspective .'s outline" in this %eport, the programlacDs a iale legal oun"ation?un"er&ection 21/, implicates constit(tional concerns (nder the First and Fo(rth?

    Amendments raises serio(s threats to privacy and civil li%erties as a policy matterand has?sho#n only limited val(e.

  • 7/25/2019 Bulk Data Affirmative - JDI 2015

    39/211

  • 7/25/2019 Bulk Data Affirmative - JDI 2015

    40/211

  • 7/25/2019 Bulk Data Affirmative - JDI 2015

    41/211

    2A @odelingRed(ction of s(rveillance in the ,& %olsters democracy glo%allyDR9I! 1%eport an" %eco((en"ations o The Presi"ent6s %eie* Group on ntelligence an" Bo((unications Technologies. 12 5ece(er201#. 97E%TF 'N5 &EB@%TF N ' B'NGNG W!%95. https$))***.*hitehouse.go)sites)"eault)iles)"ocs)201#+12+

    12rginalreport.p"3!a(a issue" a Presi"ential Me(oran"u( instructing the 5irector o National ntelligence, Ja(es Blapper, toor( a U%eie* Group on ntelligence an" Bo((unications TechnologiesU. U The group inclu"e" or(er counter+terroris( c:ar%ichar" '. BlarDe, or(er 'cting Bentral ntelligence 'gency "irector Michael Morell, @niersity o Bhicago 9a* proessor Georey&tone, or(er a"(inistrator o the White ouse !ice o nor(ation an" %egulatory 'airs Bass &unstein an" or(er BhieBounselor or Priacy in the !ice o Manage(ent an" 7u"get Peter &*ire.;

    Protecting the %ight to Priacy. !he right to privacy is essential to a?free and self-governingsociety. The rise of modern technologies ma$es it?all the (ore important that democraticnations respect peoples?f(ndamental right to privacy *hich is a "eining part o in"ii"ual?security an"personal lierty.?Protecting 5e(ocracy, Biil 9ierties, an" the %ule o 9a*. Free?de%ate #ithin the , nited & tates isessential to the long-term vitality of?American democracy and helps %olster

    democracy glo%ally . )cessive?s(rveillance and (n0(stified secrecy can threatencivil li%erties p(%lic tr(st?and the core processes of democratic self-government.All parts of the?government incl(ding those that protect o(r national sec(rity m(st%e?s(%0ect to the r(le of la#.

    https://www.whitehouse.gov/sites/default/files/docs/2013-12-12_rg_final_report.pdfhttps://www.whitehouse.gov/sites/default/files/docs/2013-12-12_rg_final_report.pdfhttps://www.whitehouse.gov/sites/default/files/docs/2013-12-12_rg_final_report.pdfhttps://www.whitehouse.gov/sites/default/files/docs/2013-12-12_rg_final_report.pdf
  • 7/25/2019 Bulk Data Affirmative - JDI 2015

    42/211

  • 7/25/2019 Bulk Data Affirmative - JDI 2015

    43/211

  • 7/25/2019 Bulk Data Affirmative - JDI 2015

    44/211

    ?in$ Free !rade+(l$ data collection #ill disr(pt free trade and collapse the economyDR9I! 1%eport an" %eco((en"ations o The Presi"ent6s %eie* Group on ntelligence an" Bo((unications Technologies. 12 5ece(er201#. 97E%TF 'N5 &EB@%TF N ' B'NGNG W!%95. https$))***.*hitehouse.go)sites)"eault)iles)"ocs)201#+12+

    12rginalreport.p"3!a(a issue" a Presi"ential Me(oran"u( instructing the 5irector o National ntelligence, Ja(es Blapper, toor( a U%eie* Group on ntelligence an" Bo((unications TechnologiesU. U The group inclu"e" or(er counter+terroris( c:ar%ichar" '. BlarDe, or(er 'cting Bentral ntelligence 'gency "irector Michael Morell, @niersity o Bhicago 9a* proessor Georey&tone, or(er a"(inistrator o the White ouse !ice o nor(ation an" %egulatory 'airs Bass &unstein an" or(er BhieBounselor or Priacy in the !ice o Manage(ent an" 7u"get Peter &*ire.;

    %isDs to tra"e an" co((erce, inclu"ing international co((erce. Free?trade incl(ding free comm(nicationsis important to commerce and?economic gro#th. &(rveillance and the ac6(isition ofinformation might?have harmf(l effects on commerce especially if it disco(ragespeopleC?either citi:ens o the @nite" &tates or othersCfrom (sing certain?comm(nicationsproviders. If the government is #or$ing closely or?secretly #ith specific providers andi such providers cannot ass(re their?(sers thattheir comm(nications are safe andsec(re people might*ell?loo$ else#here. n principle, the economic damage co(ld %e

    severe .

    https://www.whitehouse.gov/sites/default/files/docs/2013-12-12_rg_final_report.pdfhttps://www.whitehouse.gov/sites/default/files/docs/2013-12-12_rg_final_report.pdfhttps://www.whitehouse.gov/sites/default/files/docs/2013-12-12_rg_final_report.pdfhttps://www.whitehouse.gov/sites/default/files/docs/2013-12-12_rg_final_report.pdf
  • 7/25/2019 Bulk Data Affirmative - JDI 2015

    45/211

    ?in$ !ech !radeReforming %(l$ data collection $ey to the economy c(stomers are leaving,& tech companies no# that collapses competitiveness and costs %illionsKir0i

  • 7/25/2019 Bulk Data Affirmative - JDI 2015

    46/211

    sai" that countries enacting these policies Uare hurting the(seles in the long ter( y cutting the(seles o ro( the esttechnology.U?Bastro sai" the passage o a reor( (easure last *eeD calle" the @&' *hile "oing little to a""ress the

    acDlash against @& tech co(panies.

  • 7/25/2019 Bulk Data Affirmative - JDI 2015

    47/211

    Racism Adv

  • 7/25/2019 Bulk Data Affirmative - JDI 2015

    48/211

    1A Adv &hellBell isolate t#o internals to racism

    'omestic s(rveillance is a form of islamic racism.

    ?ennard 1"Natasha Lennard 7/9/14 (author for Vice News also a freelancer for The New York Timess it! "lo#$htt%s&//news'ice'com/article/the)nsas)racist)tar#etin#)of)indiiduals)is)as)trou*lin#)as)indiscriminate)sureillance"e ahomie and follow her on twitter ) +natashalennard // k*uck

    ,eelations of the National -ecurit! .#enc!s massie sureillance %ro#rams hae hi#hli#hted

    how millions of ordinar! internet and %hone users that is0 non)criminal tar#ets hae had their communications data swe%t u% *! a ast0 indiscriminatedra#net' This has occasioned ustifia*le outra#e0 *ut the reaction has

    oershadowed discussion of how the N-. tar#ets actual indiiduals a %rocessthat 0 it turns out0 can *e 2uite discriminator!' .s 3 notedlast week0 if our national securit! statesdan#erousl! loose determination of what constitutes an imminent threat5 is an! indication0 we should *e as trou*led *!the N-.s tar#etin# of %articular %eo%le as we are *! its non)tar#eted s%!in#' Thelatest disclosurefrom The 3nterce%t

    clearl! illustrates wh!'6ith the N-. reform *ill0 %riac! is not on the menu' ,ead more here'.ccordin# to documentsleaked *! dward -nowden0 the N-. has *een s%!in# on fie distin#uished 8uslim).mericans under a law the orei#n 3ntelli#ence -ureillance .ct (3-.$ that

    is meant to tar#et international terrorists or forei#n a#ents'The inclusion of theemail accounts of these fie %eo%le in a s%readsheet listin# the tar#eted accountsof more than 70::: others *elies the N-.s claim that its in the *usiness of

    markin# onl! terrorist sus%ects' ;ere are the a#enc!s sus%ected terrorists5& aisal resident

  • 7/25/2019 Bulk Data Affirmative - JDI 2015

    49/211

  • 7/25/2019 Bulk Data Affirmative - JDI 2015

    50/211

    %resumes data in%uts to *e neutral' The! arent' 3n a raciall! discriminator! criminal ustice

    s!stem0 sureillance technolo#ies re%roduce inustice '

    &cenario One is )tinction

    Racism ca(ses etinctionFeagin resident).merican -ociolo#ical .ssociation, Systemic Racism: A Theory of Oppression, P !"

    ra4ism refuses to tae into a44ount !ogi4a! so!utions to 4risisE if theirauthors arenEt white$n"ee", this planet *ill not surie (uch longer i *e continue to rely so heaily on the*hite (en no* at the hel( or Dey i"eas, policies, an" actions in regar" to the *orl"6secology, econo(y, an" politics. &yste(ic racis( has Dille" not onlypeople , ut (anyi(portant hu(an alues , scores o excellent i"eas, an" countless innoations an"inentions. !ne nee" not e (elo"ra(atic to suggest that the surial o the planetliDely "epen"s on thespee"yeli(ination o racial oppressionan" other (aAor social oppressions.

    &cenario !#o is 'eh(mani/ationRacism is deh(mani/ing

    Neenahan >=e*ra Ieenahan0 >h= @niersit! of 6ollon#on#0 =ehumaniKation& understandin# the %aradoA of human interaction5

    htt%&//ro'uow'edu'au/c#i/iewcontent'c#iFarticleMBCconteAtMtheses //O.

    Racism f(nctions on a plane different to that of pre0(dice . Where preAu"ice is the expression oin"ii"uals6 nee"s, *ants an" "esires to estalish an" reinorce their i"entities as hu(an eings, it can e sai" that racis( is thecollectie expression o those sa(e nee"s, *ants an" "esires. ntrinsic to the (eaning o eing hu(an is i"entiication *ith an"

    attach(ent to a group ] racism reflects this aspect of %eing h(man . it can e sai" that the expression opreAu"ice is so(ething o a "eense o the i"entity o in"ii"uals *hen they experience their i"entity as eing threatene" in so(e *ay,then it (ay Austiiale e sai" that the expression o racist i"eologies is the "eense o the i"entity o the collectie. What is (ore,

    the instit(tionali/ation of racism f(nctions not only to reinforce that defense %(t alsoto 0(stify the original ideologies %y esta%lishing a social system #hich can %edescri%ed as a self-f(lfillment of the ideologies .

  • 7/25/2019 Bulk Data Affirmative - JDI 2015

    51/211

  • 7/25/2019 Bulk Data Affirmative - JDI 2015

    52/211

  • 7/25/2019 Bulk Data Affirmative - JDI 2015

    53/211

  • 7/25/2019 Bulk Data Affirmative - JDI 2015

    54/211

  • 7/25/2019 Bulk Data Affirmative - JDI 2015

    55/211

    (any elements of the philosophy of difference they elaorate" #ere transf(sedinto a continuingcollaoration, o *hich ' Thousan" Plateaus is the (ost recent pro"uct.

  • 7/25/2019 Bulk Data Affirmative - JDI 2015

    56/211

    2A Framing)thics come first ethical eval(ation is $ey to positively infl(ence c(lt(re+rimmer >&tee 7ri((er is e(ploye" as "irector o corporate co((unications or NiD&ot &yste(s Borp. in %eston, a. e is also a retire"senior pastor *ho is engage" in lea"ership coaching *hile pursuing a "octorate in strategic lea"ership at %egent @niersity. =The %ole

    o Ethics in 21st Bentury !rgani:ationshttp$))***.regent.e"u)aca")gloal)pulications)lao)issue11)ri((er.ht( ))I'

    More than si(ply a legal or (oral responsiility, ethics need to %ecome a n organi/ational priority .!rgani:ational lea"ers hae a lot on their (in"s in to"ay6s highly co(petitie *orl". They (ust Deep areast o rapi" technologicala"ance(ents, co(petitor6s pro"ucts an" serices, the eects o gloali:ation, an" opportunities an" threats *ithin their o*n in"ustry,to na(e the (ost oious. 9ea"ers (ust also Deep a constant eye on the (ission, ision, alues, culture, strategy an" goals o theiro*n organi:ations. n the (i"st o all o this co(plexity, it6s not easy to in" roo( on the organi:ational plate or another (aAor

    priority. o*eer,to s(cceed in the 21st cent(ry organi/ations #ill have to fig(re o(t ho#to ma$e ethics a priority. Driorities are those fe# things that are deemed mostimportant. Many things are i(portant, so(e (ore an" so(e less i(portant, ut only a e* things are (ost i(portant.)thical val(es need to achieve recognition as among the elite most importants(ccess factors in modern organi/ations .'s an organi:ational priority, ethics #ill not only affect

    decision-ma$ing %(t also and (ltimately instit(tional c(lt(re . To achiee this i"eal, there (ust ean align(ent process that integrates usiness ethics *ith (ission, ision, alues, strategies an" goals. Ethical alues are essentiallysocial in nature, thereore, this align(ent process *ill e concerne" *ith relationships an" "eining relational expectations. !hegoal of an ethical organi/ational c(lt(re is the greater good of all. nternal relationships et*eenlea"ers an" ollo*ers, as *ell as external relationships *ith clients, custo(ers, en"ors an" the co((unity are all pri:e". As ares(lt people are treated #ell consistently and an ethical c(lt(re emerges .To"ay6sorgani:ations nee" to a"ance eyon" a ie* o ethics as necessary or saeguar"ing their reputation an" therey aoi"ing a" (e"ia

    coerageK or as (ere co(pliance *ith orce" regulations. A great opport(nity a#aits organi/ations alertto the potential of ethical val(es in shaping the f(t(re .!ne illustration o this Din" o possiilitythinDing is oun" in a challenge put to the nternational !ly(pic Bo((ittee. !he challenge originates from agro#ing disill(sionment #ith the Olympic 9ames #hich has %ecome characteri/ed

    %y the #orst feat(res of the competitive c(lt(reJ #inning at any cost corr(ption andthe (nfair advantage of advanced nations3Milton+&(ith, 2002;. 'l(ost si(ultaneously on another ront,disenchantment #ith the social and ethical conse6(ences of glo%ali/ation isocc(rring. Milton+&(ith i"entiies the !ly(pic Ga(es as eing in a uniHue position to inluence society, =t is "iicult toconceie o another institution *ith the sa(e capacity as the !ly(pic Ga(es to positiely shape popular culture on a gloal scale>

    3Milton+&(ith, 2002, p. 1#1;. &ocietys desperate need for an ethical c(lt(re is everyorgani/ations opport(nity to infl(enc e social c(lt(re thro(gh theinstit(tionali/ation of ethical val(es . Bhen this occ(rs comm(nities %enefit fromthe positive infl(ences employees ta$e from their #or$place %ac$ to families friendsand associates.

    One in three %illion chance of n(clear terrorism--- @eans no magnit(de@(eller 1>John, proessor o political science at !hio &tate @niersity, Bal(ing !ur Nuclear Jitters, ssues in &cience Technology,Winter2010, ol. 2, ssue 2

    n contrast to these pre"ictions, terrorist groups see( to hae exhiite" only li(ite" "esire an"een less progress in going ato(ic. This (ay e ecause, ater rie exploration o the possileroutes, they , unliDe generations o alar(ists, hae "iscoere" that the tre(en"ous eort reHuire"is scarcely liDely to e successul.? The (ostplausile route or terrorists, accor"ing to (ost

  • 7/25/2019 Bulk Data Affirmative - JDI 2015

    57/211

    experts, *oul" e to (anuacture an ato(ic "eice the(seles ro( purloine" issile (aterial3plutoniu( or, (ore liDely, highly enriche" uraniu(;. This tasD, ho*eer, re(ains a "aunting one,reHuiring that a consi"erale series o "iicult hur"les e conHuere" an" in seHuence.? !utrightar(e" thet o issile (aterial is excee"ingly unliDely not only ecause o the resistance oguar"s, utecause chase *oul" e i((e"iate. ' (ore pro(ising approach *oul" e to corrupt insi"ers to s(uggleout the reHuire" sustances. o*eer, this reHuires the terrorists to pay o a host o gree"y cone"erates, inclu"ing roDers an"

    (oney+trans(itters, any one o *ho( coul" turn on the( or, either out o guile or inco(petence, urnish the( *ith stu that isuseless. nsi"ers (ight also consi"er the possiility that once the heist *as acco(plishe", the terrorists *oul", as analyst 7rian JenDins

    none too "elicately puts it, Uhae eery incentie to coer their trail, eginning *ith eli(inating their cone"erates.U? terrorists*ere so(eho* successul at otaining a suicient (ass o releant (aterial, they *oul" thenproaly hae to transport it a long "istance oer una(iliar terrain an" proaly *hile eingpursue" y security orces. Brossing international or"ers *oul" e acilitate" y ollo*ingestalishe" s(uggling routes, ut these are not as chaotic as they appear an" are oten un"er the*atch o suspicious an" careul cri(inal regulators. or"er personnel eca(e suspicious o the co((o"ity

    eing s(uggle", so(e o the( (ight in" it in their interest to "isrupt passage, perhaps to collect the ounteous re*ar" (oney that

    *oul" proaly e oere" y alar(e" goern(ents once the uraniu( thet ha" een "iscoere".? !nce outsi"e the country*ith their precious ooty, terrorists *oul" nee" to set up a large an" *ell+eHuippe" (achine shopto (anuacture a o( an" then to populate it *ith a ery select tea( o highly sDille" scientists,

    technicians, (achinists, an" a"(inistrators. The group *oul" hae to e asse(le" an" retaine" or the (onu(ental tasD *hile n oconseHuential suspicions *ere generate" a(ong rien"s, a(ily, an" police aout their curious an" su""en asence ro( nor(al pursuits acD ho(e.? Me(ers o the o(+uil"ing tea( *oul" also hae to e utterly "eote" to the cause, o course, an" they *oul" hae to e *illing to put their lies an" certainly their careers at high risD, ecause atertheir o( *as "iscoere" or explo"e" t hey *oul" proaly eco(e the targets o an i ntense *orl"*i"e "ragnet operation.? &o(e oserers hae insiste" t hat it *oul" e easy orterrorists to asse(le a cru"e o( i t hey coul" get enough issile (aterial. 7ut Bhristoph Wir: an" E((anuel Egger, t*o senior physicists in charge o nuclear issues at&*it:erlan"s &pie: 9aoratory, luntly conclu"e that the tasD Ucoul" har"ly e acco(plishe" y a sunational group.U They point out that precise lueprints are reHuire", not AustsDetches an" general i"eas, an" that een *i th a goo" lueprint the terrorist group *oul" (ost certainly e orce" to re"esign. They also stress that the *orD is "iicult, "angerous,an" extre(ely exacting, an" that the technical reHuire(ents in seeral iel"s erge on the uneasile. &tephen Founger, or(er "irector o nuclear *eapons research at 9os 'la(os9aoratories, has (a"e a si(ilar argu(ent, pointing out that uraniu( is Uexceptionally "iicult to (achineU *hereas Uplutoniu( is one o the (ost co(plex (etals eer"iscoere", a (aterial *hose asic properties are sensitie to exactly ho* it is processe".U &tressing the U"aunting prole(s associate" *ith (aterial purity, (achining, an" a hosto other issues,U Founger conclu"es, Uto thinD that a terrorist group, *orDing in isolation *ith an unreliale supply o electricity an" little access to tools an" suppliesU coul"

    aricate a o( Uis aretche" at est.U? @n"er the est circu(stances, the process o (aDing a o( coul" taDe(onths or een a year or (ore, *hich *oul", o course, hae to e carrie" out in utter secrecy. n a""ition, people in thearea, inclu"ing cri(inals, (ay osere *ith increasing curiosity an" pu::le(ent the constant co(ing an" going o techniciansunliDely to e locals.? the eort to uil" a o( *as successul, the inishe" pro"uct, *eighing a ton or (ore, *oul" then hae to

    e transporte" to an" s(uggle" into the releant target country *here it *oul" hae to e receie" y collaorators *ho are at oncetotally "e"icate" an" technically proicient at han"ling, (aintaining, "etonating, an" perhaps asse(ling the *eapon ater it arries.?

    The inancial costs o this extensie an" exten"e" operation coul" easilyeco(e (onu(ental.There *oul" e expensie eHuip(ent to uy, s(uggle, an" set up an" people to pay or pay o. &o(e operaties (ight *orD or reeout o utter "e"ication to the cause, ut the ast conspiracy also reHuires the suersion o a consi"erale array o cri(inals an"opportunists, each o *ho( has eery incentie to push the price or cooperation as high as possile. 'ny cri(inals co(petent an"capale enough to e eectie allies are also liDely to e oth s(art enough to see oun"less opportunities or extortion an"

    psychologically eHuippe" y their proession to e *illing to exploit the(.? Those *ho *arn aout the liDelihoo" o a terrorist o(conten" that a terrorist group coul", i *ith great "iiculty, oerco(e each ostacle an" that "oing so in each case is Unot i(possile.U

    7ut although it (ay not e i(possile to sur(ount each in"ii"ual step, the liDelihoo" that a groupcoul" sur(ount a series o the( HuicDlyeco(es anishingly s(all. Tale 1 atte(pts to catalogue the

    arriers that (ust e oerco(e un"er the scenario consi"ere" (ost liDely to e successul. n conte(plating the tasD eore the(,*oul"+e ato(ic terrorists *oul" eectiely e reHuire" to go though an exercise that looDs (uch liDe this. an" *hen they "o, they*ill un"oute"ly conclu"e that their prospects are "aunting an" accor"ingly uninspiring or een ter(inally "ispiriting.? t is possile

    to calculate the chances or success. '"opting proaility esti(ates that purposely an" heailyias the

    case in the terrorists aor C or exa(ple, assu(ing the terrorists hae a /0Q chance o oerco(ingeach o the 20 ostacles C the chances that a concerte" eort *oul" e successul co(es out toe less than one in a (illion . one assu(es, so(e*hat (ore realistically, that their chances ateach arrier are one in three, the cu(ulatie o""s that they *ill e ale to pull o the "ee" "ropto one in *ell oer three illion.? !ther routes *oul"+e terrorists (ight taDe to acHuire a o(are een (ore prole(atic. They are unliDely to e gien or sol" a o( y a generous liDe+(in"e" nuclear state or "eliery aroa" ecause the risD *oul" e high , een or a country le"y extre(ists, that the o( 3an" its source; *oul" e "iscoere" een eore "eliery or that it *oul" e

  • 7/25/2019 Bulk Data Affirmative - JDI 2015

    58/211

  • 7/25/2019 Bulk Data Affirmative - JDI 2015

    59/211

  • 7/25/2019 Bulk Data Affirmative - JDI 2015

    60/211

  • 7/25/2019 Bulk Data Affirmative - JDI 2015

    61/211

  • 7/25/2019 Bulk Data Affirmative - JDI 2015

    62/211

    2A Impact 'efenseD ollapse is inevita%le@attis 15] 3#)02)1/, Peter, e is a 3%eco((en"e"$Japans Master Plan to 5eeat Bhina in a War;'hea" o the @.&. inasion o raH in 200#, the National nt elligence Bouncilpro"uce" an assess(ent o raH6s political prospects ater &a""a( usseinell. The paper up"ate" a perio"ically up"ate" anal ysis egun in theearly 1-80s, an" it accurately analy:e" the sectarian rialries an" "o(estic cleaages that le* up un"er the post+&a""a( @.&. a"(inistration. t is not clear, ho*eer, *hether such a paper coul" e en e "one on Bhina to"ay, let alone in any accurate (anner. &uch a

    paper cannot e aout @yghurs an" Tietans, ut the 1.24 illion an Bhinese *ho ineitaly *ill "o(inate Bhina6s autocratic or "e(ocratic uture. The secon" is to "eelop, (aintain an" up"ate a "ataase o lea"ership "ossiers 3as *ell as their a(ilies; that inclu"espoints o leerage, such as oerseas assets that coul" e ro:en, as *ell as electronic an" telephonic contact inor(ation. The @.&. goern(ent is certainly as capale as7loo(ergan" theNe* ForD Ti(eso erreting out this Din" o inor(ation. the BBP isi(plo"ing, the tense situation *ill ensure that (any ca"res start thinDing in ter(s o their personal an" a(ily *elare, rather than the party. When surial is at staDe, the BBP6s institutional cohesion is liDely to alter as each looDs ater his o*n an" looDs to ensure thereis an escape hatch. n this Din" o situation, the aility to inluence 7eiAing6s "ecisions *ill e highly personali:e", an" the aility to oth contact an" shape the incenties o in"ii"ual "ecision (aDers in Ihongnanhai as *ell a s proincial lea"ers an" security oicialscoul" proe critical i Washington *ants to shape outco(es. 9iDe corporate an" nongoern(ental organi:ation "ataases, this proAect shoul" e acc o(panie" y recor"s o (eetings *ith @.&. oicials an" other pro(inent '(ericans. This *ay, Washington hasa*areness o *ho (ight hae an existing relationship an" can e calle" upon to reach out to a Bhinese oicial i the situation "e(an"s 3an" it (ight een help in routine negotiations to *hichBhinese interlocutors al*ays see( to co(e ette r prepare" *ith Dno*le"geo their @.&. counterparts;. t also reHuires the White ouse to e honest, at least *ith the @.&. ureaucracy, aout its "ealing *ith 7eiAingCso(ething that has not al*ays een the case in @.&.+Bhinese relations. Thir", "eter(ining the capaility o Bhina6s internal

    security orces, inclu"ing "o(estic intelligence an" para(ilitary capailities, is ital to un"erstan"ing *hether unrest is a pproaching a critical (ass. @ost st(dies of hinas f(t(re otenass(me the co(ntrys sec(rity services #ill f(nction, *ithout un"erstan"ing their aility toprotect the regi(e "epen"s on a luctuating "yna(ic that also inoles citi:en+actiists an"technology. political change co(es to Bhina through (ass pulic "e(onstrations, then it is ecause the assu(ptions hel" aout a loyal an" capale security a pparatus "i" not hol". %elate"ly, any "ecision or (ilitary interention *ill in ole at theery least the P9' hea"Huarters, i not the Bentral Military Bo((ission 3BMB;Cthe senior+(ost political+(ilitary policy+(aDing o"y chaire" y i Jinping. the or"er ro( the center co(es, the (ilitary lea"ership (ust (aDe a "ecision *hether to support thecurrent goern(ent, taDe po*er or the(seles or stan" asi"e. 'lthough (ost P9' oicers are party (e(ers, the relationship et*een the t*o organi:ations has change" sustantially since the "ays o Mao Ie"ong an" 5eng iaoping *hen the Bhinese lea"ership *as"o(inate" y "ual political+(ilitary elit es. The P9' (ay e "eeloping a proessional i"entity separate ro( its party i"entity. Exacerate" y the (ilitary6s relatie isolation ro( society on close" co(poun"s an" the asence o share" experiences, Bhina6s roust(ilitary (o"erni:ation has reHuire" P9' oicers to eco(e etter e"ucate" an" (ore proessional. the P9'6s proessionali:ation gies strength to the i"ea that the P9' shoul" e a national ar(y,then @.&. policy (aDers nee" to Dno*Can" they nee" to Dno* *ho isharoring such senti(ents.

  • 7/25/2019 Bulk Data Affirmative -