Professional Documents
Culture Documents
1AC
Plan
The United States federal government should curtail its
domestic surveillance by authorizing an Office of the
Special Advocate to challenge domestic surveillance
requests in the Foreign Intelligence Surveillance Court.
Democracy Advantage
The current FISA court is a rubber stamp that enables
mass domestic surveillance this undermines democracy,
due process, and the rule of law
Ben ONeill, 2/22/2014, [lecturer at the University of New South Wales in
Australia], Mises Institute: Austrian Economics, Freedom, and Peace. FISA,
the NSA, and Americas Secret Court System, https://mises.org/library/fisansa-and-america%E2%80%99s-secret-court-system, mm
We begin our analysis of the legal machinations of the NSA by looking at the secret court system which
supposedly practices judicial oversight over the agency.
Surveillance Court
was
purportedly created as an additional safeguard against unlawful
activity by US intelligence agencies, which had been found to have committed various
kinds of unlawful surveillance activities. The goal of the FISA court, as originally conceived,
was to place judicial oversight on the surveillance activities of the
NSA, by requiring the agency to obtain warrants from the court
before intercepting communications. This was to place the NSA under the same kind of
the Church Committee, composed after a series of intelligence scandals in the 1970s.2The court
legal constraints as regular police, with requirements for evidence being put before a court in order to
obtain a warrant for search. However, unlike the court system for regular police warrants, the judicial
system for the NSA is far more secretive. In order to give judicial scrutiny to preserve the secrecy of NSA
activities, the FISA court meets in secret with only government representatives present at its proceedings.
The hearings are closed to the public and the rulings of the judges are classified, and rarely released after
The judges in
the FISA court hear applications from a representative of the NSA, and ask
questions, allowing the agency to amend their applications to meet any shortcomings. Adversarial
argument from other parties is absent, since there are no other parties at the
the fact. (Some rulings have been partly declassified, but are still heavily redacted.)
hearing. Some of this is similar to the operation of public courts for regular police warrants, but there is a
great deal more secrecy, and a great deal more power granted to the government. One distinction
between the FISA Court, and regular public courts issuing warrants for police searches, is the type of
warrant system that is practiced under the FISA Court. For police searches it is generally the case that the
police will apply for a warrant to surveil a particular person, or a small group or people, and give some
evidence of probable cause for a search, i.e., the police must convince the court that there is reasonable
suspicion for surveillance on a case-by-case basis. Under the FISA Court the
NSA are much wider in scope. Many of the warrants authorize the collection of
communications data on a particular phone carrier, capturing the communications of millions of people
over sustained periods of time. Other warrants are procedure-based warrants which authorize a
proposed data-collection process, subject to various minimization procedures designed to confine the
other wiretap applications in state and federal courts is similarly low.4Though originally designed merely to
issue secret warrants for surveillance, the powers of the FISA Court have expanded over time, with a large
expansion of power occurring in 2008, when the Bush administration retroactively immunized any
electronic communication service provider from any liability for their complicity in unlawful NSA
government. Even in this latter function, the hearings have been closed to the public and have been
conducted with only the government giving arguments to the court. Hence, the government has had free
rein to be the only party represented at hearings which have purported to determine its own legal powers
the FISC
has basically become a parallel Supreme Court, but one which
under the US Constitution. For this reason, one commentator has noted that, [i]n truth,
this
secret court system has opened up opportunities for judicial capture
for the NSA. As noted by legal scholar Elizabeth Goitein, [l]ike any other group that meets in secret
behind closed doors with only one constituency appearing before them, theyre subject to capture and
bias.7 For former FISA court judge James Robertson, these remarks have rung true to such an extent that
he has publicly complained about the ex parte nature of the FISA court proceedings.8 According to this
that any criticisms against the unlawful actions of the NSA have been kept secret, and have been without
memorandum that was not available to the public until years later.10 (In fact, the opinion was only
declassified due to public pressure as a result of the Snowden leaks. If not for these leaks it is likely that
the opinion would still remain classified today.) In March 2009, following breaches of the courts orders, the
Chief Judge found that the testimony of General Keith Alexander setting out the NSA interpretation of the
courts orders strained credulity by interpreting a part of the orders as effectively being optional.11 He
also found that [t]he minimization procedures proposed by the government in each successive application
and approved and adopted as binding by the orders of the [FISA Court] have been so frequently and
systematically violated that it can fairly be said that this critical element of the overall [metadata] regime
has never functioned effectively.12Despite lacking confidence that the NSA would comply with future
orders, the Chief Judge allowed the mass collection of metadata to continue, and allowed the government
to continue to apply for access to this data on a case-by-case basis, or for imminent threats, until such
time as they completed a review of their procedures. The NSA completed their review and the regular
Some
commentators have taken this judicial rebuke by the FISA court as
proof of the toughness of the court on the NSA, but in fact, it is
proof of their subservience to the agency. Despite finding that there had been
systematic misrepresentations to the court by the NSA, no action was taken against
officials who had given false statements to the court. There was no
operation of the mass-surveillance program was restored shortly afterward.
disciplinary action of any kind against personnel of the agency, and the rebuke of the court remained a
private classified document, only available to the agency being criticized. NSA officials who had
systematically misled the court were free to read this rebuke knowing that no consequence would follow
from it, since no member of the public could read about their actions. When the matter was later exposed
to the public (as a result of the Snowden leaks) the Chief Judge complained that his court ... is forced to
The surveillance
programs of the NSA continued, with ongoing approval by the court,
after a short period of technical review conducted by the NSA. Such toughness as this is
what passes for checks and balances within the system of secret
courts. The dubious nature of the FISA court is well-understood
within the wider judicial system, a fact which was clear in the Klayman preliminary
rely upon the accuracy of the information that is provided to the Court.13
judgment. The stark distinction between the secretive FISA court and the public court system was
recognized by Judge Leon when he observed that, ... no court has ever recognized a special need
sufficient to justify continuous, daily searches of virtually every American citizen without any particularized
suspicion. In effect, the government urges me to be the first non-FISC judge to sanction such a
dragnet.14It is notable here that Judge Leon felt that it was significant that he was the first non-FISC
judge to consider the matter, a tacit recognition that the judgments of the FISC cannot be regarded as true
surveillance programs
by a secret court violates the requirement for due process of law .
According to Barnett, [s]ecret judicial proceedings adjudicating the rights
of private parties, without any ability to participate or even read the
legal opinions of the judges, is the antithesis of the due process of
constitutional scrutiny. Legal scholar Randy Barnett has argued that
When the USA Freedom Act was passed last week, it was hailed as the first major limit on NSA
surveillance powers in decades. Less talked about was the law's mandate to open a secret intelligence
court to unprecedented scrutiny. The Foreign Intelligence Surveillance Court, often known as the FISA
court after the 1978 law that created it, rules on government requests for surveillance of foreigners. Its 11
federal judges, appointed by the chief justice of the Supreme Court, consider the requests one at a time on
a rotating basis. In closed proceedings, they have approved nearly every one of the surveillance orders
that have come before the court, and their rulings are classified. Privacy advocates say those secret
deliberations have created a black box that keeps the public from seeing both why the government makes
key surveillance decisions and how it justifies them. But the new law passed by Congress last week may
shed some new light on these matters. "The larger step that the USA Freedom Act accomplishes is that it is
bringing those things out to the public," says Mark Jaycox, a legislative analyst at the Electronic Frontier
Foundation, a digital privacy advocacy group. The new law mandates that FISA court rulings that create
"novel and significant" changes to surveillance law be declassifiedand it is up to the judges to determine
if the cases reach that thresholdthough only after review by the attorney general and the director of
national intelligence. While FISA court rulings have been leaked and occasionally declassified, the new law
marks the first time Congress has attempted to make the court's decisions available to the public. The law
existence will be an important step. "We know we will see the order and potentially that an amicus [a
privacy panel member] is going to be there arguing against it. Those things are huge to us," Jaycox says.
But while the USA Freedom Act calls for important FISA court rulings will be made public, there's no
guarantee they will be. For one, final say on declassification still rests with the executive branch rather
than the judges themselves. And while the judges' input on the cases will still be importantif not
finalsays Liza Goitein, co-director of the Liberty and National Security Program at the Brennan Center for
Justice, they
government . In fact, advocates say, judges have always had the powers
outlined in the new lawto bring in consultants or recommend declassifying their opinions.
"This is something the FISA court could have done all along, " says Amie
Stepanovich, the US policy manager for privacy advocacy group Access. "They always could have chosen
to be more transparent in their proceedings." Privacy advocates hope that having these pre-existing
powers now written into law means that judges will actually use them, but even that isn't for certain. "I
the FISC must change, three stand out. First, FISA has
become a drastically more complicated law than when it was originally passed in
1978, and the role of the FISC has accordingly grown far beyond the
bounds of what Congress envisioned. Second, because of those changes, the FISC has
Among the myriad reasons
created a huge body of secret policy and legal precedent. Finally, the courts reliance on the government
to provide all the necessary information needed to fairly make decisions is not sufficient, something that is
painfully obvious as one reads the FISC decisions themselves. Its also something EFF has recently
experienced in our NSA cases. The courts mandate has expanded exponentially since 1978, especially
magistrate judges do with warrants now, with safeguards built in for the national security context. That
surveillance . This is key, because as current and former officials familiar with the courts
classified decisions told the New York Times in July of last year, the court is no longer
simply approving applications. It is regularly assessing broad
constitutional questions and establishing important judicial
precedents, with almost no public scrutiny," afecting millions of
innocent people. As former FISC judge James Robertson stated to the Privacy and Civil Liberties
governments revelations regarding the NSAs acquisition of Internet transactions mark the third instance
in less than three years in which the government has disclosed a substantial misrepresentation regarding
the scope of a major collection program, and noted repeated inaccurate statements made in the
earlier this year, when we discovered that the government had not even informed the FISC of its duties to
preserve evidence. In March, after an emergency hearing, a federal court in San Francisco ordered the
government to preserve records of Section 215 call details collection. On that same day, the FISC issued its
own strongly worded order in which it mandated the government to make a filing explaining exactly why it
had failed to notify the FISC about relevant information regarding preservation orders in two related cases,
Jewel and Shubert. This failure had affected the courts earlier ruling mandating that certain information be
destroyed.
Its clear that the FISC simply cant rely on the government
to get the full picture. The FISA Court must change in at least two ways: it needs
a true advocate for privacy and civil liberties in the court and it must have
institutionalized, systematic publication of significant opinions. As former FISC Judge James Carr has
the FISA court and the public would be best served by a more
empowered public advocateone who is authorized to appear even
without invitation from the government or the court, and, still more importantly, who is
entitled to full access to information relevant to her duties. This
would no doubt alter the current one-party procedures before the FISA
In fact,
court and
potentially
create documents useful for public oversight, too, flagging issues for congressional overseers and creating
reports subject to public disclosure. Intelligence legalism has proven unequal to the task of opposing the
about so far .
our name, a justice system compromised by attorneys' inability to speak freely with their clients, and "a
terrible example" for countries such as India, Pakistan and Ethiopia. "The
mostly non-journalistic writers that found many are also fearful of what they put in an email or say over the
phone, leading them to avoid charged issues like the Middle East. The new report, meanwhile, comes as
even allies such as Germany are increasingly expressing anger over U.S. spying. Through interviews with
46 journalists, the report's authors concluded government sources are increasingly less willing to share
information in response to revelations about the expansive U.S. surveillance state and the Obama
administration's unprecedented use of the Espionage Act in targeting leaks to media outlets. Jonathan
Landay, a veteran reporter for the McClatchy newspaper chain and one of the few journalists who
challenged the Bush administration's claims during the runup to the Iraq War, said, "This is the worst I've
seen in terms of the government's efforts to control information." An October report from the Committee
to Protect Journalists highlighted the unprecedented measures the Obama administration, which famously
pledged to be the most transparent in history, has taken to prevent unsanctioned leaks. The New York
Times' Charlie Savage said in Monday's report that "it is not lost on us, or on our sources, that there have
been eight criminal cases against sources" during the Obama years, as opposed to just three under all
previous administrations. The New Yorker's Jane Mayer said she "can't count the number of people afraid of
the legal implications" of speaking to her. Journalists who cover particularly sensitive beats such as
national security, intelligence and justice, are increasingly using encrypted communications or buying
throwaway "burner" phones to try to speak with sources in a way that won't leave an obvious digital trail.
But several journalists acknowledged that these precautions aren't foolproof and the adoption of such
tradecraft can make sources even more skittish. In the report, The Intercept's Peter Maass recalled
unsuccessfully asking a source to physically mail information instead of doing so electronically. "I made
him aware of the danger of being connected to me," he said. "As a result, I lost that story." Despite all
these measures aimed at trying to leave less of a trail back to sources, the report found that "not a single
journalist we spoke with believed they could defeat the most focused efforts by the government to discern
their activities." Adam Goldman, a Pulitzer Prize-winning reporter at The Washington Post whose work was
the subject of three leak investigations while at The Associated Press, said that "if the government wants
to get you, they will." "What are we supposed to do? Use multiple burners? No email? Dead drops?"
Goldman asked. "You can't be a journalist and do your job that way." Lawyers -- particularly those in
criminal defense -- felt the same way. "I'll be damned if I have to start acting like a drug dealer in order to
protect my client's confidentiality," said attorney Tom Durkin. In interviews with dozens of attorneys, the
report found that many are changing their habits in ways similar to journalists. But the results are
potentially even more grave in an arena where the very right to a fair trial is at stake. When the U.S.
government can pore through emails or phone calls between lawyers and their clients at will, the playing
field at trials could be permanently tilted against defendants. Even corporate firms are far from safe, the
report notes, citing a February New York Times report based on Snowden documents that the U.S.
government was monitoring communications between an American law firm and its client, the government
of Indonesia. The Intercept reported earlier this month that the government has been spying on Muslim
American lawyers. Witnesses in addition to clients are at risk, said Maj. Jason Wright, an Army lawyer who
represents Guantanamo Bay detainees. The military commissions there have been plagued by fears of an
FBI investigation that has probed a defense team. "We are fearful that our communications with witnesses
abroad are monitored," Wright said. Reaching out to witnesses thus "might put people in harm's way."
NSA's domestic call records program, although the report expressed caution about a weakened version of
a House bill meant to do that. Obama has the authority to rein in much of the surveillance targeted abroad
unilaterally by amending a 1981 Ronald Reagan executive order, the report noted. Government officials
told the human rights researchers that the safeguards in place protect both lawyers and journalists. They
also argued that the costs of surveillance are outweighed by the benefits to national security. Bob Deitz,
who was the NSA's top lawyer when the George W. Bush administration developed its warrantless
wiretapping program, put his view even more bluntly. National security journalists' sources, he argued,
should be worried. "Leaking is against the law. Good. I want criminals to be deterred," he said. "Does a
cop chill a burglar's inclination to burgle? Yes.'"
The world takes note of all this. Authoritarian state media gleefully
publicize these travails of American democracy in order to discredit
democracy in general and immunize authoritarian rule against U.S.
pressure. Even in weak states, autocrats perceive that the pressure
is now of : They can pretty much do whatever they want to censor the media, crush the
opposition, and perpetuate their rule, and Europe and the United States will swallow it. Meek verbal
protests may ensue, but the aid will still flow and the dictators will still be welcome at the White House
transition, pressure and solidarity from the United State and Europe often generated a significant and
even crucial enabling environment that helped to tip finely balanced situations toward democratic
If this solidarity is
now greatly diminished, so will be the near-term global prospects
for reviving and sustaining democratic progress. Democracy has
been in a global recession for most of the last decade, and there is a
growing danger that the recession could deepen and tip over into
something much worse. Many more democracies could fail, not only in
change, and then in some cases gradually toward democratic consolidation.
poor countries of marginal strategic significance, but also in big swing states such as Indonesia and
Ukraine (again). There is little external recognition yet of the grim state of democracy in Turkey, and
Apathy
and inertia in Europe and the United States could significantly lower the
barriers to new democratic reversals and to authoritarian
entrenchments in many more states. Yet the picture is not entirely
bleak. We have not seen a third reverse wave. Globally, average levels of freedom have ebbed a
little bit, but not calamitously. Most important, there has not been significant erosion
in public support for democracy. In fact, what the Afrobarometer has consistently shown
there is no guarantee that democracy will return any time soon to Thailand or Bangladesh.
is a gapin some African countries, a chasmbetween the popular demand for democracy and the
supply of it provided by the regime. This is not based just on some shallow, vague notion that democracy
is a good thing. Many Africans understand the importance of political accountability, transparency, the
rule of law, and restraint of power, and they would like to see their governments manifest these virtues.
While the performance of democracy is failing to inspire, authoritarianism faces its own steep challenges.
There is hardly a dictatorship in the world that looks stable for the
long run. The only truly reliable source of regime stability is legitimacy, and the number of people in
the world who believe in the intrinsic legitimacy of any form of authoritarianism is rapidly diminishing.
Economic development, globalization, and the information revolution are undermining all forms of
authority and empowering individuals. Values are changing, and while we should not assume any
teleological path toward a global enlightenment, generally the movement is toward greater distrust of
authority and more desire for accountability, freedom, and political choice. In the coming two decades,
these trends will challenge the nature of rule in China, Vietnam, Iran, and the Arab states much more than
they will in India, not to mention Europe and the United States. Already, democratization is visible on the
horizon of Malaysias increasingly competitive electoral politics, and it will come in the next generation to
Singapore as well. The key imperative in the near term is to work to reform and consolidate the
democracies that have emerged during the third wavethe majority of which remain illiberal and
the Philippines, South Africa, and Ghana. It is possible and urgently important to help stabilize the new
democracies in Ukraine and Tunisia (whose success could gradually generate significant diffusion effects
throughout the Arab world). It might be possible to nudge Thailand and Bangladesh back toward
electoral democracy, though ways must be found to temper the awful levels of party polarization in each
country. With time, the electoral authoritarian project in Turkey will discredit itself in the face of mounting
corruption and abuse of power, which are already growing quite serious. And the oil-based autocracies in
Iran and Venezuela will face increasingly severe crises of economic performance and political legitimacy.
Security at Tel Aviv University, Azar 2011, The Changing Character of War,
in The Changing Character of War, ed. Hew Strachan and Sibylle Scheipers, p.
30-32
Since 1945, the decline of major great power war has deepened further.
Nuclear weapons have concentrated the minds of all concerned wonderfully, but no less important have
been the institutionalization of free trade and the closely related process of rapid and sustained economic
growth throughout the capitalist world. The communist bloc did not participate in the system of free trade,
but at least initially it too experienced substantial growth, and, unlike Germany and Japan, it was always
sufficiently large and rich in natural resources to maintain an autarky of sorts. With the Soviet collapse and
the
prospect of a major war within the developed world seems to have become very
remote indeed. This is one of the main sources for the feeling that war has been transformed: its
with the integration of the former communist powers into the global capitalist economy,
geopolitical centre of gravity has shifted radically. The modernized, economically developed parts of the
world constitute a zone of peace. War now seems to be confined to the less-developed parts of the globe,
the worlds zone of war, where countries that have so far failed to embrace modernization and its
pacifying spin-off effects continue to be engaged in wars among themselves, as well as with developed
moment may turn out to be a fleeting one . The probability of major wars within the
developed world remains lowbecause of the factors already mentioned: increasing wealth, economic
with the return of capitalist non-democratic great powers that have been absent from the
international system since 1945. Above all, there is the formerly communist and fast industrializing
authoritarian-capitalist China, whose massive growth represents the greatest change in the global balance
of power. Russia, too, is retreating from its postcommunist liberalism and assuming an increasingly
authoritarian character. Authoritarian capitalism may be more viable than people tend to assume. 8 The
communist great powers failed even though they were potentially larger than the democracies, because
their economic systems failed them. By contrast, the capitalist authoritarian/totalitarian powers during the
first half of the twentieth century, Germany and Japan, particularly the former, were as efficient
economically as, and if anything more successful militarily than, their democratic counterparts. They were
defeated in war mainly because they were too small and ultimately succumbed to the exceptional
continental size of the United States (in alliance with the communist Soviet Union during the Second World
War). However, the new non-democratic powers are both large and capitalist. China in particular is the
largest player in the international system in terms of population and is showing spectacular economic
growth that within a generation or two is likely to make it a true non-democratic superpower. Although
the return of capitalist non-democratic great powers does not necessarily imply
open conflict or war, it might indicate that the democratic hegemony since the Soviet Unions
collapse could be short-lived and that a universal democratic peace may still be far
of. The new capitalist authoritarian powers are deeply integrated into the world economy. They partake
of the development-open-trade-capitalist cause of peace, but not of the liberal democratic cause. Thus, it
is crucially important that any protectionist turn in the system is avoided so as to prevent a grab for
markets and raw materials such as that which followed the disastrous slide into imperial protectionism and
conflict during the first part of the twentieth century. Of course, the openness of the world economy does
not depend exclusively on the democracies. In time, China itself might become more protectionist, as it
grows wealthier, its labour costs rise, and its current competitive edge diminishes. With the possible
exception of the sore Taiwan problem, China is likely to be less restless and revisionist than the territorially
confined Germany and Japan were. Russia, which is still reeling from having lost an empire, may be more
problematic. However, as China grows in power, it is likely to become more assertive, flex its muscles, and
The democratic
and non-democratic powers may coexist more or less peacefully, albeit warily, side
by side, armed because of mutual fear and suspicion, as a result of the so-called security
dilemma, and against worst-case scenarios . But there is also the
prospect of more antagonistic relations, accentuated ideological
rivalry, potential and actual conflict, intensified arms races, and
behave like a superpower, even if it does not become particularly aggressive.
understand that the private realm is where we can act, think, speak, write, experiment, and choose how to
be, away from the judgmental eyes of others.
free person.
Perhaps the most famous formulation of what privacy means and why it is so
universally and supremely desired was offered by the US Supreme Court Justice Louis Brandeis in the 1928
case Olmstead v. U.S.: The
pain, pleasure and satisfactions of life are to be found in material things. They sought to protect Americans
in their beliefs, their thoughts, their emotions and their sensations. They conferred, as against the
Government, the right to be left alone. Even before Brandeis was appointed to the Court, he was an
ardent proponent of the importance of privacy. Together with lawyer Samuel Warren, he wrote the seminal
1890 Harvard Law Review article The Right to Privacy, arguing that robbing someone of their privacy was
a crime of a deeply different nature than the theft of a material belonging. The principle which protects
personal writings and all other personal productions, not against theft and physical appropriation, but
against publication in any form, is in reality not the principle of private property, but that of an inviolate
personality.
for
reasons that are rarely discussed but instinctively understood by most people, as evidenced by the lengths
which is expected of them. They want to avoid shame and condemnation. They do so by adhering tightly
to accepted social practices, by staying within imposed boundaries, avoiding action that might be seen as
best friends daughter. During the ceremony, the rabbi emphasized that the central lesson for the girl to
learn was that she was always being watched and judged. He told her that God always knew what she
was doing, every choice, every action, and even every thought, no matter how private. You are never
alone, he said, which meant that she should always adhere to Gods will. The rabbis point was clear: if
you never evade the watchful eyes of a supreme authority, there is no choice but to follow the dictates
that authority imposes. You cannot even consider forging your own path beyond those rules: if you believe
you are always being watched and judged, you are not really a free individual. All oppressive authorities
political, religious, societal, parental rely on this vital truth, using it as a principal tool to enforce
orthodoxies, compel adherence, and quash dissent. It is in their interest to convey that nothing their
the
deprivation of privacy will crush any temptation to deviate from
rules and norms. What is lost when the private realm is abolished are
many of the attributes typically associated with quality of life . Most
subjects do will escape the knowledge of the authorities. Far more effectively than a police force,
people have experienced how privacy enables liberation form constraint. And weve all, conversely, had
the experience of engaging in private behavior when we thought we were alone dancing, confessing,
exploring sexual expression, sharing untested ideas only to feel shame at having been seen by others.
Only when we believe that nobody else is watching us do we feel free safe to truly experiment, to test
boundaries, to explore new ways of thinking and being, to explore what it means to be ourselves. What
made the Internet so appealing was precisely that it afforded the ability to speak and act anonymously,
the state is therefore inherently repressive, even in the unlikely case that it is not abused by vindictive
Regardless of how
surveillance is used or abused, the limits on freedom are intrinsic to
officials to do things like gain private information about political opponents.
its existence .
However, one may still insist on echoing Ernest Hemingway "I believe in only one thing: liberty." And it is
always well to bear in mind David Hume's observation: " It
every invasion of
freedom must be emphatically identified and resisted with undying
spirit.
any society aiming to maximize spiritual and material welfare, then
Internet Advantage
Mass domestic surveillance crushes open internet access,
tech competitiveness and cloud computing curtailing
surveillance leads to reshoring and restores faith in the
Internet
Matthew Taylor, 3/30/2014, The Guardian, NSA revelations changing how
businesses store sensitive data,
http://www.theguardian.com/technology/2014/mar/31/data-storage-nsarevelations-businesses-snowden, mm
The vast scale of online surveillance revealed by Edward Snowden is changing
how businesses store commercially sensitive data, with potentially
dramatic consequences for the future of the internet, according to a new
study. A survey of 1,000 business leaders from around the world has found that many are
questioning their reliance on "cloud computing" in favour of more
secure forms of data storage as the whistleblower's revelations continue to reverberate.
The moves by businesses mirror efforts by individual countries, such as Brazil and Germany, which are
encouraging regional online traffic to be routed locally rather than through the US, in
a move that
hard in the coming years by a global backlash against technology 'made in America'". "The
Snowden revelations have led to a paradigm shift in how IT decision-makers buy technology," he said.
"Now companies are not just competing on price and quality, they are also competing on geography.
This might be the final nail in the coffin for the vision of a global,
borderless internet ." Ian Brown, from the Oxford Internet Institute, said the survey revealed a
significant level of concern among business leaders: " We'll have to see over the next year how
much impact this type of reaction has on the bottom line of US tech
companies, but it will give them even more incentive to put pressure on the
Obama administration and US Congress for significant surveillance reform ." The
survey of 1,000 information and communications technology decision-makers from France, Germany, Hong
following the
Snowden revelations, almost 90% had changed the way they use the
cloud a storage service that allows data to be accessed from anywhere in the world but which is more
Kong, the UK and the US was carried out by NTT Communications. It found that,
susceptible to online surveillance. The study also found that almost a third of those questioned were
moving their company's data to locations where they "know it will be safe", and 16% said they had
delayed or cancelled their contracts with cloud service providers. Len Padilla, from NTT Communications
in Europe, said: "Our findings show that the NSA allegations have hardened ICT decision-makers' attitudes
towards cloud computing, whether it is modifying procurement policies, scrutinising potential suppliers or
taking a heightened interest in where their data is stored." The Guardian, and some of the world's other
major media organisations, began disclosing details of the extent and reach of mass surveillance
programmes run by Britain's eavesdropping centre, GCHQ, and its US equivalent, the National Security
executive chairman of Google, met President Barack Obama to voice their concerns about the commercial
impact of government surveillance programmes. But Castro warned that it was not just the global firms
that are being affected in the US. "This
across the board this backlash is going to hurt their bottom line ."
And Brown said that pressure is now likely to be felt by the other governments as more businesses attempt
to protect their data. "As
with keeping what works, namely maintaining a freedom-enhancing and open Internet while insulating it
from legacy regulations. The peril lies with changes that would ultimately sweep up Internet services into
decades-old ITU paradigms. If successful, these efforts would merely imprison the future in the regulatory
dungeon of the past.
with an unfettered Internet . Shortly after the Internet was privatized in 1995, a mere 16
million people were online worldwide.3 As of early 2012, approximately 2.3 billion people were using the
Net.4 Internet connectivity quickly evolved from being a novelty in industrialized countries to becoming an
essential tool for commerce and sometimes even basic survival in all nations, but especially in the
developing world. Such explosive growth was helped, not hindered, by a deregulatory construct.
Developing nations stand to gain the most from the rapid pace of
deployment and adoption of Internet technologies brought forth by
an Internet free from intergovernmental regulation . By way of illustration, a
McKinsey report released in January examined the Nets effect on the developing world, or aspiring
countries.5 In 30 specific aspiring countries studied, including Malaysia, Mexico, Morocco, Nigeria, Turkey
and Vietnam,6 Internet penetration has grown 25 percent per year for the past five years, compared to
only five percent per year in developed nations.7 Obviously, broadband penetration is lower in aspiring
countries than in the developed world, but that is quickly changing thanks to mobile Internet access
technologies. Mobile subscriptions in developing countries have risen from 53 percent of the global market
in 2005 to 73 percent in 2010.8 In fact, Cisco estimates that the number of mobile-connected devices will
exceed the worlds population sometime this year.9 Increasingly, Internet users in these countries use only
mobile devices for their Internet access.10 This trend has resulted in developing countries growing their
global share of Internet users from 33 percent in 2005, to 52 percent in 2010, with a projected 61 percent
share by 2015.11 The 30 aspiring countries discussed earlier are home to one billion Internet users, half of
mere fact that parliaments across the globe, from America to Japan, are unable to make responsible,
economically sound recovery plans suggests that they do not know what to do and are simply hoping for
the least disruption. Equally worrisome is the adoption of more statist economic programs around the
that 20 million migrant laborers lost their jobs. Even in the flush times of recent years, China faced upward
of the country's prefectures have passed emergency economic stabilization plans. Hundreds of thousands
of temporary employees hired during the first part of this decade are being laid off. Spain's unemployment
rate is expected to climb to nearly 20% by the end of 2010; Spanish unions are already protesting the lack
of jobs, and the specter of violence, as occurred in the 1980s, is haunting the country. Meanwhile, in
Greece, workers have already taken to the streets. Europe as a whole will face dangerously increasing
tensions between native citizens and immigrants, largely from poorer Muslim nations, who have increased
the labor pool in the past several decades. Spain has absorbed five million immigrants since 1999, while
nearly 9% of Germany's residents have foreign citizenship, including almost 2 million Turks. The
A prolonged global
downturn, let alone a collapse, would dramatically raise tensions
inside these countries. Couple that with possible protectionist
legislation in the United States, unresolved ethnic and territorial
disputes in all regions of the globe and a loss of confidence that
world leaders actually know what they are doing. The result may be
xenophobic labor strikes in the U.K. do not bode well for the rest of Europe.
in the global economy, a threat most obviously represented by such rising economic powers as
China and India.(FN1) There is, second, the threat posed by our increasing dependence on oil imports from
the Middle East. Moreover, these two threats are increasingly connected, as China and India themselves
are greatly increasing their demand for Middle East oil.(FN2) The United States of course faced great
challenges to its security and economy in the past, most obviously from Germany and Japan in the first half
Crucial to America's
ability to prevail over these past challenges was our technological and
industrial leadership, and especially our ability to continuously
of the twentieth century and from the Soviet Union in the second half.
recreate it. Indeed, the United States has been unique among great
powers in its ability to keep on creating and recreating new
technologies and new industries, generation after generation. Perpetual
innovation and technological leadership might even be said to be the
American way of maintaining primacy in world afairs . They are almost
certainly what America will have to pursue in order to prevail over the contemporary challenges involving
economic competitiveness and energy dependence. There is therefore an urgent need for America to
resume its historic emphasis on innovation. The United States needs a national strategy focused upon
developing new technologies and creating new industries. Every successful strategy must define an
objective or mission, determine a solution, and assemble the means of execution. In this case, the
objective is economic superiority; the solution is new industries which build upon the contemporary
revolution in information technology; and the means of execution will have to include a partnership of
industry, government, and people.
pin of great-power status in the world, a fact recognized by longcycle theorists.3 However, despite the obvious importance of innovation to power, and despite a
large literature on how the state should be organized to maximize the extraction of societal resources,
there has been very little written in international political economy on the state's role in fostering
technological leadership. The relationship between innovation and the nation-state has been discussed in
international relations, but the debates that touch on the subject mention it only in passing. In the late
seventies, there was a great deal of discussion about state 'strength' vis-?-vis society as a way of
determining foreign economic policies, including industrial policies.4 One of the implicit arguments in this
literature was that strong states would pursue more enlightened economic policies. However, the strong
state/weak state typology has been criticized as vague, and this literature has moved away from the study
of economic issues, focusing more on security policies.5 In this decade, proponents of globalization argue
that because information and capital are mobile, the location of innovation has been rendered
unimportant.6 While this notion has some popular appeal, the globalization thesis lacks theoretical or
empirical support. Theoretically, even in a world of perfect information and perfect capital mobility,
economists have shown that the location of technological innovation matters.7 Empirically, the claims of
globalization proponents have been far-fetched. Capital is not perfectly mobile, and increased economic
exchange does not lead to a seamless transfer of technology from one country to another.8 The location of
number of nations with significant military capability, it does not have a functioning method for preserving
order without outside involvement. As U.S. power recedes, it could turn out that American involvement was
in fact a deterrent against Iran taking a more adventurous regional posture, for instance.
With the
at least part of a collapsed state. Or China might see American withdrawal as an opportunity to play a
greater role in the region, particularly in the Persian Gulf. The United States has a number of security
objectives in the Middle East and North Africa: protecting world access to the region's petroleum, limiting
humanitarian disasters, preventing the proliferation of weapons of mass destruction, limiting the operating
space for al-Qaida and its affiliates, sustaining America's commitment to long-standing partners and
assuring Israel's security. Arguments that the U.S. can disengage from the region and recoup savings in
defense expenditures assume that petroleum exports would continue even in the event of domination of
the region by a hostile power like Iran or a competitor like China, state collapse or even the seizure of
power by extremists. Whoever exercises power in the region would need to sell oil. And the United States
is moving toward petroleum self-sufficiency or, at least, away from dependence on Middle Eastern oil. But
even if the United States could get along with diminished petroleum exports from the Middle East, many
other nations couldn't. The economic damage would cascade, inevitably affecting the United States.
Clearly disengagement from the Middle East and North Africa would entail significant risks for the United
States. It would be a roll of the strategic dice. South and Central Asia are a bit different, since large-scale
U.S. involvement there is a relatively recent phenomenon. This means that the regional security
South and
Central Asia also includes two vibrant, competitive and nuclear-armed powers
India and Chinaas well as one of the world's most fragile nuclear states, Pakistan. Writers like
architecture there is less dependent on the United States than that of some other regions.
Robert Kaplan argue that South Asia's importance will continue to grow, its future shaped by the
competition between China and India.
with India crucial. The key issue is whether India can continue to modernize its military to
balance China while addressing its immense domestic problems with infrastructure, education, income
inequality and ethnic and religious tensions. If it cannot, the United States might have to decide between
ceding domination of the region to China or spending what it takes to sustain an American military
the
region remains a cauldron of extremism and terrorism. America's future role
presence in the region. Central Asia is different. After a decade of U.S. military operations,
there is in doubt, as it looks like the United States will not be able to sustain a working security partnership
with Afghanistan and Pakistan in the future. At some point one or both of these states could collapse, with
extremist movements gaining control. There is little chance of another large-scale U.S. military
intervention to forestall state collapse, but Washington might feel compelled to act to secure Pakistan's
nuclear weapons if Islamabad loses control of them. The key decision for Washington might someday be
whether to tolerate extremist-dominated areas or states as long as they do not enable transnational
terrorism. Could the United States allow a Taliban state in parts of Afghanistan and Pakistan, for instance, if
it did not provide training areas and other support to al-Qaida? Most likely, the U.S. approach would be to
launch raids and long-distance attacks on discernible al-Qaida targets and hope that such a method best
balanced costs and risks. The Asia-Pacific region will remain the most important one to the United States
even in a time of receding American power. The United States retains deep economic interests in and
massive trade with Asia, and has been a central player in the region's security system for more than a
century. While instability or conflict there is less likely than in the Middle East and North Africa, if it
happened it would be much more dangerous because of the economic and military power of the states
likely to be involved. U.S. strategy in the Asia-Pacific has been described as a hub-and-spokes strategy
"with the United States as the hub, bilateral alliances as the spokes and multilateral institutions largely at
the margins." In particular, the bilateral "spokes" are U.S. security ties with key allies Australia, Japan and
the Philippines. America's major security objectives in the Asia-Pacific in recent years have been to
discourage Chinese provocation or destabilization as China rises in political, economic and military power,
and to prevent the world's most bizarre and unpredictable nuclear powerNorth Korea
from unleashing Armageddon through some sort of miscalculation .
Because the U.S. plays a more central role in the Asia-Pacific security framework
than in any other regional security arrangement, this is the region where disengagement or a recession of
Without an American
counterweight, China might become increasingly aggressive and
provocative. This could lead the other leading powers of the region close to Chinaparticularly
Japan, South Korea and Taiwanto abandon their historical antagonism toward one
American power would have the most far-reaching effect.
another and move toward some sort of de facto or even formal alliance. If China pushed them too hard, all
three
have the
technological
quickly . The middle powers of the region, particularly those embroiled in disputes with China over the
resources of the South China Sea, would have to decide between acceding to Beijing's demands or aligning
themselves with the Japan-South Korea-Taiwan bloc.
[Eric, technical writer and user advocate for The Rackspace Cloud,
September 14, 2010 http://www.rackspacecloud.com/blog/2010/09/14/thefuture-of-cloud-computing-the-big-25-in-the-next-25/]
The promise of the cloud isnt just about gaming and the ability to safely store all those photos that you
database of global DNA samples requires abundant, scalable processing power. Modeling protein folding is
another example of how compute resources will be used. Protein folding is linked to many diseases
including Alzheimers and cancer, and analyzing the folding process can lead to new treatments and cures,
but it requires enormous compute power. Projects like Folding@home are using distributed computing to
supercomputer that is capable of analyzing 60 petabytes of data (roughly 13 million DVDs) at over 158
this level of
computing power will be widely available and will exist on remote
hardware. Sophisticated climate models combined with never before
seen compute power will provide better predictions of climate
change and more rapid early warning systems.
teraflops (trillion calculations per second). In the next couple of decades,
need to be clear about its limitations and strive to improve information for the future. We need to be clear
about the uncertainties in our projections while still extracting useful information for practical decisionmaking. I have been involved in developing climate models for the last 15 years and despite their
limitations we are now able to assess the probability of different outcomes for the first time. That means
Environment Agency to investigate the impact of climate change on the Thames estuary over the next 100
years concluded that current government predictions for sea level rise are realistic. A major outcome from
the scientific analysis was that the worst-case scenarios for high water levels can be significantly reduced -
from 4.2m to 2.7m because we are able to rule out the more extreme sea level rise. As a result, massive
investment in a tide-excluding estuary barrage is unlikely to be needed this century. This will be reviewed
as more information becomes available, taking a flexible approach to adaptation. The energy industry,
working with the Met Office, looked at the likely impact of climate change on its infrastructure. The project
found that very few changes in design standards are required, although it did highlight a number of issues.
For instance, transformers could suffer higher failure rates and efficiency of some types of thermal power
station could be markedly reduced because of increasing temperatures. A particular concern highlighted
by this report and reiterated in today's report from the Climate Change Committee - the independent body
that advises government on its climate targets - is that little is known about how winds will change in the
future - important because of the increasing role of wind power in the UK energy mix. Fortunately many
people, from private industry to government, recognise the value of even incomplete information to help
are being produced. We need particularly to look at how we communicate complex and often conflicting
results. In order to explain complex science to a lay audience, scientists and journalists are prone to
progressively downplay the complexity. Conversely, in striving to adopt a more scientific approach and
include the full range of uncertainty, we often give sceptics an easy route to undermine the science. All too
often uncertainty in science offers a convenient excuse for delaying important decisions. However, in the
case of climate change there is overwhelming evidence that the climate is changing in part due to
human activities and that changes will accelerate if emissions continue unabated. In examining the
uncertainty in the science we must take care to not throw away what we do know. Science has established
that climate is changing. Scientists now need to press on in developing the emerging tools that will be
used to underpin sensible adaptation decisions which will determine our future.
[Purple, reporter for ABS-CBN news, 05/17/2008, Climate change and human
extinction--are you ready to be fossilized? http://www.abscbnnews.com/nation/05/16/08/climate-change-and-human-extinction-are-youready-be-fossilized
Climate change killed the dinosaurs. Will it kill us as well? Will we let it destroy the human
race? This was the grim, depressing message that hung in the background of the Climate Change Forum
hosted on Friday by the Philippine National Red Cross at the Manila Hotel. "Not one dinosaur is alive today.
Maybe someday it will be our fossils that another race will dig up in the
future, " said Roger Bracke of the International Federation of Red Cross and Red Crescent Societies,
underscoring his point that no less than extinction is faced by the human race ,
unless we are able to address global warming and climate change in this generation.
Bracke, however, countered the pessimistic mood of the day by saying that the human race still
has an opportunity to save itself. This more hopeful view was also presented by the four
other speakers in the forum. Bracke pointed out that all peoples of the world must be involved
in two types of response to the threat of climate change: mitigation and adaptation.
"Prevention" is no longer possible, according to Bracke and the other experts at the forum,
since climate change is already happening. Last chance The forum's speakers all noted
the increasing number and intensity of devastating typhoons --most recently
cyclone Nargis in Myanmar, which killed more than 100,000 people--as evidence that the world's
climatic and weather conditions are turning deadly because of climate
change. They also reminded the audience that deadly typhoons have also hit the Philippines recently,
particularly Milenyo and Reming, which left hundreds of thousands of Filipino families homeless. World
Wildlife Fund Climate and Energy Program head Naderev Sao said that " this generation the last
chance for the human race" to do something and ensure that humanity
stays alive in this planet. According to Sao, while most members of our generation will be dead
by the time the worst effects of climate change are felt, our children will be the ones to suffer. How will
Filipinos survive climate change? Well, first of all, they have to be made aware that climate change is a
problem that threatens their lives. The easiest way to do this as former Consultant for the Secretariats of
the UN Convention on Climate Change Dr. Pak Sum Low told abs-cbnews.com/Newsbreak is to
particularize the disasters that it could cause. Talking in the language of destruction, Pak and other experts
paint this portrait of a Philippines hit by climate change: increased typhoons in Visayas, drought in
Mindanao, destroyed agricultural areas in Pampanga, and higher incidence rates of dengue and malaria.
Saom said that as polar ice caps melt due to global warming, sea levels will rise, endangering coastal and
low-lying areas like Manila. He said Manila Bay would experience a sea level increase of 72 meters over 20
years. This means that from Pampanga to Nueva Ecija, farms and fishponds would be in danger of being
would be inundated in saltwater. Saom added that Albay, which has been marked as a vulnerable area to
typhoons, would be the top province at risk. Saom also pointed out that extreme weather conditions
arising from climate change, including typhoons and severe droughts, would have social, economic and
political consequences: Ruined farmlands and fishponds would hamper crop growth and reduce food
sources, typhoons would displace people, cause diseases, and limit actions in education and employment.
Thus, Sao said, while environmental protection should remain at the top of the agenda in fighting climate
change, solutions to the phenomenon "must also be economic, social, moral and political." Mitigation
Joyceline Goco, Climate Change Coordinator of the Environment Management Bureau of the Department of
Environment and Natural Resources, focused her lecture on the programs Philippine government is
implementing in order to mitigate the effects of climate change. Goco said that the Philippines is already a
signatory to global agreements calling for a reduction in the "greenhouse gasses"--mostly carbon dioxide,
chloroflourocarbons and methane--that are responsible for trapping heat inside the planet and raising
global temperatures. Goco said the DENR, which is tasked to oversee and activate the Clean Development
Mechanism, has registered projects which would reduce methane and carbon dioxide. These projects
include landfill and electricity generation initiatives. She also said that the government is also looking at
alternative fuel sources in order do reduce the country's dependence on the burning of fossil fuels--oil-which are known culprits behind global warming. Bracke however said that mitigation is not enough. "The
ongoing debate about mitigation of climate change effects is highly technical. It involves making
fundamental changes in the policies of governments, making costly changes in how industry operates. All
of this takes time and, frankly, we're not even sure if such mitigation efforts will be successful. In the
meantime, while the debate goes on, the effects of climate change are already happening to us."
Adaptation A few nations and communities have already begun adapting their
Solvency
A privacy advocate improves the structure and function of
the FISA court that curtails excessive and unnecessary
domestic surveillance
Jacob Sommer, Spring 2014, FISA Authority and Blanket Surveillance: A
Gatekeeper Without Opposition, American Bar Association, The Journal of the
Section of Litigation, 40(3),
http://www.americanbar.org/publications/litigation_journal/201314/spring/fisa_authority_and_blanket_surveillance_gatekeeper_without_opposi
tion.html, mm
FISAs history and current events demonstrate that we are at a point
in the cycle where it is again time to address the two basic questions: How do we
provide oversight of intelligence-gathering activities ? And when does this
oversight apply? FISA, from a textual perspective, provides the government with far-reaching authority for
surveillance and specific process for each type of surveillance it may want to conduct, but the public was
relatively unaware of how the government used that authority until Edward Snowden leaked classified
documents in late 2013 providing some detail on the NSAs use of surveillance activities. In response, the
government has begun declassifying a wealth of FISC decisions, letters to Congress, and other information
regarding the NSAs use of FISA authorities. A detailed analysis of these opinions could lead to a new
report as voluminous as the Church Committees reports, but even a high-level analysis provides some
context for moving forward. The recently released opinionssuch as Redacted, LEXIS 157706 (FISA Ct.
Oct. 3, 2011), and Redacted II, LEXIS 157706 (FISA Ct. Nov. 30, 2011)confirm what appeared to be the
case in In re Directives, that the FISC has adopted an exception to the warrant requirement for foreign
intelligence gatheringparticularly where the government seeks communications that are not wholly
FISC held that only a small part of the NSAs surveillance program was unconstitutional and only because
the NSA did not make enough of an effort to delete wrongly collected communicationsa problem the NSA
soon remedied. Redacted II, LEXIS 157705 (FISA Ct. Nov. 30, 2011). The window left open in Keith seems
to be closed. Similarly, the FISC has approved of the NSAs collect now, restrict searching later approach
to minimization. See In re Application of the F.B.I. for an Order Requiring the Production of Tangible Things
the FISC
has found no constitutional or statutory impediment to the
government over collecting dataso long as it does not intentionally collect wholly
from [Redacted], No. BR 13-109, LEXIS 134786 (FISA Ct. Sept. 13, 2013). In other words,
domestic communications and it has minimization procedures to restrict access. There is no indication that
the government has used its surveillance powers improperly (except in a limited number of circumstances
reacted to executive surveillance activitiessome of which are eerily similar to the NSAs use of
it may again
be time for Congress to take action. The problems remain quite similar to those
surveillance authority in the mid to late 1970s. And as was the case in the late 1970s,
Congress faced in 1978: provide oversight where there is none, or where it is inadequate, and make clear
when the government can, and cannot, use different types of FISA process. In late 2013, numerous
members of Congress began proposing bills to reform FISA and provide new protections. See Mark M.
Jaycox, Cheat Sheet to Congress NSA Spying Bills, Elec. Frontier Found. (Sept. 11, 2013),
www.eff.org/deep links/2013/08/effs-cheat-sheet. Given the heated nature of the current debate, it is likely
that the particular content of these bills will change daily, and summarizing their particularities is best left
to blogs. Still, the bills generally fall into two categories: increasing transparency and restructuring the
process. A few bills address bulk collection of records under section 215, but none takes a comprehensive
approach to changing the question of when FISA applies and when it does not.
The current
companies that did not act to end NSA spying in the Operation SHAMROCK era, providers today are taking
a much more active role in the process. Yahoo challenged the FISA process in 2008, interest groups have
filed actions seeking information about surveillance practices, and now providers have brought declaratory
judgment actions seeking to reveal more information about surveillance process they receive. One of the
pending bills, Senator Blumenthals FISA Court Reform Act of 2013, Senate Bill 1460 and Senate Bill
1467, provides an answer that, having had the experience of litigating before the FISC myself, I believe
act attempts to solve a basic problem with the current oversight procedures: There is no true adversarial
process for most of the legal issues that arise. The newly declassified opinions the director of national
intelligence has released make this abundantly clear. Setting aside the legal arguments, the procedural
history of the opinions indicates delays on the governments part, a lack of supervision after the court
a special
advocate ad litem for the public would ensure that novel legal arguments in
the FISA court would face a consistent, steady challenge no matter who the
provider is, thereby strengthening the FISA process by subjecting results
to checks and balances. Without such a process, the court and the
Department of Justice must work through difficult legal issues with no
balancing input. An advocate could participate in all cases involving a new
issues its orders, and a preference for secrecy over public disclosure at any cost. Appointing
statute or authority or a new interpretation or application of an existing authority. The special advocate
could choose the cases in which to be involved, or the court or a provider that receives process could
request its involvement where an opposition would be useful to test and evaluate the governments legal
is asked to provide assistance in ways that are unlike traditional wiretaps. Providing for an advocate in
front of the court would also resolve several problems for companies and individuals faced with receiving
FISA process or having evidence gathered using that process used against them. The statutory process as
it stands now does not necessarily provide for complete transparency or a level playing field for the
provider. As the published decision in In re Directives makes clear, a phalanx of 11 government lawyers,
including the acting solicitor general of the United States, was involved in defending the statute. The
decision also shows that some of the documents relied on by the court of review were classified
procedures submitted as part of an ex parte appendix that remains sealed. 551 F.3d at 101314. If an
advocate were present in other matters before the FISC, the government and court would be more likely to
Public
access would also provide litigators with a much greater opportunity
to use those challenges in advising and defending their clients . The
FISCs decisions may or may not have been correct, depending on your view, but the secrecy
employed up to this point erodes the safeguards built into our adversarial
court system. The presence of an advocate would help to ensure that
the government cannot continue to keep new opinions classified,
unless it is truly in the interest of national security to do so. Revising
provide more public information on what challenges have and have not been successful.
FISA is no easy task, and analyzing and responding to the FISA process presents thorny questions. There is
one constant throughout the history of surveillance, as was the case in the Church Report and as is the
The adversarial system does more than assure the due process rights of the parties. It
ensures that all relevant facts and legal arguments are aired, which in
turn enables the tribunal to reach an accurate decision. FISA Court
judges are more likely to misinterpret the law if they hear only one
side of the case. As the Supreme Court stated in a different context: [T]he need for adversary
inquiry is increased by the complexity of the issues presented for adjudication. . . . Adversary proceedings
will not magically eliminate all error, but they will substantially reduce its incidence by guarding against
the possibility that the trial judge, through lack of time or unfamiliarity with the information contained in
and suggested by the materials, will be unable to provide the scrutiny which the Fourth Amendment
the Supreme Court often waits for multiple lower courts to address an issue before taking it up. This
process of assessing, comparing, and honing decisions across jurisdictions and levels of review make it
fundamental questions of constitutional law that affect all Americans, the error is anything but harmless.
James Robertson, a retired federal judge who served with me on the FISA court, recently called for greater
transparency of the courts proceedings. He has proposed the naming of an advocate, with highlevel security clearance, to argue against the governments filings. He suggested that the Privacy and Civil
Liberties Oversight Board, which oversees surveillance activities, could also provide a check. I
would go even further. In an ordinary criminal case, the adversarial process assures legal representation
of the defendant. Clearly, in top-secret cases involving potential surveillance targets, a lawyer cannot, in
its way all or most of the time , the court would have more fully
developed its reasons for letting it do so. Of equal importance, the
appointed lawyer could appeal a decision in the governments favor
to the Foreign Intelligence Surveillance Court of Review and then
to the Supreme Court. No opportunity for such review exists today,
because only the government can appeal a FISA court ruling.
Extensions Solvency
though they expired on June 1 amid an impasse in the Senate. The Court ruled that the Freedom Act's
languagewhich will restore the National Security Agency's bulk collection of U.S. call data for six months
before transitioning to a more limited programcould revive those lapsed provisions, but in assessing that
circumstances where an amicus curiae is unnecessary (that is, 'not appropriate')," Saylor wrote. "At a
minimum, it seems likely that those circumstances would include situations where the court concludes that
it does not need the assistance or advice of amicus curiae because the legal question is relatively simple,
or is capable of only a single reasonable or rational outcome ."
advocates were rankled by the Court's reasoning, and suggested Saylor was too relaxed in his discussion
regarding when privacy experts should be called on to weigh in on a decision. "Propriety in the spirit of the
USA Freedom Act is when the decision at hand were to have an impact on the rights of individuals, not
necessarily when the Court conjectures that a decision is self-evident," said Amie Stepanovich, U.S. policy
manager at Access, an international digital-rights organization. "It is the job of the amicus to raise issues
that may not be readily apparent on first blush, meaning that what first may appear to be a clear-cut
decision actually raises underlying questions. The Court must respect the presumption of the statute in
favor of appointing the amicus." Many civil-liberties organizations that supported the Freedom Act view its
creation of a privacy panel as one of the law's strongest and most important provisions. The FISA Court has
long been derided as a "rubber-stamp" for government surveillance ordersa criticism that has only grown
more pronounced in the two years since the Edward Snowden revelations began. Friday's declassified
opinion did not restore the NSA's controversial phone dragnet, but it set the stage for the Court to do so.
The Freedom Act will effectively end the mass-surveillance protocol, first exposed publicly by Snowden, but
only after a six-month transition period during which the NSA prepares to switch to a more limited
program. Under the new system, the NSA will be able to collect call metadata from phone companies only
on an as-needed, generally targeted basis after obtaining approval from the FISA Court. The decision notes
that the Justice Department applied for a new surveillance order on June 11 but "factual details of the
applications are classified, and not necessary to resolve the issue addressed in this opinion."
FISA can decide to not use a civil liberties advocate and hide
information by classifying it under state secrets. While summaries of notable
FISC hearings and decisions would be publicly available, the court could choose not to
use an advocate and decide not to reveal documents or information
if one was used. That basically keeps things the same , Greer said, and
allows the court to make decisions unchallenged. The EFF admits previous
versions of the bill were stronger on this issue, allowing the civilian
advocate to indiscriminately challenge FISC. But in the House bill,
the final decision to use an amicus is left to the court, however, that decision
is public record.
were left to the court to decide. The FISA Court already has
discretion to solicit or permit amicus participation, and with few
exceptions, has preferred to rely on the governments submissions
alone.276 Article III would be best served by strengthening the
special advocate concept to the greatest extent possible, including
by ensuring that special advocates are notified of cases pending
before the court, have the right to intervene in cases of their
choosing, and are given access to all materials relevant to the
controversy in which they are intervening.
Defenders of the NSA frequently tout the FISA court process as evidence that the agency is under effective
placate public anger over surveillance abuses revealed in the 1970s. The uselessness of this institution as
a true check on surveillance abuses is obvious because the FISA court lacks virtually every
attribute of what our society generally understands as the minimal elements of a justice system. It
During the Cold War years of the 1970s, President Richard M. Nixon secretly approved orders for domestic
electronic surveillance of America's enemies. Bipartisan lawmakers drafted FISA to take decisions about
such snooping out of the Oval Office and put them into the hands of the three branches of government.
The American Civil Liberties Union blessed the legislation, while some constitutional scholars and civil
permits
the executive branch -- by way of the Justice Department -- to snoop on suspects
electronically or physically. The judicial branch staffs the court with U.S. district judges. The
legislative branch, through congressional committees, oversees its decisions. Congressional
leaders at the time assured Americans that the Justice Department wouldn't misuse FISA by going
after suspected criminals. They expected only a small number of operations to
be approved. But the court has approved more than 33,000
libertarians argued that Congress was creating a star chamber. The law enacted 35 years ago
surveillance orders, the bulk of them since 9/11, according to its unclassified
annual reports. From 1979 to 2012, the court turned down 11 requests.
Critics of the court call it a panel of rubber-stampers . Turley, the law school
professor, doesn't question the integrity of the court's judges. He takes aim at the wording of the law,
which in his opinion allows the government -- including the FBI, NSA, and CIA -- to target people for
surveillance without the basic probable cause standards afforded by the Constitution. "The statute does
not give the judge the authority to turn down applications when the criteria (for eavesdropping) are met,"
Turley says. "And those criteria are so low that they are always met." He recalls working as an intern at
the NSA during the Reagan administration, when he had occasion to go inside the court. "I was horrified
by what I saw," he says. "It was abundantly clear this was a Potemkin Village. ... One can only call this a
court if you abandon every substantive meaning of that term. This court has less authority than a standard
municipal traffic court. There is no serious review, because there's no substantive authority to question or
reject these applications." Those intimately familiar with the court's operations, including national security
lawyers past and present, say rejections of FISA applications are rare because they are so exhaustively
vetted before ever reaching a judge. For example, FBI agents and their division counsels pore through and
edit applications before passing them to lawyers in both the bureau's headquarters and a panel of Justice
Department lawyers. By law, topmost officials in the bureau and Justice Department must sign
certifications attesting to the evidence and the need to eavesdrop. The court's judges also rigorously
review applications. A recently declassified document shows the panel requires revisions to nearly one in
four applications before approval. The process is so exacting that FBI lawyers denied requests by
Minnesota agents in 2001 to obtain a FISA order that would allow them to search the laptop of Zacarias
Moussaoui. The al-Qaida figure is now serving life in prison for his role in the 9/11 conspiracy. The FBI has
investigated six criminal cases in Oregon since 9/11 with evidence obtained under FISA. Perhaps the most
sensational arrest occurred Nov. 26, 2010, when a Somali American teen, Mohamed Mohamud, attempted
to detonate what he thought was a massive fertilizer bomb at Portland's Pioneer Courthouse Square. The
bomb, which Mohamud armed to go off during the city's holiday tree lighting ceremony, was a harmless
fake secretly built by the FBI and introduced to Mohamud by undercover FBI agents posing as al-Qaida
terrorists. Prosecutors filed a notice after Mohamud's arrest to let the defense know agents used FISA to
collect evidence. (Much later, on Nov. 19, 2013, prosecutors filed another notice acknowledging the
investigation collected electronic intercepts from overseas.) The sting operation shocked city leaders. The
FBI's Joint Terrorism Task Force gave no previous notice about the case to then-Mayor Sam Adams, who
served as police commissioner, because the city wasn't a member of the multi-agency counterterrorism
team. Portland had dropped out of the task force in 2005, the first city in America to sever such ties.
Hinnen, a native Portlander, flew to the city on Valentine's Day 2011 to urge the City Council to rejoin the
JTTF. He was then serving as a senior lawyer in the Justice Department's National Security Division. Today,
Hinnen works for the Perkins Coie law firm in Seattle, where his chores include representing people
wrapped up in national security probes. While he now works on the other side of FISA, he strongly supports
the work of the court and the law that created it. "There are a number of safeguards in place already," he
submit applications to the court, where they are reviewed by legal staffers and passed to judges such as
advocate to get involved in routine applications. Until Snowden's leaks began to reveal the extent of NSA
data collection, the public knew little about the court's decisions. Now that terms like "telephony
metadata" have become part of the national lexicon, Wyden finds himself fielding questions from
constituents. Most are critical of the court Wyden calls the "most bizarre" in the land. "People have asked
me about the FISA court in the barber shop," he says. The senior senator from Oregon says the Patriot Act
sent the court's decisions off the tracks. The 2001 law changed a key tenet of FISA. Before its passage, the
government had to show that the purpose of its
information. After its passage, the government had only to show that a "significant purpose" was to collect
foreign intelligence. Wyden says the law is supposed to allow the government to collect records on U.S.
has
"morphed,"he says, into bulk phone data collection. Technology is partly to blame,
he says, because it once had limitations. "Now," he says, "the technology seems to be
able to do just about everything -- unbridled. So protections for the
liberties of our people become even more important ." Lewis & Clark Law
School professor Tung Yin says the NSA's technological reach may have
outstripped the current law's ability to protect privacy . But he questions
residents when they are relevant to terrorism or other national security matters. But it
whether the government's use of FISA to collect vast stores of emails and phone-call data harms innocent
residents. Under the law, the agency must get the court's permission to search for specific data. "If no
human is looking at it, is there a real privacy harm?" he asks. "I think one answer to that is, how much do
you trust the government?" Oregon's federal public defender, Steven T. Wax, has an answer. Wax is one
of more than a dozen lawyers to have argued FISA's constitutionality in Portland's U.S. District Court since
9/11. He says the law and its younger brother -- the Classified Information Procedures Act of 1980 -- have
made judges and government lawyers privy to secret files to the exclusion of defendants and their
FISA targets have no right under the law to know they were
subjected to surveillance unless they learn, as Wax's client Mohamud did, that they were
lawyers.
charged with crimes. The law prevented Wax from learning from the government or the court what
evidence the Justice Department provided to the surveillance court to spy on Mohamud. At a hearing in
the case, Wax told U.S. District Judge Garr M. King that prosecutors keep filing classified documents with
him, essentially telling the defense, "trust us" to which Wax says, "no, thank you."
Surveillance Court
was
purportedly created as an additional safeguard against unlawful
activity by US intelligence agencies, which had been found to have committed various
kinds of unlawful surveillance activities. The goal of the FISA court, as originally conceived,
was to place judicial oversight on the surveillance activities of the
NSA, by requiring the agency to obtain warrants from the court
before intercepting communications. This was to place the NSA under the same kind of
the Church Committee, composed after a series of intelligence scandals in the 1970s.2The court
legal constraints as regular police, with requirements for evidence being put before a court in order to
obtain a warrant for search. However, unlike the court system for regular police warrants, the judicial
system for the NSA is far more secretive. In order to give judicial scrutiny to preserve the secrecy of NSA
activities, the FISA court meets in secret with only government representatives present at its proceedings.
The hearings are closed to the public and the rulings of the judges are classified, and rarely released after
The judges in
the FISA court hear applications from a representative of the NSA, and ask
questions, allowing the agency to amend their applications to meet any shortcomings. Adversarial
argument from other parties is absent, since there are no other parties at the
the fact. (Some rulings have been partly declassified, but are still heavily redacted.)
hearing. Some of this is similar to the operation of public courts for regular police warrants, but there is a
great deal more secrecy, and a great deal more power granted to the government. One distinction
between the FISA Court, and regular public courts issuing warrants for police searches, is the type of
warrant system that is practiced under the FISA Court. For police searches it is generally the case that the
police will apply for a warrant to surveil a particular person, or a small group or people, and give some
evidence of probable cause for a search, i.e., the police must convince the court that there is reasonable
suspicion for surveillance on a case-by-case basis. Under the FISA Court the
NSA are much wider in scope. Many of the warrants authorize the collection of
communications data on a particular phone carrier, capturing the communications of millions of people
over sustained periods of time. Other warrants are procedure-based warrants which authorize a
proposed data-collection process, subject to various minimization procedures designed to confine the
other wiretap applications in state and federal courts is similarly low.4Though originally designed merely to
issue secret warrants for surveillance, the powers of the FISA Court have expanded over time, with a large
expansion of power occurring in 2008, when the Bush administration retroactively immunized any
electronic communication service provider from any liability for their complicity in unlawful NSA
conducted with only the government giving arguments to the court. Hence, the government has had free
rein to be the only party represented at hearings which have purported to determine its own legal powers
the FISC
has basically become a parallel Supreme Court, but one which
under the US Constitution. For this reason, one commentator has noted that, [i]n truth,
this
secret court system has opened up opportunities for judicial capture
for the NSA. As noted by legal scholar Elizabeth Goitein, [l]ike any other group that meets in secret
behind closed doors with only one constituency appearing before them, theyre subject to capture and
bias.7 For former FISA court judge James Robertson, these remarks have rung true to such an extent that
he has publicly complained about the ex parte nature of the FISA court proceedings.8 According to this
that any criticisms against the unlawful actions of the NSA have been kept secret, and have been without
memorandum that was not available to the public until years later.10 (In fact, the opinion was only
declassified due to public pressure as a result of the Snowden leaks. If not for these leaks it is likely that
the opinion would still remain classified today.) In March 2009, following breaches of the courts orders, the
Chief Judge found that the testimony of General Keith Alexander setting out the NSA interpretation of the
courts orders strained credulity by interpreting a part of the orders as effectively being optional.11 He
also found that [t]he minimization procedures proposed by the government in each successive application
and approved and adopted as binding by the orders of the [FISA Court] have been so frequently and
systematically violated that it can fairly be said that this critical element of the overall [metadata] regime
has never functioned effectively.12Despite lacking confidence that the NSA would comply with future
orders, the Chief Judge allowed the mass collection of metadata to continue, and allowed the government
to continue to apply for access to this data on a case-by-case basis, or for imminent threats, until such
time as they completed a review of their procedures. The NSA completed their review and the regular
Some
commentators have taken this judicial rebuke by the FISA court as
operation of the mass-surveillance program was restored shortly afterward.
The surveillance
programs of the NSA continued, with ongoing approval by the court,
after a short period of technical review conducted by the NSA. Such toughness as this is
what passes for checks and balances within the system of secret
courts. The dubious nature of the FISA court is well-understood
within the wider judicial system, a fact which was clear in the Klayman preliminary
rely upon the accuracy of the information that is provided to the Court.13
judgment. The stark distinction between the secretive FISA court and the public court system was
recognized by Judge Leon when he observed that, ... no court has ever recognized a special need
sufficient to justify continuous, daily searches of virtually every American citizen without any particularized
suspicion. In effect, the government urges me to be the first non-FISC judge to sanction such a
dragnet.14It is notable here that Judge Leon felt that it was significant that he was the first non-FISC
judge to consider the matter, a tacit recognition that the judgments of the FISC cannot be regarded as true
surveillance programs
by a secret court violates the requirement for due process of law .
According to Barnett, [s]ecret judicial proceedings adjudicating the rights
of private parties, without any ability to participate or even read the
legal opinions of the judges, is the antithesis of the due process of
constitutional scrutiny. Legal scholar Randy Barnett has argued that
The Foreign Intelligence Surveillance Court (FISC) and its Court of Review (FISCR)1 are the
principal arbiters of mass surveillance by the United States. These two
FISA courts are the only active Article III courts without full-time judges directly appointed by the
President.2 FISA judges serve part-time for fixed terms.3 The Chief Justice unilaterally chooses eleven
district judges for the FISC and three district or circuit judges for the FISCR,4 and designates presiding
judges for each.5 FISA judges are life-tenured on their respective generalist courts, but serve seven-year
terms on the FISA courts, after 8which the life-tenured Chief Justice replaces them.6 Putting aside the
Foreign Intelligence Surveillance Act to create permanent FISA judgeships with Presidential appointment
and Senate confirmation. Life tenure under Article III means that the federal judiciary is not simply a
reflection of any one President or Senate. The current bench includes judges appointed by each of the
past ten Presidents.7 But FISA judges serve seven-year terms and the Chief Justices who appoint them
tend to serve longer, so each Chief Justice since the creation of the FISA courts in 1978 has had the
chance to fill every seat on the FISA bench.8 With the exception of Harlan Fiske Stone, every Chief Justice
in the past two centuries has served for over seven years.9 Thus, it is likely that the trend of all FISA
only one of every eleven weeks on the FISC, with the other ten at their home district courts.11
Executive branch lawyers work closely and informally with FISC staff attorneys on the
details of the governments requests, and they are almost never denied in the end.12
Perhaps because the governments requests are so frequently granted, the FISCR has only been
empaneled to hear two appeals in its thirtyseven year history.13 Likewise, the Supreme Court has never
heard a case originating in the FISA courts.14 The FISC is technically capable of meeting en banc, but it
Services to continue giving the NSA all call records for all customers in the United States every day for
three months.17 In a heavily redacted, declassified opinion, a FISC judge allowed the government to
collect Internet metadata en massea level of sophisticated intrusion into the private lives of Americans
that was inconceivable even one generation ago.18 The Foreign Intelligence Surveillance Act was passed
in the wake of widespread surveillance abuses.19 Its authors were keenly aware that unchecked
surveillance was a threat to democracy, but they could not have imagined how easy, how pervasive, and
arguments of hypothetical adversaries. Impartial judges are only human and will inevitably be swayed by
process and deliberation are not enough. The makeup of the FISA courts is critical because the stakes are
so high, the technology changes so rapidly, and the law is so open to interpretation. Reasonable citizens
and respected scholars disagree as to whether certain programs authorized by the FISC are vital to
national security or infringe upon the rights of hundreds of millions of peopleor both. The job of a FISA
judge is to secretly rule on the acceptable scope of a democratic governments dragnet snooping into its
citizens lives. The weight of that responsibility demands that the judges entrusted with it be appointed
through the regular constitutional process. Once chosen, they should focus their professional energy on
grappling with these issues, rather than doing so as a secondary responsibility of a generalist judge.
generalist judge has about virtually any other area of law. No other court is composed of judges who were
totally ignorant of the underlying law until their appointment. Yet a hypothetical Court of International
Trade judge who knew nothing of trade law would have a much easier time getting up to speed than FISA
the only lawyers with experience in FISA court precedent are the rare few who have practiced before the
FISC, it is less likely that any particular generalist judge would have experience with FISA court case law
one-sided ex parte
proceedings mean that all current and former FISA court
practitionersall those who know the case lawhave worked exclusively on the
governments side. This creates a risk of groupthink from which
than with nearly any other significant body of law. Likewise,
http://www.huffingtonpost.com/jennifer-hoelzer/what-you-should-knowabou_1_b_3399584.html, mm
I'm guessing you have to be a real pro at interpreting surveillance
law to be a judge on the FISA Court, right? [A:] Not exactly . FISC is
currently composed of eleven federal judges already serving on the bench. While these
judges are, no doubt, experts on civil and criminal law, because the federal court system
doesn't handle foreign intelligence surveillance cases, it is doubtful
that these judges would have a great deal of experience in these
matters. Moreover, while the original FISA law was pretty straight forward, the Patriot Act,
which passed in 2001 and the subsequent FISA Amendments Act of 2008 made
a lot of changes to the laws, which theses judges are now in charge
of interpreting.
[Q:] So,
statistics. These statistics were laid out for first time by then-Judge Walton in his 7/29/13 letter to
Congress. In footnote 6, he noted a slightly lower rate of approval of FISA warrants than for Article III
criminal warrants, although both are over 99%. A high rate of approval in both settings is understandable
the government seeks to present that which will succeed, whether it is a search warrant, Title III wiretap,
or FISA electronic warrant. If you are in the government, you know the standard you must meet and you do
But is it
I dont think
so. First, the nature of the issues under consideration in national
security matters makes having another voice at the table of greater
need. In the national security context, the legal issues presented in a
government application can be far more complicated and have far greater
your best to meet it and you do not present the matter until you believe you have the goods.
entirely fair to view the two tracksnational security and criminalas comparable ?
consequences than in a routine criminal matter. The typical criminal warrant presents a quotidian factual
determination as to whether probable cause has been established; while similar factual issues arise in the
national security context in connection with individual warrant applications, complex, novel, and broad
legal issues are more likely to present themselves in the FISC (see, e.g., the 215 NSA metadata program).
Indeed, given the part-time nature of the judges FISC duties, there is simply not the same level of on-the-
procedural reasons can address the arguments by the PCLOB, even if they are ultimately not winning
arguments. This lack of written decisions prior to the leaks, and lack of decisions even after the leaks
addressing all the best counter-arguments, points to a third difference between the FISC and article III
criminal process. The former is rarely if ever subject to the adversarial process. Prior to the leaks, for
instance, not a single FISA application has been required to be disclosed to opposing counsel. By contrast,
criminal rules require disclosure of warrant applications to aggrieved parties. Thus, although not all
criminal matters end up in litigation, the specter of judicial review is palpable in a criminal investigation,
with its attendant adversarial review. The opposite is generally true in a national security investigation.
illustration, after the Snowden leaks, the government has filed under seal repeated applications to
reauthorize the 215 program, and the court has also approved those applications, also under seal. The
governments applications and the courts decisions have been unsealed only after the fact. But given the
governments public acknowledgement of the 215 program, there is no reason at all that those
applications and the court decisions were sealed in their entirety and only belatedly unsealed. The
process can and should be more transparent, but right now there is no institutional player to raise those
value of the NSA 215 program, and miss the opportunity for meaningful change. A structural reform to the
FISC and a modest one at that, since it imposes no costs on our national security mission is called for.
Many have proposed changes to the FISC enabling statute that would address this problem. Some have
suggested that an adversary party be created and housed in the PCLOB to argue opposite the federal
government.40 Others have suggested that litigators from outside the government be able to argue in
certain cases. Mike Davidson, former General Counsel to the Senate Select Committee on Intelligence,
suggested that a counterparty could argue applications of programmatic surveillance (explained in
Section B below), as opposed to individual applications, because of their more wide-ranging impact. 41
Judge James Carr, another former FISC judge, has argued that Congress should empower the FISC to
appoint an attorney when a particular case addresses new legal issues, though Judge Carr would still leave
the discretion to do so in the hands of the FISC judges themselves.42 In addition to their FISA Judge
Blumenthal, Tom Udall, and Wyden have also introduced the FISA
would, among other things, create an Office of the
Special Advocate to be stafed with lawyers with security clearances
who would have the authority to appeal FISC decisions and would allow
Selection Reform Act, Senators
interested parties to participate as amici.43 Former Department of Justice officials, including Jim Baker,
who frequently argued before the FISC when he served as Counsel for Intelligence Policy at the Justice
Department, have argued that many of these proposed solutions are not workable because of the
inherent security concerns. Baker argued that, in order for this public advocate to be effective, it would be
necessary for it to have access to classified documents and top-secret material.44 Professor Geoffrey
Stone would address this problem by ensuring that the counterparty be an independent government
lawyer with a security clearance.45 It is critical that our elected and appointed officials address these
Justice is best served when the best arguments each side can
profer are presented before a neutral arbiter.
Information Center), New England Law Review, 48 New En. L. Rev. 55,
Standing up to Clapper: How to Increase Transparency and Oversight of FISA
Surveillance, Lexis Nexis.
The recent revelations about the extent and nature of FISA surveillance have highlighted the important
and unreviewed body of constitutional and statutory law being developed by the FISC. n205 Unlike other
extensive analysis and create precedent for the court. n206 But this [*89] lawmaking process
that requires the FISC to find that the "targeting and minimization procedures" adopted by the Government
these decisions
are necessarily complex and difficult to make in the abstract con-text of a
are "consistent with ... the fourth amend-ment to the Constitution ... ." n207 But
Section 702 application because Fourth Amendment analysis is necessarily fact-based. n208 In the
lawyer's role is not to present the judges with reasons why the application might be denied or modified.
surveillance orders and directives can file challenges under certain circumstances, n210 they cannot
review the classified opinions or government briefs and do not have the necessary opportunity or incentive
to develop fact-based constitutional arguments. The difficulty in having an adversarial process at the FISC
is that the materials presented by the government are highly classified. However, [*90] classified
proceedings have become more prevalent over the past ten years in the United States n211 as well as in
the United Kingdom. n212 The use of specially appointed, security-cleared attorneys to challenge
government legal arguments in national security cases has been in place for more than a decade in the
United Kingdom. n213 The use of such a "Special Advocate" would be appropriate in the FISA context
where FISC judges are asked to make novel and significant legal determinations regarding important
Advocate would also have the authority to request declassification and publication of FISC opinions and
documents, or trigger mandato-ry disclosure whenever he or she files an appeal. n221 Additionally, the
Special Advocate would be responsible for filing a report with Congress every year, evaluating the
The
Special Advocate would promote transparency and reporting while
providing a much-needed balance to the constitutional and statutory
arguments made before the FISC.
effectiveness of the FISA process and suggesting any necessary legisla-tive changes. n222
participation turn on any proceeding in which the FISC is not making an individualized probable cause
determination.) Whether or not he is correct that adversarial participation is unwise in classic FISA
cases, I largely agree with Judge Bates that it would be unnecessary in that context, just as it is
traditionally unnecessary in the context of ordinary warrant applications pursued in ordinary criminal
necessary), as Congress itself understood when it drafted section 215 and section 702. To be sure, Judge
Bates is certainly correct that the participation of the special advocate should not unduly interfere with
the governments ability to conduct lawful foreign intelligence surveillance activities, especially ex ante.
To that end, the special advocate might only be notified of a government application under the relevant
authorities once that application has been granted by FISC, at which time the appointed advocate would
have a fixed period of time within which to seek reconsideration of the underlying ruling. Among other
things, this approach would allow the government to act expeditiously when circumstances warrant (lest
an expressly legislated emergency exception otherwise swallow the rule), and would preserve the status
quo (in which authorization has been provided by the FISC) until and unless the special advocate
convinces the FISC judge, the FISCR, or the Supreme Court to vacate such authorization. And, of course, if
the special advocate prevails before either the FISC or FISCR, the government retains the option of
seeking a stay of the ruling in question to continue the underlying surveillance pending appeal.
Moreover, involving a special advocate only once an application has been granted eliminates the
potentially pointless participation of the advocate in the atypical but non-empty set of cases of nonindividualized surveillance in which the FISC rules against the governmentor, at least, requires
additional support from the government before granting the applicationon its own. Such an
accommodation would also likely vitiate Judge Batess concerns with respect to information-sharing
between the government and the special advocates, since such sharing would only come after there has
already been judicial intervention and approval. Thus, in appropriate cases, an order by a FISC judge
granting a government application would also identify the randomly selected member of the special
advocate pool to whom such a decisionand all relevant supporting materialswould be forwarded to
the special advocate. As the metadata program illustrates, many of the applications that would
otherwise trigger such review are nothing more than requests to re-authorize programs already approved
by the FISC under the same rationale. Thus, after a transitional period during which preexisting rulings
could all be revisited at least once, the special advocates participation could further be limited to cases
in which the government is either (1) seeking an initial authorization for a new program and/or recipient;
(2) seeking a reauthorization under materially different facts / technological capabilities; or (3) seeking a
a protocol where FISC is separately empowered to invite the participation of a (again, randomly selected)
special advocate in any other case in which her participation is not already provided for would also make
sense. Finally, the special advocate should then be entitled to pursue declassificationor at least
publication of a redacted versionof any decisions produced in cases in which she participates. At the
very least, Congress could create a rebuttable presumption in favor of publication in such cases, in
contrast to current FISC Rule 62, which leaves publication to the discretion of individual judges. In all
then, this reasoning appears to most closely resemble some combination of the Schiff bill and the
final version of the Leahy bill, not because they envision the most modest role for a special advocate, but
A special advocate is best suited to handle nonindividualized cases this will balance privacy and
security concerns
Nathan Sales, 2014, I/S: A Journal of Law and Policy for the Information
courts were by necessity is going to have to remain secret. A lot of this involves very confidential classified
sources of information, sources that could be put at risk if it was a public process. At the same time, I
the public would have more confidence that the decisions were
being made properly if it knew that this court was hearing from both
sides, that there was someone who was well trained to articulate the
constitutional legal principles, that was there to represent the
privacy interests of the public. Some of the former FISA court judges
have now spoken out publicly saying that they believe that this would
be a step in the right direction to have that adversarial process so I
think it will help restore some of the public confidence in the court and
in the intelligence community's work.
think
public confidence in the court . Mr. Obama is also seeking revisions to the Patriot Act to
increase oversight and place more constraints on Section 215, which permits government seizure of
business records and is the basis for the collection of the phone records of most Americans. The specifics
of those changes are unclear.
host at NPR and Inglis was formely the NSAs No. 2 individual beneath the
agencys director], NPR, NSA says it would welcome public advocate at FISA
Court, http://www.npr.org/templates/transcript/transcript.php?
storyId=261079074, mm
INSKEEP: You just mentioned other ways to do this program. Are you now, as an agency, considering those
other ways? Just leaving the information with the phone company, for example, and picking it up through a
We are
open to other limitations. I think... INSKEEP: So you are considering that? INGLIS: We are
considering that. But I think that we're not the policy agent that would decide whether or not
we would then embrace one of those other choices. We would be a component of
executing that choice. INSKEEP: If the president or Congress changed the program, Inglis
warrant from the foreign intelligence surveillance court, when you need it? INGLIS: Certainly.
contends, it still needs to be efficient. It also has to protect Americans' privacy, which the agency insists it
has always tried to do with the vast piles of records it collects. INGLIS: I think most Americans would be
surprised at how infrequently we actually look at that data. In all of 2012, there were less than 300
locations where we said what we had was reasonable, articulable suspicion - that's the legal standard
that's applied here - to query that database; less than 300 times. INSKEEP: Although it is interesting,
though, the President's Commission, when it investigated this issue and wrote about it, said that yes, 288
times - I think - in 2012, you went to the metadata for a particular phone number. But then you're allowed
to look at phone numbers that were called from that number... INGLIS: That's true. INSKEEP: ...and then
numbers that were called from those numbers. And they outlined a scenario where one data request might
cause you to look at a million phone numbers. INGLIS: It could. But in all of 2012, we actually looked at
6,000. INSKEEP: Six thousand numbers, is the number in 2012. INGLIS: Six thousand numbers is what we
actually then touched, all based upon the seeds that started with less than 300. INSKEEP: If it's not clear
by now, Chris Inglis lives in a world of numbers, at an agency filled with computer experts. Far more of
those numbers have become public than the agency ever intended. Last summer, Edward Snowden
disclosed an internal agency audit. Analysts just at NSA headquarters committed about 2,700 violations of
the rules in a single year. Inglis has suggested only 711 violations were of real concern. And many of them
were typos - entering the wrong phone number, say, in search of another, He says that represents a tiny
percentage of his analysts' work. Those numbers got us thinking, though, about just how vast the agency
surveillance operations really are. INGLIS: The accuracy rate at NSA is 99.99984 percent - which is a
pretty good record. INSKEEP: I was fascinated by that math; that 711 errors in a year means that
99.99984 percent of the time, you're right. And so I started doing the math and reversed it; tried to figure
out well, how many communications are they monitoring, then? And when I did the math, I concluded that
that means that you're monitoring - I wrote down - 44,437,500 communications in a year. You're nodding that's about the scale of your activities. INGLIS: That's what that math would lead you to. But actually, it's
not that simple. So let's say I'm interested in a particular terrorist. That individual might have dozens;
might have, across a given year, hundreds of selectors. I'd kind of pick up and drop telephones - you know,
like it's fast food. INSKEEP: And the agency may look at each communication many times. In this way,
Inglis suggests, the NSA is not monitoring so many individual people, though he never denied analyzing
Congress wants NSA reform after all. Obama and the Senate need to pass it, The Guardian,
06/20/2014, http://www.theguardian.com/commentisfree/2014/jun/20/congress-obama-nsareform-obama-senate) GS
more awkward position. Does President Obama threaten a veto of the defense bill to stop this? (The White
House could always, you know, ban the bulk collection of your data right this second.) Yes, all of these
problems were exposed in some fashion by the Snowden revelations: A year ago, it was still classified that
NSA was searching for the American people's data in its database of "foreign" data. President Obama said
in response that NSA email and internet spying "doesn't apply to people living in the United States" but
the back-door loophole showed that it did. And the spy community's campaign for weaker encryption
standards was largely in the shadows as well, Snowden files exposed it all. The public got mad, and now
the House has overwhelmingly rejected those programs with legal and technical fixes, including Rep Alan
Grayson's overlooked amendment to disband NSA's covert encryption sabotage campaign at Nist, the
little-known government agency with a lot of power over encryption standards. (By the way, Grayson's
throwing the first Congressional Crypto Party next week.) Of course, the victory is far from permanent and
could be undone rather quickly. The FBI not the NSA is usually the agency that tries to strong-arm
companies into placing back doors in technology, and you can expect intelligence agencies to try to undo
the new provision against spending money on searching for US persons in secret, with a little help from
Congressional intelligence committees. Still, the real hurdle remains in the Senate, where these
strengthened provisions will still have to be adopted and passed on to Obama's desk if they have any
chance of having an affect. That is still a long shot, but
The NSA will comply with the law it isnt a rogue agency
Shane, 15
Peter, A.B., Harvard, Social Studies, 1974, J.D., Yale Law School, 1977. Heis an internationally recognized
scholar in administrative law, with a specialty in separation of powers law and has co-authored leading
casebooks on each subject. He has served on the faculty at the University Of Iowa College Of Law and was
dean at the University Of Pittsburgh School Of Law. Getting From May We? to Should We? at the NSA
(http://adlaw.jotwell.com/getting-from-may-we-to-should-we-at-the-nsa/)CMeeker 6/25/15
ineffective in advancing civil liberties values more robustly. Her argument is thematically related to an
earlier and equally thoughtful paper, Offices of Goodness: Influence Without Authority in Federal Agencies
(reviewed here), which likewise explored the difficulties for administrative agencies in honoring
overarching values that are relevant to their programs, but which may appear as orthogonal to a particular
agencys specific primary objectives. (Think about the Department of Transportation promoting park land
conservation or the Army Corps of Engineers protecting endangered species.)
have traditionally defined privacy and civil liberties rights with reference to the law (including executive
orders). Its important to emphasize that
requires.217 It is not that Joel takes no position at ODNI and in interagency discussions on policy matters;
in fact he states that I try to say, just like the President recently said, Just because we can do something,
doesnt mean we necessarily should.218 But Joel sees persuading colleagues about what ought to
happen as harder than telling them what is required to happen,219 and while no doubt he and others on
702 semiannual compliance reviews has been released in a form that allows evaluation of its content.
Finalized in August 2013, it does not read very differently from the NSAs own released or leaked
compliance work. Both deal with the precise requirements of the targeting and minimization rules and the
situations in which errors have occurred. In fact, Joel has sought out detailees from DOJ NSD to serve as
his offices designated staff for Section 702 compliance.220 Moreover, the offices public statements have
none take their role to be assessing whether the rules are appropriate, or whether conduct that is
compliant with the rules might nonetheless be ill advised.
the
advocate would not necessarily be someone appointed to a position
of employment within the federal governmentshe could instead be
someone assigned on a case-by-case basis to file briefs before the
FISC, or a federal contractor, in which case she would not be an
officer subject to the Appointments Clause. (See subsections II-B-1-a and II-B-1c of this OLC memo.) In any event, even if the legislation provided that the
advocate were to be appointed to a position of employment in the
federal government, she would not exercise significant government
authority pursuant to federal law, and thus would not be an officer
for Appointments Clause purposes. (See subsection I-B-1-b of that 1996 OLC memo.)
The role of the advocate would be solely to present legal arguments
to the FISC, as an attorney does when appointed as an amicus by the
Supreme Court to represent an undefended position in a case before
the Court. (See Martys discussion of the Courts practice.) Nothing the advocate would do would
advocate would be an officer of the United States in the first place. But she would not. For one thing,
have any binding effect upon any entity. (And even if the particular legislation in question provided that
the special counsel was to be a representative of third parties affected by the proposed order (such as
the U.S. persons whose metadata were collected under section 215, or the U.S. persons whose
communications are collected in a section 702 surveillance), that would not give the special advocate the
power to exercise significant governmental authority.) The CRS Report reaches the contrary conclusion by
referring to the Supreme Courts holding in Buckley v. Valeo that Federal Election Commissioners were
officers, in part because they were assigned the authority to bring suit against private parties, on behalf of
the federal government, to compel compliance with federal election laws. See 424 U.S. at 138. But the
special advocate would have no such authority. She would not be empowered to commence a lawsuit to
compel compliance with federal law, let alone to do so on behalf of the government; instead, she would
merely be allowed to participate as an attorney in cases already filed in the FISC by the government itself.
Accordingly,
The most far-ranging of these proposals is the USA FREEDOM Act, a bill introduced by Senator Leahy and
Office of the
Special Advocate within the judicial branch. The Special Advocate herself would be
selected by the Chief Justice of the United States from a list of at least five
Congressman Sensenbrenner, the original version of which would have created an
candidates proposed by the PCLOB whom the PCLOB believe will be zealous and effective advocates in
by the FISCR of any FISC decision appealed by the Special Advocate is mandatory, unless it would be
And the
Special Advocate is further empowered to appeal adverse decisions
by the FISCR to the Supreme Court. The Special Advocate may also
petition the FISC or FISCR to order the disclosure of a decision
containing classified information or a summary containing
unclassified information. The Special Advocate must report annually
to Congress regarding the activities of the office, the efectiveness
of the authorizing title, and suggestions for improving the
functioning of the office.
apparent to all reasonable jurists that such decision is dictated by statute or by precedent.
the technology, about 80 percent of the worlds Internet traffic passes through U.S. servers at some point.)
PRISM was another highly classified NSA program that Snowden uncovered. The Washington Post and the
Guardian made it the subject of their Day 2 Snowden stories (right after the revelations about telephone
Yet PRISM isnt touched at all by the USA Freedom Act, nor does
PRISM data-mining
is a much bigger program than telephone metadata ever was, and
its potentially more intrusive, since its hard to know whether, at
first glance, an IP address belongs to an American or a foreigner .
metadata).
any serious politician propose overhauling it. This is the case, even though
false. In fact, contrary to the repeated denials of President Obama and his top officials, the NSA
continuously intercepts the communications of American citizens ,
without any individual probable cause warrants to justify such
surveillance. Thats because the 2008 FISA law, as noted earlier, allows the NSA
without an individual warrant to monitor the content of any
Americans communications as long as those communications are
exchanged with a targeted foreign national. The NSA labels this incidental
collection, as though its some sort of minor accident that the agency has been spying on Americans. But
The
government often says that this surveillance of Americans communications is
incidental, which makes it sound like the NSAs surveillance of Americans phone calls and emails
this implication is deceitful. As Jameel Jaffer, the deputy legal director of the ACLU, explained:
is inadvertent and, even form the governments perspective, regrettable. But when the Bush
administration officials asked Congress for this new surveillance power, they said quite explicitly that
Americans communications were the communications of most interest to them. Se, for example, FISA for
the 21st century, Hearing Before the S. Comm. On the Judiciary, 109 th Cong. (2006) (statement of Michael
Hayden), that certain communications with one end in the United States are the ones that are most
those communications was doing anything illegal. And a lot of the governments advocacy is meant to
make Americans believe does not take place. As Yale Law professor Jack Balkin explained back in 2009:
"The Fisa Amendments Act of 2008, effectively gives the President - now President Obama - the authority
to run surveillance programs similar in effect to the warrantless surveillance program [secretly
implemented by George Bush in late 2001]. That is because New Fisa no longer requires individualized
directly targeted as the object of the program. . . . "New Fisa authorizes the creation of surveillance
programs directed against foreign persons (or rather, against persons believed to be outside the United
States) which require no individualized suspicion of anyone being a terrorist, or engaging in any criminal
activity. These programs may inevitably include many phone calls involving Americans, who may have
absolutely no connection to terrorism or to Al Qaeda." As the FAA was being enacted in mid-2008,
Professor Balkin explained that "Congress is now giving the President the authority to do much of what he
was probably doing (illegally) before". The ACLU's Deputy Legal Director, Jameel Jaffer, told me this week
says that this surveillance of Americans' communications is 'incidental', which makes it sound like the
NSA's surveillance of Americans' phone calls and emails is inadvertent and, even from the government's
perspective, regrettable. "But when Bush administration officials asked Congress for this new surveillance
power, they said quite explicitly that Americans' communications were the communications of most
interest to them. See, for example, Fisa for the 21st Century, Hearing Before the S. Comm. on the Judiciary,
109th Cong. (2006) (statement of Michael Hayden) (stating, in debate preceding passage of FAA's
predecessor statute, that certain communications 'with one end in the United States" are the ones "that
are most important to us'). The principal purpose of the 2008 law was to make it possible for the
government to collect Americans' international communications - and to collect those communications
without reference to whether any party to those communications was doing anything illegal. And a lot of
the government's advocacy is meant to obscure this fact, but it's a crucial one: The government doesn't
need to 'target' Americans in order to collect huge volumes of their communications." That's why
Democratic senators such as Ron Wyden and Mark Udall spent years asking the NSA: how many Americans
are having their telephone calls listened to and emails read by you without individualized warrants? Unlike
the current attempts to convince Americans that the answer is "none", the NSA repeatedly refused to
provide any answers, claiming that providing an accurate number was beyond their current technological
capabilities. Obviously, the answer is far from "none". Contrary to the claims by NSA defenders that the
surveillance being conducted is legal, the Obama DOJ has repeatedly thwarted any efforts to obtain judicial
rulings on whether this law is consistent with the Fourth Amendment or otherwise legal. Every time a
lawsuit is brought contesting the legality of intercepting Americans' communications without warrants, the
Obama DOJ raises claims of secrecy, standing and immunity to prevent any such determination from being
made.
NSAs internal auditing, done at Judge Bates version of gunpoint, put the number of
improperly collected wholly domestic American messages at
approximately 56,000 that year.
When official documents are released on the eve of a national holiday, there is a good chance they will
attract little notice. This almost happened with a July 2 report on a national security law known as
Section 702, which allows warrantless surveillance of people who do not have US
citizenship. Bland and bureaucratic, the 150-page report, issued by the bipartisan Privacy and Civil
Liberties Oversight Board, mostly found that the surveillance program was working as it was supposed to,
and thus seemed certain to disappear from view before the July Fourth fireworks on the National Mall were
his colleagues Julie Tate and Ashkan Soltani, four months in the making, which
names, e-mail addresses or other details that the NSA marked as belonging to U.S. citizens or residents.
NSA analysts masked, or minimized, more than 65,000 such references to protect Americans privacy,
but The Post found nearly 900 additional e-mail addresses, unmasked in the files, that could be strongly
linked to U.S. citizens or U.S.residents. The surveillance files highlight a policy dilemma that has been
aired only abstractly in public. There are discoveries of considerable intelligence value in the intercepted
messages and collateral harm to privacy on a scale that the Obama administration has not been willing
to address. Among the most valuable contents which The Post will not describe in detail, to avoid
interfering with ongoing operations are fresh revelations about a secret overseas nuclear project,
double-dealing by an ostensible ally, a military calamity that befell an unfriendly power, and the identities
of aggressive intruders into U.S. computer networks. Months of tracking communications across more
than 50 alias accounts, the files show, led directly to the 2011 capture in Abbottabad of Muhammad Tahir
Shahzad, a Pakistan-based bomb builder, and Umar Patek, a suspect in a 2002 terrorist bombing on the
Indonesian island of Bali. At the request of CIA officials, The Post is withholding other examples that
officials said would compromise ongoing operations. Many other files, described as useless by the
analysts but nonetheless retained, have a startlingly intimate, even voyeuristic quality. They tell stories of
love and heartbreak, illicit sexual liaisons, mental-health crises, political and religious conversions,
financial anxieties and disappointed hopes. The daily lives of more than 10,000 account holders who were
not targeted are catalogued and recorded nevertheless. In order to allow time for analysis and outside
reporting, neither Snowden nor The Post has disclosed until now that he obtained and shared the content
of intercepted communications. The cache Snowden provided came from domestic NSA operations under
the broad authority granted by Congress in 2008 with amendments to the Foreign Intelligence Surveillance
Act. FISA content is generally stored in closely controlled data repositories, and for more than a year,
senior government officials have depicted it as beyond Snowdens reach. The Post reviewed roughly
160,000 intercepted e-mail and instant-message conversations, some of them hundreds of pages long, and
7,900 documents taken from more than 11,000 online accounts. The material spans President Obamas
Taken
together, the files ofer an unprecedented vantage point on the
changes wrought by Section 702 of the FISA amendments, which
enabled the NSA to make freer use of methods that for 30 years had
required probable cause and a warrant from a judge. One program, codenamed PRISM, extracts content stored in user accounts at Yahoo,
Microsoft, Facebook, Google and five other leading Internet
companies. Another, known inside the NSA as Upstream, intercepts data on
first term, from 2009 to 2012, a period of exponential growth for the NSAs domestic collection.
the move as it crosses the U.S. junctions of global voice and data
networks.
a foreign country, a practice often used by people in one country who would like to watch television in
Washington Post
reporters
examined roughly 160,000 intercepted e-mail and instant-message
conversations, some of them hundreds of pages long, and 7,900 documents taken from more than
11,000 online accounts supplied by Snowden, as well as consulting with national security
officials; the government report relied solely on what it vaguely described as information related to
the Section 702 program supplied by the intelligence community. According to
the Post reporters, No government oversight body, including the
Justice Department, the Foreign Intelligence Surveillance Court,
intelligence committees in Congress or the presidents Privacy and
Civil Liberties Oversight Board, has delved into a comparably large
sample of what the NSA actually collectsnot only from its targets
but also from people who may cross a targets path.
The stark contrast between the findings of the Privacy Board and those of The
demonstrates, yet again, the value of independent investigative reporting. The Post
the guidelines it submitted to the court. In his interview with the president last night, Charlie Rose asked
Obama about the oversight he claims exists: "Should this be transparent in some way?" Obama's answer:
"It is transparent. That's why we set up the Fisa Court." But as Politico's Josh Gerstein noted about that
exchange: Obama was "referring to the Foreign Intelligence Surveillance Court which carries out its work
almost entirely in secret." Indeed, that court's orders are among the most closely held secrets in the US
government. That Obama, when asked about transparency, has to cite a court that operates in complete
secrecy demonstrates how little actual transparency there is to any this. The way to bring actual
transparency to this process it to examine the relevant Top Secret Fisa court documents. Those documents
demonstrate that this entire process is a fig leaf, "oversight" in name only. It offers no real safeguards.
eavesdropping. The only time individualized warrants are required is when the NSA is specifically targeting
a US citizen or the communications are purely domestic.
obtain Fisa court approval, the agency does not tell the court whose
calls and emails it intends to intercept. It instead merely provides the general
guidelines which it claims are used by its analysts to determine which individuals they can target, and the
elements' and that the revised NSA, FBI and CIA minimization procedures submitted with the amendment
'are consistent with the requirements of [50 U.S.C. 1881a(e)] and with the fourth amendment to the
Constitution of the United States'". As but one typical example, the Guardian has obtained an August 19,
2010, Fisa court approval from Judge John Bates which does nothing more than recite the statutory
language in approving the NSA's guidelines. Once the NSA has this court approval, it can then target
anyone chosen by their analysts, and can even order telecoms and internet companies to turn over to
demonstrate how much discretion the agency has in choosing who will be targeted. Those guidelines also
make clear that, contrary to the repeated assurances from government officials and media figures ,
the
There is no outside
scrutiny, and certainly no Fisa court involvement. As the NSA itself explained in
emails is made exclusively by NSA analysts and their "line supervisors".
its guidelines submitted to the Fisa court: "Analysts who request tasking will document in the tasking
database a citation or citations to the information that led them to reasonably believe that a targeted
person is located outside the United States. Before tasking is approved, the database entry for that tasking
will be reviewed in order to verify that the database entry contains the necessary citations."
not go into too much detail on the valuable information the sweeps returned for national security
reasons, but noted the searches provided the government with information about a secret overseas
nuclear project and the identities of cyber hackers attacking U.S. networks. But the sweeps also provided
the government agency with detailed information about the lives of more than 10,000 people who were
not necessarily being targeted by the NSA. The Post report described the files, determined as useless but
nonetheless retained as running the gamut from illicit sexual liaisons to financial anxieties. Pictures,
including mothers kissing their infants and women modeling lingerie, were picked up in the broad
our national intelligence apparatus. In one example, it cites an analyst who inferred that every member of
the chat friend list of a known foreigner to be foreign as well, a view so broad as to be almost ridiculous.
warrant but the warrants have expired, one analyst writes, requesting that surveillance resume under the
use of Section 702, and that the FBI and CIA also use similar methods, and especially that the NSAs
incredibly broad interpretation of what it can collect under the rule, the amount of data and
communications in its databases stemming from United States persons must be massive. And it has the
authority. Before the Posts report this weekend, the Privacy and Civil Liberties Oversight Board (PCLOB)
released a report that generally upheld the 702 program. However no government oversight body, not
even PCLOB, had delved into as large of a sample as the one the Post dissected. Even before these privacy
violations were revealed, privacy advocacy groups like the Electronic Frontier Foundation were denouncing
according to a letter sent to Senator Ron Wyden. The missive, written by the Office of the Director of
National Intelligence (ODNI) to the Senator in response to a question posed earlier this month, is
plainspoken. The Office also stated that the searches in question are not based on an exploited legal
loophole. The House recently voted to curtail such searches by defunding them. Section 702 of the
Foreign Intelligence Surveillance Act allows the government to collect information on foreign targets that
are, to use its own language, reasonably believed to be outside of the U.S. at the time of collection. It
cant target United States persons by law, and it isnt allowed to reverse-target picking a foreign target
The
information collected under Section 702 authority may include the
communications of Americans picked up in the process of collecting
data on foreign targets. The stored information can then be queried
by the NSA, and its intelligence brethren, using search terms to find
the communications of Americans. Hence the term backdoor. How
with the hopes of picking up the communications of someone thought to be in the United States.
many Americans are caught up in the mix? According to the letter, the NSA used such queries to search
the communications content of 198 U.S. persons in 2013. It also made around 9,500 metadata queries for
the communications of U.S. persons in the period. The number of people impacted by the meta-data
searches isnt clear. The CIA made 1,900 queries of Section 702-sourced information using specific U.S.
person identifiers in 2013. Ominously, the FBI also has access to some of the pooled data, but doesnt
count how often that it queries it using U.S. person identifiers. Senator Wyden isnt pleased with the data.
In a statement, he indicated that [w]hen the FBI says it conducts a substantial number of searches and it
has no idea of what the number is, it shows how flawed this system is and the consequences of inadequate
oversight. Scale is also something to keep in mind. The ODNI states in its letter that collection under
Section 702 is not bulk collection, but is targeted collection based on specific identifiers. Senator Wyden
disagrees (Emphasis: TechCrunch): While intelligence officials have often argued that it is impossible to
estimate how many Americans communications are getting swept up by the government under Section
Americans
communications also may be collected by accident referred to by the NSA as
section 702, communications involving Americans were the most important to us.
inadvertent collection, to distinguish it from the incidental collection that happens by design. Under
section 702, there is no need for the government to specifyor even knowthe identity of the person
whose communications are being intercepted. The government must employ court-approved targeting
procedures, which are supposed to ensure that the target is reasonably believed to be a foreigner
overseas. As a result of Edward Snowdens leaks, however, we now know that these procedures allow the
NSA to presume that the target is a foreigner overseas as long as it has no specific information to the
contrary. Reports also indicate that the NSA, in sifting through Internet traffic, employs search terms that
are designed to achieve 51% confidence in the targets foreignnessjust slightly better odds than a coin
Americans may be kept and shared only under narrow circumstancesfor instance, if the information is
evidence of a crime or is necessary to understand foreign intelligence information. The full statutory logic
thus unfolds as follows: In a programmatic effort to collect intelligence about foreign nationals, the
warrantless acquisition of information about U.S. persons may be inevitablebut it should be kept to a
minimum. Moreover, when such warrantless acquisition does occur, the information that relates to U.S.
persons generally should be segregated out and destroyed or masked unless it falls under certain
minimization requirements had expressly prohibited this practice.) The government may intentionally
search for this information even though it would have been illegal, under section 702s reverse targeting
prohibition, for the government to have such intent at the time of collection. And the government may use
U.S. person identifiers to search the raw, unminimized data setwhich means, effectively, that
minimization never takes place for those individuals.
efficacy of 702 in counterterrorism. Researchers concluded that section 702 is less valuable than people
may have assumed, finding that section 702 collection played a role in only 4.4 percent of examined
terrorism cases. In a few months, PCLOB plans to issue a report on section 702 collection.
analyst to know what might become relevant to another. As the Privacy Board report explains,
describes how communications of US persons are collected and what is done with them. One typical
example is a document submitted by the NSA in July 2009. In its first paragraph, it
purports to set
It also
states that "such communications or information" - those from US
contain significant foreign intelligence information"; (2) "the communication does not contain foreign
intelligence information but is reasonably believed to contain evidence of a crime that has been, is being,
or is about to be committed"; or (3) "the communication is reasonably believed to contain technical data
base information, as defined in Section 2(i), or information necessary to understand or assess a
The Privacy and Civil Liberties Oversight Board (PCLOB) issued a legally flawed
and factually incomplete report late Tuesday that endorses Section 702
surveillance. Hiding behind the complexity of the technology, it gives short shrift to the very
serious privacy concerns that the surveillance has rightly raised for millions of Americans. The board also
deferred considering whether the surveillance infringed the privacy of many millions more foreigners
The board skips over the essential privacy problem with the
702 upstream program: that the government has access to or is
acquiring nearly all communications that travel over the Internet. The
board focuses only on the governments methods for searching and
filtering out unwanted information. This ignores the fact that the
government is collecting and searching through the content of
millions of emails, social networking posts, and other Internet communications, steps
abroad.
that occur before the PCLOB analysis starts. This content collection is the centerpiece of EFFs Jewel v. NSA
PCLOBs analysis incorrectly assumes that no warrant is required. The report simply says that it takes no
position on an exception to the warrant requirement when the government seeks foreign intelligence. The
Founders did not fight a revolution to gain the right to government agency protocols." Justice Roberts
thoughts are on point when it comes to NSA spyingmass collection is a general warrant that cannot be
searches, the PCLOB simply asks the NSA to study the issue. The PCLOB report provides the public with
collection and search of Americans' communications without a warrant or individually approved court order
is barred by the Constitution and must be stopped. We look forward to continuing such arguments in Jewel
v. NSA, our ongoing case against the NSA's mass spying programs.
reasonable grounds to believe that the target is a non-American, it will sometimes be wrong. On
occasion, the target will in fact turn out to be an American citizen. But that persons emails, phone calls,
etc. will now be contained in the NSAs database. Second, even if the target is, in fact, a non-American, the
target will sometimes be emailing or calling an American citizen. In that situation, the American citizens
communications with the target will be incidentally picked up by the NSA, and they too will wind up in the
NSAs database. Assuming that the NSAs collection of these communications is authorized by section 702
and is both lawful and constitutional with respect to persons who are not American citizens, what rights, if
any, do American citizens have in the privacy of their communications when those communications have
incidentally been intercepted and collected by the NSA? This raises the issue of so-called backdoor
searches. That is, once the NSA has these communications in its database, can it then lawfully search the
database for the communications of American citizens? The defenders of backdoor searches maintain
that, because the initial interception and collection of the communication was lawful, the government is
free to use the information obtained against anyone. This is, indeed, the general approach to searches in
the United States. For example, if the government lawfully (with probable cause and a warrant) reads Xs
emails or wiretaps Xs phone calls, and it learns from Xs emails or phone calls that Y is engaged in illegal
activity, it can legally use that information against Y, even though the government had no legal
justification to intercept Ys communications. Because the interceptions were themselves lawful, the
general rule is that the government can use the lawfully obtained information against anyone, including Y.
The defenders of backdoor searches argue that the same rule should apply in the section 702 situation.
Last fall, I served on a five-member Review Group that was charged by the president with
making recommendations about reforming the nations foreign intelligence programs. [Our report is here:
amendment endorsed. The Review Group concluded that the situation under section 702 is
distinguishable from the situation when the government lawfully intercepts a communication when it has
probable cause and a warrant. This is so because, in the section 702 situation, the government is not
required to have either probable cause or a warrant to intercept the communication. Because section 702
was not intended to enable the government to intercept the communications of American citizens,
because our recommended reform would leave the government free to use section 702 to obtain the types
of information it was designed and intended to acquirethe communications of non-U.S. citizens, and
because the recommended reform would substantially reduce the temptation the government might
otherwise have to use section 702 impermissibly in an effort intentionally to intercept the communications
of American citizens, we concluded that this reform was both wise and essential. Now that the House of
Representatives has agreed, it is time for the Senate and the president to move forward to make this
recommendation a reality.
Judicial ideology and viewpoint are of greater concern for the FISC
than for other trial-level courts. The issues are novel, they evolve quickly, and
they are immensely controversial. FISA court proceedings are ex
parte with only the government represented. No matter how noble
or non-ideological FISA judges may be, the circumstances
systemically prejudice them in favor of surveillance, rather than
privacy. 47 That problem is exacerbated by the empirically evident
selection of judges whose ideology and experience indicate
predisposition for the governments side of Fourth Amendment
issues.48 As with any other trial court, one judge typically presides over each case. But the last time
Congress amended the FISA court statute, it permitted the FISC to hear issues en banc, so there really is
potential for judges to get together and vote on tough questions the way divided appellate courts do.49
FISC decisions are nearly always final in fact. The FISCR has
only ever heard two cases, and the Supreme Court has never once
reviewed a case originating in the FISC.50
Moreover,
metadata
surveillance can be especially revealing: Consider the following hypothetical
Princeton computer science and public affairs professor Edward Felten explained why
example: A young woman calls her gynecologist; then immediately calls her mother; then a man who,
during the past few months, she had repeatedly spoken to on the telephone after 11 pm; followed by a call
to a family planning center that also offers abortions. A likely storyline emerges that would not be as
evident by examining the record of a single telephone call. Even for a single phone call, the metadata can
be more informative than the calls content. Listening in on a woman calling an abortion clinic might reveal
nothing more than someone confirming an appointment with a generic-sounding establishment (East Side
Clinic or Dr. Joness office). But the metadata would show far more than that: it would reveal the identity
of those who were called. The same is true of calls to a dating service, a gay and lesbian center, a drug
addiction clinic, an HIV specialist, or a suicide hotline. Metadata would likewise unmask a conversation
between a human rights activist and an informant in a repressive regime, or a confidential source calling a
journalist to reveal high-level wrongdoing. And if you frequently call someone late at night who is not your
The relevant point here is not merely that many partisan loyalists are unprincipled hypocrites with no real
convictions other than a quest for power, although that is certainly true. More important is what such
statements reveal about the nature of how one regards state surveillance. As with so many injustices,
Governments have long convinced populations to turn a blind eye to oppressive conduct by leading
citizens to believe, rightly or wrongly, that only certain marginalized people are targeted, and everyone
else can acquiesce to or even support that oppression without fear that it will be applied to them.
In the 20th century, the United States reached levels of wealth for more people than had ever been seen in
human history. However, those in power whittled away at the nations basic freedoms, slowly and over
generations. Complaints were few because material prosperity endured. Today, massive and
Freedom continues to be
whittled away at, but more US Americans are awakening to this hard truth, because material
prosperity for many is evaporating. One area that they view with growing alarm is the emergence
of the United States of America as a surveillance state , since, along with a
militarized police force, it is the infrastructure of totalitarianism .+ This is the second
unsustainable debts are maintaining the US standard of living.
in a series of reflections seeking to understand these negative trends in the United States. The first essay
analyzed the role of the US Supreme Court in particular, its decisions that undermined private property
rights and forced taxpayers to cooperate with evil. I concluded with the controversial proposition that the
present system in the United States is post-constitutional.+ For generations, US Americans believed that
the first, third, fourth, and ninth amendments found in the Bill of Rights protected the privacy of citizens of
the United States that only a small number engaged in criminal conduct would be subjected to
the
arrival of new technologies provided the state with the means to
circumvent these constitutional provisions. In the state of Florida, for example,
surveillance, following a court order permitting such activity by the authorities.+ However,
automated systems are replacing toll operators, and they either process your information via your Sun
Pass or by photographing your license plate and sending you the bill. According to the pre-paid toll
program privacy policy, information concerning a SunPass account is provided only when required to
comply with a subpoena or court order.+ In other words, they are compiling and storing information on
your whereabouts.+ Affirming this reality, the American Civil Liberties Union stated on July 18, 2013, that
Police around the United States are recording the license plates of passing drivers and storing the
information for years with little privacy protection. The information potentially allows authorities to track
the movements of everyone who drives a car.+ However, the Electronic Frontier Foundation makes clear
that the federal and state governments are monitoring not only US Americans physical movement, but
without a probable cause warrant. Finally, the media reports confirm the upstream collection off of the
foreigners and Americans. In some cases, it retains the written content of emails sent between citizens
within the U.S. and also filters domestic phone calls made with Internet technology . . . What is equally
disturbing is that private companies are complicit in the behavior when not engaging in their own
monitoring of internet communications although, to be fair, their will is not always on the side of the
spying. (See the video below.) Further, even though the immense and illegal surveillance apparatus is out
in the open now, we see no remorse from the instigators and the elected officials responsible. Rather, they
are doubling down, and their apologists are right there with them. Unfortunately, there is no plan; there is
no conspiracy. This expansion and centralization of power has continued under both Republicans and
Democrats in the United States and would most likely continue under a third party. Centralized power has
become an end unto itself, and as the late Czech president Vaclav Havel observed:+ Once the claims of
central power have been placed above law and morality, once the exercise of that power is divested of
public control, and once the institutional guarantees of political plurality and civil rights have been made a
mockery of, or simply abolished, there is no reason to respect any other limitations. The expansion of
central power does not stop at the frontier between the public and the private, but instead, arbitrarily
pushes back that border until it is shamelessly intervening in areas that once were private.
The
threat of terrorism
is that is so plainly exaggerated. The risk of any American dying in a
terrorist attack is infinitesimal, considerably less than the chance of being struck by
lightning. John Mueller, an Ohio State University professor who has written extensively about the
balance between threat and expenditures in fighting terrorism, explained in 2012: The
number of people worldwide who are killed by Muslim-type
terrorists, Al Qaeda wannabes, is maybe a few hundred outside of war zones. Its basically the
same number of people who die drowning in the bathtub each year. More
American citizens have undoubtedly died overseas from traffic accidents or intestinal illnesses, the
Yet exaggeration of the threat is repeated over and over. Shortly before the 2012 Olympics in London,
controversy erupted over a supposed lack of security. The company contracted to provide security had
failed to appoint the number of guards required by its contract, and shrill voices from around the globe
insisted that the games were therefore vulnerable to a terrorist attack. After the trouble-free Olympics,
Stephen Walt noted in Foreign Policy that the outcry was driven, as usual, by severe exaggeration of the
public funding; and the permanent power factions in Washington, committed to setting their priorities
without real challenge. Stephen Walt made this point: Mueller and Stewart estimate that expenditures on
domestic homeland security (i.e. not counting the wars in Iraq and Afghanistan) have increased by more
than $1 trillion since 9/11, even though the annual risk of dying in a domestic terrorist attack is about 1 in
3.5 million. Using conservative assumptions and conventional risk-assessment methodology, they estimate
that for these expenditures to be cost-effective they would have had to deter, prevent, foil or protect
against 333 very large attacks that would otherwise have been successful every year. Finally, they worry
that this exaggerated sense of danger has now been internalized: even when politicians and terrorism
As the fear
of terrorism has been manipulated, the proven dangers of allowing
the state to operate a massive secret surveillance system have been
seriously understated. Even if the threat of terrorism were at the
level claimed by the government, that would still not justify the
NSAs surveillance programs. Values other than physical safety are
at least as if not more important. This recognition was embedded in US political culture
from the nations inception, and is no less crucial for other countries. Nations and individuals
constantly make choices that place the values of privacy and, implicitly,
experts arent hyping the danger, the public still sees the threat as large and imminent.
freedom above
other objectives, such as physical safety. Indeed, the very purpose of the
Fourth Amendment in the US Constitution is to prohibit certain police actions, even though they might
reduce crime. If the police were able to barge into any home without a warrant, murderers, rapists, and
kidnappers might be more easily apprehended. If the state were permitted to place monitors in our homes,
crime would probably fall significantly (this is certainly true of house burglaries, yet most people would
recoil in revulsion at the prospect). If the FBI were permitted to listen to our conversations and seize our
communications, a wide array of crime could conceivably be prevented and solved. But the Constitution
was written to prevent such suspicionless invasions by the state. By drawing the line at such actions, we
knowingly allow for the probability of greater criminality. Yet we draw that line anyway, exposing ourselves
to a higher degree of danger, because pursuing absolute physical safety has never been our single
overarching societal priority. Above even our physical well-being, a central value is keeping the state out of
the private realm our persons, houses, papers, and effects, as the Fourth Amendment puts it.
We do so precisely because that realm is the crucible of so many of the attributes
typically associated with the quality of life creativity, exploration, intimacy.
Forgoing privacy in a quest for absolute safety is as harmful to a
healthy psyche and life of an individual as it is to a healthy political
culture. For the individual, safety first means a life of paralysis and fear , never
entering a car or an airplane, never engaging in an activity that entails risk, never weighing quality of life
Terror, Americans have frequently been told that they must relinquish their core political rights if they are
to have any hope of avoiding catastrophe. From Senate Intelligence chair Pat Roberts, for example: I am a
strong supporter of the First Amendment, the Fourth Amendment and civil liberties. But you have no civil
liberties if you are dead. And GOP senator John Cornyn, who ran for reelection in Texas with a video of
himself as a tough guy in a cowboy hat, issued a cowardly paean to the benefit of giving up rights: None
of your civil liberties matter much after youre dead. Talk radio host Rush Limbaugh piled on, displaying
historical ignorance by asking his large audience: When is the last time you heard a president declare war
on the basis that we gotta go protect our civil liberties? I cant think of oneOur civil liberties are worthless
if we are dead! If you are dead and pushing up daisies, if youre sucking dirt inside a casket, do you know
chilling effect can be simply defined as the way in which people alter or modify their behavior to conform
to political and social norms as a result of knowing or believing they are being observed. The observation
can be from physical surveillance, telephone meta data being collected, emails being intercepted and
read, search engine requests being maintained, text messages being read and stored, financial
transactions being monitored and much more. This paper will examine the chilling effect and provide some
empirical data (links within this article) to show
an option. For years, even decades it has been reported by people inside and outside our government that
agencies and departments within our federal government have been spying on citizens and further
collecting data (Personal Identifiable Information) associated with the domestic spying taking place. Many
of us who discussed the spying taking place were called conspiracy theorists, tin foil hat wearers, or black
helicopter paranoid people: Today we are called realists. The Snowden revelations are unique because of
the depth and scope of the revelations and because Snowden had the official documents to back up his
assertions. Previously people including former NSA analysts such as William Binney, Thomas Drake, Russell
Tice and Kirk Wiebe had come forward asserting that our government was spying on citizens. Too many in
the government, the media, and the public dismissed the allegations of these men because it was easy
to do so rather than believe the worst about our government, or actually having to do something about
domestic spying. To be fair the NSA has not been the only ones accused of domestic spying. The FBI, DHS,
and the CIA have also been proven to having done their own domestic spying; in the case of the FBI going
back over seventy years. I support the need for our intelligence community, law enforcement, and our
military. Unfortunately in much the same way the Stockholm Syndrome results in a person who has been
kidnapped falling victim to the goals and aspirations of the kidnappers, the rank and file of those
responsible for protecting us and our freedom have fallen victim to corrupt leadership in our intelligence
and law enforcement communities. The culture of corruption is just as infectious as any chemical or
biological weapon of mass destruction. Congress has its share of the blame for the domestic spying that
has and even to this day is taking place. After all it is congress that has the responsibility of oversight over
agencies and departments of the federal government. All too often congress has failed to do what it has
been tasked with doing; performing oversight. In fact, not too long ago congress gave retroactive immunity
to telecom companies for the roles telecom companies played in illegally collecting information for the NSA
at the request of former President Bush. When it comes down to it, there is plenty of blame to go around.
Some are guilty: All are responsible including the public for not demanding better of our elected and
appointed officials. Whether a Democrat or Republican occupied the White House or regardless of which
party controlled the Senate and/or the House of Representatives, domestic spying took place and is still
taking place. Domestic spying is not a Right or Left issue. Domestic spying is an equal opportunity
offender. Typically I would provide dozens of links in an article to substantiate what I am writing. In the
case of the chilling effect I am only going to provide three links. The three links provide undeniable
evidence that the chilling effect is real and how the chilling effect is affecting our country
http://gigaom.com/2013/08/20/through-a- prism-darkly-fear-of-nsa-surveillance-is- having-a-chilling-effecton-the-open-web/ and https://www.commondreams.org/ headline/2013/11/12-5 and finally http://
papers.ssrn.com/sol3/papers.cfm? abstract_id=2412564 The bottom line is the chilling effect is not some
lawmakers, young people, journalists and other writers have all too various degrees become subject to
have read dozens of papers and other material accounting for thousands of pages about the Chilling
Effect. Depending on who is doing the research and the writing,
the issue makes sense if you understand privacy solely as a political or legal concept. And its political
importance is certainly part of what makes privacy so important: what is private is what is yours alone to
control, without interference from others or the state. But the concept of privacy also matters for another,
deeper reason. It is intimately connected to what it is to be an autonomous person. What makes your
thoughts your thoughts? One answer is that you have what philosophers sometimes call privileged
access to them. This means at least two things. First, you access them in a way
I cant. Even if I could walk a mile in your shoes, I cant know what you feel in
the same way you can: you see it from the inside so to speak. Second, you
can, at least sometimes, control what I know about your thoughts. You can
hide your true feelings from me, or let me have the key to your heart. The idea
that the mind is essentially private is a central element of the Cartesian concept of the self a concept
that has been largely abandoned, for a variety of reasons. Descartes not only held that my thoughts were
private, he took them to be transparent all thoughts were conscious. Freud cured us of that. Descartes
also thought that the only way to account for my special access to my thoughts was to take thoughts to be
made out of a different sort of stuff than my body to take our minds, in short, to be non-physical, distinct
from the brain. Contemporary neuroscience and psychology have convinced many of us otherwise. But
know instantly a great amount about how the outside world affects you, what scares you, what makes you
person making these searches for national security purposes, wed be on the way to having a real-world
a distinct person would begin to shrink . Our relationship would be so lopsided that there
might cease to be, at least to me, anything subjective about you. As I learn what reactions you
will have to stimuli, why you do what you do, you will become like any other
object to be manipulated. You would be, as we say, dehumanized The connection
between a loss of privacy and dehumanization is of course, a well-known and ancient fact, and one for
stripping a person literally and figuratively of everything they own. Our thought experiment merely shows
us the logical endgame. Prisoners might hide their resentment, or bravely resist torture (at least for a time)
but when we lose the very capacity to have privileged access to our psychological information the
capacity for self-knowledge, so to speak, we literally lose our selves. In making the connection between
autonomous personhood and the privacy of thought in this way, we neednt rely on a Cartesian view of the
mind. The connection isnt metaphysical. It is a presupposition of understanding and communicating with
one another. Mutual communication as opposed to, say, eavesdropping is about sharing. When
communicating freely in this way, we see one another as subjects, as persons whose thoughts are our own
thoughts to which we have privileged access and are attempting to communicate. This assumption
might be mistaken in particular cases of course. But it is hard to make sense of mutual, open
communication without it. This is not a fact that requires us to think that the mind is non-physical. But it
does tell us that our concept of psychological privacy and one centrally important notion of personhood
that of an autonomous person are deeply linked. John Locke, who thought about all these ideas,
described personhood in general as a forensic concept. By this, he meant that it was an idea with a legal
purpose and it is. We use it to decide who can be held responsible, and who has rights that the state
should not violate. But the concept of an autonomous person has an additional role. It matters because it
So while
privacy, too, is a legal concept, its roots are deeply intertwined with the
purposes and point of the more basic concept of having a self . And that in turn
is the idea we use when we think of ourselves as just that as developed adult selves.
raises all sorts of questions worth asking. Some of these are philosophical and psychological: including the
think
about how our technologies are themselves changing our ways of thinking
about the self. However we resolve these issues, we would do well to keep the connections between
limits of, and underlying explanation for, the privacy of the mental. But others should get us to
self, personhood and privacy in mind as we chew over the recent revelations about governmental access
to Big Data. The underlying issue is not simply a matter of balancing convenience and liberty. To the extent
we risk the loss of privacy we risk, in a very real sense, the loss of our very status as subjective,
autonomous persons.
and its implications. The panel included the volumes two editors, Mathew Burrows and Maria J. Stephan,
The success rate
of civil disobedience has declined to a rate not seen since the 1950s .
Its worrisome, said Stephan, a Senior Policy Fellow at the United States Institute of Peace (USIP).
Theres
debilitating separatist rebellion in the eastern part of that country, has dominated the news recently. But
this action should be seen for what it is: a Kremlin containment effort to prevent Ukrainians from achieving
The
Ukraine example is just one small part of a vast containment
ambition led by the regimes in Moscow, Beijing, Riyadh and Tehran ,
which may disagree on many things but share an interest in limiting the spread of democracy. The
strategy has evolved in three key areas. The first concerns
institutions. Seeing regional and international rules-based bodies as a threat to regime interests,
a democratically accountable government that would threaten Russias corrupt authoritarian system.
authoritarians have focused their efforts on hobbling key institutions democracy and human rights
mechanisms. Russia, in cooperation with other authoritarian regimes in Eurasia, has undermined the
human rights dimensions of the Council of Europe and the Organisation for Security and Cooperation in
Europe, especially the latters election-monitoring and media-freedom functions. Venezuela plays a
with China and Russia, is pursuing greater control of the Internet in intergovernmental bodies worldwide.
As the authoritarians whittle away at democratic standards, they have created their own clubs, such as the
Shanghai Cooperation Organization (SCO) and the Eurasian Customs Union, that mimic their liberal
counterparts but whose aim is to institutionalize authoritarian norms. Through a treaty arrangement with
SCO members, China has challenged the norm against refoulement the return of persecuted individuals
to the hands of their persecutors by using a designation of terrorist as the basis for repatriation. China
has persuaded non-SCO countries such as Cambodia and Malaysia to cooperate with this new standard.
More broadly, authoritarian regimes work with each other to monitor activists and oppositionists and block
their movement, for instance through international watchlists and blacklists that are generated within
addition to Ukraine, Russia pursues a disruptive policy toward democratic hopefuls Georgia and Moldova.
The Baltic states, although NATO and European Union members, nevertheless are targets of Kremlinbacked political efforts and media campaigns that aim to raise doubts about the integrity of their young
democracies. China is taking measures to slowly squeeze the democracy out of Hong Kong. Saudi Arabias
political and security commitment to Bahrains government has served to contain its smaller neighbors
and Russia have built formidable traditional and new media outlets that enable them to project such
messages into the global marketplace. This prowess is especially apparent in the developing world, where
a new battle of ideas is underway. China has an enormous media presence in sub-Saharan Africa and has
rapidly gained a foothold there. Its multibillion-dollar international CCTV has programs in Arabic, French,
Russian and Spanish, and the state news agency Xinhua is expanding worldwide. Russias RT, in addition to
its virulently anti-Western English programming, broadcasts its jaundiced view of the world around the
clock in Spanish and Arabic. While the authoritarians claim that their massive international broadcasting
ventures are needed to offer an unfiltered view of their countries, it is telling that these state-led media
conglomerates devote so much of their programing to assailing the West and the idea of democracy. We
can infer from this that the emerging authoritarian doctrine reflects the need for leaders in Moscow, Beijing
and elsewhere to contain what they fear and do not possess: democratic accountability and legitimacy.
Given the stakes for the liberal order, the democratic world will need
to develop a serious long game sooner rather than later to respond to the
growing challenge presented by the migration of the authoritarians illiberal norms beyond their
borders.
In the 1930s travelers returned from Mussolinis Italy, Stalins Russia, and Hitlers Germany praising the
hearty sense of common purpose they saw there, compared to which their own democracies seemed
weak, inefficient, and pusillanimous. Democracies today are in the middle of a similar period of envy and
today they go to China to take the bullet train from Beijing to Shanghai, and just as in the 1930s, they
return wondering why autocracies can build high-speed railroad lines seemingly overnight, while
democracies can take forty years to decide they cannot even begin.
momentwhen in 1989 Westerners were told that liberal democracy was the final form toward which
all political striving was directednow looks like a quaint artifact of a vanished unipolar
moment. The conflict between authoritarianism and democracy is not a new cold war, we are told,
because the new authoritarians lack an expansionary ideology like communism, he writes for the New
York Review of Books. This is not true. Communism may be over as an economic system, but as a model
of state domination it is very much alive in the Peoples Republic of China and in Putins police state, he
notes: Nor does this new authoritarianism lack an economic strategy. Its goal is a familiar form of
modernization that secures the benefits of global integration without sacrificing political and ideological
control over its populations. Its economic model is price-fixing state capitalism and its legal system is rule
by (often corrupt) fiat in place of the rule of law. Its ethics rejects moral universalism in favor of a claim
that the Chinese and Russian civilizations are self-contained moral worlds. Persecution of gays, therefore, is
not some passing excess, but is intrinsic to their vision of themselves as bulwarks against Western
individualism. Russias and Chinas strategic visions may draw on different historical experiences, but the
messages they take from their histories are similar. Both dwell on the humiliations they have received at
the hands of the West. Both explicitly refuse to accept liberal democracy as a model. Both insist that their
twentieth-century experience of revolution and civil war necessitates centralized rule with an iron fist. The
Chinese and Russian variants of authoritarian modernization draw upon different resources, and they
remain geostrategic competitors, one rising, the other trying to halt its decline, but both see good reasons
to align their interests for the medium term. This commonality of interest is strikingthey vote together on
the Security Council, persecute their own dissidents, and jointly stick up for exterminatory dictatorship in
Syria. In their shared resentment toward the American world order, they have spoken as one since the day
the Americans bombed the Chinese embassy in Belgrade in 1999. The
new authoritarians
ofer the elites of Africa and Eurasia an alternate route to modern
development: growth without democracy and progress without freedom, notes Ignatieff. This is
the siren song some African, Latin American, and Asian political elites, especially the kleptocrats, want to
hear. U.S. no longer vanguard of democracy President Obamas recent address at West Point suggests
that he is listening to a new doctrine of restraint, he writes, one which captures a sense, among
John Micklethwait and Adrian Wooldridge urge Western democrats to learn from their authoritarian
competitors, says Ignatieff: The fact that Singapore and Shanghai are better governed than Detroit or Los
Angeles is hardly news. The issue is whether authoritarian governance is sustainable in the face of
demands by the middle class to be treated like citizens, and whether such governance is capable of
dealing with radical shocks like a long-term economic slowdown of the kind currently predicted for China.
Some proponents of Prism assert that it is an essential tool against terrorism. They claim that only data
belonging to foreigners (that is, non-US residents) is retained, and that content is not reviewed as a matter of course, only
may be spun up so that content accumulated over years of daily internet spooling may be extracted and analysed,
proceedings are secret. Further, any assurance to US citizens that the NSA will not gather and archive their data is
suspect. The Five Eyes alliance between the intelligence agencies of the US, Australia, Canada, New Zealand and the UK
effectively permits those governments to circumvent the prohibition against gathering data on their own citizens by
sharing information across the Five Eyes intelligence community. The UK for example can spy on Americans and make that
information available to the US government on its massive spy cloud one that the NSA operates and the Five Eyes
based on ideology. When we empower the state, we empower those that hold sway over the state, and the state is subject
to influence from a multitude of quarters. I have personally been a victim of such abuses. The US government has
indicted me, shut down my cloud storage company Megaupload and seized all of my assets because it claims I was
complicit in copyright infringement by some of the people who used the Megaupload service. I have emphasised that I am
being prosecuted not because the charges against me have some sound basis in US copyright law, but because the US
justice department has been instrumentalised by certain private interests that have a financial stake in neutralising my
business. That trend represents a danger not just to me, but to all of us. Recent polls in the US suggest that the public is
not much preoccupied with the fact that our data is being retained, so long as our own political party is in control of the
overnight . Every person who values personal freedom, human rights and the rule of law must recoil against such
a possibility, regardless of their political preference. Others take a more cavalier approach, such as former Google CEO
Eric Schmidt in 2009: If you have something that you don't want anyone to know, maybe you shouldn't be doing it in the
and inform international principles of human rights and the rule of law. Prism and its related practices should be
discontinued immediately, and the Utah Data Center should be leased to cloud storage companies with encryption
capabilities.
illustration of the problem. Routine government monitoring of who was talking to reporters is likely to deter
whistleblowers from talking to the media for fear of losing their jobs, or worse. That makes it harder for
In the hands of
an unscrupulous future president, mass surveillance could be turned
into a powerful weapon against democratic government . For example,
the voters to learn about government misconduct, making misconduct more likely.
having the calling records of every member of Congress would likely reveal which members kept
mistresses, which could be used to blackmail members of Congress into supporting a future president's
agenda. Calling records could also provide valuable political intelligence, such as how frequently members
of Congress were talking to various interest groups. This sounds speculative and a little paranoid.
between 1963 and 1965, the FBI bugged at least 14 hotel rooms of Martin Luther King, Jr., seeking
"information concerning King's personal activities" to "discredit him." The FBI then sent King a letter
threatening to release personally embarrassing recordings to the public. King interpreted it as "an effort to
induce him to commit suicide." He was harassed by the FBI until his death in 1968. We have no evidence
that the NSA has engaged in such conduct, but the revelations of King's harassment didn't come out until
Cortright 13, David Cortright is the director of Policy Studies at the Kroc
Institute for Peace Studies at the University of Notre Dame, Chair of the Board
of Directors of the Fourth Freedom Forum, and author of 17 books, Kristen
Wall is a Researcher and Analyst at the Kroc Institute, Conor Seyle is
Associate Director of One Earth Future, Governance, Democracy, and Peace
How State Capacity and Regime Type Influence the Prospects of War and
Peace, http://oneearthfuture.org/sites/oneearthfuture.org/files//documents/pu
blications/Cortright-Seyle-Wall-Paper.pdf
Drawing from the empirical literature , this paper identifies two underlying
pathways through which state governance systems help to build peace.
These are: State capacity. If states lack the ability to execute their policy
goals or to maintain security and public order in the face of potentially
violent groups, armed conflict is more likely . State capacity refers to two
significant aspects: security capacity and social capacity. Security capacity
includes the ability to control territory and resist armed incursion from
other states and nonstate actors. Social capacity includes the ability to
provide social services and public goods. Institutional quality. Research
suggests that not all governance systems are equally efective or capable of
supporting peace. Governance systems are seen
as more credible and legitimate , and are better at supporting peace ,
when they are characterized by inclusiveness, representativeness,
transparency, and accountability. In particular, systems allowing citizens to
The second concern about democracies being more prone war is also
exaggerated. Democracies do not go to war with each other. More
precisely, Bruce Russett, one of the closest observers of this
phenomenon, writes, First, democratically organized political systems
in general operate under restraints that make them more peaceful in
their relations with other democracies. . . . Second, in the modern
international system, democracies are less likely to use lethal violence toward
other democracies than toward autocratically governed states or than
autocratically governed states are toward each other. Furthermore, there are
no clearcut cases of sovereign stable democracies waging war with each
other in the modern international system. Reflecting on a vast academic
literature on the causes of war, Jack Levy concluded that the
democratic peace theory is " the closest thing we have to empirical
law in the study of international relations ."107 Democracies are not
pacifist regimes when dealing with autocracies. But democracies are peaceful
when interacting with other democracies.!
for International Studies, former U.S. ambassador to the United Nations Human Rights Council
Why the NSA undermines national security)
The U.S. model of mass surveillance will be followed by others and could
unintentionally invert the democratic relationship between citizens and their governments. Under the
cover of preventing terrorism, authoritarian governments may now
increase surveillance of political opponents. Governments that collect and
monitor digital information to intimidate or squelch political opposition and dissent can more
justifiably claim they are acting with legitimacy. For human rights
defenders and democracy activists worldwide, the potential
consequences of the widespread use by governments of mass
surveillance techniques are dark and clear.
where he is director of the Canada Centre for Global Security Studies and the Citizen Lab at the
Munk School of Global Affairs Why NSA spying scares the world)
Many of the countries in the Southern Hemisphere are failed or fragile states;
many of them are authoritarian or autocratic regimes. No doubt the elites in those
regimes will use the excuse of security to adopt more stringent state
controls over the Internet in their jurisdictions and support local versions of
popular social media companies over which they can exact their own nationalized controls -- a trend that
began prior to the NSA revelations but which now has additional rhetorical support. In the age of Big Data,
to efectively hold the NSA accountable .) Suspicion of a crime will be grounds for
access, so once a whistleblower is accused of espionage, finding the spy will provide an excuse to
access the accumulated material. The states surveillance staff will misuse the data for personal reasons
too. Some NSA agents used U.S. surveillance systems to track their lovers past, present, or wished-for
in a practice called LoveINT. The NSA says it has caught and punished this a few times; we dont know
how many other times it wasnt caught. But these events shouldnt surprise us, because police have long
used their access to drivers license records to track down someone attractive, a practice known as
running a plate for a date. Surveillance data will always be used for other purposes, even if this is
prohibited. Once the data has been accumulated and the state has the possibility of access to it, it may
misuse that data in dreadful ways. Total surveillance plus vague law provides an opening for a massive
fishing expedition against any desired target. To make journalism and democracy safe, we must limit the
accumulation of data that is easily accessible to the state.
recorded declines in freedom in the world for nine straight years. At the level of geopolitics, the shifting
tectonic plates have yet to produce a seismic rearrangement of power, but rumblings are audible. The
United States has been in a state of retrenchment since President Barack Obama took office in 2009. The
democratic nations of Europe, which some might have expected to pick up the slack, have instead turned
inward and all but abandoned earlier dreams of reshaping the international system in their image. As for
such rising democracies as Brazil, India, Turkey, and South Africa, they are neither rising as fast as once
anticipated nor yet behaving as democracies in world affairs. Their focus remains narrow and regional.
Their national identities remain shaped by postcolonial and nonaligned sensibilitiesby old but carefully
nursed resentmentswhich lead them, for instance, to shield rather than condemn autocratic Russias
invasion of democratic Ukraine, or, in the case of Brazil, to prefer the company of Venezuelan dictators to
energy in the
international system, it comes from the great-power autocracies,
China and Russia , and from would-be theocrats pursuing their dream of a new
caliphate in the Middle East. For all their many problems and weaknesses, it is still these
autocracies and these aspiring religious totalitarians that push forward
while the democracies draw back, that act while the democracies react, and that seem
that of North American democratic presidents. Meanwhile, insofar as there is
increasingly unleashed while the democracies feel increasingly constrained. It should not be surprising that
one of the side efects of these circumstances has been the weakening
and in some cases collapse of democracy in those places where it was
newest and weakest. Geopolitical shifts among the reigning great powers, often but not always
the result of wars, can have significant effects on the domestic politics of the smaller and weaker nations
Europes democratic great powers, France and Britain, were suffering the effects of the recent devastating
war, while the one rich and healthy democratic power, the United States, had retreated to the safety of its
distant shores. In the vacuum came Mussolinis rise to power in Italy in 1922, the crumbling of Germanys
Weimar Republic, and the broader triumph of European fascism. Greek democracy fell in 1936. Spanish
democracy fell to Franco that same year. Military coups overthrew democratic governments in Portugal,
Brazil, Uruguay, and Argentina. Japans shaky democracy succumbed to military rule and then to a form of
fascism. Across three continents, fragile democracies gave way to authoritarian forces exploiting the
vulnerabilities of the democratic system, while other democracies fell prey to the worldwide economic
depression. There was a ripple effect, toothe success of fascism in one country strengthened similar
movements elsewhere, sometimes directly. Spanish fascists received military assistance from the fascist
regimes in Germany and Italy. The result was that by 1939 the democratic gains of the previous forty years
had been wiped out. The period after the First World War showed not only that democratic gains could be
it was
not just that democracies had been overthrown. The very idea of
democracy had been discredited, as John A. Hobson observed.[2] Democracys aura
reversed, but that democracy need not always triumph even in the competition of ideas. For
of inevitability vanished as great numbers of people rejected the idea that it was a better form of
government. Human beings, after all, do not yearn only for freedom, autonomy, individuality, and
recognition. Especially in times of difficulty, they yearn also for comfort, security, order, and, importantly, a
sense of belonging to something larger than themselves, something that submerges autonomy and
individualityall of which autocracies can sometimes provide, or at least appear to provide, better than
democracies. In the 1920s and 1930s, the fascist governments looked stronger, more energetic and
efficient, and more capable of providing reassurance in troubled times. They appealed effectively to
nationalist, ethnic, and tribal sentiments. The many weaknesses of Germanys Weimar democracy,
inadequately supported by the democratic great powers, and of the fragile and short-lived democracies of
Italy and Spain made their people susceptible to the appeals of the Nazis, Mussolini, and Franco, just as the
weaknesses of Russian democracy in the 1990s made a more authoritarian government under Vladimir
Putin attractive to many Russians. People tend to follow winners, and between the wars the democraticcapitalist countries looked weak and in retreat compared with the apparently vigorous fascist regimes and
United States imposed democracy by force and through prolonged occupations in West Germany, Italy,
Japan, Austria, and South Korea. With the victory of the democracies and the discrediting of fascism
chiefly on the battlefieldmany other countries followed suit. Greece and Turkey both moved in a
democratic direction, as did Brazil, Argentina, Peru, Ecuador, Venezuela, and Colombia. Some of the new
nations born as Europe shed its colonies also experimented with democratic government, the most
prominent example being India. By 1950, the number of democracies had grown to between twenty and
thirty, and they governed close to 40 percent of the worlds population. Was this the victory of an idea or
the victory of arms? Was it the product of an inevitable human evolution or, as Samuel P. Huntington later
observed, of historically discrete events?[3] We would prefer to believe the former, but evidence
Chile, Uruguay, Ecuador, South Korea, the Philippines, Pakistan, Indonesia, and Greece all fell back under
authoritarian rule. In Africa, Nigeria was the most prominent of the newly decolonized nations where
democracy failed. By 1975, more than three-dozen governments around the world had been installed by
military coups.[4] Few spoke of democracys inevitability in the 1970s or even in the early 1980s. As late
as 1984, Huntington himself believed that the limits of democratic development in the world had been
reached, noting the unreceptivity to democracy of several major cultural traditions, as well as the
But then,
came the third wave. From the mid-1970s through the
early 1990s, the number of democracies in the world rose to an
astonishing 120, representing well over half the worlds population.
What explained the prolonged success of democratization over the
last quarter of the twentieth century? It could not have been merely the steady rise of
substantial power of antidemocratic governments (particularly the Soviet Union).[5]
unexpectedly,
the global economy and the general yearning for freedom, autonomy, and recognition. Neither economic
growth nor human yearnings had prevented the democratic reversals of the 1960s and early 1970s. Until
the third wave, many nations around the world careened back and forth between democracy and
authoritarianism in a cyclical, almost predictable manner. What was most notable about the third wave
was that this cyclical alternation between democracy and autocracy was interrupted. Nations moved into a
democratic phase and stayed there. But why? The International Climate Improves The answer is related to
the configuration of power and ideas in the world. The international climate from the mid-1970s onward
was simply more hospitable to democracies and more challenging to autocratic governments than had
been the case in past eras. In his study, Huntington emphasized the change, following the Second Vatican
Council, in the Catholic Churchs doctrine regarding order and revolution, which tended to weaken the
legitimacy of authoritarian governments in Catholic countries. The growing success and attractiveness of
the European Community (EC), meanwhile, had an impact on the internal policies of nations such as
Portugal, Greece, and Spain, <<card continues>> <<card continues>> which sought the economic
benefits of membership in the EC and therefore felt pressure to conform to its democratic norms. These
norms increasingly became international norms. But they did not appear out of nowhere or as the result of
some natural evolution of the human species. As Huntington noted,
The pervasiveness of
They did not. At various times throughout the Cold War, U.S. policy often supported dictatorships as part of
the battle against communism or simply out of indifference. It even permitted or was complicit in the
overthrow of democratic regimes deemed unreliablethose of Mohammad Mossadegh in Iran in 1953,
Jacobo Arbenz in Guatemala in 1954, and Salvador Allende in Chile in 1973. At times, U.S. foreign policy
was almost hostile to democracy. President Richard Nixon regarded it as not necessarily the best form of
government for people in Asia, Africa, and Latin America.[7] Nor, when the United States did support
democracy, was it purely out of fealty to principle. Often it was for strategic reasons. Officials in President
Ronald Reagans administration came to believe that democratic governments might actually be better
than autocracies at fending off communist insurgencies, for instance. And often it was popular local
demands that compelled the United States to make a choice that it would otherwise have preferred to
avoid, between supporting an unpopular and possibly faltering dictatorship and getting on the side of the
people. Reagan would have preferred to support the dictatorship of Ferdinand Marcos in the 1980s had he
not been confronted by the moral challenge of Filipino people power. Rarely if ever did the United States
seek a change of regime primarily out of devotion to democratic principles. Beginning in the mid-1970s,
however, the general inclination of the United States did begin to shift toward a more critical view of
dictatorship. The U.S. Congress, led by human-rights advocates, began to condition or cut off U.S. aid to
authoritarian allies, which weakened their hold on power. In the Helsinki Accords of 1975, a reference to
human-rights issues drew greater attention to the cause of dissidents and other opponents of dictatorship
in the Eastern bloc. President Jimmy Carter focused attention on the human-rights abuses of the Soviet
Union as well as of right-wing governments in Latin America and elsewhere. The U.S. governments
international information services, including the Voice of America and Radio Free Europe/Radio Liberty, put
greater emphasis on democracy and human rights in their programming. The Reagan administration, after
first trying to roll back Carters human-rights agenda, eventually embraced it and made the promotion of
democracy part of its stated (if not always its actual) policy. Even during this period, U.S. policy was far
from consistent. Many allied dictatorships, especially in the Middle East, were not only tolerated but
actively supported with U.S. economic and military aid. But the net effect of the shift in U.S. policy, joined
with the efforts of Europe, was significant. The third wave began in 1974 in Portugal, where the Carnation
Revolution put an end to a half-century of dictatorship. As Larry Diamond notes, this revolution did not just
happen. The United States and the European democracies played a key role, making a heavy investment .
. . in support of the democratic parties.[8] Over the next decade and a half, the United States used a
variety of tools, including direct military intervention, to aid democratic transitions and prevent the
undermining of existing fragile democracies all across the globe. In 1978, Carter threatened military action
in the Dominican Republic when long-serving president Joaqun Balaguer refused to give up power after
losing an election. In 1983, Reagans invasion of Grenada restored a democratic government after a
military coup. In 1986, the United States threatened military action to prevent Marcos from forcibly
annulling an election that he had lost. In 1989, President George H.W. Bush invaded Panama to help install
democracy after military strongman Manuel Noriega had annulled his nations elections. Throughout this
period, too, the United States used its influence to block military coups in Honduras, Bolivia, El Salvador,
Peru, and South Korea. Elsewhere it urged presidents not to try staying in office beyond constitutional
limits. Huntington estimated that over the course of about a decade and a half, U.S. support had been
critical to democratization in the Dominican Republic, Grenada, El Salvador, Guatemala, Honduras,
Uruguay, Peru, Ecuador, Panama, and the Philippines and was a contributing factor to democratization in
Portugal, Chile, Poland, Korea, Bolivia, and Taiwan.[9] Many developments both global and local helped to
produce the democratizing trend of the late 1970s and the 1980s, and there might have been a
democratic wave even if the United States had not been so influential. The question is whether the wave
would have been as large and as lasting. The stable zones of democracy in Europe and Japan proved to be
powerful magnets. The liberal free-market and free-trade system increasingly outperformed the stagnating
economies of the socialist bloc, especially at the dawn of the information revolution. The greater activism
of the United States, together with that of other successful democracies, helped to build a broad, if not
universal, consensus that was more sympathetic to democratic forms of government and less sympathetic
trend . They pushedsome might even say imposeddemocratic principles and embedded them in
international institutions and agreements. Equally important was the role that the United States played in
interfering in what might have been a natural cycle, preventing nations that ordinarily would have been
due for an authoritarian phase from following the usual pattern.
powerful, there would have been fewer transitions to democracy, and those that occurred might have been
short-lived. It might have meant a shallower and more easily reversed third wave.[15] Democracy,
Autocracy, and Power What about today? With the democratic superpower curtailing its global influence,
regional powers are setting the tone in their respective regions. Not surprisingly, dictatorships are more
common in the environs of Russia, along the borders of China (North Korea, Burma, and Thailand), and in
the Middle East, where long dictatorial traditions have so far mostly withstood the challenge of popular
uprisings. But even in regions where democracies remain strong, authoritarians have been able to make a
determined stand while their democratic neighbors passively stand by. Thus Hungarys leaders, in the
heart of an indifferent Europe, proclaim their love of illiberalism and crack down on press and political
freedoms while the rest of the European Union, supposedly a club for democracies only, looks away. In
South America, democracy is engaged in a contest with dictatorship, but an indifferent Brazil looks on,
thinking only of trade and of North American imperialism. Meanwhile in Central America, next door to an
indifferent Mexico, democracy collapses under the weight of drugs and crime and the resurgence of the
caudillos. Yet it may be unfair to blame regional powers for not doing what they have never done. Insofar
as the shift in the geopolitical equation has affected the fate of democracies worldwide, it is probably the
If that
superpower does not change its course, we are likely to see
democracy around the world rolled back further . There is nothing
change in the democratic superpowers behavior that bears most of the responsibility.
survive as far into the future as European democracy, which, after all, is less than a century old on most of
the continent? Autocracy in Russia and China has certainly been around longer than any Western
promotion have long argued that many of the places where the democratic experiment has been tried
over the past few decades are not a natural fit for that form of government, and that the United States has
tried to plant democracy in some very infertile soils. Given that democratic governments have taken deep
root in widely varying circumstances, from impoverished India to Confucian East Asia to Islamic
Indonesia, we ought to have some modesty about asserting where the soil is right or not right for
restrictive Internet legislation designed to force companies to collaborate in censorship and pervasive
surveillance of their users in order to chill expression and facilitate persecution. Since 2008, the
Department of State and the United States Agency for International Development have invested over
$100 million in programs to enable human rights activists and bloggers to exercise their human rights
freely and safely online, including by distribution of strong encryption and other anti-censorship tools.
public
Bringing Liberty Online: Reenergizing the Internet Freedom Agenda in a PostSnowden Era, http://www.cnas.org/sites/default/files/publicationspdf/CNAS_BringingLibertyOnline_Fontaine.pdf, mm
The 2013 revelations of mass surveillance by the U.S. government
transformed the global debate about Internet freedom. Where once
leaked thousands of documents revealing Americas most secret electronic surveillance programs,
those who would use the Internet to advance tolerance and free expression, and away from those who
Bringing Liberty Online: Reenergizing the Internet Freedom Agenda in a PostSnowden Era, http://www.cnas.org/sites/default/files/publicationspdf/CNAS_BringingLibertyOnline_Fontaine.pdf, mm
The dramatic revelations about NSA spying that began to emerge in June 2013
provoked a storm of international reaction.17 Political leaders expressed outrage
at American surveillance practices and threatened a raft of retaliatory measures. President Dilma
Rousseff of Brazil cancelled a planned state visit to the United States and the Brazilian government later
organized an international meeting (NetMundial) to discuss the future of Internet governance.18 German
Chancellor Angela Merkel was deeply affronted by the alleged monitoring of her personal cellphone.
Chinese and other officials charged America with blatant hypocrisy. The fallout affected the private
sector as well; where previously the focus of many observers had been on the aid given by U.S.
companies to foreign governments engaged in Internet repression, the gaze shifted to the role American
platforms for international criticism of the United States. Germany and Brazil together sponsored a
resolution adopted by the U.N. General Assembly in late 2013 backing a right to privacy in the digital
age.19 In June 2014, the U.N. High Commissioner for Human Rights issued a report that endorsed digital
privacy as a human right and criticized mass surveillance as a dangerous habit rather than an
exceptional measure.20 Some European officials began to question the existing Internet governance
model itself. In a statement, the European Commission said, Recent revelations of large-scale
surveillance have called into question the stewardship of the US when it comes to Internet Governance.
So given the US-centric model of Internet Governance currently in place, it is necessary to broker a
smooth transition to a more global model.21 Nongovernmental groups that might otherwise be
partners with the U.S. government in promoting Internet freedom reacted sharply as well. Reporters
Without Borders, for instance, listed the NSA as an Enemy of the Internet in its 2014 report on entities
engaged in online repression. Drawing no distinction between surveillance aimed at protecting national
security and surveillance intended to suppress free expression and political dissent, the organization
declared the NSA no better than [its] Chinese, Russian, Iranian or Bahraini counterparts.22 Mass
surveillance methods used by democracies like the United States, it added, are all the more intolerable
as they are already being used by authoritarian countries such as Iran, China, Turkmenistan, Saudi
Arabia and Bahrain to justify their own violations of freedom of information.23 Tim Berners-Lee, the
inventor of the World Wide Web, said, Mass
Bringing Liberty Online: Reenergizing the Internet Freedom Agenda in a PostSnowden Era, http://www.cnas.org/sites/default/files/publicationspdf/CNAS_BringingLibertyOnline_Fontaine.pdf, mm
new laws or regulations that threaten online freedom of speech.42 A glance at the past 12 months
reveals a disturbing trend. In Turkey, for example, after its high court overturned a ban on Twitter, the
government began demanding that the company quickly implement orders to block specific users.
Ankara also blocked YouTube after a surreptitious recording of the countrys foreign minister surfaced,
and it has dramatically increased its takedown requests to both Twitter and Google.43
Russia has
opposes the government.47 Venezuela has blocked access to certain websites and limited Internet
Bringing Liberty Online: Reenergizing the Internet Freedom Agenda in a PostSnowden Era, http://www.cnas.org/sites/default/files/publicationspdf/CNAS_BringingLibertyOnline_Fontaine.pdf, mm
The reactions to the Snowden disclosures threatened to go beyond
verbal denunciations, diplomatic protests and critical press. The most serious
commercial fallout came in the rising support for data localization
requirements. Russia in July 2014 approved legislation that requires data operators to store the
personal data of its citizens within the countrys borders.27 Indonesia, Brazil and Vietnam have also
called for their citizens data held by companies such as Facebook to be stored domestically.28 Data
localization has been debated in the European Parliament and elsewhere on the continent as well.29
Apart from the chilling efect on innovation and the loss of business
to America companies, Internet freedom itself could become a
casualty of such mandates. If a users data must be held within the borders of a repressive
country, its government will have new opportunities to censor, monitor and disrupt online information
Such moves, combined with increasing questions about the multistakeholder approach to
give rise to
concerns about the potential Balkanization of the Internet, in which a
flows.
constellation of national-level systems could take the place of the current global online infrastructure. As
former NSA general counsel Stewart Baker warned, The
2014, Reporters Without Borders added the United States to its Enemies of the Internet list for the
first time, explicitly linking the inclusion to NSA surveillance. The main player in [the United States]
the highly secretive National Security Agency (NSA) which, in the light
has come to symbolize the abuses by the worlds
intelligence agencies, noted the 2014 report.207 The damaged perception of
the United States 208 as a leader on Internet Freedom and its
diminished ability to legitimately criticize other countries for
censorship and surveillance opens the door for foreign leaders to
justifyand even expand their own eforts.209 For example, the Egyptian
vast surveillance operation is
of Snowdens revelations,
government recently announced plans to monitor social media for potential terrorist activity, prompting
backlash from a number of advocates for free expression and privacy.210 When a spokesman for the
Egyptian Interior Ministry, Abdel Fatah Uthman, appeared on television to explain the policy, one
justification that he offered in response to privacy concerns was that the US listens in to phone calls,
comparatively mild response to allegations of NSA surveillance have been seen by some critics as a
reflection of Indias own aspirations in the world of surveillance, a further indication that U.S. spying
may now make it easier for foreign governments to quietly defend their own behavior.212 It is even more
difficult for the United States to credibly indict Chinese hackers for breaking into U.S. government and
These
challenges reflect an overall decline in U.S. soft power on free
expression issues.
commercial targets without fear of retribution in light of the NSA revelations.213
Americas Internet freedom efforts accord with the countrys longstanding tradition of promoting human
rights, including freedoms of expression, association and assembly. And it represents a bet: that access
to an open Internet can foster elements of democracy in autocratic states by empowering those who are
pressing for liberal change at home. While the outcome of that bet remains uncertain, there should be no
guarantees matter : the U.S. Constitutions first amendment protects against censorship and
political repression at home, while in autocratic systems such safeguards are nonexistent or not
enforceable.49 As the United States continues its significant efforts, described above, to further the
PRINCIPLES While an international convention regulating electronic spying is nearly inconceivable, the
principles already articulated by U.S. government officials represent an important effort to distinguish
between American surveillance and the efforts of repressive governments. Given the active surveillance
programs of democracies and autocracies alike, the United States should call on other governments to
embrace similar principles, or to explain why they are unwilling to do so. ENSURE THAT THE U.S.
GOVERNMENT CONDUCTS COMPREHENSIVE COST/BENEFIT ANALYSES OF SURVEILLANCE DECISIONS It is
Mark Weinstein, award-winning author, and the founder of MeWe, one of the
world's foremost privacy advocates, Mark has served as a Steering
Committee Member of National Strategy for Trusted Identities in Cyberspace
(NSTIC), and has been named Privacy by Design Ambassador by the
Information and Privacy Commissioner of Ontario, Huffington Post, November
12, 2014, Obama Heroically Wages Internet War, But Misses World Wide Web
Target, http://www.huffingtonpost.com/mark-weinstein/obama-heroicallywages-in_b_6137324.html
I have a greater fear -- a rudderless World Wide Web and captain-less ICANN.
That's why eight months ago I preached for Net Neutrality and for the United States to push such an
agenda through as stewards of ICANN. I was overjoyed on Monday to see Obama support half of my wish
list when he released an emphatic video statement throwing his administration's full support behind Net
Neutrality and asking the FCC to implement strict rules to give weight to such an agenda. Way to go, Mr.
President! Yet there's more to do here. What's interesting about Monday's statement is for all its good, it
turns the discussion away from a global perspective to a domestic one. Obama's speech focuses on a free
and open Internet within our borders that doesn't speed up or slow down content delivery based on the
whims of broadband companies. Take that Netflix with your big ideas of Internet favoritism. At the same
Imagine
if every country had its own Internet. The World Wide Web
would become anything but, leading to an economic and individual
time, is this a first step of a philosophy or a final one? I hope the former but fear the latter.
for a second
losing such a
leadership role is a mistake for the United States and the principles of Net
and lobbyists and helped keep the Internet as a free platform. I think that our
Neutrality. Yet in the spirit of compromise, I commend Obama for taking a stand within our borders. Now he
needs to take the next step. The hope I have is that whatever new governance structure emerges for
ICANN in 2015 turns into a United Nations of Internet protection where the entire world has access to a free
Internet. However, if the new structure cannot guarantee Net Neutrality, then I believe the U.S.
if the
expectations of future trade decline, particularly for difficult to replace items such as
energy resources, the likelihood for conflict increases , as states will be inclined to use
force to gain access to those resources. Crises could potentially be the trigger for
decreased trade expectations either on its own or because it
triggers protectionist moves by interdependent states.4 Third, others have
trade so long as they have an optimistic view of future trade relations. However,
considered the link between economic decline and external armed conflict at a national level.
likelihood of terrorism (Blomberg. Hess. & Weerapana, 2004). which has the capacity to spill across borders
and lead to external tensions. Furthermore, crises generally reduce the popularity of a sitting government.
"Diversionary
Trust in American businesses has taken a significant hit since the initial
reports on the PRISM program suggested that the NSA was directly tapping into the servers of
nine U.S. companies to obtain customer data for national security investigations.28 The Washington
Posts original story on the program provoked an uproar in the media and prompted the CEOs of several
major companies to deny knowledge of or participation in the program.29 The exact nature of the
requests made through the PRISM program was later clarified,30 but the public attention on the
Within just a few weeks of the first disclosures, reports began to emerge that American cloud computing
companies like Dropbox and Amazon Web Services were starting to lose business to overseas
competitors.32 The CEO of Artmotion, one of Switzerlands largest offshore hosting providers, reported in
July 2013 that his company had seen a 45 percent jump in revenue since the first leaks,33 an early sign
that the countrys perceived neutrality and strong data and privacy protections34 could potentially be
released by PEER 1 in January 2014,36 25 percent of respondents indicated that they were moving data
being hosted. Seventy percent were even willing to sacrifice performance in order to ensure that their
data was protected.37 It appears that little consideration was given over the past decade to the potential
economic repercussions if the NSAs secret programs were revealed.38 This failure was acutely
demonstrated by the Obama Administrations initial focus on reassuring the public that its programs
primarily affect non-Americans, even though non-Americans are also heavy users of American
companies products. Facebook CEO Mark Zuckerberg put a fine point on the issue, saying that the
government blew it in its response to the scandal. He noted sarcastically: The government response
was, Oh dont worry, were not spying on any Americans. Oh, wonderful: thats really helpful to
companies [like Facebook] trying to serve people around the world, and thats really going to inspire
confidence in American internet companies.39 As Zuckerbergs comments reflect, certain parts of the
American technology industry are particularly vulnerable to international backlash since growth is
new products and services that rely on cloud computing will become
increasingly pervasive. Cloud computing is also the root of
development for the emerging generation of Web-based applications
home security, outpatient care, mobile payment, distance learning, efficient energy use and driverless
Innovation Foundation (ITIF) estimated that revelations about the NSAs PRISM program could cost the
American cloud computing industry $22 to $35 billion over the next three years.42 On the low end, the
ITIF projection suggests that U.S. cloud computing providers would lose 10 percent of the foreign market
share to European or Asian competitors, totaling in about $21.5 billion in losses; on the high-end, the $35
Because the
cloud computing industry is undergoing rapid growth right nowa
billion figure represents about 20 percent of the companies foreign market share.
2012 Gartner study predicted global spending on cloud computing would increase by 100 percent from
2012 to 2016, compared to a 3 percent overall growth rate in the tech industry as a whole43
the percentage lost to foreign competitors could go higher if foreign governments enact protectionist
trade barriers that effectively cut out U.S. providers, citing early calls from German data protection
authorities to suspend the U.S.-EU Safe Harbor program (which will be discussed at length in the next
section).44 As the R Street Policy Study highlights, Ironically, the NSA turned the competitive edge U.S.
companies have in cloud computing into a liability, especially in Europe.45 In a follow up to the ITIF
study, Forrester Research analyst James Staten argued that the think tanks estimates were low,
suggesting that the actual figure could be as high as $180 billion over three years.46 Staten highlighted
two additional impacts not considered in the ITIF study. The first is that U.S. customersnot just foreign
companieswould also avoid US cloud providers, especially for international and overseas business. The
ITIF study predicted that American companies would retain their domestic market share, but Staten
argued that the economic blowback from the revelations would be felt at home, too. You dont have to
be a French company, for example, to be worried about the US government snooping in the data about
your French clients, he wrote.47 Moreover, the analysis highlighted a second and far more costly
impact: that foreign cloud providers, too, would lose as much as 20 percent of overseas and domestic
business because of similar spying programs conducted by other governments. Indeed, the NSA
disclosures have prompted a fundamental re-examination of the role of intelligence services in
conducting coordinated cross-border surveillance, according to a November 2013 report by Privacy
International on the Five Eyes intelligence partnership between the United States, the United
the surveillance
landscape around the world becomes more clear, it could have a
serious negative impact on all hosting and outsourcing services,
Kingdom, Canada, Australia, and New Zealand.48 Staten predicts that as
resulting in a 25 percent decline in the overall IT services market, or about $180 billion in losses.49
Recent reports suggest that things are, in fact, moving in the direction that analysts like Castro and
Staten suggested.50 A survey of 1,000 [Information and Communications Technology (ICT)] decisionmakers from France, Germany, Hong Kong, the UK, and the USA in February and March 2014 found that
the disclosures have had a direct impact on how companies around the world think about ICT and cloud
computing in particular.51 According to the data from NTT Communications, 88 percent of decisionmakers are changing their purchasing behavior when it comes to the cloud, with the vast majority
indicating that the location of the data is very important. The results do not bode well for recruitment of
new customers, either62 percent of those currently not storing data in the cloud indicated that the
revelations have since prevented them from moving their ICT systems there. And finally, 82 percent
suggested that they agree with proposals made by German Chancellor Angela Merkel in February 2014
to have separate data networks for Europe, which will be discussed in further detail in Part III of this
report. Providing direct evidence of this trend, Servint, a Virginia-based webhosting company, reported in
June 2014 that international clients have declined by as much as half, dropping from approximately 60
predicted in a joint paper published by the Wilson Center and the New America Foundation in October
2013, Major commercial actors on both continents are preparing offensive and defensive strategies to
battle in the market for a competitive advantage drawn from Snowdens revelations.53 For example,
Runbox, a small Norwegian company that offers secure email service, reported a 34 percent jump in
customers since June 2013.54 Runbox markets itself as a safer email and webhosting provider for both
individual and commercial customers, promising that it will never disclose any user data unauthorized,
track your usage, or display any advertisements.55 Since the NSA revelations, the company has touted
its privacy-centric design and the fact that its servers are located in Norway as a competitive advantage.
Being firmly located in Norway, the Runbox email service is governed by strict privacy regulations and is
a safe alternative to American email services as well as cloud-based services that move data across
borders and jurisdictions, company representatives wrote on its blog in early 2014.56 F-Secure, a Finnish
cloud storage company, similarly emphasizes the fact that its roots [are] in Finland, where privacy is a
are probably engaged in it, too. It is surely time for an internationally binding Bill of Digital Rights in which
privacy is enshrined. However, even if there were such a Bill, would governments respect the spirit of it? In
New diseases emerge, while old diseases mutate and adapt. Throughout history,
there have been epidemics during which human immunity has broken down on an
epic scale. An infectious agent believed to have been the plague bacterium killed an estimated 20 million people
over a four-year period in the fourteenth century, including nearly one-quarter of Western Europe's population at the
time. Since its recognized appearance in 1981, some 20 variations of the mv virus have infected an estimated 29.4
million worldwide, with 1.5 million people currently dying of AIDS each year. Malaria, tuberculosis, and cholera--once
thought to be under control--are now making a comeback. As we enter the twenty-first century,
changing
conditions have enhanced the potential for widespread contagion. The rapid growth rate of
the total world population, the unprecedented freedom of movement across international borders, and scientific advances
that expand the capability for the deliberate manipulation of pathogens are all cause for worry that the problem might be
greater in the future than it has ever been in the past. The threat of infectious pathogens is not just
as these effects accelerate, the stress will impact human migration and
conflict around the world. It is difficult to fully understand the detailed causes of migration and
economic and political instability, but the growing evidence of links between climate
change, migration, and conflict raise plenty of reasons for concern. This is why its
time to start thinking about new and comprehensive answers to multifaceted crisis scenarios brought on or
worsened by global climate change. As Achim Steiner, executive director of the U.N. Environment Program,
argues, The question we must continuously ask ourselves in the face of scientific complexity and
uncertainty, but also growing evidence of climate change, is at what point precaution, common sense or
the world, disproportionately affecting the globes least developed countries. Climate change will pose
challenging social, political, and strategic questions for the many different multinational, regional, national,
and nonprofit organizations dedicated to improving the human condition worldwide. Organizations as
different as Amnesty International, the U.S. Agency for International Development, the World Bank, the
International Rescue Committee, and the World Health Organization will all have to tackle directly the
myriad effects of climate change. Climate change also poses distinct challenges to U.S. national security.
Recent intelligence reports and war games , including some conducted by the U.S.
Department of Defense, conclude that over the next two or three decades, vulnerable regions
(particularly sub-Saharan Africa, the Middle East, South and Southeast Asia ) will
face the prospect of food shortages, water crises, and catastrophic flooding
driven by climate change. These developments could demand U.S., European,
and international humanitarian relief or military responses , often the delivery vehicle for
aid in crisis situations. This report provides the foundation and overview for a series of papers focusing on
the particular challenges posed by the cumulative effects of climate change, migration, and conflict in
some of our worlds most complex environments. In the papers following this report, we plan to outline the
effects of this nexus in northwest Africa, in India and Bangladesh, in the Andean region of South America,
and in China. In this paper we detail that nexus across our planet and offer wide ranging recommendations
about how the United States, its allies in the global community, and the community at large can deal with
the coming climate-driven crises with comprehensive sustainable security solutions encompassing national
security, diplomacy, and economic, social, and environmental development. Here, we briefly summarize
our arguments and our conclusions. The nexus The Arab Spring can be at least partly credited to climate
change. Rising food prices and efforts by authoritarian regimes to crush political protests were linked first
to food and then to political repressiontwo important motivators in the Arab makeover this past year. To
be sure, longstanding economic and social distress and lack of opportunity for so many Arab youth in the
Middle East and across North Africa only needed a spark to ignite revolutions across the region. But
environmental degradation and the movement of people from rural areas to already overcrowded cities
alongside rising food prices enabled the cumulative effects of long-term economic and political failures to
sweep across borders with remarkable agility. It does not require much foresight to acknowledge that other
effects of climate change will add to the pressure in the decades to come. In particular the cumulative
overlays of climate change with human migration driven by environmental crises, political conflict caused
by this migration, and competition for more scarce resources will add new dimensions of complexity to
existing and future crisis scenarios. It is thus critical to understand how governments plan to answer and
prioritize these new threats from climate change, migration, and conflict. Climate change Climate change
already being felt today and will intensify as climate change worsens. All of the worlds regions and nations
will experience some of the effects of this transformational challenge. Heres just one case in point: African
states are likely to be the most vulnerable to multiple stresses, with up to 250 million people projected to
suffer from water and food insecurity and, in low-lying areas, a rising sea level.3 As little as 1 percent of
Africas land is located in low-lying coastal zones but this land supports 12 percent of its urban
population.4 Furthermore, a majority of people in Africa live in lower altitudesincluding the Sahel, the
area just south of the Saharawhere the worst effects of water scarcity, hotter temperatures, and longer
dry seasons are expected to occur.5 These developments may well be exacerbated by the lack of state
and regional capacity to manage the effects of climate change. These same dynamics haunt many nations
in Asia and the Americas, too, and the implications for developed countries such as the United States and
In
the 21st century the world could see substantial numbers of climate migrants
much of Europe will be profound. Migration Migration adds another layer of complexity to the scenario.
people displaced by either the slow or sudden onset of the effects of climate change. The United Nations
recent Human Development Report stated that, worldwide, there are already an estimated 700 million
internal migrantsthose leaving their homes within their own countriesa number that includes people
whose migration isrelated to climate change and environmental factors. Overall migration across national
borders is already at approximately 214 million people worldwide,6 with estimates of up to 20 million
displaced in 2008 alone because of a rising sea level, desertification, and flooding.7 One expert, Oli Brown
of the International Institute for Sustainable Development, predicts a tenfold increase in the current
number of internally displaced persons and international refugees by 2050.8 It is important to
acknowledge that there is no consensus on this estimate. In fact there is major disagreement among
experts about how to identify climate as a causal factor in internal and international migration. But even
though the root causes of human mobility are not always easy to decipher, the policy challenges posed by
that movement are real. A 2009 report by the International Organization for Migration produced in
cooperation with the United Nations University and the Climate Change, Environment and Migration
cites numbers that range from 200 million to 1 billion migrants from
climate change alone, by 2050,9 arguing that environmental drivers of migration are often
Alliance
coupled with economic, social and developmental factors that can accelerate and to a certain extent mask
the impact of climate change. The report also notes that migration can result from different
environmental factors, among them gradual environmental degradation (including desertification, soil and
coastal erosion) and natural disasters (such as earthquakes, floods or tropical storms).10 (See box on
climate change is
expected to aggravate many existing migratory pressures around the world. Indeed
associated extreme weather events resulting in drought, floods, and disease are
projected to increase the number of sudden humanitarian crises and
page 15 for a more detailed definition of climate migrants.) Clearly, then,
disasters in areas least able to cope, such as those already mired in poverty or prone to
conflict.11 Conflict This final layer is the most unpredictable, both within nations and transnationally, and
will force the United States and the international community to confront climate and migration challenges
within an increasingly unstructured local or regional security environment. In contrast to the great power
conflicts and the associated proxy wars that marked most of the 20th century, the immediate post- Cold
War decades witnessed a diffusion of national security interests and threats. U.S. national security policy is
increasingly integrating thinking about nonstate actors and nontraditional sources of conflict and
instability, for example in the fight against Al Qaeda and its affiliated groups. Climate change is among
these newly visible issues sparking conflict. But because the direct link between conflict and climate
change is unclear, awareness of the indirect links has yet to lead to substantial and sustained action to
address its security implications. Still
conflict
is now
the operational challenges that will confront U.S. and partner militaries amid a rising sea level, growing
extreme weather events, and other anticipated effects of climate change.13 The U.S. Department of
Defense has even voiced concern for American military installations that may be threatened by a rising
sea level.14 There is also well-developed international analysis on these points. The United Kingdoms
2010 Defense Review, for example, referenced the security aspects of climate change as an evolving
challenge for militaries and policymakers. Additionally, in 2010, the Nigerian government referred to
climate change as the greatest environmental and humanitarian challenge facing the country this
century, demonstrating that climate change is no longer seen as solely scientific or environmental, but
increasingly as a social and political issue cutting across all aspects of human development.15 As these
three threadsclimate change, migration, and conflictinteract more intensely, the consequences will be
far-reaching and occasionally counterintuitive. It is impossible to predict the outcome of the Arab Spring
movement, for example, but the blossoming of democracy in some countries and the demand for it in
others is partly an unexpected result of the consequences of climate change on global food prices. On the
other hand, the interplay of these factors will drive complex crisis situations in which domestic policy,
international policy, humanitarian assistance, and security converge in new ways. Areas of concern
Several
regional
hotspots
frequently
come up in the
international
debate on climate
change, migration, and conflict. Climate migrants in northwest Africa , for example, are
causing communities across the region to respond in different ways, often to the detriment of regional and
developments in Libya, especially the large number of weapons looted from depots after strongman
Moammar Qaddafis regime fell which still remain unaccounted forare a threat to stability across North
Africa. Effective solutions need not address all of these issues simultaneously but must recognize the
layers of relationships among them. And these solutions must also recognize that these variables will not
always intersect in predictable ways. While some migrants may flee floodplains, for example, others may
Bangladesh , already
well known for its disastrous floods, faces rising waters in the future due to climate-driven
glacial meltdowns in neighboring India. The effects can hardly be over. In December 2008 the
National Defense University in Washington, D.C., ran an exercise that explored the impact of a
flood that sent hundreds of thousands of refugees into neighboring India. The result: the
exercise predicted a new wave of migration would touch off religious conflicts ,
migrate to them in search of greater opportunities in coastal urban areas.16
foreign climate migrants. The country will contribute 22 percent of global population growth and have
close to 1.6 billion inhabitants by 2050, causing demographic developments that are sure to spark waves
of internal migration across the country. Then theres the
Andean region
melting glaciers
and snowcaps will drive climate, migration, and security concerns. The average rate
of glacial melting has doubled over the past few years, according to the World Glacier Monitoring
Service.17 Besides Peru, which faces the gravest consequences in Latin America, a number of other
Andean countries will be massively affected, including Bolivia, Ecuador, and Colombia. This development
trend is upward, there's a fair bit of variation year to year. Some of that, as we can see, has to do with El
Nio and La Nia cycles, which can shift heat into and out of the ocean. There's a third aspect of this chart,
however, that's getting a barrage of attention lately. The
and Erland Klln has suggested that the warming of the oceans has accelerated in the past 15 years
If the
oceans are indeed the reason for the pause, that's not comforting
news, since that extra heat should eventually rise to the Earths
surface in the years ahead, leading to much hotter temperatures. That
and that the "missing heat" may be lurking in the deep layers, 700 meters below the surface:
said, it's not entirely clear why the oceans have been grabbing a bigger share of the heat lately. It's also
not certain when, exactly, that heat will return to the surface. Climate models still have trouble capturing
the precise mechanisms by which the oceans transfer heat to the surface over short time scales. Which
brings us to our third part... 3)
What
Otto and his colleagues found is that, if you look at data from the
last decade and extrapolate from there, we can expect the Earth to
warm an extra 0.9C to 2C in the short term whenever the amount
of carbon dioxide in the atmosphere doubles. By contrast, earlier climate models
short term every time we double the amount of carbon dioxide in the atmosphere. Still here. (AP)
had put that range at between 1C to 2.5C. (Note: These are lower numbers than estimates of "climate
sensitivity," which measures how the Earth would keep heating up thereafter, as the oceans and ice sheets
reach equilibrium.) That's slightly better news, but
that much . As Otto told me: "Even if we give a lot of weight to what weve seen over the last
decade, youre not getting rid of the problem." And here's how Myles Allen, a co-author, put it: "Taken at
face value, our new findings mean that the changes we had previously expected between now and 2050
more, scientists have a variety of other ways to estimate longer-term climate sensitivity, including data
from prehistoric periods, measures of the Earth's response to volcanic eruptions, and physical models. As
NASA's Gavin Schmidt explains, different approaches tend to given different answers, some higher, and
up to industry hype
with only 1% saying it wasnt an important part of their infrastructure. Private remains the most popular
use case 50% of respondents said they had deployed private cloud for between one and three years
while hybrid is certainly on the rise, with one in 10 deploying within the last year. Almost two third (65%)
of respondents said using the cloud had led to increased speed of access to technology, while a similar
number (67%) experienced reduced delivery times to clients and partners. Yet this doesnt explain the full
story. More than half (57%) of respondents admit they have migrated data back in-house from the cloud.
Not surprisingly, its security and data protection theyre concerned about. Of the application structure in
organisations polled, only two in five (39%) apps are ready to move to the cloud and as a result
companies are primarily relying on private cloud. However 94% said their organisations would be more
partial to using hybrid cloud is the connections within publicly-used internet structure could be made more
predictable. This
Greenpeace campaigns and stories such as the New York Times cloud factories series, which
stated that the foundation of the information industry is sharply at odds with its image of sleek efficiency
and environmental friendliness. Theres no question that data centers consume huge amounts of energy.
power companies is better for the environment than if everyone had to run their own generator. In one
Apple announced last spring that it had achieved 100 percent renewable energy at all its data centers.
Google is coming up with ways to cut energy demand and cool its data centers more efficiently. And
Facebook has a Swedish data center that is cooled by Arctic air and powered by hydroelectric sources.
U.S.
companies cannot solve this problem alone. Its not blowing over, said Microsoft
promote better security by adopting encryption and other best practices are positive signs, but
General Counsel Brad Smith at a recent conference. In June of 2014, it is clear it is getting worse, not
including cloud computing and data storagea shift that will be worth huge amounts of money over
time.146 There is some risk at the moment that the short-term logistical challenges of requiring data
localization or turning away from U.S. companies will create a false sense of security among U.S.
advisory firm, and senior director of Geoskope, an intelligence company focused on emerging
markets, June 23rd, 2014, The Greatest Challenge to U.S. National Security: A Weak
Economy, http://nationalinterest.org/feature/the-greatest-challenge-us-national-security-weakeconomy-10720?page=2
strategic commitments exceed the resources available to support them." Calculating the savings of
switching grand strategies, however, is not so simple, because it depends on the expenditures the current
strategy demands and the amount required for its replacement-numbers that are hard to pin down. If the
United States revoked all its security guarantees, brought home all its troops, shrank every branch of the
military, and slashed its nuclear arsenal, it would save around $900 billion over ten years, according to
advocates of
retrenchment endorse such a radical reduction; instead, most call for "restraint," an
"ofshore balancing" strategy, or an "over the horizon" military posture. The savings these
Benjamin Friedman and Justin Logan of the Cato Institute. But few
approaches would yield are less clear, since they depend on which security commitments Washington
would abandon outright and how much it would cost to keep the remaining ones. If retrenchment simply
meant shipping foreign-based U.S. forces back to the United States, then the
savings would be
modest at best, since the countries hosting U.S. forces usually cover a large portion of the basing
costs. And if it meant maintaining a major expeditionary capacity, then any savings would again be small,
since the Pentagon would still have to pay for the expensive weaponry and equipment required for
already begun to fall back to earth as the United States winds down its two costly wars and trims its base
compromise national security. These reductions would lower military spending to a little less than three
percent of gdp by 2017, from its current level of 4.5 percent.
even more with no ill efects by reforming its procurement practices and compensation
policies. Even without major budget cuts, however, the country can aford the
costs of its ambitious grand strategy. The significant increases in military spending
proposed by Mitt Romney, the Republican candidate, during the 2012 presidential campaign would still
have kept military spending below its current share of gdp, since spending on the wars in Afghanistan and
Iraq would still have gone down and Romney's proposed nonwar spending levels would not have kept pace
with economic growth. Small wonder, then, that the case for pulling back rests more on the nonmonetary
costs that the current strategy supposedly incurs.
powers, weaker powers may shift their geopolitical posture away from the United States. Either way,
confident of their basic territorial security for the reasons identified in social identity theory and theories of
status competition.
positional good, efforts to craft negotiated bargains about status contests face long odds. And this
The
route back to bipolarity or multipolarity is thus fraught with danger.
With two or more plausible claimants to primacy, positional competition and the potential for major
positionality problem is particularly acute concerning the very issue unipolarity solves: primacy.
power war could once again form the backdrop of world politics .
Broad empirical analysis demonstrates our argument--heg is necessary to solve peace and its absence causes
war
Wohlforth 8 William, Daniel Webster Professor of Government in the
Dartmouth College Department of Government, October, World Politics,
Unipolarity, Status Competition, and Great Power War,
www.polisci.wisc.edu/Uploads/Documents/IRC/Wohlforth
(2009).pdf)
Despite increasingly compelling findings concerning the importance of status seeking in human behavior,
empirical studies of
the relationship between both systemic and dyadic capabilities
distributions and war have continued to cumulate. If the relationships implied
research on its connection to war waned some three decades ago.38 Yet
by the status theory run afoul of well-established patterns or general historical findings, then there is little
status
competition is unlikely to cause great power military conflict in
unipolar systems. If status competition is an important contributory cause of great power war,
then, ceteris paribus, unipolar systems should be markedly less war-prone
than bipolar or multipolar systems. And this appears to be the case. As Daniel Geller
notes in a review of the empirical literature: "The only polar structure
that appears to influence conflict probability is unipolarity ."39 In addition,
a larger number of studies at the dyadic level support the related
expectation that narrow capabilities gaps and ambiguous or
unstable capabilities hierarchies increase the probability of war .40
These studies are based entirely on post-sixteenth-century European
history, and most are limited to the post-1815 period covered by the
standard data sets. Though the systems coded as unipolar, near-unipolar, and hegemonic are all
reason to continue investigating them. The clearest empirical implication of the theory is that
marked by a high concentration of capabilities in a single state, these studies operationalize unipolarity in
a variety of ways, often very differently from the definition adopted here. An ongoing collaborative project
looking at ancient interstate systems over the course of two thousand years suggests that historical
systems that come closest to the definition of unipolarity used here exhibit precisely the behavioral
properties implied by the theory. 41 As David C. Kang's research shows, the East Asian system between
1300 and 1900 was an unusually stratified unipolar structure, with an economic and militarily dominant
China interacting with a small number of geographically proximate, clearly weaker East Asian states.42
Status politics existed, but actors were channeled by elaborate cultural understandings and interstate
practices into clearly recognized ranks. Warfare was exceedingly rare, and the major outbreaks occurred
precisely when the theory would predict: when China's capabilities waned, reducing the clarity of the
underlying material hierarchy and increasing status dissonance for lesser powers. Much more research is
needed, but initial exploration of other arguably unipolar systems-for example, Rome, Assyria, the Amarna
system-appears consistent with the hypothesis.43 Status Competition and Causal Mechanisms Both theory
and evidence demonstrate convincingly that competition for status is a driver of human behavior, and
social identity theory and related literatures suggest the conditions under which it might come to the fore
in great power relations. Both the systemic and dyadic findings presented in large-N studies are broadly
consistent with the theory, but they are also consistent with power transition and other rationalist theories
of hegemonic war.
Add-On Cybersecurity
the NSA has both weakened overall trust in the network and directly harmed the
security of the Internet. Certainly, the actions of the NSA have created a serious trust and
in which
credibility problem for the United States and its Internet industry. All of this denying and lying results in
us not trusting anything the NSA says, anything the president says about the NSA, or anything
companies say about their involvement with the NSA, wrote security expert Bruce Schneier in
September 2013.225 However, beyond undermining faith in American government and business, a
variety of the NSAs efforts have undermined trust in the security of the Internet itself. When Internet
users transmit or store their information using the Internet, they believeat least to a certain degree
that the information will be protected from unwanted third-party access. Indeed, the continued growth of
the Internet as both an economic engine and an as avenue for private communication and free
functioning society. As economist Joseph Stiglitz explains, Trust is what makes contracts, plans and
everyday transactions possible; it facilitates the democratic process, from voting to law creation, and is
necessary for social stability.227 Individuals rely on online systems and services for a growing number
of sensitive activities, including online banking and social services, and they must be able to trust that
the data they are transmitting is safe. In particular, trust and authentication are essential components of
the protocols and standards engineers develop to create a safer and more secure Internet, including
encryption.228 The NSAs work to undermine the tools and standards that help ensure cybersecurity
especially its work to thwart encryptionalso undermines trust in the safety of the overall network.
Moreover, it reduces trust in the United States itself, which many now perceive as a nation that exploits
vulnerabilities in the interest of its own security.220 This loss of trust can have a chilling effect on the
behavior of Internet users worldwide.230 Unfortunately, as we detail below, the growing loss of trust in
the security of Internet as a result of the latest disclosures is largely warranted. Based on the news
intelligence purposes. In the Internet era, these two missions of the NSA are in obvious tension. The
widespread adoption of encryption technology to secure Internet communications is considered one of
the largest threats to the NSAs ability to carry out the goals of its signals intelligence mission. As the
National Journal explained, strong Internet security actually makes the NSAs job harder.231 In the
1990s, the NSA lost the public policy battle to mandate that U.S. technology companies adopt a
technology called the Clipper Chip that would give the government the ability to decrypt private
communications,232 and since then strong encryption technology has become a bedrock technology
when it comes to the security of the Internet. The NSA lost that early battle against encryption,
sometimes called the Crypto War,233 not only due to vocal opposition from privacy and civil liberties
stakeholders, but also because the private sector convinced policymakers that subverting the security of
American communications technology products would undermine the U.S. technology industry and the
growth of the Internet economy as a whole.234 However, as an explosive New York Times story first
Headquarters (GCHQ), the NSAs British counterpart. Cryptanalytic capabilities are now coming online.
Vast amounts of encrypted Internet data which have up till now been discarded are now
released by The Washington Post in August 2013, 21 percent of the intelligence budget (roughly $11
billion) goes toward the Consolidated Cryptologic Program, with a staff of 35,000 in the NSA and the
armed forces surveillance and code breaking units.237 The resources devoted to signals intercepts are
cybersecurity , not just against the NSA, but also against foreign governments,
organized crime, and other malicious actors. In this section, we consider four
different ways that the NSA has damaged cybersecurity in pursuit of its signals intelligence goals: (1) by
deliberately engineering weaknesses into widely-used encryption standards; (2) by inserting surveillance
backdoors in widely-used software and hardware products; (3) by stockpiling information about security
vulnerabilities for its own use rather than disclosing those vulnerabilities so that they can be remedied;
and (4) by engaging in a wide variety of offensive hacking techniques to compromise the integrity of
computer systems and networks around the world, including impersonating the web sites of major
American companies like Facebook and LinkedIn.
of doing so that make it such a difficult proposition. Online banking was a novelty 20 years ago. Now,
everything happens on the Internet. People pay their bills, they do business, they do their work with
customers. People don't fax documents any more if they don't have to -- they do webinars and briefings.
All of this exposes the opportunity for mischief. You don't know the source of the mischief. You don't know
whether it's individuals trying to solve a difficult technical challenge on their own or if they're connected to
governments, or if they're cells attached to governments -- and it's very difficult to pin down ... incoming
probes to a source. TechNewsWorld: While it's generally agreed that
whole global economic infrastructure. You can't conceive of the threats from the point of view of a
traditional war. Cyber-efforts are ongoing today; we're in a cyber-struggle today. We don't know who the
Cybersecurity - Solvency
Surveillance reform is essential for broader cyber security
initiatives
Gorman 14 (Siobhan,- NSA Chief: Spy Concerns Are Pre-Empting Cybersecurity Fixes)
the U.S.
government will have to address surveillance concerns before
Congress can turn to bolstering cyberdefenses. Gen. Keith Alexander's
The departing director of the National Security Agency acknowledged Tuesday that
comments, which began with a defense of NSA's surveillance programs, showed the degree to which his
top prioritycybersecurityhas been overshadowed by the disclosures
from former NSA contractor Edward Snowden. Speaking at a cybersecurity conference at Georgetown
University in one of his final public appearances before retiring this month, Gen. Alexander said he realized
The intersection of critical infrastructure and cyberspace has presented many challenges to policymakers.
Critical infrastructure includes areas like the water and food supply,
telecommunications, nuclear power, transportation, banking, and
energy---areas crucial to the functioning of society. Eighty percent of this critical
infrastructure is owned by the private sector. The continual delegation of control of critical infrastructure to
cyberspace without regard to security has posed many vulnerabilities that malicious actors could exploit.
To address these vulnerabilities, policymakers can utilize three options: strengthening partnerships
between the public and private sectors, installing a White House official to deal solely with cyber security
issues, and encouraging collaboration between critical infrastructure operators for coordinating best
practices and crisis management. In conclusion, this analysis recommends that the federal government
follow a course incorporating all three options because the effects could be mutually reinforcing. A long
term solution to cybersecurity must take note of the private sectors insight to be successful; a national
dialogue on the importance of cyber security needs to take its cue from the White House; in the
meanwhile, proprietors of critical infrastructure should ensure that they can reduce the damage caused by
disasters or attacks by establishing clear lines of communication. [End of Abstact Start of Intro]
Critical Infrastructure Government and the private sector have reaped digital networkings benefits by
using computer networks to control vital parts of critical infrastructure from cyberspace. However, remote
strengthening partnerships between the public and private sectors, integrating resources under a White
House official, and increasing collaboration between levels of critical infrastructure. After scrutinizing these
options under the criteria of political feasibility, industry acceptance, and efficacy, this analysis
Critical
infrastructure includes areas such as transportation, water supplies,
public health, telecommunications, energy, banking and finance,
emergency and information services, nuclear facilities, food
supplies, and defense and chemical industries (Moteff & Parfomak, 2004).
recommends that the federal government pursue a combination of all three policy options.
According to the Department of Homeland Securitys National Strategy for Homeland Security, critical
infrastructure consists of assets, systems, and networks, whether physical or virtual, so vital to the United
States that their incapacitation or destruction would have a debilitating effect on security, national
economic security, public health or safety, or any combination thereof (Homeland Security Council, 2007).
Figure 1 illustrates the myriad of infrastructures and their interdependencies with one another. Simply put,
embedded processors and controllers in critical industries (as cited in National Cyber Security Center,
2009, p. 11). The intersection of critical infrastructure and cyberspace means that policymakers should
strive to establish security while retaining a relatively open cyberspace. Several government officials have
the National Security Agency and National Intelligence, declared that if the September 11th, 2001,
hijackers had launched a focused attack on an American bank, the economic ramifications would have
been of an order of magnitude greater than the destruction of the World Trade Center (Harris, 2008).
Former cyber security advisor Richard Clarke, who served in the Clinton and Bush Administrations,
asserted that the primary target for a terrorists cyber attack would be the economy whereas casualties
and chaos would be secondary (as cited in Rollins & Wilson, 2007, p. 3). In fact, Director of National
indefinite period (Annual Threat Assessment, 2009). Beyond threatening the private sector, intruders have
been specifically targeting the federal governments information technology infrastructure. A report by the
International Business Machines Corporation revealed that of the 237 million security attacks carried out in
the first half of 2005, more than twenty-two percent, the highest percentage against any given group,
aimed for government agencies (Fitzgerald, 2006, p. 57). Between 2008 and March 2009, the number of
attacks against federal computer networks swelled about forty percent (Smith, 2009). The Department of
the gravity of cybersecurity, they might dissent on the correct policy solution. As the White Houses
Cyberspace Policy Review pointed out, cyberspace policy envelops the following: security of and
operations in cyberspace,,the full range of threat reduction, vulnerability reduction, deterrence,
international engagement, incident response, resiliency, and recovery policies and activities, including
computer network operations, information assurance, law enforcement, diplomacy, military, and
intelligence missions as they relate to the security and stability of the global information and
communications infrastructure (National Cyber Security Center, 2009, p. 5). This analysis will lay out three
policy options to address these issues. Strengthening Partnerships between the Public and Private Sectors
Legislators cannot expect a law ignoring the private sectors input to succeed because businesss efforts
will ultimately determine effective cybersecurity policies. Thus, the government can continue encouraging
the deepening of relationships with the private sector. Advocating a redefinition of governments
relationship to the software business, General James Cartwright stated that government should treat
cyber security as a weapon system (Rutherford, 2008). A paradigm shift to Gen. Cartwrights mindset
would be favorable for government and business because the public sector widely uses private sector
products. The Department of Defense, in particular, uses Commercial-Off-the-Shelf products since these
packages are cheaper and more innovative than a government established standard. Communication
between government and the private sector would be helpful for alleviating situations involving systemic
software threats. For example, the Microsoft Windows operating system runs on ninety-five percent of
personal computers worldwide, so hackers often exploit its vulnerabilities. In 2003, the Blaster worm
infected some 400,000 host PCs in a single day. Microsoft responded by permitting several governments
across the world to take a peek at the precious Windows source code for input and disclosure (Taylor,
2003). Thus, government benefitted by receiving insight into the potential problems the Blaster worm
posed; business benefitted by receiving the governments assistance with this problem. A number of
forums already exist to serve as models for more formal mechanisms of public-private communication.
Microsoft created a Security Response Center that works with the Department of Defense to secure its
products (Information Technology in the 21st Century Battlespace, 2003). Learning from Carnegie Mellon
Universitys public-private alliance model, the Department of Homeland Security in 2003 founded the
United States-Computer Emergency Readiness Team, a group of government and industry experts
compiling software vulnerabilities (Barnes, 2004, p. 327). Similarly, the Protected Critical Infrastructure
Information Program in the Department of Homeland Security represents the federal governments first
ever mechanism to collect and analyze data from private companies without fear of releasing that data to
the public by the Freedom of Information Act (Grubesic & Murray, 2006, p. 65). In response to the
governments creation of federal agencies like the Critical Infrastructure Assurance Office and National
Infrastructure Protection Center in 1998, industry responded with the creation of the Partnership for Critical
Infrastructure Security as well as the generation of Information Sharing Analysis Centers (Michel-Kerjan,
2003, p. 136). Industry agents staff these Centers, which specialize in areas like telecommunications,
electricity, and finance (Michel-Kerjan, 2003, p. 136). This analysis evaluates this option under the
aforementioned criteria.
obstruct the way to success. Politically, the Freedom of Information Act, which could force
the disclosure of details of infrastructure weaknesses to the public, may make private companies
apprehensive about sharing their data with the government. Laws like the Critical Infrastructure
Information Act of 2002 protect the private sector from such disclosures, but companies may be reluctant
nonetheless (Pozen, 2005, p. 678). Industry acceptance also affects this options efficacy. There are
currently federal organizations like the United States-Computer Emergency Readiness Team bridging the
communication gap between the public and private sectors, but only serious attention to these programs
by both parties will evoke substantive results. Companies confront a tradeoff between security and
efficiency as well as transparency and customer satisfaction. Noting this trend, Clay Wilson addressed
studies revealing a low rate of cybercrime incident reporting because companies fear consumer backlash
from negative publicity (Wilson, 2009, p. 24). According to a study conducted among Fortune 1000
companies, one of the most trenchant effects of compromised cyber security is damage to 6 reputation
the National Security Agency. Curt Hbert is a former chairman of the Federal Energy
Regulatory Commission. And Susan Tierney is a former assistant secretary of Energy. All three
are co-chairs of the Bipartisan Policy Center's Electric Grid Cyber Security Initiative How to
protect our electric grid: Column)
2012 across all critical sectors. Forty-one percent of these incidents involved the energy sector, particularly
Unlike traditional threats to electric grid reliability, such as extreme weather events, a cyber attack is less
predictable in its timing and potentially more difficult to diagnose and address. Such an attack could come
from various sources and target many potential vulnerabilities. The North American electricity grid is
sprawling, with approximately 5,800 major power plants and more than 450,000 miles of high-voltage
transmission lines. And
functioning.
Efforts to prevent and respond to cyber attacks on the electric grid are complicated by
a complex governance structure. In addition to the countless companies involved with pieces of the grid
and actions to protect it, numerous federal, state and local agencies are involved in some aspect of
cybersecurity. Successfully managing cybersecurity risks and recovering from a destructive cyber attack
will require effective coordination at several levels, including U.S. energy companies, the intelligence
community and emergency management agencies; between relevant federal government and state and
local authorities involved in energy, law enforcement, essential services and other issues; and between
U.S. energy regulatory and security agencies and their counterparts in Canada and Mexico. To address
new and evolving threats of cyber attacks on the grid, the Bipartisan Policy Center convened an expert
AT Disads
AT Terrorism DA No Link
Mass domestic surveillance isnt key to preventing
terrorism - comprehensive, independent analysis proves
David Sterman, Emily Schneider, and Peter Bergen, 1/13/2014,
of 225 individuals
recruited by al-Qaeda or a like-minded group or inspired by al-Qaedas ideology, and charged in the United
States with an act of terrorism since 9/11,
investigative methods, such as the use of informants, tips from local communities, and
targeted intelligence operations, provided the initial impetus for investigations
in the majority of cases, while the contribution of NSAs bulk
surveillance programs to these cases was minimal. Indeed, the controversial
bulk collection of American telephone metadata, which includes the telephone numbers that originate and
Section 215 of
appears to have played an identifiable role in
initiating, at most, 1.8 percent of these cases. NSA programs involving the
surveillance of non-U.S. persons outside of the United States under Section 702 of the FISA
Amendments Act played a role in 4.4 percent of the terrorism cases we
examined, and NSA surveillance under an unidentified authority
played a role in 1.3 percent of the cases we examined . Regular FISA
receive calls, as well as the time and date of those calls but not their content, under
the USA PATRIOT Act,
warrants not issued in connection with Section 215 or Section 702, which are the traditional means for
investigating foreign persons, were used in at least 48 (21 percent) of the cases we looked at, although its
unclear whether these warrants played an initiating role or were used at a later point in the investigation.
Surveillance of American phone metadata has had no discernible impact on preventing acts of terrorism
and only the most marginal of impacts on preventing terrorist-related activity, such as fundraising for a
terrorist group. Furthermore, our examination of the role of the database of U.S. citizens telephone
metadata in the single plot the government uses to justify the importance of the program that of Basaaly
Moalin, a San Diego cabdriver who in 2007 and 2008 provided $8,500 to al-Shabaab, al-Qaedas affiliate in
Somalia calls into question the necessity of the Section 215 bulk collection program. According to the
government, the database of American phone metadata allows intelligence authorities to quickly
circumvent the traditional burden of proof associated with criminal warrants, thus allowing them to
connect the dots faster and prevent future 9/11-scale attacks. Yet in the Moalin case, after using the
NSAs phone database to link a number in Somalia to Moalin, the FBI waited two months to begin an
investigation and wiretap his phone. Although its unclear why there was a delay between the NSA tip and
the FBI wiretapping, court documents show there was a two-month period in which the FBI was not
monitoring Moalins calls, despite official statements that the bureau had Moalins phone number and had
identified him. , This undercuts the governments theory that the database of Americans telephone
metadata is necessary to expedite the investigative process, since it clearly didnt expedite the process in
a careful review of
three of the key terrorism cases the government has cited to defend
NSA bulk surveillance programs reveals that government officials
have exaggerated the role of the NSA in the cases against David Coleman Headley
the single case the government uses to extol its virtues. Additionally,
and Najibullah Zazi, and the significance of the threat posed by a notional plot to bomb the New York Stock
Exchange. In 28 percent of the cases we reviewed, court records and public reporting do not identify
which specific methods initiated the investigation. These cases, involving 62 individuals, may have been
initiated by an undercover informant, an undercover officer, a family member tip, other traditional law
enforcement methods, CIA- or FBI-generated intelligence, NSA surveillance of some kind, or any number of
other methods. In 23 of these 62 cases (37 percent), an informant was used. However, we were unable to
determine whether the informant initiated the investigation or was used after the investigation was
initiated as a result of the use of some other investigative means. Some of these cases may also be too
recent to have developed a public record large enough to identify which investigative tools were used. We
have also identified three additional plots that the government has not publicly claimed as NSA successes,
but in which court records and public reporting suggest the NSA had a role. However, it is not clear
the overall
problem for U.S. counterterrorism officials is not that they need
vaster amounts of information from the bulk surveillance programs,
but that they dont sufficiently understand or widely share the
information they already possess that was derived from
conventional law enforcement and intelligence techniques. This was true
whether any of those three cases involved bulk surveillance programs. Finally,
for two of the 9/11 hijackers who were known to be in the United States before the attacks on New York
and Washington, as well as with the case of Chicago resident David Coleman Headley, who helped plan the
2008 terrorist attacks in Mumbai, and it is the unfortunate pattern we have also seen in several other
significant terrorism cases.
proven track record of being a "zealous and effective advocate in defense of civil liberties." The chief
justice of the Supreme Court would appoint the special advocate from a pool of five candidates selected by
collecting all
Americans communications records has no relationship to terrorism .
summit or targeting the democratically elected leaders of allied states or
Given the actual surveillance the NSA does, stopping terror is clearly a pretext. Moreover, the
As the Washington Post noted in December 2013, in an article headlined Officials Defense of NSA Phone
Program May Be Unraveling,
collection program almost certainly unconstitutional, in the process saying that the Justice
Department failed to cite a single case in which analysis of the NSAs
bulk metadata collection actually stopped an imminent terrorist
attack. That same month, Obamas hand-picked advisory (composed of, among others, a former CIA
deputy director and a former White House aide, and convened to study the NSA program through access to
congressional testimony, [Keith] Alexander has credited the program with helping to detect dozens of plots
both in the United States and overseas but the advisory panels report cut deeply into the credibility of
those claims. Additionally, as Democratic senators Ron Wyden, Mark Udall, and Martin Heinrich all
members of the Intelligence Committee baldly stated in the New York Times,
the mass collection of telephone records has not enhanced
Americans protection from the threat of terrorism . The usefulness
of the bulk collection program has been greatly exaggerated . We have
yet to see any proof that it provides real, unique value in protecting national security. In spite of our
repeated requests, the NSA has not provided evidence of any instance when the agency used this program
to review phone records that could not have been obtained using a regular court order or emergency
the Washington Post noted, in most cases where plots were disrupted the study found that
traditional
jetliner over Detroit, or the plan to blow up Times Square, or the plot to attack the New York City subway
system all of which were stopped by alert bystanders or traditional police powers. It certainly did nothing
to stop the string of mass shootings from Aurora to Newtown. Major international attacks from London to
Mumbai to Madrid proceeded without detection, despite involving at least dozens of operatives. And
Alexander, speaking to a Senate panel, said I would much rather be here today debating the program
than trying to explain how we failed to prevent another 9/11. (The same argument, verbatim, appeared
in talking points the NSA gave its employees to use to fend off questions). The implication is rank fear
the CIA
had multiple reports about an al-Qaeda plot and quite a bit of information about
mongering and deceitful in the extreme. As CNN security analyst Peter Bergen has shown,
two of the hijackers and their presence in the United States, which the agency didnt share with other
government agencies until it was too late to do anything about it. Lawrence Wright, the New Yorkers alQaeda expert, also debunked the NSAs proposition that metadata collection could have stopped 9/11,
the CIA withheld crucial intelligence from the FBI, which has
the ultimate authority to investigate terrorism in the US and attacks on Americans abroad. The FBI
could have stopped 9/11, he argued. It had a warrant to establish surveillance of everyone
explaining that
connected to Al Qaeda in America. It could follow them, tap their phones, clone their computers, read their
emails, and subpoena their medical, bank, and credit-card records. It had the right to demand records from
reasons both petty and obscure those agencies chose to hide vital clues from the investigators most likely
to avert the attacks. The government was in possession of the necessary intelligence but had failed to
understand or act on it. The solution that it then embarked on to collect everything en masse has done
nothing to fix that failure. Over and over, from multiple corners, the invocation of the terrorism threat to
of bulk phone records collection and breaks some new ground on whether warrantless content surveillance
under section 702 of the FISA Amendments Act provides valuable intelligence. The researchers
conducted an in-depth analysis of 225 individuals recruited by al-Qaeda or a like-minded group or inspired
by al-Qaedas ideology and charged in the United States with an act of terrorism since September 11th.
The New America Foundation report finds that bulk collection of American telephone metadata played an
identifiable role in initiating no more than 1.8 percent of these cases. This assessment follows on a number
of recent looks at the effectiveness of the phone records collection under section 215 of the USA PATRIOT
Act, including that of Just Security guest blogger and Hoover fellow Marshall Erwin and our own Ryan
Goodmans look at whether the collection could have prevented the attacks of September 11th. The
report also seriously examines the usefulness of warrantless content surveillance under Section 702 of the
that the program has provided valuable intelligence, while pushing for changes that would close off back
door searches, a loophole permitting suspicionless searches using U.S. person selection criteria post-
So far, less
attention has been paid to the legalityand wisdomof mass surveillance under
section 702 of the FISA Amendments Act (FAA), codified at 50 USC 1881a. Section
Civil Liberties Oversight Board (PCLOB) said it, Sprigman and I said it again.
702 is the statutory authority for the PRISM program, which involves warrantless collection of
communications contents via targeting non-U.S. individuals or entities reasonably believed to be located
abroad. The USA Freedom Act would strengthen and impose additional restrictions on section 702
in a nuclear-armed state, and terrorists or their friends were able to take advantage of the ensuing
who attempted to blow up an American Airlines flight from Paris to Miami in December 2001, and the
underwear bomber, who tried to blow up a Northwest Airlines flight from Amsterdam to Detroit in
December 2009. So, we do have a terrorism problem, but
Here's the reality. The nuclear threat is real and deserves our utmost attention. An atomic bomb detonated
it would be tougher
for terrorists to pull of a nuclear attack than many people assume . (A
in the heart of a major American city could kill hundreds of thousands. But
dirty bomb would be easier to make and deliver, but its impact would be far less severe.) Many intelligence
professionals know that, but our political culture doesn't do moderation. The first step to getting smart
about defense, then, is to bust some popular myths about nuclear terrorism. The long road Start at the
beginning: To pull off a plot, a terrorist group needs to get its hands on a bomb or on the materials it needs
to make one. It would probably target a nuclear facility directly, maybe a military base in the former Soviet
Union or a civilian reactor in an obscure corner of the world. That's a big reason why we need to do a much
better job of securing those sites. Our imagination, though, tends to focus just as much on a shadowy
black market where nuclear materials from the former Soviet Union are bought and sold so long as the
price is right. That fear is fueled by regular reports of intercepted nuclear materials and by the success of
Pakistani engineer A.Q. Khan in building a genuine worldwide black market in nuclear technology -- but not
many illicit transactions have actually been stings. Terrorists should also be nervous about getting ripped
off. When drug smugglers work with people they don't already know and trust, they tend to keep deals
small, about $10,000 or less. A nuclear weapon or the materials for it would be worth millions. If a group
got its hands on nuclear materials, it would still need to build a bomb. To the Internet! The place is littered
with tutorials on how to build nuclear weapons, and while a lot of what's out there is nonsense, there are
places that get the basics right. (Suggestion for policymakers: Hire students who failed physics to make as
many instructional websites as they can.) The problem for terrorists is that, as anyone who has ever tried
programming a VCR can tell you, instructions are the easy part. 'The dirty work' When it comes to nukes,
the consequence of a successful attack, we'd be fools to convert from nuclear zealots who think the sky is
falling to nuclear atheists who reject the existence of a real threat. But like a cop who leaves his Kevlar
vest at home because he assumes that all bad guys have armor-piercing bullets, we'll miss opportunities to
confront the threat if we exaggerate it. Better to be pragmatic agnostics: We should be skeptical if we're
told that pulling off a nuclear attack is easy, but we should be smart about making it even harder.
SCHIFF:
case that goes before the FISA court because actually what the court does most routinely is weigh in on an
individual warrant that is much like a search warrant where there's no adversarial process in the criminal
court system. But on these large cases, these constitutional cases, the authorization of new programs,
current bipartisan
interest in the courts activities put the FISC (Foreign Intelligence Surveillance Court)
at the center of possible congressional responses to Snowdens
leaks. I think the public is extremely concerned about the metadata that is being collected, said Rep. Steve Cohen,
Though some lawmakers have been sounding alarm bells about the court for a few years,
D-Tenn., who has put forward a proposal to reform the secret court. I think because of that massive concern, that because
the Snowden situation has maintained itself in the news, questions about the court have not been as front-burner as
they are now, Cohen said. Civil liberties advocates also feel that the FISA court is where they are most likely to win
reforms, particularly when it comes to increasing transparency. " In
counsel at the Constitution Project, a nonpartisan legal research and advocacy group. In response to abuses of the
governments spying powers, Congress created the FISC in the 1978 Foreign Intelligence Surveillance Act to approve
warrant applications for surveillance activities related to national security. For years, the court appeared to function just as
Congress had intended, even though the process is one-sided: the government seeks approval for an operation, and there
is no pushback from a counterparty to argue that the operation is overreaching. But in light of the recently leaked
documents detailing the vast scope of the National Security Agencys surveillance programs, members of Congress are
beginning to question whether the secret court is acting as an effective check on the governments spying operations. In
fact, recent revelations show that the scope and functions of the court have vastly expanded in recent years. Perhaps the
greatest change at the FISC is that judges are no longer simply reviewing warrant applications for individual surveillance
operations. Instead, FISA court judges are reviewing and approving what is called programmatic surveillance, the
procedures the government intends to use to conduct broad surveillance operations over a significant period of time. This
change was the result of the 2008 FISA Amendments Act (FAA), which under Section 702 allowed the government to
perform large-scale operations that needed to be authorized only on an annual basis. Now that the judges are approving
surveillance on a much greater scale, civil liberties advocates feel that the one-sided process at the court is insufficient.
Last week, retired District Court Judge James Robertson, who served on the FISC for three years before resigning in protest
over the Bush administrations warrantless wiretap program in 2005, said that the court needs an adversarial process to
evaluate programmatic surveillance. Robertson made his comments at a public workshop of the Privacy and Civil Liberties
Oversight Board (PCLOB), a government agency created to advise on civil liberties concerns. A judge needs to hear both
sides of a case before deciding," he said. "It's quite common -- in fact it's the norm -- to read one side's brief or hear one
side's argument and think, hmm, that sounds right, until we read the other side." Robertsons proposal made headlines
and will be a central piece of legislation forthcoming from Sen. Richard Blumenthal, D-Conn., to reform the court. His bill
will include a special advocate with the power and responsibility to ensure that privacy rights are considered in FISA
court opinions, and an opportunity for civil society organizations to weigh in before the court issues a ruling that
substantially alters the balance between liberty and security in federal policy, Blumenthal wrote in a Politico op-ed
Monday. Another proposal to change the structure of the court comes from Rep. Steve Cohen, D-Tenn., whose bill would
change the way judges are appointed, a reform also mentioned by Blumenthal. Currently, the 11 FISA court judges are
appointed to seven-year terms by the chief justice of the Supreme Court -- a system that has resulted in judges appointed
to the federal bench by Republican administrations now making up 10 of the 11 members. Cohens bill would give the
chief justice three appointments, with the remaining eight divided among Democrats and Republicans in the House and
Senate in order to create a more ideologically diverse court. Cohen, who is a member of the House Judiciary Committee,
Most of the
reforms coming from Congress, including Blumenthals and Cohens proposals, take on
the issue of transparency, which civil liberties advocates believe is a major concern, by seeking to
declassify at least some of what goes on at the FISA court. A bipartisan bill from Democratic Sen. Jeff Merkley
of Oregon and Republican Sen. Mike Lee of Utah takes on the issue of secret law, a reference
said he intends to discuss his proposal at a FISA oversight hearing Wednesday morning.
to the fact that the FISC is reportedly issuing opinions that create a legal framework for the governments surveillance
programs and are not public. The result is that while the statutes passed by Congress are available to the public, how
those statutes have been interpreted and used remains secret. According to a New York Times report, the FISC has
interpreted acts of Congress to give the NSA broad new authorities in lengthy opinions that are hidden from the public. It
is unclear when the court began to issue these long opinions, but when Robertson was on the court, he said he was
unaware that any such opinions were being written. This business about there being a whole body of long opinions that
have been written, that surprised me, Robertson said at the PCLOB workshop. I didnt know about them when I was on
the court. Robertson declined to speculate on why the court began to issue longer opinions, but it does seem clear that
this is a more recent development. Cohens proposal would require 60 percent of the 11 judges to agree in order to issue
opinions when the entire court is considering a case. To shed some light on this secret body of law, Merkley and Lees bill
would require the attorney general to declassify significant FISC opinions that contain substantive legal interpretations,
The bill has several cosponsors in the Senate, including [Democrat] Sen. Patrick Leahy, D-Vt., the chairman of the Judiciary Committee.
with exceptions for opinions that contain sensitive national security information.
Reps. [Democrat] Adam Schiff, D-Calif., and [Republican] Todd Rokita, R-Ind., have introduced a companion bill in the
House. A second transparency proposal comes from Michigan Rep. John Conyers, the top Democrat on the House Judiciary
Committee, and Michigan Republican Rep. Justin Amash, a sophomore congressman with libertarian leanings. In addition
to reining in the collection of data on American citizens, the bill would require that FISA court opinions be shared with
Congress and that summaries of the opinions be made public. In the wake of Snowdens leaks, many members of
The 41 cosponsors of the bill, introduced last month, run the gamut from
progressive Democrats to tea party Republicans.
Congress complained that they had not been aware of the scope of the NSAs surveillance programs.
bills pending in the House and Senate that would address the flaws in
FISA Court raised by AFJ, the Review Group, and others. The FISA Court Reform Act of 2013
would create the Office of the Special Advocate to argue on behalf of privacy
interests, and appeal decisions that favor the government. It would also mandate increased
transparency and disclosures of FISA Court opinions. The FISA Judge Selection
Reform Act would increase the number of FISA Court judges from 11 to 13, and spread the authority to select judges
[Scott Lemieux; Political Analyst for Time; "How Congress learned to stop
bowing to President Obama on national security"
http://theweek.com/articles/558953/how-congress-learned-stop-bowingpresident-obama-national-security; June 8, 2015; JW]
For a brief period of time last week, the post-9/11 National Security Agency
telephone surveillance program was no longer fully in force. In an all
too rare case of Senate procedures actually protecting civil liberties,
Sen. Rand Paul won a battle with Majority Leader (and fellow Kentuckian)
Mitch McConnell in preventing the relevant sections of the USA
Patriot Act from being re-authorized. Paul's "victory" was temporary, and
ultimately resulted in only modest changes to the surveillance state ,
in the form of the USA Freedom Act. But the new restrictions on the N.S.A.'s
surveillance program can be a basis for cautious optimism going
forward, not only on the topic of surveillance but on other issues related to civil liberties and national security . It
appears Congress has finally recovered some of its clout. The machinations in
the Senate were an outgrowth of the political firestorm created by Edward Snowden, who revealed the N.S.A's secret
As a result, Congress finally acted to restrict the NSA's powers. The USA Freedom Act, signed into law by President
Obama, contains two significant reforms. First of all, the NSA will not be permitted to collect bulk telephone and internet
records. And second, at least some decisions of the FISA court that oversees NSA surveillance will be made transparent to
the public, rather than be classified. It is important not to overstate the significance of these changes. W hile
the
NSA will not be able to store data in bulk, private telecommunication
companies will, and the government will be able to access that data
with an order from the FISA court, which has generally been
extremely deferential to government requests. And while it's good that the process
will become more transparent, it's hard to imagine that making such information available will have a transformative
effect. The new law is an improvement over the status quo ante, but not a major one. Does the passage of the legislation
at least signal the arrival of a new civil liberties hero in the Republican Party, who also happens to be running for
Freedom Act for a vote that same day it almost certainly could have passed had Paul supported it. Indeed, if not for Paul
the bill could have passed the Senate last November the cloture vote fell two votes short, and Paul was one of those
votes. Even though Paul was theoretically opposed to the bill because he (correctly) believed that it didn't go far enough,
his obstructionism did not actually cause Congress to pass a better statute. As Russell Berman observes in The Atlantic,
Paul is, in a sense, as much a political loser in this as McConnell.
NSA aren't about Rand Paul per se. But they do suggest the
existence of a new civil libertarian coalition in Congress, consisting
of most of the Democratic caucus and a handful of Republicans.
This group of legislators might be able to make modest headway
not only in pruning the surveillance state, but on other important
retain personal data for longer than is necessary for business purposes. It has been two years since the National Security Agency (NSA)
whistleblower Edward Snowden unleashed a steady stream of documents that exposed the intention by the United States and the United
Kingdom to collect it all in the digital age. These revelations demonstrate how unchecked surveillance can metastasize and undermine
democratic institutions if intelligence agencies are allowed to operate in the shadows, without robust legal limits and oversight.
May 13 , the
US
On
substantial margin. The bill represents the latest attempt by Congress to rein in one of the surveillance programs Snowden disclosedthe
NSAs domestic bulk phone metadata collection under Section 215 of the USA Patriot Act. The House vote followed a major rebuke to the US
government by the US Court of Appeals for the Second Circuit, which ruled on May 7 that the NSAs potentially nationwide dragnet collection
of phone records under Section 215 was unlawful. Section 215 is set to expire on June 1 unless Congress acts to extend it or to preserve
specific powers authorized under the provision, which go beyond collection of phone records. Surveillance reforms are long overdue and can
be accomplished while protecting US citizens from serious security threats. Congress and the Obama administration should end all mass
surveillance programs, which unnecessarily and disproportionately intrude on the privacy of hundreds of millions of people who are not linked
to wrongdoing. But reforming US laws and reversing an increasingly global tide of mass surveillance will not be easy. Many of the programs
Snowden revealed are already deeply entrenched, with billions of dollars of infrastructure, contracts, and personnel invested. Technological
capacity to vacuum up the worlds communications has outpaced existing legal frameworks meant to protect privacy. The Second Circuit
opinion represents an improvement over current law because it establishes that domestic bulk collection of phone metadata under Section
215 of the Patriot Act cannot continue. Section 215 allows the government to collect business records, including phone records, that are
relevant to an authorized investigation. The court ruled that the notion of relevance could not be stretched to allow intelligence agencies
to gather all phone records in the US. However, the opinion could be overturned and two other appeals courts are also considering the legality
of the NSAs bulk phone records program. The opinion also does not address US surveillance of people not in the US. Nor does it question the
underlying assumption that the US owes no privacy obligations to people outside its territory, which makes no sense in the digital age and is
inconsistent with human rights law requirements. Even if the Second Circuit opinion remains good law, congressional action will be necessary
to address surveillance programs other than Section 215both domestic and those affecting people outside the USand to create more
robust institutional safeguards to prevent future abuses. The courts cannot bring about reforms to increase oversight and improve institutional
leaves open the possibility of large-scale data collection practices in the US under the Patriot Act. It does not constrain surveillance under
Section 702 of the FISA Amendments Act nor Executive Order 12333, the primary legal authorities the government has used to justify mass
surveillance of people outside US borders. And the bill does not address many modern surveillance capabilities, from mass cable tapping to
use of malware, intercepting all mobile calls in a country, and compromising the security of mobile SIM cards and other equipment and
debate in the US and globally and would distance the United States
from other countries that seek to make mass surveillance the norm.
On a global level, other governments may already be emulating the
NSAs approach, fueling an environment of impunity for mass violations of privacy. In the
last year, France, Turkey, Russia, and other countries have passed
legislation to facilitate or expand large-scale surveillance. If the USA
Freedom Act passes, it would be the first time Congress has
affirmatively restrained NSA activities since the attacks of September 11 . Key
supporters of the bill have vowed to take up reforms to other laws
next, including Section 702 of the FISA Amendments Act.
Traditionally,
security trumps privacy. But at this point in time, the tide seems to
would ultimately hold the line against significant changes in the current mode of operation.
be going the other way . Last week, the chairman of the Senate Judiciary Committee, Sen. Patrick
Leahy (D-VT), introduced a version of the USA Freedom Act that is far
more restrictive on intelligence agencies operations than any other competing bill.
Surprisingly, given the deep political divisions, Leahys bill seems to
have swept the field. As Jodie Liu and Benjamin Wittes write in Lawfare, Its the bill. It represents a
compromise between the intelligence community, the administration more generally, civil liberties groups, industry, and a
fairly wide range of senators. And it will be the legislation that moves forward with the sometimes nose-holding support of
most of the major parties. What follows is a brief review of how we got here and the future prospects for NSA
governments control of the metadata program. His skepticism regarding this and other elements of the administrations
proposed FISA reforms was echoed publicly by the chairmen and ranking members of both the Senate and House
Intelligence Committees.
liberties organizations
tech companies, including Microsoft, Google, Amazon, Yahoo, Apple, Verizon, Facebook, Twitter, and LinkedIn. Jockeying
among congressional committees provides one central focus for the narrative over the past six months.
restrictions and changes in current policy and practice. This set the
stage for Senate Judiciary Chairman Leahy to seize the lead and rally a broad political
coalition
AT CLPO CP
during which several IC components and agencies that include such componentsODNI, CIA, DoD, DHS,
DOJ, and othershave added Privacy and Civil Liberties Offices.117 Apparently the introduction of a civil
liberties and privacy officer was not forced upon the NSA; officials there sponsored and embraced the
idea. 118 The job announcement went up in September 2013, 119 and the new NSA Civil Liberties and
Privacy Officer, Rebecca Richards, began work four months later.120 The role was clearly designed to be
a policy jobhelping to develop the rules, not merely promoting compliance with them. The job posting
included the following specific duties: b. As the senior architect for CL/P [civil liberties/privacy], ensure
that protections are addressed as part of all internal strategic decision processes related to the agencys
operations, key relationships, tradecraft, technologies, resources or policies. . . . e. Manage CL/P policy,
and advise on related assessment and compliance programs. . . . h. Provide CL/P reviews and
assessments as required of the NSA support to the U.S. Cyber Command.121 As one might expect
Privacy and Civil Liberties Oversight Board (PCLOB), summarizing surveillance under FISA Section 702 and
the various policies that apply to it,124 and one about non-bulk collection under 12,333.125
independent statement on the privacy assessment of the woman at the NSA mandated with
overseeing it, but rather a highly scripted press release .126 Others have
disagreed. For example, one commentator called the 702 paper remarkable for its transparency. 127
Richards defends these types of documents as appropriate steps towards transparency, pointing out that
the NSA has never produced such reports in the past. She emphasizes that she does not conceptualize
public criticism of the NSA as part of her new offices role. The idea, rather, is to advocate internally for
and implement civil liberties and privacy protections, and then advise the public what those protections
are. The IGs office, the PCLOB, and other entities can deliver public criticism.128
identified compliance problems as the threat to privacy/civil liberties. If the NSAs new civil liberties office
is going to add anything distinctive, it will need to embrace interests rather than rights, policy rather
than compliance. But as discussed above, the attraction of the compliance frame is the legitimation it
provides. When the new office takes on policy tasks, lacking that legitimation, it will be especially
bureaucratically vulnerable to being frozen out. Moreover, many of the tools usually available to an Office
of Goodness to augment its own influence will be unavailable because of the secrecy that surrounds NSA
activities. In many circumstances an Office of Goodness asked to publicly ratify particular agency choices
(activities, approaches, rules) can pressure agency leadership into making, or shading, certain choices in
Goodness can often cultivate external advocacy organization support, but the NSA civil liberties offices
access to this tool is similarly undermined by secrecy. Offices of Goodness can gain influence by
generating documents that then become public, whether because they are officially released, leaked, or
turned over because of a Freedom of Information Act or litigation discovery request. But in the classified
environment these avenues of communication, too, are extremely narrow, which means that agency
flouting of office views is less costly than it would otherwise be. 364 All three of the strategies just
mentioned rely on a public constituency to bolster an Office of Goodnesss influencebecause, as James
Q. Wilson summarizes, for federal agencies, [t]he principal source of power is a constituency.365 The
NSA civil liberties office will have a public constituency, but secrecy cannot but undermine how much help
that constituency can provide. So in order to remain empowered, the NSA civil liberties office will need to
cultivate alternative allies, with security clearancesat ODNI, DOJ, at the White House, and in Congress. I
imagine this too will be a challenge. Beginning with ODNI and DOJ, the most obvious potential sources of
support will be from those agencies Civil Liberties and Privacy Officers. But neither is able to carry much
water. The ODNI civil liberties office, as already described, has chosen to function more as a compliance-
proposal of potential actors to increase oversight of which Im aware have even mentioned this office.
activity. Besides, a policy orientation would reduce NSDs influence. Congress is also a somewhat
hopeful prospect. But an NSA civil liberties office is unlikely to lean far
enough to the left to hold the support of the most vocal congressional critics of the NSA. And
yet the most conservative members of the Intelligence Committees are not natural allies either. In
addition, all the obstacles to sustained congressional attention to and oversight of intelligence, discussed
above, must obstruct fine-gauge interventions that might be useful to the offices influence. In short, the
new NSA civil liberties office will be hard pressed to cement the alliances on which, like every Office of
Goodness, it will depend for influence. (I discuss the possibility of a White House alliance in the next
section.)
We would be creating an entire new bureaucracy duplicating the legal and oversight functions that the
Justice Department, under the leadership of the Attorney General, and the Court, comprised of
were
not proposing the establishment of an office to conduct legal
oversight. Were proposing the establishment of a Special Advocate
to advocate against the governments position in court . Were fairly
certain that no one in the Justice Department or the FISA Court is
charged with vigorously opposing the arguments presented by
Justice Department attorneys in FISA Court proceedings, so
duplication is not an issue here.
independent federal district court judges, perform. [Quote from Carie Cordero] To be clear,
executive branch , but that, with respect to each individual application, the court
would hear the best arguments on the side of privacy and civil
liberties. But the compromise version omits the special advocate, and
replaces it with an Amicus Curiae panel. The panel would consist of five lawyers
eligible to serve as amicus (or friend of the court) in FISA Court proceedings, and the court would appoint
a panel member to assist . . . in the consideration of any application for an order or review that, in the
opinion of the court, presents a novel or significant interpretation of the law[.] Even in such cases,
however, the court could avoid appointing amicus with a written finding that such appointment is not
rebuttable presumption in favor of appointing amicus in difficult cases, it is a presumption too easily
sidestepped. The questions of whether the presumption applies in the first place, and, if it does, whether it
is rebutted, are left to the unreviewable discretion of the court. Should the court wish to proceed without
further input, it need only find that an application does not involve a novel or significant question of law,
or that, for any other reason, appointment is not appropriate. This deference is particularly troubling
because the FISA Court already has the authority to appoint amicus curiae in appropriate cases, so this
this proposal
provides no additional mechanism to appeal FISA Court decisions.
reform is in reality little more than the status quo in different language. Second,
Once the court renders its decision the role of amicus is over, and the amicus is not empowered to ask for
review or appeal.
This is no trivial matter because only the government appears before the
FISA Court, and because the government almost never loses, appeals of FISA Court decisions are virtually
process depends .
AT CLPO CP - AT Delays
A privacy advocate would not cause delays emergency
provisions check serious national security risks
Elizabeth Goitein and Faiza Patel, 4/8/2015, Brennan Center for Justice,
Fixing the FISA Court by Fixing FISA: A Response to Carrie Cordero,
https://www.brennancenter.org/blog/fixing-fisa-court-fixing-fisa-responsecarrie-cordero, mm
We assume Carrie is referring to the delay that litigation might involve. Certainly, if programmatic
surveillance continues, there is nothing incongruous about conducting an adversarial proceeding on a
Whatever delay
may occur is plainly justified under those circumstances, and it is far more incongruous to
proposal to collect millions of Americans information over a period of years.
determine the legality of such a sweeping program without an adversary present. If programmatic
there is still no reason to fear that timesensitive investigations will be jeopardized by the participation of a
Special Advocate. There is already a generous provision for
emergencies in FISA, which allows the government to begin
surveillance before even submitting an application to the FISA Court
and to continue that surveillance pending the courts ruling . The
Justice Department need only certify that theres an emergency
situation and that the surveillance meets the necessary legal
criteria. This provision would not be disturbed under our proposal .
surveillance ends (as we recommend),
AT Topicality
The
government officials as proof the NSA operates with careful checks in place,
US government for authority to conduct electronic surveillance and physical searches for foreign
intelligence purposes, according to official documents. Lawmakers responded to the released documents
with requests to the White House for further clarification and oversight of NSA activities. Senator Bob
Corker (R-Tenn.) asked for a briefing for the full Senate from NSA director Keith Alexander to discuss
surveillance procedures. This briefing should discuss the totality of NSA operations, including but not
limited to those that have already been discussed publicly, Corker wrote to the White House. Senator
A special
advocate could force the FISA court to impose strict limits on
Richard Blumenthal (D-Conn.) stressed the need for more oversight of NSA activities.
Misc
Planning Tool for Resource Integration, Synchronization, and Management. 3 It describes the use of three
key surveillance programs, all serving the same purpose of collecting and automatically synthesising
information about users of telecommunication services, including those obtained from Internet service
providers. While UPSTREAM was the program used for collecting data from public and private networks
through international fiber-optic connections and Internet Exchange Points, the XKeyscore was an analytic
system for buffering and retaining data from hundreds of websites and servers around the world while
combining it with data from other sources, such as diplomatic and intelligence resources at USs disposal.4
Its key function was to index such information using IP or e-mail addresses,
phone numbers, cookies, usernames, search terms or location data as well as
metadata retained by websites.5 Finally, BULLRUN was used to break encryption safeguarding
data stored on resources reached by the two other programs through, for example, backdoors installed in
software and hardware delivered by companies operating under NSA contracts.