Professional Documents
Culture Documents
1|Page
Whistleblower Counterplan
Summary
The Whistleblower Counterplan explains an alternative proposal to solve some of the problems
highlighted in the NSA PRISM Surveillance Affirmative position. Specifically, the counterplan
suggests that the United States Federal Government should offer protection to whistleblowers who
leak classified data. This protection would only be put in place, however, if the data that was leaked
could show that the government, or a member of the government, was doing something illegal. By
protecting whistleblowers, the government could now be held accountable for any illegal surveillance,
guaranteeing the effectiveness of existing oversight. By extension, if current oversight were now
effective, then the Affirmative plan of further restricting government surveillance would become
unnecessary.
The rest of the evidence allows the Negative team to defend its counterplan against Affirmative
attacks. For example, the counterplan allows the government to continue doing the surveillance that
is necessary to defend the public, but it no longer allows government agencies to abuse their
intelligence capabilities with overly invasive attacks on privacy. The counterplan evidence also
explains how Congressional action could prevent the failures of exempting classified documents from
past whistleblower laws. Whistleblowers would provide a level of transparency about government
wrongdoing that would encourage the international community to believe that the U.S. was making
progress in its surveillance practices. This would allow the government to get out in front of the
fallout from any leaks, thus avoiding disproportionate public and media response. The evidence
concludes by emphasizing that the NSA exaggerates the impact of leaks on national security,
showing that whistleblowing doesnt have to be a practice that puts the public in danger from
international powers.
2|Page
Whistleblower Counterplan
Glossary
Angela Merkel A German politician and a former research scientist who has been the leader of the
Christian Democratic Union since 2000 and the Chancellor of Germany since 2005. She is the first
woman to hold either office. It was revealed to the world in 2013 that the NSA had tapped her mobile
phone.
Chelsea Manning known before 2013 as Bradley Edward Manning is a United States Army
soldier who was convicted in July 2013 of violations of the Espionage Act and other offenses, after
disclosing to WikiLeaks nearly three-quarters of a million classified or unclassified but sensitive
military and diplomatic documents.
Disclosure The action of making new or secret information known.
Edward Snowden An American computer contractor who leaked classified information from the
NSA in 2013. The information revealed numerous global surveillance programs, many run by the NSA
with the cooperation of telecommunication companies and European governments. As of 2015, he
was living in an undisclosed location in Russia while seeking asylum elsewhere.
FAA FISA Amendments Act of 2008 an Act of Congress that amended the Foreign Intelligence
Surveillance Act. It has been used as the legal basis for mass surveillance programs disclosed by
Edward Snowden in 2014, including PRISM.
Human Rights Watch An international non-governmental organization that conducts research and
advocacy on human rights.
NGO Non-governmental Organization An organization that is neither a part of a government nor a
conventional for-profit business.
SOR Act and STA Act The Surveillance Order Reporting Act and Surveillance Transparency Act of
2013 Two proposed pieces of legislation that seek to give companies more options for disclosing
when and how often they received national security-related requests and provided data to the
government.
Transparency The right and the means to examine the process of decision-making.
Whistleblower A person who exposes any kind of information or activity that is deemed illegal,
dishonest, or not correct within an organization that is either private or public.
3|Page
Whistleblower Counterplan
4|Page
Whistleblower Counterplan
[___] Congressional action to systematize whistleblowing can act as a check against abuses
without jeopardizing our intelligence capabilities.
Pozen, 2013
(Yale Law School, J.D., 2007 Oxford University, M.Sc., Comparative Social Policy (distinction), 2003
Yale College, B.A., Economics (summa cum laude), 2002, Columbia Law Professor, expert
surveillance legal analyst, (David, THE LEAKY LEVIATHAN: WHY THE GOVERNMENT
CONDEMNS AND CONDONES UNLAWFUL DISCLOSURES OF INFORMATION , SSRN)
The federal whistleblower statutes might be expected to comprise Congresss longstanding failure to
confront the executive secrecy system must be understood in light of these institutional and member
level interests in leakiness. With some notable exceptions such as the bill vetoed by President Clinton
that would have strengthened the Espionage Act, 333 Congress has done little to address national
security leaks or the classification system that underlies them. A variety of committees have held
hearings on high-profile incidents, and the intelligence committees have recently mooted measures to
curb certain forms of planting and pleaking. But in general legislative action has been minimal for
decades. Of particular note, members have declined to make use of the protection afforded by the
Constitutions Speech or Debate Clause334 to reveal, or threaten to reveal, executive branch
information without fear of criminal or civil liability.335 One might expect that a responsible legislature
would try to steer classified information leaks its way, so as to preserve legitimate secrecy while
providing an outside check on the executive.336 Congress has largely bypassed this approach, which
would force it to take greater responsibility over the revelations that emerge, and has instead
countenanced minimal enforcement against media leakers while directing all prospective
whistleblowers to their agency inspectors general in the first instance.337 Many members of
Congress seem quite content to be regular readers (and perhaps occasional purveyors) rather than
recipients of leaks. Systematic recourse to leaking emerges, once again, as the more efficient and
politically palatable alternative to systematic legal reform. Congresss role in the ecosystem of
national security leaks is a large and complex subject. Certain congressional entities receive a steady
flow of classified information through official channels, supplemented by a side traffic in direct and
indirect unofficial disclosures. Agencies typically incur political risk if they try to limit this traffic by
clamping down on staffers communications with their oversight committees. Partisan motivations and
sincere good-governance sentiments sustain a perpetual interest on the Hill in leaks, along with a
ready-made rhetoric of crisis about their prevalence. The recent rise of a commuter Congress, in
which many members spend as little time as possible in Washington, may have helped strengthen
relationships between elite reporters and less peripatetic executive officials, shifting power to the
latter in the intragovernmental game of leaks.
5|Page
Whistleblower Counterplan
[___] Existing whistleblower laws fail only because of the classified information exemption.
Congressional action would prevent that.
Pozen, 2013
(Yale Law School, J.D., 2007 Oxford University, M.Sc., Comparative Social Policy (distinction), 2003
Yale College, B.A., Economics (summa cum laude), 2002, Columbia Law Professor, expert
surveillance legal analyst, (David, THE LEAKY LEVIATHAN: WHY THE GOVERNMENT
CONDEMNS AND CONDONES UNLAWFUL DISCLOSURES OF INFORMATION)
The federal whistleblower statutes might be expected to comprise the last major piece of the legal
framework, except that in the national security context they play a marginal role. Several laws protect
executive branch employees who disclose information regarding alleged abuses to designated
agency officials or congressional committees under specified procedures.63 But these laws offer
significantly less succor when it comes to classified information, are widely seen as confusing and
user-unfriendly, and under no circumstances permit disclosures directly to the press.64 These laws
also do not ensure against revocation of ones security clearance,65 which in the national security
and foreign policy fields generally means loss of ones job. And though the point is contestable, the
laws are fairly read to provide absolutely zero protection for those who publicly reveal classified
information, even as a last resort, and even when the information reveals illegal government
conduct.66 The vast majority of leakers have no interest in reporting wrongdoing in any event.67
Consequently, the whistleblower statutes tend to be ignored in the debate over classified information
leaking, apart from occasional calls to revise them. It is telling that in Jack Goldsmiths recent booklength study of mechanisms that publicize and constrain the executives national security activities,
these laws are never once mentioned.
6|Page
Whistleblower Counterplan
[___] Surveillance transparency from leaks is key to preventing backlash over surveillance.
Schneier, 2015
(fellow at the Berkman Center for Internet and Society at Harvard Law School, a program fellow at the
New America Foundation's Open Technology Institute, a board member of the Electronic Frontier
Foundation, an Advisory Board Member of the Electronic Privacy Information Center, and the Chief
Technology Officer at Resilient Systems, Inc (Bruce, Data and Goliath: the Hidden Battles to Collect
Your Data and Control Your World, Ch. 12)
Transparency is vital to any open and free society. Open government laws and freedom of information
laws let citizens know what the government is doing, and enable them to carry out their democratic
duty to oversee its activities. Corporate disclosure laws perform similar functions in the private
sphere. Of course, both corporations and governments have some need for secrecy, but the more
they can be open, the more we can knowledgeably decide whether to trust them. Right now in the
US, we have strong open government and freedom of information laws, but far too much information
is exempted from them. For personal data, transparency is pretty straightforward: people should be
entitled to know what data is being collected about them, what data is being archived about them, and
how data about them is being usedand by whom. And in a world that combines an international
Internet with country-specific laws about surveillance and control, we need to know where data about
us is being stored. We are much more likely to be comfortable with surveillance at any level if we
know these things. Privacy policies should provide this information, instead of being so long and
deliberately obfuscating that they shed little light. We also need transparency in the algorithms that
judge us on the basis of our data, either by publishing the code or by explaining how they work. Right
now, we cannot judge the fairness of TSA algorithms that select some of us for special screening.
Nor can we judge the IRSs algorithms that select some of us for auditing. Its the same with search
engine algorithms that determine what Internet pages we see, predictive policing algorithms that
decide whom to bring in for questioning and what neighborhoods to patrol, or credit score algorithms
that determine who gets a mortgage. Some of this secrecy is necessary so people dont figure out
how to game the system, but much of it is not. The EU Data Protection Directive already requires
disclosure of much of this information. It may seem as if I am contradicting myself. On one hand, I am
advocating for individual privacy over forced surveillance. On the other, I am advocating for
government and corporate transparency over institutional secrecy. The reason I say yes to both lies in
the existing power imbalance between people and institutions. Institutions naturally wield more power
than people. Institutional secrecy increases institutional power, and that power differential grows.
Thats inherently bad for personal liberty. Individual privacy increases individual power, thereby
reducing that power differential. Thats good for liberty. Its exactly the same with transparency and
surveillance. Institutional transparency reduces the power imbalance, and thats good. Institutional
surveillance of individuals increases the power imbalance, and thats bad.
7|Page
Whistleblower Counterplan
8|Page
Whistleblower Counterplan
[___] A New York Times incident proves that the NSA exaggerates the impact of leaks.
Currier, journalist with a focus on national security, foreign affairs, and human rights, 2015
(Cora Currier, HOW THE NSA STARTED INVESTIGATING THE NEW YORK TIMES
WARRANTLESS WIRETAPPING STORY, The Intercept, 6/26/2015,
https://firstlook.org/theintercept/2015/06/26/nsa-started-investigating-new-york-times-originalwarrantless-wiretapping-story/)
Three days after the New York Times revealed that the U.S. government was secretly monitoring the
calls and emails of people inside the United States without court-approved warrants, the National
Security Agency issued a top-secret assessment of the damage done to intelligence efforts by the
story. The conclusion: the information could lead terrorists to try to evade detection. Yet the agency
gave no specific examples of investigations that had been jeopardized. The December 2005
bombshell story, by James Risen and Eric Lichtblau, set off a debate about the George W. Bush
administrations expansion of spying powers after the 9/11 attacks, and also about the Times editors
decision to delay its publication for a year. White House officials had warned the Times that revealing
the program would have grave consequences for national security. The NSAs damage assessment
on the article referred to as a cryptologic insecurity is among the files provided by former NSA
contractor Edward Snowden. The memo recounts meetings in 2004 and 2005 in which administration
officials disclosed certain details of the special program to select individuals from the New York
Times to dissuade them from publishing a story on the program at that time. The memo gives a
general explanation of what terrorists might do in reaction to the information revealed. It was likely
that terrorists would stop using phones in favor of mail or courier, and use encryption and code words.
They could also plant false information, knowing the U.S. government was listening. But the leaked
program had not been noted in adversary communications, according to the memo. It gave no
specific examples of investigations or targets that had or might be impacted by the revelations. To
this day weve never seen any evidence despite all the claims they made to keep us from
publishing that it did any tangible damage to national security. This is further confirmation of that,
Lichtblau told The Intercept. The reality was that the story told Americans what they didnt know
about how the system was being stretched; it didnt tell terrorists anything that they didnt know, that
the U.S. was aggressively trying to gather their communications, he said.
9|Page