Professional Documents
Culture Documents
The Glenbrooks AC
We affirm
Observation 1: The government exists to protect and maximize the social welfare of the
governed. As such, the resolution should be evaluated based upon the success of the US Governments
attempts to protect its citizens.
Observation 2: States have obligations to protect its citizens, which terrorism threatens. Thus,
counter terrorism is an utmost priority. Jonathan Cooper for the Office for Democratic Institutions and
Human Rights Counter Terrorism, Protecting Human Rights explains, States have an obligation to provide protection
against terrorism. Human rights impose positive obligations on states to ensure the right to life. Acts
of terrorism infringe on all of the rights that are part of a states duty to protect. Thus, in this round,
prevention of terrorism must be weighed over any violation of rights as counter terrorism is a pre
requisite for the security which allows these rights to be realized.
http://www.osce.org/odihr/29103
HOOVER WM
,who writes
There is an account, too, of the NSA's part in disrupting a human trafficking racket based in Fuzhou, China.
It led to two arrests at New York's JFK airport. One of those lifted allegedly carried details of the smuggling
routes in his pocket.
HOOVER WM
A
cyberattack directed against civilian communications systems could possibly disrupt
communications to some combat units , or could possibly lead to delayed shipment of military supplies , or a
slowdown in the scheduling and deployment of troops before a crisis. Several simulations have been conducted to determine what effects
an attempted cyberattack on the critical infrastructure might have on U.S. defense systems. In 1997, DOD conducted a mock cyberattack to test
the ability of DOD systems to respond to protect the national information infrastructure. That exercise, called
operation "Eligible Receiver 1997," [and] revealed dangerous vulnerabilities in U.S. military information
systems.43 In October 2002, a subsequent mock cyberattack against DOD systems, titled "Eligible Receiver 2003," indicated a need for greater coordination between military and
non-military organizations to deploy a rapid military computer counter-attack.44 DOD also uses Commercial-Off-The-Shelf (COTS)
hardware and software products both in core information technology administrative functions, and also in the combat systems of all services, as for example, in the integrated warfare
During Operation Iraqi Freedom, commercial satellites were used to supplement other military communications channels, which at times lacked sufficient capacity.42
systems for nuclear aircraft carriers.45 DOD favors the use of COTS products in order to take advantage of technological innovation, product flexibility and standardization and resulting cost-
lacking in security
effectiveness. Nevertheless, DOD officials and others have stated that COTS products are
, and that strengthening the security of those products to meet
military requirements may be too difficult and costly for most COTS vendors. To improve security, DOD Information Assurance practices require deploying several layers of additional
viruses penetrated the military systems, or what the effects were. Also, contrary to security policy requirements, the computers reportedly lacked basic anti virus software protection.47
HOOVER WM
Security experts have noted that for both military and civilian systems.
In fact,
infrastructure will become a viable option for terrorists as they become more familiar with the technology
required for the attacks. Also according to the CIA, various groups, including Al Qaeda and Hizballah, are becoming more
adept at using the Internet and computer technologies, and these groups could develop the skills necessary for a cyberattack In February 2005, FBI director Robert Mueller,
testified before the Senate Select Committee on Intelligence that terrorists show a growing understanding of the critical role of
information technology in the U.S. economy
possibly
and have expanded their recruitment to include people studying math, computer science, and engineering
The huge volume of telephone records turned over to the U.S. government could help investigators
identify and deter a range of terrorist acts, including cyberattacks, analysts say. "Once you have this big chunk of data
and you have it forever you can do all sorts of analytics with it using other data sources," said Joseph
DeMarco, former head of the cybercrime unit in the U.S. attorney's office in New York Cit y. "A data set like this is the gift that keeps on giving," said DeMarco, a partner at the law
firm DeVore & DeMarco. The government obtained an order from the Foreign Intelligence Surveillance Court ordering a Verizon subsidiary to turn over phone records to the
cybersecurity expert and former Secret Service agent. The government considers many cyberattacks to be acts of terror, DeMarco said. "The definition of terrorism includes
cyberterrorism," he said. The court order also raises questions about the relationship between the government and industry at a time.
HOOVER WM
The nsa is preventing these attacks using a program named Perfect Citizen. Mello Jr of PCWorld
Explains
The Journal reported that the program would install sensors throughout domestic computer
networks, including those of private utilities, that would raise alarms during a cyberattack on them.
The NSA said the program does not involve the monitoring of communications or the placement of sensors on any utility company systems .
The program, it noted, is designed to give the agency a set of technical solutions that help it better
understand the threats to networks that affect national security.
To use digital surveillance against cyber attacks is effective in 2 ways. 1. It maintains the security of our
country so that outside threats cannot attack us. 2. It actually maintains privacy of United States citizens
because it prevents international hackers from having access to our data. These outside threats want
access to our data to essentially just harm us, whereas giving access to the United States government
would actually help us, thus providing a far better outcome.
HOOVER WM
Contention 3: Terrorism
Terrorists are using the internet to expand, the United States needs to monitor them.
Richard A. Posner, 2008, Senior Lecturer in Law, The University of Chicago. Privacy, Surveillance,
and Law, The University of Chicago Law Review, Jstor, http://www.jstor.org/stable/20141907
Privacy is the terrorist's best friend,
the internet, with its anonymity, and the secure encryption of digitized data which
make the internet a powerful tool of conspiracy. The government has a compelling
need to exploit digitization in defense of national security.
and the terrorist's privacy has been enhanced by the same technological developments that have both made data mining feasible and elicited vast quantities of
, when
But if it is permitted to do so, intelligence officers are going to be scrutinizing a mass of personal
we know that many people do not like even complete strangers poring over the details of their private lives. But the
fewer of these strangers who have access to those details and the more professional their interest in them, the less the affront to the sense of
privacy. One reason people do not much mind having their bodies examined by doctors is that they know that doctors' interest in bodies is
professional rather than prurient; and we can hope that the same is true of intelligence professionals.
information about US citizens. And
faster way to draw a picture of a network, or a conspiracy, than by piecing together different data streams," one
Insider said. "This capability, in years to come, won't be a nice-to-have; it'll be critical." Another Insider said the NSA must have the tools
necessary to root out terrorists or another 9/11 becomes not just possible, but certain. "If we eliminate the
online- and phone-surveillance programs and a dirty bomb explodes in an American city, we have only
ourselves to blame," the Insider said. "The days of gentlemen not reading other gentlemen's mail are over."
that
The NSA has successfully thwarted at least 2 known major terrorist attacks. The first was Najibullah
Zazis plan to bomb the New York City Subway. According to the Congressional Research Service in
July 2013, using 702 authorities, the NSA intercepted an email between an extremist in Pakistan and
an individual in the United States. NSA provided this email to the FBI, which identified and began to
surveil Colorado-based Najibulla Zazi. NSA then received Zazis phone number from the FBI, checked
it against phone records procured using 215 authorities, and identified one of Zazis accomplices, an
individual named Adis Medunjanin. Zazi and Medunjanin were both subsequently arrested and
convicted of planning to bomb the New York City subway. The second was Khalid Ouazzanis plot to
bomb the New York Stock Exchange: The Congressional Research Services report continues, the NSA
HOOVER WM
intercepted communication between an extremist in Yemen and an individual in the United States
named Khalid Ouazzani. Ouazzani was later convicted of providing material support to al-Qaeda and
admitted to swearing allegiance to the group. The FBI has claimed that Ouazzani was involved in the
early stages of a plot to bomb the New York Stock Exchange. These benefits should be weighted
heavily in the round because of the harm to human life prevented.
HOOVER WM
through their investigation discovered a plot to attack the New York Stock Exchange. In both cases, the
NSA was able to connect known al-Qaeda associates with individuals plotting an attack here in the
United States. Twelve years after 9/11, we have made tremendous progress in strengthening security to
prevent threats from reaching our shores as well as detecting those who have already infiltrated our
nation. We also face a more dangerous enemy. The al-Qaeda we once knew as a central, integrated
terrorist organization has morphed into a widely dispersed new generation of fighters seeking to launch
attacks from a much wider region of operations. While their ability to repeat large-scale, iconic attacks
largely has been diminished, these operatives are willing to take more risks today and attempt smaller
scale operations that still pose a serious danger to U.S. interests around the world. To be sure, we should
periodically revisit our intelligence authorities to assure that they are not unduly and unnecessarily
intrusive. In fact, several times since 9/11, Congress and the Foreign Intelligence Surveillance Court
have modified the rules of intelligence collection to balance security and privacy interests. There are
ways to adjust the current regime for storing meta data, for example, so as to afford more transparency
and assurance against abuse. But we should not call into question the fundamental contribution that
signals intelligence makes to our safety. Without a global ability to swiftly identify known and unknown
threats heading our way in the future, we will have more unhappy anniversaries like September 11.