You are on page 1of 8

HOOVER WM

The Glenbrooks AC
We affirm

Observation 1: The government exists to protect and maximize the social welfare of the
governed. As such, the resolution should be evaluated based upon the success of the US Governments
attempts to protect its citizens.

Observation 2: States have obligations to protect its citizens, which terrorism threatens. Thus,
counter terrorism is an utmost priority. Jonathan Cooper for the Office for Democratic Institutions and
Human Rights Counter Terrorism, Protecting Human Rights explains, States have an obligation to provide protection
against terrorism. Human rights impose positive obligations on states to ensure the right to life. Acts
of terrorism infringe on all of the rights that are part of a states duty to protect. Thus, in this round,
prevention of terrorism must be weighed over any violation of rights as counter terrorism is a pre
requisite for the security which allows these rights to be realized.
http://www.osce.org/odihr/29103

HOOVER WM

Contention 1: Human Trafficking


100,000 children are being used as prostitutes in the US each year. Emily Stanton for US News in 2013 explains,
the underground sex trade is very much alive in the United States - especially for minors. Human trafficking is a
$9.8 billion dollar domestic industry. Human trafficking is dehumanizing. Rutvi Andrijase for Oxford University
elaborates, Standing commonly for the essence of ones being, the soul impels an understanding of prostitution
not merely as a form of physical violence, but also as a type of violence that shatters ones very personhood and
from which there is ultimately no recovery. NSA surveillance of mobile phones can solve this dehumanizing issue
of human trafficking. Mark Latonero for the University of Souther California in 2012 warrants, mobile phones play
a central role in facilitating potential cases of domestic minor sexual trafficking. Logistical information such as
time, place, pricing, and types of services are communicated through phone calls or text messages on mobile
phones. The field of technology forensics is exploring ways to disrupt human trafficking online by using trace data
to identify perpetrators, mobile technology is already shifting the spaces from which we can collect those traces.

This is clarified MacAskill of the Guardian 2013 http://www.theguardian.com/world/2013/nov/02/nsa-portrait-totalsurveillance

,who writes
There is an account, too, of the NSA's part in disrupting a human trafficking racket based in Fuzhou, China.
It led to two arrests at New York's JFK airport. One of those lifted allegedly carried details of the smuggling
routes in his pocket.

HOOVER WM

Contention 2: Infrastructural Attacks


Cyber-attacks are among the newest growing threats to the United States.

Cyberattacks could gridlock society and kill millions


Pogatchnik, Shawn. 2013 (Reporter for the Associated Press. AP Interview: Ex-FBI Chief on Risk
of Cyber Terror. 7 July. Accessed 16 July 13. http://bigstory.ap.org/article/ap-interview-ex-fbi-chiefrisk-cyber-terror)
Speaking to The Associated Press ahead of the Global Intelligence Forum starting Monday in Ireland,
Freeh said hackers seeking to take control of, or take down, key pieces of U.S. infrastructure could
do more damage than the attackers of 9/11. He said computer systems controlling power plants,
the navigation of aircraft and ships, and even the switching of street lights could be hijacked to
gridlock societies and kill large groups of people.
"People traditionally think of this threat as somebody stealing their identity or their credit card number,
or making it inconvenient to go to the ATM (cash machine). That's a very benign view of the potential
for what cyber terrorism really is," Freeh said.
"You could manipulate transportation systems, aviation guidance systems, highway safety
systems, maritime operations systems. You could shut down an energy system in the northeast U.S.
in the middle of winter. The potential for mass destruction in terms of life and property is really
only limited by (the attackers') access and success in penetrating and hijacking these networks," he
said.
Cyber-terrorism disrupts military readiness.
WILSON
[Clay Wilson, April 1, 2005. Specialist in Technology and National Security Foreign Affairs, Defense, and Trade Division.
Computer Attack and Cyberterrorism: Vulnerabilities and Policy Issues for Congress Navy Department Library
http://www.history.navy.mil/library/online/computerattack.htm PC]

A
cyberattack directed against civilian communications systems could possibly disrupt
communications to some combat units , or could possibly lead to delayed shipment of military supplies , or a
slowdown in the scheduling and deployment of troops before a crisis. Several simulations have been conducted to determine what effects
an attempted cyberattack on the critical infrastructure might have on U.S. defense systems. In 1997, DOD conducted a mock cyberattack to test
the ability of DOD systems to respond to protect the national information infrastructure. That exercise, called
operation "Eligible Receiver 1997," [and] revealed dangerous vulnerabilities in U.S. military information
systems.43 In October 2002, a subsequent mock cyberattack against DOD systems, titled "Eligible Receiver 2003," indicated a need for greater coordination between military and
non-military organizations to deploy a rapid military computer counter-attack.44 DOD also uses Commercial-Off-The-Shelf (COTS)
hardware and software products both in core information technology administrative functions, and also in the combat systems of all services, as for example, in the integrated warfare
During Operation Iraqi Freedom, commercial satellites were used to supplement other military communications channels, which at times lacked sufficient capacity.42

systems for nuclear aircraft carriers.45 DOD favors the use of COTS products in order to take advantage of technological innovation, product flexibility and standardization and resulting cost-

lacking in security

effectiveness. Nevertheless, DOD officials and others have stated that COTS products are
, and that strengthening the security of those products to meet
military requirements may be too difficult and costly for most COTS vendors. To improve security, DOD Information Assurance practices require deploying several layers of additional

two separate occasions in 2004,


viruses reportedly infiltrated two top-secret computer systems at the Army Space and Missile Defense Command. It is not clear how the
protective measures around COTS military systems to make them more difficult for enemy cyberattackers to penetrate.46 However, on

viruses penetrated the military systems, or what the effects were. Also, contrary to security policy requirements, the computers reportedly lacked basic anti virus software protection.47

HOOVER WM
Security experts have noted that for both military and civilian systems.

In fact,

US infrastructure is subject to constant cyber-attacks


CNN, 10 [2/16, Fact Check: Cyberattack threat, CNN News, http://articles.cnn.com/2010-02-16/tech/fact.check.cyber.threat_1_cyberattackinfrastructure-threat?_s=PM:TECH]
Fact Check: Is there consensus on the likelihood of a cyberattack against the United States? -- According to the Center for Strategic and International
Studies (CSIS), "Critical infrastructure owners and operators report that their networks and control systems are under repeated
cyberattack, often from high-level adversaries like foreign nation-states." Sixty percent of U.S. Internet technology and
infrastructure executives questioned in a recent CSIS survey expect to see a "major cyberincident " (an outage of at least 24
hours, a loss of life or a failure of a company).

B) Terrorist networks are becoming capable of launching cyberattacks


Congressional Research Service. 2007 (An office of the Library of Congress. Terrorist Capabilities
for Cyberattack: Overview and Policy Issues. 22 Jan. Accessed 16 July 13.
http://www.gwu.edu/~nsarchiv/NSAEBB/NSAEBB424/docs/Cyber-024.pdf)
A recent study of more than 200,000 multimedia documents on 86 sample websites concluded that In April 2002, the Central Intelligence Agency (CIA)
stated in a letter to the U.S. Senate Select Committee on Intelligence that cyberwarfare attacks against the U.S. critical

infrastructure will become a viable option for terrorists as they become more familiar with the technology
required for the attacks. Also according to the CIA, various groups, including Al Qaeda and Hizballah, are becoming more
adept at using the Internet and computer technologies, and these groups could develop the skills necessary for a cyberattack In February 2005, FBI director Robert Mueller,
testified before the Senate Select Committee on Intelligence that terrorists show a growing understanding of the critical role of
information technology in the U.S. economy
possibly

and have expanded their recruitment to include people studying math, computer science, and engineering

C) The NSAs data mining can stop Cyber Terrorism


Michaels, Jim, Military Writer at USA TODAY and author of "A Chance in Hell," a widely praised book on the Iraq war, June 6, 2013,
NSA data mining can help stop cybercrime, analysts say. USA Today (http://www.usatoday.com/story/news/politics/2013/06/06/nsa-data-miningcyber-crime-data/2397165/) July 22, 2013

The huge volume of telephone records turned over to the U.S. government could help investigators
identify and deter a range of terrorist acts, including cyberattacks, analysts say. "Once you have this big chunk of data
and you have it forever you can do all sorts of analytics with it using other data sources," said Joseph
DeMarco, former head of the cybercrime unit in the U.S. attorney's office in New York Cit y. "A data set like this is the gift that keeps on giving," said DeMarco, a partner at the law
firm DeVore & DeMarco. The government obtained an order from the Foreign Intelligence Surveillance Court ordering a Verizon subsidiary to turn over phone records to the

, the information can be


helpful to investigators looking for patterns, linking people and networks. Also, phone numbers can be attached to computers,
allowing hackers to get into networks through telephone lines. The data can also be viewed against other databases that help
investigators see patterns and links among people and networks. "All the data is critical," said Robert Rodriguez, a
National Security Agency. The records do not include the content of phone calls and the order does not authorize eavesdropping. Still

cybersecurity expert and former Secret Service agent. The government considers many cyberattacks to be acts of terror, DeMarco said. "The definition of terrorism includes
cyberterrorism," he said. The court order also raises questions about the relationship between the government and industry at a time.

HOOVER WM
The nsa is preventing these attacks using a program named Perfect Citizen. Mello Jr of PCWorld
Explains
The Journal reported that the program would install sensors throughout domestic computer
networks, including those of private utilities, that would raise alarms during a cyberattack on them.
The NSA said the program does not involve the monitoring of communications or the placement of sensors on any utility company systems .

The program, it noted, is designed to give the agency a set of technical solutions that help it better
understand the threats to networks that affect national security.

To use digital surveillance against cyber attacks is effective in 2 ways. 1. It maintains the security of our
country so that outside threats cannot attack us. 2. It actually maintains privacy of United States citizens
because it prevents international hackers from having access to our data. These outside threats want
access to our data to essentially just harm us, whereas giving access to the United States government
would actually help us, thus providing a far better outcome.

HOOVER WM

Contention 3: Terrorism
Terrorists are using the internet to expand, the United States needs to monitor them.
Richard A. Posner, 2008, Senior Lecturer in Law, The University of Chicago. Privacy, Surveillance,
and Law, The University of Chicago Law Review, Jstor, http://www.jstor.org/stable/20141907
Privacy is the terrorist's best friend,
the internet, with its anonymity, and the secure encryption of digitized data which
make the internet a powerful tool of conspiracy. The government has a compelling
need to exploit digitization in defense of national security.

and the terrorist's privacy has been enhanced by the same technological developments that have both made data mining feasible and elicited vast quantities of

personal information from innocents:

, when

combined with that anonymity,

But if it is permitted to do so, intelligence officers are going to be scrutinizing a mass of personal

we know that many people do not like even complete strangers poring over the details of their private lives. But the
fewer of these strangers who have access to those details and the more professional their interest in them, the less the affront to the sense of
privacy. One reason people do not much mind having their bodies examined by doctors is that they know that doctors' interest in bodies is
professional rather than prurient; and we can hope that the same is true of intelligence professionals.
information about US citizens. And

B) Digital Surveillance is key to stopping terrorist attacks.


Sorcher, Sara. Staff Editor. June 25, 2013. Insiders: NSA's Communications Surveillance Good Way to
Target Terrorists. http://www.nationaljournal.com/nationalsecurity/insiders-nsa-s-communicationssurveillance-good-way-to-target-terrorists-20130624. Accessed 7/16/2013.
The National Security Agency's surveillance programs are effective tools for seeking out terrorists, according to 85.5 percent of National Journal's National
Security Insiders. "In the digital age, when every individual's digital trail increases year by year, there is no

faster way to draw a picture of a network, or a conspiracy, than by piecing together different data streams," one
Insider said. "This capability, in years to come, won't be a nice-to-have; it'll be critical." Another Insider said the NSA must have the tools
necessary to root out terrorists or another 9/11 becomes not just possible, but certain. "If we eliminate the
online- and phone-surveillance programs and a dirty bomb explodes in an American city, we have only
ourselves to blame," the Insider said. "The days of gentlemen not reading other gentlemen's mail are over."
that

The NSA has successfully thwarted at least 2 known major terrorist attacks. The first was Najibullah
Zazis plan to bomb the New York City Subway. According to the Congressional Research Service in
July 2013, using 702 authorities, the NSA intercepted an email between an extremist in Pakistan and
an individual in the United States. NSA provided this email to the FBI, which identified and began to
surveil Colorado-based Najibulla Zazi. NSA then received Zazis phone number from the FBI, checked
it against phone records procured using 215 authorities, and identified one of Zazis accomplices, an
individual named Adis Medunjanin. Zazi and Medunjanin were both subsequently arrested and
convicted of planning to bomb the New York City subway. The second was Khalid Ouazzanis plot to
bomb the New York Stock Exchange: The Congressional Research Services report continues, the NSA

HOOVER WM
intercepted communication between an extremist in Yemen and an individual in the United States
named Khalid Ouazzani. Ouazzani was later convicted of providing material support to al-Qaeda and
admitted to swearing allegiance to the group. The FBI has claimed that Ouazzani was involved in the
early stages of a plot to bomb the New York Stock Exchange. These benefits should be weighted
heavily in the round because of the harm to human life prevented.

HOOVER WM

The NSA program stops terror plotsrecent examples prove


Michael Chertoff, former Director, Homeland Security, NSA Surveillance Vital to Our Safety,
USA TODAY, 91113, www.usatoday.com/story/opinion/2013/09/11/nsa-privacy-chertoff-911column/2793063/, accessed 10-4-13. For example, according to public reports, recently disclosed NSA
programs led U.S. officials to connect an email about a recipe for explosives with a known terrorist
located in Pakistan. When seeking to find out with whom the terrorist was in contact, intelligence
officials discovered Najibullah Zazi, an Afghan-American residing at the time in Colorado who was
planning to blow up the New York subway system. If this plot had not been discovered, many believe it
would have been the biggest terrorist attack on U.S. soil since 9/11. In January 2009, the NSA used
authorized capabilities to monitor the communications of an extremist overseas with ties to al-Qaeda and
discovered a connection with an individual in Kansas City. This information was provided to the FBI who

through their investigation discovered a plot to attack the New York Stock Exchange. In both cases, the
NSA was able to connect known al-Qaeda associates with individuals plotting an attack here in the
United States. Twelve years after 9/11, we have made tremendous progress in strengthening security to
prevent threats from reaching our shores as well as detecting those who have already infiltrated our
nation. We also face a more dangerous enemy. The al-Qaeda we once knew as a central, integrated
terrorist organization has morphed into a widely dispersed new generation of fighters seeking to launch
attacks from a much wider region of operations. While their ability to repeat large-scale, iconic attacks
largely has been diminished, these operatives are willing to take more risks today and attempt smaller
scale operations that still pose a serious danger to U.S. interests around the world. To be sure, we should
periodically revisit our intelligence authorities to assure that they are not unduly and unnecessarily
intrusive. In fact, several times since 9/11, Congress and the Foreign Intelligence Surveillance Court
have modified the rules of intelligence collection to balance security and privacy interests. There are
ways to adjust the current regime for storing meta data, for example, so as to afford more transparency
and assurance against abuse. But we should not call into question the fundamental contribution that
signals intelligence makes to our safety. Without a global ability to swiftly identify known and unknown
threats heading our way in the future, we will have more unhappy anniversaries like September 11.

You might also like