Professional Documents
Culture Documents
For twenty years, the Missouri State Debate Institute has offered an excellent
educational experience in the middle of the high school topic. MSDI is distinct
from other camps in six ways. First, our skills focus assures that a typical 2week debater gets nearly 80 speeches, including over 20 debates. Second,
we emphasize the largest cases on topic, with students getting both aff and
neg rounds on each. Third, our senior faculty are comparable with top lab
leaders in any camp. Fourth, MSDI students can earn highly transferable
college credit in public speaking for a minimal cost. Fifth, we respect variance
in home debate circuits our goal is to improve line by line debating in ways
that will help students no matter who judges in their home circuit. Finally, our
price is below any comparable camp and far below most camps. Our 2016
information will be available shortly at:
http://debate.missouristate.edu/camp.htm.
Missouri State University is a large comprehensive university (enrollment
over 24k), with nearly any major you might want. The university has excellent
academic scholarship support most debaters combine academic
entitlement scholarships (guaranteed based on GPA/test scores) with
debate scholarships. The Spicer Debate Forum competes in two year-long
policy debate formats: NDT and NFA-LD. Weve national semis or finals in
both in the last decade. Our debaters have an average GPA over 3.5, a 97%
graduation rate, and 70% complete law/grad school afterward. Our program
is a high-impact academic experience with an exceptional alumni network.
Please contact Dr. Eric Morris for more information
(EricMorris@MissouriState.edu).
http://debate.missouristate.edu/
http://www.missouristate.edu/FinancialAid/scholarships/
Drones AFF
DRONE 1AC
governments failure to act more quickly in this area has slowed development of and deployment of drone
relevant aspects, and not as to all users.10 Even with these legislative and regulatory acts, however,
Although relatively few drones are currently flown over U.S. soil, the Federal Aviation
Administration (FAA) predicts that 30,000 drones will fill the nations skies in less
than 20 years. Congress has played a large role in this expansion. In February 2012, Congress
enacted the FAA Modernization and Reform Act (P.L. 112-95), which calls for the
FAA to accelerate the integration of unmanned aircraft into the national airspace
system
by 2015 . However, some Members of Congress and the public fear there are
insufficient safeguards in place to ensure that drones are not used to spy on
American citizens and unduly infringe upon their fundamental privacy . These
observers caution that the FAA is primarily charged with ensuring air traffic safety,
and is not adequately prepared to handle the issues of privacy and civil
liberties raised by drone use.
the Chinese
military has a research center devoted to drones, according to Chinese analysts. Much
of this work remains secret, but the large number of drones at recent exhibitions underlines not
only Chinas determination to catch up in that sector by building equivalents to the
first time at the Zhuhai air show five years ago, but now every major manufacturer for
leading U.S. combat and surveillance models, the Predator and the Global Hawk but also its desire to
sell this technology abroad. The United States doesnt export many attack drones, so were taking
advantage of that hole in the market, said Zhang Qiaoliang, a representative of the Chengdu Aircraft
Design and Research Institute, which manufactures many of the most advanced military aircraft for the
Peoples Liberation Army. The main reason is the amazing demand in the market for drones after 9/11.
Although surveillance drones have become widely used around the world, armed drones are more difficult
to acquire. Israel, the second-largest drone manufacturer after the United States, has flown armed models,
but few details are available. India announced this year that it is developing ones that will fire missiles and
Russia has shown models of drones with weapons, but there is little
evidence that they are operational. Pakistan has said it plans to obtain armed
drones from China, which has already sold the nation ones for surveillance. And Iran last summer
unveiled a drone that Iranian President Mahmoud Ahmadinejad called the ambassador of death
but whose effectiveness is still unproven, according to military analysts. The United States is not
yet threatened by any of these developments. No other country can match its
fly at 30,000 feet.
array of aircraft with advanced weapons and sensors, coupled with the necessary satellite and
telecommunications systems to deploy
armed
are looking to buy . Thus far, the United States has refrained from selling
armed drones to states, such as Pakistan, Turkey, Saudi Arabia, and the
United Arab Emirates (UAE), that have requested the technology, though it has made exceptions
missions.56 One hurdle is that the United States is a member of the 1987 Missile Technology Control
Regime (MTCR), an informal and voluntary multilateral arrangement comprising thirty-four states that
attempts to constrain ballistic missile proliferation. Under the MTCR, drones capable of delivering at least a
five-hundred-kilogram payload a minimum of three hundred kilometers are classified as Category I items,
sales by other countries. After the United States, Israel has the most developed and varied drone
capabilities; according to the Stockholm International Peace Research Institute (SIPRI), Israel was
responsible for 41 percent of drones exported between 2001 and 2011. 57 While Israel has used armed
drones in the Palestinian territories and is not a member of the MTCR, it has predominantly sold
surveillance drones that lack hard points and electrical engineering. Israel reportedly sold the Harop, a
short-range attack drone, to France, Germany, Turkey, and India. Furthermore, Israel allows the United
States to veto transfers of weapons with U.S.-origin technology to select states, including China.58Other
states invested in developing and selling surveillance drones have reportedly refrained from selling fully
armed versions. For example, the UAE spent five years building the armed United-40 drone with an
associated Namrod missile, but there have been no reported deliveries.59 A March 2011 analysis by the
marketing research firm Lucintel projected that a fully developed [armed drone] product will take another
decade.60
the Pentagons
rapidly
against assassination has always been less applicable to terrorist groups, the targeting of terrorists is, likely to undermine the norm as a
whole and erode the barriers to the use of assassination in other circumstances. Such an occurrence would represent a deleterious
unintended consequence to an already inhumane international system, justifying greater scrutiny of the drone program. Realism cautions
scholars not to expect ethical behaviour in international politics. Yet,
proliferation and employment in the coming decades. Such norms would not
hinder U.S. freedom of action; rather, they would internationalize alreadynecessary domestic policy reforms and, of course, they would be acceptable only insofar
And even if hostile
states do not accept norms regulating drone use, the existence of an international normative
framework, and U.S. compliance with that framework, would preserve Washingtons
ability to apply diplomatic pressure. Models for developing such a framework would be based
as the limitations placed reciprocally on U.S. drones furthered U.S. objectives.
in existing international laws that emphasize the principles of necessity, proportionality, and distinctionto
which the United States claims to adhere for its drone strikesand should be informed by comparable
Rand Paul
that
Obama
believed that
police to shoot criminals who pose an imminent threat to others; if police can gun down hostage takers and rampaging shooters, why cant they drone them down too? While there is much to be said in favor of
Indeed, a
passed laws prohibiting such spying even though it has not yet taken place. Why cant we just assume that existing privacy laws and constitutional rights are sufficient to prevent abuses? To see why, consider U.S.
v. Jones, a 2012 case in which the Supreme Court held that the police must get a search warrant before attaching a GPS tracking device to a car, because the physical attachment of the device trespassed on
property rights. Justice Samuel Alito argued that this protection was insufficient, because the government could still spy on people from the air. While piloted aircraft are too expensive to use routinely, drones are
not, or will not be. One might argue that if the police can observe and follow you in public without obtaining a search warrant, they should be able to do the same thing with drones. But when the cost of surveillance
reason. Similarly, we may be comfortable with giving the president authority to use military force on his own when he must put soldiers into harms way, knowing that he will not risk lives lightly. Presidents have
peace,
. These three scenarios illustrate the same lesson: that law and technology work in tandem.
When technological barriers limit the risk of government abuse, legal restrictions on governmental action can be looser.
may
lawpeace without the bloodbath of warwe are appealing to the foremost desire of all
peoples everywhere. The tremendous yearning of all peoples for peace can only be answered by the use
of law to replace weapons in resolving international disputes. We in our country sincerely believe that
best hope for preventing the tragic consequences of nuclear-satellitemissile warfare is to persuade the nations of the entire world to submit all disputes to tribunals of
justice for all adjudication under the rule of law. We lawyers of America would like to join lawyers
mankinds
from every nation in the world in fashioning an international code of law so appealing that sentiment will
compel its general acceptance. Mans relation to man is the most neglected field of study, exploration and
development in the world community. It is also the most critical. The most important basic fact of our
generation is that the rapid advance of knowledge in science and technology has forced increased
relationship to man. There exists a worldwide challenge to our profession to develop law to replace
weapons before the dreadful holocaust of nuclear war overtake our people . It is said that an
idea can be more powerful than an atom because strength today resides in mans mindnot his muscle.
We lawyers of the world must take the idea of peace under the rule of law and make it a force superior to
weapons and thus outlaw wars of weapons. Law offers the best hope for order in a disordered world. The
law of force or the force of law will rule the world. In the field of human conduct the law has never
confessed failure. The struggle for a world ruled by law must go on with increased intensity. We must
prove that the genius of man in the field of science and technology has not so far outstripped his
inventiveness in the sphere of human relations as to make catastrophe inevitable. If man
can conquer
do for the people of the world is appalling. A major purpose of Law Day-U.S.A. is therefore to
demonstrate to our people that the need for law in the world community is the greatest gap in the growing
structure of civilization. And we lawyers of America are anxious to work with lawyers and men of good of
all nations in filling this gap in that structure. We believe that no greater challenge exists for any profession
and that
no greater service
to mankind
can be performed.
and the Capitol using large model aircraft packed with high explosives. While the small payload of the
model aircraft may have limited the lethality of the explosions, Ferdaus planned to recruit others to use
assault rifles to target people fleeing the Pentagon after the drone attack.26 In July 2012, Ferdaus pleaded
guilty to attempting to provide material support to terrorists and attempting to damage and destroy
federal buildings by means of an explosive in a plea agreement under which additional charges were
dropped. The incident has raised specific concerns about potential terrorist attacks using unmanned
aircraft, although the payload capacities of small UAVs would limit the damage these attacks could inflict
using only conventional explosives.
remarkable feature within the broader discussion about terrorist capabilities for bioterrorism is that hardly
any of those who believe terrorists currently lack this capacity mention anything about future
developments. If recent trends in terrorism have taught us anything, it is that terrorists are nimble, highly
adaptive actors who can be innovative when necessary. Terrorist capabilities in general display an upward
complex chemicals or identify single nucleotide polymorphisms) can now be found in off-the-shelf
commercial applications.
With nuclear
biological weapons, the killing will probably never end. Radioactive elements last
tens of thousands of years and will keep causing cancers virtually forever. Potentially worse than
that, bio-engineered agents by the hundreds with no known cure could wreck
even greater calamity on the human race than could persistent radiation. AIDS
environment. Like the Holocaust, once a localized chemical extermination is over, it is over.
and
and Ebola viruses are just a small example of recently emerging plagues with no known cure or vaccine.
person knowingly exposes to the public ... is not a subject of Fourth Amendment protection.55 Any
member of the public flying in this airspace who glanced down could have seen everything these officers
observed, the Court remarked.56 Much weight was placed on the fact that the plane was at all times in
contents of the greenhouse from the ground, so they flew a helicopter over the defendants backyard at an
altitude of 400 feet. While overhead, an officer saw marijuana plants through a crack in the greenhouse
Because the helicopter, like the plane in Ciraolo, was in navigable airspace
where any member of the public could have flown the Court did not consider
this a search for which a warrant was required .59 In the final case of the
series, Dow Chemical v. United States, the Court was asked whether a theory of industrial
roof.
curtilage would prevent a government agency from conducting aerial surveillance over a 2,000-acre
commercial plant.60 There, after Dow Chemical Co. refused access to the Environmental Protection Agency
(EPA), the EPA hired a commercial aerial photographer to take photos of the facility using a precision aerial
mapping camera. Having ruled out the argument that the areas surrounding an industrial complex are
rapid advances in drone technologies have also sparked interest from law
enforcement agencies, as it would allow them to bolster their surveillance
capacity. Drones could be introduced for a fraction of the cost of manned vehicles and helicopters,
which are limited in areas they can access. Drones equipped with cameras, communication interception
and listening devices, and by linking images with facial recognition software, could
continuously track individuals in a public space. The Office of Justice Programs (OJP) and
The
the Office of Community Orientated Policing Services (COPS) in the US have provided US$1.2 million to
seven local law enforcement agencies to purchase drones for testing or use241. Drones were considered
particularly suited to law enforcement because this type of aircraft had the capability to manoeuvre
covertly in areas where individual expectations of privacy are not well defined, such as in the immediate
vicinity of residences. The American Civil Liberties Union (ACLU) has expressed concerns that
development of a tiny drone called the "nano hummingbird" whose purpose is for stealth surveillance;
flying through open windows and doorways. It can fly up to 11 miles per hour and can hover for up to eight
minutes. With a wingspan of just six and a half inches and weighing 19g (less than a single AA battery),
the hummingbird includes a video camera and communications links 243. The ability for pervasive
surveillance using drone technology will not be limited to Governments, or organisations in the future.
note. This past term, in United States v. Jones,[9] Justice Samuel Alito wrote a concurrence (speaking for
citylinked to a facial recognition program, for instancemight exist. As mentioned, this legal doctrine
the
routine and systematic use of drones for widespread surveillance and
analysis is likely to be suspect on constitutional grounds. These precedents clearly suggest a
sweet spot for lawful domestic drone activity. Camera-equipped drones used for routine
purposes, such as observing public activity, will likely pass constitutional
muster. Legal limits on such use, if any, will come from policy development or
statutory enactments.
has yet to be adopted by the Supreme Court, but it, too, sounds a cautionary note: Certainly,
The use of
drones and their superficial success in dealing with terror suspects on foreign shores has jump started
this seduction, which unfortunately is unfolding into a future state of affairs that would
shrink individual privacy to a nonexistent dystopian reality. Despite
technologys broader intrusion into our lives, privacy is still recognized as a
societal progressionsuperior technological advancement and debilitating addiction of fear.
of drones for law enforcement is simply following the contour of least resistance by developing societal
conditions that are conducive to lowering individuals subjective evaluation of privacy. Will the drone
culture destroy individual privacy for the post-modern individual? Is domestic surveillance a
constitutionally sanctified governmental intrusion? The facial inconsistency of this new paradigm calls for a
reevaluation of both the constitutional framework and ethical dialectic of this drone-induced privacy
intrusion.17
Amendment issues. In fact, as the late Justice Brennan once argued, Americans should look to the states
as a beacon of protection in a new federalism.138 According to an ACLU review of state constitutions
and jurisprudence, a significant number of states have departed from the Supreme Court in areas where
the states consider federal jurisprudence to be problematic.139 Some states have shifted away from the
third party doctrine test simply because they feel their state constitutions lack the language to sustain it,
while other states whose constitutions practically mirror the federal constitution have similarly paved a
different path.140
The very source of life on Earth, the global ecosystem, appears increasingly
endangered. Most of these new and unconventional threats to security are
associated with or aggravated by the weakness or absence of democracy , with
its provisions for legality, accountability, popular sovereignty, and openness. LESSONS OF THE TWENTIETH
do not sponsor terrorism against one another. They do not build weapons of
mass destruction to use on or to threaten one another . Democratic countries
form more reliable, open, and enduring trading partnerships . In the long run they
offer better and more stable climates for investment. They are more environmentally responsible because
they must answer to their own citizens, who organize to protest the destruction of their environments.
They are better bets to honor international treaties since they value legal obligations and because their
within their
own borders, they respect competition, civil liberties, property rights, and the
rule of law, democracies are the only reliable foundation on which a new
world order of international security and prosperity can be built .
openness makes it much more difficult to breach agreements in secret. Precisely because,
in conjunction with other executive agencies, that will identify any potential threats to privacy protections
purposes.192 The inclusion of these extra requirements for police is potentially significant, beyond the
public notice provided by these reporting requirements. The bill explicitly interjects the authority of the
Secretary of Transportation into the privacy considerations of drone operation.193 This potentially subjects
law enforcement agencies to an extra layer of review and an extra forum to which people can bring their
grievances. The bill also prohibits generalized surveillance , with exceptions made for
exigent circumstances.194 Even in those exigent circumstances, however, documentation justifying the
exception shall be submitted to the Secretary of Transportation, (6) the specific steps that will be taken to
mitigate any possible impact identified under paragraph (5), including steps to protect against
unauthorized disclosure of any information or data described in paragraph (4), such as the use of
encryption methods and other security features that will be used; (7) a telephone number or electronic
mail address that an individual with complaints about the operation of the unmanned aircraft system may
use to report such complaints and to request confirmation that personally identifiable data relating to such
individual has been collected; (8) in the case that personally identifiable data relating to such individual
has been collected, a reasonable process for such individual to request to obtain such data in a timely and
an intelligible manner; (9) in the case that a request described in paragraph (8) is denied, a process by
which such individual may obtain the reasons for the denial and challenge the denial; and (10) in the case
that personally identifiable data relating to such individual has been collected, a process by which such
individual may challenge the accuracy of such data and, if the challenge is successful, have such data
must impose these kinds of procedural impediments, the added benefit of which is to inform the public
different and deserve special safeguards because of their unique capabilities.199 In order to stay ahead of
the technologys problems, substantial safeguards should be in place before drones widespread use.
the Drone
Aircraft Privacy and Transparency Act of 2013, which would amend the FAA
Modernization and Reform Act of 2012, requiring a study of privacy concerns,
a data collection statement for each drone operation, including a data
minimization statement, and enforcement mechanisms including license
revocation for violators of these requirements.
file a detailed data collection statements about their drone surveillance. [32] Then there's
case-by-case agency evaluation of the operators request to use drones .53 The
FAA also has different approval standards for drones based on size and
capability.54 Many smaller drones, and drones operated recreationally as model airplanes, are currently permitted
by regulation to operate at altitudes much lower than the minimum acceptable altitudes for helicopters and fixed-wing
reauthorization of the FAA carried with it a requirement that the Agency promulgate regulations and develop a
comprehensive plan for the integration of drones into the national airspace system.60 As a result, by some estimates
there could be 30,000 or more drones operating in U.S. skies in the next few decades.61 The increasing law enforcement
preference for warrantless spying techniquesfor example, the Justice Departments warrantless surveillance has
increased 600% in the past decade62may help explain why a third of the public fears that the use of drones by police
will threaten their privacy interests.63
of surveillance, their underlying rationalities are more nuanced and problematic. As complex technological
systems, drones are both predicated upon and productive of an actuarial form of surveillance. They are
employed to amass data about risk probabilities and then manage populations or eliminate network nodes
considered to exceed acceptable risk thresholds. In part, drones are forms of surveillance in keeping with
the precepts of categorical suspicion and social sorting that define other contemporary surveillance
Drones may
perform predominately in the discursive register of automated precision and
positive identification of known threats, but in practice, these surveillance
systems and their agents actively interpret ambiguous information that
continuously defies exact matches or clear responses. In the process, UAV
systems may force homogenization upon difference, thereby reducing variation
to functional categories that correspond to the needs and biases of the
operators, not the targets, of surveillance. All surveillance and dataveillance systems
are prone to errors that have harsh ramifications for the subjects whose
flawed data doubles haunt them (Haggerty and Ericson, 2006). Drone-based surveillance
systems (Gandy, 1993; Murakami Wood et al., 2006; Lyon, 2007; Monahan, 2010).
UAS from every service join the battle, it will become increasingly difficult to manage and coordinate air
combat operations, because each UAS comes with its own unique software and mission-control stations.85
Finally, as UAS capabilities increase, the services will seek to expand the roles and missions UAS are
expected to perform. UAS have traditionally been used for ISR, but the weaponization of the Predator and
the development of the Joint Unmanned Combat Aerial Vehicle clearly demonstrate that the role of the UAS
is expanding. In fact, in 2004 the Joint Staff had each Combatant Commander rank the importance of 18
different types of missions for future UAS, to include electronic warfare, combat search and rescue, and
strike.86 While there is no doubt that the services will expect more from future UAS, the challenge will be
ensuring the services do not acquire redundant capabilities or attempt to perform missions that are not
included in their core competencies. For example, brigade commanders with a robust UAS capability
should not seek to use the stroke capability inherent in the systems to perform missions that have
traditionally belonged to manned aircraft.
***INHERENCY***
was in large part a response to pressure placed on the legislature by the burgeoning UAS industry,9 as the
The
combination of the forthcoming streamlined procedures for UAS licensure and
the opportunity for big profits almost guarantee that the use of UASs by
domestic police forces is here to stay. Increased police use of UASs is not, in itself, a bad thing.
value of the potential UAS market has been estimated in the hundreds of millions of dollars.10
These machines offer the opportunity for police officers to more safely conduct surveillance11 and
apprehend criminals.12 Drones can also be used for noncriminal functions, such as searching for missing
persons and responding to automobile accidents or chemical spills.13 They are also less expensive to
purchase and operate than traditional helicopters. The Montgomery County Police Department outside of
Houston, Texas estimates that its UAS costs $30 per hour to operate as compared to the $500 per hour
minimum for operating a helicopter.14 Improved public safety at a lower cost is better for everyone.
voluntary standards for hobbyists use of remote-controlled model aircraft. This terse, one-page document
recommended a maximum altitude of four hundred feet and encouraged amateur pilots to fly their aircraft
at a reasonably safe distance from populated areas.55 At the time, no other policies or laws touched on
domestic UAS flight, in no small part because, apart from enthusiasts remote-controlled planes and
experimental projects conducted by the military unmanned aircraft did not make consistent use of the
skies. Nevertheless, by issuing some standards, the FAA raised the question of whether, and how,
unmanned machines eventually might do just that. The answer has a lot to do with technology. The next
twenty years would witness a spike in UAS research, design, and manufacturing, even as UAS remained
mostly a military concern. 56 But the more the military harvested the technology, the more evident its
civilian applications became. That, in turn, created pressure to relax some of the restrictions on domestic
UAS flight. The progression evidently was on Congresss mind in 2003, when it passed the Vision 100 The
Century of Aviation Reauthorization Act. In broad strokes, this statute sketched out an ambitious
transformation of the aerospace industry and of the regulation of domestic air traffic. Essential to this was
the creation of the Next Generation Air Transportation System or NextGen a modernized, satellitebased aviation management scheme that, Congress hoped, would address the exponentially increasing
volume of aviation in the United States.57 As legislators imagined things, NextGen essentially would
accommodate a wide range of aircraft operations, including airlines, air taxis, helicopters, general
aviation, and unmanned aerial vehicles.58 A special entity within the FAA, the Joint Planning and
Development Office, was established in order to realize that objective, along with the others Congress had
set forth in Vision 100. 59 Of course none of this meant changing federal law immediately, so as to permit
toodistant future, more and more aircraft would not have a human pilot inside.
evacuations during natural disasters, helping with search and rescue operations, and assisting with other
tactical police incidents (Dean, 2007). The Executive Assistant Police Chief admitted that UAVs over the
skies of Houston could include covert police actions and that the police force was not ruling out someday
using the drones for writing traffic tickets (Dean, 2007). In another example, a confidential document
the Las Vegas Police Department may have been using UAVs above
the city of Las Vegas as early as 2007 (Public Intelligence, 2010). The document
further outlines a plan for UAVs to help monitor special events and discusses
ways in which the Las Vegas UAVs are integrated into Department of
Homeland Security (DHS) fusion centers to assist with the investigation of suspicious
activity reports (Public Intelligence, 2010). As noted in other work on the militarization of cities, the
application of drone technologies to urban areas promises to extend the
surveillance networks within which people are caught (Murakami Wood, 2007) and
revealed that
intensify the policing of cultural difference and political dissent that have historically marked cities as
vibrant, democratic spaces (Graham, 2010).
include the U.S. Air Force, numerous local police and sheriffs departments, the California Department of
Forestry and Fire Protection, universities and community colleges, the Department of Agriculture, National
Aeronautics and Space Administration (NASA), Raytheon Company, and Blackwater Airships LLC.32 From
that sample of interested parties alone, drone technologys economic and lifesaving usefulness appears
limited only by the imagination. Wirelessly controlled airplanes marketed as spy drones dotted the
shelves during the 2012 holiday shopping season at major U.S. retailers.33 The number of anticipated uses
for commercial and private drones seems to be matched in quantity only by the number of news articles
fearing their misuse.34 Pleas for caution and safeguards are understandable, given the types of presently
available drones and the knowledge that technology tends to shrink size and expand capabilities over
time.
No guidelines
FBI is using drones for surveillance purposes now no
guidelines in place.
Kevin Johnson, June 20, 2013, Mueller tells lawmakers FBI has used
drones in U.S., USA Today, Ebsco Host
FBI Director Robert Mueller acknowledged Wednesday that the agency has deployed
drones to conduct surveillance in the U.S., and that the bureau is developing
guidelines for their future law enforcement use. Mueller told the Senate Judiciary
Committee that the unmanned aerial vehicles, whose use by law enforcement has raised questions from
privacy advocates and civil liberties groups, are deployed in "a very minimal way and very seldom."
Responding to questions posed by lawmakers, including Sen. Dianne Feinstein, D-Calif., Mueller said he
would provide more details about how information and images collected during surveillance operations are
used and stored. He said drone use was "narrowly focused on particular cases and particular needs." Iowa
Sen. Chuck Grassley, the panel's ranking Republican, said that Attorney General Eric Holder in previous
testimony had said the Drug Enforcement Administration and Bureau of Alcohol, Tobacco, Firearms and
Explosives had "purchased drones and were exploring their use." "Absent from (Holder's) response was an
should have the standards in advance." Sen. Mark Udall, D-Utah, also expressed concern that the FBI was
only in the initial stages of "developing privacy guidelines that protect civil liberties." Drones "have the
potential to more efficiently and effectively perform law enforcement duties," he said, "but the American
people expect the FBI and other government agencies to first and foremost protect their constitutional
rights." In a separate written statement following the director's testimony, the FBI said drone use is limited
to learning "critical information that otherwise would be difficult to obtain without introducing serious risk
to law enforcement personnel."
simply because a drone cannot satisfy every jot and tittle of federal aviation
law does not mean it can never be operated safely. The FAA long has
recognized this, by authorizing domestic UAS operations on a case-by-case
basis. The agencys approach has been to consider individual requests to exempt UAS from otherwise
to fly a UAS must apply for a Special Airworthiness Certificate in the experimental category (SAC).
The COA and SAC procedures differ. In theory, for example, a COA may issue for any public purpose. By
contrast, an SAC authorizes private drone flights only for research and development, market survey and
crew training objectives. (Again, Civil UAS cannot fly on a for-hire basis.) And because governments drive
most of todays drones, the COA process naturally has done the bulk of the exemption work. Early this
year, the FAA claimed that, since 2006, it had approved between 700 and 750 COAs65, as opposed to only
94 SACs though the FAA last tallied SAC numbers in July of 2011.66 Still, regardless of whether the
applicant seeks a COA or an SAC, the point of the exercise is the same. Either way, the FAA examines the
proposed UAS project, and asks if, despite the failure to meet this or that safety standard, the applicant
nevertheless can mitigate the risks of non-compliance. If the answer is yes, then a COA or SAC will issue
and the UAS can fly, subject to the conditions imposed by the FAA in granting the exemption. The agency
might, for example, insist on flight within the operators visual line of sight, or with a manned aircraft
tailing along. Such has been the FAAs method since at least 2003, when it permitted the Department of
Defense to operate, on a nation-wide basis, Northrop Grummans Global Hawk Aerial Reconnaissance
System. The criteria underlying that authorization were spelled out two years later, in what appeared to be
Among other
things, the agency said it would require UAS pilots to understand the aviation
rules relevant to the airspace where their robots planned to fly ; the UAS also would
the first official FAA policy regarding the temporary licensure of domestic drones.67
have to possess a lost-link capability, so as to permit the aircrafts safe recovery in the event of a break
in communications between operator and aircraft.68 Such guidance accompanied an increase in drone
approvals. In 2005, for example, the FAA blessed a bid by General Atomics to fly, on an experimental basis,
its Altair UAS.
***NUTS/BOLTS***
and Iraq, DOD fielded UAVs such as Predator and Global Hawk before their development programs were
complete. Thus, the UAV accident rate might be lower if these systems had been allowed to mature under
the full development program.
systems may reduce the likelihood of a crash. Additional procedures that can be incorporated into safety
regulations for unmanned aircraft systems may further mitigate flight risks. These procedures may include
formal risk assessments for systems certification and mission planning; development of ground impact
models and mitigation plans to reduce risks to persons and property on the ground;23 and structured
training and certification requirements for unmanned aircraft pilots, systems operators, and other safety
critical personnel.
25, 2006, a Predator B (MQ-9) drone crashed in a remote area along the U.S.-Mexico border near Nogales,
AZ following a loss of engine power. The National Transportation Safety Board (NTSB) determined that the
probable cause of the mishap was the drone pilots failure to follow appropriate procedures when switching
to an alternate control console in the ground control station following a computer malfunction.24 The error
resulted in the pilot inadvertently cutting off the vehicles fuel supply. CBP had only been operating the
Predator B aircraft since September 2005, eight months prior to the mishap. NTSB concluded that during
this time CBP was providing a minimal amount of operational oversight of its UAS program and cited its
inadequate surveillance of the program as a contributing factor in the crash.
is quite
easy to envision a future in which (UAVs ), unaffected by pilot fatigue, provide
247 border and port surveillance to protect against terrorist intrusion
Other examples [of possible uses] are limited only by our imagination
for monitoring, the US Southern Command recently conducted a drone testing project that mobilized an
Israeli-made $6.5 million Heron drone from El Salvadors Comalapa Air Base to track down suspected drug
cartel members who were allegedly using the open waters to smuggle drugs into the USA (Padgett, 2009;
see also Shachtman, 2009). By remaining thousands of feet in the air for up to 20-hours while being
equipped with a set of sensors better suited for spotting the subs [mini-submarines] that have become so
popular among narco-cartels (Shachtman, 2009), this particular Heron drone promises to be a longer
endurance technology than conventional planes commonly used in drug surveillance.
The key component of Operation Safeguard was to identify potential threats crossing the southern border
by poor weather conditions. Cloudy conditions and high humidity climates can distort the imagery
produced by E-O and FLIR equipment. Although the Predator B is operating in the low-humidity
environment of the Southwest, the effects of extreme climatic or atmospheric conditions on its sensors
reportedly can be mitigated if DHS decides to outfit the Predator B with a synthetic aperture radar (SAR)
system.19 Radars can produce high-resolution imagery in inclement weather. The ability of SAR to function
during adverse weather conditions sets it apart from optical or infrared systems.20 However,
its ability
to track moving targets is limited. This limitation can be mitigated by accompanying SAR with
moving target indicator (MTI) radar technology. Adding SAR and MTI to the Predator Bs platform could
significantly enhance its operational capability for border missions. By adding SAR and MTI to the UAV
platform, however, the costs of using UAVs on the border would increase.
are a
number of other technologies that are capable of providing a greater level of
usefulness at a far lower cost.25 The DHS Inspector General noted that UAVs were less
effective, in their limited tests, than manned aircraft in supporting the
apprehension of unauthorized aliens.26 In addition, the UAVs were used to assist in the
apprehensions of aliens who had already been detected by other means. However, the ability of UAVs to
maintain position for over 20 hours represents a significant advantage over manned aircraft; in the future,
they may be used to actually detect unauthorized entries as opposed to merely supporting apprehensions
of aliens already detected. An issue for Congress could entail whether UAVs are an effective tool for
securing the border.
At present, radio-controlled
model aircraft operate under a voluntary standard that generally permits
flights only below 400 feet above the surface . These guidelines specify that model aircraft
for more than 2,400 model airplane clubs across the United States.
be flown away from populated areas and not in close proximity to full-scale aircraft. They further request
coordination with air traffic facilities when planning operations within 3 miles of an airport and suggest that
model aircraft be adequately flight tested before being operated in front of spectators.5 While most radiocontrolled model aircraft are powered by small propeller engines and weigh only a few pounds, some are
No airspace
Public agencies utilizing unmanned aircraft have the
disadvantage of not designating airspace for their
operation.
Bart Elias, September 10, 2012, Bart Elias is a specialist in aviation policy
and a researcher for the Congressional Research Service, Pilotless Drones:
Background and Considerations for Congress Regarding Unmanned Aircraft
Operations in the National Airspace System, Congressional Research
Service, pp. 1-21, http://biotech.law.lsu.edu/crs/R42718.pdf, p. 15
One significant difference between military unmanned aircraft and unmanned
aircraft operated by other public agencies or by civilian users is that the military,
for many years, has negotiated with FAA to set aside airspace designated for
military training, testing, and other purposes . Military airspace consists of military
operations areas, military training routes, test ranges, and other restricted or prohibited airspace.
Military operations areas and training routes are typically located in remote
areas. While not set aside exclusively for military use, these areas and routes are charted and
documented, allowing other airspace users, especially smaller general aviation aircraft, to be
alert for military flight operations, including operations involving unmanned aircraft.
The military has also worked with FAA to set aside specific restricted and prohibited airspace (e.g., above
test sites and bombing ranges) to accommodate operations that pose greater risks to other air traffic. This
airspace is charted and documented to allow pilots to avoid these areas when restrictions designating
them as off limits to non-military users are in effect. Airspace restrictions can serve as an effective tool for
mitigating risks to civilian air traffic. However, their use concerns some airspace users because they pose
inconveniences and sometimes raise additional safety issues. With additional restrictions, civilian pilots
may be forced to fly more circuitous routes, leaving pilots with fewer options to avoid bad weather or plan
for fuel stops. The Aircraft Owners and Pilots Association (AOPA), which represents more than 400,000
general aviation pilots and aviation enthusiasts across the United States, has been particularly critical of
the use of restricted airspace designations to separate unmanned aircraft operations from other air traffic.
AOPA has asserted that unmanned aircraft operations should not have a negative impact on general
aviation operations and should not require special airspace designations, such as restricted airspace, for
their operation.34 It, however, generally supports the integration of unmanned aircraft so long as they do
no harm to current manned operations.35
Kyllo decision
Kyllo helped establish a firm bright line for when to use or
not use drone technology in the United States.
Philip J. Hiltner, 2013, Phil Hiltner is currently a lawyer in the Washtenaw
County Office of Public Defenders Office and also works for the Law Offices of
Jonathan Dills, North Carolina Thirteenth Prosecutorial District, THE DRONES
ARE COMING: USE OF UNMANNED AERIAL VEHICLES FOR POLICE
SURVEILLANCE AND ITS FOURTH AMENDMENT IMPLICATIONS, Wake Forest
Journal of Law and Policy vol. 3, no. 2, pp. 397-415,
http://lawpolicyjournal.law.wfu.edu/files/2013/06/Vol.3-2-Comment-Hiltner.pdf,
p. 410-411
It has already been shown that UASs may be equipped with a variety of tools
to increase their surveillance capabilities. What information we have about the
Fourth Amendment implications of observations that cannot be made by the naked eye
comes primarily from the Supreme Court case of Kyllo v. United States. 99 In
Kyllo, Department of the Interior agents suspected that the defendant was
growing marijuana in his home, which requires the use of high-powered
halide lamps.100 In order to detect the amount of heat emanating from the
home, two agents used a thermal imager to scan the home from across the street.101 The
thermal imager used by the agents detects infrared radiation coming off of objects, and converts the
radiation into an image on a small screen in black-and-white.102 Cooler objects appear as darker shades
of gray, while hotter images are whiter.103 The agents could see that the defendants house was emitting
an unusual amount of heat compared to his neighbors and were able to acquire a search warrant based on
this information.104
into the home.105 The Court opened its reasoning saying, It would be foolish to contend that the
degree of privacy secured to citizens by the Fourth Amendment has been entirely unaffected by the
advance of technology.106 Justice Scalia reasoned that the information the officers obtained through the
thermal imager was information that could not otherwise be obtained without intrusion into a
is the ability for the police to easily follow individuals undetected for extended periods of time. In these
cases, the police are not using technology to do what would be impossible to the naked eyelike detect
the amount of heat radiating from a homebut they are using it to do what otherwise might be impractical
namely, constantly track an objects whereabouts over a several-day period. The Supreme Courts
decisions in United States v. Knotts109 and United States v. Karo110 are particularly helpful in this
area.111 In Knotts, Minnesota police tracked the movements of a suspected drug manufacturer for three
days by placing a radio transmitter (or beeper) in a drum of chloroform that was purchased by the
defendant. 112 The police were able to use the information they gained from tracking the defendant to
secure a search warrant, which lead to the discovery of a methamphetamine laboratory.113 The Court held
that the information gained from tracking the defendant on public roads was not protected.114
Kyllo majority rejected the contention that a passive collection of extra-sensory information emanating
from the exterior of a home (without revealing intimate details of the interior) was reasonable.137 Instead,
the Court determined that obtaining by sense-enhancing technology any information regarding the
interior of the home that could not otherwise have been obtained without physical, in-person inspection of
a residence constitutes a searchat least where (as here) the technology in question is not in general
public use.138 This statement effectively means that a naked-eye observation from a public vantage
point is likely not a search, while technology that improves observation beyond what an un-aided person
can sense must be questioned further. The majoritys test in Kyllo tracks closely with Katz. Police are not
required to avert their eyes from criminal activity.139 There will always be close cases involving rapidly
Kyllos
standard applies: (1) when there is an enhancement technology, (2) when the
interior contents of a house could be ascertained through no other means,
and (3) when a technology is not so prevalent as to defeat a reasonable
individuals expectation of privacy .141 An interesting question arises when one
considers whether a drone is inherently a sense-enhancing technology
emerging technologies. But the majoritys test may not actually demand eye aversion.140
(regardless of the onboard cameras or equipment). Arguably, a drone augments the users ability to collect
sensory information by extending the operators visual and auditory capacities to previously impossible
vantage points. But it is unlikely a court would adopt this reasoning because without any additional
equipment (such as telescopic camera lenses, thermal imaging devices, etc.), drones provide no
independent sensory enhancement. It remains to be seen whether courts will distinguish between images
captured by navigational cameras onboard drones and those directed intentionally downward on their
understandably, to helicopter and fixed-wing aircraft which are discussed in Part IV.AC of this Note.142
Like those aircraft, they are more accurately a platform technology that carries sensory technology on
board.143 Therefore, the equipment carried by the drone should determine whether Kyllo applies.144
Interestingly, the Kyllo test leaves open the possibility that the permissibility
of using a particular technology can change over time. Widespread drone
usage may have precisely that effect on the social conceptions of the
reasonable expectation of privacy.145 Drones may someday share the same familiarity that
the public apparently had with the small planes in Ciraolo and Dow Chemical.146 If so, the existing aerial
observation cases would offer little constitutional protection because many drones would have the
capability to remain at a legal altitude, yet also make observations far beyond the abilities of a manned
helicopter or plane considered by Riley.
Navy - FYI
Navy has their own fleet of drone aircraft.
Valerie Insinna, May 2014, Navy Surveillance Drone Undergoes First
Round of Flight Tests, National Defense vol. 98, issue 726, Ebsco Host, p. 13
The Navy is one step closer to having its own fleet of unmanned aircraft capable of conducting longendurance surveillance missions at high altitudes. The MQ-4C Triton completed its initial test flight phase in
March. The system performed exceptionally well during flight test, Capt. Jim Hoke, the services Triton
2013 report by the Government Accountability Office. Initial operating capability is scheduled for 2017.
DOD - FYI
Domestic military flights utilizing drones can only
currently operate freely within restricted areas
exceptions require intense scrutiny and issuance of a
COA.
Hector L. Cruz, 2010, Hector Cruz is a Lieutenant Colonel with the United
States Air Force Reserve, Role of DOD Unmanned Aerial Vehicles for
Homeland Security, U.S. Army War College Strategy Research Project, pp. 132, p. 16
Access to National Airspace System. According to a Defense Science Board study, DoD
has an
urgent need to allow UAVs unencumbered access to the National Airspace
System (NAS) outside of restricted areas here in the US and around the
world.74 Currently UAV operations inside restricted and warning areas in the United States are
conducted at the discretion of the Air Force. Operations outside these areas and within
the NAS require a Federal Aviation Administration (FAA) Certificate of
Authorization (COA), as well as a Letter of Authorization negotiated with the
appropriate FAA region.75 This process can take up to 60 days and COAs remain valid for no
longer than a year.76 Exceptions to this are the National COA issued to the Air Force for Global Hawk
operations and the Disaster Relief COA issued to Northern Commands (NORTHCOM) Joint Force Air
Component Commander for the Predator and Global Hawk UAVs along the southern and northern
borders.77 Policy and procedures to allow UAVs routine access to the NAS is currently in development.
response mission, exceptions can be made fairly quickly. UAV operations in airspace not requiring aircraft
to participate with air traffic control (below 18,000 feet in the U.S.) will normally require the UAV to be
followed by a chase aircraft and/or primary radar coverage until it reaches restricted or military airspace,
which adds significant cost.79 Furthermore, UAVs must avoid flight over populated areas and must remain
clear of commercial air traffic corridors.80
board the aircraft, on-board equipment, radar, or direct human observation must substitute for this
efforts by sponsoring research on detect, sense and avoid (DSA).87 Current situational awareness/collision
avoidance technologies such as Traffic Collision Avoidance System (TCAS) and 18 Automatic Dependent
Surveillance-B provide a level of DSA but only against cooperating traffic equipped with appropriate
transponders. Additional DSA technologies will be required to detect general aviation aircraft not equipped
with transponders. Systems providing protection from both may be required in each UAV to satisfy the
FAA.88
service
BAMS is
being designed to provide intelligence on surface shipping targets; together
with the 737-based P-8 being built by Boeing, the new aircraft will replace the Navy's
company will retain ownership of it, says Steve Enewold, Northrop's BAMS vice president.
aging P-3 fleet. The BAMS UAS is being built on the Air Force Global Hawk Block 40 platform, including
thickened skins and spars on the wing to allow the UAS to transit turbulent air over the littorals, Enewold
says. While the Air Force system carries the Northrop Grumman/Raytheon Multi-Platform Radar Technology
Insertion Program (MP-RTIP) side-looking active, electronically scanned array (AESA) radar, BAMS will
employ the Multi-Function Active Sensor (MFAS). It is a 360-deg. mechanically steered AESA based on a
special project funded through the Office of Naval Research. BAMS will also use an Automatic Identification
System (AIS) shipping tracking capability and a nose mounted air-to-air AESA to provide a situational
awareness capability. "It is the first step in providing a due-regard capability in hopes of getting to an
autonomous sense-and-avoid," system, Clarke says. "Once we can get [due regard] solved for the big
platforms, then let's work on making the solution smaller" for other UAS. BAMS will also carry the Raytheon
MTS-B electro-optical/infrared sensor, full-motion video system carried by the Predator fleet, as well as an
electronic support measures (ESM) system for radio-frequency monitoring. All of these elements are
wrapped into the Northrop Grumman BAMS contract managed by a single office at Naval Air Systems
Command. This management approach resulted from difficult lessons learned by the Air Force on the
Global Hawk. In that program, the Air Force Aeronautical Systems Center in Ohio oversees the airframe
some in Congress. UCAs are used to allow a contractor to start work without defining the contract price,
which is usually set at a later time; the upshot is that if these pile up, accounting for a program can be
problematic. "We are learning from everyone else's challenges," Clarke says. "If we see a problem that
they are having we are going to go triple check and try and avoid that same problem." She adds that the
Navy has taken measures to allow for the time needed to get and approve proposals from Northrop (Air
Force officials claimed the company took too long to build proposals). The Office of the Secretary of
Defense is also conducting preliminary meetings to assess whether Global Hawk is at risk for a second
breach of the Nunn-McCurdy statute, which mandates a review of over-budget programs. Much of the
cost growth, however, includes items such as depot work and spares never
included in the original Air Force program budget. David Van Buren, the Air Force's top
procurement official, has upbraided Northrop for cost and contracting problems. "We've
had a very good experience with Northrop," Clarke says, unlike Van Buren. "It [the program] is managed
out of [an office in Bethpage, N.Y.], which has a strong systems engineering background." To avoid
surprises, Navy officials obtained an independent assessment from experts at the MIT Lincoln Laboratory
on Northrop's modeling for the MFAS sensor, and Clarke says the models from both are "very close." Also,
the Navy decided upfront to use a leased Gulfstream G-II as a surrogate aircraft for early MFAS flighttesting, in advance of an available UAS. During the Global Hawk development the Air Force added
Northrop's high-flying Proteus as a surrogate asset to work out software problems with the MP-RTIP.
***SOLVENCY***
DAPTA solves
Congressional action to curtail drone privacy would allay
many public concerns about UAV adoption.
J. Tyler Black, 2013, J. Tyler Black is an associate in the firm Thompson
Coburn LLPs transportation regulatory practice, Over Your Head, Under the
Radar: An Examination of Changing Legislation, Aging Case Law, and Possible
Solutions to the Domestic Police Drone Puzzle, Washington and Lee Law
Review vol. 70, pp. 1830-1883,
http://scholarlycommons.law.wlu.edu/cgi/viewcontent.cgi?
article=4347&context=wlulr, p. 1865-1867
there are certain general principles that Congress should consider
adopting. Legal author Troy Roberts has assembled a list of recommendations for legislative fixes that
would plug many privacy holes.173 His proposed solutions include some of the following: 1. Write plain
language statutes requiring warrants for [Unmanned Aerial Vehicle (UAV)] searches. 2.
Focus efforts on nonvisual navigation and safety of flight tech nology. 3.
Require any UAVs to power down sensory enhancing technology when
transitioning to the target of the warrant or other mission. 4. Require logs of sensory
enhancing technology use on all UAVs. 5. Create exceptions for immediate
warrantless observation requirements, such as criminal chases, fires, and chemical
exposures. 6. Establish an objective regulatory body to enforce the rules on
operators.174 In particular, Robertss third, fourth, and fifth recommendations
would allay many general societal fears regarding drones because they would reduce
To begin with,
police incentives to employ large numbers of drones for observational purposes.175 Brookings Institute
fellow John Villasenor has added that federal legislation may be prone to over-reaching
by containing so many privacy protections that legitimate police work will be impeded with little victory for
Suppose further that the video from the [drone] turns out to be
the only available evidence that can identify the perpetrator. It would defy
common sense if the police or prosecutors were barred by new [drone] privacy
rules from making use of this information.177 Villasenor therefore cautions that a blanket
the adjacent street.
warrant requirement would be foolish.178 He instead argues for a more limited scope of legislated privacy
protections targeting the data retention of drone images and mandating that police keep thorough public
records of drone operations.179 In addition to Robertss and Villasenors recommendations, police drones
should be employed only on specific missions, not sent to scour a city for undiscovered crimes. At a
minimum, this limitation would minimize the number of ethical quandaries like the one raised by professor
the flexibility to customize its laws to address a unique technical threat while taking advantage of its
ensure that private citizens are not the subject of regular Fourth Amendment search violations from any
sourceis to incentivize police and prosecutors by restricting the availability of drone-collected evidence
at trial.182
monitor movement across an entire urban area. Efforts to curtail the domestic use of drones generally call
for four privacy protections: (1) limiting tracking operations to specific individuals; (2) obtaining a warrant;
(3) discarding any data unrelated to the specific target of the investigation; and (4) denying the use of
The current
legal regime is well suited to deal with most, but not all, of the privacy
concerns drones create. For instance, it is settled law that high-powered technology cannot be
drone-collected evidence in court if the evidence was obtained unlawfully or unintentionally.
used without a warrant to spy on Americans in their residences because the home is a protected place
under the Constitution. One issue the legal regime is not prepared for is how to deal with constant
surveillance outside the homein parks, on roads, and in other public areas. Theoretically, the police could
still tail you to accomplish the same objective without a warrant, but limited resources serve as a check on
legislation that distinguishes between how police can use drones to track U.S. citizens and noncitizens.
One of the many benefits of drones is the ability to travel long distances, but
if the law changes every time a drone crosses a county line, it could
significantly affect the cost-benefit analysis of using them . While safety and privacy
concerns are well founded, we shouldnt let them stunt the growth of an entire industry. And without an
overall legal framework that aligns state laws, an overabundance of regulation has
the potential to ground the drone industry before it ever takes off . Beyond the
military and law-enforcement applications, drones have the potential to benefit our lives in everything from
disaster relief to assessing power lines. In the not-too-distant future, if drone policy is properly established,
you might look up and see not a bird, not a plane, but a drone.
commercial operations, such as utility line inspection, may serve a public benefit. The distinction matters
individuals and corporations.10 Although the regulatory distinctions are complex, in general, FAA oversight
and authority over public-use aircraft are more limited. For this reason, some public sector entities,
with the detect, sense, and avoid requirements needed to safely operate within the national airspace
the ground or spotters in chase planes can provide the necessary capabilities to detect and avoid other air
traffic. FAA is currently evaluating options for routinely allowing small-unmanned aircraft to use line-ofsight as an acceptable means to detect and avoid manned aircraft under a regulatory regime for small
UAVs. For more sophisticated medium and large-sized UAVs seeking approval for operations beyond line of
sight, technology advancements are needed to assure safety in an environment shared with manned
flights. Remote sensing capabilities, including onboard cameras, airborne radars, and equipment to
interrogate aircraft transponder signals (similar to the traffic collision avoidance systems on jetliners) can
combine to provide operators with robust air traffic information.
(Fairbank, 2005). The stated purpose is to increase electronic monitoring and surveillance capability across
UAV efficacy
remains uncertain and border apprehensions have declined by 50 percent,
a broad span of territory to detect illegal border crossings. Reports have shown that the
since 2000, during the period of drone use along U.S. territorial borders (Electronic Privacy Information
Center, 2005a).
will lead to regulations for two types of drone users: government actors or law enforcement, and civilians.
The Supreme Court has yet to rule on the use of drones by government
actors or private civilians and whether it would constitute a search under
the Fourth Amendment with respect to law enforcement use, or a trespass or invasion of privacy
with respect to private actors.13 With the influx of state regulations and increased usage by both
government and civilian actors,
Drone
technology should present precisely this sort of nontrespassory search issue
that could compel Justice Scalia and others to revive a more basic, Katz-like
approach. For instance, in a recent and fiery dissent, Justice Scalia excoriated the Court for its
be had to Katz analysis; but there is no reason for rushing forward to resolve them here.161
allowance of unwarranted DNA collection for the purpose of cross referencing it against a database of
incriminating samples.162 In Jones, Justice Sotomayor opined that the unique qualities of a new
technology should be evaluated to properly apply Katz analysis.163 GPS tracking technology presents a
problem for Fourth Amendment jurisprudence because it is cheap in comparison to conventional
surveillance techniques and, by design, proceeds surreptitiously, [so] it evades the ordinary checks that
constrain abusive law enforcement practices: limited police resources and community hostility.164
Justice Sotomayor identified GPS technology as a tool so amenable to misuse that its unique attributes
should be taken into account when evaluating applying Katz. 165 Justice Sotomayor asked, somewhat
rhetorically, whether people reasonably expect that their movements will be recorded and aggregated in
a manner that enables the Government to ascertain, more or less at will, their political and religious
beliefs, sexual habits, and so on.166 She implied they would not.167 Justice Alitos concurrence in Jones
also noted that science has brought forth far more effective devices for the invasion of a persons privacy
than the direct and obvious methods of oppression which were detested by our forebears and which
inspired the Fourth Amendment.168 He determined that the Constitutions protections should adapt with
technology.169 Justices Sotomayor and Alito thus described the dangers of GPS technology that, almost
word-for-word, could be applied to the capabilities of drones and the problems that widespread police
The number of COAs issued by the FAA more than doubled, up from 146 in 2009 to 298 in 2010.44 COAs
generally define the permitted airspace in which the UAS may be used, require coordination with an air
traffic control facility, require operation within eyesight when used in public airspace, and include special
provisions unique to the specific UASs operation.45 When looking at the numbers above, there does not
seem to be much cause for alarm. Three hundred UASs across the entire United States does not indicate a
significant privacy threat. However, one can expect that number to skyrocket over the next few years.46
The
message from the legislature was loud and clear: they wanted to open the
door wide for the use of UASs in domestic airspace . A rapid influx of UASs
should give rise to serious misgivings for those concerned with privacy
protection if corresponding privacy regulations are not forthcoming .
agencies.49 H.R. 658 passed the House 248 to 169 and easily cleared the Senate 75 to 20.50
exclusive authority to issue licenses for drones.39 In addition, the Act requires the FAA to permit not only
the government (e.g., law enforcement agencies), but also public and private entities to operate drones in
The Act directs the FAA to expedite the process through which
applicants for drone operation become licensed to fly in the NAS.4 When the FAA
domestic airspace."0
shortens the application process, the criteria may also be simplified, which is an alarming possibility
considering the possible lack of comprehensive privacy and safety assessments.42 Until the FAA publishes
regulations in 2014 or explains what the regulations might in- clude, public uncertainty will persist. Private
companies that have received authorization to operate drones-including Raytheon and General Atomics,"may operate with little oversight in just a few short years." Drones present an untapped and lucrative
market, valued at $5.9 billion. 5 NASA forecasts "significant capacity growth for [civil] UAVs."46 Integration
of drones into national airspace will begin with drone deployments at six testing sites throughout the
country-in order to vary in climate and geography, presumably to increase the chance of detecting
complications-as mandated in the Act.47
***PROLIFERATION ADV***
advanced industrial economiessuch as Russia, Taiwan, and South Koreahave developed increasingly
sophisticated and largely indigenous drone capabilities, but they have also missed deadlines for when they
There is no international
association for drone manufacturers and operatorssimilar to those that exist for
would field armed drones, according to their own defense ministries.
civilian nuclear facilities or commercial space launchesthat provides reliable information Drone Strikes by
Other States or Nonstate Actors Drone Strikes by Other States or Nonstate Actors 19 on drones or serves
as a forum to exchange best practices to limit the associated risks and costs. Since most publicly available
information is limited to air shows and the defense trade press, it is possible that there have been
intentionally hidden advances toward states development of weaponized drones.
So far, the United States has a huge lead in the number and
sophistication of unmanned aerial vehicles (about 7,000, by one officials estimate, mostly
wildfire.
unarmed). The Air Force prefers to call them not U.A.V.s but R.P.A.s, or remotely piloted aircraft, in
acknowledgment of the human role; Air Force officials should know, since their service is now training more
pilots to operate drones than fighters and bombers. Philip Finnegan, director of corporate analysis for the
global spending on
procurement of drones over the next decade is expected to total
more than $94 billion, including $9 billion on remotely piloted combat aircraft. Israel and
China are aggressively developing and marketing drones, and Russia, Iran, India,
Pakistan and several other countries are not far behind. The Defense Security Service,
Teal Group, a company that tracks defense and aerospace markets, says
research and
which protects the Pentagon and its contractors from espionage, warned in a report last year that
American drone technology had become a prime target for foreign spies .
contingencies do not require system-wide infrastructure and host-state support. Given the costs to conduct
manned-aircraft strikes with minimal threat to pilots, it is questionable whether states will undertake the
significant investment required for armed drones in the near term.
that its strategy toward drones will be emulated by other states and nonstate actors. In an interview, President
Obama revealed, I think creating a legal structure, processes, with oversight checks
on how we use unmanned weapons is going to be a challenge for me and for my
successors for some time to comepartly because technology may evolve fairly rapidly for other countries as well.71
Domestic
demand is expected to increase over the next decade, starting with
government organizations requiring surveillance systems similar to military
UAVs, such as coast guards, border patrol organizations, and similar national security agencies.10
reasons cited for the relatively slow emergence of the UAV market in the domestic context.
U.S. is modeled
By setting an example of lax control on drone technology
the U.S. is sending a message abroad that development
and use is permissible.
Scott Shane, October 8, 2011, Coming Soon: The Drone Arms Race, The
New York Times,
http://www.agriculturedefensecoalition.org/sites/default/files/file/drones_517/5
17K_2_2011_Coming_Soon_The_Drone_Arms_Race_October_8_2011_NYTimes.
pdf
Chinese companies startled
some Americans by unveiling 25 different models of remotely controlled
aircraft and showing video animation of a missile-armed drone taking out an
armored vehicle and attacking a United States aircraft carrier. The presentation appeared to be more
AT the Zhuhai air show in southeastern China last November,
marketing hype than military threat; the event is Chinas biggest aviation market, drawing both Chinese
administration, embraced an extraordinary principle: that the United States can send this robotic weapon
over borders to kill perceived enemies, even American citizens, who are viewed as a threat.
green light
border. Label the targets as terrorists, and in each case, Tehran, Moscow, and Ankara may
point toward Washington and say, we learned it by watching you. In Pakistan,
Yemen, and Afghanistan.
drone program in recent weeksabout Americans on the target list (there are none at this writing) and the executive branchs legal authority to kill by drone outside war
publics and governments. The United States has taken expensive steps in order to avoid
perceptions of recklessness abroad: for instance, Georgetown professor David Koplow argues that the
Pentagon's recent investments in less-destructive weaponry reflect, in part, a growing emphasis on global
independent oversight program is not going to change minds in Lahore or Karachi, where opposition to
drones seems to be driven more by the perceived violation of sovereignty than by indiscriminate killing
(there are indications that opposition to drones is actually lower in regions where drone strikes are
those
will fill the vacuum, and an anything-goes standard might be the result. U.S. denunciations of other
countries' programs could come to ring hollow. If the United States did adopt an oversight system, those
denunciations would carry more weight. So, too, would U.S. pressure on other states to adopt similar
systems: just as suspicions grow when countries refuse nuclear inspection, foreign governments that
turned down invitations to apply a proven system of oversight to their own drone campaigns would reveal
their disregard for humanitarian concerns.
Furthermore,
proliferation and employment in the coming decades. Such norms would not hinder U.S. freedom of action; rather, they would
internationalize already-necessary domestic policy reforms and, of course, they would be acceptable only insofar as the limitations placed reciprocally on U.S. drones
furthered U.S. objectives. And
existence
even if hostile states do not accept norms regulating drone use, the
U.S. compliance
would preserve
Washingtons ability to apply diplomatic pressure. Models for developing such a framework would be based in
existing international laws that emphasize the principles of necessity, proportionality, and distinctionto which the United States claims to adhere for its drone strikes
and should be informed by comparable efforts in the realms of cyber and space.
unmanned, low cost, and possibly deniable. States may be more willing to
engage in drone overflights which test the resolve of their rivals, or engage
see what kind of drone-led incursion , if any, will motivate a
response.137 This may have been Hezbollahs logic in sending a drone into
Israeli airspace in October 2012, possibly to relay information on Israels
nuclear capabilities.138 After the incursion, both Hezbollah and Iran boasted that the drone incident
demonstrated their military capabilities.139 One could imagine two rival statesfor
example, India and Pakistandeploying drones to test each others capability
and resolve, with untold consequences if such a probe were
in salami tactics to
misinterpreted
by the other
resist. If this were to happen, drones might gradually erode the deterrent
relationships
that exist
more than 18 pounds be required to have spoof-resistant navigation systems. More broadly, he
recommended that GPS-based timing and navigation systems used in national critical infrastructure also
be required to be spoof-resistant. He noted that while [t]here
chance
There was, and still is, what is now known to be a rather small
winter, substantially reducing agricultural yields especially in temperate regions for a year or more. As
noted above mankind as a whole has weathered a number of mind-boggling disasters in the past fifty
thousand years even if older cultures or civilizations have sometimes eventually given way to new ones in
the process. Moreover the fear that radioactive fallout would make the globe uninhabitable, publicized by
widely seen works such as "On the Beach," was a metaphor for the horror of nuclear war rather than
number of human populations. Nor is there any reason to believe that global warming or other insults to
our physical environment resulting from currently used technologies will challenge the survival of mankind
as a whole beyond what it has already handily survived through the past fifty thousand years.
There
are, however, two technologies currently under development that may pose a more
serious threat to human survival. The first and most immediate is biological
warfare combined with genetic engineering. Smallpox is the most fearsome of natural
biological warfare agents in existence. By the end of the next decade, global immunity
to smallpox will likely be at a low unprecedented since the emergence of this
disease in the distant past, while the opportunity for it to spread rapidly across the
globe will be at an all time high . In the absence of other complications such as nuclear
war near the peak of an epidemic, developed countries may respond with quarantine and vaccination to
limit the damage. Otherwise mortality there may match the rate of 30 percent or more expected in
unprepared developing countries. With respect to genetic engineering using currently available
knowledge and technology, the simple expedient of spreading an ample mixture of coat protein variants
could render a vaccination response largely ineffective, but this would otherwise not be expected to
substantially increase overall mortality rates. With development of new biological technology, however,
Neither side could want escalation ; both would be appalled at what was going on;
both would be desperately looking for signs that the other was ready to call a
halt; both, given the capacity for evasion or concealment which modern delivery
systems can possess, could have in reserve ample forces invulnerable
enough not to impose use or lose pressures .
any predisposition to suppose, in an ambiguous situation of enormous risk, that the right course when in
The body count from a single biological attack could easily be one or
two orders of magnitude higher than the casualties caused by these events.
Using the rule of proportionality as a guide, one could justifiably debate whether the United States should
use massive force in responding to an event that resulted in only a few thousand deaths. However, what if
the casualty count was around 300,000? Such an unthinkable result from a single CBW incident is not
beyond the realm of possibility: According to the U.S. Congress Office of Technology Assessment, 100 kg
of anthrax spores delivered by an efficient aerosol generator on a large urban target would be between
proportionality does not rule out the use of nuclear weapons. Besides simply the total number of
casualties, the types of casualties- predominantly military versus civilian- will also affect the nature and
scope of the US reprisal action. Military combat entails known risks, and the emotions resulting from a
significant number of military casualties are not likely to be as forceful as they would be if the attack were
against civilians. World War II provides perhaps the best examples for the kind of event or circumstance
drop atomic bombs on Hiroshima and Nagasaki- based upon a calculation that up to one million casualties
might be incurred in an invasion of the Japanese homeland 47- is an example of the kind of thought
process that would have to occur prior to a nuclear response to a CBW event. Victor Utgoff suggests that
CB attacks
and speeding the defeat of the aggressor, and if the original attacks had
caused severe damage that had outraged American or allied publics,
if nuclear retaliation is seen at the time to offer the best prospects for suppressing further
Biological weapons are among the most dangerous in the world today
and can be engineered and disseminated to achieve a more deadly result
than a nuclear attack. Whereas the explosion of a nuclear bomb would cause massive death in a specific
species.
location, a biological attack with smallpox could infect multitudes of people across the globe. With incubation periods of
up to 17 days, human disseminators could unwittingly cause widespread exposure before diagnosable symptoms
indicate an infection and appropriate quarantine procedures are in place. Unlike any other type of weapon,
bioweapons such as smallpox can replicate and infect a chain of people over
an indeterminate amount of time from a single undetectable point of
release. According to science writer and author of The Hot Zone, Richard Preston, "If you took a gram of
smallpox, which is highly contagious and lethal, and for which there's no vaccine available globally now, and
released it in the air and created about a hundred cases, the chances are excellent that the virus would go global in six
weeks as people moved from city to city......the
International attention on BW and BT has increased over the last ten years, particularly in the United
States, due to a number of factors: Anthrax attacks in fall 2001 Discoveries of the scope of Iraqs BW
efforts after the Persian Gulf War Revelations by Boris Yeltsin and Ken Alibek31 about the depth and
breadth of the Soviet Unions BW program Evidence that Aum Shinrikyo was actively trying to acquire
and disseminate biological agents both prior to and after its 1995 sarin nerve gas attack in Tokyo
Indications that terrorist organizations not sponsored by states, including Osama bin Ladens al-Qaeda
network, have an interest in developing a BT capability.32 The consequences of a large-scale, successful
deadly as thermonuclear weapons. For example, one U.S. government study concluded that
100 kilograms of Bacillus anthracis, a fraction of the amount produced by
Iraq, could kill from 1 to 3 million people if dispersed under optimal
conditions. 47 In comparison, a Hiroshima-type fission bomb could kill as
many as 80,000, while a more powerful hydrogen bomb could kill 600,000 to
2 million. 48 Contagious agents could kill even more people than anthrax. Joshua Lederberg calls the
1918 flu pandemic, which is estimated to have killed more than 20 million people
worldwide, a model for the type of disaster that a biological weapon containing a
contagious pathogen could wreak. 49 The public health infrastructure [End Page 100] was
overwhelmed in the first couple of weeks, despite the low case fatality rate of influenza compared with a
typical biological warfare threat agent. 50
1990). If pathogens are released immediately before the start of a dry period, few, if any, infections are
would undermine any argument that the outbreaks are localized and do not jeopardize importing countries.
It would also be more likely to overwhelm the response capacity and lead to the
uncontrollable spread of disease. This is the principal way in which a bioterrorist attack would
differ from a natural disease introduction, and it raises the question whether a system designed to respond
to natural introductions can deal effectively with sudden, multifocal outbreaks.
A2 BW wont be used
Biological weapons will be used in future conflicts.
Gregory Koblentz, Winter 2004, Gregory Koblentz has a PhD in Political
Science at MIT, MA Public Policy at Kennedy School, Harvard, Visiting
Assistant Professor in the School of Foreign Service at Georgetown University
and a Research Fellow with the Security Studies Program at the
Massachusetts Institute of Technology, International Security, Pathogens as
Weapons, The International Security Implications of Biological Warfare,
Ebsco Host
The third likely objection is that because biological weapons have been used so
rarely, this restraint is likely to hold. Therefore, despite their potential military utility,
biological weapons will remain marginal in most states' national security calculations. Although modern
biological weapons based on aerosol dissemination technology have not been successfully employed by
have emerged as direct threats to the United States and its allies are among those most likely to resort to
unconventional weapons in their drive to inflict as many casualties and as much terror as possible. As with
nuclear weapons, the lack of large-scale use of biological weapons since 1945 is a cause for celebration,
but not grounds for complacency.
A2 Dispersal issues
Careful selection of agents and delivery systems
overcomes dispersal issues.
Gregory Koblentz, Winter 2004, Gregory Koblentz has a PhD in Political
Science at MIT, MA Public Policy at Kennedy School, Harvard, Visiting
Assistant Professor in the School of Foreign Service at Georgetown University
and a Research Fellow with the Security Studies Program at the
Massachusetts Institute of Technology, International Security, Pathogens as
Weapons, The International Security Implications of Biological Warfare,
Ebsco Host
Modern biological weapons are designed to disseminate pathogens or toxins
in an aerosol cloud of microscopic particles that can be readily inhaled and retained in the lungs of the exposed population .10 These aerosols are most effec- tive
when composed of particles ranging from 1 to 10 microns that can stay airborne longer and cause more
severe cases of disease.11 Aerosols are taste- less, odorless, and invisible, thus facilitating clandestine
A2 We can respond
The U.S. is unprepared to respond to terrorist attacks.
Tara OToole, March 29, 2007, Tara O Toole provides testimony before
Congress, Center for Biosecurity, Hearing on Bioterrorism Preparedness and
the Role of DHS Chief Medical Officer,
http://www.upmcbiosecurity.org/website/resources/hearings/content/Hearings
_2007/20070329-btprepanddhscmo.html
The U.S. healthcare delivery sector is not equipped or prepared to provide
timely medical care to the tens or possibly even hundreds of thousands of
casualties that could result from a successful bioattack. No municipality could
care for a sudden flood of even 500 victims with inhalational anthraxthere
simply is not enough surge capacity in todays financially stressed
healthcare system to handle this load. The problem of lack of medical surge capacity is not
specific to bioterrorist attacks. Nearly every type of terrorist attack or large-scale natural disaster would
impose significant demands on healthcare facilities. At a March 15, 2007, meeting of medical and public
health experts sponsored by the White House Homeland Security Council, attendees warned that the U.S.
healthcare system would likely collapse in such events. Yet, as we saw in the response to Hurricane
Katrina, there is no national doctrine or operational plan that guides how healthcare facilities should
prepare for or react to such calamities. Astonishingly, more than five years after high grade anthrax was
mailed to members of Congress and the media, there is no conduct of operations plan for how the U.S.
healthcare system would cope with the casualties of an anthrax attack. This is the case even though a
bioterrorist attack is the mass casualty scenario judged by the National Intelligence Council to be of
during large-scale catastrophes within HHS and DHS are unclear, and in both agencies these functions are
grossly understaffed and underfunded.
Exercises in the 1990s tested the U.S. government's preparedness for responding to WMD attacks. The
tests revealed that hospitals were likely to quickly exhaust their supplies of antidotes and vaccines; first
responders (police, firefighters, and other emergency workers) were inadequately trained and likely to
succumb themselves; and coordination among [End Page 97] federal, state, and local officials was all but
critics argue that the lack of a fully coordinated global disease surveillance system could obstruct early
response to a bioterrorist attack. Congress enacted legislation to address some of these shortfalls, but
many of these problems remain unresolved. 40
***PRIVACY ADV***
easy to imagine (and perhaps expect) that law enforcement agencies will deploy UAS to surveil from
vantage points impossible in conventional aircraft simply because UASs can provide the capability to do so.
In his dissent in Riley, Justice Brennan could have been describing current UAS technology and FAA
regulations when he asked the reader to imagine a helicopter capable of hovering just above an enclosed
courtyard or patio without generating any noise, wind, or dust at alland, for good measure, without
posing any threat of injury.245 Law enforcement use under then- controlling FAA regulations meant that
the vantage point was lawful and therefore observations from that vantage point, even into the house,
and Joness emphasis on a property-based approach suggests that the Court might entertain the argument
that the physical presence of the UAS over the property at sufficiently low heights renders it a trespass,
and, therefore, a Fourth Amendment search. United States v. Causby may have abolished the common-law
ancient doctrine . . . that ownership of the land extend[s] to the periphery of the universe,247 but the
Court could find that a resident retains some right of exclusion from the airspace above her property that is
not usable by conventional craft. It is difficult to imagine that the airspace between a houses curtilage and
the height of its roof is a public highway such that granting the property owner some right of exclusion
seriously interfere[s] with [its] control and development in the public interest.248 It is also possible that
UAS surveillance from a non-trespassory, lawful vantage point could be found to be sufficiently intrusive.
Imagine that law enforcement officers, like those in Carter, wish to peer inside of an apartment several
stories above ground to confirm a tip that criminal activity was occurring. Unable to walk up to the window
and peer in, the officers warrantlessly launch a small UAS from the street below. The UAS quickly ascends
to the height of the apartments window and relays video of the activities within to the officers on the
ground. Assuming the UAS flight was within FAA guidelines and that no trespass or physical intrusion into
the apartment occurred, the vantage point was clearly lawful and appears constitutional under existing
Once FAA regulations open the skies to low-altitude UAS flight, such a
holding effectively creates an Orwellian state: using UAS, law enforcement
could surveil from the position of any possible viewer at any possible vantage
point. If the Court wishes to avoid such Orwellian effects, it may be
persuaded by a Kyllo-based argument . More specifically, because the activity within the
precedent.
apartment could only have been seen via the angle of the UAS or through an actual physical law
enforcement intrusion into the apartment, the Court could use Kyllos rule to interpret that a Fourth
Amendment search occurred as long as the Court first finds that UASs are not within general public
use.249 However, if such an angle of observation could have been achieved from an adjacent building,
regardless of police law enforcement agents actual ability to physically observe from that location, it is
unlikely that Kyllo would be found applicable because the general public could have been afforded the
differentiation underscores Justice OConnors criticism of judicial reliance on FAA regulations for a
mandate from Congress in the FAAMA.250 In such a case, law enforcement attempting to introduce
evidence so obtained may need to heed Justice OConnors suggestion and demonstrate that UAS flights at
that altitude are routine enough to prevent an objectively reasonable expectation of privacy. Unfortunately
this argument for the unconstitutionality of certain UAS surveillance may expire soon: the FAAMAs stated
goal is to rapidly increase the routine private and governmental use of UAS in the United States.25
privacy implications of civilian drones operating in US airspace, the Association for Unmanned Vehicle
Systems International (AUVSI) issued an
Code of Conduct.25 (The AUVSI is an influential group representing the UAV industry.) Though this
is a step in the right direction, the code of conduct is very broad and consists
of generic promises not to operate UAVs in a manner that presents undue
risk and to respect the privacy of individuals. Critics have noted that there
is nothing in the document that attempts to provide a detailed explanation as
to how the code will be enforced and by whom.26
California, Gov. Jerry Brown vetoed a measure in September that would have required law enforcement to
obtain a warrant for the vast majority of uses of drones. Brown claimed the bill, AB 1327, would put greater
standards on law enforcement than those required by the U.S. and state constitutions. "AB 1327 would
have been the first law in California to regulate drones," says constitutional law expert Erwin Chemerinsky,
dean of the University of California at Irvine School of Law. "Drones may be a very valuable tool for
investigation in some cases. Under AB 1327, the police still could use drones if they demonstrated to a
judge that there was probable cause. I strongly favored AB 1327 and was very disappointed when Gov.
Brown vetoed it." On the other hand, states have passed laws related to drones that fund the technology
or encourage the development of testing sites. For example, the North Dakota legislature passed a law
law.19 This Note considers a small slice of relevant jurisprudence, mainly how courts should treat law
enforcement observations made by drones of American citizens or their property in or near the domestic
address the significant privacy threats posed by privately operated drones, drones flying near the border,
or those used against foreign nationals in the United States. But the primary threat to the average
individual and societal impacts must be considered when attempting to craft solutions to the problems that
drones pose.
towards prohibiting trespass into an individuals secluded zone of private affairs, they were reluctant to
allow law enforcement wider discretion within the search and seizure framework. Unfortunately, various
interacting components of privacy, fundamental possessory interest, trespass prohibition, and the warrant
requirement posed doctrinal difficulties for the Fourth Amendment jurisprudence. However, later
jurisprudence allowed wider latitude in police search and seizure on account of exigencies of situations.
Regardless of facial exigencies articulated by law enforcement, allowing domestic surveillance by drones
will certainly jeopardize such trespass barriers, which until now has been solemnized in law as a
constitutional inheritance of the U.S. citizen. As the post-9/11 societal landscape continues to dilute the
the absence of
passionate discourse on drones intruding our privacy is a hallmark of a
society that is gradually failing to recognize its constitutional roots . Yet, this
various sacrosanct constitutional grants, such as the individual privacy,
failure is the historic emerging reality of the twenty-first century evolution of the Fourth Amendment. The
modern doctrinal constructions of the Fourth Amendment have authorized carving out countless
judicial interpretation of the Fourth Amendment was primarily designed to satisfy the needs of law
enforcements administrative responsibilities. As political manipulation started to shape societal
aspirations for individual liberty, judicial constructions began to relegate individual liberty interests in favor
of administrative interests.27 As a result, the judiciary began to grant maximal discretion to the law
enforcement administrative mechanisms. With this, the doctrinal components of warrantless search and
seizure and law enforcement trespass became distorted by the predominance of the basic law
paradigm.28 Consequently, police power rose asymmetrically, and warrantless intrusions became the
prominent Fourth Amendment concern for individuals. Thus, the amendments original aspiration has
become nearly forgotten under the reality of modern times and, now, is quickly losing its original context
and relevance. The above interpretative lens of law enforcements trespass into an individuals private
space provides a necessary construct through which to understand drone surveillances deleterious impact
on individual privacy. While the framing periods privacy debate was focused at securing a persons right
in our
current discourse, we must introspect over how secure a persons secluded
zone of private affairs must be from digital and remote trespass via
unmanned aerial vehicles.
from physical trespass, the construct nonetheless calls for a revitalized discussion. Therefore,
increased drone
operation by police may have significant legal consequences for courts
applying Fourth Amendment principles because expanded drone use may
change the calculus for determining when a search by drones has occurred .81
Irrespective of how Congress responds to the privacy problem it now confronts,
Fourth Amendment protection from situations where no reasonable expectation of privacy is deemed to
exist; and (3) the third-party doctrine test, which deprives information shared with any
third party of all Fourth Amendment protection.91 Prior to the formulation of both the reasonable
expectation of privacy and the third party doctrine tests, Fourth Amendment violations were thought to
have occurred strictly in those circumstances where technical, physical trespasses were committed.92 This
heavy reliance on the common-law trespass controlled Fourth Amendment jurisprudence all the way
through the latter half of twentieth century.93 Application of this test rendered a wiretap attached to
telephone wires on public streets constitutional on the grounds that neither the offices nor houses of the
defendants were unlawfully entered.94 This common law rule also included the understanding that the
admissibility of evidence [was] not affected by the illegality of the means by which it was obtained, and
the only limitation imposed was that the exclusion of evidence should be confined to cases where rights
under the Constitution would be violated by admitting it.95 This rule was justified on the premise that [a]
standard which would forbid the reception of evidence if obtained by other than nice ethical conduct by
government officials would make society suffer and give criminals greater immunity . . . .96 Thus, where
federal officers intercepted telephone messages over the course of several months without committing
any trespass upon any property of the defendants, the Court sustained the admission of the evidence.97
the
Court applied the third party doctrine test to a situation where, at the request
of law enforcement authorities, a telephone company installed a pen register
confidence placed in a third party will not be betrayed.128 For example, in Smith v. Maryland,
to record the telephone numbers dialed by the suspect, and the information derived from it was later used
information to the telephone company and exposed that information to its equipment in the ordinary
course of business. In doing so, petitioner assumed the risk that the company would reveal to police the
defendant knowingly and freely gave specific location information to his cell phone provider when he made
and received telephone calls on his cell phone.132 Ultimately, the court relied on earlier precedent and
rejected the contention that the Defendant had a subjective expectation of privacy in the cell tower
location data for his cell-phone usage.133 As illustrated by the disparate results emanating from these
legitimacy is not whether the individual chooses to conceal assertedly private activity, but instead
whether the governments intrusion infringes upon the personal and societal values protected by the
Fourth Amendment.105 Yet, despite the formulation of the reasonable expectation of privacy test in Katz,
The need for a brightline rule to determine when a search and seizure is unconstitutional was most
recently demonstrated in the United States Supreme Courts decision United
States v. Jones, where there was a discernible split in reasoning among the Justices despite the fact
confusion has persisted as to whether or not this is the guiding standard.
that they all reached a unanimous result.106 Jones involved the Governments warrantless attachment of a
GPS tracking device to the undercarriage of a vehicle belonging to an individual (Jones) who was the target
of an FBI investigation for the suspected trafficking of narcotics.107 Over the course of four weeks, the
Government used the GPS device to monitor the vehicles movements on public streets.108 The device
ultimately transmitted more than 2,000 pages of data that led to a multiplecount indictment arising from
violations of 21 U.S.C. 841 and 846.109
adopted,
. Political progress in Western history has been the result of a growing recognition over the centuries that, as the Declaration of Independence puts it,
human beings have "certain inalienable rights" and that "it is to secure these rights that governments are instituted."
appreciation of constitutional liberalism has a variety of implications for American foreign policy. First, it suggests a certain humility. While it is easy to impose elections on a country, it is more difficult to push
constitutional liberalism on a society. The process of genuine liberalization and democratization is gradual and long-term, in which an election is only one step. Without appropriate preparation, it might even be a
false step. Recognizing this, governments and nongovernmental organizations are increasingly promoting a wide array of measures designed to bolster constitutional liberalism in developing countries. The National
Endowment for Democracy promotes free markets, independent labor movements, and political parties. The U.S. Agency for International Development funds independent judiciaries. In the end, however, elections
trump everything. If a country holds elections, Washington and the world will tolerate a great deal from the resulting government, as they have with Yeltsin, Akayev, and Menem. In an age of images and symbols,
elections are easy to capture on film. (How do you televise the rule of law?) But there is life after elections, especially for the people who live there. Conversely, the absence of free and fair elections should be
viewed as one flaw, not the definition of tyranny. Elections are an important virtue of governance, but they are not the only virtue. Governments should be judged by yardsticks related to constitutional liberalism as
well. Economic, civil, and religious liberties are at the core of human autonomy and dignity. If a government with limited democracy steadily expands these freedoms, it should not be branded a dictatorship. Despite
the limited political choice they offer, countries like Singapore, Malaysia, and Thailand provide a better environment for the life, liberty, and happiness of their citizens than do either dictatorships like Iraq and Libya
or illiberal democracies like Slovakia or Ghana. And the pressures of global capitalism can push the process of liberalization forward. Markets and morals can work together. Even China, which remains a deeply
repressive regime, has given its citizens more autonomy and economic liberty than they have had in generations. Much more needs to change before China can even be called a liberalizing autocracy, but that
should not mask the fact that much has changed. Finally, we need to revive constitutionalism. One effect of the overemphasis on pure democracy is that little effort is given to creating imaginative constitutions for
transitional countries. Constitutionalism, as it was understood by its greatest eighteenth century exponents, such as Montesquieu and Madison, is a complicated system of checks and balances designed to prevent
the accumulation of power and the abuse of office. This is done not by simply writing up a list of rights but by constructing a system in which government will not violate those rights. Various groups must be
included and empowered because, as Madison explained, "ambition must be made to counteract ambition."
, creating not simply democratic but also deliberative government. Unfortunately, the rich variety of unelected bodies, indirect
voting, federal arrangements, and checks and balances that characterized so many of the formal and informal constitutions of Europe are now regarded with suspicion. What could be called the Weimar syndrome -named after interwar Germany's beautifully constructed constitution, which failed to avert fascism -- has made people regard constitutions as simply paperwork that cannot make much difference. (As if any political
system in Germany would have easily weathered military defeat, social revolution, the Great Depression, and hyperinflation.) Procedures that inhibit direct democracy are seen as inauthentic, muzzling the voice of
the people. Today around the world we see variations on the same majoritarian theme. But the trouble with these winner-take-all systems is that, in most democratizing countries, the winner really does take all.
DEMOCRACY'S DISCONTENTS
Through much of human history the danger to an individual's life, liberty and happiness came from the
absolutism of monarchies, the dogma of churches, the terror of dictatorships, and the iron grip of totalitarianism. Dictators and a few straggling totalitarian regimes still persist, but increasingly they are
anachronisms in a world of global markets, information, and media.
democracy
in which the system was seen as inadequate and new alternatives were sought by
, many of whom were initially popular and even elected. Today, in the face of a
spreading virus of illiberalism, the most useful role that the international community, and most importantly the United States, can play is -- instead of searching for new lands to democratize and new places to hold
elections -- to consolidate democracy where it has taken root and to encourage the gradual development of constitutional liberalism across the globe. Democracy without constitutional liberalism is not simply
inadequate, but dangerous, bringing with it the erosion of liberty, the abuse of power, ethnic divisions, and even war. Eighty years ago, Woodrow Wilson took America into the twentieth century with a challenge, to
make the world safe for democracy. As we approach the next century, our task is to make democracy safe for the world.
major war within the developed world seems to have become very remote indeed. This is one of the main
sources for the feeling that war has been transformed: its geopolitical centre of gravity has shifted
radically. The modernized, economically developed parts of the world constitute a zone of peace.
War
one.
The
probability of major wars within the developed world remains lowbecause of the
factors already mentioned: increasing wealth, economic openness and interdependence, and nuclear
But the deep sense of change prevailing since 1989 has been based on the
far more radical notion that the triumph of capitalism also spelled the
irresistible ultimate victory of democracy; and that in an affluent and democratic world,
deterrence.
eroding with the return of capitalist non-democratic great powers that have
been absent from the international system since 1945 . Above all, there is the formerly
communist and fast industrializing authoritarian-capitalist China, whose massive growth represents
the greatest change in the global balance of power. Russia, too, is retreating
from its postcommunist liberalism and assuming an increasingly authoritarian
character. Authoritarian capitalism may be more viable than people
tend to assume . 8 The communist great powers failed even though they were potentially larger
capitalist
authoritarian/totalitarian powers during the first half of the twentieth century,
Germany and Japan, particularly the former, were as efficient economically as, and if
anything more successful militarily than, their democratic counterparts . They were
than the democracies, because their economic systems failed them. By contrast, the
defeated in war mainly because they were too small and ultimately succumbed to the exceptional
continental size of the United States (in alliance with the communist Soviet Union during the Second World
assertive, flex its muscles, and behave like a superpower, even if it does not become
particularly aggressive. The democratic and non-democratic powers may coexist
more or less peacefully, albeit warily, side by side, armed because of mutual fear and suspicion,
as a result of the so-called security dilemma, and against worst-case scenarios. But there is also the
prospect of more antagonistic relations, accentuated ideological rivalry,
potential and actual conflict, intensified arms races, and even new cold wars,
with spheres of influence and opposing coalitions. Although great power relations will probably vary from
those that prevailed during any of the great twentieth-century conflicts, as conditions are never quite the
same, they may vary less than seemed likely only a short while ago.
A2 Requires a warrant
UAV surveillance is distinct enough from traditional
aircraft it would not require a warrant.
Richard M. Thompson II, April 3, 2013, Richard Thompson II is a CRS
researcher and legislative attorney, Drones in Domestic Surveillance
Operations: Fourth Amendment Implications and Legislative Responses,
Congressional Research Service, pp. 1-21,
http://www.a51.nl/storage/pdf/R42701.pdf, p. 13
Based on the aerial surveillance cases, it may be reasonable to presume a
warrant would not be required (nor, perhaps, any suspicion, for that matter) to conduct
drone surveillance of most public places for a relatively short period of time. The Supreme
Court remarked in Ciraolo that the Fourth Amendment simply does not
require the police traveling in the public airways at [1,000 feet] to obtain a
warrant to observe what is visible to the naked eye .100 However, the rarity of
drone flights may distinguish their use from surveillance by the piloted aircraft used in
the three aerial cases decided by the Court. All three of these cases were premised on the
fact that each aircraft was flying in navigable airspace , and that these flights were not
sufficiently rare to provide a reasonable expectation of privacy in the area to be searched. To this point,
Justice White remarked in Riley that there is nothing in the record or before us to suggest that helicopters
flying at 400 feet are sufficiently rare in this country to lend substance to respondents claim that he
reasonably anticipated that his greenhouse would not be subject to observation from that altitude.101
Presently, use of UAVs in U.S. airspace is considerably less common. The FAA has
issued only approximately 300 licenses for drone use in U.S. airspace.102
A2 Privacy is protected
Manned surveillance privacy protections are not enough
new legislation is needed.
J. Tyler Black, 2013, J. Tyler Black is an associate in the firm Thompson
Coburn LLPs transportation regulatory practice, Over Your Head, Under the
Radar: An Examination of Changing Legislation, Aging Case Law, and Possible
Solutions to the Domestic Police Drone Puzzle, Washington and Lee Law
Review vol. 70, pp. 1830-1883,
http://scholarlycommons.law.wlu.edu/cgi/viewcontent.cgi?
article=4347&context=wlulr, p. 1854-1856
In Riley, the Supreme Court decided to apply the same method-focused
rationale, despite the use of a different aerial technologypolice helicopters. This similar approach
suggests a deliberate retreat from what could have been a firmer defense of
privacyan approach made and evaluated without regard to the surveillance
technology employed. The Riley decision was badly split. The four-justice plurality
concluded that an aerial police observation made from a public vantage point
where [the aircraft has] a right to be does not require a search warrant so long as a
reasonable man would not have expected that his [curtilage] was protected
from public or official observation .113 This rationale leans heavily on whether the aircraft
making the observation had a legal right to be where it was in the sky (pursuant to FAA regulations
governing airspace).114 Interestingly, a majority of the Court did not accept this rationale.115 Justice
OConnor agreed with the final disposition but differed in her analysis.116 Along with Justices Brennan,
Marshall, Stevens, and Blackmun, Justice OConnor deemphasized the FAA regulations in any privacy
analysis, and did not endorse the pluralitys analogy between helicopter observations and ground-level
observations.117 These five Justices instead focused their judgment on the reasonableness of an
individual took to shield the property from public view).119 Justice OConnor argued that the Court should
ask whether the helicopter was in the public airways at an altitude at which members of the public travel
with sufficient regularity and that society is prepared to recognize as reasonable, regardless of technical
compliance with FAA safety regulations.120 Additionally, Justice Brennans dissent, as joined by Justices
Marshall and Stevens, appears to anticipate a future technology that would be more intrusive than the
helicopters of the 1980s.121 He noted that the plurality appeared to dismiss the intrusiveness of the
helicopter merely because it had a legal right to be where it was and due to the lack of undue noise . . .
wind, dust, or threat of injury122 created by its presence. Arguing that the proper analysis depends on
safeguarding the privacy and security of private citizens, Justice Brennan asked the Court to imagine a
helicopter capable of hovering just above [the ground] without generating any noise, wind, or dust at
all . . . . Suppose police employed this miraculous tool to discover not only what crops people were growing
addresses a model approach for the Supreme Court to take when applying aerial observation law to drones
precisely because it imagines the potential abuse of the pluralitys emphasis on the location of the
such an observation loses any tenable comparison to the proverbial policeman on a public street.126 At
some point, the analogy loses its credence in the face of an overly piercing spy technology, at least if some
degree of privacy is to be retained. When technology emerges that fundamentally alters the privacy
analysis, change becomes appropriate.127
importantly, the transit of weapons and persons seeking to do harm to American people and infrastructure.
The
Supreme Court has likewise acknowledged this federal interest in the borders,
observing that [t]he Governments interest in preventing the entry of
unwanted persons and effects is at its zenith at the international border .73
Again, the touchstone in every Fourth Amendment case is whether the search
is reasonable. 74 The Court observed in United States v. Montoya De
Hernandez the Fourth Amendment balance of reasonableness is qualitatively
different at the international border.75 Routine searches, the Court continued, are not
have reasonable cause to believe are carrying goods unlawfully into the United States.72
A2 Court checks
Applying the Fourth Amendment to drones requires a
court case that can draw a meaningful distinction
between UAVs and traditional forms of aerial surveillance
unlikely to happen.
Richard M. Thompson II, April 3, 2013, Richard Thompson II is a CRS
researcher and legislative attorney, Drones in Domestic Surveillance
Operations: Fourth Amendment Implications and Legislative Responses,
Congressional Research Service, pp. 1-21,
http://www.a51.nl/storage/pdf/R42701.pdf, p. 17
Applying the Fourth Amendment to drones requires application of the
threshold question: was there a search? Again, this will depend on all the factors discussed
abovethe area of the search, the technology used, and whether society would
respect the targets expectation of privacy in the place searched. If a reviewing
court concludes that the drone surveillance was not a search, neither a
warrant nor any degree of individualized suspicion would be required. If,
however, the court concluded there was a search, then a court would ask
whether a warrant is required, if one of the exceptions apply, and what level of
suspicion, if any, is necessary to uphold the search. Unless a meaningful
distinction can be made between drone surveillance and more traditional
forms of government tracking, existing jurisprudence suggests that a
reviewing court would likely uphold drone surveillance conducted with no
individualized suspicion when conducted for purposes other than strict law enforcement. The
Supreme Court has hesitated from interfering in what they see as the executives function in protecting the
health and safety of the American population.
jurisprudence. Finally, there is the remaining question about what type of sense enhancement may be
problematic.97 Additionally, caution should be used when expanding Dow Chemicals analysis to different
contexts. Dow Chemical involved surveillance of an industrial facility, which is not an area immediately
adjacent to the private home, where privacy expectations are most heightened.98
libertarians tend to focus on the broad societal implications of increased [drone] use including potential
the Supreme
Court will likely have new opportunities to revisit its decisions governing
aerial observation. Before evaluating legislative or judicial solutions, however, the upcoming
privacy implications.18 In the face of new legislation and confusion in the lower courts,
changes to drone policy must be outlined so that the precise vulnerabilities of existing jurisprudence can
be appreciated.
A2 FAA checks
UAVs presents an immense privacy challenge no
jurisdictional protection and breadth of surveillance
capabilities.
Wells C. Bennett, December 2012, Wells C. Bennett is a visiting fellow in
National Security Law at the Brookings Institution, Unmanned at Any Speed:
Bringing Drones into Our National Airspace, The Brookings Institute, no. 55,
pp. 1-20,
http://www.brookings.edu/~/media/research/files/papers/2012/12/14-dronesbennett/1214_drones_bennett.pdf, p. 19-20
UAS pose serious privacy challenges. The reasons are straightforward. When mounted
on a remotely-piloted craft, todays sensors can scoop up quite a lot of
information, at times more easily or more broadly than can helicopters, airplanes, or
ground-mounted surveillance equipment. Theres also the relevant but outdated case law:
the Supreme Court has suggested that warrantless surveillance, if conducted from FAA-defined public
navigable airspace, will not trigger a violation of the Fourth Amendment.94 Just how much use will UAS
The FAA
reportedly believes that as many as 30,000 unmanned craft could take to our
skies by 2020. Having all of this in mind, the groundswell of privacy concerns
seems pretty well justified. The question is how privacy fits with the FAAs integration effort.
Some legislators want to ensure the agencys engagement with privacy
issues, by adding them to FMRAs task list. Rep. Edward Markey (D-MA) would amend FMRA, by (among
make of that and other airspace for surveillance, among myriad other purposes?
other things) directing the Secretary of Transportation to identify privacy threats posed by domestic UAS
endeavors, and by precluding the FAA from licensing domestic UAS unless and until the operator has
explained, in detail, how he or she will mitigate possible harms to third-party privacy interests.95 Other
proposals focus on the FAAs independent authority. Just days after the FMRAs signing, advocacy
organizations wrote to the FAAs Acting Director, Michael Huerta, and urged his agency to conduct a
rulemaking to address the threat to privacy and civil liberties that will result from the deployment of aerial
drones within the United States.96 The FAA balked at that request, but similar ones followed. Others have
urged the FAA to account for privacy matters, as the agency works through the FMRA timetable. That latter
approach seems to have caught on. As discussed in Section Two, the Acting FAA Administrator, Michael
Huerta, publicly cited the need to resolve privacy concerns before selecting experimental UAS flight
ranges. Why do so if, as some have suggested,
issue? One answer has to do with expediency; the FAA might have thought that, regardless of its FMRA
obligations, the agency nevertheless must address a matter of tremendous significance to the public.
account for privacy concerns. Whatever the explanation, one thing is certain. By emphasizing privacys
centrality to the test site selection exercise, the Acting Administrators response effectively commits the
FAA to tackling other privacy problems in the future, as it reaches other statutory milestones. Although its
mission is only to ensure safe flight within the national airspace system, the agency now is officially in the
privacy game, for better or worse.
While FAAs approach to address the mandates set forth in P.L. 112-95
regarding unmanned aircraft integration into the national airspace system is yet
to be defined, it is most likely that FAA regulation and oversight of UAVs will
adopt an evolving, risk-based approach toward this end goal of seamless integration. As a
manned aircraft do.15
first step, P.L. 112-95 mandated that FAA identify six test sites to specifically test concepts and
technologies for integrated unmanned aircraft operations. FAA held public meetings and webinars and
solicited public comments on the selection of test sites in March 2012, but has not yet gone through a
formal source selection process or announced further details regarding test site selection, even though it
was mandated to identify the sites by the summer of 2012 and have at least one site operational by
years.
police forces. Furthermore, how much weight should be given FAA regulations is not entirely certain. As
Justice Blackmun pointed out in his Riley dissent, five of the justices agreed that the case should not turn
surveillance purposes would likely require a warrant.95 However, the use of a small, remotely operated
helicopter with a high-powered zoom lens seems closer to the facts of the above cases than the satellite
hypothetical. For those desirous of greater protection from aerial surveillance, the approach used by Justice
OConnor and the dissent in Riley has some immediate appeal. That test asked not whether the police had
a right to be in the place from where they made their observation, but whether the homeowner could
reasonably expect someone to observe their property from that location.96 However, this test is not
urban locations or that live near airports be afforded less constitutional protection than those who live in
the desert? Another issue that arises with such an approach is that ones expectation of privacy would be
diminished as the use of drones becomes more frequent. Ten years ago, no one could reasonably expect a
three-foot, remote controlled police helicopter to be peering over their backyard fence. But ten years from
now, if virtually every police department has its own fleet of UASs, that expectation would be considerably
more reasonable. Should ones expectations of privacy be diminished as technology advances?
reasonable suspicion or probable cause, depending upon the length of the surveillance, would be required.
***ADD-ONS***
the drone system radically homogenizes these identities into a single cluster of racialized information that is used for
the holocaust lay a dehumanized thought; beneath the menticide of deviants and dissidents... in the
cuckoo's next of America, lies a dehumanized image of man... (Montagu & Matson, 1983, p. xi-xii). While it
may never be possible to quantify the impact dehumanizing ethics may have had on humanity, it is safe to
When we
calculate the actual losses and the virtual benefits, we approach a nearly
inestimable value greater than any tools, which we can currently use to measure it.
Dehumanization is nuclear war, environmental apocalypse, and international
genocide. When people become things, they become dispensable. When people are dispensable, any
conclude the foundations of humanness offer great opportunities which would be foregone.
and every atrocity can be justified. Once justified, they seem to be inevitable for every epoch has evil and
dehumanization is evil's most powerful weapon.
43 legitimate crossing points. However the rest of the border consists of open desert terrain, rugged
same routes used for drug trafficking. Today, numerous federal and state organizations are charged with
maintaining the security and defense of the homeland: Northern Command (NORTHCOM), Immigration and
Customs Enforcement (ICE), Customs and Border Patrol (CBP), Drug Enforcement Agency (DEA), Federal
Bureau of Investigations (FBI), Border Patrol, Coast Guard, state and local police departments.
Many of
challenge. The Russian government, and consequently the security contractors who are responsible for the upkeep of
these facilities, suffers from a lack of financial resources (Joyner & Parkhouse 2009, 215). Additionally, significant internal
threats are present. Because the government employs independent security companies to coordinate much of
management of nuclear materials, there are two channels for insiders to aid terrorist groupshigh level government
officials and low level technical personnel. Both groups have incentive to divulge information at the right price, and Russia
has a political environment that has been rife with corruption for decades (Bunn 2010, 32-33 and Joyner & Parkhouse
Because of its
chemical composition and refinement, HEU can be used easily to make crude
nuclear weapons even by non-experts (Norwegian Project Secretariat). Because of the ease with
2009, 216). Finally, there is the security risk of Highly Enriched Uranium-fueled reactors (HEUs).
which a weapon can be made out of HEU, it is easy to see why terrorist acquisition is a direct security risk. As of 2009,
about half of the 200 remaining reactors were still using HEU fuel, and do not have capability to be converted to lower
enriched uranium (LEU) (World Nuclear Association 2011). Most of these are in Russia, where the government has
invested little in research to convert their own reactors to LEU power or other alternatives (World Nuclear Association
2011). Further, and most alarming, is that the security at many of these HEU sites is inadequate to prevent theft of HEU,
making research reactors a prime target for terrorists seeking to obtain nuclear material (Bunn, 2010, 45). If a terrorist
group only acquires nuclear material, and not a functional weapon, they will have to successfully create a weapon that
they can detonate. Unfortunately, this is an achievable end that can be done with little resources or expertise. As
discussed above, Highly Enriched Uranium is pure enough that it can be made into a devastating weapon relatively easily,
and it is also the most likely nuclear material that terrorists would get their hands on. The perception of modern nuclear
weapons may be that they are highly technical instruments of warfare backed by complex science. While this may be true,
a crude nuclear weapon, one that takes little skill to create, would still be incredibly deadlycapable of destroying the
downtown of a major city (Bunn, 2010, 16). The process of building a weapon of this type is not entirely simple, and
anyone who wanted to construct such a device would need a technical team with at least some experience. However, in
comparison to the nuclear weapons manufactured today, a crude bomb would be a more feasible project, as it would not
have to comply with rigorous military and safety specifications. Thus, it is plausible to see that this kind of power is not
out of reach for dedicated terrorist groups, should they acquire nuclear material (Ferguson & Potter 2003, 116). Having
acquired nuclear material and created a weapon, the final obstacle a terrorist group would need to pass would be delivery
and detonation in the target location. Likely, this would involve them smuggling a bomb or device into the United States,
and then into a major city, undetected. Nuclear material is quite difficult to track, especially the small amounts that would
be needed for a crude weapon (Bunn 2010, 18). Journalists have repeatedly demonstrated the ease with which radioactive
Even with
the most advanced technology, HEU is among the most difficult kind of
radiological material to detect (Montgomery 2009, 79). Also, terrorists could use existing port and
materials can be transported and shielded from detection while traveling (Ferguson & Potter 2003, 141).
transport systems in place, as they are relatively unsecure. Customs and Border Patrol inspects only around 6% of cargo
containers entering the US (Medalia 2005). Even with increased security measures and Port Authority reorganization in
2003, there are still plausible scenarios for terrorist groups sneaking radioactive materials into the US via boat undetected
(Ferguson & Potter 2003, 300). Furthermore, terrorists could avoid this obstacle entirely by taking materials that were
already inside the US. Once inside the US, delivery and detonation to target site would also not be insurmountable. As
Matthew Bunn and E. P. Maslin write: The length of national borders, the diversity of means of transport, the vast scale of
legitimate traffic across borders, and the ease of shielding the radiation from plutonium or especially from HEU all operate
in favor of the terrorists. Building the overall system of legal infrastructure, intelligence, law enforcement, border and
customs forces, and radiation detectors needed to find and recover stolen nuclear weapons or materials, or to interdict
these as they crossnational borders, is an extraordinarily difficult challenge. (Bun & Maslin 2010) In order for a terrorist
group to be successful in carrying out a nuclear attack, many elements must come together. There is no doubt that the
end result of a nuclear terrorist attack would be terrible, so
the high impact possibility means steps should still be taken to prevent it. In
each link of the chain of attack, there are security measures that have been put in place, and continue to be upgraded.
make it into a usable weapon if they cannot themselves.
phys.net/7/1973/2007/ Atmos. Chem. Phys., 7, 19732002, 2007 Page 28 2000 O. B. Toon et al.:
Consequences of regional scale nuclear conflicts U.S. by a small nuclear state, or terrorists
supported by such a state, could generate casualties comparable to those once
predicted for a full-scale nuclear counterforce exchange in a superpower
conflict . Remarkably, the estimated quantities of smoke generated
about one megaton of nuclear explosives
by attacks totaling
perturbations (Robock et al., 2007). While we did not ex- tend our casualty and damage predictions to
include poten- tial medical, social or economic impacts following the initial explosions, such analyses have
been performed in the past for large-scale nuclear war scenarios (Harwell and Hutchin- son, 1985). Such a
study should be carried out as well for the present scenarios and physical outcomes.
engineer fissile material does not eliminate completely the possibility of nuclear terrorism. At the same
nuclear, radiological, chemical and biological material producing capabilities. In addition, one could be
secured
Attempts at stealing fissile material had already been discovered (Din & Zhiwei, 2003:
18).Numerous evidences confirm that terrorist groups had aspired to acquire fissile material for their
Qaeda was actively seeking an atomic bomb. Jamal Ahmad al-Fadl, a dissenter of Al Qaeda, in his trial
testimony had revealed his extensive but unsuccessful efforts to acquire enriched uranium for al-Qaeda
(Allison, 2010, January: 11). On November 9, 2001, Osama bin Laden claimed that we have chemical and
nuclear weapons as a deterrent and if America used them against us we reserve the right to use them (Mir,
2001, November 10). On May 28, 2010, Sultan Bashiruddin Mahmood, a Pakistani nuclear scientist
confessed that he met Osama bin Laden. He claimed that I met Osama bin Laden before 9/11not to give
him nuclear know-how, but to seek funds for establishing a technical college in Kabul (Syed, 2010, May
29). He was arrested in 2003 and after extensive interrogation by American and Pakistani intelligence
agencies he was released (Syed, 2010, May 29). Agreed, Mr. Mahmood did not share nuclear know-how
nuclear scientific bureaucracies. It also authenticates bin Ladens Deputy Ayman Zawahiris claim which he
made in December 2001: If you have $30 million, go to the black market in the central Asia, contact any
disgruntled Soviet scientist and a lot of dozens of smart briefcase bombs are available (Allison,2010,
January: 2).The covert meetings between nuclear scientists and al Qaeda members could not be
leader awake at night is the thought of a terrorist ending up with a weapon of mass destruction, especially
nuclear(Mueller, 2011, August 2). Indeed,
attacks. Daniel Whiteneck pointed out: Evidence suggests, for example, that al Qaeda might not
only use WMD simply to demonstrate the magnitude of its capability but that it might actually
welcome the escalation of a strong U.S. response, especially if it included catalytic effects on
governments and societies in the Muslim world. An adversary that prefers escalation regardless of the
consequences cannot be deterred (Whiteneck, 2005, summer: 187) since taking office, President Obama
has been reiterating that nuclear weapons represent the gravest threat to United States and
international security. While realizing that the US could not prevent nuclear/radiological terrorist attacks
singlehandedly, he launched 47an international campaign to convince the international community about
the increasing threat of nuclear/radiological terrorism. He stated on April 5, 2009: Black
market
trade in nuclear secrets and nuclear materials abound. The technology to
build a bomb has spread. Terrorists are determined to buy, build or steal one. Our
efforts to contain these dangers are centered on a global non-proliferation regime, but as more people and
nations break the rules, we could reach the point where the center cannot hold (Remarks by President
Barack Obama, 2009, April 5). He added: One terrorist with one nuclear weapon could unleash massive
destruction. Al Qaeda has said it seeks a bomb and that it would have no problem with using it. And we
know that there is unsecured nuclear material across the globe (Remarks by President Barack Obama,
2009, April 5). In July 2009, at the G-8 Summit, President Obama announced the convening of a Nuclear
Security Summit in 2010 to deliberate on the mechanism to secure nuclear materials, combat nuclear
smuggling, and prevent nuclear terrorism (Luongo, 2009, November 10). President Obamas
nuclear/radiological threat perceptions were also accentuated by the United Nations Security Council
(UNSC) Resolution 1887 (2009). The UNSC expressed its grave concern regarding the threat of nuclear
terrorism. It also recognized the need for all States to take effective measures to prevent nuclear
material or technical assistance becoming available to terrorists. The UNSC Resolution called for
universal adherence to the Convention on Physical Protection of Nuclear Materials and its 2005
Amendment, and the Convention for the Suppression of Acts of Nuclear Terrorism. (UNSC Resolution,
2009)The United States Nuclear Posture Review (NPR) document revealed on April6, 2010 declared that
terrorism
and proliferation are far greater threats to the U nited S tates and
international stability. (Security of Defense, 2010, April 6:i). The United States declared that it
reserved the right to hold fully accountable any state or group that supports or enables terrorist efforts
to obtain or use weapons of mass destruction, whether by facilitating, financing, or providing expertise or
safe haven for such efforts (Nuclear Posture Review Report, 2010, April: 12). This declaration underscores
the possibility that terrorist groups could acquire fissile material from the rogue states.
phys.net/7/1973/2007/ Atmos. Chem. Phys., 7, 19732002, 2007 Page 28 2000 O. B. Toon et al.:
Consequences of regional scale nuclear conflicts U.S. by a small nuclear state, or terrorists
supported by such a state, could generate casualties comparable to those once
predicted for a full-scale nuclear counterforce exchange in a superpower
conflict . Remarkably, the estimated quantities of smoke generated
about one megaton of nuclear explosives
by attacks totaling
perturbations (Robock et al., 2007). While we did not ex- tend our casualty and damage predictions to
include poten- tial medical, social or economic impacts following the initial explosions, such analyses have
been performed in the past for large-scale nuclear war scenarios (Harwell and Hutchin- son, 1985). Such a
study should be carried out as well for the present scenarios and physical outcomes.
***POLITICS***
come to recognize that 'drone' is a pejorative term," says Mario Mairena of the Association for Unmanned
Vehicle Systems International, which has more than 600 corporate members, including Northrop Grumman
and Raytheon. "People picture the unmanned aircraft systems that are used in-theater, and that scares
people, because all they see are these images of [the aircraft] used with missiles." Mairena laments that
media outlets often illustrate their stories about domestic drones with
pictures of Predator aircraft, while the FAA is working to expedite permits for much smaller
robots (under 25 pounds).
the US
Federal Aviation Administration (FAA) said that drones will soon be licensed
for law enforcement and commercial surveillance work . Krauthammer's words seem to
have captured the mood of a nation. Privacy fears are sparking a backlash against the
use of drones in civilian airspace. Seattle's police force was forced to abandon its drone
this country." So said commentator Charles Krauthammer on Fox News in May last year, after
programme last month, following anger from residents. Meanwhile, Virginia has imposed a two-year
moratorium on the use of drones by police and at least 13 other states are now deliberating similar anti-
prevent privacy invasion from the air. Their ideas range from the absurd -- wearing drone-camera-proof
clothing or using stunt kites to tangle their rotors -- to the more plausible -- jamming radio-control
frequencies or shooting the drones out of the sky. The FAA's announcement on 14 February that it is
pressing ahead with the opening of six test centres for civilian drones will only have reinforced such
sentiments. After Krauthammer's comments, pro-gun shock jock Alex Jones ran a video on his website,
Infowars.com, which shows him visiting a sprawling Texas ranch to practise shooting down the coming
wave of drones with assault rifles. Steve Hindi of Geneva, Illinois, who runs an animal rights charity, has
first-hand experience of what happens when those being watched by a drone decide to do something
about it. He uses eight-rotor drones, which cost about $8000 each, to expose a controversial type of
pigeon shoot in which birds are ejected from a box on the ground and shot with a shotgun. "We've had
drones shot down losing one permanently, and twice more they were hit but made it back," Hindi says.
He flies his drones beyond shotgun range but says the shooters are switching to rifles to down his drones.
"Mister Krauthammer is completely wrong. The shooters are like the people who wanted to ban the
internet in case people learned something," he says. "They are not folk heroes. They are cowards." So what
happens next? A shake-up of the law is needed, says Peter van Blyenburgh, head of drone trade body
Unmanned Vehicle Systems International, based in Paris, France. He says small drones, like the $300 Parrot
AR Drone, sold as a toy, could become a real neighbourhood nuisance, provoking risky shoot-downs. "Big
Texas landowners now talk of firing shoulder-fired rockets at drones," he says. "They are in cloud cuckoo
land." In May, the European Commission's Remotely Piloted Aircraft Systems panel, on which van
Blyenburgh sits, will investigate if the rules that govern radio-controlled model aircraft can be enforced on
users of "toy" drones. This could go some way towards addressing the concerns of privacy advocates, van
Blyenburgh believes. "Model planes cannot take a camera anywhere near to a house or garden," he says.
"If they do, the operator can't get public liability insurance. That could apply to these toys, too."
which calls for the Federal Aviation Administration (FAA) to accelerate the integration of unmanned aircraft
into the national airspace system by 2015.11 While numerous privacy and safety concerns continue to be
ironed out in preparation for the deployment of domestic UAVs, predictions secured by the FAA estimate
that as many as 30,000 drones will fill the nations skies by 2020.12
correlations between conservatism and security values, on the one hand, and liberalism and universalism
values, on the other (Braithwaite, 1998; Cohrs, Maes, Moschner, & Kielman, 2007; Morgan, Mullen, &
Skitka, 2010). Other evidence indicates that security values are positively associated with support for war,
whereas universalism values are negatively associated with support for war (Cohrs et al., 2005). Together,
these findings suggest that conservatives should support drone warfare because of its relevance to
security values, whereas liberals should oppose drone warfare because of its relevance to universalism
values.
politicians and the media play a role in shaping Americans attitudes toward
drone strikes, across party lines. For example, Margaret Sullivan (2012), public editor of the
New York Times, cites critics who attribute public support for drone strikes to uncritical reporting. Those
national security frame. In contrast, people would be more likely to evaluate drone strikes in terms of
universalism valuesand subsequently oppose the policyif they see the issue in terms of a human
costs frame. These frames are echoed in the arguments for and against drone strikes: supporters argue
that drone warfare is a necessary and efficient means of ensuring U.S. national security (e.g., Curtis,
2011), whereas critics have called on the United States to clarify, revise or dismantle its drone warfare
policy because of the resulting civilian casualties (e.g., Human Rights Watch, 2011).
***AFF COUNTERPLANS***
2AC states CP
Perm do both will be seen as government
implementing states lead - shields the link to politics
Perm do the CP - must be textually and functionally
competitive.
The federal government has expertise regulating drone
surveillance and should be used as the floor for future
state action.
Margot E. Kaminski, May 2013, Margot Kaminski is an Assistant Professor
at The Ohio State Law School and the former Executive Director of the
Information Society Project at Yale Law, Drone Federalism: Civilian Drones
and the Things They Carry, California Law Review vol. 4, pp. 57-74,
http://scholarship.law.berkeley.edu/cgi/viewcontent.cgi?
article=1007&context=clrcircuit, p. 59
Civilians will fly drones in the national airspace soon, if Congress has its way. 1
Drones can carry a wide array of privacy-invading technologies , from cameras
to heat sensors to sensors that detect movement to odor detectors that can sniff the air.2
Drones are also cheap to own and operate, compared to manned aircraft.3 States,
fearing dragnet surveillance, have started examining gaps in privacy law .4
Their fears are well-founded; a Seattle woman recently reported a drone hovering over her yard and
outside her third-story window.5 At the time of this Essays writing, over thirty states are actively
of law enforcement drone use, and the more limited subject matter of remote wiretapping by private
parties.7 However, governing civilian drone use on other matters, particularly video and image capture,
will be far more complex, and will more closely resemble the regulation of subject matter traditionally
covered by the states. Like all laws governing videos by private actors, drone surveillance laws will exist
between a privacy floor and a First Amendment ceiling. For now, I argue, this complex space of privacy
regulation is best left to the states.
location tracking, video surveillance, or use of biometric identification, or other new technologies, if these
are the concerns raised by drone surveillance. As noted, legislation governing video or photographic
surveillance by civilian drone users will be far trickier. It will have to navigate the Scylla and Charybdis of
privacy and the First Amendment. And if enacted federally, it will deviate from how privacy regulation has
historically been divided between the federal government and the states. There is no federal omnibus
privacy law in the United States. Federal privacy law consists of a series of sectoral regulations, enacted
somewhat haphazardly. One federal statute governs privacy in video watching, one governs drivers
license information, one governs health information, one governs financial privacy, and so on.45 Dronespecific regulation would add to this patchwork.
Regulating law enforcement drone use poses few countervailing dangers from
legislating thoughtlessly or in haste; such legislation would implicate Fourth
Amendment rights rather than First Amendment rights, so the worst case scenario is
that such legislation might eventually be found by courts not to protect
enough privacy.15 The more interesting and difficult privacy puzzle arises from drone use by private
not publicactors. Regulating civilian drone use will be treacherous, as such regulation potentially
threatens First Amendment rights. Because of that threat, civilian drone regulation may get overturned, as
courts sort out the scope of those First Amendment rights. Regulating civilian drone use on the federal
level thus risks being unconstitutional or, barring that, unstable. Several states are considering banning
civilian drone photography, or more broadly, civilian drone use.16 The proposed Texas Privacy Act, H.B.
912, bans drone photography without the consent of the property owner on whose property the image is
taken, and at the time of this Essays writing, has passed the Texas House and is up for debate in the state
Senate.17 Two proposed federal bills restrict the gathering of images and other information by civilians.18
One of these federal bills can be read to preempt state regulation of drone flights between states. 19 This
Essay argues that preemption of state drone regulation would be a mistake.
2AC Courts
Perm do the CP - agent CPs set a bad interp. for debate
allows the neg to infinitely break down processes allowing
bad CPs like signing statement or veto cheato which skirts
topic-based debate and education The means to
emphasize one of a group or type as the most outstanding
or prominent or to indicate uniqueness.
American Heritage Dictionary, 2009,
http://www.thefreedictionary.com/the
elevations at which UASs may fly, the area constituting curtilage, or possibly even observation
of the interior of ones residence, then the public is rendered almost completely
unprotected from aerial observation . Furthermore, the ability to use the devices to track
individuals outside of their homes is restricted only by a UASs flight time limitations. Finally, if UASs
ever become a part of general public use, there might not even be protection
from their observations inside the home. However, their surveillance abilities could be
restricted through four possible means. First, change could come through judicial
decision-making. Courts could decide to create new rules that limit the types of
observations that may be made by UASs. The Supreme Court has already created reasonable
protection for individuals inside the home. The Court may very well decide that individuals have a
reasonable expectation of privacy from observations made only a few feet outside their windows or above
police surveillance by UAS may become commonplace by the time such a case reaches the Supreme
Court. As discussed above, there might be even less chance of constitutional protection as technological
further benefit of change coming through the legislature is that changes can continue to be made in the
future as technology advances, and parts of the law that prove unworkable or impractical can be adjusted.
the proper balance can be achieved between allowing the police to use
a tool that makes them more efficient in their work and protecting the privacy
of citizens. However, this same benefit of legislative action can also be its downfall. It does not provide
Thereby,
the permanence of constitutional interpretation, and, therefore, the protections it affords can be eroded
over time. A third avenue of protection is through FAA regulation. This is less powerful than the above two
options but would not be insignificant. In Riley, the Court put particular emphasis on the fact that the
police officer was making an observation from unrestricted airspace.122 If the FAA restricted the ability of
UASs to fly below certain elevations, then their ability to track individuals and to look inside homes would
be diminished. Still, the FAA is concerned with safety, not privacy. Any regulations they craft regarding the
airspace UASs may occupy will be based on safety concerns. Furthermore, considering the fact that
Congress recently pushed the FAA to widen the door for UAS usage, it is unlikely that it will regulate
permissible airspace too severely. And highly restrictive regulations might not be desired, after all. If UAS
use is too restricted, then they will lose their usefulness to police departments. Finally, police department
policies are a simple tool that may be used to protect privacy concerns. Though policies are the least
permanent and formal of any of the above options, they can still be meaningful. A sergeant with the
Miami-Dade Police Department said that its UASs were only going to be used for emergencies, like car
crashes, and not surveillance.123 Even if restrictions on a police departments use of drones do not come
from above, local police departments may limit themselves. They are especially likely to do so when they
know that the members of their community have serious concerns about UAS use. Much like the direction
of technology, what protections the Fourth Amendment provides to citizens from drone observation is
unknown. The best that citizens concerned with their privacy protection can do is make sure that their
lawmakers and local police departments are aware of these concerns. If citizens are able to make their
concerns about unfettered drone usage well-known, a court would be hard-pressed to find the expectation
of privacy at the foundation of those concerns unreasonable.
the individual had a reasonable expectation of privacy, through the use of a visual or auditory enhancing
device, regardless of whether there is a physical trespass, if this image, sound recording, or other physical
impression could not have been achieved without a trespass unless the visual or auditory enhancing
the panelists were John Villasenor (Brookings Institution), Gregory S. McNeal (Pepperdine University School
of Law), Tracey Maclin (Boston University School of Law), and Chris Calabrese (American Civil Liberties
Union).214 Villasenor argues, both in his scholarly writing and testimony, that a judicial solution to the
problem will have fewer legal consequences as compared with congressional legislation.215 This argument
has now endorsed that view." John McCain's camp wasted no time in attacking, with one surrogate,
conservative Senator Sam Brownback of Kansas, calling Obama's gun control statement "incredible flipflopping." McCain advisor Randy Scheunemann was even tougher in a conference call Thursday. "What's
becoming clear in this campaign," Scheunemann said, is "that for Senator Obama the most important issue
in the election is the political fortunes of Senator Obama. He has demonstrated that there really is no
position he holds that isn't negotiable or isn't subject to change depending on how he calculates it will
in the general election campaign on foreign policy and national security, social issues and economics. His
position on the child rape death penalty case, for example, is in line with his record in Illinois of supporting
the death penalty. He is on less solid ground on the gun ban as his campaign said during the primary that
he believed the D.C. law was constitutional. A top legal adviser to Obama says both cases are consistent
with his previous positions. "I don't see him as moving in his statements on the death penalty or the gun
case," says Cass Sunstein, a former colleague of Obama's at the University of Chicago. Sunstein says
Obama is "not easily characterized" on social issues, and says the Senator's support for allowing
government use of the Ten Commandments in public, in some cases, is another example of his
unpredictability on such issues. On the issue of gun control, he says Obama has always expressed a belief
that the Second Amendment guarantees a private right to bear arms, as the court found Thursday. But
Obama's sudden social centrism would sound more convincing in a different context. Since he wrapped up
the primary earlier this month and began to concentrate on the independent and moderate swing voters
so key in a general election, Obama has consistently moved to the middle. He hired centrist economist
Jason Furman, known for defending the benefits of globalization and private Social Security accounts, to
the displeasure of liberal economists. On Father's Day, Obama gave a speech about the problem of
absentee fathers and the negative effects it has on society, in particular scolding some fathers for failing to
"realize that what makes you a man is not the ability to have a child it's the courage to raise one." Last
week, after the House passed a compromise bill on domestic spying that enraged liberals and civil
libertarians, Obama announced that though he was against other eavesdropping compromises in the past,
this time he was going to vote for it. Whether Obama's new centrist sheen is the result of flip-flopping or
reemphasizing moderate positions, the Supreme Court decisions have focused attention again on the role
of the court in the campaign season. McCain himself is vulnerable to charges of using the Supreme Court
for political purposes. Earlier this month, when the court granted habeas corpus rights to accused terrorist
prisoners at Guantanamo Bay, McCain attacked the opinion in particularly harsh language, though advisers
say closing the prison there is high on his list of actions to rehabilitate America's image around the world.
Kolbert, president of People For the American Way. "We're still only one justice away from a range of really
negative decisions that would take away rights that most Americans take for granted," she says. And
Obama's run to the center surely won't stop conservatives from using the
specter of a Democratic-appointed Supreme Court to try to rally support.
Court in implementing a constitutional vision associated with the nations dominant political party. What
makes its story more complicated (and interesting) is that the Republican Party has remained a coalition of
economic and cultural conservatives. The Republicans on the Court who would use the Constitution to
cultural agenda.
Obama
administration
interrogators with
write those rules into statute, the U nited S tates risks vacillating under the
vagaries of current law between overly permissive and overly restrictive
guidance. The general goals of new legislation should be threefold: To make it a crime beyond cavil to use
interrogation methods considered by reasonable people to be torture. The torture statute already does that to some
degree, but the fact that it arguably permitted techniques as severe as waterboarding suggests that it may require some
tightening. The key here is that the statute should cover all techniques the use of which ought to prompt criminal
prosecution. To subject CIA interrogators in almost all cases to rules that, without relaxing current laws ban on cruel,
inhuman, and degrading treatment, permit relatively mild forms of coercion that are properly off limits to military
interrogators. To allow the president, subject to strict safeguards, to authorize use of harsher methods short of torture
(as defined in the revised criminal statute) in true emergencies or on extraordinarily high-value captives such as KSM.
Only Congress can provide the democratic legitimacy and the finetuning of criminal laws that can deliver such a regime. Only
Congress can , for example, pass a new law making it clear
that waterboarding or
any other technique of comparable severity will henceforth be a federal crime. Only Congress can offer clear assurances
to operatives in the field that there exists a safe harbor against prosecution for conduct ordered by higher-ups in a crisis in
Then, in 1958, the passage of the Federal Aviation Act 64 gave the new
Federal Aviation Administration (FAA) the responsibility to set uniform rules
for the operation of aircraft in United States airspace.65 [17] According to FAA
regulations, fixed-wing aircraft must operate at least 1,000 feet above the
highest obstacle within a horizontal radius of 2,000 feet of the aircraft in
congested areas and 500 feet above the surface in non-congested areas.66
A helicopter may fly below the minimum safe altitudes prescribed for fixed-wing aircraft if it is operated
without hazard to persons or property on the surface.67 According to a 1981 FAA advisory circular,
recreational users of model aircraft may fly a sufficient distance from populated areas and may not fly in
the vicinity of full scale aircraft, into noise-sensitive areas such as parks, schools, hospitals, or churches, or
more than 400 feet above the surface.68
citizens safety when the drone is in use in national airspace.82 Private commercial
operators must receive a special airworthiness certificate in order to operate
a drone.83 [24] While drafting new regulations, the FAA is also creating a series of test
ranges and designating specific airspace throughout the country to be used
to operate drone flights in order to develop better certification and air traffic standards.84 These
test flights will assist the FAA in learning more about the safe operation of drones while traveling in
navigable U.S. airspace.85 Twenty-five applicants from twenty-four states applied to be test sites and of
those twenty-five applicants, the FAA chose Alaska, Nevada, New York, North Dakota, Texas, and Virginia to
host drone test sites.86
***AFF DISADVANTAGES***
2AC Spending
This disad doesnt make sense restricting drone
surveillance would reduce spending and reign in fiscal
irresponsibility.
Drones are set to take off this year until NAS integration
this DA links just as much to the status quo as the plan.
Drones are inefficient cost wise requires a large amount
of support personnel and results in fewer successful
surveillance patrols.
Chad C. Haddal and Jeremiah Gertler, July 8, 2010, Chad Haddal is a
coordinator specialist in immigration policy and Jeremiah Gertler is a
specialist in military aviation for the Congressional Research Service,
Homeland Security: Unmanned Aerial Vehicles and Border Surveillance,
Congressional Research Service, pp. 1-7,
http://www.dtic.mil/dtic/tr/fulltext/u2/a524297.pdf, p. 4-5
According to the CBP Inspector General, the costs of operating a UAV are
more than double the costs of operating a manned aircraft. This is because UAVs
require a significant amount of logistical support and specialized operator and
maintenance training. Operating one UAV requires a crew of up to 20 support
personnel. Additionally, the use of UAVs has resulted in fewer alien
apprehensions per flight hour than the use of manned aircraft.18 The high
comparative costs of operating a UAV may be offset somewhat by their comparatively lower unit costs. The
unit cost of UAVs varies widely, from $350,000 for the Shadow UAV to $4.5 million for the Predator.19 In
contrast, the unit cost for manned aircraft used along the border varies from $8.6 million for the CBP
Blackhawk helicopters to $36 million for Immigration and Custom Enforcements P-3 airplanes. However,
the benefit of the Blackhawks relative low unit cost is offset by its lack of
endurance, given its maximum flight time of 2 hours and 18 minutes.20
the UAV and the remote pilot. In many cases, interference led to accidents . A
possible issue for Congress could include whether testing should be expanded before any decisions are
No deficit collapse.
James K. Galbraith, 2011, professor at University of Texas at Austin, Lloyd
M. Bentsen Jr. Chair in Government/Business Relations at the LBJ School of
Public Affairs, Is the Federal Debt Unsustainable?, Levy Economics Institute
of Bard College, http://www.levyinstitute.org/pubs/pn_11_02.pdf
By general agreement, the federal budget is on an unsustainable path. Try typing the phrase into Google
News. When I did it, 19 of the first 20 hits referred to the federal debt.But what does this mean? The
phrase is often stated, but rarely defined clearly. One is led to suspect that some who use the phrase are
guided by vague fears, or even that they do not quite know what to be afraid of. After a brief discussion of
the major worries, this note will attempt to clarify one, and only one, critical issue: the actual behavior of
the public-debt-to-GDP ratio under differing economic assumptions through time. Some people
fear
that there may come a moment when the governments bond markets would
close, forcing a default or bankruptcy. But this betrays nonunderstanding of
both public finances and debt markets. The government controls the legaltender currency in which its bonds are issued and can always pay its bills with
cash. Apart (possibly) from the self-imposed politics of debt ceilings, a US government default on dollar
bonds is impossible, and the word bank- ruptcywhich is a court proceeding to protect private debtors
from their creditorsalso does not apply.A more plausible worry is inflation, alongside depreciation of the
dollar, either of which would reduce the real return on government bonds.1 There are reasons to fear
inflation: notably, the threat of rising energy prices in an oil-short world. And a lower dollar is not only
happening at the moment, its actual US government policy, at least with respect to one major currency:
theChinese renminbi. But neither oil-price inflation nor dollar devaluation constitutes default, and neither
would be intrinsi- cally unsustainable.Runaway inflation actually generated by the budget deficits is
harder to worry about. Except for commodities, the economy remains depressed, with nearly 9 percent
unemployment and falling home prices. Medical costs are a problembut theyre not a problem caused by
having any effect on real activity. Or perhaps that the world will someday suddenly panic and dump the
dollar for the euro, yen, or renminbi. That would mean selling US bonds en masse to buy (say) Italian
bonds. It could happen, maybe, on some political planet far from this one.2A more prosaic problem with
asserts that inflation will stay where it is now: around 2 percent. So one cant logically cite the inflation
threat and the CBO baseline at the same time. So far as I know, the CBO does not trouble itself to model
the exchange value of the dollar.What the
ratios if they produce such goodand, according to the CBO model sustainable results is another
mystery the CBO does not explain.
DHS allocations
DHS appropriations are already allocated for domestic
drone use.
Chad C. Haddal and Jeremiah Gertler, July 8, 2010, Chad Haddal is a
coordinator specialist in immigration policy and Jeremiah Gertler is a
specialist in military aviation for the Congressional Research Service,
Homeland Security: Unmanned Aerial Vehicles and Border Surveillance,
Congressional Research Service, pp. 1-7,
http://www.dtic.mil/dtic/tr/fulltext/u2/a524297.pdf, p. 2-3
Congress has directed DHS to study the feasibility of using UAVs and to
implement the technology to surveil the border on numerous occasions. In the
108th Congress, the Intelligence Reform and Terrorism Prevention Act (P.L. 108-458) included provisions
calling for a pilot program to study the use of these technologies, including UAVs, along the northern
The law also required DHS to present a plan within six months of
enactment to comprehensively monitor the southwest border with UAVs , and
to implement the plan as a pilot program as soon as funds are appropriated
for that purpose.12 The 2003 DOD Authorization Act (P.L. 108-136) required the President to issue a
border.
report on the use of unmanned aerial vehicles for support of homeland security missions. In the 109th
Positioning Systems (GPS) and video camera guidance for using UAVs to locate and identify toxic
substances (Hugh McDaid, Smart Weapons (New York: Barnes and Nobles Books, 1997), p. 9.). Lastly,
the
The FY2006
DHS Appropriations Act (P.L. 108-90) provided $35.2 million to establish a Northern
Border air wing and tasked the DHS Under Secretary of Border and
Transportation Security to devise a report outlining operational plans by which the Air and Marine
crash and other UAV mishaps by January 23, 2007, in the conference report to P.L. 109-295.
Operations Center (AMOC) would eliminate surveillance gaps affecting the northern border and western
United States. The act also provided $10 million for the use of UAVs. P.L. 108-334, the FY2006 Homeland
Security Appropriations Act, provided another $10 million for UAVs in border security. P.L. 109-295 provided
$20 million in FY2007 for DHSs use of UAVs. P.L. 110-161 provided $14.7 million in FY2008 for the
operation and maintenance of UAVs. In FY2009, Congress did not specify the amount of funding A&M
should put toward UAVs. The Supplemental Appropriations Bill of FY2010 (H.R. 4899) would include $32
million for the acquisition of two additional UAVs by A&M.