Professional Documents
Culture Documents
doors to break encrypted communications. A major element of the Times critique is that the NSAs domestic sweeps are not justified by the terrorist
threat they aim to prevent. At the end of August, in the midst of the Times assault on the NSA, the newspaper suffered what it described as a malicious
external attack on its domain name registrar at the hands of the Syrian Electronic Army, a group of hackers who support Syrian President Bashar Al
Assad. The papers website was down for several hours and, for some people, much longer. In terms of the sophistication of the attack, this is a big deal,
said Marc Frons, the Times chief information officer. Ten months earlier, hackers stole the corporate passwords for every employee at the Times, accessed
the computers of 53 employees, and breached the e-mail accounts of two reporters who cover China. We brought in the FBI, and the FBI said this had all
the hallmarks of hacking by the Chinese military, Frons said at the time. He also acknowledged that the hackers were in the Times system on election
night in 2012 and could have wreaked havoc on its coverage if they wanted. Illustration by Harry Campbell Such cyber-intrusions threaten corporate
being fought around the topic of whether it is needed to stop Al Qaeda from blowing things up. But the
fight tomorrow , and the more important fight, will be about whether it is necessary to
protect our ways of life embedded in computer networks. Anyone anywhere with a connection
to the Internet can engage in cyber-operations within the United States. Most truly harmful cyber-operations, however, require group effort and significant
skill. The attacking group or nation must have clever hackers, significant computing power, and the sophisticated softwareknown as malwarethat
cyber-intrusions.
Extinction
Fritz 9 (Researcher for International Commission on Nuclear Nonproliferation and
Disarmament, Jason, researcher for International Commission on Nuclear
Nonproliferation and Disarmament, former Army officer and consultant, and has a
master of international relations at Bond University, Hacking Nuclear Command
and Control, July,
http://www.icnnd.org/latest/research/Jason_Fritz_Hacking_NC2.pdf)
This paper will analyse the threat of
cyber terrorism in regard to nuclear weapons. Specifically, this research will use open source knowledge to identify the
structure of nuclear command and control centres, how those structures might be compromised through computer network operations, and how doing so would fit within
hackers to compromise the extremely low radio frequency once used by the US
Navy to send nuclear launch approval to submerged submarines . Additionally, the
alleged Soviet system known as Perimetr was designed to automatically launch
nuclear weapons if it was unable to establish communications with Soviet
leadership. This was intended as a retaliatory response in the event that nuclear
weapons had decapitated Soviet leadership; however it did not account for the
possibility of cyber terrorists blocking communications through computer network
operations in an attempt to engage the system. Should a warhead be launched, damage could be further enhanced
through additional computer network operations. By using proxies, multi-layered attacks could be
engineered . Terrorists could remotely commandeer computers in China and use
them to launch a US nuclear attack against Russia. Thus Russia would believe it
was under attack from the US and the US would believe China was responsible.
Further, emergency response communications could be disrupted , transportation
could be shut down, and disinformation, such as misdirection, could be planted,
thereby hindering the disaster relief effort and maximizing destruction .
Disruptions in communication and the use of disinformation could also be used to
provoke uninformed responses. For example, a nuclear strike between India and
Pakistan could be coordinated with Distributed Denial of Service attacks against
key networks, so they would have further difficulty in identifying what happened
and be forced to respond quickly. Terrorists could also knock out communications between these states so they cannot discuss the situation.
Alternatively, amidst the confusion of a traditional large-scale terrorist attack,
claims of responsibility and declarations of war could be falsified in an attempt to
instigate a hasty military response. These false claims could be posted directly on Presidential, military, and government websites. Emails could also be sent to the media and foreign governments using the IP addresses and e-mail accounts of government officials . A sophisticated and
all encompassing combination of traditional terrorism and cyber terrorism could
be enough to launch nuclear weapons on its own, without the need for
compromising command and control centres directly.
1nc k
their politics create the enabling conditions for executive overreach and
permanent warfare
Jabri 6 (Vivienne Jabri , Director of the Centre for International Relations and
Senior Lecturer at the Department of War Studies, Kings College London, War,
Security and the Liberal State, Security Dialogue, 37;47 )
LATE MODERN TRANSFORMATIONS are often conceived in terms of the sociopolitical and economic manifestations of change emergent from a globalized arena. What is less apparent is
how late modernity as a distinct era has impacted upon our conceptions of the social sphere, our lived experience, and our reflections upon the discourses and institutions that form the
taken-for-granted backdrop of the known and the knowable. The paradigmatic certainties of modernity the state, citizenship, democratic space, humanitys infinite capacity for
progress, the defeat of dogma and the culmination of modernitys apotheosis in the free-wheeling market place have in the late modern era come face to face with uncertainty, unpredictability and the gradual erosion of the modern belief that we could indeed simply move on, assisted by science and technology, towards a condition where instrumental rationality
would become the linchpin of government and human interaction irrespective of difference. Progress came to be associated with peace, and both were constitutively linked to the
universal, the global, the human, and therefore the cosmopolitan. What shatters such illusions is the recollection of the 20th century as the age of extremes (Hobsbawm, 1995), and the
21st as the age of the ever-present condition of war. While we might prefer a forgetting of things past, a therapeutic anamnesis that manages to reconfigure history, it is perhaps the
continuities with the past that act as antidote to such righteous comforts. How, then, do we begin to conceptualize war in conditions where distinctions disappear, where war is
conceived, or indeed articulated in political discourse, in terms of peace and security, so that the political is somehow banished in the name of governmentalizing practices whose
purview knows no bounds, whose remit is precisely the banishment of limits, of boundaries and distinctions. Boundaries, however, do not disappear. Rather, they become manifest in
every instance of violence, every instance of control, every instance of practices targeted against a constructed other, the enemy within and without, the all-pervasive presence, the
defences against which come to form the legitimizing tool of war. Any scholarly take on the present juncture of history, any analysis of the dynamics of the present, must somehow
render the narrative in measured tones, taking all factors into account, lest the narrator is accused of exaggeration at best and particular political affiliations at worst. When the late
modern condition of the West, of the European arena, is one of camps, one of the detention of groups of people irrespective of their individual needs as migrants, one of the incarceration
without due process of suspects, one of overwhelming police powers to stop, search and detain, one of indefinite detention in locations beyond law, one of invasion and occupation, then
reveal the operations of violence, but far more critical is the revelation of power and how power operates in the present. As the article argues, such an exploration raises fundamental
questions relating to the relationship of power and violence, and their mutual interconnection in the complex interstices of disrupted time and space locations. Power and violence are
hence separable analytical categories, separable practices; they are at the same time connected in ways that work on populations and on bodies with violence often targeted against
the latter so that the former are reigned in, governed. Where Michel Foucault sought, in his later writings, to distinguish between power and violence, to reveal the subtle workings of
power, now, in the present, this article will venture, perhaps the distinction is no longer viable when we witness the indistinctions I highlight above The article provides an analysis of the
place of war in late modern politics. In particular, it concentrates on the implications of war for our conceptions of the libertysecurity problematique in the context of the modern liberal
state. The first section of the article argues the case for the figure of war as analyser of the present. The second section of the article reveals the con- ditions of possibility for a distinctly
late modern mode of war and its imbri- cations in politics. The final section of the article concentrates on the political implications of the primacy of war in late modernity, and in
particular on possibilities of dissent and articulations of political agency. The aim through- out is to provide the theoretical and conceptual tools that might begin to meet the challenges
of the present and to open an agenda of research that concentrates on the politics of the present, the capacities or otherwise of contestation and accountability, and the institutional
locations wherein such political agency might emerge. The Figure of War and the Spectre of Security The so-called war against terrorism is constructed as a global war, transcend- ing
space and seemingly defiant of international conventions. It is dis- tinguished from previous global wars, including the first and the second world wars, in that the latter two have, in
historiography, always been analysed as interstate confrontations, albeit ones that at certain times and in particular locations peripherally involved non-state militias. Such distinc- tions
from the old, of course, will be subject to future historical narratives on the present confrontation and its various parameters. What is of interest in the present discussion is the distinctly
global aspect of this war, for it is the globality1 of the war against terrorism that renders it particularly relevant and pertinent to investigations that are primarily interested in the
war, rather
than being confined to its own time and space, permeates the normality of
the political process, has, in other words, a defining influence on elements
considered to be constitutive of liberal democratic politics, including
executive answerability, legislative scrutiny, a public sphere of discourse and inter- action,
equal citizenship under the law and, to follow liberal thinkers such as Habermas, political legitimacy based on free and
equal communicative practices underpinning social solidarity (Habermas, 1997). War
disrupts these elements and is a time of crisis and emergency. A war that
has a permanence to it clearly normalizes the exceptional, inscribing emergency into the daily
routines of social and political life. While the elements of war conflict, social fragmentation, exclusion may run silently
through the assemblages of control in liberal society (Deleuze, 1986), nevertheless the
persistent iteration of war into politics brings these practices to the fore,
and with them a call for a rethinking of wars relationship to politics. The distinctly
relation- ship between war and politics, war and the political processes defining the modern state. The initial premise of the present article is that
global spatiality of this war suggests particular challenges that have direct impact on the liberal state, its obligations towards its citizenry, and the extent to which it is implicated in
undermining its own political institutions. It would, however, be a mistake to assume that the practices involved in this global war are in any way anathema to the liberal state. The
spaces available for political contestation and dissent . Contemporary global politics is dominated by what
might be called a matrix of war2 constituted by a series of transnational practices that vari- ously target states, communities and individuals. These practices involve states as agents,
bureaucracies of states and supranational organizations, quasi-official and private organizations recruited in the service of a global machine that is highly militarized and hence led by
the United States, but that nevertheless incorporates within its workings various alliances that are always in flux. The crucial element in understanding the matrix of war is the notion of
practice, for this captures the idea that any practice is not just situated in a system of enablements and constraints, but is itself constitutive of structural continuities, both discursive
and institutional. As Paul Veyne (1997: 157) writes in relation to Foucaults use of the term, practice is not an agency (like the Freudian id) or a prime mover (like the relation of production), and moreover for Foucault, there is no agency nor any prime mover. It is in this recursive sense that practices (of violence, exclusion, intimidation, control and so on) become
structurated in the routines of institutions as well as lived experience (Jabri, 1996). To label the contemporary global war as a war against terrorism confers upon these practices a
certain legitimacy, suggesting that they are geared towards the elimination of a direct threat. While the threat of violence perpetrated by clandestine networks against civilians is all too
real and requires state responses, many of these responses appear to assume a wide remit of operations so wide that anyone interested in the liberties associated with the democratic
state, or indeed the rights of individuals and communities, is called upon to unravel the implications of such practices. When security becomes the overwhelming imperative of the
democratic state, its legitimization is achieved both through a discourse of balance between security and liberty and in terms of the protection of liberty.3 The implications of the
juxtaposition of security and liberty may be investigated either in terms of a discourse of securitization (the power of speech acts to construct a threat juxtaposed with the power of
professionals precisely to so construct)4 or, as argued in this article, in terms of a discourse of war. The grammars involved are closely related, and yet that of the latter is, paradoxically, the critical grammar, the grammar that highlights the workings of power and their imbrications with violence. What is missing from the securitization literature is an analytic of
war, and it is this analytic that I want to foreground in this article. The practices that I highlight above seem at first hand to constitute differ- ent response mechanisms in the face of what
is deemed to be an emergency situation in the aftermath of the events of 11 September 2001. The invasion and occupation of Iraq, the incarceration without due process of prisoners in
camps from Afghanistan to Guantnamo and other places as yet un- identified, the use of torture against detainees, extra-judicial assassination, the detention and deportation again
without due process of foreign nationals deemed a threat, increasing restrictions on refugees, their confine- ment in camps and detention centres, the construction of the movement of
peoples in security terms, and restrictions on civil liberties through domestic legislation in the UK, the USA and other European states are all represented in political discourse as
necessary security measures geared towards the protection of society. All are at the same time institutional measures targeted against a particular other as enemy and source of danger.
It could be argued that the above practices remain unrelated and must hence be subject to different modes of analysis. To begin with, these practices involve different agents and are
framed around different issues. Afghanistan and Iraq may be described as situations of war, and the incarceration of refugees as encompassing practices of security. However, what links
these elements is not so much that they constitute a constructed taxonomy of dif- ferentiated practices. Rather, what links them is the element of antagonism directed against distinct
monumental, for a perpetual war on a global scale has implications for political structures and political agency, for our conceptions of citizenship and the role of the state in meeting the
claims of its citizens,5 and for the workings of a public sphere that is increasingly global and hence increasingly multicultural. The matrix of war is centrally constituted around the
element of antago- nism, having an association with existential threat: the idea that the continued presence of the other constitutes a danger not just to the well-being of society but to
its continued existence in the form familiar to its members, hence the relative ease with which European politicians speak of migrants of particular origins as forming a threat to the idea
that may be conceptualized as a classical war of attrition, what I am referring to as the matrix of war is far more complex, for here we have a set of diffuse practices, violence, disciplinarity and control that at one and same time target the other typified in cultural and racial terms and instantiate a wider remit of operations that impact upon society as a whole. The
practices of warfare taking place in the immediate aftermath of 11 September 2001 combine with societal processes, reflected in media representations and in the wider public sphere,
where increasingly the source of threat, indeed the source of terror, is perceived as the cultural other, and specifically the other associated variously with Islam, the Middle East and
South Asia. There is, then, a particularity to what Agamben (1995, 2004) calls the state of exception, a state not so much generalized and generalizable, but one that is experienced
differently by different sectors of the global population. It is precisely this differential experience of the exception that draws attention to practices as diverse as the formulation of
interrogation techniques by military intelligence in the Pentagon, to the recent provisions of counter-terrorism measures in the UK,8 to the legitimizing discourses surrounding the
invasion of Iraq. All are practices that draw upon a discourse of legitimization based on prevention and pre-emption. Enemies constructed in the discourses of war are hence always
potential, always abstract even when identified, and, in being so, always drawn widely and, in consequence, communally. There is, hence, a profile to the state of exception and its
experience. Practices that profile particular communities, including the citizens of European states, create particular challenges to the self-understanding of the liberal democratic state
and its capacity, in the 21st century, to deal with difference. While a number of measures undertaken in the name of security, such as proposals for the introduction of identity cards in
the UK or increasing surveillance of financial transactions in the USA, might encompass the population as a whole, the politics of exception is marked by racial and cul- tural signification.
Those targeted by exceptional measures are members of particular racial and cultural communities. The assumed threat that under- pins the measures highlighted above is one that is
now openly associated variously with Islam as an ideology, Islam as a mode of religious identi- fication, Islam as a distinct mode of lifestyle and practice, and Islam as a particular brand
associated with particular organizations that espouse some form of a return to an Islamic Caliphate. When practices are informed by a discourse of antagonism, no distinctions are made
between these various forms of individual and communal identification. When communal profiling takes place, the distinction between, for example, the choice of a particular lifestyle
and the choice of a particular organization disappears, and diversity within the profiled community is sacrificed in the name of some pre- cautionary practice that targets all in the name
of security.9 The practices and language of antagonism, when racially and culturally inscribed, place the onus of guilt onto the entire community so identified, so that its indi- vidual
members can no longer simply be citizens of a secular, multicultural state, but are constituted in discourse as particular citizens, subjected to particular and hence exceptional practices.
When the Minister of State for the UK Home Office states that members of the Muslim community should expect to be stopped by the police, she is simply expressing the condition of the
present, which is that the Muslim community is particularly vulnerable to state scrutiny and invasive measures that do not apply to the rest of the citizenry.10 We know, too, that a
distinctly racial profiling is taking place, so that those who are physically profiled are subjected to exceptional measures. Even as the so-called war against terrorism recognizes no
boundaries as limits to its practices indeed, many of its practices occur at transnational, often indefinable, spaces what is crucial to understand, however, is that this does not mean
that boundaries are no longer constructed or that they do not impinge on the sphere of the political. The paradox of the current context is that while the war against terrorism in all its
manifestations assumes a boundless arena, borders and boundaries are at the heart of its operations. The point to stress is that these boundaries and the exclusionist practices that
sustain them are not coterminous with those of the state; rather, they could be said to be located and perpetually constructed upon the corporeality of those constructed as enemies, as
threats to security. It is indeed the corporeal removal of such subjects that lies at the heart of what are constructed as counter-terrorist measures, typified in practices of direct war, in
the use of torture, in extra-judicial incarceration and in judicially sanctioned detention. We might, then, ask if such measures constitute violence or relations of power, where, following
Foucault, we assume that the former acts upon bodies with a view to injury, while the latter acts upon the actions of subjects and assumes, as Deleuze (1986: 7093) suggests, a relation
of forces and hence a subject who can act. What I want to argue here is that violence is imbricated in relations of power, is a mode of control, a technology of governmentality. When the
population of Iraq is targeted through aerial bombardment, the consequence goes beyond injury and seeks the pacifica- tion of the Middle East as a political region. When legislative and
bureaucratic measures are put in place in the name of security, those targeted are categories of population. At the same time, the war against terrorism and the security discourses
limitless construction of the war against terrorism, its targeting of particular racial and cultural communities, that is the source of the challenge presented to the liberal democratic state.
analytic of war also encompasses the techniques of the military and their presence in the social sphere in particular, the control and regulation of bodies, timed pre- cision and
instrumentality that turn a war machine into an active and live killing machine. In the matrix of war, there is hence the level of discourse and the level of institutional practices; both are
mutually implicating and mutually enabling. There is also the level of bodies and the level of population. In Foucaults (1998: 152) terms: the biological and the historical are not consecutive to one another . . . but are bound together in an increasingly com- plex fashion in accordance with the development of the modern technologies of power that take life as their
not simply an isolated occurrence taking place as some form of interruption to an existing peaceful order. Rather, this peaceful order is imbricated with the elements of war, present as
continuities in social and political life, elements that are deeply rooted and enabling of the actuality of war in its traditional battlefield sense. This implies a continuity of sorts between
the disciplinary, the carceral and the violent manifestations of government.
1nc da
Hillary wins now
Page 4/25 (Susan, Poll: Trump, Clinton face divides in their parties even if they
win nominations,
http://www.usatoday.com/story/news/politics/elections/2016/04/25/suffolk-polltrump-clinton-party-divides-president-republican-democrat/83487862/)
November showdowns . In general-election matchups, Clinton would defeat
Trump by double digits and Sanders would beat him by more. At the moment, Clinton leads Trump,
50%-39%; Sanders leads him 52%-37%. Clinton leads Cruz, 49%-42%. The edge for Sanders over Cruz is wider, 50%-38%. Among the
Republicans, only Kasich would defeat Clinton, 46%-41%. A Sanders-Kasich race would be close, 44%-43%. Regardless of which
candidate they support, 50% of those surveyed say Clinton is the most
likely victor in November, almost double the 26% who predict Trump will
win the White House.
Dems need to be strong on terror the plan swings the election its the
most important issue
Katulis 4/27 (Brian, Why Donald Trumps Foreign Policy Resonatesand How to
Respond, http://blogs.wsj.com/washwire/2016/04/27/why-donald-trumps-foreignpolicy-resonates-and-how-to-respond/)
Donald Trump delivered a foreign policy speech just hours after his
victories in five states primaries
another important step toward
securing the Republican Partys nomination
he views foreign policy as
an opportunity and that he sees it as a vulnerability for his likely general
election opponent, Hillary Clinton Particularly in the wake of the Paris
attacks and the San Bernardino shootings
national security reemerged
as a core question in this election cycle In 2014
Republicans revived a
politics-of-fear approach on national security issues that worked to great
effect in 2002 and 2004 Trump has adapted that playbook
His speech
combined
his usual rhetoric about making America great again with criticisms of
Obamas presidency and of Hillary Clintons tenure
calling her
weak
mix of ideas Mr.
Trump put forward is unique
Mr. Trumps
calls
fit more with the views of right-wing neoconservatives
That
Tuesday night
suggests that
last year,
the
midterms,
had
. Mr.
Republican foreign policy and the partys fracture into many different camps over the past few years helped create the opening that Mr. Trump has seized.
Wednesday
Barack
as secretary of state,
and ineffective. In that sense, his remarks resembled critiques other Republican leaders have made of the Obama administration over the past eight years. But the
, and it defies simple categorization because the package is so scattered. At some points, Mr. Trumps anti-globalization themes and criticism of
trade deals sound as if he is making a play for Bernie Sanders supporters who are skeptical about the impact globalization has had on ordinary Americans economic well-being. Conversely,
to invest more in the U.S. military
. (How Mr.
Trump would do this while also addressing the U.S. debt, another issue he raised, he did not specify.) Overall, Mr. Trumps foreign policy approach suffers from inconsistencies and in some cases inaccuraciespoints that will be picked
apart in detail because there is so much thats easy to criticize. For example: Mr. Trump said Wednesday that he would strive for stability but a few minutes later spoke of the need for unpredictability in global affairs. He pledged to
t, who want to put U.S. needs first, and who think the U.S. cant change other countries and shouldnt try.
them mentality that Trump has offered particularly when talking about
immigrants and Muslimsis part of a
trend For Democrats
the best response would be to offer a clear alternative that reassures
Americans that the U.S. will defeat terrorism
the Obama administration
has spent more time arguing
Trumps foreign policy address
are likely to resonate
with many Americans
To defeat Trump
other
candidates have to win hearts and minds something that can be done only
by offering a
alternative
that can advance U.S. interests
Mr.
global
opponents,
and other threats and reduce economic inequality only by relying on values that Mr. Trump
emphatically rejects. This affirmative case and clear challenge to Mr. Trumps worldview would be sharper about what it seeks to achieve than
has
about what it would not do as opposed to what it has sought to achieve. Mr.
did not impress foreign policy experts, but its general themes
and almost certainly the swath of Republican primary voters who have been rabid Trump supporters for months. Its critical to keep that, and this, in mind: To win
the overall debate among the public, it wont be enough for anyone to just criticize Donald Trump and point out where he is wrong.
Mr.
politically,
clear, values-based
to Mr. Trump
in a messy world.
campaign. Americans shouldnt want nuclear weapons spreading around the world. When new states get them especially rogues such as North Korea
the risk of nuclear war increases . Even if America could avoid being
drawn into such a war, catastrophic harm wouldnt be confined to the
warring parties. Since World War II, efforts to keep nuclear weapons from spreading have been astonishingly successful. When China got
and Iran
the bomb in 1964, it became only the fifth nuclear power, after the United States, the Soviet Union, Britain, and France. No one but an extreme optimist at
the time would have predicted that, 50 years hence, the nuclear club would have only three (or maybe four) additional members. India, Pakistan, and
North Korea have all explosively tested nuclear weapons. Israel is widely believed to have them but hasnt said so. Why did non-proliferation work so well?
First, the United States and the Soviet Union actually shared interests in enforcing the 1970 Nuclear Non-Proliferation Treaty. Neither wanted any other
country to obtain nuclear weapons. And most countries understood that they were actually safer if they renounced such weapons in return for a similar
renunciation by their neighbors. The second main reason is that our allies trusted U.S. security commitments. They felt confident sheltering under
Americas so-called nuclear umbrella. Throughout the Cold War and beyond, U.S. presidents took pains to preserve that trust and confidence. To do so,
they exerted leadership, showed loyalty to our allies, safeguarded U.S. credibility, and preserved American military power in particular, the quality of
our nuclear weapons. President Obama did speak passionately about reducing the risks of nuclear war, but his actions undermined his goals. He dithered
as North Korea expanded its nuclear arsenal and the range of its missiles. He freed Iran of economic sanctions without requiring dismantlement of its
nuclear-weapons facilities. Meanwhile, other policies leading from behind, courtship of Russias President Putin, setting and then ignoring that red
line in Syria, slashing defense spending, and neglecting U.S. nuclear-weapons infrastructure all communicated to Americas friends abroad a lack of
resolution, of loyalty, of understanding, and of power. The bad effects are plain to see. A May 7, 2015, Wall Street Journal headline reads, Saudi Arabia
Considers Nuclear Weapons to Offset Iran. In South Korea on February 15 this year, Won Yoo-chul, the ruling partys floor leader, spoke favorably in
parliament of peaceful nuclear and missile programs for the sake of self-defense. He explained, We cannot borrow an umbrella from a neighbor
Russia over Ukraine. In his 2000 book The America We Deserve, Trump wrote that Europes conflicts were not worth American lives, and he touted the
money America could save by pulling back from Europe.
rather than an ally of paramount importance. He scorns Israel. He promises to be neutral between the Jewish state and enemies trying to destroy it. He
scorns U.S. law-of-war obligations under the Geneva Conventions, as when he boasted he would mistreat detainees and kill civilians. He now recants those
boasts, but he cant erase the picture he has created of himself as intemperate and unprincipled. He has made an electoral strategy of contradicting
himself, purposefully devaluing the currency of his words (its ironic that he berates the Chinese for devaluing their currency). He scoffs at accuracy and
shows no shame when he says false things. His message is that, as a great man, he shouldnt be held to anything he says. Its bad enough that President
1nc da
The NSA shares its information with the DEAs Special Operations Division
key to drug enforcement
Raycom 13 (Raycom News Service, subsidiary of WorldNow, a national software
news company, Dept. of Justice investigates DEA raids using NSA surveillance,
http://raycomgroup.worldnow.com/story/23079065/dept-of-justice-investigates-dearaids-using-nsa-surveillance?page=2&N=L)
The N ational S ecurity A gency is obtaining information via wiretaps and electronic
surveillance about common crimes involving Americans, which it then feeds to the D rug E nforcement
A gency and local law enforcement to make arrests. The Department of Justice, which controls the DEA, has said it is investigating the
drug agency's links to the NSA. The use of mass surveillance in drug crimes could help
explain why the DEA doubled the value of assets seized since 2001. According to a
report by Reuters released Monday, information obtained by the NSA is fed to a little-known
unit of the DEA, called the Special Operations Division . This unit is partnered with several other
government agencies as well, including the FBI, CIA, IRS, Immigration and Customs Enforcement; and Department of Homeland Security. The NSA
is supposed to use its surveillance powers to target terrorism. But through its vast network
of wiretaps and email surveillance , it is able to acquire information about lesser crimes, including
drugs . That information is then tipped off to the SOD arm of the DEA, and
(RNN) -
sometimes local law enforcement agencies, who then go after the suspect. However, the techniques utilized by the NSA and DEA are potentially in
violation of a defendant's Constitutional right to a fair trial. The people who get targeted through this process are unaware how the investigation began,
which makes it difficult to "review potential sources of exculpatory evidence - information that could reveal entrapment, mistakes or biased witnesses,"
Reuters said. To avoid legal hassles, the agencies use a technique called "parallel construction," which can be described as burying how the information
was obtained and constructing a new narrative about how the initial arrest was made. An example of this practice is, after receiving a tip, the SOD alerts
local police to be at a certain place at a certain time and look for a certain vehicle. If drugs were found in the vehicle, an arrest is made, and local police
say it was simply the result of a routine traffic stop, rather than a mass domestic surveillance apparatus. "Parallel construction is a law enforcement
technique we use every day," an anonymous DEA official told Reuters. "It's decades old, a bedrock concept." Drug raids worth nearly $1 billion per year
The DEA is a worldwide organization with 86 foreign offices in 67 countries. And most of the press its SOD has received had to do with international busts,
such as the arrest of Viktor Bout, the convicted Russian arms trafficker who inspired the Nicolas Cage movie Lord of War. Bout was arrested by SOD agents
in Thailand and brought to the U.S., where he was convicted of selling arms to the Revolutionary Armed Forces of Colombia, known as FARC. However,
the SOD also has been active within the U.S., helping the DEA conduct
hundreds of raids , arrest thousands of people and seize millions of dollars every year.
If the DEA is using NSA intelligence, the questionably legal technique hasn't necessarily led to more arrests. The
number of domestic arrests by the DEA has remained steady since 2001, with an average of about 31,000 per year, according to the Department of
there has been a large increase in the value of seized assets from
drug busts and raids. In 2001, the total value of seized assets by all federal agencies was less than $400 million, with the DEA
Justice. However,
accounting for about $200 million of that. By 2010, the total value in assets was nearly $1.8 billion - the largest amount in U.S. history - with the DEA
involved in nearly $800 million. The current incarnation of the NSA surveillance program, in which phone records and emails have been stored, began in
asset forfeiture laws, law enforcement agencies can seize cash, cars, property and anything else believed to be connected to a crime, with drugs being the
most common crime. The value of these assets is split between various government agencies. If NSA intelligence was used to find targets, the DEA's
policy-mandated use of parallel construction could hide how it obtained its leads. "Remember that the utilization of SOD cannot be revealed or discussed
in any investigative function," said a document obtained by Reuters presented to agents.
The SODs key to stop drug trafficking and cartels theyre effective now
but continued access to every resource possible, including surveillance is
key
DOJ 14 (United States Department of Justice, Drug Enforcement Administration, FY
2014 Performance Budget Congressional Submission,
https://www.justice.gov/sites/default/files/jmd/legacy/2014/05/16/deajustification.pdf)
DEA wages a battle that involves disrupting and dismantling significant
drug trafficking and money laundering organizations, attacking the economic basis
of the drug trade, and contributing to counterterrorism activities tied to drugs. The work is dangerous, time-consuming, and
multifaceted. DEA investigations are also becoming increasingly complex
and frequently require more sophisticated investigative techniques , such
as electronic surveillance . Furthermore, many of the crimes transcend standard
drug trafficking and are directly tied to issues of national and border security . Despite these
challenges, DEA has made great strides against the scourge of drug trafficking and
is proud of recent accomplishments. As an example, Project Below the Beltway targeted the Sinaloa
and Juarez Cartels and violent street gangs and their distribution network in America. This initiative began in May 2010 and culminated
Every day,
on December 6, 2012. The Sinaloa and Juarez Cartels are responsible for bringing multi-ton quantities of narcotics, including cocaine, heroin,
(FBI), U.S. Immigration and Customs Enforcement's (ICE) Homeland Security Investigations (HSI), the Internal Revenue Service (IRS), Customs and Border
Protection (CBP), the United States Marshals Service, the Office of Foreign Asset Control, and numerous state and local law enforcement entities.
disruptive arms races the result . Secretary Clinton has looked south and now sees an insurgency. Let's hope that the
United States can apply what it has recently learned about insurgencies to stop this one from getting out of control.
state or exercise outright control of at least part of a collapsed state. Or China might see American withdrawal as an opportunity to
play a greater role in the region, particularly in the Persian Gulf. The United States has a number of security objectives in the Middle
East and North Africa: protecting world access to the region's petroleum, limiting humanitarian disasters, preventing the proliferation
of weapons of mass destruction, limiting the operating space for al-Qaida and its affiliates, sustaining America's commitment to
long-standing partners and assuring Israel's security. Arguments that the U.S. can disengage from the region and recoup savings in
defense expenditures assume that petroleum exports would continue even in the event of domination of the region by a hostile
power like Iran or a competitor like China, state collapse or even the seizure of power by extremists. Whoever exercises power in the
region would need to sell oil. And the United States is moving toward petroleum self-sufficiency or, at least, away from dependence
on Middle Eastern oil. But even if the United States could get along with diminished petroleum exports from the Middle East, many
disengagement
from the Middle East and North Africa would entail significant risks for the U nited S tates. It would
other nations couldn't. The economic damage would cascade, inevitably affecting the United States. Clearly
be a roll of the strategic dice. South and Central Asia are a bit different, since large-scale U.S. involvement there is a relatively
recent phenomenon. This means that the regional security architecture there is less dependent on the United States than that of
South and Central Asia also includes two vibrant, competitive and nuclear-armed
powersIndia and Chinaas well as one of the world's most fragile nuclear states, Pakistan .
some other regions.
Writers like Robert Kaplan argue that South Asia's importance will continue to grow, its future shaped by the competition between
China and India. This makes America's security partnership with India crucial. The key issue is whether India can continue to
modernize its military to balance China while addressing its immense domestic problems with infrastructure, education, income
inequality and ethnic and religious tensions. If it cannot, the United States might have to decide between ceding domination of the
region to China or spending what it takes to sustain an American military presence in the region.
a decade of U.S. military operations, the region remains a cauldron of extremism and terrorism. America's future
role there is in doubt, as it looks like the United States will not be able to sustain a working security partnership with
Afghanistan and Pakistan in the future. At some point one or both of these states could collapse, with
extremist movements gaining control. There is little chance of another large-scale U.S. military intervention to
forestall state collapse, but Washington might feel compelled to act to secure Pakistan's nuclear
weapons if Islamabad loses control of them. The key decision for Washington might someday be whether to
tolerate extremist-dominated areas or states as long as they do not enable transnational terrorism. Could the United States allow a
Taliban state in parts of Afghanistan and Pakistan, for instance, if it did not provide training areas and other support to al-Qaida?
Most likely, the U.S. approach would be to launch raids and long-distance attacks on discernible al-Qaida targets and hope that such
a method best balanced costs and risks. The Asia-Pacific region will remain the most important one to the United States even in a
time of receding American power. The United States retains deep economic interests in and massive trade with Asia, and has been a
central player in the region's security system for more than a century. While instability or conflict there is less likely than in the
Middle East and North Africa, if it happened it would be much more dangerous because of the economic and military power of the
states likely to be involved. U.S. strategy in the Asia-Pacific has been described as a hub-and-spokes strategy "with the United
States as the hub, bilateral alliances as the spokes and multilateral institutions largely at the margins." In particular, the bilateral
"spokes" are U.S. security ties with key allies Australia, Japan and South Korea and, in a way, Taiwan. The United States also has
many other beneficial security relationships in the region, including with Singapore, Thailand, Malaysia and the Philippines.
America's major security objectives in the Asia-Pacific in recent years have been to discourage Chinese
provocation or destabilization as China rises in political, economic and military power, and to prevent the world's
most bizarre and unpredictable nuclear powerNorth Koreafrom unleashing Armageddon through some
miscalculation . Because the U.S. plays a more central role in the Asia-Pacific security
framework than in any other regional security arrangement, this is the region where disengagement or a
recession of American power would have the most far-reaching effect. Without an American
counterweight, China might become increasingly aggressive and provocative . This could
lead the other leading powers of the region close to Chinaparticularly Japan, South Korea and Taiwanto
abandon their historical antagonism toward one another and move toward some sort of de facto or even formal
alliance. If China pushed them too hard, all three have the technological capability to develop and
deploy nuclear weapons quickly. The middle powers of the region, particularly those embroiled in disputes with China
sort of
over the resources of the South China Sea, would have to decide between acceding to Beijing's demands or aligning themselves
with the Japan-South Korea-Taiwan bloc. Clearly North Korea will remain the most incendiary element of the Asia-Pacific system even
if the United States opts to downgrade its involvement in regional security. The parasitic Kim dynasty cannot survive forever. The
question is whether it lashes out in its death throes, potentially with nuclear weapons, or implodes into internal conflict. Either action
would require a significant multinational effort, whether to invade then reconstruct and stabilize the nation, or for humanitarian
relief and peacekeeping following a civil war. Even if the United States were less involved in the region, it would probably participate
Did the U.S. military deter the Soviet seizure of Western Europe, or did Moscow never intend to do that irrespective of what the
United States did? Unfortunately, the only way to definitively demonstrate the value of deterrence is to allow U.S. power to recede
and see if bad things happen. Until recently, the United States was not inclined to take such a risk. But now there is increasing
political support for accepting greater risk by moving toward a cheaper military without a full range of capabilities. Many Americans
in which a dominant state assures stability; balance of power systems where rivals compete but do not dominate; and cooperative
systems in which multiple states inside and sometimes outside a region maintain security and limit or contain conflict. Sub-Saharan
Africa is a weak cooperative system organized around the African Union. Even if there is diminished U.S. involvement, the subSaharan African security system is likely to remain as it is. Latin America might have once been a hegemonic system, at least in the
Caribbean Basin, but today it is moving toward becoming a cooperative system with a diminished U.S. role. The same is true of
M iddle E ast/ N orth A frica region, South and Central Asia and the Asia-Pacific will probably
move toward becoming balance of power systems with less U.S. involvement. Balances of power can prevent major
Europe. The
wars with adept diplomacy and when the costs of conflict are high, as in Europe during the Cold War, for instance. But
catastrophic conflicts can happen if the balance collapses, as in Europe in the summer of
1914. Power balances work best when one key state is able to shift sides to preserve the balance, but there is no candidate to
play this role in the emerging power balances in these three regions. Hence the balances in these regions will be
dangerously unstable .
1nc da
Surveillance checks bioweapon attack now
Pittenger 14
chemical,
grid? Each ambassador acknowledged the threat was greater today than
before 9/11, with al Qaeda and other extreme Islamist terrorists stronger, more
sophisticated, and having a dozen or more training camps throughout the Middle East
and Africa. As to the role of the United States, they felt our efforts were
primary and essential for peace and security around the world. Regarding the
intelligence-gathering, their consensus was, We want privacy, but we must
have your intelligence . As a European foreign minister stated to me, Without U.S. intelligence, we are blind.
We cannot yield to those loud but misguided voices who view the world as
void of the deadly and destructive intentions of unrelenting terrorists. The number of
terrorism-related deaths worldwide doubled between 2012 and 2013, jumping from 10,000 to
20,000 in just one year. Now is not the time to stand down. Those who embrace an
altruistic worldview should remember that vigilance and strength have
deterred our enemies in the past. That same commitment is required today to
defeat those who seek to destroy us and our way of life. We must make careful, prudent
use of all available technology to counter their sophisticated operations if
we are to maintain our freedom and liberties.
contends, we are suffering from the abuses of a "runaway intelligence [*1123] community." n9 The "mass warehousing of
everyone's data," n10 undertaken by what the Times calls the "surveillance state," is a danger to our civil liberties and the
Constitution itself. n11 Such views are not confined to the left. On the right, Senator Rand Paul, who is running for President, has
denounced government surveillance programs that he said have put our right to privacy under assault. n12 "I believe what you do
on your cellphone is none of [the government's] damn business," he told an audience at Berkeley to enthusiastic applause. n13
Senator Ted Cruz, also running for President, has joined in this chorus, explaining that the U.S. government is "implementing what
Advocates of this
line of thought advance four core arguments. First, surveillance in the
United States is dramatically expanding. n15 Second, the level of
surveillance is disproportionate to the threat faced. n16 Third, the [*1124]
surveillance operates without sufficient controls and outside the bounds of
law. n17 And fourth, the surveillance is ineffective. n18 In sum, opponents of the government's
appears to be an unprecedented and intrusive surveillance system on private American citizens." n14
surveillance efforts argue the efforts are ubiquitous, lawless, reckless, and unnecessary. What is one to make of these arguments?
surveillance in the past: from J. Edgar Hoover's depredations at the FBI; n20 to Richard Nixon's antics during Watergate; n21 to the
number of locations, including Afghanistan and Iraq. n23 Conflagrations in which the U.S. has significant interests are raging in the
Middle East and Africa: in Yemen, Syria, Libya, Somalia, and Nigeria; as well as in Europe, on the Russian frontier with Ukraine. n24
International terrorism continues to be a significant threat. n25 Indeed, the U.S. is seeing carnage around the world on a terrifying
scale, with massacres in far-flung locations arcing from Kenya n26 to Pakistan. n27 Terrorist outrages have also occurred in the heart
of Europe: in Norway n28 and in Paris. n29 In the U.S., the FBI has rolled up a long string of lone-wolf aspiring terrorists. n30 Some
they have not stopped in time. In 2009, Nidal Malik Hasan opened fire on troops at Fort Hood, Texas, killing 13 and maiming 32
others. n31 Two more terrorists whom the FBI did not succeed in apprehending in time, Tamerlan and Dzhokar Tsarnaev, were able
to [*1126] explode a bomb at the Boston Marathon in 2013, killing four and injuring scores more. n32 Far from being decimated, as
President Obama asserted in 2012, al Qaeda remains an active force. n33 Not only does al Qaeda continue to enjoy a number of
different sanctuaries where it can plot, n34 the world faces the fanatics of the Islamic State, who are spreading death and
destruction indiscriminately in the areas of Syria and Iraq where they rule, while also making inroads in, among other locations,
Libya, Yemen, Afghanistan, the Sinai peninsula, and the Gaza strip. n35 Given the record of these groups and their affiliates, there
can be little doubt that if they were to obtain weapons of mass destruction, they would not hesitate to use them to strike America if
the opportunity arose. During the 1990s, as terrorist attacks took place all over the world - including against American targets
abroad - a kind of complacency developed that such outrages could not happen here. n36 Of course, one did happen here and
peacetime is different from wartime, and equally axiomatic that the balance between security and liberty shifts when the [*1127] country is under threat. n38 Sometimes it shifts very
far. During the Civil War, President Lincoln embraced a view of executive power that allowed him, under the rubric of "public necessity," to negate rights we take to be fundamental,
including jury trial, free speech, and private property. n39 He usurped Congress's power to raise an army and borrow money on the credit of the U.S. government. n40 He suspended the
writ of habeas corpus. n41 In the case of Ex parte Merryman, he brazenly defied an order from the Chief Justice of the Supreme Court to release a prisoner. n42 Yet, he is remembered as
one of America's greatest presidents. During World War I, the government infringed on free speech and free assembly in ways that are shocking now. The Sedition Act of 1918
(technically not an act but amendments to the Espionage Act of 1917) made it a crime when the United States is at war to, among other things, "willfully utter, print, write, or publish any
disloyal, profane, scurrilous, or abusive language about the form of government of the United States." n43 For violating speech provisions of the act, the trade union leader Eugene Debs
was sentenced to ten years in prison and disenfranchised for life. n44 When he appealed to the Supreme Court, it upheld his conviction. n45 His case was but one of many that sent
Americans to jail for what the government regards today as mere political advocacy. During World War II, President Roosevelt signed the notorious Executive Order 9066 authorizing the
internment of Japanese-Americans. n46 He explained that it was required for "the successful prosecution of the war," which demands "every possible protection against espionage and
against sabotage to national-defense material, national-defense premises, and [*1128] national-defense utilities." n47 President Roosevelt also engaged in domestic wiretapping for
foreign intelligence purposes - in direct violation of statutory bans on the practice, which the Supreme Court has upheld. n48 Roosevelt wrote in a secret memo to Attorney General
Robert Jackson that he ""agreed with the broad purpose of the Supreme Court decision relating to wiretapping in investigations' but he was "convinced that the Supreme Court never
intended any dictum in the particular case which it decided to apply to grave matters involving the defense of the nation.'" n49 Yet there was no legal foundation for the exception
Roosevelt invoked here. n50 He violated the statute. n51 Roosevelt, too, is remembered as one of the great presidents. During the early Cold War, America experienced the excesses of
McCarthyism, wherein thousands of people were accused of being Communists or Communist sympathizers, and some were hauled before the House Committee on Un-American
Activities and accused of disloyalty and subversion. n52 Although Communist infiltration of the U.S. government was a genuine concern, as the cases of Alger Hiss and the Rosenbergs
illustrate, innocent people were also dragged into the net and suffered the destruction of their careers and, in some cases, imprisonment. n53 During the Vietnam era, there were
extensive abuses by the CIA and FBI that included the unauthorized opening of mail, warrantless interception of telegrams, harassment of civil rights activists, and other offenses that
were brought to daylight by the Church and Pike Committees in the 1970s. n54 This history is presented not to justify any of the egregious things that have occurred in the past, but to
provide a kind of benchmark. What is significant about the current state of affairs is that, in the aftermath of the deadliest and most destructive attack ever on America, the government
has not engaged a periodic wartime descent into extra-constitutional behavior. [*1129] If the Constitution has been infringed in the post-9/11 era, it has been on the margin where
reasonable people can disagree, and where one can find good lawyers and good federal judges on both sides of the dispute. America has learned a great deal from the dark spots of the
past. If anything, what is salient is how restrained, and careful to adhere to constitutional norms, the U.S. government has been in the face of genuine danger. The critics of surveillance
today charge lawlessness, but even if one were to accept their view, today's alleged transgressions cannot be compared to any of the darker episodes of the past. To begin with, in
responding to 9/11, Congress was at pains to avoid measures that would infringe on Americans' basic rights. n55 The act establishing the Department of Homeland Security came
complete with a statutorily mandated privacy officer and a civil liberties officer, both responsible for insuring that privacy and civil liberties are lawfully protected. n56 The intelligence
community statutorily established a privacy officer with similar responsibilities. n57 U.S. surveillance programs have been authorized by Congress; n58 subjected to Congressional
oversight; n59 repeatedly reauthorized by Congress; n60 and subjected to approval and oversight by independent Article III judges. n61 To be sure, the Patriot Act has been subjected to
numerous administrative and legal challenges. n62 And it is true that the Bush administration's Terrorist Surveillance Program, at least in its initial [*1130] configuration, appears to have
been in violation of the Foreign Intelligence Surveillance Act. In March 2004, this led to dramatic hospital bedside confrontation between acting Attorney General James Comey and White
House Counsel Alberto Gonzales in the intensive care ward where Attorney General John Ashcroft was recovering from serious illness. n63 Comey and other high-ranking Justice
Department officials threatened to resign en masse unless the violation was cured. n64 They prevailed. n65 What is significant here is that the system righted itself and the program was
brought under the rule of law. It is also true, of course, that in May 2015, the United States Court of Appeals for the Second Circuit ruled in ACLU v. Clapper that the National Security
Agency's bulk collection of telephony metadata, one of the surveillance programs exposed by renegade NSA contractor Edward Snowden, went beyond what Congress intended when it
enacted Section 215 of the Patriot Act. n66 But the court was careful to skirt any arguments that the program itself was unconstitutional. n67 It is also important to note that, in
contradistinction to, say, the imprisonment of Debs and others under the Sedition Act of 1918 or the internment of Japanese Americans, Section 215 did not generate a class of victims,
and it did not establish the dragnet nationwide surveillance of Americans the critics described. n68 The NSA established "minimization" procedures to ensure that a human being only
ever examined a minuscule fraction of what the government collected for counterterrorism purposes, and only in those cases where there existed reasonable and articulable suspicion
that the telephone numbers in question were connected to terrorist plotters. n69 Out of the millions upon millions of calls made in a recent year, the NSA only looked at some 300
telephone subscribers, and only because evidence suggested that a terrorist plot was afoot. n70 This is hardly a number that justifies calling America a "surveillance [*1131] state." It is
not without significance that the world's leading critic of the "American surveillance state," Edward Snowden, has chosen to accept political asylum in Russia and appears to be settling in
for a prolonged stay. n71 Russia may no longer be the totalitarian communist state it once was, but over the past decade, under the tutelage of Vladimir Putin - a former KGB officer - it
has been sliding ever deeper back into authoritarianism. n72 That authoritarianism is maintained in part by a domestic surveillance system that, in terms of scope and effectiveness,
puts ours to shame. n73 The FSB, the successor organization to the KGB, has invested in technology that allows it to collect and to store not just metadata but also the content of
communications. n74 The FSB uses that technology to engage in essentially unchecked surveillance of telephone calls, e-mail traffic, blogs, online bulletin boards, and websites. n75
Andrei Soldatov and Irina Borogan, two Russian journalists who put their lives at risk to write about this subject, conclude that over the past two years, thanks to technology, "the Kremlin
has transformed Russia into a surveillance state - at a level that would have made the Soviet KGB ... envious." n76 Of course, Russia is not a liberal democracy, and it certainly should
not set any sort of benchmark for America. But even when we compare the United States to other democracies, it becomes apparent how restricted and controlled the surveillance
practices of the U.S. government are. As Stuart Baker pointed out in a prepared statement before the U.S. Senate [*1132] Committee on the Judiciary, the Max Planck Institute conducted
a study that estimated the number of surveillance orders per 100,000 people in a number of Western countries. n77 While the figures are not directly comparable given different
definitions and methods of counting, the trend lines are starkly revealing. n78 "An Italian or Dutch citizen is over a hundred times more likely to be wiretapped by his government than an
American." n79 France, Germany, and Great Britain also conduct domestic surveillance in numbers that dwarf American practices. n80 There is thus a great deal of hypocrisy in the
criticism emanating from Europe about American surveillance practices. As Baker indicated, some of this is the result of the fact that, thanks to leaks and the fact that the U.S. reveals
much of what it is doing in laws that govern intelligence collection, Europeans know a great deal more about American surveillance than they do about their own practices. n81 The
Europeans engage in those practices for precisely the same reason the United States does: not to establish an Orwellian surveillance state, but to gain intelligence about a real and
and Civil Liberties Oversight Board, in its critical 2014 report about bulk collection of data, made a point of stressing that the
program was responsible for interdicting only a single case. n86 And the subject arrested in that case, the report stresses, was not a
violent terrorist but someone who was merely transmitting funds to a terrorist group. n87 But downplaying the significance of this
case seems inappropriate. It involved providing material support for the Somalia-based Harakat al-Shabaab al-Mujahideen, an
Islamic terrorist organization responsible for repeated incidents of mass slaughter in Kenya - this is not an insignificant arrest. n88
In any event, the Privacy and Civil Liberties Oversight Board is not the last
word on the subject of effectiveness. The National Research Council , responding
to a directive from President Obama, issued a study entitled Bulk Collection of Signals Intelligence Technical Options. n89 It
points to not one, but four cases in which the interception of signals
intelligence was critical to apprehending terrorists or intercepting plots . n90
Those include, in addition to the al Shabaab case: (1) he case of David Coleman Headley, who was one of the planners of the 2005
Mumbai attack; n91 (2) the case of Khaliz Quazzanni, who was arrested in 2010 for providing material support to al Qaeda and was
also suspected of plotting to bomb the New York Stock Exchange; n92 and (3) the case of Najibullah Zazi, who was arrested in 2009
Extinction
Mhyrvold 13 (Nathan, Began college at age 14, BS and Masters from UCLA, Masters and PhD,
Princeton Strategic Terrorism: A Call to Action, Working Draft, The Lawfare Research Paper Series
Research paper NO . 2 2013)
As horrible as this would be, such a pandemic is by no means the worst attack one can imagine, for several reasons. First,
most
many times, and no one has yet replied that such a manipulation couldnt
be done. This case is just one example. Many more are pouring out of scientific
journals and conferences every year. Just last year, the journal Nature published a controversial study done at the University of
WisconsinMadison in which virologists enumerated the changes one would need to make to a highly lethal strain of bird flu to make
devastating than HIV . It could silently penetrate the population to unleash its
deadly effects suddenly . This type of epidemic would be almost impossible to
combat because most of the infections would occur before the epidemic became
obvious. A technologically sophisticated terrorist group could develop such
a virus and kill a large part of humanity with it. Indeed, terrorists may not have to develop
it themselves: some scientist may do so first and publish the details. Given the rate at which
biologists are making discoveries about viruses and the immune system , at
some point in the near future, someone may create artificial pathogens that
could drive the human race to extinction . Indeed, a detailed specieselimination plan of this nature was openly proposed in a scientific journal.
The ostensible purpose of that particular research was to suggest a way to extirpate the malaria
mosquito, but similar techniques could be directed toward humans.16 When Ive talked to
molecular biologists about this method, they are quick to point out that it is slow and easily detectable and could be fought with
biotech remedies. If you challenge them to come up with improvements to the suggested attack plan, however, they have plenty of
ideas.
1nc finance
fact that multi-national operating in China and their state-owned-enterprises have been borrowing in U.S. dollars to lock in interest rates that were about 4
percent cheaper than from China banks. Chinas 6 percent devaluation means dollar-loans must be paid off with 6 percent more in Chinese yuan. China
has a habit of announcing annual growth rates that have miraculously been at a +7 percent compounded rate since 2008. But during the same period,
Chinas debt grew by about 12 percent compounded and doubled to over $30 trillion. That means that debt in China grew at about $5 trillion faster than
the official growth rate. Breitbart News reported that Lombard Street Researchs estimates that recalculating Chinas growth indicates that the real growth
rate has fallen to a 2.3 percent rate since mid-2014. That would mean Chinas debt grew by $7 trillion faster than the economy since 2008. Nobody knows
just how much companies operating in China have borrowed in U.S. dollars, but it is believed to be at least $3 trillion. That would mean every 1 percent
devaluation in the Chinese yuan, costs companies in China about $30 billion. Chinas economic miracle was powered by a 65 percent devaluing of their
yuan currency in the mid-1990s. But that was when the communist nation had a small economy, little debt, and iron fisted control. Chinas economy today
inev
Global de-dollarization inevitable their Zarate and Maund ev is too
outdated, doesnt assume recent policies
a) BRICS
Simha 16 [Rakesh Simha, New Zealand-based journalist and foreign affairs
analyst and former news editor for Financial Express, 1/21/16, U.S. currency
dictatorship: The struggle to end it, Independent Australia,
https://independentaustralia.net/business/business-display/us-currency-dictatorshipthe-struggle-to-end-it,8594]
India, the worlds third largest economy, and
Iran have agreed to settle their outstanding oil dues in rupees. Whats more, the
two countries may conduct all future trade in their national currencies. This
THE LAST time a country decided to dump the dollar in the oil business, the U.S. destroyed it. Now
follows an agreement between Iran and India in mid-2011 in which both sides decided to settle 45 per cent of Indias oil import bill in rupees and the
remaining 55 per cent in euros. In March 2012 the two countries inked the Rupee Payment Mechanism that allowed India to buy crude oil in its national
Mechanism was set up to skirt American economic sanctions on Tehran. Iranian oil forms a significant portion of Indias energy requirements. Similarly, the
war hegemony. It is the reserve currency status of the dollar that allows the U.S. to fund its endless wars and topple governments with impunity. Across
the Atlantic, the Bank of England is involved in interest rate fixing of an order of magnitude that makes corruption in developing countries look puny by
it suits
the West to have periodic booms and busts because it keeps the emergent
economies in turmoil. It keeps poor countries poor and the emergent ones
stuck in whats known as the middle income trap. In his luminary piece, Geopolitics of
comparison. Such financial manipulations and currency debasements are negatively and cyclically impacting the global economy. In fact,
Technology, Professor Anis Bajrektarevic very accurately diagnoses: the hydrocarbons and its scarcity phychologization, its monetization (and related
weaponization) is serving rather a coercive and restrictive status quo than a developmental incentive. That essentially calls not for an engagement but
compliance. It finally reads that the fossil fuels consumption (along with the policy of currency-choice and prizing it) does not only trigger one CC
Climate Change, but it also perpetuates another global CC planetary Competition and Confrontation (over finite resources) to which the MENA
calamities are only a tip of an iceberg. Therefore, this highly addictive petrol USD construct logically permits only a (technological) modernization which
is defensive, restrictive and reactive. No wonder that democracy is falling short. Indias central bank has invested a significant proportion of its
approximately $500 billion reserves in dollar denominated assets. Any sharp depreciation in the value of the dollar entails significant losses to this
b) china
c) russia
there are different opinions concerning worsening conditions for business, low demand for real estate and opportunities for domestic producers. The
interest rate is still 10 percent for deposits in tenge and 3 percent for deposits in foreign currency. Besides, the warranty for deposits is five million tenge if
we
consider that in the medium term, of course, dedollarisation processes will be
started . We expect that there wont be any depreciatory expectations. I think that dedollarisation is inevitable, he said, as reported by
you have deposits in foreign currency and 10 million tenge if you have deposits in tenge. In general, everyone makes their own decision, but
Zakon.kz. Kelimbetov stated that the Kazakh people are used to the $100 price for a barrel of oil, but today fewer amounts of monetary funds go into the
budget due to the decrease of the cost of goods exported by the state. He noted all social programmes were saved to the fullest extent, prices for social
Putin put
forward a bill which is to create conditions removing the U.S. dollar from
Russias trade exchanges with countries in the former Soviet Union and
creates a single financial market in the territory of Russia, Armenia,
Belarus, Kazakhstan, Kyrgyzstan, Tajikistan and other former Soviet
countries. A special mechanism would enable the nations to forego using dollars and euros as transaction currency.
goods are under control and the inflation rate in Kazakhstan wont exceed 8 percent in the medium term. Russian President Vladimir
Selden
Violence in the Middle East, border disputes in the South China Sea, and even the disruptions of the Occupy
clip, citizens are presumed to be too busy and too content to engage in protest or rebellion, and governments are thought to be
flush with revenues they can use to enhance their own stability by producing public goods or rewarding cronies, depending on the
analysis of contentious collective action has concentrated on political opportunity structures and dynamics of
protest and repression.
This paper helps fill that gap by rigorously re-examining the effects of
short-term variations in economic growth on the occurrence of several
forms of political instability in countries worldwide over the past few
decades. In this paper, we do not seek to develop and test new theories of political instability. Instead, we aim
to subject a hypothesis common to many prior theories of political instability to more careful empirical scrutiny. The
goal is to provide a detailed empirical characterization of the relationship between economic growth and political
We do so with
statistical models that use smoothing splines and multiple lags to allow for
nonlinear and dynamic effects from economic growth on political stability. We also do so with an
instability in a broad sense. In effect, we describe the conventional wisdom as seen in the data.
instrumented measure of growth that explicitly accounts for endogeneity in the relationship between political
As the results show, some of our findings are surprising. Consistent with conventional assumptions, we find that
social unrest and civil violence are more likely to occur and democratic regimes are more susceptible to coup
attempts around periods of slow economic growth. At the same time, our analysis shows no significant relationship
between variation in growth and the risk of civil-war onset, and results from our analysis of regime changes
contradict the widely accepted claim that economic crises cause transitions from autocracy to democracy. While we
the
relationship between economic growth and political stability is neither as
uniform nor as strong as the conventional wisdom(s) presume(s). We think
these findings also help explain why the global recession of 20082010
has failed thus far to produce the wave of coups and regime failures that
some observers had anticipated, in spite of the expected and apparent
uptick in social unrest associated with the crisis.
would hardly pretend to have the last word on any of these relationships, our findings do suggest that
1nc pca
Impact
Is ridiculous their ev says we need more positive control measures on
nukes they dont solve that
alt causes
Too many alt causes
PAGE 7 (Erin, Senior Fellow in Terrorism and Homeland Security at the Institute for
Global Security, Law & Policy at Case Western Reserve University School of Law and
Presidential Management Fellow, Balancing Individual Rights and Public Health
Safety during Quarantine: The U.S. and Canada, Case Western Reserve Journal of
International Law // AKONG)
Posse Comitatus has greatly diminished since the time it was passed. It has been
" repeatedly circumvented by subsequent legislation" and diminished or
disregarded by the actions of several presi- dents .79 Congress has
authorized military use in law enforcement for drug trafficking,
immigration, the Civil Disturbance Statutes, natural disasters, and
homeland defense .8 While the Posse Comitatus "remains a deterrent to prevent the
The strength of
unauthorized deployment of troops at the local level in response to what is purely a civilian law enforcement
turn
Military in domestic law enforcement involvement solves WMD terror
Trebilcock, Major in the U.S. Army Reserves 153rd Legal Services Organization,
2000 (csis.org/files/media/csis/pubs/trebilcock.pdf)
These early steps at injecting the
military into domestic law enforcement were perhaps misguided, primarily due to
missions
have a value
while in its state status also provides a great deal of flexibility to planners for homeland defense. National Guard troops may be actively employed in law
enforcement activities in addition to their military specialty. While to the untrained eye the distinction between a BDU13 clad Army Reservist and a BDU
clad National Guardsman may be nonexistent, the legal distinction between them is significant. During a natural disaster Army reservists or Guardsman
may both provide logistical aid such as water purification, medical assistance, and communications.14 However, due to the Posse Comitatus Act, it is only
the Guardsman in his/her State status that can take an active role in suppressing looting and in providing general security for an area that has lost
effective law enforcement control.15
1nc
No impact empirics prove
Feaver and Kohn 5 - Peter Feaver, professor of Political Science and Public Policy and the director of
the Triangle Institute for Security Studies at Duke University, and Richard H. Kohn, Professor of History at the
University of North Carolina, 2005, The Gap: Soldiers, Civilians, and Their Mutual Misunderstanding, in American
Defense Policy, 2005 edition, ed. Paul J. Bolt, Damon V. Coletta, Collins G. Shackelford, p. 339
Concerns about a troublesome divide between the armed forces and the society they serve
are hardly new and in fact go back to the beginning of the Republic . Writing in
the 1950s, Samuel Huntington argued that the divide could best be bridged by civilian society tolerating, if not embracing, the
conservative values that animate military culture. Huntington also suggested that politicians allow the armed forces a
substantial degree of cultural autonomy. Countering this argument, the sociologist Morris Janowitz argued that in a democracy,
military culture necessarily adapts to changes in civilian society, adjusting to the needs and dictates of its civilian masters.2 The
end of the Cold War and the extraordinary changes in American foreign and defense policy that resulted have revived the debate.
The contemporary
heirs of Janowitz see the all volunteer military as drifting too far
away from the norms of American society, thereby posing problems for civilian
control. They make tour principal assertions. First, the military has grown out of step
ideologically with the public, showing itself to be inordinately right-wing politically, and much more religious
(and fundamentalist) than America as a whole, having a strong and almost exclusive identification with the Republican Party.
Second, the
Alt causes
Schake 13 (Kori Schake, Ph.D., fellow at Stanford Universitys Hoover Institution,
formerly worked in the Departments of Defense and State, was the director of
defense strategy and requirements on the NSC, and held the distinguished chair in
international security studies at West Point, THIS QDR IS A BUDGET DOCUMENT,
NOT A STRATEGY DOCUMENT, War on the Rocks, 3-6-2014,
http://warontherocks.com/2014/03/this-qdr-is-a-budget-document-not-a-strategydocument/)
Secretary Hagel claims that the fiscal year (FY) 2015 defense budget matches our strategy to our resourcesOur
updated defense strategy, that is. Updated because the Chairman of the Joint Chiefs of Staff memorably said the
defense strategy could not be executed if a single dollar was cut from the budget, right before Congress cut about
$50 billion of them. The only update in this Quadrennial Defense Review from earlier strategic guidance looks to
consist of narrowing the force-sizing demand to defeat a regional adversary while imposing unacceptable costs on
another. Otherwise its all the usual about the world becoming more volatile, global connectedness, building partner
capacity, rebalancing to Asia without diminishing effort anywhere else, the need for exceptional agility in our
forces and efficiencies in the defense effort. Theres lots of talk about innovation, but little evidence of itthe QDR
details forces that would be cut if sequestration goes into effect, but does not explore different ways of achieving
our defense objectives. Even this updated strategy is, by Hagels own admission, unexecutable without $115 billion
more than the top line legislated in 2010 (separate from the $26 billion Opportunity, Growth, and Security
Initiative submitted as a wish list along with the budget itself). That completely negates the $113 billion in cuts
that the Presidents budget imposes. So, theyre actually cutting nothing. The Defense Department has had three
budget cycles to bring its spending into line with the law, andeven with an $80 billion annual slush fund of war
operationsit has not complied. Hagel says it would have been irresponsible not to request these additional
resources. That twists the argument: it was irresponsible not to develop a strategy consistent with available
unacceptable dangers be incurred? What missions ought we to stop doing and stop preparing for in order to ensure
we are able to meet our highest priorities? Where do redundancies exist that can be eliminated to free up
resources? The Department of Defense claimed that the QDR would initiate a serious debate about risk. While the
press statements emphasize greater risk in carrying out the strategy, theres no actual discussion in the QDR about
how risk is assessed. The QDR does say we continue to experience gaps in training and maintenance over the near
term and will have a reduced margin of error in dealing with risks of uncertainty, but does not explain how different
choices might aggravate or mitigate those risks. If DOD actually wants a debate about where to accept risk
instead of simply brandishing it as a threat to budget hawksit will need to establish a metric for evaluating risk.
Secretary Hagel claims that the QDR prioritizes Americas highest security interests by focusing on three strategic
pillars: defending the homeland against all threats; building security globally by projecting U.S. influence and
deterring aggression; and remaining prepared to win decisively against any adversary should deterrence fail. It is
difficult to discern how these three fundamental purposes of defense activity constitute prioritiesthey comprise
the entirety of the defense effort. What program or activity could not be justified on their bases? The purpose of
trading and, if need be, public shaming, to get Senator Kelly Ayotte off her hobby horse about the A-10s? Where is
Where
is the orchestration of presidential involvement to raise the political
stakes? That ought not be the uniformed militarys job; and in any event,
the Obama White House has selected service chiefs who demonstrably
cannot deliver that kind of political heft. If Congress is to be cajoled into doing the right
the flinty insistence that continuing the galloping pace of military entitlements is creating a hollow force?
things, it needs to be confronted politician-to-politician. That Secretary Hagel sent the third echelon and a press
to attack the legislative branch for any shortfalls of funding they have no
right to expect receiving. Secretary Hagels press release sternly intones that it would be dishonest
and irresponsible to present a QDR articulating a strategy disconnected from the reality of resource constraints. A
strategy must have the resources for its implementation. This is a welcome acceptance of responsibility, overdue
from a department submitting its first budget consistent with the law that has been in force for nearly three years.
It would be a lot more persuasive if Hagel had submitted a budget consistent with the top line or had done the hard
political work of ensuring legislative support for his priorities. The QDR itself gives the right refutation to DODs
strategy: the longer critical decisions are delayed in the hope that budget caps will be raised, the more difficult
and painful those decisions will be to implement, and the more damaging they will be to our ability to execute the
strategy. Exactly.