Thursday Mini-debate – Terror Disad Explanations



Download 115.58 Kb.
Date conversion20.04.2016
Size115.58 Kb.

Thursday Mini-debate – Terror Disad



Explanations



Background information


We will select one person to be neg… and one person to Aff. Most of you will wind up judging the debate – but it will help the discussion if everyone prepares for the debate.

For this exercise, it might make more sense to initially prepare to be neg. In fact, given that the 1NC and 2AC are already written for you (below), it probably makes the most sense to prepare as though you are the 2NC.


Modified Speech times


This is a mini-debate – so the speech times will be shortened.

We will also add cross-ex – so think about some questions that you might ask.

We will ask the 1NC to read to politics shell (below) – and we won’t time it. But, we will ask the students that were not selected to flow.

After the 1NC finishes, the Aff student will cross-ex for 90 seconds.

The 2AC will read the answers (also below). We won’t time this either – but we’ll again ask everyone to flow.

After the 2AC ends. The Neg student will cross-ex for 90 seconds.

From that point forward – here are the times:



  • 2NC – up to five minutes. For this mini-debate, the 2NC only needs to address the politics disad.

  • Cx of 2NC – 90 seconds

  • 1AR – up to 2 minutes.

  • 2NR – up to 2:30

  • 2AR (if we decide to go this far) – up to 2:30


Details on the 1AC


In this hypothetical, the Affirmative plan was from the packet materials. The plan text reads:

Bulk collection of domestic metadata by United States federal intelligence agencies – including internet, email, and Skype data - should cease.

In this hypothetical, the Affirmative opponent read two advantages from the packet:



  • The Privacy advantage (longer version)

  • Global Internet Freedom Advantage (econ version).


1NC Shell



Uniqueness – Domestic surveillance successfully checks terror incidents now. Prefer longitudinal studies.


Boot ‘13

Max Boot is a Senior Fellow in National Security Studies at the Council on Foreign Relations. In 2004, he was named by the World Affairs Councils of America as one of "the 500 most influential people in the United States in the field of foreign policy." In 2007, he won the Eric Breindel Award for Excellence in Opinion Journalism. From 1992 to 1994 he was an editor and writer at the Christian Science Monitor. Boot holds a bachelor's degree in history, with high honors, from the University of California, Berkeley and a master's degree in history from Yale University. Boot has served as an adviser to U.S. commanders in Iraq and Afghanistan. He is the published author of Invisible Armies: An Epic History of Guerrilla Warfare from Ancient Times to the Present. From the article: “Stay calm and let the NSA carry on” - LA Times – June 9th - http://articles.latimes.com/2013/jun/09/opinion/la-oe-boot-nsa-surveillance-20130609



After 9/11, there was a widespread expectation of many more terrorist attacks on the United States. So far that hasn't happened. We haven't escaped entirely unscathed (see Boston Marathon, bombing of), but on the whole we have been a lot safer than most security experts, including me, expected. In light of the current controversy over the National Security Agency's monitoring of telephone calls and emails, it is worthwhile to ask: Why is that? It is certainly not due to any change of heart among our enemies. Radical Islamists still want to kill American infidels. But the vast majority of the time, they fail. The Heritage Foundation estimated last year that 50 terrorist attacks on the American homeland had been foiled since 2001. Some, admittedly, failed through sheer incompetence on the part of the would-be terrorists. For instance, Faisal Shahzad, a Pakistani American jihadist, planted a car bomb in Times Square in 2010 that started smoking before exploding, thereby alerting two New Yorkers who in turn called police, who were able to defuse it. But it would be naive to adduce all of our security success to pure serendipity. Surely more attacks would have succeeded absent the ramped-up counter-terrorism efforts undertaken by the U.S. intelligence community, the military and law enforcement. And a large element of the intelligence community's success lies in its use of special intelligence — that is, communications intercepts. The CIA is notoriously deficient in human intelligence — infiltrating spies into terrorist organizations is hard to do, especially when we have so few spooks who speak Urdu, Arabic, Persian and other relevant languages. But the NSA is the best in the world at intercepting communications. That is the most important technical advantage we have in the battle against fanatical foes who will not hesitate to sacrifice their lives to take ours. Which brings us to the current kerfuffle over two NSA monitoring programs that have been exposed by the Guardian and the Washington Post. One program apparently collects metadata on all telephone calls made in the United States. Another program provides access to all the emails, videos and other data found on the servers of major Internet firms such as Google, Apple and Microsoft. At first blush these intelligence-gathering activities raise the specter of Big Brother snooping on ordinary American citizens who might be cheating on their spouses or bad-mouthing the president. In fact, there are considerable safeguards built into both programs to ensure that doesn't happen. The phone-monitoring program does not allow the NSA to listen in on conversations without a court order. All that it can do is to collect information on the time, date and destination of phone calls. It should go without saying that it would be pretty useful to know if someone in the U.S. is calling a number in Pakistan or Yemen that is used by a terrorist organizer. As for the Internet-monitoring program, reportedly known as PRISM, it is apparently limited to "non-U.S. persons" who are abroad and thereby enjoy no constitutional protections. These are hardly rogue operations. Both programs were initiated by President George W. Bush and continued by President Obama with the full knowledge and support of Congress and continuing oversight from the federal judiciary. That's why the leaders of both the House and Senate intelligence committees, Republicans and Democrats alike, have come to the defense of these activities. It's possible that, like all government programs, these could be abused — see, for example, the IRS making life tough on tea partiers. But there is no evidence of abuse so far and plenty of evidence — in the lack of successful terrorist attacks — that these programs have been effective in disrupting terrorist plots. Granted there is something inherently creepy about Uncle Sam scooping up so much information about us. But Google, Facebook, Amazon, Twitter, Citibank and other companies know at least as much about us, because they use very similar data-mining programs to track our online movements. They gather that information in order to sell us products, and no one seems to be overly alarmed. The NSA is gathering that information to keep us safe from terrorist attackers. Yet somehow its actions have become a "scandal," to use a term now loosely being tossed around. The real scandal here is that the Guardian and Washington Post are compromising our national security by telling our enemies about our intelligence-gathering capabilities. Their news stories reveal, for example, that only nine Internet companies share information with the NSA. This is a virtual invitation to terrorists to use other Internet outlets for searches, email, apps and all the rest. No intelligence effort can ever keep us 100% safe, but to stop or scale back the NSA's special intelligence efforts would amount to unilateral disarmament in a war against terrorism that is far from over.

(Note to students: a “longitudinal study” is research carried out over an extended period of time. In this case, several years.)


Link – curtailing surveillance boosts terror risks. That risk’s serious and underestimated.


Lewis ‘14

James Andrew Lewis is a senior fellow and director of the Strategic Technologies Program at the Center for Strategic and International Studies in Washington, D.C., where he writes on technology, security, and the international economy. Before joining CSIS, he worked at the US Departments of State and Commerce as a Foreign Service officer and as a member of the Senior Executive Service. His diplomatic experience included negotiations on military basing in Asia, the Cambodia peace process, and the five-power talks on arms transfer restraint. Lewis received his Ph.D. from the University of Chicago. “Underestimating Risk in the Surveillance Debate” - CENTER FOR STRATEGIC & INTERNATIONAL STUDIES - STRATEGIC TECHNOLOGIES PROGRAM – December - http://csis.org/publication/underestimating-risk-surveillance-debate



Americans are reluctant to accept terrorism is part of their daily lives, but attacks have been planned or attempted against American targets (usually airliners or urban areas) almost every year since 9/11. Europe faces even greater risk, given the thousands of European Union citizens who will return hardened and radicalized from fighting in Syria and Iraq. The threat of attack is easy to exaggerate, but that does not mean it is nonexistent. Australia’s then-attorney general said in August 2013 that communications surveillance had stopped four “mass casualty events” since 2008. The constant planning and preparation for attack by terrorist groups is not apparent to the public. The dilemma in assessing risk is that it is discontinuous. There can be long periods with no noticeable activity, only to have the apparent calm explode. The debate over how to reform communications surveillance has discounted this risk. Communications surveillance is an essential law enforcement and intelligence tool. There is no replacement for it. Some suggestions for alternative approaches to surveillance, such as the idea that the National Security Agency (NSA) only track known or suspected terrorists, reflect wishful thinking, as it is the unknown terrorist who will inflict the greatest harm.

Vigilance link - Strong intel gathering’s key to discourages initiation of BW attacks.


Pittenger ‘14

US Rep. Robert Pittenger, chair of Congressional Task Force on Terrorism, “Bipartisan bill on NSA data collection protects both privacy and national security” - Washington Examiner, 6/9/14, http://washingtonexaminer.com/rep.-robert-pittenger-bipartisan-bill-on-nsa-data-collection-protects-both-privacy-and-national-security/article/2549456?custom_click=rss&utm_campaign=Weekly+Standard+Story+Box&utm_source=weeklystandard.com&utm_medium=referral



This February, I took that question to a meeting of European Ambassadors at the Organization for Security and Cooperation in Europe. During the conference, I asked three questions: 1. What is the current worldwide terrorist threat? 2. What is America’s role in addressing and mitigating this threat? 3. What role does intelligence data collection play in this process, given the multiple platforms for attack including physical assets, cyber, chemical, biological, nuclear and the electric grid? Each ambassador acknowledged the threat was greater today than before 9/11, with al Qaeda and other extreme Islamist terrorists stronger, more sophisticated, and having a dozen or more training camps throughout the Middle East and Africa. As to the role of the United States, they felt our efforts were primary and essential for peace and security around the world. Regarding the intelligence-gathering, their consensus was, “We want privacy, but we must have your intelligence.” As a European foreign minister stated to me, “Without U.S. intelligence, we are blind.” We cannot yield to those loud but misguided voices who view the world as void of the deadly and destructive intentions of unrelenting terrorists. The number of terrorism-related deaths worldwide doubled between 2012 and 2013, jumping from 10,000 to 20,000 in just one year. Now is not the time to stand down. Those who embrace an altruistic worldview should remember that vigilance and strength have deterred our enemies in the past. That same commitment is required today to defeat those who seek to destroy us and our way of life. We must make careful, prudent use of all available technology to counter their sophisticated operations if we are to maintain our freedom and liberties.

Bioterror attacks cause extinction


Mhyrvold ‘13

Nathan, Began college at age 14, BS and Masters from UCLA, Masters and PhD, Princeton “Strategic Terrorism: A Call to Action,” Working Draft, The Lawfare Research Paper Series Research paper NO . 2 – 2013



As horrible as this would be, such a pandemic is by no means the worst attack one can imagine, for several reasons. First, most of the classic bioweapons are based on 1960s and 1970s technology because the 1972 treaty halted bioweapons development efforts in the United States and most other Western countries. Second, the Russians, although solidly committed to biological weapons long after the treaty deadline, were never on the cutting edge of biological research. Third and most important, the science and technology of molecular biology have made enormous advances, utterly transforming the field in the last few decades. High school biology students routinely perform molecular-biology manipulations that would have been impossible even for the best superpower-funded program back in the heyday of biological-weapons research. The biowarfare methods of the 1960s and 1970s are now as antiquated as the lumbering mainframe computers of that era. Tomorrow’s terrorists will have vastly more deadly bugs to choose from. Consider this sobering development: in 2001, Australian researchers working on mousepox, a nonlethal virus that infects mice (as chickenpox does in humans), accidentally discovered that a simple genetic modification transformed the virus.10, 11 Instead of producing mild symptoms, the new virus killed 60% of even those mice already immune to the naturally occurring strains of mousepox. The new virus, moreover, was unaffected by any existing vaccine or antiviral drug. A team of researchers at Saint Louis University led by Mark Buller picked up on that work and, by late 2003, found a way to improve on it: Buller’s variation on mousepox was 100% lethal, although his team of investigators also devised combination vaccine and antiviral therapies that were partially effective in protecting animals from the engineered strain.12, 13 Another saving grace is that the genetically altered virus is no longer contagious. Of course, it is quite possible that future tinkering with the virus will change that property, too. Strong reasons exist to believe that the genetic modifications Buller made to mousepox would work for other poxviruses and possibly for other classes of viruses as well. Might the same techniques allow chickenpox or another poxvirus that infects humans to be turned into a 100% lethal bioweapon, perhaps one that is resistant to any known antiviral therapy? I’ve asked this question of experts many times, and no one has yet replied that such a manipulation couldn’t be done. This case is just one example. Many more are pouring out of scientific journals and conferences every year. Just last year, the journal Nature published a controversial study done at the University of Wisconsin–Madison in which virologists enumerated the changes one would need to make to a highly lethal strain of bird flu to make it easily transmitted from one mammal to another.14 Biotechnology is advancing so rapidly that it is hard to keep track of all the new potential threats. Nor is it clear that anyone is even trying. In addition to lethality and drug resistance, many other parameters can be played with, given that the infectious power of an epidemic depends on many properties, including the length of the latency period during which a person is contagious but asymptomatic. Delaying the onset of serious symptoms allows each new case to spread to more people and thus makes the virus harder to stop. This dynamic is perhaps best illustrated by HIV , which is very difficult to transmit compared with smallpox and many other viruses. Intimate contact is needed, and even then, the infection rate is low. The balancing factor is that HIV can take years to progress to AIDS , which can then take many more years to kill the victim. What makes HIV so dangerous is that infected people have lots of opportunities to infect others. This property has allowed HIV to claim more than 30 million lives so far, and approximately 34 million people are now living with this virus and facing a highly uncertain future.15 A virus genetically engineered to infect its host quickly, to generate symptoms slowly—say, only after weeks or months—and to spread easily through the air or by casual contact would be vastly more devastating than HIV . It could silently penetrate the population to unleash its deadly effects suddenly. This type of epidemic would be almost impossible to combat because most of the infections would occur before the epidemic became obvious. A technologically sophisticated terrorist group could develop such a virus and kill a large part of humanity with it. Indeed, terrorists may not have to develop it themselves: some scientist may do so first and publish the details. Given the rate at which biologists are making discoveries about viruses and the immune system, at some point in the near future, someone may create artificial pathogens that could drive the human race to extinction. Indeed, a detailed species-elimination plan of this nature was openly proposed in a scientific journal. The ostensible purpose of that particular research was to suggest a way to extirpate the malaria mosquito, but similar techniques could be directed toward humans.16 When I’ve talked to molecular biologists about this method, they are quick to point out that it is slow and easily detectable and could be fought with biotech remedies. If you challenge them to come up with improvements to the suggested attack plan, however, they have plenty of ideas. Modern biotechnology will soon be capable, if it is not already, of bringing about the demise of the human raceor at least of killing a sufficient number of people to end high-tech civilization and set humanity back 1,000 years or more. That terrorist groups could achieve this level of technological sophistication may seem far-fetched, but keep in mind that it takes only a handful of individuals to accomplish these tasks. Never has lethal power of this potency been accessible to so few, so easily. Even more dramatically than nuclear proliferation, modern biological science has frighteningly undermined the correlation between the lethality of a weapon and its cost, a fundamentally stabilizing mechanism throughout history. Access to extremely lethal agents—lethal enough to exterminate Homo sapiens—will be available to anybody with a solid background in biology, terrorists included.

The Disad turns the case via rollback and new civil liberty violations. Status Quo detection is key.


Clarke ‘13

(et al; This is the Final Report and Recommendations of The President’s Review Group on Intelligence and Communications Technologies. President Obama ordered a blue-ribbon task force to review domestic surveillance. This report releases the findings of that group. The report was headed by five experts – including Richard Alan Clarke, who is the former National Coordinator for Security, Infrastructure Protection, and Counter-terrorism for the United States. Other expert contributors include Michael Joseph Morell, who was the deputy director of the Central Intelligence Agency and served as acting director twice in 2011 and from 2012 to 2013 and Cass Robert Sunstein, who was the Administrator of the White House Office of Information and Regulatory Affairs in the Obama administration and is currently a Professor of Law at Harvard Law School. “LIBERTY AND SECURITY IN A CHANGING WORLD” – December 12th, 2013 – Easily obtained via a google search. https://www.google.com/url?sa=t&rct=j&q=&esrc=s&source=web&cd=1&cad=rja&uact=8&ved=0CB4QFjAA&url=https%3A%2F2Fwww.whitehouse.gov%2Fsites%2Fdefault%2Ffiles%2Fdocs%2F2013-12 12_rg_final_report.pdf&ei=Db0yVdDjKIKdNtTXgZgE&usg=AFQjCNH0S_Fo9dckL9bRarVpi4M6pq6MQ&bvm=bv.91071109,d.eXY)



The September 11 attacks were a vivid demonstration of the need for detailed information about the activities of potential terrorists. This was so for several reasons. First, some information, which could have been useful, was not collected and other information, which could have helped to prevent the attacks, was not shared among departments. Second, the scale of damage that 21st-century terrorists can inflict is far greater than anything that their predecessors could have imagined. We are no longer dealing with threats from firearms and conventional explosives, but with the possibility of weapons of mass destruction, including nuclear devices and biological and chemical agents. The damage that such attacks could inflict on the nation, measured in terms of loss of life, economic and social disruption, and the consequent sacrifice of civil liberties, is extraordinary. The events of September 11 brought this home with crystal clarity. Third, 21st-century terrorists operate within a global communications network that enables them both to hide their existence from outsiders and to communicate with one another across continents at the speed of light. Effective safeguards against terrorist attacks require the technological capacity to ferret out such communications in an international communications grid. Fourth, many of the international terrorists that the United States and other nations confront today cannot realistically be deterred by the fear of punishment. The conventional means of preventing criminal conduct—the fear of capture and subsequent punishment—has relatively little role to play in combating some contemporary terrorists. Unlike the situation during the Cold War, in which the Soviet Union was deterred from launching a nuclear strike against the United States in part by its fear of a retaliatory counterattack, the terrorist enemy in the 21st-century is not a nation state against which the United States and its allies can retaliate with the same effectiveness. In such circumstances, detection in advance is essential in any effort to “provide for the common defence.” Fifth, the threat of massive terrorist attacks involving nuclear, chemical, or biological weapons can generate a chilling and destructive environment of fear and anxiety among our nation’s citizens. If Americans came to believe that we are infiltrated by enemies we cannot identify and who have the power to bring death, destruction, and chaos to our lives on a massive scale, and that preventing such attacks is beyond the capacity of our government, the quality of national life would be greatly imperiled. Indeed, if a similar or even more devastating attack were to occur in the future, there would almost surely be an impulse to increase the use of surveillance technology to prevent further strikes, despite the potentially corrosive effects on individual freedom and self-governance.

2AC frontline for practice speeches



( ) Empirically false – 215 program once temporarily ENDED. That didn’t cause the disad – neither will the Aff.


Globe and Mail ‘15

Globe editorial – “The end of US ‘bulk telephony collection,’ and the lessons for Canada” - The Globe and Mail - Jun. 14, 2015 - http://www.theglobeandmail.com/globe-debate/editorials/the-end-of-us-bulk-telephony-collection-and-the-lessons-for-canada/article24948261/



For a few days, there was a happily yawning gap in the U.S. National Security Agency’s ability to surveil American citizens. Congress could not agree on how – or whether – to renew the section of the foolishly named Patriot Act that had allowed the government to scoop up and hold all the metadata (identifying both callers and addressees) of all cellphone calls in the U.S. The Foreign Intelligence Surveillance Court would then grant or, at least sometimes, not grant, access to the actual contents of the conversations – in other words, a search warrant. The upshotunder the new U.S.A. Freedom Act (officially, the “Uniting and Strengthening America by Fulfilling Rights and Ensuring Effective Discipline Over Monitoring Act of 2015”) – is that phone companies, not the NSA and the FBI, will record and store all the metadata for all phone calls. Those agencies will no longer be able to get at that kind of data at will, indiscriminately. The security agencies will have to apply to the FISC court for metadata, too. That’s progress, though FISC may be a bit of a rubber stamp. There is, by the way, no sign that terrorists attacked the United States in the unsurveilled interval between the Patriot Act section and the Freedom Act.

( ) US losing the war on terror


Miller ‘15

Internally quoting Director of National Intelligence James R. Clapper Jr. - Greg Miller - Intelligence reporter for the Washington Post; former national security correspondent for the Los Angeles Times and co-author of The Interrogators: Inside the Secret War against al Qaeda - “In campaign against terrorism, U.S. enters period of pessimism and gloom” – Washington Post - March 7 - http://www.washingtonpost.com/world/national-security/in-campaign-against-terrorism-us-enters-period-of-pessimism-and-gloom/2015/03/07/ca980380-c1bc-11e4-ad5c-3b8ce89f1b89_story.html



In congressional testimony recently, Director of National Intelligence James R. Clapper Jr. went beyond the usual litany of threats to say that terrorism trend lines were worse “than at any other point in history.” Maj. Gen. Michael Nagata, commander of U.S. Special Operations forces in the Middle East, told participants on a counter­terrorism strategy call that he regarded the Islamic State as a greater menace than al-Qaeda ever was. Speaking at a New York police terrorism conference, Michael Morell, former deputy director of the CIA, said he had come to doubt that he would live to see the end of al-Qaeda and its spawn. “This is long term,” he said. “My children’s generation and my grandchildren’s generation will still be fighting this fight.” The assessments reflect a pessimism that has descended on the U.S. counterterrorism community over the past year amid a series of discouraging developments. Among them are the growth of the Islamic State, the ongoing influx of foreign fighters into Syria, the collapse of the U.S.-backed government in Yemen and the downward spiral of Libya’s security situation. The latest complication came Saturday, when the terrorist group Boko Haram in Nigeria carried out a series of suicide bombings and reportedly declared its allegiance to the Islamic State. Unlike the waves of anxiety that accompanied the emergence of new terrorist plots over the past decade, the latest shift in mood seems more deep-seated. U.S. officials depict a bewildering landscape in which al-Qaeda and the brand of Islamist militancy it inspired have not only survived 14 years of intense counterterrorism operations but have also spread. Officials emphasize that their campaign has accomplished critical goals. In particular, most officials and experts now see the risk of a Sept. 11-scale attack as infinitesimal, beyond the reach of al-Qaeda and its scattered affiliates. Still, the adjusted outlook contrasts sharply with the surge of optimism that followed the killing of Osama bin Laden in 2011 and the dawn of the Arab Spring, which was initially seen as a political awakening across the Middle East that might render al-Qaeda and its archaic ideology irrelevant. Within months of bin Laden’s death, then-Defense Secretary Leon E. Panetta said he was convinced “that we’re within reach of strategically defeating al-Qaeda.” President Obama echoed that view in subsequent years by saying that al-Qaeda was on “a path to defeat” and, more recently, that the then-nascent Islamic State was analogous to a junior varsity sports team. Such upbeat characterizations have all but evaporated.

( ) Turn – Arab-American coop:



    • mass surveillance kills law enforcement coop with US-Arab Americans – that’s key to check terror.


Risen ‘14

(Internally quoting Vanda Felbab-Brown, a senior fellow on foreign policy at the Brookings Institution. Tom Risen is a reporter for U.S. News & World Report. “Racial Profiling Reported in NSA, FBI Surveillance” - U.S. News & World Report - July 9, 2014 - http://www.usnews.com/news/articles/2014/07/09/racial-profiling-reported-in-nsa-fbi-surveillance)



The National Security Agency and the FBI have reportedly been overzealous trying to prevent terrorist attacks to the point that anti-Islamic racism in those agencies led to the surveillance of prominent Muslim-Americans, revealing a culture of racial profiling and broad latitude for spying on U.S. citizens. An NSA document leaked by former agency contractor Edward Snowden to reporter Glenn Greenwald shows 202 Americans targeted among the approximately 7,485 email addresses monitored between 2002 and 2008, Greenwald’s news service The Intercept reports. To monitor Americans, government agencies must first make the case to the Foreign Intelligence Surveillance Court that there is probable cause that the targets are terrorist agents, foreign spies or “are or may be” abetting sabotage, espionage or terrorism. Despite this filter The Intercept identified five Muslim-Americans with high public profile including civil rights leaders, academics, lawyers and a political candidate. Racial profiling of Muslims by security officers has been a controversy since the terrorist attacks of 2001 spiked fears about al-Qaida trainees preparing more attacks. The New York Police Department has disbanded its unit that mapped New York’s Muslim communities that designated surveillance of mosques as “terrorism enterprise investigations” after pressure from the Justice Department about aggressive monitoring by police. A 2005 FBI memo about surveillance procedures featured in The Intercept story uses a fake name “Mohammed Raghead” for the agency staff exercise. This latest report about email surveillance of successful Muslim-Americans is akin to “McCarthyism” that fed paranoia about communist spies during the Cold War, says Reza Aslan, a professor at the University of California, Riverside. “The notion that these five upstanding American citizens, all of them prominent public individuals, represent a threat to the U.S. for no other reason than their religion is an embarrassment to the FBI and an affront to the constitution,” Aslan says. There is a risk of radicalization among citizens Americans, evidenced by some who have gone to fight jihads in Syria and Somalia, but mass shootings carried out by U.S. citizens of various racial backgrounds occurs much more often, says Vanda Felbab-Brown, a senior fellow on foreign policy at the Brookings Institution. Since 1982, there have been at least 70 mass shootings across the U.S. “We have seen very little domestic terrorism in the U.S.,” Felbab-Brown says. This lack of terrorism is due in part to the willingness of the Islamic community to cooperate with law enforcement to identify possible radical threats, out of gratitude that the U.S. is a stable, secure country compared with the Middle East, she says. “That could go sour if law enforcement becomes too aggressive, too extreme,” she says.
    • The turn’s unique – relations are low now. We also control the vital internal link:


Ramirez ‘4

(et al; Deborah A. Ramirez, Professor of Law at Northeastern University. She holds a JD from Harvard University, "Developing partnerships between law enforcement and American Muslim, Arab, and Sikh communities: a promising practices guide" (2004). Partnering for Prevention & Community Safety Initiative Publications. Paper 4. http://hdl.handle.net/2047/d20004127)

For all these reasons, in a post-September 11th world, it is critical for law enforcement and the Muslim, Arab, and Sikh communities in this country to strengthen their relationships. Historically, these relationships have not existed in any significant way. Prior to September 11th, law enforcement primarily focused their community policing efforts on other communities of color – Latinos, Asians, African-Americans, etc. Similarly, hate crime enforcement efforts mostly focused on crimes against the gay community, Jews, Latinos, Asians and African-Americans. Consequently few state, local or federal law enforcement agencies had any significant contact with the Arab, Muslim, or Sikh communities prior to September of 2001. It is the premise of the Partnering for Prevention and Community Safety Initiative that Americans will only truly be safe from terrorist attacks when law enforcement agencies adopts a strategy focused on building trust and strengthening relationships with the Muslim, Arab, and Sikh communities. This paradigm is not only more consistent with our constitutional ideals, it also represents our best hope for securing our homeland.

( ) No link – targeted warrants, which plan allows, solve the terror disad just as well.


Wyden ‘14

(et al; This amicus brief issued by three US Senators - Ron Wyden, Mark Udall and Martin Heinrich. Wyden and Udall sat on the Senate Select Committee on Intelligence and had access to the meta-data program. “BRIEF FOR AMICI CURIAE SENATOR RON WYDEN, SENATOR MARK UDALL, AND SENATOR MARTIN HEINRICH IN SUPPORT OF PLAINTIFF-APPELLANT, URGING REVERSAL OF THE DISTRICT COURT” – Amicus Brief for Smith v. Obama – before the United States Ninth Circuit Court of Appeals - Appeal from the United States District Court District of Idaho The Honorable B. Lynn Winmill, Chief District Judge, Presiding Case No. 2:13-cv-00257-BLW – Sept 9th, 2014 – This Amicus Brief was prepared by CHARLES S. SIMS from the law firm PROSKAUER ROSE LLP. Amici” means “friend of the court” and – in this context - is legal reference to Wyden, Udall, etc. This pdf can be obtained at: https://www.eff.org/document/wyden-udall-heinrich-smith-amicus)



As members of the Senate Select Committee on Intelligence, amici Senators Wyden and Udall have for years participated in the oversight of government surveillance conducted under the Patriot Act that they knew would astonish most Americans. They sought to warn the public about those activities as best they could without disclosing classified information. They also co-sponsored an amendment to the Patriot Act’s reauthorization that sought to address the problem of government officials “secretly reinterpret[ing] public laws and statutes” and “describ[ing] the execution of these laws in a way that misinforms or misleads the public.” See 157 Cong. Rec. S3360 (daily ed. May 25, 2011) (introducing SA 384 to S. 990, 112th Cong. § 3 (2011)); see also 157 Cong. Rec. S3386 (daily ed. May 26, 2011) (statement of Sen. Wyden) (“The fact is anyone can read the plain text of the PATRIOT Act. Yet many Members of Congress have no idea how the law is being secretly interpreted by the executive branch.”); 157 Cong. Rec. S3258 (daily ed. May 24, 2011) (statement of Sen. Udall) (“Congress is granting powers to the executive branch that lead to abuse, and, frankly, shield the executive branch from accountability”). Now that the government’s bulk call-records program has been documented and exposed, the executive branch has retreated from frequently repeated claims about its necessity and expressed an intent to end government bulk collection under section 215. Press Release, FACT SHEET: The Administration’s Proposal for Ending the Section 215 Bulk Telephony Metadata Program (Mar. 27, 2014), http://www.whitehouse.gov/the-press-office/2014/03/27/fact-sheet-administration-s-proposal-ending-section-215-bulk-telephony-m (“White House Press Release”). While Senators Udall, Heinrich and Wyden broadly support a policy aimed at ending the government’s indiscriminate collection of telephony metadata, they share a concern that there is no plan to suspend the bulk collection of Americans’ phone records in the absence of new legislation, which is not necessarily imminent. Meanwhile, the government continues to defend its bulk call-record collection program vigorously against statutory and constitutional challenges in the courts. Amici submit this brief to respond to the government’s argument that its collection of bulk call records is necessary to defend the nation against terrorist attacks. Amici make one central point: as members of the committee charged with overseeing the National Security Agency’s surveillance, amici have reviewed this surveillance extensively and have seen no evidence that the bulk collection of Americans’ phone records has provided any intelligence of value that could not have been gathered through means that caused far less harm to the privacy interests of millions of Americans. The government has at its disposal a number of authorities that allow it to obtain the call records of suspected terrorists and those in contact with suspected terrorists. It appears to amici that these more targeted authorities could have been used to obtain the information that the government has publicly claimed was crucial in a few important counterterrorism cases.

( ) Bioterror risk is low and wouldn’t kill many people anyway.


Keller 13

(Rebecca, 7 March 2013, Analyst at Stratfor, “Bioterrorism and the Pandemic Potential,” Stratfor, http://www.stratfor.com/weekly/bioterrorism-and-pandemic-potential)



The risk of an accidental release of H5N1 is similar to that of other infectious pathogens currently being studied. Proper safety standards are key, of course, and experts in the field have had a year to determine the best way to proceed, balancing safety and research benefits. Previous work with the virus was conducted at biosafety level three out of four, which requires researchers wearing respirators and disposable gowns to work in pairs in a negative pressure environment. While many of these labs are part of universities, access is controlled either through keyed entry or even palm scanners. There are roughly 40 labs that submitted to the voluntary ban. Those wishing to resume work after the ban was lifted must comply with guidelines requiring strict national oversight and close communication and collaboration with national authorities. The risk of release either through accident or theft cannot be completely eliminated, but given the established parameters the risk is minimal. The use of the pathogen as a biological weapon requires an assessment of whether a non-state actor would have the capabilities to isolate the virulent strain, then weaponize and distribute it. Stratfor has long held the position that while terrorist organizations may have rudimentary capabilities regarding biological weapons, the likelihood of a successful attack is very low. Given that the laboratory version of H5N1 -- or any influenza virus, for that matter -- is a contagious pathogen, there would be two possible modes that a non-state actor would have to instigate an attack. The virus could be refined and then aerosolized and released into a populated area, or an individual could be infected with the virus and sent to freely circulate within a population. There are severe constraints that make success using either of these methods unlikely. The technology needed to refine and aerosolize a pathogen for a biological attack is beyond the capability of most non-state actors. Even if they were able to develop a weapon, other factors such as wind patterns and humidity can render an attack ineffective. Using a human carrier is a less expensive method, but it requires that the biological agent be a contagion. Additionally, in order to infect the large number of people necessary to start an outbreak, the infected carrier must be mobile while contagious, something that is doubtful with a serious disease like small pox. The carrier also cannot be visibly ill because that would limit the necessary human contact.

( ) Terrorist can’t obtain and correctly deploy bioweapons


Ouagrham-Gormley 14

Sonia Ben Ouagrham-Gormley is Assistant Professor of Public and International Affairs at George Mason University. She worked for a decade at the Monterey Institute for International Studies. She was for two years research director of the James Martin Center for Nonproliferation Studies office in Kazakhstan and was founding editor of the International Export Control Observer, Cornell University Press, November 2014, “Barriers to Bioweapons”, http://www.cornellpress.cornell.edu/book/?GCOI=80140100857780



In both the popular imagination and among lawmakers and national security experts, there exists the belief that with sufficient motivation and material resources, states or terrorist groups can produce bioweapons easily, cheaply, and successfully. In Barriers to Bioweapons, Sonia Ben Ouagrham-Gormley challenges this perception by showing that bioweapons development is a difficult, protracted, and expensive endeavor, rarely achieving the expected results whatever the magnitude of investment. Her findings are based on extensive interviews she conducted with former U.S. and Soviet-era bioweapons scientists and on careful analysis of archival data and other historical documents related to various state and terrorist bioweapons programs. Bioweapons development relies on living organisms that are sensitive to their environment and handling conditions, and therefore behave unpredictably. These features place a greater premium on specialized knowledge. Ben Ouagrham-Gormley posits that lack of access to such intellectual capital constitutes the greatest barrier to the making of bioweapons. She integrates theories drawn from economics, the sociology of science, organization, and management with her empirical research. The resulting theoretical framework rests on the idea that the pace and success of a bioweapons development program can be measured by its ability to ensure the creation and transfer of scientific and technical knowledge. The specific organizational, managerial, social, political, and economic conditions necessary for success are difficult to achieve, particularly in covert programs where the need to prevent detection imposes managerial and organizational conditions that conflict with knowledge production.

No rollback — Boston bombing proves fear won’t spike out of control.


Hayes 13

Danny Hayes, associate professor of political science at George Washington University, focusing on political communication and political behavior; co-author of Influence from Abroad, a book about Americans' views toward U.S. foreign policy, 2013 (“Why the Boston Marathon bombing won’t erode civil liberties,” Wonkblog, The Washington Post, April 28th, Available Online at http://www.washingtonpost.com/blogs/wonkblog/wp/2013/04/28/why-the-boston-maraton-bombing-wont-erode-civil-liberties/, Accessed 06-21-2013)



From the moment that Boston bombing suspect Dzhokhar Tsarnaev was pulled out of a boat in Watertown, Mass., the debate over civil liberties and domestic anti-terrorism policies, largely dormant in recent years, was reignited. Noting that “the homeland is the battlefield,” Sen. Lindsey Graham (R-S.C.) urged the Obama administration to designate Tsarnaev, an American citizen, as an enemy combatant. Civil liberties groups then objected when authorities decided not to read Miranda rights to the Boston Marathon bombing suspect, invoking a public safety exception. Speculation also arose that police might now find it easier to persuade the public to support the use of surveillance technology and domestic drones. “After Boston,” Ryan Gallagher wrote this week in Slate, “the balance in the struggle between privacy and security may swing back in their favor.” But research conducted shortly after 9/11, combined with some recent polling data, suggests that Americans may be unlikely to trade civil liberties for a greater sense of security as a result of the bombing. That’s because the attack hasn’t made the public significantly more fearful of future domestic terrorism, and because trust in government is low. After 9/11, concern over terrorism skyrocketed. In a Gallup survey fielded in the days before the attack, less than one-half of one percent of Americans said terrorism was the country’s most important problem. But in October 2001, 46 percent did. These worries boosted support for legislation, such as the USA PATRIOT Act, that expanded law enforcement’s power to investigate suspected terrorism, even as those measures were criticized for eroding civil liberties protections. In a survey conducted between November 2001 and January 2002, political scientists Darren Davis and Brian Silver designed a series of questions to explore the tradeoffs between security and civil liberties. They began by asking people whether they agreed more with the statement that “in order to curb terrorism in this country, it will be necessary to give up some civil liberties” or that “we should preserve our freedoms above all, even if there remains some risk of terrorism.” Forty-five percent of Americans chose the first option, indicating a willingness to give up some freedoms in exchange for greater security. When respondents were asked about the tradeoffs involving specific measures, there was wide variation. Davis and Silver found that very few Americans – eight percent – believed that the government should have the power to investigate people who participate in nonviolent protests. And just 18 percent said they supported racial profiling. But when asked, for instance, whether they agreed that “high school teachers have the right to criticize America’s policies toward terrorism” or that “high school teachers should defend America’s policies in order to promote loyalty to our country,” 60 percent said teachers should back the government. Perhaps not surprisingly, the biggest influence on whether people were willing to offer pro-security over pro-civil liberties responses was their fear of a second attack. Respondents who believed another terrorist act was imminent were more likely to support tradeoffs in favor of security. Importantly, Davis and Silver found that the relationship was strongest among people who expressed high levels of political trust: People who believe the government typically does the right thing and who were fearful of another terrorist attack were the most willing to relinquish civil liberties protections. Those findings are consistent with a series of studies by Stanley Feldman, Leonie Huddy and their colleagues at Stony Brook University. In one survey conducted between October 2001 and March 2002, the researchers found that 86 percent of Americans said they were “very” or “somewhat” concerned about another domestic terrorist act. The greater the concern, the more likely respondents were to support the use of government-issued ID cards and allowing authorities to monitor phone calls and e-mail. But in contrast to 9/11, polling since the Boston Marathon suggests that the bombing has made Americans only slightly more fearful of future terrorist attacks than they were beforehand. Fifty-eight percent of respondents in a Pew poll conducted April 18-21 said they were “very” or “somewhat” worried about another attack on the United States. That was no higher, however, than when the same question was asked in November 2010. And it was significantly lower than the 71 percent who said they were worried in October 2001. A slightly different question in a Washington Post poll taken April 17-18 found that 69 percent of Americans said that the possibility of a major terrorist attack worried them either “a great deal” or “somewhat.” That figure was only a few percentage points higher than when the same question was asked in 2007 and 2008. In addition, political trust is lower today than it was in 2001, when public confidence in government rose sharply after the terrorist attacks. If Davis and Silver’s findings are correct, then greater skepticism of government – produced in part by the struggling economy – should limit the public’s willingness to give law enforcement more latitude. Ultimately, the scope of the Boston tragedy was smaller than 9/11, which could help explain its limited effect on the public. It may also be that because Americans believe terrorist attacks are now a fundamental part of life in the United States, any single event will have a more muted effect on public opinion. And because the Tsarnaev brothers have not been connected to any known terrorist organizations, Americans may feel less under siege than they did when al-Qaeda and Osama bin Laden were identified as the perpetrators of the 2001 attacks. Regardless of the reason, all of this suggests that policymakers are likely to face a more difficult task than they did after 9/11 in persuading the public to support additional security measures that infringe on Americans’ freedoms.


The database is protected by copyright ©essaydocs.org 2016
send message

    Main page