Documente Academic
Documente Profesional
Documente Cultură
Plan Text
Plan: The United States federal government should
substantially curtail the National Security Agencys
Project Bullrun.
economics of 2015 may look similar to the late 1990s, but the
politics will probably be rather worse.
the Snowden revelations," say [pdf] Daniel Castro and Alan McQuinn,
authors of a new ITIF report. "Therefore, the economic impact of U.S.
surveillance practices will likely far exceed ITIF's initial $35 billion
estimate." ITIF cites a string of financial reports by technology
companies and cloud providers showing disappointing earnings and
lower-than-expected sales figures, with only Apple making
passed a new law requiring all tech firms operating within its borders
to store information about their customers in servers located within the
Russian territory, a requirement that forces companies to spend more
as they decentralize operations and build new data centers. France
and Germany also have a similar law, forcing Amazon to build new
facilities in Frankfurt and Microsoft in Vienna, while China, India and
Australia have their own data localization laws. China, in particular,
has extreme conditions for U.S. tech companies by requiring them to
provide access to valuable intellectual property, such as source code.
To make matters worse, U.S. lawmakers are not helping as they fail to
create new laws that scale back government surveillance , which
"sacrifices robust competitiveness of the U.S. tech sector for vague
and unconvincing promises of improved national security ," says ITIF.
President Barack Obama recently signed into law a bill ending the
NSA's bulk collection of telephone metadata, but ITIF says the agency
has several other surveillance programs in place that need to be
reformed. PRISM, for instance, allows the NSA to obtain private data
about a customer in the U.S. or abroad without the need for a warrant,
while Bullrun aims to undermine encryption standards. "In the short
term, U.S. companies lose out on contracts, and over the long term,
other countries create protectionist policies that lock U.S.
businesses out of foreign markets," says ITIF. "This not only hurts
U.S. technology companies but costs American jobs and weakens the
U.S. trade balance."
different segments is uneven. In the US, for each job in the high-tech
industry, five additional jobs, on average, are created in other
sectors. In 2013, the global tech market will grow by 8%, creating jobs,
salaries and a widening range of services and products. 2.
Contribution to GDP growth Findings from various countries confirm
the positive effect of ICT on growth. For example, a 10% increase in
broadband penetration is associated with a 1.4% increase in GDP
growth in emerging markets. In China, this number can reach 2.5%.
devices throughout the world has created new ways for businesses to
serve their customers.
(Richard, The New Depression: The Breakdown of the Paper Money Economy,
google books)
a New Great Depression would extend far beyond the realm of
economics. Hungry people will fight to survive . Governments will use force to maintain
The consequences of
internal order at home. This section considers the geopolitical repercussion of economic collapse, beginning with the
United States. First,
with the
has a $500 billion annual trade surplus with the United States. The central banks of the United States trading partners
accumulate that surplus as foreign exchange reserves and invest most of those reserves into U.S. government bonds.
An economic collapse would cause global trade to plummet and drastically reduce (if
not eliminate altogether) the U.S. trade deficit. Therefore, this source of foreign
funding for the U.S. budget deficit would dry up. Consequently, the government
would have to sharply curtail its spending, both at home and abroad. Domestically,
social programs for the old, the sick, and the unemployed would have to be slashed. Government spending on education
produce a crisis of the current two-party political system. Astonishment, frustration, and anger at the economic
breakdown
would radicalize politics . New parties would form at both extremes of the political
spectrum. Given the great and growing income inequality going into the crisis, the hungry have-nots would substantially
outnumber the remaining wealthy. On the one hand, a hard swing to the left would be the outcome most likely to result
from democratic elections. In that case, the tax rates on the top income brackets could be raised to 80 percent or more, a
level last seen in 1963. On the other hand, the possibility of a right-wing putsch could not be ruled out. During the Great
Depression, the U.S. military was tiny in comparison with what it became during World War II and during the decades of
governed. The political battle over Americas future would be bitter, and quite possibly bloody. It cannot
be guaranteed that the U.S. Constitution would survive . Foreign affairs would
also confront the United States with enormous challenges. During the Great Depression, the United States did not have a
global empire. Now it does.
bases across dozens of countries around the world. Added to this is a fleet of 11 aircraft carriers and 18 nucleararmed submarines. The country spends more than $650 billion a year on its military . If
the U.S. economy collapses into a New Great Depression, the United States could
not afford to maintain its worldwide military presence or to continue in its role
as global peacekeeper. Or, at least, it could not finance its military in the same way it
does at present. Therefore, either the United States would have to find an alternative funding method for its
global military presence or else it would have to radically scale it back. Historically, empires were financed with plunder
and territorial expropriation. The estates of the vanquished ruling classes were given to the conquering generals, while
The
army might have to be employed to keep order at home, given that mass
unemployment would inevitably lead to a sharp spike in crime. Only after the Middle East oil was secured would the
country know how much more of its global military presence it could afford to maintain. If international trade had broken
down, would there be any reason for the United States to keep a military presence in Asia when there was no obvious way
become unavoidable. And Europe? What would a costbenefit analysis conclude about the wisdom of the United States
maintaining military bases there? What valued added does Europe provide to the United States? Necessity may mean
Europe will have to defend itself. Should a New Great Depression put an
end to the Pax Americana, the world would become a much more
dangerous place . When the Great Depression began, Japan was the rising industrial power in Asia. It invaded
Manchuria in 1931 and conquered much of the rest of Asia in the early 1940s. Would China, Asias new rising power,
behave the same way in the event of a new global economic collapse? Possibly. China is the only nuclear power in Asia
east of India (other than North Korea, which is largely a Chinese satellite state). However, in this disaster scenario ,
it is
not certain that China would survive in its current configuration. Its economy
would be in ruins . Most of its factories and banks would be closed. Unemployment could exceed 30 percent.
There would most likely be starvation both in the cities and in the countryside. The Communist Party
could lose its grip on power, in which case the country could break apart , as
it has numerous times in the past. It was less than 100 years ago that Chinas provinces, ruled by warlords, were at war
with one another. United or divided, Chinas nuclear arsenal would make it Asias undisputed superpower if the United
States were to withdraw from the region. From Korea and Japan in the North to New Zealand in the South to Burma in the
West, all of Asia would be at Chinas mercy. And
people could necessitate territorial expansion into Southeast Asia. In fact, the central
government might not be able to prevent mass migration southward, even if it wanted to. In Europe, severe economic
hardship would revive the centuries-old struggle between the left and the right. During the 1930s, the Fascists movement
arose and imposed a police state on most of Western Europe. In the East, the Soviet Union had become a communist
It is
difficult to judge whether Europes democratic institutions would
hold up better this time that they did last time. England had an empire during the Great Depression.
police state even earlier. The far right and the far left of the political spectrum converge in totalitarianism.
Now it only has banks. In a severe worldwide depression, the country or, at least Londoncould become ungovernable.
Frustration over poverty and a lack of jobs would erupt into antiimmigration riots not only in the United Kingdom but also across most of Europe. The extent to which Russia
would menace its European neighbors is unclear. On the one hand, Russia would be impoverished
by the collapse in oil prices and might be too preoccupied with internal unrest to threaten anyone. On
the other hand, it could provoke a war with the goal of maintaining
internal order through emergency wartime powers. Germany is very nearly
demilitarized today when compared with the late 1930s. Lacking a nuclear deterrent of its own, it could be subject to
Russian intimidation. While Germany could appeal for protection from England and France, who do have nuclear
capabilities, it is uncertain that would buy Germany enough time to remilitarize before it became a victim of Eastern
aggression. As for the rest of the world, its prospects in this disaster scenario can be summed up in only a couple of
sentences. Global economic output could fall by as much as half, from $60 trillion to $30 trillion. Not all of the worlds
Food riots
would provoke political upheaval and myriad big and small conflicts around the world. It
seven billion people would survive in a $30 trillion global economy. Starvation would be widespread.
would be a humanitarian catastrophe so extreme as to be unimaginable for the current generation, who, at least in the
industrialized world, has known only prosperity. Nor would there be reason to hope that the New Great Depression would
end quickly. The Great Depression was only ended by an even more calamitous global war that killed approximately 60
million people.
arena of warfare. In 2010, the Pentagon created the U.S. Cyber Command, under the helm of NSA director
Gen. Keith Alexander, to better prepare the U.S. for a potential attack on digital infrastructure. Later that
year, U.S. Deputy Secretary of Defense William Lynn said cyberspace had become just as critical to
military operations as land, sea, air, and space. The nebulous term "cyberwarfare" refers to full-on conflict
between countries or terror groups featuring digital attacks on computer systems. But its more
devastating, violent impacts are considered by many analysts to be largely theoretical at this point.
Looming fears of cyber attacks on pacemakers of world leaders, for instance, have inspired movie plots
and television shows but are not known to have occurred, noted Morgan Marquis-Boire, a security
researcher at the University of Toronto's Citizen Lab. At the moment, this is all set in the realm of science
fiction."
of these systems
werent built in a cyberwarfare age. We werent worried about
cyberwarfare when we built the national power grid, and its difficult
to retrofit security. The impact of such an attack could be
devastating. Massive power outages could not only unleash chaos,
they could also distract from a simultaneous military or terrorist
attack. That latter concern that cyber war tactics might blur with
traditional terrorism were underlined in June 2012, when information security expert Eugene
Kaspersky announced his labs discovery of the Flame virus that targeted computers in Iran. Its not
cyber war, its cyber terrorism and Im afraid its just the beginning
of the game, Kaspersky said at a conference in Tel Aviv. Im afraid it will be the
end of the world as we know it. A few months later, Panetta compounded fears when he
warned of a new, profound sense of vulnerability in the U.S. due to the prospect of cyberwarfare. But
with the exception of several high-profile hacking incidents of websites, the American public has yet to
experience any sort of large-scale attack on U.S. infrastructure, let alone American lives. Despite the
improbability of a full-on cyber conflict, analysts say they are not surprised the nebulous threat posed by
cyberwarfare has struck fear in American hearts. " The
) is Internet Freedom
were the American people kept in the dark they were lied to by intelligence officials, misled about
possible constitutional violations, and potentially undermined by the very courts that were supposed to
protect their rights. The government has used peculiar interpretations of laws that they are not even
willing to discuss to defend an invasive collection of personal data beyond anything even the paranoid
among us would have thought was possible. And while President Obama welcomes the debate over an
issue he has worked hard to keep secret, we are now starting to see the usual Washington tactics of
political spin, feverish scapegoating, and patriotic grandstanding in lieu of a real discussion. We should all
be extremely concerned about the colossal surveillance infrastructure that is being built in the name of our
safety. In trying to reassure the public, our leaders have told us that these programs are not meant to
target us, but instead, foreigners who may pose a threat to our security. But this is merely a decision on
how the data is being used today we are getting into very dangerous territory by hoping for the best
intentions of whoever is in power in the future. American history holds many lessons for us here:
circumstances can change, the perception of who is a threat can vary with whoever is in office, and we
In the
court of global public opinion, America may have tarnished its moral
authority to question the surveillance practices of other nations
whether it be Russia on monitoring journalists, or China on
conducting cyber espionage. Declarations by the State Department
that were once statements of principle now ring hollow and
hypocritical to some. No nation can rival the American surveillance
state, but they no longer need support to build their own massive
systems of espionage and oppression. The costs of surveillance and data storage
cannot predict what our political situation will look like decades, or even years, from now.
technologies are plummeting these will no longer be prohibitive factors. Diplomatic pressures and legal
BULLRUN subverts US internet governance beliefsRussia and China want more sovereignty
Kehl et al, Open Technology Institute Policy Analyst, 14
(Danielle, July, Open Technology Institute, Surveillance Costs: The NSAs
Impact on the Economy, Internet Freedom & Cybersecurity,
hypocrisy. For example, one might argue that US policies are more benevolent than those of many other
regimes And one might recognize that in several cases, some branches of government dont know what
other branches are doing and therefore US policy is not so much hypocritical as it is inadvertently
contradictory, wrote Eli Dourado, a researcher from the Mercatus Center at George Mason University in
walking straight into the arms of Russia, China, and the ITU.190 Consequently, NSA surveillance has
shifted the dynamics of the Internet governance debate in a potentially destabilizing manner. The Snowden
revelations have also been well-received by those who seek to discredit existing approaches to Internet
governance, wrote the Center for Democracy & Technologys Matthew Shears. There has been a longrunning antipathy among a number of stakeholders to the United States governments perceived control of
the Internet and the dominance of US Internet companies. There has also been a long-running antipathy,
particularly among some governments, to the distributed and open management of the Internet.191
Shears points out that evidence of the NSAs wide-ranging capabilities has fueled general concerns about
the current Internet governance system, bolstering the arguments of those calling for a new government-
are deeply concerned about arguments by some in the United States that
broadband providers should be able to block, edit, or favor Internet traffic
that travels over their networks, or adopt economic models similar to
international sender pays. We must preserve the Internet as the most
open and robust platform for the free exchange of information ever
devised. Keeping the Internet open is perhaps the most important
free speech issue of our time.
1AC Solvency
Congress should curtail BULLRUN by passing the
Secure Data Act
Castro, Vice President of Information Technology &
Innovation Foundation and McQuinn, Research Assistant at
ITIF 15 (Daniel and Alan, June, Information Technology & Innovation
Foundation, Beyond the USA Freedom Act: How U.S. Surveillance Still
Subverts U.S. Competitiveness, http://www2.itif.org/2015-beyond-usafreedom-act.pdf, 06/25/15, MM)
The free and open Internet that powers the globally networked economy is dependent on the ability of
individuals and companies to engage in commerce without geographic restrictions. To turn back the tide of
technology protectionism, U.S. trade negotiators will need a stronger hand to play. They cannot go to other
nations and tell them to not discriminate against U.S. tech firms if the U.S. intelligence system continues to
it is incumbent on the
Congress and the Obama administration to take the lead in showing
the world the best standards for transparency, cooperation, and
accountability. First, the U.S. government should be forthcoming and
transparent about its surveillance practices and clearly inform the
public about the data it collects domestically and abroad. The U.S.
follow policies that threaten their citizens and businesses. As a result,
government should set the gold standard for international transparency requirements, so that it is clear
what information both U.S. and non-U.S. companies are disclosing to governments at home and abroad.
The U.S. government should then work THE INFORMATION TECHNOLOGY & INNOVATION FOUNDATION |
JUNE 2015 PAGE 6 with its allies to create an international transparency requirement that illuminates when
--Tech Leadership--
UQ Economy High
US econ high now, but recession coming by end of
2015
Matthews, journalist, 10/28
(Chris, 2014, Fortune, The case for a global recession in 2015,
http://fortune.com/2014/10/28/global-recession-us-europe-china/, June 26,
2015. GG)
Four years after the end of the Great Recession, it looks as if the U.S.
economy might finally be poised for breakout growth. Monthly job
growth in 2014 is, on average, faster than at any point since the financial
crisis. Overall economic growth appears to picking up too, with real GDP
growing by more than 4% in the second quarter of this year, and many
economists predicting higher overall growth compared to last year. But news
outside the U.S. isnt so bright. European economies are still battling
depression-era levels of unemployment and the threat of deflation.
And emerging economies, like China, are having trouble maintaining
the kind of growth they have become accustomed to in recent years.
The most recent readings out of China have the worlds second-largest
economy growing at roughly 7.5% per year, down from the 10% growth it
averaged for two decades before its economy began to slow in 2012. And this
pattern holds for other emerging economies like Brazil and Russia. Optimists
hope that an accelerating U.S. economy will have what it takes to drag the
rest of the world out of the doldrums, as it has done during so many past
recoveries. But David Levy, economist and chairman of the Jerome
Levy Forecasting Center, argues that the problems of the rest of the
world will end up taking the U.S. down, rather than the other way
around. Levy is calling for a 65% chance that there will be a global
recession by the end of 2015, based on the simple fact that
emerging markets have continued to invest in an export
infrastructure to sell goods to the West that it no longer has the
wherewithal to buy.
http://www.theguardian.com/business/2015/mar/28/rising-dollar-debt-fearsglobal-economic-crash)//GLee
As Janet Yellens Federal Reserve prepares to raise interest rates,
boosting the value of the dollar, while the plunging price of crude
puts intense pressure on the finances of oil-exporting countries,
there are growing fears of a new debt crisis in the making. Ann
Pettifor of Prime Economics, who foreshadowed the credit crunch in
her 2003 book The Coming First World Debt Crisis, says: Were
going to have another financial crisis. Brazils already in great
trouble with the strength of the dollar; I dread to think whats
happening in South Africa; then theres Malaysia. Were back to
where we were, and that for me is really frightening. Since the aftershocks
of the global financial crisis of 2008 died away, the worlds policymakers have spent countless hours
rewriting the banking rulebook and rethinking monetary policy. But next to nothing has been done about
the question of what to do about countries that cant repay their debts, or how to stop them getting into
trouble in the first place. Developing countries are using the UN to demand a change in the way sovereign
defaults are dealt with. Led by Bolivian ambassador to the UN Sacha Sergio Llorenti, they are calling for a
bankruptcy process akin to the Chapter 11 procedure for companies to be applied to governments.
Unctad, the UNs Geneva-based trade and investment arm, has been working for several years to draw up
a roadmap for sovereign debt resolution. It recommends a series of principles, including a moratorium on
repayments while a solution is negotiated; the imposition of currency controls to prevent capital fleeing the
troubled country; and continued lending by the IMF to prevent the kind of existential financial threat that
roils world markets and causes severe economic hardship. If
And
while the debate rages, developing countries have been taking
advantage of rock-bottom interest rates and the cheap money
created by quantitative easing to stack up billions in new debt.
Using recently released World Bank data, the Jubilee Debt Campaign
calculates that in 2013 alone the latest period for which figures are
available borrowing by developing countries was up 40% to
$17.3bn. Brazils economy is likely to be seriously tested as the
greenback rises; Turkey, Malaysia and Chile have large dollardenominated debts and sliding currencies; and a string of African
countries face sharp rises in debt repayments. Ghana and Zambia
have already had to turn to the IMF to ask for help. Its as if, as
Pettifor warns, absolutely nothing has changed since the crisis.
bank, have ballooned to $2.4 trillion from $1.8 trillion. At the same time
that those banks have been getting bigger, 1,400 smaller banks have
completely disappeared from the banking industry. That means that
we are now more dependent on these gigantic banks than ever. At
this point, the five largest banks account for 42 percent of all loans
in the United States, and the six largest banks account for 67
percent of all assets in our financial system. If someone came along
and zapped those banks out of existence, our economy would totally
collapse overnight. So the health of this handful of immensely
powerful banking institutions is absolutely critical to our economy.
Unfortunately, these banks have become deeply addicted to
gambling. Have you ever known people that allowed their lives to be
destroyed by addictions that they could never shake? Well, that is what is
happening to these banks. They have transformed Wall Street into the
largest casino in the history of the world. Most of the time, their
bets pay off and they make lots of money. But as we saw back in
2008, when they miscalculate things can fall apart very rapidly. The
bets that I am most concerned about are known as derivatives. In essence,
they are bets about what will or will not happen in the future. The big banks
use very sophisticated algorithms that are supposed to help them be on the
winning side of these bets the vast majority of the time, but these algorithms
are not perfect. The reason these algorithms are not perfect is because they
are based on assumptions, and those assumptions come from people. They
might be really smart people, but they are still just people. If things stay fairly
stable like they have the past few years, the algorithms tend to work very
well. But if there is a black swan event such as a major stock
market crash, a collapse of European or Asian banks, a historic shift
in interest rates, an Ebola pandemic, a horrific natural disaster or a
massive EMP blast is unleashed by the sun, everything can be
suddenly thrown out of balance. Acrobat Nik Wallenda has been
making headlines all over the world for crossing vast distances on a
high-wire without a safety net. Well, that is essentially what our
too big to fail banks are doing every single day. With each passing
year, these banks have become even more reckless, and so far there
have not been any serious consequences. But without a doubt, someday
there will be. What would you say about a bookie that took $200,000 in bets
but that only had $10,000 to cover those bets? You would certainly call that
bookie a fool. But that is what our big banks are doing. Right now, JPMorgan
Chase has more than 67 trillion dollars in exposure to derivatives but it only
has 2.5 trillion dollars in assets. Right now, Citibank has nearly 60 trillion
dollars in exposure to derivatives but it only has 1.9 trillion dollars in assets.
Right now, Goldman Sachs has more than 54 trillion dollars in exposure to
derivatives but it has less than a trillion dollars in assets. Right now, Bank of
America has more than 54 trillion dollars in exposure to derivatives but it only
has 2.2 trillion dollars in assets. Right now, Morgan Stanley has more than 44
trillion dollars in exposure to derivatives but it has less than a trillion dollars
in assets. Most people have absolutely no idea how incredibly
vulnerable our financial system really is. The truth is that these too
big to fail banks could collapse at any time. And when they fail, our
economy will fail too. So let us hope and pray that this brief period of false
stability lasts for as long as possible. Because when it ends, all hell is going to
break loose. So what do you think?
Economy is safe now but there are still risksconsumer spending and unemployment threaten
Conerly, he has a Ph.D. from Duke and is the longest-tenured
member of the Oregon Governors Council of Economic
Advisors, chairman of the board of Cascade Policy Institute
and senior fellow at the National Center for Policy Analysis ,
15 (Bill, 1/16/25, Forbes, Economic Forecast 2015-2017,
http://www.forbes.com/sites/billconerly/2015/01/06/economic-forecast-20152017/, 6/26/15, WG*)
The economic outlook for the United States in 2015 looks solid,
though longer term forecasts must wrestle with the question of
when the next recession will occur. A downturn is likely to come from
an error by the Federal Reserve, as I explained in The Next Recession:
Cause and Timing. However, 2015 is safe, because the Fed has yet to
begin tightening. (The end of Quantitative Easing is not tightening.) The
first possible Fed error, tightening too soon and too aggressively,
would put 2017 or 2018 in jeopardy. The time lag between Fed action
and a recession is about one year, so tell me when the Fed starts to
overtighten and Ill tell you when the next recession begins. The alternative
Fed error is to tighten too late. In that case, we first get an
acceleration of inflation and then the Fed slams on the brakes. This
sort of recession would be harsher than the Fed-tightens-too-soon
recession, but it wouldnt start until 2017 or 2018. The third
possibility is that the Fed gets it right, in both timing and
magnitude. Perhaps they are smart enough, or perhaps they are
lucky enough.
financial system nearly sank and nearly that long since the recession ended,
the United States is expected to grow in 2015 at its fastest pace in a
decade. Its expansion from July through Septembera 5 percent annual rate
was the swiftest for any quarter since 2003. That pace will likely ease a bit.
Still, the economy is expected to expand 3.1 percent next year, according
to a survey by the National Association for Business Economics. It would be
the first year of 3 percent growth since 2005. The acceleration of U.S. growth
is a key reason the global economy is also expected to grow faster, at about 3
percent, up from 2.5 percent in 2014, according to economists at JPMorgan
Chase and IHS Global Insight. Even if the U.S. economy does strengthen
further, the rest of the world could struggle. For one thing, faster
growth will likely lead the Federal Reserve to raise interest rates in 2015,
which could draw more investment from overseas. The inflow of capital would
raise the dollar's value and potentially cause destabilizing drops in other
currencies. Governments and businesses overseas that borrowed in dollars
would find it harder to repay those debts. The hot economies of the last
decadethe emerging markets of Brazil, Russia, India and China collectively
known as the "BRICs"will likely grow in 2015 at their slowest pace in
six years, according to Oxford Economics, a forecasting firm. Falling oil
and commodity prices have smacked Brazil and Russia particularly
hard. China may expand 6.5 percent or more. Yet that's a far cry from the
nearly double-digit growth it enjoyed for decades. Europe and Japan will
be lucky to expand even 1 percent.
UQ Businesses NSA
Encryption key to US businesses- NSA undermines
security of medical, financial, and research industries
Clarke et al, The Presidents Review Group on Intelligence
and Communications Technologies 13 (Richard A, December 12th,
Liberty and Security in a Changing World: Report and Recommendations of
The Presidents Review Group on Intelligence and Communications
Technologies, https://www.whitehouse.gov/sites/default/files/docs/2013-1212_rg_final_report.pdf, page #24-25, 06/24/15, MM)
Encryption is an essential basis for trust on the Internet; without
such trust, valuable communications would not be possible. For the
entire system to work, encryption software itself must be
trustworthy. Users of encryption must be confident, and justifiably
confident, that only those people they designate can decrypt their
data. The use of reliable encryption software to safeguard data is
critical to many sectors and organizations, including financial
services, medicine and health care, research and development, and
other critical infrastructures in the United States and around the
world. Encryption allows users of 217 information technology systems to trust that their data, including
their financial transactions, will not be altered or stolen. Encryption-related software, including pervasive
examples such as Secure Sockets Layer (SSL) and Public Key Infrastructure (PKI), is essential to online
commerce and user authentication. It is part of the underpinning of current communications networks.
UQ Business Confidence
The security of the US economy is on the brink
consumer and businesses confidence are declining
and the world is second guessing America
EWING, He has been a German Marshall Fund Journalism
Fellow and in 2011 received a Publisher's Award from The
Times for his coverage of the European debt crisis, 13 (Jeff,
10/15/15, NYTImes, Prospect of U.S. Default Keeps European Business on
Edge, http://www.nytimes.com/2013/10/16/business/international/prospectof-us-default-keeps-business-on-edge.html?_r=0, 6/24,15, WG*)
Businesspeople around the world are generally a pro-American lot.
But there is rising concern among them that, even if the White
House and Congress find a way out of their debt-ceiling impasse in
the coming hours or days, the world economy may suffer damage that
may not be so easy to reverse. The prospect of similar deadlocks in
the future has raised questions about the ability of Washington to
function and remain a source of stability in the world , according to
some European executives, who worry there could be lasting damage
to consumer and business confidence that could act as a brake on
investment and spending. ''This is a critical situation,'' said Mario
percent through June compared with the period a year earlier. Bernhard
Mattes, a Ford executive who is president of the American Chamber of
Commerce in Germany, said members of the group were not yet
feeling a direct impact on sales. But he added, ' 'We are hearing
concern from our member companies about the development in the
U.S. and worry about consumer confidence.'' Other chamber
members worry that public works projects in the United States could
be delayed by the government shutdown, Mr. Mattes said in an
interview Tuesday. That could be bad for German companies like
Hochtief, a German builder, or Liebherr, a supplier of construction
equipment. A Hochtief spokesman said, however, that so far none of its
U.S. business had suffered. There was palpable relief in European stock
markets Tuesday as Senate leaders neared completion of a deal that
would raise the debt ceiling and reopen the federal government. But
with the U.S. House of Representatives still showing no signs of buying
in, European investors might have been thinking wishfully. And there
remained anxiety abroad that any agreement would be a stopgap,
leading to another round of brinkmanship in a few months. ''We would
very much appreciate not only a short-term solution,'' Mr. Mattes said,
''but also a long-term framework for strong investment and trade
between the European Union and the U.S.'' Euro zone businesspeople
also worry that further turmoil in Washington would push down the
value of the dollar against the euro. A weaker dollar makes European
products more expensive not only in the United States but also in
countries like China whose currencies tend to move in concert with
the dollar. On Tuesday, the dollar rose sharply against the euro,
Carnell said, like gold or currencies like the Swiss franc. A migration
away from Treasury bonds would ultimately be costly for American
taxpayers. The use of United States debt as a kind of international
wampum makes it possible for Washington to borrow more cheaply
fact, according to The Wall Street Journal, Cisco said its expecting roughly a 10% loss in quarterly revenue
firm Saab over Boeing for a deal to replace its fighter jets, according
to the report. It said more and more foreign competitors are benefiting from the perceived image of
being NSA-proof or safer than U.S. firms. As a result, countries like Germany, Brazil, and India are
close to enacting a new law that would require companies to use local data centers. For example, German
Chancellor Angela Merkel, after refusing to visit the U.S. for months after the NSA disclosures, has called
for data localization laws. Brazil and India are proposing IT companies to either set up or keep their data
centers within local boundaries, while Greece, Brunei, and Vietnam are following suit with similar
I/L Trust
NSA programs deal significant harm to tech
businessesloss of trust in foreign markets
Timm 13 (Trevor, co-founder and executive director of Freedom of the
Press Foundation, 11-25, How NSA Mass Surveillance is Hurting the Global
Economy, https://www.eff.org/deeplinks/2013/11/how-nsa-mass-surveillancehurting-us-economy, AL)
Privacy may not be the only casualty of the National Security Agencys
massive surveillance program. Major sectors of the US economy are
reporting financial damage as the recent revelations shake
consumer confidence and US trade partners distance themselves
from companies that may have been compromised by the NSA or,
worse, are secretly collaborating with the spy agency. Member of Congress,
especially those who champion Americas competitiveness in the global
marketplace, should take note and rein in the NSA now if they want to stem
the damage. The Wall Street Journal recently reported that AT&Ts
desired acquisition of the European company Vodafone is in danger
due to the companys well-documented involvement in the NSAs
data-collection programs. European officials said the
telecommunications giant would face intense scrutiny in its bid to
purchase a major cell phone carrier. The Journal went on to say:
Resistance to such a deal, voiced by officials in interviews across
Europe, suggests the impact of the NSA affair could extend beyond
the diplomatic sphere and damage US economic interests in key
markets. In September, analysts at Cisco Systems reported that the
fallout reached another level, when the National Institute of
Standards and Technology (NIST) told companies not to use
cryptographic standards that may have been undermined by the
NSAs BULLRUN program. The Cisco analysts said that if
cryptography was compromised it would be a critical blow to trust
required across the Internet and the security community. This
forecast was proven true in mid-November, when Cisco reported a 12
percent slump in its sales in the developing world due to the NSA
revelations. As the Financial Times reported, new orders fell by 25
percent in Brazil and 30 percent in Russia and Cisco predicts its
overall sales could drop by as much 10 percent this quarter. Cisco
executives were quoted saying the NSAs activities have created "a
level of uncertainty or concern" that will have a deleterious impact
on a wide-range of tech companies. It is hard for civil libertarians to shed
tears over AT&T losing business because of NSA spying, considering the
company allowed the NSA to directly tap into its fiber optic cables to copy
vast amounts of innocent Americans Internet traffic. AT&T was also recently
revealed as having partnered with both the DEA and the CIA on separate
mass surveillance programs. It is also hard to feel sorry for Cisco, which
stands accused of helping China spy on dissidents and religious minorities.
But the fact that the spying is hurting these major companies is
indicative of the size of the problem. This summer, European
avoid the prying ears and eyes of the NSA in America, companies may face a
worse situation overseas. "Where is the safest place to house your data? It
may be the United States," says Trevor Timm, executive director of Freedom
of the Press Foundation. "The natural reaction is to move outside the U.S. if
you are trying to get away from the NSA. But mass surveillance happens with
more frequency overseas, because the NSA thinks there are little to no legal
protections for data overseas." Indeed, the NSA secretly spied on the main
communications links that connect Google and Yahoo data centers around the
world, according to a report in The Washington Post last October. Every
country has its rationale for digital snooping, says Matthew Prince, CEO of
CloudFlare, maker of a website security product. "In the U.S., it's terrorism; in
Germany, it's hate crimes." "Unless you are a nation-state, there aren't any
nation-state proof products," says Greg Young, a network security analyst at
market researcher Gartner. "Some operating systems and browsers we see
having a lot of exploits used on them today got their start as small
alternatives. ... But as they grew in popularity, they, too, entered the
mainstream and became the targets of general attacks."
Patriot Act requires companies like AT&T to hand over all tangible
things they are urged to provide the National Security Agency,
which includes customer data. Companies were being told by the
National Institute of Standards and Technology back in September to stop
using cryptographic standards, which was later reported by analysts at Cisco
Systems. According to their testimony, NIST wanted Cisco Systems and other
companies to refrain from using the cryptographic standards if they were
compromised after being run through the National Security Agencys
BULLRUN program. According to the companys analysts, consumers will lose
their trust in the company if they learn that the cryptography it has promised
its consumers were to be compromised, which could make consumers data
vulnerable. Cisco also reported that, as a result of the scandal involving the
surveillance programs, the company saw a 12 percent slump in sales all over
the world. Cisco executives went on to attest that the NSAs programs
created a level of uncertainty or concern that is hard to fight,
considering the NSAs overwhelming power. This problem could also
present a major problem for other tech companies AT&T could be seeing a
decrease in the number of consumers since reports concerning the
companys willingness to allow the NSA to directly tap into its fiber optics to
make copies of Internet traffic data of millions of Americans were released. It
has been said that AT&T has even worked alongside the CIA in other mass
surveillance programs.. According to Google, the governments position
regarding the NSA spying programs and how they are only being used to
target foreigners is only making it worse for certain tech and
Internet companies that work not only with Americans, but with
other users across the globe as well.
documents and interviews with industry officials, deployed custombuilt, superfast computers to break codes, and began collaborating
with technology companies in the United States and abroad to build
entry points into their products. The documents do not identify which companies have
participated. The N.S.A. hacked into target computers to snare messages
before they were encrypted. In some cases, companies say they were
coerced by the government into handing over their master
encryption keys or building in a back door. And the agency used its
influence as the worlds most experienced code maker to covertly
introduce weaknesses into the encryption standards followed by
hardware and software developers around the world. For the past decade,
N.S.A. has led an aggressive, multipronged effort to break widely
used Internet encryption technologies, said a 2010 memo describing a briefing
about N.S.A. accomplishments for employees of its British counterpart, Government Communications
Vast amounts of
encrypted Internet data which have up till now been discarded are
now exploitable. When the British analysts, who often work side by side with N.S.A. officers,
Headquarters, or GCHQ. Cryptanalytic capabilities are now coming online.
were first told about the program, another memo said, those not already briefed were gobsmacked! An
intelligence budget document makes clear that the effort is still going strong. We are investing in
groundbreaking cryptanalytic capabilities to defeat adversarial cryptography and exploit Internet traffic,
the director of national intelligence, James R. Clapper Jr., wrote in his budget request for the current year.
foreign, for as long as the agency is trying to decrypt it or analyze its technical features. The N.S.A., which
has specialized in code-breaking since its creation in 1952, sees that task as essential to its mission. If it
cannot decipher the messages of terrorists, foreign spies and other adversaries, the United States will be
at serious risk, agency officials say. Just in recent weeks, the Obama administration has called on the
intelligence agencies for details of communications by leaders of Al Qaeda about a terrorist plot and of
Syrian officials messages about the chemical weapons attack outside Damascus. If such communications
But
some experts say the N.S.A.s campaign to bypass and weaken
communications security may have serious unintended
consequences. They say the agency is working at cross-purposes with its other major mission,
can be hidden by unbreakable encryption, N.S.A. officials say, the agency cannot do its work.
apart from eavesdropping: ensuring the security of American communications. Some of the agencys most
intensive efforts have focused on the encryption in universal use in the United States, including Secure
Sockets Layer, or SSL; virtual private networks, or VPNs; and the protection used on fourth-generation, or
4G, smartphones. Many Americans, often without realizing it, rely on such protection every time they send
an e-mail, buy something online, consult with colleagues via their companys computer network, or use a
phone or a tablet on a 4G network. For at least three years, one document says, GCHQ, almost certainly in
collaboration with the N.S.A., has been looking for ways into protected traffic of popular Internet
companies: Google, Yahoo, Facebook and Microsofts Hotmail. By 2012, GCHQ had developed new access
opportunities into Googles systems, according to the document. (Google denied giving any government
access and said it had no evidence its systems had been breached). The risk is that when you build a
back door into systems, youre not the only one to exploit it, said Matthew D. Green, a cryptography
researcher at Johns Hopkins University. Those back doors could work against U.S. communications, too.
Paul Kocher, a leading cryptographer who helped design the SSL protocol, recalled how the N.S.A. lost the
heated national debate in the 1990s about inserting into all encryption a government back door called the
Clipper Chip. And they went and did it anyway, without telling anyone, Mr. Kocher said. He said he
understood the agencys mission but was concerned about the danger of allowing it unbridled access to
private information. The intelligence community has worried about going dark forever, but today they
are conducting instant, total invasion of privacy with limited effort, he said. This is the golden age of
spying. A Vital Capability The documents are among more than 50,000 shared by The Guardian with The
New York Times and ProPublica, the nonprofit news organization. They focus on GCHQ but include
thousands from or about the N.S.A. Intelligence officials asked The Times and ProPublica not to publish this
article, saying it might prompt foreign targets to switch to new forms of encryption or communications that
would be harder to collect or read. The news organizations removed some specific facts but decided to
publish the article because of the value of a public debate about government actions that weaken the most
powerful privacy tools. The files show that the agency is still stymied by some encryption, as Mr. Snowden
suggested in a question-and-answer session on The Guardians Web site in June. Properly implemented
strong crypto systems are one of the few things that you can rely on, he said, though cautioning that the
N.S.A. often bypasses the encryption altogether by targeting the computers at one end or the other and
grabbing text before it is encrypted or after it is decrypted. The documents make clear that the N.S.A.
considers its ability to decrypt information a vital capability, one in which it competes with China, Russia
and other intelligence powers. In the future, superpowers will be made or broken based on the strength of
their cryptanalytic programs, a 2007 document said. It is the price of admission for the U.S. to maintain
unrestricted access to and use of cyberspace. The full extent of the N.S.A.s decoding capabilities is
known only to a limited group of top analysts from the so-called Five Eyes: the N.S.A. and its counterparts
in Britain, Canada, Australia and New Zealand. Only they are cleared for the Bullrun program, the
successor to one called Manassas both names of an American Civil War battle. A parallel GCHQ
counterencryption program is called Edgehill, named for the first battle of the English Civil War of the 17th
century. Unlike some classified information that can be parceled out on a strict need to know basis, one
document makes clear that with Bullrun, there will be NO need to know. Only a small cadre of trusted
contractors were allowed to join Bullrun. It does not appear that Mr. Snowden was among them, but he
nonetheless managed to obtain dozens of classified documents referring to the programs capabilities,
methods and sources. Photo CITING EFFORTS TO EXPLOIT WEB James R. Clapper Jr., the director of national
intelligence. Credit Susan Walsh/Associated Press Advertisement Continue reading the main story Ties to
Internet Companies When the N.S.A. was founded, encryption was an obscure technology used mainly by
diplomats and military officers. Over the last 20 years, it has become ubiquitous. Even novices can tell that
their exchanges are being automatically encrypted when a tiny padlock appears next to a Web address.
Because strong encryption can be so effective, classified N.S.A. documents make clear, the agencys
success depends on working with Internet companies by getting their voluntary collaboration, forcing
their cooperation with court orders or surreptitiously stealing their encryption keys or altering their
software or hardware. According to an intelligence budget document leaked by Mr. Snowden, the N.S.A.
spends more than $250 million a year on its Sigint Enabling Project, which actively engages the U.S. and
foreign IT industries to covertly influence and/or overtly leverage their commercial products designs to
make them exploitable. Sigint is the acronym for signals intelligence, the technical term for electronic
eavesdropping. By this year, the Sigint Enabling Project had found ways inside some of the encryption
chips that scramble information for businesses and governments, either by working with chipmakers to
insert back doors or by exploiting security flaws, according to the documents. The agency also expected to
gain full unencrypted access to an unnamed major Internet phone call and text service; to a Middle Eastern
Internet service; and to the communications of three foreign governments. In one case, after the
government learned that a foreign intelligence target had ordered new computer hardware, the American
manufacturer agreed to insert a back door into the product before it was shipped, someone familiar with
edge. By 1996, the White House backed down. But soon the N.S.A. began trying to anticipate and thwart
encryption tools before they became mainstream. Each novel encryption effort generated anxiety. When
Mr. Zimmermann introduced the Zfone, an encrypted phone technology, N.S.A. analysts circulated the
announcement in an e-mail titled This cant be good. But by 2006, an N.S.A. document notes, the agency
had broken into communications for three foreign airlines, one travel reservation system, one foreign
governments nuclear department and anothers Internet service by cracking the virtual private networks
that protected them. By 2010, the Edgehill program, the British counterencryption effort, was
unscrambling VPN traffic for 30 targets and had set a goal of an additional 300. But the agencies goal was
to move away from decrypting targets tools one by one and instead decode, in real time, all of the
information flying over the worlds fiber optic cables and through its Internet hubs, only afterward
searching the decrypted material for valuable intelligence. A 2010 document calls for a new approach for
opportunistic decryption, rather than targeted. By that year, a Bullrun briefing document claims that the
agency had developed groundbreaking capabilities against encrypted Web chats and phone calls. Its
successes against Secure Sockets Layer and virtual private networks were gaining momentum. But the
agency was concerned that it could lose the advantage it had worked so long to gain, if the mere fact of
decryption became widely known.
Lavabit, wrote a public letter to his disappointed customers, offering an ominous warning. Without
November, when Cisco reported a 12 percent slump in its sales in the developing world due to the NSA
revelations. As the Financial Times reported, new orders fell by 25 percent in Brazil and 30 percent in
Russia and Cisco predicts its overall sales could drop by as much 10 percent this quarter. Cisco executives
NSA spying, considering the company allowed the NSA to directly tap into its fiber optic cables to copy vast
amounts of innocent Americans Internet traffic.
Parliaments civil liberties committee was presented with a proposal to require every American website to
place surveillance notices to EU citizens in order to force the US government to reverse course: The users
should be made aware that the data may be subject to surveillance (under FISA 702) by the US
government for any purpose which furthers US foreign policy. A consent requirement will raise EU citizen
awareness and favour growth of services solely within EU jurisdiction. This will thus have economic impact
on US business and increase pressure on the US government to reach a settlement. [emphasis ours]
Meanwhile, Telenor, Norways largest telecom provider has reportedly halted its plans to move its
customers to a US-based cloud provider.
Members of
Congress who care about the US economy should take note: the
companies losing their competitive edge due to NSA surveillance are
mainstream economic drivers. Just as their constituents are paying attention, so are the
of our business and most of our users are non-American, that's not very helpful."
customers who vote with their dollars. As Sen. Ron Wyden remarked last month, If a foreign enemy was
doing this much damage to the economy, people would be in the streets with pitchforks.
This seemingly continuous drama about the NSAs overreaches comes into play due to conflicting
era mandate of monitoring electronic communications, this creates a blatant conflict of interest. This
defeating network security and privacy. Loss of confidence in our ability to adhere to confidentiality
agreements would lead to loss of access to proprietary information that can save time when developing
new capability, reads one communique to GCHQ workers. Some exploitable products are used by the
general public; some exploitable weaknesses are well known eg possibility of recovering poorly chosen
passwords. Knowledge that GCHQ exploits these products and the scale of our capability would raise public
this activity
undermines the federal governments moral authority to pursue and
prosecute computer crimes, as this alleged creation of a backdoor
network is a computer crime within itself. In effect, the federal
government is creating a do as I say, not as I do scenario in which
the government is perceived as violating the very laws it
aggressively enforces. Finally, it calls into question the trustworthiness
of Silicon Valley, which serves as a major component to the nations
economy. A slowdown in buyers confidence in electronic consumer
goods could have a stalling effect on the nations recovery.
Backdoors are fundamentally in conflict with good security, said
Christopher Soghoian, principal technologist and senior policy analyst at the
American Civil Liberties Union. Backdoors expose all users of a
backdoored system, not just intelligence agency targets, to
heightened risk of data compromise. This is because the insertion of backdoors in a
awareness generating unwelcome publicity for us and our political masters. Second,
software product, particularly those that can be used to obtain unencrypted user communications or data,
significantly increases the difficulty of designing a secure product.
Global's Carr via email. Callas echoed that assessment, saying that the revelations would "undoubtedly"
have an effect. Then again, the NSA isn't the only intelligence agency in the world, and when it comes to
building back doors into commercial equipment, "we know that other countries are doing it, too," he said.
wrong companies, too often they have been deceived by false myths
and new paradigms (e.g. Cloud computing) designed to facilitate the
surveillance operated by intelligence agencies. Bullrun program is the
last revelation on a nefarious policy conducted by one of the major security
agencies, ironically because of its willingness to supervise each and every
date of the largest Internet has made it unsafe. Chasing the concept of
security NSA has actually opened loopholes in the global information systems
that could have benefited powers such as China or terrorist groups
back door in all encryption, it set out to accomplish the same goal by
stealth. The agency, according to the documents and interviews with
industry officials, deployed custom-built, superfast computers to
work side by side with N.S.A. officers, were first told about the
program, another memo said, those not already briefed were
gobsmacked! An intelligence budget document makes clear that the
effort is still going strong. We are investing in groundbreaking
cryptanalytic capabilities to defeat adversarial cryptography and
exploit Internet traffic, the director of national intelligence, James R.
Clapper Jr., wrote in his budget request for the current year. In recent
months, the documents disclosed by Mr. Snowden have described
the N.S.A.s broad reach in scooping up vast amounts of
communications around the world. The encryption documents now
back door into systems, youre not the only one to exploit it, said
Matthew D. Green, a cryptography researcher at Johns Hopkins
University. Those back doors could work against U.S. communications,
too. Paul Kocher, a leading cryptographer who helped design the SSL
protocol, recalled how the N.S.A. lost the heated national debate in
the 1990s about inserting into all encryption a government back
door called the Clipper Chip. And they went and did it anyway,
without telling anyone, Mr. Kocher said. He said he understood the
documents make clear that the N.S.A. considers its ability to decrypt
information a vital capability, one in which it competes with China,
Russia and other intelligence powers. In the future, superpowers
will be made or broken based on the strength of their cryptanalytic
programs, a 2007 document said. It is the price of admission for
the U.S. to maintain unrestricted access to and use of cyberspace.
the Internet, it has become ubiquitous. Even novices can tell that their
exchanges are being automatically encrypted when a tiny padlock
appears next to the Web address on their computer screen. Because
strong encryption can be so effective, classified N.S.A. documents
make clear, the agencys success depends on working with Internet
companies by getting their voluntary collaboration, forcing their
with the request told The Times. The 2013 N.S.A. budget request
highlights partnerships with major telecommunications carriers to
shape the global network to benefit other collection accesses that
is, to allow more eavesdropping. At Microsoft, as The Guardian has
reported, the N.S.A. worked with company officials to get pre-
N.S.A. document suggests that the agencys hacking division uses that
same program to develop and leverage sensitive, cooperative
relationships with specific industry partners to insert vulnerabilities
into Internet security products. A Way Around By introducing such back
But the agency was concerned that it could lose the advantage it had
worked so long to gain, if the mere fact of decryption became widely
known. These capabilities are among the Sigint communitys most
fragile, and the inadvertent disclosure of the simple fact of could alert
the adversary and result in immediate loss of the capability, a GCHQ
document outlining the Bullrun program warned. Corporate Pushback
Analysts at Forrester,
the respected tech industry research firm, went even further. In a
blog post, Forrester analyst James Staten projected a net loss for the
Internet service provider industry of as much as $180 billion by
2016, which would amount to a 25% decline in the overall
information technology services market. All from the unveiling of a
single kangaroo-court action called PRISM, Staten wrote. His estimate
the risks of storing data with a U.S. company outweigh the benefits.
includes domestic clients, which could bypass U.S. cloud providers for international rivals, as well as nonU.S. cloud providers, which could lose as much as 20% of their business due to foreign governments like
Germany which have their own secret snooping programs. With numbers at that scale, its not hard to
understand why the top U.S. Internet companies are vehemently protesting the governments secret
surveillance programs. Silicon Valley executives frequently tout their belief in idealistic principles like free
speech, transparency and privacy. But it would be naive to think that they also arent deeply concerned
Businesses increasingly
recognize that our governments out-of-control surveillance hurts
their bottom line and costs American jobs, Rep. Justin Amash, the
Michigan Republican and outspoken critic of the NSAs secret
programs, told TIME by email. It violates the privacy of their
customers and it erodes American businesses competitive edge. On
about the impact of the NSA revelations on the bottom line.
Monday, a coalition of the largest U.S. Internet companies launched a campaign to pressure the
effort yet by the tech titans to repair the damage to their corporate reputations caused by the NSA
revelations. The coalition is calling for limits on government authority to collect user information; better
oversight and accountability; greater transparency about the governments demands; respect for the free
Recent
revelations about government surveillance activities have shaken
the trust of our users, and it is time for the United States
government to act to restore the confidence of citizens around the
world, said Mayer, Yahoos CEO. Page, Googles CEO, said: The
security of users data is critical, which is why weve invested so
much in encryption and fight for transparency around government
requests for information. This is undermined by the apparent
wholesale collection of data, in secret and without independent
oversight, by many governments around the world.
flow of data across borders; and the avoidance of conflict between governments.
years. Another study by Forrester said the $35 billion estimate was too
low and pegged the real loss figure around $180 billion for the US
tech industry by 2016. Much of the economic problem stems for the
US governments view that its open season when it comes to spying
on non-U.S. persons. As Mark Zuckerberg said in September, the
governments position isdont worry, were not spying on any
Americans. Wonderful, thats really helpful for companies trying to
work with people around the world. Googles Chief Legal Officer David
Drummond echoed this sentiment last week, saying: The justification
has been couched as 'Don't worry. We're only snooping on foreigners.'
For a company like ours, where most of our business and most of our
users are non-American, that's not very helpful." Members of Congress
who care about the US economy should take note: the companies
losing their competitive edge due to NSA surveillance are
mainstream economic drivers. Just as their constituents are paying
attention, so are the customers who vote with their dollars. As Sen.
Ron Wyden remarked last month, If a foreign enemy was doing this
much damage to the economy, people would be in the streets with
pitchforks.
be between $21.5 billion and $35 billion, mostly affecting U.S. cloud
service providers. However, they have gone back and researched the
impact and found it to be both far larger and far broader than originally
estimated. In fact, it appears the surveillance programs could cause a
major deciding factor with regard to where they put their data.
Software-as-a-Service (SaaS) company Birst indicated that its
German insurance client pulled out of using the firm. In fact, Salesforce
faced major short-term sales losses and suffered a $124 million deficit
in the fiscal quarter after the NSA revelations according to the report.
Cisco, the U.S. firm that leads the networking market, reported that
sales was interrupted in Brazil, China and Russia as a result of the
belief that the U.S. had placed backdoors in its networking products .
Ciscos CEO, John Chambers, tied his revenue shortfall to the NSA
disclosure. Servint, a U.S. Web Hosting company, reported losing half
of its international clients as a result of the NSA Disclosure. Qualcomm,
IBM, Microsoft and Hewlett-Packard have all reported significant
adverse revenue impact in China from the NSA disclosure. A variety
of U.S. companies including Cisco, McAfee/Intel, Apple and Citrix
Systems were all dropped from the approved list for the Chinese
government as a result of the NSA disclosure. But it isnt even just
now markets itself as Cloud Services Made in Germany and safe from
the NSA. Cloudwatt (France) has joined a nationalistic consortium of
companies called Sovereign Cloud (cool name) and advertises as
being resistant to NSA spying. F-Secure which competes with Dropbox
and Microsoft OneDrive, has altered its marketing to include the
language that they will not share data with the U.S. government as
they move against these U.S. firms. Additional findings include broad
protectionist measures in a variety of regions using this disclosure to
lock U.S. firms out of the country and favor local firms and the creation
of anti-U.S. technology networks. In addition, the governments are
aggressively funding domestic startups that can replace U.S.
companies in their country. Australia, China, Russia, and India have
passed laws making it illegal for personal information to be stored
out of the country making it far more difficult for U.S. firms to do
business there. China further launched an IOE movement to prevent
banks from buying from IBM, Oracle and EMC. Government
ability to defeat encryption is vital to their core missions of counterterrorism and foreign intelligence gathering. But security experts
accused them of attacking the internet itself and the privacy of all
users. "Cryptography forms the basis for trust online," said Bruce
think that cyber-criminals are going after the really big guys, not them,
but that's simply not true. Cyber-criminals in particular target SMBs to
compromise the PCs they use for online banking and payments in order
to commit fraud in a big way by emptying out business accounts.
Unfortunately, there's actually less protection for recovery of stolen
funds under the law for businesses than for consumers. Banks may
even give the small business a hard time, questioning the security it
has in place. How does cybercrime often begin? In many cases, the
victim opens a "phishing" e-mail message with an attachment laden
with malware that will let the attacker begin infiltrating the network. To
tamp this down, spam filters should be in place to try and catch
phishing e-mails and other junk. But some of it, especially highly
targeted, will get through and employees should be trained not to open
anything that seems even remotely unusual. Because web-based
malware is also commonplace, applying Web-surfing controls on
employees' Internet use is also a good idea. The big companies are
starting to use advanced malware protection systems that can track
targeted attacks in various ways, and small businesses should too -- if
it's affordable
are being left off some requests for proposals from foreign customers that
previously would have included them.70 This refers to German companies,
for example, that are increasingly uncomfortable giving their business to
American firms. Meanwhile, the German government plans to change
its procurement rules to prevent American companies that cooperate
with the NSA or other intelligence organizations from being awarded
federal IT contracts.71 The government has already announced it
intends to end its contract with Verizon, which provides Internet
service to a number of government departments.72 There are
indications that Verizon is legally required to provide certain things
to the NSA, and thats one of the reasons the cooperation with
Verizon wont continue, a spokesman for the German Interior Ministry
told the Associated Press in June.73 Major commercial actors on both
continents are preparing offensive and defensive strategies to battle in the
market for a competitive advantage drawn from Snowdens revelations.
-Georg Mascolo and Ben Scott, Lessons from the Summer of Snowden ,,
New Americas Open Technology Institute 11 The NSA disclosures have
similarly been blamed for Brazils December 2013 decision to award
a $4.5 billion contract to Saab over Boeing, an American company
that had previously been the frontrunner in a deal to replace Brazils
fleet of fighter jets.74 Welber Barral, a former Brazilian trade
secretary, suggested to Bloomberg News that Boeing would have
won the contract a year earlier,75 while a source in the Brazilian
government told Reuters that the NSA problem ruined it for the
Americans.76 As we will discuss in greater depth in the next section,
Germany and Brazil are also considering data localization proposals that
could harm U.S. business interests and prevent American companies from
entering into new markets because of high compliance costs.
Princeton
technologist Ed Felten, who previously at the Federal Trade
Commission, best explained why the NSA revelations could end up
hurting US businesses: This is going to put US companies at a
competitive disadvantage, because people will believe that U.S.
companies lack the ability to protect their customersand people
will suspect that U.S. companies may feel compelled to lie to their
customers about security. The fallout may worsen. One study released
shortly after the first Edward Snowden leaks said the economy
would lose $22 to $35 billion in the next three years. Another study
by Forrester said the $35 billion estimate was too low and pegged
the real loss figure around $180 billion for the US tech industry by
2016.
The report
revealed today that the US has improved its competitiveness
position for the second year running, climbing two places to third.
across the world, shedding light on each of their strengths and weaknesses.
Whilst the UK rose one spot to take up ninth position in the global ranks. Switzerland and Singapore hold
which include: Institutions, Infrastructure, Macroeconomic Environment, Health and Primary Education,
Higher Education and Training, Goods Market Efficiency, Labour Market Efficiency, Financial Market
Development, Technological Readiness, Market Size, Business Sophistication, Innovation. Obviously many
of these pillars play into a lot of the themes and stories we write about on diginomica wether that be a
lack of skills in the market, access to finance for businesses, the economic environment, etc.
However, the WEF noted that whilst many of these areas are
important to establishing a competitive market, there is one pillar
that will continuously boost a countrys global economic ranking
that one pillar being innovation. The report states (excuse the lengthy quote): Although
substantial gains can be obtained by improving institutions, building infrastructure, reducing
macroeconomic instability, or improving human capital, all these factors eventually run into diminishing
In the long
run, standards of living can be largely enhanced by technological
innovation. Technological breakthroughs have been at the basis of
many of the productivity gains that our economies have historically
experienced. These range from the industrial revolution in the 18th
century and the invention of the steam engine and the generation of
electricity to the more recent digital revolution. The latter is not only
transforming the way things are being done, but also opening a
wider range of new possibilities in terms of products and services.
Innovation is particularly important for economies as they approach
the frontiers of knowledge, and the possibility of generating more
value by merely integrating and adapting exogenous technologies
tends to disappear. In other words, for economies such as the US
and UK, innovation and digital are key if they want to continue to be
global economic forces. Innovation is the only area (according to the
WEF), that doesnt eventually suffer from diminishing returns. On
the United States, WEF said that its economy is extremely
productive because its companies are highly sophisticated and
innovative and supported by an excellent university system that
collaborates well with the business sector in R&D. It also has flexible labour
returns. The same is true for the efficiency of the labor, financial, and goods markets.
markets and benefits from the size of its domestic market. However, the US isnt without its weaknesses
and some of the things holding it back from further growth include cynicism amongst the business
community, where there is poor trust in politicians and a general view that the government spends its
resources wastefully. Heres some more detail about some of the key pillars for the United States. The first
figure to the right of the category is rated out of 7 (unless stated otherwise), with 7 being the best. The
It is
evident from the results that the US is a technology and innovation
behemoth, scoring well across most categories including the
availability of latest technologies, firm-level tech absorption,
capacity for innovation, availability of engineers and R&D.
second figure is the countrys global ranking for that specific category, out of 144 countrie
applications in the clouds are modified on a daily base (to accommodate new
requirements, or enable new economic venues), which is impossible with onpremise solutions. It is important to notice that the aggregate role of these
network effects can be relevant but it is extremely difficult to measure.
Finally, cloud computing is going to introduce the possibility of a)
sharing resources (and costs) among a large pool of users, b) allowing for
centralization of infrastructures in areas with lower costs, and c)
allowing for peak-load capacity increases (generating efficiency
improvements for systems that are often only 9 10-20% utilized). These
features will lead to additional savings in energy and to greater
environmental sustainability, whose measure, however, is again subject
to large uncertainty.11 A recent study of the International Data Corporation
(2008) has examined the role of IT cloud services across five major product
segments representing almost two-thirds of total enterprise IT spending
(excluding PCs): business applications (SaaS), infrastructure software,
application development & deployment software, servers and storage. Out of
the $ 383 billion that firms have spent in 2008 for these IT services only $
16.2 billion (4%) could be classified as cloud services. In 2012 the total
figure was expected to be at $ 494 billion and the cloud part at $ 42
billion, which would correspond to 9% of customer spending, but also to a
large part of the growth in IT spending. The majority of cloud spending is
and will remain allocated to business applications, with a relative
increase of investment in data storage. Even if the relative size of IT cloud
services may remain limited in the next few years, it is destined to
increase and to have a relevant macroeconomic impact, especially in
terms of creation of new SMEs and of employment. In times of global
crisis, this could be an important contribution to promote the recovery and to
foster growth. Cloud platforms and new data centres are creating a new level
of infrastructures that global developers can exploit, especially SMEs that are
so common in Europe. This will open new investment and business
opportunities currently blocked by the need of massive up-front
investments.
technologies that we are about to enable will help people save energy,
and drastically reduce urban traffic, public waste, and railway system
accidents. CEOs and government leaders will become the IT managers
of the future.
Although we may never solve world hunger, in this new economy,
some aspects of utopia could likely become reality . Imagine the
following scenarios: If resources were allocated based on peoples
needs, perhaps poverty and hunger could be significantly alleviated;
If we could track any device, virtual or physical, lost and stolen
property would no longer be commonplace; If we could eliminate
parking problems and reduce urban traffic by 20 to 30 percent, auto
accidents and road deaths could also decrease; If improvements were
Croatia, milking sensors collect and send data about cows milk
production. Farmers can track feed consumption of their animals and
quickly analyze the data; In October 2013, Starbucks unveiled plans to
double the number of its Internet-linked coffee brewers, which track
customer preferences. Starbucks also might hook up its refrigerators to
the web, so the machines can order new supplies when needed;
Monsanto, the giant agricultural company, is extending predictive data
analytics into the world of big agriculture, disrupting established
industries in a way that traditional computing never could. Monsanto
will acquire knowledge about the condition of each of the 20 million
crop lands in the United States: what is grown on each crop land
annually, the crop yields, and the water-holding capacity of the soil.
Each of Monsantos predictive simulations analyzes 5 trillion data
points. As technological, social, and economic advancements continue,
deserve an Internet that is safe and secure, so they can shop, bank,
communicate, and learn online without fear their accounts will be
hacked or their identity stolen. President Obama has declared that
the cyber threat is one of the most serious economic and national
security challenges we face as a nation and that America's economic
prosperity in the 21st century will depend on cybersecurity. To help
the country meet this challenge and to ensure the Internet can
continue as an engine of growth and prosperity, the Administration is
implementing the National Strategy for Trusted Identities in
Cyberspace. The Administration also released the International
Strategy for Cyberspace to promote the free flow of information, the
security and privacy of data, and the integrity of the interconnected
networks, which are all essential to American and global economic
prosperity and security. High-speed internet infrastructure is key to a
21st century information economy. Through $7 billion in targeted
investments from the Recovery Act, the Administration has expanded
broadband access nationwide, improved high-speed connectivity in
rural areas and public computer centers, and increased Internet
capacity in schools, libraries, public safety offices, and other
community buildings. A 21st century electric system is essential to
America's ability to lead the world and create jobs in the cleanenergy economy of the future. As part of the Recovery Act, this
and services are used to access it," and the gross revenues of such companies are measured by direct
impact. Several business activities use or leverage Facebook and in turn lead to increases in demand,
which is described as supply chain impact. Finally, the employee spending impact takes into account the
money spent by employees at companies that work at "businesses that use Facebook and at their
suppliers."
The report
revealed today that the US has improved its competitiveness
position for the second year running, climbing two places to third.
across the world, shedding light on each of their strengths and weaknesses.
Whilst the UK rose one spot to take up ninth position in the global ranks. Switzerland and Singapore hold
which include: Institutions, Infrastructure, Macroeconomic Environment, Health and Primary Education,
Higher Education and Training, Goods Market Efficiency, Labour Market Efficiency, Financial Market
Development, Technological Readiness, Market Size, Business Sophistication, Innovation. Obviously many
of these pillars play into a lot of the themes and stories we write about on diginomica wether that be a
lack of skills in the market, access to finance for businesses, the economic environment, etc.
However, the WEF noted that whilst many of these areas are
important to establishing a competitive market, there is one pillar
that will continuously boost a countrys global economic ranking
that one pillar being innovation. The report states (excuse the lengthy quote): Although
substantial gains can be obtained by improving institutions, building infrastructure, reducing
macroeconomic instability, or improving human capital, all these factors eventually run into diminishing
In the long
run, standards of living can be largely enhanced by technological
innovation. Technological breakthroughs have been at the basis of
many of the productivity gains that our economies have historically
experienced. These range from the industrial revolution in the 18th
century and the invention of the steam engine and the generation of
electricity to the more recent digital revolution. The latter is not only
transforming the way things are being done, but also opening a
wider range of new possibilities in terms of products and services.
Innovation is particularly important for economies as they approach
returns. The same is true for the efficiency of the labor, financial, and goods markets.
It is
evident from the results that the US is a technology and innovation
behemoth, scoring well across most categories including the
availability of latest technologies, firm-level tech absorption,
capacity for innovation, availability of engineers and R&D.
second figure is the countrys global ranking for that specific category, out of 144 countrie
forward-looking, and think clearly about how to create the basis for
sustainable economic recoveries. Not surprisingly, given its long-term
potential, a number of countries have identified information technology as a
crucial infrastructure need for national development. Broadband is viewed in
many places as a way to stimulate economic development, social
connections, and civic engagement. National leaders understand that crosscutting technology speeds innovation in areas such as health care, education,
communications, and social networking. When combined with
organizational changes, digital technology can generate powerful
new efficiencies and economies of scale.[iii]
has cost American tech companies profits, sales and exports to growing markets around the world. "When
the actions of a foreign government threaten red-white-and-blue jobs, Washington gets up at arms. But,
even today, almost no one in Washington is talking about how overly broad surveillance is hurting the US
economy, Wyden said. Let me be clear: It is time to end the digital dragnet, which harms American
liberty and the American economy without making the country safer. Google Executive Chairman Eric
Schmidt, Microsoft Executive Vice President and General Counsel Brad Smith, Facebook General Counsel
Colin Stretch, Dropbox General Counsel Ramsey Homsany, and John Lilly of the venture capital firm
wont use technology they dont trust. Globally we need better ways to protect public safety, preserve our
fundamental freedoms, and promote privacy and trust. Todays roundtable is helping forward that
important global conversation. Colin Stretch, General Counsel, Facebook: " We
continue to
believe meaningful surveillance reform is critical to restoring
peoples faith in the Internet. The government has a vital role to
play in keeping the public safe, but we believe they can do this while
being more transparent about their actions. Thats why we'll
continue to work with leaders like Senator Wyden and his colleagues
in Congress to address all of the reforms necessary to restore
confidence in the internet. Ramsey Homsany, General Counsel, Dropbox: Users around the
world trust Dropbox to be a home for their most important information. Safeguarding that information is a
top priority for us and our business. Well keep working hard on our users behalf, but we also need
Congress to pass the USA Freedom Act so the law does its part to protect their information.
Removal of Backdoors enable more public trusthigher incentive to invest, increase in innovation
Voltz, writer of the National Journal, 15
[National Security, House Lawmakers to Reintroduce Bill to Limit NSA
'Backdoor' Spying, http://www.nationaljournal.com/tech/house-lawmakers-toreintroduce-bill-to-end-nsa-backdoor-exploits-20141204, 6/25/15, CY]
Washington, D.C. U.S. Senator Ron Wyden, D-Ore., today introduced the
Secure Data Act to protect Americans privacy and data security. The bill
prohibits government mandates to build backdoors or security
vulnerabilities into U.S. software and electronics. U.S. government
officials have recently proposed to compel companies to build backdoors in
in October, Senate Intelligence Committee Chairman Dianne Feinstein (D-Calif.) has acknowledged that
Congress conducts little oversight of intelligence-gathering under the presidential authority of Executive
Order 12333 , which defines the basic powers and responsibilities of the intelligence agencies.
the
reform efforts to date have been relatively narrow, focusing
primarily on the surveillance programs impact on the rights of U.S.
citizens, and failing to address other key concerns. In addition to the risk of
violating the privacy and civil liberties of Americans, the Presidents NSA Review Group highlights a
number of other areas where the NSA programs threaten our national interests. The potential effects of
surveillance in our relations with other nations are concerning, especially among our close allies and
others with whom we share values, interests, or both. Unnecessary or excessive surveillance can create
risks that outweigh any gain.322 The Review Group adds that surveillance and the acquisition of
information might have harmful effects on commerce, especially if it discourages people either citizens of
Given the
diverse array of concerns, we make the following recommendations
aimed at restoring trust in American companies and the credibility of
the U.S. government, as well as fostering a more open and secure
Internet for users worldwide: 1. Strengthen privacy protections for
both Americans and non-Americans, within the United States and
extraterritorially. 2. Provide for increased transparency around
government surveillance, both from the government and companies.
3. Recommit to the Internet Freedom agenda in a way that directly
addresses issues raised by NSA surveillance, including moving
toward international human rights-based standards on surveillance.
4. Begin the process of restoring trust in cryptography standards
through the National Institute of Standards and Technology. 5.
the United States or others from using certain communications providers.323
The United
States Government should reaffirm the 2011 International Strategy
for Cyberspace. It should stress that Internet governance must not be limited to governments, but
free and open Internet is critical to both self-government and economic growth.
should include all appropriate stakeholders, including businesses, civil society, and technology specialists.
recommend a series of steps to reduce the risks associated with insider threats. A governing principle is
agencies should institute a Work-Related Access approach to the dissemination of sensitive, classified
information. Employees with high-level security clearances should be subject to a Personnel Continuous
Monitoring Program. Ongoing security clearance vetting of individuals should use a risk management
approach and depend on the sensitivity and quantity of the programs and information to which individuals
are given access.
trust in
encryption standards, and in the resulting software, must be
maintained. Although NSA has made clear that it has not and is not
now doing the activities listed below, the US Government should
make it clear that: NSA will not engineer vulnerabilities into the
encryption algorithms that guard global commerce; The United
States will not provide competitive advantage to US firms by the
provision to those corporations of industrial espionage; NSA will
not demand changes in any product by any vendor for the purpose
of undermining the security or integrity of the product, or to ease
NSAs clandestine collection of information by users of the product;
and NSA will not hold encrypted communication as a way to avoid
retention limits
technology. Recommendation 32 is designed to describe those steps. The central point is that
NOTE: Im a little unsure if the card directly above would work as a solvency card.
bankruptcy as they reorganize for survival. The damage has also since
spread to domestic aerospace and telephony service providers. The
programs identified in the report are PRISM; the program authorized
by the FISA Amendments act, which allowed search without the need
for a warrant domestically and abroad, and Bullrun; the program
--Cybersecurity--
as dams are infiltrated, and more than a million liters of raw sewage are released into coastal waters.
Agents tied to al Qaida buy useful information to penetrate U.S. Defense Department computer networks.
Power grids in California are infiltrated and held captive for weeks.
The stock market closes early because of computer problems after a
record-setting one-week loss. Americans are alarmed at the
devastation, and the cost of these cyberattacks comes on the heels
of a major attack on U.S. soil. The competitive media help spread the
cyberterrorism panic throughout the world. Each of these situations
is 100-percent plausible because each one has occurred. Fortunately,
they took place at different times during the past several years.
However, they could occur in an orchestrated fashion in a short time
frame in the future. Cyberspace is a unique environment. It is
ageographic and borderless, and attacks can be asymmetric and
clandestine. Attacks have virtually unlimited range and speed. Massive
results can be achieved without massing forces. These attacks are fast, easy and relatively inexpensive.
Many regional conflicts have cyberspace dimensions where battles are fought by hackers on both sides
with their own rules of engagement. This occurred in Bosnia, Kosovo and several Middle Eastern countries.
Cyberspace security is an international challenge that is not constrained by national boundaries. The
diversity of information system adversaries ranges from individuals to nation-states. Enemies of the United
States are conducting information operations against the nation daily. Hackers are probing while wellorganized and well-financed foreign intelligence collection organizations are performing intelligence
preparation of the cyberbattlefield to gain unauthorized knowledge and access to Defense Department
are rising exponentially, and several factors contribute to this equation. The growth of the Internet raises
the number of both attackers and targets. Vulnerabilities of new software versions continue to grow.
become more powerful and easier to use, so has the sophistication of the weapons that information
adversaries have at their disposal. An adversary with minimal technology, funding, training, staff and
defense infrastructure can employ these limited resources as weapons on short notice from anywhere in
the world. An intruder could take countless specific actions after gaining access to an information system;
however, these acts can be grouped into four general categories: modification, fabrication, interception
industrial espionage experts, hacker groups and nation-states. Newcomers to this area have infiltrated
very sensitive systems with relative ease. These people use many tactics, techniques and procedures,
such as polymorphic viruses or polymorphic code, worms, software vulnerability exploits, other viruses and
denial-of-service attacks. The challenge is that all critical infrastructures must be defended. The Presidents
Commission on Critical Infrastructure Protection divided U.S. infrastructures into five sectors: information
and communication, physical distribution, energy, banking and finance, and vital human services.
operates within the cyberworld. The television network al Jazeera reported that Osama bin Ladens senior
aides transmitted the instructions for the attacks on September 11, 2001, to Mohammed Atta via encoded
e-mail. Al Qaida terrorists are using the Internet to research infrastructure information about U.S. water
and wastewater systems. Federal Bureau of Investigation bulletins say that U.S. law enforcement and
intelligence agencies have received indications that al Qaida members have sought information on
supervisory control and data acquisition (SCADA) systems available on multiple SCADA-related Web sites.
SCADA systems allow utility and transportation companies to monitor and direct equipment at unmanned
facilities from a central location. The computers of bin Laden associates were found to include structural
engineering data and programs related to dams and other water retaining structures. Ramzi Yousef, the
first World Trade Center bomber,
Qaida is on the threshold of using the Internet as a direct instrument for bloodshed. Terrorists must go
beyond Web page defacements, simple hacks or pranks .
hacker broke into the SCADA computer systems that run Arizonas Roosevelt Dam. Federal authorities said
the hacker had complete control of the dams massive floodgates. This dam holds back as much as 489
trillion gallons of water above a flood plain inhabited by more than a million people. More than 3 million
SCADA devices are in use today. Members of Congress have expressed concern. There
is a 50
percent chance that the next time al Qaida terrorists strike the
United States, their attack will include a cyberattack , Rep. Lamar Smith (RTX) said. Al Qaida has the capabilities, has the intention, has a history of gathering reconnaissance and has
targeted the United States. This makes the organization a very serious cyberthreat. A June 2002 survey of
technology industry experts revealed that 74 percent thought it was nearly certain that there would be a
cyberattack against the United States within one year. Nearly 60 percent said they expect a major
cyberattack against the federal government within one year. A February 2002 CIA memorandum indicates
that al Qaida had far more interest in cyberterrorism than previously believed and had contemplated the
use of hackers for hire to speed the acquisition of capabilities. As a relatively new dimension of warfare,
the cyberenvironment must be thoroughly studied and analyzed. The events of September 11 caught the
United States by surprise. Unless appropriate steps are taken to protect the country against cyberattacks
now, it surely will suffer tragic cyberterrorist attacks that could include loss of life. Terrorists are pursuing
this capability. Major cyberterror attacks against the United States will occur. It is a matter of when, not if.
I/L Backdoors
N.S.A. illegally gathers information- secretly builds
backdoors into computer systems
Markoff, Senior Writer for the New York Times, 13
(John, September 6, New York Times, N.S.A. Able to Foil Basic Safeguards of
Privacy on Web, http://www.nytimes.com/2013/09/06/us/nsa-foils-muchinternet-encryption.html, June 23, 2015, GG)
The agency, according to the documents and interviews with industry
officials, deployed custom-built, superfast computers to break codes, and
began collaborating with technology companies in the United States
and abroad to build entry points into their products. The documents do
not identify which companies have participated. The N.S.A. hacked into target
computers to snare messages before they were encrypted. In some cases,
companies say they were coerced by the government into handing
over their master encryption keys or building in a back door. And the
agency used its influence as the worlds most experienced code maker to
covertly introduce weaknesses into the encryption standards followed
by hardware and software developers around the world. For the past decade,
N.S.A. has led an aggressive, multipronged effort to break widely
used Internet encryption technologies, said a 2010 memo describing a
briefing about N.S.A. accomplishments for employees of its British
counterpart, Government Communications Headquarters, or GCHQ.
Cryptanalytic capabilities are now coming online. Vast amounts of
encrypted Internet data which have up till now been discarded are now
exploitable. The agencys success in defeating many of the privacy
protections offered by encryption does not change the rules that
prohibit the deliberate targeting of Americans e-mails or phone
calls without a warrant. But it shows that the agency, which
was sharply rebuked by a federal judge in 2011 for violating the rules
and misleading the Foreign Intelligence Surveillance Court, cannot
necessarily be restrained by privacy technology. N.S.A. rules permit the
agency to store any encrypted communication, domestic or foreign, for as
long as the agency is trying to decrypt it or analyze its technical features.
Bull run increases risk of business cyber attacksallows third party actor and cybercriminal invasion
Pierluigi ,Chief Information Security Officer, 2013,
[Security Affairs, NSA Bullrun program, encryption and false perception of
security, http://securityaffairs.co/wordpress/17577/intelligence/nsa-bullrunprogram-false-perception-security.html, 6/23/15, CY]
Revelations on Bullrun program demonstrated that NSA has capabilities against widely-used online
mechanisms were accessible by US Intelligence and its partners like Britains GCHQ. The New York Times
and The Guardian newspapers and the journalism non-profit ProPublica revealed details of the new super
secret program, codenamed Bullrun, sustained by the NSA to have the possibility to bypass encryption
adopted worldwide by corporates, governments and institutions. The Bullrun program is considered the
second choice of U.S. Government to the failure in place a backdoor, the so-called Clipper chip, into
encryption that would have allowed it to eavesdrop on communications. Be aware we are not speaking of
collapse of many certainties, last in order of time is the integrity of encryption standards, according the
Following an
image of classification guide to the NSAs Bullrun decryption
program The repercussions are critical, the diffusion of the defective
encryption standard has exposed the same data accessed by NSA to
the concrete risk of stealing operated by third party actors such as
foreign state-sponsored hackers and cybercriminals. The encryption
technologies that the NSA has exploited to enable its secret dragnet
surveillance are the same technologies that protect our most
sensitive information, including medical records, financial
transactions, and commercial secrets, Even as the NSA demands
more powers to invade our privacy in the name of cybersecurity , it is
making the internet less secure and exposing us to criminal hacking ,
foreign espionage, and unlawful surveillance. The NSAs efforts to
secretly defeat encryption are recklessly shortsighted and will
further erode not only the United States reputation as a global
champion of civil liberties and privacy but the economic
competitiveness of its largest companies.commented Christopher Soghoian,
popular newspapers NSA has worked to undermine the security of those standards.
principal technologist of the ACLUs Speech, Privacy and Technology Project. Suddenly the IT world
discovered that has perceived a false sense of security, the repercussion on the global security market are
enormous, customers have put their trust in the wrong companies, too often they have been deceived by
false myths and new paradigms (e.g. Cloud computing) designed to facilitate the surveillance operated by
opened loopholes in the global information systems that could have benefited powers such as China or
pure diversion to influence the global sentiment and keep the lights of the media far from the dirty
collusions of governments and private companies. None of methods used to access to encryption keys
involve in cracking the algorithms and the math underlying the encryption, but rely upon circumventing
and otherwise undermining encryption. The newspapers sustains that NSA maintains an internal
Using
the Key Provisioning Service the NSA is able to automatically decode
communications and access to encrypted data. Every time the
agency needs a key for a new product it formalizes a request to
obtain it, the request is so-called Key Recovery Service. Other news
reported that in one circumstance the US government learned that a
foreign intelligence had ordered new computer hardware and after
database, dubbed Key Provisioning Service, of encryption keys for each commercial product.
of the encryption chips that scramble information for businesses and governments, either by working with
chipmakers to insert back doors or by surreptitiously exploiting existing security flaws. We are therefore
assuming that the U.S. Government has deliberately prompted to enter bugs in software solutions sold
worldwide, the knowledge of those flaws could then have been sold in the black market of zero-day
vulnerabilities about which so much has been discussed. At that point, probably the same U.S. Intelligence
would offer big bucks to buy back the zero-day to cover traces of the shocking activities. Which are the
targets of the NSA? Everyone! The imperative is global monitoring, ISP, Internet phone call and text
services and mobile operators are privileged targets according the paper, and I add social media platforms.
Of course now every internet users desire to stay far from prying eyes, the use of anonymizing network
and secure messaging system is exploding, Tor metrics data revealed an incredible increase of total
number of Tor users. The unique certainties are that the surveillance program will continue and the
expense of monitoring activities will increase exponentially, there is another consideration to do related to
the global commerce for security solutions. The
loss for our nation that companies are losing the willingness to
cooperate legally and voluntarily, according to Robert Litt, general
counsel of the Office of the Director of National Intelligence. However, its
hard to argue that this reaction was unpredictable. Government data
collection, particularly when it targets foreign citizens, has dealt a
serious blow to these companies bottom lines. Some nations are
considering instituting requirements for data to be physically stored
in the country, a move that risks destroying the Internet as we know it
by balkanizing the net into a series of splinternets that dont communicate
with each other. Unfortunately, this is also a loss for law enforcement. In the
case of systems like Apples, law enforcement will now longer be able to
access information on a device, even if it has a legitimate, targeted warrant.
Tech companies will be wary of any requests to access user information, even
if it is for valid purposes. And many will think twice before choosing to
collaborate with or work for the U.S. government. The NSA has clearly taken
its intelligence gathering mission seriously, but at the expense of its mission
to ensure U.S. cybersecurity. Its actions have also been extremely risky;
it almost appears as if the NSA never expected anyone to find out about what
it was doing, an absurd assumption when the program involved hundreds, if
not thousands of people, many of whom were not on government payrolls.
The detriments to U.S. cybersecurity, to the competitiveness of business, to
the privacy of Americans, to public-private partnerships, and to foreign
standing outweigh the benefits that have been presented. Intelligence
gathering is not the NSAs only mission; it is also charged with ensuring U.S.
cybersecurity. The NSA should refocus on this second goal, or risk leaving the
U.S. exposed in the future.
(Denver, July 8th, Time, NSA Surveillance Hurts Cybersecurity for All of Us
Say Privacy Advocates, http://time.com/2966463/nsa-spying-surveillancecybersecurity-privacy-advocates-schneier, 06/23/15, MM)
Privacy advocates Monday slammed the National Security Agency for
conducting surveillance in a way they say undermines cybersecurity
for everyone and harms U.S. tech companies. We have examples of the NSA
going in and deliberately weakening security of things that we use so they can eavesdrop on particular
targets, said Bruce Schneier, a prominent cryptography writer and technologist. Schneier referenced a
security. It undermines our fundamental trust in the things we use to achieve security. Its very toxic,
Schneier said. In the year since former NSA contractor Edward Snowdens first leaks, attention has focused
on the Agencys surveillance itself, fueling debates over whether it is legal and ethical to spy on American
citizens or to eavesdrop on the leaders of allied countries. NSA policies that intentionally undermine
cybersecurity too often get left out of the debate, said panelists Monday at a New American Foundation
event titled National Insecurity Agency: How the NSAs Surveillance Programs Undermine Internet
Security. If
our online communications are encrypted in some way against cyberattack, to protect our bank accounts
from thieves and our intimate lives from nosy neighbors. This poses a challenge for the NSA as the agency,
since September 11, 2001, has focused less on agents of foreign governments and more on ferreting out
report explains how, exactly, the agency has been able to obtain so
much access to the world's web traffic. From The Times: Because
involuntary cooperation of Internet companies. That $250-million-ayear effort, called the Sigint Enabling Project, actively engages the
U.S. and foreign IT industries to covertly influence and/or overtly
leverage their commercial products designs to make them
exploitable." From The Guardian, which has published a parallel
report: "For the past decade, NSA has lead [sic] an aggressive, multipronged effort to break widely used internet encryption
technologies," stated a 2010 GCHQ document. "Vast amounts of
encrypted internet data which have up till now been discarded are
now exploitable." Ultimately, beyond the capabilities provided
through the a highly classified program, code-named Bullrun, is that
the NSA and its British counterpart (i.e. GCHQ) want even more
access.
and the public did not voluntarily adopt the SKIPJACK algorithm as the
encryption standard in the 1990s under Clinton, the FBI will now try to
have it mandatory under Obama twenty years later. BULLRUN has
weakened other encryption standards, and may have been
operational as far back as the 1970s, when the NSA foisted the first
standard method, Data Encryption Standard (or DES) on the public.
DES was criticized for perceived but publicly unproven weaknesses.
declining to comment on the report, subsequently denied that it was aware of Heartbleed until the
vulnerability was made public by a private security report earlier this month. Reports that NSA or any
other part of the government were aware of the so-called Heartbleed vulnerability before 2014 are wrong,
according to an e-mailed statement from the Office of the Director of National Intelligence. Heartbleed
appears to be one of the biggest flaws in the Internets history, affecting the basic security of as many as
Its discovery and the creation of a fix by researchers five days ago
prompted consumers to change their passwords, the Canadian
government to suspend electronic tax filing and computer
companies including Cisco Systems Inc. to Juniper Networks Inc. to
provide patches for their systems. Putting the Heartbleed bug in its
arsenal, the NSA was able to obtain passwords and other basic data
that are the building blocks of the sophisticated hacking operations
at the core of its mission, but at a cost. Millions of ordinary users
were left vulnerable to attack from other nations intelligence arms
and criminal hackers.
two-thirds of the worlds websites.
week after Heartbleed was first made public. Most of the well-known attacks attributed to Chinese hackers
have targeted valuable intellectual property, particularly telecommunications or defense companies, or
large industrial companies. But the recent attack against Community Health instead targeted social
security numbers and customer data, signifying a different approach by Chinese cyber criminals, if the
attacks indeed came from China.
NSA decryption programs diminish internet securityleave loopholes for other hackers
Bump, political journalist for The Fix, 13
(Phillip, September 5, The Wire, How the NSA Made Sure It Can Decrypt Your
Online Communication, http://www.thewire.com/technology/2013/09/hownsa-made-sure-it-can-decrypt-your-online-communication/69094/, June 25,
2015, GG)
In one of the more remarkable and alarming revelations to come from
the documents leaked to the press by Edward Snowden, a joint report from
The New York Times, ProPublica, and The Guardian suggests that the NSA
works with internet companies to add vulnerabilities to secure
network traffic and may be able to broadly decrypt online
Impact Grids
The grid is venerable to cyberterrorism Old infrastructure
Gertz, National Security Columnist for the Washington
Times, 14 (Bill Gertz, 4-16-2014, "Inside the Ring: U.S. power grid
defenseless from attacks," Washingtion Times,
http://www.washingtontimes.com/news/2014/apr/16/inside-the-ring-us-powergrid-defenseless-from-att/?page=all //NK)
The U.S. electrical power grid is vulnerable to cyber and physical
attacks that could cause devastating disruptions throughout the
country, federal and industry officials told Congress recently. Gerry Cauley, president of the North
American Electric Reliability Corp., said that several if not all other critical U.S.
infrastructures depend on electricity, and that he is deeply
concerned about attacks, extreme weather and equipment failures causing power outages.
I am most concerned about coordinated physical and cyber attacks
intended to disable elements of the power grid or deny electricity to specific
targets, such as government or business centers, military installations, or
other infrastructures, Mr. Cauley told the Senate Energy and Natural Resources Committee
last Thursday. Mr. Cauley said the April 2013 attack on a California electrical
power substation by unidentified gunmen did not result in power
outages, but highlighted the vulnerability of the countrys threesector power grid. The incident at the Metcalf substation in Northern California demonstrates
that attacks are possible and have the potential to cause significant damage to assets and disrupt
customer service, he said. Cheryl A. LaFleur, acting chairman of the Federal Energy Regulatory
Commission who testified at the Senate hearing, said the Metcalf attack led federal authorities to conduct
cyber
threats to electrical infrastructure are fast-changing, as she called for
a 13-city campaign to warn utilities about the need for better security. Ms. LaFleur said
better information-sharing about threats between government and industry. Sue Kelly, head of the
Analyses was published in September by the National Electric Sector Cybersecurity Organization
Resource, a non-government group of industry and security specialists .
A malicious software
cyberattack on the power grids Distributed Energy Resource Management System
(DERMS), which manages requests and commands for the power system, would damage
transformers that are costly and difficult to replace. Cyberattacks against
computers that distribute electrical power over wide areas could be jammed or disrupted through wireless
manufactures an artificial cascade through sequential tripping of select critical feeders and components,
causing automated tripping of generation sources due to power and voltage fluctuations, the report said.
A blackout of varying degree and potential equipment damage ensues.
According to the
report, nation state threats to the grid include China, North Korea
and Cuba. Among the cyber terrorist threats listed: al Qaeda and the
Afghan Taliban, the Pakistani group Lashkar-e-Taibi, and the
Palestinian group Hamas. Domestic threats include lone wolf
extremists, ecoterrorists among Earth First and Greenpeace, U.S.
separatist groups, and militias and hate groups, the report said.
Nuclear War
Lawson, Associate Professor in the Department of
Communication at the University of Utah, 9 (Sean Lawson, 5-132009, "Cross-Domain Response to Cyber Attacks and the Threat of Conflict
Escalation," Sean Lawson, http://www.seanlawson.net/?p=477 //NK)
At a time when it seems impossible to avoid the seemingly growing
hysteria over the threat of cyber war,[1] network security expert
Marcus Ranum delivered a refreshing talk recently, The Problem
with Cyber War, that took a critical look at a number of the
assumptions underlying contemporary cybersecurity discourse in the
United States. He addressed one issue in partiuclar that I would like to riff on here, the issue
of conflict escalationi.e. the possibility that offensive use of cyber
attacks could escalate to the use of physical force. As I will show, his concerns
are entirely legitimate as current U.S. military cyber doctrine assumes the possibility of what I call crossdomain responses to cyberattacks. Backing Your Adversary (Mentally) into a Corner Based on the premise
that completely blinding a potential adversary is a good indicator to that adversary that an attack is
iminent, Ranum has argued that The
U.S. policy indicates that kinetic attacks (i.e. physical use of force)
are seen as potentially legitimate responses to cyber attacks . Most
worrisome is that current U.S. policy implies that a nuclear response
is possible, something that policy makers have not denied in recent
press reports. The reason, in part, is that the U.S. defense community has
increasingly come to see cyberspace as a domain of warfare
equivalent to air, land, sea, and space. The definition of cyberspace as its own domain
of warfare helps in its own right to blur the online/offline, physical-space/cyberspace boundary. But
thinking logically about the potential consequences of this framing leads to some disconcerting
conclusions. If cyberspace is a domain of warfare, then it becomes possible to define cyber attacks
attacker. Even more likely given a U.S. military way of warfare that
emphasizes multidimensional, joint operations is a massive
conventional (i.e. non-nuclear) response against the attacker in all
domains (air, land, sea, space), simultaneously. The possibility of kinetic action
in response to cyber attack, or as part of offensive U.S. cyber operations, is part of the current (2006)
potentially devastating impacts. WMD/E includes chemical, biological, radiological, nuclear, and enhanced
high explosive weapons as well as other, more asymmetrical weapons. They may rely more on disruptive
impact than destructive kinetic effects. For example, cyber attacks on US commercial information systems
or attacks against transportation networks may have a greater economic or psychological effect than a
relatively small release of a lethal agent. [6] The authors of a 2009 National Academies of Science report
on cyberwarfare respond to this by saying, Coupled
Impact Econ
Foreign Cyber attacks damage the economy data
leaks cost companies billions
Riley Walters 10/27/14 Center for Foreign and National Security
Policy (Research Assistant Douglas and Sarah Allison Center for Foreign and
National Security Policy. The Davis Institute for National Security and Foreign
Policy at The Heritage Foundation)
The spate of recent data breaches at big-name companies such as
JPMorgan Chase, Home Depot, and Target raises questions about the
effectiveness of the private sectors information security . According
to FBI Director James Comey, There are two kinds of big companies
in the United States. There are those whove been hackedand
those who dont know theyve been hacked.[1] A recent survey by
the Ponemon Institute showed the average cost of cyber crime for
U.S. retail stores more than doubled from 2013 to an annual average
of $8.6 million per company in 2014.[2] The annual average cost per
company of successful cyber attacks increased to $20.8 million in
financial services, $14.5 million in the technology sector, and $12.7
million in communications industries. This paper lists known cyber
Impact Meltdowns
Cyberterrorists can target nuclear power plants
causing meltdowns as large as Fukushima Hard to
detect, convenient, and invisible
Dowds, Nuclear analyst at the CSIS, 11 (Talitha Dowds, 3-25-2011,
"A New Phase of Nuclear Terrorism Cyber Warfare," Center for Strategic and
International Studies, http://csis.org/blog/new-phase-nuclear-terrorism-cyberwarfare)
The idea that terrorists will one day strike a US nuclear power plant
resulting in a full-scale meltdown, killing tens of thousands of
people and rendering nearby cities uninhabitable for decades,
according to the article, has long been the stuff of nightmares for
Americas top homeland-security officials. However, it is interesting to note that not
all states share this fear. As Scott Sagan pointed out recently, there is a lack of consensus among non-
that the crisis at the Fukushima power plant facility coupled with the Stuxnet attacks on the Iranian nuclear
facility at Natanz, paints a picture of the before and after of what cyber conflict may look like. The article
and burrowing into their operating systems which would be akin to what we are seeing in Japan. It
further points out that what makes the cyber threat so unsettling is its invisibility. Not
only are
they invisible but it is hard to detect who has launched them. This
form of warfare may be very attractive to terrorists who are unable
to physically enter a nuclear facility but can infiltrate the facilities
infrastructure to cause a meltdown.
And yet
nothing is being done to protect the power grid against failure or,
worse yet, an attack by domestic or foreign enemies. Investment
guru Paul Singer warned about this, noting that an electromagnetic
surge is the "most significant danger" facing the world today. "Even
horrendous nuclear war, except in its most extreme form, can [be] a
relatively localized issue," said Singer, "and the threat from
asteroids can (possibly) be mitigated." Spent fuel racks contain
radiation that won't be contained during an emergency In the event
of a disaster or loss of power, a nuclear plant's emergency power
systems are designed to automatically engage, while its control rods
are dropped into the core. Water is then pumped into the reactor to
mitigate excess heat, in turn preventing a meltdown. And just to be
sure, spent fuel rods are encased in both a primary and secondary
containment structure, aiding in meltdown prevention. But if the
emergency results in longer-term power losses, and backup
generators run out of power, this constant flow of cooling water will
eventually run dry. This is what happened at Fukushima, resulting in
several reactor cores melting right through their containment
structures into the ground. There is also the issue of residual spent
fuel, which is normally contained in high-density storage racks that
are not taken into account during an emergency. "...contained in buildings that vent
other words, it is a mere drop in the bucket compared to everything else the government spends money on.
directly into the atmosphere, radiation containment is not accounted for with regard to the spent fuel racks," explained
Hodges. "In other words, there is no capture mechanism." Like many others, Hodges wants to know why the government
refuses to take this important situation more seriously. Again, it wouldn't cost that much in the greater scheme of things to
bring the power grid up to proper safety standards, protecting Americans and their infrastructure from a possible cascade
of nuclear meltdowns. So why isn't it happening?
Impact Econ
Backdoors cause loss in business confidence and econ
collapse China, keys, and insecurity proves
Timm, executive director of the Freedom of the Press
Foundation, 3/4 (Trevor Timm, 3-4-2015, "Building backdoors into
encryption isn't only bad for China, Mr President," Guardian,
http://www.theguardian.com/commentisfree/2015/mar/04/backdoorsencryption-china-apple-google-nsa //NK)
Want to know why forcing tech companies to build backdoors into encryption is a terrible idea? Look no
before other governments jumped on the bandwagon, and China wasted no time in demanding the same
that part out.) As Yahoos top security executive Alex Stamos told NSA director Mike Rogers in a public
confrontation last week,
technologist agrees backdoors just cannot be secure in practice. (If you want to
further understand the details behind the encryption vs. backdoor debate and how what the NSA director
is asking for is quite literally impossible, read this excellent piece by surveillance expert Julian Sanchez.)
the grave cybersecurity risks the country faces while, at the very
same time, arguing that we should pass a law that would weaken
cybersecurity and put every single citizen at more risk of having
their private information stolen by criminals, foreign governments,
and our own. Forcing backdoors will also be disastrous for the US
economy as it would be for Chinas. US tech companies - which
already have suffered billions of dollars of losses overseas because
of consumer distrust over their relationships with the NSA - would
lose all credibility with users around the world if the FBI and NSA
succeed with their plan. The White House is supposedly coming out with an official policy on
encryption sometime this month, according to the New York Times but the President can save himself a
lot of time and just apply his comments about China to the US government. If he knows backdoors in
encryption are bad for cybersecurity, privacy, and the economy, why is there even a debate?
encryption and this spring the White House turned on encryption by default
for interaction with its websites. Post-Snowden surveillance revelations, the
Presidents specially-appointed Review Group on Intelligence and
Communications Technologies recommended that the U.S Government
promote national security by fully supporting and not undermining
encryption standards and generally available commercial encryption and
supporting efforts to encourage the greater use of encryption technology for
data in transit, at rest, in the cloud, and in storage. The California Attorney
General recommended that app developers transmit user data securely,
using encryption for permanent unique device identifiers and personal
information, such as an email address or phone number. She endorses
legislation requiring encryption to protect personal information in transit.
The FBI faces a significant challenge to deter and prosecute crime and terror
that is made more complex by ever more pervasive and more complex
encryption. To prevent businesses, however, from running in circles on the
question of backdoor-less encryption, the FBI might need to weigh whether
they want businesses to stop a great deal of identify theft and cyber attacks
as recommended by consumer protection and security experts, or whether
they want to be able to investigate a very few potential criminals or terrorists.
Most civilians do not see a cyber attack as one which can paralyze
essential services for long periods of time or put peoples lives or
health in danger. It is enough to remember the 2008 cyber attacks
in Estonia and Georgia or the Stuxnet worm that devastated Iranian
nuclear facilities in 2010, to understand that cyber terrorism can
bring chaos and widespread harm. In a simulation-based study, the research team provides the
first glimpse of how cyber terrorism affects the psychological and physiological well-being of its victims. Dozens of test
subjects were asked to sit in front of a computer and answer a series of random questions. As they filled out the
questionnaire, their computer was hacked by Anonymous without the test subjects realizing that the attack was part
of the experiment. Suddenly, the frightening mask of Anonymous appeared with a warning that their site would crash and
sensitive personal data would be publicized to the world at large. After a few more moments, a split Skype screen
captured the computer showing a hooded, masked figure typing an unseen message on one side and a live feed of the
test subject/victim on the other. Finally, in the third stage of the experiment, the test subjects received a private text
message on their personal cellphones: Youve been hacked, and Anonymous has acquired your contact list.
Impact Retaliation
US is willing to respond to a cyberattack with armed
force-Pentagon concludes that it constitutes an act of
war
Gorman and Barnes 11 (Siobhan, intelligence correspondent for Wall
Street Journal, and Julian, Pentagon and national security writer, Wall Street
Journal 5-31, Pentagon: Online Cyber Attacks Can Count as Acts of War,
http://www.wsj.com/articles/SB1000142405270230456310457635562313578
2718)
The Pentagon has concluded that computer sabotage coming from
another country can constitute an act of war, a finding that for the
first time opens the door for the U.S. to respond using traditional
military force. The Pentagon's first formal cyber strategy,
unclassified portions of which are expected to become public next
month, represents an early attempt to grapple with a changing
world in which a hacker could pose as significant a threat to U.S.
nuclear reactors, subways or pipelines as a hostile country's military.
In part, the Pentagon intends its plan as a warning to potential
adversaries of the consequences of attacking the U.S. in this way. "If
you shut down our power grid, maybe we will put a missile down one
of your smokestacks," said a military official. Recent attacks on the
Pentagon's own systemsas well as the sabotaging of Iran's nuclear program
via the Stuxnet computer wormhave given new urgency to U.S. efforts to
develop a more formalized approach to cyber attacks. A key moment
occurred in 2008, when at least one U.S. military computer system was
penetrated. This weekend Lockheed Martin, a major military contractor,
acknowledged that it had been the victim of an infiltration, while playing
down its impact. The report will also spark a debate over a range of sensitive
issues the Pentagon left unaddressed, including whether the U.S. can ever be
certain about an attack's origin, and how to define when computer sabotage
is serious enough to constitute an act of war. These questions have already
been a topic of dispute within the military. One idea gaining momentum
at the Pentagon is the notion of "equivalence." If a cyber attack
produces the death, damage, destruction or high-level disruption
that a traditional military attack would cause, then it would be a
candidate for a "use of force" consideration, which could merit
retaliation. The Pentagon's document runs about 30 pages in its
classified version and 12 pages in the unclassified one. It concludes
that the Laws of Armed Conflictderived from various treaties and
customs that, over the years, have come to guide the conduct of war
and proportionality of responseapply in cyberspace as in
traditional warfare, according to three defense officials who have
read the document. The document goes on to describe the Defense
Department's dependence on information technology and why it must forge
partnerships with other nations and private industry to protect infrastructure.
The strategy will also state the importance of synchronizing U.S. cyber-war
doctrine with that of its allies, and will set out principles for new security
policies. The North Atlantic Treaty Organization took an initial step last year
when it decided that, in the event of a cyber attack on an ally, it would
convene a group to "consult together" on the attacks, but they wouldn't be
required to help each other respond. The group hasn't yet met to confer on a
cyber incident. Pentagon officials believe the most-sophisticated computer
attacks require the resources of a government. For instance, the weapons
used in a major technological assault, such as taking down a power grid,
would likely have been developed with state support, Pentagon officials say.
The strategy will also state the importance of synchronizing U.S. cyber-war
doctrine with that of its allies, and will set out principles for new security
policies. The North Atlantic Treaty Organization took an initial step last year
when it decided that, in the event of a cyber attack on an ally, it would
convene a group to "consult together" on the attacks, but they wouldn't be
required to help each other respond. The group hasn't yet met to confer on a
cyber incident. Pentagon officials believe the most-sophisticated computer
attacks require the resources of a government. For instance, the weapons
used in a major technological assault, such as taking down a power grid,
would likely have been developed with state support, Pentagon officials say.
The move to formalize the Pentagon's thinking was borne of the
military's realization the U.S. has been slow to build up defenses
against these kinds of attacks, even as civilian and military
infrastructure has grown more dependent on the Internet. The
military established a new command last year, headed by the director of the
National Security Agency, to consolidate military network security and attack
efforts. The Pentagon itself was rattled by the 2008 attack, a breach
significant enough that the Chairman of the Joint Chiefs briefed thenPresident George W. Bush. At the time, Pentagon officials said they believed
the attack originated in Russia, although didn't say whether they believed the
attacks were connected to the government. Russia has denied involvement.
The Rules of Armed Conflict that guide traditional wars are derived from a
series of international treaties, such as the Geneva Conventions, as well as
practices that the U.S. and other nations consider customary international
law. But cyber warfare isn't covered by existing treaties. So military officials
say they want to seek a consensus among allies about how to proceed. "Act
of war" is a political phrase, not a legal term, said Charles Dunlap, a retired
Air Force Major General and professor at Duke University law school. Gen.
Dunlap argues cyber attacks that have a violent effect are the legal
equivalent of armed attacks, or what the military calls a "use of
force." "A cyber attack is governed by basically the same rules as
any other kind of attack if the effects of it are essentially the same,"
Gen. Dunlap said Monday. The U.S. would need to show that the cyber
weapon used had an effect that was the equivalent of a conventional attack.
James Lewis, a computer-security specialist at the Center for Strategic and
International Studies who has advised the Obama administration, said
Pentagon officials are currently figuring out what kind of cyber attack would
constitute a use of force. Many military planners believe the trigger for
retaliation should be the amount of damageactual or attempted
caused by the attack. For instance, if computer sabotage shut down
as much commerce as would a naval blockade, it could be
considered an act of war that justifies retaliation, Mr. Lewis said.
that for the first time opens the door for the U.S. to respond using
traditional military force. The Pentagon's first formal cyber strategy, unclassified portions of
which are expected to become public next month, represents an early attempt to grapple with a changing
military official. Recent attacks on the Pentagon's own systemsas well as the sabotaging of Iran's nuclear
program via the Stuxnet computer wormhave given new urgency to U.S. efforts to develop a more
formalized approach to cyber attacks. A key moment occurred in 2008, when at least one U.S. military
computer system was penetrated. This weekend Lockheed Martin, a major military contractor,
acknowledged that it had been the victim of an infiltration, while playing down its impact. The report will
also spark a debate over a range of sensitive issues the Pentagon left unaddressed, including whether the
U.S. can ever be certain about an attack's origin, and how to define when computer sabotage is serious
enough to constitute an act of war. These questions have already been a topic of dispute within the
If a cyber
attack produces the death, damage, destruction or high-level
disruption that a traditional military attack would cause, then it
would be a candidate for a "use of force" consideration, which could
merit retaliation. The Pentagon's document runs about 30 pages in its classified version and 12
military. One idea gaining momentum at the Pentagon is the notion of "equivalence."
pages in the unclassified one. It concludes that the Laws of Armed Conflictderived from various treaties
and customs that, over the years, have come to guide the conduct of war and proportionality of response
apply in cyberspace as in traditional warfare, according to three defense officials who have read the
document. The document goes on to describe the Defense Department's dependence on information
technology and why it must forge partnerships with other nations and private industry to protect
infrastructure.
Mike McCaul, the chairman of the House of Representatives homeland security committee, on Sunday said
indicators and ask who has the motive to steal this data in a huge data-mining project that targeted
this was
an attack by China against the United States government. It
quantifies to espionage. And that raises all sorts of issues that we
need to deal with. The hack, which was revealed this week, affected the federal Office of
political appointees in the federal government and federal employees. Now, in my judgment
Personnel Management and the Interior Department. The OPM is responsible for most federal security
clearances. Adam Schiff, the ranking Democrat on the House intelligence committee, was less quick to
apportion blame during an appearance on Fox News Sunday. Its very valuable information, said the
California representative, and while were not allowed to comment on the attribution yet, weve gotten
very good at attribution. And there are only two possibilities here with an attack this sophisticated either
a state actor or a group of private hackers who often work in concert with the state. When the hack was
revealed, the New York Times and Washington Post both reported that Chinese hackers were to blame. So
did Susan Collins, a Republican from Maine who sits on the Senate intelligence committee. On Thursday,
the Chinese embassy in Washington deflected questions on the matter, saying jumping to conclusions was
not responsible and counterproductive. On Friday, White House press secretary Josh Earnest said:
When it comes to China, you all know that the president has frequently, including in every single meeting
that hes conducted with the current Chinese president, raised Chinas activities in cyberspace as a
economic espionage. The US officials has also blamed North Korea for a high-profile attack on Sony.
McCaul, who was appearing on CBS, was asked if the hack could have been carried out by the Chinese
state or by private hackers working for it. All
get personal information of political appointees in the federal government and federal employees, to
exploit them so that later, down the road, they can use it for espionage, to either recruit spies or
compromise individuals in the federal government. Asked about possible US retaliation, McCaul said: This
is an area where there are no rules of the game, in terms of espionage and in terms of stealing
information. On Fox, Schiff said: One of the things we really have to do, in addition to the defence, is
figure out when we are going to go on offence, and how were going to provide a deterrent to future
attacks.
Economic engagement with China key to Asia PivotAIIB, GDP, and US business engagement
Chakravorti, Dean of International Business & Finance at The
Fletcher School at Tufts University, 4/22 (Bhaskar Chakravorti, 4-
22-2015, "China: 1; U.S.: 0. Don't Let the Asia Pivot Turn Into the Asia Peeve,"
Huffington Post, http://www.huffingtonpost.com/bhaskar-chakravorti/china-1us-0-dont-let-the_b_7116260.html //NK)
The AIIB is poised to have disproportionate access to fast-growing
investment and development funding opportunities in Asia. The
opportunity costs of not participating could be quite high, with both
economic and geopolitical dimensions. The evolution of Asian infrastructure will be a
critical enabler of growth in the region. Taking part in strengthening the region's fundamentals, like
infrastructure, presents opportunities; this is, after all, widely considered to be the Asian century. Consider
that three out of the four largest economies in the world in 2030 are expected to be in Asia ;
by 2050,
half of the global GDP will come from Asia; three of the top six
trading partners for the U.S. are in Asia; and a fourth Asian country,
India, has the potential to become the fastest-growing large
emerging market in the world. Helping build the region's infrastructure is also a powerful
way of building political capital. Six of the nine known nuclear powers are in Asia, and two, Pakistan and
North Korea, are highly unstable states. Further west, the stretch from South Asia to West Asia poses an
ongoing security challenge for the U.S. and NATO forces. A potential diplomatic breakthrough with Iran
could shift the geopolitical and economic dynamics not only in West Asia but across the Middle East as
well. Key U.S. allies along the Pacific rim and in the Indian Ocean would like to see the U.S. play a stronger
role in counterbalancing China's growing maritime ambitions. The ability to help craft investments in ports
and shipping along with a robust naval presence would have been important signals of commitment to
percent. Another 70 percent report that their China operations are performing better or the same as their
believe that the playing field is uneven and tilted in favor of state-owned Chinese companies. Some
companies, such as Facebook, do not even have a formal presence in China, and most U.S. tech firms that
do have enormous challenges. Companies like Apple and Cisco were dropped from the Chinese
government's approved technology vendors list after the Edward Snowden leaks about the NSA accessing
data from U.S. technology and communications companies. Besides, to quote a former head of the NSA,
Mike McConnell, "The Chinese have penetrated every major corporation of any consequence in the United
States and taken information." A weaker U.S. policy apparatus limits the capacity of the U.S. government
to negotiate with Chinese authorities to help American businesses do business on better terms.
Forum that the U.S. has national interest in freedom of navigation, it was a corollary of a series of
aggressive Chinese actions, including harassment of the USNS Impeccable. A U.S. State Department
document, Limits in the Seas, released in consequence of Chinas unilateral actions, particularly the HD-
Third,
regardless of Washingtons call for upholding a rules-based stability
in the region, Beijing insists on altering status quo by sheer size
and muscle. Most recently, the U.S. warned China against
militarizing the SCS through its land reclamations and
constructions on some of the features it has occupied in the Spratly
archipelago, which fuel anxiety within the region, and urged it to
avoid destabilizing activities. Beijing responded by arguing that it is building shelter, aids
981 episode, found that Beijings 9-dash line is inconsistent with international laws.
for navigation, search and rescue, etc., and it does not affect and is not targeted against any country.
However, the Fiery Cross Reef images published by CSIS Asia Maritime Transparency on its website show
different outcomes of the constructions (for instance, a 3,110-meter airstrip that can accommodate almost
any type of aircraft; and port facilities that may be capable of docking military tankers). Once the
constructions are complete,
deepen ties and seek to expand the scope of joint activities with Vietnam in the maritime domain
George Soros also expressed concerns about the Chinese aggression in the South China Sea in recent
Sanctions will cause World War III Pre WWI Japan proves
Saunders, executive director of the Center for the National
Interest, 14 (Paul J. Saunders, 8-21-2014, "When Sanctions Lead to War,"
International New York Times,
http://www.nytimes.com/2014/08/22/opinion/when-sanctions-lead-to-war.html
//NK)
WASHINGTON As Ukraine battles separatists and Russia appears poised to invade, many
historians and scholars are warning of ominous similarities to the
outbreak of World War I in 1914. But they are ignoring a more
important comparison: 1941. The United States and Europe have until
now relied almost exclusively on the threat of severe economic
sanctions to prevent a Russian invasion of Ukraine. But sanctions even
crippling ones wont necessarily avert this. For 20 years, economic sanctions have become Washingtons
preferred policy to demonstrate resolve without using force. Yet the United States has not imposed harsh
sanctions on major powers; Iran has been the toughest target, and it hasnt unconditionally surrendered its
nuclear program. Washington has not tried to compel another major power with sanctions since 1940-41,
sooner rather than later. They also believed the United States was politically weak and would give up if the
costs got too high or the war lasted too long.
since that would mean the agency has unfettered access to a huge swath of
the world's online communications.1 The New York Times reports that the
agency has a database of encryption keys for specific commercial products.
It is not clear whether these products include online communication services,
but there are strong hints that many such services have been compromised.
According to the Times, by 2012, the GCHQ the British equivalent of the
NSA had developed new access opportunities into Google's systems. The
Guardian has also reported that Microsoft has worked with the NSA to get
pre-encryption stage access to email on outlook.com, including Hotmail.
Given the magnitude of spying that could occur with private key access to
major service providers, this is a critical question and Internet users deserve
an answer to be able to choose what communication platforms to use. What
methods does the NSA use to obtain private encryption keys? The Times
says that how keys are acquired is shrouded in secrecy, but
speculates that many are likely collected by hacking into companies'
servers. Having concrete evidence of these attacks would have
important legal and technical ramifications, and we hope that this
information comes to light, both so that companies have the
opportunity to improve the security of their servers and so the
American public can take part in a transparent debate about what
targets and methods are appropriate for the NSA to pursue. What
hardware has the NSA backdoored? The New York Times reports that, in
addition to partnering with telecommunications providers and other
companies, including Microsoft, the NSA had found ways inside some of the
encryption chips, either by working with chipmakers to insert back doors or
by surreptitiously exploiting existing security flaws. This means that there is
probably a lot of hardware floating around that the NSA knows to be insecure,
leaving many individuals and companies likely vulnerable to a host of
attackers. As we've explained before, back doors fundamentally
undermine everybody's security, not just that of bad guys. We need
to know what hardware is affected so that these vulnerabilities can
be fixed. This is especially critical now that these leaks have come
out, since malicious attackers now have been tipped off that back
doors exist, and so it is even more likely that exploitable
vulnerabilities will be discovered by parties other than the NSA, if
they have not been already. What power does the NSA have over
companies to get them to cooperate? How often do companies cooperate,
and what happens when they say no? We need to know if and how the
NSA uses the legal system to compel company cooperation with
requests for back doors. While FISA may allow the government to
seek technical assistance from telecoms, there is nothing in the law
to require the addition of backdoors to secure communications
products, either in software or in hardware. Indeed, when the
government attempted to legally require encryption backdoors with the
Clipper Chip, EFF and others fought back and defeated the proposal. If the
NSA thinks it has this authority, it has to come forward and explain
the basis. We also need to know how often this cooperation occurs
and on what scale. For example, the New York Times reports that in
one case, after the government learned that a foreign intelligence
target had ordered new computer hardware, the American
--Internet Freedom--
were the American people kept in the dark they were lied to by intelligence officials, misled about
possible constitutional violations, and potentially undermined by the very courts that were supposed to
protect their rights. The government has used peculiar interpretations of laws that they are not even
willing to discuss to defend an invasive collection of personal data beyond anything even the paranoid
among us would have thought was possible. And while President Obama welcomes the debate over an
issue he has worked hard to keep secret, we are now starting to see the usual Washington tactics of
political spin, feverish scapegoating, and patriotic grandstanding in lieu of a real discussion. We should all
be extremely concerned about the colossal surveillance infrastructure that is being built in the name of our
safety. In trying to reassure the public, our leaders have told us that these programs are not meant to
target us, but instead, foreigners who may pose a threat to our security. But this is merely a decision on
how the data is being used today we are getting into very dangerous territory by hoping for the best
intentions of whoever is in power in the future. American history holds many lessons for us here:
circumstances can change, the perception of who is a threat can vary with whoever is in office, and we
In the
court of global public opinion, America may have tarnished its moral
authority to question the surveillance practices of other nations
whether it be Russia on monitoring journalists, or China on
conducting cyber espionage. Declarations by the State Department
that were once statements of principle now ring hollow and
hypocritical to some. No nation can rival the American surveillance
state, but they no longer need support to build their own massive
systems of espionage and oppression. The costs of surveillance and data storage
cannot predict what our political situation will look like decades, or even years, from now.
technologies are plummeting these will no longer be prohibitive factors. Diplomatic pressures and legal
Telecommunication Union, a UN agency, to take over internet technical standards and management of the domain name
system. Brazil insists that the role of governments and intergovernmental agencies in managing the internet be discussed
at ITU meetings in November and March. These are not major policy changes, but they now find a more sympathetic ear
from the developing countries that make up the majority at the ITU, which conducts business on the basis of one vote per
country. In truth, most developing countries don't care very much about the management of the internet per se. What
they really want is more access to the internet more foreign investment and more aid to set up internet exchange points.
In the past, the United States always offered more development resources as a way to smooth over its hard-line stance on
This is not to suggest that the United States shut down all of its intelligence operations. After all, other countries spy, and
spying for better or worse is part of international politics. But the United States is one of very few countries with the
capability to monitor absolutely everything that is going on in the world. This means that the kind of indiscriminate, total
surveillance that the United States is presently engaged in is not strictly necessary, and unilateral disarmament is an
US intelligence
hegemony has its advantages, particularly if you are a US
intelligence officer. Yet as the politics of internet governance shows,
it also has significant costs. By surveilling harmless and innocent
foreigners alongside America's enemies, the United States is
alienating the world and projecting an arrogant disregard for the
perfectly ordinary aspirations of billions of people to maintain some
semblance of privacy in their personal lives. Eventually, that
alienation could destroy the free, global Internet that we all love. Is it
option. No doubt the intelligence establishment will dismiss the suggestion out of hand.
worth it?
The NSA violates basic rights and internet freedomsgrowing opposition groups agree
Hoboken, Microsoft research fellow, Rubenstein, senior fellow
at the information law institute, 14
(Joris V.J. van, Ira S., N/D 14, Maine Law Review, PRIVACY AND SECURITY IN
THE CLOUD: SOME REALISM ABOUT TECHNICAL SOLUTIONS TO
and the more recent 'Day We Fight Back.' n130 The international human rights community has also
condemned the treatment of Edward Snowden as a criminal rather than as a whistleblower and
condemned restrictions on the reporting of the leaked documents. n131 In a recent report, Frank La Rue,
https://www.newamerica.org/downloads/Surveilance_Costs_Final.pdf, 6/25/15,
CY]
It has been over a year since The Guardian reported the first story on the
National Security Agencys surveillance programs based on the leaks from
former NSA contractor Edward Snowden, yet the national conversation
remains largely mired in a simplistic debate over the tradeoffs between
national security and individual privacy. It is time to start weighing the overall
costs and benefits more broadly. While intelligence officials have
vigorously defended the merits of the NSA programs, they have
offered little hard evidence to prove their valueand some of the initial
analysis actually suggests that the benefits of these programs are dubious.
Three different studiesfrom the Presidents Review Group on
Intelligence and Communications Technologies, the Privacy and Civil
Liberties Oversight Board, and the New America Foundations
International Security Programquestion the value of bulk collection
programs in stopping terrorist plots and enhancing national security.
Meanwhile, there has been little sustained discussion of the costs of the NSA
programs beyond their impact on privacy and liberty, and in particular, how
they affect the U.S. economy, American foreign policy, and the security of the
Internet as a whole. This paper attempts to quantify and categorize the costs
of the NSA surveillance programs since the initial leaks were reported in June
2013. Our findings indicate that the NSAs actions have already begun
to, and will continue to, cause significant damage to the interests of
the United States and the global Internet community. Specifically, we
have observed the costs of NSA surveillance in the following four areas:
Direct Economic Costs to U.S. Businesses: American companies have
reported declining sales overseas and lost business opportunities,
especially as foreign companies turn claims of products that can
protect users from NSA spying into a competitive advantage. The
cloud computing industry is particularly vulnerable and could lose
billions of dollars in the next three to five years as a result of NSA
surveillance. Potential Costs to U.S. Businesses and to the Openness of the
Internet from the Rise of Data Localization and Data Protection Proposals:
New proposals from foreign governments looking to implement data
localization requirements or much stronger data protection laws
could compound economic losses in the long term. These proposals
could also force changes to the architecture of the global network
itself, threatening free expression and privacy if they are
implemented. Costs to U.S. Foreign Policy: Loss of credibility for the
U.S. Internet Freedom agenda, as well as damage to broader
bilateral and multilateral relations, threaten U.S. foreign policy
interests. Revelations about the extent of NSA surveillance have already
colored a number of critical interactions with nations such as Germany and
Brazil in the past year. Costs to Cybersecurity: The NSA has done serious
damage to Internet security through its weakening of key encryption
standards, insertion of surveillance backdoors into widely-used
hardware and software products, stockpiling rather than responsibly
disclosing information about software security vulnerabilities, and a
variety of offensive hacking operations undermining the overall
security of the global Internet. The U.S. government has already
taken some limited steps to mitigate this damage and begin the
slow, difficult process of rebuilding trust in the United States as a
responsible steward of the Internet. But the reform efforts to date
have been relatively narrow, focusing primarily on the surveillance
programs impact on the rights of U.S. citizens.
the bet we have made, a bet that an open internet will lead to stronger, more prosperous countries.176
As Richard Fontaine and Will Rogers describe in a seminal paper on the subject in June 2011, Internet
Freedom, broadly defined, is the notion that universal rights, including the freedoms of expression,
assembly and association, extend to the digital sphere.177 Although there were questions from the
beginning about whether the United States would hold itself to the same high standards domestically that
BULLRUN subverts US internet governance beliefsRussia and China want more sovereignty
Kehl et al, Open Technology Institute Policy Analyst, 14
(Danielle, July, Open Technology Institute, Surveillance Costs: The NSAs
Impact on the Economy, Internet Freedom & Cybersecurity,
https://static.newamerica.org/attachments/534-surveillance-costs-the-nsas-
hypocrisy. For example, one might argue that US policies are more benevolent than those of many other
regimes And one might recognize that in several cases, some branches of government dont know what
other branches are doing and therefore US policy is not so much hypocritical as it is inadvertently
contradictory, wrote Eli Dourado, a researcher from the Mercatus Center at George Mason University in
walking straight into the arms of Russia, China, and the ITU.190 Consequently, NSA surveillance has
shifted the dynamics of the Internet governance debate in a potentially destabilizing manner. The Snowden
revelations have also been well-received by those who seek to discredit existing approaches to Internet
governance, wrote the Center for Democracy & Technologys Matthew Shears. There has been a longrunning antipathy among a number of stakeholders to the United States governments perceived control of
the Internet and the dominance of US Internet companies. There has also been a long-running antipathy,
particularly among some governments, to the distributed and open management of the Internet.191
Shears points out that evidence of the NSAs wide-ranging capabilities has fueled general concerns about
the current Internet governance system, bolstering the arguments of those calling for a new government-
http://www.theguardian.com/commentisfree/2013/aug/07/nsa-surveillancealienating-us-from-world)//GLee
To see how foreign resentment over surveillance is hurting US
interests , look at the international politics of internet governance.
Unsavory regimes have long sought a preeminent role for the United
Nations on internet matters. This past December in Dubai, the United States and many of
its allies refused to sign a UN telecommunications treaty that would have implicated the internet in part on
the grounds that it would have harmed Internet freedom. Led by Russia, some regimes want to split the
internet into 193 separate "states" (pdf), managed by national governments, which interconnect according
to the rules of a treaty. These countries want such arrangements because they want to more effectively
surveil and censor their own citizens.
Brazil insists that the role of governments and intergovernmental agencies in managing the internet be
discussed at ITU meetings in November and March. These are not major policy changes, but they now find
a more sympathetic ear from the developing countries that make up the majority at the ITU, which
I/L Modeling
A strong effort from the US is key to upholding
Internet freedom-Green Dam example proves
Kalathil 10 (Shanthi, consultant on development, democratization, and the
role of technology in international affairs, Aspen Institute, Internet Freedom:
A Background Paper, pg. 74,
http://www.aspeninstitute.org/sites/default/files/content/images/Internet_Free
dom_A_Background_Paper_0.pdf)
One last example from China shows how a concerted effort by the
U.S. government, civil society (both within and outside China) and
industry can be effective when addressing challenges to Internet
freedom. In 2009 the Chinese Ministry of Industry and Information
Technology (MIIT) mandated that later that year all computers sold
in China would need to be pre-installed with ostensible
childprotection software, called Green Dam-Youth Escort. Studies of
Green Dam showed that the software also censored political and
religious content and logged user activity. Because the software also
had programming flaws that increased user vulnerability to attack
and violated the intellectual property rights of a U.S. companys
product, it was also easily opposed by U.S. industry. Chinese civil
society, too, opposed the software; not only was Green Dam ridiculed for
being a clumsy attempt at suppressing free speech and consumer choice, but
it was held up to be an example of crony capitalism because the software
companys founders were perceived to have relied on government ties for
their success. In the face of this united opposition, the MIIT backed
down.13 The Green Dam example demonstrates that concerted
opposition can thwart censorship and surveillance plans by
authoritarian governments. It is also something of a special case, as it is
rare for this particular blend of circumstances to occur. Nonetheless, it
provides an interesting illustration of how different stakeholders
with differing rationales for action can come together to successfully
uphold Internet freedom.
Impact Economy
Internet Freedom must be priority- fuels econ, creates
jobs
U.S. Department of State, no date
(State Department, Internet Freedom,
http://www.state.gov/e/eb/cip/netfreedom/index.htm, June 25, 2015, GG)
Internet freedom is a foreign policy priority for the United States,
and has been for many years. Our goal is to ensure that any child, born
anywhere in the world, has access to the global Internet as an open
platform on which to innovate, learn, organize, and express
themselves free from undue interference or censorship. Indeed, during
his time in Congress, Secretary Kerry worked closely with then-Secretary
Clinton to make certain that we could effectively promote long-standing
values of openness and human rights in a networked world. To do so, we are
supporting the efforts of Americans and committed partners worldwide to
bring down the walls that are denying the people of the world
connection and access to each other's ideas and services on the
Internet. We do this in part because the Internet helps fuel the global
economy, increases productivity, and creates jobs built on the
unprecedented global reach that the platform provides for our
businesses and innovators. Just as importantly, we are champions of
Internet Freedom because the Internet serves as a powerful platform to
bring information and resources to people who historically have
been isolated, or their human rights repressed, so they, too, have the
chance to become active, prosperous, and engaged participants in
the world community. The State Department has advanced U.S. initiatives
to preserve the open Internet and promoted the worldwide deployment of
broadband communications through the World Telecommunication Policy
Forum. We are an active member in the Freedom Online Coalition, a forum for
like-minded governments -- over 20 and growing -- committed to
collaborating to advance Internet freedom. This has provided us and others
an opportunity to coordinate efforts and work with civil society to support the
ability for individuals to exercise their universal human rights and
fundamental freedoms online. For example, the State Department joined with
other Freedom Online Coalition members to launch the Digital Defenders
Partnership, an unprecedented collaboration among government donors to
provide emergency support for Internet users under threat in repressive
environments. We do this work every day and it is a top priority. The
Internet is an endless resource of information. Respect for the
freedoms of expression, peaceful assembly, and association has the
ability to enhance lives in ways we cant even imagine, as long as we
extend the same respect for these fundamental freedoms to the
online world.
probably too early to judge whether an Internet revolution is truly under way. Historians say the
Internet should be viewed mainly as the latest advance in communications, a successor to the
telegraph and the telephone, more a technological step than a leap forward. Still, whether labeled a
on Wall Street these days, driving the shares of many Internet companies to astronomical heights.
Because it is such a low-cost communications technology, the Internet holds the promise of drastically
reducing transactions costs. This opens the door to what Michael Porter of Harvard's business school
has called "atomistic competition," as market forces and entrepreneurial ways are driven further down
toward the individual level. Organizational bureaucracies of every kind -- corporate, government and
union -- suddenly look vulnerable to the Internet's decentralizing powers. Even the power of nation
states, already eroding, seems at risk. Mr. Yergin, the co-author with Joseph Stanislaw of "The
Commanding Heights," a history of the rise of the global marketplace, observed :
"Nothing so
symbolizes globalization as the Internet, a technology with the
power to leap across the geographic borders of nation-states and
across time zones." Prediction tends to be a humbling, hit-or-miss endeavor even for the
gifted or lucky. In the late 1960's, for example, Sir Arthur C. Clarke, the science fiction writer, predicted
that by 2000 a vast electronic "global library" would be developed -- and the Internet and the World
Wide Web could arguably qualify as one. Then again, Sir Arthur also predicted that the planets would
be colonized by next year. But technologists, economists and futurists say that some questions are
worth asking when thinking about how the Internet economy might evolve over the next few years.
What was the mixture of technology and policy decisions that created
today's Internet? What key technology and policy issues are likely to affect the Internet over the next
few years? And, finally, since the future is usually the past with a twist, what can be learned from
Internet to support a pro-government stance -- at least in any conventional sense -- are ignoring certain
facts. The early money for the Internet -- as well as for pioneering research in computer graphics and
speech recognition software -- came from an elite, the Pentagon's Advanced Research Projects Agency.
Its money came from the military's largess, and ARPA's leaders spent it pretty much as they pleased
with little accountability. From the mid-1960's to the mid-1970's, the agency's leaders displayed an
uncanny knack for backing long-term winners in technology. For two decades, the Internet was
developed gradually in the distinctive milieu of the nation's research centers by scientists who believed
in the free sharing of information and in open technology standards. The next major policy
pronouncement about the Internet did not come until 1997, when the Clinton administration released
its "Framework for Global Electronic Commerce." Written by Ira C. Magaziner, a senior White House
adviser, the report called for a market-driven Internet. "Business models must evolve rapidly to keep
pace with the breakneck speed of change in the technology," the report said. "Government attempts to
regulate are likely to be outmoded by the time they are finally enacted." So the pattern of policy to
date: shrewd government seeding of research followed by benign neglect. But as the Internet
increasingly becomes a main thoroughfare of commerce, a host of new policy issues loom -- how to
deal with taxation, privacy, security and international trade in a global networked economy. "The
Internet has given us the greatest rate of return on a public infrastructure investment ever," said
Robert Litan, director of economic studies at the Brookings Institution. "And it has flourished because
Technologically,
the Internet is almost an economy unto itself -- a network, yes,
but also a complex and interacting set of technologies. Today's
Internet is a result of a torrid pace of improvement in recent years
in computer networks, processing power, data storage, software,
display technology and user interfaces like the Web browser. The
sheer firepower of computers, experts say, is certain to race
ahead to startling effect over the next few years. Data storage
technology, for example, is advancing at a particularly rapid rate. By
we have not yet taxed or regulated it to death -- though those are live issues."
2003, personal computers may well come with terabyte hard drives, which are roughly 100 times the
capacity on new PC's today, featuring about 10 gigabytes on average. A terabyte drive would be able
to hold every conversation that even the chattiest person has had in a lifetime. Think of a
supercomputer on every desktop, in terms of giving individuals the ability to mine personal or business
information.
Impact Culture
Restricting internet freedom collapses connection of
culture and geography The US is the main
perpetrator
Wadhwa, researcher with the Hybrid Reality Institute, 13
(Tarun Wadhwa, 6-13-2013, "NSA Surveillance May Have Dealt Major Blow To
Global Internet Freedom Efforts," Forbes,
http://www.forbes.com/sites/tarunwadhwa/2013/06/13/with-nsa-surveillanceus-government-may-have-dealt-major-blow-to-global-internet-freedomefforts/ //NK)
The internet has never been a perfect tool for advancing democracy and human rights. Despite the most
optimistic techno-utopian projections, the internet has yet to set us free and rid the world of dictators.
how to strike the proper balance between security and privacy. These matters aside, what has been the
Not
only were the American people kept in the dark they were lied to
by intelligence officials, misled about possible constitutional
violations, and potentially undermined by the very courts that were
supposed to protect their rights. The government has used peculiar interpretations of
most disturbing part of this entire scandal has to do with the lack of accountability and oversight.
laws that they are not even willing to discuss to defend an invasive collection of personal data beyond
anything even the paranoid among us would have thought was possible. And while President Obama
welcomes the debate over an issue he has worked hard to keep secret, we are now starting to see the
usual Washington tactics of political spin, feverish scapegoating, and patriotic grandstanding in lieu of a
real discussion. We should all be extremely concerned about the colossal surveillance infrastructure that is
being built in the name of our safety. In trying to reassure the public, our leaders have told us that these
programs are not meant to target us, but instead, foreigners who may pose a threat to our security. But
this is merely a decision on how the data is being used today we are getting into very dangerous territory
by hoping for the best intentions of whoever is in power in the future. American history holds many lessons
for us here: circumstances can change, the perception of who is a threat can vary with whoever is in office,
and we cannot predict what our political situation will look like decades, or even years, from now. In the
court of global public opinion, America may have tarnished its moral authority to question the surveillance
were once statements of principle now ring hollow and hypocritical to some. No nation can rival the
American surveillance state, but they no longer need support to build their own massive systems of
monitoring of German Chancellor Angela Merkels mobile phone. Under existing US law, however, the NSA
can freely spy on ordinary foreigners living outside the United States as well. And it can collect not only
their metadata but also the contents of their communicationsincluding phone calls, email, and text
messages. Communications between US citizens and foreigners are also vulnerable so long as the US
Chinese journalist Shi Tao, who just completed eight years in prison for leaking state secretssending a
human rights group information about media restrictions for the fifteenth anniversary of the 1989
Tiananmen Square uprising and the ensuing massacre. At Chinas request, Yahoo turned over Shis email
information, contributing to his conviction. One of the best defenses against such requests is for Internet
companies to store user information in servers located outside the country in question. That approach is
not foolproofgovernments have many ways to pressure Internet companies to cooperatebut it can help
to fend off such requests. US Internet companies currently opt to repatriate to servers in the United States
most information on users in foreign countries. However, after the revelations about NSA surveillance,
many countries have said they may require Internet companies to keep data about their citizens on
servers within their own borders. If that becomes standard practice, it will be easier for repressive
governments to monitor Internet communications. Weak as US privacy safeguards are, those in many
other countries are no better. For example, while outraged at the NSAs snooping, many privacy activists in
Brazil oppose their own governments proposed requirement to store data locally because they fear their
data protection laws are inadequate. Moreover, as the case of Shi Tao shows, granting national
governments easy access to user information may enable them not only to invade privacy but also to
suppress criticism and unearth dissent. Anonymity is sometimes the best protection against censorship,
but official access to user information makes anonymity difficult. Current proposals to change the way the
Internet is regulated could, if implemented, also facilitate efforts by foreign governments to gather
information on their own citizens electronic activities. The Internet is governed mainly through informal
cooperative arrangements among numerous public and private entities, but a US-based organization, the
Internet Corporation for Assigned Names and Numbers, or ICANN, is responsible for, among other things,
coordinating the assignment of unique identifiers that allow computers around the world to find and
recognize each other. A private board of directors runs ICANN, but the US Commerce Department has a
large part in its management. It may seem anomalous that the US government would have such influence
over a global network like the Internet, and now that the United States has proven such an unreliable
guardian of our privacy, there have been renewed calls to replace the current system with a UN agency
control would make it easier for governments to wall off national Internets, as China has tried to do with its
Great Firewall and Iran has threatened to do with a national information network, enabling censorship
and undermining the powerful potential of cyberspace to connect people around the world.
The NSAs
users, those who probably feel most at risk by Washingtons disregard for privacy are US Internet
companies. Companies such as Google and Facebook are undoubtedly terrified that users in other
countries will begin looking for non-American alternatives to avoid NSA snooping. The German Federation
of Journalists, for example, recently warned its members to avoid using US Internet companies for email or
searches because of NSA surveillance, and Deutsche Telekom said it is working to keep electronic
messages from entering the United States unnecessarily. Internet companies thus may become one
powerful constituency to press the US government to reform its surveillance laws. There is, of course, an
irony in the protests of companies that rake in billions by exploiting their customers online activities for
commercial purposes. But without the coercive power of the state, private companies have less capacity to
do harm, and unlike governments, they face at least theoretical competitive pressure to respect their
customers sense of proper limits. It is perhaps puzzling that Americans themselves seem largely
unperturbed by the NSA revelations. But this complacency is not shared by much of the rest of the world,
where memories are often fresher of cases in which the state abused access to private lives. That fear
abroad, conveyed by US Internet companies that have come to depend on a global customer base, is
perhaps the best we can hope for to overcome the relative indifference of the US public. With the NSAs
motto seemingly If it can be accessed, take it, one is left with the impression that the US government
never undertook a basic analysis of the costs and benefits of NSA surveillance. On the cost side must be
weighed not simply the invasion of our privacy but also the harm it does to the unimpeded flow of
information over the Internet.
Impact HR
Lack of internet freedom kills human rights- leads to
acts of government violence
Radsch, Former Senior Program Manager for the Global
Freedom of Expression Campaign, 12
(Courtney, November 1, Freedom House, The Top Five Threats to Internet
Freedom Youve Never Heard Of, https://freedomhouse.org/blog/top-fivethreats-internet-freedom-you%E2%80%99ve-never-heard#.VY7-jPlViko, June
27, 2015, GG)
Next month, the International Telecommunication Union (ITU) will hold a
major meeting in Dubai that could fundamentally alter the structure
and global reach of the internet. The World Conference on
International Telecommunications (WCIT) will consider whether and
how the ITU should take over regulation of the internet from
multistakeholder processes like the IGF. Only governments can be
members of the ITU, although corporations can pony up the tens of
thousands of dollars needed to buy observer status. WCIT will be more
or less closed to civil society actors, but we know that repressive
and democratic member states alike are putting forward proposals
that could stifle the internet as a force for economic development
and positive social change. One European proposal would put tariffs on
internet traffic between states, while another, supported by Middle Eastern
countries and Russia, would give the ITU authority over cybercrime, and
could have negative effects on privacy, anonymity, and human
rights. Whats at stake in December is not just the open, cooperative
process through which the internet has historically been governed, but also
the webs role as a creator of prosperity and an enabler of civic
engagement. As citizens take advantage of the internet to advocate
for political, civil, and human rights, governments and nonstate
entities have lashed out at these online activists, seeking to silence
their voices. Cyberattacks, including distributed denial-of-service (DDoS)
attacks, have been used widely to take down the websites of independent
media in Russia and elsewhere, while Syrian and Tibetan activists have been
aggressively targeted with phishing and malware assaults that aim to steal
their private information and undermine their security. While it is difficult to
identify the sources of these attacks, it is all but certain that they originate
with government agents. In highly repressive states, including Bahrain,
China, Iran, Saudi Arabia, Syria, and Vietnam, this digital violence can
spill over into the offline world. Reports abound of citizens being
tortured or even killed in police custody because of their online
activities.
content creators would be less likely to serve that country. The loss
of content would make the Internet less attractive and would lessen
demand for the deployment of Internet infrastructure in that country. Repeat
the process in a few more countries, and the growth of global
connectivity as well as its attendant benefits for democracy
would slow dramatically. So too would the benefits accruing to the
global economy. Without continuing improvements in transparency and
information sharing, the innovation that springs from new commercial ideas
and creative breakthroughs is sure to be severely inhibited. To their credit,
American Internet service providers have joined with the broader U.S.
technology industry, civil society, and others in opposing these changes.
Together, we were able to win the battle in Dubai over sender pays, but we
have not yet won the war. Issues affecting global Internet openness,
broadband deployment, and free speech will return in upcoming international
forums, including an important meeting in Geneva in May, the World
Telecommunication/ICT Policy Forum. The massive investment in wired and
wireless broadband infrastructure in the United States demonstrates that
preserving an open Internet is completely compatible with broadband
deployment. According to a recent UBS report, annual wireless capital
investment in the United States increased 40 percent from 2009 to 2012,
while investment in the rest of the world has barely inched upward. And
according to the Information Technology and Innovation Foundation, more
fiber-optic cable was laid in the United States in 2011 and 2012 than in any
year since 2000, and 15 percent more than in Europe. All Internet users
lose something when some countries are cut off from the World Wide
Web. Each person who is unable to connect to the Internet
diminishes our own access to information. We become less able to
understand the world and formulate policies to respond to our shrinking
planet. Conversely, we gain a richer understanding of global events as more
people connect around the world, and those societies nurturing nascent
democracy movements become more familiar with Americas traditions of
free speech and pluralism. Thats why we believe that the Internet should
remain free of gatekeepers and that no entity public or private
should be able to pick and choose the information web users can
receive. That is a principle the United States adopted in the Federal
Communications Commissions 2010 Open Internet Order. And its why we
are deeply concerned about arguments by some in the United States that
broadband providers should be able to block, edit, or favor Internet traffic
that travels over their networks, or adopt economic models similar to
international sender pays. We must preserve the Internet as the most
open and robust platform for the free exchange of information ever
devised. Keeping the Internet open is perhaps the most important
free speech issue of our time.
The speech also laid out the approach the United States would take to
implement this agenda: At a big-picture level, global political action; and at a
technical level, support for the development of technologies that
enable citizens to exercise their rights of free expression by
circumventing politically motivated censorship and training. It was
envisaged activists would use these technologies across a very broad range
of issues, with Clinton stating: We want to put these tools in the hands
of people who will use them to advance democracy and human
rights, to fight climate change and epidemics, to build global support for
President Obamas goal of a world without nuclear weapons, to encourage
sustainable economic development that lifts the people at the bottom up. The
follow-up speech shied away from this more optimistic vision and focused on
what Clinton called the challenges we must confront as we seek to protect
and defend a free and open internet. These were described as achieving
both liberty and security, protecting both transparency and
confidentiality and protecting free expression while fostering
tolerance and civility. The speech focused on the tensions and
complexities of internet freedom and the fact they defy easy resolution and
tidy divisions of the world into black and white, while also addressing the
criticisms the policy had received since the Newseum speech. For example,
how to square a free and open internet with U.S. policy that regards the theft
of intellectual property, State Department cables or child pornography as
crimes? (Clinton argued freedom on the internet is an extension of
human freedom in the real world. Just as walking out the doors of the
State Department with a briefcase full of printed diplomatic cables would be
regarded as theft, so too was obtaining them electronically. In essence, what
is illegal in the offline world should be illegal online too.) The speech also
included a defense of the approach the Department has taken with the
development of circumvention technologies arguing in favor of a venture
capital-style approach, supporting a portfolio of technologies, tools, and
training, and adapting as more users shift to mobile devices, rather than a
focus on a single technology. The U.S. governments establishment of internet
freedom as a foreign policy priority has presented State with a hugely
complex policy issue. It complicates important bilateral relations, it is a
never-ending innovation battle pitting U.S.-funded circumvention
technologies against the massive resources of countries like China
dedicated to stifling freedom of speech and communication, and it is
a policy very hard to live up to. Poorly executed, it also risks endangering
activists. So how is State responding?
Impact Cyberattacks
Global open internet prevents cyberattacks, conflictprovides a reason to cooperate
DIPNOTE, Department of States Official Blog, 15
(May 18, U.S. Department of State, An Open and Secure Internet: We Must
Have Both, https://blogs.state.gov/stories/2015/05/18/open-and-secureinternet-we-must-have-both, June 28, 2015, GG)
He also made clear that the United States believes strongly in freedom of
expression, association, and choice. We understand that freedom of
expression is not a license to incite imminent violence. Its not a license to
commit fraud. Its not a license to indulge in libel, or sexually exploit children.
No. But we do know that some governments will use any excuse that
they can find to silence their critics and that those governments have
responded to the rise of the Internet by stepping up their own
efforts to control what people read, see, write, and say. Secretary
Kerry affirmed that the Internet is, among many other things, an
instrument of freedom and that banning the Internet in a misguided
attempt to impose order will never succeed in quashing the
universal desire for freedom. He said, Repression does not eliminate
the speech we hate. It just forces it into other avenues avenues that often
can become more dangerous than the speech itself that people are fighting.
The remedy for the speech that we do not like is more speech. Its the
credible voices of real people that must not only be enabled, but they need to
be amplified. The good news is that much of the world understands this.
And the advocates of Internet freedom and openness are speaking up,
Secretary Kerry said. The United States is part of the Freedom Online
Coalition, a 26-country group that we are actively seeking to expand. The
Coalition agrees that narrow and distorted visions of the Internet
cannot be allowed to prevail. We understand that. Unlike many models of
government that are basically top-down, the Internet allows all
stakeholders the private sector, civil society, academics, engineers, and
governments to all have seats at the table. And this multi-stakeholder
approach is embodied in a myriad of institutions that each day address
Internet issues and help digital technology to be able to function. Because of
the dynamic nature of this technology, new issues are constantly on the
horizon, but the United States believes that the multi-stakeholder approach
remains the fairest and most effective way to be able to resolve these issues.
Americas policy is also to promote international cyber stability. The goal is
to create a climate in which all states are able to enjoy the benefits
of cyberspace; all have incentives to cooperate and avoid conflict;
and all have good reason not to disrupt or attack one another. To
achieve this, we are seeking a broad consensus on where to draw the line
between responsible and irresponsible behavior. Secretary Kerry said, The
basic rules of international law apply in cyberspace. Acts of
aggression are not permissible. And countries that are hurt by an attack
have a right to respond in ways that are appropriate, proportional, and that
minimize harm to innocent parties. We also support a set of additional
Impact Disease
Internet restrictions encourage spread of diseaseinability to communicate about cases
McKenna, journalist who specializes in global health, 13
(Maryn, August 21, Wired, Censorship doesnt just stifle speech- it can
spread disease, http://www.wired.com/2013/08/ap_mers/all/1, June 28, 2015,
GG)
In October, Saudi Arabia will host millions of travelers on the hajj, the
annual pilgrimage to Islams holy sites. The hajj carries deep meaning for
those observant Muslims who undertake it, but it also carries risks that
make epidemiologists blanch. Pilgrims sleep in shared tents and
approach the crowded sites on foot, in debilitating heat. They come from all
over the world, and whatever pathogens they encounter on the hajj
will travel back with them to their home countries. In past seasons, the
hajj has been shown to foster disease, from stomach flus to tuberculosis
or meningitis. The Saudi Arabian government has traditionally taken this
threat quite seriously. Each year it builds a vast network of field hospitals to
give aid to pilgrims. It refuses visas to travelers who have not had required
vaccinations and makes public the outbreaks it learns about. This year,
though, the Saudis have been strangely opaque about one particular
riskand its a risk that has disease experts and public-health agencies
looking to October with a great deal of concern. They wonder if this years
hajj might actually breed the next pandemic. The reason is MERS: Middle
East respiratory syndrome, a disease that has been simmering in the
region for months. The virus is new, recorded in humans for the first time
in mid-2012. It is dire, having killed more than half of those who
contracted it. And it is mysterious, far more so than it should bebecause
Saudi Arabia, where the majority of cases have clustered, has been
tight-lipped about the diseases spread, responding slowly to requests
for information and preventing outside researchers from publishing their
findings about the syndrome. Even in the Internet age, when data sources
like Twitter posts and Google search queries are supposed to tip us off to
outbreaks as they happen, one restrictive government can still put the
whole world in danger by clamming up. Thats because the most
important factor in controlling epidemics isnt the quality of our
medicine. Its the quality of our information. To understand why MERS is
so troubling, look back to the beginning of 2003. For several months, publichealth observers heard rumors of a serious respiratory illness in southern
China. But when officials from the World Health Organization asked the
Chinese government about it, they were told that the countryside was simply
experiencing an outbreak of pneumonia.The wall of silence around what
came to be known as SARS (severe acute respiratory syndrome) cracked only
by chance. An anonymous man in a chat room, describing himself as a
teacher in Guangdong Province, made the acquaintance of a teacher in
California. On February 9, 2003, he asked her if she had heard of the illness
ravaging his city. She forwarded his message to an epidemiologist she knew,
and on February 10 he posted it to ProMED, a listserv that disease experts
use as an informal surveillance system. That email was the worlds only
warning for what was to come. By mid-March there were already 150 cases of
the new disease in seven countries. SARS wound up sickening more than
8,000 people and killing almost 800 in just nine months. Luckily, the disease
was quelled in China and Canada (where travelers from Hong Kong touched
off an outbreak in Toronto) before it had a chance to evolve into a more
efficiently spreading strain. Many experts believe that given time to mutate in
humans, SARS might have become a deadly pandemic. With more warning,
SARS might not even have gained a foothold outside of China. In Canada the
virus quickly infected 251 people, killing 43. By contrast, the US had time to
write new quarantine regulations, which made a difference: America had just
27 SARS cases, with no deaths and no hospital spread. To health authorities
who lived through SARS, MERS feels unnervingly familiar. The two organisms
are cousins: Both are coronaviruses, named for their crown-shaped profile
visible with an electron microscope. For this disease too, the first notice
was a posting to ProMEDthis time by a doctor working in Jeddah, Saudi
Arabia, describing a patient who had died several months before.
That September 2012 communiqu, which cost the doctor his job,
helped physicians in London realize that a Qatari man they were
treating was part of the same outbreak. From there, MERS
unspooled. People also fell ill in the United Arab Emirates, France, Germany,
Italy, and Tunisia. Saudi Arabia, home to the vast majority of confirmed
cases, remained far from forthcoming about what it knew.
Announcements from the Ministry of Health supplied little useful
detail and discussed illnesses and deaths that happened some
indeterminate time in the pastpossibly days, possibly even weeks. So
far the number of MERS cases is just a fraction of the toll from SARS, but
health officials fear that the real count could be higher. Especially worrisome
is the death rate among the afflicted: While SARS has been estimated to kill
roughly 10 percent of its victims, MERS so far has killed 56 percent.
Certainly censorship about the spread of disease is nothing new. The
largest well-documented pandemic, the great flu of 1918, is called
the Spanish Influenza in old accounts not because it started in Spain (it
may have begun in Kansas) but because Spain, as a neutral nation
during World War I, had no wartime curbs on news reports of deaths.
To this day, no one is sure how many people died in the 1918 flu; the best
guess hovers around 50 million worldwide. Regardless, since the virus took
11 months to circle the planet, some of those millions might have lived had
the later-infected countries been warned to prepare. After SARS, no one
thought that it would happen again. In 2005 the 194 nations that vote in
WHOs governing body promised not to conceal outbreaks. And beyond that
promise, public-health researchers have believed that Internet
chatterpatterns of online discussion about diseasewould undercut any
attempts at secrecy. But theyve been disappointed to see that their
web-scraping tools have picked up remarkably little from the Middle
East: While Saudi residents certainly use the Internet, what they can
access is stifled, and what they are willing to say appears muted.
Nearly 100 years after the great flu, it turns out that old-fashioned censorship
can still stymie the world in its ability to prepare for a pandemic. So what
now? The behind-door seething may be having an effect. A WHO team was
finally allowed into Saudi Arabia in June, and the Saudi government has
announced limits on the number of visas it will issue for this years hajj.
Meanwhile, governments and transnational health agencies have already
taken the steps that they can, warning hospitals and readying labs. With luck,
the disease will stay contained: In July, WHO declined to elevate MERS to a
public health emergency of international concern. But the organization
warned it might change its mind laterand if it does, we should fear the
worst, because our medical resources are few. At present there is no rapiddetection method, no vaccine, and no cure. While we wait to see the full
extent of MERS, the one thing the world can do is to relearn the lesson of
SARS: Just as diseases will always cross borders, governments will
always try to evade blame. That problem cant be solved with better
devices or through a more sophisticated public-health dragnet. The solution
lies in something public health has failed to accomplish despite centuries of
trying: persuading governments that transparency needs to trump
concerns about their own reputations. Information can outrun our
deadly new diseases, but only if its allowed to spread.
-- Privacy --
(Brian, July 5th, Washington Post, In NSA-intercepted data, those not targeted
far outnumber the foreigners who are,
http://www.washingtonpost.com/world/national-security/in-nsa-intercepteddata-those-not-targeted-far-outnumber-the-foreigners-whoare/2014/07/05/8139adf8-045a-11e4-8572-4b1b969b6322_story.html,
06/24/15, MM)
Ordinary Internet users, American and non-American alike, far outnumber
legally targeted foreigners in the communications intercepted by the National
Security Agency from U.S. digital networks, according to a four-month
investigation by The Washington Post. Nine of 10 account holders found
in a large cache of intercepted conversations, which former NSA
contractor Edward Snowden provided in full to The Post, were not
the intended surveillance targets but were caught in a net the
agency had cast for somebody else. Many of them were Americans.
Nearly half of the surveillance files, a strikingly high proportion,
contained names, e-mail addresses or other details that the NSA
marked as belonging to U.S. citizens or residents. NSA analysts
masked, or minimized, more than 65,000 such references to
protect Americans privacy, but The Post found nearly 900 additional
e-mail addresses, unmasked in the files, that could be strongly
linked to U.S. citizens or U.S.residents. The surveillance files highlight a
policy dilemma that has been aired only abstractly in public. There are
discoveries of considerable intelligence value in the intercepted messages
and collateral harm to privacy on a scale that the Obama administration has
not been willing to address. Among the most valuable contents which The
Post will not describe in detail, to avoid interfering with ongoing operations
are fresh revelations about a secret overseas nuclear project, double-dealing
by an ostensible ally, a military calamity that befell an unfriendly power, and
the identities of aggressive intruders into U.S. computer networks. Months of
tracking communications across more than 50 alias accounts, the files show,
led directly to the 2011 capture in Abbottabad of Muhammad Tahir Shahzad,
a Pakistan-based bomb builder, and Umar Patek, a suspect in a 2002 terrorist
bombing on the Indonesian island of Bali. At the request of CIA officials, The
Post is withholding other examples that officials said would compromise
ongoing operations. (Transcript: Q&A with Barton Gellman) Many other
files, described as useless by the analysts but nonetheless retained,
have a startlingly intimate, even voyeuristic quality. They tell stories
of love and heartbreak, illicit sexual liaisons, mental-health crises,
political and religious conversions, financial anxieties and
disappointed hopes. The daily lives of more than 10,000 account
holders who were not targeted are catalogued and recorded
nevertheless. In order to allow time for analysis and outside reporting,
neither Snowden nor The Post has disclosed until now that he obtained and
This is worse than the legal mandate the N.S.A. and the F.B.I.
pushed for in the nineties to force technology companies to build
backdoors into their products, because, as Chris Soghoian, the principal technologist for
shipped.
the American Civil Liberties Union said, with a secret backdoor youll think its secure, rather than simply
avoiding the technology. Schneier writes,
introduced a bill, the Surveillance State Repeal Act, which would, among other things, bar the N.S.A. from
installing such backdoors into encryption software. While a statement from the Director of National
Intelligence, James Clapperpublished after the reports by the Times and the Guardiansaid that the fact
that the N.S.A. works to crack encrypted data was not news, Holt said, correctly, that if
in the
process they degrade the security of the encryption we all use, its a
I/L Writers
Writers freedom of expression curtailed by NSA
fear of surveillance drives self-censoring
The FDR Group 13 (Chilling Effects: NSA Surveillance Drives U.S.
Writers to Self-Censor http://www.pen.org/sites/default/files/Chilling
%20Effects_PEN%20American.pdf)//MEB
Writers are self-censoring their work and their online activity due to
their fears that commenting on, researching, or writing about
certain issues will cause them harm. Writers reported self-censoring on
subjects including military affairs, the Middle East North Africa region, mass
incarceration, drug policies, pornography, the Occupy movement, the study
of certain languages, and criticism of the U.S. government. The fear of
surveillanceand doubt over the way in which the government intends to
use the data it gathershas prompted PEN writers to change their behavior
in numerous ways that curtail their freedom of expression and restrict
the free flow of information . The results of the survey regarding
forms of self-censorship were particularly strikingand troubling:
28% have curtailed or avoided social media activities, and another
12% have seriously considered doing so; 24% have deliberately avoided
certain topics in phone or email conversations, and another 9% have
seriously considered it; 16% have avoided writing or speaking about a
particular topic, and another 11% have seriously considered it; 16%
have refrained from conducting Internet searches or visiting
websites on topics that may be considered controversial or
suspicious, and another 12% have seriously considered it; 13% have
taken extra steps to disguise or cover their digital footprints, and
another 11% have seriously considered it; 3% have declined opportunities to meet (in
person, or electronically) people who might be deemed security threats by the government, and another
4% have seriously considered it. a) Self-censorship in writing and speaking: Writers reported avoiding
writing or speaking about particular subjects that they thought could make them a target of surveillance.
In my limited experience, the writers who feel most chilled, who are being most cautious, are friends and
colleagues who write about the Middle East. As a writer and journalist who deals with the Middle East and
the Iraq War in particular, I suspect I am being monitored. As a writer who has exposed sexual violence in
the military, and who speaks widely on the subject, likewise. I have felt that even to comment on the
Snowden case in an email would flag my email as worthy of being looked at. I would hesitate to express
in writing understanding for anti-American sentiments abroad, as I suspect that expressing such
understanding might make me suspect in the eyes of the American security apparatus. I am pretty free
I
have dropped stories in the past and avoided research on the
company telephone due to concerns over wiretapping or
eavesdropping. I have made a conscious, deliberate choice to
avoid certain conversation topics in electronic emails out of concern
that those communications may be surveilled.
with political opinions online, but hesitate to write about liberal organizing, especially during Occupy.
I/L - Encryption
Strong encryption key to privacy- undermining
encryption grants unnecessary access to financial and
medical information
Greene, Open Technology Institute Surveillance Specialist, 15
(Robyn, June 15th, Open Technology Institute, Comments to the Privacy and
Civil Liberties Oversight Board Concerning Activities Under Executive Order
12333, https://static.newamerica.org/attachments/3423-oti-submitscomments-to-pclob/EO%2012333%20Written%20Comments%20for
%20PCLOB.2f3cce2cdaa54b09892e3e7deeebaf9a.pdf, page #4-5, 06/24/15,
MM)
The second area we urge PCLOB to examine is NSA efforts to subvert
cybersecurity and undermine encryption. To the extent that efforts to
undermine or crack encryption aid in EO 12333 surveillance conducted in
furtherance of counterterrorism investigations or related activities, we believe
that they are within the jurisdiction of the Board. It is essential that PCLOB
examine those activities to determine the extent of their impact on
cybersecurity and privacy. Efforts to Undermine Encryption The NSA not only
attempts to crack encryption through EO 12333 programs like Bullrun.3 On at
least one occasion it also sought to undermine the National Institute of
Standards and Technologys encryption standard-setting process, 4 and press
reports revealed that it has contracted with technology companies to use
weak encryption in their products.5 More recently, the Director of the NSA,
Admiral Rogers, has joined the Director of the Federal Bureau of Investigation,
James Comey, in publicly stating that companies should weaken their
encryption by inserting vulnerabilities in order to facilitate surveillance.6
Employing strong encryption is widely accepted as the best way for
individuals to protect the contents of their communications. It is also
critical to effective cybersecurity, as is evidenced by its widespread
deployment throughout the Internet economy, including by financial
institutions, businesses, medical providers, and e-mail service
providers. NSA efforts to undermine encryption violates Americans
privacy and threaten the publics trust in the security of their online
communications. The governments calls to undermine encryption
are strongly opposed by technology companies, security experts,
and privacy advocates. In May, a coalition of nearly 150 groups,
companies, and experts wrote to the president to voice their strong
opposition and warn that such proposals, if enacted, would pose a
serious threat to privacy, human rights, economic security, and even
national security.7 David Kaye, the UN Special Rapporteur for
Freedom of Expression and Opinion, also published a report
concluding that access to strong encryption is essential to privacy
and free expression, and that States should promote strong
encryption and anonymity. National laws should recognize that
individuals are free to protect the privacy of their digital
communications by using encryption technology and tools that allow
anonymity online, and States should avoid all measures that
I/L Modeling
Passing BULLRUN key to promoting privacy on a
national and global level
Kaye, UN Rapporteur on protection of the right to freedom of
opinion, 15 (David, May 22nd, UN Human Rights Council, Report of the
Special Rapporteur on the promotion and protection of the right to freedom of
opinion and expression, Pages 19-20, 06/26/15, MM)
States should revise or establish, as appropriate, national laws and
regulations to promote and protect the rights to privacy and
freedom of opinion and expression. With respect to encryption and
anonymity, States should adopt policies of non-restriction or
comprehensive protection, only adopt restrictions on a case-specific
basis and that meet the requirements of legality, necessity,
proportionality and legitimacy in objective, require court orders for
any specific limitation, and promote security and privacy online
through public education. Discussions of encryption and anonymity have all too often
focused only on their potential use for criminal purposes in times of terrorism. But emergency situations do
not relieve States of the obligation to ensure respect for international human rights law .
Legislative
proposals for the revision or adoption of restrictions on individual
security online should be subject to public debate and adopted
according to regular, public, informed and transparent legislative
process. States must promote effective participation of a wide
variety of civil society actors and minority groups in such debate and
processes and avoid adopting such legislation under accelerated
legislative procedures. General debate should highlight the protection that encryption and
anonymity provide, especially to the groups most at risk of unlawful interferences. Any such debate must
also take into account that restrictions are subject to strict tests: if they interfere with the right to hold
should also include provisions enabling access and providing support to use the technologies to secure
their communications. States should not restrict encryption and anonymity, which facilitate and often
enable the rights to freedom of opinion and expression. Blanket prohibitions fail to be necessary and
proportionate. States should avoid all measures that weaken the security that individuals may enjoy
online, such as backdoors, weak encryption standards and key escrows. In addition, States should refrain
from making the identification of users a condition for access to digital communications and online
services and requiring SIM card registration for mobile users. Corporate actors should likewise consider
their own policies that restrict encryption and anonymity (including through the use of pseudonyms ).
blow whistles all over the field. These courageous workers sacrificed their careers, frightened their
families, sometimes suffered personal destruction, to say that there was something deeply wrong. The
response was rule by fear. Two successive US administrations sought to deal with the whistleblowers
among the listeners by meting out the harshest possible treatment. Snowden said in Hong Kong that he
was sacrificing himself in order to save the world from a system like this one, which is "constrained only by
policy documents". The political ideas of Snowden are worthy of our respect and our deep consideration.
Because
of Snowden, we now know that the listeners undertook to do what
they repeatedly promised respectable expert opinion they would
never do. They always said they would not attempt to break the
crypto that secures the global financial system. That was false.
When Snowden disclosed the existence of the NSA's Bullrun
programme we learned that NSA had lied for years to the financiers
who believe themselves entitled to the truth from the government
they own. The NSA had not only subverted technical standards,
attempting to break the encryption that holds the global financial
industry together, it had also stolen the keys to as many vaults as
possible. With this disclosure the NSA forfeited respectable opinion
around the world. Their reckless endangerment of those who don't accept danger from the
But for now it is sufficient to say that he was not exaggerating the nature of the difficulty.
United States government was breathtaking. The empire of the United States was the empire of exported
liberty. What it had to offer all around the world was liberty and freedom. After colonisation, after European
theft, after forms of state-created horror, it promised a world free from state oppression. Last century we
We
bore those costs in order to smash regimes we called "totalitarian",
in which the state grew so powerful and so invasive that it no longer
recognised any border of private life. We desperately fought and
died against systems in which the state listened to every telephone
conversation and kept a list of everybody every troublemaker knew.
But in the past 10 years, after the morality of freedom was
withdrawn, the state has begun fastening the procedures of
totalitarianism on the substance of democratic society. There is no
were prepared to sacrifice many of the world's great cities and tens of millions of human lives.
historical precedent for the proposition that the procedures of totalitarianism are compatible with the
system of enlightened, individual and democratic self-governance. Such an argument would be doomed to
failure. It is enough to say in opposition that omnipresent invasive listening creates fear. And that fear is
the enemy of reasoned, ordered liberty.
Impact Democracy
Privacy is key to democracy Surveillance impinges
upon this privacy
McFarland, S.J., a computer scientist with extensive liberal
arts teaching experience and a special interest in the
intersection of technology and ethics, served as the 31st
president of the College of the Holy Cross No date (Michael
McFarland, , Santa Clara University, "Why We Care about Privacy,"
www.scu.edu/ethics/practicing/focusareas/technology/internet/privacy/whycare-about-privacy.html)
Privacy is even more necessary as a safeguard of freedom in the
relationships between individuals and groups. As Alan Westin has
pointed out, surveillance and publicity are powerful instruments of social
control. 8 If individuals know that their actions and dispositions are
constantly being observed, commented on and criticized, they find it
much harder to do anything that deviates from accepted social
behavior. There does not even have to be an explicit threat of retaliation.
"Visibility itself provides a powerful method of enforcing norms." 9 Most
people are afraid to stand apart, to be different, if it means being
subject to piercing scrutiny. The "deliberate penetration of the individual's
protective shell, his psychological armor, would leave him naked to ridicule
and shame and would put him under the control of those who know his
secrets." 10 Under these circumstances they find it better simply to conform.
This is the situation characterized in George Orwell's 1984 where the
pervasive surveillance of "Big Brother" was enough to keep most citizens
under rigid control. 11 Therefore privacy, as protection from excessive
scrutiny, is necessary if individuals are to be free to be themselves.
Everyone needs some room to break social norms, to engage in
small "permissible deviations" that help define a person's
individuality. People need to be able to think outrageous thoughts,
make scandalous statements and pick their noses once in a while. They
need to be able to behave in ways that are not dictated to them by the
surrounding society. If every appearance, action, word and thought of
theirs is captured and posted on a social network visible to the rest
of the world, they lose that freedom to be themselves. As Brian Stelter
wrote in the New York Times on the loss of anonymity in today's online world,
"The collective intelligence of the Internet's two billion users, and
the digital fingerprints that so many users leave on Web sites,
combine to make it more and more likely that every embarrassing video,
every intimate photo, and every indelicate e-mail is attributed to its source,
whether that source wants it to be or not. This intelligence makes the public
sphere more public than ever before and sometimes forces personal lives into
public view." 12 This ability to develop one's unique individuality is
especially important in a democracy, which values and depends on
creativity, nonconformism and the free interchange of diverse ideas.
That is where a democracy gets its vitality. Thus, as Westin has
things are possible, and the absence of political and legal restraints
leads inevitably to abusive and corrupt behavior .
promoting economic development and prosperity. In the past, the conventional wisdom has held that
development and prosperity encourage democracy, as better off citizens become more educated and have
the ability to participate in politics and government. More recent analysis shows that the causal effect also
works the other way around democracy fosters development. This is a principal conclusion of the Human
Development Report 2002, published by the United Nations Development Program, which notes that
democratic
Impact Tyranny
Too much surveillance is similar to tyranny
Porter 12 (Henry, 4/3/12, The Guardian, Privacy from state snooping
defines a true democracy,
http://www.theguardian.com/commentisfree/2012/apr/03/privacy-statesnooping-true-democracy, 6/28/15, WG*)
As we welcome the glimmers of democracy in Burma and applaud
the heroic struggle for freedom and rights in countries such as Russia,
China and Syria, it beggars belief that Britain now contemplates a law
that will allow police and security services to access data from every
phone call, email, internet connection and text message, without a
warrant. The millions who suffer under dictatorships will be
astonished that we are about to let slip with so little protest the
freedoms for which they continue to sacrifice so much. Privacy from
state snooping is the defining quality of any true democracy. If the
bill that is reported to be in the Queen's speech next month is made law,
Britain will overnight become a substantially less free country, our
status as one of the beacons of freedom seriously diminished. This is
among the most serious threats to freedom proposed anywhere in
the democratic world. It competes with the very worst of Labour's
authoritarian laws and the last government's morbid obsession with
personal information. Those promoting the bill, which will allow GCHQ
to conduct real-time surveillance of a person's communications and
their web usage, insist that the state only wants to know who's calling who,
and that the content of messages, emails and texts will remain private. It is
an assurance that should be treated with the greatest possible
scepticism for two reasons. The law of function creep means that
oppressive measures passed to address terrorism and crime are
invariably deployed in much less threatening contexts. For example,
the spread of surveillance under the last government's Regulation of
Investigatory Powers Act resulted in local councils using counter-terror
methods to mount undercover operations against fly-tippers and those
suspected of lying in school applications. Once the intelligence services
and police have these powers to insist that internet and phone
companies hand over our data without our knowledge, in a crisis it
will be a short step for the same people to argue that they need to
start reading our communications. How long before messages between
trade unionists or those legitimately engaged in protest are subject to routine
interception by the authorities, because their activities trouble the state?
Already, automatic number plate recognition (ANPR) cameras monitor
Britain's major roads, and real-time surveillance is a feature of the system. If
we let this come about without an act of parliament, the argument will go,
there surely can be no real objection to allowing the content of our
communications to be read. Is it simply the predictable cynicism of the
political trade that lets the home secretary, Theresa May, bring forward this
measure, which is every bit as intrusive as Labour's Interception
Modernisation Programme, which conceived a vast silo of communications
data? I am not sure, but what I do know is that a few years back I sat on
-- Solvency --
manufacturers create intentional security holes so-called back doors that would enable the
government to access data on every American's cellphone and computer, even if it is protected by
encryption. Unfortunately, there are no magic keys that can be used only by good guys for legitimate
reasons. There is only strong security or weak security. Americans are demanding strong security for their
personal data. Comey and others are suggesting that security features shouldn't be too strong, because
this could interfere with surveillance conducted for law enforcement or intelligence purposes. The problem
with this logic is that building a back door into every cellphone, tablet, or laptop means deliberately
NSA, as well as the Department of Justice, made misleading and outright inaccurate statements to
Congress about data surveillance programs not once, but repeatedly for over a decade. These agencies
spied on huge numbers of law-abiding Americans, and their dragnet surveillance of Americans' data did
not make our country safer. Most Americans accept that there are times their government needs to rely on
clandestine methods of intelligence gathering to protect national security and ensure public safety. But
they also expect government agencies and officials to operate within the boundaries of the law, and they
now know how egregiously intelligence agencies abused their trust. This breach of trust is also hurting U.S.
technology companies' bottom line, particularly when trying to sell services and devices in foreign
markets. The president's own surveillance review group noted that concern about U.S. surveillance policies
can directly reduce the market share of U.S. companies. One industry estimate suggests that lost market
share will cost just the U.S. cloud computing sector $21 billion to $35 billion over the next three years. Tech
firms are now investing heavily in new systems, including encryption, to protect consumers from cyber
attacks and rebuild the trust of their customers. As one participant at my roundtable put it, I'd be shocked
if anyone in the industry takes the foot off the pedal in terms of building security and encryption into their
products. Built-in back doors have been tried elsewhere with disastrous results. In 2005, for example,
Greece discovered that dozens of its senior government officials' phones had been under surveillance for
nearly a year. The eavesdropper was never identified, but the vulnerability was clear: built-in wiretapping
features intended to be accessible only to government agencies following a legal process. Chinese hackers
have proved how aggressively they will exploit any security vulnerability. A report last year by a leading
cyber security company identified more than 100 intrusions in U.S. networks from a single cyber espionage
unit in Shanghai. As another tech company leader told me, Why would we leave a back door lying
The
committee should end these back-door searches by specifying
that the government needs a warrant to search for Americans
information. In addition, the Senate committee should prohibit
warrantless collection if targeting an American is any part of the
governments purpose. The committee must ensure that the bill contains robust
searches of the collected communications in order to find and review Americans calls and emails.
transparency provisions. In its original form, the bill required the government and allowed telephone and
Internet companies to disclose detailed statistics about their surveillance transactions. Yet, despite
intelligence officials recent public statements lauding the value of openness, they succeeded in diluting
these provisions. There is no excuse for hiding statistics divorced from any identifying information.
Americans should know exactly how often the government collects their communications and records. The
same goal underlies all these changes: Surveillance laws must be used as Congress intended. A law
allowing the government to obtain business records relevant to a terrorism investigation should not be
used to collect every Americans telephone records. A law allowing the government to collect the
communications of foreigners overseas should not be used to search for Americans calls and e-mails.
information against an individual or entity. Presumably, this team of attorneys would either be from within
the government (such as the DNIs Civil Liberties and Privacy Officer) or a cadre of non-government
attorneys with clearances. There is much to be said in favor of this proposal. With regular criminal
warrants the ex parte nature of the application for a warrant does not systematically create a lack of a
check on overreaching because of the possibility for post-enforcement review during criminal prosecution
with its adversarial process. By contrast, in intelligence investigations that post-execution checking
function of adversarial contest is often missingfew if any intelligence collection cases wind up before the
courts. As a result there is no systematic way of constraining the authority of the United States
government in this context. Providing for an adversarial advocate would give us the general benefits of
adversarial presentation and provide a useful checking function on the overarching broad effect of FISA law
on the public. To be sure, this would be a novel process. We dont typically do pre-enforcement review of
investigative techniques. And if poorly implemented, this sort of process risks slowing down critical time
sensitive investigations. Perhaps most importantly, many worry (not without justification) that the
adversarial advocate will in the end have an agenda that may distort legal developments. On balance, this
seems to be a positive idea but only if it is implemented in a limited way for novel or unique questions
of law. It should be limited to situations where the FISA court itself requests adversarial presentation. That
would limit the number or circumstances where the process was used to those few where new or seminal
interpretations of law were being made. The adversarial advocate should not appear routinely and should
not appear on his or her own motion. The court is, in my view, capable (and likely) to define when it can
benefit from adversarial argument quite well. Phone Company Data Retention: Some have suggested that,
personal data will undermine the effort to restore trust in the U.S.
digital economy. Government-driven technology mandates to weaken
data security for the purpose of aiding government investigations
would compromise national security, economic security and personal
privacy. Cyber vulnerabilities weaken cybersecurity. Once a
backdoor is built in a security system, the security of the system is
inherently compromised. For example, in 2005 it was revealed that an
unknown entity had exploited a lawful intercept capability built into
Greek cellphone technology and had used it to listen to users phone
calls, including those of dozens of senior government officials. 1
from the outset. Mandating weak security would further erode trust
in American products and services. Information technology companies
are working to regain the trust of consumers upset by revelations of
government intrusions into their personal communications. A mandate
shift of political opinion in the eight weeks since the first revelations
from whistleblower Edward Snowden. The proposals range from
six key lawmakers involved in the push to rein in the NSA, and those
involved in the process argue there is now an emerging consensus that
the bulk collection of millions of phone records needs to be overhauled
or even ended. Justin Amash, the Republican congressman whose
measure to terminate the indiscriminate collection of phone data was
narrowly defeated 10 days ago, said he was certain the next legislative
push will succeed. "The people who voted no are, I think, hopeful to get
another opportunity to vote yes on reforming this program and other
programs," he said. In the Senate, Democrat Ron Wyden said there was
curtail the NSA's powers. Another measure directed at the Fisa court is
being brought by House Democrat Adam Schiff, who sits on the
powerful intelligence committee. Under his plan, the court's judges,
who are currently selected by the chief justice of the supreme court,
would be appointed instead by the president, a process that would
require them to undergo a congressional confirmation process. "Then
you have these judges publicly vetted on their fourth amendment
views prior to being placed on the court," Schiff said, referring to the
constitutional freedom from unreasonable searches and seizures.
and my bill goes a long toward doing that," Franken said. A similar bill
has been introduced by his Democratic colleague Jeff Merkley, who
wants to compel the administration to disclose the key legal ruling
from the Fisa court that governs how phone records are collected.
Representative Zoe Lofgren, a California Democrat who on Friday
introduced a bill promoting greater transparency around
surveillance orders received by private companies, stressed the
cross-party nature of the measures. "If you've noticed, we've not had a
rash of bipartisan efforts in the House," she said, referring to the
gridlock that has held up other legislation
and Apple to grant access to encrypted data. A different bill to curb the
NSA and other agencies (the USA Freedom Act) was denuded by the House of
Representatives, while a recent vote allowed the Feds to carry on with
massive surveillance. However, the Secure Data Act would specifically
bar US agencies from forcing private companies to "design or alter
their commercial information technology products for the purpose of
facilitating government surveillance." Wyden's bill cites some familiar
problems with backdoors that emerged with the mass of documents revealed
by Edward Snowden. The main point is that such measures have the effect of
weakening security overall. For instance, it cites a backdoor placed by law
enforcement in Greece to monitor cellphone calls, that was later exploited by
third parties to listen in on government officials. It also contends that such
security exploits hurt innovation, since companies have no incentive
to create new security tech if they're forced to deliberately open
holes. Finally, it cited the loss of trust by the public, both stateside
and abroad, in US products and services. In light of recent revelations
like the NSA's AURORAGOLD, Apple, Google and others recently started
encrypting mobile phone data by default. That prompted a strong reaction
from FBI director James Comey, who said that law enforcement can't keep up
with the latest communication tech and apps (though he couldn't cite any
cases where encryption thwarted law enforcement). In any case, members of
Congress from both parties said they'd never pass a bill giving the FBI
unfettered access to encrypted data. Such security exploits hurt
innovation, since companies have no incentive to create new
security tech if they're forced to deliberately open holes. The bill
makes an exception for products and services already covered by the
Communications Assistance for Law Enforcement Act (CALEA), and builds
on a bipartisan effort to limit NSA backdoor spying. It sounds well
and good, but whether it'll survive the House and Senate is another
story -- the US Freedom Act is still cooling its heels in the Senate.
certify that warrants sought are backed up with legitimate need. But
this is a one-sided affair in which the government gets what it wants
without much challenge. Otherwise how would any federal judge
Its Section 2.5 effectively gives the attorney general the right to
authorize intelligence agencies to operate outside the confines of
judicial or congressional oversight, so long as its in pursuit of
foreign intelligence including collecting information of Americans.
The Attorney General hereby is delegated the power to approve the use for intelligence purposes, within
the United States or against a United States person abroad, of any technique for which a warrant would be
required, 12333 reads. Monitoring the actual content of Americans communications still requires a
warrant under 12333, but metadata the hidden information about a communication that tells where a
person is, who hes communicating with, even the number of credit cards used in a transaction can be
swept up without congressional or court approval.
-- Answers To Answers
Encrypting smartphones and other tech products will help protect against malicious hacking, identity theft,
Bullrun is Surveillance
Paganini, Chief Information of Security, 2013
[Infosec Institute, NSA surveillance is changing Users Internet Experience,
http://resources.infosecinstitute.com/nsa-surveillance-changing-usersinternet-exp/, 6/26/15,CY]
Data encryption until now has represented the unique certainty for the
protection of data; the complexity of the algorithm used and a sufficient
length of the keys are necessary to protect information from espionage and
monitoring activities. The last wave of Snowdens revelations on the U.S.
surveillance program may have the effects of a disaster in the IT world. U.S.
intelligence could in fact have access to all encrypted data circulating on the
Internet and the ability to decipher any secure communication. Bullrun is
the name of latest surveillance program disclosed by Snowden, the
New York Times and The Guardian newspapers, and the journalism non-profit
ProPublica, which revealed details of the new super-secret program supported
by the NSA to have the possibility of bypassing encryption adopted worldwide
by corporations, governments, and institutions.
[Toms Guild, Why the Latest NSA Leak Is the Scariest of All,
http://www.tomsguide.com/us/most-important-nsa-leak,news-17505.html,
6/26/15, CY]
The surveillance programs, named "Manassas," "Bullrun" and "Edgehill"
after battles in the American and English civil wars, not only built powerful
computers to crack encryption protocols. They also coerced
technology companies into handing over encryption keys, infiltrated
NSA and GCHQ personnel onto corporate staffs, broke into the
computer servers of uncooperative companies to steal information
and ensured that some companies built "backdoors" into their
technology so that the spy agencies would always have access.
A2: FISA
FISA was corrupted by the executive branch
ineffective now
Sugiyama, University of Michigan Law school J.D, Perry,
managing editor of Michigan Journal of Law, 06
(Tara, Maria, Fall 2006, Michigan Journal of Law, THE NSA DOMESTIC
SURVEILLANCE PROGRAM: AN ANALYSIS OF CONGRESSIONAL OVERSIGHT
DURING AN ERA OF ONE-PARTY RULE, Lexis, 6/26/15, YA)
FISA was designed to limit executive power by proscribing practices
by which the administration could conduct surveillance . Specifically, the
administration can conduct electronic surveillance within the context of foreign intelligence gathering
only if the surveillance meets certain conditions. n26 The Act permits warrantless [*154]
surveillance for a period up to one year if it is for the purpose of foreign intelligence
gathering and has a minimal likelihood of acquiring information
about U.S. citizens. n27 Under FISA, the President authorizes warrantless surveillance through
the Attorney General, and the Attorney General certifies the qualifying conditions to the FISA court. n28 In
an emergency, the Act permits federal agencies to conduct surveillance for up to seventy-two hours before
they must notify the FISA court and seek a search warrant. n29 In times of war, FISA authorizes the
President to engage in warrantless wiretaps for up to fifteen days, though the extension of his authority in
that instance depends on congressional approval. n30 Alternatively, the administration can seek
authorization for wiretaps from a secret, non-adversarial court known as the FISA court. n31 The Chief
Justice of the Supreme Court now selects eleven (formerly seven) FISA court judges for terms of seven
years. n32 The FISA court conducts all proceedings ex parte where the Department of Justice (DOJ)
With both warrantless and courtapproved surveillance, the administration bears the burden of
proving that the surveillance will have little or no likelihood of
gathering information about U.S. citizens. n34 Surveillance
conducted in violation of FISA carries significant civil and criminal
liabilities. n35 Congress designed FISA to curtail executive authority
for surveillance rather than for law enforcement purposes . n36 FISA
limited warrantless surveillance to "foreign powers" and surveillance
under court order to situations where probable cause justified
surveillance of a "foreign power" or an "agent of a foreign power." n37
As a [*155] result, Congress approved surveillance under FISA only
where its purpose was intelligence gathering. That limitation fell
with the Twin Towers on September 11, 2001. In response to the
terrorist attacks, President Bush signed Public Law 107-56, the Uniting and
presents the only evidence heard in the case. n33
Strengthening America by Providing Appropriate Tools Required to Intercept and Obstruct Terrorism Act
several significant
amendments to FISA. n39 First, the amendments approve searches where criminal prosecution
(USA PATRIOT Act) on October 26, 2001. n38 The Act includes
of individuals is the primary purpose of the search, so long as a significant intelligence purpose remains.
The government, therefore, need no longer cloak its prosecutorial interests in the guise of foreign
increases the
number of judges on the FISA court from seven to eleven . n41 Third, the
Act expands FISA's coverage with respect to certain data gathering
devices and business records. n42 Finally, the Act also amends FISA to
include a private right of action for private citizens who are illegally
monitored. n43 Within months of the attacks, the President also
intelligence; the bar for initiating surveillance is much lower. Second, the Act
The executive branch cant be trusted with oversighttoo often do they secretly increase surveillance
Sugiyama, University of Michigan Law school J.D, Perry,
managing editor of Michigan Journal of Law, 06
(Tara, Maria, Fall 2006, Michigan Journal of Law, THE NSA DOMESTIC
SURVEILLANCE PROGRAM: AN ANALYSIS OF CONGRESSIONAL OVERSIGHT
DURING AN ERA OF ONE-PARTY RULE, Lexis, 6/26/15, YA)
When news of the NSA domestic surveillance program broke in the
December 16, 2005 New York Times article, n63 the Bush administration
rallied the executive branch to present a unified front in support of the
program. n64 The unitary executive theory of the presidency dates back to
and departments, the administration used the tactic of framing the debate around the NSA program in terms of national
security. n72 To win public support, President Bush's Chief Political Adviser Karl Rove used simple language and preyed on
fear to garner support for the program: "Let me be as clear as I [*160] can be: President Bush believes if Al Qaeda is
calling somebody in America, it is in our national security interest to know who they're calling and why... . Some important
Democrats clearly disagree." n73 The White House calculated that few Americans would question the legality of the NSA
program if the administration made clear that the program was designed to protect them from terrorists. n74 Having
established a plan of action, in late December 2005 President Bush used the White House as a platform to begin the
executive branch's assault on rising congressional unease with the NSA program. n75 He explained in straightforward
terms that the Constitution granted him inherent authority to conduct the program. n76 Continuing to carry out the
President's message, the DOJ in a December 22, 2005 letter n77 followed suit by formally providing congressional leaders
on the intelligence committees a preview of the legal authorities it identified as supporting the program: (1) Article II,
Section 2 or the Commander in Chief Clause, n78 and (2) the Authorization for the Use of Military Force (AUMF) Statute.
n79 Additionally, the DOJ stressed that the administration continued to use FISA as "a very important tool" in addressing
the terrorist threat. n80 After a short reprieve during the December holidays, in the New Year the executive branch
resumed its defense of the program as well as its resistance to congressional inquiry into the domestic surveillance
program. Both DOJ Inspector General Glenn A. Fine and [*161] Department of Defense (DOD) Acting Inspector General
Thomas F. Gimble denied the request of Democrats to investigate the activities by the NSA. n81 The NSA also articulated
its legal justification for the program, explaining that former head of the NSA General Michael V. Hayden had relied on
Reagan-era Executive Order 12333 n82 as authority to run the intelligence program until President Bush signed his own
executive order in 2002 n83 specifically permitting the agency to eavesdrop without warrants on the communications of
Despite its
concerted efforts to keep executive branch agencies in line, on January 16,
2006 the administration hit a small roadblock when the Federal Bureau
of Investigation (FBI) broke ranks with the executive branch's party
line. n85 The FBI revealed that officials of the Bureau had complained
to the NSA that the program pointlessly intruded on the privacy of
Americans. n86 One FBI official suggested that the FBI broke ranks
with the executive branch because it did not want to be the fall
agency for the program: "This wasn't our program... . It's not our
mess, and we're not going to clean it up." n87 Indeed, the FBI official's
statement may reflect a larger turf battle between the FBI and NSA
as the bureau struggles to define its jurisdictional areas postSeptember 11th. Quickly moving on from the FBI's dissension, three days later the executive branch once
individuals inside the United States whom the agency believed had links to terrorism. n84
again presented a unified front when the DOJ released a forty-two page legal analysis report in support of the NSA
domestic surveillance program. n88 Challenging the findings of a [*162] Congressional Research Service (CRS) report,
which concluded that the President's authority to carry out the NSA program may represent the "lowest ebb" n89 of
presidential powers, n90 the DOJ sought to reframe the argument. n91 The DOJ's analysis placed the President at "the
zenith" n92 of his powers when he authorized the NSA domestic surveillance program. n93 In furtherance of bolstering the
executive branch against outside pressures, Vice President Cheney also went on record to gain public support, stating that
the program is "critical to the national security of the United States." n94 To garner key support within Congress, he also
gave a closed-door briefing to a "Gang of Eight" n95 congressional leaders. n96 Even as Chairman of the Judiciary
Committee Senator Arlen Specter (R-PA) prepared to hold the first Senate hearings on the NSA program, in early February
2006, Central Intelligence Agency (CIA) Director Porter J. Goss and Director of National Intelligence John D. Negroponte
made one last effort to shift the focus away [*163] from the impending hearings. n97 Framing the need for the NSA
program in terms of national security, Goss denounced the leaks of the program, stating that they had caused severe
damage to CIA operations and expressed the desire for a grand jury inquiry. n98 At the Senate hearing on the NSA
program conducted on February 6, 2006, Attorney General Gonzales largely dismissed efforts by senators to urge the
executive branch to engage Congress and the judiciary in oversight of the program. n99 Instead, Gonzales maintained
that the President had legal authority to act as he had, and remained evasive when asked pointed questions about the
program. n100 Even when told by Republican senators that they had not intended to authorize the President to conduct
warrantless domestic surveillance with AUMF, Gonzales responded that, regardless of the senators' intentions, the written
letter of AUMF nonetheless supported the President's actions. n101 The White House only engaged Congress in minimal
oversight after Chairwoman of the House Intelligence Subcommittee on Technical and Tactical Intelligence Heather A.
Wilson called on the intelligence committees of both Houses to conduct full investigations into the program. n102 The
following day on February 8, 2006, the White House provided a closed-door briefing for the full House Intelligence
Committee and announced that it would brief the Senate Intelligence Committee the next day. n103 In addition to
providing briefings to the intelligence committees, the administration also announced that the DOJ's Office of Professional
Responsibility had started a formal inquiry of internal dissension over the legal foundation of the program within the
department. n104 The investigation was [*164] in direct response to a letter sent by Democrats earlier inJanuary 2006.
General John D. Ashcroft and Former Deputy Attorney General James B. Comey to testify about the program's legality
later, Attorney General Gonzales sent a letter to Senator Specter, attempting to clarify his testimony from the February
6th hearing. n111 He continued to dispute the contention that warrantless surveillance violates statutes of the United
States, and assured Senator Specter that despite the existence of "inadvertent mistakes," there was "intense oversight
investigation inside the CIA, and issued warnings from [*165] the DOJ, all in an effort to discourage government
employees from serving as media sources. n114
A2: Perception
House making attempts at NSA reform- revival of
Secure Data Act
Volz, journalist, 14
(Dustin, December 4, National Journal, House Lawmakers to Reintroduce Bill
to Limit NSA 'Backdoor' Spying, http://www.nationaljournal.com/tech/houselawmakers-to-reintroduce-bill-to-end-nsa-backdoor-exploits-20141204, June
25, 2015, GG)
House lawmakers are attempting to revive a popular bill that would
limit the National Security Agency's ability to spy on Americans'
communications data, a day after the measure was left out from ongoing
government funding negotiations. The measure, dubbed the Secure Data
Act and spearheaded by Democratic Rep. Zoe Lofgren, would block the
NSA and other intelligence agencies from compelling tech companies
to create so-called backdoor vulnerabilities into their devices or
software. Sen. Ron Wyden, also a Democrat, introduced a similar
version of the bill earlier Thursday. A Lofgren aide said the bill is expected
to be introduced later Thursday with Republican cosponsors. A broader
form of the legislation overwhelmingly passed the House in June with
bipartisan support on a 293-123 vote, in the form of an amendment tacked
on to a defense appropriations bill. That previous bill additionally would have
prevented intelligence agencies from engaging in content surveillance of
Americans' communications data without a warrant. But the language was
left out of ongoing negotiations between both chambers over a spending
package that would fund most government agencies into next year. The
House has additionally barred amendments to that omnibus measure, a
common practice.
House of Representatives voted on an amendment offered by Representatives Justin Amash and John
Conyers that would have curbed the NSA's omnipresent and inescapable tactics. Despite furious lobbying
by the intelligence industrial complex and its allies, and four hours of frantic and overwrought briefings by
the NSA's General Keith Alexander, 205 of 422 Representatives voted for the amendment. Though the
amendment barely failed, the vote signaled a clear message to the NSA: we do not trust you. The vote also
same way. In fact, one long-serving conservative Republican told me that he doesn't attend such briefings
anymore, because, "they always lie". Many of us worry that Congressional Intelligence Committees are
more loyal to the "intelligence community" that they are tasked with policing, than to the Constitution. And
the House Intelligence Committee isn't doing anything to assuage our concerns. I've requested classified
information, and further meetings with NSA officials. The House Intelligence Committee has refused to
provide either. Supporters of the NSA's vast ubiquitous domestic spying operation assure the public that
members of Congress can be briefed on these activities whenever they want. Senator Saxby Chambliss
says all a member of Congress needs to do is ask for information, and he'll get it. Well I did ask, and the
House Intelligence Committee said "no", repeatedly. And virtually every other member not on the
A2: Congress CP
Congress has not oversight of the NSAs programs
they are not properly informed
Andrea Peterson 10/19/13 (covers technology policy for The Washington
Post, with an emphasis on cybersecurity, consumer privacy, transparency,
surveillance and open government, The Washington Post, "Obama says NSA
has plent of congressional oversight. But one congressman says it's a farce,"
www.washingtonpost.com/blogs/the-switch/wp/2013/10/09/obama-says-nsahas-plenty-of-congressional-oversight-but-one-congressman-says-its-a-farce/)
But Rep. Justin Amash (R-Mich.), a vocal opponent of NSA spying programs,
says that congressional oversight of intelligence programs is
"broken." Amash spoke at a conference hosted by the Cato Institute on
Wednesday. While the Senate Intelligence committee sent out briefing
information about the programs to members of the upper chamber, Amash
says the House Intelligence Committee "decided it wasn't worthwhile
to share this information" with members of the House. Instead, he
says, the committee offered members an opportunity to attend some
classified briefings and review the documents in their committee chamber.
Amash describes those briefings as a farce. Many times, he says, they
focused on information that was available from reading newspapers
or public statutes. And his account of trying to get details out of those
giving the briefings sounds like an exercise in frustration: So you don't know
what questions to ask because you don't know what the baseline is.
You don't have any idea what kind of things are going on. So you have
to start just spitting off random questions: Does the government have a moon
base? Does the government have a talking bear? Does the government have
a cyborg army? If you don't know what kind of things the government might
have, you just have to guess and it becomes a totally ridiculous game of 20
questions. Amash says that if he asks a question "in slightly the wrong way
they will tell you no. They're not going to tell you 'No, this agency
doesn't do it but this other agency does it' or 'No we can't do it
under this program, but we can do it under this program.' But you
don't know what the other programs are, so what are you going to
ask about?"
promises from officials to get back to him by specific deadlines. Wyden also cited several incidents in
which officials had given inaccurate testimony in public hearings. Last March, for example, James Clapper
told Wyden that the NSA did not wittingly collect data on American citizens, a claim we now know from
the Snowden leaks to be false. In some cases,
the Senate Intelligence Committee and has become one of the NSAs closest
congressional allies, has admitted that her committee was not satisfactorily informed
about certain surveillance activities, in particular the tapping of German chancellor
chairs
Angela Merkels cell phone. The reauthorization of Section 215 of the Patriot Act, which the NSA says
provides legal grounds for collecting Americans phone records in bulk, presents another case in which
that Section 215 is not written in a way that justifies bulk data collection at all, but it said that even if the
language were ambiguous, some members of Congress may have been prohibited from reading critical
documents before voting to maintain Section 215. One explanation for these gaps is the institutional
mismatch between the intelligence community and the congressional committees. The intelligence
committees are small, the staff is small, the agencies themselves ar e behemoth, said Schiff. In the
House, members are not permitted to have their own staff on the
committee, and some have described feeling inadequately prepared
to question intelligence officials. You dont have any idea what kind
of things are going on. So you have to start just spitting off random questions: Does the
government have a moon base? Does the government have a talking bear? Does the government have a
cyborg army? Representative Justin Amash said in October at a conference hosted by the Cato Institute.
The administration says Congress is duly informed, while other lawmakers have suggested its their
colleagues own fault if they arent up to speed. Clapper reaffirmed promises of greater transparency on
committee, but at a time of dwindling legislative budgets, Im not sure whether that will take place, he
said. Congress could reassert some of its own authority by including more members in the group briefed
on significant intelligence activity, for example; by shortening the authorization period for laws like the
Patriot Act to spur more frequent debate; by imposing a rule of lenity on the FISA court, so that the
administration would have to receive congressional approval in ambiguous cases, thus preventing the FISA
court from creating its own novel interpretations of law; and by making sure FISA judges hear adversarial
you cant have your privacy violated if you dont know your privacy is violated does not exactly inspire
confidence.
Sen. Bob Corker (R-Tenn.) said that while "Congress having oversight certainly is important ... what is more
important relative to these types of events is ensuring we don't overly hamstring the NSA's ability to
collect this kind of information in advance and keep these kinds of activities from occurring." Similarly,
Sen. Lindsey Graham (R-S.C.) spoke of his "fear" that "our intelligence capabilities, those designed to
prevent such an attack from taking place on our shores, are quickly eroding," adding that the
Umar
Farouk Abdulmutallabi.e., the "underwear bomber"nearly
the Charlie Hebdo office? Events from 9/11 to the present help provide the answer: 2009:
European political leaders as well, despite the fact that "terrorists, from 9/11 to the Woolwich jihadists and
the neo-Nazi Anders Breivik, have almost always come to the authorities attention before murdering."
A2: Elections
People hate the NSA Multiple polls
King, class action employment attorney in San Diego, 13
(Bernie King, 7-10-2013, "NSA Surveillance Scandal: The Polls Are In, and NSA
Spying is Really, Really Unpopular," Mic Network,
http://mic.com/articles/53767/nsa-surveillance-scandal-the-polls-are-in-andnsa-spying-is-really-really-unpopular //NK)
If you have been following the recent disclosures of NSA domestic surveillance, you might have noticed a
wave of media reports a week after the first disclosures claiming something like, The Majority of
Americans Still Don't Care About the NSA Spying on Them. Further examples can be seen here, here and
here. If you were skeptical about the polling data cited in support of these headlines, you were right. The
polls cited as evidence of these claims were wildly misleading and have since been flatly contradicted by
the overwhelming majority of relevant polling data. These headlines largely relied on two polls, one by Pew
Research and the other by ABC/Washington Post. The Pew Research poll, taken between June 6 and June 9,
asked whether Americans thought it was acceptable for the NSA to track telephone call records of millions
of Americans in an effort to investigate terrorism. Fifty-six percent of people found this acceptable. In
response to a similar question, a second Pew Research poll on June 12-16 found Americans were equally
divided regarding their approval of the governments collection of telephone and Internet data as part of
anti-terrorism efforts. Unfortunately, neither survey distinguished between surveillance of terrorism
suspects and ordinary Americans. Thus, it is impossible to tell whether the respondents approved of
collecting the cell phone records for those not suspected of terrorism, or whether they merely approved of
collecting this data for terrorism suspects. Emily McClintock Elkins, director of polling for the Reason
Foundation, reached a similar conclusion in her recent critique of the NSA polling data. As the relevant
issue is whether the NSAs phone-records dragnet should extend to non-suspects, Pew Research offers
little insight as to how Americans feel about their government spying on them. The ABC/Washington Post
poll, conducted between June 12 and June 16, asked the following question: It's been reported that the
federal governments National Security Agency collects extensive records of phone calls, as well as
Internet data related to specific investigations, to try to identify possible terrorist threats. Do you support
or oppose this intelligence-gathering program? Fifty-eight percent of those polled said they supported this
program. However, just like the Pew Research poll, the question does not say whether this program collects
data on all Americans, or just those suspected of terrorism. Indeed, the mere reference to extensive
records is insufficient to alert the respondent that the NSA is collecting phone records for almost every
single American. This poll is useless in answering the critical issue, i.e. whether people support intelligence
gathering on Americans who are not terrorism suspects. When the questions expressly distinguish between
surveillance of ordinary Americans and Americans suspected of terrorism, a clear majority of Americans
are opposed to the NSAs surveillance of non-suspects. For example, a Rasmussen poll taken June 6-7
asked the following question: The federal government has been secretly collecting the phone records of
millions of Americans for national security purposes regardless of whether there is any suspicion of
1,504 adults, taken Wednesday through Sunday, shows a public that is more receptive than before to the
arguments made by former NSA contractor Edward Snowden. His leak of intelligence documents since last
spring has fueled a global debate over the National Security Agency's surveillance of Americans and
spying on foreign leaders. Edward Snowden Edward Snowden in a file photo provided by The Guardian
Newspaper in London. (Photo: Glenn Greenwald and Laura Poitras, AP) Those surveyed now split, 45%43%, on whether Snowden's disclosures have helped or harmed the public interest. The snapshot of public
opinion comes as the White House, the intelligence agencies and Congress weigh significant changes in
the way the programs are run. In his address, Obama insisted no illegalities had been exposed but
By nearly 3-1, 70%26%, Americans say they shouldn't have to give up privacy and
freedom in order to be safe from terrorism. That may reflect the increasing
proposed steps to reassure Americans that proper safeguards were in place.
distance from the Sept. 11 attacks more than a decade ago that prompted some more of the more
aggressive surveillance procedures.
A2: XO Counterplan
The executive branch is not fit to oversee the NSA
empirics prove theyll abuse that power
Sugiyama, University of Michigan Law school J.D, Perry,
managing editor of Michigan Journal of Law, 06
(Tara, Maria, Fall 2006, Michigan Journal of Law, THE NSA DOMESTIC
SURVEILLANCE PROGRAM: AN ANALYSIS OF CONGRESSIONAL OVERSIGHT
DURING AN ERA OF ONE-PARTY RULE, Lexis, 6/26/15, YA)
On December 16, 2005, the New York Times sounded a fire alarm
when it revealed that, in response to the September 11, 2001
attacks, President George W. Bush had issued a secret executive
order permitting the National Security Agency (NSA) to conduct warrantless
surveillance on individuals within the United States to unearth
nascent terrorist activity. The executive order purportedly
authorized the NSA to monitor the telephone and email messages of
tens of millions of unsuspecting individuals in its effort to track
down links to Al Qaeda. Almost immediately, [*150] various interest groups
n1
n2
n3
n4
began to question the constitutionality of the NSA domestic surveillance program and to challenge
whether the scope of the program violates the Foreign Intelligence Surveillance Act of 1978 (FISA).
n5
A2: Terror DA
NSA claim on 54 thwarted terror attacks false no
concrete evidence to prove.
Elliot and Meyer, Elliot is a staff writer at ProPublica and Meyer is
also a staff writer for ProPublica with past experience at The New
York Times and The Seattle Times, 13
(January 29, The Huffington Post, CSE's Levitation Project: Does Mass
Surveillance Prevent Terrorist Attacks?,
http://www.huffingtonpost.ca/2015/01/29/cse-levitation-masssurveillance_n_6569292.html, June 28, 2015, GG)
Mass trolling of internet data as done by Canada's electronic spy
agency in a project dubbed Levitation can impede cyber spies in the
hunt for extremists more than it helps, some security experts argue.
"We've focused too much on bulk collection just because there's a
capacity to survey broad swaths of digital communication and collect
it and store it, potentially indefinitely," says Adam Molnar, a Canadian
security expert teaching at an Australian university. But that collection may
not only be harmful to privacy and civil liberties concerns, but
ineffective as well, the Deakin University lecturer argues. "Even in
instances where we see an attack occur, these agencies are drowning in
data and they're not even able to follow up on specific leads." Molnar
cites the 2013 Boston Marathon bombing and the recent Paris
attacks as cases where information was gathered in suspects, "but it
made very little difference."
As many privacy advocates have pointed out recently, it looks like some people in the federal government
the National
Institute of Standards and Technology (NIST) still hasnt done
enough to address NSAs involvement in the creation of encryption
standards. Fortunately, some lawmakers are taking security seriously. You may remember that back
in June, the House of Representatives voted overwhelmingly (293-123)
to approve the Massie-Lofgren amendment to the 2015 Department
of Defense Appropriations bill, which would have defunded the NSAs
attempts to build security backdoors into products and services.
Although the amendment may have been stripped from the final
appropriations bill, alls not lost. On Thursday, Senator Ron Wyden
introduced some of the same language from the amendment as the
Secure Data Act of 2014 [pdf]. The Secure Data Act starts to address the problem of
are intent on reviving the failed Crypto Wars of the 90s. And despite recent assurances,
backdoors by prohibiting any agency from mandate[ing] that a manufacturer, developer, or seller of
covered products design or alter the security functions in its product or service to allow the surveillance of
any user of such product or service, or to allow the physical search of such product, by any agency.
Representative Lofgren has introduced a companion bill in the House, co-sponsored by 4 Republicans and 5
sometimes, the NSAs best convincing is a $10 million contract with a security firm like RSA. The
legislation also doesnt change the Communications Assistance for Law Enforcement Act (CALEA.) CALEA,
passed in 1994, is a law that forced telephone companies to redesign their network architectures to make
it easier for law enforcement to wiretap telephone calls. In 2006, the D.C. Circuit upheld the FCC's
reinterpretation of CALEA to also include facilities-based broadband Internet access and VoIP service,
Lofgren have introduced the bipartisan End Warrantless Surveillance of Americans Act (H.R. 2233). EFF
joined 29 groups to send a letter in support of the legislation this week, and we look forward to seeing
which lawmakers support it as it moves through the house. H.R. 2233 has goals similar to last years
Massie-Lofgren amendment to the Department of Defense Appropriations Act for FY 2015, which passed
overwhelmingly with strong bipartisan support: 293 ayes, 123 nays, and 1 present. That legislation would
have closed the so-called National Security Agency backdoorssecurity flaws engineered into products
and services to enable or facilitate government access to, and warrantless searches of, the contents of
Americans communicationsby prohibiting NSA and the Central Intelligence Agency from using
appropriated funds to mandate or request that companies build backdoors into products or services.
Authorization Act of 2015, so it presumably would limit only funds appropriated under that Act. And while
the bill prohibits backdoors, its not clear how that prohibition would be enforced or where it would be
This all puts the White House in an even more awkward position. Does President Obama threaten a veto of
the defense bill to stop this? (The White House could always, you know, ban the bulk collection of your
data right this second.) Yes, all of these problems were exposed in some fashion by the Snowden
revelations: A year ago, it was still classified that NSA was searching for the American people's data in its
database of "foreign" data. President Obama said in response that NSA email and internet spying "doesn't
apply to people living in the United States" but the back-door loophole showed that it did. And the spy
community's campaign for weaker encryption standards was largely in the shadows as well, Snowden files
exposed it all. The public got mad, and now the House has overwhelmingly rejected those programs with
legal and technical fixes, including Rep Alan Grayson's overlooked amendment to disband NSA's covert
encryption sabotage campaign at Nist, the little-known government agency with a lot of power over
encryption standards. (By the way, Grayson's throwing the first Congressional Crypto Party next week.) Of
course, the victory is far from permanent and could be undone rather quickly. The FBI not the NSA is
usually the agency that tries to strong-arm companies into placing back doors in technology, and you can
expect intelligence agencies to try to undo the new provision against spending money on searching for US
persons in secret, with a little help from Congressional intelligence committees. Still, the real hurdle
remains in the Senate, where these strengthened provisions will still have to be adopted and passed on to
Obama's desk if they have any chance of having an affect. That is still a long shot, but the pressure's not
going away. And, hey, until Friday morning, most surveillance reform advocates were worried about the
Senate ramming through the currently neutered version of the USA Freedom Act as its fig leaf of reform,
before going back to business as usual and proposing bills that will give the NSA more power not less.
Privacy and Civil Liberties Board is expected to issue its long awaited report on "back door" surveillance on
Americans by July 2. Oh, and speaking of deadlines: Wyden has been asking Director of National
Intelligence James Clapper for information on how many times Americans' info has been searched through
that same "back door" the House repudiated on Thursday night. As it happens, Clapper promised a
response to Wyden by the very same day. Time's up, Jim:
to the annual defense appropriations bill, considered a mustpass piece of legislation to fund the US military. Also banned is the NSA's
ability, disclosed through the Snowden leaks, to secretly insert backdoor access to
user data through hardware or communications services. "I think it's
the first time the House has had the opportunity to vote on the 4th
Amendment and the NSA as a discrete item. It was an overwhelming
vote," Lofgren told the Guardian. She said the vote succeeded despite efforts of what she called "the
intel establishment." It swiftly circumvented a carefully crafted legislative package, backed by the White
House and the NSA, presenting President Obama with an uncomfortable choice about vetoing the entire
half-trillion dollar spending bill. That legislative package, known as the USA Freedom Act, had jettisoned a
measure to ban backdoor searches in order to move the bill out of committee. Losing the backdoor-search
prohibition prompted, in part, civil libertarian groups to abandon their support of the House version of the
bill. Several senators, including Democrats Ron Wyden and Mark Udall, are seeking to reinstate the ban in
the Senate version currently under judiciary committee consideration. The NSA considers its ability to
search for Americans' data through its massive collections of email, phone, text and other communications
content a critical measure to discover terrorists and a sacrosanct prerogative. Its authorities to do so stem
from a provision, called section 702, of a key 2008 surveillance law, the Fisa Amendments Act, which
Obama endorsed as a legislator and presidential candidate. During a March hearing of a government
privacy board, lawyers for the intelligence community sharply disputed that such warrantless searches are
illegal or unconstitutional, as civil libertarians consider self-evident. They contended that NSA ought to be
able to search for US data at their discretion since Section 702 authorizes the prior collection of such
communications. "That information is at the governments disposal to review in the first instance," Rajesh
De, the NSA's senior lawyer, argued to the panel. The NSA and its allies contend that searching through
the data for information identifying Americans is qualitatively distinct as a privacy issue from an explicitly
banned practice called "reverse targeting," whereby the NSA deceptively structures its broad, foreignfocused interception powers to intentionally collect communications of Americans or people in the United
States. But civil libertarians argue that the distinction is meaningless when the NSA harvests data on a
massive scale, inevitably including data from Americans. "The mere fact that the governments 'targets'
are foreigners outside the United States cannot render constitutional a program that is designed to allow
the government to mine millions of Americans international communications for foreign intelligence
information," ACLU deputy legal director Jameel Jaffer told the privacy board in March. That board, the
Privacy and Civil Liberties Oversight Board, is preparing to issue a report into the government's backdoor
searches. That report, due July 2, is eagerly anticipated by both the NSA and its critics, as it is likely to add
momentum to either side in the ongoing legislative debate on the scope surveillance. Additionally, US
intelligence leaders promised Wyden during a hearing earlier this month they would disclose for the first
time how many searches for US data under the 2008 law the NSA has performed. As an indication of how
critical the NSA considers its search powers to be, it fought hard behind the scenes to strip the USA
Freedom Act of its backdoor-search ban. By contrast, it accepted losing its powers to directly collect US
phone metadata in bulk, which it had argued was similarly crucial. The amendment's success came as
House Republicans were preoccupied with selecting a new majority leader to replace Virginia's Eric Cantor,
who lost his reelection primary. Cantor, a critical figure in the House leadership, was key to aiding the NSA
and its allies in weakening privacy protections in the USA Freedom Act ahead of passage last month. "Well
be reviewing that amendment, and so I cant comment on it at this time," said National Security Council
and law enforcement professionals have the authorities they need to protect the nation, while further
intelligence, declined to comment. Lofgren cautioned that appropriations bills containing controversial
provisions do not have smooth roads to passage. But, she said, the vote "helps the Senate understand that
the House of Representatives on an overwhelming basis, bipartisan, wants the 4th Amendment respected."
She continued: "It should change the trajectory of this."
Patrick Leahy (D-Vt.), died in the Senate late last year. But Lee said bringing up the House bill is the best
option, and that the Senate should be able to find common ground by debating, discussing and
amending it. It would require some type of showing that the data requested has a connection to an actual
The president
supports this. The Director of National Intelligence James Clapper
supports it, he continued referring to a letter from Clapper and
investigation. I think thats the kind of reform that we need, Lee said.
McConnell,
on the other hand, has argued that the House bills constriction of the NSAs spying abilities would
endanger Americans. What I think is the most important thing is to make sure we still have a program
that works and helps protect the American people from attacks, he said Tuesday, indicating his continued
preference for a clean reauthorization of the program passed after Sept. 11. The majority leaders
comments came after a lunch briefing by former Attorney General Michael Mukasey, who recently called
for an appeal of the appellate court decision that found the metadata collection program illegal, arguing
that the ruling would impede the U.S. fight against terrorism. Senate Foreign Relations Chairman Bob
Corker (R-Tenn.) echoed McConnells sentiments. I think we should be more robust in what were doing,
not less, he said, indicating that he prefers to see a short-term extension of the existing Patriot Act for
now. Still, Senate Republicans appear to be split, and a completely clean reauthorization of NSA powers
under the Patriot Act isnt expected to pass. While McConnell is reluctant to see the NSAs surveillance
capability watered down, it would be worse for his party if the NSAs authorities under the Patriot Act were
to expire completely while Republicans control both chambers of Congress. Lee said he would object
rather strongly to the two-month extension McConnell is now floating. Another possibility, Lee said, is a
Rand Paul (R-Ky.), now well-known for his 13-hour filibuster during the confirmation hearing for CIA Director
John Brennan, threatened on Monday to filibuster an extension unless there is a robust debate and
amendment process. To Paul, even the Houses NSA reform bill doesnt go far enough to rein in the
intelligence communitys surveillance powers. And Sen. Ron Wyden (D-Ore.) is with him, vowing on
Tuesday to prevent an extension of the existing program, even with a filibuster. I would do everything it
takes -- everything, underline everything -- to prevent an extension, he told reporters. Wyden supports
the House bill, but wants to push for even stronger reforms to the NSA's power
May, Section 215 of the Patriot Act will expire. Civil liberties groups want Congress to include measures in
their reauthorization bill that significantly limit what the section allows the government to do. The Patriot
Act, a sweeping national-security law that Congress passed after minimal debate on Oct. 26, 2001, serves
as the legal basis for nearly every control government surveillance program in existence. Section 215, also
known as the "business records" provision, grants the government access to "tangible things" for the
purposes of obtaining "foreign intelligence information." In the years since the Patriot Act was passed in
the immediate and uncertain aftermath of 9/11, Section 215 has been used to justify the bulk collection of
telephone records, including those of American citizens. "There must be a clear, strong, and effective end
to bulk collection practices under the USA PATRIOT Act, including under the Section 215 records authority
and the Section 214 authority regarding pen registers and trap & trace devices," the letter reads. "Any
collection that does occur under those authorities should have appropriate safeguards in place to protect
Recent reports that China has imposed further restrictions on Gmail, Googles
flagship email service, should not really come as much of a surprise. While
Chinese users have been unable to access Gmails site for several years now,
they were still able to use much of its functionality, thanks to third-party
services such as Outlook or Apple Mail. This loophole has now been closed
(albeit temporarily some of the new restrictions seem to have been
mysteriously lifted already), which means determined Chinese users have
had to turn to more advanced circumvention tools. Those unable or unwilling
to perform any such acrobatics can simply switch to a service run by a
domestic Chinese company which is precisely what the Chinese government
wants them to do. Such short-term and long-term disruptions of Gmail
connections are part of Chinas long-running efforts to protect its
technological sovereignty by reducing its citizens reliance on
American-run communication services. After North Korea saw its
internet access blacked out temporarily in the Interview brouhaha with
little evidence that the country actually had anything to do with the massive
hacking of Sony the concept of technological sovereignty is poised to
emerge as one of the most important and contentious doctrines of
2015. And its not just the Chinese: the Russian government is pursuing
a similar agenda. A new law that came into effect last summer obliges
all internet companies to store Russian citizens data on servers
inside the country. This has already prompted Google to close down its
engineering operations in Moscow. The Kremlins recent success in getting
Facebook to block a page calling for protests in solidarity with the charged
activist Alexey Navalny indicates that the government is rapidly reestablishing control over its citizens digital activities. But its hardly a global
defeat for Google: the company is still expanding elsewhere, building
communications infrastructure that extends far beyond simple email services.
Thus, as South American countries began exploring plans to counter
NSA surveillance with a fibre optic network of their own that would
reduce their reliance on the US, Google opened its coffers to fund a
$60m undersea cable connecting Brazil to Florida. The aim was to
ensure that Googles own services run better for users in Brazil, but
it is a potent reminder that extricating oneself from the grasp of
Americas tech empire requires a multidimensional strategy attuned
to the fact that Google today is not a mere search and email company it
also runs devices, operating systems, and even connectivity itself. Given
that Russia and China are not known for their commitment to
freedoms of expression and assembly, it is tempting to view their
quest for information sovereignty as yet another stab at censorship
and control. In fact, even when the far more benign government of Brazil
toyed with the idea of forcing American companies to store user data locally
an idea it eventually abandoned it was widely accused of draconian
overreach. However, Russia, China and Brazil are simply responding
to the extremely aggressive tactics adopted by none other than the
US. In typical fashion, though, America is completely oblivious to its
own actions, believing that there is such a thing as a neutral,
cosmopolitan internet and that any efforts to move away from it
would result in its Balkanisation. But for many countries, this is not
Balkanisation at all, merely de-Americanisation. US companies have been
playing an ambiguous role in this project. On the one hand, they build
efficient and highly functional infrastructure that locks in other
countries, creating long-term dependencies that are very messy and
costly to undo. They are the true vehicles for whatever is left of Americas
global modernisation agenda. On the other hand, the companies cannot be
seen as mere proxies for the American empire. Especially after the Edward
Snowden revelations clearly demonstrated the cosy alliances
between Americas business and state interests, these companies
need to constantly assert their independence occasionally by
taking their own government to court even if, in reality, most of their
interests perfectly align with those of Washington. This explains why Silicon
Valley has been so vocal in demanding that the Obama administration do
something about internet privacy and surveillance: if internet companies
were seen as compromised parties here, their business would
collapse. Just look at the misfortunes of Verizon in 2014: uncertain of the
extent of data-sharing between Verizon and the NSA, the German
government ditched its contract with the US company in favour of Deutsche
Telekom. A German government spokesman said at the time: The federal
government wants to win back more technological sovereignty, and therefore
prefers to work with German companies. However, to grasp the full
extent of Americas hypocrisy on the issue of information
sovereignty, one needs to look no further than the ongoing squabble
between Microsoft and the US government. It concerns some email
content relevant to an investigation stored on Microsofts servers in
Ireland. American prosecutors insist that they can obtain such
content from Microsoft simply by serving it a warrant as if it makes
no difference that the email is stored in a foreign country. In order to
obtain it, Washington would normally need to go through a complex
legal process involving bilateral treaties between the governments
involved. But now it wants to sidestep that completely and treat the
handling of such data as a purely local issue with no international
implications. The data resides in cyberspace and cyberspace knows
no borders! The governments reasoning here is that the storage issue is
irrelevant; what is relevant is where the content is accessed and it can be
accessed by Microsofts employees in the US. Microsoft and other tech
giants are now fighting the US government in courts, with little
success so far, while the Irish government and a handful of European
politicians are backing Microsoft. In short, the US government insists that
it should have access to data regardless of where it is stored as long
as it is handled by US companies. Just imagine the outcry if the Chinese
government were to demand access to any data that passes through devices
manufactured by Chinese companies Xiaomi, say, or Lenovo regardless of
whether their users are in London or New York or Tokyo. Note the crucial
difference: Russia and China want to be able to access data generated
by their citizens on their own soil, whereas the US wants to access
data generated by anybody anywhere as long as American
companies handle it. In opposing the efforts of other countries to reclaim a
modicum of technological sovereignty, Washington is likely to run into a
problem it has already encountered while promoting its nebulous internet
freedom agenda: its actions speak louder than its words. Rhetorically, it is
Multiple tech companies want to end NSA backdoorscomputer security and policy experts support
Open Technology Institute, formulates policy and regulatory reforms to
support open architectures and open-source innovations and facilitates the
development and implementation of open technologies and communications
networks, 5/19 (5-19-2015, "Massive Coalition of Security Experts, Tech
Companies and Privacy Advocates Presses Obama to Oppose Surveillance
Backdoors," http://www.newamerica.org/oti/massive-coalition-of-securityexperts-tech-companies-and-privacy-advocates-presses-obama-to-opposesurveillance-backdoors/)//GLee
This morning, New Americas Open Technology Institute sent a joint letter
to the White House which was signed by nearly 150 privacy and
human rights organizations, technology companies and trade
associations, and individual security and policy experts. The letter
defends Americans right to use strong encryption to protect their
data and opposes the idea of mandatory backdoors to enable
government access to encrypted data. The letter, signers of which
include technology industry giants such as Apple and Google, is the
latest round in the ongoing debate over encryption first sparked by
Apples announcement last fall that new iPhones would be encrypted
by default. Responding to statements by law enforcement and intelligence officials such as FBI
Director James Comey, who have criticized companies deployment of encryption and suggested that
Congress should legislate to prevent access to encryption that the government cant break, the letter
and hardware companies such as Adobe, Cisco, Hewlett-Packard, Facebook, and Microsoft, is also signed by
a range of trade associations such as the Internet Association and the Consumer Electronics Association,
and dozens of civil society organizations devoted to civil liberties, human rights, and press freedom, such
as the Electronic Frontier Foundation, Human Rights Watch and the Reporters Committee for Freedom of
civil society organizations, also played a critical role in recruiting and organizing the many computer
security experts that lent their voices to the effort. The following can be attributed to Kevin Bankston,
Policy Director of New Americas Open Technology Institute and Co-Director of New Americas
Cybersecurity Initiative: Knowing that the White House is currently weighing the issue, we thought it
important to ensure that President Obama heard now a clear and unified message from the Internet
community :
bad for human rights, and bad for business . They're just bad policy, period, which
is exactly the same answer that policymakers arrived at during the Crypto Wars of the 90s after many
years of informed debate, and the same answer the the House of Representatives arrived at just last year
when it voted to stop the NSA from mandating or even requesting that companies weaken the security of
their products for surveillances sake. Since last fall, the President has been letting his top intelligence and
law enforcement officials criticize companies for making their devices more secure, and letting them
suggest that Congress should pass anti-encryption, pro-backdoor legislation. That's despite unanimous
consensus in the technical community that backdoors are bad for security, and despite lawmakers clearly
signaling that they think it's a bad idea--most recently in a House oversight hearing where every lawmaker
in attendance was critical of the government's position, one of them going so far as to call the idea of
backdoors "technologically stupid". We decided it was time for the Internet community--industry,
advocates, and experts--to draw a line in the sand. We're calling on Obama to put an end to these
dangerous suggestions that we should deliberately weaken the cybersecurity of American products and
services. Were asking the White House to instead throw its weight behind the recommendation of the
President's own hand-picked NSA review group, several of whom signed todays letter: it should be the
policy of the US government to support rather than undermine the availability and use of strongly
encrypted products. Put simply, it's time for the White House to come out strong in support of strong
encryption, here in the U.S. and around the globe. Securing cyberspace is hard enough without shooting
ourselves in the foot with government-mandated vulnerabilities. It's time for America to help lead the
world toward a more secure future, rather than toward a digital ecosystem riddled with vulnerabilities of
our own making.
sense and what does not for the health of the global Internet
ecosystem, of which all these companies are interdependent parts.
The primary example is immigration reform. Tech company lobbyists and
industry trade groups have linked arms to work for passage of legislation,
holding Monday strategy calls, deploying teams to focus on lawmakers by
party and by chamber and acting as a coordinator among the disparate
groups pushing Congress to act. Facebook CEO Mark Zuckerberg has tapped
Silicon Valleys leading executives and investors to join his reform advocacy
group, FWD.us. His group and others in the tech sector are pushing for
comprehensive immigration reform, an evolution from the industrys past
strategy of focusing narrowly on its desire for more high-skilled visas. I was
really heartened by the response, Zuckerberg said of his fellow tech CEOs
during an interview last week at the Newseum in Washington. All these folks
care about the bigger issue. It is too early to declare tech industry peace,
say insiders. Companies are not aligned on every issue, including industry
priorities like patent and tax reform. They continue to fight ferociously in the
courts over patents and take swipes at each other in public. And prominent
industry players, like Apple, are standing apart from the increased
engagement with Washington. But something has shifted, and
immigration reform isnt the only area in which the industry is
standing together. This month, LinkedIn joined Google, Microsoft,
Facebook and Yahoo in suing the federal government to demand
more transparency when it comes to the nations surveillance
programs. Prominent venture capitalist John Doerr called the
development stunning, noting that Google and Microsoft, who
hardly ever agree on anything, are leading the charge. The tech firms
have at times tried to outdo each other in describing their efforts to push for
more government transparency. But their tandem legal strategy reflects
shared anxiety that the NSA revelations could lead to lost business
particularly overseas and regulations that could restrict the
flow of data across borders. In their lawsuits, the companies echoed
each others arguments for why they should be allowed to publish
more information about national security orders. In the coming weeks,
they will have to work together more closely the Foreign Intelligence
Surveillance Court ordered the companies to file their briefs as a single reply.
Despite the growing sense of cooperation on policy, there are frequent
reminders that rivalries run deep. Outgoing Microsoft CEO Steve Ballmer,
speaking to financial analysts last week, said Google is a monopoly that
deserves the attention of competition authorities, according to reports. His
comments came days after Microsoft unveiled the latest phase of its
Scroogled advertising campaign, which seeks to undermine confidence in
Google over its use of consumer data. And the technology industrys highprofile smartphone patent wars continue. One example: Googles Motorola
Mobility unit recently filed a suit to reopen its case against Apple over mobile
phone technology. Silicon Valley has rallied around policy issues in the past.
Google and other websites mounted an unprecedented Internet campaign to
stop anti-piracy legislation in 2012. The industry fought for an extension of
the research and development tax credit and has promoted education in
science, technology, engineering and math. In May, Facebook joined
Microsoft, Yahoo and Google in the Global Network Initiative, an organization
that audits firms on their human rights policies. But the confluence of
major issues in Washington is giving tech companies more reason to
join forces. The reason it appears to be more unified now, I believe,
is that immigration reform has moved from advocacy and
speculation to possible reality, said Rob Atkinson, president of the
Information Technology & Innovation Foundation. At the same time,
he said, the disclosures about NSA surveillance have presented a
serious challenge to a large share of the tech industry. Washington
still has a profusion of technology trade groups focused on specific sectors
like software, semiconductors, app developers and Web companies which
often pursue separate agendas. The diversity of groups has helped tech
firms with different viewpoints speak out more, said Michael
Beckerman, president of the Internet Association, founded last year
by companies like Google, Yahoo and Facebook. But, he added,
there are issues where hardware, software and Internet stand
shoulder-to-shoulder working together.
With five days in the legislative calendar remaining before a pivotal aspect of the Patriot Act expires, a new
poll shows widespread antipathy to mass surveillance, a sense of where the debate over the National
collection of all Americans phone data, as the Guardian revealed in June 2013 thanks to whistleblower
Edward Snowden, a practice that a federal appeals court deemed illegal on 7 May. Opposition to
reauthorizing the Patriot Act without modification cuts against a bill by the GOP Senate leader, Mitch
McConnell of Kentucky. The poll found 58% of Republicans favor modification, the subject of a rival
bipartisan bill that recently passed the House, with only 36% of them favoring retention .
companies. After Snowdens leak of NSA documents revealed it, the program was repeatedly found to
violate the law, first by legal experts and blue-ribbon panels, and just last month by a federal appellate
court. Its rejection by Congress is hardly a radical act it simply reasserts the meaning of the word
relevant (the language of the statute) as distinct from everything (how the government interpreted it).
At the same time, the Freedom Act explicitly reauthorizes or, rather, reinstates, since they technically
expired at midnight May 31 other programs involving the collection of business records that the Bush
and Obama administrations claimed were authorized by Section 215 of the Patriot Act. In fact, even the
bulk collection of phone records, which was abruptly wound down last week in anticipation of a possible
expiration, may wind up again, because the Freedom Act allows it to continue for a six-month transition
period. And while the Freedom Act contains a few other modest reform provisions such as more disclosure
and a public advocate for the secretive Foreign Intelligence Surveillance Court, it does absolutely nothing
to restrain the vast majority of the intrusive surveillance revealed by Snowden. It leaves untouched
formerly secret programs the NSA says are authorized under section 702 of the FISA Amendments Act, and
that while ostensibly targeted at foreigners nonetheless collect vast amounts of American
communications. It wont in any way limit the agencys mass surveillance of non-American
communications. As I wrote after Sunday nights legislative action, which paved the way for Tuesdays
vote, this marks the end of a vast expansion in surveillance authorities that began almost immediately
after the 9/11 terror attacks. Indeed, the Freedom Act represents the single greatest surveillance reform
package since the 1970s. But thats a low bar. After 14 years of rubber-stamping executive-branch
changed the publics attitude about government surveillance. And three provisions of the Patriot Act were
set to expire. The provisions did expire after Senate Majority Leader Mitch McConnell repeatedly failed to
stampede the Senate into extending them as is. Loath to vindicate Snowden, McConnell and most of the
Republican majority took a position even more extreme than that of the White House and the intelligence
community, both of which had declared themselves satisfied with the modest changes in the defanged
compromise legislation. McConnell and other fearmongers issued dire warnings until the very end. The
Senate is voting to take away one more tool from those who defend this country every day, he said
Tuesday. McConnell tried to get support for some discrete and sensible improvements to the Freedom Act
on Tuesday, but failed. In one last stand before his final defeat, he refused to allow debate on several
amendments that would have given the reforms more teeth. President Obama wasted no time in
announcing his plans: Spitfire Strategies, a communications and campaign management firm, compiled
passage of the
USA Freedom Act is a milestone. This is the most important surveillance reform bill since
1978, and its passage is an indication that Americans are no longer
willing to give the intelligence agencies a blank check . Its a testament to the
significance of the Snowden disclosures and also to the hard work of many principled legislators on both
sides of the aisle. Still, no one should mistake this bill for comprehensive reform. The bill leaves many of
the governments most intrusive and overbroad surveillance powers untouched, and it makes only very
modest adjustments to disclosure and transparency requirements. Jameel Jaffer, American Civil Liberties
Union deputy legal director Center for Democracy & Technology: This is a generational win for privacy and
transparency, said CDT President & CEO Nuala OConnor. Weve
successfully restricted
government surveillance, protecting the privacy of Americans and
strengthening transparency, while preserving our national security.
The era of casually dismissing mass surveillance as unimportant to
liberty is over even in Congress. OTI: It took two long years of intense debate and
negotiation, but Congress has finally put a stake in the heart of the NSAs
program to collect the phone records of millions of innocent
Americans. Although USA FREEDOM is a compromise bill that doesnt include every reform that will
ultimately be necessary to rein in mass surveillance, it is a historic victory for privacy
rights and the first step on the long road to comprehensive reform.
Without a doubt, this is the strongest new regulation of Americas intelligence agencies since the spying
"He's really the linchpin." "It goes with the turf," Wyden said of the
pressure he's receiving. "The reality is, I'm trying to find a good trade policy
for the times that is going to help increase family-wage jobs." Wyden,
despite losing his chairmanship of the Senate Finance Committee after
Republicans won control of the chamber last year, finds himself in a
powerful position because of the unusual politics of international
trade. Big trade pacts, whether involving China or Canada and Mexico, need
bipartisan support to pass Congress -- and Wyden is the one Democrat in
the position and with a background of supporting trade pacts who might be
able to forge a deal with Republicans. Eventually, what is at stake is the
Trans-Pacific Partnership, a trade deal under negotiation involving the U.S.
and 11 other Pacific Rim nations. It would be the largest free-trade pact ever
for the U.S. and has generated intense controversy, with critics charging that
it is a secretive deal benefiting corporate interests at the expense of
American workers. Obama sees the Trans-Pacific deal as a key part of his
"pivot to Asia" aimed at boosting America's role in the fastest growing part of
the world economy. Obama has frequently warned that the U.S. is in
competition with China - which is not part of the Trans-Pacific Partnership - to
write the rules for international trade. At this point, Congress isn't debating
the unfinished Trans-Pacific agreement. Instead, Wyden is negotiating over
the terms of trade promotion authority, which is legislation that would require
that Congress have a single up-or-down vote on the actual Trans-Pacific
agreement. These so-called "fast-track" bills are regarded as essential to
approving trade agreements -- and opponents know that if they can kill fast
track, they can probably kill the actual trade agreement as well. As the
ranking Democrat on the Finance Committee, Wyden and his aides
are now involved in marathon talks with the new Finance Chairman, Sen.
Orrin Hatch, R-Utah, and the chairman of the House Ways and Means
Committee, Rep. Paul Ryan, R-Wisc., and their staffs. The top Democrat on
the Ways and Means Committee, Rep. Sander Levin of Michigan, has declined
to participate.
say, 'Let's just have a short-term extension of it.' I'm tired of extending a bad
law. If they come back with that effort to basically extend this for a
short term without major reforms like ending the collection of phone
records, I do intend to filibuster." The post-Sept. 11 law, which gives the
NSA much of its authority to conduct surveillance programs, expires June 1.
But because Congress is due to skip town for the last week of the month in
honor of Memorial Day, the effective deadline lawmakers face is May 22.
Wyden's insistence on blocking the reauthorization of Section 215,
upon which the government has built its rationale for bulk data
collection, could prove problematic for Senate Majority Leader Mitch
McConnell (R-Ky.), who supports renewing the law in its entirety.
the House and Senate, senior government officials claimed that domestic surveillance was narrow in focus
and limited in scope. But in June 2013, Americans learned through leaked classified documents that these
agencies are using a loophole in the law to read some Americans' emails without ever getting a warrant.
Dragnet surveillance was approved by a secret court that normally hears only the government's side of
many
members of Congress were entirely unaware it. When laws like the Patriot Act
major cases. It had been debated only in a few secret congressional committee hearings, and
were reauthorized, a vocal minority of senators and representatives including the three of us
and warrantless searches would eventually be exposed. When the plain text of the law differs so
dramatically from how it is interpreted and applied, in effect creating a body of secret law, it simply isn't
sustainable. So when the programs' existence became public last summer, huge numbers of Americans
were justifiably stunned and angry at how they had been misled and by the degree to which their privacy
rights had been routinely violated. Inflated claims about the program's value have burst under public
scrutiny, and there is now a groundswell of public support for reform. Benjamin Franklin once warned that
reforms should be made is likely to continue for at least the next few years as Americans continue to learn
collection of Americans' personal information, and closing the loophole that allows intelligence agencies to
constitutional rights when the court is considering major cases, and by requiring that significant
interpretations of U.S. law and the Constitution be made public. And it would strengthen and clarify the
These
reforms would erect safeguards against the further erosion of our
right to privacy, and ensure greater transparency and openness. We
are encouraged by the broad bipartisan support that this package of
reforms has received and by the endorsements from both privacy
government's authority to obtain individual records quickly in genuine emergency situations.
to secretly collect records, but the definition of "selection term" is left vague enough that it could be used
to collect all of the phone records in a particular area code or all of the credit card records from a particular
state. Meanwhile, the bill abandons nearly all of the other reforms contained in the Senate version of the
USA Freedom Act, while renewing controversial provisions of the Patriot Act for nearly three more years.
we will vigorously
oppose this bill in its current form and continue to push for real
changes to the law. This firm commitment to both liberty and
security is what Americans including the dedicated men and
women who work at our nation's intelligence agencies deserve.
We will not settle for less.
This is clearly not the meaningful reform that Americans have demanded, so