Beruflich Dokumente
Kultur Dokumente
BROWN BD
NCFL 2K14
NEG
Contents
Case Construction ......................................................................................................................................... 2
4 Facets of Privacy ........................................................................................................................... 4
When privacy is dismantled ............................................................................................................. 5
The term security is used to eliminate the threats they have created............................................ 6
The term terror is a rhetorical tool .................................................................................................. 7
Terror is a word manipulated to benefit the oppressors actions .................................................... 8
(Rebuttal) Defeats purpose of why this country was founded .................................................................... 9
Infringes on Autonomy .................................................................................................................. 10
Loss of privacy creates and perpetuates power disparities. ......................................................... 11
Terrorism is not severe enough to justify NSA surveillance .......................................................... 12
NSA Surveillance is Inefficient........................................................................................................ 14
NSA surveillance lends itself to use in unethical persuasion ......................................................... 15
Unauthorized collection frequently occurs ................................................................................... 16
The right to privacy is eroding ....................................................................................................... 17
Collecting phone records inefficient .............................................................................................. 18
The NSA fails to differentiate between foreign and American content ........................................ 19
The NSA is only held nominally accountable to Congress ............................................................. 20
Twelve Examples of NSA Abuse ..................................................................................................... 21
NSA Surveillance Encourages Underground Activity ..................................................................... 22
National security is not an indiscriminate pretense ...................................................................... 23
Success of NSA Surveillance Greatly Exaggerated ......................................................................... 24
The FISA Court refuses to keep the NSA in check .......................................................................... 25
Case Construction
Facets of National Security
Wright University, FBI's foreign counterintelligence mission,
http://www.wright.edu/rsp/Security/T1threat/Nstl.htm
The FBI's foreign counterintelligence mission is set out in a strategy known as the National Security
Threat List (NSTL). The NSTL combines two elements:
First is the Issues Threat List -- a list of eight categories of activity that are a national security
concern regardless of what foreign power or entity engages in them.
Second is the Country Threat List -- a classified list of foreign powers that pose a strategic
intelligence threat to U.S. security interests. The activities of these countries are so hostile, or of
such concern, that counterintelligence or counterterrorism investigations are warranted to
precisely describe the nature and scope of the activities as well as to counter specific identified
activities.
1. Terrorism
This issue concerns foreign power-sponsored or foreign power-coordinated activities that:
Involve violent acts, dangerous to human life, that are a violation of the criminal laws of the
United States or of any State, or that would be a criminal violation if committed within the
jurisdiction of the United States or any state;
Appear to be intended to intimidate or coerce a civilian population, to influence the policy of a
government by intimidation or coercion, or to affect the conduct of a government by
assassination or kidnapping; and
Occur totally outside the United States or transcend national boundaries in terms of the means
by which they are accomplished, the persons they appear intended to coerce or intimidate, or
the locale in which their perpetrators operate or seek asylum.
2. Espionage
This issue concerns foreign power-sponsored or foreign power-coordinated intelligence activity directed
at the U.S. Government or U.S. corporations, establishments, or persons, which involves the
identification, targeting and collection of U.S. national defense information.
3. Proliferation
This issue concerns foreign power-sponsored or foreign power-coordinated intelligence activity directed
at the U.S. Government or U.S. corporations, establishments or persons, which involves:
The proliferation of weapons of mass destruction to include chemical, biological, or nuclear
weapons, and delivery systems of those weapons of mass destruction; or
The proliferation of advanced conventional weapons.
4. Economic Espionage
This issue concerns foreign power-sponsored or foreign power-coordinated intelligence activity directed
at the U.S. Government or U.S. corporations, establishments, or persons, which involves:
The unlawful or clandestine targeting or acquisition of sensitive financial, trade or economic
policy information, proprietary economic information, or critical technologies; or
The unlawful or clandestine targeting or influencing of sensitive economic policy decisions.
4 Facets of Privacy
David Banisar And Simon Davies, Deputy Director Of Privacy International (PI) And Director
General Of Privacy International And A Visiting Fellow At The London School Of Economics, Fall, 1999 in
"Global Trends In Privacy Protection: An International Survey of Privacy, Data Protection, And
Surveillance Laws And Developments," The John Marshall Journal Of Computer & Information Law, 18 J.
Marshall J. Computer & Info. L. 1
Definitions of privacy vary widely according to context and environment. In many countries, the concept
has been fused with data protection, which interprets privacy in terms of managing personal
information. Outside this rather strict context, privacy protection is frequently seen as a way of drawing
the line at how far society can intrude into a person's affairs. It can be divided into the following facets:
Information privacy , involving the establishment of rules governing the collection and handling of
personal data such as credit information and medical records; Bodily privacy , concerning the
protection of people's physical beings against invasive procedures such as drug testing and cavity
searches; Privacy of communications, covering the security and privacy of mail, telephones, email and
other forms of communication; and Territorial privacy , concerning the setting of limits on intrusion
into the domestic and other environments such as the workplace or public space. The lack of a single
definition should not imply that the issue lacks importance. As one writer observed,
"In one
The term security is used to eliminate the threats they have created
Lipschutz 95 (Ronnie D, a Professor of Politics and Codirector of the Center for Global, International,
and Regional Studies at the University of CaliforniaSanta Cruz , On Security, p. 9-10)
Operationally, however, this means: In naming a certain development a security problem, the state
can claim a special right, one that will, in the final instance, always be defined by the state and its elites.
Trying to press the kind of unwanted fundamental political chance on a ruling elite is similar to playing a
game in which ones opponent can change the rules at any time s/he likes. Power holders can always try
to use the instrument of securitization of an issue to gain control over it. By definition, something is a
security problem when the elites declare it to be so: and because the End of this Institution [the
Leviathan, the Sovereign], is the Peace and Defense of them all; and whosoever has the right to the End,
has right to the Means; it belongeth of Right, to whatsoever Man, or Assembly that hath the
Soveraignty, to be Judge both of the meanes of Peace and Defense; and also of the hindrances, and
disturbances of the same; and to do whatsoever he shall think necessary to be done, both before hand,
for the preserving of Peace and Security, by prevention of Discord at home and thus, that those who
administer this order can easily use it for specific, self-serving purposes is something that cannot be
easily avoided. What then is security? With the help of language theory, we can regard security as a
speech act. In this usage, security is not of interest as a sign that refers to somethingmore rea; the
utterance itself is the act. By saying it, something is done (as in betting, giving a promis, naming a ship).
By uttering security, a state-representative moves a particular development into a specific area, and
thereby claims a special right to use whatever means are necessary to block it. The clearest illustration
of this phenomenon- on which I will elaborate below- occurred in Central and Eastern Europe during the
Cold War, where order was clearly, systematically, and institutionally linked to the survival of the
system and its elites. Thinking about chainge in the East-West relations and/or in Eastern Europe
throughout this period meant, therefore, trying to bring about change without generating a
securitization response by elites, which would have provided the pretext for acting against those who
had overstepped the boundaries of the permitted. Consequentially, to ensure that this mechanism
would not be triggered, actors had to keep their challenges below a certain thershold and/or through
the political process-wheter national or international- have the threshold negotiated upward. As Egbert
Jahn put it, the task was to turn threats into challenges; to move developments from the sphere of
existential fear to one where they could be handled by ordinary means, as politics, economy, culture,
and so on. As part of this exercise, a crucial political and theoretical issue became the definition of
intervention or interference in domestic affairs, whereby change-oriented agents tried, through
international law, diplomacy, and various kinds of politics, to raise the threshold and make more
interaction possible.
The very concept of Terrorism is inherently empty, illegitimate, and meaningless. Terrorism itself is
not an objective term or legitimate object of study, but was conceived of as a highly politicized
instrument and has been used that way ever since. The best scholarship on this issue, in my view,
comes from Remi Brulin, who teaches at NYU and wrote his PhD dissertation at the Sorbonne in Paris on
the discourse of Terrorism. When I interviewed him in 2010, he described the history of the term it
was pushed by Israel in the 1960s and early 1970s as a means of universalizing its conflicts (this isnt our
fight against our enemies over land; its the Entire Worlds Fight against The Terrorists!). The term was
then picked up by the neocons in the Reagan administration to justify their covert wars in Central
America (in a test run for what they did after 9/11, they continuously exclaimed: were fighting against
The Terrorists in Central America, even as they themselves armed and funded classic Terror groups in El
Salvador and Nicaragua). From the start, the central challenge was how to define the term so as to
include the violence used by the enemies of the U.S. and Israel, while excluding the violence the U.S.,
Israel and their allies used, both historically and presently.
(Glenn, Glenn Greenwald is a former Constitutional and civil rights litigator and is the author of three New York Times Bestselling books: two on the Bush administration's
executive power and foreign policy abuses, and his latest book, With Liberty and Justice for Some, an indictment of America's two-tiered system of justice. Greenwald was named by The Atlantic as one of the 25 most influential
political commentators in the nation. He is the recipient of the first annual I.F. Stone Award for Independent Journalism, and is the winner of the 2010 Online Journalism Association Award for his investigative work on the arrest
and oppressive detention of Bradley Manning. The sham terrorism expert industry, http://www.salon.com/2012/08/15/the_sham_terrorism_expert_industry/)
The exaggerations of the threat presented by terrorism and then on the distortions of perspective these
exaggerations have inspired distortions that have in turn inspired a determined and expensive quest
to ferret out, and even to create, the nearly nonexistent. Richard Jackson is a Professor at the The
National Centre for Peace and Conflict Studies in New Zealand. He has written volumes on the fraud of terrorism expertise and the
propagandistic purpose of this field of discipline. He has documented that most self-proclaimed terrorism experts simply ignore the primary cause of the violence they claim to study:
most terrorism scholars, politicians and the media dont seem to know that terrorism is most often
caused by military intervention overseas, and not religion, radicalization, insanity, ideology, poverty or
such like
even though the Pentagon has known it for years. In one article entitled 10 Things More Likely to Kill You Than Terrorism, he notes that The chances of you dying in a terrorist attack are in the range of 1 in 80,000, or about the same chance of being killed by a meteor, and that bathtubs, vending machines, and lightning all pose a greater risk of death. In a book critiquing the terrorism expert field, Jackson argued that most of what is accepted as well-founded knowledge in terrorism studies is, in fact, highly
debatable and unstable. He therefore scorns almost four decades of so-called Terrorism scholarship as based on a series of virulent myths, half-truths and contested claims that are plainly biased towards Western state priorities. To Jackson, terrorism is a social fact rather than a brute fact and does not exist outside of the definitions and practices which seek to enclose it, including those of the terrorism studies field. In sum, it means whatever the wielder of the term wants it to mean: something that cannot be the subject of legitimate expertise. * * * * *
There is no term more potent in our political discourse and legal landscape than
Terrorism. It shuts down every rational thought process and political debate the
minute it is uttered. It justifies torture (we have to get information from the Terrorists); due-processfree-assassinations even of our own citizens (Obama has to kill the Terrorists); and rampant secrecy
(the Government cant disclose what its doing or have courts rule on its legality because the
Terrorists will learn of it), and it sends people to prison for decades (material supporters of
Terrorism). It is a telling paradox indeed that this central, all-justifying word is simultaneously the most meaningless
and therefore the most manipulated.
justifies everything . Indeed, thats the point: it is such a useful concept precisely because its so malleable,
because it means whatever those with power to shape discourse want it to mean . And no faction has helped this process
along as much as the group of self-proclaimed terrorism experts that has attached itself to think tanks, academia, and media outlets. They
masquerade as objective fact, shining brightly with the veneer of scholarly rigor. The industry itself is
a fraud, as are those who profit from and within it.
10
Infringes on Autonomy
Deborah G. Johnson, Computer Ethics, Englewood Cliffs, NJ: Prentice-Hall (1985): 65.
The analysis of Rachels and Fried suggests a deeper and more fundamental issue: personal freedom. As
Deborah Johnson has observed, "To recognize an individual as an autonomous being, an end in himself,
entails letting that individual live his life as he chooses. Of course, there are limits to this, but one of the
critical ways that an individual controls his life is by choosing with whom he will have relationships and
what kind of relationships these will be.... Information mediates relationships. Thus when one cannot
control who has information about one, one loses considerable autonomy."6
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26