Beruflich Dokumente
Kultur Dokumente
***Neg***
***1NC***
Terror risk is high- maintaining current surveillance is key
Inserra, 6-8-2015
David Inserra is a Research Associate for Homeland Security and Cyber Security in the
Douglas and Sarah Allison Center for Foreign and National Security Policy of the
Kathryn and Shelby Cullom Davis Institute for National Security and Foreign Policy, at
The Heritage Foundation, 6-8-2015, "69th Islamist Terrorist Plot: Ongoing Spike in
Terrorism Should Force Congress to Finally Confront the Terrorist Threat," Heritage
Foundation, http://www.heritage.org/research/reports/2015/06/69th-islamistterrorist-plot-ongoing-spike-in-terrorism-should-force-congress-to-finally-confront-theterrorist-threat
On June 2 in Boston, Usaamah Abdullah Rahim drew a knife and attacked police officers
and FBI agents, who then shot and killed him. Rahim was being watched by Bostons
Joint Terrorism Task Force as he had been plotting to behead police officers as part of
violent jihad. A conspirator, David Wright or Dawud Sharif Abdul Khaliq, was arrested
shortly thereafter for helping Rahim to plan this attack. This plot marks the 69th publicly
known Islamist terrorist plot or attack against the U.S. homeland since 9/11, and is part
of a recent spike in terrorist activity. The U.S. must redouble its efforts to stop terrorists
before they strike, through the use of properly applied intelligence tools. The Plot According to
the criminal complaint filed against Wright, Rahim had originally planned to behead an individual outside the state of
Massachusetts,[1] which, according to news reports citing anonymous government officials, was Pamela Geller, the
organizer of the draw Mohammed cartoon contest in Garland, Texas.[2] To this end, Rahim had purchased multiple
knives, each over 1 foot long, from Amazon.com. The FBI was listening in on the calls between Rahim
and Wright and recorded multiple conversations regarding how these weapons would be
used to behead someone. Rahim then changed his plan early on the morning of June 2. He planned to go on
vacation right here in Massachusetts. Im just going to, ah, go after them, those boys in blue. Cause, ah, its the easiest
target.[3] Rahim and Wright had used the phrase going on vacation repeatedly in their conversations as a euphemism
for violent jihad. During this conversation, Rahim told Wright that he planned to attack a police officer on June 2 or June
3. Wright then offered advice on preparing a will and destroying any incriminating evidence. Based on this threat, Boston
police officers and FBI agents approached Rahim to question him, which prompted him to pull out one of his knives. After
being told to drop his weapon, Rahim responded with you drop yours and moved toward the officers, who then shot and
killed him. While Rahims brother, Ibrahim, initially claimed that Rahim was shot in the back, video surveillance was
shown to community leaders and civil rights groups, who have confirmed that Rahim was not shot in the back.[4 ]
Terrorism Not Going Away This 69th Islamist plot is also the seventh in this calendar year. Details on
how exactly Rahim
was radicalized are still forthcoming, but according to anonymous officials, online
propaganda from ISIS and other radical Islamist groups are the source. [5] That would
make this attack the 58th homegrown terrorist plot and continue the recent trend of ISIS
playing an important role in radicalizing individuals in the United States. It is also the sixth
plot or attack targeting law enforcement in the U.S., with a recent uptick in plots aimed at police. While the debate over
the PATRIOT Act and the USA FREEDOM Act is taking a break, the terrorists are not. The result of the debate has been
the reduction of U.S. intelligence and counterterrorism capabilities, meaning that the U.S. has to do even more with less
when it comes to connecting the dots on terrorist plots.[6] Other legitimate intelligence tools and
capabilities must be leaned on now even more. Protecting the Homeland To keep the U.S. safe, Congress
must take a hard look at the U.S. counterterrorism enterprise and determine other measures that are needed to improve it.
Congress should: Emphasize community outreach. Federal grant funds should be used to create robust communityoutreach capabilities in higher-risk urban areas. These funds must not be used for political pork, or so broadly that they no
longer target those communities at greatest risk. Such capabilities are key to building trust within these communities, and
if the United States is to thwart lone-wolf terrorist attacks, it must place effective community outreach operations at the
tip of the spear. Prioritize local cyber capabilities. Building cyber-investigation capabilities in the higher-risk urban areas
must become a primary focus of Department of Homeland Security grants. With so much terrorism-related activity
occurring on the Internet, local law enforcement must have the constitutional ability to monitor and track violent
extremist activity on the Web when reasonable suspicion exists to do so. Push the FBI toward being more effectively
driven by intelligence. While the FBI has made high-level changes to its mission and organizational structure, the bureau
is still working on integrating intelligence and law enforcement activities. Full integration will require overcoming inter-
agency cultural barriers and providing FBI intelligence personnel with resources, opportunities, and the stature they need
to become a more effective and integral part of the FBI. Maintain essential counterterrorism tools.
Support for important investigative tools is essential to maintaining the security of the
U.S. and combating terrorist threats. Legitimate government surveillance programs are
also a vital component of U.S. national security and should be allowed to continue. The
need for effective counterterrorism operations does not relieve the government of its
obligation to follow the law and respect individual privacy and liberty. In the American
system, the government must do both equally well. Clear-Eyed Vigilance The recent spike in
terrorist plots and attacks should finally awaken policymakersall Americans, for that matterto
the seriousness of the terrorist threat. Neither fearmongering nor willful blindness serves
the United States. Congress must recognize and acknowledge the nature and the scope of
the Islamist terrorist threat, and take the appropriate action to confront it.
Surveillance is critical to stopping terror threats
Lewis 14 [James Andrew Lewis, Director and Senior Fellow of the Technology and Public
Policy Program at the CSIS, December 2014, "Underestimating Risk in the Surveillance
Debate", Center for Strategic and International Studies,
http://csis.org/files/publication/141209_Lewis_UnderestimatingRisk_Web.pdf pg 1011 jf]
Assertions that a collection program contributes nothing because it has not
singlehandedly prevented an attack reflect an ill-informed understanding of how the United
States conducts collection and analysis to prevent harmful acts against itself and its allies. Intelligence does not work as
it is portrayed in filmssolitary agents do not make startling discoveries that lead to dramatic, lastminute success (nor is technology consistently infallible). Intelligence is a team sport. Perfect knowledge does
not exist and success is the product of the efforts of teams of dedicated individuals from many
agencies, using many tools and techniques, working together to assemble fragments of data from many sources into a
coherent picture. Analysts assemble this mosaic from many different sources and based on experience and intuition. Luck
is still more important than anyone would like and the alternative to luck is acquiring more
information. This ability to blend different sources of intelligence has improved U.S. intelligence capabilities and
gives us an advantage over some opponents. Portrayals of spying in popular culture focus on a central narrative, essential
for storytelling but deeply misleading. In practice, there can be many possible narratives that analysts must explore
simultaneously. An analyst might decide, for example, to see if there is additional confirming information that points to
which explanation deserves further investigation. Often, the contribution from collection programs
comes not from what they tell us, but what they let us reject as false. In the case of the 215
program, its utility was in being able to provide information that allowed analysts to rule out some
theories and suspects. This allows analysts to focus on other, more likely, scenarios. In one instance, an
attack is detected and stopped before it could be executed . U.S. forces operating in Iraq discover a
bomb-making factory. Biometric data found in this factory is correlated with data from other bombings to provide partial
identification for several individuals who may be bomb-makers, none of whom are present in Iraq. In looking for these
individuals, the United States receives information from another intelligence service that one of the bombers might be
living in a neighboring Middle Eastern country. Using communications intercepts, the United States
determines that the individual is working on a powerful new weapon. The United States is able
to combine the communications intercept from the known bomb maker with information from other sourcesbattlefield
data, information obtained by U.S. agents, collateral information from other nations intelligence services and use
this to identify others in the bombers network, understand the plans for bombing, and
identify the bombers target, a major city in the United States. This effort takes place over months
and involves multiple intelligence, law enforcement, and military agencies, with more than a dozen individuals from these
agencies collaborating to build up a picture of the bomb-maker and his planned attack. When the bomb-maker
leaves the Middle East to carry out his attack, he is prevented from entering the United States. An
analogy for how this works would be to take a 1,000-piece jigsaw puzzle, randomly select 200 pieces, and provide them to
a team of analysts who, using incomplete data, must guess what the entire picture looks like. The likelihood of
their success is determined by how much information they receive, how much time they have,
and by experience and luck. Their guess can be tested by using a range of collection programs, including
communications surveillance programs like the 215 metadata program. What is left out of this picture
(and from most fictional portrayals of intelligence analysis) is the number of false leads the analysts must pursue, the
number of dead ends they must walk down, and the tools they use to decide that something is a false lead or dead end.
Police officers are familiar with how many leads in an investigation must be eliminated through legwork and query before
an accurate picture emerges. Most leads are wrong, and much of the work is a process of elimination that eventually
focuses in on the most probable threat. If real intelligence work were a film, it would be mostly boring.
Where the
metadata program contributes is in eliminating possible leads and suspects. This makes the
critique of the 215 program like a critique of airbags in a car you own a car for years, the airbags
never deploy, so therefore they are useless and can be removed. The weakness in this argument is that discarding
airbags would increase risk. How much risk would increase and whether other considerations outweigh this
increased risk are fundamental problems for assessing surveillance programs. With the Section 215 program, Americans
gave up a portion of their privacy in exchange for decreased risk. Eliminating 215 collection is like subtracting a few
of the random pieces of the jigsaw puzzle. It decreases
are successful in releasing highly virulent and deadly genetic malware into
the wild, they are still unlikely to succeed in killing everyone. However, even if every such mass
death event results only in a high (i.e., not total) kill rate and there is a large
gap between each such event (so that individuals can build up the requisite
scientific infrastructure again), extinction would be inevitable regardless.
Some of the engineered bioweapons will be more successful than others; the inter-apocalyptic eras will
vary in length; and
***Neg Uniqueness***
Purported ISIS jihadists issued threats against the United States Tuesday, indicating the
group has trained soldiers positioned throughout the country, ready to attack any target we
desire. The online post singles out controversial blogger Pamela Geller, one of the organizers of the Draw the Prophet
Muhammad cartoon contest in Garland, Texas, calling for her death to heal the hearts of our brothers and disperse the
ones behind her. ISIS also claimed responsibility for the shooting, which marked the first
time the terror group claimed responsibility for an attack on U.S. soil , according to the New York
Daily News. The attack by the Islamic State in America is only the beginning of our efforts to establish a wiliyah
[authority or governance] in the heart of our enemy, the ISIS post reads. As for Geller, the jihadists state: To those who
protect her: this will be your only warning of housing this woman and her circus show. Everyone who houses her events,
gives her a platform to spill her filth are legitimate targets. We have been watching closely who was present at this event
and the shooter of our brothers. ISIS further claims to have known that the Muhammad cartoon
contest venue would be heavily guarded, but conducted the attack to demonstrate the
willingness of its followers to die for the Sake of Allah. The FBI and the Department of Homeland
Security, in fact, issued a bulletin on April 20 indicating the event would be a likely terror target. ISIS drew its
message to a close with an ominous threat: We have 71 trained soldiers in 15 different
states ready at our word to attack any target we desire. Out of the 71 trained soldiers 23
have signed up for missions like Sunday, We are increasing in number bithnillah [if God wills].
Of the 15 states, 5 we will name Virginia, Maryland, Illinois, California, and Michigan
The next six months will be interesting. Fox News reports that the U.S. intelligence community was
assessing the threat and trying to determine if the source is directly related to ISIS
leadership or an opportunist such as a low-level militant seeking to further capitalize on
the Garland incident. Former Navy Seal Rob ONeill told Fox News he believes the ISIS threat is credible, and the
U.S. must be prepared. He added that the incident in Garland is a prime example of the difference between a gun free
zone and Texas. They showed up at Charlie Hebdo, and it was a massacre. If these two guys had gotten into that building it
would have been Charlie Hebdo times ten. But these two guys showed up because they were offended by something
protected by the First Amendment, and were quickly introduced to the Second Amendment. Geller issued a statement
regarding the ISIS posting: This threat illustrates the savagery and barbarism of the Islamic State. They want me dead for
violating Sharia blasphemy laws. What remains to be seen is whether the free world will finally wake up and stand for the
freedom of speech, or instead kowtow to this evil and continue to denounce me.
unpredictable." A U.S. military official said the order to raise the force protection level to
Bravo also applies to all National Guard installations, recruiting stations, and ROTC
detachments, though practically speaking, the official acknowledges it will be difficult for
the ROTC detachments to do much more than security awareness. In addition, security
was raised recently at Wright-Patterson Air Force Base near Dayton, Ohio, in response to
a perceived threat to the base security, another U.S. military official said. The threat was
never deemed credible, but it came after another security concern at a base in Delaware
used by Vice President Joe Biden when he flies home. On Friday, Wright-Patterson
announced that the Air Force museum, which is part of the base, was canceling a
planned Friday night concert and was stopping tours that were regularly offered until
further notice. The base said this was "due to elevated security measures." Since
NORTHCOM was established in October 2002, the threat level has reached Bravo on
four occasions: Feb. 9, 2003, amid concerns al Qaeda was planning attacks on American
targets; Dec. 21, 2003, when officials were concerned about attacks during the holiday
season; May 1, 2011, in the aftermath of the raid that killed Osama bin Laden; and the
10th anniversary of the Sept. 11 attacks.
ISIS will emerge as a serious threat to the US
Morell 15 , Michael Morell is the former deputy director of the CIA and has twice
served as acting director. He is the author of The Great War of Our Time: The CIA's Fight
Against Terrorism From al Qa'ida to ISIS. May 14, 2015 Time Magazine ISIS Is a
Danger on U.S. Soil http://time.com/3858354/isis-is-a-danger-on-u-s-soil/
The terrorist group poses a gathering threat. In the aftermath of the attempted terrorist attack on May 4 in
Garland, Texasfor which ISIS claimed responsibilitywe find ourselves again considering the
question of whether or not ISIS is a real threat. The answer is yes. A very serious one.
Extremists inspired by Osama bin Ladens ideology consider themselves to be at war with the
U.S.; they want to attack us. It is important to never forget thatno matter how long it has been since
9/11. ISIS is just the latest manifestation of bin Ladens design . The group has grown faster than any
terrorist group we can remember, and the threat it poses to us is as wide-ranging as any
we have seen. What ISIS has that al-Qaeda doesnt is a Madison Avenue level of sophisticated messaging
and social media. ISIS has a multilingual propaganda arm known as al-Hayat, which uses GoPros and
cameras mounted on drones to make videos that appeal to its followers. And ISIS uses just about every tool
in the platform boxfrom Twitter to YouTube to Instagramto great effect, attracting fighters and funding.
Digital media are one of the groups most significant strengths; they have helped ISIS become an
organization that poses four significant threats to the U.S. First, it is a threat to the stability of the entire
Middle East. ISIS is putting the territorial integrity of both Iraq and Syria at risk. And a further collapse of
either or both of these states could easily spread throughout the region, bringing with it sectarian and
religious strife, humanitarian crises and the violent redrawing of borders, all in a part of the world that
remains critical to U.S. national interests. ISIS now controls more territoryin Iraq and Syriathan any
other terrorist group anywhere in the world. When al-Qaeda in Iraq joined the fight in Syria, the group
changed its name to ISIS. ISIS added Syrians and foreign fighters to its ranks, built its supply of arms and
money and gained significant battlefield experience fighting Bashar Assads regime. Together with the
security vacuum in Iraq and Nouri al-Malikis alienation of the Sunnis, this culminated in ISISs successful
blitzkrieg across western Iraq in the spring and summer of 2014, when it seized large amounts of territory.
ISIS is not the first extremist group to take and hold territory. Al-Shabab in Somalia did so a number of years
ago and still holds territory there, al-Qaeda in the Islamic Maghreb did so in Mali in 2012, and al-Qaeda in
Yemen did so there at roughly the same time. I fully expect extremist groups to attempt to takeand
sometimes be successful in takingterritory in the years ahead. But no other group has taken so much
territory so quickly as ISIS has. Second, ISIS is attracting young men and women to travel to Syria and Iraq
to join its cause. At this writing, at least 20,000 foreign nationals from roughly 90 countries have gone to
Syria and Iraq to join the fight. Most have joined ISIS. This flow of foreigners has outstripped the flow of
such fighters into Iraq during the war there a decade ago. And there are more foreign fighters in Syria and
Iraq today than there were in Afghanistan in the 1980s working to drive the Soviet Union out of that country.
These foreign nationals are getting experience on the battlefield, and they are becoming increasingly
radicalized to ISISs cause. There is a particular subset of these fighters to worry about . Somewhere
between 3,500 and 5,000 jihadist wannabes have traveled to Syria and Iraq from Western Europe,
Canada, Australia and the U.S. They all have easy access to the U.S. homeland, which presents
two major concerns: that these fighters will leave the Middle East and either conduct an
attack on their own or conduct an attack at the direction of the ISIS leadership. The
former has already happened in Europe. It has not happened yet in the U.S.but it will.
In spring 2014, Mehdi Nemmouche, a young Frenchman who went to fight in Syria, returned to Europe and
shot three people at the Jewish Museum of Belgium in Brussels. The third threat is that ISIS is building a
following among other extremist groups around the world. The allied exaltation is happening at a faster pace
than al-Qaeda ever enjoyed. It has occurred in Algeria, Libya, Egypt and Afghanistan. More will follow.
These groups, which are already dangerous, will become even more so. They will increasingly target ISISs
enemies (including us), and they will increasingly take on ISISs brutality. We saw the targeting play out in
early 2015 when an ISIS-associated group in Libya killed an American in an attack on a hotel in Tripoli
frequented by diplomats and international businesspeople. And we saw the extreme violence play out just a
few weeks after that when another ISIS-affiliated group in Libya beheaded 21 Egyptian Coptic Christians.
And fourth, perhaps most insidiously, ISISs message is radicalizing young men and women around the
globe who have never traveled to Syria or Iraq but who want to commit an attack to demonstrate their
solidarity with ISIS. These are the so-called lone wolves. Even before May 4, such an ISIS-inspired attack
had already occurred in the U.S.: an individual with sympathies for ISIS attacked two New York City police
officers with a hatchet. Al-Qaeda has inspired such U.S. attacksthe Fort Hood shootings in late 2009 that
killed 13 and the Boston Marathon bombing in spring 2013 that killed five and injured nearly 300. The
attempted attack in Texas is just the latest of these. We can expect more of these kinds of attacks in the U. S.
Attacks by ISIS-inspired individuals are occurring at a rapid pace around the worldroughly 10 since ISIS
took control of so much territory. Two such attacks have occurred in Canada, including the October 2014
attack on the Parliament building. And another occurred in Sydney, in December 2014. Many planning such
attacksin Australia, Western Europe and the U.S.have been arrested before they could carry out their
terrorist plans. Today an ISIS-directed attack in the U. S. would be relatively
unsophisticated (small-scale), but over time ISISs capabilities will grow. This is what a longterm safe haven in Iraq and Syria would give ISIS, and it is exactly what the group is planning to do. They
have announced their intentionsjust like bin Laden did in the years prior to 9/11.
had a short flirtation last year, ISIS has now signaled its intent to usurp al-Qaedas power
in its home territory. Attacks by ISIS last week against Shia mosques in the Yemeni
capital of Sanaa were, at least in part, designed to suck recruits, financial donors, and
prestige away from AQAP. But to truly displace al-Qaeda, ISIS knows it must furnish a
new 9/11. ITS CAPABILITIES ARE GROWING Today, ISIS has thousands of European
citizens in its ranks. Educated at the online University of Edward Snowden, ISIS
operations officers have cut back intelligence services ability to monitor and disrupt
their communications. With EU intelligence services stretched beyond breaking
point, ISIS has the means and confidence to attempt attacks against the West. EU
passports are powerful weapons: ISIS could attack as al-Qaeda has repeatedly U.S.
targets around the world. AN ATTACK ON THE U.S. IS PRICELESS PROPAGANDA For
transnational Salafi jihadists like al-Qaeda and ISIS, a successful blow against the U.S.
allows them to claim the mantle of a global force and strengthens the narrative that
theyre on a holy mission. Holiness is especially important: ISIS knows that to recruit
new fanatics and deter its enemies, it must offer an abiding narrative of strength and
divine purpose. With the groups leaders styling themselves as Mohammeds heirs,
Allahs chosen warriors on earth, attacking the infidel United States would reinforce
ISISs narrative. Of course, attacking America wouldnt actually serve the Islamic States
long-term objectives. Quite the opposite: Any atrocity would fuel a popular American
resolve to crush the group with expediency. (Make no mistake, it would be crushed.) The
problem, however, is that, until then, America is in the bulls eye.
Homeland Security: The president repeatedly claims we're safer than ever. The chairman
of the House Intelligence Committee just warned of the opposite. Apparently we have
difficulty tracking U.S.-based terrorist cells. The attitude of the Obama administration
toward terrorism is summed up by the National Terrorism Advisory System page on the
Homeland Security website. "There are no current alerts," it reports. And "there are no
expired alerts." Nearby is the question, "Was this page helpful?" The answer is no. The
five post-9/11 color-coded terrorism alert levels, abandoned in 2011, were lampooned by
comedians for being vague and based on hidden criteria. With the threat level never
dropping below "elevated" (yellow), down to "guarded" (blue) or "low" (green), the
public was ignoring it, it was said. But now, in its place, is a National Terrorism Advisory
System that never issues alerts. In fact, over nearly six and a half years, President Obama
has not once, under either the old or new system, issued an alert. Last August he
promised "things are much less dangerous now than they were 20 years ago, 25 years
ago, or 30 years ago." That contradicted his own Joint Chiefs chairman, secretary of
defense, and even his then-Attorney General Eric Holder, who called potential
undetectable explosives smuggled in from Syria the most frightening thing he had seen
while in office. Enter House Intelligence Committee Chairman Devin Nunes, R-Calif.,
who told CBS' "Face the Nation" on Sunday that "we face the highest threat level we have
ever faced in this country today . .. including after 9/11." Because of obstacles such as
encrypted Internet chat rooms, "we are having a tough time tracking terrorist cells,"
according to Nunes. And "the flow of fighters" from Western nations who have been
radicalized into the Islamic State, but "who have now come out" and may seek to commit
terrorist attacks back home, is another reason the threat is greater than ever. Nunes
noted that the FBI has "cases open in 50 states." Then there is civil war in Yemen, with
the AQAP branch of al-Qaida "everywhere," according to Nunes. Last September,
outlining his noncombat approach against the Islamic State, Obama cited his Yemen
policy as the model. Eleven days later, Iranian-backed Houthi rebels toppled the U.S.backed government. Obama is poised to make a nuclear deal with those same Iranians,
lifting sanctions and handing Tehran tens of billions in cash to terrorize even more and
gain regional dominance all before getting nuclear weapons, which will launch an
atomic arms race in the Mideast. Russia's new aggressiveness counters Obama's claims
that the Cold War is ancient history. Iran, the Islamic State and other terrorists are
actually, while lacking Moscow's massive nuclear arsenal, a greater threat because of the
theocratic-based, self-destructive irrationality and instability underlying their
motivations. The Soviets, after all, never murdered thousands of Americans on their own
soil. Far less powerful Islamist fanatics did. Under the old color-coded system, today's
level of alert would be "severe" (red).
Terror threat high nowAl Qaeda initiatives prove
Mail Online, 7-15-2015, "Terror alert remains high,"
http://www.dailymail.co.uk/news/article-181751/Terror-alert-remains-high.html
Britain and the US remained on terror alert today, following a call from Osama bin
Laden's deputy for Muslims to attack the "missions" of the two countries. An audio tape
said to have come from Ayman al-Zawahri was played on Arabic television station alJazeera, urging "brothers" to follow the example of the September 11 hijackers. "Consider
your 19 brothers who attacked America in Washington and New York with their planes
as an example," said the voice, identified as al-Zawahri by al-Jazeera, which did not say
how it got the tape. "Attack the missions of the United States, the UK, Australia and
Norway and their interests, companies and employees. Turn the ground beneath their
feet into an inferno and kick them out of your countries," said the tape. "Know that you
are not alone in this battle. Your mujahadeen brothers are following the enemies as well
and are lying in wait for them." Al-Zawahri, who has not been seen since the war in
Afghanistan, lashed out at Arab leaders for offering "airports and the facilities" to the
Allied troops, in an apparent reference to the war on Iraq. His call to arms came as
British and US embassies in the Saudi capital Riyadh remained shut amid fears they
could be targeted in "imminent" terrorist attacks, and America upped its homeland
terror alert status. Hijack plot foiled And details emerged of a possible al Qaida plot to
hijack a civilian airliner in the Saudi town of Jeddah and crash it into a bank. According
to reports, three armed Moroccans arrested in Jeddah's airport on Monday had planned
the suicide hijack and hoped to crash the plane into the headquarters of Saudi's National
Commercial Bank. It was not clear if they were linked to last week's triple suicide
bombings of foreign residential compounds in Riyadh which killed 34, including two
Britons, or similar bombings in Morocco on Friday. Security boosted Security officials
warned that al Qaida appeared to be entering an "active" phase of attacks, aimed at
showing it was still operational despite the so-called "war on terror". The British,
German and Italian embassies in the Saudi capital Riyadh closed to the public yesterday
following intelligence reports that terrorist attacks were being planned. The British
consulate in Jeddah and trade office in al Khobar were also closed from yesterday. It is
expected the offices will reopen on Saturday, although the situation will be kept under
review. The US closed its embassy and consulates in the Middle Eastern kingdom on
Tuesday, a week after the series of suicide bomb attacks in Riyadh. The Bush
administration raised America's terror alert level to orange, its second highest level,
amid fears that the wave of terrorist attacks in Saudi, Morocco and Israel will spread to
the US.
Homegrown terrorism on the rise74 plots discovered
Carrie Blackmore, 1-17-2015, "Number of homegrown terrorists is rising," USA
TODAY, http://www.usatoday.com/story/news/nation/2015/01/17/number-ofhomegrown-terrorists-is-rising/21940159/
CINCINNATI We are far from knowing the outcome of the case against Christopher
Cornell, the young local man accused of plotting an attack on the U.S. Capitol, but if he is
convicted, he would be added to a growing list of homegrown jihadist terrorists. From
Sept. 11, 2001, to January 2014, there were 74 known terrorist plots perpetrated by
Americans, lawful U.S. residents or visitors largely radicalized here in the United States,
according to the most recent data reported by the Congressional Research Service. Five
of those plots were carried out before law enforcement was able to intervene. Fifty-three
of the cases almost 72 percent happened after April 2009. That's a 152 percent
increase over that time period and constitutes a spike, according to the report by the
service, an agency that works exclusively for the U.S. Congress, providing policy and
legal analysis to committees and members of the House and Senate. "It may be too early
to tell how sustained this uptick is," the report reads. "Regardless, the apparent spike in
such activity after April 2009 suggests that ideologies supporting violent jihad continue
to influence some Americans even if a tiny minority." A review of the 74 cases shows
that just seven were initiated by someone working independently, a lone wolf. Forty-five
of the 74 planned to attack a domestic target.
Surveillance increasing
US surveillance is increasing to deal with new terrorist threats
Bennett 5/18/15 (Brian, washington based reporter for the LA Times, "White House
Steps Up Warning About Terrorism on US Soil")
Alarmed about the growing threat from Islamic State, the Obama administration has
dramatically stepped up warnings of potential terrorist attacks on American soil after
several years of relative calm. Behind the scenes, U.S. authorities have raised defenses
at U.S. military bases, put local police forces on alert and increased surveillance at the
nation's airports, railroads, shopping malls, energy plants and other potential targets.
Driving the unease are FBI arrests of at least 30 Americans on terrorism-related charges
this year in an array of "lone wolf" plots, none successful, but nearly all purportedly
inspired by Islamic State propaganda or appeals. The group's leader, Abu Bakr
Baghdadi, drove home the danger in a 34-minute audio recording released online
Thursday. He urged Muslims everywhere to "migrate to the Islamic State or fight in his
land, wherever that may be." It is pretty easy for [Islamic State] to reach out to a very
large number of people using a very robust social media presence. I suspect we should
see more plots going forward. - J.M. Berger, a nonresident fellow at the Brookings
Institution The audio was released with translations in English, French, German,
Russian and Turkish, signaling the militants' increasingly ambitious attempts to draw
new recruits and to spark violence around the world. U.S. officials estimate the
Sunni Muslim group has drawn 22,000 foreign fighters to Syria and Iraq, including
about 3,700 from Western nations. About 180 Americans have gone, or tried to go. U.S.
counter-terrorism officials initially viewed Islamic State as primarily a regional security
threat, focused on expanding and protecting its self-proclaimed Islamist caliphate in
Syria and Iraq, rather than launching attacks abroad. But the analysis has shifted
sharply as gunmen inspired by the group, but not controlled or assisted by them, opened
fire at the Parliament in Ottawa; at a cafe in Sydney, Australia; at a kosher grocery in
Paris; and, on May 3, in Garland, Texas. In the Texas case, two would-be terrorists
apparently prompted by Islamic State social media messages tried to shoot their way into
a provocative contest for caricatures of the prophet Muhammad. Both gunmen were shot
to death, and no one else was killed. Islamic State later claimed responsibility for the
assault, the first time it has done so for an attack on U.S. soil. James B. Comey, the FBI
director, warned this month that "hundreds, maybe thousands" of Americans are seeing
recruitment pitches from Islamic State on Facebook, Twitter and other social media, as
well as messages sent to smartphones of "disturbed people" who could be pushed to
attack U.S. targets. "It's like the devil sitting on their shoulders saying, 'Kill, kill, kill,'"
Comey told reporters. The United States has entered a "new phase, in my view, in the
global terrorist threat," Jeh Johnson, director of Homeland Security, said Friday on
MSNBC. "We have to be concerned about the independent actor, and the independent
actor who is here in the homeland who may strike with little or no warning," he said.
"The nature of the global terrorist threat has evolved." That poses a special challenge for
U.S. intelligence and law enforcement agencies, which spent years desperately trying to
penetrate and understand Al Qaeda's rigid hierarchy and top-down approach to
terrorism. Now they are struggling to detect and prevent lethal attacks by individuals
such as the April 2013 bombing of the Boston Marathon by two Russian-born brothers
with little or no outside communication or support. The administration has sought to
stiffen homeland defenses, and intelligence gathering, in response.
Surveillance Key
Mass surveillance has thwarted many attacks more transparency of
the programs makes attacks very likely
Nakashima 13 [Ellen Nakashima, national security reporter for The Washington Post. She focuses on issues
relating to intelligence, technology and civil liberties. Officials: Surveillance programs foiled more than 50 terrorist
plots, https://www.washingtonpost.com/world/national-security/officials-surveillance-programs-foiled-more-than-50terrorist-plots/2013/06/18/d657cb56-d83e-11e2-9df4-895344c13c30_story.html, June 18th, 2013//Rahul]
The U.S. governments sweeping surveillance programs have disrupted more than 50
terrorist plots in the United States and abroad, including a plan to bomb the New York
Stock Exchange, senior government officials testified Tuesday. The officials, appearing before a largely friendly
House committee, defended the collection of telephone and Internet data by the National
Security Agency as central to protecting the United States and its allies against terrorist
attacks. And they said that recent disclosures about the surveillance operations have caused serious damage. We
are now faced with a situation that, because this information has been made public , we run
the risk of losing these collection capabilities, said Robert S. Litt, general counsel of the Office of the Director of National
Intelligence. Were not going to know for many months whether these leaks in fact have caused us to lose these
capabilities, but if they do have that effect, there is no doubt that they will cause our national
security to be affected. The hearing before the House Intelligence Committee was the third congressional session
examining the leaks of classified material about two top-secret surveillance programs by Edward Snowden, 29, a former
NSA contractor and onetime CIA employee. Articles based on the material in The Washington Post and Britains Guardian
newspaper have raised concerns about intrusions on civil liberties and forced the Obama administration to mount an
aggressive defense of the effectiveness and privacy protections of the operations. Gen. Keith B. Alexander, the head of
the NSA, told the committee that the programs had helped prevent potential terrorist
events over 50 times since 9/11. He said at least 10 of the disrupted plots involved terrorism suspects or
targets in the United States. Alexander said officials do not plan to release additional information publicly, to avoid
revealing sources and methods of operation, but he said the House and Senate intelligence committees will receive
classified details of the thwarted plots. Newly revealed plots In testimony last week, Alexander said the
surveillance programs had helped prevent an attack on the subway system in New York
City and the bombing of a Danish newspaper. Sean Joyce, deputy director of the FBI, described
two additional plots Tuesday that he said were stopped through the surveillance a plan
by a Kansas City, Mo., man to bomb the New York Stock Exchange and efforts by a San
Diego man to send money to terrorists in Somalia. The officials said repeatedly that the operations
were authorized by Congress and subject to oversight through internal mechanisms and the Foreign Intelligence
Surveillance Court, whose proceedings are secret. Alexander said that more than 90 percent of the information on the
foiled plots came from a program targeting the communications of foreigners, known as PRISM. The program was
authorized under Section 702 of a 2008 law that amended the Foreign Intelligence Surveillance Act
(FISA). The law authorizes the NSA to collect e-mails and other Internet communications
to and from foreign targets overseas who are thought to be involved in terrorism or
nuclear proliferation or who might provide critical foreign intelligence. No American in the
country or abroad can be targeted without a warrant, and no person inside the United States can be targeted without a
warrant. A second program collects all call records from U.S. phone companies. It is authorized under Section 215 of the
USA Patriot Act. The records do not include the content of calls, location data, or a subscribers name or address. That law,
passed in 2001 and renewed twice since then, also amended FISA. Snowden, a high school dropout who worked at an NSA
operations center in Hawaii for 15 months as a contractor, released highly classified information on both programs,
claiming they represent government overreach. He has been in hiding since publicly acknowledging on June 9 that he
leaked the material. Several lawmakers pressed for answers on how Snowden, a low-level systems administrator, could
have had access to highly classified material such as a court order for phone records. We need to seal this crack in the
system, said Rep. C.A. Dutch Ruppersberger (Md.), the ranking Democrat on the intelligence panel. Alexander said he is
working with intelligence officials to come up with a two-person rule to ensure that the agency can block unauthorized
people from removing information from the system. But Alexander and the other witnesses focused more heavily on
justifying the programs and arguing that they operate under legal guidelines. As Americans, we value our privacy and our
civil liberties, Alexander said. As Americans, we also value our security and our safety. In the 12 years since the
attacks on September 11th, we have lived in relative safety and security as a nation. That
security is a direct result of the intelligence communitys quiet efforts to better connect
the dots and learn from the mistakes that permitted those attacks to occur on 9/11.
discontinuous. There can be long periods with no noticeable activity, only to have the apparent calm explode. The
debate over how to reform communications surveillance has discounted this risk.
Communications surveillance is an essential law enforcement and intelligence tool.
There is no replacement for it. Some suggestions for alternative approaches to surveillance ,
such as the idea that the National Security Agency (NSA) only track known or suspected terrorists, reflect wishful
thinking, as it is the unknown terrorist who will inflict the greatest harm.
UQ- Empirics arguments dont matter terrorism can happen at
anytime
Lewis 14 [James Andrew Lewis, Director and Senior Fellow of the Technology and Public
Policy Program at the CSIS, December 2014, "Underestimating Risk in the Surveillance
Debate", Center for Strategic and International Studies,
http://csis.org/files/publication/141209_Lewis_UnderestimatingRisk_Web.pdf pg 1920 jf]
The phrase terrorism is overused, and the threat of terrorist attack is easily exaggerated, but that does not mean this
threat it is nonexistent. Groups and individuals still plan to attack American citizens and the citizens of allied countries.
The dilemma in assessing risk is that it is discontinuous. There can be long periods where
no activity is apparent, only to have the apparent calm explode in an attack. The constant, low-
level activity in planning and preparation in Western countries is not apparent to the public, nor is it easy to identify the
moment that discontent turns into action.
There is general agreement that as terrorists splinter into regional groups, the risk of
attack increases. Certainly, the threat to Europe from militants returning from Syria points to increased risk for
U.S. allies. The messy U.S. withdrawal from Iraq and (soon) Afghanistan contributes to an increase in risk.24 European
authorities have increased surveillance and arrests of suspected militants as the Syrian conflict lures hundreds of
Europeans. Spanish counterterrorism police say they have broken up more terrorist cells than in any other European
country in the last three years.25 The chairman of the House Select Committee on Intelligence, who is
better placed than most members of Congress to assess risk, said
into account a
resurgent Taliban, the power of lslamist groups in North Africa, the
continued existence of Shabaab in Somalia, and the appearance of a
powerful new force, the Islamic State in Iraq and Syria (ISIS ). Al Qaeda, previously
the leading threat, has splintered into independent groups that make it a less coordinated force but more difficult target.
On the positive side, the United States, working with allies and friends, appears to have contained or eliminated jihadi
groups in Southeast Asia.
Many of these groups seek to use adherents in Europe and the United States for
manpower and funding. A Florida teenager was a suicide bomber in Syria and Al Shabaab has in the past
drawn upon the Somali population in the United States. Hamas and Hezbollah have achieved quasi-statehood status, and
Hamas has supporters in the United States. Iran, which supports the two groups, has advanced capabilities to launch
attacks and routinely attacked U.S. forces in Iraq. The United Kingdom faces problems from several hundred potential
terrorists within its large Pakistani population, and there are potential attackers in other Western European nations,
including Germany, Spain, and the Scandinavian countries. France, with its large Muslim population faces the most
serious challenge and is experiencing a wave of troubling anti-Semitic attacks that suggest both popular support for
extremism and a decline in control by security forces.
The chief difference between now and the situation before 9/11 is that all of these countries have put in place much more
robust surveillance systems, nationally and in cooperation with others, including the United States, to detect and prevent
potential attacks. Another difference is that the failure of U.S. efforts in Iraq and Afghanistan and the opportunities
created by the Arab Spring have opened a new front for jihadi groups that makes their primary focus regional. Western
targets still remain of interest, but are more likely to face attacks from domestic
good data on the number of planned attacks that did not come to
fruition. This includes not just attacks that were detected and
stopped, but also attacks where the jihadis were discouraged
and did not initiate an operation or press an attack to its
conclusion because of operational difficulties. These attacks are
the threat that mass surveillance was created to prevent. The
needed reduction in public anti-terror measures without increasing the
chances of successful attack is contingent upon maintaining the
capability provided by communications surveillance to detect, predict, and prevent
attacks. Our opponents have not given up; neither should we.
two mujahidin taking down a dozen casualties if it originates from the Caliphate. Theyll
be looking to do something big, something that would make any past operation look like
a squirrel shoot, and the more groups that pledge allegiance the more possible it
becomes to pull off something truly epic. Remember, all of this has happened in less than
a year. How more dangerous will be the lines of communication and supply a year on
from today? If the West completely failed to spot the emergence of the Islamic State and
then the allies who so quickly pledged allegiance to it from around the world, what else of
massive significance are they going to miss next?
ISIS has the ability to acquire a nuclear weapon and explosivesal
Qaeda proves
Fox News, 7-16-2015, "ISIS Magazine: Terror Army Could Buy Nuclear Weapon From
Pakistan," Fox News Insider, http://insider.foxnews.com/2015/05/26/isis-magazineterror-army-could-buy-nuclear-weapon-pakistancxc
An article in the official magazine of ISIS claims that the terror army has the financial
wherewithal to purchase a nuclear weapon, possibly from corrupt officials in Pakistan.
The article in Dabiq was written last week under the name of British photojournalist
John Cantlie, who's been held by ISIS for the last two years. If a nuclear weapon cannot
be obtained, the article suggests ISIS look into procuring a few thousand tons of
ammonium nitrate explosives. Meantime, new photos show the terror army's rapidly
growing arsenal of guns, ammo and explosives, seized when Iraqi forces fled Ramadi.
Brian Kilmeade discussed these troubling developments with Lt. Col. Tony Shaffer,
senior fellow at the London Center for Policy Research. Shaffer said the nuclear threat
from ISIS is "very real," adding that al Qaeda went down this path years ago. Shaffer said
al Qaeda was only one-tenth as smart as ISIS and about one one-hundredth as well
financed. He argued that if Iran obtains a nuclear weapon, it's going to cause
proliferation throughout the Middle East, increasing the chance that ISIS can get a
nuclear device. "They're available. Last time I checked on the black market, these things
run about 400 million dollars per warhead. So, ya know, it's there," said Shaffer.
ISIS is on track to gaining nuclear capabilitiesUS recruits and
financial resources increase probability of a nuclear attack or a dirty
bomb
Joseph Cirincione, 9-30-2014, "ISIS will get nukes if allowed to consolidate: expert,"
NY Daily News, http://www.nydailynews.com/news/world/isis-nukes-allowedconsolidate-expert-article-1.1958855
The risk of a terrorist attack using nuclear or chemical weapons has just gone up. ISIS is
willing to kill large numbers of innocents, and it has added three capabilities that
catapult the threat beyond anything seen before: control of large, urban territories, huge
amounts of cash, and a global network of recruits. British Home Secretary Theresa May
warned that if ISIS consolidates its control over the land it occupies, We will see the
worlds first truly terrorist state with the space to plot attacks against us. Its seizure of
banks and oil fields gave it more than $2 billion in assets. If ISIS could make the right
connection to corrupt officials in Russia or Pakistan, the group might be able to buy
enough highly enriched uranium (about 50 pounds) and the technical help to build a
crude nuclear device. Militants recruited from Europe or America could help smuggle it
into their home nations. Or ISIS could try to build a dirty bomb, conventional
explosives like dynamite laced with highly radioactive materials. The blast would not kill
many directly, but it would force the evacuation of tens of square blocks contaminated
with radioactive particles. The terror and economic consequences of a bomb detonated
in the financial districts of London or New York would be enormous. ISIS could also try
to get chemical weapons, such as deadly nerve gases or mustard gas. Fortunately, the
most likely source of these terror weapons was just eliminated.
Terrorist organizations have nuclear capabilitiesISIS has access to
nuclear materials and are planning an attack
Lora Moftah, 6-30-2014, "Does ISIS Have A Nuclear Weapon? Islamic State
Supporter Claims Militants Have Dirty Bomb," International Business Times,
http://www.ibtimes.com/does-isis-have-nuclear-weapon-islamic-state-supporterclaims-militants-have-dirty-1731890
Islamic State group has reportedly developed a nuclear weapon made from radioactive
material stolen from an Iraqi university, according to a militant who claims insider
knowledge. Hamayun Tariq, a British ISIS member now based in Syria, claimed on social
media that the group obtained the uranium from Mosul University and now possesses a
dirty bomb that it is now considering detonating in a public area. If true, this would
confirm fears voiced by Iraqs United Nations ambassador back in July following the
seizure of 40 kilograms of uranium compounds from Mosul University. In a letter to
U.N. Secretary-General Ban Ki-moon dated July 8, ambassador Mohamed Ali Alhakim
warned that these materials can be used in manufacturing weapons of mass
destruction, according to Reuters. "These nuclear materials, despite the limited
amounts mentioned, can enable terrorist groups, with the availability of the required
expertise, to use it separate or in combination with other materials in its terrorist acts,"
said Alhakim.
***Neg Links***
The U.S. governments sweeping surveillance programs have disrupted more than 50
terrorist plots in the United States and abroad, including a plan to bomb the New York
Stock Exchange, senior government officials testified Tuesday. The officials, appearing before a largely friendly
House committee, defended the collection of telephone and Internet data by the National
Security Agency as central to protecting the United States and its allies against terrorist
attacks. And they said that recent disclosures about the surveillance operations have caused serious damage. We
are now faced with a situation that, because this information has been made public , we run
the risk of losing these collection capabilities, said Robert S. Litt, general counsel of the Office of the Director of National
Intelligence. Were not going to know for many months whether these leaks in fact have caused us to lose these
capabilities, but if they do have that effect, there is no doubt that they will cause our national
security to be affected. The hearing before the House Intelligence Committee was the third congressional session
examining the leaks of classified material about two top-secret surveillance programs by Edward Snowden, 29, a former
NSA contractor and onetime CIA employee. Articles based on the material in The Washington Post and Britains Guardian
newspaper have raised concerns about intrusions on civil liberties and forced the Obama administration to mount an
aggressive defense of the effectiveness and privacy protections of the operations. Gen. Keith B. Alexander, the head of
the NSA, told the committee that the programs had helped prevent potential terrorist
events over 50 times since 9/11. He said at least 10 of the disrupted plots involved terrorism suspects or
targets in the United States. Alexander said officials do not plan to release additional information publicly, to avoid
revealing sources and methods of operation, but he said the House and Senate intelligence committees will receive
classified details of the thwarted plots. Newly revealed plots In testimony last week, Alexander said the
surveillance programs had helped prevent an attack on the subway system in New York
City and the bombing of a Danish newspaper. Sean Joyce, deputy director of the FBI, described
two additional plots Tuesday that he said were stopped through the surveillance a plan
by a Kansas City, Mo., man to bomb the New York Stock Exchange and efforts by a San
Diego man to send money to terrorists in Somalia. The officials said repeatedly that the operations
were authorized by Congress and subject to oversight through internal mechanisms and the Foreign Intelligence
Surveillance Court, whose proceedings are secret. Alexander said that more than 90 percent of the information on the
foiled plots came from a program targeting the communications of foreigners, known as PRISM. The program was
authorized under Section 702 of a 2008 law that amended the Foreign Intelligence Surveillance Act
(FISA). The law authorizes the NSA to collect e-mails and other Internet communications
to and from foreign targets overseas who are thought to be involved in terrorism or
nuclear proliferation or who might provide critical foreign intelligence. No American in the
country or abroad can be targeted without a warrant, and no person inside the United States can be targeted without a
warrant. A second program collects all call records from U.S. phone companies. It is authorized under Section 215 of the
USA Patriot Act. The records do not include the content of calls, location data, or a subscribers name or address. That law,
passed in 2001 and renewed twice since then, also amended FISA. Snowden, a high school dropout who worked at an NSA
operations center in Hawaii for 15 months as a contractor, released highly classified information on both programs,
claiming they represent government overreach. He has been in hiding since publicly acknowledging on June 9 that he
leaked the material. Several lawmakers pressed for answers on how Snowden, a low-level systems administrator, could
have had access to highly classified material such as a court order for phone records. We need to seal this crack in the
system, said Rep. C.A. Dutch Ruppersberger (Md.), the ranking Democrat on the intelligence panel. Alexander said he is
working with intelligence officials to come up with a two-person rule to ensure that the agency can block unauthorized
people from removing information from the system. But Alexander and the other witnesses focused more heavily on
justifying the programs and arguing that they operate under legal guidelines. As Americans, we value our privacy and our
civil liberties, Alexander said. As Americans, we also value our security and our safety. In the 12 years since the
attacks on September 11th, we have lived in relative safety and security as a nation. That
security is a direct result of the intelligence communitys quiet efforts to better connect
the dots and learn from the mistakes that permitted those attacks to occur on 9/11.
declared that the NSAs surveillance programs have provided critical leads
to help prevent over 50 potential terrorist events. FBI Deputy Director Sean Boyce
elaborated by describing four instances when the NSAs surveillance programs have had
an impact: (1) when an intercepted email from a terrorist in Pakistan led to foiling a plan
to bomb of the New York subway system; (2) when NSAs programs helped prevent a
plot to bomb the New York Stock Exchange; (3) when intelligence led to the arrest of a
U.S. citizen who planned to bomb the Danish Newspaper office that published cartoon
depictions of the Prophet Muhammad; and (4) when the NSAs programs triggered
reopening the 9/11 investigation. So what are the practical applications of internet and phone records
gathered from two NSA programs? And how can metadata actually prevent terrorist attacks? Metadata does not give the
NSA and intelligence community access to the content of internet and phone communications. Instead, metadata is
more like the transactional information cell phone customers would normally see on
their billing statementsmetadata can indicate when a call, email, or online chat began and how long the
communication lasted. Section 215 of the Patriot Act provides the legal authority to obtain business records from phone
companies. Meanwhile, the NSA uses Section 702 of the Foreign Intelligence Surveillance Act to
authorize its PRISM program. According the figures provided by Gen. Alexander, intelligence gathered
based on Section 702 authority contributed in over 90% of the 50 cases . One of major benefits
of metadata is that it provides hindsightit gives intelligence analysts a retrospective view of a
sequence of events. As Deputy Director Boyce discussed, the ability to analyze previous
communications allowed the FBI to reopen the 9/11 investigation and determine who was linked to that attack. It
is important to recognize that terrorist attacks are not orchestrated overnight; they take
months or years to plan. Therefore, if the intelligence community only catches wind of an
attack halfway into the terrorists planning cycle , or even after a terrorist attack has taken place,
metadata might be the only source of information that captures the sequence of events
leading up to an attack. Once a terrorist suspect has been identified or once an attack has taken place, intelligence analysts
can use powerful software to sift through metadata to determine which numbers, IP addresses, or individuals are
associated with the suspect. Moreover, phone numbers and IP addresses sometimes serve as a
proxy for the general location of where the planning has taken place. This ability to
narrow down the location of terrorists can help determine whether the intelligence
community is dealing with a domestic or international threat. Even more useful than hindsight is a crystal
ball that gives the intelligence community a look into the future. Simply knowing how many individuals are in a chat
room, how many individuals have contacted a particular phone user, or how many individuals are on an email chain could
serve as an indicator of how many terrorists are involved in a plot. Furthermore, knowing when a suspect communicates
can help identify his patterns of behavior. For instance, metadata can help establish whether a suspect
communicates sporadically or on a set pattern (e.g., making a call every Saturday at 2 p.m.). Any
deviation from that pattern could indicate that the plan changed at a certain point ; any
phone number or email address used consistently and then not at all could indicate that a suspect has stopped
communicating with an associate. Additionally, a rapid increase in communication could indicate that an attack is about
to happen. Metadata can provide all of this information without ever exposing the content
of a phone call or email. If the metadata reveals the suspect is engaged in terrorist
activities, then obtaining a warrant would allow intelligence officials to actually monitor
the content of the suspects communication. In Gen. Alexanders words, These programs have protected
our country and allies . . . [t]hese programs have been approved by the administration, Congress, and the courts. Now,
Americans will have to decide whether they agree.
United States. So far that hasn't happened. We haven't escaped entirely unscathed (see
Boston Marathon, bombing of), but on the whole we have been a lot safer than most security
experts, including me, expected. In light of the current controversy over the National Security Agency's monitoring
of telephone calls and emails, it is worthwhile to ask: Why is that? It is certainly not due to any change of heart among our
enemies. Radical Islamists still want to kill American infidels. But the vast majority of the
time, they fail. The Heritage Foundation estimated last year that 50 terrorist attacks on the American
homeland had been foiled since 2001. Some, admittedly, failed through sheer incompetence on the part of
the would-be terrorists. For instance, Faisal Shahzad, a Pakistani American jihadist, planted a car bomb in Times Square
in 2010 that started smoking before exploding, thereby alerting two New Yorkers who in turn called police, who were able
to defuse it. But it would be naive to adduce all of our security success to pure serendipity. Surely more attacks
activities raise the specter of Big Brother snooping on ordinary American citizens who
might be cheating on their spouses or bad-mouthing the president. In fact, there are considerable safeguards
built into both programs to ensure that doesn't happen. The phone-monitoring program does not
allow the NSA to listen in on conversations without a court order. All that it can do is to collect information on the time,
date and destination of phone calls. It should go without saying that it would be pretty useful to
know if someone in the U.S. is calling a number in Pakistan or Yemen that is used by a
terrorist organizer. As for the Internet-monitoring program, reportedly known as
PRISM, it is apparently limited to "non-U.S. persons" who are abroad and thereby enjoy no constitutional
protections. These are hardly rogue operations. Both programs were initiated by President George W. Bush
and continued by President Obama with the full knowledge and support of Congress and continuing oversight from the
federal judiciary. That's why the leaders of both the House and Senate intelligence committees, Republicans and
Democrats alike, have come to the defense of these activities. It's possible that, like all government programs, these could
be abused see, for example, the IRS making life tough on tea partiers. But there is no evidence of abuse so
far and plenty of evidence in the lack of successful terrorist attacks that these
programs have been effective in disrupting terrorist plots. Granted there is something
inherently creepy about Uncle Sam scooping up so much information about us. But Google, Facebook, Amazon, Twitter,
Citibank and other companies know at least as much about us, because they use very similar data-mining programs to
track our online movements. They gather that information in order to sell us products, and no one seems to be overly
alarmed. The NSA is gathering that information to keep us safe from terrorist attackers. Yet somehow its actions have
become a "scandal," to use a term now loosely being tossed around. The real scandal here is that the Guardian and
Washington Post are compromising our national security by telling our enemies about our intelligence-gathering
capabilities. Their news stories reveal, for example, that only nine Internet companies share information with the NSA.
This is a virtual invitation to terrorists to use other Internet outlets for searches, email,
apps and all the rest. No intelligence effort can ever keep us 100% safe, but to stop or
scale back the NSA's special intelligence efforts would amount to unilateral disarmament
in a war against terrorism that is far from over.
According to NSA, section 702 is the most significant tool in NSA collection arsenal for
the detection, identification, and disruption of terrorist threats to the US and around the
world. To cite just one example, collection under section 702 was critical to the discovery and
disruption of a planned bomb attack in 2009 against the New York City subway system
and led to the arrest and conviction of Najibullah Zazi and several of his co-conspirators.
According to the Department of Justice and the Office of the Director of National Intelligence in a 2012 report to
Congress: Section 702 enables the Government to collect information effectively and
efficiently about foreign targets overseas and in a manner that protects the privacy and
civil liberties of Americans. Through rigorous oversight, the Government is able to
evaluate whether changes are needed to the procedures or guidelines, and what other steps
may be appropriate to safeguard the privacy of personal information . In addition, the Department of
Justice provides the joint assessments and other reports to the FISC. The FISC has been actively involved in the review of
section 702 collection. Together, all of these mechanisms ensure thorough and continuous oversight of section 702
activities. . . . Section 702 is vital to keeping the nation safe. It provides information about
the plans and identities of terrorists allowing us to glimpse inside terrorist organizations
and obtain information about how those groups function and receive support. In addition, it
lets us collect information about the intentions and capabilities of weapons proliferators
and other foreign adversaries who threaten the United States. In reauthorizing section 702 for an
additional five years in 2012, the Senate Select Committee on Intelligence concluded: [T]he
authorities provided [under section 702] have greatly increased the governments ability
to collect information and act quickly against important foreign intelligence targets. The
Committee has also found that [section 702] has been implemented with attention to protecting the privacy and civil
liberties of US persons, and has been the subject of extensive oversight by the Executive branch, the FISC, as well as the
Congress. . . . [The] failure to reauthorize [section 702] would result in a loss of significant
intelligence and impede the ability of the Intelligence Community to respond quickly to
new threats and intelligence opportunities.147Our own review is not inconsistent with this assessment.
During the course of our analysis, NSA shared with the Review Group the details of 54 counterterrorism
investigations since 2007 that resulted in the prevention of terrorist attacks in diverse
nations and the United States. In all but one of these cases, information obtained under
section 702 contributed in some degree to the success of the investigation. Although it is difficult to
assess precisely how many of these investigations would have turned out differently without the information learned
through section 702, we are persuaded that section 702 does in fact play an important role in the
people based on metadata. He then added, But thats not what we do with this metadata, referring to
Section 215.
Soon after Snowdens revelations, Alexander said that the N.S.A.s
288 primary telephone numbers and through call chaining analysis reviewed 6,000
other numbers connected to these primary numbers. The 288 people had some
connection to terrorism and NSA looked at the 6,000 people with whom they talked to
see if they were also involved. Metadata acquired and retained under Section 215 of the
Patriot Act program could only be queried when there is reasonable articulable
suspicion that a telephone number is associated with foreign terrorist organizations. If a
query merits further investigation, which requires looking at either content of the
individual unmaking the call, this requires a specific, individual court order based on
probable cause. If there is one constitutional requirement that was not fully observed in
the metadata program authorized under the Patriot Act, it was that search requires a
warrant from a court rather than an internal approval by the executive branch agency
itself.11 This was a significant error. The 215 program allows law enforcement
and intelligence officials to determine if a terrorist event is an isolated
incident or the first of a serious of attacks, and whether the attacker is a
lone wolf or connected to a larger terrorist organization. The most
important decision in the immediate aftermath of an attack is whether the
incident is the first of a series. If it is the first of a series of attacks, additional
steps must be taken without delay, such as closing airports and other
transportation hubs, putting police forces around the country on high alert, and
mobilizing law enforcement agencies to locate and arrest the other attackers. These
steps are both disruptive and expensive and knowing that they are not
necessary provides immediate benefit.
Borders Links
Border surveillance is k2 preventing terrorism
Smarick et al. 12 ,( Kathleen Smarick and Gary D. LaFree of the National Consortium
for the Study of Terrorism and Responses to Terrorism at the University of Maryland.
11/12 Border Crossings and Terrorist Attacks in the United States: Lessons for
Protecting against Dangerous Entrants START,
http://www.start.umd.edu/sites/default/files/files/publications/START_BorderCrossin
gsTerroristAttacks.pdf CCC)
An essential step in this project was determining the frequency and dynamics of
border crossings by individuals who conducted or who wanted to conduct
terrorism-related activities in the United States . Towards that goal, the project
built upon the existing holdings of the American Terrorism Study (ATS) in this effort.
The ATS, housed at the University of Arkansas, catalogs and systematically codes
information on more than 300 Federal court cases involving Federal terrorist
charges since 1980 and, following a review of other possible resources,
proved to be the most useful starting point for compiling open-source,
quantitative data on terrorist border crossings. Since 1989, the American
Terrorism Study (ATS) has received lists of court cases and associated indictees that
resulted from an official FBI terrorism investigation spanning 1980 through 2004.
Housed at the University of Arkansas Terrorism Research Center in Fulbright College
(TRC), the ATS now includes almost 400 cases from the FBI lists. Of these,
approximately 75% of cases have complete court documentation, and almost all of those
collected have been coded into the ATS database, while the ATS team continues to track
new cases by collecting, reviewing, and coding new and additional court documentation.
The ATS includes terrorism incidents and attacks, thwarted or planned
terrorism incidents sometimes referred to as preventions, material support
cases for terrorism, general terrorism conspiracies, and in some cases,
immigration fraud; the common denominator among all ATS events is that the FBI
investigated these events as terrorism-related incidents. During preliminary research for
this project, court records from 378 terrorism cases found in the ATS dataset were
reviewed for information on potential border crossing events related to terrorism cases.
The documents for each court case were manually reviewed by researchers to determine
whether the collected records reported that one of the defendants or accomplices in a
case crossed a U.S. border at some point. Thirty-eight percent of the reviewed cases145
casesfrom 1980 through 2004 were found to either have: direct mention of a
border crossing in the court documents, or a link to a terrorism incident
that involved a known border crossing, either before or after an incident.
After compiling this list of court cases for inclusion, each identified court case was
then linked to a criminal incident involving terrorism charges. Initial
reviews revealed a connection to a border-crossing event in a total of 58
successful terrorist attacks, 51 prevented or thwarted attacks, 26 material
support cases, 33 immigration fraud incidents, and 4 general terrorism
conspiracies . Additional reviews of relevant information on indictees and their
project as involving individuals who were indicted by the U.S. government in terrorismrelated cases, the majority (129 crossings) involved an individual attempting to enter the
United States, while the remainder (92 crossings) involved an individual attempting to
exit the United States. Eighty-seven percent of the attempted border crossings were
successful, rather than being thwarted by law enforcement or foiled by some other events
or developments. Additional discussion on the nature of successful crossings versus
those who were apprehended at the border is presented below. Among those
attempts to enter the United States, the most frequent origin for these
crossing efforts was Canada.4 But, as Figure 2 illustrates, such attempted
entries originated from all corners of the world.
US Border Patrol proves that surveillance is key to anti-terror efforts
Stamey 14 (Barcley; DOMESTIC AERIAL SURVEILLANCE AND HOMELAND
SECURITY: SHOULD AMERICANS FEAR THE EYE IN THE SKY; March 2014)
The leading national agency currently using drones to combat a wide range of domestic
threats is U.S. Customs and Border Protection. With its fleet of seven MQ-1 Predators
and three MQ-1 GuardiansPredators modified for marine surveillanceCBP 26 is at
the forefront of large-scale drone operations. With an annual budget exceeding $11
billion, CBP is well equipped for protecting our national security while combating
potential terrorist threats.55 But how efficiently are those funds being used, and what is
meant by effectiveness? According to Merriam-Webster, effectiveness is producing a
decided, decisive, or desired effect or result.56 Ultimately, that desired result is safe
international borders. Accomplishing this result involves the apprehension of illegal
immigrants, interdiction of illicit drugs, and prevention of terrorist infiltration, which
CBP does quite well, but with respect to UAS, effectiveness must be viewed on a much
broader scale. This section takes into account the size of CBP, its operational budget, and
couples it with published results. According to CBP, the primary mission of drone use is
anti-terrorism by helping to identify and intercept potential terrorists and illegal crossborder activity.57 CBP uses its Predators and Reapers to accomplish this goal through
human detection and tracking, surface asset coordination, and threat detection through
IR sensors in multiple scenarios. Previously mentioned sensor suites allow the Predator
to detect movement along the border, identify actual personnel numbers, and track the
location of threats all while being unobserved to the individuals on the ground. With
their long loiter times, Predators allow officials to monitor gaps along the border while
maximizing the efforts of ground personnel in actual interdiction missions. After
witnessing the functionality of actual Predator operations in Afghanistan, this author
realizes the value in having high definition video sensors overhead during dangerous
operations. This type of technology certainly has a place in homeland security missions,
and future capabilities will provide a clear advantage to U.S. personnel in combating
border security. This force multiplier mindset is one CBP has adopted and publicizes
regularly to justify the success of its drone program. Long loiter times, remote area
access, and flexibility during National Special Security Events are common claims.
Unmanned Ariel Vehicles fill current surveillance gap on the border
Haddal 10 ( CC; Homeland Security: Unmanned Aerial Vehicles and Border
Surveillance CRS Report RS21698. Washington, DC: Library of Congress, Congressional
Research Service, July 8, 2010.)
One potential benefit of UAVs is that they could fill a gap in current border surveillance
by improving coverage along remote sections of the U.S. borders. Electro-Optical (EO)
sensors (cameras) can identify an object the size of a milk carton from an altitude of
60,000 feet.14 UAVs also can provide precise and real-time imagery to a ground control
operator, who would then disseminate that information so that informed decisions
regarding the deployment of border patrol agents can be made quickly. Additionally, the
Predator B used along the southern border can fly for more than 30 hours without
having to refuel, compared with a helicopters average flight time of just over 2 hours.
The ability of UAVs to loiter for prolonged periods of time has important operational
advantages over manned aircraft. The longer flight times of UAVs means that sustained
coverage over a previously exposed area may improve border security. The range of
UAVs is a significant asset when compared to border agents on patrol or stationary
surveillance equipment. If an illegal border entrant attempts to transit through dense
woods or mountainous terrain, UAVs would have a greater chance of tracking the
violator with thermal detection sensors than the stationary video equipment which is
often used on the borders. It is important to note, however, that rough terrain and dense
foliage can degrade the images produced by a UAVs sensory equipment and thus limit
their effectiveness at the borders. Nevertheless, the extended range and endurance of
UAVs may lessen the burdens on human resources at the Homeland Security:
Unmanned Aerial Vehicles and Border Surveillance Congressional Research Service 4
borders. Also, UAV accidents do not risk the lives of pilots, as do the helicopters that
currently patrol U.S. borders
according to DHS, develop and install new integrated technology solutions to provide
enhanced detection, tracking, response, and situational awareness capabilities. 19 The
other program under SBI is the SBI Tactical Infrastructure program, which, according to
DHS, develops and installs physical components designed to consistently slow, delay,
and be an obstacle to illegal cross-border activity.20 In the late 1990s, the Border Patrol
began deploying a network of Remote Video Surveillance (RVS) systems (i.e., camera systems),
underground sensors, and the Integrated Computer Assisted Detection (ICAD) database
into a multi-faceted network designed to detect illegal entries in a wide range of climate
conditions. This Integrated Surveillance Intelligence System (ISIS) attempted to ensure seamless coverage of the
border by combining the feeds from multiple color, thermal, and infrared cameras mounted on different structures into
one remote-controlled system with information generated by sensors (including seismic, magnetic, and thermal
detectors). When a sensor is tripped, an alarm is sent to a central communications control
room at a USBP station or sector headquarters. USBP personnel monitoring the control room screens use the ICAD
system to re-position RVS cameras towards the location where the sensor alarm was tripped (although some camera
positions are fixed and cannot be panned). Control room personnel then alert field agents to the
by constantly evolving threats that are both complex and varying, and the Border Patrol
must strategically apply intelligence to ensure that operations are focused and targeted
against the greatest threats. The Border Patrols ability to prevent and disrupt such
threats is enhanced through increased information sharing and operational integration, planning, and
execution with our domestic and foreign law enforcement partners. Integration with our federal, state,
local, tribal, and international partners intelligence and enforcement capabilities into the
planning and execution of CBP operations is critical to our ability to secure our nations
borders.
The use of necessary surveillance technology is key to the
identification and prevention of terrorist threats on the border
Office of Border Patrol, September 2004 (THE OFFICE OF BORDER PATROL AND
THE OFFICE OF POLICY AND PLANNING, US CUSTOMS & BORDER PROTECTION,
National Border Patrol Strategy
http://www.au.af.mil/au/awc/awcgate/dhs/national_bp_strategy.pdf, accessed 7/15/15
JH @ DDI)
The Border Patrol currently uses a mix of agents, information, and technology to control
the border. The Border Patrols ability to establish situational awareness, monitor,
detect, respond to, and identify potential terrorists, instruments of terrorism, and
criminals relies heavily on interdiction and deterrence-based technology. Having the
necessary technology to support the Border Patrol priority and traditional missions
cannot be overstated. In the future, there must be continued assessment, development,
and deployment of the appropriate mix of personnel, technology, and information to
gain, maintain, and expand coverage of the border and ensure that resources are
deployed in a cost-effective, efficient fashion. Technology which enhances operational
awareness and effectiveness includes camera systems for day/ night/infrared work, biometric
systems such as IDENT/IAFIS, processing systems like ENFORCE, sensoring platforms, large-scale
gamma X-rays, and aerial platforms, and other systems. Technologies requiring modernization include wireless
and tactical communications and computer processing capabilities. Coordination between Border Patrol and inspectional
personnel at the ports of entry ensures the most efficient use of trained personnel and technology. In the future, the
Border Patrol will take advantage of the targeting and selectivity tools made available in the Automated Commercial
Environment (ACE) and the National Targeting Center. The continued testing, evaluation, acquisition,
officers to the border has slowed the flow of drugs and undocumented immigrants, its costing the state
tens of millions of dollars. In a report to Texas elected officials, the state Department of Public Safety says
border
Another
undocumented immigrant arrested crossing the border was on
multiple U.S. terrorism watch lists, the report says. According to the report, one
member of al-Shabab, apprehended in June 2014, told authorities he had
been trained for an April 2014 suicide attack in Mogadishu. He said he
Itihaad al-Islamiya, another Somalia-based group once funded by Osama bin Laden.
escaped and reported the planned attack to African Union troops, who were able to stop the attack. The
FBI believed another undocumented immigrant was an al-Shabab member who helped smuggle several
potentially dangerous terrorists into the U.S. Authorities also apprehended immigrants who said they were
members of terrorist organizations in Sri Lanka and Bangladesh. The Department of Public Safety said the
report, first published by the Houston Chronicle, was not meant for public distribution. [T]hat report was
inappropriately obtained and [the Chronicle was] not authorized to possess or post the law enforcement
sensitive document, department press secretary Tom Vinger said in an e-mail. U.S. Customs and Border
all, immigrants from 35 countries in Asia and the Middle East have been arrested over the past few years
in the Rio Grande Valley. The department says there is no known intelligence that specifically links
undocumented immigrants to terrorism plots, but the authors warn its almost certain that foreign terrorist
It is important to note
that an unsecure border is a vulnerability that can be exploited by
criminals of all kinds, Vinger said. And it would be naive to rule
out the possibility that any criminal organizations around the world,
including terrorists, would not look for opportunities to take
advantage of security gaps along our countrys international
border.
organizations know of the porous border between the U.S. and Mexico.
several high-level national objectives, but results depend sensitively on interactions with and the
performance of other federal and local agencies, as well as economic and demographic conditions outside of DHSs
control. Second, national-level effectiveness depends not just on individual
FBI. The word effectively is key because all agencies are deluged with data. The 9/11 Commissions report dramatized
the consequences of ineffectiveness: It is not that information for apprehending the perpetrators did not exist, but rather
that the dots were not connected and the relevant agencies did not cooperate well (National Commission on Terrorist
Attacks upon the United States, 2004). Third, national-level law enforcement also depends on the effectiveness of the
justice system, including the ability to convict and punish. That, in turn, often depends on authorities being able to
construct an extensive, fact-based story of criminal behavior from which, cumulatively, guilt can reasonably be inferred by
a jury. Fourth, the nature and quality of information collected by border-security
components, the consistency with which it is collected , and the effectiveness with which
the data are both transferred to national databases andwhere appropriatehighlighted in cross-agency actions, are
leverage points for improved national-level effectiveness, especially in relation to terrorism- or drug-related functions.
Border-security eff orts sometimes will query detected travelers against data sets of known or suspected terrorists or
criminals. This is especially relevant at ports of entry, ports of egress in some modes, and in cases in which border
enforcement detains an illegal crosser. In other settings, border-enforcement agencies collect as
but for whom no prior records exist. The same is true in the maritime regions when individuals are
arrested for illegal drug smuggling or illegal migrant smuggling. The collected information can
become future tactical intelligence (and used in prosecutions) if the detained person
becomes involved in criminal or terrorist functions at a later date. Discussions
with component agencies indicate that this is an important capability to measure. Technologically , it is even
possible to tag individuals so that subsequent surveillance within the United
States (or another country) is possible.12
Drones Links
Domestic drones k2 solve for terrorism
Bauer 13 (Max Bauer, of ACLU of Massachusetts 9-11-2013, "Domestic Drone
Surveillance Usage: Threats and Opportunities for Regulation,"
https://privacysos.org/domestic_drones CCC)
Unmanned aerial vehicles, commonly known as drones, are an emerging and rapidlyexpanding development in domestic surveillance technology. [4] On Valentines Day
2012, President Barack Obama signed the FAA Modernization and Reform Act of 2012,
legislation authorizing the Federal Aviation Administration (FAA) to develop regulations
to facilitate the growing usage of drones in domestic airspace. [5] Drones are best known
for their use in military operations [6] including the use of weaponized drones for
targeted killing. But drones have been used for domestic surveillance purposes for years
[7] and their usage is expected to grow exponentially. [8] The FAA has issued 1,428
drone operator permits since 2007 (as of mid-February) and predicts there will be
10,000 drones deployed within the next five years. [9] A public information request by
the Electronic Frontier Foundation showed that numerous universities and law
enforcement agencies have been approved to use drones by the FAA. [10] Of course, the
widespread use of drones for domestic surveillance raises serious privacy concerns. [11]
Drones can be outfitted with high definition [12] and infrared cameras, [13] and even
license plate readers. [14] Drones present unique threats to privacy, in the words of one
privacy advocate. [15] Why? They are smaller potentially insect-sized, [16] can fly
longer perhaps soon in perpetuity, [17] and are not bound by the historical, practical
check on law enforcement excesses we've had as a result of limited police resources. [18]
In a seminal 1890 law review article aptly-titled The Right to Privacy, future Supreme
Court Justice Louis Brandeis recognized that instantaneous photographs have
invaded the secret precincts of private and domestic lifeOf the desirability indeed of
the necessity of some such protection there can, it is believed, be no doubt. [19]
Brandeis and his co-author Samuel Warren were ahead of their time when they wrote
that article but even they couldnt foresee anything like the domestic surveillance
schemes that have arisen over a century later. Drones Used in Massachusetts and
Response to Boston Marathon Bombings. Late in 2012, the Boston Globe reported that a
SWAT team in Massachusetts had filed an application with the FAA for a drone. [20] As
of April 2013, there were no police drones yet in Massachusetts but Waltham-based
defense contractor Raytheon was flying many of them in testing capacities. [21]
Surveillance and war contracting companies hope to expand their market from military
to domestic law enforcement. [22] Following the explosion of two bombs at the 2013
Boston Marathon, parts of the city shut down as the search for a suspect continued,
prompting Ron Paul to write: This unprecedented move should frighten us as much or
more than the attack itself. [23] Boston Police Commissioner Ed Davis told the
public shortly afterward that he seeks more surveillance cameras (there
are already hundreds) in downtown Boston. [24] And further, he said, he
wants to have drone surveillance for next years marathon. [25]
Drones K2 stop terrorism (foreign)
Byman, 13 (Daniel L. Byman, Director of research at Center for Middle East Policy,
8/2013, http://www.brookings.edu/research/articles/2013/06/17-drones-obamaweapon-choice-us-counterterrorism-byman CCC)
The Obama administration relies on drones for one simple reason: they work. According
to data compiled by the New America Foundation, since Obama has been in the White
House, U.S. drones have killed an estimated 3,300 al Qaeda, Taliban, and other jihadist
operatives in Pakistan and Yemen. That number includes over 50 senior leaders of al
Qaeda and the Talibantop figures who are not easily replaced. In 2010, Osama bin
Laden warned his chief aide, Atiyah Abd al-Rahman, who was later killed by a drone
strike in the Waziristan region of Pakistan in 2011, that when experienced leaders are
eliminated, the result is the rise of lower leaders who are not as experienced as the
former leaders and who are prone to errors and miscalculations. And drones also hurt
terrorist organizations when they eliminate operatives who are lower down on the food
chain but who boast special skills: passport forgers, bomb makers, recruiters, and
fundraisers. Drones have also undercut terrorists ability to communicate and to train
new recruits. In order to avoid attracting drones, al Qaeda and Taliban operatives try to
avoid using electronic devices or gathering in large numbers. A tip sheet found among
jihadists in Mali advised militants to maintain complete silence of all wireless contacts
and avoid gathering in open areas. Leaders, however, cannot give orders when they are
incommunicado, and training on a large scale is nearly impossible when a drone strike
could wipe out an entire group of new recruits. Drones have turned al Qaedas command
and training structures into a liability, forcing the group to choose between having no
leaders and risking dead leaders
Drones take out terrorist leaders (foreign)
Al-Haj, 15 (Ahmed Al-Haj, writer for the Stars & Stripes and AP the big story,
7/10/2015, http://www.stripes.com/news/middle-east/us-drone-strike-kills-4-al-qaidafighters-in-yemen-1.357473 CCC)
Yemeni security and military officials say a suspected U.S. drone strike killed four alQaida members travelling by car in the coastal city of Mukalla. The officials say the
airstrike took place on Friday night in Mukalla, the capital of Yemen's sprawling eastern
Hadramawt province. The explosion was heard in some parts of the city. Al-Qaida's
Yemen branch, considered to be the most dangerous offshoot of the terror network, has
made gains in the province and captured Mukalla earlier this year. The officials say at
least five other militants were wounded in the airstrike. The officials spoke on condition
of anonymity because they are not authorized to talk to reporters. Al-Qaida has profited
from the turmoil that has engulfed Yemen, and U.S. drones have continued to target top
al-Qaida leaders there.
Prisons Links
Current prisons k2 stopping terrorism
Kaplan 09 (Fred Kaplan 9, 5-29-2009, "There are already 355 terrorists in American
prisons.," Slate Magazine,
http://www.slate.com/articles/news_and_politics/war_stories/2009/05/there_are_alr
eady_355_terrorists_in_american_prisons.html CCC)
President Obama's remark that some Guantanamo detainees might be transferred to
American prisons has prompted an extraordinary, and intellectually feeble, storm of
protest. Former Vice President Dick Cheney kicked off the campaign when he said,
during his May 21 speech at the American Enterprise Institute, that "to bring the worst
terrorists inside the United States would be a cause for great danger and regret in the
years to come." Sitting lawmakersespecially those from states such as Kansas and
Colorado where federal prisons are basedraised the same specter and shouted the
ancient cry of principled rebellion: "Not In My Back Yard!" It makes one wonder: Do any
of these legislators know who's in their backyards already, with no apparent detriment to
their constituents' daily lives, much less the nation's security? According to data
provided by Traci L. Billingsley, spokeswoman for the U.S. Bureau of
Prisons, federal facilities on American soil currently house 216
international terrorists and 139 domestic terrorists . Some of these
miscreants have been locked up here since the early 1990s. None of them
has escaped. At the most secure prisons, nobody has ever escaped, period .
As recited in Congress and on cable-news talk shows, the fears of moving Gitmo
prisoners here seem to be these: that the terrorist prisoners might escape (statistics to
the contrary be damned), that they might convert their fellow inmates with jihadist
propaganda, that other members of al-Qaida might infiltrate the surrounding
communities (to do whatspring them?), or that their presence might sow panic in those
communities. Maybe these people don't understand what life is like in these "supermax"
prisons. Take ADX Florence, the supermax in Colorado"the Alcatraz of the Rockies"
that serves as the home to Omar Abdel-Rahman, the "blind sheikh" who organized the
1993 World Trade Center bombing; Zacarias Moussaoui, one of the Sept. 11 plotters;
Richard Reid, the shoe-bomber; Theodore Kaczynski, the "Unabomber"; and Terry
Nichols, who helped plan the Oklahoma City bombing, to name a few. These are all truly
dangerous people, but it's not as if they run into one another in the lunch line or the
yard. There is no lunch line; there is no yard. Most of the prisoners are kept in solitary
confinement for 23 hours a day. For one hour, they're taken to another concrete room,
indoors, to exercise, by themselves. Their only windows face the sky, so they have no way
of knowing even where they are within the prison. Phone calls to the outside world are
banned. Finally, the prison is crammed with cameras and motion detectors.
Compartments are separated by 1,400 remote-controlled steel doors; the place is
surrounded by 12-foot-high razor-wire fences; the area between the wire and the walls is
further secured by laser beams and attack dogs. The Bureau of Prisons operates similar
facilitiesalso full of terrorists and murderersin Terre Haute, Ind.; Marion, Ill.; and
elsewhere. And the Defense Department operates a few dozen military prisons scattered
around the country, some of which would be suitable for housing the exiles from
Guantanamo.
Bullrun Links
The Bullrun program is key to decrypting internet communications
and data relevant to international terrorism
Larson, Perlroth, and Shane, 9/5/13 (Jeff, Data Editor at ProPublica; Nicole, The
New York Times; Scott, The New York Times; ProPublica, the organization that Snowden
gave his leaks, Revealed: The NSAs Secret Campaign to Crack, Undermine Internet
Security http://www.propublica.org/article/the-nsas-secret-campaign-to-crackundermine-internet-encryption, accessed 7/14/15)
Many users assume or have been assured by Internet companies that their data is safe from prying eyes, including
those of the government, and the N.S.A. wants to keep it that way. The agency treats its recent successes in
deciphering protected information as among its most closely guarded secrets , restricted
to those cleared for a highly classified program code-named Bullrun, according to the documents,
provided by Edward J. Snowden, the former N.S.A. contractor. Beginning in 2000, as encryption tools were gradually
blanketing the Web, the N.S.A. invested billions of dollars in a clandestine campaign to
preserve its ability to eavesdrop. Having lost a public battle in the 1990s to insert its own back door in all
encryption, it set out to accomplish the same goal by stealth. The agency, according to the documents and interviews with
industry officials, deployed custom-built, superfast computers to break codes, and began collaborating with technology
companies in the United States and abroad to build entry points into their products. The documents do not identify which
companies have participated. The N.S.A. hacked into target computers to snare messages before they were encrypted. And
the agency used its influence as the worlds most experienced code maker to covertly introduce weaknesses into the
encryption standards followed by hardware and software developers around the world. For the past decade , N.S.A.
has led an aggressive, multipronged effort to break widely used Internet encryption
technologies, said a 2010 memo describing a briefing about N.S.A. accomplishments for employees of its British
counterpart, Government Communications Headquarters, or GCHQ. Cryptanalytic capabilities are now coming online.
Vast amounts of encrypted Internet data which have up till now been discarded are now exploitable. When the British
analysts, who often work side by side with N.S.A. officers, were first told about the program, another memo said, those
not already briefed were gobsmacked! An intelligence budget document makes clear that the effort is still going strong.
We are investing in groundbreaking cryptanalytic capabilities to defeat adversarial cryptography and exploit Internet
traffic, the director of national intelligence, James R. Clapper Jr., wrote in his budget request for the current year. In
recent months, the documents disclosed by Mr. Snowden have described the N.S.A.s broad reach in scooping up vast
amounts of communications around the world. The encryption documents now show, in striking
detail, how the agency works to ensure that it is actually able to read the information it
collects. The agencys success in defeating many of the privacy protections offered by encryption does not change the
rules that prohibit the deliberate targeting of Americans e-mails or phone calls without a warrant. But it shows that the
agency, which was sharply rebuked by a federal judge in 2011 for violating the rules and misleading the Foreign
Intelligence Surveillance Court, cannot necessarily be restrained by privacy technology. N.S.A. rules permit the agency to
store any encrypted communication, domestic or foreign, for as long as the agency is trying to decrypt it or analyze its
technical features. The N.S.A., which has specialized in code-breaking since its creation in 1952, sees that task as essential
to its mission. If it cannot decipher the messages of terrorists, foreign spies and other
adversaries, the United States will be at serious risk, agency officials say. Just in recent weeks,
the Obama administration has called on the intelligence agencies for details of
communications by Qaeda leaders about a terrorist plot and of Syrian officials messages about
the chemical weapons attack outside Damascus. If such communications can be hidden by
unbreakable encryption, N.S.A. officials say, the agency cannot do its work.
PRISM links
The PRISM program is necessary to prevent terrorist attacks globally
empirics prove
Kelly, reporter for CNN, 8/1/13 (Heather, CNN, August 1, 2013, NSA chief: Snooping
is crucial to fighting terrorism http://www.cnn.com/2013/07/31/tech/web/nsaalexander-black-hat/, accessed 7/15/15 JH @ DDI)
The National Security Agency's controversial intelligence-gathering programs have prevented
54 terrorist attacks around the world, including 13 in the United States, according to
Gen. Keith Alexander, NSA director. Speaking before a capacity crowd of hackers and security experts Wednesday
at the Black Hat computer-security conference, Alexander defended the NSA's embattled programs,
which collect phone metadata and online communications in an effort to root out potential terrorists. The secret programs
have come under fire since their existence was revealed in June by former CIA contractor Edward Snowden, who leaked
details about them to several newspapers. "I promise you the truth -- what we know, what we're doing, and what I cannot
tell you because we don't want to jeopardize our future defense," Alexander told the audience, which included a few
hecklers who shouted profanities and accused him of lying. He then gave a partial recap, using PowerPoint slides, of how
the two intelligence programs work. Alexander said the NSA can collect metadata on phone calls in the United States,
including the date and time of the call, the numbers involved and the length of the conversations. He made a special point
of saying the NSA does not have access to the content of citizens' calls or text messages. Alexander said the NSA's
PRISM surveillance program, which probes digital activity such as e-mail, instant
messaging and Web searches, focuses on foreign actors and does not apply to people in the United
States. He said the phone and Internet data is necessary to "connect the dots" and identify potential
terrorists before they act. Alexander attempted to reassure the audience that NSA officials are not abusing access to the
databases to intrude on Americans' privacy. "The assumption is that people are out there just wheeling and dealing (users'
information), and nothing could be further from the truth," he said. "We have tremendous oversight and compliance in
these programs." Congress and courts make sure the programs operate within the bounds of the Foreign Intelligence
Surveillance Act, and internal auditing systems are in place to prevent any abuse by employees, Alexander said. He added
that only 35 analysts are authorized to run queries on the phone metadata.
President Obamas firm defense of the National Security Agencys domestic surveillance program on Friday should calm
some of the more extravagant fears provoked by public disclosure of its existence. I put the word domestic in quotes
because the effort to monitor Internet and other communications traffic isnt really about
listening in on Americans, or even foreign nationals living here, but rather intercepting suspicious
transmissions originating overseas that just happen to be passing through the United
States. That is an eminently sensible way of keeping up with terrorists, because it is so much
easier than tapping into network conduits in other countries or under the seas (not that we dont do that). In order to
grasp the logic of the NSA program, which is code-named PRISM, you have to understand how the Internet evolved. It was
a purely American innovation at its inception, with most of the infrastructure concentrated in a few places like Northern
Virginia. I live a few miles from where the Internets first big East Coast access point was located in the parking garage of
an office building near the intersection of Virginias Routes 7 and 123, an area that some people refer to as Internet Alley.
Because the Worldwide Web grew so haphazardly in its early days, it was common until recently for Internet traffic
between two European countries to pass through my neighborhood. There were only a few major nodes in the system, and
packet-switching sends messages through whatever pathway is available. The Washington Post story on PRISM today has
a graphic illustrating my point about how bandwidth tends to be allocated globally. Like a modern version of ancient
Romes Appian Way, all digital roads lead to America. It isnt hard to see why Director of National Intelligence James R.
Clapper could say on Thursday that information collected under this program is among the most
seldom compromised. President Obama stressed in his comments today that safeguards have been put in place to prevent
the scope of NSA surveillance from expanding beyond its original purpose.
FISA links
Prohibiting NSA data collection under FISA prevents extensive
analysis if data, k2 prevent terrorism
Bradbury 15 (
After 9/11, the Bush administration opted not to seek approval from the FISC before
intercepting "international communications into and out of the United States of persons
linked to al-Qaeda (PDF) or related terrorist organizations." The special secret court, set
up in 1978 following previous administrations' domestic spying abuses, was designed to
act as a neutral overseer in granting government agencies surveillance authorization.
After the NSA program was revealed by the New York Times in late 2005, former
attorney general Alberto R. Gonzales argued (PDF) that President Bush had the legal
authority under the constitution and congressional statute to conduct warrantless
surveillance on U.S. persons "reasonably believed to be linked to al-Qaeda." The 2001
Authorization for Use of Military Force (AUMF), without specifically mentioning
wiretapping, grants the president broad authority to use all necessary force "against
those nations, organizations, or persons he determines planned, authorized, committed,
or aided the [9/11] terrorist attacks." This includes, administration officials say, the
powers to secretly gather domestic intelligence on al-Qaeda and associated groups. The
Bush administration maintained that the Foreign Intelligence Surveillance Act (FISA)
was an outdated law-enforcement mechanism that was too time-consuming given the
highly fluid, modern threat environment. Administration officials portrayed the NSA
program as an "early warning system" (PDF) with "a military nature that requires speed
and agility." Moreover, the White House stressed that the program was one not of
domestic surveillance but of monitoring terrorists abroad, and publicly referred to the
operation as the "Terrorist Surveillance Program." Opponents of the program referred to
it as "domestic spying." Under congressional pressure, Gonzales announced in January
2007 plans to disband the warrantless surveillance program and cede oversight to FISC,
but questions about the legality of the program lingered in Congress and Gonzales
resigned months later. But Washington's vow to seek FISA approval for domestic
surveillance was short-lived. In July 2007--weeks before Gonzales stepped down-intelligence officials pressed lawmakers for emergency legislation to broaden their
wiretapping authority following a ruling by the court overseeing FISA that impacted the
government's ability to intercept foreign communications passing through
telecommunications "switches" on U.S. soil.
Backdoors Links
Without access to backdoors, law enforcement wont have the
capacity to collect intelligence data because of increasingly complex
encryption
AP 7/8 (Eric Tucker, FBI, JUSTICE DEPT. TAKE ENCRYPTION CONCERNS TO
CONGRESS Associated Press,
http://hosted.ap.org/dynamic/stories/U/US_FBI_ENCRYPTION?
SITE=AP&SECTION=HOME&TEMPLATE=DEFAULT&CTIME=201507-08-06-22-03)
WASHINGTON (AP) -- Federal law enforcement officials warned Wednesday that data
encryption is making it harder to hunt for pedophiles and terror suspects, telling
senators that consumers' right to privacy is not absolute and must be weighed against
public-safety interests. The testimony before the Senate Judiciary Committee marked
the latest front in a high-stakes dispute between the Obama administration and some of
the world's most influential tech companies, placing squarely before Congress an
ongoing discussion that shows no signs of an easy resolution. Senators, too, offered
divided opinions. FBI and Justice Department officials have repeatedly asserted that
encryption technology built into smartphones makes it harder for them to monitor and
intercept messages from criminal suspects, such as Islamic State sympathizers who
communicate online and child predators who conceal pornographic images. They say it's
critical that they be able to access encrypted communications during investigations, with
companies maintaining the key to unlock such data. But they face fierce opposition from
Silicon Valley companies who say encryption safeguards customers' privacy rights and
offers protections from hackers, corporate spies and other breaches. The companies in
recent months have written to the Obama administration and used public speeches to
argue for the value of strong encryption. FBI Director James Comey, who has pressed
his case repeatedly over the last year before think tanks and in other settings, sought
Wednesday to defuse some of the tension surrounding the dispute. He told senators that
he believed technology companies were fundamentally on the same page as law
enforcement, adding, "I am not here to fight a war." "Encryption is a great thing. It keeps
us all safe. It protects innovation," Comey said. "It protects my children. It protects my
health care. It is a great thing." But he warned that criminals were using encryption to
create a safe zone from law enforcement. He said that concern was especially acute at a
time when the Islamic State has been recruiting sympathizers through social media and
then directing them to encrypted platforms that federal agents cannot access. "Our job is
to look at a haystack the size of this country for needles that are increasingly invisible to
us because of end-to-end encryption," he said.
TSA Links
TSA is key to protect against dangerous weapons, explosives, and
innovate in security technologies.
John S. Pistole, 3-5-2012, "Counterterrorism, Risk-Based Security and TSAs Vision for
the Future of Aviation Security," Transportation Security Administration,
https://www.tsa.gov/press/speeches/counterterrorism-risk-based-security-and-tsa
%E2%80%99s-vision-future-aviation-security
Remember that before September 11, 2001, there was: No cohesive system in place to
check passenger names against terrorist watch lists in advance of flying; Only limited
technologies in place for uncovering a wide array of threats to passengers or aircraft; No
comprehensive federal requirements to screen checked or carry-on baggage; Minimal
in-flight security on most flights; and, From a coordination standpoint, before 9/11
there was a lack of timely intelligence-sharing, in both directions from the federal level
down to the individual airports, as well as from an individual airport up to the national
level. I came to TSA more than a year and a half ago, having worked the previous 26
years in a variety of positions within the FBI. That experience with a range of partners
inside the law enforcement and intelligence communities helped shape my approach to
solidifying TSAs place within the national counterterrorism continuum. Every day, we
strive to ensure our operational planning and decision making process is timely, efficient
and as coordinated as possible and critically, based on intelligence. We work to share
critical information with key industry stakeholders whenever appropriate, and we are
constantly communicating with our frontline officers through shift briefings held several
times a day. Thanks to the effective partnerships weve forged with industry
stakeholders, with our airline and airport partners, and with law enforcement colleagues
at every level, TSA has achieved a number of significant milestones during its first 10
years of service. These include matching 100 percent of all passengers flying into, out of,
and within the United States against government watch lists through the Secure Flight
program. It includes screening all air cargo transported on passenger planes
domestically and, as you know, we work closely with our international partners every day
to screen 100% of high-risk inbound cargo on passenger planes. Were also working hard
with these same partners to screen 100% of allinternational inbound cargo on passenger
planes by the end of this year. And it also includes improving aviation security through
innovative technology that provides advanced baggage screening for explosives. Since
their inception in 2005 through February 2012, we have also conducted more than
26,000 Visible Intermodal Prevention and Response or VIPR operations. We have 25
multi-modal VIPR teams working in transportation sectors across the country to prevent
or disrupt potential terrorist planning activities. Additionally, since 2006, TSA has
completed more than 190 Baseline Assessments for Security Enhancement for transit,
which provides a comprehensive assessment of security programs in critical transit
systems. We are seeing the benefits of how these important steps combined with our
multiple layers of security including cutting-edge technology keep America safe every
day. Since our standup in 2002, we have screened nearly six billion passengers. Our
front line officers have detected thousands of firearms and countless other prohibited
items and we have prevented those weapons from entering the cabin of an aircraft. In
fact, more than 10 years after 9/11, TSA officers still detect, on-average, between three
and four firearms every day in carry-on bags at security checkpoints around the country.
Deploying advanced, state-of-the-art technologies continue to factor significantly into
our multi-layered approach to transportation security. In particular, we continue to see
the efficacy of Advanced Imaging Technology, or AIT, machines at hundreds of
passenger security checkpoints around the United States. From February 2011 to June
2011, the Office of the Inspector General (OIG) assessed the manner in which TSA
inspects, maintains and operates backscatter units used in passenger screening. The OIG
found that TSA was in compliance with standards regarding radiation exposure limits
and safety requirements. As a result of intensive research, analysis, and testing, TSA
concludes that potential health risks from screening with backscatter X-ray security
systems are minuscule. While there is still no perfect technology, AIT gives our officers
the best opportunity to detect both metallic and non-metallic threats including
improvised explosive devices such as the device Umar Farouk Abdulmutallab attempted
to detonate on Christmas Day, 2009. As manufacturers continue enhancing the
detection capability and strengthening the privacy features of their machines, we
maintain the ability to upgrade the software used on them to stay ahead of the rapidly
shifting threat landscape. Maintaining a high level of adaptability enables us to keep an
important technological advantage. Throughout 2011, this and other technologies helped
our officers detect hundreds of prohibited, dangerous, or illegal items on passengers.
These good catches as we call them, illustrate how effective our people, process and
technology are at finding concealed metallic and non-metallic items concealed on a
passenger or in their bags. In an ongoing effort to help educate the traveling public, we
highlight many of these good catches every week in blog posts uploaded to TSA.gov. I
hope some of you have seen these. They have included incidents of items concealed in
shoes, to weapons hidden in a hollowed out book, to ceramic knives, to exotic snakes
strapped to a passengers leg. As strange as some of these tales may be, they are a stark
reminder that now more than 10 years after the September 11, 2001, attacks people
are still trying to bring deadly weapons onto aircraft. And our officers are detecting
numerous weapons every day and keeping them off of planes. Less than one month ago
in fact, over Presidents Day weekend in February, our officers detected 19 guns in carryon bags at various checkpoints around the country. In total, 1,306 guns were detected at
airport checkpoints in 2011.
whether the threat to American aviation had diminished since August, when the U.S.
launched a bombing campaign against ISIS in Syria and Iraq, and the Al Qaeda-led
"Khorasan" group. Khorasan contains long-time associates of Usama bin Laden,
including Sanafi al-Nasr and Muhsin al-Fadhli, as well as a handful of operatives trained
by the Yemeni bomb maker Ibrahim al-Asiri, who specializes in non-metallic bombs that
traditional airport screening can miss. "Without going into details about what that may
look like from a classified intelligence perspective, we do remain concerned that there is
active plotting going on," Pistole said. And with new information that the French bomb
maker David Drugeon likely survived a U.S. air strike last month, Pistole added, "there is
concern that there are still individuals out there who have not only the ability to do that,
but also the intent to use that on a flight to Europe or the US." The TSA administrator
also described classified procedures that track foreign fighters, based on their travel
history, before they check in at overseas airports for U.S.-bound flights. "There are
individuals we are concerned about and we are again looking at if they make travel
reservations, then they of course receive proper scrutiny," Pistole said. The continued
threat from groups like Khorasan explains why procedures, implemented in July,
requiring passengers to turn on their phone and computers at some airports, remain in
place. As the holiday travel season begins, TSA officials say they are not expecting big
changes at the checkpoints, but if there are changes, they will be driven by new and
specific intelligence. Pistole said the transition from a one-size-fits-all approach after
9/11 to a risk-based strategy -- driven by intelligence -- is one of the TSA workforce's
accomplishments. "I think that's been one of the biggest changes. ...We're more efficient.
Complaints are down. Wait times are down," he said. Data provided by the TSA showed
that over Thanksgiving, more than 12.5 million passengers were screened, a 1.3 percent
increase from 2013, with nearly 50 percent of these passengers getting expedited
screening. Nationwide, TSA said 99.6 percent of passengers waited in a line for less than
20 minutes. Pistole was in Australia days before the hostage situation unfolded in
Sydney last weekend, telling Fox it fit the profile of a classic lone wolf attack. "I am not
aware of any intelligence about it as of last week, there was no talk about something like
that," he said. But its not that kind of attack that keeps Pistole up at night. "My greater
concern, rather than just a lone wolf, is simultaneous attacks such as you saw on 9/11 ...
with that being said, we also have better insights into who the potential bombers are," he
said.
organizations, drug cartels and weapons traffickers; tracking nuclear proliferation; and
assessing the strength of nations such as Russia and China that are now part of the global economy. Treasury
personnel in Washington, D.C. and in Afghanistan, Pakistan and the Persian Gulf have worked with
intelligence and military colleagues to attack the finances of the Taliban, al-Qaida
and other terrorist groups. The department has provided expertise and actionable intelligence to
civilian and military leaders through threat finance cells for Afghanistan and Iraq, and worked elsewhere with the
U.S. Special Operations Command. How much the intelligence mission has changed is highlighted by the move this
month by David Cohen, the Treasury undersecretary for terrorism and financial intelligence to become deputy
director of the Central Intelligence Agency. Cohen, 51, whose Treasury responsibilities included sanctions policy,
replaces Avril Haines, a lawyer whos now President Obamas deputy national security adviser. Its the first time a
Treasury official has moved into such a senior CIA post. That has been noticed in the intelligence community,
where the Treasury has become a recognized power, and among the specialized legal and financial community
affected by the nations increasing use of economic coercion against adversaries. Financial
intelligence has come into its own as the U.S. increasingly turns to
sanctions, asset freezes and other financial actions to thwart
adversaries from al-Qaida operatives to Russian President Vladimir Putin. Its a tactic that Ian
Bremmer, the president of New York-based Eurasia Group, recently called the weaponization of finance. The U.S.
strategy is premised on the simple reality that all of our adversaries, to one degree or another, need money to
operate, and that by cutting off their financial lifelines, we can significantly impair their ability to function, Cohen
said at a conference in London in June. Financial
of adversaries whether nations or individuals who need access to the global financial system.
Concealing financial flows can be harder than avoiding surveillance of
emails and phone calls, which terrorists have tried to do in the
aftermath of Edward Snowdens disclosures about U.S. communications
intercepts. When people think about intelligence, they think about James Bond and running operations
against the Russians or the Chinese, and that still goes on and we shouldnt diminish the importance of it, said
Swift, an adjunct professor of national security studies at Georgetown University in Washington, D.C. But if youre
looking at the other types of organizations in the global community that are causing problems for the United States
and its allies, a lot of them are non-state actors, theyre criminal syndicates, theyre narcotics syndicates, theyre
transnational terrorist syndicates, and the
organizations work, whos part of those organizations, and the best way
to degrade those organizations is follow the money , he said. The U.S. government
has vastly expanded its collection and use of financial intelligence, bolstered by a series of post-9/11 laws and
executive orders that have given the Treasury Department a leading role in financial intelligence and sanctions. The
Treasury Department has more than 700 personnel dealing with terrorist and financial intelligence. The Treasurys
Terrorist Finance Tracking Program, which has access to the Swift international banking
transaction network, participated
investigators in connecting
surveillance programs for counterterrorism were carried out in cooperation with more than 30 countries. Unilateral U.S. collection
programs focused on national security problems: nonproliferation, counterintelligence (including Russian covert influence operations in
Europe), and arms sales to China. The United States failed to exercise sufficient oversight over intelligence collection, but the objectives set
for NSA reflect real security problems for the United States and its allies. The notion that friends dont spy on friends is naive. The United
States has friends that routinely spy on it and yet are strong security partners. Relations among powerful states are complex and not
explained by simple bromides drawn from personal life. The most startling thing about U.S. espionage against Germany was the absence of
a strategic calculation of risk and benefit. There are grounds for espionage (what other major power has a former leader on Russias
payroll?), but the benefits were outweighed by the risk to the relationship. The case for spying on Brazil is even weaker. While Brazil is often
antagonistic, it poses no risk to national security. If economic intelligence on Brazil is needed, the private sector has powerful incentives and
legitimate means to obtain information and usually has the best data. Risk Is Not Going Away Broad
surveillance of
communications is the least intrusive and most effective method for
discovering terrorist and espionage activity. Many countries have expanded surveillance programs
since the 9/11 attacks to detect and prevent terrorist activity, often in cooperation with other countries, including the United States.
Precise metrics on risk and effectiveness do not exist for surveillance , and we are
left with conflicting opinions from intelligence officials and civil libertarians as to what makes counterterrorism successful. Given resurgent
authoritarianism and continuing jihad, the new context for the surveillance debate is that the
likelihood of attack is
increasing. Any legislative change should be viewed through this lens.
** A2 Zero sum
Federation of American Scientists, a nonpartisan think tank that analyzes national and
international security issues. The intelligence budget includes funding for both classified
and unclassified activities. Funding for classified programs has tracked the upward trend
in defense spending over the past decade, according to an analysis of fiscal year 2012
Defense Department budget request by Todd Harrison of the Center for Strategic and
Budgetary Assessments. Aftergood estimates about 14% of the country's total intelligence
budget -- or about $10 billion -- goes to the NSA.
** A2 Recruitment
NSA recruiting is going extremely well
Libicki et al 14 [Libicki, Martin C., 2014, "Hackers Wanted: An Examination of the
Cybersecurity Labor Market," RAND,
http://www.rand.org/pubs/research_reports/RR430.html jf]
The NSA is the countrys largest and leading employer of cybersecurity
professionals. In the face of the current stresses in the market for such professionals, officials there
believe they are doing quite wellfewer than 1 percent of their positions are
vacant for any significant length of time, and supervisors, queried after their new hires
have been working for six months, report being very happy with the personnel they get .
NSA also has a very low turnover rate (losing no more to voluntary quits than to retirements). One reason is that it pays
attention to senior technical development programs to ensure that employees stay current and engaged.
Yet, to get to that point, our interview indicates that NSA must and does pay a great deal of attention to workforce issues.
If not its primary focus, then it is still very high up on the list. Although only 80 people have recruitment as their full-time
occupation, another 300 have recruitment as an additional duty, and another 1,500 beyond that are involved in the whole
recruitment and employment process. All told, that is a great deal of effortsuggesting, from our perspective, that the
professionals, although its recruitment process is very sensitive to the importance of determining those qualities
that predispose people to make good employees. Recruiters also look hard at schools that have a reputation for educating
people that go into the military. Fully 80 percent of their hires are entry level, the vast majority of whom have bachelors
degrees. They could conceivably draw deeper by finding particularly talented junior college graduates, but the latter would
have to undergo a much longer training program as a result. Furthermore, they are not inclined to look for the brilliant
non-degreed hacker.3
NSA has a very intensive internal schooling system , lasting as long as three years for some.
This too, would be difficult for other institutions to duplicate. NSA can take advantage not only of its size, but also of its
low turnover rate. The latter means that it reaps the benefits of its investments in people rather than seeing the benefits
accrue to other organizations after NSA has paid the costs of the training (not least of which is the time that such students
spend off the job to be trained). Employers with more turnover may logically deem it not worthwhile investing that much
to educate their employees.
In all fairness, only one organization can be the most prestigious place to work,
and for this line of work (and for this size of organization), NSA is hard to beat. It consistently
absorbs a third of all Scholarship for Service graduates, as shown in Figure 3.1,4 in part because it has the most job
openings but also because it has a reputation for hiring the best hackers.
A former Director of Counterintelligence for the CIA Barry Royden believes that
cyber terrorism is the next big threat to America. Royden, who spent 40 years in the
CIA 35 years as an operative and 5 years as head of counterintelligence knows what
he's talking about. Though he's been retired for more than a decade, he isn't blind to
what he believes is a new type of threat that has emerged in an increasingly connected
world: "The trouble is, its extremely difficult, in fact, its impossible everyone is
connected to everyone, and as long as youre connected youre vulnerable. And there are
firewalls, but every firewall is potentially defeatable, so its a nightmare in my mind. You
have to think that other governments have the capability to bring down the main
computer systems in this country, power grids, hospitals, or banking systems things
that could cause great economic upheaval and paralyze the country." He adds: "Now, if
they were to do it to us and we were to do it to them, it would almost be like a nuclear
standoff. They could do it but if they did it what would the cost be? Because they know
we have the same capabilities and that we presumably attack their computer systems the
same way and we could destroy their economy. So you hope that no one is going to do
that but youre vulnerable. These days, I think the cyber world is the big threat."
Impact- Cyberattacks attacking the grid collapse global military
operations and cause extinction
Andres and Breetz 11 Richard Andres, Professor of National Security Strategy at the National War College and
a Senior Fellow and Energy and Environmental Security and Policy Chair in the Center for Strategic Research, Institute
for National Strategic Studies, at the National Defense University, and Hanna Breetz, doctoral candidate in the
Department of Political Science at The Massachusetts Institute of Technology, Small Nuclear Reactorsfor Military
Installations:Capabilities, Costs, andTechnological Implications, www.ndu.edu/press/lib/pdf/StrForum/SF-262.pdf
More recently, awareness has been growing that the grid is also vulnerable to purposive attacks. A report
sponsored by the Department of Homeland Security suggests that a
the results could be disastrous. First, military assets taken offline by the crisis would not
be available to help with disaster relief. Second, during an extended blackout, global
military operations could be seriously compromised ; this disruption would be
particularly serious if the blackout was induced during major combat operations . During the
Cold War, this type of event was far less likely because the United States and Soviet Union shared the common
understanding that blinding
***Neg- Impacts***
Cyberterrorism
Examples of this include land based mobile launch platforms and submarine-launched ballistic missiles (SLBM). This
provides terrorists with multiple locations for attaining access to these weapons. Further, under NATO nuclear weapons
sharing, the US has supplied nuclear weapons to Belgium, Germany, Italy, the Netherlands, and Turkey for storage and
operational plans of terrorists may include items such as reconnaissance, social engineering, and crossing borders which
remain unique between states. The potential collapse of a state also presents a challenge. Following the collapse of the
Soviet Union, Belarus, Kazakhstan, and Ukraine were in possession of nuclear weapons. These have since been transferred
to Russia, but there was, and still is, considerable concern over the security and integrity of those weapons, especially in
disseminate plans to nuclear forces may expand the use of computers in nuclear command and control, or lead to the
introduction of fail-deadly and autonomous systems. This chapter is by no means comprehensive, However it sheds some
light on the operations of nuclear command and control and the difficulties in defending those systems from cyber
terrorism. Many of the details of nuclear command and control are classified, so the information provided below may be
outdated. However it points towards a pattern, and there is no certainty these systems and procedures have been
updated since entering open source knowledge. Further, terrorists do not have to restrict themselves to unclassified data,
and therefore may be able to obtain up to date information. The United States The US employs a nuclear deterrence
triad consisted of nuclear-capable long range bombers, SLBMs, and land based intercontinental ballistic missiles (ICBMs),
as well as an arsenal of nonstrategic (tactical) nuclear weapons. US nuclear command and control covers a geographically
dispersed force with the US President, as Commander in Chief, being the highest authority in the decision to make a
nuclear launch. There is a hierarchy of succession in the event the President cannot perform this duty, such as if the
President were killed in an attack. Additionally, once the order to launch is given, it travels down a chain of command; the
President does not press the button, so to speak, nor is the President physically present at the launch location. These
locations would be targets in a nuclear war, so it is imperative that the leader not be there. Additionally, multiple
independent launch locations make this impossible (except for cases in which multiple missiles are tied together in a
Single Integrated Operational Plan). So it is theoretically possible to subvert this control by falsifying the order at any
number of locations down that chain of command. The infrastructure that supports the President in his decision to launch
nuclear weapons is the Nuclear Command and Control System (NCCS). The NCCS must support situation monitoring,
tactical warning and attack assessment of missile launches, senior leader decision making, dissemination of Presidential
force-direction orders, and management of geographically dispersed forces (Critchlow 2006). Key US nuclear command
centres include fixed locations, such as the National Military Command Center (NMCC) and the Raven Rock Mountain
Complex (Site R), and mobile platforms, such as the E-4B National Airborne Operations Center (NAOC) and the Mobile
Consolidated Command Center (MCCC). The US seeks to integrate its nuclear forces into its vision of command, control,
computers, communications, intelligence, surveillance, and reconnaissance (C4ISR) hinting towards a greater reliance on
computer technology in maintaining and upgrading its nuclear force, not only to combat against Cold War style nuclear
war, but also against perceived emerging threats from China, Iran and North Korea. In particular the US recognises these
states potential to use nuclear weapons detonated at high altitude to create an electromagnetic pulse (EMP). The threat
of EMP was known during the Cold War, and a considerable amount of attention has been paid to hardening nuclear
systems (Critchlow 2006). The Minimum Essential Emergency Communications Network (MEECN) links to the ICBMs,
bombers, and submarine forces. Information widely available on the internet shows the US is seeking to upgrade the
MEECNs satellite communications capability through Advanced Extremely High Frequency and the Transformational
Communications Satellite programs. Cyber terrorists may use this knowledge to research these new forms, or to expose
weaknesses in the old system before upgrades are completed. Early warning systems and communications are essential
to assessing whether a nuclear launch has been made and communicating the orders to launch a retaliatory strike.
Falsifying the data provided by either of these systems would be of prime interest to terrorists. Commands emanating
from the NAOC for example, include Extremely High Frequency and Very Low Frequency/Low Frequency links, and its
activation during a traditional terrorist attack, as happened on 9/11, could provide additional clues as to its vulnerabilities.
Blogging communities have also revealed that the 9/11 terrorist attacks revealed insights into the US continuity of
operations plan as high level officials were noted heading to specific installations (Critchlow 2006). One tool designed by
the US for initiating a nuclear launch is the nuclear football. It is a specially outfitted briefcase which can be used by the
President to authorize a nuclear strike when away from fixed command centres. The President is accompanied by an aide
carrying the nuclear football at all times. This aide, who is armed and possibly physically attached to the football, is part of
a rotating crew of Presidential aides (one from each of the five service branches). The football contains a secure satellite
communication link and any other material the President may need to refer to in the event of its use, sometimes referred
to as the playbook. The attack options provided in the football include single ICBM launches and large scale predetermined scenarios as part of the Single Integrated Operational Plan. Before initiating a launch the President must be
positively identified using a special code on a plastic card, sometimes referred to as the gold codes or the biscuit. The
order must also be approved by a second member of the government as per the two-man rule (Pike 2006). In terms of
detecting and analysing a potential attack, that is, distinguishing a missile attack from the launch of a satellite or a
computer glitch, the US employs dual phenomenology. This means two different systems must be used to confirm an
attack, such as radar and satellite. Terrorists trying to engage a launch by falsifying this data would need to determine
which two systems were being used in coordination at the target location and spoof both systems. Attempting to falsify
commands from the President would also be difficult. Even if the chain of command is identified, there are multiple checks
and balances. For example, doctrine recommends that the President confer with senior commanders. The Chairman of the
Joint Chiefs of Staff is the primary military advisor to the President. However, the President may choose to consult other
advisors as well. Trying to identify who would be consulted in this system is difficult, and falsification may be exposed at
any number of steps. The 2006 Quadrennial Defense Review emphasizes that new systems of command and control must
be survivable in the event of cyber warfare attacks. On the one hand, this shows that the US is aware of the potential
danger posed by computer network operations and are taking action to prevent it. On the other hand, this shows that they
themselves see computer network operations as a weakness in their system. And the US continues to research new ways
to integrate computer systems into their nuclear command and control, such as IP-based communications, which they
admit, has not yet been proven to provide the high degree of assurance of rapid message transmission needed for
fired for example, Russias firing of Scud missiles into Chechnya peaceful satellites being lofted into space, or
wildfires and solar reflections off oceans and clouds. If an incoming missile strike is anticipated, the president and his top
nuclear advisors would quickly convene an emergency telephone conference to hear urgent briefings. For example, the
war room commander in Omaha would brief the president on his retaliatory options and their consequences, a briefing
that is limited to 30 seconds. All of the large-scale responses comprising that briefing are designed for destroying Russian
targets by the thousands, and the president would have only a few minutes to pick one if he wished to ensure its effective
implementation. The order would then be sent immediately to the underground and undersea launch crews, whose own
mindless firing drill would last only a few minutes (Blair 2003).
leave room for error. Cyber terrorists would not need deception that could
stand up over time; they would only need to be believable for the first 15
minutes or so. The amount of firepower that could be unleashed in these 15
minutes, combined with the equally swift Russian response, would be
equivalent to approximately 100,000 Hiroshima bombs (Blair 2008).
that it would be installing a Microsoft Windows operating system on its nuclear submarines (Page 2008).
The choice of operating system, apparently based on Windows XP, is not as alarming as the advertising of
such a system is. This may attract hackers and narrow the necessary reconnaissance to learning its details
and potential exploits. It is unlikely that the operating system would play a direct role in the signal to
launch, although this is far from certain. Knowledge of the operating system may lead to the insertion of
malicious code, which could be used to gain accelerating privileges, tracking, valuable information, and
deception that could subsequently be used to initiate a launch. Remember from Chapter 2 that the UKs
nuclear submarines have the authority to launch if they believe the central command has been destroyed.
knowledge is scarce as to whether Russia continues to operate such a system. However evidence suggests
that they have in the past. Perimetr, also known as Dead Hand, was an automated system set to launch a
mass scale nuclear attack in the event of a decapitation strike against Soviet leadership and military. In a
crisis, military officials would send a coded message to the bunkers, switching on the dead hand. If nearby
ground-level sensors detected a nuclear attack on Moscow, and if a break was detected in communications
links with top military commanders, the system would send low-frequency signals over underground
antennas to special rockets. Flying high over missile fields and other military sites, these rockets in turn
would broadcast attack orders to missiles, bombers and, via radio relays, submarines at sea. Contrary to
some Western beliefs, Dr. Blair says, many of Russia's nuclear-armed missiles in underground silos and on
cyber
terrorists would need to create a crisis situation in order to activate Perimetr, and then
fool it into believing a decapitating strike had taken place . While this is not an easy
mobile launchers can be fired automatically. (Broad 1993) Assuming such a system is still active,
task, the information age makes it easier. Cyber reconnaissance could help locate the machine and learn
its inner workings. This could be done by targeting the computers high of level officialsanyone who has
reportedly worked on such a project, or individuals involved in military operations at underground facilities,
such as those reported to be located at Yamantau and Kosvinksy mountains in the central southern Urals
(Rosenbaum 2007, Blair 2008)
systems as they are most likely on a closed network. However, if they are transmitting wirelessly, that may
provide an entry point, and information gained through the internet may reveal the details, such as
vulnerable to a computer attack, while satellites are more vulnerable to jamming from a laser beam, thus
together they deny dual phenomenology. Mapping communications networks through cyber
reconnaissance may expose weaknesses, and automated scanning devices created by more experienced
hackers can be readily found on the internet. Intercepting or spoofing communications is a highly
complex science. These systems are designed to protect against the worlds most powerful and well
funded militaries. Yet, there are recurring gaffes, and the very nature of asymmetric warfare is to bypass
complexities by finding simple loopholes. For example, commercially available software for voice-morphing
could be used to capture voice commands within the command and control structure, cut these sound
bytes into phonemes, and splice it back together in order to issue false voice commands (Andersen 2001,
themselves Milw0rm hacked the web site of Indias Bhabha Atomic Research Center (BARC) and put up a
spoofed web page showing a mushroom cloud and the text If a nuclear war does start, you will be the first
to scream (Denning 1999). Hacker web-page defacements like these are often derided by critics of cyber
terrorism as simply being a nuisance which causes no significant harm. However, web-page defacements
are becoming more common, and they point towards alarming possibilities in subversion. During the 2007
cyber attacks against Estonia, a counterfeit letter of apology from Prime Minister Andrus Ansip was planted
on his political party website (Grant 2007). This took place amid the confusion of mass DDoS attacks, real
world protests, and accusations between governments. The 2008 terrorist attacks in Mumbai illustrate
several points. First, terrorists are using computer technology to enhance their capabilities. To navigate to
Mumbai by sea and to aid in reconnaissance of targets, they used the Global Positioning System (GPS)
satellite system and Google Earth (Bedi 2008, Kahn and Worth 2008). They also used mobile phone SIM
cards, purchased in foreign countries, VoIP phone calls, and online money transfers (Part of 26/11 plot
hatched on our soil, admits Pakistan 2009). Falsified identification and stolen credit cards may have also
been aided by online capabilities. Second, a false claim of responsibility was issued through an e-mail to
media outlets. Initial tracking of the IP address showed the e-mail to have been sent from a computer in
Russia. It was later revealed that the e-mail was sent from Pakistan and routed through Russia (Shashthi
2008). Voice-recognition software was used to allow dictated text to be typed in the Devnagari font
(Swami 2008). Lastly, the Mumbai attacks showed an increasing reliance on information technology by the
intended victims of terrorism. This included Twitter messages, Flickr photos, a map of attack locations on
Terrorists could
insert disinformation into these systems in order to enhance destruction,
evade capture, or increase hostility between groups. Terrorist could even
clandestinely enlist the aid of their enemy to enhance destruction . For example,
at the height of a terror attack they could claim to have exclusive video
footage of the attack, which requires a codec to be downloaded in order to be
viewed. This codec could contain a Trojan which uses the now infected
computer to silently launch DDoS attacks against their desired targets , such as
Google Maps, and live text and video coverage of the attacks (Beaumont 2008).
communications networks. Building an infidel botnet prior to an attack could take on a wide range of
symbolism, from a pdf file about anti-terrorism to an unreleased Hollywood film.
a successful
hacker attack taking out just a part of the nations electrical grid, or crippling
financial institutions for several days, could sow panic or even lead to loss of
life. I call it cyberterrorism that makes 9/11 pale in comparison, Rep. Mike
pipelines, its water supply, its banks are increasingly at risk. The experts say that
Rogers, a Michigan Republican and chair of the House Intelligence Committee, told NBC News on Tuesday.
An American computer security company, Mandiant, reported with near certainty that members of a
sophisticated Chinese hacking group work out of the headquarters of a unit of the Chinese army outside
Shanghai. The report was first detailed in The New York Times, which said that the hacking groups focus
was increasingly on companies that work with American infrastructure, including the power grid, gas lines
and waterworks. The Chinese embassy in Washington told The Times that its government does not
engage in computer hacking. As reported, the Chinese attacks constitute a sort of asymmetrical
cyberwarfare, analysts said, because they bring the force of the Chinese government and military against
private companies. To us thats crossing a line into a class of victim thats not prepared to withstand that
type of attack, Grady Summers, a Mandiant vice president, said on the MSNBC program Andrea Mitchell
Reports. The report comes as government officials and outside security experts alike are sounding everlouder alarms about the vulnerability of the systems that make everyday life in the United States possible.
A new report confirmed by U.S. intelligence officials has pinpointed a building in Shanghai where those
working for the Chinese military launched cyberattacks against 141 US companies spanning 20 industries.
the
United States was facing a threat that amounted to cyber Pearl Harbor and
raised the specter of intentionally derailed trains, contaminated water and
widespread blackouts. This is a pre-9/11 moment, Panetta told business
executives in New York. The attackers are plotting. RELATED: Report: Chinese army tied
NBC's Andrea Mitchell reports. Outgoing Defense Secretary Leon Panetta warned in October that
to widespread U.S. hacking The Times report described an attack on Telvent, a company that keeps
blueprints on more than half the oil and gas pipelines in North and South America and has access to their
systems. A Canadian arm of the company told customers last fall that hackers had broken in, but it
immediately cut off the access so that the hackers could not take control of the pipelines themselves, The
Times reported. Dale Peterson, founder and CEO of Digital Bond, a security company that specializes in
infrastructure, told NBC News that these attacks, known as vendor remote access, are particularly
worrisome. If you are a bad guy and you want to attack a lot of different control systems, you want to be
digit pin like your ATM card. Carlos Barria / Reuters Locals walks in front of 'Unit 61398', a secretive
Chinese military unit, in the outskirts of Shanghai. The unit is believed to be behind a series of hacking
attacks, a U.S. computer security company said. The 34-minute blackout at the Super Bowl earlier this
month highlighted weak spots in the nations power system. A National Research Council report
lead to public fear, social turmoil and a body blow to the economy. Vital
systems do not have to be taken down for very long or across a particularly
widespread area, the experts noted, to cause social disorder and to spread fear
and anxiety among the population. Last fall, after Hurricane Sandy battered the Northeast, it
took barely two days for reports of gasoline shortages to cause hours-long lines at the pumps and violent
fights among drivers. Peterson described being in Phoenix, Ariz., during a three-day gas pipeline
disruption when people were waiting in line six hours and not going to work. You can imagine someone
does these things maliciously, with a little more smarts, something that takes three months to replace.
Similarly, hacking attacks last fall against major American banks believed by some security experts and
government officials to be the work of Iran amounted to mostly limited frustration for customers, but
foreshadowed much bigger trouble if future attacks are more sophisticated. What worries Dmitri
a coordinated attack
against banks that modifies, rather than destroys, financial data, making it
impossible to reconcile transactions. You could wreak absolute havoc on the
worlds financial system for years, he said. It would be impossible to roll that
back.
Alperovitch, co-founder of the computer security company CrowdStrike, is
Peter Pry, former CIA officer and one-time House Armed Services
Committee staffer, who served on a congressional commission investigating such eventualities. There
is an imminent threat from ISIS to the national electric grid and not just to a
single U.S. city, Pry warns. He points to a leaked U.S. Federal Energy Regulatory Commission report
in March that said a coordinated terrorist attack on just nine of the nations 55,000
electrical power substations could cause coast-to-coast blackouts for up to 18
months. Consider what youll have to worry about then. If you were uncomfortable watching looting
and riots on TV last month in Ferguson, Mo., as police stood by, project such unseemly behavior
nationwide. For 18 months. Its likely phones wont be reliable, so you wont have to watch police stand
idly by. Chances are, police wont show up. Worse, your odds of needing them will be excruciatingly more
likely if terrorists attack the power grid using an electromagnetic pulse (EMP) burst of energy to knock out
electronic devices. The Congressional EMP Commission, on which I served, did an extensive study of
engineering such measures before dismissing the likelihood. In his 2013 book, A Nation Forsaken,
a hostile nation or
terrorist group could attack with a high-altitude EMP weapon and determined,
any number of adversaries possess both the ballistic missiles and nuclear
weapons capabilities, and could attack within 15 years. That was six years ago. North
Korea, Pakistan, India, China and Russia are all in the position to launch an
EMP attack against the United States now, Maloof wrote last year. Maybe youll rest more
Michael Maloof reported that the 2008 EMP Commission considered whether
comfortably knowing the House intelligence authorization bill passed in May told the intelligence
community to report to Congress within six months, on the threat posed by man-made electromagnetic
pulse weapons to United States interests through 2025, including threats from foreign countries and
foreign nonstate actors. Or, maybe thats not so comforting. In 2004 and again in 2008, separate
congressional commissions gave detailed, horrific reports on such threats. Now, Congress wants another
report. In his book, Maloof quotes Clay Wilson of the Congressional Research Service, who said, Several
nations, including reported sponsors of terrorism, may currently have a capability to use EMP as a weapon
for cyberwarfare or cyberterrorism to disrupt communications and other parts of the U.S. critical
infrastructure. What would an EMP attack look like? Within an instant, Maloof writes, we will have no
idea whats happening all around us, because we will have no news. There will be no radio, no TV, no cell
signal. No newspaper delivered. Products wont flow into the nearby Wal-Mart. The big trucks will be
stuck on the interstates. Gas stations wont be able to pump the fuel they do have. Some police officers
and firefighters will show up for work, but most will stay home to protect their own families. Power lines will
get knocked down in windstorms, but nobody will care. Theyll all be fried anyway. Crops will wither in the
fields until scavenged since the big picking machines will all be idled, and there will be no way to get the
crop to market anyway. Nothing
Richard Clarke, a
counterterrorism expert and special advisor to President Bush on cyberspace
security, described our vulnerability to a cyber terrorist attack as a digital
Pearl Harbor. One where you would never see it coming and would have devastating effects. We can
(http://www.cs.georgetown.edu/~denning/infosec/cybert:rror.html)
no longer turn a blind eye to these possibilities. In moving forward it is imperative to imagine the ways
Minimizing our vulnerabilities to terrorist threats is a shared responsibility that falls on federal, state, and
local government as well as private industry. According to the National Strategy for the Physical
Protection of Critical Infrastructure and Key Assets, we must commit to secure(ing) the infrastructure and
assets vital to our national security, governance, public health and safety, economy, and public
governing they are interdependent upon one another. The relationship is complex and the disruption of
one could adversely affect the other. Each sector plays a key role in our daily lives providing services that
are invaluable. This infrastructure is so essential that in 1996 President Clinton devised Executive Order
13010, Critical Infrastructure Protection, which addresses threats of electronic, radio-frequency, or
computer-based attacks on the information or communications components that control critical
The components
of agriculture and food and water represent the most basic needs of the people
of the United States. All citizens require a reliable food supply and clean drinking water. Without
infrastructures (cyber threats) (http://www.fas.org/irp/offdocs/eo13010.htm)
these necessities people would go hungry or even starve. Even something as simple as washing your
hands or brushing your teeth would be impossible. Any threat to these sectors could spread panic or fear
amongst the people.
AT No Cyberattack
Yes cyberattackthreat is higher than conventional
terrorism because of vulnerable critical infrastructure
Hua 13
(Jian, June 13, The Journal of Strategic Information Systems, The economic
impact of cyber terrorism, Hua is an associate professor in the Department
of Marketing, legal Studies, and Information Systems @ the School of
Business and Public Adinistration, the University of the District of Columbia,
http://www.researchgate.net/profile/Jian_Hua3/publication/261860155_The_ec
onomic_impact_of_cyber_terrorism/links/5435603c0cf2bf1f1f29f2e0.pdf,
7/14/15, SM)
Modern economies are heavily dependent upon Information Technology (IT) based
information systems for survival. Increased reliance on information systems (ISs) leads to
increased vulnerabilities and risks. IS security has thus become a critical issue in the IT world
(Sonnenreich et al., 2006). Investing optimally in the security of information systems can yield
comparative strategic advantages (LeVeque, 2006) through trustworthiness and positive image as
perceived by partners, customers and suppliers; trust is difficult for competitors to duplicate. Investing
terrorism as an extension of traditional terrorism and a new approach adopted by terrorists to attack
fought by government alone (Nakashima, 2010). Organizations that comprise the critical infrastructure of
the national economy should be aware of the potential for terrorist attack (Nickolov, 2005).
Critical
infrastructure refers to the essential assets which make society or a country function well and
includes energy, transportation, telecommunication, water supply and waste
management, agriculture and food supply, finance, public health, and
essential government services. Organizations which form the critical
infrastructure of a national economy must protect their information systems
well. Cyber terrorists could feasibly target the information systems of critical infrastructure of countries.
Bioterrorism
DNA sequence for a highly pathogenic virus online or acquire a DNA synthesis machine online are
surmountable. 77 Alternatively,
their bioengineered airborne H5N1 virus in the widely read journals Nature and Science, the NSABB
determined that the danger of releasing the sensitive information outweighed the benefits to society,
advising that the findings not be published in their entirety.82 The main risk is that either a state or nonstate actor could synthesize a weaponized version of the H5N1 virus to create a disastrous pandemic.83
There is precedent of outside groups recreating advanced bioengineering experiments, such as when
many scientists immediately synthesized hepatitis C replicons upon publication of its genetic code. 84
However, the NSABBs recommendation was nonbinding, and there is nothing to stop other scientists
from releasing similar data in the future. Furthermore, while the NSABB merely asserts that the
blueprints of the virus should not be printed, other biosecurity experts argue that the virus should
never have been created in the first place because of risks that the viruses would escape or be stolen.85
Yes Bioterror
Terrorists using bioweapons can achieve the same
mortality rates as with WMDbioweapons are cheaper,
more effective
SIU School of Medicine 14
(12/15/14, SIU School of Medicine, Overview of Potential Agents of Biological
Terrorism, http://www.siumed.edu/medicine/id/bioterrorism.htm#threat,
7/15/15, SM)
Biological weapons are very attractive to the terrorist because of several characteristics. Aerosols of
biological agents are invisible, silent, odorless, tasteless, and are relatively easily dispersed. They are
600 - 2000 times cheaper than other weapons of mass destruction . It is estimated
that the cost would be about 0.05% the cost of a conventional weapon to
produce similar numbers of mass casualties per square kilometer . The production
is relatively easy, using the common technology available for the production of some antibiotics, vaccines,
foods, and beverages. The delivery systems such as spray devices from an airplane, boat or car are
confusion because of the inability to differentiate a biological warfare attack from a natural epidemic. For
some agents potential exists for secondary or tertiary transmission by person-to-person transmission or
based on overt attacks like bombings and chemical agents that cause immediate and obvious effects.
However, attacks with biological agents are more likely to be covert. They pose different challenges
and require emergency planning with the involvement of the public health infrastructure. The attack by a
biological agent will not have an immediate impact because of the delay between exposure and onset of
illness (i.e., the incubation period). Therefore, the first victims of a bioterrorism action will need to be
identified by physicians or other primary health care providers. Based on the first wave of victims, pubic
health officials will need to determine that an attack has occurred, identify the organism and prevent more
casualties through prevention strategies (e.g. mass vaccination, prophylactic treatment) and infection
control procedures (35). The clues to a potential bioterrorist attack include an outbreak of a rare or new
disease, an outbreak of diseases in a non-endemic area, a seasonal disease during an off season time, a
known pathogen with unusual resistance or unusual epidemiologic features, an unusual clinical
presentation or age distribution, a genetically identical pathogen emerging rapidly in different
geographical areas (36).
(Tom, 2/11/14, UPMC Center for Health Security of the University of Pittsburgh
medical Center, Bioterrorism: Assessing the Threat, Tom is a director and
CEO of the UPMC Center for Health Security and an Associate Professor of
Medicine and Public Health at the University of Pittsburgh,
http://www.upmchealthsecurity.org/our-work/testimony/bioterrorismassessing-the-threat, 7/15/15, SM)
The Consequences of Biological Weapons The anthrax events of 2001 were shocking for
the country. Letters carrying anthrax spores were sent to a number of people in different cities. Hospitals,
doctors, and nurses at the time were largely unfamiliar with the disease. Elements of all three branches of
government were each affected and closed at some point. Buildings had to be evacuated for prolonged
periods. Cases appeared over weeks in different places. A number of people were sickened and killed. The
source of the anthrax could not be identified. The communication about it from our own government was
often uncertain and changing. The media coverage was constant. People were afraid of their own mail.
Nothing like this had happened before in our country or any country. A great deal has been done to
improve our ability to recognize and respond to biological weapons events since that time. I will say more
and emergency rooms. And while the anthrax letters of 2001 came through the mail, future bioterrorism
attacks could come in many different kinds of form. There are many means of creating aerosols. And there
We also need to
understand that the scope of future bioweapons events could be far, far
greater that what we saw in 2001. In 2009, the US National Security Council said: "The
effective dissemination of a lethal biological agent within an unprotected
population could place at risk the lives of hundreds of thousands of people.
The unmitigated consequences of such an event could overwhelm our public
health capabilities, potentially causing an untold number of deaths. The
economic cost could exceed $1 trillion for each such incident. " The
use of such weapons could lead to substantial loss of life and great societal
disruption. Even with a small or modest-sized attack, the social and economic
impact would be significant.
are clearly other means of using biological weapons against the public.
Agro-Terrorism
can be achieved by
introducing small quantities of lethal components to every day
agricultural inputs, such as water, fertilizers, seeds, sprouts, chicken
or livestock feed. It is also possible to easily transmit disease agents
from one sick animal to an entire flock or herd, using simple means
such as rags. However, while the technicalities are quite simple, they require intention, knowledge
national and international political interests" (CATRC 2010). It
and guidance. The last two can be easily provided anonymously, while the first one requires motivation,
which can be initiated and enhanced by ideology and indoctrination, both deliverable electronically.
Cavana et al. 2002; Freeman, Harrison et al. 2010). This phase also requires incorporating technologists
and business management in the translation of intelligence requirements into service offerings, and the
development of strategies at the tactical level to deliver these services in an effective manner. In this step
specific collection capabilities are tasked, based on the type of information required, the susceptibility of
the targeted activity to various types of collection activity, and the availability of collection assets. The
tactical level of the planning and direction phase requires harnessing proven project management
methodologies. A leading professional resource is the Project Management Book of Knowledge, also known
as PMBOK (Indelicato 2009; Sanchez-Arias and Solarte-Pazos 2010). Further, intention detection efforts at
the planning stage should be targeted at specific areas of agro-terror. Inflicting damage through the
contamination of fertilizers, for example, requires different skills and opportunities compared to inflicting
damages through sewage redirection, which is entirely different from spreading viruses that can infect
large herds of livestock. Deciding on which area to focus the intention detection efforts should be based on
sophisticated risk analysis techniques, offered by several researchers (Parnell, Smith et al. 2010; Fellman,
Parnel et al. 2011; Merrick and Parnell 2011). The risk analysis should be reviewed periodically and revised
according to changing threat. To this mix, one should add "fashion traits" among terrorists. Blowing up
buildings was fashionable in the 1980's and 1990's (US Embassy bombing in Tblisi, Georgia; Khobar Towers
military complex bombing; simultaneous bombing of US embassies in Nairobi, Kenya, and Dar es Salaam,
Tanzania, etc.) Beheading became trendy in the beginning of the 21st century. Suffice to mention Daniel
Pearl, Paul Johnson and Nick Burg as examples. The antibiotics-resistant salmonella found in Europe during
the summer of 2011(The Independent 2011) along with analysis of current affairs by CATRC suggests that
the next trend in Agro-Terrorism might as well be the disruption of a central hub in the food chain by agro-
potential weapon (Geissler 1986; Geissler and van Courtland Moon 1999). He then identified 21 viruses
that meet these criteria. Hu et. al. proposed an "automated, semantic-based data mining system to
identify viruses that can be used as weapons in bio-terrorism" by mining biomedical literature (Hu, Yoo et
al. 2005).
communities in
social networks can be helpful in discovering groups of actors that
hide their communications, possibly for malicious reasons" ( Baumes,
Goldberg et al. 2005). A fast algorithm for the same purpose was proposed
three years later (Gregory 2008)
Vancouver, Canada, April 2012 L. Rothkrantz, J. Ristvej and Z. Franco, eds. 3
new. The Assyrians poisoned enemy wells with rye ergot during the 6th century B.C. During World War I,
German agents in the United States infected horses and cattle in transit across the Atlantic to France. In
1994, in The Dalles, Oregon, a religious cult intentionally contaminated 10 restaurant salad bars with
salmonella, sickening more than 750 people in an attempt to influence the outcome of a local election.
Since 1912, 12 documented cases have involved the substate use of pathogenic agents to infect livestock
or contaminate food.4 Dean Olsen with Quote The agroterrorism threat emanates from four categories of
Environment Because it lacks the drama and spectacle of more common terrorist violence, such as
bombings and murders, agroterrorism has remained a secondary consideration, and no documented
that attacking the U.S. economy represented the best way to destroy Americas ability to project military
power abroad. Underpinning this view is al Qaedas historical narrative that jihad against the Soviets
following the invasion of Afghanistan led not only to the defeat of the Red Army but, ultimately, to the
demise of the U.S.S.R.7 As divorced from reality as this view seems, economic harm remains one of the
pillars of al Qaedas terror strategy against the United States. In a video broadcast before the 2004 U.S.
presidential elections, Usama Bin Ladin bragged that his organization bled Russia for 10 years until it
went bankrupt and was forced to withdraw in defeat. We are continuing in the same policy to make
America bleed profusely to the point of bankruptcy. He boasted that the 9/11 attacks had cost al Qaeda
$500,000 while inflicting a staggering $500 billion in economic losses to America.8 According to Bin Ladin,
every dollar of al Qaeda defeated a million dollars [of America]...besides the loss of a huge number of
jobs. Open Quotes on Blue Bar The same factors that yield inexpensive and plentiful food by promoting
maximum production efficiency also make American agricultural systems inherently vulnerable. Close
Quotes on Blue Bar Analysts believe that al Qaedas evolving tactics increasingly will focus on targets that
will yield the most economic damage.9 Terrorist leaders realize that Americas strength stems largely
from its economic vitality. They pursue an overarching strategy that all attacks should focus on weakening
Americas economic strength, especially through protracted guerilla warfare. In their view, as the United
States loses its standing in the Middle East, groups, like al Qaeda, can gain ground and remove from power
regimes they view as corrupt and illegitimate.10 Terrorists know that a successful agroterrorism incident
threatens Americas economic welfare and its standing as a leading exporter of agricultural products to the
world. A significant disruption in agricultural exports caused by such an attack would have ripple effects in
the United States and global economies. This economic disruption would occur on three levels. The first
involves direct losses due to containment measures, such as stop-movement orders (SMOs) or quarantines
of suspected stock. Additional costs would arise from the culling and destruction of disease-ridden
livestock.11 Second, indirect multiplier effects, such as compensation to farmers for destruction of
agricultural commodities and losses suffered by directly and indirectly related industries, would arise.12
And, third, international costs would result from protective trade embargoes. Less measurable
consequences would include the undermining of confidence in and support of government, creation of
Mouth Disease Attacks directed against the cattle, swine, or poultry industries or via the food chain pose
the most serious danger for latent, ongoing effects and general socioeconomic and political disruption.
Experts agree that FMD presents the most ominous threat.14 Eradicated in the United States in 1929, FMD
remains endemic in South America, Africa, and Asia.15 An especially contagious virus 20 times more
infectious than smallpox, FMD causes painful blisters on the tongues, hooves, and teats of cloven-hoofed
animals, including cattle, hogs, sheep, goats, and deer, rendering them unable to walk, give milk, eat, or
drink. Although people generally cannot contract the disease, they can carry the virus in their lungs for up
to 48 hours and transmit it to animals. The animal-to-animal airborne transmission range is 50 miles.16 An
infected animal can shred the virus in large quantities from its upper respiratory tract via drooling,
coughing, and discharging mucus. Extremely stable, FMD can survive in straw or clothing for 1 month and
spread up to 100 kilometers via the wind. Because herds exist as highly crowded populations bred and
reared in extremely close proximity to one another, a significant risk exists that such pathogenic agents as
FMD will spread well beyond the locus of a specific outbreak before health officials become aware of a
problem. An FMD outbreak could spread to as many as 25 states in as little as 5 days simply through the
regulated movement of animals from farm to market.17 Open Quotes on Blue Bar ...the food production
and distribution chain offers a low-tech but effective mechanism for disseminating toxins and bacteria....
Close Quotes on Blue Bar From a tactical perspective, an FMD attack holds appeal for several reasons.
First, unlike biological warfare directed against humans, no issue of weaponization exists. In an FMD attack,
the animals themselves serve as the primary medium for pathogenic transmission, and countries as close
as those in South America offer a ready source of the virus. As one analyst described it, the virus can be
spread by simply wiping the mucus from an infected animal on a handkerchief and then transferring the
virus to healthy animals by wiping their nosesby stopping on a highway in rural America and releasing
the virus among curious livestock an outbreak could be initiated.18 Second, FMD is nonzoonotic,
presenting no risk of accidental human infection. There exists no need for elaborate personal protective
equipment or an advanced understanding of animal disease science. In a biowarfare attack targeting
people, the deadly pathogen poses a threat to the perpetrators, as well as their intended victims.
Preparing the pathogen so that terrorists can handle it safely yet disseminate it effectively to intended
victims can prove difficult. For instance, the Aum Shinrikyo sarin gas attacks on the Tokyo subway in 1994
largely failed to kill the number of people intended due to the crude method of dissemination. Third,
terrorists could introduce and subsequently disperse the virus throughout the American food production
system through multiple carriers, including animals carrying and introducing it into susceptible herds;
animals exposed to contraband materials, such as contaminated food, hay, feedstuffs, hides, or biologics;
people wearing clothing or using equipment, including tractors and trucks, to transmit the virus to
uninfected animals; and contaminated facilities, such as feed yards, sale barns, and trucks that commonly
hold or transport susceptible animals.19 The same factors that yield inexpensive and plentiful food by
promoting maximum production efficiency also make American agricultural systems inherently vulnerable.
The highly concentrated and intensive nature of livestock production encourages the rapid spread of
contagious pathogens.20 Most dairies house at least 1,500 cows, with the largest facilities containing
10,000. Animals often are born on breeding farms and then transported to another state for slaughtering
and processing. Otherwise isolated and widely dispersed farms often share equipment, vehicles, and
veterinary instruments. Feedlots and auctions routinely intermingle animals from a wide geographic area.
On average, a pound of meat travels 1,000 miles before it reaches the consumers table.21 The Food
Process Chart: Seed to Plate The introduction of FMD would require the mass slaughter and disposal of
infected animals. An outbreak could halt the domestic and international sale of meat and meat products
http://www.thecalifornian.com/story/news/local/2014/09/12/agroterrorismlooming-threat-food-supply/15541125/
Unfortunately, many people think of Middle-East terror groups as the masterminds behind such
unthinkable acts. But that is only one of many threats, said David Goldenberg, program manager and
coordinator for field training at the Western Center for Food Safety and Security at the University of
California, Davis. Sponsored by the Department of Homeland Security, Goldenberg is teaching a special
series of classes at Hartnell College in Salinas designed for first responders, government officials and
operations staff working at the scores of produce processing plants dotting the southern Salinas. Though
the attacks on the World Trade Center on Sept. 11, 2001 were plotted and carried out by extremists from
the Middle East, consider other historical attacks on U.S. soil. The 1995 Oklahoma City bombing killed 168
people, injured more than 680 others and caused $652 million in damage. Then there were the shootings
at Virginia Tech, Sandy Hook, Columbine, Fort Hood the list is long and heartbreaking. All were carried out
diverse cast of characters bent on disrupting the food supply or instilling fear, Goldenberg has received
input from the Federal Bureau of Investigation, the Department of Homeland Security, the U.S. Food and
Drug Administration and the U.S. Department of Agriculture. His courses are funded through the Rural
Domestic Preparedness Consortium. "We
a lettuce grower, acknowledges that because their livelihoods are planted outdoors, and having only
limited activity at night, there is vulnerability. "There's an old saying that it's not hard to meet a grower in
the daytime in the Salinas Valley, just go stand in his crop uninvited," Donohue said. "Unfortunately,
farmers have to sleep." Today when a human pathogen like E. coli, listeria or salmonella contaminate a
food product, often the first sign of a problem is sickness after someone, somewhere consumes the
product. Both U.S. and Canadian health officials test produce and meat, but their primary task is to
manage outbreaks, not prevent them. Prevention begins on the farm. The major concern of growers here is
water, as a parched California lumbers through its third consecutive dry season and is trying to come to
terms with a nearly unprecedented drought. More than 98 percent of California land is now considered to
be in an "exceptional drought," the highest level recorded by the U.S. Drought Monitor. Still, as
demonstrated by the turnout at Goldenberg's agroterrorism series, farmers are increasingly aware of the
dangers from terrorism. "While it's not a high priority water has eclipsed everything else there is
concern about contamination of well heads," said Norm Groot, executive director of the Monterey County
Farm Bureau. "There
do." Economic carnage In the aftermath of the 9/11 attacks, commerce was deeply affected. It took years
for airlines to recover. Huge losses in the stock markets were sustained. Consumer confidence was shaken.
History has already foreshadowed what could happen if an attack of that magnitude were leveled on
traced the pathogen to an Angus cattle ranch in neighboring San Benito County that had leased land to an
now grows more than $122.6 million worth of spinach annually. But it took years of aggressive marketing
and the implementation of new safety systems to restore consumer confidence. Susan Pheasant, director
of the Agricultural Business & Technology Institute at Hartnell College, said the courses have dual impacts
preparing individuals for both intentional and unintentional outbreaks. "The Salinas Valley has always
been proactive when it comes to food safety," she said. "Whether the act is intentional or unintentional,
the idea of the courses are to encourage the ag community to work not only with local first responders, but
with state and federal crisis teams as well." Even pathogens that don't affect human health can wreak
economic catastrophes.
their peak earlier in 2011, "high food prices are likely to continue and volatility may increase in coming
years, making farmers, consumers and countries more vulnerable to poverty and food insecurity,"
of Somalia. Tens of thousands of people have died, a majority of them children, according to the U.N.
One
problem is that some local food is exported out of the famine-struck
area. The reason is simple: starving people don't have sufficient
means to buy food, so traders sell it elsewhere, fetching a higher
price. Looking closely at the links between food prices and
Severe hunger caused by drought, conflict and inequity is now found throughout the Horn of Africa.
to plan for sufficient food. Smallholder farmers, many of them living in poverty yet also selling some of
their harvest on the market to pay for other essentials, now face greater risks. The good news is that some
years they get a pleasant surprise and find higher prices for their goods at the market. But, in other years,
unexpectedly low prices can be disastrous. When they can do little more than pay for costs to farm, the
in Figure 1. These sudden changes are about prices going up for a time, and far more than can be
These spikes
particularly harm people living in poverty who are not in the
agricultural sector, such as urban dwellers and people on the
margins of rural society. Although the poor often devise ingenious ways of saving even in the
harshest of conditions, major food price spikes can overwhelm the ability of
struggling families to cope. Rising Food Prices Graphic courtesy of Food and Agriculture
accounted for by any normal volatility (even while volatility is also rising).
Organization of the United Nations Leading experts on food prices and their impact on people living in
poverty convened at George Washington University on Sept. 30 for a daylong conference to better
understand these three food price problems and consider action plans. More than 100 participants took
part in the discussion.Why Is This Happening? Leading Experts Weigh In The Rising Food Price Trend Food
prices are about 80 percent higher than they were in 2000, reversing a long declining trend of previous
decades. Nora Lustig, a professor of Latin American Economics at Tulane University, said some of the price
increases reflect longer-term forces that if left unchecked will lead to higher future food prices. These
forces include diversion of food to biofuels production, increase in demand for grains through shifts to
meat production due to higher incomes in China and elsewhere, a possible slowdown in the growth of
output per acre of agricultural commodities, higher energy prices affecting agricultural input costs, and a
subsidies and mandates for biofuels. As Alain de Janvry, a professor of agricultural and resource economics
at the University of California at Berkeley, pointed out, "the demand for energy is simply so big compared
to the food market that it could completely overwhelm any price predictions" that do not take energy
policy into account. Furthermore, there is not a large global market for food in relation to total demand.
Most countries strive for food self-sufficiency, largely for national security reasons. Embargoes of food
exports by such countries as Egypt, Vietnam and Russia reflect this reluctance to allow a freer global
market when it comes to food. The World Bank reported in 2008 that growth in output per acre was
leveling off and that prices would continue rising. In fact, prices increased far faster than even the World
Bank predicted. Lustig explained that while "food is energy for human survival, food commodities have
turned into industrial commodities, energy for machines." The result is less energy for peopleat best,
more expensive energywhen so many remain deprived of even a minimum of calories. "A majority of
studies show that those who get hurt outnumber those who benefit" when food prices increase, she said.
Unstable Food Prices In the 20th century, food prices fell close to 1 percent per year. Dr. Keith Fuglie, an
economist at the U.S. Department of Agriculture, said that in the early 1900s, falling shipping costs steered
prices lower, with producers sending food from where it was grown cheaply and abundantly to where food
prices were high. In the later decades of the 20th century, rising output per acre drove prices down. Today,
that yield growth is slower, but Fuglie found we are still making gains despite smaller additions to inputs
than before (especially the smaller number of workers in agriculture). This is a new and encouraging
discovery. It should be putting downward pressure on food prices. Looking ahead, these forces may
continue to slow the rate at which food prices increase. Findings like Fuglie's help reassure us that, while
new problems complicate work toward a world free of hunger, with continued commitment the goal can
still be attained. But Fuglie also found that these gains were not present in Africa, where most of the
increase in population is expected. And although encouraging, his work is retrospective: It does not take
into account the projected worsening of environmental stresses not only from climate change but from
localized deforestation, water scarcity, falling water tables, declining soil fertility, erosion, salination and
staples. Government mandates to use ethanol, a corn-based biofuel, also increase volatility as well as
price. And as volume in futures markets has increased, this also makes the price of food vulnerable to
volatility: High volatility attracts more financial market participants, who learn that they can make money
on trading, which can amplify instability. Finally, high futures market prices lead to high current market
prices, a consequence of speculation. Food Prices Food Price Spikes Food price spikes are certainly not
unprecedented. Remember the major shocks of the 1970s? But food price spikes returned with a
vengeance in this century and conditions threaten more. Joachim von Braun, a professor at the University
of Bonn and former director general of International Food Policy Research Institute, said the new spikes are
driven by three factors: Energy markets: High oil prices are not just raising the costs of fertilizer but also
giving farmers in rich countries incentive to use their crops for biofuel. Financial markets: There is a clear
and growing link between food market volatility and financial crises. Speculation: The "speculation effect
partly depends on the 'nervousness' of the market," von Braun explained. "What is called speculation
actually stabilizes prices when the market is less nervous," because it can push markets to find prices
consistent with supply and demand more quickly. But speculation is destabilizing "when the market
becomes nervous as a result of changes in fundamentals, policies and structures." Shifts in sentiment can
result in spikes.
The biggest threat to global stability is the potential for food crises in poor
countries to cause government collapse. Those crises are brought on by ever worsening
environmental degradation One of the toughest things for people to do is to anticipate sudden change.
Typically we project the future by extrapolating from trends in the past. Much of the time this approach
works well. But sometimes it fails spectacularly, and people are simply blindsided by events such as
today's economic crisis. For most of us, the idea that civilization itself could disintegrate probably seems
preposterous. Who would not find it hard to think seriously about such a complete departure from what we
expect of ordinary life? What evidence could make us heed a warning so dire--and how would we go about
responding to it? We are so inured to a long list of highly unlikely catastrophes that we are virtually
programmed to dismiss them all with a wave of the hand: Sure, our civilization might devolve into chaos--
the environmental declines that are undermining the world food economy--most important, falling water
tables, eroding soils and rising temperatures--forces me to conclude that such a collapse is possible. The
field are well into our third decade of charting trends of environmental decline without seeing any
world carryover stocks of grain (the amount in the bin when the new harvest begins) were at 62 days of
consumption, a near record low. In response, world grain prices in the spring and summer of last year
the steep climb in grain prices in 2008, the number of failing states was expanding [see sidebar at left].
if the food
situation continues to deteriorate, entire nations will break down at an
ever increasing rate. We have entered a new era in geopolitics. In the 20th century
the main threat to international security was superpower conflict;
today it is failing states. It is not the concentration of power but its absence that puts us at
risk. States fail when national governments can no longer provide personal security,
food security and basic social services such as education and health care. They often lose control of
Many of their problem's stem from a failure to slow the growth of their populations. But
part or all of their territory. When governments lose their monopoly on power, law and order begin to
disintegrate. After a point, countries can become so dangerous that food relief workers are no longer safe
and their programs are halted; in Somalia and Afghanistan, deteriorating conditions have already put such
piracy. Iraq, number five, is a hotbed for terrorist training. Afghanistan, number seven, is the world's
leading supplier of heroin. Following the massive genocide of 1994 in Rwanda, refugees from that troubled
state, thousands of armed soldiers among them, helped to destabilize neighboring Democratic Republic of
the Congo (number six).
There is a growing appreciation that the conflicts in the next century will
most likely be fought over a lack of resources. Yet, in a sense, this is not new.
Researchers point to the French and Russian revolutions as conflicts induced by a
lack of food. More recently, Germanys World War Two efforts are said to have
been inspired, at least in part, by its perceived need to gain access to more food . Yet
the general sense among those that attended FDIs recent workshops, was that the scale of the problem in
the future could be significantly greater as a result of population pressures, changing weather,
urbanisation, migration, loss of arable land and other farm inputs, and increased affluence in the developing world. In his
Lindsay Falvey, a participant in FDIs March 2012 workshop on the issue of food
expresses the problem and why countries across the globe are starting to take note. . He
writes (p.36), if people are hungry, especially in cities, the state is not stable riots,
violence, breakdown of law and order and migration result. Hunger feeds anarchy. This view is also shared by Julian
Cribb, who in his book, The Coming Famine, writes that if large regions of the world run
short of food, land or water in the decades that lie ahead, then wholesale, bloody wars are
liable to follow. He continues: An increasingly credible scenario for World War
3 is not so much a confrontation of super powers and their allies, as a festering, self-perpetuating
chain of resource conflicts. He also says: The wars of the 21st Century are less likely to be global
book, Small Farmers Secure Food,
and conflict, clearly
conflicts with sharply defined sides and huge armies, than a scrappy mass of failed states, rebellions, civil strife,
insurgencies, terrorism and genocides, sparked by bloody competition over dwindling resources. As another workshop
participant put it, people do not go to war to kill; they go to war over resources, either to protect or to gain the resources
for themselves. Another observed that hunger results in passivity not conflict. Conflict is over resources, not because
Econ
A terrorist attack would crush the economy
Bandyopadhyay et al 15
Another terrorist attack would create a global economic disaster , says economic
and political guru Gerald Celente, director of The Trends Research Institute. The wise investment strategy
in such a scenario would be to buy silver and gold while selling currencies, he tells King World News. What
will another major terror strike mean should an attack hit one of the major NATO nations? Celente says.
The
effects this time will go global. Bank holidays will be called, the U.S. and other
fragile economies will crumble, gold and silver will soar, and already troubled
currencies will crash. Economic martial law will be declared, promised as a temporary measure.
Once in place it will remain in place. And dont expect your ATM card to be of much use. With banks
closed and economic martial law in place, restrictions will be set on the
amounts, times and frequencies of withdrawals (of cash). It will be essential
to have a stash of cash on hand, Celente says.
to the affected nation. For example, from the mid-1970s through 1991, terrorist incidents reduced net foreign direct
the initial
loss of productive resources as a result of terrorism may increase manyfold
because potential foreign investors shift their investments to other, presumably
safer, destinations. Abadie and Gardeazabal (2008) showed that a relatively small increase in the
perceived risk of terrorism can cause an outsized reduction in a countrys net stock of
foreign direct investment and inflict significant damage on its economy. We analyzed 78 developing
economies over the period 19842008 (Bandyopadhyay, Sandler, and Younas, 2014) and found that on average a
relatively small increase in a countrys domestic terrorist incidents per
100,000 persons sharply reduced net foreign direct investment. There was a
similarly large reduction in net investment if the terrorist incidents originated
abroad or involved foreigners or foreign assets in the attacked country. We also found that greater official aid flows
investment in Spain by 13.5 percent and in Greece by 11.9 percent (Enders and Sandler, 1996). In fact,
can substantially offset the damage to foreign direct investmentperhaps in part because the increased aid allows
recipient nations to invest in more effective counterterrorism efforts. Most countries that experienced above-average
domestic or transnational terrorist incidents during 19702011 received less foreign direct investment or foreign aid than
the average among the 122 in the sample (see table). It is difficult to assess causation, but the table suggests a troubling
association between terrorism and depressed aid and foreign direct investment, both of which are crucial for developing
economies. It is generally believed that there are higher risks in trading with a nation afflicted by terrorism, which cause
an increase in transaction costs and tend to reduce trade. For example, after the September 11 attacks on New York City
and the Washington, D.C., area, the U.S. border was temporarily closed, holding up truck traffic between the United States
and Canada for an extended time. Nitsch and Schumacher (2004) analyzed a sample of 200 countries over the period
196093 and found that when terrorism incidents in a pair of trading countries double in one year, trade between them
estimated that terrorism and other internal and external conflicts retard trade as much as a 30 percent tariff. More
specifically, they found that any trading partner that experienced terrorism experienced close to a 4 percent reduction in
bilateral trade. But Egger and Gassebner (2015) found more modest trade effects. Terrorism had few to no short-term
effects; it was significant over the medium term, which they defined as more than one and a half years after an
attack/incident. Abstracting from the impact of transaction costs from terrorism, Bandyopadhyay and Sandler (2014b)
found that terrorism may not necessarily reduce trade, because resources can be reallocated. If terrorism
disproportionately harmed one productive resource (say land) relative to another (say labor), then resources would flow to
the labor-intensive sector. If a country exported labor-intensive goods, such as textiles, terrorism could actually lead to
increased production and exportation. In other words, although terrorism may reduce trade in a particular product
because it increases transaction costs, its ultimate impact may be either to raise or reduce overall trade. These
apparently contradictory empirical and theoretical findings present rich prospects for future study. Of course terrorism has
repercussions beyond human and material destruction and the economic effects discussed in this article. Terrorism also
influences immigration and immigration policy. The traditional gains and losses from the international movement of labor
may be magnified by national security considerations rooted in a terrorism response. For example, a recent study by
Bandyopadhyay and Sandler (2014a) focused on a terrorist organization based in a developing country. It showed that the
immigration policy of the developed country targeted by the terrorist group can be critical to containing transnational
terrorism. Transnational terrorism targeted at well-protected developed countries tends to be more skill intensive: it takes
a relatively sophisticated terrorist to plan and successfully execute such an attack. Immigration policies that attract highly
skilled people to developed countries can drain the pool of highly skilled terrorist recruits and may cut down on
transnational terrorism.
rather than a host for affiliates of foreign MNEs, has become a preferred host country for FDI since the
of the U.S. economy, and total FDI inflows reached US$ 227 billion in 2011,
economic crises negatively impacted FDI flows to th e United States and opened a period of major
Retaliation
Terrorist retaliation causes nuclear war draws in Russia and
China
major
nuclear weapons states have hundreds and even thousands of nuclear
weapons at their disposal, there is always the possibility of a truly awful nuclear exchange
taking place precipitated entirely by state possessors themselves. But these two nuclear
worldsa non-state actor nuclear attack and a catastrophic interstate
nuclear exchangeare not necessarily separable. It is just possible that
some sort of terrorist attack, and especially an act of nuclear terrorism, could
precipitate a chain of events leading to a massive exchange of nuclear
weapons between two or more of the states that possess them . In this
would have wrought in the Cold War period. And it must be admitted that as long as the
context, todays and tomorrows terrorist groups might assume the place allotted during the early
Cold War years to new state possessors of small nuclear arsenals who were seen as raising the risks
of a catalytic nuclear war between the superpowers started by third parties. These risks were
considered in the late 1950s and early 1960s as concerns grew about nuclear proliferation, the socalled n+1 problem. t may require a considerable amount of imagination to depict an especially
plausible situation where an act of nuclear terrorism could lead to such a massive inter-state nuclear
war. For example, in the event of a terrorist nuclear attack on the United States, it might well be
wondered just how Russia and/or China could plausibly be brought into the picture, not least because
they seem unlikely to be fingered as the most obvious state sponsors or encouragers of terrorist
groups. They would seem far too responsible to be involved in supporting that sort of terrorist
behavior that could just as easily threaten them as well. Some possibilities, however remote, do
suggest themselves. For example, how might the United States react if it was thought or discovered
that the fissile material used in the act of nuclear terrorism had come from Russian stocks,40 and if
for some reason Moscow denied any responsibility for nuclear laxity? The correct attribution of that
nuclear material to a particular country might not be a case of science fiction given the observation
by Michael May et al. that while the debris resulting from a nuclear explosion would be spread over a
wide area in tiny fragments, its radioactivity makes it detectable, identifiable and collectable, and a
wealth of information can be obtained from its analysis: the efficiency of the explosion, the materials
used and, most important some indication of where the nuclear material came from.41
Alternatively, if the act of nuclear terrorism came as a complete surprise, and American
officials refused to believe that a terrorist group was fully responsible (or responsible at all)
suspicion would shift immediately to state possessors . Ruling out Western ally
countries like the United Kingdom and France, and probably Israel and India as well, authorities in
it is just
possible that Moscow and/or China might mistakenly read this as a sign of
U.S. intentions to use force (and possibly nuclear force) against them. In that
situation, the temptations to preempt such actions might grow , although it must
In such a tense environment, when careful planning runs up against the friction of reality,
be admitted that any preemption would probably still meet with a devastating response.
In a remarkable website on nuclear war, Carol Moore asks the question "Is
Nuclear War Inevitable??" [10].4 In Section 1, Moore points out what most
terrorists obviously already know about the nuclear tensions between
powerful countries. No doubt, they've figured out that the best way to
throughout the Earth in the nuclear fallout, bringing death or else radiation
disease that would be genetically transmitted to future generations in a
nuclear winter that could last as long as a 100 years, taking a savage toll
upon the environment and fragile ecosphere as well.
It can
affect multiple audiences for many purposes: bolstering public opinion, destroying/disrupting terrorist
infrastructure, and potentially deterring the choice of the terrorist tactic. Symmetry, proportionality, and
discrimination in the targeting of retaliation all vary its effects on audiences. To deter terrorists and their
supporters, retaliation must meet the requirements of deterrence theory: credibility, shared interest, and
A successful terrorist attack of any proportion by a Pakistan-based group or groups would have significant
domestic and foreign policy implications for the United States. Although the economic repercussions are
unlikely to be as severe as those following 9/11, even a small attack could trigger a short-term dip in
presidential campaign season. The immediate impact on U.S.-Pakistan relations would depend on several
factorsthe nature and scale of the harm committed; which group(s), if any, claimed responsibility; the
immediate public response by the Pakistan civilian government and military; and the level of cooperation
they subsequently offered. The number of people killed is likely to be among the largest determining
factors in a response, though an attack against a political or military target that causes few casualties
could shrink significantly, Pakistani counterterrorism cooperation could cease, and in a worst-case scenario
the threat to American
Anti-Black Terrorism
Terrorists are destroying historically Black churches
throughout the South in the wake of the mass murder in
Charleston, South Carolina. This not only represents
thousands of dollars in damages to the churches but also
a resurfacing of decades of terror in the Jim Crow South.
Emma Green, managing editor of TheAtlantic.com, 7-1-2015, "Black
Churches Are Burning Again in America," Atlantic,
http://www.theatlantic.com/national/archive/2015/07/arson-churches-northcarolina-georgia/396881/
On Wednesday, July 1, a fire was reported at the Mount Zion African
Methodist Episcopal Church in Greeleyville, South Carolina. The AP reports
that an anonymous federal official said the fire did not appear to be intentionally set, but Winfred Pressley,
a division operations officer at the regional Alcohol, Firearms, and Tobacco division, said that the
investigation is still ongoing, as did other local investigators. Shanna Daniels, a spokesperson for the FBI,
declined to comment on the case, but said that church arson has been a hot topic over the past few
news station they believed it was an act of vandalism, although they arent investigating the incident as a
hate crime. (There have also been at least four other cases of fires at churches in the past fortnight. At
Fruitland Presbyterian Church in Gibson County, Tennessee, and the Greater Miracle Temple Apostolic
Holiness Church in Tallahassee, Florida, officials suspect the blazes were caused by lightning and electrical
wires, respectively, but investigations are still ongoing. A church that is not predominantly blackCollege
Heights Baptist Church in Elyria, Ohiowas burned on Saturday morning. The fire appears to have been
started in the sanctuary, and WKYC reports that the cause is still under investigation. The towns fire and
police departments did not immediately return calls for confirmation on Sunday.* And a Monday, June 29,
College Hills Seventh Day Adventist Church in Knoxville, Tenn., on June 22. The Knoxville fire department
said the arsonist set multiple fires on the churchs property. The churchs van was also burned. The very
next day, a fire in the sanctuary of Gods Power Church of Christ in Macon, Ga., was also blamed on arson.
And the day after that, a fire was deliberately set at the Briar Creek Baptist Church in Charlotte, N.C., that
destroyed an education wing meant to house a summer program for children. The gymnasium and
sanctuary burned, causing an estimated $250,000 in damage. That same week, three other Southern Black
churches in Tennessee, Florida and South Carolina also suffered fires, although two may have had
to assume that, in this day and age of wide surveillance, they have knowledge of them.
Turns Case
Terrorism is used as a justification for increased
surveillance empirics prove and turns case
Haggerty and Gazso 2005 (Kevin, Professor of Criminology and
Sociology at the University of Alberta; Amber, Associate Professor in the
Department of Sociology at York University, The Canadian Journal of Sociology
/ Cahiers canadiens de sociologie, Vol. 30, No. 2 ( Spring, 2005), pp. 169-187
Seeing beyond the Ruins: Surveillance as a Response to Terrorist Threats
JSTOR; accessed 7/17/15 JH @ DDI)
A climate of fear and anxiety helped ease the passage of such laws (Davis, 2001).
However, a great deal of organizational opportunism was also at work. Many of the surveillance
proposals adopted in the days after the attack were recycled from earlier
legislative efforts. In previous incarnations these proposals had often been legitimated as essential
for the international "war on drugs" or to address other crimes, such as money laundering. The
September 11 th attacks gave the authorities a new and apparently
unassailable legitimation for long-standing legislative ambitions. Before the
dust had settled on Manhattan, the security establishment had mobilized to
expand and intensify their surveillance capabilities, justifying existing
proposals as necessary tools to fight the new war against terrorism . Ultimately,
the police, military and security establishment reaped an unanticipated windfall of increased funding, new
technology and loosened legislative constraints by strategically invoking fears of future attacks. There are
several examples of such opportunism. Since at least 1999, when Congress initially turned down their
request, the U.S. Justice Department has lobbied for the development of new "secret search" provisions.
Likewise, prior to the attacks, the FBI and the National Telecommunications and Information Systems
Security Committee had a lengthy shopping list of desired surveillance-related measures including legal
enhancements to their wiretapping capabilities, legal constraints on the public use of cryptography, and
provisions for governmental agents to compel Internet service providers to provide information on their
depositors were originally justified by the authorities as a means to counter the "war on drugs." The
opportunism of many of these efforts was inadvertently revealed by an RCMP Sergeant when, during a
discussion about new official antiterrorism powers to monitor financial transactions, he noted that: "We've
been asking for something like this for four years. It's really our best weapon against biker gangs"
[emphasis added] (Corcan, 2001). In Canada, the Federal Privacy Commissioner was particularly alarmed
by the development of what he referred to as a "Big Brother database." This amounts to a detailed
computerized record of information about Canadian travelers. Although justified as a means to counter
terrorism, the data will be made available to other government departments for any purpose they deem
terrorist database will be used to help monitor tax evaders and catch domestic criminals. It will also be
used to scrutinize an individual's travel history and destinations, in an effort to try and determine whether
they might be a pedophile or money launderer (Radwanski, 2002). While these are laudable goals, they
ideologically motivated individuals. In many ways it seems apt, and any challenge is welcome to the all too
basic distinction that imbues group terror with motive while dismissing individual acts as madness. The
"lone wolf" straddles the ill-conceived gap between madman and terrorist node. It's an intersection all too
complicated for the inexpert punditry of Fox News: "They are terrorist acts, to be sure," Megyn Kelly said
about Canadian gunman Michael Zehaf-Bibeau, adding "but this guy was also a nutcase." Furthermore, the
assumption that terror acts were always borne of connected networks problematically buoyed domestic
counter-terror efforts that saw entire communities profiled as potential threats. Under the premise that
terror networks ran like arteries through US Muslim communities enabled an era of profile-driven
preemptive policing that has been nothing short of racist. Entire mosques in New York were designated
terrorist organizations to enable police surveillance. The NSA's meta-data collections claim justifiability on
the premise that terror was locatable by tracing networks of communication. The "lone wolf" phenomenon
should at least prompt the questioning of the sort of profile-based counter-terror efforts that assumed
terror lurked in any network of Muslims, and that the mass hoarding of communications data was vital to
Terrorists succeed when they are abetted by intelligence failures. Or, put another way, terrorists only need
to get lucky once to succeed, whereas counterterrorism has to be lucky all the time to succeed. Even
robust intelligence and law enforcement may not guarantee 100 percent safety and security. By global
standards certainly by the standards of Western democracies France has a particularly formidable
the benefits of a stronger official response is that it is a hedge both against dangerously stronger
vigilantism and also against additional pressure from some segments of the public to do more than is wise.
Minister Jean Chretien denounced the cowardly and depraved assault. He tightened security along the
border and arranged for hundreds of grounded airplanes to land at Canadian airports. Even leaders of
countries that did not tend to get along terribly well with the American government expressed their sorrow
and dismay. The Cuban foreign minister offered airspace and airports to American planes. Chinese and
Iranian officials sent their condolences. And the Palestinian leader Yasser Arafat, visibly dismayed, told
reporters in Gaza that the attacks were unbelievable, unbelievable, unbelievable. We completely
condemn this very dangerous attack, he said, and I convey my condolences to the American people, to
the American president and to the American administration. But public reaction was mixed. The leader of
the Islamic militant group Hamas announced that no doubt this is a result of the injustice the U.S.
practices against the weak in the world. Likewise, people in many different countries believed that the
attacks were a consequence of Americas cultural hegemony, political meddling in the Middle East and
interventionism in world affairs. The Rio billboards hadnt been up for long before someone defaced them
with the slogan The U.S. is the enemy of peace. Some, especially in Arab countries, openly celebrated
the attacks. But most people, even those who believed that the United States was partially or entirely
On
September 12, the 19 ambassadors of the North Atlantic Treaty Organization
(NATO) declared that the attack on the United States was an attack on all of
the member nations. This statement of solidarity was mostly symbolicNATO
did not authorize any specific military actionbut it was still unprecedented. It
was the first time that the organization had ever invoked the mutual defense
section of its charter (intended to protect vulnerable European nations from
Soviet invasion during the Cold War). NATO eventually sent five airplanes to
help keep an eye on American airspace. Likewise, on September 12 the
United Nations Security Council called on all nations to redouble their
efforts to thwart and prosecute terrorists. Two weeks later, it passed another
resolution that urged states to suppress the financing of terrorism and to
aid in any anti-terrorism campaigns. But these declarations of support and solidarity didnt
responsible for its own misfortune, still expressed sorrow and anger at the deaths of innocent people.
mean that other countries gave the United States a free hand to retaliate however, and against whomever,
it pleased. Allies and adversaries alike urged caution, warning that an indiscriminate or disproportionate
reaction could alienate Muslims around the world. In the end ,
***Aff***
***Aff Uniqueness***
No terrorism
Terrorism isnt an existential threat Obama confirms, intelligence
hasnt found any terrorists
Mueller and Stewart 15 (John Mueller and Mark Stewart, professor of political
science at Ohio State University and engineer and risk analyst at the University of
Newcastle in Australia, 2-24-2015, "Terrorism poses no existential threat to America. We
must stop pretending otherwise," Guardian,
http://www.theguardian.com/commentisfree/2015/feb/24/terrorism-poses-noexistential-threat-to-america)//MJ
One of the most unchallenged, zany assertions during the war on terror has been that
terrorists present an existential threat to the United States, the modern state and civilization itself.
This is important because the overwrought expression, if accepted as valid, could close off evaluation of security efforts.
For example, no defense of civil liberties is likely to be terribly effective if people believe the threat from terrorism to be
existential. At long last, President Barack Obama and other top officials are beginning to back away
from this absurd position. This much overdue development may not last, however. Extravagant alarmism about
the pathological but self-destructive Islamic State (Isis) in areas of Syria and Iraq may cause us to backslide. The
notion that international terrorism presents an existential threat was spawned by the
traumatized in the immediate aftermath of 9/11. Rudy Giuliani, mayor of New York at the time, recalls
that all security experts expected dozens and dozens and multiyears of attacks like this and, in her book The Dark Side,
Jane Mayer observed that the only certainty shared by virtually the entire American intelligence community was that a
second wave of even more devastating terrorist attacks on America was imminent. Duly terrified, US
intelligence services were soon imaginatively calculating the number of trained al-Qaida
operatives in the United States to be between 2,000 and 5,000. Also compelling was the
extrapolation that, because the 9/11 terrorists were successful with box-cutters, they might well be able to turn out nuclear
weapons. Soon it was being authoritatively proclaimed that atomic terrorists could destroy
civilization as we know it and that it was likely that a nuclear terrorist attack on the
United States would transpire by 2014. No atomic terrorists have yet appeared (al-Qaidas
entire budget in 2001 for research on all weapons of mass destruction totaled less than $4,000), and intelligence has
been far better at counting al-Qaida operatives in the country than at finding them. But the
notion that terrorism presents an existential threat has played on. By 2008, Homeland Security Secretary Michael
Chertoff declared it to be a significant existential one - carefully differentiating it, apparently, from all those insignificant
existential threats Americans have faced in the past. The bizarre formulation survived into the Obama years. In October
2009, Bruce Riedel, an advisor to the new administration, publicly maintained the al-Qaida threat to the country to be
existential. In 2014, however, things began to change. In a speech at Harvard in October, Vice President Joseph Biden
offered the thought that we face no existential threat none to our way of life or our
ultimate security. After a decent interval of three months, President Barack Obama reiterated this point
at a press conference, and then expanded in an interview a few weeks later, adding that the US should not provide a
victory to these terrorist networks by over-inflating their importance and suggesting in some fashion that they are an
existential threat to the United States or the world order. Later, his national security advisor, Susan Rice, echoed the
point in a formal speech. It is astounding that these utterances blindingly obvious as security specialist Bruce Schneier
puts it appear to mark the first time any officials in the United States have had the notion and the courage to say so in
public. Whether that development, at once remarkable and absurdly belated, will have some consequence, or even
continue, remains to be seen. Senators John McCain and Lindsay Graham have insisted for months that Isis presents an
existential threat to the United States. An alarmed David Brooks reported that financial analysts have convinced
themselves that the group has the potential to generate a worldwide economic cataclysm. And General Michael Flynn,
recently retired as head of the Defense Intelligence Agency, has been insisting that the terrorist enemy is committed to
the destruction of freedom and the American way of life while seeking world domination, achieved through violence and
bloodshed. It was reported that his remarks provoked nods of approval, cheers and ultimately a standing ovation from
the audience. Thus even the most modest imaginable effort to rein in the war on terror hyperbole may fail to gel.
news/2014/jul/07/islamist-terror-threat-out-proportion-former-mi6-chief-richarddearlove)//MJ
The government and media have blown the Islamist terrorism threat out of proportion,
giving extremists publicity that is counter-productive, a former head of Britain's
intelligence service has said. Sir Richard Dearlove, chief of MI6 at the time of the Iraq invasion, said
that Britons spreading "blood-curdling" messages on the internet should be ignored. He told an audience in
London on Monday there had been a fundamental change in the nature of Islamist extremism since the
Arab spring. It had created a major political problem in the Middle East but the west, including Britain, was
only "marginally affected". Unlike the threat posed by al-Qaida before and in the aftermath of
the 9/11 attacks 13 years ago, the west was not the main target of the radical
fundamentalism that created Isis, (the Islamic State in Iraq and the Levant), Dearlove said.
Addressing the Royal United Services Institute, the London-based security and defence thinktank, he said
the conflict was "essentially one of Muslim on Muslim". He made it clear he believed the way
the British government and the media were giving the extremists the "oxygen of publicity" was counterproductive. The media were making monsters of "misguided young men, rather pathetic figures" who were
getting coverage "more than their wildest dreams", said Dearlove, adding: "It is surely better to ignore
them." The former MI6 chief, now master of Pembroke College, Cambridge University, was speaking to a
prepared text hours after the ITV programme Good Morning Britain broadcast an interview with a Briton
who had appeared in an Isis video saying he was recruited through the internet and was prepared to die
for his cause. Abdul Raqib Amin, who was brought up in Aberdeen, appeared in an online video last month
with two men from Cardiff urging western Muslims to join the fighting with Isis. He told Good Morning
Britain: "I left the UK to fight for the sake of Allah, to give everything I have for the sake of Allah. One of
the happiest moments in my life was when the plane took off from Gatwick airport. I was so happy, as a
Muslim you cannot live in the country of kuffars [non-believers]."Amin added: "I left the house with the
intention not to go back, I'm going to stay and fight until the khilafah [rule of Islam] is established or I die."
Dearlove said he was concerned about the influence of the media on the government's
security policy. It was time to take what he called a "more proportionate approach to
terrorism". MI5, MI6, and GCHQ devoted a greater share of their resources to countering Islamist
fundamentalism than they did to the Soviet Union during the cold war, or to Irish terrorism that had cost
the lives of more UK citizens and British soldiers than al-Qaida had done, Dearlove noted. A massive
reaction after the 9/11 attacks was inevitable, he said, but it was not inevitable the 2001
attacks would continue to "dominate our way of thinking about national security". There
had been a "fundamental change" in the nature of the threat posed by Islamist
extremists. Al-Qaida had largely failed to mount the kind of attacks in the US and UK it
had threatened after 9/11. It was time, he said to move away from the "distortion" of the
post-9/11 mindset, make "realistic risk assessments" and think rationally about the
causes of the crisis in the Middle East.
9/11 style terrorism isnt a thing anymore new terrorists are
homegrown and dont have skills or resources to carry out an attack
Brooks 11 (Risa A, assistant professor of political science at Marquette University,
where she specialized in the study of civil-military relations and terrorist organizations,
The Exaggerated Threat of American Muslim Homegrown Terrorism. Harvard
Kennedy School Belfer Center for Science International Affairs. December 2011.
http://belfercenter.ksg.harvard.edu/files/brooks_policybrief_dec_2011.pdf)//MJ
LITTLE EVIDENCE OF AMERICAN MUSLIMS PLOTTING ATTACKS In recent years, public officials in the United States
and terrorism analysts here and abroad have warned of an increasing threat of Muslim homegrown terrorist attacks. The
terrorist attacks in Madrid in 2004 and in London in 2005 perpetrated by European homegrown terrorists have
contributed to these concerns, as has the surge in terrorist-related arrests in the United States in 2009 and 2010. Among
these are the highprofile arrests of Maj. Nidal Hasan, who engaged in a deadly shooting spree at Fort Hood, Texas, in
November 2009, and Faisal Shahzad, who attempted to bomb Times Square in May 2010. A closer look at the evidence,
however, reveals that the threat of American Muslims engaging in lethal attacks in the United
States has been frequently overstated. Contrary to the conventional wisdom, American Muslims do
not appear to be increasingly motivated to commit terrorist acts in the United States.
Recent studies of the radicalization of American Muslims accused of engaging in domestic terrorism have explored the
life histories of these individuals, and they have provided insight into the extremist beliefs and changes in behavior that
preceded the turn to violence. Yet these studies offer little evidence that American Muslimseven
other actions by law enforcement could be contributing to the increase in the number of
individuals charged with terrorism-related offenses independent of any larger trends in
the American population. Even if more American Muslims were to engage in homegrown
terrorism, their attacks would likely fail either because of technical error or because authorities
were able to discover their plots before they could be executed. Unlike the September 11 hijackers,
American Muslim homegrown terrorists tend to be amateurs and often lack the basic
skills of terrorist tradecraft. Moreover, opportunities to enhance their skills are limited.
Technical information available online is often incomplete or poorly presented, and perfecting the skills to
manufacture explosives and cultivate other expertiseincluding the ability to maintain operational
security when preparing attacks and recruiting other militants increases the risk of exposure. For these
reasons, every attempted terrorist plot by American Muslims in the United States has
ended in the arrests of the would-be perpetrators, with the exception of Shahzad and two others, Carlos
Bledsoe and Maj. Nidal Hasan. In fact, the evidence suggests that engaging in terrorist activity in the United States carries
a serious risk of exposure. First, although difficult to quantify, societal awareness about terrorism has grown considerably
over the years. In October 2010, for example, members of a Hawaiian mosque reported to authorities a new member
whose recent move to the area raised their suspicions. Contrast this with the hospitality and no-questions-asked reception
that the Muslim community in San Diego gave to two of the September 11 hijackers in the months preceding the attacks.
Additionally, over the past decade, alert citizens otherwise unacquainted with the would-be perpetrators have reported
apparent terrorist activity involving American Muslims to authorities. Second, as the result of both a significant
investment in grassroots counterterrorism efforts spanning the federal, state, and local levels as well as expanded
prerogatives such as the availability of FBI assessments, would-be terrorists must contend with an increasingly
sophisticated monitoring investigative apparatus. Third, American Muslim communities have demonstrated a willingness
to report aspiring terrorists in their midsta dynamic that, according to several studies, has occurred in more than 20
percent of terrorism-related cases. Consider that Shahzad is the only homegrown Muslim terrorist unknown to authorities
before he tried to execute his plot. Equally telling is why he failed: according to New York Police Commissioner Raymond
Kelly, Shahzad purposely fabricated his bomb with inferior-grade fertilizer to evade detection. RISKS OF
EXAGGERATING THE THREAT Since September 11, American Muslims have executed two
successful terrorist attacks in the United States the Fort Hood shootings by Maj. Nidal Hasan in
November 2009 and a lesser-known attack by Carlos Bledsoe on a U.S. Army recruiting station in Little Rock, Arkansas, in
June 2009. Although both cases could be cited as evidence of the dangers of lone wolves, the small number of
such attacks, despite their operational simplicity, suggests either that there are no aspiring
terrorists in the country or that even plotters of simple terrorist attacks are being
detected before they can harm Americans.
Terrorist threats overblown terrorists dont have resources to
attack the US and face hella opposition
Gillespie 14 (Nick, editor in chief of Reason.com and the co-author of The Declaration
of Independents: How Libertarian Politics Can Fix Whats Wrong with Americal, holds a
Ph.D. in English literature from the State University of New York at Buffalo, Why We
Shouldn't Be Scared of ISIS: Threat Inflation and Our Next Dumb War, The Daily Beast,
9-10-14, http://www.thedailybeast.com/articles/2014/09/10/why-we-shouldn-t-bescared-of-isis-threat-inflation-and-our-next-dumb-war.html)//MJ
God willing, proclaims an ISIS spokesman, we will raise the flag of Allah in the White
House. Administration officials are only too happy to play along as well. ISIS, explains Deputy
Assistant Secretary of State Brett McGurk, is worse than al Qaeda, while a deputy secretary of defense warns that ISIS
has proclaimed, Were coming for you, Barack Obama. And so were being gulled into a new-and-
improved crusade to fix a Middle East still utterly destabilized in large part due to our
still-smoldering failure to reshape desert sand into a form more to our desires. As we prep
for the next smart war engineered by Obama (hes against dumb wars, remember, and lives by the credo dont do
stupid shit), its worth acknowledging that the signature characteristic of Americas 21st-century
war on terrorism and foreign policy has been massive threat inflation at every level. Until
we fully grok that terrorismwhether state-sponsored or statelessthrives on the overreaction of its targets and that we
have overreacted so far at virtually every turn, we have no hope of enacting real solutions. Domestically, we are finally
beginning to understand that threat inflation has produced results like the petty, ineffective, and
costly indignities that we experience each and every time we board an airplane. Even brassballed, pro-security Republicans who are otherwise quick to redact the Constitution in the name of national security
understand that the Transportation Security Administration exemplifies wasted time and money. Every time you
raise your hands in the air and get irradiated in the name of national security, the
terrorists have won another small victory. On the 10th anniversary of the TSAs creation,
Reps. Paul Broun (R-Ga.) and John Mica (R-Fla.) released a report that concluded (in
Brouns words), Americans have spent nearly $60 billion, and they are no safer today
than they were before 9/11. The simple act of reinforcing cockpit doors has guaranteed that an American
airliner will not be hijacked and used as a missile again. The TSA, by contrast, exemplifies security theater, or visible
actions to make people feel comfortable while doing nothing to actually increase safety. The sheen has also mostly worn
off The Patriot Act, that awful, Constitution-shredding piece of legislation that, until the passage of Obamacare, held the
record for being the least-read law that was rubber-stamped by a pliant Congress (at least our representatives debated The
Affordable Care Act). Ongoing revelations about massive bipartisan government abuses of power and the general
ineffectiveness of the Patriot Act have driven home the reality that government will use whatever powers it has to do pretty
much whatever it can get away with. But when it comes to foreign threats in foreign lands, were still as gullible as the
tourists Mark Twain chronicled in Innocents Abroad. As Ohio State University political scientist John
Mueller has written, at least since 9/11, our elected officials and policymakers have been
quick to designate any number of states (Iraq, Iran, North Korea, for starters) and terrorist groups
(the Taliban, al Qaeda, and now ISIS) as existential threats to the United States and our way of
life. This is, to say the least, preposterous. Unlike, say, the old Soviet Union, which controlled a vast
nuclear arsenal capable of blowing up the planet and a large number of vassal states, none of these enemies has
the military or economic might to challenge the United States. As a misguided Turkish proverb
holds, explains Mueller, If your enemy be an ant, imagine him to be an elephant. The original sin of post-9/11 foreign
policy stems from the intertwined and equally mistaken ideas that al Qaeda was a potent, ongoing existential threat to
America and that the United States had a responsibility to nation build in the Islamic world rather than avenge
monstrous acts against its citizens. As Mueller and Mark G. Stewart note in their 2012 survey of Terrorism and CounterTerrorism Since 9/11 (PDF), the 9/11 attacks were not the start of a new era of mass terroristic
violence in the West. Terrorists are not really all that capable a bunch, terrorism tends
to be a counterproductive exercise, and 9/11 is increasingly standing out as an
aberration, not a harbinger, they write in their survey of 50 Islamist terrorist acts since
2001. The United States had every right and reason to destroy al Qaedas capabilities and hunt down its leadership
(which it eventually did do, after a long detour into Iraq). But apart from hawks who are always on the hunt for the next
military engagement, who among us will argue that Americas adventures in Afghanistan and Iraq have left those places
and neighboring areas more stable? As with al Qaeda back in the day, our fears of ISIS suffer from massive
threat inflation at every possible level. At the start of the summer, the number of ISIS
fighters in Iraq was somewhere in the neighborhood of 7,000 to 10,000; those numbers
have doubtless grown but they still face off against more than a quarter of a million Iraqi
troops and somewhere between 80,000 and 240,000 Peshmerga soldiers. Even the
much-maligned Free Syrian Army numbers 70,000 to 90,000. And, its worth pointing out, ISIS
is facing intense opposition (and some cooperation) from other jihadist groups,
including and especially al Qaeda. If the Iraqi armed forces are in fact incapable of fighting successfully
against ISIS after years of training and resources given them by the United States, there is in fact little we will be able to do
to change things in Iraq (Obama has already ruled out boots on the ground, and its unlikely he will change course
between now and leaving office). At the same time, were now in a position where we are de facto allies with at least two of
our longtime enemies in the immediate vicinity: Iran and Bashar al-Assad in Syria, whose government Barack Obama was
set to attack just a year ago. Indeed, the widely expected push to start bombing targets in Syria can only help Assad, who
earlier this year was supposedly close to total defeat. The United States and other Western countries being hit up to form
the next multinational coalition are now prepping their citizens to help keep Assad in power for the foreseeable future.
The Islamic State has demonstrated in the past year that it is quite adept in its use of
social media as a tool to raise money, recruit fighters and inspire grassroots jihadists to
conduct attacks. This week, however, its social media network was heavily focused on making threats. On May 11, Twitter users
associated with the Islamic State unleashed two seemingly unrelated threat campaigns. One using the hashtag #LondonAttack, displayed
photos of London and weapons (including AK-47 rifles and what appeared to be suicide bombs) and urged Muslims in the United Kingdom
not to visit shopping malls. The second campaign threatened to launch a cyber war against the United States and Europe. The Islamic State
took credit for the botched May 3 attack in Garland, Texas, saying it would carry out harder and "more bitter" attacks inside the United
States. Coinciding with the Islamic State's threats, FBI Director James Comey warned that his agency does not have a handle on the
grassroots terrorism problem in the United States. Department of Homeland Security Secretary Jeh Johnson noted that the United States
Michael Morell,
the former Deputy Director of the CIA, added his voice by claiming that the Islamic State
has the ability to conduct a 9/11-style attack today. While these statements and warnings
paint a bleak picture, a threat should never be taken at face value when placed into
context, these claims aren't as dire as they seem. Analyzing Threats When analyzing a direct
threat from a person or organization it is important to understand that in most cases
they come from a position of weakness rather than power. The old saying "all bark and
no bite" is based on this reality. This applies to personal threats as well as terror-related threats. Terrorism is
frequently used by weak actors as a way of taking asymmetrical military action against a
superior opponent. Despite its battlefield successes against the Iraqi and Syrian governments and militant groups, the Islamic
has entered "a new phase in the global terrorist threat, where the so-called lone wolf could strike at any moment."
State is certainly far weaker militarily than the United States and Europe. An important part of threat evaluation is assessing if the party
making the threat possesses both the intention to conduct such an action and the capability to carry out that intent. Indeed, many
threats are made by groups or individuals who have neither intent nor capability. They
are made simply to create fear and panic or to influence the conduct or behavior of the target, as in the cases of a
person who sends a "white powder" letter to a government office or a student who phones in a bomb threat to his school to get out of taking
a test. Generally,
No ISIS threat
ISIS hysteria is exaggerated and a result of media sentiment
Michael Calderon 9/14
Calderon 14 (Michael, senior media reporter for the Huffington Post, Americans
Panicked Over ISIS Threat That Experts Say Isn't Imminent, 9-9-14,
http://www.huffingtonpost.com/2014/09/09/isis-media-threat_n_5791594.html)
WASHINGTON -- When President Barack Obama calls Wednesday night to expand the fight abroad against Islamic State
militants, he'll be addressing an increasingly supportive public, recent polls suggest. Ninety-one percent of Americans see
the Islamic State as a "threat to the vital interests of the United States," according to a Washington Post/ABC News poll
published Tuesday. A CNN poll released Monday found that 90 percent of Americans view the
group as a very, fairly or somewhat serious threat. Such findings shouldn't come as a surprise to anyone
who's watched TV news lately, as numerous political leaders and cable pundits have urged Obama to
expand the campaign against the Islamic State beyond the air strikes already being carried out in
Iraq. Given the sheer volume of coverage -- the group has been mentioned over 3,800 times on CNN in the past two
weeks, according to monitoring service TVEyes -- it's understandable that Americans would widely perceive the extremist
group to be a threat to the country. But most of the press coverage has failed to draw a clear distinction
between an imminent threat to the U.S., marked by serious planning and capability, and
a potential one, such as a "lone wolf" terrorist who gets inspired by online propaganda . That
lack of clarity may be why seven in 10 Americans believe ISIS has the resources to launch an attack against the United
States," according to the CNN poll. Politicians, increasingly, are blurring those lines too. Senate Minority Leader Mitch
McConnell (R-Ky.) said Tuesday that the Islamic State is "obviously a threat to us," without elaborating on what he sees as
America's vulnerabilities. The Obama administration has proceeded with more caution. White House press secretary Josh
Earnest acknowledged during a Tuesday briefing that "the United States is not aware of any active plotting that is
underway to attack the homeland" -- a statement that echoes those made by several agencies in recent weeks. But Earnest
also said that it was "understandable" that Americans fear the Islamic State. "We have seen ISIL perpetrate terrible acts of
violence against American citizens. Im sure that is part of what is contributing to the information that youre seeing in the
polls," Earnest said. "The other thing that is undoubtedly true is that there are American interests in the region that are
under a pretty direct threat from ISIL." Earnest said that had the U.S. military not intervened, the American consulate in
Erbil, Iraq, could have been overrun by Islamic State fighters. "It does threaten American national security interests for
ISIL to be operating in a virtual safe haven along the vanishing border between Iraq and Syria," he said. The
distinction between a threat to the homeland and a threat to U.S. national security
interests in the Middle East has been borne out by statements from the intelligence
community. Secretary of Defense Chuck Hagel has said that the Islamic State poses an
imminent threat to U.S. interests abroad. But the FBI and the Department of Homeland
Security recently stated that the group poses no specific or credible terror threats to the
U.S. homeland." Similarly, Pentagon press secretary Rear Adm. John Kirby said last month that the Islamic State
does not have the capability right now to conduct a major attack on the U.S. homeland. National Counterterrorism
Center Director Matthew Olsen said Wednesday that we have no credible information that ISIL is
planning to attack the United States. The Islamic State certainly warrants media coverage, given its
territorial gains in Iraq and Syria and its brutal tactics, such as the gruesome beheadings of two American journalists in
recent weeks. Moreover, supporters of increased intervention argue that failing to address the threat in Iraq and Syria
could create a safe haven where militants could plot a future attack against the U.S., a similar rationale to the one used to
justify the war in Afghanistan. They also argue that members of the Islamic State who hold American or European
passports could reach U.S. soil and perpetrate an attack, or that someone in the U.S. who is inspired by the group could
build a crude bomb or stage a small-scale attack. But it's incumbent upon journalists to press administration officials and
lawmakers to explain what immediate, credible threats justify further military action against the Islamic State -- especially
after the 13 years of war that followed the Sept. 11 attacks. Several journalists have noted that calls for military
intervention run the risk of misleading the public. The Intercept's Glenn Greenwald pointed out Tuesday that months
after the Iraq invasion, 70 percent of Americans still wrongly believed that Saddam
Hussein had played a role in the Sept. 11 attacks. James Risen, a New York Times reporter who revealed
the NSAs warrantless wiretapping program during the Bush administration and is currently fighting to stay out of jail for
refusing to reveal his sources, tweeted several days ago that the fact that U.S. intelligence assesses that
ISIS poses no current threat to the US is repeatedly ignored by politicians and the
media. War fever in America always seems to develop in pretty much the same way, Risen tweeted later. Over and
over again. Andrew Sullivan wrote in a blog post published Tuesday that the recent polls suggests the Islamic State's goal
of terrorizing Americans has worked. "But I have yet to see or be shown any solid intelligence that suggests that these
fanatics are aiming at the US, Sullivan wrote. We may well have a problem of home-grown Jihadists returning and
wreaking havoc - but that is a manageable threat. And direct military intervention by the West could easily increase these
losers incentives to strike us here at home. So, in that narrow sense, this return to fighting other peoples civil wars in the
Middle East may actually increase the risks to us. Thats what I mean by 'taking the bait.'" Sullivan said he awaits Obamas
proof of ISIS threat to America and the West, as opposed to the kind of intelligence that gave us the Iraq War.
said its important to see the Islamic State for what it is and not to
exaggerate the groups strengths. When you look at ISIL, it has no governing strategy, Obama
said Sunday in an interview on CNNs Fareed Zakaria GPS. It can talk about setting up the new
caliphate, but nobody is under any illusions that they can actually in a sustained way feed
people or educate people or organize a society that would work. The Islamic State continues to
hold vast stretches of territory in Syria and Iraq. Winning the support of local populations is key to the militant groups
long-term success, but today its power is derived mostly through fear . In Raqqa, the groups headquarters
in Syria, public beheadings and crucifictions are regular occurrences. But perhaps more threatening to its long-term
stability is the groups inability to deliver a functioning government and a productive economy to the people who live in
the territory it controls. The Islamic State brags about its ability to administer services and promotes itself as an
alternative to the corruption and poor governance of the Syrian or Iraqi government, but reports of poverty, inflation,
water shortages and power outages are emerging from cities like Mosul in Iraq. With no journalists inside these places
though, it is difficult to get a clear picture of what life is really like there. Obama said its important we
which is now in place, and to grow the caliphate by continually annexing territory. Now ,
if you believe this author, and I have no reason to doubt him, ISIS is a minimal threat to the U.S. and not
worth throwing more taxpayer money into the rat hole desert of the Middle East. If you
think about the regional powers ISIS would have to defeat to expand its caliphate
Turkey, Iran, Jordan, Saudi Arabia, Israel, the Baghdad Shia military, the Syrian
military, as well as Egypt you realize exactly how minimal this threat is to America .
ISIS has no air force and no navy, and appears to be a large ideological ragtag gang of hooligan extremists
dressed in ski masks, toting machine guns, riding around in pickup trucks. Dont buy the warmongers sales job. The last
time we bought this sales job, the Bush administration took out Saddam Hussein, who had fallen into disfavor, and ISIS
was birthed. We took out another dictator in Libya with the same results. This time, demand the warmongers lay out the
endgame. No more American troops in the Middle East . It is a regional problem; make the regional
ISIS fails
ISIS will fail inevitably because they cant govern
Barrett 15, Richard Barrett, the senior vice president of the Soufan Group, is the former
director of global counterterrorism operations at MI6 and the former head of the Taliban
and Al Qaeda monitoring team at the United Nations. 6/1/15 ISIS Will Fall Through
Internal Revolt New York Times
http://www.nytimes.com/roomfordebate/2015/06/01/can-victory-over-isis-be-morethan-a-mirage/isis-will-fall-through-internal-revolt
What distinguishes the Islamic State from Al Qaeda and its other rivals is that it willingly
embraces the role of government. It advertises itself as the one place on earth where a Muslim can live
according to the rules and customs of his religion without any reinterpretation of or deviation from the practices
established by its founders. It does not just ask for people who can fight; it makes a very public appeal to all Muslims,
whatever their ages or skills, to come and help build every aspect of the state. It is as a state that ISIS will
succeed or fail. It can weather military defeats so long as it is not beaten completely , which
is unlikely in current circumstances, but it cannot so easily survive a collapse of its administrative
structures. If it proves not to be a state, or not a state where anyone wants to live, then it
will disappear. It is a sad fact that ISIS has been able to hold so much territory not just because of the horrific
violence with which it imposes its will, but also, and more important, because for many of its approximately six million
residents, its rule is in some ways better than what was there before. Before the advent of ISIS, the Sunni population in
western Iraq and eastern Syria suffered from poor governance at every level, and however appalling ISIS may be, it at least
offers quicker and more consistent justice and far less corruption. It follows that the best way to undermine ISIS is to offer
something better to replace it. At present, it is hard to conceive what better government in Iraq
and Syria would look like, or who would provide it. But if the only alternative on offer is a return to the past,
there will not be many takers. Rather than train up a few hundred rebels to fight ISIS in Syria, or worry about enabling
Shia militia by bombing Sunni targets in Iraq, it might be better to take a longer view. The future of Syria -- and
increasingly of Iraq -- lies in part with the millions of women and children who are now
refugees. Some will return, and they should do so with concepts of tolerance and justice,
not hatred in their hearts. Ultimately it is the people of Iraq and Syria who will
defeat ISIS, and they will do so not by fighting but by asserting values that
expose ISIS for what it is, an unsustainable and bloody dictatorship.
Even if ISIS has motives to attack, theyll fail historical evidence
Bergen 15 (Peter CNN's national security analyst, a vice president at New America and
professor of practice at Arizona State University, Why ISIS terrorism wont work, CNN,
2-6-15, http://www.cnn.com/2015/02/06/opinion/bergen-isis-terrorism/)//MJ
Similarly, 9/11
was a great tactical success for al Qaeda, but it also turned out be a great
strategic failure for Osama bin Laden. On 9/11 bin Laden's main strategic goal was to overthrow regimes
across the Middle East and to replace them with Taliban-style rule. He believed that the best way to accomplish this was to
attack the "far enemy" (the United States) and then watch as the U.S.-backed Arab regimes he termed the "near enemy"
toppled. This might have worked if the United States really was the paper tiger that bin Laden believed it to be, but not
only did bin Laden not achieve his war aims, the 9/11 attacks resulted in the direct
opposite of his goal of forcing a U.S. withdrawal from Muslim lands. After 9/11, American
soldiers occupied both Afghanistan and Iraq, and al Qaeda -- "the base" in Arabic -- lost the best base it ever had:
Afghanistan as it had existed before the overthrow of the Taliban by U.S. forces in late 2001. In short, bin Laden's
violent tactics did not serve his strategic goals, and al Qaeda's violence became only an
end in itself. That is where ISIS is today. Its strategy is incoherent because only a tiny
minority of Muslims want to live in the Taliban-style utopia that ISIS wants to bring to
the Muslim world, while at the same time ISIS' principal victims are fellow Muslims who don't share their views to
the letter. This is a decidedly mixed message for a group that presents itself as the defender of Muslims. Indeed, the
burning to death of the Jordanian pilot Moath al-Kasasbeh is an indelible image that will long serve to undercut any ISIS
bringing about their political objectives, but in some cases terrorism can actually work. This is the big,
uncomfortable takeaway of an important new book, "Anonymous Soldiers: The Struggle for Israel 1917-1947," about the
era that led up to the creation of Israel, written by the leading American terrorism expert, Bruce Hoffman. Hoffman
demonstrates that Jewish terrorism helped to push the British occupiers out of Palestine after World War II. Indeed,
Menachem Begin, the leader of the Irgun group that played an instrumental role in the Jewish terrorist campaign against
British and Arab targets, went on to become the Prime Minister of Israel and shared in a Nobel Peace Prize. Some 300
miles from where the Jordanian pilot was believed to have been burned alive by ISIS, almost seven decades ago two
soldiers were hanged from a tree in the land that is now called Israel. The soldiers were British and the executioners were
Jewish militants whose overall commander was Begin. The burning to death of the Jordanian pilot was, of course,
particularly abhorrent, but the hanging deaths of the two British soldiers in 1947 were greeted with as much outrage in the
United Kingdom as the pilot's death has had in Jordan. But after the killings of the British soldiers an unexpected thing
happened. The British, who had endured a campaign of terrorist attacks in Palestine, including the attack on Jerusalem's
iconic King David Hotel that killed 91 soldiers and civilians, didn't double down on their occupation of Palestine. Instead,
they washed their hands of it and packed up their bags and left, leading to the formation of the state of Israel in 1948.
The emerging scholarly consensus is that campaigns of terrorism can sometimes work to
achieve the goal of forcing the withdrawal of a colonial power as happened with the British in
Palestine, but more often than not terrorism doesn't succeed as a tactic to achieve the
strategic goals of terrorist groups, whether they are Marxist in orientation, or ultrafundamentalist jihadists. Instead, all too often violence becomes an end in itself for the
terrorist organization, which then loses any legitimacy that it might have once had and is
eventually wiped out by military or police action. That is the position that ISIS now finds
itself in with its killing of the Jordanian pilot.
ISIL and now calls itself the Islamic State). But the Pentagon soon corrected Hagel's comment, saying the 100 count is the
total number of Americans fighting for any of the various groups fighting in Syria, some of which are more militant than
others -- and some of which are even allied with the U.S. Indeed, Matthew Olsen, the director of the
National Counterterrorism Center -- the government office tasked with assessing terrorist threats -- also
confirmed that 100 is the total count of the various Americans fighting in Syria and not a
count of those fighting for ISIS. Hagel's comment is only the latest inflated claim regarding the number of
Americans fighting with ISIS. Last week, the Washington Times cited anonymous official sources who said there are 300
Americans fighting with ISIS, despite the Pentagon estimating the figure to be more like a dozen. Who is the ISIS? True, a
dozen is still too many. But it is important to remember that just because these Americans are
fighting with ISIS, it doesn't necessarily translate into a significant threat to the
American homeland. One need only look at the example of Somalia to see why. The last sizeable group of
Americans who went overseas to fight with an al Qaeda-aligned group are the 29
Americans known to have traveled to fight with the Somali terrorist group Al-Shabaab after
the 2006 invasion of Somalia by the Ethiopian army. However, none of those 29 subsequently planned or
conducted a terrorist attack inside the United States, according to a survey of more than 240 jihadist
terrorism cases since September 11 conducted by the New America Foundation. What can the U.S. do against ISIS and
could it work? Of course, the fact that 13 of the 29 American militants who fought in Somalia remain at large is a reminder
that the CIA and FBI also need to pay attention to the potential threat posed by American foreign fighters in Syria. But
this is no reason for U.S. officials to overhype the threat posed by ISIS to the United
States. Yes, Americans should always be mindful of the threats posed by extremists. But as the case of U.S. citizens in
Somalia suggests, Syria could very well end up being a graveyard for Americans fighting there
rather than a launch pad for attacks on the United States.
No Muslim terrorism
Most recent studies prove Muslims arent a threat right wing
extremists are the real threat
Kurzman and Schanzer 6/16 (Charles, professor of sociology at the University of
North Carolina at Chapel Hill, and David, director of the Triangle Center on Terrorism
and Homeland Security at Duke University, The Growing Right Wing Terror Threat,
The New York Times, June 6, 2015, http://www.nytimes.com/2015/06/16/opinion/theother-terror-threat.html?_r=0)//MJ
THIS month, the headlines were about a Muslim man in Boston who was accused of threatening police officers with a
knife. Last month, two Muslims attacked an anti-Islamic conference in Garland, Tex. The month before, a Muslim man
was charged with plotting to drive a truck bomb onto a military installation in Kansas. If you keep up with the
news, you know that a small but steady stream of American Muslims, radicalized by
overseas extremists, are engaging in violence here in the United States. But headlines can
mislead. The main terrorist threat in the United States is not from violent Muslim
extremists, but from right-wing extremists. Just ask the police. In a survey we conducted
with the Police Executive Research Forum last year of 382 law enforcement agencies, 74 percent reported
anti-government extremism as one of the top three terrorist threats in their jurisdiction; 39 percent listed extremism
connected with Al Qaeda or like-minded terrorist organizations. And only 3 percent identified the threat
from Muslim extremists as severe, compared with 7 percent for anti-government and other forms of
extremism. The self-proclaimed Islamic States efforts to radicalize American Muslims, which began just after the survey
ended, may have increased threat perceptions somewhat, but not by much, as we found in follow-up interviews over the
past year with counterterrorism specialists at 19 law enforcement agencies. These officers, selected from urban and rural
areas around the country, said that radicalization from the Middle East was a concern, but not as
dangerous as radicalization among right-wing extremists. An officer from a large metropolitan area
said that militias, neo-Nazis and sovereign citizens are the biggest threat we face in regard to extremism. One officer
explained that he ranked the right-wing threat higher because it is an emerging threat that we dont have as good of a grip
on, even with our intelligence unit, as we do with the Al Shabab/Al Qaeda issue, which we have been dealing with for some
time. An officer on the West Coast explained that the sovereign citizen anti-government threat has
really taken off, whereas terrorism by American Muslim is something we just havent
experienced yet. Last year, for example, a man who identified with the sovereign citizen movement which claims
not to recognize the authority of federal or local government attacked a courthouse in Forsyth County, Ga., firing an
assault rifle at police officers and trying to cover his approach with tear gas and smoke grenades. The suspect was killed by
the police, who returned fire. In Nevada, anti-government militants reportedly walked up to and shot two police officers at
a restaurant, then placed a Dont tread on me flag on their bodies. An anti-government extremist in Pennsylvania was
arrested on suspicion of shooting two state troopers, killing one of them, before leading authorities on a 48-day manhunt.
A right-wing militant in Texas declared a revolution and was arrested on suspicion of attempting to rob an armored car
in order to buy weapons and explosives and attack law enforcement. These individuals on the fringes of right-wing politics
increasingly worry law enforcement officials. Law enforcement agencies around the country are training their officers to
recognize signs of anti-government extremism and to exercise caution during routine traffic stops, criminal investigations
and other interactions with potential extremists. The threat is real, says the handout from one training program
sponsored by the Department of Justice. Since 2000, the handout notes, 25 law enforcement officers have been killed by
right-wing extremists, who share a fear that government will confiscate firearms and a belief in the approaching
collapse of government and the economy. Despite public anxiety about extremists inspired by Al
Qaeda and the Islamic State, the number of violent plots by such individuals has
remained very low. Since 9/11, an average of nine American Muslims per year have been
involved in an average of six terrorism-related plots against targets in the United States.
Most were disrupted, but the 20 plots that were carried out accounted for 50 fatalities over the past 13 and a half
years. In contrast, right-wing extremists averaged 337 attacks per year in the decade after
9/11, causing a total of 254 fatalities, according to a study by Arie Perliger, a professor at the United States Military
Academys Combating Terrorism Center. The toll has increased since the study was released in 2012. Other data sets,
using different definitions of political violence, tell comparable stories. The Global Terrorism Database maintained by the
Start Center at the University of Maryland includes 65 attacks in the United States associated with right-wing ideologies
and 24 by Muslim extremists since 9/11. The International Security Program at the New America Foundation identifies 39
fatalities from non-jihadist homegrown extremists and 26 fatalities from jihadist extremists. Meanwhile, terrorism of
all forms has accounted for a tiny proportion of violence in America. There have been more than 215,000 murders in the
United States since 9/11. For every person killed by Muslim extremists, there have been 4,300
homicides from other threats. Public debates on terrorism focus intensely on Muslims.
But this focus does not square with the low number of plots in the United States by
Muslims, and it does a disservice to a minority group that suffers from increasingly
hostile public opinion. As state and local police agencies remind us, right-wing, anti-government extremism is the
leading source of ideological violence in America.
Americans in a Charleston church last week, with an avowed white supremacist charged with their
murders, was a particularly savage case. But it is only the latest in a string of lethal attacks by people
espousing racial hatred, hostility to government and theories such as those of the
sovereign citizen movement, which denies the legitimacy of most statutory law. The assaults have taken the
lives of police officers, members of racial or religious minorities and random civilians. Non-Muslim extremists have
carried out 19 such attacks since Sept. 11, according to the latest count, compiled by David Sterman, a New America
program associate, and overseen by Peter Bergen, a terrorism expert. By comparison, seven lethal attacks by Islamic
militants have taken place in the same period. If such numbers are new to the public, they are familiar to police officers. A
survey to be published this week asked 382 police and sheriffs departments nationwide to rank the three biggest threats
from violent extremism in their jurisdiction. About 74 percent listed antigovernment violence, while 39 percent listed Al
Qaeda-inspired violence, according to the researchers, Charles Kurzman of the University of North Carolina and David
Schanzer of Duke University. Law enforcement agencies around the country have told us the
threat from Muslim extremists is not as great as the threat from right-wing extremists,
said Dr. Kurzman, whose study is to be published by the Triangle Center on Terrorism and Homeland Security and the
Police Executive Research Forum. John G. Horgan, who studies terrorism at the University of Massachusetts, Lowell, said
the mismatch between public perceptions and actual cases had become steadily more obvious to scholars. Theres an
acceptance now of the idea that the threat from jihadi terrorism in the United States has
been overblown, Dr. Horgan said. And theres a belief that the threat of right-wing, antigovernment violence has
been underestimated. Counting terrorism cases is a subjective enterprise, relying on shifting definitions and judgment
calls. If terrorism is defined as ideological violence, for instance, should an attacker who has merely ranted about religion,
politics or race be considered a terrorist? A man in Chapel Hill, N.C., who was charged with fatally shooting three young
Muslim neighbors had posted angry critiques of religion, but he also had a history of outbursts over parking issues. (New
America does not include this attack in its count.) Likewise, what about mass killings in which no ideological motive is
evident, such as those at a Colorado movie theater and a Connecticut elementary school in 2012? The criteria used by New
America and most other research groups exclude such attacks, which have cost more lives than those clearly tied to
ideology. Some killings by non-Muslims that most experts would categorize as terrorism
have drawn only fleeting news media coverage, never jelling in the public memory . But to
revisit some of the episodes is to wonder why. In 2012, a neo-Nazi named Wade Michael Page entered a Sikh temple in
Wisconsin and opened fire, killing six people and seriously wounding three others. Mr. Page, who died at the scene, was a
member of a white supremacist group called the Northern Hammerskins. In another case, in June 2014, Jerad and
Amanda Miller, a married couple with radical antigovernment views, entered a Las Vegas pizza restaurant and fatally shot
two police officers who were eating lunch. On the bodies, they left a swastika, a flag inscribed with the slogan Dont tread
on me and a note saying, This is the start of the revolution. Then they killed a third person in a nearby Walmart. And, as
in the case of jihadist plots, there have been sobering close calls. In November 2014 in Austin, Tex., a man named Larry
McQuilliams fired more than 100 rounds at government buildings that included the Police Headquarters and the Mexican
Consulate. Remarkably, his shooting spree hit no one, and he was killed by an officer before he could try to detonate
propane cylinders he drove to the scene. Some Muslim advocates complain that when the
perpetrator of an attack is not Muslim, news media commentators quickly focus on the
question of mental illness. With non-Muslims, the media bends over backward to
identify some psychological traits that may have pushed them over the edge, said Abdul
Cader Asmal, a retired physician and a longtime spokesman for Muslims in Boston. Whereas if its a Muslim,
the assumption is that they must have done it because of their religion. On several occasions
since President Obama took office, efforts by government agencies to conduct research on right-wing extremism have run
into resistance from Republicans, who suspected an attempt to smear conservatives.
Surv. Fails
Mass surveillance is a terrible strategy to find terrorists only
targeted surveillance can thwart attacks
Schneier 15 [Bruce Schneier is an American cryptographer, computer security and privacy specialist, and writer. He
is the author of several books on general security topics, computer security and cryptography, Why Mass Surveillance
Can't, Won't, And Never Has Stopped A Terrorist, http://digg.com/2015/why-mass-surveillance-cant-wont-and-neverhas-stopped-a-terrorist, March 25th, 2015//Rahul]
In his latest bestseller, Data and Goliath, world-renowned security expert and author Bruce
Schneier goes deep into the world of surveillance, investigating how governments and corporations alike
monitor nearly our every move. In this excerpt, Schneier explains how we are fed a false narrative of
how our surveillance state is able to stop terrorist attacks before they happen . In fact,
Schneier argues, the idea that our government is able to parse all the invasive and personal data they collect on us is
laughable. The data-mining conducted every day only seems to take valuable resources and
time away from the tactics that should be used to fight terrorism. Illustration: Electronic Frontier
Foundation/Hugh D'Andrade The NSA repeatedly uses a connect-the-dots metaphor to justify
its surveillance activities. Again and again after 9/11, after the Underwear Bomber,
after the Boston Marathon bombings government is criticized for not connecting the
dots. However, this is a terribly misleading metaphor. Connecting the dots in a coloring book is easy, because theyre all
numbered and visible. In real life, the dots can only be recognized after the fact. That doesnt stop us from demanding to
know why the authorities couldnt connect the dots. The warning signs left by the Fort Hood shooter, the Boston Marathon
bombers, and the Isla Vista shooter look obvious in hindsight. Nassim Taleb, an expert on risk engineering,
calls this tendency the narrative fallacy. Humans are natural storytellers, and the world of stories is much
more tidy, predictable, and coherent than reality. Millions of people behave strangely enough to attract the FBIs notice,
and almost all of them are harmless. The TSAs no-fly list has over 20,000 people on it . The Terrorist
Identities Datamart Environment, also known as the watch list, has 680,000, 40%
of whom have no
recognized terrorist group affiliation. Data mining is offered as the technique that will enable us to connect
those dots. But while corporations are successfully mining our personal data in order to target advertising, detect financial
fraud, and perform other tasks, three critical issues make data mining an inappropriate tool for
finding terrorists. The first, and most important, issue is error rates. For advertising, data
mining can be successful even with a large error rate, but finding terrorists requires a
much higher degree of accuracy than data-mining systems can possibly provide . Data
mining works best when youre searching for a well-defined profile, when there are a reasonable number of events per
year, and when the cost of false alarms is low. Detecting credit card fraud is one of data minings security success stories:
all credit card companies mine their transaction databases for spending patterns that indicate a stolen card. There are over
a billion active credit cards in circulation in the United States, and nearly 8% of those are fraudulently used each year.
Many credit card thefts share a pattern purchases in locations not normally frequented by the cardholder, and
purchases of travel, luxury goods, and easily fenced items and in many cases data-mining systems can minimize the
losses by preventing fraudulent transactions. The only cost of a false alarm is a phone call to the cardholder asking her to
verify a couple of her purchases. Similarly, the IRS uses data mining to identify tax evaders, the police use it to predict
crime hot spots, and banks use it to predict loan defaults. These applications have had mixed success, based on the data
and the application, but theyre all within the scope of what data mining can accomplish. Terrorist plots are
different, mostly because whereas fraud is common, terrorist attacks are very rare. This
means that even highly accurate terrorism prediction systems will be so flooded with
false alarms that they will be useless. The reason lies in the mathematics of detection. All detection
systems have errors, and system designers can tune them to minimize either false
positives or false negatives. In a terrorist-detection system , a false positive occurs when the system
mistakenly identifies something harmless as a threat. A false negative occurs when the system misses an actual attack.
Depending on how you tune your detection system, you can increase the number of false positives to assure you are less
likely to miss an attack, or you can reduce the number of false positives at the expense of missing attacks. Because terrorist
attacks are so rare, false positives completely overwhelm the system, no matter how well you tune. And I mean completely:
millions of people will be falsely accused for every real terrorist plot the system finds, if it ever finds any. We might be able
to deal with all of the innocents being flagged by the system if the cost of false positives were minor. Think about the fullbody scanners at airports. Those alert all the time when scanning people. But a TSA officer can easily check for a false
alarm with a simple pat-down. This doesnt work for a more general data-based terrorism-
detection system. Each alert requires a lengthy investigation to determine whether its
real or not. That takes time and money, and prevents intelligence officers from doing
other productive work. Or, more pithily, when youre watching everything, youre not seeing anything. The US
intelligence community also likens finding a terrorist plot to looking for a needle in a
haystack. And, as former NSA director General Keith Alexander said, you need the haystack to find the needle. That
statement perfectly illustrates the problem with mass surveillance and bulk collection.
When youre looking for the needle, the last thing you want to do is pile lots more hay on
it. More specifically, there is no scientific rationale for believing that adding irrelevant data
about innocent people makes it easier to find a terrorist attack, and lots of evidence that
it does not. You might be adding slightly more signal, but youre also adding much more noise. And despite the NSAs
collect it all mentality, its own documents bear this out. The military intelligence community even talks about the
problem of drinking from a fire hose: having so much irrelevant data that its impossible to find the important bits. The
NSA's Utah Data Center Photo Credit: Electronic Frontier Foundation We saw this problem with the NSAs eavesdropping
program: the false positives overwhelmed the system. In the years after 9/11, the NSA passed to the FBI thousands of tips
per month; every one of them turned out to be a false alarm. The cost was enormous, and ended up frustrating the FBI
agents who were obligated to investigate all the tips. We also saw this with the Suspicious Activity Reports or SAR
database: tens of thousands of reports, and no actual results. And all the telephone metadata the NSA collected led to just
one success: the conviction of a taxi driver who sent $8,500 to a Somali group that posed no direct threat to the US and
that was probably trumped up so the NSA would have better talking points in front of Congress. The second
problem with using data-mining techniques to try to uncover terrorist plots is that each
attack is unique. Who would have guessed that two pressure-cooker bombs would be
delivered to the Boston Marathon finish line in backpacks by a Boston college kid and his
older brother? Each rare individual who carries out a terrorist attack will have a disproportionate impact on the
criteria used to decide whos a likely terrorist, leading to ineffective detection strategies. The third
problem is that the people the NSA is trying to find are wily, and theyre trying to avoid
detection. In the world of personalized marketing, the typical surveillance subject isnt trying to
hide his activities. That is not true in a police or national security context. An adversarial
relationship makes the problem much harder, and means that most commercial big data analysis tools just dont work. A
commercial tool can simply ignore people trying to hide and assume benign behavior on the part of everyone else.
Government data-mining techniques cant do that, because those are the very people theyre looking for. Adversaries vary
in the sophistication of their ability to avoid surveillance. Most criminals and terrorists and political dissidents, sad to
say are pretty unsavvy and make lots of mistakes. But thats no justification for data mining; targeted surveillance could
potentially identify them just as well. The question is whether mass surveillance performs sufficiently better than targeted
surveillance to justify its extremely high costs. Several analyses of all the NSAs efforts indicate that it does not. The three
problems listed above cannot be fixed. Data mining is simply the wrong tool for this job, which means that all the mass
surveillance required to feed it cannot be justified. When he was NSA director, General Keith Alexander argued that
ubiquitous surveillance would have enabled the NSA to prevent 9/11. That seems unlikely. He wasnt able to prevent the
Boston Marathon bombings in 2013, even though one of the bombers was on the terrorist watch list and both had sloppy
social media trails and this was after a dozen post-9/11 years of honing techniques. The NSA collected data on the
Tsarnaevs before the bombing, but hadnt realized that it was more important than the data they collected on millions of
other people. This point was made in the 9/11 Commission Report. That report described a failure to connect the dots,
which proponents of mass surveillance claim requires collection of more data. But what the report actually said was that
the intelligence community had all the information about the plot without mass surveillance, and that the failures were the
result of inadequate analysis. Mass surveillance didnt catch underwear bomber Umar Farouk Abdulmutallab in 2006,
even though his father had repeatedly warned the U.S. government that he was dangerous. And the liquid bombers
(theyre the reason governments prohibit passengers from bringing large bottles of liquids, creams, and gels on airplanes
in their carry-on luggage) were captured in 2006 in their London apartment not due to mass surveillance but through
traditional investigative police work. Whenever we learn about an NSA success, it invariably comes
from targeted surveillance rather than from mass surveillance. One analysis showed that
the FBI identifies potential terrorist plots from reports of suspicious activity, reports of
plots, and investigations of other, unrelated, crimes. This is a critical point. Ubiquitous
surveillance and data mining are not suitable tools for finding dedicated criminals or terrorists. We taxpayers are wasting
billions on mass-surveillance programs, and not getting the security weve been promised. More importantly, the money
were wasting on these ineffective surveillance programs is not being spent on investigation, intelligence, and emergency
response: tactics that have been proven to work. The NSA's surveillance efforts have actually made us
less secure.
Data shows no meaningful terror plots have been stopped via mass
surveillance
Osterndorf 15 [Chris Osterndorf, reporter for the Daily Dot, Edward Snowden is rightNSA surveillance won't
stop terrorism, http://www.dailydot.com/opinion/edward-snowden-mass-surveillance-nsa-america/, March 17th,
2015//Rahul]
It appears that Snowden season is approaching once again. The controversial whistleblower made a
surprise appearance via Google Hangout at SXSW this week, where his remarks proved captivating as always. Essentially a
less flashy sequel to his ACLU speech from 2014, Snowden only spoke to a few people this time around, engaging in a
conversation with a select group of leaders from Americas tech sector. In particular, he urged tech companies to become
"champions of privacy," suggesting that they use their power to help shield Americans from an increasingly watchful
government. In addition to speaking at SXSW in Austin, Snowden also said a few words at FutureFest in
London, where he warned that massive surveillance won't stop terrorism. In this
instance, Snowden is absolutely correct, and its time we start heeding his advice. At this point, the only
people clinging to this idea is an effective is the NSA themselves. In 2013, NSA Director Gen. Keith Alexander went before
the House Intelligence Committee to testify to claim that increased surveillance had helped to stop terrorist threats over
50 times since 9/11, including attacks on U.S. soil such as a plot to blow up the New York Stock Exchange and a defunct
scheme to fund an overseas terrorist group. Other witnesses in the same hearing also suggested that the Snowden leaks
had harmed America greatly. We are now faced with a situation that because this information has been made public, we
run the risk of losing these collection capabilities, stated Robert S. Litt, general counsel of the Office of the Director of
National Intelligence. Were not going to know for many months whether these leaks in fact have caused us to lose these
capabilities, but if they do have that effect, there is no doubt that they will cause our national security to be affected.
However, the details the NSA provided in this hearing were somewhat hazy, and a closer look at the numbers indicates the
benefits of increased surveillance may not be so clear-cut after all. Research from International Security
found that out of the 269 terrorist suspects apprehended since 9/11, 158 were brought in
through the use of traditional investigative measures. Thats almost 60 percent of all who
were arrested. Meanwhile, 78 suspects were apprehended through measures which were
unclear and 15 were implicated in plots but were not apprehended, while the remaining
18 were apprehended by some form of NSA surveillance. Eighteen is no small number
when youre discussing matters of national security; however, the above statistics do not
necessarily indicate that mass surveillance was responsible for the apprehension of these
18 terrorists or whether these suspects were detained under more traditional surveillance measures. Moreover, the
evidence suggests that traditional means of combatting terrorism are more effective than surveillance when it comes to
overall arrests. Additional analysis from the New America Foundation further supports these
findings. Examining 225 post-9/11 terrorism cases in the U.S., their 2014 report found that the
NSAs bulk surveillance program has had no discernible impact on
preventing acts of terrorism, citing traditional methods of law enforcement and investigation as being
far more effective in the majority of cases. In as many as 48 of these cases, traditional surveillance warrants were used to
collect evidence, while more than half of the cases were the product of other traditional investigative actions, such as
informants and reports of suspicious activity. In fact, New America determined that the NSA has only been
responsible for 7.5 percent of all counterterrorism investigations and that only one of
those investigations led to suspects being convicted based on metadata collection . And that
case, which took months to solve, as the NSA went back and forth with the FBI, involved money being sent to a terrorist
group in Somalia, rather than an active plan to perpetrate an attack on U.S. soil. According to the reports principal author
Peter Bergen, who is the director of the foundations National Security Program and their resident terrorism expert, the
issue has less to do with the collection of data and more to do with the comprehension of
it. Bergen said, The overall problem for U.S. counterterrorism officials is not that they need
vaster amounts of information from the bulk surveillance programs, but that they dont
sufficiently understand or widely share the information they already possess that was
derived from conventional law enforcement and intelligence techniques . Of course, even when
all of the data has been collected, it still isnt enough to stop a terrorist attack. Its worth remembering that the mass
surveillance programs initiated by the U.S. government after the 9/11 attacksthe legal ones and the constitutionally
dubious oneswere premised on the belief that bin Ladens hijacker-terrorists were able to pull off the attacks because of
a failure to collect enough data, asserts Reasons Patrick Eddington. Yet in their subsequent reports on the attacks, the
Congressional Joint Inquiry (2002) and the 9/11 Commission found exactly the opposite. The data to detect (and thus foil)
the plots was in the U.S. governments hands prior to the attacks; the failures were ones of sharing, analysis, and
dissemination. So once again, we see that the key is not collection, but comprehension. If all of this still doesnt seem like
enough evidence that mass surveillance is ineffective, consider that a White House review group has also admitted the
NSAs counterterrorism program was not essential to preventing attacks and that a large portion of the evidence that
was collected could readily have been obtained in a timely manner using conventional [court] orders. But mass
surveillance isnt just the United States problem. Research has shown that Canada's Levitation project, which also
involves collecting large amounts of data in the service of fighting terrorism, may be just as questionable as the NSAs own
data collection practices. Meanwhile, in response to the Charlie Hebdo attacks in Paris, British Prime Minister David
Cameron has reintroduced the Communications Data Bill, which would force telecom companies to keep track of all
Internet, email, and cellphone activity and ban encrypted communication services. But support for this type of legislation
in Europe doesn't appear to be any stronger than in North America. Slates Ray Corrigan argued, Even if your magic
terrorist-catching machine has a false positive rate of 1 in 1,000and no security technology comes anywhere near this
every time you asked it for suspects in the U.K., it would flag 60,000 innocent people. Fortunately, the cultural shift
against increased data collection has become so evident in the U.S. that even President Obama is trying to get out of the
business of mass surveillance; the president announced plans last March to reform the National Security Agency's practice
of collecting call records, which have yet to come to fruition. Benjamin Franklin famously said that those who would give
up essential liberty to purchase a little temporary safety deserve neither liberty nor safety. While this quote has been
notoriously butchered and misinterpreted over the years, it has now become evident that we shouldnt have to give up
either of these things in pursuit of the other. The U.S. is still grappling with how to fight terrorism in this technologically
advanced age, but just because we have additional technology at our disposal, doesnt mean that technology is always
going to be used for the common good. You may believe Edward Snowden to be a traitor or a hero, but on this matter,
there is virtually no question: Mass surveillance is not only unconstitutional, it is also the wrong
the degree of
perfection portrayed in his favorite TV dramas, where computers magically pinpoint the bad guys.
Computers dont work this way in real life and neither does mass surveillance. Brothers
Said and Cherif Kouachi and Amedy Coulibaly, who murdered 17 people, were known to
the French security services and considered a serious threat . France has blanket electronic
surveillance. It didnt avert what happened. Police, intelligence, and security systems are imperfect. They
process vast amounts of imperfect intelligence data and do not have the resources to monitor all known suspects 24/7.
The French authorities lost track of these extremists long enough for them to carry out
their murderous acts. You cannot fix any of this by treating the entire population as
suspects and then engaging in suspicion less, blanket collection and processing of personal data. Mass
data collectors can dig deeply into anyones digital persona but dont have the resources to do so with everyone.
Surveillance of the entire population, the vast majority of whom are innocent, leads to the diversion of limited intelligence
resources in pursuit of huge numbers of false leads. Terrorists are comparatively rare, so finding one is
evidence that [bulk] phone records collection helped to thwart dozens or even several
terrorist plots, Sen. Patrick J. Leahy, Vermont Democrat and committee chairman, told Gen. Alexander of the 54
cases that administration officials including the general himself have cited as the fruit of the NSAs domestic
snooping. These werent all plots and they werent all foiled, he said. Mr. Leahy and Rep. F. James Sensenbrenner Jr.,
Wisconsin Republican and author of the USA Patriot Act, which the government says allows bulk data collection, are
working on a bill to roll back that authority. In a summary they floated to colleagues Wednesday, the men said they would
end bulk collection and require the NSA to show that the data it is seeking are relevant to an authorized investigation and
involve a foreign agent. The two lawmakers also proposed a special advocacy office with appellate powers to be part of the
proceedings in the secret Foreign Intelligence Surveillance Court, and requiring the court to release secret opinions that
lay out major interpretations of law. Mr. Leahy, who has been a chief critic of the NSA, asked Gen. Alexander to
admit that only 13 of the 54 cases had any connection at all to the U.S., Would you agree
with that, yes or no? Yes, Gen. Alexander replied in a departure from normal practice .
Administration officials giving testimony to Congress, even when asked to confine themselves to a simple yes or no, rarely
do. In response to a follow-up question, Gen. Alexander also acknowledged that only one or perhaps two of even those 13
cases had been foiled with help from the NSAs vast phone records database.
Privacy interests are currently at odds (CBC, 2014) with the surveillance state
as it exists. The surveillance state has expanded due to the rapid advancement of
technology in the last 50 years. Advocates of privacy rights contend that privacy
is a fundamental right that is inherent in North American society. The privacy
advocates in The Munk Debate claim that the use of indiscriminate mass
surveillance has 3 hindrances. Privacy advocates claim that mass surveillance is
inefficient in that it hinders technological progress, it is harmful to the economy, and
counterproductive in addressing threats to national security. Mass-surveillance
creates distrust amongst the global community and diverts the global user base
(CBC, 2014) away from North American technological services. Internet users
will use servers outside of North America that maintain a veneer of privacy .
Economic security that helps to provide national security (CBC, 2014) has been
hindered by mass-surveillance. Countries threatened by North American
that could be utilized to prevent further criminal activity on the internet. The use
of mass surveillance is counterproductive to security, democracy, and the economy.
Mass Surveillance fails to prevent terrorist attacks
Eddington 15 (Patrick; a policy analyst in homeland security and civil liberties at the
Cato Institute;No, Mass Surveillance Won't Stop Terrorist Attacks)
No, mass surveillance does not prevent terrorist attacks. Its worth remembering that the
mass surveillance programs initiated by the U.S. government after the 9/11 attacksthe
legal ones and the constitutionally-dubious oneswere premised on the belief that bin
Ladens hijacker-terrorists were able to pull off the attacks because of a failure to collect
enough data. Yet in their subsequent reports on the attacks, the Congressional Joint
Inquiry (2002) and the 9/11 Commission found exactly the opposite. The data to detect
(and thus foil) the plots was in the U.S. governments hands prior to the attacks; the
failures were ones of sharing, analysis, and dissemination. That malady perfectly
describes every intelligence failure from Pearl Harbor to the present day. The Office of
the Director of National Intelligence (created by Congress in 2004) was supposed to be
the answer to the "failure-to-connect-the-dots" problem. Ten years on, the problem
remains, the IC bureaucracy is bigger than ever, and our government is continuing to
rely on mass surveillance programs that have failed time and again to stop terrorists
while simultaneously undermining the civil liberties and personal privacy of every
American. The quest to "collect it all," to borrow a phrase from NSA Director Keith
Alexander, only leads to the accumulation of masses of useless information, making it
harder to find real threats and costing billions to store. A recent Guardian editorial noted
that such mass-surveillance myopia is spreading among European political leaders as
well, despite the fact that "terrorists, from 9/11 to the Woolwich jihadists and the neoNazi Anders Breivik, have almost always come to the authorities attention before
murdering." Mass surveillance is not only destructive of our liberties, its continued use is
a virtual guarantee of more lethal intelligence failures. And our continued will to
disbelieve those facts is a mental dodge we engage in at our peril.
Surveillance doesnt solve terrorism cant stop lone wolf attackers
Kayyem 7/9 (Juliette Kayyem, CNN National Security Analyst, professor at Harvards
Kennedy School of Government, a former assistant secretary in the U.S. Department of
Homeland Security and founder of Kayyem Solutions, a security consulting firm, 7-92015, "Why July 4 terror threat was no joke," CNN,
http://www.cnn.com/2015/07/06/opinions/kayyem-terror-threats/)//MJ
The reason is because intelligence
progress has been made so government agencies are better at sharing information with each other and state and local
officials, the notion that terrorist attacks can be stopped if we simply "connected the dots"
better is often wishful thinking. In the end, especially for those who self-radicalize with no formal ties to
terrorist organizations, there may not be that many dots to connect. Indeed, life would be so much easier if terrorists
always spoke about specific targets at specific dates and times, and we intercepted their messages. But, "We will meet at
the intersection of Constitution and 7th Avenue on Tuesday, Feb. 11, at 11 a.m.," is not how terrorists work. In an age
government has to try to prepare the public for potential terror threats that are inherently random. What isn't random,
however, are days that matter to the United States -- anniversaries of other terror attacks, national and religious holidays,
and large gatherings such as the Super Bowl. Those we can control. And we have to, because the impact of terror strikes on
those days -- whether a large or small attack -- will be much greater psychologically, because the public views those days as
more meaningful than days that are normal. Let's do a rather crude exercise. An ISIS attacker, acting on his own, attacks a
police officer on some Tuesday in July. The officer is killed. That is a story, of course. But imagine if the officer were
patrolling a July 4 gathering in New York. That too is a story, but it is also a symbol. And the terrorist organization will
surely use it to recruit others to their cause. So, instead of viewing terror threats as fear-mongering, it is time to see them
as an embedded reality of the age we live in. Symbols matter to terrorists, and to us. As the administration
admitted, they had no specific evidence of an attack threat, and that is simply because
specific evidence of direct threats is wishful thinking in the age of lone wolves and homegrown affiliates. We can't easily control them. But what we can control is an aggressive and publicly
heightened alert on days when terrorists will view the consequences of random violence as a victory against our national
pride and as a recruitment effort. The truth is that we will never know whether a planned attack
was thwarted because a would-be lone wolf decided to wait it out based on the public
warnings of increased vigilance. And there is a very real possibility that there will be several ISIS-inspired
attacks or planned attacks by year's end in the United States. In a world where both possibilities are a reality, government
warnings are not to cause unnecessary fear. They are meant to put some sort of order and process into an age when terror
attacks have none.
up oil pipelines, causing massive traffic jams, or exploiting the countless other vulnerabilities that, according to security experts, could so easily be exploited? One
almost no terrorists exist in the United States and few have the means
or the inclination to strike from abroad. But this explanation is rarely offered.Instead, Americans are told -- often
by the same people who had once predicted imminent attacks -- that the absence of international terrorist strikes in
the United States is owed to the protective measures so hastily and expensively put in
place after 9/11. But there is a problem with this argument. True, there have been no terrorist incidents in
the United States in the last five years. But nor were there any in the five years before the
9/11 attacks, at a time when the United States was doing much less to protect itself. It would
reasonable explanation is that
take only one or two guys with a gun or an explosive to terrorize vast numbers of people, as the sniper attacks around Washington, D.C., demonstrated in 2002.
AlmosteverymajorterroristattackonWesternsoilinthepastfifteenyearshasbeen
committedbypeoplewhowerealreadyknowntolawenforcement.Oneofthe
gunmenintheattackonCharlie Hebdo,inParis,hadbeensenttoprisonfor
recruitingjihadistfighters.TheotherhadreportedlystudiedinYemenwithUmarFarouk
Abdulmutallab,theunderwearbomber,whowasarrestedandinterrogatedbytheF.B.I.
in2009.Theleaderofthe7/7Londonsuicidebombings,in2005,hadbeenobserved
byBritishintelligencemeetingwithasuspectedterrorist,thoughMI5latersaidthatthe
bomberswerenotonourradar.ThemenwhoplannedtheMumbaiattacks,in2008,
wereunderelectronicsurveillancebytheUnitedStates,theUnitedKingdom,andIndia,
andonehadbeenaninformantfortheDrugEnforcementAdministration.Oneofthe
brothersaccusedofbombingtheBostonMarathonwasthesubjectofanF.B.I.
threatassessmentandawarningfromRussianintelligence.
Ineachofthesecases,theauthoritieswerenotwantingfordata.Whattheyfailedto
dowasappreciatethesignificanceofthedatatheyalreadyhad.Nevertheless,since
9/11,theNationalSecurityAgencyhassoughttoacquireeverypossiblescrapof
digitalinformationwhatGeneralKeithAlexander,theagencysformerhead,has
calledthewholehaystack.ThesizeofthehaystackwasrevealedinJune,2013,by
EdwardSnowden.TheN.S.A.vacuumsupInternetsearches,socialmediacontent,and,
mostcontroversially,therecords(knownasmetadata)ofUnitedStatesphonecallswho
calledwhom,forhowlong,andfromwhere.Theagencystoresthemetadataforfive
years,possiblylonger.
between American Muslim communities and federal and local officials. This potentially undermines relationships of trust
that form the basis for cooperation between Muslim communities and authorities. Methods commonly employed by law
enforcement in these communities, such as extensive surveillance and cultivation of informants, are inherently
challenging for any segment of society to endure, even when they are handled with care
and sensitivitycare and sensitivity that a false sense of urgency associated with the
homegrown terrorism threat could undermine. Federal officials and local police should be commended
for their outreach efforts to American Muslim communities. Yet there is evidence of questionable and
counterproductive practices being employed by some members of law enforcement in
monitoring these communities. One example involves the October 2011 reports by the Associated Press about
the extensive surveillance of Imam Sheikh Rada Shata by the New York City police, even though he had been an invited
speaker and a host of events for NYPD officers in his Bay Ridge mosque. In sum, inflating the terrorist threat
could alienate Muslim communities in the United States. This would be a worrisome
development, because those communities widespread rejection of terrorism and their
ongoing willingness to expose suspected militants are two reasons why the homegrown
threat remains small.
Mass surveillance creates useless data, allows for terrorist attacks
Patrick Eddington, 1-27-2015, "No, Mass Surveillance Won't Stop Terrorist Attacks," Reason,
http://reason.com/archives/2015/01/27/mass-surveillance-and-terrorism#.bejqzr:U8Io, Patrick G. Eddington is a policy
analyst in Homeland Security and Civil Liberties at the Cato Institute, and an assistant professor in the Security Studies
Program at Georgetown University. From 2004-2010, he served as communications director and later as senior policy
advisor to Rep. Rush Holt (D-NJ). Eddingtons legislative portfolio included the full range of security-related issues, with
an emphasis on intelligence policy reform in the areas of surveillance, detainee interrogation, and the use of drones, both
in overseas and domestic contexts. From 1988 to 1996, Eddington was a military imagery analyst at the CIAs National
Photographic Interpretation Center
The recent terrorist attack on the office of French satirical magazine Charlie Hebdo
generated a now-familiar meme: Another terrorist attack means we need more
surveillance. Sen. Bob Corker (R-Tenn.) said that while "Congress having oversight certainly
is important ... what is more important relative to these types of events is ensuring we
don't overly hamstring the NSA's ability to collect this kind of information in advance
and keep these kinds of activities from occurring." Similarly, Sen. Lindsey Graham (R-S.C.)
spoke of his "fear" that "our intelligence capabilities, those designed to prevent such an attack
from taking place on our shores, are quickly eroding," adding that the government surveillance
"designed to prevent these types of attacks from occurring is under siege." A recent poll
demonstrates that their sentiments are widely shared in the wake of the attack. But would more mass
surveillance have prevented the assault on the Charlie Hebdo office? Events from 9/11 to
the present help provide the answer: 2009: Umar Farouk Abdulmutallabi.e., the
"underwear bomber"nearly succeeded in downing the airline he was on over Detroit
because, according to then-National Counterterrorism Center (NCC) director Michael Leiter, the
federal Intelligence Community (IC) failed "to connect, integrate, and fully understand
the intelligence" it had collected. 2009: Army Major Nidal Hasan was able to conduct his
deadly, Anwar al-Awlaki-inspired rampage at Ft. Hood, Texas, because the FBI bungled
its Hasan investigation. 2013: The Boston Marathon bombing happened, at least in
part, because the CIA, Department of Homeland Security (DHS), FBI, NCC, and National
Security Agency (NSA) failed to properly coordinate and share information about
Tamerlan Tsarnaev and his family, associations, and travel to and from Russia in 2012.
Those failures were detailed in a 2014 report prepared by the Inspectors General of the IC,
Department of Justice, CIA, and DHS. 2014: The Charlie Hebdo and French grocery store
attackers were not only known to French and U.S. authorities but one had a prior
terrorism conviction and another was monitored for years by French authorities until
less than a year before the attack on the magazine. No, mass surveillance does not
prevent terrorist attacks. Its worth remembering that the mass surveillance
programs initiated by the U.S. government after the 9/11 attacksthe legal ones and the
constitutionally-dubious oneswere premised on the belief that bin Ladens hijackerterrorists were able to pull off the attacks because of a failure to collect enough data . Yet
in their subsequent reports on the attacks, the Congressional Joint Inquiry (2002) and the 9/11
Commission found exactly the opposite. The data to detect (and thus foil) the plots was in
the U.S. governments hands prior to the attacks; the failures were ones of
sharing, analysis, and dissemination . That malady perfectly describes every
intelligence failure from Pearl Harbor to the present day. The Office of the Director of National
Intelligence (created by Congress in 2004) was supposed to be the answer to the "failure-toconnect-the-dots" problem. Ten years on, the problem remains, the IC bureaucracy is
bigger than ever, and our government is continuing to rely on mass surveillance
programs that have failed time and again to stop terrorists while simultaneously
undermining the civil liberties and personal privacy of every American . The quest to
"collect it all," to borrow a phrase from NSA Director Keith Alexander, only leads to the
accumulation of masses of useless information, making it harder to find real threats and
costing billions to store. A recent Guardian editorial noted that such mass-surveillance myopia
is spreading among European political leaders as well, despite the fact that "terrorists, from 9/11
to the Woolwich jihadists and the neo-Nazi Anders Breivik, have almost always come to the
authorities attention before murdering." Mass surveillance is not only destructive of our
liberties, its continued use is a virtual guarantee of more lethal intelligence failures . And
our continued will to disbelieve those facts is a mental dodge we engage in at our peril.
Borders
Border security increases terrorism
Newman, 2013
(Joel Newman 13, 5/7/2013, "Open Borders, Terrorism, and Islam," Open Borders: The
Case, http://openborders.info/blog/open-borders-terrorism-and-islam/ CCC)
I assume that other open borders supporters cringed, as I did, when it was reported that
the suspects in the Boston bombings were immigrants. For some people, the Boston
atrocity appears to have reinforced fears that immigrants could be terrorists. A man
interviewed in a Philadelphia suburb said, Im a little more of an extremist now after
what happened in Boston I think we should just stop letting people in. Even
maintaining current immigration levels or instituting small liberalizations of American
immigration policy may be threatened by what happened in Boston and similar
immigrant-connected terrorism, let alone their negative impact on the push for open
borders. Concerns about the connection between immigrants and terrorism involve
Muslim immigrants. The Boston suspects were Muslims andmay have been inspired by
religious extremism to carry out the attacks. The Bipartisan Policy Center reports that
the U.S. has a domestic terrorist problem involving immigrant and indigenous Muslims
as well as converts to Islam. ((9/10/10, Bipartisan Policy Center, Assessing the Terrorist
Threat), page 31) Even some open borders advocates seem uncertain if an open borders
policy should apply to Muslim immigrants. In the sites background page on terrorism,
Vipul paraphrases a view (not necessarily his own): [F]or those who believe that Islamic
immigration to the United States poses a unique threat, this may be a reason to maintain
present restrictions on immigration from Islamic countries and self-identified Muslims
from other countries. Muslim immigration would increase with open borders, and
some of these additional immigrants could become terrorists. (see also here and here).
However, especially after situations like Boston (and there have been others), open
borders supporters should explain how open borders could actually help
protect the U.S. from terrorism and that open borders should be available to all
individual immigrants, regardless of religion, so long as they pose no terrorist threat.
Vipul has collected some of these arguments at the link above. My vision of open borders
and that of a number of other supporters does involve keeping out potential terrorists
through security screenings at the border. So one argument notes that, unlike our
current restrictionist policy which devotes considerable resources and
focus on keeping out unauthorized immigrants seeking to work in the U.S.,
resources under an open borders policy could be focused on screening out
terrorists. (2) Another argument is that the free movement of people between
countries could lead to the spreading of ideas contrary to those which
inspire terrorism; immigrants who move between the U.S. or other western
countries and their native countries would share values such as individual
rights, tolerance, and democracy with their compatriots who remain in the
native countries . A third argument is that if terrorism grows out of weak
economies in native countries, the free movement of people from those
countries and the resulting economic benefit to those countries (through
remittances and immigrants returning to their native country to establish new
businesses) could help prevent terrorism . There is another reason open borders
could help combat terrorism. Kevin Johnson, author of Opening the Floodgates, notes
that carefully crafted immigration enforcement is less likely to frighten immigrant
communitiesthe very communities whose assistance is essential if the United States
truly seeks to successfully fight terrorism. (page 35) Without the fear of being the
targets of immigration enforcement, immigrants would be more likely to cooperate with
authorities in identifying individuals who are potential terrorists in the U.S. and assist
with efforts against terrorist groups abroad. This would fit with the governments
strategy to gain the cooperation of Muslims in the U.S. in addressing terrorism. Quintan
Wiktorowicz, a national security staff member in the White House, notes in a discussion
on an administration plan to fight terrorism in the U.S. that Muslim communities and
Muslims in the United States are not the problem, they are the solution. And thats the
message we plan to take to those particular communities in addressing at least al-Qaida
inspired radicalization of violent extremism For the effort abroad, Nathan
Smith suggests that emigrants from Islamic countries could provide a valuable resource
for the intelligence services of the West in their fight against Islamic terrorism. Open
borders would presumably increase the number of immigrants from countries that have
been sources of terrorism against the U.S., such as Pakistan, Afghanistan, and Yemen.
Some of these immigrants could provide the cultural and language skills which would
bolster our intelligence resources and help America stay safe from future attacks.
Indeed, our intelligence agencies have often lacked agents who could infiltrate groups
that threaten the U.S. (In an article in the Atlantic Monthly in the summer of 2001, Reuel
Marc Gereht quoted a former CIA operative as saying The CIA probably doesnt have a
single truly qualified Arabic speaking officer of Middle Eastern background who can play
a believable Muslim fundamentalist (pages 38-42, July/August 2001)) In addition to
articulating the potential benefits of open borders to stopping terrorism, open borders
advocates must emphasize that most Muslims are peaceful and should be allowed to
immigrate. Philippe Legrain, author of Immigrants: Your Country Needs Them, warns
we should not fall into the trap of thinking that Muslims are a uniform and separate
community whose identity is wholly defined by their religion, still less an inevitably
hostile or violent one. (page 304) He notes that Muslims come from many different
countries, each with their own traditions, and, like other religious groups, some are
religious, some not. There are feminist Muslims, gay Muslims and Muslims who reject
their faith. (page 304) In addition, only a small minority of Muslims are
fundamentalist, and only a tiny number of fundamentalists are terrorists. (page 305)
There are over 2.5 million Muslims living in the U.S., about two thirds of whom are
immigrants, but very few are involved in terrorism. The Bipartisan Policy Center reports
that in 2009 at least 43 American citizens or residents aligned with Sunni militant
groups or their ideology were charged or convicted of terrorism crimes in the U.S. or
elsewhere, the highest number in any year since 9/11. (Page 5 of this report ) Mr.
Legrain explains that the threat of Islamic terrorism is a reason for increased vigilance,
surveillance and scrutiny; it is not reason for limiting immigration. Nathan Smith has
noted that when dramatic events occur, such as an act of terrorism by immigrants or a
plane crash, people often overestimate the frequency of such events, a phenomenon
calledavailability bias. This mental overreaction to extremely unrepresentative
events makes people attribute more importance to the events than they deserve. This
dynamic suggests that open borders supporters have a lot of work to do convincing the
public that most Muslims who want to immigrate pose no threat and that open borders
may actually help in the fight against terrorism.
is. Majority Leader Mitch McConnell, who is leading the fight to protect the NSA
program, is counting on his opponents not being able to muster the 60 votes needed to
pass the bill, leaving them with the choice of either extending Section 215 or seeing all of
the powers expire including those that would go after specific terrorist suspects. Mr.
McConnell believes that, faced with that choice, enough of his colleagues will vote to
extend all of the powers
Drones
Drones are super scary and bad for surv. (Foreign)
Kristian, 14
(Bonnie Kristian, Rare Contributor 14, 3-26-2014, "Here are 7 reasons why drones are
scary and awful," Rare, http://rare.us/story/here-are-7-reasons-why-drones-are-scaryand-awful/ CCC)
Heres seven reasons why drones are such a big deal: 1. Drones offer scary new
surveillance capabilities. People are pretty much a fixed size. You cant make a manned
aircraft smaller than the person manning it. Drones, however, can be tiny. Super tiny.
The size of bugs, in fact. When it comes to surveillance (and potentially assassinations),
this makes drones much more of a threat than manned aircraft. You wont miss the
chopper hovering outside your window; you will miss the fly on the wall. 2. Drone
warfare is bad for the drone pilots. Dropping bombs by remote control allows drone
operators to be thousands of miles removed from their targets. Its inherently uncertain
and minimizes the very real psychological cost of hitting the kill button. Said one former
drone operator, We always wonder if we killed the right people, if we endangered the
wrong people, if we destroyed an innocent civilians life all because of a bad image or
angle. When the American military is already suffering from a tragic suicide epidemic,
adding the psychological strain of drone warfare can only make matters worse. 3.
Speaking of the victims, the ratio of civilians to terrorists killed may be as
high as 50:1. In Pakistan, a major target for US drone strikes, as few as 2%
of those who die by our drone strikes are high-level terror suspects . As for
the other 98%, its difficult to determine whos a civilian and who isnt . Thats because
the Obama Administration classifies every male from 18 to 60 who is killed
as a terrorist, regardless of evidence. This guilty until proven innocent
rule gives the President free reignall while pretending that every kill is a
success. Many of these men are simply poor farmers in the wrong place at
the wrong time. Some estimates put the civilian to terrorist kill ratio as
high as 50:1! 4. Drones first victim is the Golden Rule. The high rate of civilian
casualties contradicts the drones are super precise narrative we often hear. Conor
Friedersdorf poses this thought experiment about drones: Were often told how precise
drone strikes are. Obama Administration officials have called them surgical. If a surgery
were happening in the building next door I wouldnt be worried about getting nicked by
the scalpel. Would you be worried for your safety if you were 100 yards away from drone
strike? Say youre lying in bed one night, and in the house next door, a terrorist is lying in
his bed. Would you want a drone strike to take him out? If next door is too close for
comfort, do you think the U.S. military or the CIA should be allowed to carry out drone
strikes on terrorists with innocent people next door? 5. Many drone strikes kill women
and children. The 50:1 statistic is awfulbut it gets worse. Even putting aside the
dubious classification of many male victims, US drone strikes also kill a high percentage
of women and children. Our government has even deliberately targeted wedding
celebrations, and it has also hit weddings by mistake. And the most horrifying part?
Theres a technique called double-tap droning, which is where the drone bombs a
target, waits a few minutes, and then circles back to kill the first responders as they rush
to help the victims. 6. Drones are creating a culture of fear and hatred. We live in fear
day and night,said a Yemeni man whose area has suffered drone strikes. Our children
and women cannot sleep. Their fear is more than justified: In 2013 the Pentagon
actually got rid of its ban on civilian casualties. Malala Yousafzai, the Pakistani girl who
survived an al-Qaida attack for her pro-education activism, says of drone strikes: It is
true that when theres a drone attack the terrorists are killedBut 500 and 5,000 more
people rise against it and more terrorism occurs. 7. In fact, drone strikes make
Americans less safe. Unmanned drones can seem like a good way to keep US soldiers
safe, but they ultimately put more Americans in danger in the long run. In places like
Pakistan and Yemen, Drone strikes are causing more and more [people] to hate
America and join radical militants; they are not driven by ideology but rather by a sense
of revenge and despair. In other words, when we send drones to kill terrorists, we
actually radicalize people who otherwise had no ill will toward our country. Our drone
policy is making terrorists out of ordinary people. Miya Jan is an Afghan man whose
family, including his 18-month-old nephew, was killed by US drone strike. He said:
There were pieces of my family all over the road. I picked up those pieces from the road
and from the truck and wrapped them in a sheet to bury them. Do the American people
want to spend their money this way, on drones that kill our women and children? Surely
our answer can only be No
Drones in the U.S have done nothing to stop terrorism (domestic)
Washington Times 5/15 (Washington Times Http 15, 5-21-2015, "FBI admits Patriot
Act snooping powers didnt crack any major terrorism cases," Washingtion Times,
http://www.washingtontimes.com/news/2015/may/21/fbi-admits-patriot-actsnooping-powers-didnt-crack/?page=1 CCC)
FBI agents cant point to any major terrorism cases theyve cracked thanks
to the key snooping powers in the Patriot Act, the Justice Departments
inspector general said in a report Thursday that could complicate efforts to keep key
parts of the law operating. Inspector General Michael E. Horowitz said that between
2004 and 2009, the FBI tripled its use of bulk collection under Section 215 of the Patriot
Act, which allows government agents to compel businesses to turn over records and
documents, and increasingly scooped up records of Americans who had no ties to official
terrorism investigationsThe FBI did finally come up with procedures to try to minimize
the information it was gathering on nontargets, but it took far too long, Mr. Horowitz
said in the 77-page report, which comes just as Congress is trying to decide whether to
extend, rewrite or entirely nix Section 215. PHOTOS: Bang for your buck: Best handguns
under $500. Backers say the Patriot Act powers are critical and must be kept intact,
particularly with the spread of the threat from terrorists. But opponents have doubted
the efficacy of Section 215, particularly when its used to justify bulk data collection such
as in the case of the National Security Agencys phone metadata program, revealed in
leaks from former government contractor Edward Snowden. The new report adds
ammunition to those opponents, with the inspector general concluding that no
major cases have been broken by use of the Patriot Act s records-snooping
provisions. The agents we interviewed did not identify any major case developments
that resulted from use of the records obtained in response to Section 215 orders, the
inspector general concluded though he said agents did view the material they gathered
as valuable in developing other leads or corroborating information. PHOTOS: 21 best
guns for home protection. The report said agents bumped their number of bulk-data
requests under Section 215 from seven in 2004 to 21 in 2009 as a result of technological
advances and legislative changes that the intelligence community believed expanded the
reach of the law. Increasingly, that meant scooping up information on those who werent
targets of a terrorism investigation, Mr. Horowitz said. He said that while Section 215
authority allows the government to do that, the FBI needed more checks to make sure it
was using the power properly. While the expanded scope of these requests can be
important uses of Section 215 authority, we believe these expanded uses require
continued significant oversight, he concluded. The report was an update to a previous
study done in 2008 that urged the department to figure out ways to minimize the
amount of data it was gathering on ordinary Americans even as it was targeting
terrorists. In Thursdays report Mr. Horowitz said the administration finally came up
with procedures five years later. He said it never should have taken that long but that
he considers that issue solved. The report was heavily redacted, and key details were
deleted. The entire chart showing the number of Section 215 requests made from 2007
through 2009 was blacked out, as was the breakdown of what types of investigations
they stemmed from: counterintelligence, counterterrorism, cyber or foreign intelligence
investigations. Section 215 of the Patriot Act is slated to expire at the end of this month.
The House, in an overwhelming bipartisan vote, passed a bill to renew it but also to limit
it so the government could no longer do bulk collection such as the NSA phone data
program. That legislation is known as the USA Freedom Act. But Senate Republican
leaders have balked, insisting the NSA program and Section 215 should be kept intact as
is. Majority Leader Mitch McConnell, who is leading the fight to protect the NSA
program, is counting on his opponents not being able to muster the 60 votes needed to
pass the bill, leaving them with the choice of either extending Section 215 or seeing all of
the powers expire including those that would go after specific terrorist suspects. Mr.
McConnell believes that, faced with that choice, enough of his colleagues will vote to
extend all of the powers
Border surveillance drone programs are poorly organized, expensive,
and ineffective in border patrol surveillance operations (Domestic)
Michel, journalist and editor for the Center for the Study of the Drone, 1/7/15 (Arthur
Holland, Center for the Study of the Drone, Bard College, January 7, 2015,Customs and
Border Protection Drones http://dronecenter.bard.edu/customs-and-borderprotection-drones/, accessed 7/15/15 JH @ DDI)
In a report published on May 30, 2012, the DHS Office of Inspector General concluded that the CBP
drone program was poorly organized and needed to be better planned to maximize its resources.
The report noted that the CBP needed to improve its coordination efforts with other agencies, especially with regards to
obtaining reimbursements for costs incurred during operations in which CBP drones were used by other agencies. On
December 24, 2014, the Department of Homeland Security published a report based on an
audit of the CBPs drone operations. The report concludes that the CBP drone program does
not perform to expectations and is not worth the cost. The report notes that: The CBP drones are
supposed to be airborne for 16 hours every day. In 2013, the aircraft were only airborne for about 3.5 hours per day, on
average. The CBP notes that it does not fly its drones in severe weather, high winds, or when there is cloud cover. The
CBP could only attribute relatively few apprehensions of illegal border crossers to its
unmanned aircraft operations. The CBP could not demonstrate to the auditors that the use of drones has
reduced the cost of border surveillance. The CBP had predicted that the use of drones would reduce the cost of border
surveillance by 25% to 50% per mile. The CBP drones did not prove that they were able to reduce the need for Border
Patrol agents to respond to incidents on the ground. The CBP drones focused primarily on just 170 miles of the the 1,993mile Southwest border. The audit found that in 2013 the CBP drone program cost $62.5 million. The authors write in the
conclusion of the report, Given that, after 8 years of operations, the UAS program cannot
demonstrate its effectiveness, as well the cost of current operations, OAM should reconsider its planned
Bullrun
Link turn- Continuation of Bullrun increases the likelihood of
terrorism backdoors can be exploited to gain access to US
communication and facilitate cyber terror and hacks
Larson, Perlroth, and Shane, 9/5/13 (Jeff, Data Editor at ProPublica; Nicole, The
New York Times; Scott, The New York Times; ProPublica, the organization that Snowden
gave his leaks, Revealed: The NSAs Secret Campaign to Crack, Undermine Internet
Security http://www.propublica.org/article/the-nsas-secret-campaign-to-crackundermine-internet-encryption, accessed 7/14/15)
But some experts say the N.S.A.s campaign to bypass and weaken communications security
may have serious unintended consequences. They say the agency is working at crosspurposes with its other major mission, apart from eavesdropping: ensuring the security of American
communications. Some of the agencys most intensive efforts have focused on the encryption in universal use in the
United States, including Secure Sockets Layer, or SSL, virtual private networks, or VPNs, and the protection used on
fourth generation, or 4G, smartphones. Many Americans, often without realizing it, rely on such protection every time
they send an e-mail, buy something online, consult with colleagues via their companys computer network, or use a phone
or a tablet on a 4G network. For at least three years, one document says, GCHQ, almost certainly in close collaboration
with the N.S.A., has been looking for ways into protected traffic of the most popular Internet companies: Google, Yahoo,
Facebook and Microsofts Hotmail. By 2012, GCHQ had developed new access opportunities into Googles systems,
according to the document. The risk is that when you build a back door into systems, youre not
the only one to exploit it, said Matthew D. Green, a cryptography researcher at Johns Hopkins University.
Those back doors could work against U.S. communications, too.
Backdoors
Current cryptographic backdoors arent sufficient to access
communications.
Comey 7/8 ( James, FBI Director, Going Dark: Encryption, Technology, and the Balance
Between Public Safety and Privacy Senate Judiciary Committee,
http://www.judiciary.senate.gov/imo/media/doc/07-08-15%20Grassley%20Statement.pdf)
The core of the Fourth Amendment is the requirement that, with limited exceptions,
when a law enforcement officer is investigating a crime, the officer must obtain an
individualized warrant or court order to conduct a search that would violate a persons
reasonable expectation of privacy. And that order must be issued by a neutral and
detached judge based on facts that demonstrate probable cause. Through this brilliant
framework, for over 200 years, our constitutional system has preserved the rule of law,
ensured our public safety is maintained, and protected our individual privacy and civil
liberties in part through the separation of powers. But recently, prominent law
enforcement officials have been questioning whether the laws Congress has enacted
over the years to adapt that framework to changing technology, such as the
Communications Assistance for Law Enforcement Act, or CALEA, are adequate to the
task today. What they have been telling us is that increasingly, even after they have
obtained authority from a judge to conduct a search for evidence of a crime, they lack
the technical means to do so. Director Comey and Deputy Attorney General Yates have
recently spoken out about this issue, and Ive heard about it from state and local officials
in Iowa as well. They describe two distinct but related components to the problem. First,
they report a decreasing ability to intercept realtime communications, such as phone
calls, email, texts, and other kinds of so-called data in motion. And second, they relate
a similar concern regarding their inability to execute search warrants on encrypted
phones, laptops, and other devices, which store what they refer to as data at rest.
Companies are increasingly choosing to encrypt these devices in such a way that the
company itself is unable to unlock them, even when presented with a lawful search
warrant. These encrypted devices, they fear, are becoming the equivalent of closets and
safes that can never be opened, even when a judge has expressly authorized a search for
evidence inside them. In their view, this development has the potential to impact the
fair and impartial application of our laws by effectively placing certain places, and
therefore certain people, outside the law. These officials describe the cumulative effect of
these changes on their ability to do their jobs as Going Dark. Its not a new issue. But
according to them, its a problem thats getting dramatically worse, and its having a real
effect on their ability to protect the public and to bring criminals to justice.
TSA
TSA has no way to detect thermite and respond to a thermite explosion
Jana Winter, 2-25-2015, "Exclusive: TSA Issues Secret Warning on Catastrophic
Threat to Aviation," Intercept, https://firstlook.org/theintercept/2015/02/25/tsa-issuessecret-warning-catastrophic-threat-aviation/
to identify and say there is nothing we can do, one federal air marshal said. So
basically, we hope its placed somewhere it does minimal damage, but basically were
[screwed]. Aviation security officials who spoke with The Intercept said TSA floods its
employees with intelligence products from other agencies on various types of threats, but does not
tell its employees what, if anything, to do about this threat. Youre signing off on this saying
youve received this briefing, a former transportation security official said. This covers their ass
in case something happens, they can say, We shared our intel. As a general matter, DHS, the
FBI and other partners in aviation security regularly share information on potential threats
affecting air travel safety, S.Y. Lee, a spokesman for the Department of Homeland Security, told
The Intercept in a statement. This information is shared in a timely and consistent fashion.
When relevant and actionable information is developed, we work to identify countermeasures to
mitigate the threat. The TSA bulletin was distributed by the agencys Office of Intelligence and
Analysis in response to a Dec. 10 classified 29-page FBI Intelligence Assessment titled, Threat
Assessment of Viable Incendiary Devices to Passengers and Aircraft. A copy of that report was
also obtained by The Intercept. According to the FBIs description of their tests,
thermite devices spew molten metal and hot gasses and can potentially burn through
steel and every other material on the aircraft.
702
All of our section 702 links apply- its domestic component is key
The Guardian 2014 [Pulitzer Prize winning journalism site, NSA loophole allows warrantless search for US
the NSA authority to target without warrant the communications of foreign targets, who
communications of Americans in
direct contact with foreign targets can also be collected without a warrant, and the
intelligence agencies acknowledge that purely domestic communications can also be
inadvertently swept into its databases. That process is known as "incidental collection" in surveillance parlance.
But this is the first evidence that the NSA has permission to search those databases for specific US
individuals' communications. A secret glossary document provided to operatives in the NSA's Special Source
must be non-US citizens and outside the US at the point of collection. The
Operations division which runs the Prism program and large-scale cable intercepts through corporate partnerships with
technology companies details an update to the "minimization" procedures that govern how the agency must handle the
communications of US persons. That group is defined as both American citizens and foreigners located in the US. "While
the FAA 702 minimization procedures approved on 3 October 2011 now allow for use of certain
United States person names and identifiers as query terms when reviewing collected FAA
702 data," the glossary states, "analysts may NOT/NOT [not repeat not] implement any USP [US persons] queries until
an effective oversight process has been developed by NSA and agreed to by DOJ/ODNI [Office of the Director of National
Intelligence]."
public reports can unintentionally harm the national security by inadvertently revealing
critical information. For instance, detailed reports by small Internet service providers about
government requests for information might inadvertently tip off terrorists or
others who are properly under surveillance. To reduce this risk, reporting requirements
should be less detailed in those situations in which reporting about a small number events might
reveal critical information to those under surveillance.1
data since 9/11, making it more difficult for them to find the real threats. The titles of the
documents capture their overall message: Data Is Not Intelligence, The Fallacies Behind the Scenes, Cognitive
Overflow? Summit Fever and In Praise of Not Knowing. Other titles include Dealing With a Tsunami of Intercept
and Overcome by Overload?
(NCC) director Michael Leiter, the federal Intelligence Community (IC) failed "to
connect, integrate, and fully understand the intelligence" it had collected. 2009: Army
Major Nidal Hasan was able to conduct his deadly, Anwar al-Awlaki-inspired rampage at
Ft. Hood, Texas, because the FBI bungled its Hasan investigation. 2013: The Boston
Marathon bombing happened, at least in part, because the CIA, Department of
Homeland Security (DHS), FBI, NCC, and National Security Agency (NSA) failed to
properly coordinate and share information about Tamerlan Tsarnaev and his family,
associations, and travel to and from Russia in 2012. Those failures were detailed in a
2014 report prepared by the Inspectors General of the IC, Department of Justice, CIA,
and DHS. 2014: The Charlie Hebdo and French grocery store attackers were not only
known to French and U.S. authorities but one had a prior terrorism conviction and
another was monitored for years by French authorities until less than a year before the
attack on the magazine. No, mass surveillance does not prevent terrorist attacks. Its
worth remembering that the mass surveillance programs initiated by the U.S.
government after the 9/11 attacksthe legal ones and the constitutionally-dubious ones
were premised on the belief that bin Ladens hijacker-terrorists were able to pull off the
attacks because of a failure to collect enough data. Yet in their subsequent reports on the
attacks, the Congressional Joint Inquiry (2002) and the 9/11 Commission found exactly
the opposite. The data to detect (and thus foil) the plots was in the U.S. governments
hands prior to the attacks; the failures were ones of sharing, analysis, and dissemination.
That malady perfectly describes every intelligence failure from Pearl Harbor to the
present day. The Office of the Director of National Intelligence (created by Congress in
2004) was supposed to be the answer to the "failure-to-connect-the-dots" problem. Ten
years on, the problem remains, the IC bureaucracy is bigger than ever, and our
government is continuing to rely on mass surveillance programs that have failed time
and again to stop terrorists while simultaneously undermining the civil liberties and
personal privacy of every American. The quest to "collect it all," to borrow a phrase from
NSA Director Keith Alexander, only leads to the accumulation of masses of useless
information, making it harder to find real threats and costing billions to store. A recent
Guardian editorial noted that such mass-surveillance myopia is spreading among
European political leaders as well, despite the fact that "terrorists, from 9/11 to the
Woolwich jihadists and the neo-Nazi Anders Breivik, have almost always come to the
authorities attention before murdering." Mass surveillance is not only destructive of our
liberties, its continued use is a virtual guarantee of more lethal intelligence failures. And
our continued will to disbelieve those facts is a mental dodge we engage in at our peril.
Three reasons why mass surveillance cannot prevent terrorist attacks
empirics provein fact, mass surveillance has reduced safety of the nation
Bruce Schneier, 3-24-2015, Bruce Schneier is an internationally renowned security
technologist and author. Described by The Economist as a "security guru", "Why Mass
Surveillance Can't, Won't, And Never Has Stopped A Terrorist," No Publication,
http://digg.com/2015/why-mass-surveillance-cant-wont-and-never-has-stopped-aterrorist//SZ
Data mining is offered as the technique that will enable us to connect those dots. But
while corporations are successfully mining our personal data in order to target
advertising, detect financial fraud, and perform other tasks, three critical issues make
data mining an inappropriate tool for finding terrorists. The first, and most important,
issue is error rates. For advertising, data mining can be successful even with a large error
rate, but finding terrorists requires a much higher degree of accuracy than data-mining
systems can possibly provide. Data mining works best when youre searching for a welldefined profile, when there are a reasonable number of events per year, and when the
cost of false alarms is low. Detecting credit card fraud is one of data minings security
success stories: all credit card companies mine their transaction databases for spending
patterns that indicate a stolen card. There are over a billion active credit cards in
circulation in the United States, and nearly 8% of those are fraudulently used each year.
Many credit card thefts share a pattern purchases in locations not normally
frequented by the cardholder, and purchases of travel, luxury goods, and easily fenced
items and in many cases data-mining systems can minimize the losses by preventing
fraudulent transactions. The only cost of a false alarm is a phone call to the cardholder
asking her to verify a couple of her purchases. Similarly, the IRS uses data mining to
identify tax evaders, the polic e use it to predict crime hot spots, and banks use it to
predict loan defaults. These applications have had mixed success, based on the data and
the application, but theyre all within the scope of what data mining can accomplish.
Terrorist plots are different, mostly because whereas fraud is common, terrorist attacks
are very rare. This means that even highly accurate terrorism prediction systems will be
so flooded with false alarms that they will be useless. The reason lies in the mathematics
of detection. All detection systems have errors, and system designers can tune them to
minimize either false positives or false negatives. In a terrorist-detection system, a false
positive occurs when the system mistakenly identifies something harmless as a threat. A
false negative occurs when the system misses an actual attack. Depending on how you
tune your detection system, you can increase the number of false positives to assure
you are less likely to miss an attack, or you can reduce the number of false positives at
the expense of missing attacks. Because terrorist attacks are so rare, false positives
completely overwhelm the system, no matter how well you tune. And I mean completely:
millions of people will be falsely accused for every real terrorist plot the system finds, if it
ever finds any. We might be able to deal with all of the innocents being flagged by the
system if the cost of false positives were minor. Think about the full-body scanners at
airports. Those alert all the time when scanning people. But a TSA officer can easily
check for a false alarm with a simple pat-down. This doesnt work for a more general
data-based terrorism-detection system. Each alert requires a lengthy investigation to
determine whether its real or not. That takes time and money, and prevents intelligence
officers from doing other productive work. Or, more pithily, when youre watching
everything, youre not seeing anything. The US intelligence community also likens
finding a terrorist plot to looking for a needle in a haystack. And, as former NSA director
General Keith Alexander said, you need the haystack to find the needle. That statement
perfectly illustrates the problem with mass surveillance and bulk collection. When youre
looking for the needle, the last thing you want to do is pile lots more hay on it. More
specifically, there is no scientific rationale for believing that adding irrelevant data about
innocent people makes it easier to find a terrorist attack, and lots of evidence that it does
not. You might be adding slightly more signal, but youre also adding much more noise.
And despite the NSAs collect it all mentality, its own documents bear this out. The
military intelligence community even talks about the problem of drinking from a fire
hose: having so much irrelevant data that its impossible to find the important bits. We
saw this problem with the NSAs eavesdropping program: the false positives
overwhelmed the system. In the years after 9/11, the NSA passed to the FBI thousands of
tips per month; every one of them turned out to be a false alarm. The cost was enormous,
and ended up frustrating the FBI agents who were obligated to investigate all the tips.
We also saw this with the Suspicious Activity Reports or SAR database: tens of
thousands of reports, and no actual results. And all the telephone metadata the NSA
collected led to just one success: the conviction of a taxi driver who sent $8,500 to a
Somali group that posed no direct threat to the US and that was probably trumped up
so the NSA would have better talking points in front of Congress. The second problem
with using data-mining techniques to try to uncover terrorist plots is that each attack is
unique. Who would have guessed that two pressure-cooker bombs would be delivered to
the Boston Marathon finish line in backpacks by a Boston college kid and his older
brother? Each rare individual who carries out a terrorist attack will have a
disproportionate impact on the criteria used to decide whos a likely terrorist, leading to
ineffective detection strategies. The third problem is that the people the NSA is trying to
find are wily, and theyre trying to avoid detection. In the world of personalized
marketing, the typical surveillance subject isnt trying to hide his activities. That is not
true in a police or national security context. An adversarial relationship makes the
problem much harder, and means that most commercial big data analysis tools just dont
work. A commercial tool can simply ignore people trying to hide and assume benign
behavior on the part of everyone else. Government data-mining techniques cant do that,
because those are the very people theyre looking for. Adversaries vary in the
sophistication of their ability to avoid surveillance. Most criminals and terrorists and
political dissidents, sad to say are pretty unsavvy and make lots of mistakes. But thats
no justification for data mining; targeted surveillance could potentially identify them just
as well. The question is whether mass surveillance performs sufficiently better than
targeted surveillance to justify its extremely high costs. Several analyses of all the NSAs
efforts indicate that it does not. The three problems listed above cannot be fixed. Data
mining is simply the wrong tool for this job, which means that all the mass surveillance
required to feed it cannot be justified. When he was NSA director, General Keith
Alexander argued that ubiquitous surveillance would have enabled the NSA to prevent
9/11. That seems unlikely. He wasnt able to prevent the Boston Marathon bombings in
2013, even though one of the bombers was on the terrorist watch list and both had
sloppy social media trails and this was after a dozen post-9/11 years of honing
techniques. The NSA collected data on the Tsarnaevs before the bombing, but hadnt
realized that it was more important than the data they collected on millions of other
people. This point was made in the 9/11 Commission Report. That report described a
failure to connect the dots, which proponents of mass surveillance claim requires
collection of more data. But what the report actually said was that the intelligence
community had all the information about the plot without mass surveillance, and that
the failures were the result of inadequate analysis. Mass surveillance didnt catch
underwear bomber Umar Farouk Abdulmutallab in 2006, even though his father had
repeatedly warned the U.S. government that he was dangerous. And the liquid bombers
(theyre the reason governments prohibit passengers from bringing large bottles of
liquids, creams, and gels on airplanes in their carry-on luggage) were captured in 2006
in their London apartment not due to mass surveillance but through traditional
investigative police work. Whenever we learn about an NSA success, it invariably comes
from targeted surveillance rather than from mass surveillance. One analysis showed that
the FBI identifies potential terrorist plots from reports of suspicious activity, reports of
plots, and investigations of other, unrelated, crimes. This is a critical point. Ubiquitous
surveillance and data mining are not suitable tools for finding dedicated criminals or
terrorists. We taxpayers are wasting billions on mass-surveillance programs, and not
getting the security weve been promised. More importantly, the money were wasting on
these ineffective surveillance programs is not being spent on investigation, intelligence,
and emergency response: tactics that have been proven to work. The NSA's surveillance
efforts have actually made us less secure.
A2 Terror-Generic
Asserting that the risk of terrorism is higher now than
ever is a tired trick of fear-mongerers.
Glenn Greenwald, 6-2-2015, "For Terrorist Fearmongers, It's Always the
Scariest Time Ever," Intercept,
https://firstlook.org/theintercept/2015/06/02/fear-mongers-always-scariesttime-ever/
Earlier this month, NSA chief Michael Rogers made the same claim when
discussing Patriot Act reauthorization: It just cant be the government doing
this all by itself because the number of threats has never been greater. For
the fearmongers in the West and their allies, its always the scariest
time ever; that the threat has never been greater is basically a
slogan they reflexively spew. In March, the right-wing Canadian defense
minister, Jason Kenney, arguing for new surveillance powers,
announced: While few believe full-scale conventional war is likely
any time soon, the threat of terrorism has never been greater. In
February, former CIA Deputy Director Michael Morrell, arguing for renewal of
the Patriot Act, warned that the lone wolf terrorist threat to the United
States has never been greater. In January, an anonymous senior aide to U.K.
Prime Minister David Cameron argued for a new snooper bill by saying that
the terrorist threat has never been greater. In mid-2014, U.K. Prime Minister
Cameron himself raised the threat level to severe and announced that
Britain faces the greatest and deepest terror threat in the countrys
history. In September of last year, chief of New York states Homeland
Security department, Jerome Hauer, warned New Yorkers: I think the threat
has never been greater since prior to 9/11. When discussing ISIS in June of
last year, CNNs Wolf Blitzer told viewers that the jihadist threat has never
been greater. Prior to the 2014 Winter Olympics in Sochi, Rep. Mike McCaul
shrieked on Fox News: Something will detonate . . . Ive never seen a greater
threat in my lifetime. In June 2014, CNN quoted an anonymous EU counterterrorism official as saying: The threat of attacks has never been greater
not at the time of 9/11, not after the war in Iraq never. In early 2013,
Daily Telegraphs national political editor, Simon Bensen, warned against
cutting intelligence spending on the ground that the truth, as demonstrated
in Boston, is the array of threats has never been greater. At the same time,
Indias Foreign Secretary Ranjan Mathai gave a speech warning that
terrorism is and will remain a pre-eminent security challenge and the
nature of the threat in our region has never been greater. In 2010, the U.S.
government issued a warning Sunday that said al-Qaeda might target
transport infrastructure and the British raised the terrorist threat level in its
advice for citizens travelling to France and Germany while Bernard
Squarcini, chief of the French internal intelligence agency, told reporters that
the threat has never been greater. In 2007, the UKs new Security Minister
warned that the threat against the UK has never been greater. . . . He said the
current threat from terrorism was greater now than six months ago when the
Cyberterrorism
No cyberterrorismterrorists still prefer bombs and
physical attacks
Chen 14
(Thomas, June 2014, Strategic Studies Institute and US Army War College,
Cyberterrorism After Stuxnet, professor of cybersecurity @ the School of
Engineering and Mathematical Sciences at City University London,
http://www.strategicstudiesinstitute.army.mil/pdffiles/PUB1211.pdf, 7/15/15,
SM)
NOT A MAJOR CYBERATTACK Having established motive, means, and opportunity for
alQaeda and other terrorist groups still prefer bombs and physical attacks, even
after Stuxnet.35 In the absence of an attack, a case could be argued that cyberterrorism is more
of a hypothetical threat than a real one.36 However, there is debate about whether an
actual cyberattack by terrorists has happened.37 No major attacks have occurred, according
WHY
terrorists, the natural question is why a major cyberattack has not happened yet. It seems that
to the public record, some observers have speculated that attacks have happened but have been kept
confidential so as not to disclose weaknesses in the national infrastructure. 21 In 2007, Denning
postulated three indicators that could precede a successful cyberterrorism attack:38 1. Failed
cyberattacks against critical infrastructures, such as ICS. Unlike the case with the professionally
developed Stuxnet, Denning expected that the first cyberterrorist attack would likely be unsuccessful,
considering that even terrorist kinetic attacks frequently fail. 2. Research and training labs, where
terrorists simulate their cyberattacks against targets, test attack tools, and train people. Israel reportedly
had centrifuges at its Dimona complex to test Stuxnet on. 3. Extensive discussions and planning relating
to attacks against critical infrastructures, not just websites. So far, none of these indicators has been
observed, which would imply that terrorists are not trying hard to prepare for cyberattacks. Conway has
argued against the likelihood of cyberterrorism in the near future.39 Her argument consists of these
reasons: Violent jihadis IT knowledge is not superior. Real-world attacks are difficult enough. Hiring
hackers would compromise operational security. For a true terrorist event, spectacular moving images
are crucial. Terrorists will not favor a cyberattack with the potential to be hidden, portrayed as an
accident, or otherwise remaining unknown. Perhaps the most straightforward explanation of the lack of
observed cyberattacks is the cost-benefit argument put forth by Giacomello.40 He compared the 22
costs of traditional physical terrorist attacks with cyberattacks of the break things and kill people type.
Specifically, Giacomello estimated the costs of three cyberterrorism scenarios aimed at the power grid; a
hydroelectric dam; and an air traffic control system. If the power grid was viewed as an unlikely target,
fatalities will be indirect or accidental. For a hydroelectric dam, the cost is based on a historical incident
of an insider sabotaging the controls at the dam. Somewhat arbitrarily, the estimate assumed two
proficient hackers with supporting personnel, totaling up to $1.3 million. For an air traffic control system,
a higher number of skilled hackers are needed to compromise the system, prevent the air controllers
from detecting and responding to the intrusion, and defeat built-in safety mechanisms. Again, it is not
explicitly stated, but a year of work seems to be assumed, since the total is based on a years salary. The
the World
Trade Center bomb cost only $400 to build, yet, it injured 1,000 people and
caused $550 million of physical damages. The March 2004 attacks in Madrid, exploding
resulting estimated cost was up to $3 million. For comparison, Giacomello pointed out that
10 simultaneous bombs on four commuter trains using mining explosives and cellphones, cost about
$10,000 to carry out. The 9/11 Commission Report stated that the 9/11 attacks cost between $400,000
and $500,000 to plan and execute.41 An examination of these comparative costs makes it clear that
instance (Cavelty, 2007; Hansen & Nissenbaum, 2009; Lewis, 2003; Rid, 2013; Stohl, 2007). According to
Stohl (2007),
there are
a limited number of terrorists with the necessary computer skills to
conduct a successful attack (pp. 27-28). Immediately the argument turns to hiring
external assistance from actual computer hackers (as most journalists and Hollywood
and analysts to make these complex systems interact and function as intended. However,
a significant compromise of
operational security (p. 28). The US Department of Defense as defines operational security, or
scriptwriters do). Conway (2011) dismisses that idea, correctly, as
OPSEC: A process of identifying critical information and analyzing friendly actions attendant to military
operations and other activities to: identify those actions that can be observed by adversary intelligence
systems; determine indicators and vulnerabilities that adversary intelligence systems might obtain that
could be interpreted or pieced together to derive critical information in time to be useful to adversaries,
and determine which of these represent an unacceptable risk; then select and execute countermeasures
that eliminate the risk to friendly actions and operations or reduce it to an acceptable level (US
Department of Defense, 2012). In the context of this paper, letting outside profit-motivated technicians
into the planning and execution phase of a terrorist plot would be risky for conservative-minded individuals
most improbable. The second concern Conway (2011) notes is one of audience. Recalling the definition of
(Nacos, 2000, p. 176). The terrorist act needs to be witnessed, such as the planes crashing into the World
Trade Center or the hostage taking in Munich. in order to generate the necessary level of discourse to
(2011) third point: the accident. The United States relies heavily on computer and information systems.
aspects for those behind a terror campaign. Put bluntly, its a heck lot easier (and less physically
dangerous) to write a Trojan horse to infect a computer on the other side of the world, than to drive a lorry
loaded up with Semtex outside a government buildings front door. Furthermore, terrorists are often
interested in making headlines, to focus the worlds attention on what they believe to be their plight. If
innocent people die during a terrorist action that certainly does help you make the newspapers, but its
very bad for public relations, and is going to make it a lot harder to convince others to sympathise with
your campaign. The good news about pretty much all Internet attacks, of course, is that they dont involve
the loss of life. Any damage done is unlikely to leave individuals maimed or bleeding, but can still bloody
the nose of a government that should have been better protected or potentially disrupt economies. But
think cyber terrorism is a big concern, I tend to shrug and say Not that much and ask them to
Olympics but weve never seen it. Well continue to keep an eye on it. In a time when the potential
threat posed by terrorism is often used as an excuse for covert surveillance by intelligence agencies, such
as GCHQ, and the UK government raising the threat level to Severe at the end of August due to conflict
in Iraq and Syria, one has to wonder if the spokesperson quoted was speaking entirely on-message.
Bioterrorism
No large-scale bioterrorism7 key barriers
Yet the reality of these weapons suggests a more lackluster outcome . Attacks like
those of the Rajneeshees cult in Oregon, which infected hundreds of people with salmonella, are
considered success stories, but cults like Aum Shinrikyo, which had the monetary means to employ these
weapons, never experienced that kind of success. Indeed, because it is impossible to completely defend
against all attacks, threat assessment is crucial. The disputed degree of U.S. vulnerability has become
even more heated among scientists, with some arguing that the U.S. may have over-assessed the threat
(Thompons, 2006). Many subject matter experts have pointed to the instantaneous wave of federal
support that biodefense received after the Amerithrax attacks, and that while this support was needed,
there was little assessment into the realities of the bioterrorist threat. Relatively little effort has been made
to determine the threat of terrorist use of bioterrorism; instead, the U.S. has focused on internal
vulnerabilities. Dr. Leitenberg points out that within 4 years, almost $30 billion in federal expenditure was
appropriated to counter the anticipated threat. This response took place in the absence of virtually any
popular example Rogers points to is the unsuccessful attempt to improve sanitation and health in Peru during a health two-year health campaign. The project focused on
boiling water and the link between sanitation and illness but was largely deemed a failure because campaign workers failed to identify the social norms and beliefs that
saw boiled water as diseased. Rogers pointed out that the societal habits and norms within a society will outweigh the innovation regardless of its benefit to them (Rogers,
1983). In effect, this theory discusses the question of why certain ideas become popular while others never take off. With this concept in mind, analyzing why bioweapons
have proven their efficacy, yet have not been utilized on a large-scale by non-state actors, reveals substantial barriers to utilization This thesis seeks to point out the
substantial hurdles non-state actors face when attempting to use bioweapons. It will do this by addressing several key points in the process of using bioweapons, from
procuring the agent to dissemination and even to the impact of environmental conditions. An analysis of specific historical cases of bioterrorism through such a capabilities
assessment will demonstrate the prevalent deterrents terrorists face when considering and deploying bioweapons. In the Weapons of Mass Destruction Commissions
2006 Bioterrorism and Threat Assessment, threat assessment is broken down into a diagram as shown in Figure 1 (Ackerman, 2006). The diagram in Figure 1 and equation
in Figure 2 address the role of threat, likelihood of attack, motivation, capability, vulnerability of assets, hazard posed, and value. In the past, assessments of bioterrorism
have focused on only a small section of these variables, mainly the consequences of attacks, value of assets being defended, and vulnerabilities. This analysis will focus
on the capabilities and motivations of potential bioterrorists and assess their impact on actual usage of bioweapons. Bioterrorism Threat Assessment Figure 1.
Bioterrorism Threat Assessment (Ackerman, 2006) Figure 1 presents these components, indicating the relationship between the intention and capability of an attacker.
The equation demonstrated in Figure 2 also relays the importance of capabilities and motivation in the equation regarding threat of attack. This equation points to the role
of intent, vulnerability, and capabilities in regards to the threat of an attack (Thompson, 2006). Previous analyses have focused on the vulnerability component of this
equation. The emphasis on capabilities and motivation is the driving force behind this analysis in order to provide a better understanding of terrorist capabilities when
pursuing bioterrorism. This thesis will attempt to do this through an analysis of the hurdles that inhibit utilization. Figure 2 Bioterrorism Threat Equation Figure 2.
(Thompson 2006) BACKGROUND Bioterrorism has several definitions, but the most prevailing understanding is, the use by non-state actors of microorganisms
(pathogens) or the products of living organisms (toxins) to inflict harm on a wider population (Ackerman, 2006). Bioterrorism employs bioweapons (BW) as a means of
inflicting harm, morbidity and mortality, economic loss, psychological distress, and general turmoil upon a group of people. Biological Weapons The Centers for Disease
Control and Prevention (CDC) has categorized biological agents based on several variables including their ease of dissemination or transmission from person to person,
the degree to which they result in high mortality rates and have the potential for major public health impact and the degree to which they might cause public panic and
social disruption, and require special action for public health preparedness (CDC, n.d.). By using this categorization, health agencies around the world are able to help first
responders and public health personnel to identify and understand biological agents that pose an increased risk for use in terrorism. The categories defined by the CDC
are: Category A agents can be easily disseminated or transmitted from person to person, result in high mortality rates and have the potential for major public health
impact. They might cause public panic and social disruption, and they require special action for public health preparedness. Examples: Anthrax, botulism, plague,
smallpox, tularemia, and viral hemorrhagic fevers (VHF). Category B agents are moderately easy to disseminate, result in moderate morbidity rates and low mortality
rates, and require specific enhancements of CDCs diagnostic capacity and enhanced disease surveillance. Examples: Q fever, glanders, typhus, and ricin toxin. Category
C agents include emerging pathogens that could be engineered or disseminated in the future due to their availability, ease of production and dissemination, and potential
for high morbidity and mortality rates and major health impacts. Examples: emerging infectious diseases like Nipah virus and hantavirus. Food or Waterborne Agents/Food
Safety Threat Salmonella species, Shigella dysenteria Shigella, Escherichia coli 0157:H7 E. coli, Vibrio cholerae Cholera, Cryptosporidium Crypto, Norviruses Noro,
Clostridium botulinum neurotoxin botulism, and typhus (typhoid fever). CDC Prioritized Pathogens for Bioterrorism Agents CDC Category A Agents (Category Agents,
n.d. Nania, 2013. Heymann, 2008). Effects of Bioweapons Biological weapons are unique in their capacity not only to cause delayed morbidity and mortality as a result
of their incubation periods, but also to spread disease. Unlike a bomb, bioweapons can cause delayed illness and transmission of infection among people. A delay in illness
due to an extended incubation period might allow an infected person to travel and potentially expose hundreds or thousands of people, as some illnesses allow a host to
be infectious before they are symptomatic. On the other hand, the ability to spread disease from person to person is a wholly unique component of bioweapons. Consider
the Category A agents: several of them are highly contagious, such as pneumonic plague and smallpox. Bioweapons like plague are both endemic (naturally occurring) and
transmissible through droplets, creating an exposure within six feet of the infected individual. These pathogens are incapacitating but also take several days to cause
illness. Should the motive be to inflict injury and create a drain upon the medical system, all of these agents are especially effective in causing physical harm, but two in
particular cause substantial damage. Organisms like anthrax and botulism that cause respiratory failure pose a particularly large burden, as they often require mechanical
ventilation and specialist medical care. These pathogens are capable of causing an incapacitating illness and preventing individuals from performing their daily duties, but
only a few are communicable between people. Organisms like anthrax, tularemia, and botulism are not known to spread between individuals beyond bloodborne pathogen
exposure. Plague, VHF, and smallpox however, are extremely communicable, making their ability to cause downstream effects substantially more significant. The
Category A agents are all unique in their manifestation, but several of them initially manifest like influenza, which can delay treatment and increase the risk of exposure
and death. Several studies have revealed the inability of physicians to correctly diagnosis cases of Category A agents, compounding their effects that much more
(Cosgrove, 2005). Overall, the pathogens considered as possible bioweapons all pose devastating health consequences to the infected person, and some of them create
unique challenges for clinicians regarding both diagnosis and treatment. The ability to transmit disease and have delayed presentation makes these weapons especially
sinister and potentially all the more appealing to terrorists. Historical Use of Bioweapons Bioterrorism is by no means a novel concept. While Hercules is noted to be the
first Western literary example, the reality dates back just as far. The Greek historian Herodotus in the 5th century BCE described Scythian archers using poison-tipped
arrows against their enemies. The Scythians would also create a mixture of decomposed venomous snakes and dung, sealed and made especially potent over time, that
they would cover their arrows in. This potent concoction would infect victims with a dangerous mixture of bacteria like tetanus and gangrene (Johnson, n.d.). The most
commonly acknowledged case of bioweapons use is from the late 14th Century CE, in the city of Kaffa. During their besieging of the city, the Tartar army catapulted the
bodies of plague victims over the city walls. Inhabitants and travelling merchants became infected with plague, bringing the deadly disease back to Italy and sparking the
spread of the Black Death, killing an estimated 30-60% of the European population (Alchon, 2003). More recently, in 1763 European settlers gave smallpox-laden linens to
Native Americans in America, wiping out entire communities due to of a lack of immunity (Oldstone, 2010). Covert missions during World War I by the Germans infected
Romanian sheep with anthrax, intending to infect their Russian purchasers (Carus, 2002). After several other experiments and cases during World Wars I and II, the
Biological Weapons Convention (BWC), also called Biological and Toxin Weapons Convention (BTWC), was negotiated. As the first multilateral disarmament treaty, it banned
the development, production, and stockpiling of an entire category of mass destruction (UN, n.d.). Signed in 1972, it entered into force in 1975 and worked to end statesponsored bioweapons programs. The Second Review Conference in 1986 agreed that the States Parties were to implement a number of confidence building measures
(CBM) in order to prevent or reduce the occurrence of ambiguities, doubts and suspicions and in order to improve international co-operation in the field of peaceful
biological activities (UN, n.d.). Signatory states were to provide annual reports related to BWC data, research centers and vaccine production. While the BWC has helped
prevent states use of bioweapons, a few individuals and groups have continued seeking bioweapons to use for their purposes. Seth Carus, in a 2002 study, extensively
addressed the cases of biocrimes worldwide since 1990, citing the use of bioweapons by terrorists, criminals (those motivated by personal revenge or financial gain
objectives), and other/uncertain (cases where the perpetrator was unknown). Carus provides the most extensive review of biocrime cases from 1990-2002. If bioterrorism
has occurred since Caruss analysis, there has been little to no unclassified information to document it. The few recent ricin cases that have been received media attention
involved individuals sending castor beans (non-weaponized ricin) to federal officials and gun control organizations. Several experts have pointed to the over-hyped
attention these cases have received, especially since these attempts yielded no illness and were using non-toxic substances (Garza, 2013). Carus in his study noted that,
to date, few terrorists have demonstrated an interest in bioterrorism, and fewer still tried to acquire biological agents. Unclassified accounts mention at least 54 cases in
which a terrorist group allegedly had an interest in bioweapons, but there is little evidence to confirm most of these cases (Carus, 2002). Of these 54 cases, only 27 have
more than minimal evidence that a terrorist group actually acquired, attempted to acquire, or threatened to use a bioweapon. Eight of these cases produced evidence that
the terrorist group actually acquired the agent, but in only five cases did terrorists confirm the use or attempted use of biological weapons (Carus, 2002). The five cases of
bioterrorists Carus mentions are the Rajneeshees, Aum Shinrikyo, Dark Harvest, Mau Mau, and the Polish Resistance. The most prominent cases are the Rajneeshees and
Aum Shinrikyo, which experienced the most success. To understand the roadblocks they nonetheless encountered, it is crucial to understand how these two organizations
functioned and attempted to employ bioweapons. Rajneeshees In 1984, the Rajneeshees cult carried out one of the largest bioterrorist actions in U.S. History.
Attempting to sway local elections in Oregon, they contaminated several restaurants with Salmonella typhimurium, which was responsible for infecting 751people with
gastroenteritis (Carus, 2002). The Rajneeshees were originally an Indian cult that moved to Oregon to distance itself from notoriety in India. Upon settling in Oregon, they
had a fractured relationship with local inhabitants. The cult would routinely bring in homeless people from all over the country to vote in local elections, hoping to sway
land laws in their favor. After several defeated electoral attempts, two of the prominent female members, Sheela and Puja, began to consider the use of biological
weapons as a means to alter voter turnout. Puja, a registered nurse nicknamed Dr. Mengeles, controlled the Rajneesh Foundation International medical facilities and
pharmacy. While Puja considered many biological agents, she chose S. typhimurium, a strain of salmonella most commonly associated with food poisoning. Other cult
members stated that she also considered more severe bioweapons like HIV and giardia (Carus, 2002). Having purchased S. typhimurium from a commercial supplier, the
Rajneeshees were able to produce more in covert laboratories within the Rajneeshees town, Rajneeshpuram. Puja field-tested the pathogen on August 29, 1984 by
contaminating the water of three county commissioners, all of whom fell ill. A second field test involved an unknown liquid that Puja employed cult members to spread on
doorknobs and handles, but no infections were noted to occur. During August of 1984, the cult attempted several times to contaminate the water system, however, none
were successful. In early September of 1984, the Rajneeshees poured vials containing S. typhimurium into different restaurant foods throughout their targeted town, The
Dalles. The CDC estimates that 751 people became ill after eating at salad bars within these restaurants (Carus, 2002). The Rajneeshees salmonella outbreak is
considered by the FBI to be the only confirmed case of bioterrorism by a terrorist group operating in the U.S. until the 2001 Amerithrax attack (Carus, 2002). The
uniqueness of this case is that it went unknown as an intentional outbreak. Even after wide public attention, this outbreak was not associated with bioterrorism until late
1985, when Rajneesh, the cult leader, emerged and stated he believed Sheela and 19 other leaders (including Puja) were responsible for crimes including the salmonella
outbreak (Carus, 2002). Indeed, food terrorism is perhaps the most difficult form of bioterrorism to identify as intentional, as the pathogens are commonly occurring and
biocrimes can easily be masked as large outbreaks. Overall, the Rajneeshees salmonella event is considered to be one of the largest case studies in biocrime history. Prior
to the Amerithrax attacks, this was the only confirmed instance of chemical or biological terrorism to occur in the U.S., according to the FBI (Carus, 2002). Aum
Shinrikyo Aum Shinrikyo was a Japanese group that is most famous for their release of sarin nerve gas in the Tokyo subway system. While this attack made them famous,
few know that sarin gas was just one of dozens of chemical and biological weapons they were developing. From 1990 to 1995, Aum Shinrikyo worked to develop biological
agents to support their apocalyptic religious goals. Believing that war with the U.S. was imminent, the cult felt that arming themselves with bioweapons would provide
better protection. The leader, Asahara, was a highly charismatic man, establishing a cult of roughly 40,000 members worldwide. Many members were wealthy citizens and
included several scientists and engineers. It is estimated that at their peak in 1995, Aum had roughly $1 billion in net worth, making it one of the most well funded terrorist
groups (Tucker, 2000). The Armageddon mentality further pushed the group to develop weapons at a rapid pace, with an increasingly violent attitude as a result of growing
paranoia they became increasingly dependent on narcotics. Aums use of bioweapons started in 1990, with their attempts to develop the botulinum toxin that could be
used to infect state officials and others they deemed enemies. Aum had a substantial research facility, allowing them to perform advanced microbiology and even to
disseminate biological materials from the roof of the facility they owned. During this time period, they worked on botulinum toxins, Bacillus anthracis, and Ebola. Ebola is
considered one of the worlds deadliest viruses and was such a prize item for Aum that members traveled to Zaire in 1992 on a humanitarian mission during a local
outbreak to supposedly acquire the virus in the wild (Thompson, 2006). While they did extensive research, Aum actually made several attempts to field test and attack
enemies with their manufactured weapons. In April 1990, they attempted to disseminate botulinum toxin by spraying the toxins from three vehicles when driving through
central Tokyo, one of the international airports, and a naval base (Thompson, 2006). In 1993, they also tried the drive-by method at a royal wedding in Tokyo (Carus, 2002).
Later that year, they attempted to spread anthrax using a sprayer system on the roof of a building they owned, as well as trying to contaminate the area around the Diet
using the similar truck methods (Carus, 2002). The truck drive-by method was also employed again in mid 1993 during an attempted attack around the Imperial Palace in
Tokyo (Carus, 2002). Lastly, in March 1995, Aum planted three briefcases in the Tokyo subway to release botulism. Interestingly, the individual responsible for preparing the
suitcases had moral trepidation and replaced the contents with a placebo (Thompson, 2006). This particular failure pushed Aum to use sarin nerve gas, which is not a
bioweapon but a chemical warfare agent (Carus, 2002). The 1995 sarin attack was carried out in morning rush hour by placing the liquid sarin in punctured packages that
looked like bottled drinks onto five cars, across three separate subway lines. The sarin attack was deemed successful by Aum, as it killed 12 people and caused over 6,000
to seek medical attention (Fletcher, 2012). Despite all of these bioweapon attempts (10 in total), they were all met with failures (Tucker, 2000). The sarin nerve gas attack
was their only source of success, pointing to the unanticipated difficult nature of bioterrorism. Whether the result was a failure of dissemination, the virulence of the
pathogen, or internal collapse within the group, Aum is a prime example of the dedication some organizations have to employing bioweapons, but also the roadblocks that
prevented their success. Despite the resources Aum Shinrikyo had, in most cases they were unable to effectively use biological agents. Amerithrax Attacks of 2001 After
the terrorist attacks on September 11, 2001, letters containing anthrax spores were sent through the United States Postal System (USPS). Coined the Amerithrax attacks,
this case is noted to be the worst biological attack in U.S. history (FBI, n.d.). An estimated 10,000 people were exposed and 22 people experienced illness, of which five
died. Anthrax is an extremely potent pathogen when inhaled, and with approximately 20 billion total spores released in the letters, this attack cost an estimated $6 billion
in response measures (Thompson, 2006). Bacillus anthracis exists in roughly 89 known strains, but this particular strain was known as Ames (Thompson, 2006). What is
unique about the Ames strain is that it is naturally occurring the U.S. (originally isolated in Ames, Iowa), highly virulent, and very resistant to existing vaccines. From the
beginning, the perpetrator was suspected to be an adult male who worked in a laboratory or had extensive scientific experience. Barbara Rosenberg of the Federation of
American Scientists (FAS), who works on biological weapons, believes the individual to be an American scientist with access to anthrax or at least instructed to make it by
an expert (Thompson, 2006). Dr. Rosenberg, as Thompson noted, falls into what some call the Bioevangelist Camp, believing an American scientist with experience in
the realm of bioweapons thought the U.S. was failing to give BW risk adequate attention. The attacker demonstrated bioterrorisms potential and blamed it on a large
threat Al Qaeda. The scientist brought attention to the problem, finally summoning sufficient assets to focus on the issue (Thompson, 2006). Richard Spertzel, a
researcher working on bioweapons at Fort Detrick, Maryland, and Head of the Biological Weapons Inspections from 1994 to 1998, testified to the House Committee on
International Relations in 2001 that the anthrax used in these attacks had to have been produced by a non-state group with ties to a state-sponsored weapons program.
He stated that the complexity of the attack pointed to a pathogen that was at least as pure and concentrated as those found in state bioweapons programs, specifically the
U.S., Soviet, or Iraqi programs (Thompson, 2006). The largest source of the Ames strand in the U.S. is found in the United States Army Military Institute for Infectious
Diseases (USAMRIID). While the culprit in the Amerithrax attack is still unknown, in 2008 the Department of Justice and the FBI brought charges against Dr. Bruce Ivins.
Despite his suicide in 2008, evidence continues to mount against Dr. Ivins. A biodefense expert whose personal emails stated his willingness to hurt, kill, and terrorize, he
was a microbiologist who worked with anthrax for decades at USAMRIID (Shane, 2010). Dr. Ivins was specifically working on vaccines for anthrax, revealing his extensive
knowledge and access to the pathogen. While the Amerithrax attack does not have an obvious terrorist culprit and motive like those by Aum Shinrikyo or Rajneeshees, it
continues to worry biodefense experts regarding apparent U.S. vulnerability. Additional cases There are three additional cases that are worth mentioning, but not heavily
analyzed as there is little evidence available (Carus, 2002). Dark Harvest was a group that protested anthrax military testing by the British military during WWII and
attempted to contaminate research facilities with anthrax-contaminated soil. Studies revealed that the soil had low levels of anthrax spores that were unable to cause
illness. The Mau Mau African independence movement group was believed to be responsible for poisoning livestock with a plant toxin, but little information is available.
Lastly, there are reports that during WWII, Polish resistance organizations used biological weapons to produce a claimed 200 German deaths. METHODOLOGY Case
Selection The cases addressed in this thesis reflect those that have substantial data and background information to truly determine hurdles encountered in bioweapon
utilization. The primary cases for discussion are the Aum Shinrikyo attacks from 1990-1995 and those by the Rajneeshees cult. While this thesis will refer to other non-state
terrorist organization attempts, there is insufficient evidence that they represent actual attempts to use bioweapons. Carus categorizes cases according to terrorist,
criminal, or other purposes. For the rationale of this analysis, attention will be spent on the terrorist activity involving bioweapons. While criminals can be considered nonstate actors, the cases associated with such action typically involve small clusters of poisoning (for example, employees poisoning doughnuts to infect coworkers and
spouses infecting in-laws) and are not deemed terrorist incidents. According to Carus, motives of criminal cases were narrow and primarily involved targeting individuals or
extremely small groups, not on instigating fear or social disruption on a large scale. The Amerithrax attacks will not be as heavily analyzed as those of Aum and
Rajneeshees. The reasoning for this general exclusion is the debated classification of the Amerithrax attacks as truly terrorist attacks. Caruss 2002 assessment does not
include the Amerithrax attacks, most likely a result of the limited information at the time of print, and its classification as a terrorist action is disputed (Carus, 2002). Many
in the scientific community believe that the lone-wolf nature of the Amerithrax attacks and general intent behind them do not match terrorist habits (Thompson, 2006;
Leitenberg, 2006). While there are valid points to both sides, the attacks will be referenced, but the lack of information regarding the perpetrator and attack methodology
is not conducive for this analysis. The discussion will include some general information regarding the complexity of the Amerithrax case, since despite its disputed motives,
this biological attack is nonetheless considered the largest in U.S. history. Analysis Criteria The analysis of these cases, specifically the Aum and Rajneeshees attacks,
the March 2004 train bombings in Madrid that killed 191. We do not disagree with Runge's statements
that actors such as al Qaeda have demonstrated an interest in biological weapons. There is ample
evidence that al Qaeda has a rudimentary biological weapons capability. However ,
there is a huge
chasm of capability that separates intent and a rudimentary
biological weapons program from a biological weapons program that
is capable of killing hundreds of thousands of people . Misconceptions About
Biological Weapons There are many misconceptions involving biological weapons. The three most
common are that they are easy to obtain, that they are easy to deploy effectively, and that, when used,
they always cause massive casualties. While it is certainly true that there are many different types of
individuals and sophisticated laboratory equipment. Even incredibly deadly biological substances such as
ricin and botulinum toxin are difficult to use in mass attacks. This difficulty arises when one attempts to
take a rudimentary biological substance and then convert it into a weaponized form a form that is
potent enough to be deadly and yet readily dispersed. Even if this weaponization hurdle can be overcome,
once developed, the weaponized agent must then be integrated with a weapons system that can
effectively take large quantities of the agent and evenly distribute it in lethal doses to the intended
warfare misconceptions and reality. Militant groups desperately want to kill people and are constantly
Certainly if biological
weapons were as easily obtained, as easily weaponized and as effective at
producing mass casualties as commonly portrayed, militant groups would have
seeking new innovations that will allow them to kill larger numbers of people.
used them far more frequently than they have . Militant groups are generally adaptive
and responsive to failure. If something works, they will use it. If it does not, they will seek more effective
means of achieving their deadly goals. A good example of this was the rise and fall of the use of chlorine in
militant attacks in Iraq. Anthrax As noted by Runge, the spore-forming bacterium Bacillus anthracis is
readily available in nature and can be deadly if inhaled, if ingested or if it comes into contact with a
person's skin. What constitutes a deadly dose of inhalation anthrax has not been precisely quantified, but
is estimated to be somewhere between 8,000 and 50,000 spores. One gram of weaponized anthrax, such
as that contained in the letters mailed to U.S. Sens. Tom Daschle and Patrick Leahy in October 2001, can
contain up to one trillion spores enough to cause somewhere between 20 and 100 million deaths. The
letters mailed to Daschle and Leahy reportedly contained about one gram each for a total estimated
quantity of two grams of anthrax spores: enough to have theoretically killed between 40 and 200 million
people. The U.S. Census Bureau estimates that the current population of the United States is 304.7 million.
In a worst-case scenario, the letters mailed to Daschle and Leahy theoretically contained enough anthrax
spores to kill nearly two-thirds of the U.S. population. Yet, in spite of their incredibly deadly potential,
those letters (along with an estimated five other anthrax letters mailed in a prior wave to media outlets
such as the New York Post and the major television networks) killed only five people; another 22 victims
This difference
between the theoretical number of fatal victims hundreds of millions and
the actual number of victims five highlights the challenges in effectively
distributing even a highly virulent and weaponized strain of an organism to a large
were infected by the spores but recovered after receiving medical treatment.
number of potential victims. To summarize: obtaining a biological agent is fairly simple. Isolating a virulent
strain and then weaponizing that strain is somewhat more difficult. But the key to biological warfare
spent on its biological weapons program and the lack of any meaningful interference from the Japanese
government Aum still experienced problems in creating virulent biological agents and also found it
difficult to dispense those agents effectively. Today, al Qaeda finds itself operating in a very different
environment than that experienced by Aum Shinrikyo in 1993. At that time, nobody was looking for Aum or
its biological and chemical weapons program. By contrast, since the Sept. 11 attacks, the United States
and its allies have actively pursued al Qaeda leaders and sought to dismantle and defang the organization.
The United States and its allies have focused a considerable amount of resources in tracking and
disassembling al Qaeda's chemical and biological warfare efforts. The al Qaeda network has had millions of
dollars of its assets seized in a number of countries, and it no longer has the safe haven of Afghanistan
from which to operate. The chemical and biological facilities the group established in the 1990s in
Afghanistan such as the Deronta training camp, where cyanide and other toxins were used to kill dogs,
and a crude anthrax production facility in Kandahar have been found and destroyed by U.S. troops.
Operating in the badlands along the Pakistani-Afghan border,
Al Qaeda's lead
chemical and biological weapons expert, Midhat Mursi al-Sayid Umar, also known as Abu
Khabab al-Masri, was reportedly killed on July 28, 2008, by a U.S. missile strike on his home in
Pakistan. Al-Sayid, who had a $5 million dollar bounty on his head, was initially reported to have been one
of those killed in the January 2006 strike in Damadola. If he was indeed killed, his death should be another
significant blow to the group's biological warfare efforts.
influenza virus, for that matter is a contagious pathogen, there would be two possible modes that a nonstate actor would have to instigate an attack. The virus could be refined and then aerosolized and released
into a populated area, or an individual could be infected with the virus and sent to freely circulate within a
There are severe constraints that make success using either of these
unlikely. The technology needed to refine and aerosolize a pathogen
for a biological attack is beyond the capability of most non-state actors . Even
if they were able to develop a weapon, other factors such as wind patterns and
humidity can render an attack ineffective. Using a human carrier is a less expensive
population.
methods
method, but it requires that the biological agent be a contagion. Additionally, in order to infect the large
number of people necessary to start an outbreak, the infected carrier must be mobile while contagious,
something that is doubtful with a serious disease like small pox. The carrier also cannot be visibly ill
because that would limit the necessary human contact.
These two problems are principally caused by, as Francis Moore Lappe'
put it, a lack of justice. There are also ethical considerations, a higher value
should be placed on people than on corporate profit, this must be at the
forefront, not an afterthought. In 2008, there were shortages of food, in
some places, for some people. There was never a shortage of food in
2008 on a global basis, nor is there currently. True, some countries, in
Africa for example, do not have enough food where it is needed, yet people
with money have their fill no matter where they live. Poverty and
inequality cause hunger. The current food riots in Mozambique were
a result of increased wheat prices on the world market. The UN Food
and Agriculture organization, (FAO) estimates the world is on course
to the third largest wheat harvest in history, so increasing wheat
prices were not caused by actual shortages, but rather by
speculation on the price of wheat in the international market. While
millions of people go hungry in India, thousands of kilos of grain rot
in storage. Unable to afford the grain, the hungry depend on the
government to distribute food. Apparently that's not going so well. Not
everyone living in a poor country goes hungry, those with money
eat. Not everyone living in rich country is well fed, those without
money go hungry. We in the US are said to have the safest and most
abundant food supply in the world, yet even here, surrounded by an over
abundance of food, there are plenty of hungry people and their numbers are
growing. Do we too have a food crisis, concurrent with an obesity crisis? Why
is there widespread hunger? Is food a right? Is profit taking through
speculation that drives food prices out of the reach of the poor a right? Is
pushing high technology agriculture on an entire continent at that could feed
itself a (corporate) right? In developing countries, those with hunger and poor
food distribution, the small farmers, most of whom are women, have little say
in agricultural policy. The framework of international trade and the rules
imposed by the International Monetary Fund and World Bank on developing
countries, places emphasis on crops for export, not crops for feeding a
hungry population. Despite what we hope are the best intentions of the Gates
Foundation, a New Green Revolution based on genetically engineered crops,
imported fertilizer and government imposed agricultural policy will not feed
the world. Women, not Monsanto, feed most of the worlds population, and the
greatest portion of the worlds diet still relies on crops and farming systems
developed and cultivated by the indigenous for centuries, systems that still
work, systems that offer real promise. The report of 400 experts from around
the world, The International Assessment of Agricultural Science and
Technology for Development (IAASTD), is ignored by the proponents of a New
Green Revolution, precisely because it shows that the best hope for ending
hunger lies with local, traditional, farmer controlled agricultural production,
not high tech industrial agriculture. To feed the world, fair methods of
land distribution must be considered. A fair and just food system
depends on small holder farmers having access to land. The function
of a just farming system is to insure that everyone gets to eat,
industrial agriculture functions to insure those corporations
sounding number, that number tells you what you want to know.
Numbers don't just grow in the wild; they are chosen, by parameters
that the researchers decide. The parameters these particular
researchers chose might not be the criteria you would use; they are
certainly not the ones that I would have chosen. And even if you
agree that these are absolutely the right and proper numbers, that
still doesn't tell us that right-wing terror is more dangerous to us,
the living, than to the people during the time period they studied. To
know that, you would need to know who remains out there, plotting
dark things.
the federal government and its proxies in law enforcement. The report also
draws a link between the mainstream conservative movement and
the violent far right, and describes liberals as future oriented
and conservatives as living in the past. While liberal worldviews are
future- or progressive -oriented, conservative perspectives are more pastoriented, and in general, are interested in preserving the status quo, the
report says. The far right represents a more extreme version of
conservatism, as its political vision is usually justified by the aspiration to
restore or preserve values and practices that are part of the idealized
historical heritage of the nation or ethnic community. The report adds:
While far-right groups ideology is designed to exclude minorities and
foreigners, the liberal-democratic system is designed to emphasize civil
rights, minority rights and the balance of power. The Times quotes a
congressional staffer who has served in the military calling the
report a junk study. The staffer then asked: The $64,000 dollar
question is when will the Combating Terrorism Center publish their study on
real left-wing terrorists like the Animal Liberation Front, Earth Liberation Front,
and the Weather Underground? This is not the first time elements of
the federal government have tried to smear conservatives with
sloppy work and a broadbrush analysis.#more# In 2009, liberals in the
Department of Homeland Security prepared a report defining rightwing
extremism in the United States as including not just hate groups, but also
groups that reject federal authority in favor of federalism or local control. It
may include groups and individuals that are dedicated to a single-issue, such
as opposition to abortion or immigration, a footnote in the report warned.
The DHS report bore the ominous title: Rightwing Extremism: Current
Economic and Political Climate Fueling Resurgence in Radicalization and
Recruitment. Sent to hundreds of local-law-enforcement officials, the report
claimed that right wing extremists have capitalized on the election of the
first African-American president, and are focusing their efforts to recruit new
members, mobilize existing supporters, and broaden their scope and appeal
through propaganda, but they have not yet turned to attack planning. A
casual reader might have concluded that attack planning by said groups is
inevitable. But the report is silent on just how the groups will attack,
and indeed since 2009 there has been precious little evidence any of
them ever did. After much public ridicule, the DHS report vanished from
public view as did a similar effort at the same time by the Missouri Highway
Patrol, which had to retract its own report linking conservative groups with
militia activity and mentioning 2008 presidential candidates Ron Paul and Bob
Barr. No one doubts the existence of racist and hate-filled groups
that require monitoring. But both the DHS and West Point reports
read as if they were laying the groundwork for a rhetorical attack on
mainstream conservatism of the sort that President Clinton launched
in the wake of the Oklahoma City bombing of 1995, when he blamed
talk radio for stirring up anti-government passions. No one should be
surprised if supporters of new gun-control measures begin justifying them by
referring to the West Point report. The Obama administration raised eyebrows
back in 2009 when Janet Napolitanos DHS substituted the phrase manmade disasters for the dangers posed by Islamic terrorism. My sources
inside Congress tell me they continue to worry that efforts to monitor
domestic Muslim extremists as well as interdiction efforts against radical
Islamists crossing the U.S. border are sometimes put on the back burner. The
government denies this, but it seems to me its protestations would be more
persuasive if it spent less time producing half-baked warnings about the
danger of right-wing extremists.
AT: Econ
Terrorism attacks will ultimately benefit the US economy
increased spending in other areas
Anderson 01 (William L. Anderson, adjunct scholar of the Mises Institute, teaches economics at
Frostburg State University., 9-17-2001, "Is Terrorism Good for the Economy?," Mises Institute,
https://mises.org/library/terrorism-good-economy)
Hazlitt bases much of his book on a simple lesson given by the great French economist Frederic Bastiat, the lesson of the
criminal, this lad who threw the brick through the bakers window is a public benefactor. One would think that anyone with
any sense at all could see through the crowds misguided interpretation of the events and know that breaking windows
economists espousing such a ridiculous point of view. Yet, just days after the tragedy, a New York Post article quoting
develop new spaces, and will buy a ton of technology from companies that have been stagnant," said economist Larry
Kudlow. "In economics, it's called the broken windows' effectwe
cumulative average abnormal returns following the September 11th terrorist attacks. The policy
implications of this research should not be overlooked. First, because global capital markets are closely and
tightly inter-related, policymakers and regulators around the world must always be aware of what is going
in other parts of the world. Todays real-time information economy means that news spreads rapidly and
has the potential to have serious negative consequences in a very short time. Thus, it is important for
regulators and policymakers to cooperate and communicate more with each other on a regular basis. This
includes sharing important informationlike unusual stock trading or large dollar trans-actionsthat might
have consequences elsewhere, and developing disaster recovery plans that can be quickly put into place
in case of a cataclysmic event. Second, the importance of a healthy and stable banking and financial
The
foundations and regulations that underlie U.S. banking and financial markets
appear to function efficiently and effectively with the ability to absorb
tremendous shocks. For the most part, the payments system in the U.S. kept
functioning normally with few reported problems. We suggest that capital markets and
sector and the efficient execution of monetary policies seems paramount to growing economies.
banking/financial sectors in growing economies model themselves after those in the United States. This
includes, of course, a quick, effective, flexible and responsive monetary authority.
the United States experienced few terrorist events on its own soil e.g., in 1998, 2000, and the years
following 2001, there were no terrorist events in the United States (Sandler and Enders, 2004; US
terrorism generally causes a substitution from sectors vulnerable to terrorism into relatively safe areas
and, thus, does not affect the entire macroeconomy.3 If airlines become risky, factors of production will
shift from the airline sector to other relatively safer sectors. Of course, a terrorist act of the magnitude of
9/11 can shake confidence and influence sufficiently many sectors to have macroeconomics repercussions.
But as we show below, developed countries are positioned to take actions to limit these impacts. This
representation is in marked contrast to small economies in which terrorism is prevalent and affects daily
activities as in Colombia, Israel, and the Basque region of Spain. For these economies, terrorism can
reduce GDP and curb development, especially during prolonged campaigns (e.g., Israel since September
27, 2000). Protracted terrorism leads to the anticipation of future events, which create risk premiums that
limit activities in terrorism-prone sectors. Investors, both at home and abroad, may decide to direct their
assets to safer activities in other countries. If terrorists succeed in scaring away investments, they may be
emboldened to take further actions to cause economic losses. US experience in light of 9/11 Figure 1
provides strong evidence for the view that the US economy quickly rebounded from 9/11 .
The vertical line in the center of each panel of Figure 1 represents the third quarter of 2001 (i.e., 2001:Q3)
corresponding to 9/11. Panel 1 shows that real GDP was virtually unchanged throughout 2000 and fell
slightly in the first and third quarters of 2001. The key feature is that real GDP began to grow sharply
beginning in the fourth quarter of 2001 following 9 9/11. Panel 2 shows that the Conference Boards
measure of consumer confidence plummeted right before the onset of the 2001 recession; however,
in
the absence of 9/11 i.e., the unemployment rate may have risen even
faster.