Escolar Documentos
Profissional Documentos
Cultura Documentos
Goitein 15,
Elizabeth, Co-Director of the Brennan Center for Justices Liberty and National Security Program, 6-52015, "Who really wins from NSA reform?," MSNBC, http://www.msnbc.com/msnbc/freedom-act-whoreally-wins-nsa-reform
The USA Freedom Act will end the bulk collection of phone metadata and prohibit similar programs for any
type of business records under foreign intelligence collection authorities. For phone records, the government may
obtain metadata on an ongoing basis only for suspected terrorists and those in contact with them. For other types of records, the government
must tie its request for records to a specific selection term, such as a person, address, or account. Given the surge in surveillance since 9/11,
the USA Freedom Acts imposition of constraints on collection is historic. Indeed, the USA Freedom Act is the most significant limitation on
foreign intelligence surveillance since the 1970s. If faithfully implemented a critical caveat, to be sure the law will meaningfully curtail the
overbroad collection of business records. Even
a few
years ago, if the NSA, acting within the United States, wished to obtain communications between
Americans and foreigners, it had to convince the FISA Court that the individual target was a foreign
power or its agent. Today, under Section 702 of the FISA Amendments Act, the NSA may target any
foreigner overseas and collect his or her communications with Americans without obtaining any
individualized court order. Under Executive Order 12333, which governs the NSAs activities when it conducts surveillance overseas,
the standards are even more lax. The result is mass surveillance programs that make the phone metadata
program seem dainty in comparison. Even though these programs are nominally targeted at foreigners,
they incidentally sweep in massive amounts of Americans data, including the content of calls, e-mails,
text messages, and video chats. Limits on keeping and using such information are weak and riddled with exceptions. Moreover,
foreign targets are not limited to suspected terrorists or even agents of foreign powers. As the Obama
administration recently acknowledged, foreigners have privacy rights too, and the ability to eavesdrop on any
foreigner overseas is an indefensible violation of those rights. Intelligence officials almost certainly supported USA Freedom because they
hoped it would relieve the post-Snowden pressure for reform. Their likely long-term goal is to avoid changes to Section 702, Executive Order
12333, and the many other authorities that permit intelligence collection without any individualized showing of wrongdoing. Privacy
advocates who supported USA Freedom did so because they saw it as the first skirmish in a long battle
to rein in surveillance authorities. Their eye is on the prize: a return to the principle of individualized
suspicion as the basis for surveillance. If intelligence officials are correct in their calculus, USA Freedom may prove to be a Pyrrhic
victory. But if the law clears the way for further reforms across the full range of surveillance programs, history will vindicate the privacy
advocates who supported it. The
answer to what USA Freedom means for our liberties lies, not in the text of the
law, but in the unwritten story of what happens next.
And, the NSA has massively expanded its surveillance since 2008, American internet
communication have been intercepted by NSA surveillance operations far more often
than the intended surveillance targets.
Gellman, 2014
Barton Gellman, Washington Post national staff. Contributed to three Pulitzer Prizes for The Washington
Post, 7-5-2014, "In NSA-intercepted data, those not targeted far outnumber the foreigners who are,"
Washington Post, https://www.washingtonpost.com/world/national-security/in-nsa-intercepted-datathose-not-targeted-far-outnumber-the-foreigners-who-are/2014/07/05/
Ordinary Internet users, American and non-American alike, far outnumber legally targeted foreigners in
the communications intercepted by the National Security Agency from U.S. digital networks, according to a
four-month investigation by The Washington Post. Nine of 10 account holders found in a large cache of intercepted
conversations, which former NSA contractor Edward Snowden provided in full to The Post, were not the intended surveillance
targets but were caught in a net the agency had cast for somebody else. Many of them were Americans. Nearly half
of the surveillance files, a strikingly high proportion, contained names, e-mail addresses or other details
that the NSA marked as belonging to U.S. citizens or residents. NSA analysts masked, or minimized, more than 65,000 such
references to protect Americans privacy, but The Post found nearly 900 additional e-mail addresses, unmasked in the files, that could be strongly linked to U.S.
citizens or U.S.residents. The
surveillance files highlight a policy dilemma that has been aired only abstractly in
public. There are discoveries of considerable intelligence value in the intercepted messages and collateral harm
to privacy on a scale that the Obama administration has not been willing to address. Among the most valuable
contents which The Post will not describe in detail, to avoid interfering with ongoing operations are fresh revelations about a secret overseas nuclear project,
double-dealing by an ostensible ally, a military calamity that befell an unfriendly power, and the identities of aggressive intruders into U.S. computer networks.
Months of tracking communications across more than 50 alias accounts, the files show, led directly to the 2011 capture in Abbottabad of Muhammad Tahir
Shahzad, a Pakistan-based bomb builder, and Umar Patek, a suspect in a 2002 terrorist bombing on the Indonesian island of Bali. At the request of CIA officials, The
Post is withholding other examples that officials said would compromise ongoing operations. Many
repositories, and for more than a year, senior government officials have depicted it as beyond Snowdens reach.The Post reviewed roughly 160,000 intercepted email and instant-message conversations, some of them hundreds of pages long, and 7,900 documents taken from more than 11,000 online accounts. The material
spans President Obamas first term, from 2009 to 2012, a period of exponential growth for the NSAs domestic collection. Taken together, the
files offer an
unprecedented vantage point on the changes wrought by Section 702 of the FISA amendments, which
enabled the NSA to make freer use of methods that for 30 years had required probable cause and a
warrant from a judge. One program, code-named PRISM, extracts content stored in user accounts at Yahoo,
Microsoft, Facebook, Google and five other leading Internet companies . Another, known inside the NSA as Upstream, intercepts
data on the move as it crosses the U.S. junctions of global voice and data networks. No government
oversight body, including the Justice Department, the Foreign Intelligence Surveillance Court, intelligence committees in Congress or the presidents Privacy
and Civil Liberties Oversight Board, has delved into a comparably large sample of what the NSA actually collects
not only from its targets but also from people who may cross a targets path.
Plan: The United States federal government should limit the scope of its domestic surveillance under
Section 702 of the Foreign Intelligence Surveillance Act to communications whose sender or recipient
is a valid intelligence target and whose targets pose a tangible threat to national security.
First, surveillance under Section 702 is a substantial invasive of privacy because of the
broad targeting guidelines in the FISA Amendments Act.
Laperruque, 2014,
Jake, Center for Democracy and Tehcnology Fellow on Privacy, Surveillance, and Security. Previously
served as a law clerk for Senator Al Franken on the Subcommittee on Privacy, Technology, and the Law,
and as a policy fellow for Senator Robert Menendez. "Why Average Internet Users Should Demand
Significant Section 702 Reform," Center For Democracy & Technology., 7-22-2014,
https://cdt.org/blog/why-average-internet-users-should-demand-significant-section-702-reform/
Section 702 Surveillance Is Fundamentally More Invasive
While incidental collection of the communications of a person who communicates with a target is an inevitable feature of communications
In other
instances of communications surveillance conducted in the US, surveillance required court approval of a
target, and that target must be a suspected wrongdoer or spy, a terrorist, or another agent of a foreign
power. Section 702 requires neither of these elements.
Under Section 702, targeting can occur for the purpose of collecting foreign intelligence information
even though there is no court review of any particular target. Instead, the super secret FISA court merely determines
surveillance, it is tolerated when the reason for the surveillance is compelling and adequate procedural checks are in place.
whether the guidelines under which the surveillance is conducted are reasonably designed to result in the targeting of non-Americans abroad
and that minimization guidelines are reasonable. This means
And, indiscriminate wide-scale NSA Surveillance erodes privacy rights and violates the
constitution
Sinha, 2014
G. Alex Sinha is an Aryeh Neier fellow with the US Program at Human Rights Watch and the Human
Rights Program at the American Civil Liberties Union, July 2014 With Liberty to Monitor All How LargeScale US Surveillance is Harming Journalism, Law, and American Democracy Human Rights Watch,
http://www.hrw.org/node/127364
The United States government today is implementing a wide variety of surveillance programs that, thanks to
developments in its technological capacity, allow it to scoop up personal information and the content of personal
communications on an unprecedented scale. Media reports based on revelations by former National Security
Agency (NSA) contractor Edward Snowden have recently shed light on many of these programs. They have revealed,
for example, that the US collects vast quantities of informationknown as metadataabout phone calls made to, from, and within the US.
It also routinely collects the content of international chats, emails, and voice calls. It has engaged in the large-
scale collection of massive amounts of cell phone location data. Reports have also revealed a since-discontinued effort to track internet usage
and email patterns in the US; the comprehensive interception of all of phone calls made within, into, and out of Afghanistan and the Bahamas;
the daily collection of millions of images so the NSA can run facial recognition programs; the acquisition of hundreds of millions of email and
chat contact lists around the world; and the NSAs deliberate weakening of global encryption standards. In
response to public
concern over the programs intrusion on the privacy of millions of people in the US and around the world, the US
government has at times acknowledged the need for reform. However, it has taken few meaningful
steps in that direction. On the contrary, the USparticularly the intelligence communityhas forcefully defended the surveillance
programs as essential to protecting US national security. In a world of constantly shifting global threats, officials argue that the US simply
cannot know in advance which global communications may be relevant to its intelligence activities, and that as a result, it needs the authority
to collect and monitor a broad swath of communications. In our interviews with them, US officials argued that the programs are effective,
plugging operational gaps that used to exist, and providing the US with valuable intelligence. They also insisted the programs are lawful and
subject to rigorous and multi-layered oversight, as well as rules about how the information obtained through them is used. The government has
emphasized that it does not use the information gleaned from these programs for illegitimate purposes, such as persecuting political
opponents. The
questions raised by surveillance are complex. The government has an obligation to protect
national security, and in some cases, it is legitimate for government to restrict certain rights to that end.
At the same time, international human rights and constitutional law set limits on the states authority to engage in
activities like surveillance, which have the potential to undermine so many other rights. The current,
large-scale, often indiscriminate US approach to surveillance carries enormous costs. It erodes global
digital privacy and sets a terrible example for other countries like India, Pakistan, Ethiopia, and others
that are in the process of expanding their surveillance capabilities. It also damages US credibility in advocating internationally for internet
freedom, which the US has listed as an important foreign policy objective since at least 2010.As this report documents, US
surveillance
programs are also doing damage to some of the values the United States claims to hold most dear.
These include freedoms of expression and association, press freedom, and the right to counsel, which
are all protected by both international human rights law and the US Constitution.
And, these privacy violations are more dangerous than any risk of terrorism, which is
magnified by the fact that surveillance fails to prevent attacks.
Schneier, 2014
Bruce Schneier a fellow at the Berkman Center for Internet and Society at Harvard Law School, a board
member of the Electronic Frontier Foundation, an Advisory Board Member of the Electronic Privacy
Information Center, and the CTO at Resilient Systems, Inc.,1-6-2014, "Essays: How the NSA Threatens
National Security," Schneier On Security,
https://www.schneier.com/essays/archives/2014/01/how_the_nsa_threaten.html
We have no evidence that any of this surveillance makes us safer. NSA Director General Keith Alexander responded to
these stories in June by claiming that he disrupted 54 terrorist plots. In October, he revised that number downward to 13, and then to "one or
two." At
this point, the only "plot" prevented was that of a San Diego man sending $8,500 to support a
Somali militant group. We have been repeatedly told that these surveillance programs would have been able to stop 9/11, yet the
NSA didn't detect the Boston bombingseven though one of the two terrorists was on the watch list and the other had a sloppy
social media trail. Bulk collection of data and metadata is an ineffective counterterrorism tool. Not only is
ubiquitous surveillance ineffective, it is extraordinarily costly. I don't mean just the budgets, which will continue to
skyrocket. Or the diplomatic costs, as country after country learns of our surveillance programs against their citizens. I'm also talking about the
cost to our society. It breaks so much of what our society has built. It breaks our political systems, as Congress is
unable to provide any meaningful oversight and citizens are kept in the dark about what government does. It breaks our legal systems, as laws
are ignored or reinterpreted, and people are unable to challenge government actions in court. It breaks our commercial
systems, as U.S. computer products and services are no longer trusted worldwide. It breaks our technical systems, as the very protocols of the
Internet become untrusted. And
it breaks our social systems; the loss of privacy, freedom, and liberty is much
more damaging to our society than the occasional act of random violence. And finally, these systems are
susceptible to abuse. This is not just a hypothetical problem. Recent history illustrates many episodes where this information was, or
would have been, abused: Hoover and his FBI spying, McCarthy, Martin Luther King Jr. and the civil rights movement, anti-war Vietnam
protesters, andmore recentlythe Occupy movement. Outside the U.S., there are even more extreme examples.
Building the
surveillance state makes it too easy for people and organizations to slip over the line into abuse.
The First impact is the loss of personal autonomy and agency. Privacy is a gateway
right, it enables all of our other freedoms.
PoKempne 2014,
Dinah, General Counsel at Human Rights Watch, The Right Whose Time Has Come (Again): Privacy in
the Age of Surveillance 1/21/14 http://www.hrw.org/world-report/2014/essays/privacy-in-age-ofsurveillance
Technology has invaded the sacred precincts of private life, and unwarranted exposure has imperiled
our security, dignity, and most basic values. The law must rise to the occasion and protect our rights.
Does this sound familiar? So argued Samuel Warren and Louis Brandeis in their 1890 Harvard Law Review
article announcing The Right to Privacy. We are again at such a juncture. The technological developments they
saw as menacingphotography and the rise of the mass circulation pressappear rather quaint to us now. But the harms to emotional,
psychological, and even physical security from unwanted exposure seem just as vivid in our digital age.Our
renewed sense of
vulnerability comes as almost all aspects of daily social life migrate online. At the same time, corporations and
governments have acquired frightening abilities to amass and search these endless digital records, giving them the power to know us in
extraordinary detail.
In a world where we share our lives on social media and trade immense amounts of personal information for the ease and
convenience of online living, some have questioned whether privacy is a relevant concept. It is not just relevant,
but crucial.
Indeed, privacy is a gateway right that affects our ability to exercise almost every other right, not least
our freedom to speak and associate with those we choose, make political choices, practice our religious
beliefs, seek medical help, access education, figure out whom we love, and create our family life. It is
nothing less than the shelter in which we work out what we think and who we are; a fulcrum of our
autonomy as individuals.
The importance of privacy, a right we often take for granted, was thrown into sharp relief in 2013 by the steady stream
of revelations from United States government files released by former National Security Agency (NSA) contractor Edward Snowden,
and published in the Guardian and other major newspapers around the world. These revelations, supported by highly classified
documents, showed the US, the UK, and other governments engaged in global indiscriminate data
interception, largely unchecked by any meaningful legal constraint or oversight, without regard for the
rights of millions of people who were not suspected of wrongdoing.
Haggerty, 2015
Kevin D. Professor of Criminology and Sociology at the University of Alberta, Whats Wrong with Privacy
Protections? in A World Without Privacy: What Law Can and Should Do? Edited by Austin Sarat p. 230
The revelations of whistle-blowers such as Chelsea Manning, Jeremy Hammond and Edward Snowden about government
lawlessness and corporate spying provide a new meaning if not a revitalized urgency and relevance to
George Orwell's dystopian fable 1984. Orwell offered his readers an image of the modern state that had become dystopian - one in which
privacy as a civil virtue and a crucial right was no longer valued as a measure of the robust strength of a healthy and thriving democracy. Orwell
was clear that the right to privacy had come under egregious assault. But the
The Third Impact is Bare Life; The sovereigns use of surveillance under Section 702
renders the entire populace bare life
Douglas, independent scholar, 2009 (Jeremy, Disappearing Citizenship: surveillance and the state of
exception, published in Surveillance & Society Vol 6, No 1, p. 37
http://library.queensu.ca/ojs/index.php/surveillance-and-society/article/view/3402/3365)//roetlin
Electronic and biometric surveillance are the tactics through which the government is creating a space
in which the exception is routine practice. The biopolitical implication of surveillance [under Section
702] is the universalization of bare life : History teaches us how practices first reserved for foreigners find themselves
applied later to the rest of the citizenry (ibid). These new control measures have created a situation in which not only is there no
clear distinction between private and political life, but there is no fundamental claim, or right, to a
political life as such not even for citizens from birth; thus, the originary biopolitical act that inscribes life as political from
birth is more and more a potential depoliticization and ban from the political realm. We are all exposed to the stateless
potentiality of a bare life excluded from the political realm, but not outside the violence of the law (and
therefore still included): states, which should constitute the precise space of political life, have made the person the ideal
suspect, to the point that it's humanity itself that has become the dangerous class (ibid). Making people
suspects is equivalent to making people bare life it is the governmental (a Foucauldian governmentality rather
than an Agambenian sovereignty I would argue) production of a life exposed to the pure potentiality of the state of
exception: the sovereign ban, which applies to the exception in no longer applying, corresponds to the structure of potentiality, which
maintains itself in relation to actuality precisely through its ability not to be (Agamben 1994, 46). Surveillance [under Section 702]
is the technique that opens up this potentiality, which allows for the normalization of the
exception . In this particular instance i.e. biometric data collection and surveillance in the US the state of exception as a permanent
form of governmentality and the universalization of homines sacri has been brought into existence though the USA Patriot Act2 and the Patriot
Act II3.
exceptional disruption of privacy for legitimate state reasons cannot and should not be mistaken for a
usual and customary rule of mass invasion of people's private lives without their informed consent.
Benjamin Franklin wisely and succinctly expressed the point: "Those who surrender freedom for security
will not have, nor do they deserve, either one." In relinquishing our privacy to government, we also lose
the freedom to control, and act on, our personal information, which is what defines us individually, and
collectively, as free agents and a free nation. In a world devoid of freedom to control who we are,
proclaiming that we are "secure" is an empty platitude.
Right before Christmas break, our school faced serious bomb threats. An unnamed, armed individual
send a threat to our school administrators. School was cancelled because the perpetrator could not be
identified and neutralized before the following school day. My sister and I were home alone when we
received the news. My sister picked up the phone. Armed threat. Apparently someone threatened us,
so theres no school tomorrow said my sister. I was just confused. I assumed it was probably just
another stupid kid who didnt want to take his/her exams. I texted my mom, fully expecting her to freak
out about the threat.. but she didnt. Do you know what she DID freak out about??? The fact that we
were texting people about what was going on. Stop right now. Dont say anything to anyone. You know
the government tracks this and your name is suspicious. I dont want you to get caught. My moms
statement made me so angry. Why am I suspicious? Ive never done anything that would warrant this
treatment! I mean, my skin is dark and my name isnt American. I felt like crying and screaming at the
same time. This is not ok. I AM AMERICAN. I was born and raised here. I dont deserve to be held to a
separate set of standards. MY government is taking away MY rights. I will not stand for this, and neither
should you judge. Do not stand for this extreme discrimination.
NSA surveillance has put the US ecomony and competive advantage at risk because of
losses in the technology sector. The USA freedom act wont solve the problem.
Mindock 2015
Clark Mindock - Reporting Fellow at International Business Times Internally quoting The Information
Technology and Innovation Foundation. ITIF is a non-partisan research and educational institute a
think tank NSA Surveillance Could Cost Billions For US Internet Companies After Edward Snowden
Revelations - International Business Times - June 10 2015 http://www.ibtimes.com/nsa-surveillancecould-cost-billions-us-internet-companies-after-edward-snowden-1959737
Failure to reform National Security Administration spying programs revealed by Edward Snowden could be more
economically taxing than previously thought, says a new study published by the Information Technology and Innovation
Foundation Tuesday. The study suggests the programs could be affecting the technology sector as a whole,
not just the cloud-computing sector, and that the costs could soar much higher than previously
expected. Even modest declines in cloud computing revenues from the revealed surveillance programs, according to a
previous report, would cost between $21.5 billion and $35 billion by 2016. New estimates show that the toll will likely far exceed ITIFs
initial $35 billion estimate. The U.S. governments failure to reform many of the NSAs surveillance programs
has damaged the competitiveness of the U.S. tech sector and cost it a portion of the global market
share, a summary of the report said. Revelations by defense contractor Snowden in June 2013 exposed massive U.S. government
surveillance capabilities and showed the NSA collected American phone records in bulk, and without a warrant. The bulk phone-record
revelations, and many others in the same vein, including the required complacency of American telecom and Internet companies in
providing the data, raised questions about the transparency of American surveillance programs and
prompted outrage from privacy advocates. The study, published this week, argues that unless the American government
can vigorously reform how NSA surveillance is regulated and overseen, U.S. companies will lose contracts
and, ultimately, their competitive edge in a global market as consumers around the world choose cloud
computing and technology options that do not have potential ties to American surveillance programs.
The report comes amid a debate in Congress on what to do with the Patriot Act, the law that provides much of the
authority for the surveillance programs. As of June 1, authority to collect American phone data en masse expired,
though questions remain as to whether letting that authority expire is enough to protect privacy. Supporters of the
programs argue that they provide the country with necessary capabilities to fight terrorism abroad. A further reform made the
phone records collection process illegal for the government, and instead gave that responsibility to the
telecom companies.
first, this seemed to be happening. Americas trade deficit, which was about 6% of GDP in 2006, had more than halved by 2009. But
now
the world is slipping back into some nasty habits. Hair grows faster than the euro zone, and what growth
there is depends heavily on exports. The countries of the single currency are running a current-account
surplus of about 2.6% of GDP, thanks largely to exports to America. At 7.4% of GDP, Germanys trade
surplus is as large as it has ever been. Chinas growth, meanwhile, is slowingand once again relying
heavily on spending elsewhere. It notched up its own record trade surplus in January. Chinas exports have actually begun to drop,
but imports are down by more. And over the past year the renminbi, which rose by more than 10% against the dollar in 2010-13, has begun
slipping again, to the annoyance of American politicians. Americas economy
response to growing discontent with US surveillance, one political response has been to push for more
technological sovereignty and data nationalisation. The Snowden disclosures have therefore had
serious implications on the development of the Internet and hastened trends to balkanize the Internet
to the detriment of the development of a wide, vast and easily accessible online network. The Internet as
we knew it, or believed we knew it, is a global platform for exchange of information, open and free debate,
and commerce. But Brazil and the European Union, for example, announced plans to lay a $185 million
undersea fibre-optic cable between them to thwart US surveillance. German politicians also called for the
development of a German internet for German customers data to circumvent foreign servers and the information to stay on networks that
would fully be under Germanys control. 159 Russia
This regional fragmentation of the internet would collapse the global economy and
create the necessary conditions for global instability.
Jardine, 2014
Eric CIGI Research Fellow, Global Security & Politics, 9-19-2014, "Should the Average Internet User in a
Liberal Democracy Care About Internet Fragmentation? ," Cigi,
https://www.cigionline.org/blogs/reimagining-internet/should-average-internet-user-liberaldemocracy-care-about-internet-fragme
Even though your average liberal democratic Internet user wouldnt see it, at least at the content level, the fragmentation of the Internet would
matter a great deal. If
the Internet was to break apart into regional or even national blocks, there would be
large economic costs in terms of lost future potential for global GDP growth. As a recent McKinsey & Company
report illustrates, upwards of 15 to 25 percent of Global GDP is currently determined by the movement of
goods, money, people and data. These global flows (which admittedly include more than just data flows) contribute yearly between
250 to 400 billion dollars to global GDP growth. The contribution of global flows to global GDP growth is only likely to
grow in the future, provided that the Internet remains a functionally universal system that works
extraordinarily well as a platform for e-commerce. Missing out on lost GDP growth harms people economically in liberal democratic countries
and elsewhere. Average users in the liberal democracies should care, therefore, about the fragmentation of the broader Internet because it will
cost them dollars and cents, even if the fragmentation of the Internet would not really affect the content that they themselves
access.Additionally, the same Mckinsey & Company report notes that countries that are well connected to the global system have GDP growth
that is up to 40 percent higher than those countries that have fewer connections to the wider world. Like interest rates, annual GDP growth
compounds itself, meaning that early gains grow exponentially. If
citizens should resist Internet fragmentation efforts in any form by putting pressure on their national
politicians, Internet Service Providers, and content intermediaries, like Google, to respect the fundamental (and
fundamentally beneficial) universally interoperable structure of the Internet. To do otherwise is to
accept the loss of potential future global prosperity and to encourage a world that is unequal and prone
to conflict and hardship.
Some of the dynamics of the pre-1914 financial world are now re-emerging. Then an economically
declining power, Britain, wanted to use finance as a weapon against its larger and faster growing
competitors, Germany and the United States. Now America is in turn obsessed by being overtaken by China
according to some calculations, set to become the worlds largest economy in 2014. In the aftermath of the 2008 financial
crisis, financial institutions appear both as dangerous weapons of mass destruction, but also as potential
instruments for the application of national power. In managing the 2008 crisis, the dependence of foreign banks on U.S. dollar funding
constituted a major weakness, and required the provision of large swap lines by the Federal Reserve. The United States provided that support
to some countries, but not others, on the basis of an explicitly political logic, as Eswar Prasad demonstrates in his new book on the Dollar
Trap. Geo-politics is intruding into banking practice elsewhere. Before the Ukraine crisis, Russian banks were trying to
acquire assets in Central and Eastern Europe. European and U.S. banks are playing a much reduced role in Asian trade finance. Chinese banks
are being pushed to expand their role in global commerce. After the financial crisis, China started to build up the renminbi as a major
international currency. Russia and China have just proposed to create a new credit rating agency to avoid what they regard as the political bias
of the existing (American-based) agencies. The
next stage in this logic is to think about how financial power can be
directed to national advantage in the case of a diplomatic tussle. Sanctions are a routine (and not terribly successful)
part of the pressure applied to rogue states such as Iran and North Korea. But financial pressure can be much more powerfully applied to
countries that are deeply embedded in the world economy. The test is in the Western imposition of sanctions after the Russian annexation of
Crimea. President Vladimir Putins calculation in response is that the European Union and the United States cannot possibly be serious about
the financial war. It would turn into a boomerang: Russia would be less affected than the more developed and complex financial markets of
Europe and America. The
threat of systemic disruption generates a new sort of uncertainty, one that mirrors
the decisive feature of the crisis of the summer of 1914. At that time, no one could really know whether
clashes would escalate or not. That feature contrasts remarkably with almost the entirety of the Cold War, especially since the
1960s, when the strategic doctrine of Mutually Assured Destruction left no doubt that any superpower conflict would inevitably escalate. The
idea of network disruption relies on the ability to achieve advantage by surprise, and to win at no or low
cost. But it is inevitably a gamble, and raises prospect that others might, but also might not be able to,
mount the same sort of operation. Just as in 1914, there is an enhanced temptation to roll the dice,
even though the game may be fatal.
NSA spying has undermined American foreign policy. It undercut any credibility to
push for democratic freedom in repressive regimes, repressive surveillance is growing
worldwide as a result.
Schneier 15
Bruce Schneier a fellow at the Berkman Center for Internet and Society at Harvard Law School, a board
member of the Electronic Frontier Foundation, an Advisory Board Member of the Electronic Privacy
Information Center, and the CTO at Resilient Systems, Inc 3/2/15, Data and Goliath: The Hidden Battles
to Collect Your Data and Control Your World. P. 106
In 2010, then secretary of state Hillary Clinton gave a speech declaring Internet freedom a major US foreign
policy goal. To this end, the US State Department funds and supports a variety of programs worldwide, working to counter censorship,
promote encryption, and enable anonymity, all designed "to ensure that any child, born anywhere in the world, has
access to the global Internet as an open platform on which to innovate, learn, organize, and express
herself free from undue interference or censorship." This agenda has been torpedoed by the awkward
realization that the US and other democratic governments conducted the same types of surveillance they have
criticized in more repressive countries. Those repressive countries are seizing on the opportunity,
pointing to US surveillance as a justification for their own more draconian Internet policies: more
surveillance, more censorship, and a more isolationist Internet that gives individual countries more
control over what their citizens see and say. For example, one of the defenses the government of Egypt
offered for its plans to monitor social media was that "the US listens in to phone calls, and supervises
anyone who could threaten its national security." Indians are worried that their government will cite the US's actions to
justify surveillance in that country. Both China and Russia publicly called out US hypocrisy. This affects Internet freedom
worldwide. Historically, Internet governancewhat little there waswas largely left to the United States,
because everyone more or less believed that we were working for the security of the Internet instead of against it. But now that the US
has lost much of its credibility, Internet governance is in turmoil. Many of the regulatory bodies that influence the
Internet are trying to figure out what sort of leadership model to adopt. Older international standards organizations like the International
Telecommunications Union are trying to increase their influence in Internet governance and develop a more nationalist set of rules. This
is
the cyber sovereignty movement, and it threatens to fundamentally fragment the Internet. It's not new,
but it has been given an enormous boost from the revelations of NSA spying. Countries like Russia,
China, and Saudi Arabia are pushing for much more autonomous control over the portions of the
Internet within their borders. That, in short, would be a disaster. The Internet is fundamentally a global
platform. While countries continue to censor and control, today people in repressive regimes can still
read information from and exchange ideas with the rest of the world. Internet freedom is a human
rights issue, and one that the US should support.
Further, this hypocrisy has created the conditions that will accelerate the global rise of
authoritarianism.
Chenoweth & Stephan 2015
Erica Chenoweth, political scientist at the University of Denver.& Maria J. Stephan, Senior Policy Fellow
at the U.S. Institute of Peace, Senior Fellow at the Atlantic Council.7-7-2015, "How Can States and NonState Actors Respond to Authoritarian Resurgence?," Political Violence @ a Glance,
http://politicalviolenceataglance.org/2015/07/07/how-can-states-and-non-state-actors-respond-toauthoritarian-resurgence/
Chenoweth: Why is authoritarianism making a comeback? Stephan: Theres obviously no single answer to this. But part of
the answer is that democracy is losing its allure in parts of the world. When people dont see the economic and governance
benefits of democratic transitions, they lose hope. Then theres the compelling stability first argument. Regimes around the world,
including China and Russia, have readily cited the chaos of the Arab Spring to justify heavy-handed
policies and consolidating their grip on power. The color revolutions that toppled autocratic regimes in Serbia, Georgia, and
Ukraine inspired similar dictatorial retrenchment. There is nothing new about authoritarian regimes adapting to
changing circumstances. Their resilience is reinforced by a combination of violent and non-coercive
measures. But authoritarian paranoia seems to have grown more piqued over the past decade. Regimes have
figured out that people power endangers their grip on power and they are cracking down. Theres no better evidence of the
effectiveness of civil resistance than the measures that governments take to suppress itsomething you detail
in your chapter from my new book. Finally, and importantly, democracy in this country and elsewhere has taken a hit
lately. Authoritarian regimes mockingly cite images of torture, mass surveillance, and the catering to the radical fringes
happening in the US political system to refute pressures to democratize themselves. The financial crisis here and in
Europe did not inspire much confidence in democracy and we are seeing political extremism on the rise in places like Greece and Hungary.
Here in the US we need to get our own house in order if we hope to inspire confidence in democracy
abroad.
This still leaves open the question of what is driving authoritarian innovation in cyberspace.
difficult to reverse the authoritarian surge in cyberspace. Deibert offers some possible solutions: for starters, he writes that the political
economy of cybersecurity can be altered through stronger export controls, smart sanctions, and a monitoring system to detect abuses.
Further, he recommends that cybersecurity trade fairs open their doors to civil society watchdogs who can help hold governments and the
private sector accountable. Similarly, Deibert suggests that opening regional cybersecurity initiatives to civil society participation could mitigate
violations of user rights. This might seem unlikely to occur within some authoritarian-led intergovernmental organizations, but setting a
normative expectation of civil society participation might help discredit the efforts of bad actors. Deibert
that govern themselves in a truly democratic fashion do not go to war with one
another. They do not aggress against their neighbors to aggrandize themselves or glorify their leaders. Democratic
governments do not ethnically "cleanse" their own populations, and they are much less likely to face
ethnic insurgency. Democracies do not sponsor terrorism against one another. They do not build
weapons of mass destruction to use on or to threaten one another. Democratic countries form more reliable, open, and
enduring trading partnerships. In the long run they offer better and more stable climates for investment. They are more
environmentally responsible because they must answer to their own citizens, who organize to protest the destruction of their
environments. They are better bets to honor international treaties since they value legal obligations and because their openness makes
it much more difficult to breach agreements in secret. Precisely because, within their own borders, they respect competition, civil liberties,
property rights, and the rule of law, democracies are the
The plan solves, limiting the purposes of 702 collection to a tangible threat to
national security is critical to solve overcollection.
Sinha, 2014
G. Alex Sinha is an Aryeh Neier fellow with the US Program at Human Rights Watch and the Human
Rights Program at the American Civil Liberties Union, July 2014 With Liberty to Monitor All How LargeScale US Surveillance is Harming Journalism, Law, and American Democracy Human Rights Watch,
http://www.hrw.org/node/127364
Narrow the purposes for which all foreign intelligence surveillance may be conducted and limit such
surveillance to individuals, groups, or entities who pose a tangible threat to national security or a
comparable state interest. o Among other steps, Congress should pass legislation amending Section 702 of FISA and
related surveillance authorities to narrow the scope of what can be acquired as foreign intelligence
information, which is now defined broadly to encompass, among other things, information related to the
conduct of the foreign affairs of the United States. It should be restricted to what is necessary and proportionate to protect
legitimate aims identified in the ICCPR, such as national security. In practice, this should mean that the government may
acquire information only from individuals, groups, or entities who pose a tangible threat to national
security narrowly defined, or a comparable compelling state interest.
are sensible reforms that can significant limit the collateral damage to
privacy caused by Section 702 without impeding national security. Limiting the purposes for which
Section 702 can be conducted will narrow the degree to which communications are monitored between
individuals not suspected of wrongdoing or connected to national security threats. Closing retention
loopholes present in the Minimization Guidelines governing that surveillance will ensure that when Americans
communications are incidentally collected, they are not kept absent national security needs. And closing
the backdoor search loophole would ensure that when Americans communications are retained
because they communicated with a target of Section 702 surveillance, they couldnt be searched unless
the standards for domestic surveillance of the American are met.
And, the plan eliminates the collection of communication about targets -that solves
upstream collection.
Nojeim, 2014
Greg, Director, Project on Freedom, Security & Technology Comments To The Privacy And Civil Liberties
Oversight Board Regarding Reforms To Surveillance Conducted Pursuant To Section 702 Of Fisa April 11,
2014 https://d1ovv0c9tw0h0c.cloudfront.net/files/2014/04/CDT_PCLOB-702-Comments_4.11.13.pdf
C. Collection of
communications about targets that are neither to nor from targets should be
prohibited. The Government takes the position that Section 702 permits it to collect not only communications that are to or from a foreign
intelligence target, but also communications that are about the target because they mention an identifier associated with the target.17 The
practice directs the focus of surveillance away from suspected wrongdoers and permits the NSA to target communications between individuals
with no link to national security investigations. Because
the NSA engages in upstream surveillance on the Internet backbone,20 meaning on fiber cables and infrastructure
as data flows past,21 temporarily copying the content of the entire data stream so it can be searched for the
same selectors used for the downstream or PRISM surveillance. As a result, the NSA has the capability to search
any Internet communication going into or out of the U.S.22 without particularized intervention by a provider. Direct access creates
direct opportunity for abuse, and should not be permitted to a military intelligence agency. This dragnet
scanning also results in the collection of multi-communication transactions, (MCTs) which include tens of thousands wholly domestic
communications each year.23 The FISC required creation of new minimization rules for MCTs in 2011, but did not limit their collection.24 The
mass searching of communications content inside the United States, knowing that it the communications searched include tens of thousands of
wholly domestic communications each year, raises profound constitutional questions. Abandoning
collection of
communications about targets would remove any justification for upstream collection, eliminate the
serious problems posed by direct government access to the Internet infrastructure, eliminate the
collection of tens of thousands of wholly domestic communications in contravention of the statute, an
make surveillance under Section 702 consistent with the congressional intent.