NSA AffirmativeSLUDL/NAUDL 2015-16
NSA Affirmative
NSA Affirmative
Summary
Glossary
1st Affirmative Constructives
NSA 1AC (4-min Version) (1/4)
NSA 1AC (Short Version) (1/6)
NSA 1AC (Long Version) (1/18)
Privacy Extensions
Answers to NSA not Invasive
Answer to Privacy Invasions Inevitable
Answers to “Corporations violate privacy ”
Answers to Security Comes First
Answers to “Posner – Balancing Good”
Privacy is a Gateway Right
Privacy is key to Autonomy
Surveillance Hurts Freedom
Surveillance causes a Chilling Effect
Fear Magnifies Privacy Loss
Answer to “Nothing to Hide”
Economy Extensions
Economy Advantage – Internal Link Magnifier
Answers to Hurts Foreign Companies More
Answers to Companies won’t leave cloud
Answers to Tech industry not hurt
Answers to Economic Decline Doesn’t Cause War
Answers to Cybersecurity Sector Turn
Internet Freedom Extensions
Answers to USA Freedom Act Solves
Answers to Internet Freedom Doesn’t Spur Democracy
Answers to Internet Freedom is about Profits
Answers to International Surveillance matters more
Answers to US not modelled
Answers to Democracy doesn’t solve war
Inherency/Harms Extensions
Answers to USA Freedom Act Solves
Answers to Domestic Collection is Small
Solvency Extensions
Limiting Section 702 Solves
Plan Solves PRISM
Answers to Reforming domestic surveillance alone doesn’t solve
Answers to Circumvention
Topicality Answers (JV & V Only)
Topicality Domestic (JV & V Only)
Terrorism DA Answers
NSA Surveillance doesn’t stop terrorism (Terror DA Ans)
Surveillance causes false positives
Surveillance creates too much data
Surveillance creates bad data
Answer to: would have solved 9/11
Executive Order CP Answers (JV & V Only)
Answer to the Executive Counterplan (JV & V Only)
Politics DA Answers (V Only)
Answers to Politics – Plan is popular (V Only)
Summary
This affirmative case argues that the National Security Administration (NSA) current data collection practices are harmful and should be reformed. The affirmative focuses on domestic data collection.
You can choose to construct a case with up to 3 advantages (Privacy, Economy, or Internet Freedom). Read the file select your favorite advantages and practice to make sure you can finish in 8 minutes. Remember the solvency cards to.
Privacy- the NSA currently collects data on millions of internet users who are connected in some way to international communications that the organization is monitoring. This advantage argues that this domestic surveillance practice is a violation of the rights of US citizens and not needed to protect the country from a terrorist attack.
Economy- this advantage argues that NSA domesitic spying programs have hurt the American technology sector as businesses around the world avoid using American products like Dropbox and Google since their content could be monitored by the government. This economic slow down could hurt the world economy and lead to wars.
Internet Freedom- this advantage argues that a domestic surveillance program run by the NSA hurts the ability of the US to persuade dictatorships and other authoritarian governments to maintain a free internet. Access to the internet is crucial to fostering democratic transitions around the world. Democratic governments increase peace and are less likely to start wars.
The affirmative would solve this advantages by placing limits on the collection of data to only communication to or from a suspect in an active investigation. This would prevent the government from stockpiling information on every citizen and help make the search for terrorists and other dangerous groups more efficient.
Glossary
FISA- The Foreign Intelligence Surveillance Act of 1978 ("FISA" Pub.L. 95–511, 92 Stat. 1783, 50 U.S.C. ch. 36) is a United States federal law which prescribes procedures for the physical and electronic surveillance and collection of "foreign intelligence information" between "foreign powers" and "agents of foreign powers"
Moore’s Law-is the observation that the number of transistors in a dense integrated circuit has doubled approximately every two years. In other words, computers get twice as powerful every 2 years.
NSA- is an intelligence organization of the United States government, responsible for global monitoring, collection, and processing of information and data for foreign intelligence and counterintelligence purpos
PRISM- s a clandestine surveillance program under which the United States National Security Agency (NSA) collects internet communications from at least nine major US internet companies.
Upstream- term used by the National Security Agency (NSA) of the United States for intercepting telephone and internet traffic from the internet backbone, i.e. major internet cables and switches, both domestic and foreign.
NSA 1AC (4-min Version) (1/4)
Observation 1 –The USA Freedom Act did not reform the NSA’s mass collection of domestic communication. The agency still has authority to gather data under Section 702 of the FISA Amendments Act.
Goitein,Co-Director Brennan Center for Justice’s Liberty and National Security Program2015,
(Elizabeth, , 6-5-2015, "Who really wins from NSA reform?," MSNBC,
Even under USA Freedom, however, the government is stillable to pull in a great deal of information about innocent Americans. Needless to say, not everyone in contact with a suspected terrorist is guilty of a crime; even terrorists call for pizza delivery. Intelligence officials also may need to obtain records – like flight manifests – that include information about multiple people, most of whom have nothing to do with terrorism. Some of this “overcollection” may be inevitable, but its effects could be mitigated. For instance, agencies could be given a short period of time to identify information relevant to actual suspects, after which they would have to destroy any remaining information. USA Freedom fails to impose such limits. More fundamentally, bulk collection of business records is only one of the many intelligence activities that abandoned the individualized suspicion approach after 9/11. Until a few years ago, if the NSA, acting within the United States, wished to obtain communications between Americans and foreigners, it had to convince the FISA Court that the individual target was a foreign power or its agent. Today, under Section 702 of the FISA Amendments Act, the NSA may target any foreigner overseas and collect his or her communications with Americans without obtaining any individualized court order. Under Executive Order 12333, which governs the NSA’s activities when it conducts surveillance overseas, the standards are even more lax. The result is mass surveillance programs that make the phone metadata program seem dainty in comparison. Even though these programs are nominally targeted at foreigners, they “incidentally” sweep in massive amounts of Americans’ data, including the content of calls, e-mails, text messages, and video chats. Limits on keeping and using such information are weak and riddled with exceptions. Moreover, foreign targets are not limited to suspected terrorists or even agents of foreign powers. As the Obama administration recently acknowledged, foreigners have privacy rights too, and the ability to eavesdrop on any foreigner overseas is an indefensible violation of those rights. Intelligence officials almost certainly supported USA Freedom because they hoped it would relieve the post-Snowden pressure for reform. Their likely long-term goal is to avoid changes to Section 702, Executive Order 12333, and the many other authorities that permit intelligence collection without any individualized showing of wrongdoing. Privacy advocates who supported USA Freedom did so because they saw it as the first skirmish in a long battle to rein in surveillance authorities. Their eye is on the prize: a return to the principle of individualized suspicion as the basis for surveillance. If intelligence officials are correct in their calculus, USA Freedom may prove to be a Pyrrhic victory. But if the law clears the way for further reforms across the full range of surveillance programs, history will vindicate the privacy advocates who supported it. The answer to what USA Freedom means for our liberties lies, not in the text of the law, but in the unwritten story of what happens next.
NSA 1AC (4-min Version) (2/4)
Observation 2: This creates massive privacy violations, which are more dangerous than any risk of terrorism
Schneier, fellow at the Berkman Center for Internet and Society at Harvard Law School,2014
Bruce 1-6-2014, "Essays: How the NSA Threatens National Security," SchneierOn Security,
We have no evidence that any of this surveillance makes us safer. NSA Director General Keith Alexander responded to these stories in June by claiming that he disrupted 54 terrorist plots. In October, he revised that number downward to 13, and then to "one or two." At this point, the only "plot" prevented was that of a San Diego man sending $8,500 to support a Somali militant group. We have been repeatedly told that these surveillance programs would have been able to stop 9/11, yet the NSA didn't detect the Boston bombings—even though one of the two terrorists was on the watch list and the other had a sloppy social media trail. Bulk collection of data and metadata is an ineffective counterterrorism tool.
Not only is ubiquitous surveillance ineffective, it is extraordinarily costly. I don't mean just the budgets, which will continue to skyrocket. Or the diplomatic costs, as country after country learns of our surveillance programs against their citizens. I'm also talking about the cost to our society. It breaks so much of what our society has built. It breaks our political systems, as Congress is unable to provide any meaningful oversight and citizens are kept in the dark about what government does. It breaks our legal systems, as laws are ignored or reinterpreted, and people are unable to challenge government actions in court. It breaks our commercial systems, as U.S. computer products and services are no longer trusted worldwide. It breaks our technical systems, as the very protocols of the Internet become untrusted. And it breaks our social systems; the loss of privacy, freedom, and liberty is much more damaging to our society than the occasional act of random violence.
And finally, these systems are susceptible to abuse. This is not just a hypothetical problem. Recent history illustrates many episodes where this information was, or would have been, abused: Hoover and his FBI spying, McCarthy, Martin Luther King Jr. and the civil rights movement, anti-war Vietnam protesters, and—more recently—the Occupy movement. Outside the U.S., there are even more extreme examples. Building the surveillance state makes it too easy for people and organizations to slip over the line into abuse.
1/92
NSA AffirmativeSLUDL/NAUDL 2015-16
NSA 1AC (4-min Version) (3/4)
We find the current state of affairs troubling and offer the following Plan: The United States federal government will limit the scope of its domestic surveillance under Section 702 of the Foreign Intelligence Surveillance Act to communications whose sender or recipient is a valid intelligence target and whose targets pose a tangible threat to national security.
NSA 1AC (4-min Version) (4/4)
Observation 3 – Limiting the scope of the Section 702 authority is critical to solve overcollection of American communications.
Laperruque, Fellow on Privacy, Surveillance, and Security at Center for Democracy and Technology, 2014,
(Jake, "Why Average Internet Users Should Demand Significant Section 702 Reform," Center For Democracy & Technology., 7-22-2014,
Where Do We Go From Here?
There are sensible reforms that can significant limit the collateral damage to privacy caused by Section 702 without impeding national security.Limiting the purposes for which Section 702 can be conducted will narrow the degree to which communications are monitored between individuals not suspected of wrongdoing or connected to national security threats.Closing retention loopholes present in the Minimization Guidelines governing that surveillance will ensure that when Americans’ communications are incidentally collected, they are not kept absent national security needs. And closing the backdoor search loophole would ensure that when Americans’ communications are retained because they communicated with a target of Section 702 surveillance, they couldn’t be searched unless the standards for domestic surveillance of the American are met.
NSA 1AC (Short Version) (1/6)
Observation 1 – The government engages in mass surveillance
1. The USA Freedom Act did not reform the NSA’s mass collection of domestic communication. The agency still has authority to gather data under Section 702 of the FISA Amendments Act.
Goitein,Co-Director Brennan Center for Justice’s Liberty and National Security Program2015,
(Elizabeth, , 6-5-2015, "Who really wins from NSA reform?," MSNBC,
Even under USA Freedom, however, the government is stillable to pull in a great deal of information about innocent Americans. Needless to say, not everyone in contact with a suspected terrorist is guilty of a crime; even terrorists call for pizza delivery. Intelligence officials also may need to obtain records – like flight manifests – that include information about multiple people, most of whom have nothing to do with terrorism. Some of this “overcollection” may be inevitable, but its effects could be mitigated. For instance, agencies could be given a short period of time to identify information relevant to actual suspects, after which they would have to destroy any remaining information. USA Freedom fails to impose such limits. More fundamentally, bulk collection of business records is only one of the many intelligence activities that abandoned the individualized suspicion approach after 9/11. Until a few years ago, if the NSA, acting within the United States, wished to obtain communications between Americans and foreigners, it had to convince the FISA Court that the individual target was a foreign power or its agent. Today, under Section 702 of the FISA Amendments Act, the NSA may target any foreigner overseas and collect his or her communications with Americans without obtaining any individualized court order. Under Executive Order 12333, which governs the NSA’s activities when it conducts surveillance overseas, the standards are even more lax. The result is mass surveillance programs that make the phone metadata program seem dainty in comparison. Even though these programs are nominally targeted at foreigners, they “incidentally” sweep in massive amounts of Americans’ data, including the content of calls, e-mails, text messages, and video chats. Limits on keeping and using such information are weak and riddled with exceptions. Moreover, foreign targets are not limited to suspected terrorists or even agents of foreign powers. As the Obama administration recently acknowledged, foreigners have privacy rights too, and the ability to eavesdrop on any foreigner overseas is an indefensible violation of those rights. Intelligence officials almost certainly supported USA Freedom because they hoped it would relieve the post-Snowden pressure for reform. Their likely long-term goal is to avoid changes to Section 702, Executive Order 12333, and the many other authorities that permit intelligence collection without any individualized showing of wrongdoing. Privacy advocates who supported USA Freedom did so because they saw it as the first skirmish in a long battle to rein in surveillance authorities. Their eye is on the prize: a return to the principle of individualized suspicion as the basis for surveillance. If intelligence officials are correct in their calculus, USA Freedom may prove to be a Pyrrhic victory. But if the law clears the way for further reforms across the full range of surveillance programs, history will vindicate the privacy advocates who supported it. The answer to what USA Freedom means for our liberties lies, not in the text of the law, but in the unwritten story of what happens next.
2. The NSA has massively expanded its surveillance. Since 2008, American internet communication have been intercepted far more often than legitimate surveillance targets.
Gellman, Washington Post Staff Write,2014
Barton 7-5-2014, "In NSA-intercepted data, those not targeted far outnumber the foreigners who are," Washington Post,
Ordinary Internet users, American and non-American alike, far outnumber legally targeted foreigners in the communications intercepted by the National Security Agency from U.S. digital networks, according to a four-month investigation by The Washington Post. Nine of 10 account holders found in a large cache of intercepted conversations, which former NSA contractor Edward Snowden provided in full to The Post, were not the intended surveillance targets but were caught in a net the agency had cast for somebody else. Many of them were Americans. Nearly half of the surveillance files, a strikingly high proportion, contained names, e-mail addresses or other details that the NSA marked as belonging to U.S. citizens or residents. NSA analysts masked, or “minimized,” more than 65,000 such references to protect Americans’ privacy, but The Post found nearly 900 additional e-mail addresses, unmasked in the files, that could be strongly linked to U.S. citizens or U.S.residents. The surveillance files highlight a policy dilemma that has been aired only abstractly in public. There are discoveries of considerable intelligence value in the intercepted messages — and collateral harm to privacy on a scale that the Obama administration has not been willing to address.