SSRA Affirmative ENDI 2015
Explanation 2
Glossary 3
1ac 6
1AC – Plan 7
1AC - Solvency 8
Advantages 10
1AC – Secrecy Advantage 11
1AC – Democracy Advantage 16
1AC – Rights Advantage 21
1AC – Internet Freedom 25
Extensions 30
Inherency 31
FYI – FISA Section 702 32
Inherency Module 33
Solvency 35
Solvency – SSRA Requires Warrant 36
AT: FISA Court Rubberstamps 37
Secrecy Advantage 38
Secrecy → Chills Leaks (Long) 39
Secrecy → Bad Decisionmaking (Long) 41
Secrecy → Drones 43
Secrecy → Too Much XO Power/SOP 44
AT: Leaks Hurt National Security 45
Journalists Key 47
Democracy Advantage 48
Surveillance Chills Activism 49
Surveillance → Tyranny 51
Internet Freedom Key to Spread Democracy 53
Answer to: “the aff doesn’t fix democracy” 55
Democracy Spreads 56
Democracy Solves Everything 57
Democracy Prevents Wars 59
Democracy Prevents Terrorism 61
Rights Advantage 62
Right To Communication Impact 63
AT: Doesn't Solve Racism 64
Internet Freedom Advantage 65
NSA hurts our credibility 66
NSA Link 68
Answers to: Internet isn’t free & open 70
Hurts the Internet 72
Bad for Economy 74
Explanation
I. What does the aff do.
The affirmative argues that the government should NOT have the right to spy on citizens without a warrant. In particular, the mass data storage sweeps are illegal. Currently the NSA will collect internet and phone data on huge chunks of citizens – even if there is no belief that a crime has or will be committed.
That should no longer be allowed. If the government is going to look into someone’s electronic lives then the government should have a warrant. The best explanation is by reading the two solvency cards Buttar & Clabough [on the 1AC – Solvency] page. Please read through those.
II. How to use the file
The 1ac speech should read the 1AC-plan and the 1AC-Solvency pages. Additionally, the 1ac should read the advantage or two that the aff team finds the most interesting, strategic, fun. So, a typical 1ac would be the Plan, 2 advantages, and solvency.
The Extensions section can be used in a couple of ways –
-use it to add evidence/cards to the 1ac advantages. You should be reading the best version of each advantage.
-use it to answer 1nc arguments made against the case. You can read additional cards to answer negative arguments that aren’t well answered by the 1ac evidence you choose to read.
-use it to answer disads and other arguments that the negative reads.
III. Different Advantages
The four advantage give the aff some flexibility about how they choose to read the 1ac. Each lab will probably discuss and decide how they read the 1ac. But, this allows the debates to be about the core of the topic, but also flexible enough to not get stale.
Secrecy Advantage – the government’s mass surveillance chills investigations into what it is doing. Citizens and journalists and even employees of the government are unwilling to look because they fear they will be caught. That ‘deters’ people from bringing issues up to the public. Leaks are a way to keep the government in check and make sure that we don’t start wars, conflicts, or just generally make unwise decisions without it being made public. The Drone program is a specific example of a set of decisions that are being made without public involvement. Removing the fear of investigations would make the drone program more accountable and save lives.
Democracy Advantage – the internet as a spot of surveillance keeps people from using it to communicate openly and free. Open communication [first amendment and all] is a bedrock of a functioning democracy. Mass surveillance is what makes tyranny [rule by one over the many] possible as people can be policed and prevented from acting. Democracy is really good. The 1ac says that democracies make the world more peaceful and that democracy itself is an inherent human good.
Rights Advantage – mass surveillance results in self censorship and denies people the right to open communication. Open communication is a fundamental human right. Rights are good.
Internet Freedom Advantage – There is a global push for governments to control the internet. The US is losing credibility to convince people to leave the internet open and free. An open and free internet is good because it creates a social space for humans to come together to solve all the world’s problems. As an example, if the world is going to solve an issue like global climate change it will require people talking about it, coming together, and figuring out what works best. The only way that can happen now is the internet.
Glossary
Civil society
The elements such as freedom of speech, an independent judiciary, etc, that make up a democratic society
Drone strike
Unmanned aerial vehicles (UAVS), also known as drones, are aircraft either controlled by ‘pilots’ from the ground or increasingly, autonomously following a pre-programmed mission. While there are dozens of different types of drones, they basically fall into two categories: those that are used for reconnaissance and surveillance purposes and those that are armed with missiles and bombs.
The use of drones has grown quickly in recent years because unlike manned aircraft they can stay aloft for many hours (Zephyr a British drone under development has just broken the world record by flying for over 82 hours nonstop); they are much cheaper than military aircraft and they are flown remotely so there is no danger to the flight crew.
Dystopian fantasy
An imaginary place where people lead dehumanized and often fearful lives. The condition of life is extremely bad, as from deprivation, oppression, or terror.
Foreign Intelligence Surveillance Act
The Foreign Intelligence Surveillance Act of 1978 prescribes procedures for requesting judicial authorization for electronic surveillance and physical search of persons engaged in espionage or international terrorism against the United States on behalf of a foreign power.
Requests are adjudicated by a special eleven member court called the Foreign Intelligence Surveillance Court or FISA Court.
FISA Amendments Act of 2008
The act provides critically important authority for the U.S. Intelligence Community to acquire foreign intelligence information by targeting foreign persons reasonably believed to be outside the United States. It ensures that the Intelligence Community has the flexibility and agility it needs to identify and respond to terrorist and other foreign threats to our security.
Global norms
Global norms are defined as broadly accepted principles and guidelines of appropriate conduct for governments and all relevant stakeholders
Mass surveillance
Is the intricate surveillance of an entire or a substantial fraction of a population. The surveillance is often carried out by governments or governmental organizations, but may also be carried out by corporations, either on behalf of governments or at their own initiative.
Metadata
Surveillance metadata is usually associated with electronic communication channels, such as phone, email and social media. Data is collected through wiretapping and other electronic surveillance methods, including government Trojans, wiretap Trojans and keyloggers. Simply put, metadata is the digital information that accompanies electronic communication. When you make a mobile phone call, your provider records the time, date, location, and duration of this call, largely for billing purposes.
Militarization
Is the process by which a society organizes itself for military conflict and violence. It is related to militarism, which is an ideology that reflects the level of militarization of a state.
National Security Agency (NSA)
An intelligence organization of the United States government, responsible for global monitoring, collection, and processing of information and data for foreign intelligence and counterintelligence purposes – a discipline known as Signals intelligence (SIGINT). NSA is concurrently charged with protection of U.S. government communications and information systems against penetration and network warfare.[8][9] Although many of NSA's programs rely on "passive" electronic collection, the agency is authorized to accomplish its mission through active clandestine means,[10] among which are physically bugging electronic systems[11] and allegedly engaging in sabotage through subversive software.[12][13] Moreover, NSA maintains physical presence in a large number of countries across the globe, where its Special Collection Service (SCS) inserts eavesdropping devices in difficult-to-reach places. SCS collection tactics allegedly encompass "close surveillance, burglary, wiretapping, breaking and entering".[14][15]
Patriot Act
Law passed shortly after the September 11, 2001, terrorist attacks in the United States giving law enforcement agencies increased, broad powers to bring terrorists to justice.
Section 215 of the Patriot Act
The NSA used Section 215 of the Patriot Act as the basis for collecting phone records of Americans who were not necessarily under official investigation. It was also used to track financial data and to obtain companies' internet business records. The extent of the mass surveillance program was revealed nearly two years ago by NSA whistleblower Edward Snowden
Section 702 of the FISA Amendments Act
Section 702 permits the Attorney General and the Director of National Intelligence to jointly authorize targeting of persons reasonably believed to be located outside the United States, but is limited to targeting non-U.S. persons. Once authorized, such acquisitions may last for periods of up to one year.
Under subsection 702(b) of the FISA Amendments Act, such an acquisition is also subject to several limitations. Specifically, an acquisition:
May not intentionally target any person known at the time of acquisition to be located in the United States;
May not intentionally target a person reasonably believed to be located outside the United States if the purpose of such acquisition is to target a particular, known person reasonably believed to be in the United States;
May not intentionally target a U.S. person reasonably believed to be located outside the United States;
May not intentionally acquire any communication as to which the sender and all intended recipients are known at the time of the acquisition to be located in the United States;
Must be conducted in a manner consistent with the Fourth Amendment to the United States Constitution.[9]
Surveillance State Repeal Act
The bill would completely repeal the PATRIOT Act as well as the 2008 FISA Amendments Act, which permits the NSA to collect Internet communications— a program exposed by former NSA contractor-turned-whistleblower Edward Snowden. The bill would reform the court that oversees the nation’s spying powers, enhance protections for whistleblowers, and stop the government from forcing technology companies to create easy access into their devices.
Targeted surveillance
Targeted surveillance is surveillance directed at particular individuals and can involve the use of specific powers by authorized public agencies. Targeted surveillance can be carried out overtly or covertly, and can involve human agents. Under the Regulation of Investigatory Powers Act 2000 (RIPA), targeted covert surveillance is "directed" if it is carried out for a specific investigation or operation. By comparison, if it is carried out on designated premises or on a vehicle, it is "intrusive" surveillance. Targeting methods include the interception of communications, the use of communications "traffic" data, visual surveillance devices, and devices that sense movement, objects or persons.
Totalitarianism
Totalitarianism is a political system in which the state holds total authority over the society and seeks to control all aspects of public and private life wherever possible.
Tyranny
Cruel and oppressive government or rule.
Utilitarianism
A system of ethics according to which the rightness or wrongness of an action should be judged by its consequences. The goal of utilitarian ethics is to promote the greatest happiness for the greatest number.
Warrant
Most often, the term warrant refers to a specific type of authorization; a writ issued by a competent officer, usually a judge or magistrate, which permits an otherwise illegal act that would violate individual rights and affords the person executing the writ protection from damages if the act is performed.
Whistleblower
A whistleblower (whistle-blower or whistle blower)[1] is a person who exposes any kind of information or activity that is deemed illegal, dishonest, or not correct within an organization that is either private or public.[2] The information of alleged wrongdoing can be classified in many ways: violation of company policy/rules, law, regulation, or threat to public interest/national security, as well as fraud, and corruption.[3] Those who become whistleblowers can choose to bring information or allegations to surface either internally or externally. Internally, a whistleblower can bring his/her accusations to attention to other people within the accused organization. Externally, a whistleblower can bring allegations to light by contacting a third party outside of an accused organization. He/She can reach out to the media, government, law enforcement, or those who are concerned. whistleblowers also face stiff reprisal/retaliation from those whom are accused or alleged of wrongdoing. Third party groups like Wikileaks and others offer protection to whistleblowers, but that protection can only go so far. Whistleblowers face legal action, criminal charges, social stigma, and termination from any position, office, or job. Two other classifications of whistleblowing are private and public. The classifications relate to the type of organizations someone chooses to whistle-blow on: private sector, or public sector. Both can have different results that depend on many factors. However, whistleblowing in the public sector organization is more likely to result in federal felony charges and jail-time. A whistleblower who chooses to accuse a private sector organization or agency is more likely to face termination and legal and civil charges.
1ac
1AC – Plan
Plan: The United States federal government should curtail the authority to do non-targeted domestic mass surveillance by enacting the Surveillance State Repeal Act.
1AC - Solvency
Solvency
The Surveillance State Repeal Act would only allow for targeted surveillance while removing the legal justifications for mass surveillance.
Buttar, 15
(Shahid, executive director, leads the Bill of Rights Defense Committee in its efforts to restore civil liberties, constitutional rights, and rule of law principles undermined by law enforcement and intelligence agencies within the United States. 4-18-15. http://www.occupy.com/article/can-surveillance-state-repeal-act-shift-course-spying)
Eager to reset the debate and anchor it in long overdue transparency, a bipartisan block of representatives have introduced a bill to restore civil liberties, privacy, and freedom of thought. The Surveillance State Repeal Act, HR 1466, would do this by repealing the twin pillars of the NSA dragnet: the PATRIOT Act (not only the three expiring provisions) and the 2008 FISA amendments. On multiple occasions, executive officials have lied under oath to congressional oversight committees about the scope of domestic surveillance. Yet the very same officials still appear in oversight hearings as if they maintained any credibility. It took whistleblowers resigning their careers to prove that senior government officials’ blithe assurances to Congress were in fact self-serving lies. Some members of Congress paid attention: the authors of the PATRIOT Act moved to curtail their own legislative opus, and have encouraged their colleagues not to reauthorize the expiring provisions unless they are first curtailed.