Neg - file · Web viewNeg. Note on file organization: uniqueness for each type of...

134

Transcript of Neg - file · Web viewNeg. Note on file organization: uniqueness for each type of...

Neg

Note on file organization: uniqueness for each type of terror attack is in the impact section

1NCTerror threats are mountingBolton 2015 (John R [served as the US Permanent Representative to the UN and as Under Secretary of State for Arms Control and International Security]; NSA activities key to terrorism fight; Apr 28; www.aei.org/publication/nsa-activities-key-to-terrorism-fight/; kdf)

After six years of President Obama, however, trust in government is in short supply. It is more than a little ironic that Obama finds himself defending the NSA (albeit with obvious hesitancy and discomfort), since his approach to foreign and defense issues has consistently reflected near-total indifference, except when he has no alternative to confronting challenges to our security. Yet if harsh international realities can

penetrate even Obama’s White House, that alone is evidence of the seriousness of the threats America faces. In fact, just in the year since Congress last considered the NSA programs, the global terrorist threat has dramatically increased. ISIS is carving out an entirely new state from what used to be Syria and Iraq, which no longer exist within the borders created

from the former Ottoman Empire after World War I. In already-chaotic Libya, ISIS has grown rapidly, eclipsing al-Qaeda there and across the region as the largest terrorist threat. Boko Haram is expanding beyond Nigeria, declaring its own

caliphate, even while pledging allegiance to ISIS. Yemen has descended into chaos, following Libya’s pattern, and Iran has expanded support for the terrorist Houthi coalition. Afghanistan is likely to fall back under Taliban control if, as Obama continually reaffirms, he withdraws all American troops before the end of 2016. This is not the time to cripple our intelligence-gathering capabilities against the rising terrorist threat. Congress should unquestionably reauthorize the NSA programs, but only for three years. That would take us into a new presidency, hopefully one that inspires more confidence, where a calmer, more sensible debate can take place.

Government surveillance critical to prevent terror attacksSulmasy, 13 --- Professor of Law and Governmental Affairs Officer at Coast Guard Academy (6/10/2013, Glenn, “Why we need government surveillance,” http://www.cnn.com/2013/06/10/opinion/sulmasy-nsa-snowden/, JMP)

The current threat by al Qaeda and jihadists is one that requires aggressive intelligence collection and efforts. One has to look no further than the disruption of the New York City subway bombers (the one being touted by DNI Clapper) or the Boston Marathon bombers to know that the war on al Qaeda is coming home to us, to our citizens, to our students, to our streets and our subways.

This 21st century war is different and requires new ways and methods of gathering information. As technology has increased, so has our ability to gather valuable, often actionable, intelligence. However, the move toward "home-grown" terror will necessarily require, by accident or purposefully, collections of U.S. citizens' conversations with potential overseas persons of interest.

An open society, such as the United States, ironically needs to use this technology to protect itself. This truth is naturally uncomfortable for a country with a Constitution that prevents the federal government from conducting "unreasonable searches and seizures." American historical resistance towards such activities is a bedrock of our laws, policies and police procedures.

But what might have been reasonable 10 years ago is not the same any longer. The constant armed struggle against the jihadists has adjusted our beliefs on what we think our government can, and must, do in order to protect its citizens.

Terrorist attacks escalate – killing billions Myhrvold 2014 (Nathan P [chief executive and founder of Intellectual Ventures and a former chief technology officer at Microsoft]; Strategic Terrorism: A Call to Action; cco.dodlive.mil/files/2014/04/Strategic_Terrorism_corrected_II.pdf; kdf)

Technology contains no inherent moral directive—it empowers people, whatever their intent, good or evil. This has always been true: when bronze implements supplanted those made of stone, the ancient world got scythes and awls, but also swords and battle-axes. The novelty of

our present situation is that modern technology can provide small groups of people with much greater lethality than ever before. We now have to worry that private parties might gain access to weapons that are as destructive as—or possibly even more destructive than— those held by any nation-state. A handful of people, perhaps even a single individual, could have the ability to kill millions or even billions. Indeed, it is possible, from a technological standpoint, to kill every man, woman, and child on earth. The gravity of the situation is so extreme that getting the concept across without seeming silly or alarmist is challenging . Just thinking about the subject with any degree of seriousness numbs the mind. The goal of this essay is to present the case for making the

needed changes before such a catastrophe occurs. The issues described here are too important to ignore. Failing nation-states—like North Korea—which possess nuclear weapons potentially pose a nuclear threat. Each new entrant to the nuclear club increases the possibility this will happen, but this problem is an old one, and one that existing diplomatic and military structures aim to

manage. The newer and less understood danger arises from the increasing likelihood that stateless groups, bent on terrorism, will gain access to nuclear weapons, most likely by theft from a nation-state. Should this happen, the danger we now perceive to be coming from rogue states will pale in comparison. The ultimate response to a nuclear attack is a nuclear counterattack. Nation states have an address, and they know that we will retaliate in kind. Stateless groups are much more difficult to find which makes a nuclear counterattack virtually impossible. As a result, they can strike without fear of overwhelming retaliation, and thus they wield much more effective destructive power. Indeed, in many cases the fundamental equation of retaliation has

become reversed. Terrorists often hope to provoke reprisal attacks on their own people, swaying popular opinion in

their favor. The aftermath of 9/11 is a case in point. While it seems likely that Osama bin Laden and his henchmen hoped for a massive overreaction from the United States, it is unlikely his Taliban hosts anticipated the U.S. would go so far as to invade Afghanistan. Yes, al-Qaeda lost its host state and some personnel. The damage slowed the organization down but did not destroy it. Instead, the stateless al-Qaeda survived and adapted. The United States can claim

some success against al-Qaeda in the years since 9/11, but it has hardly delivered a deathblow. Eventually, the world will recognize that stateless groups are more powerful than nation-states because terrorists can wield weapons and mount assaults that no nationstate would dare to attempt. So far, they have limited themselves to dramatic tactical terrorism: events such as 9/11, the butchering of Russian schoolchildren, decapitations broadcast over the internet, and bombings in major cities. Strategic objectives cannot be far behind.

**Links

2NC must readThreats are real and our scholarship is sound – surveillance is the key tool in preventing attacks-AT: Terror Talk- the risk of a terrorist attack is enough that we need to have discussions about particular groups-AT: No Threats- Al Qaeda, Hamas, Hezbollah, and ISIS disagree, as they splinter they become more difficult to stop-Surveillance Key- “The chief difference between now and the situation before 9/11 is that all of these countries have put in place much more robust surveillance systems”

Lewis 2014 (James Andrew [senior fellow and director of the Strategic Technologies Program at CSIS]; Underestimating Risk in the Surveillance Debate; Dec; http://csis.org/files/publication/141209_Lewis_UnderestimatingRisk_Web.pdf; kdf)

The phrase “terrorism” is overused, and the threat of terrorist attack is easily exaggerated , but that does not mean this threat it is nonexistent. Groups and individuals still plan to attack American citizens and

the citizens of allied countries. The dilemma in assessing risk is that it is discontinuous. There can be long periods where no activity is apparent, only to have the apparent calm explode in an attack . The constant, low-level activity in planning and preparation in Western countries is not apparent to the public , nor is it easy to identify the moment that discontent turns into action. There is general agreement that as terrorists splinter into regional groups, the risk of attack increases. Certainly, the threat to Europe from militants returning from Syria points to increased risk for U.S. allies. The messy U.S. withdrawal from Iraq and (soon) Afghanistan contributes to an increase in risk.24 European authorities have increased surveillance and arrests of suspected militants as the Syrian conflict lures hundreds of Europeans. Spanish counterterrorism police say they have broken up more terrorist cells than in any other European country in the last three years.25 The chairman of the House Select Committee on Intelligence, who is better placed than most members of Congress to assess risk, said in June 2014 that the level of terrorist activity was higher than he had ever seen it.26 If the United

States overreacted in response to September 11, it now risks overreacting to the leaks with potentially fatal consequences. A simple assessment of the risk of attack by jihadis would take into account a resurgent Taliban, the power of lslamist groups in North Africa, the continued existence of Shabaab in Somalia, and the appearance of a powerful new force, the Islamic State in Iraq and Syria (ISIS). Al Qaeda, previously the leading threat, has splintered into independent groups that make it a less coordinated force but more difficult target . On the positive side, the United States, working with allies and friends, appears to have contained or eliminated jihadi groups in Southeast Asia. Many of these groups seek to use adherents in Europe and the United States for manpower and funding. A Florida teenager was a

suicide bomber in Syria and Al Shabaab has in the past drawn upon the Somali population in the United States. Hamas and Hezbollah have achieved quasi-statehood status, and Hamas has supporters in the United States . Iran, which supports the two groups, has advanced capabilities to launch attacks and routinely attacked U.S. forces in Iraq. The United Kingdom faces problems from several hundred potential terrorists within its large Pakistani population, and there are potential attackers in other Western European nations, including Germany, Spain, and the Scandinavian countries. France, with its large Muslim population faces the most serious challenge and is experiencing a wave of troubling anti-Semitic attacks that suggest both popular support for extremism and a decline in control by security

forces. The chief difference between now and the situation before 9/11 is that all of these countries have put in place much more robust surveillance systems, nationally and in cooperation with others, including the

United States, to detect and prevent potential attacks. Another difference is that the failure of U.S. efforts in Iraq and Afghanistan and the opportunities created by the Arab Spring have opened a new “front” for jihadi groups that makes their primary focus regional. Western targets still remain of interest, but are more likely to face attacks from domestic sympathizers. This could change if the well-resourced ISIS is frustrated in its efforts to establish a new Caliphate and turns its focus to the West. In addition, the al Qaeda affiliate in Yemen

(al Qaeda in the Arabian Peninsula) continues to regularly plan attacks against U.S. targets. 27 The incidence of attacks in the United States or Europe is very low, but we do not have good data on the number of planned attacks that did not come to fruition. This includes not just attacks that were detected and stopped, but also

attacks where the jihadis were discouraged and did not initiate an operation or press an attack to its conclusion because of operational difficulties. These attacks are the threat that mass surveillance was created to prevent. The needed reduction in public anti-terror measures without increasing the chances of successful attack is

contingent upon maintaining the capability provided by communications surveillance to detect, predict, and prevent attacks. Our opponents have not given up; neither should we.

2NC Perception Trick Independently, the perception of widespread surveillance is crucial to deter effective terrorist communication --- the plan emboldens effective regrouping Rascoff 14 [Samuel J. Rascoff, Associate Professor of Law, Faculty Director, Center on Law and Security, New York University School of Law, “COUNTERTERRORISM AND NEW DETERRENCE,” 2014]

An open question - an answer to which requires more empirical data - is whether the government's prosecution of relatively amateur would-be terrorists based on stings is likely to be effective in deterring better-trained terrorists. n109 But it bears remembering that the viability [*855] of the deterrence-based account of stings does not depend on who is prosecuted. The mere fact of prosecution can alter terrorists' perceptions of future success by implying a pervasive surveillance network n110 facilitated by technology. n111 As Alex Wilner

observed of Canadian counterterrorism, the fact that the country's "intelligence community clearly has the means and the tools to uncover plots expeditiously" creates an "overwhelming perception ... that terrorists are unlikely to evade Canada's watchful eye." n112 In sum, the meaning of a sting operation and subsequent trial must include the strategic benefits of revealing the fact of

undercover surveillance as well as the normative costs implied by widespread surveillance. n113 This in turn illustrates the [*856]

complicated relationship between transparency and secrecy entailed by new deterrence. C. Psychology and Strikes New deterrence also enriches understanding of the role of fear and emotion in counterterrorism. Terrorism aims at communicating vulnerability and sowing distrust; violent attacks are, in a sense, means to bring about these more intangible objectives. n114 (Thus, building sufficient social resiliency to withstand terrorist attacks, as new deterrence counsels, deprives terrorists of an important goal, even when an attack succeeds. n115) But fear n116 and distrust are also part of the counterterrorism repertoire. n117 Inevitably this fact raises serious [*857] normative issues. First is the foundational question of what it means for the state to manage terrorist risk through the potentially widespread, deliberate employment of fear. n118 Rich sociological and historical literature attest to the emotional costs of aggressive national security tactics. n119 Second is a concern about the distribution of fear and whether the government considers race and religion when employing it. n120 My central point here, however, is not normative so much as conceptual: Whereas policymakers, lawyers, and the general

public often define counterterrorism as the sum of so many violent interventions, new deterrence reminds us that counterterrorism also operates in a psychological register. Unlike traditional deterrence, which conveys its

message through fear of being caught and punished, new deterrence relies on a wider and subtler range of official modalities that go to the likelihood of terrorist success. For example, the government may aim to demoralize an adversary by telegraphing the state's overwhelming might. The state might do so by "spreading false or exaggerated rumors of the [*858] existence of sting operations," n121 sowing a sense of distrust within a cell by implying that one among them is on an official payroll, or even conveying an image of officials as irrational and prone to unmeasured violence. n122

Link: Generic Surveillance is the only method to stop terrorist attacksSanger and Shanker 2013 (David E and Thom; NSA Director firmly defends surveillance efforts; Oct 12; www.nytimes.com/2013/10/13/us/nsa-director-gives-firm-and-broad-defense-of-surveillance-efforts.html; kdf)

FORT MEADE, Md. — The director of the National Security Agency, Gen. Keith B. Alexander, said in an interview that to prevent terrorist attacks he saw no effective alternative to the N.S.A.’s bulk collection of telephone and other electronic metadata from Americans. But he acknowledged that his agency now faced an entirely new reality, and the possibility of Congressional restrictions, after revelations about its operations at home and abroad. While offering a detailed defense of his agency’s work, General Alexander said the broader lesson of the controversy over disclosures of secret N.S.A. surveillance missions was that he and other top officials have to be more open in explaining the agency’s role, especially as it expands its mission into cyberoffense and cyberdefense. Gen. Keith Alexander, the director of the National Security Agency, testified on Thursday before the Senate Intelligence Committee.N.S.A. Gathers Data on Social Connections of U.S. CitizensSEPT. 28, 2013 “Given where we are and all the issues that are on the table, I do feel it’s important to have a public, transparent discussion on cyber so that the American people know what’s going on,” General Alexander said. “And in order to have that, they need to understand the truth about what’s going on.” General Alexander, a career Army intelligence officer who also serves as head of the military’s Cyber Command, has become the public face of the secret — and, to many, unwarranted — government collection of records about personal communications in the name of national security. He has given a number of speeches in recent weeks to counter a highly negative portrayal of the N.S.A.’s work, but the 90-minute interview was his most extensive personal statement on the issue to date. Speaking at the agency’s heavily guarded headquarters, General Alexander acknowledged that his agency had stumbled in responding to the revelations by Edward J. Snowden, the contractor who stole thousands of documents about the N.S.A.’s most secret programs. But General Alexander insisted that the chief problem was a public misunderstanding about what information

the agency collects — and what it does not — not the programs themselves. “The way we’ve explained it to the American people,” he said, “has gotten them so riled up that nobody told them the facts of the program and the controls that go around it.” But he was firm in saying that the disclosures had allowed adversaries, whether foreign governments or terrorist organizations, to learn how to avoid detection by American intelligence and had caused “significant and irreversible damage” to national security. General Alexander said that he was extremely sensitive to the power of the software tools and electronic weapons being developed by the United States for surveillance and computer-network warfare, and that he set a very high bar for when the nation should use them for offensive purposes. “I see no reason to use offensive tools unless you’re defending the country or in a state of war, or you want to achieve some really important thing for the good of the nation and others,” he said. Those comments were prompted by a document in the Snowden trove that said the United States conducted more than 200 offensive cyberattacks in 2011 alone. But American officials say that in reality only a handful of attacks have been carried out. They say the erroneous estimate reflected an inaccurate grouping of other electronic missions. But General Alexander would not discuss any specific cases in which the United States had used those weapons, including the best-known example: its years-long attack on Iran’s nuclear enrichment facility at Natanz. To critics of President Obama’s administration, that decision made it easier for China, Iran and other nations to justify their own use of cyberweapons. General Alexander, who became the N.S.A. director in 2005, will retire early next year. The timing of his departure was set in March when his tour was extended for a third time, according to officials, who said it had nothing to do with the surveillance controversy spawned by the leaks. The appointment of his successor is likely to be a focal point of Congressional debate over whether the huge infrastructure that was built during his tenure will remain or begin to be restricted. Senator Patrick J. Leahy, a Vermont Democrat who leads the Senate Judiciary Committee, has already drafted legislation to eliminate the N.S.A.’s ability to systematically obtain Americans’ calling records. And Representative Jim Sensenbrenner, a Wisconsin Republican and co-author of the Patriot Act, is drafting a bill that would cut back on domestic surveillance programs. General Alexander was by turns folksy and firm in the interview. But he was unapologetic about the agency’s strict culture of secrecy and unabashed in describing its importance to defending the nation. He insisted that it would have been impossible to have made public, in advance of the revelations by Mr. Snowden, the fact that the agency collected what it calls the “business records” of all telephone calls, and many other electronic communications, made in

the United States. The agency is under rules preventing it from investigating that so-called haystack of data unless it has a “reasonable, articulable” justification, involving communications with terrorists abroad , he added. But he said the agency had not told its story well. As an example, he said, the agency itself killed a program in 2011 that collected the metadata of about 1 percent of all of the e-mails sent in the United States. “We terminated it,” he said. “It was not operationally relevant to what we needed.” However, until it was killed, the N.S.A. had repeatedly defended that program as vital in reports to Congress. Senior officials also said that one document in the Snowden revelations, an agreement with Israel, had been misinterpreted by those who believed that it meant the N.S.A. was sharing raw intelligence data on Americans, including the metadata on phone calls. Officials said the probability of

American content in the shared data was extremely small. General Alexander said that confronting what he called the two biggest threats facing the United States — terrorism and cyberattacks — would require the application of expanded computer monitoring. In both cases, he said, he was open to much of that work being done by private industry, which he

said could be more efficient than government. In fact, he said, a direct government role in filtering Internet traffic into the United States, in an effort to stop destructive attacks on Wall Street, American banks and the theft of intellectual property, would be inefficient and ineffective. “I think it leads people to the wrong conclusion, that we’re reading their e-mails and trying to listen to their phone calls,” he said. Although he acknowledged that the N.S.A. must change its dialogue with the public, General Alexander was

adamant that the agency adhered to the law. “We followed the law, we follow our policies, we self-report, we identify problems, we fix them,” he said. “And I think we do a great job, and we do, I think, more to protect people’s civil liberties and privacy than they’ll ever know.”

Link: Congressional Oversight Oversight has zero chance of working but still substantially undermines executive secrecyPosner and Vermeule 10 [Eric, professor of law at the University of Chicago AND Adrian, professor of law at Harvard, The Executive Unbound, p. 25-29]

Many institutional factors hamper effective legislative monitoring of executive discretion for legal compliance. Consider the following problems. Information Asymmetries Monitoring the executive requires expertise in the

area being monitored. In many cases, Congress lacks the information necessary to monitor discretionary policy choices by the executive. Although the committee system has the effect, among others, of generating legislative information and expertise,18 and although Congress has a large internal staff, there are domains in which no amount of legislative expertise suffices for effective oversight. Prime among these are areas of foreign policy and national security. Here the relative lack of legislative expertise is only part of the problem; what makes it worse

is that the legislature lacks the raw information that experts need to make assessments. The problem would

disappear if legislators could cheaply acquire information from the president, but they cannot. One obstacle is a suite of legal doctrines protecting executive secrecy and creating deliberative privileges— doctrines that may or may not be justified from some higher-order systemic point of view as means for producing optimal deliberation within the executive branch. Although

such privileges are waivable, the executive often fears to set a bad institutional precedent. Another obstacle is the standard executive

claim that Congress leaks like a sieve , so that sharing secret information with legislators will result in public disclosure. The problem becomes most acute when, as in the recent controversy over surveillance by the N ational S ecurity A gency , the executive claims that the very scope or rationale of a program cannot be discussed with Congress, because to do so would violate the very secrecy that makes the program possible and beneficial. In any particular case the claim might be right or wrong; legislators have no real way to judge, and they know that the claim might be made either by a wellmotivated executive or by an ill-motivated executive, albeit for very different reasons. Collective Action Problems Part of

what drives executive reluctance to share information is that, even on select intelligence committees, some legislator or staffer is bound to leak and it will be difficult to pinpoint the source. Aware of the relative safety that the numbers give them, legislative leakers are all the more bold. This is an example of a larger problem, arising from the fact that there are many

more legislators than top-level executive officials. Compared to the executive branch, Congress finds it more costly to coordinate and to undertake collective action (such as the detection and punishment of leakers ). To be sure, the executive too is a “they,” not an “it.” Much of what presidents do is arbitrate internal conflicts among executive departments and try to aggregate competing views into coherent policy over time. As a strictly comparative matter, however, the contrast is striking: the executive can act with much greater unity, force, and dispatch than can Congress, which is chronically hampered by the need for debate and consensus among large numbers. This comparative advantage is a principal reason why Congress enacts broad delegating statutes in the first place, especially in domains touching on foreign policy and national security. In these domains, and elsewhere, the very conditions that make delegation attractive also hamper congressional monitoring of executive discretion under the delegation. There may or may not be offsetting advantages to Congress’s large numbers. Perhaps the very size and heterogeneity of Congress make it a superior deliberator, whereas the executive branch is prone to suffer from various forms of groupthink. But there are clear disadvantages to large numbers, insofar as monitoring

executive discretion is at issue. From the standpoint of individual legislators, monitoring is a collective good. If rational and self-

interested, each legislator will attempt to free ride on the production of this good, and monitoring will be inefficiently underproduced. More broadly, the institutional prerogatives of Congress are also a collective good. Individual legislators may or may not be interested in protecting the institution of Congress or the separation of legislative from executive power; much depends on legislators’ time horizons or discount rate , the expected longevity of a legislative career, and so forth. But it is clear that protection of legislative prerogatives will be much less emphasized in an institution composed of hundreds of legislators coming and going than if Congress were a single person. “Separation of Parties, not Powers” Congress is, among other things, a partisan institution.19 Political scientists debate whether it is principally a partisan institution, or even

exclusively so. But Madison arguably did not envision partisanship in anything like its modern sense. Partisanship undermines the separation of powers during periods of unified government. When the same party controls both the executive branch and Congress, real monitoring of executive discretion rarely occurs , at any rate far less than in

an ideal Madisonian system. This appears to have a marked effect in the domain of war powers and foreign affairs, where a recent study by political scientists William Howell and Jon Pevehouse shows that congressional oversight of presidential war powers differs markedly depending upon the partisan composition of Congress.20 When Congress is a co-partisan of the president, oversight is minimal; when parties differ across branches, oversight is more vigorous. Partisanship can enhance monitoring during periods of divided government,21 but this is cold comfort for liberal legalists. From the standpoint of liberal legalism, monitoring is most necessary during periods of unified government, because Congress is most likely to enact broad delegations when the president holds similar views; and in such periods monitoring is least likely to occur. The Congress of one period may partially compensate by creating institutions to ensure bipartisan oversight in future periods— consider the statute that gives a minority of certain congressional committees power to subpoena documents from the

executive22—but these are palliatives. Under unified government, congressional leaders of the same party as the president have tremendous power to frustrate effective oversight by the minority party . The Limits of Congressional Organization Congress as a collective body has attempted, in part, to overcome these problems through internal institutional arrangements. Committees and subcommittees specialize in a portion of the policy space, such as the armed forces or homeland security, thereby relieving members of the costs of acquiring and processing information (at least if the committee itself maintains a reputation for credibility). Intelligence committees hold closed sessions and police their members to deter leaks (although the sanctions that members of Congress can apply to one another are not as strong as the sanctions a president can apply to a leaker in the executive branch). Large staffs, both for committees and members, add expertise and monitoring capacity. And interest groups can sometimes be counted upon to sound an alarm when the executive harms their interests. Overall, however, these arrangements are not fully adequate, especially in domains of foreign policy and national security, where the scale of executive operations is orders of magnitude larger than the scale of congressional operations.

Congress’s whole staff, which must (with the help of interest groups) monitor all issues, runs to some 30,000 persons.23 The executive branch has some 2 million civilian employee s , in addition to almost 1.4 million in the active

armed forces.24 The sheer mismatch between the scale of executive operations and the congressional capacity for oversight , even aided by interest groups or by leakers within the bureaucracy, is daunting . Probably Congress is already at or near the limits of its monitoring capacity at its current size and budget.

Link: Constitution Free Zones/BordersSurveillance by TSA, Border and Customs agents key to security --- internal safe guards will protect civil rightsHorwitz, 14 --- covers the Justice Department and criminal justice issues nationwide for The Washington Post (12/8/2014, Sari, “Justice Dept. announces new rules to curb racial profiling by federal law enforcement,” http://www.washingtonpost.com/world/national-security/justice-dept-to-announce-new-rules-to-curb-racial-profiling-by-federal-law-enforcement/2014/12/07/e00eca18-7e79-11e4-9f38-95a187e4c1f7_story.html, JMP)

A fact sheet on the policy said that some DHS activity is not covered by the policy because of the “unique nature of DHS’s mission.” “This does not mean that officers and agents are free to profile,” according to the DHS fact sheet. “To the contrary, DHS’s existing policies make it categorically clear that profiling is prohibited, while articulating limited circumstances where it is permissible to rely in part on these characteristics, because of the unique nature of border and transportation security as compared to traditional law enforcement.” President George W. Bush banned racial profiling in 2003, but the prohibition did not apply to

national security investigations and covered only race — not religion, national origin, gender or sexual orientation and gender identity. Civil rights groups and Democratic lawmakers have pushed for expanded anti-profiling protections since

President Obama was elected in 2008. Holder began the process to revamp the rules in 2009 and considers the new policy one of the signature accomplishments of his tenure. About six months ago, the Justice Department delivered the rules to the White House. But they applied only to the department, and White House officials wanted the polices to cover

additional agencies. The rules have been delayed in part because DHS officials pushed the White House and the Justice Department to allow major exclusions for agencies such as the Transportation Security Administration,

Immigration and Customs Enforcement, and Customs and Border Protection . In several high-level meetings, DHS Secretary Jeh Johnson argued that immigration and customs agents and airport screeners needed to consider a variety of factors to keep the nation safe, according to officials familiar with his personal efforts. TSA officials argued that the rules should not apply to them because the TSA is not a law enforcement agency. In its fact

sheet, DHS officials said that they will review activities not directly covered by the guidance to ensure that “we are including every appropriate safeguard and civil rights protection in the execution of those important security activities, and to enhance our policies where necessary.”

Link: Domestic SpyingSurveillance is critical to thwart domestic right-wing terror attacksPerez and Bruner 2015 (Evan and Wes; DHS intelligence report warns of domestic right-wing terror threat; Feb 20; www.cnn.com/2015/02/19/politics/terror-threat-homeland-security/; kdf)

Washington (CNN)They're carrying out sporadic terror attacks on police, have threatened attacks on government buildings and reject government authority. A new intelligence assessment, circulated by the Department of Homeland Security this month and reviewed by CNN, focuses on the domestic terror threat from right-wing sovereign citizen extremists and comes as the Obama administration holds a White House conference to focus efforts

to fight violent extremism. Some federal and local law enforcement groups view the domestic terror threat from sovereign citizen groups as equal to -- and in some cases greater than -- the threat from foreign

Islamic terror groups, such as ISIS, that garner more public attention. The Homeland Security report, produced in coordination with the FBI,

counts 24 violent sovereign citizen-related attacks across the U.S. since 2010. The government says these are extremists who believe that they can ignore laws and that their individual rights are under attack in routine daily instances such as a traffic stop or being required to obey a court order. They've lashed out against authority in incidents such as one in 2012, in which a father and son were accused of engaging in a shootout with police in Louisiana, in a confrontation that began with an officer pulling them over for a traffic violation. Two officers were killed and several others wounded in the confrontation. The men were sovereign citizen extremists who claimed police had no authority over them. Among the findings from the Homeland Security intelligence assessment: "(Sovereign citizen) violence during 2015 will occur most frequently during routine law enforcement encounters at a suspect's home, during enforcement stops and at government offices." The report adds that "law enforcement officers will remain the primary target of (sovereign citizen) violence over the next year due to their role in physically enforcing laws and regulations." The White House has fended off criticism in recent days for its reluctance to say the words "Islamist extremism," even as the conference this week almost entirely focused on helping imams and community groups to counteract the lure of groups like ISIS. Absent from the White House conference is any focus on the domestic terror threat posed by sovereign citizens, militias and other anti-government terrorists that have carried out multiple attacks in recent years. An administration official says the White House is focused on the threat from all terrorists, including from sovereign citizen and other domestic groups. "I don't think it's fair to say the (White House) conference didn't address this at all," the official said, adding that President Barack Obama addressed the need to combat "violent ideologies" of all types. An official at the Justice Department, which is leading the administration's counter-radicalization effort, says many of the tactics aimed at thwarting radical Islamic recruitment of young people can also be used to fight anti-government extremist groups. While groups like ISIS and al Qaeda garner the most attention, for many local cops, the danger is closer to home. A survey last year of state and local law enforcement officers listed sovereign citizen terrorists, ahead of foreign Islamists, and domestic militia groups as the top domestic terror threat. The survey was part of a study produced by the University of Maryland's National Consortium for the Study of Terrorism and Responses to Terrorism. In 2013, a man who held anti-government views carried out a shooting attack on three Transportation Security Administration employees at Los Angeles International Airport, killing one TSA officer. Last year, a couple killed two police officers and a bystander at a Las Vegas Walmart store. Mark Potok, senior fellow at the Southern Poverty Law Center, said that by some estimates, there are as many as 300,000 people involved in some way with sovereign citizen extremism. Perhaps 100,000 people form a core of the movement, he said. The federal government's focus on the domestic groups waxes and wanes, Potok said, in part because the threat from foreign groups like al Qaeda and its affiliates. Potok says sovereign citizen groups have attracted support because of poor economic conditions. Some groups travel the country pitching their ideology as a way to help homeowners escape foreclosure or get out of debt, by simply ignoring the courts and bankruptcy law. The Homeland Security report's focus on right-wing terrorists

is a subject that garnered political controversy for the Obama administration in the past. In 2009, a Homeland Security report on possible recruitment of military veterans by right-wing militia groups prompted an outcry from veterans groups. The report was produced by staff members during the Bush administration but wasn't published until then Homeland Security Janet Napolitano had taken office. Napolitano criticized her own agency for the report.

Link: Drone warrantsThe plan grounds drones – blocking preventive measuresMcNeal 2014 (Gregory [prof at Pepperdine University]; Drones and Aerial surveillance: Considerations for Legislators; Nov; www.brookings.edu/research/reports2/2014/11/drones-and-aerial-surveillance; kdf)

To counter the threat of surveillance, privacy advocates have focused solely on requiring warrants before the use of drones by law enforcement. Such a mandate oftentimes will result in the grounding of drone technology in circumstances where law enforcement use of drones would be beneficial and largely non-controversial. For example, in light of the Boston Marathon bombing, police may want to fly a drone above a marathon to ensure the safety of the public. Under many bills, police would not be allowed to use a drone unless they had a warrant, premised upon probable cause to believe a crime had been or was about to be committed. This requirement exceeds current Fourth Amendment protections with regard to the reasonableness of observing activities in public places. What this means is that the police would need to put together a warrant application with sufficient facts to prove to a judge that they had probable

cause. That application would need to define with particularity the place to be searched or the persons to be surveilled. All of this would be required to observe people gathered in a public place, merely because the observation was taking place

from a drone, rather than from an officer on a rooftop or in a helicopter. In a circumstance like a marathon, this probable cause showing will be difficult for the police to satisfy. After all, if the police knew who in the crowd was a potential

bomber, they would arrest those individuals. Rather, a marathon is the type of event where the police would want to use a drone to monitor for unknown attackers, and in the unfortunate event of an attack, use the footage to identify the perpetrators. This is precisely the type of circumstance where the use of drone could be helpful, but unfortunately it has been outlawed in many states . To make matters worse, this type of drone surveillance would pose little to no harms to privacy. A marathon is a highly public event, the event is televised, it takes place on streets where there are surveillance cameras and spectators are photographing the event. Moreover, in the states where drones have been banned (unless accompanied by a warrant), the police have not been prohibited from using any other type of

surveillance equipment --- just drones. This technology centric approach has done little to protect privacy, but will certainly harm public safety, depriving law enforcement of a tool that they could use to protect people.

Link: DronesDrones are critical to combat bio- and chemical-terrorKoerner 2015 (Matthew R [Duke University School of Law, J.D. expected 2015]; DRONES AND THE FOURTH AMENDMENT: REDEFINING EXPECTATIONS OF PRIVACY; 64 Duke L.J. 1129; kdf)

Senator Dianne Feinstein, a staunch advocate of governmental surveillance n1 and Chairman of the 113th Congress's Senate Intelligence Committee, n2 recently found herself, rather ironically, as the target of surveillance. n3 One day at her home, Senator Feinstein walked to the window to check on a protest that was taking place outside. n4 Much to her surprise, a small drone n5 hovered on the other side of the window, only inches away, spying on her. n6 The drone immediately flew away. n7 Senator Feinstein's experience is just one example of drones being used for surveillance within the United States. But her story and others like it n8 have sparked significant controversy over the use of drones for domestic surveillance, which falls within a broader debate [*1131] on privacy and governmental surveillance programs. n9

Advocates of robust federal surveillance policies champion governmental surveillance as the only way to prevent terrorist and cyber attacks against the United States . n10 President Barack Obama defended these surveillance programs as ""modest encroachments on privacy'" that "strike the "right balance' between national security and civil liberties." n11 In comparison, privacy advocates envision these surveillance programs leading to a dystopian, totalitarian government watching over its citizenry - undetected but omnipresent. n12 References to George Orwell's Nineteen Eighty-Four n13 abound.

n14 [*1132] Apart from the surrounding privacy-concerns debate, drones currently provide many practical benefits and their projected applications seem limitless. n15 Based on their obvious advantage of being unmanned, drones have the capability to conduct missions previously considered too risky, dangerous, or impracticable . These

applications are also provided at continuously decreasing costs and with the latest technological sophistication, such as the

capability to see through physical obstructions, to detect various chemical and biological agents in the air, to recognize human faces and license plates, and to fly in strategic, coordinated formations. n16

Link: Drone SalesDrone sales key to crush ISISTucker and Weisgerber 2015 (Patrick and Marcus; Obama to Sell Armed Drones to More Countries; Feb 17; www.defenseone.com/technology/2015/02/obama-sell-armed-drones-more-countries/105495/; kdf)

The State Department on Tuesday announced that the United States would be expanding the sale of armed unmanned aerial

vehicles, or UAVs, to carefully selected allied countries. The announcement suggests that strategic partners – especially

in the Middle East — could acquire American-made armed drones before the year is out. Some of those could go toward the

international campaign against the Islamic State, or ISIS. Battlefield commanders and the intelligence community are hungry for large, armed drones as they could loiter over targets for hours. The footage captured by high-powered cameras attached to these unmanned aircraft has been critical in determining the locations for airstrikes against Islamic State militants in Iraq and Syria, U.S. officials say. State Department officials maintained that every export request would meet “a strong presumption of denial,” according to Tuesday’s release, but U.S. officials will allow exports on “’rare occasions’ that are justified in terms of the nonproliferation and export control factors specified in the [Missile Technology Control Regime Guidelines.]” The Missile Technology Control Regime, or MTCR, is a voluntary partnership that the United States and 33 other countries established in 1987 to curb the proliferation of weapons of mass destruction. Officials who spoke to the Washington Post said that new export applications would be approved or denied within months of receipt, clearing the way for armed drones and armed drone technology to potentially arrive in other countries by year’s end. The new policy affects drones that are capable of flying a distance of 300 kilometers and carrying a payload of 500 kilograms. Those specifications come from the MTCR but apply to drones like the Reaper, which

are capable of carrying laser-guided bombs and Hellfire missiles. Exporting more drones—either armed or outfitted with laser targeting

systems for smart bombs—to key allies and partners in the Middle East like Jordan would help them strike Islamic State, according to experts. “Transferring drones, particularly those that had laser designators so they could designate targets for strikes from manned fighter aircraft, to coalition partners such as Jordan participating in strikes against ISIL could be a significant advantage to them,” Paul Scharre, fellow and director of the 20YY Warfare Initiative at the Center for a New American Security, told Defense One. Earlier this year, a member of the House Armed Services Committee disclosed to the Washington Times that the Obama administration had denied a request from Jordan for unarmed Predator spy drones. But that was before Jordan stepped up its F-16-led air assault to retaliate against Islamic State for the brutal burning alive of First Lt. Moaz al-Kasasbeh, the Jordanian pilot captured by the terrorist group. “Given our mutual interests, and our strong relationship, it’s absolutely critical that we provide Jordan the support needed to defeat the Islamic State,” Rep. Duncan Hunter, R-Calif.,

wrote to President Obama in a Feb. 5 letter. The loosened export rules do not mean that every ally in a pinch will be fast-tracked for the most lethal drones that America produces. Ukraine is reportedly seeking unarmed drones to bolster its campaign against Russian-supported separatists. “I find it hard to imagine that this would lead to transferring large-scale armed drones to Ukraine, not to mention the fact that they would likely have difficulty operating them effectively. This might help pave the way for transferring small, tactical drones to Ukrainian forces, which wouldn’t be a game-changer, but would help them with tactical reconnaissance and would be a

sensible move,” said Scharre. “The new drone export policy is unlikely to lead to the transfer of armed drones to Ukraine,” Michael Horowitz, associate professor of political science at the University of Pennsylvania, told Defense One. Horowitz and other experts argue that the policy change could allow the U.S. to regain some control if not over armed proliferation at least over how proliferation occurs. Last May, the Chinese Times reported that China would be selling their Wing Loong armed UAV, sometime called a Predator knockoff, to U.S. ally Saudi Arabia.

Link: Telephone MetadataTelephone metadata doesn’t infringe on privacy, but does prevent terrorismPraast 2014 (Linda Renee [J.D., Magna Cum Laude, California Western School of Law, 2013; LL.M., National Security and U.S. Foreign Relations Law, George Washington University, 2014]; This Isn't Your Founding Fathers' Fourth Amendment: Analyzing the Constitutionality of Warrantless Metadata Collection under the Foreign Intelligence Surveillance Act; 51 Cal. W. L. Rev. 7; kdf)

Conclusion The events of September 11, 2001 demonstrated America's vulnerability to terrorist attacks at home.

The government responded with legislation creating new agencies, new protections, and new methods of gathering intelligence designed to predict and prevent future similar catastrophes . The cost of this enhanced protection is unavoidable pressures on privacy. The NSA's telephony metadata collection program is one such program designed to predict and prevent terrorist attacks . Congress impliedly approved the program as it currently functions through its reauthorization of section 215 of the Patriot Act. Therefore, the program is statutorily allowed.

Addressing the larger issue, the program does not represent an impermissible search under the Fourth Amendment. The only data collected is information voluntarily provided by telephone users to their third-party telephone providers. While the scope of the data collection is vast, the data itself is not protected by the Fourth

Amendment. So long as the data analysis is limited to queries concerning suspected foreign agents or terrorists, and so long as the data collected does not expand to include substantive content of the telephone calls, the program is a permissible, legal national security tool.

Link: Foreign intelligence requirementValid terrorism concerns justify the collection of dataPraast 2014 (Linda Renee [J.D., Magna Cum Laude, California Western School of Law, 2013; LL.M., National Security and U.S. Foreign Relations Law, George Washington University, 2014]; This Isn't Your Founding Fathers' Fourth Amendment: Analyzing the Constitutionality of Warrantless Metadata Collection under the Foreign Intelligence Surveillance Act; 51 Cal. W. L. Rev. 7; kdf)

The statutory authority cited by the government for the metadata collection is the FISA business records provision, added by section 215 of the Patriot Act and codified at 50 U.S.C. § 1861. n43 Titled "Access to Certain Business Records for Foreign Intelligence and International Terrorism Investigations," section 215 allows the FBI to apply to a FISA court for an order "requesting production of any tangible things," including telephony metadata. n44 The provision allows such requests for information relevant to "an investigation to obtain foreign intelligence information not concerning a United States person or to protect against international terrorism or clandestine intelligence activities." n45 The statute expressly limits the investigations to those concerning foreign governments and their agents and individuals in contact with, or known

to, a suspected agent of a foreign power who is the subject of such authorized investigation. n46 The NSA surveillance program

disclosed by the Guardian clearly encompasses telephony metadata for individuals who are not involved with foreign governments or terrorist activities. However, while the metadata is collected without regard to the foreign intelligence requirement, the FISA Court orders allowing metadata collection "strictly limit access to, analysis of, and dissemination of information derived from the metadata to valid counter-terrorism purposes." n47 To accomplish this, the stored metadata is only accessible through search queries by a very limited number of NSA officials, resulting in a very small percentage of the metadata actually being analyzed. n48 These searches are only approved based on "facts giving rise to a reasonable, [*16] articulable

suspicion that the selection term to be queried is associated with one or more of the specified foreign terrorist organizations ." n49 The Government argues that Congress permits the collection scheme used by the NSA under section 215. n50 As evidence, the Government points to congressional reauthorization of section 215 in 2010. n51 This reauthorization occurred after all members of Congress had received a report on the telephony metadata program. n52 This reauthorization, made with full knowledge of how the statute was being implemented, shows congressional approval and provides statutory authority for the metadata program under section 215.

Link: FISCFISC imposes slow and cumbersome procedures --- that disrupts effective counter-terrorYoo 14 [John, Emanuel S. Heller Professor of Law, University of California, Berkeley Law School; Visiting Scholar, American Enterprise Institute. “The Legality of the National Security Agency's Bulk Data Surveillance Programs,” Summer, 2014, I/S: A Journal of Law and Policy for the Information Society, 10 ISJLP 301, lexis]

FISA, and the law enforcement mentality it embodies, creates several problems. FISA requires "probable cause" to believe that someone is an agent of a foreign power before one can get a warrant to collect phone calls and e-

mails. n35 An al Qaeda leader could have a cell [*309] phone with 100 numbers in its memory, ten of which are in the United States and thus require a warrant. Would a FISA judge have found probable cause to think the users of those ten numbers are al Qaeda too? Probably not. Would our intelligence agencies even immediately know who was using those numbers at the time of captured al Qaeda leader's calls? The same is true of his e-mail, as to which it will not be immediately obvious what addresses are held by U.S.

residents. In our world of rapidly shifting e-mail addresses, multiple cell phone numbers, and Internet

communications, FISA imposes slow and cumbersome procedures on our intelligence and law enforcement officers. n36 These laborious checks are based on the assumption that we remain within the criminal justice system, and look backwards at crimes in order to conduct prosecutions, rather than within the national security system, which looks forward in order to prevent attacks on the American people. n37 FISA requires a lengthy review process, in which special FBI and DOJ lawyers prepare an extensive package of facts and law to present to the FISC. n38 The Attorney General must personally sign the application, and another highranking national security officer, such as the President's

National Security Advisor or the Director of the FBI, must certify that the information sought is for foreign intelligence. n39 Creating an existing database of numbers that can be quickly searched can allow the government to take advantage of captured al Qaeda numbers abroad, before the cells within the United States break their contacts. A critic, however, might argue that billions of innocent calling records are not "relevant" to a terrorism investigation. Even if terrorist communications take place over the phone, that cannot justify the collection of all phone call records in the United States, the vast [*310] majority of which

have nothing to do with the grounds for the search. The FISC rejected this argument because, to be useful, a database has to be broad enough to find terrorist calls. "Because known and unknown international terrorist operatives are using telephone

communications, and because it is necessary to obtain the bulk collection of a telephone company's metadata to determine those connections between known and unknown international terrorist operatives as part of authorized

investigations," the court observed, "the production of the information sought meets the standard for relevance under Section 215." n40 Aggregating calling records into a database, the court found, was necessary to find the terrorist communications and the links between terrorists. n41 It may not even be possible to detect the links before such

a database is created. If a database is not comprehensive, in other words, then the government will only be able to glimpse incomplete patterns of terrorist activity, if it can glimpse any at all. Relevance is a slippery concept, but it cannot require that every piece of information obtained by subpoena must contain information related to guilt. Even when grand juries subpoena the business records or communications of a criminal suspect, it is likely that the large majority of the items will not have any relationship to the crime. Nonetheless, a grand jury may subpoena all of a suspect's financial records to

find those that pertain to a criminal conspiracy. A different way to view the NSA's telephone calling record program is that the "relevant" tangible "thing" is the database itself, rather than any individual calling record .

Link: FISC -- Disclosing decisionsDisclosing FISC decisions destroys strategic ambiguity – precludes effective deterrenceRascoff 14 [Samuel J. Rascoff, Associate Professor of Law, Faculty Director, Center on Law and Security, New York University School of Law, “COUNTERTERRORISM AND NEW DETERRENCE,” 2014]

Finally, it bears mentioning that the complicated relationship between secrecy and revelation demanded by new deterrence plays out in the legal arena as well. n96 On one level, public laws are exercises in revelation. For example, while reports of the details of the NSA Prism program created a sensation, the FISA Amendments Act of 2008

(hardly a secret document) seems to have authorized the collection in question. n97 On the other hand, legal interpretations that are [*852] crucial to the oversight of national security programs - such as opinions of the

Foreign Intelligence Surveillance Court (FISC) n98 or the Justice Department's memorandum authorizing a lethal strike against American

citizen Anwar al-Aulaqi n99 - have been withheld. Part of the reasoning is that these legal analyses themselves contain secrets or that in a world in which government is expected to operate at the outer limits of legal authority, n100 to disclose those limits publicly is, in effect, to reveal national security secrets. On this view, to maintain strategic ambiguity, it is necessary to be vague about legal interpretation. n101 In sum, new deterrence subtly refocuses the debate [*853] away from a zero-sum contest between secrecy and transparency and toward a more nuanced account.

Link: Logfren AmendmentLofgren amendment fails – destroys effective response to terrorismMargulies 14 [Peter, Professor of Law, Roger Williams University School of Law, B.A. 1978, Colgate University; J.D. 1981, Columbia Law School, “Dynamic Surveillance: Evolving Procedures in Metadata and Foreign Content Collection After Snowden,” December, 2014, Hastings Law Journal, 66 Hastings L.J. 1, lexis]

The Lofgren Amendment paints with an unduly broad brush. It does not allow queries based on U.S. persons who are involved with hostage situations. Even though this query does not readily fit with the NSA's current criteria,

barring it altogether would be counterproductive. In exigent cases, the NSA should have the ability to frame queries that may save lives. The Constitution presents no bar since courts have [*72] regularly approved searches under exigent

circumstances. n422 Nor does the use of U.S. person queries in hostage situations clash with section 702's bar on targeting U.S. persons, since the queries concern evidence already acquired through the targeting of persons reasonably believed

to be outside the United States. n423 Moreover, the government may well have the need to seek other information regarding U.S. persons that could be included in lawful collection under section 702 and might be difficult to acquire through other means. For example, the government might intercept communications sent or received by an ISIS operative in Syria or Iraq, and might wish to know if the ISIS operative mentioned any U.S. persons who are

currently abroad fighting on ISIS's behalf or might wish to go abroad for this purpose. It is true that the government might be able to secure a traditional FISA warrant once it determined that someone had taken concrete steps to join ISIS's fighting force,

since that would make that individual an "agent of a foreign power" who could be targeted under the statute. n424 However, in a particular case, such as one in which a U.S. person who had fought with ISIS was about to board a plane to return to the United States,

time might be of the essence. In such a case, the government may not have received sufficient notice of that individual's ISIS involvement to allow for the completion of a traditional FISA application . Under these

circumstances, it would be appropriate to authorize a query of a section 702 database. The Lofgren Amendment also fails to address this situation.

Link: PCLOB Destroys effective intel sharingMargulies 14 [Peter, Professor of Law, Roger Williams University School of Law, B.A. 1978, Colgate University; J.D. 1981, Columbia Law School, “Dynamic Surveillance: Evolving Procedures in Metadata and Foreign Content Collection After Snowden,” December, 2014, Hastings Law Journal, 66 Hastings L.J. 1, lexis]

Another flawed fix is the proposal by Chairman Medine and Judge Wald of the PCLOB. That proposal requires ex ante judicial review of NSA queries to ensure that they are "reasonably likely to return foreign intelligence information." n425 This proposal is superior to the Lofgren Amendment because it has an appropriately deferential substantive standard. Moreover, a larger FISC role is useful. n426 In addition, Medine and Wald outlined an intriguing alternative, entailing FISC appointment of a special master who could review a

"representative sample of query results" and make recommendations to the court. n427 The major flaw in the Medine and Wald proposal

is its differential standard for the NSA and the FBI. Under the proposal, the test for the FBI, as assessed ex ante by [*73] the FISC in all but exigent circumstances, would be whether the U.S. person query is "reasonably likely to return information relevant to an assessment or investigation of a crime ." n428 The NSA's test is whether the query is "reasonably likely to return foreign intelligence information ." n429 The differing criteria for FBI and NSA queries could hamper intelligence sharing between the two agencies,

replicating the failures of the "wall" that existed between agencies prior to September 11. n430

Link: PRISMPRISM decimates Al Qaeda’s ability to conduct mass attacksEtzioni 15 [Amitai Etzioni, Director of the Institute for Communitarian Policy Studies at George Washington University, former President of the American Sociological Association, former Professor at Harvard Business School, former Senior Adviser to the White House, “

NSA: National Security vs. Individual Rights,” Intelligence and National Security, Volume 30, Issue 1, 2015, pages 100-136]

One telling piece of evidence regarding the effectiveness of the electronic surveillance programs is the way they hobbled bin Laden. He found out that he was unable to use any modern communication device to run his terror organizations that had branches in three continents.54 He was reduced to using the same means of

communication employed 5000 years ago – a messenger, a very slow, low-volume, cumbersome, and unreliable way of

communication and command; in effect, preventing bin Laden from serving as an effective commander-in-chief

of Al Qaeda. Moreover, once the CIA deduced that using a messenger was the only way left for him to communicate – tracking the messenger led to bin Laden's downfall.55 Additional evidence publically available that the NSA programs forced terrorists to limit their communications is gleaned from reports that following the revelation that the United States intercepted the communications of Ayman al-Zawahiri, there was a sharp decline in Al Qaeda's electronic communications.56 In short, we have seen that there continues to be a serious threat of terrorism to national security; that terrorists cannot be handled like other criminals and to counter them distinct

measures are best employed; and that surveillance programs like PRISM and the phone surveillance programs make a significant contribution to curbing terrorism. In short these programs do enhance one core element of the liberal communitarian balance. The next question the article addresses is the extent they undermine the other core element.

PRISM roadblocks terrorists – guts them of the tools necessary to pull off an attackArquilla 2013 (John [Professor and Chair Department of Defense Analysis @ Naval postgrad school]; In Defense of PRISM; Jun 7; foreignpolicy.com/2013/06/07/in-defense-of-prism/; kdf)

Prior to TIA, and well before 9/11, there were other ancestors of our current big data efforts. At the National Security Agency, and in other parts of the extensive American intelligence community, search systems known by such evocative names as "Echelon" and "Semantic Forests," among others, were in use, striving relentlessly to detect patterns of communication that might open up golden seams of information from the most secret caches of the world’s various malefactors. Often enough, these and other tracking tools did distinguish the pattern from the noise,

and national security was well served. And in the early days of the war against al Qaeda, the enemy was still using means of communication that American intelligence had the ability to monitor — including satellite phones and

such — leading to several counterterror coups and high-level captures. But the network learned quickly and adjusted,

becoming far more elusive, more dispersed, its cells increasingly attuned to operating independently, its nodes and links ever less visible. It was against this shift that something like PRISM had to be mobilized to improve our ability to find the foe whose best, and only real defense against us is his capacity for concealment. Thus, the tantalizing prospect of PRISM, and of the whole "finding effort," is to deny the terrorists the virtual haven that they enjoy throughout the world’s telecommunications spaces — indeed, throughout the whole of the "infosphere," which

includes cyberspace. The piercing of this veil would mark a true turning point in the war on terror, for al Qaeda and other networks simply cannot function with any kind of cohesion, or at any sort of reasonable operational tempo if their communications become insecure. Cells and nodes would be ripped up, operatives killed or captured, and each loss would no doubt yield information that imperiled the network further. Even if al Qaeda resorted to the drastic measure of moving messages, training, and financial information by courier, operations would be so slowed as to cripple the organization. And even couriers can be flagged on "no fly" lists or caught boarding tramp steamers and such. So for all the furor caused by the PRISM revelations, my

simple recommendation is to take a deep breath before crying out in protest. Think first about how the hider/finder dynamic

in the war on terror has driven those responsible for our security to bring to bear the big guns of big data on the problem at hand. Think also about whether a willingness to allow some incursions into our privacy might lead to an improved ability to provide for our security, and where that equilibrium point between privacy and security might be. And last, think about the world as it might be without such a sustained effort to find the hidden — to detect, track, and disrupt the terrorists . That would be a world in which they stay on their feet and fighting, and in which they remain secure enough, for long enough, to acquire true weapons of mass destruction.

Those of us in the national security business, who know that networks so armed will be far harder to deter than nations ever were, believe that big data approaches like PRISM and its forebears, have been and remain essential elements in the unrelenting and increasingly urgent effort to find the hidden.

Link: Profiling – FBINew profiling rules preserves FBI flexibility to fight terrorism --- broader restrictions will wreck mission effectivenessApuzzo, 14 (4/9/2014, Matt, “Profiling Rules Said to Give F.B.I. Tactical Leeway,” http://www.nytimes.com/2014/04/10/us/profiling-rules-said-to-give-fbi-tactical-leeway.html?_r=0, JMP)

WASHINGTON — Attorney General Eric H. Holder Jr.’s long-awaited revisions to the Justice Department’s racial profiling rules would allow the F.B.I. to continue many, if not all, of the tactics opposed by civil rights groups, such as mapping ethnic populations and using that data to recruit informants and open investigations. The new rules, which are in draft form, expand the definition of prohibited profiling to include not just race, but religion, national origin, gender and sexual orientation. And they increase the standards that agents must meet before considering those

factors. But they do not change the way the F.B.I. uses nationality to map neighborhoods, recruit informants, or look for foreign spies, according to several current and former United States officials either involved in the policy revisions or briefed on them. While the draft rules allow F.B.I. mapping to continue, they would eliminate the broad national security

exemption that former Attorney General John Ashcroft put in place. For Mr. Holder, who has made civil rights a central issue of his five years in office, the draft rules represent a compromise between his desire to protect the rights of minorities and the concern of career national security officials that they would be hindered in their efforts to combat terrorism. The Justice Department has been reworking the policy for nearly five years, and civil rights groups hope it will curtail some of the authority granted to the F.B.I. in the aftermath of the 9/11 terrorist attacks. Muslims, in particular, say federal agents have unfairly singled them out for investigation. The officials who described the draft rules did so on the condition of anonymity because they were not authorized to discuss them. Mr. Holder, who officials say has been the driving force behind the rule change, gave a personal account of racial profiling on Wednesday before the National Action Network, the civil rights group founded by the Rev. Al Sharpton. “Decades ago, the reality of racial profiling drove my father to sit down and talk with me about how, as a young black man, I should interact with the police if I was

ever stopped or confronted in a way I felt was unwarranted,” he said. Throughout the review process, however, the attorney general and his civil rights lawyers ran up against a reality: Making the F.B.I. entirely blind to nationality would fundamentally change the government’s approach to national security . The Bush administration banned

racial profiling in 2003, but that did not apply to national security investigations. Since then, the F.B.I. adopted internal rules that prohibited agents from making race or religion and nationality the “sole factor” for its investigative decisions. Civil rights groups see that as a loophole that allows the government to collect information about Muslims without evidence of wrongdoing. Intelligence officials see it as an essential tool. They say, for example, that an F.B.I. agent investigating the Shabab, a Somali militant group, must be able to find out whether a state has a large Somali population and, if so, where it is. As written, the new rules are unlikely to satisfy civil rights groups and some of the administration’s liberal allies in Congress. Senator Richard J. Durbin, Democrat of Illinois, has said the existing rules “are a license to profile.” The Justice Department rules would also apply to the Drug Enforcement Administration, and the Bureau of Alcohol, Tobacco, Firearms and Explosives, but it is the F.B.I. that takes the lead on most national security investigations. Farhana Khera, the president of Muslim Advocates, said expanding the rules to cover nationality and religion would be a significant step forward. But she opposed any rule that allowed the F.B.I. to continue what it calls

“domain mapping” — using census data, public records and law enforcement data to build maps of ethnic communities. Agents use this data to help assess threats and locate informants. “It would certainly mean we have work to do,” said Ms. Khera, who was one of several rights advocates who met with Mr. Holder about the profiling rules last week. “We want an effective ban on all forms of profiling.” Before federal agents could consider religion or other factors in their investigations under the new rules, they would need to justify it based on the urgency and totality of the threat and “the nature of the harm to be averted,” according to an official who has seen the draft. That would not prevent agents from considering religion or nationality, but officials said the goal was to establish clear rules that made doing so rare. Department officials were prepared to announce the new rules soon and had told Congress to expect them imminently. But recently, the White House intervened and told Mr. Holder to coordinate a larger review of racial profiling that includes the Department of Homeland Security, officials said. That is significant because the Bush-era racial profiling rules also contained an exception for border investigations, which are overseen by the department. Hispanic advocacy groups are as opposed to that caveat as Muslims are to the exception for national security investigations. Mr. Holder cannot tell Homeland Security what rules to follow. But he has told colleagues that he believes border agents can conduct their investigations without profiling and by following the same rules as the Justice Department, one law enforcement official said. It is not clear how long this broader review will take, but for now it has delayed release of the

Justice Department rules. Relations between the F.B.I. and Muslims have at times been strained since the weeks after 9/11, when agents arrested dozens of Muslim men who had no ties to terrorism. Since then, the F.B.I. has adopted new policies and invested heavily to explain

them to Muslim populations. Senior agents speak at mosques and meet regularly with imams and leaders of Muslim nonprofit groups, but suspicions remain. Internal F.B.I. documents revealed that agents used their relationship-building visits at mosques as a way to gather intelligence. Leaked training materials, which the F.B.I. quickly disavowed, described the Prophet Muhammad as a cult leader and warned that mainstream Muslims shared the same “strategic themes” as terrorists. The draft rules would establish a program to track profiling complaints. The current process is less organized, making it difficult to track patterns in complaints or how they are resolved.

xt – FBI Link UQRecent DOJ guidelines won’t result in any changes to FBI practices and still permits surveillance in critical areasPhelps, 14 (12/9/2014, Timothy M., “Comey says new profiling guidelines will have no effect on the FBI,” http://www.latimes.com/nation/la-na-fbi-comey-profiling-20141209-story.html, JMP)

The new Justice Department guidelines governing profiling by federal law enforcement officers will have no effect on FBI practices , its director , James B. Comey, said Tuesday.

On Monday, Comey’s boss, Atty. Gen. Eric H. Holder Jr., said the new guidelines were “a major and important step forward to ensure effective policing by federal law enforcement officials.”

But at a press briefing Tuesday, Comey said that the FBI, the lead federal law enforcement agency, is already in compliance with the new guidelines and strongly asserted that no changes were required.

The guidelines “don’t have any effect on the FBI,” he said

Asked whether the new guidance would change anything to FBI does now, Comey said, “No, nothing. It doesn’t require any change to our policies or procedures.”

He said the FBI field manual for agents would not be changed because it was already in compliance with the guidelines, which expand restrictions on racial and ethnic profiling to cover religion, national origin, sexual orientation and gender identity.

He defended the FBI practice of “mapping” communities to identify neighborhoods by race, religion or national origin. Civil rights leaders were critical Monday of the failure of the Justice Department to curtail the practice.

“We need to be able to understand the communities we serve and protect,” Comey said. “When there is a threat from outside the country, it makes sense to know who inside the country might be able to help law enforcement.”

“It is about knowing the neighborhoods: what’s it like, where’s the industry, where are the businesses, are there particular groups of folks who live in a particular area?”

Despite shortcomings, recent review demonstrates FBI’s effectiveness because of unfettered surveillance Ackerman, American national security reporter and blogger, national security editor for the Guardian, and Yuhas, 15 (3/25/2015, Spencer & Alan, The Guardian, “FBI told its cyber surveillance programs have actually not gone far enough; In-house 9/11 Review Commission calls for further expansion of informant and cyber surveillance networks but largely ignores domestic intelligence gathering,” Lexis, JMP)

An in-house review of the FBI has found the agency failing to go far enough in its expansion of physical and cyber surveillance programs, urging the bureau to recruit deeper networks of informants and bring its technological abilities up to pace with other intelligence agencies.

While billed as a damning critique of the FBI, the in-house assessment known as the 9/11 Review Commission primarily attacks the bureau for not moving fast enough to become a domestic intelligence agency, precisely the direction in which the FBI has pivoted since the 2001 terror attacks.

The majority of the panel's findings recommend bureaucratic changes - such as expanded training for FBI intelligence analysts or expanding cooperation with local and state law enforcement through the agency's Joint Terrorism Task Force - or otherwise urge Director James Comey onward in the long-set course he and predecessor Robert Mueller have set, such as bolstering the FBI's "human intelligence" (Humint) network of informants.

In particular, the report found that the agency fails to support analysts and linguists who interpret intelligence behind the scenes. The "imbalance" between support for field agents and analysts "needs urgently to be addressed to meet growing and increasingly complex national security threats, from adaptive and increasingly tech-savvy terrorists, more brazen computer hackers, and more technically capable, global cyber syndicates", the report's authors wrote.

Yet the "Review Commission cannot say that with better JTTF collaboration, Humint or even intelligence analysis that the FBI would have detected those plots beforehand", the panel concedes, offering only that FBI counterterrorism "might have benefited" with an acceleration of what the agency has already been doing.

Much of the report remarked approvingly on the FBI's activities of the past decade, praising the way it shares information with government agencies and the new rules that allow it to surveil a target without a warrant .

"With the new and almost entirely unclassified AG Guidelines, special agents working on national security issues could now at the assessment stage 'recruit and task sources, engage in interviews of members of the public without a requirement to identify themselves as FBI agents and disclose the precise purpose of the interview, and engage in physical surveillance not requiring a court order' just as special agents working on organized crime investigations could do," the authors wrote.

Link: Profiling – Mosques Surveillance of particular communities key to prevent terrorismLengell, 15 (1/7/2015, Sean, “Peter King: Surveillance of Muslim community vital for national security,” http://www.washingtonexaminer.com/peter-king-surveillance-of-muslim-community-vital-for-national-security/article/2558311, JMP)

Rep. Peter King said Wednesday’s attack on a Paris newspaper that killed a dozen people highlights the need for enhanced police surveillance in Muslim communities to help combat terrorism. “It shows us that we should put political correctness aside and realize that it is important to have police in the communities to be using sources, to be using informers,” the

conservative New York Republican told Fox News on Wednesday. “Let's face it. The threat is coming from — for the most part, it's

coming out of the Muslim community. It's a small percentage, but that's where it's coming from.” King said law enforcement spying of certain ethnic communities is nothing new, saying that police for decades have used such tactics to combat the

Italian-American Mafia and the Westies, a gang that sprang from New York City's Irish-American community in the 1960s. “We have to be able to go in there and find out what's happening so we can be tipped off and not stand back and treat all communities as if they're the same,” he said. "If it's Islamist terrorism, we have to have more surveillance in those communities.” The Associated Press reported that three masked gunmen shouting "Allahu akbar!" stormed the Paris offices of the satirical weekly newspaper Charlie Hebdo, killing 12 people, including its editor, before escaping in a car. The

publication's caricatures of the Prophet Muhammad have frequently drawn condemnation from Muslims. King said that while it’s uncertain

if enhanced surveillance could have stopped the Paris shooting, “it shows the absolute necessity” of “on-the-ground intelligence. “You can't provide security for every soft target in a major city. But if you have surveillance, if you're in the community, if you have informers, that shows how essential this [is], like the NYPD's been doing over the years,” he said.

AT: Link Turn-“Too Much Hay” The turn makes no sense – programs are effective now Lewis 2014 (James Andrew [senior fellow and director of the Strategic Technologies Program at CSIS]; Underestimating Risk in the Surveillance Debate; Dec; http://csis.org/files/publication/141209_Lewis_UnderestimatingRisk_Web.pdf; kdf)

If the risk of attack is increasing, it is not the right time to change the measures the United States has put in place to deter another 9/11. If risk is decreasing, surveillance programs can be safely reduced or eliminated. A more complicated analysis would ask if the United States went too far after 9/11 and the measures it put in place can be

reduced to a reasonable level without increasing risk. Unfortunately, precise metrics on risk and effectiveness do not exist, 12 and we are left with the conflicting opinions of intelligence officials and civil libertarians as to what makes effective intelligence or counterterrorism programs. There are biases on both sides, with intelligence officials usually preferring more information to less and civil libertarians can be prone to wishful thinking about terrorism and opponent intentions.13

Interviews with current and former intelligence officials give us some guidance in deciding this. The consensus among these individuals is that 215 is useful in preventing attacks, but the least useful of the programs available to the intelligence community . If there was one surveillance program they had to give up , it would be 215 before any other s, but ending 215 would not come without some increase in risk.

Technology and algorithms checkMarritz 2013 (Ilya; Verizon Call Logs Controversy: No Such Thing As Too Much Information; June 6; www.wnyc.org/story/297513-verizon-call-logs-controversy-no-such-thing-too-much-information/; kdf)

The news that Verizon is providing the government with data about its customers on a daily basis has reignited the debate between balancing

individual privacy and national security. Barry Steinhardt of the group Friends of Privacy USA said the surveillance itself is not so surprising, but the volume of material gathered is. “The government seems to think the way to find the needle in the haystack is to pour more hay on the stack,” Steinhardt said. That idea might seem counter-

intuitive. But too much information is increasingly a thing of the past, as powerful computer programs tease patterns out of bigger and bigger pools of data.

**Impact Debate - Generic

Impact: Turns the Aff -> Increase Surveillance Empirically - a terror attack leads to greater surveillance, turns the affTuccille 2015 (J.D. [Managing Editor, Reason.com]; What's a terrorist attack if not an excuse for domestic spying?; Jan 14; reason.com/blog/2015/01/14/whats-a-terrorist-attack-if-not-an-excus; kdf)

Following on last week's terrorist attacks in France, the British government has dusted off a long-sought "snooper's charter"—better known as the Data Communications Bill—to ease the power of officials to track people's private communications. "It is too soon to say for certain, but it is highly probable that communications data was used in the Paris attacks to locate the suspects and establish the links between the two attacks," Home Secretary Theresa May told Parliament. "Quite simply, if

we want the police and the security services to protect the public and save lives, they need this capability. You get that? There's no evidence that the bill would have prevented the Charlie Hebdo attack, but that incident is why you should pass the bill. Prime Minister David Cameron even says that messaging services that can't be intercepted should be banned. Using the latest outrage to inject new life into old security-state legislation isn't a British specialty. When the Patriot Act was introduced in 2001, then-Senator Joseph Biden boasted, "I drafted a terrorism bill after the Oklahoma City bombing. And the bill John Ashcroft sent up was my bill." This is a game in which politicians everywhere can participate. Never mind that, as Reason's Ron Bailey pointed out in November, "there is very little evidence that the Internet is making terrorism easier to do." But pretending otherwise, and passing legislation that empowers security services, lets government officials accumulate power and give the appearance of doing something when the public is frightened. Added Bailey: As [David

Benson, a political scientist at the University of Chicago] argues, exaggerating the Internet's usefulness to terrorism has "egregious costs." Some officials, for example, have been calling for a "kill switch" that would allow the government to shut down the Internet in an emergency. Noting how much Americans depend upon the Net for commerce, communication, medical care, and so forth, Benson points out that "It is difficult to imagine a terrorist attack being as costly as turning off the Internet would be."

Terrorism also gives officials an excuse to tighten censorship—especially in jurisdictions, including many democratic countries in Europe, where the whole free speech thing has relatively shallow roots. So get ready for the ride. Driven by a need to appear

proactive, and a preexisting taste for accumulating power, government officials once again exploit a murderous incident to increase their authority over us. Which escalates the ongoing cold war between people who want to be left alone, and the governments that seek to control them.

Impact: Turns the Aff -> Racism Terror attacks incite racism domestically, regardless of who attacksAkrahm and Johnson 2002 (Susan M [Associate Clinical Prof @ Boston U School of Law] and Kevin R [Associate Dean for Academic Affairs@ UC Davis, Prof of Law and Chicana/o Studies]; RACE, CIVIL RIGHTS, AND IMMIGRATION LAW AFTER SEPTEMBER 11, 2001: THE TARGETING OF ARABS AND MUSLIMS; Nov 2; www.privacysos.org/sites/all/files/akram.pdf; kdf)

Times of crisis are often accompanied by hostility toward minorities in the United States. For Arabs and Muslims, this

may be even more problematic, as perpetrators of hate crimes against Arabs and Muslims frequently fail to differentiate among persons based on religion or ethnic origin, from Pakistanis, Indians, Iranians, and Japanese to

Muslims, Sikhs and Christian Arabs.89 The widespread perception in the United States is that Arabs and Muslims are identical and eager to wage a holy war against the United States.90 In fact, according to a 1993 report, only 12% of the Muslims in the United States at that time were Arab,91 and Arab Muslims are even a minority in the Arab-American community.92 Although

there are Muslim “extremists,” the majority of Muslims are “decent, law-abiding, productive citizens.”93 Because of the lack of differentiation between different types of Arabs and Muslims, terrorist acts by small groups of Arabs and Muslims

often have been followed by generalized hostility toward entire communities of Arabs and Muslims in the United States. For example, after Lebanese Shi’a gunmen in 1985 highjacked TWA Flight 847 to Beirut, beat an American on the plane to death, and held the remaining passengers hostage for over two weeks,94 violent attacks against persons of Arab and Muslim origin occurred across the United States.95 Islamic centers and Arab-American organizations were vandalized and threatened. A Houston mosque was firebombed. A bomb exploded in the American-Arab Anti-Discrimination Committee office in Boston, severely injuring two policemen.96 Later that same year, after terrorists hijacked the Achille Lauro cruise liner and murdered a passenger, a wave of anti-Arab violence swept the country, including the bombing of an AmericanArab Anti-Discrimination Committee office that killed its regional executive director.97 In 1986, in apparent response to the Reagan Administration’s “war on terrorism” directed at Libya,98 another episode of anti-Arab harassment and violence broke out. The same night of a U.S. bombing raid on Libya, the American-Arab Anti-Discrimination Committee national office in Washington received threats. Shortly thereafter, the Detroit American-Arab Anti-Discrimination Committee office, the Dearborn Arab community center, and the Detroit

Arab-American newspaper received bomb threats.99 Threats, beatings and other violent attacks on Arabs were reported across the United States.100 At this time, someone broke into a Palestinian family’s home, set off a smoke bomb inside the house, and painted slogans such as “Go Back to Libya” on the walls.101 The Gulf War intensified anti-Arab hostility in the United States.

The American-Arab Anti-Discrimination Committee reported four anti-Arab hate crimes for 1990 before the invasion of Kuwait in August.102 Between the invasion and February 1991, the Committee reported 175 incidents.103 When U.S. intervention commenced in January 1991, Arab and Muslim businesses and community organizations were bombed, vandalized, and subjected to harassment.104

Impact: Terror BadEven a small attack pulled off by 1 person could kill billionsMyhrvold 2014 (Nathan P [chief executive and founder of Intellectual Ventures and a former chief technology officer at Microsoft]; Strategic Terrorism: A Call to Action; cco.dodlive.mil/files/2014/04/Strategic_Terrorism_corrected_II.pdf; kdf)

Technology contains no inherent moral directive—it empowers people, whatever their intent, good or evil. This has always been true: when bronze implements supplanted those made of stone, the ancient world got scythes and awls, but also swords and battle-axes. The novelty of

our present situation is that modern technology can provide small groups of people with much greater lethality than ever before. We now have to worry that private parties might gain access to weapons that are as destructive as—or possibly even more destructive than— those held by any nation-state. A handful of people, perhaps even a single individual, could have the ability to kill millions or even billions. Indeed, it is possible, from a technological standpoint, to kill every man, woman, and child on earth. The gravity of the situation is so extreme that getting the concept across without seeming silly or alarmist is challenging . Just thinking about the subject with any degree of seriousness numbs the mind. The goal of this essay is to present the case for making the needed changes before such a catastrophe occurs. The issues described here are too important to ignore.

Impact: Escalation9/11 proves, attacks invite counter-attacksMyhrvold 2014 (Nathan P [chief executive and founder of Intellectual Ventures and a former chief technology officer at Microsoft]; Strategic Terrorism: A Call to Action; cco.dodlive.mil/files/2014/04/Strategic_Terrorism_corrected_II.pdf; kdf)

Failing nation-states—like North Korea—which possess nuclear weapons potentially pose a nuclear threat. Each new entrant to the nuclear club increases the possibility this will happen, but this problem is an old one, and one that existing

diplomatic and military structures aim to manage. The newer and less understood danger arises from the increasing likelihood that stateless groups, bent on terrorism, will gain access to nuclear weapons, most likely by theft from a nation-state. Should this

happen, the danger we now perceive to be coming from rogue states will pale in comparison. The ultimate response to a nuclear attack is a nuclear counterattack. Nation states have an address, and they know that we will retaliate in kind. Stateless groups are much more difficult to find which makes a nuclear counterattack virtually impossible. As a result, they can strike without fear of overwhelming retaliation, and thus they wield much more effective destructive power. Indeed, in many cases the

fundamental equation of retaliation has become reversed. Terrorists often hope to provoke reprisal attacks on their own people, swaying popular opinion in their favor. The aftermath of 9/11 is a case in point. While it seems likely that Osama bin Laden and his henchmen hoped for a massive overreaction from the United States, it is unlikely his Taliban hosts anticipated the U.S. would go so far as to invade Afghanistan . Yes, al-Qaeda lost its host state and some personnel. The damage slowed the organization down but did not destroy it. Instead, the stateless al-Qaeda survived and adapted. The United States can claim some success against al-Qaeda in the years since 9/11, but it has hardly delivered a deathblow.

Eventually, the world will recognize that stateless groups are more powerful than nation-states because terrorists can wield weapons and mount assaults that no nationstate would dare to attempt. So far, they have limited themselves to dramatic tactical terrorism: events such as 9/11, the butchering of Russian schoolchildren, decapitations broadcast over the internet, and bombings in major cities. Strategic objectives cannot be far behind.

Threats real - Lone WolfLone wolf threats are mountingWall Street Journal 2015 (The Anti-Surveillance Rush; 20 May 2015: A.12; ProQuest; kdf)

Among the GOP presidential field, Marco Rubio has come out in favor of metadata, while Chris Christie gave a thoughtful speech Monday on

intelligence and foreign affairs in Portsmouth, New Hampshire. The New Jersey Governor speaks with some authority as a former antiterror prosecutor who worked in the greater New York region that is a principal target of global jihad. "If we want to manage events -- and not have events manage us -- then we need superior knowledge of the world around us," Mr. Christie said. "Instead, Washington is debating the wrong question entirely -- which intelligence capabilities should we get rid of?" He is flattering the legislative rush by calling it a debate. Mr. Christie was especially sharp on the distinction between the practical realities of protecting the country and "the intellectual purists worried about theoretical abuses that haven't occurred -- instead of the real threats that we've already seen from Garland, Texas, to Fort Dix, New Jersey." The growing world disorder may

mean metadata is more critical than ever. A rush to the exits is no way to conduct U.S. intelligence, or the affairs of Congress. If a majority of Senators really do want to disarm in the terror war, then they should defend their positions, listen to the other side, and be accountable for the results. Cramming such a major policy into law before a holiday weekend is a failure to treat national security with the seriousness it deserves.

AT: MuellerMueller is a hackGraham Allison 9, Douglas Dillon Professor of Government and Director of the Belfer Center for Science and International Affairs at Harvard University's Kennedy School of Government, “A Response to Nuclear Terrorism Skeptics” Brown Journal of World Affairs, Hein Online

What drives Mueller and other skeptics to arrive at such different conclusions? ¶ They make four major claims that merit serious examination and reflection.¶ CLAIM 1: No ONE IS SERIOUSLY MOTIVATED TO CONDUCT A NUCLEAR TERRORIST ATTACK.¶ More than a decade ago, no one could have imagined that a Japanese doomsday cult would be sufficiently motivated to disseminate sarin gas on the Tokyo subway . Indeed, at the time of that attack,

the consensus among terrorism experts was that terrorists wanted an audience and sympathy-not casualties. The leading American student of terrorism, Brian Jenkins, summarized the consensus judgment in 1975: "terrorists seem 34 to be more interested in having a lot of people watching, not a lot of people

dead.""¶ As intelligence officials later testified, an inability to recognize the shifting modus operandi of some terrorist groups was part of the reason why members of Aum Shinrikyo "were simply not on anybody's radar screen ."" This, despite the

fact that the group owned a 12-acre chemical weapons factory in Tokyo, had $1 billion in its bank account, and had a history of serious nuclear ambitions.'9¶ Similarly, before the 9/11 attacks on the World Trade

Center and Pentagon that extinguished 3,000 lives, few imagined that terrorists could mount an attack upon the American homeland that would kill more Americans than the Japanese attack at Pearl Harbor. As Secretary Rice testified to the 9/11 Commission, "No

one could have imagined them taking a plane, slamming it into the Pentagon and into the World Trade Center, using planes as a missile." 20 For most Americans, the idea of international terrorists mounting an attack on our homeland and killing thousands of citizens was not just unlikely, but inconceivable. But assertions about what is "imaginable" or "conceivable" are propositions about individuals' mental capacities, not about what is objectively possible.¶ In fact, Al Qaeda's actions in the decade prior to the 9/11 attacks provided clear evidence both of intent and capability. While its 1993 attack on the World Trade Center succeeded in killing only six people, Ramzi Yousef, the key operative in this case, had planned to collapse one tower onto the second, killing 40,000. In the summer of 1996, Osama bin Laden issued a fatwa declaring war upon the United States. Two years later, Al Qaeda attacked the U.S. embassies in Nairobi, Kenya, and Dar es Salaam, Tanzania, killing more than 200 people. In October 2000, Al Qaeda attacked the warship USS Cole. Throughout this period, Al Qaeda's leadership was running thousands of people through training camps, preparing them for mega-terrorist attacks.¶ Notwithstanding Aum Shinrikyo's brazen attack, Al Qaedas audacious 9/11 attack, and the recent attacks in Mumbai that killed 179 people,

Mueller maintains that "terrorists groups seem to have exhibited only limited desire... they have discovered that the tremendous effort required is scarcely likely to be successful." He asserts that the evidence about Al Qaedas nuclear intentions ranges from the "ludicrous to the merely dubious," and that those who take Al Qaeda's nuclear aspiration seriously border on "full-on fantasyland."1¶ Even scholars who would have been inclined to agree with this point of view have revised their judgment as new facts have accumulated. In 2006, for example, Jenkins reversed the basic proposition that he had set forth three decades earlier. In his summary: "In the 1970s the

bloodiest incidents caused fatalities in the tens. In the 1980s, fatalities from the worst incidents were in the hundreds; by the 1990s, attacks on this scale had become more frequent. On 9/11 there were thousands of fatalities, and

there could have been far more. We now contemplate plausible scenarios in which tens of 35 thousands might die." Underlining the contrast with his own 1975 assessment, Jenkins now says: "Jihadists seem ready to murder millions, if necessary. Many of today's terrorists want a lot of people watching and a lot of people dead."22 (Emphasis added.)¶ Al Qaeda has been deadly clear about its ambitions. In 1998, Osama bin Laden declared that he considered obtaining weapons of mass destruction "a religious duty."" In

December 2001, he urged his supporters to trump the 9/11 attacks: "America is in retreat by the grace of God Almighty..but it needs further blows."2 A few months later, Al Qaeda announced its goal to "kill four million

Americans."5 It eVen managed to gain religious sanction from a radical Saudi cleric in 2003 to kill "ten million Americans" with a nuclear or biological weapon.26¶ We also now know that Al Qaeda has been seriously seeking a nuclear bomb . According to the Report of the 9/11 Commission, "Al Qaeda has tried to acquire or make nuclear weapons for at least ten years... and

continues to pursue its strategic goal of obtaining a nuclear capability." It further reveals "bin Laden had reportedly been heard to speak of wanting a 'Hiroshima." The Commission provides evidence of Al Qaedas effort to recruit nuclear expertise -including evidence

about the meeting between two Pakistani nuclear weapon scientists, bin Laden, and his deputy Ayman al-Zawahiri in Afghanistan to discuss nuclear weapons.2 These scientists were founding members of Ummah Tamer-e-Nau (UTN), a so-called charitable agency to support projects in Afghanistan. The foundation's board included a fellow nuclear scientist knowledgeable about weapons construction, two Pakistani Air Force generals, one Army general, and an industrialist who owned Pakistan's largest foundry.28¶ In his memoir, former CIA Director George Tenet offers his own conclusion that "the most senior leaders of Al Qaeda are still singularly focused on acquiring WMD" and that "the main threat is the nuclear one." In Tenet's view, Al Qaedas strategic goal is to obtain a nuclear capability. He concludes as follows: "I am convinced that this is where Osama bin Laden and his operatives desperately

want to go."2 9¶ CLAIM 2: IT IS IMPOSSIBLE FOR TERRORISTS TO ACQUIRE FISSILE MATERIAL .¶ Assuming that terrorists have the intent-

could they acquire the necessary materials for a Hiroshima-model bomb? Tenet reports that after 9/11, President Bush showed President Putin his briefing on UTN. In Tenet's account of the meeting, Bush "asked Putin point blank if Russia could account for all of its material." Putin responded that he could guarantee it was secure during his watch, underlying his inability to provide assurance about events under his predecessor, Boris Yeltsin.3o¶ When testifying to the Senate Intelligence Committee in February 2005, Commit- 36 tee Vice-Chairman John Rockefeller (D-WV) asked CIA Director Porter Goss whether the amount of nuclear material known to be missing from Russian

nuclear facilities was sufficient to construct a nuclear weapon. Goss replied, "There is sufficient material unaccounted for that it would be possible for those with know-how to construct a weapon .. .I can't account for some of the material so I can't make the assurance about its whereabouts."¶ Mueller sidesteps these inconvenient facts to assert a contrary claim . According to his telling, over the last 10 years, there have been only 10 known thefts of highly

enriched uranium (HEU), totaling less than 16 pounds, far less than required for an atomic explosion. He acknowledges, however, that "There may have been additional thefts that went undiscovered."32¶ Yet, as Matthew Bunn testified to the Senate in April 2008, "Theft of HEU and plutonium is not a hypothetical worry, it is an ongoing reality." He notes that "nearly all of the stolen HEU and plutonium that has been seized over the years had never been missed before it was seized." The IAEA Illicit Nuclear Trafficking Database notes 1,266 incidents reported by 99 countries over the last 12 years, including 18 incidents involving HEU or plutonium

trafficking. 130 research reactors around the world in 40 developing and transitional countries still hold the essential ingredient for nuclear weapons. As Bunn explains, "The world stockpiles of HEU and separated plutonium are enough to make roughly 200,000 nuclear weapons; a tiny fraction of one percent of these stockpiles going missing could cause a global catastrophe ."¶ Consider the story of Russian citizen Oleg Khinsagov. Arrested

in February 2006 in Georgia, he was carrying 100 grams of 89-percent enriched HEU as a sample and attempting to find a buyer for what he claimed were many additional kilograms. Mueller asserts that "although there is a legitimate concern that some material, particularly in Russia, may be somewhat inadequately secured, it is under lock and key, and even sleepy, drunken guards, will react with hostility (and noise) to a raiding party.""¶

CLAIM 3: IT IS EXTREMELY DIFFICULT TO CONSTRUCT A NUCLEAR DEVICE THAT WORKS. ¶ Rolf Mowatt-Larssen, former

director of the Department of Energy's Office of Intelligence and Counterintelligence, testified that, "The 21s' century will be defined first by the desire and then by the ability of non-state actors to procure or develop crude nuclear

weapons."6 In contrast, Mueller contends that, "Making a bomb is an extraordinarily difficult task... the odds, indeed, are stacked against the terrorists, perhaps massively so." 37¶ Mueller argues that his conclusion follows from an analysis of 20 steps an atomic terrorist would have to accomplish in what he judges

to be the most likely nuclear terrorism scenario. On the basis of this list, he claims that there is "worse than one in a 37 million" chance of success. 38¶ His approach, however, misunderstands probabilistic risk assessment. For example, some of the steps on the list would have to be

completed before an attempt to acquire material could begin (therefore, the success rate for any of those steps during the path would, by definition, be 100 percent). Other steps are unnecessary, such as having a technically

sophisticated team pre-deployed in the target country. Although he assumes that stolen materials will be missed, in none of the 18 documented cases mentioned earlier had the seized material been reported missing." ¶ At U.S. weapons labs and among the U.S. intelligence community, experts who have examined this issue largely agree. John Foster, a leading American bomb maker and former director of the Lawrence Livermore National Laboratories, wrote a quarter century ago, "If the essential nuclear materials are at hand, it is

possible to make an atomic bomb using information that is available in the open literature." 4 Similarly, Theodore Taylor, the nuclear physicist who designed America's smallest and largest atomic bombs, has repeatedly stated that, given fissile material, building a bomb is "very easy. Double underline. Very Easy." 4¶ Inquiring into such claims, then-Senator Joe Biden (D-DE) asked the major nuclear weapons laboratories whether they could make such a device if they had nuclear

materials. All three laboratories answered affirmatively. The laboratories built a gun-type device using only components that were commercially available and without breaking a single U.S. law.¶ The Commission on the Intelligence Capabilities of the United States Regarding Weapons of Mass Destruction, known as the Silberman-Robb Commission, reported in 2005 that the intelligence community believed Al Qaeda "probably had access to nuclear expertise and facilities and that there was a real possibility of the group developing a crude nuclear device." It went on to say that "fabrication of at least a 'crude' nuclear device was within Al Qaedas capabilities, if it could

obtain fissile material."43¶ Skeptics argue that terrorists cannot replicate the effort of a multi-billion dollar nuclear program of a state. This claim does not distinguish between the difficulty of producing nuclear materials for a bomb (the most difficult threshold) and the difficulty of making a bomb once the material has been acquired . The latter is

much easier. In the Iraq case, for example, the CIA noted that if Saddam Hussein had stolen or purchased nuclear materials from abroad, this would have cut the time Iraq needed to make a bomb from years to months.1 Moreover,

terrorists do not require a state-of-the art weapon and delivery system, since for blowing up a single city a crude nuclear device would suffice.¶ The grim reality of globalization's dark underbelly is that non-state actors are 38 increasingly capable of enacting the kind of lethal destruction heretofore the sole reserve of states.¶ CLAIM 4: IT IS TOO DIFFICULT TO DELIVER A NUCLEAR DEVICE TO THE UNITED STATES. ¶ In the spring of 1946, J. Robert Oppenheimer was asked whether units of the atom bomb could be smuggled into New York and then detonated. He answered, "Of course it could be

done, and people could destroy New York." As for how such a weapon smuggled in a crate or a suitcase might be detected, Oppenheimer opined, "with a screwdriver." He went on to explain that because the HEU in a nuclear weapon emits so few radioactive signals, a bomb disguised with readily available shielding would not be detected when inspectors opened the crates and examined the cargo.41¶ The nuclear weapon that terrorists would use in the first attack on the United States is far more likely to arrive in a cargo container than on the tip of a missile. In his appearance before a Senate subcommittee in March 2001, six months before 9/11, National Intelligence Officer Robert Walpole testified that "non-missile delivery means are less costly, easier to acquire, and more reliable and accurate."' 6¶ Citing the 1999-2003 U.S. Congressional Advisory Panel to Assess Domestic Response Capabilities for

Terrorism Involving Weapons of Mass Destruction (the Gilmore Commission), Mueller states that transporting an improvised nuclear device would require overcoming "Herculean challenges .""¶ He does not explain, however, why bringing a crude nuclear weapon into an American city would be materially different than the challenge faced by drug smugglers or human traffickers. According to the Government Accountability Organization, an average of 275 metric tons of cocaine have arrived in Mexico each year for transshipment to the United States since 2000.

Reported seizures averaged about 36 tons a year, a 13 percent success rate for the intelligence and law enforcement community. Three million illegal immigrants enter the country each year, and only one in three gets caught."

Impact – Right Wing Nuts

Uniqueness – Threats RealRight-wing fanatics are the biggest threat to the USKruzman and Schanzer June 16, 2015 (Charles and David; The Growing Right-Wing Terror Threat; www.nytimes.com/2015/06/16/opinion/the-other-terror-threat.html?_r=0

THIS month, the headlines were about a Muslim man in Boston who was accused of threatening police officers with a knife. Last month, two Muslims attacked an anti-Islamic conference in Garland, Tex. The month before, a Muslim man was charged with plotting to drive a truck bomb

onto a military installation in Kansas. If you keep up with the news, you know that a small but steady stream of American Muslims, radicalized by overseas extremists, are engaging in violence here in the United States. But headlines can mislead. The main terrorist threat in the United States is not from violent Muslim extremists, but from right-wing extremists . Just ask the police. In a survey we conducted with the Police Executive Research

Forum last year of 382 law enforcement agencies, 74 percent reported anti-government extremism as one of the top three terrorist threats in their jurisdiction; 39 percent listed extremism connected with Al Qaeda or like-minded terrorist organizations. And only 3 percent identified the threat from Muslim extremists as severe, compared with 7 percent for anti-government and other forms of extremism. The self-proclaimed Islamic State’s efforts to radicalize American Muslims, which began just after the survey ended, may have increased threat perceptions somewhat, but not by much, as we found in follow-up interviews over the past year with counterterrorism specialists at 19 law enforcement agencies. These officers, selected from urban and rural areas around the country, said that radicalization from the Middle East was a concern, but not as dangerous as radicalization among right-wing extremists. An officer from a large

metropolitan area said that “militias, neo-Nazis and sovereign citizens” are the biggest threat we face in regard to extremism. One officer explained that he ranked the right-wing threat higher because “it is an emerging threat that we don’t have as good of a grip on, even with our intelligence unit, as we do with the Al Shabab/Al Qaeda issue, which we have been dealing with for some

time.” An officer on the West Coast explained that the “sovereign citizen” anti-government threat has “really taken off,” whereas terrorism by American Muslim is something “we just haven’t experienced yet.” Last year, for example, a man who identified with the sovereign citizen movement — which claims not to recognize the authority of federal or local government — attacked a courthouse in Forsyth County, Ga., firing an assault rifle at police officers and trying to cover his approach with tear gas and smoke grenades. The suspect was killed by the police, who returned fire. In Nevada, anti-government militants reportedly walked up to and shot two police officers at a restaurant, then placed a “Don’t tread on me” flag on their bodies. An anti-government extremist in Pennsylvania was arrested on suspicion of

shooting two state troopers, killing one of them, before leading authorities on a 48-day manhunt. A right-wing militant in Texas declared a “revolution” and was arrested on suspicion of attempting to rob an armored car in order to buy weapons and explosives and attack law enforcement. These individuals on the fringes of right-wing politics increasingly worry law enforcement officials. Law enforcement agencies around the country are training their officers to recognize signs of anti-government extremism and to exercise caution during routine traffic stops, criminal investigations and other

interactions with potential extremists. “The threat is real,” says the handout from one training program sponsored by the Department of

Justice. Since 2000, the handout notes, 25 law enforcement officers have been killed by right-wing extremists, who share a “fear that government will confiscate firearms” and a “belief in the approaching collapse of government and the economy.” Despite public anxiety about extremists inspired by Al Qaeda and the Islamic State, the number of violent plots by such individuals has remained very low. Since 9/11, an average of nine American Muslims per year have been involved in an average of six terrorism-related plots against targets in the United States. Most were disrupted, but the 20 plots that were carried out

accounted for 50 fatalities over the past 13 and a half years. In contrast, right-wing extremists averaged 337 attacks per year in the decade after 9/11, causing a total of 254 fatalities , according to a study by Arie Perliger, a professor at the

United States Military Academy’s Combating Terrorism Center. The toll has increased since the study was released in 2012. Other data sets, using different definitions of political violence, tell comparable stories. The Global Terrorism Database maintained by the Start Center at the University of Maryland includes 65 attacks in the United States associated with right-wing ideologies and 24 by Muslim extremists since 9/11. The International Security Program at the New America Foundation identifies 39 fatalities from “non-jihadist” homegrown extremists and 26 fatalities from “jihadist” extremists. Meanwhile, terrorism of all forms has accounted for a tiny proportion of

violence in America. There have been more than 215,000 murders in the United States since 9/11. For every person killed by Muslim extremists, there have been 4,300 homicides from other threats. Public debates on terrorism focus intensely on Muslims. But this focus does not square with the low number of plots in the United States by Muslims, and it does a disservice to a

minority group that suffers from increasingly hostile public opinion. As state and local police agencies remind us, right-wing, anti-government extremism is the leading source of ideological violence in America.

Link – Surveillance All surveillance measures are useful to prevent fanatics from pulling off attacks & Ohio is evilSewell 2015 (Dan; New FBI official: Terror threat in Ohio is surprising; May 30; www.bucyrustelegraphforum.com/story/news/state/2015/05/30/new-fbi-official-terror-threat-ohio-surprising/28217115/; kdf)

CINCINNATI – The new head of the FBI's wide-ranging Cincinnati division says the threat of homegrown terrorists in her native state is surprising and scary. Angela Byers became special agent in charge of the office that covers 48 of Ohio's 88 counties in late February, just after back-to-back arrests of young men in Cincinnati and Columbus in separate cases alleging they were plotting attacks in the United States. Both have pleaded not guilty to all charges. Byers told The Associated Press in an interview she was

surprised at the threat level in Ohio, and she suspects many people in the Midwest don't realize that "violent extremists" can pop up anywhere. "It's scary. And it's scary to us. I'm not sure the general public quite gets the gravity of it," she

said. She said counterterrorism efforts are ongoing in her office, although she couldn't comment on any possible other cases.

"It seems like once we get one guy, another guy pops up high on the radar ," she said. "We just keep moving from one to the next." The cases that broke this year in her division were the arrests of Christopher Lee Cornell, of suburban Cincinnati, on charges he planned to attack the U.S. Capitol, and Abdirahman Sheik Mohamud, 23, of Columbus, accused of planning to attack a military base or prison after returning from terrorist training in Syria. Mark Ensalaco, the director of human rights research at the University of Dayton,

who has written about Middle East terrorism and the Sept. 11 attacks, said trying to detect homegrown "lone wolves" before they act is "a nightmare for national security ." But he said use of confidential informants and federal electronic surveillance can raise concerns about protecting citizens' rights.

Impact – Racism Right-wing terrorism accesses the internal-link more than the affIyer 6/19/2015 (Deepa; Charleston Shooting is domestic terrorism; america.aljazeera.com/opinions/2015/6/charleston-shooting-is-domestic-terrorism.html; kdf)

A gun rampage. A hate crime. An act of domestic terrorism. The shooting deaths of nine people in the historic Emanuel African

Methodist Episcopal Church in downtown Charleston, South Carolina, on Wednesday night must be characterized as all three. While we await further information about the suspect, Dylann Roof, and as we mourn with the families of the victims, it is important that we categorize

this tragedy accurately. Roof, apprehended by police on Thursday, is a 21-year-old white man. Before he opened fire on a group of adults and children who had gathered for Bible study, Roof apparently told the congregation, “You rape our women and you’re taking over our country. And you have got to go.” According to his roommate Dalton Tyler, he had planned something like this attack for six months. “He was big into

segregation and other stuff,” Tyler told ABC News. “He said he wanted to start a civil war. He said he was going to do something like

that and then kill himself.” The Charleston shooting is a violent act of racial hatred, intended to terrorize and intimidate black people . It exists on the alarming spectrum of other acts of hate in places of worship , including the bombing of the 16th Street Baptist Church in Birmingham, Alabama, in 1963; the spate of arsons against African-American churches in the late 1990s in the South; the anti-Semitic graffiti regularly sprawled on the walls of synagogues and murders at Jewish community centers; the burning of Korans and throwing of Molotov cocktails at mosques; the vandalism of Hindu temples; and the 2012

shooting of six Sikh worshippers at a gurdwara in Oak Creek, Wisconsin, by a white supremacist. Indeed, acts of violence are perpetrated regularly in this country, on the streets and in places of worship, and on the basis of racial bias, sexual orientation, religious bias, ethnicity, disability, gender bias and gender identity . Annual reports from the Federal Bureau of Investigation (FBI) and the Bureau of Justice Statistics (BJS) sketch a national landscape filled with hate crimes against people, including assaults and homicides, and property, including vandalism to places of worship or cross-burnings. The BJS reports that the percentage of hate crimes involving violence increased from 78 percent in 2004 to 90 percent in 2011 and 2012. Meanwhile, the Southern Poverty Law Center has been tracking the organized activities of anti-immigrant, anti-gay, anti-Muslim and anti-government “patriot” groups, many of which are forming in response to changing American racial demographics, immigration patterns and the election of a black president. They are motivated by the belief that the balance of power will shift away from white Americans — a sentiment apparently voiced by Roof when he said “you are taking over,” before opening fire at the church.

These domestic right-wing hate groups should not be taken lightly. Their ideologies of white supremacy and white nationalism are seeping into mainstream political activity and rhetoric, and influencing “lone wolves” who are committing the majority of hate violence in the country.

AT: Terror KNo link – the disad focus on actual threats: right wing fanaticsIyer 6/19/2015 (Deepa; Charleston Shooting is domestic terrorism; america.aljazeera.com/opinions/2015/6/charleston-shooting-is-domestic-terrorism.html; kdf)

We can start by calling the Mother Emanuel Church shooting a hate crime, as Charleston police chief Greg Mullen has already done. But we should also call it domestic terrorism. Doing so will help us understand the gravity of such acts and ensure that we characterize acts of hate in similar ways, regardless of the race or faith of the perpetrator. Typically, the media and lawmakers label an act of mass violence motivated by hatred or bigotry as terrorism when the perpetrator is Muslim or is of Arab, Middle Eastern, North African or South Asian descent in order to trigger a sense of national insecurity related to the 9/11 attacks. On the other hand, white perpetrators of similar crimes are given the benefit of the doubt, treated as innocent until proven guilty or characterized as mentally unfit. These disparate narratives in turn influence policy and

legal decisions as well as public opinion towards people from marginalized backgrounds. Categorizing mass violence motivated by bigotry as domestic terrorism will also compel the federal government to study, monitor, track, prosecute and ultimately prevent the hateful actions of radical right groups motivated by notions of white supremacy. Currently, the government’s programs to combat violent extremism almost exclusively focus on the threat of Muslim

radicalization. Notwithstanding the negative perceptions of Muslims fueled by these programs, it is vital that the federal government allocate resources towards countering violent extremism by hate groups that target communities of color and faith. But a label is only a start. In order to address the roots of hate violence perpetrated by individuals, we must come to terms with the structural inequities in America. The cycles of economic, education, incarceration and housing policies that abandon, criminalize and disenfranchise black and brown people foster an environment in which hateful individuals feel empowered to

violently target already marginalized communities. We must disrupt these cycles through policy and culture shifts that include dismantling the narratives, propelled by xenophobia, Islamophobia and racism, that are constructed about black and brown communities — as people who are undeserving of benefits and rights.

Impact – Al Qaeda

Uniqueness - Al QaedaAl Qaeda is expanding and plotting attacks against the WestHubbard 6/9/2015 (Ben; Al Qaeda Tries a New Tactic to Keep Power: Sharing It; www.nytimes.com/2015/06/10/world/middleeast/qaeda-yemen-syria-houthis.html; kdf)

BEIRUT, Lebanon — After they routed the army in southern Yemen, fighters from Al Qaeda stormed into the city of Al Mukalla, seizing government buildings, releasing jihadists from prison and stealing millions of dollars from the central bank. Then they surprised everyone. Instead of raising their flags and imposing Islamic law, they passed control to a civilian council and gave it a budget to pay salaries, import fuel

and hire teams to clean up garbage. The fighters receded into the background, maintaining only a single police station to arbitrate disputes. Al Qaeda’s takeover of Yemen’s fifth-largest city in April was the most direct indication yet that the group’s most potent regional affiliates are evolving after years of American drone strikes killing their leaders and changing to meet the challenge posed by the Islamic State’s competing and land-grabbing model of jihad. While the image of Al Qaeda has long been one of shadowy operatives plotting international attacks from remote hide-outs, its branches in Yemen and Syria are now increasingly making common cause with local groups on the battlefield. In doing so, they are distancing themselves from one of Osama bin Laden’s central precepts: That fighters should focus on the “far enemy” in the West and not get bogged

down in local insurgencies. In recent weeks, the Qaeda affiliate in Yemen has allied with armed tribes to fight Iranian-backed Houthi rebels, putting that alliance on the same side of the country’s civil war as the United States and Saudi Arabia. In Syria, Qaeda-allied fighters are important members of a rebel coalition against President Bashar al-Assad that includes groups supported by the West. This strategy has clear benefits for a group that has long been near the top of the United States’s list of enemies by allowing it to build local support while providing some cover against the threat of foreign military action. But

despite Al Qaeda’s increased involvement in local battles, American officials say the group remains committed to attacking the West, a goal that could be easier to plot from sanctuaries where it enjoys local support. Cooperating with others could also give Al Qaeda a long-term advantage in its competition with the extremists of the Islamic State, analysts said. Since its public break with Al Qaeda last year, the Islamic State, also known as ISIS or ISIL, has stolen the jihadist limelight by seizing cities in Syria and Iraq and declaring a caliphate in the territory it controls. This has won it the allegiances of other militant cells from Libya to Afghanistan. The Islamic State has insisted that other groups join it or be considered enemies, a tactic that has alienated many in areas it controls. And its public celebration of violence, including the beheading of Western hostages, helped spur the formation of a United States-led military coalition that is bombing the group. Al Qaeda’s branches in Syria and Yemen have taken a different route, building ties with local groups and refraining from the strict application of Shariah, the legal code of Islam, when faced with local resistance, according to residents of areas where Al Qaeda holds sway. When Al Qaeda took over Al Mukalla in April, it seized government buildings and used trucks to cart off more than $120 million from the central bank, according to the bank’s director, Abdul-Qader Foulihan. That sum could not be independently verified. But it soon passed control to a civilian council, giving it a budget of more than $4 million to provide services, an arrangement that made sense to local officials seeking to serve their people during wartime. “We are not Qaeda stooges,” said Abdul-Hakeem bin Mahfood, the council’s secretary general, in a telephone interview. “We formed the council to avoid the destruction of the city.” While the council pays salaries and distributes fuel, Al Qaeda maintains a police station to settle disputes, residents said. It has so far made no effort to ban smoking or regulate how women dress. Nor has it called itself Al Qaeda, instead using the name the Sons of Hadhramaut to emphasize its ties to the surrounding province. One self-described Qaeda member said that the choice of name was deliberate, recalling that after the group seized territory in southern Yemen in 2011, the country’s military had mobilized to push it out with support from the United States. “We were in control for a year and six months, we applied God’s law, we created a small state and the whole world saw it, but they did not leave us alone,” the man said in an interview with a Yemeni television station. “So we came here with the name the Sons of Hadhramaut, but the people here know who we are.”

American officials have long considered the terrorist group’s Yemeni branch, known as Al Qaeda in the Arabian Peninsula, the most dangerous to the West. It has sought to carry out attacks against the United States, and it retains sophisticated bomb-making expertise. Now, Yemen’s civil war has given the group an opportunity to expand, analysts said.

--AT: al-Wuhayshi killedAl-Wuhayshi’s death galvanized AQAPJohnson 6/16/2015 (Bridget; AQAP Confirms Leader Killed, Vows to Make U.S. ‘Taste the Bitterness of Defeat’; pjmedia.com/tatler/2015/06/16/aqap-confirms-leader-killed-vows-to-make-u-s-taste-the-bitterness-of-defeat/; kdf)

Al-Qaeda in the Arabian Peninsula confirmed in a statement released through its media arm, Al-Malahem, that leader Nasir al-Wuhayshi was killed in an American airstrike in Yemen. “We in al-Qaeda in the Arabian Peninsula mourn to our Muslim nation … that Abu Baseer Nasser bin Abdul Karim al-Wuhayshi, God rest his soul, passed away in an American strike which targeted him along with two of his mujahideen brothers,

may God rest their souls,” Khaled Batarfi, a senior member of the group, read in the group’s nearly 10-minute statement. “Let it be known to the enemies of God that their battle is not only with one person or figure, no matter how important ,”

Batarfi stressed. “To the infidel America: God has kept alive those who will trouble your life and make you taste the bitterness of defeat.” AQAP’s commander of military operations, Qassim al-Raimi, has moved into the top spot.

Al Qaeda Gets NukesAl-Qaeda’s regrouping across the world – they’re searching for nukesEtzioni 15 [Amitai Etzioni, Director of the Institute for Communitarian Policy Studies at George Washington University, former President of the American Sociological Association, former Professor at Harvard Business School, former Senior Adviser to the White House, “

NSA: National Security vs. Individual Rights,” Intelligence and National Security, Volume 30, Issue 1, Winter 2015, pages 100-136]

Those who hold that terrorism has much subsided can draw on President Obama's statements. The President announced in May 2013 that ‘the core of Al Qaeda in Afghanistan and Pakistan is on the path to defeat. Their remaining operatives spend more time thinking about their own safety than plotting against us’,21 and echoing this sentiment in August when he stated that ‘core Al Qaeda is on its heels, has been decimated’.22 Administration officials have been similarly optimistic regarding the diminished terror threat.23 And he ‘pivoted’ US foreign policy away from a focus on the Middle East in favor of a focus on East Asia.24 However, since then there has been a steady stream of reports that suggest that much remains to be done in facing terrorism, indeed that Al Qaeda is rebuilding its strength and that the pivot to the Far East

may well have been premature. Core Al Qaeda is regrouping under the banner of ‘Al Qaeda in the Arabian Peninsula’ (AQAP).

Ayman al-Zawahiri has taken over Osama bin Laden's vacated position. It has expanded from 200–300 members in 2009 to over 1000 today.25 This group was behind the ‘ most specific and credible threat ’ since the attacks on 9/11, which led to the

closure of dozens of American embassies across the Middle East.26 And it managed to capture and control significant territory in Yemen .27 Al Qaeda affiliates are growing in strength and spreading into additional nations.28 Al Qaeda increasingly is relying on a decentralized network of collaborating terrorist affiliates.29

Affiliates include groups in Africa (a network that spans Algeria, Mali, Niger, Mauritania, and Libya),30 the Caucasus, Syria, and Somalia.31 Taken together, ‘Al Qaeda franchises and fellow travelers now control more territory and can call

on more fighters, than at any time since Osama bin Laden created the organization 25 years ago’.32 Al Qaeda in Iraq has recently started a bombing campaign that killed over 1000 people. The group has transformed Iraq into a staging point for incursions into the Syrian civil war.33 At the same time, Syria is turning into a haven and breeding ground for terrorists: ‘an even more powerful variant of what Afghanistan was more than 30 years ago’.34 It is estimated that there are as many as 17,000 foreign fighters in the country, most from Saudi Arabia and Tunisia.35 Western

intelligence officials worry that Syria is ‘developing into one of the biggest terrorist threats in the world today.’36 Al Qaeda and its subsidiaries have shown that they are agile and able to adapt as revealed in their use of ink cartridges as a bomb and ‘implanted’ explosives undetectable by airport scanners. Finally, terrorists have been trying to get nuclear weapons. Both Russia and Pakistan have less-than-fully-secured nuclear arms within their borders,37 and Pakistan has experienced at least six serious terrorist attempts to penetrate its nuclear facilities.38

Impact - ISIS

Uniqueness: ISIS in the USISIS has infiltrated the US -- only strong surveillance can prevent escalation Perez and Prokupecz May 30 (Evan and Shimon; FBI struggling with surge in homegrown terror cases; www.cnn.com/2015/05/28/politics/fbi-isis-local-law-enforcement/; kdf)

The New York Police Department and other law enforcement agencies around the nation are increasing their surveillance of ISIS supporters in the U.S., in part to aid the FBI which is struggling to keep up with a surge in the number of

possible terror suspects, according to law enforcement officials. The change is part of the fallout from the terrorist attack in Garland,

Texas earlier this month. The FBI says two ISIS supporters attempted a gun attack on a Prophet Mohammad cartoon contest but were killed by police. One of the attackers, Elton Simpson, was already under investigation by the FBI but

managed to elude surveillance to attempt the foiled attack. FBI Director James Comey told a group of police officials around the country in a secure conference call this month that the FBI needs help to keep tabs on hundreds of suspects. As a result, some police agencies are adding surveillance teams to help the FBI monitor suspects . Teams of NYPD officers trained in surveillance are now helping the FBI's surveillance teams to better keep track of suspects, law enforcement officials say. Why ISIS is winning, and how to stop it NYPD Commissioner William Bratton has said he wants to add 450 officers to the force's counterterrorism unit, partly to counter the increasing domestic threat posed by ISIS sympathizers. The same is happening with other police departments around the country. The Los Angeles Police Department's counterterrorism unit is also beefing up its surveillance squads at the request of the FBI, law enforcement officials say. Comey said at an unrelated news conference Wednesday that he has less confidence now that

the FBI can keep up with the task. "It's an extraordinarily difficult challenge task to find -- that's the first challenge -- and then assess those who may be on a journey from talking to doing and to find and assess in an environment where increasingly, as the attorney general said, their communications are unavailable to us even with court orders," Comey said. "They're on encrypted platforms, so it is an incredibly difficult task that we are enlisting all of our state, local and federal partners in and we're working on it every single day, but I can't stand here with any high confidence when I confront the world that is increasingly dark to me and tell you that I've got it all covered," he said. "We are working very, very hard on it but it is an enormous task." On Saturday, an FBI spokesman said the bureau doesn't have a shortage of resources and the Garland attack wasn't the result of lack of surveillance personnel. If agents had any indication that Simpson was moving toward an attack, they would have done everything to stop it, the spokesman said. The appeal for local help isn't intended to seek more surveillance, but more broadly to encourage local law enforcement to increase vigilance given the heightened threat, the FBI said. The Garland attack prompted a reassessment for FBI officials. Simpson's social media and other communications with known ISIS recruiters drew the FBI's interest earlier this year. The Americans linked to ISIS FBI agents in Phoenix began regular surveillance of Simpson, though it was not round-the-clock monitoring, according to a U.S. official. The agents watching Simpson

noticed he disappeared for a few days. Investigators looked into his communications and found social media postings making reference to the Garland cartoon contest. That discovery is what prompted the FBI to send a bulletin to the joint terrorism task force that was monitoring the Garland event. The bulletin arrived about three hours before the attack. Comey told reporters this month the FBI had no idea Simpson planned to attack the event or even that he had traveled from his home in Phoenix to Texas.

Uniqueness: ISIS coming ISIS is growing in power – all tools are necessary to mitigate their strengthRojas June 19, 2015 (Nicole; US State Department: Isis knocks off al-Qaeda as leading terrorist oganisation; www.ibtimes.co.uk/us-state-department-isis-knocks-off-al-qaeda-leading-terrorist-oganisation-1507091; kdf)

The Country Reports on Terrorism by the US State Department, released on 19 June, reveals Isis has beaten al-Qaeda as the world's leading terrorist organisation. The new report found that the Islamic State in the Middle East, as well as its partner Boko Haram in Africa, has led to the decline of al-Qaeda's power. It reported that al-Qaeda leadership "appeared to lose momentum as the self-

styled leader of a global movement in the face of Isil's [Isis] rapid expansion." However, the report noted that al-Qaeda continued to have an impact on terrorism. "Though AQ central leadership was weakened, the organisation continued to serve as a focal point of 'inspiration' for a worldwide network of affiliated groups, including al-Qa'ida in the Arabian Peninsula—a long-standing threat to Yemen, the region, and the United States; al-Qa'ida in the Islamic Maghreb; a;-Nusrah Front; and al-Shabaab," the

report said. The report also found that nearly 33,000 people were killed and another 34,700 were injured in about 13,500 terrorist attacks around the world last year. According to NBC News, that equates to a 35% increase in terrorist attacks and an 81% rise in fatalities since 2013. CNN reported that 24 Americans died last year in terrorist attacks, specifically in Afghanistan, Jerusalem and Somalia. The attacks, which were dominate in Iraq, Pakistan, Afghanistan, India, Nigeria and Syria, happened in 95 countries

total. More aggressive and ruthless attacks Terrorist groups were conducting more aggressive attacks, which included "ruthless methods of violence such as beheadings and crucifixions intended to terrify opponents". Isis and Boko Haram also employed tactics such as "stoning, indiscriminate mass casualty attacks, and kidnapping children for enslavement".

Threats real – attacks on the homeland ISIS is unique – intercepting communication early is key to prevent attacks in the US Temple-Raston 2015 (Dina; For Next President, the fight against extremism will hit closer to home; May 27; wlrn.org/post/next-president-fight-against-extremism-will-hit-closer-home; kdf)

This week, the FBI arrested a 20-year-old Texas man named Asher Abid Khan on allegations that he intended to join the self-proclaimed Islamic

State. He joins more than 60 young American men and women who have been lured to Syria by the group, also

known as ISIS. What makes Khan's case a little different, though, is the way in which he was arrested by authorities. He had been in Australia and then traveled to Turkey and was about to cross into Syria when his parents sent him a frantic message. They claimed his mother was in the hospital and was desperate to see him. The ruse worked. He left Turkey, flew to Texas and was finally arrested Tuesday, nearly a year after his return. It is unclear whether his parents' participation in convincing him to come home will have some bearing on any eventual sentence — he has been charged with material support to a terrorist organization and faces up to 15 years in prison. Khan's case is important because it is an indication of the creativity law enforcement officials are starting to employ to stem the flow of American Muslims to ISIS; and it foreshadows

the scope of the problem facing the next president from his or her first day in office. In the past two years, nearly 200 Americans have either tried to travel to Syria and were stopped, are actively considering going, or have actually made it to the ISIS battlefields there. Al-Qaida has never had that kind of attraction and appeal in the U.S. The threat of prison clearly isn't solving the problem. So law enforcement officials are starting to entertain alternatives, and that means the next president will likely have to do so as well. The one thing everyone seems to agree with in regard to ISIS is that it is fundamentally different from al-Qaida. Its leader, Abu Bakr al-Baghdadi, sees himself as a religious figure, a descendant of the prophet who has been chosen to create a homeland, or caliphate, for the world's Muslims. Osama bin Laden, the founder of al-Qaida, fancied himself a warrior, locking horns with the West. A caliphate, he said, could come later. Similarly, ISIS' goals — at least at this point — are different. While bin Laden and his successor Ayman al-Zawahiri are focused on

attacking the U.S.; ISIS is endlessly creative in trying to get young men and women to leave home to create a state in Syria and Iraq. If you don't want to fight, its recruitment videos say, not to worry, you can be a plumber or an electrician or a traffic cop in the new caliphate. ISIS doesn't lure young men and women from around the world with the long audio diatribes bin Laden and al-Zawahiri have always favored, instead the group has been more creative. For example, it re-created its own version of the popular video game Grand Theft Auto. Download the game and you can shoot up

Syrian troops, or local police, and get a dose of ISIS propaganda at the same time. "I don't think al-Qaida ever had that kind of talent," says Tony Sgro, the CEO of a San Francisco company called EdVenture Partners which, among other things, markets to exactly the kind of people who are attracted by ISIS' sales pitch. "I personally don't remember them being such a world-class employment, branding and recruiting agency. But ISIL is."

ISIS is a threat – surveillance is uniquely key in preventing an attack Bidgood and Phillips 6/3 (Jess and Dave; Boston Terror Suspect's Shooting Highlights Concerns over reach of ISIS; www.nytimes.com/2015/06/04/us/usaama-rahim-boston-terrorism-suspect-planned-beheading-authorities-say.html?partner=rss&emc=rss; kdf)

BOSTON — Investigators had been watching Usaamah Abdullah Rahim long enough to know about his avid interest in Islamic State militants, but when they overheard him talking on a cellphone about beheading Massachusetts police officers, they moved in, leading to a confrontation Tuesday morning outside a pharmacy here that left Mr. Rahim dead and once again raised alarms about the influence of foreign extremists on homegrown radicals. The shooting occurred in the fairly quiet neighborhood of Roslindale on a routine weekday morning, when officials said an F.B.I. agent and a Boston police officer fired on

Mr. Rahim after he threatened them with a knife. The shooting quickly and suddenly revealed what officials described as a lengthy terrorism investigation, with several law enforcement agencies looking into a suspected murder plot that involved at least two other people, including a relative of Mr. Rahim’s who was charged Wednesday with conspiracy. The knife confiscated from Usaama Rahim.Officers Kill Suspect Who Wielded Knife in Boston Here in a city that had just finished with the trial of Dzhokhar Tsarnaev, who was sentenced to death a few weeks ago for his role in the 2013 Boston Marathon bombings, the episode prompted another round of outrage and scrutiny. Coming just a month after two Muslim men with ties to the Islamic State were shot and killed while trying to attack an anti-Islamic gathering in Garland, Tex., the case has also renewed concerns in Washington about the long reach of the Islamic State and other radical groups

that have seized on Internet recruitment. “These cases are a reminder of the dangers posed by individuals radicalized through social media,” said the chairman of the House Homeland Security Committee, Representative Michael McCaul,

Republican of Texas, at a hearing on Wednesday. He added that Mr. Rahim had been under investigation because he was “communicating with and spreading ISIS propaganda online.”

Impact: ISISISIS will get nuclear and chemical weaponsCirincione 2014 (Joe [president of Ploughshares Fund, a global security foundation]; ISIS will be in position to get nuclear weapons if allowed to consolidate power, resources, says expert; www.nydailynews.com/news/world/isis-nukes-allowed-consolidate-expert-article-1.1958855; kdf)

The risk of a terrorist attack using nuclear or chemical weapons has just gone up . ISIS is willing to kill large numbers of innocents, and it has added three capabilities that catapult the threat beyond anything seen before: control of large, urban

territories, huge amounts of cash, and a global network of recruits. British Home Secretary Theresa May warned that if ISIS consolidates its control over the land it occupies, “We will see the world’s first truly terrorist state” with “the space to plot attacks against us.” Its seizure of banks and oil fields gave it more than $2 billion in assets. If ISIS could make the right connection to corrupt officials in Russia or Pakistan, the group might be able to buy enough highly enriched uranium (about 50 pounds) and the technical help to build a crude nuclear device. Militants recruited from Europe or America could help smuggle it into their home nations. Or ISIS could try to build a “dirty bomb,” conventional explosives like dynamite laced with highly radioactive materials. The blast would not kill

many directly, but it would force the evacuation of tens of square blocks contaminated with radioactive particles. The terror and economic consequences of a bomb detonated in the financial districts of London or New York would be enormous. ISIS could also try to get chemical weapons, such as deadly nerve gases or mustard gas. Fortunately, the most likely source of these terror weapons was just eliminated. The Obama administration struck a deal with Syrian President Bashar Assad that has now destroyed the 1,300 tons of chemical bombs Assad built. Without this deal, ISIS would likely already have these weapons. There are two good answers to these threats. First, drain the swamp: Secure or eliminate the materials ISIS would need to build terror bombs. Second, deter any attack by making sure ISIS knows our retribution would be swift, certain and devastating.

Impact - Cyber-attacks

Uniqueness: Cyber-attack A massive Iranian cyber-attack is comingKagan and Stiansen 2015 (Frederick [Director of AEI’s Critical Threats Project and a former professor of military history at the U.S. Military Academy at West Point] and Tommy [Chief techonology officer of Norse]; The Growing Cyberthreat from Iran; www.aei.org/publication/growing-cyberthreat-from-iran/

I ran is emerging as a significant cyberthreat to the US and its allies. The size and sophistication of the nation’s hacking capabilities have grown markedly over the last few years, and Iran has already penetrated well-defended networks in the US and Saudi Arabia and seized and destroyed sensitive data. The lifting of economic sanctions as a result of the recently announced framework for a nuclear deal

with Iran will dramatically increase the resources Iran can put toward expanding its cyberattack infrastructure. We must anticipate that the Iranian cyberthreat may well begin to grow much more rapidly. Yet we must also avoid overreacting to this threat, which is not yet unmanageable. The first requirement of developing a sound response is understanding the nature of the problem, which is the aim of this report. Pistachio Harvest is a collaborative project between Norse Corporation and the Critical Threats Project at the American Enterprise Institute to describe Iran’s footprint in cyberspace and identify important trends in Iranian cyberattacks. It draws on data from the Norse Intelligence Network, which consists of several million advanced sensors distributed around the globe. A sensor is basically a computer emulation designed to look like an actual website, email login portal, or some other kind of Internet-based system for a bank, university, power plant, electrical switching station, or other public or private computer systems that might interest a hacker. Sensors are designed to appear poorly secured, including known and zero-day vulnerabilities to lure hackers into trying to break into them. The odds of accidentally connecting to a Norse sensor are low. They do not belong to real companies or show up on search engines. Data from Norse systems combined with open-source information collected by the analysts of the Critical Threats Project have allowed us to see and outline for

the first time the real nature and extent of the Iranian cyberthreat. A particular challenge is that the Islamic Republic has two sets of information technology infrastructure— the one it is building in Iran and the one it is renting and buying in the West. Both are attacking the computer systems of America and its allies , and both are influenced to different degrees by the regime and its security services. We cannot think of the Iranian cyberfootprint as confined to Iranian soil.

That fact creates great dangers for the West, but also offers opportunities. Iranian companies, including some under international sanctions and some affiliated with the Islamic Revolutionary Guard Corps (IRGC) and global terrorist organizations like Hezbollah, are hosting websites, mail servers, and other IT systems in the United States, Canada, Germany, the United Kingdom, and elsewhere. Simply by registering and paying a fee, Iranian security services and ordinary citizens can gain access to advanced computer systems and software that the West has been trying to prevent them from getting at all. The bad news is that they are getting them anyway, and in one of the most efficient ways possible—by renting what they need from us without having to go to the trouble of building or stealing it themselves.

xt-Iran funds terror Iran is massively invested in terror plots – surveillance is critical to monitor the spread Lee and Klapper June 19, 2015 (Matthew and Bradley; US report finds Iran threat undiminished as nuke deadline nears; global terror killings soar; www.usnews.com/news/politics/articles/2015/06/19/us-35-percent-spike-in-global-terror-attacks-in-2014; kdf)

WASHINGTON (AP) — Iran's support for international terrorist groups remained undiminished last year and even

expanded in some respects, the Obama administration said Friday, less than two weeks before the deadline for completing a nuclear deal

that could provide Tehran with billions of dollars in relief from economic sanctions. The assessment offered a worrying sign of even worse terror-related violence to come after a year in which extremists in the Middle East, Africa and Asia committed 35 percent more terrorist acts, killed nearly twice as many people and almost tripled the number of kidnappings worldwide. Statistics released by the State Department on Friday also pointed to a tenfold surge in the most lethal kinds of attacks. Yet even as the Islamic State and the Taliban were blamed for most of the death and destruction in

2014, the department's annual terrorism report underscored the ongoing threat posed by Iran and its proxies across the Islamic world and beyond. Tehran increased its assistance to Shiite militias fighting in Iraq and continued its long-standing military, intelligence and financial aid to Lebanon's Hezbollah, Syrian President Bashar Assad's embattled government and Palestinian groups Hamas and Islamic Jihad. While the 388-page study said Iran has lived up to interim nuclear deals with world powers thus far, it gave no prediction about how an Iran flush with cash from a final agreement would behave. World powers and Iran are trying to conclude an accord by the end of the month, setting 15 years of restrictions on Iran's nuclear program in exchange for significant relief from the international sanctions that have crippled the Iranian economy. The negotiations don't involve Iran's support for militant groups beyond its border. But Israel and the Sunni monarchies of the Persian Gulf, Iran's regional rivals, fear a fresh wave of terrorism as a result of any pact.

President Barack Obama, hoping to ease their fears, has said most of the money would go to Iran's economic development. America's "grave concern about Iran's support for terrorism remains unabated," White House spokesman Eric Shultz said.

"That is all the more reason that we need to make sure they don't obtain a nuclear weapon ." In total last year, nearly 33,000 people were killed in almost 13,500 terrorist attacks around the world, according to the figures that were compiled for the State Department by the National Consortium for the Study of Terrorism and Responses to Terrorism at the University of Maryland. That's up from just over 18,000 deaths in nearly 10,000 attacks in 2013. Twenty-four Americans were killed by extremists in 2014, the report said. And abductions soared to 9,428 in the calendar year from 3,137 in 2013. The report attributes the rise in attacks to increased terror activity in Iraq, Afghanistan and Nigeria and the sharp spike in deaths to a growth in exceptionally lethal attacks in those countries and elsewhere. There were 20 attacks that killed more than 100 people each in 2014, compared to just two a year earlier, the report said. Among those were December's attack by the Pakistani Taliban on a school in Peshawar that killed at least 150 people and the June attack by Islamic State militants on a prison in Mosul, Iraq, in which 670 Shiite prisoners died. At the end of 2014, the prison attack was the deadliest terrorist operation in the world since

Sept. 11, 2001, according to the report. Despite all indications pointing toward increased violence, the State Department's counterterrorism coordinator said the numbers didn't reflect improvements by the U.S . and its partners in stamping out terrorism financing, improving information sharing , impeding foreign fighters and forming a coalition to fight the Islamic State . "We have made progress," Ambassador Tina Kaidanow said.

Impact: CybercrimeCybercrime poses the most probable existential threat Paikowsky and Baram 2015 (Deganit [post-doctoral fellow at the Davis Institute for International Relations at Hebrew University in Jerusalem and a senior researcher at the Yuval Nee’man Workshop for Science, Technology, and Security at Tel-Aviv University, also a research associate at the Space Policy Institute at George Washington University and a consultant to the space committee of Israel’s National Council for Research and Development] and Gil [Ph.D. candidate in the department of political science at Tel-Aviv University, and a researcher at the Yuval Nee’man workshop for Science, Technology, and Security at Tel-Aviv University]; Space Wars; Jan 7; www.foreignaffairs.com/articles/142690/deganit-paikowsky-and-gil-baram/space-wars?cid=rss-rss_xml-space_wars-000000; kdf)

I n September 2014, hackers from China broke int o the U.S. National Oceanic and Atmospheric Administration (NOAA) network in an attempt to disrupt data related to disaster planning, aviation, and much mor e coming from U.S. satellites. Thi s breach was the latest in a series of cyberattacks on space systems, exposing the Achilles’ heel of such technology: the vulnerability of its computers and

the information it creates and transmits. Cyberattacks , which are on the rise in every industry, pose particularly significant threats to space systems a s they are used so ubiquitously in corporate and military operations, making them increasingly attractive targets for hackers. Although only

about a dozen countries have the capability to launch a satellite into space, billions of people around the world rely on space systems for nearly every aspect of modern life. Satellites are used to support phones, the Internet, and banking systems. They are also used to monitor land, air, and maritime traffic; facilitate global communication s; transmit mass media in real time;

monitor the earth for climate change or severe weather threats and natural disasters; gather intelligence; and send early warnings of incoming ballistic missiles. It is no wonder, then, that the global economy depends on communication satellites , navigation systems, and earth-observation satellites. The backbone of all these services consists of 1,200 operational satellites currently orbiting the earth, which have the potential to cause significant tangible damage by attacking national or global space systems across countries and continents. Even a small glitch can wreak havoc. For example, in April 2014, the Glonass System, the Russian equivalent of the American-designed GPS, malfunctioned due to two small mathematical mistakes in the software. Significantly, fixing the system took more than 13 hours, and the half-day breakdown led to severe disruption of Glonass

receivers, which affected iPhone5 users. While the disruption was not caused by ambitious hackers, it is easy to see why space systems are the brass ring of cybercrimes: They are low effort and high return . Therefore, a relatively simple hack can inflict considerable damage. It is easy to see why space systems are the brass ring of cybercrimes: They are low effort and high return. Therefore, a relatively simple hack can inflict considerable damage. EASY PREY Although a space system is composed of three connected segments—satellites and spacecraft that orbit the earth, ground stations, and the communication systems that link the two—cybercriminals only need to find the vulnerabilities in one of these segments. For example, for a few hundred dollars, a hacker can buy a small jamming device on the Internet to interfere with satellite signals. “We have to make it (satellite navigation systems) more robust,” warned Colonel Bradford Parkinson, who led the creation of the GPS. “Our cellphone towers are timed with GPS. If they lose that

time, they lose sync and pretty soon they don’t operate. Our power grid is synchronized with GPS [and] so is our banking system.” Space systems have become the target of hacking. In July of last year, the United States identified a 28-year-old British citizen who hacked a number of government networks, including NASA. He attempted to grab highly sensitive data and claimed he would “do some hilarious stuff with it.” Four months later, in November 2013, viruses infected the computers used by the International Space Station. Japan’s space agency also discovered a computer virus inside a few of its computers in January 2012 and Germany’s space center recently suffered an espionage attack, with several of its computers getting hit with spyware. Since 2009, the BBC has complained of disruptions to its Persian-language radio and television programs and has accused Tehran of interfering with international satellite broadcasts beamed into Iran. Only after the EU made a diplomatic complaint to pressure Iran to cease and desist did the attacks stop. When North Korea jammed South Korea’s GPS signals in May 2012, it affected the navigation of over 250 flights. The list goes on. One of the reasons space systems, especially commercial ones, are such easy prey is that they often operate with outdated software. Developing a space system is generally a long process that, depending on the complexity of the system, takes several years to complete. And once the system is operational, it is expected to last for at least several years—sometimes even more than a decade. This process makes it difficult to update the system’s security software. Moreover, in many cases, the information systems that are being used to manage space systems are mostly based on commercial “off-the-shelf” products, with known vulnerabilities and low levels of protection, especially compared to supposedly better-protected military systems. In 2014, a number of think-tanks, from the Council on Foreign Relations to London-based Chatham House, as well as the information-security firm IOActive, sounded the alarm on how vulnerable space systems are to cyberattacks. These reports warned of the ease with which backdoors in software—an undetected remote access to a computer—can be exploited, and of the prevalence of unsecured software, non-protected protocols, and unencrypted channels. One of the studies’ recommendations was to immediately remove software updates from the public websites of various companies that provide satellite

services and equipment, in order to prevent hackers from reverse-engineering the source code. However, despite these warnings, the space industry is barely aware of these risks and its responses are slow. Herein lies a challenge: to produce and put into practice standards and

regulations regarding multinational and commercial activities in space technology and exploration. MOVING FORWARD In the past year, several space-faring nations have begun to tackle the issue. Three months ago, the U.S. Air Force announced that it hopes to develop technologies that would prevent hackers from jamming its satellites. Russia intends to significantly update the robustness and security of its military and government satellite communication system by 2025. Despite these positive steps, national governments and international bodies have more ground to cover. First, governments need to increase their efforts to raise awareness regarding the growing threat of cyberattacks against both government and commercial space systems. Second, in order to provide better protection, governments

and corporations should take a holistic rather than piecemeal approach regarding the protection of all segments of their systems, and work toward solutions that will ensure the performance of the systems and their services, rather than protecting a specific asset. For example, satellites are and will continue to be damaged by cyberattacks; but the ability of an entire system to operate smoothly and recover rapidly is more crucial than the security and safety of a single satellite. Third, military, civil, and commercial actors should engage in more dialogue in order to strengthen overall protection. They can do so by sharing information and working jointly toward better standards and regulations. Fourth, governments and international bodies should try to standardize protocols for protecting space systems. For example, when NOAA was breached in September, the Inspector General for the Commerce Department, which oversees the network, had just criticized it for an array of “high-risk vulnerabilities” in the security of its satellite information and weather service systems. It took nearly a month for NOAA to admit it had been hacked. Hiding such information hampers meaningful and timely discussion about the issue and delays the development of preventive measures. Enforcing a standard protocol could help alleviate this problem. And finally, protecting space systems must be an international effort. Space-faring nations should work together

to achieve international cooperation on all of the areas mentioned above: raising awareness, sharing information, and developing much-needed standards. The potential for colossal damage and the relative ease of launching a cyberattack on space systems make them tantalizing target s for cybercriminals . The threat is already at our doorstep, and it will only get bigger. It is time for the international space community to muster the political will to rise to this growing challenge.

xt-- Cyber attacks escalate Cyber war escalatesTilford 12 (27 July 2012, Robert, Writer for The Examiner, http://www.examiner.com/article/cyber-attackers-could-easily-shut-down-the-electric-grid-for-the-entire-east-coa)

“Cyber attackers could all too easily shut down the electric grid for the entire east coast, the west coast, and the middle part of our country”, said Senator Grassley on July 26, 2012. “ Any one attack could leave dozens of major cities and tens of millions of Americans without power. We know, because we were shown in a room here in the Capitol, how an attack could take place and what damage it would do, so we know this is not just make believe”, he said. So

what would a cyber attack look like anyway? The Senator explained: “Without ATMs or debit card readers, commerce would immediately grind to a halt . My daughter, who lives here in the DC area, lost power when the storm hit. They waited for a number of hours, and then they took all the food out of their freezer, they gave away what they could, and they threw the rest away. And that was the way it was all over. Their power was out for about a week, and it made it very difficult. They are fortunate enough to have a basement,

and the heat wasn’t oppressive down there. Without refrigeration, food would rot on the shelves, the freezers would have to be emptied, and people could actually go hungry. Without gas pumps, transportation arteries would clog with abandoned vehicles. Without cell phones or computers, whole regions of the country would be cut off from communication and families would be unable to reach each other. Without air conditioning and without lifesaving technology and the service of hospitals and nursing homes, the elderly and sick would become much sicker and die. Most major hospitals have backup power, but it is only for a limited amount of time. It depends on how much fuel they can store, and that is very limited”, Senator

Grassley said. The devastation that the Senator describes is truly unimaginable. To make matters worse a cyber attack that can take out a civilian power grid, for example could also cripple harm the U.S. military . The senator notes that is that the same power grids that supply cities and towns, stores and gas stations, cell towers and heart monitors also power “ every military base in our country.” “Although bases would be prepared to weather a short power outage with backup diesel generators, within hours, not days, fuel supplies would run out”, he said. Which means military command and control centers could go dark. Radar systems that detect air threats to our country would shut Down completely. “Communication between commanders and their troops would also go silent. And many

weapons systems would be left without either fuel or electric power”, said Senator Grassley. “So in a few short hours or days, the mightiest military in the world would be left scrambling to maintain base functions”, he said. We contacted

the Pentagon and officials confirmed the threat of a cyber attack is something very real . Top national security officials—including the Chairman of the Joint Chiefs, the Director of the National Security Agency, the Secretary of Defense, and the CIA Director— have said, “preventing a cyber attack and improving the nation’s

electric grids is among the most urgent priorities of our country ” (source: Congressional Record). So how serious is the Pentagon taking all this? Enough to start , or end a war over it , for sure (see video: Pentagon declares war on

cyber attacks http://www.youtube.com/watch?v=_kVQrp_D0kY&feature=relmfu ). A cyber attack today against the US could very well

be seen as an “Act of War” and could be met with a “ full scale” US military response . That could include the use of “ nuclear weapons ”, if authorized by the President.

--AT: No Cyber TerrorLeading security firms prove – cyber terror threats are areal and ramping up Sanger and Perlroth 2015 (David E Sanger and Nicole; Iran is raising sophistication and frequency of cyberattacks, study says; Apr 15; www.nytimes.com/2015/04/16/world/middleeast/iran-is-raising-sophistication-and-frequency-of-cyberattacks-study-says.html?ref=topics; kdf)

WASHINGTON — In February, a year after the Las Vegas Sands was hit by a devastating cyberattack that ruined many of the computers running

its casino and hotel operations, the director of national intelligence, James R. Clapper Jr., publicly told Congress what seemed obvious: Iranian hackers were behind the attack. Sheldon G. Adelson, the billionaire chief executive of Sands, who is a major supporter of Israel and an ardent opponent of negotiating with Tehran, had suggested an approach to the Iran problem a few months before the attack that no public figure had ever uttered in front of cameras. “What I would say is: ‘Listen. You see that desert out there? I want to show you something,’ ” Mr. Adelson said at Yeshiva University in Manhattan in October 2013. He then argued for detonating an American nuclear weapon where it would not “hurt a soul,” except “rattlesnakes and scorpions or whatever,” before adding, “Then you say, ‘See, the next one is

in the middle of Tehran.’ ” Instead, Tehran directed an attack at the desert of Nevada. Now a new study of Iran’s cyberactivities, to be released by Norse, a cybersecurity firm, and the American Enterprise Institute, concludes that beyond the Sands attack, Iran has greatly increased the frequency and skill of its cyberattacks, even while negotiating with

world powers over limits on its nuclear capabilities. “Cyber gives them a usable weapon, in ways nuclear technology does not,” said Frederick W. Kagan, who directs the institute’s Critical Threats Project and is beginning a larger effort to track Iranian cyberactivity. “And it has a degree of plausible deniability that is attractive to many countries.” Mr. Kagan argues that if sanctions against Iran are suspended under the proposed nuclear accord, Iran will be able to devote the revenue from improved oil exports to cyberweapons. But it is far from clear that that is what Iran would do. When Mr. Clapper named Iran in the Sands attack, it was one of the few instances in which American intelligence agencies had identified a specific country that it believed was using such attacks for political purposes. The first came in December, when

President Obama accused North Korea of launching a cyberattack on Sony Pictures. Other United States officials have said that Iran attacked American banks in retaliation for sanctions and that it destroyed computers at the oil giant Saudi Aramco in retaliation for the close Saudi ties with the United States. The evidence from the Norse report, along with analyses by American intelligence agencies, strongly suggests that Iran has made much greater use of cyberweapons over the past year, despite international sanctions. The attacks have mostly involved espionage, but a few, like the Sands attack, have been for destructive purposes. In the report, to be released Friday, Norse — which, like other cybersecurity firms, has an interest in portraying a world of cyberthreats but presumably little incentive in linking them to any particular country — traced thousands of attacks against American targets to hackers inside Iran. The report, and a similar one from Cylance, another cybersecurity firm, make clear that Iranian hackers are moving from ostentatious cyberattacks in which they deface websites or simply knock them offline to much quieter reconnaissance. In some cases, they appear to be probing for critical infrastructure systems that could provide opportunities for more dangerous and destructive attacks. But Norse and Cylance differ on the question of whether the Iranian attacks have accelerated in recent months, or whether Tehran may be pulling back during a critical point in the nuclear negotiations. Norse, which says it maintains thousands of sensors across the Internet to collect intelligence on attackers’ methods, insists that Iranian hackers have shown no signs of letting up. Between January 2014 and last month, the Norse report said, its sensors picked up a 115 percent increase in attacks launched from Iranian Internet protocol, or I.P., addresses. Norse said that its sensors had detected more than 900 attacks, on average, every day in the first half of March. Cylance came to a different conclusion, at least for Iran’s activities in the past few months, as negotiations have come to a head. Stuart McClure, the chief executive and founder of Cylance, which has been tracking Iranian hacking groups, said that there had been a notable drop in activity over the past few months, and that the groups were now largely quiet. American intelligence agencies also monitor the groups, but they do not publicly publish assessments of the activity. Classified National Intelligence Estimates over the past five years have identified Russia and China as the United States’ most sophisticated, and

prolific, adversaries in cyberspace. However, American officials have said that Iran and North Korea concern them the most, not for their sophistication, but because their attacks are aimed more at destruction, as was the case with the attack on Sony Pictures. In addition to the Sands attack last year — about which Mr. Clapper gave no detail in public — Iran has been identified as the source of the 2012 attack on Saudi Aramco, in which hackers wiped out data on 30,000 computers, replacing it with an image of a burning American flag.

Impact - Nuclear Terror

Impact: Nuclear Terror A nuclear terror attack would kill billions, collapse the global economy, and cause escalationSchwartz 2015 (Benjamin [Worked at the Departments of State, Defense and Energy]; Right of Boom: The Aftermath of Nuclear Terrorism; The Overlook Press; p. 1-2; kdf)

IN AN OTHERWISE CALM AND UNEVENTFUL MORNING, A small nuclear weapon explodes in downtown Washington, DC. The

device generates a yield of fifteen kilotons, roughly the same force unleashed by the bomb Little Boy over Hiroshima. The casualty count rises to over a hundred thousand, and the destruction is measured in hundreds of billions of dollars. The

blast's electromagnetic pulse burns out electrical components across the metropolitan area. Radiation leaves the center of the city uninhabitable for the first time since it was declared America's capital in 1790, and the scientific community

predicts that it will remain so for a decade. The stock market plunges as investors anticipate draconian customs regimes that will choke global trade. Fear of further attacks paralyzes America and much of the Western world. Hours after the explosion, a little unkown terrorist group claims responsibility. It is the first time the president, who was not in Washington at the time of the blast, and his surviving cabinet members, including the director of national intelligence, have heard of the group. After searching intelligence databases, analysts report that the group is linked to three hostile governments, all of which have issued statements condemning the attack and denying involvement. It will take weeks for the remnants of the US intelligence community to assess that one of these three governments

is probably lying, but even then the US government won't have irrefutable evidence of complicity. Unlike a ballistic missile or bomb

delivered by enemy land-, air-, or seacraft, the origin of what analysts will call a "container-based improvised nuclear device" is difficult to determine and impossible to prove. Nuclear forensics will ultimately provide strong evidence that the fissile material used in the device originated from the country under suspicion. Signals intelligence will record celebrations

and praise of the attack by midlevel officials in that country's military and intelligence establishment. However, the intelligence reporting taken as a whole will suggest that negligence within that country's weapons industry and at its nuclear complexes is at least as plausible a scenario as a deliberate transfer by government officials to the terrorist group. Yet there is no conclusive reporting that points to either willful negligence or human error. Either way, there is no way to know if the transfer occurred through official policy, the machinations of a venal or ideologically motivated individual, or simple incompetence. There is almost nothing about the origins of the attack that the president of the United States knows for certain.

Yes Nuclear Terror- PakistanPakistani nukes pose an existential risk – myriad of reasonsSchwartz 2015 (Benjamin [Worked at the Departments of State, Defense and Energy]; Right of Boom: The Aftermath of Nuclear Terrorism; The Overlook Press; p. 66-78; kdf)

The breakup of the Soviet Union presented an entirely unprecedented challenge: the redeployment of thousands of nuclear weapons and the dismantlement of hundreds of nuclear installations. It was this challenge that focused a great deal of attention on the danger of "loose nukes," another of Allison's "Three No's." In 1991, it also spurred Sam Nunn and Richard Lugar to launch the Cooperative Threat Reduction program, which has since provided a half billion dollars each year to improve the safety and security of Russia's unconventional arms. These funds allowed the United States to remove nuclear weapons from Belarus, Kazakhstan and Ukraine and financed the demolition of thousands of Soviet weapons, including missiles, submarines, bombers, and warheads. The Nunn-Lugar CTR program also paid the salaries of tens of thousands of Soviet weapons scientists, engineers, and technicians who were impoverished by the economic crises of the early 1990s and helped discourage them from working for American adversaries and governments of proliferation concern. 20 The growth of CTR efforts corresponded with a significant decline in seizures of illicit highly enriched uranium, partially enriched uranium, and plutonium sales on the black market. Between 1992 and 2002 there were at least eleven cases ofHEU seizures and two plutonium seizures reported to the IAEA. In contrast, only four seizures occurred during nearly a decade between 2002 and 2012, and they were all associated with a single country- Georgia. While correlation certainly doesn't prove causation, these statistics are a strong indication of CTR' s effectiveness and suggest that the

threat of loose Soviet nukes and fissile materials has been largely contained. 21 Unfortunately, the threat of "loose nukes" has shifted rather than declined. Few have had greater access to information on this threat, and experience combating it, than Rolf Mowatt-Larssen. A twenty-three year veteran of the CIA's Clandestine Service, Mowatt-Larssen served multiple tours as a chief of station and rose to the agency's most powerful positions: chief of the European Division, chief of the Weapons of Mass Destruction Department, and chief of the Counterterrorism Center. After the September 11, 2001 attacks George Tenet, the director of the CIA, tapped Mowatt-Larssen to be at the point of the spear in America's response to the threat of nuclear terrorism. Mowatt-Larssen fulfilled this role first within the CIA and then from the basement of the Energy Department's headquarters as the director of its Office of Intelligence and Counterintelligence.22 The centrality of Mowatt-Larssen's efforts is documented, among other places, in Tenet's memoir. After leaving government, Mowatt-Larssen

articulated the problem in no uncertain terms: "The greatest threat of a loose nuke scenario stems from insiders in the nuclear establishment working with outsiders, people seeking a bomb or material to make a bomb.

Nowhere in the world is this threat greater than in Pakistan."23 Pakistan is distinguished by an extraordinary combination of malevolent ingredients. It is the only country ever to have both the founding father of the nation's nuclear weapons program and a lead nuclear weapons scientist independently develop clandestine networks to proliferate atomic weapons for profit. The latter, and better known of the two, Abduel Qadeer Khan, stole uranium enrichment technology while working at a centrifuge manufacturing company in the Nether lands during the 1970s, went on to develop Pakistan's uranium enrichment pathway to the bomb, and then proceeded to go into business for himself His clients included Iran, Libya, and North Korea. This became apparent to the world in dramatic fashion in January 2003 when US agents intercepted a German ship named the BBC China that was transporting a large stash of nuclear weapons components to Libya. Libyan officials later admitted to having reached an agreement with Khan Research Laboratories to provide $100 million in exchange for a "complete store-bought nuclear weapons program."24 Khan also built upon Pakistan's long-standing relationship with North Korea in the field of missile technology to provide that country with dozens of centrifuges.25 As early as 1987, Khan also sold to the Iranians and eventually provided them P-1 centrifuges, schematics of advanced P-2 designs, and hundreds of sensitive nuclear components.26 Despite his public

confession in 2004, Khan remains a hero to the vast majority of Pakistanis, a political reality that compelled

president Pervez Musharraf to pardon Khan for his crimes. Pakistan's other premier proliferator, Bashiruddin Mahmood, is less well known but was also a stalwart of the nuclear program during the 1970s; he occupies the singular position of being the most senior scientist to liaison directly with al-Qaeda. The chief designer and director of Pakistan's Khushab Plutonium Production Reactor, Mahmood retired from government service in 1999 and founded a nongovernmental organization called Umma Tameer-e-Nau (UTN; Reconstruction for the Islamic Community). The leadership of UTN was made up of retired Pakistani nuclear scientists, military officers, engineers, and technicians, including Chaudhry Abdul Majid, who had been a nuclear fuel expert at the Pakistan Institute of Nuclear Science and Technology. In the summer of 2001, Mahmood and Majid traveled to Afghanistan under the cover of the UTN in order to discuss nuclear weapons with mullah Mohammed Omar and Osama bin Laden. According to former director of the Central Intelligence Agency George Tenet, Mahmood was thought of as something of a madman by many of his former colleagues in the Pakistan nuclear establishment. In 1987 he published a book called "Doomsday and Life After Death: the Ultimate Faith of the Universe as Seen by the Holy Quran." It was a disturbing tribute to his skewed view of the role of science

in jihad. The book's basic message from the leader of a group that has offered WMD capabilities to AQ [al-Qaeda] -was that the world would end one day soon in the fire of nuclear holocaust that would usher in judgment day and thus fulfill the prophecies of the Quran ... Mahmood and Majid were detained after a tip from a foreign intelligence service prompted the CIA to inform the Pakistani government of their actions. The two scientists admitted to the meetings, noted that bin Laden was interested in nuclear weapons and that Majid had drawn a rough sketch of an improvised nuclear device for him, but denied that they assisted al-Qaeda. Despite failing several polygraph tests and a statement from Libya's head of intelligence claiming that the

UTN had tried to sell Libya a nuclear bomb, the two scientists were soon released.27 According to Tenet, the United States "knew that UTN enjoyed some measure of support from Pakistani military officers ... notably the former director of Pakistani intelligence service, Gen. Hamid

Gul."28 A second factor that makes the nuclear terrorism threat from Pakistan especially acute is its track record as a sanctuary and a patron of terrorist organizations. Even before Pakistan became a state after the partition of British India, its advocates decided that securing an Islamic polity required an investment in asymmetric proxies. India was destined to have conventional military superiority, so the Muslims of the subcontinent from the start invested in unconventional warfare. From the bloody battles of partition through the present day, the Pakistani military cultivated radicals, which for the first few decades were overwhelmingly Pathans/Pashtuns, but in recent time have come to include Punjabis as well. This isn't a temporary fad; it is an embedded component of

Pakistan's national security system. The ability of Osama bin Laden to enjoy approximately a decade of hospitality just miles from Pakistan's premier military university likely had more to do with the sympathies of a handful of people then official policy, but his presence was entirely consistent with Pakistani support for radical jihadist groups such as Lashkar-e-Jhangvi, Lashkar-e-Taibai, the Haqqani Network, and the Afghan Taliban, among others.29 Third, and likely related,

Pakistani public opinion polls consistently show widespread antipathy toward the United States and sympathy for jihadist organizations. As of June 2012, 75 percent considered the United States "an enemy."30 Significant segments of the public not only hold anti-American views but also subscribe to radical militant ideology that is manifest in violence against Christians, Shi'ites (of which 375 were killed in 2012 alone), symbols of secularism, and even the Pakistani government. The assassination in 2011 of Pakistan's only Christian minister, Shahbaz Bhatti, was indicative of this trend, but even more alarming than the murder was the subsequent outburst of public support for the assassin. Thousands of demonstrators celebrated the "execution," which they claimed was justified by Bhatti's efforts to reform Pakistan's blasphemy laws, which impose the death penalty for insulting Islam. Before former prime minister Benazir Bhutto was murdered in 2007, she expressed a belief that al-Qaeda would march on Islamabad in a matter of years.31 These attitudes are worth bearing in mind in the context of another statistic: the approximately nine thousand civilian scientists, including two thousand who reportedly possess "criticallmowledge" of weapons manufacturing and maintenance who work in Pakistan's nuclear complexes.32 There is arguably no published figure more qualified to comment on Pakistan's nuclear weapons program than Feroz Khan, who served for thirty years in the Pakistani military and occupied senior positions at Pakistan's Strategic Plans Division, the country's nuclear

decision-making and command-and-control apparatus. Regarding the insider threat Khan has said, "Pakistan faces two fundamental challenges in establishing its personnel reliability requirements. First, religious extremism is increasing in Pakistani society as a whole .... Second, because Pakistan does not have sophisticated technological controls over personnel, it has to rely on the rationality and loyalty of individuals . .. . "33 These words don't inspire a great deal of confidence. A fourth development of serious concern is that radical ideology and radical organizations inevitably have spawned radical violence in Pakistan. According to Bruce Reidel, a CIA veteran and former lead Pakistan analyst for the Obama administration, government insiders have facilitated multiple terrorist attacks against the Pakistani state, including suicide bombings at air force bases that house nuclear

weapons storage sites.34 In 2011, Jeffrey Goldberg reported in the Atlantic that at least six facilities widely believed to be associated with Pakistan's nuclear program had already been targeted by militants. The Pakistani military's inability to protect its own assets was demonstrably apparent in early 2011 when it took forces over fifteen hours to regain control of a major Pakistani naval base near Karachi after militants overran it, destroyed two P-3C Orion surveillance planes and killed ten people.35 These events, alongside a variety of other negative economic indicators, led Stephen Cohen, a leading expert on the country, to conclude, "The fundamentals of the state are either failing or questionable, and this applies to both the idea of Pakistan, the ideology of the state, the purpose of the state, and also to the coherence of the state itself. I wouldn't predict a comprehensive failure soon, but clearly that's the direction in which Pakistan is

moving."36 Fifth and most alarming, Pakistan's nuclear arsenal and its nuclear doctrine are undergoing changes that exponentially expand the risk of terrorist acquisition of a nuclear weapon . With respect to sheer size,

Pakistan was on track to displace France as the world's fourth largest nuclear weapons power .37 This is a dangerous development in itself, but is accompanied by even more troubling indications of how those weapons will be managed. Feroz Khan has confirmed these facts, and his access to senior Pakistani officials, including former president Musharraf, lend great credibility to his account of the nuclear security situation in Pakistan. While a Pakistani patriot and strong supporter of the country's nuclear weapons program, Khan's account reveals a number of issues of grave concern from a proliferation perspective. Khan cites two specific events as catalysts that pushed Pakistan to undertake unprecedented risks with respect to its nuclear arsenal. The first was instigated by India on January 25, 2000, when India's defense minister, George Fernandes, formally announced a new doctrine of"limited war under the nuclear umbrella"-a doctrine that would become known as Cold Start. The central idea of the Cold Start doctrine is that India could take conventional military action against Pakistan in a limited manner that would prevent escalation to nuclear war. This would allow India a viable response to Pakistani-sponsored terrorist attacks. Following Lashkar-e-Taibai's attack on the Indian Parliament in December 2001, India demonstrated that this doctrine was more than words by mobilizing 500,000 troops for the first time since the 1971 war. The subsequent ten-month standoff between the two countries convinced the Pakistan military that it needed to up its nuclear ante. In Khan's words, the standoff demonstrated that "Pakistan would lack the resources to begin major mobilizations whenever terrorists attacked India and instead would be forced to rely even more on nuclear deterrence."38 A second catalytic event was the US-led invasion of Afghanistan after 9/11, which placed US military assets in striking distance of Pakistan. As early as the 1960s, Americans had expressed alarm about nuclear security in Pakistan. None other than the famous

Henry De Wolf Smyth of the Smyth Report once stated, "What I am concerned about internationally is power reactors in countries that have unstable governments. The Pakistani reactor, for example, builds up a stockpile of plutonium. Suppose there's a revolution. A totally new and crazy government comes in, and here's the plutonium just sitting there asking to be made into a bomb."39 Islamabad has long been aware of these concerns, and when it conceded to Washington's demand for access to Pakistani airspace to support US military operations in Afghanistan its "decades-long fear of preventive strikes sent it to high alert." India's Cold Start doctrine and the US-led invasion of Afghanistan spurred Pakistan to make changes in its nuclear posture that are entirely rational within a framework that assumes the Indian military to be an existential threat; but these changes are also extremely destabilizing when placed in the context of Pakistan's domestic instability. The first change is a massive expansion of Pakistan's plutonium production capacity. The Pakistan Atomic Energy Commission is constructing three additional heavy water reactors at the same site as its fiftymegawatt Khushab reactor. To reprocess the higher quantities of plutonium, Islamabad is also doubling the capacity of the reprocessing plant at the Pakistan Institute of Nuclear Science and Technology as well as completing a much larger commercial- scale reprocessing facility at Chashma that was abandoned by the French in 1978.411 This is consistent with Pakistan's position with respect to the Fissile Material Cutoff Treaty, which Pakistani diplomats have worked for years to block; these diplomats declare that in order to maintain their country's minimal critical deterrent, Pakistan cannot be expected to accept any cap in fissile material production. Expansion of plutonium production is also reportedly being accompanied by greater HEU enrichment. According to Feroz Khan, the Khan Research Laboratories continue to produce at least one hundred kilograms of HEU annually and are expanding their capability by introducing and installing a new generation of P-3 and P-4 gas centrifuges that have a significantly higher separative work unit. A second

development, which is closely related to the first, is Pakistan's decision to build small tactical nuclear warheads. Plutonium-based nuclear weapons designs, which can require only four to six kilograms of plutonium, allow for substantial miniaturization.41 This trend is consistent with the April20ll test of the HatfXIINASR missile system, which is a rocket launcher capable of being tipped with a nuclear warhead. According to Khan, "The implication of this system is that Pakistan has acquired the capability to build a miniaturized nuclear warhead .. . plutonium-based system that requires an implosion device with a diameter of less than twelve inches-quite a technological

achievement."42 From a proliferation prospective this is also quite a problem. A third development of grave concern is the implication of the fielding of such a system. To be most effective, it would have to be "pre-deployed and combat ready."43 Kahn suggests

that given the current trajectory of the program, "at some point nuclear weapons would be mated with delivery systems in peacetime." 44 This is the same allegation that Goldberg made in his 2011 article in the Atlantic asserting that Pakistan is using civilian-style vehicles without noticeable defense to transport not merely the "demated" components of nuclear parts but "mated" nuclear weapons.45 The Congressional Research Service has also cited lieutenant general Khalid Kidwai, the head of Pakistan's Strategic Plans Division in 2008, who made the same allegation. 46 This contention is conjecture rather than a sure fact, but the military dynamics of the conflict between Pakistan and India do encourage the predeployment of combat ready nuclear weapons and therefore make these assertions plausible. Fourth, Khan confirms that Pakistan has prioritized preventing Indian or American disablement of Pakistan's nuclear arsenal above the danger of theft. As the United States prepared to launch an attack on the Afghan Taliban after September 11, 2001 , President

Musharraf reportedly ordered the dispersal of Pakistan's nuclear arsenal to "at least six secret new locations."47 The dispersal of the arsenal apparently is also consistent with Khan's allegation that Pakistan is expanding its nuclear weapons

delivery systems. Initially, Pakistan only had the capability to deliver atomic weapons by aircraft, but with assistance from North Korea and China, solid and liquid fueled ballistic missiles became an option . However, Pakistan interpreted India's bid for an Arrow antiballistic missile system and Patriot PAC-3 system to back up its S-300 system as a threat that could blunt Pakistan's offensive systems. Pakistan responded by developing the Babur cruise missile and, according to Khan, is also actively pursuing a sea-based deterrent that would "complete the third leg of the [nuclear] triad."48 When considering the potential for a maritime nuclear capability, it is worth keeping in mind a statement that a retired Pakistani general made to Goldberg: "Different aspects of the military and security services have different levels of sympathy for the extremists. The navy is high in syrnpathy. "49

Yes Nuclear Terror - Loose NukesPakistani nukes will get looseSchwartz 2015 (Benjamin [Worked at the Departments of State, Defense and Energy]; Right of Boom: The Aftermath of Nuclear Terrorism; The Overlook Press; p. 15-16; kdf)

With respect to "loose nukes," the threat faced today is unprecedented. The good news is that the danger that Allison focused on-fissile material leaking out of the former Soviet republics-has been substantially curtailed, though not eliminated. When Allison

served in government he was confronted by a slew of nuclear smuggling cases. Between 1992 and 2002, eleven cases of attempted sales of highly enriched uranium and two cases of attempted plutonium sales occurred. In

contrast, between 2002 and 2012 there have been only four cases-all but one of which was linked to a single country, Georgia. This is a good news story, which is probably due in no small measure to the efforts of the United States to provide rapid security

upgrades as part of the Nunn-Lugar Cooperative Threat Reduction program.6 Unfortunately, this good news has been accompanied by extremely dangerous developments in Pakistan. The country is in the midst of a massive expansion of its nuclear weapons complex at a time when radicalization is on the rise and its military is under frequent attack from insurgents. Moreover, the size of the nuclear complex is not only expanding but, according to Feroz

Khan, a thirty-year veteran of the Pakistani program, the military is also planning to produce miniaturized tactical nuclear weapons, deploy them in a ready-to-launch state, and mate them with new delivery vehicles. From a proliferation

perspective this is a frightening prospect, particularly considering that Pakistan has an unparalleled history of proliferation. This is all occurring in a country that hosted Osama bin Laden and the senior leadership of al-Qaeda for over a decade and where the military intelligence service continues to court, coopt, and coordinate with a wide array of terrorists groups.7

Yes Nuclear Terror – AT: Safeguards The safeguards highlighted by their ev will fail – only intelligence can solveMyhrvold 2014 (Nathan P [chief executive and founder of Intellectual Ventures and a former chief technology officer at Microsoft]; Strategic Terrorism: A Call to Action; cco.dodlive.mil/files/2014/04/Strategic_Terrorism_corrected_II.pdf; kdf)

Preventing nuclear war and fighting common crime are similar in some ways. Both efforts typically exploit the principle of deterrence by inflicting punishment after the fact. This approach works well when the deterrence is real—when it is clear that the probability of punishment

or retaliation is high. With strategic terrorism, we already know we cannot retaliate effectively. Besides deterrence, the other main approach to security is guarding: preventing crime by having forces on the scene that stop criminals or attackers in their tracks.

Guarding is used quite a bit in counterterrorism—air marshals on flights, security screeners in airports, and bomb-sniffing dogs at large events. Unfortunately, guarding does not prevent strategic terrorism. If the goal of a terrorist is to spread an infectious disease in the United States, it is simple to put a few infected volunteers on a plane headed into our country. It would be difficult for security to notice anything amiss. The terrorists wouldn’t be obviously sick or carrying suspicious items. Even if a way existed to detect such attackers, by the time someone found them in the

United States, it would already be too late. Even with nuclear, chemical, or noncontagious bio warfare, guarding the country is of limited use. Intercepting a nuclear bomb in a shipping container works only if you stop it in a place you don’t mind losing if the weapon detonates. Having a nuclear bomb explode in a Port Authority facility in New Jersey may be marginally better than having it explode in midtown Manhattan, but it would be a Pyrrhic victory. The only way to beat strategic terrorists is to go after them , either in their home territory or, if they are already here, before they have built a sufficiently dangerous weapon. We need to strike preemptively. The Iraq War, however, has given preemption a bad name. Destroying Saddam Hussein’s weapons of mass destruction was the goal, yet investigators ultimately found that he didn’t have any. This not only discredits the intelligence process that led us into Iraq, it discredits preemption itself. Both the country and the world will be highly skeptical of any rush to a preemptive attack. Most preemptive action will not be at the level of a full-scale war and thus will require lower thresholds of certainty. Nevertheless, any sort of preemptive attack places tremendous demands on intelligence gathering—demands that our intelligence community, in its current form, cannot meet. The need to battle strategic terrorists preemptively sets the bar for 21st-century intelligence services: they must provide information of sufficient quality and timeliness to enable policy makers to decide whether or not to act. The intelligence community needs a complete bottom-up review to determine whether its structure and methodologies match present and future needs. The new approach will require large and unpopular budget increases. Existing program budgets will need to be

redistributed. Congress will vigorously defend current projects affecting their constituents and contractors will howl. Action is nevertheless imperative.

AT: Nuclear Terror doesn’t escalateIt’s impossible to know if nuclear terror would escalate, best to side with cautionSchwartz 2015 (Benjamin [Worked at the Departments of State, Defense and Energy]; Right of Boom: The Aftermath of Nuclear Terrorism; The Overlook Press; p. 3-5; kdf)

Yet there are very few authors, academics, or entertainers who have really thought through the scenario described above or examined in detail

the question of what happens in the days, weeks, and months after such an attack. Presumably, part of the reason for this is that the US government's response to nuclear terrorism is unknowable. Ask anyone who has spent time at the White House on the

National Security Council staff and they will tell you that decisions of war and peace are in no small part the product of fickle factors like the personality of the president and the people who surround him . Thoughtful national security practitioners also know that happenstance and dumb luck have a prominent role in shaping discussions in the White House Situation

Room. These conditions make realistic speculation difficult to formulate. The wide range of possible scenarios and the salience of unknowable factors make it difficult to anticipate hypothetical policy prescriptions. Another reason that this question hasn't demanded an answer is that most people understandably consider it to be far less relevant than "How can nuclear terrorism be prevented?"

Speculating on responses to a nuclear attack is a bit like contemplating the day after any number of disasters that involve an unprecedented scale of devastation. Does the national security community focus on the US government's potential response to an asteroid striking the planet or the aftermath of a war between China and the United States? It does not, because these types of scenarios fall into the realm of the surreal or at a minimum envision a situation in which there is such massive social disruption and such a severe diminution of US government capacity that it is difficult to even know where to begin. Admitting the limits of American power, particularly the "hard power" of the US military and intelligence community, is also not a popular pastime. A politician would need to be unusually brave to publicly focus on the day after an act of nuclear terrorism instead of the days before. Accepting nuclear terrorism is an unacceptable position, his opponents would surely retort. There are also no precedents, history, or cases of nuclear terrorism to provide

context or demand consideration. People -particularly pundits and politicians-who have not studied much history often use the term unprecedented to describe the unfamiliar, but the scenario laid out above is truly something new under the sun. Since a successful nuclear terrorism event has not happened before, and it is not happening now, there is less appetite for thinking deeply about it than there is for considering more traditional security issues. From the sinking of the Lusitania by a German

U-boat, to the Japanese empire's attack on Pearl Harbor, to al-Qaeda's attacks that culminated in the events of 9/11, Americans are conditioned to contemplate surprise attacks and expect that the US government can respond swiftly and severely, to manifest the prediction made by Japanese admiral Isoroky Yamamoto that a surprise attack against America would "awaken a sleeping giant."

AT: Low ProbabilityThe probability of a nuclear terror attack is at unprecedented levels – amplifies the magnitudeSchwartz 2015 (Benjamin [Worked at the Departments of State, Defense and Energy]; Right of Boom: The Aftermath of Nuclear Terrorism; The Overlook Press; p. 23-25; kdf)

Is the scenario above simply the product of an overactive imagination and a penchant for alarmism? This is a reasonable question to ask. And it is worth answering before embarking on an exploration of potential responses to nuclear terrorism. Those who assert that there is a genuine threat of nuclear terrorism should acknowledge at the outset that there are legitimate reasons for skepticism. In fact, those who have

paid closest attention to the issue over the years may be most conditioned to be incredulous. They have heard public officials repeatedly issue dire warnings of impending terrorist attacks, watched and seen that no attack materializes, and then have been presented with little or no evidence to support the initial alert. It is also perfectly understandable that reasonable people question the competence and/or trustworthiness of US national security officials, particularly those responsible for nuclear

issues. This is especially so in light of the second American-led invasion of Iraq-a war justified to the public largely on the basis of nonexistent nuclear weapons. Moreover, warnings of impending doom didn't originate with then vice president Dick Cheney. "I think we have to live with the expectation," remarked a Los Alamos atomic engineer in 1973, "that once every four or five years a nuclear explosion will take place and kill a lot of people." This statement is cited in John McPhee's The Curve of Binding Energy, which detailed concerns about the proliferation of nuclear weapons to nonstate actors over forty years ago.3 In the context of this history,

accusations of Chicken Little-like behavior aren't flippant reactions. While exaggeration may mislead the credulous and offend the perceptive, neither the absence of a precedent for nuclear terrorism nor the intelligence failure regarding Saddam Hussein's

WMD program change the growing threat. Many of these conditions aren't new; they have existed since the dawn of the nuclear age, and the world has been very fortunate that the danger has been effectively managed for so long. Other conditions are truly unprecedented. The world crossed from Graham Allison's "Three No's" into three Yeses with a whimper rather than a bang, but we have nevertheless entered an environment of extraordinary risk. Allison's contention that "[t]he detonation of a terrorist nuclear device in an American city is inevitable if the U.S. continues on its present

course" is certainly debatable.4 Yet an objective assessment of the current nuclear security situation and its future trajectory leads to an unavoidable conclusion: We are more vulnerable to nuclear terrorism than at any time since the dawn of the nuclear age.

AT: Schwartz IndictsCriticism of Schwartz is that his magnitude is too small – experts agree that he is awesomeBoot 2015 (Max [senior fellow at the Council on Foreign Relations]; 'Right of Boom,' by Benjamin E Schwartz; Feb 6; www.nytimes.com/2015/02/08/books/review/right-of-boom-by-benjamin-e-schwartz.html; kdf)

Nuclear terrorism has long been a staple of movies and television shows. But typically, Hollywood productions end with the bomb being defused. What would happen if heroes didn’t save the day and the United States experienced the worst 24 hours in its history? That is the

important question Benjamin E. Schwartz, a career government official who has worked at the Departments of State, Defense and Energy, sets out to answer in his clunkily titled first book, “Right of Boom.” (“Right of boom” is government-speak for “after an explosion.”) His analysis begins with a fictional narrative that unfolds in a flat, matter-of-fact tone: “On an otherwise calm and uneventful morning, a small nuclear weapon explodes in downtown Washington, D.C. . . . The casualty count rises to over a hundred thousand, and the destruction is measured in hundreds of billions of dollars.” Schwartz rather arbitrarily assumes that the president is out of town at the time of the explosion, along with other key officials. They must then figure out what to do when a “little-known terrorist group” (no ideology specified) claims responsibility. Experts suggest the group is “linked to three hostile governments, all of which have issued statements condemning the attack and denying involvement.” Eventually, in Schwartz’s story line, intelligence concludes that the nuclear material most likely came from one nation (unnamed) but that “negligence within that country’s weapons industry and at its nuclear complexes is at least as plausible a scenario as a deliberate transfer by government officials to the terrorist group.” What, then, should the president do? Schwartz notes that “people may assume that the answer to nuclear terrorism is tragic but quite straightforward: retaliation with nuclear weapons.” But it may not be so simple. It is far from certain that the president would be willing to incinerate the people of, say, North Korea, Iran or Pakistan. And, as Schwartz notes, “American maneuver room would be severely curtailed if the nuclear threat network emanated from Russian or Chinese territory.” Only Dr. Strangelove would suggest starting World War III with a state that possesses hundreds if not thousands of nuclear weapons. What’s more, taking out the nuclear weapons even of a smaller state like Pakistan or North Korea would not be easy. It would be necessary to wipe out the entire arsenal, but of course all states camouflage and disperse their nuclear stockpiles. If American strikes left some nukes intact, the danger of a further nuclear attack on the American homeland would be very real. What about using boots on the ground? “U.S. military forces could invade a country and forcefully take control over nuclear-related sites and facilities,” Schwartz says. He may go too far in suggesting that such an action would have “limited prospects of eliminating the threat,” but he is right that it would be a “high-risk

venture” whose downside could include many of the problems the United States encountered in Afghanistan and Iraq. While Schwartz believes (rightly) that airstrikes against suspected nuclear proliferators would be the most likely initial response, he argues that dealing with an act of nuclear terrorism in the long term would require a much more complex series of actions designed to blunt “global nuclear threat networks.” Washington would need “capabilities to conduct missions ranging from halting the sale of dual-use components through legal and diplomatic processes, to freezing funds of weapons proliferators, to isolating and immobilizing terrorist groups, to improving security practices at nuclear materials storage sites, to coercive interdictions on the high seas, to seizing and securing nuclear weapons sites and even to destroying nuclear weapons arsenals.” Schwartz’s most intriguing suggestion is that an act of nuclear terrorism could revive an idea briefly entertained by the Truman administration to establish “an international structure to control nuclear energy” — an International Atomic Energy Agency on steroids. Countries that failed to comply with its edicts could face more than sanctions or strong rhetoric — they could be “presumed guilty” and declared “a legitimate target for retaliation following nuclear terrorism even in the absence of proof of complicity.” Whatever happens, there is little doubt that we would be entering a brave new world whose contours can be glimpsed only dimly. Schwartz is to be commended for thinking about the unthinkable. It’s a shame he has not produced a better book. Schwartz is, to put it mildly, no thriller writer. His nuclear-attack plot is presented with a minimum of drama, and it’s hard not to roll your eyes when he sketches an imaginary conversation on an unnamed television show between experts from nonexistent think tanks chatting in language no human being would actually use. “As the late Irving Kristol noted many years ago,” one of his pundits declaims, “international law is a fiction abused callously, or ignored ruthlessly, by those nations that, unlike the Western democracies, never took it seriously in the first place.” Back to you, Bret. Schwartz also takes long detours into historical case studies of limited relevance. For example, he compares possible responses to terrorism with America’s campaigns against the Comanches and Britain’s against the Pashtuns in the 19th century. He even suggests that “war against Al Qaeda waged through unmanned aerial vehicles and informants on the ground” is similar to the “punitive” expeditions undertaken by the British Raj in what is now Pakistan. The analogy doesn’t hold up. British forces routinely burned villages in retaliation for Pashtun raids. Winston Churchill, who as a young army officer participated in one such campaign, left a memorable description of how the Tirah Valley “was filled with the smoke,” which “hung like a cloud over the scene of destruction.” If Washington were engaged in such a policy today, our armed forces would be bombing villages in Pakistan. But they’re not. Current policy is actually “leadership targeting” — trying with great discrimination to eliminate the key players in Al Qaeda and other terrorist organizations. This approach also has a long history, dating back to the Roman assassination, in 139 B.C., of a rebel leader in Hispania (Spain) named Viriathus, but it goes entirely unmentioned here. And more disturbing than Schwartz’s failure to cite the relevant historical examples is his conceptual error in

failing to differentiate between decapitation strikes and punitive expeditions. “Right of Boom” is marred by other problems as

well, like Schwartz’s unwillingness to consider the possible impact of the nation’s entire political leadership being wiped out. Another curious omission is neglecting to think about what would happen if more than one nuclear bomb went off, or if more nuclear attacks were threatened. That possibility was raised in Andrew Krepinevich’s “7 Deadly Scenarios,” a more compelling look at this same issue that also goes unmentioned here. Finally Schwartz does not explain what steps policy makers should take to stop nuclear terrorism before it occurs. What, for example, should we be doing to prevent Iran

from getting the bomb? Schwartz never says. Nonetheless, even if “Right of Boom” is not the book we need on nuclear terrorism, it can still do some good if it spurs greater study of and conversation about what is arguably our most important and least-understood national security threat.

**AT: Aff args

AT: FREEDOM Act ThumpsEither A) Freedom act solves and takes out inherency means vote neg on presumption OR B) it’s just a drop in the bucketStraeley 2015 (Steve; Congress’ NSA Bulk Surveillance Reform Bill: Much Ado about Little; May 4; www.allgov.com/news/top-stories/congress-nsa-bulk-surveillance-reform-bill-much-ado-about-little-150504?news=856395; kdf)

The USA Freedom Act, a bill passed out of committee last week which would limit the government’s ability to spy on Americans’

communications, would hardly put a crimp in the National Security Agency’s (NSA) surveillance practices. The Freedom Act would stop most government collection of domestic calling metadata. The government would be limited to requesting from telecommunications companies information when there is a “reasonable, articulable suspicion” that a “specific selection term” is connected to

international terrorism, according to an analysis by the Electronic Frontier Foundation. But the bill doesn’t address data collection under Section 702 of the FISA Amendments Act, which allows the collection of the actual content of some communications, including that of Americans, and the collection of information from overseas calls. “If this bill

passes, the NSA will continue unaddressed surveillance programs and will secretly torture the English language to devise novel justifications for spying on Americans,” David Segal, exec utive director of Demand Progress, a group that has fought for more civil liberties, told The New York Times. “We won’t even know the details until a new whistleblower

comes forward a decade or two from now.” An amendment which would strengthen protections against backdoor surveillance such as that allowed under Section 702 has drawn significant support (pdf), but has been rejected, along with others. House Judiciary Committee Chair Rep. Bob Goodlatte (R-Virginia) and ranking member Rep. John Conyers

(D-Michigan) have said the Freedom Act has been carefully crafted as a compromise and if it’s amended, it has no chance of getting a vote on the House floor. Its chance for success hinges on the expiration next month of authority for bulk data collection and those in the intelligence community want to ensure they still have some ability to spy on Americans.

And—It wasn’t keyLewis 2014 (James Andrew [senior fellow and director of the Strategic Technologies Program at CSIS]; Underestimating Risk in the Surveillance Debate; Dec; http://csis.org/files/publication/141209_Lewis_UnderestimatingRisk_Web.pdf; kdf)

If the risk of attack is increasing, it is not the right time to change the measures the United States has put in place to deter another 9/11. If risk is decreasing, surveillance programs can be safely reduced or eliminated. A more complicated analysis would ask if the United States went too far after 9/11 and the measures it put in place can be

reduced to a reasonable level without increasing risk. Unfortunately, precise metrics on risk and effectiveness do not exist, 12 and we are left with the conflicting opinions of intelligence officials and civil libertarians as to what makes effective intelligence or counterterrorism programs. There are biases on both sides, with intelligence officials usually preferring more information to less and civil libertarians can be prone to wishful thinking about terrorism and opponent intentions.13

Interviews with current and former intelligence officials give us some guidance in deciding this. The consensus among these individuals is that 215 is useful in preventing attacks, but the least useful of the programs available to the intelligence community . If there was one surveillance program they had to give up , it would be 215 before any other s, but ending 215 would not come without some increase in risk.

AT: Privacy outweighsTheir impacts are about the perception the public has about intrusion of privacy – overwhelmingly the public enjoys it Sherfinski June 4 (David; NSA surveillance prevented terrorist attacks, most voters say: poll; www.washingtontimes.com/news/2015/jun/4/nsa-surveillance-prevented-terrorist-attacks-poll/; kdf)

Nearly two-thirds of U.S. voters say the National Security Agency’s bulk data collection program has thwarted terrorist attacks in the United States, but a majority also think it’s likely that the program has violated Americans’ civil liberties. Sixty-five percent say they believe the NSA program has helped prevent terrorist attacks in the United States , compared to 28 percent who don’t believe it has, according to a Fox News poll. Meanwhile, 57 percent say they believe the surveillance

program has led to civil liberties of law-abiding Americans being violated, compared to 36 percent who don’t believe that it has. But a plurality of voters, 49 percent to 42 percent, said the government’s surveillance of U.S. citizens is more likely to help catch terrorists and protect Americans from additional attacks, as opposed to hurting law-abiding Americans by using private information improperly. Backers of the program have said there aren’t any documented abuses, while opponents have pointed to a recent report from the Justice Department’s inspector general saying the program hasn’t been responsible for a big break in a terrorism case, either.

AT: Fear mongeringTheir authors are just as guilty of fear mongeringBolton 2015 (John R [served as the US Permanent Representative to the UN and as Under Secretary of State for Arms Control and International Security]; NSA activities key to terrorism fight; Apr 28; www.aei.org/publication/nsa-activities-key-to-terrorism-fight/; kdf)

Congress is poised to decide whether to re-authorize programs run by the National Security Agency that assess patterns of domestic and

international telephone calls and emails to uncover linkages with known terrorists. These NSA activities, initiated after al-Qaeda’s

deadly 9/11 attacks, have played a vital role in protecting America and our citizens around the world from the still-metastasizing terrorist threat. The NSA programs do not involve listening to or reading conversations, but rather seek to detect communications networks. If patterns are found, and more detailed investigation seems warranted, then NSA or other federal authorities, consistent with the Fourth Amendment’s prohibition against unreasonable searches and seizures, must obtain judicial

approval for more specific investigations. Indeed, even the collection of the so-called metadata is surrounded by procedural protections to prevent spying on U.S. citizens. Nonetheless, critics from the right and left have attacked the NSA for infringing on the legitimate expectations of privacy Americans enjoy under our Constitution. Unfortunately, many

of these critics have absolutely no idea what they are talking about; they are engaging in classic McCarthyite tactics, hoping to score political points with a public justifiably worried about the abuses of power characteristic of the Obama administration. Other critics, following Vietnam-era antipathies to America’s intelligence community, have never reconciled themselves to the need for robust clandestine capabilities. Still others yearn for simpler times, embodying Secretary of State Henry Stimson’s

famous comment that “gentlemen don’t read each others’ mail.” The ill-informed nature of the debate has facilitated scare-mongering, with one wild accusation about NSA’s activities after another being launched before the mundane reality catches up. And there is an important asymmetry at work here as well. The critics can say whatever their imaginations conjure up, but NSA and its defenders are significantly limited in how they can respond. By definition, the programs’ success rests on the secrecy fundamental to all intelligence activities. Frequently, therefore, explaining what is not happening could well reveal information about NSA’s methods and capabilities that terrorists and others, in turn, could use to stymie future detection efforts.

AT: No recent terror They say no recent terror, but that’s because the programs are working Lewis 2014 (James Andrew [senior fellow and director of the Strategic Technologies Program at CSIS]; Underestimating Risk in the Surveillance Debate; Dec; http://csis.org/files/publication/141209_Lewis_UnderestimatingRisk_Web.pdf; kdf)

If the risk of attack is increasing, it is not the right time to change the measures the United States has put in place to deter another 9/11. If risk is decreasing, surveillance programs can be safely reduced or eliminated. A more complicated analysis would ask if the United States went too far after 9/11 and the measures it put in place can be

reduced to a reasonable level without increasing risk. Unfortunately, precise metrics on risk and effectiveness do not exist, 12 and we are left with the conflicting opinions of intelligence officials and civil libertarians as to what makes effective intelligence or counterterrorism programs. There are biases on both sides, with intelligence officials usually preferring more information to less and civil libertarians can be prone to wishful thinking about terrorism and opponent intentions.13

Interviews with current and former intelligence officials give us some guidance in deciding this. The consensus among these individuals is that 215 is useful in preventing attacks, but the least useful of the programs available to the intelligence community . If there was one surveillance program they had to give up , it would be 215 before any other s, but ending 215 would not come without some increase in risk.

AT: Doesn’t solve terrorismThese programs have stopped over 50 terror attacksDozier 2013 (Kimberly; NSA: Surveillance Programs Foiled Some 50 Terrorist Plots Worldwide; Jun 18; www.huffingtonpost.com/2013/06/18/nsa-surveillance_n_3460106.html; kdf)

The director of the National Security Agency insisted on Tuesday that the government's sweeping surveillance programs have foiled some 50 terrorist plots worldwide in a forceful defense echoed by the leaders of the House Intelligence

Committee. Army Gen. Keith Alexander said the two recently disclosed programs – one that gathers U.S. phone records and

another that is designed to track the use of U.S.-based Internet servers by foreigners with possible links to terrorism – are critical in the terrorism fight. Intelligence officials have disclosed some details on two thwarted attacks, and Alexander promised additional information to the panel on thwarted attacks that the programs helped stop. He provided few additional details. The programs "assist the intelligence community to connect the dots," Alexander told the committee in a rare, open Capitol Hill hearing. Alexander got no disagreement from the leaders of the panel, who have been outspoken in backing the programs since Edward Snowden, a 29-year-old former contractor with Booz Allen Hamilton, disclosed information to The Washington Post and the Guardian newspapers. Rep. Mike Rogers, R-Mich., chairman of the committee, and Rep. C.A. Dutch Ruppersberger of Maryland, the panel's top Democrat, said the programs were vital to the intelligence community and assailed Snowden's actions as criminal. "It is at times like these where our enemies within become almost as damaging as our enemies on the outside," Rogers said. Ruppersberger said the "brazen disclosures" put the United States and its allies at risk. The general counsel for the intelligence community said the NSA cannot target phone conversations between callers inside the U.S. – even if one of those callers was someone they were targeting for surveillance when outside the country. The director of national intelligence's legal chief, Robert S. Litt, said that if the NSA finds it has accidentally gathered a phone call by a target who had traveled into the U.S. without their knowledge, they have to "purge" that from their system. The same goes for an accidental collection of any conversation because of an error. Litt said those incidents are then reported to the Foreign Intelligence Surveillance Court, which "pushes back" and asks how it happened, and what the NSA is doing to fix the problem so it doesn't happen again. Rogers previewed the latest public airing of the NSA controversy the morning after President Barack Obama, who is attending the G-8 summit in Ireland, vigorously defended the surveillance programs in a lengthy interview Monday, calling them transparent – even though they are authorized in secret. "It is transparent," Obama told PBS' Charlie Rose in an interview. "That's why we set up the FISA court," the president added, referring to the secret court set up by the Foreign Intelligence Surveillance Act that authorizes two recently disclosed programs: one that gathers U.S. phone records and another that is designed to track the use of U.S.-based Internet servers by foreigners with possible links to terrorism. Obama said he has named representatives to a privacy and civil liberties oversight board to help in the debate over just how far government data gathering should be allowed to go – a discussion that is complicated by the secrecy surrounding the FISA court, with hearings held at undisclosed locations and with only government lawyers present. The orders that result are all highly classified. "We're going to have to find ways where the public has an assurance that there are checks and balances in place ... that their phone calls aren't being listened into; their text messages aren't being monitored, their emails are not being read by some big brother somewhere," the president said. A senior administration official said Obama had asked Director of National Intelligence James Clapper to determine what more information about the two programs could be made public, to help better explain them. The official spoke on condition of anonymity because the official was not authorized to speak publicly. Snowden accused members of Congress and administration officials Monday of exaggerating their claims about the success of the data gathering programs, including pointing to the arrest of the would-be New York subway bomber, Najibullah Zazi, in 2009. In an online interview with The Guardian in which he posted answers to questions Monday, Snowden said that Zazi could have been caught with narrower, targeted surveillance programs – a point Obama conceded

in his interview without mentioning Snowden. "We might have caught him some other way," Obama said. "We might have

disrupted it because a New York cop saw he was suspicious. Maybe he turned out to be incompetent and the bomb didn't go off. But, at the margins, we are increasing our chances of preventing a catastrophe like that through these programs," he said. Obama repeated earlier assertions that the NSA programs were a legitimate counterterror tool and that they were completely noninvasive to people with no terror ties – something he hoped to discuss with the privacy and civil liberties board he'd formed. The senior administration official said the president would be meeting with the new privacy board in the coming days.

Surveillance isn’t foolproof, but has solved attacks - empiricsWilliams and Winter 2015 (Pete and Tom; Man Under Surveillance by Joint Terrorism Task Force Shot Dead in Boston; www.nbcnews.com/news/us-news/man-under-surveillance-joint-terrorism-task-force-shot-dead-boston-n368376; kdf)

A man wielding a large, military-style knife came at police and FBI agents as they attempted to interview him in Boston early Tuesday, and was

fatally shot only after he refused to drop the weapon, officials said. Usaamah Abdullah Rahim had been under 24-hour surveillance by the Boston Joint Terrorism Task Force, and a senior official told NBC News they were investigating

whether the 26-year-old Boston man had become radicalized by ISIS-inspired social media messages and feared a terror plot was in the works. A second man from the Boston suburb of Everett was later taken into custody as officials conducted a related terrorism investigation, Boston police said Tuesday night. His name was not released. Rahim was stopped around 7 a.m. ET at a CVS parking lot in Boston's Roslindale neighborhood, FBI Special Agent in Charge Vincent Lisi said at an afternoon news conference. The officers wanted to interview him at the scene, but had no warrant for his arrest. The officers did not have their guns drawn, and Rahim pulled a knife out first, Boston Police Commissioner William Evans told reporters. "We have video depicting the individual coming at officers while the officers were retreating," Evans said. Officers and agents ordered Rahim to drop his weapon, and then took out their firearms and shot at him when he refused, Evans added. He was struck twice — in the abdomen and torso — and was later pronounced dead at the hospital, police said. Officials are reviewing whether the shooting was justified, but early surveillance video and witness statements indicate the officers' "lives were in danger," Evans said. After the shooting, authorities began searching a home in Everett and another address in Warwick, Rhode Island, in connection to the incident, senior law enforcement sources in New England told NBC News. A source earlier said the occupants in the Everett

home might also be of interest in the investigation. Law enforcement sources say Rahim had been under investigation and surveillance for several weeks by the Boston Joint Terrorism Task Force. In recent months, ISIS messages worldwide have called for attacks using whatever weapons are at hand, including guns and knives.

AT: Terrorism KritiksEven if they win the K – it is just impact mitigation, not a reason to vote Aff*This is also the 2NC must read

Lewis 2014 (James Andrew [senior fellow and director of the Strategic Technologies Program at CSIS]; Underestimating Risk in the Surveillance Debate; Dec; http://csis.org/files/publication/141209_Lewis_UnderestimatingRisk_Web.pdf; kdf)

The phrase “terrorism” is overused, and the threat of terrorist attack is easily exaggerated , but that does not mean this threat it is nonexistent. Groups and individuals still plan to attack American citizens and

the citizens of allied countries. The dilemma in assessing risk is that it is discontinuous. There can be long periods where no activity is apparent, only to have the apparent calm explode in an attack . The constant, low-level activity in planning and preparation in Western countries is not apparent to the public , nor is it easy to identify the moment that discontent turns into action. There is general agreement that as terrorists splinter into regional groups, the risk of attack increases. Certainly, the threat to Europe from militants returning from Syria points to increased risk for U.S. allies. The messy U.S. withdrawal from Iraq and (soon) Afghanistan contributes to an increase in risk.24 European authorities have increased surveillance and arrests of suspected militants as the Syrian conflict lures hundreds of Europeans. Spanish counterterrorism police say they have broken up more terrorist cells than in any other European country in the last three years.25 The chairman of the House Select Committee on Intelligence, who is better placed than most members of Congress to assess risk, said in June 2014 that the level of terrorist activity was higher than he had ever seen it.26 If the United

States overreacted in response to September 11, it now risks overreacting to the leaks with potentially fatal consequences. A simple assessment of the risk of attack by jihadis would take into account a resurgent Taliban, the power of lslamist groups in North Africa, the continued existence of Shabaab in Somalia, and the appearance of a powerful new force, the Islamic State in Iraq and Syria (ISIS). Al Qaeda, previously the leading threat, has splintered into independent groups that make it a less coordinated force but more difficult target . On the positive side, the United States, working with allies and friends, appears to have contained or eliminated jihadi groups in Southeast Asia. Many of these groups seek to use adherents in Europe and the United States for manpower and funding. A Florida teenager was a

suicide bomber in Syria and Al Shabaab has in the past drawn upon the Somali population in the United States. Hamas and Hezbollah have achieved quasi-statehood status, and Hamas has supporters in the United States . Iran, which supports the two groups, has advanced capabilities to launch attacks and routinely attacked U.S. forces in Iraq. The United Kingdom faces problems from several hundred potential terrorists within its large Pakistani population, and there are potential attackers in other Western European nations, including Germany, Spain, and the Scandinavian countries. France, with its large Muslim population faces the most serious challenge and is experiencing a wave of troubling anti-Semitic attacks that suggest both popular support for extremism and a decline in control by security

forces. The chief difference between now and the situation before 9/11 is that all of these countries have put in place much more robust surveillance systems, nationally and in cooperation with others, including the

United States, to detect and prevent potential attacks. Another difference is that the failure of U.S. efforts in Iraq and Afghanistan and the opportunities created by the Arab Spring have opened a new “front” for jihadi groups that makes their primary focus regional. Western targets still remain of interest, but are more likely to face attacks from domestic sympathizers. This could change if the well-resourced ISIS is frustrated in its efforts to establish a new Caliphate and turns its focus to the West. In addition, the al Qaeda affiliate in Yemen

(al Qaeda in the Arabian Peninsula) continues to regularly plan attacks against U.S. targets. 27 The incidence of attacks in the United States or Europe is very low, but we do not have good data on the number of planned attacks that did not come to fruition. This includes not just attacks that were detected and stopped, but also attacks where the jihadis were discouraged and did not initiate an operation or press an attack to its conclusion because of operational difficulties. These attacks are the threat that mass surveillance was created to prevent. The needed reduction in public anti-terror measures without increasing the chances of successful attack is

contingent upon maintaining the capability provided by communications surveillance to detect, predict, and prevent attacks. Our opponents have not given up; neither should we.

Terrorism studies are epistemologically and methodologically valid---our authors are self-reflexiveMichael J. Boyle 8, School of International Relations, University of St. Andrews, and John Horgan, International Center for the Study of Terrorism, Department of Psychology, Pennsylvania State University, April 2008, “A Case Against Critical Terrorism Studies,” Critical Studies On Terrorism, Vol. 1, No. 1, p. 51-64

Jackson (2007c) calls for the development of an explicitly CTS on the basis of what he argues preceded it, dubbed ‘Orthodox Terrorism Studies’. The latter, he suggests, is characterized by: (1) its poor methods and theories, (2) its state centricity, (3) its problemsolving orientation, and (4) its institutional and intellectual links to state security projects. Jackson argues that the major defining characteristic of CTS, on the other hand, should be ‘a skeptical attitude towards accepted

terrorism “knowledge”’. An implicit presumption from this is that terrorism scholars have laboured for all of these years without being aware that their area of study has an implicit bias, as well as definitional and methodological problems . In fact, terrorism scholars are not only well aware of these problems, but also have provided their own searching critiques of the field at various points during the last few decades (e.g. Silke 1996, Crenshaw 1998,

Gordon 1999, Horgan 2005, esp. ch. 2, ‘Understanding Terrorism’). Some of those scholars most associated with the critique of empiricism implied in

‘Orthodox Terrorism Studies’ have also engaged in deeply critical examinations of the nature of sources, methods, and data in the study of terrorism. For example, Jackson (2007a) regularly cites the handbook produced by Schmid and Jongman (1988) to support his claims that theoretical progress has been limited. But this fact was well recognized by the authors; indeed, in the introduction

of the second edition they point out that they have not revised their chapter on theories of terrorism from the first edition, because the failure to address persistent conceptual and data problems has undermined progress in the field. The point of their handbook was to sharpen and make more comprehensive the result of research on terrorism, not to glide over its methodological and definitional failings (Schmid and Jongman 1988, p. xiv). Similarly,

Silke’s (2004) volume on the state of the field of terrorism research performed a similar function, highlighting

the shortcomings of the field, in particular the lack of rigorous primary data collection. A non-reflective community of scholars does not produce such scathing indictments of its own work.

Terror is a real threat driven by forces the aff can’t resolve---we should reform the war on terror, not surrender---any terror attack turns the entire case Peter Beinart 8, associate professor of journalism and political science at CUNY, The Good Fight; Why Liberals – and only Liberals – Can Win the War on Terror and Make America Great Again, vii-viii

APPLYING THAT TRADITION today is not easy. Cold war liberals devel- oped their narrative of national greatness in the shadow of a totalitarian ¶

superpower. Today, the United States faces no such unified threat. Rather, it faces a web of dangers—from disease to

environmental degradation to weapons of mass destruction—all fueled by globalization, which leaves America increasingly vulnerable to pathologies bred in distant corners of the world . And at the center of this nexis sits jihadist terrorism, a new totalitarian movement that lacks state power but harnesses the power of globalization instead. ¶ Recognizing that the United States again faces a totalitarian foe does not provide simple policy prescriptions, because today’s totalitarianism

takes such radically different form. But it reminds us of something more basic, that liberalism does not find its enemies only on the right—a lesson sometimes forgotten in the age of George W. Bush. ¶ Indeed, it is because liberals so despise this president that they increasingly reject his trademark phrase, the “war on terror.” Were this just a semantic dispute, it would hardly matter;

better alternatives to war on terror abound. But the rejection signifies something deeper: a turn away from the very idea that

anti-totalitarianism should sit at the heart of the liberal project. For too many liberals today, George W. Bush’s war on terror is the only one they can imagine. This alienation may be understand- able, but that does not make it any less disastrous, for it is

liberalism’s principles—even more than George W. Bush’s—that jihadism threatens. If today’s liberals cannot rouse as much passion for fighting a movement that flings acid at unveiled women as they do for taking back the Senate in 2006,

they have strayed far from liberalism’s best traditions. And if they believe it is only George W. Bush who

threatens America’s freedoms, they should ponder what will happen if the United States is hit with a nuclear or contagious biological attack. No matter who is president, Republican or Democrat, the reaction will make John Ashcroft look like the head of the ACLU.

Ethical rebellion does not require rejecting all resort to lethal force---killing is conditionally justified in cases where the target is culpable for injustice. This distinction will win us the debate---ethical rebellion can allow killing, so long as we recognize that it is simultaneously necessary, but cannot be truly ethically justified. Recognizing our own conduct as ethically unjustifiable despite its necessity in preserving innocent life sets up killing as truly exceptional Matt Hartman 13, MA, Philosophy, University of Chicago, 6/5/13, “The Rebel or the Militant: Universality and Political Violence,” http://lucian.uchicago.edu/blogs/colloquium/2013/06/05/the-rebel-or-the-militant-universality-and-political-violence/

I begin with rebellion, Camus’ analogue to Badiou’s event. For him, rebellion means something restricted, something that respects its own limits.

The rebels who [...] wanted to construct [...] a savage immortality are terrified at the prospect of being obliged to kill in their turn. Nevertheless, if they retreat they must accept death ; if they advance they must accept murder . Rebellion, cut off from its origins and cynically travestied, oscillates, on all levels, between sacrifice and murder.[24]

In other words, rebellion is characterized by a recognition that the status quo is structurally unjust and must be

opposed―hence the rebel’s inability to retreat―and a simultaneous recognition that the means of opposition themselves imply a crime .[25] The ‘savage immortality’ that appears to arise from rebellion―the point where rebellion’s initial

impetus appears to no longer to govern the sequence―cannot be, and yet the rebel must act. This conflict forms the paradoxical, logical structure of rebellion that creates an inherent limit upon what can be (ethically) done . As we will see,

that limit is marked by murder.

Moreover, that limit is dependent upon the beginnings of the rebellion. “I rebel―therefore we exist,” says Camus (R 22). This formulation is variously suggestive, but the two most important implications for our purposes are the axiomatic claims to universality and equality. Similar to Badiou’s claim that all are ‘virtual militants’ of the event, Camus argues that a rebellion reaches for universality (by transforming the ‘I’ into a ‘We’). Its virtues must apply to all. And for this reason, it must aim at equality, as all must be equal in their ability to make the same declaration.

Rebellion is the assertion of an axiom of equality between one and all. “In assigning oppression a limit within which begins the dignity[26] common to all men, rebellion defined a primary value” (R 281). Camus’ formulation necessitates an understanding―an ethical principle―of equality that rebels must recognize. Rebellion is the very process of the assertion of this egalitarianism. We can already begin to see, then, how Camus’ axiom is an ethical principle.

But this point further implies that the claim of rebellion―a claim to act from principle, not simply to take power―must recognize universality as a claim concerning the situation. The principle now instituted refers to a governing logic, not to an individual. Again, this claim parallels Badiou’s rethinking of the State’s logic of ordering. The structure of thought, not the identity of the master, is the problem. Thus, one claims a wrong against the situation: if the slave merely takes his master’s place, there is no rebellion but a coup. The logic must change. The ‘we exist’ half of Camus’ formulation necessitates as much: if the rebellion’s axiom does not apply to all, the rebellion has no coherent ground or claim. It would be a mere simulacrum. Rebels must act towards all―they have a limit on what they can not do.

But, against Badiou, they also have a limit on what they can do. The result of the ‘universal value’ defined by the axiom/principle in Camus’ formulation is a limit placed upon rebels. This limit is murder:

[M]urder is thus a desperate exception or it is nothing. It is the limit that can be reached but once, after which one must die. The rebel [...] kills and dies so that it shall be clear that murder is impossible. He demonstrates that, in reality, he prefers the ‘We are’ to the ‘We shall be.’ [...] Beyond the farthest frontier, contradiction and nihilism begin. (R 282)

This passage contains the core of The Rebel . Camus condemns any logic that justifies murder on the grounds of a history―either because it helps bring about a desired future state or because it is part of a larger, necessary historical epoch. He denies any logic that determinatively ties ethical action to a historical context, subsuming particular situations under history.

To justify an act by history is to implicitly de-value the present. It is to imply that a present claim to justice―to the axiomatic principles of rebellion―are not to be met. It is to deny the ‘we are’ to the ‘we shall be,’ as Camus says above. The axiomatic structure of the statement ‘I rebel, therefore we exist,’ demands the present be equal to the future. If not, the very structure of politics is denied and rebellion’s logic is made incoherent. The situatedness of the rebellion―the fact that the axiom is declared now―implies that as a universal, logical claim it is definitively tied to the present. Because it is universal, the present cannot be devalued to the future, otherwise it would be a mere instrument. By not separating history into pre- and post-event with an ontologically uncontainable state between them, Camus is providing a framework to make historical change sensible even as it is ongoing.

The axiomatic aspect of rebellion’s principles conditions this thought. Camus does not claim that rebellion’s ends should exist, or that they will exist, or that it would be morally right if they existed : “Nothing justifies the assertion that these principles have existed eternally; it is of no use to declare that they will one day exist” (R 283). Rather, the axiom is a demand for equality (or justice or freedom) against the State. Because the axiom acts as an ethical principle for the rebels during the course of their rebellion, the coherence between the rebels’ actions and their axiom is the justification of their logic. Every (legitimate) rebellion has this form.

And as a result, for Camus, universality is not a matter of Badiou’s virtuality, but of actuality. Because “[rebellion’s] reasons―the mutual recognition of a common destiny and the communication of men between themselves―are always valid” at the same time they are axiomatic, Camus is demanding concrete coherence between the rebellion’s actions and its axiom (R 283). The axiomatic principles are merely actualized

by their declaration. But this is possible only because Camus does not posit an axiom that is (materially, historically)

transformed into an ethical principle . As a result, though Camus may have supported all of the Libyan rebels’ actions, he has built the framework to sensibly ask the ethical question of them, even though it is based in particularity.

This is because the actual universality Camus posits provides a substantial ethics: murder is the limit of rebellion and cannot be justified. “Logically,” he says, “one should reply that murder and rebellion are contradictory. If a single master should, in fact, be killed, the rebel, in a certain way, is no longer justified in using the term community of

men from which he derived his justification” (R 281). The claim is drastic: to murder anyone, even the source of injustice, is unjustifiable. It denies all egalitarian maxims by denying the victim the chance to meet rebellion’s demand―and it does so because Camus’ concern is actuality: Badiou’s universality in principle holds whether acted upon or not. But Camus shows in the first three sections of The Rebel that rebellions that have accepted murder became incoherent.[27]

However, Camus did not forswear murder―he claimed that it was a limit that could be met exactly once. On the one hand, it is simply utopian to refuse the use of violence in politics : Assad must be overthrown for the sake of creating a democracy. But Camus has already denied historical justification as nihilistic and incoherent. And yet inaction would implicitly accept the unjust status quo . So, then, murder is necessary but unjustifiable ; the rebel “kills and dies so that it shall be clear that murder is impossible .”

Camus navigates this paradox by insisting on murder’s exceptional status . One should rebel, even by murder , but simultaneously recognize murder as contrary to one’s own principles . An act of murder, we can say, will be legitimate but not just : legitimate in battling the unjust present, but unjust itself because legitimacy cannot clear the rebel of guilt. This claim―which is the core of Camus’ argument against

Robespierre and Lenin, as well as his defense of the Russian terrorist Kaliayev―asserts that history cannot enter into politics’ logic. This time, this point in history may legitimize an act, but it cannot justify that act because ethical principles are eternal. Their universality must be protected in the material actions throughout the rebellion.

For this reason, even the legitimacy of murder is conditional .[28] First, the victim must be a cause of the present injustices―e.g., the master of the slaves or the Ba’athist dictator. The murder of innocents can only be

legitimated by historicist arguments unavailable to the coherent rebel. Second, the rebel’s act must be recognized as a crime by her own standards. She must recognize her own guilt as a failure to cohere with her axiom : only this

recognition ensures murder remains exceptional , protecting a practical manifestation of the rebellion’s logic. The crime of Saint-Just and Robespierre was allowing the Terror to become an institution that altered the rebellion’s logic.

**Counter-terror Debate

AT: Counter-terror ineffective/ AT: Losing WOTIt’s not a question of “have we defeated all the terrorists” but instead, “how do we most effectively combat terrorism?” – the plan robs intelligence agencies of the tools needed to prevent large scale attacks—that’s all of our link ev

And – counter-terrorism is working now Zenko 2015 (Micah; CIA Director: We’re Winning the War on Terror, But It Will Never End; Apr 8; blogs.cfr.org/zenko/2015/04/08/cia-director-were-winning-the-war-on-terror-but-it-will-never-end/; kdf)

Last night, Director of Central Intelligence John Brennan participated in a question-and-answer session at Harvard Kennedy School’s Institute of Politics. The first thirty-seven minutes consisted of an unusually probing exchange between Brennan and Harvard professor Graham Allison (full disclosure: Graham is a former boss of mine). Most notably, between 19:07 and 29:25 in the video, Allison pressed Brennan repeatedly about whether the United States is winning the war on terrorism and why the number of al-Qaeda-affiliated groups has only

increased since 9/11: “There seem to be more of them than when we started…How are we doing?” Brennan replied: If I look across the board in terms of since 9/11 at terrorist organizations, and if the United States in all of its various forms. In intelligence, military, homeland security, law enforcement, diplomacy. If we were not as engaged against the terrorists, I think we would be facing a horrendous, horrendous environment . Because they would

have taken full advantage of the opportunities that they have had across the region… We have worked collectively as a government but also with our international partners very hard to try and root many of them out. Might some of these actions be stimulants to others joining their ranks? Sure, that’s a possibility. I think, though it has taken off of the battlefield a lot more terrorists, than it has put on. This statement is impossible to evaluate or measure because the U.S. government has consistently refused to state publicly which terrorist organizations are deemed combatants, and can therefore be “taken out on the battlefield.” However, relying upon the State Department’s annual Country Reports on Terrorism,the estimated strength of all al-Qaeda-affiliated groups has grown or stayed the same since President Obama came into office. Of course, non-al-Qaeda-affiliated groups have arisen since 9/11, including the self-proclaimed Islamic State, which the Central Intelligence Agency estimated last September to contain up to 31,500 fighters, and Boko Haram, which has perhaps 10,000 committed members. However, the most interesting question posed to Brennan came at the very end from a

Harvard freshman who identified himself as Julian: “We’ve been fighting the war on terror since 2001. Is there an end in

sight, or should we get used to this new state of existence? Brennan replied: It’s a long war, unfortunately . But it’s been a war that has been in existence for millennia, at the same time—the use of violence for political purposes against

noncombatants by either a state actor or a subnational group. Terrorism has taken many forms over the years. What is more challenging now is, again, the technology that is available to terrorists, the great devastation that can be created by even a handful of folks, and also mass communication that just proliferates all of this activity and incitement and encouragement . So you have an environment now that’s very conducive to that type of propaganda and recruitment efforts, as well as the ability to get materials that are going to kill people. And so this is going to be something, I

think, that we’re always going to have to be vigilant about. There is evil in the world and some people just want to kill for the

sake of killing…This is something that, whether it’s from this group right now or another group, I think the ability to cause damage and violence and kill will be with us for many years to come. We just have to not kill our way out of this because that’s not going to address it. We need to stop those attacks that are in train but we also have to address some of those underlying factors and conditions. I’m not saying that poverty causes somebody to become a terrorist, or a lack of governance, but they certainly do allow these

terrorist organizations to grow and they take full advantage of those opportunities. To summarize, the war on terrorism is working, compared to inaction or other policies. But, the American people should expect it to continue for millennia, or as long as lethal technologies and mass communication remain available to evil people.

xt - Counter-terror effective American counter-terrorism measures are effective Bonn 6/17/2015 (Steve [producer of the Rachel Maddow Show]; The scope of Obawww.msnbc.com/rachel-maddow-show/the-scope-obamas-counter-terrorism-successes; kdf)

Whenever the political world’s attention turns to matters of national security and terrorism, Republican criticisms of President Obama feature familiar talking points. The president isn’t “aggressive” enough, they say. His approach must be “tougher,” like the policies adopted by the Bush/Cheney administration. Obama’s counter-terrorism policies are so ineffective, the right insists, that the White House won’t even use the

specific words – “radical Islamic terrorism” – that Republicans demand to hear. But the gap between GOP rhetoric and national-security reality continues to grow. We learned yesterday, for example, that a U.S. airstrike killed Nasir al-Wuhaysh, al Qaeda’s No. 2 official – and the top guy in al Qaeda in the Arabian Peninsula. As Rachel noted on the show last night,

his death is a “huge deal,” especially given the terrorist plots al-Wuhaysh has helped oversee. NBC News had a helpful report yesterday on the frequency with which U.S. strikes have successfully targeted al Qaeda’s top leaders. Since Navy SEALs killed

[Osama bin Laden] in 2011, American drone strikes have taken out seven potential candidates to succeed him as the leader of what was once the most-feared terror gang. The targeted attacks started within weeks of bin Laden’s death. Three al Qaeda higher-ups were killed in June, August and September of 2011, followed by another three in late 2012 and early 2013…. Now, the death of 38-year-old Wuhayshi – killed in a strike on Friday – is seen by American intelligence officials as a major blow to al Qaeda, which is struggling with decimated ranks and ideological competition from the Islamic State. I’m reminded of this piece in The Atlantic last fall, when Jeffrey Goldberg, hardly a liberal, wrote, “Obama has become the greatest terrorist hunter in the history of the presidency.” It’s a detail Republicans simply don’t know what to do with, so they ignore it and pretend the president is indifferent to matters of national security, all evidence to the contrary notwithstanding. While GOP officials and candidates continue to insist that what really matters is word-choice,

Obama’s counter-terrorism strategy includes so many successes, they no longer generate much attention. Notice, for example, just how little chatter al-Wuhaysh’s death garnered yesterday. There is, of course, an entirely different side of the debate. Yes, Republican rhetoric is divorced from reality. Yes, Obama has successfully targeted a wide variety of prominent terrorist leaders. But there are all kinds of related questions that often go overlooked: do U.S. strikes deter or prevent future terrorist threats? Is the U.S. policy entirely consistent with the law? What are the implications of a policy reliant on drones? Should Americans expect the current national-security policy to remain in place indefinitely? What happens when one terrorist leader is killed, but he’s replaced by someone worse?

xt - Terror attacks downEven if they don’t solve all attacks, counter-terror measures are reducing the frequency and severity – the plan throws the baby out with the bathwater Gutierrez et al 6/20/2015 (ARES P. GUTIERREZ, CATHERINE S. VALENTE AND AFP; US notes 24% drop in terror attacks in PH; www.manilatimes.net/us-notes-24-drop-in-terror-attacks-in-ph/193594/; kdf)

According to the Country Reports on Terrorism 2014 prepared by the State Department’s Bureau of Counterterrorism, the drop in the number of attacks was attributed to the improved cooperation between Manila and Washington. “Terrorist groups, including the Abu Sayyaf Group (ASG), Jemaah Islamiya (JI), and the Communist People’s Party/New People’s Army

(CPP/NPA), were unable to conduct major attacks compared to previous years due to continuous pressure from Philippine counterterrorism and law enforcement efforts. Terrorist groups’ acts included criminal activities designed to generate revenue for self-sustainment, such as kidnapping for ransom, extortion, and bombings for hire,” the report which was posted on the State Department’s website said. The report however said that despite “sustained pressure on terrorist organizations,” terrorist and rebel groups in Mindanao managed to retained its capability to make improvised bombs and engage in small-scale attacks. The State Department likewise gave credit to the progress in the implementation of the country’s Internal Peace and Security Plan which calls for the transition of internal security operations from the military to the Philippine National Police. It however branded the transition as “slow and ineffective”. “Continued violent extremist activity, as well as counterterrorism gaps between the AFP and the PNP, slowed this transition and forced the AFP to continue playing the lead counterterrorism role in the Philippines,” the report said. The State Department also took note of the government’s push to enact the proposed Bangsamoro Basic Law and efforts to curb the potential threat posed by radical supporters of the Islamic State in Iraq and the Levant (ISIL) and the risk of ISIL elements traveling to the Philippines to promote violent extremism in the country or seek safe haven as among the situations to watch out for in the Philippines. Commenting on the State Department’s report, Communications Secretary Herminio Coloma said the Philippines is “firmly determined to address these challenges”. “Government is firmly determined to address these challenges through intensified security measures and pursuit of peace-building initiatives,” he said in a text message. The State Department report mentioned the Aquino administration’s move to prioritize having the 2007 Human Security Act amended to enable it to conform to international standards; ease the strict monetary penalties and prison terms against law enforcement officials involved in cases where individuals are wrongly accused and later acquitted; and remove barriers to support investigations. “The (Anti-Terrorism Council) Project Management Center, in coordination with the Anti-Money Laundering Council (AMLC) Secretariat and the Presidential Legislative Liaison Office, ensured the final version of the HSA was fully in line with the Terrorism Financing Prevention Act and other Anti-Money Laundering Act and Philippine government initiatives prior to submission to the House of Representatives,” the report said. While the report criticizes the limited capabilities and “mixed record of accountability and respect for human rights of specialized counterterrorism units like the National Bureau of Investigation and the PNP Special Action Force, it gave credit to the continued improvement in the security of Philippine passports. It also mentioned the country’s commitment to improve transportation and port security by increasing security capabilities at its airports, seaports, and bus terminals. The State Department report moreover said an “under-resourced and understaffed law enforcement and judicial system, coupled with widespread official corruption” led to “limited domestic investigations, unexecuted arrest warrants, few prosecutions, and lengthy trials of cases.” “Philippine investigators and prosecutors lacked necessary tools to build strong cases, including a lack of clear processes for requesting judicially-authorized interception of terrorist communications, entering into plea bargains with key witnesses, and seizing assets of those suspected in benefiting from terrorism,” it said. The full State Department reported said there were 13,463 attacks in 95 countries in 2014 — up by a third from the year before — with Iraq, Pakistan and Afghanistan bearing the brunt of extremist violence, the State Department said in a report. The largest number of attacks were carried out by Islamic State (IS) militants, who unleashed 1,083 assaults last year as part of a deadly march across Iraq and Syria. The Taliban were the next most lethal group, with 894 attacks. There was also a sharp rise in violence in Nigeria, where Boko Haram’s Islamist

militants have been spreading terror in the north. Some 7,512 people were killed in 662 attacks. The report also highlighted a rise in “lone offender violent extremists in the West” such as the Charlie Hebdo attacks in January in Paris. “The terrorism challenges that we face continue to evolve at a rapid pace and we cannot predict with precision what the landscape will look like one decade or even really a year from now,” said top US

counterterrorism envoy Tina Kaidanow, unveiling the 2014 Country Reports on Terrorism. “We must do more to address the cycle of violent extremism and transform the very environment from which these terrorist movements emerge.” Acknowledging that most of the recorded attacks were in war zones, Kaidanow denounced the “savagery” seen last year which had spurred the high death toll. Kidnappings also jumped by a third, with more than 9,400 people taken hostage, three times as many as in 2013. Ransoms have been used by both IS and Al-Qaeda as an effective way to raise money. But Kaidanow said the numbers did not tell the

whole story, saying the US has been effective over the past year in building up a coalition to help fight militant groups, choke off funding and stem the flow of foreign fighters.

Aff

AT: Generic LinkLeading experts—surveillance doesn’t solve terrorBaker and Sanger 2015 (Peter and David E; Why the NSA Isn't Howling over restrictions; May 1; www.nytimes.com/2015/05/02/us/politics/giving-in-a-little-on-national-security-agency-data-collection.html; kdf)

The foundation’s analysis said the bill “should end” the bulk collection of “everybody’s phone records.” But it pointed out that the N.S.A. could still search for records beyond telephone data with fewer restrictions. And it noted that the bill would not address warrantless collection of Americans’ international calls and e-mails under Section 702 of the Foreign Intelligence Surveillance Act amendments of 2008. The future of the bulk collection program may have been sealed in December 2013, when a panel of experts appointed by Mr. Obama found that the program had been of minimal intelligence value and ran considerable risks of invading privacy. “N.S.A. believes that on at least a few occasions, information derived” had “contributed to its efforts to prevent possible terrorist attacks, either in the United States or somewhere else in the world,” the report said. But the panel concluded that its review showed that the information collected under the program “was not essential to preventing attacks and could readily have been obtained in a timely manner using conventional” court orders. The panel recommended legislation that “terminates the storage of bulk telephony metadata by the government” and that it be held instead by telecommunications companies or some other third party, ensuring that the government gained access only when the Foreign Intelligence Surveillance Court issued an order. Although the government said nothing at the time, General Alexander, then in his last months as the head of the N.S.A., told Mr. Obama that it would be preferable if legislation were passed that moved the program to private hands.

AT: Link – Drones AffDrones are inefficient mechanism to solve terrorismRothfuss 2014 (Ian F [George Mason School of Law]; Student Comment: An Economic Perspective on the Privacy Implications of Domestic Drone Surveillance; 10 J.L. Econ. & Pol'y 441; kdf)

Conclusion

U.S. citizens want to be safe from terrorist attacks and other threats, but not at the expense of their privacy rights. Therefore, a delicate balance must be achieved between privacy and security interests. Drones represent a surveillance technology advancement that threatens to dramatically alter the balance between these interests. As discussed in this comment, the current legal framework does not adequately protect privacy from the widespread surveillance that will likely result from the unrestricted domestic use of drones. Therefore, prompt legislative action is necessary to address the fundamental privacy challenges presented by the use of drones. Such legislation should allow for constructive use of drones within a framework that contains restrictions to protect individual privacy rights. While widespread general surveillance could make the nation safer from crime and terrorism, such extensive surveillance will ultimately be inefficient. The surveillance that could result from the domestic use of drones would detract from individual privacy and cause individuals to reduce productive activities and invest in countermeasures. Such "privacy disutility" will outweigh the societal benefits unless domestic drone surveillance is restricted. Therefore, [*462] without legislative action we may soon live in a world where "every time we walk out of our front door we have to look up and wonder whether some invisible eye in the sky is monitoring us." n175

Link turnSurveillance makes counter-terror tools ineffectiveCorrigan 2015 (Ray [senior lecturer in mathematics, computing, and technology at the Open University, U.K.]; Mass Surveillance Will Not Stop Terrorism; Jan 25; www.slate.com/articles/health_and_science/new_scientist/2015/01/mass_surveillance_against_terrorism_gathering_intelligence_on_all_is_statistically.html; kdf)

Police, intelligence, and security systems are imperfect. They process vast amounts of imperfect intelligence data and do not have the resources to monitor all known suspects 24/7. The French authorities lost track of these extremists long enough for them to carry

out their murderous acts. You cannot fix any of this by treating the entire population as suspects and then engaging in suspicionless, blanket collection and processing of personal data. Mass data collectors can dig deeply into anyone’s digital persona but don’t have the resources to do so with everyone. Surveillance of the entire population, the vast majority of whom are innocent, leads to the diversion of limited intelligence resources in pursuit of huge numbers of false leads. Terrorists are comparatively rare, so finding one is a needle-in-a-haystack problem. You

don’t make it easier by throwing more needleless hay on the stack. It is statistically impossible for total population surveillance to be an effective tool for catching terrorists. Even if your magic terrorist-catching machine has a false positive rate of 1 in 1,000—and no security technology comes anywhere near this—every time you asked it for suspects in the U.K. it would flag 60,000 innocent people. Law enforcement and security services need to be able to move with the times, using modern digital technologies intelligently and through targeted data preservation—not a mass surveillance regime—to engage in court-supervised technological surveillance of individuals whom they have reasonable cause to suspect. That

is not, however, the same as building an infrastructure of mass surveillance. Mass surveillance makes the job of the security services more difficult and the rest of us less secure.

Less data leads to effective data, the aff is key to solve terrorismSchwartz 2015 (Mattathias [Staff writer @ The New Yorker]; The Whole Haystack; Jan 26; www.newyorker.com/magazine/2015/01/26/whole-haystack; kdf)

Before the event, every bit of hay is potentially relevant. “The most dangerous adversaries will be the ones who most successfully disguise their individual transactions to appear normal, reasonable, and legitimate,” Ted Senator, a data scientist

who worked on an early post-9/11 program called Total Information Awareness, said, in 2002. Since then, intelligence officials have often referred to “lone-wolf terrorists,” “cells,” and, as Alexander has put it, the “terrorist who walks among us,” as though Al Qaeda were a fifth column, capable of camouflaging itself within civil society. Patrick Skinner, a former C.I.A. case officer who works with the Soufan Group, a security company, told me that this image is wrong. “We knew about these networks,” he said, speaking of the Charlie Hebdo

attacks. Mass surveillance, he continued, “gives a false sense of security. It sounds great when you say you’re monitoring

every phone call in the United States. You can put that in a PowerPoint. But, actually, you have no idea what’s going on.” By flooding the system with false positives, big-data approaches to counterterrorism might actually make it harder to identify real terrorists before they act. Two years before the Boston Marathon bombing, Tamerlan Tsarnaev, the older of the two brothers alleged to have committed the attack, was assessed by the city’s Joint Terrorism Task Force.

They determined that he was not a threat. This was one of about a thousand assessments that the Boston

J.T.T.F. conducted that year, a number that had nearly doubled in the previous two years, according to the Boston F.B.I. As of 2013, the Justice Department has trained nearly three hundred thousand law-enforcement officers in how to file “suspicious-activity reports.” In 2010, a central database held about three thousand of these reports; by 2012 it had grown to almost twenty-eight thousand. “The bigger haystack makes it harder to find the needle,” Sensenbrenner told me. Thomas Drake, a former N.S.A. executive and whistle-blower who has become one

of the agency’s most vocal critics, told me, “If you target everything, there’s no target.” Drake favors what he calls “a traditional law-enforcement” approach to terrorism, gathering more intelligence on a smaller set of

targets. Decisions about which targets matter, he said, should be driven by human expertise, not by a database.

xt—Link Turn: DA=Self-fulfilling prophecyThe fear of terrorism justifies the expansion of surveillance, but fails to solve terrorWeiss 2015 (Leonard [visiting scholar at Stanford University’s Center for International Security and Cooperation]; On fear and nuclear terror; Mar 3; Bulletin of the Atomic Scientists 2015, Vol. 71(2) 75–87; kdf)

The rise of the national surveillance state. Lowering the risk of terrorism, particularly the nuclear kind, is the quintessential reason that the mandarins of the national security state have given for employing the most invasive national surveillance system in history. “Finding the needle in the haystack” is how some describe the effort to discern terrorist

plots from telephone metadata and intercepted communications. But the haystack keeps expanding, and large elements of the American population appear willing to allow significant encroachments on the constitutional protections provided by the Fourth Amendment. The fear of terrorism has produced this change in the American psyche even though there is no evidence that the collection of such data has resulted in the discovery of terrorist plots beyond those found by traditional police and intelligence methods. It is

doubtful that we shall soon (if ever) see a return to the status quo ante regarding constitutional protections. This reduction in the freedom of Americans from the prying eyes of the state is a major consequence of the hyping of terrorism, especially nuclear terrorism. This is exemplified by the blithe conclusion in the previously referenced paper by Friedman and Lewis (2014), in which readers are advised to “be more proactive in supporting our government’s actions to ameliorate potential risks.” The National Security Agency should love this.

Link Turn - DronesFederal regulation of drones is necessary to build safeguards against cyber warBernd 2013 (Candice [assistant editor/reporter with Truthout]; The Coming Domestic Drone Wars; Sep 19; www.truth-out.org/news/item/18951-the-coming-domestic-drone-wars#; kdf)

Domestic Drone Weaknesses Cyber warfare may prove to be the most enduring challenge for the FAA when it comes to ensuring guidelines that will protect Americans adequately as drone technology makes its transition into civilian life. Peter Singer is the director of the Center for 21st Century Security and Intelligence and a senior fellow in the Foreign Policy program at Brookings Institute. He is the author of Wired for War: The Robotics Revolution and Conflict in the 21st Century.

According to him, the primary weakness of drone technology is many systems' dependence on GPS signals and remote operation. Even military-grade drone technology can be co-opted , he said. In December 2011, the Iranian Army's electronic warfare unit brought down an American drone, the RQ-170 Sentinel, after it crossed into Iranian airspace. In Iraq in 2009, Iraqi insurgents were able to use $26 software to intercept the video feeds of US Predator drones in a manner "akin to a criminal listening

in on the police radio scanner," Singer told Truthout. Most recently, a research team at the University of Texas was able to demonstrate successfully the spoofing of a UAV by creating false civil GPS signals that trick the drone's GPS receiver. "There aren't easy answers to these other than good encryption requirements," Singer told Truthout in an email. The Texas research team hoped to demonstrate the dangers of spoofing early on in the FAA's task to write the mandated rules for UAS integration in the

national airspace, and the Department of Homeland Security invited the team to demonstrate the spoofing in New Mexico. "Vulnerability to jamming and spoofing depends highly on the design of the aircraft and control systems and vary across differing architectures. Minimum system performance and design standards developed for civil UAS designs will address these vulnerabilities," an FAA spokesman told Truthout. Whether minimum standards for system performance will be enough to address the changing dynamic of cyber warfare, and for that matter,

technology, remains a question, but it's something the FAA and Homeland Security are examining as drone technology becomes more widespread in the US.

AT: ExpertsTheir “experts” have motive to exaggerate the likelihood of an attack Weiss 2015 (Leonard [visiting scholar at Stanford University’s Center for International Security and Cooperation]; On fear and nuclear terror; Mar 3; Bulletin of the Atomic Scientists 2015, Vol. 71(2) 75–87; kdf)

There is a tendency on the part of security policy advocates to hype security threats to obtain support for their desired policy outcomes. They are free to do so in a democratic society, and most come by their advocacy through genuine conviction

that a real security threat is receiving insufficient attention. But there is now enough evidence of how such advocacy has been distorted for the purpose of overcoming political opposition to policies stemming from ideology that careful public exposure and examination of data on claimed threats should be part of any such debate .

Until this happens, the most appropriate attitude toward claimed threats of nuclear terrorism, especially when accompanied by

advocacy of policies intruding on individual freedom, should be one of skepticism. Interestingly, while all this attention to nuclear terrorism goes on, the United States and other nuclear nations have no problem promoting the use of nuclear power and national nuclear programs (only for friends, of course) that end up creating more nuclear materials that can be used for weapons. The use of civilian nuclear programs to disguise national weapon ambitions has been a hallmark of proliferation history ever since the Atoms for Peace program (Sokolski, 2001), suggesting that the real nuclear threat resides where it always has resided-in national nuclear programs; but placing the threat where it properly belongs does not carry the public-relations frisson currently attached to the word “terrorism.”

No Terror Attack Terrorists lack the motivation to get the bomb – even if they did, they’d never pull off an attackWeiss 2015 (Leonard [visiting scholar at Stanford University’s Center for International Security and Cooperation]; On fear and nuclear terror; Mar 3; Bulletin of the Atomic Scientists 2015, Vol. 71(2) 75–87; kdf)

A recent paper (Friedman and Lewis, 2014) postulates a scenario by which terrorists might seize nuclear materials in Pakistan for fashioning a weapon. While jihadist sympathizers are known to have worked within the Pakistani nuclear establishment, there is little to no evidence that terrorist groups in or outside the region are seriously trying to obtain a nuclear capability. And Pakistan has been operating a uranium enrichment plant for its weapons program for nearly 30 years with no credible reports of diversion of HEU from the plant. There is one stark example of a terrorist organization that actually started a nuclear effort: the Aum Shinrikyo group. At its peak, this religious cult had a membership estimated in the tens of thousands spread over a variety of countries, including Japan; its members had scientific expertise in many areas; and the group was well funded. Aum Shinrikyo obtained access to natural uranium supplies, but the nuclear weapon effort stalled and was abandoned. The group was also interested in chemical weapons and did produce sarin nerve gas with which they attacked the Tokyo subway system, killing 13 persons. AumShinrikyo is

now a small organization under continuing close surveillance. What about highly organized groups, designated appropriately as terrorist, that have acquired enough territory to enable them to operate in a quasigovernmental fashion, like the Islamic State

(IS)? Such organizations are certainly dangerous, but how would nuclear terrorism fit in with a program for building and sustaining a new caliphate that would restore past glories of Islamic society, especially since, like any organized government, the

Islamic State would itself be vulnerable to nuclear attack? Building a new Islamic state out of radioactive ashes is an unlikely ambition for such groups. However, now that it has become notorious, apocalyptic pronouncements in Western media may begin at any time,

warning of the possible acquisition and use of nuclear weapons by IS. Even if a te rror group were to achieve technical nuclear proficiency, the time, money, and infrastructure needed to build nuclear weapons creates significant risks of discovery that would put the group at risk of attack. Given the ease of obtaining conventional explosives and the ability to deploy them, a terrorist group is unlikely to exchange a big part of its operational program to engage in a risky nuclear development effort with such doubtful prospects. And, of course, 9/11 has heightened sensitivity to the need for protection, lowering further the probability of a successful effort.

xt—No nuclear terrorNo risk of nuclear terror – leading expertWeiss 2015 (Leonard [visiting scholar at Stanford University’s Center for International Security and Cooperation]; On fear and nuclear terror; Mar 3; Bulletin of the Atomic Scientists 2015, Vol. 71(2) 75–87; kdf)

Fear of nuclear weapons is rational, but its extension to terrorism has been a vehicle for fear-mongering that is unjustified by available data. The debate on nuclear terrorism tends to distract from events that raise the risk of nuclear war, the consequences of which would far exceed the results of terrorist attacks . And the historical record shows that the war risk is real. The Cuban Missile Crisis and other confrontations have demonstrated that miscalculation, misinterpretation, and misinformation could lead to a ‘close call’ regarding nuclear war. Although there has been much commentary on the

interest that Osama bin Laden, when he was alive, reportedly expressed in obtaining nuclear weapons, evidence of any terrorist group working seriously toward the theft of nuclear weapons or the acquisition of such weapons by other means is virtually nonexistent. The acquisition of nuclear weapons by terrorists requires significant time, planning, resources, and expertise, with no guarantees that an acquired device would work . It requires putting aside at least some aspects of a groups more immediate activities and goals for an attempted operation that no terrorist group has accomplished. While absence of evidence does not mean evidence of

absence, it is reasonable to conclude that the fear of nuclear terrorism has swamped realistic consideration of the threat.

AT: Lone WolvesNo lone wolf terrorBecker, 12/14/14 [The Foreign Policy Essay: Wolves Who Are Lonely By Michael Becker Sunday, December 14, 2014 at 10:00 AM, Michael Becker is a Ph.D. student in political science at Northeastern University. His research focuses on international security, conflict, and terrorism. He can be reached at [email protected]://www.lawfareblog.com/2014/12/the-foreign-policy-essay-wolves-who-are-lonely/]

But much of the fear surrounding lone wolves is unwarranted and based on ignorance of how they operate. My research

shows that lone-actor terrorists tend to conform to certain distinct patterns that can be useful in preventing future

attacks. Perhaps more important, my findings indicate that lone wolves are not nearly as threatening as either their name or the hype around them suggest. Becker photoThe concern about lone-wolf terrorism pervades much of the U.S. national security establishment. President Obama, former Secretary of Homeland Security Janet Napolitano, and current DHS Secretary Jeh

Johnson, among others, have cited lone wolves as one of the gravest potential threats to U.S. security. They point to the rise of social media and terrorist propaganda, like the sophisticated videos produced by the Islamic State, and express concern that socially isolated individuals can

become radicalized with troubling ease. It is true that lone-wolf terrorism against the United States has become more common in the past several years. And several lone-actor attacks—including the 2011 shooting of Representative Gabrielle Giffords, which left six dead, and the 2009 Fort Hood shooting, which killed 13—have had deadly and tragic consequences. Concurrently,

there has been little success in terms of identifying a lone wolf “profile.” They can be young or old; black or white; radical Islamists, right-wing extremists, anti-Semites, militant environmentalists, or of another ideological persuasion altogether. Given the diversity of their backgrounds,

how can such a protean enemy be countered? I recently undertook an analysis of 84 lone-wolf attacks that occurred in the United States between 1940 and 2012 in an effort to identify patterns in the targets that lone wolves chose. I came away with several findings that have important national security

implications. First, similar to our recent experience with the Ebola outbreak, the fear of the thing is usually worse than the thing itself. Few lone-wolf attacks in the United States actually kill anyone , and many others only succeed in killing one person: the lone wolf himself (they are almost invariably men). Many lone wolves are incompetent loners with no experience discharging a bomb or firearm; oftentimes they exhibit behavior that, in retrospect, is more bizarre and sad than frightening . Take Dwight Watson , a.k.a. the “Tractor Man.” In 2003, Watson drove his tractor to Washington, D.C., and threatened to blow up explosives near the National Mall. After two days, he surrendered unceremoniously and it was revealed that he never had any weapons at all. Part of the reason for the low casualty rate in lone-wolf attacks is that unlike groups such al-Qaeda that have significant resources at their disposal and, even more important, a sophisticated division of labor , lone wolves have to do all the work of terrorism themselves —finding a target , planning an attack, gathering supplies, doing reconnaissance , actually carrying out the attack, and possibly executing an escape plan .

This disadvantage is reflected in the weapons most lone wolves choose: firearms. Globally , at the organizational level,

most terrorist attacks are bombings , but lone wolves mainly choose guns. In part, this is because guns can more easily be attained than bombs in the United States, but lone wolves’ preference for firearms obtains globally as

well, suggesting it is driven by their lack of facility with explosives. And a lone gunman—while still potentially able to cause multiple casualties—is likely to produce fewer fatalities than a well-made and

well-placed bomb. Another significant characteristic of lone wolves is their limited ability to select meaningful targets. The expertise needed to conduct a successful attack on a hardened target—not an easy task—is reflected in the targets most lone wolves choose and how they conduct themselves . Lone wolves tend to choose unhardened, undefended targets like college campuses, churches, and local government buildings. Only rarely do they opt for significant or symbolic targets like the National Mall. I suspect that this tendency is due to two factors: the more personal motives that—alongside their political ideologies— inform lone wolves’ violent tendencies ; and the desire to carry out a successful attack , a task made

easier by choosing a softer target. The targets lone wolves choose tend to be congruent with the ideologies that they say motivate them: so anti-abortion lone wolves go after clinics or doctors who perform abortions, while right-wing extremists target government buildings and officials. What is even more striking is that these

small-ball targets tend to be found in or near places well known to perpetrators—the square in their hometown, the synagogue they pass on their way to work, etc. Their daily routines, in other words, are usually the scene of the crime. What should all these patterns mean to counterterrorism officials? They indicate most notably that lone wolves are not as fearsome as they are often made out to be. Lone wolves are only rarely deadly. What is more, when they do manage to kill people, their incompetence and reliance on firearms usually limit the number of deaths. As a result, policymakers’ concern about lone wolves is probably overblown , and the allocation of resources for counterterrorism purposes should take account of this. In some

sense, this requires us to learn to live with the existence of lone-wolf terrorism. Even if the threat were more severe, there are too many potential targets and too many potential lone wolves to expect law enforcement to monitor , detect, and interdict them all.

AT: Cyber attacksNo cyber threatsHealey 13 Jason, Director of the Cyber Statecraft Initiative at the Atlantic Council, "No, Cyberwarfare Isn't as Dangerous as Nuclear War", 3/20, www.usnews.com/opinion/blogs/world-report/2013/03/20/cyber-attacks-not-yet-an-existential-threat-to-the-us

America does not face an existential cyberthreat today, despite recent warnings . Our cybervulnerabilities are

undoubtedly grave and the threats we face are severe but far from comparable to nuclear war . ¶ The most recent alarms come in a Defense Science Board report on how to make military cybersystems more resilient against advanced threats (in short, Russia or China). It warned that the "cyber threat is serious, with potential consequences similar in some ways to the nuclear threat of the Cold War." Such fears were also expressed by Adm. Mike Mullen, then chairman of the Joint Chiefs of Staff, in 2011. He called cyber "The single biggest existential threat that's out there" because "cyber actually more than theoretically, can attack our infrastructure, our financial systems."¶ While

it is true that cyber attacks might do these things, it is also true they have not only never happened but are far more difficult to accomplish than mainstream thinking believes . The consequences from cyber threats may be similar in some ways to nuclear, as the Science Board concluded, but mostly, they are incredibly dissimilar. ¶ Eighty years ago, the generals of the U.S. Army Air Corps were sure that their bombers would easily topple other countries and cause their populations to panic, claims which did not stand up to

reality. A study of the 25-year history of cyber conflict, by the Atlantic Council and Cyber Conflict Studies Association, has shown a similar dynamic where the impact of disruptive cyberattacks has been consistently overestimated . ¶ Rather than theorizing about future cyberwars or extrapolating from today's concerns, the history of cyberconflict that have actually been fought, shows that cyber incidents have so far tended to have effects that are either widespread but fleeting or persistent

but narrowly focused. No attacks, so far, have been both widespread and persistent. There have been no authenticated cases of anyone dying from a cyber attack. Any widespread disruptions, even the 2007 disruption against Estonia, have been short-lived causing no significant GDP loss. ¶ Moreover, as with conflict in other domains, cyberattacks can take down many targets but keeping them down over time in the face of determined defenses has so far been out of the range of all but the most dangerous adversaries such as Russia and China. Of course, if the United States is in a conflict with those nations, cyber will be the least important of the existential threats policymakers should be worrying about. Plutonium trumps bytes in a shooting war.¶ This is not all good news. Policymakers have recognized the problems since at least 1998 with little significant progress. Worse,

the threats and vulnerabilities are getting steadily more worrying. Still, experts have been warning of a cyber Pearl Harbor for 20 of the 70 years since the actual Pearl Harbor . ¶ The transfer of U.S. trade secrets through Chinese cyber espionage could someday accumulate into an existential threat. But it doesn't seem so seem just yet, with only handwaving estimates of annual losses of

0.1 to 0.5 percent to the total U.S. GDP of around $15 trillion. That's bad, but it doesn't add up to an existential crisis or "economic cyberwar."

ISIS is structurally incapable of being a threatMatthews and Preble 2015 (Dylan and Christopher [Cato's vice president for defense and foreign policy studies]; Ignore the headlines. The world is getting safer all the time.; Jan 15; www.vox.com/2015/1/14/7546165/world-getting-safer; kdf)

DM: Did ISIS change your thinking on this at all? ISIS fighter An ISIS fighter in Syria. (AFP/Getty Images) CP: Not really, for a couple reasons. ISIS may be a terrorist organization, and may be an insurgency, and may be a quasi-nation-state or attempting to become a quasi-nation-state, but it's hard to be all of those things simultaneously. Austin Long writes about this in his chapter, about the differences between insurgents and terrorists. Most terrorists operate in the shadows. The hard part is not killing them, it's finding them. That's why traditional counterterrorism is an intelligence and information-gathering process. It's a lot like police work. By declaring itself a state and raising a flag over territory it seizes and

holds, ISIS is trading away one of its key advantages, and opening itself up to more traditional military attacks. It's a virulent, reprehensible state, but it's not clear to me that it's a greater terrorist threat than other organizations that are continuing to operate in the shadows.

AT: Right Wing Extremism Surveillance only increases the risks of right-wing terrorCannon 6/19/2015 (Gabrielle; Should the Charleston Attack Be Called Terrorism; www.motherjones.com/politics/2015/06/charleston-shooting-terrorism-american-extremism; kdf)

The Southern Poverty Law Center, a nonprofit advocacy organization, still maintains a database called "The Extremist Files" that profiles prominent hate groups and extremist movements and ideologies, but Johnson hopes more will be done to get lawmakers to take note. "Hopefully this will get the attention of those in charge of not only enforcement, but also those making our laws," he said. "Try to wrap your arms around this problem and try to actually develop a strategy to combat it and mitigate it. That is not being done." Still, as former Mother

Jones reporter Adam Serwer pointed out in his 2011 coverage of the Sikh temple shooting, surveillance doesn't always lead to prevention and can impede constitutional rights: "Mike German, a former FBI agent who did undercover work infiltrating extremist groups including neo-Nazis and militia groups and is now senior policy counsel for the ACLU, told me that more government surveillance isn't the solution, and that it's a mistake to think there's a technological silver bullet that can flawlessly identify threats before they can be carried out. Most people with extreme views, German says, hold horrible (but constitutionally protected) beliefs they never act on." After Johnson left the DHS, the agency contended it was doing all it could to prevent domestic terror. As WIRED reported, DHS spokesman Matt Chandler responded by saying that the "DHS continues to work with its state, local, tribal, territorial, and private partners to prevent and protect against potential threats to the United States by focusing on preventing violence that is motivated by extreme ideological beliefs."

AT: ISISISIS is structurally incapable of being a threatMatthews and Preble 2015 (Dylan and Christopher [Cato's vice president for defense and foreign policy studies]; Ignore the headlines. The world is getting safer all the time.; Jan 15; www.vox.com/2015/1/14/7546165/world-getting-safer; kdf)

DM: Did ISIS change your thinking on this at all? ISIS fighter An ISIS fighter in Syria. (AFP/Getty Images) CP: Not really, for a couple reasons. ISIS may be a terrorist organization, and may be an insurgency, and may be a quasi-nation-state or attempting to become a quasi-nation-state, but it's hard to be all of those things simultaneously. Austin Long writes about this in his chapter, about the differences between insurgents and terrorists. Most terrorists operate in the shadows. The hard part is not killing them, it's finding them. That's why traditional counterterrorism is an intelligence and information-gathering process. It's a lot like police work. By declaring itself a state and raising a flag over territory it seizes and holds, ISIS is trading away one of its key advantages, and opening itself up to more traditional military attacks. It's a virulent, reprehensible state, but it's not clear to me that it's a greater terrorist threat than other organizations that are continuing to operate in the shadows.

xt – No ISIS TerrorNo threat of ISIS terrorism – litany of reasonsByman and Shapiro 2015 (Daniel L [research director @ Center for Middle East Policy, Brookings] and Jeremy [Fellow @ Brookings]; Be Afraid. Be A Little Afraid: The Threat of Terrorism from Western Foreign Fighters in Syria and Iraq; January; www.brookings.edu/research/papers/2015/01/western-foreign-fighters-in-syria-and-iraq-byman-shapiro?rssid=LatestFromBrookings; kdf)

Despite these fears and the real danger that motivates them, the Syrian and Iraqi foreign fighter threat can easily be exaggerated. Previous cases and information emerging from Syria suggest several mitigating effects that may reduce—but hardly eliminate—the potential terrorist threat from foreign fighters who have gone to Syria. Those mitigating factors

include: • Many die, blowing themselves up in suicide attacks or perishing quickly in firefights with opposing forces.

• Many never return home, but continue fighting in the conflict zone or at the next battle for jihad. • Many of the foreign fighters quickly become disillusioned, and a number even return to their home country without engaging in further violence. • Others are arrested or disrupted by intelligence services. Indeed, becoming a foreign fighter—particularly with today’s heavy use of social media—makes a

terrorist far more likely to come to the attention of security services. The danger posed by returning foreign fighters is real, but American and European security services have tools that they can successfully deploy to mitigate the threat . These tools will have to be adapted to the new context in Syria and Iraq, but they will remain useful and effective. Key Policy Recommendations The model below shows how the various mitigating factors and effective policies can (though not necessarily will) lessen the danger presented by foreign fighters. Complex Model of Foreign Fighter Radicalization Complex Model of Foreign Fighter Radicalization Decide First is the decision stage. It makes sense to reduce the numbers of those going to the conflict zone in the first place by interfering in the decision to go. After all, those who do not go cannot be radicalized by foreign fighting. Western countries should push a counter-narrative that stresses the brutality of the conflict and the internecine violence among jihadists. However, in general, governments are poor at developing counter-narratives and lack community credibility. It is usually better to elevate existing voices of community leaders who already embrace the counter-narrative than to try to handle this directly through government channels. Also vital is developing peaceful alternatives for helping the people affected by the conflicts in the Middle East. Some fighters—certainly not all but a significant portion—were originally motivated by a genuine desire to defend the Syrian people against the brutality of the Assad regime. Encouraging charitable activities, identifying legitimate channels for assistance, and otherwise highlighting what concerned individuals can do to help alleviate the suffering of the Syrian people may siphon off some of the supply of foreign fighters. Local programs for providing assistance can also improve domestic intelligence gathering capabilities in two ways, according to Western security service officials. First, simply being out and about in the community gives government officials more access to information about potential radicals. Families become comfortable with intelligence services, as do community leaders. Second, such programs allow intelligence officials to gain access to individuals who can potentially be recruited to inform on other would-be jihadists. Desired Results: • Talked out of joining the foreign militias by family or community intervention. • Choose peaceful alternative to fighting. Travel The second stage in the foreign fighter radicalization process is the travel to Syria. Disrupting the transit route via Turkey is one of the most promising ways of reducing the threat of foreign fighters to Europe and the United States. Doing so will primarily require better cooperation between Western governments and Turkish authorities, who have not always seen stopping the flow of fighters as their highest priority. But as Turkish authorities are now becoming more worried about the jihadist threat to Turkey, Western security services should establish channels with Turkish intelligence and police to warn them of the presence of specific individuals headed to Syria through Turkey and to encourage Turkey to turn them away from the Turkish border or stop them at the Syrian border and deport them. Though there are other ways into Syria, all are far harder and more costly for Western fighters. Security cooperation among European services and between European and American services is also essential. Intelligence collected from the communications of foreign fighters, shared open source monitoring, and other information from one service can prove vital for discovering transnational networks. Cooperation within Europe is indispensable for stopping travel as jihadists from one European country often try to travel to Turkey and then on to Syria via another European country in an effort to avoid detection. Desired Results: • Arrested en route. • Stopped at border and deported. Train and Fight In the third stage of the process, the foreign fighters receive training and fight in Syria or Iraq, mostly out of the reach of European or American influence. But even here, there are subtle ways of influencing the terrorist indoctrination process. Western security agencies should do everything they can to sow doubt in the minds of extremist leaders in Iraq and Syria about the true loyalties of Western Muslim volunteers. Highlighting information gained from recruits and even disinformation about the degree of infiltration by security services can heighten fears. If jihadist organizations come to view foreigners as potential spies or as corrupting influences, they might assign them to non-combat roles, test their allegiances by offering them the one-way ticket of suicide bombings, or even avoid recruiting them altogether. Desired Results: • Die in the combat zone. • Stay abroad and fight. • Become disillusioned with the struggle. Return Upon the foreign fighters’ return, the fourth stage, it is critical to turn them away from violence and jihad. Western services report that they usually know when individuals return and that many return with doubts. As a first step, security services must triage returnees, identifying which ones deserve the most attention: our interviews indicate triaging is done inconsistently (and in some cases not at all) among the Western security services. Inevitably, some dangerous individuals will be missed, and some individuals identified as not particularly dangerous might later become a threat, but a first look is vital for prioritization. Efforts to promote a counter-narrative are valuable, particularly if they involve parents, preachers and community leaders. Community programs deserve considerable attention. The goal should be to move potential terrorists towards non-violence; since many are in that category already, hounding them with the threat of arrest or otherwise creating a sense of alienation can backfire. In the past, family and community members have at times been successful in steering returned fighters toward a different path, even getting them to inform on their former comrades. Indeed, sending returnees to jail for relatively minor crimes such as going abroad to fight with a foreign terrorist organization against a distant enemy may simply put them in prison for a few years and expose them to the radicalizing elements present in many European prisons, where many minor players become exposed to hardened jihadists and integrate into broader networks. Desired Results: • Arrested and jailed. • De-radicalized and reintegrated. • No desire to attack at home. Plot To disrupt foreign fighters in the fifth and final stage of plotting terrorist attacks, security services must remain focused on the returnee problem and have sufficient resources to monitor the problem as it emerges in their countries. The good news is that going to Syria and Iraq and returning home usually does bring one to the attention the security services. But maintaining vigilance as the numbers increase will be difficult purely for reasons of resources. Marc Hecker, a French expert on terrorism, commented that France could handle the “dozens” who returned from Iraq but would be over-whelmed by the “hundreds” who may come back from Syria. Keeping track of that many suspects, is exceptionally resource intensive, particularly if it

involves full-time surveillance. For intelligence services, often the problem is not in accessing or gathering the data, but in processing, analyzing, and following up on it in a timely manner. At the same time, their own effectiveness can work against them: by reducing the problem considerably, they decrease the danger, thereby creating the impression that they need fewer resources. One way to mitigate this effect is for security services to spread the burden of responsibility around by training and sharing information with local police and other law-enforcement and community organizations. Security cooperation among European services and between European and American services is absolutely necessary. Intelligence from the communications of foreign fighters, shared open-source monitoring, and other information obtained by one service can prove crucial for discovering transnational networks. As noted earlier, cooperation within Europe is critical for stopping travel, as jihadists from one European country often try to travel to Turkey and then on to Syria via another European country in order to avoid detection.

Desired Results: • Attack foiled by law enforcement. • Attack fails due to lack of training or wrong skills. Conclusion The United States and Europe already have effective measures in place to greatly reduce the threat of terrorism from jihadist returnees and to limit the scale of any attacks that might occur. Those measures can and should be improved—and, more

importantly, adequately resourced. But the standard of success cannot be perfection. If it is, then Western governments are doomed to fail, and, worse, doomed to an overreaction which will waste resources and cause dangerous policy mistakes.