2ac – t preventative intent (lemos)-+sdi...web view2ac – t preventative intent (lemos) we meet...

34
2ac – t preventative intent (lemos) We meet – their evidence agrees government collection of metadata has preventative intent to stop crime Lemos, 1NC author, 10 – André Lemos, Associate Professor at Faculty of Communication at Federal University of Bahia, Brazil, “Locative Media and Surveillance at the Boundaries of Informational Territories”, ICTs for Mobile and Ubiquitous Urban Infrastructures: Surveillance, Locative Media and Global Networks, Ed. Firmino, p. 130- 132 (Yellow) Although they often appear to be synonymous, it is important to distinguish between informational control , monitoring and surveillance so that the problem can be better understood . We consider control to be the supervision of activities, or actions normally associated with government and authority over people, actions and processes. Monitoring can be considered a form of observation to gather information with a view to making projections or constructing scenarios and historical records, i.e., the action of following up and evaluating data. Surveillance , however, can be defined as an act intended to avoid something , as an observation whose purposes are preventive or as behavior that is attentive, cautious or careful . It is interesting to note that in English and French the two words “vigilant” and “surveillance”, each of which is spelt the same way and has the same meaning in both languages, are applied to someone who is particularly watchful and to acts associated with legal action or action by the police intended to provide protection against crime, respectively. We shall define surveillance as actions that imply control and monitoring in accordance with Gow, for whom surveillance "implies something quite specific as the intentional observation of someone's actions or the intentional gathering of personal information in order to observe actions taken in the past or future" (Gow, 2005, p. 8). According to this definition, surveillance actions presuppose monitoring and control, but not all forms of control and/or monitoring can be called surveillance . It could be said that all forms of surveillance require two elements: intent with a view to avoiding causing something anaqd identification of individuals or groups by name. It seems to me to be difficult to say that there is surveillance if there is no identification of the person under observation (anonymous) and no preventive intent (avoiding something) . To my mind it is an exaggeration to say, for example, that the system run by my cell phone operator that controls and monitors my calls is keeping me under surveillance. Here there is identification but no intent. However, it can certainly be used for that purpose. The Federal Police

Upload: ngothien

Post on 07-Mar-2018

216 views

Category:

Documents


3 download

TRANSCRIPT

Page 1: 2ac – t preventative intent (lemos)-+SDI...Web view2ac – t preventative intent (lemos) We meet – their evidence agrees government collection of metadata has preventative intent

2ac – t preventative intent (lemos)We meet – their evidence agrees government collection of metadata has preventative intent to stop crimeLemos, 1NC author, 10 – André Lemos, Associate Professor at Faculty of Communication at Federal University of Bahia, Brazil, “Locative Media and Surveillance at the Boundaries of Informational Territories”, ICTs for Mobile and Ubiquitous Urban Infrastructures: Surveillance, Locative Media and Global Networks, Ed. Firmino, p. 130-132 (Yellow)Although they often appear to be synonymous, it is important to distinguish between informational control , monitoring and surveillance so that the problem can be better understood . We consider control to be the supervision of activities, or actions normally associated with government and authority over people, actions and processes. Monitoring can be considered a form of observation to gather information with a view to making projections or constructing scenarios and historical records, i.e., the action of following up and evaluating data. Surveillance , however, can be defined as an act intended to avoid something , as an observation whose purposes are preventive or as behavior that is attentive, cautious or careful. It is interesting to note that in English and French the two words “vigilant” and “surveillance”, each of which is spelt the same way and has the same meaning in both languages, are applied to someone who is particularly watchful and to acts associated with legal action or action by the police intended to provide protection against crime, respectively. We shall define surveillance as actions that imply control and monitoring in accordance with Gow, for whom surveillance "implies something quite specific as the intentional observation of someone's actions or the intentional gathering of personal information in order to observe actions taken in the past or future" (Gow, 2005, p. 8). According to this definition, surveillance actions presuppose monitoring and control, but not all forms of control and/or monitoring can be called surveillance . It could be said that all forms of surveillance require two elements: intent with a view to avoiding causing something anaqd identification of individuals or groups by name. It seems to me to be difficult to say that there is surveillance if there is no identification of the person under observation

(anonymous) and no preventive intent (avoiding something) . To my mind it is an exaggeration to say, for example, that the system run by my cell phone operator that controls and monitors my calls is keeping me under surveillance. Here there is identification but no intent. However, it can certainly be used for that purpose. The Federal Police can request wiretaps and disclosure of telephone records to monitor my telephone calls. The same can be said about the control and monitoring of users by public transport operators. This is part of the administrative routine of the companies involved. Once again, however, the system can be used for surveillance activities (a suspect can be kept under surveillance by the companies’ and/or police’s safety systems). Note the example further below of the recently implemented "Navigo" card in France. It seems to me that the social networks, collaborative maps, mobile devices, wireless networks and countless different databases that make up the info rmation society do indeed control and monitor and offer a real possibility of surveillance.

Page 2: 2ac – t preventative intent (lemos)-+SDI...Web view2ac – t preventative intent (lemos) We meet – their evidence agrees government collection of metadata has preventative intent

Counter interp – “surveillance” includes routine data collection – without intent Ball 3 – Kirstie Ball, Professor of Organization at The Open University, and Frank Webster, Professor of Sociology at City University, London, The Intensification of Surveillance: Crime, Terrorism and Warfare in the Information Age, p. 1-2Surveillance involves the observation, recording and categorization of info rmation about people , processes and institutions. It calls for the collection of information, its storage, examination and - as a rule - its transmission. It is a distinguishing feature of modernity, though until the 1980s the centrality of surveillance to the making of our world had been

underestimated in social analysis. Over the years surveillance has become increasingly systematic and embedded in everyday life , particularly as state (and, latterly,

supra-state) agencies and corporations have strengthened and consolidated their positions. More and more we are surveilled in quite routine activities, as we make telephone calls, pay by debit card, walk into a store and into the path of security

cameras, or enter a library through electronic turnstiles. It is important that this routine character of much surveillance is registered , since commentators so often focus exclusively on the dramatic manifestations of surveillance such as communications interceptions and spy satellites in pursuit of putative and deadly enemies. In recent decades, aided by innovations in information and communications technologies (ICTs), surveillance has expanded and deepened its reach enormously. Indeed, it is now conducted at unprecedented intensive and extensive levels while it is vastly more organized and technology-based than hitherto. Surveillance is a matter of such routine that generally it escapes our notice - who, for instance, reflects much on the traces they leave on the supermarkets' checkout, and who worries about the tracking their credit card transactions allow? Most of the time we do not even bother to notice the surveillance made possible by the generation of what has been called transactional information (Burnham, 1983) - the records we create incidentally in everyday activities such as using the telephone, logging on to the Internet, or signing a debit card bill. Furthermore, different sorts of surveillance are increasingly melded such that records collected for one purpose may be accessed and analysed for quite another : the golf club's membership list may be an attractive database for the insurance agent, address lists of subscribers to particular magazines may be especially revealing when combined with other information on consumer preferences. Such personal data are now routinely abstracted from individuals through economic transactions, and our interaction with communications networks, and the data are circulated, as data flows, between various databases via 'information superhighways'. Categorizations of these data according to lifestyle, shopping habits, viewing habits and travel preferences are made in what has been termed the 'phenetic fix' (Phillips & Curry, 2002; Lyon, 2002b), which then informs how the economic risk associated with these categories of people is managed. More generally, the globe is increasingly engulfed in media which report, expose and inflect issues from around the world, these surveillance activities having important yet paradoxical consequences on actions and our states of mind. Visibility has become a social, economic and political issue, and an indelible feature of advanced societies (Lyon, 2002b; Haggerty & Ericson, 2000).

Page 3: 2ac – t preventative intent (lemos)-+SDI...Web view2ac – t preventative intent (lemos) We meet – their evidence agrees government collection of metadata has preventative intent

They overlimit – the storage, maintenance, and administration of metadata is a core controversy of the topic – bracketing out affs that engage in data jacks aff ground – link turns topic education and proves you should prioritize topic coherenceNo ground loss – their core DA’s and CP’s that contest the viability of restricting the process of surveillance still appliesNo limits explosion – literature, substantial, and other words in the rez check infinite regressGenerics check – give the neg a sufficient ability to contest the affExtra T is good inevitable – every aff has a step outside of resolutional bounds – at worst reject the extra t portions of the planReasonability – prevents an arbitrary race to the bottom – judge intervention is inevitable

Page 4: 2ac – t preventative intent (lemos)-+SDI...Web view2ac – t preventative intent (lemos) We meet – their evidence agrees government collection of metadata has preventative intent

2ac – xo cpPerm do the counterplan—doesn’t sever the actor because both defend the Executive“Should” doesn’t require certaintyBlack’s Law 79 (Black’s Law Dictionary – Fifth Edition, p. 1237)Should. The past tense of shall; ordinarily implying duty or obligation; although usually no more than an obligation of propriety or expediency, or a moral obligation, thereby distinguishing it from “ought.” It is not normally synonymous with “may,” and although often interchangeable with the word “would,” it does not ordinarily express certainty as “will” sometimes does.   Agent CPs are bad and a voting issuePerm do the plan and have a validating OCL opinion – we aren’t congressNo solvency, OCL isn’t binding—politics links and Libya proves that the government will circumventJonathan H. Adler 6/17/11 ( “President Overruled OLC on Libya” The Volokh Conspiracy, Johan Verheij Memorial Professor of Law and Director, Center for Business Law & Regulation, Case Western Reserve University School of Law, 7/22/15, http://volokh.com/2011/06/17/president-overruled-olc-on-libya///AKP)The NYT‘s Charlie Savage has confirmed that the President overruled the Department of Justice O ffice of L egal C ounsel’s opinion of what constitutes “hostilities” under the War Powers Resolution, preferring instead the conclusion reached by the White House Counsel’s office and the State Department’s Harold Koh. In another story earlier this week on the Administration’s explanation to Congress that U.S. participation in NATO operations in Libya do not constitute “hostilities” under the law, Savage reported that White House Counsel Bob Bauer refused to say whether the Administration’s position was based upon an OLC opinion. Now, however, Savage is able to report that the Administration rejected the legal position of both OLC and that of Defense

Department general counsel Jeh C. Johnson. Presidents have the legal authority to override the legal conclusions of the Of fice of L egal C ounsel and to act in a manner that is contrary to its advice , but it is extraordinarily rare for that to happen. Under normal circumstances, the office’s

interpretation of the law is legally binding on the executive branch. . . . The administration followed an unusual process in developing its position. Traditionally, the Office of Legal Counsel solicits views from different agencies and then decides what the best interpretation of the law is. The attorney general or the president can overrule its views, but rarely do. In this case, however, [acting OLC head Caroline] Krass was asked to submit the Office of Legal Counsel’s thoughts in a less formal way to the White House, along with the views of lawyers at other agencies. After several meetings and phone calls, the rival legal analyses were submitted to Mr. Obama, who is a constitutional lawyer, and he made the decision. A senior administration official, who spoke on the condition of anonymity to talk about the internal deliberations, said the process was “legitimate” because “everyone knew at the end

of the day this was a decision the president had to make” and the competing views were given a full airing before Mr. Obama. The story quotes former Clinton OLC head Walter Dellinger saying the Administration’s legal conclusion was “defensible” despite the problematic decision-making process. Former Bush OLC head Jack Goldsmith, on the other hand, finds the Administration’s position “ aggressive ” and unpersuasive.

Page 5: 2ac – t preventative intent (lemos)-+SDI...Web view2ac – t preventative intent (lemos) We meet – their evidence agrees government collection of metadata has preventative intent

Perm do both Perm do the plan and allow for flexible interpretation of its legal authorityThe president will just overrule again, like he did with the Libyan strikes- that thumps OLC and presidential power credibility. Morrison 2011 – Professor of Law, Columbia University (Trevor W., Harvard Law Review, ““Hostilities,” the Office of Legal Counsel, and the Process of Executive Branch Legal Interpretation”, 124 HARV. L. REV.F. 62, http://web.law.columbia.edu/sites/default/files/microsites/constitutional-governance/files/Libya-Hostilities-Office-of-Legal-Counsel.pdf)

Presidential overruling should be rare because it can carry serious costs . To

start, it can undermine OLC’s ability to produce legal opinions consistent with its best view of the law. Agency general counsels and the White House Counsel’s Office may approach legal questions not with the goal of seeking the best view of the law, but with the aim of finding the best, professionally responsible legal defense of their client’s preferred policy position. There is nothing wrong with that. But if the President routinely favors legal views of that sort over OLC’s conclusions, the traditional rationale for having an OLC at all will be undermined . OLC’s work product is significant today in large part because of the time-honored understanding that its conclusions are presumptively binding within the executive branch . Routine presidential overruling would weaken the presumption , which in turn would diminish the significance of OLC’s work and reduce its clients’ incentive to seek its views . To remain relevant, OLC would likely start intentionally tilting its analysis in favor of its clients’ (here, the President’s) preferred policies. Put another way, the strong presumption in favor of the authoritativeness of OLC’s analysis provides OLC with the institutional space and cover to provide answers based on its best view of the law. If the former is weakened, the latter is jeopardized. Just as the White House benefits greatly from OLC’s reputation for providing authoritative opinions based on its best view of the law, undermining that reputation can do real harm to the long-run institutional interests of the White House . If the presumption in favor of OLC’s authoritativeness is undermined, then in cases when the White House relies on an OLC opinion to establish the legality of a policy or program, outside observers will suspect it is mere opportunism — that the White House is invoking OLC merely because OLC said “yes.” At that point, the benefit of being able to point to OLC as a source of authoritative, credible legal analysis will be lost. To put it in Posner and Vermeule’s terms, the executive self-binding mechanism will unravel , and with it the presidential power-enhancing credibility it can provide.1

Page 6: 2ac – t preventative intent (lemos)-+SDI...Web view2ac – t preventative intent (lemos) We meet – their evidence agrees government collection of metadata has preventative intent

NSA will circumvent – did the same thing with EO 12333, proves no adherence to executive rulings. Circumventing them is an independent link – congress must be notified - spurs fights over competing priorities and broader dispute over division of powers Melia 5 (George, Inst for Diplomacy-Georgetown, “The Democracy Bureaucracy”, http://www.princeton.edu/~ppns/papers/democracy_bureaucracy.pdf)As suggested in the previous section, the democracy promotion infrastructure is also a moving target, as numerous actors are advocating, legislating or announcing changes in the way business is done in this field. Among the issues at play in mid-2005 are

the following. 1. Congress/Executive As in most aspects for foreign relations, inherent differences in perspective obtain between legislators (and their staffs) and Administration officials (and the permanent professionals at State, USAID, DOD and the intelligence community) about priorities , budget allocations, reporting and notification requirements, and mechanisms. At mid-summer 2005, the battles are just now being joined between the Congress and the Executive over: ƒ the State Department authorization bill (to which the House has added the ADVANCE Democracy Act); ƒ the Foreign Operations and State Department appropriations bill (to which the Senate Committee has added aspects of the ADVANCE Democracy Act, and substantial earmarks, diverse country-specific policy guidance, including on Iran and central Asia, and operational constraints on USAID); ƒ the UN Reform Act 20 , likely to be added to the State Department authorization (if one is to be enacted this year), in which the UN Democracy Fund, the role of the Democracy Caucus, the composition of the UN Human Rights Commission/Council are all addressed, and the virtues of withholding assessed

contributions to the UN as leverage are all considered. Some of the impending tussle will be about specific aspects of the proposals , combined with more general institutional angst in the Executive about how much it can or should tolerate policy direction (often seen as

“ micromanagement ”) from the Congress .

Unchecked war powers causes war Hedges 12(Thomas, writer for the Center for the Study of Responsive Law, War Power Abuse Makes Iran Conflict More Likely, 9/30/12, http://www.truthdig.com/report/item/war_power_abuse_makes_iran_conflict_likely_20120930/) Rep. Walter Jones, R-N.C., along with retired military officers Col. Lawrence Wilkerson and Lt. Col. Anthony Shaffer as well as former Associate Deputy Attorney General Bruce Fein denounced President Barack Obama at a news conference Sept. 21 for overstepping his authority in wartime and warned that unless war powers are restored to Congress, the country could soon be involved in a battle with Iran. The resolution comes at a time when tensions among Iran, the United States and Israel have intensified and could lead to what Col. Wilkerson described as an eruption of catastrophic violence in the Middle East. Resolution HRC107, written by Jones and supported by 13 House members, is the latest attempt to restore one of the fundamental constitutional powers to Congress. The retired military officers and congressman told a small gathering of reporters that the unchecked power of the imperial presidency, which began in earnest under the Truman administration, has expanded its authority under Obama to order the assassination of U.S. citizens and wage proxy wars in Libya, Pakistan, Yemen and Somalia without seeking congressional approval. They said they fear that unless this power is restored to Congress the country could find itself in a conflict with Iran. “The most recent disclosures in The New York Times, not at all refuted by the Obama administration, show that the president claims and exercises authority to surveil every ... individual on the planet,” Fein said. “If he says, ‘You’re an imminent danger to the United States,’

Page 7: 2ac – t preventative intent (lemos)-+SDI...Web view2ac – t preventative intent (lemos) We meet – their evidence agrees government collection of metadata has preventative intent

you get vaporized. Predator drone. Any judicial review? No. Any congressional review? No. Any disclosure of the profile of the intelligence that justifies the finding you’re one of the terrorists we’re going to vaporize? No.” This is “a combination of legislative, executive, judicial power, plus being executioner, all in one man!” Fein described the pursuit of ceaseless military expansion and conquest as a “macho thrill.” The British, he pointed out, also expanded their empire beyond its ability to sustain itself, a pattern the United States was now repeating. He said that empires eventually grow beyond the control of the public or politicians. The congressman and former officials argued that the power to declare and wage war must be wrested from the hands of the president and restored to Congress.

Page 8: 2ac – t preventative intent (lemos)-+SDI...Web view2ac – t preventative intent (lemos) We meet – their evidence agrees government collection of metadata has preventative intent

2ac – kritikFramework – the K must prove that the whole plan is bad – weighing the AFF is vital to fair and predictable engagement – the ballot should simulate the plans enactment and test whether it’s better than the status quo or competitive alternativePragmatic legal solutions are key – anything else devolves into theoretical abstraction which never actualizes material changeCohen 15 — Julie E. Cohen, Mark Claster Mamolen Professor of Law and Technology at the Georgetown University Law Center, Member of the Advisory Board of the Electronic Privacy Information Center, holds a J.D. from Harvard University, 2015 (“Studying Law Studying Surveillance,” Surveillance & Society, Volume 13, Issue 1, Available Online at http://library.queensu.ca/ojs/index.php/surveillance-and-society/article/viewFile/law/lawsurv, Accessed 07-21-2015, p. 96-97)Surveillance Studies and LawRelative to legal scholarship, work in Surveillance Studies is more likely to build from a solid foundation in contemporary social theory. Even so, such work often reflects both an insufficient grasp of the complexity of the legal system in action and lack of interest in the ways that legal and regulatory actors understand, conduct, and contest surveillance. By this I don’t mean to suggest that Surveillance Studies scholars need law degrees, but only to point out what ought to be obvious but often isn’t: legal processes are social processes, too, and in overlooking these processes, Surveillance Studies scholars also engage in a form of black-boxing that treats law as monolithic and surveillance and government as interchangeable. Legal actors engage in a variety of discursive and normative strategies by which institutions and resources are mobilized around surveillance, and understanding those strategies is essential to the development of an archaeology of surveillance practices. Work in Surveillance Studies also favors a type of theoretical jargon that can seem impenetrable and , more importantly, unrewarding to those in law and policy communities . As I’ve written elsewhere (Cohen 2012a: 29), “[t]oo many such works find power everywhere and hope nowhere, and seem to offer well-meaning policy makers little more than a prescription for despair .” Returning to the topics already discussed, let us consider some ways in which Surveillance Studies might benefit from dialogue with law.Let us return first to the problem of digitally-enhanced surveillance by law enforcement—the problem of the high-resolution mosaic. As discussed in the section above, works by Surveillance Studies scholars exploring issues of mobility and control offer profound insights into the ways in which continual observation shapes spaces and subjectivities—the precise questions about which, as we have already seen, [end page 96] judges and legal scholars alike are skeptical. Such works reveal the extent to which pervasive surveillance of public spaces is emerging as a new and powerful mode of ordering the public and social life of civil society. They offer rich food for thought— but not for action .

Page 9: 2ac – t preventative intent (lemos)-+SDI...Web view2ac – t preventative intent (lemos) We meet – their evidence agrees government collection of metadata has preventative intent

Networked surveillance is increasingly a fact of contemporary public life, and totalizing theories about its power don’t take us very far toward gaining regulatory traction on it. That enterprise is, moreover, essential even if it entails an inevitable quantum of self-delusion. Acknowledgment of pervasive social shaping by networked surveillance need not preclude legal protection for socially-shaped subjects, but that project requires attention to detail. To put the point a different way, the networked democratic society and the totalitarian state may be points on a continuum rather than binary opposites, but the fact that the continuum exists is still worth something. If so, one needs tools for assessment and differentiation that Surveillance Studies does not seem to provide.As an example of this sort of approach within legal scholarship, consider a recent article by legal scholars Danielle Citron and David Gray (2013), which proposes that courts and legislators undertake what they term a technology-centered approach to regulating surveillance. They would have courts and legislators ask whether particular technologies facilitate total surveillance and, if so, act to put in place comprehensive procedures for approving and overseeing their use. From a Surveillance Studies perspective, this approach lacks theoretical purity because its technology-specific focus appears to ignore the fact that total surveillance also can emerge via the fusion of data streams originating from various sources. But the proposal is pragmatic ; it does not so much ignore that risk as bracket it while pursuing the narrower goal of gaining a regulatory foothold within the data streams. And because it focuses on the data streams themselves, it is administrable in a way that schemes based on linear timelines and artificial distinctions between different types of surveillance are not. One can envision both courts and legislatures implementing the Citron and Gray proposal in a way that enables far better oversight of what law enforcement is doing.Privacy = link turn – reduces biopolitical apparatus No link or impact – not all biopower’s the same or bad. Plan’s “biopower” LESSENS THE STATE. This K’s an Aff add-on.Ojakangus ‘5Mika Ojakangus is a worker for Helsinki Collegium for Advanced Studies, “Impossible Dialogue on Bio-power,” http://www.foucault-studies.com/no2/ojakangas1.pdfIn fact, the history of modern Western societies would be quite incomprehensible without taking into account that there exists a form of power which refrains from killing but which nevertheless is capable of directing people’s lives. The effectiveness of biopower can be seen lying precisely in that it refrains and withdraws before every demand of killing, even though these demands would derive from the demand of justice. In bio-political societies, according to Foucault, capital punishment could not be maintained except by invoking less the enormity of the crime itself than the monstrosity of the criminal: “One had the right to kill those who represented a kind of biological danger to others.”112 However, given that the “right to kill” is precisely a sovereign right, it can be argued that the

Page 10: 2ac – t preventative intent (lemos)-+SDI...Web view2ac – t preventative intent (lemos) We meet – their evidence agrees government collection of metadata has preventative intent

biopolitical societies analyzed by Foucault were not entirely bio-political. Perhaps, there neither has been nor can be a society that is entirely bio-political . Nevertheless, the fact is that present-day European societies have abolished capital punishment. In them, there are no longer exceptions. It is the very “right to kill” that has been called into question. However, it is not called into question because of enlightened moral sentiments, but rather because of the deployment of bio-political thinking and practice. For all these reasons, Agamben’s thesis, according to which the concentration camp is the fundamental bio-political paradigm of the West, has to be corrected . 113 The bio-political paradigm of the West is not the concentration camp, but, rather, the present-day welfare society and, instead of homo sacer, the paradigmatic figure of the bio-political society can be seen, for example, in the middle-class Swedish social democrat. Although this figure is an object – and a product – of the huge bio-political machinery, it does not mean that he is permitted to kill without committing homicide. Actually, the fact that he eventually dies, seems to be his greatest “crime” against the machinery. (In bio-political societies, death is not only “something to be hidden away,” but, also, as Foucault stresses, the most “shameful thing of all”.114) Therefore, he is not exposed to an unconditional threat of death, but rather to an unconditional retreat of all dying. In fact, the bio-political machinery does not want to threaten him, but to encourage him, with all its material and spiritual capacities, to live healthily, to live long and to live happily – even when, in biological terms, he “should have been dead long ago”.115 This is because bio-power is not bloody power over bare life for its own sake but pure power over all life for the sake of the living. It is not power but the living, the condition of all life – individual as well as collective – that is the measure of the success of bio-power.

Page 11: 2ac – t preventative intent (lemos)-+SDI...Web view2ac – t preventative intent (lemos) We meet – their evidence agrees government collection of metadata has preventative intent

2ac – terror – bio No impact to bioterror Keller, 13 (Rebecca, 7 March 2013, Analyst at Stratfor, “Bioterrorism and the Pandemic Potential,” Stratfor, http://www.stratfor.com/weekly/bioterrorism-and-pandemic-potential)The risk of an accidental release of H5N1 is similar to that of other infectious pathogens currently being studied. Proper safety standards are key, of course, and experts in the field have had a year to determine the best way to proceed, balancing safety and research benefits. Previous work with the virus was conducted at biosafety level three out of four, which requires researchers wearing respirators and disposable gowns to work in pairs in a negative pressure environment. While many of these labs are part of universities, access is controlled either through keyed entry or even palm scanners. There are roughly 40 labs that submitted to the voluntary ban. Those wishing to resume work after the ban was lifted must comply with guidelines requiring strict national oversight and close communication and collaboration with national authorities. The risk of release either through accident or theft cannot be completely eliminated, but given the established parameters the risk is minimal. The use of the pathogen as a biological weapon requires an assessment of whether a non-state actor would have the capabilities to isolate the virulent strain, then weaponize and distribute it. Stratfor has long held the position that while terrorist organizations may have rudimentary capabilities regarding biological weapons, the likelihood of a successful attack is very low . Given that the laboratory version of H5N1 -- or any influenza virus, for that matter -- is a contagious pathogen, there would be two possible modes that a non-state actor would have to instigate an attack. The virus could be refined and then aerosolized and released into a populated area, or an individual could be infected with the virus and sent to freely circulate within a population. There are severe constraints that make success using either of these methods unlikely. The technology needed to refine and aerosolize a pathogen for a biological attack is beyond the capability of most non-state actors . Even if they were able to develop a weapon, other factors such as wind patterns and humidity can render an attack ineffective. Using a human carrier is a less expensive method, but it requires that the biological agent be a contagion. Additionally, in order to infect the large number of people necessary to start an outbreak, the infected carrier must be mobile while contagious, something that is doubtful with a serious disease like small pox. The carrier also cannot be visibly ill because that would limit the necessary human contact.No plan roll back – the Boston Bombing disproves it – the current political spectrum isn’t subject to radically shifting the pendulum on surveillanceNo link – surveillance doesn’t solve terrorism Globe and Mail ‘15Globe editorial – “The end of US ‘bulk telephony collection,’ and the lessons for Canada” - The Globe and Mail - Jun. 14, 2015 - http://www.theglobeandmail.com/globe-debate/editorials/the-end-of-us-bulk-telephony-collection-and-the-lessons-for-canada/article24948261/

Page 12: 2ac – t preventative intent (lemos)-+SDI...Web view2ac – t preventative intent (lemos) We meet – their evidence agrees government collection of metadata has preventative intent

For a few days, there was a happily yawning gap in the U.S. N ational S ecurity

A gency ’s ability to surveil American citizens. Congress could not agree on how – or whether – to renew the section of the foolishly named Patriot Act that had allow ed the government to scoop up and hold all the metadata (identifying both callers and addressees) of all cellphone calls in the U.S. The Foreign Intelligence Surveillance Court would then grant or, at least sometimes, not grant, access to the actual contents of the conversations – in other words, a search warrant. The upshot – under the new U.S.A. Freedom Act (officially, the “Uniting and Strengthening America by Fulfilling Rights and Ensuring Effective Discipline Over Monitoring Act of 2015”) – is that phone companies, not the NSA and the FBI, will record and store all the metadata for all phone calls. Those agencies will no longer be able to get at that kind of data at will, indiscriminately. The security agencies will have to apply to the FISC court for metadata, too. That’s progress, though FISC may be a bit of a rubber stamp. There is, by the way, no sign that terrorists attacked the U nited S tates in the unsurveilled interval between the Patriot Act section and the Freedom Act.Reject their evidence to bias – the government always overinflates their ability to solve terrorism Timm 15 — Trevor Timm, Co-Founder and Executive Director of the Freedom of the Press Foundation, Columnist for the Guardian on privacy, free speech, and national security, former Activist and Writer with the Electronic Frontier Foundation, holds a J.D. from New York Law School and a B.A. in Political Science from Northeastern University, 2015 (“Here’s how not to report on the US government’s terror warnings,” Columbia Journalism Review, July 10th, Available Online at http://www.cjr.org/analysis/heres_how_not_to_report_on_the_us_governments_terror_warnings.php, Accessed 07-12-2015)If you turned on the television or checked your phone in the lead up to July 4th, it was almost impossible to miss the wall-to-wall coverage blaring ominous warnings from the US government: ISIS terrorists could strike Americans at any minute over the holiday weekend.As it often is in such instances, the media’s reporting was breathless, hyperbolic, and barely contained a hint of skepticism. When nothing happened—as has been the case literally every time the government has issued these warnings in the past —there was no apparent self-reflection by these media outlets about how they could have tempered their coverage.Instead, many doubled down by re-writing government press releases , claim ing that arrests that happened well before July 4th , and in which the alleged criminals never mentioned the American holiday, are proof of “just how close” the US came to a terror attack over the holiday weekend.During the Bush administration, terror alerts were issued with such frequency that they were widely derided and criticized—even by seasoned counter-terrorism experts. Now that ISIS has emerged, the Bush administration’s derided “color code system” is gone, but the willingness of the media to immediately buy into the idea that the public should be freaking out is still alive and well. The last two years have seen the media become much more skeptical of government surveillance powers. Yet when the terror alert flashes, they revert right back to their old ways.Last weekend’s coverage was a case study in rash judgment. All the caveats issued with the warning’s release were hardly noticeable, downplayed and buried in the

Page 13: 2ac – t preventative intent (lemos)-+SDI...Web view2ac – t preventative intent (lemos) We meet – their evidence agrees government collection of metadata has preventative intent

middle of the articles, sandwiched in-between urgent calls for caution from various government agencies. There will soon be a next time; the government will issue a warning, and the media will inevitably jump. When it does, the first rule of reporting should be to determine whether the alerts are based on anything at all and to put that information in the lede. Authorities flatly acknowledged two weeks ago that they have no “credible” or “specific” information that any attacks will occur, but that barely registered in the media’s coverage.CBS News waited until the sixth paragraph in one of their main articles on the subject to tell its readers of the mitigating information. USA Today also stuck the phrase in the middle of its sixth paragraph and never returned to it. CNN, with a finely honed talent for siren headlines, didn’t disclose this information until their 10th paragraph.NBC News, though, was the most brazen. They told readers that authorities “are unaware of any specific or credible threat inside the country” in the 7th paragraph, quickly followed by a qualifier that could not contain more hyperbole if they tried: “But the dangers are more complex and unpredictable than ever.” Really? Apparently the dangers are more complex and unpredictable than ever if you ignore the fact that terrorism attacks in the US are close to all-time lows, and that Americans have generally never been safer.[Graphic Omitted]None of these major news stories mentioned that the US government had issued similar terrorism warnings that generated alarming headlines at least forty times since 9/11. As FAIR’s Adam Johnson detailed, all forty times nothing happened . If news organizations are going to list all the reasons readers should be scared, they should at least attempt to note the reasons that they probably shouldn’t be.Link turn –1. Human intelligence – opening up resources for spies and resources allows more effective response to terror attacks – that’s Volz2. Information overload – the plan leads to streamlined data collection Greenwald, 14(Glenn Greenwald is a journalist, constitutional lawyer, and author of four New York Times best-selling books on politics and law. His most recent book, No Place to Hide, is about the U.S. surveillance state and his experiences reporting on the Snowden documents around the world. Prior to his collaboration with Pierre Omidyar, Glenn’s column was featured at The Guardian and Salon. He was the debut winner, along with Amy Goodman, of the Park Center I.F. Stone Award for Independent Journalism in 2008, and also received the 2010 Online Journalism Award for his investigative work on the abusive detention conditions of Chelsea Manning. For his 2013 NSA reporting, he received the George Polk award for National Security Reporting; the Gannett Foundation award for investigative journalism and the Gannett Foundation watchdog journalism award; the Esso Premio for Excellence in Investigative Reporting in Brazil (he was the first non-Brazilian to win), and the Electronic Frontier Foundation’s Pioneer Award. Along with Laura Poitras, Foreign Policy magazine named him one of the top 100 Global Thinkers for 2013. The NSA reporting he led for The Guardian was awarded the 2014 Pulitzer Prize for public service – what a baller, “No

Page 14: 2ac – t preventative intent (lemos)-+SDI...Web view2ac – t preventative intent (lemos) We meet – their evidence agrees government collection of metadata has preventative intent

Place to Hide”, http://www.simoleonsense.com/snowden-the-nsa-and-the-u-s-surveillance-state/ - some dude transcribed parts of the book here so swag, ak.)“Surveillance cheerleaders essentially offer only one argument in defense of mass surveillance: it is only carried out to stop terrorism and keep people safe. Indeed, invoking an external threat is a historical tactic of choice to keep the population submissive to government powers.” “That same month, Obama’s hand-picked advisory panel (composed of, among others, a former CIA deputy director and a former White House aide, and convened to study the NSA program through access to classified

information) concluded that the metadata program “ was not essential to preventing attacks and could readily have been obtained in a timely manner using conventional [court] orders.” “The record is indeed quite poor. The collect-it-all system did nothing to detect, let alone disrupt, the 2012 Boston Marathon bombing. It did not detect the attempted Christmas-day bombing of a jetliner over Detroit, or the plan to blow up Times Square, or the plot to attack the New York City subway system—all of which were stopped by alert bystanders or traditional police powers. It certainly did nothing to stop the string of mass shootings from Aurora to Newtown. Major international attacks from London to Mumbai to Madrid proceeded without detection, despite involving at least dozens of operatives.” “In fact, mass surveillance has had quite

the opposite effect: it makes detecting and stopping terror more difficult .

Democratic Congressman Rush Holt, a physicist and one of the few scientists in Congress, has made the point that collecting everything about everyone’s communications only obscures actual plots being discussed by actual terrorists . Directed rather than indiscriminate surveillance would yield more specific and useful information.” “American dying in a terrorist attack is infinitesimal, considerably less than the chance of being struck by lightning. John Mueller, an Ohio State University professor who has written extensively about the balance between threat and expenditures in fighting terrorism, explained in 2011: “The number of people worldwide who are killed by Muslim-type terrorists, Al Qaeda wannabes, is maybe a few hundred outside of war zones. It’s basically the same number of people who die drowning in the bathtub each year.” More American citizens have “undoubtedly” died “overseas from traffic accidents or intestinal illnesses,” the news agency McClatchy reported, “than from terrorism.” “After the trouble-free Olympics, Stephen Walt noted in Foreign Policy that the outcry was driven, as usual, by severe exaggeration of the threat. He cited an essay by John Mueller and Mark G. Stewart in International Security for which the authors had analyzed fifty cases of purported “Islamic terrorist plots” against the United States, only to conclude that “virtually all of the perpetrators were ‘ incompetent , ineffective, unintelligent, idiotic, ignorant, unorganized, misguided, muddled, amateurish, dopey, unrealistic, moronic, irrational, and foolish.’” Mueller and Stewart quoted from Glenn Carle, former deputy national intelligence officer for transnational threats, who said, “We must see jihadists for the small, lethal, disjointed and miserable opponents that they are,” and they noted that al-Qaeda’s “capabilities are far inferior to its desires.”

Page 15: 2ac – t preventative intent (lemos)-+SDI...Web view2ac – t preventative intent (lemos) We meet – their evidence agrees government collection of metadata has preventative intent

Links are non-u/q – 1. Vigilance – the expiration of the Patriot ACT demonstrate terrorists aren’t willing to strike as soon as we aren’t vigilante2. Data collection – the Freedom Act severely hampered mass data collection which triggers their impactsTurn – stopping mass surveillance is key Arab-American relations which solves their terror impact Risen ‘14(Internally quoting Vanda Felbab-Brown, a senior fellow on foreign policy at the Brookings Institution. Tom Risen is a reporter for U.S. News & World Report. “Racial Profiling Reported in NSA, FBI Surveillance” - U.S. News & World Report - July 9, 2014 - http://www.usnews.com/news/articles/2014/07/09/racial-profiling-reported-in-nsa-fbi-surveillance)The National S ecurity Agency and the FBI have reportedly been overzealous trying to prevent terrorist attacks to the point that anti-Islamic racism in those agencies led to the surveillance of prominent Muslim-Americans, revealing a culture of racial profiling and broad latitude for spying on U.S. citizens. An NSA document leaked by former agency contractor Edward Snowden to reporter Glenn Greenwald shows 202 Americans targeted among the approximately 7,485 email addresses monitored between 2002 and 2008, Greenwald’s news service The Intercept reports. To monitor Americans, government agencies must first make the case to the Foreign Intelligence Surveillance Court that there is probable cause that the targets are terrorist agents, foreign spies or “are or may be” abetting sabotage, espionage or terrorism. Despite this filter The Intercept identified five Muslim-Americans with high public profile including civil rights leaders, academics, lawyers and a political candidate. Racial profiling of Muslims by security officers has been a controversy since the terrorist attacks of 2001 spiked fears about al-Qaida trainees preparing more attacks. The New York Police Department has disbanded its unit that mapped New York’s Muslim communities that designated surveillance of mosques as “terrorism enterprise investigations” after pressure from the Justice Department about aggressive monitoring by police. A 2005 FBI memo about surveillance procedures featured in The Intercept story uses a fake name “Mohammed Raghead” for the agency staff exercise. This latest report about email surveillance of successful Muslim-Americans is akin to “McCarthyism” that fed paranoia about communist spies during the Cold War, says Reza Aslan, a professor at the University of California, Riverside. “The notion that these five

upstanding American citizens, all of them prominent public individuals, represent a threat to the U.S. for no other reason than their religion is an embarrassment to the FBI and an affront to the constitution,” Aslan says. There is a risk of radicalization among citizens

Americans, evidenced by some who have gone to fight jihads in Syria and Somalia, but mass shootings carried out by U.S.

citizens of various racial backgrounds occurs much more often, says Vanda Felbab-Brown, a senior fellow on foreign policy at the Brookings Institution. Since 1982, there have been at least

70 mass shootings across the U.S. “We have seen very little domestic terrorism in the U.S.,” Felbab-Brown says. This lack of terrorism is due in part to the willingness of the Islamic community to cooperate with law enforcement to identify possible radical threats , out of gratitude that the U.S. is a stable, secure country

Foreign surveillance checks external threats – their impact ev is in the context of Middle Eastern groups which other countries are able to solve No link – targeted warrants, which plan allows, solve the terror disad just as wellWyden ‘14(et al; This amicus brief issued by three US Senators - Ron Wyden, Mark Udall and Martin Heinrich. Wyden and Udall sat on the Senate Select Committee on Intelligence and had access to the meta-data program. “BRIEF FOR AMICI CURIAE SENATOR RON WYDEN, SENATOR MARK UDALL, AND SENATOR

Page 16: 2ac – t preventative intent (lemos)-+SDI...Web view2ac – t preventative intent (lemos) We meet – their evidence agrees government collection of metadata has preventative intent

MARTIN HEINRICH IN SUPPORT OF PLAINTIFF-APPELLANT, URGING REVERSAL OF THE DISTRICT COURT” – Amicus Brief for Smith v. Obama – before the United States Ninth Circuit Court of Appeals - Appeal from the United States District Court District of Idaho The Honorable B. Lynn Winmill, Chief District Judge, Presiding Case No. 2:13-cv-00257-BLW – Sept 9th, 2014 – This Amicus Brief was prepared by CHARLES S. SIMS from the law firm PROSKAUER ROSE LLP. Amici” means “friend of the court” and – in this context - is legal reference to Wyden, Udall, etc. This pdf can be obtained at: https://www.eff.org/document/wyden-udall-heinrich-smith-amicus)As members of the Senate Select Committee on Intelligence, amici Senators Wyden and Udall have for years participated in the oversight of government surveillance conducted under the Patriot Act that they knew would astonish most Americans. They sought to warn the public about those activities as best they could without disclosing classified information. They also co-sponsored an amendment to the Patriot Act’s reauthorization that sought to address the problem of government officials “secretly reinterpret[ing] public laws and statutes” and “describ[ing] the execution of these laws in a way that misinforms or misleads the public.” See 157 Cong. Rec. S3360 (daily ed. May 25, 2011) (introducing SA 384 to S. 990, 112th Cong. § 3 (2011)); see also 157 Cong. Rec. S3386 (daily ed. May 26, 2011) (statement of Sen. Wyden) (“The fact is anyone can read the plain text of the PATRIOT Act. Yet many Members of Congress have no idea how the law is being secretly interpreted by the executive branch.”); 157 Cong. Rec. S3258 (daily ed. May 24, 2011) (statement of Sen. Udall) (“Congress is granting powers to the executive branch that lead to abuse, and, frankly, shield the executive branch from accountability”). Now that the government’s bulk call-records program has been documented and exposed, the executive branch has retreated from frequently repeated claims about its necessity and expressed an intent to end government bulk collection under section 215. Press Release, FACT SHEET: The Administration’s Proposal for Ending the Section 215 Bulk Telephony Metadata Program (Mar. 27, 2014), http://www.whitehouse.gov/the-press-office/2014/03/27/fact-sheet-administration-s-proposal-ending-section-215-bulk-telephony-m (“White House Press Release”). While Senators Udall, Heinrich and Wyden broadly support a policy aimed at ending the government’s indiscriminate collection of telephony metadata, they share a concern that there is no plan to suspend the bulk collection of Americans’ phone records in the absence of new legislation, which is not necessarily imminent. Meanwhile, the government continues to defend its bulk call-record collection program vigorously against statutory and constitutional challenges in the courts. Amici submit this brief to respond to the government’s argument that its

collection of bulk call records is necessary to defend the nation against terrorist

attacks. Amici make one central point: as members of the committee charged with overseeing the National Security Agency’s surveillance, amici have reviewed this surveillance extensively

and have seen no evidence that the bulk collection of Americans’ phone records has provided any intelligence of value that could not have been gathered through means that caused far less harm to the privacy interests of millions of

Americans. The government has at its disposal a number of authorities that allow it to obtain the call records of suspected terrorists and those in contact with suspected terrorists. It appears to amici that these more targeted authorities could have been used to obtain the information that the government has publicly claimed was crucial in a few important counterterrorism cases.

Page 17: 2ac – t preventative intent (lemos)-+SDI...Web view2ac – t preventative intent (lemos) We meet – their evidence agrees government collection of metadata has preventative intent

2ac – add onPlan is key to effective HUMINTMargolis ‘13Gabriel Margolis – the author presently holds a Master of Arts (MA) in Conflict Management & Resolution from UNC Wilmington and in his final semester of the program when this article was published in the peer-reviewed journal Global Security Studies . Global Security Studies (GSS) is a premier academic and professional journal for strategic issues involving international security affairs. All 2articles submitted to and published in Global Security Studies (GSS) undergo a rigorous, peer-reviewed process. From the article: “The Lack of HUMINT: A Recurring Intelligence Problem” - Global Security Studies - Spring 2013, Volume 4, Issue 2http://globalsecuritystudies.com/Margolis%20Intelligence%20(ag%20edits).pdf

The United States has accumulated an unequivocal ability to collect intelligence as a result of the technological advances of the 20th century. Numerous methods of collection have been employed in clandestine operations around the world including those that focus on human, signals, geospatial, and measurements and signals intelligence. An infatuation with technological methods of intelligence gathering has developed within many intelligence organizations, often leaving the age old practice of espionage as an afterthought . As a result of the focus on technical methods, some of the worst intelligence failures of the 20th century can be attributed to an absence of hu man int elligence. The 21st century has ushered in advances in technology have allowed UAVs to become the ultimate technical intelligence gathering platform; however human intelligence is still being neglected. The increasing reliance on UAVs will make the United States susceptible to intelligence failures unless human intelligence can be properly integrated. In the near future UAVs may be able to gather human level intelligence, but it will be a long time before classical espionage is a thing of the past.

K2 detect north korea Johnson ‘9Dr. Loch K. Johnson is Regents Professor of Political Science at the University of Georgia. He is editor of the journal "Intelligence and National Security" and has written numerous books on American foreign policy. Dr. Johnson served as staff director of the House Subcommittee on Intelligence Oversight from 1977 to 1979. Dr. Johnson earned his Ph.D. in political science from the University of California at Riverside. "Evaluating "Humint": The Role of Foreign Agents in U.S. Security" Paper presented at the annual meeting of the ISA's 50th ANNUAL CONVENTION "EXPLORING THE PAST, ANTICIPATING THE FUTURE", New York Marriott Marquis, NEW YORK CITY, NY, USA, Feb 15, 2009 – available via: http://citation.allacademic.com/meta/p_mla_apa_research_citation/3/1/0/6/6/p310665_index.html

Despite the many negative critiques of humint, former DCI Tenet emphasizes that intelligence is still "primarily a human endeavor.” — He is obviously not referring to the government's intelligence budget priorities. Recall that the United States devotes only a small percentage of its annual intelligence budget to human spying. — Spy machines are costly, while human agents are relatively inexpensive to hire and sustain on an annual stipend. One of the ironies of American intelligence is that the vast percentage of its spending goes into expensive intelligence hardware, especially surveillance satellites, even though the value of these machines is questionable in helping the United States understand such contemporary global concerns as terrorism or China's economic might. Cameras mounted on satellites or airplanes are unable to peer inside the canvas tents, mud huts, or mountain caves in Afghanistan or Pakistan where terrorists plan their lethal operations, or into the deep underground caverns where North Koreans construct atomic weapons . "Space cameras cannot see into factories where missiles are made, or into the sheds of shipyards," writes an intelligence expert. "Photographs cannot tell whether stacks of drums outside an

Page 18: 2ac – t preventative intent (lemos)-+SDI...Web view2ac – t preventative intent (lemos) We meet – their evidence agrees government collection of metadata has preventative intent

assumed chemical-warfare plant contain nerve gas or oil, or whether they are empty” — _As a U.S. intelligence officer has observed, we need "to know what's inside the building, not what the building looks like”.

Solves prolif via deals Hernandez 13 – Research Associate, Monterey Institute of International Studies (Jason, “Proliferation Pathways to a North Korean Intercontinental Ballistic Missile”, Nuclear Threat Initiative, Dec. 20, 2013) RMT During the Clinton Administration, the United States and North Korea came extremely close to concluding a "Missile Deal" that would have halted North Korean development, production,

and testing of increasingly longer-range missiles. However, the deal never came to fruition, and under the Bush

Administration it was scrapped completely. One of the primary issues for both the Clinton and Bush administrations was monitoring and verification . The United States sought a comprehensive monitoring and verification regime that would have permitted U.S. inspectors on-site access to rocket and missile facilities, while North Korea believed that the United States could accomplish verification through imagery analysis and other national technical means. [20] It is therefore likely that any future missile deal negotiations will focus heavily upon verification. Detection and

Monitoring Any advances in rocket technology using the three pathways described above will require numerous

tests before the missile can be accepted into service and deployed. Given North Korea's limited

geographical size, all long-range missile tests will result in debris falling into international waters. For the December 2012 Unha-3 launch, the rocket's first stage fell into the Yellow Sea, and the second fell off the coast of the Philippines. By recovering the first stage debris, South Korea was able to confirm some facts about the Unha, while discovering new data that indicated progress in the Unha's design. The debris demonstrated continued areas of struggle and primitive design elements, such as in the propellant, airframe, and welding, while also showing program advancements and new design elements, such as the use of steering engines in place of jet vanes for orientation. [21] It is reasonable to assume that over the course of a testing program, debris will be recovered to enlighten the world on the progress of North Korea's missile program. New deployment methods, such as the use of silos or road-mobile launchers in

pathways two or three will not necessarily be detected. While the construction of silos could be detected by satellite imagery analysis, it is not guaranteed that the international community would detect every silo. Iran's Shahab silos went unnoticed in the open source until displayed on Iranian media during the Great Prophet 6 military exercises. [22] A road-mobile TD-2/Unha would seemingly go undetected unless paraded or displayed publically. The KN-08 was unknown in the open source until it was displayed at the April 2012 military parade in Pyongyang. Deployments and launches of silo-based or road-mobile TD-2/Unha's would be very difficult to detect and monitor. Verification The issue of verification is complex, and any missile deal will undoubtedly cover the entirety of North Korea's missile production, from battlefield and short-range ballistic missiles to space launch vehicles and ICBMs. However, this brief will only address the relationship between a missile deal and the three pathways to an ICBM. For the purpose of this section, the author assumes that a future missile deal will

either aim to prevent or reverse a missile program in four key areas: development; manufacturing and production; acquisition; and deployment. The question becomes for each of the three pathways to an ICBM, can the international community verify that North Korea is abiding by a deal that prevents or reverses 1) development; 2) manufacturing and production; and 3) deployment of an ICBM?

Extinction Metz 13 – Chairman of the Regional Strategy and Planning Department and Research Professor of National Security Affairs at the Strategic Studies Institute (Steven, 3/13/13, “Strategic Horizons: Thinking the Unthinkable on a Second Korean War,” http://www.worldpoliticsreview.com/articles/12786/strategic-horizons-thinking-the-unthinkable-on-a-second-korean-war)Today, North Korea is the most dangerous country on earth and the greatest threat to U.S. security. For years, the bizarre regime in Pyongyang has issued an unending stream of claims that a U.S. and South Korean invasion is imminent, while declaring that it will defeat this offensive just as -- according to official propaganda -- it overcame the unprovoked American attack in 1950. Often the press releases from the official North Korean news agency are absurdly funny, and American policymakers tend to ignore them as a result. Continuing to do so, though, could be dangerous as events and rhetoric turn even more ominous. In response to North Korea's Feb. 12 nuclear test, the U.N. Security Council recently tightened existing sanctions against Pyongyang. Even China, North Korea's long-standing benefactor and protector, went along. Convulsed by anger, Pyongyang

Page 19: 2ac – t preventative intent (lemos)-+SDI...Web view2ac – t preventative intent (lemos) We meet – their evidence agrees government collection of metadata has preventative intent

then threatened a pre-emptive nuclear strike against the United States and South Korea, abrogated the 1953 armistice that ended the Korean War and cut off the North-South hotline installed in 1971 to help avoid an escalation of tensions between the two neighbors. A spokesman for the North Korean Foreign Ministry asserted that a second Korean War is unavoidable. He might be right; for the first time, an official statement from the North Korean government may prove true. No American leader wants another war in Korea. The problem is that the North Koreans make so many threatening and bizarre official statements and sustain such a high level of military readiness that American policymakers might fail to recognize the signs of impending attack. After all, every recent U.S. war began with miscalc ulation; American policymakers misunderstood the intent of their opponents , who in turn underestimated American determination. The conflict with North Korea could repeat this pattern. Since the regime of Kim Jong Un has continued its predecessors’ tradition of responding hysterically to every action and statement it doesn't like, it's hard to assess exactly what might push Pyongyang over the edge and cause it to lash out. It could be something that the United States considers modest and reasonable, or it could be some sort of internal power struggle within the North Korean regime invisible to the outside world. While we cannot know whether the recent round of threats from Pyongyang is serious or simply more of the same old lathering, it would be prudent to think the unthinkable and reason through what a war instigated by a fearful and delusional North Korean regime might mean for U.S. security. The second Korean War could begin with missile strikes against South Korean, Japanese or U.S. targets, or with a combination of missile strikes and a major conventional invasion of the South -- something North Korea has prepared for many decades. Early attacks might include nuc lear weapon s , but even if they didn't, the United States would probably move quickly to destroy any existing North Korean nuclear weapons and ballistic missiles. The war itself would be extremely costly and probably long. North Korea is the most militarized society on earth. Its armed forces are backward but huge. It's hard to tell whether the North Korean people, having been fed a steady diet of propaganda based on adulation of the Kim regime, would resist U.S. and South Korean forces that entered the North or be thankful for relief from their brutally parasitic rulers. As the conflict in Iraq showed, the United States and its allies should prepare for widespread, protracted resistance even while hoping it doesn't occur. Extended guerrilla operations and insurgency could potentially last for years following the defeat of North Korea's conventional military. North Korea would need massive relief, as would South Korea and Japan if Pyongyang used nuclear weapons. Stabilizing North Korea and developing an effective and peaceful regime would require a lengthy occupation, whether U.S.-dominated or with the United States as a major contributor. The second Korean War would force military mobilization in the United States. This would initially involve the military's existing reserve component, but it would probably ultimately require a major expansion of the U.S. military and hence a draft. The military's training infrastructure and the defense industrial base would have to grow. This would be a body blow to efforts to cut government spending in the United States and postpone serious deficit reduction for some time, even if Washington increased taxes to help fund the war. Moreover, a second Korean conflict would shock the global economy and potentially have destabiliz ing effects outside Northeast Asia . Eventually, though, the United States and its allies would defeat the North Korean

Page 20: 2ac – t preventative intent (lemos)-+SDI...Web view2ac – t preventative intent (lemos) We meet – their evidence agrees government collection of metadata has preventative intent

military. At that point it would be impossible for the United States to simply re-establish the status quo ante bellum as it did after the first Korean War. The Kim regime is too unpredictable, desperate and dangerous to tolerate. Hence regime change and a permanent ending to the threat from North Korea would have to be America's strategic objective. China would pose the most pressing and serious challenge to such a transformation of North Korea. After all, Beijing's intervention saved North Korean dictator Kim Il Sung after he invaded South Korea in the 1950s, and Chinese assistance has kept the subsequent members of the Kim family dictatorship in power. Since the second Korean War would invariably begin like the first one -- with North Korean aggression -- hopefully China has matured enough as a great power to allow the world to remove its dangerous allies this time. If the war began with out-of-the-blue North Korean missile strikes, China could conceivably even contribute to a multinational operation to remove the Kim regime. Still, China would vehemently oppose a long-term U.S. military presence in North Korea or a unified Korea allied with the United States. One way around this might be a grand bargain leaving a unified but neutral Korea. However appealing this might be, Korea might hesitate to adopt neutrality as it sits just across the Yalu River from a China that tends to claim all territory that it controlled at any point in its history. If the aftermath of the second Korean War is not handled adroitly, the result could easily be heightened hostility between the U nited S tates and China , perhaps even a new cold war . After all, history shows that deep economic connections do not automatically prevent nations from hostility and war -- in 1914 Germany was heavily involved in the Russian economy and had extensive trade and financial ties with France and Great Britain. It is not inconceivable then, that after the second Korean War, U.S.-China relations would be antagonistic and hostile at the same time that the two continued mutual trade and investment. Stranger things have happened in

Page 21: 2ac – t preventative intent (lemos)-+SDI...Web view2ac – t preventative intent (lemos) We meet – their evidence agrees government collection of metadata has preventative intent

2ac – tpp politics – asia pivot No warShuo 12 (Wang Shuo, managing editor of Caixin Media: the top English-language magazine covering business and finance in China, 9/12, "Closer Look: Why War Is Not an Option", english.caixin.com/2012-09-12/100436770.html)It is highly unlikely that China will fight a hot war with any of its neighbors over territorial disputes , but it should still reexamine who its friends really are There won't be a w ar in East Asia. The U nited S tates has five military alliances in the western Pacific: with South Korea, Japan, Thailand, the Philippines and Singapore, and American battleships are busy patrolling the seas. Without a go-ahead from Washington, there is no possibility of a hot war between battleships of sovereign countries here. As to conflicts between fishing boats and patrol boats, that's not really a big deal . The Chinese have to ponder several questions: If the country has battleship wars with Japan, can it win without using ground-based missiles? Will the war escalate if missiles are deployed? What will happen if the war continues with no victory in sight? In the last few days, one country bought islands, and the other announced the base points and the baselines of its territorial waters. But look closely, China and Japan have at least two things in common in this hostile exchange: At home they fan up nationalism, and in the international arena no activities have exceeded the scope of previous, respective claims on sovereignty. This means there is no possibility of a war in East Asia, not even remotely. From the East Sea to the South Sea, China has reached a new low in relations with Asian neighbors. It's hard to remove the flashpoints in territorial disputes, but the country can surely reduce their impacts . And the key is relations with the United States.TPP hasn’t been negotiated…Sequestration plus ISIS jack asia pivotWhyte and Weitz 1/29. [Leon, MA candidate @ Fletcher School of Law and Diplomacy @ Tufts, Richard, Senior Fellow and Director of the Center for Political-Military Analysis at the Hudson Institute, non-resident Adjunct Senior Fellow @ Center for a New American Securitiy, "Enough to go around? Money matters complicate US strategic rebalance to Asia-Pacific" Fletcher Security Review Vol 2 No 1 -- www.hudson.org/content/researchattachments/attachment/1455/2015_01_29_weitz_whyte.pdf]However, U.S. economic weaknesses and the Budget Control Act of 2011 – which mandates∂ cuts in U.S. government spending (known as “sequestration”) – have constrained the U.S. ∂ government’s ability to resource the Rebalance adequately and meet its regional security ∂ commitments .7 The sequestration process was deliberately devised to present the Congress∂ with an unacceptable outcome if the members failed to balance the budget through a combination∂ of tax hikes and targeted spending cuts. But the congressional compromise has failed∂ to occur, and now sequestration is threatening to wreck havoc throughout the government ∂ with arbitrary percentage-driven spending cuts . Complicating matters further in the defense ∂ domain are the Taliban’s resilience in Afghanistan and the stunning emergence of the Islamic State in Iraq and Syria. During the initial planning and unveiling of the Rebalance , the ∂ U nited S tates assumed it would be possible to shift more resources to Asia as it curtailed ∂ its commitments in the Middle East and South Asia ,8 yet U.S. engagement in these areas is ∂ steadying or growing . New challenges have also emerged in Europe due to Russian aggression ∂ against Ukraine.

Page 22: 2ac – t preventative intent (lemos)-+SDI...Web view2ac – t preventative intent (lemos) We meet – their evidence agrees government collection of metadata has preventative intent

TPP doesn’t solve war – it’s economic not diplomatic which proves there’s a fundamental disconnectZero chance congress rejects TPP post fast track approval – structural factorsStoltzfoos, 6/23 -- Rachel, Reporter @ Daily Caller, Daily Caller, 6/23/15, http://dailycaller.com/2015/06/23/congress-secures-trade-promotion-authority-for-obama/TPA would give Congress more power to shape the trade agreement by defining specific objectives the president must work toward in a deal, and by setting new transparency rules. But once the president submits a deal to Congress, TPA greatly restricts the Senate’s ability to block or complicate the deal. Any deal the president submits to Congress in the next six years is almost guaranteed to pass , because the Senate must promptly approve or reject the deal with no chance to amend it and little time for debate. And just 51 votes would be required for passage — a far cry from the 61 votes required for major legislation. (RELATED: Why Are Senate Republicans So Eager To Cede Their Trade Authority To Obama?)What do you think? Obama says he needs TPA to conclude a massive trade deal, the Trans-Pacific Partnership, which he is currently negotiating with 11 other countries. And the Republicans who fought for the deal say TPA is key to future free trade agreements that will benefit the U.S. economy.What do you think? Critics contend its a dangerous concession of Senate power to a president that can’t be trusted.

Impact empirically denied – Asia war hasn’t escalated even if there isn’t a military re-shift towards AsiaIts Guaranteed – even opponents are concedingWerner, 6/24 – Erica, Reporter @ Associated Press, Boston Herald, 6/24/15, http://www.bostonherald.com/news_opinion/national/2015/06/senate_vote_moves_obamas_trade_agenda_to_brink_of_enactmentSome anti-free-trade groups, however, essentially conceded defeat . "Fast track makes it virtually certain that the Trans-Pacific Partnership (TPP ) , Trade in Services

Agreement (TISA), and other secret trade deals will become law," said the "Internet-freedom" group Fight for the Future. Tuesday's Senate vote was as painful for the AFL-CIO and other unions as it was welcomed by the White House. Many corporate, agricultural and manufacturing groups cheered.

Iran thumps the DA Kevin Liptak, 7/14/15, Kevin Liptak is the CNN White House Producer, “Now that he has a deal with Iran, Obama must face Congress,” http://www.cnn.com/2015/07/14/politics/iran-nuclear-deal-congress-obama-block/Washington (CNN)With a historic deal meant to curb Iran's nuclear ambitions in place, President Barack Obama has ticked off another legacy-making item on his checklist -- as long as Congress doesn't get in his way . ¶ Early Tuesday, Obama launched a sales pitch to lawmakers who remain deeply skeptical of the nuclear deal . But while Congress retains the ability to nullify Obama's accord with Tehran, the high bar for action on Capitol Hill -- including building veto-proof majorities in just over two months -- will make it difficult for opponents to block the President.¶ In its most simplistic form, the deal means that in exchange for limits on its nuclear activities, Iran would get relief from sanctions while being allowed to continue its atomic program for peaceful purposes. Many of the more technical points of the deal weren't available Tuesday morning, and specifics could prove to be red flags for

Page 23: 2ac – t preventative intent (lemos)-+SDI...Web view2ac – t preventative intent (lemos) We meet – their evidence agrees government collection of metadata has preventative intent

skeptical members of Congress , many of whom said they were still reviewing the

specifics of the plan.¶ Congress has 60 days to review the deal, and if it opposes it can pass a resolution of disapproval to block its implementation. The administration now has five days to certify the agreement and formally present the deal to Capitol Hill. The clock on that 60 day period will not start until the official document is delivered to Capitol Hill.¶ The Republican controlled House has the votes to pass a resolution, but in the Senate Republicans would need to attract support from a half a dozen Democrats. ¶ Because President Obama has already pledged to veto any bill to block the deal GOP leaders would need to convince enough Democrats to join with them to override his veto -- a heavy lift. How the public views the deal will be critical, as Members of Congress will be back home for several weeks this summer before any vote. ¶ While Obama on Tuesday said he welcomed a " robust" debate over the deal's merits, he issued a warning to lawmakers considering blocking the agreement, bluntly th reatening to veto any measure that would prevent the deal from going into effect .¶ "Precisely because

the stakes are so high, this is not the time for politics," he said in an address from the White House. "Tough talk from Washington does not solve problems. Hard nosed diplomacy, leadership that has united the world's major powers, offers a more effective way of verifying Iran is not pursuing a nuclear weapon."¶ Like the completion earlier this month of a diplomatic renewal with Cuba, the deal with Iran provides Obama a tentative foreign policy achievement in the final year-and-a-half of his presidency. Both are built on the premise of engaging traditional U.S. foes, a vow Obama made at the very beginning of his presidency when he declared to hostile nations the United States would "extend a hand if you are willing to unclench your fist."¶ The deal -- which was finalized after almost two years of talks -- provides vindication for an administration that's sought to emphasize diplomacy over military force.¶ Burns: "If we get a deal, we'll have to contain Iranian power"¶ Burns: "If we get a deal, we'll have to contain Iranian power" 02:44¶ PLAY VIDEO¶ "This deal demonstrates that American diplomacy can bring about real and meaningful change," Obama said Tuesday, adding later that the deal "offers an opportunity to move in a new direction."¶ But even Obama himself has admitted there are risks inherent in striking an accord with a sworn U.S. enemy. Lawmakers, many deeply wary of those risks, now have 60 days to digest the provisions included in the deal with Iran, a two-month review period Congress insisted upon as the negotiations unfolded.¶ Obama was initially resistant to any congressional review of the Iran pact. But faced with overwhelming support among lawmakers for some kind of evaluation period, the White House ultimately conceded that Congress could be able to review the final deal before it takes full effect.¶ It won't be easy for Congress to inflict damage on the agreement. They must act quickly -- and the two-month period in which they can scuttle the plan includes a month-long August recess, and only a handful of working days.¶ Foreign Relations Committee Chairman Bob Corker told reporters Monday he expects to start hearings sometime shortly after the 60-day clock begins -- which will come sometime in the next five days , after the Director of National Intelligence completes a number of certifications to Congress about the deal, including that it meets U.S. non-proliferation objectives and does not jeopardize U.S. national security. ¶ Corker said he wants first to ensure senators have ample time to read the agreement and its classified annexes so they are "well versed" before hearing from the administration and any outside experts he plans to call to testify. ¶ Corker said he would like to complete hearings before the August recess -- which begins Aug. 7 -- so lawmakers have the recess to consider their positions. Under this scenario, up or down votes on the deal itself would not happen until mid-September, he said.¶ In the House, a similar process and timeframe is also expected.¶ Within the 60-day

Page 24: 2ac – t preventative intent (lemos)-+SDI...Web view2ac – t preventative intent (lemos) We meet – their evidence agrees government collection of metadata has preventative intent

span, opponents of the measure must rally votes to either enact new sanctions against Iran, or to disallow Obama from easing sanctions as part of the deal,

measures the President would veto .¶ Overriding the veto in Congress would require a two-thirds majority -- meaning in the Senate, Obama must only secure a minimum of 34 votes in order for his deal to take effect. Additional time beyond the 60-day review period is included for Obama to veto any legislation, and for Congress to muster support for an override.¶ If lawmakers fail to pass any new restrictions during the review period -- which ends in mid-September -- the deal will go into place, and sanctions will be lifted in Iran.¶ Obama: Iran's path to nuclear weapons will be cut off¶ Obama: Iran's path to nuclear weapons will be cut off 04:21¶ PLAY VIDEO¶ But among deeply skeptical senators, who worry about Iran's support for terror groups and incarceration of Americans, even 34 Democratic votes in support of Obama aren't necessarily assured.¶ "

Not intrinsic – a logical policy maker could do both Agency action doesn’t cost PCMayer and Price 2 (Kenneth R., Prof Poli Sci – U Wisc Madison and Kevin, Graduate Student, U Wisc Madison, Presidential Studies Quarterly, 6-1, Lexis)By using their formal powers , presidents structure the institutions that surround them to standardize their interactions with other actors. To convert the bargains that would otherwise require skill and scarce political capital into manageable leadership opportunities , presidents seek routines that encourage compliance from other actors. By creating institutions and processes that make these once-expensive bargains part of the political landscape, presidents alter default outcomes , leaving it to other actors to expend resources to undo what the president has done.Freedom act debates deny the link – it was debates over surveillance which should have causes mass controversy PC not real – winner’s winMichael Hirsch 13, chief correspondent for National Journal. He also contributes to 2012 Decoded. Hirsh previously served as the senior editor and national economics correspondent for Newsweek, based in its Washington bureau. He was also Newsweek’s Washington web editor and authored a weekly column for Newsweek.com, “The World from Washington.” Earlier on, he was Newsweek’s foreign editor, guiding its award-winning coverage of the September 11 attacks and the war on terror. He has done on-the-ground reporting in Iraq, Afghanistan, and other places around the world, and served as the Tokyo-based Asia Bureau Chief for Institutional Investor from 1992 to 1994. http://www.nationaljournal.com/magazine/there-s-no-such-thing-as-political-capital-20130207On Tuesday, in his State of the Union address, President Obama will do what every president does this time of year. For about 60 minutes, he will lay out a sprawling and ambitious wish list highlighted by gun control and

immigration reform, climate change and debt reduction. In response, the pundits will do what they always do this time of year: They will talk about how unrealistic most of the proposals are, discussions often informed by sagacious reckonings of how much “pol itical cap ital ” Obama

possesses to push his program through. Most of this talk will have no bearing on what actually happens over the next four years. Consider this: Three months ago, just before the November election, if someone had talked seriously about Obama having enough political capital to oversee passage of both immigration reform and gun-control legislation at the beginning of his second term—even after winning the election by 4 percentage points and 5 million votes (the actual

final tally)—this person would have been called crazy and stripped of his pundit’s license. (It doesn’t exist, but it ought to.) In his first term, in a starkly polarized country, the president had been so frustrated by GOP resistance that he finally issued a limited executive order last August permitting immigrants who entered the country

illegally as children to work without fear of deportation for at least two years. Obama didn’t dare to even bring up gun control, a

Democratic “third rail” that has cost the party elections and that actually might have been even less popular on the right than the president’s health care law. And yet, for reasons that have very little to do with Obama’s personal prestige or popularity—variously put in terms of a “mandate” or “political capital”—chances are fair that both will now happen. What changed? In the

Page 25: 2ac – t preventative intent (lemos)-+SDI...Web view2ac – t preventative intent (lemos) We meet – their evidence agrees government collection of metadata has preventative intent

case of gun control, of course, it wasn’t the election. It was the horror of the 20 first-graders who were slaughtered in Newtown, Conn., in mid-December. The sickening reality of little girls and boys riddled with bullets from a high-capacity assault weapon seemed to precipitate a sudden tipping point in the national conscience. One thing changed after another. Wayne LaPierre of the National Rifle Association marginalized himself with poorly chosen comments soon after the massacre. The pro-gun lobby, once a phalanx of opposition, began to fissure into reasonables and crazies. Former Rep. Gabrielle Giffords, D-Ariz., who was shot in the head two years ago and is still struggling to speak and walk, started a PAC with her husband to appeal to the moderate middle of gun owners. Then she gave riveting and poignant testimony to the Senate, challenging lawmakers: “Be bold.” As a result, momentum has appeared to build around some kind of a plan to curtail sales of the most dangerous weapons and ammunition and the way people are permitted to buy them. It’s impossible to say now whether such a bill will pass and, if it does, whether it will make anything more than cosmetic changes to gun laws. But one thing is clear: The political tectonics have shifted dramatically in very little time.

Whole new possibilities exist now that didn’t a few weeks ago. Meanwhile, the Republican members of the Senate’s so-called Gang of Eight are pushing hard for a new spirit of compromise on

immigration reform, a sharp change after an election year in which the GOP standard-bearer declared he would make life so miserable for the 11 million illegal immigrants in the U.S. that they would

“self-deport.” But this turnaround has very little to do with Obama’s personal influence—his political

mandate, as it were. It has almost entirely to do with just two numbers: 71 and 27. That’s 71 percent for Obama, 27 percent for Mitt Romney, the breakdown

of the Hispanic vote in the 2012 presidential election. Obama drove home his advantage by giving a speech on immigration reform on Jan. 29 at a Hispanic-dominated high school in Nevada, a swing

state he won by a surprising 8 percentage points in November. But the movement on immigration has mainly come out of the Republican Party’s recent introspection, and the realization by its more thoughtful members, such as Sen. Marco Rubio of Florida and Gov. Bobby Jindal of Louisiana, that without such a shift the party may be facing demographic death in a country where the 2010 census showed, for the first time, that white births have fallen into the minority. It’s got nothing to do with Obama’s political capital or, indeed, Obama at all. The point is not that “political capital” is a meaningless term. Often it is a synonym for “mandate” or “momentum” in the aftermath of a decisive election—and just about every politician ever elected has tried to claim more of a mandate than he actually has. Certainly, Obama can say that because he was elected and Romney wasn’t, he has a better claim on the country’s mood and direction. Many pundits still defend political capital as a useful metaphor at least. “It’s an unquantifiable but meaningful concept,” says Norman Ornstein of the American Enterprise Institute. “You can’t really look at a president and say he’s got 37 ounces of

political capital. But the fact is, it’s a concept that matters, if you have popularity and some momentum on your side.” The real problem is that the idea of pol itical cap ita l—or

mandates, or momentum—is so poorly defined that presidents and pundits often get it wrong . “Presidents usually over-estimate it,” says George Edwards, a presidential scholar at Texas A&M University. “The best kind of political capital—some sense of an electoral mandate to do something—is very rare. It almost never

happens. In 1964, maybe. And to some degree in 1980.” For that reason, political capital is a concept that misleads far more than it enlightens. It is distortionary. It conveys the idea that we know more than we really do about the ever-elusive concept of political power, and it discounts

the way unforeseen events can suddenly change everything . Instead, it suggests, erroneously, that a political figure has a

concrete amount of political capital to invest, just as someone might have real investment capital—that a particular leader can bank his gains, and the size of his account determines what he can do at any given moment in history. Naturally, any president has practical and electoral limits. Does he have a majority in both chambers of Congress and a cohesive coalition behind him? Obama has neither at present. And unless a surge in the economy—at the moment, still stuck—or some other great victory gives him more momentum, it is inevitable that the closer Obama gets to the 2014 election, the less he will be able to get done. Going into the midterms, Republicans will increasingly avoid any concessions that make him (and the Democrats) stronger. But the abrupt emergence of the immigration and gun-control issues illustrates how suddenly shifts in mood can occur and how political interests can align in new ways just as suddenly. Indeed, the pseudo-concept of political capital masks a larger truth about Washington that is kindergarten simple: You just don’t know what you can do until you try. Or as Ornstein himself

once wrote years ago, “Winning wins.” In theory, and in practice, depending on Obama’s handling of any particular issue, even in a polarized time, he could still deliver on a lot of his second-term goals,

depending on his skill and the breaks. Unforeseen catalysts can appear, like Newtown. Epiphanies can dawn, such as when many Republican Party leaders suddenly woke up in

panic to the huge disparity in the Hispanic vote. Some political scientists who study the elusive calculus of how to pass legislation and run successful presidencies say that pol itical cap ital is , at best, an empty concept , and that almost nothing in the academic literature successfully quantifies or even defines it. “It can refer to a very abstract thing, like a president’s popularity, but there’s no mechanism there. That

makes it kind of useless,” says Richard Bensel, a government professor at Cornell University. Even Ornstein concedes that the calculus is far more complex than the term suggests. Winning on one issue often changes the calculation for the next issue; there is never any known amount of cap ital . “The idea here is, if an issue comes up where the conventional wisdom is that president is not going to get what he wants, and he gets it,

then each time that happens, it changes the calculus of the other actors” Ornstein says. “If they think he’s going to win, they may change positions to get on the winning side. It’s a bandwagon effect.” ¶ ALL THE WAY WITH LBJ¶ Sometimes, a clever practitioner of power can get more done just because he’s aggressive and knows the hallways of Congress well. Texas A&M’s Edwards is right to say that the outcome of the 1964 election, Lyndon Johnson’s landslide victory over Barry Goldwater, was one of the few that conveyed a mandate. But one of the main reasons for that mandate (in addition to Goldwater’s ineptitude as a candidate) was President Johnson’s masterful use of power leading up to that election, and his ability to get far more done than anyone thought possible, given his limited political capital. In the newest volume in his exhaustive study of LBJ, The Passage of Power, historian Robert Caro recalls Johnson getting cautionary advice after he assumed the presidency from the assassinated John F. Kennedy in late 1963. Don’t focus on a long-stalled civil-rights bill, advisers told him, because it might jeopardize Southern lawmakers’ support for a tax cut and appropriations bills the president needed. “One of the wise, practical people around the table [said that] the presidency has only a certain amount of coinage to expend, and you oughtn’t to expend it on this,” Caro writes. (Coinage, of course, was what political capital was called in those days.) Johnson replied, “Well, what the hell’s the presidency for?” Johnson didn’t worry about coinage, and he got the Civil Rights Act enacted, along with much else: Medicare, a tax cut, antipoverty programs. He appeared to understand not just the ways of Congress but also the way to maximize the momentum he possessed in the lingering mood of national grief and determination by picking the right issues, as Caro records. “Momentum is not a mysterious mistress,” LBJ said. “It is a controllable fact of political life.” Johnson had the skill and wherewithal to realize that, at that moment of history, he could have unlimited coinage if he handled the politics right. He did. (At least until Vietnam, that is.) And then there are the presidents who get the politics, and the issues, wrong. It was the last president before Obama who was just starting a second term, George W. Bush, who really revived the claim of political capital, which he was very fond of wielding. Then Bush promptly demonstrated that he didn’t fully understand the concept either. At his first news conference after his 2004 victory, a confident-sounding Bush declared, “I earned capital in the campaign, political capital, and now I intend to spend it. That’s my style.” The 43rd president threw all of his political capital at an overriding passion: the partial privatization of Social Security. He mounted a full-bore public-relations campaign that included town-hall meetings across the country. Bush failed utterly, of course. But the problem was not that he didn’t have enough political capital. Yes, he may have overestimated his standing. Bush’s margin over John Kerry was thin—helped along by a bumbling Kerry campaign that was almost the mirror image of Romney’s gaffe-filled failure this time—but that was not the real mistake. The problem was that whatever credibility or stature Bush thought he had earned as a newly reelected president did nothing to make Social Security privatization a better idea in most people’s eyes. Voters didn’t trust the plan, and four years later, at the end of Bush’s term, the stock-market collapse bore out the public’s skepticism. Privatization just didn’t have any momentum behind it, no matter who was pushing it or how much capital Bush spent to sell it. The mistake that Bush made with Social Security, says John Sides, an associate professor of political science at George Washington University and a well-followed political blogger, “was that just because he won an election, he thought he had a green light. But there was no sense of any kind of public urgency on Social Security reform. It’s like he went into the garage where various Republican policy ideas were hanging up and picked one. I don’t think Obama’s going to make that mistake.… Bush decided he wanted to push a rock up a hill. He didn’t understand how

steep the hill was. I think Obama has more momentum on his side because of the Republican Party’s concerns about the Latino vote and the shooting at Newtown.” Obama may also get his way on the debt ceiling, not because of his reelection, Sides says, “but because Republicans are beginning to doubt whether taking a hard line on fiscal policy is a good idea,” as the party suffers in the polls.¶ THE REAL LIMITS ON POWER¶ Presidents are limited in what they can do by time and attention span, of course, just as much as they are by electoral balances in the House and Senate. But this, too, has nothing to do with political capital. Another well-worn meme of recent years was that Obama used up too much political capital passing the health care law in his first term. But the real problem was that the plan was unpopular, the economy was bad, and the president didn’t realize that the national mood (yes, again, the national mood) was at a tipping point against big-government intervention, with the tea-party revolt about to burst on the scene. For Americans in 2009 and 2010—haunted by too many rounds of layoffs, appalled by the Wall Street bailout, aghast at the amount of federal spending that never seemed to find its way into their pockets—government-imposed health care coverage was simply an intervention too far. So was the idea of another economic stimulus. Cue the tea party and what ensued: two titanic fights over the debt ceiling. Obama, like Bush, had settled on pushing an issue that was out of sync with the country’s mood. Unlike Bush, Obama did ultimately get his idea passed. But the bigger political problem with health care reform was that it distracted the government’s attention from other issues that people cared about more urgently, such as the need to jump-start the economy and financial reform. Various congressional staffers told me at the time that their bosses didn’t really have the time to understand how the Wall Street lobby was riddling the Dodd-Frank financial-reform legislation with loopholes. Health care was sucking all the oxygen out of the room, the aides said. Weighing the imponderables of momentum, the often-mystical calculations about when the historic moment is ripe for an issue, will never be a science. It is mainly intuition, and its best practitioners have a long history in American politics. This is a tale told well in Steven Spielberg’s hit movie Lincoln. Daniel Day-Lewis’s Abraham Lincoln attempts a lot of behind-the-scenes vote-buying to win passage of the 13th Amendment, banning slavery, along with eloquent attempts to move people’s hearts and minds. He appears to be using the political capital of his reelection and the turning of the tide in the Civil War. But it’s clear that a surge of conscience, a sense of the changing times, has as much to do with the final vote as all the backroom horse-trading. “The reason I think the idea of political capital is kind of distorting is that it implies you have chits you can give out to people. It really oversimplifies why you elect politicians, or why they can do what Lincoln did,” says Tommy Bruce, a former political consultant in Washington. Consider, as another example, the storied political career of President Franklin Roosevelt. Because the mood was ripe for dramatic change in the depths of the Great Depression, FDR was able to push an astonishing array of New Deal programs through a largely compliant Congress, assuming what some described as near-dictatorial powers. But in his second term, full of confidence because of a landslide victory in 1936 that brought in unprecedented Democratic majorities in the House and Senate, Roosevelt overreached with his infamous Court-packing proposal. All of a sudden, the political capital that experts thought was limitless disappeared. FDR’s plan to expand the Supreme Court by putting in his judicial allies abruptly created an unanticipated wall of opposition from newly reunited Republicans and conservative Southern Democrats. FDR thus inadvertently handed back to Congress, especially to the Senate, the power and influence he had seized in his first term. Sure, Roosevelt had loads of popularity and momentum in 1937. He seemed to have a bank vault full of political capital. But, once again, a president simply chose to take on the wrong issue at the wrong time; this time, instead of most of the political interests in the country aligning his way, they opposed him. Roosevelt didn’t fully recover until World War II, despite two more election victories. In terms of Obama’s second-term agenda, what all these shifting tides of momentum and political calculation mean is

this: Anything goes. Obama has no more elections to win, and he needs to worry only about the support he will have in the House and Senate after 2014. But if he picks issues that the country’s

mood will support—such as, perhaps, immigration reform and gun control—there is no reason to think he can’t win far more

Page 26: 2ac – t preventative intent (lemos)-+SDI...Web view2ac – t preventative intent (lemos) We meet – their evidence agrees government collection of metadata has preventative intent

victories than any of the careful calculators of political capital now believe is possible, including battles over tax reform and deficit reduction. Amid today’s atmosphere of Republican self-doubt, a new, more mature Obama seems to be emerging, one who has his agenda clearly in mind and will ride the mood of the

country more adroitly. If he can get some early wins —as he already has, apparently, on the fiscal cliff and the upper-income tax increase—that will create momentum , and one win may well lead to others. “Winning wins.” Obama himself learned some hard lessons over the past four years about the falsity of the political-capital concept. Despite his decisive victory over John McCain in 2008, he fumbled the selling of his $787 billion stimulus plan by portraying himself naively as a “post-partisan” president who somehow had been given the electoral mandate to be all things to all people. So Obama tried to sell his stimulus as a long-term restructuring plan that would “lay the groundwork for long-term economic growth.” The president thus fed GOP suspicions that he was just another big-government liberal. Had he understood better that the country was digging in against yet more government intervention and had sold the stimulus as what it mainly was—a giant shot of adrenalin to an economy with a stopped heart, a pure emergency measure—he might well have escaped the worst of the backlash. But by laying on ambitious programs, and following up quickly with his health care plan, he only sealed his reputation on the right as a closet socialist. After that, Obama’s public posturing provoked automatic opposition from the GOP, no matter what he said. If the president put his personal imprimatur on any plan—from deficit reduction, to health care, to immigration reform—Republicans were virtually guaranteed to come out against it. But this year, when he sought to exploit the chastened GOP’s newfound willingness to compromise on immigration, his approach was different. He seemed to understand that the Republicans needed to reclaim immigration reform as their own issue, and he was willing to let them have some credit. When he mounted his bully pulpit in Nevada, he delivered another new message as well: You Republicans don’t have to listen to what I say anymore. And don’t worry about who’s got the political capital. Just take a hard look at where I’m saying this: in a state you were supposed to have won but lost because of the rising Hispanic vote. Obama was cleverly pointing the GOP toward conclusions that he knows it is already reaching on its own: If you, the Republicans, want to have any kind of a future in a vastly changed electoral map, you have no choice but to move. It’s your choice.

Obama doesn’t have PC – ISIS, Immigration, the past TPA vote, Iran, etc all prove Obama’s influence is minimal and he can’t regenerate to get the Cuba vote passed The tech sector loves and will push for the plan – they’re a key lobby groupRomm, 15 (Tony Romm, senior technology reporter for Politico, 1-21-2015, "Tech giants get deeper into D.C. influence game", POLITICO, http://www.politico.com/story/2015/01/tech-lobby-apple-amazon-facebook-google-114468.html, DA: 6-2-2015)Apple, Amazon and Facebook shelled out record amounts to influence Washington; Google posted one of its biggest lobbying years ever; and a slew of new tech companies dipped their toes into politics for the first time in 2014 — a sign of the industry’s deepening effort to shape policymakin g in D.C. The sharp uptick in spending reflects the tech sector’s evolution from an industry that once

shunned Washington into a powerful interest that’s willing to lobby extensively to advance the debates that matter most to companies’ bottom lines — from

clamping down on patent lawsuits to restricting NSA surveillance to obtaining more high-skilled immigration visas and green cards. Story Continued Below “There is increasingly a sense from companies that they need to engage earlier and smarter,” said Ryan Triplette, a Republican lobbyist for Franklin Square Group, which represents companies like Apple and Google. “They began opening up their view as their businesses have grown … and not just looking at traditional technology issues.” Apple, which mostly avoided D.C. under the watch of late CEO Steve Jobs, grew its lobbying balance sheet to just over $4.1 million last year from $3.3 million in 2013, according to an analysis of lobbying reports, the latest of which were filed midnight Tuesday. The iPhone giant recently has shown a greater willingness to engage Washington under CEO Tim Cook: It even dispatched executives to Capitol Hill in September to talk about its new smart watch and health tracking tools hoping to assuage lawmakers’ fears about the new technology’s data-tracking abilities. Amazon’s lobbying expenses — more than $4.7 million, up from around $3.5 million in 2013 — correspond with the company’s own Washington makeover. The e-commerce giant last year jumped into new lines of business, expanding its pursuit of government contracts while eyeing a new drone delivery service, prompting it to hire a slew of new lobbyists and move to a bigger downtown D.C. office. Amazon is also fighting the Federal Trade Commission over how it handled app purchases made by kids. Apple, Amazon and Google declined to comment on the record. Facebook did not reply to a request for comment. For all their efforts, these tech giants failed to advance their political priorities in the last Congress — but the fights are sure to return in 2015 under the Republican-majority Congress. GOP leaders in both chambers have already promised to revive the debate over patent litigation reform — a critical issue for tech companies like Google that want to curb lawsuits from so-called patent trolls. There’s also talk of boosting the number of foreign high-skilled workers, something industry titans have coveted as part of broader immigration reform. The looming expiration of key Patriot Act surveillance authorities means Congress must also wade back into the fight over what data the NSA can collect — a major issue for tech companies stung by Edward Snowden ’s leaks about the agency’s spying via popular Internet services. And lawmakers are plugging into new issues like drones and wearable technology that are important to Silicon Valley. “No doubt, Internet and tech companies are a bigger and more important part of the economy — period. It’s natural they’re going to be more involved in the political process,” said Ed Black, president of the Computer and Communications Industry Association, a trade group whose members include

Page 27: 2ac – t preventative intent (lemos)-+SDI...Web view2ac – t preventative intent (lemos) We meet – their evidence agrees government collection of metadata has preventative intent

Amazon, Facebook and Google. “There’s been a growing realization that not only do tech companies have to be in there [in D.C.], to make a fair pitch, they have to be more actively involved because they have to fight off hostile efforts.“ Google is the leader of the tech pack when it comes to lobbying: The company, which until October owned Motorola Mobility, spent more than $17 million in 2014 — its second-most expensive year after 2012, when it battled back a federal antitrust investigation. The search giant’s D.C. operation, led by former GOP Rep. Susan Molinari, relocated last year to a new, sprawling 54,000-square-foot office steps from the Capitol. Facebook, for its part, spent more than $9.3 million in 2014, up from $6.4 million in 2013. The company’s most recent lobbying report points to its work on privacy and security issues along with Internet access and trade, as Facebook aims to expand its service worldwide and avoid foreign rules that might restrict where it stores user data. Companies like Belkin, a major player in the emerging sector of connected home devices, and Snapchat, an app for disappearing photo messages, each registered their first-ever lobbyists last year. Snapchat hired its new consultants from the firm Heather Podesta + Partners after a major data breach registered on Washington’s radar. Other prominent tech companies retained new help, as well. Netflix grew its lobbying roster amid the fight at the FCC over net neutrality. And Uber added D.C. lobbyists to win new allies for its ride-hailing app, which has triggered fights with state and local regulators and cab operators nationwide. And a coalition of tech titans like Apple, Google and Microsoft banded together to invest in an anti-NSA snooping coalition, Reform Government Surveillance, which spent $230,000 in 2014. Many of those companies ’ executives regularly travel ed to Washington to press President Barack Obama on surveillance reforms , and the group ran frequent advertisements highlighting the need for more NSA transparency.

There’s bipartisan momentum for curtailing surveillanceWeisman, 13 (Jonathan Weisman, political writer for NYT, 7-28-2013, "Momentum Builds against N.S.A. Surveillance", New York Times, http://www.nytimes.com/2013/07/29/us/politics/momentum-builds-against-nsa-surveillance.html, DA: 5-30-2015)WASHINGTON — The movement to crack down on government surveillance started with an odd couple from Michigan, Representatives Justin Amash, a young libertarian Republican known even to his friends as “chief wing nut,” and John Conyers Jr., an elder of the liberal left in his 25th House term. But what began on the political fringes only a week ago has built a momentum that even critics say may be unstoppable , drawing support from Republican and Democratic leaders , attracting moderates in both parties and pulling in some of the most respected voices on national security in the House. The rapidly shifting politics were reflected clearly in the House on Wednesday, when a plan to defund the National Security Agency’s telephone data collection program fell just seven votes short of passage. Now, after initially signaling that they were comfortable with the scope of the N.S.A.’s collection of Americans’ phone and Internet activities, but not their content, revealed last month by Edward J. Snowden, lawmakers are showing an increasing willingness to use legislation to curb those actions . Representatives Jim Sensenbrenner, Republican of Wisconsin, and Zoe Lofgren, Democrat of California, have begun work on legislation in the House Judiciary Committee to significantly rein in N.S.A. telephone surveillance. Mr. Sensenbrenner said on Friday that he would have a bill ready when Congress returned from its August recess that would restrict phone surveillance to only those named as targets of a federal terrorism investigation, make significant changes to the secret court that oversees such programs and give businesses like Microsoft and Google permission to reveal their dealings before that court. “There is a growing sense that things have really gone a-kilter here,” Ms. Lofgren said. The sudden reconsideration of post-Sept. 11 counterterrorism policy has taken much of Washington by surprise. As the revelations by Mr. Snowden, a former N.S.A. contractor, were gaining attention in the news media, the White House and leaders in both parties stood united behind the programs he had unmasked. They were focused mostly on bringing the leaker to justice. Backers of sweeping surveillance powers now say they recognize that changes are likely, and they are taking steps to make sure they maintain control over the extent of any revisions. Leaders of the Senate Intelligence Committee met on Wednesday as the House deliberated to try to find accommodations to growing public misgivings about the programs, said the committee’s chairwoman, Senator Dianne Feinstein, Democrat of California. Senator Mark Udall, a Colorado Democrat and longtime critic of the N.S.A. surveillance programs, said he had taken part in serious meetings to discuss changes. Senator Saxby Chambliss of Georgia, the ranking Republican on the panel, said, “We’re talking through it right now.” He added, “There are a lot of ideas on the table, and it’s pretty obvious that we’ve got some uneasy folks.” Representative Mike Rogers, a Michigan Republican and the chairman of the House Intelligence Committee, has assured House colleagues that an intelligence policy bill he plans to draft in mid-September will include new privacy safeguards. Aides familiar with his efforts said the House Intelligence Committee was focusing on more transparency for the secret Foreign Intelligence Surveillance Court, which oversees data gathering, including possibly declassifying

Page 28: 2ac – t preventative intent (lemos)-+SDI...Web view2ac – t preventative intent (lemos) We meet – their evidence agrees government collection of metadata has preventative intent

that court’s orders, and changes to the way the surveillance data is stored. The legislation may order such data to be held by the telecommunications companies that produce them or by an independent entity, not the government. Lawmakers say their votes to restrain the N.S.A. reflect a gut -level concern among voters about personal privacy . “I represent a very reasonable district in suburban Philadelphia, and my constituents are expressing a growing concern on the sweeping amounts of data that the government is compiling,” said Representative Michael G. Fitzpatrick, a moderate Republican who represents one of the few true swing districts left in the House and who voted on Wednesday to limit N.S.A. surveillance. Votes from the likes of Mr. Fitzpatrick were not initially anticipated when Republican leaders chided reporters for their interest in legislation that they said would go nowhere. As the House slowly worked its way on Wednesday toward an evening vote to curb government surveillance, even proponents of the legislation jokingly predicted that only the “wing nuts” — the libertarians of the right, the most ardent liberals on the left — would support the measure. Then Mr. Sensenbrenner, a Republican veteran and one of the primary authors of the post-Sept. 11 Patriot Act, stepped to a microphone on the House floor. Never, he said, did he intend to allow the wholesale vacuuming up of domestic phone records, nor did his legislation envision that data dragnets would go beyond specific targets of terrorism investigations. “The time has come to stop it, and the way we stop it is to approve this amendment,” Mr. Sensenbrenner said. He had not intended to speak, and when he did, he did not say much, just seven brief sentences. “I was able to say what needed to be said in a minute,” he said Friday. Lawmakers from both parties said the brief speech was a pivotal moment. When the tally was final, the effort to end the N.S.A.’s programs had fallen short, 205 to 217. Supporters included Republican leaders like Representative Cathy McMorris Rodgers of Washington and Democratic leaders like Representative James E. Clyburn of South Carolina. Republican moderates like Mr. Fitzpatrick and Blue Dog Democrats like Representative Kurt Schrader of Oregon joined with respected voices on national security matters like Mr. Sensenbrenner and Ms. Lofgren. Besides Ms. McMorris Rodgers, Representative Lynn Jenkins of Kansas, another member of the Republican leadership, voted yes. On the Democratic side, the chairman of the House Democratic Caucus, Representative Xavier Becerra of California, and his vice chairman, Representative Joseph Crowley of New York, broke with the top two Democrats, Representatives Nancy Pelosi of California and Steny H. Hoyer of Maryland, who pressed hard for no votes. On Friday, Ms. Pelosi, the House minority leader and a veteran of the Intelligence Committee, and Mr. Hoyer dashed off a letter to the president warning that even those Democrats who had stayed with him on the issue on Wednesday would be seeking changes. That letter included the signature of Mr. Conyers, who is rallying an increasingly unified Democratic caucus to his side, as well as 61 House Democrats who voted no on Wednesday but are now publicly signaling their discontent. “Although some of us voted for and others against the amendment, we all agree that there are lingering questions and concerns about the current” data collection program, the letter stated. Representative Reid Ribble of Wisconsin, a Republican who voted for the curbs and predicted that changes to the N.S.A. surveillance programs were now unstoppable, said: “This was in many respects a vote intended to send a message. The vote was just too strong.” Ms. Lofgren said the White House and Democratic and Republican leaders had not come to grips with what she called “a grave sense of betrayal” that greeted Mr. Snowden’s revelations. Since the Bush administration, lawmakers had been repeatedly assured that such indiscriminate collection of data did not exist, and that when targeting was unspecific, it was aimed at people abroad. The movement against the N.S.A. began with the fringes of each party. Mr. Amash of Michigan began pressing for an amendment on the annual military spending bill aimed at the N.S.A. Leaders of the Intelligence Committee argued strenuously that such an amendment was not relevant to military spending and should be ruled out of order. But Mr. Amash, an acolyte of Ron Paul, a libertarian former congressman, persisted and rallied support. Mr. Sensenbrenner and Ms. Lofgren said they were willing to work with the House and Senate intelligence panels to overhaul the surveillance programs, but indicated that they did not believe those panels were ready to go far enough. “I would just hope the Intelligence Committees will not stick their heads in the sand on this,” Mr. Sensenbrenner said.