Professional Documents
Culture Documents
Kentucky Bannister Trufanov Aff NDT Semis
Kentucky Bannister Trufanov Aff NDT Semis
Kentucky Bannister Trufanov Aff NDT Semis
Cyber Defense
Advantage one is cyber defense.
In the most common scenario for cyberattacks on the US---directed by a foreign subject
but routed through computers on US soil, owned by US persons---threat response is
failing because of ambiguous civilian and military authorities. This risks grid AND
infrastructure collapse.
Susan W. Brenner 16. Samuel A. McCray Chair in Law, University of Dayton School of Law.
03/14/2016. “Cyberthreats and the Posse Comitatus Act: Speculations.” Journal of International
and Comparative Law, vol. 4, no. 1, https://scholarship.law.stjohns.edu/jicl/vol4/iss1/2.
II. Cyberthreats and the Posse Comitatus Act This section reviews how cyberthreats undermine the viability of the threat response
system examined in Section I. 27 It also analyzes whether it would be possible, and prudent, to modify the system in ways that
could allow for more flexible responses to threats of both types. A. The Problem As noted above, the U nited S tates, like
most twenty-first century nation-states, employs a bifurcated threat-response and control system
which is predicated on the assumption that threats to social order are readily divisible into
“inside” threats (law enforcement) and “outside” threats (the military). While this system has
proven quite satisfactory in dealing with real-world threats, it breaks down as threat activity migrates “ in to”
cyberspace , i.e., as malefactors use digital technology to attack individual or governmental
targets in their own country or halfway around the world. Cyberspace transcends spatial
boundaries and thereby erode s the distinction between “inside” and “outside” threats. It can
be difficult to determine whether cyberattacks came from “inside” or “outside" a particular state.
And even if it is clear that an attack came from “outside,” the attack may not otherwise conform
to the definition of an “outside” attack , i.e., an act of war . Conversely, when an attack
comes from “inside,” it may not otherwise conform to the definition of an “inside” attack, i.e., it
may not clearly qualify as crime or terrorism . For example, in the spring of 2013, Mandiant, a U.S. computer
security firm, issued a report that described how a specialized unit of the People’s Liberation Army28 (“ PLA ”) was, and had for
years been, hacking into computers of U.S. businesses and stealing proprietary information. 29 Stealing
proprietary information is a federal crime .30 The PLA members who were engaging in this activity
were therefore committing a crime “in” the U nited S tates, but this was not a conventional crime. Uniformed
members of a nation-state’s military acting on behalf of their sovereign were committing it. That raises a number
of difficult issues. For one thing, it is almost certain that China would not extradite the PLA
members to the United States to be prosecuted for their crimes because China is, at the very least, complicit in
those crimes.31 The civilian law enforcement system can, as a result, do nothing to retaliate against or
halt this type of activity. For another, the scenario seems to mix metaphors: since the activity that
would otherwise constitute a crime was carried out by military personnel who were acting on
behalf of their sovereign, does it constitute war? Or consider a different scenario: in June of 2009,
cybercriminals surreptitiously extracted $415,989 from an account at the First Federal Savings Bank in Shepherdsville, Kentucky.32
The account belonged to Bullitt County. The transfers were not discovered until the money was gone. Officials contacted the
Federal Bureau of Investigation, which determined the transfers originated in Ukraine. The thieves used a Trojan Horse program
installed on the County Treasurer’s computer to extract the funds.33 No one was, and no one will be, charged with the Bullitt County
theft, which is unfortunate because online bank robbery is far from uncommon: in the spring of 2013, “hackers in Ukraine
and Russia ” extracted $1.3 million from a Washington hospital.34 Since the United States does not have an extradition treaty
with Russia, 35 and Ukraine is a cybercrime haven,36 no one will be prosecuted for this crime, and, like Bullitt County, this hospital
What has all this to do with the P osse C omitatus A ct? It has several
will never recover the lost funds.
implications for the system of threat control upon which the United States relies. One consequence
of that system is, as noted earlier, that law enforcement officers deal with “inside” threats, which logically implies that they do not
pursue “outside” threats. That, of course, is not literally true, nations have developed systems in which officers from various
countries can cooperate and offenders can be extradited for prosecution in the United States.37 The problem is that, while
states have historically had an incentive to cooperate in the apprehension and prosecution of
traditional criminals whose activities can threaten social order in more than one state, they may
not have an incentive to cooperate when the crimes at issue are virtual and have little, if any,
likelihood of negatively affecting the host country. Cybercrime can bring billions into a country, like Ukraine or Russia;
while the state itself is usually not complicit in this type of activity, it still benefits from it.38 And if the haven state’s law
enforcement will not cooperate with U.S. law enforcement that effectively means no one will
be sanctioned for the crime(s) . If these examples seem trivial in their import, consider this: the bank theft
cases illustrate the extent to which U.S. law enforcement cannot protect American citizens from external crime. The Mandiant report
illustrates the extent to which neither U.S. law enforcement nor the U.S. military can protect American
citizens from Chinese military personnel who are stealing their proprietary information. And to make that scenario
more interesting, assume that instead of simply stealing trade secrets, the PLA members are infiltrating U.S.
infrastructures , such as the power grid and financial system , in order to acquire the ability to
sabotage them, in whole or in part .39 B. Implications for the Posse Comitatus Act? As we saw above, the U nited
S tates’ threat response systems are of little utility in dealing with attacks from abroad. Law
enforcement has little ability to operate in other countries, and what ability it has depends on the
acquiescence and support of the government in a particular state. This is not surprising, since U.S.
authorities are unlikely to acquiesce in and support the efforts of foreign law enforcement officers – Russian police, for example –
who wish to conduct an investigation in the United States that targets U.S. citizens. Law enforcement has been, and continues to
be, parochial. The military not only has the ability to operate in other countries, that is its default
mission (absent an armed invasion of U.S. territory). But the military cannot participate in law
enforcement , at least not under the P osse C omitatus A ct.40 While it is not clear if the Act applies extraterritorially,
the Department of Defense operates on the premise that it does, subject to certain exceptions.41 The P osse C omitatus A ct,
then, is the only legal principle that bars cooperation between law enforcement and the military. Nothing in
the Constitution prohibits this: when the Constitution was drafted the nation’s threat control system consisted of the able-bodied men
of the nation, who acted as law enforcers or as members of the military, depending on the circumstances. Logically, that approach
has a certain appeal in a world in which computer and other technology erodes the import of national boundaries, especially as far
as threat control is concerned. Should we reassess the Posse Comitatus Act, with an eye to modifying or repealing it? So far, I
continue to be agnostic on that issue, but I think it is worth exploring to determine if there was a way to think about how we might
approach threat control differently. To that end, therefore, I shall speculate about what might be involved in relaxing or eliminating
the Act’s prohibition on cooperation between civilian law enforcement and the military. C. Repeal or Modify the Posse Comitatus Act
I begin with the most drastic option – eliminating the Act. Actually, I begin with what I see as two, more or less equally drastic
options: one is to simply repeal the Posse Comitatus Act, thereby eliminating the prohibition on law enforcement-military
collaboration. The other, somewhat less drastic option, would be to modify the Posse Comitatus Act so that it bars law
enforcementmilitary collaboration in the physical world but not when the activity at issue involves cyberattacks. While the notion of
repealing the Posse Comitatus Act has an attractive simplicity, I cannot contemplate such a step without trepidation. As one author
noted, “there is something inherently repugnant to most Americans at the thought of the military patrolling the streets of our cities
and towns.”42 This is not because we do not trust our military, but because we fear what it might become if we took this step. Also,
we would likely gain little from repealing the Posse Comitatus Act because the military has no expertise in civilian law
enforcement.43 If we went down this path, we might actually undermine the effectiveness of the military and law enforcement by
eroding the distinctiveness of their respective missions. And, finally, repealing the Act would be overkill, since the bifurcated
response system seems to work quite well with regard to activity in the physical world. That brings us to the other option – modifying
the Posse Comitatus Act so it does not bar law enforcement-military collaboration with regard to activity that occurs in or is vectored
through cyberspace. Since the impetus for reconsidering it is the difficulties law enforcement and the military respectively confront in
dealing with cyberthreats, this would seem a more logical, more focused approach. The question then becomes, what, precisely,
would we seek to achieve by modifying the Posse Comitatus Act? Do we, for example, want our military to be able to act as law
enforcement agents (or surrogates) when it is necessary to deal with cyberattacks from abroad? If the answer to that question is
yes, then I have another question: what, precisely, would we want the military to do? In both of the scenarios we examined earlier,
foreign nationals were committing crimes by stealing property (funds in one case, trade secrets in the other) from American citizens
who were in the United States. In one case, the perpetrators were members of the Chinese military; in the other, they were
Ukrainian citizens. Unless and until we modify our conceptualization of the threat array, the activity in both instances constituted
crime, rather than warfare. It might, therefore, seem as if the U.S. military would have no conceivable role to play in responding to
these and similar attacks, since I assume no rational person would argue that the United States should launch a retaliatory military
strike on China (or on Ukraine) in response to these thefts. That does not necessarily mean that the U.S. military might not be able
to assist law enforcement in ways that could enhance the latter’s ability to respond effectively to cross-border crimes. As we saw
above, in neither case will U.S. law enforcement be able to have the perpetrators extradited so they can be charged, prosecuted
and presumably convicted in the United States. Some, though, argue that law enforcement should be able to employ other
measures to create at least something of a disincentive to attack Americans. They contend that U.S. law enforcement should be
able to use “electronic sanctions” to react to cybercrimes.44 Relatively recently, I discussed this issue with a former Department of
Homeland Security official who, as far as I could determine, seemed to be arguing that this type of a response is lawful under Model
Penal Code § 3.09(1) either to prevent the theft of “movable property” or to retake such property. If we accept that argument, at least
for the purposes of analysis, then we need to address the practicalities it presents: how is U.S. law enforcement going to use virtual
force to strike back at someone attempting theft who is located in another country? I have not found any authority for this
proposition, but I strongly suspect U.S. law enforcement does not have the constitution, statutory or common law authority to attack
targets in another country. The military, of course, does have such authority, at least as a general matter. So if (and I regard that as
a significant qualifier) we were to decide we want to employ online strike-back techniques as a way to create disincentives to use
cyberspace to attack American targets, and if we made the appropriate modifications to the Posse Comitatus Act, the military could
either support law enforcement’s efforts in this regard or actually be responsible for carrying out the strike-back attacks. This is but
one obvious example of what allowing U.S. law enforcement and the U.S. military to collaborate in dealing with extraterritorial
cybercrime might involve. I offer this scenario purely for the purposes of analysis – as a way of illustrating the possible utility of
modifying the Posse Comitatus Act to allow this type of collaboration. Personally, I have serious reservations about our going down
this path. Aside from anything else, I fear it could have serious consequences, i.e., that what began as a law enforcement strike-
back attack could escalate until the two countries were at war with each other, on- and/or off-line. D. Allow U.S. Law Enforcement to
Support Military’s Efforts in Cyberspace The Posse Comitatus Act prohibits using the military in civilian law enforcement. It does not
prohibit using law enforcement to support the military’s efforts to deal with attacks from other nation-states. Logically, then, we could
allow U.S. law enforcement officers to support the military’s efforts to deal with cyberattacks that are directed at U.S. targets and
that are carried out by another nation-state (presumably by its military). The question then becomes, what might we gain from taking
this step? From the little I know about the U.S. military’s preparation for cyberwar, I am quite confident they do not need any
assistance in developing the appropriate weaponry or skills necessary for this endeavor. I am also assuming that law enforcement
officers would add little to the military’s ability to deal with cyberattacks from other states. This assumption is basically the converse
of the assumption we made above, i.e., that the military can add little, if anything, to law enforcement’s ability to deal with crime,
including cybercrime. There is at least one thing that law enforcement might be able to contribute to
the military’s efforts in this regard: threat information . Unlike conventional warfare, which is
conducted in public and has traditionally been directed at military targets only , cyberattacks
tend to be directed at civilian targets . Earlier, I raised the scenario in which PLA members are exploring
the networks used by U.S. infrastructure providers to learn how to sabotage them .45 Civilians ,
including law enforcement , have much greater access to info rmation about activity such as
this, because while there may be no statutory or constitutional prohibition on the U.S. military’s monitoring U.S. civilian entities to
detect possible cyberthreats, this type of activity would probably encounter opposition from the public, and their representatives.46
While it would probably not eliminate the opposition, allowing law enforcement to share information it collected while legitimately
carrying out its professional duties might significantly mitigate it.47 E. Create an Entirely New Entity Another option I do not support
would be to create a new entity, which was neither wholly law enforcement nor wholly military but was able to deal with threats that
were purely internal, purely external, and that had elements of each. I do not favor this because I believe adding another layer of
institutional bureaucracy would only further impede the nation’s ability to deal effectively with cyberthreats. F. Regress Since
cyberthreats do not fall neatly into the “inside” – “outside” threat dichotomy and consequently tend to resist the efforts of the
correlate threat response systems on which we currently rely, another option would be to begin to decentralize threat response
systems to place at least some responsibility for identifying and resisting threats on the civilian entities that are most likely to be
targeted. The effort might eventually expand to do something similar with individual civilians, as well, but it would be more
reasonable, and more feasible, to begin with corporate and other entities. Such an effort would, in effect, involve extrapolating the
common law militia and the posse comitatus into the cyber arena so that companies and other essential institutions would be
charged with protecting themselves from attacks. Government entities, including law enforcement and the military, could support
involving the civilian sector is that it
them in this regard, with expertise, technologies and other assets. The advantage of
would not only enhance the threat-detection and response capabilities of law enforcement
and the military , it would also give both access to more detailed threat data than they
currently have.
First, trust---credibly communicating that the military isn’t involved in securing private
infrastructure is key to public-private security partnerships.
Gregory T. Nojeim 15. Senior Counsel and Director of the Freedom, Security and Technology
Project The Center for Democracy and Technology. 01-28-15. “Hearing Before the Senate
Homeland Security and Government Affairs Committee on Protecting America From Cyber
Attacks: The Importance of Information Sharing.” CDT. https://cdt.org/files/2015/02/Testimony-
Nojeim-2015-01-28.pdf
Today I will explain how Congress can embrace cybersecurity information sharing policies with
appropriate authorities and safeguards that enhance both privacy and security . I will first
describe the cybersecurity threat and explain the role that information sharing can play in countering that threat. I will then identify
different approaches to encouraging information sharing as well as the essential civil liberties attributes of a successful information
Cyber attacks represent a
sharing policy. I will also measure pending legislative proposals against those attributes.
significant and growing threat. Earlier this year, a study by the Center for Strategic and International Studies estimated
that the global cost of cyber crime has reached over $445 billion annually.1 According to an HP study
released in October 2014, the average cost of cyber crime to each of 50 U.S. companies surveyed had increased to $12.7 million
per company, up from $6.5 million per company just four years ago.2 Frequency and intricacy of attacks has
increased as well. The same study concluded that the number of successful attacks per company per year
has risen by 144 percent since 2010, while the average time to resolve attacks has risen by
221 percent .3 Major cyber attacks represent an ongoing hazard to our financial and
commercial sectors, with potential to harm both important institutions and individual online users.
2014 saw major attacks affecting large numbers of people against companies such as Target, J.P. Morgan Chase, Home Depot,
and most recently, Sony Pictures. 4 In addition to direct harms – which are substantial – these large scale
and highly publicized attacks threaten to chill use of online services. Unfortunately, there is no
“silver bullet” that will wipe away the danger of cyber attacks. Cyber attacks are constantly evolving,
and defending against them requires a range of actions from both governmental and private entities. Most
successful attacks could be stopped by basic security measures, such as frequently changing passwords, patching servers,
detecting insider attacks, and educating employees about risks. Thus, while information sharing is an important tool for enhancing
cybersecurity, it is also important to maintain a broad perspective and encourage other measures that would also increase digital
hygiene. I. Information sharing is an important component of an effective cybersecurity policy and must be accompanied by
appropriate privacy protections at all levels. There is widespread agreement that the sharing of information
about cyber attacks, threats and vulnerabilities is a valuable component of an effective
cybersecurity policy. As detailed by the National Institute of Standards and Technology’s draft “Guide to Cyber Threat and
Information Sharing,” benefits of information sharing include : 1) Greater awareness of specific cyber
threats, and of defenses against them , 2) development of more robust threat indicators, 3)
enhanced defensive agility, 4) rapid notification to victims of cyber attacks , and 5) improved
ability to efficiently process and preserve criminal ev idence.5 While cyber attacks sometimes
employ malware that exploits “zero-day” vulnerabilities – previously undiscovered vulnerabilities
– many cyber attacks are repetitive. Cyber criminals often recycle previously used vulnerabilities, deploying old exploits
on systems and software that were not previously attacked. Information sharing can limit the effectiveness of
these “recycled” threats: the victim of the first attack can share information that can be used by
other potential victims to defend against future iterations of the same attack. Further, by making cyber
criminals take additional steps to modify their attacks rather than simply replicating attacks on previously used
vulnerabilities, the cost of engaging in cyber attacks increases, thereby decreasing the incentive to
engage in them. Many information sharing mechanisms are already in place, are providing benefits, and should be supported,
improved, and built upon. They include sector-specific Information Sharing and Analysis Centers (ISACs) and the DHS Enhanced
Cybersecurity Services Program.6 The cybersecurity proposal the Administration announced earlier this month7 includes an
Privacy protections should be applied prior to
important requirement for cybersecurity information sharing:
any level of info rmation sharing . Privacy safeguards apply to 1) company sharing with the government , 2)
company sharing with the private information sharing hubs the proposal would authorize, and 3) inter-agency sharing. The
Administration proposal requires front-end protections prior to a company’s sharing of cyber threat indicators – reasonable steps to
remove personally identifiable information believed to be unrelated to the threat – as well as privacy guidelines to govern information
sharing among government agencies. 8 This contrasts with the Cyber Intelligence Sharing and Protection Act (CISPA),9 which does
not require reasonable efforts to remove such PII prior to sharing, and requires instantaneous, real-time transfer of information,
including communications content, from the Department of Homeland Security (DHS) to other government agencies – including the
National Security Agency (NSA). While the Administration proposal has ambiguities and omissions that might render it less effective
than it could be in protecting privacy,10 it demonstrates that a viable information sharing policy can empower all players in the
cybersecurity ecosystem to rapidly transmit cyber threat information with civil liberties protections built in. Quite simply, the
American public should not – and need not – be forced to choose between being hacked by
cyber criminals and being snooped on by the government. II. Information sharing among private entities avoids
significant civil liberties concerns and should be encouraged. In this section and the next, I describe two approaches to information
sharing that we favor because they minimize civil liberties risks – 1) private-to-private information sharing and 2) information sharing
facilitated by limited amendments to the surveillance statutes that do not necessitate creation of complex, new programs. The most
important type of information sharing to incentivize is that between private entities. This is because entities in the private sector own
and operate most of the critical infrastructure in the country that must be protected against cyber attacks. Information sharing can
occur directly between private entities, without any government involvement. Threat analysis would occur more often at the private
company level as opposed to within the government. This not only makes the process more efficient, it does not raise many of the
privacy and civil liberties concerns attendant to private-to-government information sharing. For example, privateto-private sharing of
information does not convey communications content to the NSA, and does not raise concerns that this sharing of information could
result in a new surveillance program through a backdoor, which Congress did not intend to authorize. The White House proposal
does little to encourage company-to-company information sharing – it extends no liability protection for this sharing – and this is a
significant shortcoming. Instead, the Administration proposal encourages private-to-private sharing only through informationsharing
hubs that the government has designated as such. This approach may have been taken because the Administration and industry
have had difficulty in agreeing on a mechanism to ensure that companies play by the rules when they share information company-
to-company. We believe such a mechanism is a pre-requisite to expanding such sharing. One barrier to company-to-company
information sharing – antitrust concerns – was largely put to rest by a Department of Justice/Federal Trade Commission policy
guidance issued last year.11 The U.S. Chamber of Commerce correctly read the guidance as a positive step and as a statement,
“…that antitrust concerns are not raised when companies share cyber threat information with each other….12 In addition to sharing
between private entities, sharing from governmental to private entities represents an area for opportunity. To the extent that the
government has information that would be useful for private entities to defend themselves, it should declassify it as necessary and
share it. It can do this under current law. As with private-to-private sharing, government-toprivate sharing can augment cybersecurity
without the same risks to privacy that private-togovernment sharing creates. III. Current law permits sharing to protect oneself, but
not to protect others. This can and should be addressed with a narrow amendment. The other approach to information sharing that
we commend to you involves only limited amendments to surveillance statutes. Current law does allow some degree of
cybersecurity information sharing, but it does not meet present cybersecurity needs. Communication service providers are permitted
to monitor their own systems and to disclose to governmental entities, and other service providers, information about cyber attacks
for the purpose of protecting their own networks. In particular, the Wiretap Act provides that it is lawful for any provider of electronic
communications service to intercept, disclose or use communications passing over its network while engaged in any activity that is a
necessary incident to the protection of the rights and property of the provider.13 This includes the authority to disclose
communications to the government or to another private entity when doing so is necessary to protect the service provider’s network.
Likewise, the Electronic Communications Privacy Act (ECPA) permits providers to disclose stored communications14 and customer
records15 to any governmental or private entity in order to protect its own systems. Furthermore, the Wiretap Act provides that it is
lawful for a service provider to invite in the government to intercept the communications of a “computer trespasser” if the owner or
operator of the computer authorizes the interception and there are reasonable grounds to believe that the communication will be
relevant to an investigation of the trespass.16 While current law authorizes providers to monitor their own systems and to voluntarily
disclose communications necessary to protect their own systems, the law does not authorize service providers to make disclosures
to other service providers or to the government to help protect the systems of other service providers. Thus, there may be a need for
an exception to the Wiretap Act and ECPA to permit disclosures to others about specific attacks. Any such exception should be
narrow so that routine disclosure of Internet traffic to the government or other service providers remains clearly prohibited. It should
bar unrestricted disclosure to the government of vast streams of communications data, and permit only the disclosure of carefully
defined cyber attack signatures, cyber attack attribution information, and the method or the process of a cyber attack. It should also
include privacy protections such as those described below. Rather than taking the dangerous step of overriding the surveillance
statutes, such a narrow exception could operate within them, limiting the impact of cybersecurity information sharing on personal
privacy. Companies that share information under such a narrow exception will enjoy the liability protections already built into theses
statutes. As other statutes that limit information sharing for cyber security purposes are identified, Congress may consider additional
exceptions. We encourage you to embrace this focused approach to enhancing cybersecurity information sharing. If it proves
inadequate to promote information sharing, broader, riskier approaches that operate “notwithstanding any law” can be considered.
However, because all of the major cybersecurity information sharing proposals take what we believe to be the overbroad, risky
approach of trumping all other laws, they are addressed in some detail below. The civil liberties protections we describe are an
important part of any cybersecurity information sharing program, but are particularly important for the broader, riskier approaches.
IV. Civilian control of cybersecurity activity involving the civilian private sector should be maintained. For numerous reasons, it is
critical that if private, civilian entities are authorized to share users’ communications
information with governmental entities for cybersecurity reasons , that information should flow
to and be controlled by a civilian agency – DHS – rather than a military agency , such as the NSA
or Cyber Command. First, civilian agencie s are more transparent ; for understandable reasons, intelligence
agencies are more opaque . Details about the scope and nature of civilian agency activities,
privacy protections – such as minimization rules – and interpretation of relevant law are all more
available from civilian agencies. The Snowden disclosures demonstrate the contrasting approach of
military intelligence agencies. Until June 2013, the public was unaware that the PATRIOT Act had been interpreted to
authorize bulk collection of metadata, and that domestic phone call and Internet activity records were being collected, used, and
retained for years. Second, DHS has a well-established, statutory, and well-staffed privacy office. The NSA’s privacy office was
established just last year, with a huge mandate and relatively tiny staff. Third, the NSA has multiple missions that can
create conflicts about how to treat the cyber threat and cyber vulnerability information that it receives.
In addition to its mission of defending information security, the NSA is also tasked with gathering
signals intelligence, including through use of vulnerabilities. If the NSA receives information regarding a cyber threat or cyber
vulnerability, its intelligence-gathering mission may be prioritized, leading the agency to hide, preserve and exploit the
vulnerability, rather than disclose it to the entity that could patch the vulnerability.17 It is for this precise reason that the President’s
independent Review Group on Intelligence and Communications Technologies recommended moving NSA’s information assurance
mission into a separate agency in the Department of Defense. 18 ***BEGIN FOOTNOTE*** 18 See, The President’s
Review Group on Intelligence and Communications Technologies, Liberty and Security in a Changing World, (Dec. 12, 2013), 185,
available at http://www.whitehouse.gov/sites/default/files/docs/2013-12- 12_rg_final_report.pdf (“Those charged with offensive
responsibilities still seek to collect SIGINT or carry out cyber attacks. By contrast, those charged with information assurance have no
effective way to protect the multitude of exposed systems from the attacks. The SIGINT function and the information
assurance function conflict more fundamentally than before. This conclusion supports our recommendation to
split the Information Assurance Directorate of NSA into a separate organization.”) ***END FOOTNOTE*** Further, while
information may be shared to respond to cyber threats, NSA may re-purpose it to support its intelligence-gathering mission, creating
a new surveillance program operating under a cybersecurity umbrella. Finally, public trust in military intelligence agencies
was severely compromised in both the U.S. and abroad by the NSA activities that Edward Snowden disclosed. Mass collection of
sensitive communications and communications information pertaining to individuals not suspected of wrongdoing has led to strong
demands for greater protections. If NSA or Cyber Command were to serve as the government entity receiving cyber threat
information from communications service providers, it would almost certainly mean less trust ,
and therefore less corporate participation . Indeed, in the wake of revelations regarding the PRISM program, many
major tech companies stated that they would not voluntarily share users’ information or private communications with the NSA.19
Thus, preserving civilian control by putting a civilian agency in charge of cyber threat
indicators shared by the civilian sector with the government will not only enhance civil liberties ,
it would increase the effectiveness of this effort to promote security . Main cybersecurity proposals have
inadequately addressed this issue . While the Administration proposal requires application of privacy guidelines
before information shared with DHS is sent to military agencies including the NSA, it is not clear that the guidelines will offer
sufficient protections.20 CISPA is even more problematic. It requires real-time sharing from DHS to NSA ,21 effectively
creating the same concerns as company information sharing directly to the military. The Senate Intelligence Committee’s
Cybersecurity Information Sharing Act (CISA), reported out in 2014 takes the same problematic approach as does CISPA. 22 V.
Use restrictions should ensure that info rmation shared for cybersecurity purposes is only used for
cybersecurity, with narrow exceptions. Cybersecurity legislation should not be warped into a backdoor
wiretap , whereby communications shared to respond to cyber threats are provided to law enforcement
agencies that use them for investigation of unrelated offenses , or to intelligence agencies that use them for
national security purposes other than cybersecurity. Doing so undermines the privacy protections built into the
Wiretap Act, ECPA, and the Foreign Intelligence Surveillance Act, and the critical role of an independent judiciary in
authorizing surveillance for criminal and foreign intelligence investigations . For example, the user
communications information that a company shares with the government could be stored, then
mined for information relevant to crime or national security using identifiers of U.S. persons .
Instead of applying for the court order that would permit access to such information under a surveillance statute when
the information pertains to a US person or a person in the U.S., the government could simply pull the information
from “the corporate store” as the NSA does for the telephone call records it collects in bulk under Section 215 of
the PATRIOT Act.23 Overbroad use permissions also create a perverse incentive for government to
retain communications content, and even pressure companies into providing it more
frequently than is necessary for cybersecurity.
Third, clarity---the plan creates a clear legal framework for military collaboration with
civilians in cyberspace.
Mystica Alexander & William Wiggins 16. Wiggins is a Professor at Bentley University;
Alexander is an Assistant Professor at Bentley University. 01/01/2016. “A Domestic
Consequence of the Government Spying on Its Citizens: The Guilty Go Free.” Brooklyn Law
Review, vol. 81, no. 2, https://brooklynworks.brooklaw.edu/blr/vol81/iss2/4.
Civilian-military collaborations are inevitable in the fight against terrorism, both domestically
and abroad.311 ***BEGIN FOOTNOTE*** 311 This point is expanded upon by Daniel Sennott , supra note 305.
As an example, he points out that terrorists are being tried in civilian courts based on military
intelligence . ***END FOOTNOTE*** Cyber surveillance , such as that conducted by the NCIS in Dreyer and
routinely conducted by the NSA, creates numerous opportunities for the sharing of information with
civilian authorities. Explicit statutory guidance on the permissible parameters of how
info rmation about civilians is gathered , used, and shared by the military that takes into
account modern technological advances would remove uncertainties for military and civilian
authorities alike. Congressional action that provides clear guidance to address current
surveillance methods and cooperation between military and civilian authorities , coupled with the
enforcement of the criminal sanctions for PCA violations, would deter behavior such as that engaged in by the NCIS in Dreyer.
This would eliminate the need for a court to step in and utilize the exclusionary rule as a deterrent. But should
Congress choose to allow the status quo to continue and turn a blind eye to the need to curb abuses of power, other courts may
follow the lead of the Ninth Circuit in Dreyer and apply the exclusionary rule in order to send a clear message that military overreach
that violates the spirit of the PCA will no longer be tolerated. CONCLUSION In Dreyer, the Ninth Circuit has sparked a conversation
on the role of the judiciary as gatekeeper and protector of civil liberties in instances of military involvement in civilian affairs. This
approach recognizes that in an era of technological advances and unprecedented grants of power to government-surveillance
operations, many of which may involve members of the military, the time has come to revisit the long history of the judiciary allowing
military overstep on constitutional liberties. While the courts’ role as a check on the power of the other branches cannot be
understated, court decisions other than those of the Supreme Court represent an ad hoc approach to justice that provides an
inconsistent application of the exclusionary rule and will lead to uncertainty and continued abuses. In a post-9/11 world with
increasing threats from terrorist groups such as ISIS,312 cyber surveillance of U.S. citizens by the NSA, the NCIS, and other military
units within the DoD will continue for many years to come. The question prompted by the Dreyer decision is how much intrusion into
the private affairs of ordinary citizens the courts and the general public will be willing to accept, especially when the results of such
surveillance activities are used by civilian law enforcement to prosecute crimes. In employing the exclusionary rule in response to
PCAviolating military action, the Dreyer court expressed its refusal to accept the unbridled military surveillance of U.S. citizens when
the fruits of such surveillance are used by civilian law enforcement officials to prosecute crimes. While we applaud the court’s
willingness to limit government overreach, leaving this task to the judiciary is certain to result in
inconsistent outcomes as evidenced by the Ninth Circuit’s reversal on rehearing in Dreyer. As the need to “strike
the appropriate balance between our need for security and preserving those freedoms that make us who we are” 313
becomes more pressing, the need for Congress to enact new legislation or amend existing laws
becomes increasingly central to the national debate on the protection of civil liberties. Congressional action
that provides clarity on the parameters of permissible military involvement in civilian surveillance efforts
and certainty that violators of those limits will be held accountable under the civil and criminal sanctions of the PCA will serve as
the most effective deter rent against government overreach in the use of the military in
civilian law enforcement activities .
Unchecked authority for military law enforcement bulk surveillance wrecks it:
Second is signal. Military law enforcement authority is a unique symbolic overreach that
wrecks it.
Daniel J. Sennott 10. LL.M. The JAG School, Charlottesville. J.D., University of Illinois,
Champaign. 06-11-10. “How the Posse Comitatus Act Restricts Department of Defense
Information Sharing.” https://fas.org/sgp/eprint/pca.pdf
The final lesson from the Post-11 September expansion of DoD domestic intelligence is that policy crafted during times of crisis is
often regretted later. The attacks of 11 September 2001 were unprecedented in our history. The entire Nation united in defense of
the homeland, and the government, and specifically DoD, enjoyed widespread support. However, the decision to create a
counter- intel ligence agency within the DoD that would manage a database consisting of reports collected from military
members across the country was ill-considered in retrospect. Although force protection is a legitimate and crucial
function of DoD, both CIFA and TALON smacked of the Army intelligence activities of the Vietnam era. Coupled with vague
guidance on the parameters of domestic intelligence collection, CIFA was a p ublic r elations problem
waiting to happen . Al though no legal violations occurred , DoD was clearly tone-deaf to the
public’s predictable opposition to CIFA activities. Just like the other aspects of this case study, the government
forgot the hard-taught lessons of Vietnam-era intelligence when designing Post-11 September DoD domestic intelligence.
Conclusion The three case studies discussed above reinforce two major points. First, these case studies, played out over the course
of the past ninety years, illustrate remarkably similar problems. In each case, the military and civilian authorities struggled with the
appropriate balance between leveraging all available intelligence assets to protect the homeland while adhering to the PCA and the
spirit of the act. In each case, either the PCA or the principles of the PCA (civilian control of military
activities) influenced both the public ’s perception and the decisions made by government officials related to
military domestic intelligence gathering activities. In addition, each of these cases reinforces the need for clearly
defined parameters for military involvement in domestic affairs. These parameters serve to both insulate
the military from domestic intelligence mission creep while providing clear guidelines to civilian authorities on the limitations of
military intelligence. Without these clearly delineated boundaries, civilian authorities may be tempted to assign the military with an
ever-expanding role in domestic intelligence, an area that is ripe for mission creep. In addition, as the case studies illustrate, the
military is extremely capable, well-resourced, and eager to assist in homeland security missions. As a result, clearly defined
limitations like the PCA keep the military from unconsciously foraying into areas better left to civilian law enforcement. Having
established that the PCA does indeed inhibit DoD information-sharing, this subsection argues that such inhibitions are necessary to
the underlying purpose of the PCA is to preserve the civilian
preserving healthy civilmilitary relations. In fact,
control over military activities. As previously discussed, the government has long struggled with the
balance between leveraging all assets available to protect the homeland with the need to preserve
our longstanding tradition of civilian control over the military. The recent initiatives related to
info rmation- sharing strikes at the heart of this issue . From one perspective, the United States certainly should
not be artificially handicapped by the PCA, sentenced to a stove-piped intelligence infrastructure that cannot be fully leveraged to
protect the homeland. However, as the case studies have made clear, when the military becomes too involved in
domestic intel ligence, the military’s reputation is often damaged and the specter of a military
state soon emerges. This subsection will explore whether the restrictions posed by the PCA are appropriate considering the
current threats to the homeland. Central to this analysis will be an explanation of the basic principles of civilmilitary relations. Then,
this subsection will explore how the PCA preserves the sensitive balance between the civilian and military authorities, and how the
inter-relationship between the PCA and DoD information-sharing informs on the greater issue of healthy civil-military relations in the
United States. Civil-Military Relations Principles The PCA can be viewed as a tangible example of the greater principle of civilmilitary
relations. Although there are several interpretations of traditional U.S. civilmilitary relations, the “normal” theory of civil-military
relations holds “that there should be a division of labor between soldiers and statesmen. Political leaders should develop objectives,
provide resources, set broad parameters for action, and select a commander-- then step back, and intervene only to replace him
should he fail at his task.”283 At its foundation, civil-military relations involve the challenge of reconciling “a military strong enough to
do anything the civilians ask them to with a military subordinate enough to do only what civilians authorize them to do.” However,
striking a healthy balance is more difficult than it appears at first blush. Although the United States has recently struggled with the
correct balance between security in an age of terrorism and preservation of individual liberties, this tension is not new to civilmilitary
relations. 284 For example, although the military is frequently lauded for its domestic disaster recovery capabilities, society is
opposed to having those same forces conduct law enforcement duties during these operations. This fine distinction is not without
good reason: if the military is the only entity within our civil society that has overwhelming coercive power, this power could
potentially be used against the people it was created to protect. Although a traditional military coup seems unlikely in
the United States, one of the most disturbing aspects of the military’s intelligence activities in the case
studies was the collection of information on political groups . The mere prospect that this
information could be used to influence the political process could drastically compromise U.S.
c ivil- m ilitary r elations. Although civil-military relations enjoyed an intellectual resurgence recently, the two principle theories in
this field date back to the 1950s. In his seminal work, The Soldier and the State, Samuel Huntington attempted to resolve the
inherent tension between building a strong military while preserving civilian authority. As outlined above, he argued a theory of
“objective civilian control,” in which the civilian authorities dictate military policy, then allow the military decide the military operations
necessary to achieve that policy.286 Central to this theory is an understanding of liberal theory, in which the primary concern of the
state is to protect the individual rights of the citizen.287 As Huntington argues, the major shortfall of liberal theory is that it does not
account for the state’s duty to secure its citizens from external threats. As a result, the military must be strong enough to defeat
external threats, while still being subservient to civilian authority. As such, the only way for objective civilian control to operate
effectively in a liberal society like the United States is for the military to be comprised of professional officers who will obey civilian
control.2 In responding to Huntington’s theory, Morris Janowitz advanced the civic republican theory. Janowitz argued that instead
of individual rights, the primary focus of a democratic state should be “engaging citizens in the activity of public life.”289 By involving
the citizenry in the operation of the state, it expands the interest of the citizen from an interest in common, rather than individual,
welfare. In addition, when citizens serve in the military, the interests of the military and civilian society overlap, thereby reducing fear
of a military coup.290 As a result, the civil republican theory was primarily concerned with keeping citizens involved in the military
even when a large standing military is not needed. The PCA as a Microcosm of Civil-Military Relations Problems Although several
scholars have criticized both the liberal and civic republican theories as deeply flawed, they continue to serve as the foundation of
civil-military relations. Both theories serve to illustrate the civil-military relations tension inherent in the PCA: the United States
places a premium on individual rights and liberties. Out of necessity, citizens surrender limited authority to govern the United States
to elected and accountable representatives. This elected government, however, must further delegate responsibility for protecting
the citizenry to the military, an entity that is not elected nor as accountable to the citizens. As a result, the military is restricted in its
law enforcement activities, particularly in domestic operations, by laws such as the PCA. As the case studies made clear,
whether an actual or merely perceived PCA violation occurs, irreparable damage can
occur . For example, when Army intelligence targets political groups, regardless of
motivation , the specter of military interference with the political process usually follows .
Whether it is federal troops interfering with the Presidential election in the Reconstruction South or Army intelligence officers
observing anti-war protesters, the military must tread cautiously. As the Post-Vietnam case study revealed, Army domestic
intelligence upset the civil-military relations balance for many years following the intelligence
operations. Not only did it contribute to a widespread anti-military sentiment , but it resulted in a
Congressional investigation and complete overhaul of the intelligence structure . What
started as a legitimate military mission quickly developed into a scandal with far-reaching
effects . Unfortunately, this type of scandal has been replayed on a relatively regular basis throughout
the history of domestic military intelligence. As a result, the military is restricted in its law
enforcement activities, particularly in domestic operations, by laws such as the PCA. 293
Information sharing is a necessary component of U.S. homeland security. Only by leveraging the considerable
intelligence assets available at all levels can the United States hope to safeguard its citizens. Because DoD controls the vast
majority of the intelligence resources at the federal level, they will continue to be inextricably linked to domestic intelligence
operations. This relationship is wrought with peril as DoD strives to satisfy the many needs of its external customers, while
simultaneously collecting information related to force protection. Although the DoD may not actually violate the PCA in satisfying
these various information requests, the perception of DoD acting in a law enforcement capacity can be just as damaging. If the
public perceives the DoD is using information-sharing as a subterfuge to collect and
disseminate information it could not otherwise legally obtain, the delicate c ivil- m ilitary r elations
balance could be upset. The most important justification for PCA limitations continues to be the preservation of traditional
civil-military relations. Although the PCA was originally passed in response to perceptions that federal troops had interfered with
state elections in the Reconstruction South, the law has remained relevant because of what it represents. The PCA now reflects the
Despite the numerous exceptions
public’s firm belief that the military should play a limited role in domestic operations.
to the PCA that have expanded the military’s role in domestic operations, the PCA remains a
tangible reminder of the sensitive relationship between the military and society. This
relationship is even more sensitive when dealing with domestic intelligence . Society’s strong
belief in privacy and individual rights makes the prospect of domestic military intelligence an
unattractive one for many Americans.
That prevents competition with Russia and China from going nuclear.
Hal Brands 19. Bloomberg columnist and the Henry Kissinger distinguished professor at Johns
Hopkins University’s School of Advanced International Studies. Winter 2019. “The Lost Art of
Long-Term Competition.” The Washington Quarterly, vol. 41, no. 4, pp. 31–51.
Competing Comprehensively Thinking broadly about arenas of great-power struggle relates to a fifth principle, which is that long-
term competition should be comprehensive competition . Washington should not necessarily
compete with its adversaries on every geographic front , as explained above, but any serious
strategy should incorporate all elements of national power . The United States’ authoritarian rivals
are employ ing “comprehensive coercion” that incorporates economic , info rmational,
diplomatic , military , and other tools. It will be difficult for the United States to hold its own
absent a similarly holistic response .26 What made U.S. strategy in the late Cold War so
effective, after all, was that it deployed virtually every weapon in the American arsenal :
intensified military competition, economic warfare, covert action, and political and ideological measures such as support for
Today, by contrast, the United States’ strategies are not nearly so
dissidents within the Soviet Union.
complete . As former policymaker Robert Blackwill and scholar Jennifer Harris have documented, Washington has
failed to define a coherent program of economic statecraft to counter the ambitious
geoeconomic strategies being implemented by Russia and—more dramatically—by China .27
As these countries have used sophisticated geo-economic instruments to project influence
abroad, the U nited S tates has either been slow to exploit its own tools (such as abundant energy reserves) or
simply dropped out of the competition (by withdrawing from the Trans-Pacific Partnership). In the realm of
information and political warfare, the United States has moved only lethargically to strengthen
defenses against Russian and Chinese meddling, let alone to redevelop offensive capabilities
of its own. Likewise, although the Trump administration has touted a return to “competitive diplomacy,” the combination of proposed
funding cuts, unfilled vacancies, and marginalization of the State Department will only make U.S. diplomacy less competitive.28
These deficiencies speak to a further challenge, which is that the bureaucracy has yet to be optimized for comprehensive
competition. During the Cold War, the goal of competing with Moscow was imprinted on all aspects of the bureaucracy. Yet today,
there are entire areas of critical bureaucratic capability that are either severely underdeveloped or simply missing: a modern version
of the U.S. Information Agency that can compete effectively in the information space, for instance. (Since the U.S. Information
Agency’s shuttering in 1999, U.S. public diplomacy and information warfare capabilities have languished.) There also remains a
misalignment between personnel and priorities. At the end of the Obama years, there were “three times as many National Security
staffers working on the Middle East as on all of East and Southeast Asia.” 29 Finally, the U.S. government has only
slowly adapted to the fact that challenges such as geo-economic competition or gray-zone
conflict , which are highly coercive yet do not reach the threshold of war, often occur in the
seams between departments and agencies .30 Now as before, the U.S. government can bring
impressive energy and effectiveness to bear on even the hardest problems, but it must first
be oriented to the task. Operating Multilaterally Succeeding in long-term competition is not, however, simply a matter of utilizing the United States’ own
capabilities. Rather, a sixth principle posits that winning bilaterally requires operating multilaterally. Long-term competition is often focused on a specific opponent, but it occurs
in a broader global context. Competing effectively requires setting that context so as to constrain the choices and options of a competitor while broadening one’s own. During the
European great-power struggles of the early modern era, the winner of a given contest was often the country that more effectively enlisted the aid of allies while depriving its
rivals of foreign support. Those powers that found themselves diplomatically isolated—Paris in the Seven Years’ War, London during the conflicts surrounding the American
Revolution, Paris again in the Franco-Prussian War—usually suffered. The same imperatives exist today. In one sense, the most useful initiatives the United States can take
visà-vis Russia or China have less to do with confronting those countries directly than with improving the strength of the coalitions arrayed against them. Getting China right, as
former Assistant Secretary of State Kurt Campbell has said, requires getting Asia right: The most useful initiatives improve the strength of the coalitions arrayed against Russia
or China. The Lost Art of Long-Term Competition THE WASHINGTON QUARTERLY ▪ WINTER 2019 39 It requires strengthening U.S. engagement with friendly actors,
creating economic alternatives to dependence on Beijing, and establishing a strong regional security network that constrains Chinese options for aggrandizement.31 In the
same vein, the United States’ alliances and partnerships represent one of its greatest competitive advantages. These relationships offset one of the United States’ chief
disadvantages—the fact that Russia and China are located much closer to the key theaters of competition—by giving it strategic presence in Europe and the Asia-Pacific. They
provide military punching power and diplomatic influence Washington can call on in a crisis; they offer the moral legitimacy that comes from the United States’ role as the so-
called leader of the free world. In sum, alliances and partnerships augment the United States’ strengths in ways comparatively isolated authoritarians can only envy.32 It follows
that preserving and strengthening the constellation of U.S. alliances and partnerships is one of the most valuable competitive moves Washington can make. Moscow and Beijing
understand this, which is why they are working so tirelessly—through economic inducement and coercion, military intimidation, and incremental aggression—to disrupt those
relationships. The current U.S. president, however, does not grasp this basic principle. As James Lacey of the Marine Corps War College has written, allies “require substantial
care and feeding, particularly in the years before their aid is actually needed.” 33 Moreover, alliances only perform their most useful functions if they are credible—if allies are
convinced that their patron will assist them in crisis. Those powers that have flouted these rules have often ended up isolated and weakened. The United States appears to be
risking a similar outcome today. Taking Advantage of Time A seventh principle is that long-term competition rewards those who understand the strategic importance of time. An
adept competitor will manipulate the time horizons of rivals, increase or decrease the pace of the rivalry according to perceptions of opportunity or danger, and otherwise use an
understanding of time to gain a strategic edge. Throughout the Cold War, time-based competition was central to U.S. strategy. At the macro-level, the choice of a firm but
judicious strategy of containment was based on an assessment that time was on the United States’ side, so there was no need to precipitate a military showdown or rush to an
unfavorable diplomatic settlement. It was because the Soviet Union was “still by far the weaker party” and “Soviet society may well contain deficiencies which will eventually
weaken its own total potential,” Kennan wrote, that that Washington would enter “with Hal Brands 40 THE WASHINGTON QUARTERLY ▪ WINTER 2019 reasonable confidence
upon a policy of firm containment.” 34 More specifically, U.S. policymakers frequently calculated how assertively to act based on their sense of how the strategic balance would
shift over time. During the late 1940s, American policymakers aggressively established facts on the ground—the Truman Doctrine and the Marshall Plan, the creation of a West
German state and NATO—because they believed that the U.S. nuclear monopoly provided a window of opportunity in which Moscow was unlikely to respond militarily.
Following the Soviet A-bomb test in 1949, U.S. policymakers became more cautious about moves that might dramatically escalate the Cold War—such as escalating the war in
Korea—until after the military buildup associated with NSC-68 during the early 1950s had restored greater Western advantage. The impact of such time-based thinking, writes
historian Marc Trachtenberg, “was both enormous and pervasive.” 35 Time has been used as a weapon in other strategic rivalries as well. During the 1870s and 1880s,
Germany’s Otto von Bismarck believed that his country could eventually become Europe’s dominant power—but only after passing through a danger zone in which other
countries might seek to strangle its potential. Bismarck’s solution, writes political scientist David Edelstein, was to manipulate European time horizons—to dull perceptions of a
long-term German threat by positioning Berlin as an honest broker in Europe’s myriad short-term crises.36 China, too, pursued a time-based strategy during the 1990s and
2000s—keeping Washington focused on the near-term benefits of economic and diplomatic cooperation, to buy time in which to develop the long-term power potential to reach
for dominance in East Asia and beyond. A grasp of the strategic importance of time is essential today. Understanding how U.S. rivals perceive time—whether they think their
own geopolitical windows are opening or closing—can provide clues regarding how aggressively they will act. If Russia believes that it has only limited time before crippling
demographic and economic problems make their effects felt, if it worries that time is not on its side but on Washington’s side, then Moscow may take greater risks to achieve its
geopolitical goals while it can still do so. Likewise, understanding how U.S. adversaries use time as a weapon is critical to responding effectively. China clearly seeks to
convince its neighbors that the United States will one day retrench from the Asia-Pacific region, leaving Beijing dominant.37 Initiatives that demonstrate enduring American
commitment—developing new military access agreements, stationing additional assets forward, deepening U.S. involvement in Understanding how rivals perceive time can
provide clues regarding how aggressively they will act. The Lost Art of Long-Term Competition THE WASHINGTON QUARTERLY ▪ WINTER 2019 41 regional diplomacy and
economics—can thus help defeat China’s strategy in addition to providing other benefits. Knowing the Competition Imposing costs, exploiting asymmetries, and understanding
time horizons are tasks not easily performed, however, so an eighth principle is that competing effectively requires knowing your competition intimately. Only by understanding a
competitor’s worldview, decision making, and behavioral proclivities can one outmaneuver that competitor; only by grasping a rival’s weaknesses and fears can one exploit
them. Such understanding, in turn, requires sustained intellectual and economic investment. During the Cold War, the United States’ strategy was rooted in what historian David
Engerman terms an unprecedented “U.S. intellectual mobilization” to develop expertise on the Soviet Union. That mobilization involved individuals inside and outside of
government, was underwritten by massive government investments, and produced a rich—if hardly infallible—expertise on all things Soviet.38 More broadly, U.S. strategy
rested on deep insights about the Soviet system. Kennan’s original diagnosis of Soviet behavior flowed from his knowledge of the interplay of Russian history and Soviet
ideology; his prescription of containment flowed from his awareness of Moscow’s weaknesses and his understanding that the Kremlin was an aggressive but patient
adversary.39 In the 1970s and 1980s, the shift to a more aggressive cost-imposing strategy was driven by an understanding of how deficient and badly strained the Soviet
economy was, and how targeted investments in high-tech capabilities could exploit those vulnerabilities.40 Today, there are ample possibilities for better understanding the
“official minds” of U.S. competitors. Many of China’s key doctrinal writings—on military matters, political warfare, and other issues—are openly available to those who can read
the language.41 In capable hands, they provide extraordinary insight into the ambitions, fears, and behavior of the Chinese regime. But despite these insights, and although the
situation is gradually improving, the United States does not have anywhere near the same intellectual capital in dealing with Russia or China— two competitors that each have
their own distinctive history, aims, and methods—that it once developed in dealing with the Soviets.42 The reasons for this deficit are numerous—the natural atrophying of the
United States’ Russia expertise after the Cold War, the diversion of attention and resources to the Middle East after 9/11, declining federal investment in area studies and
international studies programs, among others.43 Yet the cumulative effect has been strategically debilitating: It has made more elusive the granular Hal Brands 42 THE
WASHINGTON QUARTERLY ▪ WINTER 2019 knowledge of the adversary on which the best strategies rest. The resource and time investments needed to remedy that deficit
are undoubtedly significant. But if long-term competition requires getting inside the head of the opponent, the costs of foregoing that investment may be much higher. Looking
Forward and Backward Equally important is an institutionalized capability to look forward as well as backward. No contest with a sentient rival can ever be fully scripted, but
long-term strategy does demand looking over the horizon and considering the course of coming events. Doing so entails some systematic consideration of one’s long-term goals
and plans, an adversary’s likely intentions and responses, and the exogenous factors (demographic trends, economic changes) that might influence the competition. Long-term
competition therefore places a premium on planning, not to predict the future, but to prepare oneself for what it may hold. Yet long-term competition also places a premium on
looking backward—on assessing performance to date and shifting course as necessary. “Because strategic interaction involves a contest of adversary wills,” writes one analyst,
“It is rarely sufficient for one side or the other simply to choose a path and then stick to it until it has reached its goal. Unless the opponent is completely outmatched or virtually
inert, [its] reactions, countermoves, and initiatives will almost always call for adjustments and sometimes entirely new approaches.” 44 Britain’s eventual triumph in the
Napoleonic wars required such adaptation. Prior to 1808, London relied on its longstanding strategy for defeating European rivals, which focused on bankrolling continental
allies in Europe while using naval power to suppress French trade and harass French forces in secondary theaters. Against a Napoleonic juggernaut that generated
unprecedented military power, this strategy repeatedly failed. After 1808, British leaders changed course: deploying an army to the continent to drain French resources and
ultimately help defeat Napoleon in battle; opening new markets to replace those shuttered by the Continental System; and defusing tensions with coalition partners Russia and
Sweden. The contrast with Napoleon’s failure to adjust—his tendency to plunge ever deeper into new wars of conquest in an effort to solve problems created by old ones—was
notable.45 The key, of course, is to institutionalize capabilities for planning and reassessment so that they occur before disaster strikes. Over the course of the Cold War, the
U.S. government utilized—albeit somewhat inconsistently—an array of such mechanisms: the drafting of NSC-68 in 1950, Eisenhower’s Solarium planning exercise on U.S.
strategy in 1953, the Nixon-Kissinger reports on American foreign policy in the early 1970s, the comprehensive net assessments of the The Lost Art of Long-Term Competition
THE WASHINGTON QUARTERLY ▪ WINTER 2019 43 military and geopolitical balance conducted by the Carter administration in the late 1970s, and others. More recently,
there have been myriad proposals to improve systematic planning and reassessment.46 In the end, the precise mechanism may ultimately be less important than the basic
commitment to take these tasks seriously: to create structures and processes within which planning and reassessment regularly occur, to connect those processes to policy
formulation and budgeting in a systematic way, and to make both prospective and retrospective thinking more than an afterthought for harried officials who must deal with short-
term crises while still positioning the country for long-term success. Strengthening the System In multiple respects, then, long-term competition is a test of statecraft. Yet
longterm competition is also a test of systems—it is a measure of whose political, social, and economic model can better generate and employ power on the international stage.
This being the case, the cardinal sin of competitive strategy is to take steps that weaken the sinews of a nation’s underlying power. The United States largely avoided this error
during World War II and the Cold War: It resisted the temptation to create a “garrison state” that might have mobilized more resources in the short-term but destroyed the liberal,
free-market foundations of U.S. strength in the process. “We could lick the whole world if we adopt the system of Adolf Hitler,” Dwight Eisenhower once commented, but that
victory would be Pyrrhic in multiple respects.47 Yet even some of the greatest powers in history have ignored this basic principle. As historian Paul Kennedy writes, imperial
Spain ultimately stumbled because it neglected “the importance of preserving the economic underpinnings of a powerful military machine.” The expulsion of the Jews, and later
the Moriscos; the closing of contacts with foreign universities; the government directive that the Biscayan shipyards should concentrate upon large warships to the near
exclusion of smaller, more useful trading vessels; the sale of monopolies which restricted trade; the heavy taxes upon wool exports, which made them noncompetitive in foreign
markets; the internal customs barriers between the various Spanish kingdoms, which hurt commerce and drove up prices—these were just some of the ill-considered decisions
which, in the long-term, seriously affected Spain’s capacity to carry out the great military role which it had allocated to itself in European (and extra-European) affairs.48 If the
parallels seem obvious, that is because the United States presently is considering or pursuing similarly ill-conceived measures: restrictions on immigration that will undermine
economic competitiveness and long-term demographic health, insufficient investment in education at all levels, declining government funding for basic scientific research, and
self-defeating tariffs and trade restrictions. Hal Brands 44 THE WASHINGTON QUARTERLY ▪ WINTER 2019 Rather than walking this perilous path, U.S. officials should heed
another lesson of past competitions: that protracted rivalries can provide a catalyst to strengthen the American system. During the Cold War, the federal government threw its
weight behind desegregation because doing so was seen as a diplomatic necessity in the global ideological contest with Moscow.49 The exigencies of that contest also spurred
the United States to make unprecedented peacetime investments in transportation infrastructure, higher education, and basic research—all of which made the United States a
sharper competitor over time. In the past, Washington took protracted geopolitical struggles as an opportunity to live up to its highest ideals and build a stronger society. It
should do the same today. Setting the Right Pace All of the foregoing relates to the need for vigorous, open-ended competition against U.S. rivals—for embracing what George
Kennan called “the perpetual rhythm of struggle.” 50 Yet as Kennan’s comment also implies, these competitions are marathons, not sprints, and so an eleventh principle is that
excelling in long-term competition requires pacing oneself. The story of great powers which overreach—and end up with disastrous overstretch—is as old as great-power
competition itself. In the Peloponnesian War, the Athenians began their slide toward defeat when they committed half of their military to a disastrous campaign in Sicily, even as
their Persian enemies were camped nearly at Athens’ gates.51 Napoleon might have mastered much of Europe had he not been so determined to subdue all of it. The Soviet
Union worked itself into fatal geopolitical overextension in the 1970s by taking on new commitments and provoking intensified strategic competition just as it was reaching the
limits of its power. As these examples illustrate, long-term competition places a high value on restraining oneself as well as restraining one’s enemies. It requires setting
priorities: determining where one will compete most vigorously and where one will husband limited resources and energy, as the British did in retrenching from East Asia as well
as the Western Hemisphere in the late nineteenth century to concentrate on meeting the rising German threat closer to home.52 It requires knowing when to stop:
understanding when the further projection of power actually leads to weakness by dissipating resources and creating vulnerabilities. It can sometimes Long-term competition
places a high value on restraining oneself as well as one’s enemies. The Lost Art of Long-Term Competition THE WASHINGTON QUARTERLY ▪ WINTER 2019 45 require
utilizing more economical—and imperfect—forms of competition, as the Eisenhower administration did during the 1950s in substituting the threat of general nuclear retaliation
for a more conventional defense.53 It can even require tactical retrenchment from time to time—withdrawing from exposed positions and assuming a more defensible posture,
as the United States did after its own experience with overstretch in Vietnam. These things are easy to say and hard to do: Adversaries often expand into spaces left
undefended; non-vital interests may no longer seem non-vital when they are attacked, as the classic example of the Korean War demonstrates. More fundamentally, the line
between robust competition and hubristic overreach is always clearer in hindsight than in foresight. Yet a basic awareness of the need to pace oneself is critical, if only because
Long-term competition is thus an undertaking that
unsustainable strategies are doomed for failure.54 Competition, Not Confrontation
CMR unifies civil-military silos which are derailing effective humanitarianism---it controls
all impacts, including disease.
James W. Derleth 18. PhD, senior interagency training advisor at the Joint Multinational
Readiness Center in Hohenfels, Germany, subject-matter expert in civil-military operations,
international conflict, and stability operations. 2-28-2018. "Fostering a Whole-of-Government
Approach to National Security from the Bottom Up Interagency Training at the Joint
Multinational Readiness Center." Army University Press.
https://www.armyupress.army.mil/Journals/Military-Review/Online-Exclusive/2018-
OLE/Feb/Fostering-Security/
In the twenty-first century, the U nited S tates faces an increasingly complex and dynamic
strategic environment . Contested international borders , emerging powers , economic
inequality , political instability , societal upheaval , sectarian conflict , ecological
changes , and the proliferation of w eapons of m ass d estruction will all affect U.S. national security .
In contrast to the Cold War era, most of these challenges can not be addressed through economic and
security alliances , with the military providing nuclear and conventional deterrence. As the 2015 National Security
Strategy notes, “The
challenges we face require … the pursuit of a comprehensive agenda that
draws on all elements of our national strength.”1 While the need is clear, efforts to implement a
“whole-of government” approach to national security have been episodic and ultimately
unsuccessful . Although there has been much discussion, frustration, and angst about the lack of cooperation and
coordination between and among U.S. government agencies and departments, there has been very little progress in establishing
mechanisms to coordinate disparate and diverse organizations, each with their own leadership, culture, and authorities. The
result is a disjointed and often ineffective foreign policy. While it will take national leadership to change this at
the strategic level, there are measures that can be taken to mitigate challenges at the operational and tactical levels. Although a
whole-of-government approach may seem a daunting task, one of the most effective ways to encourage coordination and
collaboration is to bring representatives from interagency entities together for realistic training with their military counterparts before
they are forced to work together in a crisis. Recognizing the importance of “training as you fight,” the Army’s Joint Multinational
Readiness Center (JMRC) in Hohenfels, Germany, integrates interagency personnel into its exercises. They include mission
rehearsal exercises, noncombatant evacuation operations, and brigade readiness exercises with NATO allies and multinational
partners. This experience provides soldiers and other interagency participants the opportunity to work with, and learn from, the other
entities they may encounter during a deployment. Integrated training also helps build the relationships and develop the trust required
to effectively implement national security policy. The Need for Development of Interagency Lines of Effort In 2002, the first post-9/11
National Security Strategy dramatically changed the focus of how national security policy was implemented.2 For the first time,
international development was included as an essential component. Since then, every national security strategy has noted the
importance of a “Three D” (defense, diplomacy, and development), whole-of-government approach to national security. The
Department of Defense (DOD), Department of State (DOS), and U.S. Agency for International Development (USAID) are tasked to
work together to foster peace and long-term stability. While there are numerous challenges that have limited the
implementation of this guidance, two stand out : the lack of stability and civil-military operations education
and integrated, interagency training. As part of its effort to fulfill this new national security emphasis, USAID established a small
cadre of foreign service officers specialized in crisis, stabilization, and governance in 2003. Known as Backstop 76ers, these officers
are charged with planning and implementing humanitarian, transitional, and governance activities in unstable or politically volatile
areas. However, they have had limited impact where interagency coordination and joint planning and implementation are crucial for
success. This is the result of a number of factors including little or no interagency education, very low-risk
tolerance , the predilection of promotion boards to favor traditionally developed officers over those with experience in conflict
zones, and a siloed approach to programming in unstable areas. In 2004, the DOS established a similar
capability when it created the Office of the Coordinator for Reconstruction and Stabilization.3 It managed to recruit over 130 direct-
hire deployable specialists under the Crisis Response Corps. However, this initiative ended in 2011 when funding cuts caused the
Crisis Response Corps to disband. It is worth noting that neither entity included stability or civil-military operations education as a
The growth of violent extremism , increased frequency of
regular requirement in their programs.
humanitarian disasters, global health crises (e.g., Ebola), and increased migration mean that
U.S. government officials will continue to operate in unstable environments across the globe.
While the DOD has the capability and capacity to respond to crises anywhere, it often lacks
the subject-matter expertise to identify and mitigate nonmilitary challenges that directly affect
political end states. In contrast, joint , interagency, intergovernmental and multinational entities have the
subject-matter experts but often lack the capability and capacity to quickly deploy them.
Therefore, it is imperative that these entities understand and leverage each other’s capabilities
and capacities. Mission success requires military and civilian personnel to work
seamlessly with each other as well as with allies and partners, international organizations, and nongovernmental
organizations (NGOs); each with overlapping mandates and often divergent objectives. Even though the DOD, DOS, USAID, and
other agencies are colocated in our embassies, they are not adequately trained in crisis response, often causing unnecessary
delays and potential mission failure as interagency personnel have to learn “on the job” about one another’s roles, resources, and
expertise. To foster effective collaboration and deconfliction of activities, these entities must be
educated in stability and civil-military operations and train together before a crisis. These are significant challenges,
as there is no interagency stability or civil-military operations education or training, nor is there policy guidance mandating it.
We’re a statutory prohibition on bulk collection for military law enforcement. That solves.
Fakhoury et al. 15. Hanni Fakhoury, counsel for the EFF; Jennifer Lynch, counsel for the EFF;
Nancy L. Talner, counsel for the ACLU-WA; T. Jared Friend, counsel for the ACLU-WA; Venkat
Balasubramani, counsel at Focal PLLC; David M. Porter, co-chair of the NACDL Amicus Curiae
Committee. 04-29-15. “EN BANC BRIEF OF AMICI CURIAE ELECTRONIC FRONTIER
FOUNDATION, AMERICAN CIVIL LIBERTIES UNION OF WASHINGTON, AND NATIONAL
ASSOCIATION OF CRIMINAL DEFENSE LAWYERS IN SUPPORT OF DEFENDANT-
APPELLANT.” No. 13-30077. https://www.eff.org/files/2015/04/29/dreyer_amici_brief.pdf
A. The PCA Violations Here Go Beyond Dreyer’s Specific Case. The facts of this case clearly demonstrate why suppression is
necessary in some cases to deter PCA violations. As the panel found, the NCIS agent here, stationed in Georgia, testified his
“standard practice” was “‘to monitor[] any computer IP address within a specific geographic
location ,’ not just those ‘specific to U.S. military only , or U.S. government computers.’” Dreyer,
767 F.3d at 836. Nor did the agent “try to isolate military service members within a geographic
area” because he believed, contrary to the PCA, that he was a “‘U.S. federal agent’” who could
“investigate violations of either the U niform C ode of M ilitary J ustice or federal law.” Id. (emphasis in original).
This sort of pervasive and improper Internet surveillance did not just interject military
investigators into Dreyer’s home; as the NCIS agent testified, it was “his ‘standard practice to monitor all
computers in a geographic area,’ here, every computer in the state of Washington.” Id. at 834. Even worse, it
appears that the NCIS Internet surveillance that took place here was not an isolated incident . The specific agent
here testified that he “was monitoring another computer” when he identified Dreyer as a target, that he was involved in at least
twenty other Internet based investigations, and that at least two other NCIS agents carried out similar searches months before
Dreyer was identified as a suspect. Id. at 836. 11 Because the surveillance in this case is not an isolated incident but representative
of a pattern of NCIS dragnet surveillance of civilian activities online, suppression is an appropriate response. B. The Documented
Widespread and Repeated Posse Comitatus Act Violations of the Past Will Only Continue in the Future Because of Emerging
Technologies. That military investigators would so brazenly conduct wide ranging Internet
surveillance almost certain to result in the gathering of evidence for purposes of civilian law
enforcement should, sadly, come as no surprise . The military’s involvement in civilian affairs is
neither new nor exclusive to Internet surveillance, and the historical record unfortunately
demonstrates that the type of military surveillance that occurred in this case is not an anomaly .
As explained earlier, the PCA was passed specifically because of concerns over the use of the
military to enforce civilian laws during reconstruction. See generally Doyle, The Posse Comitatus Act and Related
Matters at 54. But passage of the PCA has done little to deter military officers from
investigating civilians. This is demonstrated by the fact there are numerous criminal cases
from throughout the country find ing violations of the PCA and suppress ing evidence obtained
from the violation. See Pattioay, 78 Haw. at 469, 896 P.2d at 925; Tyler, 854 P.2d at 1370; Taylor, 645 P.2d at 524; see also
Roberts, 779 F.2d at 568 (finding a PCA violation but refusing to suppress); Taylor v. State, 640 So.2d 1127, 1136-37 (Fla. Dist. Ct.
App. 1994) (same). Other documented violations of the regulations separating between military and
civilian law enforcement exist but have not been addressed in the courts. In the 1970s,
Congress held hearings to address concerns about the Army’s domestic surveillance
programs aimed at political groups . See generally Laird, 408 U.S. at 6-7. These surveillance programs
consisted of the collection and retention of data about organizations in computer databases and
the dissemination of that information from Army intelligence headquarters to Army posts around
the country. Id. at 6. After taking extensive testimony, the final Congressional report concluded that the Army had
become “a runaway intelligence bureaucracy unwatched by its civilian superiors, eagerly
grasping for information about political dissenters of all kinds and totally oblivious to the
impact its spying could have on the constitutional liberties it was sworn to defend.” Staff of the S. Comm. on
Constitutional Rights of the S. Comm. on the Judiciary, 93rd Cong., Military Surveillance of Civilian Politics: A Report 10 (Comm.
Print 1973). The Army ultimately agreed to “a significant reduction” in the scope of its intelligence
gathering and destroyed files. Laird, 408 U.S. at 7. Yet military encroachment into the civilian sphere
continued well past the 1970s . In 2009, as a result of a F reedom o f I nformation A ct lawsuit, a number
of federal agencies began releasing hundreds of pages of records concerning reports of misconduct made to the Intelligence
Oversight Board (“IOB”).12 Those reports detailed numerous violations in the years following the September 11, 2001 terrorist
attacks. 13 For example, in the run up to the winter Olympics held in Salt Lake City in 2002, the U.S. Joint Forces Command, a now
disestablished collaboration between numerous branches of the Armed Forces, collected and disseminated information on Planned
Parenthood. 14 In 2004, Army Counterintelligence personnel improperly attended a University of Texas Law School conference on
Islamic law to conduct intelligence activity on civilians within the United States.15 Around that same time, NCIS investigators
infiltrated a civilian organization in violation of Department of Defense regulations. 16 In 2007, an Army reserve officer was found to
be routinely collecting data on U.S. persons exercising First Amendment rights.17 In 2008, Army Cyber Counterintelligence officers
were found to have attended without prior authorization the Black Hat computer security conference in Las Vegas without disclosing
their Army affiliation.18 Similar to this case, the released records also revealed widespread Internet and
electronic surveillance abuses that could easily impact civilians . In 2008 for example, the Air
Force Office of Special Investigations established a “honey pot”—essentially a computer trap intended to
lure malicious attackers to a particular computer to identify the attackers— in violation of the Foreign Intelligence Surveillance
Act (“ FISA ”) and an order of the Foreign Intelligence Surveillance Court ( FISC ).19 In another example, an Army
Intelligence officer improperly issued a national security letter (“ NSL ”), a method of obtaining telephone and
transaction toll records from telecommunication providers, which was honored despite the fact the NSL statute only authorizes the
FBI to issue them. See 18 U.S.C. § 2709(b).20 These examples demonstrate that military encroachment into
civilian affairs is not hypothetical or isolated ; it has been widespread and repeated throughout
the 21st century. Most problematic, technological advancement will only exacerbate the risk of
military investigation into civilians as it becomes easier for the military to engage in the type of
dragnet Internet surveillance at issue here. With online surveillance, military investigators can
cast a large net that touches civilians regardless of where they are located, and unless a
defendant challenges this activity in court as Mr. Dreyer has done here, these investigators can easily
hide their tracks from public view. This case highlights that dramatically: an NCIS officer stationed
in Georgia ultimately investigated Dreyer, a Washington resident . Dreyer, 767 F.3d at 827.21 The
Internet’s ability to connect far-flung people allows the military to engage in large scale,
indiscriminate collection of personal info rmation. Without appropriate filtering and
clearly defined practices tailored to restrict military investigators to
conduct only military related investigations or investigate military personnel for wrongdoing,
there is a real risk that civilians will inevitably end up with military intrusion into their lives. As
these violations accumulate and the risk of future violations increases, the only effective remedy in cases like this to deter military
personnel from straying outside of their investigative lanes is to impose the penalty of suppression.
Congress is key---uniquely creates clear and universal bright-lines. Courts are narrower
and ad hoc.
Mystica Alexander & William Wiggins 16. Wiggins is a Professor at Bentley University;
Alexander is an Assistant Professor at Bentley University. 01/01/2016. “A Domestic
Consequence of the Government Spying on Its Citizens: The Guilty Go Free.” Brooklyn Law
Review, vol. 81, no. 2, https://brooklynworks.brooklaw.edu/blr/vol81/iss2/4.
C. What’s Next? The Ninth Circuit’s initial decision in Dreyer signaled that despite a long judicial
history of allowing PCA and PCA-like restrictions to remain unchecked, courts may apply the
exclusionary rule to suppress ev idence as a means of deterring abuse s of power . As
government surveillance methods become more intrusive and the need to combat terrorism
continues to increase, the number of defendants seeking courts’ suppression of evidence
obtained via PCA or PCA-like infractions will also increase . The key question that remains
is, “What is to be done?” Dreyer illustrates a need for a national conversation and consensus on the role of the military
in the new world order.303 At a minimum, the PCA must be reassessed in the context of
contemporary challenges .304 When the PCA was enacted in 1878, Congress could not have
envisioned the government’s current surveillance capabilities or the expanded role of the
military in domestic affairs.305 Information gathering has been transformed , and the laws that
guide the military’s involvement in such activities should reflect that transformation . While
some may assert that the PCA excludes the military from civilian law enforcement and
safeguards civil liberties, the PCA has not proven to be an effective tool in assessing the
parameters of the NSA’s domestic surveillance .306 Despite the fact that the NSA operates
under the direction of a four-star military officer, it is seemingly unfettered by the PCA’s
restrictions .307 The complexities of military intelligence, which include a DoD employing over three million
people,308 put us at a crossroads in which we can choose one of two paths : (1) the courts can
follow the Ninth Circuit and continue to serve as gatekeepers by wielding the socially costly
weapon of the exclusionary rule to defend constitutional liberties; or (2) Congress can
intervene to transform and streamline the PCA and related regulations to better address the
proper role of the military and the i ntelligence c ommunity in civilian affairs in a post-9/11
society. Congress ional action is preferable , because absent congress ional action and guidance,
it is likely that courts will make ad hoc use of the exclusionary rule in varying degrees, circuit
by circuit, which will only add to the current lack of consistency and clarity in judicial
interpretations of the exclusionary rule . First and foremost, Congress should mandate that
the PCA and its criminal sanction apply to the Army, Navy, Air Force, and Marines . This
would address the concern pointed out in Judge Kleinfeld’s concurrence in Dreyer that “[i]f the
military chooses to become a national police force to detect civilians committing civilian crimes,
the Navy would be the branch to use, because the criminal penalty does not apply to Navy
personnel.” 309 But applying the law and its restrictions to these branches of the military is only the
first step . Action must be taken within the military to ensure that it actually implements and executes the PCA
and imposes the Act’s criminal sanctions to deter violations.310 This could be accomplished, for instance, by
including within the proposed legislation the following mandate : “The D epartment o f
D efense shall issue guidance to ensure the enforcement of civil and criminal sanctions for
violations of the PCA and enabling regulations.” This authoritative guidance and
consequential punishment would serve to deter federal agents like Agent Logan from continuing
to take actions that violate the PCA. Civilian-military collaborations are inevitable in the fight
against terrorism, both domestically and abroad.311 Cyber surveillance, such as that conducted by the NCIS in
Dreyer and routinely conducted by the NSA, creates numerous opportunities for the sharing of information with civilian authorities.
Explicit statutory guidance on the permissible parameters of how information about civilians is gathered, used, and shared by the
military that takes into account modern technological advances would remove uncertainties for military and civilian authorities alike.
Congressional action that provides clear guidance to address current surveillance methods and cooperation between
would deter
military and civilian authorities, coupled with the enforcement of the criminal sanctions for PCA violations,
behavior such as that engaged in by the NCIS in Dreyer. This would eliminate the need for a
court to step in and utilize the exclusionary rule as a deterrent. But should Congress choose
to allow the status quo to continue and turn a blind eye to the need to curb abuses of power, other courts
may follow the lead of the Ninth Circuit in Dreyer and apply the exclusionary rule in order to
send a clear message that military overreach that violates the spirit of the PCA will no longer be
tolerated. CONCLUSION In Dreyer, the Ninth Circuit has sparked a conversation on the role of the
judiciary as gatekeeper and protector of civil liberties in instances of military involvement in civilian affairs. This
approach recognizes that in an era of technological advances and unprecedented grants of power to government-surveillance
operations, many of which may involve members of the military, the time has come to revisit the long history of
the judiciary allowing military overstep on constitutional liberties. While the courts’ role as a
check on the power of the other branches cannot be understated, court decisions other than those of
the Supreme Court represent an ad hoc approach to justice that provides an inconsistent
application of the exclusionary rule and will lead to uncertainty and continued abuses . In a
post-9/11 world with increasing threats from terrorist groups such as ISIS,312 cyber surveillance
of U.S. citizens by the NSA, the NCIS, and other military units within the DoD will continue for
many years to come. The question prompted by the Dreyer decision is how much intrusion into the
private affairs of ordinary citizens the courts and the general public will be willing to accept, especially
when the results of such surveillance activities are used by civilian law enforcement to
prosecute crimes . In employing the exclusionary rule in response to PCAviolating military action, the Dreyer court
expressed its refusal to accept the unbridled military surveillance of U.S. citizens when the fruits of such surveillance are used by
civilian law enforcement officials to prosecute crimes. While we applaud the court’s willingness to limit
government overreach, leaving this task to the judiciary is certain to result in inconsistent
outcomes as evidenced by the Ninth Circuit’s reversal on rehearing in Dreyer. As the need to “strike the
appropriate balance between our need for security and preserving those freedoms that make us
who we are” 313 becomes more pressing, the need for Congress to enact new legislation or
amend existing laws becomes increasingly central to the national debate on the
protection of civil liberties. Congressional action that provides clarity on the parameters of
permissible military involvement in civilian surveillance efforts and certainty that violators of
those limits will be held accountable under the civil and criminal sanctions of the PCA will serve as the most
effective deterrent against government overreach in the use of the military in civilian law
enforcement activities.
The quote in their card proves our argument because it’s a “sanitary restriction”
prohibits building construction without an approval process.
Nolde 10 – JD, Bigfork, Montana, Attorney for Defendant and Appellant (Ed, CONWAY v.
MILLER, 2010 MT S. Ct. Briefs LEXIS 21)
This Court in further discussing interpretation language in a restrictive covenant stated, "We agree that statutory
definitions provide guidance in interpreting the ordinary and popular meaning of undefined
terms in a restrictive covenant." Newman at page 930.
The word "restriction" in "building [15] restriction line" means prohibition . MCA § 1-2-107 provides, "Applicability of
definitions. Whenever the meaning of a word or phrase is defined in any part of this code, such definition is applicable
to the same word or phrase wherever it occurs , except where a contrary intention plainly appears."
Restriction is defined in M.C.A. Volume Index L-Z page 2852 Words and Phrases . It defines "restriction"
by reference to MCA § 76-4-102". This section provides, at subsection 13,
" 'Sanitary restriction' means a prohibition against the erection of any dwelling , shelter, or building
requiring facilities for the supply of water or the disposition of sewage or solid waste or the construction of water
supply or sewage or solid waste disposal facilities until the department has approved plans for those facilities."
(Emphasis added)
Prefer it:
1. AFF ground---conditions, consult, and subsets are the only way to beat PICs and self-
restraint---any ban, the president can just stop doing---AND, surveillance is too nuanced
for a blanket rule.
Dean Esmay 13. IT Consultant, former managing editor, A Voice For Men, Co-founder and
Board member, Operation Give, B.S. Business Administration, Information Technology,
Colorado Technical University, “Why I can’t get worked up over NSA internet spying,” 6-27-
2013, http://www.deanesmay.com/2013/06/27/why-i-cant-get-worked-up-over-nsa-internet-
spying/
NSA does gather and keep data that could be used criminally, as I thought I mentioned. They just can't and won't do anything with it
without a warrant and even then they still might not, unless it's a perceived national security threat. That's what they've been doing
for 60 years, it's nothing new--and the fact that it's nothing new is a big part of my point. I'm not unconcerned about them, but on my
long list of powerful groups I'm worried about, they're not even in the top 10. I would not expect a penny-ante bombing by a couple
of lowlife thugs in Boston to rise to the level of national security threat, BTW, or for it to have even come to the attention to humans
what specifically should NSA be doing that it isn't, or specifically
at NSA until after the fact. I ask again:
stop doing that it is doing, and in what way should its policies change? The best I've heard is
"get a warrant ." Well you already have to get a warrant to get data out of the NSA, and they
may even ignore the warrant depending on the circumstances and not hand the info over. I am always
worried about government ganging up on me. I'm also worried about all the other people who may gang up on me who are even
less accountable than the government, or who will use the government against me for that matter. On the list of perceived threats, I
view NSA as dangerous but serving a necessary function, and since their track record is one of passively listening and not releasing
things unless they're practically forced to. I'm way less worried about them than I am about what I perceive to be much more
powerful entities, such as the IRS or the average Fortune 500 international conglomerate. Does the 4th amendment
protect you from being watched? If so, who's allowed to watch you and who isn't, and under what
circumstances? These aren't small questions. But also: if you don't have the state answering those questions for
you, who will? I don't view these as simple questions. I do know that they have to be addressed. We hopefully agree that
the government should be monitoring SOME things for national security reasons. So what are
the acceptable limits on what they're allowed to watch ? Right now NSA is set up in a fashion
that makes them able to look at almost anything but only in the most strictly limited ways that
don't allow most people, including most other agents of the state, to get at that data . I don't know
what the fix is, but I'm pretty sure "just stop doing that !" is not a practical response. What are the
limits that you think are practical and necessary? -- Tell you what, skip all the above questions, and answer just
this one: Should they really have to get a warrant just to LOOK AT a data stream, when they don't have to get a
warrant to put a security camera in an airport? Or should they get a warrant to put up security cameras too?
Legislative Court CP---2AC
It’s a statutory restriction cuz Congress does it
Quint, professor of law at Maryland, January 1989 (Peter E., “Reflections on the Separation of
Powers and Judicial Review at the End of the Reagan Era,” 57 Geo. Wash. L. Rev. 427, Lexis)
Another type of separation of powers dispute, however, is not generally susceptible of a form of intermediate determination through
statutory interpretation, or through the "convenient apologetics" of the political-question doctrine. In the 1970s -- in reaction to
the extraordinary executive claims of the Nixon administration and the tragedies of executive policy during the
period of the Vietnam War -- Congress attempted to reassert its policymaking authority in a number of areas,
and sought to impose explicit statutory limits on the power of the presidency. Among other
actions, Congress sought to limit the asserted war powers of the President, regulate executive budgetary authority, impose
limitations on the exercise of emergency power, rationalize the use of information from presidential papers, and provide for
independent investigation of high executive officers suspected of committing criminal offenses. Moreover, in several disparate
areas, Congress sought to limit executive policymaking powers through the widespread use of
one or another of the devices known as the legislative veto . In several instances, the Reagan
administration took the position that certain statutory restrictions could not be validly applied
against the President or executive officers in general. In some of these cases -- for example, in the dispute over the
legislative veto -- the administration pursued arguments that had also been invoked by its predecessor. n29 In other
important instances -- in the dispute over the independent counsel legislation, for example -- it claimed more extensive (and more
exclusive) executive power than had been [*435] asserted under President Carter. n30 In many of these cases, some sort of
intermediate argument based on statutory construction was ordinarily not available to the administration. Perhaps it was
occasionally possible to argue that a statutory scheme should be interpreted so that it does not apply to the executive in specific
cases, or even that it might actually grant power to the President under certain circumstances. n31 In many important instances,
however, the
language and purpose of these statutory schemes of the mid-1970s were so clearly
directed toward specific limitation of the executive , that such arguments were not
plausible. Rather, in these cases the administration was required to argue that the statutes themselves were unconstitutional.
Perm---do the AFF as an enforcement mechanism for the court order---it solves because
Congress has judicial cover to act. Doesn’t sever immediacy.
Susan P. Graber 95. Supreme Court of Oregon. 04-21-95. “Bayridge Assocs. Ltd. Partnership
v. Department of Revenue.” 321 Ore. 21. Lexis.
We use the foregoing principles in interpreting ORS 308.205(2) (1989). That statute did not define "restriction." In ordinary
usage, a "restriction" is: "1: something that restricts : QUALIFICATION: as a: a regulation that
restricts or restrains * * * b: a limitation placed [***9] on the use or enjoyment of real or other property; esp: [*28] an
encumbrance on land restricting the uses to which it may be put." Webster's Third New Int'l Dictionary, 1937 (unabridged ed 1993).
A restriction thus is "a limitation placed on the use or enjoyment" of the property, without any necessary
reference to the process that led to the placement of that restriction, without any necessary
reference to the form of the restriction (e.g., by statute or by contract), and without any necessary reference
to the absence of an economic benefit in exchange for placement of that restriction.
No enforcement---corporate capture.
Jonathan Mayer 18. Cyber Initiative Fellow, Stanford University; Assistant Professor of
Computer Science and Public Affairs, Princeton University. 01/2018. “Government Hacking.”
Yale Law Journal, vol. 127, no. 3, pp. 570–662.
4. Courts Exhibit Regulatory Capture in Law Enforcement Surveillance Litigation Another
lesson from experience with government hacking is that the judiciary’s independence from the
law enforcement community is somewhat circumscribed . In the district courts in particular ,
federal prosecutors are consummate repeat players , and defendants in hacking cases tend to be
unsympathetic.321 The result appears to be a (mild) form of regulatory capture , in which
prosecutorial arg ument s receive unusual deference . In the earliest district court opinions
concluding that government malware is not a Fourth Amendment search, for example, the
reasoning appear s to be borrowed directly from prosecutorial briefing .322 A number of
commenters have observed that courts suffer from regulatory capture in the context of national
security surveillance;323 the same can occur in more routine criminal surveillance
litigation .324
Court CP---2AC
Technical illiteracy blocks
Jonathan Mayer 18. Cyber Initiative Fellow, Stanford University; Assistant Professor of
Computer Science and Public Affairs, Princeton University. 01/2018. “Government Hacking.”
Yale Law Journal, vol. 127, no. 3, pp. 570–662.
According to one strand of Fourth Amendment theory, the courts should not be the primary regulators of
electronic surveillance . The leading judicial proponent is Judge Wilkinson of the Fourth Circuit, who has forcefully
argued that Congress should be the lead branch for government privacy protection.292 Writing for a
unanimous panel in In re Askin, Judge Wilkinson concluded that federal agents had not effectuated a Fourth Amendment search
when they intercepted a cordless telephone call because of a (since eliminated) Wiretap Act exception for cordless telephones.293
Making decisions about surveillance policy, he reasoned, “demands a comprehension of complex
technologies .”294 Congress has access to “the type of expertise that courts are . . . ill-
equipped to acquire and to apply ,” so it should have the “primary job” of evaluating
privacy impacts and updating the law .295
Trump overrides.
Aaron Blake 17. Staff writer @ The Washington Post. 2-5-2017. "What happens if Trump
decides to ignore a judge's ruling?." Chicago Tribune.
http://www.chicagotribune.com/news/nationworld/politics/ct-donald-trump-travel-ban-analysis-
20170205-story.html
The other big question with Trump -- should he opt to question the legal authority of a judge who
runs afoul of him -- is whether the government agencies who would need to go along with
Trump's decision would actually do so . Trump's Defense and Homeland Security secretaries , for
example, are military generals who are accustomed to a chain of command . Would they
ignore a court order in favor of Trump? It's all very hypothetical, but Trump's rhetoric -- not just about
the judge's decision, but the judge's actual authority -- and his apparent desire to press his
case for his own authority suggest it's not out of the question.
Soft Law CP---2AC
Oversight doesn’t work---need a binding signal that the military’s no longer conducting
bulk law enforcement surveillance.
Jacob E. Gersen 8, Assistant Professor of Law, The University of Chicago; and Eric Posner, the
Kirkland and Ellis Professor of Law, The University of Chicago, 2008, “Soft Law: Lessons from
Congressional Practice,” https://chicagounbound.uchicago.edu/cgi/viewcontent.cgi?
referer=https://www.google.com/&httpsredir=1&article=11512&context=journal_articles
Second, any concern that soft statutes could give Congress an excessive role in affecting public behavior must take
account of the President's own ability to sway the public using the presidency as a bully
pulpit, and the President's other institutional advantages such as the presidential signing statement.
Congress's statements about its view of the world must compete with the President's , and in
modem times the President has much greater public visibility than Congress does. To the extent
that balance of powers or influence is a background constitutional value, resolutions would seem an important counterbalance to the
tools of the President's bully pulpit. For this reason, the claim that soft statutes subvert legitimate presidential authority is, at least in
modem circumstances, difficult to credit.
The core issue in the squo is legal ambiguity---mere oversight guarantees liberal
interpretation by the military
Marcus P.L. Gustafsson 17, LL.M, Georgetown University Law Center, 2017, “COMPLIANCE
AND MEMBERSHIP VALUE IN INTERNATIONAL ECONOMIC LAW,”
https://www.law.georgetown.edu/international-law-journal/wp-
content/uploads/sites/21/2018/05/48-4-Compliance-and-Membership-Value-in-International-
Economic-Law.pdf
Yet, within traditional international legal scholarship, the meaning and nature of soft law has been tied , not to a lack of
capacity on the part of its originators, but to its lack of enforceability and compliance . For example, in an
influential article, Abbot et al. present a framework for measuring the degree of “legalization,” understood “as a
particular form of institutionalization characterized by three components: obligation, precision, and
delegation .”22 When these three components are maximized, hard legalization follows , while at
the opposite end of the spectrum, soft legalization results.23 First, high levels of “obligation” are achieved
when states express consent to be bound by the rules agreed, thus implying greater commitment than in the absence of such
consent.24 Second, precision is of importance because “for most rules requiring or prohibiting
particular conduct —and in the absence of precise delegation— generality is likely to provide an
opportunity for deliberate self-interested interpretation , reducing the impact, or at least
the potential for enforceable impact, on behavior.”25 That is, loosely drafted rules and concepts increase
the leeway and opportunities for deviation . Lastly, “delegation” to a third party allows the interpretation and
application of rules to take precedence over “political bargaining between parties who can accept or reject proposals without legal
justification.”26 Chinkin adopts the same approach as Abbot et al. in suggesting that vague language may render a formal treaty
provision “soft” and differentiates between legal and “non-legal” soft law.27 On these authors’ view, soft law is thus
associated with low levels of legalization and consequently low levels of enforcement .
ESR---2AC
Only statutes clear the bar.
Steven I. Friedland 15. Professor of law and senior scholar at the Elon University. 2015.
“Unchecked and Unbalanced: the Adverse Impact of Cybersurveillance on Government
Transparency.” IMODEV. Vol 2. http://ojs.imodev.org/index.php/RIGO/article/view/16/82
Surveillance today is qualitatively different than old-fashioned pre-digital surveillance. Cybersurveillance need not occur through government agents
lurking in shadows, stakeouts, or tailing operations. In fact, there are at least three major differences between cybersurveillance and pre-digital
surveillance that require courts to pay careful attention to modern surveillance techniques. One major difference is the reduced transaction costs
associated with cybersurveillance, as the person-power required to store data decreases. While cybersurveillance can require costly computer
hardware and software, other costs have virtually disappeared. Second, there is a lack of experience with the level of intrusiveness associated with
cybersurveillance that marginalizes its apparent harm.15 In stakeouts, there is a real person listening or observing in real-time. Phone taps sometimes
leave clicks or noises. Even drones can be heard and seen. Cybersurveillance, by contrast, involves computer and cell phone screens, invisible to
most, but functioning as a permanent uninvited appendage affixed to devices. Third, there are multiple sources of cybersurveillance. Each source is
capable of providing mountains of data – terabytes really – even information of an intimate and comprehensive nature. The range of data includes
governmentally accessed information, information indirectly gathered through private company conduits, and information gathered by individuals
through the Internet of Things, multifunctional devices connected to each other and the Internet. Direct Government Cybersurveillance Multiple
government agencies are involved in direct cybersurveillance. These agencies include the NSA, CIA, FBI,
and some branches of the military .16 The government has numerous programs that surveil
Americans, both domestically and internationally . For example, a top secret NSA program, “Highlander,” tapped into
satellite phone transmissions on a Middle Eastern Inmarsat network.17 The top-secret NSA program PRISM gives the NSA direct access to nine of the
largest Internet companies.18 The FBI has developed “a system of computers and software that completely fuses the FBI’s wiretapping outposts with
the nation’s voice communications network—landlines, cell phones, VOIP services, you name it. Every phone in America is available to them like URLs
in a browser. They type it, click it, and they’re instantly listening.”19 Agencies also are developing biometric software programs.20 The programs
include facial recognition software. The Biometric Optical Surveillance System (BOSS)21 has been tested, even if it is not yet fully operational. The
government uses other cyber methods to obtain information as new technologies continue to emerge. The agencies leverage weak encryption on
software to enter the ‘backdoors’ of private company software and track individuals.22 Governments sometimes use imitations of cell phone towers,
called Stingrays, to gather the numbers of all cell phones within range. The government utilizes “Big Data”23 methods to analyze the information
obtained. Itis not a threadbare operation; the NSA, for example, has more than 35,000 employees.24 Indirect Government Tracking
– Leveraging the Actions of Private Companies Tracking today often originates outside of the government . It results
from the efforts of private technology or retail companies , as well as our own efforts to self-surveill every aspect
of our lives. Given the range of sources collecting information, governmental collection, storage and analysis of data can seem almost incidental.
Indeed, much of the bulk collection of information is not effectuated directly by the government, but rather by private companies.25 However, the
government uses the data stored by telecommunications companies to augment the data it collects through its own agencies.26 Companies began
working with the government on surveillance matters as far back as the Cold War.27 At that time, the companies helped the government crack secret
codes and was premised upon “mutual interests.”28 That mutuality has continued to the present day: Thousands of technology, finance and
manufacturing companies are working closely with U.S. national security agencies, providing sensitive information and in return receiving benefits that
include access to classified intelligence… These programs, whose participants are known as trusted partners, extend far beyond what was revealed by
Edward Snowden, a computer technician who did work for the National Security Agency.29 While much of the publicity about private-government
partnering centered on the telecommunications companies, other types of companies are involved as well: Makers of hardware and software, banks,
Internet security providers, satellite telecommunications companies and many other companies also participate in the government programs. In some
cases, the information gathered may be used not just to defend the nation but also to help infiltrate computers of its adversaries.30 The leveraging of
private efforts creates efficiencies and synergies for the government, and sometimes for the private companies as well. The public first became aware
of the extent of the relationships between government and private business after leaks, such as the Snowden revelations.31 The partnerships have
manifested themselves in different ways. For example, some companies include weak encryption32 in their software products that the government can
easily break.33 By leaving in such “back doors,” and allowing the government to stockpile “zero-day flaws,” meaning flaws in software for offensive or
defensive government use, the government security agencies accumulate far greater quantities of data. Since technology companies hold the keys to
These government-private entity partnerships are
their software, the government agencies can obtain the keys from them.
under reexamination now. Companies have realize d, as has the population at large after the
Snowden leaks, that governmental requests for information constitute “an intrusion into the
privacy of their customers and a risk to their businesses .”34 Indirect Government Cybersurveillance –
Companies tracking Individuals The government-private partnerships are significant mostly because of the
large quantities of data obtained by private companies that track individuals. Much of this tracking is legitimized by
what will be referred to in this paper as “soft consent” – the implicit acquiescence by Web users of data access, gathering, use and even transfer by
technology. In an interconnected world, just about everything we do, from personal hygiene, to finance, to at-home free-time preferences, is observable
on the ‘grid’ since we are connected to others in one or more ways and they track us with our implicit assent. For people to make appointments with
doctors, utilize on-line banking privileges, or follow friends on Facebook, they must acquiesce to the disclosure policies of Web sites – policies that
often are filled with fine print and run on for paragraphs, if not pages. Private companies already employ sophisticated facial recognition software
programs.35 Thus, any photos displayed on Instagram, Facebook or other sites can be quickly accessed and matched by the government with its own
photo database that includes driver’s license and other sources. Private companies often track people through the Internet using “cookies” which
constitute a form of identification tag that companies attach to private computers through Web browsers when an individual uses a computer to visit a
Web site. Sometimes, third parties place cookies or tags as well; these are often placed by advertisers with banners or ads from sites that are visited.
Individuals can remove cookies or block tracking, but unless a user acts with intentionality – and understands the nature of these invisible trackers –
individuals will be subject to multiple cookies that transmit information about them to others. The third-parties who obtain this information, or who place
what is known as third-party cookies on computers, generally lurk in the shadows unseen. As one commentator noted: It’s no secret that we’re
monitored continuously on the Internet. Some of the company names you know, such as Google and Facebook. Others hide in the background as you
move about the Internet. There are browser plugins that show you who is tracking you. One Atlantic editor found 105 companies tracking him during
one 36-hour period. Add data from your cell phone (who you talk to, your location), your credit cards (what you buy, from whom you buy it), and the
dozens of other times you interact with a computer daily, we live in a surveillance state beyond the dreams of Orwell.36 Email is another fertile source
of secondary information. The sending and receiving of emails has content, but also creates metadata. ISPs usually store such metadata, which can be
transferred or sold. The NSA and other agencies can track the email metadata – where and when the email took place and who were the parties on it –
through companies that store it.37 Tracking motivated by commercial purposes is regularly used by the retail industry to track current or potential
customers, both on the Internet and in person. When customers enter a store, for example, the store can track their physical movements through cell
phones and determine their shopping habits, as well as track the floors and departments that customers visit as well as how long and how often they
visit. Advertisers, of course, seek information regarding customer habits. Google Plus, for example, is a social network, but it creates a trove of
personal information because it aggregates all Google products in one account, including Gmail, Google maps and YouTube. This allows Google to
track the habits of customers.38 The tracking of customers can occur even outside of stores through unlikely stationary objects. “Smart” garbage cans,
for example, costing in excess of $45,000, were placed in a variety of locations during the London Olympics to track traffic passing by the cans.39
Those cans, called Renew Pods, remained operational for several years after the Olympics, collecting anonymized information about traffic patterns
and potential customers.40 According to one report, the bins tracked passers-by to study their shopping habits.41 Companies also began using radio
frequency identification technology (RFID) to track items from a considerable distance. This technology involves the implantation of a small chip in an
object so it can be monitored at any time. In 2003, for example, Wal-Mart embedded lipstick containers with RFID technology in its Broken Arrow,
Oklahoma store.42 The containers could be tracked from seven hundred miles away by researchers, and included a video monitor of the consumers
handling the products.43 More Indirect Government Tracking – Self-Cybersurveillance and the Internet of Things One of the driving forces behind the
exponential growth of cybersurveillance is the so-called “Internet of Things,” where “smart” devices connect to each other and the Internet44 to provide
a multitude of data-driven opportunities. These devices are “smart” in that they can adapt based on input to improve efficiencies. People can use them
to remotely unlock the doors to their homes, turn off kitchen appliances, and check the tire pressure in their cars.45 When a person awakens, there
might be a smart thermostat that will automatically set the temperature to reflect the level of activity in the house. A smart meter can track the electricity
used by occupants of the home after they arise.46 The quality of a person’s tooth brushing will be tracked by a smart toothbrush. When the cell phone
is turned on, if it ever was turned off, it is tracked every 7 seconds to ensure that it has the preferred location for cell tower reception.47 The smart
watch connects the person to the Internet and other devices, as well as tells time. As people see an interesting situation, they might activate the real-
time video feature of the smart glasses they are wearing. The information shared with the manufacturers of connected devices is not readily apparent,
and often is provided based on the “soft consent” described above. Through this consent, people effectively acquiesce to tracking by third parties and
the controllers of sites. However, people do not understand the implications of generating information that can be shared, sold, and collected –
permanently. It is one thing to be followed by a marked police car, and quite another to provide the same information and more through data sharing. §
2 – The Importance of Constitutional Scrutiny to Cybersurveillance As a recent report by the independent Privacy and Civil Liberties Oversight Board
the system tilts too far in the
noted, there has been “equally widespread consensus within and without the government that
direction of secrecy .”48 While legislation providing for checks on secrecy is important, and ought
to be enacted , the imposition of constitutional scrutiny is required to properly cabin unrestrained government cybersurveillance. The Framers
of the Constitution understood this requirement. As Ben Franklin once declared, “those who surrender freedom for security will not have, nor do they
deserve, either one.”49 The deep structures of the Constitution create government accountability and with accountability, some form of review and
transparency. These structures, most notably the separation of powers doctrine, are designed to achieve Ben Franklin’s dual objectives of freedom and
s eparation o f p ower s doctrine does not have an
security. The Separation of Powers – A system of Checks and Balances The
express niche in the Constitution. Yet, its importance is undeniable . Interdependence among the branches can
be seen in many places in the Constitution, requiring more than one branch for the completion of many duties. Duality of action is required for the
passage of all laws, requiring both Congress and the President to act. Duality is also required for the enactment of treaties, with two-thirds Senate
approval required, as well as for appointments of various governmental officials which must be with the advice and consent of the Senate.50 Finally,
duality is required for impeachment, where the House of Representatives impeaches, and the Senate tries the impeachment, with the Chief Justice of
the United States Supreme Court presiding over the trial. Separation of powers can be traced to the Age of Enlightenment and its philosophers,
especially Baron de Montesquieu, author of The Spirit of the Laws.51 A primary objective was to blunt unrestrained power. More than that, though, the
system of divided powers was part of the Framers’ plan to protect individual liberties.52 The Framers created an inefficient system, but one whose
attributes are numerous and which has survived despite centuries of societal change. The brilliance of the checks and balances system, and the
accompanying interdependence, elides a simple rationale of distrust of government. It pushes beyond the mere fact that each branch is elected or that
overlapping duties force different factions to engage in a dialogue, if not directly. Just knowing that there will be examination and inspection by another
branch of government presumably modifies the behavior of the participants.53 The Constitutionnal Amendments The Amendments to the U.S.
Constitution further augment the separation of powers structure and directly protect liberty. In particular, the Fourth Amendment protects the people
against unreasonable government searches and seizures. The terms “search” and “seizure” are defined by case law, and theoretically limit
cybersurveillance in the context of criminal investigations and prosecutions. The seminal case that defines the term “search”, Katz v. United States54,
contained language that excluded information knowingly exposed to the public from the definition of the term. The idea of “knowingly exposed to the
public” includes most of the data generated by devices connected to the Web or each other. The Third Amendment also creates a limitation on
government excess, distinguishing permissible government quartering of troops in civilian areas from military areas.55 This recognition of two spheres,
civilian and military, also limits what the military can do in the civilian realm. The Amendment should have some applicability in the digital age in terms
of limiting military cybersurveillance in the civilian sphere. In addition, the requirement of due process of law, found in the Fifth and Fourteenth
Amendments to the U.S. Constitution, provides another limit on cybersurveillance. If cybersurveillance can be regarded as a taking of property or
liberty, then due process will apply and likely given citizens an opportunity to be heard before their property is taken. This provision, in particular, can
be viewed as antithetical to government secrecy. § 3 – Creating Real Checks and Balances The application of constitutional checks and balances is
but one way of creating incentives to curtail excessive government cybersurveillance. The use of constitutional and legislative56 incentives can be
used to reign in government snooping in an era where few natural checks and balances exist. The government’s contrary incentive -- to gather and
keep as much information as possible about others -- is great. Self-surveillance through the Internet of Things will continue to grow,57 as companies
continue to assemble and crunch more data in the commercial realm, and the government will be the welcome receptor of growing streams of
information, both directly and indirectly. A predicate assumption underlying the avenues of information gathering is that the information will not be
misused or abused. Further, it might be assumed that in desuetude, the information eventually will be abandoned and destroyed. These assumptions,
however, are not likely to occur without a framework of incentives, increasing the urgency of the imposition of real checks and balances. Inter-Branch
Transparency To
create real checks and balances , the secrecy of cybersurveillance must be
balance d against the opportunity for inspection by another branch . These inspections need
not extend to every single surveillance activity, but should extend to at least the outline of activities if
agencies are to be kept honest in their surveillance activities. NSA tracking , for example, needs
structural checking , and should not be checked solely through haphazard information leaks.58 Otherwise, the spying of
government branches will extend, as it apparently did, to the NSA on Congress.59 The repercussions are great. As
one commentator noted about the hostility toward the NSA after the Snowden revelations: “ From NSA’s point of
view, it’s a disaster,” Mr. Aid said. “Every new disclosure reinforces the notion that the agency
needs to be reined in . There are political consequences , and there will be operational
consequences.”60 Even with inspection, there must be real inspections to be effective . A lack of transparency is
evident when considering government attempts to reign in Executive and military surveillance through the Foreign Intelligence Surveillance Act61 and
the creation of the surveillance court.
2. Legal coherence. Restricting authority is necessary for clarity, simply choosing not to
exercise authority solves nothing.
Linda J. Demaine & Brian Rosen 05. Demaine is Associate Professor of Law, Arizona State
University; Rosen is Doctoral Fellow, Pardee-RAND Graduate School. 2006/2005. “Process
Dangers of Military Involvement in Civil Law Enforcement: Rectifying the Posse Comitatus Act.”
New York University Journal of Legislation and Public Policy, vol. 9, pp. 167–250.
DoD's official position is that changes to the PCA rules are unnecessary because current
law grants the DoD sufficient authority to respond to any situation that may arise.315 This is correct only to
the extent that the immediate response authority is legal and the Constitution- based exceptions exist and
apply, all of which is highly questionable . 316 It may be that the DoD prefers to maintain the
current PCA rules because the ambiguity surrounding so many of them permits the DoD a
substantial degree of flexibility . The DoD can refuse to assist civil authorities in certain
instances by claiming the law does not permit it to act, while utilizing the uncertainty in order to act when it
believes situations demand it. Relying on questionable legal authority is inadvisable , however, for at least
three reasons. First, as discussed earlier, military personnel and civil decision makers may incur civil or
criminal liability when they take action the PCA prohibits. Thus, the current PCA rules may place
military personnel in legal jeopardy despite their having followed DoD doctrine . Second,
also as discussed earlier, the current PCA rules cause confusion , which may delay or
otherwise hinder a military response when one is necessary and legal . Third, if the DoD is correct that the current
PCA rules permit it to act when necessary, then the only effect of Alternative 2 would be to make clear that they are permitted to do so. Even under the DoD's interpretation of
the current PCA rules, Alternative 2 would not expand when the military can act. Rather, it would only clarify that the military can act when necessary and civil authorities request
assistance. The model statute offers a clear means for determining: (1) whether a given domestic military activity constitutes law enforcement, and (2) what military activities that
constitute law enforcement are permissible. The statute imposes two basic preconditions for the military to conduct law enforcement activities. First, civil authorities must request
military assistance. Second, the situation must exceed the capabilities or expertise of readily available civil authorities, as determined by the Attorney General and the Secretary
of Defense. If an immediate response would be required to prevent loss of human life or mass destruction of property, making consultation with civil authorities, the Attorney
General, and the Secretary of Defense impractical, the requirements for the military to conduct law enforcement are streamlined. The military may do so if the authorized local
military commander or an individual higher in the chain of command makes a good-faith determination that the situation exceeds the capabilities or expertise of readily available
civil authorities. The model statute requires the military to attempt to notify the civil authorities, the Attorney General, and the Secretary of Defense as soon as reasonably
practical, and to thereafter act in accordance with the decision(s) made by those individuals who can be reached. It also requires the military to cease executing civil law when
the situation no longer exceeds the capabilities or expertise of readily available civil authorities. One benefit of the model statute is that it resolves ambiguity regarding the PCA
without materially altering the military's domestic role.317 As under the current PCA rules, the model statute permits the military: (1) to respond to situations calling for homeland
defense; (2) to execute the civil law if the primary purpose of the activity is to further an already permitted military function; and (3) to perform activities that do not constitute law
enforcement, regardless of whether such activities are necessary to save human life or prevent mass destruction of property. Moreover, the model statute sets forth specific and
universally applicable criteria for determining which military activities constitute law enforcement, thereby facilitating determinations as to whether a particular activity is
permissible. Finally, the model statute provides that to violate it requires a specific intent to do so, which clarifies another uncertain aspect of the current PCA rules. C.
Assessment of the Alternatives In this subpart, three fundamental criteria are used to assess the proposed alternatives to the current PCA rules. The criteria reveal the extent to
which each alternative furthers the tenets that underlie the PCA rules-general prevention of military enforcement of the civil law and the permissibility of military enforcement of
the civil law when necessary-and are defined as follows: " Transparency-the extent to which an alternative would facilitate a clearer understanding of what military activities are
permissible under what circumstances, thereby reducing the risk of confusion; • Completeness-the extent to which an alternative would ensure that the military is permitted to
respond when necessary; • Overextension-the extent to which an alternative would prevent unnecessary military enforcement of the civil law. 31 8 1. Transparency Amending
the current PCA rules as described in Alternative 1 would improve their transparency. However, adding more statutory provisions to an already unwieldy and diffuse body of law
may dilute some of the gains. In addition, implementing Alternative 1 would not resolve two of the greatest hindrances to transparency-the need to classify situations as calling
for homeland defense versus only a civil response and the potential need to rely on the ambiguous Constitutionbased exceptions. By comparison, replacing the current PCA
rules with a single statute such as that proposed in Alternative 2 dramatically improves transparency by: (1) replacing the web of exceptions with a single, clear criterion-
necessity-for determining when the military may enforce the civil law, (2) eliminating the need to base the permissibility of military action on a nebulous legal foundation, 319 and
(3) explicitly defining the meaning of law enforcement. The model statute also increases transparency by resolving one other ambiguity that would remain if Congress were
merely to amend the current PCA rules as described in Alternative 1. Namely, it makes clear that an authorized local military commander or an individual higher in the chain of
command can order activity, even activity constituting law enforcement, to respond to an emergency if the response is required to prevent loss of human life or mass destruction
of property. 320 2. Completeness This Article has detailed several areas in which the PCA may prohibit the military from taking action needed to respond effectively to situations
that exceed the capabilities or expertise of civil authorities. Amending the current PCA rules as suggested in Alternative 1 would alleviate some of their incompleteness;
however, it is impossible to anticipate all types of situations that would necessitate military activity. For this reason, the current PCA rules' situation-by-situation approach to PCA
exceptions, which Alternative 1 does not alter, makes completeness unattainable. Replacing the current PCA rules with legislation that uses the necessity of military activity as
the trigger for the activity's permissibility, as the model statute does, may be the only means by which to achieve completeness. 3. Overextension It is equally important to
prevent the military from enforcing the civil law when civil authorities are available and capable of doing so. Amending the current PCA rules as suggested in Alternative 1 would
not alter the probability that the military would be permitted to enforce the civil law in a situation that does not necessitate it. Replacing the current PCA rules with legislation that
uses the necessity of military enforcement of the civil law as the trigger for the permissibility of that enforcement, as proposed in Alternative 2, greatly increases the likelihood
that the military will enforce the civil law only when a situation requires it. Some of the reduction in overextension achieved by linking the permissibility of military action with the
necessity for that action may be mitigated by eliminating the situation-specific PCA exceptions. Any mitigation would be slight, however, due to the preconditions the model
statute imposes for military execution of the civil law. Unless an exigency exists that makes consultation between the local military commander and the DoJ and/or consultation
between the local military commander and the DoD impractical, both the DoJ and the DoD must authorize the activity. Moreover, the political consequences that could result
from high-level executive branch officials authorizing the military to execute the law when it is not necessary should ensure that authorization is granted only when necessary.
Finally, the DoD is generally reluctant to become involved in civil affairs, 321 and it is particularly reluctant to be relied upon as a first responder. 322 D. Recommendation Given
the significant problems inherent in the current PCA rules, it is recommended that Congress replace the rules with a more coherent set of guidelines such as those set forth in
the model statute in Alternative 2. As demonstrated in this part, Alternative 2 is superior to either amending the rules as discussed in Alternative 1 or leaving them unchanged,
on every assessment criteria. VI. CONCLUSION This Article sheds light on the current PCA rules in order to reduce widespread confusion surrounding the rules and to assess
the degree to which they further their underlying tenets of generally prohibiting the military from conducting civil law enforcement while permitting the military to do so should the
need arise. After reviewing the current PCA rules, examining the main areas of confusion concerning the rules, and presenting frameworks for determining the legality of
domestic military activities, it becomes apparent that the PCA rules suffer from intractable problems. These problems cause the rules to fall short of the ideal and, more
produce definitive answers regarding the legality of military activities, thereby creating
potential impediments to effective military action when such action is necessary or enabling
military action when it is not . Consequently, the current PCA rules should be replaced with a single statute, such as the
model statute discussed in Part V, that permits the military to enforce the civil law when, and only when, a situation exceeds the
capabilities or expertise of readily available civil authorities. Such a law would provide the most direct means of preventing the
military from engaging in civil law enforcement activities under routine circumstances while recognizing that an unpredictable
environment may present emergency situations in which the military is the only institution capable of responding effectively.
Politics DA---2AC
Leadership’s irrelevant.
Christopher Fettweis 17. Associate Professor of Political Science at Tulane University.
“Unipolarity, Hegemony, and the New Peace,” Security Studies, 26:3, 423-451, 5-8-2017,
http://dx.doi.org/10.1080/09636412.2017.1306394
Conflict and Hegemony by Region Even the most ardent supporters of the hegemonic-stability explanation do not contend that US
influence extends equally to all corners of the globe. The United States has concentrated its policing in what George Kennan used
to call “strong points,” or the most important parts of the world: Western Europe, the Pacific Rim, and Persian Gulf.64 By doing so,
Washington may well have contributed more to great power peace than the overall global decline in warfare. If the former
phenomenon contributed to the latter, by essentially providing a behavioral model for weaker states to emulate, then perhaps this
lends some support to the hegemonic-stability case.65 During the Cold War, the United States played referee to a few intra-West
squabbles, especially between Greece and Turkey, and provided Hobbesian reassurance to Germany’s nervous neighbors.
Other , equally plausible explanations exist for stability in the first world, including the presence of a
common enemy, democracy, economic interdependence, general war aversion, etc. The looming
presence of the leviathan is certainly among these plausible explanations, but only inside the US sphere of influence. Bipolarity was
bad for the nonaligned world, where Soviet and Western intervention routinely exacerbated local conflicts. Unipolarity has
generally been much better, but whether or not this was due to US action is again unclear . Overall US
interest in the affairs of the Global South has dropped markedly since the end of the Cold War, as has the level of
violence in almost all regions. There is less US intervention in the political and military affairs of Latin America
compared to any time in the twentieth century, for instance, and also less conflict. Warfare in Africa is at an all-
time low, as is relative US interest outside of counterterrorism and security assistance.66 Regional peace and stability
exist where there is US active intervention, as well as where there is not. No direct relationship
seems to exist across regions . If intervention can be considered a function of direct and indirect activity, of both
political and military action, a regional picture might look like what is outlined in Table 1. These assessments of conflict are by
necessity relative, because there has not been a “high” level of conflict in any region outside the Middle East during the period of the
New Peace. Putting aside for the moment that important caveat, some points become clear. The great powers of the world are
clustered in the upper right quadrant, where US intervention has been high, but conflict levels low. US intervention is
imperfectly correlated with stability, however. Indeed, it is conceivable that the relatively high level of US
interest and activity has made the security situation in the Persian Gulf and broader Middle East worse . In
recent years, substantial hard power investments (Somalia, Afghanistan, Iraq), moderate intervention
(Libya), and reliance on diplomacy (Syria) have been equally ineffective in stabilizing states torn
by conflict. While it is possible that the region is essentially unpacifiable and no amount of police work would bring peace to its
people, it remains hard to make the case that the US presence has improved matters. In this “strong point,”
at least, US hegemony has failed to bring peace . In much of the rest of the world, the United States has not been
especially eager to enforce any particular rules. Even rather incontrovertible evidence of genocide has not been enough to inspire
action. Washington’s intervention choices have at best been erratic; Libya and Kosovo brought about action,
but muchmore blood flowed uninterrupted in Rwanda, Darfur, Congo, Sri Lanka, and Syria. The
US record of peacemaking is not exactly a long uninterrupted string of successes. During the turn-of-
the-century conventional war between Ethiopia and Eritrea, a highlevel US delegation containing former and future National Security
Advisors (Anthony Lake and Susan Rice) made a half-dozen trips to the region, but was unable to prevent either the outbreak or
recurrence of the conflict. Lake and his team shuttled back and forth between the capitals with some frequency, and President
Clinton made repeated phone calls to the leaders of the respective countries, offering to hold peace talks in the United States, all to
no avail.67 The war ended in late 2000 when Ethiopia essentially won, and it controls the disputed territory to this day. The Horn
of Africa is hardly the only region where states are free to fight one another today without fear of
serious US involvement. Since they are choosing not to do so with increasing frequency, something else is probably
affecting their calculations. Stability exists even in those places where the potential for intervention by the sheriff is
minimal. Hegemonic stability can only take credit for influencing those decisions that would have ended in war without the presence,
whether physical or psychological, of the United States. It seems hard to make the case that the relative peace
that has descended on so many regions is primarily due to the kind of heavy hand of the neoconservative
leviathan, or its lighter, more liberal cousin. Something else appears to be at work .
1. No one will notice the plan.
Eric Geller 15. Deputy Morning Editor at The Daily Dot—the “hometown newspaper of the
Internet.” 07-10-15. “The rise of the new Crypto War.” The Daily Dot.
http://www.dailydot.com/politics/encryption-crypto-war-james-comey-fbi-privacy/
The encryption hearing attracted scant attention on Capitol Hill—certainly nowhere near as
much press as the Republican Party’s endless Benghazi hearings. While many representatives
lambasted Hess and Conley for their dubious arguments, the issue failed to break out into
the mainstream . Encryption is not a sexy issue , even if it has huge ramifications for privacy
and civil liberties. Higher-profile, more partisan fights are consuming Washington right now;
lawmakers would rather attend hearings and deliver speeches about those issues . That’s the
way to rile up voters, score endorsements, and secure donations.
popular idea that people fight wars over scarce resources . Hunger and resource
shortages are tragically common in sub-Saharan countries such as Malawi , Zambia , and
Tanzania , but wars involving them are not. Hurricanes, floods, droughts, and tsunamis
(such as the disastrous one in the Indian Ocean in 2004) do not generally lead to conflict. The American dust bowl in the
1930s, to take another example, caused plenty of deprivation but no civil war . And while temperatures have
been rising steadily in Africa during the past fifteen years , civil wars and war deaths have
been falling. Pressures on access to land and water can certainly cause local skirmishes, but a
genuine war requires that hostile forces be organized and armed , and that depends more on
the influence of bad governments , closed economies , and militant ideologies than on the
sheer availability of land and water. Certainly any connection to terrorism is in the imagination of the terror warriors: terrorists tend to be
underemployed lower-middle-class men, not subsistence farmers. As for genocide, the Sudanese government finds it convenient to blame violence in
In a regression analysis
Darfur on desertification, distracting the world from its own role in tolerating or encouraging the ethnic cleansing.
on armed conflicts from 1980 to 1992, Theisen found that conflict was more likely if a country
was poor , populous , politically unstable, and abundant in oil , but not if it had suffered from
droughts , water shortages , or mild land degradation . (Severe land degradation did have a small effect.)
Reviewing analyses that examined a large number ( N ) of countries rather than cherry-
picking one or toe, he concluded, “Those who foresee doom, because of the relationship between
resource scarcity and violent internal conflict, have very little support from the large-N
literature.”
The countries that matter for their impact are resilient and institutional responses
prevent escalation
Sarah Cliffe 16, Director of the Center on International Cooperation at New York University,
3/29/16, “Food Security, Nutrition, and Peace,” http://cic.nyu.edu/news_commentary/food-
security-nutrition-and-peace
However, current research does not yet indicate a clear link between climate change, food insecurity
and conflict, except perhaps where rapidly deteriorating water availability cuts across existing tensions and weak institutions.
But a series of interlinked problems – changing global patterns of consumption of energy and scarce resources, increasing demands
for food imports (which draw on land, water, and energy inputs) can create pressure on fragile situations.
Food security – and food prices – are a highly political issue, being a very immediate and visible source of
popular welfare or popular uncertainty. But their link to conflict (and the wider links between climate change and conflict)
is indirect rather than direct.
What makes some countries more resilient than others?
Many countries face food price or natural resource shocks without falling into conflict .
factors in determining their resilience are:
Essentially, the two important
First, whether food insecurity is combined with other stresses – issues such as unemployment, but most
fundamentally issues such as political exclusion or human rights abuses. We sometimes read nowadays that the 2006-2009
drought was a factor in the Syrian conflict, by driving rural-urban migration that caused societal stresses. It may of
course have been one factor amongst many but it would be too simplistic to suggest that it was the primary
driver
The evidence also points to these benefits emerging relatively quickly – in the space of one to
two years. Two other recent studies have also suggested that wage responses to higher food
prices are large enough to overturn the idea that higher food prices hurt the poor. World Bank
research on rural India , the country with the single largest concentration of the world’s poor, found that wage
responses are large enough to overturn the initially adverse effect of higher food prices
on disposable incomes . Furthermore, IFPRI researchers have used an economy-wide simulation
model to separate the short and long-term effects of higher food prices on Uganda’s poor. As in
rural India, wage responses in Uganda overturn the initial conclusion that higher food prices
increase poverty. In the long run, higher prices are actually a boon for poverty reduction.
Poverty is the driving force for the global conflicts laundry listed in their impact evidence
– try or die for higher food prices
MacMillan, former Director of the FAO’s Field Operations Division, 14
(Andrew, Higher Food Prices Can Help to End Hunger, Malnutrition and Food Waste,
http://www.ipsnews.net/2014/06/higher-food-prices-can-help-to-end-hunger-malnutrition-and-
food-waste/)
Any customers who give thought to how and where all the different foods are produced and end up in their shopping trolleys will start to uncover a
rather disturbing situation. They will find that in most countries, people working at all levels in the food system – in supermarkets, in meat processing
and packing plants, as fruit harvesters or farm labourers, or as waitresses in fast-food restaurants – are among the worst paid of all workers. They will
discover that many of the skilled families that run the small-scale farms that produce most of the world’s food live precariously They are exposed to
multiple risks caused by fluctuating markets, pests and diseases and extreme weather problems, whether frosts, hailstorms, floods, typhoons or
droughts. They will also learn that in most developing countries hunger is heavily concentrated in rural areas, where some 70 percent of the world’s
Much urban poverty results from
842 million chronically hungry people live, largely dependent on farming, fishing and forestry.
people fleeing rural deprivation. And many of the conflicts that threaten global stability have
their origins in areas of extreme poverty . It seems dreadfully wrong that the very people who produce so much of our food
should be those who suffer most from deep poverty and food shortages. One reason for this apparently unjust situation is what economists call
supermarkets engage in cut-throat competition for
asymmetrical relationships in the food chain. For instance,
customers by lowering their prices, reducing what they pay to their suppliers who, in turn, cut
back on their workers’ pay . Most governments like to keep food prices “affordable”, claiming that it makes food accessible to poor
families, thereby preventing hunger and malnutrition. The main policy instruments used by rich and emerging nations include tax-funded subsidies that
The idea that low food prices will
compensate their farmers for low-priced food sales. They also set low taxes on most foods.
reduce the scale of the hunger problem is flawed since the main reason for people being
hungry is that they cannot afford the food they need , even when prices are low . Rather than,
as now, shielding all consumers from paying a full and fair price for food, it seems to make more
sense to let prices rise and increase the food buying power of the poor . As Fair Trade customers have
discovered, higher retail prices can be passed back to all those involved in the food production
chain, especially farm labourers. They probably offer the best market-driven option for cutting rural
poverty and hunger . But to eliminate hunger quickly, income transfers, targeted on poor families and with their value indexed to food
prices, are also needed, at least until countries begin to manage their economies more equitably.
India – 1NC
High food prices solve rural poverty in India – reject other studies, they don’t assume
wage adjustment
Jacoby, Agriculture and Rural Development Unit, Development Research Group @ The World
Bank, 13
(Hana, Food Prices, Wages, and Welfare in Rural India, The World Bank Development
Research Group Agriculture and Rural Development Team)
Aside from direct income effects for consumers and producers, as in the textbook partial equilibrium analysis (e.g., Singh, Squire, Strauss, 1986,
higher agricultural prices, in principle, induce three types of indirect, or general equilibrium, effects
Deaton, 1989),
concomitant with higher wages: (1) higher labor income ; (2) lower capital (land) income due to
higher labor costs; (3) higher prices for nontradables. To account for these channels in a manner that is both theoretically
coherent and transparent, I integrate a standard three-sector, specific factors, general equilibrium model of wage determination (Jones, 1971,1975) into
an otherwise conventional (first-order) household welfare change calculation.4 I use this generalization of Deaton (1989) to examine the distributional
impacts of higher agricultural prices in rural India. Appealing to the widely noted geographical immobility of labor across rural India,5 I apply the specific
factors model at the district level, treating each of these administrative units for theoretical purposes as a separate country with its own labor force but
with open commodity trade across its borders.6 Thus, I allow that the elasticity of the rural wage with respect to an index of agricultural prices is not a
single number for India as a whole, but varies with the structure of the particular (district) labor market. Moreover, under certain assumptions on the
technology and preferences, I obtain a readily interpretable closed-form solution for this elasticity as a function of parameters that I can easily calculate
from microdata. My empirical analysis shows that nominal wages for manual labor across rural India
respond elastically to higher agricultural prices. In particular, wages rose faster in the districts
growing relatively more of the crops that experienced comparatively large run-ups in price over
the 2004-5 to 2009-10 period. Moreover, the magnitude of these wage responses is broadly
consistent with a specific-factors model in which labor is perfectly mobile across production
sectors. Indeed, I also explore a version of the theoretical model in which labor markets are segmented so that workers cannot shift from
agriculture to the services or manufacturing sectors. This alternative labor market assumption turns out to have significantly different welfare
Under labor market
implications in the Indian context than the unsegmented case. Fortunately, it has different empirical implications as well:
segmentation, nonagricultural wages (for manual labor) respond to changes in agricultural prices with
a relatively low elasticity , as intersectoral spillovers are muted, if not nugatory. The evidence, however, is
inconsistent with this strong form of segmentation. Existing studies of the relationship between agricultural commodity prices and rural wages are
based on aggregate time series data from countries that were effectively autarkic in the main food staple (pre-1980s Bangladesh in Boyce and
Ravallion, 1991, and Rashid, 2002; the Philippines in Lasco et al., 2008), thus raising serious endogeneity concerns. A closely related and much larger
literature based on micro-data considers the labor market effects of trade liberalization (see Goldberg and Pavcnik, 2007, for a review).7 My estimation
strategy follows the “differential exposure approach” employed in studies of the local wage impacts of tariff reform (most recently in Topalova, 2010,
McCaig, 2011, and Kovak, 2011). Instead of considering the interaction between changes in industry protection rates and local industry composition
(as in these papers), I exploit the huge variation across Indian districts in the crop composition of agricultural production coupled with differences in the
magnitude of wholesale price changes across crops. Of course, price changes observed in local domestic markets cannot be treated as exogenous
and must be instrumented for. In
rural India, the elastic rural wage response to changes in agriculture’s
terms of trade has striking distributional implications. Higher food prices, rather than reducing the
welfare of the rural poor as indicated by the conventional approach, which ignores wage
impacts , would actually benefit both rich and poor alike , even though the latter are typically not net sellers of
food.8
exceedingly Naxal terrorist struck districts of India or in the “Red Corridor”. Some of the sensitive nuclear
installations situated in this “Red Corridor” are, Uranium Corporation Of India Limited, Talcher Heavy Water Plant, Institute of Physics, Ceramatic Fuel
Fabrication Facility, Nuclear Fuel Complex, Seha Institute of Nuclear Physics, Atomic Minerals Directorate and many more. Around 90% of the Red
The Naxal rebels are in full control and there is no
Corridor areas are a ‘No Go Zones’ for the Indian troops and Air Force.
writ of the Indian government in these areas. The shocking aspect of Daily Mail’s report is that some Indian
nuclear scientists are reportedly assisting Naxal rebels to learn to utilise and transport
uranium . On the other hand, many of India’s missile facilities are located in either the Red Corridor or
in the areas controlled by Hindu radicals and militant organisations. There are reported cases of the abduction of nuclear
scientists from these areas, which is a very disturbing situation with respect to the safety and security of nuclear weapons. Any nuclear
accident in India could have a serious impact on its neighbouring countries and hence, the
insufficient safety and security measures are of great concern to Pakistan. Just imagine if a
nuclear weapon fell in the hands of Indian terrorists ; this could lead to an accidental
nuclear war between Pakistan and India. Likewise, an accident at a nuclear power plant could release radiation that may not respect any
borders.
Afghanistan – 1NC
High food prices reduce opium production in Afghanistan – key to defeating the Taliban
Huschke, Mayme and Herb Frank Fund Research Fellow @ the Streit Council, 11
(Griffin, ISAF Loves High Grocery Bills: The Silver Lining in the Upcoming Food Riots,
http://blog.streitcouncil.org/2011/01/10/isaf-loves-high-grocery-bills-the-silver-lining-in-the-
upcoming-food-riots/)
Trying to put a positive spin on higher food prices takes us to the southern poppy fields of
Afghanistan. As mentioned below, the Islamic Republic of Afghanistan cultivates more poppy than all other countries combined (they’re pretty
good at growing pot, too), and has the highest relative rates of opium addiction in the world. Poppy cultivation , production ,
refinement , and trafficking all provide a major sources of funding for the Taliban and
Afghan warlords , and the UN Office of Drugs and Crime has linked high areas of insecurity with the densest areas of opium cultivation. In
some of the poorest places in the south, poppy has become a kind of currency of its own. The thing is, a lot of poppy farmers don’t
actually want to grow poppy. Most devout farmers follow an interpretation of the Koran that
prohibits opiates, and have seen the lives of their friends and family devastated by addiction. They also understand its illegal,
and don’t want to run afoul of ISAF and Afghan forces. But for some, it’s the only living they can make–much like
Wallace from The Wire . Others are simply terrorized into growing drugs for the Taliban. In other places, the soil is too poor and barren to support any
other crop but the sand-loving poppy or that bushels of poppy are used for interest payments on loans. NATO officials have long been frustrated by a
number of obstacles to successfully combating poppy growth. Poppy cultivation was initially dismissed by Defense Secretary Donald Rumsfeld in the
aftermath of the ISAF invasion (which kept the Secretary’s record of pithily dismissing really important things intact). When poppy cultivation and heroin
ISAF officials tried a number of tactics to halt the massive increase in
production became too large to ignore,
growth, including alternative livelihoods , interdiction , eradication, increased law
enforcement , and better education. It didn’t really work . In fact, the major determent to poppy
cultivation rates since the U.S.-led invasion in 2001, was the spike in food prices in 2007-2008. For the first
time in a long time, desperately poor Afghan farmers could get more at market for growing grains
than poppy , and planted their crops accordingly . Where the ISAF program failed, the
invisible hand succeeded. The ghost of Adam Smith was also present in supply factors contributing to poppy reduction. The Taliban
had grown so much poppy in the previous years that they had exceeded world demand for heroin. Yes, that’s right, the Taliban had made more heroin,
the most addictive drug on the planet, than world demand. And while the Taliban doesn’t really get women’s rights or the innate human desire for
music, they sure understand basic economics. The oversupply of heroin caused prices to fall, and it was cutting into the insurgents’ bottom line. So in
2007, instead of intimidating, terrorizing, and forcing farmers to grow poppy, which would drive prices even lower, the Taliban let people grow grains
and pay off debts in other ways. Since then, opium production has declined, and several of the ISAF’s tactics, especially peer-pressure from local
shuras (local governing religious councils), has played a role in keeping opium production down. There’s also simply more areas under government
the UN concludes that market factors play
control, which makes it easier to enforce the domestic poppy ban. In the end though,
the largest part in discouraging farmers from poppy cultivation. And for hundreds of service men
and women working to fight opium production in Afghanistan right now, higher food prices
probably sound pretty good.
living in such concentrated urban areas . When food prices are high it makes sense for an
urban dweller to return to the country where money can be made producing food to sell to
people living in cities. In America tremendously productive farmers constitute less than 2 per
cent of the population. Rural America and Canada were largely depopulated by industrialization
that occurred due to World War II. That migration has proved to have an untenable ecological footprint.
The high cost of fuel is beginning to force us to think about the size and scale of just about
everything we do, especially in heavily industrialized large-scale agriculture. Farmers are
looking for ways to minimize their use of oil-related inputs. E.F. Schumacher argued in his seminal
book Small is Beautiful, for “intermediate technology” that is moderately productive and engages
as many people as possible. Intermediate technologies are low-input technologies that can be utilized in places where electricity might not
be available. The equipment is easily repaired and the work tends to create employment rather than
reduce it. This is necessary for the developing world where unemployment is a major hurdle to
development. Production of goods should use local materials and must be affordable to the
local population. Schumacher envisioned a world of two million villages. The foundation of such a vision is a
local food supply. High food prices may be an opportunity for fundamental change in
agricultural policy . Now that farmers are able to earn a living wage, legislators could start to
shift subsidies away from the producer to the consumer . In the U.S. the Food Stamp
Program could receive the money from agriculture subsidies on a sliding scale, so that the price of
commodities and the price of food always remain relatively balanced. As the price of food increases, money could be diverted to the low-income
consumer. Then, if agricultural commodities fall in price and farmers begin to suffer, the money could
be diverted back. Such mechanisms already exist in current Farm Bills relating to milk production. However, they are currently linked to the
price received and not cost of production. There is a current move to adjust the 2007 Farm Bill to reflect recent production cost changes. Although
the U.S. Farm Bill is reassessed every five or six years, each year there is room for adjustment
for specific needs. Many possibilities exist to bring about more sustainable agricultural practices,
and the Farm Bill is slowly beginning to support more environmental practices.
Extinction
Cummins, International Director of the Organic Consumers Association, 10
(Ronnie, Agriculture and Human Survival: The Road Beyond 10/10/10,
http://www.commondreams.org/view/2010/10/07-9)
Despite decades of deception and mystification, a critical mass at the grassroots is waking up. A new generation of food and climate
activists understands that greenhouse gas-belching fossil fuels, industrial food and farming, and our entire global
economy pose a mortal threat , not just to our present health and well being, but also to human
survival . Given the severity of the Crisis, we have little choice but to step up our efforts. As 35,000 climate activists at the historic global climate summit in April of 2010
in Cochabamba, Bolivia shouted, “We must change the System, not the climate.” “Changing the System,” means defending our selves, the future generations, and the biological
carrying capacity of the planet from the ravages of “profit at any cost” capitalism. “Changing the System,” means safeguarding our delicately balanced climate, soils, oceans,
and atmosphere from the fatal consequences of fossil fuel-induced climate change. “Changing the System” means exposing, dismantling, and replacing, not just individual out-
of-control corporations like Monsanto, Halliburton, and British Petroleum, and out-of-control technologies like gene-altered crops and mountaintop removal; but our entire
chemical and energy-intensive industrial economy, starting, at least for many of us, with Food Inc.’s destructive system of industrial food and farming. “Changing the system,”
means going on the offensive and dismantling the most controversial and vulnerable flanks of our suicide economy: coal plants, gas guzzlers, the military-industrial complex,
and industrial agriculture’s Genetically Modified Organisms (GMOs) and factory farms. Frankenfoods and Industrial Agriculture Highly subsidized GM crops - comprising 40% of
U.S. cropland, and 10% of global crops - and the junk food and unhealthy processed foods and beverages derived from them, are the most profitable and strategically important
components of industrial agriculture. Taxpayer subsidized GMOs and factory farms allow Food Inc. (corporate agribusiness) to poison the public and pollute the atmosphere and
environment. Subsidized GM and monoculture crops - along with cheap soy, corn, and chemical additives - allow the McDonald’s, Cargills and Wal-Marts of the world to sell
pesticides and chemical
junk food, meat, and beverages at much lower prices than healthy, non-chemical foods. GMO crops and their companion
fertilizers are the cash cows and vanguard of a global farming and food distribution system that
consumes prodigious amounts of fossil fuels and emits tremendous amount of climate-
destabilizing greenhouse gases. GMOs provide the ideological and technological foundation for the factory farms and
mono-crop plantations that are destroying the climate, the soils, and the planet. Either we bring
them down, or they will bring us down. According to Monsanto and the global war on bugs, war on biodiversity, chemical farming lobby, patented
GMO seeds, crops, biofuels, animals, and trees can miraculously kill pests, reduce pesticide use, boost yields, alleviate world hunger, reduce petroleum use, and help farmers
adapt to drought, pestilence, and global warming. As a growing "Millions Against Monsanto" corps understand, the Biotech Bullies are dangerous liars. Industrial agriculture,
GMOs, and so-called cheap food have destroyed public health and wrecked the environment. Genetically Modified (GM) crops have neither reduced pesticide use, nor chemical
fertilizer use. They kill pests, but they also give rise to superweeds and superpests. GM crops, like all industrial monoculture crops, use vast amounts of fossil fuel and water.
GMO and their companion chemicals (pesticides and chemical fertilizers) destroy the greenhouse gas sequestering capacity of living soils and kill off non-patented plants, trees,
and animals. Most GM crops, 90% of which are derived from Monsanto’s patented seeds, are genetically engineered to boost the sales of toxic pesticides such as Roundup,
and thereby increase toxic pesticide residues in foods. GM crops do not produce higher yields, nor provide more nutritious foods. GM soybeans, the most important industrial
agriculture crop, along with corn, consistently have lower yields, while chemical-intensive GM food crops contain far fewer vitamins and essential trace minerals than organic
foods. Nor has gene-splicing (unlike organic farming) produced plant or tree varieties that can adapt to global warming. Nonetheless GM crops remain Food Inc.’s propaganda
“poster child.” The unfortunate bottom line is that 65 years of chemical and GM agriculture, a literal World War Three on public health, rural communities, and the environment,
have nearly killed us. Humans and our living environment have been poisoned, not only by pesticides, nitrate fertilizers, greenhouse gas pollution, and contaminated factory-
farmed food, but also by the mutant organisms and patented chemical residues that accompany these genetically modified foods and crops. Either we make the Great
Transition to a relocalized economy whose foundation is renewable energy and solar-based (as opposed to GMO and petroleum-based) organic food and fiber production, or
else we are destined to burn up the planet and destroy ourselves. Despite mass media brainwashing (“Better living through chemistry… Monsanto can feed the world… GMO
crops and trees can reduce fossil fuel use and climate-destabilizing greenhouse gases…”), consumers and farmers are seeing through the lies. Defying the efforts of the
powerful industrial agriculture/biotech lobby, a growing number of activists and concerned citizens are connecting the dots and taking action. As a consequence Monsanto has
become one of the most hated corporations on earth. A critical mass of research reveals that genetically engineered crops, now covering almost 40% of U.S. cropland (173
million acres of GM crops) and 10% of global farm acreage (321 million acres), pollute the environment, kill essential soil micro-organisms, generate superweeds and pests,
decrease biodiversity, aid and abet seed monopolization, encourage massive use of toxic pesticides and chemical fertilizer, spew out massive amounts of climate-destabilizing
greenhouse gases, and seriously damage animal and human health. Injecting genetically engineered hormones into dairy cows to force them to give more milk is reckless and
dangerous. Monsanto’s genetically engineered Bovine Growth Hormone rBGH, now marketed by Eli Lilly, increases the risks of breast, prostate, and colon cancer for those who
consume the milk. It also severely damages the health of the cows. Residue levels of Monsanto’s toxic herbicide, Roundup, found routinely in non-organic foods, destroy animal
and human reproductive systems. Haphazardly ramming indeterminate amounts of patented foreign DNA, bacteria, and antibiotic-resistant genes into the genomes of already
non-sustainable energy and pesticide-intensive crops and foods (corn, soy, cotton, canola, sugar beets, alfalfa) in order to increase the sales of Monsanto or Bayer's GMO
companion herbicides or to facilitate monopoly control over seeds by the Gene Giants is not only non-sustainable, but criminal. Rejection of this out-of-control GM technology is
a major driving force in the rapid growth of organic food and farming, as well as the growing demand for mandatory safety testing and labeling of GMOs. In the EU, where GM-
tainted foods must be labeled, GMO crops are almost non-existent (although large quantities of GM animal feed are still being imported into the EU from the U.S., Canada,
Local and organic food production is now growing faster than GMO/industrial food and farming;
Brazil, and Argentina).
improving public health and nutrition,reducing fossil fuel use and greenhouse gas pollution, sequestering
billions of tons of CO2 in the soil (up to seven tons of CO2 per acre per year), and providing economic survival for a
growing number of the world’s 2.8 billion small farmers and rural villagers. The growth of organic agriculture and
relocalized food and farming systems are encouraging, but obviously organics are still the
alternative, rather than the norm. As we enter into the Brave New World of global warming and climate chaos, many
organic advocates are starting to realize that we need to put more emphasis, not just on the health and pollution hazards of GMOs;
but rather we need to broaden our efforts and mobilize to abolish the entire system of industrial food and farming. As we are now
learning, industrial
agriculture and factory farming are in fact a primary (if not the primary) cause of
global warming and deforestation . Even if were able to rip up all of Monsanto’s GMO crops tomorrow, business as
usual, chemical-intensive, energy-intensive industrial agriculture is enough to kill us all. On the other hand,
if we’re going to take down industrial agriculture, one of the best ways to leverage our efforts is to target the most hated corporation in the world, Monsanto. Besides
contaminating our food, destroying the environment and moving, by any means necessary, to gain monopoly control over seeds and biodiversity, Monsanto and their Food Inc.
collaborators are guilty of major “climate crimes.” These crimes include: confusing the public about the real causes of (and solutions to) global warming; killing the soil’s ability to
sequester greenhouse gases; releasing massive amounts of greenhouse gases (CO2, methane and nitrous oxide) into the atmosphere; promoting bogus industrial corn and
soy-derived biofuels (which use just as many fossil fuel, and release just as many greenhouse gases as conventional fuels); monopolizing seed stocks and taking climate-
friendly varieties off the market; promoting genetically engineered trees; and last but not least, advocating dangerous geoengineering schemes such as massive GM plantations
of trees or plants than reflect sunlight. The negotiators and heads of state at the December 2009 Copenhagen Climate negotiations abandoned the summit with literally no
binding agreement on meaningful greenhouse gas (carbon dioxide, nitrous oxide, methane, and black carbon) reduction, and little or no acknowledgement of the major role that
industrial food and farming practices play in global warming. Lulled by the world’s leaders vague promises to reduce global warming, and still believing that new technological
breakthroughs can save us, the average citizen has no idea how serious the present climate crisis actually is. A close look at present (non-legally binding) pledges by the
Obama Administration and other governments to reduce GHG pollution shows that their proposed, slightly modified “business as usual” practices will still result in a disastrous
global average temperature increase of 3.5 to 3.9 C by 2100, according to recent studies. This will not only burn up the Amazon, the lungs of the planet, but also transform the
Arctic into a region that is 10 to 16 degrees C warmer, releasing most of the region’s permafrost carbon and methane and unknown quantities of methane hydrates, in the
process basically putting an end to human beings’ ability to live on the planet. We are literally staring disaster in the face. In the follow up to the Copenhagen Climate Summit
this year, which is to be held in Cancun, Mexico (Nov. 29-Dec. 10) we, as members of global civil society, must raise our voices loud and clear. We must make it clear that we
are years, not decades away, from detonating runaway feedback mechanisms (heating up and burning up the Amazon and melting the Arctic permafrost) that can doom us all.
Industrial Food and Farming: A Deadly Root of Global Warming Although transportation, industry, and energy producers are
obviously majorfossil fuel users and greenhouse gas polluters, not enough people understand that the worst U.S. and
global greenhouse gas emitter is “Food Incorporated,” transnational industrial food and farming , of which
Monsanto and GMOs constitute a major part. Industrial farming, including 173 million acres of GE soybeans, corn, cotton, canola,
and sugar beets, accounts for at least 35% of U.S. greenhouse gas emissions (EPA’s ridiculously low estimates range from 7% to
12%, while some climate scientists feel the figure could be as high as 50% or more). Industrial agriculture, biofuels, and non-
sustainable cattle grazing - including cutting down the last remaining tropical rainforests in Latin America and Asia for GMO and
chemical-intensive animal feed and biofuels - are also the main driving forces in global deforestation and
wetlands destruction, which generate an additional 20% of all climate destabilizing GHGs. In other
words the direct (food, fiber, and biofuels production, food processing, food distribution) and indirect damage
(deforestation and destruction of wetlands) of industrial agriculture, GMOs, and the food industry are the major
cause of global warming. Unless we take down Monsanto and Food Inc. and make the Great Transition to
a relocalized system of organic food and farming, we and our children are doomed to reside in
Climate Hell.
Industrial ag outweighs nuclear war – causes extinction, happening now, goes unnoticed
Gray, cooperative economic development worker, 15
(Heather, Comparing Nuclear War with Industrial Agriculture,
http://www.counterpunch.org/2015/07/23/comparing-nuclear-war-with-industrial-agriculture/)
It might seem a strange comparison to some, but over the years in my work in agriculture in the United States, as well as internationally, I can’t help but
compare the devastating impact of a possible nuclear war to industrial agriculture. Both can have ruinous impacts on the planet, our environment and
Nuclear war would
our human health in the short and long term (in the case of industrial agriculture this is already happening).
accomplish its devastation immediately then leading to calamitous long-term effects. Industrial agriculture
accomplishes its devastation certainly at a slower pace and also with long-term effects. I think it
is because of its “slow” destruction of our natural world, most of us are not as alarmed
about industrial agriculture and its impacts as we should be. The fact is, we thankfully have not had a full-scale nuclear war but we
do, as mentioned, have the on-going dangerous ramifications from industrial agriculture. What is industrial agriculture? It is known as intensive
agriculture with considerably higher inputs per acre compared to traditional farming. Some aspects of industrial agriculture include the use of
genetically modified organisms (GMOs) and patented seeds by corporate agribusiness (GMOs referring to “genetically modified organisms”); use of
synthetic nitrogen-based fertilizers; use of chemical laden pesticides; use of huge farm equipment; factory farms for animals that are abusive to the
animals and feed them with growth hormones and antibiotics that then has an appalling effect on humans (i.e. anti-biotic resistance and much more).
Some alternatives to the industrial agriculture model are: diverse production with many different crops to prevent outbreak of disease and to encourage
beneficial insects; use of traditional seeds not genetically modified; no use of poisonous chemicals; as much as possible, and importantly, the
maintenance and support of small independently owned family farms and/or cooperatively owned land and farms that do not require huge machines for
production; free range settings for animals; individuals in urban and rural areas growing their own healthy foods. Industrial agriculture is supported and
largely created by corporate agribusiness after WWII and some of the largest and most detrimental corporate agribusiness companies today include
the pesticide and GMO corporations known as the “Big 6” that are: BASF, Bayer, Dupont, Dow Chemical Company, Monsanto, and Syngenta. They
are so called (the Big 6) because they dominate the agricultural input market — that is, they own the world’s seed, pesticide and biotechnology
industries. According to the United Nations Conference on Trade and Development (UNCTAD), corporate concentration of the agricultural input market
“has far-reaching implications for global food security, as the privatization and patenting of agricultural innovation (gene traits, transformation
technologies and seed germplasm) has been supplanting traditional agricultural understandings of seed, farmers’ rights, and breeders’ rights” (Source
Watch). Regarding industrialized food and its impact here is an example: “Like much of the industrialized world, the US is in the midst of an alarming
obesity epidemic: the prevalence of obesity in US adults in 2009-2010 was 35%, while 60% of Americans are now classified as overweight. With the
obesity epidemic comes chronic diseases, such as Type II diabetes, heart disease, and stroke, all of which have been linked to the so-called “Western”
diet: a diet full of high fat and processed meats, carbohydrate- and salt-laden junk food, and sodas sweetened with high fructose corn syrup (HFCS)”
(Sustainable Table). As with an increase in the destructive power of nuclear bombs after WWII by the U.S. and Russia, so to after WWII there was an
increase of destructive methods and ideas leading to dire ramifications on humans and the environment with the growth of industrial agriculture after
WWII. This was primarily the use of chemicals and manipulation of seed genes and DNA. Adversaries in Nuclear Arms Race and in Industrial
Agriculture In the nuclear arms race there are countries and political and economic interests that battle each other that have in the past been
considered adversaries such as the United States vs Russia. Corporate agribusiness has two major the enemies or adversaries and they are nature
and independent family farmers throughout the world who save seed. Nature? Rather than working with nature, scientists chose to “fight” it as with
chemicals to destroy weeds. This is but one example. Scientists destroy the integrity of many of our traditional seeds by genetically modifying them.
This, rather than the society listening to and adhering to small farmers worldwide who know how to work with nature to produce healthy food, prevent
plant disease and maintain the integrity of the soil, such as through diverse crop production and by saving seeds. Independent family farmers who save
seed? The other major enemy of corporate agribusiness is the millions of independent family farmers throughout the world who save seed. In fact,
throughout the world corporate agribusiness is trying to establish laws that will not allow farmers to save seed that farmers have done since the dawn
of agriculture, some 12,000 to 10,000 years ago. I am sure it seems extraordinary that small independent farmers who save seed are considered the
adversaries of these huge companies, but they are. Corporate agribusiness tries to marginalize independent farmers to have total control of the seed
industry. We allow this at our peril. Soil and climates vary throughout the world. Farmers know this. They thankfully save these traditional seeds to
accommodate to their soil and climate. Our independent farmers worldwide are our “geniuses” rather than the scientists serving at the behest of
corporate agribusiness that try to undermine independent farmers and control them. Nuclear War/Industrial Agriculture and Life’s Basics The impact of
both of these destructive operations (impact of a nuclear war and industrial agriculture) can be divided into four stages: Instantaneous; Near
Immediate; Short Term; Long Term. But first some basics! What
are our primary needs in order to live? We need
food, water, and oxygen. And the quality of the food, water and oxygen we intake are tantamount to the quality of our lives and health
overall. All three of these are presently compromised under industrialized agriculture and would be
as well as a result of a nuclear war. Impacts of Nuclear War Governments have been engaged in politics to prevent a nuclear war since the United
States dropped the atomic bomb on Hiroshima and Nagasaki in 1945. So far, thankfully, this prevention has been successful. In 1995, I visited
Hiroshima, Japan and visited the museum about the atomic bombing and its impact. The sad memories and effects linger. The effects of the atomic
bomb in Japan were devastating. Within the first two to four months of the bombings, the acute effects of the atomic bombings killed 90,000-166,000
people in Hiroshima and 39,000-80,000 in Nagasaki; roughly half of the deaths in each city occurred on the first day. During the following months, large
numbers died from the effect of burns, radiation sickness, and other injuries, compounded by illness and malnutrition (Wikipedia). The bombs dropped
on Hiroshima and Nagasaki had 15 kilotons (Little Boy) and 21 kilotons (kilotons) respectively. After WWII and the subsequent Cold War both the U.S.
and Russia developed far more powerful nuclear bombs that were ultimately detonated. These were the 15,000 kiloton nuclear bomb in the U.S. and
the 50,000 kiloton bomb in Russia that was 3,333 larger than what was dropped on Hiroshima (Visual News). Below is a brief summary of the likely
impacts of a nuclear bomb that in the short and long term catastrophically effect being able to live in the first place on the planet but also our three
basic needs: food, water and oxygen. All three would be compromised at untold levels given the tremendous power of the “advanced” nuclear bombs –
3,333 times larger than the Hiroshima atomic bomb. But below is a scenario from the experts. Instantaneous People in the open where the bomb drops
would be vaporized immediately. Near Immediate 90% of the people in buildings, shelters etc. would be killed immediately due to blast, heat and fires.
Survivors close by the bomb site are another story. “…most of these will suffer from fatal burns, will be blinded, bleeding from glass splinters and will
have suffered massive internal injuries. Various individual fires will combine to produce a fire storm as all the oxygen is consumed….People in
underground shelters who survive the initial heat flash will die as all the oxygen is sucked out of the atmosphere” (The global health effects of nuclear
war). Short Term There would be sizeable radiation fall-out in the surrounding areas. “The effects of exposure to high levels of radioactive fall-out
include hair loss, bleeding from the mouth and gums, internal bleeding and haemorrhagic diarrhoea, gangrenous ulcers, vomiting, fever, delirium and
terminal coma. There is no effective treatment and death follows in a matter of days.” The surrounding water becomes polluted with radioactive
contamination (The global health effects of nuclear war). Long Term There would be dramatic effects on the climate throughout the planet affecting the
ozone layer, rain patterns, unstable temperatures and an enormous impact on food production. “A nuclear conflict involving as few as 100 weapons
could produce long-term damage to the ozone layer, enabling higher than “extreme” levels of ultraviolet radiation to reach the Earth’s surface, new
research indicates (see GSN, March 16, 2010) (NTI). (For more information about oxygen and the ozone layers go to “The global health effects of
nuclear war“.) As the scenario suggests that much of the planet would be impacted in the long term – our soil polluted, our water radiated, our oxygen
compromised through plant loss, “healthy” water loss and ozone protection loss. Impacts of Industrial Agriculture Interestingly enough, the modern 20th
century industrial agriculture started after WWII and it was relative to bombs. Nitrogen had been used for making bombs and after the war it was no
longer needed for this purpose. Here’s more about nitrogen after the war and its use in industrial agriculture: “At the conclusion of World War II the
world’s and United States’ major chemical companies such as Dow, Shell and Du Pont found themselves with huge inventories of nitrogen used for
making bombs during the war. Many of these chemicals and others produced for the war effort were soon packaged for agriculture for use here at
home and as one of the not coincidental cornerstones for the so-called “green-revolution” abroad…. Along with this dramatic increase in chemical
fertilizer and herbicides in the post war decades, there as been an explosion in what the chemical industry euphemistically calls “pesticides” or “plant
food” but which in fact are often highly toxic and deadly chemical poisons” (Krebs). Below is a brief summary of the impacts of industrial agriculture that
in the short and long term catastrophically effect our three basic needs: food, water and oxygen. Instantaneous Relatively soon after the introduction of
contemporary industrial agriculture techniques, such as what Al Krebs referred to above as “pesticides” or “plant food” but which
in fact are often highly toxic and deadly chemical poisons,” we witnessed the loss of soil integrity, our
health being impacted, lower crop yields in some instances and farmer economic dependency on corporate agribusiness. Natural and organic
producers of food will say that what’s most important for growing healthy food is the soil – it’s all in the soil. In the south, the brilliant black agriculturalist
George Washington Carver was a savior in that regard. He taught us that cotton production yields were down because of what cotton production did to
deplete the soil of its minerals. He encouraged a rotation of cotton with legumes (peanuts, soy, etc.) to fix nitrogen in the soil. As Atlanta’s urban farmer
Rashid Nuri will say, “Carver saved the South.” Indeed! By use of chemical laden pesticides and fertilizers, industrial agriculture was immediately
undoing all the wisdom offered from Carver. We’ve gone back to square one! Here’s the difference of plant based vs synthetic-based nitrogen: The
route that nitrogen follows in and out of soil and plants is called the nitrogen cycle….Plants such as beans and other legumes absorb nitrogen from the
air, fix it into their system, and make it available to other plants. Many of sustainable-agriculture companion-planting arrangements are based on
nitrogen-fixing plants… Synthetic nitrogen fertilizer is made from factory-produced ammonia. It is often combined with other synthetic nutrients to create
compound fertilizers. Ammonia fertilizer produces quick growth effects on plants and has a detrimental long-term effect on the soil, plant and animal
ecosystems. The excessive use of synthetic nitrogen fertilizer distorts the natural nitrogen cycle. Rivers in the northeastern United States receive up to
20 times the natural level of nitrogen, and nitrates are the leading source of global air pollution (Bonnyhome). Monsanto’s “Roundup Ready soybean
seeds” became available in 1996. These seeds were genetically modified to resist Roundup. “Roundup” is the name the Monsanto Company called its
product “glyphosate” – an herbicide used to kill weeds. In discussion with an agricultural specialist in the south, who was at first encouraging farmers to
use these seeds, found that in the second and third year crop production, the yield was considerably reduced. The farmer’s overall production was
compromised and the agricultural specialist discouraged the farmer from using the Roundup Ready soybean seeds in the future. As soon became
apparent, what was being attempted was dependency of farmers on the corporate agribusiness companies rather than what might benefit the farmer or
non-farmers as well. It has appeared to be, for all intents and purposes, about greed. Near Immediate Not long after, one of the dramatic impacts of
corporate agribusiness with patented seeds, largely requiring pesticides and/or fertilizer, was, as mentioned, the dependency of farmers on the
agribusiness companies, such as Monsanto. Prior to that, farmers had been relatively independent. Because of this new technology and dependency
on corporations being forced on farmers through laws, insidious incentives and patented seeds, in the U.S. and throughout the world, farmers have
gone into debt in ways they have never before. Never, until the 20th century, have farmers had to be reliant on corporate agribusiness and this has led
to huge numbers of suicides. “In the U.S. the rate of farmer suicides is just under two times that of the general population. In the U.K. one farmer a
week commits suicide. In China, farmers are killing themselves daily to protest the government taking over their prime agricultural lands for
urbanization. In France, a farmer dies by suicide every two days. Australia reports one farmer suicides every four days. India yearly reports more than
17,627 farmer suicides. — (Newsweek 2014)” (Huffington Post). Here is more of a scenario from India: “In the last 20 years, nearly 300,000 farmers
have ended their lives by ingesting pesticides or by hanging themselves. Maharashtra state – with 60,000 farmer suicides – tops the list. The suicide
rate among Indian farmers was 47 percent higher than the national average, according to a 2011 census. Forty-one farmers commit suicide every day,
leaving behind scores of orphans and widows. In a country where agriculture remains the largest employment sector, it contributed only 13.7 percent to
the GDP in 2012-13. Agricultural investment in India is a big gamble. Farmers usually take out bank loans against land to buy seeds and fertilizer, pay
salaries, and acquire irrigation equipment. Local moneylenders often take the place of banks and boost interest rates year after year, creating a debt-
trap for the farmers who rely on crop success – and prayers – for loan repayments” (Al Jazeera). Much of the problem here is also because of the
complicity of government and corporate agribusiness to require huge mono-crop production of grains, soy and corn, etc. As Richard Nixon’s Secretary
of Agriculture Earl Butz said in the 1970’s, “Get large or get out”. As a result of this demand for large-scale corporate agriculture primarily for export
crops, thousands of small farmers were forced off the land. We as a society have been suffering all the more since then! In the meantime, the
increased use of pesticides and fertilizers begins to filter into water tables, rivers and ultimately the ocean, as well, making the water less safe and
healthy. Short Term After
a few years with increased use of fertilizer, herbicides and pesticides, along
with the selling of food laden with these poisons, we have begun to see the deterioration of
the health of the U.S. and world population eating this food. In addition, the likes of scientists linked to
Monsanto and others think they can dominate nature. They can’t. Monsanto’s roundup has been used to kill weeds. However, “Nearly half (49 percent)
of all US farmers surveyed said they have glyphosate-resistant weeds on their farm in 2012, up from 34 percent of farmers in 2011” (Mother Jones).
We are
This has been nature’s response – “superweeds”. This requires, then, a higher concentration of chemicals to address these superweeds.
also witnessing “ superbugs ” developing in response to these chemicals that is also impacting the
beneficial insects such as honeybees and butterflies. We need bees for pollination and we
are witnessing a huge loss of these bee colonies throughout the U.S. and the world. The
health problems resulting from industrial agriculture are immense, and we learn more about this every day. “Pesticides used in the production and
processing of conventionally grown fruit, vegetables, and grains are a significant health concern. Pesticides have been linked to a number of health
problems, including neurologic and psychological problems, cancer, and other diseases. These health risks are borne not only by consumers, but by
farmworkers and communities near industrial farms. Children are especially susceptible to the harmful effects of pesticide residues due to their lower
body mass and higher rates of consumption of affected products. In children, pesticide exposure can cause delayed development; disruptions to the
reproductive, endocrine, and immune systems; cancer; and damage to other organs” (Sustainable Table). Regarding oxygen, as the Union of
“Chemical fertilizers are running off the fields into water systems
Concerned Scientists has wisely noted:
where they generate damaging blooms of oxygen-depleting microorganisms that disrupt
ecosystems and kill fish” (Union of Concerned Scientists). Long Term As stated earlier, industrial agriculture is engaged in a battle
with nature and in some areas, such as water, it has been difficult for nature to strike back at the pollution as in the superweed scenario. Here is an
example of pollution of water that we are now witnessing in the long-term use of the intensification of chemicals in agriculture. “Based on data
submitted by polluting facilities themselves, the group’s report uses information from the EPA’s Toxics Release Inventory for 2012, the most recent
data available. Major findings of the report include: * Our nation’s iconic waterways are still threatened by toxic pollution – with polluters discharging
huge volumes of chemicals into the watersheds of the Great Lakes (8.39 million pounds), the Chesapeake Bay (3.23 million pounds), the Upper
Mississippi River (16.9 million pounds), and the Puget Sound (578,000 pounds) among other beloved waterways. * Tyson Foods Inc. is the parent-
company reporting dumping the largest discharge of toxic chemicals into our waterways, with a total of 18,556,479 lbs – 9 percent of the nationwide
total of toxic discharges. Of the top ten parent-companies by total pounds of toxics released, four are corporate agribusiness companies (Tyson Inc.,
Cargill Inc., Perdue Farms Inc, and Pilgrims Pride Corp.). * Corporate agribusiness facilities, the report also finds, were responsible for approximately
one-third of all direct discharges of nitrates to our waterways, which can cause health problems in infants and contribute to “dead zones” in our waters.
For example, pollution in the Mississippi River watershed has contributed to the massive dead zone in the Gulf of Mexico” (Environment America).
Thanks to industrial agriculture we are also seeing the destruction of rain forests for intensive
crop production and cattle. This also has a dramatic greenhouse gas effect that the world
can ill afford. “Clearing and burning rainforests releases vast amounts of greenhouse gases such as carbon dioxide, methane, ozone and
nitrous oxide into the atmosphere. Each year, deforestation contributes 23-30% of all the carbon dioxide in the atmosphere, according the Rainforest
Action Network. This is more than double the emissions of all the world’s cars and trucks combined. When you save 2.471 acres of rainforest it cleans
humans need to survive being food,
1 ton of CO2 from our air” (Save Your World). At the beginning of this article, I referred to what we
water and oxygen. All of these are being threatened by industrial agriculture. With the current
industrial agriculture model in place, it is not known how long we can go on destroying our natural habitat, our water, pollute our air and continue to
survive on the planet at least with any semblance of good health. Certainly our health will continue to be compromised and all to help corporate
agribusiness raise more money for itself. To observe the health impact of industrial agriculture and other pollutants please examine the map below from
the World Health Organization and witness where most of the cancers are located as of 2012 – largely in the US, Canada, Europe, Australia and New
Zealand. And the west thinks it has a superior system that it wants the rest of the world to emulate? They, the western government and corporate
leaders, must be fools! Summary Atlanta urban farmer Rashid Nuri says regarding the current trends, “Mother earth will be fine, it doesn’t need us
humans. It’s been here for millions of years. The problem is that we won’t be able to live on it because we will have destroyed the environmental
nuclear war would be and industrial agriculture
conditions on the planet we humans need in order to live.” As stated above,
is catastrophic for our continued, as well as a possible “healthy”, existence on the planet by compromising our food,
water and oxygen we humans need in order to live. Yet, in spite of all, the efforts over time are focused on preventing
nuclear wars, which is important of course, but it needs to include ending the detrimental practice of
industrial agriculture – and in the above I have just touched the surface.
India might use nuclear weapons first directly contradicts the key pillar of Indian nuclear
thinking since the publication of its official nuclear doctrine in 2003: a no first-use policy . Successive prime ministers —
including Narendra Modi , not exactly a dove — have affirmed this. Indeed, a major revision of India’s
public doctrine will fly in the face of its long history as a reluctant nuclear power. On the other
hand, the evidence Narang marshals to support this astounding claim is scant and centers
around a couple of paragraphs from a book by a former Indian national security advisor
Shivshankar Menon who retired three years ago, before Modi came to power. Despite Narang’s claims, we still do
not have sufficient evidence that India has reversed its no first-use policy or — for that matter — any
other major tenets in its public nuclear doctrine. Indeed, at a time when there are growing calls inside India to revisit its nuclear doctrine, it
is worth keeping in mind that India’s doctrine already allows considerable space for innovation. As Menon put it to a journalist, “India’s nuclear doctrine has far greater flexibility
than it gets credit for.” In other words, India’s extant doctrine can absorb the consequences of future Pakistan-related contingencies without any major changes. Restraint and
Resolve in India’s Nuclear Doctrine India’s nuclear weapons strategy is simple. By relying on a minimal arsenal for deterrence, India offers a credible threat of a massive
retaliation against an adversary that strikes first with nuclear weapons. India’s commitment to nuclear deterrence (as opposed to compellence, the other tool of strategic
coercion) rules out threats of nuclear use to shift the course of a conventional conflict. Indeed, India’s a no first-use stance should be read as a pledge to not use nuclear
compellence as an instrument of statecraft. India’s nuclear arsenal is as small as it can be to make the threat of a massive retaliation as credible as possible. As such, the size
of the arsenal will vary with time depending on the requirements of credibility, a fact that was emphasized by a former Indian foreign minister. What makes a deterrent strategy
effective? It is, argues the Nobel-winning game theorist Roger Myerson, a combination of “restraint” and “resolve” in pursuing the same. Following Thomas Schelling, Myerson
defines restraint as a “reputational commitment to act cooperatively” in pursuit of a deterrent strategy. Resolve, for Myerson àpres Schelling, is a similar commitment, but to act
aggressively when deterrence demands it. India’s public doctrine — in what it says and what it does not — seeks to do both. It is a statement of restraint in two ways. First, it
conveys the impression that India is a responsible nuclear power with a public pledge to not use nuclear weapons first. Second, by explicitly laying down India’s nuclear red-
lines coupled to its no first-use pledge, India effectively promises any adversary that it will cooperate in terms of not using nuclear weapons first — as long as the adversary too
chooses to do the same by not crossing those redlines. But the doctrine is also a statement of resolve in that it deliberately does not spell out what follows deterrence failure
beyond a promise of some kind of massive retaliation. Regarding the targets of such a retaliation, India’s public nuclear doctrine is ambiguous. If India leaves out the exact
details of its retaliatory response, potential adversaries will imagine the “worst” possible outcome. Taking Pakistan as an example of an adversary, what “worst” means in
Islamabad’s mind alone and could change during the course of a conflict. Indeed, both India and Pakistan may have different conceptions of what the latter values the most, and
hence wants to protect. For example, India might think Pakistan values its population centers the most, but Islamabad may in fact value its “crown jewels” more. Therefore, if
India was to keep its retaliatory responses ambiguous beyond the fact that there will be a massive response, its commitment to act aggressively — India’s resolve — will be
enhanced in Pakistan’s mind, irrespective of whether India has any intention of doing what Pakistan thinks it would. Indeed, as Lawrence Freedman put it, “To Schelling the
value of nuclear weapons lay in the persuasive threat they posed to an adversary, even if little of value could accrue to oneself by implementing this threat.” What matters is that
Pakistan now has to consider a range of retaliatory responses from India. On the other hand, if India was to promise Pakistan a fixed response, but Pakistani leaders did not
believe it, Islamabad may be tempted to ignore India’s threats of what follows should deterrence break down. “Massive” Retaliation or “Massive Retaliation”? Narang’s claim that
India’s no first-use posture may be eroding follows from his interpretation of a recent book by a highly-respected former Indian national security advisor Shivshankar Menon. It
that capacity, Menon was a member of the executive council of the Nuclear Command Authority, the highest non-political body that supervises India’s nuclear weapons and their
potential deployment. As such, he must have been privy to India’s choice of second-use targets should deterrence fail. In Choices: Inside the Making of India’s Foreign Policy,
Menon devotes a chapter to India’s nuclear weapons doctrine and posture. The general thrust
of his argument becomes clear from the title of that chapter alone: “ Why India pledges no first
use of nuclear weapons .” He indeed goes to justify and defend the thinking behind a no first-
use pledge, and the foreign policy circumstances that shaped it. The passage that caught Narang’s attention lies a few
pages into the chapter: What would be credible would be the message India conveyed by how it configures its forces. If Pakistan were to use tactical nuclear
weapons against India, even against Indian forces in Pakistan, it would effectively be opening the door to a massive Indian first strike, having crossed India’s declared red lines.
There would be little incentive, once Pakistan had taken hostilities to the nuclear level, for India to limit its response, since that would only invite further escalation by Pakistan.
India would hardly risk giving Pakistan the chance to carry out a massive nuclear strike after the Indian response to Pakistan using tactical nuclear weapons. In other words,
His use of the phrase
Pakistani tactical nuclear weapons use would effectively free India to undertake a comprehensive first strike against Pakistan.
“comprehensive first strike” is indeed striking (forgive the pun). A first strike in nuclear strategy means something very specific: a disarming
nuclear weapons attack that severely degrades the adversary’s ability to retaliate with the same. In other words, a comprehensive first-strike is a “counter-force” strategy aimed
about a second strike , the first being Pakistan using a tactical nuclear weapon against Indian
forces. So why the use of the word “first”? One explanation is that this is a problem with how one counts attacks and
counter-attacks. If you do not count the hypothetical tactical nuclear weapons use by Pakistan
that marks deterrence breakdown as first-use, and instead focus on a possible Pakistani
response to an Indian massive retaliation, then this a scenario with two steps: India’s retaliation
and Pakistan’s (possible) counter-retaliation. If you do count the tactical nuclear attack as a first use, then your deterrence calculations
should factor the possibility of a third use of nuclear weapons by the adversary, as Menon says it must.