Encrypting smartphones and other tech products will help protect against malicious hacking, identity theft,
However, a government mandate requiring companies to
build a backdoor through encryption to facilitate surveillance would put
consumers at grave risk and impose heavy costs on US businesses. The government
can obtain information for investigations from other sources and may be able to
compel an individual to decrypt information with a search warrant.
phone theft, and other crimes.
And if Bullrun expands beyond domestic bullrun if you look at our plan text, we
only curtail the domestic components
1.
Standards:
No in round abuse. The negative cannot point to any actual in-round abuse, so
they have not been hurt in the round.
2.
3.
Education: Having a wider range of cases provides better education for students
involved because we learn more about more ideas.
The aff is reasonable: The topic is the subject of the discussion, but does not
control it. The aff is the team that speaks first and alst, not the one who
advacated for the resolution. We are a discussion of that topic
They say they lose circumvention, they run, the are hypocrites, disregard T.
Case
Impact Grids
The grid is venerable to cyber terrorism Old
infrastructure
Gertz, National Security Columnist for the Washington
Times, 14 (Bill Gertz, 4-16-2014, "Inside the Ring: U.S. power grid defenseless
from attacks," Washingtion Times,
http://www.washingtontimes.com/news/2014/apr/16/inside-the-ring-us-power-griddefenseless-from-att/?page=all //NK)
The U.S. electrical power grid is vulnerable to cyber and physical attacks that could
cause devastating disruptions throughout the country , federal and industry officials told
Congress recently. Gerry Cauley, president of the North American Electric Reliability Corp., said that several if
not all other critical U.S. infrastructures depend on electricity, and that he is
deeply concerned about attacks, extreme weather and equipment failures causing power outages. I
am most concerned about coordinated physical and cyber attacks intended to
disable elements of the power grid or deny electricity to specific targets, such as government or
business centers, military installations, or other infrastructures, Mr. Cauley told the Senate
Energy and Natural Resources Committee last Thursday. Mr. Cauley said the April 2013 attack on a
California electrical power substation by unidentified gunmen did not result in power
outages, but highlighted the vulnerability of the countrys three-sector power grid.
The incident at the Metcalf substation in Northern California demonstrates that attacks are possible and have the
potential to cause significant damage to assets and disrupt customer service, he said. Cheryl A. LaFleur, acting
chairman of the Federal Energy Regulatory Commission who testified at the Senate hearing, said the Metcalf attack
led federal authorities to conduct a 13-city campaign to warn utilities about the need for better security. Ms. LaFleur
said cyber threats to electrical infrastructure are fast-changing, as she called for better
information-sharing about threats between government and industry. Sue Kelly, head of the American Public Power
of more than 2,000 U.S. electric utilities, testified about the growing danger
of cyberattacks against the power grid. The threat of cyberattack is relatively new compared to
long-known physical threats, but an attack with operational consequences could occur and cause disruptions in
the flow of power if malicious actors are able to hack into the data and control
systems used to operate our electric generation and transmission infrastructure , Ms.
Association
Kelly said. To date, security measures have prevented a successful cyberattack on the bulk electric system, she
Scenarios and Impact Analyses was published in September by the National Electric Sector Cybersecurity
Organization Resource, a non-government group of industry and security specialists .
A malicious software
cyberattack on the power grids Distributed Energy Resource Management System (DERMS), which
manages requests and commands for the power system, would damage transformers that are
costly and difficult to replace. Cyberattacks against computers that distribute electrical power over wide
areas could be jammed or disrupted through wireless signals. And cyber attackers could cause
widespread power outages or cascading power failures by gaining access to
distribution systems and equipment via remote hacking . After gaining the required access, the
threat agent manufactures an artificial cascade through sequential tripping of select critical feeders and
components, causing automated tripping of generation sources due to power and voltage fluctuations, the report
Lashkar-e-Taibi, and the Palestinian group Hamas. Domestic threats include lone
wolf extremists, ecoterrorists among Earth First and Greenpeace, U.S. separatist
groups, and militias and hate groups, the report said.
Nuclear War
Lawson, Associate Professor in the Department of
Communication at the University of Utah, 9 (Sean Lawson, 5-132009, "Cross-Domain Response to Cyber Attacks and the Threat of Conflict
Escalation," Sean Lawson, http://www.seanlawson.net/?p=477 //NK)
At a time when it seems impossible to avoid the seemingly growing hysteria over
the threat of cyber war,[1] network security expert Marcus Ranum delivered a
refreshing talk recently, The Problem with Cyber War, that took a critical look at a
number of the assumptions underlying contemporary cybersecurity discourse in the
United States. He addressed one issue in partiuclar that I would like to riff on here, the issue of conflict
escalationi.e. the possibility that offensive use of cyber attacks could escalate to
the use of physical force. As I will show, his concerns are entirely legitimate as current U.S. military cyber
doctrine assumes the possibility of what I call cross-domain responses to cyberattacks. Backing Your Adversary
(Mentally) into a Corner Based on the premise that completely blinding a potential adversary is a good indicator to
that adversary that an attack is iminent, Ranum has argued that The
warfare helps in its own right to blur the online/offline, physical-space/cyberspace boundary. But thinking logically
about the potential consequences of this framing leads to some disconcerting conclusions. If cyberspace is a
domain of warfare, then it becomes possible to define cyber attacks (whatever those may be said to entail) as
But what happens if the U.S. is attacked in any of the other domains? It
retaliates. But it usually does not respond only within the domain in which it was
attacked. Rather, responses are typically cross-domain responsesi.e. a massive
bombing on U.S. soil or vital U.S. interests abroad (e.g. think 9/11 or Pearl Harbor)
might lead to air strikes against the attacker. Even more likely given a U.S. military
way of warfare that emphasizes multidimensional, joint operations is a massive
conventional (i.e. non-nuclear) response against the attacker in all domains (air,
land, sea, space), simultaneously. The possibility of kinetic action in response to cyber attack, or as
acts of war.
part of offensive U.S. cyber operations, is part of the current (2006) National Military Strategy for Cyberspace
Of course, the possibility that a cyber attack on the U.S. could lead to a
U.S. nuclear reply constitutes possibly the ultimate in cross-domain response. And
while this may seem far fetched, it has not been ruled out by U.S. defense policy
makers and is, in fact, implied in current U.S. defense policy documents. From the
National Military Strategy of the United States (2004): The term WMD/E relates to a broad
Operations [5]:
range of adversary capabilities that pose potentially devastating impacts. WMD/E includes chemical, biological,
radiological, nuclear, and enhanced high explosive weapons as well as other, more asymmetrical weapons. They
may rely more on disruptive impact than destructive kinetic effects. For example, cyber attacks on US commercial
information systems or attacks against transportation networks may have a greater economic or psychological
effect than a relatively small release of a lethal agent. [6] The authors of a 2009 National Academies of Science
report on cyberwarfare respond to this by saying, Coupled
AT: Security
States are the key actors who solve violence plan accesses
this best.
Weingast 9 (Barry, senior fellow at the Hoover Institution and \Professor in the
Department of Political Science at Stanford U, Why are developing countries so
resistant to the rule of law, February 2009, accessed 7/10/09,
http://cadmus.eui.eu/dspace/bitstream/1814/11173/1/MWP_LS_2009_02.pdf )
All states must control the fundamental problem of violence. In natural states,
a dominant coalition of the powerful emerges to solve this problem. The coalition
grants members privileges, creates rents through limited access to valuable resources
and organizations, and then uses the rents to sustain order. Because fighting reduces
their rents, coalition members have incentives not to fight so as to maintain their
rents. Natural states necessarily limit access to organizations and restrict competition in
all systems. Failing to do so dissipate rents and therefore reduces the incentives not to
fight. We call this order the natural state because for nearly all of the last 10,000
years of human history indeed, until just the last two centuries the natural state
was the only solution to the problem of violence that produced a hierarchical
society with significant wealth. In comparison with the previous foraging order,
natural states produced impressive economic growth, and even today we can see the
impressive wealth amassed by many of the early civilizations. In contrast to open access
orders, however, natural states have significant, negative consequences for economic
growth.
Perm Do both
And
this sense become part of the ideological trappings which have helped foster the
linking together of security and liberal development policies by many Western
states and which at their most pernicious have become a cover and support for neoimperialist policies of military intervention in the developing world (Christie, 2010;
Duffield, 2007; Newman, 2010). As such, some scholarship which directly articulates
a vision of the good regarding security (such as human security) falls outside
reasonable limits of the critical security studies project, while some approaches
within this project (most notably critical constructivism and post-structuralism)
appear reluctant to articulate even a notion of progress regarding security. Despite
the unwillingness of the latter to articulate an explicit conception of progress , such a
conception is evident in the expressed commitment to opening up space for
communities to articulate alternative visions of security in the case of critical
constructivism, or in the commitment to resist the logic of security altogether in the
case of post-structuralism. The latter also largely applies to the Copenhagen
Schools commitment to desecuritization, a point we will return to later. In these
senses, we can indeed talk about engagement with the ethics of security as a core
component of a critical security studies project, even while such engagement has
oriented towards more pragmatic visions of progress than foundational claims
regarding the constitution of the good.
process that associates largely without single critical moments of decision.7 Decisions are taken all the time, but
they are dispersed, and it is relatively difficult to assign critically significant actions to particular actors or to
aggregate sets of actions into a limited group of actors who have the capacity to create an assemblage of security .
speech acts of security to concepts and methodologies that facilitate studying practices and processes of dispersed
associating. From the perspective of speech acts, this associating will mostly look unspectacular, unexceptional,
continuous and repetitive; instead of speech acts, we get the securitizing work of a multiplicity of little security
nothings. To briefly illustrate the shift in perspective that is implied here, let us re-read Daniel Neylands (2009)
example of how letters, as everyday objects, are transformed into an object of danger.8 In his analysis of mundane
terror, Neyland mentions a webpage on letter bombs that the British security service MI5 had temporarily set up.
The website was one device through which MI5 was securitizing letters. In setting out what a letter bomb is, how to
recognize a suspicious letter, how to deal with it, MI5 appropriated a mundane object in a securitizing process. The
letter bomb is not simply appropriated by a security agency, however. It also stands for a whole set of banal, little
connections (e.g. postal delivery, postal sorting, explosive or incendiary substances, posting, unusual place of
origin, couriers, recipients, the place of origin of the sender, police). Interpreting the website as an action by MI5 to
securitize letters by setting out a set of criteria and guidelines would focus attention on the gravitational force of
this moment and somehow disconnect it from the network of connections in which the website operates as a
mediator. Taking the website as a mediating device connecting things and people among whom suspicion of letters
might or might not already circulate would draw attention immediately to the diffuse associating that is taking
place. The website can be the starting point of the analysis, but it remains one particular thing and moment in a set
of connections and mediations that took place simultaneously, before and after. In the end, the analytics places the
website not as a securitizing moment with critical gravity that is, a moment in which one had a non-security
situation before and a security situation after but as one of several relatively small moments and actions that
invest insecurity in everyday objects and relations .
processes of securitizing challenge the boundary between security practice and daily life. The letters move through
a wide set of banal relations. Many surveillance practices can be read in a similar way. They are often strongly
embedded in everyday actions and relations, thus coming across as routine and banal, a banality that is reinforced
by the strong technological mediation of data and practice. Writing algorithms is central to the functioning of data
mining. Introducing loyalty cards to track consumption patterns, promoting credit-card payments as the obvious
form of payment thus making it possible to profile cash payments as suspicious, and developing many other datagathering devices are central to turning transactional traces into insecurity profiles. Many of these practices come
about in piecemeal fashion, slip into daily life without much ado and, when connected to the rendition and dispersal
of risks, precaution and control of dangers, fade out the distinction between the everyday and security practice.
The governing of sites and lives through risk calculation, for example, often
operates in diverse areas of life, meshing policing with insurance practice, business
etc.9 In these securitizing processes, daily life as a realm upon which security
Risk management,
surveillance and precautionary methods work within daily life, as much as upon it.
Credit cards, CCTV, filling in forms for a myriad of services, monitoring workers, consumer data, advertising that
sustains precautionary dispositions and products associated with risks (e.g. fertilizers) intertwine profiling, control
between the everyday and the exceptional challenges the notion of exceptionalist rupture that is embedded in the
speech act of security. The concept of rupture draws attention to a fixed frame of reference, a given order that has
been able to aggregate a multiplicity of practices, subjects and objects into a whole, expressing a particular
rationale. The rupture is an event that demonstrates the existence of order and its limits by breaking the habitual.
In exceptionalist readings of rupture, power consists in the capacity and practice of aggregating and fixing
multiplicity into a global practice and in the capacity to disrupt the aggregation so as to make new aggregations
possible.
Yet, decisional speech acts and ruptures lose much of their critical
significance in a securitizing process that creates insecurities mainly through
dispersing, through continuously associating, reassociating, tweaking and
experimenting with materials, procedures, regulations, etc. The scene of securitizing is then
not one of expressing or disrupting a given order but of creating things, meanings, subjects in habitual, everyday
innovation in meetings, discussions, regulations, programming, etc. Power is then to be understood as infinitesimal
mediations, as little nothings, dispersed in a continuously developing security bricolage that takes place in practices
of sketching, trials, meetings, regulations, etc. (Latour, 2005). Exceptional rupture gives way to innovations and
controversies that are worked in dispersed sites and habitual every day, ordinary practices of associating.11 In
relation to such processes, decisional speech acts with gravitas have at best limited analytical relevance and at
worst misconstrue the analysis by assigning excessive significance to actions that have limited power that are
themselves simply another little security nothings.
insist that verification and falsification are never conclusive, especially in social sciences. So critical testing of
theories and alleged universal laws need to be carried out continuously. A more detailed description of critical
realism, which is now a growing movement transforming the intellectual scene.
state structures, indeed no effective political structures at all in such places except
for some kind of reversion to warlordism, tribalism or gangsterism, or combinations
thereof. In some places this is already the case, and it would not surprise me to see
this phenomenon spread so that one had a part of the world which was very highly
organised, post-modern perhaps, parts of the world which had politically collapsed
and then bits in-between like China, India - the so-called modern developing world.
It is not quite clear to me what is going to happen to these latter states. They have
a really tough game to play. Looking ahead a bit further and trying to wear David's
hat a bit more, I can imagine a world in which there might be no states at all in the
sense that we now understand them. However, one could still wear a realist hat and
say well, all right, we might be in the post-state world, but there will still be plenty
of power politics around. It may be pluralist, it may be democratic, it may be
structured in all kinds of odd ways, but the logic of power politics will go on and to
that extent the realist tradition will remain intact.
Agamben K
Alt fails The structured resistance to biopolitics
recommended by Agamben and his migration studies followers
portray fails to fundamentally alter the structured materiality
of modern liberal juridical order.
Lee 2010 [Charles, Bare Life, Interstices, and the Third Spaces of Citizenship,
Womens Studies Quarterly, 38.1/2]
Agambens transhistorical call notwithstanding, to what extent is the space of camp
(and by implication, the largely suppressed agency of bare life caught within the camp)
an adequate depiction of the social condition of undocumented migrants? Examining
the workspace of private households where female migrants work as domestic workers
and where labor laws and regulations are indefinitely suspended, in this essay I argue
that, while these laboring spaces relate to camp as the undocumented workers are
stripped of juridico-political rights and reduced to a state of exploited bare life, the con
ception of camp lacks a dynamic account of power relations to address the complex
agency of migrant subjects as they negotiate their daily workspace. Significantly, what
begins for Agamben as a space of interstitiality posited in campa zone between life
and death, inside and outsideultimately slides into an immobile binary between the
political beings of citizens and the excluded bodies of bare life. Yet if the space of
camp is interstitial in nature, what preempts the possibility of the abject
manifesting an agency that is also interstitial in character? If the sovereign
power occupies a space that is simultaneously inside and outside the
juridical order, so does the undocumented in navigating a terrain of
resistance/negotiation inside and outside the normative arrangement of
citizenship. As I will argue, this negotiated resistance does not
fundamentally alter the structured materiality of modern liberal juridical
order and the political economy of irregular migration that Agamben and his
migration studies followers so powerfully portray. However, at the point
when Agamben declares the death of citizenship life for the bare subjects ,
he omits a crucial spectrum of ambiguous and interstitial practices mounted
by the abjectmediating between the two extreme ends of political and
nonpoliticalthat actually extends and reanimates the life of citizenship
from the very margins of abjection.
difficulty is that international policy regarding intervention and statebuilding seems to have little transformative
aspiration: far from assumptions of liberal universalism, it would appear that, with the failure of post-colonial
development, especially from the 1970s onwards, international policymakers have developed historically low
expectations about what can be achieved through external intervention and assistance. The lack of transformative
belief is highlighted by one of the key concerns of the policy critics of the liberal peace the focus on capacity-
considered problematic in terms of the dangers of exclusion and extremism. Todays illiberal peace approaches
do not argue for the export of democracy the freeing up of the political sphere on the basis of support for popular
autonomy. The language of illiberal institutionalist approaches is that of democratisation: the problematisation of
the liberal subject, held to be incapable of moral, rational choices at the ballot box, unless tutored by international
experts concerned to promote civil society and pluralist values. In these frameworks, the holding of elections
serves as an examination of the population and the behaviour of electoral candidates, rather than as a process for
the judgement or construction of policy (which it is assumed needs external or international frameworks for its
was held that civil society was necessary to ensure that the population learnt civic values to make democracy
as their radical and policy critics have claimed.41 Rather than attempting
to transform non-Western societies into the liberal self-image of the
West, it would appear that external interveners have had much more
status quo aspirations, concerned with regulatory stability and regional
and domestic security, rather than transformation. Rather than imposing
or exporting alleged liberal Western models, international policy making
has revolved around the promotion of regulatory and administrative
measures which suggest the problems are not the lack of markets or
democracy but rather the culture of society or the mechanisms of
governance. Rather than promoting democracy and liberal freedoms, the discussion has been
how to keep the lid on or to manage the complexity of non-Western societies,
usually perceived in terms of fixed ethnic and regional divisions. The solution to the complexity
of the non-liberal state and society has been the internationalisation of the
mechanisms of governance, removing substantive autonomy rather than
promoting it. While it is true that the reconstruction or rebuilding of states is at the centre of external
projects of intervention, it would be wrong to see the project of statebuilding as
one which aimed at the construction of a liberal international order.42 This is
not just because external statebuilding would be understood as a
contradiction in liberal terms but, more importantly, because the states
being constructed in these projects of post-conict and failed state
intervention are not liberal states in the sense of having selfdetermination and political autonomy. The state at the centre of
statebuilding is not the Westphalian state of classical International Relations (IR)
theorising. Under the internationalised regulatory mechanisms of intervention and statebuilding the state is
increasingly reduced to an administrative level, in which sovereignty no
longer marks a clear boundary line between the inside and the
outside.43 Whether we consider European Union (EU) statebuilding, explicitly based on a sharing of
sovereignty, or consider other statebuilding interventions, such as those by the international financial institutions
If the perm cant overcome the single instance of the plan then
there is not way that it can overcome the entirety of the squo
and cant access impacts
hides the fundamental break down of the dialectic between law and anomie that
has been central to modern politics (Agamben 2003:144148). Rather these
debates insert questions of and challenges to the role of law and generalized normsetting in highly charged biopolitical governance of insecurities. Instead of
collapsing the dialectic between law and anomie, contestation of the protection of
civil liberties, demands for re-negotiating balances between liberties and security
are neither simply to be taken at face value as a matter of the necessity of
balancing and rebalancing nor to be seen as the endgame of the validity of legal
mediations of politics and life. Rather they open up a need to revisit the particular
kind of work that law does and does not do in specific sites (Neocleous 2006), such
as camps, and what the practices possibly tell us about if and how the dialectic
between law and anomie operates in biopolitical governance . Fleur Johnss analysis
of the camp in Guantanamo Bay is one such example (Johns 2005). She argues that
the camp is penetrated by a form of norm setting, thus implying that a dialectic
between norms and anomie, political transgression and law is not absent from the
organization and governing practice in the camp. Unlike some other analyses that
focus on constitutional transgressions and battles in the constitutional courts, Johns
emphasizes the importance for biopolitical governance of the detailed and in a
sense banal regulations that seek to structure the everyday practices of the guards,
the administrators and the prisoners. The norm setting is thus not primarily
constitutional but administrative. The important point for this essay is that analyses
like Fleur Johns unpack the contemporary predicaments and political stakes in a
site like Guantanamo Bay by taking the practices and governmental technologies at
face value and interpret the specific work they do for making camps possible within
democratic polities. The understanding of the camp transfigures from an absolute
limit that defines the fundamental nature of modern politics to a phenomenon that
is constituted and contested by various banal practices and governmental
techniques. The question becomes how these practices and sites we call camps are
rendered within and through modern democratic governance in a biopolitical age.
Such an approach does not read the nature of politics off of its limits but through
the multiple relations that are shaped by means of objectified mediations and the
struggles over them.
Executive CP
The executive branch is not fit to oversee the NSA
empirics prove theyll abuse that power
Sugiyama, University of Michigan Law school J.D, Perry,
managing editor of Michigan Journal of Law, 06
(Tara, Maria, Fall 2006, Michigan Journal of Law, THE NSA DOMESTIC SURVEILLANCE
PROGRAM: AN ANALYSIS OF CONGRESSIONAL OVERSIGHT DURING AN ERA OF ONEPARTY RULE, Lexis, 6/26/15, YA)
On December 16, 2005, the New York Times sounded a fire alarm when it revealed
that, in response to the September 11, 2001 attacks, President George W. Bush had
issued a secret executive order permitting the National Security Agency (NSA) to conduct
warrantless surveillance on individuals within the United States to unearth nascent
terrorist activity. The executive order purportedly authorized the NSA to monitor
the telephone and email messages of tens of millions of unsuspecting individuals in
its effort to track down links to Al Qaeda. Almost immediately, [*150] various interest
n1
n2
n3
n4
groups began to question the constitutionality of the NSA domestic surveillance program and to challenge whether
the scope of the program violates the Foreign Intelligence Surveillance Act of 1978 (FISA). n5
In response to the September 11th attacks , President Bush relied on the unitary
executive theory to challenge congressional attempts to limit the scope of his
authority. n69 Vice President Dick Cheney also voiced support for a strong unitary
executive, lamenting that "over the years there had been an erosion of presidential
power and authority." n70 In Cheney's view, "the president of the United States needs
to have his constitutional powers unimpaired, if you will, in terms of the conduct of
national security policy." n71 As part of its strategy of presenting a unified front among the executive
branch agencies and departments, the administration used the tactic of framing the debate around the NSA
program in terms of national security. n72 To win public support, President Bush's Chief Political Adviser Karl Rove
used simple language and preyed on fear to garner support for the program: "Let me be as clear as I [*160] can be:
President Bush believes if Al Qaeda is calling somebody in America, it is in our national security interest to know
who they're calling and why... . Some important Democrats clearly disagree." n73 The White House calculated that
few Americans would question the legality of the NSA program if the administration made clear that the program
was designed to protect them from terrorists. n74 Having established a plan of action, in late December 2005
President Bush used the White House as a platform to begin the executive branch's assault on rising congressional
unease with the NSA program. n75 He explained in straightforward terms that the Constitution granted him
inherent authority to conduct the program. n76 Continuing to carry out the President's message, the DOJ in a
December 22, 2005 letter n77 followed suit by formally providing congressional leaders on the intelligence
committees a preview of the legal authorities it identified as supporting the program: (1) Article II, Section 2 or the
Commander in Chief Clause, n78 and (2) the Authorization for the Use of Military Force (AUMF) Statute. n79
Additionally, the DOJ stressed that the administration continued to use FISA as "a very important tool" in addressing
the terrorist threat. n80 After a short reprieve during the December holidays, in the New Year the executive branch
resumed its defense of the program as well as its resistance to congressional inquiry into the domestic surveillance
program. Both DOJ Inspector General Glenn A. Fine and [*161] Department of Defense (DOD) Acting Inspector
General Thomas F. Gimble denied the request of Democrats to investigate the activities by the NSA. n81 The NSA
also articulated its legal justification for the program, explaining that former head of the NSA General Michael V.
Hayden had relied on Reagan-era Executive Order 12333 n82 as authority to run the intelligence program until
President Bush signed his own executive order in 2002 n83 specifically permitting the agency to eavesdrop without
warrants on the communications of individuals inside the United States whom the agency believed had links to
later the executive branch once again presented a unified front when the DOJ released a forty-two page legal
analysis report in support of the NSA domestic surveillance program. n88 Challenging the findings of a [*162]
Congressional Research Service (CRS) report, which concluded that the President's authority to carry out the NSA
program may represent the "lowest ebb" n89 of presidential powers, n90 the DOJ sought to reframe the argument.
n91 The DOJ's analysis placed the President at "the zenith" n92 of his powers when he authorized the NSA domestic
surveillance program. n93 In furtherance of bolstering the executive branch against outside pressures, Vice
President Cheney also went on record to gain public support, stating that the program is "critical to the national
security of the United States." n94 To garner key support within Congress, he also gave a closed-door briefing to a
"Gang of Eight" n95 congressional leaders. n96 Even as Chairman of the Judiciary Committee Senator Arlen Specter
(R-PA) prepared to hold the first Senate hearings on the NSA program, in early February 2006, Central Intelligence
Agency (CIA) Director Porter J. Goss and Director of National Intelligence John D. Negroponte made one last effort to
shift the focus away [*163] from the impending hearings. n97 Framing the need for the NSA program in terms of
national security, Goss denounced the leaks of the program, stating that they had caused severe damage to CIA
operations and expressed the desire for a grand jury inquiry. n98 At the Senate hearing on the NSA program
conducted on February 6, 2006, Attorney General Gonzales largely dismissed efforts by senators to urge the
executive branch to engage Congress and the judiciary in oversight of the program. n99 Instead, Gonzales
maintained that the President had legal authority to act as he had, and remained evasive when asked pointed
questions about the program. n100 Even when told by Republican senators that they had not intended to authorize
the President to conduct warrantless domestic surveillance with AUMF, Gonzales responded that, regardless of the
senators' intentions, the written letter of AUMF nonetheless supported the President's actions. n101 The White
House only engaged Congress in minimal oversight after Chairwoman of the House Intelligence Subcommittee on
Technical and Tactical Intelligence Heather A. Wilson called on the intelligence committees of both Houses to
conduct full investigations into the program. n102 The following day on February 8, 2006, the White House provided
a closed-door briefing for the full House Intelligence Committee and announced that it would brief the Senate
Intelligence Committee the next day. n103 In addition to providing briefings to the intelligence committees, the
administration also announced that the DOJ's Office of Professional Responsibility had started a formal inquiry of
internal dissension over the legal foundation of the program within the department. n104 The investigation was
Senator Specter, attempting to clarify his testimony from the February 6th hearing. n111 He continued to dispute
the contention that warrantless surveillance violates statutes of the United States, and assured Senator Specter
that despite the existence of "inadvertent mistakes," there was "intense oversight both within the NSA and outside
In early March 2006, the Bush administration again skirted the issue
of any purported illegality on its own part and instead refocused the issue on
possible criminal wrongdoing by those officials who had reported the classified NSA
program to the media. n113 Accordingly, the administration launched FBI probes, conducted a polygraph
that agency... ." n112
investigation inside the CIA, and issued warnings from [*165] the DOJ, all in an effort to discourage government
employees from serving as media sources. n114
You can extend Kayyali 5/13 and Castro 15 from the 1AC that
says congress is the only branch capable of truly ending NSA
surveillance with backdoors through Bullrun. Their legislation
is key.
Theory: By running a topical CP, they are forcing the aff to argue against the
resolution. It is well established in debate that the aff debates for the resolution,
and the neg against. They skew aff ground by making us argue ourselves. Flow the
CP aff for fairness.
wrongdoing. It is time to end the dragnet and to affirm that we can keep our
nation secure without trampling on and abandoning Americans' constitutional
rights. For years, in both statements to the public and open testimony before the House and Senate, senior
government officials claimed that domestic surveillance was narrow in focus and limited in scope. But in June 2013,
Americans learned through leaked classified documents that these claims bore little resemblance to reality. In fact,
the NSA has been relying on a secret interpretation of the USA Patriot Act to
vacuum up the phone records of millions of law-abiding citizens. Under a separate program,
intelligence agencies are using a loophole in the law to read some Americans' emails without ever getting a
warrant. Dragnet surveillance was approved by a secret court that normally hears only the government's side of
major cases. It had been debated only in a few secret congressional committee hearings, and
many members
of Congress were entirely unaware it. When laws like the Patriot Act were reauthorized, a vocal
minority of senators and representatives including the three of us objected, but the secrecy
surrounding these programs made it difficult to mobilize public support. And yet, it was
inevitable that mass surveillance and warrantless searches would eventually be exposed. When the plain text of the
law differs so dramatically from how it is interpreted and applied, in effect creating a body of secret law, it simply
isn't sustainable. So when the programs' existence became public last summer, huge numbers of Americans were
justifiably stunned and angry at how they had been misled and by the degree to which their privacy rights had been
routinely violated. Inflated claims about the program's value have burst under public scrutiny, and there is now a
debate over exactly what reforms should be made is likely to continue for at least the next few years as Americans
As an initial step, we
have worked with our colleagues in the House and Senate to build support for a
package of real and meaningful changes to the law that would promote the
restoration of Americans' constitutional rights and freedoms, while protecting
national security. This package of reforms includes overhauling domestic
surveillance laws to ban the bulk collection of Americans' personal information, and closing the loophole that
allows intelligence agencies to deliberately read Americans' emails without a warrant. It includes reshaping
the Foreign Intelligence Surveillance Court by installing an advocate who can argue for Americans'
continue to learn about the scale of ongoing government surveillance activities.
constitutional rights when the court is considering major cases, and by requiring that significant interpretations of
U.S. law and the Constitution be made public. And it would strengthen and clarify the government's authority to
Representatives' recent vote to approve a revised version of the USA Freedom Act, with nearly all of the essential
would require the government to use a "selection term" to secretly collect records, but the definition of "selection
term" is left vague enough that it could be used to collect all of the phone records in a particular area code or all of
the credit card records from a particular state. Meanwhile, the bill abandons nearly all of the other reforms
contained in the Senate version of the USA Freedom Act, while renewing controversial provisions of the Patriot Act
we will
vigorously oppose this bill in its current form and continue to push for real changes
to the law. This firm commitment to both liberty and security is what Americans
including the dedicated men and women who work at our nation's intelligence
agencies deserve. We will not settle for less .
for nearly three more years. This is clearly not the meaningful reform that Americans have demanded, so
legislature, and its executive acting in concert for any act of defense has
Scarry says, yet, since the invention of atomic weapons, there has not been a formal congressional declaration of
war. (The closest case was Congresss conditional declaration for the Gulf War.) Thermonuclear Monarchy describes
the five cases of declared war in American history: the War of 1812, the Mexican War of 1846, the Spanish-American
THE AWESOME
POWER that nuclear weapons invest in the executive branch essentially disables the
legislative one, she writes. [O]nce Congress was stripped of its responsibility for
overseeing waras happened the moment atomic weapons were inventedit was,
in effect, infantilized.Now, six decades later, book after book has appeared describing Congress as
War, and the two World Wars. Scarry remarks on how majestic Congress was in those cases.
dysfunctional or dead. Once Congress regains its authority over war, however, there is every reason to believe it
will travel back along the reverse path, reacquiring the stature, intelligence, eloquence, and commitment to the
population it once had. Civic stature and military stature are intimately linked. Scarry points to the passage of the
Fifteenth Amendment, which enfranchised African-American men. It came on the heels of the Civil War, in which
180,000 black soldiers fought; given this, blacks could hardly be denied the right to vote. Similarly, the Twenty-Sixth
Amendment, lowering the voting age from 21 to 18, was ratified after many teenaged soldiers had fought and died
in the Vietnam War. It is tempting to think that a country with monarchic arrangements in the realm of nuclear war
can maintain a more attractive form of government throughout the rest of its civil fabric, she writes. That would
be a mistake. A country is its arrangements for national defense. The Constitution and, more generally, the
social contract, purposely make it difficult to go to war. Scarrys book makes clear that the social contract arises
from the need to prevent the injuries that people living in groups so often cause one another. The solution involves
putting brakes on the concentration of power. The only way you can civilize force is to distribute it: give everyone a
small share, she says, adding that the Second Amendments insistence on the citizens right to bear arms
underlines this principle. Urging that military powers be held within the social contract, John Locke similarly warned,
she notes, that anyone is in a much worse condition, who is exposed to the arbitrary power of one man, who has
Nuclear
weapons eliminate individual soldiers; they condense the injuring power that
formerly depended on thousands of soldiers into a single weapon, and place it at
the disposal of a solitary leader. Actions that cause major injury, like going to war, require collective
the command of 100,000, than he that is exposed to the arbitrary power of 100,000 single men.
decisionmakingwhich gives a great braking power, she says. You dont want to put impediments in the way of
the good things in lifethings like liberty, lovemaking, party-going, studying, helping others. The social contract
puts impediments in the way of one thing: injury. War surely causes more injury and death than any other action
arising from human intentions, and the Constitution (written in the wake of the Revolutionary War) puts a double
brake on warfare. War must pass through two gates to become a reality. One is Congress, with its responsibility
(now shirked) to declare war. The second brake is the general population. The mere fact that you required the
citizens to fight meant that the citizenry could say yes or no, she explains. A war doesnt get fought if the
population doesnt want it fought. People like to say, Soldiers obeythey do what theyre told, she continues.
Its not true. Soldiers do what they are told, but they do it thoughtfullyand sometimes they dont. The War of
1812 ended when it did because the population, including soldiers and sailors, did not feel strong support for it.
There were soldier strikes all over England and Canada at the end of World War I; Winston Churchill wrote to Lloyd
George saying he wanted to go into Russia to support the Whites against the Reds, but the soldiers wont let me. A
big reason the South lost the Civil War was that 250,000 soldiers deserted; every time Robert E. Lee looked over his
political tension, Scarry writes,it can o-n-l-y-r-e-c-e-i-v-e-t-i-n-y-a-m-o-u-n-t-s-o-f-i-n-f-o-r-m-a-t-i-o-n-v-e-r-y-v-e-r-ys-l-o-w-l-y. In fact, the first three letters of the hyphenated message would have taken fifteen minutes to arrive, and
the submarine would have had no way to confirm its receipt of the letters. The information gets conveyed, she
explains, in Extremely Low Frequency (or ELF) waves, giant radio waves each 2500 miles in length that can
(unlike any other band of the electromagnetic spectrum) penetrate the ocean depths. Until 2004, ELF waves were
launched by a giant antenna in Michigan and Wisconsin that is eighteen acres in size. (The Navy has not disclosed
the successor to ELF.) The nuclear-armed submarine, then, is an obscenely powerful engine of destruction and
death that, at the most critical moments, seems all but incommunicado. Thermonuclear Monarchy builds on this:
to say nuclear weapons are ungovernable is to say that they are unreachable by the human will, the
populations of the earth can have no access to them. The membrane that separates us from their lethal corridors
is one-directional: the weapons may suddenly unzip the barrier, erupt into our world, eliminate us; but we cannot,
standing on the other side, unzip the barrier, step into their world, and eliminate them. She elaborates: People
say, Once something is invented it cant be un-invented. What are we talking about? These things weve invented
reports did not cover the launching, christening, and commissioning of any of these submarines, even in the states
whose names they bore. The shroud of secrecy keeps the general citizenry ignorant of basic facts about the
nations nuclear arrangements. Most Americans do not realize that the country has a first-use policy. A 2004 poll
found that the majority estimated that the United States has 200 nuclear weapons; the actual current figure is
7,700. Meanwhile, 73 percent of Americans say they want the total elimination of nuclear weapons, as do similar
proportions of Russians and Canadians. The United States and Russia are now reducing their stockpiles of nuclear
warheads in accordance with negotiated agreements. This is a positive step, Scarry says, though she cautions that
the reductions in forces may simply be a way to retire obsolete weapons to make way for newer ones. (Twelve
more Ohio class submarines are slated for construction between 2019 and 2035.) RECENT SCIENTIFIC WORK on the
nuclear winter (the hypothetical climate change following a nuclear exchange), Scarry reports, indicates that any
country launching a nuclear attack would be committing suiciderendering the weapons, in effect, unusable.
An
exchange that exploded as little as 0.015 percent of the worlds nuclear arsenal say,
between lesser nuclear powers like India and Pakistancould leave 44 million dead immediately
and one billion more people likely to perish in the following month, given the effect
on food supplies and the disruption of agriculture. During the Cuban missile crisis, President John
F. Kennedy stated that the United States had no quarrel with the Cuban people or the Soviet people. But, Scarry
says, These
weapons are not designed for a showdown of political leaders. They are
going to massacre the citizens. No weapon ever invented has remained unused.
Does anyone think that in the next 100 years, one of these governments that has
them, wont use them? In a 2005 Foreign Policy essay, Apocalypse Soon, Robert McNamara bluntly
declared, U.S. nuclear weapons policy [is] immoral, illegal, militarily unnecessary and
dreadfully dangerous. Scarry agrees, and declares, Nuclear weapons have to be gotten rid of, worldwide.
But this cannot be done if the United States is just sitting there with this huge arsenal, which dwarfs what any other
nation has. We worry about Iran and North Korea and the huge existential threat if these countries get nuclear
weapons. What is mysterious, though, is that we fail to see the huge existential threat that we pose to the world
with what is by far the most powerful nuclear arsenal anywhere. In 1995, 78 countries asked the International
Court of Justice to declare nuclear arms illegal. In response, the U.S. Departments of Defense and State jointly
argued that using, and even making first use of, nuclear weapons does not violate any treaty regarding human
rights or the environment. Nor would the death of millions via a nuclear attack violate the 1948 UN convention on
genocide; they asserted that genocide applies only to the annihilation of national, ethnic, racial, or religious
groups.
Also: Their Castro and McQuinn Card says that congress should
pass the legislation. Their own cards supports the perm.
Our solvency says why congress needs to be actor. Extend
Solvency.
Williams Card only talks about creating exec agencies.
Completely unrelated, no NB.
PTX
Congress supports NSA reform the freedom act proves
Dan Froomkin 6/2/15 (Dan Froomkin is a reporter, columnist, and editor with a
focus on coverage of U.S. politics and media. An outspoken proponent of
accountability journalism, he wrote the popular White House Watch column at The
Washington Post from 2004 to 2009. During a nearly three-decade long career in
journalism, which started in local news, he has served as the senior Washington
correspondent and bureau chief for The Huffington Post, as editor of
WashingtonPost.com, and as deputy editor of NiemanWatchdog.org. He lives in
Washington, D.C., The Intercept, "USA Freedom Act: Small Step for Post-Snowden
Reform, Giant Leap for Congress," https://firstlook.org/theintercept/2015/06/02/onesmall-step-toward-post-snowden-surveillance-reform-one-giant-step-congress/)
The USA Freedom Act passed the House in an overwhelming, bipartisan vote three
weeks ago. After hardliner Republicans lost a prolonged game of legislative chicken, the Senate gave its
approval Tuesday afternoon as well, by a 67 to 32 margin . The bill officially ends 14
years of unprecedented bulk collection of domestic phone records by the NSA ,
replacing it with a program that requires the government to make specific requests to the phone companies. After
Snowdens leak of NSA documents revealed it, the program was repeatedly found to violate the law, first by legal
experts and blue-ribbon panels, and just last month by a federal appellate court. Its rejection by Congress is hardly
a radical act it simply reasserts the meaning of the word relevant (the language of the statute) as distinct from
everything (how the government interpreted it). At the same time, the Freedom Act explicitly reauthorizes or,
rather, reinstates, since they technically expired at midnight May 31 other programs involving the collection of
business records that the Bush and Obama administrations claimed were authorized by Section 215 of the Patriot
Act. In fact, even the bulk collection of phone records, which was abruptly wound down last week in anticipation of a
possible expiration, may wind up again, because the Freedom Act allows it to continue for a six-month transition
period. And while the Freedom Act contains a few other modest reform provisions such as more disclosure and a
public advocate for the secretive Foreign Intelligence Surveillance Court, it does absolutely nothing to restrain the
vast majority of the intrusive surveillance revealed by Snowden. It leaves untouched formerly secret programs the
NSA says are authorized under section 702 of the FISA Amendments Act, and that while ostensibly targeted at
foreigners nonetheless collect vast amounts of American communications. It wont in any way limit the agencys
mass surveillance of non-American communications. As I wrote after Sunday nights legislative action, which paved
the way for Tuesdays vote, this marks the end of a vast expansion in surveillance authorities that began almost
immediately after the 9/11 terror attacks. Indeed, the Freedom Act represents the single greatest surveillance
reform package since the 1970s. But thats a low bar. After 14 years of rubber-stamping executive-branch requests
government surveillance. And three provisions of the Patriot Act were set to expire. The provisions did expire after
Senate Majority Leader Mitch McConnell repeatedly failed to stampede the Senate into extending them as is. Loath
to vindicate Snowden, McConnell and most of the Republican majority took a position even more extreme than that
of the White House and the intelligence community, both of which had declared themselves satisfied with the
modest changes in the defanged compromise legislation. McConnell and other fearmongers issued dire warnings
until the very end. The Senate is voting to take away one more tool from those who defend this country every
day, he said Tuesday. McConnell tried to get support for some discrete and sensible improvements to the
Freedom Act on Tuesday, but failed. In one last stand before his final defeat, he refused to allow debate on several
amendments that would have given the reforms more teeth. President Obama wasted no time in announcing his
plans: Spitfire Strategies, a communications and campaign management firm, compiled the following responses to
tradition, and Constitution Todays vote represents a critical first step toward
restoring trust in the Internet, but it is only a first step. We look forward to working with Congress on
further reforms in the near future. Susan Molinari, Vice President, Americas Public Policy and Government
Relations ACLU: The
passage of the USA Freedom Act is a milestone. This is the most important
surveillance reform bill since 1978, and its passage is an indication that Americans are no
longer willing to give the intelligence agencies a blank check . Its a testament to the
significance of the Snowden disclosures and also to the hard work of many principled legislators on both sides of
the aisle. Still, no one should mistake this bill for comprehensive reform. The bill leaves many of the governments
most intrusive and overbroad surveillance powers untouched, and it makes only very modest adjustments to
disclosure and transparency requirements. Jameel Jaffer, American Civil Liberties Union deputy legal director
Center for Democracy & Technology: This is a generational win for privacy and transparency, said CDT President &
CEO Nuala OConnor. Weve
governments keep people safe." "We have little doubt that Congress can protect
both national security and privacy while taking a significant, concrete step toward
restoring trust in the Internet," he added. Sen. Ron Wyden (D-Ore.), one of the most ardent civilliberties advocates in Congress, recently told the Daily Dot that he and his allies considered the expiration of
Section 215 a key moment for their cause.
Americans phone data, as the Guardian revealed in June 2013 thanks to whistleblower Edward Snowden, a practice
that a federal appeals court deemed illegal on 7 May. Opposition to reauthorizing the Patriot Act without
modification cuts against a bill by the GOP Senate leader, Mitch McConnell of Kentucky. The poll found 58% of
Republicans favor modification, the subject of a rival bipartisan bill that recently passed the House, with only 36% of
them favoring retention.
Consensus
on this issue is bipartisan, said Strimple. Theres real concern about what
the governments accessing about your personal life.
percentage is concerned about government use of that data for non-counter-terrorism purposes.
new action from Congress on Cuba. Americans and Cubans alike are ready to move
forward; I believe its time for Congress to do the same, he said, renewing his call
to lift the travel and trade embargo. ... Yes, there are those who want to turn back
the clock and double down on a policy of isolation, but its long past time for us to
realize that this approach doesnt work. It hasnt worked for 50 years. ... So Id ask
Congress to listen to the Cuban people, listen to the American people, listen to the
words of a proud Cuban American, [former Bush commerce secretary] Carlos
Gutierrez, who recently came out against the policy of the past. Fifteen minutes
later, Obama lifted off from the South Lawn in Marine One on his way to Nashville,
where he tried to use the momentum generated by the Supreme Court Obamacare
victory to spread the program to states where Republican governors have resisted.
What Im hoping is that with the Supreme Court case now behind us, what we can
do is ... now focus on how we can make it even better, he said, adding, My hope
is that on a bipartisan basis, in places like Tennessee but all across the country, we
can now focus on ... what have we learned? Whats working? Whats not working?
He said that because of politics, not all states have taken advantage of the options
that are out there. Our hope is, is that more of them do. He urged people to think
about this in a practical American way instead of a partisan, political way. This
probably wont happen, but its refreshing to see Obama, too often passive,
regaining vigor as he approaches the final 18 months of his presidency. The energy
had, at least for the moment, returned to the White House, where no fewer than six
network correspondents were doing live stand-ups before Obamas appearance
Wednesday morning. There was a spring in the presidents step, if not a swagger, as
he emerged from the Oval Office trailed by Vice President Biden. Republican
presidential candidates were nearly unanimous in denouncing the plan to open a
U.S. embassy in Havana. But Obama, squinting in the sunlight as he read from his
teleprompters, welcomed the fight. The progress that we mark today is yet
another demonstration that we dont have to be imprisoned by the past, he said.
Quoting a Cuban Americans view that you cant hold the future of Cuba hostage to
what happened in the past, Obama added, Thats what this is about: a choice
between the future and the past. Obama turned to go back inside, ignoring the
question shouted by Bloombergs Margaret Talev: How will you get an ambassador
confirmed? That will indeed be tricky. But momentum is everything in politics
and for the moment, Obama has it again.
DA Not Intrinsic
Disad not intrinsic A logical policymaker could pass the plan
and the agenda itembills are considered separately.
Dehumanization
The way in which our culture has changed over the last fifty years was
Man
. Most of us are no longer really human, we have been deprived of our humanity. We have been dehumanized by the processes of conditioning, upbringing and socialization. We are no longer the organized authentic self,
is
Television
robbed children of their childhood and replaced it with an amalgam of
mal-adult, mal-feeling, mal-thinking, sick feeling, violence and creates an
incapacity for young people to think for themselves. I call television the
lobotomy-box.
which we were once capable of being. We substitute power in our search for what
missing - if I get a lot of money, if I get a lot of power - then I can get people to love me, and it never works.
, for
example, has
If you put an electroen-cephalograph on the head of the average viewer you would not get any reaction whatsoever. Because hes given over all cognitive processes, all evaluative
processes to this machine. Look what we have done to sports. It is a corruption of the spirit, a game of big business in which a person who can hardly read or write gets a contract of $26 million for years because he can hit a ball.
Here are the successes we imitate. And all these children who make a $1,000 a day selling drugs. This is the education they get. Well, it isnt education. Its corruption of the human spirit, and this is what were suffering from.
Circumvention
1. NSA will comply with the plan
Ackerman, The Guardian, 15
(Spencer, 6/1/2015, The Guardian, Fears NSA will seek to undermine surveillance
reform, http://www.theguardian.com/us-news/2015/jun/01/nsa-surveillance-patriotact-congress-secret-law, Accessed 7/5/15, DR)
Despite that recent history, veteran intelligence attorneys reacted with scorn to the
idea that NSA lawyers will undermine surveillance reform . Robert Litt, the senior
lawyer for director of national intelligence, James Clapper, said during a public
appearance last month that creating a banned bulk surveillance program was not
going to happen. The whole notion that NSA is just evilly determined to read the
law in a fashion contrary to its intent is bullshit, of the sort that the Guardian and
the left but I repeat myself have fallen in love with. The interpretation of 215
that supported the bulk collection program was creative but not beyond reason, and
it was upheld by many judges, said the former NSA general counsel Stewart Baker,
referring to Section 215 of the Patriot Act. This is the section that permits US law
enforcement and surveillance agencies to collect business records and expired at
midnight, almost two years after the whistleblower Edward Snowden revealed to the
Guardian that the Patriot Act was secretly being used to justify the collection of
phone records from millions of Americans. With one exception, the judges that
upheld the interpretation sat on the non-adversarial Fisa court, a body that
approves nearly all government surveillance requests and modifies about a quarter
of them substantially. The exception was reversed by the second circuit court of
appeals. Baker, speaking before the Senate voted, predicted: I dont think anyone
at NSA is going to invest in looking for ways to defy congressional intent if USA
Freedom is adopted.
something to undermine customers you might well have said now anyway, but now
your confidence in the government keeping it a secret can't be what it was before.
And as Dickson says, it's not just the US government; anyone who thinks the
average European government is more trustworthy is fooling themselves. Tighter
cooperation between security, privacy and corporate counsel will occur
This makes sense superficially, but I'm less certain than Dickson that it will bring
about significant actual change. Companies will review and update their
public privacy statements I agree with Dickson that many in the public believe
mistakenly that companies are cooperating voluntarily, even enthusiastically, with
the government to compromise their own products. But it's not clear to me that a
change in the privacy statement will make a difference to anyone in the public; it's
just about satisfying corporate counsel's sense of the company's exposure. CEOs
will question why companies keep certain sensitive customer data at all This is a
good prediction and a good question for executives to ask, but the reason has more
to do with data breaches generally and not with the NSA. Legislation to cooperate
with the US Federal Government on Information Sharing is likely dead It's as dead
as J Edgar Hoover. The government will have to make do with what mechanisms
they have now. International clients will ask American IT companies tougher
questions Yes, of course this is true, but what answers can they really expect?
And why would they believe that non-US products and services are more
trustworthy? In the end, I think the market impact of this will be small, limited to
symbolic anecdotes, mostly in the purchases of other governments. But why stop at
international clients? I'm sure US customers will be asking US IT companies more
about the security of their products and services, although they too can't
reasonably expect informative answers. Another potential outcome Dickson doesn't
address is the vulnerability of your own employees. If Edward Snowden can get
through the NSA's contractor process, what kind of traitorous scoundrels work in
your own IT department? You need to think about who you trust with the company
jewels and perhaps to narrow that circle of trust to a few people who you can
scrutinize more thoroughly. Another prediction worth making is that this is all good
for the business of security consulting and penetration testing. If you assume that
the government has bugged us all, you probably have to look for the bugs more
often and more assertively. Of course, you have to assume that your consultants
and pen-testers aren't really working for you-know-who...
3. First you can extend kayalli and Castro from the 1AC that
say Legislation is key to ending these backdoors and will
completely end the project bullrun.
a. Not only will this be government enforced, but also
enforced by businesses. No longer will the government be able
to require businesses to install back doors. This solves for
business innovation
b. On top of that our advantages are largely perception
based. This means that passing the plan and having the
government sign it will send a strong signal to consumers
increasing consumer confidence.
A2: Mueller 10
They talk about low risk should be treated as no risk. Low risk is directly addressed
in our warrant in our card, a fraction of inifite impact is infinity. Prefer our evidence
example, gives direction and limits to the topic, which would, for example, eliminate consideration of increasing
tariffs, discussing diplomatic recognition, or discussing interstate commerce. Propositions of policy deal with future
action. Nothing has yet occurred.
to occur. What you agree to do, then, when you accept the affirmative side in such a debate is to offer
sufficient and compelling reasons for an audience to perform the future action that you propose.
Prefer:
Law learning about the state is key to ensure movements do
not unintentionally reinforce it- understanding about the
masters tools helps us destroy the masters house and build
our own
Koopman 8- Sarah Koopman (Ph.D., political geography) is a feminist political
geographer who does collaborative research with international solidarity
movements to support their efforts to decolonize the relationships between global
North and South. Her work also speaks to dynamics in humanitarianism,
development, and peacebuilding more generally.(Imperialism Within: Can the
Masters Tools Bring Down Empire?, http://www.acme-journal.org/vol7/SKo.pdf?
q=within)//TL
Those of us within the core of empire may think of empire as imposed over
there on them, but to effectively struggle against it we have to see how
it also affects us over here, and see the imperialism we carry within . The
good helper role is one way empire becomes quite intimate. Solidarity activists have used it to try to bring down
this masters tool is toxic. When we use it we may appear to take tiles off of the masters
We
cannot simply ignore or throw away this tool. The good helper role is too strong a trope,
and we continue to slip into these patterns or be read through them. There is no place outside of
power, no pure opposition (Butler, 1999). There is no Zion off the grid. The
masters house is taking up all of the land. If we are going to build a new
house it has to be on this same plot, and most of our building materials
will be recycled from his house. We cannot ignore his tools, or we will
constantly trip over them; but we can dismantle and rework them.
Changing the good helper tool to become true compas is a constant process.
With this modified tool in-the-making we can dismantle the masters
house, and at the same time be building our own. One of the key components of that
better world is new ways of relating to others, which requires a new sense of self. As we build these, we also
undercut some of the main beams of the masters house .
empire, but
house, but we unintentionally reinforce the foundations, the systems of domination that prop up empire.
own and other citizens' preferences about the issues under discussion; meaning that when subject to the test of
public justification the outcomes one prefers are presumed to be negotiable and open to transformation.
Even if
the democratic
capacities built by debate are not limited to speechas indicated earlier, debate builds
capacity for critical thinking, analysis of public claims, informed decision making,
and better public judgment. If the picture of modem political life that underwrites
this critique of debate is a pessimistic view of increasingly labyrinthine and
bureaucratic administrative politics, rapid scientific and technological change outpacing the
capacities of the citizenry to comprehend them, and ever-expanding insular special-interest- and
money-driven politics, it is a puzzling solution, at best, to argue that these
conditions warrant giving up on debate. If democracy is open to rearticulation, it is open to
rearticulation precisely because as the challenges of modern political life proliferate, the
citizenry's capacities can change, which is one of the primary reasons that
theorists of democracy such as Ocwey in The Public awl Its Problems place such a high premium
on education (Dewey 1988,63, 154). Debate provides an indispensible form of education in the modem
articulation of democracy because it builds precisely the skills that allow the citizenry to
research and be informed about policy decisions that impact them, to sort through
and evaluate the evidence for and relative merits of arguments for and against a policy
in an increasingly information-rich environment, and to prioritize their time and
political energies toward policies that matter the most to them.
presumes that the primary pedagogical outcome of debate is speech capacities. But
To analyze the self-report ratings of the instructional and control group students, we first conducted a multivariate
analysis of variance on all of the ratings, looking jointly at the effect of instmction/no instruction and debate topic . .
. that it did not matter which topic students had been assigned . . . students in the
Instnictional [debate) group were significantly more confident in their ability to access information and less likely to
feel that they needed help to do so----These findings clearly indicate greater self-efficacy for online searching
among students who participated in (debate).... These results constitute strong support for the effectiveness of the
project on students' self-efficacy for online searching in the academic databases. There was an unintended effect,
however: After doing ... the project, instructional group students also felt more confident than the other students in
their ability to get good information from Yahoo and Google. It may be that the library research experience
increased self-efficacy for any searching, not just in academic databases. (Larkin 2005, 144)
Larkin's study substantiates Thomas Worthcn and Gaylcn Pack's (1992, 3) claim that debate in
the college classroom plays a critical role in fostering the kind of problem-solving skills
demanded by the increasingly rich media and information environment of
modernity. Though their essay was written in 1992 on the cusp of the eventual explosion of the Internet as a
medium, Worthcn and Pack's framing of the issue was prescient: the primary question facing today's student has
changed from how to best research a topic to the crucial question of learning how to best evaluate which
arguments to cite and rely upon from an easily accessible and veritable cornucopia of materials.
There are, without a doubt, a number of important criticisms of employing debate as a model for democratic
Expanding this practice is crucial, if only because the more we produce citizens that
can actively and effectively engage the political process, the more likely we are to
produce revisions of democratic life that are necessary if democracy is not only to
survive, but to thrive. Democracy faces a myriad of challenges, including: domestic and
international issues of class, gender, and racial justice ; wholesale environmental
destruction and the potential for rapid climate change ; emerging threats to
international stability in the form of terrorism, intervention and new possibilities for great
power conflict; and increasing challenges of rapid globalization including an increasingly
volatile global economic structure. More than any specific policy or proposal, an informed and
active citizenry that deliberates with greater skill and sensitivity provides one of the
best hopes for responsive and effective democratic governance, and by extension,
one of the last best hopes for dealing with the existential challenges to democracy [in an]
increasingly complex world.
benefit of debate, as it addresses topics of considerable importance in a real world setting. Recent college and high
school topics include energy policy, prison reform, care for the elderly, trade policy, homelessness, and the right to
privacy. These topics are notable because they exceed the knowledge boundaries of particular school subjects, they
reach into issues of everyday life, and they are broad enough to force students to address a variety of value
appeals. The explosion of "squirrels," or small and specific cases, in the 1960s and 1970s has had the effect of
opening up each topic to many different case approaches. National topics are no longer of the one-case variety (as
in 1955's "the U.S. should recognize Red China"). On the privacy topic, for example, cases include search and
seizure issues, abortion, sexual privacy, tradeoffs with the first amendment, birth control, information privacy,
pornography, and obscenity. The multiplicity of issues pays special dividends for debaters required to defend both
sides of many issues because the value criteria change from round to round and evolve over the year. The
development of flexibility in coping with the intertwining of issues is an essential component in the interconnection
of knowledge, and is a major rationale for switch-side debate. The isolation of debate from the real world is a much
more potent challenge to the activity. There are indeed "esoteric" techniques, special terminologies, and procedural
constraints that limit the applicability of debate knowledge and skills to the rest of the student's life. The first and
most obvious rejoinder is that debate puts students into greater contact with the real world by forcing them to read
a great deal of information from popular periodicals, scholarly books and journals, government documents, reports,
newsletters, and daily newspapers. Debaters also frequently seek out and query administrators, policy makers, and
public personae to gain more data. The constant consumption of material by. from, and about the real world is
significantly constitutive: The information grounds the issues under discussion, and the process shapes the
relationship of the citizen to the public arena. Debaters can become more involved than uninformed citizens
because they know about important issues, and because they know how to find out more information about these
issues. A second response to the charge of segmentation is the proclivity of debaters to become involved in public
policy and international affairs. Although the stereotype is that debaters become lawyers, students seeking other
professional areas also see value in the skills of debate. Business management, government, politics, international
relations, teaching, public policy, and so on, are all significant career options for debaters. In surveys, ex-debaters
frequently respond that debate was the single most educational activity of their college careers.'" Most classes
provide information, but debate compels the use, assimilation, and evaluation of information that is not required in
most classrooms. As one debate alumnus writes: "The lessons learned and the experience gained have been more
valuable to me than any other aspect of my formal education."" It is no wonder, then, that surveys of Congress and
other policy-making institutions reveal a high percentage of ex-debaters.'^ The argument that debate isolates
participants from the "real world" is not sustained in practice when debaters, trained in research, organization,
strategy, and technique, are consistently effective in integrating these skills into success on the job. Even the
specialized jargon required to play the game successfully has benefits in terms of analyzing and understanding
society's problems. Consider the terminology of the "disadvantage" against the affirmative's plan: There is a "link"
between the plan and some effect, or "impact"; the link can be actions that push us over some "threshold" to an
impact, or it can be a "linear" relationship where each increase causes an increase in the impact; the link from the
affirmative plan to the impact must be "unique," in that the plan itself is largely responsible for the impact; the
affirmative may argue a "turnaround" to the disadvantage, claiming it as an advantage for the plan. Such
specialized jargon may separate debate talk from other types of discourse, but the ideas represented here are also
significant and useful for analyzing the relative desirability of public policies. There really are threshold and brink
issues in evaluating public policies. Though listening to debaters talk is somewhat disconcerting for a lay person,
familiarity with these concepts is an essential means of connecting the research they do with the evaluation of
options confronting citizens and decision makers in political and social contexts. This familiarity is directly related to
third point
switch-side debate develops habits of the mind
and instills a lifelong pattern of critical assessment . Students who have
debated both sides of a topic are better voters, Dell writes, because of "their
habit of analyzing both sides before forming a conclusion ."^^ O'Neill, Laycock and
Scales, responding in part to Roosevelt's indictment, iterated the basic position in 1931: Skill in the use of
facts and inferences available may be gained on either side of a question
without regard to convictions. Instruction and practice in debate should give young men this skill.
the motivation and the ability to get involved in issues and controversies of public importance. A
about isolation from the real world is that
And where these matters are properly handled, stress is not laid on getting the speaker to think rightly in regard to
pervasively misunderstood concept of the ideal speech situation, entails strong ethical assumptions, namely the principles of universal moral respect
combines a weak transcendental argument concerning the four types of validity claims operative in speech acts with an empirical reconstruction of
we begin to ask not what all would or could agree to as a result of practical
discourses to be morally permissible or impermissible , but what would be
allowed and perhaps even necessary from the standpoint of continuing and sustaining
the practice of the moral conversation among us. The emphasis now is less on rational
agreement, but more on sustaining those normative practices and moral relationships
within which reasoned agreement as a way of life can ourish and continue. (SS, 38)8
27 The second significant difference between Habermas and Benhabib is that Benhabib rejects Habermass rigid opposition between justice and the
Benhabib
good life, an opposition that effectively relegates identity-based politics to a lower plane of moral practice, and that for
undercuts our
ability to apprehend the radical particularity of the other. While she believes in the importance of self-reflexive interrogations of conventional identities and
opposes any ethics or politics that privileges the unencumbered or detached self over
the concrete, embodied, situated self. She argues in particular against those liberal models that imagine that conversations of
roles, she strongly
moral justification should take place between individuals who have bracketed their strongest cultural or social identifications and attachments. Instead
power and domination play themselves out in discourse presupposes a conception of discourse in which there is no [coercive] power and domination. In
other words, to defend the position that there is a mean- ingful difference between talking and fighting, persuasion and coercion, and by extension, reason
and power involves beginning with idealizations. That is, it involves drawing a picture of undominated discourse.65 However, this discussion of the
idealizing status of the norm does notanswer claims that it invokes a transparency theory of knowledge. Iwould argue that such claims not only fall prey to
another performa-tive contradiction of presupposing that the use of rational discourse can establish the impossibility of rational discourse revealing truth
In
contrast to the metaphysics of presence, the differentiation of persusion from
coercion in the public sphere does not posit a naive theory of the transparency of
power, and meaning more generally. The public sphere conception as based upon
communicative rationality does not assume a Cartesian (autonomous,
disembodied, decontextualized) subject who can clearly distinguish between persuasion
and coercion, good and bad reasons, true and untrue claims, and then wholly re-move
themselves and their communications from such influence. For Habermas, subjects are always situated
within culture. The public sphere is posited upon intersubjective rather than
subject-centered rationality. It is through the process of communicative
rationality, and not via a Cartesian subject, that manipulation, deception, poor
reasoning, and so on, are identified and removed, and by which meanings can be
understood and communicated. In other words, it is through rational-critical communication
that discourse moves away from coercion or non-public reason towards greater rational communication and
a stronger public sphere. The circularity here is not a problem, as it may seem, but is in fact the very essence of democratization:
and power but are also based on a poor reading of Habermas theory of communicative rationality. This is the third point of clarification.
throughthe practice of democracy, democratic practice is advanced. This democratizing process can be further illustrated in the important and
challenging case of social inequalities. Democratic theorists (bothdeliberative and difference) generally agree that social inequalities al-ways lead to some
degree of inequalities in discourse. Thus, the ide-alized public sphere of full discursive inclusion and equality requires that social inequalities be eliminated.
become passionate about social injustice and publicly thematize problems of social inequality. Thus the negative power of social inequality as with
communicatively produced agreements, which in the public sphere are known as public opinions, has also come under ex-tensive criticism in terms of
The starting
point of discourse is disagreement over problematic validity claims.
However, a certain amount of agreement, or at least mutual understanding,
is presupposed when interlocutors engage in argumentation . All communication
presupposes mutual understanding on the linguistic terms used that interlocutors use the same
terms in the same way.67 Furthermore, in undertaking rational-critical discourse, according to Habermas formal pragmatic reconstruction,
interlocutors also presuppose the same formal conditions of argumentation.
These shared presuppositions enable rational-critical discourse to be
undertaken. However, as seen above, meaning is never fixed and understanding is always
partial. Understanding and agreement on the use of linguistic terms and of what it means to be reasonable, reflexive,
sincere, inclusive, non-coercive, etc. takes
excluding difference, criticism that I wantto explore in the next section. The ends of discourse: Public opinion formation
security role when it comes to economic transactions. That applies, for example, to Afghan and Iraqi decisions about contracts for
their natural resources, and to Beijing on many counts. U.S. forces maintain a stable world order
that decidedly benefits China's economic growth, and to date, Beijing has been getting a free ride. A NEW APPROACH In this
environment, the first-tier foreign policy goals of the United States should be a strong economy and the ability to deploy effective
counters to threats at the lowest possible cost. Second-tier goals, which are always more controversial, include retaining the military
power to remain the world's power balancer, promoting freer trade, maintaining technological advantages (including
cyberwarfare capabilities), reducing risks from various environmental and health challenges, developing alternative energy supplies,
and advancing U.S. values such as democracy and human rights . Wherever possible, second-tier goals should
reinforce first-tier ones: for example, it makes sense to err on the side of freer trade to help boost the economy and to invest in
greater energy independence to reduce dependence on the tumultuous Middle East. But no overall approach should dictate how to
pursue these goals in each and every situation. Specific applications depend on, among other things, the culture and politics of the
target countries. An overarching vision helps leaders consider how to use their power to achieve their goals. This is what gives policy
direction, purpose, and thrust--and this is what is often missing from U.S. policy. The organizing principle of U.S. foreign policy should
be to use power to solve common problems. The good old days of being able to command others by making military or economic
threats are largely gone. Even the weakest nations can resist the strongest ones or drive up the costs for submission. Now, U.S.
power derives mainly from others' knowing that they cannot solve their problems without the United States and that they will have
to heed U.S. interests to achieve common goals. Power by services rendered has largely replaced power by command. No matter the
decline in U.S. power, most nations do not doubt that the United States is the indispensable leader in solving major international
forge a formula for sharing the region's resources. Only Washington has a chance of pushing the Israelis and the Palestinians toward
peace. Only Washington can bargain to increase the low value of a Chinese currency exchange . rate that disadvantages almost
every nation's trade with China. But it is clear to Americans and non-Americans alike that Washington lacks the power to solve or
manage difficult problems alone; the indispensable leader must work with indispensable partners. To attract the necessary partners,
Washington must do the very thing that habitually afflicts U.S. leaders with political hives: compromise. This does not mean
multilateralism for its own sake, nor does it mean abandoning vital national interests. The Obama administration has been criticized
for softening UN economic sanctions against Iran in order to please China and Russia. Had the United States not compromised,
however, it would have faced vetoes and enacted no new sanctions at all. U.S. presidents are often in a strong position to bargain
while preserving essential U.S. interests, but they have to do a better job of selling such unavoidable compromises to the U.S.
public. U.S. policymakers must also be patient. The weakest of nations today can resist and delay. Pressing prematurely for
decisions--an unfortunate hallmark of U.S. style--results in failure, the prime enemy of power. Success breeds power, and failure
breeds weakness. Even when various domestic constituencies shout for quick action, Washington's leaders must learn to buy time in
order to allow for U.S. power--and the power of U.S.-led coalitions--to take effect abroad. Patience is especially valuable in the
economic arena, where there are far more players than in the military and diplomatic realms. To corral all these players takes time.
Military power can work quickly, like a storm; economic power grabs slowly, like the tide. It needs time to erode the shoreline, but it
surely does nibble away. To be sure, U.S. presidents need to preserve the United States' core role as the world's military and
economics
has to be the main driver for current policy, as nations calculate power more in
terms of GDP than military might. U.S. GDP will be the lure and the whip in the
international affairs of the twenty-first century. U.S. interests abroad cannot be
adequately protected or advanced without an economic reawakening at home.
diplomatic balancer--for its own sake; and because it strengthens U.S. interests in economic transactions. But
Less intuitive is how periods of economic decline may increase the likelihood of
external conflict. Political science literature has contributed a moderate degree of
attention to the impact of economic decline and the security and defence behaviour
of interdependent states. Research in this vein has been considered at systemic,
dyadic and national levels. Several notable contributions follow. First, on the
systemic level, Pollins (2008) advances Modelski and Thompson's (1996) work on
leadership cycle theory, finding that rhythms in the global economy are associated
with the rise and fall of a pre-eminent power and the often bloody transition from
one pre-eminent leader to the next. As such, exogenous shocks such as economic
crises could usher in a redistribution of relative power (see also Gilpin. 1981) that
leads to uncertainty about power balances, increasing the risk of miscalculation
(Feaver, 1995). Alternatively, even a relatively certain redistribution of power could
lead to a permissive environment for conflict as a rising power may seek to
challenge a declining power (Werner. 1999). Separately, Pollins (1996) also shows
that global economic cycles combined with parallel leadership cycles impact the
likelihood of conflict among major, medium and small powers, although he suggests
that the causes and connections between global economic conditions and security
conditions remain unknown. Second, on a dyadic level, Copeland's (1996, 2000)
theory of trade expectations suggests that 'future expectation of trade' is a
significant variable in understanding economic conditions and security behaviour of
states. He argues that interdependent states are likely to gain pacific benefits from
trade so long as they have an optimistic view of future trade relations. However, if
the expectations of future trade decline, particularly for difficult to replace items
such as energy resources, the likelihood for conflict increases, as states will be
inclined to use force to gain access to those resources. Crises could potentially be
the trigger for decreased trade expectations either on its own or because it triggers
protectionist moves by interdependent states.4 Third, others have considered the
link between economic decline and external armed conflict at a national level.
Blomberg and Hess (2002) find a strong correlation between internal conflict and
external conflict, particularly during periods of economic downturn . They write: The
linkages between internal and external conflict and prosperity are strong and
mutually reinforcing. Economic conflict tends to spawn internal conflict, which in
turn returns the favour. Moreover, the presence of a recession tends to amplify the
extent to which international and external conflicts self-reinforce each other.
(Blomberg & Hess, 2002. p. 89) Economic decline has also been linked with an
increase in the likelihood of terrorism (Blomberg, Hess, & Weerapana, 2004), which
has the capacity to spill across borders and lead to external tensions. Furthermore,
crises generally reduce the popularity of a sitting government. "Diversionary theory"
suggests that, when facing unpopularity arising from economic decline, sitting
the take-off phase in sustainability transitions After a decades-long emergence process, some
green niche-innovations are gathering momentum in certain countries. Sustainability
transitions may therefore be entering a new phase, moving from a pre-development phase (with an emphasis on R&D and
experimentation) to a take-off phase (with more emphasis on real-world deploy ment and
installation of green solutions). In the agri-food sector, for instance, the niche-innovation of organic food has
gathered pace (Table 1). In the energy sector, renewable energy has a share of 9% of primary
energy in the European Union, with several countries scoring much higher (Norway. Sweden.
Austria) and lower (UK. Netherlands. Malta) (Table 2). For electricity, the European share of renewable power is higher, about 18% in 2009 (Fig- 3). In
the US transport sector, sales of various 'green' cars (Hybrid-Electric Vehicles. Plugin Hybrid- Electric Vehicles, Extended
Range Electric Vehicles and Battery-Electric Vehicles) peaked in 2007 (Fig. 4). reaching between 2 and 3% of overall sales.11 Sales in Europe
are lower, but also dominated by hybrid-electric vehicles. 22. Wider challenges in the take-off phase With some green nicheinnovations entering the take-off phase of sustainability transitions in certain
countries, new kinds of challenges will gain importance. Firstly, greater amounts of
financial investment are needed to facilitate on-the-ground deployment of green
options. Whereas govern- ment R&D. complemented with some private equity and venture capital, tend to dominate in the pre-development phase,
up-scaling and deployment in the take-off phase tend to draw on other types of finance such
public equity markets, credit markets, mergers and acquisition, and government
2.1. Entering
subsi- dies (Fig. 5). The challenge for sustainability transitions is to mobilize large sums
of money, as Giddens (2009: 123) notes: "The role of businesses, small and large, is going to be
absolutely crucial in respon- ding to climate change , not least because they will
have to supply a good deal of the funding and also pioneer new technologies ". The
availability of these types of finance is shaped by economic conditions, financial
regulations, and investor confidence. The second challenge in the take-off phase
concerns changes in policy and institutional frame- works. In the pre-development phase green nicheinnovations are sheltered, nurtured and protected from adverse regime conditions. But in the take-off phase, they face multidimensional struggles with incumbent regimes. On policy dimensions, the odds are
often stacked against niche-innovations, because formal institutions have been
adjusted to the needs of incumbent actors (Walker, 2000}. Niche-innovations often face a 'mis-match' with existing
institutions (Freeman and Perez. 1988). So, further breakthrough and wider diffusion depends on
changes in policy and institutional frameworks . This is especially the case for
transitions towards sustainability, which refers to collective goods (with associated free rider problems).
Because private actors have no immediate incentive to address sustainability
problems, public authorities have to change economic frame conditions and formal
institutions (regulations, subsidies, incentives, taxes). That is why many green growth reports not
only call for more investment, but also for stronger policies. UNEP (2011: 2). for instance, claims that: "there is a need
for better public policies, including pricing and regulatory measures, to change the
perverse market incentives that drive this capital mis-allocation . (...) To make the
transition to a green economy, specific enabling conditions will be required . (..,) At a
national level, examples of such enabling conditions are: changes in fiscal policy ; reform and reduction of
environmentally harmful subsidies; employing new market-based instruments: targeting public
investments to 'green' key sectors; greening public procurement; and improving environmental
rules and regulations as well as their enforcement ." The OECD (2011: 8) also argues for changes in fiscal and
regulatory settings (such as tax and competition policy), innovation policy, environmental policies, which "include a mix of price-based instruments (for
instance environmentally-related taxes)and non-market instruments such as regulations, technology support policies and voluntary approaches".
As
green innovations begin to compete with existing regimes, it is likely that incumbent
players will flex their economic and political muscles even more to protect their
interests. Following a useful distinction by Hall (1993). this political struggle will be played out at three levels: (a) The precise setting of policy
the organizations that represent them have key access to members of the commission, ministers, and heads of government in mem- ber states."
instruments: there will be struggles over the strictness of environ- mental regulations, height of carbon taxes etc. (b) The kinds of policy instruments;
many industries and policymakers have a preference for market- based instruments rather that regulatory instruments, and have actively lobbied for the
former in the last 10 years. But since some of these market-based instruments (e.g. European emissions trading) have not delivered what was promised,
struggles may ensue about the implementation of other policy instruments. (c) The overall goals that guide policies in particular fields and the associated
belief systems (what Hall calls a policy paradigm). In the last few decades, many (Western) governments operated on the basis of a neo-liberal policy
essential. To put this in another way: markets may drive the uptake of the iPhone (...). but they will
not produce a carbon emission-free energy system (...). Changes to law - modifying
the regula- tory frameworks within which economic actors conduct their affairs (for
example, by introducing a carbon tax of a GHC emissions cap and trade system) and a significant expenditure of social revenue (for example, to accelerate development and deployment of new
technologies and to ease societal adjustment to new patterns of production and consumption) are essential to encourage
sustainability transitions." The third challenge in the take-off phase entails securing
wider public support and cultural legit- imacy (Geels and Verhees. 2011). This is instrumentally important because
"whatever can be done through the State will depend upon generating widespread
political support from citizens" (Giddens, 2009: 91). Urgent demands from public opinion can offer politicians incentives to jockey
for green agendas (Burnstein, 2003). Major policy shifts are therefore often accompanied by shifts in
public opinion and cultural discourse, which, in turn, are shaped by social
movements, media, industry asso- ciations, and special-interest groups (Hilgartner and Bosk,
1988). The literature on issue-attention cycles offers interesting ideas in this respect. The basic proposition is that social problems ('issues') have dynamics
Can economic growth continue forever? The internet seems to be full of physicists explaining that economists are clueless on this
topic. Theres the late Albert Bartletts hugely popular videos or Tom Murphys article Exponential Economist Meets Finite
Physicist.
The key issue is that exponential growth will eventually take you to
impossible places. And by eventually, the physicists mean sooner than we expect. Exponential growth is
any kind of growth that compounds like interest payments. The classic example is the rice on the
chessboard. According to an old story, the inventor of the game of chess was offered a reward by a delighted king. He requested a
modest-sounding payment: one grain of rice on the first square of the chessboard, two on the second, four on the third, doubling
each time. Yet this is actually a colossal amountmany times the annual rice production of the entire planet. The chessboard prize
it all
becomes trouble eventually, because each little bit of growth will itself be multiplied
by growth in the future. As Albert Einstein, yet another physicist, is famously said to have declared (but probably did
not), the most powerful force in the universe is compound interest. The implication
for economic growth seems obvious. Our economy grows at a few percent a year.
was 100 percent growth per square; but 10 percent, 1 percent or even 0.0001 percentits all exponential growth. And
That hasnt presented many insuperable problems so far. But growth of a few per cent a year is nevertheless exponential growth,
economist was the Reverend Thomas Malthus, who died almost two hundred years ago. Malthus was worried about exponential
energy consumption tenfold each centurythen the entire planet will reach boiling point in just four centuries. Its not the
greenhouse effect at work; its irrelevant to Professor Murphys point whether the energy comes from fossil fuels, solar power or
Once a machine civilization has been in operation for some time , the lives of the
people within the society become dependent upon the machines . The vast
interlocking industrial network provides them with food, vaccines, antibiotics,
and hospitals. If such a population should suddenly be deprived of a substantial
fraction of its machines and forced to revert to an agrarian society , the resultant
havoc would be enormous. Indeed, it is quite possible that a society within which
there has been little natural selection based upon disease resistance for several
generations, a society in which the people have come to depend increasingly upon
surgery for repairs during early life and where there is little natural selection
operating among women, relative to the ability to bear children--such a society
could easily become extinct in a relatively short time following the
disruption of the machine network. The modern global economy is like a